Previous Issue
Volume 6, March
 
 

IoT, Volume 6, Issue 2 (June 2025) – 12 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
22 pages, 3864 KiB  
Article
Raspberry Pi-Based Face Recognition Door Lock System
by Seifeldin Sherif Fathy Ali Elnozahy, Senthill C. Pari and Lee Chu Liang
IoT 2025, 6(2), 31; https://doi.org/10.3390/iot6020031 - 20 May 2025
Viewed by 34
Abstract
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for reliability, efficiency, and usability. With the Raspberry Pi as its [...] Read more.
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for reliability, efficiency, and usability. With the Raspberry Pi as its CPU, the system uses facial recognition for authentication. A camera module for real-time image capturing, a relay module for solenoid lock control, and OpenCV for image processing are essential. The system uses the DeepFace library to detect user emotions and adaptive learning to improve recognition accuracy for approved users. The device also adapts to poor lighting and distances, and it sends real-time remote monitoring messages. Some of the most important things that have been achieved include adaptive facial recognition, ensuring that the system changes as it is used, and integrating real-time notifications and emotion detection without any problems. Face recognition worked well in many settings. Modular architecture facilitated hardware–software integration and scalability for various applications. In conclusion, this study created an intelligent facial recognition door lock system using Raspberry Pi hardware and open-source software libraries. The system addresses traditional access control limits and is practical, scalable, and inexpensive, demonstrating biometric technology’s potential in modern security systems. Full article
Show Figures

Figure 1

28 pages, 2489 KiB  
Article
A Hybrid Learnable Fusion of ConvNeXt and Swin Transformer for Optimized Image Classification
by Jaber Qezelbash-Chamak and Karen Hicklin
IoT 2025, 6(2), 30; https://doi.org/10.3390/iot6020030 - 16 May 2025
Viewed by 89
Abstract
Medical image classification often relies on CNNs to capture local details (e.g., lesions, nodules) or on transformers to model long-range dependencies. However, each paradigm alone is limited in addressing both fine-grained structures and broader anatomical context. We propose ConvTransGFusion, a hybrid model that [...] Read more.
Medical image classification often relies on CNNs to capture local details (e.g., lesions, nodules) or on transformers to model long-range dependencies. However, each paradigm alone is limited in addressing both fine-grained structures and broader anatomical context. We propose ConvTransGFusion, a hybrid model that fuses ConvNeXt (for refined convolutional features) and Swin Transformer (for hierarchical global attention) using a learnable dual-attention gating mechanism. By aligning spatial dimensions, scaling each branch adaptively, and applying both channel and spatial attention, the proposed architecture bridges local and global representations, melding fine-grained lesion details with the broader anatomical context essential for accurate diagnosis. Tested on four diverse medical imaging datasets—including X-ray, ultrasound, and MRI scans—the proposed model consistently achieves superior accuracy, precision, recall, F1, and AUC over state-of-the-art CNNs and transformers. Our findings highlight the benefits of combining convolutional inductive biases and transformer-based global context in a single learnable framework, positioning ConvTransGFusion as a robust and versatile solution for real-world clinical applications. Full article
Show Figures

Figure 1

21 pages, 4686 KiB  
Article
Low-Memory-Footprint CNN-Based Biomedical Signal Processing for Wearable Devices
by Zahra Kokhazad, Dimitrios Gkountelos, Milad Kokhazadeh, Charalampos Bournas, Georgios Keramidas and Vasilios Kelefouras
IoT 2025, 6(2), 29; https://doi.org/10.3390/iot6020029 - 8 May 2025
Viewed by 240
Abstract
The rise of wearable devices has enabled real-time processing of sensor data for critical health monitoring applications, such as human activity recognition (HAR) and cardiac disorder classification (CDC). However, the limited computational and memory resources of wearables necessitate lightweight yet accurate classification models. [...] Read more.
The rise of wearable devices has enabled real-time processing of sensor data for critical health monitoring applications, such as human activity recognition (HAR) and cardiac disorder classification (CDC). However, the limited computational and memory resources of wearables necessitate lightweight yet accurate classification models. While deep neural networks (DNNs), including convolutional neural networks (CNNs) and long short-term memory networks, have shown high accuracy for HAR and CDC, their large parameter sizes hinder deployment on edge devices. On the other hand, various DNN compression techniques have been proposed, but exploiting the combination of various compression techniques with the aim of achieving memory efficient DNN models for HAR and CDC tasks remains under-investigated. This work studies the impact of CNN architecture parameters, focusing on the convolutional and dense layers, to identify configurations that balance accuracy and efficiency. We derive two versions of each model—lean and fat—based on their memory characteristics. Subsequently, we apply three complementary compression techniques: filter-based pruning, low-rank factorization, and dynamic range quantization. Experiments across three diverse DNNs demonstrate that this multi-faceted compression approach can significantly reduce memory and computational requirements while maintaining validation accuracy, leading to DNN models suitable for intelligent health monitoring on resource-constrained wearable devices. Full article
Show Figures

