Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (647)

Search Parameters:
Keywords = critical IoT systems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 4934 KiB  
Article
Implementing a Wide-Area Network and Low Power Solution Using Long-Range Wide-Area Network Technology
by Floarea Pitu and Nicoleta Cristina Gaitan
Technologies 2025, 13(1), 36; https://doi.org/10.3390/technologies13010036 - 16 Jan 2025
Viewed by 139
Abstract
In recent decades, technology has undergone significant transformations, aimed at optimizing and enhancing the quality of human life. A prime example of this progress is the Internet of Things (IoT) technology. Today, the IoT is widely applied across diverse sectors, including logistics, communications, [...] Read more.
In recent decades, technology has undergone significant transformations, aimed at optimizing and enhancing the quality of human life. A prime example of this progress is the Internet of Things (IoT) technology. Today, the IoT is widely applied across diverse sectors, including logistics, communications, agriculture, education, and infrastructure, demonstrating its versatility and profound relevance in various domains. Agriculture has historically been a fundamental sector for meeting humanity’s basic needs, and it is indispensable for survival and development. A critical factor in this regard is climatic and meteorological conditions directly influencing agricultural productivity. Therefore, real-time monitoring and analysis of these variables becomes imperative for optimizing production and reducing vulnerability to climate change. This paper presents the development and implementation of a low-power wide-area network (LPWAN) solution using LoRaWAN (long-range wide-area network) technology, designed for real-time environmental monitoring in agricultural applications. The system consists of energy-efficient end nodes and a custom-configured gateway, designed to optimize data transmission and power consumption. The end nodes integrate advanced sensors for temperature, humidity, and pressure, ensuring accurate data collection. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

21 pages, 3280 KiB  
Article
Autonomous, Multisensory Soil Monitoring System
by Valentina-Daniela Băjenaru, Simona-Elena Istrițeanu and Paul-Nicolae Ancuța
AgriEngineering 2025, 7(1), 18; https://doi.org/10.3390/agriengineering7010018 - 15 Jan 2025
Viewed by 207
Abstract
The research investigates the advantages of real-time soil quality monitoring for various land management applications. We emphasize the crucial role of soil modeling and mapping by visualizing and understanding aridity trends across different regions. The primary objective is to develop an innovative soil [...] Read more.
The research investigates the advantages of real-time soil quality monitoring for various land management applications. We emphasize the crucial role of soil modeling and mapping by visualizing and understanding aridity trends across different regions. The primary objective is to develop an innovative soil monitoring system utilizing Internet of Things (IoT) technology. This system, equipped with intelligent sensors, will operate autonomously, collecting real-time data to identify key trends in soil conditions. Our system employs smart soil sensors to measure macronutrient values up to a depth of 80 cm. These sensors will transmit data wirelessly. Laboratory research involved a two-month evaluation of the system’s performance across three distinct soil types collected from diverse geographical locations. Analysis of the three soil types yielded a model accuracy estimate of 0.01. A strong positive linear correlation (0.92) between moisture and macronutrients has been observed in two out of the three soil types. The results, particularly related to soil moisture, were averaged over the testing period. While precipitation values were not directly integrated into the modeling framework, they were calculated in l/m2 to ensure accurate real-time estimates. The need for such advanced monitoring systems is critical for optimizing key soil macronutrients and enabling spatiotemporal mapping. This information is essential for developing effective strategies to mitigate soil aridification and prevent desertification. Full article
(This article belongs to the Section Sensors Technology and Precision Agriculture)
Show Figures

