Special Issue "10th Anniversary Feature Papers"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: 31 March 2019

Special Issue Editor

Guest Editor
Prof. Dr. Dino Giuli

Department of Information Engineering (DINFO), University of Florence, Via Santa Marta, 3, 50139 Florence, Italy
Website | E-Mail
Interests: information society; smart cities; e-government; e-mobility; smart mission critical systems; remote-sensing systems

Special Issue Information

Dear Colleagues,

The proposed subject of this Special Issue is “Smart Systems and Smart Living”. Basic topics are human and social factors (also including environmental ones), all related to smart systems and their applications as increasingly impacting quality of life. A focus is jointly promoted on Internet-of-Things and cyber-physical systems, specifically their impact on quality of life in Smart City contexts.

Prof. Dr. Dino Giuli
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (27 papers)

View options order results:
result details:
Displaying articles 1-27
Export citation of selected articles as:

Research

Jump to: Review, Other

Open AccessArticle Software-Defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges
Future Internet 2019, 11(3), 70; https://doi.org/10.3390/fi11030070
Received: 3 January 2019 / Revised: 27 February 2019 / Accepted: 7 March 2019 / Published: 11 March 2019
PDF Full-text (1192 KB) | HTML Full-text | XML Full-text
Abstract
The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous vehicles. Today, vehicles communicate wirelessly with other vehicles and vulnerable [...] Read more.
The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous vehicles. Today, vehicles communicate wirelessly with other vehicles and vulnerable pedestrians in their immediate vicinity to share timely safety-critical information primarily for collision mitigation. Furthermore, vehicles connect with the traffic management entities via their supporting network infrastructure to become more aware of any potential hazards on the roads and for guidance pertinent to their current and anticipated speeds and travelling course to ensure more efficient traffic flows. Therefore, a secure and low-latency communication is highly indispensable in order to meet the stringent performance requirements of such safety-critical vehicular applications. However, the heterogeneity of diverse radio access technologies and inflexibility in their deployment results in network fragmentation and inefficient resource utilization, and these, therefore, act as bottlenecks in realizing the aims for a highly efficient vehicular networking architecture. In order to overcome such sorts of bottlenecks, this article brings forth the current state-of-the-art in the context of intelligent transportation systems (ITS) and subsequently proposes a software-defined heterogeneous vehicular networking (SDHVNet) architecture for ensuring a highly agile networking infrastructure to ensure rapid network innovation on-demand. Finally, a number of potential architectural challenges and their probable solutions are discussed. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Gamification vs. Privacy: Identifying and Analysing the Major Concerns
Future Internet 2019, 11(3), 67; https://doi.org/10.3390/fi11030067
Received: 29 December 2018 / Revised: 12 February 2019 / Accepted: 27 February 2019 / Published: 7 March 2019
PDF Full-text (1848 KB) | HTML Full-text | XML Full-text
Abstract
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamification techniques are applied, user engagement in [...] Read more.
Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamification techniques are applied, user engagement in applications has increased. In these applications the protection of users’ privacy is an important aspect to consider, due to the applications obtaining a record of the personal information of their users. Thus, the purpose of this paper is to identify if applications where gamification is applied do respect users’ privacy. For the accomplishment of this aim, two main steps have been implemented. Since the main principle of gamification is the existence of game elements, the first step was to identify the set of game elements recorded in the literature that are commonly applied in various applications. Afterwards, an examination of the relationship between these elements and privacy requirements was implemented in order to identify which elements conflict with the privacy requirements leading to potential privacy violations and which elements do not. Α conceptual model according to the results of this examination was designed, which presents how elements conflict with requirements. Based on the results, there are indeed game elements which can lead to privacy violations. The results of this work provide valuable guidance to software developers, especially during the design stages of gamified applications since it helps them to consider the protection of users’ privacy in parallel from the early stages of the application development onwards. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessFeature PaperArticle Cyber Security Threat Modeling for Supply Chain Organizational Environments
Future Internet 2019, 11(3), 63; https://doi.org/10.3390/fi11030063
Received: 26 December 2018 / Revised: 14 February 2019 / Accepted: 21 February 2019 / Published: 5 March 2019
PDF Full-text (1702 KB) | HTML Full-text | XML Full-text
Abstract
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain [...] Read more.
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach
Future Internet 2019, 11(3), 58; https://doi.org/10.3390/fi11030058
