Next Issue
Volume 11, January
Previous Issue
Volume 10, November
 
 

Future Internet, Volume 10, Issue 12 (December 2018) – 12 articles

Cover Story (view full-size image): Internet traffic continues to grow exponentially. This leads to a increase in demand for bit rate upgrade and technology evolution of the network infrastructures. For access networks, cost- and power-effectiveness are the highest priority for the bit rate upgrade. The EU project CEEOALAN (No: 623515) aims to identify and demonstrate modulation formats together with low complex DSP for high speed 40-Gb/s per lambda NG-PONs. DSP is vital for enabling a practical low-cost realization of high-speed NG-PON, without changing the optical infrastructure. This work offers the first detailed numerical analysis and comparison between each format in achievable link power budget performance and DSP complexity. Important findings include that the DSP is economically viable through optimizing equalization for access networks and that the choices of proper modulation format and DSP configuration depend on the [...] Read more.
Order results
Result details
Section
Select all
Export citation of selected articles as:
14 pages, 10555 KiB  
Article
“Network Sentiment” Framework to Improve Security and Privacy for Smart Home
by Tommaso Pecorella, Laura Pierucci and Francesca Nizzi
Future Internet 2018, 10(12), 125; https://doi.org/10.3390/fi10120125 - 19 Dec 2018
Cited by 13 | Viewed by 5526
Abstract
A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in [...] Read more.
A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalls and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and on going threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g., the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT sensors, Wi-Fi and Ethernet connections. Full article
(This article belongs to the Special Issue IoT Security and Privacy)
Show Figures

Figure 1

12 pages, 2096 KiB  
Article
A Method for Filtering Pages by Similarity Degree based on Dynamic Programming
by Ziyun Deng and Tingqin He
Future Internet 2018, 10(12), 124; https://doi.org/10.3390/fi10120124 - 13 Dec 2018
Viewed by 2920
Abstract
To obtain the target webpages from many webpages, we proposed a Method for Filtering Pages by Similarity Degree based on Dynamic Programming (MFPSDDP). The method needs to use one of three same relationships proposed between two nodes, so we give the definition of [...] Read more.
To obtain the target webpages from many webpages, we proposed a Method for Filtering Pages by Similarity Degree based on Dynamic Programming (MFPSDDP). The method needs to use one of three same relationships proposed between two nodes, so we give the definition of the three same relationships. The biggest innovation of MFPSDDP is that it does not need to know the structures of webpages in advance. First, we address the design ideas with queue and double threads. Then, a dynamic programming algorithm for calculating the length of the longest common subsequence and a formula for calculating similarity are proposed. Further, for obtaining detailed information webpages from 200,000 webpages downloaded from the famous website “www.jd.com”, we choose the same relationship Completely Same Relationship (CSR) and set the similarity threshold to 0.2. The Recall Ratio (RR) of MFPSDDP is in the middle in the four filtering methods compared. When the number of webpages filtered is nearly 200,000, the PR of MFPSDDP is highest in the four filtering methods compared, which can reach 85.1%. The PR of MFPSDDP is 13.3 percentage points higher than the PR of a Method for Filtering Pages by Containing Strings (MFPCS). Full article
Show Figures

Figure 1

12 pages, 3528 KiB  
Article
Bidirectional Recurrent Neural Network Approach for Arabic Named Entity Recognition
by Mohammed N. A. Ali, Guanzheng Tan and Aamir Hussain
Future Internet 2018, 10(12), 123; https://doi.org/10.3390/fi10120123 - 13 Dec 2018
Cited by 29 | Viewed by 5513
Abstract
Recurrent neural network (RNN) has achieved remarkable success in sequence labeling tasks with memory requirement. RNN can remember previous information of a sequence and can thus be used to solve natural language processing (NLP) tasks. Named entity recognition (NER) is a common task [...] Read more.
Recurrent neural network (RNN) has achieved remarkable success in sequence labeling tasks with memory requirement. RNN can remember previous information of a sequence and can thus be used to solve natural language processing (NLP) tasks. Named entity recognition (NER) is a common task of NLP and can be considered a classification problem. We propose a bidirectional long short-term memory (LSTM) model for this entity recognition task of the Arabic text. The LSTM network can process sequences and relate to each part of it, which makes it useful for the NER task. Moreover, we use pre-trained word embedding to train the inputs that are fed into the LSTM network. The proposed model is evaluated on a popular dataset called “ANERcorp.” Experimental results show that the model with word embedding achieves a high F-score measure of approximately 88.01%. Full article
(This article belongs to the Special Issue Innovative Topologies and Algorithms for Neural Networks)
Show Figures

