{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:27:15Z","timestamp":1775546835895,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C016"],"award-info":[{"award-number":["HR001120C016"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C016"],"award-info":[{"award-number":["HR001120C016"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C016"],"award-info":[{"award-number":["HR001120C016"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C016"],"award-info":[{"award-number":["HR001120C016"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C016"],"award-info":[{"award-number":["HR001120C016"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00083-4","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T19:14:43Z","timestamp":1736450083000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Integrating large language models with internet of things: applications"],"prefix":"10.1007","volume":"5","author":[{"given":"Mingyu","family":"Zong","sequence":"first","affiliation":[]},{"given":"Arvin","family":"Hekmati","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Guastalla","sequence":"additional","affiliation":[]},{"given":"Yiyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,9]]},"reference":[{"key":"83_CR1","unstructured":"IoT ANALYTICS. State of IoT 2023: Number of connected IoT devices growing 16 globally. https:\/\/iot-analytics.com\/number-connected-iot-devices\/. Accessed 7-22-2023."},{"key":"83_CR2","unstructured":"Wang X, Wan Z, Hekmati A, Zong M, Alam S, Zhang M, Krishnamachari B. IoT in the era of generative AI: vision and challenges. 2024. arxiv:2401.01923."},{"key":"83_CR3","unstructured":"Lin Y-Z, Mamun M, Chowdhury MA, Cai S, Zhu M, Latibari BS, Gubbi KI, Bavarsad NN, Caputo A, Sasan A, Homayoun H, Rafatirad S, Satam P, Salehi S. HW-V2W-Map: hardware vulnerability to weakness mapping framework for root cause analysis with GPT-assisted mitigation suggestion. 2023. arxiv:2312.13530."},{"key":"83_CR4","unstructured":"StormWall: State of IoT 2023: number of connected IoT devices growing 16 globally. https:\/\/stormwall.network\/ddos-attack-report-2023. Accessed 6-16-2024."},{"key":"83_CR5","doi-asserted-by":"publisher","unstructured":". Alahmadi AA, Aljabri M, Alhaidari F, Alharthi DJ, Rayani GE, Marghalani LA, Alotaibi OB, Bajandouh SA. Ddos attack detection in iot-based networks using machine learning models: a survey and research directions. Electronics. 2023;12(14). https:\/\/doi.org\/10.3390\/electronics12143103.","DOI":"10.3390\/electronics12143103"},{"key":"83_CR6","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy. 2018. https:\/\/api.semanticscholar.org\/CorpusID:4707749.","DOI":"10.5220\/0006639801080116"},{"key":"83_CR7","unstructured":"Prismarine JS. Mineflayer. GitHub. 2024. https:\/\/github.com\/PrismarineJS\/mineflayer."},{"key":"83_CR8","unstructured":"Wang G, Xie Y, Jiang Y, Mandlekar A, Xiao C, Zhu Y, Fan L, Anandkumar AV. An open-ended embodied agent with large language models. 2023. arxiv:2305.16291."},{"key":"83_CR9","unstructured":"Prenner JA, Robbes R. Automatic program repair with OpenAI\u2019s codex: evaluating QuixBugs. 2021. arxiv:2111.03922."},{"key":"83_CR10","doi-asserted-by":"publisher","unstructured":"Azzar\u00e1 A, Alessandrelli D, Petracca M, Pagano P. Demonstration abstract: Pyot, a macroprogramming framework for the iot. In: IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks, 2014:315\u2013316. https:\/\/doi.org\/10.1109\/IPSN.2014.6846780.","DOI":"10.1109\/IPSN.2014.6846780"},{"key":"83_CR11","doi-asserted-by":"publisher","unstructured":"Yang S, Qiu Y, Hung L, Tasi C. Automated generation of health care dynamic recommendation reports through gpt-powered interoperability in health care iot environment. In: 2023 Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE), pp. 261\u2013265. IEEE Computer Society, Los Alamitos, CA, USA 2023. https:\/\/doi.org\/10.1109\/CSCE60160.2023.00046.","DOI":"10.1109\/CSCE60160.2023.00046"},{"key":"83_CR12","doi-asserted-by":"crossref","unstructured":"Singla T, Anandayuvaraj D, Kalu KG, Schorlemmer TR, Davis JC. An empirical study on using large language models to analyze software supply chain security failures. 2023. arxiv:2308.04898.","DOI":"10.1145\/3605770.3625214"},{"key":"83_CR13","doi-asserted-by":"crossref","unstructured":"Perrina F, Marchiori F, Conti M, Verde NV. AGIR: automating cyber threat intelligence reporting with natural language generation. 2023. arxiv:2310.02655.","DOI":"10.1109\/BigData59044.2023.10386116"},{"key":"83_CR14","unstructured":"Fayyazi R, Taghdimi R, Yang SJ. Advancing TTP analysis: harnessing the power of large language models with retrieval augmented generation. 2024. arxiv:2401.00280."},{"key":"83_CR15","unstructured":"Zhang T, Irsan IC, Thung F, Lo D. CUPID: leveraging ChatGPT for more accurate duplicate bug report detection. 