Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 8

2025 August - 58 articles

Cover Story: Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that emphasizes content names rather than host addresses for communication. Interest Flooding Attacks (IFAs) exploit the Pending Interest Table (PIT) by injecting malicious Interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks. We examine detection and mitigation strategies from 2013 to 2024 to provide current insights into this evolving security challenge. This survey establishes a taxonomy of attack variants, extends to domain-specific implementations in resource-constrained environments, examines adaptations for Internet of Things (IoT) and high-mobility vehicular scenarios, and highlights five critical research directions. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (58)

  • Article
  • Open Access
1 Citations
729 Views
21 Pages

21 August 2025

In the context of secure and efficient data transmission over the future Internet, particularly for remote sensing and geospatial applications, reversible data hiding (RDH) in encrypted hyperspectral images (HSIs) has emerged as a critical technology...

  • Article
  • Open Access
1,308 Views
30 Pages

21 August 2025

With the widespread application of Internet of Things (IoT) devices, the security of embedded systems faces severe challenges. As an embedded operating system widely used in critical mission scenarios, the security of the TCP stack in VxWorks directl...

  • Systematic Review
  • Open Access
1,111 Views
33 Pages

19 August 2025

This umbrella review aimed to identify, analyze, and synthesize the results of existing literature reviews related to patient-oriented smart applications to support healthcare provision for patients with Parkinson’s. An electronic search was co...

  • Systematic Review
  • Open Access
4 Citations
5,350 Views
34 Pages

18 August 2025

Anomaly detection plays an increasingly important role in maintaining the stability and reliability of modern distributed systems. Federated Learning (FL) is an emerging method that shows strong potential in enabling anomaly detection across decentra...

  • Article
  • Open Access
1 Citations
1,324 Views
39 Pages

Efficient Charging Station Selection for Minimizing Total Travel Time of Electric Vehicles

  • Yaqoob Al-Zuhairi,
  • Prashanth Kannan,
  • Alberto Bazán Guillén,
  • Luis J. de la Cruz Llopis and
  • Mónica Aguilar Igartua

18 August 2025

Electric vehicles (EVs) have gained significant attention in recent decades for their environmental benefits. However, their widespread adoption poses challenges due to limited charging infrastructure and long charging times, often resulting in under...

  • Article
  • Open Access
865 Views
13 Pages

Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations

  • Yonit Rusho,
  • Daphne Ruth Raban,
  • Michal Chalamish and
  • Vered Pnueli

18 August 2025

This study examines the influence of software agents on information-sharing behavior within security-sensitive organizations, where confidentiality and hierarchical culture often limit the flow of knowledge. While such organizations aim to collect, a...

  • Article
  • Open Access
1,551 Views
29 Pages

A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks

  • Max Hashem Eiza,
  • Brian Akwirry,
  • Alessandro Raschella,
  • Michael Mackay and
  • Mukesh Kumar Maheshwari

18 August 2025

The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-ven...

  • Article
  • Open Access
1,407 Views
24 Pages

Unsupervised Person Re-Identification via Deep Attribute Learning

  • Shun Zhang,
  • Yaohui Xu,
  • Xuebin Zhang,
  • Boyang Cheng and
  • Ke Wang

15 August 2025

Driven by growing public security demands and the advancement of intelligent surveillance systems, person re-identification (ReID) has emerged as a prominent research focus in the field of computer vision. However, this task presents challenges due t...

  • Article
  • Open Access
1 Citations
1,139 Views
17 Pages

15 August 2025

The increasing demand for accessible and efficient machine learning solutions has led to the development of the Adaptive Learning Framework (ALF) for multi-class, single-label image classification. Unlike existing low-code tools, ALF integrates multi...

  • Article
  • Open Access
2 Citations
861 Views
17 Pages

14 August 2025

To address the issues of high energy consumption, data collisions, and invalid wake-ups of nontarget nodes in large-scale node-deployment scenarios of long-range (LoRa) star networks, this paper proposes an energy-saving wake-up scheme that combines...

of 6

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903