Articles with "constrained iiot" as a keyword



Traces: Inkling Blockchain for Distributed Storage in Constrained IIoT Environments

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3208311

Abstract: Storing data from Industrial-Internet-of-Things (IIoT) sensors in blockchain (BC) for monitoring the applications leads to management issues like bloating. The crux of this work is generating traces (the part of industrial data) using an ARIMA… read more here.

Keywords: distributed storage; storage constrained; constrained iiot; traces inkling ... See more keywords

STREAM-E: A Streamlined Resource Allocation in Multichannel MAC for DSME With Energy-Aware Extension for Constrained-IIoT

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2025.3598485

Abstract: The industrial Internet of things (IIoT) relies heavily on real-time, energy-efficient, and reliable wireless communication. Although the IEEE 802.15.4-based medium access control (MAC) protocols, such as deterministic synchronous multichannel extension (DSME) enhances multichannel access for… read more here.

Keywords: energy; constrained iiot; energy aware; extension ... See more keywords

ROSE-BOX: A Lightweight and Efficient Intrusion Detection Framework for Resource-Constrained IIoT Environments

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Sciences"

DOI: 10.3390/app15126448

Abstract: The rapid advancement of the Industrial Internet of Things (IIoT) has transformed industrial automation, enabling real-time monitoring and intelligent decision making. However, increased connectivity exposes IIoT systems to sophisticated cyber threats, which may pose significant… read more here.

Keywords: detection; resource constrained; constrained iiot; intrusion detection ... See more keywords