Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (164)

Search Parameters:
Keywords = Wi-Fi security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 19197 KiB  
Article
Empirical Evaluation of TLS-Enhanced MQTT on IoT Devices for V2X Use Cases
by Nikolaos Orestis Gavriilidis, Spyros T. Halkidis and Sophia Petridou
Appl. Sci. 2025, 15(15), 8398; https://doi.org/10.3390/app15158398 - 29 Jul 2025
Viewed by 106
Abstract
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we [...] Read more.
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we present an empirical evaluation of TLS (Transport Layer Security)-enhanced MQTT (Message Queuing Telemetry Transport) on low-cost, quad-core Cortex-A72 ARMv8 boards, specifically the Raspberry Pi 4B, commonly used as prototyping platforms for On-Board Units (OBUs) and Road-Side Units (RSUs). Three MQTT entities, namely, the broker, the publisher, and the subscriber, are deployed, utilizing Elliptic Curve Cryptography (ECC) for key exchange and authentication and employing the AES_256_GCM and ChaCha20_Poly1305 ciphers for confidentiality via appropriately selected libraries. We quantify resource consumption in terms of CPU utilization, execution time, energy usage, memory footprint, and goodput across TLS phases, cipher suites, message packaging strategies, and both Ethernet and WiFi interfaces. Our results show that (i) TLS 1.3-enhanced MQTT is feasible on Raspberry Pi 4B devices, though it introduces non-negligible resource overheads; (ii) batching messages into fewer, larger packets reduces transmission cost and latency; and (iii) ChaCha20_Poly1305 outperforms AES_256_GCM, particularly in wireless scenarios, making it the preferred choice for resource- and latency-sensitive V2X applications. These findings provide actionable recommendations for deploying secure MQTT communication on an IoT platform. Full article
(This article belongs to the Special Issue Cryptography in Data Protection and Privacy-Enhancing Technologies)
Show Figures

Figure 1

25 pages, 16941 KiB  
Article
KAN-Sense: Keypad Input Recognition via CSI Feature Clustering and KAN-Based Classifier
by Minseok Koo and Jaesung Park
Electronics 2025, 14(15), 2965; https://doi.org/10.3390/electronics14152965 - 24 Jul 2025
Viewed by 254
Abstract
Wi-Fi sensing leverages variations in CSI (channel state information) to infer human activities in a contactless and low-cost manner, with growing applications in smart homes, healthcare, and security. While deep learning has advanced macro-motion sensing tasks, micro-motion sensing such as keypad stroke recognition [...] Read more.
Wi-Fi sensing leverages variations in CSI (channel state information) to infer human activities in a contactless and low-cost manner, with growing applications in smart homes, healthcare, and security. While deep learning has advanced macro-motion sensing tasks, micro-motion sensing such as keypad stroke recognition remains underexplored due to subtle inter-class CSI variations and significant intra-class variance. These challenges make it difficult for existing deep learning models typically relying on fully connected MLPs to accurately recognize keypad inputs. To address the issue, we propose a novel approach that combines a discriminative feature extractor with a Kolmogorov–Arnold Network (KAN)-based classifier. The combined model is trained to reduce intra-class variability by clustering features around class-specific centers. The KAN classifier learns nonlinear spline functions to efficiently delineate the complex decision boundaries between different keypad inputs with fewer parameters. To validate our method, we collect a CSI dataset with low-cost Wi-Fi devices (ESP8266 and Raspberry Pi 4) in a real-world keypad sensing environment. Experimental results verify the effectiveness and practicality of our method for keypad input sensing applications in that it outperforms existing approaches in sensing accuracy while requiring fewer parameters. Full article
Show Figures

