Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 14, Issue 5

2022 May - 38 articles

Cover Story: Wireless sensor networks (WSNs) are networks of small devices with limited resources that are able to collect different information for a variety of purposes. Energy and security play a key role in these networks, and MAC aspects are fundamental in their management. The classical security approaches, introducing high overload, are not suitable in WSNs given the limited resources of the nodes, which subsequently require lightweight cryptography mechanisms in order to achieve high security levels. Other than classical AES and RSA techniques, new approaches based on elliptic curves have been introduced in recent years. These mechanisms allow more-efficient resource management for the transmission of information towards a central node in a multihop way, guaranteeing data confidentiality and integrity. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (38)

  • Article
  • Open Access
1 Citations
2,756 Views
15 Pages

Generalized spatial modulation (GSM) technology is an extension of spatial modulation (SM) technology, and one of its main advantages is to further improve band efficiency. However, the multiple active antennas for transmission also brings the demodu...

  • Article
  • Open Access
8 Citations
3,732 Views
19 Pages

Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for t...

  • Article
  • Open Access
4 Citations
3,171 Views
24 Pages

The domain of information-centric networking (ICN) is expanding as more devices are becoming a part of connected technologies. New methods for serving content from a producer to a consumer are being explored, and Named Data Networking (NDN) is one of...

  • Article
  • Open Access
7 Citations
3,843 Views
22 Pages

Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments

  • Bert Cox,
  • Chesney Buyle,
  • Daan Delabie,
  • Lieven De Strycker and
  • Liesbet Van der Perre

The digital transformation is exciting the uptake of Internet-of-Things technologies, and raises the questions surrounding our knowledge of the positions of many of these things. A review of indoor localization technologies summarized in this paper s...

  • Article
  • Open Access
6 Citations
3,731 Views
24 Pages

Mobile Ad hoc Networks (MANETs) are characterized by highly dynamic phenomena and volatility. These features have a significant impact on network performance and should be present in the scenarios of experiments for the assessment of MANET-related te...

  • Article
  • Open Access
97 Citations
8,100 Views
20 Pages

Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks

  • Roseline Oluwaseun Ogundokun,
  • Sanjay Misra,
  • Mychal Douglas,
  • Robertas Damaševičius and
  • Rytis Maskeliūnas

In today’s healthcare setting, the accurate and timely diagnosis of breast cancer is critical for recovery and treatment in the early stages. In recent years, the Internet of Things (IoT) has experienced a transformation that allows the analysi...

  • Article
  • Open Access
4 Citations
3,513 Views
14 Pages

In QoE fairness optimization of multiple video streams, a distributed video stream fairness scheduling strategy based on federated deep reinforcement learning is designed to address the problem of low bandwidth utilization due to unfair bandwidth all...

  • Feature Paper
  • Article
  • Open Access
7 Citations
4,428 Views
21 Pages

QoE Models for Adaptive Streaming: A Comprehensive Evaluation

  • Duc Nguyen,
  • Nam Pham Ngoc and
  • Truong Cong Thang

Adaptive streaming has become a key technology for various multimedia services, such as online learning, mobile streaming, Internet TV, etc. However, because of throughput fluctuations, video quality may be dramatically varying during a streaming ses...

  • Review
  • Open Access
23 Citations
6,441 Views
18 Pages

A Review of Blockchain Technology Applications in Ambient Assisted Living

  • Alexandru-Ioan Florea,
  • Ionut Anghel and
  • Tudor Cioara

The adoption of remote assisted care was accelerated by the COVID-19 pandemic. This type of system acquires data from various sensors, runs analytics to understand people’s activities, behavior, and living problems, and disseminates information...

  • Article
  • Open Access
3 Citations
3,343 Views
32 Pages

Within a supply chain organisation, where millions of messages are processed, reliability and performance of message throughput are important. Problems can occur with the ingestion of messages; if they arrive more quickly than they can be processed,...

  • Article
  • Open Access
5 Citations
3,615 Views
21 Pages

Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment

  • Siti Fatimah Abdul Razak,
  • Sumendra Yogarayan,
  • Mohd Fikri Azli Abdullah and
  • Afizan Azman

Driver acceptance studies are vital from the manufacturer’s perspective as well as the driver’s perspective. Most empirical investigations are limited to populations in the United States and Europe. Asian communities, particularly in Sout...

  • Article
  • Open Access
14 Citations
7,821 Views
26 Pages

MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation

  • Olga Papadopoulou ,
  • Themistoklis Makedas ,
  • Lazaros Apostolidis ,
  • Francesco Poldi ,
  • Symeon Papadopoulos and
  • Ioannis Kompatsiaris 

The proliferation of online news, especially during the “infodemic” that emerged along with the COVID-19 pandemic, has rapidly increased the risk of and, more importantly, the volume of online misinformation. Online Social Networks (OSNs)...

