Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,356)

Search Parameters:
Keywords = Internet of vehicles

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1617 KB  
Article
Physical Layer Security Enhancement in IRS-Assisted Interweave CIoV Networks: A Heterogeneous Multi-Agent Mamba RainbowDQN Method
by Ruiquan Lin, Shengjie Xie, Wencheng Chen and Tao Xu
Sensors 2025, 25(20), 6287; https://doi.org/10.3390/s25206287 - 10 Oct 2025
Abstract
The Internet of Vehicles (IoV) relies on Vehicle-to-Everything (V2X) communications to enable cooperative perception among vehicles, infrastructures, and devices, where Vehicle-to-Infrastructure (V2I) links are crucial for reliable transmission. However, the openness of wireless channels exposes IoV to eavesdropping, threatening privacy and security. This [...] Read more.
The Internet of Vehicles (IoV) relies on Vehicle-to-Everything (V2X) communications to enable cooperative perception among vehicles, infrastructures, and devices, where Vehicle-to-Infrastructure (V2I) links are crucial for reliable transmission. However, the openness of wireless channels exposes IoV to eavesdropping, threatening privacy and security. This paper investigates an Intelligent Reflecting Surface (IRS)-assisted interweave Cognitive IoV (CIoV) network to enhance physical layer security in V2I communications. A non-convex joint optimization problem involving spectrum allocation, transmit power for Vehicle Users (VUs), and IRS phase shifts is formulated. To address this challenge, a heterogeneous multi-agent (HMA) Mamba RainbowDQN algorithm is proposed, where homogeneous VUs and a heterogeneous secondary base station (SBS) act as distinct agents to simplify decision-making. Simulation results show that the proposed method significantly outperform benchmark schemes, achieving a 13.29% improvement in secrecy rate and a 54.2% reduction in secrecy outage probability (SOP). These results confirm the effectiveness of integrating IRS and deep reinforcement learning (DRL) for secure and efficient V2I communications in CIoV networks. Full article
(This article belongs to the Section Sensor Networks)
51 pages, 1512 KB  
Article
CoCoChain: A Concept-Aware Consensus Protocol for Secure Sensor Data Exchange in Vehicular Ad Hoc Networks
by Rubén Juárez, Ruben Nicolas-Sans and José Fernández Tamames
Sensors 2025, 25(19), 6226; https://doi.org/10.3390/s25196226 - 8 Oct 2025
Viewed by 55
Abstract
Vehicular Ad Hoc Networks (VANETs) support safety-critical and traffic-optimization applications through low-latency, reliable V2X communication. However, securing integrity and auditability with blockchain is challenging because conventional BFT-style consensus incurs high message overhead and latency. We introduce CoCoChain, a concept-aware consensus mechanism tailored to [...] Read more.
Vehicular Ad Hoc Networks (VANETs) support safety-critical and traffic-optimization applications through low-latency, reliable V2X communication. However, securing integrity and auditability with blockchain is challenging because conventional BFT-style consensus incurs high message overhead and latency. We introduce CoCoChain, a concept-aware consensus mechanism tailored to VANETs. Instead of exchanging full payloads, CoCoChain trains a sparse autoencoder (SAE) offline on raw message payloads and encodes each message into a low-dimensional concept vector; only the top-k activations are broadcast during consensus. These compact semantic digests are integrated into a practical BFT workflow with per-phase semantic checks using a cosine-similarity threshold θ=0.85 (calibrated on validation data to balance detection and false positives). We evaluate CoCoChain in OMNeT++/SUMO across urban, highway, and multi-hop broadcast under congestion scenarios, measuring latency, throughput, packet delivery ratio, and Age of Information (AoI), and including adversaries that inject semantically corrupted concepts as well as cross-layer stress (RF jamming and timing jitter). Results show CoCoChain reduces consensus message overhead by up to 25% and confirmation latency by 20% while maintaining integrity with up to 20% Byzantine participants and improving information freshness (AoI) under high channel load. This work focuses on OBU/RSU semantic-aware consensus (not 6G joint sensing or multi-base-station fusion). The code, configs, and an anonymized synthetic replica of the dataset will be released upon acceptance. Full article
(This article belongs to the Special Issue Joint Communication and Sensing in Vehicular Networks)
Show Figures

