Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal on Internet of Things (IoT) published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions
- High Visibility: indexed within ESCI (Web of Science), Scopus, EBSCO, and other databases.
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 27.8 days after submission; acceptance to publication is undertaken in 4.8 days (median values for papers published in this journal in the second half of 2024).
- Journal Rank: CiteScore - Q1 (Computer Science (miscellaneous))
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
Latest Articles
Blockchain-Based Mobile IoT System with Configurable Sensor Modules
IoT 2025, 6(2), 25; https://doi.org/10.3390/iot6020025 - 22 Apr 2025
Abstract
In this study, a Multi-Sensor IoT Device (MSID) is developed that is designed to collect various environmental data and interconnect with the cloud and blockchain to ensure reliable data management. The MSID is designed with a flexible, modular structure that supports a variety
[...] Read more.
In this study, a Multi-Sensor IoT Device (MSID) is developed that is designed to collect various environmental data and interconnect with the cloud and blockchain to ensure reliable data management. The MSID is designed with a flexible, modular structure that supports a variety of sensor configurations and is easily expandable with 3D-printed components. The system performance was monitored in real-time, with a high cloud upload success rate of 98.35% and an average transmission delay of only 0.64 s, confirming stable data collection every minute. Blockchain-based sensor data storage ensured data integrity and tamper-proofness, with all transactions successfully recorded and verified via smart contract. The proposed Blockchain-based Mobile IoT System (BMIS) has shown strong potential for use in environmental monitoring, industrial asset management, and other areas that require reliable data collection and long-term preservation.
Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
►
Show Figures
Open AccessArticle
Optimizing Customer Experience by Exploiting Real-Time Data Generated by IoT and Leveraging Distributed Web Systems in CRM Systems
by
Marian Ileana, Pavel Petrov and Vassil Milev
IoT 2025, 6(2), 24; https://doi.org/10.3390/iot6020024 - 21 Apr 2025
Abstract
►▼
Show Figures
Integrating smart devices from the Internet of Things (IoT) with Customer Relationship Management (CRM) systems presents significant opportunities for enhancing customer experience through real-time data utilization. This article explores the technological frameworks and practical solutions for achieving seamless integration of IoT data within
[...] Read more.
Integrating smart devices from the Internet of Things (IoT) with Customer Relationship Management (CRM) systems presents significant opportunities for enhancing customer experience through real-time data utilization. This article explores the technological frameworks and practical solutions for achieving seamless integration of IoT data within CRM platforms. By leveraging distributed Web systems, this study demonstrates how companies can improve scalability, responsiveness, and personalization in managing customer relationships. This paper outlines key architectural designs for distributed Web systems that ensure efficient real-time data processing while addressing challenges such as security, system integration, and the demands of analytics. This research provides insights into overcoming these challenges with strategies like load balancing, edge processing, and advanced encryption protocols. Results from simulations and practical implementations underscore the effectiveness of these approaches in optimizing operational efficiency and delivering hyper-personalized customer experiences. This study aims to bridge the gap between theoretical possibilities and real-world applications, offering actionable guidelines for organizations to fully leverage IoT-driven CRM systems.
Full article

