[go: up one dir, main page]

Next Issue
Volume 5, December
Previous Issue
Volume 5, June
 
 

Future Internet, Volume 5, Issue 3 (September 2013) – 8 articles , Pages 301-459

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
338 KiB  
Article
Physical Layer Network Coding Based on Integer Forcing Precoded Compute and Forward
by Smrati Gupta and M. A. Vázquez-Castro
Future Internet 2013, 5(3), 439-459; https://doi.org/10.3390/fi5030439 - 28 Aug 2013
Cited by 3 | Viewed by 6129
Abstract
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay. [...] Read more.
In this paper, we address the implementation of physical layer network coding (PNC) based on compute and forward (CF) in relay networks. It is known that the maximum achievable rates in CF-based transmission is limited due to the channel approximations at the relay. In this work, we propose the integer forcing precoder (IFP), which bypasses this maximum rate achievability limitation. Our precoder requires channel state information (CSI) at the transmitter, but only that of the channel between the transmitter and the relay, which is a feasible assumption. The overall contributions of this paper are three-fold. Firstly, we propose an implementation of CF using IFP and prove that this implementation achieves higher rates as compared to traditional relaying schemes. Further, the probability of error from the proposed scheme is shown to have up to 2 dB of gain over the existent lattice network coding-based implementation of CF. Secondly, we analyze the two phases of transmission in the CF scheme, thereby characterizing the end-to-end behavior of the CF and not only one-phase behavior, as in previous proposals. Finally, we develop decoders for both the relay and the destination. We use a generalization of Bezout’s theorem to justify the construction of these decoders. Further, we make an analytical derivation of the end-to-end probability of error for cubic lattices using the proposed scheme. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Comparison of the probability of error at the relay for the proposed scheme with varying signal to noise ratio (SNR) for <math display="inline"> <mrow> <mi>L</mi> <mo>=</mo> <mn>2</mn> </mrow> </math>. The total signal power is adjusted for fair comparison with other schemes.</p>
Full article ">Figure 3
<p>Compute and forward (CF) with the integer forcing precoder (IFP) compared to Time Division Multiplexing (TDM) performance at the destination.</p>
Full article ">Figure 4
<p>Outage probability curve. The horizontal axis shows the power available at the transmitter. The power available at the transmitter is assumed to be always greater than or equal to the signal power, hence <math display="inline"> <mrow> <msub> <mi>γ</mi> <mi>a</mi> </msub> <mo>&gt;</mo> <mn>1</mn> </mrow> </math>. With the increasing channel variance, <math display="inline"> <msub> <mi>σ</mi> <mi>h</mi> </msub> </math>, the outage decreases.</p>
Full article ">Figure 5
<p>Comparison of achievable rates for various schemes for <math display="inline"> <mrow> <mi>L</mi> <mo>=</mo> <mn>2</mn> </mrow> </math>. The average value is taken over 10,000 different random channel realizations. The rates are measured in bits per channel use (bpcu).</p>
Full article ">
267 KiB  
Article
Libraries’ Role in Curating and Exposing Big Data
by Michael Teets and Matthew Goldner
Future Internet 2013, 5(3), 429-438; https://doi.org/10.3390/fi5030429 - 20 Aug 2013
Cited by 30 | Viewed by 10367
Abstract
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations [...] Read more.
This article examines how one data hub is working to become a relevant and useful source in the Web of big data and cloud computing. The focus is on OCLC’s WorldCat database of global library holdings and includes work by other library organizations to expose their data using big data concepts and standards. Explanation is given of how OCLC has begun work on the knowledge graph for this data and its active involvement with Schema.org in working to make this data useful throughout the Web. Full article
(This article belongs to the Special Issue Server Technologies in Cloud Computing and Big Data)
Show Figures

