{"title":"PD-DRL: Towards privacy-preserving and energy-sustainable UAV crowdsensing","authors":"Xiaohui Chen , Kaimin Wei , Jinpeng Chen , Yongdong Wu","doi":"10.1016/j.iot.2025.101520","DOIUrl":"10.1016/j.iot.2025.101520","url":null,"abstract":"<div><div>Due to the high altitude advantage of unmanned aerial vehicles (UAVs), UAV crowdsensing has been extensively utilized in smart cities and harsh environments. However, UAVs have limited operational duration owing to energy constraints, dramatically diminishing their working efficiency. Moreover, their flight data is recorded and transmitted in unencrypted text, making it vulnerable to privacy breaches. We propose a privacy-preserving dual-model deep reinforcement learning approach (PD-DRL) to end it. It not only adaptively employs contextual knowledge to switch flight modes to enhance UAVs’ working efficiency but also safeguards the confidentiality of sensitive information during model training. PD-DRL consists of privacy-preserving deep reinforcement learning (P-DRL) and dual-model deep reinforcement learning (D-DRL). The former may integrate two distinct policies to switch between data collection and charging modes adaptively, hence optimizing the UAVs’ flight route. The latter can produce synthetic data to replace raw data during model training, thereby protecting the privacy of sensitive information. Ultimately, we conduct security discussions and comprehensive experiments to assess the effectiveness of PD-DRL. The discussion and experimental results demonstrate that PD-DRL surpasses other comparative algorithms, confirming its efficacy and safety.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101520"},"PeriodicalIF":6.0,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuzzy-based System for assessment of relational trust in IoT and social networks","authors":"Shunya Higashi , Phudit Ampririt , Ermioni Qafzezi , Makoto Ikeda , Keita Matsuo , Leonard Barolli","doi":"10.1016/j.iot.2025.101528","DOIUrl":"10.1016/j.iot.2025.101528","url":null,"abstract":"<div><div>In modern digital ecosystems, trust plays a critical role in ensuring secure and reliable interactions across various entities, including humans and machines. As technologies such as 5G wireless networks and the Internet of Things (IoT) drive unprecedented complexity in these environments, the demand for flexible and effective trust evaluation systems has grown exponentially. This paper presents a Fuzzy-based System for Assessment of Relational Trust (FSART), which utilizes fuzzy logic to evaluate trust levels between entities. We implemented two models (FSARTM1 and FSARTM2) considering three parameters: Influence (If), Importance (Ip), and Similarity (Sm) for FSARTM1, while for FSARTM2 we considered Reputation (Rp) as an additional parameter. The simulation results indicate that increasing the values of these parameters leads to a corresponding increase in Relational Trust (RT). For FSARTM1, when Ip is 0.9, all RT values exceed 0.5, while in FSARTM2 when If is 0.9 and moderate values of other parameters, RT consistently remains above 0.5. These results suggest that FSARTM2 provides a more accurate assessment by incorporating Rp, making it a more robust tool for trust evaluation in complex digital ecosystems, including social media, collaborative environments, and IoT systems.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101528"},"PeriodicalIF":6.0,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Ali , Yasir Saleem , Sadaf Hina , Ghalib A. Shah
{"title":"DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer","authors":"Muhammad Ali , Yasir Saleem , Sadaf Hina , Ghalib A. Shah","doi":"10.1016/j.iot.2025.101527","DOIUrl":"10.1016/j.iot.2025.101527","url":null,"abstract":"<div><div>The widespread adoption of Internet of Things (IoT) devices has introduced numerous vulnerabilities, particularly in firmware over-the-air (OTA) updates. These updates are essential for improving device functionality and addressing security vulnerabilities. However, they have increasingly become the focus of distributed denial of service (DDoS) attacks designed to disrupt the update process. Historically, the infamous Mirai botnet and its variants have exploited IoT vulnerabilities to carry out successful DDoS attacks. In recent years, deep learning models, especially Vision Transformers, have gained significant attention due to their exceptional performance in image classification tasks. To optimize detection and alert mechanisms, this novel study proposes a DDoSViT framework. This Vision Transformer (ViT)-based multi-vector DDoS and DoS attack detection framework converts attack flows into images and trains Vision Transformers on an attack image dataset. To validate the proposed framework, this study extensively reviewed diverse datasets and selected CICIoT2023 and CICIoMT2024 datasets ensuring these contain real-world attack scenarios and multi-vector real attacks. The proposed methodology and rigorous experimentation demonstrated 99.50% accuracy in multi-class classification across 23 different variants of DDoS and DoS attacks, outperforming contemporary models. The model’s performance was assessed using metrics such as accuracy, precision, recall, and F1-score. This research provides significant benefits to security practitioners and administrators, offering reduced false positives and reliable alerts during firmware over-the-air updates in IoT-edge devices.