Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,469)

Search Parameters:
Keywords = Internet of Vehicles

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 28643 KB  
Article
Benchmarking MARL for UAV-Assisted Mobile Edge Computing Under Realistic 3D Collision Avoidance Navigation Constraints for Periodic Task Offloading
by Jiacheng Gu, Qingxu Meng, Qiurui Sun, Bing Zhu, Songnan Zhao and Shaode Yu
Technologies 2026, 14(4), 202; https://doi.org/10.3390/technologies14040202 - 27 Mar 2026
Abstract
The rapid growth of Internet of Things (IoT) and Industrial IoT applications has intensified the demand for low-latency and reliable computation support for deadline-constrained periodic real-time tasks. While unmanned aerial vehicles (UAVs) enabling mobile edge computing (MEC) can reduce latency by bringing compute [...] Read more.
The rapid growth of Internet of Things (IoT) and Industrial IoT applications has intensified the demand for low-latency and reliable computation support for deadline-constrained periodic real-time tasks. While unmanned aerial vehicles (UAVs) enabling mobile edge computing (MEC) can reduce latency by bringing compute closer to data sources, terrestrial MEC deployments often suffer from limited coverage and poor adaptability to spatially heterogeneous demand. In this paper, we study a multiple-UAV-assisted MEC system serving cluster-based IoT networks, where cluster heads generate deadline-constrained periodic tasks for offloading under strict deadlines. To ensure practical feasibility in dense urban environments, we benchmark UAV mobility using a realistic 3D collision avoidance navigation graph with shortest-path execution, rather than assuming unconstrained continuous UAV motion in free space. On top of this benchmark, we systematically compare three multi-agent reinforcement learning (MARL) paradigms for joint navigation and periodic task offloading: (i) continuous 3D control MARL that outputs motion commands directly; (ii) discrete graph-based MARL that selects collision-free shortest paths; and (iii) asynchronous macro-action MARL. Using a high-fidelity 3D digital twin of San Francisco, we evaluate these paradigms under a unified protocol in terms of offloading success, end-to-end latency, and energy consumption. The results reveal clear performance trade-offs induced by realistic 3D collision avoidance constraints and provide actionable insights for designing UAV-assisted MEC systems supporting periodic real-time task offloading. Full article
24 pages, 511 KB  
Article
A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture
by Jihye Choi and Youngho Park
Appl. Sci. 2026, 16(7), 3211; https://doi.org/10.3390/app16073211 - 26 Mar 2026
Abstract
Unmanned Aerial Vehicle (UAV)-assisted hierarchical federated learning (HFL) has emerged as a promising architecture for Internet of Things (IoT)-based smart agriculture, which enables scalable model training over large and sparse farmlands. In this setting, UAVs act as mobile edge servers, aggregating local updates [...] Read more.
Unmanned Aerial Vehicle (UAV)-assisted hierarchical federated learning (HFL) has emerged as a promising architecture for Internet of Things (IoT)-based smart agriculture, which enables scalable model training over large and sparse farmlands. In this setting, UAVs act as mobile edge servers, aggregating local updates from distributed agricultural IoT devices and relaying them to the cloud server. While HFL improves scalability and reduces communication overhead, it still faces critical security threats due to its reliance on public wireless channels and the vulnerability of model aggregation to malicious updates. In this paper, we propose a secure authentication scheme that integrates anomaly detection with elliptic curve cryptography (ECC)-based mutual authentication to protect both the communication and training phases. In the proposed scheme, UAVs authenticate participating clients before receiving their local models, then perform anomaly detection to identify and exclude malicious participants. If a client is found to be malicious, its identity credentials are revoked and broadcast by the cloud server to prevent future participation. The security of the proposed scheme is formally verified using Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, along with informal security analysis. The performance evaluation includes comparisons of security features, computation cost, and communication cost with other related schemes, and an experimental assessment of anomaly detection performance. The results demonstrate that our scheme provides strong security guarantees, low overhead, and effective malicious client detection, making it well suited for UAV-assisted HFL in smart agriculture. Full article
11 pages, 1126 KB  
Proceeding Paper
Electric Vehicle Charging and Discharging Control Management Strategy Based on Deep Reinforcement Learning
by Chuan Yang, Wenge Huang and Xin Li
Eng. Proc. 2026, 128(1), 44; https://doi.org/10.3390/engproc2026128044 - 24 Mar 2026
Abstract
With the widespread adoption of electric vehicles (EVs), the management and scheduling of charging and discharging play a crucial role in the performance of both the electricity grid and electric vehicles. Particularly in the context of peak shaving, valley filling, and the promotion [...] Read more.
With the widespread adoption of electric vehicles (EVs), the management and scheduling of charging and discharging play a crucial role in the performance of both the electricity grid and electric vehicles. Particularly in the context of peak shaving, valley filling, and the promotion of the energy internet infrastructure, efficient management of the EV charging and discharging process is vital. This study investigates the control and management issues surrounding EV charging and discharging, proposing a management strategy based on deep reinforcement learning. By constructing an intelligent decision-making model, it integrates factors such as the operating conditions of the electrical grid, user behavioral preferences, EV battery characteristics, and renewable energy outputs. The study collects real-world EV usage data from a city, establishing an experimental environment to simulate the interaction between the electricity grid and electric vehicles. Using techniques such as Deep Q-Network (DQN) and policy gradients, it constructs a decision network to explore charging and discharging strategies across different time scales and load situations. Experimental results show that this strategy, compared to traditional charging schedule methods, can effectively reduce energy loss during charging, enhance battery life, and balance the grid load, while suppressing demand peaks, thus achieving intelligent optimization and reliability enhancement of the charging and discharging process. Particularly, an adaptive charging power adjustment technique within the strategy can dynamically adjust the charging power according to the real-time status of the EV and grid load without affecting the user’s daily use, thereby achieving the dual objectives of efficient energy saving and economy. The research also quantitatively analyzes battery degradation characteristics and the continuity of charging to ensure the long-term sustainability of the charging strategy. The research findings are significant for understanding and guiding the practical management of EV charging and discharging. Full article
Show Figures

