{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:36:33Z","timestamp":1773246993814,"version":"3.50.1"},"reference-count":372,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Food Agility CRC Ltd., through the Commonwealth Government CRC Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3078549","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T20:23:54Z","timestamp":1620678234000},"page":"70961-71012","source":"Crossref","is-referenced-by-count":118,"title":["Internet of Things 2.0: Concepts, Applications, and Future Directions"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7154-4561","authenticated-orcid":false,"given":"Ian","family":"Zhou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6205-5897","authenticated-orcid":false,"given":"Imran","family":"Makhdoom","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4913-0351","authenticated-orcid":false,"given":"Negin","family":"Shariati","sequence":"additional","affiliation":[]},{"given":"Muhammad Ahmad","family":"Raza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3880-6769","authenticated-orcid":false,"given":"Rasool","family":"Keshavarz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2877-1168","authenticated-orcid":false,"given":"Justin","family":"Lipman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4282-6666","authenticated-orcid":false,"given":"Mehran","family":"Abolhasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1807-7220","authenticated-orcid":false,"given":"Abbas","family":"Jamalipour","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref365","first-page":"627","article-title":"Dispersion and nonlinearity engineered metamaterial devices","author":"gupta","year":"2007","journal-title":"Proc Metamaterials"},{"key":"ref275","year":"2020","journal-title":"Products ICT International"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2828978"},{"key":"ref274","year":"2020","journal-title":"DMF4B5R5G105M3DTA0 Murata"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.03.002"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2012.2210736"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4214"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.5772\/62613"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2697839"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8585956"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2019.2947974"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2896321"},{"key":"ref273","year":"2020","journal-title":"Battery Management IC Texas Instruments"},{"key":"ref170","first-page":"393","article-title":"Statistical learning-based dynamic retransmission mechanism for mission critical communication: An edge-computing approach","author":"raza","year":"2020","journal-title":"Proc IEEE 45th Conf Local Comput Netw (LCN)"},{"key":"ref272","year":"2020","journal-title":"Supercapacitor Chargers Analog Devices"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025773"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2017.8229322"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2726014"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872443"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/GWS.2018.8686597"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635663"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2327228"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819196"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2908266"},{"key":"ref39","article-title":"The history began from AlexNet: A comprehensive survey on deep learning approaches","author":"alom","year":"2018","journal-title":"arXiv 1803 01164"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2019.2962540"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911953"},{"key":"ref359","author":"ning","year":"2013","journal-title":"Unit and Ubiquitous Internet of Things"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00060"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/EuMC.2015.7345701"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSensT.2017.8304465"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/EuMC.2014.6986654"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622649"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.sse.2008.12.011"},{"key":"ref35","first-page":"835","article-title":"The fourth ICT-based industrial revolution &#x2018;industry 4.0&#x2019;&#x2014;HMI and the case of CAE\/CAD innovation with eplan p8","author":"luka?","year":"2015","journal-title":"Proc 23rd Telecommun Forum Telfor (TELFOR)"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981970"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2963491"},{"key":"ref288","year":"2019","journal-title":"Oxford Street London Pavegen"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900323"},{"key":"ref287","year":"2020","journal-title":"Da4100 Wattup Wireless Power Transmitter Perpetuum"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"ref286","year":"2019","journal-title":"Da4100 Wattup Wireless Power Transmitter Energous"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref285","author":"das","year":"2009","journal-title":"Batteryless Infrared Remote Control From Arveni IDTechEx"},{"key":"ref284","year":"2019","journal-title":"Enocean Easyclickpro Room Temperature Sensor Nova Pure White EnOcean Alliance"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2875696"},{"key":"ref283","year":"2017","journal-title":"Occupancy Sensor Ceiling Mounted EnOcean"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref282","year":"2014","journal-title":"Key Card Switch EnOcean"},{"key":"ref281","year":"2014","journal-title":"Rocnker Pad (Single Double) EnOcean"},{"key":"ref280","year":"2017","journal-title":"STM 250J OEM Radio Magnet Contact EnOcean"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.001"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref182","year":"2014"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.714"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1089-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2873577"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2016.7598234"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2013.2295069"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921398"},{"key":"ref20","first-page":"11","article-title":"IoT