Figure 1

17 pages, 389 KiB  
Review
A Comprehensive Review of Wind Power Prediction Based on Machine Learning: Models, Applications, and Challenges
by Zongxu Liu, Hui Guo, Yingshuai Zhang and Zongliang Zuo
Energies 2025, 18(2), 350; https://doi.org/10.3390/en18020350 - 15 Jan 2025
Viewed by 398
Abstract
Wind power prediction is essential for ensuring the stability and efficient operation of modern power systems, particularly as renewable energy integration continues to expand. This paper presents a comprehensive review of machine learning techniques applied to wind power prediction, emphasizing their advantages over [...] Read more.
Wind power prediction is essential for ensuring the stability and efficient operation of modern power systems, particularly as renewable energy integration continues to expand. This paper presents a comprehensive review of machine learning techniques applied to wind power prediction, emphasizing their advantages over traditional physical and statistical models. Machine learning methods, especially deep learning approaches such as Convolutional Neural Networks (CNNs), Long Short-Term Memory Networks (LSTMs), and ensemble learning techniques like XGBoost, excel in addressing the nonlinearity and complexity of wind power data. The review also explores critical aspects such as data preprocessing, feature selection strategies, and model optimization techniques, which significantly enhance prediction accuracy and robustness. Challenges such as data acquisition difficulties, complex terrain influences, and sensor quality issues are examined in depth, with proposed solutions discussed. Additionally, the paper highlights future research directions, including the potential of multi-model fusion, emerging deep learning technologies like Transformers, and the integration of smart sensors and IoT technologies to develop intelligent, automated, and reliable prediction systems. By addressing existing challenges and leveraging advanced machine learning techniques, this work provides valuable insights into the current state of wind power prediction research and offers strategic guidance for enhancing the applicability and reliability of prediction models in practical scenarios. Full article
(This article belongs to the Special Issue Studies on Clean and Sustainable Energy Utilization)
Show Figures

Figure 1

33 pages, 1886 KiB  
Article
Hybrid Plant Growth: Integrating Stochastic, Empirical, and Optimization Models with Machine Learning for Controlled Environment Agriculture
by Nezha Kharraz and István Szabó
Agronomy 2025, 15(1), 189; https://doi.org/10.3390/agronomy15010189 - 14 Jan 2025
Viewed by 302
Abstract
Controlled Environment Agriculture (CEA) offers a viable solution for sustainable crop production, yet the optimization of the latter requires precise modeling and resource management. This study introduces a novel hybrid plant growth model integrating stochastic, empirical, and optimization approaches, using Internet of Things [...] Read more.
Controlled Environment Agriculture (CEA) offers a viable solution for sustainable crop production, yet the optimization of the latter requires precise modeling and resource management. This study introduces a novel hybrid plant growth model integrating stochastic, empirical, and optimization approaches, using Internet of Things sensors for real-time data collection. Unlike traditional methods, the hybrid model systematically captures environmental variability, simulates plant growth dynamics, and optimizes resource inputs. The prototype growth chamber, equipped with IoT sensors for monitoring environmental parameters such as light intensity, temperature, CO2, humidity, and water intake, was primarily used to provide accurate input data for the model and specifically light intensity, water intake and nutrient intake. While experimental tests on lettuce were conducted to validate initial environmental conditions, this study was focused on simulation-based analysis. Specific tests simulated plant responses to varying levels of light, water, and nutrients, enabling the validation of the proposed hybrid model. We varied light durations between 6 and 14 h/day, watering levels between 5 and 10 L/day, and nutrient concentrations between 3 and 11 g/day. Additional simulations modeled different sowing intervals to capture internal plant variability. The results demonstrated that the optimal growth conditions were 14 h/day of light, 9 L/day of water, and 5 g/day of nutrients; maximized plant biomass (200 g), leaf area (800 cm2), and height (90 cm). Key novel metrics developed in this study, the Growth Efficiency Ratio (GER) and Plant Growth Index (PGI), provided solid tools for evaluating plant performance and resource efficiency. Simulations showed that GER peaked at 0.6 for approximately 200 units of combined inputs, beyond which diminishing returns were observed. PGI increased to 0.8 to day 20 and saturated to 1 by day 30. The role of IoT sensors was critical in enhancing model accuracy and replicability by supplying real-time data on environmental variability. The hybrid model’s adaptability in the future may offer scalability to diverse crop types and environmental settings, establishing a foundation for its integration into decision-support systems for large-scale indoor farming. Full article
(This article belongs to the Special Issue Application of Internet of Things in Agroecosystems)
16 pages, 581 KiB  
Article
Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
by Alaa T. Al Ghazo, Mohammed Abu Mallouh, Sa’ed Alajlouni and Islam T. Almalkawi
Appl. Syst. Innov. 2025, 8(1), 11; https://doi.org/10.3390/asi8010011 - 14 Jan 2025
Viewed by 411
Abstract
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become [...] Read more.
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become more interconnected and digital. This paper introduces a novel Lightweight Industrial IoT Authentication (LI2A) method as a solution to address security concerns in the industrial sector and smart city infrastructure. Mutual authentication, authenticated message integrity, key agreement, soundness, forward secrecy, resistance to a variety of assaults, and minimal resource consumption are all features offered by LI2A. Critical to CPS operations, the approach prevents impersonation, man-in-the-middle, replay, eavesdropping, and modification assaults, according to a security study. The method proposed herein ensures the integrity of CPS networks by verifying communication reliability, identifying unauthorized message modifications, establishing a shared session key between users and IIoT devices, and periodically updating keys to ensure sustained security. A comprehensive assessment of performance takes into account each aspect of storage, communication, and computation. The communication and computing capabilities of LI2A, which are critical for the operation of CPS infrastructure, are demonstrated through comparisons with state-of-the-art systems from the literature. LI2A can be implemented in resource-constrained IIoT devices found in CPS and industrial environments, according to the results. By integrating IIoT devices into critical processes in CPS, it is possible to enhance security while also promoting urban digitalization and sustainability. Full article
(This article belongs to the Special Issue Industrial Cybersecurity)
Show Figures

