Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (378)

Search Parameters:
Keywords = MQTT

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 5998 KB  
Article
A Wearable System for Real-Time Fall Detection on Resource-Constrained Devices
by Timothy Malche, Govind Murari Upadhyay, Sumegh Tharewal, Vipin Balyan, Vikash Kumar Mishra, Gunjan Gupta and Pramod Kumar Soni
Future Internet 2026, 18(4), 211; https://doi.org/10.3390/fi18040211 - 16 Apr 2026
Viewed by 278
Abstract
In this study, we propose a wearable fall detection system that combines wearable sensors, TinyML model, and IoT-based communication for real-time monitoring and detection of falls. The system is designed for resource-constrained IoT devices where memory, power, and processing capacity are limited. The [...] Read more.
In this study, we propose a wearable fall detection system that combines wearable sensors, TinyML model, and IoT-based communication for real-time monitoring and detection of falls. The system is designed for resource-constrained IoT devices where memory, power, and processing capacity are limited. The system works by collecting body motion data using accelerometer sensors placed on the human body. The data is then processed using a feedforward neural network trained on preprocessed signals. The trained model is quantized so that it can run on low-power embedded hardware with small memory size. The model performs inference directly on the device. This reduces latency and avoids sending raw sensor data to the cloud. When a fall is detected, the result is sent through Bluetooth to a gateway. The gateway forwards the data to a cloud server using the MQTT protocol. The cloud stores the data and supports monitoring and analysis. The experimental results show that the quantized TinyML model achieves 98.40% accuracy with more than 80% F1-score and more than 99% recall. The deployed model uses only ∼5 KB of RAM and ∼40 KB of flash memory. The inference time is 7 ms per class. These results show that wearable sensing with quantized TinyML models and IoT communication can provide fast and reliable fall detection for real-world safety monitoring systems. Full article
(This article belongs to the Special Issue Artificial Intelligence-Enabled Smart Healthcare)
Show Figures

Figure 1

20 pages, 604 KB  
Article
eMQTT Traffic Generator for IoT Intrusion Detection Systems
by Jorge Ortega-Moody, Cesar Isaza, Kouroush Jenab, Karina Anaya, Adrian Leon and Cristian Felipe Ramirez-Gutierrez
Future Internet 2026, 18(4), 203; https://doi.org/10.3390/fi18040203 - 13 Apr 2026
Viewed by 395
Abstract
The development of effective Intrusion Detection Systems (IDS) for Internet of Things (IoT) environments is constrained by the absence of realistic, large-scale datasets, particularly for the Message Queuing Telemetry Transport (MQTT) protocol, which is prevalent in industrial IoT. Existing datasets are frequently limited [...] Read more.
The development of effective Intrusion Detection Systems (IDS) for Internet of Things (IoT) environments is constrained by the absence of realistic, large-scale datasets, particularly for the Message Queuing Telemetry Transport (MQTT) protocol, which is prevalent in industrial IoT. Existing datasets are frequently limited in scope, imbalanced, or do not capture MQTT-specific attack patterns, thereby impeding the training of accurate machine learning models. To address this gap, the extensible Message Queuing Telemetry Transport (eMQTT) Traffic Generator is introduced as a modular platform capable of simulating both legitimate MQTT communication and targeted denial-of-service (DoS) attacks. The framework features a scalable and reproducible architecture that incorporates protocol-aware attack modeling, automated traffic labeling, and direct export of datasets suitable for machine learning applications. The system produces standardized, configurable, repeatable, and publicly accessible datasets, thereby facilitating reproducible research and scalable experimentation. Experimental validation demonstrates that the simulated traffic aligns with established DoS behavior models. Two high-volume datasets were generated: one representing normal MQTT traffic and another emulating CONNECT-flooding attacks. Machine learning classifiers trained on these datasets exhibited strong performance, with gradient boosting models achieving over 95% accuracy in distinguishing benign from malicious traffic. This work offers a practical solution to the scarcity of datasets in IoT security research. By providing a controlled, extensible, and reproducible traffic-generation platform alongside validated datasets, eMQTT enables systematic experimentation, supports the advancement of IDS solutions, and enhances MQTT security for critical IoT infrastructures. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Graphical abstract

