default search action
Peer-to-Peer Networking and Applications, Volume 16
Volume 16, Number 1, January 2023
- Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. 1-21 - Srivel Ravi, Saravanan Matheswaran, Uma Perumal, Shanthi Sivakumar, Srinivas Kumar Palvadi:
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. 22-34 - Diksha Rangwani, Hari Om:
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things. 35-56 - Volodymyr Kharchenko, Andrii Grekhov:
Traffic simulation and losses estimation in stratospheric drone network. 57-70 - Neng Wan, Yating Luo, Guangping Zeng, Xianwei Zhou:
Minimization of VANET execution time based on joint task offloading and resource allocation. 71-86 - V. C. Diniesh, G. Murugesan:
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things. 87-106 - Xiaohui Yang, Wenjie Li, Kai Fan:
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. 107-125 - Poonam Tiwari, Sandeep Kumar Gupta, Aruna Pathak:
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network. 126-141 - Meng Zhao, Yong Ding, Shijie Tang, Hai Liang, Huiyong Wang:
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. 142-155 - Mu Han, Puyi Xu, Lei Xu, Chungen Xu:
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. 156-169 - Lixia Lin, Wen'an Zhou, Zhicheng Yang, Jianlong Liu:
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things. 170-188 - Milad Mohseni, Fatemeh Amirghafouri, Behrouz Pourghebleh:
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. 189-209 - S. Kranthi, M. Kanchana, M. Suneetha:
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 210-225 - Jinze Li, Xiaofeng Li, He Zhao, Bin Yu, Tong Zhou, Haotian Cheng, Nianzu Sheng:
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm. 226-244 - Xin Liu, Miao Wang, Tanyang Wang, Ruisheng Zhang:
A blockchain assisted multi-gateway authentication scheme for IIoT based on group. 245-259 - Gaurav Tyagi, Rahul Kumar:
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem. 260-276 - Zhaoqi Cai, Jia Wu:
Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT. 277-294 - Yanfei Wang, Kai Zhang, Kejie Lu, Yun Xiong, Mi Wen:
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving. 295-311 - Linjian Hong, Kai Zhang, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. 312-327 - Eiman AlNuaimi, Mariam Alsafi, Maitha Alshehhi, Mazin Debe, Khaled Salah, Ibrar Yaqoob, M. Jamal Zemerly, Raja Jayaraman:
Blockchain-based system for tracking and rewarding recyclable plastic waste. 328-346 - Preeti Gupta, Sachin Tripathi, Samayveer Singh, V. S. Gupta:
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime. 347-357 - Chang Xu, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif:
Privacy-preserving and fault-tolerant aggregation of time-series data without TA. 358-367 - Erika Rosas, Orlando Andrade, Nicolas Hidalgo:
Effective communication for message prioritization in DTN for disaster scenarios. 368-382 - Ming Luo, Dashi Huang, Minrong Qiu:
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. 383-394 - Frédéric Guidec, Yves Mahéo, Camille Noûs:
Supporting conflict-free replicated data types in opportunistic networks. 395-419 - Jiamou Qi, Yepeng Guan:
Practical Byzantine fault tolerance consensus based on comprehensive reputation. 420-430 - Aditi Sharma, Parmeet Kaur:
Tamper-proof multitenant data storage using blockchain. 431-449 - Tania Taami, Sadoon Azizi, Ramin Yarinezhad:
An efficient route selection mechanism based on network topology in battery-powered internet of things networks. 450-465 - Heng Zhang, Jun Gu, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. 466-474
Volume 16, Number 2, March 2023
- Changzhen Zhang, Zhanyou Ma, Lin Liu, Yilin Liu:
Modeling & analysis of block generation process of the mining pool in blockchain system. 475-487 - Yiran Yang, Xiqing Liu, Zhifeng Wang, Yiliang Liu:
Dynamic shielding to secure multi-hop communications in vehicular platoons. 488-498 - Melak Ayenew, Hang Lei, Xiaoyu Li, Weizhong Qian, Eyerusalem Abeje, Wenjia Xiang, Abebe Tegene:
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm. 499-519 - Lei Hang, Israr Ullah, Jun Yang, Chun Chen:
An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials. 520-537 - Chuxin Zhuang, Qingyun Dai, Jiangzhong Cao:
A blockchain shard storage model suitable for multi-view. 538-553 - Hang Shen, Xin Liu, Ning Shi, Tianjing Wang, Guangwei Bai:
Blockchain-enabled solution for secure and scalable V2V video content dissemination. 554-570 - Fangfang Gou, Jia Wu:
Novel data transmission technology based on complex IoT system in opportunistic social networks. 571-588 - Shuwei Qiu, Rong Cao, Haiyan Shi, Jianzhong Li, Yanjun Li:
6WPSN: Reliable and efficient IPv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks. 589-605 - Jianlong Liu, Jiaye Wen, Yuhang Xie, Lixia Lin, Wen'an Zhou:
Social-aware D2MD user grouping based on game theory and deep Q-learning. 606-628 - Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
Fog-based low latency and lightweight authentication protocol for vehicular communication. 629-643 - Ming Luo, Dashi Huang, Minrong Qiu:
