Skip to Content

Most Recent

  • Article
  • Open Access
142 Views
40 Pages

Research Communities in Smart Homes Security: A Systematic Mapping Study

  • Fazeleh Dehghani Ashkezari,
  • Andreas Jacobsson,
  • Kayode S. Adewole,
  • Klara Svalin and
  • Martin Höst

11 February 2026

Smart homes are becoming increasingly common, bringing convenience to users but also raising serious security concerns. As the number of connected devices grows, so does the research interest in securing smart homes. However, the literature is broad,...

  • Article
  • Open Access
287 Views
31 Pages

Lightweight Protection Mechanisms for IoT Networks Based on Trust Modelling

  • Andric Rodríguez,
  • Asdrúbal López-Chau,
  • Leticia Dávila-Nicanor,
  • Víctor Landassuri-Moreno and
  • Saul Lazcano-Salas

10 February 2026

Since the deployment of the Internet of Things (IoT), it has transformed everyday life by enabling intelligent environments that improve efficiency and automate services in domains such as agriculture, healthcare, smart cities, and industry. However,...

  • Article
  • Open Access
185 Views
18 Pages

10 February 2026

Migrating to Post-Quantum Cryptography (PQC) is critical for securing resource-constrained Internet of Things (IoT) devices against the “harvest-now, decrypt-later” threat. While ML-KEM (CRYSTALS-Kyber) has been standardized under FIPS 20...

  • Review
  • Open Access
246 Views
38 Pages

7 February 2026

The rapid growth of the Internet of Things (IoT) has exposed billions of interconnected, heterogeneous, and resource-constrained devices to increasingly sophisticated threats. To evaluate the readiness of current intrusion detection systems (IDSs), t...

  • Review
  • Open Access
336 Views
39 Pages

29 January 2026

Healthcare 5.0 and the Internet of Medical Things (IoMT) is emerging as a scalable model for the delivery of customised healthcare and chronic disease management, through Remote Patient Monitoring (RPM) in patient smart home environments. Large-scale...

  • Article
  • Open Access
217 Views
31 Pages

G-PFL-ID: Graph-Driven Personalized Federated Learning for Unsupervised Intrusion Detection in Non-IID IoT Systems

  • Daniel Ayo Oladele,
  • Ayokunle Ige,
  • Olatunbosun Agbo-Ajala,
  • Olufisayo Ekundayo,
  • Sree Ganesh Thottempudi,
  • Malusi Sibiya and
  • Ernest Mnkandla

29 January 2026

Intrusion detection in IoT networks is challenged by data heterogeneity, label scarcity, and privacy constraints. Traditional federated learning (FL) methods often assume IID data or require supervised labels, limiting their practicality. We propose...

  • Article
  • Open Access
297 Views
25 Pages

27 January 2026

The rapid expansion of Internet of Things (IoT)-enabled smart grids has intensified the need for reliable fault detection and autonomous self-healing under non-stationary operating conditions characterized by frequent concept drift. To address the li...

  • Article
  • Open Access
306 Views
24 Pages

26 January 2026

In Internet of Things (IoT) systems, data collected by geographically distributed sensors is often incomplete due to device failures, harsh deployment conditions, energy constraints, and unreliable communication. Such data gaps can significantly degr...

  • Article
  • Open Access
189 Views
25 Pages

23 January 2026

The growing need to foster inclusive education in university environments has driven the development of technological solutions aimed at improving the academic experiences of students with disabilities. These individuals often face barriers to autono...

  • Article
  • Open Access
551 Views
15 Pages

Experimental Evaluation of NB-IoT Power Consumption and Energy Source Feasibility for Long-Term IoT Deployments

  • Valters Skrastins,
  • Vladislavs Medvedevs,
  • Dmitrijs Orlovs,
  • Juris Ormanis and
  • Janis Judvaitis

13 January 2026

Narrowband Internet of Things (NB-IoT) is widely used for connecting low-power devices that must operate for years without maintenance. To design reliable systems, it is essential to understand how much energy these devices consume under different co...

