Peer-to-Peer Networking and Applications

Papers
(The median citation count of Peer-to-Peer Networking and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Blockchain smart contracts: Applications, challenges, and future trends351
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks126
Secure and efficient mutual authentication protocol for smart grid under blockchain99
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain89
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques65
Task scheduling in cloud-fog computing systems57
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities55
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs53
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks53
A digital rights management system based on a scalable blockchain52
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services49
A robust and lightweight secure access scheme for cloud based E-healthcare services48
Reliable scheduling and load balancing for requests in cloud-fog computing43
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks41
A reliable tree-based data aggregation method in wireless sensor networks40
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks38
ASFGNN: Automated separated-federated graph neural network38
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications37
User authentication using Blockchain based smart contract in role-based access control35
A survey for the application of blockchain technology in the media35
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain31
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs30
Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks29
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things29
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm28
Cloud-connected flying edge computing for smart agriculture28
Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks28
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment27
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems27
An improved steganography without embedding based on attention GAN26
Blockchain-based digitization of land record through trust value-based consensus algorithm25
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones24
Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain24
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks24
HonestChain: Consortium blockchain for protected data sharing in health information systems23
A secure vehicle theft detection framework using Blockchain and smart contract23
Cancelable Iris template for secure authentication based on random projection and double random phase encoding23
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network23
Obfuscation of images via differential privacy: From facial images to general images22
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities22
Low energy consumption routing algorithm based on message importance in opportunistic social networks22
Behavior prediction based on interest characteristic and user communication in opportunistic social networks22
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles22
Blockchain-based solution for Secure and Transparent Food Supply Chain Network22
Cryptocurrencies activity as a complex network: Analysis of transactions graphs22
Trust based task offloading scheme in UAV-enhanced edge computing network22
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges21
A provably secure RFID authentication protocol based on ECQV for the medical internet of things21
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic21
A donation tracing blockchain model using improved DPoS consensus algorithm21
A decentralized vehicle anti-theft system using Blockchain and smart contracts20
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds20
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things20
Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach20
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things20
A lightweight continuous authentication scheme for medical wireless body area networks19
An experimental study on performance of private blockchain in IoT applications19
Secure medical data sharing scheme based on traceable ring signature and blockchain18
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network18
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property18
Influencing factors analysis in pear disease recognition using deep learning18
A double steganography model combining blockchain and interplanetary file system17
An integrative approach for secure data sharing in vehicular edge computing using Blockchain17
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks17
SDN-based offloading policy to reduce the delay in fog-vehicular networks17
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage16
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment16
A certificateless encryption scheme based on blockchain16
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach16
An intelligent traffic prediction framework for 5G network using SDN and fusion learning16
Systematic study of topology control methods and routing techniques in wireless sensor networks16
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system15
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks15
A secure peer to peer multiparty transaction scheme based on blockchain15
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions15
Improved blockchain-based user authentication protocol with ring signature for internet of medical things15
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy15
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems15
AMVchain: authority management mechanism on blockchain-based voting systems14
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications14
SynergyGrids: blockchain-supported distributed microgrid energy trading14
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment14
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection14
Reinforcement-Learning based energy efficient optimized routing protocol for WSN14
Data-driven peer-to-peer blockchain framework for water consumption management13
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing13
Impact of data correlation on privacy budget allocation in continuous publication of location statistics13
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks13
Real-time reliable clustering and secure transmission scheme for QoS development in MANET13
Optimize the placement of edge server between workload balancing and system delay in smart city13
An intelligent sleep-awake energy management system for wireless sensor network13
BCAV: Blockchain-based certificateless authentication system for vehicular network13
Energy-efficient client selection in federated learning with heterogeneous data on edge13
A uniformization-based approach to preserve individuals’ privacy during process mining analyses13
Enabling rank-based distribution of microservices among containers for green cloud computing environment13
Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G13
Desynchronization resistant privacy preserving user authentication protocol for location based services13
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid13
A self-localization range free protocol for wireless sensor networks12
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data12
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN12
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles12
Joint computation offloading and resource allocation in vehicular edge computing based on an economic theory: walrasian equilibrium12
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain12
Blind signcryption scheme based on hyper elliptic curves cryptosystem12
URASP: An ultralightweight RFID authentication scheme using permutation operation12
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things12
AToM: Active topology monitoring for the bitcoin peer-to-peer network11
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts11
Efficient topology control of blockchain peer to peer network based on SDN paradigm11
An Edge-Fog-Cloud computing architecture for IoT and smart metering data11
Trust and scalable blockchain-based message exchanging scheme on VANET11
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment11
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles11
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust11
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks10
Energy aware MAC protocol with mobility management in wireless body area network10
A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system10
From edge data to recommendation: A double attention-based deformable convolutional network10
Trust estimation in peer-to-peer network using BLUE10
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud10
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization10
