Skip to Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 13, Issue 8

2021 August - 34 articles

Cover Story: IoT group communication allows users to control multiple IoT devices simultaneously. This can be achieved by interconnecting IoT devices over SDN. Such a technique removes the need for IP multicast and enables self-organizing IoT groups, where IoT endpoints can advertise the CoAP URIs of their resources, and groups can be automatically created based on these advertisements. To protect the network from maliciously injecting illegitimate advertisements, we propose a mechanism that allows only authorized endpoints to perform advertisements. The system considers that each endpoint represents its available resource using a JSON-encoded file to be signed by a trusted service provider and inserted in the advertisements together with a proof of ownership. Recipients of such an advertisement can then easily verify its validity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (34)

  • Review
  • Open Access
472 Citations
28,742 Views
19 Pages

IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare—A Review

  • Taher M. Ghazal,
  • Mohammad Kamrul Hasan,
  • Muhammad Turki Alshurideh,
  • Haitham M. Alzoubi,
  • Munir Ahmad,
  • Syed Shehryar Akbar,
  • Barween Al Kurdi and
  • Iman A. Akour

23 August 2021

Smart city is a collective term for technologies and concepts that are directed toward making cities efficient, technologically more advanced, greener and more socially inclusive. These concepts include technical, economic and social innovations. Thi...

  • Article
  • Open Access
16 Citations
5,606 Views
22 Pages

Spiking Neural Network-Based Near-Sensor Computing for Damage Detection in Structural Health Monitoring

  • Francesco Barchi,
  • Luca Zanatta,
  • Emanuele Parisi,
  • Alessio Burrello,
  • Davide Brunelli,
  • Andrea Bartolini and
  • Andrea Acquaviva

23 August 2021

In this work, we present an innovative approach for damage detection of infrastructures on-edge devices, exploiting a brain-inspired algorithm. The proposed solution exploits recurrent spiking neural networks (LSNNs), which are emerging for their the...

  • Article
  • Open Access
28 Citations
6,166 Views
17 Pages

21 August 2021

After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished...

  • Article
  • Open Access
3 Citations
2,982 Views
19 Pages

20 August 2021

During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compress...

  • Article
  • Open Access
13 Citations
3,329 Views
18 Pages

20 August 2021

Traditional research methods in software defect prediction use part of the data in the same project to train the defect prediction model and predict the defect label of the remaining part of the data. However, in the practical realm of software devel...

  • Article
  • Open Access
19 Citations
3,856 Views
10 Pages

Intraoperative Use of Mixed Reality Technology in Median Neck and Branchial Cyst Excision

  • Vladimir M. Ivanov,
  • Anton M. Krivtsov,
  • Sergey V. Strelkov,
  • Nikolay V. Kalakutskiy,
  • Andrey I. Yaremenko,
  • Marina Yu. Petropavlovskaya,
  • Maria N. Portnova,
  • Olga V. Lukina and
  • Andrey P. Litvinov

18 August 2021

The paper considers the possibilities, prospects, and drawbacks of the mixed reality (MR) technology application using mixed reality smartglasses Microsoft HoloLens 2. The main challenge was to find and develop an approach that would allow surgeons t...

  • Article
  • Open Access
4 Citations
3,087 Views
16 Pages

17 August 2021

While Europe was beginning to deal with the resurgence of COVID-19 due to the Delta variant, the European football championship took place from 11 June to 11 July 2021. We studied the inversion in the decreased/increased rate of new SARS-COV-2 infect...

  • Article
  • Open Access
6 Citations
3,730 Views
22 Pages

17 August 2021

With the rapid proliferation of wireless traffic and the surge of various data-intensive applications, the energy consumption of wireless networks has tremendously increased in the last decade, which not only leads to more CO2 emission, but also resu...

  • Review
  • Open Access
63 Citations
9,749 Views
26 Pages

16 August 2021

With exponential growth in the deployment of Internet of Things (IoT) devices, many new innovative and real-life applications are being developed. IoT supports such applications with the help of resource-constrained fixed as well as mobile nodes. The...

