Next Issue
Previous Issue

Table of Contents

Future Internet, Volume 9, Issue 1 (March 2017)

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Readerexternal link to open them.
View options order results:
result details:
Displaying articles 1-9
Export citation of selected articles as:

Editorial

Jump to: Research

Open AccessEditorial Acknowledgement to Reviewers of Future Internet in 2016
Future Internet 2017, 9(1), 2; doi:10.3390/fi9010002
Received: 12 January 2017 / Accepted: 12 January 2017 / Published: 12 January 2017
PDF Full-text (211 KB) | HTML Full-text | XML Full-text
Abstract The editors of Future Internet would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...] Full article

Research

Jump to: Editorial

Open AccessArticle An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning
Future Internet 2017, 9(1), 7; doi:10.3390/fi9010007
Received: 23 December 2016 / Revised: 28 February 2017 / Accepted: 1 March 2017 / Published: 5 March 2017
PDF Full-text (3134 KB) | HTML Full-text | XML Full-text
Abstract
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy
[...] Read more.
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy protection in smart home applications, since attacks can be launched even without the need for access to the cipher. Rather, attacks can be successfully realized through analyzing the frequency of radio signals, as well as the timestamp series, so that the daily activities of the residents in the smart home can be learnt. Such types of attacks can achieve a very high success rate, making them a great threat to users’ privacy. In this paper, we propose an adaptive method based on sample data analysis and supervised learning (SDASL), to hide the patterns of daily routines of residents that would adapt to dynamically changing network loads. Compared to some existing solutions, our proposed method exhibits advantages such as low energy consumption, low latency, strong adaptability, and effective privacy protection. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
Figures

Figure 1

Open AccessArticle Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
Future Internet 2017, 9(1), 6; doi:10.3390/fi9010006
Received: 16 December 2016 / Revised: 15 February 2017 / Accepted: 17 February 2017 / Published: 3 March 2017
PDF Full-text (480 KB) | HTML Full-text | XML Full-text
Abstract
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accurate and cost-efficient. However, the online
[...] Read more.
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accurate and cost-efficient. However, the online exposure of such traditional business procedures has introduced new points of failure that may lead to privacy loss for applicants and harm the reputation of organizations. So far, the most common case of Online Recruitment Frauds (ORF), is employment scam. Unlike relevant online fraud problems, the tackling of ORF has not yet received the proper attention, remaining largely unexplored until now. Responding to this need, the work at hand defines and describes the characteristics of this severe and timely novel cyber security research topic. At the same time, it contributes and evaluates the first to our knowledge publicly available dataset of 17,880 annotated job ads, retrieved from the use of a real-life system. Full article
Figures

Figure 1

Open AccessArticle Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring
Future Internet 2017, 9(1), 8; doi:10.3390/fi9010008
Received: 9 January 2017 / Revised: 16 February 2017 / Accepted: 13 March 2017 / Published: 20 March 2017
PDF Full-text (3255 KB) | HTML Full-text | XML Full-text
Abstract
In the last decade, the differences in the information communication technology (ICT) infrastructures between urban and rural areas have registered a tremendous increase. ICT infrastructures could strongly help rural communities where many operations are time consuming, labor-intensive and expensive due to limited access
[...] Read more.
In the last decade, the differences in the information communication technology (ICT) infrastructures between urban and rural areas have registered a tremendous increase. ICT infrastructures could strongly help rural communities where many operations are time consuming, labor-intensive and expensive due to limited access and large distances to cover. One of the most attractive solutions, which is widely recognized as promising for filling this gap, is the use of drone fleets. In this context, this paper proposes a video monitoring platform as a service (VMPaaS) for wide rural areas not covered by Internet access. The platform is realized with a Software-Defined Network (SDN)/Network Functions Virtualization (NFV)-based flying ad-hoc network (FANET), whose target is providing a flexible and dynamic connectivity backbone, and a set of drones equipped with high-resolution cameras, each transmitting a video stream of a portion of the considered area. After describing the architecture of the proposed platform, service chains to realize the video delivery service are described, and an analytical model is defined to evaluate the computational load of the platform nodes in such a way so as to allow the network orchestrator to decide the backbone drones where running the virtual functions, and the relative resources to be allocated. Numerical analysis is carried out in a case study. Full article
(This article belongs to the Special Issue Communications and Computing for Sustainable Development Goals)
Figures

Figure 1

Open AccessFeature PaperArticle Key Technologies in the Context of Future Networks: Operational and Management Requirements
Future Internet 2017, 9(1), 1; doi:10.3390/fi9010001
Received: 11 September 2016 / Revised: 24 November 2016 / Accepted: 7 December 2016 / Published: 22 December 2016
Cited by 1 | PDF Full-text (1392 KB) | HTML Full-text | XML Full-text
Abstract
The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system,
[...] Read more.
The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN), Network Function Virtualization (NFV) and Self-Organized Networks (SON) are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms. Full article
(This article belongs to the Special Issue Information Systems Security)
Figures

