Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 16, Issue 9

2024 September - 45 articles

Cover Story: This study envisions a novel framework to declaratively deploy next-generation 5G mobile core across sites following the liquid computing paradigm (provided by Liqo operator) for offloading both user and control planes to remote clusters. A full stack perspective is genuinely imprinted since the network slicing layer is orchestrated by Kubernetes, whereas monitoring and observability are achieved by employing a service-mesh solution (Istio). Conversely, the networking function and service layer are covered by the Liqo control plane that ensures that the overlay network communicates between sites through APIs. Different strategies for peering between clusters are proposed, and the obtained results show a significant improvement in network performance in the case of in-band peering when VPN tunneling is applied between sites. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (45)

  • Article
  • Open Access
4 Citations
5,041 Views
31 Pages

23 September 2024

Some challenges when implementing the optimized link state routing (OLSR) protocol on real-life devices and simulators are unmanageable: link quality, rapid energy depletion, and high processor loads. The causes of these challenges are link state pro...

  • Article
  • Open Access
2 Citations
6,584 Views
26 Pages

23 September 2024

The Internet of Underwater Things (IoUT) represents an emerging and innovative field with the potential to revolutionize underwater exploration and monitoring. Despite its promise, IoUT faces significant challenges related to reliability and security...

  • Review
  • Open Access
16 Citations
6,995 Views
19 Pages

Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing

  • Jobish John,
  • Md. Noor-A-Rahim,
  • Aswathi Vijayan,
  • H. Vincent Poor and
  • Dirk Pesch

21 September 2024

This paper explores the role that 5G, WiFi 7, and Time-Sensitive Networking (TSN) play in driving smart manufacturing as a fundamental part of the Industry 4.0 vision. It provides an in-depth analysis of each technology’s application in industr...

  • Article
  • Open Access
1 Citations
1,687 Views
28 Pages

Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations

  • Ondrej Kobza,
  • David Herel,
  • Jan Cuhel,
  • Tommaso Gargiani,
  • Petr Marek and
  • Jan Sedivy

21 September 2024

This article introduces Alquist 5.0, our SocialBot that was designed for the Alexa Prize SocialBot Grand Challenge 5. Building upon previous iterations, we present the integration of our novel neural response generator (NRG) Barista within a hybrid a...

  • Review
  • Open Access
2 Citations
2,528 Views
33 Pages

20 September 2024

This paper intends to provide the reader with an overview of the main processes that are introducing artificial intelligence (AI) into healthcare services. The first part is organized according to an evolutionary perspective. We first describe the ro...

  • Article
  • Open Access
1,359 Views
13 Pages

Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation

  • Jesus Calle-Cancho,
  • Carlos Cañada,
  • Rafael Pastor-Vargas,
  • Mercedes E. Paoletti and
  • Juan M. Haut

20 September 2024

With the rapid advancement of the Internet of Things and the emergence of 6G networks in smart city environments, a growth in the generation of data, commonly known as big data, is expected to consequently lead to higher latency. To mitigate this lat...

  • Article
  • Open Access
1 Citations
6,208 Views
31 Pages

Efficient Data Exchange between WebAssembly Modules

  • Lucas Silva,
  • José Metrôlho and
  • Fernando Ribeiro

20 September 2024

In the past two decades, there has been a noticeable decoupling of machines and operating systems. In this context, WebAssembly has emerged as a promising alternative to traditional virtual machines. Originally designed for execution in web browsers,...

  • Article
  • Open Access
4 Citations
2,802 Views
19 Pages

20 September 2024

The Industrial Internet of Things (IIoT) enhances and optimizes operations and product quality by reducing expenses and preserving critical factory components. The IIoT can also be integrated into the processes of small and medium-sized enterprises (...

  • Article
  • Open Access
12 Citations
7,554 Views
22 Pages

20 September 2024

The purpose of this study is to evaluate and compare how well different routing protocols perform in terms of load sharing, link failover, and overall network performance. Wireshark was used for packet-level analysis, VMWare was used for virtualizati...

  • Article
  • Open Access
5 Citations
3,344 Views
17 Pages

Traffic Classification in Software-Defined Networking Using Genetic Programming Tools

  • Spiridoula V. Margariti,
  • Ioannis G. Tsoulos,
  • Evangelia Kiousi and
  • Eleftherios Stergiou

19 September 2024

The classification of Software-Defined Networking (SDN) traffic is an essential tool for network management, network monitoring, traffic engineering, dynamic resource allocation planning, and applying Quality of Service (QoS) policies. The programmab...