9 pages, 2515 KB  
Proceeding Paper
Intelligent Notification Mechanism and Workflow for Legacy Programmable Logic Controller System
by Nian-Ze Hu, Po-Han Lu, Hao-Lun Huang, You-Xin Lin, Chih-Chen Lin, Yu-Tzu Hung, Sing-Cih Jhang, Pei-Yu Chou and Qi-Ren Lin
Eng. Proc. 2026, 134(1), 37; https://doi.org/10.3390/engproc2026134037 - 9 Apr 2026
Viewed by 232
Abstract
We developed a real-time alert and data management framework that integrates programmable logic controllers, RS-485 industrial communication, Structured Query Language Server, Message Queuing Telemetry Transport (MQTT), and the nodemation (n8n) automation platform, using a filling machine production line as a case study. The [...] Read more.
We developed a real-time alert and data management framework that integrates programmable logic controllers, RS-485 industrial communication, Structured Query Language Server, Message Queuing Telemetry Transport (MQTT), and the nodemation (n8n) automation platform, using a filling machine production line as a case study. The system collects and analyzes the operational status and production line data of the filling machine in real time, storing all information in a database for preservation. Through MQTT, the data is sent to n8n for automated processing. When equipment anomalies occur or data exceed predefined thresholds, the system automatically notifies maintenance personnel via communication software APIs. Additionally, users can query daily production capacity or related data using n8n’s AI functions. This architecture offers low cost, rapid deployment, cross-platform integration, and high flexibility. It not only improves anomaly handling efficiency but also preserves complete historical records, supporting trend analysis, report generation, and decision optimization, thereby assisting the filling production line in achieving long-term stable and intelligent management. Full article
Show Figures

Figure 1

26 pages, 991 KB  
Article
Experimental Quantification of Authentication Enforcement Correctness and ACL Misconfiguration Impact in Standards-Compliant MQTT Deployments
by Nael M. Radwan and Frederick T. Sheldon
Appl. Sci. 2026, 16(7), 3583; https://doi.org/10.3390/app16073583 - 7 Apr 2026
Viewed by 557
Abstract
Message Queuing Telemetry Transport (MQTT) is a lightweight publish–subscribe protocol widely deployed in Internet of Things (IoT) systems. Although MQTT defines authentication and authorization mechanisms, their enforcement accuracy, configuration sensitivity, and operational cost under controlled misconfiguration conditions remain insufficiently quantified. This study experimentally [...] Read more.
Message Queuing Telemetry Transport (MQTT) is a lightweight publish–subscribe protocol widely deployed in Internet of Things (IoT) systems. Although MQTT defines authentication and authorization mechanisms, their enforcement accuracy, configuration sensitivity, and operational cost under controlled misconfiguration conditions remain insufficiently quantified. This study experimentally quantifies authentication enforcement behavior and Access Control List (ACL) misconfiguration impact within a standards-compliant MQTT deployment under controlled laboratory conditions. Rather than benchmarking a specific software product, the work measures protocol-defined security behavior—including authentication success rate, false acceptance rate (FAR), false rejection rate (FRR), privilege-boundary preservation, authentication latency, and broker CPU utilization—across systematically constructed operational and failure scenarios. Username/password and mutual TLS authentication were evaluated under valid and stress-induced connection conditions, alongside structured ACL policies incorporating wildcard over-permission. Across repeated trials, username/password authentication achieved higher observed connection reliability (≈0.95), while TLS-based authentication provided stronger cryptographic identity assurance at the cost of increased authentication latency (≈42.6 ms vs. 14.8 ms) and higher CPU utilization (≈23.7% vs. 9.4%). No false acceptances were observed within 100 unauthorized trials per configuration, corresponding to a 95% confidence upper bound of <3% for FAR under a binomial model. Under controlled ACL misconfiguration, 22 of 100 evaluated authorization operations accessed topics beyond the originally intended least-privilege scope, yielding a reproducible privilege expansion rate of 0.22. This expansion resulted from wildcard policy semantics rather than an enforcement malfunction. The results provide controlled empirical quantification of reliability–security trade-offs and configuration-driven privilege-boundary behavior within a standards-compliant MQTT deployment. While the findings reflect enforcement behavior as realized in the evaluated implementation and laboratory environment, the proposed measurement framework establishes reproducible criteria for assessing MQTT security enforcement accuracy under controlled conditions. Full article
Show Figures