Figure 1

14 pages, 6318 KiB  
Article
A Compact Printed Monopole Antenna for WiMAX/WLAN and UWB Applications
by Zubin Chen, Baijun Lu, Yanzhou Zhu and Hao Lv
Future Internet 2018, 10(12), 122; https://doi.org/10.3390/fi10120122 - 13 Dec 2018
Cited by 9 | Viewed by 3993
Abstract
In this paper, a printed monopole antenna design for WiMAX/WLAN applications in cable-free self-positioning seismograph nodes is proposed. Great improvements were achieved in miniaturizing the antenna and in widening the narrow bandwidth of the high-frequency band. The antenna was fed by a microstrip [...] Read more.
In this paper, a printed monopole antenna design for WiMAX/WLAN applications in cable-free self-positioning seismograph nodes is proposed. Great improvements were achieved in miniaturizing the antenna and in widening the narrow bandwidth of the high-frequency band. The antenna was fed by a microstrip gradient line and consisted of a triangle, an inverted-F shape, and an M-shaped structure, which was rotated 90° counterclockwise to form a surface-radiating patch. This structure effectively widened the operating bandwidth of the antenna. Excitation led to the generation of two impedance bands of 2.39–2.49 and 4.26–7.99 GHz for a voltage standing wave ratio of less than 2. The two impedance bandwidths were 100 MHz, i.e., 4.08% relative to the center frequency of 2.45 GHz, and 3730 MHz, i.e., 64.31% relative to the center frequency of 5.80 GHz, covering the WiMAX high-frequency band (5.25–5.85 GHz) and the WLAN band (2.4/5.2/5.8). This article describes the design details of the antenna and presents the results of both simulations and experiments that show good agreement. The proposed antenna meets the field-work requirements of cable-less seismograph nodes. Full article
Show Figures

Figure 1

18 pages, 1139 KiB  
Review
Exploiting JTAG and Its Mitigation in IOT: A Survey
by Gopal Vishwakarma and Wonjun Lee
Future Internet 2018, 10(12), 121; https://doi.org/10.3390/fi10120121 - 03 Dec 2018
Cited by 24 | Viewed by 6656
Abstract
Nowadays, companies are heavily investing in the development of “Internet of Things(IoT)” products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3–4 devices (such as mobiles, personal computers, Google Assistant, Alexa, etc.) that are connected [...] Read more.
Nowadays, companies are heavily investing in the development of “Internet of Things(IoT)” products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3–4 devices (such as mobiles, personal computers, Google Assistant, Alexa, etc.) that are connected to the Internet 24/7. However, in the future, there might be hundreds of devices that will be constantly online behind each person, keeping track of body health, banking transactions, status of personal devices, etc. to make one’s life more efficient and streamlined. Thus, it is very crucial that each device should be highly secure since one’s life will become dependent on these devices. However, the current security of IoT devices is mainly focused on resiliency of device. In addition, less complex node devices are easily accessible to the public resulting in higher vulnerability. JTAG is an IEEE standard that has been defined to test proper mounting of components on PCBs (printed circuit boards) and has been extensively used by PCB manufacturers to date. This JTAG interface can be used as a backdoor entry to access and exploit devices, also defined as a physical attack. This attack can be used to make products malfunction, modify data, or, in the worst case, stop working. This paper reviews previous successful JTAG exploitations of well-known devices operating online and also reviews some proposed possible solutions to see how they can affect IoT products in a broader sense. Full article
(This article belongs to the Special Issue IoT Security and Privacy)
Show Figures

