Skip to Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 16, Issue 4

2024 April - 37 articles

Cover Story: The significance of Vehicle-to-Everything (V2X) technologies can hardly be overestimated in the context of highly automated and autonomous vehicles. This article aims to systematically assess the requirements towards V2X input data for highly automated and autonomous systems that can enable certain Levels of Autonomy (LoA). It addresses the assessment of V2X input data requirements for different levels of autonomy defined by SAE International, regulatory challenges, scalability issues in hybrid environments and the potential impact of Internet of Things (IoT)-based information in non-automotive technical fields. A method is proposed for assessing the applicability of V2X at various levels of automation based on system complexity, presented through the use-case of automated valet parking. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (37)

  • Article
  • Open Access
1 Citations
1,888 Views
21 Pages

Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN

  • Bing Zhang,
  • Hui Li,
  • Shuai Zhang,
  • Jing Sun,
  • Ning Wei,
  • Wenhong Xu and
  • Huan Wang

22 April 2024

Path hopping serves as an active defense mechanism in network security, yet it encounters challenges like a restricted path switching space, the recurrent use of similar paths and vital nodes, a singular triggering mechanism for path switching, and f...

  • Article
  • Open Access
9 Citations
6,001 Views
23 Pages

22 April 2024

This study focuses on optimizing federated learning in heterogeneous data environments. We implement the FedProx and a baseline algorithm (i.e., the FedAvg) with advanced optimization strategies to tackle non-IID data issues in distributed learning....

  • Article
  • Open Access
1 Citations
3,928 Views
17 Pages

SUDC: Synchronous Update with the Division and Combination of SRv6 Policy

  • Yuze Liu,
  • Weihong Wu,
  • Ying Wang,
  • Jiang Liu and
  • Fan Yang

22 April 2024

With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenar...

  • Review
  • Open Access
12 Citations
5,930 Views
20 Pages

19 April 2024

Detecting anomalies in human activities is increasingly crucial today, particularly in nuclear family settings, where there may not be constant monitoring of individuals’ health, especially the elderly, during critical periods. Early anomaly de...

  • Article
  • Open Access
5 Citations
4,657 Views
29 Pages

SRv6-Based Edge Service Continuity in 5G Mobile Networks

  • Laura Lemmi,
  • Carlo Puliafito,
  • Antonio Virdis and
  • Enzo Mingozzi

19 April 2024

Ensuring compliance with the stringent latency requirements of edge services requires close cooperation between the network and computing components. Within mobile 5G networks, the nomadic behavior of users may impact the performance of edge services...

  • Article
  • Open Access
7 Citations
5,365 Views
31 Pages

19 April 2024

Low-rate Denial of Service (LDoS) attacks are today considered one of the biggest threats against modern data centers and industrial infrastructures. Unlike traditional Distributed Denial of Service (DDoS) attacks that are mainly volumetric, LDoS att...

  • Article
  • Open Access
1 Citations
2,665 Views
24 Pages

19 April 2024

Multi-access edge computing (MEC) enhances service quality for users and reduces computational overhead by migrating workloads and application data to the network edge. However, current solutions for task offloading and cache replacement in edge scen...

  • Article
  • Open Access
15 Citations
5,736 Views
20 Pages

Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains

  • Stanly Wilson,
  • Kwabena Adu-Duodu,
  • Yinhao Li,
  • Ringo Sham,
  • Mohammed Almubarak,
  • Yingli Wang,
  • Ellis Solaiman,
  • Charith Perera,
  • Rajiv Ranjan and
  • Omer Rana

17 April 2024

The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps tha...

  • Article
  • Open Access
21 Citations
6,536 Views
19 Pages

17 April 2024

The convergence of cyber and physical systems through cyber–physical systems (CPSs) has been integrated into cyber–physical production systems (CPPSs), leading to a paradigm shift toward intelligent manufacturing. Despite the transformati...

  • Article
  • Open Access
6 Citations
5,059 Views
13 Pages

15 April 2024

In this paper, we explore the realm of federated learning (FL), a distributed machine learning (ML) paradigm, and propose a novel approach that leverages the robustness of blockchain technology. FL, a concept introduced by Google in 2016, allows mult...

