Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 11, Issue 3

2019 March - 29 articles

Cover Story: During recent decades, the Internet has been a key factor in building the global information society and leading economy growth. The mix of technologies in the Internet, such as Cloud Computing, Mobile Edge Computing, Network Function Virtualization (NFV), and Internet of Things (IoT), provide the necessary tools to build a service-centric Future Internet Architecture. However, Internet’s resounding success has also turned out to be the biggest obstacle leading to an inefficient utilization of the underlying infrastructure. The excessive amount of generated traffic from the IoT layer and the need for novel and more targeted networking services has led to a depletion of the physical resources. Thus, the goal of this article is to establish a scalable softwarized end-to-end solution that will gracefully combine different technologies to provide networking services with high Quality of Service and low communication cost. View this paper.

Articles (29)

  • Article
  • Open Access
1 Citations
4,058 Views
13 Pages

A built-in sensor in a smart device, such as the accelerometer and the gyroscope, will produce an obvious nonlinear output when it receives voice signal. In this paper, based on the chaotic theory, the nonlinearity of smartphone built-in acceleromete...

  • Article
  • Open Access
8 Citations
8,354 Views
21 Pages

As a new type of service computing model, cloud computing provides various services through the Internet. Virtual machine (VM) hopping is a security issue often encountered in the virtualization layer. Once it occurs, it directly affects the reliabil...

  • Article
  • Open Access
11 Citations
4,776 Views
12 Pages

The present study analyzes four well-known online platforms used in the tourist industry for travelling, accommodation, eating, and touring (Blablacar, Airbnb, Eatwith, and Trip4real). The objective is to analyze the utility of the portals, intention...

  • Article
  • Open Access
41 Citations
7,240 Views
14 Pages

(1) Background: Large eHealth systems should have a mechanism to detect unauthorized changes in patients’ medical documentation, access permissions, and logs. This is due to the fact that modern eHealth systems are connected with many healthcar...

  • Feature Paper
  • Review
  • Open Access
18 Citations
7,771 Views
25 Pages

Open Data for Open Innovation: An Analysis of Literature Characteristics

  • Diego Corrales-Garay,
  • Eva-María Mora-Valentín and
  • Marta Ortiz-de-Urbina-Criado

In this paper, we review some characteristics of the literature that studies the uses and applications of open data for open innovation. Three research questions are proposed about both topics: (1) What journals, conferences and authors have publishe...

  • Article
  • Open Access
16 Citations
5,434 Views
18 Pages

Environmental-Based Speed Recommendation for Future Smart Cars

  • Ioannis Galanis,
  • Iraklis Anagnostopoulos,
  • Priyaa Gurunathan and
  • Dona Burkard

Modern vehicles are enhanced with increased computation, communication and sensing capabilities, providing a variety of new features that pave the way for the deployment of more sophisticated services. Specifically, smart cars employ hundreds of sens...

  • Article
  • Open Access
6 Citations
5,238 Views
18 Pages

Nowadays, massive texts are generated on the web, which contain a variety of viewpoints, attitudes, and emotions for products and services. Subjective information mining of online comments is vital for enterprises to improve their products or service...

  • Review
  • Open Access
22 Citations
7,822 Views
10 Pages

Information-centric networking integrates by design a pull-based model which brings in advantages in terms of control as well as of in-network caching strategies. Currently, ICN main areas of action concern content distribution and IoT, both of which...

  • Article
  • Open Access
50 Citations
6,586 Views
21 Pages

Dynamic SDN Controller Load Balancing

  • Hadar Sufiev,
  • Yoram Haddad,
  • Leonid Barenboim and
  • José Soler

The software defined networking (SDN) paradigm separates the control plane from the data plane, where an SDN controller receives requests from its connected switches and manages the operation of the switches under its control. Reassignments between s...

  • Review
  • Open Access
155 Citations
33,836 Views
16 Pages

The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals t...

  • Article
  • Open Access
16 Citations
6,420 Views
20 Pages

Network Function Virtualization is a new technology allowing for a elastic cloud and bandwidth resource allocation. The technology requires an orchestrator whose role is the service and resource orchestration. It receives service requests, each one c...

  • Article
  • Open Access
81 Citations
9,118 Views
17 Pages

The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous v...

  • Article
  • Open Access
94 Citations
10,151 Views
23 Pages

VNF Placement Optimization at the Edge and Cloud

  • Aris Leivadeas,
  • George Kesidis,
  • Mohamed Ibnkahla and
  • Ioannis Lambadaris

Network Function Virtualization (NFV) has revolutionized the way network services are offered to end users. Individual network functions are decoupled from expensive and dedicated middleboxes and are now provided as software-based virtualized entitie...