Received: 31 December 2018 / Revised: 21 February 2019 / Accepted: 26 February 2019 / Published: 2 March 2019
PDF Full-text (16107 KB) | HTML Full-text | XML Full-text
Abstract
This paper presents IoH (Intelligence of Home), a platform developed to test some basic intelligent behaviors in Home context. Internet of Things, ambient intelligence and context awareness approaches motivated the development of IoH. The platform involves six layers, responsible by connectivity, persistency, unification, [...] Read more.
This paper presents IoH (Intelligence of Home), a platform developed to test some basic intelligent behaviors in Home context. Internet of Things, ambient intelligence and context awareness approaches motivated the development of IoH. The platform involves six layers, responsible by connectivity, persistency, unification, Internet of Things integration, subsystems integration and user interface. The integrated subsystems involve intelligent systems for light control, television brightness control, desk light control, persons counting and air conditioner control. The IoH platform is then tested for a real building, and results and conclusions are obtained. Different intelligent methods and technologies are used, form the use of a diversity of sensors, actuators, and controllers and processing units to a set of artificial intelligence approaches varying from machine learning and optimization algorithms to the use of sensor fusion and computer vision. The use of IoH day-by-day demonstrated an intelligent performance for the real building occupants. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle On the Need for a General REST-Security Framework
Future Internet 2019, 11(3), 56; https://doi.org/10.3390/fi11030056
Received: 19 December 2018 / Revised: 12 February 2019 / Accepted: 14 February 2019 / Published: 27 February 2019
PDF Full-text (1099 KB) | HTML Full-text | XML Full-text
Abstract
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally operated by distinct entities. Due to the latter fact, service [...] Read more.
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally operated by distinct entities. Due to the latter fact, service security has been of importance in such systems ever since. A dominant protocol for implementing SOA-based systems is SOAP, which comes with a well-elaborated security framework. As an alternative to SOAP, the architectural style representational state transfer (REST) is gaining traction as a simple, lightweight and flexible guideline for designing distributed service systems that scale at large. This paper starts by introducing the basic constraints representing REST. Based on these foundations, the focus is afterwards drawn on the security needs of REST-based service systems. The limitations of transport-oriented protection means are emphasized and the demand for specific message-oriented safeguards is assessed. The paper then reviews the current activities in respect to REST-security and finds that the available schemes are mostly HTTP-centered and very heterogeneous. More importantly, all of the analyzed schemes contain vulnerabilities. The paper contributes a methodology on how to establish REST-security as a general security framework for protecting REST-based service systems of any kind by consistent and comprehensive protection means. First adoptions of the introduced approach are presented in relation to REST message authentication with instantiations for REST-ful HTTP (web/cloud services) and REST-ful constraint application protocol (CoAP) (internet of things (IoT) services). Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle A Multi-Agent Architecture for Data Analysis
Future Internet 2019, 11(2), 49; https://doi.org/10.3390/fi11020049
Received: 20 December 2018 / Revised: 11 February 2019 / Accepted: 13 February 2019 / Published: 18 February 2019
PDF Full-text (1652 KB) | HTML Full-text | XML Full-text
Abstract
ActoDatA (Actor Data Analysis) is an actor-based software library for the development of distributed data mining applications. It provides a multi-agent architecture with a set of predefined and configurable agents performing the typical tasks of data mining applications. In particular, its architecture can [...] Read more.
ActoDatA (Actor Data Analysis) is an actor-based software library for the development of distributed data mining applications. It provides a multi-agent architecture with a set of predefined and configurable agents performing the typical tasks of data mining applications. In particular, its architecture can manage different users’ applications; it maintains a high level of execution quality by distributing the agents of the applications on a dynamic set of computational nodes. Moreover, it provides reports about the analysis results and the collected data, which can be accessed through either a web browser or a dedicated mobile APP. After an introduction about the actor model and the software framework used for implementing the software library, this article underlines the main features of ActoDatA and presents its experimentation in some well-known data analysis domains. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Vehicle Politeness in Driving Situations
Future Internet 2019, 11(2), 48; https://doi.org/10.3390/fi11020048
Received: 6 January 2019 / Revised: 12 February 2019 / Accepted: 13 February 2019 / Published: 16 February 2019
PDF Full-text (1215 KB) | HTML Full-text | XML Full-text
Abstract
Future vehicles are becoming more like driving partners instead of mere machines. With the application of advanced information and communication technologies (ICTs), vehicles perform driving tasks while drivers monitor the functioning states of vehicles. This change in interaction requires a deliberate consideration of [...] Read more.
