Skip to Content

Future Internet, Volume 9, Issue 3

2017 September - 31 articles

Cover Story: The Internet of Things (IoT) is a recent trend that extends the boundaries of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center since much of the collected information will be exposed to a wide and often unknown audience. Some of the problems are due to the intrinsic characteristics of the IoT, while others arise as a result of the integration of the IoT and the Internet. Various adversaries may come in at different points to attack IoT systems.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (31)

  • Article
  • Open Access
31 Citations
9,958 Views
17 Pages

20 September 2017

As electronic government services (e-government) evolve, traditional applications such as online portals are encountering challenges in a new digital era in which people thirst for more convenient, diverse channels of communication with their governm...

  • Article
  • Open Access
20 Citations
8,638 Views
20 Pages

Design for Children’s Playful Learning with Robots

  • Maria Luce Lupetti,
  • Yuan Yao,
  • Haipeng Mi and
  • Claudio Germak

18 September 2017

This article presents an investigation of the implications of designing for children’s playful learning with robots. This study was carried out by adopting a Research through Design approach that resulted in the development of a novel low-anthropomor...

  • Article
  • Open Access
44 Citations
9,880 Views
13 Pages

12 September 2017

The Jump Point Search (JPS) algorithm is adopted for local path planning of the driverless car under urban environment, and it is a fast search method applied in path planning. Firstly, a vector Geographic Information System (GIS) map, including Glob...

  • Article
  • Open Access
2 Citations
5,681 Views
14 Pages

ARAAC: A Rational Allocation Approach in Cloud Data Center Networks

  • Ahmad Nahar Quttoum,
  • Ayoub Alsarhan and
  • Abidalrahman Moh’d

6 September 2017

The expansion of telecommunication technologies touches almost all aspects life that we are living nowadays. Indeed, such technologies have emerged as a fourth essential utility alongside the traditional utilities of electricity, water, and gas. In t...

  • Article
  • Open Access
21 Citations
7,940 Views
15 Pages

16 August 2017

This research combines between two different manufacturing concepts. On the one hand, flow shop scheduling is a well-known problem in production systems. The problem appears when a group of jobs shares the same processing sequence on two or more mach...

  • Article
  • Open Access
13 Citations
7,059 Views
21 Pages

Cost-Aware IoT Extension of DISSECT-CF

  • Andras Markus,
  • Attila Kertesz and
  • Gabor Kecskemeti

14 August 2017

In the age of the Internet of Things (IoT), more and more sensors, actuators and smart devices get connected to the network. Application providers often combine this connectivity with novel scenarios involving cloud computing. Before implementing cha...

  • Article
  • Open Access
2 Citations
7,136 Views
9 Pages

The Internet of Things (IoTs) will change the requirements for wireless connectivity significantly, mainly with regard to service coverage, data rate, and energy efficiency. Therefore, to improve robustness and reliability, WiFi-enabled IoT devices h...

  • Article
  • Open Access
54 Citations
7,472 Views
16 Pages

With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most...

  • Article
  • Open Access
37 Citations
6,832 Views
20 Pages

Multicell Interference Management in Device to Device Underlay Cellular Networks

  • Georgios Katsinis,
  • Eirini Eleni Tsiropoulou and
  • Symeon Papavassiliou

In this paper, the problem of interference mitigation in a multicell Device to Device (D2D) underlay cellular network is addressed. In this type of network architectures, cellular users and D2D users share common Resource Blocks (RBs). Though such pa...

  • Article
  • Open Access
51 Citations
12,361 Views
19 Pages

Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Deni...

  • Article
  • Open Access
9 Citations
7,517 Views
17 Pages

A Multimodal Perception Framework for Users Emotional State Assessment in Social Robotics

  • Lorenzo Cominelli,
  • Nicola Carbonaro,
  • Daniele Mazzei,
  • Roberto Garofalo,
  • Alessandro Tognetti and
  • Danilo De Rossi

In this work, we present an unobtrusive and non-invasive perception framework based on the synergy between two main acquisition systems: the Touch-Me Pad, consisting of two electronic patches for physiological signal extraction and processing; and th...

  • Article
  • Open Access
20 Citations
6,994 Views
15 Pages

A quality evaluation method is an important means and the main basis on which to evaluate the college English classroom teaching quality of teachers. To overcome the one-sided subjectivity and resulting imprecision of the traditional classroom teachi...

  • Article
  • Open Access
9 Citations
6,315 Views
13 Pages

As Augmented Reality (AR) applications become commonplace, the determination of a device operator’s subjective Quality of Experience (QoE) in addition to objective Quality of Service (QoS) metrics gains importance. Human subject experimentation is co...

  • Article
  • Open Access
4 Citations
44,827 Views
18 Pages

Azure-Based Smart Monitoring System for Anemia-Like Pallor

  • Sohini Roychowdhury,
  • Paul Hage and
  • Joseph Vasquez

Increasing costs of diagnostic healthcare have necessitated the development of hardware independent non-invasive Point of Care (POC) systems. Although anemia prevalence rates in global populations vary between 10% and 60% in various demographic group...

