Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (8,107)

Search Parameters:
Keywords = internet of things (IOTs)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 16074 KiB  
Article
Exact SER Analysis of Partial-CSI-Based SWIPT OAF Relaying over Rayleigh Fading Channels and Insights from a Generalized Non-SWIPT OAF Approximation
by Kyunbyoung Ko and Seokil Song
Sensors 2025, 25(15), 4872; https://doi.org/10.3390/s25154872 (registering DOI) - 7 Aug 2025
Abstract
This paper investigates the error rate performance of simultaneous wireless information and power transfer (SWIPT) systems employing opportunistic amplify-and-forward (OAF) relaying under Rayleigh fading conditions. To support both data forwarding and energy harvesting at relays, a power splitting (PS) mechanism is applied. We [...] Read more.
This paper investigates the error rate performance of simultaneous wireless information and power transfer (SWIPT) systems employing opportunistic amplify-and-forward (OAF) relaying under Rayleigh fading conditions. To support both data forwarding and energy harvesting at relays, a power splitting (PS) mechanism is applied. We derive exact and asymptotic symbol error rate (SER) expressions using moment-generating function (MGF) methods, providing analytical insights into how the power splitting ratio ρ and the quality of source–relay (SR) and relay–destination (RD) links jointly affect system behavior. Additionally, we propose a novel approximation that interprets the SWIPT-OAF configuration as an equivalent non-SWIPT OAF model. This enables tractable performance analysis while preserving key diversity characteristics. The framework is extended to include scenarios with partial channel state information (CSI) and Nth best relay selection, addressing practical concerns such as limited relay availability and imperfect decision-making. Extensive simulations validate the theoretical analysis and demonstrate the robustness of the proposed approach under a wide range of signal-to-noise ratio (SNR) and channel conditions. These findings contribute to a flexible and scalable design strategy for SWIPT-OAF relay systems, making them suitable for deployment in emerging wireless sensor and internet of things (IoT) networks. Full article
(This article belongs to the Section Communications)
21 pages, 510 KiB  
Review
IoT and Machine Learning for Smart Bird Monitoring and Repellence: Techniques, Challenges, and Opportunities
by Samson O. Ooko, Emmanuel Ndashimye, Evariste Twahirwa and Moise Busogi
IoT 2025, 6(3), 46; https://doi.org/10.3390/iot6030046 (registering DOI) - 7 Aug 2025
Abstract
The activities of birds present increasing challenges in agriculture, aviation, and environmental conservation. This has led to economic losses, safety risks, and ecological imbalances. Attempts have been made to address the problem, with traditional deterrent methods proving to be labour-intensive, environmentally unfriendly, and [...] Read more.
The activities of birds present increasing challenges in agriculture, aviation, and environmental conservation. This has led to economic losses, safety risks, and ecological imbalances. Attempts have been made to address the problem, with traditional deterrent methods proving to be labour-intensive, environmentally unfriendly, and ineffective over time. Advances in artificial intelligence (AI) and the Internet of Things (IoT) present opportunities for enabling automated real-time bird detection and repellence. This study reviews recent developments (2020–2025) in AI-driven bird detection and repellence systems, emphasising the integration of image, audio, and multi-sensor data in IoT and edge-based environments. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses framework was used, with 267 studies initially identified and screened from key scientific databases. A total of 154 studies met the inclusion criteria and were analysed. The findings show the increasing use of convolutional neural networks (CNNs), YOLO variants, and MobileNet in visual detection, and the growing use of lightweight audio-based models such as BirdNET, MFCC-based CNNs, and TinyML frameworks for microcontroller deployment. Multi-sensor fusion is proposed to improve detection accuracy in diverse environments. Repellence strategies include sound-based deterrents, visual deterrents, predator-mimicking visuals, and adaptive AI-integrated systems. Deployment success depends on edge compatibility, power efficiency, and dataset quality. The limitations of current studies include species-specific detection challenges, data scarcity, environmental changes, and energy constraints. Future research should focus on tiny and lightweight AI models, standardised multi-modal datasets, and intelligent, behaviour-aware deterrence mechanisms suitable for precision agriculture and ecological monitoring. Full article
Show Figures