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101527"},"PeriodicalIF":6.0,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143377135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amara Riaz , Waseem Iqbal , Faiz Ul Islam , Madiha Hassan , Rabiya Tariq , Abdellah Chehri , Ahmad Fayyaz Madni
{"title":"S2H-securing smart homes: A blockchain-based preservation approach","authors":"Amara Riaz , Waseem Iqbal , Faiz Ul Islam , Madiha Hassan , Rabiya Tariq , Abdellah Chehri , Ahmad Fayyaz Madni","doi":"10.1016/j.iot.2025.101523","DOIUrl":"10.1016/j.iot.2025.101523","url":null,"abstract":"<div><div>Smart home systems are becoming more prevalent and popular in modern society, as they can provide convenience, comfort, and efficiency to the users. The proliferation of the Internet of Things (IoT) creates a network of interconnected devices generating vast amounts of data in real-world applications like smart cities, connected appliances, and supply chain management. This growth necessitates addressing challenges related to data security, integrity, and regulatory frameworks for emerging applications and integrations. However, traditional smart home systems are susceptible to intrusion and hacking. Transmission between devices and central systems can be intercepted or personal data can be misused. Since these systems rely on cloud services or central servers, they face risk of centralized data breaches, single points of failure, and control. Smart home systems also face other issues with include scalability, privacy, interoperability, and security. Furthermore, the users have limited control over their devices and data. Blockchain technology offers a potential solution for securing and preserving user and data integrity in a decentralized manner. Hyperledger Fabric, a permissioned blockchain platform, stands out for its open-source nature, modular architecture, and high performance, making it a versatile tool for addressing these concerns within the smart home IoT domain. In this research paper, a blockchain-enabled architecture based on Hyperledger Fabric is presented to address the data security and integrity challenges associated with the smart home IoT. A new architecture is introduced to enable this integration, and is developed and deployed, and its performance is analyzed in various scenarios. The evaluation results demonstrate that the proposed solutions outperform the existing solutions and is feasible and effective over the existing solutions.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101523"},"PeriodicalIF":6.0,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143349495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianshuai Zheng , Ye Du , Kaisheng Hua , Xuesong Wu , Shaosui Yuan , Xiaolong Wang , Qifang Chen , Jinglei Tan
{"title":"Predictive analytics for cyber-attack timing in power Internet of Things: A FlipIt game-theoretic approach","authors":"Tianshuai Zheng , Ye Du , Kaisheng Hua , Xuesong Wu , Shaosui Yuan , Xiaolong Wang , Qifang Chen , Jinglei Tan","doi":"10.1016/j.iot.2025.101522","DOIUrl":"10.1016/j.iot.2025.101522","url":null,"abstract":"<div><div>The Power Internet of Things is increasingly challenged by complex security threats, which highlights the importance of developing predictive models for attack behaviors and implementing targeted defensive measures. In response to the challenges of traditional network attack predictors, which fail to forecast attack times, and the lack of integration of attack–defense confrontation processes in these methods, this paper proposes a novel method based on FlipIt games. This method not only aims to predict the timing of attacks but also considers the dynamic nature of attack–defense confrontations, adaptively suggesting defense strategies. The paper constructs a strategy evolution probability model for both attackers and defenders based on the infectious disease model and analyzes the interactive process of confrontation between them. It then establishes a network attack time prediction model based on FlipIt games and proposes an attack time strategy prediction algorithm that incorporates exponential probability distribution into the revenue calculation process to predict the timing of network attacks. Finally, by setting up simulation environments and conducting simulations using MATLAB, the proposed model is verified to effectively analyze the attack time of the virus and provide corresponding defense strategies in real-time. In the process of attack and defense, to achieve optimal attack benefits, attackers should prioritize selecting low-frequency and low-cost attack strategies.