Next Issue
Previous Issue

Table of Contents

Future Internet, Volume 3, Issue 1 (March 2011), Pages 1-86

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Readerexternal link to open them.
View options order results:
result details:
Displaying articles 1-5
Export citation of selected articles as:

Research

Open AccessArticle On Using TPM for Secure Identities in Future Home Networks
Future Internet 2011, 3(1), 1-13; doi:10.3390/fi3010001
Received: 28 October 2010 / Accepted: 28 December 2010 / Published: 7 January 2011
Cited by 2 | PDF Full-text (196 KB) | HTML Full-text | XML Full-text
Abstract
Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes.
[...] Read more.
Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Open AccessArticle A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
Future Internet 2011, 3(1), 14-30; doi:10.3390/fi3010014
Received: 12 January 2011 / Revised: 29 January 2011 / Accepted: 30 January 2011 / Published: 1 February 2011
Cited by 3 | PDF Full-text (1154 KB) | HTML Full-text | XML Full-text
Abstract
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables
[...] Read more.
In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Open AccessArticle Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Future Internet 2011, 3(1), 31-48; doi:10.3390/fi3010031
Received: 11 October 2010 / Revised: 30 January 2011 / Accepted: 31 January 2011 / Published: 14 February 2011
Cited by 24 | PDF Full-text (675 KB) | HTML Full-text | XML Full-text
Abstract
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this
[...] Read more.
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device. Full article
(This article belongs to the Special Issue The Internet of Things)
Open AccessArticle Enterprise Coordination on the Internet
Future Internet 2011, 3(1), 49-66; doi:10.3390/fi3010049
Received: 11 November 2010 / Accepted: 11 January 2011 / Published: 17 February 2011
PDF Full-text (200 KB) | HTML Full-text | XML Full-text
Abstract
Enterprises are now connected internally and externally to other Enterprises via the Internet in ways that are increasingly difficult to manage, especially as these interconnections become more dynamic. Current methods of coordinating the effects of change as they propagate through these networks of
[...] Read more.
Enterprises are now connected internally and externally to other Enterprises via the Internet in ways that are increasingly difficult to manage, especially as these interconnections become more dynamic. Current methods of coordinating the effects of change as they propagate through these networks of connections are not likely to scale. What is needed is a new paradigm for how the Internet supports such coordination. Indeed, the Internet should and could provide fundamental coordination functions that are missing today. In this paper, we describe how such a “Coordinated Internet” would work (this paper is an expanded version of [1]). The key functionality of a Coordinated Internet would be that the Internet actively watches what people do (analogous to search completion on desktops today), correlates these activities, and actively notifies people when and how their current tasks affect and are affected by the activities of other people. This would be accomplished by standard coordination functions implemented as a common Internet layer that can be used as a utility by more specialized applications. Such a Coordinated Internet would revolutionize enterprise management, for all enterprises, large and small, corporate and personal. For example, static workflows would become obsolete for all but the the most routine processes. Some solutions provide existence proofs of such a coordination substrate, such as the Redux solution in concurrent engineering, which we describe herein. However, foundational research remains to be done in the new field of Coordination Engineering in order to reach the goal of a future Internet in which coordination functions are fundamental. Full article
(This article belongs to the Special Issue Semantics in the Future Internet)
Open AccessArticle Evolution of the Converged NGN Service Platforms Towards Future Networks
Future Internet 2011, 3(1), 67-86; doi:10.3390/fi3010067
Received: 21 February 2011 / Accepted: 28 February 2011 / Published: 4 March 2011
Cited by 1 | PDF Full-text (545 KB) | HTML Full-text | XML Full-text
Abstract
This article presents a comparison of main characteristics of the Next Generation Networks (NGN) and Future Generation Internet (FGI). The aim is to discuss and compare two approaches to Future Networks (FN) and services: the evolution of NGN, and the revolutionary approach of
[...] Read more.
This article presents a comparison of main characteristics of the Next Generation Networks (NGN) and Future Generation Internet (FGI). The aim is to discuss and compare two approaches to Future Networks (FN) and services: the evolution of NGN, and the revolutionary approach of a new FGI. We present both frameworks from the services point of view as they are delivered to the end-user, as well as from the architectural point of view. We compare selected properties of both approaches to explain commonalities and differences. Their challenges are similar: managing the quality of experience, mobility, security, scalability and providing openness to applications. Based on this comparison, we evaluate possible areas for future convergence in the approach of the two architectures to the Future Network concept. Our analysis shows that despite their different backgrounds, the internet’s FGI and telco’s NGN are not that different after all. The convergence of the two approaches therefore seems the only logical way forward. Full article
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)

Journal Contact

MDPI AG
Future Internet Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
futureinternet@mdpi.com
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Future Internet
Back to Top