Figure 1

24 pages, 12015 KiB  
Article
Power–Packet Conversion Methods and Analysis of Scheduling Schemes for Wireless Power Transfer
by Yuma Takahashi, Takefumi Hiraguri, Kazuki Maruta, Shuma Okita, Takahiro Matsuda, Tomotaka Kimura and Noboru Sekino
IoT 2025, 6(2), 28; https://doi.org/10.3390/iot6020028 - 8 May 2025
Viewed by 194
Abstract
Recently, electromagnetic wireless power transfer (WPT) has emerged as a promising technology for supplying power to multiple terminals. Previous studies have devised packet transmission methods, commonly used in telecommunication, for power analysis. This study develops a simulator that calculates the received power by [...] Read more.
Recently, electromagnetic wireless power transfer (WPT) has emerged as a promising technology for supplying power to multiple terminals. Previous studies have devised packet transmission methods, commonly used in telecommunication, for power analysis. This study develops a simulator that calculates the received power by integrating a power–packet conversion method, based on previous research. The simulator incorporates several scheduling functions to facilitate the investigation of the efficiency of the power-feeding methods. This study analyzes the efficacy of a first-come–first-served (FCFS) method, a round-robin (RR) method, and a multilevel feedback queue (MFQ) scheme for wireless power transfer, all of which were devised based on existing scheduling methods used in operating systems. Simulation results show that, although the FCFS method is simple, it may lead to battery depletion due to delayed power supply, particularly in terminals with lower initial battery levels. The RR method improves fairness by allocating the power supply in time slices; however, its performance is sensitive to the slice duration. The MFQ method, which incorporates a promotion mechanism based on battery status and power demand, exhibits higher adaptability, achieving efficient and balanced power distribution even when terminals differ in distance from the transmitter or in power consumption. These evaluations were conducted using a proposed power–packet conversion method that discretizes continuous power into packet units, allowing for the application of communication network-inspired scheduling and control techniques. The capacity to construct such models enables the simulator to analyze the flow and distribution of power, predict potential issues that may arise in real systems in advance, and devise optimal control methodologies. Moreover, the model can be employed to enhance the efficiency of power management systems and construct smart grids, and it is anticipated to be utilized for the integration of power and communication systems. Full article
Show Figures

Figure 1

19 pages, 7253 KiB  
Article
Development of a Low-Cost Internet of Things Platform for Three-Phase Energy Monitoring in a University Campus
by Abdessamad Rhesri, Fatima Aabadi, Rachid Bennani, Yann Ben Maissa, Ahmed Tamtaoui and Hamza Dahmouni
IoT 2025, 6(2), 27; https://doi.org/10.3390/iot6020027 - 4 May 2025
Viewed by 355
Abstract
This article highlights the development of a platform for monitoring three-phase energy consumption within a university campus. The core of this platform is low-cost IoT energy sensors, which are designed to transmit real-time data to the data center’s server through different IoT communication [...] Read more.
This article highlights the development of a platform for monitoring three-phase energy consumption within a university campus. The core of this platform is low-cost IoT energy sensors, which are designed to transmit real-time data to the data center’s server through different IoT communication technologies, enhancing the preexisting electrical measurement network. The newly recommended measurement structure enables the electrical consumption data collection required for analyzing patterns and proposing forecast models to optimize electricity usage. The major contribution of this work is the design and implementation of smart three-phase energy meters based on the selection of various energy sensors and wireless communication technologies, and then the set up of a global IoT architecture that offers real-time data acquisition, storage, download, and visualization, capitalizing on the campus’s diverse energy profiles for detailed characterization. The proposed platform is considered the cornerstone toward the implementation of a collaborative smart microgrid, allowing forecasting and electrical consumption optimization, enabling research into potential opportunities for energy efficiency in our campus, and enhancing the performance of existing electrical infrastructure. Full article
Show Figures

