Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,901)

Search Parameters:
Keywords = internet services

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
35 pages, 4226 KB  
Article
Semantic Agent-Based Intelligent Digital Twins Integrating Demand, Production and Product Through Asset Administration Shells
by Joel Lehmann, Tim Markus Häußermann and Julian Reichwald
Big Data Cogn. Comput. 2026, 10(4), 103; https://doi.org/10.3390/bdcc10040103 - 26 Mar 2026
Abstract
Complex products and production processes are intertwined and demand expressive, lifecycle-wide digital representations. The Asset Administration Shell emerged as a standard for Digital Twins (DTs), structuring heterogeneous data across cloud-based Industrial Internet of Things (IIoT) infrastructures. However, today’s deployments predominantly realize passive or [...] Read more.
Complex products and production processes are intertwined and demand expressive, lifecycle-wide digital representations. The Asset Administration Shell emerged as a standard for Digital Twins (DTs), structuring heterogeneous data across cloud-based Industrial Internet of Things (IIoT) infrastructures. However, today’s deployments predominantly realize passive or reactive DTs, while intelligent behavior remains underexploited. This paper addresses this gap, proposing an end-to-end architecture operationalizing the DT Reference Model through the integration of machine-interpretable granulated industrial skills, which are semantically accumulated into a knowledge graph enabling discovery and reasoning, while a multi-agent system provides autonomous, utility-based negotiation via machine-to-machine interactions within a federated marketplace. The approach is applied in a real smart manufacturing demonstrator, combining order processes, production orchestration, and lifecycle documentation into a unified execution pipeline spanning IIoT-connected shopfloor assets and cloud-based services. Quantitative experiments evaluating negotiation latency, renegotiation robustness, and utility variation demonstrate stable, predictable behavior even under concurrent demand and failure scenarios. The architecture lays a foundation for interoperable, sovereign collaboration across value chains to realize shared production. The results underline the effectiveness of the tightly coupled enabler technologies realizing proactive, reconfigurable, and semantically enriched intelligent DTs. Full article
32 pages, 2837 KB  
Review
Improving Information Communication in Emerging 6G Scenarios: A Review of Semantic Communications for the Future Internet
by Evelio Astaiza Hoyos, Héctor Fabio Bermúdez-Orozco and Nasly Cristina Rodriguez-Idrobo
Future Internet 2026, 18(4), 179; https://doi.org/10.3390/fi18040179 (registering DOI) - 25 Mar 2026
Abstract
The evolution of future Internet and sixth-generation (6G) networks is driving a paradigm shift from classical bit-centric communication toward meaning-aware and task-oriented communication models. Traditional information theory, while fundamental for ensuring reliable symbol transmission, does not account for semantic relevance or task effectiveness, [...] Read more.
The evolution of future Internet and sixth-generation (6G) networks is driving a paradigm shift from classical bit-centric communication toward meaning-aware and task-oriented communication models. Traditional information theory, while fundamental for ensuring reliable symbol transmission, does not account for semantic relevance or task effectiveness, which are critical for emerging applications such as autonomous systems, immersive services, and ultra-low-latency communications. This article presents a comprehensive review of Semantic Communications (SemCom) from a future Internet perspective. The review systematically analyses representative extensions of classical information theory aimed at quantifying semantic information, including semantic information measures, semantic channel capacity, and semantic rate–distortion formulations. In addition, the main mathematical and computational frameworks enabling practical semantic communication systems are examined, including the Information Bottleneck principle, learning-based end-to-end communication architectures, and reinforcement learning approaches for task-oriented optimization under network constraints. The review further discusses the role of semantic metrics, contextual modelling, and task-driven performance evaluation in the design of semantic-aware communication systems. The analysis identifies key open challenges, particularly the lack of a unified theoretical framework, the need for robust and context-aware semantic performance metrics, and the integration of semantic awareness into network-level design. Overall, this review highlights Semantic Communications as a promising paradigm for future Internet and 6G networks, where communication efficiency is increasingly determined by semantic relevance and task effectiveness rather than bit-level fidelity alone. Full article
Show Figures

