Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (14,655)

Search Parameters:
Keywords = Internet of Things

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
40 pages, 1639 KB  
Review
Antenna Performance and Effects of Concealment Within Building Structures: A Comprehensive Review
by Mirza Farrukh Baig and Ervina Efzan Mhd Noor
Technologies 2026, 14(5), 259; https://doi.org/10.3390/technologies14050259 (registering DOI) - 25 Apr 2026
Abstract
The rapid expansion of wireless communication in urban environments requires antenna systems that balance high electromagnetic performance with stringent aesthetic and security constraints. This review examines recent advances in concealed antenna technologies integrated into building structures, with a focus on performance variation, material-induced [...] Read more.
The rapid expansion of wireless communication in urban environments requires antenna systems that balance high electromagnetic performance with stringent aesthetic and security constraints. This review examines recent advances in concealed antenna technologies integrated into building structures, with a focus on performance variation, material-induced attenuation, and emerging concealment strategies. Techniques such as transparent conductors on glass, structural embedding within walls, and camouflage-based designs are shown to significantly influence resonance behavior, radiation efficiency, and pattern characteristics compared to free-space operation. Despite these challenges, optimized solutions including transparent conductive oxide arrays, wideband embedded antenna geometries, and metasurface-enhanced window structures can partially recover performance while maintaining optical transparency above 70%. Material loading effects are found to induce resonant frequency shifts of approximately 10–44%, depending on dielectric properties and environmental conditions. Transparent antenna arrays achieve gains ranging from 0.34 to 13.2 dBi, while signal-transmissive wall systems demonstrate transmission improvements of up to 22 dB relative to untreated building materials. These technologies enable a wide range of applications, including 5G and beyond-5G cellular networks across sub-6 GHz and millimeter-wave bands, as well as Internet of Things systems and smart city infrastructure. However, key challenges remain, including the need for comprehensive characterization of building material electromagnetic properties, optimization of multilayer structural environments, and the development of standardized design and evaluation methodologies. This review provides a unified framework for understanding the tradeoffs associated with antenna concealment and identifies critical research directions for the development of building-integrated wireless systems in next-generation communication networks. Full article
(This article belongs to the Section Information and Communication Technologies)
0 pages, 626 KB  
Proceeding Paper
Disruptive Technologies and Workforce Transformation: The Mediating Role of HR Strategy
by Ioannis Zervas and Emmanouil Stiakakis
Proceedings 2026, 140(1), 1; https://doi.org/10.3390/proceedings2026140001 (registering DOI) - 24 Apr 2026
Abstract
This study examines how disruptive technologies reshape workforce skill requirements and organizational responses. As tools such as Artificial Intelligence, the Internet of Things, and cloud infrastructures become embedded in everyday operations, employees increasingly confront evolving competence demands. Drawing on data from 622 employees [...] Read more.
This study examines how disruptive technologies reshape workforce skill requirements and organizational responses. As tools such as Artificial Intelligence, the Internet of Things, and cloud infrastructures become embedded in everyday operations, employees increasingly confront evolving competence demands. Drawing on data from 622 employees across Greece, Spain, and Italy, the study proposes and tests a structural model linking disruptive technology exposure with perceived skill gaps, organizational readiness, strategic HR alignment, and skill update intention. The findings show that disruptive technology exposure is positively associated with perceived skill gaps, which in turn relate to organizational readiness, strategic HR alignment, and stronger skill update intention. These results highlight the importance of coordinated organizational and HR mechanisms in supporting continuous learning. Full article
Show Figures

Figure 1

38 pages, 6938 KB  
Article
DeepSense: An Adaptive Scalable Ensemble Framework for Industrial IoT Anomaly Detection
by Amir Firouzi and Ali A. Ghorbani
Sensors 2026, 26(9), 2662; https://doi.org/10.3390/s26092662 (registering DOI) - 24 Apr 2026
Abstract
The Industrial Internet of Things (IIoT) has become a cornerstone of modern industrial automation, enabling real-time monitoring, intelligent decision-making, and large-scale connectivity across cyber–physical systems. However, the growing scale, heterogeneity, and dynamic behavior of IIoT environments significantly expand the attack surface and challenge [...] Read more.