Figure 1

24 pages, 1486 KiB  
Article
Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach
by Rubén Juárez Cádiz, Ruben Nicolas-Sans and José Fernández Tamámes
Sensors 2025, 25(15), 4856; https://doi.org/10.3390/s25154856 - 7 Aug 2025
Abstract
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges [...] Read more.
Vehicular ad hoc networks (VANETs) are a critical aspect of intelligent transportation systems, improving safety and comfort for drivers. These networks enhance the driving experience by offering timely information vital for safety and comfort. Yet, VANETs come with their own set of challenges concerning security, privacy, and design reliability. Traditionally, vehicle authentication occurs every time a vehicle enters the domain of the roadside unit (RSU). In our study, we suggest that authentication should take place only when a vehicle has not covered a set distance, increasing system efficiency. The rise of the Internet of Things (IoT) has seen an upsurge in the use of IoT devices across various fields, including smart cities, healthcare, and vehicular IoT. These devices, while gathering environmental data and networking, often face reliability issues without a trusted intermediary. Our study delves deep into implementing Teegraph in VANETs to enhance authentication. Given the integral role of VANETs in Intelligent Transportation Systems and their inherent challenges, we turn to Hashgraph—an alternative to blockchain. Hashgraph offers a decentralized, secure, and trustworthy database. We introduce an efficient authentication system, which triggers only when a vehicle has not traversed a set distance, optimizing system efficiency. Moreover, we shed light on the indispensable role Hashgraph can occupy in the rapidly expanding IoT landscape. Lastly, we present Teegraph, a novel Hashgraph-based technology, as a superior alternative to blockchain, ensuring a streamlined, scalable authentication solution. Our approach leverages the logical key hierarchy (LKH) and packet update keys to ensure data privacy and integrity in vehicular networks. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

27 pages, 19279 KiB  
Article
Smart Hydroponic Cultivation System for Lettuce (Lactuca sativa L.) Growth Under Different Nutrient Solution Concentrations in a Controlled Environment
by Raul Herrera-Arroyo, Juan Martínez-Nolasco, Enrique Botello-Álvarez, Víctor Sámano-Ortega, Coral Martínez-Nolasco and Cristal Moreno-Aguilera
Appl. Syst. Innov. 2025, 8(4), 110; https://doi.org/10.3390/asi8040110 - 7 Aug 2025
Abstract
The inclusion of the Internet of Things (IoT) in indoor agricultural systems has become a fundamental tool for improving cultivation systems by providing key information for decision-making in pursuit of better performance. This article presents the design and implementation of an IoT-based agricultural [...] Read more.
The inclusion of the Internet of Things (IoT) in indoor agricultural systems has become a fundamental tool for improving cultivation systems by providing key information for decision-making in pursuit of better performance. This article presents the design and implementation of an IoT-based agricultural system installed in a plant growth chamber for hydroponic cultivation under controlled conditions. The growth chamber is equipped with sensors for air temperature, relative humidity (RH), carbon dioxide (CO2) and photosynthetically active photon flux, as well as control mechanisms such as humidifiers, full-spectrum Light Emitting Diode (LED) lamps, mini split air conditioner, pumps, a Wi-Fi surveillance camera, remote monitoring via a web application and three Nutrient Film Technique (NFT) hydroponic systems with a capacity of ten plants each. An ATmega2560 microcontroller manages the smart system using the MODBUS RS-485 communication protocol. To validate the proper functionality of the proposed system, a case study was conducted using lettuce crops, in which the impact of different nutrient solution concentrations (50%, 75% and 100%) on the phenotypic development and nutritional content of the plants was evaluated. The results obtained from the cultivation experiment, analyzed through analysis of variance (ANOVA), show that the treatment with 75% nutrient concentration provides an appropriate balance between resource use and nutritional quality, without affecting the chlorophyll content. This system represents a scalable and replicable alternative for protected agriculture. Full article
(This article belongs to the Special Issue Smart Sensors and Devices: Recent Advances and Applications Volume II)
Show Figures