Figure 1

Figure 1
<p>Author representation in Virtual International Authority File (VIAF).</p>
Full article ">Figure 2
<p>Human-readable display of a “record”.</p>
Full article ">Figure 3
<p>Schema description.</p>
Full article ">
5641 KiB  
Article
Cross-Network Information Dissemination in Vehicular Ad hoc Networks (VANETs): Experimental Results from a Smartphone-Based Testbed
by Stefano Busanelli, Filippo Rebecchi, Marco Picone, Nicola Iotti and Gianluigi Ferrari
Future Internet 2013, 5(3), 398-428; https://doi.org/10.3390/fi5030398 - 5 Aug 2013
Cited by 17 | Viewed by 7666
Abstract
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, [...] Read more.
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as "Cross-Network Effective Traffic Alert Dissemination" (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, with direct connections between neighboring vehicles, in order to disseminate, very quickly and inexpensively, traffic alerts received from the cellular network. The proposed communication architecture has been implemented on Android smartphones. The obtained experimental results show that an effective cross-network information dissemination service can entirely rely on smartphone-based communications. This paves the way to future Internet architectures, where vehicles will play a key role as information destinations and sources. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

Figure 1
<p>Illustrative Cross-Network Effective Traffic Alert Dissemination (X-NETAD) traffic alerts dissemination scheme.</p>
Full article ">Figure 2
<p>A typical linear network topology of a vehicular <span class="html-italic">ad hoc</span> network (VANET).</p>
Full article ">Figure 3
<p>Rebroadcast probability, as a function of the distance, with <math display="inline"> <mrow> <mi>z</mi> <mo>=</mo> <mn>200</mn> </mrow> </math> m, <math display="inline"> <mrow> <mi>c</mi> <mo>∈</mo> <mo>{</mo> <mn>1</mn> <mo>,</mo> <mn>3</mn> <mo>}</mo> </mrow> </math> and <math display="inline"> <mrow> <msub> <mi>ρ</mi> <mi mathvariant="normal">s</mi> </msub> <mi>z</mi> <mo>∈</mo> <mrow> <mo>{</mo> <mn>0</mn> <mo>.</mo> <mn>01</mn> <mo>,</mo> <mn>0</mn> <mo>.</mo> <mn>05</mn> <mo>}</mo> </mrow> </mrow> </math> veh/m.</p>
Full article ">Figure 4
<p>A possible example of XML-formatted document created by the Application Server (AS).</p>
Full article ">Figure 5
<p>Temporal diagram of a generic X-NETAD message flow.</p>
Full article ">Figure 6
<p>System architecture of an X-NETAD node.</p>
Full article ">Figure 7
<p>Experimental Packet Error Rate (PER) as a function of the data rate, by considering <math display="inline"> <mrow> <msub> <mi>P</mi> <mi mathvariant="normal">t</mi> </msub> <mo>=</mo> <mn>32</mn> <mo> </mo> <mi>m</mi> <mi>W</mi> </mrow> </math> and <math display="inline"> <mrow> <mi>d</mi> <mo>=</mo> <mn>15</mn> </mrow> </math> <span class="html-italic">m</span>.</p>
Full article ">Figure 8
<p>Experimental PER as a function of the inter-node distance, by considering <math display="inline"> <mrow> <mi>P</mi> <mi>tx</mi> <mo>=</mo> <mn>32</mn> </mrow> </math> mW and <math display="inline"> <mrow> <mi>R</mi> <mo>=</mo> <mn>11</mn> </mrow> </math> Mb/s.</p>
Full article ">Figure 9
<p>Static X-NETAD application testbed: (<b>a</b>) Scenario 1, all Secondary Users (SUs) are located in the transmission range of the PU; (<b>b</b>) Scenario 2, each SU is at the edge of the transmission range of previous nodes.</p>
Full article ">Figure 10
<p>Probability Mass Function (PMF) of rebroadcast <span class="html-italic">DATA</span> messages in Scenario 1.</p>
Full article ">Figure 11
<p>Hop index PMF for received <span class="html-italic">DATA</span> messages in Scenario 1.</p>
Full article ">Figure 12
<p>PMF of missing <span class="html-italic">DATA</span> chunks, before the first <span class="html-italic">REQUEST</span> round in Scenario 1.</p>
Full article ">Figure 13
<p>Average number of <span class="html-italic">DATA</span> chunks requested and average number of <span class="html-italic">DATA</span> messages sent following a <span class="html-italic">REQUEST</span>, in Scenario 1.</p>
Full article ">Figure 14
<p>PMF of the archive reception time in Scenario 1.</p>
Full article ">Figure 15
<p>Cumulative Distribution Function (CDF) of received <span class="html-italic">DATA</span> messages before <span class="html-italic">REQUEST</span> messages in Scenario 1.</p>
Full article ">Figure 16
<p>PMF of the number of rebroadcast <span class="html-italic">DATA</span> messages in Scenario 2.</p>
Full article ">Figure 17
<p>PMF of the hop index for received <span class="html-italic">DATA</span> messages in Scenario 2.</p>
Full article ">Figure 18
<p>PMF of missing <span class="html-italic">DATA</span> chunks, before first <span class="html-italic">REQUEST</span> round in Scenario 2.</p>
Full article ">Figure 19
<p>PMF of the archive reception time in Scenario 2.</p>
Full article ">Figure 20
<p>CDF of received <span class="html-italic">DATA</span> messages before <span class="html-italic">REQUEST</span> messages in Scenario 2.</p>
Full article ">Figure 21
<p>Circuit followed by the vehicles during the tests. Image taken from Open Street Map.</p>
Full article ">Figure 22
<p>PMF of the hop index at which <span class="html-italic">DATA</span> messages are received in Scenario 3.</p>
Full article ">Figure 23
<p>PMF of the number of missing <span class="html-italic">DATA</span> fragments before the transmission of the first <span class="html-italic">REQUEST</span> message in Scenario 3.</p>
