Next Issue
Volume 14, August
Previous Issue
Volume 14, June
 
 

Future Internet, Volume 14, Issue 7 (July 2022) – 27 articles

Cover Story (view full-size image): Unmanned aerial vehicles (UAVs), commonly known as drones, are an emerging facilitator of several smart city services, such as observing weather phenomena, aerial photography, product delivery and surveillance. However, drones can be compromised by an adversary, causing altered flight routes and possible sabotage. In this article, a systematic framework for identifying malicious drone behavior through the use of a deep analysis of routine (normal) drone operations is presented. Normal drone flight behavior is reverse-engineered and malicious drone behavior is synthesized for hijacking, GPS signal jamming and DoS attacks. Subsequently, machine learning techniques are adopted to identify malicious drone activity for the study. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
48 pages, 1458 KiB  
Review
Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
by Yehia Ibrahim Alzoubi, Ahmad Al-Ahmad, Hasan Kahtan and Ashraf Jaradat
Future Internet 2022, 14(7), 216; https://doi.org/10.3390/fi14070216 - 21 Jul 2022
Cited by 21 | Viewed by 3548
Abstract
The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environment would require [...] Read more.
The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things. Blockchain, a technology that was born with the cryptocurrency Bitcoin, may fulfill Internet of things requirements. However, due to the characteristics of both Internet of things devices and Blockchain technology, integrating Blockchain and the Internet of things can cause several challenges. Despite a large number of papers that have been published in the field of Blockchain and the Internet of things, the problems of this combination remain unclear and scattered. Accordingly, this paper aims to provide a comprehensive survey of the challenges related to Blockchain–Internet of things integration by evaluating the related peer-reviewed literature. The paper also discusses some of the recommendations for reducing the effects of these challenges. Moreover, the paper discusses some of the unsolved concerns that must be addressed before the next generation of integrated Blockchain–Internet of things applications can be deployed. Lastly, future trends in the context of Blockchain–Internet of things integration are discussed. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

15 pages, 936 KiB  
Article
Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time
by Marcin Wątorek, Jarosław Kwapień and Stanisław Drożdż
Future Internet 2022, 14(7), 215; https://doi.org/10.3390/fi14070215 - 21 Jul 2022
Cited by 11 | Viewed by 2210
Abstract
Unlike price fluctuations, the temporal structure of cryptocurrency trading has seldom been a subject of systematic study. In order to fill this gap, we analyse detrended correlations of the price returns, the average number of trades in time unit, and the traded volume [...] Read more.
Unlike price fluctuations, the temporal structure of cryptocurrency trading has seldom been a subject of systematic study. In order to fill this gap, we analyse detrended correlations of the price returns, the average number of trades in time unit, and the traded volume based on high-frequency data representing two major cryptocurrencies: bitcoin and ether. We apply the multifractal detrended cross-correlation analysis, which is considered the most reliable method for identifying nonlinear correlations in time series. We find that all the quantities considered in our study show an unambiguous multifractal structure from both the univariate (auto-correlation) and bivariate (cross-correlation) perspectives. We looked at the bitcoin–ether cross-correlations in simultaneously recorded signals, as well as in time-lagged signals, in which a time series for one of the cryptocurrencies is shifted with respect to the other. Such a shift suppresses the cross-correlations partially for short time scales, but does not remove them completely. We did not observe any qualitative asymmetry in the results for the two choices of a leading asset. The cross-correlations for the simultaneous and lagged time series became the same in magnitude for the sufficiently long scales. Full article
(This article belongs to the Special Issue Blockchain Security and Privacy)
Show Figures

Figure 1

24 pages, 623 KiB  
Article
Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks
by Mohd-Yaseen Mir, Hengbing Zhu and Chih-Lin Hu
Future Internet 2022, 14(7), 214; https://doi.org/10.3390/fi14070214 - 20 Jul 2022
Cited by 1 | Viewed by 1732
Abstract
Opportunistic ad hoc networks are characterized by intermittent and infrastructure-less connectivity among mobile nodes. Because of the lack of up-to-date network topology information and frequent link failures, geographic routing utilizes location information and adopts the store–carry–forward data delivery model to relay messages in [...] Read more.
Opportunistic ad hoc networks are characterized by intermittent and infrastructure-less connectivity among mobile nodes. Because of the lack of up-to-date network topology information and frequent link failures, geographic routing utilizes location information and adopts the store–carry–forward data delivery model to relay messages in a delay-tolerant manner. This paper proposes a message-forwarding policy based on movement patterns (MPMF). First, one- and two-hop location information in a geographic neighborhood is exploited to select relay nodes moving closer to a destination node. Message-forwarding decisions are made by referring to selected relay nodes’ weight values obtained by calculating the contact frequency of each node with the destination node. Second, when relays in the vicinity of a message-carrying node are not qualified due to the sparse node density and nodal motion status, the destination’s movement and the location information of a one-hop relay are jointly utilized to improve the message-forwarding decision. If the one-hop relay is not closer to the destination node or moving away from it, its centrality value in the network is used instead. Based on both synthetic and real mobility scenarios, the simulation results show that the proposed policy performs incomparable efforts to some typical routing policies, such as Epidemic, PRoPHETv2, temporal closeness and centrality-based (TCCB), transient community-based (TC), and geographic-based spray-and-relay (GSaR) routing policies. Full article
(This article belongs to the Topic Wireless Communications and Edge Computing in 6G)
Show Figures

