Journal Description
IoT
IoT
is an international, peer-reviewed, open access journal on Internet of Things (IoT) published quarterly online by MDPI.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions
- High Visibility: indexed within Scopus, EBSCO, and other databases.
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 16.3 days after submission; acceptance to publication is undertaken in 5.9 days (median values for papers published in this journal in the second half of 2022).
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
Latest Articles
Performance Modeling and Optimization for a Fog-Based IoT Platform
IoT 2023, 4(2), 183-201; https://doi.org/10.3390/iot4020010 - 02 Jun 2023
Abstract
►
Show Figures
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters.
[...] Read more.
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design method, are expected to provide a useful reference for the design and evaluation of fog computing systems.
Full article
Open AccessReview
IoT Health Devices: Exploring Security Risks in the Connected Landscape
by
, , , , and
IoT 2023, 4(2), 150-182; https://doi.org/10.3390/iot4020009 - 25 May 2023
Abstract
►▼
Show Figures
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in
[...] Read more.
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.
Full article

Figure 1
Open AccessArticle
Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0
IoT 2023, 4(2), 131-149; https://doi.org/10.3390/iot4020008 - 10 May 2023
Abstract
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier
[...] Read more.
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems.
Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
Secure Adaptive Context-Aware ABE for Smart Environments
IoT 2023, 4(2), 112-130; https://doi.org/10.3390/iot4020007 - 20 Apr 2023
Abstract
►▼
Show Figures
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today’s increasing security risks in the emerging cloud
[...] Read more.
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today’s increasing security risks in the emerging cloud technologies, which share massive data capabilities and impose regulation requirements on privacy, as well as the emergence of new multiuser, multiprofile, and multidevice technologies, there is a growing need for new approaches to address the new challenges of autonomous context awareness and its fine-grained security-enforcement models. The solutions proposed in this work aim to extend our previous LCA-ABE work to provide an intelligent, dynamic creation of context-aware policies, which has been achieved through deploying smart-learning techniques. It also provides data consent, automated access control, and secure end-to-end communications by leveraging attribute-based encryption (ABE). Moreover, our policy-driven orchestration model is able to achieve an efficient, real-time enforcement of authentication and authorization (AA) as well as federation services between users, service providers, and connected devices by aggregating, modelling, and reasoning context information and then updating consent accordingly in autonomous ways. Furthermore, our framework ensures that the accuracy of our algorithms is above 90% and their precision is around 85%, which is considerably high compared to the other reviewed approaches. Finally, the solution fulfills the newly imposed privacy regulations and leverages the full power of IoT smart environments.
Full article

Figure 1
Open AccessArticle
A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic
by
and
IoT 2023, 4(2), 95-111; https://doi.org/10.3390/iot4020006 - 12 Apr 2023
Abstract
►▼
Show Figures
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express
[...] Read more.
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a certain degree of order. However, with the increasing complexity of networks and the diversity of attack types, existing studies use a single entropy, which does not discriminate correctly between attacks and normal traffic and may lead to false positives. In this paper, we propose new state determination standards that use the normal distribution characteristics of the entropy value at the time which an attack did not occur, subdivide the normal and abnormal range represented by the entropy value, improving the accuracy of attack determination. Furthermore, we show the effectiveness of the proposed method by numerical analysis.
Full article

