Internet of Things

Papers
(The median citation count of Internet of Things is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
A semantic communication model for the task of high quality image transmission to edge-end devices576
E-governance and the European Union: Agenda for implementation491
A comprehensive review of IoT device fingerprinting: Insights into techniques, trends, challenges, and future directions298
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization235
A real-time tennis level evaluation and strokes classification system based on the Internet of Things197
DIDAuth-IoTFW: Decentralized firmware authentication for smart home IoT devices using verifiable credentials173
IoT convergence with machine learning & blockchain: A review156
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications142
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain141
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things135
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling126
A Variational Quantum Classifier for predictive analysis in industrial production119
Key–value data collection with local differential privacy for urban air quality monitoring in crowdsensing117
MDP-based connectivity and availability models for Internet of Vehicles114
Building structural analysis based Internet of Things network assisted earthquake detection112
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning111
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario109
Federated learning for performance behavior detection in a fog-IoT system106
TUI Model for data privacy assessment in IoT networks105
Multifactor QoE scores in IoT topologies101
Dfinder—An efficient differencing algorithm for incremental programming of constrained IoT devices100
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices99
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection97
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors94
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing93
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C93
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks90
Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT89
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices85
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization84
IoT-based supply chain management: A systematic literature review83
Securing IoT devices: A novel approach using blockchain and quantum cryptography83
Novel deep learning-based IoT network attack detection using magnet loss optimization81
Capability token selection algorithms to implement lightweight protocols80
Fast and low cost FPGA-based architecture for arrhythmia detection with CNN80
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train79
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats77
STREAMLINE: Dynamic and Resource-Efficient Auto-Tuning of Stream Processing Data Pipeline Ensembles75
Deep learning-based transceiver design for multi-user MIMO systems73
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory72
CONCERN: A model-based monitoring infrastructure72
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices72
Outlier detection in non-stationary time series applied to sewer network monitoring71
A formal approach to specify and verify Internet of Things architecture71
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things70
Anomaly-based Intrusion Detection System for smart lighting70
SkinSense: Efficient vibration-based communications over human body using motion sensors70
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers68
Big data and Internet of Things applications in smart cities: Recent advances, challenges, and critical issues67
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks66
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks65
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer64
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs64
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era64
Autonomous driving test system under hybrid reality: The role of digital twin technology64
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology62
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse62
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT61
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT60
Microservices based architectures for IoT systems - State-of-the-art review59
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization59
ISEE: A heterogeneous information system for event explainability in smart connected environments58
Efficient unmanned aerial vehicle-based data collection for IoT smart farming58
Formal verification and security analysis of FastDFS using process algebra58
CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs58
Semantic-driven dimension reduction for wireless internet of things57
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs56
Blockchain-enabled secure and efficient task allocation for IoT networks using enhanced fuzzy reptile search algorithm55
In-vehicle edge system for real-time dashcam video analysis54
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,30653
Image-based malware analysis for enhanced IoT security in smart cities53
Greening smart learning environments with Artificial Intelligence of Things51
A review of digital object architecture and handle system: Development, current applications and prospective51
Bluetooth low energy indoor positioning: A fingerprinting neural network approach51
Enabling edge-driven Dataspace integration through convergence of distributed technologies51
A comprehensive soft security model for Cognitive Internet of Things51
Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks51
Digital Twins in Additive Manufacturing: A systematic review50
IoT-powered personalization: creating the optimal shopping experience in digital twin VFRs50
Edge deduplication for LoRaWAN using network coding50
Farmland monitoring and livestock management based on internet of things49
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture49
nCare: Fault-aware edge intelligence for rendering viable sensor nodes49
MTAN: Multi-degree Tail-aware Attention Network for human motion prediction48
Joint wireless resource allocation and bitrate adaptation for QoE improvement in IRS-aided RSMA-enabled IoMT streaming systems47
Concept-drift-adaptive anomaly detector for marine sensor data streams47
Blockchain-based federated learning with homomorphic encryption for privacy-preserving healthcare data sharing46
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids45
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles45