Figure 1

20 pages, 829 KB  
Article
Performance Analysis of Algorithms for Treating Outliers in PdM from UAVs
by Dragos Alexandru Andrioaia, Petru Gabriel Puiu, George Culea, Ioan Viorel Banu, Sorin-Eugen Popa and Enachi Andrei
Processes 2026, 14(7), 1038; https://doi.org/10.3390/pr14071038 - 24 Mar 2026
Viewed by 28
Abstract
Due to their vast potential, Unmanned Aerial Vehicles (UAVs) are increasingly being utilized in various applications. To prevent in-flight failures and loss of control, implementing Internet of Things (IoT)-based Predictive Maintenance (PdM) systems is crucial. However, data collected from PdM systems often contains [...] Read more.
Due to their vast potential, Unmanned Aerial Vehicles (UAVs) are increasingly being utilized in various applications. To prevent in-flight failures and loss of control, implementing Internet of Things (IoT)-based Predictive Maintenance (PdM) systems is crucial. However, data collected from PdM systems often contains outliers, which can significantly degrade the accuracy and performance of predictive models. In this paper, we present a comparative performance analysis of several outlier detection methods, namely K-Nearest Neighbors (KNN), Autoencoder (AE), and Isolation Forest (IForest). The datasets used to evaluate these methods were acquired from a UAV predictive maintenance system designed to estimate the Remaining Useful Life (RUL) of Li-ion batteries and detect faults in Brushless DC (BLDC) motors. Ultimately, this study aims to determine the most effective outlier detection method for UAV predictive maintenance datasets. Full article
(This article belongs to the Section Automation Control Systems)
Show Figures

