You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 16, Issue 4

April 2024 - 37 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: The significance of Vehicle-to-Everything (V2X) technologies can hardly be overestimated in the context of highly automated and autonomous vehicles. This article aims to systematically assess the requirements towards V2X input data for highly automated and autonomous systems that can enable certain Levels of Autonomy (LoA). It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity, presented through the use-case of automated valet parking. View this paper

Articles (37)

  • Article
  • Open Access
1 Citations
1,479 Views
21 Pages

Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN

  • Bing Zhang,
  • Hui Li,
  • Shuai Zhang,
  • Jing Sun,
  • Ning Wei,
  • Wenhong Xu and
  • Huan Wang

22 April 2024

Path hopping serves as an active defense mechanism in network security, yet it encounters challenges like a restricted path switching space, the recurrent use of similar paths and vital nodes, a singular triggering mechanism for path switching, and f...

  • Article
  • Open Access
5 Citations
3,711 Views
23 Pages

22 April 2024

This study focuses on optimizing federated learning in heterogeneous data environments. We implement the FedProx and a baseline algorithm (i.e., the FedAvg) with advanced optimization strategies to tackle non-IID data issues in distributed learning....

  • Article
  • Open Access
1 Citations
3,606 Views
17 Pages

SUDC: Synchronous Update with the Division and Combination of SRv6 Policy

  • Yuze Liu,
  • Weihong Wu,
  • Ying Wang,
  • Jiang Liu and
  • Fan Yang

22 April 2024

With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenar...

  • Review
  • Open Access
11 Citations
3,802 Views
20 Pages

19 April 2024

Detecting anomalies in human activities is increasingly crucial today, particularly in nuclear family settings, where there may not be constant monitoring of individuals’ health, especially the elderly, during critical periods. Early anomaly de...

  • Article
  • Open Access
2 Citations
3,229 Views
29 Pages

SRv6-Based Edge Service Continuity in 5G Mobile Networks

  • Laura Lemmi,
  • Carlo Puliafito,
  • Antonio Virdis and
  • Enzo Mingozzi

19 April 2024

Ensuring compliance with the stringent latency requirements of edge services requires close cooperation between the network and computing components. Within mobile 5G networks, the nomadic behavior of users may impact the performance of edge services...

  • Article
  • Open Access
6 Citations
5,037 Views
31 Pages

19 April 2024

Low-rate Denial of Service (LDoS) attacks are today considered one of the biggest threats against modern data centers and industrial infrastructures. Unlike traditional Distributed Denial of Service (DDoS) attacks that are mainly volumetric, LDoS att...

  • Article
  • Open Access
1 Citations
2,222 Views
24 Pages

19 April 2024

Multi-access edge computing (MEC) enhances service quality for users and reduces computational overhead by migrating workloads and application data to the network edge. However, current solutions for task offloading and cache replacement in edge scen...

  • Article
  • Open Access
6 Citations
3,755 Views
20 Pages

Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains

  • Stanly Wilson,
  • Kwabena Adu-Duodu,
  • Yinhao Li,
  • Ringo Sham,
  • Mohammed Almubarak,
  • Yingli Wang,
  • Ellis Solaiman,
  • Charith Perera,
  • Rajiv Ranjan and
  • Omer Rana

17 April 2024

The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps tha...

  • Article
  • Open Access
16 Citations
5,144 Views
19 Pages

17 April 2024

The convergence of cyber and physical systems through cyber–physical systems (CPSs) has been integrated into cyber–physical production systems (CPPSs), leading to a paradigm shift toward intelligent manufacturing. Despite the transformati...

of 4