Journal Cover Future Internet
  [114 followers]  Follow
    
  This is an Open Access Journal Open Access journal
   ISSN (Print) 1999-5903
   Published by MDPI Homepage  [198 journals]
  • Future Internet, Vol. 10, Pages 32: Development of a Social DTN for
           Message Communication between SNS Group Members

    • Authors: Hidenori Takasuka, Koichi Hirai, Kazumasa Takami
      First page: 32
      Abstract: Smartphones have the ability to communicate with other terminals through ad hoc connections. A variety of applications have been developed to exploit this ability. The authors have developed an Android OS (operating system) application (called “social DTN manager”) that builds a DTN (delay, disruption, disconnection tolerant networking) among members of a social networking service (SNS) community using a community token. The members can exchange messages over this network. Control messages for building a DTN are forwarded to only those nodes that use the same community token in order to reduce flooding of message copies. When a source node sends a communication request to its destination node, they exchange control messages to establish a communication route. Relay nodes use these messages to create and hold routing information for these nodes in their routing tables. Thereafter, relay nodes can forward data messages based on their routing tables. This again reduces flooding of message copies. The social DTN manager incorporates these functions, Facebook Graph API and Google Nearby Connections API. The authors have installed it in Android terminals and confirmed that a social DTN can successfully be built using this application and that data messages can be exchanged between terminals via reactive routes.
      Citation: Future Internet
      PubDate: 2018-04-04
      DOI: 10.3390/fi10040032
      Issue No: Vol. 10, No. 4 (2018)
       
  • Future Internet, Vol. 10, Pages 33: An Intelligent Content Prefix
           Classification Approach for Quality of Service Optimization in
           Information-Centric Networking

    • Authors: Cutifa Safitri, Yoshihide Yamada, Sabariah Baharun, Shidrokh Goudarzi, Quang Ngoc Nguyen, Keping Yu, Takuro Sato
      First page: 33
      Abstract: This research proposes an intelligent classification framework for quality of service (QoS) performance improvement in information-centric networking (ICN). The proposal works towards keyword classification techniques to obtain the most valuable information via suitable content prefixes in ICN. In this study, we have achieved the intelligent function using Artificial Intelligence (AI) implementation. Particularly, to find the most suitable and promising intelligent approach for maintaining QoS matrices, we have evaluated various AI algorithms, including evolutionary algorithms (EA), swarm intelligence (SI), and machine learning (ML) by using the cost function to assess their classification performances. With the goal of enabling a complete ICN prefix classification solution, we also propose a hybrid implementation to optimize classification performances by integration of relevant AI algorithms. This hybrid mechanism searches for a final minimum structure to prevent the local optima from happening. By simulation, the evaluation results show that the proposal outperforms EA and ML in terms of network resource utilization and response delay for QoS performance optimization.
      Citation: Future Internet
      PubDate: 2018-04-09
      DOI: 10.3390/fi10040033
      Issue No: Vol. 10, No. 4 (2018)
       
  • Future Internet, Vol. 10, Pages 34: Replicas Strategy and Cache
           Optimization of Video Surveillance Systems Based on Cloud Storage

    • Authors: Rongheng Li, Jian Zhang, Wenfeng Shen
      First page: 34
      Abstract: With the rapid development of video surveillance technology, especially the popularity of cloud-based video surveillance applications, video data begins to grow explosively. However, in the cloud-based video surveillance system, replicas occupy an amount of storage space. Also, the slow response to video playback constrains the performance of the system. In this paper, considering the characteristics of video data comprehensively, we propose a dynamic redundant replicas mechanism based on security levels that can dynamically adjust the number of replicas. Based on the location correlation between cameras, this paper also proposes a data cache strategy to improve the response speed of data reading. Experiments illustrate that: (1) our dynamic redundant replicas mechanism can save storage space while ensuring data security; (2) the cache mechanism can predict the playback behaviors of the users in advance and improve the response speed of data reading according to the location and time correlation of the front-end cameras; and (3) in terms of cloud-based video surveillance, our proposed approaches significantly outperform existing methods.
      Citation: Future Internet
      PubDate: 2018-04-10
      DOI: 10.3390/fi10040034
      Issue No: Vol. 10, No. 4 (2018)
       
  • Future Internet, Vol. 10, Pages 35: Enhanced Matching Game for Decoupled
           Uplink Downlink Context-Aware Handover

    • Authors: Asmae Ait Mansour, Nourddine Enneya, Mohamed Ouadou
      First page: 35
      Abstract: In this paper, we address the problem of cell association during a handover performed in a dense heterogeneous network, where the preference of a mobile user’s equipment in terms of uplink traffic is not the same as for the downlink traffic. Therefore, since mobility is an intrinsic element of cellular networks, designing a handover from the perspective of the uplink and downlink is mandatory in the context of 5G cellular networks. Based on this arena, we propose a decoupled uplink-downlink handover scheme while making use of femtocells in order to maximize the overall network entity utilities and avoid overloading macrocells. However, the fact that the handover process is performed in a dense heterogeneous network makes the issue NP-hard. Therefore, taking into account the need for self-organizing solutions, we modeled the handover process as a matching game with externalities. Thus, we will provide an aspect of intelligence for the execution of the handover process to mobile user’s equipment (UE). To make the proposition more efficient, we integrate an assignment step to assist the matching game. Hence, the base stations will be investigated and filtered, keeping only the helpful base stations as the players in terms of the quality of service for the uplink and downlink. The numerical results verify the superiority of the proposed context-aware algorithm over traditional downlink handover and traditional decoupled uplink and downlink handover schemes, by improving the load balancing, increasing rates and reducing delays.
      Citation: Future Internet
      PubDate: 2018-04-15
      DOI: 10.3390/fi10040035
      Issue No: Vol. 10, No. 4 (2018)
       
  • Future Internet, Vol. 10, Pages 22: Learning and Mining Player Motion
           Profiles in Physically Interactive Robogames

    • Authors: Ewerton Oliveira, Davide Orrù, Luca Morreale, Tiago Nascimento, Andrea Bonarini
      First page: 22
      Abstract: Physically-Interactive RoboGames (PIRG) are an emerging application whose aim is to develop robotic agents able to interact and engage humans in a game situation. In this framework, learning a model of players’ activity is relevant both to understand their engagement, as well as to understand specific strategies they adopted, which in turn can foster game adaptation. Following such directions and given the lack of quantitative methods for player modeling in PIRG, we propose a methodology for representing players as a mixture of existing player’s types uncovered from data. This is done by dealing both with the intrinsic uncertainty associated with the setting and with the agent necessity to act in real time to support the game interaction. Our methodology first focuses on encoding time series data generated from player-robot interaction into images, in particular Gramian angular field images, to represent continuous data. To these, we apply latent Dirichlet allocation to summarize the player’s motion style as a probabilistic mixture of different styles discovered from data. This approach has been tested in a dataset collected from a real, physical robot game, where activity patterns are extracted by using a custom three-axis accelerometer sensor module. The obtained results suggest that the proposed system is able to provide a robust description for the player interaction.
      Citation: Future Internet
      PubDate: 2018-02-26
      DOI: 10.3390/fi10030022
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 23: SDN Based Collaborative Scheme for
           Mitigation of DDoS Attacks

    • Authors: Sufian Hameed, Hassan Ahmed Khan
      First page: 23
      Abstract: Software Defined Networking (SDN) has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to program and monitor our networks but it also helps in mitigating some key network problems. Distributed denial of service (DDoS) attack is among them. In this paper we propose a collaborative DDoS attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C) protocol that allows SDN-controllers lying in different autonomous systems (AS) to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective filtering of traffic near the source of attack, thus saving valuable time and network resources. We also introduced three different deployment approaches i.e., linear, central and mesh in our testbed. Based on the experimental results we demonstrate that our SDN based collaborative scheme is fast and reliable in efficiently mitigating DDoS attacks in real time with very small computational footprints.
      Citation: Future Internet
      PubDate: 2018-02-27
      DOI: 10.3390/fi10030023
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 24: How Data Will Transform Industrial
           Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry
           4.0

    • Authors: Virginia Pilloni
      First page: 24
      Abstract: We are living in the era of the fourth industrial revolution, namely Industry 4.0. This paper presents the main aspects related to Industry 4.0, the technologies that will enable this revolution, and the main application domains that will be affected by it. The effects that the introduction of Internet of Things (IoT), Cyber-Physical Systems (CPS), crowdsensing, crowdsourcing, cloud computing and big data will have on industrial processes will be discussed. The main objectives will be represented by improvements in: production efficiency, quality and cost-effectiveness; workplace health and safety, as well as quality of working conditions; products’ quality and availability, according to mass customisation requirements. The paper will further discuss the common denominator of these enhancements, i.e., data collection and analysis. As data and information will be crucial for Industry 4.0, crowdsensing and crowdsourcing will introduce new advantages and challenges, which will make most of the industrial processes easier with respect to traditional technologies.
      Citation: Future Internet
      PubDate: 2018-03-01
      DOI: 10.3390/fi10030024
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 25: Interference Management in Femtocells
           by the Adaptive Network Sensing Power Control Technique

    • Authors: Tehseen Hassan, Fei Gao, Babur Jalal, Sheeraz Arif
      First page: 25
      Abstract: The overlay integration of low-power femtocells over macrocells in a heterogeneous network (HetNet) plays an important role in dealing with the increasing demand of spectral efficiency, coverage and higher data rates, at a nominal cost to network operators. However, the downlink (DL) transmission power of an inadequately deployed femtocell causes inter-cell interference (ICI), which leads to severe degradation and sometimes link failure for nearby macrocell users. In this paper, we propose an adaptive network sensing (ANS) technique for downlink power control to obviate the ICI. The simulation results have shown that the ANS power control technique successfully decreases the cell-edge macro user’s interference and enhances the throughput performance of macro users, while also optimizing the coverage and capacity of the femtocell. When compared with the Femto User Equipment (FUE)-assisted and Macro User Equipment (MUE)-assisted power control technique, the proposed technique offers a good tradeoff in reducing interference to macro users, while maintaining the quality of service (QoS) requirement of the femtocell users.
      Citation: Future Internet
      PubDate: 2018-03-01
      DOI: 10.3390/fi10030025
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 26: TwinNet: A Double Sub-Network
           Framework for Detecting Universal Adversarial Perturbations

    • Authors: Yibin Ruan, Jiazhu Dai
      First page: 26
      Abstract: Deep neural network has achieved great progress on tasks involving complex abstract concepts. However, there exist adversarial perturbations, which are imperceptible to humans, which can tremendously undermine the performance of deep neural network classifiers. Moreover, universal adversarial perturbations can even fool classifiers on almost all examples with just a single perturbation vector. In this paper, we propose TwinNet, a framework for neural network classifiers to detect such adversarial perturbations. TwinNet makes no modification of the protected classifier. It detects adversarially perturbated examples by enhancing different types of features in dedicated networks and fusing the output of the networks later. The paper empirically shows that our framework can identify adversarial perturbations effectively with a slight loss in accuracy when predicting normal examples, which outperforms state-of-the-art works.
      Citation: Future Internet
      PubDate: 2018-03-06
      DOI: 10.3390/fi10030026
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 27: Security Awareness in Software-Defined
           Multi-Domain 5G Networks

    • Authors: Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä, Pekka Ruuska
      First page: 27
      Abstract: Fifth generation (5G) technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT) authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.
      Citation: Future Internet
      PubDate: 2018-03-08
      DOI: 10.3390/fi10030027
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 28: Ecosystemic Evolution Fed by Smart
           Systems

    • Authors: Dino Giuli
      First page: 28
      Abstract: n/a
      Citation: Future Internet
      PubDate: 2018-03-10
      DOI: 10.3390/fi10030028
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 29: Understanding How GitHub Supports
           Curation Repositories

    • Authors: Yu Wu, Jessica Kropczynski, Raquel Prates, John Carroll
      First page: 29
      Abstract: In recent years, software developers have started to appropriate GitHub repositories to curate resources, in order to systematically select, evaluate, and organize existing artifacts for preservation and future use. Curation behaviors in social media sites, such as users’ experiences to curate tweets from Twitter and pins on Pinterest, are well documented. However, GitHub, as a social coding platform, presents a new context for this activity, raising questions about the nature of curation on this task-driven online work site. To explore and understand curation on GitHub, we compared and contrasted curation repositories with software repositories using activity logs and analyzed the content of popular curation repositories. Our results show that: (1) curation repositories have become a favorite category of repositories in GitHub; (2) curation repositories leverage collaborative features and practices native to GitHub in new ways; (3) curation repositories collect and preserve high-quality resources for the software developers’ community. Our results suggest that curation is becoming increasingly important to the software developers’ community, and current practices can be better supported with tools designed specifically for curation.
      Citation: Future Internet
      PubDate: 2018-03-10
      DOI: 10.3390/fi10030029
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 30: Optimal Design of Demand-Responsive
           Feeder Transit Services with Passengers’ Multiple Time Windows and
           Satisfaction