Figure 1

16 pages, 1689 KB  
Perspective
Digital Representation of NDE Systems: Data Networking and Information Modeling
by Dharma Panchal, Frank Leinenbach, Cemil Emre Ardic, Marina Klees, Michael Peters and Florian Roemer
Appl. Sci. 2026, 16(7), 3447; https://doi.org/10.3390/app16073447 - 2 Apr 2026
Viewed by 338
Abstract
To enhance the measuring capabilities of modern Non-Destructive Evaluation (NDE) devices, it has become essential to integrate standardized digitization services and industry-compliant functionalities. This perspective paper examines approaches for improving NDE systems by incorporating key Industry 4.0 technologies, specifically digital representations such as [...] Read more.
To enhance the measuring capabilities of modern Non-Destructive Evaluation (NDE) devices, it has become essential to integrate standardized digitization services and industry-compliant functionalities. This perspective paper examines approaches for improving NDE systems by incorporating key Industry 4.0 technologies, specifically digital representations such as the Asset Administration Shell (AAS) and OPC UA (Open Platform Communications Unified Architecture). We discuss requirements for interoperable, semantically rich descriptions of NDE systems, outline how OPC UA information models and AAS submodels can be combined with MQTT-based transport, and illustrate these concepts through representative prototype implementations, including predictive maintenance and chatbot assistant use cases. By leveraging these technologies, NDE devices can be transformed into interoperable, data-rich, and intelligent components within smart industrial ecosystems. Compared with previous studies, this Perspective is the first to systematically bring together the requirements, architectural patterns, and evaluation criteria for digital representations designed specifically for NDE systems. It also provides, in a practical and accessible way, NDE-focused OPC UA and AAS-based architectures that support both predictive maintenance and LLM-assisted operator guidance. The presented implementations are at an early stage and serve as illustrative examples, while systematic quantitative validation is ongoing and is outlined as future work. Full article
(This article belongs to the Special Issue New Advances in Non-Destructive Testing and Evaluation)
Show Figures

Figure 1

7 pages, 2523 KB  
Proceeding Paper
AI- and IoT-Enabled Smart Dustbin for Automated Hazardous Electronic Waste Separation
by Min Xuan Soh, Hou Kit Mun, Hui Ziang Lee, Zhi Khai Ng and Yan Chai Hum
Eng. Proc. 2026, 134(1), 10; https://doi.org/10.3390/engproc2026134010 - 30 Mar 2026
Viewed by 437
Abstract
Electronic waste (e-waste) continues to increase globally, yet conventional bins cannot distinguish hazardous batteries and devices from recyclable metals. This article presents an AI- and IoT-enabled smart dustbin that automatically identifies and segregates general waste, metals, and electronic or battery-based hazards while providing [...] Read more.
Electronic waste (e-waste) continues to increase globally, yet conventional bins cannot distinguish hazardous batteries and devices from recyclable metals. This article presents an AI- and IoT-enabled smart dustbin that automatically identifies and segregates general waste, metals, and electronic or battery-based hazards while providing real-time monitoring through a cloud-based dashboard. The system integrates inductive sensing, Time-of-Flight detection, an Espressif Systems Platform 32 (ESP32)-CAM module, and Google Gemini 1.5 Flash for image classification. The prototype achieved a waste segregation accuracy of 93.5% with a total cycle time of 4–6 s per item. The touch-free lid, swift mechanical actuation, and compact 59 × 59 × 100 cm footprint make the dustbin suitable for deployment in campuses, offices, and shopping malls. Dual ESP32 controllers, cloud connectivity through Message Queuing Telemetry Transport (MQTT), Firebase, and a Streamlit web interface enable automated alerts through Discord and email, demonstrating a scalable and energy-efficient approach to sustainable e-waste management. Full article
Show Figures