Figure 1

30 pages, 663 KB  
Article
Quantum Secure Pairwise Key Agreement Scheme for Fog-Enabled Social Internet of Vehicles
by Hyewon Park and Yohan Park
Mathematics 2026, 14(6), 1046; https://doi.org/10.3390/math14061046 - 19 Mar 2026
Viewed by 128
Abstract
In Social Internet of Vehicles (SIoV) environments, fog computing plays a crucial role in supporting real-time services by reducing the latency inherent in cloud-based architectures. However, fog nodes are typically deployed in physically exposed roadside environments and can be operated by several system [...] Read more.
In Social Internet of Vehicles (SIoV) environments, fog computing plays a crucial role in supporting real-time services by reducing the latency inherent in cloud-based architectures. However, fog nodes are typically deployed in physically exposed roadside environments and can be operated by several system operators, making them vulnerable to physical compromise and unauthorized access. Despite these threats, many existing authentication schemes assume fog nodes to be fully trusted or honest-but-curious, allowing them to decrypt transmitted data using a session key shared among vehicles, fog nodes, and cloud servers. To overcome these limitations, this paper proposes a quantum-secure pairwise key agreement scheme that establishes distinct session keys for vehicle–fog, fog–cloud, and vehicle–cloud communications. This design effectively prevents the disclosure of sensitive information even in the event of fog node compromise. Furthermore, Physical Unclonable Functions (PUFs) are employed to mitigate physical capture attacks, while lattice-based cryptography based on the Module Learning with Errors (MLWE) problem is integrated to ensure resistance against quantum computing attacks. The security of the proposed protocol is rigorously validated through formal analysis using AVISPA, BAN logic, and the Real-or-Random (RoR) model, in addition to informal security analysis. Comparative performance evaluations against related schemes demonstrate that the proposed approach achieves a balance between efficiency and security, making it well suited for practical deployment in SIoV environments. Full article
(This article belongs to the Special Issue Cryptography, Data Security, and Cloud Computing)
Show Figures

Figure 1

32 pages, 1611 KB  
Article
A Governance-Aware Private Cloud Architecture for Scalable Multi-Provider Vehicle-Based Multimodal Sensing
by Zdravko Kunić, Vedran Dakić and Zlatan Morić
Sensors 2026, 26(6), 1939; https://doi.org/10.3390/s26061939 - 19 Mar 2026
Viewed by 161
Abstract
Vehicle-mounted sensing enables high-resolution urban monitoring but remains constrained by heterogeneous multimodal integration, intermittent connectivity, privacy-sensitive visual data, and the absence of enforceable multi-provider governance. This paper introduces a governance-aware private cloud architecture that treats provider isolation, role-based access control, and privacy-by-design as [...] Read more.
Vehicle-mounted sensing enables high-resolution urban monitoring but remains constrained by heterogeneous multimodal integration, intermittent connectivity, privacy-sensitive visual data, and the absence of enforceable multi-provider governance. This paper introduces a governance-aware private cloud architecture that treats provider isolation, role-based access control, and privacy-by-design as core architectural properties rather than application-layer add-ons. The layered, containerised microservice design supports asynchronous store-and-forward ingestion, modality-specific processing pipelines, and GPU-accelerated object detection for structured metadata extraction. A key innovation is ingestion-time visual abstraction, which structurally separates raw imagery from derived observations and enforces lifecycle-based retention policies, embedding data minimisation directly into the data flow. The fully open-source implementation is validated through a two-month multi-provider pilot with continuous multimodal collection. Results demonstrate stable ingestion without data loss, real-time visual inference (~200 ms per frame), strict provider-level isolation under concurrent access, and up to 95% storage reduction via metadata abstraction. The findings establish a replicable architectural paradigm for scalable, privacy-aware, multi-actor mobile sensing infrastructures suitable for metropolitan-scale smart city deployment. Full article
(This article belongs to the Special Issue AI-Driven IoT Solutions for Urban Mobility Challenges)
Show Figures

