IOT

headlines texts
03.03.2026
23:35 TechRadar.com Shark's new robot vacuum has a mopping feature I've never seen before — and it's not the only brand to level-up its mop setup

From UV lights to jukebox style mop dispensers, robo-mops are more advanced than ever.

Скрыть анонс
23:18 TheVerge.com Shark’s latest robot vacuum hunts stains with UV light

Shark’s newest robot vacuum uses a camera and UV light to detect stains. | Photo by Jennifer Pattison Tuohy / The Verge The Shark PowerDetect UV Reveal is SharkNinja's latest robot vacuum and mop. A flagship model with a multifunctional dock that empties the dustbin and refills and washes its mop, the Reveal's signature feature is a UV light designed to "find" stains on your floors. It costs $1,299.99 and is available now. Combined with an RGB camera to detect visible messes and obstacles, the UV light lets the vacuum spot stains that aren't visible under normal lighting, such as pet urine. When it encounters dirt, visible or not, the robot uses onboard AI to identify and decide how to clean it. Its cleaning tools include a vacuum with a single roller brus … Read the full story at The Verge.

Скрыть анонс
21:19 Mashable.com Clean up after your pets with $100 off the Bissell FlexClean FurForce Robot Vacuum and Mop

As of March 3, save $100 on the Bissell FlexClean FurForce Robot Vacuum and Mop

Скрыть анонс
20:16 Mashable.com Sharks new scrubbing-centric robot vacuum finds stains with a UV light. I tested it against other top robot mops.

The Shark UV Reveal can find dried stains that other robovacs miss. But at $1,299.99, its inability to mop large spills may be a dealbreaker.

Скрыть анонс
17:47 Cnet.com Shark's New Robot Vacuum Uses a Blacklight to See How Gross Your Floors Are

Shark's new robot vacuum is going to reveal your embarrassing secrets. It uses a UV light to detect old, dried-up stains.

Скрыть анонс
17:35 RoboHub.org Humanoid home robots are on the market – but do we really want them?

Courtesy of 1X. By Eduardo B. Sandoval, UNSW Sydney Last year, Norwegian-US tech company 1X announced a strange new product: “the world’s first consumer-ready humanoid robot designed to transform life at home”. Standing 168 centimetres tall and weighing in at 30 kilograms, the US$20,000 Neo bot promises to automate common household chores such as folding […]

Скрыть анонс
16:32 Zdnet.com I tested Shark's new robot vacuum and mop - and only one thing wasn't perfect

The Shark UV Reveal is ideal for mostly hard floors and obstacle avoidance. Plus: It's bagless.

Скрыть анонс
14:01 Bioengineer.org Integrating Biodiversity Targets into Smart Farming Policies

As the global population accelerates towards ten billion by mid-century, the urgent demand for more food production collides starkly with the imperative to conserve biodiversity. This growing tension challenges agricultural policies worldwide, urging a shift towards strategies that align food security with environmental sustainability. A pioneering article published in npj Sustainable Agriculture highlights a transformative […]

Скрыть анонс
13:40 DigitalTrends.com Gemini is getting smarter and a lot less annoying for smart home voice controls

Google is rolling out Gemini for Home updates that makes commands smarter and more accurate. The post Gemini is getting smarter and a lot less annoying for smart home voice controls appeared first on Digital Trends.

Скрыть анонс
13:37 Arxiv.org CS Resilient Chaotic Cross-Layer Routing for Smart Grid IoT Networks

arXiv:2603.02105v1 Announce Type: new Abstract: This paper presents the Distributed Adaptive Multi-Radio Cross-Layer Routing (DAMCR) protocol, designed to enhance reliability, adaptability, and energy efficiency in smart grid and industrial Internet of Things (IoT) communication networks. DAMCR integrates Chaotic Frequency-Hopping Spread Spectrum (C-FHSS) to improve physical-layer security and jamming resilience with Link-Adaptive Quality Power Control (LAQPC) to dynamically regulate transmission power based on instantaneous link quality and residual node energy. To meet heterogeneous traffic requirements, the protocol incorporates priority-aware message classification that differentiates between periodic monitoring data and time-critical fault and protection messages. The proposed framework is implemented and evaluated in MATLAB using a heterogeneous network composed of LoRa, Wi-Fi, and dual-radio nodes operating under AWGN, Rayleigh, and Rician fading environments. Extensive

Скрыть анонс
13:37 Arxiv.org CS Systematic Survey on Privacy-Preserving Architectures for IoT and Vehicular Data Sharing: Techniques, Challenges, and Future Directions

arXiv:2603.01876v1 Announce Type: new Abstract: The proliferation of IoT and V2X systems generates unprecedented sensitive data at the network edge, demanding privacy-preserving architectures that enable secure sharing without exposing raw information. Contemporary solutions face a fundamental privacy-efficiency-trust trilemma: achieving strong privacy guarantees, computational efficiency for resource-constrained devices, and decentralized trust simultaneously remains intractable with single-paradigm approaches. This survey systematically analyzes 75 technical papers (2007--2025) through a novel three-dimensional taxonomy classifying architectures into Decentralized Computation, Cryptography-based, and Distributed Ledger approaches. Temporal analysis reveals dramatic acceleration during 2024--2025, with 48% of all papers published in this period -- Decentralized Computation dominates at 44% of contributions and 59% of 2025 publications. Comprehensive Security Threat Mapping and

Скрыть анонс
13:37 Arxiv.org CS S5-HES Agent: Society 5.0-driven Agentic Framework to Democratize Smart Home Environment Simulation

arXiv:2603.01554v1 Announce Type: new Abstract: The smart home is a key domain within the Society 5.0 vision for a human-centered society. Smart home technologies rapidly evolve, and research should diversify while remaining aligned with Society 5.0 objectives. Democratizing smart home research would engage a broader community of innovators beyond traditional limited experts. This shift necessitates inclusive simulation frameworks that support research across diverse fields in industry and academia. However, existing smart home simulators require significant technical expertise, offer limited adaptability, and lack automated evolution, thereby failing to meet the holistic needs of Society 5.0. These constraints impede researchers from efficiently conducting simulations and experiments for security, energy, health, climate, and socio-economic research. To address these challenges, this paper presents the Society 5.0-driven Smart Home Environment Simulator Agent (S5-HES Agent), an

Скрыть анонс
13:25 Google news Health Google Home just announced a bunch of Gemini, smart home updates rolling out now - 9to5Google

Google Home just announced a bunch of Gemini, smart home updates rolling out now  9to5GoogleBig Google Home update lets Gemini describe live camera feeds  The VergeWhat’s New in Google Home: Expanded Triggers and Actions (March 2, 2026)  jetstream.blogGoogle fixes Gemini’s biggest Google Home frustrations  Android PoliceYour Google Home is about to get much better at listening and following orders (finally?!)  Android Authority

Скрыть анонс
13:25 Google news Sci/Tech Google Home just announced a bunch of Gemini, smart home updates rolling out now - 9to5Google

Google Home just announced a bunch of Gemini, smart home updates rolling out now  9to5GoogleBig Google Home update lets Gemini describe live camera feeds  The VergeWhat’s New in Google Home: Expanded Triggers and Actions (March 2, 2026)  jetstream.blogGoogle fixes Gemini’s biggest Google Home frustrations  Android PoliceYour Google Home is about to get much better at listening and following orders (finally?!)  Android Authority

Скрыть анонс
12:43 Mashable.com The Shark AV2501AE AI robot vacuum is $350 off at Amazon — buy now for $299.99

Get the best robot vacuum deal. Save 54% on the Shark AV2501AE AI at Amazon.