Figure 1

15 pages, 1364 KB  
Article
CAMS F Edge DTN: Context-Aware Offline-First Synchronization and Local Reasoning Using CRDTs and MQTT-SN
by Nelson Iván Herrera, Estevan Ricardo Gómez-Torres, Edgar E. González, Renato M. Toasa and Paúl Baldeón
Future Internet 2026, 18(4), 180; https://doi.org/10.3390/fi18040180 - 26 Mar 2026
Viewed by 725
Abstract
Context-aware mobile applications operating in environments with intermittent or unreliable connectivity must support offline-first behavior while preserving consistent decision-making and timely synchronization. Traditional cloud-centric architectures often fail to provide adequate availability, responsiveness, and reliable context reasoning under such conditions. This paper presents CAMS-F [...] Read more.
Context-aware mobile applications operating in environments with intermittent or unreliable connectivity must support offline-first behavior while preserving consistent decision-making and timely synchronization. Traditional cloud-centric architectures often fail to provide adequate availability, responsiveness, and reliable context reasoning under such conditions. This paper presents CAMS-F Edge DTN, an edge-centric runtime designed to support offline-first context-aware applications operating under intermittent connectivity. The proposed approach extends the CAMS domain-specific language (DSL) with declarative policies for semantic reconciliation, opportunistic synchronization, and context-aware conflict resolution. The runtime integrates Conflict-Free Replicated Data Types (CRDTs), opportunistic communication channels such as Bluetooth and Wi-Fi Direct, and MQTT-SN messaging to enable robust data exchange across mobile, vehicular, and edge nodes. CAMS F-Edge DTN supports offline-first execution by allowing applications to evaluate contextual rules locally and reconcile distributed state asynchronously when connectivity becomes available. The approach is evaluated through controlled experiments and case studies in rural logistics and healthcare distribution scenarios. The experimental results show that the proposed architecture maintains 96–99% operational availability under intermittent connectivity and up to 100% availability during fully offline operation, while achieving low-latency local reasoning (<10 ms median latency) and deterministic state convergence through CRDT-based synchronization mechanisms. Full article
Show Figures

Figure 1

18 pages, 23387 KB  
Article
Advancing Structural Health Monitoring: Accurate PCB Design for IoT-Based Real-Time Damage Detection with Digital Twin Integration
by S. Adib, G. Ewart, V. Vinogradov and P. D. Gosling
Sensors 2026, 26(5), 1672; https://doi.org/10.3390/s26051672 - 6 Mar 2026
Viewed by 424
Abstract
This paper introduces a cost-effective customised Printed Circuit Board (PCB) designed to establish an accurate Internet of Things (IoT) platform integrated with established Digital Twin (DT) models for advanced structural monitoring. The study focuses on developing a low-cost, precise PCB to synchronise real-time [...] Read more.
This paper introduces a cost-effective customised Printed Circuit Board (PCB) designed to establish an accurate Internet of Things (IoT) platform integrated with established Digital Twin (DT) models for advanced structural monitoring. The study focuses on developing a low-cost, precise PCB to synchronise real-time data between physical structures and their DT counterparts. The methodology includes a robust communication architecture utilising MQTT protocols, facilitating reliable data transmission and efficient integration with MATLAB for processing. Validation tests demonstrate high accuracy in data capture, with less than 1% deviation from conventional systems across multiple structural damage scenarios. This research highlights the potential of cost-effective PCB solutions for enhancing SHM and developing more resilient, proactive infrastructure management strategies. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