“Hey Alexa, what do you know about the COVID-19 vaccine?”— (Mis)perceptions of mass immunization and voice assistants44
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things44
A GCN-LSTM framework for link prediction in dynamic SIoT networks43
CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks43
ACS: Accuracy-based client selection mechanism for federated industrial IoT43
An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration42
Improving quality of service for Internet of Things(IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm41
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey41
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions41
FedCLLM: Federated client selection assisted large language model utilizing domain description41
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture40
Latency performance modelling in hyperledger fabric blockchain: Challenges and directions with an IoT perspective40
Deep Image: A precious image based deep learning method for online malware detection in IoT environment40
Real-time Mixed Reality (MR) and Artificial Intelligence (AI) object recognition integration for digital twin in Industry 4.039
Joint mode selection and resource allocation based on many-to-many reuse in D2D-aided IoT cellular networks39
Joint uplink-downlink user-cell association for ultra-dense NOMA networks38
A multi-type artifact framework for cyber–physical, social systems design and development38
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture38
High-performance IoT Module for real-time control and self-diagnose PV panels under working daylight and dark electroluminescence conditions38
Planning and resource allocation of a hybrid IoT network using artificial intelligence37
Quantum cryptography as a solution for secure Wireless Sensor Networks: Roadmap, challenges and solutions37
Commonsense reasoning and automatic generation of IoT contextual knowledge: An Answer Set Programming approach37
Fast ML-based next-word prediction for hybrid languages37
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things37
Intent-based approaches for industry 4.0 applications: A systematic mapping study36
System-wide IoT design and programming: Patterns for decentralised collective processes36
Enhancing security through continuous biometric authentication using wearable sensors36
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments36
i-DSME: An industrial-DSME MAC protocol for smart factory automation35
Over-the-air firmware update for IoT devices on the wild35
Improved YOLO-v5 model for boosting face mask recognition accuracy on heterogeneous IoT computing platforms35
Proactive blockchain deployment mechanism in resource-constrained rate-splitting multiple access IoT networks35
Translating and verifying Cyber–Physical systems with shared-variable concurrency in SpaceEx35
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure35
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms34
A novel real-time data driven method for floating vehicle speed trend prediction34
Programming IoT systems: A focused conceptual framework and survey of approaches34
DeepVitals: Deep neural and IoT based vitals monitoring in smart teleconsultation system33
Memory feedback transformer based intrusion detection system for IoMT healthcare networks33
SHM-NDN: A seamless hybrid mobility management scheme for named data mobile ad hoc networks33
A deep learning model for natural language querying in Cyber–Physical Systems33
Optimized K-means routing protocol with black-winged kite algorithm for sustainable 5G/6G sensor networks33
Implementation of multiple controllers for context-inspired collaboration between human and robot by integrating the uni-axial motion and real-time operating system32
Deep Learning based Payload Optimization for Image Transmission over LoRa with HARQ31
An intelligent fuzzy-based system for handover decision in 5G-IoT networks considering network slicing and SDN technologies31
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring31
A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data31
MicroFlow: An Efficient Rust-Based Inference Engine for TinyML31
IoT-based system for individual dairy cow feeding behavior monitoring using cow face recognition and edge computing31
Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment31
EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments30
Zero-knowledge machine learning models for blockchain peer-to-peer energy trading30
Intelligent digital twin for federated learning in AIoT networks30
An optimized CNN-based intrusion detection system for reducing risks in smart farming30
AMI-Chain: A scalable power-metering blockchain with IPFS storage for smart cities30
Federated learning with hyperparameter-based clustering for electrical load forecasting30
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions30
Design of an IoT ultrasonic-vision based system for automatic fruit sorting utilizing size and color30
AIoT for sustainable manufacturing: Overview, challenges, and opportunities30
Optimizing parameters of YOLO model through uniform experimental design for gripping tasks performed by an internet of things–based robotic arm29
The Three-Phase Methodology for IoT Project Development29
iRestroom : A smart restroom cyberinfrastructure for elderly people29
AIoT-enabled defect detection with minimal data: A few-shot learning approach combining prototypical and relational networks for smart manufacturing29
Robotic Arms for Telemedicine System Using Smart Sensors and Ultrasound Robots28
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT28
Exploring the applicability of haptic actuators in aquatic environments28
Predicting container intermodal transport arrival times: An approach based on IoT data28
Joint coded caching and BS sleeping strategy to reduce energy consumption in 6G edge networks28
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones28
A robust IoT architecture for smart inverters in microgrids using hybrid deep learning and signal processing against adversarial attacks27
BTIA-IME: A blockchain-based trusted interactive architecture for intelligent manufacturing equipment27
Optimizing IoT architectures by using model driven approach and evolution strategy27
A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber–Physical Systems27
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission27
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators26
MIMA 2.0 - Compact and portable Multifunctional IoT integrated Menstrual Aid26
Forecasting energy power consumption using federated learning in edge computing devices26
Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models26