Figure 1

16 pages, 1726 KB  
Article
A DAG-Based Offloading Strategy with Dynamic Parallel Factor Adjustment for Edge Computing in IoV
by Wenyang Guan, Qi Zheng, Xiaoqin Lian and Chao Gao
Sensors 2025, 25(19), 6198; https://doi.org/10.3390/s25196198 - 6 Oct 2025
Viewed by 232
Abstract
With the rapid development of Internet of Vehicles (IoV) technology, massive data are continuously integrated into intelligent transportation systems, making efficient computing resource allocation a critical challenge for enhancing network performance. Due to the dynamic and real-time characteristics of IoV tasks, existing static [...] Read more.
With the rapid development of Internet of Vehicles (IoV) technology, massive data are continuously integrated into intelligent transportation systems, making efficient computing resource allocation a critical challenge for enhancing network performance. Due to the dynamic and real-time characteristics of IoV tasks, existing static offloading strategies fail to effectively cope with the complexity caused by network fluctuations and vehicle mobility. To address this issue, this paper proposes a task offloading algorithm based on the dynamic adjustment of the parallel factor in directed acyclic graphs (DAG), referred to as Dynamic adjustment of Parallel Factor (DPF). By leveraging edge computing, the proposed algorithm adaptively adjusts the parallel factor according to the dependency relationships among subtasks in the DAG, thereby optimizing resource utilization and reducing task completion time. In addition, the algorithm continuously monitors network conditions and vehicle states to dynamically schedule and offload tasks according to real-time system requirements. Compared with traditional static strategies, the proposed method not only significantly reduces task delay but also improves task success rates and overall system efficiency. Extensive simulation experiments conducted under three different task load conditions demonstrate the superior performance of the proposed algorithm. In particular, under high-load scenarios, the DPF algorithm achieves markedly better task completion times and resource utilization compared to existing methods. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

21 pages, 1825 KB  
Article
IM-ZDD: A Feature-Enhanced Inverse Mapping Framework for Zero-Day Attack Detection in Internet of Vehicles
by Tao Chen, Gongyu Zhang and Bingfeng Xu
Sensors 2025, 25(19), 6197; https://doi.org/10.3390/s25196197 - 6 Oct 2025
Viewed by 298
Abstract
In the Internet of Vehicles (IoV), zero-day attacks pose a significant security threat. These attacks are characterized by unknown patterns and limited sample availability. Traditional anomaly detection methods often fail because they rely on oversimplified assumptions, hindering their ability to model complex normal [...] Read more.
In the Internet of Vehicles (IoV), zero-day attacks pose a significant security threat. These attacks are characterized by unknown patterns and limited sample availability. Traditional anomaly detection methods often fail because they rely on oversimplified assumptions, hindering their ability to model complex normal IoV behavior. This limitation results in low detection accuracy and high false alarm rates. To overcome these challenges, we propose a novel zero-day attack detection framework based on Feature-Enhanced Inverse Mapping (IM-ZDD). The framework introduces a two-stage process. In the first stage, a feature enhancement module mitigates data scarcity by employing an innovative multi-generator, multi-discriminator Conditional GAN (CGAN) with dynamic focusing loss to generate a large-scale, high-quality synthetic normal dataset characterized by sharply defined feature boundaries. In the second stage, a learning-based inverse mapping module is trained exclusively on this synthetic data. Through adversarial training, the module learns a precise inverse mapping function, thereby establishing a compact and expressive representation of normal behavior. During detection, samples that cannot be effectively mapped are identified as attacks. Experimental results on the F2MD platform show IM-ZDD achieves superior accuracy and a low false alarm rate, yielding an average AUC of 98.25% and F1-Score of 96.41%, surpassing state-of-the-art methods by up to 4.4 and 10.8 percentage points. Moreover, with a median detection latency of only 3 ms, the framework meets real-time requirements, providing a robust solution for zero-day attack detection in data-scarce IoV environments. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