Figure 1

14 pages, 273 KiB  
Article
Personality and Reputation: A Complex Relationship in Virtual Environments
by Stefania Collodi, Sara Panerati, Enrico Imbimbo, Federica Stefanelli, Mirko Duradoni and Andrea Guazzini
Future Internet 2018, 10(12), 120; https://doi.org/10.3390/fi10120120 - 01 Dec 2018
Cited by 8 | Viewed by 4024
Abstract
Online reputational systems are nowadays widely and effectively adopted by several online platforms to support and improve peoples’ interactions and communication. Despite the research approached and modeled social dynamics of reputational systems in different domains, adopting different frameworks, the role played by psycho-social [...] Read more.
Online reputational systems are nowadays widely and effectively adopted by several online platforms to support and improve peoples’ interactions and communication. Despite the research approached and modeled social dynamics of reputational systems in different domains, adopting different frameworks, the role played by psycho-social factors, and personality traits, determining the individual susceptibility to online reputation is still elusive. To study such mediation effects, we implemented a modified online version of the Ultimatum Game, in which participants (215 adolescents) played before as proposers, and then as responders, always knowing the reputation of their interactors. Furthermore, after the reception phase, participants could evaluate the received offers, giving positive or negative feedback to their proposers. Despite the participants’ belief they were playing with their schoolmates, the interactors’ role was always fulfilled by bots characterized by standardized behaviors. Our results show how psychological traits influence the participants’ behavior in all the game phases, as well as in the rating dynamics. Reputation seems to have a direct effect only in the allocation behavior, while, in regards the other dynamics of the game (i.e., acceptance and rating), it comes into play in a complex interaction with the psychological dimensions. Full article
16 pages, 340 KiB  
Article
Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices
by Jithin R and Priya Chandran
Future Internet 2018, 10(12), 119; https://doi.org/10.3390/fi10120119 - 30 Nov 2018
Cited by 7 | Viewed by 5286
Abstract
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, [...] Read more.
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, the automobile industry, and beyond. The introduction of internet connectivity in objects that are frequently used in daily life raises the question of security—how secure is the information and the infrastructure handled by these devices when they are connected to the internet? Security enhancements through standard cryptographic techniques are not suitable due to the power and performance constraints of IoT devices. The introduction of virtualization technology into IoT devices is a recent development, meant for fulfilling security and performance needs. However, virtualization augments the vulnerability present in IoT devices, due to the addition of one more software layer—namely, the hypervisor, which enables the sharing of resources among different users. This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation—a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embedded virtualization architectures for IoT devices. The article illustrates the performance enhancement achieved by the proposed architecture with the existing architectures. Full article
(This article belongs to the Special Issue IoT Security and Privacy)
Show Figures

Figure 1

11 pages, 2973 KiB  
Article
DSP-Based 40 GB/s Lane Rate Next-Generation Access Networks
by Jinlong Wei, Ji Zhou, Elias Giacoumidis, Paul A. Haigh and Jianming Tang
Future Internet 2018, 10(12), 118; https://doi.org/10.3390/fi10120118 - 30 Nov 2018
Cited by 6 | Viewed by 3826
Abstract
To address the continuous growth in high-speed ubiquitous access required by residential users and enterprises, Telecommunication operators must upgrade their networks to higher data rates. For optical fiber access networks that directly connect end users to metro/regional network, capacity upgrade must be done [...] Read more.
To address the continuous growth in high-speed ubiquitous access required by residential users and enterprises, Telecommunication operators must upgrade their networks to higher data rates. For optical fiber access networks that directly connect end users to metro/regional network, capacity upgrade must be done in a cost- and energy-efficient manner. 40 Gb/s is the possible lane rate for the next generation passive optical networks (NG-PONs). Ideally, existing 10 G PON components could be reused to support 40 Gb/s lane-rate NG-PON transceiver, which requires efficient modulation format and digital signal processing (DSP) to alleviate the bandwidth limitation and fiber dispersion. The major contribution of this work is to offer insight performance comparisons of 40 Gb/s lane rate electrical three level Duobinary, optical Duobinary, and four-level pulse amplitude modulation (PAM-4) for incorporating low complex DSPs, including linear and nonlinear Volterra equalization, as well as maximum likelihood sequence estimation. Detailed analysis and comparison of the complexity of various DSP algorithms are performed. Transceiver bandwidth optimization is also undertaken. The results show that the choices of proper modulation format and DSP configuration depend on the transmission distances of interest. Full article
(This article belongs to the Special Issue Recent Advances in DSP-Based Optical Communications)
Show Figures