Figure 1

Open AccessArticle A Point of View on New Education for Smart Citizenship
Future Internet 2017, 9(1), 4; doi:10.3390/fi9010004
Received: 21 September 2016 / Accepted: 17 January 2017 / Published: 1 February 2017
PDF Full-text (3181 KB) | HTML Full-text | XML Full-text
Abstract
Smart cities and intelligent communities have an ever-growing demand for specialized smart services, applications, and research-driven innovation. Knowledge of users’ profiles, behavior, and preferences are a potentially dangerous side effect of smart services. Citizens are usually not aware of the knowledge bases generated
[...] Read more.
Smart cities and intelligent communities have an ever-growing demand for specialized smart services, applications, and research-driven innovation. Knowledge of users’ profiles, behavior, and preferences are a potentially dangerous side effect of smart services. Citizens are usually not aware of the knowledge bases generated by the IT services they use: this dimension of the contemporary and digital era sheds new light on the elements concerning the concept of citizenship itself, as it affects dimensions like freedom and privacy. This paper addresses this issue from an education system perspective, and advances a non-technical methodology for being aware and recognizing knowledge bases generated by user-service interaction. Starting from narratives, developed in natural language by unskilled smart service users about their experience, the proposed method advances an original methodology, which is identified in the conceptual models derived from these narratives, a bridge towards a deeper understanding of the informative implications of their behavior. The proposal; which is iterative and scalable; has been tested on the field and some examples of lesson contents are presented and discussed. Full article
(This article belongs to the Special Issue Ecosystemic Evolution Feeded by Smart Systems)
Figures

Figure 1

Open AccessArticle Construction Management Risk System (CMRS) for Construction Management (CM) Firms
Future Internet 2017, 9(1), 5; doi:10.3390/fi9010005
Received: 16 November 2016 / Accepted: 7 February 2017 / Published: 10 February 2017
PDF Full-text (4065 KB) | HTML Full-text | XML Full-text
Abstract
After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM) firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order
[...] Read more.
After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM) firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS) for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records. Full article
Figures

Figure 1

Open AccessFeature PaperArticle Towards Incidence Management in 5G Based on Situational Awareness
Future Internet 2017, 9(1), 3; doi:10.3390/fi9010003
Received: 11 September 2016 / Revised: 26 December 2016 / Accepted: 5 January 2017 / Published: 17 January 2017
PDF Full-text (741 KB) | HTML Full-text | XML Full-text
Abstract
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying faster networks, with hundreds of thousands of simultaneous connections and massive data transfer. For this purpose, several emerging technologies are implemented, resulting in virtualization and self-organization of most of their
[...] Read more.
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying faster networks, with hundreds of thousands of simultaneous connections and massive data transfer. For this purpose, several emerging technologies are implemented, resulting in virtualization and self-organization of most of their components, which raises important challenges related to safety. In order to contribute to their resolution, this paper proposes a novel architecture for incident management on 5G. The approach combines the conventional risk management schemes with the Endsley Situational Awareness model, thus improving effectiveness in different aspects, among them the ability to adapt to complex and dynamical monitoring environments, and countermeasure tracking or the role of context when decision-making. The proposal takes into account all layers for information processing in 5G mobile networks, ranging from infrastructure to the actuators responsible for deploying corrective measures. Full article
(This article belongs to the Special Issue Information Systems Security)
Figures

Figure 1

Open AccessArticle Improved Recommendations Based on Trust Relationships in Social Networks
Future Internet 2017, 9(1), 9; doi:10.3390/fi9010009
Received: 24 February 2017 / Revised: 15 March 2017 / Accepted: 17 March 2017 / Published: 21 March 2017
PDF Full-text (1484 KB) | HTML Full-text | XML Full-text
Abstract
In order to alleviate the pressure of information overload and enhance consumer satisfaction, personalization recommendation has become increasingly popular in recent years. As a result, various approaches for recommendation have been proposed in the past few years. However, traditional recommendation methods are still
[...] Read more.
In order to alleviate the pressure of information overload and enhance consumer satisfaction, personalization recommendation has become increasingly popular in recent years. As a result, various approaches for recommendation have been proposed in the past few years. However, traditional recommendation methods are still troubled with typical issues such as cold start, sparsity, and low accuracy. To address these problems, this paper proposed an improved recommendation method based on trust relationships in social networks to improve the performance of recommendations. In particular, we define trust relationship afresh and consider several representative factors in the formalization of trust relationships. To verify the proposed approach comprehensively, this paper conducted experiments in three ways. The experimental results show that our proposed approach leads to a substantial increase in prediction accuracy and is very helpful in dealing with cold start and sparsity. Full article
Figures

Journal Contact

MDPI AG
Future Internet Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
E-Mail: 
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Future Internet Edit a special issue Review for Future Internet
Back to Top