Скрыть анонс
12:11 Yahoo Finance Samsara (IOT) Expands IoT Portfolio With New Ultra-Compact Asset Tag XS and Enhanced Network Density

Скрыть анонс
10:33 Yahoo.com Business Samsara (IOT) Expands IoT Portfolio With New Ultra-Compact Asset Tag XS and Enhanced Network Density

Скрыть анонс
10:22 InsiderMonkey.com Samsara (IOT) Expands IoT Portfolio With New Ultra-Compact Asset Tag XS and Enhanced Network Density

Samsara Inc. (NYSE:IOT) is one of the stocks with explosive growth potential. On February 26, Samsara announced the launch of its latest-generation Asset Tag and the all-new, ultra-compact Asset Tag XS, designed to track high-value equipment of all sizes. These ruggedized devices are engineered for extreme environments, with the standard Asset Tag offering a six-year […]

Скрыть анонс
02.03.2026
23:16 9to5google.com Google Home just announced a bunch of Gemini, smart home updates rolling out now

Google has announced a number of updates to the Gemini for Home experience that include various fixes and improvements to voice controls for your smart home, addressing quite a few widespread and niche complaints. more…

Скрыть анонс
20:11 Zdnet.com What is Aliro? Everything you need to know about the new smart home standard for locks

A digital key standard from the folks that brought you Matter, Aliro introduces a universal system for smart locks. Here's how it will change your smart home.

Скрыть анонс
13:37 Mashable.com How AI is changing the modern smart home

AI continues to evolve alongside the modern smart home. Take a closer look at the latest ways to use AI at home to improve our quality of life

Скрыть анонс
09:17 Arxiv.org CS An Efficient Unsupervised Federated Learning Approach for Anomaly Detection in Heterogeneous IoT Networks

arXiv:2602.24209v1 Announce Type: new Abstract: Federated learning (FL) is an effective paradigm for distributed environments such as the Internet of Things (IoT), where data from diverse devices with varying functionalities remains localized while contributing to a shared global model. By eliminating the need to transmit raw data, FL inherently preserves privacy. However, the heterogeneous nature of IoT data, stemming from differences in device capabilities, data formats, and communication constraints, poses significant challenges to maintaining both global model performance and privacy. In the context of IoT-based anomaly detection, unsupervised FL offers a promising means to identify abnormal behavior without centralized data aggregation. Nevertheless, feature heterogeneity across devices complicates model training and optimization, hindering effective implementation. In this study we propose an efficient unsupervised FL framework that enhances anomaly detection by leveraging

Скрыть анонс
09:17 Arxiv.org CS SAILOR: A Scalable and Energy-Efficient Ultra-Lightweight RISC-V for IoT Security

arXiv:2602.24166v1 Announce Type: new Abstract: Recently, RISC-V has contributed to the development of IoT devices, requiring architectures that balance energy efficiency, compact area, and integrated security. However, most recent RISC-V cores for IoT prioritize either area footprint or energy efficiency, while adding cryptographic support further compromises compactness. As a result, truly integrated architectures that simultaneously optimize efficiency and security remain largely unexplored, leaving constrained IoT environments vulnerable to performance and security trade-offs. In this paper, we introduce SAILOR, an energy-efficient and scalable ultra-lightweight RISC-V core family for cryptographic applications in IoT. Our design is modular and spans 1-, 2-, 4-, 8-, 16-, and 32-bit serialized execution data-paths, prioritizing minimal area. This modular design and adaptable data-path minimizes the overhead of integrating RISC-V cryptography extensions, achieving low hardware cost

Скрыть анонс
09:17 Arxiv.org CS Unsupervised Baseline Clustering and Incremental Adaptation for IoT Device Traffic Profiling

arXiv:2602.24047v1 Announce Type: new Abstract: The growth and heterogeneity of IoT devices create security challenges where static identification models can degrade as traffic evolves. This paper presents a two-stage, flow-feature-based pipeline for unsupervised IoT device traffic profiling and incremental model updating, evaluated on selected long-duration captures from the Deakin IoT dataset. For baseline profiling, density-based clustering (DBSCAN) isolates a substantial outlier portion of the data and produces the strongest alignment with ground-truth device labels among tested classical methods (NMI 0.78), outperforming centroid-based clustering on cluster purity. For incremental adaptation, we evaluate stream-oriented clustering approaches and find that BIRCH supports efficient updates (0.13 seconds per update) and forms comparatively coherent clusters for a held-out novel device (purity 0.87), but with limited capture of novel traffic (share 0.72) and a measurable trade-off in

Скрыть анонс
09:17 Arxiv.org CS Exploring Robust Intrusion Detection: A Benchmark Study of Feature Transferability in IoT Botnet Attack Detection

arXiv:2602.23874v1 Announce Type: new Abstract: Cross-domain intrusion detection remains a critical challenge due to significant variability in network traffic characteristics and feature distributions across environments. This study evaluates the transferability of three widely used flow-based feature sets (Argus, Zeek and CICFlowMeter) across four widely used datasets representing heterogeneous IoT and Industrial IoT network conditions. Through extensive experiments, we evaluate in- and cross-domain performance across multiple classification models and analyze feature importance using SHapley Additive exPlanations (SHAP). Our results show that models trained on one domain suffer significant performance degradation when applied to a different target domain, reflecting the sensitivity of IoT intrusion detection systems to distribution shifts. Furthermore, the results evidence that the choice of classification algorithm and feature representations significantly impact transferability.

Скрыть анонс
09:17 Arxiv.org CS MI$^2$DAS: A Multi-Layer Intrusion Detection Framework with Incremental Learning for Securing Industrial IoT Networks

arXiv:2602.23846v1 Announce Type: new Abstract: The rapid expansion of Industrial IoT (IIoT) systems has amplified security challenges, as heterogeneous devices and dynamic traffic patterns increase exposure to sophisticated and previously unseen cyberattacks. Traditional intrusion detection systems often struggle in such environments due to their reliance on extensive labeled data and limited ability to detect new threats. To address these challenges, we propose MI$^2$DAS, a multi-layer intrusion detection framework that integrates anomaly-based hierarchical traffic pooling, open-set recognition to distinguish between known and unknown attacks and incremental learning for adapting to novel attack types with minimal labeling. Experiments conducted on the Edge-IIoTset dataset demonstrate strong performance across all layers. In the first layer, GMM achieves superior normal-attack discrimination (accuracy = 0.953, TPR = 1.000). In open-set recognition, GMM attains a recall of 0.813 for

Скрыть анонс
09:17 Arxiv.org CS Deep Sleep Scheduling for Satellite IoT via Simulation Based Optimization

arXiv:2602.23788v1 Announce Type: new Abstract: The Satellite Internet of Things (S-IoT) enables global connectivity for remote sensing devices that must operate energy-efficiently over long time spans. We consider an S-IoT system consisting of a sender-receiver pair connected by a data channel and a feedback channel and capture its dynamics using a Markov Decision Process (MDP). To extend battery life, the sender has to decide on deep-sleep durations. Deep-sleep scheduling is the primary lever to reduce energy consumption, since sleeping devices consume only a fraction of their idle power. By choosing its deep-sleep duration online, the sender has to find a trade-off between energy consumption and data quality degradation at the receiver, captured by a weighted sum of costs. We quantify data quality degradation via the recently introduced Goal-Oriented Tensor (GoT) metric, which can take both age and content of delivered data into account. We assume a Markovian observed process and

Скрыть анонс
02:44 SlashGear.com 12 Handy Gadgets Under $20 To Upgrade Your Smart Home

Upgrading your smart home doesn't have to cost an arm and a leg. In fact, it's easier than you think to find highly-rated smart gadgets under $20 each.