  • Systematic Review
  • Open Access
650 Views
41 Pages

A Systematic Review of Self-Adaptive Mobile Applications with Cooperative Dimension

  • Berhanyikun Amanuel Gebreselassie,
  • Nuno M. Garcia and
  • Dida Midekso

31 December 2025

The proliferation of mobile devices has driven significant growth in adaptive mobile applications (AMAs) that dynamically adjust their behavior based on contextual changes. While existing research has extensively studied individual adaptive systems,...

  • Review
  • Open Access
1,732 Views
40 Pages

Intelligent Water Management Through Edge-Enabled IoT, AI, and Big Data Technologies

  • Petros Amanatidis,
  • Eleftherios Lyratzis,
  • Vasileios Angelopoulos,
  • Eleftherios Kouloumpris,
  • Efstratios Skaperdas,
  • Nick Bassiliades,
  • Ioannis Vlahavas,
  • Fotios Maris,
  • Dimitrios Emmanouloudis and
  • Dimitris Karampatzakis

31 December 2025

In the 21st century, Urbanization, population growth, and climate change have created significant problems in water resource management. Recent advancements in technologies such as Internet of Things (IoT), Edge Computing (EC), Artificial Intelligenc...

  • Article
  • Open Access
454 Views
17 Pages

30 December 2025

The rapid expansion of Internet of Things (IoT) systems in critical infrastructures has raised significant concerns regarding network security and reliability. In particular, RPL (Routing Protocol for Low-Power and Lossy Networks), widely adopted in...

  • Article
  • Open Access
510 Views
30 Pages

25 December 2025

Zero-day intrusions on IoT endpoints demand defenses that curtail attacker impact and persistence after breach. This article presents Fine-Grained Runtime Containment Agent (FG-RCA), a lightweight post-exploitation containment system that learns leas...

  • Article
  • Open Access
334 Views
18 Pages

Orthogonal Space-Time Bluetooth System for IoT Communications

  • Rodrigo Aldana-López,
  • Omar Longoria-Gandara,
  • Jose Valencia-Velasco,
  • Javier Vázquez-Castillo and
  • Luis Pizano-Escalante

22 December 2025

There is increasing interest in improving the reliability of short-range wireless links in dense IoT deployments, where BLE is widely used due to its low power consumption and robust GFSK modulation. For this purpose, this work presents a novel Ortho...

  • Review
  • Open Access
737 Views
62 Pages

Blockchain-Based Certification in Fisheries: A Survey of Technologies and Methodologies

  • Isaac Olayemi Olaleye,
  • Oluwafemi Olowojuni,
  • Asoro Ojevwe Blessing and
  • Jesús Rodríguez-Molina

22 December 2025

The integrity of certification processes in the agrifood and fishing industries is essential for combating fraud, ensuring food safety, and meeting rising consumer expectations for transparency and sustainability. Yet, current certification systems r...

  • Article
  • Open Access
1,129 Views
43 Pages

Privacy-Preserving Federated Learning for Distributed Financial IoT: A Blockchain-Based Framework for Secure Cryptocurrency Market Analytics

  • Oleksandr Kuznetsov,
  • Saltanat Adilzhanova,
  • Serhiy Florov,
  • Valerii Bushkov and
  • Danylo Peremetchyk

11 December 2025

The proliferation of Internet of Things (IoT) devices in financial markets has created distributed ecosystems where cryptocurrency exchanges, trading platforms, and market data providers operate as autonomous edge nodes generating massive volumes of...

  • Review
  • Open Access
1,693 Views
20 Pages

LPWAN Technologies for IoT: Real-World Deployment Performance and Practical Comparison

  • Dmitrijs Orlovs,
  • Artis Rusins,
  • Valters Skrastiņš and
  • Janis Judvaitis

10 December 2025

Low Power Wide Area Networks (LPWAN) have emerged as essential connectivity solutions for the Internet of Things (IoT), addressing requirements for long range, energy efficient communication that traditional wireless technologies cannot meet. With LP...

  • Article
  • Open Access
626 Views
16 Pages

Fog Computing and Graph-Based Databases for Remote Health Monitoring in IoMT Settings

  • Karrar A. Yousif,
  • Jorge Calvillo-Arbizu and
  • Agustín W. Lara-Romero

3 December 2025

Remote patient monitoring is a promising and transformative pillar of healthcare. However, deploying such systems at a scale—across thousands of patients and Internet of Medical Things (IoMT) devices—demands robust, low-latency, and scala...

