Skip to Content

Future Internet, Volume 17, Issue 5

2025 May - 42 articles

Cover Story: This paper proposes a Federated Learning Intrusion Detection System (FL-IDS) composed of two convolutional neural network (CNN) models to detect network and IoT device attacks simultaneously. Collaborative training across multiple cooperative smart buildings enables model development without direct data sharing, ensuring privacy by design. Using the ToN-IoT dataset, the results show that the proposed FL-IDS achieves performance comparable to that of its centralized counterpart. To address the specific vulnerabilities of FL, a secure and robust aggregation method is introduced, making the system resistant to poisoning attacks from up to 20% of the participating clients. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Article
  • Open Access
1 Citations
756 Views
17 Pages

Heuristic Fuzzy Approach to Traffic Flow Modelling and Control on Urban Networks

  • Alexander Gegov,
  • Boriana Vatchova,
  • Yordanka Boneva and
  • Alexandar Ichtev

Computer-aided transport modelling is essential for testing different control strategies for traffic lights. One approach to modelling traffic control is by heuristically defining fuzzy rules for the control of traffic light systems and applying them...

  • Article
  • Open Access
5 Citations
1,941 Views
30 Pages

The rapid integration of the Internet of Medical Things (IoMT) is transforming healthcare through real-time monitoring, AI-driven diagnostics, and remote treatment. However, the growing reliance on IoMT devices, such as robotic surgical systems, life...

  • Article
  • Open Access
1,700 Views
13 Pages

Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers

  • Lingfeng Shen,
  • Jiangtao Nie,
  • Ming Li,
  • Guanghui Wang,
  • Qiankun Zhang and
  • Xin He

This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with mul...

  • Article
  • Open Access
1 Citations
1,101 Views
26 Pages

With an increasing number of illegal radio stations, connected cars, and IoT devices, high-accuracy radio source localization techniques are in demand. Traditional methods such as GPS positioning and triangulation suffer from accuracy degradation in...

  • Article
  • Open Access
2 Citations
1,215 Views
21 Pages

Real-Time Identification of Look-Alike Medical Vials Using Mixed Reality-Enabled Deep Learning

  • Bahar Uddin Mahmud,
  • Guanyue Hong,
  • Virinchi Ravindrakumar Lalwani,
  • Nicholas Brown and
  • Zachary D. Asher

The accurate identification of look-alike medical vials is essential for patient safety, particularly when similar vials contain different substances, volumes, or concentrations. Traditional methods, such as manual selection or barcode-based identifi...

  • Article
  • Open Access
1 Citations
1,826 Views
16 Pages

A Portable Non-Motorized Smart IoT Weather Station Platform for Urban Thermal Comfort Studies

  • Raju Sethupatu Bala,
  • Salaheddin Hosseinzadeh,
  • Farhad Sadeghineko,
  • Craig Scott Thomson and
  • Rohinton Emmanuel

Smart cities are widely regarded as a promising solution to urbanization challenges; however, environmental aspects such as outdoor thermal comfort and urban heat island are often less addressed than social and economic dimensions of sustainability....

  • Article
  • Open Access
5 Citations
1,942 Views
18 Pages

A Scalable Hybrid Autoencoder–Extreme Learning Machine Framework for Adaptive Intrusion Detection in High-Dimensional Networks

  • Anubhav Kumar,
  • Rajamani Radhakrishnan,
  • Mani Sumithra,
  • Prabu Kaliyaperumal,
  • Balamurugan Balusamy and
  • Francesco Benedetto

The rapid expansion of network environments has introduced significant cybersecurity challenges, particularly in handling high-dimensional traffic and detecting sophisticated threats. This study presents a novel, scalable Hybrid Autoencoder–Ext...

  • Article
  • Open Access
1,050 Views
22 Pages

In complex indoor and outdoor scenarios, traditional GPS-based ranging technology faces limitations in availability due to signal occlusion and user privacy issues. Wireless signal ranging technology based on 5G base stations has emerged as a potenti...

  • Article
  • Open Access
1,775 Views
23 Pages

Container technology is currently one of the mainstream technologies in the field of cloud computing, yet its adoption in resource-constrained, latency-sensitive edge environments introduces unique security challenges. While existing system call-base...

