Skip to Content

Future Internet, Volume 17, Issue 6

2025 June - 42 articles

Cover Story: Intrusion detection in the Internet of Things (IoT) environments is increasingly critical due to the rapid proliferation of connected devices and the growing sophistication of cyber threats. Traditional detection methods often fall short in identifying multi-class attacks. This paper proposes a novel hybrid intrusion detection framework that integrates transformer networks with generative adversarial networks (GANs), aiming to enhance both detection accuracy and robustness. Experimental results show that our hybrid framework consistently outperforms baseline methods, in both binary and multi-class intrusion detection tasks. The superiority of the proposed model was further validated through statistically significant t-test results, indicating both efficiency and stability. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Article
  • Open Access
1,049 Views
27 Pages

This paper presents a framework that enables programmers to deploy embedded real-time firmware of Internet of Things (IoT) devices more conveniently than using plain C/C++-language programming, by abstracting away from low-level details and the ad ho...

  • Review
  • Open Access
1,574 Views
19 Pages

A Bibliometric Analysis and Visualization of In-Vehicle Communication Protocols

  • Iftikhar Hussain,
  • Manuel J. C. S. Reis,
  • Carlos Serôdio and
  • Frederico Branco

This research examined the domain of intelligent transportation systems (ITS) by analyzing the impact of scholarly work and thematic prevalence, as well as focusing attention on vehicles, their technologies, cybersecurity, and related scholarly techn...

  • Article
  • Open Access
1,463 Views
35 Pages

Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment

  • Sikha S. Bagui,
  • Germano Correa Silva De Carvalho,
  • Asmi Mishra,
  • Dustin Mink,
  • Subhash C. Bagui and
  • Stephanie Eager

In an era marked by the rapid growth of the Internet of Things (IoT), network security has become increasingly critical. Traditional Intrusion Detection Systems, particularly signature-based methods, struggle to identify evolving cyber threats such a...

  • Article
  • Open Access
2 Citations
1,272 Views
26 Pages

As digital infrastructure continues to expand, networks, web services, and Internet of Things (IoT) devices become increasingly vulnerable to distributed denial of service (DDoS) attacks. Remarkably, IoT devices have become attracted to DDoS attacks...

  • Article
  • Open Access
7 Citations
3,197 Views
21 Pages

JorGPT: Instructor-Aided Grading of Programming Assignments with Large Language Models (LLMs)

  • Jorge Cisneros-González,
  • Natalia Gordo-Herrera,
  • Iván Barcia-Santos and
  • Javier Sánchez-Soriano

This paper explores the application of large language models (LLMs) to automate the evaluation of programming assignments in an undergraduate “Introduction to Programming” course. This study addresses the challenges of manual grading, inc...

  • Article
  • Open Access
4 Citations
962 Views
24 Pages

An Explainable Machine Learning Approach for IoT-Supported Shaft Power Estimation and Performance Analysis for Marine Vessels

  • Yiannis Kiouvrekis,
  • Katerina Gkirtzou,
  • Sotiris Zikas,
  • Dimitris Kalatzis,
  • Theodor Panagiotakopoulos,
  • Zoran Lajic,
  • Dimitris Papathanasiou and
  • Ioannis Filippopoulos

In the evolving landscape of green shipping, the accurate estimation of shaft power is critical for reducing fuel consumption and greenhouse gas emissions. This study presents an explainable machine learning framework for shaft power prediction, util...

  • Article
  • Open Access
1 Citations
875 Views
14 Pages

The rapid integration of the Internet of Medical Things (IoMT) into healthcare systems raises urgent demands for secure communication mechanisms capable of protecting sensitive patient data. Quantum key agreement (QKA), a collaborative approach to ke...

  • Article
  • Open Access
8 Citations
5,616 Views
30 Pages

Healthcare systems are increasingly vulnerable to security threats due to their reliance on digital platforms. Traditional access control models like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) have limitations in mitig...

  • Article
  • Open Access
6 Citations
1,376 Views
30 Pages

Virtual machine (VM) placement in cloud datacenters is a complex multi-objective challenge involving trade-offs among energy efficiency, carbon emissions, and network performance. This paper proposes NCRA-DP-ACO (Network-, Cost-, and Renewable-Aware...

