Previous Issue
Volume 6, September
 
 

IoT, Volume 6, Issue 4 (December 2025) – 10 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
25 pages, 774 KB  
Review
A Systematic Review for Ammonia Monitoring Systems Based on the Internet of Things
by Adriel Henrique Monte Claro da Silva, Mikaelle K. da Silva, Augusto Santos and Luis Arturo Gómez-Malagón
IoT 2025, 6(4), 66; https://doi.org/10.3390/iot6040066 - 30 Oct 2025
Viewed by 291
Abstract
Ammonia is a gas primarily produced for use in agriculture, refrigeration systems, chemical manufacturing, and power generation. Despite its benefits, improper management of ammonia poses significant risks to human health and the environment. Consequently, monitoring ammonia is essential for enhancing industrial safety and [...] Read more.
Ammonia is a gas primarily produced for use in agriculture, refrigeration systems, chemical manufacturing, and power generation. Despite its benefits, improper management of ammonia poses significant risks to human health and the environment. Consequently, monitoring ammonia is essential for enhancing industrial safety and preventing leaks that can lead to environmental contamination. Given the abundance and diversity of studies on Internet of Things (IoT) systems for gas detection, the main objective of this paper is to systematically review the literature to identify emerging research trends and opportunities. This review follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology, focusing on sensor technologies, microcontrollers, communication technologies, IoT platforms, and applications. The main findings indicate that most studies employed sensors from the MQ family (particularly the MQ-135 and MQ-137), microcontrollers based on the Xtensa architecture (ESP32 and ESP8266) and ARM Cortex-A processors (Raspberry Pi 3B+/4), with Wi-Fi as the predominant communication technology, and Blynk and ThingSpeak as the primary cloud-based IoT platforms. The most frequent applications were agriculture and environmental monitoring. These findings highlight the growing maturity of IoT technologies in ammonia sensing, while also addressing challenges like sensor reliability, energy efficiency, and development of integrated solutions with Artificial Intelligence. Full article
Show Figures

Figure 1

28 pages, 2443 KB  
Article
Blockchain for Secure IoT: A Review of Identity Management, Access Control, and Trust Mechanisms
by Behnam Khayer, Siamak Mirzaei, Hooman Alavizadeh and Ahmad Salehi Shahraki
IoT 2025, 6(4), 65; https://doi.org/10.3390/iot6040065 - 28 Oct 2025
Viewed by 435
Abstract
Blockchain technologies offer transformative potential in terms of addressing the security, trust, and identity management issues that exist in large-scale Internet of Things (IoT) deployments. This narrative review provides a comprehensive survey of various studies, focusing on decentralized identity management, trust mechanisms, smart [...] Read more.
Blockchain technologies offer transformative potential in terms of addressing the security, trust, and identity management issues that exist in large-scale Internet of Things (IoT) deployments. This narrative review provides a comprehensive survey of various studies, focusing on decentralized identity management, trust mechanisms, smart contracts, privacy preservation, and real-world IoT applications. According to the literature, blockchain-based solutions provide robust authentication through mechanisms such as Physical Unclonable Functions (PUFs), enhance transparency via smart contract-enabled reputation systems, and significantly mitigate vulnerabilities, including single points of failure and Sybil attacks. Smart contracts enable secure interactions by automating resource allocation, access control, and verification. Cryptographic tools, including zero-knowledge proofs (ZKPs), proxy re-encryption, and Merkle trees, further improve data privacy and device integrity. Despite these advantages, challenges persist in areas such as scalability, regulatory and compliance issues, privacy and security concerns, resource constraints, and interoperability. By reviewing the current state-of-the-art literature, this review emphasizes the importance of establishing standardized protocols, performance benchmarks, and robust regulatory frameworks to achieve scalable and secure blockchain-integrated IoT solutions, and provides emerging trends and future research directions for the integration of blockchain technology into the IoT ecosystem. Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
Show Figures

Figure 1

20 pages, 4527 KB  
Article
Compost Monitoring System for Kitchen Waste Management: Development, Deployment and Analysis
by Sasirekha Gurla Venkata Kameswari, Arun Basavaraju, Chandrashekhar Siva Kumar and Jyotsna Bapat
IoT 2025, 6(4), 64; https://doi.org/10.3390/iot6040064 - 27 Oct 2025
Viewed by 309
Abstract
Composting can be perceived as an art and science of converting organic waste into a rich and nutritious soil amendment—compost. The existing literature talks about how and what parameters need to be monitored in the process of composting and what actions are to [...] Read more.
Composting can be perceived as an art and science of converting organic waste into a rich and nutritious soil amendment—compost. The existing literature talks about how and what parameters need to be monitored in the process of composting and what actions are to be taken to optimize the process. In this paper, the development, deployment and data analytics of a compost monitoring system are presented, wherein not only the parameters to be measured but also the topology, mechanical design and battery operation details, which are crucial for the deployment of the system, are considered. Having realized that the temperature plays an important role in the process of composting, a contactless method of monitoring the compost temperature, using thermal imaging, has been investigated. Results showing the screenshots of the successfully developed system, plots of the obtained data and the inferences drawn from them are presented. This work not only contributes to the composting data, which is scarce, but also brings out the advantages of using thermal images in addition to temperature sensor probes. Full article
Show Figures