Figure 1

26 pages, 2490 KiB  
Review
From Machine Learning-Based to LLM-Enhanced: An Application-Focused Analysis of How Social IoT Benefits from LLMs
by Lijie Yang and Runbo Su
IoT 2025, 6(2), 26; https://doi.org/10.3390/iot6020026 - 30 Apr 2025
Viewed by 249
Abstract
Recent advancements in large language models (LLMs) have added a transformative dimension to the social Internet of Things (SIoT), which is the combination of social networks and IoT. With LLMs’ natural language understanding and data synthesis capabilities, LLMs are regarded as strong tools [...] Read more.
Recent advancements in large language models (LLMs) have added a transformative dimension to the social Internet of Things (SIoT), which is the combination of social networks and IoT. With LLMs’ natural language understanding and data synthesis capabilities, LLMs are regarded as strong tools to enhance SIoT applications such as recommendation, search, and data management. This application-focused review synthesizes the latest related research by identifying both the synergies and the current research gaps at the intersection of LLMs and SIoT, as well as the evolutionary road from machine learning-based solutions to LLM-enhanced ones. Full article
Show Figures

Figure 1

20 pages, 4589 KiB  
Article
Blockchain-Based Mobile IoT System with Configurable Sensor Modules
by Jooho Lee, Jihyun Byun and Sangoh Kim
IoT 2025, 6(2), 25; https://doi.org/10.3390/iot6020025 - 22 Apr 2025
Viewed by 503
Abstract
In this study, a Multi-Sensor IoT Device (MSID) is developed that is designed to collect various environmental data and interconnect with the cloud and blockchain to ensure reliable data management. The MSID is designed with a flexible, modular structure that supports a variety [...] Read more.
In this study, a Multi-Sensor IoT Device (MSID) is developed that is designed to collect various environmental data and interconnect with the cloud and blockchain to ensure reliable data management. The MSID is designed with a flexible, modular structure that supports a variety of sensor configurations and is easily expandable with 3D-printed components. The system performance was monitored in real-time, with a high cloud upload success rate of 98.35% and an average transmission delay of only 0.64 s, confirming stable data collection every minute. Blockchain-based sensor data storage ensured data integrity and tamper-proofness, with all transactions successfully recorded and verified via smart contract. The proposed Blockchain-based Mobile IoT System (BMIS) has shown strong potential for use in environmental monitoring, industrial asset management, and other areas that require reliable data collection and long-term preservation. Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
Show Figures

Figure 1

20 pages, 1579 KiB  
Article
Optimizing Customer Experience by Exploiting Real-Time Data Generated by IoT and Leveraging Distributed Web Systems in CRM Systems
by Marian Ileana, Pavel Petrov and Vassil Milev
IoT 2025, 6(2), 24; https://doi.org/10.3390/iot6020024 - 21 Apr 2025
Viewed by 426
Abstract
Integrating smart devices from the Internet of Things (IoT) with Customer Relationship Management (CRM) systems presents significant opportunities for enhancing customer experience through real-time data utilization. This article explores the technological frameworks and practical solutions for achieving seamless integration of IoT data within [...] Read more.
Integrating smart devices from the Internet of Things (IoT) with Customer Relationship Management (CRM) systems presents significant opportunities for enhancing customer experience through real-time data utilization. This article explores the technological frameworks and practical solutions for achieving seamless integration of IoT data within CRM platforms. By leveraging distributed Web systems, this study demonstrates how companies can improve scalability, responsiveness, and personalization in managing customer relationships. This paper outlines key architectural designs for distributed Web systems that ensure efficient real-time data processing while addressing challenges such as security, system integration, and the demands of analytics. This research provides insights into overcoming these challenges with strategies like load balancing, edge processing, and advanced encryption protocols. Results from simulations and practical implementations underscore the effectiveness of these approaches in optimizing operational efficiency and delivering hyper-personalized customer experiences. This study aims to bridge the gap between theoretical possibilities and real-world applications, offering actionable guidelines for organizations to fully leverage IoT-driven CRM systems. Full article
Show Figures

Figure 1

26 pages, 1211 KiB  
Review
A Lightweight Encryption Method for IoT-Based Healthcare Applications: A Review and Future Prospects
by Omar Sabri, Bassam Al-Shargabi, Abdelrahman Abuarqoub and Tahani Ali Hakami
IoT 2025, 6(2), 23; https://doi.org/10.3390/iot6020023 - 20 Apr 2025
Viewed by 346
Abstract
The rapid proliferation of Internet of Things (IoT) devices in healthcare, from wearable sensors to implantable medical devices, has revolutionised patient monitoring, personalised treatment, and remote care delivery. However, the resource-constrained nature of IoT devices, coupled with the sensitivity of medical data, presents [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices in healthcare, from wearable sensors to implantable medical devices, has revolutionised patient monitoring, personalised treatment, and remote care delivery. However, the resource-constrained nature of IoT devices, coupled with the sensitivity of medical data, presents critical security challenges. Traditional encryption methods, while robust, are computationally intensive and unsuitable for IoT environments, leaving sensitive patient information vulnerable to cyber threats. Addressing this gap, lightweight encryption methods have emerged as a pivotal solution to balance security with the limited processing power, memory, and energy resources of IoT devices. This paper explores lightweight encryption methods tailored for IoT healthcare applications, evaluating their effectiveness in securing sensitive data while operating under resource constraints. A comparative analysis is conducted on encryption techniques such as AES-128, LEA, Ascon, GIFT, HIGHT, PRINCE, and RC5-32/12/16, based on key performance metrics including block size, key size, encryption and decryption speeds, throughput, and security levels. The findings highlight that AES-128, LEA, ASCON, and GIFT are best suited for high-sensitivity healthcare data due to their strong security features, while HIGHT and PRINCE provide balanced protection for medium-sensitivity applications. RC5-32/12/16, on the other hand, prioritises efficiency over comprehensive security, making it suitable for low-risk scenarios where computational overhead must be minimised. The paper underscores the significant trade-offs between efficiency, security, and resource consumption, emphasising the need for careful selection of encryption methods based on the specific requirements of IoT healthcare environments. Additionally, the paper highlights the growing demand for lightweight encryption methods that balance energy efficiency with robust protection against cyber threats. These insights offer valuable guidance for researchers and practitioners seeking to enhance the security of IoT-based healthcare systems while ensuring optimal performance in resource-constrained settings. Full article
Show Figures

Figure 1

22 pages, 1174 KiB  
Article
Text Mining and Unsupervised Deep Learning for Intrusion Detection in Smart-Grid Communication Networks
by Joseph Azar, Mohammed Al Saleh, Raphaël Couturier and Hassan Noura
IoT 2025, 6(2), 22; https://doi.org/10.3390/iot6020022 - 26 Mar 2025
Viewed by 573
Abstract
The Manufacturing Message Specification (MMS) protocol is frequently used to automate processes in IEC 61850-based substations and smart-grid systems. However, it may be susceptible to a variety of cyber-attacks. A frequently used protection strategy is to deploy intrusion detection systems to monitor network [...] Read more.
The Manufacturing Message Specification (MMS) protocol is frequently used to automate processes in IEC 61850-based substations and smart-grid systems. However, it may be susceptible to a variety of cyber-attacks. A frequently used protection strategy is to deploy intrusion detection systems to monitor network traffic for anomalies. Conventional approaches to detecting anomalies require a large number of labeled samples and are therefore incompatible with high-dimensional time series data. This work proposes an anomaly detection method for high-dimensional sequences based on a bidirectional LSTM autoencoder. Additionally, a text-mining strategy based on a TF-IDF vectorizer and truncated SVD is presented for data preparation and feature extraction. The proposed data representation approach outperformed word embeddings (Doc2Vec) by better preserving critical domain-specific keywords in MMS traffic while reducing the complexity of model training. Unlike embeddings, which attempt to capture semantic relationships that may not exist in structured network protocols, TF-IDF focuses on token frequency and importance, making it more suitable for anomaly detection in MMS communications. To address the limitations of existing approaches that rely on labeled samples, the proposed model learns the properties and patterns of a large number of normal samples in an unsupervised manner. The results demonstrate that the proposed approach can learn potential features from high-dimensional time series data while maintaining a high True Positive Rate. Full article
(This article belongs to the Topic Machine Learning in Internet of Things II)
Show Figures