Figure 1

19 pages, 2335 KB  
Article
IoT-Simulated Digital Twin with AI Traffic Signal Control for Real-Time Traffic Optimization in SUMO
by Vasilica Cerasela Doiniţa Ceapă, Vasile Alexandru Apostol, Ioan Stefan Sacală, Constantin Florin Căruntu, Russ Ross, Dj Holt, Mircea Segărceanu and Luiza Elena Burlacu
Sensors 2026, 26(6), 1880; https://doi.org/10.3390/s26061880 - 17 Mar 2026
Viewed by 167
Abstract
Urban traffic congestion leads to longer travel times, economic losses, and increased pollution. Recent advances in the Internet of Things (IoT) provide detailed real-time traffic data, yet testing adaptive control strategies directly on live networks remains costly and risky. To address this challenge, [...] Read more.
Urban traffic congestion leads to longer travel times, economic losses, and increased pollution. Recent advances in the Internet of Things (IoT) provide detailed real-time traffic data, yet testing adaptive control strategies directly on live networks remains costly and risky. To address this challenge, we propose an IoT-driven digital twin framework for the design and evaluation of AI-based traffic management systems. The framework is implemented in the Simulation of Urban MObility (SUMO) and uses its Python 3.14.2 API to emulate a dense network of IoT sensors that stream real-time information on vehicle density, queue lengths, and waiting times. This simulated IoT data feeds an AI agent that adapts traffic signal control in real time. The agent is trained with a composite reward function to jointly minimise vehicle waiting times and emissions. Its performance is compared with fixed-time and vehicle-actuated control under varying traffic demand scenarios. Results demonstrate the effectiveness of combining IoT-based simulation with AI control, providing a safe and scalable pathway towards the real-world deployment of intelligent traffic management systems. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

20 pages, 315 KB  
Systematic Review
Green Scheduling and Task Offloading in Edge Computing: A Systematic Review
by Adriana Rangel Ribeiro, Ana Clara Santos Andrade, Gabriel Leal dos Santos, Guilherme Dinarte Marcondes Lopes, Edvard Martins de Oliveira, Adler Diniz de Souza and Jeremias Barbosa Machado
Network 2026, 6(1), 17; https://doi.org/10.3390/network6010017 - 16 Mar 2026
Viewed by 147
Abstract
This paper presents a Systematic Literature Review (SLR) on green scheduling and task offloading strategies for energy optimization in edge computing environments. The evolution of low-latency, high-performance applications has driven the widespread adoption of distributed computing paradigms such as Edge Computing, Fog-Cloud architectures, [...] Read more.
This paper presents a Systematic Literature Review (SLR) on green scheduling and task offloading strategies for energy optimization in edge computing environments. The evolution of low-latency, high-performance applications has driven the widespread adoption of distributed computing paradigms such as Edge Computing, Fog-Cloud architectures, and the Internet of Things (IoT). In this context, Mobile Edge Computing (MEC) is often combined with Unmanned Aerial Vehicles (UAVs) to extend computational capabilities to areas with limited infrastructure, bringing processing closer to the data source to reduce latency and improve scalability. Nevertheless, these systems encounter substantial energy-related challenges, particularly in battery-powered or resource-constrained environments. To address these concerns, green computing strategies—especially energy-efficient scheduling and task offloading—have emerged as promising approaches to optimize energy usage in edge environments. Green scheduling optimizes task allocation to minimize energy consumption, whereas offloading redistributes workloads from resource-constrained devices to edge or cloud servers. Increasingly, these techniques are enhanced through artificial intelligence (AI) and machine learning (ML), enabling adaptive and context-aware decision-making in dynamic environments. This paper conducts a systematic literature review (SLR) to synthesize the most widely adopted strategies for energy-efficient scheduling and task offloading in edge computing, highlighting their impact on sustainability and performance. The analysis provides a comprehensive view of the state of the art, examines how architectural contexts influence energy-aware decisions, and highlights the role of AI/ML in enabling intelligent and sustainable edge systems. The findings reveal current research gaps and outline future directions to advance the development of robust, scalable, and environmentally responsible computing infrastructures. Full article
Show Figures