Figure 1

26 pages, 2456 KiB  
Article
A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks
by Thiago C. Jesus, Daniel G. Costa, Paulo Portugal and Francisco Vasques
Future Internet 2022, 14(7), 213; https://doi.org/10.3390/fi14070213 - 19 Jul 2022
Cited by 8 | Viewed by 1712
Abstract
Wireless visual sensor networks have been adopted in different contexts to provide visual information in a more flexible and distributed way, supporting the development of different innovative applications. Although visual data may be central for a considerable set of applications in areas such [...] Read more.
Wireless visual sensor networks have been adopted in different contexts to provide visual information in a more flexible and distributed way, supporting the development of different innovative applications. Although visual data may be central for a considerable set of applications in areas such as Smart Cities, Industry 4.0, and Vehicular Networks, the actual visual data quality may be not easily determined since it may be associated with many factors that depend on the characteristics of the considered application scenario. This entails several aspects from the quality of captured images (sharpness, definition, resolution) to the characteristics of the networks such as employed hardware, power consumption, and networking efficiency. In order to better support quality analysis and performance comparisons among different wireless visual sensor networks, which could be valuable in many monitoring scenarios, this article surveys this area with special concern on assessment mechanisms and quality metrics. In this context, a novel classification approach is proposed to better categorize the diverse applicable metrics for quality assessment of visual monitoring procedures. Hence, this article yields a practical guide for analyzing different visual sensor network implementations, allowing fairer evaluations and comparisons among a variety of research works. Critical analysis are also performed regarding the relevance and usage of the proposed categories and identified quality metrics. Finally, promising open issues and research directions are discussed in order to guide new developments in this research field. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

21 pages, 283655 KiB  
Article
Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval
by Kangying Li, Jiayun Wang, Biligsaikhan Batjargal and Akira Maeda
Future Internet 2022, 14(7), 212; https://doi.org/10.3390/fi14070212 - 18 Jul 2022
Cited by 1 | Viewed by 1958
Abstract
In recent years, artworks have been increasingly digitized and built into databases, and such databases have become convenient tools for researchers. Researchers who retrieve artwork are not only researchers of humanities, but also researchers of materials science, physics, art, and so on. It [...] Read more.
In recent years, artworks have been increasingly digitized and built into databases, and such databases have become convenient tools for researchers. Researchers who retrieve artwork are not only researchers of humanities, but also researchers of materials science, physics, art, and so on. It may be difficult for researchers of various fields whose studies focus on the colors of artwork to find the required records in existing databases, that are color-based and only queried by the metadata. Besides, although some image retrieval engines can be used to retrieve artwork by text description, the existing image retrieval systems mainly retrieve the main colors of the images, and rare cases of color use are difficult to find. This makes it difficult for many researchers who focus on toning, colors, or pigments to use search engines for their own needs. To solve the two problems, we propose a cross-modal multi-task fine-tuning method based on CLIP (Contrastive Language-Image Pre-Training), which uses the human sensory characteristics of colors contained in the language space and the geometric characteristics of the sketches of a given artwork in order to gain better representations of that artwork piece. The experimental results show that the proposed retrieval framework is efficient for intuitively searching for rare colors, and that a small amount of data can improve the correspondence between text descriptions and color information. Full article
(This article belongs to the Special Issue Big Data Analytics, Privacy and Visualization)
Show Figures

Figure 1

11 pages, 1342 KiB  
Article
Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples
by Daiho Uhm and Sunghae Jun
Future Internet 2022, 14(7), 211; https://doi.org/10.3390/fi14070211 - 16 Jul 2022
Cited by 3 | Viewed by 1440
Abstract
Due to the expansion of the internet, we encounter various types of big data such as web documents or sensing data. Compared to traditional small data such as experimental samples, big data provide more chances to find hidden and novel patterns with big [...] Read more.
Due to the expansion of the internet, we encounter various types of big data such as web documents or sensing data. Compared to traditional small data such as experimental samples, big data provide more chances to find hidden and novel patterns with big data analysis using statistics and machine learning algorithms. However, as the use of big data increases, problems also occur. One of them is a zero-inflated problem in structured data preprocessed from big data. Most count values are zeros because a specific word is found in only some documents. In particular, since most of the patent data are in the form of a text document, they are more affected by the zero-inflated problem. To solve this problem, we propose a generation of synthetic samples using statistical inference and tree structure. Using patent document and simulation data, we verify the performance and validity of our proposed method. In this paper, we focus on patent keyword analysis as text big data analysis, and we encounter the zero-inflated problem just like other text data. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Graphical abstract

24 pages, 4895 KiB  
Article
Blockchain for Doping Control Applications in Sports: A Conceptual Approach
by Flavio Pinto, Yogachandran Rahulamathavan and James Skinner
Future Internet 2022, 14(7), 210; https://doi.org/10.3390/fi14070210 - 14 Jul 2022
Cited by 1 | Viewed by 2365
Abstract
Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizations and sports authorities are expected to cooperate [...] Read more.
Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizations and sports authorities are expected to cooperate in the fight against doping. To achieve this mission, doping-related data must be produced, stored, accessed, and shared in a secure, tamperproof, and privacy-preserving manner. This paper investigates the processes and tools established by the World Anti-Doping Agency for the global harmonization of doping control activities. From this investigation, it is possible to conclude that there is an inherent trust problem, in part due to a centralized data management paradigm and to the lack of fully digitalized processes. Therefore, this paper presents two main contributions: the concept of a multiorganizational decentralized data governance model and a blockchain-based design for one of the most sensitive data-sharing processes within the anti-doping ecosystem. Throughout this article, it is shown that the adoption of a permissioned blockchain can benefit the whole anti-doping community, creating more reliable processes for handling data, where privacy and security are enhanced. Full article
Show Figures