Graphical abstract

26 pages, 791 KB  
Article
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT
by He Yan, Zhenyu Wang, Liuming Lin, Jing Sun and Shuanggen Liu
Sensors 2026, 26(7), 2021; https://doi.org/10.3390/s26072021 - 24 Mar 2026
Viewed by 236
Abstract
The Medical Internet of Things (MIoT) has promoted smart healthcare through the deep integration of wearable devices, wireless communication, and cloud services. However, this framework faces security risks, as attackers may exploit public channels to impersonate legitimate devices or services and steal sensitive [...] Read more.
The Medical Internet of Things (MIoT) has promoted smart healthcare through the deep integration of wearable devices, wireless communication, and cloud services. However, this framework faces security risks, as attackers may exploit public channels to impersonate legitimate devices or services and steal sensitive data. Therefore, establishing authentication between wearable devices and servers prior to data transmission is crucial. Existing schemes suffer from two critical drawbacks: vulnerability to quantum attacks and excessively high communication overhead, highlighting the need for improved solutions. The authors of this paper present a multi-factor identity authentication protocol to achieve post-quantum security and privacy protection. The scheme integrates lattice-based Kyber key encapsulation and a fuzzy commitment mechanism to secure biological templates and enable post-quantum key agreement. Additionally, hash functions and lightweight error correction codes are employed to reduce terminal communication overhead. The security of the scheme is rigorously proved in the Real-or-Random model, and the analysis confirms that the scheme satisfies common security requirements for wireless networks. The proposed scheme is also compared with existing schemes, and the results demonstrate that it achieves a balance between security and overhead. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in Internet of Things (IoT))
Show Figures

Figure 1

35 pages, 710 KB  
Review
AI Agent Communications in the Future Internet—Paving a Path Toward the Agentic Web
by Qiang Duan and Zhihui Lu
Future Internet 2026, 18(3), 171; https://doi.org/10.3390/fi18030171 - 21 Mar 2026
Viewed by 263
Abstract
The rapid evolution of artificial intelligence technologies toward the agentic AI paradigm enables the emergence of the Agentic Web in the future Internet. Agent communication plays a critical role in constructing the Agentic Web but faces unique challenges posed by the edge–network–cloud continuum [...] Read more.
The rapid evolution of artificial intelligence technologies toward the agentic AI paradigm enables the emergence of the Agentic Web in the future Internet. Agent communication plays a critical role in constructing the Agentic Web but faces unique challenges posed by the edge–network–cloud continuum in the future Internet. This paper provides a comprehensive overview of state-of-the-art agent communication protocols and technologies, evaluating their readiness to support the construction of the Agentic Web. We first survey representative communication protocols and analyze the key technologies they employ, assessing their effectiveness in addressing the challenges for agent communications in the future Internet. We then identify critical gaps between existing approaches and the requirements of the Agentic Web, and propose a unified architectural framework grounded in virtualization and service-oriented principles to address these gaps. Such a framework may greatly facilitate the development of a pluralistic ecosystem in which various agent communication technologies and protocols can be freely developed and fully utilized. We also discuss open topics and possible directions for future research toward a fully realized Agentic Web. Full article
Show Figures

Graphical abstract

14 pages, 492 KB  
Article
Web-Based Psycho-Emotional Support Platform for Women Affected by the COVID-19 Pandemic: A Pilot Study
by Ana Leticia Becerra-Gálvez, Erick Alberto Medina Jiménez, Alejandro Pérez-Ortiz, América Genevra Franco Moreno, Sandra Angélica Anguiano Serrano, César Augusto de León Ricardi and Gabriela Ordaz Villegas
Women 2026, 6(1), 22; https://doi.org/10.3390/women6010022 - 20 Mar 2026
Viewed by 167
Abstract
During the COVID-19 pandemic, women have had to face different psychosocial problems. For this reason, psychoeducational interventions based on web-based resources have been developed to address their mental health. This study aimed to evaluate the pilot of a psycho-emotional support web platform based [...] Read more.
During the COVID-19 pandemic, women have had to face different psychosocial problems. For this reason, psychoeducational interventions based on web-based resources have been developed to address their mental health. This study aimed to evaluate the pilot of a psycho-emotional support web platform based on elements of cognitive-behavioural therapy in Mexican women during the COVID-19 pandemic. Through a pre-experimental design with pre-test and post-test evaluations, 73 women between 18 and 68 years old (M = 43.42 years, SD = 12.40) had access to this platform for one month, which contained four thematic modules (stress, anxiety, depression and violence). They also received two complementary three-hour synchronous sessions. All participants reported similar levels of emotional symptoms (p > 0.05), as well as perceiving violence exerted by their partners (p > 0.05). The web platform and its psychoeducational content turned out to be quality informative resources; however, no statistically significant changes were observed in the psychological variables in question. Web platforms and emotional support applications should be developed according to the needs and characteristics of the population for which they are designed; this will promote greater satisfaction and reduce therapeutic abandonment. Full article
Show Figures