  • Article
  • Open Access
3 Citations
5,730 Views
9 Pages

The wireless local area network (WLAN) is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs). However, WLAN’s inefficiency in terms of complexity and relatively large...

  • Article
  • Open Access
27 Citations
7,804 Views
13 Pages

A Novel Hybrid-Copy Algorithm for Live Migration of Virtual Machine

  • Zhou Lei,
  • Exiong Sun,
  • Shengbo Chen,
  • Jiang Wu and
  • Wenfeng Shen

Live migration of virtual machines is an important approach for dynamic resource scheduling in cloud environment. The hybrid-copy algorithm is an excellent algorithm that combines the pre-copy algorithm with the post-copy algorithm to remedy the defe...

  • Article
  • Open Access
4 Citations
5,464 Views
13 Pages

An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings

  • Ruchdee Binmad,
  • Mingchu Li,
  • Zhen Wang,
  • Nakema Deonauth and
  • Chettupally Anil Carie

The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Tru...

  • Article
  • Open Access
7 Citations
8,687 Views
18 Pages

Self-Organization is a spontaneous trend which exists in nature among different organisms. Self-organization refers to the process where some form of an overall order arises in a group due to the local interaction among the members of this group. In...

  • Article
  • Open Access
20 Citations
6,721 Views
16 Pages

Robust Image Embedded Watermarking Using DCT and Listless SPIHT

  • J. L. Divya Shivani and
  • Ranjan K. Senapati

This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inve...

  • Article
  • Open Access
9 Citations
5,951 Views
16 Pages

User Modelling Validation over the Security Awareness of Digital Natives

  • Vasileios Gkioulos,
  • Gaute Wangen and
  • Sokratis K. Katsikas

Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pl...

  • Article
  • Open Access
43 Citations
11,124 Views
16 Pages

The impact of the world-wide ageing population has commenced with respect to society in developed countries. Several researchers focused on exploring new methods to improve the quality of life of elderly individuals by allowing them to remain indepen...

  • Article
  • Open Access
38 Citations
10,110 Views
14 Pages

NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems

  • Leonardo Militano,
  • Antonino Orsino,
  • Giuseppe Araniti and
  • Antonio Iera

Future fifth-generation (5G) cellular systems are set to give a strong boost to the large-scale deployment of Internet of things (IoT). In the view of a future converged 5G-IoT infrastructure, cellular IoT solutions such as narrowband IoT (NB-IoT) an...

  • Article
  • Open Access
10 Citations
9,073 Views
25 Pages

Deducing Energy Consumer Behavior from Smart Meter Data

  • Emad Ebeid,
  • Rune Heick and
  • Rune Hylsberg Jacobsen

The ongoing upgrade of electricity meters to smart ones has opened a new market of intelligent services to analyze the recorded meter data. This paper introduces an open architecture and a unified framework for deducing user behavior from its smart m...

  • Article
  • Open Access
20 Citations
11,640 Views
16 Pages

Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things

  • Ashish Rauniyar,
  • Mohammad Irfan,
  • Oka Danil Saputra,
  • Jin Woo Kim,
  • Ah Ra Lee,
  • Jae Min Jang and
  • Soo Young Shin

In this paper, real-time monitoring of multiple lead-acid batteries based on Internet of things is proposed and evaluated. Our proposed system monitors and stores parameters that provide an indication of the lead acid battery’s acid level, state of c...

  • Article
  • Open Access
115 Citations
15,093 Views
28 Pages

A Security Framework for the Internet of Things in the Future Internet Architecture

  • Xiruo Liu,
  • Meiyuan Zhao,
  • Sugang Li,
  • Feixiong Zhang and
  • Wade Trappe

The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being fron...

  • Article
  • Open Access
18 Citations
7,496 Views
21 Pages

Cryptographic Key Management in Delay Tolerant Networks: A Survey

  • Sofia Anna Menesidou,
  • Vasilios Katos and
  • Georgios Kambourakis

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this contex...

  • Article
  • Open Access
256 Citations
36,016 Views
20 Pages

Banking on Blockchain: Costs Savings Thanks to the Blockchain Technology

  • Luisanna Cocco,
  • Andrea Pinna and
  • Michele Marchesi

This paper looks at the challenges and opportunities of implementing blockchain technology across banking, providing food for thought about the potentialities of this disruptive technology. The blockchain technology can optimize the global financial...

  • Article
  • Open Access
5 Citations
6,019 Views
10 Pages

We propose a novel fast iterative thresholding algorithm for image compressive sampling (CS) recovery using three existing denoisers—i.e., TV (total variation), wavelet, and BM3D (block-matching and 3D filtering) denoisers. Through the use of the rec...

  • Article
  • Open Access
31 Citations
9,244 Views
13 Pages

Security Enhancement for Data Migration in the Cloud

  • Jean Raphael Ngnie Sighom,
  • Pin Zhang and
  • Lin You

In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903