The Industrial Internet of Things (IIoT) has become a cornerstone of modern industrial automation, enabling real-time monitoring, intelligent decision-making, and large-scale connectivity across cyber–physical systems. However, the growing scale, heterogeneity, and dynamic behavior of IIoT environments significantly expand the attack surface and challenge the effectiveness of conventional security mechanisms. In this paper, we propose DeepSense, a hybrid and adaptive anomaly and intrusion detection framework specifically designed for resource-constrained and heterogeneous IIoT deployments. DeepSense integrates three complementary components: DataSense, a realistic data pipeline and experimental testbed supporting synchronized sensor and network data processing; RuleSense, a lightweight rule-based detection layer that provides fast, deterministic, and interpretable anomaly screening at the edge; and NeuroSense, a learning-driven detection module comprising an adaptive ensemble of 22 machine learning and deep learning models spanning classical, neural, hybrid, and Transformer-based architectures. NeuroSense operates as a second detection stage that validates suspicious events flagged by RuleSense and enables both coarse-grained and fine-grained attack classification. To support rigorous and practical assessment, this work further introduces a comprehensive performance evaluation framework that extends beyond accuracy-centric metrics by jointly considering detection quality, latency, resource efficiency, and detection coverage, alongside an optimization-based process for selecting Pareto-optimal model ensembles under realistic IIoT constraints. Extensive experiments across diverse detection scenarios demonstrate that DeepSense exhibits strong generalization, lower false positive rates, and robust performance under evolving attack behaviors. The proposed framework provides a scalable and efficient IIoT security solution that meets the operational requirements of Industry 4.0 and the resilience-oriented objectives of Industry 5.0. Full article
26 pages, 1853 KB  
Article
Reaction Sequence Coordination in Ternary Solid-Waste Systems for Low-Carbon Cementitious Materials
by Youlin Ye, Guangyu Zhou, Yannian Zhang, Xin Wei and Ben Niu
Appl. Sci. 2026, 16(9), 4205; https://doi.org/10.3390/app16094205 (registering DOI) - 24 Apr 2026
Abstract
Using solid waste as supplementary cementitious materials (SCMs) is an effective strategy for promoting low-carbon construction development. However, single or binary systems often exhibit mismatched reaction kinetics, thereby limiting their performance at high cement replacement rates. This study focuses on a novel low-carbon [...] Read more.
Using solid waste as supplementary cementitious materials (SCMs) is an effective strategy for promoting low-carbon construction development. However, single or binary systems often exhibit mismatched reaction kinetics, thereby limiting their performance at high cement replacement rates. This study focuses on a novel low-carbon concrete designed based on reaction sequence coordination, containing recycled brick powder (RBP), ground granulated blast-furnace slag (GGBS), and self-combusting coal gangue (SCCG). The effects of RBP, GGBS, and SCCG on the hydration process and microstructure of the novel low-carbon concrete with different replacement levels have been studied by testing compressive strength, workability, and durability and observing microstructural changes. The results showed that an optimized ternary composition with an RBP:GGBS:SCCG ratio of 4:3:1 achieves a cement replacement level of 30% while exhibiting a 28-day compressive strength of 38.26 MPa, representing a 14.2% increase compared with plain cement mortar. Microstructural analyses indicate that this enhanced performance results from a time-dependent reaction sequence, in which GGBS contributes predominantly at early ages by supplying calcium, whereas RBP and SCCG mainly participate through delayed pozzolanic reactions and pore refinement at later ages. Consequently, the optimized ternary mortar exhibits a water absorption of 11.12% and a 27.2% reduction in electrical flux. This study aims to provide practical strategies for enhancing the performance of low-carbon cementitious materials through a reaction sequence coordination design approach, thereby improving the utilization efficiency of solid waste in the production of low-carbon building materials. Full article
(This article belongs to the Section Civil Engineering)
29 pages, 2359 KB  
Article
DC-PBFT: A Censorship-Resistant PBFT Consensus Algorithm Based on Power Balancing
by Jiawei Lin and Jiali Zheng
Electronics 2026, 15(9), 1818; https://doi.org/10.3390/electronics15091818 - 24 Apr 2026
Abstract
The classic design of the Practical Byzantine Fault Tolerance (PBFT) protocol relies on a centralized primary node, which not only creates a performance bottleneck but also introduces severe data censorship risks, threatening the data integrity and security of Edge Computing networks. To address [...] Read more.
