Internet of Things

Papers
(The H4-Index of Internet of Things is 66. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
E-governance and the European Union: Agenda for implementation645
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario547
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection358
A semantic communication model for the task of high quality image transmission to edge-end devices266
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks216
IoT convergence with machine learning & blockchain: A review189
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning177
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices167
Securing IoT devices: A novel approach using blockchain and quantum cryptography162
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization156
IoT-based supply chain management: A systematic literature review154
DIDAuth-IoTFW: Decentralized firmware authentication for smart home IoT devices using verifiable credentials152
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors146
Key–value data collection with local differential privacy for urban air quality monitoring in crowdsensing144
A Variational Quantum Classifier for predictive analysis in industrial production142
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain139
MDP-based connectivity and availability models for Internet of Vehicles139
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C132
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing129
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling127
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization127
Multifactor QoE scores in IoT topologies123
End-To-end response-time analysis of DDS-based real-time applications119
Building structural analysis based Internet of Things network assisted earthquake detection118
Fault detection of industrial air separation stations based on metaheuristic optimization and bidirectional long short-term memory technique118
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices117
Federated learning for performance behavior detection in a fog-IoT system115
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things112
A comprehensive review of IoT device fingerprinting: Insights into techniques, trends, challenges, and future directions110
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers104
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications104
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory100
Big data and Internet of Things applications in smart cities: Recent advances, challenges, and critical issues99
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train96
MQTT Spectrum: A comprehensive and version-agnostic dataset for intrusion detection in MQTT-based IoMT deployments96
Microservices based architectures for IoT systems - State-of-the-art review94
Capability token selection algorithms to implement lightweight protocols93
Acheron: a market-based multi-relay architecture for adaptive and secure cross-chain communication90
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era90
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks90
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization87
Anomaly-based Intrusion Detection System for smart lighting85
CONCERN: A model-based monitoring infrastructure81
SkinSense: Efficient vibration-based communications over human body using motion sensors80
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs80
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse80
Deep learning-based transceiver design for multi-user MIMO systems80
A formal approach to specify and verify Internet of Things architecture80
Outlier detection in non-stationary time series applied to sewer network monitoring78
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices78
Efficient unmanned aerial vehicle-based data collection for IoT smart farming77
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer75
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things74
Real-time scalable UAV condition monitoring framework with hardware-level acceleration for IoT applications72
Autonomous driving test system under hybrid reality: The role of digital twin technology71
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT70
STREAMLINE: Dynamic and Resource-Efficient Auto-Tuning of Stream Processing Data Pipeline Ensembles70
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats69
Integrated RTK-LoRaWAN for Energy-Efficient Precision IoT Positioning in Connectivity-Constrained Environments68
AVAESA: Adaptive VAE with self-attention and learnable signal processing for robust radar-based heart rate estimation68
Novel deep learning-based IoT network attack detection using magnet loss optimization67
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks67
Fast and low cost FPGA-based architecture for arrhythmia detection with CNN67
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology67
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT67
Formal verification and security analysis of FastDFS using process algebra67
A comprehensive soft security model for Cognitive Internet of Things66
In-vehicle edge system for real-time dashcam video analysis66
CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks66
Semantic-driven dimension reduction for wireless internet of things66
0.072675943374634