Figure 1

30 pages, 663 KB  
Article
Quantum Secure Pairwise Key Agreement Scheme for Fog-Enabled Social Internet of Vehicles
by Hyewon Park and Yohan Park
Mathematics 2026, 14(6), 1046; https://doi.org/10.3390/math14061046 - 19 Mar 2026
Viewed by 128
Abstract
In Social Internet of Vehicles (SIoV) environments, fog computing plays a crucial role in supporting real-time services by reducing the latency inherent in cloud-based architectures. However, fog nodes are typically deployed in physically exposed roadside environments and can be operated by several system [...] Read more.
In Social Internet of Vehicles (SIoV) environments, fog computing plays a crucial role in supporting real-time services by reducing the latency inherent in cloud-based architectures. However, fog nodes are typically deployed in physically exposed roadside environments and can be operated by several system operators, making them vulnerable to physical compromise and unauthorized access. Despite these threats, many existing authentication schemes assume fog nodes to be fully trusted or honest-but-curious, allowing them to decrypt transmitted data using a session key shared among vehicles, fog nodes, and cloud servers. To overcome these limitations, this paper proposes a quantum-secure pairwise key agreement scheme that establishes distinct session keys for vehicle–fog, fog–cloud, and vehicle–cloud communications. This design effectively prevents the disclosure of sensitive information even in the event of fog node compromise. Furthermore, Physical Unclonable Functions (PUFs) are employed to mitigate physical capture attacks, while lattice-based cryptography based on the Module Learning with Errors (MLWE) problem is integrated to ensure resistance against quantum computing attacks. The security of the proposed protocol is rigorously validated through formal analysis using AVISPA, BAN logic, and the Real-or-Random (RoR) model, in addition to informal security analysis. Comparative performance evaluations against related schemes demonstrate that the proposed approach achieves a balance between efficiency and security, making it well suited for practical deployment in SIoV environments. Full article
(This article belongs to the Special Issue Cryptography, Data Security, and Cloud Computing)
Show Figures

Figure 1

18 pages, 1430 KB  
Article
Multi-Layer Traffic Analysis Framework for DDoS Attacks in Software-Defined IoT Networks
by Keerthana Balaji and Mamatha Balachandra
Future Internet 2026, 18(3), 164; https://doi.org/10.3390/fi18030164 - 19 Mar 2026
Viewed by 128
Abstract
The data plane and the control plane are targets for Distributed Denial of Service (DDoS) attacks in the Software-Defined Internet of Things (SDIoT). Currently available studies rely on observations from a single network layer which limits the cross-layer attack analysis. This paper presents [...] Read more.
The data plane and the control plane are targets for Distributed Denial of Service (DDoS) attacks in the Software-Defined Internet of Things (SDIoT). Currently available studies rely on observations from a single network layer which limits the cross-layer attack analysis. This paper presents a synchronized, phase-aware, and a multi-layer traffic collection framework mimicking SDIoT environments under diverse DDoS attack scenarios. The data collected are the metrics captured at host, switch, and controller layers during normal, attack, and post-attack phases with strict temporal alignment. For capturing diverse DDoS attack behaviors in SDIoT environments, representative data plane attacks including volumetric flooding and switch-level flow table saturation were used. Control plane level attack targeting the SDN controller was implemented. The evaluation was done using a Mininet-based SDIoT testbed with a POX controller. Each scenario is executed across five independent runs with statistical validation. The proposed framework enables reproducible and time-aligned multi-layer analysis through standardized orchestration and automated logging. Results indicate that SDIoT DDoS behavior demonstrates differently across traffic, state, and resource-level metrics, and that accurate characterization benefits from temporally aligned multi-layer monitoring rather than relying solely on packet rate analysis. Full article
(This article belongs to the Special Issue Cybersecurity, Privacy, and Trust in Intelligent Networked Systems)
Show Figures