Full article ">Figure 24
<p>Number of requested <span class="html-italic">DATA</span> messages and number of replica <span class="html-italic">DATA</span> messages sent upon the reception of a request, in Scenario 3.</p>
Full article ">Figure 25
<p>PMF of the archive reception time in Scenario 3.</p>
Full article ">Figure 26
<p>CDF of the received <span class="html-italic">DATA</span> messages before a <span class="html-italic">REQUEST</span> in Scenario 3.</p>
Full article ">
234 KiB  
Review
Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities
by Darren Chadwick, Caroline Wesson and Chris Fullwood
Future Internet 2013, 5(3), 376-397; https://doi.org/10.3390/fi5030376 - 17 Jul 2013
Cited by 218 | Viewed by 23207
Abstract
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion [...] Read more.
This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion of carer views of Internet use by people with intellectual disabilities will be covered incorporating consideration of the tension between protection, self-determination and lifestyle issues and gaining Internet access. We will address how impairment related factors may impede access and subsequently discuss how supports may be used to obfuscate impairments and facilitate access. We will move on from this to critically describe some of the potential benefits the Internet could provide to people with intellectual disabilities, including the potential for self-expression, advocacy and developing friendships. Finally, strategies to better include people with intellectual disabilities online will be given along with future research suggestions. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)
1006 KiB  
Article
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
by Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko
Future Internet 2013, 5(3), 355-375; https://doi.org/10.3390/fi5030355 - 9 Jul 2013
Cited by 10 | Viewed by 11857
Abstract
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, [...] Read more.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data repository, and the extraction of relevant data for analytical modules of SIEM systems. The paper discusses the key issues of design and implementation of a hybrid SIEM data repository, which combines relational and ontological data representations. Based on the analysis of existing SIEM systems and standards, the ontological approach is chosen as a core component of the repository, and an example of the ontological data model for vulnerabilities representation is outlined. The hybrid architecture of the repository is proposed for implementation in SIEM systems. Since the most of works on the repositories of SIEM systems is based on the relational data model, the paper focuses mainly on the ontological part of the hybrid approach. To test the repository we used the data model intended for attack modeling and security evaluation, which includes both ontological and relational dimensions. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Main data flows with repository in Security Information and Events Management (SIEM) system.</p>
Full article ">Figure 2
<p>Example of vulnerability description represented by Common Vulnerabilities and Exposures (CVE).</p>
Full article ">Figure 3
<p>Example of vulnerability representation as a row in a table.</p>
Full article ">Figure 4
<p>Ontological model for vulnerability representation.</p>
Full article ">Figure 5
<p>An example of ontological representation of vulnerabilities.</p>
Full article ">Figure 6
<p>Relational part of Attack Modeling and Security Evaluation Component (AMSEC) repository data scheme.</p>
Full article ">Figure 7
<p>Repository architecture.</p>
Full article ">Figure 8
<p>Structure of main modules of the repository.</p>
Full article ">Figure 9
<p>Sequence diagram of the repository and client interaction.</p>
Full article ">Figure 10
<p>Interaction of the repository with the AMSEC.</p>
Full article ">Figure 11
<p>Dependency between the time (sec) required for different steps of AMSEC functioning and the amount of hosts in the network (when the relational repository is used).</p>
Full article ">Figure 12
<p>Dependency between the time (sec) required for vulnerability list formation and the amount of hosts in the network (when the ontological repository is used).</p>
Full article ">
183 KiB  
Review
Future Research on Cyber-Physical Emergency Management Systems
by Erol Gelenbe and Fang-Jing Wu
Future Internet 2013, 5(3), 336-354; https://doi.org/10.3390/fi5030336 - 27 Jun 2013
Cited by 76 | Viewed by 11768
Abstract
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among [...] Read more.
Cyber-physical systems that include human beings and vehicles in a built environment, such as a building or a city, together with sensor networks and decision support systems have attracted much attention. In emergencies, which also include mobile searchers and rescuers, the interactions among civilians and the environment become much more diverse, and the complexity of the emergency response also becomes much greater. This paper surveys current research on sensor-assisted evacuation and rescue systems and discusses the related research issues concerning communication protocols for sensor networks, as well as several other important issues, such as the integrated asynchronous control of large-scale emergency response systems, knowledge discovery for rescue and prototyping platforms. Then, we suggest directions for further research. Full article
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)
Show Figures

