Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Digital rights management scheme based on redactable blockchain and perceptual hash434
Consensus in sensor networks in presence of hybrid faults126
Resource allocation and optimization in D2D communication with PDRAPC framework99
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance74
Efficient multi-job federated learning scheduling with fault tolerance70
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems57
Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications55
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy55
Small target disease detection based on YOLOv5 framework for intelligent bridges49
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking44
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs42
Feature fusion federated learning for privacy-aware indoor localization40
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system39
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme35
Traffic sign detection and recognition using RGSM and a novel feature extraction method33
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT33
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security33
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare32
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches32
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks31
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN29
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN29
Lightweight secure authentication and key agreement technique for smart grid29
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks28
Data-driven peer-to-peer blockchain framework for water consumption management28
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks27
Social relation based DAG blockchain inspired healthcare of livestock27
Truthful double auction based incentive mechanism for participatory sensing systems26
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows26
Trust-based clustering and routing in WSNs using DST-WOA26
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network26
A verifiable and privacy-preserving blockchain-based federated learning approach25
Low interruption ratio link fault recovery scheme for data plane in software-defined networks24
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing24
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles24
Preserving location privacy against inference attacks in indoor positioning system22
A multi-factor user authentication protocol for the internet of drones environment22
Energy aware MAC protocol with mobility management in wireless body area network22
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks22
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties22
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security22
DRIVE: Dual rider-remora optimization for vehicular routing21
Quality of service aware routing in software defined video streaming: a survey21
A novel transfer extreme learning machine from multiple sources for intrusion detection19
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks19
Practical Byzantine fault tolerance consensus based on comprehensive reputation19
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications19
Developing a novel blockchain-based vaccine tracking and certificate system: An end-to-end approach18
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission18
Real-time reliable clustering and secure transmission scheme for QoS development in MANET18
A new method of network traffic prediction based on combination model18
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system17
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET17
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization16
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment16
A blockchain-based coin mixing protocol with certificateless signcryption16
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN16
Transaction graph based key node identification for blockchain regulation16
BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records16
Sybil attack detection in ultra-dense VANETs using verifiable delay functions15
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things15
Temporary relay: A more flexible way to cross chains15
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network15
Trust based task offloading scheme in UAV-enhanced edge computing network15
Author Correction to: A composite blockchain associated event traceability method for financial activities15
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks15
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system15
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities15
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF14
Proxy re-signature scheme with cryptographic reverse firewall for medical data security14
Non-transferable blockchain-based identity authentication14
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks14
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks14
Resource management of GEO relays for real-time remote sensing14
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading13
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions13
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption13
The reliable routing for software-defined vehicular networks towards beyond 5G13
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach13
Improved blockchain-based user authentication protocol with ring signature for internet of medical things13
Revisiting FAW attack in an imperfect PoW blockchain system13
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks13
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets13
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage12
Semi-shadow file system: An anonymous files storage solution12
A privacy protection scheme for green communication combining digital steganography12
Privacy-preserving comparison based data aggregation protocols for mobile sensing12
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN12
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks11
Reducing the number of transaction messages in bitcoin11
Energy-efficient client selection in federated learning with heterogeneous data on edge11
Blockchain-based system for tracking and rewarding recyclable plastic waste11
HeadSee: Device-free head gesture recognition with commodity RFID11
Integrating the edge intelligence technology into image composition: A case study11
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs11
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network11
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing11
A resource allocation scheme for D2D communications with unknown channel state information11
Efficient loop detection and congestion-free network update for SDN11
Energy efficient clustering with compressive sensing for underwater wireless sensor networks11
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks10
Optimal RSU deployment using complex network analysis for traffic prediction in VANET10
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system10
Desynchronization resistant privacy preserving user authentication protocol for location based services10
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation10
Privacy-preserving and fault-tolerant aggregation of time-series data without TA10
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm10
Supporting conflict-free replicated data types in opportunistic networks10
Dynamic shielding to secure multi-hop communications in vehicular platoons10
Fog-based low latency and lightweight authentication protocol for vehicular communication10
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords10
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective10
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks10
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value9
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques9
EICache: A learning-based intelligent caching strategy in mobile edge computing9
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid9
Parked vehicles crowdsourcing for task offloading in vehicular edge computing9
DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN9
A high performance two-layer consensus architecture for blockchain-based IoT systems9
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain9
A scalable identity management scheme via blockchain: Identity protection and traceability9
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones9
Energy-efficient sensory data gathering in IoT networks with mobile edge computing9
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system9
Verifiable dynamic ranked search with forward privacy over encrypted cloud data9
A secure and lightweight data sharing scheme in vehicular digital twin network9
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing9
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things9
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature9
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications9
Blockchain-based trust management for verifiable time synchronization service in IoT9
SFIM: Identify user behavior based on stable features9
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET9
Scale-free networks: evolutionary acceleration of the network survivability and its quantification9
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems9
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM8
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism8
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks8
A ring signature scheme with linkability and traceability for blockchain-based medical data sharing system8
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model8
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities8
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network8
Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices8
Parallel Byzantine fault tolerance consensus based on trusted execution environments8
SecShield: An IoT access control framework with edge caching using software defined network8
Security resource allocation in blockchain-based IoT8
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing8
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive7
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies7
Enabling efficient and verifiable secure search on cloud-based encrypted big data7
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model7
Online budget-limited pricing incentives for remote mobile sensing7
An alliance chain-based incentive mechanism for PSG data sharing7
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS7
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization7
Deep learning-based power usage effectiveness optimization for IoT-enabled data center7
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system7
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks7
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks7
A secure user authentication scheme for crypto-wallet in IoT environment7
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT7
A blockchain-based auditable deduplication scheme for multi-cloud storage7
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme7
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain7
Tangent Pelican search optimization for block assignment in blockchain based IoT7
Adaptive SSO based node selection for partial charging in wireless sensor network7
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks7
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM7
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals7
Bsfra: Blockchain based smart forward-reverse agrichain7
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network6
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust6
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud6
BBAD: Blockchain-based data assured deletion and access control system for IoT6
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network6
Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET6
Mitigating bias in heterogeneous federated learning via stratified client selection6
A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool6
ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks6
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains6
Improved bio-inspired security scheme for privacy-preserving in the internet of things6
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks6
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning6
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning6
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN6
Deep learning for intrusion detection in IoT networks6
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace6
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet6
Systematic study of topology control methods and routing techniques in wireless sensor networks6
A blockchain-based quantum-secure reporting protocol6
Efficient data harvesting from boundary nodes for smart irrigation6
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm6
An efficient blockchain-based anonymous authentication and supervision system6
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs6
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method5
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain5
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities5
MP-BADNet$$^+$$: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs5
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT5
Application-aware QoS routing in SDNs using machine learning techniques5
Homomorphic multi-party computation for Internet of Medical Things5
Mainstay: A hybrid protocol ensuring ledger temporality and security5
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing5
Optimization of edge server group collaboration architecture strategy in IoT smart cities application5
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare5
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation5
Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach5
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET5
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things5
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks5
A peer-to-peer energy trading model for community microgrids with energy management5
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion5
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks5
A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks5
A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection5
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection5
Lightweight two-factor authentication framework with privacy preserving for smart eHealth5
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks5
A robust and lightweight secure access scheme for cloud based E-healthcare services5
A dynamic evaluation model of data price based on game theory5
IoT intrusion detection model based on gated recurrent unit and residual network5
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks5
BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing5
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things5
A bayesian-based distributed trust management scheme for connected vehicles’ security5
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action5
A blockchain-based cyber-security for connected networks5
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property5
1.1736590862274