Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,828)

Search Parameters:
Keywords = Internet of Things (IoT) devices

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1029 KiB  
Article
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li and Zheng Ju
Sensors 2025, 25(15), 4848; https://doi.org/10.3390/s25154848 (registering DOI) - 6 Aug 2025
Abstract
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional [...] Read more.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns. Certificateless schemes effectively resolve both certificate management and key escrow problems but remain vulnerable to quantum computing threats. To address these limitations, this paper constructs an efficient post-quantum certificateless proxy re-signature scheme based on algebraic lattices. Building upon algebraic lattice theory and leveraging the Dilithium algorithm, our scheme innovatively employs a lattice basis reduction-assisted parameter selection strategy to mitigate the potential algebraic attack vectors inherent in the NTRU lattice structure. This ensures the security and integrity of multi-party communication in quantum-threat environments. Furthermore, the scheme significantly reduces computational overhead and optimizes signature storage complexity through structured compression techniques, facilitating deployment on resource-constrained devices like Internet of Things (IoT) terminals. We formally prove the unforgeability of the scheme under the adaptive chosen-message attack model, with its security reducible to the hardness of the corresponding underlying lattice problems. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
30 pages, 1359 KiB  
Article
Enhancing Efficiency in Sustainable IoT Enterprises: Modeling Indicators Using Pythagorean Fuzzy and Interval Grey Approaches
by Mimica R. Milošević, Miloš M. Nikolić, Dušan M. Milošević and Violeta Dimić
Sustainability 2025, 17(15), 7143; https://doi.org/10.3390/su17157143 - 6 Aug 2025
Abstract
“The Internet of Things” is a relatively new idea that refers to objects that can connect to the Internet and exchange data. The Internet of Things (IoT) enables novel interactions between objects and people by interconnecting billions of devices. While there are many [...] Read more.
“The Internet of Things” is a relatively new idea that refers to objects that can connect to the Internet and exchange data. The Internet of Things (IoT) enables novel interactions between objects and people by interconnecting billions of devices. While there are many IoT-related products, challenges pertaining to their effective implementation, particularly the lack of knowledge and confidence about security, must be addressed. To provide IoT-based enterprises with a platform for efficiency and sustainability, this study aims to identify the critical elements that influence the growth of a successful company integrated with an IoT system. This study proposes a decision support tool that evaluates the influential features of IoT using the Pythagorean Fuzzy and Interval Grey approaches within the Analytical Hierarchy Process (AHP). This study demonstrates that security, value, and connectivity are more critical than telepresence and intelligence indicators. When both strategies are used, market demand and information privacy become significant indicators. Applying the Pythagorean Fuzzy approach enables the identification of sensor networks, authorization, market demand, and data management in terms of importance. The application of the Interval Grey approach underscores the importance of data management, particularly in sensor networks. The indicators that were finally ranked are compared to obtain a good coefficient of agreement. These findings offer practical insights for promoting sustainability in enterprise operations by optimizing IoT infrastructure and decision-making processes. Full article
35 pages, 5286 KiB  
Article
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers
by Sheikh Abdul Wahab, Saira Sultana, Noshina Tariq, Maleeha Mujahid, Javed Ali Khan and Alexios Mylonas
Sensors 2025, 25(15), 4845; https://doi.org/10.3390/s25154845 - 6 Aug 2025
Abstract
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. In this paper, we present a Deep Learning (DL)-based Intrusion Detection System (IDS) tailored for IoT environments. Our system employs three architectures—Convolutional Neural Networks (CNNs), Deep Neural Networks (DNNs), and Transformer-based models—to perform binary, three-class, and 12-class classification tasks on the CiC IoT 2023 dataset. Data preprocessing includes log normalization to stabilize feature distributions and SMOTE-based oversampling to mitigate class imbalance. Experiments on the CIC-IoT 2023 dataset show that, in the binary classification task, the DNN achieved 99.2% accuracy, the CNN 99.0%, and the Transformer 98.8%. In three-class classification (benign, DDoS, and non-DDoS), all models attained near-perfect performance (approximately 99.9–100%). In the 12-class scenario (benign plus 12 attack types), the DNN, CNN, and Transformer reached 93.0%, 92.7%, and 92.5% accuracy, respectively. The high precision, recall, and ROC-AUC values corroborate the efficacy and generalizability of our approach for IoT DDoS detection. Comparative analysis indicates that our proposed IDS outperforms state-of-the-art methods in terms of detection accuracy and efficiency. These results underscore the potential of integrating advanced DL models into IDS frameworks, thereby providing a scalable and effective solution to secure IoT networks against evolving DDoS threats. Future work will explore further enhancements, including the use of deeper Transformer architectures and cross-dataset validation, to ensure robustness in real-world deployments. Full article
(This article belongs to the Section Internet of Things)
20 pages, 1070 KiB  
Article
P2ESA: Privacy-Preserving Environmental Sensor-Based Authentication
by Andraž Krašovec, Gianmarco Baldini and Veljko Pejović
Sensors 2025, 25(15), 4842; https://doi.org/10.3390/s25154842 - 6 Aug 2025
Abstract
The presence of Internet of Things (IoT) devices in modern working and living environments is growing rapidly. The data collected in such environments enable us to model users’ behaviour and consequently identify and authenticate them. However, these data may contain information about the [...] Read more.
The presence of Internet of Things (IoT) devices in modern working and living environments is growing rapidly. The data collected in such environments enable us to model users’ behaviour and consequently identify and authenticate them. However, these data may contain information about the user’s current activity, emotional state, or other aspects that are not relevant for authentication. In this work, we employ adversarial deep learning techniques to remove privacy-revealing information from the data while keeping the authentication performance levels almost intact. Furthermore, we develop and apply various techniques to offload the computationally weak edge devices that are part of the machine learning pipeline at training and inference time. Our experiments, conducted on two multimodal IoT datasets, show that P2ESA can be efficiently deployed and trained, and with user identification rates of between 75.85% and 93.31% (c.f. 6.67% baseline), can represent a promising support solution for authentication, while simultaneously fully obfuscating sensitive information. Full article
Show Figures

