You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 15, Issue 12

December 2023 - 36 articles

Cover Story: The interconnected nature of IoT systems enables the collection and exchange of data via sensors, actuators, and software from various components such as physical devices, vehicles, etc. These systems have achieved seamless connectivity requirements using the next-generation wireless network infrastructures. Open RAN (O-RAN) promotes flexibility and intelligence in the next-generation RAN. Our work reviews the applications of O-RAN in supporting the next-generation smart IoT systems by conducting a thorough survey. We propose a generic problem space, which consists of IoT systems (transportation, industry, etc.), targets (reliable communication, real-time analytics), and artificial intelligence and machine learning (AI/ML). We also outline future research directions concerning robust and scalable solutions, interoperability and standardization, privacy, and security. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (36)

  • Article
  • Open Access
1 Citations
4,932 Views
31 Pages

Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks

  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda Karina Toscano-Medina,
  • Hector Manuel Perez-Meana,
  • Jose Portillo-Portillo and
  • Jesus Olivares-Mercado

9 December 2023

The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual propert...

  • Article
  • Open Access
1 Citations
2,018 Views
22 Pages

PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc

  • Javier Gomez,
  • Jose Jaime Camacho-Escoto,
  • Luis Orozco-Barbosa and
  • Diego Rodriguez-Torres

9 December 2023

WiFi is a widely used wireless technology for data transmission. WiFi can also play a crucial role in simultaneously broadcasting content to multiple devices in multimedia transmission for venues such as classrooms, theaters, and stadiums, etc. Broad...

  • Article
  • Open Access
3 Citations
2,323 Views
21 Pages

7 December 2023

The existing research on dependent task offloading and resource allocation assumes that edge servers can provide computational and communication resources free of charge. This paper proposes a two-stage resource allocation method to address this issu...

  • Article
  • Open Access
4 Citations
2,862 Views
19 Pages

Envisioning Digital Practices in the Metaverse: A Methodological Perspective

  • Luca Sabatucci,
  • Agnese Augello,
  • Giuseppe Caggianese and
  • Luigi Gallo

6 December 2023

Researchers are exploring methods that exploit digital twins as all-purpose abstractions for sophisticated modelling and simulation, bringing elements of the real world into the virtual realm. Digital twins are essential elements of the digital trans...

  • Review
  • Open Access
13 Citations
10,588 Views
36 Pages

Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research

  • Thiago Poleto,
  • Thyago Celso Cavalcante Nepomuceno,
  • Victor Diogho Heuer de Carvalho,
  • Ligiane Cristina Braga de Oliveira Friaes,
  • Rodrigo Cleiton Paiva de Oliveira and
  • Ciro José Jardim Figueiredo

1 December 2023

This paper aims to analyze the intellectual structure and research fronts in application information security in smart cities to identify research boundaries, trends, and new opportunities in the area. It applies bibliometric analyses to identify the...

  • Editorial
  • Open Access
4 Citations
2,782 Views
5 Pages

Recent Advances in Information-Centric Networks (ICNs)

  • José Carlos López-Ardao,
  • Miguel Rodríguez-Pérez and
  • Sergio Herrería-Alonso

1 December 2023

The great success of the Internet has been essentially based on the simplicity and versatility of its TCP/IP architecture, which imposes almost no restrictions on either the underlying network technology or on the data being transmitted [...]

  • Review
  • Open Access
4 Citations
9,014 Views
45 Pages

30 November 2023

In recent years, the need for computation-intensive applications in mobile networks requiring more storage, powerful processors, and real-time responses has risen substantially. Vehicular networks play an important role in this ecosystem, as they mus...

  • Article
  • Open Access
3 Citations
3,555 Views
22 Pages

30 November 2023

With the rapid growth of internet traffic, the traditional host-to-host TCP/IP architecture is subject to many service limitations faced with content-oriented applications. Various novel network architectures have been proposed to solve these limitat...

  • Article
  • Open Access
9 Citations
3,781 Views
15 Pages

Knowledge Distillation-Based GPS Spoofing Detection for Small UAV

  • Yingying Ren,
  • Ryan D. Restivo,
  • Wenkai Tan,
  • Jian Wang,
  • Yongxin Liu,
  • Bin Jiang,
  • Huihui Wang and
  • Houbing Song

30 November 2023

As a core component of small unmanned aerial vehicles (UAVs), GPS is playing a critical role in providing localization for UAV navigation. UAVs are an important factor in the large-scale deployment of the Internet of Things (IoT) and cyber–phys...

  • Article
  • Open Access
2 Citations
3,315 Views
26 Pages

Protecting Hybrid ITS Networks: A Comprehensive Security Approach

  • Ricardo Severino,
  • José Simão,
  • Nuno Datia and
  • António Serrador

30 November 2023

Cooperative intelligent transport systems (C-ITS) continue to be developed to enhance transportation safety and sustainability. However, the communication of vehicle-to-everything (V2X) systems is inherently open, leading to vulnerabilities that atta...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903