Skip Content
You are currently on the new version of our website. Access the old version .

Future Internet, Volume 17, Issue 8

2025 August - 58 articles

Cover Story: Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that emphasizes content names rather than host addresses for communication. Interest Flooding Attacks (IFAs) exploit the Pending Interest Table (PIT) by injecting malicious Interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks. We examine detection and mitigation strategies from 2013 to 2024 to provide current insights into this evolving security challenge. This survey establishes a taxonomy of attack variants, extends to domain-specific implementations in resource-constrained environments, examines adaptations for Internet of Things (IoT) and high-mobility vehicular scenarios, and highlights five critical research directions. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (58)

  • Article
  • Open Access
1 Citations
735 Views
21 Pages

21 August 2025

In the context of secure and efficient data transmission over the future Internet, particularly for remote sensing and geospatial applications, reversible data hiding (RDH) in encrypted hyperspectral images (HSIs) has emerged as a critical technology...

  • Article
  • Open Access
1,322 Views
30 Pages

21 August 2025

With the widespread application of Internet of Things (IoT) devices, the security of embedded systems faces severe challenges. As an embedded operating system widely used in critical mission scenarios, the security of the TCP stack in VxWorks directl...

  • Systematic Review
  • Open Access
1,117 Views
33 Pages

19 August 2025

This umbrella review aimed to identify, analyze, and synthesize the results of existing literature reviews related to patient-oriented smart applications to support healthcare provision for patients with Parkinson’s. An electronic search was co...

  • Systematic Review
  • Open Access
4 Citations
5,406 Views
34 Pages

18 August 2025

Anomaly detection plays an increasingly important role in maintaining the stability and reliability of modern distributed systems. Federated Learning (FL) is an emerging method that shows strong potential in enabling anomaly detection across decentra...

  • Article
  • Open Access
1 Citations
1,337 Views
39 Pages

Efficient Charging Station Selection for Minimizing Total Travel Time of Electric Vehicles

  • Yaqoob Al-Zuhairi,
  • Prashanth Kannan,
  • Alberto Bazán Guillén,
  • Luis J. de la Cruz Llopis and
  • Mónica Aguilar Igartua

18 August 2025

Electric vehicles (EVs) have gained significant attention in recent decades for their environmental benefits. However, their widespread adoption poses challenges due to limited charging infrastructure and long charging times, often resulting in under...

  • Article
  • Open Access
869 Views
13 Pages

Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations

  • Yonit Rusho,
  • Daphne Ruth Raban,
  • Michal Chalamish and
  • Vered Pnueli

18 August 2025

This study examines the influence of software agents on information-sharing behavior within security-sensitive organizations, where confidentiality and hierarchical culture often limit the flow of knowledge. While such organizations aim to collect, a...

  • Article
  • Open Access
1,586 Views
29 Pages

A Hybrid Zero Trust Deployment Model for Securing O-RAN Architecture in 6G Networks

  • Max Hashem Eiza,
  • Brian Akwirry,
  • Alessandro Raschella,
  • Michael Mackay and
  • Mukesh Kumar Maheshwari

18 August 2025

The evolution toward sixth generation (6G) wireless networks promises higher performance, greater flexibility, and enhanced intelligence. However, it also introduces a substantially enlarged attack surface driven by open, disaggregated, and multi-ven...

  • Article
  • Open Access
1,430 Views
24 Pages

Unsupervised Person Re-Identification via Deep Attribute Learning

  • Shun Zhang,
  • Yaohui Xu,
  • Xuebin Zhang,
  • Boyang Cheng and
  • Ke Wang

15 August 2025

Driven by growing public security demands and the advancement of intelligent surveillance systems, person re-identification (ReID) has emerged as a prominent research focus in the field of computer vision. However, this task presents challenges due t...

  • Article
  • Open Access
1 Citations
1,162 Views
17 Pages

15 August 2025

The increasing demand for accessible and efficient machine learning solutions has led to the development of the Adaptive Learning Framework (ALF) for multi-class, single-label image classification. Unlike existing low-code tools, ALF integrates multi...