  • Review
  • Open Access
20 Citations
6,409 Views
28 Pages

A Survey on Memory Subsystems for Deep Neural Network Accelerators

  • Arghavan Asad,
  • Rupinder Kaur and
  • Farah Mohammadi

From self-driving cars to detecting cancer, the applications of modern artificial intelligence (AI) rely primarily on deep neural networks (DNNs). Given raw sensory data, DNNs are able to extract high-level features after the network has been trained...

  • Article
  • Open Access
34 Citations
7,049 Views
20 Pages

Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer

  • Mauro Tropea,
  • Mattia Giovanni Spina,
  • Floriano De Rango and
  • Antonio Francesco Gentile

Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in t...

  • Article
  • Open Access
13 Citations
4,689 Views
24 Pages

Adaptive User Profiling in E-Commerce and Administration of Public Services

  • Kleanthis G. Gatziolis,
  • Nikolaos D. Tselikas and
  • Ioannis D. Moscholios

The World Wide Web is evolving rapidly, and the Internet is now accessible to millions of users, providing them with the means to access a wealth of information, entertainment and e-commerce opportunities. Web browsing is largely impersonal and anony...

  • Article
  • Open Access
32 Citations
6,282 Views
16 Pages

Missing Data Imputation in the Internet of Things Sensor Networks

  • Benjamin Agbo,
  • Hussain Al-Aqrabi,
  • Richard Hill and
  • Tariq Alsboui

The Internet of Things (IoT) has had a tremendous impact on the evolution and adoption of information and communication technology. In the modern world, data are generated by individuals and collected automatically by physical objects that are fitted...

  • Article
  • Open Access
13 Citations
5,720 Views
13 Pages

Users of web or chat social networks typically use emojis (e.g., smilies, memes, hearts) to convey in their textual interactions the emotions underlying the context of the communication, aiming for better interpretability, especially for short polyse...

  • Article
  • Open Access
7 Citations
3,517 Views
16 Pages

Microblogs are one of the major social networks in people’s daily life. The increasing amount of timely microblog data brings new opportunities for enterprises to predict short-term product sales based on microblogs because the daily microblogs...

  • Article
  • Open Access
4 Citations
3,185 Views
17 Pages

Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines

  • Jose Alberto Del Puerto-Flores,
  • José Luis Naredo,
  • Fernando Peña-Campos,
  • Carolina Del-Valle-Soto,
  • Leonardo J. Valdivia and
  • Ramón Parra-Michel

30 April 2022

Digital communication over power lines is an active field of research and most studies in this field focus on low-voltage (LV) and medium-voltage (MV) power systems. Nevertheless, as power companies are starting to provide communication services and...

  • Article
  • Open Access
25 Citations
4,983 Views
20 Pages

30 April 2022

This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the process of building digitalization, guaranteeing...

  • Article
  • Open Access
16 Citations
4,929 Views
18 Pages

A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices

  • Zheyi Chen,
  • Weixian Liao,
  • Pu Tian,
  • Qianlong Wang  and
  • Wei Yu

30 April 2022

Distributed machine learning paradigms have benefited from the concurrent advancement of deep learning and the Internet of Things (IoT), among which federated learning is one of the most promising frameworks, where a central server collaborates with...

  • Article
  • Open Access
2 Citations
3,603 Views
16 Pages

Co-Simulation of Multiple Vehicle Routing Problem Models

  • Sana Sahar Guia,
  • Abdelkader Laouid,
  • Mohammad Hammoudeh,
  • Ahcène Bounceur,
  • Mai Alfawair and
  • Amna Eleyan

29 April 2022

Complex systems are often designed in a decentralized and open way so that they can operate on heterogeneous entities that communicate with each other. Numerous studies consider the process of components simulation in a complex system as a proven app...

  • Review
  • Open Access
34 Citations
5,628 Views
19 Pages

29 April 2022

Energy management in the Internet of Vehicles (IoV) is becoming more prevalent as the usage of distributed Electric Vehicles (EV) grows. As a result, Demand Response (DR) management has been introduced to achieve efficient energy management in IoV. T...

  • Article
  • Open Access
11 Citations
3,205 Views
16 Pages

A Bidirectional Trust Model for Service Delegation in Social Internet of Things

  • Lijun Wei,
  • Yuhan Yang,
  • Jing Wu,
  • Chengnian Long and
  • Yi-Bing Lin

29 April 2022

As an emerging paradigm of service infrastructure, social internet of things (SIoT) applies the social networking aspects to the internet of things (IoT). Each object in SIoT can establish the social relationship without human intervention, which wil...