  • Article
  • Open Access
2 Citations
3,065 Views
22 Pages

A Web-Based Application for Smart City Data Analysis and Visualization

  • Panagiotis Karampakakis,
  • Despoina Ioakeimidou,
  • Periklis Chatzimisios and
  • Konstantinos A. Tsintotas

Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. These modern digital civil hubs aim to manage environmental conditions, traffic flow, and infrastructure through interconnected and data...

  • Article
  • Open Access
4 Citations
2,692 Views
20 Pages

Network Intrusion Detection Systems (NIDS) often suffer from severe class imbalance, where minority attack types are underrepresented, leading to degraded detection performance. To address this challenge, we propose a novel augmentation framework tha...

  • Article
  • Open Access
2 Citations
1,709 Views
36 Pages

Multi-Criteria Genetic Algorithm for Optimizing Distributed Computing Systems in Neural Network Synthesis

  • Valeriya V. Tynchenko,
  • Ivan Malashin,
  • Sergei O. Kurashkin,
  • Vadim Tynchenko,
  • Andrei Gantimurov,
  • Vladimir Nelyub and
  • Aleksei Borodulin

Artificial neural networks (ANNs) are increasingly effective in addressing complex scientific and technological challenges. However, challenges persist in synthesizing neural network models and defining their structural parameters. This study investi...

  • Article
  • Open Access
2 Citations
1,079 Views
16 Pages

Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach

  • Cristian Bua,
  • Francesco Fiorini,
  • Michele Pagano,
  • Davide Adami and
  • Stefano Giordano

Maintaining optimal microclimatic conditions within greenhouses represents a significant challenge in modern agricultural contexts, where prediction systems play a crucial role in regulating temperature and humidity, thereby enabling timely intervent...

  • Article
  • Open Access
4 Citations
3,418 Views
33 Pages

During the COVID-19 pandemic, social media platforms emerged as both vital information sources and conduits for the rapid spread of propaganda and misinformation. However, existing studies often rely on single-label classification, lack contextual se...

  • Article
  • Open Access
2 Citations
3,046 Views
27 Pages

DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization

  • Hardi Sabah Talabani,
  • Zrar Khalid Abdul and
  • Hardi Mohammed Mohammed Saleh

DNS over HTTPS (DoH) is an advanced version of the traditional DNS protocol that prevents eavesdropping and man-in-the-middle attacks by encrypting queries and responses. However, it introduces new challenges such as encrypted traffic communication,...

  • Article
  • Open Access
4 Citations
3,421 Views
23 Pages

A high level of data integrity is a strong requirement in systems where the life of people depends on accurate and timely responses. In healthcare emergency response systems, a centralized authority that handles data related to occurring events is pr...

  • Article
  • Open Access
1,882 Views
21 Pages

The study investigates how adversarial training techniques can be used to introduce backdoors into deep learning models by an insider with privileged access to training data. The research demonstrates an insider-driven poison-label backdoor approach...

  • Article
  • Open Access
1,293 Views
20 Pages

This paper presents TCReC, an innovative model designed for reconstructing network traffic characteristics in the presence of packet loss. With the rapid expansion of wireless networks driven by edge computing, IoT, and 5G technologies, challenges su...

  • Article
  • Open Access
7 Citations
1,996 Views
22 Pages

This paper investigates, applies, and evaluates state-of-the-art Large Language Models (LLMs) for the classification of posts from a dark web hackers’ forum into four cyber-security categories. The LLMs applied included Mistral-7B-Instruct-v0.2...

  • Article
  • Open Access
3 Citations
1,549 Views
15 Pages

XGBoost-Based Detection of DDoS Attacks in Named Data Networking

  • Liang Liu,
  • Weiqing Yu,
  • Zhijun Wu and
  • Silin Peng

Named Data Networking (NDN) is highly susceptible to Distributed Denial of Service (DDoS) attacks, such as Interest Flooding Attack (IFA) and Cache Pollution Attack (CPA). These attacks exploit the inherent data retrieval and caching mechanisms of ND...

  • Review
  • Open Access
3 Citations
6,859 Views
36 Pages

Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods

  • Mohammad Jaminur Islam,
  • Saminur Islam,
  • Mahmud Hossain,
  • Shahid Noor and
  • S. M. Riazul Islam

Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and Io...

  • Article
  • Open Access
5 Citations
3,068 Views
27 Pages

AI-Powered Stroke Diagnosis System: Methodological Framework and Implementation

  • Marta Narigina,
  • Agris Vindecs,
  • Dušanka Bošković,
  • Yuri Merkuryev and
  • Andrejs Romanovs

This study introduces an AI-based framework for stroke diagnosis that merges clinical data and curated imaging data. The system utilizes traditional machine learning and advanced deep learning techniques to tackle dataset imbalances and variability i...