Figure 1

19 pages, 3986 KiB  
Article
DAE-BiLSTM Model for Accurate Diagnosis of Bearing Faults in Escalator Principal Drive Systems
by Xiyang Jiang, Zhuangzhuang Zhang, Hongbing Yuan, Jing He and Yifei Tong
Processes 2025, 13(1), 202; https://doi.org/10.3390/pr13010202 - 13 Jan 2025
Viewed by 419
Abstract
The extensive deployment of escalators has greatly improved travel convenience; however, significant concerns have been raised due to the increasing frequency of safety incidents in recent years. Ensuring the safe operation of escalators and detecting faults in a timely manner have become critical [...] Read more.
The extensive deployment of escalators has greatly improved travel convenience; however, significant concerns have been raised due to the increasing frequency of safety incidents in recent years. Ensuring the safe operation of escalators and detecting faults in a timely manner have become critical concerns for both manufacturers and maintenance personnel. Traditional periodic inspections are resource-intensive and increasingly deemed inadequate due to the growing diversity and number of escalators. In this article, a data acquisition and transmission system for the main drive shaft bearing of the escalator, based on the Internet of Things (IoT), is designed using the main drive shaft bearing as an example. Additionally, a fault classification model combining a deep autoencoder (DAE) and Bidirectional Long Short-Term Memory Network (BiLSTM) is proposed. The experimental results of this study demonstrate that the DAE-BiLSTM-based fault diagnosis model provides accurate fault detection and early warnings, achieving an accuracy rate exceeding 99%, while significantly reducing the computational costs and training time. Full article
(This article belongs to the Special Issue AI-Supported Methods and Process Modeling in Smart Manufacturing)
Show Figures

