You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 10, Issue 1

January 2018 - 10 articles

Cover Story: This figure describes a collaborative intrusion detection network (CIDN) environment, which allows various intrusion detection system (IDS) nodes to exchange necessary information with each other, with the purpose of enhancing the detection performance of a separate IDS. Two types of messages are available in such network: normal requests are sent by a node to collect data for alarm aggregation, while challenges are used to evaluate the reputation levels of other nodes. Challenge-based CIDNs are robust to common threats, but may be vulnerable to advanced insider attacks due to its unrealistic assumptions. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
7 Citations
6,578 Views
14 Pages

A Velocity-Aware Handover Trigger in Two-Tier Heterogeneous Networks

  • Asmae Ait Mansour,
  • Nourddine Enneya and
  • Mohamed Ouadou

15 January 2018

The unexpected change in user equipment (UE) velocity is recognized as the primary explanation for poor handover quality. In order to resolve this issue, while limiting ping-pong (PP) events we carefully and dynamically optimized handover parameters...

  • Feature Paper
  • Article
  • Open Access
6 Citations
6,243 Views
14 Pages

12 January 2018

Remote areas with sparse population, disaster areas in the aftermath, and refugee camps all require communication that is not forthcoming from commercial vendors. Numerous communication system options are available, but with widely varying cost and e...

  • Feature Paper
  • Article
  • Open Access
28 Citations
7,883 Views
16 Pages

Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing...

  • Article
  • Open Access
48 Citations
9,121 Views
23 Pages

Scientific workflow applications are collections of several structured activities and fine-grained computational tasks. Scientific workflow scheduling in cloud computing is a challenging research topic due to its distinctive features. In cloud enviro...

  • Review
  • Open Access
117 Citations
15,842 Views
18 Pages

Device-to-device (D2D) communication is an essential part of the future fifth generation (5G) system that can be seen as a “network of networks,” consisting of multiple seamlessly-integrated radio access technologies (RATs). Public safety communicati...

  • Feature Paper
  • Article
  • Open Access
48 Citations
13,634 Views
30 Pages

In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that...

  • Article
  • Open Access
15 Citations
7,104 Views
15 Pages

An Anonymous Offline RFID Grouping-Proof Protocol

  • Zhibin Zhou,
  • Pin Liu,
  • Qin Liu and
  • Guojun Wang

As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a securi...

  • Article
  • Open Access
17 Citations
7,200 Views
17 Pages

A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs

  • Rezvan Almas Shehni,
  • Karim Faez,
  • Farshad Eshghi and
  • Manoochehr Kelarestaghi

21 December 2017

Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by crea...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license