-
Achieving Ethical Algorithmic Behaviour in the Internet of Things: A Review -
Developing a Low-Order Statistical Feature Set Based on Received Samples for Signal Classification in Wireless Sensor Networks and Edge Devices -
Attacks and Defenses for Single-Stage Residue Number System PRNGs -
A Client/Server Malware Detection Model Based on Machine Learning for Android Devices -
Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces
Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal devoted entirely to Internet of Things (IoT), published quarterly online by MDPI.
- Open Access—free to download, share, and reuse content. Authors receive recognition for their contribution when the paper is reused.
- Rapid Publication: manuscripts are peer-reviewed and a first decision provided to authors approximately 12.9 days after submission; acceptance to publication is undertaken in 2.9 days (median values for papers published in this journal in the first half of 2021).
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
subject
Imprint Information
Open Access
ISSN: 2624-831X
Latest Articles
Shaping the Future of Smart Dentistry: From Artificial Intelligence (AI) to Intelligence Augmentation (IA)
IoT 2021, 2(3), 510-523; https://doi.org/10.3390/iot2030026 (registering DOI) - 30 Aug 2021
Abstract
Digitization is the emerging process in the current transformation of industry. Understanding the role and socio-economic consequences of digitalization is crucial for the way technology is being deployed in each sector. One of the affected sectors is dentistry. This study highlights the current
[...] Read more.
Digitization is the emerging process in the current transformation of industry. Understanding the role and socio-economic consequences of digitalization is crucial for the way technology is being deployed in each sector. One of the affected sectors is dentistry. This study highlights the current advances and challenges in integrating and merging artificial intelligence (AI), intelligence augmentation (IA), and machine learning (ML) in dentistry. We conduct a comparative analysis to give an overview of which technology is being currently deployed and what role IA and AI will play in dentistry, as AI plays an assistive role in advancing human capabilities. We find that challenges range from AI finding its way into routine medical practice to qualitative challenges of retrieving adequate data input. Other challenges lie in the yet unanswered questions of liability in how to reduce deployment costs of new technology. Given these challenges, we provide an outlook of how future technology can be deployed in daily-life dentistry and how robots and humans will interact, given the current technology developments. The aim of this paper is to discuss the future of dentistry and whether it is AI or IA conquering the modern dentistry era.
Full article
Open AccessArticle
Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things
IoT 2021, 2(3), 498-509; https://doi.org/10.3390/iot2030025 - 11 Aug 2021
Abstract
►▼
Show Figures
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for
[...] Read more.
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for global benefit. The information moves to nodes in a peer-to-peer network, in which the concept of trustworthiness is essential. Trust and Reputation Models (TRMs) are developed with the goal of guaranteeing that actions taken by entities in a system reflect their trustworthiness values and to prevent these values from being manipulated by malicious entities. The cornerstone of any TRM is the ability to generate a coherent evaluation of the information received. Indeed, the feedback generated by the consumers of the services has a vital role as the source of any trust model. In this paper, we focus on the generation of the feedback and propose different metrics to evaluate it. Moreover, we illustrate a new collusive attack that influences the evaluation of the received services. Simulations with a real IoT dataset show the importance of feedback generation and the impact of the new proposed attack.
Full article