The classic design of the Practical Byzantine Fault Tolerance (PBFT) protocol relies on a centralized primary node, which not only creates a performance bottleneck but also introduces severe data censorship risks, threatening the data integrity and security of Edge Computing networks. To address this challenge, this paper proposes DC-PBFT (Decoupled PBFT), a censorship-resistant consensus protocol for Edge-Internet of Things (Edge-IoT) environments. The core innovation of DC-PBFT lies in the decoupling of the Proposer and Primary roles, supplemented by Verifiable Random Function (VRF)-based dynamic role rotation, which fundamentally eliminates the arbitrary power of a single node. Building on this, the protocol introduces a parallel group consensus mechanism: an elected Consensus Committee (CC) composed of Active Edge Nodes leads the consensus, while an independent Replica Network (RN) performs parallel validation. When a disagreement arises, the protocol triggers a global disagreement arbitration process involving all nodes to guarantee final consistency and attribute fault. To ensure long-term incentive compatibility, we also designed a hybrid election mechanism combining Proof-of-Stake and dynamic reputation, along with corresponding economic incentives and a tiered penalty system. Theoretical analysis proves that DC-PBFT satisfies Consistency and Liveness, and achieves strong censorship resistance guarantees. Simulation results demonstrate that DC-PBFT’s scalability significantly outperforms PBFT and RepChain; its reputation mechanism effectively improves long-term performance under sustained Byzantine attacks; and, compared to asynchronous censorship-resistant protocols like HoneyBadgerBFT, DC-PBFT achieves censorship resistance with over 45% lower transaction confirmation latency. Full article
Show Figures

Figure 1

28 pages, 3382 KB  
Article
Design and Experimental Evaluation of a Hierarchical LoRaMESH-Based Sensor Network with Wi-Fi HaLow Backhaul for Smart Agriculture
by Cuong Chu Van, Anh Tran Tuan and Duan Luong Cong
Sensors 2026, 26(9), 2645; https://doi.org/10.3390/s26092645 - 24 Apr 2026
Abstract
Large-scale smart agriculture requires reliable and energy-efficient wireless connectivity to support distributed environmental sensing across wide rural areas. However, existing low-power wide-area network (LPWAN) technologies often face limitations in scalability, reliability, or infrastructure dependency when deployed in large agricultural fields. This study presents [...] Read more.
Large-scale smart agriculture requires reliable and energy-efficient wireless connectivity to support distributed environmental sensing across wide rural areas. However, existing low-power wide-area network (LPWAN) technologies often face limitations in scalability, reliability, or infrastructure dependency when deployed in large agricultural fields. This study presents the design and experimental evaluation of a hierarchical sensor network architecture that integrates LoRaMESH for multi-hop sensing communication and Wi-Fi HaLow as a sub-GHz backhaul for data aggregation and cloud connectivity. In the proposed system, LoRaMESH forms intra-cluster sensor networks using a lightweight controlled flooding protocol, while Wi-Fi HaLow provides long-range IP-based connectivity between cluster gateways and a central access point. A real-world deployment covering approximately 2.5km×1km of agricultural area was implemented to evaluate the performance of the proposed architecture. Experimental results show that the LoRaMESH network achieves packet delivery ratios above 90% across one to three hops, with average end-to-end delays between 10.6 s and 13.3 s. The Wi-Fi HaLow backhaul demonstrates high reliability within short to medium distances, reaching 99.5% packet delivery ratio at 50 m and 89.68% at 200 m. Energy measurements further indicate that the sensor nodes consume only 21.19μA in sleep mode, enabling long-term battery-powered operation suitable for agricultural monitoring applications. These results indicate that the proposed hierarchical architecture is a feasible connectivity option for the tested large-scale agricultural sensing scenario. Because no side-by-side LoRaWAN or NB-IoT benchmark was conducted on the same testbed, the results should be interpreted as a field validation of the proposed architecture rather than as a direct experimental demonstration of superiority over alternative LPWAN systems. Full article
(This article belongs to the Special Issue Wireless Communication and Networking for loT)
14 pages, 395 KB  
Article
A Lightweight Certificateless Identity Authentication Protocol Using SM2 Algorithm and Self-Secured PUF for IoT
by Meili Zhang, Qianqian Zhao, Chao Li, Weidong Fang and Zhong Tong
Sensors 2026, 26(9), 2640; https://doi.org/10.3390/s26092640 - 24 Apr 2026
Abstract
The rapid proliferation of the Internet of Things (IoT) leaves terminal devices vulnerable to considerable security challenges, notably the absence of robust yet efficient identity authentication mechanisms. Traditional certificate-based approaches incur substantial management overhead and storage expenditure, whereas Identity-Based Cryptography poses inherent key [...] Read more.
