Internet of Things

Papers
(The TQCC of Internet of Things is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
A semantic communication model for the task of high quality image transmission to edge-end devices588
E-governance and the European Union: Agenda for implementation497
A comprehensive review of IoT device fingerprinting: Insights into techniques, trends, challenges, and future directions308
DIDAuth-IoTFW: Decentralized firmware authentication for smart home IoT devices using verifiable credentials241
Federated learning for performance behavior detection in a fog-IoT system206
MDP-based connectivity and availability models for Internet of Vehicles177
A Variational Quantum Classifier for predictive analysis in industrial production162
Key–value data collection with local differential privacy for urban air quality monitoring in crowdsensing155
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization147
IoT convergence with machine learning & blockchain: A review138
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection130
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario126
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices122
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications118
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing117
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning114
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling113
Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT109
A real-time tennis level evaluation and strokes classification system based on the Internet of Things109
Dfinder—An efficient differencing algorithm for incremental programming of constrained IoT devices108
TUI Model for data privacy assessment in IoT networks108
Multifactor QoE scores in IoT topologies106
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain100
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things99
Detecting vulnerabilities in IoT firmware via keyword identification and path optimization95
Building structural analysis based Internet of Things network assisted earthquake detection94
Securing IoT devices: A novel approach using blockchain and quantum cryptography93
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C93
IoT-based supply chain management: A systematic literature review90
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices89
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors86
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks86
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats83
Novel deep learning-based IoT network attack detection using magnet loss optimization83
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory81
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse81
CONCERN: A model-based monitoring infrastructure80
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks80
SkinSense: Efficient vibration-based communications over human body using motion sensors79
Anomaly-based Intrusion Detection System for smart lighting78
Big data and Internet of Things applications in smart cities: Recent advances, challenges, and critical issues76
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs75
Deep learning-based transceiver design for multi-user MIMO systems73
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era73
Outlier detection in non-stationary time series applied to sewer network monitoring73
Capability token selection algorithms to implement lightweight protocols73
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices73
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things71
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers71
A formal approach to specify and verify Internet of Things architecture70
Microservices based architectures for IoT systems - State-of-the-art review69
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer69
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology67
Efficient unmanned aerial vehicle-based data collection for IoT smart farming66
Autonomous driving test system under hybrid reality: The role of digital twin technology65
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT64
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization63
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train63
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT63
STREAMLINE: Dynamic and Resource-Efficient Auto-Tuning of Stream Processing Data Pipeline Ensembles62
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks62
Fast and low cost FPGA-based architecture for arrhythmia detection with CNN61
Formal verification and security analysis of FastDFS using process algebra60
CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs60
Semantic-driven dimension reduction for wireless internet of things59
Joint mode selection and resource allocation based on many-to-many reuse in D2D-aided IoT cellular networks58
“Hey Alexa, what do you know about the COVID-19 vaccine?”— (Mis)perceptions of mass immunization and voice assistants58
In-vehicle edge system for real-time dashcam video analysis58
ISEE: A heterogeneous information system for event explainability in smart connected environments58
ACS: Accuracy-based client selection mechanism for federated industrial IoT56
nCare: Fault-aware edge intelligence for rendering viable sensor nodes56
Edge deduplication for LoRaWAN using network coding54
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,30653
A comprehensive soft security model for Cognitive Internet of Things53
MTAN: Multi-degree Tail-aware Attention Network for human motion prediction53
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things52
A GCN-LSTM framework for link prediction in dynamic SIoT networks52
CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks51
FedCLLM: Federated client selection assisted large language model utilizing domain description51
Security and privacy solutions in intelligent transportation systems: A survey51
Joint wireless resource allocation and bitrate adaptation for QoE improvement in IRS-aided RSMA-enabled IoMT streaming systems51
Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks51
Concept-drift-adaptive anomaly detector for marine sensor data streams51
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs50
A review of digital object architecture and handle system: Development, current applications and prospective50
Image-based malware analysis for enhanced IoT security in smart cities50
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey47
Enabling edge-driven Dataspace integration through convergence of distributed technologies47
Farmland monitoring and livestock management based on internet of things47
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions47
IoT-powered personalization: creating the optimal shopping experience in digital twin VFRs47
Blockchain-based federated learning with homomorphic encryption for privacy-preserving healthcare data sharing46
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture46
Greening smart learning environments with Artificial Intelligence of Things45
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids45
Latency performance modelling in hyperledger fabric blockchain: Challenges and directions with an IoT perspective45
An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration44
Blockchain-enabled secure and efficient task allocation for IoT networks using enhanced fuzzy reptile search algorithm43
Bluetooth low energy indoor positioning: A fingerprinting neural network approach43
Deep Image: A precious image based deep learning method for online malware detection in IoT environment43
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles42
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture42
Joint uplink-downlink user-cell association for ultra-dense NOMA networks41
Improving quality of service for Internet of Things(IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm41
A novel real-time data driven method for floating vehicle speed trend prediction41
Real-time Mixed Reality (MR) and Artificial Intelligence (AI) object recognition integration for digital twin in Industry 4.041
Proactive blockchain deployment mechanism in resource-constrained rate-splitting multiple access IoT networks41
Digital Twins in Additive Manufacturing: A systematic review41
DeepVitals: Deep neural and IoT based vitals monitoring in smart teleconsultation system40
Intent-based approaches for industry 4.0 applications: A systematic mapping study39
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring39
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments38
System-wide IoT design and programming: Patterns for decentralised collective processes38
A multi-type artifact framework for cyber–physical, social systems design and development37
IoT-based system for individual dairy cow feeding behavior monitoring using cow face recognition and edge computing37
A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data37
Intelligent digital twin for federated learning in AIoT networks37
Over-the-air firmware update for IoT devices on the wild37
iRestroom : A smart restroom cyberinfrastructure for elderly people37
i-DSME: An industrial-DSME MAC protocol for smart factory automation37
Translating and verifying Cyber–Physical systems with shared-variable concurrency in SpaceEx37
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms37
SHM-NDN: A seamless hybrid mobility management scheme for named data mobile ad hoc networks37
Commonsense reasoning and automatic generation of IoT contextual knowledge: An Answer Set Programming approach37
Programming IoT systems: A focused conceptual framework and survey of approaches36
An intelligent fuzzy-based system for handover decision in 5G-IoT networks considering network slicing and SDN technologies36
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things36
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture36
Fast ML-based next-word prediction for hybrid languages36
Optimized K-means routing protocol with black-winged kite algorithm for sustainable 5G/6G sensor networks35
A deep learning model for natural language querying in Cyber–Physical Systems35
High-performance IoT Module for real-time control and self-diagnose PV panels under working daylight and dark electroluminescence conditions35
Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment35
AIoT for sustainable manufacturing: Overview, challenges, and opportunities34
Enhancing security through continuous biometric authentication using wearable sensors34
Planning and resource allocation of a hybrid IoT network using artificial intelligence33
AMI-Chain: A scalable power-metering blockchain with IPFS storage for smart cities33
EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments33
Memory feedback transformer based intrusion detection system for IoMT healthcare networks33
MicroFlow: An Efficient Rust-Based Inference Engine for TinyML32
Implementation of multiple controllers for context-inspired collaboration between human and robot by integrating the uni-axial motion and real-time operating system32
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure32
Deep Learning based Payload Optimization for Image Transmission over LoRa with HARQ31
Improved YOLO-v5 model for boosting face mask recognition accuracy on heterogeneous IoT computing platforms31
Zero-knowledge machine learning models for blockchain peer-to-peer energy trading31
An optimized CNN-based intrusion detection system for reducing risks in smart farming31
Quantum cryptography as a solution for secure Wireless Sensor Networks: Roadmap, challenges and solutions31
Design of an IoT ultrasonic-vision based system for automatic fruit sorting utilizing size and color31
Optimizing parameters of YOLO model through uniform experimental design for gripping tasks performed by an internet of things–based robotic arm30
Joint coded caching and BS sleeping strategy to reduce energy consumption in 6G edge networks30
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions30
AIoT-enabled defect detection with minimal data: A few-shot learning approach combining prototypical and relational networks for smart manufacturing30
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection30
Federated learning with hyperparameter-based clustering for electrical load forecasting30
Predicting container intermodal transport arrival times: An approach based on IoT data30
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things29
Exploring the applicability of haptic actuators in aquatic environments29
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things29
An open testbed for O-RAN experimentation with AI-enabled control and monitoring29
WMPA-ConvBERT-BM: A hybrid deep learning model optimized by whale-marine predator algorithm for IoT-enabled malicious URL detection28
An efficient methodology to composite fault detection and classification in wireless biosensor networks28
iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection28
The Three-Phase Methodology for IoT Project Development28
A fine-grained framework for online IoT device firmware identification via version evolution analysis28
BTIA-IME: A blockchain-based trusted interactive architecture for intelligent manufacturing equipment28
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission28