Figure 1
Open AccessReview
A Lightweight Encryption Method for IoT-Based Healthcare Applications: A Review and Future Prospects
by
Omar Sabri, Bassam Al-Shargabi, Abdelrahman Abuarqoub and Tahani Ali Hakami
IoT 2025, 6(2), 23; https://doi.org/10.3390/iot6020023 - 20 Apr 2025
Abstract
The rapid proliferation of Internet of Things (IoT) devices in healthcare, from wearable sensors to implantable medical devices, has revolutionised patient monitoring, personalised treatment, and remote care delivery. However, the resource-constrained nature of IoT devices, coupled with the sensitivity of medical data, presents
[...] Read more.
The rapid proliferation of Internet of Things (IoT) devices in healthcare, from wearable sensors to implantable medical devices, has revolutionised patient monitoring, personalised treatment, and remote care delivery. However, the resource-constrained nature of IoT devices, coupled with the sensitivity of medical data, presents critical security challenges. Traditional encryption methods, while robust, are computationally intensive and unsuitable for IoT environments, leaving sensitive patient information vulnerable to cyber threats. Addressing this gap, lightweight encryption methods have emerged as a pivotal solution to balance security with the limited processing power, memory, and energy resources of IoT devices. This paper explores lightweight encryption methods tailored for IoT healthcare applications, evaluating their effectiveness in securing sensitive data while operating under resource constraints. A comparative analysis is conducted on encryption techniques such as AES-128, LEA, Ascon, GIFT, HIGHT, PRINCE, and RC5-32/12/16, based on key performance metrics including block size, key size, encryption and decryption speeds, throughput, and security levels. The findings highlight that AES-128, LEA, ASCON, and GIFT are best suited for high-sensitivity healthcare data due to their strong security features, while HIGHT and PRINCE provide balanced protection for medium-sensitivity applications. RC5-32/12/16, on the other hand, prioritises efficiency over comprehensive security, making it suitable for low-risk scenarios where computational overhead must be minimised. The paper underscores the significant trade-offs between efficiency, security, and resource consumption, emphasising the need for careful selection of encryption methods based on the specific requirements of IoT healthcare environments. Additionally, the paper highlights the growing demand for lightweight encryption methods that balance energy efficiency with robust protection against cyber threats. These insights offer valuable guidance for researchers and practitioners seeking to enhance the security of IoT-based healthcare systems while ensuring optimal performance in resource-constrained settings.
Full article
Open AccessArticle
Text Mining and Unsupervised Deep Learning for Intrusion Detection in Smart-Grid Communication Networks
by
Joseph Azar, Mohammed Al Saleh, Raphaël Couturier and Hassan Noura
IoT 2025, 6(2), 22; https://doi.org/10.3390/iot6020022 - 26 Mar 2025
Abstract
The Manufacturing Message Specification (MMS) protocol is frequently used to automate processes in IEC 61850-based substations and smart-grid systems. However, it may be susceptible to a variety of cyber-attacks. A frequently used protection strategy is to deploy intrusion detection systems to monitor network
[...] Read more.
The Manufacturing Message Specification (MMS) protocol is frequently used to automate processes in IEC 61850-based substations and smart-grid systems. However, it may be susceptible to a variety of cyber-attacks. A frequently used protection strategy is to deploy intrusion detection systems to monitor network traffic for anomalies. Conventional approaches to detecting anomalies require a large number of labeled samples and are therefore incompatible with high-dimensional time series data. This work proposes an anomaly detection method for high-dimensional sequences based on a bidirectional LSTM autoencoder. Additionally, a text-mining strategy based on a TF-IDF vectorizer and truncated SVD is presented for data preparation and feature extraction. The proposed data representation approach outperformed word embeddings (Doc2Vec) by better preserving critical domain-specific keywords in MMS traffic while reducing the complexity of model training. Unlike embeddings, which attempt to capture semantic relationships that may not exist in structured network protocols, TF-IDF focuses on token frequency and importance, making it more suitable for anomaly detection in MMS communications. To address the limitations of existing approaches that rely on labeled samples, the proposed model learns the properties and patterns of a large number of normal samples in an unsupervised manner. The results demonstrate that the proposed approach can learn potential features from high-dimensional time series data while maintaining a high True Positive Rate.
Full article
(This article belongs to the Topic Machine Learning in Internet of Things II)
►▼
Show Figures

Figure 1
Open AccessReview
Driving Supply Chain Transformation with IoT and AI Integration: A Dual Approach Using Bibliometric Analysis and Topic Modeling
by
Jerifa Zaman, Atefeh Shoomal, Mohammad Jahanbakht and Dervis Ozay
IoT 2025, 6(2), 21; https://doi.org/10.3390/iot6020021 - 25 Mar 2025
Abstract
►▼
Show Figures
The objective of this study is to conduct an analysis of the scientific literature on the application of the Internet of Things (IoT) and artificial intelligence (AI) in enhancing supply chain operations. This research applies a dual approach combining bibliometric analysis and topic
[...] Read more.
The objective of this study is to conduct an analysis of the scientific literature on the application of the Internet of Things (IoT) and artificial intelligence (AI) in enhancing supply chain operations. This research applies a dual approach combining bibliometric analysis and topic modeling to explore both quantitative citation trends and qualitative thematic insights. By examining 810 qualified articles, published between 2011 and 2024, this research aims to identify the main topics, key authors, influential sources, and the most-cited articles within the literature. The study addresses critical research questions on the state of IoT and AI integration into supply chains and the role of these technologies in resolving digital supply chain management challenges. The convergence of IoT and AI holds immense potential to redefine supply chain management practices, improving productivity, visibility, and sustainability in interconnected global supply chains. This research not only highlights the continuous evolution of the supply chain field in light of Industry 4.0 technologies—such as machine learning, big data analytics, cloud computing, cyber–physical systems, and 5G networks—but also provides an updated overview of advanced IoT and AI technologies currently applied in supply chain operations, documenting their evolution from rudimentary stages to their current state of advancement.
Full article