  • Article
  • Open Access
12 Citations
4,534 Views
20 Pages

15 April 2024

Farming is a major sector required for any nation to become self-sustainable. Quality seeds heavily influence the effectiveness of farming. Seeds cultivated by breeders pass through several entities in order to reach farmers. The existing seed supply...

  • Article
  • Open Access
2 Citations
4,252 Views
19 Pages

Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks

  • Wei Li,
  • Mengzhen Ren,
  • Yazhi Liu,
  • Chenyu Li,
  • Hui Qian and
  • Zhenyou Zhang

15 April 2024

In order to solve the congestion problem caused by the dramatic growth of traffic in data centers, many end-to-end congestion controls have been proposed to respond to congestion in one round-trip time (RTT). In this paper, we propose a new congestio...

  • Feature Paper
  • Article
  • Open Access
2 Citations
2,963 Views
18 Pages

Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks

  • David Todoli-Ferrandis,
  • Javier Silvestre-Blanes,
  • Víctor Sempere-Payá and
  • Salvador Santonja-Climent

12 April 2024

LoRaWAN is a low-power wide-area network (LPWAN) technology that is well suited for industrial IoT (IIoT) applications. One of the challenges of using LoRaWAN for IIoT is the need to collect data from a large number of devices. Polling is a common wa...

  • Review
  • Open Access
17 Citations
10,439 Views
21 Pages

All about Delay-Tolerant Networking (DTN) Contributions to Future Internet

  • Georgios Koukis,
  • Konstantina Safouri and
  • Vassilis Tsaoussidis

Although several years have passed since its first introduction, the significance of Delay-Tolerant Networking (DTN) remains evident, particularly in challenging environments where traditional networks face operational limitations such as disrupted c...

  • Article
  • Open Access
20 Citations
5,213 Views
30 Pages

The Internet of Things (IoT) employs sensors and the Internet for information exchange, enabling intelligent identification, monitoring, and management, which has deeply impacted various sectors such as power, medical care, and security, transforming...

  • Article
  • Open Access
2 Citations
2,324 Views
17 Pages

With the proliferation of WiFi devices, WiFi-based identification technology has garnered attention in the security domain and has demonstrated initial success. Nonetheless, when untrained illegitimate users appear, the classifier tends to categorize...

  • Article
  • Open Access
20 Citations
6,161 Views
21 Pages

The metaverse aims to merge the virtual and real worlds. The target is to generate a virtual community where social components play a crucial role and combine different areas such as entertainment, work, shopping, and services. This idea is explicitl...

  • Article
  • Open Access
3 Citations
4,967 Views
18 Pages

Currently, there are a wide range of approaches to deploying digital ads, with advanced technologies now being harnessed to craft advertising that is engaging and even tailored to personal interests and preferences, yet potentially distracting and ir...

  • Article
  • Open Access
4 Citations
1,975 Views
20 Pages

The objective of task allocation in unmanned systems is to complete tasks at minimal costs. However, the current algorithms employed for coordinating multiple unmanned systems in task allocation tasks frequently converge to local optima, thus impedin...

  • Article
  • Open Access
1 Citations
1,935 Views
23 Pages

The exponential growth in data traffic in the real world has drawn attention to the emerging computing technique called Fog Computing (FC) for offloading tasks in fault-free environments. This is a promising computing standard that offers higher comp...

  • Article
  • Open Access
2 Citations
2,694 Views
17 Pages

SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios

  • Radheshyam Singh,
  • Leo Mendiboure,
  • José Soler,
  • Michael Stübert Berger,
  • Tidiane Sylla,
  • Marion Berbineau and
  • Lars Dittmann

In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Tra...

  • Article
  • Open Access
2 Citations
1,940 Views
22 Pages

With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and...

  • Article
  • Open Access
4 Citations
3,191 Views
22 Pages

A Microservices-Based Control Plane for Time-Sensitive Networking

  • Anna Agustí-Torra,
  • Marc Ferré-Mancebo,
  • Gabriel David Orozco-Urrutia,
  • David Rincón-Rivera and
  • David Remondo

Time-Sensitive Networking (TSN) aims to provide deterministic communications over Ethernet. The main characteristics of TSN are bounded latency and very high reliability, thus complying with the strict requirements of industrial communications or aut...