Figure 1

17 pages, 665 KiB  
Article
Optimization of Delay Time in ZigBee Sensor Networks for Smart Home Systems Using a Smart-Adaptive Communication Distribution Algorithm
by Igor Medenica, Miloš Jovanović, Jelena Vasiljević, Nikola Radulović and Dragan Lazić
Electronics 2025, 14(15), 3127; https://doi.org/10.3390/electronics14153127 - 6 Aug 2025
Abstract
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. [...] Read more.
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. This study focuses on optimizing delay time in ZigBee sensor networks used in smart-home systems. A Smart–Adaptive Communication Distribution Algorithm is proposed, which dynamically adjusts the communication between network nodes based on real-time network conditions. Experimental measurements were conducted under various scenarios to evaluate the performance of the proposed algorithm, with a particular focus on reducing delay and enhancing overall network efficiency. The results demonstrate that the proposed algorithm significantly reduces delay times compared to traditional methods, making it a promising solution for delay-sensitive IoT applications. Furthermore, the findings highlight the importance of adaptive communication strategies in improving the performance of ZigBee-based sensor networks. Full article
(This article belongs to the Special Issue Energy-Efficient Wireless Sensor Networks for IoT Applications)
Show Figures

Figure 1

38 pages, 5003 KiB  
Article
Towards Smart Wildfire Prevention: Development of a LoRa-Based IoT Node for Environmental Hazard Detection
by Luis Miguel Pires, Vitor Fialho, Tiago Pécurto and André Madeira
Designs 2025, 9(4), 91; https://doi.org/10.3390/designs9040091 (registering DOI) - 5 Aug 2025
Abstract
The increase in the number of wildfires in recent years in different parts of the world has caused growing concern among the population, since the consequences of these fires go beyond the destruction of the ecosystem. With the growing relevance of the Internet [...] Read more.
The increase in the number of wildfires in recent years in different parts of the world has caused growing concern among the population, since the consequences of these fires go beyond the destruction of the ecosystem. With the growing relevance of the Internet of Things (IoT) industry, developing solutions for the early detection of fires is of critical importance. This paper proposes a low-cost network based on Long-Range (LoRa) technology to autonomously assess the level of fire risk and the presence of a fire in rural areas. The system consists of several LoRa nodes with sensors to measure environmental variables such as temperature, humidity, carbon monoxide, air quality, and wind speed. The data collected is sent to a central gateway, where it is stored, processed, and later sent to a website for graphical visualization of the results. In this paper, a survey of the requirements of the devices and sensors that compose the system was made. After this survey, a market study of the available sensors was carried out, ending with a comparison between the sensors to determine which ones met the objectives. Using the chosen sensors, a study was made of possible power solutions for this prototype, considering the expected conditions of use. The system was tested in a real environment, and the results demonstrate that it is possible to cover a circular area with a radius of 2 km using a single gateway. Our system is prepared to trigger fire hazard alarms when, for example, the signals for relative humidity, ambient temperature, and wind speed are below or equal to 30%, above or equal to 30 °C, and above or equal to 30 m/s, respectively (commonly known as the 30-30-30 rule). Full article
Show Figures