Figure 1

43 pages, 6922 KB  
Article
Multi-Flow Hybrid Task Offloading Scheme for Multimodal High-Load V2I Services
by Weiqi Luo, Yaqi Hu, Maoqiang Wu, Yijie Zhou, Rong Yu and Junbin Qin
Electronics 2026, 15(6), 1229; https://doi.org/10.3390/electronics15061229 - 16 Mar 2026
Viewed by 334
Abstract
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this [...] Read more.
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this paper proposes an integrated framework that jointly considers multi-flow task offloading, adaptive privacy preservation, and latency-aware resource incentive mechanism. Specifically, we propose a Location-Aware and Trust-based (LA-Trust) dual-node task offloading algorithm based on deep reinforcement learning (DRL), which treats pre-partitioned subtasks as multiple parallel flows and enables flow-level collaborative offloading optimization across neighboring nodes, allows subtask data uploading and processing to proceed concurrently, and incorporates node security into decision making. To further enhance privacy protection, a Distribution-Aware Local Differential Privacy (DA-LDP) algorithm is designed to adaptively inject artificial noise according to data heterogeneity, balancing privacy protection and task execution accuracy. In addition, a Delay-Cost Reverse Auction (DC-RA) algorithm is proposed to further reduce latency by introducing wireless channel modeling between idle vehicles and edge nodes into the incentive mechanism. Experimental results show that the proposed framework improves task execution accuracy by 38% and reduces offloading cost, delay, incentive cost, and auction communication latency by 64.41%, 64.64%, 19%, and 44%, respectively, while more than 60% of tasks are offloaded to high-trust nodes. Full article
Show Figures

Figure 1

30 pages, 1414 KB  
Article
Graph-Attention Constrained DRL for Joint Task Offloading and Resource Allocation in UAV-Assisted Internet of Vehicles
by Peiying Zhang, Xiangguo Zheng, Konstantin Igorevich Kostromitin, Wei Zhang, Huiling Shi and Lizhuang Tan
Drones 2026, 10(3), 201; https://doi.org/10.3390/drones10030201 - 13 Mar 2026
Viewed by 281
Abstract
Unmanned aerial vehicles (UAVs) acting as mobile aerial edge platforms can deliver on-demand communication and computing for the Internet of Vehicles (IoV) via flexible deployment and line-of-sight (LoS) links, improving reliability and reducing latency. However, high vehicle mobility, time-varying channels, and limited onboard [...] Read more.
Unmanned aerial vehicles (UAVs) acting as mobile aerial edge platforms can deliver on-demand communication and computing for the Internet of Vehicles (IoV) via flexible deployment and line-of-sight (LoS) links, improving reliability and reducing latency. However, high vehicle mobility, time-varying channels, and limited onboard energy make task offloading and resource coordination challenging. This paper studies joint task offloading and resource allocation in a UAV-assisted IoV system, where the UAV selects its hovering position from discrete candidate sites each time slot and splits vehicular tasks between the UAV and a roadside unit (RSU) to relieve backhaul congestion and enhance edge resource utilization. Considering vehicle mobility, multi-stage queue dynamics, and UAV energy consumption for communication, computation, and movement, the online optimization of position selection, task splitting, and bandwidth allocation is formulated as a constrained Markov decision process (CMDP). The goal is to maximize the number of tasks completed within the latency deadlines while satisfying the UAV energy budget. To solve this CMDP, we propose a graph-attention-based constrained twin delayed deep deterministic policy gradient (GAT-CTD3) algorithm. A graph attention network captures spatial correlations and resource competition among active vehicles, while a Lagrangian TD3 framework enforces long-term energy constraints and improves learning stability via twin critics, delayed policy updates, and target smoothing. The simulation results demonstrate that it outperforms the comparative scheme in terms of task completion rate, delay, and energy consumption per completed task, and exhibits strong robustness in situations with dense traffic. Full article
Show Figures