Figure 1
Open AccessArticle
IoT-Based Framework for Connected Municipal Public Services in a Strategic Digital City Context
by
Danieli Aparecida From, Denis Alcides Rezende and Donald Francisco Quintana Sequeira
IoT 2025, 6(2), 20; https://doi.org/10.3390/iot6020020 - 25 Mar 2025
Abstract
The use of digital technology resources in public services enhances efficiency, responsiveness, and citizens’ quality of life through improved resource management, real-time monitoring, and service performance. The objective is to create and apply an IoT-based framework for connected municipal public services in a
[...] Read more.
The use of digital technology resources in public services enhances efficiency, responsiveness, and citizens’ quality of life through improved resource management, real-time monitoring, and service performance. The objective is to create and apply an IoT-based framework for connected municipal public services in a strategic digital city context. The research employed a modeling process validated in a Brazilian city, identifying seven related frameworks and four themes through a bibliometric review. The original framework comprises three constructs, eight subconstructs, and 12 variables, validated through a case study inquiry. The results revealed that the researched city has yet to enlarge IoT into its municipal public services as part of a digital city project initiative. Key recommendations for IoT implementation include prioritizing the preferences of digital citizens, expanding critical services suited for IoT, and updating municipal strategies to incorporate IT resources to streamline decision-making. The conclusion reiterates that the IoT framework for municipal services is effective when actionable information supports strategic planning and decision-making and highlights the transformative potential of IoT in driving more resilient and sustainable cities aligned with citizens’ needs. This approach allows public managers to enhance citizens’ quality of life while improving the efficiency and responsiveness of urban management processes and services.
Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
►▼
Show Figures

Figure 1
Open AccessArticle
An Ultra-Low Power Sticky Note Using E-Paper Display for the Internet of Things
by
Tareq Khan
IoT 2025, 6(1), 19; https://doi.org/10.3390/iot6010019 - 13 Mar 2025
Abstract
►▼
Show Figures
There are over 300 million smart homes worldwide and 60.4 million smart homes in the US, using devices like smart thermostats, smart plugs, smart door locks, etc. Yet in this age of smart and connected devices, we still use paper-based sticky notes on
[...] Read more.
There are over 300 million smart homes worldwide and 60.4 million smart homes in the US, using devices like smart thermostats, smart plugs, smart door locks, etc. Yet in this age of smart and connected devices, we still use paper-based sticky notes on doors to display messages such as “Busy, do not disturb”, “In a Zoom meeting”, etc. In this project, a novel IoT-connected digital sticky note system was developed where the user can wirelessly send messages from a smartphone to a sticky note display. The sticky note displays can be hung on the doors of offices, hotels, homes, etc. The display could be updated with the user’s message sent from anywhere in the world. The key design challenge was to develop the display unit to consume as little power as possible to increase battery life. A prototype of the proposed system was developed comprising ultra-low-power sticky note display units consuming only 404 µA average current and having a battery life of more than six months, with a Wi-Fi-connected hub unit, an MQTT server, and a smartphone app for composing the message.
Full article

Figure 1
Open AccessArticle
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
by
Mohamed Chahine Ghanem, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani and Dipo Dunsin
IoT 2025, 6(1), 18; https://doi.org/10.3390/iot6010018 - 7 Mar 2025
Abstract
►▼
Show Figures
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux,
[...] Read more.
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due to architectural differences. The research employs a testbed-based approach to simulate cyberattacks on both platforms, capturing and analysing forensic artefacts such as system logs, memory dumps, and network traffic. The research findings reveal that while traditional PCs offer extensive forensic capabilities due to superior storage, tool support, and system logging, Raspberry Pi devices present significant forensic challenges, primarily due to their ARM architecture and limited forensic readiness. The study emphasises the need for specialised forensic tools tailored to IoT environments and suggests best practices to enhance forensic investigation capabilities in weaponised IoT scenarios. This research contributes to the field by bridging the gap between theoretical frameworks and real-world forensic investigations, offering insights into the evolving landscape of IoT forensics and its implications for digital evidence collection, analysis, and forensic readiness.
Full article

