Internet of Things

Papers
(The TQCC of Internet of Things is 17. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
E-governance and the European Union: Agenda for implementation645
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario547
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection358
A semantic communication model for the task of high quality image transmission to edge-end devices266
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks216
IoT convergence with machine learning & blockchain: A review189
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning177
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices167
Securing IoT devices: A novel approach using blockchain and quantum cryptography162
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization156
IoT-based supply chain management: A systematic literature review154
DIDAuth-IoTFW: Decentralized firmware authentication for smart home IoT devices using verifiable credentials152
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors146
Key–value data collection with local differential privacy for urban air quality monitoring in crowdsensing144
A Variational Quantum Classifier for predictive analysis in industrial production142
MDP-based connectivity and availability models for Internet of Vehicles139
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain139
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C132
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing129
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization127
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling127
Multifactor QoE scores in IoT topologies123
End-To-end response-time analysis of DDS-based real-time applications119
Building structural analysis based Internet of Things network assisted earthquake detection118
Fault detection of industrial air separation stations based on metaheuristic optimization and bidirectional long short-term memory technique118
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices117
Federated learning for performance behavior detection in a fog-IoT system115
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things112
A comprehensive review of IoT device fingerprinting: Insights into techniques, trends, challenges, and future directions110
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers104
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications104
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory100
Big data and Internet of Things applications in smart cities: Recent advances, challenges, and critical issues99
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train96
MQTT Spectrum: A comprehensive and version-agnostic dataset for intrusion detection in MQTT-based IoMT deployments96
Microservices based architectures for IoT systems - State-of-the-art review94
Capability token selection algorithms to implement lightweight protocols93
Acheron: a market-based multi-relay architecture for adaptive and secure cross-chain communication90
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era90
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks90
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization87
Anomaly-based Intrusion Detection System for smart lighting85
CONCERN: A model-based monitoring infrastructure81
A formal approach to specify and verify Internet of Things architecture80
SkinSense: Efficient vibration-based communications over human body using motion sensors80
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs80
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse80
Deep learning-based transceiver design for multi-user MIMO systems80
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices78
Outlier detection in non-stationary time series applied to sewer network monitoring78
Efficient unmanned aerial vehicle-based data collection for IoT smart farming77
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer75
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things74
Real-time scalable UAV condition monitoring framework with hardware-level acceleration for IoT applications72
Autonomous driving test system under hybrid reality: The role of digital twin technology71
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT70
STREAMLINE: Dynamic and Resource-Efficient Auto-Tuning of Stream Processing Data Pipeline Ensembles70
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats69
Integrated RTK-LoRaWAN for Energy-Efficient Precision IoT Positioning in Connectivity-Constrained Environments68
AVAESA: Adaptive VAE with self-attention and learnable signal processing for robust radar-based heart rate estimation68
Novel deep learning-based IoT network attack detection using magnet loss optimization67
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks67
Fast and low cost FPGA-based architecture for arrhythmia detection with CNN67
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology67
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT67
Formal verification and security analysis of FastDFS using process algebra67
A comprehensive soft security model for Cognitive Internet of Things66
In-vehicle edge system for real-time dashcam video analysis66
CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks66
Semantic-driven dimension reduction for wireless internet of things66
FedCLLM: Federated client selection assisted large language model utilizing domain description65
Joint wireless resource allocation and bitrate adaptation for QoE improvement in IRS-aided RSMA-enabled IoMT streaming systems65
A review of digital object architecture and handle system: Development, current applications and prospective64
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids64
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions64
Deep Image: A precious image based deep learning method for online malware detection in IoT environment62
Improving quality of service for Internet of Things(IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm62
Security and privacy solutions in intelligent transportation systems: A survey61
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things59
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,30659
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles59
Farmland monitoring and livestock management based on internet of things58
Edge deduplication for LoRaWAN using network coding58
nCare: Fault-aware edge intelligence for rendering viable sensor nodes58
“Hey Alexa, what do you know about the COVID-19 vaccine?”— (Mis)perceptions of mass immunization and voice assistants56
Joint mode selection and resource allocation based on many-to-many reuse in D2D-aided IoT cellular networks55
Bluetooth low energy indoor positioning: A fingerprinting neural network approach55