Figure 1

27 pages, 502 KiB  
Article
A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System
by Jing Wu, Zeteng Bian, Hongmin Gao and Yuzhe Wang
Sensors 2025, 25(15), 4854; https://doi.org/10.3390/s25154854 - 7 Aug 2025
Abstract
With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. [...] Read more.
With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. How to achieve fine-grained access control and privacy protection for massive devices while ensuring secure and reliable data circulation has become a key issue that needs to be urgently addressed in the current IoT field. To address the above challenges, this paper proposes a blockchain-based data transaction and privacy protection framework. First, the framework builds a multi-layer security architecture that integrates blockchain and IPFS and adapts to the “end–edge–cloud” collaborative characteristics of IoT. Secondly, a data sharing mechanism that takes into account both access control and interest balance is designed. On the one hand, the mechanism uses attribute-based encryption (ABE) technology to achieve dynamic and fine-grained access control for massive heterogeneous IoT devices; on the other hand, it introduces a game theory-driven dynamic pricing model to effectively balance the interests of both data supply and demand. Finally, in response to the needs of confidential analysis of IoT data, a secure computing scheme based on CKKS fully homomorphic encryption is proposed, which supports efficient statistical analysis of encrypted sensor data without leaking privacy. Security analysis and experimental results show that this scheme is secure under standard cryptographic assumptions and can effectively resist common attacks in the IoT environment. Prototype system testing verifies the functional completeness and performance feasibility of the scheme, providing a complete and effective technical solution to address the challenges of data integrity, verifiable transactions, and fine-grained access control, while mitigating the reliance on a trusted central authority in IoT data sharing. Full article
(This article belongs to the Special Issue Blockchain-Based Solutions to Secure IoT)
Show Figures

Figure 1

25 pages, 663 KiB  
Systematic Review
IoT Devices and Their Impact on Learning: A Systematic Review of Technological and Educational Affordances
by Dimitris Tsipianitis, Anastasia Misirli, Konstantinos Lavidas and Vassilis Komis
IoT 2025, 6(3), 45; https://doi.org/10.3390/iot6030045 - 7 Aug 2025
Abstract
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the [...] Read more.
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the educational and technological affordances of IoT applications in learning environments in secondary education. Our systematic review using the PRISMA method allowed us to extract 25 empirical studies from the last 10 years. We present the categorization of educational and technological affordances, as well as the devices used in these environments. Moreover, our findings indicate widespread adoption of organized educational activities and design-based learning, often incorporating tangible interfaces, smart objects, and IoT applications, which enhance student engagement and interaction. Additionally, we identify the impact of IoT-based learning on knowledge building, autonomous learning, student attitude, and motivation. The results suggest that the IoT can facilitate personalized and experiential learning, fostering a more immersive and adaptive educational experience. Based on these findings, we discuss key recommendations for educators, policymakers, and researchers, while also addressing this study’s limitations and potential directions for future research. Full article
Show Figures

