Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal on Internet of Things (IoT) published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions
- High Visibility: indexed within ESCI (Web of Science), Scopus, EBSCO, and other databases.
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 25.7 days after submission; acceptance to publication is undertaken in 3.9 days (median values for papers published in this journal in the first half of 2025).
- Journal Rank: JCR - Q2 (Telecommunications) / CiteScore - Q1 (Computer Science (miscellaneous))
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
Impact Factor:
2.8 (2024);
5-Year Impact Factor:
3.2 (2024)
Latest Articles
Toward Smart School Mobility: IoT-Based Comfort Monitoring Through Sensor Fusion and Standardized Signal Analysis
IoT 2025, 6(3), 55; https://doi.org/10.3390/iot6030055 - 16 Sep 2025
Abstract
►
Show Figures
As smart cities evolve, integrating new technologies into school transportation is becoming increasingly important to ensure student comfort and safety. Monitoring and enhancing comfort during daily commutes can significantly influence well-being and learning readiness. However, most existing research addresses isolated factors, which limits
[...] Read more.
As smart cities evolve, integrating new technologies into school transportation is becoming increasingly important to ensure student comfort and safety. Monitoring and enhancing comfort during daily commutes can significantly influence well-being and learning readiness. However, most existing research addresses isolated factors, which limits the development of comprehensive and scalable solutions. This study presents the design and implementation of a low-cost, generalized IoT-based system for monitoring comfort in school transportation. The system processes multiple environmental and operational signals, and these data are transmitted to a cloud computing platform for real-time analysis. Signal processing incorporates standardized metrics, such as root mean square (RMS) values from ISO 2631-1 for vibration assessment. In addition, machine learning techniques, including a Random Forest classifier and ensemble-based models, are applied to classify ride comfort levels using both road roughness and environmental variables. The results show that stacked multisensor fusion achieved a significant improvement in classification performance compared with vibration-only models. The platform also integrates route visualization with commuting time per student, providing valuable information to assess the impact of travel duration on school mobility.
Full article
Open AccessArticle
Extending WSN Lifetime via Optimized Mobile Sink Trajectories: Linear Programming and Cuckoo Search Approaches with Overhearing-Aware Energy Models
by
Ghada Turki Al-Mamari, Fatma Bouabdallah and Asma Cherif
IoT 2025, 6(3), 54; https://doi.org/10.3390/iot6030054 - 14 Sep 2025
Abstract
►▼
Show Figures
Maximizing the lifetimes of Wireless Sensor Networks (WSNs) is a prominent area of research. The energy hole problem is a major cause of network shutdown, where nodes within the Sink coverage deplete their energy faster due to the high energy cost of forwarding
[...] Read more.
Maximizing the lifetimes of Wireless Sensor Networks (WSNs) is a prominent area of research. The energy hole problem is a major cause of network shutdown, where nodes within the Sink coverage deplete their energy faster due to the high energy cost of forwarding data from distant nodes to the Sink. Several research works have proposed solutions to address this issue, including the use of a mobile Sink to balance energy consumption throughout the network. However, most Sink mobility models overlook the energy consumption caused by overhearing, which is a critical factor in WSNs. In this paper, we introduce Linear Programming (LP) and Cuckoo Search (CS) metaheuristic optimization-based solutions to maximize the lifetime of WSNs by determining the optimal Sink sojourn points and associated durations. The proposed approaches consider the energy consumption levels of both reception and transmission, in addition to accounting for overhearing as an additional source of energy consumption. This allows for a comparison between the LP and CS solutions in terms of their effectiveness. To further enhance our solution, we apply the Travel Salesman Problem (TSP) to find the shortest path between the Sink sojourn points. By incorporating the TSP, we can optimize the routing path for the mobile Sink, thereby minimizing energy consumption and maximizing network lifetime. Test results demonstrate that the LP solution provides more accurate Sink sojourn times and locations, while the CS solution is faster, particularly for large WSNs. Moreover, our findings indicate that overlooking overhearing leads to a 48% decrease in WSN lifetime, making it essential to consider this factor if one is to achieve realistic results.
Full article