Figure 1

18 pages, 9571 KiB  
Article
TCN-MAML: A TCN-Based Model with Model-Agnostic Meta-Learning for Cross-Subject Human Activity Recognition
by Chih-Yang Lin, Chia-Yu Lin, Yu-Tso Liu, Yi-Wei Chen, Hui-Fuang Ng and Timothy K. Shih
Sensors 2025, 25(13), 4216; https://doi.org/10.3390/s25134216 - 6 Jul 2025
Viewed by 328
Abstract
Human activity recognition (HAR) using Wi-Fi-based sensing has emerged as a powerful, non-intrusive solution for monitoring human behavior in smart environments. Unlike wearable sensor systems that require user compliance, Wi-Fi channel state information (CSI) enables device-free recognition by capturing variations in signal propagation [...] Read more.
Human activity recognition (HAR) using Wi-Fi-based sensing has emerged as a powerful, non-intrusive solution for monitoring human behavior in smart environments. Unlike wearable sensor systems that require user compliance, Wi-Fi channel state information (CSI) enables device-free recognition by capturing variations in signal propagation caused by human motion. This makes Wi-Fi sensing highly attractive for ambient healthcare, security, and elderly care applications. However, real-world deployment faces two major challenges: (1) significant cross-subject signal variability due to physical and behavioral differences among individuals, and (2) limited labeled data, which restricts model generalization. To address these sensor-related challenges, we propose TCN-MAML, a novel framework that integrates temporal convolutional networks (TCN) with model-agnostic meta-learning (MAML) for efficient cross-subject adaptation in data-scarce conditions. We evaluate our approach on a public Wi-Fi CSI dataset using a strict cross-subject protocol, where training and testing subjects do not overlap. The proposed TCN-MAML achieves 99.6% accuracy, demonstrating superior generalization and efficiency over baseline methods. Experimental results confirm the framework’s suitability for low-power, real-time HAR systems embedded in IoT sensor networks. Full article
(This article belongs to the Special Issue Sensors and Sensing Technologies for Object Detection and Recognition)
Show Figures

Figure 1

20 pages, 1517 KiB  
Article
Development of a Linking System Between Vehicle’s Computer and Alexa Auto
by Jaime Paúl Ayala Taco, Kimberly Sharlenka Cerón, Alfredo Leonel Bautista, Alexander Ibarra Jácome and Diego Arcos Avilés
Designs 2025, 9(4), 84; https://doi.org/10.3390/designs9040084 - 2 Jul 2025
Viewed by 360
Abstract
The integration of intelligent voice-control systems represents a critical pathway for enhancing driver comfort and reducing cognitive distraction in modern vehicles. Currently, voice assistants capable of accessing real-time vehicular data (e.g., engine parameters) or controlling actuators (e.g., door locks) remain exclusive to premium [...] Read more.
The integration of intelligent voice-control systems represents a critical pathway for enhancing driver comfort and reducing cognitive distraction in modern vehicles. Currently, voice assistants capable of accessing real-time vehicular data (e.g., engine parameters) or controlling actuators (e.g., door locks) remain exclusive to premium brands. While aftermarket solutions like Amazon’s Echo Auto provide multimedia functionality, they lack access to critical vehicle systems. To address this gap, we develop a novel architecture leveraging the OBD-II port to enable voice-controlled telematics and actuation in mass-production vehicles. Our system interfaces with a Toyota Hilux (2020) and Mazda CX-3 SUV (2021), utilizing an MCP2515 CAN controller for engine control unit (ECU) communication, an Arduino Nano for data processing, and an ESP01 Wi-Fi module for cloud transmission. The Blynk IoT platform orchestrates data flow and provides user interfaces, while a Voiceflow-programmed Alexa skill enables natural language commands (e.g., “unlock doors”) via Alexa Auto. Experimental validation confirms the successful real-time monitoring of engine variables (coolant temperature, air–fuel ratio, ignition timing) and secure door-lock control. This work demonstrates that high-end vehicle capabilities—previously restricted to luxury segments—can be effectively implemented in series-production automobiles through standardized OBD-II protocols and IoT integration, establishing a scalable framework for next-generation in-vehicle assistants. Full article
(This article belongs to the Topic Vehicle Dynamics and Control, 2nd Edition)
Show Figures

