Next Issue
Volume 9, June
Previous Issue
Volume 8, December
 
 

Future Internet, Volume 9, Issue 1 (March 2017) – 9 articles

Cover Story (view full-size image): The figure illustrates a video monitoring platform for wide rural areas not covered by Internet access. The platform comprises a backbone mesh network and a number of video transmitter devices.
The backbone network is an SDN/NFV flying ad-hoc network (FANET), whose nodes are drones equipped with computing units, each hosting an NFV infrastructure (NFVI) point of presence (POP) to run the virtual service elements constituting the platform at the application level.
Video transmission is realized with video transmitter drones and fixed wireless IP cameras, all sending video transmissions of portions of the considered rural area. Receivers of the video monitoring service are people who access the platform through a smartphone, tablet or personal computer to monitor one or more portions of the rural area.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
1484 KiB  
Article
Improved Recommendations Based on Trust Relationships in Social Networks
by Hao Tian and Peifeng Liang
Future Internet 2017, 9(1), 9; https://doi.org/10.3390/fi9010009 - 21 Mar 2017
Cited by 11 | Viewed by 5422
Abstract
In order to alleviate the pressure of information overload and enhance consumer satisfaction, personalization recommendation has become increasingly popular in recent years. As a result, various approaches for recommendation have been proposed in the past few years. However, traditional recommendation methods are still [...] Read more.
In order to alleviate the pressure of information overload and enhance consumer satisfaction, personalization recommendation has become increasingly popular in recent years. As a result, various approaches for recommendation have been proposed in the past few years. However, traditional recommendation methods are still troubled with typical issues such as cold start, sparsity, and low accuracy. To address these problems, this paper proposed an improved recommendation method based on trust relationships in social networks to improve the performance of recommendations. In particular, we define trust relationship afresh and consider several representative factors in the formalization of trust relationships. To verify the proposed approach comprehensively, this paper conducted experiments in three ways. The experimental results show that our proposed approach leads to a substantial increase in prediction accuracy and is very helpful in dealing with cold start and sparsity. Full article
Show Figures

Graphical abstract

3255 KiB  
Article
Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring
by Corrado Rametta and Giovanni Schembra
Future Internet 2017, 9(1), 8; https://doi.org/10.3390/fi9010008 - 20 Mar 2017
Cited by 57 | Viewed by 9455
Abstract
In the last decade, the differences in the information communication technology (ICT) infrastructures between urban and rural areas have registered a tremendous increase. ICT infrastructures could strongly help rural communities where many operations are time consuming, labor-intensive and expensive due to limited access [...] Read more.
In the last decade, the differences in the information communication technology (ICT) infrastructures between urban and rural areas have registered a tremendous increase. ICT infrastructures could strongly help rural communities where many operations are time consuming, labor-intensive and expensive due to limited access and large distances to cover. One of the most attractive solutions, which is widely recognized as promising for filling this gap, is the use of drone fleets. In this context, this paper proposes a video monitoring platform as a service (VMPaaS) for wide rural areas not covered by Internet access. The platform is realized with a Software-Defined Network (SDN)/Network Functions Virtualization (NFV)-based flying ad-hoc network (FANET), whose target is providing a flexible and dynamic connectivity backbone, and a set of drones equipped with high-resolution cameras, each transmitting a video stream of a portion of the considered area. After describing the architecture of the proposed platform, service chains to realize the video delivery service are described, and an analytical model is defined to evaluate the computational load of the platform nodes in such a way so as to allow the network orchestrator to decide the backbone drones where running the virtual functions, and the relative resources to be allocated. Numerical analysis is carried out in a case study. Full article
(This article belongs to the Special Issue Communications and Computing for Sustainable Development Goals)
Show Figures

Figure 1

3134 KiB  
Article
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning
by Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan
Future Internet 2017, 9(1), 7; https://doi.org/10.3390/fi9010007 - 5 Mar 2017
Cited by 15 | Viewed by 6766
Abstract
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy [...] Read more.
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people’s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet the needs of privacy protection in smart home applications, since attacks can be launched even without the need for access to the cipher. Rather, attacks can be successfully realized through analyzing the frequency of radio signals, as well as the timestamp series, so that the daily activities of the residents in the smart home can be learnt. Such types of attacks can achieve a very high success rate, making them a great threat to users’ privacy. In this paper, we propose an adaptive method based on sample data analysis and supervised learning (SDASL), to hide the patterns of daily routines of residents that would adapt to dynamically changing network loads. Compared to some existing solutions, our proposed method exhibits advantages such as low energy consumption, low latency, strong adaptability, and effective privacy protection. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
Show Figures

Figure 1

480 KiB  
Article
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset
by Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis and Leman Akoglu
Future Internet 2017, 9(1), 6; https://doi.org/10.3390/fi9010006 - 3 Mar 2017
Cited by 60 | Viewed by 18400
Abstract
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accurate and cost-efficient. However, the online [...] Read more.
The critical process of hiring has relatively recently been ported to the cloud. Specifically, the automated systems responsible for completing the recruitment of new employees in an online fashion, aim to make the hiring process more immediate, accurate and cost-efficient. However, the online exposure of such traditional business procedures has introduced new points of failure that may lead to privacy loss for applicants and harm the reputation of organizations. So far, the most common case of Online Recruitment Frauds (ORF), is employment scam. Unlike relevant online fraud problems, the tackling of ORF has not yet received the proper attention, remaining largely unexplored until now. Responding to this need, the work at hand defines and describes the characteristics of this severe and timely novel cyber security research topic. At the same time, it contributes and evaluates the first to our knowledge publicly available dataset of 17,880 annotated job ads, retrieved from the use of a real-life system. Full article
Show Figures