The rapid proliferation of the Internet of Things (IoT) leaves terminal devices vulnerable to considerable security challenges, notably the absence of robust yet efficient identity authentication mechanisms. Traditional certificate-based approaches incur substantial management overhead and storage expenditure, whereas Identity-Based Cryptography poses inherent key escrow risks. To tackle these challenges, this paper proposes a PUF and SM2-based certificateless identity authentication mechanism that integrates SM2 Certificateless Public Key Cryptography (a Chinese national cryptographic standard) with Physical Unclonable Functions (PUFs). Initially, the proposed solution utilizes PUF technology to derive a unique hardware-generated “fingerprint” from an IoT device, which functions as a root key to generate a partial user private key. This approach essentially binds the terminal’s identity to its physical hardware, thereby effectively mitigating physical cloning attacks against nodes. Moreover, through the adoption of a Certificateless Public Key Cryptography (CLPKC) framework, the complete user private key is jointly generated by a semi-trusted Key Generation Centre (KGC) and the terminal device itself. The comprehensive security analysis proves that the proposed scheme is provably secure under the random oracle model, capable of resisting various common attacks such as physical cloning, man-in-the-middle, and replay attacks. Performance evaluation confirms that the implemented PUF + SM2 certificateless mechanism significantly reduces the size of user public key identifiers to within 64 bytes, offering a substantial advantage over the 1–2 KB certificates typically required in conventional PKI/CA systems, thereby enhancing efficiency in storage and communication. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)
24 pages, 2467 KB  
Article
Comparative Development of Machine Learning Models for Short-Term Indoor CO2 Forecasting Using Low-Cost IoT Sensors: A Case Study in a University Smart Laboratory
by Zhanel Baigarayeva, Assiya Boltaboyeva, Zhuldyz Kalpeyeva, Raissa Uskenbayeva, Maksat Turmakhan, Adilet Kakharov, Aizhan Anartayeva and Aiman Moldagulova
Algorithms 2026, 19(5), 328; https://doi.org/10.3390/a19050328 - 24 Apr 2026
Abstract
Unlike reactive systems, mechanical ventilation controlled by CO2 concentration operates at a target efficiency that dynamically increases whenever the target CO2 level is exceeded. This approach eliminates the typical ‘dead-time’ and prevents air quality degradation by ensuring the system adjusts its [...] Read more.