Figure 1

15 pages, 1704 KiB  
Article
N-Trans: Parallel Detection Algorithm for DGA Domain Names
by Cheng Yang, Tianliang Lu, Shangyi Yan, Jianling Zhang and Xingzhan Yu
Future Internet 2022, 14(7), 209; https://doi.org/10.3390/fi14070209 - 13 Jul 2022
Cited by 3 | Viewed by 1768
Abstract
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against cyber attacks. The detection of such malicious [...] Read more.
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against cyber attacks. The detection of such malicious domain names by the use of traditional machine learning algorithms has been explored by many researchers, but still is not perfect. To further improve on this, we propose a novel parallel detection model named N-Trans that is based on the N-gram algorithm with the Transformer model. First, we add flag bits to the first and last positions of the domain name for the parallel combination of the N-gram algorithm and Transformer framework to detect a domain name. The model can effectively extract the letter combination features and capture the position features of letters in the domain name. It can capture features such as the first and last letters in the domain name and the position relationship between letters. In addition, it can accurately distinguish between legitimate and malicious domain names. In the experiment, the dataset is the legal domain name of Alexa and the malicious domain name collected by the 360 Security Lab. The experimental results show that the parallel detection model based on N-gram and Transformer achieves 96.97% accuracy for DGA malicious domain name detection. It can effectively and accurately identify malicious domain names and outperforms the mainstream malicious domain name detection algorithms. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

23 pages, 6966 KiB  
Article
Analytical Modeling and Empirical Analysis of Binary Options Strategies
by Gurdal Ertek, Aysha Al-Kaabi and Aktham Issa Maghyereh
Future Internet 2022, 14(7), 208; https://doi.org/10.3390/fi14070208 - 06 Jul 2022
Cited by 1 | Viewed by 3845
Abstract
This study analyzes binary option investment strategies by developing mathematical formalism and formulating analytical models. The binary outcome of binary options represents either an increase or a decrease in a parameter, typically an asset or derivative. The investor receives only partial returns if [...] Read more.
This study analyzes binary option investment strategies by developing mathematical formalism and formulating analytical models. The binary outcome of binary options represents either an increase or a decrease in a parameter, typically an asset or derivative. The investor receives only partial returns if the prediction is correct but loses all the investment otherwise. Mainstream research on binary options aims to develop the best dynamic trading strategies. This study focuses on static tactical easy-to-implement strategies and investigates the performance of such strategies in relation to prediction accuracy, payout percentage, and investment strategy decisions. Full article
(This article belongs to the Special Issue Big Data Analytics, Privacy and Visualization)
Show Figures

Figure 1

18 pages, 1941 KiB  
Article
Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites
by Hengfei Cheng, Zhaobin Xu, Xiaoxu Guo, Jia Yang, Kedi Xu, Shuqin Liu, Zhonghe Jin and Xiaojun Jin
Future Internet 2022, 14(7), 207; https://doi.org/10.3390/fi14070207 - 04 Jul 2022
Viewed by 1599
Abstract
Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy algorithms and their derivatives also have some limitations. [...] Read more.
Low-orbit micro-satellite technology has developed rapidly in recent years due to its advantages of low time delay, low cost and short research period. However, among the existing inter-satellite routing algorithms, the classical flooding and greedy algorithms and their derivatives also have some limitations. The path delay calculated by the flooding algorithm is small but the calculation is large, while the greedy algorithm is the opposite. In this paper, a balanced inter-satellite routing algorithm based on partition routing is proposed. This paper presents the simulation experiments for the following indexes of the classic inter-satellite routing algorithms and the balanced partition routing algorithm: computation complexity, single-node computation pressure, routing path delay, path delay variance (data in Topo table satisfy μ =5, σ2=10). The results reveal that the balanced partition routing algorithm achieves better performance. In this paper, two optimization directions of the balanced partition routing algorithm are simulated under conditions that the data in the Topo table satisfy μ =5, σ2= 6, σ2=10 and σ2=15, respectively, when comparing their performance indicators. The experiments show that these two optimization methods can be adapted to various application scenarios and can further reduce the hardware cost of satellite nodes. Full article
(This article belongs to the Special Issue Security in Mobile Communications and Computing)
Show Figures

Figure 1

15 pages, 1784 KiB  
Review
Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art
by Alexandros Kouretsis, Iraklis Varlamis, Laida Limniati, Minas Pergantis and Andreas Giannakoulopoulos
Future Internet 2022, 14(7), 206; https://doi.org/10.3390/fi14070206 - 03 Jul 2022
Cited by 2 | Viewed by 2347
Abstract
Graph-like structures, which are increasingly popular in data representation, stand out since they enable the integration of information from multiple sources. At the same time, clustering algorithms applied on graphs allow for group entities based on similar characteristics, and discover statistically important information. [...] Read more.
Graph-like structures, which are increasingly popular in data representation, stand out since they enable the integration of information from multiple sources. At the same time, clustering algorithms applied on graphs allow for group entities based on similar characteristics, and discover statistically important information. This paper aims to explore the associations between the visual objects of the Renaissance in the Europeana database, based on the results of topic modeling and analysis. For this purpose, we employ Europeana’s Search and Report API to investigate the relations between the visual objects from this era, spanning from the 14th to the 17th century, and to create clusters of similar art objects. This approach will lead in transforming a cultural heritage database with semantic technologies into a dynamic digital knowledge representation graph that will relate art objects and their attributes. Based on associations between metadata, we will conduct a statistic analysis utilizing the knowledge graph of Europeana and topic modeling analysis. Full article
(This article belongs to the Special Issue Knowledge Graph Mining and Its Applications)
Show Figures

