Hasil untuk "iot"

Menampilkan 20 dari ~486195 hasil · dari DOAJ, arXiv, CrossRef, Semantic Scholar

JSON API
S2 Open Access 2016
A survey of IoT cloud platforms

P. Ray

Abstract Internet of Things (IoT) envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

491 sitasi en Engineering
S2 Open Access 2016
Threat analysis of IoT networks using artificial neural network intrusion detection system

Elike Hodo, X. Bellekens, Andrew W. Hamilton et al.

The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.

474 sitasi en Computer Science
CrossRef Open Access 2025
CoAP/DTLS Protocols in IoT Based on Blockchain Light Certificate

David Khoury, Samir Haddad, Patrick Sondi et al.

The Internet of Things (IoT) is expanding rapidly, but the security of IoT devices remains a noteworthy concern due to resource limitations and existing security conventions. This research investigates and proposes the use of a Light certificate with the Constrained Application Protocol (CoAP) instead of the X509 certificate based on traditional PKI/CA. We start by analyzing the impediments of current CoAP security over DTLS with the certificate mode based on CA root in the constrained IoT device and suggest the implementation of LightCert4IoT for CoAP over DTLS. The paper also describes a new modified handshake protocol in DTLS applied for IoT devices and Application server certificate authentication verification by relying on a blockchain without the complication of the signed certificate and certificate chain. This approach streamlines the DTLS handshake process and reduces cryptographic overhead, making it particularly suitable for resource-constrained environments. Our proposed solution leverages blockchain to reinforce IoT gadget security through immutable device characters, secure device registration, and data integrity. The LightCert4IoT is smaller in size and requires less power consumption. Continuous research and advancement are pivotal to balancing security and effectiveness. This paper examines security challenges and demonstrates the effectiveness of giving potential solutions, guaranteeing the security of IoT networks by applying LightCert4IoT and using the CoAP over DTLS with a new security mode based on blockchain.

CrossRef Open Access 2025
MQTT Broker Architectural Enhancements for High-Performance P2P Messaging: TBMQ Scalability and Reliability in Distributed IoT Systems

Dmytro Shvaika, Andrii Shvaika, Volodymyr Artemchuk

The Message Queuing Telemetry Transport (MQTT) protocol remains a key enabler for lightweight and low-latency messaging in Internet of Things (IoT) applications. However, traditional broker implementations often struggle with the demands of large-scale point-to-point (P2P) communication. This paper presents a performance and architectural evaluation of TBMQ, an open source MQTT broker designed to support reliable P2P messaging at scale. The broker employs Redis Cluster for session persistence and Apache Kafka for message routing. Additional optimizations include asynchronous Redis access via Lettuce and Lua-based atomic operations. Stepwise load testing was performed using Kubernetes-based deployments on Amazon EKS, progressively increasing message rates to 1 million messages per second (msg/s). The results demonstrate that TBMQ achieves linear scalability and stable latency as the load increases. It reaches an average throughput of 8900 msg/s per CPU core, while maintaining end-to-end delivery latency within two-digit millisecond bounds. These findings confirm that TBMQ’s architecture provides an effective foundation for reliable, high-throughput messaging in distributed IoT systems.

DOAJ Open Access 2025
SmartPresence: Wi-Fi-based online attendance management for smart academic assistance

Mijanur Rahaman, Md. Masudul Islam, Dip Nandi

Abstract SmartPresence, a Wi-Fi-based attendance management system marks a significant leap in evaluating student performance, replacing traditional manual methods with pen-and-paper timesheets or paper-based student signatures. This innovative system utilizes smartphones and Wi-Fi signals, allowing students to connect their devices to a designated router upon entering the classroom for attendance registration. The captured data is stored centrally, instantly notifying both administrators and teachers in real time. This approach not only revolutionizes attendance tracking but also enhances overall classroom management by leveraging Wi-Fi-enabled devices like smartphones and laptops. This system introduces a progressive solution, utilizing contemporary connectivity for a seamless and intelligent attendance monitoring experience for educators and students alike.

