You are currently on the new version of our website. Access the old version .

1,779 Results Found

  • Article
  • Open Access
6 Citations
2,511 Views
19 Pages

Self-Learning Pipeline for Low-Energy Resource-Constrained Devices

  • Fouad Sakr,
  • Riccardo Berta,
  • Joseph Doyle,
  • Alessandro De Gloria and
  • Francesco Bellotti

14 October 2021

The trend of bringing machine learning (ML) to the Internet of Things (IoT) field devices is becoming ever more relevant, also reducing the overall energy need of the applications. ML models are usually trained in the cloud and then deployed on edge...

  • Article
  • Open Access
3 Citations
2,190 Views
17 Pages

Power/Area-Efficient ECC Processor Implementation for Resource-Constrained Devices

  • Medien Zeghid,
  • Anissa Sghaier,
  • Hassan Yousif Ahmed and
  • Osman Ahmed Abdalla

30 September 2023

The use of resource-constrained devices is rising nowadays, and these devices mostly operate with sensitive data. Consequently, security is a key issue for these devices. In this paper, we propose a compact ECC (elliptic curve cryptography) architect...

  • Article
  • Open Access
1 Citations
6,970 Views
22 Pages

A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities...

  • Article
  • Open Access
49 Citations
7,876 Views
18 Pages

LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices

  • Ziyang He,
  • Xiaoqing Zhang,
  • Yangjie Cao,
  • Zhi Liu,
  • Bo Zhang and
  • Xiaoyan Wang

17 April 2018

By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algo...

  • Article
  • Open Access
1 Citations
1,945 Views
19 Pages

16 December 2024

Federated learning enables devices to train models collaboratively while protecting data privacy. However, the computing power, memory, and communication capabilities of IoT devices are limited, making it difficult to train large-scale models on thes...

  • Article
  • Open Access
40 Citations
14,146 Views
19 Pages

20 June 2024

The IoT has become an integral part of the technological ecosystem that we all depend on. The increase in the number of IoT devices has also brought with it security concerns. Lightweight cryptography (LWC) has evolved to be a promising solution to i...

  • Editorial
  • Open Access
27 Citations
4,927 Views
4 Pages

25 April 2019

With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS system...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,050 Views
13 Pages

15 December 2021

The application of Artificial Intelligence to the industrial world and its appliances has recently grown in popularity. Indeed, AI techniques are now becoming the de-facto technology for the resolution of complex tasks concerning computer vision, nat...

  • Feature Paper
  • Article
  • Open Access
5 Citations
3,597 Views
14 Pages

14 September 2020

Lightweight cryptography is a vital and fast growing field in today’s world where billions of constrained devices interact with each other. In this paper, two novel compact architectures of the Enocoro-128v2 stream cipher are presented. The Eno...

  • Article
  • Open Access
32 Citations
4,135 Views
19 Pages

On the Possibility of Predicting Glycaemia ‘On the Fly’ with Constrained IoT Devices in Type 1 Diabetes Mellitus Patients

  • Ignacio Rodríguez-Rodríguez,
  • José-Víctor Rodríguez,
  • Ioannis Chatzigiannakis and
  • Miguel Ángel Zamora Izquierdo

18 October 2019

Type 1 Diabetes Mellitus (DM1) patients are used to checking their blood glucose levels several times per day through finger sticks and, by subjectively handling this information, to try to predict their future glycaemia in order to choose a proper s...

  • Article
  • Open Access
22 Citations
10,320 Views
14 Pages

21 September 2017

Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key mana...

  • Article
  • Open Access
1 Citations
2,382 Views
16 Pages

26 May 2022

With the development of various new intelligent materials, pneumatic artificial muscles are becoming widely used as actuators in industry, with their advantages of having a simple and compact structure, smooth action, fast response and movement close...

  • Article
  • Open Access
3 Citations
3,703 Views
17 Pages

15 August 2023

The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to various hardware attacks. Fault injection attacks (FIAs) stand out a...

  • Article
  • Open Access
2 Citations
2,806 Views
16 Pages

16 December 2022

As a technique for accelerating and stabilizing training, the batch normalization (BN) is widely used in deep learning. However, BN cannot effectively estimate the mean and the variance of samples when training/fine-tuning with small batches of data...

