Secure Communication Protocols for Future Computing

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 3012

Special Issue Editors


E-Mail Website
Guest Editor

E-Mail Website
Guest Editor
1. Departamento de Informática, Universidade da Beira Interior, 6201-601 Covilhã, Portugal
2. Instituto de Telecomunicações, Delegação da Covilhã, 6201-601 Covilhã, Portugal
Interests: algorithms; protocols; communications; cloud computing; IoT

E-Mail Website
Guest Editor
Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, 37008 Salamanca, Spain
Interests: energy optimisation; distributed systems; renewable electricity generation; vehicular communication; IoT

Special Issue Information

Dear Colleagues,

Communications and protocols continue to assume an increasingly important role in today's technological society. The number of devices capable of computing, collecting or storing data is growing sharply, and novel forms of communication and services are proliferating, providing features that until recently were unthinkable, such as cloud computing, big data, the Internet of Things, EDGE computing, machine learning, blockchain without third-party mediation and moderation, ubiquitous computing and total immersion in everyday life. It is urgent to continue the development of solutions capable of responding to the growing challenges posed by new threats and new communication vectors, requiring a greater capacity to manage protocols in 5G and 6G communications, among other services, systems and communications. Therefore, there is a need for scientific research regarding the subject of communications and protocols in the Internet of Things, with an emphasis on different application domains with academic, industrial, judicial or military interest. We encourage the submission of articles exhibiting original work concerning topics related to:

  • 5G and 6G heterogeneous computing and communication systems;
  • AI-enabled IoT systems and applications;
  • Ambient assisted living systems;
  • Cryptographic algorithms and protocols;
  • Communication protocols for blockchain;
  • Communication protocols in pervasive and ubiquitous environments;
  • Communications in the Internet of Things;
  • Communications in DevOps environments;
  • Communication systems;
  • Communications in scenarios for assistance and support of social, industrial and recreational scenarios;
  • Communication and network protocols;
  • Communication systems in smart cities;
  • Data privacy in communication;
  • IoT solutions and protocols;
  • Integration of novel communications technologies into legacy environments;
  • Land and air vehicle communications;
  • Mobile edge computing;
  • Machine-to-machine communications;
  • Navigation, localization, map building and path planning;
  • Protocols and communications in the context of machine learning;
  • Resource optimization for IoT Systems;
  • Security and privacy in mobile devices and the cloud;
  • Secure applications;
  • Solutions for large-scale communications;
  • Vehicular communication and network systems.

Dr. Valderi R. Q. Leithardt
Dr. Paul Crocker
Dr. Raúl García Ovejero
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1837 KiB  
Article
Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks
by Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
Future Internet 2024, 16(3), 97; https://doi.org/10.3390/fi16030097 - 14 Mar 2024
Viewed by 869
Abstract
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existing literature delineates two primary approaches to image [...] Read more.
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existing literature delineates two primary approaches to image manipulation detection: active and passive. Active techniques intervene preemptively, embedding structures into images to facilitate subsequent authenticity verification, whereas passive methods analyze image content for traces of manipulation. This study presents a novel solution to image manipulation detection by leveraging a multi-stream neural network architecture. Our approach harnesses three convolutional neural networks (CNNs) operating on distinct data streams extracted from the original image. We have developed a solution based on two passive detection methodologies. The system utilizes two separate streams to extract specific data subsets, while a third stream processes the unaltered image. Each net independently processes its respective data stream, capturing diverse facets of the image. The outputs from these nets are then fused through concatenation to ascertain whether the image has undergone manipulation, yielding a comprehensive detection framework surpassing the efficacy of its constituent methods. Our work introduces a unique dataset derived from the fusion of four publicly available datasets, featuring organically manipulated images that closely resemble real-world scenarios. This dataset offers a more authentic representation than other state-of-the-art methods that use algorithmically generated datasets based on image patches. By encompassing genuine manipulation scenarios, our dataset enhances the model’s ability to generalize across varied manipulation techniques, thereby improving its performance in real-world settings. After training, the merged approach obtained an accuracy of 89.59% in the set of validation images, significantly higher than the model trained with only unaltered images, which obtained 78.64%, and the two other models trained using images with a feature selection method applied to enhance inconsistencies that obtained 68.02% for Error-Level Analysis images and 50.70% for the method using Discrete Wavelet Transform. Moreover, our proposed approach exhibits reduced accuracy variance compared to alternative models, underscoring its stability and robustness across diverse datasets. The approach outlined in this work needs to provide information about the specific location or type of tempering, which limits its practical applications. Full article
(This article belongs to the Special Issue Secure Communication Protocols for Future Computing)
Show Figures

Figure 1

23 pages, 494 KiB  
Article
On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information
by Georgios Kallitsis, Vasileios Karyotis and Symeon Papavassiliou
Future Internet 2022, 14(8), 242; https://doi.org/10.3390/fi14080242 - 17 Aug 2022
Viewed by 1300
Abstract
In this paper, we study the potential of using the metric of Age of Information (AoI) for enhancing delay-tolerant routing protocols. The latter have been proposed for alleviating the impact of long roundtrip time in networks operating in harsh environments, e.g., in distributed [...] Read more.
In this paper, we study the potential of using the metric of Age of Information (AoI) for enhancing delay-tolerant routing protocols. The latter have been proposed for alleviating the impact of long roundtrip time in networks operating in harsh environments, e.g., in distributed applications deployed in a desert/sparsely populated area without infrastructure, a space network, etc. Delay-tolerant routing protocols can prevent excessive packet timer expiration, but do not provide any packet delivery time guarantee. Thus, they are unsuitable for time-sensitive applications that are more intensely desired nowadays in the next generation networking applications. By incorporating AoI into the operation of delay-tolerant routing protocols, we aim at devising routing protocols that can cope with both long propagation times and challenges related to time-sensitivity in packet delivery. More specifically, in this work, we modify the operation of a well-known delay-tolerant routing protocol, namely FRESH, to make AoI-based packet forwarding decisions, aiming at achieving specific delay guarantees regarding the end-to-end delivery time. We investigate the advantages and disadvantages of such an approach compared to the traditional FRESH protocol. This work serves as a cornerstone for successfully demonstrating the potential of exploiting AoI in delay-tolerant routing and its applications. Full article
(This article belongs to the Special Issue Secure Communication Protocols for Future Computing)
Show Figures

Figure 1

Back to TopTop