Skip to Content

Future Internet, Volume 15, Issue 12

2023 December - 36 articles

Cover Story: The interconnected nature of IoT systems enables the collection and exchange of data via sensors, actuators, and software from various components such as physical devices, vehicles, etc. These systems have achieved seamless connectivity requirements using the next-generation wireless network infrastructures. Open RAN (O-RAN) promotes flexibility and intelligence in the next-generation RAN. Our work reviews the applications of O-RAN in supporting the next-generation smart IoT systems by conducting a thorough survey. We propose a generic problem space, which consists of IoT systems (transportation, industry, etc.), targets (reliable communication, real-time analytics), and artificial intelligence and machine learning (AI/ML). We also outline future research directions concerning robust and scalable solutions, interoperability and standardization, privacy, and security. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access
8 Citations
4,977 Views
28 Pages

HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference

  • Duy Tung Khanh Nguyen,
  • Dung Hoang Duong,
  • Willy Susilo,
  • Yang-Wai Chow and
  • The Anh Ta

18 December 2023

Homomorphic encryption (HE) has emerged as a pivotal technology for secure neural network inference (SNNI), offering privacy-preserving computations on encrypted data. Despite active developments in this field, HE-based SNNI frameworks are impeded by...

  • Article
  • Open Access
4,055 Views
20 Pages

18 December 2023

The e-book services we use today have a serious drawback in that we will no longer be able to read the books we have purchased when the service is terminated. One way to solve this problem is to build a decentralized system that does not depend on a...

  • Article
  • Open Access
4 Citations
4,774 Views
22 Pages

Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables

  • James Msughter Adeke,
  • Guangjie Liu,
  • Junjie Zhao,
  • Nannan Wu and
  • Hafsat Muhammad Bashir

16 December 2023

Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial traini...

  • Article
  • Open Access
42 Citations
11,352 Views
28 Pages

16 December 2023

Despite its status as one of the most ancient sectors worldwide, agriculture continues to be a fundamental cornerstone of the global economy. Nevertheless, it faces obstacles such as a lack of trust, difficulties in tracking, and inefficiencies in ma...

  • Review
  • Open Access
35 Citations
12,792 Views
54 Pages

14 December 2023

In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comf...

  • Article
  • Open Access
10 Citations
4,081 Views
22 Pages

14 December 2023

In wireless sensor network-based water pipeline monitoring (WWPM) systems, a vital requirement emerges: the achievement of low energy consumption. This primary goal arises from the fundamental necessity to ensure the sustained operability of sensor n...

  • Article
  • Open Access
2 Citations
2,357 Views
13 Pages

13 December 2023

Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed de...

  • Review
  • Open Access
22 Citations
7,862 Views
22 Pages

A Survey on Blockchain-Based Federated Learning

  • Lang Wu,
  • Weijian Ruan,
  • Jinhui Hu and
  • Yaobin He

12 December 2023

Federated learning (FL) and blockchains exhibit significant commonality, complementarity, and alignment in various aspects, such as application domains, architectural features, and privacy protection mechanisms. In recent years, there have been notab...

  • Article
  • Open Access
8 Citations
6,286 Views
17 Pages

11 December 2023

Three-dimensional object detection involves estimating the dimensions, orientations, and locations of 3D bounding boxes. Intersection of Union (IoU) loss measures the overlap between predicted 3D box and ground truth 3D bounding boxes. The localizati...

  • Review
  • Open Access
42 Citations
14,760 Views
43 Pages

Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions

  • Shrouk A. Ali,
  • Shaimaa Ahmed Elsaid,
  • Abdelhamied A. Ateya,
  • Mohammed ElAffendi and
  • Ahmed A. Abd El-Latif

9 December 2023

The concept of smart cities, which aim to enhance the quality of urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach the era of next-generation smart cities, it becomes crucial to e...

  • Article
  • Open Access
3 Citations
5,220 Views
31 Pages

Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks

  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda Karina Toscano-Medina,
  • Hector Manuel Perez-Meana,
  • Jose Portillo-Portillo and
  • Jesus Olivares-Mercado

9 December 2023

The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual propert...

  • Article
  • Open Access
3 Citations
2,109 Views
22 Pages

PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc

  • Javier Gomez,
  • Jose Jaime Camacho-Escoto,
  • Luis Orozco-Barbosa and
  • Diego Rodriguez-Torres

9 December 2023

WiFi is a widely used wireless technology for data transmission. WiFi can also play a crucial role in simultaneously broadcasting content to multiple devices in multimedia transmission for venues such as classrooms, theaters, and stadiums, etc. Broad...

