Skip to Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 2

2025 February - 46 articles

Cover Story: Traditional IoT systems rely heavily on centralized servers, but advances in edge computing and Tiny Machine Learning (TinyML) now allow for on-device processing, enhancing battery efficiency and reducing latency. While this shift improves privacy, the distributed nature of edge devices introduces new security challenges, particularly regarding TinyML models, may be vulnerable to tampering or unauthorized access. To address this, we propose a lightweight dual attestation mechanism utilizing Entity Attestation Tokens (EATs) to validate the device and ML model integrity. This approach enhances security by enabling verified device-to-device communication, supports seamless integration with secure cloud services, and allows for flexible, authorized ML model updates, meeting modern IoT systems’ scalability and compliance needs. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (46)

  • Article
  • Open Access
4 Citations
3,240 Views
31 Pages

19 February 2025

Generating high-quality synthetic data is essential for advancing machine learning applications in financial time series, where data scarcity and privacy concerns often pose significant challenges. This study proposes a novel hybrid architecture that...

  • Article
  • Open Access
5 Citations
4,036 Views
31 Pages

18 February 2025

In today’s business landscape, artificial intelligence (AI) plays a pivotal role in shopping processes and customization. As the demand for customization grows, virtual reality (VR) emerges as an innovative solution to improve users’ perc...

  • Article
  • Open Access
2 Citations
3,111 Views
26 Pages

18 February 2025

Insider threats pose a significant challenge to organizational cybersecurity, often leading to catastrophic financial and reputational damages. Traditional tools such as firewalls and antivirus systems lack the sophistication needed to detect and mit...

  • Article
  • Open Access
2 Citations
1,521 Views
24 Pages

17 February 2025

The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting eviden...

  • Review
  • Open Access
1,521 Views
57 Pages

From Bottom of Sea to Space: Quo Vadis IoT? So What About Security?

  • Behrouz Zolfaghari,
  • Jacob Krzciok and
  • Khodakhast Bibak

17 February 2025

In recent years, we have witnessed the era of IoT. Extensions of the IoT are found almost everywhere in the modern world: under the ground, on the ground, under the sea, in the sky, and in space. Such a rapid proliferation has given rise to a variety...

  • Review
  • Open Access
3 Citations
4,800 Views
50 Pages

Smart Lighting Systems: State-of-the-Art in the Adoption of the EdgeML Computing Paradigm

  • Gaetanino Paolone,
  • Romolo Paesani,
  • Francesco Pilotti,
  • Jacopo Camplone,
  • Andrea Piazza and
  • Paolino Di Felice

14 February 2025

Lighting Systems (LSs) play a fundamental role in almost every aspect of human activities. Since the advent of lights, both academia and industry have been engaged in raising the quality of the service offered by these systems. The advent of Light Em...

  • Article
  • Open Access
2 Citations
1,861 Views
20 Pages

14 February 2025

The rapid advancement of edge computing and Tiny Machine Learning (TinyML) has created new opportunities for deploying intelligence in resource-constrained environments. With the growing demand for intelligent Internet of Things (IoT) devices that ca...

  • Article
  • Open Access
11 Citations
2,437 Views
29 Pages

Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks

  • Abdulrahman A. Alshdadi,
  • Abdulwahab Ali Almazroi,
  • Nasir Ayub,
  • Miltiadis D. Lytras,
  • Eesa Alsolami,
  • Faisal S. Alsubaei and
  • Riad Alharbey

13 February 2025

Industry-wide IoT networks have altered operations and increased vulnerabilities, notably DDoS attacks. IoT systems are decentralised. Therefore, these attacks flood networks with malicious traffic, creating interruptions, financial losses, and avail...

  • Review
  • Open Access
6 Citations
6,165 Views
24 Pages

A Review and Experimental Evaluation on Split Learning

  • Zhanyi Hu,
  • Tianchen Zhou,
  • Bingzhe Wu,
  • Cen Chen and
  • Yanhao Wang

13 February 2025

Training deep learning models collaboratively on decentralized edge devices has attracted significant attention recently. The two most prominent schemes for this problem are Federated Learning (FL) and Split Learning (SL). Although there have been se...

  • Article
  • Open Access
2 Citations
2,247 Views
28 Pages

ZSM Framework for Autonomous Security Service Level Agreement Life-Cycle Management in B5G Networks

  • Rodrigo Asensio-Garriga,
  • Alejandro Molina Zarca,
  • Jordi Ortiz,
  • Ana Hermosilla,
  • Hugo Ramón Pascual,
  • Antonio Pastor and
  • Antonio Skarmeta

12 February 2025

In the rapidly evolving landscape of telecommunications, the integration of commercial 5G solutions and the rise of edge computing have reshaped service delivery, emphasizing the customization of requirements through network slices. However, the hete...