Figure 1

31 pages, 1168 KB  
Article
Case-Based Data Quality Management for IoT Logs: A Case Study Focusing on Detection of Data Quality Issues
by Alexander Schultheis, Yannis Bertrand, Joscha Grüger, Lukas Malburg, Ralph Bergmann and Estefanía Serral Asensio
IoT 2025, 6(4), 63; https://doi.org/10.3390/iot6040063 - 23 Oct 2025
Viewed by 236
Abstract
Smart manufacturing applications increasingly rely on time-series data from Industrial IoT sensors, yet these data streams often contain data quality issues (DQIs) that affect analysis and disrupt production. While traditional Machine Learning methods are difficult to apply due to the small amount of [...] Read more.
Smart manufacturing applications increasingly rely on time-series data from Industrial IoT sensors, yet these data streams often contain data quality issues (DQIs) that affect analysis and disrupt production. While traditional Machine Learning methods are difficult to apply due to the small amount of data available, the knowledge-based approach of Case-Based Reasoning (CBR) offers a way to reuse previously gained experience. We introduce the first end-to-end Case-Based Reasoning (CBR) framework that both detects and remedies DQIs in near real time, even when only a handful of annotated fault instances are available. Our solution encodes expert experience in the four CBR knowledge containers: (i) a vocabulary that represents sensor streams and their context in the DataStream format; (ii) a case base populated with fault-annotated event logs; (iii) tailored similarity measures—including a weighted Dynamic Time Warping variant and structure-aware list mapping—that isolate the signatures of missing-value, missing-sensor, and time-shift errors; and (iv) lightweight adaptation rules that recommend concrete repair actions or, where appropriate, invoke automated imputation and alignment routines. A case study is used to examine and present the suitability of the approach for a specific application domain. Although the case study demonstrates only limited capabilities in identifying Data Quality Issues (DQIs), we aim to support transparent evaluation and future research by publishing (1) a prototype of the Case-Based Reasoning (CBR) system and (2) a publicly accessible, meticulously annotated sensor-log benchmark. Together, these resources provide a reproducible baseline and a modular foundation for advancing similarity metrics, expanding the DQI taxonomy, and enabling knowledge-intensive reasoning in IoT data quality management. Full article
Show Figures

Figure 1

20 pages, 448 KB  
Article
Toward Scalable and Sustainable Detection Systems: A Behavioural Taxonomy and Utility-Based Framework for Security Detection in IoT and IIoT
by Ali Jaddoa, Hasanein Alharbi, Abbas Hommadi and Hussein A. Ismael
IoT 2025, 6(4), 62; https://doi.org/10.3390/iot6040062 - 21 Oct 2025
Viewed by 304
Abstract
Resource-constrained IoT and IIoT systems require detection architectures that balance accuracy with energy efficiency, scalability, and contextual awareness. This paper presents a conceptual framework informed by a systematic review of energy-aware detection systems (XDS), unifying intrusion and anomaly detection systems (IDS and ADS) [...] Read more.
Resource-constrained IoT and IIoT systems require detection architectures that balance accuracy with energy efficiency, scalability, and contextual awareness. This paper presents a conceptual framework informed by a systematic review of energy-aware detection systems (XDS), unifying intrusion and anomaly detection systems (IDS and ADS) within a single framework. The proposed taxonomy captures six key dimensions: energy-awareness, adaptivity, modularity, offloading support, domain scope, and attack coverage. Applying this framework to the recent literature reveals recurring limitations, including static architectures, limited runtime coordination, and narrow evaluation settings. To address these challenges, we introduce a utility-based decision model for multi-layer task placement, guided by operational metrics such as energy cost, latency, and detection complexity. Unlike review-only studies, this work contributes both a synthesis of current limitations and the design of a novel six-dimensional taxonomy and utility-based layered architecture. The study concludes with future directions that support the development of adaptable, sustainable, and context-aware XDS architectures for heterogeneous environments. Full article
Show Figures

