Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal on Internet of Things (IoT) published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions
- High Visibility: indexed within ESCI (Web of Science), Scopus, EBSCO, and other databases.
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 25.5 days after submission; acceptance to publication is undertaken in 5.3 days (median values for papers published in this journal in the second half of 2025).
- Journal Rank: JCR - Q2 (Telecommunications) / CiteScore - Q1 (Computer Science (miscellaneous))
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
- Journal Clusters of Network and Communications Technology: Future Internet, IoT, Telecom, Journal of Sensor and Actuator Networks, Network, Signals.
Impact Factor:
2.8 (2024);
5-Year Impact Factor:
3.2 (2024)
Latest Articles
Intelligent Railway Wagon Health Assessment Using IoT Sensors and Predictive Analytics for Safety-Critical Applications
IoT 2026, 7(2), 32; https://doi.org/10.3390/iot7020032 - 2 Apr 2026
Abstract
►
Show Figures
The safety and reliability of railway wagon operations largely depend on the timely detection of degradation in safety-critical components such as axle bearings, wheelsets, and braking systems. Conventional maintenance strategies based on fixed inspection intervals are often inadequate for capturing the actual operating
[...] Read more.
The safety and reliability of railway wagon operations largely depend on the timely detection of degradation in safety-critical components such as axle bearings, wheelsets, and braking systems. Conventional maintenance strategies based on fixed inspection intervals are often inadequate for capturing the actual operating conditions of wagon components, leading to delayed fault detection or unnecessary maintenance actions. To address these limitations, this paper proposes a sensor-based health assessment framework for the continuous monitoring of railway wagons under operational conditions. The proposed framework integrates multi-sensor data acquisition, systematic signal preprocessing, feature-based health indicator construction, and temporal degradation analysis to evaluate component health in real time. A safety-oriented decision logic is employed to classify operating conditions and generate reliable alerts while minimizing false detections caused by transient disturbances. The effectiveness of the proposed approach is validated using a publicly available run-to-failure bearing dataset that exhibits degradation characteristics similar to those observed in railway wagon axle bearings. Experimental results demonstrate that the proposed framework achieves improved classification accuracy, higher detection reliability, reduced false alarm rates, and lower detection latency compared to representative existing condition monitoring approaches. In addition, the computational efficiency of the proposed model confirms its suitability for real-time deployment. The results indicate that the proposed health assessment framework provides a practical and reliable solution for safety-critical railway wagon monitoring and forms a strong foundation for future extensions toward predictive maintenance and remaining useful life estimation.
Full article
Open AccessArticle
Cryptanalysis and Improvement of the SMEP-IoV Protocol: A Secure and Lightweight Protocol for Message Exchange in IoV Paradigm
by
Gelare Oudi Ghadim, Parvin Rastegari, Mohammad Dakhilalian, Faramarz Hendessi, Shahrzad Saremi, Rania Shibl, Yassine Himeur, Shadi Atalla and Wathiq Mansoor
IoT 2026, 7(2), 31; https://doi.org/10.3390/iot7020031 - 31 Mar 2026
Abstract
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message
[...] Read more.
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message authentication protocol designed to satisfy essential security requirements. This paper presents a comprehensive security analysis of SMEP-IoV and reveals several serious vulnerabilities. Specifically, sensitive credentials are stored in plaintext without tamper-resistant protection, and both authentication and session key derivation depend directly on these credentials. These structural flaws allow an adversary to extract the stored secrets, generate valid authentication messages, and derive the established session key, enabling vehicle impersonation and session key disclosure attacks. Moreover, compromise of long-term secrets facilitates key compromise impersonation attacks. It also fails to ensure anonymity and perfect forward secrecy. To address these issues, we propose an enhanced authentication protocol for resource-constrained IoV environments, leveraging a three-factor authentication mechanism combined with lightweight cryptographic primitives. Formal security analyses using BAN logic, Tamarin, and ProVerif confirm its resilience against known attacks, while NS-3 simulations validate its scalability, high throughput, and low End-to-End Delay (E2ED). The results highlight the protocol as a robust, efficient, and scalable solution for large-scale IoV deployments.
Full article
(This article belongs to the Special Issue Internet of Vehicles (IoV))
►▼
Show Figures

Figure 1
Open AccessArticle
Optimal Security Task Offloading in Cognitive IoT Networks: Provably Optimal Threshold Policies and Model-Free Learning
by
Ning Wang and Yali Ren
IoT 2026, 7(2), 30; https://doi.org/10.3390/iot7020030 - 26 Mar 2026
Abstract
►▼
Show Figures
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges. Resource-constrained devices face sophisticated threats but lack the computational capacity for advanced security analysis. This study investigates optimal security task allocation in Cognitive IoT (CIoT) networks. It specifically examines when
[...] Read more.
