Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (429)

Search Parameters:
Keywords = IoVs

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
40 pages, 18911 KiB  
Article
Twin-AI: Intelligent Barrier Eddy Current Separator with Digital Twin and AI Integration
by Shohreh Kia, Johannes B. Mayer, Erik Westphal and Benjamin Leiding
Sensors 2025, 25(15), 4731; https://doi.org/10.3390/s25154731 (registering DOI) - 31 Jul 2025
Viewed by 94
Abstract
The current paper presents a comprehensive intelligent system designed to optimize the performance of a barrier eddy current separator (BECS), comprising a conveyor belt, a vibration feeder, and a magnetic drum. This system was trained and validated on real-world industrial data gathered directly [...] Read more.
The current paper presents a comprehensive intelligent system designed to optimize the performance of a barrier eddy current separator (BECS), comprising a conveyor belt, a vibration feeder, and a magnetic drum. This system was trained and validated on real-world industrial data gathered directly from the working separator under 81 different operational scenarios. The intelligent models were used to recommend optimal settings for drum speed, belt speed, vibration intensity, and drum angle, thereby maximizing separation quality and minimizing energy consumption. the smart separation module utilizes YOLOv11n-seg and achieves a mean average precision (mAP) of 0.838 across 7163 industrial instances from aluminum, copper, and plastic materials. For shape classification (sharp vs. smooth), the model reached 91.8% accuracy across 1105 annotated samples. Furthermore, the thermal monitoring unit can detect iron contamination by analyzing temperature anomalies. Scenarios with iron showed a maximum temperature increase of over 20 °C compared to clean materials, with a detection response time of under 2.5 s. The architecture integrates a Digital Twin using Azure Digital Twins to virtually mirror the system, enabling real-time tracking, behavior simulation, and remote updates. A full connection with the PLC has been implemented, allowing the AI-driven system to adjust physical parameters autonomously. This combination of AI, IoT, and digital twin technologies delivers a reliable and scalable solution for enhanced separation quality, improved operational safety, and predictive maintenance in industrial recycling environments. Full article
(This article belongs to the Special Issue Sensors and IoT Technologies for the Smart Industry)
16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 (registering DOI) - 31 Jul 2025
Viewed by 185
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

18 pages, 1040 KiB  
Article
A TDDPG-Based Joint Optimization Method for Hybrid RIS-Assisted Vehicular Integrated Sensing and Communication
by Xinren Wang, Zhuoran Xu, Qin Wang, Yiyang Ni and Haitao Zhao
Electronics 2025, 14(15), 2992; https://doi.org/10.3390/electronics14152992 - 27 Jul 2025
Viewed by 271
Abstract
This paper proposes a novel Twin Delayed Deep Deterministic Policy Gradient (TDDPG)-based joint optimization algorithm for hybrid reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) systems in Internet of Vehicles (IoV) scenarios. The proposed system model achieves deep integration of sensing and [...] Read more.
This paper proposes a novel Twin Delayed Deep Deterministic Policy Gradient (TDDPG)-based joint optimization algorithm for hybrid reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) systems in Internet of Vehicles (IoV) scenarios. The proposed system model achieves deep integration of sensing and communication by superimposing the communication and sensing signals within the same waveform. To decouple the complex joint design problem, a dual-DDPG architecture is introduced, in which one agent optimizes the transmit beamforming vector and the other adjusts the RIS phase shift matrix. Both agents share a unified reward function that comprehensively considers multi-user interference (MUI), total transmit power, RIS noise power, and sensing accuracy via the CRLB constraint. Simulation results demonstrate that the proposed TDDPG algorithm significantly outperforms conventional DDPG in terms of sum rate and interference suppression. Moreover, the adoption of a hybrid RIS enables an effective trade-off between communication performance and system energy efficiency, highlighting its practical deployment potential in dynamic IoV environments. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