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture55
CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs54
Image-based malware analysis for enhanced IoT security in smart cities54
Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks54
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs53
IoT-powered personalization: creating the optimal shopping experience in digital twin VFRs53
ACS: Accuracy-based client selection mechanism for federated industrial IoT52
Concept-drift-adaptive anomaly detector for marine sensor data streams52
Digital Twins in Additive Manufacturing: A systematic review51
Blockchain-enabled secure and efficient task allocation for IoT networks using enhanced fuzzy reptile search algorithm51
Greening smart learning environments with Artificial Intelligence of Things51
A GCN-LSTM framework for link prediction in dynamic SIoT networks50
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture50
MTAN: Multi-degree Tail-aware Attention Network for human motion prediction49
Low-power distance ranging for 2D-positioning using LoRa 2.4 GHz49
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey49
Real-time Mixed Reality (MR) and Artificial Intelligence (AI) object recognition integration for digital twin in Industry 4.049
Enabling edge-driven Dataspace integration through convergence of distributed technologies48
An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration48
Latency performance modelling in hyperledger fabric blockchain: Challenges and directions with an IoT perspective48
i-DSME: An industrial-DSME MAC protocol for smart factory automation47
Blockchain-based federated learning with homomorphic encryption for privacy-preserving healthcare data sharing47
Optimized K-means routing protocol with black-winged kite algorithm for sustainable 5G/6G sensor networks46
Commonsense reasoning and automatic generation of IoT contextual knowledge: An Answer Set Programming approach45
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring45
Planning and resource allocation of a hybrid IoT network using artificial intelligence45
AIoT for sustainable manufacturing: Overview, challenges, and opportunities44
Fast ML-based next-word prediction for hybrid languages44
SCENE: Serving cluster formation in cEll-free dyNamic environments44
DeepVitals: Deep neural and IoT based vitals monitoring in smart teleconsultation system43
Proactive blockchain deployment mechanism in resource-constrained rate-splitting multiple access IoT networks42
SHM-NDN: A seamless hybrid mobility management scheme for named data mobile ad hoc networks42
A novel real-time data driven method for floating vehicle speed trend prediction42
Implementation of multiple controllers for context-inspired collaboration between human and robot by integrating the uni-axial motion and real-time operating system41
A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data41
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments41
Design of an IoT ultrasonic-vision based system for automatic fruit sorting utilizing size and color41
Enhancing healthcare security: Manifold-aware machine learning for robust adversarial attack detection in IoMT networks41
An intelligent fuzzy-based system for handover decision in 5G-IoT networks considering network slicing and SDN technologies41
A multi-type artifact framework for cyber–physical, social systems design and development41
Intelligent digital twin for federated learning in AIoT networks41
System-wide IoT design and programming: Patterns for decentralised collective processes41
Zero-knowledge machine learning models for blockchain peer-to-peer energy trading40
Intent-based approaches for industry 4.0 applications: A systematic mapping study40
iRestroom : A smart restroom cyberinfrastructure for elderly people40
A deep learning model for natural language querying in Cyber–Physical Systems39
Programming IoT systems: A focused conceptual framework and survey of approaches39
MicroFlow: An Efficient Rust-Based Inference Engine for TinyML38
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure38
Translating and verifying Cyber–Physical systems with shared-variable concurrency in SpaceEx38
Enhancing security through continuous biometric authentication using wearable sensors38
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things38
Improved YOLO-v5 model for boosting face mask recognition accuracy on heterogeneous IoT computing platforms38
Over-the-air firmware update for IoT devices on the wild38
IoT-based system for individual dairy cow feeding behavior monitoring using cow face recognition and edge computing38
Deep Learning based Payload Optimization for Image Transmission over LoRa with HARQ37
Quantum cryptography as a solution for secure Wireless Sensor Networks: Roadmap, challenges and solutions37
Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment37
EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments37
Memory feedback transformer based intrusion detection system for IoMT healthcare networks37
AMI-Chain: A scalable power-metering blockchain with IPFS storage for smart cities37
High-performance IoT Module for real-time control and self-diagnose PV panels under working daylight and dark electroluminescence conditions37
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions36
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms36
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture36
An optimized CNN-based intrusion detection system for reducing risks in smart farming36
Joint uplink-downlink user-cell association for ultra-dense NOMA networks36
BTIA-IME: A blockchain-based trusted interactive architecture for intelligent manufacturing equipment35
Joint coded caching and BS sleeping strategy to reduce energy consumption in 6G edge networks35
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles35
AIoT-enabled defect detection with minimal data: A few-shot learning approach combining prototypical and relational networks for smart manufacturing35
Predicting container intermodal transport arrival times: An approach based on IoT data35
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection35
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission35
Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey35
Forecasting energy power consumption using federated learning in edge computing devices34
An improved aggregation-based signcryption for secure drone to ground station communication system34
Advanced security frameworks for UAV and IoT: A deep learning approach34
A robust IoT architecture for smart inverters in microgrids using hybrid deep learning and signal processing against adversarial attacks34
IoT-based expert system for fault detection in Japanese Plum leaf-turgor pressure WSN34
Exploring the applicability of haptic actuators in aquatic environments34