  • Review
  • Open Access
22 Citations
9,104 Views
40 Pages

A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems

  • Waleed Shahjehan,
  • Rajkumar Singh Rathore,
  • Syed Waqar Shah,
  • Mohammad Aljaidi,
  • Ali Safaa Sadiq and
  • Omprakash Kaiwartya

14 September 2024

As the world braces for an era of ubiquitous and seamless connectivity, hybrid beamforming stands out as a beacon guiding the evolutionary path of wireless communication technologies. Several hybrid beamforming technologies are explored for millimete...

  • Article
  • Open Access
3 Citations
5,081 Views
20 Pages

13 September 2024

Mirai, an IoT malware that emerged in 2016, has been used for large-scale DDoS attacks. The Mirai source code is publicly available and continues to be a threat with a variety of variants still in existence. In this paper, we propose an implementatio...

  • Article
  • Open Access
1,389 Views
25 Pages

Parallel and Distributed Frugal Tracking of a Quantile

  • Italo Epicoco,
  • Marco Pulimeno and
  • Massimo Cafaro

13 September 2024

In this paper, we deal with the problem of monitoring network latency. Indeed, latency is a key network metric related to both network performance and quality of service, since it directly impacts on the overall user’s experience. High latency...

  • Article
  • Open Access
3 Citations
5,801 Views
25 Pages

13 September 2024

While the massive adoption of Artificial Intelligence (AI) is threatening the environment, new research efforts begin to be employed to measure and mitigate the carbon footprint of both training and inference phases. In this domain, two carbon-aware...

  • Article
  • Open Access
5 Citations
3,274 Views
20 Pages

11 September 2024

Task offloading and resource allocation is a research hotspot in cloud-edge collaborative computing. Many existing pieces of research adopted single-agent reinforcement learning to solve this problem, which has some defects such as low robustness, la...

  • Article
  • Open Access
3 Citations
1,648 Views
20 Pages

11 September 2024

There is a growing interest in high-altitude platform stations (HAPSs) as potential telecommunication infrastructures in the stratosphere, providing direct communication services to ground-based smartphones. Enhanced coverage and capacity can be real...

  • Article
  • Open Access
6 Citations
2,538 Views
25 Pages

10 September 2024

The rise of 5G networks is driven by increasing deployments of IoT devices and expanding mobile and fixed broadband subscriptions. Concurrently, the deployment of 5G networks has led to a surge in network-related attacks, due to expanded attack surfa...

  • Article
  • Open Access
3 Citations
7,035 Views
33 Pages

10 September 2024

For over forty years, TCP has been the main protocol for transporting data on the Internet. To improve congestion control algorithms (CCAs), delay bounding algorithms such as Vegas, FAST, BBR, PCC, and Copa have been developed. However, despite being...

  • Systematic Review
  • Open Access
75 Citations
25,232 Views
28 Pages

10 September 2024

Edge computing promising a vision of processing data close to its generation point, reducing latency and bandwidth usage compared with traditional cloud computing architectures, has attracted significant attention lately. The integration of edge comp...

  • Article
  • Open Access
2,412 Views
20 Pages

A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs

  • Haitham Y. Adarbah,
  • Mehmet Sabir Kiraz,
  • Suleyman Kardas,
  • Ali H. Al-Bayatti and
  • Hilal M. Y. Al-Bayatti

9 September 2024

This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation,...

  • Article
  • Open Access
3 Citations
1,877 Views
25 Pages

Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects

  • Michele Ruta,
  • Floriano Scioscia,
  • Giuseppe Loseto,
  • Agnese Pinto,
  • Corrado Fasciano,
  • Giovanna Capurso and
  • Eugenio Di Sciascio

8 September 2024

Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability a...

  • Article
  • Open Access
1 Citations
1,480 Views
17 Pages

Privacy-Preserving Authentication Based on PUF for VANETs

  • Lihui Li,
  • Hanwen Deng,
  • Zhongyi Zhai and
  • Sheng-Lung Peng

8 September 2024

The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist ph...

