The final, formatted version of the article will be published soon.
EDITORIAL article
Front. Comput. Sci.
Sec. Networks and Communications
Volume 7 - 2025 |
doi: 10.3389/fcomp.2025.1566353
This article is part of the Research Topic Machine Learning for Resource Management in Industrial Internet of Things View all 5 articles
Editorial: Machine learning for resource management in industrial Internet of Things
Provisionally accepted- 1 Linnaeus University, Växjö, Sweden
- 2 Polytechnique Montréal, Montreal, Quebec, Canada
Recent advances in the Industrial Internet of Things (IIoT) field have seen significant growth in the last couple of years. IoT is revolutionizing manufacturing, transportation, oil \& gas, and logistics sectors. However, developing IIoT applications poses several challenges, including the limited computational, memory, and energy resources of IoT devices. These devices generate a large amount of data at the network edge, making cloud-based processing impractical due to bandwidth constraints, latency, and security risks. Edge computing, which brings data processing closer to the source, offers a viable solution to these challenges. Despite its promise, edge computing faces significant hurdles. One of the primary challenges lies in the diversity of sensor types deployed across different environments, which adds complexity to the system's architecture.Furthermore, the large-scale deployment of edge devices and the inherent resource constraints of these devices complicate the task of optimizing performance. Machine learning has emerged as a powerful tool to address these issues, particularly in domains like robotics and natural language processing, where it helps optimize task allocation, improve decision-making processes, and enhance the overall efficiency of edge systems. This Research Topic features four articles that explore diverse and cutting-edge applications within the IIoT, including resource management and enhancing security in IoT systems. The first article, \textit{"An enhanced whale optimization algorithm for task scheduling in edge computing environments"} by \href{https://doi.org/10.3389/fdata.2024.1422546} {Han et al.}, focuses on addressing the challenges in real-time execution due to limited resources in edge computing environments. The authors proposed an enhanced whale optimization algorithm incorporating a multi-objective model considering CPU, memory, time, and resource utilization for optimizing task scheduling in edge computing. By leveraging chaotic mapping and a nonlinear convergence factor, the algorithm balances local and global search, significantly reducing costs (by 29.22\%), completion time (by 17.04\%), and improving resource utilization (by 9.5\%). This work significantly addresses the increasing demand for real-time processing capabilities in resource-constrained edge environments.The second contribution is the comprehensive review titled \textit {"Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies"} by \href{https://doi.org/10.3389/fcomp.2024.1420680}{Kaur et al.}, which examines the security challenges posed by the increasing complexity of IoT environments. The authors identified key security threats, including spoofing, distributed denial of service, and man-in-the-middle attacks. This paper reviews various mitigation strategies such as machine learning, deep learning, lightweight encryption, intrusion detection systems, and advanced security protocols. The evaluation of IoT technology, the accompanying security progress, and the need for continued development are discussed. The paper also identifies IoT's application areas, such as healthcare, smart cities, smart homes, and industrial IoT, highlighting specific security challenges each faces. This review provides valuable insights into current vulnerabilities and presents strategies that could significantly enhance the resilience and security of IIoT systems. In the third article, \textit {"'Below 58 BPM,' involving real-time monitoring and self-medication practices in music performance through IoT technology"} by \href{https://doi.org/10.3389/fcomp.2024.1187933}{Merendino et al.}, the authors explored the development of an Internet of Musical Things system designed to assist an opera singer with a carotid aneurysm during performances. This system monitors the singer's heart rate in real-time and promotes self-healing by providing non-intrusive feedback. The project combined healthcare and performance arts to help the singer manage stress. The system is an example of "inclusive design," presenting a model for integrating assistive technology into arts. The project focuses on accessibility and environmental sustainability, and the results showed it could potentially reduce heart rate peaks during performances. Finally, the fourth article, \textit {"GPS-free synchronized pseudo-random number generators for internet-of-things"} by \href{https://doi.org/10.3389/fcomp.2023.1157629}{Rahman and Chakrabartty (2023)} introduces a security solution to IoT device's wireless communication without relying on GPS. The conventional random number generator (RNG) based approach is unsuitable for resource-constrained IoT devices due to their limited energy and computational capabilities. The authors propose an architecture utilizing a synchronized pseudo-random number generator (SPRNG) that combines a fast linear-feedback-shift-register (LFSR)-based PRNG with a secure seed generator using self-powered timers. These timers operate based on quantum-mechanical tunneling, making them tamper-resistant and able to provide dynamic seeds that enhance the randomness of the output. The SPRNG system facilitates the secure exchange of encryption keys between IoT devices using synchronized timers. The National Institute of Standards and Technology conducted the random number tests and validated this approach. This approach is suitable for use in resource-constrained and adversarial environments, with potential applications ranging from healthcare to military-grade IoT systems.The research presented in this topic drives advancements in IIoT across various industries. From task scheduling and security to real-time monitoring and secure communication, the articles exemplify the breadth of research addressing critical challenges in the field. By providing solutions that improve efficiency, enhance security, and address domain-specific needs, this Research Topic lays the groundwork for future innovations that will further transform IIoT systems.
Keywords: Internet of Things, resource management, machine learning, IoT applications, Industrial IoT
Received: 24 Jan 2025; Accepted: 03 Feb 2025.
Copyright: © 2025 Musaddiq, Azam, Olsson and Ahlgren. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Arslan Musaddiq, Linnaeus University, Växjö, Sweden
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.