
This Journal publishes papers related to all aspects of Internet of Things, from latest advance to review articles. Articles explore IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Investigations related to topical areas of research are especially encouraged, including IoT demands, impacts, and implications on sensors technologies, big data management, and future design for various IoT use cases, such as smart cities, smart environment, smart homes, etc.
Open Access
ARTICLE
Journal on Internet of Things, Vol.8, pp. 109-125, 2026, DOI:10.32604/jiot.2026.077412 - 12 May 2026
Abstract Secure IoT ecosystems are based on the notion that device authentication is reputable. Traditional approaches typically use software identifiers or stored cryptographic keys, which can be cloned, copied, or modified by physical access or supply-chain interference. The current paper presents a hardware fingerprinting system that is based on compliance to enhance the strength of the authentication of the IoT device, that is, to connect physical device properties with organized conformity practices. The tool exploits intrinsic electrical and manufacturing differences in parts to produce device-specific fingerprints and compares these fingerprints with compliance processes, including component validation, More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.8, pp. 87-107, 2026, DOI:10.32604/jiot.2026.078248 - 06 May 2026
Abstract Type 2 Diabetes mellitus is a disease that afflicts approximately 537 million individuals all over the world, and continuous glucose monitoring (CGM) systems have become very important in the management of the disease. Nonetheless, the existing centralized data architecture of CGM generates high privacy and security risks, as sensitive patient health data can be easily abused. This paper introduces an original structure that incorporates both federated learning and blockchain technology and allows for predicting glucose safely and preserving privacy without affecting the integrity of the data. Our model uses the Long Short-Term Memory (LSTM) neural… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.8, pp. 67-86, 2026, DOI:10.32604/jiot.2026.078735 - 07 April 2026
Abstract The increasing demand for efficient agricultural water management, exacerbated by population growth and climate change, has spurred the development of Internet of Things (IoT)-based smart irrigation systems as an alternative to inefficient traditional methods that waste water and reduce crop productivity. This paper presents a low-cost IoT irrigation platform that integrates real-time camera surveillance for enhanced farm monitoring and precise water management. The system employs an Espressif System (ESP8266) microcontroller to automate irrigation control based on soil moisture readings and an Espressif System ESP32 Camera Module (ESP32-CAM) to provide live imaging of the agricultural plot,… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.8, pp. 31-65, 2026, DOI:10.32604/jiot.2026.074919 - 16 March 2026
Abstract Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security… More >
Open Access
ARTICLE
Journal on Internet of Things, Vol.8, pp. 1-30, 2026, DOI:10.32604/jiot.2026.067726 - 24 February 2026
Abstract Contemporary banking focuses on self-service and customer-centric experience by harnessing Internet of Things (IoT) and Cloud Computing. However, these systems remain vulnerable to multifaceted cyberattacks. The IoT-Cloud-based systems can be safeguarded through authentication, confidentiality, integrity, availability, privacy, and non-repudiation. This work proposes a multi-stage security consisting of Generative Adversarial Networks (GAN) for facial authentication, hybrid Curvelet and Least-Significant-Bit (LSB) Steganography for data protection, and Ethereum Blockchain for transactions and storage security to provide complete protection to the self-service pipeline. Customers are authenticated using live images from IoT cameras by GAN facial recognition. Improved data concealment… More >