Figure 1

19 pages, 1202 KiB  
Article
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
by Zubair Baig, Naeem Syed and Nazeeruddin Mohammad
Future Internet 2022, 14(7), 205; https://doi.org/10.3390/fi14070205 - 30 Jun 2022
Cited by 10 | Viewed by 3170
Abstract
Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, deliver goods and observe [...] Read more.
Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, deliver goods and observe environmental phenomena. Cyber threats posed through compromised drones contribute to sabotage in a smart city’s airspace, can prove to be catastrophic to its operations, and can also cause fatalities. In this contribution, we propose a machine learning-based approach for detecting hijacking, GPS signal jamming and denial of service (DoS) attacks that can be carried out against a drone. A detailed machine learning-based classification of drone datasets for the DJI Phantom 4 model, compromising both normal and malicious signatures, is conducted, and results obtained yield advisory to foster futuristic opportunities to safeguard a drone system against such cyber threats. Full article
(This article belongs to the Special Issue Machine Learning Integration with Cyber Security)
Show Figures

Figure 1

21 pages, 5986 KiB  
Article
Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction
by Aristeidis Lamprogeorgos, Minas Pergantis, Michail Panagopoulos and Andreas Giannakoulopoulos
Future Internet 2022, 14(7), 204; https://doi.org/10.3390/fi14070204 - 30 Jun 2022
Cited by 1 | Viewed by 1723
Abstract
The last decade has been a time of great progress in the World Wide Web and this progress has manifested in multiple ways, including both the diffusion and expansion of Semantic Web technologies and the advancement of the aesthetics and usability of Web [...] Read more.
The last decade has been a time of great progress in the World Wide Web and this progress has manifested in multiple ways, including both the diffusion and expansion of Semantic Web technologies and the advancement of the aesthetics and usability of Web user interfaces. Online media outlets have often been popular Web destinations and so they are expected to be at the forefront of innovation, both in terms of the integration of new technologies and in terms of the evolution of their interfaces. In this study, various Web data extraction techniques were employed to collect current and archival data from news websites that are popular in Greece, in order to monitor and record their progress through time. This collected information, which took the form of a website’s source code and an impression of their homepage in different time instances of the last decade, has been used to identify trends concerning Semantic Web integration, DOM structure complexity, number of graphics, color usage, and more. The identified trends were analyzed and discussed with the purpose of gaining a better understanding of the ever-changing presence of the media industry on the Web. The study concluded that the introduction of Semantic Web technologies in online media outlets was rapid and extensive and that website structural and visual complexity presented a steady and significant positive trend, accompanied by increased adherence to color harmony. Full article
(This article belongs to the Special Issue Theory and Applications of Web 3.0 in the Media Sector)
Show Figures

Figure 1

13 pages, 3898 KiB  
Article
Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors
by Minwoo Park and Euichul Lee
Future Internet 2022, 14(7), 203; https://doi.org/10.3390/fi14070203 - 30 Jun 2022
Viewed by 1428
Abstract
In this paper, we propose a method for extracting emotional factors through audiovisual quantitative feature analysis from images of the surrounding environment. Nine features were extracted such as time complexity, spatial complexity (horizontal and vertical), color components (hue and saturation), intensity, contrast, sound [...] Read more.
In this paper, we propose a method for extracting emotional factors through audiovisual quantitative feature analysis from images of the surrounding environment. Nine features were extracted such as time complexity, spatial complexity (horizontal and vertical), color components (hue and saturation), intensity, contrast, sound amplitude, and sound frequency. These nine features were used to infer “pleasant-unpleasant” and “arousal-relaxation” scores through two support vector regressions. First, the inference accuracy for each of the nine features was calculated as a hit ratio to check the distinguishing power of the features. Next, the difference between the position in the two-dimensional emotional plane inferred through SVR and the ground truth determined subjectively by the subject was examined. As a result of the experiment, it was confirmed that the time-complexity feature had the best classification performance, and it was confirmed that the emotion inferred through SVR can be valid when the two-dimensional emotional plane is divided into 3 × 3. Full article
(This article belongs to the Special Issue Trends of Data Science and Knowledge Discovery)
Show Figures