19 pages, 3664 KiB  
Article
Feasibility of Manufacturing and Antitumor Activity of TIL for Advanced Endometrial Cancers
by Yongliang Zhang, Kathleen N. Moore, Amir A. Jazaeri, Judy Fang, Ilabahen Patel, Andrew Yuhas, Patrick Innamarato, Nathan Gilbert, Joseph W. Dean, Behzad Damirchi, Joe Yglesias, Rongsu Qi, Michelle R. Simpson-Abelson, Erwin Cammaart, Sean R. R. Hall and Hequn Yin
Int. J. Mol. Sci. 2025, 26(15), 7151; https://doi.org/10.3390/ijms26157151 - 24 Jul 2025
Viewed by 530
Abstract
Lifileucel, a tumor-infiltrating lymphocyte (TIL) cell therapy approved for advanced melanoma, demonstrates promise for treating other solid tumors, including endometrial cancer (EC). The current study evaluates the feasibility of manufacturing TILs from EC tumors using Iovance’s proprietary 22-day Gen2 manufacturing process. Key parameters, [...] Read more.
Lifileucel, a tumor-infiltrating lymphocyte (TIL) cell therapy approved for advanced melanoma, demonstrates promise for treating other solid tumors, including endometrial cancer (EC). The current study evaluates the feasibility of manufacturing TILs from EC tumors using Iovance’s proprietary 22-day Gen2 manufacturing process. Key parameters, including TIL yield, viability, immune phenotype, T-cell receptor clonality, and cytotoxic activity, were assessed. Of the 11 EC tumor samples processed at research scale, 10 (91%) successfully generated >1 × 109 viable TIL cells, with a median yield of 1.1 × 1010 cells and a median viability of 82.8%. Of the four EC tumor samples processed at full scale, all achieved the pre-specified TVC and viability targets. Putative tumor-reactive T-cell clones were maintained throughout the manufacturing process. Functional reactivity was evidenced by the upregulation of 4-1BB in CD8+ T cells, OX40 in CD4+ T cells, and increased production of IFN-γ and TNF-α upon autologous tumor stimulation. Furthermore, antitumor activity was confirmed using an in vitro autologous tumor organoid killing assay. These findings demonstrate the feasibility of ex vivo TIL expansion from EC tumors. This study provides a rationale for the initiation of the phase II clinical trial IOV-END-201 (NCT06481592) to evaluate lifileucel in patients with advanced EC. Full article
(This article belongs to the Special Issue Endometrial Cancer: From Basic Science to Novel Therapeutics)
Show Figures

Figure 1

25 pages, 1047 KiB  
Article
Integrated Blockchain and Federated Learning for Robust Security in Internet of Vehicles Networks
by Zhikai He, Rui Xu, Binyu Wang, Qisong Meng, Qiang Tang, Li Shen, Zhen Tian and Jianyu Duan
Symmetry 2025, 17(7), 1168; https://doi.org/10.3390/sym17071168 - 21 Jul 2025
Viewed by 319
Abstract
The Internet of Vehicles (IoV) operates in an environment characterized by asymmetric security threats, where centralized vulnerabilities create a critical imbalance that can be disproportionately exploited by attackers. This study addresses this imbalance by proposing a symmetrical security framework that integrates Blockchain and [...] Read more.
The Internet of Vehicles (IoV) operates in an environment characterized by asymmetric security threats, where centralized vulnerabilities create a critical imbalance that can be disproportionately exploited by attackers. This study addresses this imbalance by proposing a symmetrical security framework that integrates Blockchain and Federated Learning (FL) to restore equilibrium in the Vehicle–Road–Cloud ecosystem. The evolution toward sixth-generation (6G) technologies amplifies both the potential of vehicle-to-everything (V2X) communications and its inherent security risks. The proposed framework achieves a delicate balance between robust security and operational efficiency. By leveraging blockchain’s symmetrical and decentralized distribution of trust, the framework ensures data and model integrity. Concurrently, the privacy-preserving approach of FL balances the need for collaborative intelligence with the imperative of safeguarding sensitive vehicle data. A novel Cloud Proxy Re-Encryption Offloading (CPRE-IoV) algorithm is introduced to facilitate efficient model updates. The architecture employs a partitioned blockchain and a smart contract-driven FL pipeline to symmetrically neutralize threats from malicious nodes. Finally, extensive simulations validate the framework’s effectiveness in establishing a resilient and symmetrically secure foundation for next-generation IoV networks. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