  • Article
  • Open Access
8 Citations
6,486 Views
16 Pages

Snack Texture Estimation System Using a Simple Equipment and Neural Network Model

  • Shigeru Kato,
  • Naoki Wada,
  • Ryuji Ito,
  • Takaya Shiozaki,
  • Yudai Nishiyama and
  • Tomomichi Kagawa

Texture evaluation is manually performed in general, and such analytical tasks can get cumbersome. In this regard, a neural network model is employed in this study. This paper describes a system that can estimate the food texture of snacks. The syste...

  • Article
  • Open Access
114 Citations
13,499 Views
18 Pages

Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automat...

  • Article
  • Open Access
37 Citations
9,540 Views
17 Pages

Gamification vs. Privacy: Identifying and Analysing the Major Concerns

  • Aikaterini-Georgia Mavroeidi,
  • Angeliki Kitsiou,
  • Christos Kalloniatis and
  • Stefanos Gritzalis

Gamification, the use of game design elements in applications that are not games, has been developed to provide attractive environments and maintain user interest in several domains. In domains such as education, marketing and health, where gamificat...

  • Article
  • Open Access
54 Citations
7,237 Views
17 Pages

A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs

  • Zulfiqar Ali Zardari,
  • Jingsha He,
  • Nafei Zhu,
  • Khalid Hussain Mohammadani,
  • Muhammad Salman Pathan,
  • Muhammad Iftikhar Hussain and
  • Muhammad Qasim Memon

A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t coop...

  • Article
  • Open Access
11 Citations
4,876 Views
17 Pages

The article outlines conceptual and corresponding formal models of system functioning. Models provide means for estimation of information operation effects and the operational properties of systems and their functioning. Such systems are changed due...

  • Feature Paper
  • Article
  • Open Access
84 Citations
21,494 Views
25 Pages

Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distributio...

  • Article
  • Open Access
13 Citations
5,358 Views
16 Pages

With the rapid development of cloud computing, big data, and Internet of Things, Information-Centric Networking (ICN) has become a novel hotspot in the field of future Internet architecture, and new problems have appeared. In particular, more researc...

  • Article
  • Open Access
15 Citations
7,631 Views
19 Pages

A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics a...

  • Article
  • Open Access
12 Citations
6,447 Views
23 Pages

With advances in machine learning, knowledge discovery systems have become very complicated to set up, requiring extensive tuning and programming effort. Democratizing such technology so that non-technical domain experts can avail themselves of these...

  • Article
  • Open Access
5 Citations
4,735 Views
16 Pages

Hot Topic Community Discovery on Cross Social Networks

  • Xuan Wang,
  • Bofeng Zhang and
  • Furong Chang

The rapid development of online social networks has allowed users to obtain information, communicate with each other and express different opinions. Generally, in the same social network, users tend to be influenced by each other and have similar vie...

  • Review
  • Open Access
14 Citations
5,569 Views
11 Pages

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and...

  • Article
  • Open Access
9 Citations
7,007 Views
21 Pages

IoH: A Platform for the Intelligence of Home with a Context Awareness and Ambient Intelligence Approach

  • Luis Gomes,
  • Carlos Ramos,
  • Aria Jozi,
  • Bruno Serra,
  • Lucas Paiva and
  • Zita Vale

This paper presents IoH (Intelligence of Home), a platform developed to test some basic intelligent behaviors in Home context. Internet of Things, ambient intelligence and context awareness approaches motivated the development of IoH. The platform in...

  • Article
  • Open Access
8 Citations
6,454 Views
33 Pages

On the Need for a General REST-Security Framework

  • Luigi Lo Iacono,
  • Hoai Viet Nguyen and
  • Peter Leo Gorski

27 February 2019

Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally...

  • Review
  • Open Access
1 Citations
4,312 Views
9 Pages

26 February 2019

Self-adapting exploratory structures (SAESs) are the basic components of exploratory search. They are abstract structures which allow searching or querying of an information base and summarizing of results using a uniform representation. A definition...

  • Review
  • Open Access
123 Citations
15,582 Views
15 Pages

Simulating Fog and Edge Computing Scenarios: An Overview and Research Challenges

  • Sergej Svorobej,
  • Patricia Takako Endo,
  • Malika Bendechache,
  • Christos Filelis-Papadopoulos,
  • Konstantinos M. Giannoutakis,
  • George A. Gravvanis,
  • Dimitrios Tzovaras,
  • James Byrne and
  • Theo Lynn

26 February 2019

The fourth industrial revolution heralds a paradigm shift in how people, processes, things, data and networks communicate and connect with each other. Conventional computing infrastructures are struggling to satisfy dramatic growth in demand from a d...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903