Figure 1

24 pages, 1313 KiB  
Review
Data Augmentation and Knowledge Transfer-Based Fault Detection and Diagnosis in Internet of Things-Based Solar Insecticidal Lamps: A Survey
by Zhengjie Wang, Xing Yang, Tongjie Li, Lei Shu, Kailiang Li and Xiaoyuan Jing
Electronics 2025, 14(15), 3113; https://doi.org/10.3390/electronics14153113 - 5 Aug 2025
Abstract
Internet of Things (IoT)-based solar insecticidal lamps (SIL-IoTs) offer an eco-friendly alternative by merging solar energy harvesting with intelligent sensing, advancing sustainable smart agriculture. However, SIL-IoTs encounter practical challenges, e.g., hardware aging, electromagnetic interference, and abnormal data patterns. Therefore, developing an effective fault [...] Read more.
Internet of Things (IoT)-based solar insecticidal lamps (SIL-IoTs) offer an eco-friendly alternative by merging solar energy harvesting with intelligent sensing, advancing sustainable smart agriculture. However, SIL-IoTs encounter practical challenges, e.g., hardware aging, electromagnetic interference, and abnormal data patterns. Therefore, developing an effective fault detection and diagnosis (FDD) system is essential. In this survey, we systematically identify and address the core challenges of implementing FDD of SIL-IoTs. Firstly, the fuzzy boundaries of sample features lead to complex feature interactions that increase the difficulty of accurate FDD. Secondly, the category imbalance in the fault samples limits the generalizability of the FDD models. Thirdly, models trained on single scenarios struggle to adapt to diverse and dynamic field conditions. To overcome these challenges, we propose a multi-level solution by discussing and merging existing FDD methods: (1) a data augmentation strategy can be adopted to improve model performance on small-sample datasets; (2) federated learning (FL) can be employed to enhance adaptability to heterogeneous environments, while transfer learning (TL) addresses data scarcity; and (3) deep learning techniques can be used to reduce dependence on labeled data; these methods provide a robust framework for intelligent and adaptive FDD of SIL-IoTs, supporting long-term reliability of IoT devices in smart agriculture. Full article
(This article belongs to the Collection Electronics for Agriculture)
Show Figures

Figure 1

20 pages, 6269 KiB  
Article
Miniaturized EBG Antenna for Efficient 5.8 GHz RF Energy Harvesting in Self-Powered IoT and Medical Sensors
by Yahya Albaihani, Rizwan Akram, Abdullah. M. Almohaimeed, Ziyad M. Almohaimeed, Lukman O. Buhari and Mahmoud Shaban
Sensors 2025, 25(15), 4777; https://doi.org/10.3390/s25154777 - 3 Aug 2025
Viewed by 264
Abstract
This study presents a compact and high-efficiency microstrip antenna integrated with a square electromagnetic band-gap (EBG) structure for radio frequency energy harvesting to power battery-less Internet of Things (IoT) sensors and medical devices in the 5.8 GHz Industrial, Scientific, and Medical (ISM) band. [...] Read more.
This study presents a compact and high-efficiency microstrip antenna integrated with a square electromagnetic band-gap (EBG) structure for radio frequency energy harvesting to power battery-less Internet of Things (IoT) sensors and medical devices in the 5.8 GHz Industrial, Scientific, and Medical (ISM) band. The proposed antenna features a compact design with reduced physical dimensions of 36 × 40 mm2 (0.69λo × 0.76λo) while providing high-performance parameters such as a reflection coefficient of −27.9 dB, a voltage standing wave ratio (VSWR) of 1.08, a gain of 7.91 dBi, directivity of 8.1 dBi, a bandwidth of 188 MHz, and radiation efficiency of 95.5%. Incorporating EBG cells suppresses surface waves, enhances gain, and optimizes impedance matching through 50 Ω inset feeding. The simulated and measured results of the designed antenna show a high correlation. This study demonstrates a robust and promising solution for high-performance wireless systems requiring a compact size and energy-efficient operation. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