  • Article
  • Open Access
4 Citations
5,373 Views
27 Pages

12 February 2025

Emerging edge devices are transforming the Internet of Things (IoT) by enabling more responsive and efficient interactions between physical objects and digital networks. These devices support diverse applications, from health-monitoring wearables to...

  • Article
  • Open Access
3 Citations
3,499 Views
21 Pages

12 February 2025

The plague of cyberbullying on social media exerts a dangerous influence on human lives. Due to the fact that online social networks continue to daily expand, the proliferation of hate speech is also growing. Consequentially, distressing content is o...

  • Article
  • Open Access
6 Citations
3,558 Views
23 Pages

Security and Privacy in Physical–Digital Environments: Trends and Opportunities

  • Carolina Pereira,
  • Anabela Marto,
  • Roberto Ribeiro,
  • Alexandrino Gonçalves,
  • Nuno Rodrigues,
  • Carlos Rabadão,
  • Rogério Luís de Carvalho Costa and
  • Leonel Santos

12 February 2025

Over recent decades, internet-based communication has grown exponentially, accompanied by a surge in cyber threats from malicious actors targeting users and organizations, heightening the demand for robust security and privacy measures. With the emer...

  • Article
  • Open Access
2 Citations
1,953 Views
19 Pages

11 February 2025

In a technology-driven world, the concepts of digitalization and Industry 4.0 (I4.0) are an ever more present reality for companies. The benefits which these advancements offer, coupled with the market-driven pressure to reduce response times, have p...

  • Article
  • Open Access
2 Citations
1,476 Views
18 Pages

11 February 2025

Modern design products are increasingly complex and emotionally significant, demanding versatile and collaborative customization. However, a literature and commercial review reveals a limited availability of flexible, multi-user, photorealistic Virtu...

  • Review
  • Open Access
9 Citations
2,889 Views
40 Pages

Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review

  • Navdeep Bohra,
  • Ashish Kumari,
  • Vikash Kumar Mishra,
  • Pramod Kumar Soni and
  • Vipin Balyan

10 February 2025

Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for b...

  • Article
  • Open Access
1 Citations
1,197 Views
15 Pages

Low-Cost Software Evaluation of Communication Delays in Networked Industrial Systems

  • Manuel Cheminod,
  • Ivan Cibrario Bertolotti,
  • Adriano Valenzano and
  • Luca Durante

10 February 2025

Equipment to be installed in real-time industrial control system networks must be carefully characterized before commissioning to ensure it meets performance requirements. However, performance analysis tools may be expensive and come with stringent h...

  • Article
  • Open Access
2 Citations
2,060 Views
61 Pages

10 February 2025

Every year, more and more electronic devices are used in households, which certainly leads to an increase in the total number of communications between devices. During communication, a huge amount of information is transmitted, which can be critical...

  • Review
  • Open Access
11 Citations
5,924 Views
32 Pages

8 February 2025

The application of Large Language Models (LLMs) in medicine represents an area of growing interest in scientific research. This study presents a quantitative review of the scientific literature aiming at analyzing emerging trends in the use of LLMs i...

  • Article
  • Open Access
1,627 Views
19 Pages

8 February 2025

Federated learning has attracted widespread attention due to its strong capabilities of privacy protection, making it a powerful supporting technology for addressing data silos in the future. However, federated learning still lags significantly behin...

  • Article
  • Open Access
2 Citations
2,239 Views
22 Pages

8 February 2025

Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database. For this purpose, the study creates a model that in...

  • Article
  • Open Access
1 Citations
1,156 Views
30 Pages

Task-Driven Virtual Machine Optimization Placement Model and Algorithm

  • Ran Yang,
  • Zhaonan Li,
  • Junhao Qian and
  • Zhihua Li

7 February 2025

In cloud data centers, determining how to balance the interests of the user and the cloud service provider is a challenging issue. In this study, a task-loading-oriented virtual machine (VM) optimization placement model and algorithm is proposed inte...

  • Article
  • Open Access
4 Citations
2,805 Views
20 Pages

7 February 2025

This study addresses a critical challenge in modern blockchain systems: the excessive size of Merkle proofs in state verification, which significantly impacts scalability and efficiency. As highlighted by Ethereum’s founder, Vitalik Buterin, cu...