Figure 1
Open AccessArticle
Trustworthy Adaptive AI for Real-Time Intrusion Detection in Industrial IoT Security
by
Mohammad Al Rawajbeh, Amala Jayanthi Maria Soosai, Lakshmana Kumar Ramasamy and Firoz Khan
IoT 2025, 6(3), 53; https://doi.org/10.3390/iot6030053 - 8 Sep 2025
Abstract
Traditional security methods fail to match the speed of evolving threats because Industrial Internet of Things (IIoT) technologies have become more widely adopted. A lightweight adaptive AI-based intrusion detection system (IDS) for IIoT environments is presented in this paper. The proposed system detects
[...] Read more.
Traditional security methods fail to match the speed of evolving threats because Industrial Internet of Things (IIoT) technologies have become more widely adopted. A lightweight adaptive AI-based intrusion detection system (IDS) for IIoT environments is presented in this paper. The proposed system detects cyber threats in real time through an ensemble of online learning models that also adapt to changing network behavior. The system implements SHAP (SHapley Additive exPlanations) for model prediction explanations to allow human operators to verify and understand alert causes while addressing the essential need for trust and transparency. The system validation was performed using the ToN_IoT and Bot-IoT benchmark datasets. The proposed system detects threats with 96.4% accuracy while producing 2.1% false positives and requiring 35 ms on average for detection on edge devices with limited resources. Security analysts can understand model decisions through SHAP analysis because packet size and protocol type and device activity patterns strongly affect model predictions. The system underwent testing on a Raspberry Pi 5-based IIoT testbed to evaluate its deployability in real-world scenarios through emulation of practical edge environments with constrained computational resources. The research unites real-time adaptability with explainability and low-latency performance in an IDS framework specifically designed for industrial IoT security. The solution provides a scalable method to boost cyber resilience in manufacturing, together with energy and critical infrastructure sectors. By enabling fast, interpretable, and low-latency intrusion detection directly on edge devices, this solution enhances cyber resilience in critical sectors such as manufacturing, energy, and infrastructure, where timely and trustworthy threat responses are essential to maintaining operational continuity and safety.
Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessArticle
An Extension of Input Setup Assistance Service Using Generative AI to Unlearned Sensors for the SEMAR IoT Application Server Platform
by
I Nyoman Darma Kotama, Nobuo Funabiki, Yohanes Yohanie Fridelin Panduman, Komang Candra Brata, Anak Agung Surya Pradhana and Noprianto
IoT 2025, 6(3), 52; https://doi.org/10.3390/iot6030052 - 8 Sep 2025
Abstract
►▼
Show Figures
Nowadays, Internet of Things (IoT) application systems are broadly applied to various sectors of society for efficient management by monitoring environments using sensors, analyzing sampled data, and giving proper feedback. For their fast deployment, we have developed Smart Environmental Monitoring and Analysis in
[...] Read more.
Nowadays, Internet of Things (IoT) application systems are broadly applied to various sectors of society for efficient management by monitoring environments using sensors, analyzing sampled data, and giving proper feedback. For their fast deployment, we have developed Smart Environmental Monitoring and Analysis in Real Time (SEMAR) as an integrated IoT application server platform and implemented the input setup assistance service using prompt engineering and a generative AI model to assist connecting sensors to SEMAR with step-by-step guidance. However, the current service cannot assist in connections of the sensors not learned by the AI model, such as newly released ones. To address this issue, in this paper, we propose an extension to the service for handling unlearned sensors by utilizing datasheets with four steps: (1) users input a PDF datasheet containing information about the sensor, (2) key specifications are extracted from the datasheet and structured into markdown format using a generative AI, (3) this data is saved to a vector database using chunking and embedding methods, and (4) the data is used in Retrieval-Augmented Generation (RAG) to provide additional context when guiding users through sensor setup. Our evaluation with five generative AI models shows that OpenAI’s GPT-4o achieves the highest accuracy in extracting specifications from PDF datasheets and the best answer relevancy (0.987), while Gemini 2.0 Flash delivers the most balanced results, with the highest overall RAGAs score (0.76). Other models produced competitive but mixed outcomes, averaging 0.74 across metrics. The step-by-step guidance function achieved a task success rate above 80%. In a course evaluation by 48 students, the system improved the student test scores, further confirming the effectiveness of our proposed extension.
Full article

Figure 1
Open AccessReview
Internet of Things and Blockchain Adoption in Food Supply Chain: A Survey
by
Yehya Bouchbout, Ala-Eddine Benrazek, Bálint Molnár, Brahim Farou, Khawla Bouafia and Hamid Seridi
IoT 2025, 6(3), 51; https://doi.org/10.3390/iot6030051 - 2 Sep 2025
Abstract
►▼
Show Figures
The characteristics of Food Supply Chains (FSC) make them hard to manage properly, and many efforts have been conducted to alleviate the difficulties related to their management, especially when it comes to integrating the latest Information and Communications Technologies. The Internet of Things
[...] Read more.
The characteristics of Food Supply Chains (FSC) make them hard to manage properly, and many efforts have been conducted to alleviate the difficulties related to their management, especially when it comes to integrating the latest Information and Communications Technologies. The Internet of Things (IoT) has shown to be very beneficial in providing a holistic and real-time vision of FSCs. Blockchain, with its decentralization and immutability, is another promising technology, that is showing a great potential in managing FSCs. A lot of research has been carried out to prove the advantages of each of these technologies on its own. However, the research investigating their adoption together is still not enough. Our paper presents a study of recent advances in the integration of IoT and Blockchain in Food Supply Chain Management (FSCM) over the past five years. We identify key research trends, analyze the benefits and limitations of IoT–blockchain integration, and highlight major challenges hindering large-scale adoption. Finally, we propose future research directions to address these challenges and improve the adoption of IoT–blockchain solutions in FSCs. This study aims to serve as a reference for researchers and practitioners seeking to understand and advance the integration of these emerging technologies in FSCM.
Full article