Figure 1

21 pages, 2684 KiB  
Article
Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective
by Yingxun Wang, Hushairi Zen, Mohamad Faizrizwan Mohd Sabri, Xiang Wang and Lee Chin Kho
Future Internet 2022, 14(7), 202; https://doi.org/10.3390/fi14070202 - 30 Jun 2022
Cited by 5 | Viewed by 2413
Abstract
Over the past decade or so, considerable and rapid advancements in the state of the art within the promising paradigms of the Internet of Things (IoT) and Artificial Intelligence (AI) have accelerated the development of conventional Vehicular Ad Hoc Networks (VANETS) into the [...] Read more.
Over the past decade or so, considerable and rapid advancements in the state of the art within the promising paradigms of the Internet of Things (IoT) and Artificial Intelligence (AI) have accelerated the development of conventional Vehicular Ad Hoc Networks (VANETS) into the Internet of Vehicles (IoV), thereby bringing both connected and autonomous driving much closer to realization. IoV is a new concept in the Intelligent Traffic System (ITS) and an extended application of IoV in intelligent transportation. It enhances the existing capabilities of mobile ad hoc networks by integrating them with IoT so as to build an integrated and unified vehicle-to-vehicle network. It is worth mentioning that academic and industrial researchers are paying increasing attention to the concept of trust. Reliable trust models and accurate trust assessments are anticipated to improve the security of the IoV. This paper, therefore, focuses on the existing trustworthiness management models along with their corresponding trust parameters, as well as the corresponding trust evaluation parameters and simulation, which provide the basis for intelligent and efficient model suggestions and optimal parameter integration. In addition, this paper also puts forward some open research directions that need to be seriously solved before trust can play its due role in enhancing IoV network elasticity. Full article
(This article belongs to the Special Issue Software-Defined Vehicular Networking)
Show Figures

Figure 1

17 pages, 2618 KiB  
Article
Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization
by Abdulrahman K. Alnaim
Future Internet 2022, 14(7), 201; https://doi.org/10.3390/fi14070201 - 30 Jun 2022
Viewed by 1513
Abstract
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more security threats. A key part of [...] Read more.
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more security threats. A key part of this virtualization environment is the hypervisor, which emulates the hardware resources to provide a runtime environment for virtual machines (VMs). The hypervisor is considered a major attack vector and must be secured to ensure network service continuity. The virtualization environment contains critical non-control data where compromise could lead to several misuses, including information leakage and privilege and resource modification. In this paper, we present a misuse pattern for an attack that exploits the security vulnerabilities of the hypervisor to compromise the integrity of non-control data in the NFV environment. Misuse patterns are used to describe how attacks are carried out from the attackers’ perspective. The threat of modification of non-control data can lead to several misuses, and in this paper, we discuss three of them. The defenses to this attack can be incorporated into the Security Reference Architecture (SRA) of the NFV system to prevent these misuses. Full article
(This article belongs to the Section Network Virtualization and Edge/Fog Computing)
Show Figures

Figure 1

12 pages, 2031 KiB  
Communication
A Public Infrastructure for a Trusted Wireless World
by Renee Carnley and Sikha Bagui
Future Internet 2022, 14(7), 200; https://doi.org/10.3390/fi14070200 - 30 Jun 2022
Cited by 1 | Viewed by 1853
Abstract
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital identity for secure online voting. [...] Read more.
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital identity for secure online voting. The paper goes on to discuss how blockchain-based PKI, NFC, and the cloud provide a roadmap for how industry and governments can update existing frameworks to obtain a trusted digital identity in cyberspace that would provide secure telework and online voting capabilities. Full article
(This article belongs to the Special Issue AI, Machine Learning and Data Analytics for Wireless Communications)
Show Figures

Figure 1

16 pages, 13747 KiB  
Article
Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices
by Khadijeh Alibabaei, Eduardo Assunção, Pedro D. Gaspar, Vasco N. G. J. Soares and João M. L. P. Caldeira
Future Internet 2022, 14(7), 199; https://doi.org/10.3390/fi14070199 - 29 Jun 2022
Cited by 6 | Viewed by 2660
Abstract
The concept of the Internet of Things (IoT) in agriculture is associated with the use of high-tech devices such as robots and sensors that are interconnected to assess or monitor conditions on a particular plot of land and then deploy the various factors [...] Read more.
The concept of the Internet of Things (IoT) in agriculture is associated with the use of high-tech devices such as robots and sensors that are interconnected to assess or monitor conditions on a particular plot of land and then deploy the various factors of production such as seeds, fertilizer, water, etc., accordingly. Vine trunk detection can help create an accurate map of the vineyard that the agricultural robot can rely on to safely navigate and perform a variety of agricultural tasks such as harvesting, pruning, etc. In this work, the state-of-the-art single-shot multibox detector (SSD) with MobileDet Edge TPU and MobileNet Edge TPU models as the backbone was used to detect the tree trunks in the vineyard. Compared to the SSD with MobileNet-V1, MobileNet-V2, and MobileDet as backbone, the SSD with MobileNet Edge TPU was more accurate in inference on the Raspberrypi, with almost the same inference time on the TPU. The SSD with MobileDet Edge TPU achieved the second-best accurate model. Additionally, this work examines the effects of some features, including the size of the input model, the quantity of training data, and the diversity of the training dataset. Increasing the size of the input model and the training dataset increased the performance of the model. Full article
(This article belongs to the Special Issue Advances in Agriculture 4.0)
Show Figures