28 pages, 2465 KiB  
Article
Latency-Aware and Energy-Efficient Task Offloading in IoT and Cloud Systems with DQN Learning
by Amina Benaboura, Rachid Bechar, Walid Kadri, Tu Dac Ho, Zhenni Pan and Shaaban Sahmoud
Electronics 2025, 14(15), 3090; https://doi.org/10.3390/electronics14153090 - 1 Aug 2025
Viewed by 212
Abstract
The exponential proliferation of the Internet of Things (IoT) and optical IoT (O-IoT) has introduced substantial challenges concerning computational capacity and energy efficiency. IoT devices generate vast volumes of aggregated data and require intensive processing, often resulting in elevated latency and excessive energy [...] Read more.
The exponential proliferation of the Internet of Things (IoT) and optical IoT (O-IoT) has introduced substantial challenges concerning computational capacity and energy efficiency. IoT devices generate vast volumes of aggregated data and require intensive processing, often resulting in elevated latency and excessive energy consumption. Task offloading has emerged as a viable solution; however, many existing strategies fail to adequately optimize both latency and energy usage. This paper proposes a novel task-offloading approach based on deep Q-network (DQN) learning, designed to intelligently and dynamically balance these critical metrics. The proposed framework continuously refines real-time task offloading decisions by leveraging the adaptive learning capabilities of DQN, thereby substantially reducing latency and energy consumption. To further enhance system performance, the framework incorporates optical networks into the IoT–fog–cloud architecture, capitalizing on their high-bandwidth and low-latency characteristics. This integration facilitates more efficient distribution and processing of tasks, particularly in data-intensive IoT applications. Additionally, we present a comparative analysis between the proposed DQN algorithm and the optimal strategy. Through extensive simulations, we demonstrate the superior effectiveness of the proposed DQN framework across various IoT and O-IoT scenarios compared to the BAT and DJA approaches, achieving improvements in energy consumption and latency of 35%, 50%, 30%, and 40%, respectively. These findings underscore the significance of selecting an appropriate offloading strategy tailored to the specific requirements of IoT and O-IoT applications, particularly with regard to environmental stability and performance demands. Full article
Show Figures

Figure 1

28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 - 1 Aug 2025
Viewed by 205
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

40 pages, 1548 KiB  
Article
Real-Time Service Migration in Edge Networks: A Survey
by Yutong Zhang, Ke Zhao, Yihong Yang and Zhangbing Zhou
J. Sens. Actuator Netw. 2025, 14(4), 79; https://doi.org/10.3390/jsan14040079 - 1 Aug 2025
Viewed by 291
Abstract
With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users. However, [...] Read more.
With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users. However, the dynamic nature and limited resources of edge networks bring challenges such as load imbalance and high latency while satisfying user requests. Service migration, the dynamic redeployment of service instances across distributed edge nodes, has become a key enabler for solving these challenges and optimizing edge network characteristics. Moreover, the low-latency nature of edge computing requires that service migration strategies must be in real time in order to ensure latency requirements. Thus, this paper presents a systematic survey of real-time service migration in edge networks. Specifically, we first introduce four network architectures and four basic models for real-time service migration. We then summarize four research motivations for real-time service migration and the real-time guarantee introduced during the implementation of migration strategies. To support these motivations, we present key techniques for solving the task of real-time service migration and how these algorithms and models facilitate the real-time performance of migration. We also explore latency-sensitive application scenarios, such as smart cities, smart homes, and smart manufacturing, where real-time service migration plays a critical role in sustaining performance and adaptability under dynamic conditions. Finally, we summarize the key challenges and outline promising future research directions for real-time service migration. This survey aims to provide a structured and in-depth theoretical foundation to guide future research on real-time service migration in edge networks. Full article
Show Figures