    • Authors: Bo Sun, Ming Wei, Senlai Zhu
      First page: 30
      Abstract: This paper presents a mixed-integer linear programming model for demand-responsive feeder transit services to assign vehicles located at different depots to pick up passengers at the demand points and transport them to the rail station. The proposed model features passengers’ one or several preferred time windows for boarding vehicles at the demand point and their expected ride time. Moreover, passenger satisfaction that was related only to expected ride time is fully accounted for in the model. The objective is to simultaneously minimize the operation costs of total mileage and maximize passenger satisfaction. As the problem is an extension of the nondeterministic polynomial problem with integration of the vehicle route problem, this study further develops an improved bat algorithm to yield meta-optimal solutions for the model in a reasonable amount of time. When this was applied to a case study in Nanjing City, China, the mileage and satisfaction of the proposed model were reduced by 1.4 km and increased by 7.1%, respectively, compared with the traditional model. Sensitivity analyses were also performed to investigate the impact of the number of designed bus routes and weights of objective functions on the model performance. Finally, a comparison of Cplex, standard bat algorithm, and group search optimizer is analyzed to verify the validity of the proposed algorithm.
      Citation: Future Internet
      PubDate: 2018-03-12
      DOI: 10.3390/fi10030030
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 31: A Statistical Analysis of Industrial
           Penetration and Internet Intensity in Taiwan

    • Authors: Chia-Lin Chang, Michael McAleer, Yu-Chieh Wu
      First page: 31
      Abstract: This paper is the first to investigate the effect of industrial penetration (geographic concentration of industries) and internet intensity (the proportion of enterprises that uses the internet) for Taiwan manufacturing firms, and analyses whether the relationships are substitutes or complements. The sample observations are based on a unique set of data, namely 153,081 manufacturing plants, and covers 26 two-digit industry categories and 358 geographical townships in Taiwan. The Heckman sample selection model is used to accommodate sample selectivity for unobservable data for firms that use the internet. The empirical results from Heckman’s two-stage estimation show that: (1) a higher degree of industrial penetration will not affect the probability that firms will use the internet, but it will affect the total expenditure on internet intensity; (2) for two-digit SIC (Standard Industrial Classification) industries, industrial penetration generally decreases the total expenditure on internet intensity; and, (3) industrial penetration and internet intensity are substitutes.
      Citation: Future Internet
      PubDate: 2018-03-16
      DOI: 10.3390/fi10030031
      Issue No: Vol. 10, No. 3 (2018)
       
  • Future Internet, Vol. 10, Pages 11: Announcing the 2018 Future Internet
           Travel Award for PhD Students

    • Authors: Dino Giuli
      First page: 11
      Abstract: With the goal of promoting the development of early career investigators in the fields of Internet 11 technologies and the information society, Future Internet welcomed applications for the 2018 Future 12 Internet Travel Award for PhD students.[...]
      Citation: Future Internet
      PubDate: 2018-01-28
      DOI: 10.3390/fi10020011
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 12: The Improved Adaptive Silence Period
           Algorithm over Time-Variant Channels in the Cognitive Radio System

    • Authors: Jingbo Zhang, Zhenyang Sun, Shufang Zhang
      First page: 12
      Abstract: In the field of cognitive radio spectrum sensing, the adaptive silence period management mechanism (ASPM) has improved the problem of the low time-resource utilization rate of the traditional silence period management mechanism (TSPM). However, in the case of the low signal-to-noise ratio (SNR), the ASPM algorithm will increase the probability of missed detection for the primary user (PU). Focusing on this problem, this paper proposes an improved adaptive silence period management (IA-SPM) algorithm which can adaptively adjust the sensing parameters of the current period in combination with the feedback information from the data communication with the sensing results of the previous period. The feedback information in the channel is achieved with frequency resources rather than time resources in order to adapt to the parameter change in the time-varying channel. The Monte Carlo simulation results show that the detection probability of the IA-SPM is 10–15% higher than that of the ASPM under low SNR conditions.
      Citation: Future Internet
      PubDate: 2018-01-29
      DOI: 10.3390/fi10020012
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 13: Push Attack: Binding Virtual and Real
           Identities Using Mobile Push Notifications

    • Authors: Pierpaolo Loreti, Lorenzo Bracciale, Alberto Caponi
      First page: 13
      Abstract: Popular mobile apps use push notifications extensively to offer an “always connected” experience to their users. Social networking apps use them as a real-time channel to notify users about new private messages or new social interactions (e.g., friendship request, tagging, etc.). Despite the cryptography used to protect these communication channels, the strict temporal binding between the actions that trigger the notifications and the reception of the notification messages in the mobile device may represent a privacy issue. In this work, we present the push notification attack designed to bind the physical owners of mobile devices with their virtual identities, even if pseudonyms are used. In an online attack, an active attacker triggers a push notification and captures the notification packets that transit in the network. In an offline attack, a passive attacker correlates the social network activity of a user with the received push notification. The push notification attack bypasses the standard ways of protecting user privacy based on the network layer by operating at the application level. It requires no additional software on the victim’s mobile device.
      Citation: Future Internet
      PubDate: 2018-01-31
      DOI: 10.3390/fi10020013
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 14: A Review of Vehicle to Vehicle
           Communication Protocols for VANETs in the Urban Environment

    • Authors: Irshad Abbasi, Adnan Shahid Khan
      First page: 14
      Abstract: Vehicular Ad-hoc Networks (VANETs) have been gaining significant attention from the research community due to their increasing importance for building an intelligent transportation system. The characteristics of VANETs, such as high mobility, network partitioning, intermittent connectivity and obstacles in city environments, make routing a challenging task. Due to these characteristics of VANETs, the performance of a routing protocol is degraded. The position-based routing is considered to be the most significant approach in VANETs. In this paper, we present a brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment. We provide them with their working features for exchanging information between vehicular nodes. We describe their pros and cons. This study also provides a comparison of the vehicle to vehicle communication based routing protocols. The comparative study is based on some significant factors such as mobility, traffic density, forwarding techniques and method of junction selection mechanism, and strategy used to handle a local optimum situation. It also provides the simulation based study of existing dynamic junction selection routing protocols and a static junction selection routing protocol. It provides a profound insight into the routing techniques suggested in this area and the most valuable solutions to advance VANETs. More importantly, it can be used as a source of references to other researchers in finding literature that is relevant to routing in VANETs.
      Citation: Future Internet
      PubDate: 2018-01-31
      DOI: 10.3390/fi10020014
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 15: Smart Pedestrian Crossing Management
           at Traffic Light Junctions through a Fuzzy-Based Approach

    • Authors: Giovanni Pau, Tiziana Campisi, Antonino Canale, Alessandro Severino, Mario Collotta, Giovanni Tesoriere
      First page: 15
      Abstract: In the last few years, numerous research efforts have been conducted to merge the Internet of Things (IoT) with smart city environments. The goal to make a city “smart” is arising as a possible solution to lessen the issues caused by the urban population growth and fast urbanization. Attention also has focused on the pedestrian crossings because they are one of the most dangerous places in the transport field. Information and Communications Technologies (ICT) can undoubtedly be an excellent support in developing infrastructures that can best manage pedestrian crossing. For this reason, this paper introduces a fuzzy logic-based solution able to manage dynamically the traffic lights’ phases in signalized pedestrian crossings. The proposed approach provides the possibility to change the phases of the traffic light taking into account the time of the day and the number of pedestrians about to cross the road. The paper presents a thorough description of the fuzzy logic controller configuration, an in-depth analysis of the application scenario and simulative assessments obtained through Vissim simulations.
      Citation: Future Internet
      PubDate: 2018-02-01
      DOI: 10.3390/fi10020015
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 16: An Efficient Trust-Based Scheme for
           Secure and Quality of Service Routing in MANETs

    • Authors: Muhammad Pathan, Nafei Zhu, Jingsha He, Zulfiqar Zardari, Muhammad Memon, Muhammad Hussain
      First page: 16
      Abstract: Due to the dynamism of topology, sharing of bandwidth and constraint of resources in wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc networks (MANETs) presents a great challenge. Security is another crucial aspect of providing QoS since the existence of malicious nodes present all kinds of threats to MANETs. Although a number of mechanisms have been proposed for protecting MANETs, most of the solutions are only effective for a particular kind of attacks or provide security at the cost of sacrificing QoS. In this paper, we propose a trust-based secure QoS routing scheme by combining social and QoS trust. The primary approach of the proposed scheme relies on mitigating nodes that exhibit various packet forwarding misbehavior and on discovering the path that ensures reliable communication through the trust mechanism. The scheme would select the best forwarding node based on packet forwarding behavior as well as capability in terms of QoS parameters, such as residual energy, channel quality, link quality, etc. We will present an adversary model for packet dropping attack against which we evaluate the proposed scheme. Simulation experiment using Network Simulator-2 (NS2) and under various network conditions show that mixing social and QoS trust parameters can greatly improve security and quality of service routing in terms of overhead, packet delivery ratio and energy consumption.
      Citation: Future Internet
      PubDate: 2018-02-05
      DOI: 10.3390/fi10020016
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 17: Increasing Trustworthiness of Face
           Authentication in Mobile Devices by Modeling Gesture Behavior and Location
           Using Neural Networks

    • Authors: Blerim Rexha, Gresa Shala, Valon Xhafa
      First page: 17
      Abstract: Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartphones, tablets, and laptops, face authentication provides an attractive alternative of legacy passwords for its memory-less authentication process, which is so sophisticated that it can unlock the device faster than a fingerprint. Nevertheless, face authentication in the context of smartphones has proven to be vulnerable to attacks. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures and bypass the authentication process. In order to prevent such bypass attacks, gesture recognition together with location is proposed to be additionally modeled. Gestures provide a faster and more convenient method of authentication compared to a complex password. The focus of this paper is to build a secure authentication system with face, location and gesture recognition as components. User gestures and location data are a sequence of time series; therefore, in this paper we propose to use unsupervised learning in the long short-term memory recurrent neural network to actively learn to recognize, group and discriminate user gestures and location. Moreover, a clustering-based technique is also implemented for recognizing gestures and location.
      Citation: Future Internet
      PubDate: 2018-02-05
      DOI: 10.3390/fi10020017
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 18: Security and Privacy in Wireless and
           Mobile Networks

    • Authors: Georgios Kambourakis, Felix Gomez Marmol, Guojun Wang
      First page: 18
      Abstract: Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous [...]
      Citation: Future Internet
      PubDate: 2018-02-09
      DOI: 10.3390/fi10020018
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 19: Virtual Career Fairs: Perspectives
           from Norwegian Recruiters and Exhibitors

    • Authors: Ådne Vik, Bjørn Nørbech, Debora Jeske
      First page: 19
      Abstract: The present work introduces virtual fairs, particularly the perceived benefits, challenges, and relevance of such fairs for recruitment and employer branding. These aspects were explored in a semi-structured interview with an organizer of virtual fairs across Scandinavia, and a focus group composed of Norwegian recruiters and exhibitors. The results of the data collection can be summarized in the form of themes that relate to web analytics, web services and optimization. The benefits of virtual fairs pertain to the (a) visibility and branding; (b) costs; and (c) analytics-based customization. Challenges of virtual career fairs pertain to the (a) lack of online engagement, (b) preparation and staffing costs; (c) lack of guidelines; (d) talent access and identification; (e) security and infrastructure; (f) long-term planning; (g) and inter-dependencies. The discussion summarizes the implications of branding and recruitment and the value they add to business, also noting how context effects may come into play. The article concludes by exploring the possibility that virtual fairs will complement or become the new standard in recruitment and outlines future avenues for research and practice.
      Citation: Future Internet
      PubDate: 2018-02-12
      DOI: 10.3390/fi10020019
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 20: Blockchain and Smart Contracts for
           Insurance: Is the Technology Mature Enough'

    • Authors: Valentina Gatteschi, Fabrizio Lamberti, Claudio Demartini, Chiara Pranteda, Víctor Santamaría
      First page: 20
      Abstract: Blockchain is receiving increasing attention from academy and industry, since it is considered a breakthrough technology that could bring huge benefits to many different sectors. In 2017, Gartner positioned blockchain close to the peak of inflated expectations, acknowledging the enthusiasm for this technology that is now largely discussed by media. In this scenario, the risk to adopt it in the wake of enthusiasm, without objectively judging its actual added value is rather high. Insurance is one the sectors that, among others, started to carefully investigate the possibilities of blockchain. For this specific sector, however, the hype cycle shows that the technology is still in the innovation trigger phase, meaning that the spectrum of possible applications has not been fully explored yet. Insurers, as with many other companies not necessarily active only in the financial sector, are currently requested to make a hard decision, that is, whether to adopt blockchain or not, and they will only know if they were right in 3–5 years. The objective of this paper is to support actors involved in this decision process by illustrating what a blockchain is, analyzing its advantages and disadvantages, as well as discussing several use cases taken from the insurance sector, which could easily be extended to other domains.
      Citation: Future Internet
      PubDate: 2018-02-20
      DOI: 10.3390/fi10020020
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 21: Robotics Construction Kits: From
           “Objects to Think with” to “Objects to Think and to Emote with”

    • Authors: Antonella D’Amico, Domenico Guastella
      First page: 21
      Abstract: This paper discusses new ideas about the use of educational robotics in social-emotional learning. In particular, educational robotics could be a tool intended to allow children to acquire some of the basic aspects of human emotions and emotional functioning, and to understand how these relate to the mind and body. More specifically, by using robots such as the LEGO Mindstorm construction kits—which allow users to both construct the body of the robot and to provide it with a behavioural repertory—children have the opportunity to visualize (and manipulate) the relationship between the robot’s body and mind. This allows them to simulate “embodied emotional minds” and to reflect on new neuroscientific concepts regarding body-mind and cognition-emotion relationships.
      Citation: Future Internet
      PubDate: 2018-02-24
      DOI: 10.3390/fi10020021
      Issue No: Vol. 10, No. 2 (2018)
       
  • Future Internet, Vol. 10, Pages 2: An Anonymous Offline RFID
           Grouping-Proof Protocol

