Internet of Things

Papers
(The median citation count of Internet of Things is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
E-governance and the European Union: Agenda for implementation605
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications501
A Variational Quantum Classifier for predictive analysis in industrial production318
Key–value data collection with local differential privacy for urban air quality monitoring in crowdsensing223
Building structural analysis based Internet of Things network assisted earthquake detection181
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C164
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks159
IoT convergence with machine learning & blockchain: A review155
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario143
Federated learning for performance behavior detection in a fog-IoT system136
A real-time tennis level evaluation and strokes classification system based on the Internet of Things133
TUI Model for data privacy assessment in IoT networks128
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning126
Multifactor QoE scores in IoT topologies118
MDP-based connectivity and availability models for Internet of Vehicles118
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling114
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing113
DIDAuth-IoTFW: Decentralized firmware authentication for smart home IoT devices using verifiable credentials112
A comprehensive review of IoT device fingerprinting: Insights into techniques, trends, challenges, and future directions110
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization105
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors104
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection102
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices101
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices100
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain97
A semantic communication model for the task of high quality image transmission to edge-end devices96
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization92
Securing IoT devices: A novel approach using blockchain and quantum cryptography89
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things89
IoT-based supply chain management: A systematic literature review87
Dfinder—An efficient differencing algorithm for incremental programming of constrained IoT devices85
Novel deep learning-based IoT network attack detection using magnet loss optimization85
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats84
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory84
SkinSense: Efficient vibration-based communications over human body using motion sensors82
CONCERN: A model-based monitoring infrastructure82
Capability token selection algorithms to implement lightweight protocols81
Anomaly-based Intrusion Detection System for smart lighting81
Outlier detection in non-stationary time series applied to sewer network monitoring80
Deep learning-based transceiver design for multi-user MIMO systems79
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers77
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things75
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT74
Efficient unmanned aerial vehicle-based data collection for IoT smart farming74
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology74
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks72
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization70
Acheron: a market-based multi-relay architecture for adaptive and secure cross-chain communication69
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era67
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs67
Big data and Internet of Things applications in smart cities: Recent advances, challenges, and critical issues67
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train66
Fast and low cost FPGA-based architecture for arrhythmia detection with CNN65
A formal approach to specify and verify Internet of Things architecture64
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks64
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer63
STREAMLINE: Dynamic and Resource-Efficient Auto-Tuning of Stream Processing Data Pipeline Ensembles63
Microservices based architectures for IoT systems - State-of-the-art review62
Real-Time Scalable UAV Condition Monitoring Framework with Hardware-Level Acceleration for IoT Applications61
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices60
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT60
Autonomous driving test system under hybrid reality: The role of digital twin technology60
CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs59
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse59
Formal verification and security analysis of FastDFS using process algebra58
Semantic-driven dimension reduction for wireless internet of things57
A comprehensive soft security model for Cognitive Internet of Things56
Joint mode selection and resource allocation based on many-to-many reuse in D2D-aided IoT cellular networks56
In-vehicle edge system for real-time dashcam video analysis56
A GCN-LSTM framework for link prediction in dynamic SIoT networks56
FedCLLM: Federated client selection assisted large language model utilizing domain description55
Security and privacy solutions in intelligent transportation systems: A survey55
CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks53
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things53
Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks53
Enabling edge-driven Dataspace integration through convergence of distributed technologies52
Blockchain-enabled secure and efficient task allocation for IoT networks using enhanced fuzzy reptile search algorithm52
Improving quality of service for Internet of Things(IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm52
An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration52
Greening smart learning environments with Artificial Intelligence of Things52
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions50
Digital Twins in Additive Manufacturing: A systematic review50
IoT-powered personalization: creating the optimal shopping experience in digital twin VFRs49
Blockchain-based federated learning with homomorphic encryption for privacy-preserving healthcare data sharing49
Bluetooth low energy indoor positioning: A fingerprinting neural network approach48
Joint wireless resource allocation and bitrate adaptation for QoE improvement in IRS-aided RSMA-enabled IoMT streaming systems48
Farmland monitoring and livestock management based on internet of things47
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles47