  • Article
  • Open Access
2 Citations
882 Views
17 Pages

14 August 2025

To address the issues of high energy consumption, data collisions, and invalid wake-ups of nontarget nodes in large-scale node-deployment scenarios of long-range (LoRa) star networks, this paper proposes an energy-saving wake-up scheme that combines...

  • Review
  • Open Access
1 Citations
3,253 Views
29 Pages

14 August 2025

Intelligent manufacturing research has focused on digital twins (DTs) due to the growing integration of physical and cyber systems. This study thoroughly explores the Internet of Things (IoT) as a cornerstone of DTs, showing its promise and limitatio...

  • Article
  • Open Access
1 Citations
1,349 Views
29 Pages

DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN

  • Shengmin Peng,
  • Jialin Tian,
  • Xiangyu Zheng,
  • Shuwu Chen and
  • Zhaogang Shu

13 August 2025

With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from...

  • Systematic Review
  • Open Access
5 Citations
9,057 Views
22 Pages

The Future of Education: A Systematic Literature Review of Self-Directed Learning with AI

  • Carmen del Rosario Navas Bonilla,
  • Luis Miguel Viñan Carrasco,
  • Jhoanna Carolina Gaibor Pupiales and
  • Daniel Eduardo Murillo Noriega

13 August 2025

As digital transformation continues to redefine education, understanding how emerging technologies can enhance self-directed learning (SDL) becomes essential for learners, educators, instructional designers, and policymakers, as this approach support...

  • Review
  • Open Access
2,522 Views
41 Pages

The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses

  • Leandro Antonio Pazmiño Ortiz,
  • Ivonne Fernanda Maldonado Soliz and
  • Vanessa Katherine Guevara Balarezo

11 August 2025

The industrialization of cybercrime, principally through Malware-as-a-Service (MaaS), has elevated HTTP cookie theft to a critical cybersecurity challenge, enabling attackers to bypass multi-factor authentication and perpetrate large-scale account ta...

  • Article
  • Open Access
1,081 Views
21 Pages

Enabling Horizontal Collaboration in Logistics Through Secure Multi-Party Computation

  • Gabriele Spini,
  • Stephan Krenn,
  • Erich Teppan,
  • Christina Petschnigg and
  • Elena Wiegelmann

8 August 2025

The road transport sector is currently facing significant challenges, due in part to CO2 emissions, high fuel prices, and a shortage of staff. These issues are partially caused by more than 40% of truck journeys being “empty runs” in some...

  • Article
  • Open Access
2 Citations
2,183 Views
27 Pages

Beyond Prompt Chaining: The TB-CSPN Architecture for Agentic AI

  • Uwe M. Borghoff,
  • Paolo Bottoni and
  • Remo Pareschi

8 August 2025

Current agentic AI frameworks such as LangGraph and AutoGen simulate autonomy via sequential prompt chaining but lack true multi-agent coordination architectures. These systems conflate semantic reasoning with orchestration, requiring LLMs at every c...

  • Article
  • Open Access
1 Citations
893 Views
26 Pages

8 August 2025

This paper proposes a technique to estimate the minimal quantity of orthogonal channel resources required for ad hoc and sensor network connectivity. Simultaneously, the resource allocation to each specific line is conducted by grouping lines into co...

  • Article
  • Open Access
1,392 Views
30 Pages

8 August 2025

As a new type of production factor, data possesses multidimensional application value, and its pivotal role is becoming increasingly prominent in the aviation sector. Data sharing can significantly enhance the utilization efficiency of data resources...

  • Article
  • Open Access
2,205 Views
21 Pages

8 August 2025

The cold-start problem remains a critical challenge in personalized advertising, where users with limited or no interaction history often receive suboptimal recommendations. This study introduces a novel, three-stage framework that systematically int...

  • Article
  • Open Access
1,963 Views
44 Pages

7 August 2025

Infrastructure as code (IaC) is essential for modern cloud development, enabling teams to define, deploy, and manage infrastructure in a consistent and repeatable manner. As organizations migrate to Azure, selecting the right approach is crucial for...

  • Review
  • Open Access
2,292 Views
38 Pages

Enhancing Industrial Processes Through Augmented Reality: A Scoping Review

  • Alba Miranda,
  • Aracely M. Vallejo,
  • Paulina Ayala,
  • Marcelo V. Garcia and
  • Jose E. Naranjo

7 August 2025

Augmented reality (AR) in industry improves training and technical assistance by overlaying digital information on real environments, facilitating the visualisation and understanding of complex processes. It also enables more effective remote collabo...

  • Review
  • Open Access
2 Citations
1,501 Views
21 Pages

Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges

  • Simeon Ogunbunmi,
  • Yu Chen,
  • Qi Zhao,
  • Deeraj Nagothu,
  • Sixiao Wei,
  • Genshe Chen and
  • Erik Blasch

6 August 2025

Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While...

  • Article
  • Open Access
6 Citations
862 Views
31 Pages

TSA-GRU: A Novel Hybrid Deep Learning Module for Learner Behavior Analytics in MOOCs

  • Soundes Oumaima Boufaida,
  • Abdelmadjid Benmachiche,
  • Makhlouf Derdour,
  • Majda Maatallah,
  • Moustafa Sadek Kahil and
  • Mohamed Chahine Ghanem

5 August 2025

E-Learning is an emerging dominant phenomenon in education, making the development of robust models that can accurately represent the dynamic behavior of learners in MOOCs even more critical. In this article, we propose the Temporal Sparse Attention-...

  • Review
  • Open Access
7 Citations
9,879 Views
38 Pages

Transforming Data Annotation with AI Agents: A Review of Architectures, Reasoning, Applications, and Impact

  • Md Monjurul Karim,
  • Sangeen Khan,
  • Dong Hoang Van,
  • Xinyue Liu,
  • Chunhui Wang and
  • Qiang Qu

2 August 2025

Data annotation serves as a critical foundation for artificial intelligence (AI) and machine learning (ML). Recently, AI agents powered by large language models (LLMs) have emerged as effective solutions to longstanding challenges in data annotation,...

  • Article
  • Open Access
1,617 Views
24 Pages

1 August 2025

Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter...

  • Article
  • Open Access
1 Citations
1,264 Views
26 Pages

Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments

  • Daniel Sernández-Iglesias,
  • Llanos Tobarra,
  • Rafael Pastor-Vargas,
  • Antonio Robles-Gómez,
  • Pedro Vidal-Balboa and
  • João Sarraipa

1 August 2025

Rural regions face significant barriers to adopting IoT technologies, due to limited connectivity, energy constraints, and poor technical infrastructure. While urban environments benefit from advanced digital systems and cloud services, rural areas o...

  • Review
  • Open Access
2 Citations
3,290 Views
28 Pages

Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions

  • Dung T. Nguyen,
  • Mien L. Trinh,
  • Minh T. Nguyen,
  • Thang C. Vu,
  • Tao V. Nguyen,
  • Long Q. Dinh and
  • Mui D. Nguyen

1 August 2025

In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along...

  • Article
  • Open Access
1,501 Views
23 Pages

AI-Supported EUD for Data Visualization: An Exploratory Case Study

  • Sara Beschi,
  • Daniela Fogli,
  • Luigi Gargioni and
  • Angela Locoro

1 August 2025

Data visualization is a key activity in data-driven decision making and is gaining momentum in many organizational contexts. However, the role and contribution of both end-user development (EUD) and artificial intelligence (AI) technologies for data...

  • Article
  • Open Access
912 Views
15 Pages

A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics

  • Rajganesh Nagarajan,
  • Vinothiyalakshmi Palanichamy,
  • Ramkumar Thirunavukarasu and
  • J. Arun Pandian

Cloud computing offers a broad spectrum of services to users, particularly in multi-cloud environments where service-centric features are introduced to support users from multiple endpoints. To improve service availability and optimize the utilizatio...