Figure 1

21 pages, 799 KiB  
Article
Advancing Sustainable Infrastructure Management: Insights from System Dynamics
by Julio Juarez-Quispe, Erick Rojas-Chura, Alain Jorge Espinoza Vigil, Milagros Socorro Guillén Málaga, Oscar Yabar-Ardiles, Johan Anco-Valdivia and Sebastián Valencia-Félix
Buildings 2025, 15(2), 210; https://doi.org/10.3390/buildings15020210 - 12 Jan 2025
Viewed by 467
Abstract
Rapid infrastructure growth in developing countries has intensified environmental challenges due to cost-prioritizing practices over sustainability. This study evaluates 21 identified sustainable-driving tools to improve the management of infrastructure throughout its life cycle, by interacting with 20 out of 36 key infrastructure system [...] Read more.
Rapid infrastructure growth in developing countries has intensified environmental challenges due to cost-prioritizing practices over sustainability. This study evaluates 21 identified sustainable-driving tools to improve the management of infrastructure throughout its life cycle, by interacting with 20 out of 36 key infrastructure system management variables (ISMVs). Using a systems thinking approach, a Sustainable Systems Dynamic Model (SSDM) is developed, comprising a nucleus representing the interconnected stages of the life cycle: planning and design (S1), procurement (S2), construction (S3), operation and maintenance (S4), and renewal and disposal (S5). The model incorporates a total of 12 balance (B) and 25 reinforcement (R) loops, enabling the visualization of critical interdependencies that influence the sustainability of the system. In addition, its analysis shows the interdependencies between variables and stages, demonstrating, for example, how the implementation of tools such as LCA, BIM, and Circular Economy principles in S1, or IoT and SHM in S4, significantly improve sustainability. A gap between theory and practice in the adoption of sustainable practices is identified, which is aggravated by the lack of knowledge in specific developing countries’ context. Hence, this study contributes to its closure by offering a model that facilitates the understanding of key interactions in infrastructure systems. Full article
Show Figures

Figure 1

41 pages, 6955 KiB  
Article
Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution
by Elmin Marevac, Esad Kadušić, Nataša Živić, Nevzudin Buzađija and Samir Lemeš
Future Internet 2025, 17(1), 23; https://doi.org/10.3390/fi17010023 - 7 Jan 2025
Viewed by 394
Abstract
Embedded systems, particularly when integrated into the Internet of Things (IoT) landscape, are critical for projects requiring robust, energy-efficient interfaces to collect real-time data from the environment. As these systems become complex, the need for dynamic reconfiguration, improved availability, and stability becomes increasingly [...] Read more.
Embedded systems, particularly when integrated into the Internet of Things (IoT) landscape, are critical for projects requiring robust, energy-efficient interfaces to collect real-time data from the environment. As these systems become complex, the need for dynamic reconfiguration, improved availability, and stability becomes increasingly important. This paper presents the design of a framework architecture that supports dynamic reconfiguration and “on-the-fly” code execution in IoT-enabled embedded systems, including a virtual machine capable of hot reloads, ensuring system availability even during configuration updates. A “hardware-in-the-loop” workflow manages communication between the embedded components, while low-level coding constraints are accessible through an additional abstraction layer, with examples such as MicroPython or Lua. The study results demonstrate the VM’s ability to handle serialization and deserialization with minimal impact on system performance, even under high workloads, with serialization having a median time of 160 microseconds and deserialization having a median of 964 microseconds. Both processes were fast and resource-efficient under normal conditions, supporting real-time updates with occasional outliers, suggesting room for optimization and also highlighting the advantages of VM-based firmware update methods, which outperform traditional approaches like Serial and OTA (Over-the-Air, the ability to update or configure firmware, software, or devices via wireless connection) updates by achieving lower latency and greater consistency. With these promising results, however, challenges like occasional deserialization time outliers and the need for optimization in memory management and network protocols remain for future work. This study also provides a comparative analysis of currently available commercial solutions, highlighting their strengths and weaknesses. Full article
Show Figures

Figure 1

36 pages, 543 KiB  
Review
Defense and Security Mechanisms in the Internet of Things: A Review
by Sabina Szymoniak, Jacek Piątkowski and Mirosław Kurkowski
Appl. Sci. 2025, 15(2), 499; https://doi.org/10.3390/app15020499 - 7 Jan 2025
Viewed by 479
Abstract
The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. [...] Read more.
The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. While several surveys have addressed these aspects, there remains a lack of understanding of integrating all potential defense mechanisms, such as intrusion detection systems (IDSs), anomaly detection frameworks, and authentication protocols, into a comprehensive security framework. To overcome this, the following survey aims to critically review existing security mechanisms in IoT environments and significantly fill these gaps. In particular, this paper reviews state-of-the-art approaches for intrusion detection, key agreement protocols, and anomaly detection systems, pointing out their advantages and disadvantages and identifying the gaps in each field requiring more research. We identify innovative strategies by systematically analysing existing approaches and propose a roadmap for enhancing IoT security. This work contributes to the field by offering a fresh perspective on defense mechanisms and delivering actionable insights for researchers and practitioners securing IoT ecosystems. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