Figure 1
Open AccessArticle
Evaluating Consumer Behavior, Decision Making, Risks, and Challenges for Buying an IoT Product
IoT 2023, 4(2), 78-94; https://doi.org/10.3390/iot4020005 - 25 Mar 2023
Abstract
►▼
Show Figures
Home appliance manufacturers have been adding Wi-Fi modules and sensors to devices to make them ‘smart’ since the early 2010s. However, consumers are still largely unaware of what kind of sensors are used in these devices. In fact, they usually do not even
[...] Read more.
Home appliance manufacturers have been adding Wi-Fi modules and sensors to devices to make them ‘smart’ since the early 2010s. However, consumers are still largely unaware of what kind of sensors are used in these devices. In fact, they usually do not even realize that smart devices require an interaction of hardware and software since the smart device software is not immediately apparent. In this paper, we explore how providing additional information on these misunderstood smart device features (such as lists of sensors, software updates, and warranties) can influence consumers’ purchase decisions. We analyze how additional information on software update warranty (SUW) and the type of sensors in smart devices (which draw attention to potential financial and privacy risks) mediates consumer purchase behavior. We also examine how other moderators, such as brand trust and product price, affect consumers’ purchase decisions when considering which smart product option to buy. In the first qualitative user study, we conducted interviews with 20 study participants, and the results show that providing additional information about software updates and lists of sensors had a significant impact on consumer purchase preference. In our second quantitative study, we surveyed 323 participants to determine consumers’ willingness to pay for a SUW. From this, we saw that users were more willing to pay for Lifetime SUW on a smart TV than to pay for a 5-year SUW. These results provide important information to smart device manufacturers and designers on elements that improve trust in their brand, thus increasing the likelihood that consumers will purchase their smart devices. Furthermore, addressing the general consumer smart device knowledge gap by providing this relevant information could lead to a significant increase in consumer adoption of smart products overall, which would benefit the industry as a whole.
Full article

Figure 1
Open AccessArticle
Convolutional Neural Network-Based Low-Powered Wearable Smart Device for Gait Abnormality Detection
IoT 2023, 4(2), 57-77; https://doi.org/10.3390/iot4020004 - 23 Mar 2023
Abstract
►▼
Show Figures
Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the need for surgery or cortisone injections. Traditional gait analysis
[...] Read more.
Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the need for surgery or cortisone injections. Traditional gait analysis methods are expensive and only available in laboratory settings, but new wearable technologies such as AI and IoT-based devices, smart shoes, and insoles have the potential to make gait analysis more accessible, especially for people who cannot easily access specialized facilities. This research proposes a novel approach using IoT, edge computing, and tiny machine learning (TinyML) to predict gait patterns using a microcontroller-based device worn on a shoe. The device uses an inertial measurement unit (IMU) sensor and a TinyML model on an advanced RISC machines (ARM) chip to classify and predict abnormal gait patterns, providing a more accessible, cost-effective, and portable way to conduct gait analysis.
Full article

Figure 1
Open AccessEditorial
Acknowledgment to the Reviewers of IoT in 2022
IoT 2023, 4(1), 56; https://doi.org/10.3390/iot4010003 - 25 Feb 2023
Abstract
High-quality academic publishing is built on rigorous peer review [...]
Full article
Open AccessArticle
Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)
IoT 2023, 4(1), 27-55; https://doi.org/10.3390/iot4010002 - 06 Feb 2023
Cited by 2
Abstract
►▼
Show Figures
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart
[...] Read more.
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.
Full article

Figure 1
Open AccessArticle
Ultra-Low-Power Architecture for the Detection and Notification of Wildfires Using the Internet of Things
by
IoT 2023, 4(1), 1-26; https://doi.org/10.3390/iot4010001 - 25 Jan 2023
Cited by 1
Abstract
►▼
Show Figures
Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to a central monitoring station with
[...] Read more.
Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to a central monitoring station with smartphone notifications in a real-time setting. This action helps in the early detection of a fire and firefighters can be notified immediately—thus the spread of the fire and the harm caused by it can be reduced. The proposed system detects fires from the presence of smoke and a sudden increase in temperature. The system also logs the temperature, humidity, carbon dioxide, rain, light, and wind speed in different areas of the forest. The sensor nodes transmit the data to a hub using a long-range wireless transmitter and the hub then sends the data to the central monitoring station using the cellular Internet. The sensor nodes and hub are designed with ultra-low-power hardware and software architecture, consuming current of only 0.37 and 1.4 mA, respectively, so that they can be powered by solar panels throughout the year. The central server and smartphone app contain maps, and the wildfire locations are marked in the case of a fire. In the present study, a prototype of the proposed system is successfully developed and tested.
Full article