Figure 1
Open AccessArticle
Network Architecture of a Fog–Cloud-Based Smart Farming System
by
Alain Biheng, Chunling Tu, Pius Adewale Owolawi, Deon Du Plessis and Shengzhi Du
IoT 2025, 6(1), 17; https://doi.org/10.3390/iot6010017 - 20 Feb 2025
Abstract
►▼
Show Figures
With the rapid increase in the human population and urbanization worldwide, the demand for food production has played a significant role in driving the integration of technology into agriculture. Various Cloud-based systems, such as livestock tracking systems, have been proposed. In those systems,
[...] Read more.
With the rapid increase in the human population and urbanization worldwide, the demand for food production has played a significant role in driving the integration of technology into agriculture. Various Cloud-based systems, such as livestock tracking systems, have been proposed. In those systems, data were collected by the sensors and sent to the Cloud for processing. However, significant issues with those systems were noted, such as high bandwidth utilization and security concerns, such as a high volume of row data traveling from the data collection devices (such as sensors) to the Cloud through the Internet. Additionally, the long distance between the Cloud and the data collection devices makes it unsuitable for latency-sensitive livestock disease monitoring and tracking systems. Therefore, this paper proposes a Fog–Cloud-based approach, where the processing is conducted at the Fog layer, closer to the data collection devices, and only the result is sent to the Cloud for remote viewing. The proposed method aims to reduce power consumption and latency in communication. To validate the proposed method, both the Cloud-based and Fog–Cloud-based scenarios are simulated using iFogSim (a novel simulation tool for IoT and Cloud computing), and the result shows that there is less than twice the power consumption in some scenarios and that the time consumed in the proposed Fog–Cloud-based system, depending on the number of sensors, is five to ten times lower. This study further supports the point that the Fog–Cloud-based is suitable for latency-dependent farming systems such as livestock tracking systems.
Full article

Figure 1
Open AccessArticle
Fog-Enabled IoT Robotic System for Efficient Date Palm Monitoring in Moroccan Oases
by
Baghrous Mohamed and Ezzouhairi Abdellatif
IoT 2025, 6(1), 16; https://doi.org/10.3390/iot6010016 - 14 Feb 2025
Abstract
►▼
Show Figures
Date palms are a vital resource in the oases of Morocco, providing economic and ecological benefits to local communities. However, monitoring these trees at scale presents challenges, particularly in rural areas where traditional IoT-based agricultural systems rely on extensive sensor networks. These systems
[...] Read more.
Date palms are a vital resource in the oases of Morocco, providing economic and ecological benefits to local communities. However, monitoring these trees at scale presents challenges, particularly in rural areas where traditional IoT-based agricultural systems rely on extensive sensor networks. These systems face significant limitations, including high deployment costs, network coverage issues, and energy constraints. To address these challenges, we propose an agricultural robot equipped with multiple IoT sensors to monitor date palm health and environmental parameters, reducing the need for widespread fixed sensors. To overcome the latency, bandwidth, and energy inefficiencies associated with cloud-based solutions, the system integrates the fog computing paradigm. Fog computing brings computational resources closer to the data source, enabling real-time processing and decision-making while reducing network congestion. Using iFogSim, we evaluate the proposed system on key metrics, including latency, energy consumption, and network performance. The results demonstrate significant improvements over traditional approaches, highlighting the potential of IoT-based robotic systems combined with fog computing to revolutionize date palm monitoring in remote oases.
Full article

Figure 1
Open AccessArticle
Smart Monitoring System for Temperature and Relative Humidity Adapted to the Specific Needs of the Colombian Pharmaceutical Service
by
Maria Paula Cabezas, Juan David Carvajal, Fulvio Yesid Vivas and Diego Mauricio Lopez
IoT 2025, 6(1), 15; https://doi.org/10.3390/iot6010015 - 13 Feb 2025
Abstract
►▼
Show Figures
Patient safety (PS) is essential in medical care, and preventing medication errors (MEs) is key to guaranteeing it. In Colombia, pharmaceutical services must comply with regulations that require adequate environmental monitoring to ensure medication quality. This study aims to propose an IoT-based smart
[...] Read more.
Patient safety (PS) is essential in medical care, and preventing medication errors (MEs) is key to guaranteeing it. In Colombia, pharmaceutical services must comply with regulations that require adequate environmental monitoring to ensure medication quality. This study aims to propose an IoT-based smart system that automatizes temperature and relative humidity monitoring in the Colombian pharmaceutical service (CPS). Using the model for IoT platform design as a methodology, an efficient and flexible architecture that integrates data quality management (DQM) dimensions to improve the accuracy and reliability of the system was designed. In addition, tests based on the agile quadrant methodology demonstrate, as a result, its effectiveness, highlighting its ability to optimize environmental monitoring, prevent MEs, and improve PS. The successful implementation of this IoT-based smart system shows its potential in the pharmaceutical sector, offering an innovative solution that reduces risks and improves the quality of drug storage.
Full article