  • Article
  • Open Access
5 Citations
3,646 Views
17 Pages

31 March 2024

In data center networks, when facing challenges such as traffic volatility, low resource utilization, and the difficulty of a single traffic scheduling strategy to meet demands, it is necessary to introduce intelligent traffic scheduling mechanisms t...

  • Article
  • Open Access
1 Citations
2,293 Views
17 Pages

Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking

  • Manar Aldaoud,
  • Dawood Al-Abri,
  • Medhat Awadalla and
  • Firdous Kausar

30 March 2024

Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) resolver to t...

  • Article
  • Open Access
1 Citations
2,446 Views
16 Pages

29 March 2024

Wireless communication tower placement arises in many real-world applications. This paper investigates a new emerging wireless communication tower placement problem, namely, continuous space wireless communication tower placement. Unlike existing wir...

  • Article
  • Open Access
1 Citations
6,209 Views
19 Pages

Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism

  • Binita Kusum Dhamala,
  • Babu R. Dawadi,
  • Pietro Manzoni and
  • Baikuntha Kumar Acharya

29 March 2024

Graph representation is recognized as an efficient method for modeling networks, precisely illustrating intricate, dynamic interactions within various entities of networks by representing entities as nodes and their relationships as edges. Leveraging...

  • Article
  • Open Access
7 Citations
7,213 Views
17 Pages

Implementing Federated Governance in Data Mesh Architecture

  • Anton Dolhopolov,
  • Arnaud Castelltort and
  • Anne Laurent

29 March 2024

Analytical data platforms have been used for decades to improve organizational performance. Starting from the data warehouses used primarily for structured data processing, through the data lakes oriented for raw data storage and post-hoc data analys...

  • Article
  • Open Access
6 Citations
3,963 Views
23 Pages

28 March 2024

Accurate perception is crucial for autonomous vehicles (AVs) to navigate safely, especially in adverse weather and lighting conditions where single-sensor networks (e.g., cameras or radar) struggle with reduced maneuverability and unrecognizable targ...

  • Article
  • Open Access
4 Citations
3,408 Views
20 Pages

28 March 2024

To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to...

  • Article
  • Open Access
8 Citations
2,226 Views
14 Pages

26 March 2024

In the dynamic landscape of 6G and smart cities, visible light communication (VLC) assumes critical significance for Internet of Things (IoT) applications spanning diverse sectors. The escalating demand for bandwidth and data underscores the need for...

  • Article
  • Open Access
4 Citations
2,784 Views
18 Pages

25 March 2024

This study presents a newly developed edge computing platform designed to enhance connectivity between edge devices and the cloud in the agricultural sector. Addressing the challenge of synchronizing a central database across 850 remote farm location...

  • Article
  • Open Access
6 Citations
4,110 Views
36 Pages

Cloud Security Using Fine-Grained Efficient Information Flow Tracking

  • Fahad Alqahtani,
  • Mohammed Almutairi and
  • Frederick T. Sheldon

25 March 2024

This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhe...

  • Article
  • Open Access
6 Citations
2,013 Views
16 Pages

25 March 2024

In satellite networks, existing congestion resolution methods do not consider the predictability and stability of paths, leading to frequent path switches and high maintenance costs. In this regard, we propose a novel congestion resolution approach,...

  • Article
  • Open Access
13 Citations
6,515 Views
20 Pages

25 March 2024

The significance of V2X (Vehicle-to-Everything) technology in the context of highly automated and autonomous vehicles can hardly be overestimated. While V2X is not considered a standalone technology for achieving high automation, it is recognized as...

  • Article
  • Open Access
17 Citations
5,724 Views
29 Pages

Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC

  • Ihtisham Khalid,
  • Vasilis Maglogiannis,
  • Dries Naudts,
  • Adnan Shahid and
  • Ingrid Moerman

23 March 2024

Cooperative communications advancements in Vehicular-to-Everything (V2X) are bolstering the autonomous driving paradigm. V2X nodes are connected through communication technology, such as a short-range communication mode (Dedicated Short Range Communi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903