Figure 1

14 pages, 2136 KiB  
Article
Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation
by Yancong Zhu, Juan Zhang, Zhaoxi Zhang, Gina Clepper, Jingpeng Jia and Wei Liu
Future Internet 2022, 14(7), 198; https://doi.org/10.3390/fi14070198 - 29 Jun 2022
Cited by 4 | Viewed by 1983
Abstract
Developing a smart classroom can make the modern classroom more efficient and intelligent. Much research has been conducted pertaining to smart classrooms for hearing-impaired college students. However, there have been few significant breakthroughs in mobilizing students’ learning efficiency as measured by information transmission, [...] Read more.
Developing a smart classroom can make the modern classroom more efficient and intelligent. Much research has been conducted pertaining to smart classrooms for hearing-impaired college students. However, there have been few significant breakthroughs in mobilizing students’ learning efficiency as measured by information transmission, communication, and interaction in class. This research collects data through nonparticipatory observation and in-depth interviews and analyzes available data on classroom interaction needs of these students. We found that diversified explanations, recordable interactive contents, and interaction between teachers and students could improve the learning effects in the classroom. We also propose a tracking-processing method based on gesture recognition and representation and present a design for a processing system based on AT89C52 microcontroller and Kinect. In this way, sign language can be translated into text and all students can receive the information and participate in the interaction, which greatly improves students’ autonomy and enthusiasm of learning. This design enables deaf students to fully use classroom learning resources, reduces learning time costs, and improves learning efficiency. It can assist teachers in teaching and tutoring students to enhance their experience. Full article
(This article belongs to the Special Issue Advances and Perspectives in Human-Computer Interaction)
Show Figures

Figure 1

24 pages, 5308 KiB  
Article
Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems
by Martina Pappalardo, Antonio Virdis and Enzo Mingozzi
Future Internet 2022, 14(7), 197; https://doi.org/10.3390/fi14070197 - 28 Jun 2022
Viewed by 1602
Abstract
The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some output decisions. On [...] Read more.
The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some output decisions. On the one hand, the quality of these decisions is typically affected by the freshness of the received information, thus requesting frequent updates from the IoT devices. On the other hand, the severe energy, memory, processing, and communication constraints of IoT devices and networks pose limitations in the frequency of sensing and reporting. So, it is crucial to minimize the energy consumed by the device for sensing the environment and for transmitting the update messages, while taking into account the requirements for information freshness. Edge-caching can be effective in reducing the sensing and the transmission frequency; however, it requires a proper refreshing scheme to avoid staleness of information, as IoT applications need timeliness of status updates. Recently, the Age of Information (AoI) metric has been introduced: it is the time elapsed since the generation of the last received update, hence it can describe the timeliness of the IoT application’s knowledge of the process sampled by the IoT device. In this work, we propose a model-driven and AoI-aware optimization scheme for information caching at the network edge. To configure the cache parameters, we formulate an optimization problem that minimizes the energy consumption, considering both the sampling frequency and the average frequency of the requests sent to the device for refreshing the cache, while satisfying an AoI requirement expressed by the IoT application. We apply our caching scheme in an emulated IoT network, and we show that it minimizes the energy cost while satisfying the AoI requirement. We also compare the case in which the proposed caching scheme is implemented at the network edge against the case in which there is not a cache at the network edge. We show that the optimized cache can significantly lower the energy cost of devices that have a high transmission cost because it can reduce the number of transmissions. Moreover, the cache makes the system less sensitive to higher application-request rates, as the number of messages forwarded to the devices depends on the cache parameters. Full article
(This article belongs to the Special Issue Big Data Analytics for the Industrial Internet of Things)
Show Figures

Figure 1

18 pages, 6015 KiB  
Article
Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments
by Luís Gameiro, Carlos Senna and Miguel Luís
Future Internet 2022, 14(7), 196; https://doi.org/10.3390/fi14070196 - 27 Jun 2022
Cited by 2 | Viewed by 1713
Abstract
The Information-Centric Network (ICN) paradigm has been touted as one of the candidates for the Internet of the future, where the Named Data Network (NDN) architecture is the one leading the way. Despite the large amount of works published in the literature targeting [...] Read more.
The Information-Centric Network (ICN) paradigm has been touted as one of the candidates for the Internet of the future, where the Named Data Network (NDN) architecture is the one leading the way. Despite the large amount of works published in the literature targeting new implementations of such architecture, covering different network topologies and use cases, there are few NDN implementations in real networks. Moreover, most of these real-world NDN implementations, especially those addressing wireless and wired communication channels, are at a small scale, in laboratory environments. In this work, we evaluate the performance of an NDN-based implementation in a mobile wireless network, as part of a smart city infrastructure, making use of multiple wireless interfaces. We start by showing how we have implemented the NDN stack in current network nodes of the smart city infrastructure, following a hybrid solution where both TCP/IP and NDN paradigms can coexist. The implementation is evaluated in three scenarios, targeting different situations: mobility, the simultaneous use of different wireless interfaces and the network characteristics. The results show that our implementation works properly and insights about the correct NDN parameterization are derived. Full article
(This article belongs to the Special Issue Recent Advances in Information-Centric Networks (ICNs))
Show Figures