  • Article
  • Open Access
2 Citations
2,317 Views
22 Pages

A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core

  • Oana-Mihaela Dumitru-Guzu,
  • Vlădeanu Călin and
  • Robert Kooij

6 September 2024

Cloud-native technologies are widely considered the ideal candidates for the future of vertical application development due to their boost in flexibility, scalability, and especially cost efficiency. Since multi-site support is paramount for 5G, we e...

  • Review
  • Open Access
19 Citations
6,788 Views
15 Pages

6 September 2024

The integration of machine learning (ML), blockchain, and the Internet of Things (IoT) in smart cities represents a pivotal advancement in urban innovation. This convergence addresses the complexities of modern urban environments by leveraging ML&rsq...

  • Article
  • Open Access
6 Citations
2,751 Views
24 Pages

Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement

  • Carolina Del-Valle-Soto,
  • Ramon A. Briseño,
  • Ramiro Velázquez,
  • Gabriel Guerra-Rosales,
  • Santiago Perez-Ochoa,
  • Isaac H. Preciado-Bazavilvazo,
  • Paolo Visconti and
  • José Varela-Aldás

6 September 2024

This research explores the application of wireless sensor networks for the non-invasive monitoring of sleep quality and vital signs in elderly individuals, addressing significant challenges faced by the aging population. The study implemented and eva...

  • Article
  • Open Access
2 Citations
6,704 Views
32 Pages

Are Strong Baselines Enough? False News Detection with Machine Learning

  • Lara Aslan,
  • Michal Ptaszynski and
  • Jukka Jauhiainen

5 September 2024

False news refers to false, fake, or misleading information presented as real news. In recent years, there has been a noticeable increase in false news on the Internet. The goal of this paper was to study the automatic detection of such false news us...

  • Article
  • Open Access
3 Citations
3,445 Views
35 Pages

4 September 2024

Smart contracts are programs that reside and execute on a blockchain, like any transaction. They are automatically executed when preprogrammed terms and conditions are met. Although the smart contract (SC) must be presented in the blockchain for the...

  • Article
  • Open Access
5 Citations
5,433 Views
24 Pages

A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology

  • Di Li,
  • Zhibang Yang,
  • Siyang Yu,
  • Mingxing Duan and
  • Shenghong Yang

4 September 2024

As information technology continues to evolve, cloud data centres have become increasingly prominent as the preferred infrastructure for data storage and processing. However, this shift has introduced a new array of security challenges, necessitating...

  • Article
  • Open Access
1 Citations
1,928 Views
19 Pages

3 September 2024

Workflows orchestrate a collection of computing tasks to form a complex workflow logic. Different from the traditional monolithic workflow management systems, modern workflow systems often manifest high throughput, concurrency and scalability. As ser...

  • Review
  • Open Access
109 Citations
34,105 Views
34 Pages

Graph Attention Networks: A Comprehensive Review of Methods and Applications

  • Aristidis G. Vrahatis,
  • Konstantinos Lazaros and
  • Sotiris Kotsiantis

3 September 2024

Real-world problems often exhibit complex relationships and dependencies, which can be effectively captured by graph learning systems. Graph attention networks (GATs) have emerged as a powerful and versatile framework in this direction, inspiring num...

  • Article
  • Open Access
3 Citations
1,535 Views
24 Pages

2 September 2024

In the future, smart cities will provide key services including seamless communication, intelligent transport systems, advanced healthcare platforms, urban and infrastructure management, and digital services for local and regional government. Therefo...

  • Article
  • Open Access
5 Citations
5,221 Views
20 Pages

Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing

  • Sérgio N. Silva,
  • Mateus A. S. de S. Goldbarg,
  • Lucileide M. D. da Silva and
  • Marcelo A. C. Fernandes

2 September 2024

This paper presents a fuzzy logic-based approach for replica scaling in a Kubernetes environment, focusing on integrating Edge Computing. The proposed FHS (Fuzzy-based Horizontal Scaling) system was compared to the standard Kubernetes scaling mechani...

  • Review
  • Open Access
18 Citations
8,360 Views
16 Pages

29 August 2024

Layer 2 solutions have emerged in recent years as a valuable alternative to increase the throughput and scalability of blockchain-based architectures. The three primary types of Layer 2 solutions are state channels, sidechains, and rollups. The rollu...