Future vehicles are becoming more like driving partners instead of mere machines. With the application of advanced information and communication technologies (ICTs), vehicles perform driving tasks while drivers monitor the functioning states of vehicles. This change in interaction requires a deliberate consideration of how vehicles should present driving-related information. As a way of encouraging drivers to more readily accept instructions from vehicles, we suggest the use of social rules, such as politeness, in human-vehicle interaction. In a 2 × 2 between-subjects experiment, we test the effects of vehicle politeness (plain vs. polite) on drivers’ interaction experiences in two operation situations (normal vs. failure). The results indicate that vehicle politeness improves interaction experience in normal working situations but impedes the experience in failure situations. Specifically, in normal situations, vehicles with polite instructions are highly evaluated for social presence, politeness, satisfaction and intention to use. Theoretical and practical implications on politeness research and speech interaction design are discussed. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle A Scheme to Design Community Detection Algorithms in Various Networks
Future Internet 2019, 11(2), 41; https://doi.org/10.3390/fi11020041
Received: 21 December 2018 / Revised: 31 January 2019 / Accepted: 10 February 2019 / Published: 12 February 2019
PDF Full-text (423 KB) | HTML Full-text | XML Full-text
Abstract
Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network [...] Read more.
Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper and accurate services. However, most detection algorithms are derived independently, which is arduous and even unnecessary. Although recent research shows that a general detection method that serves all purposes does not exist, we believe that there is some general procedure of deriving detection algorithms. In this paper, we represent such a general scheme. We mainly focus on two types of networks: transmission networks and similarity networks. We reduce them to a unified graph model, based on which we propose a method to define and detect community structures. Finally, we also give a demonstration to show how our design scheme works. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle An Overview of Vehicular Communications
Future Internet 2019, 11(2), 27; https://doi.org/10.3390/fi11020027
Received: 29 December 2018 / Revised: 17 January 2019 / Accepted: 22 January 2019 / Published: 24 January 2019
PDF Full-text (1468 KB) | HTML Full-text | XML Full-text
Abstract
The transport sector is commonly subordinate to several issues, such as traffic congestion and accidents. Despite this, in recent years, it is also evolving with regard to cooperation between vehicles. The fundamental objective of this trend is to increase road safety, attempting to [...] Read more.
The transport sector is commonly subordinate to several issues, such as traffic congestion and accidents. Despite this, in recent years, it is also evolving with regard to cooperation between vehicles. The fundamental objective of this trend is to increase road safety, attempting to anticipate the circumstances of potential danger. Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Vehicle-to-Everything (V2X) technologies strive to give communication models that can be employed by vehicles in different application contexts. The resulting infrastructure is an ad-hoc mesh network whose nodes are not only vehicles but also all mobile devices equipped with wireless modules. The interaction between the multiple connected entities consists of information exchange through the adoption of suitable communication protocols. The main aim of the review carried out in this paper is to examine and assess the most relevant systems, applications, and communication protocols that will distinguish the future road infrastructures used by vehicles. The results of the investigation reveal the real benefits that technological cooperation can involve in road safety. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle An Explorative Model to Assess Individuals’ Phubbing Risk
Future Internet 2019, 11(1), 21; https://doi.org/10.3390/fi11010021
Received: 30 December 2018 / Revised: 10 January 2019 / Accepted: 11 January 2019 / Published: 18 January 2019
PDF Full-text (327 KB) | HTML Full-text | XML Full-text
Abstract
Phubbing could be defined as a new form of addiction; however, checking the phone and ignoring the speaker could also be linked to the increased availability of virtual social environments. We developed a multidimensional model for phubbing considering psychological dimensions and information and [...] Read more.
Phubbing could be defined as a new form of addiction; however, checking the phone and ignoring the speaker could also be linked to the increased availability of virtual social environments. We developed a multidimensional model for phubbing considering psychological dimensions and information and communication technology related habits. We collected data through online questionnaires and surveys. The best model obtained from our data was constituted by Information and Communication Technologies’ (ICTs) usage behaviours, Trait Anxiety, Virtual Sense of Community and Neuroticism. Finally, our study confirmed a strong connection between phubbing and online addiction behaviours. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle ESCAPE: Evacuation Strategy through Clustering and Autonomous Operation in Public Safety Systems