Figure 1
Open AccessArticle
Evaluating the Performance of LoRa Networks: A Study on Disaster Monitoring Scenarios
by
Isadora Rezende Lopes, Paulo Rodolfo da Silva Leite Coelho, Rafael Pasquini and Rodrigo Sanches Miani
IoT 2025, 6(1), 14; https://doi.org/10.3390/iot6010014 - 12 Feb 2025
Abstract
►▼
Show Figures
The development of technologies using the Internet of Things (IoT) concept evolves daily. These numerous technologies, such as LoRa (Long Range) transceivers, find applications in various domains, including monitoring natural disasters and those caused by human error. Security vulnerabilities arise concurrently with the
[...] Read more.
The development of technologies using the Internet of Things (IoT) concept evolves daily. These numerous technologies, such as LoRa (Long Range) transceivers, find applications in various domains, including monitoring natural disasters and those caused by human error. Security vulnerabilities arise concurrently with the advancement of these new technologies. Cyberattacks seeking to disrupt device availability, such as denial-of-service (DoS) attacks, can effectively exploit vulnerabilities in LoRa devices, hindering disaster monitoring efforts. Therefore, our goal is to assess the network parameters that impact the development of a disaster monitoring environment using LoRaWAN. Specifically, we aim to identify the parameters that could result in network availability issues, whether caused by malicious actors or configuration errors. Our results indicate that certain LoRa network parameters (collision checks, packet size, and the number of nodes) can significantly affect network performance, potentially rendering this technology unsuitable for building robust disaster monitoring systems.
Full article

Figure 1
Open AccessReview
Emerging Developments in Real-Time Edge AIoT for Agricultural Image Classification
by
Maurizio Pintus, Felice Colucci and Fabio Maggio
IoT 2025, 6(1), 13; https://doi.org/10.3390/iot6010013 - 10 Feb 2025
Cited by 1
Abstract
►▼
Show Figures
Advances in deep learning (DL) models and next-generation edge devices enable real-time image classification, driving a transition from the traditional, purely cloud-centric IoT approach to edge-based AIoT, with cloud resources reserved for long-term data storage and in-depth analysis. This innovation is transformative for
[...] Read more.
Advances in deep learning (DL) models and next-generation edge devices enable real-time image classification, driving a transition from the traditional, purely cloud-centric IoT approach to edge-based AIoT, with cloud resources reserved for long-term data storage and in-depth analysis. This innovation is transformative for agriculture, enabling autonomous monitoring, localized decision making, early emergency detection, and precise chemical application, thereby reducing costs and minimizing environmental and health impacts. The workflow of an edge-based AIoT system for agricultural monitoring involves two main steps: optimal training and tuning of DL models through extensive experiments on high-performance AI-specialized computers, followed by effective customization for deployment on advanced edge devices. This review highlights key challenges in practical applications, including: (i) the limited availability of agricultural data, particularly due to seasonality, addressed through public datasets and synthetic image generation; (ii) the selection of state-of-the-art computer vision algorithms that balance high accuracy with compatibility for resource-constrained devices; (iii) the deployment of models through algorithm optimization and integration of next-generation hardware accelerators for DL inference; and (iv) recent advancements in AI models for image classification that, while not yet fully deployable, offer promising near-term improvements in performance and functionality.
Full article

Figure 1
Open AccessArticle
Routing Protocols Performance on 6LoWPAN IoT Networks
by
Pei Siang Chia, Noor Hisham Kamis, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Warusia Yassin and Mohd Faizal Abdollah
IoT 2025, 6(1), 12; https://doi.org/10.3390/iot6010012 - 10 Feb 2025
Abstract
►▼
Show Figures
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect
[...] Read more.
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. This study focuses on examining the performance and power consumption of routing protocols in the context of 6LoWPAN, drawing insights from prior research and utilizing simulation techniques. The simulation involves the application of routing protocols, namely Routing Protocol for Low-power and Lossy (RPL) Networks, Ad hoc On-demand Distance Vector (AODV), Lightweight On-demand Ad hoc Distance-vector Next Generation (LOADng), implemented through the Cooja simulator. The simulation also runs in different network topologies to gain an insight into the performance of the protocols in the specific topology including random, linear, and eclipse topology. The raw data gathered from the tools including Powertrace and Collect-View were then analyzed with Python code to transfer into useful information and visualize the graph. The results demonstrate that the power consumption, specifically CPU power, Listen Power, and Total Consumption Power, will increase with the incremental of motes. The result also shows that RPL is the most power-efficient protocol among the scenarios compared to LOADng and AODV. The result is helpful because it brings insights into the performance, specifically power consumption in the 6LoWPAN network. This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.
Full article