Figure 1
Open AccessArticle
An IoT-Based Mobile System for Safety Monitoring of Lone Workers
IoT 2021, 2(3), 476-497; https://doi.org/10.3390/iot2030024 - 03 Aug 2021
Abstract
The European Agency for Safety and Health at Work considers Smart Personal Protective Equipment as “Intelligent Protection For The Future”. It mainly consists of electronic components that collect data about their use, the workers who wear them, and the working environment. This paper
[...] Read more.
The European Agency for Safety and Health at Work considers Smart Personal Protective Equipment as “Intelligent Protection For The Future”. It mainly consists of electronic components that collect data about their use, the workers who wear them, and the working environment. This paper proposes a distributed solution of Smart Personal Protective Equipment for the safety monitoring of Lone Workers by adopting low-cost electronic devices. In addition to the same hazards as anyone else, Lone Workers need additional and specific systems due to the higher risk they run on a work site. To this end, the Edge-Computing paradigm can be adopted to deploy an architecture embedding wearable devices, which alerts safety managers when workers do not wear the prescribed Personal Protective Equipment and supports a fast rescue when a worker seeks help or an accidental fall is automatically detected. The proposed system is a work-in-progress which provides an architecture design to accommodate different requirements, namely the deployment difficulties at temporary and large working sites, the maintenance and connectivity recurring cost issues, the respect for the workers’ privacy, and the simplicity of use for workers and their supervisors.
Full article
(This article belongs to the Special Issue Mobile Computing for IoT)
►▼
Show Figures

Graphical abstract
Open AccessArticle
Developing a Low-Order Statistical Feature Set Based on Received Samples for Signal Classification in Wireless Sensor Networks and Edge Devices
IoT 2021, 2(3), 449-475; https://doi.org/10.3390/iot2030023 - 01 Aug 2021
Abstract
►▼
Show Figures
Classifying fluctuating operating wireless environments can be crucial for successfully delivering authentic and confidential packets and for identifying legitimate signals. This study utilizes raw in-phase (I) and quadrature-phase (Q) samples, exclusively, to develop a low-order statistical feature set for wireless signal classification. Edge
[...] Read more.
Classifying fluctuating operating wireless environments can be crucial for successfully delivering authentic and confidential packets and for identifying legitimate signals. This study utilizes raw in-phase (I) and quadrature-phase (Q) samples, exclusively, to develop a low-order statistical feature set for wireless signal classification. Edge devices making decentralized decisions from I/Q sample analysis is beneficial. Implementing appropriate security and transmitting mechanisms, reducing retransmissions and increasing energy efficiency are examples. Wireless sensor networks (WSNs) and their Internet of Things (IoT) utilization emphasize the significance of this time series classification problem. Here, I/Q samples of typical WSN and industrial, scientific and medical band transmissions are collected in a live operating environment. Analog Pluto software-defined radios and Raspberry Pi devices are utilized to achieve a low-cost yet high-performance testbed. Features are extracted from Matlab-based statistical analysis of the I/Q samples across time, frequency (fast Fourier transform) and space (probability density function). Noise, ZigBee, continuous wave jamming, WiFi and Bluetooth signal data are examined. Supervised machine learning approaches, including support vector machines, Random Forest, XGBoost, k nearest neighbors and a deep neural network (DNN), evaluate the developed feature set. The optimal approach is determined as an XGBoost/SVM classifier. This classifier achieves similar accuracy and generalization results, on unseen data, to the DNN, but for a fraction of time and computation requirements. Compared to existing approaches, this study’s principal contribution is the developed low-order feature set that achieves signal classification without prior network knowledge or channel assumptions and is validated in a real-world wireless operating environment. The feature set can extend the development of resource-constrained edge devices as it is widely deployable due to only requiring received I/Q samples and these features are warranted as IoT devices become widely used in various modern applications.
Full article

Figure 1
Open AccessArticle
Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks
IoT 2021, 2(3), 428-448; https://doi.org/10.3390/iot2030022 - 27 Jul 2021
Abstract
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life. At the same time, the insecurity of these technologies ensures that our daily lives are surrounded by vulnerable computers, allowing
[...] Read more.
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life. At the same time, the insecurity of these technologies ensures that our daily lives are surrounded by vulnerable computers, allowing for the launch of multiple attacks via large-scale botnets through the IoT. These attacks have been successful in achieving their heinous objectives. A strong identification strategy is essential to keep devices secured. This paper proposes and implements a model for anomaly-based intrusion detection in IoT networks that uses a convolutional neural network (CNN) and gated recurrent unit (GRU) to detect and classify binary and multiclass IoT network data. The proposed model is validated using the BoT-IoT, IoT Network Intrusion, MQTT-IoT-IDS2020, and IoT-23 intrusion detection datasets. Our proposed binary and multiclass classification model achieved an exceptionally high level of accuracy, precision, recall, and F1 score.
Full article
(This article belongs to the Special Issue Industrial IoT as IT and OT Convergence: Challenges and Opportunities)
►▼
Show Figures