Figure 1
Open AccessArticle
LightLiveAuth: A Lightweight Continuous Authentication Model for Virtual Reality
by
Pengyu Li, Feifei Chen, Lei Pan, Thuong Hoang, Ye Zhu and Leon Yang
IoT 2025, 6(3), 50; https://doi.org/10.3390/iot6030050 - 2 Sep 2025
Abstract
►▼
Show Figures
As network infrastructure and Internet of Things (IoT) technologies continue to evolve, immersive systems such as virtual reality (VR) are becoming increasingly integrated into interconnected environments. These advancements allow real-time processing of multi-modal data, improving user experiences with rich visual and three-dimensional interactions.
[...] Read more.
As network infrastructure and Internet of Things (IoT) technologies continue to evolve, immersive systems such as virtual reality (VR) are becoming increasingly integrated into interconnected environments. These advancements allow real-time processing of multi-modal data, improving user experiences with rich visual and three-dimensional interactions. However, ensuring continuous user authentication in VR environments remains a significant challenge. To address this issue, an effective user monitoring system is required to track VR users in real time and trigger re-authentication when necessary. Based on this premise, we propose a multi-modal authentication framework that uses eye-tracking data for authentication, named MobileNetV3pro. The framework applies a transfer learning approach by adapting the MobileNetV3Large architecture (pretrained on ImageNet) as a feature extractor. Its pre-trained convolutional layers are used to obtain high-level image representations, while a custom fully connected classification is added to perform binary classification. Authentication performance is evaluated using Equal Error Rate (EER), accuracy, F1-score, model size, and inference time. Experimental results show that eye-based authentication with MobileNetV3pro achieves a lower EER (3.00%) than baseline models, demonstrating its effectiveness in VR environments.
Full article

Figure 1
Open AccessReview
Energy-Efficient Strategies in Wireless Body Area Networks: A Comprehensive Survey
by
Marwa Boumaiz, Mohammed El Ghazi, Anas Bouayad, Younes Balboul and Moulhime El Bekkali
IoT 2025, 6(3), 49; https://doi.org/10.3390/iot6030049 - 29 Aug 2025
Abstract
►▼
Show Figures
Wireless body area networks (WBANs) are a pivotal solution for continuous health monitoring, but their energy constraints pose a significant challenge for long-term operation. This paper provides a comprehensive review of state-of-the-art energy-efficient mechanisms, critically evaluating solutions across various network layers. We focus
[...] Read more.
Wireless body area networks (WBANs) are a pivotal solution for continuous health monitoring, but their energy constraints pose a significant challenge for long-term operation. This paper provides a comprehensive review of state-of-the-art energy-efficient mechanisms, critically evaluating solutions across various network layers. We focus on three key approaches: energy-aware MAC protocols that reduce idle listening and optimize duty cycling; energy-efficient routing protocols that enhance data transmission and network longevity; and emerging energy harvesting techniques that offer a path toward energy-autonomous WBANs. Furthermore, the paper provides a detailed analysis of the inherent trade-offs between energy efficiency and other critical performance metrics, such as latency, reliability, and security. It also explores the transformative potential of emerging technologies, such as AI and blockchain, for dynamic energy management and secure data handling. By synthesizing these findings, this work contributes to the development of sustainable WBAN solutions and outlines clear directions for future research.
Full article

Figure 1
Open AccessArticle
A Two-Stage Hybrid Federated Learning Framework for Privacy-Preserving IoT Anomaly Detection and Classification
by
Mohammad Shahin, Ali Hosseinzadeh and F. Frank Chen
IoT 2025, 6(3), 48; https://doi.org/10.3390/iot6030048 - 29 Aug 2025
Abstract
The rapid surge of Artificial Internet-of-Things (AIoT) devices has outpaced the deployment of robust, privacy-preserving anomaly detection solutions suitable for resource-constrained edge environments. This paper presents a two-stage hybrid Federated Learning (FL) framework for IoT anomaly detection and classification, validated on the real-world
[...] Read more.
The rapid surge of Artificial Internet-of-Things (AIoT) devices has outpaced the deployment of robust, privacy-preserving anomaly detection solutions suitable for resource-constrained edge environments. This paper presents a two-stage hybrid Federated Learning (FL) framework for IoT anomaly detection and classification, validated on the real-world N-BaIoT dataset. In the first stage, each device trains a generative Artificial Intelligence (AI) model on benign traffic only, and in the second stage a Histogram-based Gradient-Boosting (HGB) classifier labels flagged traffic. All models operate under a synchronous, collaborative FL architecture across nine commercial IoT devices, thus preserving data privacy and minimizing communication. Through both inter- and intra-benchmarking against state-of-the-art baselines, the Variational Autoencoder–HGB (VAE-HGB) pipeline emerges as the top performer, achieving an average end-to-end accuracy of 99.14% across all classes. These results demonstrate that reconstruction-driven generative AI models, when combined with federated averaging and efficient classification, deliver a highly scalable, accurate, and privacy-preserving solution for securing resource-constrained IoT environments.
Full article
(This article belongs to the Special Issue AIoT-Enabled Sustainable Smart Manufacturing)
►▼
Show Figures