  • Article
  • Open Access
850 Views
49 Pages

IoT-Driven Destination Prediction in Smart Urban Mobility: A Comparative Study of Markov Chains and Hidden Markov Models

  • João Batista Firmino Junior,
  • Francisco Dantas Nobre Neto,
  • Bruno Neiva Moreno and
  • Tiago Brasileiro Araújo

3 December 2025

The increasing availability of IoT-enabled mobility data and intelligent transportation systems in Smart Cities demands efficient and interpretable models for destination prediction. This study presents a comparative analysis between Markov Chains an...

  • Article
  • Open Access
635 Views
26 Pages

29 November 2025

The proliferation of Internet of Medical Things (IoMT) devices in healthcare requires robust intrusion detection systems to protect sensitive data and ensure patient safety. While existing neural network-based Intrusion Detection Systems have shown c...

  • Article
  • Open Access
892 Views
27 Pages

26 November 2025

It is essential to assign the correct triage level to patients as soon as they arrive in the emergency department in order to save lives, especially during peak demand. However, many healthcare systems estimate the triage levels by manual eyes-on eva...

  • Article
  • Open Access
2 Citations
787 Views
24 Pages

A Machine Learning Approach to Detect Denial of Sleep Attacks in Internet of Things (IoT)

  • Ishara Dissanayake,
  • Anuradhi Welhenge and
  • Hesiri Dhammika Weerasinghe

20 November 2025

The Internet of Things (IoT) has rapidly evolved into a central component of today’s technological landscape, enabling seamless connectivity and communication among a vast array of devices. It underpins automation, real-time monitoring, and sma...

  • Article
  • Open Access
1,070 Views
21 Pages

Lightweight Quantized XGBoost for Botnet Detection in Resource-Constrained IoT Networks

  • Mohammed Rauf Ali Khan,
  • Abdulaziz Y. Barnawi,
  • Adnan Munir,
  • Zainab Alsalman and
  • Dario Marcelo Satan Sanunga

18 November 2025

The rapid expansion of IoT devices has introduced significant security challenges, with malware authors constantly evolving their techniques to exploit vulnerabilities in IoT networks. Despite this growing threat, progress in developing effective det...

  • Article
  • Open Access
1 Citations
2,136 Views
34 Pages

17 November 2025

Cloud-centric IoT frameworks remain dominant; however, they introduce major challenges related to data privacy, latency, and system resilience. Existing open-source solutions often lack standardized principles for scalable, local-first deployment and...

  • Article
  • Open Access
608 Views
20 Pages

WireDepth: IoT-Enabled Multi-Sensor Depth Monitoring for Precision Subsoiling in Sugarcane

  • Saman Abdanan Mehdizadeh,
  • Aghajan Bahadori,
  • Manocheher Ebadian,
  • Mohammad Hasan Sadeghian,
  • Mansour Nasr Esfahani and
  • Yiannis Ampatzidis

14 November 2025

Subsoil compaction is a major constraint in sugarcane production, limiting yields and reducing resource-use efficiency. This study presents WireDepth, an innovative cloud-connected monitoring system that leverages edge computing and IoT technologies...

  • Article
  • Open Access
1 Citations
1,376 Views
26 Pages

Centralized Two-Tiered Tree-Based Intrusion-Detection System (C2T-IDS)

  • Hisham Abdul Karim Yassine,
  • Mohammed El Saleh,
  • Bilal Ezzeddine Nakhal and
  • Abdallah El Chakik

5 November 2025

The exponential growth of Internet of Things (IoT) devices introduces significant security challenges due to their resource constraints and diverse attack surfaces. To address these issues, this paper proposes the Centralized Two-Tiered Tree-Based In...