Figure 1

40 pages, 5045 KiB  
Review
RF Energy-Harvesting Techniques: Applications, Recent Developments, Challenges, and Future Opportunities
by Stella N. Arinze, Emenike Raymond Obi, Solomon H. Ebenuwa and Augustine O. Nwajana
Telecom 2025, 6(3), 45; https://doi.org/10.3390/telecom6030045 - 1 Jul 2025
Viewed by 997
Abstract
The increasing demand for sustainable and renewable energy solutions has made radio frequency energy harvesting (RFEH) a promising technique for powering low-power electronic devices. RFEH captures ambient RF signals from wireless communication systems, such as mobile networks, Wi-Fi, and broadcasting stations, and converts [...] Read more.
The increasing demand for sustainable and renewable energy solutions has made radio frequency energy harvesting (RFEH) a promising technique for powering low-power electronic devices. RFEH captures ambient RF signals from wireless communication systems, such as mobile networks, Wi-Fi, and broadcasting stations, and converts them into usable electrical energy. This approach offers a viable alternative for battery-dependent and hard-to-recharge applications, including streetlights, outdoor night/security lighting, wireless sensor networks, and biomedical body sensor networks. This article provides a comprehensive review of the RFEH techniques, including state-of-the-art rectenna designs, energy conversion efficiency improvements, and multi-band harvesting systems. We present a detailed analysis of recent advancements in RFEH circuits, impedance matching techniques, and integration with emerging technologies such as the Internet of Things (IoT), 5G, and wireless power transfer (WPT). Additionally, this review identifies existing challenges, including low conversion efficiency, unpredictable energy availability, and design limitations for small-scale and embedded systems. A critical assessment of current research gaps is provided, highlighting areas where further development is required to enhance performance and scalability. Finally, constructive recommendations for future opportunities in RFEH are discussed, focusing on advanced materials, AI-driven adaptive harvesting systems, hybrid energy-harvesting techniques, and novel antenna–rectifier architectures. The insights from this study will serve as a valuable resource for researchers and engineers working towards the realization of self-sustaining, battery-free electronic systems. Full article
(This article belongs to the Special Issue Advances in Wireless Communication: Applications and Developments)
Show Figures

Figure 1

31 pages, 4258 KiB  
Article
MZAP—Mobile Application for Basketball Match Tracking and Digitalization of Endgame Reports
by Predrag Pecev and Branko Markoski
Appl. Sci. 2025, 15(13), 7339; https://doi.org/10.3390/app15137339 - 30 Jun 2025
Viewed by 242
Abstract
This paper presents MZAP, a mobile application designed to digitalize basketball match tracking and generate secure, searchable endgame reports. Used by the Basketball League of Serbia, MZAP creates tamper-proof digitally signed records stored as password-protected PDFs with unique UUIDs, digital signatures, and QR [...] Read more.
This paper presents MZAP, a mobile application designed to digitalize basketball match tracking and generate secure, searchable endgame reports. Used by the Basketball League of Serbia, MZAP creates tamper-proof digitally signed records stored as password-protected PDFs with unique UUIDs, digital signatures, and QR codes. Each report is accompanied by a JSON file containing match data, enabling efficient validation through hashed checksums and facilitating data extraction and searchability. The system supports both online and offline modes, bilingual interfaces, mobile and tablet use, and includes features such as WiFi-based monitoring, physical printing, and various sharing options. The solution aims to reduce officials’ working time and increase data accuracy by minimizing human error through structural and UI-level validation methods and real-time monitoring by multiple observers during games. As part of the MZAP software suite, MZAP Converter is under development to support the digitization of legacy paper-based reports using custom CRNN neural networks to optically recognize and digitize historical paper-based reports, bringing them to the same standard as newly created digital ones. The paper also reflects on the broader impact of digital transformation within the Basketball League of Serbia. Full article
Show Figures