based distributed intelligence technology for hyper-connected space","volume":"33","author":"park","year":"2018","journal-title":"Electron Telecommun Trends"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2773600"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921208"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2016.7811565"},{"key":"ref345","year":"2019","journal-title":"Myriota Product Brief Myriota"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760418"},{"key":"ref346","author":"parr","year":"2019","journal-title":"IoT + Geosatellites A Perfect Match Satnews"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/RFIC.2016.7508293"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470948"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900516"},{"key":"ref279","author":"alliance","year":"2019","journal-title":"Kieback&Peter En Key Room Thermostat EnOcean Alliance"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.09.010"},{"key":"ref293","year":"2020","journal-title":"Matrix Powerwatch"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.07.003"},{"key":"ref292","article-title":"Developing energy harvesting technologies for IoT applications&#x2014;Activities of public and private sectors in Japan","author":"takeuchi","year":"2016","journal-title":"Energy Harvesting Consortium"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3109761.3109768"},{"key":"ref295","year":"2017","journal-title":"Solar Harvester KCF Technologies"},{"key":"ref294","author":"ningbo","year":"2020","journal-title":"Solar Lamp Ningbo Yongjiang Shenzhou Photovoltaic Co Ltd"},{"key":"ref297","year":"2013","journal-title":"Vibration Energy Harvesters Perpetuum"},{"key":"ref296","year":"2020","journal-title":"Product Overview Libelium"},{"key":"ref299","year":"2018","journal-title":"Ultralow Power Energy Harvester and Battery Charger"},{"key":"ref298","year":"2016","journal-title":"P2110-915 MHz RF Powerharvester Receiver"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2897800"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2851244"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2537298"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902862"},{"key":"ref291","year":"2020","journal-title":"Use Cases Thermoelectric Delivers Power for all Industries"},{"key":"ref152","year":"2018"},{"key":"ref290","year":"2020","journal-title":"SR65 Wireless Outdoor Temperature Sensor Thermokon"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2906228"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461193"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979954"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452267"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600443CM"},{"key":"ref289","year":"2020","journal-title":"Smart Solar Street Lights EnGoplanet"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref58","first-page":"312","article-title":"Logistic regression","author":"ryan","year":"2009","journal-title":"Modern Regression Methods"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1198"},{"key":"ref56","first-page":"501","article-title":"Support vector machine: Itself an intelligent systems","author":"ali","year":"2009","journal-title":"Handbook of Research on Modern Systems Analysis and Design Technologies and Applications"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2790388"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2017.8316459"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.05.011"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.08.001"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2941458"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7_1"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502484"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815419"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460110"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872781"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600408"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822398"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600940"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref3","volume":"1","author":"cisco","year":"2018","journal-title":"Cisco visual networking index Forecast and trends 2017&#x2013;2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"ref8","author":"goldfein","year":"2019","journal-title":"The Internet of Things 2 0&#x2014;The Technology Revolution Mercury"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2904968"},{"key":"ref7","year":"2017","journal-title":"What is coming in IoT 2 0? Techiexpert"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701231"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108527"},{"key":"ref9","author":"litwin","year":"2020","journal-title":"Industrial IoT How IoT Has Evolved and Moved into the IoT 2 0 Era MarketScale"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2899421"},{"key":"ref366","first-page":"1","article-title":"Analog signal processing in transmission line metamaterial structures","volume":"18","author":"gupta","year":"2009","journal-title":"Radioengineering"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1109\/APMC.2012.6421705"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2018.00122"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27072-2_5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00080"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.k.190702.005"},{"key":"ref47","first-page":"1","article-title":"Three tier fog networks: Enabling IoT\/5G for latency sensitive applications","volume":"16","author":"shahzadi","year":"2019","journal-title":"China Commun"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.019"},{"key":"ref41","first-page":"47","article-title":"Finite