  • Review
  • Open Access
2,159 Views
25 Pages

A Systematic Review for Ammonia Monitoring Systems Based on the Internet of Things

  • Adriel Henrique Monte Claro da Silva,
  • Mikaelle Karoline da Silva,
  • Augusto Santos and
  • Luis Arturo Gómez-Malagón

30 October 2025

Ammonia is a gas primarily produced for use in agriculture, refrigeration systems, chemical manufacturing, and power generation. Despite its benefits, improper management of ammonia poses significant risks to human health and the environment. Consequ...

  • Article
  • Open Access
2 Citations
3,130 Views
28 Pages

Blockchain for Secure IoT: A Review of Identity Management, Access Control, and Trust Mechanisms

  • Behnam Khayer,
  • Siamak Mirzaei,
  • Hooman Alavizadeh and
  • Ahmad Salehi Shahraki

28 October 2025

Blockchain technologies offer transformative potential in terms of addressing the security, trust, and identity management issues that exist in large-scale Internet of Things (IoT) deployments. This narrative review provides a comprehensive survey of...

  • Article
  • Open Access
2,232 Views
20 Pages

Compost Monitoring System for Kitchen Waste Management: Development, Deployment and Analysis

  • Sasirekha Gurla Venkata Kameswari,
  • Arun Basavaraju,
  • Chandrashekhar Siva Kumar and
  • Jyotsna Bapat

27 October 2025

Composting can be perceived as an art and science of converting organic waste into a rich and nutritious soil amendment—compost. The existing literature talks about how and what parameters need to be monitored in the process of composting and w...

  • Article
  • Open Access
1,027 Views
30 Pages

Case-Based Data Quality Management for IoT Logs: A Case Study Focusing on Detection of Data Quality Issues

  • Alexander Schultheis,
  • Yannis Bertrand,
  • Joscha Grüger,
  • Lukas Malburg,
  • Ralph Bergmann and
  • Estefanía Serral Asensio

23 October 2025

Smart manufacturing applications increasingly rely on time-series data from Industrial IoT sensors, yet these data streams often contain data quality issues (DQIs) that affect analysis and disrupt production. While traditional Machine Learning method...

  • Article
  • Open Access
833 Views
20 Pages

21 October 2025

Resource-constrained IoT and IIoT systems require detection architectures that balance accuracy with energy efficiency, scalability, and contextual awareness. This paper presents a conceptual framework informed by a systematic review of energy-aware...

  • Review
  • Open Access
2,737 Views
29 Pages

16 October 2025

The dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article...

  • Article
  • Open Access
1,291 Views
30 Pages

2 October 2025

Frame Replication and Elimination for Reliability (FRER) in Time-Sensitive Networking (TSN) enhances fault tolerance by duplicating critical traffic across disjoint paths. However, always-on FRER configurations introduce persistent redundancy overhea...

  • Article
  • Open Access
697 Views
20 Pages

25 September 2025

The adverse propagation environment in underground coal mine tunnels caused by enclosed spaces, rough surfaces, and dense scatterers severely degrades reliable wireless signal transmission, which further impedes the deployment of IoT applications suc...

  • Article
  • Open Access
2,054 Views
21 Pages

Acoustic Trap Design for Biodiversity Detection

  • Chingiz Seyidbayli,
  • Bárbara Fengler,
  • Daniel Szafranski and
  • Andreas Reinhardt

24 September 2025

Real-time insect monitoring is essential for sustainable agriculture and biodiversity conservation. The traditional method of attracting insects to colored glue traps and manually counting the catch is time-intensive and requires specialized taxonomi...

  • Article
  • Open Access
1,265 Views
18 Pages

UniTwin: Enabling Multi-Digital Twin Coordination for Modeling Distributed and Complex Systems

  • Tim Markus Häußermann,
  • Joel Lehmann,
  • Florian Kolb,
  • Alessa Rache and
  • Julian Reichwald

23 September 2025

The growing complexity and scale of Cyber–Physical Systems (CPSs) have led to an increasing need for the holistic orchestration of multiple Digital Twins (DTs). Therefore, an extension to the UniTwin framework is introduced within this paper. U...

