Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal on Internet of Things (IoT) published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions
- High Visibility: indexed within Scopus, EBSCO, and other databases.
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 23.3 days after submission; acceptance to publication is undertaken in 5.5 days (median values for papers published in this journal in the second half of 2023).
- Journal Rank: CiteScore - Q1 (Computer Science (miscellaneous))
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
Latest Articles
Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
IoT 2024, 5(1), 20-34; https://doi.org/10.3390/iot5010002 - 10 Jan 2024
Abstract
►
Show Figures
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart houses, connected appliances, shipping,
[...] Read more.
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart houses, connected appliances, shipping, monitoring, smart supply chain management, and smart grids. As the number of devices all over the world is increasing (in all aspects of daily life), huge amounts of data are being produced as a result. New issues are therefore arising from the use and development of current technologies, regarding new applications, regulation, cloud computing, security, and privacy. The blockchain has shown promise in terms of securing and preserving the privacy of users and data, in a decentralized manner. In particular, Hyperledger Fabric v2.x is a new generation of blockchain that is open source and offers versatility, modularity, and performance. In this paper, a blockchain as a service (BaaS) application based on Hyperledger Fabric is presented to address the security and privacy challenges associated with the IoT. A new architecture is introduced to enable this integration, and is developed and deployed, and its performance is analyzed in real-world scenarios. We also propose a new data structure with encryption based on public and private keys for enhanced security and privacy.
Full article
Open AccessArticle
A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
IoT 2024, 5(1), 1-19; https://doi.org/10.3390/iot5010001 - 30 Dec 2023
Abstract
►▼
Show Figures
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles (IoV), motivated
[...] Read more.
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles (IoV), motivated by an unparalleled surge of connected vehicles on the roads. IoV has become an area of significant interest due to its potential in enhancing traffic safety as well as providing accurate routing information. The primary objective of IoV is to maintain strict latency standards while ensuring confidentiality and security. Given the high mobility and limited bandwidth, vehicles need to have rapid and frequent authentication. Securing Vehicle-to-Roadside unit (V2R) and Vehicle-to-Vehicle (V2V) communications in IoV is essential for preventing critical information leakage to an adversary or unauthenticated users. To address these challenges, this paper proposes a novel mutual authentication protocol which incorporates hardware-based security primitives, namely physically unclonable functions (PUFs) with Multi-Input Multi-Output (MIMO) physical layer communications. The protocol allows a V2V and V2R to mutually authenticate each other without the involvement of a trusted third-party (server). The protocol design effectively mitigates modeling attacks and impersonation attempts, where the accuracy of predicting the value of each PUF response bit does not exceed 54%, which is equivalent to a random guess.
Full article
Figure 1
Open AccessArticle
A Systematic Approach to Long-Term Storage of Documents Using Digital Twin Technologies
by
and
IoT 2023, 4(4), 610-627; https://doi.org/10.3390/iot4040026 - 04 Dec 2023
Abstract
►▼
Show Figures
The article discusses the modeling of the use of digital twin technologies (a digital twin) for the task of organizing long-term storage of various types of documents. A digital twin in this respect differs from a digital copy, which has no connection with
[...] Read more.
The article discusses the modeling of the use of digital twin technologies (a digital twin) for the task of organizing long-term storage of various types of documents. A digital twin in this respect differs from a digital copy, which has no connection with the real original object. A review of the problem was carried out. We argue that, despite the active use of digital twin technology in various areas, its applications in the area of long-term storage of documents remain limited. At the same time, the task of increasing the durability of documents during long-term storage remains important and largely unresolved. The complexity of solving the problem of long-term storage of documents is considered, and a formal statement of the problem of long-term storage using digital twin technologies is carried out. Destructive factors that affect long-term storage documents and significantly reduce their durability have been identified. A system of indicators has been developed to assess the durability (preservation) of documents. The modeling of the use of digital twin technology in the organization of long-term preservation within the framework of Industry 4.0 was carried out. In the course of modeling, the goals and the strategies of long-term storage were established. Primary mathematical models for controlling destructive factors as well as technological solutions for digital twin long-term storage are proposed. It is assumed that the key part of this technology is the Industrial Internet of Things. The effectiveness of the use of digital twin technologies for solving the problem was assessed. The spheres of application and further ways of research are determined.