  • Article
  • Open Access
3 Citations
10,022 Views
43 Pages

Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection

  • Tahesin Samira Delwar,
  • Sayak Mukhopadhyay,
  • Akshay Kumar,
  • Mangal Singh,
  • Yang-won Lee,
  • Jee-Youl Ryu and
  • A. S. M. Sanwar Hosen

6 February 2025

This research proposes a ground-breaking technique for protecting agricultural fields against animal invasion, addressing a key challenge in the agriculture industry. The suggested system guarantees real-time intrusion detection and quick reactions b...

  • Article
  • Open Access
5 Citations
2,697 Views
22 Pages

6 February 2025

This paper introduces Optimal 5G Network Sub-Slicing Orchestration (ONSSO), a novel machine learning framework for dynamic and autonomous 5G network slice orchestration. The framework leverages the LazyPredict module to automatically select optimal s...

  • Article
  • Open Access
5 Citations
1,927 Views
14 Pages

Machine Learning and Deep Learning-Based Multi-Attribute Physical-Layer Authentication for Spoofing Detection in LoRaWAN

  • Azita Pourghasem,
  • Raimund Kirner,
  • Athanasios Tsokanos,
  • Iosif Mporas and
  • Alexios Mylonas

6 February 2025

The use of wireless sensor networks (WSNs) in critical applications such as environmental monitoring, smart agriculture, and industrial automation has created significant security concerns, particularly due to the broadcasting nature of wireless comm...

  • Article
  • Open Access
1 Citations
1,291 Views
30 Pages

Ubunye: An MEC Orchestration Service Based on QoE, QoS, and Service Classification Using Machine Learning

  • Kilbert Amorim Maciel,
  • David Martins Leite,
  • Guilherme Alves de Araújo,
  • Flavia C. Delicato and
  • Atslands R. Rocha

5 February 2025

The increasing adoption of Internet of Things devices has led to a significant demand for cloud services, where latency and bandwidth play a crucial role in shaping users’ perception of network service quality. However, the use of cloud service...

  • Article
  • Open Access
4 Citations
3,194 Views
30 Pages

5 February 2025

In today’s technology-centric era, digital transformation has made accessibility and cybersecurity critical components for developing inclusive web applications that are essential in daily operations. However, current development models often t...

  • Article
  • Open Access
1 Citations
2,926 Views
24 Pages

DTL-GNN: Digital Twin Lightweight Method Based on Graph Neural Network

  • Chengjun Li,
  • Liguo Yao,
  • Yao Lu,
  • Songsong Zhang and
  • Taihua Zhang

5 February 2025

In the digital twin system of mechatronics engineering, the scale and accuracy of models are continually improving. Nevertheless, this growth can hinder real-time interaction and decision-making accuracy within digital twins. The resulting delay impa...

  • Article
  • Open Access
8 Citations
5,755 Views
35 Pages

5 February 2025

Evaluating user experience (UX) is essential for optimizing educational chatbots to enhance learning outcomes and student productivity. This study introduces a novel weighted composite metric integrating interface usability assessment (via the Chatbo...

  • Article
  • Open Access
39 Citations
13,748 Views
55 Pages

The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning

  • Leyli Nouraei Yeganeh,
  • Nicole Scarlett Fenty,
  • Yu Chen,
  • Amber Simpson and
  • Mohsen Hatami

4 February 2025

Modern education faces persistent challenges, including disengagement, inequitable access to learning resources, and the lack of personalized instruction, particularly in virtual environments. In this perspective, we envision a transformative Metaver...

  • Article
  • Open Access
1 Citations
1,420 Views
19 Pages

3 February 2025

Terahertz (THz)-band communications are a possible candidate for fast communication. Transmission power needs to be optimised in order to satisfy the requirements of such a network of nodes. Multi-hop communication can be used in THz communications t...

  • Article
  • Open Access
4 Citations
3,926 Views
25 Pages

Cross-Domain Fake News Detection Through Fusion of Evidence from Multiple Social Media Platforms

  • Jannatul Ferdush,
  • Joarder Kamruzzaman,
  • Gour Karmakar,
  • Iqbal Gondal and
  • Rajkumar Das

3 February 2025

Fake news has become a significant challenge on online social platforms, increasing uncertainty and unwanted tension in society. The negative impact of fake news on political processes, public health, and social harmony underscores the urgency of dev...

  • Article
  • Open Access
2 Citations
1,494 Views
23 Pages

3 February 2025

The classification of the wireless propagation channel between Line-of-Sight (LOS) or Non-Line-of-Sight (NLOS) is useful in the operation of wireless communication systems. The research community has increasingly investigated the application of machi...

  • Article
  • Open Access
5 Citations
4,213 Views
26 Pages

3 February 2025

The growing volume of textual data generated on digital media platforms presents significant challenges for the analysis and interpretation of information. This article proposes a methodological approach that combines artificial intelligence (AI) tec...

  • Review
  • Open Access
20 Citations
6,067 Views
25 Pages

2 February 2025

The research into artificial intelligence (AI), the metaverse, and extended reality (XR) technologies, such as augmented reality (AR), virtual reality (VR), and mixed reality (MR), has been expanding over the recent years. This study aims to provide...

  • Review
  • Open Access
25 Citations
14,726 Views
30 Pages

AI Agents Meet Blockchain: A Survey on Secure and Scalable Collaboration for Multi-Agents

  • Md Monjurul Karim,
  • Dong Hoang Van,
  • Sangeen Khan,
  • Qiang Qu and
  • Yaroslav Kholodov

2 February 2025

In recent years, the interplay between AI agents and blockchain has enabled secure and scalable collaboration among multi-agent systems, promoting unprecedented levels of autonomy and interoperability. AI agents play a vital role in facilitating comp...

  • Article
  • Open Access
2 Citations
2,714 Views
23 Pages

IoT-Driven Intelligent Scheduling Solution for Industrial Sewing Based on Real-RCPSP Model

  • Huu Dang Quoc,
  • Loc Nguyen The,
  • Truong Bui Quang and
  • Phuong Han Minh

26 January 2025

Applying IoT systems in industrial production allows data collection directly from production lines and factories. These data are aggregated, analyzed, and converted into reports to support manufacturers. Business managers can quickly and easily gras...

  • Article
  • Open Access
4 Citations
2,012 Views
18 Pages

Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality

  • Ana Cassia Cruz,
  • Rogério Luís de C. Costa,
  • Leonel Santos,
  • Carlos Rabadão,
  • Anabela Marto and
  • Alexandrino Gonçalves

25 January 2025

As augmented reality (AR) technologies become increasingly integrated into everyday life, privacy-maintenance concerns about their capacity to capture and process sensitive visual data also increase. Visual data sanitization and obfuscation may effec...

  • Article
  • Open Access
1 Citations
2,364 Views
32 Pages

BLE Signal Reception and Localization Performance with Varying Receiver and Beacon Setups

  • Brahim Benaissa,
  • Filip Hendrichovsky,
  • Mansur As and
  • Kaori Yoshida

25 January 2025

This paper examines the performance of Bluetooth Low Energy signal reception for indoor localization by analyzing the interactions between gateways, beacons, and receiver placements. The study investigates the effect of different BLE beacon placement...

  • Article
  • Open Access
1 Citations
1,546 Views
15 Pages

Optimizing IoT Video Data: Dimensionality Reduction for Efficient Deep Learning on Edge Computing

  • David Ortiz-Perez,
  • Pablo Ruiz-Ponce,
  • David Mulero-Pérez,
  • Manuel Benavent-Lledo,
  • Javier Rodriguez-Juan,
  • Hugo Hernandez-Lopez,
  • Anatoli Iarovikov,
  • Srdjan Krco,
  • Daliborka Nedic and
  • Jose Garcia-Rodriguez
  • + 1 author

21 January 2025

The rapid loss of biodiversity significantly impacts birds’ environments and behaviors, highlighting the importance of analyzing bird behavior for ecological insights. With the growing adoption of Machine Learning (ML) algorithms in the Interne...

  • Article
  • Open Access
1 Citations
2,424 Views
21 Pages

Enhancing Human–Agent Interaction via Artificial Agents That Speculate About the Future

  • Casey C. Bennett,
  • Young-Ho Bae,
  • Jun-Hyung Yoon,
  • Say Young Kim and
  • Benjamin Weiss

21 January 2025

Human communication in daily life entails not only talking about what we are currently doing or will do, but also speculating about future possibilities that may (or may not) occur, i.e., “anticipatory speech”. Such conversations are cent...

  • Review
  • Open Access
2 Citations
4,208 Views
44 Pages

21 January 2025

The fifth generation (5G) of wireless communication is in its finalization stage and has received favorable reception in many nations. However, research is now geared towards the anticipated sixth-generation (6G) wireless network. The new 6G promises...

  • Review
  • Open Access
4 Citations
2,808 Views
29 Pages

Survey on Secure Scientific Workflow Scheduling in Cloud Environments

  • Hadeel Amjed Saeed,
  • Sufyan T. Faraj Al-Janabi,
  • Esam Taha Yassen and
  • Omar A. Aldhaibani

21 January 2025

In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903