  • Article
  • Open Access
5 Citations
2,572 Views
34 Pages

AI-Driven Attack Detection and Cryptographic Privacy Protection for Cyber-Resilient Industrial Control Systems

  • Archana Pallakonda,
  • Kabilan Kaliyannan,
  • Rahul Loganathan Sumathi,
  • Rayappa David Amar Raj,
  • Rama Muni Reddy Yanamala,
  • Christian Napoli and
  • Cristian Randieri

22 September 2025

Industrial control systems (ICS) are increasingly vulnerable to evolving cyber threats due to the convergence of operational and information technologies. This research presents a robust cybersecurity framework that integrates machine learning-based...

  • Article
  • Open Access
4,802 Views
39 Pages

Toward Smart School Mobility: IoT-Based Comfort Monitoring Through Sensor Fusion and Standardized Signal Analysis

  • Lorena León Quiñonez,
  • Luiz Cesar Martini,
  • Leonardo de Souza Mendes,
  • Felipe Marques Pires and
  • Carlos Carrión Betancourt

16 September 2025

As smart cities evolve, integrating new technologies into school transportation is becoming increasingly important to ensure student comfort and safety. Monitoring and enhancing comfort during daily commutes can significantly influence well-being and...

  • Article
  • Open Access
1,118 Views
39 Pages

14 September 2025

Maximizing the lifetimes of Wireless Sensor Networks (WSNs) is a prominent area of research. The energy hole problem is a major cause of network shutdown, where nodes within the Sink coverage deplete their energy faster due to the high energy cost of...

  • Article
  • Open Access
5 Citations
3,156 Views
20 Pages

Trustworthy Adaptive AI for Real-Time Intrusion Detection in Industrial IoT Security

  • Mohammad Al Rawajbeh,
  • Amala Jayanthi Maria Soosai,
  • Lakshmana Kumar Ramasamy and
  • Firoz Khan

8 September 2025

Traditional security methods fail to match the speed of evolving threats because Industrial Internet of Things (IIoT) technologies have become more widely adopted. A lightweight adaptive AI-based intrusion detection system (IDS) for IIoT environments...

  • Article
  • Open Access
1,456 Views
30 Pages

An Extension of Input Setup Assistance Service Using Generative AI to Unlearned Sensors for the SEMAR IoT Application Server Platform

  • I Nyoman Darma Kotama,
  • Nobuo Funabiki,
  • Yohanes Yohanie Fridelin Panduman,
  • Komang Candra Brata,
  • Anak Agung Surya Pradhana and
  • Noprianto

8 September 2025

Nowadays, Internet of Things (IoT) application systems are broadly applied to various sectors of society for efficient management by monitoring environments using sensors, analyzing sampled data, and giving proper feedback. For their fast deployment,...

  • Review
  • Open Access
3,967 Views
36 Pages

Internet of Things and Blockchain Adoption in Food Supply Chain: A Survey

  • Yehya Bouchbout,
  • Ala-Eddine Benrazek,
  • Bálint Molnár,
  • Brahim Farou,
  • Khawla Bouafia and
  • Hamid Seridi

2 September 2025

The characteristics of Food Supply Chains (FSC) make them hard to manage properly, and many efforts have been conducted to alleviate the difficulties related to their management, especially when it comes to integrating the latest Information and Comm...

  • Article
  • Open Access
1,320 Views
23 Pages

LightLiveAuth: A Lightweight Continuous Authentication Model for Virtual Reality

  • Pengyu Li,
  • Feifei Chen,
  • Lei Pan,
  • Thuong Hoang,
  • Ye Zhu and
  • Leon Yang

2 September 2025

As network infrastructure and Internet of Things (IoT) technologies continue to evolve, immersive systems such as virtual reality (VR) are becoming increasingly integrated into interconnected environments. These advancements allow real-time processin...

  • Review
  • Open Access
2 Citations
5,056 Views
59 Pages

Energy-Efficient Strategies in Wireless Body Area Networks: A Comprehensive Survey

  • Marwa Boumaiz,
  • Mohammed El Ghazi,
  • Anas Bouayad,
  • Younes Balboul and
  • Moulhime El Bekkali

29 August 2025

Wireless body area networks (WBANs) are a pivotal solution for continuous health monitoring, but their energy constraints pose a significant challenge for long-term operation. This paper provides a comprehensive review of state-of-the-art energy-effi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
IoT - ISSN 2624-831X