Unlike reactive systems, mechanical ventilation controlled by CO2 concentration operates at a target efficiency that dynamically increases whenever the target CO2 level is exceeded. This approach eliminates the typical ‘dead-time’ and prevents air quality degradation by ensuring the system adjusts its performance immediately in response to concentration changes. In this work, the study focuses on the development and evaluation of data-driven predictive models for near-term indoor CO2 forecasting that can be integrated into pre-occupancy ventilation strategies, rather than designing a complete control scheme. Experimental data were collected over four months in a 48 m2 smart laboratory configured as an open-plan office, where a heterogeneous IoT sensing architecture logged synchronized time-series measurements of CO2 and microclimate variables (temperature, relative humidity, PM2.5, TVOCs), together with acoustic noise levels and appliance-level energy consumption used as indirect occupancy-related signals. Raw telemetry was transformed into a 22-feature state vector using a structured feature engineering method incorporating z-score standardization, cyclic time encodings, multi-horizon CO2 lags, rolling statistics, momentum features, and non-linear interactions to represent temporal autocorrelation and daily periodicity. The study benchmarks multiple regression paradigms, including simple baselines and ensemble methods, and found that an automated multi-level stacked ensemble achieved the highest predictive fidelity for short-term forecasting, with an Mean Absolute Error (MAE) of 32.97 ppm across an observed CO2 range of 403–2305 ppm, representing improvements of approximately 24% and 43% over Linear Regression and K-Nearest Neighbors (KNN), respectively. Temporal diagnostics showed strong phase alignment with observed CO2 rises during occupancy transitions and statistically reliable prediction intervals. Five-fold walk-forward cross-validation confirmed the temporal stability of these results, with top models achieving consistent R2 values of 0.93–0.95 across Folds 2–5. These results demonstrate that, within a single-room university laboratory setting, historical sensor data from low-cost IoT devices can support accurate short-term CO2 forecasting, providing a predictive layer that could support future proactive ventilation scheduling aimed at reducing CO2 lag at the start of occupancy while avoiding unnecessary ventilation runtime. Generalization to other building types and occupancy profiles requires further validation. Full article
(This article belongs to the Special Issue Emerging Trends in Distributed AI for Smart Environments)
Show Figures

Figure 1

21 pages, 1778 KB  
Article
A Post-Quantum Authentication and Key Agreement Protocol Based on Lattice-Based KEM for Secure Network Environments
by Xiaoping Chen, Wangyu Wu, Guangmin Liang, Haonan Tan and Yicheng Yu
Entropy 2026, 28(5), 490; https://doi.org/10.3390/e28050490 (registering DOI) - 24 Apr 2026
Abstract
In emerging environments such as cloud computing and the Internet of Things (IoT), secure authentication and key negotiation play a crucial role in protecting data transmitted over public networks. However, many existing authentication protocols are still designed based on classical public-key cryptography primitives, [...] Read more.
In emerging environments such as cloud computing and the Internet of Things (IoT), secure authentication and key negotiation play a crucial role in protecting data transmitted over public networks. However, many existing authentication protocols are still designed based on classical public-key cryptography primitives, and quantum computing may threaten their security. To address this challenge, we propose a post-quantum authentication and key agreement protocol that uses the lattice-based Kyber key encapsulation mechanism (KEM). Our proposed protocol integrates cryptographic authentication, smart card protection, and post-quantum key encapsulation mechanisms, enabling mutual authentication between users and servers and securely establishing session keys. The security of the protocol is formally analyzed in the Real-or-Random (ROR) model under the random oracle assumption and the IND-CCA security of the underlying KEM scheme. Furthermore, through informal security analysis, we have further demonstrated that the protocol possesses important security properties, including anonymity, untraceability, perfect forward confidentiality, and resistance to known attacks. In addition, the computational cost and communication overhead of the proposed scheme are evaluated and compared with several representative authentication protocols. The results show that the proposed protocol can provide strong security while maintaining low computational cost and communication overhead. Full article
(This article belongs to the Special Issue Quantum Information Security)
41 pages, 3214 KB  
Review
The Intelligent Home: A Systematic Review of Technological Pillars, Emerging Paradigms, and Future Directions
by Khalil M. Abdelnaby, Mohammed A. F. Al-Husainy, Mohammad O. Alhawarat, Mohamed A. Rohaim, Khairy M. Assar and Khaled A. Elshafey
Symmetry 2026, 18(5), 718; https://doi.org/10.3390/sym18050718 - 24 Apr 2026
Abstract
Home automation is undergoing a paradigm shift from connected IoT environments with rule based control to intelligent homes exhibiting ambient intelligence and proactive adaptation. Artificial intelligence, privacy-preserving sensing, and converging connectivity standards are the primary forces driving this transition. This systematic literature review [...] Read more.