  • Article
  • Open Access
1 Citations
1,038 Views
24 Pages

Identifying the source camera of a digital image is a critical task for ensuring image authenticity. In this paper, we propose a novel privacy-preserving distributed source camera identification scheme that jointly exploits both physical-layer finger...

  • Systematic Review
  • Open Access
2 Citations
3,265 Views
36 Pages

A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy

  • Pilleriin Lillemets,
  • Nabaa Bashir Jawad,
  • Joseph Kashi,
  • Ahmad Sabah and
  • Nicola Dragoni

Cyber ranges have become essential platforms for realistic cybersecurity training, research, and development. Existing taxonomies often describe the functional aspects of cyber ranges—scenario design, team configurations, and evaluation metrics...

  • Article
  • Open Access
8 Citations
2,571 Views
36 Pages

Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments

  • Pardis Sadatian Moghaddam,
  • Ali Vaziri,
  • Sarvenaz Sadat Khatami,
  • Francisco Hernando-Gallego and
  • Diego Martín

Intrusion detection in the Internet of Things (IoT) environments is increasingly critical due to the rapid proliferation of connected devices and the growing sophistication of cyber threats. Traditional detection methods often fall short in identifyi...

  • Review
  • Open Access
8 Citations
5,014 Views
23 Pages

Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI

  • Leandro Antonio Pazmiño Ortiz,
  • Ivonne Fernanda Maldonado Soliz and
  • Vanessa Katherine Guevara Balarezo

Resource-constrained devices, including low-power Internet of Things (IoT) nodes, microcontrollers, and edge computing platforms, have increasingly become the focal point for deploying on-device intelligence. By integrating artificial intelligence (A...

  • Article
  • Open Access
2 Citations
963 Views
21 Pages

Building Equi-Width Histograms on Homomorphically Encrypted Data

  • Dragoș Lazea,
  • Anca Hangan and
  • Tudor Cioara

Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. However, traditional histogram-based methods require access to raw data, raising privacy concerns, particularly...

  • Article
  • Open Access
958 Views
20 Pages

With the continuous development of the Internet of Things (IoT) and communication technologies, the demand for low latency in practical applications is becoming increasingly significant. Mobile edge computing, as a promising computational model, is r...

  • Article
  • Open Access
2 Citations
2,172 Views
29 Pages

Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8

  • Momotaz Begum,
  • Abm Kamrul Islam Riad,
  • Abdullah Al Mamun,
  • Thofazzol Hossen,
  • Salah Uddin,
  • Md Nurul Absur and
  • Hossain Shahriar

Uneven roads pose significant challenges to vehicle stability, passenger comfort, and safety, especially in snowy and mountainous regions. These problems are often complex and challenging to resolve with traditional detection and stabilization method...

  • Article
  • Open Access
883 Views
18 Pages

Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT

  • Haixu Niu,
  • Yonghai Li,
  • Shuaixin Hou,
  • Tianfei Chen,
  • Lijun Sun,
  • Mingyang Gu and
  • Muhammad Irsyad Abdullah

Node localization is a critical challenge in Internet of Things (IoT) applications. The DV-Hop algorithm, which relies on hop counts for localization, assumes that network nodes are uniformly distributed. It estimates actual distances between nodes b...

  • Review
  • Open Access
6 Citations
10,653 Views
37 Pages

The synthesis of large language models (LLMs) and recommender systems has been a game-changer in tailored content onslaught with applications ranging from e-commerce, social media, and education to health care. This survey covers the usage of LLMs fo...

  • Article
  • Open Access
1,054 Views
25 Pages

Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine

  • Rene Francisco Santana-Cruz,
  • Martin Moreno,
  • Daniel Aguilar-Torres,
  • Román Arturo Valverde-Domínguez and
  • Rubén Vázquez-Medina

Device identification based on radio frequency fingerprinting is widely used to improve the security of Internet of Things systems. However, noise and acquisition inconsistencies in raw radio frequency signals can affect the effectiveness of classifi...

  • Article
  • Open Access
2 Citations
1,601 Views
23 Pages

To combat the growing danger of zero-day attacks on IoT networks, this study introduces a Cluster-Based Classification (CBC) method. Security vulnerabilities have become more apparent with the growth of IoT devices, calling for new approaches to iden...