Electrical engineering. Electronics. Nuclear engineering, Information technology
DOAJ Open Access 2025
A Comprehensive Review of Advanced Sensor Technologies for Fire Detection with a Focus on Gasistor-Based Sensors

Mohsin Ali, Ibtisam Ahmad, Ik Geun et al.

Early fire detection plays a crucial role in minimizing harm to human life, buildings, and the environment. Traditional fire detection systems struggle with detection in dynamic or complex situations due to slow response and false alarms. Conventional systems are based on smoke, heat, and gas sensors, which often trigger alarms when a fire is in full swing. In order to overcome this, a promising approach is the development of memristor-based gas sensors, known as gasistors, which offer a lightweight design, fast response/recovery, and efficient miniaturization. Recent studies on gasistor-based sensors have demonstrated ultrafast response times as low as 1–2 s, with detection limits reaching sub-ppm levels for gases such as CO, NH<sub>3</sub>, and NO<sub>2</sub>. Enhanced designs incorporating memristive switching and 2D materials have achieved a sensitivity exceeding 90% and stable operation across a wide temperature range (room temperature to 250 °C). This review highlights key factors in early fire detection, focusing on advanced sensors and their integration with IoT for faster, and more reliable alerts. Here, we introduce gasistor technology, which shows high sensitivity to fire-related gases and operates through conduction filament (CF) mechanisms, enabling its low power consumption, compact size, and rapid recovery. When integrated with machine learning and artificial intelligence, this technology offers a promising direction for future advancements in next-generation early fire detection systems.

DOAJ Open Access 2025
Adaptive Reinforcement Learning-Based Framework for Energy-Efficient Task Offloading in a Fog–Cloud Environment

Branka Mikavica, Aleksandra Kostic-Ljubisavljevic

Ever-increasing computational demand introduced by the expanding scale of Internet of Things (IoT) devices poses significant concerns in terms of energy consumption in a fog–cloud environment. Due to the limited resources of IoT devices, energy-efficient task offloading becomes even more challenging for time-sensitive tasks. In this paper, we propose a reinforcement learning-based framework, namely Adaptive Q-learning-based Energy-aware Task Offloading (AQETO), that dynamically manages the energy consumption of fog nodes in a fog–cloud network. Concurrently, it considers IoT task delay tolerance and allocates computational resources while satisfying deadline requirements. The proposed approach dynamically determines energy states of each fog node using Q-learning depending on workload fluctuations. Moreover, AQETO prioritizes allocation of the most urgent tasks to minimize delays. Extensive experiments demonstrate the effectiveness of AQETO in terms of the minimization of fog node energy consumption and delay and the maximization of system efficiency.

Chemical technology
DOAJ Open Access 2025
Internet of Things-Based Smart Infant-Incubators Using Machine Learning Analysis

Mahmoud Gamal, Ibrahim Radi, Amr Yousef et al.

Many international manufacturers of infant incubators use IoT technology, presenting tough competition for local manufacturers. This research examines methods to fulfill parents&#x2019; need to monitor their babies directly when they are lying inside an incubator. This bridges the gap present in neonatal care units. As such, this study proposes a prototype for an incubator that employs IoT along with different sensors to monitor babies occupying these incubators in real time and send the data to a remote server. With the different technologies used in this monitoring system, parents have the ability to listen to their babies remotely through a mobile application. A convolutional neural network (CNN) algorithm is used to take neonatal care a step further. It then goes beyond monitoring by interpreting the nature of a baby&#x2019;s cries inside the specified incubator. The proposed prototype represents a step forward in the applications of Industry 4.0 in healthcare, especially those related to infant care and, more specifically, incubators for babies. This research is part of advancements in the use of IoT and handheld applications for the future development of baby incubators, fulfilling the needs of parents to constantly monitor their infants and neonatal care, specifically within modern healthcare.