2024. arxiv:2308.10022."},{"key":"83_CR16","unstructured":"Mitra S, Neupane S, Chakraborty T, Mittal S, Piplai A, Gaur M, Rahimi S. LOCALINTEL: Generating organizational threat intelligence from global and local cyber knowledge. 2024. arxiv:2401.10036."},{"key":"83_CR17","unstructured":"Zhang J, Bu H, Wen H, Chen Y, Li L, Zhu H. When LLMs meet cybersecurity: a systematic literature review. 2024. arxiv:2405.03644."},{"key":"83_CR18","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami MS. Internet of things (IoT): a vision, architectural elements, and future directions. 2012. https:\/\/api.semanticscholar.org\/CorpusID:204982032."},{"issue":"2","key":"83_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen M, Mao S, Liu Y. Big data: a survey. Mob Netw Appl. 2014;19(2):171\u2013209. https:\/\/doi.org\/10.1007\/s11036-013-0489-0.","journal-title":"Mob Netw Appl"},{"key":"83_CR20","doi-asserted-by":"crossref","unstructured":"Hussain HA, Mansor Z, Shukur Z, Jafar U. Cost-optimized dynamic access control policy using blockchain and machine learning for enhanced security in IoT smart homes. 2024. https:\/\/api.semanticscholar.org\/CorpusID:267670694.","DOI":"10.1051\/itmconf\/20246301009"},{"key":"83_CR21","doi-asserted-by":"publisher","unstructured":"Nadia R, Tama BA, Song J. Seamless human impedance-based iot authentication with machine learning techniques. In: 2020 International Conference on Information and Communication Technology Convergence (ICTC). 2020:339\u2013343. https:\/\/doi.org\/10.1109\/ICTC49870.2020.9289323.","DOI":"10.1109\/ICTC49870.2020.9289323"},{"issue":"1","key":"83_CR22","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin FA, Feizollah A, Anuar NB, Gani A. Evaluation of machine learning classifiers for mobile malware detection. Soft Comput. 2016;20(1):343\u201357. https:\/\/doi.org\/10.1007\/s00500-014-1511-6.","journal-title":"Soft Comput"},{"key":"83_CR23","doi-asserted-by":"publisher","unstructured":"Song Z, Tian Y, Zhang J, Hao Y. Generating fake cyber threat intelligence using the gpt-neo model. In: 2023 8th International Conference on Intelligent Computing and Signal Processing (ICSP). 2023:920\u2013924. https:\/\/doi.org\/10.1109\/ICSP58490.2023.10248596.","DOI":"10.1109\/ICSP58490.2023.10248596"},{"issue":"10","key":"83_CR24","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.101.2001126","volume":"59","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Mumtaz S, Al-Rubaye S, Al-Dulaimi A, Bashir AK, Khan FA. Securing critical infrastructures: deep-learning-based threat detection in iiot. IEEE Commun Mag. 2021;59(10):76\u201382. https:\/\/doi.org\/10.1109\/MCOM.101.2001126.","journal-title":"IEEE Commun Mag"},{"key":"83_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X, Chen T, Wu J, Yu Q. Intelligent network threat detection engine based on open source gpt-2 model. In: 2023 International Conference on Computer Science and Automation Technology (CSAT), IEEE Computer Society, Los Alamitos, CA, USA. 2023:392\u2013397. https:\/\/doi.ieeecomputersociety.org\/10.1109\/CSAT61646.2023.00107.","DOI":"10.1109\/CSAT61646.2023.00107"},{"key":"83_CR26","doi-asserted-by":"publisher","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","volume":"12","author":"MA Ferrag","year":"2024","unstructured":"Ferrag MA, Ndhlovu M, Tihanyi N, Cordeiro LC, Debbah M, Lestable T, Thandi NS. Revolutionizing cyber threat detection with large language models: a privacy-preserving bert-based lightweight model for iot\/iiot devices. IEEE Access. 2024;12:23733\u201350. https:\/\/doi.org\/10.1109\/ACCESS.2024.3363469.","journal-title":"IEEE Access"},{"issue":"5","key":"83_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D. Iot security techniques based on machine learning: How do iot devices use ai to enhance security? IEEE Signal Process Mag. 2018;35(5):41\u20139. https:\/\/doi.org\/10.1109\/MSP.2018.2825478.","journal-title":"IEEE Signal Process. Mag."},{"key":"83_CR28","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Ndhlovu M, Tihanyi N, Cordeiro L, Debbah m, Lestable T. Revolutionizing cyber threat detection with large language models. https:\/\/doi.org\/10.48550\/arXiv.2306.14263.","DOI":"10.48550\/arXiv.2306.14263"},{"key":"83_CR29","doi-asserted-by":"publisher","unstructured":"Casadei R. Macroprogramming: concepts, state of the art, and opportunities of macroscopic behaviour modelling. ACM Comput Surv. 2023;55(13s). https:\/\/doi.org\/10.1145\/3579353.","DOI":"10.1145\/3579353"},{"key":"83_CR30","doi-asserted-by":"crossref","unstructured":"Mizzi A, Ellul J, Pace GJ. D\u2019artagnan: an embedded dsl framework for distributed embedded systems. In: International Workshop on Real World Domain Specific Languages. 