Figure 1

43 pages, 6922 KB  
Article
Multi-Flow Hybrid Task Offloading Scheme for Multimodal High-Load V2I Services
by Weiqi Luo, Yaqi Hu, Maoqiang Wu, Yijie Zhou, Rong Yu and Junbin Qin
Electronics 2026, 15(6), 1229; https://doi.org/10.3390/electronics15061229 - 16 Mar 2026
Viewed by 334
Abstract
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this [...] Read more.
In the Internet of Vehicles (IoV), connected vehicles generate high-load perception tasks with large-scale and multimodal sensitive data, imposing strict requirements on latency, computing, and privacy. Existing solutions still suffer from high task service latency and privacy risks. To address these issues, this paper proposes an integrated framework that jointly considers multi-flow task offloading, adaptive privacy preservation, and latency-aware resource incentive mechanism. Specifically, we propose a Location-Aware and Trust-based (LA-Trust) dual-node task offloading algorithm based on deep reinforcement learning (DRL), which treats pre-partitioned subtasks as multiple parallel flows and enables flow-level collaborative offloading optimization across neighboring nodes, allows subtask data uploading and processing to proceed concurrently, and incorporates node security into decision making. To further enhance privacy protection, a Distribution-Aware Local Differential Privacy (DA-LDP) algorithm is designed to adaptively inject artificial noise according to data heterogeneity, balancing privacy protection and task execution accuracy. In addition, a Delay-Cost Reverse Auction (DC-RA) algorithm is proposed to further reduce latency by introducing wireless channel modeling between idle vehicles and edge nodes into the incentive mechanism. Experimental results show that the proposed framework improves task execution accuracy by 38% and reduces offloading cost, delay, incentive cost, and auction communication latency by 64.41%, 64.64%, 19%, and 44%, respectively, while more than 60% of tasks are offloaded to high-trust nodes. Full article
Show Figures

Figure 1

17 pages, 3079 KB  
Article
AgroNova: An Autonomous IoT Platform for Greenhouse Climate Control
by Borislav Toskov and Asya Toskova
Sensors 2026, 26(6), 1861; https://doi.org/10.3390/s26061861 - 15 Mar 2026
Viewed by 304
Abstract
This study presents AgroNova—a hybrid IoT architecture for autonomous monitoring and management of microclimate in greenhouse environments. The system combines a capillary wireless sensor network, gateway-level rule-based agents, a server agent, cloud services and an advisory component based on a large language model [...] Read more.
This study presents AgroNova—a hybrid IoT architecture for autonomous monitoring and management of microclimate in greenhouse environments. The system combines a capillary wireless sensor network, gateway-level rule-based agents, a server agent, cloud services and an advisory component based on a large language model (LLM) that supports local decision-making by incorporating external contextual information from meteorological services. The proposed architecture was validated through a seven-month deployment in an unheated tomato greenhouse, during which more than 380,000 environmental measurements were collected from five sensor nodes. The system operated continuously under real agricultural conditions, including during temporary internet connectivity interruptions, due to the autonomous gateway-level control and deterministic fallback mechanisms. The analysis of the collected data includes 3110 environmental threshold exceedance events, in which recovery dynamics, reaction latency, and actuator activation frequency were evaluated. The results show that the architecture supports stable autonomous operation under limited actuation conditions, with an average local reaction latency of less than 1 s, while physical actuator operations occur in approximately 2.3% of all control decisions. This behavior reflects a conservative control strategy that limits unnecessary mechanical operations and contributes to stable system operation. The experimental integration of a consultative LLM module within the server-side agent demonstrates the potential for context-enriched decision support using external meteorological data, while final control decisions remain under the authority of the gateway-based deterministic control mechanism. The main contribution of this study is the demonstration of a hybrid IoT architecture that combines edge-level autonomy with context-assisted reasoning, validated through deployment in a real greenhouse environment. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