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101522"},"PeriodicalIF":6.0,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-based obstacle avoidance and navigation for UGVs in wooded environments using adaptive fuzzy artificial potential field","authors":"Cheng-Jian Lin , Bing-Hong Chen , Jyun-Yu Jhang","doi":"10.1016/j.iot.2025.101524","DOIUrl":"10.1016/j.iot.2025.101524","url":null,"abstract":"<div><div>Internet of Things (IoT) applications are increasingly popular, but data collection can be challenging. Unmanned ground vehicles (UGVs) are a practical solution, but navigation control remains difficult. In this study, we develop a framework based on IoT and adaptive fuzzy artificial potential field (AFAPF) for obstacle avoidance and navigation applications in wooded environments. A UGV was deployed in a wooded area with dense obstacles, and light detection and ranging (LiDAR) was used to scan its environment. The proposed IoT-based UGV framework comprises an integrated monitoring platform, an NVIDIA Jetson AGX Xavier, a global positioning system, LiDAR, the AFAPF algorithm, a battery, and a UGV control system; together, these ensure the stable movement of the UGV in unknown environments. In the proposed AFAPF obstacle avoidance method, the distance between the UGV and an obstacle and the density of the LiDAR point cloud representing an obstacle are input to an adaptive fuzzy decision-making method, which adjusts the expansion radius of each obstacle. This enables the UGV to immediately and effectively avoid obstacles. In experiments conducted in two wooded environments unknown by the UGV, the proposed AFAPF method reduced navigation time and driving distance by an average of 17.62 % and 14.87 %, respectively, compared with a comparable nonfuzzy method.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101524"},"PeriodicalIF":6.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143222784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TinyResViT: A lightweight hybrid deep learning model for on-device corn leaf disease detection","authors":"Van-Linh Truong-Dang, Huy-Tan Thai, Kim-Hung Le","doi":"10.1016/j.iot.2025.101495","DOIUrl":"10.1016/j.iot.2025.101495","url":null,"abstract":"<div><div>The increasing prevalence of corn leaf diseases poses a significant threat to global food security, necessitating efficient and accurate detection methods. To address this challenge, we introduce TinyResViT, a lightweight yet efficient hybrid deep learning model designed by combining Residual Network (ResNet) and Vision Transformer (ViT) for leaf disease detection. This combination leverages the strengths of ResNet in extracting local features and ViT in capturing global interactions among features. In addition, a novel downsampling block connecting ResNet and ViT is proposed to eliminate redundant model weights. The evaluation results on the PlantVillage and Bangladeshi Crops Disease datasets show TinyResViT’s superior performance, achieving F1-scores of 97.92% and 99.11%, respectively. The model also maintains a high processing speed of 83.19 Frames Per Second (FPS) and a low computational cost of 1.59 Giga Floating Point Operations (GFLOPs), outperforming existing deep neural networks and state-of-the-art approaches.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101495"},"PeriodicalIF":6.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143222781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rolden John Fereira , Chathurika Ranaweera , Kevin Lee , Jean-Guy Schneider
{"title":"Energy efficient resource management for real-time IoT applications","authors":"Rolden John Fereira , Chathurika Ranaweera , Kevin Lee , Jean-Guy Schneider","doi":"10.1016/j.iot.2025.101515","DOIUrl":"10.1016/j.iot.2025.101515","url":null,"abstract":"<div><div>The Internet of Things (IoT) has a large and rapidly expanding number of deployed devices, which leads to a significant global energy consumption footprint. Diverse IoT use cases, including smart cities, smart grids, Industry 5.0, eHealth, and autonomous vehicles, are contributing to this increase in energy consumption. Optimising energy utilisation is crucial to sustaining the exponential growth of IoT applications, which demand stringent delays and latencies measured in milliseconds and microseconds. There are additional complexities with the emergence of edge, fog, and cloud computing and the need to manage the energy consumption at all the layers. In this paper, mechanisms that can be used to minimise energy consumption within an edge–fog–cloud IoT architecture for real-time IoT applications are being proposed. We investigate mechanisms for optimal node selection, primarily focusing on minimising energy usage while adhering to the Quality of Service (QoS) requirements of various IoT requests. The mechanisms include genetic, modified genetic, and delay-aware algorithms tailored explicitly for real-time IoT applications. We evaluated the proposed mechanisms using a simulation of diverse network scenarios. The results presented in the paper provide insight into balancing processing time and energy efficiency, which are critical considerations in sustainably developing IoT applications in an edge–fog–cloud IoT architecture.