Figure 1

13 pages, 2700 KiB  
Article
A Personalized Recommendation Algorithm Based on the User’s Implicit Feedback in E-Commerce
by Bo Wang, Feiyue Ye and Jialu Xu
Future Internet 2018, 10(12), 117; https://doi.org/10.3390/fi10120117 - 29 Nov 2018
Cited by 11 | Viewed by 4093
Abstract
A recommendation system can recommend items of interest to users. However, due to the scarcity of user rating data and the similarity of single ratings, the accuracy of traditional collaborative filtering algorithms (CF) is limited. Compared with user rating data, the user’s behavior [...] Read more.
A recommendation system can recommend items of interest to users. However, due to the scarcity of user rating data and the similarity of single ratings, the accuracy of traditional collaborative filtering algorithms (CF) is limited. Compared with user rating data, the user’s behavior log is easier to obtain and contains a large amount of implicit feedback information, such as the purchase behavior, comparison behavior, and sequences of items (item-sequences). In this paper, we proposed a personalized recommendation algorithm based on a user’s implicit feedback (BUIF). BUIF considers not only the user’s purchase behavior but also the user’s comparison behavior and item-sequences. We extracted the purchase behavior, comparison behavior, and item-sequences from the user’s behavior log; calculated the user’s similarity by purchase behavior and comparison behavior; and extended word-embedding to item-embedding to obtain the item’s similarity. Based on the above method, we built a secondary reordering model to generate the recommendation results for users. The results of the experiment on the JData dataset show that our algorithm shows better improvement in regard to recommendation accuracy over other CF algorithms. Full article
(This article belongs to the Special Issue Data Science for Internet of Things)
Show Figures

Figure 1

11 pages, 2307 KiB  
Article
A Bi-Directional LSTM-CNN Model with Attention for Aspect-Level Text Classification
by Yonghua Zhu, Xun Gao, Weilin Zhang, Shenkai Liu and Yuanyuan Zhang
Future Internet 2018, 10(12), 116; https://doi.org/10.3390/fi10120116 - 24 Nov 2018
Cited by 32 | Viewed by 6456
Abstract
The prevalence that people share their opinions on the products and services in their daily lives on the Internet has generated a large quantity of comment data, which contain great business value. As for comment sentences, they often contain several comment aspects and [...] Read more.
The prevalence that people share their opinions on the products and services in their daily lives on the Internet has generated a large quantity of comment data, which contain great business value. As for comment sentences, they often contain several comment aspects and the sentiment on these aspects are different, which makes it meaningless to give an overall sentiment polarity of the sentence. In this paper, we introduce Attention-based Aspect-level Recurrent Convolutional Neural Network (AARCNN) to analyze the remarks at aspect-level. The model integrates attention mechanism and target information analysis, which enables the model to concentrate on the important parts of the sentence and to make full use of the target information. The model uses bidirectional LSTM (Bi-LSTM) to build the memory of the sentence, and then CNN is applied to extracting attention from memory to get the attentive sentence representation. The model uses aspect embedding to analyze the target information of the representation and finally the model outputs the sentiment polarity through a softmax layer. The model was tested on multi-language datasets, and demonstrated that it has better performance than conventional deep learning methods. Full article
Show Figures

Figure 1

11 pages, 1673 KiB  
Article
Video-Based Human Action Recognition Using Spatial Pyramid Pooling and 3D Densely Convolutional Networks
by Wanli Yang, Yimin Chen, Chen Huang and Mingke Gao
Future Internet 2018, 10(12), 115; https://doi.org/10.3390/fi10120115 - 22 Nov 2018
Cited by 5 | Viewed by 5031
Abstract
In recent years, the application of deep neural networks to human behavior recognition has become a hot topic. Although remarkable achievements have been made in the field of image recognition, there are still many problems to be solved in the area of video. [...] Read more.
In recent years, the application of deep neural networks to human behavior recognition has become a hot topic. Although remarkable achievements have been made in the field of image recognition, there are still many problems to be solved in the area of video. It is well known that convolutional neural networks require a fixed size image input, which not only limits the network structure but also affects the recognition accuracy. Although this problem has been solved in the field of images, it has not yet been broken through in the field of video. To address the input problem of fixed size video frames in video recognition, we propose a three-dimensional (3D) densely connected convolutional network based on spatial pyramid pooling (3D-DenseNet-SPP). As the name implies, the network structure is mainly composed of three parts: 3DCNN, DenseNet, and SPPNet. Our models were evaluated on a KTH dataset and UCF101 dataset separately. The experimental results showed that our model has better performance in the field of video-based behavior recognition in comparison to the existing models. Full article
(This article belongs to the Section Techno-Social Smart Systems)
Show Figures

Figure 1

12 pages, 221 KiB  
Article
Privacy and Security Issues in Online Social Networks
by Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
Future Internet 2018, 10(12), 114; https://doi.org/10.3390/fi10120114 - 22 Nov 2018
Cited by 62 | Viewed by 21172
Abstract
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. [...] Read more.
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media. Full article
(This article belongs to the Special Issue 10th Anniversary Feature Papers)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop