Emerging Trends and Challenges in IoT Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (31 August 2023) | Viewed by 19911

Special Issue Editors


E-Mail Website
Guest Editor
Department of Cyber Security and Police, Busan University of Foreign Studies, Busan 46234, Korea
Interests: artificial intelligence; machine learning; machine learning-based authentication; biometric authentication; IoT; wireless sensor networks; IP routing; mobile networks

E-Mail Website
Guest Editor
Department of Computer Engineering, Chungbuk National University, Chungbuk 28644, Korea
Interests: networking technologies; sensing and data analytics; mobile and internet of things based smart applications
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In recent research, the nature of novel ICT technologies such as digital twins, various blockchain technologies, AI, technologies beyond 5G and 6G, etc., in terms of Internet-of-Things (IoT) networks plays a major role in seamless data acquisition and provision. Such a key role can be achieved via intensive integration and reliable connectivity among heterogeneous devices and communication technologies. As they are used in various applications related to our daily and near-future needs, IoT networks are facing diverse challenges such as quality of experience, cyber-physical security, privacy, trustworthiness, reliability, and self-sustainability, including social issues such as green technology. New applications also make up one of the challenges, from smart homes with small-scale coverage to smart cities that connect the devices of industries and consumers. Some promising approaches such as edge AI, blockchain, and cloud/fog/edge-based data intelligence may help to solve these emerging challenges.

This Special Issue aims to bring together academic and industrial researchers in sharing their views and ideas concerning emerging trends and challenges in IoT networks. Topics include, but are not limited to, the following areas:

  • Near-future technologies, requirements, and challenges of IoT networks;
  • Promising models, protocols, management, and architecture for IoT networks;
  • Cyber-physical applications over IoT networks;
  • Quality of service and experience for IoT networks;
  • Age of data issues for IoT networks;
  • Knowledge discovery and acquisition for IoT networks;
  • Machine learning for IoT networks;
  • Edge AI for IoT networks;
  • Security and privacy in IoT networks;
  • Green IoT networks;
  • Self-sustainable IoT networks;
  • Industrial IoT networks.

Prof. Dr. Hosung Park
Prof. Dr. Soochang Park
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (11 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research, Review

4 pages, 164 KiB  
Editorial
Emerging Trends and Challenges in IoT Networks
by Hosung Park and Soochang Park
Electronics 2024, 13(3), 513; https://doi.org/10.3390/electronics13030513 - 26 Jan 2024
Viewed by 863
Abstract
The nature of novel ICT technologies such as digital twins, various blockchain technologies, AI, technologies beyond 5G and 6G, etc [...] Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)

Research

Jump to: Editorial, Review

16 pages, 2701 KiB  
Article
Feature Importance-Based Backdoor Attack in NSL-KDD
by Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi
Electronics 2023, 12(24), 4953; https://doi.org/10.3390/electronics12244953 - 9 Dec 2023
Viewed by 1050
Abstract
In this study, we explore the implications of advancing AI technology on the safety of machine learning models, specifically in decision-making across diverse applications. Our research delves into the domain of network intrusion detection, covering rule-based and anomaly-based detection methods. There is a [...] Read more.
In this study, we explore the implications of advancing AI technology on the safety of machine learning models, specifically in decision-making across diverse applications. Our research delves into the domain of network intrusion detection, covering rule-based and anomaly-based detection methods. There is a growing interest in anomaly detection within network intrusion detection systems, accompanied by an increase in adversarial attacks using maliciously crafted examples. However, the vulnerability of intrusion detection systems to backdoor attacks, a form of adversarial attack, is frequently overlooked in untrustworthy environments. This paper proposes a backdoor attack scenario, centering on the “AlertNet” intrusion detection model and utilizing the NSL-KDD dataset, a benchmark widely employed in NIDS research. The attack involves modifying features at the packet level, as network datasets are typically constructed from packets using statistical methods. Evaluation metrics include accuracy, attack success rate, baseline comparisons with clean and random data, and comparisons involving the proposed backdoor. Additionally, the study employs KL-divergence and OneClassSVM for distribution comparisons to demonstrate resilience against manual inspection by a human expert from outliers. In conclusion, the paper outlines applications and limitations and emphasizes the direction and importance of research on backdoor attacks in network intrusion detection systems. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