    • Authors: Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang
      First page: 2
      Abstract: As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and to generate reliable grouping-proof becomes a hot research topic. To protect the privacy of tags, the verification of grouping-proof is traditionally executed by the verifier, and the reader is only used to collect the proof data. This approach can cause the reader to submit invalid proof data to the verifier in the event of DoP (Deny of Proof) attack. In this paper, an ECC-based, off-line anonymous grouping-proof protocol (EAGP) is proposed. The protocol authorizes the reader to examine the validity of grouping-proof without knowing the identities of tags. From the security and performance analysis, the EAGP can protect the security and privacy of RFID tags, and defence impersonation and replay attacks. Furthermore, it has the ability to reduce the system overhead caused by the invalid submission of grouping-proofs. As a result, the proposed EAGP equips practical application values.
      Citation: Future Internet
      PubDate: 2018-01-01
      DOI: 10.3390/fi10010002
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 3: Review of Latest Advances in 3GPP
           Standardization: D2D Communication in 5G Systems and Its Energy
           Consumption Models

    • Authors: Marko Höyhtyä, Olli Apilo, Mika Lasanen
      First page: 3
      Abstract: Device-to-device (D2D) communication is an essential part of the future fifth generation (5G) system that can be seen as a “network of networks,” consisting of multiple seamlessly-integrated radio access technologies (RATs). Public safety communications, autonomous driving, socially-aware networking, and infotainment services are example use cases of D2D technology. High data rate communications and use of several active air interfaces in the described network create energy consumption challenges for both base stations and the end user devices. In this paper, we review the status of 3rd Generation Partnership Project (3GPP) standardization, which is the most important standardization body for 5G systems. We define a set of application scenarios for D2D communications in 5G networks. We use the recent models of 3GPP long term evolution (LTE) and WiFi interfaces in analyzing the power consumption from both the infrastructure and user device perspectives. The results indicate that with the latest radio interfaces, the best option for energy saving is the minimization of active interfaces and sending the data with the best possible data rate. Multiple recommendations on how to exploit the results in future networks are given.
      Citation: Future Internet
      PubDate: 2018-01-03
      DOI: 10.3390/fi10010003
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 4: A Virtual Learning Architecture
           Enhanced by Fog Computing and Big Data Streams

    • Authors: Riccardo Pecori
      First page: 4
      Abstract: In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that every day, more and more smart devices play an active role in this exemplary Web of Things scenario. This digital revolution, affecting education, appears clearly intertwined with the earliest forecasts of the Internet of Things, envisioning around 50 billions heterogeneous devices and gadgets to be active by 2020, considering also the deployment of the fog computing paradigm, which moves part of the computational power to the edge of the network. Moreover, these interconnected objects are expected to produce more and more significant streams of data, themselves generated at unprecedented rates, sometimes to be analyzed almost in real time. Concerning educational environments, this translates to a new type of big data stream, which can be labeled as educational big data streams. Here, pieces of information coming from different sources (such as communications between students and instructors, as well as students’ tests, etc.) require accurate analysis and mining techniques in order to retrieve fruitful and well-timed insights from them. This article presents an overview of the current state of the art of virtual learning environments and their limitations; then, it explains the main ideas behind the paradigms of big data streams and of fog computing, in order to introduce an e-learning architecture integrating both of them. Such an action aims to enhance the ability of virtual learning environments to be closer to the needs of all the actors in an educational scenario, as demonstrated by a preliminary implementation of the envisioned architecture. We believe that the proposed big stream and fog-based educational framework may pave the way towards a better understanding of students’ educational behaviors and foster new research directions in the field.
      Citation: Future Internet
      PubDate: 2018-01-03
      DOI: 10.3390/fi10010004
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 5: Elastic Scheduling of Scientific
           Workflows under Deadline Constraints in Cloud Computing Environments

    • Authors: Nazia Anwar, Huifang Deng
      First page: 5
      Abstract: Scientific workflow applications are collections of several structured activities and fine-grained computational tasks. Scientific workflow scheduling in cloud computing is a challenging research topic due to its distinctive features. In cloud environments, it has become critical to perform efficient task scheduling resulting in reduced scheduling overhead, minimized cost and maximized resource utilization while still meeting the user-specified overall deadline. This paper proposes a strategy, Dynamic Scheduling of Bag of Tasks based workflows (DSB), for scheduling scientific workflows with the aim to minimize financial cost of leasing Virtual Machines (VMs) under a user-defined deadline constraint. The proposed model groups the workflow into Bag of Tasks (BoTs) based on data dependency and priority constraints and thereafter optimizes the allocation and scheduling of BoTs on elastic, heterogeneous and dynamically provisioned cloud resources called VMs in order to attain the proposed method’s objectives. The proposed approach considers pay-as-you-go Infrastructure as a Service (IaaS) clouds having inherent features such as elasticity, abundance, heterogeneity and VM provisioning delays. A trace-based simulation using benchmark scientific workflows representing real world applications, demonstrates a significant reduction in workflow computation cost while the workflow deadline is met. The results validate that the proposed model produces better success rates to meet deadlines and cost efficiencies in comparison to adapted state-of-the-art algorithms for similar problems.
      Citation: Future Internet
      PubDate: 2018-01-07
      DOI: 10.3390/fi10010005
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 6: Investigating the Influence of Special
           On–Off Attacks on Challenge-Based Collaborative Intrusion Detection
           Networks

    • Authors: Wenjuan Li, Weizhi Meng, Lam Kwok
      First page: 6
      Abstract: Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing intrusion detection system (IDS) nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection.
      Citation: Future Internet
      PubDate: 2018-01-08
      DOI: 10.3390/fi10010006
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 7: Acknowledgement to Reviewers of Future
           Internet in 2017

    • Authors: Future Internet Editorial Office
      First page: 7
      Abstract: Peer review is an essential part in the publication process, ensuring that Future Internet maintains high quality standards for its published papers.[...]
      Citation: Future Internet
      PubDate: 2018-01-12
      DOI: 10.3390/fi10010007
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 8: A Decision Framework for Choosing
           Telecommunication Technologies in Limited-Resource Settings

    • Authors: Suzana Brown, Alan Mickelson
      First page: 8
      Abstract: Remote areas with sparse population, disaster areas in the aftermath, and refugee camps all require communication that is not forthcoming from commercial vendors. Numerous communication system options are available, but with widely varying cost and efficacy. The goal of this work is to discuss a framework in which to consider appropriate telecommunications technology. The framework approaches sustainable development as a business, under the assumption that social/technical/environmental sustainability requires economic sustainability. The framework incorporates well known and accepted business canvas as a roadmap. Information and Communication Technology (ICT) interventions are then considered in terms of their value proposition, markets, and perhaps most important for the realm of sustainable development, the key partners. To illustrate how the framework applies, we consider three case studies and then apply the resultant principles to the consideration of these ICT projects. The case studies are chosen for their diversity. Furthermore, after verifying the decision framework, recommendations are made for three ongoing intervention projects in limited-resource settings.
      Citation: Future Internet
      PubDate: 2018-01-12
      DOI: 10.3390/fi10010008
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 9: A Velocity-Aware Handover Trigger in
           Two-Tier Heterogeneous Networks

    • Authors: Asmae Ait Mansour, Nourddine Enneya, Mohamed Ouadou
      First page: 9
      Abstract: The unexpected change in user equipment (UE) velocity is recognized as the primary explanation for poor handover quality. In order to resolve this issue, while limiting ping-pong (PP) events we carefully and dynamically optimized handover parameters for each UE unit according to its velocity and the coverage area of the access point (AP). In order to recognize any variations in velocity, we applied Allan variance (AVAR) to the received signal strength (RSS) from the serving AP. To assess our approach, it was essential to configure a heterogeneous network context (LTE-WiFi) and interconnect Media-Independent Handover (MIH) and Proxy Mobile IPv6 (PMIPv6) for seamless handover. Reproduction demonstrated that our approach does not only result in a gain in relatively accurate velocity but in addition reduces the number of PP and handover failures (HOFs).
      Citation: Future Internet
      PubDate: 2018-01-15
      DOI: 10.3390/fi10010009
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 10, Pages 10: Recent Advances on Cellular D2D
           Communications

    • Authors: Boon-Chong Seet, Syed Hasan, Peter Chong
      First page: 10
      Abstract: Device-to-device (D2D) communications have attracted a great deal of attention fromresearchers in recent years.[...]
      Citation: Future Internet
      PubDate: 2018-01-17
      DOI: 10.3390/fi10010010
      Issue No: Vol. 10, No. 1 (2018)
       
  • Future Internet, Vol. 9, Pages 54: Energy-Aware Adaptive Weighted Grid
           Clustering Algorithm for Renewable Wireless Sensor Networks

    • Authors: Nelofar Aslam, Kewen Xia, Muhammad Haider, Muhammad Hadi
      First page: 54
      Abstract: Wireless sensor networks (WSNs), built from many battery-operated sensor nodes are distributed in the environment for monitoring and data acquisition. Subsequent to the deployment of sensor nodes, the most challenging and daunting task is to enhance the energy resources for the lifetime performance of the entire WSN. In this study, we have attempted an approach based on the shortest path algorithm and grid clustering to save and renew power in a way that minimizes energy consumption and prolongs the overall network lifetime of WSNs. Initially, a wireless portable charging device (WPCD) is assumed which periodically travels on our proposed routing path among the nodes of the WSN to decrease their charge cycle time and recharge them with the help of wireless power transfer (WPT). Further, a scheduling scheme is proposed which creates clusters of WSNs. These clusters elect a cluster head among them based on the residual energy, buffer size, and distance of the head from each node of the cluster. The cluster head performs all data routing duties for all its member nodes to conserve the energy supposed to be consumed by member nodes. Furthermore, we compare our technique with the available literature by simulation, and the results showed a significant increase in the vacation time of the nodes of WSNs.
      Citation: Future Internet
      PubDate: 2017-09-23
      DOI: 10.3390/fi9040054
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 55: Botnet Detection Technology Based on
           DNS

    • Authors: Xingguo Li, Junfeng Wang, Xiaosong Zhang
      First page: 55
      Abstract: With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthens a botnet’s survivability to evade detection. This paper focuses on evasion and detection techniques of DNS-based botnets and gives a review of this field for a general summary of all these contributions. Some important topics, including technological background, evasion and detection, and alleviation of botnets, are discussed. We also point out the future research direction of detecting and mitigating DNS-based botnets. To the best of our knowledge, this topic gives a specialized and systematic study of the DNS-based botnet evading and detecting techniques in a new era and is useful for researchers in related fields.
      Citation: Future Internet
      PubDate: 2017-09-25
      DOI: 10.3390/fi9040055
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 56: Review on Semi-Fragile Watermarking
           Algorithms for Content Authentication of Digital Images

    • Authors: Xiaoyan Yu, Chengyou Wang, Xiao Zhou
      First page: 56
      Abstract: With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to save network bandwidth. As a result, semi-fragile watermarking techniques, which can be used to distinguish common image processing operations from malicious tampering, are emerging. In this paper, semi-fragile watermarking algorithms for image authentication are surveyed. The basic principles and characteristics about semi-fragile watermarking algorithms are introduced, and several kinds of attack behaviors are also included. Aiming at several typical image-authentication algorithms, advantages and disadvantages are analyzed, and evaluation indexes of various algorithms are compared. Finally, we analyze the key points and difficulties in the study on semi-fragile watermarking algorithms, and the direction about future development is prospected.
      Citation: Future Internet
      PubDate: 2017-09-25
      DOI: 10.3390/fi9040056
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 57: TSKT-ORAM: A Two-Server k-ary Tree
           Oblivious RAM without Homomorphic Encryption

    • Authors: Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao
      First page: 57
      Abstract: This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information retrieval (PIR) and a novel delayed eviction technique to optimize both the data query and data eviction process. TSKT-ORAM is proven to protect the data access pattern privacy with a failure probability of 2 - 80 when system parameter k ≥ 128 . Meanwhile, given a constant-size local storage, when N (i.e., the total number of outsourced data blocks) ranges from 2 16 – 2 34 , the communication cost of TSKT-ORAM is only 22–46 data blocks. Asymptotic analysis and practical comparisons are conducted to show that TSKT-ORAM incurs lower communication cost, storage cost and access delay in practical scenarios than the compared state-of-the-art ORAM schemes.
      Citation: Future Internet
      PubDate: 2017-09-27
      DOI: 10.3390/fi9040057
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 58: Access Control with Delegated
           Authorization Policy Evaluation for Data-Driven Microservice Workflows

    • Authors: Davy Preuveneers, Wouter Joosen
      First page: 58
      Abstract: Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1) how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2) how to let multiple microservices contribute to a collective data-driven authorization decision and (3) how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.
      Citation: Future Internet
      PubDate: 2017-09-30
      DOI: 10.3390/fi9040058
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 59: Extensions and Enhancements to “the
           Secure Remote Update Protocol”

    • Authors: Andrew Poulter, Steven Johnson, Simon Cox
      First page: 59
      Abstract: This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP), a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol and introduces a number of additional message types: adding additional capabilities to the protocol. We also discuss the difficulty of proving that a physical device has an identity corresponding to a logical device on the network and propose a mechanism to overcome this within the protocol.
      Citation: Future Internet
      PubDate: 2017-09-30
      DOI: 10.3390/fi9040059
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 60: A Design Space for
           Virtuality-Introduced Internet of Things