34 pages, 8190 KB  
Article
Real-Time Remote Monitoring of Environmental Conditions and Actuator Status in Smart Greenhouses Using a Smartphone Application
by Emmanuel Bicamumakuba, Md Nasim Reza, Hongbin Jin, Samuzzaman, Hyeunseok Choi and Sun-Ok Chung
Sensors 2026, 26(5), 1548; https://doi.org/10.3390/s26051548 - 1 Mar 2026
Viewed by 1549
Abstract
Advancement of precision agriculture increasingly relies on cost-effective and scalable technologies for real-time environmental management, particularly in greenhouse environments where vertical and spatial microclimate heterogeneity influences crop performance. This study presents the design, implementation, and experimental validation of an Android-based smartphone application edge [...] Read more.
Advancement of precision agriculture increasingly relies on cost-effective and scalable technologies for real-time environmental management, particularly in greenhouse environments where vertical and spatial microclimate heterogeneity influences crop performance. This study presents the design, implementation, and experimental validation of an Android-based smartphone application edge supervisory monitoring system integrated with multi-layer wireless sensing and control nodes for real-time monitoring in a smart greenhouse. The system combined multi-layer wireless sensor nodes, wireless control nodes, a Long-Range Wide Area Network (LoRaWAN) gateway, Message Queuing Telemetry Transport (MQTT) communication, and a cloud-synchronized smartphone-based supervisory interface for visualizing environmental data, detecting defined abnormal events, and controlling actuators remotely. For feasibility tests, 54 sensing nodes and 12 actuator nodes were deployed across three vertical layers in two sections, measuring temperature, humidity, CO2 concentration, and light intensity. Abnormality was defined as environmental threshold violations, statistical signal deviations, actuator power inconsistencies, and communication timeout events. Experimental results revealed vertical and spatial environmental variability across greenhouse sections, while real-time time-series and 3D spatial maps enabled the rapid detection of abnormal conditions. The rule-based abnormality detection engine identified out-of-range environmental values and sensor-related inconsistencies and generated immediate notifications. Smartphone profiling revealed that display and system-level processes accounted for energy consumption, with battery power reaching a peak of 3.5 W and application CPU utilization ranging from 40% to 70% during active monitoring. The results demonstrate system-level feasibility, responsiveness, and scalability under commercial greenhouse workloads, supporting future integration of predictive control and energy-efficient operation. Full article
(This article belongs to the Special Issue Smartphone Sensors and Their Applications)
Show Figures