26 pages, 19933 KiB  
Article
Architecture for Smart Buildings Based on Fuzzy Logic and the OpenFog Standard
by Imanol Martín Toral, Isidro Calvo, Jani Xenakis, Eneko Artetxe and Oscar Barambones
Electronics 2023, 12(24), 4889; https://doi.org/10.3390/electronics12244889 - 5 Dec 2023
Viewed by 1157
Abstract
The combination of Artificial Intelligence and IoT technologies, the so-called AIoT, is expected to contribute to the sustainability of public and private buildings, particularly in terms of energy management, indoor comfort, as well as in safety and security for the occupants. However, IoT [...] Read more.
The combination of Artificial Intelligence and IoT technologies, the so-called AIoT, is expected to contribute to the sustainability of public and private buildings, particularly in terms of energy management, indoor comfort, as well as in safety and security for the occupants. However, IoT systems deployed on modern buildings may generate big amounts of data that cannot be efficiently analyzed and stored in the Cloud. Fog computing has proven to be a suitable paradigm for distributing computing, storage control, and networking functions closer to the edge of the network along the Cloud-to-Things continuum, improving the efficiency of the IoT applications. Unfortunately, it can be complex to integrate all components to create interoperable AIoT applications. For this reason, it is necessary to introduce interoperable architectures, based on standard and universal frameworks, to distribute consistently the resources and the services of AIoT applications for smart buildings. Thus, the rationale for this study stems from the pressing need to introduce complex computing algorithms aimed at improving indoor comfort, safety, and environmental conditions while optimizing energy consumption in public and private buildings. This article proposes an open multi-layer architecture aimed at smart buildings based on a standard framework, the OpenFog Reference Architecture (IEEE 1934–2018 standard). The proposed architecture was validated experimentally at the Faculty of Engineering of Vitoria-Gasteiz to improve indoor environmental quality using Fuzzy logic. Experimental results proved the viability and scalability of the proposed architecture. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

23 pages, 7188 KiB  
Article
Empowering Accessibility: BLE Beacon-Based IoT Localization
by Patryk Pyt, Kacper Skrobacz, Piotr Jankowski-Mihułowicz, Mariusz Węglarski and Kazimierz Kamuda
Electronics 2023, 12(19), 4012; https://doi.org/10.3390/electronics12194012 - 23 Sep 2023
Viewed by 788
Abstract
The Internet of Things (IoT) localization empowers smart infrastructures of buildings to deliver advanced services to users leveraging mobile devices. In this context, in order to enhance the mobility of people with disabilities on the university campus, a Bluetooth Low Energy (BLE) beacon-based [...] Read more.
The Internet of Things (IoT) localization empowers smart infrastructures of buildings to deliver advanced services to users leveraging mobile devices. In this context, in order to enhance the mobility of people with disabilities on the university campus, a Bluetooth Low Energy (BLE) beacon-based indoor system was developed. Particular emphasis was placed on selection of the beacon for the designed application, which was performed on the basis of the energy demand characteristics at the assumed power settings and time intervals of the emitted signal. The paper also focuses on various concepts of transmitter deployment inside buildings of the campus in order to demonstrate possible configurations in which the IoT localization will work correctly. Based on experimental determination of the signal strength reaching users’ mobile devices, the best arrangement of the system was proposed. However, the dependence of the calculated distance between the interrogated beacon and the mobile device as a function of the received signal strength is a non-deterministic function of many factors; thus, only an approximate position can be designated on the performed measurements. Nevertheless, the BLE beacon-based system, supported by additional localization algorithms integrated into the user’s mobile software, can be useful for the applications in question. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