  • Article
  • Open Access
1,961 Views
18 Pages

C6EnPLS: A High-Performance Computing Job Dataset for the Analysis of Linear Solvers’ Power Consumption

  • Marcello Artioli,
  • Andrea Borghesi,
  • Marta Chinnici,
  • Anna Ciampolini,
  • Michele Colonna,
  • Davide De Chiara and
  • Daniela Loreti

30 April 2025

In recent decades, driven by global efforts towards sustainability, the priorities of HPC facilities have changed to include maximising energy efficiency besides computing performance. In this regard, a crucial open question is how to accurately pred...

  • Review
  • Open Access
1 Citations
1,374 Views
55 Pages

SoK: Delegated Security in the Internet of Things

  • Emiliia Geloczi,
  • Felix Klement,
  • Patrick Struck and
  • Stefan Katzenbeisser

30 April 2025

The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on perf...

  • Article
  • Open Access
3 Citations
2,217 Views
32 Pages

Optimizing Internet of Things Services Placement in Fog Computing Using Hybrid Recommendation System

  • Hanen Ben Rjeb,
  • Layth Sliman,
  • Hela Zorgati,
  • Raoudha Ben Djemaa and
  • Amine Dhraief

30 April 2025

Fog Computing extends Cloud computing capabilities by providing computational resources closer to end users. Fog Computing has gained considerable popularity in various domains such as drones, autonomous vehicles, and smart cities. In this context, t...

  • Article
  • Open Access
1 Citations
1,141 Views
17 Pages

Implementation and Performance Analysis of an Industrial Robot’s Vision System Based on Cloud Vision Services

  • Ioana-Livia Stefan,
  • Andrei Mateescu,
  • Ionut Lentoiu,
  • Silviu Raileanu,
  • Florin Daniel Anton,
  • Dragos Constantin Popescu and
  • Ioan Stefan Sacala

30 April 2025

With its fast advancements, cloud computing opens many opportunities for research in various applications from the robotics field. In our paper, we further explore the prospect of integrating Cloud AI object recognition services into an industrial ro...

  • Systematic Review
  • Open Access
20 Citations
8,298 Views
35 Pages

Integrating AIoT Technologies in Aquaculture: A Systematic Review

  • Fahmida Wazed Tina,
  • Nasrin Afsarimanesh,
  • Anindya Nag and
  • Md Eshrat E. Alahi

30 April 2025

The increasing global demand for seafood underscores the necessity for sustainable aquaculture practices. However, several challenges, including rising operational costs, variable environmental conditions, and the threat of disease outbreaks, impede...

  • Article
  • Open Access
2 Citations
1,897 Views
30 Pages

Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration

  • Negin Jahanbakhsh,
  • Mario Vega-Barbas,
  • Iván Pau,
  • Lucas Elvira-Martín,
  • Hirad Moosavi and
  • Carolina García-Vázquez

29 April 2025

The rapid growth of smart home technologies, driven by the expansion of the Internet of Things (IoT), has introduced both opportunities and challenges in automating daily routines and orchestrating device interactions. Traditional rule-based automati...

  • Article
  • Open Access
1 Citations
1,980 Views
31 Pages

Leveraging Blockchain Technology for Secure 5G Offloading Processes

  • Cristina Regueiro,
  • Santiago de Diego and
  • Borja Urkizu

29 April 2025

This paper presents a secure 5G offloading mechanism leveraging Blockchain technology and Self-Sovereign Identity (SSI). The advent of 5G has significantly enhanced the capabilities of all sectors, enabling innovative applications and improving secur...

  • Article
  • Open Access
1,151 Views
26 Pages

Ephemeral Node Identifiers for Enhanced Flow Privacy

  • Gregor Tamati Haywood and
  • Saleem Noel Bhatti

28 April 2025

The Internet Protocol (IP) uses numerical address values carried in IP packets at the network layer to allow correct forwarding of packets between source and destination. Those address values must be kept visible in all parts of the network. By defin...

