Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 18, Issue 1

2026 January - 66 articles

Cover Story: Modern data management introduces significant challenges for current systems, specifically regarding limited scalability, data quality, and the integration of distributed sources. Structured P2P overlays are positioned to address these limits by (i) ensuring massive scalability while maintaining node autonomy, and (ii) facilitating data querying and (iii) integration through efficient lookup mechanisms. Consequently, this work combines P2P overlays with graph databases to leverage efficient scaling and flexible data models, thereby enhancing data quality. Data integration is further facilitated by a novel querying strategy that ensures query propagation and tracking across the overlay. This mechanism allows for precise control over the total time spent querying, the volume of data retrieved, and the number of peers reached. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (66)

  • Article
  • Open Access
176 Views
36 Pages

21 January 2026

This paper introduces a cybersecurity framework that combines a deception-based ransomware detection system, called the Intrusion and Ransomware Detection System for Cloud (IRDS4C), with a blockchain-enabled Cyber Threat Intelligence platform (CTIB)....

  • Article
  • Open Access
100 Views
22 Pages

21 January 2026

Mobile crowdsensing (MCS) is an emerging paradigm that enables cost-effective, large-scale, and participatory data collection through mobile devices. However, the open nature of MCS raises significant privacy and trust challenges. Existing reputation...

  • Article
  • Open Access
181 Views
30 Pages

21 January 2026

Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework th...

  • Review
  • Open Access
313 Views
37 Pages

Synthetizing 6G KPIs for Diverse Future Use Cases: A Comprehensive Review of Emerging Standards, Technologies, and Societal Needs

  • Shujat Ali,
  • Asma Abu-Samah,
  • Mohammed H. Alsharif,
  • Rosdiadee Nordin,
  • Nauman Saqib,
  • Mohammed Sani Adam,
  • Umawathy Techanamurthy,
  • Manzareen Mustafa and
  • Nor Fadzilah Abdullah

21 January 2026

The anticipated transition from 5G to 6G is driven not by incremental performance demands but by a widening mismatch between emerging application requirements and the capabilities of existing cellular systems. Despite rapid progress across 3GPP Relea...

  • Article
  • Open Access
152 Views
24 Pages

21 January 2026

The Transport Layer Security (TLS) protocol is widely used nowadays to create secure communications over TCP/IP networks. Its purpose is to ensure confidentiality, authentication, and data integrity for messages exchanged between two endpoints. In or...

  • Article
  • Open Access
115 Views
32 Pages

Adaptive Assistive Technologies for Learning Mexican Sign Language: Design of a Mobile Application with Computer Vision and Personalized Educational Interaction

  • Carlos Hurtado-Sánchez,
  • Ricardo Rosales Cisneros,
  • José Ricardo Cárdenas-Valdez,
  • Andrés Calvillo-Téllez and
  • Everardo Inzunza-Gonzalez

21 January 2026

Integrating people with hearing disabilities into schools is one of the biggest problems that Latin American societies face. Mexican Sign Language (MSL) is the main language and culture of the deaf community in Mexico. However, its use in formal educ...

  • Article
  • Open Access
167 Views
17 Pages

Unsupervised Detection of SOC Spoofing in OCPP 2.0.1 EV Charging Communication Protocol Using One-Class SVM

  • Aisha B. Rahman,
  • Md Sadman Siraj,
  • Eirini Eleni Tsiropoulou,
  • Georgios Fragkos,
  • Ryan Sullivant,
  • Yung Ryn Choe,
  • Jhaell Jimenez,
  • Junghwan Rhee and
  • Kyu Hyung Lee

21 January 2026

The electric vehicles (EVs) market keeps growing globally; thus, it is critical to secure the EV charging communication protocols in order to guarantee reliable and fair charging operations among the customers. The Open Charge Point Protocol (OCPP) 2...

  • Article
  • Open Access
132 Views
25 Pages

Edge-Enhanced YOLOV8 for Spacecraft Instance Segmentation in Cloud-Edge IoT Environments

  • Ming Chen,
  • Wenjie Chen,
  • Yanfei Niu,
  • Ping Qi and
  • Fucheng Wang

20 January 2026

The proliferation of smart devices and the Internet of Things (IoT) has led to massive data generation, particularly in complex domains such as aerospace. Cloud computing provides essential scalability and advanced analytics for processing these vast...

  • Article
  • Open Access
116 Views
22 Pages

20 January 2026

Container-based cloud platforms enable flexible and lightweight application deployment, yet container scheduling remains challenged by resource fragmentation, load imbalance, excessive energy consumption, and service-level agreement (SLA) violations....

  • Article
  • Open Access
144 Views
26 Pages

Performance Evaluation of MongoDB and RavenDB in IIoT-Inspired Data-Intensive Mobile and Web Applications

  • Mădălina Ciumac,
  • Cornelia Aurora Győrödi,
  • Robert Ștefan Győrödi and
  • Felicia Mirabela Costea

20 January 2026

The exponential growth of data generated by modern digital applications, including systems inspired by Industrial Internet of Things (IIoT) requirements, has accelerated the adoption of NoSQL databases due to their scalability, flexibility, and perfo...

of 7

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903