Future Internet 2019, 11(1), 20; https://doi.org/10.3390/fi11010020
Received: 24 December 2018 / Revised: 10 January 2019 / Accepted: 16 January 2019 / Published: 17 January 2019
PDF Full-text (906 KB) | HTML Full-text | XML Full-text
Abstract
Natural disasters and terrorist attacks pose a significant threat to human society, and have stressed an urgent need for the development of comprehensive and efficient evacuation strategies. In this paper, a novel evacuation-planning mechanism is introduced to support the distributed and autonomous evacuation [...] Read more.
Natural disasters and terrorist attacks pose a significant threat to human society, and have stressed an urgent need for the development of comprehensive and efficient evacuation strategies. In this paper, a novel evacuation-planning mechanism is introduced to support the distributed and autonomous evacuation process within the operation of a public safety system, where the evacuees exploit the capabilities of the proposed ESCAPE service, towards making the most beneficial actions for themselves. The ESCAPE service was developed based on the principles of reinforcement learning and game theory, and is executed at two decision-making layers. Initially, evacuees are modeled as stochastic learning automata that select an evacuation route that they want to go based on its physical characteristics and past decisions during the current evacuation. Consequently, a cluster of evacuees is created per evacuation route, and the evacuees decide if they will finally evacuate through the specific evacuation route at the current time slot or not. The evacuees’ competitive behavior is modeled as a non-co-operative minority game per each specific evacuation route. A distributed and low-complexity evacuation-planning algorithm (i.e., ESCAPE) is introduced to implement both the aforementioned evacuee decision-making layers. Finally, the proposed framework is evaluated through modeling and simulation under several scenarios, and its superiority and benefits are revealed and demonstrated. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Adaptive Downward/Upward Routing Protocol for Mobile-Sensor Networks
Future Internet 2019, 11(1), 18; https://doi.org/10.3390/fi11010018
Received: 20 November 2018 / Revised: 4 January 2019 / Accepted: 11 January 2019 / Published: 15 January 2019
PDF Full-text (475 KB) | HTML Full-text | XML Full-text
Abstract
Recently, mobility support has become an important requirement in various Wireless Sensor Networks (WSNs). Low-power and Lossy Networks (LLNs) are a special type of WSNs that tolerate a certain degree of packet loss. However, due to the strict resource constraints in the computation, [...] Read more.
Recently, mobility support has become an important requirement in various Wireless Sensor Networks (WSNs). Low-power and Lossy Networks (LLNs) are a special type of WSNs that tolerate a certain degree of packet loss. However, due to the strict resource constraints in the computation, energy, and memory of LLNs, most routing protocols only support static network topologies. Data collection and data dissemination are two basic traffic modes in LLNs. Unlike data collection, data dissemination is less investigated in LLNs. There are two sorts of data-dissemination methods: point-to-multipoint and point-to-point. In this paper, we focus on the point-to-point method, which requires the source node to build routes to reach the destination node. We propose an adaptive routing protocol that integrates together point-to-point traffic and data-collection traffic, and supports highly mobile scenarios. This protocol quickly reacts to the movement of nodes to make faster decisions for the next-hop selection in data collection and dynamically build routes for point-to-point traffic. Results obtained through simulation show that our work outperforms two generic ad hoc routing protocols AODV and flooding on different performance metrics. Results also show the efficiency of our work in highly mobile scenarios with multiple traffic patterns. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Forecasting E-Commerce Products Prices by Combining an Autoregressive Integrated Moving Average (ARIMA) Model and Google Trends Data
Future Internet 2019, 11(1), 5; https://doi.org/10.3390/fi11010005
Received: 22 November 2018 / Revised: 13 December 2018 / Accepted: 20 December 2018 / Published: 24 December 2018
PDF Full-text (778 KB) | HTML Full-text | XML Full-text
Abstract
E-commerce is becoming more and more the main instrument for selling goods to the mass market. This led to a growing interest in algorithms and techniques able to predict products future prices, since they allow us to define smart systems able to improve [...] Read more.
E-commerce is becoming more and more the main instrument for selling goods to the mass market. This led to a growing interest in algorithms and techniques able to predict products future prices, since they allow us to define smart systems able to improve the quality of life by suggesting more affordable goods and services. The joint use of time series, reputation and sentiment analysis clearly represents one important approach to this research issue. In this paper we present Price Probe, a suite of software tools developed to perform forecasting on products’ prices. Its primary aim is to predict the future price trend of products generating a customized forecast through the exploitation of autoregressive integrated moving average (ARIMA) model. We experimented the effectiveness of the proposed approach on one of the biggest E-commerce infrastructure in the world: Amazon. We used specific APIs and dedicated crawlers to extract and collect information about products and their related prices over time and, moreover, we extracted information from social media and Google Trends that we used as exogenous features for the ARIMA model. We fine-estimated ARIMA’s parameters and tried the different combinations of the exogenous features and noticed through experimental analysis that the presence of Google Trends information significantly improved the predictions. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle A Real Case of Implementation of the Future 5G City