Figure 1

3 pages, 125 KiB  
Editorial
Advances in the IoT and Smart Cities
by Christos Markides, Achilleas Achilleos and Georgia Kapitsaki
Appl. Sci. 2025, 15(15), 8723; https://doi.org/10.3390/app15158723 - 7 Aug 2025
Abstract
The proliferation of the Internet of Things (IoT) and the rise of smart cities are revolutionizing how societies operate and urban ecosystems are managed [...] Full article
(This article belongs to the Special Issue Advances in the IoT and Smart Cities)
39 pages, 938 KiB  
Article
A Survey of Data Security Sharing
by Dexin Zhu, Zhiqiang Zhou, Yuanbo Li, Huanjie Zhang, Yang Chen, Zilong Zhao and Jun Zheng
Symmetry 2025, 17(8), 1259; https://doi.org/10.3390/sym17081259 - 7 Aug 2025
Abstract
In the digital era, secure data sharing has become a core requirement for enabling cross-domain collaboration, cloud computing, and Internet of Things (IoT) applications, as well as a critical measure for safeguarding privacy and defending against malicious attacks. In light of the risks [...] Read more.
In the digital era, secure data sharing has become a core requirement for enabling cross-domain collaboration, cloud computing, and Internet of Things (IoT) applications, as well as a critical measure for safeguarding privacy and defending against malicious attacks. In light of the risks of data leakage and misuse in open environments, achieving efficient, controllable, and privacy-preserving data sharing has emerged as a key research focus. This paper first provides a systematic review of the prevailing secure data sharing technologies, including proxy re-encryption, searchable encryption, key agreement and distribution, and attribute-based encryption, summarizing their design principles and application features. Subsequently, game-theoretic modeling based on incentive theory is introduced to construct a strategic interaction framework between data owners and data users, aiming to analyze and optimize benefit allocation mechanisms. Furthermore, the paper explores the integration of game theory with secure sharing mechanisms to enhance the sustainability and stability of the data sharing ecosystem. Finally, it outlines the critical challenges currently faced in secure data sharing and discusses future research directions, offering theoretical insights and technical references for building a more comprehensive data sharing framework. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

23 pages, 1050 KiB  
Article
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li and Zheng Ju
Sensors 2025, 25(15), 4848; https://doi.org/10.3390/s25154848 - 6 Aug 2025
Abstract
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional [...] Read more.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns. Certificateless schemes effectively resolve both certificate management and key escrow problems but remain vulnerable to quantum computing threats. To address these limitations, this paper constructs an efficient post-quantum certificateless proxy re-signature scheme based on algebraic lattices. Building upon algebraic lattice theory and leveraging the Dilithium algorithm, our scheme innovatively employs a lattice basis reduction-assisted parameter selection strategy to mitigate the potential algebraic attack vectors inherent in the NTRU lattice structure. This ensures the security and integrity of multi-party communication in quantum-threat environments. Furthermore, the scheme significantly reduces computational overhead and optimizes signature storage complexity through structured compression techniques, facilitating deployment on resource-constrained devices like Internet of Things (IoT) terminals. We formally prove the unforgeability of the scheme under the adaptive chosen-message attack model, with its security reducible to the hardness of the corresponding underlying lattice problems. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

30 pages, 2141 KiB  
Article
Enhancing Efficiency in Sustainable IoT Enterprises: Modeling Indicators Using Pythagorean Fuzzy and Interval Grey Approaches
by Mimica R. Milošević, Miloš M. Nikolić, Dušan M. Milošević and Violeta Dimić
Sustainability 2025, 17(15), 7143; https://doi.org/10.3390/su17157143 - 6 Aug 2025
Abstract
“The Internet of Things” is a relatively new idea that refers to objects that can connect to the Internet and exchange data. The Internet of Things (IoT) enables novel interactions between objects and people by interconnecting billions of devices. While there are many [...] Read more.
“The Internet of Things” is a relatively new idea that refers to objects that can connect to the Internet and exchange data. The Internet of Things (IoT) enables novel interactions between objects and people by interconnecting billions of devices. While there are many IoT-related products, challenges pertaining to their effective implementation, particularly the lack of knowledge and confidence about security, must be addressed. To provide IoT-based enterprises with a platform for efficiency and sustainability, this study aims to identify the critical elements that influence the growth of a successful company integrated with an IoT system. This study proposes a decision support tool that evaluates the influential features of IoT using the Pythagorean Fuzzy and Interval Grey approaches within the Analytical Hierarchy Process (AHP). This study demonstrates that security, value, and connectivity are more critical than telepresence and intelligence indicators. When both strategies are used, market demand and information privacy become significant indicators. Applying the Pythagorean Fuzzy approach enables the identification of sensor networks, authorization, market demand, and data management in terms of importance. The application of the Interval Grey approach underscores the importance of data management, particularly in sensor networks. The indicators that were finally ranked are compared to obtain a good coefficient of agreement. These findings offer practical insights for promoting sustainability in enterprise operations by optimizing IoT infrastructure and decision-making processes. Full article
Show Figures

