Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 1

2025 January - 49 articles

Conse
Cover Story: The advent of Wi-Fi sensing has enabled numerous new possibilities in human surveillance and environmental monitoring. This technology poses a significant new risk to our privacy and security, as it has been shown to monitor fine-grained human movements such as typing. Thus, prior work has been motivated to develop techniques to reduce the efficacy of Wi-Fi sensing and restore user privacy. In this endeavour, the injection of interference has proven useful but has come at a tremendous cost to the usability of the wireless communications channel. Thus, this paper explores the conservative application of interference to optimally balance user privacy and Wi-Fi channel bandwidths. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (49)

  • Article
  • Open Access
13 Citations
6,791 Views
35 Pages

Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology

  • Tamai Ramírez-Gordillo,
  • Antonio Maciá-Lillo,
  • Francisco A. Pujol,
  • Nahuel García-D’Urso,
  • Jorge Azorín-López and
  • Higinio Mora

20 January 2025

The exponential growth of the Internet of Things (IoT) necessitates robust, scalable, and secure identity management solutions to handle the vast number of interconnected devices. Traditional centralized identity systems are increasingly inadequate d...

  • Article
  • Open Access
5 Citations
4,030 Views
15 Pages

The Time Machine: Future Scenario Generation Through Generative AI Tools

  • Jan Ferrer i Picó,
  • Michelle Catta-Preta,
  • Alex Trejo Omeñaca,
  • Marc Vidal and
  • Josep Maria Monguet i Fierro

20 January 2025

Contemporary society faces unprecedented challenges—from rapid technological evolution to climate change and demographic tensions—compelling organisations to anticipate the future for informed decision-making. This case study aimed to des...

  • Article
  • Open Access
7 Citations
3,259 Views
24 Pages

Deep Learning Framework for Advanced De-Identification of Protected Health Information

  • Ahmad Aloqaily,
  • Emad E. Abdallah,
  • Rahaf Al-Zyoud,
  • Esraa Abu Elsoud,
  • Malak Al-Hassan and
  • Alaa E. Abdallah

20 January 2025

Electronic health records (EHRs) are widely used in healthcare institutions worldwide, containing vast amounts of unstructured textual data. However, the sensitive nature of Protected Health Information (PHI) embedded within these records presents si...

  • Article
  • Open Access
1,368 Views
19 Pages

Advanced Optimization Algorithm Combining a Fuzzy Inference System for Vehicular Communications

  • Teguh Indra Bayu,
  • Yung-Fa Huang,
  • Jeang-Kuo Chen,
  • Cheng-Hsiung Hsieh,
  • Budhi Kristianto,
  • Erwien Christianto and
  • Suharyadi Suharyadi

20 January 2025

The use of a static modulation coding scheme (MCS), such as 7, and resource keep probability (Prk) value, such as 0.8, was proven to be insufficient to achieve the best packet reception ratio (PRR) performance. Various adaptation techniques have been...

  • Article
  • Open Access
7 Citations
9,699 Views
23 Pages

19 January 2025

Blockchains are the backbone behind cryptocurrency networks, which have developed rapidly in the last two decades. However, this growth has brought several challenges due to the features of these networks, specifically anonymity and decentralization....

  • Article
  • Open Access
3 Citations
2,105 Views
24 Pages

Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks

  • Chung-Wei Kuo,
  • Wei Wei,
  • Chun-Chang Lin,
  • Yu-Yi Hong,
  • Jia-Ruei Liu and
  • Kuo-Yu Tsai

18 January 2025

5G technology and IoT devices are improving efficiency and quality of life across many sectors. IoT devices are often used in open environments where they handle sensitive data. This makes them vulnerable to side-channel attacks (SCAs), where attacke...

  • Review
  • Open Access
7 Citations
3,505 Views
28 Pages

18 January 2025

The advent of 6G networks and beyond calls for innovative paradigms to address the stringent demands of emerging applications, such as extended reality and autonomous vehicles, as well as technological frameworks like digital twin networks. Tradition...

  • Article
  • Open Access
18 Citations
7,139 Views
16 Pages

Digital Twins: Strategic Guide to Utilize Digital Twins to Improve Operational Efficiency in Industry 4.0

  • Italo Cesidio Fantozzi,
  • Annalisa Santolamazza,
  • Giancarlo Loy and
  • Massimiliano Maria Schiraldi

17 January 2025

The Fourth Industrial Revolution, known as Industry 4.0, has transformed the manufacturing landscape by integrating advanced digital technologies, fostering automation, interconnectivity, and data-driven decision-making. Among these innovations, Digi...