19 pages, 1327 KB  
Article
An IoT Architecture for Sustainable Urban Mobility: Towards Energy-Aware and Low-Emission Smart Cities
by Manuel J. C. S. Reis, Frederico Branco, Nishu Gupta and Carlos Serôdio
Future Internet 2025, 17(10), 457; https://doi.org/10.3390/fi17100457 - 4 Oct 2025
Viewed by 238
Abstract
The rapid growth of urban populations intensifies congestion, air pollution, and energy demand. Green mobility is central to sustainable smart cities, and the Internet of Things (IoT) offers a means to monitor, coordinate, and optimize transport systems in real time. This paper presents [...] Read more.
The rapid growth of urban populations intensifies congestion, air pollution, and energy demand. Green mobility is central to sustainable smart cities, and the Internet of Things (IoT) offers a means to monitor, coordinate, and optimize transport systems in real time. This paper presents an Internet of Things (IoT)-based architecture integrating heterogeneous sensing with edge–cloud orchestration and AI-driven control for green routing and coordinated Electric Vehicle (EV) charging. The framework supports adaptive traffic management, energy-aware charging, and multimodal integration through standards-aware interfaces and auditable Key Performance Indicators (KPIs). We hypothesize that, relative to a static shortest-path baseline, the integrated green routing and EV-charging coordination reduce (H1) mean travel time per trip by ≥7%, (H2) CO2 intensity (g/km) by ≥6%, and (H3) station peak load by ≥20% under moderate-to-high demand conditions. These hypotheses are tested in Simulation of Urban MObility (SUMO) with Handbook Emission Factors for Road Transport (HBEFA) emission classes, using 10 independent random seeds and reporting means with 95% confidence intervals and formal significance testing. The results confirm the hypotheses: average travel time decreases by approximately 9.8%, CO2 intensity by approximately 8%, and peak load by approximately 25% under demand multipliers ≥1.2 and EV shares ≥20%. Gains are attenuated under light demand, where congestion effects are weaker. We further discuss scalability, interoperability, privacy/security, and the simulation-to-deployment gap, and outline priorities for reproducible field pilots. In summary, a pragmatic edge–cloud IoT stack has the potential to lower congestion, reduce per-kilometer emissions, and smooth charging demand, provided it is supported by reliable data integration, resilient edge services, and standards-compliant interoperability, thereby contributing to sustainable urban mobility in line with the objectives of SDG 11 (Sustainable Cities and Communities). Full article
Show Figures

Figure 1

24 pages, 637 KB  
Article
ZDBERTa: Advancing Zero-Day Cyberattack Detection in Internet of Vehicle with Zero-Shot Learning
by Amal Mirza, Sobia Arshad, Muhammad Haroon Yousaf and Muhammad Awais Azam
Computers 2025, 14(10), 424; https://doi.org/10.3390/computers14100424 - 3 Oct 2025
Viewed by 286
Abstract
The Internet of Vehicles (IoV) is becoming increasingly vulnerable to zero-day (ZD) cyberattacks, which often bypass conventional intrusion detection systems. To mitigate this challenge, this study proposes Zero-Day Bidirectional Encoder Representations from Transformers approach (ZDBERTa), a zero-shot learning (ZSL)-based framework for ZD attack [...] Read more.
The Internet of Vehicles (IoV) is becoming increasingly vulnerable to zero-day (ZD) cyberattacks, which often bypass conventional intrusion detection systems. To mitigate this challenge, this study proposes Zero-Day Bidirectional Encoder Representations from Transformers approach (ZDBERTa), a zero-shot learning (ZSL)-based framework for ZD attack detection, evaluated on the CICIoV2024 dataset. Unlike conventional AI models, ZSL enables the classification of attack types not previously encountered during the training phase. Two dataset variants are formed: Variant 1, created through synthetic traffic generation using a mixture of pattern-based, crossover, and mutation techniques, and Variant 2, augmented with a Generative Adversarial Network (GAN). To replicate realistic zero-day conditions, denial-of-service (DoS) attacks were omitted during training and introduced only at testing. The proposed ZDBERTa incorporates a Byte-Pair Encoding (BPE) tokenizer, a multi-layer transformer encoder, and a classification head for prediction, enabling the model to capture semantic patterns and identify previously unseen threats. The experimental results demonstrate that ZDBERTa achieves 86.677% accuracy on Variant 1, highlighting the complexity of zero-day detection, while performance significantly improves to 99.315% on Variant 2, underscoring the effectiveness of GAN-based augmentation. To the best of our knowledge, this is the first research to explore ZD detection within CICIoV2024, contributing a novel direction toward resilient IoV cybersecurity. Full article
Show Figures