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges. Resource-constrained devices face sophisticated threats but lack the computational capacity for advanced security analysis. This study investigates optimal security task allocation in Cognitive IoT (CIoT) networks. It specifically examines when IoT devices should process security tasks locally or offload them to Mobile Edge Computing (MEC) servers. The problem is formulated as a Continuous-Time Markov Decision Process (CTMDP). The study demonstrates that the optimal offloading policy has a threshold structure. Security tasks are offloaded to MEC servers when the offloading queue length is below a critical threshold, . Otherwise, tasks are processed locally. This structural property is robust to changes in MEC server configurations and threat arrival patterns. It ensures an optimal and easily implementable security policy under the exponential model. Theoretical analysis establishes upper bounds on the performance of AI-based security controllers using the same models. The results also show that standard model-free Q-learning algorithms can recover optimal thresholds without any prior knowledge of the system parameters. Simulations across multiple reinforcement learning architectures, including Q-learning, State–Action–Reward–State–Action (SARSA), and Deep Q-networks (DQN), confirm that all methods converge to the predicted threshold. This empirically validates the analytical findings. The threshold structure remains effective under practical imperfections such as imperfect sensing and parameter estimation errors. Systems maintain 85% to 93% of their optimal performance. This work extends threshold Markov Decision Process (MDP) analysis from classical queuing theory to the context of CIoT security offloading. It provides optimal and practical policies and model-free algorithms for use by resource-constrained devices.
Full article

Figure 1
Open AccessArticle
EEDC: Energy-Efficient Distance-Controlled Clustering for Bottleneck Avoidance in Wireless Sensor Networks
by
Ahmad Abuashour, Yahia Jazyah and Naser Zaeri
IoT 2026, 7(1), 29; https://doi.org/10.3390/iot7010029 - 15 Mar 2026
Abstract
►▼
Show Figures
Wireless Sensor Networks (WSNs) commonly employ clustering to improve scalability and energy efficiency; however, cluster heads (CHs) located near the base station (BS) often suffer from excessive relay traffic, leading to rapid energy depletion and reduced network lifetime. This article proposes an Energy-Efficient
[...] Read more.
Wireless Sensor Networks (WSNs) commonly employ clustering to improve scalability and energy efficiency; however, cluster heads (CHs) located near the base station (BS) often suffer from excessive relay traffic, leading to rapid energy depletion and reduced network lifetime. This article proposes an Energy-Efficient Distance-Controlled Clustering (EEDC) scheme that adjusts CH density and transmission power according to each node’s distance from the BS. In EEDC, a higher number of CHs is deployed near the BS to balance forwarding loads, while fewer CHs are selected in distant regions to conserve energy. Additionally, CHs adapt their transmission power to enable distance-proportional communication. A mathematical model is developed to analyze the relationship between CH distribution, transmission power, and overall energy consumption. Performance evaluation is conducted through simulations and compared with LEACH, HEED, DEEC, SEP, and EECS. The results show that EEDC improves the stability period by up to 42%, extends network lifetime by 23%, increases average residual energy by 13–29%, enhances throughput by 16–44%, and achieves 23–61% higher packet delivery efficiency. Moreover, cumulative CH energy consumption is reduced by 5–21%, leading to more balanced energy distribution. These findings indicate that distance-controlled CH selection and adaptive transmission power effectively alleviate the BS energy bottleneck and enhance the energy efficiency and operational longevity of clustered WSNs.
Full article

Figure 1
Open AccessArticle
IoT-Assisted Hydroponic System for Andrographis paniculata: Enhanced Productivity and Pharmaceutical-Grade Quality
by
Krit Funsian, Yaowarat Sirisathitkul, Pumiphat Khotchanakhen, Apiwit Bunta, Kanittha Srikwan, Kingkan Bunluepuech, Athakorn Promwee, Chih-Yi Chiu and Karanrat Thammarak
IoT 2026, 7(1), 28; https://doi.org/10.3390/iot7010028 - 10 Mar 2026
Abstract
This study presents an Internet of Things (IoT)-assisted semi-open hydroponic system for cultivating Andrographis paniculata under tropical conditions, aiming to enhance biomass productivity, andrographolide (AG) yield, and production efficiency. IoT-assisted hydroponics, non-IoT hydroponics, and soil-based cultivation were compared in 10 m2 greenhouses.
[...] Read more.
This study presents an Internet of Things (IoT)-assisted semi-open hydroponic system for cultivating Andrographis paniculata under tropical conditions, aiming to enhance biomass productivity, andrographolide (AG) yield, and production efficiency. IoT-assisted hydroponics, non-IoT hydroponics, and soil-based cultivation were compared in 10 m2 greenhouses. The IoT system enabled real-time monitoring and adaptive regulation of temperature, relative humidity, light intensity, nutrient solution pH, and electrical conductivity (EC). IoT-assisted hydroponics achieved earlier harvest (≈90 days) and the highest fresh biomass yield (0.409 ± 0.014 kg m−2) while maintaining per-plant productivity (15.74 ± 0.54 g plant−1) comparable to soil-based cultivation. Andrographolide concentration reached 25.58 ± 3.36 mg g−1 DW (2.56% w/w), meeting pharmacopeial requirements. Owing to stable environmental regulation and tolerance to high planting density, the IoT system produced the highest areal AG productivity (209.5 mg m−2), representing a four- to tenfold increase over the other systems. Despite higher operational costs, IoT-assisted hydroponics achieved the lowest AG unit cost (≈6.77 USD g−1). While most previous studies emphasize tissue-level AG concentration, system-level productivity and cost efficiency under realistic cultivation conditions remain insufficiently explored. Overall, IoT-enabled semi-open hydroponics provides a scalable and economically viable approach for medicinal plant production, bridging the gap between open-field cultivation and fully controlled plant factory systems.