  • Article
  • Open Access
12 Citations
4,259 Views
21 Pages

16 August 2021

The Third Generation Partnership Project (3GPP) Release 16 defines the sensing-based semi-persistent scheduling (SPS) as the resource allocation scheme for Sidelink Mode 2 in New Radio (NR)-based vehicle-to-everything (V2X) communication. A well-know...

  • Article
  • Open Access
4 Citations
3,310 Views
20 Pages

Crowdsourcing Framework for QoE-Aware SD-WAN

  • Ibtihal Ellawindy and
  • Shahram Shah Heydari

15 August 2021

Quality of experience (QoE) is an important measure of users’ satisfaction regarding their network-based services, and it is widely employed today to provide a real assessment of the service quality as perceived by the end users. QoE measures can be...

  • Article
  • Open Access
3,082 Views
13 Pages

Secure Internal Data Markets

  • Peter Kieseberg,
  • Sebastian Schrittwieser and
  • Edgar Weippl

12 August 2021

The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive...

  • Article
  • Open Access
3 Citations
3,059 Views
9 Pages

Securing SDN-Based IoT Group Communication

  • Bander Alzahrani and
  • Nikos Fotiou

9 August 2021

IoT group communication allows users to control multiple IoT devices simultaneously. A convenient method for implementing this communication paradigm is by leveraging software-defined networking (SDN) and allowing IoT endpoints to “advertise” the res...

  • Article
  • Open Access
12 Citations
4,293 Views
17 Pages

5 August 2021

With the objective of assessing the farmers’ situation regarding the use of the ICT and their relations with the electronic government, a case study consisting in the realization of 34 face-to-face surveys was conducted between February and March 202...

  • Article
  • Open Access
9 Citations
4,488 Views
29 Pages

Ambalytics: A Scalable and Distributed System Architecture Concept for Bibliometric Network Analyses

  • Klaus Kammerer,
  • Manuel Göster,
  • Manfred Reichert and
  • Rüdiger Pryss

4 August 2021

A deep understanding about a field of research is valuable for academic researchers. In addition to technical knowledge, this includes knowledge about subareas, open research questions, and social communities (networks) of individuals and organizatio...

  • Article
  • Open Access
2 Citations
3,104 Views
21 Pages

A DFT-Based Running Time Prediction Algorithm for Web Queries

  • Oscar Rojas,
  • Veronica Gil-Costa and
  • Mauricio Marin

4 August 2021

Web search engines are built from components capable of processing large amounts of user queries per second in a distributed way. Among them, the index service computes the top-k documents that best match each incoming query by means of a document ra...

  • Article
  • Open Access
12 Citations
3,370 Views
16 Pages

4 August 2021

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be fol...

  • Article
  • Open Access
12 Citations
4,918 Views
13 Pages

3 August 2021

This study aims to analyze the application of good enough governance in considering the citizens’ value propositions that shape smart city societies. This paper applied a quantitative method with cross-country comparisons. Survey data were derived fr...

  • Review
  • Open Access
7 Citations
3,723 Views
27 Pages

3 August 2021

Education 4.0 is looking to prepare future scientists and engineers not only by granting them with knowledge and skills but also by giving them the ability to apply them to solve real life problems through the implementation of disruptive technologie...

  • Article
  • Open Access
21 Citations
4,446 Views
22 Pages

A Survey of Ledger Technology-Based Databases

  • Dénes László Fekete and
  • Attila Kiss

The spread of crypto-currencies globally has led to blockchain technology receiving greater attention in recent times. This paper focuses more broadly on the uses of ledger databases as a traditional database manager. Ledger databases will be examine...

  • Article
  • Open Access
51 Citations
13,116 Views
43 Pages

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends

  • Simon Nam Thanh Vu,
  • Mads Stege,
  • Peter Issam El-Habr,
  • Jesper Bang and
  • Nicola Dragoni

Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-se...

  • Article
  • Open Access
6 Citations
3,447 Views
14 Pages

Network behavior analysis is an effective method to outline user requirements, and can extract user characteristics by constructing machine learning models. To protect the privacy of data, the shared information in the model is limited to non-directi...

  • Review
  • Open Access
34 Citations
8,367 Views
17 Pages

Computer Vision for Fire Detection on UAVs—From Software to Hardware

  • Seraphim S. Moumgiakmas,
  • Gerasimos G. Samatas and
  • George A. Papakostas

Fire hazard is a condition that has potentially catastrophic consequences. Artificial intelligence, through Computer Vision, in combination with UAVs has assisted dramatically to identify this risk and avoid it in a timely manner. This work is a lite...