Figure 1
Open AccessArticle
Performance Analysis of OPC UA for Industrial Interoperability towards Industry 4.0
by
and
IoT 2022, 3(4), 507-525; https://doi.org/10.3390/iot3040027 - 19 Dec 2022
Cited by 1
Abstract
►▼
Show Figures
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management
[...] Read more.
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management level. Due to its highly scalable and interoperable architecture, it is well-positioned for future deployment in smart embedded devices towards Industry 4.0, especially in environments where there are heterogeneous communication nodes. In this paper, we aim to evaluate the performance of OPC UA for communication in Industrial Internet of Things (IIoT) environments to better understand the technical implementation of OPC UA and the feasibility of incorporating OPC UA directly to resource-constrained edge devices. We propose an architectural system framework for OPC UA performance evaluation across a wide range of experiments. Our experimental results demonstrated the efficacy of the proposed system and evaluation framework. The OPC UA-based IIoT system architecture and budget-friendly/cost-effective testbed setup can be flexibly adopted for protocol testing, prototyping and educational purposes.
Full article

Figure 1
Open AccessArticle
Defining and Assessing Quality in IoT Environments: A Survey
IoT 2022, 3(4), 493-506; https://doi.org/10.3390/iot3040026 - 07 Dec 2022
Abstract
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems,
[...] Read more.
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, traffic monitoring, etc., human feedback can be limited or infeasible. Moreover, for immersive augmented and virtual reality, as well as other mulsemedia applications, the evaluation in terms of quality cannot only focus on the sight and hearing senses. Therefore, the traditional QoE definition and approaches for evaluating multimedia services might not be suitable for the IoT paradigm, and more quality metrics are required in order to evaluate the quality in IoT. In this paper, we review existing quality definitions, quality influence factors (IFs) and assessment approaches for IoT. This paper also introduces challenges in the area of quality assessment for the IoT paradigm.
Full article
(This article belongs to the Special Issue Advanced Quality of Service Approaches in Edge Computing)
►▼
Show Figures

Figure 1
Open AccessArticle
Optimizing Trajectory and Dynamic Data Offloading Using a UAV Access Platform
IoT 2022, 3(4), 473-492; https://doi.org/10.3390/iot3040025 - 24 Nov 2022
Abstract
►▼
Show Figures
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The
[...] Read more.
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The proposed approach consists of an access platform called Access UAV (A_UAV) that stochastically coordinates the data collection from the Inspection-UAVs (I_UAVs) equipped with a visual sensor to relay the same to the cloud. Our approach jointly considers the trajectory optimization of A_UAV and the stability of the data queues at each UAV. In particular, the Distance and Access Latency Aware Trajectory (DLAT) optimization for A_UAVs is developed, which generates a fair access schedule for I_UAVs. Moreover, a Lyapunov-based online optimization ensures the system stability of the average queue backlogs for dynamic data collection while minimizing total system energy. Coordination between I_UAV and A_UAV is achieved through a message-based mechanism. The simulation results validate the performance of our proposed approach against several baselines under different parameter settings.
Full article

Figure 1
Open AccessArticle
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
by
and
IoT 2022, 3(4), 450-472; https://doi.org/10.3390/iot3040024 - 23 Nov 2022
Cited by 4
Abstract
►▼
Show Figures
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart
[...] Read more.
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.
Full article

Figure 1
Open AccessArticle
Transient Analysis of a Finite Queueing System with Bulk Arrivals in IoT-Based Edge Computing Systems
IoT 2022, 3(4), 435-449; https://doi.org/10.3390/iot3040023 - 17 Nov 2022
Abstract
►▼
Show Figures
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model
[...] Read more.
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model is carried out and the transient analytical solution to the system is derived with a group of recursive coefficients by using the ordinary differential equations (ODEs) technique. From which the steady-state probabilities are solved. Then, some performance metrics of interest are derived along with numerical results. Although the paper is initiated from the IoT based edge computing platform, the proposed system modeling and analysis method can be extended to more general situations such as telecommunication, manufacturing, transportation, and many other areas that are closely related to people’s daily lives.
Full article