Figure 1

4065 KiB  
Article
Construction Management Risk System (CMRS) for Construction Management (CM) Firms
by Kyungmo Park, Sanghyo Lee and Yonghan Ahn
Future Internet 2017, 9(1), 5; https://doi.org/10.3390/fi9010005 - 10 Feb 2017
Cited by 7 | Viewed by 8674
Abstract
After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM) firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order [...] Read more.
After the global financial crisis of 2008, the need for risk management arose because it was necessary to minimize the losses in construction management (CM) firms. This was caused by a decreased amount of orders in the Korean CM market, which intensified order competition between companies. However, research results revealed that risks were not being systematically managed owing to the absence of risk management systems. Thus, it was concluded that it was necessary to develop standard operating systems and implement risk management systems in order to manage risks effectively. Therefore, the purpose of this study was to develop a construction risk management system (CRMS) for systematically managing risks. For this purpose, the field operation managers of CM firms were interviewed and surveyed in order to define risk factors. Upon this, a risk assessment priority analysis was performed. Finally, a risk management system that comprised seven modules and 20 sub-modules and was capable of responding systematically to risks was proposed. Furthermore, the effectiveness of this system was verified through on-site inspection. This system allows early response to risks, accountability verification and immediate response to legal disputes with clients by managing risk records. Full article
Show Figures

Figure 1

3181 KiB  
Article
A Point of View on New Education for Smart Citizenship
by Cristina Martelli
Future Internet 2017, 9(1), 4; https://doi.org/10.3390/fi9010004 - 1 Feb 2017
Cited by 9 | Viewed by 7132
Abstract
Smart cities and intelligent communities have an ever-growing demand for specialized smart services, applications, and research-driven innovation. Knowledge of users’ profiles, behavior, and preferences are a potentially dangerous side effect of smart services. Citizens are usually not aware of the knowledge bases generated [...] Read more.
Smart cities and intelligent communities have an ever-growing demand for specialized smart services, applications, and research-driven innovation. Knowledge of users’ profiles, behavior, and preferences are a potentially dangerous side effect of smart services. Citizens are usually not aware of the knowledge bases generated by the IT services they use: this dimension of the contemporary and digital era sheds new light on the elements concerning the concept of citizenship itself, as it affects dimensions like freedom and privacy. This paper addresses this issue from an education system perspective, and advances a non-technical methodology for being aware and recognizing knowledge bases generated by user-service interaction. Starting from narratives, developed in natural language by unskilled smart service users about their experience, the proposed method advances an original methodology, which is identified in the conceptual models derived from these narratives, a bridge towards a deeper understanding of the informative implications of their behavior. The proposal; which is iterative and scalable; has been tested on the field and some examples of lesson contents are presented and discussed. Full article
(This article belongs to the Special Issue Ecosystemic Evolution Feeded by Smart Systems)
Show Figures

Figure 1

741 KiB  
Article
Towards Incidence Management in 5G Based on Situational Awareness
by Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Jorge Maestre Vidal, Marco Antonio Sotelo Monge and Luis Javier García Villalba
Future Internet 2017, 9(1), 3; https://doi.org/10.3390/fi9010003 - 17 Jan 2017
Cited by 16 | Viewed by 9248
Abstract
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying faster networks, with hundreds of thousands of simultaneous connections and massive data transfer. For this purpose, several emerging technologies are implemented, resulting in virtualization and self-organization of most of their [...] Read more.
The fifth generation mobile network, or 5G, moves towards bringing solutions to deploying faster networks, with hundreds of thousands of simultaneous connections and massive data transfer. For this purpose, several emerging technologies are implemented, resulting in virtualization and self-organization of most of their components, which raises important challenges related to safety. In order to contribute to their resolution, this paper proposes a novel architecture for incident management on 5G. The approach combines the conventional risk management schemes with the Endsley Situational Awareness model, thus improving effectiveness in different aspects, among them the ability to adapt to complex and dynamical monitoring environments, and countermeasure tracking or the role of context when decision-making. The proposal takes into account all layers for information processing in 5G mobile networks, ranging from infrastructure to the actuators responsible for deploying corrective measures. Full article
(This article belongs to the Collection Information Systems Security)
Show Figures

Figure 1

211 KiB  
Editorial
Acknowledgement to Reviewers of Future Internet in 2016
by Future Internet Editorial Office
Future Internet 2017, 9(1), 2; https://doi.org/10.3390/fi9010002 - 12 Jan 2017
Viewed by 4750
Abstract
The editors of Future Internet would like to express their sincere gratitude to the following reviewers for assessing manuscripts in 2016.[...] Full article
1392 KiB  
Article
Key Technologies in the Context of Future Networks: Operational and Management Requirements
by Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay, Marco Antonio Sotelo Monge and Luis Javier García Villalba
Future Internet 2017, 9(1), 1; https://doi.org/10.3390/fi9010001 - 22 Dec 2016
Cited by 17 | Viewed by 9063
Abstract
The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, [...] Read more.
The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN), Network Function Virtualization (NFV) and Self-Organized Networks (SON) are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms. Full article
(This article belongs to the Collection Information Systems Security)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop