Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems82
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things60
EICache: A learning-based intelligent caching strategy in mobile edge computing46
Energy-efficient client selection in federated learning with heterogeneous data on edge40
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks40
Reducing the number of transaction messages in bitcoin39
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing39
Energy efficient clustering with compressive sensing for underwater wireless sensor networks35
Optimal RSU deployment using complex network analysis for traffic prediction in VANET33
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks33
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing32
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network32
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value32
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things31
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare30
Forwarding information base construction and hybrid data transmission for information-centric IoT30
Efficient multi-job federated learning scheduling with fault tolerance30
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation29
Network security based combined CNN-RNN models for IoT intrusion detection system29
Sybil attack detection in ultra-dense VANETs using verifiable delay functions29
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks28
Lightweight secure authentication and key agreement technique for smart grid27
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications26
Threshold-sensitive energy efficient routing for precision agriculture26
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities23
Efficient dynamic-committee BFT consensus based on HotStuff22
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains22
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles22
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies21
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals21
Tangent Pelican search optimization for block assignment in blockchain based IoT21
LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation20
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT19
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme19
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS19
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method19
A dynamic evaluation model of data price based on game theory19
Enforcing Fairness in Blockchain Transaction Ordering19
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs19
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection18
Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach18
SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing18
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance18
Lightweight verifiable data management system for cloud-assisted wireless body area networks18
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks18
A hybrid approach towards reduced checkpointing overhead in cloud-based applications18
Adaptive SSO based node selection for partial charging in wireless sensor network17
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks17
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection16
Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework16
A secure IoT-based micro-payment protocol for wearable devices16
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm16
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization16
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace16
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things16
ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN15
An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment15
Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator15
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology14
BCAV: Blockchain-based certificateless authentication system for vehicular network14
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts14
A delay aware routing approach for FANET based on emperor penguins colony algorithm13
Paths in the cloud: Geolocation mapping of Amazon’s cross-border connectivity13
Privacy-preserving revocable access control for LLM-driven electrical distributed systems13
Retraction Note: Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network13
SJO-MRL: Energy efficient path selection algorithm for WSNs13
Tamper-proof multitenant data storage using blockchain13
Trust and scalable blockchain-based message exchanging scheme on VANET13
EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens13
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks13
$$\chi$$perbp: a cloud-based lightweight mutual authentication protocol13
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks12
CSSA-based collaborative optimization recommendation of users in mobile crowdsensing12
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system12
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system12
Developing a novel methodology for virtual machine introspection to classify unknown malware functions12
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks12
An optimal deployment scheme for extremely fast charging stations12
Social-aware D2MD user grouping based on game theory and deep Q-learning12
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks12
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment12
Service function path selection methods for multi-layer satellite networks12
Building a blockchain-based decentralized ecosystem for cloud and edge computing: an ALLSTAR approach and empirical study12
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem12
A GNN-based proactive caching strategy in NDN networks12
A blockchain assisted multi-gateway authentication scheme for IIoT based on group12
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks12
A truthful mechanism for multi-access multi-server multi-task resource allocation in mobile edge computing12
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator11
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds11
An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials11
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network11
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis11
Security analysis and trends in signcryption for WBAN: A research study11
Integrating ABHA for authentication and key exchange: A hybrid security framework for smart healthcare in India11
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment11
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks10
RFDCS: A reactive fault detection and classification scheme for clustered wsns10
Retraction Note: Secure access control for manufacturing sector with application of ethereum blockchain10
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks10
An intelligent blockchain strategy for decentralised healthcare framework10
Adaptive sensor clustering for environmental monitoring in dynamic forest ecosystems10
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking10
Fuzzy routing for in-network aggregation in wireless sensor networks10
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint10
TontineCoin: Survivor-based Proof-of-Stake10
HAP-SG: Heterogeneous authentication protocol for smart grid10
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks10
Secure medical data sharing scheme based on traceable ring signature and blockchain10
Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming10
Power level aware charging schedule in wireless rechargeable sensor network10
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs10
URASP: An ultralightweight RFID authentication scheme using permutation operation10