Figure 1

39 pages, 10175 KB  
Article
EdgeML-Driven Real-Time Vehicle Tracking and Traffic Control for Traffic Management in Smart Cities
by Hyago V. L. B. Silva, Davi Rosim, Felipe A. P. de Figueiredo, Samuel B. Mafra, Ahmed S. Khwaja and Alagan Anpalagan
Appl. Sci. 2026, 16(5), 2216; https://doi.org/10.3390/app16052216 - 25 Feb 2026
Viewed by 523
Abstract
The escalating global rates of traffic accidents in urban areas and the growing demands of smart cities underscore the urgent need for advanced real-time monitoring solutions. This paper presents an EdgeML-based system for vehicle tracking that performs real-time speed and distance analysis and [...] Read more.
The escalating global rates of traffic accidents in urban areas and the growing demands of smart cities underscore the urgent need for advanced real-time monitoring solutions. This paper presents an EdgeML-based system for vehicle tracking that performs real-time speed and distance analysis and traffic violation detection. This is achieved by deploying a YOLOv8 object detection model on a Raspberry Pi 5 with a Coral USB Edge TPU accelerator. The system integrates computer vision and IoT technologies to enable real-time processing. It utilizes the Message Queuing Telemetry Transport (MQTT) protocol to allow scalable communication between distributed edge devices and a central MongoDB database, facilitating real-time storage and analysis of traffic data. A synthetic dataset generated via the Blender 3D modeling tool validates the system’s accuracy, demonstrating average speed and distance measurement errors of ±2.11 km/h and ±0.58 m, respectively. These findings are further supported by preliminary practical experiments in a real-world environment, where speed estimation errors remained within 0–2 km/h and distance errors stayed below 0.11 m. Key innovations of this work include license plate recognition, speeding and collision detection, and context analysis using Google’s Gemini-2.5-Flash API. A Streamlit dashboard provides real-time visualization of traffic metrics, violations, and aggregated data. A comparative evaluation of YOLOv5n, YOLOv8n, YOLOv11n, and YOLOv12n identifies YOLOv8n as the most suitable model for embedded deployment, achieving 91.07 ± 0.61% mAP@0.5 without quantization, 88.77 ± 3.31% mAP@0.5 with quantization, while maintaining real-time performance of 30–43 frames per second (FPS) on the Edge TPU. The system’s modular architecture, low latency, and robust performance highlight its suitability for smart city applications, enhancing traffic safety and enabling data-driven urban mobility management. Full article
(This article belongs to the Special Issue Smart Cities: AI-Enhanced Urban Living)
Show Figures

Figure 1

32 pages, 63092 KB  
Article
A Digital Twin-Enabled Framework for Agrivoltaic System Design, Simulation, Monitoring and Control
by Eshan Edirisinghe, George Wu, Divye Maggo, Chi-Tsun Cheng, Toh Yen Pang, Azizur Rahman, Angela L. Avery, Kieran R. Murphy and Carlos A. Lora
Machines 2026, 14(3), 254; https://doi.org/10.3390/machines14030254 - 24 Feb 2026
Viewed by 1272
Abstract
Agrivoltaics offer a sustainable solution to the growing competition between food and energy production. However, their adoption is often constrained by the design and operation challenges associated with optimising the complex trade-off between crop yield and photovoltaic (PV) output. Digital twins can mitigate [...] Read more.
Agrivoltaics offer a sustainable solution to the growing competition between food and energy production. However, their adoption is often constrained by the design and operation challenges associated with optimising the complex trade-off between crop yield and photovoltaic (PV) output. Digital twins can mitigate these risks, yet most agricultural digital twins operate as fragmented digital shadows, lacking high-fidelity modelling, advanced simulation, and bidirectional control capabilities. This study presents a comprehensive, end-to-end digital twin framework to address these limitations. The framework integrates a high-resolution 3D orchard model, reconstructed via UAV photogrammetry, with a CesiumJS-based web interface linked to a modular IoT architecture built on Node-RED, Message Queuing Telemetry Transport (MQTT) protocol and InfluxDB for real-time monitoring and control. A PV simulation engine supports the design, simulation and optimisation of agrivoltaic systems. Bidirectional communication was validated through remote actuation of a physical solar tracker, demonstrating integration among the 3D environment, sensor data and control systems to achieve a closed-loop digital twin. Simulation analyses suggested that panel orientation and row spacing exert a dominant influence on crop-level light distribution. Simulation results demonstrated that a 90° azimuth configuration achieved the highest daily energy yield of 53.97 kWh but reduced peak crop-level irradiance to 205 W/m2. In contrast, the baseline 0° configuration offered a balanced output of 40.86 kWh with a peak light availability of 338 W/m2. The validated, interoperable digital twin architecture provides a reference model for the design, simulation, monitoring and control of an agrivoltaic system, reducing investment uncertainty and supporting sustainable food–energy co-production. Full article
Show Figures

