Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 15, Issue 6

2023 June - 33 articles

Cover Story: As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different cyberattacks. WSNs have unique characteristics and several limitations which harden the design of effective attack prevention and detection techniques. This paper aims to provide a comprehensive understanding of the fundamental principles underlying cybersecurity in WSNs. In addition to discussing primarily state-of-the-art Machine Learning (ML) and Blockchain (BC) security techniques highlighting security aspects in WSNs, the paper investigates integrating BC and ML towards developing a lightweight security framework that consists of two lines of defense, i.e., cyberattacks detection and prevention in WSNs, emphasizing on their design insights and challenges. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (33)

  • Article
  • Open Access
5 Citations
4,416 Views
17 Pages

RSSI and Device Pose Fusion for Fingerprinting-Based Indoor Smartphone Localization Systems

  • Imran Moez Khan,
  • Andrew Thompson,
  • Akram Al-Hourani,
  • Kandeepan Sithamparanathan and
  • Wayne S. T. Rowe

Complementing RSSI measurements at anchors with onboard smartphone accelerometer measurements is a popular research direction to improve the accuracy of indoor localization systems. This can be performed at different levels; for example, many studies...

  • Article
  • Open Access
7 Citations
7,401 Views
21 Pages

The introduction of artificial neural networks to speech recognition applications has sparked the rapid development and popularization of digital assistants. These digital assistants constantly monitor the audio captured by a microphone for a small s...

  • Article
  • Open Access
3 Citations
2,646 Views
19 Pages

Fifth-generation technologies have reached a stage where it is now feasible to consider deployments that extend beyond traditional public networks. Central to this process is the application of Fixed Wireless Access (FWA) in 5G Non-public Networks (N...

  • Article
  • Open Access
5 Citations
3,297 Views
19 Pages

With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where cer...

  • Article
  • Open Access
3 Citations
2,853 Views
15 Pages

Technology anxiety contributes to an increased cognitive load and reduces user adoption of novel technologies. An illustrative example of this phenomenon is observed in the field of smart homes.To address this issue, we have identified an interaction...

  • Article
  • Open Access
2 Citations
1,942 Views
19 Pages

The dual-channel graph collaborative filtering recommendation algorithm (DCCF) suppresses the over-smoothing problem and overcomes the problem of expansion in local structures only in graph collaborative filtering. However, DCCF has the following pro...

  • Article
  • Open Access
8 Citations
2,751 Views
22 Pages

Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware

  • Jinting Zhu,
  • Julian Jang-Jaccard,
  • Amardeep Singh,
  • Paul A. Watters and
  • Seyit Camtepe

Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware fam...

  • Feature Paper
  • Article
  • Open Access
14 Citations
6,019 Views
19 Pages

BERT4Loc: BERT for Location—POI Recommender System

  • Syed Raza Bashir,
  • Shaina Raza and
  • Vojislav B. Misic

Recommending points of interest (POI) is a challenging task that requires extracting comprehensive location data from location-based social media platforms. To provide effective location-based recommendations, it is important to analyze users’ histor...

  • Article
  • Open Access
11 Citations
3,972 Views
16 Pages

Blockchain adopts a chain data structure, and the characteristics of blocks that can only be added and cannot be deleted make the total number of blocks accumulate over time, forcing resource-constrained nodes to become degraded nodes in order to all...

  • Article
  • Open Access
4 Citations
3,936 Views
29 Pages

Searching Online for Art and Culture: User Behavior Analysis

  • Minas Pergantis,
  • Iraklis Varlamis,
  • Nikolaos Grigorios Kanellopoulos and
  • Andreas Giannakoulopoulos

With the constant expansion of the Web, search engines became part of people’s daily routines. How users behave during the search process depends on a variety factors, one of which is the topic of their search interest. This study focused on th...

  • Article
  • Open Access
7 Citations
6,446 Views
30 Pages

The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a conc...

  • Article
  • Open Access
14 Citations
3,901 Views
19 Pages

A DQN-Based Multi-Objective Participant Selection for Efficient Federated Learning

  • Tongyang Xu,
  • Yuan Liu,
  • Zhaotai Ma,
  • Yiqiang Huang and
  • Peng Liu

As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heter...

  • Article
  • Open Access
18 Citations
4,911 Views
25 Pages

A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards

  • Khaled A. M. Ahmed,
  • Sabry F. Saraya,
  • John F. Wanis and
  • Amr M. T. Ali-Eldin

Open finance is evolving and extending open banking. This creates a large context that implies a financial and identity data exchange paradigm, which faces challenges to balance customer experience, security, and the self-control over personal identi...

  • Article
  • Open Access
10 Citations
2,886 Views
27 Pages

The Social Internet of Things (SIoT) paradigm combines the benefits of social networks with IoT networks to create more collaborative and efficient systems, offering enhanced scalability, better navigability, flexibility, and dynamic decision making....

  • Article
  • Open Access
7 Citations
4,033 Views
29 Pages

Anomaly Detection for Hydraulic Power Units—A Case Study

  • Paweł Fic,
  • Adam Czornik and
  • Piotr Rosikowski

This article aims to present the real-world implementation of an anomaly detection system of a hydraulic power unit. Implementation involved the Internet of Things approach. A detailed description of the system architecture is provided. The complete...

  • Review
  • Open Access
19 Citations
7,945 Views
35 Pages

Semantic segmentation is a critical task in computer vision that aims to assign each pixel in an image a corresponding label on the basis of its semantic content. This task is commonly referred to as dense labeling because it requires pixel-level cla...

  • Article
  • Open Access
3 Citations
2,596 Views
24 Pages

Avoiding Detection by Hostile Nodes in Airborne Tactical Networks

  • Dragos Ilie,
  • Håkan Grahn,
  • Lars Lundberg,
  • Alexander Westerhagen,
  • Bo Granbom and
  • Anders Höök

Contemporary airborne radio networks are usually implemented using omnidirectional antennas. Unfortunately, such networks suffer from disadvantages such as easy detection by hostile aircraft and potential information leakage. In this paper, we presen...

  • Review
  • Open Access
23 Citations
6,363 Views
19 Pages

The Internet of Things (IoT) compromises multiple devices connected via a network to perform numerous activities. The large amounts of raw user data handled by IoT operations have driven researchers and developers to provide guards against any malici...

  • Article
  • Open Access
5 Citations
2,673 Views
18 Pages

PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks

  • Ernesto Cadena Muñoz,
  • Gustavo Chica Pedraza,
  • Rafael Cubillos-Sánchez,
  • Alexander Aponte-Moreno and
  • Mónica Espinosa Buitrago

The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature...

  • Review
  • Open Access
6 Citations
7,517 Views
28 Pages

Metaphors are an integral and important part of human communication and greatly impact the way our thinking is formed and how we understand the world. The theory of the conceptual metaphor has shifted the focus of research from words to thinking, and...

  • Review
  • Open Access
65 Citations
10,599 Views
45 Pages

As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs) are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have several limitations which complicate the design of effective attack pre...

  • Article
  • Open Access
35 Citations
5,197 Views
24 Pages

Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey

  • Abubakar Ahmad Musa,
  • Adamu Hussaini,
  • Weixian Liao,
  • Fan Liang and
  • Wei Yu

Cyber-physical systems (CPS) refer to systems that integrate communication, control, and computational elements into physical processes to facilitate the control of physical systems and effective monitoring. The systems are designed to interact with...

  • Article
  • Open Access
2 Citations
2,732 Views
26 Pages

Synchronizing Many Filesystems in Near Linear Time

  • Elod P. Csirmaz and
  • Laszlo Csirmaz

Finding a provably correct subquadratic synchronization algorithm for many filesystem replicas is one of the main theoretical problems in operational transformation (OT) and conflict-free replicated data types (CRDT) frameworks. Based on the algebrai...