Markov decision processes","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ECMSM.2017.7945879"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614777"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38082-2_14"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45316-9_6"},{"key":"ref73","first-page":"363","article-title":"Sequence modeling: Recurrent and recursive nets","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref72","first-page":"321","article-title":"Convolutional networks","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref71","first-page":"163","article-title":"Deep feedforward networks","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-921-7.ch012"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2015.7304400"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref317","first-page":"1","article-title":"Multi-port leaky-wave antennas as real-time analog spectral decomposers","author":"emara","year":"2020","journal-title":"Proc of the European Conf on Antennas and Propag (EuCAP)"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7_14"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2034223"},{"key":"ref74","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"chung","year":"2014","journal-title":"arXiv 1412 3555"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666299"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00481-6"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/APMC.2017.8251400"},{"key":"ref313","first-page":"1","article-title":"Efficient design of rectifying antennas for low power detection","author":"marian","year":"2011","journal-title":"IEEE MTT-S Int Microw Symp Dig"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2035947"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.23919\/EuCAP48036.2020.9135504"},{"key":"ref79","first-page":"269","article-title":"A survey of clustering algorithms","author":"rokach","year":"2010","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGRC.2011.5991826"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1016\/j.physb.2013.12.040"},{"key":"ref63","first-page":"118","article-title":"Na?ve Bayes classifier","author":"cichosz","year":"2015","journal-title":"Handbook of Research on Modern Systems Analysis and Design Technologies and Applications"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2013.2288939"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/6668.990673"},{"key":"ref65","first-page":"18","article-title":"Survey of classification techniques in data mining","volume":"1","author":"phyu","year":"2009","journal-title":"Proc Int Multi Conf Eng Comput Scientists"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1186\/s40309-018-0139-7"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-019-00194-y"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2013.2262687"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2018.1526760"},{"key":"ref300","year":"2020","journal-title":"Technical Data Sheet Preliminary Marlow"},{"key":"ref68","first-page":"3753","article-title":"Kernel Bayes&#x2019; rule: Bayesian inference with positive definite kernels","volume":"14","author":"fukumizu","year":"2013","journal-title":"Journal of Machine Learning Research"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2019.152913"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2018.03.001"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.23919\/EuMC.2012.6459223"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2783901"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2951109"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.02.005"},{"key":"ref198","article-title":"A comparison of link layer attacks on wireless sensor networks","author":"mohammadi","year":"2011","journal-title":"arXiv 1103 5589"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948149"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2296-6.ch003"},{"key":"ref195","article-title":"Fault attacks on secure chips: From glitch to flash","author":"skorobogatov","year":"2011","journal-title":"Design and Security of Cryptographic Algorithms and Devices (ECRYPT II)"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_11"},{"key":"ref95","first-page":"119","article-title":"Temporal-difference learning","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9383-6"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2"},{"key":"ref191","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-0-387-71829-3_2","article-title":"Introduction to side-channel attacks","author":"standaert","year":"2010","journal-title":"Secure Integrated Circuits and Systems"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500157RP"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2003.822000"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800418"},{"key":"ref90","first-page":"493","article-title":"Autoencoders","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884906"},{"key":"ref341","first-page":"61","article-title":"The 5G-enabled tactile Internet: Applications, requirements, and architecture","author":"simsek","year":"2016","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.42"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5931315"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-018-0618-4"},{"key":"ref333","first-page":"132","article-title":"A comprehensive review on usage of Internet of Things (IoT) in healthcare system","author":"r","year":"2015","journal-title":"Proc Int Conf Emerg Res Electron Comput Sci Technol (ICERECT)"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","article-title":"A survey on transfer learning","volume":"22","author":"jialin pan","year":"2010","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref339","first-page":"2067","article-title":"Internet of Things (IoT) enabled smart animal farm","author":"memon","year":"2016","journal-title":"Proc 3rd Int Conf Comput Sustain Global Develop (INDIACom)"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.3390\/s18082674"},{"key":"ref96","first-page":"321","article-title":"Policy