Figure 1
Open AccessArticle
Radio Frequency Fingerprinting Authentication for IoT Networks Using Siamese Networks
by
Raju Dhakal, Laxima Niure Kandel and Prashant Shekhar
IoT 2025, 6(3), 47; https://doi.org/10.3390/iot6030047 - 22 Aug 2025
Abstract
As IoT (internet of things) devices grow in prominence, safeguarding them from cyberattacks is becoming a pressing challenge. To bootstrap IoT security, device identification or authentication is crucial for establishing trusted connections among devices without prior trust. In this regard, radio frequency fingerprinting
[...] Read more.
As IoT (internet of things) devices grow in prominence, safeguarding them from cyberattacks is becoming a pressing challenge. To bootstrap IoT security, device identification or authentication is crucial for establishing trusted connections among devices without prior trust. In this regard, radio frequency fingerprinting (RFF) is gaining attention because it is more efficient and requires fewer computational resources compared to resource-intensive cryptographic methods, such as digital signatures. RFF works by identifying unique manufacturing defects in the radio circuitry of IoT devices by analyzing over-the-air signals that embed these imperfections, allowing for the identification of the transmitting hardware. Recent studies on RFF often leverage advanced classification models, including classical machine learning techniques such as K-Nearest Neighbor (KNN) and Support Vector Machine (SVM), as well as modern deep learning architectures like Convolutional Neural Network (CNN). In particular, CNNs are well-suited as they use multidimensional mapping to detect and extract reliable fingerprints during the learning process. However, a significant limitation of these approaches is that they require large datasets and necessitate retraining when new devices not included in the initial training set are added. This retraining can cause service interruptions and is costly, especially in large-scale IoT networks. In this paper, we propose a novel solution to this problem: RFF using Siamese networks, which eliminates the need for retraining and allows for seamless authentication in IoT deployments. The proposed Siamese network is trained using in-phase and quadrature (I/Q) samples from 10 different Software-Defined Radios (SDRs). Additionally, we present a new algorithm, the Similarity-Based Embedding Classification (SBEC) for RFF. We present experimental results that demonstrate that the Siamese network effectively distinguishes between malicious and trusted devices with a remarkable 98% identification accuracy.
Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
►▼
Show Figures

Figure 1
Open AccessReview
IoT and Machine Learning for Smart Bird Monitoring and Repellence: Techniques, Challenges, and Opportunities
by
Samson O. Ooko, Emmanuel Ndashimye, Evariste Twahirwa and Moise Busogi
IoT 2025, 6(3), 46; https://doi.org/10.3390/iot6030046 - 7 Aug 2025
Abstract
►▼
Show Figures
The activities of birds present increasing challenges in agriculture, aviation, and environmental conservation. This has led to economic losses, safety risks, and ecological imbalances. Attempts have been made to address the problem, with traditional deterrent methods proving to be labour-intensive, environmentally unfriendly, and
[...] Read more.
The activities of birds present increasing challenges in agriculture, aviation, and environmental conservation. This has led to economic losses, safety risks, and ecological imbalances. Attempts have been made to address the problem, with traditional deterrent methods proving to be labour-intensive, environmentally unfriendly, and ineffective over time. Advances in artificial intelligence (AI) and the Internet of Things (IoT) present opportunities for enabling automated real-time bird detection and repellence. This study reviews recent developments (2020–2025) in AI-driven bird detection and repellence systems, emphasising the integration of image, audio, and multi-sensor data in IoT and edge-based environments. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses framework was used, with 267 studies initially identified and screened from key scientific databases. A total of 154 studies met the inclusion criteria and were analysed. The findings show the increasing use of convolutional neural networks (CNNs), YOLO variants, and MobileNet in visual detection, and the growing use of lightweight audio-based models such as BirdNET, MFCC-based CNNs, and TinyML frameworks for microcontroller deployment. Multi-sensor fusion is proposed to improve detection accuracy in diverse environments. Repellence strategies include sound-based deterrents, visual deterrents, predator-mimicking visuals, and adaptive AI-integrated systems. Deployment success depends on edge compatibility, power efficiency, and dataset quality. The limitations of current studies include species-specific detection challenges, data scarcity, environmental changes, and energy constraints. Future research should focus on tiny and lightweight AI models, standardised multi-modal datasets, and intelligent, behaviour-aware deterrence mechanisms suitable for precision agriculture and ecological monitoring.
Full article