Figure 1
Open AccessArticle
Achieving Ethical Algorithmic Behaviour in the Internet of Things: A Review
by
IoT 2021, 2(3), 401-427; https://doi.org/10.3390/iot2030021 - 04 Jul 2021
Abstract
The Internet of Things is emerging as a vast, inter-connected space of devices and things surrounding people, many of which are increasingly capable of autonomous action, from automatically sending data to cloud servers for analysis, changing the behaviour of smart objects, to changing
[...] Read more.
The Internet of Things is emerging as a vast, inter-connected space of devices and things surrounding people, many of which are increasingly capable of autonomous action, from automatically sending data to cloud servers for analysis, changing the behaviour of smart objects, to changing the physical environment. A wide range of ethical concerns has arisen in their usage and development in recent years. Such concerns are exacerbated by the increasing autonomy given to connected things. This paper reviews, via examples, the landscape of ethical issues, and some recent approaches to address these issues concerning connected things behaving autonomously as part of the Internet of Things. We consider ethical issues in relation to device operations and accompanying algorithms. Examples of concerns include unsecured consumer devices, data collection with health-related Internet of Things, hackable vehicles, behaviour of autonomous vehicles in dilemma situations, accountability with Internet of Things systems, algorithmic bias, uncontrolled cooperation among things, and automation affecting user choice and control. Current ideas towards addressing a range of ethical concerns are reviewed and compared, including programming ethical behaviour, white-box algorithms, black-box validation, algorithmic social contracts, enveloping IoT systems, and guidelines and code of ethics for IoT developers; a suggestion from the analysis is that a multi-pronged approach could be useful based on the context of operation and deployment.
Full article
Open AccessArticle
Attacks and Defenses for Single-Stage Residue Number System PRNGs
IoT 2021, 2(3), 375-400; https://doi.org/10.3390/iot2030020 - 25 Jun 2021
Abstract
►▼
Show Figures
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or in using Shannon and single-stage Kolmogorov entropy metrics.
[...] Read more.
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or in using Shannon and single-stage Kolmogorov entropy metrics. In contrast, rather than blindly performing statistical analyses on the outputs of the single-stage RNS PRNG, this paper provides both white box and black box analyses that facilitate reverse engineering of the underlying RNS number generation algorithm to obtain the residues, or equivalently key, of the RNS algorithm. We develop and demonstrate a conditional entropy analysis that permits extraction of the key given a priori knowledge of state transitions as well as reverse engineering of the RNS PRNG algorithm and parameters (but not the key) in problems where the multiplicative RNS characteristic is too large to obtain a priori state transitions. We then discuss multiple defenses and perturbations for the RNS system that fool the original attack algorithm, including deliberate noise injection and code hopping. We present a modification to the algorithm that accounts for deliberate noise, but rapidly increases the search space and complexity. Lastly, we discuss memory requirements and time required for the attacker and defender to maintain these defenses.
Full article

Graphical abstract
Open AccessArticle
A Client/Server Malware Detection Model Based on Machine Learning for Android Devices
IoT 2021, 2(3), 355-374; https://doi.org/10.3390/iot2030019 - 24 Jun 2021
Abstract
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for malware detection on
[...] Read more.
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for malware detection on Android devices to protect private and financial information, for the mobile applications of the ATISCOM project. This model is based on client/server architecture, to reduce the heavy computations on a mobile device by sending data from the mobile device to the server for remote processing (i.e., offloading) of the predictions. We then gradually optimized our proposed model for better classification of the newly installed applications on Android devices. We at first adopted Naive Bayes to build the model with 92.4486% accuracy, then the classification method that gave the best accuracy of 93.85% for stochastic gradient descent (SGD) with binary class (i.e., malware and benign), and finally the regression method with numerical values ranging from −100 to 100 to manage the uncertainty predictions. Therefore, our proposed model with random forest regression gives a good accuracy in terms of performance, with a good correlation coefficient, minimum computation time and the smallest number of errors for malware detection.
Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT)
►▼
Show Figures