    • Authors: Kota Gushima, Tatsuo Nakajima
      First page: 60
      Abstract: Augmented reality (AR) and virtual reality (VR) technologies have been dramatically expanded in recent years. In the near future, we expect that diverse digital services that employ Internet of Things (IoT) technologies enhanced with AR and VR will become more popular. Advanced information technologies will enable the physical world to be fused with the virtual world. These digital services will be advanced via virtuality, which means that things that do not physically exist make people believe in their existence. We propose a design space for digital services that are enhanced via virtuality based on insights extracted from three case studies that we have developed and from discussions in focus groups that analyze how existing commercial IoT products proposed in a commercial crowdfunding platform, Kickstarter, could be enhanced through virtuality. The derived design space offers three dimensions to design a digital service to fuse IoT technologies with virtuality: (1) Taxonomy of IoT; (2) Visualizing Level, and (3) Virtuality Level. The design space will help IoT-based digital service designers to develop advanced future IoT products that incorporate virtuality.
      Citation: Future Internet
      PubDate: 2017-10-02
      DOI: 10.3390/fi9040060
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 61: An Integrated Dictionary-Learning
           Entropy-Based Medical Image Fusion Framework

    • Authors: Guanqiu Qi, Jinchuan Wang, Qiong Zhang, Fancheng Zeng, Zhiqin Zhu
      First page: 61
      Abstract: Image fusion is widely used in different areas and can integrate complementary and relevant information of source images captured by multiple sensors into a unitary synthetic image. Medical image fusion, as an important image fusion application, can extract the details of multiple images from different imaging modalities and combine them into an image that contains complete and non-redundant information for increasing the accuracy of medical diagnosis and assessment. The quality of the fused image directly affects medical diagnosis and assessment. However, existing solutions have some drawbacks in contrast, sharpness, brightness, blur and details. This paper proposes an integrated dictionary-learning and entropy-based medical image-fusion framework that consists of three steps. First, the input image information is decomposed into low-frequency and high-frequency components by using a Gaussian filter. Second, low-frequency components are fused by weighted average algorithm and high-frequency components are fused by the dictionary-learning based algorithm. In the dictionary-learning process of high-frequency components, an entropy-based algorithm is used for informative blocks selection. Third, the fused low-frequency and high-frequency components are combined to obtain the final fusion results. The results and analyses of comparative experiments demonstrate that the proposed medical image fusion framework has better performance than existing solutions.
      Citation: Future Internet
      PubDate: 2017-10-06
      DOI: 10.3390/fi9040061
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 62: A Practical Resource Management Scheme
           for Cellular Underlaid D2D Networks

    • Authors: Tae-Won Ban
      First page: 62
      Abstract: In this paper, we investigate a resource management scheme for cellular underlaid device-to-device (D2D) communications, which are an integral part of mobile caching networks. D2D communications are allowed to share radio resources with cellular communications as long as the generating interference of D2D communications satisfies an interference constraint to secure cellular communications. Contrary to most of the other studies, we propose a distributed resource management scheme for cellular underlaid D2D communications focusing on a practical feasibility. In the proposed scheme, the feedback of channel information is not required because all D2D transmitters use a fixed transmit power and every D2D transmitter determines when to transmit data on its own without centralized control. We analyze the average sum-rates to evaluate the proposed scheme and compare them with optimal values, which can be achieved when a central controller has the perfect entire channel information and the full control of all D2D communications. Our numerical results show that the average sum-rates of the proposed scheme approach the optimal values in low or high signal-to-noise power ratio (SNR) regions. In particular, the proposed scheme achieves almost optimal average sum-rates in the entire SNR values in practical environments.
      Citation: Future Internet
      PubDate: 2017-10-13
      DOI: 10.3390/fi9040062
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 63: Collaborative Web Service Discovery and
           Recommendation Based on Social Link

    • Authors: Lijun Duan, Hao Tian
      First page: 63
      Abstract: With the increasing application of web services in varying fields, the demand of effective Web service discovery approaches is becoming unprecedentedly strong. To improve the performance of service discovery, this paper proposes a collaborative Web service discovery and recommendation mechanism based on social link by extracting the latent relationships behind users and services. The presented approach can generate a set of candidate services through a complementary manner, in which service discovery and service recommendation could collaborate according to the formalized social link. The experimental results reveal that the proposed mechanism can effectively improve the efficiency and precision of Web service discovery.
      Citation: Future Internet
      PubDate: 2017-10-13
      DOI: 10.3390/fi9040063
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 64: IAACaaS: IoT Application-Scoped Access
           Control as a Service

    • Authors: Álvaro Alonso, Federico Fernández, Lourdes Marco, Joaquín Salvachúa
      First page: 64
      Abstract: access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.
      Citation: Future Internet
      PubDate: 2017-10-17
      DOI: 10.3390/fi9040064
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 65: An Effective Grouping Method for
           Privacy-Preserving Bike Sharing Data Publishing

    • Authors: A S M Hasan, Qingshan Jiang, Chengming Li
      First page: 65
      Abstract: Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting information along with user identity and make it public by removing the user identity. Even after excluding user identification, the published bike sharing dataset will not be protected against privacy disclosure risks. An adversary may arrange published datasets based on bike’s visiting information to breach a user’s privacy. In this paper, we propose a grouping based anonymization method to protect published bike sharing dataset from linking attacks. The proposed Grouping method ensures that the published bike sharing microdata will be protected from disclosure risks. Experimental results show that our approach can protect user privacy in the released datasets from disclosure risks and can keep more data utility compared with existing methods.
      Citation: Future Internet
      PubDate: 2017-10-18
      DOI: 10.3390/fi9040065
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 66: Deep Classifiers-Based License Plate
           Detection, Localization and Recognition on GPU-Powered Mobile Platform

    • Authors: Syed Rizvi, Denis Patti, Tomas Björklund, Gianpiero Cabodi, Gianluca Francini
      First page: 66
      Abstract: The realization of a deep neural architecture on a mobile platform is challenging, but can open up a number of possibilities for visual analysis applications. A neural network can be realized on a mobile platform by exploiting the computational power of the embedded GPU and simplifying the flow of a neural architecture trained on the desktop workstation or a GPU server. This paper presents an embedded platform-based Italian license plate detection and recognition system using deep neural classifiers. In this work, trained parameters of a highly precise automatic license plate recognition (ALPR) system are imported and used to replicate the same neural classifiers on a Nvidia Shield K1 tablet. A CUDA-based framework is used to realize these neural networks. The flow of the trained architecture is simplified to perform the license plate recognition in real-time. Results show that the tasks of plate and character detection and localization can be performed in real-time on a mobile platform by simplifying the flow of the trained architecture. However, the accuracy of the simplified architecture would be decreased accordingly.
      Citation: Future Internet
      PubDate: 2017-10-21
      DOI: 10.3390/fi9040066
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 67: SDMw: Secure Dynamic Middleware for
           Defeating Port and OS Scanning

    • Authors: Dalal Hanna, Prakash Veeraraghavan, Ben Soh
      First page: 67
      Abstract: Fingerprinting is a process of identifying the remote network devices and services running on the devices, including operating systems (OS) of the devices, and hosts running different OSs. Several research proposals and commercial products are available in the market to defeat fingerprinting. However, they have performance limitations and expose themselves to attackers. In this paper, we utilize some real-time fault-tolerance concepts (viz. real-time/dynamic, detection/locating, confinement/localizing and masking/decoy) to propose a plug-and-play adaptive middleware architecture called Secure Dynamic Middleware (SDMw) with a view to defeat attackers fingerprinting the network, without exposing itself to the attackers. We verify that the proposed scheme works seamlessly and requires zero-configuration at the client side.
      Citation: Future Internet
      PubDate: 2017-10-21
      DOI: 10.3390/fi9040067
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 68: Challenges When Using Jurimetrics in
           Brazil—A Survey of Courts

    • Authors: Bruna Armonas Colombo, Pedro Buck, Vinicius Miana Bezerra
      First page: 68
      Abstract: Jurimetrics is the application of quantitative methods, usually statistics, to law. An important step to implement a jurimetric analysis is to extract raw data from courts and organize that data in a way that can be processed. Most of the raw data is unstructured and written in natural language, which stands as a challenge to Computer Science experts. As it requires expertise in law, statistics, and computer science, jurimetrics is a multidisciplinary field. When trying to implement a jurimetric system in Brazil, additional challenges were identified due to the heterogeneity of the different court systems, the lack of standards, and how the open data laws in Brazil are interpreted and implemented. In this article, we present a survey of Brazilian courts in terms of readiness to implement a jurimetric system. Analyzing a sample of data, we have found, in light of Brazil’s open data regulation, privacy issues and technical issues. Finally, we propose a roadmap that encompasses both technology and public policy to meet those challenges.
      Citation: Future Internet
      PubDate: 2017-10-25
      DOI: 10.3390/fi9040068
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 69: Signal Consensus in TSP of the Same
           Grid in Road Network

    • Authors: Dongyuan Li, Chengshuai Li, Zidong Wang, Deqiang Wang, Jianping Xing, Bo Zhang
      First page: 69
      Abstract: In this paper, we propose a consensus algorithm with input constraints for traffic light signals in transit signal priority (TSP). TSP ensures control strategy of traffic light signals can be adjusted and applied according to the real-time traffic status, and provides priority for buses. We give the convergence conditions of the consensus algorithms with and without input constraints in TSP respectively and analyze the convergence performance of them by using matrix theory and graph theory, and PTV-VISSIM is used to simulate the traffic accident probability of three cases at intersections. Simulation results are presented that a consensus is asymptotically reached for all weights of priority; the algorithm with input constraints is more suitable for TSP than the algorithm without input constraints, and the traffic accident rate is reduced.
      Citation: Future Internet
      PubDate: 2017-10-24
      DOI: 10.3390/fi9040069
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 70: Exploring Data Model Relations in
           OpenStreetMap

    • Authors: Hippolyte Pruvost, Peter Mooney
      First page: 70
      Abstract: The OpenStreetMap (OSM) geographic data model has three principal object types: nodes (points), ways (polygons and polylines), and relations (logical grouping of all three object types to express real-world geographical relationships). While there has been very significant analysis of OSM over the past decade or so, very little research attention has been given to OSM relations. In this paper, we provide an exploratory overview of relations in OSM for four European cities. In this exploration, we undertake analysis of relations to assess their complexity, composition and flexibility within the OSM data model. We show that some of the patterns discovered by researchers related to OSM nodes and ways also exist in relations. We find some other interesting aspects of relations which we believe can act as a catalyst for a more sustained future research effort on relations in OSM. These aspects include: the potential influence of bulk imports of geographical data to OSM, tagging of relations, and contribution patterns of edits to OSM relations.
      Citation: Future Internet
      PubDate: 2017-10-24
      DOI: 10.3390/fi9040070
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 71: FttC-Based Fronthaul for 5G
           Dense/Ultra-Dense Access Network: Performance and Costs in Realistic
           Scenarios

    • Authors: Franco Mazzenga, Romeo Giuliano, Francesco Vatalaro
      First page: 71
      Abstract: One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes) at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.
      Citation: Future Internet
      PubDate: 2017-10-27
      DOI: 10.3390/fi9040071
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 72: Throughput-Aware Cooperative
           Reinforcement Learning for Adaptive Resource Allocation in
           Device-to-Device Communication

    • Authors: Muhidul Khan, Muhammad Alam, Yannick Moullec, Elias Yaacoub
      First page: 72
      Abstract: Device-to-device (D2D) communication is an essential feature for the future cellular networks as it increases spectrum efficiency by reusing resources between cellular and D2D users. However, the performance of the overall system can degrade if there is no proper control over interferences produced by the D2D users. Efficient resource allocation among D2D User equipments (UE) in a cellular network is desirable since it helps to provide a suitable interference management system. In this paper, we propose a cooperative reinforcement learning algorithm for adaptive resource allocation, which contributes to improving system throughput. In order to avoid selfish devices, which try to increase the throughput independently, we consider cooperation between devices as promising approach to significantly improve the overall system throughput. We impose cooperation by sharing the value function/learned policies between devices and incorporating a neighboring factor. We incorporate the set of states with the appropriate number of system-defined variables, which increases the observation space and consequently improves the accuracy of the learning algorithm. Finally, we compare our work with existing distributed reinforcement learning and random allocation of resources. Simulation results show that the proposed resource allocation algorithm outperforms both existing methods while varying the number of D2D users and transmission power in terms of overall system throughput, as well as D2D throughput by proper Resource block (RB)-power level combination with fairness measure and improving the Quality of service (QoS) by efficient controlling of the interference level.
      Citation: Future Internet
      PubDate: 2017-11-01
      DOI: 10.3390/fi9040072
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 73: Quality of Service Based NOMA Group D2D
           Communications

    • Authors: Asim Anwar, Boon-Chong Seet, Xue Li
      First page: 73
      Abstract: Non-orthogonal multiple access (NOMA) provides superior spectral efficiency and is considered as a promising multiple access scheme for fifth generation (5G) wireless systems. The spectrum efficiency can be further enhanced by enabling device-to-device (D2D) communications. In this work, we propose quality of service (QoS) based NOMA (Q-NOMA) group D2D communications in which the D2D receivers (DRs) are ordered according to their QoS requirements. We discuss two possible implementations of proposed Q-NOMA group D2D communications based on the two power allocation coefficient policies. In order to capture the key aspects of D2D communications, which are device clustering and spatial separation, we model the locations of D2D transmitters (DTs) by Gauss–Poisson process (GPP). The DRs are then considered to be clustered around DTs. Multiple DTs can exist in proximity of each other. In order to characterize the performance, we derive the Laplace transform of the interference at the probe D2D receiver and obtain a closed-form expression of its outage probability using stochastic geometry tools. The performance of proposed Q-NOMA group D2D communications is then evaluated and benchmarked against conventional paired D2D communications.
      Citation: Future Internet
      PubDate: 2017-11-01
      DOI: 10.3390/fi9040073
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 74: Efficient Traffic Engineering
           Strategies for Improving the Performance of TCP Friendly Rate Control
           Protocol