Скрыть анонс
01.03.2026
17:02 Gizmodo.com Dreame X60 Max Ultra Complete Review: $1,700 Worth of Robot Vacuum Problems

And its app is as cluttered as its name.

Скрыть анонс
04:52 9to5mac.com Indie App Spotlight: ‘Itsyhome’ adds smart home controls to your Mac’s menu bar

Welcome to Indie App Spotlight. This is a weekly 9to5Mac series where we showcase the latest apps in the indie app world. If you’re a developer and would like your app featured, get in contact. If you’re someone who spends a lot of time on their Mac, you might often find yourself wanting to control one of your lights, thermostats, or just check on your camera. At the same time, you might not love Apple’s Home app. Itsyhome adds all of the home controls you’ll need to your Mac’s menu bar – and it isn’t even HomeKit exclusive. It also supports Home Assistant, and has loads of useful features under the hood. more…

Скрыть анонс
00:41 TechRadar.com I'm a robot vacuum expert, and these are the 8 biggest misconceptions people have

Robot vacuums are getting a bad rap — let me set the record straight.

Скрыть анонс
28.02.2026
13:30 Mashable.com The new Eufy C28 is the most budget-friendly roller mop robot vacuum. I tried it against the top 2 in its class.

Compared to CES 2026 vacuums, Eufy's new roller mop vacuum combo would save you hundreds and space on the floor. But does it clean well enough?

Скрыть анонс
27.02.2026
09:53 Arxiv.org CS Doubly Adaptive Channel and Spatial Attention for Semantic Image Communication by IoT Devices

arXiv:2602.22794v1 Announce Type: new Abstract: Internet of Things (IoT) networks face significant challenges such as limited communication bandwidth, constrained computational and energy resources, and highly dynamic wireless channel conditions. Utilization of deep neural networks (DNNs) combined with semantic communication has emerged as a promising paradigm to address these limitations. Deep joint source-channel coding (DJSCC) has recently been proposed to enable semantic communication of images. Building upon the original DJSCC formulation, low-complexity attention-style architectures has been added to the DNNs for further performance enhancement. As a main hurdle, training these DNNs separately for various signal-to-noise ratios (SNRs) will amount to excessive storage or communication overhead, which can not be maintained by small IoT devices. SNR Adaptive DJSCC (ADJSCC), has been proposed to train the DNNs once but feed the current SNR as part of the data to the channel-wise

Скрыть анонс
09:53 Arxiv.org CS Systems-Level Attack Surface of Edge Agent Deployments on IoT

arXiv:2602.22525v1 Announce Type: new Abstract: Edge deployment of LLM agents on IoT hardware introduces attack surfaces absent from cloud-hosted orchestration. We present an empirical security analysis of three architectures (cloud-hosted, edge-local swarm, and hybrid) using a multi-device home-automation testbed with local MQTT messaging and an Android smartphone as an edge inference node. We identify five systems-level attack surfaces, including two emergent failures observed during live testbed operation: coordination-state divergence and induced trust erosion. We frame core security properties as measurable systems metrics: data egress volume, failover window exposure, sovereignty boundary integrity, and provenance chain completeness. Our measurements show that edge-local deployments eliminate routine cloud data exposure but silently degrade sovereignty when fallback mechanisms trigger, with boundary crossings invisible at the application layer. Provenance chains remain complete

Скрыть анонс
09:53 Arxiv.org CS Explainability-Aware Evaluation of Transfer Learning Models for IoT DDoS Detection Under Resource Constraints

arXiv:2602.22488v1 Announce Type: new Abstract: Distributed denial-of-service (DDoS) attacks threaten the availability of Internet of Things (IoT) infrastructures, particularly under resource-constrained deployment conditions. Although transfer learning models have shown promising detection accuracy, their reliability, computational feasibility, and interpretability in operational environments remain insufficiently explored. This study presents an explainability-aware empirical evaluation of seven pre-trained convolutional neural network architectures for multi-class IoT DDoS detection using the CICDDoS2019 dataset and an image-based traffic representation. The analysis integrates performance metrics, reliability-oriented statistics (MCC, Youden Index, confidence intervals), latency and training cost assessment, and interpretability evaluation using Grad-CAM and SHAP. Results indicate that DenseNet and MobileNet-based architectures achieve strong detection performance while

Скрыть анонс
26.02.2026
16:06 9to5mac.com Backed by Apple, Aliro 1.0 aims to do for enterprise access control what Matter did for the smart home

Enterprise access control is what I would consider “legacy” technology. A lot of the systems are Windows-based and look like a fancy Access database. On top of that, you are still dealing with physical cards. It is a fragmented mess for users and an onboarding nightmare for IT departments as well. Today, the Connectivity Standards Alliance is stepping in to fix that with the official release of the Aliro 1.0 specification aiming to create a standard for how mobile devices unlock doors, badge in, etc. more…

Скрыть анонс
14:12 Yahoo Finance Truist Lowers Samsara (IOT) to $30, Maintains Hold Rating

Скрыть анонс
25.02.2026
21:27 Mashable.com Make short work of tidying your home with 50% off the Shark AI Ultra Voice Control Robot Vacuum

As of Feb. 25, get the Shark AI Ultra Voice Control Robot Vacuum for half off at Amazon.

Скрыть анонс
08:22 Arxiv.org CS IoT-Driven Building Energy Management Systems (BEMS) for Net Zero Energy Buildings: Concept, Integration and Future Directions

arXiv:2602.20453v1 Announce Type: new Abstract: Construction and operating of buildings is one of the major contributors to global greenhouse emissions. With the inefficient usage of energy due to human behavior and manual operation, the energy consumption of buildings is further increased. These challenges highlight the need for improved Building Energy Management Systems (BEMS) integrated with Internet of Things (IoT) and data driven intelligence to enhance energy-efficiency in a building and contribute to Net-Zero Energy Buildings (NZEB) targets. This paper offers four keys contributions: i) a systematic review of IoT enabled BEMS including components, network architecture and functional capabilities, ii) an evaluation of real-world BEMS datasets to support Artificial Intelligence (AI) based predictive control, iii) an analysis of integration challenges related to interoperability, smart grids and net-zero energy strategies, and iv) a case study highlighting global best practices,

Скрыть анонс
05:35 InsiderMonkey.com Truist Lowers Samsara (IOT) to $30, Maintains Hold Rating

We recently published an article titled 13 Best Internet of Things (IoT) Stocks to Buy Now. On February 17, Truist lowered its price target on Samsara Inc. (NYSE:IOT) to $30 from $39 while maintaining a Hold rating as part of a broader fourth-quarter preview within the security software space. The firm noted that the broader […]

Скрыть анонс
24.02.2026
14:02 TechRadar.com This 'powerhouse' robot vacuum can clean even deep-pile carpets with ease — and it’s finally available in the UK

We rated this Roborock bot as one of the very best robot vacuums for carpet.

