• Home
  • Internet of Things (IoT)
    • List of Articles Internet of Things (IoT)

      • Open Access Article

        1 - Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms
        Mohammad sedighimanesh Hessam  Zandhessami Mahmood  Alborzi Mohammadsadegh  Khayyatian
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The mos More
        Energy is an important parameter in establishing various communications types in the sensor-based IoT. Sensors usually possess low-energy and non-rechargeable batteries since these sensors are often applied in places and applications that cannot be recharged. The most important objective of the present study is to minimize the energy consumption of sensors and increase the IoT network's lifetime by applying multi-objective optimization algorithms when selecting cluster heads and routing between cluster heads for transferring data to the base station. In the present article, after distributing the sensor nodes in the network, the type-2 fuzzy algorithm has been employed to select the cluster heads and also the genetic algorithm has been used to create a tree between the cluster heads and base station. After selecting the cluster heads, the normal nodes become cluster members and send their data to the cluster head. After collecting and aggregating the data by the cluster heads, the data is transferred to the base station from the path specified by the genetic algorithm. The proposed algorithm was implemented with MATLAB simulator and compared with LEACH, MB-CBCCP, and DCABGA protocols, the simulation results indicate the better performance of the proposed algorithm in different environments compared to the mentioned protocols. Due to the limited energy in the sensor-based IoT and the fact that they cannot be recharged in most applications, the use of multi-objective optimization algorithms in the design and implementation of routing and clustering algorithms has a significant impact on the increase in the lifetime of these networks. Manuscript profile
      • Open Access Article

        2 - Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
        Mohammad  Nazarpour navid nezafati Sajjad  Shokouhyar
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detect More
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB. Manuscript profile
      • Open Access Article

        3 - A new approach to IoT-based disease diagnosis using genetic algorithms and various classifiers
        seyed ebrahim dashti maryam nikpor mehdi nikpor mahbobe johari
        Medical information technology and health services are related to the national welfare and livelihood of the people. The integration of cloud computing and the Internet of Things will be a major breakthrough in modern medical applications. This study focuses on the chro More
        Medical information technology and health services are related to the national welfare and livelihood of the people. The integration of cloud computing and the Internet of Things will be a major breakthrough in modern medical applications. This study focuses on the chronic disease of diabetes, which is one of the leading causes of death worldwide. This research has applied medical information technology in the field of IoT, especially in the field of medical monitoring and management applications. A model architecture for remote monitoring and management of the health information cloud platform is proposed and analyzed, and then an algorithm based on genetic algorithm and hybrid classification for the diagnosis of diabetes is proposed for medical monitoring. The results show that the proposed method has a higher performance than the basic methods and has reached an accuracy of 94%. Manuscript profile
      • Open Access Article

        4 - Modeling and evaluation of RPL routing protocol by colored Petri nets
        Mohammad Pishdar Younes Seifi
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of More
        The Internet of Things (IoT) is a novel and widely used idea aimed at connecting objects through communication technologies. The problem of the prior technology adaptation has always been one of the most challenging issues in this area over the years. The Recognition of Prior Learning (RPL) protocol has been proposed by scientists since 2012 as a solution for IoT routing. This protocol has been utilized by many researchers and hardware companies in the field of the mentioned technology. The present study evaluates RPL behavior from the perspective of the existence of stopping conditions, crossing multiple routes from a special route (loop conditions), and how it reacts to different inputs, while presenting a modular and readable model of this protocol. Manuscript profile
      • Open Access Article

        5 - Strategies and Ecosystem Transformations in the Internet of Everything in Malaysia
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and chal More
        In the digital era, the Internet of Everything (IoE) technology has rapidly become a cornerstone of technological and economic development. Malaysia, as one of the leading and developing countries in Southeast Asia, has examined its preparedness, opportunities, and challenges for adopting and developing this technology through the formulation of its IoT roadmap. Undoubtedly, the IoT roadmap in Malaysia is one of the most comprehensive documents in the study of macro-level Internet of Everything plans. This roadmap provides an analysis of Malaysia's current and future position in the IoT domain, including infrastructure, data and information, security, ecosystem, and talent, followed by a gap analysis. Studies show that the adoption of the next generation of information and communication technology in Malaysia has paved the way for the development of the IoE, outlined opportunities for economic innovation, and facilitated the commercialization of research outcomes by research organizations. The roadmap also emphasizes the importance of balancing development and security in this field, stating that with progress in this domain, Malaysia can emerge as a top hub and regional focal point for IoE development. The younger generation in Malaysia is highly interested in IoE, and they are not only consumers but also creative developers of this technology. This paper highlights Malaysia's recognition as a global pioneer in the IoE technology sector. The country has become a frontrunner in this field through advancements in infrastructure, increased domestic sales and exports, the development of services and platforms, emphasis on innovation, the importance of human resources, and, most importantly, the formulation of a comprehensive and complete IoT roadmap. Malaysia has benefited in two major ways: by deriving new value from technological innovation and gaining a competitive advantage and market share over governments unable to adapt and invest in the IoE market Manuscript profile