26 pages, 755 KB  
Article
A Stage-Wise Framework Using Class-Incremental Learning for Unknown DoS Attack Detection
by Juncheng Ge, Yaokai Feng and Kouichi Sakurai
Future Internet 2026, 18(3), 145; https://doi.org/10.3390/fi18030145 - 12 Mar 2026
Viewed by 229
Abstract
Denial-of-Service (DoS) attacks remain one of the most dangerous threats in modern Internet environments. They aim to overwhelm networks, servers, or online services with massive volumes of traffic, and maintaining service availability is a core pillar of cybersecurity. More importantly, DoS attack techniques [...] Read more.
Denial-of-Service (DoS) attacks remain one of the most dangerous threats in modern Internet environments. They aim to overwhelm networks, servers, or online services with massive volumes of traffic, and maintaining service availability is a core pillar of cybersecurity. More importantly, DoS attack techniques continue to evolve. However, traditional intrusion detection systems (IDS) trained on fixed attack categories struggle to identify previously unknown DoS attack types and cannot dynamically incorporate newly emerging classes. To address this challenge, this study proposes a stage-wise network intrusion detection framework that integrates unknown attack detection, attack discovery, and class-incremental learning into a unified pipeline. The framework consists of three stages. First, an autoencoder-based anomaly detection approach is used to separate potential unknown DoS attack samples from known classes. Second, a clustering-and-merging strategy is applied to the detected unknown DoS samples to discover emerging attack clusters with similar structural characteristics. Third, the classifier architecture is expanded for each newly discovered cluster through a class-incremental learning mechanism, enabling the continual incorporation of new attack classes while maintaining stable detection performance on previously learned classes. Experimental results on the DoS category of the NSL-KDD dataset demonstrate that the proposed stage-wise framework can effectively isolate samples of unknown DoS attacks, accurately aggregate emerging attack clusters, and incrementally integrate newly discovered attack classes without significantly degrading recognition performance on previously learned classes. These results confirm the capability of the proposed framework to handle progressively emerging unknown DoS attacks. Full article
Show Figures

Graphical abstract

25 pages, 3570 KB  
Article
A Context-Aware Flood Warning Framework Integrating Ensemble Learning and LLMs
by Adnan Ahmed Abi Sen, Fares Hamad Aljohani, Nour Mahmoud Bahbouh, Adel Ben Mnaouer, Omar Tayan and Ahmad. B. Alkhodre
GeoHazards 2026, 7(1), 35; https://doi.org/10.3390/geohazards7010035 - 11 Mar 2026
Viewed by 286
Abstract
Smart cities require effective disaster management (like flooding, solar storms, sandstorms, or hurricanes), as it directly impacts people’s lives. The key challenges of disaster management are timely detection and effective notification during the crisis. This research presents a smart multi-layer framework for notification [...] Read more.
Smart cities require effective disaster management (like flooding, solar storms, sandstorms, or hurricanes), as it directly impacts people’s lives. The key challenges of disaster management are timely detection and effective notification during the crisis. This research presents a smart multi-layer framework for notification classification and management before and during flooding disasters. The framework includes an early detection module as the main phase in the alerting process. This step depends on an Ensemble Learning (EL) model based on a triad of the three best selected models (Deep Learning (DL), Random Forest (RF), and K-nearest Neighbor (KNN)) to analyze data collected continuously from the Internet of Things (IoT) layer. In the boosting phase, the framework utilizes Large Language Models (LLMs) with DL to analyze social textual crowdsourcing data. The results will enable the framework to identify the most affected areas during a flood. The framework adds a fog computing layer alongside a cloud layer to enable instantaneous processing of user responses and generate specialized alerts based on contextual factors such as location, time, risk level, alert type, and user characteristics. Through testing and implementation, the proposed algorithms demonstrated an accuracy rate of over 98% in detecting threats using a dataset of real, collected weather and flooding data. Additionally, the framework proposes a centralized control panel and a design of a smartphone application that offers essential services and facilitates communication among managed civil defense teams, citizens, and volunteers. Full article
Show Figures

