Internet of Things

Papers
(The median citation count of Internet of Things is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Internet of Things (IoT) and Agricultural Unmanned Aerial Vehicles (UAVs) in smart farming: A comprehensive review419
AI for next generation computing: Emerging trends and future directions294
A survey on internet of things security: Requirements, challenges, and solutions190
Internet of Things research in supply chain management and logistics: A bibliometric analysis173
Performance evaluation metrics for cloud, fog and edge computing: A review, taxonomy, benchmarks and standards for future research149
Machine learning approaches to IoT security: A systematic literature review149
The Internet of Things (IoT) in healthcare: Taking stock and moving forward140
TinyML Meets IoT: A Comprehensive Survey133
Security aspects of Internet of Things aided smart grids: A bibliometric survey110
IoT anomaly detection methods and applications: A survey104
IoT based real time energy monitoring system using Raspberry Pi88
The big picture on the internet of things and the smart city: a review of what we know and what we need to know84
Identification and Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based Blockchain Model82
AI-based fog and edge computing: A systematic review, taxonomy and future directions81
Secure IoT communications for smart healthcare monitoring system79
Humanitarian Drones: A Review and Research Agenda78
Future Smart Connected Communities to Fight COVID-19 Outbreak76
The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws73
A survey on the architecture, application, and security of software defined networking: Challenges and open issues72
CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks71
Cryptographic technologies and protocol standards for Internet of Things69
LoRaWAN security survey: Issues, threats and possible mitigation techniques69
Integrating the Internet of Things in the halal food supply chain: A systematic literature review and research agenda68
Smart City Data Science: Towards data-driven smart cities with open research issues68
Metaverse applications in smart cities: Enabling technologies, opportunities, challenges, and future directions67
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT65
Intrusion detection based on Machine Learning techniques in computer networks64
A survey on machine learning in Internet of Things: Algorithms, strategies, and applications64
A Survey of Indoor Location Technologies, Techniques and Applications in Industry63
A survey of IoT protocols and their security issues through the lens of a generic IoT stack63
A survey on security in internet of things with a focus on the impact of emerging technologies58
Internet of things-based fog and cloud computing technology for smart traffic monitoring57
Harnessing the power of Internet of Things based connectivity to improve healthcare57
Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things56
A Systematic Review of Organizational Factors Impacting Cloud-based Technology Adoption Using Technology-Organization-Environment Framework53
A conceptual IoT-based early-warning architecture for remote monitoring of COVID-19 patients in wards and at home53
Federated learning with hyperparameter-based clustering for electrical load forecasting52
Internet of Things (IoT) security dataset evolution: Challenges and future directions51
Genetic Algorithm based Internet of Precision Agricultural Things (IopaT) for Agriculture 4.050
Deep learning-enabled anomaly detection for IoT systems48
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring48
HealthCloud: A system for monitoring health status of heart patients using machine learning and cloud computing48
A lightweight blockchain and fog-enabled secure remote patient monitoring system48
Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods46
HunterPlus: AI based energy-efficient task scheduling for cloud–fog computing environments46
An IoT-enabled intelligent automobile system for smart cities46
Ensemble Detection Model for IoT IDS43
FANETs in Agriculture - A routing protocol survey43
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda43
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT42
Deep learning assisted COVID-19 detection using full CT-scans42
An optimized CNN-based intrusion detection system for reducing risks in smart farming42
A comprehensive review on Internet of Things application placement in Fog computing environment41
A review on the edge caching mechanisms in the mobile edge computing: A social-aware perspective41
Inception convolutional vision transformers for plant disease identification40
An IoT Raspberry Pi-based parking management system for smart campus40
A deep learning approach for intrusion detection in Internet of Things using focal loss function39
Multi-label classification based ensemble learning for human activity recognition in smart home39
Advanced contribution of IoT in agricultural production for the development of smart livestock environments39
Smart mask – Wearable IoT solution for improved protection and personal health39
A trust management system for fog computing services38
The architectural design of smart blind assistant using IoT with deep learning paradigm38