Figure 1

21 pages, 3759 KB  
Article
Forensics System for Internet of Vehicles Based on Post-Quantum Blockchain
by Zheng Zhang, Zehao Cao and Yongshun Wang
Sensors 2025, 25(19), 6038; https://doi.org/10.3390/s25196038 - 1 Oct 2025
Viewed by 274
Abstract
Internet of Vehicles (IoV) serves as the data support for intelligent transportation systems, and the information security of the IoV is of paramount importance. In view of the problems of centralized processing, easy information leakage, and weak anti-interference ability in traditional vehicle networking [...] Read more.
Internet of Vehicles (IoV) serves as the data support for intelligent transportation systems, and the information security of the IoV is of paramount importance. In view of the problems of centralized processing, easy information leakage, and weak anti-interference ability in traditional vehicle networking systems, this paper proposes a blockchain architecture suitable for IoV forensics scenario. By leveraging the decentralized, distributed storage and tamper-proof capabilities of blockchain, it solves the privacy protection and data security issues of the system. Considering the threat of quantum computing to the encryption technology in traditional blockchain, this paper integrates lattice cryptography and ring signatures into digital signature technology, achieving privacy protection and traceability of the signer’s identity. To enhance the efficiency of lattice-based cryptographic algorithms, the DualRing technology is introduced, which reduces the computational time and storage consumption of ring signatures. Theoretical analysis has proved the correctness, anonymity, unlinkability, and traceability of the proposed scheme, which is applicable to the IoV forensics system. Simulation comparisons demonstrated that the proposed scheme significantly improves computational efficiency and reduces storage overhead. When the number of ring members is 256, the signature and verification times require only 65.76 ms and 21.46 ms, respectively. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

31 pages, 1841 KB  
Article
Joint Scheduling and Placement for Vehicular Intelligent Applications Under QoS Constraints: A PPO-Based Precedence-Preserving Approach
by Wei Shi and Bo Chen
Mathematics 2025, 13(19), 3130; https://doi.org/10.3390/math13193130 - 30 Sep 2025
Viewed by 146
Abstract
The increasing demand for low-latency, computationally intensive vehicular applications, such as autonomous navigation and real-time perception, has led to the adoption of cloud–edge–vehicle infrastructures. These applications are often modeled as Directed Acyclic Graphs (DAGs) with interdependent subtasks, where precedence constraints enforce causal ordering [...] Read more.
The increasing demand for low-latency, computationally intensive vehicular applications, such as autonomous navigation and real-time perception, has led to the adoption of cloud–edge–vehicle infrastructures. These applications are often modeled as Directed Acyclic Graphs (DAGs) with interdependent subtasks, where precedence constraints enforce causal ordering while allowing concurrency. We propose a task offloading framework that decomposes applications into precedence-constrained subtasks and formulates the joint scheduling and offloading problem as a Markov Decision Process (MDP) to capture the latency–energy trade-off. The system state incorporates vehicle positions, wireless link quality, server load, and task-buffer status. To address the high dimensionality and sequential nature of scheduling, we introduce DepSchedPPO, a dependency-aware sequence-to-sequence policy that processes subtasks in topological order and generates placement decisions using action masking to ensure partial-order feasibility. This policy is trained using Proximal Policy Optimization (PPO) with clipped surrogates, ensuring stable and sample-efficient learning under dynamic task dependencies. Extensive simulations show that our approach consistently reduces task latency, energy consumption and QOS compared to conventional heuristic and DRL-based methods. The proposed solution demonstrates strong applicability to real-time vehicular scenarios such as autonomous navigation, cooperative sensing, and edge-based perception. Full article
Show Figures

