100+ datasets found
  1. Internet of Things - number of connected devices worldwide 2015-2025

    • statista.com
    Updated Nov 27, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2016). Internet of Things - number of connected devices worldwide 2015-2025 [Dataset]. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
    Explore at:
    Dataset updated
    Nov 27, 2016
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    By 2025, forecasts suggest that there will be more than ** billion Internet of Things (IoT) connected devices in use. This would be a nearly threefold increase from the IoT installed base in 2019. What is the Internet of Things? The IoT refers to a network of devices that are connected to the internet and can “communicate” with each other. Such devices include daily tech gadgets such as the smartphones and the wearables, smart home devices such as smart meters, as well as industrial devices like smart machines. These smart connected devices are able to gather, share, and analyze information and create actions accordingly. By 2023, global spending on IoT will reach *** trillion U.S. dollars. How does Internet of Things work? IoT devices make use of sensors and processors to collect and analyze data acquired from their environments. The data collected from the sensors will be shared by being sent to a gateway or to other IoT devices. It will then be either sent to and analyzed in the cloud or analyzed locally. By 2025, the data volume created by IoT connections is projected to reach a massive total of **** zettabytes. Privacy and security concerns   Given the amount of data generated by IoT devices, it is no wonder that data privacy and security are among the major concerns with regard to IoT adoption. Once devices are connected to the Internet, they become vulnerable to possible security breaches in the form of hacking, phishing, etc. Frequent data leaks from social media raise earnest concerns about information security standards in today’s world; were the IoT to become the next new reality, serious efforts to create strict security stands need to be prioritized.

  2. Dataset: Analysis of IFTTT Recipes to Study How Humans Use...

    • zenodo.org
    • data.niaid.nih.gov
    csv, json, txt
    Updated Nov 20, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Haoxiang Yu; Haoxiang Yu; Jie Hua; Jie Hua; Christine Julien; Christine Julien (2021). Dataset: Analysis of IFTTT Recipes to Study How Humans Use Internet-of-Things (IoT) Devices [Dataset]. http://doi.org/10.5281/zenodo.5572861
    Explore at:
    csv, json, txtAvailable download formats
    Dataset updated
    Nov 20, 2021
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Haoxiang Yu; Haoxiang Yu; Jie Hua; Jie Hua; Christine Julien; Christine Julien
    License

    Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)https://creativecommons.org/licenses/by-nc-sa/4.0/
    License information was derived automatically

    Description

    This archive contains the files submitted to the 4th International Workshop on Data: Acquisition To Analysis (DATA) at SenSys. Files provided in this package are associated with the paper titled "Dataset: Analysis of IFTTT Recipes to Study How Humans Use Internet-of-Things (IoT) Devices"

    With the rapid development and usage of Internet-of-Things (IoT) and smart-home devices, researchers continue efforts to improve the ''smartness'' of those devices to address daily needs in people's lives. Such efforts usually begin with understanding evolving user behaviors on how humans utilize the devices and what they expect in terms of their behavior. However, while research efforts abound, there is a very limited number of datasets that researchers can use to both understand how people use IoT devices and to evaluate algorithms or systems for smart spaces. In this paper, we collect and characterize more than 50,000 recipes from the online If-This-Then-That (IFTTT) service to understand a seemingly straightforward but complicated question: ''What kinds of behaviors do humans expect from their IoT devices?'' The dataset we collected contains the basic information of the IFTTT rules, trigger and action event, and how many people are using each rule.

    For more detail about this dataset, please refer to the paper listed above.