Full article
Figure 1
Open AccessArticle
Decentralised IOTA-Based Concepts of Digital Trust for Securing Remote Driving in an Urban Environment
IoT 2023, 4(4), 582-609; https://doi.org/10.3390/iot4040025 - 29 Nov 2023
Abstract
►▼
Show Figures
The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed relying on digital identities, public key cryptography with a
[...] Read more.
The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed relying on digital identities, public key cryptography with a decentralised approach using decentralised identifiers (DIDs) and verifiable credentials (VCs), and an IOTA-based distributed ledger. The provided digital trust solutions were validated by executing them according to the remote driving scenario but with a simulated vehicle and simulated remote driving system. The hybrid simulation mainly focused on the validation of functional, causal temporal correctness, feasibility, and capabilities of the provided solutions. The evaluations indicate that the concepts of digital trust fulfil the purpose and contribute towards making remote driving more trustable. A supervisory stakeholder was used as a verifier, requiring a set of example verifiable credentials from the vehicle and the remote driver, and accepting them to the security control channel. The separation of control and data planes from each other was found to be a good solution because the delays caused by required security control can be limited to the initiation of the remote driving session without causing additional delays in the actual real-time remote driving control data flow. The application of the IOTA Tangle as the verifiable data registry was found to be sufficient for security control purposes. During the evaluations, the need for further studies related to scalability, application of wallets, dynamic trust situations, time-sensitive behaviour, and autonomous operations, as well as smart contract(s) between multiple stakeholders, were detected. As the next step of this research, the provided digital trust solutions will be integrated with a vehicle, remote driving system and traffic infrastructure for evaluation of the performance, reliability, scalability, and flexibility in real-world experiments of remote driving of an electric bus in an urban environment.
Full article
Figure 1
Open AccessArticle
A Smart Fire Detector IoT System with Extinguisher Class Recommendation Using Deep Learning
by
IoT 2023, 4(4), 558-581; https://doi.org/10.3390/iot4040024 - 25 Nov 2023
Abstract
►▼
Show Figures
Fires kill and injure people, destroy residences, pollute the air, and cause economic loss. The damage of the fire can be reduced if we can detect the fire early and notify the firefighters as soon as possible. In this project, a novel Internet
[...] Read more.
Fires kill and injure people, destroy residences, pollute the air, and cause economic loss. The damage of the fire can be reduced if we can detect the fire early and notify the firefighters as soon as possible. In this project, a novel Internet of Things (IoT)-based fire detector device is developed that automatically detects a fire, recognizes the object that is burning, finds out the class of fire extinguisher needed, and then sends notifications with location information to the user and the emergency responders smartphones within a second. This will help firefighters to arrive quickly with the correct fire extinguisher—thus, the spread of fire can be reduced. The device detects fire using a thermal camera and common objects using a red-green-blue (RGB) camera with a deep-learning-based algorithm. When a fire is detected, the device sends data using the Internet to a central server, and it then sends notifications to the smartphone apps. No smoke detector or fire alarm is available in the literature that can automatically suggest the class of fire extinguisher needed, and this research fills this gap. Prototypes of the fire detector device, the central server for the emergency responder’s station, and smartphone apps have been developed and tested successfully.
Full article
Figure 1
Open AccessArticle
Constraint-Aware Federated Scheduling for Data Center Workloads
IoT 2023, 4(4), 534-557; https://doi.org/10.3390/iot4040023 - 08 Nov 2023
Abstract
The use of data centers is ubiquitous, as they support multiple technologies across domains for storing, processing, and disseminating data. IoT applications utilize both cloud data centers and edge data centers based on the nature of the workload. Due to the stringent latency
[...] Read more.
The use of data centers is ubiquitous, as they support multiple technologies across domains for storing, processing, and disseminating data. IoT applications utilize both cloud data centers and edge data centers based on the nature of the workload. Due to the stringent latency requirements of IoT applications, the workloads are run on hardware accelerators such as FPGAs and GPUs for faster execution. The introduction of such hardware alongside existing variations in the hardware and software configurations of the machines in the data center, increases the heterogeneity of the infrastructure. Optimal job performance necessitates the satisfaction of task placement constraints. This is accomplished through constraint-aware scheduling, where tasks are scheduled on worker nodes with appropriate machine configurations. The presence of placement constraints limits the number of suitable resources available to run a task, leading to queuing delays. As federated schedulers have gained prominence for their speed and scalability, we assess the performance of two such schedulers, Megha and Pigeon, within a constraint-aware context. We extend our previous work on Megha by comparing its performance with a constraint-aware version of the state-of-the-art federated scheduler Pigeon, PigeonC. The results of our experiments with synthetic and real-world cluster traces show that Megha reduces the 99th percentile of job response time delays by a factor of 10 when compared to PigeonC. We also describe enhancements made to Megha’s architecture to improve its scheduling efficiency.
Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
►▼
Show Figures
Figure 1
Open AccessArticle
A Novel Internet of Things-Based System for Ten-Pin Bowling
by
and
IoT 2023, 4(4), 514-533; https://doi.org/10.3390/iot4040022 - 31 Oct 2023
Abstract
Bowling is a target sport that is popular among all age groups with professionals and amateur players. Delivering an accurate and consistent bowling throw into the lane requires the incorporation of motion techniques. Consequently, this research presents a novel IoT Cloud-based system for
[...] Read more.
Bowling is a target sport that is popular among all age groups with professionals and amateur players. Delivering an accurate and consistent bowling throw into the lane requires the incorporation of motion techniques. Consequently, this research presents a novel IoT Cloud-based system for providing real-time monitoring and coaching services to bowling athletes. The system includes two inertial measurement units (IMUs) sensors for capturing motion data, a mobile application, and a Cloud server for processing the data. First, the quality of each phase of a throw is assessed using a Dynamic Time Warping (DTW)-based algorithm. Second, an on-device-level technique is proposed to identify common bowling errors. Finally, an SVM classification model is employed for assessing the skill level of bowler athletes. We recruited nine right-handed bowlers to perform 50 throws wearing the two sensors and using the proposed system. The results of our experiments suggest that the proposed system can effectively and efficiently assess the quality of the throw, detect common bowling errors, and classify the skill level of the bowler.
Full article
(This article belongs to the Topic Machine Learning in Internet of Things)
►▼
Show Figures
Figure 1
Open AccessReview
Internet-of-Things Edge Computing Systems for Streaming Video Analytics: Trails Behind and the Paths Ahead
IoT 2023, 4(4), 486-513; https://doi.org/10.3390/iot4040021 - 24 Oct 2023
Abstract
►▼
Show Figures
The falling cost of IoT cameras, the advancement of AI-based computer vision algorithms, and powerful hardware accelerators for deep learning have enabled the widespread deployment of surveillance cameras with the ability to automatically analyze streaming video feeds to detect events of interest. While
[...] Read more.
The falling cost of IoT cameras, the advancement of AI-based computer vision algorithms, and powerful hardware accelerators for deep learning have enabled the widespread deployment of surveillance cameras with the ability to automatically analyze streaming video feeds to detect events of interest. While streaming video analytics is currently largely performed in the cloud, edge computing has emerged as a pivotal component due to its advantages of low latency, reduced bandwidth, and enhanced privacy. However, a distinct gap persists between state-of-the-art computer vision algorithms and the successful practical implementation of edge-based streaming video analytics systems. This paper presents a comprehensive review of more than 30 research papers published over the last 6 years on IoT edge streaming video analytics (IE-SVA) systems. The papers are analyzed across 17 distinct dimensions. Unlike prior reviews, we examine each system holistically, identifying their strengths and weaknesses in diverse implementations. Our findings suggest that certain critical topics necessary for the practical realization of IE-SVA systems are not sufficiently addressed in current research. Based on these observations, we propose research trajectories across short-, medium-, and long-term horizons. Additionally, we explore trending topics in other computing areas that can significantly impact the evolution of IE-SVA systems.
Full article
Figure 1
Open AccessArticle
IoT-Applicable Generalized Frameproof Combinatorial Designs
by
and
IoT 2023, 4(3), 466-485; https://doi.org/10.3390/iot4030020 - 21 Sep 2023
Cited by 1
Abstract
►▼
Show Figures
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a
[...] Read more.