Figure 1

36 pages, 3158 KB  
Review
Precision Agriculture for Nutraceutical Crops: A Comprehensive Scientific Review
by Giuseppina Maria Concetta Fasciana, Michele Massimo Mammano, Salvatore Amato, Carlo Greco and Santo Orlando
Agronomy 2026, 16(6), 615; https://doi.org/10.3390/agronomy16060615 - 13 Mar 2026
Viewed by 319
Abstract
Precision Agriculture (PA) is increasingly applied to nutraceutical cropping systems, where agronomic productivity must be integrated with the stabilization of phytochemical quality and environmental sustainability. This structured narrative review synthesizes scientific evidence (primarily 2010–2025) on the use of Unmanned Aerial Vehicle (UAV)-based multispectral [...] Read more.
Precision Agriculture (PA) is increasingly applied to nutraceutical cropping systems, where agronomic productivity must be integrated with the stabilization of phytochemical quality and environmental sustainability. This structured narrative review synthesizes scientific evidence (primarily 2010–2025) on the use of Unmanned Aerial Vehicle (UAV)-based multispectral and thermal sensing, LiDAR-derived canopy characterization, Internet of Things (IoT) monitoring, and artificial intelligence (AI)-driven analytics in medicinal, aromatic, and functional crops. The literature indicates that PA enhances high-resolution monitoring of crop–environment interactions, supporting site-specific irrigation, nutrient management, and stress detection. Under validated conditions, these interventions are associated with improved yield stability, resource-use efficiency, and modulation of secondary metabolite accumulation. However, reported outcomes vary substantially across species, agroecological contexts, and experimental scales, and most studies remain plot-scale or pilot-scale, limiting large-scale generalization. Moringa oleifera Lam. is examined as a model species for Mediterranean and semi-arid systems. Evidence suggests that integrated spectral, structural, and environmental monitoring can support optimized irrigation scheduling, canopy uniformity, and phytochemical consistency. Nonetheless, genotype-specific calibration, multi-season validation, standardized metabolomic benchmarking, and cross-regional transferability remain significant research gaps. Overall, PA represents a scientifically promising but still maturing framework for nutraceutical agriculture. Future progress will require rigorous multi-site validation, improved model robustness, standardized sustainability metrics, and comprehensive economic assessments to ensure scalability and long-term impact. Full article
(This article belongs to the Collection AI, Sensors and Robotics for Smart Agriculture)
Show Figures

Figure 1

27 pages, 2147 KB  
Article
Federated Learning with Assured Privacy and Reputation-Driven Incentives for Internet of Vehicles
by Jiayong Chai, Mo Chen, Wei Zhang, Xiaojuan Wang and Jiaming Song
Sensors 2026, 26(5), 1720; https://doi.org/10.3390/s26051720 - 9 Mar 2026
Viewed by 288
Abstract
Cross-domain data collaboration is a core requirement for the intelligent development of critical areas such as the Internet of Vehicles and intelligent transportation systems. In this scenario, vehicles and various sensors deployed roadside continuously generate massive amounts of time-series data, yet this data [...] Read more.
Cross-domain data collaboration is a core requirement for the intelligent development of critical areas such as the Internet of Vehicles and intelligent transportation systems. In this scenario, vehicles and various sensors deployed roadside continuously generate massive amounts of time-series data, yet this data often forms “data silos” due to privacy regulations and a lack of trust between collaborating entities. Existing integrated schemes combining “Federated Learning + Blockchain” have achieved a certain degree of process traceability and automated payments, but risks of gradient-level privacy leakage persist, and inflexible and delayed incentive mechanisms result in low participation quality. To systematically address these bottlenecks, this paper proposes the Federated Learning with Assured Privacy and Reputation-Driven Incentives (FLARE) architecture, whose core innovation lies in the native integration of cryptographic security and mechanism design theory. It includes the Secure and Faithfully Executed Gradient aggregation (SafeGrad) protocol, which integrates partial homomorphic encryption and zero-knowledge proofs to provide verifiable privacy guarantees for gradient contributions while enabling efficient secure aggregation, defending against inversion attacks at the source; alongside this, it includes the Economy-on-Chain incentive (EconChain) mechanism, which designs an on-chain economic system based on blockchain, achieving precise measurement and sustainable incentivization of training process contributions through fine-grained instant micro-rewards and a dynamic reputation model. Experiments show that, compared to baseline schemes, FLARE can effectively enhance node participation enthusiasm and contribution quality without compromising model accuracy, providing a new paradigm with both strong security and high vitality for the trusted and efficient circulation of data. Full article
(This article belongs to the Special Issue Communications and Networking Based on Artificial Intelligence)
Show Figures