Graphical abstract
Open AccessArticle
Rock-Paper-Scissors-Hammer: A Tie-Less Decentralized Protocol for IoT Resource Allocation
by
IoT 2021, 2(2), 341-354; https://doi.org/10.3390/iot2020018 - 31 May 2021
Abstract
►▼
Show Figures
With the rapid development of the autonomous world, local decision making between devices is becoming important. This article provides a new paradigm (Rock-Paper-Scissors-Hammer: RPSH) that can reduce the number of conflicts or decision draws and thus increase the throughput of autonomous devices while
[...] Read more.
With the rapid development of the autonomous world, local decision making between devices is becoming important. This article provides a new paradigm (Rock-Paper-Scissors-Hammer: RPSH) that can reduce the number of conflicts or decision draws and thus increase the throughput of autonomous devices while reducing the kept number of records or transactions. The paradigm requires a sealed envelope protocol and sequential message passing between both parties to decide unanimously a winner between the two participants without a third-party mediation. The message passing proposes a detailed record in a blockchain-like format that is not corruptible and is verifiable for conflict resolution. A simulated IoT environment is created to show the advantage of the proposed protocol and it shows significant reduction in mean efforts due to the elimination of draws or undecided situations. Autonomous devices, such as cars, need to maintain meticulous, lightweight, but blockchain-like record keeping for insurance settlements or conflict resolutions; that archival data size is significantly reduced by the RPSH protocol.
Full article

Figure 1
Open AccessArticle
Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces
IoT 2021, 2(2), 326-340; https://doi.org/10.3390/iot2020017 - 18 May 2021
Abstract
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How
[...] Read more.
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How to integrate all this information in a reliable way to get a continuous authentication service presents several open challenges. Among these: how to combine semi-trusted information coming from non-tamper-proof sensors, where to store such data avoiding a single point of failure, how to analyse data in a distributed way, which interface to use to provide an authentication service to a multitude of different services and applications. In this paper, we present a Blockchain-based architectural solution of a distributed system able to transform IoT interactions into useful data for an authentication system. The design includes: (i) a security procedure to certify users’ positions and identities, (ii) a secure storage to hold this information, and (iii) a service to dynamically assign a trust level to a user’s position. We call this system “Secure Path”.
Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
Availability Modeling and Performance Improving of a Healthcare Internet of Things (IoT) System
by
and
IoT 2021, 2(2), 310-325; https://doi.org/10.3390/iot2020016 - 14 May 2021
Abstract
►▼
Show Figures
Internet of Things (IoT) is improving human life in a more convenient and simpler way. One of the most promising IoT applications is healthcare. In this paper, an availability model of a healthcare IoT system is proposed which is composed of two groups
[...] Read more.
Internet of Things (IoT) is improving human life in a more convenient and simpler way. One of the most promising IoT applications is healthcare. In this paper, an availability model of a healthcare IoT system is proposed which is composed of two groups of structures described by separate Markov state-space models. The two separate models are analyzed and combined to implement the whole IoT system modeling. The system balance equations are solved under a given scenario and some performance metrics of interest, such as probabilities of full service, degraded service, and the system unavailability, are derived. Detailed numerical evaluation of selected metrics is provided for further understanding and verification of the analytic results. An availability performance improving (API) method is also proposed for increasing the probability of system full service and decreasing the system unavailability. The proposed system modeling and performance improving method can serve as a useful reference for general IoT system design and evaluation.
Full article