Electrical engineering. Electronics. Nuclear engineering
DOAJ Open Access 2025
Backdoor Attack and Defense Methods for AI–Based IoT Intrusion Detection System

Bowen Ma, Jiangwei Shi, Ning Zhu et al.

The Internet of Things (IoT) is an emerging technology that has attracted significant attention and triggered a technical revolution in recent years. Numerous IoT devices are directly connected to the physical world, such as security cameras and medical equipment, making IoT security a critical issue. Artificial intelligence (AI) based intrusion detection technology for IoT can rapidly detect network attacks and improve security performance. However, this technology is vulnerable to backdoor attacks. As an important form of adversarial machine learning (ML), backdoor attacks can allow malicious traffic to evade detection of the intrusion detection system, posing a significant threat to the IoT security. This study focuses on backdoor attack and defense methods for AI–based IoT intrusion detection system. Specifically, we first use different ML and deep learning (DL) classification models to classify IoT traffic data, thereby achieving intrusion detection within IoT. Additionally, we employ data poisoning techniques to implant backdoors into models, enabling backdoor attacks on classification models. For backdoor defense, we propose backdoor detection and mitigate methods: (1) The proposed backdoor detection method is achieved by leveraging the strong correlation between the backdoor trigger and the target classification; (2) we utilize the unlearning method to mitigate the backdoor effect, enhancing the robustness of classification networks. Extensive experiments were conducted on the CICIOT2023 dataset to evaluate the effectiveness of IoT intrusion detection, backdoor attack, and defense.

Computer engineering. Computer hardware, Electronic computers. Computer science
DOAJ Open Access 2025
Development of internet of things-based petroleum pipeline topology leak monitoring and detection system using sensors

Paul Bukie, Idongesit Eteng, Eyo Essien

Transportation of crude oil by pipelines is the safest mode of oil transportation. In Nigeria, over 90\% of oil transported by federally regulated pipelines arrives safely every year. The flow starts from oil fields to flow stations to refineries and export tankers and finally, from refineries to depots. Notably, the transportation of oil by pipeline suffers challenges. The challenges range from natural disasters to attacks and activities carried out by vandals. These activities pose a serious threat to Flora and Fauna and have caused devastating effects on the environment, with remarkable destruction of vegetation cover, water bodies, and arable land. In this study, an Internet of Things (IoT)-Based Petroleum Pipeline Topology Leak Detection and Monitoring System (IoT-BPTLDMS) that is capable of monitoring, detecting, and reporting pipeline topology leakage and reports same to the control room before it graduates to spillage has been developed. This was done by strategically mounting pressure-change detecting sensors along the pipelines which are capable of detecting leakages through changes in fluid pressure and results transmitted with the aid of a Long-Range Wireless Area Network (LoRaWAN) module. The transmitted data captures the date, time, event, and geo-location of the leak site. This data is received in a computer and an Android phone. A prototype was used to study the setup's workings. The prototype controller was programmed using C++ with the Arduino Integrated Development Environment (IDE). The Android Application was assembled with Basic4Andriod. The captured result shows consistency with the area of leakage against the geo-location reported. This shows that this method would be effective in checking and detecting petroleum pipeline leakage, and as such, can solve the problem of quick response to pipeline vandalisation and oil spillage in Nigeria or generally.

arXiv Open Access 2025
An object-centric core metamodel for IoT-enhanced event logs

Yannis Bertrand, Christian Imenkamp, Lukas Malburg et al.

Advances in Internet-of-Things (IoT) technologies have prompted the integration of IoT devices with business processes (BPs) in many organizations across various sectors, such as manufacturing, healthcare and smart spaces. The proliferation of IoT devices leads to the generation of large amounts of IoT data providing a window on the physical context of BPs, which facilitates the discovery of new insights about BPs using process mining (PM) techniques. However, to achieve these benefits, IoT data need to be combined with traditional process (event) data, which is challenging due to the very different characteristics of IoT and process data, for instance in terms of granularity levels. Recently, several data models were proposed to integrate IoT data with process data, each focusing on different aspects of data integration based on different assumptions and requirements. This fragmentation hampers data exchange and collaboration in the field of PM, e.g., making it tedious for researchers to share data. In this paper, we present a core model synthesizing the most important features of existing data models. As the core model is based on common requirements, it greatly facilitates data sharing and collaboration in the field. A prototypical Python implementation is used to evaluate the model against various use cases and demonstrate that it satisfies these common requirements.

en cs.SE
arXiv Open Access 2025
Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review and Future Directions

Emmanuel Alalade, Ashraf Matrawy

Privacy preservation in Internet of Things (IoT) systems requires the use of privacy-enhancing technologies (PETs) built from innovative technologies such as cryptography and artificial intelligence (AI) to create techniques called privacy preservation techniques (PPTs). These PPTs achieve various privacy goals and address different privacy concerns by mitigating potential privacy threats within IoT systems. This study carried out a scoping review of different types of PPTs used in previous research works on IoT systems between 2010 and early 2023 to further explore the advantages of privacy preservation in these systems. This scoping review looks at privacy goals, possible technologies used for building PET, the integration of PPTs into the computing layer of the IoT architecture, different IoT applications in which PPTs are deployed, and the different privacy types addressed by these techniques within IoT systems. Key findings, such as the prominent privacy goal and privacy type in IoT, are discussed in this survey, along with identified research gaps that could inform future endeavors in privacy research and benefit the privacy research community and other stakeholders in IoT systems.

en cs.CR
arXiv Open Access 2025
Talk with the Things: Integrating LLMs into IoT Networks

Alakesh Kalita

The convergence of Large Language Models (LLMs) and Internet of Things (IoT) networks open new opportunities for building intelligent, responsive, and user-friendly systems. This work presents an edge-centric framework that integrates LLMs into IoT architectures to enable natural language-based control, context-aware decision-making, and enhanced automation. The proposed modular and lightweight Retrieval Augmented Generation (RAG)-based LLMs are deployed on edge computing devices connected to IoT gateways, enabling local processing of user commands and sensor data for reduced latency, improved privacy, and enhanced inference quality. We validate the framework through a smart home prototype using LLaMA 3 and Gemma 2B models for controlling smart devices. Experimental results highlight the trade-offs between model accuracy and inference time with respect to models size. At last, we also discuss the potential applications that can use LLM-based IoT systems, and a few key challenges associated with such systems.

en cs.NI
CrossRef Open Access 2024
Enhancing Automatic Modulation Recognition for IoT Applications Using Transformers

Narges Rashvand, Kenneth Witham, Gabriel Maldonado et al.

Automatic modulation recognition (AMR) is vital for accurately identifying modulation types within incoming signals, a critical task for optimizing operations within edge devices in IoT ecosystems. This paper presents an innovative approach that leverages Transformer networks, initially designed for natural language processing, to address the challenges of efficient AMR. Our Transformer network architecture is designed with the mindset of real-time edge computing on IoT devices. Four tokenization techniques are proposed and explored for creating proper embeddings of RF signals, specifically focusing on overcoming the limitations related to the model size often encountered in IoT scenarios. Extensive experiments reveal that our proposed method outperformed advanced deep learning techniques, achieving the highest recognition accuracy. Notably, our model achieved an accuracy of 65.75 on the RML2016 and 65.80 on the CSPB.ML.2018+ dataset.