Figure 1

55 pages, 3447 KB  
Article
A Microservices-Based Solution with Hybrid Communication for Energy Management in Smart Grid Environments
by Artur F. S. Veloso, José V. Reis and Ricardo A. L. Rabelo
Sensors 2026, 26(5), 1714; https://doi.org/10.3390/s26051714 - 9 Mar 2026
Viewed by 381
Abstract
The increasing variability of residential demand, combined with the expansion of distributed generation and electric vehicles, has introduced new challenges to the stability of Smart Grids (SGs). Centralized management models lack the flexibility required to operate under these conditions, reinforcing the need for [...] Read more.
The increasing variability of residential demand, combined with the expansion of distributed generation and electric vehicles, has introduced new challenges to the stability of Smart Grids (SGs). Centralized management models lack the flexibility required to operate under these conditions, reinforcing the need for scalable and data-driven architectures. This study proposes an energy management solution based on microservices, supported by hybrid communication in Low Power Wide Area Networks (LPWAN), integrating Long Range Wide Area Network (LoRaWAN) and LoRaMESH to enhance connectivity, local resilience, and reliability in data acquisition for Internet of Things (IoT) and Demand Response (DR) applications. A prototype composed of a Smart Meter (SM), a Data Aggregation Point (DAP), and a Concentrator (CON) was evaluated in a controlled environment, achieving Packet Delivery Rates above 97%, an average RSSI of −92 dBm, and a Signal-to-Noise Ratio close to 9 dB, validating the robustness of the hybrid communication. At a larger scale, data from 5567 households in the Low Carbon London (LCL) project were used to generate representative Load Profiles (LPs) through seven aggregation and clustering techniques, consistently identifying the 18:00–21:00 interval as the critical peak, with demand reaching up to 42% above the daily average. Fourteen load shifting algorithms were evaluated, and the Hybrid Adaptive Algorithm based on Intention and Resilience (HAAIR), proposed in this work, achieved the best overall performance with a 1.83% peak reduction, US$65.40 in cost savings, a reduction of 60 kg of CO2, a Comfort Loss Index of 0.04, resilience of 9.5, and reliability of 0.98. The results demonstrate that the integration of hybrid LPWAN communication, modular microservice-based architecture, and adaptive DR strategies driven by Artificial Intelligence (AI) represents a promising pathway toward scalable, resilient, and energy-efficient SGs. Full article
(This article belongs to the Special Issue LoRa Communication Technology for IoT Applications—2nd Edition)
Show Figures

