You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 16, Issue 9

September 2024 - 45 articles

Cover Story: This study envisions a novel framework to declaratively deploy next-generation 5G mobile core across sites following the liquid computing paradigm (provided by Liqo operator) for offloading both user and control planes to remote clusters. A full stack perspective is genuinely imprinted since the network slicing layer is orchestrated by Kubernetes, whereas monitoring and observability are achieved by employing a service-mesh solution (Istio). Conversely, the networking function and service layer are covered by the Liqo control plane that ensures that the overlay network communicates between sites through APIs. Different strategies for peering between clusters are proposed, and the obtained results show a significant improvement in network performance in the case of in-band peering when VPN tunneling is applied between sites. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (45)

  • Review
  • Open Access
15 Citations
8,083 Views
40 Pages

A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems

  • Waleed Shahjehan,
  • Rajkumar Singh Rathore,
  • Syed Waqar Shah,
  • Mohammad Aljaidi,
  • Ali Safaa Sadiq and
  • Omprakash Kaiwartya

14 September 2024

As the world braces for an era of ubiquitous and seamless connectivity, hybrid beamforming stands out as a beacon guiding the evolutionary path of wireless communication technologies. Several hybrid beamforming technologies are explored for millimete...

  • Article
  • Open Access
3 Citations
3,815 Views
20 Pages

13 September 2024

Mirai, an IoT malware that emerged in 2016, has been used for large-scale DDoS attacks. The Mirai source code is publicly available and continues to be a threat with a variety of variants still in existence. In this paper, we propose an implementatio...

  • Article
  • Open Access
1,248 Views
25 Pages

Parallel and Distributed Frugal Tracking of a Quantile

  • Italo Epicoco,
  • Marco Pulimeno and
  • Massimo Cafaro

13 September 2024

In this paper, we deal with the problem of monitoring network latency. Indeed, latency is a key network metric related to both network performance and quality of service, since it directly impacts on the overall user’s experience. High latency...

  • Article
  • Open Access
3 Citations
4,417 Views
25 Pages

13 September 2024

While the massive adoption of Artificial Intelligence (AI) is threatening the environment, new research efforts begin to be employed to measure and mitigate the carbon footprint of both training and inference phases. In this domain, two carbon-aware...

  • Article
  • Open Access
4 Citations
2,754 Views
20 Pages

11 September 2024

Task offloading and resource allocation is a research hotspot in cloud-edge collaborative computing. Many existing pieces of research adopted single-agent reinforcement learning to solve this problem, which has some defects such as low robustness, la...

  • Article
  • Open Access
3 Citations
1,453 Views
20 Pages

11 September 2024

There is a growing interest in high-altitude platform stations (HAPSs) as potential telecommunication infrastructures in the stratosphere, providing direct communication services to ground-based smartphones. Enhanced coverage and capacity can be real...

  • Article
  • Open Access
5 Citations
2,123 Views
25 Pages

10 September 2024

The rise of 5G networks is driven by increasing deployments of IoT devices and expanding mobile and fixed broadband subscriptions. Concurrently, the deployment of 5G networks has led to a surge in network-related attacks, due to expanded attack surfa...

  • Article
  • Open Access
2 Citations
5,806 Views
33 Pages

10 September 2024

For over forty years, TCP has been the main protocol for transporting data on the Internet. To improve congestion control algorithms (CCAs), delay bounding algorithms such as Vegas, FAST, BBR, PCC, and Copa have been developed. However, despite being...

  • Systematic Review
  • Open Access
43 Citations
20,658 Views
28 Pages

10 September 2024

Edge computing promising a vision of processing data close to its generation point, reducing latency and bandwidth usage compared with traditional cloud computing architectures, has attracted significant attention lately. The integration of edge comp...

  • Article
  • Open Access
2,017 Views
20 Pages

A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs

  • Haitham Y. Adarbah,
  • Mehmet Sabir Kiraz,
  • Suleyman Kardas,
  • Ali H. Al-Bayatti and
  • Hilal M. Y. Al-Bayatti

9 September 2024

This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation,...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license