Next Issue
Volume 3, June
Previous Issue
Volume 2, December
 
 

Future Internet, Volume 3, Issue 1 (March 2011) – 5 articles , Pages 1-86

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
545 KiB  
Article
Evolution of the Converged NGN Service Platforms Towards Future Networks
by Eugen Mikóczy, Ivan Kotuliak and Oskar van Deventer
Future Internet 2011, 3(1), 67-86; https://doi.org/10.3390/fi3010067 - 04 Mar 2011
Cited by 19 | Viewed by 9717
Abstract
This article presents a comparison of main characteristics of the Next Generation Networks (NGN) and Future Generation Internet (FGI). The aim is to discuss and compare two approaches to Future Networks (FN) and services: the evolution of NGN, and the revolutionary approach of [...] Read more.
This article presents a comparison of main characteristics of the Next Generation Networks (NGN) and Future Generation Internet (FGI). The aim is to discuss and compare two approaches to Future Networks (FN) and services: the evolution of NGN, and the revolutionary approach of a new FGI. We present both frameworks from the services point of view as they are delivered to the end-user, as well as from the architectural point of view. We compare selected properties of both approaches to explain commonalities and differences. Their challenges are similar: managing the quality of experience, mobility, security, scalability and providing openness to applications. Based on this comparison, we evaluate possible areas for future convergence in the approach of the two architectures to the Future Network concept. Our analysis shows that despite their different backgrounds, the internet’s FGI and telco’s NGN are not that different after all. The convergence of the two approaches therefore seems the only logical way forward. Full article
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)
Show Figures

200 KiB  
Article
Enterprise Coordination on the Internet
by Charles Petrie
Future Internet 2011, 3(1), 49-66; https://doi.org/10.3390/fi3010049 - 17 Feb 2011
Cited by 33 | Viewed by 8063
Abstract
Enterprises are now connected internally and externally to other Enterprises via the Internet in ways that are increasingly difficult to manage, especially as these interconnections become more dynamic. Current methods of coordinating the effects of change as they propagate through these networks of [...] Read more.
Enterprises are now connected internally and externally to other Enterprises via the Internet in ways that are increasingly difficult to manage, especially as these interconnections become more dynamic. Current methods of coordinating the effects of change as they propagate through these networks of connections are not likely to scale. What is needed is a new paradigm for how the Internet supports such coordination. Indeed, the Internet should and could provide fundamental coordination functions that are missing today. In this paper, we describe how such a “Coordinated Internet” would work (this paper is an expanded version of [1]). The key functionality of a Coordinated Internet would be that the Internet actively watches what people do (analogous to search completion on desktops today), correlates these activities, and actively notifies people when and how their current tasks affect and are affected by the activities of other people. This would be accomplished by standard coordination functions implemented as a common Internet layer that can be used as a utility by more specialized applications. Such a Coordinated Internet would revolutionize enterprise management, for all enterprises, large and small, corporate and personal. For example, static workflows would become obsolete for all but the the most routine processes. Some solutions provide existence proofs of such a coordination substrate, such as the Redux solution in concurrent engineering, which we describe herein. However, foundational research remains to be done in the new field of Coordination Engineering in order to reach the goal of a future Internet in which coordination functions are fundamental. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Show Figures

675 KiB  
Article
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
by Helena Rifà-Pous and Jordi Herrera-Joancomartí
Future Internet 2011, 3(1), 31-48; https://doi.org/10.3390/fi3010031 - 14 Feb 2011
Cited by 124 | Viewed by 10680
Abstract
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this [...] Read more.
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device. Full article
(This article belongs to the Special Issue The Internet of Things)
Show Figures

1154 KiB  
Article
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
by Oliver Hanka, Michael Eichhorn, Martin Pfannenstein, Jörg Eberspächer and Eckehard Steinbach
Future Internet 2011, 3(1), 14-30; https://doi.org/10.3390/fi3010014 - 01 Feb 2011
Cited by 52 | Viewed by 8595
Abstract
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables [...] Read more.
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Show Figures

196 KiB  
Article
On Using TPM for Secure Identities in Future Home Networks
by Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger and Georg Carle
Future Internet 2011, 3(1), 1-13; https://doi.org/10.3390/fi3010001 - 07 Jan 2011
Cited by 9 | Viewed by 9499
Abstract
Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. [...] Read more.
Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Show Figures

Previous Issue
Next Issue
Back to TopTop