  • Article
  • Open Access
209 Views
20 Pages

9 January 2026

Human Activity Recognition (HAR) using wearable sensors enables impactful applications in healthcare, fitness, and smart environments, but it also faces challenges related to data privacy, non-independent and identically distributed (non-IID) data, a...

  • Article
  • Open Access
799 Views
16 Pages

13 August 2025

Sixth-generation (6G) wireless technology has facilitated the rapid development of the Internet of Things (IoT), enabling various end devices to be deployed in applications such as wireless multimedia sensor networks. However, most end devices encoun...

  • Article
  • Open Access
34 Citations
7,930 Views
23 Pages

Wireless Technology Recognition Based on RSSI Distribution at Sub-Nyquist Sampling Rate for Constrained Devices

  • Wei Liu,
  • Merima Kulin,
  • Tarik Kazaz,
  • Adnan Shahid,
  • Ingrid Moerman and
  • Eli De Poorter

12 September 2017

Driven by the fast growth of wireless communication, the trend of sharing spectrum among heterogeneous technologies becomes increasingly dominant. Identifying concurrent technologies is an important step towards efficient spectrum sharing. However, d...

  • Review
  • Open Access
1 Citations
2,271 Views
43 Pages

A Survey of Cross-Layer Security for Resource-Constrained IoT Devices

  • Mamyr Altaibek,
  • Aliya Issainova,
  • Tolegen Aidynov,
  • Daniyar Kuttymbek,
  • Gulsipat Abisheva and
  • Assel Nurusheva

3 September 2025

Low-power microcontrollers, wireless sensors, and embedded gateways form the backbone of many Internet of Things (IoT) deployments. However, their limited memory, constrained energy budgets, and lack of standardized firmware make them attractive targ...

  • Article
  • Open Access
9 Citations
4,955 Views
16 Pages

17 March 2024

Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys. A crucial and complex operation in ECC calculations is scalar point multi...

  • Article
  • Open Access
20 Citations
8,885 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Article
  • Open Access
8 Citations
6,424 Views
18 Pages

Secure Communications for Resource-Constrained IoT Devices

  • Abd-Elhamid M. Taha,
  • Abdulmonem M. Rashwan and
  • Hossam S. Hassanein

29 June 2020

The importance of securing communications on the Internet of Things (IoT) cannot be overstated. This is especially the case in light of the increasing proliferation of IoT devices and instances, as well as the growing dependence on their usage. Meanw...

  • Article
  • Open Access
16 Citations
6,464 Views
20 Pages

Over-the-Air Firmware Updates for Constrained NB-IoT Devices

  • Farouk Mahfoudhi,
  • Ashish Kumar Sultania and
  • Jeroen Famaey

6 October 2022

The Internet of Things (IoT) is being deployed to provide smart solutions for buildings, logistics, hospitals, and many more. It is growing with billions of connected devices. However, with such tremendous growth, maintenance and support are the hidd...

  • Article
  • Open Access
8 Citations
2,649 Views
13 Pages

Lightweight Strong PUF for Resource-Constrained Devices

  • Mateusz Korona,
  • Radosław Giermakowski,
  • Mateusz Biernacki and
  • Mariusz Rawski

Physical Unclonable Functions are security primitives that exploit the variation in integrated circuits’ manufacturing process, and, as a result, each instance processes applied stimuli differently. This feature can be used to provide a unique...

  • Article
  • Open Access
12 Citations
4,019 Views
15 Pages

A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices

  • Evangelina Lara,
  • Leocundo Aguilar,
  • Jesús A. García and
  • Mauricio A. Sanchez

4 October 2018

The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics...

  • Article
  • Open Access
895 Views
23 Pages

An Adaptive Hybrid Cryptographic Framework for Resource-Constrained IoT Devices

  • Manal Jazzaa Alanazi,
  • Renad Atallah Alhoweiti,
  • Gadah Ahmad Alhwaity and
  • Adel R. Alharbi

27 November 2025

Recently, the record-level rise in Internet of Things (IoT) devices has produced unparalleled security challenges, particularly for resource-constrained devices operating under limited computational resources, memory, and power. In this context, trad...

  • Article
  • Open Access
15 Citations
6,505 Views
21 Pages

MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices

  • Kristina Sahlmann,
  • Vera Clemens,
  • Michael Nowak and
  • Bettina Schnor

22 December 2020

Message Queuing Telemetry Transport (MQTT) is one of the dominating protocols for edge- and cloud-based Internet of Things (IoT) solutions. When a security vulnerability of an IoT device is known, it has to be fixed as soon as possible. This requires...