Home automation is undergoing a paradigm shift from connected IoT environments with rule based control to intelligent homes exhibiting ambient intelligence and proactive adaptation. Artificial intelligence, privacy-preserving sensing, and converging connectivity standards are the primary forces driving this transition. This systematic literature review synthesizes the technological foundations, architectural developments, emerging paradigms, and socio-technical challenges characterizing the next generation of smart homes, evaluated against the original Ambient Intelligence (AmI) vision. Following PRISMA 2020 guidelines, searches were conducted across four databases—IEEE Xplore, ACM Digital Library, Scopus, and Web of Science—covering studies published between January 2020 and June 2025. From 3450 records, 113 studies were selected through a two-reviewer screening procedure with inter-rater reliability assessments. Quality was assessed using a modified JBI Critical Appraisal Checklist, and findings were synthesized through thematic analysis. Three converging technological pillars were identified: multi-modal privacy-preserving sensing including mmWave radar; a hierarchical cloud-edge TinyML intelligence engine; and unified connectivity through the Matter/Thread standard. Emerging paradigms include LLM-based cognitive orchestration, hyper-personalization, Digital Twin simulation, and grid-interactive prosumer energy management. Realizing that the intelligent home vision requires addressing the privacy–security–trust trilemma, algorithmic bias, system reliability, and human–agent collaboration, a research roadmap encompassing explainable AI, privacy-by-design, lifelong learning, and standardized ethical auditing is proposed. Full article
26 pages, 1459 KB  
Article
Securing the Internet of Things, Lightweight Mutual Authentication Based on Quantum Key Distribution
by Muhammad Nawaz Khan, Inam Ullah, Sokjoon Lee and Mohsin Shah
Future Internet 2026, 18(5), 230; https://doi.org/10.3390/fi18050230 - 24 Apr 2026
Abstract
The Internet of Things (IoT) and quantum computing revolutionized the era of conventional and classical computing into a new paradigm of Quantum-IoT where qubits and entanglement make IoT more interactive, powerful, and secure. They facilitate numerous tasks by increasing productivity and efficiency, paving [...] Read more.
The Internet of Things (IoT) and quantum computing revolutionized the era of conventional and classical computing into a new paradigm of Quantum-IoT where qubits and entanglement make IoT more interactive, powerful, and secure. They facilitate numerous tasks by increasing productivity and efficiency, paving the path for a smarter and more connected future. In this article, we propose a novel authentication scheme, “Securing the Internet of Things, Lightweight Mutual Authentication Based on Quantum Key Distribution (LMA-QIoT)”. LMA-QIoT enables mutual authentication using various parameters including quantum key distribution, symmetric keys and timestamps, as well as additional quantum random numbers. All these parameters play a crucial role in thwarting man-in-the-middle, backtracking and nonce reuse attacks. The evaluation of LMA-QIoT demonstrates that quantum key distribution and quantum numbers enhance system performance by reducing CPU usage by 25% and memory requirements 30% compared to an IoT edge-based system and without a server, respectively. In the reconfiguration ratio, the efficiency metric grows exponentially and remains constant on the initial line in edge-server-based systems. In comparison, LMA-QIoT confirms a much reduced overall computational complexity by 16.64%, with the lowest computational cost of O(n2). At 1024 Bytes, the original data length and increased data length (normalized) sizes stay constant with 2logn(klogn). Comparing the total overhead, LMA-QIoT demonstrates a reduction of 33 ms, which corresponds to approximately 16.63% less than the baseline mechanisms. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of AI, IoT, and Edge Computing)
40 pages, 1948 KB  
Systematic Review
Edge–Cloud Collaboration for Machine Condition Monitoring: A Comprehensive Review of Mechanisms, Models, and Applications
by Liyuan Yu, Jitao Fang, Qiuyan Wang, Fajia Li and Haining Liu
Machines 2026, 14(5), 476; https://doi.org/10.3390/machines14050476 (registering DOI) - 24 Apr 2026
Abstract
Machine condition monitoring increasingly depends on distributed sensing, edge intelligence, and cloud analytics, yet timely and trustworthy health assessment remains constrained by latency, bandwidth, privacy, and reliability requirements. Cloud-only architectures provide scalable computation and historical data integration but often fail to satisfy real-time [...] Read more.