  • Article
  • Open Access
14 Citations
4,277 Views
13 Pages

Enriching Artificial Intelligence Explanations with Knowledge Fragments

  • Jože Rožanec,
  • Elena Trajkova,
  • Inna Novalija,
  • Patrik Zajec,
  • Klemen Kenda,
  • Blaž Fortuna and
  • Dunja Mladenić

29 April 2022

Artificial intelligence models are increasingly used in manufacturing to inform decision making. Responsible decision making requires accurate forecasts and an understanding of the models’ behavior. Furthermore, the insights into the models&rsq...

  • Article
  • Open Access
2 Citations
3,333 Views
16 Pages

27 April 2022

The multi-agent environment is now widely recognised as a key design abstraction for constructing multi-agent systems, equally important as the agents. An explicitly designed environment may have several roles, such as the inter-mediation between age...

  • Article
  • Open Access
7 Citations
5,239 Views
28 Pages

Measuring Ethical Values with AI for Better Teamwork

  • Erkin Altuntas,
  • Peter A. Gloor and
  • Pascal Budner

27 April 2022

Do employees with high ethical and moral values perform better? Comparing personality characteristics, moral values, and risk-taking behavior with individual and team performance has long been researched. Until now, these determinants of individual p...

  • Article
  • Open Access
3 Citations
4,765 Views
26 Pages

Clinical Trial Classification of SNS24 Calls with Neural Networks

  • Hua Yang,
  • Teresa Gonçalves,
  • Paulo Quaresma,
  • Renata Vieira,
  • Rute Veladas,
  • Cátia Sousa Pinto,
  • João Oliveira,
  • Maria Cortes Ferreira,
  • Jéssica Morais and
  • Carolina Gonçalves
  • + 2 authors

26 April 2022

SNS24, the Portuguese National Health Contact Center, is a telephone and digital public service that provides clinical services. SNS24 plays an important role in the identification of users’ clinical situations according to their symptoms. Curr...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,737 Views
20 Pages

ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services

  • Hassan Mahmood Khan,
  • Fang-Fang Chua and
  • Timothy Tzen Vun Yap

26 April 2022

Dynamic resource provisioning is made more accessible with cloud computing. Monitoring a running service is critical, and modifications are performed when specific criteria are exceeded. It is a standard practice to add or delete resources in such si...

  • Article
  • Open Access
55 Citations
13,780 Views
24 Pages

24 April 2022

Knowledge graphs have, for the past decade, been a hot topic both in public and private domains, typically used for large-scale integration and analysis of data using graph-based data models. One of the central concepts in this area is the Semantic W...

  • Review
  • Open Access
45 Citations
11,435 Views
22 Pages

21 April 2022

Virtual power plants (VPPs) are promising solutions to address the decarbonization and energy efficiency goals in the smart energy grid. They assume the coordination of local energy resources such as energy generation, storage, and consumption. They...

  • Article
  • Open Access
11 Citations
7,393 Views
14 Pages

21 April 2022

The aim of this paper is to examine and analyze how actors in an open data ecosystem collaborate, as well as their activities, to generate value. Thirteen interviews were conducted with actors in the open data network. The information gathered was us...

  • Article
  • Open Access
49 Citations
12,447 Views
27 Pages

A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study

  • Dejan Ravšelj,
  • Lan Umek,
  • Ljupčo Todorovski and
  • Aleksander Aristovnik

21 April 2022

The emergence of digital technologies has profoundly affected and transformed almost every aspect of societal relations. These impacts have also reached public administration, including its governance. Digital technologies’ rise has paved the w...

  • Article
  • Open Access
15 Citations
5,613 Views
20 Pages

Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach

  • Deeraj Nagothu,
  • Ronghua Xu,
  • Yu Chen,
  • Erik Blasch and
  • Alexander Aved

21 April 2022

With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depe...

  • Article
  • Open Access
3 Citations
3,070 Views
19 Pages

20 April 2022

To help developers discover libraries suited to their software projects, automated approaches often start from already employed libraries and recommend more based on co-occurrence patterns in other projects. The most accurate project–library re...

  • Article
  • Open Access
9 Citations
3,947 Views
21 Pages

The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks

  • Annamaria Ficara,
  • Giacomo Fiumara,
  • Salvatore Catanese,
  • Pasquale De Meo and
  • Xiaoyang Liu

20 April 2022

Traditional social network analysis can be generalized to model some networked systems by multilayer structures where the individual nodes develop relationships in multiple layers. A multilayer network is called multiplex if each layer shares at leas...

  • Article
  • Open Access
9 Citations
6,656 Views
24 Pages

An ICN-Based IPFS High-Availability Architecture

  • Ruibin Zeng,
  • Jiali You,
  • Yang Li and
  • Rui Han

19 April 2022

The Interplanetary File System (IPFS), a new type of P2P file system, enables people to obtain data from other peer nodes in a distributed system without the need to establish a connection with a distant server. However, IPFS suffers from low resolut...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903