Figure 1

20 pages, 2861 KB  
Article
Scenario-Based Simulation Modeling for Performance and Efficiency Improvement in an Ultrasonography Department
by İlkay Saraçoğlu
Healthcare 2026, 14(6), 709; https://doi.org/10.3390/healthcare14060709 - 10 Mar 2026
Viewed by 267
Abstract
Background/Objectives: Hospitals prioritize effective resource allocation and patient satisfaction as key performance indicators. Improving the performance of the ultrasonography department remains a major challenge for hospital management due to the inherently unplanned and stochastic nature of its operations. Arrival patterns vary throughout [...] Read more.
Background/Objectives: Hospitals prioritize effective resource allocation and patient satisfaction as key performance indicators. Improving the performance of the ultrasonography department remains a major challenge for hospital management due to the inherently unplanned and stochastic nature of its operations. Arrival patterns vary throughout the day, and examination durations differ depending on patients’ clinical pathways and examination types. This study focuses on the ultrasonography department of a private healthcare facility located in one of the most densely populated regions of Istanbul. The primary objective of this study was to improve departmental performance in terms of average waiting time, total time spent in the system, and resource utilization. Methods: To address the variability in patient arrivals and service times across different ultrasonography procedures, a simulation-based optimization approach was employed. Current system performance was evaluated, and multiple alternative operational scenarios were developed and simulated. In addition, the potential impact of Internet of Things applications on the performance of the ultrasonography department was investigated by incorporating alternative system configurations into the simulation model. Results: The simulation results enabled a comparative evaluation of alternative scenarios based on key performance indicators. The findings demonstrate that optimized system configurations can significantly reduce patient waiting times and total system time while improving resource utilization. The inclusion of Internet of Things applications further contributed to performance improvements in the selected scenarios. Conclusions: The proposed simulation-based approach provides a systematic decision-support framework for evaluating alternative operational scenarios in ultrasonography departments. By optimizing resource allocation and leveraging Internet of Things applications, hospital managers can improve operational efficiency and patient satisfaction. The results highlight the value of data-driven decision-making in managing complex and stochastic healthcare systems. Full article
(This article belongs to the Section Healthcare Organizations, Systems, and Providers)
Show Figures

Figure 1

17 pages, 21262 KB  
Article
On the Effect of the Time Step in Discrete-Time Framework Analysis
by Mario E. Rivero-Ángeles, Izlian. Y. Orea-Flores, Iclia Villordo Jiménez and Yesenia E. Gonzalez-Navarro
Telecom 2026, 7(2), 30; https://doi.org/10.3390/telecom7020030 - 10 Mar 2026
Viewed by 159
Abstract
In classic communication systems, signals and data were mostly continuous in time, such as voice (fixed and mobile telephony, and radio systems) and video signals (Television services), Conversely, in modern communication systems, most signals are packet-based (text and images in messaging services and [...] Read more.
In classic communication systems, signals and data were mostly continuous in time, such as voice (fixed and mobile telephony, and radio systems) and video signals (Television services), Conversely, in modern communication systems, most signals are packet-based (text and images in messaging services and social media) and even continuous-time data has to be converted into a discrete-time nature data, such as video and voice services that are now discretized to be sent in packet-based communication systems. However, these classic communication systems were analyzed, studied, and designed using continuous-time analysis, such as the classic Erlang-B formula. This classic analysis can still be used in modern systems, but a discrete-based framework provides a seamless analysis and yields more accurate results. In this work, the effect of the system’s elementary time step is analyzed, and guidelines for its selection are provided to adequately analyze continuous-time systems within a discrete-time framework. To demonstrate the utility of the discretization and to consider these guidelines, we developed a mathematical analysis based on a discrete-time Markov chain to study a system with a buffer capacity under conventional and bursty traffic, which is commonly found in an Internet of Things application. The derived formulas allow us to quantify system performance under a discrete framework. This, in turn, allows us to provide some relevant guidelines for the elementary time step selection to adequately analyze continuous-time systems under a discrete-time framework. Full article
Show Figures

