“…References ( Adil, 2021 , Adil, Jan, Mastorakis, Song, Jadoon, Abbas, Farouk, 2021 , Manavi, Nekkanti, Choudhary, Jayapandian, 2020 , Sharma, Bahl, Bagha, Javaid, Shukla, Haleem, 2020 ) discuss the security issues associated with different applications of IoT-powered technologies used in COVID-19 scanning, touch tracking, and surveillance. In Li et al. (2021) , the authors provided a thorough overview of the H-IoT applications leveraging machine learning (ML) strategies for large data analysis.…”