Full article
(This article belongs to the Topic Smart Farming 2.0: IoT and Edge AI for Precision Crop Management and Sustainability)
►▼
Show Figures

Figure 1
Open AccessArticle
Understanding Energy Efficiency of AI Deployments in IoT-Driven Smart Cities
by
Salvatore Bramante, Filippo Ferrandino and Alessandro Cilardo
IoT 2026, 7(1), 27; https://doi.org/10.3390/iot7010027 - 8 Mar 2026
Abstract
The pervasive adoption of AI and AIoT applications at the network edge presents both opportunities and challenges for smart cities. With a focus on the energy efficiency of AI in urban environments, this paper provides a systematic comparative analysis of representative edge hardware
[...] Read more.
The pervasive adoption of AI and AIoT applications at the network edge presents both opportunities and challenges for smart cities. With a focus on the energy efficiency of AI in urban environments, this paper provides a systematic comparative analysis of representative edge hardware platforms, i.e., embedded GPUs, FPGAs, and ultra-low-power microcontroller-/sensor-class devices, assessing their suitability for AI workloads in IoT-driven smart city infrastructures. The evaluation, based on direct characterization of diverse neural networks and relevant datasets, quantifies computational performance and energy behavior through inference latency, throughput, and energy/per inference measurements. Across the evaluated network–board pairs, the measured inference power spans several orders of magnitude, ranging from 0.1–10 mW for ultra-low-power Intelligent Sensor Processing Units (ISPUs) up to 1–10 W for embedded GPUs, highlighting the wide design space between the least and most power-demanding configurations. Results indicate that embedded GPUs provide a favorable performance-to-power ratio for computationally intensive workloads, while MCU/ISPU-class solutions, despite throughput limitations, offer compelling advantages in ultra-low-power scenarios when combined with quantization and pruning, making them well-suited for distributed sensing and actuation typical of smart city deployments. Overall, this comparative analysis guides hardware selection for heterogeneous, sustainable AI-enabled urban services.
Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
►▼
Show Figures

Figure 1
Open AccessArticle
Automated Framework for Testing Random Number Generators for IoT Security Applications Using NIST SP 800-22
by
Juan Castillo, Pere Aran Vila, Francisco Palacio, Blas Garrido, Sergi Hernández and Albert Cirera
IoT 2026, 7(1), 26; https://doi.org/10.3390/iot7010026 - 7 Mar 2026
Abstract
The continuous expansion of the Internet of Things (IoT) has intensified the need to evaluate and guarantee the quality of entropy sources used in random number generation, an essential element in securing communications used in IoT ecosystems. This work presents an automated and
[...] Read more.
The continuous expansion of the Internet of Things (IoT) has intensified the need to evaluate and guarantee the quality of entropy sources used in random number generation, an essential element in securing communications used in IoT ecosystems. This work presents an automated and web-based framework designed to execute and analyze the results of statistical tests defined in the NIST SP 800-22 standard, enabling systematic assessment of entropy sources and random numbers generators in IoT devices and environments. The proposed system integrates a Python-based backend built upon an optimized implementation of the original NIST suite, along with an intuitive web interface that facilitates configuration, monitoring, and parallel execution of tests through Representational State Transfer (REST) endpoints. Session management based on Redis ensures reliable and concurrent operation of multiple users or devices while maintaining isolation and data integrity. To demonstrate its applicability, an emulated IoT ecosystem was implemented in which multiple virtual devices periodically and asynchronously request real-time validation of their local random numbers generators. The obtained results confirm the system’s capability to detect deficiencies in pseudo random generators and validate true random number sources, highlighting its potential as a diagnostic and verification tool for distributed IoT security systems. The tool developed in this work is fully accessible to the public, allowing researchers, engineers, and practitioners to evaluate random number generators without requiring specialized hardware or proprietary software.
Full article
(This article belongs to the Topic Privacy Challenges and Solutions in the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessArticle
A Foundational Edge-AI Sensing Framework for Occupancy-Driven Energy Management in SMOs
by
Yutong Chen, Daisuke Sumiyoshi, Xiangyu Wang, Takahiro Yamamoto, Takahiro Ueno and Jewon Oh
IoT 2026, 7(1), 25; https://doi.org/10.3390/iot7010025 - 5 Mar 2026
Abstract
Occupant presence is a primary driver of Heating, Ventilation, and Air Conditioning (HVAC) and lighting energy consumption in office environments. Existing occupancy-sensing solutions often rely on privacy-sensitive modalities or require costly infrastructure, limiting their applicability in Small and Medium Offices (SMOs). To address
[...] Read more.
Occupant presence is a primary driver of Heating, Ventilation, and Air Conditioning (HVAC) and lighting energy consumption in office environments. Existing occupancy-sensing solutions often rely on privacy-sensitive modalities or require costly infrastructure, limiting their applicability in Small and Medium Offices (SMOs). To address these limitations, this study proposes a lightweight CSI-based occupancy-sensing framework based on a dual-core ESP32-S3 architecture, enabling concurrent CSI processing, environmental sensing, and cloud communication. A multi-stage signal preprocessing pipeline compresses raw CSI streams into a compact statistical feature matrix, achieving 98.86% classification accuracy for multi-level occupancy estimation. Compared with image-based baselines such as DenseNet121, the proposed approach reduces input data size to 24 kB and model parameters to 138 K, yielding over 129× reduction in transmission volume without sacrificing performance. These results demonstrate that the proposed framework provides a practical, privacy-preserving, and edge-deployable solution for occupancy-aware energy management in SMOs.
