Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets396
EICache: A learning-based intelligent caching strategy in mobile edge computing126
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing89
Digital rights management scheme based on redactable blockchain and perceptual hash65
Efficient loop detection and congestion-free network update for SDN62
Consensus in sensor networks in presence of hybrid faults53
Resource allocation and optimization in D2D communication with PDRAPC framework53
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance49
Efficient multi-job federated learning scheduling with fault tolerance48
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems44
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy41
Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications40
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading40
Small target disease detection based on YOLOv5 framework for intelligent bridges38
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid37
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking35
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs31
Feature fusion federated learning for privacy-aware indoor localization30
Temporary relay: A more flexible way to cross chains29
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system29
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme28
Resource management of GEO relays for real-time remote sensing28
Proxy re-signature scheme with cryptographic reverse firewall for medical data security28
Dynamic shielding to secure multi-hop communications in vehicular platoons27
Optimal RSU deployment using complex network analysis for traffic prediction in VANET27
Verifiable dynamic ranked search with forward privacy over encrypted cloud data26
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective25
Semi-shadow file system: An anonymous files storage solution24
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches24
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks23
Blockchain-based trust management for verifiable time synchronization service in IoT23
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare23
Lightweight secure authentication and key agreement technique for smart grid22
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions22
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach22
Integrating the edge intelligence technology into image composition: A case study22
The reliable routing for software-defined vehicular networks towards beyond 5G22
Data-driven peer-to-peer blockchain framework for water consumption management21
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks21
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN21
Revisiting FAW attack in an imperfect PoW blockchain system20
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET20
Energy-efficient client selection in federated learning with heterogeneous data on edge20
Energy efficient clustering with compressive sensing for underwater wireless sensor networks20
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks20
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system19
Privacy-preserving and fault-tolerant aggregation of time-series data without TA19
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network18
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows18
Trust-based clustering and routing in WSNs using DST-WOA18
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs18
A verifiable and privacy-preserving blockchain-based federated learning approach17
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles17
HeadSee: Device-free head gesture recognition with commodity RFID17
Low interruption ratio link fault recovery scheme for data plane in software-defined networks16
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing16
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications16
Reducing the number of transaction messages in bitcoin16
DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN16
A high performance two-layer consensus architecture for blockchain-based IoT systems15
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption15
Parked vehicles crowdsourcing for task offloading in vehicular edge computing15
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm15
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks15
A privacy protection scheme for green communication combining digital steganography14
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN14
Truthful double auction based incentive mechanism for participatory sensing systems14
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks14
Social relation based DAG blockchain inspired healthcare of livestock14
Scale-free networks: evolutionary acceleration of the network survivability and its quantification14
Energy aware MAC protocol with mobility management in wireless body area network13
SFIM: Identify user behavior based on stable features13
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation13
DRIVE: Dual rider-remora optimization for vehicular routing13
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks13
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications13
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems13
Preserving location privacy against inference attacks in indoor positioning system13
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties13
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords13
Quality of service aware routing in software defined video streaming: a survey13
SecShield: An IoT access control framework with edge caching using software defined network12
Privacy-preserving comparison based data aggregation protocols for mobile sensing12
Trust based task offloading scheme in UAV-enhanced edge computing network12
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism12
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks12
Energy-efficient sensory data gathering in IoT networks with mobile edge computing12
Security resource allocation in blockchain-based IoT12
A novel transfer extreme learning machine from multiple sources for intrusion detection12
Practical Byzantine fault tolerance consensus based on comprehensive reputation12
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities11
Non-transferable blockchain-based identity authentication11
Real-time reliable clustering and secure transmission scheme for QoS development in MANET11
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM11
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment11
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks11
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks11
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities11
Developing a novel blockchain-based vaccine tracking and certificate system: An end-to-end approach11
Blockchain-based system for tracking and rewarding recyclable plastic waste10
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system10
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain10
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET10
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks10
A new method of network traffic prediction based on combination model10
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing10
Fog-based low latency and lightweight authentication protocol for vehicular communication10
BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records10
Transaction graph based key node identification for blockchain regulation10
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission10
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system10
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN10
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization10