19 pages, 626 KiB  
Article
A Strong Anonymous Privacy Protection Authentication Scheme Based on Certificateless IOVs
by Xiaohu He, Shan Gao, Hua Wang and Chuyan Wang
Symmetry 2025, 17(7), 1163; https://doi.org/10.3390/sym17071163 - 21 Jul 2025
Viewed by 162
Abstract
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing [...] Read more.
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing anonymous authentication schemes have limitations, including large vehicle storage demands, information redundancy, time-dependent pseudonym updates, and public–private key updates coupled with pseudonym changes. To address these issues, we propose a certificateless strong anonymous privacy protection authentication scheme that allows vehicles to autonomously generate and dynamically update pseudonyms. Additionally, the trusted authority transmits each entity’s partial private key via a session key, eliminating reliance on secure channels during transmission. Based on the elliptic curve discrete logarithm problem, the scheme’s existential unforgeability is proven in the random oracle model. Performance analysis shows that it outperforms existing schemes in computational cost and communication overhead, with the total computational cost reduced by 70.29–91.18% and communication overhead reduced by 27.75–82.55%, making it more suitable for privacy-sensitive and delay-critical IoV environments. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

36 pages, 8047 KiB  
Article
Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication
by Ahmed Alruwaili, Sardar Islam and Iqbal Gondal
J. Cybersecur. Priv. 2025, 5(3), 48; https://doi.org/10.3390/jcp5030048 - 19 Jul 2025
Viewed by 446
Abstract
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial [...] Read more.
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial attacks, and the handling of available resources. This paper introduces Fed-DTB, a new dynamic trust-based framework for FL that aims to overcome these challenges in the context of IoV. Fed-DTB integrates the adaptive trust evaluation that is capable of quickly identifying and excluding malicious clients to maintain the authenticity of the learning process. A performance comparison with previous approaches is shown, where the Fed-DTB method improves accuracy in the first two training rounds and decreases the per-round training time. The Fed-DTB is robust to non-IID data distributions and outperforms all other state-of-the-art approaches regarding the final accuracy (87–88%), convergence rate, and adversary detection (99.86% accuracy). The key contributions include (1) a multi-factor trust evaluation mechanism with seven contextual factors, (2) correlation-based adaptive weighting that dynamically prioritises trust factors based on vehicular conditions, and (3) an optimisation-based client selection strategy that maximises collaborative reliability. This work opens up opportunities for more accurate, secure, and private collaborative learning in future intelligent transportation systems with the help of federated learning while overcoming the conventional trade-off of security vs. efficiency. Full article
Show Figures

Figure 1

42 pages, 2129 KiB  
Review
Ensemble Learning Approaches for Multi-Class Intrusion Detection Systems for the Internet of Vehicles (IoV): A Comprehensive Survey
by Manal Alharthi, Faiza Medjek and Djamel Djenouri
Future Internet 2025, 17(7), 317; https://doi.org/10.3390/fi17070317 - 19 Jul 2025
Viewed by 400
Abstract
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection [...] Read more.
The emergence of the Internet of Vehicles (IoV) has revolutionized intelligent transportation and communication systems. However, IoV presents many complex and ever-changing security challenges and thus requires robust cybersecurity protocols. This paper comprehensively describes and evaluates ensemble learning approaches for multi-class intrusion detection systems in the IoV environment. The study evaluates several approaches, such as stacking, voting, boosting, and bagging. A comprehensive review of the literature spanning 2020 to 2025 reveals important trends and topics that require further investigation and the relative merits of different ensemble approaches. The NSL-KDD, CICIDS2017, and UNSW-NB15 datasets are widely used to evaluate the performance of Ensemble Learning-Based Intrusion Detection Systems (ELIDS). ELIDS evaluation is usually carried out using some popular performance metrics, including Precision, Accuracy, Recall, F1-score, and Area Under Receiver Operating Characteristic Curve (AUC-ROC), which were used to evaluate and measure the effectiveness of different ensemble learning methods. Given the increasing complexity and frequency of cyber threats in IoV environments, ensemble learning methods such as bagging, boosting, and stacking enhance adaptability and robustness. These methods aggregate multiple learners to improve detection rates, reduce false positives, and ensure more resilient intrusion detection models that can evolve alongside emerging attack patterns. Full article
Show Figures