gradient methods","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/ICMDCS.2017.8211551"},{"key":"ref97","first-page":"1107","article-title":"Least-squares policy iteration","volume":"4","author":"lagoudakis","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-224-1_16"},{"key":"ref81","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref84","first-page":"3","article-title":"The four purposes of multidimensional scaling","author":"borg","year":"2005","journal-title":"Modern Multidimensional Scaling Theory and Applications"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6704-4_2"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"ref80","first-page":"93","article-title":"The expectation-maximization algorithm","author":"molenberghs","year":"0","journal-title":"Missing Data in Clinical Studies"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.31"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.62"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2012.15"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.09.009"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845464"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-NC.2013.6694050"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73750-6"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2018.8340470"},{"key":"ref86","first-page":"261","article-title":"Classical scaling","author":"borg","year":"2005","journal-title":"Modern Multidimensional Scaling Theory and Applications"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.017"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2006.04.006"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231103"},{"key":"ref88","first-page":"15","article-title":"An introduction to diffusion maps","author":"de la porte","year":"2008","journal-title":"Proc 19th Symp Pattern Recognit Assoc South Afr (PRASA)"},{"key":"ref200","article-title":"Survey of security and privacy issues of Internet of Things","author":"borgohain","year":"2015","journal-title":"arXiv 1501 02211"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450432"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2018.06.003"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.250241"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542881"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745382"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref206","author":"murphy","year":"2016","journal-title":"Enhanced Security Controls for IBM Watson IoT Platform"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3051335"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref212","first-page":"146","article-title":"Blockchain-based database to ensure data integrity in cloud computing environments","volume":"1816","author":"gaetani","year":"2017","journal-title":"Proc CEUR Workshop"},{"key":"ref213","author":"sara","year":"2018","journal-title":"Facebook Has Been Worried About Data Leaks Like This Since it Went Public in 2012"},{"key":"ref214","author":"granville","year":"2018","journal-title":"Facebook and Cambridge Analytica What you need to know as fallout widens"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref216","year":"2017","journal-title":"The Ten Most Critical Web Application Security Risks"},{"key":"ref217","year":"2016","journal-title":"SQLi XSS zero-days expose Belkin IoT devices Android smart phones"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874978"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"ref220","year":"2018","journal-title":"The Evolution of Cross-site Scripting Attack"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983155"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"ref229","article-title":"W32. Stuxnet dossier","volume":"5","author":"falliere","year":"2011"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.008"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.12.004"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1063\/1.4981969"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2019.8743905"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-0026-3.ch008"},{"key":"ref127","year":"2019","journal-title":"Kirin - hisilicon"},{"key":"ref126","year":"2019","journal-title":"Qualcomm Snapdragon 855 Mobile Platform Product Brief"},{"key":"ref125","year":"2019","journal-title":"USB Accelerator Datasheet"},{"key":"ref124","year":"2019","journal-title":"Edge TPU Performance Benchmarks"},{"key":"ref129","year":"2019","journal-title":"Mediatek Helio P90 Product Brief MediaTek"},{"key":"ref128","year":"2019","journal-title":"Exynos 9820 the Next-Level Processor for the Mobile Future Samsung"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891073"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2662008"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701939"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00154"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.72"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2769106"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"ref230","author":"langner","year":"2013","journal-title":"To Kill a Centrifuge A Technical Analysis of What Stuxnet&#x2019;s Creators Tried to Achieve"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2867288"},{"key":"ref239","year":"2012","journal-title":"Guide for Conducting Risk Assessment"},{"key":"ref238","year":"2017","journal-title":"ISO 27001 Risk Assessments IT Governance U K"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"ref234","author":"amies","year":"2012","journal-title":"Developing and Hosting Applications on the Cloud"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref236","first-page":"47","article-title":"Identity-based cryptosystem based on the discrete logarithm problem","author":"shamir","year":"1985","journal-title":"Proc Crypto"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846609"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00018"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170817"},{"key":"ref137","author":"warden","year":"2019","journal-title":"Tinyml