Figure 1

24 pages, 1307 KiB  
Article
A Self-Supervised Specific Emitter Identification Method Based on Contrastive Asymmetric Masked Learning
by Dong Wang, Yonghui Huang, Tianshu Cui and Yan Zhu
Sensors 2025, 25(13), 4023; https://doi.org/10.3390/s25134023 - 27 Jun 2025
Viewed by 294
Abstract
Specific emitter identification (SEI) is a core technology for wireless device security that plays a crucial role in protecting wireless communication systems from various security threats. However, current deep learning-based SEI methods heavily rely on large amounts of labeled data for supervised training, [...] Read more.
Specific emitter identification (SEI) is a core technology for wireless device security that plays a crucial role in protecting wireless communication systems from various security threats. However, current deep learning-based SEI methods heavily rely on large amounts of labeled data for supervised training, facing challenges in non-cooperative communication scenarios. To address these issues, this paper proposes a novel contrastive asymmetric masked learning-based SEI (CAML-SEI) method, effectively solving the problem of SEI under scarce labeled samples. The proposed method constructs an asymmetric auto-encoder architecture, comprising an encoder network based on channel squeeze-and-excitation residual blocks to capture radio frequency fingerprint (RFF) features embedded in signals, while employing a lightweight single-layer convolutional decoder for masked signal reconstruction. This design promotes the learning of fine-grained local feature representations. To further enhance feature discriminability, a learnable non-linear mapping is introduced to compress high-dimensional encoded features into a compact low-dimensional space, accompanied by a contrastive loss function that simultaneously achieves feature aggregation of positive samples and feature separation of negative samples. Finally, the network is jointly optimized by combining signal reconstruction and feature contrast tasks. Experiments conducted on real-world ADS-B and Wi-Fi datasets demonstrate that the proposed method effectively learns generalized RFF features, and the results show superior performance compared with other SEI methods. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

17 pages, 4425 KiB  
Article
Design and Implementation of a Secure Communication Architecture for IoT Devices
by Cezar-Gabriel Dumitrache and Petre Anghelescu
J. Sens. Actuator Netw. 2025, 14(4), 64; https://doi.org/10.3390/jsan14040064 - 23 Jun 2025
Viewed by 491
Abstract
This paper explores the integration of Internet of Things (IoT) devices into modern cybersecurity frameworks, and it is intended to be a binder for the incorporation of these devices into emerging cybersecurity paradigms. Most IoT devices rely on WPA2-personal protocol, a wireless protocol [...] Read more.
This paper explores the integration of Internet of Things (IoT) devices into modern cybersecurity frameworks, and it is intended to be a binder for the incorporation of these devices into emerging cybersecurity paradigms. Most IoT devices rely on WPA2-personal protocol, a wireless protocol with known security flaws, being effortless to penetrate by using various specific tools. Through this paper, we proposed the use of two Raspberry Pi platforms, with the help of which we created a secure wireless connection by implementing the 802.1X protocol and using digital certificates. Implementing this type of architecture and the devices used, we obtained huge benefits from the point of view of security and energy consumption. We tested multiple authentication methods, including EAP-TLS and EAP-MSCHAPv2, with the Raspberry Pi acting as an authentication server and certificate manager. Performance metrics such as power consumption, latency, and network throughput were analysed, confirming the architecture’s effectiveness and scalability for larger IoT deployments. Full article
Show Figures