Скрыть анонс
13:50 Mashable.com Why does my robot vacuum suck now? Well, whens the last time you cleaned it?

If your robot vacuum is making a weird noise or just pushing dirt around, it might not be broken. It could just need a hygiene routine.

Скрыть анонс
10:57 Arxiv.org CS A Context-Aware Knowledge Graph Platform for Stream Processing in Industrial IoT

arXiv:2602.19990v1 Announce Type: new Abstract: Industrial IoT ecosystems bring together sensors, machines and smart devices operating collaboratively across industrial environments. These systems generate large volumes of heterogeneous, high-velocity data streams that require interoperable, secure and contextually aware management. Most of the current stream management architectures, however, still rely on syntactic integration mechanisms, which result in limited flexibility, maintainability and interpretability in complex Industry 5.0 scenarios. This work proposes a context-aware semantic platform for data stream management that unifies heterogeneous IoT/IoE data sources through a Knowledge Graph enabling formal representation of devices, streams, agents, transformation pipelines, roles and rights. The model supports flexible data gathering, composable stream processing pipelines, and dynamic role-based data access based on agents' contexts, relying on Apache Kafka and Apache Flink

Скрыть анонс
10:57 Arxiv.org CS Influence of Autoencoder Latent Space on Classifying IoT CoAP Attacks

arXiv:2602.18598v1 Announce Type: new Abstract: The Internet of Things (IoT) presents a unique cybersecurity challenge due to its vast network of interconnected, resource-constrained devices. These vulnerabilities not only threaten data integrity but also the overall functionality of IoT systems. This study addresses these challenges by exploring efficient data reduction techniques within a model-based intrusion detection system (IDS) for IoT environments. Specifically, the study explores the efficacy of an autoencoder's latent space combined with three different classification techniques. Utilizing a validated IoT dataset, particularly focusing on the Constrained Application Protocol (CoAP), the study seeks to develop a robust model capable of identifying security breaches targeting this protocol. The research culminates in a comprehensive evaluation, presenting encouraging results that demonstrate the effectiveness of the proposed methodologies in strengthening IoT cybersecurity

Скрыть анонс
09:32 Yahoo Finance Samsara Inc. (IOT): A Bull Case Theory

Скрыть анонс
23.02.2026
21:31 InsiderMonkey.com 13 Best Internet of Things (IoT) Stocks to Buy Now

In this article, we will discuss the 13 Best Internet of Things (IoT) Stocks to Buy Now. Investing in IoT stocks provides exposure to a rapidly expanding ecosystem powered by industrial automation, 5G connectivity, artificial intelligence, and smart infrastructure. With the global IoT market projected to roughly double in value by 2027, adoption is accelerating […]

Скрыть анонс
19:14 Mashable.com Your basic robot vacuum is no match for your shedding dog. This eufy is, and its $300 off.

As of Feb. 23, you can get the eufy E25 robot vacuum-mop combo for $599.99, down from $899.99, at Amazon. That's a 33% discount or $300 savings.

Скрыть анонс
03:06 InsiderMonkey.com Samsara Inc. (IOT): A Bull Case Theory 

We came across a bullish thesis on Samsara Inc. on T K’s Substack. In this article, we will summarize the bulls’ thesis on IOT. Samsara Inc.’s share was trading at $25.42 as of February 6th. IOT’s forward P/E was 44.25 according to Yahoo Finance. Samsara is the pioneer of the Connected Operations Cloud, providing a platform that allows […]

Скрыть анонс
20.02.2026
23:13 TechRadar.com Despite being designed to 'connect and just work', it turns out IKEA's new smart home sensors actually have some specific, confusing hub requirements

Those temptingly cheap sensors aren't quite such a bargain if you have to buy IKEA's own $109 / £60 hub to make them work.

Скрыть анонс
19:14 Mashable.com Snag this self-cleaning robot vacuum and mop combo for under $350

As of Feb. 20, you can get the eufy Omni C20 robot vacuum-mop for just $349.98 at Amazon, down from $599.99.

Скрыть анонс
14:27 Arxiv.org CS EDRP: Enhanced Dynamic Relay Point Protocol for Data Dissemination in Multi-hop Wireless IoT Networks

arXiv:2602.17619v1 Announce Type: new Abstract: Emerging IoT applications are transitioning from battery-powered to grid-powered nodes. DRP, a contention-based data dissemination protocol, was developed for these applications. Traditional contention-based protocols resolve collisions through control packet exchanges, significantly reducing goodput. DRP mitigates this issue by employing a distributed delay timer mechanism that assigns transmission-start delays based on the average link quality between a sender and its children, prioritizing highly connected nodes for early transmission. However, our in-field experiments reveal that DRP is unable to accommodate real-world link quality fluctuations, leading to overlapping transmissions from multiple senders. This overlap triggers CSMA's random back-off delays, ultimately degrading the goodput performance. To address these shortcomings, we first conduct a theoretical analysis that characterizes the design requirements induced by

Скрыть анонс
14:27 Arxiv.org CS Low-Cost IoT-Enabled Tele-ECG Monitoring for Resource-Constrained Settings: System Design and Prototype

arXiv:2602.17114v1 Announce Type: new Abstract: With the availability of automation machinery and its superiority, are being slothful and inviting many diseases to invade them. The world still has so many places where people lack basic health facilities. Due to early detection and intervention, CDV can be cured to an extreme extent. It heavily reduces travel and associated costs. A remote ECG monitoring system enables community health workers to support and empower patients through telemedicine. However, there remains some financial and logistical burden. Heart disease cannot be taken lightly. These patients require regular health check-ups and the attention of health personnel in a short period if their health deteriorates suddenly and rapidly. Chronic diseases are extremely variable in their symptoms and evolution of treatment. Some, if not treated early, will end the patient's life. The trend of the INTERNET OF THINGS, IoT, is spreading massively. This paper focuses on the three

Скрыть анонс
14:27 Arxiv.org CS Self-Evolving Multi-Agent Network for Industrial IoT Predictive Maintenance

arXiv:2602.16738v1 Announce Type: new Abstract: Industrial IoT predictive maintenance requires systems capable of real-time anomaly detection without sacrificing interpretability or demanding excessive computational resources. Traditional approaches rely on static, offline-trained models that cannot adapt to evolving operational conditions, while LLM-based monolithic systems demand prohibitive memory and latency, rendering them impractical for on-site edge deployment. We introduce SEMAS, a self-evolving hierarchical multi-agent system that distributes specialized agents across Edge, Fog, and Cloud computational tiers. Edge agents perform lightweight feature extraction and pre-filtering; Fog agents execute diversified ensemble detection with dynamic consensus voting; and Cloud agents continuously optimize system policies via Proximal Policy Optimization (PPO) while maintaining asynchronous, non-blocking inference. The framework incorporates LLM-based response generation for

Скрыть анонс
19.02.2026
21:13 TechMeme.com Cleveland-based Eagle Wireless, which makes cellular modules used in IoT devices, raised a $30M Series B as the US seeks to reduce its reliance on China (Chris Metinko/Axios)

Chris Metinko / Axios: Cleveland-based Eagle Wireless, which makes cellular modules used in IoT devices, raised a $30M Series B as the US seeks to reduce its reliance on China  —  Eagle Wireless, a cellular module manufacturer, raised a $30 million Series B from Asymmetric Capital Partners and The O.H.I.O. Fund …

Скрыть анонс
01:29 Mashable.com Score the Shark PowerDetect robot vacuum for over $200 off at Amazon

The Shark PowerDetect Self-Empty Robot Vacuum is on sale at Amazon for $329.99, down from the list price of $549.99. That's a 40% discount.