Figure 1
Open AccessSystematic Review
IoT Devices and Their Impact on Learning: A Systematic Review of Technological and Educational Affordances
by
Dimitris Tsipianitis, Anastasia Misirli, Konstantinos Lavidas and Vassilis Komis
IoT 2025, 6(3), 45; https://doi.org/10.3390/iot6030045 - 7 Aug 2025
Abstract
►▼
Show Figures
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the
[...] Read more.
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the educational and technological affordances of IoT applications in learning environments in secondary education. Our systematic review using the PRISMA method allowed us to extract 25 empirical studies from the last 10 years. We present the categorization of educational and technological affordances, as well as the devices used in these environments. Moreover, our findings indicate widespread adoption of organized educational activities and design-based learning, often incorporating tangible interfaces, smart objects, and IoT applications, which enhance student engagement and interaction. Additionally, we identify the impact of IoT-based learning on knowledge building, autonomous learning, student attitude, and motivation. The results suggest that the IoT can facilitate personalized and experiential learning, fostering a more immersive and adaptive educational experience. Based on these findings, we discuss key recommendations for educators, policymakers, and researchers, while also addressing this study’s limitations and potential directions for future research.
Full article

Figure 1
Open AccessFeature PaperArticle
Optimizing Urban Mobility Through Complex Network Analysis and Big Data from Smart Cards
by
Li Sun, Negin Ashrafi and Maryam Pishgar
IoT 2025, 6(3), 44; https://doi.org/10.3390/iot6030044 - 6 Aug 2025
Abstract
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation
[...] Read more.
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation within such networks. This study introduces a frequency-based framework that differentiates high-frequency (HF) and low-frequency (LF) passengers to examine how distinct user groups shape network structure, congestion vulnerability, and robustness. Using over 20 million smart-card records from Beijing’s multimodal transit system, we construct and analyze directed weighted networks for HF and LF users, integrating topological metrics, temporal comparisons, and community detection. Results reveal that HF networks are densely connected but structurally fragile, exhibiting lower modularity and significantly greater efficiency loss during peak periods. In contrast, LF networks are more spatially dispersed yet resilient, maintaining stronger intracommunity stability. Peak-hour simulation shows a 70% drop in efficiency and a 99% decrease in clustering, with HF networks experiencing higher vulnerability. Based on these findings, we propose differentiated policy strategies for each user group and outline a future optimization framework constrained by budget and equity considerations. This study contributes a scalable, data-driven approach to integrating passenger behavior with network science, offering actionable insights for resilient and inclusive transit planning.
Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
►▼
Show Figures

Figure 1
Open AccessReview
The Role of IoT in Enhancing Sports Analytics: A Bibliometric Perspective
by
Yuvanshankar Azhagumurugan, Jawahar Sundaram, Zenith Dewamuni, Pritika, Yakub Sebastian and Bharanidharan Shanmugam
IoT 2025, 6(3), 43; https://doi.org/10.3390/iot6030043 - 31 Jul 2025
Abstract
►▼
Show Figures
The use of Internet of Things (IoT) for sports innovation has transformed the way athletes train, compete, and recover in any sports activity. This study performs a bibliometric analysis to examine research trends, collaborations, and publications in the realm of IoT and Sports.
[...] Read more.
The use of Internet of Things (IoT) for sports innovation has transformed the way athletes train, compete, and recover in any sports activity. This study performs a bibliometric analysis to examine research trends, collaborations, and publications in the realm of IoT and Sports. Our analysis included 780 Scopus articles and 150 WoS articles published during 2012–2025, and duplicates were removed. We analyzed and visualized the bibliometric data using R version 3.6.1, VOSviewer version 1.6.20, and the bibliometrix library. The study provides insights from a bibliometric analysis, showcasing the allocation of topics, scientific contributions, patterns of co-authorship, prominent authors and their productivity over time, notable terms, key sources, publications with citations, analysis of citations, source-specific citation analysis, yearly publication patterns, and the distribution of research papers. The results indicate that China and India have the leading scientific production in the development of IoT and Sports research, with prominent authors like Anton Umek, Anton Kos, and Emiliano Schena making significant contributions. Wearable technology and wearable sensors are the most trending topics in IoT and Sports, followed by medical sciences and artificial intelligence paradigms. The analysis also emphasizes the importance of open-access journals like ‘Journal of Physics: Conference Series’ and ‘IEEE Access’ for their contributions to IoT and Sports research. Future research directions focus on enhancing effective, lightweight, and efficient wearable devices while implementing technologies like edge computing and lightweight AI in wearable technologies.
Full article

Figure 1
Open AccessArticle
A No-Code Educational Platform for Introducing Internet of Things and Its Application to Agricultural Education
by
George Lagogiannis and Avraam Chatzopoulos
IoT 2025, 6(3), 42; https://doi.org/10.3390/iot6030042 - 31 Jul 2025
Abstract
►▼
Show Figures
This study introduces a no-code educational platform created to introduce Internet of Things (IoT) to university students who lack programming experience. The platform allows users to set IoT sensor nodes, and create a wireless sensor network through a simple graphical interface. Sensors’ data
[...] Read more.
This study introduces a no-code educational platform created to introduce Internet of Things (IoT) to university students who lack programming experience. The platform allows users to set IoT sensor nodes, and create a wireless sensor network through a simple graphical interface. Sensors’ data can be sent to cloud services but they can also be stored locally, which makes our platform particularly realistic in fieldwork settings where internet access may be limited. The platform was tested in a pilot activity within a university course that previously covered IoT only in theory and was evaluated using the Technology Acceptance Model (TAM). Results showed strong student engagement and high ratings for ease of use, usefulness, and future use intent. These findings suggest that a no-code approach can effectively bridge the gap between IoT technologies and learners in non-engineering fields.
Full article

Figure 1
Open AccessArticle
Enhancing IoT Connectivity in Suburban and Rural Terrains Through Optimized Propagation Models Using Convolutional Neural Networks
by
George Papastergiou, Apostolos Xenakis, Costas Chaikalis, Dimitrios Kosmanos and Menelaos Panagiotis Papastergiou
IoT 2025, 6(3), 41; https://doi.org/10.3390/iot6030041 - 31 Jul 2025
Abstract
►▼
Show Figures
The widespread adoption of the Internet of Things (IoT) has driven major advancements in wireless communication, especially in rural and suburban areas where low population density and limited infrastructure pose significant challenges. Accurate Path Loss (PL) prediction is critical for the effective deployment
[...] Read more.
The widespread adoption of the Internet of Things (IoT) has driven major advancements in wireless communication, especially in rural and suburban areas where low population density and limited infrastructure pose significant challenges. Accurate Path Loss (PL) prediction is critical for the effective deployment and operation of Wireless Sensor Networks (WSNs) in such environments. This study explores the use of Convolutional Neural Networks (CNNs) for PL modeling, utilizing a comprehensive dataset collected in a smart campus setting that captures the influence of terrain and environmental variations. Several CNN architectures were evaluated based on different combinations of input features—such as distance, elevation, clutter height, and altitude—to assess their predictive accuracy. The findings reveal that CNN-based models outperform traditional propagation models (Free Space Path Loss (FSPL), Okumura–Hata, COST 231, Log-Distance), achieving lower error rates and more precise PL estimations. The best performing CNN configuration, using only distance and elevation, highlights the value of terrain-aware modeling. These results underscore the potential of deep learning techniques to enhance IoT connectivity in sparsely connected regions and support the development of more resilient communication infrastructures.
Full article

Figure 1
Open AccessArticle
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices
by
Iain Baird, Isam Wadhaj, Baraq Ghaleb, Craig Thomson and Gordon Russell
IoT 2025, 6(3), 40; https://doi.org/10.3390/iot6030040 - 11 Jul 2025
Abstract
►▼
Show Figures
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility
[...] Read more.
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility and post-quantum resilience for lightweight resource-constrained devices. This paper presents a comparative evaluation of the energy costs associated with SHA-256 and SHA-3 hashing in Contiki 3.0, using three generationally distinct IoT platforms: Sky Mote, Z1 Mote, and Wismote. Unlike previous studies that rely on hardware acceleration or limited scope, our work conducts a uniform, software-only analysis across all motes, employing consistent radio duty cycling, ContikiMAC (a low-power Medium Access Control protocol) and isolating the cryptographic workload from network overhead. The empirical results from the Cooja simulator reveal that while SHA-3 provides advanced security features, it incurs significantly higher CPU and, in some cases, radio energy costs particularly on legacy hardware. However, modern platforms like Wismote demonstrate a more balanced trade-off, making SHA-3 viable in higher-capability deployments. These findings offer actionable guidance for designers of secure IoT systems, highlighting the practical implications of cryptographic selection in energy-sensitive environments.
Full article