Figure 1

35 pages, 5296 KiB  
Article
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers
by Sheikh Abdul Wahab, Saira Sultana, Noshina Tariq, Maleeha Mujahid, Javed Ali Khan and Alexios Mylonas
Sensors 2025, 25(15), 4845; https://doi.org/10.3390/s25154845 - 6 Aug 2025
Abstract
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. In this paper, we present a Deep Learning (DL)-based Intrusion Detection System (IDS) tailored for IoT environments. Our system employs three architectures—Convolutional Neural Networks (CNNs), Deep Neural Networks (DNNs), and Transformer-based models—to perform binary, three-class, and 12-class classification tasks on the CiC IoT 2023 dataset. Data preprocessing includes log normalization to stabilize feature distributions and SMOTE-based oversampling to mitigate class imbalance. Experiments on the CIC-IoT 2023 dataset show that, in the binary classification task, the DNN achieved 99.2% accuracy, the CNN 99.0%, and the Transformer 98.8%. In three-class classification (benign, DDoS, and non-DDoS), all models attained near-perfect performance (approximately 99.9–100%). In the 12-class scenario (benign plus 12 attack types), the DNN, CNN, and Transformer reached 93.0%, 92.7%, and 92.5% accuracy, respectively. The high precision, recall, and ROC-AUC values corroborate the efficacy and generalizability of our approach for IoT DDoS detection. Comparative analysis indicates that our proposed IDS outperforms state-of-the-art methods in terms of detection accuracy and efficiency. These results underscore the potential of integrating advanced DL models into IDS frameworks, thereby providing a scalable and effective solution to secure IoT networks against evolving DDoS threats. Future work will explore further enhancements, including the use of deeper Transformer architectures and cross-dataset validation, to ensure robustness in real-world deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

20 pages, 1070 KiB  
Article
P2ESA: Privacy-Preserving Environmental Sensor-Based Authentication
by Andraž Krašovec, Gianmarco Baldini and Veljko Pejović
Sensors 2025, 25(15), 4842; https://doi.org/10.3390/s25154842 - 6 Aug 2025
Abstract
The presence of Internet of Things (IoT) devices in modern working and living environments is growing rapidly. The data collected in such environments enable us to model users’ behaviour and consequently identify and authenticate them. However, these data may contain information about the [...] Read more.
The presence of Internet of Things (IoT) devices in modern working and living environments is growing rapidly. The data collected in such environments enable us to model users’ behaviour and consequently identify and authenticate them. However, these data may contain information about the user’s current activity, emotional state, or other aspects that are not relevant for authentication. In this work, we employ adversarial deep learning techniques to remove privacy-revealing information from the data while keeping the authentication performance levels almost intact. Furthermore, we develop and apply various techniques to offload the computationally weak edge devices that are part of the machine learning pipeline at training and inference time. Our experiments, conducted on two multimodal IoT datasets, show that P2ESA can be efficiently deployed and trained, and with user identification rates of between 75.85% and 93.31% (c.f. 6.67% baseline), can represent a promising support solution for authentication, while simultaneously fully obfuscating sensitive information. Full article
Show Figures

Figure 1

29 pages, 2960 KiB  
Article
(H-DIR)2: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers
by Davide Tosi and Roberto Pazzi
Sensors 2025, 25(15), 4841; https://doi.org/10.3390/s25154841 - 6 Aug 2025
Abstract
Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H-DIR)2, a hybrid entropy-based framework designed to detect and mitigate [...] Read more.
Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H-DIR)2, a hybrid entropy-based framework designed to detect and mitigate anomalies in large-scale heterogeneous networks. The framework combines Shannon entropy analysis with Associated Random Neural Networks (ARNNs) and integrates semantic reasoning through RDF/SPARQL, all embedded within a distributed Apache Spark 3.5.0 pipeline. We validate (H-DIR)2 across three critical attack scenarios—SYN Flood (TCP), DAO-DIO (RPL), and NTP amplification (UDP)—using real-world datasets. The system achieves a mean detection latency of 247 ms and an AUC of 0.978 for SYN floods. For DAO-DIO manipulations, it increases the packet delivery ratio from 81.2% to 96.4% (p < 0.01), and for NTP amplification, it reduces the peak load by 88%. The framework achieves vertical scalability across millions of endpoints and horizontal scalability on datasets exceeding 10 TB. All code, datasets, and Docker images are provided to ensure full reproducibility. By coupling adaptive neural inference with semantic explainability, (H-DIR)2 offers a transparent and scalable solution for cloud–IoT cybersecurity, establishing a robust baseline for future developments in edge-aware and zero-day threat detection. Full article
(This article belongs to the Special Issue Privacy and Cybersecurity in IoT-Based Applications)
Show Figures