32 pages, 1774 KiB  
Review
Carbon Footprint Management with Industry 4.0 Technologies and Erp Systems in Sustainable Manufacturing
by Yüksel Yurtay
Appl. Sci. 2025, 15(1), 480; https://doi.org/10.3390/app15010480 - 6 Jan 2025
Viewed by 513
Abstract
The urgency of addressing climate change has amplified the need for sustainable manufacturing practices. This review explores the integration of carbon footprint management and energy efficiency strategies within Industry 4.0 technologies and ERP systems, emphasizing their role in achieving environmental sustainability. Despite the [...] Read more.
The urgency of addressing climate change has amplified the need for sustainable manufacturing practices. This review explores the integration of carbon footprint management and energy efficiency strategies within Industry 4.0 technologies and ERP systems, emphasizing their role in achieving environmental sustainability. Despite the increasing interest in these domains, the literature reveals critical gaps, particularly in the application of Industry 4.0 technologies—such as IoT, big data analytics, and AI—for effective carbon management and sustainable manufacturing. Furthermore, the limited exploration of ERP systems in tracking, analyzing, and optimizing carbon emissions across supply chains highlights another under-researched area. This paper systematically reviews recent advancements, methodologies, and implementation challenges, categorizing findings under energy efficiency strategies, green supply chain management, and digital transformation for carbon reduction. The study identifies opportunities for real-time monitoring, predictive analytics, and cross-sector collaborations while addressing obstacles such as high initial costs, data integration complexities, and the lack of regulatory frameworks. By bridging these research gaps, this paper contributes a comprehensive understanding of how Industry 4.0 technologies and ERP systems can transform carbon footprint management, providing actionable insights for academia, policymakers, and industry practitioners aiming to align with global sustainability goals. Full article
(This article belongs to the Section Green Sustainable Science and Technology)
Show Figures

Figure 1

39 pages, 7224 KiB  
Article
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
by Nouman Imtiaz, Abdul Wahid, Syed Zain Ul Abideen, Mian Muhammad Kamal, Nabila Sehito, Salahuddin Khan, Bal S. Virdee, Lida Kouhalvandi and Mohammad Alibakhshikenari
Photonics 2025, 12(1), 35; https://doi.org/10.3390/photonics12010035 - 3 Jan 2025
Viewed by 562
Abstract
The widespread use of the Internet of Things (IoT) has led to significant breakthroughs in various fields but has also exposed critical vulnerabilities to evolving cybersecurity threats. Current Intrusion Detection Systems (IDSs) often fail to provide real-time detection, scalability, and interpretability, particularly in [...] Read more.
The widespread use of the Internet of Things (IoT) has led to significant breakthroughs in various fields but has also exposed critical vulnerabilities to evolving cybersecurity threats. Current Intrusion Detection Systems (IDSs) often fail to provide real-time detection, scalability, and interpretability, particularly in high-speed optical network environments. This research introduces XIoT, which is a novel explainable IoT attack detection model designed to address these challenges. Leveraging advanced deep learning methods, specifically Convolutional Neural Networks (CNNs), XIoT analyzes spectrogram images transformed from IoT network traffic data to detect subtle and complex attack patterns. Unlike traditional approaches, XIoT emphasizes interpretability by integrating explainable AI mechanisms, enabling cybersecurity analysts to understand and trust its predictions. By offering actionable insights into the factors driving its decision making, XIoT supports informed responses to cyber threats. Furthermore, the model’s architecture leverages the high-speed, low-latency characteristics of optical networks, ensuring the efficient processing of large-scale IoT data streams and supporting real-time detection in diverse IoT ecosystems. Comprehensive experiments on benchmark datasets, including KDD CUP99, UNSW NB15, and Bot-IoT, demonstrate XIoT’s exceptional accuracy rates of 99.34%, 99.61%, and 99.21%, respectively, significantly surpassing existing methods in both accuracy and interpretability. These results highlight XIoT’s capability to enhance IoT security by addressing real-world challenges, ensuring robust, scalable, and interpretable protection for IoT networks against sophisticated cyber threats. Full article
(This article belongs to the Special Issue Optical Wireless Communication in 5G and Beyond)
Show Figures