26 pages, 6092 KiB  
Article
Dynamic-RPL: Enhancing RPL-Based IoT Networks with Effective Support of Dynamic Topology Management
by Ibrahim S. Alsukayti
Electronics 2023, 12(18), 3834; https://doi.org/10.3390/electronics12183834 - 10 Sep 2023
Viewed by 927
Abstract
The inherent characteristics and limitations of Internet of Things networks make it hard to avoid facing adverse network conditions. Addressing high performance in extreme situations still remains a challenge even for a standardized routing protocol like the IPv6 Routing Protocol for Low Power [...] Read more.
The inherent characteristics and limitations of Internet of Things networks make it hard to avoid facing adverse network conditions. Addressing high performance in extreme situations still remains a challenge even for a standardized routing protocol like the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). No effective support is provided by the design of RPL to guarantee high network performance in the presence of such challenging conditions. To address such a compelling need, an innovative approach referred to as Dynamic-RPL is proposed in this research paper. With only limited in-protocol modifications to RPL, Dynamic-RPL provides effective support of dynamic topology management in a distributed manner. Seamless optimization of network topology is realized with dynamic topological adjustments to sustain high network performance and stability. It incorporates modified RPL topology establishment, customized RPL objective function and parent selection, a new dynamic topology management algorithm, and additional inter-routing support. The evaluation results demonstrated the ability of Dynamic-RPL to maintain high overall network performance irrespective of the adversity of ongoing network conditions. Considering varying-scale experimental setups, high QoS performance and low energy consumption were achieved without much increase in network overhead. Dynamic-RPL succeeded in adapting responsively with little time required to have the network performance successfully restored and network topology completely converged. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

37 pages, 1799 KiB  
Article
Digital Face Manipulation Creation and Detection: A Systematic Review
by Minh Dang and Tan N. Nguyen
Electronics 2023, 12(16), 3407; https://doi.org/10.3390/electronics12163407 - 10 Aug 2023
Cited by 2 | Viewed by 3109
Abstract
The introduction of publicly available large-scale datasets and advances in generative adversarial networks (GANs) have revolutionized the generation of hyper-realistic facial images, which are difficult to detect and can rapidly reach millions of people, with adverse impacts on the community. Research on manipulated [...] Read more.
The introduction of publicly available large-scale datasets and advances in generative adversarial networks (GANs) have revolutionized the generation of hyper-realistic facial images, which are difficult to detect and can rapidly reach millions of people, with adverse impacts on the community. Research on manipulated facial image detection and generation remains scattered and in development. This survey aimed to address this gap by providing a comprehensive analysis of the methods used to produce manipulated face images, with a focus on deepfake technology and emerging techniques for detecting fake images. The review examined four key groups of manipulated face generation techniques: (1) attributes manipulation, (2) facial re-enactment, (3) face swapping, and (4) face synthesis. Through an in-depth investigation, this study sheds light on commonly used datasets, standard manipulated face generation/detection approaches, and benchmarking methods for each manipulation group. Particular emphasis is placed on the advancements and detection techniques related to deepfake technology. Furthermore, the paper explores the benefits of analyzing deepfake while also highlighting the potential threats posed by this technology. Existing challenges in the field are discussed, and several directions for future research are proposed to tackle these challenges effectively. By offering insights into the state of the art for manipulated face image detection and generation, this survey contributes to the advancement of understanding and combating the misuse of deepfake technology. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