Figure 1
Open AccessReview
A Holistic Overview of the Internet of Things Ecosystem
by
, , , , and
IoT 2022, 3(4), 398-434; https://doi.org/10.3390/iot3040022 - 26 Oct 2022
Cited by 1
Abstract
►▼
Show Figures
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past
[...] Read more.
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past decade. The total number of installed connected devices is expected to grow exponentially in the near future, since more and more domains are looking for IoT solutions. As a consequence, an increasing number of developers are approaching IoT technology for the first time. Unfortunately, the number of IoT-related studies published every year is becoming huge, with the obvious consequence that it would be impossible for anyone to predict the time that could be necessary to find a paper talking about a given problem at hand. This is the reason why IoT-related discussions have become predominant in various practitioners’ forums, which moderate thousands of posts each month. The present paper’s contribution is twofold. First, it aims at providing a holistic overview of the heterogeneous IoT world by taking into account a technology perspective and a business perspective. For each topic taken into account, a tutorial introduction (deliberately devoid of technical content to make this document within the reach of non-technical readers as well) is provided. Then, a table of very recent review papers is given for each topic, as the result of a systematic mapping study.
Full article

Figure 1
Open AccessArticle
Performance Evaluation of Federated Learning for Residential Energy Forecasting
IoT 2022, 3(3), 381-397; https://doi.org/10.3390/iot3030021 - 19 Sep 2022
Cited by 1
Abstract
Short-term energy-consumption forecasting plays an important role in the planning of energy production, transportation and distribution. With the widespread adoption of decentralised self-generating energy systems in residential communities, short-term load forecasting is expected to be performed in a distributed manner to preserve privacy
[...] Read more.
Short-term energy-consumption forecasting plays an important role in the planning of energy production, transportation and distribution. With the widespread adoption of decentralised self-generating energy systems in residential communities, short-term load forecasting is expected to be performed in a distributed manner to preserve privacy and ensure timely feedback to perform reconfiguration of the distribution network. In this context, edge computing is expected to be an enabling technology to ensure decentralized data collection, management, processing and delivery. At the same time, federated learning is an emerging paradigm that fits naturally in such an edge-computing environment, providing an AI-powered and privacy-preserving solution for time-series forecasting. In this paper, we present a performance evaluation of different federated-learning configurations resulting in different privacy levels to the forecast residential energy consumption with data collected by real smart meters. To this aim, different experiments are run using Flower (a popular federated learning framework) and real energy consumption data. Our results allow us to demonstrate the feasibility of such an approach and to study the trade-off between data privacy and the accuracy of the prediction, which characterizes the quality of service of the system for the final users.
Full article
(This article belongs to the Special Issue Advanced Quality of Service Approaches in Edge Computing)
►▼
Show Figures

Figure 1
Open AccessArticle
An Application of IoT in a Drone Inspection Service for Environmental Control
by
, , , , , and
IoT 2022, 3(3), 366-380; https://doi.org/10.3390/iot3030020 - 30 Aug 2022
Abstract
This paper presents an exploratory activity with a drone inspection service for environmental control. The aim of the service is to provide technical support to decision-makers in environmental risk management. The proposed service uses IoT for the interaction between a mobile application, a
[...] Read more.
This paper presents an exploratory activity with a drone inspection service for environmental control. The aim of the service is to provide technical support to decision-makers in environmental risk management. The proposed service uses IoT for the interaction between a mobile application, a Smart City platform, and an Unmanned Aircraft System (UAS). The mobile application allows the users to report risky situations, such as fire ignition, spills of pollutants in water, or illegal dumping; the user has only to specify the class of the event, while the geographical coordinates are automatically taken from device-integrated GPS. The message sent from the mobile application arrives to a Smart City platform, which shows all the received alerts on a 3D satellite map, to support decision-makers in choosing where a drone inspection is required. From the Smart City platform, the message is sent to the drone service operator; a CSV file defining the itinerary of the drone is automatically built and shown through the platform; the drone starts the mission providing a video, which is used by the decision-makers to understand whether the situation calls for immediate action. An experimental activity in an open field was carried out to validate the whole chain, from the alert to the drone mission, enriched by a Smart City platform to enable a decision-maker to better manage the situation.
Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAV) and IoT)
►▼
Show Figures