Cooperative Swarm Learning for Distributed Cyclic Edge Intelligent Computing26
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection26
iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection25
An open testbed for O-RAN experimentation with AI-enabled control and monitoring25
Advanced security frameworks for UAV and IoT: A deep learning approach25
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario25
IoT-based expert system for fault detection in Japanese Plum leaf-turgor pressure WSN25
WMPA-ConvBERT-BM: A hybrid deep learning model optimized by whale-marine predator algorithm for IoT-enabled malicious URL detection25
Business continuity of Cloud-based IoT applications through a seamless continuum25
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system25
The AutoSPADA platform: User-friendly edge computing for distributed learning and data analytics in connected vehicles25
A fine-grained framework for online IoT device firmware identification via version evolution analysis25
XBiDeep: A novel explainable artificial intelligence based intrusion detection system for Internet of Medical Things environment25
Multi-residual tensor completion for spatiotemporal data imputation24
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention24
Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey24
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things24
A feedback-driven brain organoid platform enables automated maintenance and high-resolution neural activity monitoring24
Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme24
An efficient methodology to composite fault detection and classification in wireless biosensor networks24
CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems24
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things24
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda23
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles23
TinyML Meets IoT: A Comprehensive Survey23
Performance analysis of entropy variation-based detection of DDoS attacks in IoT23
Dynamic cooperation and mutual feedback network for shield machine22
Collaboration of AI, big data, and blockchain in Internet of Things (IoT): Emerging trends and perspectives22
A network communication speedup model using multiple fungible and non-fungible paths22
Minimizing energy consumption in 802.15.4 IoT devices with multilevel xRPL (MxRPL)22
On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems22
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network22
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum22
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges22
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things22
A generic flexible and scalable framework for hierarchical parallelization of population-based metaheuristics22
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures22
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF21
Application of navigation grid corner point algorithm in virtual reality simulation images of indoor fire evacuation21
QoS maximization scheduling of multiple UAV base stations in 3D environment21
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges21
A new road state information platform based on crowed sensing on challenged network environments21
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions21
Fog Node Self-Control Middleware: Enhancing context awareness towards autonomous decision making in Fog Colonies21
Reassessing caching performance in information-centric IoT21
The robust scheme for intrusion detection system in Internet of Things21
A Decentralized Trust Establishment Protocol for Smart IoT Systems21
IoT-based monitoring and control for optimized plant growth in smart greenhouses using soil and hydroponic systems21
Location-based activity behavior deviation detection for nursing home using IoT devices21
The computing continuum: From IoT to the cloud21
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city20
A survey on security in internet of things with a focus on the impact of emerging technologies20
Exploring machine learning methods for the identification of production cycles and anomaly detection20
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture20
Hybrid FFBAT optimized multi-hop routing in Internet of Nano-Things20
Distributed inference in IoT-based aerial network of UAVs20
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques20
Improve quality of service for the Internet of Things using Blockchain & machine learning algorithms20
Automatic software tailoring for Green Internet of Things20
Matter and ECHONET Lite: Similarities, differences, and a bridge solution for interoperability20
A deep learning framework for target localization in error-prone environment20
A survey on security and cryptographic perspective of Industrial-Internet-of-Things20
A comparison of code quality metrics and best practices in non-IoT and IoT systems20
Communication and computation efficiency in Federated Learning: A survey20
Adaptive multi-view subspace learning based on distributed optimization20
Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions20
Vortex Feature Positioning: Bridging tabular IIoT data and image-based deep learning19
Resource allocation for dataflow applications in FANETs using anypath routing19
Current testing and performance evaluation methodologies of LoRa and LoRaWAN in IoT applications: Classification, issues, and future directives19
A novel fragment duplication attacker identification scheme using Discrete Event System based intrusion detection19
An approach to assess robustness of MQTT-based IoT systems19
Characterizing time-critical internet of things19
Dynamic transmission adaptation algorithms for battery-free LoRaWAN networks19
A framework for creating an IoT system specification with ChatGPT19
Reliable PID dual-rate controller based on LoRaWAN for long-range distributed systems19
PARSECS_RT: A real-time PARSECS-based communication protocol stack for critical sensing applications19
IoT-driven augmented reality and virtual reality systems in neurological sciences19
SAFE: An ICT platform for supporting monitoring, localization and rescue operations in case of earthquake18
Combinative model compression approach for enhancing 1D CNN efficiency for EIT-based Hand Gesture Recognition on IoT edge devices18
IoT contributions to the safety of construction sites: A comprehensive review of recent advances, limitations, and suggestions for future directions18
Lightweight face recognition-based portable attendance system with liveness detection18
The internet of modular robotic things: Issues, limitations, challenges, & solutions18
OpenAPI framework for the Web of Things18
0.32845091819763