  • Article
  • Open Access
3 Citations
2,432 Views
21 Pages

7 December 2023

The existing research on dependent task offloading and resource allocation assumes that edge servers can provide computational and communication resources free of charge. This paper proposes a two-stage resource allocation method to address this issu...

  • Article
  • Open Access
5 Citations
3,025 Views
19 Pages

Envisioning Digital Practices in the Metaverse: A Methodological Perspective

  • Luca Sabatucci,
  • Agnese Augello,
  • Giuseppe Caggianese and
  • Luigi Gallo

6 December 2023

Researchers are exploring methods that exploit digital twins as all-purpose abstractions for sophisticated modelling and simulation, bringing elements of the real world into the virtual realm. Digital twins are essential elements of the digital trans...

  • Review
  • Open Access
18 Citations
11,015 Views
36 Pages

Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research

  • Thiago Poleto,
  • Thyago Celso Cavalcante Nepomuceno,
  • Victor Diogho Heuer de Carvalho,
  • Ligiane Cristina Braga de Oliveira Friaes,
  • Rodrigo Cleiton Paiva de Oliveira and
  • Ciro José Jardim Figueiredo

1 December 2023

This paper aims to analyze the intellectual structure and research fronts in application information security in smart cities to identify research boundaries, trends, and new opportunities in the area. It applies bibliometric analyses to identify the...

  • Editorial
  • Open Access
4 Citations
2,976 Views
5 Pages

Recent Advances in Information-Centric Networks (ICNs)

  • José Carlos López-Ardao,
  • Miguel Rodríguez-Pérez and
  • Sergio Herrería-Alonso

1 December 2023

The great success of the Internet has been essentially based on the simplicity and versatility of its TCP/IP architecture, which imposes almost no restrictions on either the underlying network technology or on the data being transmitted [...]

  • Review
  • Open Access
7 Citations
9,466 Views
45 Pages

30 November 2023

In recent years, the need for computation-intensive applications in mobile networks requiring more storage, powerful processors, and real-time responses has risen substantially. Vehicular networks play an important role in this ecosystem, as they mus...

  • Article
  • Open Access
3 Citations
3,774 Views
22 Pages

30 November 2023

With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitat...

  • Article
  • Open Access
11 Citations
4,007 Views
15 Pages

Knowledge Distillation-Based GPS Spoofing Detection for Small UAV

  • Yingying Ren,
  • Ryan D. Restivo,
  • Wenkai Tan,
  • Jian Wang,
  • Yongxin Liu,
  • Bin Jiang,
  • Huihui Wang and
  • Houbing Song

30 November 2023

As a core component of small unmanned aerial vehicles (UAVs), GPS is playing a critical role in providing localization for UAV navigation. UAVs are an important factor in the large-scale deployment of the Internet of Things (IoT) and cyber–phys...

  • Article
  • Open Access
2 Citations
3,464 Views
26 Pages

Protecting Hybrid ITS Networks: A Comprehensive Security Approach

  • Ricardo Severino,
  • José Simão,
  • Nuno Datia and
  • António Serrador

30 November 2023

Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that atta...

  • Article
  • Open Access
2 Citations
3,143 Views
16 Pages

Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography

  • Youcef Fouzar,
  • Ahmed Lakhssassi and
  • Ramakrishna Mundugar

29 November 2023

The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content...

  • Article
  • Open Access
10 Citations
3,879 Views
16 Pages

29 November 2023

The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have b...

  • Article
  • Open Access
1 Citations
3,007 Views
20 Pages

29 November 2023

The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwa...

  • Article
  • Open Access
2 Citations
4,061 Views
15 Pages

Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance

  • Ondrej Kobza,
  • David Herel,
  • Jan Cuhel,
  • Tommaso Gargiani,
  • Jan Pichl,
  • Petr Marek,
  • Jakub Konrad and
  • Jan Sedivy

28 November 2023

This paper provides a pioneering examination and enhancement of generative chat models, with a specific focus on the BlenderBot 3 model. Through meticulous interaction with a diverse set of human participants, we dissected the fundamental components...

  • Review
  • Open Access
85 Citations
11,372 Views
27 Pages

A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues

  • Panagiotis Gkonis,
  • Anastasios Giannopoulos,
  • Panagiotis Trakadas,
  • Xavi Masip-Bruin and
  • Francesco D’Andria

28 November 2023

The rapid growth in the number of interconnected devices on the Internet (referred to as the Internet of Things—IoT), along with the huge volume of data that are exchanged and processed, has created a new landscape in network design and operati...