Figure 1
Open AccessArticle
Using Citizen Science to Complement IoT Data Collection: A Survey of Motivational and Engagement Factors in Technology-Centric Citizen Science Projects
by
, , , and
IoT 2021, 2(2), 275-309; https://doi.org/10.3390/iot2020015 - 04 May 2021
Abstract
►▼
Show Figures
A key aspect of the development of Smart Cities involves the efficient and effective management of resources to improve liveability. Achieving this requires large volumes of sensors strategically deployed across urban areas. In many cases, however, it is not feasible to install devices
[...] Read more.
A key aspect of the development of Smart Cities involves the efficient and effective management of resources to improve liveability. Achieving this requires large volumes of sensors strategically deployed across urban areas. In many cases, however, it is not feasible to install devices in remote and inaccessible areas, resulting in incomplete data coverage. In such situations, citizens can often play a crucial role in filling this data collection gap. A popular complimentary science to traditional sensor-based data collection is to design Citizen Science (CS) activities in collaboration with citizens and local communities. Such activities are also designed with a feedback loop where the Citizens benefit from their participation by gaining a greater sense of awareness of their local issues while also influencing how the activities can align best with their local contexts. The participation and engagement of citizens are vital and yet often a real challenge in ensuring the long-term continuity of CS projects. In this paper, we explore engagement factors, factors that help keeping engagement high, in technology-centric CS projects where technology is a key enabler to support CS activities. We outline a literature review of exploring and understanding various motivational and engagement factors that influence the participation of citizens in technology-driven CS activities. Based on this literature, we present a mobile-based flood monitoring citizen science application aimed at supporting data collection activities in a real-world CS project as part of an EU project. We discuss the results of a user evaluation of this app, and finally discuss our findings within the context of citizens’ engagement.
Full article

Graphical abstract
Open AccessArticle
A Greedy Scheduling Approach for Peripheral Mobile Intelligent Systems
IoT 2021, 2(2), 249-274; https://doi.org/10.3390/iot2020014 - 30 Apr 2021
Abstract
Smart, pervasive devices have recently experienced accelerated technological development in the fields of hardware, software, and wireless connections. The promotion of various kinds of collaborative mobile computing requires an upgrade in network connectivity with wireless technologies, as well as enhanced peer-to-peer communication. Mobile
[...] Read more.
Smart, pervasive devices have recently experienced accelerated technological development in the fields of hardware, software, and wireless connections. The promotion of various kinds of collaborative mobile computing requires an upgrade in network connectivity with wireless technologies, as well as enhanced peer-to-peer communication. Mobile computing also requires appropriate scheduling methods to speed up the implementation and processing of various computing applications by better managing network resources. Scheduling techniques are relevant to the modern architectural models that support the IoT paradigm, particularly smart collaborative mobile computing architectures at the network periphery. In this regard, load-balancing techniques have also become necessary to exploit all the available capabilities and thus the speed of implementation. However, since the problem of scheduling and load-balancing, which we addressed in this study, is known to be NP-hard, the heuristic approach is well justified. We thus designed and validated a greedy scheduling and load-balancing algorithm to improve the utilization of resources. We conducted a comparison study with the longest cloudlet fact processing (LCFP), shortest cloudlet fact processing (SCFP), and Min-Min heuristic algorithms. The choice of those three algorithms is based on the efficiency and simplicity of their mechanisms, as reported in the literature, for allocating tasks to devices. The simulation we conducted showed the superiority of our approach over those algorithms with respect to the overall completion time criterion.
Full article
(This article belongs to the Special Issue Internet of Things Technologies for Smart Cities)
►▼
Show Figures

Figure 1
Open AccessArticle
Enabling Secure Guest Access for Command-and-Control of Internet of Things Devices
by
and
IoT 2021, 2(2), 236-248; https://doi.org/10.3390/iot2020013 - 29 Apr 2021
Abstract
Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper
[...] Read more.
Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper examines this problem in the context of IoT devices operating within C2 systems which do not have a trusted relationship with each other. We propose a solution which we call syndication, to provide a controlled mechanism to share data between C2 systems of devices without a fully trusted relationship. This paper builds upon previous work which established a lightweight protocol for secure C2 operations within the IoT. Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed. The paper concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.
Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT)
►▼
Show Figures