Figure 1

11 pages, 655 KiB  
Article
A Comparison of Impulse Oscillometry and Spirometry by Percent Predicted in Identifying Uncontrolled Asthma
by Chalerm Liwsrisakun, Chaicharn Pothirat, Athavudh Deesomchok, Pilaiporn Duangjit and Warawut Chaiwong
Adv. Respir. Med. 2025, 93(4), 25; https://doi.org/10.3390/arm93040025 - 18 Jul 2025
Viewed by 264
Abstract
Background: The role of impulse oscillometry (IOS) in evaluating asthma control remains a challenge because the interpretation varies by many factors, including ethnicity. We aimed to assess the diagnostic contribution of spirometry and IOS, established from reference equations, in the detection of uncontrolled [...] Read more.
Background: The role of impulse oscillometry (IOS) in evaluating asthma control remains a challenge because the interpretation varies by many factors, including ethnicity. We aimed to assess the diagnostic contribution of spirometry and IOS, established from reference equations, in the detection of uncontrolled asthma. Methods: This retrospective study was conducted in adult asthma subjects with normal spirometry. Uncontrolled asthma was defined as an Asthma Control Test (ACT) score ≤ 19. Receiver operating characteristic (ROC) curves were plotted to compare the diagnostic abilities of the %-predicted of heterogeneity of resistance at 5 Hz and 20 Hz (R5-R20) and the %-predicted of forced expiratory volume in the first second (FEV1) in detecting uncontrolled asthma. Multivariable risk regressions were performed to identify the %-predicted of R5-R20 as a predictor for uncontrolled asthma. Results: The %-predicted of R5-R20 demonstrated a superior diagnostic ability for detecting uncontrolled asthma compared to the %-predicted FEV1, with the area under the ROC curves (AuROC) = 0.939 vs. 0.712, respectively, p < 0.001. The %-predicted R5R20 of ≥200 showed the highest AuROC for detecting uncontrolled asthma with an adjusted risk ratio of 10.86 (95%CI; 3.77, 31.29; p < 0.001). Conclusions: IOS demonstrated better diagnostic ability for detecting uncontrolled asthma than spirometry. Full article
Show Figures

Figure 1

40 pages, 2206 KiB  
Review
Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)
by Isra Mahmoudi, Djallel Eddine Boubiche, Samir Athmani, Homero Toral-Cruz and Freddy I. Chan-Puc
Future Internet 2025, 17(7), 310; https://doi.org/10.3390/fi17070310 - 17 Jul 2025
Viewed by 492
Abstract
The increasing complexity and scale of Internet of Vehicles (IoV) networks pose significant security challenges, necessitating the development of advanced intrusion detection systems (IDS). Traditional IDS approaches, such as rule-based and signature-based methods, are often inadequate in detecting novel and sophisticated attacks due [...] Read more.
The increasing complexity and scale of Internet of Vehicles (IoV) networks pose significant security challenges, necessitating the development of advanced intrusion detection systems (IDS). Traditional IDS approaches, such as rule-based and signature-based methods, are often inadequate in detecting novel and sophisticated attacks due to their limited adaptability and dependency on predefined patterns. To overcome these limitations, machine learning (ML) and deep learning (DL)-based IDS have been introduced, offering better generalization and the ability to learn from data. However, these models can still struggle with zero-day attacks, require large volumes of labeled data, and may be vulnerable to adversarial examples. In response to these challenges, Generative AI-based IDS—leveraging models such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformers—have emerged as promising solutions that offer enhanced adaptability, synthetic data generation for training, and improved detection capabilities for evolving threats. This survey provides an overview of IoV architecture, vulnerabilities, and classical IDS techniques while focusing on the growing role of Generative AI in strengthening IoV security. It discusses the current landscape, highlights the key challenges, and outlines future research directions aimed at building more resilient and intelligent IDS for the IoV ecosystem. Full article
Show Figures