Figure 1
Open AccessReview
A Survey of Security Architectures for Edge Computing-Based IoT
IoT 2022, 3(3), 332-365; https://doi.org/10.3390/iot3030019 - 30 Jun 2022
Cited by 9
Abstract
►▼
Show Figures
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the
[...] Read more.
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
Full article

Figure 1
Open AccessArticle
Expert Demand for Consumer Sleep Technology Features and Wearable Devices: A Case Study
IoT 2022, 3(2), 315-331; https://doi.org/10.3390/iot3020018 - 08 Jun 2022
Cited by 4
Abstract
Global demand for sleep-tracking wearables, or consumer sleep technologies (CSTs), is steadily increasing. CST marketing campaigns often advertise the scientific merit of devices, but these claims may not align with consensus opinion from sleep research experts. Consensus opinion about CST features has not
[...] Read more.
Global demand for sleep-tracking wearables, or consumer sleep technologies (CSTs), is steadily increasing. CST marketing campaigns often advertise the scientific merit of devices, but these claims may not align with consensus opinion from sleep research experts. Consensus opinion about CST features has not previously been established in a cohort of sleep researchers. This case study reports the results of the first survey of experts in real-world sleep research and a hypothetical purchase task (HPT) to establish economic valuation for devices with different features by price. Forty-six (N = 46) respondents with an average of 10 ± 6 years’ experience conducting research in real-world settings completed the online survey. Total sleep time was ranked as the most important measure of sleep, followed by objective sleep quality, while sleep architecture/depth and diagnostic information were ranked as least important. A total of 52% of experts preferred wrist-worn devices that could reliably determine sleep episodes as short as 20 min. The economic value was greater for hypothetical devices with a longer battery life. These data set a precedent for determining how scientific merit impacts the potential market value of a CST. This is the first known attempt to establish a consensus opinion or an economic valuation for scientifically desirable CST features and metrics using expert elicitation.
Full article
(This article belongs to the Special Issue Future of Business Revolution by Internet of Business (IoB))
►▼
Show Figures

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Future Internet, IoT, JSAN, Sensors
Advanced Signal Processing and Data Analysis for Smart IoT Ecosystems
Topic Editors: Ying-Ren Chien, Mu Zhou, Liang-Hung Wang, Xun ZhangDeadline: 31 July 2023
Topic in
Energies, Sensors, Electronics, Smart Cities, IoT
IoT for Energy Management Systems and Smart Cities
Topic Editors: Antonio Cano-Ortega, Francisco Sánchez-SutilDeadline: 30 August 2023
Topic in
AI, Electronics, IoT, JSAN, Remote Sensing, Sensors
Machine Learning in Internet of Things
Topic Editors: Dawid Połap, Robertas Damasevicius, Hafiz Tayyab RaufDeadline: 31 December 2023

Conferences
Special Issues
Special Issue in
IoT
5G Mobile Communication for Intelligent Applications
Guest Editor: Morshed U. ChowdhuryDeadline: 30 June 2023
Special Issue in
IoT
Cloud and Edge Computing Systems for IoT
Guest Editors: Arun Ravindran, Reshmi MitraDeadline: 31 July 2023