    • Authors: Nalavala Reddy, Pakanati Reddy, Mokkala Padmavathamma
      First page: 74
      Abstract: Multimedia services will play a prominent role in the next generation of internet. With increasing real time requirements, internet technology has to provide Quality of Service (QoS) for various kinds of real time streaming services. When the bandwidth required exceeds the available network resources, network paths can get congested, which results in a delay in packet delivery and packet loss. This situation leads to the design of new strategies for congestion avoidance and control. One of the popular and appropriate congestion control mechanisms that is useful in transmitting multimedia applications in the transport layer is TCP Friendly Rate Control Protocol (TFRC). However, TFRC still suffers from packet loss and delay due to long distance heavy traffic and network fluctuations. This paper introduces a number of key concerns like enhanced Round Trip Time (RTT) and Retransmission Time Out (RTO) calculations, Enhanced Average Loss Interval (ALI) methods and improved Time to Live (TTL) features are applied to TFRC to enhance the performance of TFRC over wired networks.
      Citation: Future Internet
      PubDate: 2017-11-01
      DOI: 10.3390/fi9040074
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 75: Creation and Staging of Android Theatre
           “Sayonara”towards Developing Highly Human-Like Robots

    • Authors: Takenobu Chikaraishi, Yuichiro Yoshikawa, Kohei Ogawa, Oriza Hirata, Hiroshi Ishiguro
      First page: 75
      Abstract: Even after long-term exposures, androids with a strikingly human-like appearance evoke unnatural feelings. The behavior that would induce human-like feelings after long exposures is difficult to determine, and it often depends on the cultural background of the observers. Therefore, in this study, we generate an acting performance system for the android, in which an android and a human interact in a stage play in the real world. We adopt the theatrical theory called Contemporary Colloquial Theatre Theory to give the android natural behaviors so that audiences can comfortably observe it even after long-minute exposure. A stage play is created and shown in various locations, and the audiences are requested to report their impressions of the stage and their cultural and psychological backgrounds in a self-evaluating questionnaire. Overall analysis indicates that the audience had positive feelings, in terms of attractiveness, towards the android on the stage even after 20 min of exposure. The singularly high acceptance of the android by Japanese audiences seems to be correlated with a high animism tendency, rather than to empathy. We also discuss how the stage play approach is limited and could be extended to contribute to realization of human–robot interaction in the real world.
      Citation: Future Internet
      PubDate: 2017-11-02
      DOI: 10.3390/fi9040075
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 76: Understanding the Digital Marketing
           Environment with KPIs and Web Analytics

    • Authors: José Ramón Saura, Pedro Palos-Sánchez, Luis Manuel Cerdá Suárez
      First page: 76
      Abstract: In the practice of Digital Marketing (DM), Web Analytics (WA) and Key Performance Indicators (KPIs) can and should play an important role in marketing strategy formulation. It is the aim of this article to survey the various DM metrics to determine and address the following question: What are the most relevant metrics and KPIs that companies need to understand and manage in order to increase the effectiveness of their DM strategies' Therefore, to achieve these objectives, a Systematic Literature Review has been carried out based on two main themes (i) Digital Marketing and (ii) Web Analytics. The search terms consulted in the databases have been (i) DM and (ii) WA obtaining a result total of n = 378 investigations. The databases that have been consulted for the extraction of data were Scopus, PubMed, PsyINFO, ScienceDirect and Web of Science. In this study, we define and identify the main KPIs in measuring why, how and for what purpose users interact with web pages and ads. The main contribution of the study is to lay out and clarify quantitative and qualitative KPIs and indicators for DM performance in order to achieve a consensus on the use and measurement of these indicators.
      Citation: Future Internet
      PubDate: 2017-11-04
      DOI: 10.3390/fi9040076
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 77: A Comprehensive Survey on Real-Time
           Applications of WSN

    • Authors: Ahmad Ali, Yu Ming, Sagnik Chakraborty, Saima Iram
      First page: 77
      Abstract: Nowadays, the investigation of the Wireless Sensor Network (WSN) has materialized its functional area ubiquitously such as environmental engineering, industrial and business applications, military, feedstock and habitat, agriculture sector, seismic detection, intelligent buildings, smart grids, and predictive maintenance, etc. Although some challenges still exist in the wireless sensor network, in spite of the shortcoming, it has been gaining significant attention among researchers and technologists due to its versatility and robustness. WSN is subject to a high potential technology that has been successfully implemented and tested in real-time scenarios, as well as deployed practically in various applications. In this paper, we have carried out an extensive survey in real-time applications of wireless sensor network deployment in a practical scenario such as the real-time intelligent monitoring of temperature, criminal activity in borders and surveillance on traffic monitoring, vehicular behavior on roads, water level and pressure, and remote monitoring of patients. The application of the Wireless Sensor Network in the assorted field of research areas has been widely deliberated. WSN is found to be the most effective solution in remote areas which are not yet explored due to its perilous nature and unreachable places. Here, in this study, we have cited the recent and updated research on the ubiquitous usage of WSN in diverse fields in an extensive and comprehensive approach.
      Citation: Future Internet
      PubDate: 2017-11-07
      DOI: 10.3390/fi9040077
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 78: Proposed Fuzzy-NN Algorithm with
           LoRaCommunication Protocol for Clustered Irrigation Systems

    • Authors: Sotirios Kontogiannis, George Kokkonis, Soultana Ellinidou, Stavros Valsamidis
      First page: 78
      Abstract: Modern irrigation systems utilize sensors and actuators, interconnected together as a single entity. In such entities, A.I. algorithms are implemented, which are responsible for the irrigation process. In this paper, the authors present an irrigation Open Watering System (OWS) architecture that spatially clusters the irrigation process into autonomous irrigation sections.
      Authors ’ OWS implementation includes a Neuro-Fuzzy decision algorithm called FITRA, which originates from the Greek word for seed. In this paper, the FITRA algorithm is described in detail, as are experimentation results that indicate significant water conservations from the use of the FITRA algorithm. Furthermore, the authors propose a new communication protocol over LoRa radio as an alternative low-energy and long-range OWS clusters communication mechanism. The experimental scenarios confirm that the FITRA algorithm provides more efficient irrigation on clustered areas than existing non-clustered, time scheduled or threshold adaptive algorithms. This is due to the FITRA algorithm’s frequent monitoring of environmental conditions, fuzzy and neural network adaptation as well as adherence to past irrigation preferences.
      Citation: Future Internet
      PubDate: 2017-11-07
      DOI: 10.3390/fi9040078
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 79: Malicious Cognitive User Identification
           Algorithm in Centralized Spectrum Sensing System

    • Authors: Jingbo Zhang, Lili Cai, Shufang Zhang
      First page: 79
      Abstract: Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. When there is a high probability of a malicious user attack, the traditional algorithm can correctly identify the malicious users. However, when the probability of attack by malicious users is reduced, it is almost impossible to use the traditional algorithm to correctly distinguish between honest users and malicious users, which greatly reduces the perceived performance. To address the problem above, based on the β function and the feedback iteration mathematical method, this paper proposes a malicious user identification algorithm under multi-channel cooperative conditions (β-MIAMC), which involves comprehensively assessing the cognitive user’s performance on multiple sub-channels to identify the malicious user. Simulation results show under the same attack probability, compared with the traditional algorithm, the β-MIAMC algorithm can more accurately identify the malicious users, reducing the false alarm probability of malicious users by more than 20%. When the attack probability is greater than 7%, the proposed algorithm can identify the malicious users with 100% certainty.
      Citation: Future Internet
      PubDate: 2017-11-08
      DOI: 10.3390/fi9040079
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 80: A Framework for Cloud Based
           E-Government from the Perspective of Developing Countries

    • Authors: Pusp Joshi, Shareeful Islam, Syed Islam
      First page: 80
      Abstract: Despite significant efforts to initiate electronic government projects, developing countries are still struggling to reap the benefits of using e-government services. An effective implementation of e-government infrastructure is necessary to increase the efficiency and transparency of the government services. There are several studies that observed causes like lack of infrastructure support, lack of payment gateway and improper e-government service delivery channel as main barriers to a wider adoption of e-government services. The main contribution of this research is to propose a cloud-based G2G (Government-to-government) e-government framework for a viable e-government solution from the perspective of developing countries. We have introduced a list of concepts and a systematic process to guide the implementation of e-government project based on the government’s vision, goals, chosen services through the service delivery channel to the appropriate cloud service and deployment model. We have used Nepal as a context of the case study and applied the framework to a real e-government project of driving licensing department using action research methodology. The results from the study show that the G2G approach of e-government implementation would be the best for providing effective government services to the stakeholders of developing countries. The proposed framework also supports a smooth integration of government services and reduces the time of the overall project.
      Citation: Future Internet
      PubDate: 2017-11-09
      DOI: 10.3390/fi9040080
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 81: Network Intrusion Detection through
           Discriminative Feature Selection by Using Sparse Logistic Regression

    • Authors: Reehan Shah, Yuntao Qian, Dileep Kumar, Munwar Ali, Muhammad Alvi
      First page: 81
      Abstract: Intrusion detection system (IDS) is a well-known and effective component of network security that provides transactions upon the network systems with security and safety. Most of earlier research has addressed difficulties such as overfitting, feature redundancy, high-dimensional features and a limited number of training samples but feature selection. We approach the problem of feature selection via sparse logistic regression (SPLR). In this paper, we propose a discriminative feature selection and intrusion classification based on SPLR for IDS. The SPLR is a recently developed technique for data analysis and processing via sparse regularized optimization that selects a small subset from the original feature variables to model the data for the purpose of classification. A linear SPLR model aims to select the discriminative features from the repository of datasets and learns the coefficients of the linear classifier. Compared with the feature selection approaches, like filter (ranking) and wrapper methods that separate the feature selection and classification problems, SPLR can combine feature selection and classification into a unified framework. The experiments in this correspondence demonstrate that the proposed method has better performance than most of the well-known techniques used for intrusion detection.
      Citation: Future Internet
      PubDate: 2017-11-10
      DOI: 10.3390/fi9040081
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 82: A Combinational Buffer Management
           Scheme in Mobile Opportunistic Network

    • Authors: Peiyan Yuan, Hai Yu
      First page: 82
      Abstract: Nodes in Mobile Opportunistic Network (MON) have to cache packets to deal with the intermittent connection. The buffer management strategy obviously impacts the performance of MON, and it attracts more attention recently. Due to the limited storage capacity of nodes, traditional buffer management strategies just drop messages based on the property of message, and they neglect the collaboration between neighbors, resulting in an ineffective performance improvement. Therefore, effective buffer management strategies are necessary to ensure that each node has enough buffer space to store the message when the node buffer is close to congestion. In this paper, we propose a buffer management strategy by integrating the characteristics of messages and nodes, and migrate the redundant messages to the neighbor to optimize the total utility, instead of deleting them. The simulation experiment results show that it can obviously improve the delivery ratio, the overhead ratio and the average delays, and reduce the amount of hops compared with the traditional ones.
      Citation: Future Internet
      PubDate: 2017-11-14
      DOI: 10.3390/fi9040082
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 83: Request Expectation Index Based Cache
           Replacement Algorithm for Streaming Content Delivery over ICN

    • Authors: Haipeng Li, Hidenori Nakazato, Syed Ahmed
      First page: 83
      Abstract: Since the content delivery unit over Information-Centric Networking (ICN) has shifted from files to the segments of a file named chunks, solely either file-level or chunk-level request probability is insufficient for ICN cache management. In this paper, a Request Expectation Index (RXI) based cache replacement algorithm for streaming content delivery is proposed. In this algorithm, RXI is introduced to serve as a fine-grained and unified estimation criteria of possible future request probability for cached chunks. RXI is customized for streaming content delivery by adopting both file-level and chunk-level request probability and considering the dynamically varied request status at each route as well. Compared to prior work, the proposed algorithm evicts the chunk with the minimum expectation of future request to maintain a high cache utilization. Additionally, simulation results demonstrate that the RXI-based algorithm can remarkably enhance the streaming content delivery performance and can be deployed in complex network scenarios. The proposed results validate that, by taking fine-grained request probability and request status into consideration, the customized in-network caching algorithm can improve the ICN streaming content delivery performance by high cache utilization, fast content delivery, and lower network traffic.
      Citation: Future Internet
      PubDate: 2017-11-14
      DOI: 10.3390/fi9040083
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 84: Energy-Efficient Resource and Power
           Allocation for Underlay Multicast Device-to-Device Transmission

    • Authors: Fan Jiang, Honglin Wang, Hao Ren, Shuai Xu
      First page: 84
      Abstract: In this paper, we present an energy-efficient resource allocation and power control scheme for D2D (Device-to-Device) multicasting transmission. The objective is to maximize the overall energy-efficiency of D2D multicast clusters through effective resource allocation and power control schemes, while considering the quality of service (QoS) requirements of both cellular users (CUs) and D2D clusters. We first build the optimization model and a heuristic resource and power allocation algorithm is then proposed to solve the energy-efficiency problem with less computational complexity. Numerical results indicate that the proposed algorithm outperforms existing schemes in terms of throughput per energy consumption.
      Citation: Future Internet
      PubDate: 2017-11-14
      DOI: 10.3390/fi9040084
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 85: Blockchain-Empowered Fair Computational
           Resource Sharing System in the D2D Network