Figure 1

19 pages, 2098 KB  
Article
Radio Frequency Fingerprint-Identification Learning Method Based-On LMMSE Channel Estimation for Internet of Vehicles
by Lina Sheng, Yao Xu, Yan Li, Yang Yang and Nan Fu
Mathematics 2025, 13(19), 3124; https://doi.org/10.3390/math13193124 - 30 Sep 2025
Viewed by 189
Abstract
As a typical representative of complex networks, the Internet of Vehicles (IoV) is more vulnerable to malicious attacks due to the mobility and complex environment of devices, which requires a secure and efficient authentication mechanism. Radio frequency fingerprinting (RFF) presents a novel research [...] Read more.
As a typical representative of complex networks, the Internet of Vehicles (IoV) is more vulnerable to malicious attacks due to the mobility and complex environment of devices, which requires a secure and efficient authentication mechanism. Radio frequency fingerprinting (RFF) presents a novel research perspective for identity authentication within the IoV. However, as device fingerprint features are directly extracted from wireless signals, their stability is significantly affected by variations in the communication channel. Furthermore, the interplay between wireless channels and receiver noise can result in the distortion of the received signal, complicating the direct separation of the genuine features of the transmitted signals. To address these issues, this paper proposes a method for RFF extraction based on the physical sidelink broadcast channel (PSBCH). First, necessary preprocessing is performed on the signal. Subsequently, the wireless channel, which lacks genuine features, is estimated using linear minimum mean square error (LMMSE) techniques. Meanwhile, the previous statistical models of the channel and noise are incorporated into the analysis process to accurately capture the channel distortion caused by multipath effects and noise. Ultimately, the impact of the channel is mitigated through a channel-equalization operation to extract fingerprint features, and identification is carried out using a structurally optimized ShuffleNet V2 network. Based on a lightweight design, this network integrates an attention mechanism that enables the model to adaptively concentrate on the most distinguishable weak features in low signal-to-noise ratio (SNR) conditions, thereby enhancing the robustness of feature extraction. The experimental results show that in fixed and mobile scenarios with low SNR, the classification accuracy of the proposed method reaches 96.76% and 91.05%, respectively. Full article
(This article belongs to the Special Issue Machine Learning in Computational Complex Systems)
Show Figures

Figure 1

31 pages, 5070 KB  
Article
Crowd-Shipping: Optimized Mixed Fleet Routing for Cold Chain Distribution
by Fuqiang Lu, Yue Xi, Zhiyuan Gao, Hualing Bi and Shamim Mahreen
Symmetry 2025, 17(10), 1609; https://doi.org/10.3390/sym17101609 - 28 Sep 2025
Viewed by 415
Abstract
In fresh produce cold chain last-mile delivery, the highly dispersed customer base leads to exorbitant delivery costs, posing the greatest challenge for cold chain enterprises. Achieving a symmetrical balance between cost-efficiency, environmental sustainability, and service quality is a fundamental pursuit in logistics system [...] Read more.
In fresh produce cold chain last-mile delivery, the highly dispersed customer base leads to exorbitant delivery costs, posing the greatest challenge for cold chain enterprises. Achieving a symmetrical balance between cost-efficiency, environmental sustainability, and service quality is a fundamental pursuit in logistics system optimization. This paper proposes integrating the crowd-shipping logistics model—characterized by internet platform sharing and flexibility—into the delivery service. It incorporates and extends features such as cold chain delivery, mixed fleets using gasoline and diesel vehicles (GDVs), electric vehicles (EVs), partial charging strategies for EVs, and time-of-use electricity pricing into the crowd-shipping model. A joint delivery mode combining traditional professional delivery (using GDVs and EVs) with crowd-shipping is proposed, creating a symmetrical collaboration between centralized fleet management and distributed social resources. The challenges associated with utilizing occasional drivers (ODs) are analyzed, along with the corresponding compensation decisions and allocation-related constraints. A route optimization model is constructed with the objective of minimizing total cost. To solve this model, an Improved Whale Optimization Algorithm (IWOA) is proposed. To further enhance the algorithm’s performance, an adaptive variable neighborhood search is embedded within the proposed algorithm, and four local search operators are applied. Using a case study of 100 customer nodes, the joint delivery mode with OD participation reduces total delivery costs by an average of 24.94% compared to the traditional professional vehicle delivery mode, demonstrating a more symmetrical allocation of logistical resources. The experiments fully demonstrate the effectiveness of the joint delivery model and the proposed algorithm. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