Figure 1
Open AccessArticle
Shower–IoT: An Internet of Things System for Monitoring Electric Showers
by
Helder Holanda Prezotto, Natássya Barlate Floro da Silva, Lucas Dias Hiera Sampaio and Rogério Santos Pozza
IoT 2025, 6(1), 11; https://doi.org/10.3390/iot6010011 - 8 Feb 2025
Abstract
The electric shower is the main form of heating water for bathing in Brazilian homes and one of the significant appliances related to electricity and water consumption. Internet of Things (IoT) projects make it possible to connect objects to the Internet and collect
[...] Read more.
The electric shower is the main form of heating water for bathing in Brazilian homes and one of the significant appliances related to electricity and water consumption. Internet of Things (IoT) projects make it possible to connect objects to the Internet and collect data from machines remotely. In this work, we developed an Internet of Things system for monitoring an electric shower, called Shower–IoT, whose sensor data are water temperature, electric tension, electric current, and water flow. To implement the software infrastructure, we used the services present in cloud computing, such as a broker, processing, and storage, in which the information about the electric shower was made available through an Android application. The results demonstrate that our system can monitor an electric shower integrated with cloud services, allowing the users to visualize its behavior in real time and detect possible failures by comparing sensor data from previous evaluations.
Full article
(This article belongs to the Special Issue Advances in IoT and Machine Learning for Smart Homes)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Healthcare Monitoring Using an Internet of Things-Based Cardio System
by
Galya Georgieva-Tsaneva, Krasimir Cheshmedzhiev, Yoan-Aleksandar Tsanev, Miroslav Dechev and Ekaterina Popovska
IoT 2025, 6(1), 10; https://doi.org/10.3390/iot6010010 - 6 Feb 2025
Cited by 1
Abstract
►▼
Show Figures
This study describes an IoT-based health monitoring system designed to notify attending physicians when necessary. The developed IoT system incorporates sensors for ECG, PPG, and temperature; a gyroscope/accelerometer; and a microcontroller. A critical analysis of existing components in these areas was conducted to
[...] Read more.
This study describes an IoT-based health monitoring system designed to notify attending physicians when necessary. The developed IoT system incorporates sensors for ECG, PPG, and temperature; a gyroscope/accelerometer; and a microcontroller. A critical analysis of existing components in these areas was conducted to ensure the IoT system’s good performance, reliability, and suitability for continuous cardiac monitoring and data processing. This study addresses the challenge of monitoring cardiac activity in patients with arrhythmias, focusing on the differences in heart rate variability (HRV) parameters between healthy individuals and those with extrasystolic arrhythmia. The purpose of this research is to evaluate the effectiveness of IoT-based systems using PPG and ECG sensors for cardiac data registration and HRV analysis. The system leverages time domain and frequency domain methods for HRV analysis to assess the states of the autonomic nervous system. Significant differences were observed in HRV parameters, such as the SDNN, SDANN, RMSSD, and the LF/HF ratio. The results demonstrated that both the PPG and ECG methods provide comparable HRV measurements, despite PPG’s higher susceptibility to noise. This study concludes that IoT-based monitoring systems with PPG and ECG integration can reliably detect arrhythmias and offer real-time data for cardiac care.
Full article

