About the Journal
This Journal publishes papers related to all aspects of Internet of Things, from latest advance to review articles. Articles explore IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Investigations related to topical areas of research are especially encouraged, including IoT demands, impacts, and implications on sensors technologies, big data management, and future design for various IoT use cases, such as smart cities, smart environment, smart homes, etc.
-
Open Access
ARTICLE
Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications
Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3
Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025
Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >
-
Open Access
REVIEW
Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies
Akhila Reddy Yadulla, Mounica Yenugula, Vinay Kumar Kasula*, Bhargavi Konda, Bala Yashwanth Reddy Thumma
Journal on Internet of Things, Vol.7, pp. 19-48, 2025, DOI:10.32604/jiot.2025.062733 - 11 July 2025
Abstract This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their More >
-
Open Access
ARTICLE
Optimization of Machine Learning Methods for Intrusion Detection in IoT
Alireza Bahmani*
Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025
Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >
-
Open Access
ARTICLE
Internet of Things Based Smart Irrigation System Using ESP WROOM 32
Krish R. Mehta, K. Jayant Naidu, Madhav Baheti, Dev Parmar, A. Sharmila*
Journal on Internet of Things, Vol.5, pp. 45-55, 2023, DOI:10.32604/jiot.2023.043102
Abstract Farming has been the most prominent and fundamental activity for generations. As the population has been multiplying exponentially, the demand for agricultural yield is growing relentlessly. Such high demand in production through traditional farming methodologies often falls short in terms of efficiency due to the limitations of manual labour. In the era of digitization, smart agricultural solutions have been emerging through the windows of Internet of Things and Artificial Intelligence to improve resource management, optimize the process of farming and enhance the yield of crops, hence, ensuring sustainable growth of the increasing production. By implementing… More >
-
Open Access
ARTICLE
A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions
Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*
Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391
Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of… More >
-
Open Access
ARTICLE
Suitability and Sustainability of Rainwater Quality Monitoring System in Cistern for Domestic Use
Kenedy A. Greyson*
Journal on Internet of Things, Vol.5, pp. 1-11, 2023, DOI:10.32604/jiot.2023.040255
Abstract Rainwater harvesting (RWH) systems have been the source of domestic water for many years and still becoming essential in many communities of developing countries. However, due to various reasons, there are several sources of contamination in the rainwater cistern systems. Dissolved chemicals from the roofing, storage, and conveyance materials, together with the suspended particulate matter from the airborne, are examples of water contamination. In this work, the water quality monitoring system has been designed and implemented. Chemical and physical parameters of water samples were collected from three locations using a data acquisition (DAQ) system and More >
-
Open Access
ARTICLE
Human Intelligent-Things Interaction Application Using 6G and Deep Edge Learning
Ftoon H. Kedwan*, Mohammed Abdur Rahman
Journal on Internet of Things, Vol.6, pp. 43-73, 2024, DOI:10.32604/jiot.2024.052325
Abstract Impressive advancements and novel techniques have been witnessed in AI-based Human Intelligent-Things Interaction (HITI) systems. Several technological breakthroughs have contributed to HITI, such as Internet of Things (IoT), deep and edge learning for deducing intelligence, and 6G for ultra-fast and ultralow-latency communication between cyber-physical HITI systems. However, human-AI teaming presents several challenges that are yet to be addressed, despite the many advancements that have been made towards human-AI teaming. Allowing human stakeholders to understand AI’s decision-making process is a novel challenge. Artificial Intelligence (AI) needs to adopt diversified human understandable features, such as ethics, non-biases,… More >
-
Open Access
ARTICLE
Research on Robustness of Charging Station Networks under Multiple Recommended Charging Methods for Electric Vehicles
Lei Feng1, Miao Liu1, Yexun Yuan1, Chi Zhang2, Peng Geng1,*
Journal on Internet of Things, Vol.6, pp. 1-16, 2024, DOI:10.32604/jiot.2024.053584
Abstract With the rapid development of electric vehicles, the requirements for charging stations are getting higher and higher.
In this study, we constructed a charging station topology network in Nanjing through the Space-L method, mapping
charging stations as network nodes and constructing edges through road relationships. The experiment introduced
five EV charging recommendation strategies (based on distance, number of fast charging piles, user preference,
price, and overall rating) used to simulate disordered charging caused by different user preferences, and the impact
of the network dynamic robustness in case of node failure is explored by simulating the… More >
-
Open Access
ARTICLE
Mean Field-Based Dynamic Backoff Optimization for MIMO-Enabled Grant-Free NOMA in Massive IoT Networks
Haibo Wang1, Hongwei Gao1,*, Pai Jiang1, Matthieu De Mari2, Panzer Gu3, Yinsheng Liu1
Journal on Internet of Things, Vol.6, pp. 17-41, 2024, DOI:10.32604/jiot.2024.054791
Abstract In the 6G Internet of Things (IoT) paradigm, unprecedented challenges will be raised to provide massive connectivity, ultra-low latency, and energy efficiency for ultra-dense IoT devices. To address these challenges, we explore the non-orthogonal multiple access (NOMA) based grant-free random access (GFRA) schemes in the cellular uplink to support massive IoT devices with high spectrum efficiency and low access latency. In particular, we focus on optimizing the backoff strategy of each device when transmitting time-sensitive data samples to a multiple-input multiple-output (MIMO)-enabled base station subject to energy constraints. To cope with the dynamic varied channel… More >
-
Open Access
REVIEW
Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies
Akhila Reddy Yadulla, Mounica Yenugula, Vinay Kumar Kasula*, Bhargavi Konda, Bala Yashwanth Reddy Thumma
Journal on Internet of Things, Vol.7, pp. 19-48, 2025, DOI:10.32604/jiot.2025.062733
Abstract This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their More >
-
Open Access
ARTICLE
Optimization of Machine Learning Methods for Intrusion Detection in IoT
Alireza Bahmani*
Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786
Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >
-
Open Access
ARTICLE
Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications
Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3
Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822
Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >
Copyright © 2025
The Author(s). Published by Tech Science Press.