    • Authors: Zhen Hong, Zehua Wang, Wei Cai, Victor Leung
      First page: 85
      Abstract: Device-to-device (D2D) communication is becoming an increasingly important technology in future networks with the climbing demand for local services. For instance, resource sharing in the D2D network features ubiquitous availability, flexibility, low latency and low cost. However, these features also bring along challenges when building a satisfactory resource sharing system in the D2D network. Specifically, user mobility is one of the top concerns for designing a cooperative D2D computational resource sharing system since mutual communication may not be stably available due to user mobility. A previous endeavour has demonstrated and proven how connectivity can be incorporated into cooperative task scheduling among users in the D2D network to effectively lower average task execution time. There are doubts about whether this type of task scheduling scheme, though effective, presents fairness among users. In other words, it can be unfair for users who contribute many computational resources while receiving little when in need. In this paper, we propose a novel blockchain-based credit system that can be incorporated into the connectivity-aware task scheduling scheme to enforce fairness among users in the D2D network. Users’ computational task cooperation will be recorded on the public blockchain ledger in the system as transactions, and each user’s credit balance can be easily accessible from the ledger. A supernode at the base station is responsible for scheduling cooperative computational tasks based on user mobility and user credit balance. We investigated the performance of the credit system, and simulation results showed that with a minor sacrifice of average task execution time, the level of fairness can obtain a major enhancement.
      Citation: Future Internet
      PubDate: 2017-11-17
      DOI: 10.3390/fi9040085
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 86: Study of Mobility Enhancements for RPL
           in Convergecast Scenarios

    • Authors: Jinpeng Wang, Gérard Chalhoub
      First page: 86
      Abstract: In recent years, mobility support has become an important requirement in various wireless sensor network (WSN) applications. However, due to the strict resource constraints of power, memory, and processing resources in WSNs, routing protocols are mainly designed without considering mobility. Low-Power and Lossy Networks (LLNs) are a special type of WSNs that tolerate data loss. The Routing Protocol for Low-Power and Lossy Networks (RPL) is a routing protocol for LLNs that adapts IPv6 (Internet Protocol version 6) and runs on top of the IEEE (Institute of Electrical and Electronics Engineers) 802.15.4 standard. RPL supports multipoint-to-point traffic and point-to-multipoint traffic. In this paper we propose a mobility enhancement mechanism in order to improve data collection applications in highly mobile scenarios. The enhancement is based on signal strength monitoring and depth updating in order to improve the routing protocol performance in mobile scenarios. This enhancement helps routing protocols to cope better with topology changes and makes proactive decisions on updating next-hop neighbours. We integrated this mechanism into the RPL and compared it with other existing RPL mobility support enhancements. Results obtained through simulation using Cooja show that our work outperforms other existing RPL mobility supports on different performance metrics. Results also prove the efficiency of our proposal in highly mobile scenarios.
      Citation: Future Internet
      PubDate: 2017-11-17
      DOI: 10.3390/fi9040086
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 87: High-Performance Elastic Management for
           Cloud Containers Based on Predictive Message Scheduling

    • Authors: Chengxin Yan, Ningjiang Chen, Zhang Shuo
      First page: 87
      Abstract: Containerized data centers can improve the computational density of IaaS layers. This intensive high-concurrency environment has high requirements for message scheduling and container processing. In the paper, an elastically scalable strategy for cloud containers based on predictive message scheduling is introduced, in order to reduce the delay of messages and improve the response time of services and the utilization of container resources. According to the busy degree of different containers, a management strategy of multiple containers at message-granularity level is developed, which gives the containers better elasticity. The simulation results show that the proposed strategy improves service processing efficiency and reduces response latency compared with existing solutions.
      Citation: Future Internet
      PubDate: 2017-11-28
      DOI: 10.3390/fi9040087
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 88: Behavioural Verification: Preventing
           Report Fraud in Decentralized Advert Distribution Systems

    • Authors: Stylianos Mamais, George Theodorakopoulos
      First page: 88
      Abstract: Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places a significant strain on Advertisers who have no effective means of differentiating fabricated Ad-Reports from those which correspond to real consumer activity. To address this problem, we contribute an advert reporting system which utilizes opportunistic networking and a blockchain-inspired construction in order to identify authentic Ad-Reports by determining whether they were composed by honest or dishonest users. What constitutes a user’s honesty for our system is the manner in which they access adverts on their mobile device. Dishonest users submit multiple reports over a short period of time while honest users behave as consumers who view adverts at a balanced pace while engaging in typical social activities such as purchasing goods online, moving through space and interacting with other users. We argue that it is hard for dishonest users to fake honest behaviour and we exploit the behavioural patterns of users in order to classify Ad-Reports as real or fabricated. By determining the honesty of the user who submitted a particular report, our system offers a more secure reward-claiming model which protects against fraud while still preserving the user’s anonymity.
      Citation: Future Internet
      PubDate: 2017-11-20
      DOI: 10.3390/fi9040088
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 89: A Fast and Reliable Broadcast Service
           for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions

    • Authors: Giovanni Nardini, Giovanni Stea, Antonio Virdis
      First page: 89
      Abstract: Several applications, from the Internet of Things for smart cities to those for vehicular networks, need fast and reliable proximity-based broadcast communications, i.e., the ability to reach all peers in a geographical neighborhood around the originator of a message, as well as ubiquitous connectivity. In this paper, we point out the inherent limitations of the LTE (Long-Term Evolution) cellular network, which make it difficult, if possible at all, to engineer such a service using traditional infrastructure-based communications. We argue, instead, that network-controlled device-to-device (D2D) communications, relayed in a multihop fashion, can efficiently support this service. To substantiate the above claim, we design a proximity-based broadcast service which exploits multihop D2D. We discuss the relevant issues both at the UE (User Equipment), which has to run applications, and within the network (i.e., at the eNodeBs), where suitable resource allocation schemes have to be enforced. We evaluate the performance of a multihop D2D broadcasting using system-level simulations, and demonstrate that it is fast, reliable and economical from a resource consumption standpoint.
      Citation: Future Internet
      PubDate: 2017-11-25
      DOI: 10.3390/fi9040089
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 90: An Ontology-Based Approach to Enable
           Knowledge Representation and Reasoning in Worker–Cobot Agile
           Manufacturing

    • Authors: Ahmed R. Sadik, Bodo Urban
      First page: 90
      Abstract: There is no doubt that the rapid development in robotics technology has dramatically changed the interaction model between the Industrial Robot (IR) and the worker. As the current robotic technology has afforded very reliable means to guarantee the physical safety of the worker during a close proximity interaction with the IR. Therefore, new forms of cooperation between the robot and the worker can now be achieved. Collaborative/Cooperative robotics is the new branch of industrial robotics which empowers the idea of cooperative manufacturing. Cooperative manufacturing significantly depends on the existence of a collaborative/cooperative robot (cobot). A cobot is usually a Light-Weight Robot (LWR) which is capable of operating safely with the human co-worker in a shared work environment. This is in contrast with the conventional IR which can only operate in isolation from the worker workspace, due to the fact that the conventional IR can manipulate very heavy objects, which makes it so dangerous to operate in direct contact with the worker. There is a slight difference between the definition of collaboration and cooperation in robotics. In cooperative robotics, both the worker and the robot are performing tasks over the same product in the same shared workspace but not simultaneously. Collaborative robotics has a similar definition, except that the worker and the robot are performing a simultaneous task. Gathering the worker and the cobot in the same manufacturing workcell can provide an easy and cheap method to flexibly customize the production. Moreover, to adapt with the production demands in the real time of production, without the need to stop or to modify the production operations. There are many challenges and problems that can be addressed in the cooperative manufacturing field. However, one of the most important challenges in this field is the representation of the cooperative manufacturing environment and components. Thus, in order to accomplish the cooperative manufacturing concept, a proper approach is required to describe the shared environment between the worker and the cobot. The cooperative manufacturing shared environment includes the cobot, the co-worker, and other production components such as the product itself. Furthermore, the whole cooperative manufacturing system components need to communicate and share their knowledge, to reason and process the shared information, which eventually gives the control solution the capability of obtaining collective manufacturing decisions. Putting into consideration that the control solution should also provide a natural language which is human readable and in the same time can be understood by the machine (i.e., the cobot). Accordingly, a distributed control solution which combines an ontology-based Multi-Agent System (MAS) and a Business Rule Management System (BRMS) is proposed, in order to solve the mentioned challenges in the cooperative manufacturing, which are: manufacturing knowledge representation, sharing, and reasoning.
      Citation: Future Internet
      PubDate: 2017-11-24
      DOI: 10.3390/fi9040090
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 91: High Throughput and Acceptance Ratio
           Multipath Routing Algorithm in Cognitive Wireless Mesh Network

    • Authors: Zhufang Kuang, Gongqiang Li, Junshan Tan, Zhigang Chen
      First page: 91
      Abstract: The link failure due to the secondary users exiting the licensed channels when primary users reoccupy the licensed channels is very important in cognitive wireless mesh networks (CWMNs). A multipath routing and spectrum allocation algorithm based on channel interference and reusability with Quality of Service (QoS) constraints in CWMNs (MRIR) was proposed. Maximizing the throughput and the acceptance ratio of the wireless service is the objective of the MRIR. First, a primary path of resource conservation with QoS constraints was constructed, then, a resource conservation backup path based on channel interference and reusability with QoS constraints was constructed. The MRIR algorithm contains the primary path routing and spectrum allocation algorithm, and the backup path routing and spectrum allocation algorithm. The simulation results showed that the MRIR algorithm could achieve the expected goals and could achieve a higher throughput and acceptance ratio.
      Citation: Future Internet
      PubDate: 2017-11-25
      DOI: 10.3390/fi9040091
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 92: Social-Aware Relay Selection for
           Cooperative Multicast Device-to-Device Communications

    • Authors: Francesco Chiti, Romano Fantacci, Laura Pierucci
      First page: 92
      Abstract: The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has triggered new communication paradigms such as device-to-device (D2D) and relaying communication schemes, which are both considered as strong drivers for the next fifth-generation (5G) cellular systems. Recently, the social-aware layer and its relationship to and influence on the physical communications layer have gained great attention as emerging focus points. We focus here on the case of relaying communications to pursue the multicast data dissemination to a group of users forming a social community through a relay node, according to the extension of the D2D mode to the case of device-to-many devices. Moreover, in our case, the source selects the device to act as the relay among different users of the multicast group by taking into account both the propagation link conditions and the relay social-trust level with the constraint of minimizing the end-to-end content delivery delay. An optimization procedure is also proposed in order to achieve the best performance. Finally, numerical results are provided to highlight the advantages of considering the impact of social level on the end-to-end delivery delay in the integrated social–physical network in comparison with the classical relay-assisted multicast communications for which the relay social-trust level is not considered.
      Citation: Future Internet
      PubDate: 2017-12-04
      DOI: 10.3390/fi9040092
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 93: How 5G Wireless (and Concomitant
           Technologies) Will Revolutionize Healthcare'

    • Authors: Siddique Latif, Junaid Qadir, Shahzad Farooq, Muhammad Imran
      First page: 93
      Abstract: The need to have equitable access to quality healthcare is enshrined in the United Nations (UN) Sustainable Development Goals (SDGs), which defines the developmental agenda of the UN for the next 15 years. In particular, the third SDG focuses on the need to “ensure healthy lives and promote well-being for all at all ages”. In this paper, we build the case that 5G wireless technology, along with concomitant emerging technologies (such as IoT, big data, artificial intelligence and machine learning), will transform global healthcare systems in the near future. Our optimism around 5G-enabled healthcare stems from a confluence of significant technical pushes that are already at play: apart from the availability of high-throughput low-latency wireless connectivity, other significant factors include the democratization of computing through cloud computing; the democratization of Artificial Intelligence (AI) and cognitive computing (e.g., IBM Watson); and the commoditization of data through crowdsourcing and digital exhaust. These technologies together can finally crack a dysfunctional healthcare system that has largely been impervious to technological innovations. We highlight the persistent deficiencies of the current healthcare system and then demonstrate how the 5G-enabled healthcare revolution can fix these deficiencies. We also highlight open technical research challenges, and potential pitfalls, that may hinder the development of such a 5G-enabled health revolution.
      Citation: Future Internet
      PubDate: 2017-12-11
      DOI: 10.3390/fi9040093
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 94: Approximate Networking for Universal
           Internet Access

    • Authors: Junaid Qadir, Arjuna Sathiaseelan, Umar Farooq, Muhammad Usama, Muhammad Imran, Muhammad Shafique
      First page: 94
      Abstract: Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion), we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA) in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional) Internet experience.
      Citation: Future Internet
      PubDate: 2017-12-11
      DOI: 10.3390/fi9040094
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 95: SCMC: An Efficient Scheme for
           Minimizing Energy in WSNs Using a Set Cover Approach

    • Authors: Ahmed Mahlous
      First page: 95
      Abstract: Energy-efficient clustering and routing are well known optimization problems in the study of Wireless Sensor Network (WSN) lifetime extension. In this paper, we propose an intelligent hybrid optimization algorithm based on a Set Cover approach to create clusters, and min-cost max-flow for routing (SCMC) to increase the lifetime of WSNs. In our method we used linear programming (LP) to model the WSN optimization problem. This model considers minimizing the energy for all nodes in each set cover (cluster), and then minimizing the routing energy between the nodes and the base station through intermediate nodes, namely cluster heads. To evaluate the performance of our scheme, extensive simulations were conducted with different scenarios. The results show that the set cover approach combined with the min-cost max-flow algorithm reduces energy consumption and increases the network’s lifetime and throughput.
      Citation: Future Internet
      PubDate: 2017-12-13
      DOI: 10.3390/fi9040095
      Issue No: Vol. 9, No. 4 (2017)
       