Figure 1

26 pages, 871 KB  
Article
TimesNet-BFT: Mitigating Network State Uncertainty in Byzantine Consensus via Deep Temporal Modeling
by Haolong Wang, Haijun Liu, Yahui Liu, Hongliang Ma and Pan Gao
Entropy 2026, 28(3), 302; https://doi.org/10.3390/e28030302 - 8 Mar 2026
Viewed by 313
Abstract
Byzantine fault tolerance (BFT) protocols serve as the cornerstone of data consistency in permissioned blockchains; however, their scalability is inherently constrained by stochastic leader-centric bottlenecks and rigid, non-adaptive timeout mechanisms. Existing rule-based heuristics often fail to capture high-entropy and time-varying network latency, leading [...] Read more.
Byzantine fault tolerance (BFT) protocols serve as the cornerstone of data consistency in permissioned blockchains; however, their scalability is inherently constrained by stochastic leader-centric bottlenecks and rigid, non-adaptive timeout mechanisms. Existing rule-based heuristics often fail to capture high-entropy and time-varying network latency, leading to frequent view changes and severe performance degradation under network volatility. To mitigate this epistemic uncertainty, this paper proposes TimesNet-BFT, a novel entropy-aware optimization framework. By leveraging TimesNet’s transformation of one-dimensional time series into two-dimensional tensors for multi-periodicity analysis, the framework accurately characterizes stochastic nodal latency patterns to facilitate entropy-minimized dynamic leader election and adaptive timeout strategies. Extensive evaluations conducted on simulated and real-world trace-driven Internet of Vehicles (IoV) scenarios validate the proposed approach, achieving a prediction MAPE below 5% alongside robust zero-shot generalization. Notably, under high-entropy network conditions, the framework demonstrates up to a 191.9% increase in throughput and mitigates latency variance by 73.3%, effectively neutralizing the structural bottlenecks inherent to traditional information-agnostic protocols. Crucially, by mathematically decoupling consensus safety from AI prediction errors, the system introduces an aggressive liveness paradigm that maintains minimal control plane overhead while significantly enhancing the entropic stability of the consensus process. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

25 pages, 1793 KB  
Article
Computing Efficiency Optimization for UAV-Enabled Integrated Sensing, Computing, and Communication: A Memory-Based Deep Reinforcement Learning Approach
by Honghao Qi and Muqing Wu
Drones 2026, 10(3), 180; https://doi.org/10.3390/drones10030180 - 6 Mar 2026
Viewed by 365
Abstract
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for supporting integrated sensing, computing, and communication (ISCC) functionality in Internet of Things (IoT) applications. This paper investigates a UAV-enabled ISCC network, where the UAV performs radar sensing and onboard edge computing with [...] Read more.
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for supporting integrated sensing, computing, and communication (ISCC) functionality in Internet of Things (IoT) applications. This paper investigates a UAV-enabled ISCC network, where the UAV performs radar sensing and onboard edge computing with the computational assistance of ground access points (APs). Given the limited onboard energy, ensuring energy-efficient operation of UAVs is crucial to support the long-term sustainability of network performance. In this paper, we define computing efficiency as the ratio between the total number of successfully processed computational bits and the overall UAV energy consumption, under the constraint of a required sensing threshold. To maximize this performance metric, this paper jointly optimizes the beamforming vector, the CPU frequency, and the trajectory of the UAV. This optimization problem is modeled as a Markov decision process (MDP) and solved using a deep reinforcement learning (DRL) approach based on a memory mechanism. Specifically, a long short-term memory (LSTM) and twin delayed deep deterministic policy gradient (TD3)-based trajectory design and resource allocation (LTTDRA) algorithm is proposed. LSTM units are integrated into the actor and critic to effectively capture the temporal correlations in dynamic environments, thereby enhancing policy stability and accelerating algorithm convergence. The reward function is meticulously designed to alleviate sparse-penalty effects and learn high-performance strategies in complex environments with multiple constraints. Extensive simulations are conducted under various settings and network scenarios, and the results consistently indicate that the proposed approach substantially outperforms the baseline schemes. Full article
(This article belongs to the Special Issue Advances in UAV Networks Towards 6G)
Show Figures

Figure 1

Back to TopTop