  • Systematic Review
  • Open Access
14 Citations
10,101 Views
27 Pages

Review of Blockchain Tokens Creation and Valuation

  • Oana Marin,
  • Tudor Cioara,
  • Liana Toderean,
  • Dan Mitrea and
  • Ionut Anghel

27 November 2023

Blockchain and tokens are relatively new research areas insufficiently explored from both technical and economic perspectives. Even though tokens provide benefits such as easier market access, increased liquidity, lower transaction costs, and automat...

  • Article
  • Open Access
8 Citations
2,644 Views
19 Pages

The Multiband over Spatial Division Multiplexing Sliceable Transceiver for Future Optical Networks

  • Laia Nadal,
  • Mumtaz Ali,
  • Francisco Javier Vílchez,
  • Josep Maria Fàbrega and
  • Michela Svaluto Moreolo

27 November 2023

In the last 15 years, global data traffic has been doubling approximately every 2–3 years, and there is a strong indication that this pattern will persist. Hence, also driven by the emergence of new applications and services expected within the...

  • Review
  • Open Access
15 Citations
5,415 Views
25 Pages

Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions

  • Abubakar Ahmad Musa,
  • Adamu Hussaini,
  • Cheng Qian,
  • Yifan Guo and
  • Wei Yu

27 November 2023

The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the...

  • Review
  • Open Access
9 Citations
7,573 Views
20 Pages

Extended Reality (XR) Engines for Developing Gamified Apps and Serious Games: A Scoping Review

  • Humberto Marín-Vega,
  • Giner Alor-Hernández,
  • Maritza Bustos-López,
  • Ignacio López-Martínez and
  • Norma Leticia Hernández-Chaparro

27 November 2023

Extended Reality (XR) is an emerging technology that enables enhanced interaction between the real world and virtual environments. In this study, we conduct a scoping review of XR engines for developing gamified apps and serious games. Our study revo...

  • Article
  • Open Access
1 Citations
3,454 Views
21 Pages

26 November 2023

The study of business process analysis and optimisation has attracted significant scholarly interest in the recent past, due to its integral role in boosting organisational performance. A specific area of focus within this broader research field is p...

  • Review
  • Open Access
17 Citations
5,822 Views
33 Pages

24 November 2023

As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by p...

  • Article
  • Open Access
3 Citations
3,389 Views
20 Pages

User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications

  • Noha Hassan,
  • Xavier Fernando,
  • Isaac Woungang and
  • Alagan Anpalagan

24 November 2023

In combination with the expected traffic avalanche foreseen for the next decade, solutions supporting energy-efficient, scalable and flexible network operations are essential. Considering the myriad of user case requirements, THz and mmW bands will p...

  • Article
  • Open Access
22 Citations
7,363 Views
36 Pages

A Structured Narrative Prompt for Prompting Narratives from Large Language Models: Sentiment Assessment of ChatGPT-Generated Narratives and Real Tweets

  • Christopher J. Lynch,
  • Erik J. Jensen,
  • Virginia Zamponi,
  • Kevin O’Brien,
  • Erika Frydenlund and
  • Ross Gore

23 November 2023

Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated a...

  • Article
  • Open Access
6 Citations
4,143 Views
17 Pages

23 November 2023

With the increasing complexity of radar jamming threats, accurate and automatic jamming recognition is essential but remains challenging. Conventional algorithms often suffer from sharply decreased recognition accuracy under low jamming-to-noise rati...

  • Article
  • Open Access
24 Citations
5,316 Views
29 Pages

An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection

  • Karthikeyan Saminathan,
  • Sai Tharun Reddy Mulka,
  • Sangeetha Damodharan,
  • Rajagopal Maheswar and
  • Josip Lorincz

23 November 2023

The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason,...

  • Article
  • Open Access
24 Citations
9,172 Views
19 Pages

IoT-Based Object-Detection System to Safeguard Endangered Animals and Bolster Agricultural Farm Security

  • Mohaimenul Azam Khan Raiaan,
  • Nur Mohammad Fahad,
  • Shovan Chowdhury,
  • Debopom Sutradhar,
  • Saadman Sakib Mihad and
  • Md. Motaharul Islam

21 November 2023

Significant threats to ecological equilibrium and sustainable agriculture are posed by the extinction of animal species and the subsequent effects on farms. Farmers face difficult decisions, such as installing electric fences to protect their farms,...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903