Figure 1
Open AccessArticle
An Adaptive Holt–Winters Model for Seasonal Forecasting of Internet of Things (IoT) Data Streams
by
Samer Sawalha and Ghazi Al-Naymat
IoT 2025, 6(3), 39; https://doi.org/10.3390/iot6030039 - 10 Jul 2025
Abstract
In various applications, IoT temporal data play a crucial role in accurately predicting future trends. Traditional models, including Rolling Window, SVR-RBF, and ARIMA, suffer from a potential accuracy decrease because they generally use all available data or the most recent data window during
[...] Read more.
In various applications, IoT temporal data play a crucial role in accurately predicting future trends. Traditional models, including Rolling Window, SVR-RBF, and ARIMA, suffer from a potential accuracy decrease because they generally use all available data or the most recent data window during training, which can result in the inclusion of noisy data. To address this critical issue, this paper proposes a new forecasting technique called Adaptive Holt–Winters (AHW). The AHW approach utilizes two models grounded in an exponential smoothing methodology. The first model is trained on the most current data window, whereas the second extracts information from a historical data segment exhibiting patterns most analogous to the present. The outputs of the two models are then combined, demonstrating enhanced prediction precision since the focus is on the relevant data patterns. The effectiveness of the AHW model is evaluated against well-known models (Rolling Window, SVR-RBF, ARIMA, LSTM, CNN, RNN, and Holt–Winters), utilizing various metrics, such as RMSE, MAE, p-value, and time performance. A comprehensive evaluation covers various real-world datasets at different granularities (daily and monthly), including temperature from the National Climatic Data Center (NCDC), humidity and soil moisture measurements from the Basel City environmental system, and global intensity and global reactive power from the Individual Household Electric Power Consumption (IHEPC) dataset. The evaluation results demonstrate that AHW constantly attains higher forecasting accuracy across the tested datasets compared to other models. This indicates the efficacy of AHW in leveraging pertinent data patterns for enhanced predictive precision, offering a robust solution for temporal IoT data forecasting.
Full article
(This article belongs to the Topic Internet of Things Architectures, Applications, and Strategies: Emerging Paradigms, Technologies, and Advancing AI Integration)
►▼
Show Figures

Figure 1
Open AccessArticle
Secure and Efficient Video Management: A Novel Framework for CCTV Surveillance Systems
by
Swarnalatha Camalapuram Subramanyam, Ansuman Bhattacharya and Koushik Sinha
IoT 2025, 6(3), 38; https://doi.org/10.3390/iot6030038 - 4 Jul 2025
Abstract
►▼
Show Figures
This paper presents a novel video encoding and decoding method aimed at enhancing security and reducing storage requirements, particularly for CCTV systems. The technique merges two video streams of matching frame dimensions into a single stream, optimizing disk space usage without compromising video
[...] Read more.
This paper presents a novel video encoding and decoding method aimed at enhancing security and reducing storage requirements, particularly for CCTV systems. The technique merges two video streams of matching frame dimensions into a single stream, optimizing disk space usage without compromising video quality. The combined video is secured using an advanced encryption standard (AES)-based shift algorithm that rearranges pixel positions, preventing unauthorized access. During decoding, the AES shift is reversed, enabling precise reconstruction of the original videos. This approach provides a space-efficient and secure solution for managing multiple video feeds while ensuring accurate recovery of the original content. The experimental results demonstrate that the transmission time for the encoded video is consistently shorter compared to transmitting the video streams separately. This, in turn, leads to about reduction in energy consumption across diverse outdoor and indoor video datasets, highlighting significant improvements in both transmission efficiency and energy savings by our proposed scheme.
Full article