Graphical abstract
Open AccessArticle
ThriftyNets: Convolutional Neural Networks with Tiny Parameter Budget
IoT 2021, 2(2), 222-235; https://doi.org/10.3390/iot2020012 - 30 Mar 2021
Abstract
►▼
Show Figures
Deep Neural Networks are state-of-the-art in a large number of challenges in machine learning. However, to reach the best performance they require a huge pool of parameters. Indeed, typical deep convolutional architectures present an increasing number of feature maps as we go deeper
[...] Read more.
Deep Neural Networks are state-of-the-art in a large number of challenges in machine learning. However, to reach the best performance they require a huge pool of parameters. Indeed, typical deep convolutional architectures present an increasing number of feature maps as we go deeper in the network, whereas spatial resolution of inputs is decreased through downsampling operations. This means that most of the parameters lay in the final layers, while a large portion of the computations are performed by a small fraction of the total parameters in the first layers. In an effort to use every parameter of a network at its maximum, we propose a new convolutional neural network architecture, called ThriftyNet. In ThriftyNet, only one convolutional layer is defined and used recursively, leading to a maximal parameter factorization. In complement, normalization, non-linearities, downsamplings and shortcut ensure sufficient expressivity of the model. ThriftyNet achieves competitive performance on a tiny parameters budget, exceeding 91% accuracy on CIFAR-10 with less than 40 k parameters in total, 74.3% on CIFAR-100 with less than 600 k parameters, and 67.1% On ImageNet ILSVRC 2012 with no more than 4.15 M parameters. However, the proposed method typically requires more computations than existing counterparts.
Full article

Figure 1
Open AccessArticle
A Conceptual Architecture in Decentralizing Computing, Storage, and Networking Aspect of IoT Infrastructure
IoT 2021, 2(2), 205-221; https://doi.org/10.3390/iot2020011 - 28 Mar 2021
Cited by 2
Abstract
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT services, which require scalable and
[...] Read more.
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT services, which require scalable and responsive infrastructure. In response, decentralization becomes a considerable interest among IoT adopters. Following a similar trajectory, this paper introduces an IoT architecture re-work that enables three spheres of IoT workflows (i.e., computing, storage, and networking) to be run in a distributed manner. In particular, we employ the blockchain and smart contract to provide a secure computing platform. The distributed storage network maintains the saving of IoT raw data and application data. The software-defined networking (SDN) controllers and SDN switches exist in the architecture to provide connectivity across multiple IoT domains. We envision all of those services in the form of separate yet integrated peer-to-peer (P2P) overlay networks, which IoT actors such as IoT domain owners, IoT users, Internet Service Provider (ISP), and government can cultivate. We also present several IoT workflow examples showing how IoT developers can adapt to this new proposed architecture. Based on the presented workflows, the IoT computing can be performed in a trusted and privacy-preserving manner, the IoT storage can be made robust and verifiable, and finally, we can react to the network events automatically and quickly. Our discussions in this paper can be beneficial for many people ranging from academia, industries, and investors that are interested in the future of IoT in general.
Full article
(This article belongs to the Special Issue Industrial IoT as IT and OT Convergence: Challenges and Opportunities)
►▼
Show Figures