Figure 1

22 pages, 1153 KiB  
Review
Energy Inefficiency in IoT Networks: Causes, Impact, and a Strategic Framework for Sustainable Optimisation
by Ziyad Almudayni, Ben Soh, Halima Samra and Alice Li
Electronics 2025, 14(1), 159; https://doi.org/10.3390/electronics14010159 - 2 Jan 2025
Viewed by 537
Abstract
The Internet of Things (IoT) has vast potential to drive connectivity and automation across various sectors, yet energy inefficiency remains a critical barrier to achieving sustainable, high-performing networks. This study aims to identify and address the primary causes of energy wastage in IoT [...] Read more.
The Internet of Things (IoT) has vast potential to drive connectivity and automation across various sectors, yet energy inefficiency remains a critical barrier to achieving sustainable, high-performing networks. This study aims to identify and address the primary causes of energy wastage in IoT systems, proposing a framework to optimise energy consumption and improve overall system performance. A comprehensive literature review was conducted, focusing on studies from 2010 onwards across major databases, resulting in the identification of eleven key factors driving energy inefficiency: offloading, scheduling, latency, changing topology, load balancing, node deployment, resource management, congestion, clustering, routing, and limited bandwidth. The impact of each factor on energy usage was analysed, leading to a proposed framework that incorporates optimised communication protocols (such as CoAP and MQTT), adaptive fuzzy logic systems, and bio-inspired algorithms to streamline resource management and enhance network stability. This framework presents actionable strategies to improve IoT energy efficiency, extend device lifespan, and reduce operational costs. By addressing these energy inefficiency challenges, this study provides a path forward for more sustainable IoT systems, emphasising the need for continued research into experimental validations, context-aware solutions, and AI-driven energy management to ensure scalable and resilient IoT deployment. Full article
Show Figures

Figure 1

35 pages, 641 KiB  
Article
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection
by Promise Ricardo Agbedanu, Shanchieh Jay Yang, Richard Musabe, Ignace Gatare and James Rwigema
Sensors 2025, 25(1), 216; https://doi.org/10.3390/s25010216 - 2 Jan 2025
Viewed by 459
Abstract
The Internet of Things (IoT) and Industrial Internet of Things (IIoT) have drastically transformed industries by enhancing efficiency and flexibility but have also introduced substantial cybersecurity risks. The rise of zero-day attacks, which exploit unknown vulnerabilities, poses significant threats to these interconnected systems. [...] Read more.
The Internet of Things (IoT) and Industrial Internet of Things (IIoT) have drastically transformed industries by enhancing efficiency and flexibility but have also introduced substantial cybersecurity risks. The rise of zero-day attacks, which exploit unknown vulnerabilities, poses significant threats to these interconnected systems. Traditional signature-based intrusion detection systems (IDSs) are insufficient for detecting such attacks due to their reliance on pre-defined attack signatures. This study investigates the effectiveness of Adaptive SAMKNN, an adaptive k-nearest neighbor with self-adjusting memory (SAM), in detecting and responding to various attack types in Internet of Things (IoT) environments. Through extensive testing, our proposed method demonstrates superior memory efficiency, with a memory footprint as low as 0.05 MB, while maintaining high accuracy and F1 scores across all datasets. The proposed method also recorded a detection rate of 1.00 across all simulated zero-day attacks. In scalability tests, the proposed technique sustains its performance even as data volume scales up to 500,000 samples, maintaining low CPU and memory consumption. However, while it excels under gradual, recurring, and incremental drift, its sensitivity to sudden drift highlights an area for further improvement. This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. Our proposed method has the potential to significantly increase the security of IoT and IIoT environments by enabling the real-time, scalable, and efficient detection of sophisticated cyber threats, thereby safeguarding critical interconnected systems against emerging vulnerabilities. Full article
(This article belongs to the Special Issue Network Security in the Internet of Things)
Show Figures