Figure 1

21 pages, 21215 KiB  
Article
ES-Net Empowers Forest Disturbance Monitoring: Edge–Semantic Collaborative Network for Canopy Gap Mapping
by Yutong Wang, Zhang Zhang, Jisheng Xia, Fei Zhao and Pinliang Dong
Remote Sens. 2025, 17(14), 2427; https://doi.org/10.3390/rs17142427 - 12 Jul 2025
Viewed by 393
Abstract
Canopy gaps are vital microhabitats for forest carbon cycling and species regeneration, whose accurate extraction is crucial for ecological modeling and smart forestry. However, traditional monitoring methods have notable limitations: ground-based measurements are inefficient; remote-sensing interpretation is susceptible to terrain and spectral interference; [...] Read more.
Canopy gaps are vital microhabitats for forest carbon cycling and species regeneration, whose accurate extraction is crucial for ecological modeling and smart forestry. However, traditional monitoring methods have notable limitations: ground-based measurements are inefficient; remote-sensing interpretation is susceptible to terrain and spectral interference; and traditional algorithms exhibit an insufficient feature representation capability. Aiming at overcoming the bottleneck issues of canopy gap identification in mountainous forest regions, we constructed a multi-task deep learning model (ES-Net) integrating an edge–semantic collaborative perception mechanism. First, a refined sample library containing multi-scale interference features was constructed, which included 2808 annotated UAV images. Based on this, a dual-branch feature interaction architecture was designed. A cross-layer attention mechanism was embedded in the semantic segmentation module (SSM) to enhance the discriminative ability for heterogeneous features. Meanwhile, an edge detection module (EDM) was built to strengthen geometric constraints. Results from selected areas in Yunnan Province (China) demonstrate that ES-Net outperforms U-Net, boosting the Intersection over Union (IoU) by 0.86% (95.41% vs. 94.55%), improving the edge coverage rate by 3.14% (85.32% vs. 82.18%), and reducing the Hausdorff Distance by 38.6% (28.26 pixels vs. 46.02 pixels). Ablation studies further verify that the synergy between SSM and EDM yields a 13.0% IoU gain over the baseline, highlighting the effectiveness of joint semantic–edge optimization. This study provides a terrain-adaptive intelligent interpretation method for forest disturbance monitoring and holds significant practical value for advancing smart forestry construction and ecosystem sustainable management. Full article
Show Figures

Graphical abstract

27 pages, 1665 KiB  
Article
A Heuristic Optical Flow Scheduling Algorithm for Low-Delay Vehicular Visible Light Communication
by Zhengying Cai, Shumeng Lei, Jingyi Li, Chen Yu, Junyu Liu and Guoqiang Gong
Photonics 2025, 12(7), 693; https://doi.org/10.3390/photonics12070693 - 9 Jul 2025
Viewed by 200
Abstract
Vehicular visible light communication (VVLC) with ultralow electromagnetic interference has great potential to propel the growth of the Internet of Vehicles (IoV). However, ensuring quick response times and minimal delays in VVLC is a significant challenge brought on by fast-moving vehicles. In response [...] Read more.
Vehicular visible light communication (VVLC) with ultralow electromagnetic interference has great potential to propel the growth of the Internet of Vehicles (IoV). However, ensuring quick response times and minimal delays in VVLC is a significant challenge brought on by fast-moving vehicles. In response to this problem, we propose a heuristic optical flow scheduling algorithm. First, the optical flow scheduling problem of VVLC is built as a multi-objective optimization model considering the makespan, delay, schedulable ratio, and bandwidth utilization with non-conflict constraints. Second, an improved artificial plant community (APC) algorithm with enhanced global and local search capabilities is proposed to achieve low-delay communication for time-sensitive optical flows. Finally, a series of benchmark experiments are conducted to show that the proposed algorithm can efficiently schedule optical flows with minimal delay. The cost of this algorithm is very low, and it is suitable for deployment on edge computing platforms such as vehicles. Full article
(This article belongs to the Special Issue New Advances in Optical Wireless Communication)
Show Figures

Figure 1

20 pages, 3008 KiB  
Article
Computation Offloading Strategy Based on Improved Polar Lights Optimization Algorithm and Blockchain in Internet of Vehicles
by Yubao Liu, Bocheng Yan, Benrui Wang, Quanchao Sun and Yinfei Dai
Appl. Sci. 2025, 15(13), 7341; https://doi.org/10.3390/app15137341 - 30 Jun 2025
Viewed by 231
Abstract
The rapid growth of computationally intensive tasks in the Internet of Vehicles (IoV) poses a triple challenge to the efficiency, security, and stability of Mobile Edge Computing (MEC). Aiming at the problems that traditional optimization algorithms tend to fall into, where local optimum [...] Read more.
The rapid growth of computationally intensive tasks in the Internet of Vehicles (IoV) poses a triple challenge to the efficiency, security, and stability of Mobile Edge Computing (MEC). Aiming at the problems that traditional optimization algorithms tend to fall into, where local optimum in task offloading and edge computing nodes are exposed to the risk of data tampering, this paper proposes a secure offloading strategy that integrates the Improved Polar Lights Optimization algorithm (IPLO) and blockchain. First, the truncation operation when a particle crosses the boundary is improved to dynamic rebound by introducing a rebound boundary processing mechanism, which enhances the global search capability of the algorithm; second, the blockchain framework based on the Delegated Byzantine Fault Tolerance (dBFT) consensus is designed to ensure data tampering and cross-node trustworthy sharing in the offloading process. Simulation results show that the strategy significantly reduces the average task processing latency (64.4%), the average system energy consumption (71.1%), and the average system overhead (75.2%), and at the same time effectively extends the vehicle’s power range, improves the real-time performance of the emergency accident warning and dynamic path planning, and significantly reduces the cost of edge computing usage for small and medium-sized fleets, providing an efficient, secure, and stable collaborative computing solution for IoV. Full article
Show Figures