Figure 1

21 pages, 1714 KB  
Article
Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems
by Guanyu Chen, Hiroki Watanabe, Kohei Matsumura and Yoshinari Takegawa
Future Internet 2026, 18(2), 111; https://doi.org/10.3390/fi18020111 - 20 Feb 2026
Viewed by 380
Abstract
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising [...] Read more.
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising data integrity and misleading caregivers, negatively impacting animal welfare. Additionally, current animal monitoring solutions often rely on intrusive tagging methods, such as Radio Frequency Identification (RFID) or ear tagging, which may cause unnecessary stress and discomfort to animals. In this study, we propose a lightweight integrity and provenance-oriented security stack that complements standard transport security, specifically tailored to IMU-based animal motion IoT systems. Our system utilizes a 1D-convolutional neural network (CNN) model, achieving 88% accuracy for precise motion recognition, alongside a lightweight behavioral fingerprinting CNN model attaining 83% accuracy, serving as an auxiliary consistency signal to support collar–animal association and reduce mis-attribution risks. We introduce a dynamically generated pre-shared key (PSK) mechanism based on SHA-256 hashes derived from motion features and timestamps, further securing communication channels via application-layer Hash-based Message Authentication Code (HMAC) combined with Message Queuing Telemetry Transport (MQTT)/Transport Layer Security (TLS) protocols. In our design, MQTT/TLS provides primary device authentication and channel protection, while behavioral fingerprinting and per-window dynamic–HMAC provide auxiliary provenance cues and tamper-evident integrity at the application layer. Experimental validation is conducted primarily via offline, dataset-driven experiments on a public canine IMU dataset; system-level overhead and sensor-to-edge latency are measured on a Raspberry Pi-based testbed by replaying windows through the MQTT/TLS pipeline. Overall, this work integrates motion recognition, behavioral fingerprinting, and dynamic key management into a cohesive, lightweight telemetry integrity/provenance stack and provides a foundation for future extensions to multi-species adaptive scenarios and federated learning applications. Full article
(This article belongs to the Special Issue Secure Integration of IoT and Cloud Computing)
Show Figures

Figure 1

17 pages, 4778 KB  
Article
A Low-Power LoRa-Based Multi-Nodal Wireless Sensor Network with Custom Communication Framework for Rockfall Monitoring
by Paolo Esposito, Vincenzo Stornelli and Giuseppe Ferri
J. Low Power Electron. Appl. 2026, 16(1), 7; https://doi.org/10.3390/jlpea16010007 - 17 Feb 2026
Viewed by 730
Abstract
In this work, the authors introduce an entirely solar-powered LoRa-based WSN consisting of several nodes, two stoplights, and four cameras. The system has been used to monitor the semi-rural area of Panni (FG), Puglia, Italy. The WSN has a totally custom implementation in [...] Read more.
In this work, the authors introduce an entirely solar-powered LoRa-based WSN consisting of several nodes, two stoplights, and four cameras. The system has been used to monitor the semi-rural area of Panni (FG), Puglia, Italy. The WSN has a totally custom implementation in both the node-gateway side and the gateway-user interface side. In particular, the communication framework is entirely IoT-based, featuring both the MQTT protocol, for the direct control of apparatuses from the system user interface, and the more traditional TCP/IP protocol, implemented on NB-IoT. The proposed system is entirely solar-powered and features a 34.68 mWh/day consumption. Around a single communication session, the average power consumption inside the single node amounts to 1.4 mW. This paper gives an overview of the proposed system, with detailed explanations of each part, and measurements retrieved over a wide period to assess the functionality of the system. Full article
Show Figures