Full article
(This article belongs to the Special Issue IoT Meets AI: Driving the Next Generation of Technology)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
A Novel Hybrid Opcode Feature Selection Framework for Efficient and Effective IoT Malware Detection
by
Bakhan Tofiq Ahmed, Noor Ghazi M. Jameel and Bakhtiar Ibrahim Saeed
IoT 2026, 7(1), 24; https://doi.org/10.3390/iot7010024 - 2 Mar 2026
Abstract
Malware’s proliferation in the Internet of Things (IoT) ecosystem requires precise, efficient detection systems capable of operating on IoT devices. Existing static analysis approaches often fail due to computational inefficiency stemming from high feature dimensionality inherent in raw opcode features. This research addresses
[...] Read more.
Malware’s proliferation in the Internet of Things (IoT) ecosystem requires precise, efficient detection systems capable of operating on IoT devices. Existing static analysis approaches often fail due to computational inefficiency stemming from high feature dimensionality inherent in raw opcode features. This research addresses this limitation by proposing a novel machine-learning (ML)-driven Intelligent Hybrid Feature Selection (IHFS) framework with two distinct architectures. IHFS1 combines a filter method (variance threshold) with an embedded method (LGBM feature importance). Conversely, IHFS2 integrates variance thresholding with a wrapper method (Recursive Feature Elimination with Cross-Validation using LGBM) for optimal selection. This framework is specifically designed to select an optimally stable and minimal feature subset from the initial 1183 opcode frequency vector extracted from ARM binaries. Applying this framework to a multi-family IoT malware dataset, the IHFS architectures yielded distinct and highly efficient feature subsets: IHFS1 achieved a 95.77% reduction (to 50 features), while IHFS2 attained a 98.06% reduction (to 23 features). Evaluation across eight ML models confirmed that the Random Forest (with IHFS1 subset) and Decision Tree (with IHFS2 subset) classifiers were the best performing, achieving robust classification metrics that outperform current state-of-the-art solutions. The Decision Tree model demonstrated exceptional detection capabilities, with an accuracy of 99.87%, a precision of 99.82%, a recall of 99.88%, and an F1-score of 99.85%. It achieved an average inference time of 0.058 ms per sample. Experimental results attained on a native ARM64 environment validate the deployment feasibility of the proposed system for resource-constrained IoT devices, such as the Raspberry Pi. The proposed system achieves a high-throughput, low-overhead security posture while maintaining host operational stability, processing a single ELF binary in just 3.431 ms.
Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessReview
Edge AI for SD-IoT: A Systematic Review on Scalability and Latency
by
Ernando P. Batista, Jr., Alex Santos, Maycon Peixoto, Gustavo Figueiredo and Cassio Prazeres
IoT 2026, 7(1), 23; https://doi.org/10.3390/iot7010023 - 27 Feb 2026
Abstract
The growing demand for IoT applications in highly dynamic environments with multiple connected devices introduces significant scalability and low-latency challenges. In the context of software-defined networking (SDN) integrated with Edge environments, adopting machine learning (ML) techniques has emerged as a promising approach to
[...] Read more.
The growing demand for IoT applications in highly dynamic environments with multiple connected devices introduces significant scalability and low-latency challenges. In the context of software-defined networking (SDN) integrated with Edge environments, adopting machine learning (ML) techniques has emerged as a promising approach to meet these requirements. This study presents a Systematic Literature Review (SLR) that identifies and analyzes ML-based solutions applied to Software-Defined Internet of Things (SD-IoT) infrastructures in Edge environments, emphasizing improving low latency and scalability. Following established methodological best practices, we conducted the review, including a clear definition of research questions, well-defined inclusion and exclusion criteria, a structured search protocol, and multiple scientific databases. Based on the analysis of selected studies, the main strategies employed to enhance network performance are categorized, along with the level of fidelity and complexity of the experimental environments used, and the realism and applicability of the proposed solutions are discussed. Furthermore, drawing from the context of the selected studies, the most recurrent ML approaches are presented—including supervised, unsupervised, and reinforcement learning methods—along with a discussion of their advantages and limitations in dynamic network scenarios. By compiling and organizing the contributions from the literature, this paper provides a comprehensive overview of the state of the art in applying ML to SD-IoT networks, shedding light on current trends, existing gaps, and research opportunities aimed at building more intelligent and adaptable solutions for IoT environments.
Full article
(This article belongs to the Special Issue IoT Meets AI: Driving the Next Generation of Technology)
►▼
Show Figures

Graphical abstract
Open AccessArticle
Ensemble Machine Learning Approach for Traffic Congestion and Travel Time Prediction in Urban Bus Rapid Transit Systems: A Case Study of Trans Metro Bandung
by
Rendy Munadi, Dadan Nur Ramadan, Sussi, Nurwulan Fitriyanti and Hilal H. Nuha
IoT 2026, 7(1), 22; https://doi.org/10.3390/iot7010022 - 27 Feb 2026
Abstract
Traffic congestion and travel time uncertainty remain major challenges to the operational efficiency of Bus Rapid Transit (BRT) systems in urban areas of developing countries. This study proposes an integrated solution for the Trans Metro Bandung (TMB) system by leveraging Internet of Things
[...] Read more.