Figure 1

21 pages, 1469 KiB  
Article
Enhanced Distributed Energy-Efficient Clustering (DEEC) Protocol for Wireless Sensor Networks: A Modular Implementation and Performance Analysis
by Abdulla Juwaied, Lidia Jackowska-Strumillo and Michal Majchrowicz
Sensors 2025, 25(13), 4015; https://doi.org/10.3390/s25134015 - 27 Jun 2025
Cited by 1 | Viewed by 324
Abstract
Wireless Sensor Networks (WSNs) are a component of various applications, including environmental monitoring and the Internet of Things (IoT). Energy efficiency is one of the significant issues in WSNs, since sensor nodes are usually battery-powered and have limited energy resources. The Enhanced Distributed [...] Read more.
Wireless Sensor Networks (WSNs) are a component of various applications, including environmental monitoring and the Internet of Things (IoT). Energy efficiency is one of the significant issues in WSNs, since sensor nodes are usually battery-powered and have limited energy resources. The Enhanced Distributed Energy-Efficient Clustering (DEEC) protocol is one of the most common methods for improving energy efficiency and network lifespan by selecting cluster heads according to residual energy. Nevertheless, standard DEEC methods are limited in dynamic environments because of their fixed nature. This paper presents a novel modular implementation of the DEEC protocol for Wireless Sensor Networks, addressing the limitations of the standard DEEC in dynamic and heterogeneous environments. Unlike the typical DEEC protocol, the proposed approach incorporates realistic energy models, supports heterogeneous nodes, implements load balancing, and enables dynamic cluster head selection Numerical simulations in MATLAB® demonstrate that the improved DEEC protocol achieves a 133% longer stability period (first node death at 1166 rounds vs. 472 rounds), nearly doubles the network lifetime (4000 rounds vs. 2111 rounds), and significantly enhances energy efficiency compared to the standard DEEC. These results verify the effectiveness of the proposed enhancements, making the protocol a robust solution for modern WSN and IoT applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

25 pages, 5526 KiB  
Article
Implementation of Integrated Smart Construction Monitoring System Based on Point Cloud Data and IoT Technique
by Ju-Yong Kim, Suhyun Kang, Jungmin Cho, Seungjin Jeong, Sanghee Kim, Youngje Sung, Byoungkil Lee and Gwang-Hee Kim
Sensors 2025, 25(13), 3997; https://doi.org/10.3390/s25133997 - 26 Jun 2025
Viewed by 740
Abstract
This study presents an integrated smart construction monitoring system that combines point cloud data (PCD) from a 3D laser scanner with real-time IoT sensors and ultra-wideband (UWB) indoor positioning technology to enhance construction site safety and quality management. The system addresses the limitations [...] Read more.
This study presents an integrated smart construction monitoring system that combines point cloud data (PCD) from a 3D laser scanner with real-time IoT sensors and ultra-wideband (UWB) indoor positioning technology to enhance construction site safety and quality management. The system addresses the limitations of traditional BIM-based methods by leveraging high-precision PCD that accurately reflects actual site conditions. Field validation was conducted over 17 days at a residential construction site, focusing on two floors during concrete pouring. The concrete strength prediction model, based on the ASTM C1074 maturity method, achieved prediction accuracy within 1–2 MPa of measured values (e.g., predicted: 26.2 MPa vs. actual: 25.3 MPa at 14 days). The UWB-based worker localization system demonstrated a maximum positioning error of 1.44 m with 1 s update intervals, enabling real-time tracking of worker movements. Static accuracy tests showed localization errors of 0.80–0.94 m under clear line-of-sight and 1.14–1.26 m under partial non-line-of-sight. The integrated platform successfully combined PCD visualization with real-time sensor data, allowing construction managers to monitor concrete curing progress and worker safety simultaneously. Full article
Show Figures

Figure 1

Back to TopTop