18 articles in this issue
Future Internet Editorial Office
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization i... see more
Emilio Matricciani
According to altitude, the orbits of satellites constellations can be divided into geostationary Earth orbit (GEO), medium Earth orbit (MEO), and low Earth orbit (LEO) constellations. We propose to use a Walker star constellation with polar orbits, at any... see more
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Data... see more
Keisuke Utsu, Mariko Abe, Shuji Nishikawa and Osamu Uchida
In the aftermath of disastrous events in Japan, safety information and rescue requests, as well as emergency alerts and damage situations, have been shared on Twitter. However, even victims who are familiar with smartphones or similar devices and social m... see more
Brandon Foubert and Nathalie Mitton
Wireless networks are now a part of the everyday life of many people and are used for many applications. Recently, new technologies that enable low-power and long-range communications have emerged. These technologies, in opposition to more traditional com... see more
You Guo, Hector Marco-Gisbert and Paul Keir
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products de... see more
Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed and Ali Kashif Bashir
Internet of Things (IoT)-based devices consist of wireless sensor nodes that are battery-powered; thus, energy efficiency is a major issue. IEEE 802.15.4-compliant IoT devices operate in the unlicensed Industrial, Scientific, and Medical (ISM) band of 2.4... see more
Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel
This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health ... see more
Jiajia Wang and Guangming Li
Bridge displacement measurement is an important area of bridge health monitoring, which can directly reflect whether the deformation of bridge structure exceeds its safety permission. Target tracking technology and Digital Image Correlation (DIC) are two ... see more
Jingpu Wang, Xin Song and Yatao Ma
Non-orthogonal multiple access (NOMA) has become a promising technology for 5G. With the support of effective resource allocation algorithms, it can improve the spectrum resource utilization and system throughput. In this article, a new resource allocatio... see more
Symeon Papavassiliou
The role of Software Defined Networking (SDN) and Network Function Virtualization (NFV) have been instrumental in realizing the transition and vision “from black boxes to a white box towards facilitating 5G network architectures”. Though significant resea... see more
Andreas Veglis and Dimitrios Giomelakis
Apostolos Kousaridas, Andreas Schimpe, Sebastian Euler, Xavier Vilajosana, Mikael Fallgren, Giada Landi, Francesca Moscatelli, Sokratis Barmpounakis, Francisco Vázquez-Gallego, Roshan Sedar, Rodrigo Silva, Laurent Dizambourg, Stefan Wendt, Maciej Muehleisen, Kurt Eckert, Jérôme Härri and Jesus Alonso-Zarate
The vision of cooperative, connected and automated mobility (CCAM) across Europe can only be realized when harmonized solutions that support cross-border traffic exist. The possibility of providing CCAM services along different countries when vehicles dri... see more
Samuel Yankson and Mahdi Ghamkhari
The automatic generation control mechanism in power generators comes into operation whenever an over-supply or under-supply of energy occurs in the power grid. It has been shown that the automatic generation control mechanism is highly vulnerable to load ... see more
Jianjun Lei, Ying Wang and Hong Yun
Legacy IEEE 802.11 Medium Access Control (MAC) adopts the Distributed Coordination Function (DCF) mechanism, which provides the same access opportunity for all contenders. However, in dense multi-rate Wireless Local Area Networks (WLANs), the pure distrib... see more
Wen An, Jun Jie Ma, Hong Yang Zhou, Hong Shan Chen, Xu Jun and Xu Jian
With the development of wireless communication technology and computer technology, more and more smart technologies have been applied in electricity distribution networks. This paper presents an adaptive current differential protection and fast auto-closi... see more
Jie Yang, Ziyu Pan and Lihong Guo
Due to the dense deployment of base stations (BSs) in heterogeneous cellular networks (HCNs), the energy efficiency (EE) of HCN has attracted the attention of academia and industry. Considering its mathematical tractability, the Poisson point process (PPP... see more