Figure 1

39 pages, 8548 KiB  
Review
Driving Supply Chain Transformation with IoT and AI Integration: A Dual Approach Using Bibliometric Analysis and Topic Modeling
by Jerifa Zaman, Atefeh Shoomal, Mohammad Jahanbakht and Dervis Ozay
IoT 2025, 6(2), 21; https://doi.org/10.3390/iot6020021 - 25 Mar 2025
Viewed by 1513
Abstract
The objective of this study is to conduct an analysis of the scientific literature on the application of the Internet of Things (IoT) and artificial intelligence (AI) in enhancing supply chain operations. This research applies a dual approach combining bibliometric analysis and topic [...] Read more.
The objective of this study is to conduct an analysis of the scientific literature on the application of the Internet of Things (IoT) and artificial intelligence (AI) in enhancing supply chain operations. This research applies a dual approach combining bibliometric analysis and topic modeling to explore both quantitative citation trends and qualitative thematic insights. By examining 810 qualified articles, published between 2011 and 2024, this research aims to identify the main topics, key authors, influential sources, and the most-cited articles within the literature. The study addresses critical research questions on the state of IoT and AI integration into supply chains and the role of these technologies in resolving digital supply chain management challenges. The convergence of IoT and AI holds immense potential to redefine supply chain management practices, improving productivity, visibility, and sustainability in interconnected global supply chains. This research not only highlights the continuous evolution of the supply chain field in light of Industry 4.0 technologies—such as machine learning, big data analytics, cloud computing, cyber–physical systems, and 5G networks—but also provides an updated overview of advanced IoT and AI technologies currently applied in supply chain operations, documenting their evolution from rudimentary stages to their current state of advancement. Full article
Show Figures

Figure 1

24 pages, 857 KiB  
Article
IoT-Based Framework for Connected Municipal Public Services in a Strategic Digital City Context
by Danieli Aparecida From, Denis Alcides Rezende and Donald Francisco Quintana Sequeira
IoT 2025, 6(2), 20; https://doi.org/10.3390/iot6020020 - 25 Mar 2025
Viewed by 1267
Abstract
The use of digital technology resources in public services enhances efficiency, responsiveness, and citizens’ quality of life through improved resource management, real-time monitoring, and service performance. The objective is to create and apply an IoT-based framework for connected municipal public services in a [...] Read more.
The use of digital technology resources in public services enhances efficiency, responsiveness, and citizens’ quality of life through improved resource management, real-time monitoring, and service performance. The objective is to create and apply an IoT-based framework for connected municipal public services in a strategic digital city context. The research employed a modeling process validated in a Brazilian city, identifying seven related frameworks and four themes through a bibliometric review. The original framework comprises three constructs, eight subconstructs, and 12 variables, validated through a case study inquiry. The results revealed that the researched city has yet to enlarge IoT into its municipal public services as part of a digital city project initiative. Key recommendations for IoT implementation include prioritizing the preferences of digital citizens, expanding critical services suited for IoT, and updating municipal strategies to incorporate IT resources to streamline decision-making. The conclusion reiterates that the IoT framework for municipal services is effective when actionable information supports strategic planning and decision-making and highlights the transformative potential of IoT in driving more resilient and sustainable cities aligned with citizens’ needs. This approach allows public managers to enhance citizens’ quality of life while improving the efficiency and responsiveness of urban management processes and services. Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
Show Figures

Figure 1

Previous Issue
Back to TopTop