Traffic congestion and travel time uncertainty remain major challenges to the operational efficiency of Bus Rapid Transit (BRT) systems in urban areas of developing countries. This study proposes an integrated solution for the Trans Metro Bandung (TMB) system by leveraging Internet of Things (IoT)–based GPS data and tree-based ensemble machine learning algorithms. Spatio-temporal data collected from on-board GPS modules are processed to predict traffic congestion levels and estimate travel time across route segments. The performance of Decision Tree, Random Forest, and XGBoost models is evaluated in terms of prediction accuracy, interpretability, and computational efficiency, with particular consideration for deployment on resource-constrained hardware. Experiments conducted on 20,156 data samples show that the Decision Tree model achieves the highest congestion classification accuracy of 96.8%, while Random Forest outperforms other models in travel time regression, achieving an R2 value of 0.95 and a root mean square error (RMSE) of 5.80 min. The trained models are successfully deployed on a Raspberry Pi 3B microcontroller for real-time inference, enabling fleet management and travel planning without reliance on cloud connectivity. The results demonstrate that cost-effective and interpretable machine learning solutions can deliver reliable performance in heterogeneous urban infrastructures while providing a replicable framework for medium-sized cities seeking to implement affordable smart transportation systems.
Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
►▼
Show Figures

Figure 1
Open AccessSystematic Review
Performance Trade-Offs in Multi-Tenant IoT–Cloud Security: A Systematic Review of Emerging Technologies
by
Bader Alobaywi, Mohammed G. Almutairi and Frederick T. Sheldon
IoT 2026, 7(1), 21; https://doi.org/10.3390/iot7010021 - 22 Feb 2026
Abstract
►▼
Show Figures
Multi-tenancy is essential for scalable IoT–Cloud systems; however, it introduces complex security vulnerabilities at the intersection of shared cloud infrastructures and resource-constrained IoT environments. This systematic review evaluates next-generation security frameworks designed to enforce tenant isolation without violating the strict latency (<10 ms)
[...] Read more.
Multi-tenancy is essential for scalable IoT–Cloud systems; however, it introduces complex security vulnerabilities at the intersection of shared cloud infrastructures and resource-constrained IoT environments. This systematic review evaluates next-generation security frameworks designed to enforce tenant isolation without violating the strict latency (<10 ms) and energy bounds of lightweight sensors. Adhering to PRISMA guidelines, we analyze selected high-quality studies to categorize intersectional threats, including cross-tenant data leakage, side-channel attacks, and privilege escalation. Our analysis identifies a critical, unresolved conflict: existing mitigation strategies often incur a 12% computational and communication overhead, creating a significant barrier for real-time applications. Furthermore, we critically analyze emerging technologies, including Zero Trust Architectures (ZTA), adaptive Artificial Intelligence (AI), blockchain, and Post-Quantum Cryptography (PQC). We find that direct PQC deployment is currently infeasible for LPWAN protocols due to key-size constraints (1.6 KB) that exceed typical payload limits. To address these challenges, we propose a novel multi-layer security design principle that offloads heavy isolation and cryptographic workloads to hardware-accelerated edge gateways, thereby maintaining tenant isolation without compromising real-time performance. Finally, this review serves as a roadmap for future research, highlighting federated learning and hardware enclaves as essential pathways for securing next-generation multi-tenant IoT ecosystems.
Full article

Figure 1
Open AccessArticle
A Layered Architecture for Concurrent CSI-Based Applications in Smart Environments
by
Shervin Mehryar
IoT 2026, 7(1), 20; https://doi.org/10.3390/iot7010020 - 17 Feb 2026
Abstract
The prevalence of radio frequency signals in indoor environments has in recent years given rise to new technologies across many domains such as robotics, healthcare, and surveillance. Radio frequency signals propagate in the wireless medium through multiple paths and carry useful environment-dependent information.
[...] Read more.
The prevalence of radio frequency signals in indoor environments has in recent years given rise to new technologies across many domains such as robotics, healthcare, and surveillance. Radio frequency signals propagate in the wireless medium through multiple paths and carry useful environment-dependent information. Capturing and analyzing these signal patterns can offer new solutions for a number of applications relevant to ranging, tracking, perception and recognition. In this work we propose a novel architecture, separating physical, back-bone networks, and inference layers, towards fully ubiquitous passive recognition systems that scale with the number of environments and applications. We propose a back-bone architecture that utilizes a novel Cross Dual-Path Attention (CDPA) block to capture spatial and temporal correlations from Channel State Information (CSI) for device-free, multi-task applications. Subsequently, a distill and transfer algorithm is proposed to generalize the inference capabilities of CDPA over multiple target environments for scalable training and reduced computational costs. By sharing knowledge between models across a shared network, experimentation shows that edge devices can be deployed with improved performance while simultaneously meeting strict computation and memory requirements. Our distributed learning paradigm demonstrates that CDPA-based models are capable of using passive signals in a non-intrusive and privacy-protecting manner, in order to achieve ubiquitous recognition at scale in smart environments.