Figure 1

29 pages, 662 KiB  
Article
Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques
by Hosam Alamleh, Laura Estremera, Shadman Sakib Arnob and Ali Abdullah S. AlQahtani
J. Cybersecur. Priv. 2025, 5(2), 27; https://doi.org/10.3390/jcp5020027 - 22 May 2025
Viewed by 900
Abstract
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for [...] Read more.
Wireless Local Area Networks (WLANs), particularly Wi-Fi, serve as the backbone of modern connectivity, supporting billions of devices globally and forming a critical component in Internet of Things (IoT) ecosystems. However, the increasing ubiquity of WLANs also presents an expanding attack surface for adversaries—especially Advanced Persistent Threats (APTs), which operate with high levels of sophistication, resources, and long-term strategic objectives. This paper provides a holistic security analysis of WLANs under the lens of APT threat models, categorizing APT actors by capability tiers and examining their ability to compromise WLANs through logical attack surfaces. The study identifies and explores three primary attack surfaces: Radio Access Control interfaces, compromised insider nodes, and ISP gateway-level exposures. A series of empirical experiments—ranging from traffic analysis of ISP-controlled routers to offline password attack modeling—evaluate the current resilience of WLANs and highlight specific vulnerabilities such as credential reuse, firmware-based leakage, and protocol downgrade attacks. Furthermore, the paper demonstrates how APT resources significantly accelerate attacks through formal models of computational scaling. It also incorporates threat modeling frameworks, including STRIDE and MITRE ATT&CK, to contextualize risks and map adversary tactics. Based on these insights, this paper offers practical recommendations for enhancing WLAN resilience through improved authentication mechanisms, network segmentation, AI-based anomaly detection, and open firmware adoption. The findings underscore that while current WLAN implementations offer basic protections, they remain highly susceptible to well-resourced adversaries, necessitating a shift toward more robust, context-aware security architectures. Full article
Show Figures

Figure 1

32 pages, 4040 KiB  
Article
Self-Supervised WiFi-Based Identity Recognition in Multi-User Smart Environments
by Hamada Rizk and Ahmed Elmogy
Sensors 2025, 25(10), 3108; https://doi.org/10.3390/s25103108 - 14 May 2025
Cited by 1 | Viewed by 691
Abstract
The deployment of autonomous AI agents in smart environments has accelerated the need for accurate and privacy-preserving human identification. Traditional vision-based solutions, while effective in capturing spatial and contextual information, often face challenges related to high deployment costs, privacy concerns, and susceptibility to [...] Read more.
The deployment of autonomous AI agents in smart environments has accelerated the need for accurate and privacy-preserving human identification. Traditional vision-based solutions, while effective in capturing spatial and contextual information, often face challenges related to high deployment costs, privacy concerns, and susceptibility to environmental variations. To address these limitations, we propose IdentiFi, a novel AI-driven human identification system that leverages WiFi-based wireless sensing and contrastive learning techniques. IdentiFi utilizes self-supervised and semi-supervised learning to extract robust, identity-specific representations from Channel State Information (CSI) data, effectively distinguishing between individuals even in dynamic, multi-occupant settings. The system’s temporal and contextual contrasting modules enhance its ability to model human motion and reduce multi-user interference, while class-aware contrastive learning minimizes the need for extensive labeled datasets. Extensive evaluations demonstrate that IdentiFi outperforms existing methods in terms of scalability, adaptability, and privacy preservation, making it highly suitable for AI agents in smart homes, healthcare facilities, security systems, and personalized services. Full article
(This article belongs to the Special Issue Multi-Agent Sensors Systems and Their Applications)
Show Figures

Figure 1

18 pages, 2972 KiB  
Article
Research on Cross-Scene Human Activity Recognition Based on Radar and Wi-Fi Multimodal Fusion
by Zhiyu Chen, Yanpeng Sun and Lele Qu
Electronics 2025, 14(8), 1518; https://doi.org/10.3390/electronics14081518 - 9 Apr 2025
Viewed by 832
Abstract
Radar-based human behavior recognition has significant value in IoT application scenarios such as smart healthcare and intelligent security. However, the existing unimodal perception architecture is susceptible to multipath effects, which can lead to feature drift, and the issue of limited cross-scenario generalization ability [...] Read more.
Radar-based human behavior recognition has significant value in IoT application scenarios such as smart healthcare and intelligent security. However, the existing unimodal perception architecture is susceptible to multipath effects, which can lead to feature drift, and the issue of limited cross-scenario generalization ability has not been effectively addressed. Although Wi-Fi sensing technology has emerged as a promising research direction due to its widespread device applicability and privacy protection, its drawbacks, such as low signal resolution and weak anti-interference ability, limit behavior recognition accuracy. To address these challenges, this paper proposes a dynamic adaptive behavior recognition method based on the complementary fusion of radar and Wi-Fi signals. By constructing a cross-modal spatiotemporal feature alignment module, the method achieves heterogeneous signal representation space mapping. A dynamic weight allocation strategy guided by attention is adopted to effectively suppress environmental interference and improve feature discriminability. Experimental results show that, on a cross-environment behavior dataset, the proposed method achieves an average recognition accuracy of 94.8%, which is a significant improvement compared to the radar unimodal domain adaptation method. Full article
Show Figures