ACS: Accuracy-based client selection mechanism for federated industrial IoT47
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids47
Edge deduplication for LoRaWAN using network coding47
nCare: Fault-aware edge intelligence for rendering viable sensor nodes46
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,30646
“Hey Alexa, what do you know about the COVID-19 vaccine?”— (Mis)perceptions of mass immunization and voice assistants45
MTAN: Multi-degree Tail-aware Attention Network for human motion prediction45
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs45
Concept-drift-adaptive anomaly detector for marine sensor data streams44
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture43
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture43
A review of digital object architecture and handle system: Development, current applications and prospective43
Real-time Mixed Reality (MR) and Artificial Intelligence (AI) object recognition integration for digital twin in Industry 4.042
Deep Image: A precious image based deep learning method for online malware detection in IoT environment42
Latency performance modelling in hyperledger fabric blockchain: Challenges and directions with an IoT perspective42
Image-based malware analysis for enhanced IoT security in smart cities41
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey41
Joint uplink-downlink user-cell association for ultra-dense NOMA networks40
Intent-based approaches for industry 4.0 applications: A systematic mapping study39
A novel real-time data driven method for floating vehicle speed trend prediction39
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments39
Proactive blockchain deployment mechanism in resource-constrained rate-splitting multiple access IoT networks39
Deep Learning based Payload Optimization for Image Transmission over LoRa with HARQ38
iRestroom : A smart restroom cyberinfrastructure for elderly people38
SHM-NDN: A seamless hybrid mobility management scheme for named data mobile ad hoc networks38
Enhancing security through continuous biometric authentication using wearable sensors38
A multi-type artifact framework for cyber–physical, social systems design and development38
Improved YOLO-v5 model for boosting face mask recognition accuracy on heterogeneous IoT computing platforms37
AIoT for sustainable manufacturing: Overview, challenges, and opportunities37
Quantum cryptography as a solution for secure Wireless Sensor Networks: Roadmap, challenges and solutions37
Commonsense reasoning and automatic generation of IoT contextual knowledge: An Answer Set Programming approach37
Fast ML-based next-word prediction for hybrid languages37
i-DSME: An industrial-DSME MAC protocol for smart factory automation37
Translating and verifying Cyber–Physical systems with shared-variable concurrency in SpaceEx37
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things36
Programming IoT systems: A focused conceptual framework and survey of approaches36
Optimized K-means routing protocol with black-winged kite algorithm for sustainable 5G/6G sensor networks35
System-wide IoT design and programming: Patterns for decentralised collective processes35
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring35
A deep learning model for natural language querying in Cyber–Physical Systems35
DeepVitals: Deep neural and IoT based vitals monitoring in smart teleconsultation system35
Planning and resource allocation of a hybrid IoT network using artificial intelligence35
MicroFlow: An Efficient Rust-Based Inference Engine for TinyML34
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture33
A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data33
Implementation of multiple controllers for context-inspired collaboration between human and robot by integrating the uni-axial motion and real-time operating system33
EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments33
Intelligent digital twin for federated learning in AIoT networks33
Design of an IoT ultrasonic-vision based system for automatic fruit sorting utilizing size and color32
An optimized CNN-based intrusion detection system for reducing risks in smart farming32
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms32
An intelligent fuzzy-based system for handover decision in 5G-IoT networks considering network slicing and SDN technologies32
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions32
Zero-knowledge machine learning models for blockchain peer-to-peer energy trading32
Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment31
Federated learning with hyperparameter-based clustering for electrical load forecasting31
Predicting container intermodal transport arrival times: An approach based on IoT data31
High-performance IoT Module for real-time control and self-diagnose PV panels under working daylight and dark electroluminescence conditions31
Memory feedback transformer based intrusion detection system for IoMT healthcare networks31
Over-the-air firmware update for IoT devices on the wild31
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure31
IoT-based system for individual dairy cow feeding behavior monitoring using cow face recognition and edge computing31
AMI-Chain: A scalable power-metering blockchain with IPFS storage for smart cities31
Performance analysis of entropy variation-based detection of DDoS attacks in IoT30
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things30
BTIA-IME: A blockchain-based trusted interactive architecture for intelligent manufacturing equipment30
An open testbed for O-RAN experimentation with AI-enabled control and monitoring30
The Three-Phase Methodology for IoT Project Development30
An efficient methodology to composite fault detection and classification in wireless biosensor networks30
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things30
WMPA-ConvBERT-BM: A hybrid deep learning model optimized by whale-marine predator algorithm for IoT-enabled malicious URL detection29
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission29
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones29
Joint coded caching and BS sleeping strategy to reduce energy consumption in 6G edge networks29
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention29
Exploring the applicability of haptic actuators in aquatic environments29
iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection28
Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme28
Optimizing IoT architectures by using model driven approach and evolution strategy28
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario28
A fine-grained framework for online IoT device firmware identification via version evolution analysis28
IoT-based expert system for fault detection in Japanese Plum leaf-turgor pressure WSN28