32 pages, 13081 KB  
Article
FedIFD: Identifying False Data Injection Attacks in Internet of Vehicles Based on Federated Learning
by Huan Wang, Junying Yang, Jing Sun, Zhe Wang, Qingzheng Liu and Shaoxuan Luo
Big Data Cogn. Comput. 2025, 9(10), 246; https://doi.org/10.3390/bdcc9100246 - 26 Sep 2025
Viewed by 286
Abstract
With the rapid development of intelligent connected vehicle technology, false data injection (FDI) attacks have become a major challenge in the Internet of Vehicles (IoV). While deep learning methods can effectively identify such attacks, the dynamic, distributed architecture of the IoV and limited [...] Read more.
With the rapid development of intelligent connected vehicle technology, false data injection (FDI) attacks have become a major challenge in the Internet of Vehicles (IoV). While deep learning methods can effectively identify such attacks, the dynamic, distributed architecture of the IoV and limited computing resources hinder both privacy protection and lightweight computation. To address this, we propose FedIFD, a federated learning (FL)-based detection method for false data injection attacks. The lightweight threat detection model utilizes basic safety messages (BSM) for local incremental training, and the Q-FedCG algorithm compresses gradients for global aggregation. Original features are reshaped using a time window. To ensure temporal and spatial consistency, a sliding average strategy aligns samples before spatial feature extraction. A dual-branch architecture enables parallel extraction of spatiotemporal features: a three-layer stacked Bidirectional Long Short-Term Memory (BiLSTM) captures temporal dependencies, and a lightweight Transformer models spatial relationships. A dynamic feature fusion weight matrix calculates attention scores for adaptive feature weighting. Finally, a differentiated pooling strategy is applied to emphasize critical features. Experiments on the VeReMi dataset show that the accuracy reaches 97.8%. Full article
(This article belongs to the Special Issue Big Data Analytics with Machine Learning for Cyber Security)
Show Figures

Figure 1

20 pages, 2856 KB  
Article
Privacy-Preserving Federated Review Analytics with Data Quality Optimization for Heterogeneous IoT Platforms
by Jiantao Xu, Liu Jin and Chunhua Su
Electronics 2025, 14(19), 3816; https://doi.org/10.3390/electronics14193816 - 26 Sep 2025
Viewed by 290
Abstract
The proliferation of Internet of Things (IoT) devices has created a distributed ecosystem where users generate vast amounts of review data across heterogeneous platforms, from smart home assistants to connected vehicles. This data is crucial for service improvement but is plagued by fake [...] Read more.
The proliferation of Internet of Things (IoT) devices has created a distributed ecosystem where users generate vast amounts of review data across heterogeneous platforms, from smart home assistants to connected vehicles. This data is crucial for service improvement but is plagued by fake reviews, data quality inconsistencies, and significant privacy risks. Traditional centralized analytics fail in this landscape due to data privacy regulations and the sheer scale of distributed data. To address this, we propose FedDQ, a federated learning framework for Privacy-Preserving Federated Review Analytics with Data Quality Optimization. FedDQ introduces a multi-faceted data quality assessment module that operates locally on each IoT device, evaluating review data based on textual coherence, behavioral patterns, and cross-modal consistency without exposing raw data. These quality scores are then used to orchestrate a quality-aware aggregation mechanism at the server, prioritizing contributions from high-quality, reliable clients. Furthermore, our framework incorporates differential privacy and models system heterogeneity to ensure robustness and practical applicability in resource-constrained IoT environments. Extensive experiments on multiple real-world datasets show that FedDQ significantly outperforms baseline federated learning methods in accuracy, convergence speed, and resilience to data poisoning attacks, achieving up to a 13.8% improvement in F1-score under highly heterogeneous and noisy conditions while preserving user privacy. Full article
(This article belongs to the Special Issue Emerging IoT Sensor Network Technologies and Applications)
Show Figures