Figure 1

31 pages, 5218 KiB  
Article
KAN-ResNet-Enhanced Radio Frequency Fingerprint Identification with Zero-Forcing Equalization
by Hongbo Chen, Ruohua Zhou, Qingsheng Yuan, Ziye Guo and Wei Fu
Sensors 2025, 25(7), 2222; https://doi.org/10.3390/s25072222 - 1 Apr 2025
Cited by 2 | Viewed by 979
Abstract
Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Things (IoT). However, time-varying channels degrade accuracy due to factors like device [...] Read more.
Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Things (IoT). However, time-varying channels degrade accuracy due to factors like device aging and environmental changes. To address this, we propose an RFFI method integrating Zero-Forcing (ZF) equalization and KAN-ResNet. Firstly, the Wi-Fi preamble signals under the IEEE 802.11 standard are Zero-Forcing equalized, so as to effectively reduce the interference of time-varying channels on RFFI. We then design a novel residual network, KAN-ResNet, which adds a KAN module on top of the traditional fully connected layer. The module combines the B-spline basis function and the traditional activation function Sigmoid Linear Unit (SiLU) to realize the nonlinear mapping of the complex function, which enhance the classification ability of the network for RFF features. In addition, to improve the generalization of the model, the grid of B-splines is dynamically updated and L1 regularization is introduced. Experiments show that on datasets collected 20 days apart, our method achieves 99.4% accuracy, reducing the error rate from 6.3% to 0.6%, outperforming existing models. Full article
(This article belongs to the Special Issue Data Protection and Privacy in Industry 4.0 Era)
Show Figures

Figure 1

21 pages, 3145 KiB  
Review
A Survey on Secure WiFi Sensing Technology: Attacks and Defenses
by Xingyu Liu, Xin Meng, Hancong Duan, Ze Hu and Min Wang
Sensors 2025, 25(6), 1913; https://doi.org/10.3390/s25061913 - 19 Mar 2025
Cited by 1 | Viewed by 2158
Abstract
As a key enabling technology of the Internet of Thing (IoT), WiFi sensing has undergone noteworthy advancements and brought significant improvement to prevailing IoT systems and applications. The past few years have witnessed growing efforts in WiFi sensing, which is widely applied in [...] Read more.
As a key enabling technology of the Internet of Thing (IoT), WiFi sensing has undergone noteworthy advancements and brought significant improvement to prevailing IoT systems and applications. The past few years have witnessed growing efforts in WiFi sensing, which is widely applied in various applications, such as indoor localization, human activity recognition, physiological signal monitoring, and so on. However, these techniques are also maliciously used by attackers to eavesdrop on legitimate users and even tamper the sensing results. Fortunately, these attack techniques in turn promote the advancement of WiFi sensing techniques, especially defense techniques. In this study, we carried out a comprehensive survey to systematically summarize the works related to the topic of attacks and defenses on WiFi sensing technology. Firstly, we summarize the existing surveys in related areas and highlight our unique novelty. Then, we introduce the concept of the core topic of this survey and provide a taxonomy to distinguish different kinds of attack and defense techniques, respectively, that is, active and passive attack techniques as well as active and passive defense techniques. Furthermore, existing works in each category are grouped and introduced in detail, respectively. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