Figure 1

Figure 1
<p>A cost-benefit analysis of emergency response systems.</p>
Full article ">
2931 KiB  
Article
eHealth Service Support in Future IPv6 Vehicular Networks
by Sofiane Imadali, Athanasia Karanasiou, Alexandru Petrescu, Ioannis Sifniadis, Eleftheria Velidou, Véronique Vèque and Pantelis Angelidis
Future Internet 2013, 5(3), 317-335; https://doi.org/10.3390/fi5030317 - 27 Jun 2013
Cited by 3 | Viewed by 7119
Abstract
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to [...] Read more.
Recent vehicular networking activities include novel automotive applications, such as public vehicle to vehicle/infrastructure (V2X), large scale deployments, machine-to-machine (M2M) integration scenarios, and more. The platform described in this paper focuses on the integration of eHealth in a V2I setting. This is to allow the use of Internet from a vehicular setting to disseminate health-related information. From an eHealth viewpoint, the use of remote healthcare solutions to record and transmit a patient’s vital signs is a special telemedicine application that helps hospital resident health professionals to optimally prepare the patient’s admittance. From the automotive perspective, this is a typical vehicle-to-infrastructure (V2I) communication scenario. This proposal provides an IPv6 vehicular platform, which integrates eHealth devices and allows sending captured health-related data to a personal health record (PHR) application server in the IPv6 Internet. The collected data is viewed remotely by a doctor and supports his diagnostic decision. In particular, our work introduces the integration of vehicular and eHealth testbeds, describes related work and presents a lightweight auto-configuration method based on a DHCPv6 extension to provide IPv6 connectivity with a few numbers of messages. Full article
(This article belongs to the Special Issue Vehicular Communications and Networking)
Show Figures