Figure 1
Open AccessReview
A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art
by
Mohammad Shamim Ahsan and Al-Sakib Khan Pathan
IoT 2025, 6(1), 9; https://doi.org/10.3390/iot6010009 - 24 Jan 2025
Cited by 2
Abstract
The Internet of Things (IoT) is a technologyof connecting billions of devices with heterogeneous types and capabilities. Even though it is an attractive environment that could change the way we interact with the devices, the real-life and large-scale implementation of it is greatly
[...] Read more.
The Internet of Things (IoT) is a technologyof connecting billions of devices with heterogeneous types and capabilities. Even though it is an attractive environment that could change the way we interact with the devices, the real-life and large-scale implementation of it is greatly impeded by the potential security risks that it is susceptible to. While the potential of IoT is significant, the security challenges it faces are equally formidable. IoT security can be addressed from different angles, but one of the key issues is the access control model because among the many challenges, access control is a pivotal concern that determines the overall security of IoT systems. This eventually determines which device is given access to the IoT systems and which is denied access. In this work, we conduct a systematic and thorough survey on the state-of-the-art access control models in IoT. This study includes more than 100 related articles, including 77 best-quartile journal papers. We cover conventional as well as advanced access control models, taking the crucial period of various studies in this particular area. In addition, a number of critical questions are answered and key works are summarized. Furthermore, we identify significant gaps in existing models and propose new considerations and prospects for future developments. Since no existing survey explores both conventional and sophisticated access control models with essential challenges, trends and application domains analysis, and requirements analysis, our study significantly contributes to the literature, especially in the IoT security field.
Full article
(This article belongs to the Special Issue Advances in IoT and Machine Learning for Smart Homes)
►▼
Show Figures

Figure 1
Open AccessArticle
Computer Model of an IoT Decision-Making Network for Detecting the Probability of Crop Diseases
by
Grygorii Diachenko, Ivan Laktionov, Oleksandr Vovna, Oleksii Aleksieiev and Dmytro Moroz
IoT 2025, 6(1), 8; https://doi.org/10.3390/iot6010008 - 21 Jan 2025
Abstract
►▼
Show Figures
This article is devoted to the development and testing of a computer model of an IoT system that combines wireless network technologies for the online monitoring of climatic and soil conditions in agriculture. The system supports decision-making by predicting the probability of crop
[...] Read more.
This article is devoted to the development and testing of a computer model of an IoT system that combines wireless network technologies for the online monitoring of climatic and soil conditions in agriculture. The system supports decision-making by predicting the probability of crop diseases. This study focuses on the processes of aggregation, wireless transmission, and processing of soil and climatic measurement data within infocommunication software and hardware solutions. This research makes both scientific and practical contributions. Specifically, it presents a computer model based on wireless sensor networks and edge-computing technologies. This model aggregates and intelligently processes agricultural monitoring data to predict crop diseases. The software component, developed using an adaptive neuro-fuzzy inference system (ANFIS), was integrated into the microcontroller unit of IoT systems for agricultural applications. This approach enabled the substantiation of an optimised algorithmic and structural organisation of the IoT system, enabling its use in designing reliable architectures for agricultural monitoring systems in open fields with decision-making support.
Full article

Figure 1
Open AccessArticle
An LDDoS Attack Detection Method Based on Behavioral Characteristics and Stacking Mechanism
by
Junwei Ye, Zhixuan Wang, Jichen Yang, Chunan Wang and Chunyu Zhang
IoT 2025, 6(1), 7; https://doi.org/10.3390/iot6010007 - 21 Jan 2025
Cited by 1
Abstract
►▼
Show Figures
Today, the development of the Internet of Things has grown, and the number of related IoT devices has reached the order of tens of billions. Most IoT devices are vulnerable to attacks, especially DdoS (Distributed Denial of Service attack) attacks. DDoS attacks can
[...] Read more.
Today, the development of the Internet of Things has grown, and the number of related IoT devices has reached the order of tens of billions. Most IoT devices are vulnerable to attacks, especially DdoS (Distributed Denial of Service attack) attacks. DDoS attacks can easily cause damage to IoT devices, and LDDoS is an attack launched against hardware resources through a small string of very slow traffic. Compared with traditional large-scale DDoS, their attacks require less bandwidth and generate traffic similar to that of normal users, making them difficult to distinguish when identifying them. This article uses the CICIoT2023 dataset combined with behavioral features and stacking mechanisms to extract information from the attack behavior of low-rate attacks as features and uses the stacking mechanism to improve the recognition effect. A method of behavioral characteristics and stacking mechanism is proposed to detect DDoS attacks. This method can accurately detect LDDoS. Experimental results show that the recognition rate of low-rate attacks of this scheme reaches 0.99, and other indicators such as accuracy, recall, and F1 score are all better than other LDDoS detection methods. Thus, the method model proposed in this paper can effectively detect LDDoS attacks. At present, DDoS attacks are relatively mature, and there are many related results, but there is less research on LDDoS detection alone. This paper focuses on the investigation and analysis of LDDoS attacks in DDoS attacks and deduces feasible LDDoS detection methods.
Full article