The applications of Internet of Things in the automotive industry: A review of the batteries, fuel cells, and engines37
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions36
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges36
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city36
Smart energy optimization for massive IoT using artificial intelligence35
Intelligent authentication of 5G healthcare devices: A survey34
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection34
Trajectory pattern extraction and anomaly detection for maritime vessels34
Development of an Internet of Things solution to monitor and analyse indoor air quality33
A systematic review on semantic interoperability in the IoE-enabled smart cities33
FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge–Fog–Cloud computing environments32
An overview of IoT architectures, technologies, and existing open-source projects32
Support vector machine and YOLO for a mobile food grading system32
Discovering location based services: A unified approach for heterogeneous indoor localization systems31
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture31
SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection31
Predicting parking occupancy via machine learning in the web of things31
Blockchain-assisted internet of things framework in smart livestock farming31
A review of IoT systems to enable independence for the elderly and disabled individuals30
Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations30
An IoT General-Purpose Sensor Board for Enabling Remote Aquatic Environmental Monitoring30
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures30
Data management and internet of things : A methodological review in smart farming30
Enhancing IoT network security through deep learning-powered Intrusion Detection System30
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators30
An IoT-based interoperable architecture for wireless biomonitoring of patients with sensor patches29
PPFchain: A novel framework privacy-preserving blockchain-based federated learning method for sensor networks29
EEG signal analysis for epileptic seizures detection by applying Data Mining techniques28
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions28
Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of Things28
Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions28
Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions28
Security issues in Internet of Vehicles (IoV): A comprehensive survey27
Designing and constructing internet-of-Things systems: An overview of the ecosystem27
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm27
A service oriented IoT architecture for disaster preparedness and forecasting system27
A machine-learning ensemble model for predicting energy consumption in smart homes26
What are IoT systems for real? An experts’ survey on software engineering aspects26
Secure and lightweight communication in heterogeneous IoT environments26
IoFT-FIS: Internet of farm things based prediction for crop pest infestation using optimized fuzzy inference system26
Publish–Subscribe approaches for the IoT and the cloud: Functional and performance evaluation of open-source systems25
A novel medical image fusion method based on Rolling Guidance Filtering25
Cryptography Algorithms for Enhancing IoT Security25
A solution for water management and leakage detection problems using IoTs based approach25
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things25
ACS: Accuracy-based client selection mechanism for federated industrial IoT25
XG-BoT: An explainable deep graph neural network for botnet detection and forensics25
Resource discovery techniques in the internet of things: A review24
Energy consumption of on-device machine learning models for IoT intrusion detection24
Monitoring of water quality in a shrimp farm using a FANET24
Secure communication in IOT-based UAV networks: A systematic survey24
Factors influencing adoption model of continuous glucose monitoring devices for internet of things healthcare24
A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs24
Communication and computation efficiency in Federated Learning: A survey24
Artificial intelligence based load balancing in SDN: A comprehensive survey24
Efficient job scheduling paradigm based on hybrid sparrow search algorithm and differential evolution optimization for heterogeneous cloud computing platforms23
How is extended reality bridging human and cyber-physical systems in the IoT-empowered logistics and supply chain management?23
Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview23
A randomised control trial for measuring student engagement through the Internet of Things and serious games23
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things23
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model22
A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT22
Energy efficient mechanism for LoRa networks22
Data Aggregation Mechanisms on the Internet of Things: A Systematic Literature Review22
Data analysis and mining of the correlations between meteorological conditions and air quality: A case study in Beijing21
A survey study on trust-based security in Internet of Things: Challenges and issues21