Figure 1

37 pages, 6916 KiB  
Review
The Role of IoT in Enhancing Sports Analytics: A Bibliometric Perspective
by Yuvanshankar Azhagumurugan, Jawahar Sundaram, Zenith Dewamuni, Pritika, Yakub Sebastian and Bharanidharan Shanmugam
IoT 2025, 6(3), 43; https://doi.org/10.3390/iot6030043 - 31 Jul 2025
Viewed by 289
Abstract
The use of Internet of Things (IoT) for sports innovation has transformed the way athletes train, compete, and recover in any sports activity. This study performs a bibliometric analysis to examine research trends, collaborations, and publications in the realm of IoT and Sports. [...] Read more.
The use of Internet of Things (IoT) for sports innovation has transformed the way athletes train, compete, and recover in any sports activity. This study performs a bibliometric analysis to examine research trends, collaborations, and publications in the realm of IoT and Sports. Our analysis included 780 Scopus articles and 150 WoS articles published during 2012–2025, and duplicates were removed. We analyzed and visualized the bibliometric data using R version 3.6.1, VOSviewer version 1.6.20, and the bibliometrix library. The study provides insights from a bibliometric analysis, showcasing the allocation of topics, scientific contributions, patterns of co-authorship, prominent authors and their productivity over time, notable terms, key sources, publications with citations, analysis of citations, source-specific citation analysis, yearly publication patterns, and the distribution of research papers. The results indicate that China and India have the leading scientific production in the development of IoT and Sports research, with prominent authors like Anton Umek, Anton Kos, and Emiliano Schena making significant contributions. Wearable technology and wearable sensors are the most trending topics in IoT and Sports, followed by medical sciences and artificial intelligence paradigms. The analysis also emphasizes the importance of open-access journals like ‘Journal of Physics: Conference Series’ and ‘IEEE Access’ for their contributions to IoT and Sports research. Future research directions focus on enhancing effective, lightweight, and efficient wearable devices while implementing technologies like edge computing and lightweight AI in wearable technologies. Full article
Show Figures

Figure 1

26 pages, 5549 KiB  
Article
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
by Faeiz Alserhani
Sensors 2025, 25(15), 4720; https://doi.org/10.3390/s25154720 - 31 Jul 2025
Viewed by 273
Abstract
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical [...] Read more.
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability. Full article
Show Figures

Figure 1

22 pages, 1386 KiB  
Article
A Scalable Approach to IoT Interoperability: The Share Pattern
by Riccardo Petracci and Rosario Culmone
Sensors 2025, 25(15), 4701; https://doi.org/10.3390/s25154701 - 30 Jul 2025
Viewed by 181
Abstract
The Internet of Things (IoT) is transforming how devices communicate, with more than 30 billion connected units today and projections exceeding 40 billion by 2025. Despite this growth, the integration of heterogeneous systems remains a significant challenge, particularly in sensitive domains like healthcare, [...] Read more.
The Internet of Things (IoT) is transforming how devices communicate, with more than 30 billion connected units today and projections exceeding 40 billion by 2025. Despite this growth, the integration of heterogeneous systems remains a significant challenge, particularly in sensitive domains like healthcare, where proprietary standards and isolated ecosystems hinder interoperability. This paper presents an extended version of the Share design pattern, a lightweight and contract-based mechanism for dynamic service composition, tailored for resource-constrained IoT devices. Share enables decentralized, peer-to-peer integration by exchanging executable code in our examples written in the LUA programming language. This approach avoids reliance on centralized infrastructures and allows services to discover and interact with each other dynamically through pattern-matching and contract validation. To assess its suitability, we developed an emulator that directly implements the system under test in LUA, allowing us to verify both the structural and behavioral constraints of service interactions. Our results demonstrate that Share is scalable and effective, even in constrained environments, and supports formal correctness via design-by-contract principles. This makes it a promising solution for lightweight, interoperable IoT systems that require flexibility, dynamic configuration, and resilience without centralized control. Full article
(This article belongs to the Special Issue Secure and Decentralised IoT Systems)
Show Figures

Figure 1

24 pages, 845 KiB  
Article
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger
by Assiya Akli and Khalid Chougdali 
Sensors 2025, 25(15), 4697; https://doi.org/10.3390/s25154697 - 30 Jul 2025
Viewed by 269
Abstract
Trust evaluation has become a major challenge in the quickly developing Internet of Things (IoT) environment because of the vulnerabilities and security hazards associated with networked devices. To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA [...] Read more.
Trust evaluation has become a major challenge in the quickly developing Internet of Things (IoT) environment because of the vulnerabilities and security hazards associated with networked devices. To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. To offer a thorough and reliable trust evaluation, this study combines direct and indirect trust measures. Moreover, we incorporate IOTA-based trust metrics to evaluate a node’s trust based on its activity in creating and validating IOTA transactions. The proposed framework ensures data integrity and secrecy by implementing immutable, secure storage for trust scores on IOTA. This ensures that no node transmits a wrong trust score for itself. The results show that the proposed scheme is efficient compared to recent literature, achieving up to +3.5% higher malicious node detection accuracy, up to 93% improvement in throughput, 40% reduction in energy consumption, and up to 24% lower end-to-end delay across various network sizes and adversarial conditions. Our contributions improve the scalability, security, and dependability of trust assessment processes in Internet of Things networks, providing a strong solution to the prevailing issues in current centralized trust models. Full article
Show Figures

Figure 1

Back to TopTop