  3. UNB CIC IOT Dataset 2023 (Updated 2024-10-08)

    • kaggle.com
    zip
    Updated May 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Md. Abdul Al Emon (2025). UNB CIC IOT Dataset 2023 (Updated 2024-10-08) [Dataset]. https://www.kaggle.com/datasets/mdabdulalemo/cic-iot-dataset2023-updated-2024-10-08
    Explore at:
    zip(3264262523 bytes)Available download formats
    Dataset updated
    May 24, 2025
    Authors
    Md. Abdul Al Emon
    License

    Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
    License information was derived automatically

    Description

    The CIC IoT Dataset 2023 is a comprehensive benchmark developed by the Canadian Institute for Cybersecurity (CIC) to advance intrusion detection research in real-world Internet of Things (IoT) environments. This dataset was created using a network of 105 actual IoT devices, encompassing smart home gadgets, sensors, and cameras, to simulate authentic IoT traffic and attack scenarios.

    Key Features:

    • Diverse Attack Scenarios: The dataset includes 33 distinct attacks categorized into seven classes: DDoS, DoS, Reconnaissance, Web-based, Brute Force, Spoofing, and Mirai. These attacks were executed by compromised IoT devices targeting other IoT devices, reflecting realistic threat vectors.(University of New Brunswick)

    • Extensive Data Collection: Network traffic was captured in real-time, resulting in over 46 million records. The data is available in various formats, including raw PCAP files and pre-extracted CSV features, facilitating different research needs.

    • Realistic IoT Topology: Unlike many datasets that rely on simulations, this dataset was generated using a large-scale IoT testbed with devices from multiple vendors, providing a heterogeneous and realistic network environment.

    • Benchmarking and Evaluation: The dataset has been utilized to evaluate the performance of machine learning and deep learning algorithms in classifying and detecting malicious versus benign IoT network traffic.(University of New Brunswick)

    This dataset serves as a valuable resource for researchers and practitioners aiming to develop and test security analytics applications, intrusion detection systems, and other cybersecurity solutions tailored for IoT ecosystems.(University of New Brunswick)

  4. i

    Dataset for IAT collection from Real-World IoT Devices

    • ieee-dataport.org
    Updated Apr 25, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Lin ZhiJun (2020). Dataset for IAT collection from Real-World IoT Devices [Dataset]. https://ieee-dataport.org/open-access/dataset-iat-collection-real-world-iot-devices
    Explore at:
    Dataset updated
    Apr 25, 2020
    Authors
    Lin ZhiJun
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    and secure

  5. p

    Infected and Exposed IoT device statistics

    • data.public.lu
    csv
    Updated Jan 21, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Computer Incident Response Center Luxembourg (2022). Infected and Exposed IoT device statistics [Dataset]. https://data.public.lu/en/datasets/infected-and-exposed-iot-device-statistics/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jan 21, 2022
    Dataset authored and provided by
    Computer Incident Response Center Luxembourg
    License

    Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
    License information was derived automatically

    Description

    This is a dataset containing a country-level breakdown of infected and Exposed IoT devices detected through sinkholes, honeypots and darknets operated by The Shadowserver Foundation and its partners. The data is grouped by IoT related threats. In some cases a vulnerability id is provided as a threat name - this is for cases when an IP was seen attempting to exploit an IoT related vulnerability by a honeypot, but no threat related information was acquired. This dataset was created as part of the EU CEF VARIoT project https://variot.eu

  6. Large-Scale Attacks in IoT Environment

    • kaggle.com
    zip
    Updated May 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Nikita Manaenkov (2025). Large-Scale Attacks in IoT Environment [Dataset]. https://www.kaggle.com/datasets/nikitamanaenkov/large-scale-attacks-in-iot-environment
    Explore at:
    zip(1474647877 bytes)Available download formats
    Dataset updated
    May 7, 2025
    Authors
    Nikita Manaenkov
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The CICIoT2023 dataset is a large-scale, realistic intrusion detection dataset designed to support security analytics and machine learning research in the Internet of Things (IoT) domain. Created by the Canadian Institute for Cybersecurity (CIC), the dataset captures 33 different types of attacks (including DDoS, DoS, Recon, Web-based, Brute Force, Spoofing, and Mirai) executed by malicious IoT devices against other IoT targets.