Machine condition monitoring increasingly depends on distributed sensing, edge intelligence, and cloud analytics, yet timely and trustworthy health assessment remains constrained by latency, bandwidth, privacy, and reliability requirements. Cloud-only architectures provide scalable computation and historical data integration but often fail to satisfy real-time industrial needs, whereas edge-only deployments are limited by restricted computing resources and fragmented local knowledge. Edge–cloud collaboration has, therefore, emerged as a practical architecture for distributing perception, inference, learning, and coordination across hierarchical industrial systems. This review examines 147 publications on edge–cloud collaboration for machine condition monitoring published between 2019 and February 2026. A four-dimensional taxonomy is developed to organize the literature into model-centric, data-centric, resource and task-centric, and architecture and trust-centric mechanisms, while 13 survey and review papers are considered separately for contextual comparison. On this basis, the review analyzes representative collaboration mechanisms and enabling technologies, with particular attention to federated learning, transfer learning, knowledge distillation, digital twins, and deep reinforcement learning, and surveys their deployment in manufacturing, energy, transportation, and infrastructure monitoring scenarios. The literature remains dominated by model-centric collaboration, while architecture and trust-centric studies increasingly provide the system foundations required for practical deployment. The review further identifies major open challenges, including robust generalization under changing operating conditions, efficient data transmission, real-time resource coordination, interoperability, and trustworthy large-scale deployment, and outlines future directions in foundation-model-based edge–cloud collaboration, continual learning, dual digital twins, trustworthy collaboration, and privacy-preserving industrial ecosystems. Full article
26 pages, 11449 KB  
Article
Signal Intelligence: Vibration-Driven Deep Learning for Anomaly Detection of Rotary-Wing UAVs
by Alican Yilmaz, Erkan Caner Ozkat and Fatih Gul
Drones 2026, 10(5), 321; https://doi.org/10.3390/drones10050321 - 24 Apr 2026
Abstract
Unmanned aerial vehicles (UAVs) operating in safety-critical missions require effective anomaly detection methods to identify propulsion-system faults before they cause catastrophic failures. However, current vibration-based diagnostic models typically rely on datasets representing only discrete, isolated fault states, and do not capture the continuous [...] Read more.
Unmanned aerial vehicles (UAVs) operating in safety-critical missions require effective anomaly detection methods to identify propulsion-system faults before they cause catastrophic failures. However, current vibration-based diagnostic models typically rely on datasets representing only discrete, isolated fault states, and do not capture the continuous structural degradation that occurs during real flight operations. To address this gap, this study proposes a severity-ordered vibration data augmentation framework for anomaly detection in rotary-wing UAV propulsion systems. Controlled experiments were conducted under healthy, tape-induced imbalance, scratch, and cut propeller conditions using stepped throttle excitation from 10% to 100% in 10% increments, with 40 s per level. A severity-ordered arrangement strategy based on throttle level and a robust peak-to-peak severity metric generated approximately 7.5 h of augmented vibration data per axis, representing a continuous degradation trajectory. Three-axis continuous wavelet transform (CWT) scalograms of size 48×96×3 were used to train an unsupervised anomaly detection framework. Comparative experiments with Isolation Forest, One-Class SVM, and LSTM–AE demonstrated that the proposed Convolutional Neural Network (CNN)–Bidirectional Gated Recurrent Unit (BiGRU)–State-Space Model (SSM)–Autoencoder (AE) architecture achieved the best performance, reaching 0.9959 precision, 0.4428 recall, 0.6131 F1-score, and 0.9284 Area Under the Receiver Operating Characteristic Curve (AUROC). The ablation study further showed that incorporating temporal modeling and state-space dynamics improves detection robustness compared with CNN–AE and CNN–BiGRU–AE baselines. These results show that combining severity-ordered augmentation with deep temporal learning improves progressive propulsion anomaly detection in UAV vibration monitoring. This work introduces a methodology that connects rotor dynamics principles with deep learning, providing a continuous degradation manifold that improves early-stage detection and condition monitoring of UAV propulsion systems. Full article
Show Figures

Figure 1

24 pages, 1869 KB  
Article
Neuro-Fuzzy Approach for Detecting DDoS Attacks in IoT Environments Applied to Biosignal Monitoring
by Angela M. Parra and Marcia M. Bayas
Technologies 2026, 14(5), 253; https://doi.org/10.3390/technologies14050253 - 24 Apr 2026
Abstract
Distributed denial-of-service (DDoS) attacks pose a critical threat to the availability of the Internet of Medical Things (IoMT). This paper proposes an intrusion detection system (IDS) based on a hybrid neuro-fuzzy-inspired approach to identify DDoS attacks in IoMT environments. The architecture combines an [...] Read more.