Скрыть анонс
18.02.2026
14:35 Mashable.com Get the Eufy 11S Max robot vacuum for under $150 at Amazon — act fast to save $140

As of Feb. 18, the Eufy 11S MAX robot vacuum is discounted to $139.99 at Amazon, 50% off its list price of $279.99.

Скрыть анонс
12:33 Arxiv.org CS Benchmarking IoT Time-Series AD with Event-Level Augmentations

arXiv:2602.15457v1 Announce Type: new Abstract: Anomaly detection (AD) for safety-critical IoT time series should be judged at the event level: reliability and earliness under realistic perturbations. Yet many studies still emphasize point-level results on curated base datasets, limiting value for model selection in practice. We introduce an evaluation protocol with unified event-level augmentations that simulate real-world issues: calibrated sensor dropout, linear and log drift, additive noise, and window shifts. We also perform sensor-level probing via mask-as-missing zeroing with per-channel influence estimation to support root-cause analysis. We evaluate 14 representative models on five public anomaly datasets (SWaT, WADI, SMD, SKAB, TEP) and two industrial datasets (steam turbine, nuclear turbogenerator) using unified splits and event aggregation. There is no universal winner: graph-structured models transfer best under dropout and long events (e.g., on SWaT under additive noise

Скрыть анонс
12:33 Arxiv.org CS A Scan-Based Analysis of Internet-Exposed IoT Devices Using Shodan Data

arXiv:2602.15263v1 Announce Type: new Abstract: An open measurement problem in IoT security is whether scan-observable network configurations encode population-level exposure risk beyond individual devices. An analysis of internet-exposed IoT endpoints using a controlled multi-country sample from Shodan Search and Shodan InternetDB, selecting 100 hosts identified via TCP port 7547 (TR-069/CWMP) and evenly distributed across the ten most represented countries. Hosts are enriched with scan-derived metadata and analyzed using feature-relevance assessment, cross-country comparisons of open and risky port exposure, and supervised classification of higher-risk exposure profiles. The analysis reveals consistent cross-country differences in exposure structure, with mean risky-port counts ranging from 0.4 to 1.0 per host, and achieves balanced accuracy of approximately 0.61 when classifying higher-risk exposure profiles.

Скрыть анонс
11:37 SemiEngineering.com Wi-Fi 7 Moves To The IoT

What's behind the widespread adoption of extremely high-throughput wireless. The post Wi-Fi 7 Moves To The IoT appeared first on Semiconductor Engineering.

Скрыть анонс
17.02.2026
17:26 DigitalTrends.com This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to $299.99

Robot vacuums are only worth it when they actually reduce the number of times you have to think about cleaning. A lot of models still need babysitting: empty the bin, refill the water, wash the mop, dry the pads, repeat. The Dreame L10s Ultra is built to cut that routine down dramatically. It’s $299.99 for […] The post This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to $299.99 appeared first on Digital Trends.

Скрыть анонс
13:43 SpaceDaily.com Assistive home robot learns coordinated dual arm tasks by watching people

Berlin, Germany (SPX) Feb 13, 2026 Researchers at Universidad Carlos III de Madrid (UC3M) have developed a new way for an assistive robot to learn how to move its arms autonomously by combining observational learning with communication between its limbs. The approach lets the robot watch how people perform everyday tasks and then adapt those movements so its two arms can work together safely and efficiently in domestic settings s

Скрыть анонс
08:10 Arxiv.org CS ASA: Adaptive Smart Agent Federated Learning via Device-Aware Clustering for Heterogeneous IoT

arXiv:2602.14391v1 Announce Type: new Abstract: Federated learning (FL) has become a promising answer to facilitating privacy-preserving collaborative learning in distributed IoT devices. However, device heterogeneity is a key challenge because IoT networks include devices with very different computational powers, memory availability, and network environments. To this end, we introduce ASA (Adaptive Smart Agent). This new framework clusters devices adaptively based on real-time resource profiles and adapts customized models suited to every cluster's capability. ASA capitalizes on an intelligent agent layer that examines CPU power, available memory, and network environment to categorize devices into three levels: high-performance, mid-tier, and low-capability. Each level is provided with a model tuned to its computational power to ensure inclusive engagement across the network. Experimental evaluation on two benchmark datasets, MNIST and CIFAR-10, proves that ASA decreases

Скрыть анонс
08:10 Arxiv.org CS Intent-driven Diffusion-based Path for Mobile Data Collector in IoT-enabled Dense WSNs

arXiv:2602.13277v1 Announce Type: new Abstract: Mobile data collection using controllable sinks is an effective approach to improve energy efficiency and data freshness in densely deployed wireless sensor networks (WSNs). However, existing path-planning methods are often heuristic-driven and lack the flexibility to adapt to high-level operational objectives under dynamic network conditions. In this paper, we propose ID2P2, a intent-driven diffusion-based path planning framework for jointly addresses rendezvous point selection and mobile data collector (MDC) tour construction in IoT-enabled dense WSNs. High-level intents, such as latency minimization, energy balancing, or coverage prioritization, are explicitly modeled and incorporated into a generative diffusion planning process that produces feasible and adaptive data collection trajectories. The proposed approach learns a trajectory prior that captures spatial node distribution and network characteristics, enabling the MDC to

Скрыть анонс
08:10 Arxiv.org CS Reinforcement Learning-Enabled Dynamic Code Assignment for Ultra-Dense IoT Networks: A NOMA-Based Approach to Massive Device Connectivity

arXiv:2602.13205v1 Announce Type: new Abstract: Ultra-dense IoT networks require an effective non-orthogonal multiple access (NOMA) scheme, yet they experience intense interference because of fixed code assignment. We suggest a reinforcement learning (RL) model of dynamic Gold code assignment in IoT-NOMA networks. Our Markov Decision Process which is IoT aware is a joint optimization of throughput, energy efficiency, and fairness. Two RL algorithms are created, including Natural Policy Gradient (NPG) to learn stable discrete actions and Deep Deterministic Policy Gradient (DDPG) with continuous code embedding. Under smart city conditions, NPG can attain throughput of 11.6% and energy efficiency of 15.8 likewise superior to its performance with a static allocation. Nonetheless, the performance is worse in organized industrial settings, and the reliability is minimal (0-2%), which points to the fact that dynamic code assignment is not a sufficient measure of ultra-reliable IoT and needs

Скрыть анонс
16.02.2026
14:54 SlashGear.com 5 Clever Smart Home Gadgets That Actually Solve Everyday Problems

There are several smart home gadgets that can add convenience to your life, but here are five that can solve your everyday problems.

