Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Blockchain smart contracts: Applications, challenges, and future trends351
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks126
Secure and efficient mutual authentication protocol for smart grid under blockchain99
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain89
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques65
Task scheduling in cloud-fog computing systems57
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities55
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs53
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks53
A digital rights management system based on a scalable blockchain52
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services49
A robust and lightweight secure access scheme for cloud based E-healthcare services48
Reliable scheduling and load balancing for requests in cloud-fog computing43
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks41
A reliable tree-based data aggregation method in wireless sensor networks40
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks38
ASFGNN: Automated separated-federated graph neural network38
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications37
User authentication using Blockchain based smart contract in role-based access control35
A survey for the application of blockchain technology in the media35
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain31
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs30
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things29
Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks29
Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks28
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm28
Cloud-connected flying edge computing for smart agriculture28
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment27
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems27
An improved steganography without embedding based on attention GAN26
Blockchain-based digitization of land record through trust value-based consensus algorithm25
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks24
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones24
Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain24
HonestChain: Consortium blockchain for protected data sharing in health information systems23
A secure vehicle theft detection framework using Blockchain and smart contract23
Cancelable Iris template for secure authentication based on random projection and double random phase encoding23
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network23
Obfuscation of images via differential privacy: From facial images to general images22
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities22
Low energy consumption routing algorithm based on message importance in opportunistic social networks22
Behavior prediction based on interest characteristic and user communication in opportunistic social networks22
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles22
Blockchain-based solution for Secure and Transparent Food Supply Chain Network22
Cryptocurrencies activity as a complex network: Analysis of transactions graphs22
Trust based task offloading scheme in UAV-enhanced edge computing network22
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges21
A provably secure RFID authentication protocol based on ECQV for the medical internet of things21
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic21
A donation tracing blockchain model using improved DPoS consensus algorithm21
A decentralized vehicle anti-theft system using Blockchain and smart contracts20
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds20
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things20
Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach20
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things20
An experimental study on performance of private blockchain in IoT applications19
A lightweight continuous authentication scheme for medical wireless body area networks19
Influencing factors analysis in pear disease recognition using deep learning18
Secure medical data sharing scheme based on traceable ring signature and blockchain18
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network18
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property18
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks17
SDN-based offloading policy to reduce the delay in fog-vehicular networks17
A double steganography model combining blockchain and interplanetary file system17
An integrative approach for secure data sharing in vehicular edge computing using Blockchain17
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage16
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment16
A certificateless encryption scheme based on blockchain16
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach16
An intelligent traffic prediction framework for 5G network using SDN and fusion learning16
Systematic study of topology control methods and routing techniques in wireless sensor networks16
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system15
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks15
A secure peer to peer multiparty transaction scheme based on blockchain15
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions15
Improved blockchain-based user authentication protocol with ring signature for internet of medical things15
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy15
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems15
AMVchain: authority management mechanism on blockchain-based voting systems14
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications14
SynergyGrids: blockchain-supported distributed microgrid energy trading14
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment14
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection14
Reinforcement-Learning based energy efficient optimized routing protocol for WSN14
Impact of data correlation on privacy budget allocation in continuous publication of location statistics13
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks13
Desynchronization resistant privacy preserving user authentication protocol for location based services13
Data-driven peer-to-peer blockchain framework for water consumption management13
Optimize the placement of edge server between workload balancing and system delay in smart city13
An intelligent sleep-awake energy management system for wireless sensor network13
BCAV: Blockchain-based certificateless authentication system for vehicular network13
Real-time reliable clustering and secure transmission scheme for QoS development in MANET13
A uniformization-based approach to preserve individuals’ privacy during process mining analyses13
Enabling rank-based distribution of microservices among containers for green cloud computing environment13
Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G13
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid13
Energy-efficient client selection in federated learning with heterogeneous data on edge13