Figure 1

17 pages, 665 KiB  
Article
Optimization of Delay Time in ZigBee Sensor Networks for Smart Home Systems Using a Smart-Adaptive Communication Distribution Algorithm
by Igor Medenica, Miloš Jovanović, Jelena Vasiljević, Nikola Radulović and Dragan Lazić
Electronics 2025, 14(15), 3127; https://doi.org/10.3390/electronics14153127 - 6 Aug 2025
Abstract
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. [...] Read more.
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. This study focuses on optimizing delay time in ZigBee sensor networks used in smart-home systems. A Smart–Adaptive Communication Distribution Algorithm is proposed, which dynamically adjusts the communication between network nodes based on real-time network conditions. Experimental measurements were conducted under various scenarios to evaluate the performance of the proposed algorithm, with a particular focus on reducing delay and enhancing overall network efficiency. The results demonstrate that the proposed algorithm significantly reduces delay times compared to traditional methods, making it a promising solution for delay-sensitive IoT applications. Furthermore, the findings highlight the importance of adaptive communication strategies in improving the performance of ZigBee-based sensor networks. Full article
(This article belongs to the Special Issue Energy-Efficient Wireless Sensor Networks for IoT Applications)
Show Figures

Figure 1

24 pages, 2345 KiB  
Article
Towards Intelligent 5G Infrastructures: Performance Evaluation of a Novel SDN-Enabled VANET Framework
by Abiola Ifaloye, Haifa Takruri and Rabab Al-Zaidi
Network 2025, 5(3), 28; https://doi.org/10.3390/network5030028 - 5 Aug 2025
Abstract
Critical Internet of Things (IoT) data in Fifth Generation Vehicular Ad Hoc Networks (5G VANETs) demands Ultra-Reliable Low-Latency Communication (URLLC) to support mission-critical vehicular applications such as autonomous driving and collision avoidance. Achieving the stringent Quality of Service (QoS) requirements for these applications [...] Read more.
Critical Internet of Things (IoT) data in Fifth Generation Vehicular Ad Hoc Networks (5G VANETs) demands Ultra-Reliable Low-Latency Communication (URLLC) to support mission-critical vehicular applications such as autonomous driving and collision avoidance. Achieving the stringent Quality of Service (QoS) requirements for these applications remains a significant challenge. This paper proposes a novel framework integrating Software-Defined Networking (SDN) and Network Functions Virtualisation (NFV) as embedded functionalities in connected vehicles. A lightweight SDN Controller model, implemented via vehicle on-board computing resources, optimised QoS for communications between connected vehicles and the Next-Generation Node B (gNB), achieving a consistent packet delivery rate of 100%, compared to 81–96% for existing solutions leveraging SDN. Furthermore, a Software-Defined Wide-Area Network (SD-WAN) model deployed at the gNB enabled the efficient management of data, network, identity, and server access. Performance evaluations indicate that SDN and NFV are reliable and scalable technologies for virtualised and distributed 5G VANET infrastructures. Our SDN-based in-vehicle traffic classification model for dynamic resource allocation achieved 100% accuracy, outperforming existing Artificial Intelligence (AI)-based methods with 88–99% accuracy. In addition, a significant increase of 187% in flow rates over time highlights the framework’s decreasing latency, adaptability, and scalability in supporting URLLC class guarantees for critical vehicular services. Full article
Back to TopTop