MIMA 2.0 - Compact and portable Multifunctional IoT integrated Menstrual Aid34
Digital twin-driven semantic offloading for LEO-MEC-enabled remote IoT networks34
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda33
Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme33
Performance analysis of entropy variation-based detection of DDoS attacks in IoT33
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system33
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things33
Robotic Arms for Telemedicine System Using Smart Sensors and Ultrasound Robots33
iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection32
Optimizing IoT architectures by using model driven approach and evolution strategy32
An efficient methodology to composite fault detection and classification in wireless biosensor networks32
Optimizing parameters of YOLO model through uniform experimental design for gripping tasks performed by an internet of things–based robotic arm32
Multi-residual tensor completion for spatiotemporal data imputation31
Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models31
Cooperative Swarm Learning for Distributed Cyclic Edge Intelligent Computing31
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things30
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones30
FedWKD: Federated learning weighted aggregation with knowledge distillation for IoT forecasting30
The AutoSPADA platform: User-friendly edge computing for distributed learning and data analytics in connected vehicles30
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT30
WMPA-ConvBERT-BM: A hybrid deep learning model optimized by whale-marine predator algorithm for IoT-enabled malicious URL detection30
A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber–Physical Systems30
A fine-grained framework for online IoT device firmware identification via version evolution analysis30
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators30
A feedback-driven brain organoid platform enables automated maintenance and high-resolution neural activity monitoring29
SDGreen: A Computational Framework for Advancing Sustainable Development Goals in Smart Universities using IoT29
An open testbed for O-RAN experimentation with AI-enabled control and monitoring29
CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems29
XBiDeep: A novel explainable artificial intelligence based intrusion detection system for Internet of Medical Things environment29
Business continuity of Cloud-based IoT applications through a seamless continuum29
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario29
Collaboration of AI, big data, and blockchain in Internet of Things (IoT): Emerging trends and perspectives28
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention28
Location-based activity behavior deviation detection for nursing home using IoT devices28
A network communication speedup model using multiple fungible and non-fungible paths28
The Three-Phase Methodology for IoT Project Development28
Distributed inference in IoT-based aerial network of UAVs28
Dynamic cooperation and mutual feedback network for shield machine28
Fog Node Self-Control Middleware: Enhancing context awareness towards autonomous decision making in Fog Colonies27
A comparison of code quality metrics and best practices in non-IoT and IoT systems27
QoS maximization scheduling of multiple UAV base stations in 3D environment27
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges27
Reassessing caching performance in information-centric IoT27
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things27
Minimizing energy consumption in 802.15.4 IoT devices with multilevel xRPL (MxRPL)27
FTL-TSLP: A federated transfer learning approach with a two-stage LSTM pipeline for fault-tolerant and privacy-preserving intrusion detection in IoMT networks26
Application of navigation grid corner point algorithm in virtual reality simulation images of indoor fire evacuation26
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network26
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city26
FedCDC: Communication-efficient clustered federated learning for heterogeneous IoT edge networks26
A new road state information platform based on crowed sensing on challenged network environments26
A Decentralized Trust Establishment Protocol for Smart IoT Systems26
On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems26
Time-efficient UAV-enabled communications for sensors at unknown locations via reinforcement learning26
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges26
The robust scheme for intrusion detection system in Internet of Things26
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions26
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum26
Physics-informed Bayesian angle-of-arrival estimation for commercial off-the-shelf RFID with sub-degree accuracy26
A survey on security in internet of things with a focus on the impact of emerging technologies25
IoT-based monitoring and control for optimized plant growth in smart greenhouses using soil and hydroponic systems25
The computing continuum: From IoT to the cloud25
Reliable PID dual-rate controller based on LoRaWAN for long-range distributed systems25
Intent-based IoT–Fog HDAF protocol for reliable communication in large-scale industrial iot deployments25
Exploring machine learning methods for the identification of production cycles and anomaly detection25
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques25
Automatic software tailoring for Green Internet of Things25
An approach to assess robustness of MQTT-based IoT systems25
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures25
Improve quality of service for the Internet of Things using Blockchain & machine learning algorithms25
A survey on security and cryptographic perspective of Industrial-Internet-of-Things25
Communication and computation efficiency in Federated Learning: A survey25
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF25
HAR: A stacked ensemble learning approach based on smartphone sensors for activity detection24
A framework for creating an IoT system specification with ChatGPT24
A fault tolerance aware green IoT workflow scheduling algorithm for multi-dimensional resource utilization in sustainable cloud computing24
Blockchain-enabled road vehicle emissions monitoring: A secure, scalable and private framework24
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture24
Algorithm for child adoption process using artificial intelligence and monitoring system for children24
Matter and ECHONET Lite: Similarities, differences, and a bridge solution for interoperability24
Farmer-centric design thinking principles for smart farming technologies24
IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model24
0.13163304328918