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efficient data transfer in sensor-based IoTs is built using ramp-type schemes. Protecting personal privacy and reinforcing the security of electronic identification (eID) cards can be achieved using similar schemes. Desmedt et al. introduced the concept of frameproofness in 2021, which motivated us to further improve our construction with respect to this framework. We introduce a graph theoretic approach to the design for a well-rounded and easy presentation of the idea and clarity of our results. We also highlight the importance of secret sharing schemes for IoT applications, as they distribute the secret amongst several devices. Secret sharing schemes offer superior security in lightweight IoT compared to symmetric key encryption or AE schemes because they do not disclose the entire secret to a single device, but rather distribute it among several devices.
Full article
Figure 1
Open AccessArticle
Challenges and Opportunities in the Internet of Intelligence of Things in Higher Education—Towards Bridging Theory and Practice
IoT 2023, 4(3), 430-465; https://doi.org/10.3390/iot4030019 - 14 Sep 2023
Abstract
►▼
Show Figures
The application of the Internet of Things is increasing in momentum as advances in artificial intelligence exponentially increase its integration. This has caused continuous shifts in the Internet of Things paradigm with increasing levels of complexity. Consequently, researchers, practitioners, and governments continue facing
[...] Read more.
The application of the Internet of Things is increasing in momentum as advances in artificial intelligence exponentially increase its integration. This has caused continuous shifts in the Internet of Things paradigm with increasing levels of complexity. Consequently, researchers, practitioners, and governments continue facing evolving challenges, making it more difficult to adapt. This is especially true in the education sector, which is the focus of this article. The overall purpose of this study is to explore the application of IoT and artificial intelligence in education and, more specifically, learning. Our methodology follows four research questions. We first report the results of a systematic literature review on the Internet of Intelligence of Things (IoIT) in education. Secondly, we develop a corresponding conceptual model, followed thirdly by an exploratory pilot survey conducted on a group of educators from around the world to get insights on their knowledge and use of the Internet of Things in their classroom, thereby providing a better understanding of issues, such as knowledge, use, and their readiness to integrate IoIT. We finally present the application of the IoITE conceptual model in teaching and learning through four use cases. Our review of publications shows that research in the IoITE is scarce. This is even more so if we consider its application to learning. Analysis of the survey results finds that educators, in general, are lacking in their readiness to innovate with the Internet of Things in learning. Use cases highlight IoITE possibilities and its potential to explore and exploit. Challenges are identified and discussed.
Full article
Figure 1
Open AccessReview
Exploring the Confluence of IoT and Metaverse: Future Opportunities and Challenges
by
and
IoT 2023, 4(3), 412-429; https://doi.org/10.3390/iot4030018 - 12 Sep 2023
Cited by 1
Abstract
►▼
Show Figures
The Internet of Things (IoT) and the metaverse are two rapidly evolving technologies that have the potential to shape the future of our digital world. IoT refers to the network of physical devices, vehicles, buildings, and other objects that are connected to the
[...] Read more.
The Internet of Things (IoT) and the metaverse are two rapidly evolving technologies that have the potential to shape the future of our digital world. IoT refers to the network of physical devices, vehicles, buildings, and other objects that are connected to the internet and capable of collecting and sharing data. The metaverse, on the other hand, is a virtual world where users can interact with each other and digital objects in real time. In this research paper, we aim to explore the intersection of the IoT and metaverse and the opportunities and challenges that arise from their convergence. We will examine how IoT devices can be integrated into the metaverse to create new and immersive experiences for users. We will also analyse the potential use cases and applications of this technology in various industries such as healthcare, education, and entertainment. Additionally, we will discuss the privacy, security, and ethical concerns that arise from the use of IoT devices in the metaverse. A survey is conducted through a combination of a literature review and a case study analysis. This review will provide insights into the potential impact of IoT and metaverse on society and inform the development of future technologies in this field.
Full article
Figure 1
Open AccessReview
Global Models of Smart Cities and Potential IoT Applications: A Review
by
and
IoT 2023, 4(3), 366-411; https://doi.org/10.3390/iot4030017 - 31 Aug 2023
Cited by 1
Abstract
As the world becomes increasingly urbanized, the development of smart cities and the deployment of IoT applications will play an essential role in addressing urban challenges and shaping sustainable and resilient urban environments. However, there are also challenges to overcome, including privacy and
[...] Read more.