Figure 1

30 pages, 2010 KB  
Article
On the Convergence of Internet of Things and Decentralized Finance: Security Challenges and Future Directions
by Prasannakumaran Sarasijanayanan, Nithya Nedungadi and Sriram Sankaran
Sensors 2026, 26(6), 1740; https://doi.org/10.3390/s26061740 - 10 Mar 2026
Viewed by 418
Abstract
The rapid convergence of the Internet of Things (IoT) and decentralized finance (DeFi) is reshaping the digital economy by enabling autonomous, trustless, and value-driven interactions among connected devices. This paper provides a comprehensive survey of the emerging paradigm that combines IoT’s pervasive sensing [...] Read more.
The rapid convergence of the Internet of Things (IoT) and decentralized finance (DeFi) is reshaping the digital economy by enabling autonomous, trustless, and value-driven interactions among connected devices. This paper provides a comprehensive survey of the emerging paradigm that combines IoT’s pervasive sensing and communication capabilities with DeFi’s programmable financial infrastructure. We first discuss the motivation behind this convergence and explore key opportunities, including autonomous machine-to-machine (M2M) payments, decentralized data marketplaces, and trustless IoT service provisioning. Despite its potential, IoT–DeFi integration introduces significant security and privacy challenges related to smart contract vulnerabilities, consensus protocol risks, oracle manipulation, and constrained device capabilities. We review existing mitigation approaches such as lightweight cryptography, secure contract design, and decentralized identity management, and critically assess their limitations in heterogeneous, resource-limited environments. Building on this analysis, identify research gaps and propose future directions emphasizing formal verification of IoT-integrated smart contracts, robust oracle design, interoperability frameworks, and privacy-preserving trust models. This survey systematically maps opportunities, threats, and open issues. In doing so, it guides researchers and practitioners toward building secure, scalable, and energy-efficient IoT–DeFi ecosystems for next-generation decentralized applications. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Graphical abstract

27 pages, 566 KB  
Article
Digital Twins at the Edge: A High-Availability Framework for Resilient Data Processing in IoT Sensor Networks
by Madalin Neagu, Codruta Maria Serban, Anca Hangan and Gheorghe Sebestyen
Future Internet 2026, 18(3), 137; https://doi.org/10.3390/fi18030137 - 6 Mar 2026
Viewed by 393
Abstract
The expansion of Internet-of-Things deployments at the network edge challenges service continuity, as single points of failure can interrupt critical data-processing pipelines. This paper introduces the Operational Digital Twin (ODT) —a live, state-synchronized standby system designed for node-level failover in resource-constrained edge environments. [...] Read more.
The expansion of Internet-of-Things deployments at the network edge challenges service continuity, as single points of failure can interrupt critical data-processing pipelines. This paper introduces the Operational Digital Twin (ODT) —a live, state-synchronized standby system designed for node-level failover in resource-constrained edge environments. In contrast to Digital Twins designed for modeling and analysis, an ODT is designed for operational continuity, standing ready to assume control when the primary node fails. We instantiate this concept through a self-configuring, high-availability architecture that implements the ODT for node-level redundancy. To ground this new conceptual category empirically, we define and validate four measurable criteria for ODT fidelity—state fidelity, synchronization timeliness, behavioral mirroring, and failover validation—establishing a framework that extends beyond passive replication. The design adopts a primary–secondary model with automated node discovery, configuration mirroring, and Virtual IP-based failover. Fault-injection experiments demonstrate low failover latency, prompt service restoration, limited message loss during transitions, and minimal resource overhead. These findings demonstrate that the proposed Operational Digital Twin mechanism reduces single points of failure and provides a lightweight, cost-efficient approach to sustaining reliable data processing in distributed edge environments. Full article
(This article belongs to the Special Issue IoT Architecture Supported by Digital Twin: Challenges and Solutions)
Show Figures

Graphical abstract

Back to TopTop