  • Article
  • Open Access
11 Citations
3,949 Views
13 Pages

Towards the Quantum Internet: Satellite Control Plane Architectures and Protocol Design

  • Francesco Chiti,
  • Romano Fantacci,
  • Roberto Picchi and
  • Laura Pierucci

The creation of the future quantum Internet requires the development of new systems, architectures, and communications protocols. As a matter of fact, the optical fiber technology is affected by extremely high losses; thus, the deployment of a quantu...

  • Article
  • Open Access
12 Citations
4,504 Views
19 Pages

Hip fracture incidence is life-threatening and has an impact on the person’s physical functionality and their ability to live independently. Proper rehabilitation with a set program can play a significant role in recovering the person’s physical mobi...

  • Article
  • Open Access
21 Citations
4,848 Views
14 Pages

Movement Analysis for Neurological and Musculoskeletal Disorders Using Graph Convolutional Neural Network

  • Ibsa K. Jalata,
  • Thanh-Dat Truong,
  • Jessica L. Allen,
  • Han-Seok Seo and
  • Khoa Luu

Using optical motion capture and wearable sensors is a common way to analyze impaired movement in individuals with neurological and musculoskeletal disorders. However, using optical motion sensors and wearable sensors is expensive and often requires...

  • Article
  • Open Access
32 Citations
5,847 Views
14 Pages

One of the main focuses of Education 4.0 is to provide students with knowledge on disruptive technologies, such as Machine Learning (ML), as well as the skills to implement this knowledge to solve real-life problems. Therefore, both students and prof...

  • Article
  • Open Access
10 Citations
4,388 Views
17 Pages

Implementation of Parallel Cascade Identification at Various Phases for Integrated Navigation System

  • Umar Iqbal,
  • Ashraf Abosekeen,
  • Jacques Georgy,
  • Areejah Umar,
  • Aboelmagd Noureldin and
  • Michael J. Korenberg

Global navigation satellite systems (GNSS) are widely used for the navigation of land vehicles. However, the positioning accuracy of GNSS, such as the global positioning system (GPS), deteriorates in urban areas due to signal blockage and multipath e...

  • Article
  • Open Access
8 Citations
4,894 Views
16 Pages

Digitalization is boosting the manufacturing industry’s shift to smart manufacturing systems, which will efficiently utilize the potential of new technologies for their business outcomes and value. However, the literature shows that manufacturing com...

  • Article
  • Open Access
6 Citations
3,075 Views
15 Pages

Vision System Experimentation in Furniture Industrial Environment

  • Gurbaksh Bhullar,
  • Simon Osborne,
  • María José Núñez Ariño,
  • Juan Del Agua Navarro and
  • Fernando Gigante Valencia

The integration of devices that support manufacturing activities and the interaction of workers with these devices in production plants, leads to potential benefits in the industrial environment. Problems, bottlenecks and improvement opportunities th...

  • Article
  • Open Access
5 Citations
4,312 Views
25 Pages

IEC 61499 is a reference architecture for constructing Industrial Cyber-Physical Systems (ICPS). However, current function block development environments only provide limited fault-finding capabilities. There is a need for comprehensive diagnostic to...

  • Article
  • Open Access
6 Citations
3,004 Views
23 Pages

Due to the limitations of mobile phone positioning technology in the past, it is difficult for an advertising system to obtain users’ locations. Although there are many advertising delivery ideas in the market, time and location-based advertising del...

  • Article
  • Open Access
12 Citations
4,118 Views
16 Pages

Improving Human Ground Control Performance in Unmanned Aerial Systems

  • Marianna Di Gregorio,
  • Marco Romano,
  • Monica Sebillo,
  • Giuliana Vitiello and
  • Angela Vozella

The use of Unmanned Aerial Systems, commonly called drones, is growing enormously today. Applications that can benefit from the use of fleets of drones and a related human–machine interface are emerging to ensure better performance and reliability. I...

  • Article
  • Open Access
25 Citations
8,820 Views
36 Pages

Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903