    The testbed consists of 105 real IoT devices of different types and manufacturers, including smart home devices and industrial equipment, configured in a complex network topology to emulate real-world conditions. The dataset includes benign and malicious traffic in various formats and supports feature extraction for both traditional ML and deep learning models.

    This dataset aims to address the lack of diversity and scale in previous IoT security datasets, offering a robust benchmark for evaluating intrusion detection systems (IDS) and enabling research in IoT cybersecurity, anomaly detection, and network forensics.

    Source https://www.mdpi.com/1424-8220/23/13/5941

  7. h

    iot-23-preprocessed-minimumcolumns

    • huggingface.co
    Updated Jan 10, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kiara Munz (2024). iot-23-preprocessed-minimumcolumns [Dataset]. https://huggingface.co/datasets/19kmunz/iot-23-preprocessed-minimumcolumns
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jan 10, 2024
    Authors
    Kiara Munz
    Description

    Aposemat IoT-23 - a Labeled Dataset with Malcious and Benign Iot Network Traffic

    Homepage: https://www.stratosphereips.org/datasets-iot23 This dataset contains a subset of the data from 20 captures of Malcious network traffic and 3 captures from live Benign Traffic on Internet of Things (IoT) devices. Created by Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga at the Avast AIC laboratory with the funding of Avast Software, this dataset is one of the best in the field for… See the full description on the dataset page: https://huggingface.co/datasets/19kmunz/iot-23-preprocessed-minimumcolumns.

  8. Deakin IoT Traffic Dataset

    • dro.deakin.edu.au
    • researchdata.edu.au
    pcap
    Updated Jun 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Aleksandar Pasquini; Rajesh Vasa; Hassan Habibi Gharakheili; Irini Logothetis; Alexander Chambers; Minh Tran (2025). Deakin IoT Traffic Dataset [Dataset]. http://doi.org/10.26187/deakin.28013234.v2
    Explore at:
    pcapAvailable download formats
    Dataset updated
    Jun 21, 2025
    Dataset provided by
    Deakin Universityhttp://www.deakin.edu.au/
    Authors
    Aleksandar Pasquini; Rajesh Vasa; Hassan Habibi Gharakheili; Irini Logothetis; Alexander Chambers; Minh Tran
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset comprises network traffic collected from 24 Internet of Things (IoT) devices over a span of 119 days, capturing a total of over 110 million packets. The devices represent 19 distinct types and were monitored in a controlled environment under normal operating conditions, reflecting a variety of functions and behaviors typical of consumer IoT products (pcapIoT). The packet capture (pcap) files preserve complete packet information across all protocol layers, including ARP, TCP, HTTP, and various application-layer protocols. Raw pcap files (pcapFull) are also provided, which contain traffic from 36 non-IoT devices present in the network. To facilitate device-specific analysis, a CSV file is included that maps each IoT device to its unique MAC address. This mapping simplifies the identification and filtering of packets belonging to each device within the pcap files. 3 extra CSV (CSVs) files provide metadate about the states that the devices were in at different times. Additionally, Python scripts (Scripts) are provided to assist in extracting and processing packets. These scripts include functionalities such as packet filtering based on MAC addresses and protocol-specific data extraction, serving as practical examples for data manipulation and analysis techniques. This dataset is valuable for researchers interested in network behavior analysis, anomaly detection, and the development of IoT-specific network policies. It enables the study and differentiation of network behaviors based on device functions and supports behavior-based profiling to identify irregular activities or potential security threats.