Figure 1

29 pages, 1829 KB  
Review
A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography
by Ivan Laktionov, Grygorii Diachenko, Dmytro Moroz and Iryna Getman
IoT 2025, 6(4), 61; https://doi.org/10.3390/iot6040061 - 16 Oct 2025
Viewed by 665
Abstract
The dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article addresses a relevant scientific and applied issue, which is to formulate prospective directions [...] Read more.
The dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article addresses a relevant scientific and applied issue, which is to formulate prospective directions for improving the effectiveness of cybersecurity approaches for infocommunication networks through a comparative analysis and logical synthesis of the state-of-the-art of applied research on cyber threats to the information security of mobile and satellite networks, including those related to the rapid development of quantum computing technologies. The article presents results on the systematisation of cyberattacks at the physical, signalling and cryptographic levels, as well as threats to cryptographic protocols and authentication systems. Particular attention is given to the prospects for implementing post-quantum cryptography, hybrid cryptographic models and the integration of threat detection mechanisms based on machine learning and artificial intelligence algorithms. The article proposes a classification of current threats according to architectural levels, analyses typical protocol vulnerabilities in next-generation mobile networks and satellite communications, and identifies key research gaps in existing cybersecurity approaches. Based on a critical analysis of scientific and applied literature, this article identifies key areas for future research. These include developing lightweight cryptographic algorithms, standardising post-quantum cryptographic models, creating adaptive cybersecurity frameworks and optimising protection mechanisms for resource-constrained devices within information and digital networks. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
Show Figures

Figure 1

30 pages, 782 KB  
Article
BiLSTM-Based Fault Anticipation for Predictive Activation of FRER in Time-Sensitive Industrial Networks
by Mohamed Seliem, Utz Roedig, Cormac Sreenan and Dirk Pesch
IoT 2025, 6(4), 60; https://doi.org/10.3390/iot6040060 - 2 Oct 2025
Viewed by 491
Abstract
Frame Replication and Elimination for Reliability (FRER) in Time-Sensitive Networking (TSN) enhances fault tolerance by duplicating critical traffic across disjoint paths. However, always-on FRER configurations introduce persistent redundancy overhead, even under nominal network conditions. This paper proposes a predictive FRER activation framework that [...] Read more.
Frame Replication and Elimination for Reliability (FRER) in Time-Sensitive Networking (TSN) enhances fault tolerance by duplicating critical traffic across disjoint paths. However, always-on FRER configurations introduce persistent redundancy overhead, even under nominal network conditions. This paper proposes a predictive FRER activation framework that anticipates faults using a Key Performance Indicator (KPI)-driven bidirectional Long Short-Term Memory (BiLSTM) model. By continuously analyzing multivariate KPIs—such as latency, jitter, and retransmission rates—the model forecasts potential faults and proactively activates FRER. Redundancy is deactivated upon KPI recovery or after a defined minimum protection window, thereby reducing bandwidth usage without compromising reliability. The framework includes a Python-based simulation environment, a real-time visualization dashboard built with Streamlit, and a fully integrated runtime controller. The experimental results demonstrate substantial improvements in link utilization while preserving fault protection, highlighting the effectiveness of anticipatory redundancy strategies in industrial TSN environments. Full article
(This article belongs to the Special Issue AIoT-Enabled Sustainable Smart Manufacturing)
Show Figures

Figure 1

20 pages, 5553 KB  
Article
Transmit Power Optimization for Intelligent Reflecting Surface-Assisted Coal Mine Wireless Communication Systems
by Yang Liu, Xiaoyue Li, Bin Wang and Yanhong Xu
IoT 2025, 6(4), 59; https://doi.org/10.3390/iot6040059 - 25 Sep 2025
Viewed by 390
Abstract
The adverse propagation environment in underground coal mine tunnels caused by enclosed spaces, rough surfaces, and dense scatterers severely degrades reliable wireless signal transmission, which further impedes the deployment of IoT applications such as gas monitors and personnel positioning terminals. However, the conventional [...] Read more.
The adverse propagation environment in underground coal mine tunnels caused by enclosed spaces, rough surfaces, and dense scatterers severely degrades reliable wireless signal transmission, which further impedes the deployment of IoT applications such as gas monitors and personnel positioning terminals. However, the conventional power enhancement solutions are infeasible for the underground coal mine scenario due to strict explosion-proof safety regulations and battery-powered IoT devices. To address this challenge, we propose singular value decomposition-based Lagrangian optimization (SVD-LOP) to minimize transmit power at the mining base station (MBS) for IRS-assisted coal mine wireless communication systems. In particular, we first establish a three-dimensional twin cluster geometry-based stochastic model (3D-TCGBSM) to accurately characterize the underground coal mine channel. On this basis, we formulate the MBS transmit power minimization problem constrained by user signal-to-noise ratio (SNR) target and IRS phase shifts. To solve this non-convex problem, we propose the SVD-LOP algorithm that performs SVD on the channel matrix to decouple the complex channel coupling and introduces the Lagrange multipliers. Furthermore, we develop a low-complexity successive convex approximation (LC-SCA) algorithm to reduce computational complexity, which constructs a convex approximation of the objective function based on a first-order Taylor expansion and enables suboptimal solutions. Simulation results demonstrate that the proposed SVD-LOP and LC-SCA algorithms achieve transmit power peaks of 20.8dBm and 21.4dBm, respectively, which are slightly lower than the 21.8dBm observed for the SDR algorithm. It is evident that these algorithms remain well below the explosion-proof safety threshold, which achieves significant power reduction. However, computational complexity analysis reveals that the proposed SVD-LOP and LC-SCA algorithms achieve O(N3) and O(N2) respectively, which offers substantial reductions compared to the SDR algorithm’s O(N7). Moreover, both proposed algorithms exhibit robust convergence across varying user SNR targets while maintaining stable performance gains under different tunnel roughness scenarios. Full article
Show Figures