Machine Learning with tensorflow Lite on Arduino and Ultra-Low-Power Microcontrollers"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539664"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.23919\/ITU-WT.2018.8597889"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906789"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073806"},{"key":"ref143","year":"2015","journal-title":"Study on Provision of Low-Cost Machine-Type Communications (MTC) User Equipments (UES) Based on LTE Standard 36 888"},{"key":"ref2","year":"2012"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00034"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECENG.2011.6057290"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2612223"},{"key":"ref241","author":"greenstein","year":"2016","journal-title":"IoT Devices Used in DDoS Attacks"},{"key":"ref242","year":"2016","journal-title":"IoT Security An IBM Position Paper"},{"key":"ref243","year":"2015","journal-title":"Guidance for Securing IoT Using TCG Technology Version 1 Revision 21"},{"key":"ref244","year":"2015","journal-title":"TCG Infrastructure WG TPM Keys for Platform Identity for TPM 1 2"},{"key":"ref240","year":"2016","journal-title":"The CEO&#x2019;s Guide to Data Security Protect Your Data Through Innovation AT&T Cybersecurity Insights"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.006"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2604681"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1407"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76969-9_17"},{"key":"ref249","article-title":"Homomorphic encryption in a healthcare network environment, system and methods","author":"soon-shiong","year":"2019"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.053891335"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.72"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058288"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457131"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2015.7366231"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13102-3_72"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.11.010"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794614"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/SYSMART.2016.7894539"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-0834-5"},{"key":"ref250","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref251","year":"2017","journal-title":"Hyperledger Business Blockchain Technologies The Linux Foundation"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.110"},{"key":"ref255","first-page":"1","article-title":"Securing the Internet of Things: A proposed framework","volume":"17","author":"jazib","year":"2015","journal-title":"Cisco Security Res Oper"},{"key":"ref252","article-title":"Cloud-based virtual private access systems and methods","author":"foxhoven","year":"2019"},{"key":"ref253","year":"2012","journal-title":"Information Security Advice Network Segmentation and Segregation Australian Government Department of Defence"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2016.7737142"},{"key":"ref259","author":"\u00fcnl\u00fc","year":"2018","journal-title":"Energy Harvesting Technologies for IoT Edge Devices"},{"key":"ref10","author":"gomez","year":"2020","journal-title":"IoT 2 0 The Intelligence of Things Koombea"},{"key":"ref258","year":"2015","journal-title":"IBM Point of View Internet of Things Security"},{"key":"ref11","author":"carter","year":"2017","journal-title":"A closer look at the Internet of Things 2 0&#x2013;and Why it&#x2019;s Inevitable Techradar"},{"key":"ref12","year":"2018","journal-title":"IoT2 0 Youtube"},{"key":"ref13","author":"abbas","year":"2018","journal-title":"IoT 2 0 Revolutionize Internet of Things (IoT 2 0) Using Blockchain IoTWorld"},{"key":"ref14","year":"2019","journal-title":"IoT 2 0 The Next Phase of SmartThings Engagement and Growth Youtube"},{"key":"ref15","article-title":"IoT 2.0 and the Internet of transformation","author":"nativi","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46338-3_3"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319255"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIOT.2020.9125421"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/GSMM.2018.8439323"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2463313"},{"key":"ref19","first-page":"1","article-title":"An IoT for everyone: Fact or fiction","author":"ferrari","year":"2018","journal-title":"Proc 32nd Int BCS Hum Comput Interact Conf"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF.2018.8516953"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600304WC"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.23919\/ITU-WT.2018.8598115"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.07.015"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"ref120","year":"2019","journal-title":"Hardware for every situation"},{"key":"ref121","year":"2018","journal-title":"Product Brief Intel Movidius Myriad X VPU Enhanced Visual Intelligence at the Network Edge"},{"key":"ref122","year":"2019","journal-title":"Intel neural compute stick 2"},{"key":"ref123","year":"2019","journal-title":"Dev Board Datasheets"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1038\/srep01864"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2015.2416233"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1038\/srep09655"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1038\/srep00841"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2013.2258168"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.9"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.3390\/s18124113"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09427249.pdf?arnumber=9427249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:02Z","timestamp":1639770962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9427249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":372,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3078549","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}