  9. IoT-23: A labeled dataset with malicious and benign IoT network traffic

    • zenodo.org
    • explore.openaire.eu
    • +1more
    application/gzip
    Updated Sep 3, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sebastian Garcia; Sebastian Garcia; Agustin Parmisano; Maria Jose Erquiaga; Agustin Parmisano; Maria Jose Erquiaga (2021). IoT-23: A labeled dataset with malicious and benign IoT network traffic [Dataset]. http://doi.org/10.5281/zenodo.4743746
    Explore at:
    application/gzipAvailable download formats
    Dataset updated
    Sep 3, 2021
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Sebastian Garcia; Sebastian Garcia; Agustin Parmisano; Maria Jose Erquiaga; Agustin Parmisano; Maria Jose Erquiaga
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    IoT-23 is a dataset of network traffic from Internet of Things (IoT) devices. It has 20 malware captures executed in IoT devices, and 3 captures for benign IoT devices traffic. It was first published in January 2020, with captures ranging from 2018 to 2019. These IoT network traffic was captured in the Stratosphere Laboratory, AIC group, FEL, CTU University, Czech Republic. Its goal is to offer a large dataset of real and labeled IoT malware infections and IoT benign traffic for researchers to develop machine learning algorithms. This dataset and its research was funded by Avast Software. The malware was allow to connect to the Internet.

  10. IoT-FSCIT

    • figshare.com
    txt
    Updated Feb 5, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Aqil (2024). IoT-FSCIT [Dataset]. http://doi.org/10.6084/m9.figshare.25143581.v1
    Explore at:
    txtAvailable download formats
    Dataset updated
    Feb 5, 2024
    Dataset provided by
    Figsharehttp://figshare.com/
    Authors
    Aqil
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    IoT-FSCIT is a dataset collected for research purposes. This dataset contains statistical features for five distinct IoT devices data, collected over six weeks at laboratory in Universiti Malaya.

  11. IoT-deNAT: Outbound flow-based network traffic data of IoT and non-IoT...

    • zenodo.org
    • explore.openaire.eu
    Updated Jul 23, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Yair Meidan; Yair Meidan; Vinay Sachidananda; Vinay Sachidananda; Hongyi Peng; Racheli Sagron; Yuval Elovici; Yuval Elovici; Asaf Shabtai; Asaf Shabtai; Hongyi Peng; Racheli Sagron (2020). IoT-deNAT: Outbound flow-based network traffic data of IoT and non-IoT devices behind a home NAT [Dataset]. http://doi.org/10.5281/zenodo.3924770
    Explore at:
    Dataset updated
    Jul 23, 2020
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Yair Meidan; Yair Meidan; Vinay Sachidananda; Vinay Sachidananda; Hongyi Peng; Racheli Sagron; Yuval Elovici; Yuval Elovici; Asaf Shabtai; Asaf Shabtai; Hongyi Peng; Racheli Sagron
    Description

    This dataset is comprised of NetFlow records, which capture the outbound network traffic of 8 commercial IoT devices and 5 non-IoT devices, collected during a period of 37 days in a lab at Ben-Gurion University of The Negev. The dataset was collected in order to develop a method for telecommunication providers to detect vulnerable IoT models behind home NATs. Each NetFlow record is labeled with the device model which produced it; for research reproducibilty, each NetFlow is also allocated to either the "training" or "test" set, in accordance with the partitioning described in:

    Y. Meidan, V. Sachidananda, H. Peng, R. Sagron, Y. Elovici, and A. Shabtai, A novel approach for detecting vulnerable IoT devices connected behind a home NAT, Computers & Security, Volume 97, 2020, 101968, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101968. (http://www.sciencedirect.com/science/article/pii/S0167404820302418)

    Please note:

    • The dataset itself is free to use, however users are requested to cite the above-mentioned paper, which describes in detail the research objectives as well as the data collection, preparation and analysis.
    • Following is a brief description of the features used in this dataset.