  • Review
  • Open Access
13 Citations
6,782 Views
54 Pages

17 January 2025

In the area of agriculture and livestock management, the integration of the Internet of Things (IoT) has emerged as a groundbreaking strategy to enhance operational efficiency and advance intelligent process management. However, this sector faces sig...

  • Article
  • Open Access
1 Citations
1,138 Views
27 Pages

16 January 2025

This paper deals with the optimization of the operational efficiency of a fleet of mobile robots, assigned with delivery-like missions in complex outdoor scenarios. The robots, due to limited onboard computation resources, need to offload some comple...

  • Article
  • Open Access
3 Citations
3,044 Views
17 Pages

16 January 2025

This paper presents a comprehensive study on detecting AI-generated text using transformer models. Our research extends the existing RODICA dataset to create the Enhanced RODICA for Human-Authored and AI-Generated Text (ERH) dataset. We enriched RODI...

  • Article
  • Open Access
5 Citations
3,401 Views
23 Pages

15 January 2025

The Internet of Things (IoT) represents a rapidly growing field, where billions of intelligent devices are interconnected through the Internet, enabling the seamless sharing of data and resources. These smart devices are typically employed to sense v...

  • Article
  • Open Access
5 Citations
3,397 Views
15 Pages

15 January 2025

The digital transformation of the GLAM (galleries, libraries, archives, and museums) sector is a multifaceted process that must address a range of requirements and critical challenges, such as traceability, long-term preservation, and sustainability....

  • Review
  • Open Access
4 Citations
4,691 Views
32 Pages

Survey of Artificial Intelligence Model Marketplace

  • Mian Qian,
  • Abubakar Ahmad Musa,
  • Milon Biswas,
  • Yifan Guo,
  • Weixian Liao and
  • Wei Yu

14 January 2025

The rapid advancement and widespread adoption of artificial intelligence (AI) across diverse industries, including healthcare, finance, manufacturing, and retail, underscore the transformative potential of AI technologies. This necessitates the devel...

  • Article
  • Open Access
2 Citations
1,736 Views
20 Pages

14 January 2025

The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Interne...

  • Article
  • Open Access
3 Citations
2,398 Views
39 Pages

Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning

  • Pablo Corona-Fraga,
  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda Karina Toscano-Medina,
  • Hector Perez-Meana,
  • Jose Portillo-Portillo,
  • Jesus Olivares-Mercado and
  • Luis Javier García Villalba

14 January 2025

In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. Traditional static and dynamic analysis techniques, although widely used, often exhibit high false-positive rates, elevat...

  • Article
  • Open Access
2 Citations
3,695 Views
24 Pages

13 January 2025

With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing....

  • Article
  • Open Access
11 Citations
4,666 Views
29 Pages

13 January 2025

Blockchain technology has been applied in a wide range of domains and has seen major developments in the last years, notably when integrated with other emerging technologies. In this paper, we focus on the integration of blockchain and digital twins...

  • Article
  • Open Access
27 Citations
3,380 Views
17 Pages

Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment

  • Francesco Morgan Bono,
  • Alessio Polinelli,
  • Luca Radicioni,
  • Lorenzo Benedetti,
  • Francesco Castelli-Dezza,
  • Simone Cinquemani and
  • Marco Belloli

10 January 2025

This paper introduces a framework to perform operational modal analysis (OMA) for structural health monitoring (SHM) by presenting the development and validation of a low-power, solar-powered wireless sensor network (WSN) tailored for bridge structur...

  • Article
  • Open Access
21 Citations
21,520 Views
29 Pages

9 January 2025

In an era where fake news detection has become a pressing issue due to its profound impacts on public opinion, democracy, and social trust, accurately identifying and classifying false information is a critical challenge. In this study, the effective...

  • Article
  • Open Access
13 Citations
8,968 Views
23 Pages

High-Risk AI Systems—Lie Detection Application

  • Konstantinos Kalodanis,
  • Panagiotis Rizomiliotis,
  • Georgios Feretzakis,
  • Charalampos Papapavlou and
  • Dimosthenis Anagnostopoulos

8 January 2025

Integrating artificial intelligence into border control systems may help to strengthen security and make operations more efficient. For example, the emerging application of artificial intelligence for lie detection when inspecting passengers presents...

  • Article
  • Open Access
13 Citations
4,432 Views
26 Pages

8 January 2025

As the applications of unmanned aerial vehicles (UAV) expand, reliable communication between UAVs and ground control stations is crucial for successful missions. However, adverse weather conditions caused by atmospheric gases, clouds, fog, rain, and...