As the world becomes increasingly urbanized, the development of smart cities and the deployment of IoT applications will play an essential role in addressing urban challenges and shaping sustainable and resilient urban environments. However, there are also challenges to overcome, including privacy and security concerns, and interoperability issues. Addressing these challenges requires collaboration between governments, industry stakeholders, and citizens to ensure the responsible and equitable implementation of IoT technologies in smart cities. The IoT offers a vast array of possibilities for smart city applications, enabling the integration of various devices, sensors, and networks to collect and analyze data in real time. These applications span across different sectors, including transportation, energy management, waste management, public safety, healthcare, and more. By leveraging IoT technologies, cities can optimize their infrastructure, enhance resource allocation, and improve the quality of life for their citizens. In this paper, eight smart city global models have been proposed to guide the development and implementation of IoT applications in smart cities. These models provide frameworks and standards for city planners and stakeholders to design and deploy IoT solutions effectively. We provide a detailed evaluation of these models based on nine smart city evaluation metrics. The challenges to implement smart cities have been mentioned, and recommendations have been stated to overcome these challenges.
Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
►▼
Show Figures
Figure 1
Open AccessArticle
Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks
IoT 2023, 4(3), 345-365; https://doi.org/10.3390/iot4030016 - 25 Aug 2023
Abstract
►▼
Show Figures
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper, we propose a new integrated model based on deep
[...] Read more.
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper, we propose a new integrated model based on deep autoencoder (AE) for anomaly detection and feature extraction. Firstly, AE is trained based on normal network traffic and used later to detect anomalies. Then, the trained AE model is employed again to extract useful low-dimensional features for anomalous data without the need for a feature extraction training stage, which is required by other methods such as principal components analysis (PCA) and linear discriminant analysis (LDA). After that, the extracted features are used by a machine learning (ML) or deep learning (DL) classifier to determine the type of attack (multi-classification). The performance of the proposed unified approach was evaluated on real IoT datasets called N-BaIoT and MQTTset, which contain normal and malicious network traffics. The proposed AE was compared with other popular anomaly detection techniques such as one-class support vector machine (OC-SVM) and isolation forest (iForest), in terms of performance metrics (accuracy, precision, recall, and F1-score), and execution time. AE was found to identify attacks better than OC-SVM and iForest with fast detection time. The proposed feature extraction method aims to reduce the computation complexity while maintaining the performance metrics of the multi-classifier models as much as possible compared to their counterparts. We tested the model with different ML/DL classifiers such as decision tree, random forest, deep neural network (DNN), conventional neural network (CNN), and hybrid CNN with long short-term memory (LSTM). The experiment results showed the capability of the proposed model to simultaneously detect anomalous events and reduce the dimensionality of the data.
Full article
Figure 1
Open AccessArticle
Efficient Sensing Data Collection with Diverse Age of Information in UAV-Assisted System
IoT 2023, 4(3), 319-344; https://doi.org/10.3390/iot4030015 - 21 Aug 2023
Abstract
With the high flexibility and low cost of the deployment of UAVs, the application of UAV-assisted data collection has become widespread in the Internet of Things (IoT) systems. Meanwhile, the age of information (AoI) has been adopted as a key metric to evaluate
[...] Read more.
With the high flexibility and low cost of the deployment of UAVs, the application of UAV-assisted data collection has become widespread in the Internet of Things (IoT) systems. Meanwhile, the age of information (AoI) has been adopted as a key metric to evaluate the quality of the collected data. Most of the literature generally focuses on minimizing the age of all information. However, minimizing the overall AoI may lead to high costs and massive energy consumption. In addition, not all types of data need to be updated highly frequently. In this paper, we consider both the diversity of different tasks in terms of the data update period and the AoI of the collected sensing information. An efficient data collection method is proposed to maximize the system utility while ensuring the freshness of the collected information relative to their respective update periods. This problem is NP-hard. With the decomposition, we optimize the upload strategy of sensor nodes at each time slot, as well as the hovering positions and flight speeds of UAVs. Simulation results show that our method ensures the relative freshness of all information and reduces the time-averaged AoI by , , , and when the number of UAVs is 1 compared to the corresponding EMA, AOA, DROA, and DRL-eFresh, respectively.
Full article
(This article belongs to the Special Issue 5G Mobile Communication for Intelligent Applications)
►▼
Show Figures
Figure 1
Open AccessReview
A Tutorial on Agricultural IoT: Fundamental Concepts, Architectures, Routing, and Optimization
IoT 2023, 4(3), 265-318; https://doi.org/10.3390/iot4030014 - 27 Jul 2023
Abstract
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of the related literature. The negative impacts of climate change and the
[...] Read more.