Figure 1

27 pages, 3230 KB  
Article
Enhanced MQTT Protocol for Securing Big Data/Hadoop Data Management
by Ferdaous Kamoun-Abid and Amel Meddeb-Makhlouf
J. Sens. Actuator Netw. 2026, 15(1), 22; https://doi.org/10.3390/jsan15010022 - 16 Feb 2026
Viewed by 826
Abstract
Big data has significantly transformed data processing and analytics across various domains. However, ensuring security and data confidentiality in distributed platforms such as Hadoop remains a challenging task. Distributed environments face major security issues, particularly in the management and protection of large-scale data. [...] Read more.
Big data has significantly transformed data processing and analytics across various domains. However, ensuring security and data confidentiality in distributed platforms such as Hadoop remains a challenging task. Distributed environments face major security issues, particularly in the management and protection of large-scale data. In this article, we focus on the cost of secure information transmission, implementation complexity, and scalability. Furthermore, we address the confidentiality of information stored in Hadoop by analyzing different AES encryption modes and examining their potential to enhance Hadoop security. At the application layer, we operate within our Hadoop environment using an extended, secure, and widely used MQTT protocol for large-scale data communication. This approach is based on implementing MQTT with TLS, and before connecting, we add a hash verification of the data nodes’ identities and send the JWT. This protocol uses TCP at the transport layer for underlying transmission. The advantage of TCP lies in its reliability and small header size, making it particularly suitable for big data environments. This work proposes a triple-layer protection framework. The first layer is the assessment of the performance of existing AES encryption modes (CTR, CBC, and GCM) with different key sizes to optimize data confidentiality and processing efficiency in large-scale Hadoop deployments. Afterwards, we propose evaluating the integrity of DataNodes using a novel verification mechanism that employs SHA-3-256 hashing to authenticate nodes and prevent unauthorized access during cluster initialization. At the third tier, the integrity of data blocks within Hadoop is ensured using SHA-3-256. Through extensive performance testing and security validation, we demonstrate integration. Full article
(This article belongs to the Section Network Security and Privacy)
Show Figures

Figure 1

30 pages, 2971 KB  
Article
A Digital Twin Architecture for Integrating Lean Manufacturing with Industrial IoT and Predictive Analytics
by Gulshat Amirkhanova, Shyrailym Adilkyzy, Bauyrzhan Amirkhanov, Dina Baizhanova and Siming Chen
Information 2026, 17(2), 196; https://doi.org/10.3390/info17020196 - 13 Feb 2026
Viewed by 953
Abstract
The convergence of Lean manufacturing and Industry 4.0 requires digital infrastructures capable of transforming high-frequency telemetry into actionable insights. However, architectures that integrate near real-time data with closed-loop process control remain scarce, particularly in the food-processing industry. This study proposes a “Lean 4.0” [...] Read more.
The convergence of Lean manufacturing and Industry 4.0 requires digital infrastructures capable of transforming high-frequency telemetry into actionable insights. However, architectures that integrate near real-time data with closed-loop process control remain scarce, particularly in the food-processing industry. This study proposes a “Lean 4.0” framework based on a six-layer Digital Twin (DT) architecture to digitise waste detection and optimise a medium-scale bakery. The methodology integrates a heterogeneous Industrial Internet of Things (IIoT) network comprising 17 ESP32 (Espressif Systems, Shanghai, China)-based monitoring nodes. Data collection is managed via an edge-centric MQTT–InfluxDB (version 2.7, InfluxData, San Francisco, CA, USA) data pipeline. Furthermore, the analytics layer employs discrete-event simulation in Siemens Plant Simulation (version 2302, Siemens Digital Industries Software, Plano, TX, USA), constraint programming with Google OR-Tools (version 9.8, Google LLC, Mountain View, CA, USA), and machine learning models (Isolation Forest and SARIMA). Multi-month validation in a brownfield bakery, including a 60-day continuous monitoring test, demonstrated that the proposed architecture reduced production cycle time by 24.4% and inter-operational waiting time by 51.2%. Moreover, manual planning time decreased by 87.4% through the use of low-code scheduling interfaces. In addition, state-based control of critical ovens reduced energy consumption by 23.06%. These findings indicate that combining deterministic simulation and combinatorial optimisation with data-driven analytics provides a scalable blueprint for implementing cyber-physical systems in food-processing SMEs. This approach effectively bridges the gap between traditional Lean principles and data-driven smart manufacturing. Full article
(This article belongs to the Section Information Systems)
Show Figures

Graphical abstract

Back to TopTop