Full article
(This article belongs to the Topic Federated Edge Intelligence for Next Generation AI Systems)
►▼
Show Figures

Figure 1
Open AccessArticle
Research Communities in Smart Homes Security: A Systematic Mapping Study
by
Fazeleh Dehghani Ashkezari, Andreas Jacobsson, Kayode S. Adewole, Klara Svalin and Martin Höst
IoT 2026, 7(1), 19; https://doi.org/10.3390/iot7010019 - 11 Feb 2026
Abstract
►▼
Show Figures
Smart homes are becoming increasingly common, bringing convenience to users but also raising serious security concerns. As the number of connected devices grows, so does the research interest in securing smart homes. However, the literature is broad, making it difficult to understand the
[...] Read more.
Smart homes are becoming increasingly common, bringing convenience to users but also raising serious security concerns. As the number of connected devices grows, so does the research interest in securing smart homes. However, the literature is broad, making it difficult to understand the main research directions and how they are connected. Given the scope and diversity of existing research, a systematic mapping study was chosen to provide a high-level overview of smart home security research by mapping research communities, identifying dominant themes, and examining their evolution over time. We retrieved articles from the Scopus database published between 2000 and April 2025, resulting in approximately 13,600 articles. After filtering out unrelated domains such as smart vehicles, smart industry, and general IoT, a final set of 6313 publications specifically focused on smart home security was used for analysis. We applied a citation-based network analysis approach, constructed an author citation graph, and used the Louvain community detection algorithm to identify 12 main research communities. Each community was further analyzed based on its keywords, most-cited publications, leading authors, and institutions. Our results provide a structured overview of the field, highlighting its key themes and evolution over time. This work can help researchers better navigate the smart home security landscape and identify future research opportunities.
Full article

Figure 1
Open AccessArticle
Lightweight Protection Mechanisms for IoT Networks Based on Trust Modelling
by
Andric Rodríguez, Asdrúbal López-Chau, Leticia Dávila-Nicanor, Víctor Landassuri-Moreno and Saul Lazcano-Salas
IoT 2026, 7(1), 18; https://doi.org/10.3390/iot7010018 - 10 Feb 2026
Abstract
Since the deployment of the Internet of Things (IoT), it has transformed everyday life by enabling intelligent environments that improve efficiency and automate services in domains such as agriculture, healthcare, smart cities, and industry. However, the rapid proliferation of IoT devices has introduced
[...] Read more.
Since the deployment of the Internet of Things (IoT), it has transformed everyday life by enabling intelligent environments that improve efficiency and automate services in domains such as agriculture, healthcare, smart cities, and industry. However, the rapid proliferation of IoT devices has introduced significant security challenges, largely driven by the heterogeneity of devices, resource constraints, and the increasing exposure of network communications. This work proposes a lightweight security protection mechanism for IoT networks based on trust modelling. The proposed approach integrates machine learning techniques to evaluate IoT node behavior using network-layer (Layer 3) traffic features under different labeling granularities, including binary, categorical, and subcategorical classifications. By focusing on network-layer observations, the model remains applicable across heterogeneous IoT devices while preserving a low computational footprint. In addition, the Common Vulnerability Scoring System (CVSS) is incorporated as a standardized vulnerability severity metric, enabling the integration of probabilistic security evidence with contextual information about potential impact. This combination allows the estimation of trust to reflect not only the likelihood of anomalous behavior but also its associated severity. Experimental evaluation was conducted using a representative IoT traffic dataset, multiple preprocessing strategies, and several classical machine learning models. The results demonstrate that aggregating traffic-based intrusion detection outputs with vulnerability severity metrics enables a more robust, flexible, and interpretable trust estimation process. This approach supports the early identification of potentially compromised nodes while maintaining scalability and efficiency, making it suitable for deployment in heterogeneous IoT environments.
Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessArticle
Methodology and Architecture for Benchmarking End-to-End PQC Protocol Resilience in an IoT Context
by
Mohammed G. Almutairi and Frederick T. Sheldon
IoT 2026, 7(1), 17; https://doi.org/10.3390/iot7010017 - 10 Feb 2026
Abstract
►▼
Show Figures
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat. While ML-KEM (CRYSTALS-Kyber) has been standardized under FIPS 203 for general encryption, these devices often operate on unreliable networks suffering from high latency
[...] Read more.
Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat. While ML-KEM (CRYSTALS-Kyber) has been standardized under FIPS 203 for general encryption, these devices often operate on unreliable networks suffering from high latency and packet loss. Our recent systematic review identified a critical gap that existing research overwhelmingly focuses on Transport Layer Security (TLS). This leaves the resilience of lightweight protocols like MQTT and CoAP under challenging network conditions largely unexplored. This paper introduces PQC-IoTNet, a novel Software-in-the-Loop (SITL) framework to address this gap. Our three-tier architecture integrates a Python-based IoT client with kernel-level emulation to test the full protocol stack. Validation results comparing Kyber and ECC demonstrate the framework’s ability to capture critical performance cliffs caused by TCP retransmissions. Notably, the framework revealed that while Kyber maintained an 18% speed advantage over ECC at 5% packet loss, both protocols experienced nonlinear latency spikes. This work provides a reproducible blueprint to identify operational boundaries and select resilient protocols for secure IoT systems.