  • Article
  • Open Access
2 Citations
13,011 Views
33 Pages

CrossDeFi: A Novel Cross-Chain Communication Protocol

  • Shezon Saleem Mohammed Abdul,
  • Anup Shrestha and
  • Jianming Yong

29 August 2024

Decentralized finance (DeFi) is rapidly evolving, promising to revolutionize financial services through blockchain technology. Successful integration of asset transfers across diverse DeFi platforms hinges on effective interoperability and transactio...

  • Article
  • Open Access
4 Citations
4,407 Views
24 Pages

29 August 2024

The backoff algorithm employed by the medium access control (MAC) protocol of the IEEE 802.15.4 standard has a significant impact on the overall performance of the wireless sensor network (WSN). This algorithm helps the MAC protocol resolve the conte...

  • Article
  • Open Access
5 Citations
2,316 Views
14 Pages

28 August 2024

Massive computational resources are required by a booming number of artificial intelligence (AI) services in the communication network of the smart grid. To alleviate the computational pressure on data centers, edge computing first network (ECFN) can...

  • Article
  • Open Access
1 Citations
4,706 Views
29 Pages

User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks

  • Farid Yessoufou,
  • Salma Sassi,
  • Elie Chicha,
  • Richard Chbeir and
  • Jules Degila

28 August 2024

With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’...

  • Article
  • Open Access
5 Citations
2,956 Views
18 Pages

27 August 2024

The burgeoning development of next-generation technologies, especially the Industrial Internet of Things (IIoT), has heightened interest in predictive maintenance (PdM). Accurate failure forecasting and prompt responses to downtime are essential for...

  • Article
  • Open Access
8 Citations
4,395 Views
27 Pages

27 August 2024

In this work, we present a new protocol that accomplishes multiparty quantum private comparison leveraging maximally entangled |GHZ3 triplets. Our intention was to develop a protocol that can be readily executed by contemporary quantum comput...

  • Article
  • Open Access
2 Citations
1,861 Views
19 Pages

PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA

  • Parisa Mashreghi-Moghadam,
  • Tarek Ould-Bachir and
  • Yvon Savaria

27 August 2024

The increasing complexity of modern networks and their evolving needs demand flexible, high-performance packet processing solutions. The P4 language excels in specifying packet processing in software-defined networks (SDNs). Field-programmable gate a...

  • Review
  • Open Access
22 Citations
16,679 Views
32 Pages

27 August 2024

The rapid development of AI technology in recent years has led to its widespread use in daily life, where it plays an increasingly important role. In healthcare, AI has been integrated into the field to develop the new domain of smart healthcare. In...

  • Article
  • Open Access
1 Citations
1,107 Views
18 Pages

Evaluation of a New-Concept Secure File Server Solution

  • Gábor Arányi,
  • Ágnes Vathy-Fogarassy and
  • Veronika Szücs

26 August 2024

Ransomware attacks are becoming increasingly sophisticated, and defensive solutions must necessarily evolve. Unfortunately, automated backup management through validation—critical for data recovery after an attack—and strengthening file s...

  • Article
  • Open Access
3 Citations
2,051 Views
15 Pages

Personalized Visualization of the Gestures of Parkinson’s Disease Patients with Virtual Reality

  • Konstantinos Sakkas,
  • Eirini Georgia Dimitriou,
  • Niki Eleni Ntagka,
  • Nikolaos Giannakeas,
  • Konstantinos Kalafatakis,
  • Alexandros T. Tzallas and
  • Evripidis Glavas

23 August 2024

Parkinson’s disease is a neurological disorder characterized by motor and non-motor symptoms. Assessment methods, despite the many years of existence of the disease, lack individualized visualization. On the other hand, virtual reality promises...

  • Article
  • Open Access
9 Citations
2,482 Views
22 Pages

23 August 2024

One of the most common mitigations against network-borne security threats is the deployment of firewalls, i.e., systems that can observe traffic and apply rules to let it through if it is benign or drop packets that are recognized as malicious. Cheap...

  • Article
  • Open Access
2 Citations
3,002 Views
23 Pages

23 August 2024

This study applies a forensic examination to six distinct Android fitness applications centered around monitoring running activities. The applications are Adidas Running, MapMyWalk, Nike Run Club, Pumatrac, Runkeeper and Strava. Specifically, we perf...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903