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks10
Efficient and privacy-preserving range-max query in fog-based agricultural IoT10
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks10
BESDDFFS: Blockchain and EdgeDrone based secured data delivery for forest fire surveillance10
An optimized architecture and algorithm for resource allocation in D2D aided fog computing10
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection10
Verifiable dynamic ranked search with forward privacy over encrypted cloud data10
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds10
Achieving IoT data security based blockchain10
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT10
Joint optimization of task caching and computation offloading in vehicular edge computing10
Energy-effective artificial internet-of-things application deployment in edge-cloud systems9
A location privacy protection scheme for convoy driving in autonomous driving era9
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks9
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks9
An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone9
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks9
Optimal RSU deployment using complex network analysis for traffic prediction in VANET9
Reputation management in vehicular network using blockchain9
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment9
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT9
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN’s9
New incentive mechanism to enhance cooperation in wireless P2P networks9
Computing tasks assignment optimization among edge computing servers via SDN9
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications9
EICache: A learning-based intelligent caching strategy in mobile edge computing9
A critical analysis of RPL objective functions in internet of things paradigm9
An optimal load balancing strategy for P2P network using chicken swarm optimization9
Efficient path-sense transmission based on IoT system in opportunistic social networks9
Secure data sharing using Merkle hash digest based blockchain identity management9
Tamper-proof multitenant data storage using blockchain9
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey9
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks9
Energy efficient clustering with compressive sensing for underwater wireless sensor networks9
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs9
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs8
An efficient route selection mechanism based on network topology in battery-powered internet of things networks8
Application-aware QoS routing in SDNs using machine learning techniques8
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network8
Resource management of GEO relays for real-time remote sensing8
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud8
Improved bio-inspired security scheme for privacy-preserving in the internet of things8
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion8
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network8
An authentication and key agreement scheme for smart grid8
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis8
Three-stage Stackelberg game based edge computing resource management for mobile blockchain8
A resource allocation scheme for D2D communications with unknown channel state information8
Traffic sign detection and recognition using RGSM and a novel feature extraction method8
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks7
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm7
A verifiable and privacy-preserving blockchain-based federated learning approach7
NTSC: a novel trust-based service computing scheme in social internet of things7
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing7
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing7
An intelligent blockchain strategy for decentralised healthcare framework7
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey7
A blockchain-based quantum-secure reporting protocol7
100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing7
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area7
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback–Leibler divergence7
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective7
A novel hierarchical fault management framework for wireless sensor networks: HFMF7
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks7
A secure and efficient authentication protocol for wireless applications in multi-server environment7
$$\chi$$perbp: a cloud-based lightweight mutual authentication protocol7
Improved differentiable neural architecture search for single image super-resolution7
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme7
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection7
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains7
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks7
Fuzzy routing for in-network aggregation in wireless sensor networks7
Energy and delay-ware massive task scheduling in fog-cloud computing system7
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing7
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks7
A greedy energy efficient clustering scheme based reinforcement learning for WSNs7
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks6
Blockchain-based system for tracking and rewarding recyclable plastic waste6
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks6
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing6
EEOMA: End-to-end oriented management architecture for 6G-enabled drone communications6
Multi-target localization algorithm for wireless sensor network6
P2P mobility management for seamless handover using D2D communication in B5G wireless technology6
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization6
A privacy-preserving and efficient byzantine consensus through multi-signature with ring6
A secure IoT-based micro-payment protocol for wearable devices6
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing6
Combining information centric and software defined networking to support command and control agility in military mobile networks6
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model6
A two-level traffic smoothing method for efficient cloud–IoT communications6
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments6
A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks6
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm6
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs6
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols6
Non-transferable blockchain-based identity authentication6
High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism6
An efficient latency aware resource provisioning in cloud assisted mobile edge framework6
Intelligent edge content caching: A deep recurrent reinforcement learning method6
DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment6
Building a blockchain-based decentralized ecosystem for cloud and edge computing: an ALLSTAR approach and empirical study6
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime6
Robustness against fraudulent activities of a blockchain-based online review system5
Blockchain-based access control for dynamic device management in microgrid5
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network5
SFIM: Identify user behavior based on stable features5
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy5
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks5
Developing a novel methodology for virtual machine introspection to classify unknown malware functions5
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks5
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet5
A survey on security in consensus and smart contracts5
An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments5
Energy-efficient sensory data gathering in IoT networks with mobile edge computing5
Low interruption ratio link fault recovery scheme for data plane in software-defined networks5
Scaling proof-of-authority protocol to improve performance and security5
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET5
Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs5
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)5
Enforcing Fairness in Blockchain Transaction Ordering5
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction5
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks5
Practical Byzantine fault tolerance consensus based on comprehensive reputation5
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs5
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model5
A blockchain assisted multi-gateway authentication scheme for IIoT based on group5
Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs5
Optimal cooperative spectrum sensing for 5G cognitive networks using evolutionary algorithms5
0.052664995193481