Скрыть анонс
10:44 Arxiv.org CS Backdoor Attacks on Contrastive Continual Learning for IoT Systems

arXiv:2602.13062v1 Announce Type: new Abstract: The Internet of Things (IoT) systems increasingly depend on continual learning to adapt to non-stationary environments. These environments can include factors such as sensor drift, changing user behavior, device aging, and adversarial dynamics. Contrastive continual learning (CCL) combines contrastive representation learning with incremental adaptation, enabling robust feature reuse across tasks and domains. However, the geometric nature of contrastive objectives, when paired with replay-based rehearsal and stability-preserving regularization, introduces new security vulnerabilities. Notably, backdoor attacks can exploit embedding alignment and replay reinforcement, enabling the implantation of persistent malicious behaviors that endure through updates and deployment cycles. This paper provides a comprehensive analysis of backdoor attacks on CCL within IoT systems. We formalize the objectives of embedding-level attacks, examine

Скрыть анонс
10:44 Arxiv.org CS Efficient Personalized Federated PCA with Manifold Optimization for IoT Anomaly Detection

arXiv:2602.12622v1 Announce Type: new Abstract: Internet of things (IoT) networks face increasing security threats due to their distributed nature and resource constraints. Although federated learning (FL) has gained prominence as a privacy-preserving framework for distributed IoT environments, current federated principal component analysis (PCA) methods lack the integration of personalization and robustness, which are critical for effective anomaly detection. To address these limitations, we propose an efficient personalized federated PCA (FedEP) method for anomaly detection in IoT networks. The proposed model achieves personalization through introducing local representations with the $\ell_1$-norm for element-wise sparsity, while maintaining robustness via enforcing local models with the $\ell_{2,1}$-norm for row-wise sparsity. To solve this non-convex problem, we develop a manifold optimization algorithm based on the alternating direction method of multipliers (ADMM) with rigorous

Скрыть анонс
10:44 Arxiv.org CS Lightweight Cluster-Based Federated Learning for Intrusion Detection in Heterogeneous IoT Networks

arXiv:2602.12543v1 Announce Type: new Abstract: The rise of heterogeneous Internet of Things (IoT) devices has raised security concerns due to their vulnerability to cyberattacks. Intrusion Detection Systems (IDS) are crucial in addressing these threats. Federated Learning (FL) offers a privacy-preserving solution, but IoT heterogeneity and limited computational resources cause increased latency and reduced performance. This paper introduces a novel approach Cluster-based federated intrusion detection with lightweight networks for heterogeneous IoT designed to address these limitations. The proposed framework utilizes a hierarchical IoT architecture that encompasses edge, fog, and cloud layers. Intrusion detection clients operate at the fog layer, leveraging federated learning to enhance data privacy and distributed processing efficiency. To enhance efficiency, the method employs the lightweight MobileNet model alongside a hybrid loss function that integrates Gumbel-SoftMax and

Скрыть анонс
15.02.2026
17:14 Zdnet.com Finally, a robot vacuum that cleans my dogs' hair reliably well

The Mova P50 Ultra is a standout vacuum and mop combo, priced competitively with its latest discount.

Скрыть анонс
14:10 TechPlanet.today When Your Sleep Mask Becomes a Security Nightmare: The Dark Side of IoT Privacy

In an era where everything from toothbrushes to coffee makers connects to the internet, a recent discovery about a smart sleep mask has exposed just how dangerous our rush toward IoT connectivity can be. What started as a simple attempt to build a better control interface ended up revealing a cybersecurity nightmare that could allow strangers to monitor users' brainwaves and even send electrical impulses to sleeping individuals. The Discovery: From Convenience to Horror The story begins innocuou...

Скрыть анонс
09:44 Yahoo.com Business Generac Transformation Extends Into Data Centers And Smart Home Energy

Скрыть анонс
03:09 Zdnet.com Why Amazon's Echo Hub became my favorite way to control my smart home

I've tested dozens of smart home gadgets, and Amazon's Echo Hub is still the most useful - even in 2026.

Скрыть анонс
14.02.2026
03:54 SlashGear.com 4 Smart Home Gadgets Proven To Save You Money

Building out a smart home setup can add all sorts of conveniences to your life, but even beyond that, it can save you some serious money in the long term.

Скрыть анонс
00:05 TechRadar.com I test smart home tech for a living, and these are the top 3 Ring alternative video doorbells I recommend, with local storage for your videos

With these wireless video doorbells you can avoid subscription fees and keep control of your recordings at home.

Скрыть анонс
13.02.2026
20:09 9to5mac.com Smart Home Diary: Planning my new smart home, 13 years later

I’m just about starting to believe that I may be heading into the final stages of an extremely lengthy attempt to sell one apartment and buy another, so I’m currently giving some thought to the smart home technology I’ll want in my new home. This will be some 13 years after I first adopted smart home tech, so I’m expecting to make a few changes – some small, one potentially much larger … more…

Скрыть анонс
19:32 TheVerge.com iRobot s Roombas have a new Chinese owner, but it says your data will remain in the US

As part of its acquisition by China-based Picea Robotics, iRobot is creating a new US-based subsidiary called iRobot Safe, which the company says will be "responsible for the protection of US consumer data," similar to the TikTok deal that was completed last month. iRobot customers in the US will be able to continue using their robovacs as usual, but now their data will be handled by iRobot Safe, rather than the company's new owner. In a press release published on January 23rd, iRobot stated that the creation of iRobot Safe is "designed to maintain a clear separation between iRobot's non-US ownership and its US and other global consumer dat … Read the full story at The Verge.

Скрыть анонс
13:18 Mashable.com The Roborock Qrevo Series robot vacuum is $250 off — upgrade for $399.99 at Amazon

Find the best robot vacuum deal at Amazon. Save 38% on the roborock Qrevo Series at Amazon.

Скрыть анонс
12:42 Zdnet.com This futuristic robot vacuum and mop will change how you clean your floors

The Mova Mobius 60 is one of those cool inventions you see at trade shows, and now you can have it clean your floors.

Скрыть анонс
11:25 Arxiv.org CS Unknown Attack Detection in IoT Networks using Large Language Models: A Robust, Data-efficient Approach

arXiv:2602.12183v1 Announce Type: new Abstract: The rapid evolution of cyberattacks continues to drive the emergence of unknown (zero-day) threats, posing significant challenges for network intrusion detection systems in Internet of Things (IoT) networks. Existing machine learning and deep learning approaches typically rely on large labeled datasets, payload inspection, or closed-set classification, limiting their effectiveness under data scarcity, encrypted traffic, and distribution shifts. Consequently, detecting unknown attacks in realistic IoT deployments remains difficult. To address these limitations, we propose SiamXBERT, a robust and data-efficient Siamese meta-learning framework empowered by a transformer-based language model for unknown attack detection. The proposed approach constructs a dual-modality feature representation by integrating flow-level and packet-level information, enabling richer behavioral modeling while remaining compatible with encrypted traffic. Through

Скрыть анонс
11:25 Arxiv.org CS V-SHiNE: A Virtual Smart Home Framework for Explainability Evaluation

arXiv:2602.11775v1 Announce Type: new Abstract: Explanations are essential for helping users interpret and trust autonomous smart-home decisions, yet evaluating their quality and impact remains methodologically difficult in this domain. V-SHiNE addresses this gap: a browser-based smarthome simulation framework for scalable and realistic assessment of explanations. It allows researchers to configure environments, simulate behaviors, and plug in custom explanation engines, with flexible delivery modes and rich interaction logging. A study with 159 participants demonstrates its feasibility. V-SHiNE provides a lightweight, reproducible platform for advancing user-centered evaluation of explainable intelligent systems

Скрыть анонс
01:09 TechRadar.com The iRobot takeover is complete – but it looks like the Roomba brand is clinging on to its US roots

Roomba's parent brand might have a new Chinese owner, but it's still a 'US-based global consumer robotics company'.