Figure 1
Open AccessArticle
Efficient State Synchronization in Distributed Electrical Grid Systems Using Conflict-Free Replicated Data Types
by
Arsentii Prymushko, Ivan Puchko, Mykola Yaroshynskyi, Dmytro Sinko, Hryhoriy Kravtsov and Volodymyr Artemchuk
IoT 2025, 6(1), 6; https://doi.org/10.3390/iot6010006 - 11 Jan 2025
Cited by 1
Abstract
►▼
Show Figures
Modern electrical grids are evolving towards distributed architectures, necessitating efficient and reliable state synchronization mechanisms to maintain structural and functional consistency. This paper investigates the application of conflict-free replicated data types (CRDTs) for representing and synchronizing the states of distributed electrical grid systems
[...] Read more.
Modern electrical grids are evolving towards distributed architectures, necessitating efficient and reliable state synchronization mechanisms to maintain structural and functional consistency. This paper investigates the application of conflict-free replicated data types (CRDTs) for representing and synchronizing the states of distributed electrical grid systems (DEGSs). We present a general structure for DEGSs based on CRDTs, focusing on the Convergent Replicated Data Type (CvRDT) model with delta state propagation to optimize the communication overhead. The Observed Remove Set (ORSet) and Last-Writer-Wins Register (LWW-Register) are utilized to handle concurrent updates and ensure that only the most recent state changes are retained. An actor-based framework, “Vigilant Hawk”, leveraging the Akka toolkit, was developed to simulate the asynchronous and concurrent nature of DEGSs. Each electrical grid node is modelled as an independent actor with isolated state management, facilitating scalability and fault tolerance. Through a series of experiments involving 100 nodes under varying latency degradation coefficients (LDK), we examined the impact of network conditions on the state synchronization efficiency. The simulation results demonstrate that CRDTs effectively maintain consistency and deterministic behavior in DEGSs, even with increased network latency and node disturbances. An effective LDK range was identified (LDK effective = 2 or 4), where the network remains stable without significant delays in state propagation. The linear relationship between the full state distribution time (FSDT) and LDK indicates that the system can scale horizontally without introducing complex communication overhead. The findings affirm that using CRDTs for state synchronization enhances the resilience and operational efficiency of distributed electrical grids. The deterministic and conflict-free properties of CRDTs eliminate the need for complex concurrency control mechanisms, making them suitable for real-time monitoring and control applications. Future work will focus on addressing identified limitations, such as optimizing message routing based on the network topology and incorporating security measures to protect state information in critical infrastructure systems.
Full article

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
AI, Drones, Electronics, IoT, MAKE, Sensors
Machine Learning in Internet of Things II
Topic Editors: Dawid Połap, Robertas DamaševičiusDeadline: 30 June 2025
Topic in
Applied Sciences, Electronics, IoT, Materials, Robotics, Sensors, Machines
Smart Production in Terms of Industry 4.0 and 5.0
Topic Editors: Iwona Paprocka, Cezary Grabowik, Jozef HusarDeadline: 31 August 2025
Topic in
Applied Sciences, Electronics, IoT, JSAN, Network, Sensors, Telecom, Technologies
Wireless Energy Harvesting and Power Transfer for Communications and Networks
Topic Editors: Yichuang Sun, Arooj Mubashara Siddiqui, Xiaojing Chen, Oluyomi SimpsonDeadline: 31 October 2025
Topic in
Electronics, IoT, Sustainability, AgriEngineering, AI Sensors
Smart Farming 2.0: IoT and Edge AI for Precision Crop Management and Sustainability
Topic Editors: Chiang Liang Kok, Teck Kheng Lee, Howard Tang, Fanyi MengDeadline: 31 December 2025

Conferences
Special Issues
Special Issue in
IoT
Blockchain-Based Trusted IoT
Guest Editors: Shahriar Kaisar, Abebe Diro, Abdullahi ChowdhuryDeadline: 30 April 2025
Special Issue in
IoT
IoT-Driven Smart Cities
Guest Editors: Hakilo Sabit, Peter Han Joo ChongDeadline: 31 May 2025
Special Issue in
IoT
Internet of Vehicles (IoV)
Guest Editors: Gabor Soos, András Rövid, Tomislav MihaljDeadline: 30 June 2025
Special Issue in
IoT
Advances in IoT and Machine Learning for Smart Homes
Guest Editor: Tareq Hasan KhanDeadline: 31 August 2025