  • Review
  • Open Access
3 Citations
3,503 Views
54 Pages

Perspectives and Research Challenges in Wireless Communications Hardware for the Future Internet and Its Applications Services

  • Dimitrios G. Arnaoutoglou,
  • Tzichat M. Empliouk,
  • Theodoros N. F. Kaifas,
  • Constantinos L. Zekios and
  • George A. Kyriacou

The transition from 5G to 6G wireless systems introduces new challenges at the physical layer, including the need for higher frequency operations, massive MIMO deployment, advanced beamforming techniques, and sustainable energy harvesting mechanisms....

  • Article
  • Open Access
1,111 Views
31 Pages

Peer-to-peer overlays define an approach to operating data management platforms, which are robust against censorship attempts from countries or large enterprises. The robustness of such overlays is endangered in the presence of national Internet isol...

  • Article
  • Open Access
1,546 Views
27 Pages

Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection

  • Sangita Baruah,
  • Vaskar Deka,
  • Dulumani Das,
  • Utpal Barman and
  • Manob Jyoti Saikia

With the growing prevalence of cybercrime, botnets have emerged as a significant threat, infiltrating an increasing number of legitimate computers annually. Challenges arising for organizations, educational institutions, and individuals as a result o...

  • Article
  • Open Access
8 Citations
2,702 Views
22 Pages

The growing deployment of the Internet of Things (IoT) across various sectors introduces significant security and privacy challenges. Although numerous individual solutions exist, comprehensive frameworks that effectively combine advanced technologie...

  • Article
  • Open Access
1 Citations
1,917 Views
27 Pages

Data integration (DI) and semantic interoperability (SI) are critical in healthcare, enabling seamless, patient-centric data sharing across systems to meet the demand for instant, unambiguous access to health information. Federated information system...

  • Article
  • Open Access
2 Citations
1,928 Views
18 Pages

A federated learning (FL) framework for cloud–edge–client collaboration performs local aggregation of model parameters through edges, reducing communication overhead from clients to the cloud. This framework is particularly suitable for I...

  • Article
  • Open Access
5 Citations
2,016 Views
27 Pages

A Robust Conformal Framework for IoT-Based Predictive Maintenance

  • Alberto Moccardi,
  • Claudia Conte,
  • Rajib Chandra Ghosh and
  • Francesco Moscato

This study, set within the vast and varied research field of industrial Internet of Things (IoT) systems, proposes a methodology to address uncertainty quantification (UQ) issues in predictive maintenance (PdM) practices. At its core, this paper leve...

  • Review
  • Open Access
1 Citations
4,128 Views
22 Pages

Remote Direct Memory Access (RDMA) has been widely implemented in data centers (DCs) due to its high-bandwidth, low-latency, and low-overhead characteristics. In recent years, as various applications relying on inter-DC interconnection have continuou...

  • Article
  • Open Access
3,163 Views
26 Pages

Enhancing Customer Quality of Experience Through Omnichannel Digital Strategies: Evidence from a Service Environment in an Emerging Context

  • Fabricio Miguel Moreno-Menéndez,
  • Victoriano Eusebio Zacarías-Rodríguez,
  • Sara Ricardina Zacarías-Vallejos,
  • Vicente González-Prida,
  • Pedro Emil Torres-Quillatupa,
  • Hilario Romero-Girón,
  • José Francisco Vía y Rada-Vittes and
  • Luis Ángel Huaynate-Espejo

The proliferation of digital platforms and interactive technologies has transformed the way service providers engage with their customers, particularly in emerging economies, where digital inclusion is an ongoing process. This study explores the rela...

  • Article
  • Open Access
1,251 Views
21 Pages

Data corruption, including missing and noisy entries, is a common challenge in real-world machine learning. This paper examines its impact and mitigation strategies through two experimental setups: supervised NLP tasks (NLP-SL) and deep reinforcement...

  • Article
  • Open Access
1,453 Views
17 Pages

Multi Stage Retrieval for Web Search During Crisis

  • Claudiu Constantin Tcaciuc,
  • Daniele Rege Cambrin and
  • Paolo Garza

During crisis events, digital information volume can increase by over 500% within hours, with social media platforms alone generating millions of crisis-related posts. This volume creates critical challenges for emergency responders who require timel...

  • Systematic Review
  • Open Access
1,510 Views
17 Pages

Smart home devices and home automation systems, which control features such as lights, blinds, heaters, door locks, cameras, and speakers, have become increasingly popular and can be found in homes worldwide. Central to these systems are smart home h...