  • Future Internet, Vol. 9, Pages 31: NB-IoT for D2D-Enhanced Content
           Uploading with Social Trustworthiness in 5G Systems †

    • Authors: Leonardo Militano, Antonino Orsino, Giuseppe Araniti, Antonio Iera
      First page: 31
      Abstract: Future fifth-generation (5G) cellular systems are set to give a strong boost to the large-scale deployment of Internet of things (IoT). In the view of a future converged 5G-IoT infrastructure, cellular IoT solutions such as narrowband IoT (NB-IoT) and device-to-device (D2D) communications are key technologies for supporting IoT scenarios and applications. However, some open issues still need careful investigation. An example is the risk of threats to privacy and security when IoT mobile services rely on D2D communications. To guarantee efficient and secure connections to IoT services involving exchange of sensitive data, reputation-based mechanisms to identify and avoid malicious devices are fast gaining ground. In order to tackle the presence of malicious nodes in the network, this paper introduces reliability and reputation notions to model the level of trust among devices engaged in an opportunistic hop-by-hop D2D-based content uploading scheme. To this end, social awareness of devices is considered as a means to enhance the identification of trustworthy nodes. A performance evaluation study shows that the negative effects due to malicious nodes can be drastically reduced by adopting the proposed solution. The performance metrics that proved to benefit from the proposed solution are data loss, energy consumption, and content uploading time.
      Citation: Future Internet
      PubDate: 2017-07-08
      DOI: 10.3390/fi9030031
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 32: User Modelling Validation over the
           Security Awareness of Digital Natives

    • Authors: Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas
      First page: 32
      Abstract: Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, deploying suitable risk treatments requires the investigation of how security experts perceive the digital natives (young people, born in the digital era), when utilizing their user behavior models in the design and analysis of related systems. In this article, we present the results of a survey performed across a multinational sample of security professionals, in comparison to our earlier study over the security awareness of digital natives. Through this study, we seek to identify divergences between user behavior and the conceptual user-models that security experts utilise in their professional tasks. Our results indicate that the experts understanding over the user behaviour does not follow a solidified user-model, while influences from personal perceptions and randomness are also noticeable.
      Citation: Future Internet
      PubDate: 2017-07-10
      DOI: 10.3390/fi9030032
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 33: Robust Image Embedded Watermarking
           Using DCT and Listless SPIHT

    • Authors: J. Shivani, Ranjan Senapati
      First page: 33
      Abstract: This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversion, contrast manipulation, and compression. The proposed technique is made further robust by the incorporation of the Chinese remainder theorem (CRT) encryption technique. Our scheme is compared with the recently proposed CRT-based DCT technique, CRT-based spatial domain watermarking, and DCT-based inter block correlation techniques. Extensive simulation experiments show better robustness in common image manipulations and, at the same time, the proposed technique successfully makes the watermark perceptually invisible. A better Tamper Assessment Function (TAF) value of 2–15% and a better Normalized Correlation (NC) is achieved compared to some of the above techniques. In particular, the proposed technique shows better robustness on compression attacks at moderate to higher compression ratios. It is possible to maintain the imperceptibility and low TAF for various values by doubling the capacity of the watermark.
      Citation: Future Internet
      PubDate: 2017-07-12
      DOI: 10.3390/fi9030033
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 34: G-Networks with Adders

    • Authors: Jean-Michel Fourneau, Erol Gelenbe
      First page: 34
      Abstract: : Queueing networks are used to model the performance of the Internet, of manufacturing and job-shop systems, supply chains, and other networked systems in transportation or emergency management. Composed of service stations where customers receive service, and then move to another service station till they leave the network, queueing networks are based on probabilistic assumptions concerning service times and customer movement that represent the variability of system workloads. Subject to restrictive assumptions regarding external arrivals, Markovian movement of customers, and service time distributions, such networks can be solved efficiently with “product form solutions” that reduce the need for software simulators requiring lengthy computations. G-networks generalise these models to include the effect of “signals” that re-route customer traffic, or negative customers that reject service requests, and also have a convenient product form solution. This paper extends G-networks by including a new type of signal, that we call an “Adder”, which probabilistically changes the queue length at the service center that it visits, acting as a load regulator. We show that this generalisation of G-networks has a product form solution.
      Citation: Future Internet
      PubDate: 2017-07-10
      DOI: 10.3390/fi9030034
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 35: Combining Adaptive Holonic Control and
           ISA-95 Architectures to Self-Organize the Interaction in a
           Worker-Industrial Robot Cooperative Workcell

    • Authors: Ahmed Sadik, Bodo Urban
      First page: 35
      Abstract: Self-Organization is a spontaneous trend which exists in nature among different organisms. Self-organization refers to the process where some form of an overall order arises in a group due to the local interaction among the members of this group. In manufacturing, a similar definition of a Reconfigurable Manufacturing System (RMS) can be found. RMS is a system where the production components and functions can be modified, rearranged and/or interchanged in a timely and cost-effective manner to quickly respond to the production requirements. The definition of the RMS concept implies that the self-organization is an important key factor to fulfil that concept. A case study where a cooperation among a variable number of Industrial Robots (IRs) and workers is studied to show the importance of the research problem. The goal of the paper is to offer a suitable generic control and interaction architecture solution model, which obtains the self-organization from the RMS point of view. Ultimately, applying the proposed solution concept to the case study.
      Citation: Future Internet
      PubDate: 2017-07-14
      DOI: 10.3390/fi9030035
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 36: An Extended Framework for Recovering
           From Trust Breakdowns in Online Community Settings

    • Authors: Ruchdee Binmad, Mingchu Li, Zhen Wang, Nakema Deonauth, Chettupally Carie
      First page: 36
      Abstract: The violation of trust as a result of interactions that do not proceed as expected gives rise to the question as to whether broken trust can possibly be recovered. Clearly, trust recovery is more complex than trust initialization and maintenance. Trust recovery requires a more complex mechanism to explore different factors that cause the decline of trust and identify the affected individuals of trust violation both directly and indirectly. In this study, an extended framework for recovering trust is presented. Aside from evaluating whether there is potential for recovery based on the outcome of a forgiveness mechanism after a trust violation, encouraging cooperation between interacting parties after a trust violation through incentive mechanisms is also important. Furthermore, a number of experiments are conducted to validate the applicability of the framework and the findings show that the e-marketplace incorporating our proposed framework results in improved efficiency of trading, especially in long-term interactions.
      Citation: Future Internet
      PubDate: 2017-07-17
      DOI: 10.3390/fi9030036
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 37: A Novel Hybrid-Copy Algorithm for Live
           Migration of Virtual Machine

    • Authors: Zhou Lei, Exiong Sun, Shengbo Chen, Jiang Wu, Wenfeng Shen
      First page: 37
      Abstract: Live migration of virtual machines is an important approach for dynamic resource scheduling in cloud environment. The hybrid-copy algorithm is an excellent algorithm that combines the pre-copy algorithm with the post-copy algorithm to remedy the defects of the pre-copy algorithm and the post-copy algorithm. Currently, the hybrid-copy algorithm only copies all memory pages once in advance. In a write-intensive workload, copy memory pages once may be enough. However, more iterative copy rounds can significantly reduce the page faults in a read-intensive workload. In this paper, we propose a new parameter to decide the appropriate time to stop the iterative copy phase based on real-time situation. We use a Markov model to forecast the memory access pattern. Based on the predicted results and the analysis of the actual situation, the memory page transfer order would be adjusted to reduce the invalid transfers. The novel hybrid-copy algorithm is implemented on the Xen platform. The experimental results demonstrate that our mechanism has good performance both on read-intensive workloads and write-intensive workloads.
      Citation: Future Internet
      PubDate: 2017-07-18
      DOI: 10.3390/fi9030037
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 38: Interference-Aware Opportunistic
           Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs

    • Authors: Il-Gu Lee
      First page: 38
      Abstract: The wireless local area network (WLAN) is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs). However, WLAN’s inefficiency in terms of complexity and relatively large power consumption compared with other wireless standards has been reported as a major barrier for IoTs applications. This paper proposes an interference-aware opportunistic dynamic energy saving mechanism to improve energy efficiency for Wi-Fi enabled IoTs. The proposed scheme optimizes operating clock frequencies adaptively for signal processing when the mobile station transmits packets in partial sub-channels. Evaluation results demonstrate that the proposed scheme improves energy efficiency by approximately 34%.
      Citation: Future Internet
      PubDate: 2017-07-18
      DOI: 10.3390/fi9030038
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 39: Azure-Based Smart Monitoring System for
           Anemia-Like Pallor

    • Authors: Sohini Roychowdhury, Paul Hage, Joseph Vasquez
      First page: 39
      Abstract: Increasing costs of diagnostic healthcare have necessitated the development of hardware independent non-invasive Point of Care (POC) systems. Although anemia prevalence rates in global populations vary between 10% and 60% in various demographic groups, smart monitoring systems have not yet been developed for screening and tracking anemia-like pallor. In this work, we present two cloud platform-hosted POC applications that are directed towards smart monitoring of anemia-like pallor through eye and tongue pallor site images. The applications consist of a front-end graphical user interface (GUI) module and two different back-end image processing and machine learning modules. Both applications are hosted on a browser accessible tomcat server ported to an Azure Virtual Machine (VM). We observe that the first application spatially segments regions of interest from pallor site images with higher pallor classification accuracy and relatively longer processing times when compared to the lesser accurate yet faster second application. Also, both applications achieve 65%–98% accuracy in separating normal images from images with pallor or abnormalities. The optimized front-end module is significantly light-weight with a run-through time ratio of 10−5 with respect to the back-end modules. Thus, the proposed applications are portable and hardware independent, allowing for their use in pallor monitoring and screening tasks.
      Citation: Future Internet
      PubDate: 2017-07-26
      DOI: 10.3390/fi9030039
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 40: Visual Interface Evaluation for
           Wearables Datasets: Predicting the Subjective Augmented Vision Image QoE
           and QoS

    • Authors: Brian Bauman, Patrick Seeling
      First page: 40
      Abstract: As Augmented Reality (AR) applications become commonplace, the determination of a device operator’s subjective Quality of Experience (QoE) in addition to objective Quality of Service (QoS) metrics gains importance. Human subject experimentation is common for QoE relationship determinations due to the subjective nature of the QoE. In AR scenarios, the overlay of displayed content with the real world adds to the complexity. We employ Electroencephalography (EEG) measurements as the solution to the inherent subjectivity and situationality of AR content display overlaid with the real world. Specifically, we evaluate prediction performance for traditional image display (AR) and spherical/immersive image display (SAR) for the QoE and underlying QoS levels. Our approach utilizing a four-position EEG wearable achieves high levels of accuracy. Our detailed evaluation of the available data indicates that less sensors would perform almost as well and could be integrated into future wearable devices. Additionally, we make our Visual Interface Evaluation for Wearables (VIEW) datasets from human subject experimentation publicly available and describe their utilization.
      Citation: Future Internet
      PubDate: 2017-07-28
      DOI: 10.3390/fi9030040
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 41: Study on a Quality Evaluation Method
           for College English Classroom Teaching

    • Authors: Mao-hua Sun, Yuan-gang Li, Bing He
      First page: 41
      Abstract: A quality evaluation method is an important means and the main basis on which to evaluate the college English classroom teaching quality of teachers. To overcome the one-sided subjectivity and resulting imprecision of the traditional classroom teaching quality evaluation method, a scientific and reasonable quality evaluation index system for college English classroom teaching is constructed. The fuzzy comprehensive evaluation method and the analytic hierarchy process method are combined to propose an improved multi-level fuzzy comprehensive evaluation model for obtaining a new college English classroom teaching quality evaluation method. In the proposed method, according to the fuzzy characteristics of a college English classroom teaching quality evaluation, the fuzzy comprehensive evaluation method is used to transform the qualitative evaluation indexes into limited quantitative evaluation indexes, then a judgment matrix is constructed to determine the weights among different levels by using the analytic hierarchy process method. Additionally, the college English classroom teaching quality is evaluated in detail. Finally, an actual case of college English classroom teaching is used to verify the effectiveness of the college English classroom teaching quality evaluation method. The results show that the proposed college English classroom teaching method can overcome the subjectivity and randomness shortcomings of the traditional classroom teaching quality evaluation methods, and improve the reliability, accuracy, and objectivity of fuzzy comprehensive evaluation. It is an effective method to evaluate college English classroom teaching quality.
      Citation: Future Internet
      PubDate: 2017-07-30
      DOI: 10.3390/fi9030041
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 42: A Multimodal Perception Framework for
           Users Emotional State Assessment in Social Robotics

    • Authors: Lorenzo Cominelli, Nicola Carbonaro, Daniele Mazzei, Roberto Garofalo, Alessandro Tognetti, Danilo De Rossi
      First page: 42
      Abstract: In this work, we present an unobtrusive and non-invasive perception framework based on the synergy between two main acquisition systems: the Touch-Me Pad, consisting of two electronic patches for physiological signal extraction and processing; and the Scene Analyzer, a visual-auditory perception system specifically designed for the detection of social and emotional cues. It will be explained how the information extracted by this specific kind of framework is particularly suitable for social robotics applications and how the system has been conceived in order to be used in human-robot interaction scenarios.
      Citation: Future Internet
      PubDate: 2017-08-01
      DOI: 10.3390/fi9030042
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 43: A Survey of Denial-of-Service and
           Distributed Denial of Service Attacks and Defenses in Cloud Computing