Скрыть анонс
12.02.2026
14:09 Arxiv.org CS Architecting Trust: A Framework for Secure IoT Systems Through Trusted Execution and Semantic Middleware

arXiv:2602.10762v1 Announce Type: new Abstract: The Internet of Things (IoT) security landscape requires the architectural solutions that can address the technical and operational challenges across the heterogeneous environments. The IoT systems operate in different conditions, and security issues continue to increase. This paper presents the comprehensive security framework for IoT that should integrate the Trusted Execution Environments (TEEs) with the semantic middleware and blockchain technologies. The work provides a systematic analysis of the architectural patterns based on more than twenty recent research works and the existing standards, and it proposes a layered security architecture. The architecture includes the hardware rooted trust at peripheral level, the zero trust principles at network level, and the semantic security mechanisms at application level. The framework focuses on practical implementation aspects such as the performance overhead, interoperability

Скрыть анонс
13:08 DigitalTrends.com Dreame’s latest robot vacuum is slim enough to tackle the dust hiding under your sofa

The Dreame X60 Max Ultra Complete is just 3.13 inches thick, making it great for reaching the dust bunnies hiding under low-clearance furniture. The post Dreame’s latest robot vacuum is slim enough to tackle the dust hiding under your sofa appeared first on Digital Trends.

Скрыть анонс
01:43 NewYork Times What Homeowners Need to Know About Smart Home Cameras

A new Super Bowl ad is raising questions about the power of doorbell cameras.

Скрыть анонс
11.02.2026
23:18 ArsTechnica.com Smart home PSA: Apple's "new architecture" for Home app becomes mandatory today

Updated Home app is required for Matter support and some types of accessories.

Скрыть анонс
20:15 Yahoo Finance Piper Sandler Likes Samsara’s (IOT) High Upside

Скрыть анонс
20:04 InsiderMonkey.com Piper Sandler Likes Samsara’s (IOT) High Upside

Samsara Inc. (NYSE:IOT) is one of the 11 Best Beaten Down Growth Stocks to Buy Now. Piper Sandler, on February 6, cut its target price on Samsara by 24.4% to $37 (from $49) but kept its Overweight call on the shares. The firm noted that while overall investor sentiment for software stocks was at an all-time […]

Скрыть анонс
19:15 MorningAgClips.com Still Farming Strong: How Smart Home Mobility Keeps Seniors Active on the Land

SAN FRANCISCO, Calif. — America’s farm families are aging alongside their operations. The average U.S. farm producer is now 58.1 years old—part of a decades-long trend that has one in three farmers over 65, according to the CDC’s National Institute for Occupational Safety and Health. That experience brings invaluable knowledge, but physical realities shift too. […] The post Still Farming Strong: How Smart Home Mobility Keeps Seniors Active on the Land appeared first on Morning Ag Clips.

Скрыть анонс
09:31 Arxiv.org CS BioME: A Resource-Efficient Bioacoustic Foundational Model for IoT Applications

arXiv:2602.09970v1 Announce Type: cross Abstract: Passive acoustic monitoring has become a key strategy in biodiversity assessment, conservation, and behavioral ecology, especially as Internet-of-Things (IoT) devices enable continuous in situ audio collection at scale. While recent self-supervised learning (SSL)-based audio encoders, such as BEATs and AVES, have shown strong performance in bioacoustic tasks, their computational cost and limited robustness to unseen environments hinder deployment on resource-constrained platforms. In this work, we introduce BioME, a resource-efficient audio encoder designed for bioacoustic applications. BioME is trained via layer-to-layer distillation from a high-capacity teacher model, enabling strong representational transfer while reducing the parameter count by 75%. To further improve ecological generalization, the model is pretrained on multi-domain data spanning speech, environmental sounds, and animal vocalizations. A key contribution is the

Скрыть анонс
09:31 Arxiv.org CS Energy-Efficient Fast Object Detection on Edge Devices for IoT Systems

arXiv:2602.09515v1 Announce Type: new Abstract: This paper presents an Internet of Things (IoT) application that utilizes an AI classifier for fast-object detection using the frame difference method. This method, with its shorter duration, is the most efficient and suitable for fast-object detection in IoT systems, which require energy-efficient applications compared to end-to-end methods. We have implemented this technique on three edge devices: AMD AlveoT M U50, Jetson Orin Nano, and Hailo-8T M AI Accelerator, and four models with artificial neural networks and transformer models. We examined various classes, including birds, cars, trains, and airplanes. Using the frame difference method, the MobileNet model consistently has high accuracy, low latency, and is highly energy-efficient. YOLOX consistently shows the lowest accuracy, lowest latency, and lowest efficiency. The experimental results show that the proposed algorithm has improved the average accuracy gain by 28.314%, the

Скрыть анонс
09:31 Arxiv.org CS Atlas: Enabling Cross-Vendor Authentication for IoT

arXiv:2602.09263v1 Announce Type: new Abstract: Cloud-mediated IoT architectures fragment authentication across vendor silos and create latency and availability bottlenecks for cross-vendor device-to-device (D2D) interactions. We present Atlas, a framework that extends the Web public-key infrastructure to IoT by issuing X.509 certificates to devices via vendor-operated ACME clients and vendor-controlled DNS namespaces. Devices obtain globally verifiable identities without hardware changes and establish mutual TLS channels directly across administrative domains, decoupling runtime authentication from cloud reachability. We prototype Atlas on ESP32 and Raspberry Pi, integrate it with an MQTT-based IoT stack and an Atlas-aware cloud, and evaluate it in smart-home and smart-city workloads. Certificate provisioning completes in under 6s per device, mTLS adds only about 17ms of latency and modest CPU overhead, and Atlas-based applications sustain low, predictable latency compared to

Скрыть анонс
09:31 Arxiv.org CS Investigating Bystander Privacy in Chinese Smart Home Apps

arXiv:2602.09254v1 Announce Type: new Abstract: Bystander privacy in smart homes has been widely studied in Western contexts, yet it remains underexplored in non-Western countries such as China. In this study, we analyze 49 Chinese smart home apps using a mixed-methods approach, including privacy policy review, UX/UI evaluation, and assessment of Apple App Store privacy labels. While most apps nominally comply with national regulations, we identify significant gaps between written policies and actual implementation. Our traceability analysis highlights inconsistencies in data controls and a lack of transparency in data-sharing practices. Crucially, bystander privacy -- particularly for visitors and non-user individuals -- is largely absent from both policy documents and interface design. Additionally, discrepancies between privacy labels and actual data practices threaten user trust and undermine informed consent. We provide design recommendations to strengthen bystander protections,