2018. https:\/\/api.semanticscholar.org\/CorpusID:3679699.","DOI":"10.1145\/3183895.3183899"},{"key":"83_CR31","doi-asserted-by":"publisher","unstructured":"Saputra Y, Hua J, Wendt N, Julien C, Roman G-C. Warble: programming abstractions for personalizing interactions in the internet of things. In: 2019 IEEE\/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft), 2019:128\u2013139. https:\/\/doi.org\/10.1109\/MOBILESoft.2019.00026.","DOI":"10.1109\/MOBILESoft.2019.00026"},{"issue":"4","key":"83_CR32","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/TNET.2022.3218933","volume":"31","author":"N Wang","year":"2023","unstructured":"Wang N, Fu J, Zhang S, Zhang Z, Qiao J, Liu J, Bhargava BK. Secure and distributed iot data storage in clouds based on secret sharing and collaborative blockchain. IEEE\/ACM Trans Netw. 2023;31(4):1550\u201365. https:\/\/doi.org\/10.1109\/TNET.2022.3218933.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"83_CR33","doi-asserted-by":"publisher","unstructured":"Zhao Y, Li Q, Yi W, Xiong H. Agricultural iot data storage optimization and information security method based on blockchain. Agriculture. 2023;13(2). https:\/\/doi.org\/10.3390\/agriculture13020274.","DOI":"10.3390\/agriculture13020274"},{"key":"83_CR34","doi-asserted-by":"publisher","unstructured":"De Medeiros K, Hendawi A, Alvarez M. A survey of ai-based anomaly detection in iot and sensor networks. Sensors 2023;23(3). https:\/\/doi.org\/10.3390\/s23031352.","DOI":"10.3390\/s23031352"},{"key":"83_CR35","doi-asserted-by":"publisher","unstructured":"Afshan N, Rout RK. Machine learning techniques for IoT data analytics. 2021:89\u2013113. https:\/\/doi.org\/10.1002\/9781119740780.ch3.","DOI":"10.1002\/9781119740780.ch3"},{"key":"83_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105366","volume":"116","author":"L Yang","year":"2022","unstructured":"Yang L, Shami A. Iot data analytics in dynamic environments: from an automated machine learning perspective. Eng Appl Artif Intell. 2022;116: 105366. https:\/\/doi.org\/10.1016\/j.engappai.2022.105366.","journal-title":"Eng Appl Artif Intell"},{"key":"83_CR37","doi-asserted-by":"publisher","unstructured":"Kurniabudi, Stiawan, D., Darmawijoyo, Bin\u00a0Idris, M.Y., Bamhdi, A.M., Budiarto, R.: Cicids-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921. 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843.","DOI":"10.1109\/ACCESS.2020.3009843"},{"issue":"5","key":"83_CR38","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"SK Pal","year":"1992","unstructured":"Pal SK, Mitra S. Multilayer perceptron, fuzzy sets, and classification. IEEE Trans Neural Netw. 1992;3(5):683\u201397. https:\/\/doi.org\/10.1109\/72.159058.","journal-title":"IEEE Trans. Neural Netw."},{"key":"83_CR39","doi-asserted-by":"crossref","unstructured":"Liu NF, Lin K, Hewitt J, Paranjape A, Bevilacqua M, Petroni F, Liang P. Lost in the middle: how language models use long contexts. 2023. arxiv:2307.03172.","DOI":"10.1162\/tacl_a_00638"},{"key":"83_CR40","unstructured":"OpenAI: Finding GPT-4\u2019s mistakes with GPT-4. https:\/\/openai.com\/index\/finding-gpt4s-mistakes-with-gpt-4\/. Accessed 6-28-2024."},{"key":"83_CR41","unstructured":"Anand A. Temperature readings : IOT Devices. https:\/\/www.kaggle.com\/datasets\/atulanandjha\/temperature-readings-iot-devices. Accessed 01-02-2024."},{"key":"83_CR42","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.enbuild.2015.11.071","volume":"112","author":"LM Candanedo","year":"2016","unstructured":"Candanedo LM, Feldheim V. Accurate occupancy detection of an office room from light, temperature, humidity and co2 measurements using statistical learning models. Energy Build. 2016;112:28\u201339. https:\/\/doi.org\/10.1016\/j.enbuild.2015.11.071.","journal-title":"Energy Build"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00083-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00083-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00083-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T20:05:07Z","timestamp":1736453107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00083-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,9]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["83"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00083-4","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,9]]},"assertion":[{"value":"30 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work does not involve any human subjects, and no IRB approval was needed. We have used ChatGPT for help with proofreading and editing of the text. The authors accept full responsibility for the contents of the paper. As the paper is about applications of LLMs to IoT, LLMs were also used in the technical evaluations as described.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}