  • Article
  • Open Access
14 Citations
3,631 Views
28 Pages

XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System

  • Maiada M. Mahmoud,
  • Yasser Omar Youssef and
  • Ayman A. Abdel-Hamid

8 January 2025

The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. Modern Intrusion Detection Systems (IDSs) must be capable of identifying not only frequent,...

  • Article
  • Open Access
3,308 Views
19 Pages

Ventinel: Automated Detection of Android Vishing Apps Using Optical Character Recognition

  • Daegyeom Kim,
  • Sehwan O,
  • Younghoon Ban,
  • Jungsoo Park,
  • Kyungho Joo and
  • Haehyun Cho

7 January 2025

Vishing, a blend of “voice” and “phishing”, has evolved to include techniques like Call Redirection and Display Overlay Attacks, causing significant financial losses. Existing research has largely focused on user behavior and...

  • Article
  • Open Access
2 Citations
2,954 Views
41 Pages

Framework Design for the Dynamic Reconfiguration of IoT-Enabled Embedded Systems and “On-the-Fly” Code Execution

  • Elmin Marevac,
  • Esad Kadušić,
  • Nataša Živić,
  • Nevzudin Buzađija and
  • Samir Lemeš

7 January 2025

Embedded systems, particularly when integrated into the Internet of Things (IoT) landscape, are critical for projects requiring robust, energy-efficient interfaces to collect real-time data from the environment. As these systems become complex, the n...

  • Article
  • Open Access
12 Citations
6,683 Views
23 Pages

7 January 2025

Edge, fog, and cloud computing provide complementary capabilities to enable distributed processing of IoT data. This requires offloading mechanisms, decision-making mechanisms, support for the dynamic availability of resources, and the cooperation of...

  • Article
  • Open Access
5 Citations
4,970 Views
23 Pages

6 January 2025

The evolving potential of virtual reality and the Metaverse to create immersive, engaging learning experiences and of digital escape room games to provide opportunities for active, autonomous, personalised learning has brought both to the forefront f...

  • Article
  • Open Access
5 Citations
2,173 Views
20 Pages

Conservative Interference Injection to Minimize Wi-Fi Sensing Privacy Risks and Bandwidth Loss

  • Aryan Sharma,
  • Haoming Wang,
  • Deepak Mishra and
  • Aruna Seneviratne

6 January 2025

With the impending integration of sensing capabilities into new wireless standards such as 6G and 802.11 bf, there is a growing threat to public privacy. Recent studies have revealed that even small-scale activities, like keyboard typing, can be sens...

  • Review
  • Open Access
4 Citations
7,449 Views
20 Pages

6 January 2025

As IoT devices with microcontroller (MCU)-based firmware become more common in our lives, memory corruption vulnerabilities in their firmware are increasingly targeted by adversaries. Fuzzing is a powerful method for detecting these vulnerabilities,...

  • Article
  • Open Access
7 Citations
4,627 Views
25 Pages

5 January 2025

Federated Learning (FL) is a distributed machine-learning paradigm that enables models to be trained across multiple decentralized devices or servers holding local data without transferring the raw data to a central location. However, applying FL to...

  • Article
  • Open Access
3 Citations
2,867 Views
23 Pages

5 January 2025

Information-Centric Networking (ICN) typically utilizes DRAM (Dynamic Random Access Memory) to build in-network cache components due to its high data transfer rate and low latency. However, DRAM faces significant limitations in terms of cost and capa...

  • Review
  • Open Access
4 Citations
3,301 Views
30 Pages

Advances in Remote Sensing and Propulsion Systems for Earth Observation Nanosatellites

  • Georgios Fevgas,
  • Thomas Lagkas,
  • Panagiotis Sarigiannidis and
  • Vasileios Argyriou

4 January 2025

The rapid development of nanosatellite technologies, their low development cost, and their economical launching due to their small size have made them an excellent option for Earth Observation (EO) and remote sensing. Nanosatellites are widely used i...

  • Article
  • Open Access
11 Citations
2,478 Views
27 Pages

Explainable Security Requirements Classification Through Transformer Models

  • Luca Petrillo,
  • Fabio Martinelli,
  • Antonella Santone and
  • Francesco Mercaldo

3 January 2025

Security and non-security requirements are two critical issues in software development. Classifying requirements is crucial as it aids in recalling security needs during the early stages of development, ultimately leading to enhanced security in the...