Скрыть анонс
09:31 Arxiv.org CS "These cameras are just like the Eye of Sauron": A Sociotechnical Threat Model for AI-Driven Smart Home Devices as Perceived by UK-Based Domestic Workers

arXiv:2602.09239v1 Announce Type: new Abstract: The growing adoption of AI-driven smart home devices has introduced new privacy risks for domestic workers (DWs), who are frequently monitored in employers' homes while also using smart devices in their own households. We conducted semi-structured interviews with 18 UK-based DWs and performed a human-centered threat modeling analysis of their experiences through the lens of Communication Privacy Management (CPM). Our findings extend existing threat models beyond abstract adversaries and single-household contexts by showing how AI analytics, residual data logs, and cross-household data flows shaped the privacy risks faced by participants. In employer-controlled homes, AI-enabled features and opaque, agency-mediated employment arrangements intensified surveillance and constrained participants' ability to negotiate privacy boundaries. In their own homes, participants had greater control as device owners but still faced challenges, including

Скрыть анонс
10.02.2026
19:10 Mashable.com Tidy up your home with $500 off the Roborock Saros 10R robot vacuum

As of Feb. 10, get $500 off the Roborock Saros 10R robot vacuum.

Скрыть анонс
12:26 Arxiv.org Math Wireless Streamlet: A Spectrum-Aware and Cognitive Consensus Protocol for Edge IoT

arXiv:2602.07630v1 Announce Type: new Abstract: Blockchain offers a decentralized trust framework for the Internet of Things (IoT), yet deploying consensus in spectrum-congested and dynamic wireless edge IoT networks faces fundamental obstacles: traditional BFT protocols are spectrum-ignorant, leading to inefficient resource utilization and fragile progress under time-varying interference. This paper presents \textit{Wireless Streamlet}, a spectrum-aware and cognitive consensus protocol tailored for wireless edge IoT. Building on Streamlet's streamlined structure, we introduce a \textit{Channel-Aware Leader Election (CALE)} mechanism. CALE serves as a verifiable cross-layer cognitive engine that leverages receiver-measured channel state information (CSI) piggybacked in signed votes to derive Byzantine-robust connectivity scores from notarization certificates, and deterministically selects a unique weighted leader per epoch from finalized history, thereby improving proposal

Скрыть анонс
12:26 Arxiv.org CS Zero Trust for Multi-RAT IoT: Trust Boundary Management in Heterogeneous Wireless Network Environments

arXiv:2602.08989v1 Announce Type: new Abstract: The proliferation of Multi-Radio Access Technology, Internet of Things devices, particularly Unmanned Aerial Vehicles operating across LoRaWAN, 5G/4G cellular, Meshtastic mesh, proprietary protocols such as DJI OcuSync, MAVLink telemetry links, Wi-Fi, and satellite, creates a fundamental and hitherto unexamined challenge for Zero Trust Architecture adoption. Each transition between radio access technologies constitutes a trust boundary crossing: the device exits one network trust domain and enters another, potentially invalidating authentication state, device attestation, and contextual trust signals. Current ZTA frameworks assume relatively stable network environments and do not address the trust implications of frequent, dynamic RAT switching in mobile IoT deployments.

Скрыть анонс
12:26 Arxiv.org CS Kissan-Dost: Bridging the Last Mile in Smallholder Precision Agriculture with Conversational IoT

arXiv:2602.08593v1 Announce Type: new Abstract: We present Kissan-Dost, a multilingual, sensor-grounded conversational system that turns live on-farm measurements and weather into plain-language guidance delivered over WhatsApp text or voice. The system couples commodity soil and climate sensors with retrieval-augmented generation, then enforces grounding, traceability, and proactive alerts through a modular pipeline. In a 90-day, two-site pilot with five participants, we ran three phases (baseline, dashboard only, chatbot only). Dashboard engagement was sporadic and faded, while the chatbot was used nearly daily and informed concrete actions. Controlled tests on 99 sensor-grounded crop queries achieved over 90 percent correctness with subsecond end-to-end latency, alongside high-quality translation outputs. Results show that careful last-mile integration, not novel circuitry, unlocks the latent value of existing Agri-IoT for smallholders.

Скрыть анонс
12:26 Arxiv.org CS RIFLE: Robust Distillation-based FL for Deep Model Deployment on Resource-Constrained IoT Networks

arXiv:2602.08446v1 Announce Type: new Abstract: Federated learning (FL) is a decentralized learning paradigm widely adopted in resource-constrained Internet of Things (IoT) environments. These devices, typically relying on TinyML models, collaboratively train global models by sharing gradients with a central server while preserving data privacy. However, as data heterogeneity and task complexity increase, TinyML models often become insufficient to capture intricate patterns, especially under extreme non-IID (non-independent and identically distributed) conditions. Moreover, ensuring robustness against malicious clients and poisoned updates remains a major challenge. Accordingly, this paper introduces RIFLE - a Robust, distillation-based Federated Learning framework that replaces gradient sharing with logit-based knowledge transfer. By leveraging a knowledge distillation aggregation scheme, RIFLE enables the training of deep models such as VGG-19 and Resnet18 within constrained IoT

Скрыть анонс
12:26 Arxiv.org CS Evasion of IoT Malware Detection via Dummy Code Injection

arXiv:2602.08170v1 Announce Type: new Abstract: The Internet of Things (IoT) has revolutionized connectivity by linking billions of devices worldwide. However, this rapid expansion has also introduced severe security vulnerabilities, making IoT devices attractive targets for malware such as the Mirai botnet. Power side-channel analysis has recently emerged as a promising technique for detecting malware activity based on device power consumption patterns. However, the resilience of such detection systems under adversarial manipulation remains underexplored. This work presents a novel adversarial strategy against power side-channel-based malware detection. By injecting structured dummy code into the scanning phase of the Mirai botnet, we dynamically perturb power signatures to evade AI/ML-based anomaly detection without disrupting core functionality. Our approach systematically analyzes the trade-offs between stealthiness, execution overhead, and evasion effectiveness across multiple

Скрыть анонс
12:26 Arxiv.org CS Wireless Streamlet: A Spectrum-Aware and Cognitive Consensus Protocol for Edge IoT

arXiv:2602.07630v1 Announce Type: new Abstract: Blockchain offers a decentralized trust framework for the Internet of Things (IoT), yet deploying consensus in spectrum-congested and dynamic wireless edge IoT networks faces fundamental obstacles: traditional BFT protocols are spectrum-ignorant, leading to inefficient resource utilization and fragile progress under time-varying interference. This paper presents \textit{Wireless Streamlet}, a spectrum-aware and cognitive consensus protocol tailored for wireless edge IoT. Building on Streamlet's streamlined structure, we introduce a \textit{Channel-Aware Leader Election (CALE)} mechanism. CALE serves as a verifiable cross-layer cognitive engine that leverages receiver-measured channel state information (CSI) piggybacked in signed votes to derive Byzantine-robust connectivity scores from notarization certificates, and deterministically selects a unique weighted leader per epoch from finalized history, thereby improving proposal

Скрыть анонс
First← Previous12345678910Previous →