The Role of Internet of Things (IoT) in Smart Networks: A Case Study of Smart Energy Monitoring
DOI:
https://doi.org/10.58564/IJCCN.1.2.2025.8Abstract
In this study, [short description of subject matter] is investigated through the analysis of [methods, scope, or major elements]. The principal aim is to [identify the goal or purpose], and [methodologies/tools used] are applied in the study to analyze [data or context]. Results The results show that [dominant results], providing insights into [implications or future directions]. The present work is relevant to the knowledge of [field/topic], as well as provides possible solutions on how to make user authentication more secure in the era of digitalization, as the number of cyberattacks and identity thefts has increased significantly. The password is the most common way of authentication; weak or easily guessable passwords are very serious issues that are of concern to the security of information. The concept is used to assess password strength in this research.
References
[1] Elmaghraby, A., Shokri, A., & Ghoneim, A. (2020). IoT and blockchain integration for smart grid energy systems. Journal of Smart Systems, 15(3), 101–110.
[2] Wang, H., Liu, Y., & Zhang, T. (2022). Machine learning for smart home energy prediction. Energy Informatics, 5(1), 45–56.
[3] Rault, T., Bouabdallah, A., & Challal, Y. (2019). Energy efficiency in wireless sensor networks: A top-down survey. Computer Networks, 67, 104–122.
[4] Mohammed, A. H., Refaey, M., & Hossain, E. (2021). Edge computing for smart grid: An overview and research opportunities. IEEE Transactions on Industrial Informatics, 17(6), 4236–4247.
[5] Li, S., Da Xu, L., & Zhao, S. (2018). 5G Internet of Things: A survey. Journal of Industrial Information Integration, 10, 1–9.
[6] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2019). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
[7] Hashem, I. A. T., Chang, V., Anuar, N. B., Adewole, K. S., Yaqoob, I., Gani, A., ... & Buyya, R. (2023). The role of big data in smart city. International Journal of Information Management, 102, 102–125.
[8] Gaur, A., Scotney, B., Parr, G., & McClean, S. (2020). Smart city architecture and its applications based on IoT. Procedia Computer Science, 52, 1089–1094.
[9] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
[10] Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.
[11] Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728–2742.
[12] Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.
[13] Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.
[14] Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.
[15] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
[16] Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5), 637–646.
[17] Elmaghraby, A., Shokri, A., & Ghoneim, A. (2020). IoT and blockchain integration for smart grid energy systems. Journal of Smart Systems, 15(3), 101–110.
[18] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2019). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Safa A. Namah, Marwah M. Abed, Nalbantoglu O.U., Kawther A. Neamah

This work is licensed under a Creative Commons Attribution 4.0 International License.