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices21
A Tabu list strategy based DQN for AAV mobility in indoor single-path environment: Implementation and performance evaluation21
Smart vehicular traffic management: An edge cloud centric IoT based framework21
Data reduction in fog computing and internet of things: A systematic literature survey20
IoT cloud laboratory: Internet of Things architecture for cellular biology20
A survey on blockchain, SDN and NFV for the smart-home security20
Research on lightweight Yolo coal gangue detection algorithm based on resnet18 backbone feature network20
Securing massive IoT in 6G: Recent solutions, architectures, future directions20
Multi-hop communication protocol for LoRa with software-defined networking extension19
Energy-efficient distributed federated learning offloading and scheduling healthcare system in blockchain based networks19
AIoT for sustainable manufacturing: Overview, challenges, and opportunities19
Generating an environmental awareness system for learning using IoT technology19
A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks19
Conceptualization and scalable execution of big data workflows using domain-specific languages and software containers18
A novel solution for counterfeit prevention in the wine industry based on IoT, smart tags, and crowd-sourced information18
Detection of malicious javascript on an imbalanced dataset18
A feasibility study of multi-mode intelligent fusion medical data transmission technology of industrial Internet of Things combined with medical Internet of Things18
Towards energy-aware tinyML on battery-less IoT devices18
Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation18
Location prediction using GPS trackers: Can machine learning help locate the missing people with dementia?17
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions17
What Do Practitioners Discuss about IoT and Industry 4.0 Related Technologies? Characterization and Identification of IoT and Industry 4.0 Categories in Stack Overflow Discussions17
Static detection of malicious PowerShell based on word embeddings17
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things17
Joint slice-based spreading factor and transmission power optimization in LoRa smart city networks17
LAMD: Location-based Alert Message Dissemination scheme for emerging infrastructure-based vehicular networks17
IoT technologies for Augmented Human: A survey17
Requirements for distributed task placement in the fog17
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF16
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles16
AnoML-IoT: An end to end re-configurable multi-protocol anomaly detection pipeline for Internet of Things16
Evaluation of corporate requirements for smart manufacturing systems using predictive analytics16
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives16
OPIIoT: Design and Implementation of an Open Communication Protocol Platform for Industrial Internet of Things16
Energy efficient resource optimization in cooperative Internet of Things networks16
Skyward bound: Empowering disaster resilience with multi-UAV-assisted B5G networks for enhanced connectivity and energy efficiency16
IoT-based freezing of gait detection using grey relational analysis15
Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network15
IoT-based prediction models in the environmental context: A systematic Literature Review15
Quality attributes in edge computing for the Internet of Things: A systematic mapping study15
A general architecture for a real-time monitoring system based on the internet of things15
Energy-efficient modified DCC-MAC protocol for IoT in e-health applications15
An OCF-IoTivity enabled smart-home optimal indoor environment control system for energy and comfort optimization15
iCovidCare: Intelligent health monitoring framework for COVID-19 using ensemble random forest in edge networks15
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions14
Faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things14
Driver drowsiness detection and smart alerting using deep learning and IoT14
Blockchain-assisted authenticated key agreement scheme for IoT-based healthcare system14
A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks14
A jamming attack detection technique for opportunistic networks14
A survey on device fingerprinting approach for resource-constraint IoT devices: Comparative study and research challenges14
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey14
Internet of Things-enabled Passive Contact Tracing in Smart Cities14
A deep learning framework for target localization in error-prone environment14
A new concatenated Multigraph Neural Network for IoT intrusion detection14
Data compression techniques in IoT-enabled wireless body sensor networks: A systematic literature review and research trends for QoS improvement14
Intelligent wearable heart rate sensor implementation for in-vehicle infotainment and assistance13
Non-functional requirements elicitation for edge computing13
Design and architecture of smart belt for real time posture monitoring13
Pareto optimal design space exploration of cyber-physical systems13
A modified lightweight authenticated key agreement protocol for Internet of Drones13
