You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 2

February 2025 - 46 articles

Cover Story: Traditional IoT systems rely heavily on centralized servers, but advances in edge computing and Tiny Machine Learning (TinyML) now allow for on-device processing, enhancing battery efficiency and reducing latency. While this shift improves privacy, the distributed nature of edge devices introduces new security challenges, particularly regarding TinyML models, may be vulnerable to tampering or unauthorized access. To address this, we propose a lightweight dual attestation mechanism utilizing Entity Attestation Tokens (EATs) to validate the device and ML model integrity. This approach enhances security by enabling verified device-to-device communication, supports seamless integration with secure cloud services, and allows for flexible, authorized ML model updates, meeting modern IoT systems’ scalability and compliance needs. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (46)

  • Article
  • Open Access
3 Citations
2,823 Views
31 Pages

19 February 2025

Generating high-quality synthetic data is essential for advancing machine learning applications in financial time series, where data scarcity and privacy concerns often pose significant challenges. This study proposes a novel hybrid architecture that...

  • Article
  • Open Access
1 Citations
3,568 Views
31 Pages

18 February 2025

In today’s business landscape, artificial intelligence (AI) plays a pivotal role in shopping processes and customization. As the demand for customization grows, virtual reality (VR) emerges as an innovative solution to improve users’ perc...

  • Article
  • Open Access
2,763 Views
26 Pages

18 February 2025

Insider threats pose a significant challenge to organizational cybersecurity, often leading to catastrophic financial and reputational damages. Traditional tools such as firewalls and antivirus systems lack the sophistication needed to detect and mit...

  • Article
  • Open Access
2 Citations
1,281 Views
24 Pages

17 February 2025

The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting eviden...

  • Review
  • Open Access
1,383 Views
57 Pages

From Bottom of Sea to Space: Quo Vadis IoT? So What About Security?

  • Behrouz Zolfaghari,
  • Jacob Krzciok and
  • Khodakhast Bibak

17 February 2025

In recent years, we have witnessed the era of IoT. Extensions of the IoT are found almost everywhere in the modern world: under the ground, on the ground, under the sea, in the sky, and in space. Such a rapid proliferation has given rise to a variety...

  • Review
  • Open Access
3 Citations
4,170 Views
50 Pages

Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm

  • Gaetanino Paolone,
  • Romolo Paesani,
  • Francesco Pilotti,
  • Jacopo Camplone,
  • Andrea Piazza and
  • Paolino Di Felice

14 February 2025

Lighting Systems (LSs) play a fundamental role in almost every aspect of human activities. Since the advent of lights, both academia and industry have been engaged in raising the quality of the service offered by these systems. The advent of Light Em...

  • Article
  • Open Access
2 Citations
1,582 Views
20 Pages

14 February 2025

The rapid advancement of edge computing and Tiny Machine Learning (TinyML) has created new opportunities for deploying intelligence in resource-constrained environments. With the growing demand for intelligent Internet of Things (IoT) devices that ca...

  • Article
  • Open Access
8 Citations
2,093 Views
29 Pages

Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks

  • Abdulrahman A. Alshdadi,
  • Abdulwahab Ali Almazroi,
  • Nasir Ayub,
  • Miltiadis D. Lytras,
  • Eesa Alsolami,
  • Faisal S. Alsubaei and
  • Riad Alharbey

13 February 2025

Industry-wide IoT networks have altered operations and increased vulnerabilities, notably DDoS attacks. IoT systems are decentralised. Therefore, these attacks flood networks with malicious traffic, creating interruptions, financial losses, and avail...

  • Review
  • Open Access
4 Citations
5,473 Views
24 Pages

A Review and Experimental Evaluation on Split Learning

  • Zhanyi Hu,
  • Tianchen Zhou,
  • Bingzhe Wu,
  • Cen Chen and
  • Yanhao Wang

13 February 2025

Training deep learning models collaboratively on decentralized edge devices has attracted significant attention recently. The two most prominent schemes for this problem are Federated Learning (FL) and Split Learning (SL). Although there have been se...

  • Article
  • Open Access
2 Citations
1,945 Views
28 Pages

ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks

  • Rodrigo Asensio-Garriga,
  • Alejandro Molina Zarca,
  • Jordi Ortiz,
  • Ana Hermosilla,
  • Hugo Ramón Pascual,
  • Antonio Pastor and
  • Antonio Skarmeta

12 February 2025

In the rapidly evolving landscape of telecommunications, the integration of commercial 5G solutions and the rise of edge computing have reshaped service delivery, emphasizing the customization of requirements through network slices. However, the hete...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903