Desynchronization resistant privacy preserving user authentication protocol for location based services10
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF9
Sybil attack detection in ultra-dense VANETs using verifiable delay functions9
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques9
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks9
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks9
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage9
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN9
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment9
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system9
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things9
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature9
A resource allocation scheme for D2D communications with unknown channel state information9
Supporting conflict-free replicated data types in opportunistic networks9
Improved blockchain-based user authentication protocol with ring signature for internet of medical things9
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks9
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones9
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network9
A secure and lightweight data sharing scheme in vehicular digital twin network9
Author Correction to: A composite blockchain associated event traceability method for financial activities9
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network9
A blockchain-based coin mixing protocol with certificateless signcryption9
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network8
A multi-factor user authentication protocol for the internet of drones environment8
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks8
Efficient topology control of blockchain peer to peer network based on SDN paradigm8
A scalable identity management scheme via blockchain: Identity protection and traceability8
Traffic sign detection and recognition using RGSM and a novel feature extraction method8
Blockchain-Based Fair Payment for ABE with Outsourced Decryption8
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT8
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model8
Parallel Byzantine fault tolerance consensus based on trusted execution environments8
GE-IDS: an intrusion detection system based on grayscale and entropy8
The impact of propagation delay to different selfish miners in proof-of-work blockchains7
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction7
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things7
Big data analytics for critical information classification in online social networks using classifier chains7
A survey on security in consensus and smart contracts7
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles7
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network7
Enabling efficient and verifiable secure search on cloud-based encrypted big data7
Enhancing RPL using E-MOF: a fuzzy-based mobility model for IoV7
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things7
An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone7
Performance analysis of PoUW consensus mechanism: Fork probability and throughput7
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud7
Application-aware QoS routing in SDNs using machine learning techniques7
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance7
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks7
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols7
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks7
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains7
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection7
Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs7
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network7
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks7
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles7
Guest editorial special issue on “P2P computing for deep learning”7
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model7
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks7
BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing6
In-depth analysis of fault tolerant approaches integrated with load balancing and task scheduling6
A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks6
A blockchain-based cyber-security for connected networks6
Mainstay: A hybrid protocol ensuring ledger temporality and security6
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications6
BBAD: Blockchain-based data assured deletion and access control system for IoT6
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals6
A multi-cycle recursive clustering algorithm for the analysis of social media data streams6
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action6
Bsfra: Blockchain based smart forward-reverse agrichain6
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks6
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks6
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS6
WikiChain: An improved resilient, pseudo-transparent knowledge base6
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications6
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs6
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks6
Homomorphic multi-party computation for Internet of Medical Things6
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks6
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area6
A hybrid approach towards reduced checkpointing overhead in cloud-based applications6
A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks6
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive6
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system6
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT6
Mitigating bias in heterogeneous federated learning via stratified client selection6
A decentralized vehicle anti-theft system using Blockchain and smart contracts5
Deep learning-based power usage effectiveness optimization for IoT-enabled data center5
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies5
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet5
Efficient data harvesting from boundary nodes for smart irrigation5
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning5
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET5
Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET5
SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing5
O2D: An uncooperative taxi-passenger’s destination predication system via deep neural networks5
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks5
Attribute and closeness based scheduling model for vehicle-to-grid network5
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud5
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs5
Grouped federated learning for time-sensitive tasks in industrial IoTs5
Improvement of energy-efficient resources for cognitive internet of things using learning automata5
Tangent Pelican search optimization for block assignment in blockchain based IoT5
An incentive mechanism based on endowment effect facing social welfare in Crowdsensing5
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks5
An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model5
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain5
Systematic study of topology control methods and routing techniques in wireless sensor networks5
Making resource adaptive to federated learning with COTS mobile devices5
An alliance chain-based incentive mechanism for PSG data sharing5
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities5
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning5
A peer-to-peer energy trading model for community microgrids with energy management5
0.057667970657349