Evaluating the performance of the OSCORE security protocol in constrained IoT environments13
Lossy Data Compression for IoT Sensors: A Review13
Multifactor authentication scheme using physically unclonable functions13
Digital twins for aircraft maintenance and operation: A systematic literature review and an IoT-enabled modular architecture13
Machine learning enabled tools and methods for indoor localization using low power wireless network13
Securing IoT devices: A novel approach using blockchain and quantum cryptography13
Low cost cloud based remote microscopy for biological sciences13
TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks13
A predictive target tracking framework for IoT using CNN–LSTM13
Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures13
Towards a cognitive assistant supporting human operators in the Artificial Intelligence of Things13
IoT-based supply chain management: A systematic literature review13
Knowledge graph and deep learning based pest detection and identification system for fruit quality13
FedMicro-IDA: A federated learning and microservices-based framework for IoT data analytics12
IoT Zigbee device security: A comprehensive review12
Energy-efficient cooperative resource allocation and task scheduling for Internet of Things environments12
An interval multi-criteria decision-making model for evaluating blockchain-IoT technology in supply chain networks12
IoT-enabled technologies for controlling COVID-19 Spread: A scientometric analysis using CiteSpace12
Sensors as the Basis for Digitalization: New Approaches in Instrumentation, IoT-concepts, and 5G12
Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls12
Processor power and energy consumption estimation techniques in IoT applications: A review12
FEACS: A fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems12
A Communication Scheme based on Fractional Order Chaotic Laser for Internet of Things12
Dependent task offloading with deadline-aware scheduling in mobile edge networks12
Spatiotemporal modeling to predict soil moisture for sustainable smart irrigation12
Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks12
Reinforcement learning framework for UAV-based target localization applications12
OpenAPI framework for the Web of Things12
Unlocking the power of mist computing through clustering techniques in IoT networks12
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems12
Integrating blockchain into supply chain safeguarded by PUF-enabled RFID12
Context-driven detection of distracted driving using images from in-car cameras12
TGSM: Towards trustworthy group-based service management for social IoT12
CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs12
An evaluation methodology to determine the actual limitations of a TinyML-based solution11
Development of edge computing and classification using The Internet of Things with incremental learning for object detection11
Communication-efficient semi-synchronous hierarchical federated learning with balanced training in heterogeneous IoT edge environments11
Secure and scalable access control protocol for IoT environment11
Robust and lightweight symmetric key exchange algorithm for next-generation IoE11
A deep learning-based cow behavior recognition scheme for improving cattle behavior modeling in smart farming11
Multi-chain blockchain based secure data-sharing framework for industrial IoTs smart devices in petroleum industry11
Development and evaluation of Artificial Intelligence techniques for IoT data quality assessment and curation11
Metaverse for wireless systems: Architecture, advances, standardization, and open challenges11
OKIoT: Trade off analysis of smart speaker architecture on open knowledge IoT project11
An unsupervised TinyML approach applied to the detection of urban noise anomalies under the smart cities environment11
FogAI: An AI-supported fog controller for Next Generation IoT11
ModularFed: Leveraging modularity in federated learning frameworks11
AgroLens: A low-cost and green-friendly Smart Farm Architecture to support real-time leaf disease diagnostics11
The design of secure IoT applications using patterns: State of the art and directions for research11
A flexible and efficient FPGA-based random forest architecture for IoT applications11
Analysis of the constrained application protocol over quick UDP internet connection transport11
I-MEREC-T: Improved MEREC-TOPSIS scheme for optimal network selection in 5G heterogeneous network for IoT11
Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK10
Crowdsourced last mile delivery: Collaborative workforce assignment10
Empowering homes with intelligence: An investigation of smart home technology adoption and usage10
Throughput optimization in backscatter-assisted wireless-powered underground sensor networks for smart agriculture10
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things10
When edge intelligence meets cognitive buildings: The COGITO platform10
CONFRONT: Cloud-fog-dew based monitoring framework for COVID-19 management10
Implementation and Calibration of an IoT Light Attenuation Turbidity Sensor10
Locally reconfigurable Self Organizing Feature Map for high impact malicious tasks submission in Mobile Crowdsensing10
0.22970390319824