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101515"},"PeriodicalIF":6.0,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Miguel Aragón-Jurado, Juan Carlos de la Torre, Patricia Ruiz, Bernabé Dorronsoro
{"title":"Automatic software tailoring for Green Internet of Things","authors":"José Miguel Aragón-Jurado, Juan Carlos de la Torre, Patricia Ruiz, Bernabé Dorronsoro","doi":"10.1016/j.iot.2025.101521","DOIUrl":"10.1016/j.iot.2025.101521","url":null,"abstract":"<div><div>The proliferation of low-capacity, interconnected Internet of Things devices has increased the need for energy efficient software. Optimizing software performance for specific hardware requires tailored code transformations, as universal compiler optimizations are insufficient. Moreover, the diversity of devices and the software running on them requires automating this process. This work presents a novel combinatorial optimization problem focused on minimizing software energy consumption for specific hardware, and a methodology for solving it that accounts for system uncertainty. Additionally, a novel device for measuring the energy consumption during run time is introduced. This meter synchronizes with the experiments, enabling the automatic optimization of software as a combinatorial optimization problem. Specifically, the problem involves finding an LLVM transformation sequence that minimizes energy consumption during software execution. In our experiments, we considered two different software benchmarks and two embedded devices, using a cellular genetic algorithm to optimize them, alongside five state-of-the-art approaches to manage uncertainty. Our results demonstrate that the proposed methodology successfully overcomes uncertainty, leading to greener solutions with improvements of up to 62.29% in run time and up to 58.21% in energy consumption, outperforming the best generic compilation flags by up to 32.12% in run time and 27.84% in energy consumption.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101521"},"PeriodicalIF":6.0,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143223142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Cecílio , Alan Oliveira de Sá , Georg Jäger , André Souto , António Casimiro
{"title":"LWSEE: Lightweight Secured Software-Based Execution Environment","authors":"José Cecílio , Alan Oliveira de Sá , Georg Jäger , André Souto , António Casimiro","doi":"10.1016/j.iot.2025.101513","DOIUrl":"10.1016/j.iot.2025.101513","url":null,"abstract":"<div><div>The Internet of Things (IoT) has become increasingly prevalent and used to handle sensitive and critical data. This demands mechanisms to ensure data security, protect privacy, and promote the general safety of IoT-based systems. Currently, hardware-based trusted execution environments (TEEs) are used to provide data protection, but they are not suitable for low-cost devices lacking hardware-assisted security features. To address this issue, this paper proposes a Lightweight Secured Software-based Execution Environment (LWSEE) for embedded devices. LWSEE is designed to be supported by low-cost, low-end devices without specific hardware requirements. It consists of a lightweight distributed solution that offers protection against hardware attacks, provides a comprehensive security check mechanism, enables secure application execution, and supports secure application updates to ensure the continued security of IoT devices. LWSEE comprises a secure architecture and communication protocol specially tailored to devices with constrained resources. Our experimental evaluation underlines the minimal overhead introduced by LWSEE while showing its performance in terms of execution time, CPU time, and memory usage. We examine the flexibility and adaptability of LWSEE by demonstrating that it can be configured to achieve minimal overhead (<em>e.g.</em>, <span><math><mrow><mn>39</mn><mo>.</mo><mn>8</mn></mrow></math></span> ms per message for the general integrity verification of a node). This approach enables IoT devices to remain secure without dedicated hardware, allowing for the widespread adoption of IoT technology while maintaining data safety.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"30 ","pages":"Article 101513"},"PeriodicalIF":6.0,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143223144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}