Future Internet 2019, 11(1), 4; https://doi.org/10.3390/fi11010004
Received: 26 November 2018 / Revised: 14 December 2018 / Accepted: 20 December 2018 / Published: 22 December 2018
PDF Full-text (1477 KB) | HTML Full-text | XML Full-text
Abstract
The fifth generation (5G) of wireless communication systems is considered the key technology to enable a wide range of application scenarios and the effective spreading of the smart city concept. Vertical business use cases, specifically designed for the future 5G city, will have [...] Read more.
The fifth generation (5G) of wireless communication systems is considered the key technology to enable a wide range of application scenarios and the effective spreading of the smart city concept. Vertical business use cases, specifically designed for the future 5G city, will have a strong economical and social impact. For this reason, ongoing 5G field trials have to test newly deployed technologies as well as the capability of 5G to create a new digital economy. This paper describes the 5G field trial environment that was launched in Italy at the end of 2017. The aim is to evaluate the capability of the 5G network of supporting innovative services with reference to suitably designed key performance indicators and to evaluate the opportunities offered by these services. Indeed, vertical business use cases, specifically designed for the future 5G city, with a strong economic and social impact, are under implementation and will be evaluated. In particular, the paper provides a detailed description of the deployment of an actual complete integrated 5G network. It shows how 5G is effective enabling technology for a wide range of vertical business and use cases. Indeed, its flexibility allows to satisfy completely different performance requirements of real services. Some preliminary results, obtained during the first phase, are presented for a smart mobility scenario. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Privacy and Security Issues in Online Social Networks
Future Internet 2018, 10(12), 114; https://doi.org/10.3390/fi10120114
Received: 29 September 2018 / Revised: 14 November 2018 / Accepted: 21 November 2018 / Published: 22 November 2018
PDF Full-text (221 KB) | HTML Full-text | XML Full-text
Abstract
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. [...] Read more.
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Quality of Experience in Cyber-Physical Social Systems Based on Reinforcement Learning and Game Theory
Future Internet 2018, 10(11), 108; https://doi.org/10.3390/fi10110108
Received: 28 September 2018 / Revised: 31 October 2018 / Accepted: 5 November 2018 / Published: 7 November 2018
Cited by 2 | PDF Full-text (2314 KB) | HTML Full-text | XML Full-text
Abstract
This paper addresses the problem of museum visitors’ Quality of Experience (QoE) optimization by viewing and treating the museum environment as a cyber-physical social system. To achieve this goal, we harness visitors’ internal ability to intelligently sense their environment and make choices that [...] Read more.
This paper addresses the problem of museum visitors’ Quality of Experience (QoE) optimization by viewing and treating the museum environment as a cyber-physical social system. To achieve this goal, we harness visitors’ internal ability to intelligently sense their environment and make choices that improve their QoE in terms of which the museum touring option is the best for them and how much time to spend on their visit. We model the museum setting as a distributed non-cooperative game where visitors selfishly maximize their own QoE. In this setting, we formulate the problem of Recommendation Selection and Visiting Time Management (RSVTM) and propose a two-stage distributed algorithm based on game theory and reinforcement learning, which learns from visitor behavior to make on-the-fly recommendation selections that maximize visitor QoE. The proposed framework enables autonomic visitor-centric management in a personalized manner and enables visitors themselves to decide on the best visiting strategies. Experimental results evaluating the performance of the proposed RSVTM algorithm under realistic simulation conditions indicate the high operational effectiveness and superior performance when compared to other recommendation approaches. Our results constitute a practical alternative for museums and exhibition spaces meant to enhance visitor QoE in a flexible, efficient, and cost-effective manner. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Reframing HRI Design Opportunities for Social Robots: Lessons Learnt from a Service Robotics Case Study Approach Using UX for HRI
Future Internet 2018, 10(10), 101; https://doi.org/10.3390/fi10100101
Received: 6 September 2018 / Revised: 1 October 2018 / Accepted: 1 October 2018 / Published: 10 October 2018
PDF Full-text (1474 KB) | HTML Full-text | XML Full-text
Abstract
Over the last few decades, semi-autonomous machine’s technology started to promote awareness towards the importance of human–robot interaction (HRI) for improving daily activities. More affordable social robots are being commercially released and in order to implement viable applications of HRI, a combination human-computer [...] Read more.
