You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 4

April 2025 - 53 articles

Cover Story: This study employs secrecy energy efficiency (SEE) as a key performance metric to evaluate the trade-off between power consumption and secure communication efficiency. Additionally, a multi-objective improved biogeography-based optimization (MOIBBO) algorithm is utilized to optimize hyperparameters, ensuring an improved balance between convergence speed and model performance. Extensive simulation results demonstrate that the proposed MOIBBO-CNN–LSTM framework achieves superior SEE performance compared to benchmark schemes. These findings confirm that MOIBBO-CNN–LSTM offers an effective solution for optimizing SEE in CF m-MIMO-based IoT networks, paving the way for more energy-efficient and secure IoT communications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (53)

  • Article
  • Open Access
1 Citations
772 Views
24 Pages

CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks

  • Junchao Wang,
  • Honglin Li,
  • Yan Sun,
  • Chris Phillips,
  • Alexios Mylonas and
  • Dimitris Gritzalis

The mix-zone method is effective in preserving real-time vehicle identity and location privacy in Vehicular Ad Hoc Networks (VANETs). However, it has limitations in low-vehicle-density scenarios, where adversaries can still identify the real trajecto...

  • Article
  • Open Access
4 Citations
2,927 Views
12 Pages

Wireless Sensor Networks (WSNs) play a critical role in environmental monitoring and early forest fire detection. However, they are susceptible to sensor malfunctions and network intrusions, which can compromise data integrity and lead to false alarm...

  • Systematic Review
  • Open Access
13 Citations
5,694 Views
40 Pages

The convergence of Virtual Reality (VR), Artificial Intelligence (AI), and the Internet of Things (IoT) offers transformative potential across numerous sectors. However, existing studies often examine these technologies independently or in limited pa...

  • Article
  • Open Access
3 Citations
1,972 Views
14 Pages

The Internet of Vehicles (IoV) presents complex cybersecurity challenges, particularly against Denial-of-Service (DoS) and spoofing attacks targeting the Controller Area Network (CAN) bus. This study leverages the CICIoV2024 dataset, comprising six d...

  • Review
  • Open Access
1,488 Views
39 Pages

Enabling Green Cellular Networks: A Review and Proposal Leveraging Software-Defined Networking, Network Function Virtualization, and Cloud-Radio Access Network

  • Radheshyam Singh,
  • Line M. P. Larsen,
  • Eder Ollora Zaballa,
  • Michael Stübert Berger,
  • Christian Kloch and
  • Lars Dittmann

The increasing demand for enhanced communication systems, driven by applications such as real-time video streaming, online gaming, critical operations, and Internet-of-Things (IoT) services, has necessitated the optimization of cellular networks to m...

  • Article
  • Open Access
669 Views
26 Pages

With the development of the internet, the incidence of myopia is showing a trend towards younger ages, making routine vision screening increasingly essential. This paper designs an online refractive error screening solution centered on the CFGN (Comp...

  • Systematic Review
  • Open Access
1 Citations
1,821 Views
30 Pages

Internet of Things and Deep Learning for Citizen Security: A Systematic Literature Review on Violence and Crime

  • Chrisbel Simisterra-Batallas,
  • Pablo Pico-Valencia,
  • Jaime Sayago-Heredia and
  • Xavier Quiñónez-Ku

This study conducts a systematic literature review following the PRISMA framework and the guidelines of Kitchenham and Charters to analyze the application of Internet of Things (IoT) technologies and deep learning models in monitoring violent actions...

  • Article
  • Open Access
2 Citations
926 Views
17 Pages

A3C-R: A QoS-Oriented Energy-Saving Routing Algorithm for Software-Defined Networks

  • Sunan Wang,
  • Rong Song,
  • Xiangyu Zheng,
  • Wanwei Huang and
  • Hongchang Liu

With the rapid growth of Internet applications and network traffic, existing routing algorithms are usually difficult to guarantee the quality of service (QoS) indicators such as delay, bandwidth, and packet loss rate as well as network energy consum...

  • Article
  • Open Access
1,451 Views
24 Pages

The New CAP Theorem on Blockchain Consensus Systems

  • Aristidis G. Anagnostakis and
  • Euripidis Glavas

One of the most emblematic theorems in the theory of distributed databases is Eric Brewer’s CAP theorem. It stresses the tradeoffs between Consistency, Availability, and Partition and states that it is impossible to guarantee all three of them...

  • Article
  • Open Access
2 Citations
4,417 Views
23 Pages

Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks. This research proposes a robust security framework leveraging Docker-based virtualisation t...

of 6

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903