14 pages, 2046 KiB  
Article
Smart Buildings Using Web of Things with .NET Core: A Framework for Inter-Device Connectivity and Secure Data Transfer
by Nazmi Ekren, Mehmet Sensoy and Tahir Cetin Akinci
Information 2025, 16(2), 123; https://doi.org/10.3390/info16020123 - 8 Feb 2025
Cited by 1 | Viewed by 1198
Abstract
The Internet of Things (IoT) is experiencing rapid growth, with an increasing number of devices connected to the Internet. By 2020, approximately 54% of the 21.7 billion active internet-connected devices worldwide were IoT devices. This number is projected to reach 30 billion by [...] Read more.
The Internet of Things (IoT) is experiencing rapid growth, with an increasing number of devices connected to the Internet. By 2020, approximately 54% of the 21.7 billion active internet-connected devices worldwide were IoT devices. This number is projected to reach 30 billion by 2025, with an average of four IoT devices per person globally. IoT devices use communication protocols, such as Bluetooth, Wi-Fi, and RFID, to facilitate data exchange. However, the absence of standardized communication protocols and reprogrammable architectures presents significant challenges for IoT applications. Smart buildings, which heavily depend on IoT technology, are particularly affected by the diversity of protocols and standards used by different devices. The Web of Things (WoT) framework has been introduced to address these challenges, enabling interoperability among devices with heterogeneous communication protocols and enhancing system programmability. The increasing adoption of IoT devices necessitates more efficient communication protocols and integrated architectures to meet the demands of modern innovative building systems. This study presents a WoT-based modular architecture designed to ensure compatibility among devices and protocols while providing scalable, flexible, and secure solutions tailored to the current IoT trends. In this study, an Application Programming Interface (API) and a Worker Service were developed using .NET Core technology and the WoT framework for modular intelligent building automation. This system integrates various subsystems, leveraging hardware and communication protocols for seamless functionality. The API facilitates device monitoring and control, while the Worker Service manages scheduling and database operations. The system supports asynchronous communication by employing the HTTP and WebSocket protocols and provides multi-user access with role-based authorization. The proposed automation system was implemented and evaluated, demonstrating its practical applicability and effectiveness in managing complex, innovative building environments. Full article
(This article belongs to the Section Information Applications)
Show Figures

Figure 1

14 pages, 1580 KiB  
Article
Differential Measurement of Involuntary Breathing Movements
by Jacob Seman, Carlos Rodriguez Amaro, Lillian Tucker, Jordan M. Fleury, Keegan Erickson, Gannon White, Talles Batista Rattis Santos and Michelle M. Mellenthin
Biosensors 2025, 15(2), 87; https://doi.org/10.3390/bios15020087 - 5 Feb 2025
Viewed by 1447
Abstract
Free divers are known to experience a physiological response during extreme breath holding, causing involuntary breathing movements (IBMs). To investigate these movements, a low-cost multi-core ESP32-Pico microcontroller prototype was developed to measure IBMs during a static breath hold. This novel device, called the [...] Read more.
Free divers are known to experience a physiological response during extreme breath holding, causing involuntary breathing movements (IBMs). To investigate these movements, a low-cost multi-core ESP32-Pico microcontroller prototype was developed to measure IBMs during a static breath hold. This novel device, called the bioSense, uses a differential measurement between two accelerometers placed on the sternum and the xiphoid process to acquire breathing-related movements. Sensor placement allowed for data acquisition that was posture- and body-shape-agnostic. Sensor placement was also designed to be as non-intrusive as possible and precisely capture breathing movements at configurable sampling rates. Measurements from the device were sent over WiFi to be accessed on a password-protected webserver and backed up to a micro-secure digital (microSD) card. This device was used in a pilot study, where it captured the various phases of breathing experienced by recreational free divers alongside a force plate measurement system for comparison. Full article
(This article belongs to the Special Issue Wearable Sensors for Precise Exercise Monitoring and Analysis)
Show Figures

Figure 1

Back to TopTop