Over the last few decades, semi-autonomous machine’s technology started to promote awareness towards the importance of human–robot interaction (HRI) for improving daily activities. More affordable social robots are being commercially released and in order to implement viable applications of HRI, a combination human-computer interaction and user experience methodologies could play a pivotal role in assessing new scenarios and evaluating new investigations. However, literature shows that it is still challenging to reach an optimal user experience with robotic companions. The aim of the study was to determine the chance to enhance the user experience with a semi-autonomous social robot, using user experience and human–computer interaction methodologies. In this study, a social robotic companion has been developed and prototyped in order to be adopted in a specific public environment such as a company workspace. The challenges emerged from this peculiar environment triggered the need for a more productive and comfortable office for the employees, and, at the same time, the usability, acceptance and likeability of the robotic companion have been evaluated. The results emphasize that, since HRI is highly interdisciplinary, the benefits of combining approaches from other fields could positively benefit from a meaningful social interaction with the users. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Agile Service Engineering in the Industrial Internet of Things
Future Internet 2018, 10(10), 100; https://doi.org/10.3390/fi10100100
Received: 29 August 2018 / Revised: 1 October 2018 / Accepted: 4 October 2018 / Published: 9 October 2018
PDF Full-text (4223 KB) | HTML Full-text | XML Full-text
Abstract
The emerging Industrial Internet of Things (IIoT) will not only leverage new and potentially disruptive business models but will also change the way software applications will be analyzed and designed. Agility is a need in a systematic service engineering as well as a [...] Read more.
The emerging Industrial Internet of Things (IIoT) will not only leverage new and potentially disruptive business models but will also change the way software applications will be analyzed and designed. Agility is a need in a systematic service engineering as well as a co-design of requirements and architectural artefacts. Functional and non-functional requirements of IT users (in smart manufacturing mostly from the disciplines of mechanical engineering and electrical engineering) need to be mapped to the capabilities and interaction patterns of emerging IIoT service platforms, not to forget the corresponding information models. The capabilities of such platforms are usually described, structured, and formalized by software architects and software engineers. However, their technical descriptions are far away from the thinking and the thematic terms of end-users. This complicates the transition from requirements analysis to system design, and hence the re-use of existing and the design of future platform capabilities. Current software engineering methodologies do not systematically cover these interlinked and two-sided aspects. The article describes in a comprehensive manner how to close this gap with the help of a service-oriented analysis and design methodology entitled SERVUS (also mentioned in ISO 19119 Annex D) and a corresponding Web-based Platform Engineering Information System (PEIS). Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessArticle Fuzzy Multi-Criteria Based Trust Management in Heterogeneous Federated Future Internet Testbeds
Future Internet 2018, 10(7), 58; https://doi.org/10.3390/fi10070058
Received: 22 May 2018 / Revised: 12 June 2018 / Accepted: 21 June 2018 / Published: 25 June 2018
PDF Full-text (444 KB) | HTML Full-text | XML Full-text
Abstract
A federation of heterogeneous testbeds, which provides a wide range of services, attracts many experimenters from academia and industry to evaluate novel future Internet architectures and network protocols. The candidate experimenter reserves the appropriate testbeds’ resources based on various diverse criteria. Since several [...] Read more.
A federation of heterogeneous testbeds, which provides a wide range of services, attracts many experimenters from academia and industry to evaluate novel future Internet architectures and network protocols. The candidate experimenter reserves the appropriate testbeds’ resources based on various diverse criteria. Since several testbeds offer similar resources, a trust mechanism between the users and the providers will facilitate the proper selection of testbeds. This paper proposes a fuzzy reputation-based trust framework that is based on a modification of the fuzzy VIKOR multi-criteria decision making method and combines the user’s opinion from previously-conducted experiments with retrieved monitoring data from the utilized testbeds, in order to quantify the reputation of each testbed and the credibility of the experimenter. The proposed framework can process various types of numeric and linguistic data in an on-line fashion and can be easily extended for new types of testbeds and services. Data from active federated testbeds are used to evaluate the performance of the fuzzy reputation-based trust framework under dynamic conditions. Furthermore, a comparison of the proposed framework with another existing state of the art trust framework for federated testbeds is presented, and its superiority is demonstrated. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Review

Jump to: Research, Other

Open AccessReview Worldwide Connectivity for the Internet of Things Through LoRaWAN
Future Internet 2019, 11(3), 57; https://doi.org/10.3390/fi11030057
Received: 17 January 2019 / Revised: 10 February 2019 / Accepted: 25 February 2019 / Published: 2 March 2019
PDF Full-text (214 KB) | HTML Full-text | XML Full-text
Abstract
The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, [...] Read more.
The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessReview SAES: An Introduction to Self-Adapting Exploratory Structures
Future Internet 2019, 11(3), 54; https://doi.org/10.3390/fi11030054
Received: 31 December 2018 / Revised: 10 February 2019 / Accepted: 19 February 2019 / Published: 26 February 2019
PDF Full-text (196 KB) | HTML Full-text | XML Full-text
Abstract
Self-adapting exploratory structures (SAESs) are the basic components of exploratory search. They are abstract structures which allow searching or querying of an information base and summarizing of results using a uniform representation. A definition and a characterization of SAES is given, as well [...] Read more.
Self-adapting exploratory structures (SAESs) are the basic components of exploratory search. They are abstract structures which allow searching or querying of an information base and summarizing of results using a uniform representation. A definition and a characterization of SAES is given, as well as a discussion of structures that are SAES or can be modified in order to become SAES. These include dynamic taxonomies (also known as faceted search), tag clouds, continuous sliders, geographic maps, and dynamic clustering methods, such as Scatter-Gather. Finally, the integration of these structures into a single interface is discussed. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Open AccessReview Consistency Models of NoSQL Databases
Future Internet 2019, 11(2), 43; https://doi.org/10.3390/fi11020043
Received: 30 December 2018 / Revised: 2 February 2019 / Accepted: 11 February 2019 / Published: 14 February 2019
PDF Full-text (2119 KB) | HTML Full-text | XML Full-text
Abstract
Internet has become so widespread that most popular websites are accessed by hundreds of millions of people on a daily basis. Monolithic architectures, which were frequently used in the past, were mostly composed of traditional relational database management systems, but quickly have become [...] Read more.
Internet has become so widespread that most popular websites are accessed by hundreds of millions of people on a daily basis. Monolithic architectures, which were frequently used in the past, were mostly composed of traditional relational database management systems, but quickly have become incapable of sustaining high data traffic very common these days. Meanwhile, NoSQL databases have emerged to provide some missing properties in relational databases like the schema-less design, horizontal scaling, and eventual consistency. This paper analyzes and compares the consistency model implementation on five popular NoSQL databases: Redis, Cassandra, MongoDB, Neo4j, and OrientDB. All of which offer at least eventual consistency, and some have the option of supporting strong consistency. However, imposing strong consistency will result in less availability when subject to network partition events. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessFeature PaperReview Interoperability of the Time of Industry 4.0 and the Internet of Things
Future Internet 2019, 11(2), 36; https://doi.org/10.3390/fi11020036
Received: 31 December 2018 / Revised: 28 January 2019 / Accepted: 1 February 2019 / Published: 3 February 2019
PDF Full-text (322 KB) | HTML Full-text | XML Full-text
Abstract
Industry 4.0 demands a dynamic optimization of production lines. They are formed by sets of heterogeneous devices that cooperate towards a shared goal. The Internet of Things can serve as a technology enabler for implementing such a vision. Nevertheless, the domain is struggling [...] Read more.
Industry 4.0 demands a dynamic optimization of production lines. They are formed by sets of heterogeneous devices that cooperate towards a shared goal. The Internet of Things can serve as a technology enabler for implementing such a vision. Nevertheless, the domain is struggling in finding a shared understanding of the concepts for describing a device. This aspect plays a fundamental role in enabling an “intelligent interoperability” among sensor and actuators that will constitute a dynamic Industry 4.0 production line. In this paper, we summarize the efforts of academics and practitioners toward describing devices in order to enable dynamic reconfiguration by machines or humans. We also propose a set of concepts for describing devices, and we analyze how present initiatives are covering these aspects. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Open AccessReview Percolation and Internet Science
Future Internet 2019, 11(2), 35; https://doi.org/10.3390/fi11020035
Received: 29 December 2018 / Revised: 27 January 2019 / Accepted: 29 January 2019 / Published: 2 February 2019
PDF Full-text (4161 KB) | HTML Full-text | XML Full-text
Abstract
Percolation, in its most general interpretation, refers to the “flow” of something (a physical agent, data or information) in a network, possibly accompanied by some nonlinear dynamical processes on the network nodes (sometimes denoted reaction–diffusion systems, voter or opinion formation models, etc.). Originated [...] Read more.
Percolation, in its most general interpretation, refers to the “flow” of something (a physical agent, data or information) in a network, possibly accompanied by some nonlinear dynamical processes on the network nodes (sometimes denoted reaction–diffusion systems, voter or opinion formation models, etc.). Originated in the domain of theoretical and matter physics, it has many applications in epidemiology, sociology and, of course, computer and Internet sciences. In this review, we illustrate some aspects of percolation theory and its generalization, cellular automata and briefly discuss their relationship with equilibrium systems (Ising and Potts models). We present a model of opinion spreading, the role of the topology of the network to induce coherent oscillations and the influence (and advantages) of risk perception for stopping epidemics. The models and computational tools that are briefly presented here have an application to the filtering of tainted information in automatic trading. Finally, we introduce the open problem of controlling percolation and other processes on distributed systems. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessFeature PaperReview Surveying Human Habit Modeling and Mining Techniques in Smart Spaces
Future Internet 2019, 11(1), 23; https://doi.org/10.3390/fi11010023
Received: 28 December 2018 / Revised: 13 January 2019 / Accepted: 16 January 2019 / Published: 19 January 2019
PDF Full-text (1209 KB) | HTML Full-text | XML Full-text
Abstract
A smart space is an environment, mainly equipped with Internet-of-Things (IoT) technologies, able to provide services to humans, helping them to perform daily tasks by monitoring the space and autonomously executing actions, giving suggestions and sending alarms. Approaches suggested in the literature may [...] Read more.
A smart space is an environment, mainly equipped with Internet-of-Things (IoT) technologies, able to provide services to humans, helping them to perform daily tasks by monitoring the space and autonomously executing actions, giving suggestions and sending alarms. Approaches suggested in the literature may differ in terms of required facilities, possible applications, amount of human intervention required, ability to support multiple users at the same time adapting to changing needs. In this paper, we propose a Systematic Literature Review (SLR) that classifies most influential approaches in the area of smart spaces according to a set of dimensions identified by answering a set of research questions. These dimensions allow to choose a specific method or approach according to available sensors, amount of labeled data, need for visual analysis, requirements in terms of enactment and decision-making on the environment. Additionally, the paper identifies a set of challenges to be addressed by future research in the field. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Open AccessReview MAC Layer Protocols for Internet of Things: A Survey
Future Internet 2019, 11(1), 16; https://doi.org/10.3390/fi11010016
Received: 27 November 2018 / Revised: 17 December 2018 / Accepted: 18 December 2018 / Published: 14 January 2019
PDF Full-text (2380 KB) | HTML Full-text | XML Full-text
Abstract
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market [...] Read more.
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Figures