  • Article
  • Open Access
24 Citations
6,854 Views
30 Pages

29 September 2019

Billions of devices will compose the IoT system in the next few years, generating a huge amount of data. We can use fog computing to process these data, considering that there is the possibility of overloading the network towards the cloud. In this c...

  • Proceeding Paper
  • Open Access
2 Citations
3,410 Views
10 Pages

25 November 2024

This study proposes a health monitoring system for snoring detection utilizing Tiny Machine Learning (TinyML) models, specifically designed for resource-constrained wearable Internet of Things (IoT) devices. This research addresses significant constr...

  • Article
  • Open Access
2 Citations
2,006 Views
24 Pages

11 February 2025

As the global demand for surveillance cameras increases, the digital footage data also explicitly increases. Analyzing and extracting meaningful content from footage is a resource-depleting and laborious effort. The traditional video synopsis techniq...

  • Review
  • Open Access
35 Citations
6,181 Views
26 Pages

Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain—A Survey

  • Zainab Iftikhar,
  • Yasir Javed,
  • Syed Yawar Abbas Zaidi,
  • Munam Ali Shah,
  • Zafar Iqbal Khan,
  • Shafaq Mussadiq and
  • Kamran Abbasi

With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy preservation when a huge number of resource-constrained distributed devices is involved. Blockchain has become popular for its benefits, including decen...

  • Article
  • Open Access
87 Citations
8,887 Views
22 Pages

16 January 2020

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as...

  • Article
  • Open Access
6 Citations
2,971 Views
17 Pages

Efficient Wind Speed Forecasting for Resource-Constrained Sensor Devices

  • Sergio Herrería-Alonso,
  • Andrés Suárez-González,
  • Miguel Rodríguez-Pérez,
  • Raúl F. Rodríguez-Rubio and
  • Cándido López-García

2 February 2021

Wind energy harvesting technology is one of the most popular power sources for wireless sensor networks. However, given its irregular nature, wind energy availability experiences significant variations and, therefore, wind-powered devices need reliab...

  • Article
  • Open Access
2 Citations
2,223 Views
33 Pages

An Adaptive Data Rate Algorithm for Power-Constrained End Devices in Long Range Networks

  • Honggang Wang,
  • Baorui Zhao,
  • Xiaolei Liu,
  • Ruoyu Pan,
  • Shengli Pang and
  • Jiwei Song

28 October 2024

LoRa (long range) is a communication technology that employs chirp spread spectrum modulation. Among various low-power wide area network (LPWAN) technologies, LoRa offers unique advantages, including low power consumption, long transmission distance,...

  • Article
  • Open Access
16 Citations
5,186 Views
19 Pages

18 October 2021

The Internet of Things networks connect a large number of devices and can be used for various purposes. IoT systems collect and process vast amounts of often sensitive data. Information security should be the key feature of an IoT network. In this pa...

  • Article
  • Open Access
11 Citations
7,357 Views
28 Pages

22 October 2015

Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important build...

  • Article
  • Open Access
15 Citations
4,879 Views
13 Pages

12 September 2024

In the era of ubiquitous connectivity facilitated by the Internet of Things (IoT), ensuring robust security mechanisms for communication channels among resource-constrained devices has become imperative. Elliptic curve Diffie–Hellman (ECDH) key...

  • Article
  • Open Access
5 Citations
1,816 Views
20 Pages

Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks

  • Georgios Zachos,
  • Georgios Mantas,
  • Kyriakos Porfyrakis and
  • Jonathan Rodriguez

17 February 2025

Internet of Medical Things (IoMT) technology has emerged from the introduction of the Internet of Things in the healthcare sector. However, the resource-constrained characteristics and heterogeneity of IoMT networks make these networks susceptible to...

  • Article
  • Open Access
11 Citations
4,949 Views
16 Pages

10 January 2020

Keeping IoT devices secure has been a major challenge recently. One of the possible solutions to secure IoT devices is to use a physically unclonable function (PUF). A PUF is a security primitive that can generate device-specific cryptographic inform...