Figure 1

3 pages, 129 KB  
Editorial
Special Issue: Intrusion Detection and Resiliency in Cyber-Physical Systems and Networks
by Olusola T. Odeyomi and Temitayo O. Olowu
Future Internet 2025, 17(9), 424; https://doi.org/10.3390/fi17090424 - 18 Sep 2025
Viewed by 304
Abstract
The rapid expansion of cyber-physical systems (CPSs) and networked environments—including the Internet of Things (IoT), Industrial IoT (IIoT), and the Internet of Vehicles (IoV)—has transformed modern infrastructures, enabling unprecedented connectivity, automation, and data-driven intelligence [...] Full article
32 pages, 2959 KB  
Article
Real-Time AI-Based Data Prioritization for MODBUS TCP Communication in IoT-Enabled LVDC Energy Systems
by Francisco J. Arroyo-Valle, Sandra Roger and Jose Saldana
Electronics 2025, 14(18), 3681; https://doi.org/10.3390/electronics14183681 - 17 Sep 2025
Viewed by 398
Abstract
This paper presents an intelligent communication architecture, designed to manage multiple power devices operating within a shared Low-Voltage Direct Current (LVDC) bus. These devices act either as energy consumers, e.g., Electric Vehicle (EV) chargers, Power Distribution Units (PDUs), or as sources and regulators, [...] Read more.
This paper presents an intelligent communication architecture, designed to manage multiple power devices operating within a shared Low-Voltage Direct Current (LVDC) bus. These devices act either as energy consumers, e.g., Electric Vehicle (EV) chargers, Power Distribution Units (PDUs), or as sources and regulators, e.g., Alternating Current-to-Direct Current (AC/DC) converters, energy storage system (ESS) units. Communication is established using industrial protocols such as Modular Digital Bus (MODBUS) over Transmission Control Protocol (TCP) or Remote Terminal Unit (RTU), and Controller Area Network (CAN). The proposed system supports both data acquisition and configuration of field devices. It exposes their information to an Energy Management System (EMS) via a MODBUS TCP server. A key contribution of this work is the integration of a lightweight Machine Learning (ML)-based data prioritization mechanism that dynamically adjusts the update frequency of each MODBUS parameter based on its current relevance. This ML-based method has been prototyped and evaluated within a virtualized Internet of Things (IoT) gateway environment. It enables real-time, efficient, and scalable communication without altering the EMS or disrupting legacy protocol operations. Furthermore, the proposed approach allows for early testing and validation of the prioritization strategy before full hardware integration in the demonstrators planned as part of the SHIFT2DC project under the Horizon Europe program. Full article
(This article belongs to the Special Issue Collaborative Intelligent Automation System for Smart Industry)
Show Figures

Graphical abstract

30 pages, 3141 KB  
Article
Lyapunov-Based Deep Deterministic Policy Gradient for Energy-Efficient Task Offloading in UAV-Assisted MEC
by Jianhua Liu, Xudong Zhang, Haitao Zhou, Xia Lei, Huiru Li and Xiaofan Wang
Drones 2025, 9(9), 653; https://doi.org/10.3390/drones9090653 - 16 Sep 2025
Viewed by 381
Abstract
The demand for low-latency computing from the Internet of Things (IoT) and emerging applications challenges traditional cloud computing. Mobile Edge Computing (MEC) offers a solution by deploying resources at the network edge, yet terrestrial deployments face limitations. Unmanned Aerial Vehicles (UAVs), leveraging their [...] Read more.
The demand for low-latency computing from the Internet of Things (IoT) and emerging applications challenges traditional cloud computing. Mobile Edge Computing (MEC) offers a solution by deploying resources at the network edge, yet terrestrial deployments face limitations. Unmanned Aerial Vehicles (UAVs), leveraging their high mobility and flexibility, provide dynamic computation offloading for User Equipments (UEs), especially in areas with poor infrastructure or network congestion. However, UAV-assisted MEC confronts significant challenges, including time-varying wireless channels and the inherent energy constraints of UAVs. We put forward the Lyapunov-based Deep Deterministic Policy Gradient (LyDDPG), a novel computation offloading algorithm. This algorithm innovatively integrates Lyapunov optimization with the Deep Deterministic Policy Gradient (DDPG) method. Lyapunov optimization transforms the long-term, stochastic energy minimization problem into a series of tractable, per-timeslot deterministic subproblems. Subsequently, DDPG is utilized to solve these subproblems by learning a model-free policy through environmental interaction. This policy maps system states to optimal continuous offloading and resource allocation decisions, aiming to minimize the Lyapunov-derived “drift-plus-penalty” term. The simulation outcomes indicate that, compared to several baseline and leading algorithms, the proposed LyDDPG algorithm reduces the total system energy consumption by at least 16% while simultaneously maintaining low task latency and ensuring system stability. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

Back to TopTop