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing13
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data12
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN12
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles12
Joint computation offloading and resource allocation in vehicular edge computing based on an economic theory: walrasian equilibrium12
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain12
Blind signcryption scheme based on hyper elliptic curves cryptosystem12
URASP: An ultralightweight RFID authentication scheme using permutation operation12
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things12
A self-localization range free protocol for wireless sensor networks12
An Edge-Fog-Cloud computing architecture for IoT and smart metering data11
Trust and scalable blockchain-based message exchanging scheme on VANET11
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment11
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles11
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust11
AToM: Active topology monitoring for the bitcoin peer-to-peer network11
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts11
Efficient topology control of blockchain peer to peer network based on SDN paradigm11
A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system10
From edge data to recommendation: A double attention-based deformable convolutional network10
Trust estimation in peer-to-peer network using BLUE10
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud10
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization10
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks10
Efficient and privacy-preserving range-max query in fog-based agricultural IoT10
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks10
BESDDFFS: Blockchain and EdgeDrone based secured data delivery for forest fire surveillance10
An optimized architecture and algorithm for resource allocation in D2D aided fog computing10
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection10
Verifiable dynamic ranked search with forward privacy over encrypted cloud data10
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds10
Achieving IoT data security based blockchain10
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT10
Joint optimization of task caching and computation offloading in vehicular edge computing10
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks10
Energy aware MAC protocol with mobility management in wireless body area network10
Optimal RSU deployment using complex network analysis for traffic prediction in VANET9
Reputation management in vehicular network using blockchain9
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment9
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT9
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN’s9
New incentive mechanism to enhance cooperation in wireless P2P networks9
Computing tasks assignment optimization among edge computing servers via SDN9
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications9
EICache: A learning-based intelligent caching strategy in mobile edge computing9
A critical analysis of RPL objective functions in internet of things paradigm9
An optimal load balancing strategy for P2P network using chicken swarm optimization9
Efficient path-sense transmission based on IoT system in opportunistic social networks9
Secure data sharing using Merkle hash digest based blockchain identity management9
Tamper-proof multitenant data storage using blockchain9
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey9
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks9
Energy efficient clustering with compressive sensing for underwater wireless sensor networks9
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs9
Energy-effective artificial internet-of-things application deployment in edge-cloud systems9
A location privacy protection scheme for convoy driving in autonomous driving era9
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks9
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks9
An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone9
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks9
An efficient route selection mechanism based on network topology in battery-powered internet of things networks8
Application-aware QoS routing in SDNs using machine learning techniques8
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network8
Resource management of GEO relays for real-time remote sensing8
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud8
Improved bio-inspired security scheme for privacy-preserving in the internet of things8
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion8
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network8
An authentication and key agreement scheme for smart grid8
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis8
Three-stage Stackelberg game based edge computing resource management for mobile blockchain8
A resource allocation scheme for D2D communications with unknown channel state information8
Traffic sign detection and recognition using RGSM and a novel feature extraction method8
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs8
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection7
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks7
Fuzzy routing for in-network aggregation in wireless sensor networks7
Energy and delay-ware massive task scheduling in fog-cloud computing system7
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing7
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks7
A greedy energy efficient clustering scheme based reinforcement learning for WSNs7
An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area7
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective7
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm7
NTSC: a novel trust-based service computing scheme in social internet of things7
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing7
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing7
An intelligent blockchain strategy for decentralised healthcare framework7
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey7
A blockchain-based quantum-secure reporting protocol7
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains7
100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing7
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback–Leibler divergence7
A novel hierarchical fault management framework for wireless sensor networks: HFMF7
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks7
A secure and efficient authentication protocol for wireless applications in multi-server environment7
$$\chi$$perbp: a cloud-based lightweight mutual authentication protocol7
Improved differentiable neural architecture search for single image super-resolution7
A delay-constrained node-disjoint multipath routing in software-defined vehicular networks7
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme7
A verifiable and privacy-preserving blockchain-based federated learning approach7
0.045654773712158