{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T12:23:43Z","timestamp":1768393423231,"version":"3.49.0"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100025294","name":"Taighde \u00c9ireann\u2014Research Ireland","doi-asserted-by":"crossref","award":["18\/CRT\/6049"],"award-info":[{"award-number":["18\/CRT\/6049"]}],"id":[{"id":"10.13039\/501100025294","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2025.3649498","type":"journal-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T18:39:43Z","timestamp":1767119983000},"page":"442-460","source":"Crossref","is-referenced-by-count":0,"title":["Securing IoT Using Lightweight TCN for Edge Deployment on Raspberry Pi 4"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4718-187X","authenticated-orcid":false,"given":"Mirza","family":"Akhi","sequence":"first","affiliation":[{"name":"Department of Electronic and Computer Engineering, University of Limerick, Limerick, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8383-2635","authenticated-orcid":false,"given":"Ciar\u00e1n","family":"Eising","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, University of Limerick, Limerick, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7654-4117","authenticated-orcid":false,"given":"Lubna Luxmi","family":"Dhirani","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, University of Limerick, Limerick, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3531659"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s21113901"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3346320"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/ijms241814168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s20195499"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i3.929"},{"key":"ref7","volume-title":"Landscape of edge computing standards","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.3202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3416808"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.63180\/jcsra.thestap.2025.1.1"},{"key":"ref11","first-page":"57","volume-title":"Cyber-Resilience, Principles, and Practices","author":"Meagher","year":"2024"},{"issue":"10","key":"ref12","doi-asserted-by":"crossref","first-page":"3744","DOI":"10.3390\/s22103744","article-title":"Intrusion detection in Internet of Things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets","volume":"22","author":"Gyamfi","year":"2022","journal-title":"Sensors"},{"key":"ref13","volume-title":"IDS VS SIEM: Essential guide to OT security","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2400445"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3526883"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2025.102049"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI61247.2024.00075"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2022-0155"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-10092-0"},{"key":"ref21","article-title":"Optimizing edge AI: A comprehensive survey on data, model, and system strategies","author":"Wang","year":"2025","journal-title":"arXiv:2501.03265"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/agriculture15030332"},{"key":"ref23","article-title":"Stealthy backdoor attack to real-world models in android apps","author":"Wei","year":"2025","journal-title":"arXiv:2501.01263"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.dib.2025.112222","article-title":"Datasets for distributed denial-of-service detection in healthcare Internet of Things environments","volume":"63","author":"Akhi","year":"2025","journal-title":"Data Brief"},{"key":"ref25","volume-title":"Mirzaakhi\/UL-ECE-DDoS-H-IoT-Datasets2025: Initial release of UL-ECE-DDoS-H-IoT2025 datasets (v1.0.0)","author":"Akhi","year":"2025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s25020504"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app15041965"},{"issue":"6","key":"ref28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.3390\/technologies12060081","article-title":"A survey of machine learning in edge computing: Techniques, frameworks, applications, issues, and research directions","volume":"12","author":"Jouini","year":"2024","journal-title":"Technologies"},{"key":"ref29","volume-title":"How to check power consumption on raspberry Pi","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EmergiTech.2016.7737367"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3340142"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102899"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983568"},{"key":"ref35","volume-title":"NSL-KDD dataset (CSV version)","author":"Hassan Zaib","year":"2025"},{"key":"ref36","volume-title":"WSN-DDoS-attack-H-IoT2023 dataset for time series anomaly detection in healthcare-IoT","author":"Akhi","year":"2025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-85248-z"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2020.107365"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/app15094898"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12173541"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3189776"},{"key":"ref42","article-title":"Low-bit model quantization for deep neural networks: A survey","author":"Liu","year":"2025","journal-title":"arXiv:2505.05530"},{"key":"ref43","first-page":"177","article-title":"Octo:{INT8} training with loss-aware compensation and backward quantization for tiny on-device learning","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Zhou"},{"key":"ref44","volume-title":"Quantization aware training","year":"2023"},{"key":"ref45","article-title":"Benchmarking TinyML systems: Challenges and direction","author":"Banbury","year":"2020","journal-title":"arXiv:2003.04821"},{"key":"ref46","volume-title":"Numerical Methods for Engineers","author":"Chapra","year":"2011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2090\/1\/012104"},{"key":"ref48","volume-title":"UL-ECE-IoT DDoS detection power consumption recordings on raspberry Pi 4","author":"Akhi","year":"2025"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s25216590"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-443-13223-0.00019-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.37256\/cnc.3120256140"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.5359954","volume-title":"Systematic literature review on security mechanisms for IoT device firmware update","author":"Huang","year":"2025"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s25072292"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/computers14090391"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4103\/jssrp.jssrp_8_25"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3600161"},{"key":"ref57","first-page":"561","article-title":"Real-time sensing tools for the detection of sudden extreme weather events","volume-title":"Proc. ICSI","author":"Pozzebon"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-025-05732-z"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2025.3534441"},{"key":"ref60","article-title":"Enhancing trust in NIDS: From flawed benchmarks to formal guarantees","author":"Flood","year":"2025"},{"key":"ref61","author":"Jain","year":"2020","journal-title":"Electroencephalogram (EEG) health monitoring system dataset"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11318643.pdf?arnumber=11318643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:56:13Z","timestamp":1768373773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3649498","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}