    • Authors: Adrien Bonguet, Martine Bellaiche
      First page: 43
      Abstract: Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.
      Citation: Future Internet
      PubDate: 2017-08-05
      DOI: 10.3390/fi9030043
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 44: Multicell Interference Management in
           Device to Device Underlay Cellular Networks

    • Authors: Georgios Katsinis, Eirini Tsiropoulou, Symeon Papavassiliou
      First page: 44
      Abstract: In this paper, the problem of interference mitigation in a multicell Device to Device (D2D) underlay cellular network is addressed. In this type of network architectures, cellular users and D2D users share common Resource Blocks (RBs). Though such paradigms allow potential increase in the number of supported users, the latter comes at the cost of interference increase that in turn calls for the design of efficient interference mitigation methodologies. To treat this problem efficiently, we propose a two step approach, where the first step concerns the efficient RB allocation to the users and the second one the transmission power allocation. Specifically, the RB allocation problem is formulated as a bilateral symmetric interaction game. This assures the existence of a Nash Equilibrium (NE) point of the game, while a distributed algorithm, which converges to it, is devised. The power allocation problem is formulated as a linear programming problem per RB, and the equivalency between this problem and the total power minimization problem is shown. Finally, the operational effectiveness of the proposed approach is evaluated via numerical simulations, while its superiority against state of the art approaches existing in the recent literature is shown in terms of increased number of supported users, interference reduction and power minimization.
      Citation: Future Internet
      PubDate: 2017-08-07
      DOI: 10.3390/fi9030044
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 45: A Robust Image Watermarking Scheme
           Based on SVD in the Spatial Domain

    • Authors: Heng Zhang, Chengyou Wang, Xiao Zhou
      First page: 45
      Abstract: With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most robust watermarking schemes are performed in the transform domains, such as the discrete cosine transform (DCT) and singular value decomposition (SVD). Compared with spatial domain watermarking schemes, these methods have achieved good performance, such as better robustness and higher security. However, the computational complexity increases with the use of forward and reverse transforms. In this paper, we analyze the SVD-based watermarking scheme and its impact on the spatial domain. Based on this analysis and the mathematical characteristics of SVD, we present a robust image watermarking scheme where a binary watermark is embedded into the largest singular value of each image block in the spatial domain. Several experiments are conducted to verify the performance of the proposed watermarking scheme. The experimental results show that compared with the existing SVD domain watermarking schemes, our proposed method has maintained good robustness against various attacks. Moreover, it avoids the false positive problem existing in traditional SVD-based watermarking schemes and has lower computational complexity.
      Citation: Future Internet
      PubDate: 2017-08-07
      DOI: 10.3390/fi9030045
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 46: Digital Pre-Distortion of Carrier
           Frequency Offset for Reliable Wi-Fi Enabled IoTs

    • Authors: Il-Gu Lee
      First page: 46
      Abstract: The Internet of Things (IoTs) will change the requirements for wireless connectivity significantly, mainly with regard to service coverage, data rate, and energy efficiency. Therefore, to improve robustness and reliability, WiFi-enabled IoT devices have been developed to use narrowband communication. However, narrowband transmission in WiFi such as IEEE 802.11ah causes relatively higher frequency error due to the reduced subcarrier space, which is larger than legacy wireless local area networks (WLANs) in 2.4/5 GHz frequencies. In a direct conversion receiver, this error degrades the signal quality due to the presence of direct current (DC) offset cancellation circuits. In this paper, a digital carrier frequency offset (CFO) predistortion scheme is proposed for a reliable communication link in dense networks. Evaluation results demonstrate that the proposed scheme can improve received signal quality in terms of packet error rate and error vector magnitude.
      Citation: Future Internet
      PubDate: 2017-08-09
      DOI: 10.3390/fi9030046
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 47: Cost-Aware IoT Extension of DISSECT-CF

    • Authors: Andras Markus, Attila Kertesz, Gabor Kecskemeti
      First page: 47
      Abstract: In the age of the Internet of Things (IoT), more and more sensors, actuators and smart devices get connected to the network. Application providers often combine this connectivity with novel scenarios involving cloud computing. Before implementing changes in these large-scale systems, an in-depth analysis is often required to identify governance models, bottleneck situations, costs and unexpected behaviours. Distributed systems simulators help in such analysis, but they are often problematic to apply in this newly emerging domain. For example, most simulators are either too detailed (e.g., need extensive knowledge on networking), or not extensible enough to support the new scenarios. To overcome these issues, we discuss our IoT cost analysis oriented extension of DIScrete event baSed Energy Consumption simulaTor for Clouds and Federations (DISSECT-CF). Thus, we present an in-depth analysis of IoT and cloud related pricing models of the most widely used commercial providers. Then, we show how the fundamental properties (e.g., data production frequency) of IoT entities could be linked to the identified pricing models. To allow the adoption of unforeseen scenarios and pricing schemes, we present a declarative modelling language to describe these links. Finally, we validate our extensions by analysing the effects of various identified pricing models through five scenarios coming from the field of weather forecasting.
      Citation: Future Internet
      PubDate: 2017-08-14
      DOI: 10.3390/fi9030047
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 48: Flow Shop Scheduling Problem and
           Solution in Cooperative Robotics—Case-Study: One Cobot in Cooperation
           with One Worker

    • Authors: Ahmed Sadik, Bodo Urban
      First page: 48
      Abstract: This research combines between two different manufacturing concepts. On the one hand, flow shop scheduling is a well-known problem in production systems. The problem appears when a group of jobs shares the same processing sequence on two or more machines sequentially. Flow shop scheduling tries to find the appropriate solution to optimize the sequence order of this group of jobs over the existing machines. The goal of flow shop scheduling is to obtain the continuity of the flow of the jobs over the machines. This can be obtained by minimizing the delays between two consequent jobs, therefore the overall makespan can be minimized. On the other hand, collaborative robotics is a relatively recent approach in production where a collaborative robot (cobot) is capable of a close proximity cooperation with the human worker to increase the manufacturing agility and flexibility. The simplest case-study of a collaborative workcell is one cobot in cooperation with one worker. This collaborative workcell can be seen as a special case of the shop flow scheduling problem, where the required time from the worker to perform a specific job is unknown and variable. Therefore, during this research, we implement an intelligent control solution which can optimize the flow shop scheduling problem over the previously mentioned case-study.
      Citation: Future Internet
      PubDate: 2017-08-16
      DOI: 10.3390/fi9030048
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 49: Future Intelligent Systems and Networks

    • Authors: Carmen de-Pablos-Heredero
      First page: 49
      Abstract: n/a
      Citation: Future Internet
      PubDate: 2017-09-02
      DOI: 10.3390/fi9030049
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 50: ARAAC: A Rational Allocation Approach
           in Cloud Data Center Networks

    • Authors: Ahmad Quttoum, Ayoub Alsarhan, Abidalrahman Moh’d
      First page: 50
      Abstract: The expansion of telecommunication technologies touches almost all aspects life that we are living nowadays. Indeed, such technologies have emerged as a fourth essential utility alongside the traditional utilities of electricity, water, and gas. In this context, Cloud Data Center Networks (cloud-DCNs) have been proposed as a promising way to cope with such a high-tech era and with any expected trends in future computing networks. Resources of cloud-DCNs are leased to the interested users in the form of services, such services come in different models that vary between software, platform, and infrastructure. The leasing process of any service model starts with the users (i.e., service tenants). A tenant asks for the service resources, and the cloud-provider allocates the resources with a charge that follows a predefined cost policy. Cloud resources are limited, and those cloud providers have profit objectives to be satisfied. Thus, to comply with the aforementioned promise, the limited resources need to be carefully allocated. Existing allocation proposals in the literature dealt with this problem in varying ways. However, none proposes a win-win allocation model that satisfies both the providers and tenants. This work proposes A Rational Allocation Approach in Cloud Data Center Networks (ARAAC) that efficiently allocates the available cloud resources, in a way that allows for a win-win environment to satisfy both parties: the providers and tenants. To do so, ARAAC deploys the Second Best-Price (SBP) mechanism along with a behavioral-based reputation model. The reputation is built according to the tenants’ utilization history throughout their previous service allocations. The reputation records along with the adoption of the SBP mechanism allows for a locally free-equilibrium approach that allocates the available cloud-DCN resources in an efficient and fair manner. In ARAAC, through an auction scenario, tenants with positive reputation records are awarded by having the required resources allocated at prices that are lower than what they have offered. Compared to other benchmark models, simulation results show that ARAAC can efficiently adapt the behavior of those rational service-tenants to provide for better use of the cloud resources, with an increase in the providers’ profits.
      Citation: Future Internet
      PubDate: 2017-09-06
      DOI: 10.3390/fi9030050
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 51: Local Path Planning of Driverless Car
           Navigation Based on Jump Point Search Method Under Urban Environment

    • Authors: Kaijun Zhou, Lingli Yu, Ziwei Long, Siyao Mo
      First page: 51
      Abstract: The Jump Point Search (JPS) algorithm is adopted for local path planning of the driverless car under urban environment, and it is a fast search method applied in path planning. Firstly, a vector Geographic Information System (GIS) map, including Global Positioning System (GPS) position, direction, and lane information, is built for global path planning. Secondly, the GIS map database is utilized in global path planning for the driverless car. Then, the JPS algorithm is adopted to avoid the front obstacle, and to find an optimal local path for the driverless car in the urban environment. Finally, 125 different simulation experiments in the urban environment demonstrate that JPS can search out the optimal and safety path successfully, and meanwhile, it has a lower time complexity compared with the Vector Field Histogram (VFH), the Rapidly Exploring Random Tree (RRT), A*, and the Probabilistic Roadmaps (PRM) algorithms. Furthermore, JPS is validated usefully in the structured urban environment.
      Citation: Future Internet
      PubDate: 2017-09-12
      DOI: 10.3390/fi9030051
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 52: Design for Children’s Playful
           Learning with Robots

    • Authors: Maria Lupetti, Yuan Yao, Haipeng Mi, Claudio Germak
      First page: 52
      Abstract: This article presents an investigation of the implications of designing for children’s playful learning with robots. This study was carried out by adopting a Research through Design approach that resulted in the development of a novel low-anthropomorphic robot called Shybo. The article reports the main phases of the project: the preliminary and exploratory research that was carried out to define a list of design requirements; the design of the robot and its supplementary materials for carrying out playful learning experiences; and the evaluation of the project that involved both parents and children. The robot, in fact, was finally tested as part of a two-hour experience that engaged children in activities related to the associations between sounds and colours. The article presents and discusses the results of this evaluation to point out positive aspects of the experience, emerging issues and hints for future works. These are documented to share lessons learned that might be supportive of the general development of children’s playful learning and cognitive experiences with robots.
      Citation: Future Internet
      PubDate: 2017-09-18
      DOI: 10.3390/fi9030052
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 9, Pages 53: Towards a New Digital Era: Observing
           Local E-Government Services Adoption in a Chinese Municipality

    • Authors: Yao Yang
      First page: 53
      Abstract: As electronic government services (e-government) evolve, traditional applications such as online portals are encountering challenges in a new digital era in which people thirst for more convenient, diverse channels of communication with their government. Despite the efforts devoted to the promotion of Social Networking Service (SNS) use in e-government for the past few years, empirical studies regarding this ongoing trend are still insufficient. In the local administration of China, a special collaboration between local governments and private Internet enterprises is happening: government services are imported into commercial SNS platforms known as WeChat and Weibo. This research conducts a case study of a Chinese municipality premised upon survey data (N = 605) collected in Chongqing. It examines the determinants of e-services adoption in four major local applications: two traditional government-led services “Government website portal” and “Government official app” (traditional government-led services), and two built-in government services on social networking applications “Weibo Government official account” “WeChat Public Services”. The paper aims to provide a closer understanding of current trends in local government e-services, or in this case, an innovative trial of Chinese e-government practices.
      Citation: Future Internet
      PubDate: 2017-09-20
      DOI: 10.3390/fi9030053
      Issue No: Vol. 9, No. 3 (2017)
       
  • Future Internet, Vol. 10, Pages 1: A New Lightweight Watchdog-Based
           Algorithm for Detecting Sybil Nodes in Mobile WSNs

    • Authors: Rezvan Almas Shehni, Karim Faez, Farshad Eshghi, Manoochehr Kelarestaghi
      First page: 1
      Abstract: Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating several fabricated IDs. Due to energy consumption concerns in WSNs, devising detection algorithms which release the sensor nodes from high computational and communicational loads are of great importance. In this paper, a new computationally lightweight watchdog-based algorithm is proposed for detecting Sybil IDs in mobile WSNs. The proposed algorithm employs watchdog nodes for collecting detection information and a designated watchdog node for detection information processing and the final Sybil list generation. Benefiting from a newly devised co-presence state diagram and adequate detection rules, the new algorithm features low extra communication overhead, as well as a satisfactory compromise between two otherwise contradictory detection measures of performance, True Detection Rate (TDR) and False Detection Rate (FDR). Extensive simulation results illustrate the merits of the new algorithm compared to a couple of recent watchdog-based Sybil detection algorithms.
      Citation: Future Internet
      PubDate: 2017-12-21
      DOI: 10.3390/fi10010001
      Issue No: Vol. 10, No. 1 (2017)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.161.45.156
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-