Figure 1

Other

Jump to: Research, Review

Open AccessEssay Environmental Hazards: A Coverage Response Approach
Future Internet 2019, 11(3), 72; https://doi.org/10.3390/fi11030072
Received: 1 December 2018 / Revised: 6 March 2019 / Accepted: 8 March 2019 / Published: 14 March 2019
PDF Full-text (268 KB) | HTML Full-text | XML Full-text
Abstract
The rapid rise and implementation of Smart Systems (i.e., multi-functional observation and platform systems that depict settings and/or identify situations or features of interest, often in real-time) has inversely paralleled and readily exposed the reduced capacity of human and societal systems to effectively [...] Read more.
The rapid rise and implementation of Smart Systems (i.e., multi-functional observation and platform systems that depict settings and/or identify situations or features of interest, often in real-time) has inversely paralleled and readily exposed the reduced capacity of human and societal systems to effectively respond to environmental hazards. This overarching review and essay explores the complex set of interactions found among Smart, Societal, and Environmental Systems. The resulting rise in the poorly performing response solutions to environmental hazards that has occurred despite best practices, detailed forecast information, and the use and application of real-time in situ observational platforms are considered. The application of Smart Systems, relevant architectures, and ever-increasing numbers of applications and tools development by individuals as they interact with Smart Systems offers a means to ameliorate and resolve confounding found among all of the interdependent Systems. The interactions of human systems with environmental hazards further expose society’s complex operational vulnerabilities and gaps in response to such threats. An examination of decision-making, the auto-reactive nature of responses before, during, and after environmental hazards; and the lack of scalability and comparability are presented with regard to the prospects of applying probabilistic methods, cross-scale time and space domains; anticipated impacts, and the need to account for multimodal actions and reactions—including psycho-social contributions. Assimilation of these concepts and principles in Smart System architectures, applications, and tools is essential to ensure future viability and functionalities with regard to environmental hazards and to produce an effective set of societal engagement responses. Achieving the promise of Smart Systems relative to environmental hazards will require an extensive transdisciplinary approach to tie psycho-social behaviors directly with non-human components and systems in order to close actionable gaps in response. Pathways to achieve a more comprehensive understanding are given for consideration by the wide diversity of disciplines necessary to move forward in Smart Systems as tied with the societal response to environmental hazards. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top