  • Article
  • Open Access
2,927 Views
36 Pages

RestRho: A JSON-Based Domain-Specific Language for Designing and Developing RESTful APIs to Validate RhoArchitecture

  • Enrique Chavarriaga,
  • Luis Rojas,
  • Francy D. Rodríguez,
  • Kat Sorbello and
  • Francisco Jurado

Domain-Specific Languages with JSON grammar (JSON-DSLs) are specialized programming languages tailored to specific problem domains, offering higher abstraction levels and simplifying software implementation through the JSON standard. RhoArchitecture...

  • Article
  • Open Access
2 Citations
2,113 Views
15 Pages

DigiHortiRobot: An AI-Driven Digital Twin Architecture for Hydroponic Greenhouse Horticulture with Dual-Arm Robotic Automation

  • Roemi Fernández,
  • Eduardo Navas,
  • Daniel Rodríguez-Nieto,
  • Alain Antonio Rodríguez-González and
  • Luis Emmi

The integration of digital twin technology with robotic automation holds significant promise for advancing sustainable horticulture in controlled environment agriculture. This article presents DigiHortiRobot, a novel AI-driven digital twin architectu...

  • Article
  • Open Access
4 Citations
2,435 Views
24 Pages

The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the diffic...

  • Article
  • Open Access
1 Citations
677 Views
18 Pages

Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT)

  • Abdullah Mohammed Alharthi,
  • Fahad S. Altuwaijri,
  • Mohammed Alsaadi,
  • Mourad Elloumi and
  • Ali A. M. Al-Kubati

Edge computing (EC) plays a critical role in advancing the next-generation Industrial Internet of Things (IIoT) by enhancing production, maintenance, and operational outcomes across heterogeneous network boundaries. This study builds upon EC intellig...

  • Article
  • Open Access
2 Citations
1,775 Views
34 Pages

This study presents a lightweight autoencoder-based approach for anomaly detection in digit recognition using federated learning on resource-constrained embedded devices. We implement and evaluate compact autoencoder models on the ESP32-CAM microcont...

  • Article
  • Open Access
2 Citations
1,370 Views
17 Pages

The integration of autonomous vehicles (AVs) into urban transportation systems has significant potential to enhance traffic efficiency and reduce environmental impacts. This study evaluates the impact of different AV penetration scenarios (0%, 10%, 3...

  • Article
  • Open Access
1,657 Views
23 Pages

The Content-Centric Network (CCN) presents an alternative to the conventional TCP/IP network, where IP is fundamental for communication between the source and destination. Instead of relying on IP addresses, CCN emphasizes content to enable efficient...

  • Article
  • Open Access
1,044 Views
32 Pages

EsCorpiusBias: The Contextual Annotation and Transformer-Based Detection of Racism and Sexism in Spanish Dialogue

  • Ksenia Kharitonova,
  • David Pérez-Fernández,
  • Javier Gutiérrez-Hernando,
  • Asier Gutiérrez-Fandiño,
  • Zoraida Callejas and
  • David Griol

The rise in online communication platforms has significantly increased exposure to harmful discourse, presenting ongoing challenges for digital moderation and user well-being. This paper introduces the EsCorpiusBias corpus, designed to enhance the au...

  • Article
  • Open Access
3 Citations
1,079 Views
27 Pages

A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps

  • Zhonghao Zhai,
  • Junyi Liu,
  • Xinying Liu,
  • Yanqin Mao,
  • Xinjun Zhang,
  • Jialin Ma and
  • Chunhua Jin

The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentic...

  • Article
  • Open Access
1,613 Views
42 Pages

A Hybrid Human-AI Model for Enhanced Automated Vulnerability Scoring in Modern Vehicle Sensor Systems

  • Mohamed Sayed Farghaly,
  • Heba Kamal Aslan and
  • Islam Tharwat Abdel Halim

Modern vehicles are rapidly transforming into interconnected cyber–physical systems that rely on advanced sensor technologies and pervasive connectivity to support autonomous functionality. Yet, despite this evolution, standardized methods for...