A bio-inspired adaptive junction-based routing protocol for VANETs10
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET9
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices9
Supporting efficient video file streaming in P2P cloud storage9
A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application9
An intelligent sleep-awake energy management system for wireless sensor network9
Energy-effective artificial internet-of-things application deployment in edge-cloud systems9
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment9
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment9
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks9
A privacy preserving batch audit scheme for IoT based cloud data storage9
Effective peer-to-peer routing in heterogeneous half-duplex and full-duplex multi-hop cognitive radio networks9
A data encryption and file sharing framework among microservices-based edge nodes with blockchain9
A feature selection-driven machine learning framework for anomaly-based intrusion detection systems9
Hague: a hybrid scaling stateless blockchain9
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks9
Multimodal data privacy protection and completeness verification method for mobile crowd sensing9
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm9
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit9
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing9
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment9
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot8
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs8
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance8
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model8
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks8
An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network8
DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning8
EPDL: An efficient and privacy-preserving deep learning for crowdsensing8
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN8
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain8
A privacy-preserving method for cross-chain interoperability using homomorphic encryption8
Cluster based hybrid optimization and kronecker gradient factored approximate optimum path curvature network for energy efficiency routing in WSN8
BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning8
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol8
Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting8
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN8
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform8
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration7
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive7
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles7
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature7
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective7
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET7
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment7
DRIVE: Dual rider-remora optimization for vehicular routing7
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things7
An optimal load balancing strategy for P2P network using chicken swarm optimization7
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme7
Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network7
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption7
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid7
SecShield: An IoT access control framework with edge caching using software defined network7
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system7
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network7
An intelligent traffic prediction framework for 5G network using SDN and fusion learning7
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN7
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions7
Efficient loop detection and congestion-free network update for SDN7
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks7
Parallel Byzantine fault tolerance consensus based on trusted execution environments7
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT7
Small target disease detection based on YOLOv5 framework for intelligent bridges6
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles6
An AI-based approach for dynamic routing in IoT networks6
An ACO-based cross-layer routing algorithm in space-air-ground integrated networks6
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks6
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction6
An efficient blockchain-based anonymous authentication and supervision system6
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems6
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF6
Quality of service aware routing in software defined video streaming: a survey6
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization6
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet6
Big data analytics for critical information classification in online social networks using classifier chains6
MP-BADNet$$^+$$: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs6
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation6
Proxy re-signature scheme with cryptographic reverse firewall for medical data security6
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks6
Security resource allocation in blockchain-based IoT6
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET6
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks6
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM6
GE-IDS: an intrusion detection system based on grayscale and entropy6
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks6
A verifiable and privacy-preserving blockchain-based federated learning approach6
Real-time reliable clustering and secure transmission scheme for QoS development in MANET6
A technique for improving healthcare privacy by applying principal component analysis5
WikiChain: An improved resilient, pseudo-transparent knowledge base5
Energy-efficient OFDMA resource allocation in HetNets using discrete particle swarm optimization5
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud5
Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation5
Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation5
Cooperative content offloading scheme in air-ocean integrated networks5
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework5
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization5
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling5
Deep learning for intrusion detection in IoT networks5
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks5
An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model5
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud5
Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing5
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network5
Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network5
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks5
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning5
A blockchain-based quantum-secure reporting protocol5
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning5
A peer-to-peer energy trading model for community microgrids with energy management5
A greedy energy efficient clustering scheme based reinforcement learning for WSNs5
Optimize the placement of edge server between workload balancing and system delay in smart city5
Bit flipping attack detection in low power wide area networks using a deep learning approach5
Blockchain-based technology for commerce data management using reputation algorithm with QoS mechanism5
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach5
Homomorphic multi-party computation for Internet of Medical Things5
0.16123700141907