23 pages, 1394 KiB  
Article
Edge-Computing-Enabled Low-Latency Communication for a Wireless Networked Control System
by Daniel Poul Mtowe and Dong Min Kim
Electronics 2023, 12(14), 3181; https://doi.org/10.3390/electronics12143181 - 22 Jul 2023
Cited by 1 | Viewed by 1509
Abstract
This study proposes a novel strategy for enhancing low-latency control performance in Wireless Networked Control Systems (WNCSs) through the integration of edge computing. Traditional networked control systems require the receipt of raw data from remote sensors to enable the controller to generate an [...] Read more.
This study proposes a novel strategy for enhancing low-latency control performance in Wireless Networked Control Systems (WNCSs) through the integration of edge computing. Traditional networked control systems require the receipt of raw data from remote sensors to enable the controller to generate an appropriate control command, a process that can result in substantial periodic communication traffic and consequent performance degradation in some applications. To counteract this, we suggest the use of edge computing to preprocess the raw data, extract the essential features, and subsequently transmit them. Additionally, we introduce an adaptive scheme designed to curtail frequent data traffic by adaptively modifying periodic data transmission based on necessity. This scheme is achieved by refraining from data transmission when a comparative analysis of the previously transmitted and newly generated data shows no significant change. The effectiveness of our proposed strategy is empirically validated through experiments conducted on a remote control system testbed using a mobile robot that navigates the road by utilizing camera information. Through leveraging edge computing, only 3.42% of the raw data was transmitted. Our adaptive scheme reduced the transmission frequency by 20%, while maintaining an acceptable control performance. Moreover, we conducted a comparative analysis between our proposed solution and the state-of-the-art communication framework, WebRTC technology. The results demonstrate that our method effectively reduces the latency by 58.16% compared to utilizing the WebRTC alone in a 5G environment. The experimental results confirm that our proposed strategy significantly improves the latency performance of a WNCS. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

21 pages, 1020 KiB  
Article
A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk
by Panagiotis Sotiropoulos, Christos-Minas Mathas, Costas Vassilakis and Nicholas Kolokotronis
Electronics 2023, 12(10), 2278; https://doi.org/10.3390/electronics12102278 - 18 May 2023
Cited by 1 | Viewed by 1619
Abstract
Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to [...] Read more.
Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to these specifications and/or ready-made COTS/open source software may be identified and customized to realize the overall system goals. All deployed software however may entail vulnerabilities, either due to insecure coding practices or owing to misconfigurations and unexpected interactions. Moreover, software artefacts may implement a much broader set of functionalities than may be strictly necessary for the system at hand, in order to serve a wider range of needs, and failure to appropriately configure the deployed software to include only the required modules results in the further increase of the system attack surface and the associated risk. In this paper, we present a software vulnerability management framework which facilitates (a) the configuration of software to include only the necessary features, (b) the execution of security-related tests and the compilation of platform-wide software vulnerability lists, and (c) the prioritization of vulnerability addressing, considering the impact of each vulnerability, the associated technical debt for its remediation, and the available security budget. The proposed framework can be used as an aid in IoT platform implementation by software architects, developers, and security experts. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

15 pages, 2638 KiB  
Article
An Intelligent Intrusion Detection System for 5G-Enabled Internet of Vehicles
by Breno Sousa, Naercio Magaia and Sara Silva
Electronics 2023, 12(8), 1757; https://doi.org/10.3390/electronics12081757 - 7 Apr 2023
Cited by 8 | Viewed by 2155
Abstract
The deployment of 5G technology has drawn attention to different computer-based scenarios. It is useful in the context of Smart Cities, the Internet of Things (IoT), and Edge Computing, among other systems. With the high number of connected vehicles, providing network security solutions [...] Read more.
The deployment of 5G technology has drawn attention to different computer-based scenarios. It is useful in the context of Smart Cities, the Internet of Things (IoT), and Edge Computing, among other systems. With the high number of connected vehicles, providing network security solutions for the Internet of Vehicles (IoV) is not a trivial process due to its decentralized management structure and heterogeneous characteristics (e.g., connection time, and high-frequency changes in network topology due to high mobility, among others). Machine learning (ML) algorithms have the potential to extract patterns to cover security requirements better and to detect/classify malicious behavior in a network. Based on this, in this work we propose an Intrusion Detection System (IDS) for detecting Flooding attacks in vehicular scenarios. We also simulate 5G-enabled vehicular scenarios using the Network Simulator 3 (NS-3). We generate four datasets considering different numbers of nodes, attackers, and mobility patterns extracted from Simulation of Urban MObility (SUMO). Furthermore, our conducted tests show that the proposed IDS achieved F1 scores of 1.00 and 0.98 using decision trees and random forests, respectively. This means that it was able to properly classify the Flooding attack in the 5G vehicular environment considered. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