Figure 1

16 pages, 8595 KiB  
Article
Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis
by Thanassis Mpimis, Theodore T. Kapsis, Athanasios D. Panagopoulos and Vassilis Gikas
Future Internet 2022, 14(7), 195; https://doi.org/10.3390/fi14070195 - 27 Jun 2022
Cited by 4 | Viewed by 1740
Abstract
Satellite positioning lies within the very core of numerous Intelligent Transportation Systems (ITS) and Future Internet applications. With the emergence of connected vehicles, the performance requirements of Global Navigation Satellite Systems (GNSS) are constantly pushed to their limits. To this end, Cooperative Positioning [...] Read more.
Satellite positioning lies within the very core of numerous Intelligent Transportation Systems (ITS) and Future Internet applications. With the emergence of connected vehicles, the performance requirements of Global Navigation Satellite Systems (GNSS) are constantly pushed to their limits. To this end, Cooperative Positioning (CP) solutions have attracted attention in order to enhance the accuracy and reliability of low-cost GNSS receivers, especially in complex propagation environments. In this paper, the problem of efficient and robust CP employing low-cost GNSS receivers is investigated over critical ITS scenarios. By adopting a Cooperative-Differential GNSS (C-DGNSS) framework, the target’s vehicle receiver can obtain Position–Velocity–Time (PVT) corrections from a neighboring vehicle and update its own position in real-time. A ranking module based on multi-attribute decision-making (MADM) algorithms is proposed for the neighboring vehicle rating and optimal selection. The considered MADM techniques are simulated with various weightings, normalization techniques, and criteria associated with positioning accuracy and reliability. The obtained criteria values are experimental GNSS measurements from several low-cost receivers. A comparative and sensitivity analysis are provided by evaluating the MADM algorithms in terms of ranking performance and robustness. The positioning data time series and the numerical results are then presented, and comments are made. Scoring-based and distance-based MADM methods perform better, while L1 RMS, HDOP, and Hz std are the most critical criteria. The multi-purpose applicability of the proposed scheme, not only for land vehicles, is also discussed. Full article
Show Figures

Figure 1

18 pages, 538 KiB  
Article
A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language
by Yousif A. Alhaj, Abdelghani Dahou, Mohammed A. A. Al-qaness, Laith Abualigah, Aaqif Afzaal Abbasi, Nasser Ahmed Obad Almaweri, Mohamed Abd Elaziz and Robertas  Damaševičius
Future Internet 2022, 14(7), 194; https://doi.org/10.3390/fi14070194 - 27 Jun 2022
Cited by 15 | Viewed by 2784
Abstract
We propose a novel text classification model, which aims to improve the performance of Arabic text classification using machine learning techniques. One of the effective solutions in Arabic text classification is to find the suitable feature selection method with an optimal number of [...] Read more.
We propose a novel text classification model, which aims to improve the performance of Arabic text classification using machine learning techniques. One of the effective solutions in Arabic text classification is to find the suitable feature selection method with an optimal number of features alongside the classifier. Although several text classification methods have been proposed for the Arabic language using different techniques, such as feature selection methods, an ensemble of classifiers, and discriminative features, choosing the optimal method becomes an NP-hard problem considering the huge search space. Therefore, we propose a method, called Optimal Configuration Determination for Arabic text Classification (OCATC), which utilized the Particle Swarm Optimization (PSO) algorithm to find the optimal solution (configuration) from this space. The proposed OCATC method extracts and converts the features from the textual documents into a numerical vector using the Term Frequency-Inverse Document Frequency (TF–IDF) approach. Finally, the PSO selects the best architecture from a set of classifiers to feature selection methods with an optimal number of features. Extensive experiments were carried out to evaluate the performance of the OCATC method using six datasets, including five publicly available datasets and our proposed dataset. The results obtained demonstrate the superiority of OCATC over individual classifiers and other state-of-the-art methods. Full article
(This article belongs to the Special Issue Deep Learning and Natural Language Processing)
Show Figures

Figure 1

18 pages, 4245 KiB  
Article
Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments
by Anastasia Kondratyeva, Daria Ivanova, Vyacheslav Begishev, Ekaterina Markova, Evgeni Mokrov, Yuliya Gaidamaka and Konstantin Samouylov
Future Internet 2022, 14(7), 193; https://doi.org/10.3390/fi14070193 - 27 Jun 2022
Cited by 5 | Viewed by 1715
Abstract
5G New Radio (NR) systems promise to expand offered services to enable industrial automation scenarios. To enable ultra-low latency at the air interface and to exploit spatial redundancy for applications such as synchronization and motion control, user equipment (UE) will naturally require device-to-device [...] Read more.
5G New Radio (NR) systems promise to expand offered services to enable industrial automation scenarios. To enable ultra-low latency at the air interface and to exploit spatial redundancy for applications such as synchronization and motion control, user equipment (UE) will naturally require device-to-device (D2D) and base station (BS) to UE communications and directional transmissions provided by millimeter wave (mmWave) frequencies. However, the performance of such systems is affected by the blockage phenomenon. In this paper, we propose a simple line-of-sight (LoS) blockage model for Industrial mmWave-based industrial Internet of Things (IIoT) deployments. The model is based on two sub-models, where each part can be changed/replaced to fit the scenario of interest. The first part is based on photogrammetry and provides the transparency probability for a single element on the factory floor. The second one utilizes these models of industrial elements to form the deployment and then applies stochastic geometry to derive the blockage probability. The proposed model can be utilized for any type of industrial machine, accounts for their inherent regular deployments on the factory floor, and provides the final results in an easy-to-compute form. Our results indicate that direct UE-UE communications are feasible in sparse deployments (less than 0.1 machine/m2) or at small communications distances (less than 5–10 m) or in deployments with highly transparent machines (machine transparency less than 0.5). Otherwise, BS-UE communications need to be utilized. In this case, BS height becomes a critical parameter affecting the LoS probability. Specifically, using a BS height of 10 m allows blockage probability to be improved by 20–30% as compared to a BS of height 4 m. Finally, as UE height produces more impact on the blockage probability as compared to a machine height, in real deployments, one needs to ensure that the height of communications modules at UEs are maximized. Full article
(This article belongs to the Special Issue Internet of Things and Cyber-Physical Systems)
Show Figures

Figure 1

31 pages, 1560 KiB  
Review
Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions
by Salahadin Seid Musa, Marco Zennaro, Mulugeta Libsie and Ermanno Pietrosemoli
Future Internet 2022, 14(7), 192; https://doi.org/10.3390/fi14070192 - 25 Jun 2022
Cited by 8 | Viewed by 4619
Abstract
Recently the Internet of Vehicles (IoV) has become a promising research area in the field of the Internet of Things (IoT), which enables vehicles to communicate and exchange real-time information with each other, as well as with infrastructure, people, and other sensors and [...] Read more.
Recently the Internet of Vehicles (IoV) has become a promising research area in the field of the Internet of Things (IoT), which enables vehicles to communicate and exchange real-time information with each other, as well as with infrastructure, people, and other sensors and actuators through various communication interfaces. The realization of IoV networks faces various communication and networking challenges to meet stringent requirements of low latency, dynamic topology, high data-rate connectivity, resource allocation, multiple access, and QoS. Advances in information-centric networks (ICN), edge computing (EC), and artificial intelligence (AI) will transform and help to realize the Intelligent Internet of Vehicles (IIoV). Information-centric networks have emerged as a paradigm promising to cope with the limitations of the current host-based network architecture (TCP/IP-based networks) by providing mobility support, efficient content distribution, scalability and security based on content names, regardless of their location. Edge computing (EC), on the other hand, is a key paradigm to provide computation, storage and other cloud services in close proximity to where they are requested, thus enabling the support of real-time services. It is promising for computation-intensive applications, such as autonomous and cooperative driving, and to alleviate storage burdens (by caching). AI has recently emerged as a powerful tool to break through obstacles in various research areas including that of intelligent transport systems (ITS). ITS are smart enough to make decisions based on the status of a great variety of inputs. The convergence of ICN and EC with AI empowerment will bring new opportunities while also raising not-yet-explored obstacles to realize Intelligent IoV. In this paper, we discuss the applicability of AI techniques in solving challenging vehicular problems and enhancing the learning capacity of edge devices and ICN networks. A comprehensive review is provided of utilizing intelligence in EC and ICN to address current challenges in their application to IIoV. In particular, we focus on intelligent edge computing and networking, offloading, intelligent mobility-aware caching and forwarding and overall network performance. Furthermore, we discuss potential solutions to the presented issues. Finally, we highlight potential research directions which may illuminate efforts to develop new intelligent IoV applications. Full article
(This article belongs to the Special Issue Recent Advances in Information-Centric Networks (ICNs))
Show Figures

Figure 1

10 pages, 335 KiB  
Article
Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding
by Ranjan Satapathy, Shweta Rajesh Pardeshi and Erik Cambria
Future Internet 2022, 14(7), 191; https://doi.org/10.3390/fi14070191 - 22 Jun 2022
Cited by 10 | Viewed by 2140
Abstract
In recent years, deep learning-based sentiment analysis has received attention mainly because of the rise of social media and e-commerce. In this paper, we showcase the fact that the polarity detection and subjectivity detection subtasks of sentiment analysis are inter-related. To this end, [...] Read more.
In recent years, deep learning-based sentiment analysis has received attention mainly because of the rise of social media and e-commerce. In this paper, we showcase the fact that the polarity detection and subjectivity detection subtasks of sentiment analysis are inter-related. To this end, we propose a knowledge-sharing-based multitask learning framework. To ensure high-quality knowledge sharing between the tasks, we use the Neural Tensor Network, which consists of a bilinear tensor layer that links the two entity vectors. We show that BERT-based embedding with our MTL framework outperforms the baselines and achieves a new state-of-the-art status in multitask learning. Our framework shows that the information across datasets for related tasks can be helpful for understanding task-specific features. Full article
(This article belongs to the Special Issue Machine Learning Perspective in the Convolutional Neural Network Era)
Show Figures

Figure 1

13 pages, 1804 KiB  
Article
First Steps of Asthma Management with a Personalized Ontology Model
by Hicham Ajami, Hamid Mcheick and Catherine Laprise
Future Internet 2022, 14(7), 190; https://doi.org/10.3390/fi14070190 - 22 Jun 2022
Cited by 1 | Viewed by 2399
Abstract
Asthma is a chronic respiratory disease characterized by severe inflammation of the bronchial mucosa. Allergic asthma is the most common form of this health issue. Asthma is classified into allergic and non-allergic asthma, and it can be triggered by several factors such as [...] Read more.
Asthma is a chronic respiratory disease characterized by severe inflammation of the bronchial mucosa. Allergic asthma is the most common form of this health issue. Asthma is classified into allergic and non-allergic asthma, and it can be triggered by several factors such as indoor and outdoor allergens, air pollution, weather conditions, tobacco smoke, and food allergens, as well as other factors. Asthma symptoms differ in their frequency and severity since each patient reacts differently to these triggers. Formal knowledge is selected as one of the most promising solutions to deal with these challenges. This paper presents a new personalized approach to manage asthma. An ontology-driven model supported by Semantic Web Rule Language (SWRL) medical rules is proposed to provide personalized care for an asthma patient by identifying the risk factors and the development of possible exacerbations. Full article
(This article belongs to the Special Issue Smart Objects and Technologies for Social Good)
Show Figures

Graphical abstract

Previous Issue
Next Issue
Back to TopTop