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of the related literature. The negative impacts of climate change and the increasing global population on food security and unemployment threats have motivated the adoption of the wireless sensor network (WSN)-based Agri-IoT as an indispensable underlying technology in precision agriculture and greenhouses to improve food production capacities and quality. However, most related Agri-IoT testbed solutions have failed to achieve their performance expectations due to the lack of an in-depth and contextualized reference tutorial that provides a holistic overview of communication technologies, routing architectures, and performance optimization modalities based on users’ expectations. Thus, although IoT applications are founded on a common idea, each use case (e.g., Agri-IoT) varies based on the specific performance and user expectations as well as technological, architectural, and deployment requirements. Likewise, the agricultural setting is a unique and hostile area where conventional IoT technologies do not apply, hence the need for this tutorial. Consequently, this tutorial addresses these via the following contributions: (1) a systematic overview of the fundamental concepts, technologies, and architectural standards of WSN-based Agri-IoT, (2) an evaluation of the technical design requirements of a robust, location-independent, and affordable Agri-IoT, (3) a comprehensive survey of the benchmarking fault-tolerance techniques, communication standards, routing and medium access control (MAC) protocols, and WSN-based Agri-IoT testbed solutions, and (4) an in-depth case study on how to design a self-healing, energy-efficient, affordable, adaptive, stable, autonomous, and cluster-based WSN-specific Agri-IoT from a proposed taxonomy of multi-objective optimization (MOO) metrics that can guarantee an optimized network performance. Furthermore, this tutorial established new taxonomies of faults, architectural layers, and MOO metrics for cluster-based Agri-IoT (CA-IoT) networks and a three-tier objective framework with remedial measures for designing an efficient associated supervisory protocol for cluster-based Agri-IoT networks.
Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
►▼
Show Figures
Figure 1
Open AccessArticle
An IIoT-Device for Acquisition and Analysis of High-Frequency Data Processed by Artificial Intelligence
IoT 2023, 4(3), 244-264; https://doi.org/10.3390/iot4030013 - 25 Jul 2023
Abstract
►▼
Show Figures
This publication presents the development of an Industrial-Internet-of-Things device. The device is capable of completing several tasks, such as the acquisition of high-frequency measurement data and evaluating data via machine learning methods in an artificial intelligence application. The installed measurement technology generates data
[...] Read more.
This publication presents the development of an Industrial-Internet-of-Things device. The device is capable of completing several tasks, such as the acquisition of high-frequency measurement data and evaluating data via machine learning methods in an artificial intelligence application. The installed measurement technology generates data which is comparable to data generated by costly laboratory equipment, meaning that it can be used as a low-budget and open-source alternative. A workflow method has been designed that promotes experimental work and simplifies the effort required to implement artificial intelligence solutions. At the end of this paper, the results of the experiment, which aimed to collect measurement data, extract suitable features, and train artificial intelligence models, are presented. Techniques from vibration analysis were used for feature extraction, and concepts for the extrapolation and enhancement of data sets were investigated. The test results have proven that the development is comparable with high-end laboratory equipment. The created application has demonstrated sufficient accuracy in predictions, and the designed process can be used for arbitrary, artificial intelligence-based rapid prototyping.
Full article
Figure 1
Open AccessArticle
IoT-Enabled Smart Drip Irrigation System Using ESP32
IoT 2023, 4(3), 221-243; https://doi.org/10.3390/iot4030012 - 07 Jul 2023
Cited by 2
Abstract
Agriculture, or farming, is the science of cultivating the soil, growing crops, and raising livestock. Ever since the days of the first plow from sticks over ten thousand years ago, agriculture has always depended on technology. As technology and science improved, so did
[...] Read more.