Figure 1
Open AccessArticle
Using Blockchain Ledgers to Record AI Decisions in IoT
by
Vikram Kulothungan
IoT 2025, 6(3), 37; https://doi.org/10.3390/iot6030037 - 3 Jul 2025
Cited by 2
Abstract
The rapid integration of AI into IoT systems has outpaced the ability to explain and audit automated decisions, resulting in a serious transparency gap. We address this challenge by proposing a blockchain-based framework to create immutable audit trails of AI-driven IoT decisions. In
[...] Read more.
The rapid integration of AI into IoT systems has outpaced the ability to explain and audit automated decisions, resulting in a serious transparency gap. We address this challenge by proposing a blockchain-based framework to create immutable audit trails of AI-driven IoT decisions. In our approach, each AI inference comprising key inputs, model ID, and output is logged to a permissioned blockchain ledger, ensuring that every decision is traceable and auditable. IoT devices and edge gateways submit cryptographically signed decision records via smart contracts, resulting in an immutable, timestamped log that is tamper-resistant. This decentralized approach guarantees non-repudiation and data integrity while balancing transparency with privacy (e.g., hashing personal data on-chain) to meet data protection norms. Our design aligns with emerging regulations, such as the EU AI Act’s logging mandate and GDPR’s transparency requirements. We demonstrate the framework’s applicability in two domains: healthcare IoT (logging diagnostic AI alerts for accountability) and industrial IoT (tracking autonomous control actions), showing its generalizability to high-stakes environments. Our contributions include the following: (1) a novel architecture for AI decision provenance in IoT, (2) a blockchain-based design to securely record AI decision-making processes, and (3) a simulation informed performance assessment based on projected metrics (throughput, latency, and storage) to assess the approach’s feasibility. By providing a reliable immutable audit trail for AI in IoT, our framework enhances transparency and trust in autonomous systems and offers a much-needed mechanism for auditable AI under increasing regulatory scrutiny.
Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
Construction Worker Activity Recognition Using Deep Residual Convolutional Network Based on Fused IMU Sensor Data in Internet-of-Things Environment
by
Sakorn Mekruksavanich and Anuchit Jitpattanakul
IoT 2025, 6(3), 36; https://doi.org/10.3390/iot6030036 - 28 Jun 2025
Abstract
►▼
Show Figures
With the advent of Industry 4.0, sensor-based human activity recognition has become increasingly vital for improving worker safety, enhancing operational efficiency, and optimizing workflows in Internet-of-Things (IoT) environments. This study introduces a novel deep learning-based framework for construction worker activity recognition, employing a
[...] Read more.
With the advent of Industry 4.0, sensor-based human activity recognition has become increasingly vital for improving worker safety, enhancing operational efficiency, and optimizing workflows in Internet-of-Things (IoT) environments. This study introduces a novel deep learning-based framework for construction worker activity recognition, employing a deep residual convolutional neural network (ResNet) architecture integrated with multi-sensor fusion techniques. The proposed system processes data from multiple inertial measurement unit sensors strategically positioned on workers’ bodies to identify and classify construction-related activities accurately. A comprehensive pre-processing pipeline is implemented, incorporating Butterworth filtering for noise suppression, data normalization, and an adaptive sliding window mechanism for temporal segmentation. Experimental validation is conducted using the publicly available VTT-ConIoT dataset, which includes recordings of 16 construction activities performed by 13 participants in a controlled laboratory setting. The results demonstrate that the ResNet-based sensor fusion approach outperforms traditional single-sensor models and other deep learning methods. The system achieves classification accuracies of 97.32% for binary discrimination between recommended and non-recommended activities, 97.14% for categorizing six core task types, and 98.68% for detailed classification across sixteen individual activities. Optimal performance is consistently obtained with a 4-second window size, balancing recognition accuracy with computational efficiency. Although the hand-mounted sensor proved to be the most effective as a standalone unit, multi-sensor configurations delivered significantly higher accuracy, particularly in complex classification tasks. The proposed approach demonstrates strong potential for real-world applications, offering robust performance across diverse working conditions while maintaining computational feasibility for IoT deployment. This work advances the field of innovative construction by presenting a practical solution for real-time worker activity monitoring, which can be seamlessly integrated into existing IoT infrastructures to promote workplace safety, streamline construction processes, and support data-driven management decisions.
Full article

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
19 September 2025
Meet Us at the China National Computer Congress 2025, 23–25 October 2025, Harbin, China
Meet Us at the China National Computer Congress 2025, 23–25 October 2025, Harbin, China

3 September 2025
Join Us at the MDPI at the University of Toronto Career Fair, 23 September 2025, Toronto, ON, Canada
Join Us at the MDPI at the University of Toronto Career Fair, 23 September 2025, Toronto, ON, Canada

Topics
Topic in
Applied Sciences, Electronics, IoT, JSAN, Network, Sensors, Telecom, Technologies
Wireless Energy Harvesting and Power Transfer for Communications and Networks
Topic Editors: Yichuang Sun, Arooj Mubashara Siddiqui, Xiaojing Chen, Oluyomi SimpsonDeadline: 31 October 2025
Topic in
Electronics, IoT, Sustainability, AgriEngineering, AI Sensors
Smart Farming 2.0: IoT and Edge AI for Precision Crop Management and Sustainability
Topic Editors: Chiang Liang Kok, Teck Kheng Lee, Howard Tang, Fanyi MengDeadline: 31 December 2025
Topic in
Applied Sciences, Electronics, Future Internet, IoT, Technologies, Inventions, Sensors, Vehicles
Next-Generation IoT and Smart Systems for Communication and Sensing
Topic Editors: Dinh-Thuan Do, Vitor Fialho, Luis Pires, Francisco Rego, Ricardo Santos, Vasco VelezDeadline: 31 January 2026
Topic in
Energies, Sensors, Electronics, Smart Cities, IoT, Batteries, Automation
IoT for Energy Management Systems and Smart Cities, 2nd Edition
Topic Editors: Antonio Cano-Ortega, Francisco Sánchez-SutilDeadline: 10 March 2026

Special Issues
Special Issue in
IoT
Advances in Distributed Learning and Optimization over Networks: Techniques, Algorithms, and Applications
Guest Editors: Gang Yan, Kang Yang, Guojun XiongDeadline: 30 September 2025
Special Issue in
IoT
IoT Meets AI: Driving the Next Generation of Technology
Guest Editor: Grigorios E. KoulourasDeadline: 31 October 2025
Special Issue in
IoT
Blockchain-Based Trusted IoT
Guest Editors: Shahriar Kaisar, Abebe Diro, Abdullahi ChowdhuryDeadline: 15 December 2025
Special Issue in
IoT
Cybersecurity in the Age of the Internet of Things
Guest Editor: Firoz KhanDeadline: 31 December 2025