Figure 1

21 pages, 6984 KB  
Article
Acoustic Trap Design for Biodiversity Detection
by Chingiz Seyidbayli, Bárbara Fengler, Daniel Szafranski and Andreas Reinhardt
IoT 2025, 6(4), 58; https://doi.org/10.3390/iot6040058 - 24 Sep 2025
Viewed by 750
Abstract
Real-time insect monitoring is essential for sustainable agriculture and biodiversity conservation. The traditional method of attracting insects to colored glue traps and manually counting the catch is time-intensive and requires specialized taxonomic expertise. Moreover, these traps are often lethal to pests and beneficial [...] Read more.
Real-time insect monitoring is essential for sustainable agriculture and biodiversity conservation. The traditional method of attracting insects to colored glue traps and manually counting the catch is time-intensive and requires specialized taxonomic expertise. Moreover, these traps are often lethal to pests and beneficial insects alike, raising both ecological and ethical concerns. Camera-based trap designs have recently emerged to lower the amount of manual labor involved in determining insect species, yet they are still deadly to the catch. This study presents the design and evaluation of a non-lethal acoustic monitoring system capable of detecting and classifying insect species based on their sound signatures. A first prototype was developed with a focus on low self-noise and suitability for autonomous field deployment. The system was initially validated through laboratory experiments, and subsequently tested in six rapeseed fields over a 25-day period. More than 3400 h of acoustic data were successfully collected without system failures. Key findings highlight the importance of carefully selecting each component to minimize self-noise, as insect sounds are extremely low in amplitude. The results also underscore the need for efficient data and energy management strategies in long-term field deployments. This paper aims to share the development process, design decisions, technical challenges, and practical lessons learned over the course of building our IoT sensor system. By outlining what worked, what did not, and what should be improved, this work contributes to the advancement of non-invasive insect monitoring technologies. Full article
Show Figures

Figure 1

18 pages, 2920 KB  
Article
UniTwin: Enabling Multi-Digital Twin Coordination for Modeling Distributed and Complex Systems
by Tim Markus Häußermann, Joel Lehmann, Florian Kolb, Alessa Rache and Julian Reichwald
IoT 2025, 6(4), 57; https://doi.org/10.3390/iot6040057 - 23 Sep 2025
Viewed by 528
Abstract
The growing complexity and scale of Cyber–Physical Systems (CPSs) have led to an increasing need for the holistic orchestration of multiple Digital Twins (DTs). Therefore, an extension to the UniTwin framework is introduced within this paper. UniTwin is a containerized, cloud-native DT framework. [...] Read more.
The growing complexity and scale of Cyber–Physical Systems (CPSs) have led to an increasing need for the holistic orchestration of multiple Digital Twins (DTs). Therefore, an extension to the UniTwin framework is introduced within this paper. UniTwin is a containerized, cloud-native DT framework. This extension enables the hierarchical aggregation of DTs across various abstraction levels. Traditional DT frameworks often lack mechanisms for dynamic composition at the level of entire systems. This is essential for modeling distributed systems in heterogeneous environments. UniTwin addresses this gap by grouping DTs into composite entities with an aggregation mechanism. The aggregation mechanism is demonstrated in a smart manufacturing case study, which covers the orchestration of a production line for personalized shopping cart chips. It uses modular DTs provided for each device within the production line. A System-Aggregated Digital Twin (S-ADT) is used to orchestrate the individual DTs, mapping the devices in the production line. Therefore, the production line adapts and reconfigures according to user-defined parameters. This validates the flexibility and practicality of the aggregation mechanism. This work contributes an aggregation mechanism for the UniTwin framework, paving the way for adaptable DTs for complex CPSs in domains like smart manufacturing, logistics, and infrastructure. Full article
Show Figures

Figure 1

Previous Issue
Back to TopTop