Agriculture, or farming, is the science of cultivating the soil, growing crops, and raising livestock. Ever since the days of the first plow from sticks over ten thousand years ago, agriculture has always depended on technology. As technology and science improved, so did the scale at which farming was possible. With the popularity and growth of the Internet of Things (IoT) in recent years, there are even more avenues for technology to make agriculture more efficient and help farmers in every nation. In this paper, we designed a smart IoT-enabled drip irrigation system using ESP32 to automate the irrigation process, and we tested it. The ESP32 communicates with the Blynk app, which is used to collect irrigation data, manually water the plants, switch off the automatic watering function, and plot graphs based on the readings of the sensors. We connected the ESP32 to a soil moisture sensor, temperature sensor, air humidity sensor, and water flow sensor. The ESP32 regularly checks if the soil is dry. If the soil is dry and the soil temperature is appropriate for watering, the ESP32 opens a solenoid valve and waters the plants. The amount of time to run the drip irrigation system is determined based on the flow rate measured by the water flow sensor. The ESP32 reads the humidity sensor values and notifies the user when the humidity is too high or too low. The user can switch off the automatic watering system according to the humidity value. In both primary and field tests, we found that the system ran well and was able to grow green onions.
Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
►▼
Show Figures
Figure 1
Open AccessArticle
An IoT- and Cloud-Based E-Waste Management System for Resource Reclamation with a Data-Driven Decision-Making Process
IoT 2023, 4(3), 202-220; https://doi.org/10.3390/iot4030011 - 06 Jul 2023
Cited by 5
Abstract
IoT-based smart e-waste management is an emerging field that combines technology and environmental sustainability. E-waste is a growing problem worldwide, as discarded electronics can have negative impacts on the environment and public health. In this paper, we have proposed a smart e-waste management
[...] Read more.
IoT-based smart e-waste management is an emerging field that combines technology and environmental sustainability. E-waste is a growing problem worldwide, as discarded electronics can have negative impacts on the environment and public health. In this paper, we have proposed a smart e-waste management system. This system uses IoT devices and sensors to monitor and manage the collection, sorting, and disposal of e-waste. The IoT devices in this system are typically embedded with sensors that can detect and monitor the amount of e-waste in a given area. These sensors can provide real-time data on e-waste, which can then be used to optimize collection and disposal processes. E-waste is like an asset to us in most cases; as it is recyclable, using it in an efficient manner would be a perk. By employing machine learning to distinguish e-waste, we can contribute to separating metallic and plastic components, the utilization of pyrolysis to transform plastic waste into bio-fuel, coupled with the generation of bio-char as a by-product, and the repurposing of metallic portions for the development of solar batteries. We can optimize its use and also minimize its environmental impact; it presents a promising avenue for sustainable waste management and resource recovery. Our proposed system also uses cloud-based platforms to help analyze patterns and trends in the data. The Autoregressive Integrated Moving Average, a statistical method used in the cloud, can provide insights into future garbage levels, which can be useful for optimizing waste collection schedules and improving the overall process.
Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
►▼
Show Figures
Figure 1
Open AccessArticle
Performance Modeling and Optimization for a Fog-Based IoT Platform
IoT 2023, 4(2), 183-201; https://doi.org/10.3390/iot4020010 - 02 Jun 2023
Cited by 2
Abstract
►▼
Show Figures
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters.
[...] Read more.
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design method, are expected to provide a useful reference for the design and evaluation of fog computing systems.
Full article
Figure 1
Open AccessReview
IoT Health Devices: Exploring Security Risks in the Connected Landscape
by
, , , , and
IoT 2023, 4(2), 150-182; https://doi.org/10.3390/iot4020009 - 25 May 2023
Cited by 4
Abstract
►▼
Show Figures
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in
[...] Read more.
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.
Full article
Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Electronics, IoT, JSAN, Network, Sensors, Telecom, Technologies
Wireless Energy Harvesting and Power Transfer for Communications and Networks
Topic Editors: Yichuang Sun, Arooj Mubashara Siddiqui, Xiaojing Chen, Oluyomi SimpsonDeadline: 31 December 2024
Topic in
Energies, Sensors, Electronics, Smart Cities, IoT
IoT for Energy Management Systems and Smart Cities, 2nd Volume
Topic Editors: Antonio Cano-Ortega, Francisco Sánchez-SutilDeadline: 30 April 2025
Conferences
Special Issues
Special Issue in
IoT
Cloud and Edge Computing Systems for IoT
Guest Editors: Arun Ravindran, Reshmi MitraDeadline: 29 February 2024
Special Issue in
IoT
6G Optical Internet of Things (OIoT) for Sustainable Smart Cities
Guest Editors: Geetika Aggarwal, Arooj Mubashara SiddiquiDeadline: 15 December 2024