  • Article
  • Open Access
5 Citations
4,446 Views
28 Pages

An Improved Reference Paper Collection System Using Web Scraping with Three Enhancements

  • Tresna Maulana Fahrudin,
  • Nobuo Funabiki,
  • Komang Candra Brata,
  • Inzali Naing,
  • Soe Thandar Aung,
  • Amri Muhaimin and
  • Dwi Arman Prasetya

28 April 2025

Nowadays, accessibility to academic papers has been significantly improved with electric publications on the internet, where open access has become common. At the same time, it has increased workloads in literature surveys for researchers who usually...

  • Article
  • Open Access
781 Views
20 Pages

BPDM-GCN: Backup Path Design Method Based on Graph Convolutional Neural Network

  • Wanwei Huang,
  • Huicong Yu,
  • Yingying Li,
  • Xi He and
  • Rui Chen

27 April 2025

To address the problems of poor applicability of existing fault link recovery algorithms in network topology migration and backup path congestion, this paper proposes a backup path algorithm based on graph convolutional neural to improve deep determi...

  • Article
  • Open Access
1 Citations
1,664 Views
17 Pages

Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security

  • Guobin Xu,
  • Oluwole Adetifa,
  • Jianzhou Mao,
  • Eric Sakk and
  • Shuangbao Wang

26 April 2025

Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic...

  • Article
  • Open Access
7 Citations
3,609 Views
30 Pages

Railway Cloud Resource Management as a Service

  • Ivaylo Atanasov,
  • Dragomira Dimitrova,
  • Evelina Pencheva and
  • Ventsislav Trifonov

24 April 2025

Cloud computing has the potential to accelerate the digital journey of railways. Railway systems are big and complex, involving a lot of parts, like trains, tracks, signaling systems, and control systems, among others. The application of cloud comput...

  • Article
  • Open Access
6 Citations
2,554 Views
38 Pages

Trustworthy AI and Federated Learning for Intrusion Detection in 6G-Connected Smart Buildings

  • Rosario G. Garroppo,
  • Pietro Giuseppe Giardina,
  • Giada Landi and
  • Marco Ruta

23 April 2025

Smart building applications require robust security measures to ensure system functionality, privacy, and security. To this end, this paper proposes a Federated Learning Intrusion Detection System (FL-IDS) composed of two convolutional neural network...

  • Article
  • Open Access
2 Citations
2,981 Views
20 Pages

Towards Safer Cities: AI-Powered Infrastructure Fault Detection Based on YOLOv11

  • Raiyen Z. Rakin,
  • Mahmudur Rahman,
  • Kanij F. Borsa,
  • Fahmid Al Farid,
  • Shakila Rahman,
  • Jia Uddin and
  • Hezerul Abdul Karim

22 April 2025

The current infrastructure is crucial to metropolitan improvement. Natural factors, aging, and overuse cause these structures to deteriorate, introducing dangers to public well-being. Timely detection of infrastructure failures requires an effective...

  • Article
  • Open Access
6 Citations
4,703 Views
17 Pages

A Machine Learning Approach for Predicting Maternal Health Risks in Lower-Middle-Income Countries Using Sparse Data and Vital Signs

  • Avnish Malde,
  • Vishnunarayan Girishan Prabhu,
  • Dishant Banga,
  • Michael Hsieh,
  • Chaithanya Renduchintala and
  • Ronald Pirrallo

22 April 2025

According to the World Health Organization, maternal mortality rates remain a critical public health issue, with 94% of maternal deaths occurring in low- and middle-income countries (LMICs), where the rates reached 430 per 100,000 live births in 2020...

  • Article
  • Open Access
1 Citations
2,266 Views
23 Pages

22 April 2025

The rapid development of wireless network technology and the continuous evolution of network service demands have raised higher requirements for congestion control algorithms. In 2016, Google proposed the Bottleneck Bandwidth and Round-trip propagati...

  • Article
  • Open Access
1 Citations
1,021 Views
18 Pages

22 April 2025

This paper represents a new method for the extraction of features from 5G signals using spectrogram and quantum cat swarm optimization (QCSO). The proposed approach uses a discrete wavelet transform (DWT)-based convolutional neural network (W-CNN) to...

  • Article
  • Open Access
1,891 Views
15 Pages

Using Machine Learning to Detect Vault (Anti-Forensic) Apps

  • Michael N. Johnstone,
  • Wencheng Yang and
  • Mohiuddin Ahmed

22 April 2025

Content hiding, or vault applications (apps), are designed with a secondary, often concealed purpose, such as encrypting and storing files. While these apps may serve legitimate functions, they unequivocally present significant challenges for law enf...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903