  • Article
  • Open Access
2,723 Views
21 Pages

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

  • Yiming Zhu,
  • Dehua Zhou,
  • Yuan Li,
  • Beibei Song and
  • Chuansheng Wang

Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful to...

  • Review
  • Open Access
7 Citations
4,925 Views
20 Pages

Task Automation Intelligent Agents: A Review

  • Abdul Wali,
  • Saipunidzam Mahamad and
  • Suziah Sulaiman

As technological advancements increase exponentially, mobile phones become smarter with machine learning and artificial intelligence algorithms. These advancements have allowed mobile phone users to perform most of their daily routine tasks on mobile...

  • Article
  • Open Access
1 Citations
2,567 Views
13 Pages

With the advancement of IoT technologies, there is a large amount of data available from wireless sensor networks (WSN), particularly for studying climate change. Clustering long and noisy time series has become an important research area for analyzi...

  • Article
  • Open Access
6 Citations
3,567 Views
14 Pages

Research and Design of a Decentralized Edge-Computing-Assisted LoRa Gateway

  • Han Gao,
  • Zhangqin Huang,
  • Xiaobo Zhang and
  • Huapeng Yang

As a narrowband communication technology, long-range (LoRa) contributes to the long development of Internet of Things (IoT) applications. The LoRa gateway plays an important role in the IoT transport layer, and security and efficiency are the key iss...

  • Article
  • Open Access
9 Citations
3,124 Views
16 Pages

Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches

  • Abdul Majeed,
  • Abdullah M. Alnajim,
  • Athar Waseem,
  • Aleem Khaliq,
  • Aqdas Naveed,
  • Shabana Habib,
  • Muhammad Islam and
  • Sheroz Khan

In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been...

  • Review
  • Open Access
511 Citations
129,028 Views
24 Pages

ChatGPT and Open-AI Models: A Preliminary Review

  • Konstantinos I. Roumeliotis and
  • Nikolaos D. Tselikas

According to numerous reports, ChatGPT represents a significant breakthrough in the field of artificial intelligence. ChatGPT is a pre-trained AI model designed to engage in natural language conversations, utilizing sophisticated techniques from Natu...

  • Article
  • Open Access
8 Citations
4,522 Views
17 Pages

In-Depth Co-Design of Mental Health Monitoring Technologies by People with Lived Experience

  • Bronwin Patrickson,
  • Mike Musker,
  • Dan Thorpe,
  • Yasmin van Kasteren,
  • Niranjan Bidargaddi and
  • The Consumer and Carer Advisory Group (CCAG)

Advancements in digital monitoring solutions collaborate closely with electronic medical records. These fine-grained monitoring capacities can generate and process extensive electronic record data. Such capacities promise to enhance mental health car...

  • Article
  • Open Access
6 Citations
3,767 Views
19 Pages

The use of Elastic Stack (ELK) solutions and Knowledge Graphs (KGs) has attracted a lot of attention lately, with promises of vastly improving business performance based on new business insights and better decisions. This allows organizations not onl...

  • Review
  • Open Access
42 Citations
7,920 Views
23 Pages

Non-fungible tokens (NFT) represent one of the most important technologies in the space of Web3. Thanks to NFTs, digital or physical assets can be tokenised to represent their ownership through the usage of smart contracts and blockchains. The first...

  • Article
  • Open Access
37 Citations
12,637 Views
17 Pages

Digital Art and the Metaverse: Benefits and Challenges

  • William Hurst,
  • Orestis Spyrou,
  • Bedir Tekinerdogan and
  • Caspar Krampe

As a concept that is somewhat under emergence, the notion of the Metaverse varies across different academic articles. Yet there is a shared view on the benefits to its ongoing implementation, particularly for digital art, where the technology can pro...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903