    # NetFlow features, used in the related paper for analysis

    'FIRST_SWITCHED': System uptime at which the first packet of this flow was switched
    'IN_BYTES': Incoming counter for the number of bytes associated with an IP Flow
    'IN_PKTS': Incoming counter for the number of packets associated with an IP Flow
    'IPV4_DST_ADDR': IPv4 destination address
    'L4_DST_PORT': TCP/UDP destination port number
    'L4_SRC_PORT': TCP/UDP source port number
    'LAST_SWITCHED': System uptime at which the last packet of this flow was switched
    'PROTOCOL': IP protocol byte (6: TCP, 17: UDP)
    'SRC_TOS': Type of Service byte setting when there is an incoming interface
    'TCP_FLAGS': Cumulative of all the TCP flags seen for this flow

    # Features added by the authors

    'IP': Prefix of the destination IP address, representing the network (without the host)
    'DURATION': Time (seconds) between first/last packet switching

    # Label
    'device_model':

    # Partition
    'partition': Training or test

    # Additional NetFlow features (mostly zero-variance)
    'SRC_AS': Source BGP autonomous system number
    'DST_AS': Destination BGP autonomous system number
    'INPUT_SNMP': Input interface index
    'OUTPUT_SNMP': Output interface index
    'IPV4_SRC_ADDR': IPv4 source address
    'MAC': MAC address of the source

    # Additional data
    'category': IoT or non-IoT
    'type': IoT, access_point, smartphone, laptop
    'date': Datepart of FIRST_SWITCHED
    'inter_arrival_time': Time (seconds) between successive flows of the same device (identified by its MAC address)

  12. c

    Data from: Dataset for Cyber-Physical Anomaly Detection in Smart Homes

    • research-data.cardiff.ac.uk
    Updated Sep 19, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Yasar Majib; Mohammed Alosaimi; Andre Asaturyan; Charith Perera (2024). Dataset for Cyber-Physical Anomaly Detection in Smart Homes [Dataset]. http://doi.org/10.17035/d.2023.0259651425
    Explore at:
    Dataset updated
    Sep 19, 2024
    Dataset provided by
    Cardiff University
    Authors
    Yasar Majib; Mohammed Alosaimi; Andre Asaturyan; Charith Perera
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Smart homes contain programmable electronic devices (mostly IoT) that enable home au- tomation. People who live in smart homes benefit from interconnected devices by controlling them either remotely or manually/autonomously. However, high interconnectivity comes with an increased attack surface, making the smart home an attractive target for adversaries. NCC Group and the Global Cyber Alliance recorded over 12,000 attacks to log into smart home devices maliciously. Recent statistics show that over 200 million smart homes can be subjected to these attacks. Conventional security systems are either focused on network traffic (e.g., firewalls) or physical environment (e.g., CCTV or basic motion sensors), but not both. A key challenge in de- veloping cyber-physical security systems is the lack of datasets and test beds. For cyber-physical datasets to be meaningful, they need to be collected in real smart home environments. Due to the inherited difficulties and challenges (e.g. effort, costs, test-bed availability), such cyber-physical smart home datasets are quite rare. This paper aims to fill this gap by contributing a dataset we collected in a real smart home with annotated labels. This paper explains the process we followed to collect the data and how we organised them to facilitate wider use within research communities.A related article can be found at https://doi.org/10.3389/friot.2023.1275080

  13. Z

    mqtt-dataset

    • data.niaid.nih.gov
    • zenodo.org
    Updated Jun 5, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Eyhab Al-Masri (2022). mqtt-dataset [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_6614456
    Explore at:
    Dataset updated
    Jun 5, 2022
    Dataset provided by
    Yifeng Liu
    Eyhab Al-Masri
    License

    Attribution 3.0 (CC BY 3.0)https://creativecommons.org/licenses/by/3.0/
    License information was derived automatically

    Description

    With the growing interest in Internet of Things (IoT) devices, a number of communication protocols have been developed to support a variety of IoT use cases. One promising communication paradigm that has been widely adopted in the IoT is the publish-subscribe pattern, which is supported by a number of messaging protocols such as MQTT, AMQP, and XMPP. Due to the diversity of IoT device types, an IoT application may communicate with IoT devices using a variety of messaging protocols, software frameworks, and strategies. To this extent, it becomes critical to determine the robustness of components responsible for message delivery (i.e., message brokers). We conduct a comparative study of the MQTT protocol's performance in this paper, comparing performance variables across a range of payload sizes and security levels. Preliminary results indicate that when the payload size remains small, using higher security levels does not result in significant latency overheads. Additionally, we discovered that implementing mutual authentication via Transport Layer Security (TLS) has no effect on MQTT response times in persistent connections when compared to using the default security level, which authenticates only the server.

