You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 17, Issue 6

June 2025 - 42 articles

Cover Story: Intrusion detection in the Internet of Things (IoT) environments is increasingly critical due to the rapid proliferation of connected devices and the growing sophistication of cyber threats. Traditional detection methods often fall short in identifying multi-class attacks. This paper proposes a novel hybrid intrusion detection framework that integrates transformer networks with generative adversarial networks (GANs), aiming to enhance both detection accuracy and robustness. Experimental results show that our hybrid framework consistently outperforms baseline methods, in both binary and multi-class intrusion detection tasks. The superiority of the proposed model was further validated through statistically significant t-test results, indicating both efficiency and stability. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Systematic Review
  • Open Access
1,637 Views
36 Pages

A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy

  • Pilleriin Lillemets,
  • Nabaa Bashir Jawad,
  • Joseph Kashi,
  • Ahmad Sabah and
  • Nicola Dragoni

Cyber ranges have become essential platforms for realistic cybersecurity training, research, and development. Existing taxonomies often describe the functional aspects of cyber ranges—scenario design, team configurations, and evaluation metrics...

  • Article
  • Open Access
5 Citations
1,470 Views
36 Pages

Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments

  • Pardis Sadatian Moghaddam,
  • Ali Vaziri,
  • Sarvenaz Sadat Khatami,
  • Francisco Hernando-Gallego and
  • Diego Martín

Intrusion detection in the Internet of Things (IoT) environments is increasingly critical due to the rapid proliferation of connected devices and the growing sophistication of cyber threats. Traditional detection methods often fall short in identifyi...

  • Review
  • Open Access
1 Citations
3,245 Views
23 Pages

Advancing TinyML in IoT: A Holistic System-Level Perspective for Resource-Constrained AI

  • Leandro Antonio Pazmiño Ortiz,
  • Ivonne Fernanda Maldonado Soliz and
  • Vanessa Katherine Guevara Balarezo

Resource-constrained devices, including low-power Internet of Things (IoT) nodes, microcontrollers, and edge computing platforms, have increasingly become the focal point for deploying on-device intelligence. By integrating artificial intelligence (A...

  • Article
  • Open Access
1 Citations
621 Views
21 Pages

Building Equi-Width Histograms on Homomorphically Encrypted Data

  • Dragoș Lazea,
  • Anca Hangan and
  • Tudor Cioara

Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. However, traditional histogram-based methods require access to raw data, raising privacy concerns, particularly...

  • Article
  • Open Access
591 Views
20 Pages

With the continuous development of the Internet of Things (IoT) and communication technologies, the demand for low latency in practical applications is becoming increasingly significant. Mobile edge computing, as a promising computational model, is r...

  • Article
  • Open Access
1,443 Views
29 Pages

Internet of Things (IoT)-Based Solutions for Uneven Roads and Balanced Vehicle Systems Using YOLOv8

  • Momotaz Begum,
  • Abm Kamrul Islam Riad,
  • Abdullah Al Mamun,
  • Thofazzol Hossen,
  • Salah Uddin,
  • Md Nurul Absur and
  • Hossain Shahriar

Uneven roads pose significant challenges to vehicle stability, passenger comfort, and safety, especially in snowy and mountainous regions. These problems are often complex and challenging to resolve with traditional detection and stabilization method...

  • Article
  • Open Access
577 Views
18 Pages

Topology-Aware Anchor Node Selection Optimization for Enhanced DV-Hop Localization in IoT

  • Haixu Niu,
  • Yonghai Li,
  • Shuaixin Hou,
  • Tianfei Chen,
  • Lijun Sun,
  • Mingyang Gu and
  • Muhammad Irsyad Abdullah

Node localization is a critical challenge in Internet of Things (IoT) applications. The DV-Hop algorithm, which relies on hop counts for localization, assumes that network nodes are uniformly distributed. It estimates actual distances between nodes b...

  • Review
  • Open Access
5,772 Views
37 Pages

The synthesis of large language models (LLMs) and recommender systems has been a game-changer in tailored content onslaught with applications ranging from e-commerce, social media, and education to health care. This survey covers the usage of LLMs fo...

  • Article
  • Open Access
631 Views
25 Pages

Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine

  • Rene Francisco Santana-Cruz,
  • Martin Moreno,
  • Daniel Aguilar-Torres,
  • Román Arturo Valverde-Domínguez and
  • Rubén Vázquez-Medina

Device identification based on radio frequency fingerprinting is widely used to improve the security of Internet of Things systems. However, noise and acquisition inconsistencies in raw radio frequency signals can affect the effectiveness of classifi...

  • Article
  • Open Access
961 Views
23 Pages

To combat the growing danger of zero-day attacks on IoT networks, this study introduces a Cluster-Based Classification (CBC) method. Security vulnerabilities have become more apparent with the growth of IoT devices, calling for new approaches to iden...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903Creative Common CC BY license