  • Article
  • Open Access
3,359 Views
20 Pages

Impact of Audio Delay and Quality in Network Music Performance

  • Konstantinos Tsioutas,
  • George Xylomenos and
  • Ioannis Doumanis

Network Music Performance (NMP) refers to network-based remote collaboration when applied to music performances, such as musical education, music production and live music concerts. In NMP, the most important parameter for the Quality of Experience (...

  • Article
  • Open Access
1 Citations
1,893 Views
37 Pages

Efficient Machine Learning-Based Prediction of Solar Irradiance Using Multi-Site Data

  • Hassan N. Noura,
  • Zaid Allal,
  • Ola Salman and
  • Khaled Chahine

Photovoltaic panels have become a promising solution for generating renewable energy and reducing our reliance on fossil fuels by capturing solar energy and converting it into electricity. The effectiveness of this conversion depends on several facto...

  • Article
  • Open Access
1 Citations
1,216 Views
32 Pages

Federated Learning (FL) is a privacy-focused technique for training models; however, most existing unlearning techniques in FL fall significantly short of the efficiency and situational awareness required by the GDPR. The paper introduces two new unl...

  • Article
  • Open Access
1 Citations
2,748 Views
22 Pages

A Blockchain and IoT-Enabled Framework for Ethical and Secure Coffee Supply Chains

  • John Byrd,
  • Kritagya Upadhyay,
  • Samir Poudel,
  • Himanshu Sharma and
  • Yi Gu

The global coffee supply chain is a complex multi-stakeholder ecosystem plagued by fragmented records, unverifiable origin claims, and limited real-time visibility. These limitations pose risks to ethical sourcing, product quality, and consumer trust...

  • Article
  • Open Access
1 Citations
1,040 Views
34 Pages

A Verilog Programming Learning Assistant System Focused on Basic Verilog with a Guided Learning Method

  • Pin-Chieh Hsieh,
  • Tzu-Lun Fang,
  • Shaobo Jin,
  • Yuyan Wang,
  • Nobuo Funabiki and
  • Yu-Cheng Fan

With continuous advancements in semiconductor technology, mastering efficient designs of high-quality and advanced chips has become an important part of science and technology education. Chip performances will determine the futures of various aspects...

  • Review
  • Open Access
2 Citations
3,058 Views
30 Pages

Augmented Reality and Virtual Reality in Exergaming

  • Georgios Lampropoulos,
  • Theofylaktos Anastasiadis and
  • Juan Garzón

This study presents a systematic review regarding the use of augmented reality and virtual reality in exergaming by analyzing studies published during 2010–2025. This study focuses on providing an overview of the field and on examining and synt...

  • Feature Paper
  • Article
  • Open Access
1,782 Views
19 Pages

Convolutional Graph Network-Based Feature Extraction to Detect Phishing Attacks

  • Saif Safaa Shakir,
  • Leyli Mohammad Khanli and
  • Hojjat Emami

Phishing attacks pose significant risks to security, drawing considerable attention from both security professionals and customers. Despite extensive research, the current phishing website detection mechanisms often fail to efficiently diagnose unkno...

  • Article
  • Open Access
1,029 Views
16 Pages

An Efficient Internet-Wide Scan Approach Based on Location Awareness

  • Wenqi Shi,
  • Huiling Shi,
  • Hao Hao and
  • Qiuyu Guan

With increasing network security threats, Internet-wide scanning has become a key technique for identifying network vulnerabilities. However, traditional scanning methods tend to ignore the impact of geographic factors on scanning efficiency. In this...

  • Article
  • Open Access
1 Citations
1,715 Views
14 Pages

The rapid expansion of 5G-enabled Internet of Things (IoT) devices in smart homes has heightened the need for robust, privacy-preserving, and real-time cybersecurity mechanisms. Traditional cloud-based security systems often face latency and privacy...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903