Distributed denial-of-service (DDoS) attacks pose a critical threat to the availability of the Internet of Medical Things (IoMT). This paper proposes an intrusion detection system (IDS) based on a hybrid neuro-fuzzy-inspired approach to identify DDoS attacks in IoMT environments. The architecture combines an ensemble of decision trees, a sigmoidal smoothing mechanism, and a multilayer neural meta-classifier, enabling the modeling of nonlinear relationships between legitimate and malicious traffic without requiring explicit fuzzy rules or a formal fuzzy inference mechanism. The evaluation was conducted using the public DoS/DDoS-MQTT-IoT dataset, which was extended by incorporating legitimate traffic generated by electrocardiography (ECG) monitoring devices to approximate real operational IoMT conditions. The model was validated using stratified cross-validation and bootstrap procedures. In the extended IoMT scenario including ECG traffic, the proposed approach achieved an area under the ROC curve (AUC) of 0.904 and an F1 score of 0.823. Finally, the IDS was integrated into an intrusion detection and prevention system (IDPS) capable of detecting anomalous traffic patterns within three seconds and automatically blocking malicious IP addresses after repeated detections. Full article
Show Figures

Graphical abstract

26 pages, 1104 KB  
Article
Task Duration-Constrained Joint Resource Allocation and Trajectory Design for UAV-Assisted Backscatter Communication System
by Wenxin Zhou and Long Suo
Appl. Sci. 2026, 16(9), 4159; https://doi.org/10.3390/app16094159 - 23 Apr 2026
Abstract
Backscatter communication (BackCom) has emerged as an energy-efficient and low-cost communication paradigm, in which wireless devices transmit information by reflecting incident signals rather than actively generating radio frequency signals. Owing to the extremely low power consumption and hardware cost, BackCom is particularly suitable [...] Read more.
Backscatter communication (BackCom) has emerged as an energy-efficient and low-cost communication paradigm, in which wireless devices transmit information by reflecting incident signals rather than actively generating radio frequency signals. Owing to the extremely low power consumption and hardware cost, BackCom is particularly suitable for Internet of Things (IoT) devices with stringent low energy and cost constraints. However, due to the severe double channel attenuation inherent in backscatter links, conventional ground-based deployment of transmitters and receivers often suffers from poor communication quality and low energy efficiency. Unmanned aerial vehicles (UAVs), with their high mobility and favorable line-of-sight (LoS) links, can act as dynamic aerial transmitters and receivers in BackCom, thereby mitigating channel attenuation and improving both communication reliability and energy efficiency. To enhance the data collection efficiency of UAV-assisted BackCom systems under a limited mission duration, this paper proposes a joint optimization method for communication resource allocation and UAV trajectory design under task time constraints. Specifically, a mixed-integer non-convex optimization problem is formulated to maximize the number of devices served by the UAV within a given task duration. The original problem is then decomposed into two subproblems, namely communication resource allocation optimization and UAV trajectory optimization. An iterative algorithm based on Block Coordinate Descent (BCD) and Successive convex approximation (SCA) is developed to obtain an efficient solution. Simulation results demonstrate that the proposed method can effectively increase the number of served devices within the specified mission time limit. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Back to TopTop