  14. g

    Dataset of legitimate IoT data | gimi9.com

    • gimi9.com
    Updated Oct 23, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2021). Dataset of legitimate IoT data | gimi9.com [Dataset]. https://gimi9.com/dataset/eu_617290e5562ea455d3d3ab0d/
    Explore at:
    Dataset updated
    Oct 23, 2021
    Description

    This dataset presents the IoT network traffic generated by connected objects. In order to understand and characterise the legitimate behaviour of network traffic, a platform is created to generate IoT traffic under realistic conditions. This platform contains different IoT devices: voice assistants, smart cameras, connected printers, connected light bulbs, motion sensors, etc. Then, a set of interactions with these objects is performed to allow the generation of real traffic. This data is used to identify anomalies and intrusions using machine learning algorithms and to improve existing detection models. Our dataset is available in two formats: PCAP and csv and was created as part of the EU CEF Variot project https://variot.eu. To download the data in pcap format and for more information, our database is available on this web portal: https://www.variot.telecom-sudparis.eu/

  15. Datasets from IoT devices

    • figshare.com
    csv
    Updated Mar 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kuanysh Bakirov (2025). Datasets from IoT devices [Dataset]. http://doi.org/10.6084/m9.figshare.28667981.v1
    Explore at:
    csvAvailable download formats
    Dataset updated
    Mar 26, 2025
    Dataset provided by
    Figsharehttp://figshare.com/
    Authors
    Kuanysh Bakirov
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description

    The data was collected using IoT sensors that transmit measurements to a local server via Wi-Fi at a frequency of 5 seconds. The system integrates temperature, humidity, light, pH, and electrical conductivity (EC) sensors connected to an ESP Arduino microcontroller. The microcontroller was programmed to transmit data via HTTP. The data received by the server is automatically saved in CSV format, broken down by days, with a separate file containing 17,280 lines (one record every 5 seconds) collected for each day during a week.

  16. i

    X-IIoTID: A Connectivity- and Device-agnostic Intrusion Dataset for...

    • ieee-dataport.org
    Updated May 18, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Muna Al-Hawawreh (2022). X-IIoTID: A Connectivity- and Device-agnostic Intrusion Dataset for Industrial Internet of Things [Dataset]. https://ieee-dataport.org/documents/x-iiotid-connectivity-and-device-agnostic-intrusion-dataset-industrial-internet-things
    Explore at:
    Dataset updated
    May 18, 2022
    Authors
    Muna Al-Hawawreh
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    as they are connected on a large scale with high-value data content

  17. e

    Dataset of legitimate IoT data

    • data.europa.eu
    csv
    Updated Oct 22, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Télécom SudParis (2021). Dataset of legitimate IoT data [Dataset]. https://data.europa.eu/data/datasets/617290e5562ea455d3d3ab0d?locale=sk
    Explore at:
    csv(20214687), csv(19539072), csv(19356780), csv(19821780), csv(19582470), csv(22475706), csv(19649686), csv(26613838), csv(20552481), csv(16358739), csv(17152430), csv(16357953), csv(19204999), csv(22682707), csv(21260896), csv(20227271), csv(20585580), csv(19670453), csv(17078845), csv(13893042), csv(18803868), csv(18634323), csv(13859547), csv(20485613), csv(20286017), csv(16593452), csv(13657246), csv(21844555), csv(20082982), csv(21108731), csv(20919467), csv(20490473), csv(20959775), csv(22216970), csv(16232107), csv(16699101), csv(20959909), csv(26805826), csv(16755561), csv(20106659), csv(20449129), csv(14246317), csv(13925934), csv(19685938), csv(18609259), csv(13684954), csv(13664427), csv(20263943), csv(13698495), csv(20183844), csv(20597812), csv(20001483), csv(23701208), csv(20784136), csv(20451059), csv(17171286), csv(16633179), csv(20405634), csv(21154609), csv(21314366), csv(16886380), csv(20775395), csv(13645555), csv(20455078), csv(20610806), csv(20918576), csv(13855360), csv(14218407), csv(17078053), csv(20923950), csv(17040829), csv(20315064), csv(16764171), csv(16720137), csv(21339842), csv(21196352), csv(21768881), csv(21873258), csv(16620424), csv(18726613), csv(20884277), csv(17214861), csv(16554705), csv(14283239), csv(13921902), csv(21107888), csv(13559056), csv(21227394), csv(16661573), csv(20789568), csv(21015881), csv(21176363), csv(21066595), csv(20305811), csv(13515584), csv(22764276), csv(25087160), csv(20415664), csv(21673237), csv(20307433), csv(20329912), csv(26423045), csv(10010576), csv(20764716), csv(18775790), csv(20366938), csv(13663277), csv(20178551), csv(16834403), csv(20931951), csv(16750646), csv(20791231), csv(240798), csv(21881717), csv(19121200), csv(20034184), csv(27042897), csv(16451600), csv(19944452), csv(14097513), csv(281435), csv(18675019), csv(26478425), csv(6749448), csv(20567664), csv(20942224), csv(20957206), csv(20751747), csv(22369182), csv(16447788), csv(20173223), csv(17026962), csv(16385341), csv(20507117), csv(16981740), csv(19356855), csv(18957113), csv(20167973), csv(16468977), csv(20403221), csv(20997417), csv(20548418), csv(20584090), csv(20676689), csv(16396838), csv(17138460), csv(19161285), csv(23802839), csv(20233215), csv(17008367), csv(20356180), csv(18459080), csv(16307489), csv(19524963), csv(21433048), csv(8777032), csv(20725597), csv(21891751), csv(13750793), csv(19689555), csv(20408079), csv(20465546), csv(5654726), csv(20670239), csv(16629081), csv(21149666), csv(19771373), csv(17083117), csv(20354261), csv(23149898), csv(13908623), csv(20158804), csv(20015904), csv(21067066), csv(21366068), csv(21187188), csv(13552023), csv(20607006), csv(20620148), csv(16762821), csv(20317653), csv(21169766), csv(13617701), csv(20182027), csv(20057932)Available download formats
    Dataset updated
    Oct 22, 2021
    Dataset authored and provided by
    Télécom SudParis
    License

    http://www.opendefinition.org/licenses/cc-by-sahttp://www.opendefinition.org/licenses/cc-by-sa

    Description

    This dataset presents the IoT network traffic generated by connected objects. In order to understand and characterise the legitimate behaviour of network traffic, a platform is created to generate IoT traffic under realistic conditions. This platform contains different IoT devices: voice assistants, smart cameras, connected printers, connected light bulbs, motion sensors, etc. Then, a set of interactions with these objects is performed to allow the generation of real traffic. This data is used to identify anomalies and intrusions using machine learning algorithms and to improve existing detection models. Our dataset is available in two formats: pcap and csv and was created as part of the EU CEF VARIoT project https://variot.eu. To download the data in pcap format and for more information, our database is available on this web portal : https://www.variot.telecom-sudparis.eu/.

  18. g

    IOT Devices | gimi9.com

    • gimi9.com
    Updated Jul 1, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). IOT Devices | gimi9.com [Dataset]. https://gimi9.com/dataset/au_iot-devices1/
    Explore at:
    Dataset updated
    Jul 1, 2025
    Description

    This dataset describes the install & removal dates, asset serial number and location data for smart city assets in Ballarat. The information was collected as assets are moved. The intended use of the information is to inform the public of the location of Ballarat's smart city assets.. This dataset is typically updated manually when assets are moved.

  19. m

    A Real-Time Dataset of Pond Water for Fish Farming using IoT devices

    • data.mendeley.com
    Updated Sep 29, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Md Monirul Islam (2023). A Real-Time Dataset of Pond Water for Fish Farming using IoT devices [Dataset]. http://doi.org/10.17632/hxd382z2fg.2
    Explore at:
    Dataset updated
    Sep 29, 2023
    Authors
    Md Monirul Islam
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This is the real-time dataset. This dataset is created for monitoring the real-time aquatic environment using an IoT framework. Three sensors named pH, Temperature, and turbidity along with an Arduino controller are used for monitoring the water quality of 5 ponds. It has 4 columns and 40280 rows. They are- pH, Temperature, Turbidity, and Fish. Here fish is the target variable and others are the independent variable. There are 11 fish categories, having distinct values of tilapia 8830 rui 6336 pangas 5314 silverCup 3906 katla 3786 sing 3776 shrimp 3204 karpio 2112 prawn 1348 koi 964 magur 704.

  20. i

    RF-Fingerprint-BT-IoT: Real-world Frequency Hopping Bluetooth dataset from...

    • ieee-dataport.org
    Updated Sep 22, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Anu Jagannath (2022). RF-Fingerprint-BT-IoT: Real-world Frequency Hopping Bluetooth dataset from IoT devices for RF fingerprinting [Dataset]. https://ieee-dataport.org/documents/rf-fingerprint-bt-iot-real-world-frequency-hopping-bluetooth-dataset-iot-devices-rf
    Explore at:
    Dataset updated
    Sep 22, 2022
    Authors
    Anu Jagannath
    License

    Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)https://creativecommons.org/licenses/by-nc-sa/4.0/
    License information was derived automatically

    Area covered
    World
    Description

    A real-world radio frequency (RF) fingerprinting dataset for commercial off-the-shelf (COTS) Bluetooth emitters under challenging testbed setups is presented in this dataset. The dataset includes emissions from 10 COTS IoT emitters (2 laptops and 8 commercial chips) that are captured with a National Instruments Ettus USRP X300 radio outfitted with a UBX160 daughterboard and a VERT2450 antenna. The receiver is tuned to record a 2 MHz bandwidth of the spectrum centered at the 2.414 GHz frequency.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2016). Internet of Things - number of connected devices worldwide 2015-2025 [Dataset]. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Organization logo

Internet of Things - number of connected devices worldwide 2015-2025

Explore at:
Dataset updated
Nov 27, 2016
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
Worldwide
Description

By 2025, forecasts suggest that there will be more than ** billion Internet of Things (IoT) connected devices in use. This would be a nearly threefold increase from the IoT installed base in 2019. What is the Internet of Things? The IoT refers to a network of devices that are connected to the internet and can “communicate” with each other. Such devices include daily tech gadgets such as the smartphones and the wearables, smart home devices such as smart meters, as well as industrial devices like smart machines. These smart connected devices are able to gather, share, and analyze information and create actions accordingly. By 2023, global spending on IoT will reach *** trillion U.S. dollars. How does Internet of Things work? IoT devices make use of sensors and processors to collect and analyze data acquired from their environments. The data collected from the sensors will be shared by being sent to a gateway or to other IoT devices. It will then be either sent to and analyzed in the cloud or analyzed locally. By 2025, the data volume created by IoT connections is projected to reach a massive total of **** zettabytes. Privacy and security concerns   Given the amount of data generated by IoT devices, it is no wonder that data privacy and security are among the major concerns with regard to IoT adoption. Once devices are connected to the Internet, they become vulnerable to possible security breaches in the form of hacking, phishing, etc. Frequent data leaks from social media raise earnest concerns about information security standards in today’s world; were the IoT to become the next new reality, serious efforts to create strict security stands need to be prioritized.

Search
Clear search
Close search
Google apps
Main menu