Full article

Figure 1
Open AccessReview
Intrusion Detection on the Internet of Things: A Comprehensive Review and Gap Analysis Toward Real-Time, Lightweight, Adaptive, and Autonomous Security
by
Suzan Sallam, May El Barachi and Nan Li
IoT 2026, 7(1), 16; https://doi.org/10.3390/iot7010016 - 7 Feb 2026
Abstract
The rapid growth of the Internet of Things (IoT) has exposed billions of interconnected, heterogeneous, and resource-constrained devices to increasingly sophisticated threats. To evaluate the readiness of current intrusion detection systems (IDSs), this study reviews 32 recent IoT-IDS proposals spanning conventional, machine-learning, deep-learning,
[...] Read more.
The rapid growth of the Internet of Things (IoT) has exposed billions of interconnected, heterogeneous, and resource-constrained devices to increasingly sophisticated threats. To evaluate the readiness of current intrusion detection systems (IDSs), this study reviews 32 recent IoT-IDS proposals spanning conventional, machine-learning, deep-learning, and hybrid approaches. Each system is assessed against 10 criteria that reflect practical IoT requirements, including real-time performance, latency, lightweight design, detection accuracy, mitigation capabilities, integrated detection-and-mitigation workflows, adaptability, resilience to advanced attacks, validation in realistic environments, and scalability. The results indicate that although many approaches achieve high detection accuracy, most do not meet real-time and lightweight thresholds commonly cited in IoT deployment literature. Mitigation features are often absent, adaptability is rarely implemented, and 29 out of 32 studies rely solely on offline datasets, thereby limiting confidence in their robustness to deployment. Scalability remains the most significant limitation, as none of the reviewed IDSs have tested their performance under realistic multi-node or high-traffic conditions, even though scalability is critical for large IoT ecosystems. Overall, the review suggests that future IoT IDS research should move beyond accuracy-focused models and toward lightweight, adaptive, and autonomous solutions that incorporate mitigation, support real-time inference, and undergo standardized evaluations under real-world operating conditions.
Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessArticle
Audiovisual Gun Detection with Automated Lockdown and PA Announcing IoT System for Schools
by
Tareq Khan
IoT 2026, 7(1), 15; https://doi.org/10.3390/iot7010015 - 31 Jan 2026
Abstract
►▼
Show Figures
Gun violence in U.S. schools not only causes loss of life and physical injury but also leaves enduring psychological trauma, damages property, and results in significant economic losses. One way to reduce this loss is to detect the gun early, notify the police
[...] Read more.
Gun violence in U.S. schools not only causes loss of life and physical injury but also leaves enduring psychological trauma, damages property, and results in significant economic losses. One way to reduce this loss is to detect the gun early, notify the police as soon as possible, and implement lockdown procedures immediately. In this project, a novel gun detector Internet of Things (IoT) system is developed that automatically detects the presence of a gun either from images or from gunshot sounds, and sends notifications with exact location information to the first responder’s smartphones using the Internet within a second. The device also sends wireless commands using Message Queuing Telemetry Transport (MQTT) protocol to close the smart door locks in classrooms and announce to act using public address (PA) system automatically. The proposed system will remove the burden of manually calling the police and implementing the lockdown procedure during such traumatic situations. Police will arrive sooner, and thus it will help to stop the shooter early, the injured people can be taken to the hospital quickly, and more lives can be saved. Two custom deep learning AI models are used: (a) to detect guns from image data having an accuracy of 94.6%, and (b) the gunshot sounds from audio data having an accuracy of 99%. No single gun detector device is available in the literature that can detect guns from both image and audio data, implement lockdown and make PA announcement automatically. A prototype of the proposed gunshot detector IoT system, and a smartphone app is developed, and tested with gun replicas and blank guns in real-time.
Full article

Figure 1
Open AccessReview
The Network and Information Systems 2 Directive: Toward Scalable Cyber Risk Management in the Remote Patient Monitoring Domain: A Systematic Review
by
Brian Mulhern, Chitra Balakrishna and Jan Collie
IoT 2026, 7(1), 14; https://doi.org/10.3390/iot7010014 - 29 Jan 2026
Abstract
Healthcare 5.0 and the Internet of Medical Things (IoMT) is emerging as a scalable model for the delivery of customised healthcare and chronic disease management, through Remote Patient Monitoring (RPM) in patient smart home environments. Large-scale RPM initiatives are being rolled out by
[...] Read more.
