Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    A Compliance-Integrated Hardware Fingerprinting Framework for Secure IoT Device Authentication

    Chirag Devendrakumar Parikh*

    Journal on Internet of Things, Vol.8, pp. 109-125, 2026, DOI:10.32604/jiot.2026.077412 - 12 May 2026

    Abstract Secure IoT ecosystems are based on the notion that device authentication is reputable. Traditional approaches typically use software identifiers or stored cryptographic keys, which can be cloned, copied, or modified by physical access or supply-chain interference. The current paper presents a hardware fingerprinting system that is based on compliance to enhance the strength of the authentication of the IoT device, that is, to connect physical device properties with organized conformity practices. The tool exploits intrinsic electrical and manufacturing differences in parts to produce device-specific fingerprints and compares these fingerprints with compliance processes, including component validation, More >

  • Open Access

    ARTICLE

    A Federated Learning Framework with Blockchain for Privacy-Preserving Continuous Glucose Monitoring in Type 2 Diabetes

    Nomangwane Angelina Tshabalala1, Ping Guo2,*

    Journal on Internet of Things, Vol.8, pp. 87-107, 2026, DOI:10.32604/jiot.2026.078248 - 06 May 2026

    Abstract Type 2 Diabetes mellitus is a disease that afflicts approximately 537 million individuals all over the world, and continuous glucose monitoring (CGM) systems have become very important in the management of the disease. Nonetheless, the existing centralized data architecture of CGM generates high privacy and security risks, as sensitive patient health data can be easily abused. This paper introduces an original structure that incorporates both federated learning and blockchain technology and allows for predicting glucose safely and preserving privacy without affecting the integrity of the data. Our model uses the Long Short-Term Memory (LSTM) neural… More >

  • Open Access

    ARTICLE

    Design and Implementation of an IoT-Based Irrigation System with Surveillance Camera

    Moina-yndi Ibrahim1, Warda Soulaimana2, Zhenjie Zhao3,*

    Journal on Internet of Things, Vol.8, pp. 67-86, 2026, DOI:10.32604/jiot.2026.078735 - 07 April 2026

    Abstract The increasing demand for efficient agricultural water management, exacerbated by population growth and climate change, has spurred the development of Internet of Things (IoT)-based smart irrigation systems as an alternative to inefficient traditional methods that waste water and reduce crop productivity. This paper presents a low-cost IoT irrigation platform that integrates real-time camera surveillance for enhanced farm monitoring and precise water management. The system employs an Espressif System (ESP8266) microcontroller to automate irrigation control based on soil moisture readings and an Espressif System ESP32 Camera Module (ESP32-CAM) to provide live imaging of the agricultural plot,… More >

  • Open Access

    ARTICLE

    Hybrid Encryption Model for Secure Token Distribution Scheme

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2

    Journal on Internet of Things, Vol.8, pp. 31-65, 2026, DOI:10.32604/jiot.2026.074919 - 16 March 2026

    Abstract Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security… More >

  • Open Access

    ARTICLE

    Multisecurity GAN-Steganography-Blockchain for IoT-Cloud Self-Service Banking

    Mangala Natampalli1,2,*, Kruthika Gottikere Channagangaiah3, Bodi Eswara Reddy1, Rajkumar Buyya4, Venugopal Kupanna Rajuk3, Sundaraja Sitharama Iyengar5, Lalit Mohan Patnaik6

    Journal on Internet of Things, Vol.8, pp. 1-30, 2026, DOI:10.32604/jiot.2026.067726 - 24 February 2026

    Abstract Contemporary banking focuses on self-service and customer-centric experience by harnessing Internet of Things (IoT) and Cloud Computing. However, these systems remain vulnerable to multifaceted cyberattacks. The IoT-Cloud-based systems can be safeguarded through authentication, confidentiality, integrity, availability, privacy, and non-repudiation. This work proposes a multi-stage security consisting of Generative Adversarial Networks (GAN) for facial authentication, hybrid Curvelet and Least-Significant-Bit (LSB) Steganography for data protection, and Ethereum Blockchain for transactions and storage security to provide complete protection to the self-service pipeline. Customers are authenticated using live images from IoT cameras by GAN facial recognition. Improved data concealment… More >

  • Open Access

    REVIEW

    Attribute-Based Encryption for IoT Environments—A Critical Survey

    Daskshnamoorthy Manivannan*

    Journal on Internet of Things, Vol.7, pp. 71-97, 2025, DOI:10.32604/jiot.2025.072809 - 24 December 2025

    Abstract Attribute-Based Encryption (ABE) secures data by tying decryption rights to user attributes instead of identities, enabling fine-grained access control. However, many ABE schemes are unsuitable for Internet of Things (IoT) due to limited device resources. This paper critically surveys ABE schemes developed specifically for IoT over the past decade, examining their evolution, strengths, limitations, and access control capabilities. It provides insights into their security, effectiveness, and real-world applicability, highlights the current state of ABE in securing IoT data and access, and discusses remaining challenges and open issues. More >

  • Open Access

    ARTICLE

    Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications

    Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3

    Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025

    Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >

  • Open Access

    REVIEW

    Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies

    Akhila Reddy Yadulla, Mounica Yenugula, Vinay Kumar Kasula*, Bhargavi Konda, Bala Yashwanth Reddy Thumma

    Journal on Internet of Things, Vol.7, pp. 19-48, 2025, DOI:10.32604/jiot.2025.062733 - 11 July 2025

    Abstract This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their More >

  • Open Access

    ARTICLE

    Optimization of Machine Learning Methods for Intrusion Detection in IoT

    Alireza Bahmani*

    Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025

    Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >

  • Open Access

    ARTICLE

    Human Intelligent-Things Interaction Application Using 6G and Deep Edge Learning

    Ftoon H. Kedwan*, Mohammed Abdur Rahman

    Journal on Internet of Things, Vol.6, pp. 43-73, 2024, DOI:10.32604/jiot.2024.052325 - 10 September 2024

    Abstract Impressive advancements and novel techniques have been witnessed in AI-based Human Intelligent-Things Interaction (HITI) systems. Several technological breakthroughs have contributed to HITI, such as Internet of Things (IoT), deep and edge learning for deducing intelligence, and 6G for ultra-fast and ultralow-latency communication between cyber-physical HITI systems. However, human-AI teaming presents several challenges that are yet to be addressed, despite the many advancements that have been made towards human-AI teaming. Allowing human stakeholders to understand AI’s decision-making process is a novel challenge. Artificial Intelligence (AI) needs to adopt diversified human understandable features, such as ethics, non-biases,… More >

Displaying 1-10 on page 1 of 78. Per Page