A feedback-driven brain organoid platform enables automated maintenance and high-resolution neural activity monitoring28
Advanced security frameworks for UAV and IoT: A deep learning approach27
The AutoSPADA platform: User-friendly edge computing for distributed learning and data analytics in connected vehicles27
Business continuity of Cloud-based IoT applications through a seamless continuum27
MIMA 2.0 - Compact and portable Multifunctional IoT integrated Menstrual Aid27
Optimizing IoT architectures by using model driven approach and evolution strategy27
A robust IoT architecture for smart inverters in microgrids using hybrid deep learning and signal processing against adversarial attacks27
A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber–Physical Systems26
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators26
Performance analysis of entropy variation-based detection of DDoS attacks in IoT26
Cooperative Swarm Learning for Distributed Cyclic Edge Intelligent Computing26
Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models26
Forecasting energy power consumption using federated learning in edge computing devices26
Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme26
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system26
Robotic Arms for Telemedicine System Using Smart Sensors and Ultrasound Robots26
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario25
CRYSTALS-Dilithium post-quantum cyber-secure SoC for wired communications in critical systems25
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention25
TinyML Meets IoT: A Comprehensive Survey25
IoT-based expert system for fault detection in Japanese Plum leaf-turgor pressure WSN25
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT25
XBiDeep: A novel explainable artificial intelligence based intrusion detection system for Internet of Medical Things environment25
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda25
Multi-residual tensor completion for spatiotemporal data imputation25
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones25
Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey25
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles25
A survey on security in internet of things with a focus on the impact of emerging technologies24
Dynamic cooperation and mutual feedback network for shield machine24
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges24
On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems24
A network communication speedup model using multiple fungible and non-fungible paths24
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network24
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city23
IoT-based monitoring and control for optimized plant growth in smart greenhouses using soil and hydroponic systems23
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques23
Reassessing caching performance in information-centric IoT23
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions23
Distributed inference in IoT-based aerial network of UAVs23
A survey on security and cryptographic perspective of Industrial-Internet-of-Things23
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF23
Exploring machine learning methods for the identification of production cycles and anomaly detection23
Communication and computation efficiency in Federated Learning: A survey23
The robust scheme for intrusion detection system in Internet of Things22
QoS maximization scheduling of multiple UAV base stations in 3D environment22
Minimizing energy consumption in 802.15.4 IoT devices with multilevel xRPL (MxRPL)22
Improve quality of service for the Internet of Things using Blockchain & machine learning algorithms22
A comparison of code quality metrics and best practices in non-IoT and IoT systems22
A generic flexible and scalable framework for hierarchical parallelization of population-based metaheuristics22
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things22
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum22
A new road state information platform based on crowed sensing on challenged network environments22
Fog Node Self-Control Middleware: Enhancing context awareness towards autonomous decision making in Fog Colonies22
Collaboration of AI, big data, and blockchain in Internet of Things (IoT): Emerging trends and perspectives22
A Decentralized Trust Establishment Protocol for Smart IoT Systems22
Automatic software tailoring for Green Internet of Things21
The computing continuum: From IoT to the cloud21
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges21
Application of navigation grid corner point algorithm in virtual reality simulation images of indoor fire evacuation21
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture21
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures21
Location-based activity behavior deviation detection for nursing home using IoT devices21
Adaptive multi-view subspace learning based on distributed optimization21
IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model20
Social relationships and location information based routing algorithm in opportunistic networks20
A framework for creating an IoT system specification with ChatGPT20
IoT data dissemination scheme for reducing delay in multi-broker environments20
IoT-driven augmented reality and virtual reality systems in neurological sciences20
Algorithm for child adoption process using artificial intelligence and monitoring system for children20
Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing20
A novel fragment duplication attacker identification scheme using Discrete Event System based intrusion detection20
HAR: A stacked ensemble learning approach based on smartphone sensors for activity detection20
Resilience of healthy cities in the post-pandemic era: Findings based on internet of things data and artificial intelligence algorithms20
PARSECS_RT: A real-time PARSECS-based communication protocol stack for critical sensing applications20
An IoT-based interoperable architecture for wireless biomonitoring of patients with sensor patches19
Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions19
Farmer-centric design thinking principles for smart farming technologies19
SAFE: An ICT platform for supporting monitoring, localization and rescue operations in case of earthquake19
Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS19
OpenAPI framework for the Web of Things19
An approach to assess robustness of MQTT-based IoT systems19
Combinative model compression approach for enhancing 1D CNN efficiency for EIT-based Hand Gesture Recognition on IoT edge devices19
The internet of modular robotic things: Issues, limitations, challenges, & solutions19
0.073805093765259