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles28
A robust IoT architecture for smart inverters in microgrids using hybrid deep learning and signal processing against adversarial attacks27
Optimizing parameters of YOLO model through uniform experimental design for gripping tasks performed by an internet of things–based robotic arm27
MIMA 2.0 - Compact and portable Multifunctional IoT integrated Menstrual Aid27
Multi-residual tensor completion for spatiotemporal data imputation26
CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems26
AIoT-enabled defect detection with minimal data: A few-shot learning approach combining prototypical and relational networks for smart manufacturing26
Advanced security frameworks for UAV and IoT: A deep learning approach26
Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models26
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators26
Digital twin-driven semantic offloading for LEO-MEC-enabled remote IoT networks26
The AutoSPADA platform: User-friendly edge computing for distributed learning and data analytics in connected vehicles26
XBiDeep: A novel explainable artificial intelligence based intrusion detection system for Internet of Medical Things environment26
Robotic Arms for Telemedicine System Using Smart Sensors and Ultrasound Robots26
Business continuity of Cloud-based IoT applications through a seamless continuum26
Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey25
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system25
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network25
A feedback-driven brain organoid platform enables automated maintenance and high-resolution neural activity monitoring25
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT25
Cooperative Swarm Learning for Distributed Cyclic Edge Intelligent Computing25
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection25
On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems25
A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber–Physical Systems25
Forecasting energy power consumption using federated learning in edge computing devices25
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda25
Dynamic cooperation and mutual feedback network for shield machine25
FTL-TSLP: A federated transfer learning approach with a two-stage LSTM pipeline for fault-tolerant and privacy-preserving intrusion detection in IoMT networks24
A comparison of code quality metrics and best practices in non-IoT and IoT systems24
Collaboration of AI, big data, and blockchain in Internet of Things (IoT): Emerging trends and perspectives24
A network communication speedup model using multiple fungible and non-fungible paths24
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques24
QoS maximization scheduling of multiple UAV base stations in 3D environment24
The robust scheme for intrusion detection system in Internet of Things24
Distributed inference in IoT-based aerial network of UAVs24
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things24
Fog Node Self-Control Middleware: Enhancing context awareness towards autonomous decision making in Fog Colonies23
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF23
IoT-based monitoring and control for optimized plant growth in smart greenhouses using soil and hydroponic systems23
A Decentralized Trust Establishment Protocol for Smart IoT Systems23
A survey on security and cryptographic perspective of Industrial-Internet-of-Things23
Application of navigation grid corner point algorithm in virtual reality simulation images of indoor fire evacuation23
Automatic software tailoring for Green Internet of Things23
Location-based activity behavior deviation detection for nursing home using IoT devices23
Communication and computation efficiency in Federated Learning: A survey22
Exploring machine learning methods for the identification of production cycles and anomaly detection22
A survey on security in internet of things with a focus on the impact of emerging technologies22
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges22
Reassessing caching performance in information-centric IoT22
A new road state information platform based on crowed sensing on challenged network environments22
Improve quality of service for the Internet of Things using Blockchain & machine learning algorithms22
Minimizing energy consumption in 802.15.4 IoT devices with multilevel xRPL (MxRPL)22
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions22
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city21
The computing continuum: From IoT to the cloud21
Blockchain-enabled road vehicle emissions monitoring: A secure, scalable and private framework21
IoT data dissemination scheme for reducing delay in multi-broker environments21
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges21
Adaptive multi-view subspace learning based on distributed optimization21
Reliable PID dual-rate controller based on LoRaWAN for long-range distributed systems21
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum21
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures21
A novel fragment duplication attacker identification scheme using Discrete Event System based intrusion detection21
Dynamic transmission adaptation algorithms for battery-free LoRaWAN networks21
OpenAPI framework for the Web of Things20
An approach to assess robustness of MQTT-based IoT systems20
Matter and ECHONET Lite: Similarities, differences, and a bridge solution for interoperability20
Collective intelligence-based service migration enabling zoom-in functionality within industry 5.020
Resilience of healthy cities in the post-pandemic era: Findings based on internet of things data and artificial intelligence algorithms20
ABS-TD3: Efficient IoT data submission in DAG-based DLTs for digital circular economy20
The internet of modular robotic things: Issues, limitations, challenges, & solutions20
A fault tolerance aware green IoT workflow scheduling algorithm for multi-dimensional resource utilization in sustainable cloud computing20
Combinative model compression approach for enhancing 1D CNN efficiency for EIT-based Hand Gesture Recognition on IoT edge devices20
Characterizing time-critical internet of things20
Lightweight face recognition-based portable attendance system with liveness detection20
Bluetooth 5 power consumption for an opportunistic edge computing system based on low-power IoT devices20
Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS19
Algorithm for child adoption process using artificial intelligence and monitoring system for children19
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture19
Vortex Feature Positioning: Bridging tabular IIoT data and image-based deep learning19
0.12156820297241