  • Article
  • Open Access
83 Citations
6,286 Views
20 Pages

Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box

  • Badr M. Alshammari,
  • Ramzi Guesmi,
  • Tawfik Guesmi,
  • Haitham Alsaif and
  • Ahmed Alzamil

13 January 2021

In the Internet of Things (IoT), a lot of constrained devices are interconnected. The data collected from those devices can be the target of cyberattacks. In this paper, a lightweight cryptosystem that can be efficiently implemented in highly constra...

  • Article
  • Open Access
1 Citations
2,664 Views
13 Pages

Moving Healthcare AI Support Systems for Visually Detectable Diseases to Constrained Devices

  • Tess Watt,
  • Christos Chrysoulas,
  • Peter J. Barclay,
  • Brahim El Boudani and
  • Grigorios Kalliatakis

10 December 2024

Image classification usually requires connectivity and access to the cloud, which is often limited in many parts of the world, including hard-to-reach rural areas. Tiny machine learning (tinyML) aims to solve this problem by hosting artificial intell...

  • Article
  • Open Access
28 Citations
10,664 Views
17 Pages

Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices

  • Alberto Carelli,
  • Andrea Palmieri,
  • Antonio Vilei,
  • Fabien Castanier and
  • Andrea Vesco

11 February 2022

Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a distributed fashion for analysis and evidence-based decision making. However, security concerns regarding the source, confidentiality and integrity of the data...

  • Article
  • Open Access
254 Views
26 Pages

This contribution outlines a completely new, fully local approach for secure web-based device control on the basis of browser inter-window messaging. Modern smart home IoT (Internet of Things) devices are commonly controlled with proprietary mobile a...

  • Review
  • Open Access
11 Citations
3,747 Views
38 Pages

Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices

  • Mahawish Fatima,
  • Osama Rehman,
  • Ibrahim M. H. Rahman,
  • Aisha Ajmal and
  • Simon Jigwan Park

12 October 2024

The emergence of smart technologies and the wide adoption of the Internet of Things (IoT) have revolutionized various sectors, yet they have also introduced significant security challenges due to the extensive attack surface they present. In recent y...

  • Article
  • Open Access
9 Citations
2,783 Views
21 Pages

Seismic Waveform Inversion Capability on Resource-Constrained Edge Devices

  • Daniel Manu,
  • Petro Mushidi Tshakwanda,
  • Youzuo Lin,
  • Weiwen Jiang and
  • Lei Yang

22 November 2022

Seismic full wave inversion (FWI) is a widely used non-linear seismic imaging method used to reconstruct subsurface velocity images, however it is time consuming, has high computational cost and depend heavily on human interaction. Recently, deep lea...

  • Article
  • Open Access
23 Citations
5,793 Views
17 Pages

Artificial intelligence (A.I.) has revolutionised a wide range of human activities, including the accelerated development of autonomous vehicles. Self-navigating delivery robots are recent trends in A.I. applications such as multitarget object detect...

  • Article
  • Open Access
2 Citations
3,103 Views
23 Pages

26 December 2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for...

  • Article
  • Open Access
8 Citations
3,584 Views
21 Pages

5 December 2021

With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are...

  • Article
  • Open Access
2 Citations
3,045 Views
14 Pages

The rapid development of the RISC-V instruction set architecture (ISA) has garnered significant attention in the realm of deep neural network applications. While hardware-aware neural architecture search (NAS) methods for ARM, X86, and GPUs have been...

  • Article
  • Open Access
3 Citations
2,282 Views
34 Pages

SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices

  • Alin-Adrian Anton,
  • Petra Csereoka,
  • Eugenia-Ana Capota and
  • Răzvan-Dorel Cioargă

26 January 2025

The Internet of Things produces vast amounts of data that require specialized algorithms in order to secure them. Lightweight cryptography requires ciphers designed to work on resource-constrained devices like sensors and smart things. A new encrypti...

  • Article
  • Open Access
18 Citations
7,761 Views
24 Pages

A Performance Analysis of You Only Look Once Models for Deployment on Constrained Computational Edge Devices in Drone Applications

  • Lucas Rey,
  • Ana M. Bernardos,
  • Andrzej D. Dobrzycki,
  • David Carramiñana,
  • Luca Bergesio,
  • Juan A. Besada and
  • José Ramón Casar

Advancements in embedded systems and Artificial Intelligence (AI) have enhanced the capabilities of Unmanned Aircraft Vehicles (UAVs) in computer vision. However, the integration of AI techniques o-nboard drones is constrained by their processing cap...

of 36