16 pages, 1334 KiB  
Article
CRLB Analysis for Passive Sensor Network Localization Using Intelligent Reconfigurable Surface and Phase Modulation
by Dunge Liu, Song Chen, Ziyang Lu, Shichao Jin and Yubin Zhao
Electronics 2023, 12(1), 202; https://doi.org/10.3390/electronics12010202 - 31 Dec 2022
Cited by 1 | Viewed by 976
Abstract
Passive wireless sensor network (PWSN) requires high positioning for network management. The harvested energy of the passive sensor is modulated as the ranging data and the position is derived accordingly. Thus, the wireless power transfer (WPT) is a dominant factor for such localization. [...] Read more.
Passive wireless sensor network (PWSN) requires high positioning for network management. The harvested energy of the passive sensor is modulated as the ranging data and the position is derived accordingly. Thus, the wireless power transfer (WPT) is a dominant factor for such localization. With the help of intelligent reconfigurable surface (IRS), the WPT efficiency can be significantly improved. In this paper, we propose the Fisher information matrix (FIM) and the Cramér–Rao lower bound (CRLB) analyzing model of the PWSN localization. We prove the impacts of phase modulation of IRS on the localization performance. Based on our analysis, we develop an approximation algorithm and a genetic algorithm to control the IRS phases. Then, the localization accuracy of PWSN can be further improved. The simulation results demonstrate that the phase modulation based on GA can achieve high accurate localization for PWSN using IRS. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

Review

Jump to: Editorial, Research

30 pages, 2067 KiB  
Review
Applications of Ontology in the Internet of Things: A Systematic Analysis
by Fahad Qaswar, M. Rahmah, Muhammad Ahsan Raza, A. Noraziah, Basem Alkazemi, Z. Fauziah, Mohd. Khairul Azmi Hassan and Ahmed Sharaf
Electronics 2023, 12(1), 111; https://doi.org/10.3390/electronics12010111 - 27 Dec 2022
Cited by 8 | Viewed by 4752
Abstract
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and object addressing. However, a complete understanding of using ontology in the IoT mechanism remains lacking. The main goal of this [...] Read more.
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and object addressing. However, a complete understanding of using ontology in the IoT mechanism remains lacking. The main goal of this research is to recognize the use of ontology in the IoT process and investigate the services of ontology in IoT activities. A systematic literature review (SLR) is conducted using predefined protocols to analyze the literature about the usage of ontologies in IoT. The following conclusions are obtained from the SLR. (1) Primary studies (i.e., selected 115 articles) have addressed the need to use ontologies in IoT for industries and the academe, especially to minimize interoperability and integration of IoT devices. (2) About 31.30% of extant literature discussed ontology development concerning the IoT interoperability issue, while IoT privacy and integration issues are partially discussed in the literature. (3) IoT styles of modeling ontologies are diverse, whereas 35.65% of total studies adopted the OWL style. (4) The 32 articles (i.e., 27.83% of the total studies) reused IoT ontologies to handle diverse IoT methodologies. (5) A total of 45 IoT ontologies are well acknowledged, but the IoT community has widely utilized none. An in-depth analysis of different IoT ontologies suggests that the existing ontologies are beneficial in designing new IoT ontology or achieving three main requirements of the IoT field: interoperability, integration, and privacy. This SLR is finalized by identifying numerous validity threats and future directions. Full article
(This article belongs to the Special Issue Emerging Trends and Challenges in IoT Networks)
Show Figures

Figure 1

Back to TopTop