Figure 1

21 pages, 2475 KiB  
Article
Optimization of Energy Consumption in Voice Assistants Through AI-Enabled Cache Implementation: Development and Evaluation of a Metric
by Alber Oswaldo Montoya Benitez, Álvaro Suárez Sarmiento, Elsa María Macías López and Jorge Herrera-Ramirez
Technologies 2025, 13(1), 19; https://doi.org/10.3390/technologies13010019 - 2 Jan 2025
Viewed by 555
Abstract
Intelligent systems developed under the Internet of Things (IoT) paradigm offer solutions for various social and productive scenarios. Voice assistants (VAs), as part of IoT-based systems, facilitate task execution in a simple and automated manner, from entertainment to critical activities. Lithium batteries often [...] Read more.
Intelligent systems developed under the Internet of Things (IoT) paradigm offer solutions for various social and productive scenarios. Voice assistants (VAs), as part of IoT-based systems, facilitate task execution in a simple and automated manner, from entertainment to critical activities. Lithium batteries often power these devices. However, their energy consumption can be high due to the need to remain in continuous listening mode and the time it takes to search for and deliver responses from the Internet. This work proposes the implementation of a VA through Artificial Intelligence (AI) training and using cache memory to minimize response time and reduce energy consumption. First, the difference in energy consumption between VAs in active and passive states is experimentally verified. Subsequently, a communication architecture and a model representing the behavior of VAs are presented, from which a metric is developed to evaluate the energy consumption of these devices. The cache-enabled prototype shows a reduction in response time and energy expenditure (comparing the results of cloud-based VA and cache-based VA), several times lower according to the developed metric, demonstrating the effectiveness of the proposed system. This development could be a viable solution for areas with limited power sources, low coverage, and mobility situations that affect internet connectivity. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

34 pages, 2190 KiB  
Review
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
by Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb, Reema Thabit, Gamal Alkawsi, Jamil Abedalrahim Jamil Alsayaydeh and AbdulGuddoos S. A. Gaid
Energies 2025, 18(1), 141; https://doi.org/10.3390/en18010141 - 1 Jan 2025
Viewed by 991
Abstract
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy [...] Read more.
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy systems, particularly the smart grid, these smart systems will continue to profoundly transform our way of life and the environment. Energy systems have improved over the past ten years in terms of intelligence, efficiency, decentralization, and ICT usage. On the other hand, cyber threats and attacks against these systems have greatly expanded as a result of the enormous spread of sensors and smart IoT devices inside the energy sector as well as traditional power grids. In order to detect and mitigate these vulnerabilities while increasing the security of energy systems and power grids, a thorough investigation and in-depth research are highly required. This study offers a comprehensive overview of state-of-the-art smart grid cybersecurity research. In this work, we primarily concentrate on examining the numerous threats and cyberattacks that have recently invaded the developing smart energy systems in general and smart grids in particular. This study begins by introducing smart grid architecture, it key components, and its security issues. Then, we present the spectrum of cyberattacks against energy systems while highlighting the most significant research studies that have been documented in the literature. The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. This cyberattack classification is covered thoroughly in this paper. This study also discusses the historical incidents against energy systems, which depicts how harsh and disastrous these attacks can go if not detected and mitigated. Finally, we provide a summary of the latest emerging future research trend and open research issues. Full article
(This article belongs to the Section A: Sustainable Energy)
Show Figures

Figure 1

Back to TopTop