  • Article
  • Open Access
7 Citations
7,139 Views
23 Pages

A Lightweight AI-Based Approach for Drone Jamming Detection

  • Sergio Cibecchini,
  • Francesco Chiti and
  • Laura Pierucci

3 January 2025

The future integration of drones in 6G networks will significantly enhance their capabilities, enabling a wide range of new applications based on autonomous operation. However, drone networks are particularly vulnerable to jamming attacks, a type of...

  • Article
  • Open Access
19 Citations
5,854 Views
20 Pages

A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT

  • Innocent Boakye Ababio,
  • Jan Bieniek,
  • Mohamed Rahouti,
  • Thaier Hayajneh,
  • Mohammed Aledhari,
  • Dinesh C. Verma and
  • Abdellah Chehri

3 January 2025

Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, d...

  • Article
  • Open Access
4 Citations
6,046 Views
24 Pages

FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model

  • Xiaozheng Du,
  • Shijing Hu,
  • Feng Zhou,
  • Cheng Wang and
  • Binh Minh Nguyen

2 January 2025

With the rapid development of prominent models, NL2SQL has made many breakthroughs, but customers still hope that the accuracy of NL2SQL can be continuously improved through optimization. The method based on large models has brought revolutionary cha...

  • Article
  • Open Access
5 Citations
2,707 Views
24 Pages

Cache Aging with Learning (CAL): A Freshness-Based Data Caching Method for Information-Centric Networking on the Internet of Things (IoT)

  • Nemat Hazrati,
  • Sajjad Pirahesh,
  • Bahman Arasteh,
  • Seyed Salar Sefati,
  • Octavian Fratu and
  • Simona Halunga

1 January 2025

Information-centric networking (ICN) changes the way data are accessed by focusing on the content rather than the location of devices. In this model, each piece of data has a unique name, making it accessible directly by name. This approach suits the...

  • Article
  • Open Access
5 Citations
1,802 Views
21 Pages

1 January 2025

In this study, the challenge of teleoperating robots in harsh environments such as underwater or in tunnels is addressed. In these environments, wireless communication networks are prone to congestion, leading to potential mission failures. Our appro...

  • Article
  • Open Access
10 Citations
2,575 Views
30 Pages

Considering that smart vehicles are becoming interconnected through the Internet of Vehicles, cybersecurity threats like Distributed Denial of Service (DDoS) attacks pose a great challenge. Detection methods currently face challenges due to the compl...

  • Article
  • Open Access
15 Citations
4,748 Views
26 Pages

31 December 2024

The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. Traditional Web Application Firewalls (WAFs) often fail to keep p...

  • Article
  • Open Access
4 Citations
9,983 Views
19 Pages

Shared-Custodial Wallet for Multi-Party Crypto-Asset Management

  • Yimika Erinle,
  • Yebo Feng,
  • Jiahua Xu,
  • Nikhil Vadgama and
  • Paolo Tasca

31 December 2024

Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. However, typical blockchain wallets often encounter performance, privacy and cost issues when utilising multi-signature sc...

  • Article
  • Open Access
1 Citations
1,004 Views
27 Pages

29 December 2024

Proximity-based content sharing between nearby devices in cellular networks using device-to-device (D2D) communications—without routing through the base station—has emerged as a promising solution for offloading traffic from the core cell...

  • Article
  • Open Access
1 Citations
1,697 Views
23 Pages

A Blockchain-Based Protocol for Fair Delivery for Receipts

  • M. Francisca Hinarejos,
  • Josep-Lluis Ferrer-Gomila,
  • Andreu-Pere Isern-Deyà and
  • Gerardo-Francisco Chévez-Alvarado

27 December 2024

Message exchange for acknowledgment of receipt (e.g., for services that provide recipients with certain documents, such as sanctions, summonses, or requirements, which are often sent by public administrations) has traditionally been provided through...

  • Article
  • Open Access
7 Citations
4,105 Views
22 Pages

26 December 2024

Federated learning (FL) has emerged as a promising solution for the Internet of Things (IoT), facilitating distributed artificial intelligence while ensuring communication efficiency and data privacy. Traditional methods involve transmitting raw sens...

  • Article
  • Open Access
1 Citations
1,631 Views
20 Pages

WebTrackingScore: A Combined Web Tracking Risk Score System for Websites

  • Álvaro D. Guillén Cava and
  • Antonio Ruiz-Martínez

25 December 2024

Privacy awareness has increased in recent years. In many countries, websites warn users about their use of cookies and Web browsers provide mechanisms to protect user privacy. However, it is not easy for users to understand tracking risks associated...

  • Article
  • Open Access
9 Citations
2,079 Views
21 Pages

25 December 2024

The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Thing...

  • Review
  • Open Access
12 Citations
9,141 Views
29 Pages

24 December 2024

Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903