CrossRef Open Access 2024
Utilizing an Internet of Things (IoT) Device, Intelligent Control Design, and Simulation for an Agricultural System

Sairoel Amertet Finecomess, Girma Gebresenbet, Hassan Mohammed Alwan

In an agricultural system, finding suitable watering, pesticides, and soil content to provide the right nutrients for the right plant remains challenging. Plants cannot speak and cannot ask for the food they require. These problems can be addressed by applying intelligent (fuzzy logic) controllers to IoT devices in order to enhance communication between crops, ground mobile robots, aerial robots, and the entire farm system. The application of fuzzy logic in agriculture is a promising technology that can be used to optimize crop yields and reduce water usage. It was developed based on language and the air properties in agricultural fields. The entire system was simulated in the MATLAB/SIMULINK environment with Cisco Packet Tracer integration. The inputs for the system were soil moisture sensors, temperature sensors, and humidity sensors, and the outputs were pump flow, valve opening, water level, and moisture in the sounding. The obtained results were the output of the valve opening, moisture in the sounding, pump flow rate, outflow, water level, and ADH values, which are 10.00000013 rad/s, 34.72%, 4.494%, 0.025 m3/s, 73.31 cm3, and 750 values, respectively. The outflow rate increase indicates that water is being released from the tanks, and the control signal fluctuates, indicating that the valve is opening.

DOAJ Open Access 2024
Nano fuzzy alarming system for blood transfusion requirement detection in cancer using deep learning

Nasibeh Rady Raz, Ali Arash Anoushirvani, Neda Rahimian et al.

Abstract Periodic blood transfusion is a need in cancer patients in which the disease process as well as the chemotherapy can disrupt the natural production of blood cells. However, there are concerns about blood transfusion side effects, the cost, and the availability of donated blood. Therefore, predicting the timely requirement for blood transfusion considering patient variability is a need, and here for the first-time deal with this issue in blood cancer using in vivo data. First, a data set of 98 samples of blood cancer patients including 61 features of demographic, clinical, and laboratory data are collected. After performing multivariate analysis and the approval of an expert, effective parameters are derived. Then using a deep recurrent neural network, a system is presented to predict a need for packed red blood cell transfusion. Here, we use a Long Short-Term Memory (LSTM) neural network for modeling and the cross-validation technique with 5 layers for validation of the model along with comparing the result with networking and non-networking machine learning algorithms including bidirectional LSTM, AdaBoost, bagging decision tree based, bagging KNeighbors, and Multi-Layer Perceptron (MLP). Results show the LSTM outperforms the other methods. Then, using the swarm of fuzzy bioinspired nanomachines and the most effective parameters of Hgb, PaO2, and pH, we propose a feasibility study on nano fuzzy alarming system (NFABT) for blood transfusion requirements. Alarming decisions using the Internet of Things (IoT) gateway are delivered to the physician for performing medical actions. Also, NFABT is considered a real-time non-invasive AI-based hemoglobin monitoring and alarming method. Results show the merits of the proposed method.

Medicine, Science
arXiv Open Access 2024
Dealing with Imbalanced Classes in Bot-IoT Dataset

Jesse Atuhurra, Takanori Hara, Yuanyu Zhang et al.

With the rapidly spreading usage of Internet of Things (IoT) devices, a network intrusion detection system (NIDS) plays an important role in detecting and protecting various types of attacks in the IoT network. To evaluate the robustness of the NIDS in the IoT network, the existing work proposed a realistic botnet dataset in the IoT network (Bot-IoT dataset) and applied it to machine learning-based anomaly detection. This dataset contains imbalanced normal and attack packets because the number of normal packets is much smaller than that of attack ones. The nature of imbalanced data may make it difficult to identify the minority class correctly. In this thesis, to address the class imbalance problem in the Bot-IoT dataset, we propose a binary classification method with synthetic minority over-sampling techniques (SMOTE). The proposed classifier aims to detect attack packets and overcome the class imbalance problem using the SMOTE algorithm. Through numerical results, we demonstrate the proposed classifier's fundamental characteristics and the impact of imbalanced data on its performance.

en cs.CR, cs.AI

Halaman 20 dari 24310