Healthcare 5.0 and the Internet of Medical Things (IoMT) is emerging as a scalable model for the delivery of customised healthcare and chronic disease management, through Remote Patient Monitoring (RPM) in patient smart home environments. Large-scale RPM initiatives are being rolled out by healthcare providers (HCPs); however, the constrained nature of IoMT devices and proximity to poorly administered smart home technologies create a cyber risk for highly personalised patient data. The recent Network and Information Systems (NIS 2) directive requires HCPs to improve their cyber risk management approaches, mandating heavy penalties for non-compliance. Current research into cyber risk management in smart home-based RPM does not address scalability. This research examines scalability through the lens of the Non-adoption, Abandonment, Scale-up, Spread and Sustainability (NASSS) framework and develops a novel Scalability Index (SI), informed by a PRISMA guided systematic literature review. Our search strategy identified 57 studies across major databases including ACM, IEEE, MDPI, Elsevier, and Springer, authored between January 2016 and March 2025 (final search 21 March 2025), which focussed on cyber security risk management in the RPM context. Studies focussing solely on healthcare institutional settings were excluded. To mitigate bias, a sample of the papers (30/57) were assessed by two other raters; the resulting Cohen’s Kappa inter-rater agreement statistic (0.8) indicating strong agreement on study selection. The results, presented in graphical and tabular format, provide evidence that most cyber risk approaches do not consider scalability from the HCP perspective. Applying the SI to the 57 studies in our review resulted in a low to medium scalability potential of most cyber risk management proposals, indicating that they would not support the requirements of NIS 2 in the RPM context. A limitation of our work is that it was not tested in a live large-scale setting. However, future research could validate the proposed SI, providing guidance for researchers and practitioners in enhancing cyber risk management of large-scale RPM initiatives.
Full article
(This article belongs to the Topic Applications of IoT in Multidisciplinary Areas)
►▼
Show Figures

Graphical abstract
Open AccessArticle
G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems
by
Daniel Ayo Oladele, Ayokunle Ige, Olatunbosun Agbo-Ajala, Olufisayo Ekundayo, Sree Ganesh Thottempudi, Malusi Sibiya and Ernest Mnkandla
IoT 2026, 7(1), 13; https://doi.org/10.3390/iot7010013 - 29 Jan 2026
Abstract
►▼
Show Figures
Intrusion detection in IoT networks is challenged by data heterogeneity, label scarcity, and privacy constraints. Traditional federated learning (FL) methods often assume IID data or require supervised labels, limiting their practicality. We propose G-PFL-ID, a graph-driven personalized federated learning framework for unsupervised intrusion
[...] Read more.
Intrusion detection in IoT networks is challenged by data heterogeneity, label scarcity, and privacy constraints. Traditional federated learning (FL) methods often assume IID data or require supervised labels, limiting their practicality. We propose G-PFL-ID, a graph-driven personalized federated learning framework for unsupervised intrusion detection in non-IID IoT systems. Our method trains a global graph encoder (GCN or GAE) with a DeepSVDD objective under a federated regularizer (FedReg) that combines proximal and variance penalties, then personalizes local models via a lightweight fine-tuning head. We evaluate G-PFL-ID on the IoT-23 (Mirai-based captures) and N-BaIoT (device-level dataset) under realistic heterogeneity (Dirichlet-based partitioning with concentration parameters and client counts for IoT-23, and natural device-based partitioning for N-BaIoT). G-PFL-ID outperforms global FL baselines and recent graph-based federated anomaly detectors, achieving up to 99.46% AUROC on IoT-23 and 97.74% AUROC on N-BaIoT. Ablation studies confirm that the proximal and variance penalties reduce inter-round drift and representation collapse, and that lightweight personalization recovers local sensitivity—especially for clients with limited data. Our work bridges graph-based anomaly detection with personalized FL for scalable, privacy-preserving IoT security.
Full article

Graphical abstract
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Electronics, Future Internet, Information, JSAN, Sensors, IoT
Privacy Challenges and Solutions in the Internet of Things
Topic Editors: Abdul Majeed, Safiullah KhanDeadline: 30 June 2026
Topic in
Applied Sciences, Electronics, IoT, Materials, Robotics, Sensors, Machines, Automation
Smart Production in Terms of Industry 4.0 and 5.0
Topic Editors: Iwona Paprocka, Cezary Grabowik, Jozef HusarDeadline: 29 July 2026
Topic in
Computers, Electronics, Future Internet, IoT, Network, Sensors, JSAN, Technologies, BDCC
Challenges and Future Trends of Wireless Networks
Topic Editors: Stefano Scanzio, Ramez Daoud, Jetmir Haxhibeqiri, Pedro SantosDeadline: 30 September 2026
Topic in
AI, Applied Sciences, Computers, Electronics, Entropy, Future Internet, Information, IoT, Sensors, Telecom
Advances in Sixth Generation and Beyond (6G&B)
Topic Editors: Luis Javier García Villalba, Ana Lucila Sandoval OrozcoDeadline: 31 October 2026
Conferences
Special Issues
Special Issue in
IoT
Secure and Privacy-Preserving IoT Systems for Next-Generation Healthcare
Guest Editor: Ali JalooliDeadline: 30 April 2026
Special Issue in
IoT
Internet of Underwater Things (IoUT)
Guest Editors: Hao Wang, Yi Ma, Yongyao ChenDeadline: 30 April 2026
Special Issue in
IoT
Advances in Wireless Communication Technologies for IoT Devices
Guest Editors: Long Zhao, Rui Chen, Jie MeiDeadline: 30 May 2026
Special Issue in
IoT
Enabling Intelligent and Scalable IoT Communications via LEO Satellite Networks
Guest Editors: Ala Arman, Zahra Ziran, Oras BakerDeadline: 31 May 2026