Figure 1
Open AccessArticle
An Agent-Based Model of Task-Allocation and Resource-Sharing for Social Internet of Things
IoT 2021, 2(1), 187-204; https://doi.org/10.3390/iot2010010 - 23 Mar 2021
Abstract
The things in the Internet of Things are becoming more and more socially aware. What social means for these things (more often termed as “social objects”) is predominately determined by how and when objects interact with each other. In this paper, an agent-based
[...] Read more.
The things in the Internet of Things are becoming more and more socially aware. What social means for these things (more often termed as “social objects”) is predominately determined by how and when objects interact with each other. In this paper, an agent-based model for Social Internet of Things is proposed, which features the realization of various interaction modalities, along with possible network structures and mobility modes, thus providing a novel model to ask interesting “what-if” questions. The scenario used, which is the acquisition of shared resources in a common spatial and temporal world, demands agents to have ad-hoc communication and a willingness to cooperate with others. The model was simulated for all possible combinations of input parameters to study the implications of competitive vs. cooperative social behavior while agents try to acquire shared resources/services in a peer-to-peer fashion. However, the main focus of the paper was to analyze the impact of profile-based mobility, which has an underpinning on parameters of extent and scale of a mobility profile. The simulation results, in addition to others, reveal that there are substantial and systematic differences among different combinations of values for extent and scale.
Full article
(This article belongs to the Special Issue The Leverage of Social Media and IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
IoT 2021, 2(1), 163-186; https://doi.org/10.3390/iot2010009 - 07 Mar 2021
Cited by 2
Abstract
In today’s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches,
[...] Read more.
In today’s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.
Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
IoT Traffic: Modeling and Measurement Experiments
IoT 2021, 2(1), 140-162; https://doi.org/10.3390/iot2010008 - 26 Feb 2021
Abstract
►▼
Show Figures
We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network
[...] Read more.
We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.
Full article

Graphical abstract
Open AccessArticle
CNN-Based Smart Sleep Posture Recognition System
IoT 2021, 2(1), 119-139; https://doi.org/10.3390/iot2010007 - 24 Feb 2021
Cited by 1
Abstract
►▼
Show Figures
Sleep pattern and posture recognition have become of great interest for a diverse range of clinical applications. Autonomous and constant monitoring of sleep postures provides useful information for reducing the health risk. Prevailing systems are designed based on electrocardiograms, cameras, and pressure sensors,
[...] Read more.
Sleep pattern and posture recognition have become of great interest for a diverse range of clinical applications. Autonomous and constant monitoring of sleep postures provides useful information for reducing the health risk. Prevailing systems are designed based on electrocardiograms, cameras, and pressure sensors, which are not only expensive but also intrusive in nature, and uncomfortable to use. We propose an unobtrusive and affordable smart system based on an electronic mat called Sleep Mat-e for monitoring the sleep activity and sleep posture of individuals living in residential care facilities. The system uses a pressure sensing mat constructed using piezo-resistive material to be placed on a mattress. The sensors detect the distribution of the body pressure on the mat during sleep and we use convolution neural network (CNN) to analyze collected data and recognize different sleeping postures. The system is capable of recognizing the four major postures—face-up, face-down, right lateral, and left lateral. A real-time feedback mechanism is also provided through an accompanying smartphone application for keeping a diary of the posture and send alert to the user in case there is a danger of falling from bed. It also produces synopses of postures and activities over a given duration of time. Finally, we conducted experiments to evaluate the accuracy of the prototype, and the proposed system achieved a classification accuracy of around 90%.
Full article

Graphical abstract
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Conferences
Special Issues
Special Issue in
IoT
Efficiency of Modern Data Centers (EMDC)
Guest Editors: Iyswarya Narayanan, Eyhab Al-Masri, Di WangDeadline: 30 September 2021
Special Issue in
IoT
Industrial IoT as IT and OT Convergence: Challenges and Opportunities
Guest Editors: Carlo Giannelli, Marco PiconeDeadline: 30 November 2021
Special Issue in
IoT
Artificial Intelligence and IoNT for Multi-Disciplinary Applications
Guest Editors: Vijayakumar Varadarajan, K. KalaiselviDeadline: 15 December 2021
Special Issue in
IoT
Future of Business Revolution by Internet of Business (IoB)
Guest Editor: Hamid Doost MohammadianDeadline: 31 December 2021