Figure 1

Figure 1
<p>Vehicular-related wireless technologies comparison (adapted from [<a href="#B20-futureinternet-05-00317" class="html-bibr">20</a>]).</p>
Full article ">Figure 2
<p>Overall view of the functional elements involved in the process of network parameters configuration. The DHCPv6 server and relay are in the operator domain, while the machine-to-machine (M2M) gateway (mobile router) along with the attached devices are in the user domain.</p>
Full article ">Figure 3
<p>Platform overview. First step of the testbed integration.</p>
Full article ">Figure 4
<p>eHealth mobile operational scenario. Vital signs recorded by the patient are sent to the expert for diagnosis.</p>
Full article ">Figure 5
<p>End to end message exchange diagram. Once the eHealth device is paired to the cluster head (and recognized by the application), the cluster head can be attached to the mobile router and obtain his configuration. The validity of this configuration is assured by the mobile router lightweight configuration protocol presented in <a href="#sec5-futureinternet-05-00317" class="html-sec">Section 5</a>. The cluster head registers at the electronic health record (EHR) and transmit eHealth-related data over TCP/SSL.</p>
Full article ">Figure 6
<p>Auto-configuration protocol messages. A comparison of the number of messages between current auto-configuration methods and the proposed one. DR stands for Default Route, P for prefix and ORO for option request option.</p>
Full article ">Figure 7
<p>DHCPv6 default router list option fields. This option is used by the server to answer option request option (ORO) option sent by the client.</p>
Full article ">Figure 8
<p>Kerlink Wirma Road gateway.</p>
Full article ">Figure 9
<p>Vidavo eHealth devices.</p>
Full article ">Figure 10
<p>eHealth testbed snapshot. On the left, the Android cluster head of our setting running the Vida24 eHealth application that collects measurements from the oximeter device (on the right). Multiple devices can be paired and monitored, for example, the Spirometer device on the top of the figure.</p>
Full article ">Figure 11
<p>Android Cluster Head connected to the MR. The Request for Comments (RFC) 4941 privacy extension IPv6 addresses are used to issue connections towards the personal health record (PHR). This is a privacy-related precaution completed by the use of a secure SSL connection on the application layer.</p>
Full article ">Figure 12
<p>Throughput comparison (testbed conditions) on the mobile router using public IPv4 and experimental IPv6 high-speed downlink packet access (HSDPA) (3G+) APN. Both deployments provided by Orange France.</p>
Full article ">
246 KiB  
Article
Virtual Relationship Violence and Perspectives on Punishment: Do Gender or Nationality Matter?
by Alison Marganski
Future Internet 2013, 5(3), 301-316; https://doi.org/10.3390/fi5030301 - 26 Jun 2013
Cited by 14 | Viewed by 7914
Abstract
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the [...] Read more.
Given the increasingly popular use of socially interactive technology (SIT), it is believed that the way in which individuals communicate and experience relationships has drastically been changing. For those who partake in this electronic world, damaging behaviors akin to those found in the real world have emerged. Yet, we know little about the extent of these behaviors in the context of romantic relationships, especially from a gender or cultural standpoint. Research on dating violence generally indicates that women experience in-person victimization at higher rates than men, although some research has called this into question. It also suggests that some national groups experience higher rates of violence than others. However, research is almost non-existent when it comes to exploring violence in the digital world. This study investigated gender and nationality in (1) the nature and extent of socially interactive intimate violence, and (2) perceptions of the seriousness of virtual relationship violence. Using a sample of students from the United States and Poland, findings revealed that socially interactive technology may serve as a new avenue for aggressing against partners, as virtual relationship violence was not uncommon and reflected some patterns present in the real world. Some unexpected patterns also emerged. The results of this research signal a possible transferability of covert intimate violence and highlight ways in which inequalities may exist in our virtual worlds. Full article
(This article belongs to the Special Issue Inequality in the Digital Environment)
Previous Issue
Next Issue
Back to TopTop