  • Article
  • Open Access
2 Citations
1,513 Views
29 Pages

The variations in the atmospheric refractivity in the lower atmosphere create a natural phenomenon known as atmospheric ducts. The atmospheric ducts allow radio signals to travel long distances. This can adversely affect telecommunication systems, as...

  • Article
  • Open Access
986 Views
12 Pages

Position Accuracy and Distributed Beamforming Performance in WSNs: A Simulation Study

  • José Casca,
  • Prabhat Gupta,
  • Marco Gomes,
  • Vitor Silva and
  • Rui Dinis

This work investigates the performance of distributed beamforming in Wireless Sensor Networks (WSNs), focusing on the impact of node position errors. A comprehensive simulation testbed was developed to assess how varying network topologies and positi...

  • Article
  • Open Access
2,708 Views
24 Pages

LLM Performance in Low-Resource Languages: Selecting an Optimal Model for Migrant Integration Support in Greek

  • Alexandros Tassios,
  • Stergios Tegos,
  • Christos Bouas,
  • Konstantinos Manousaridis,
  • Maria Papoutsoglou,
  • Maria Kaltsa,
  • Eleni Dimopoulou,
  • Thanassis Mavropoulos,
  • Stefanos Vrochidis and
  • Georgios Meditskos

The integration of Large Language Models (LLMs) in chatbot applications gains momentum. However, to successfully deploy such systems, the underlying capabilities of LLMs must be carefully considered, especially when dealing with low-resource language...

  • Article
  • Open Access
12 Citations
5,727 Views
23 Pages

Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP

  • Kazi Fatema,
  • Samrat Kumar Dey,
  • Mehrin Anannya,
  • Risala Tasin Khan,
  • Mohammad Mamunur Rashid,
  • Chunhua Su and
  • Rashed Mazumder

An intrusion detection system (IDS) is a crucial element in cyber security concerns. IDS is a safeguarding module that is designed to identify unauthorized activities in network environments. The importance of constructing IDSs has never been this si...

  • Article
  • Open Access
9 Citations
5,294 Views
60 Pages

The Open Radio Access Network (O-RAN) paradigm promises unprecedented flexibility and cost efficiency for 6G networks but introduces critical security risks due to its disaggregated, AI-driven architecture. This paper proposes a secure optimization f...

  • Article
  • Open Access
2 Citations
735 Views
20 Pages

In this paper, we propose a grouping-based dynamic routing, core, and spectrum allocation (RCSA) method for preventing spectrum fragmentation and inter-core crosstalk in elastic optical path networks based on multi-core fiber environments. Multi-core...

  • Article
  • Open Access
5 Citations
3,424 Views
21 Pages

In the digital age, climate change content on social media is frequently distorted by misinformation, driven by unrestricted content sharing and monetization incentives. This paper proposes a novel AI-based framework to evaluate the data quality of c...

  • Article
  • Open Access
6 Citations
2,285 Views
21 Pages

The rapid expansion of the Internet of Things (IoT) and industrial Internet of Things (IIoT) ecosystems has introduced new security challenges, particularly the need for robust intrusion detection systems (IDSs) capable of adapting to increasingly so...

  • Article
  • Open Access
1,550 Views
32 Pages

Optimization of Ground Station Energy Saving in LEO Satellite Constellations for Earth Observation Applications

  • Francesco Valente,
  • Francesco Giacinto Lavacca,
  • Marco Polverini,
  • Tiziana Fiori and
  • Vincenzo Eramo

Orbital Edge Computing (OEC) capability on board satellites in Earth Observation (EO) constellations would surely enable a more effective usage of bandwidth, since the possibility to process images on board enables extracting and sending only useful...

  • Article
  • Open Access
4 Citations
10,311 Views
20 Pages

Analysis of Digital Skills and Infrastructure in EU Countries Based on DESI 2024 Data

  • Kvitoslava Obelovska,
  • Andrii Abziatov,
  • Anastasiya Doroshenko,
  • Ivanna Dronyuk,
  • Oleh Liskevych and
  • Rostyslav Liskevych

This paper presents an analysis of digital skills and network infrastructure in the European Union (EU) countries based on data from the Digital Economy and Society Index (DESI) 2024. We analyze the current state of digital skills and network infrast...

XFacebookLinkedIn
Future Internet - ISSN 1999-5903