Cross-domain heterogeneous signcryption with keyword search for wireless body area network. 644-656 - Kuanishbay Sadatdiynov, Laizhong Cui, Joshua Zhexue Huang:
Offloading dependent tasks in MEC-enabled IoT systems: A preference-based hybrid optimization method. 657-674 - Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng:
A blockchain-based traceability system with efficient search and query. 675-689 - Zhen-Fei Wang, Yong-Wang Ren, Zhong-Ya Cao, Li-Ying Zhang:
LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation. 690-708 - Chunxin Lin, Ying Li, Manzoor Ahmed, Chenliu Song:
Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing. 709-726 - Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Wei Quan:
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks. 727-748 - Zhengyang Ai, Weiting Zhang, Mingyan Li, Pengxiao Li, Lei Shi:
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks. 749-764 - Jorgito Matiuzzi Stocchero, Andre Dexheimer Carneiro, Iulisloi Zacarias, Edison Pignaton de Freitas:
Combining information centric and software defined networking to support command and control agility in military mobile networks. 765-784 - Javid Ali Liakath, Pradeep Krishnadoss, Gobalakrishnan Natesan:
DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment. 785-802 - Jian Wang, Shuai Hao, Guosheng Zhao:
CSSA-based collaborative optimization recommendation of users in mobile crowdsensing. 803-817 - Simona-Vasilica Oprea, Adela Bâra:
An Edge-Fog-Cloud computing architecture for IoT and smart metering data. 818-845 - Akanksha Goel, S. Neduncheliyan:
An intelligent blockchain strategy for decentralised healthcare framework. 846-857 - Haibo Wu, Hui Liu, Jun Li:
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions. 858-875 - Nabanita Das, Souvik Basu, Sipra Das Bit:
OlaRout: Optimal dropbox deployment based cluster routing for post disaster information exchange in a smart city. 876-899 - S. Vidhya, V. Kalaivani:
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. 900-913 - T. Anusha, Mullur Pushpalatha:
C3P-RPL: A collaborative and proactive approach for optimal peer to peer path selection and sustenance. 914-931 - Md Asif Thanedar, Sanjaya Kumar Panda:
A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks. 932-946 - K. Sridevi, Md Abdul Saifulla:
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN. 947-957 - K. Kumaran, E. Sasikala:
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform. 958-979 - Chuanxin Zhao, Yancheng Yao, Na Zhang, Fulong Chen, Taochun Wang, Yang Wang:
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks. 980-996 - Jiacheng Hou, Haoye Lu, Amiya Nayak:
A GNN-based proactive caching strategy in NDN networks. 997-1009 - Naveen Chauhan, Rajeev Agrawal, Haider Banka:
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint. 1010-1026 - Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil:
A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network. 1027-1048 - Paruthi Ilam Vazhuthi Padmanaban, Aruchamy Prasanth, Manikandan Shanmugaperumal Periasamy, K. K. Devi Sowndarya:
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. 1049-1068 - Shuo Peng, Kun Liu, Shiji Wang, Yangxia Xiang, Baoxian Zhang, Cheng Li:
Time window-based online task assignment in mobile crowdsensing: Problems and algorithms. 1069-1087 - Seyed Ali Sadati, Mojtaba Shivaie, AmirAli Nazari:
Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation. 1088-1105 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A blockchain-based coin mixing protocol with certificateless signcryption. 1106-1124 - Muhammad Faisal Nadeem, Muhammad Imran, Hafiz Muhammad Afzal Siddiqui, Muhammad Azeem:
Fault tolerance designs of interconnection networks. 1125-1134 - Sreya Ghosh, Iti Saha Misra, Tamal Chakraborty:
Optimal RSU deployment using complex network analysis for traffic prediction in VANET. 1135-1154 - Qaisar Ayub, Sulma Rashid:
Community trend message locking routing protocol for delay tolerant network. 1155-1173 - Mohammad Naderi, Khorshid Mahdaee, Parisa Rahmani:
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks. 1174-1198 - Rajeev Ranjan, Prabhat Kumar:
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks. 1199-1210 - Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:
A domain name management system based on account-based consortium blockchain. 1211-1226 - R. Barona, E. Baburaj:
An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model. 1227-1241 - Lingyu Lu, Jing Yu, Haifeng Du, Xiang Li:
A3C-based load-balancing solution for computation offloading in SDN-enabled vehicular edge computing networks. 1242-1256 - Yanjun Liu, Hongwei Li, Xinyuan Qian, Meng Hao:
ESA-FedGNN: Efficient secure aggregation for federated graph neural networks. 1257-1269 - Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. 1270-1285 - Wenjie Zhao, Yu Wang, Wenbin Zhai, Liang Liu, Yulei Liu:
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks. 1286-1309 - P. Arulprakash, A. Suresh Kumar, S. Poorna Prakash:
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. 1310-1326
Volume 16, Number 3, May 2023
- Yu Wang, Wenyong Wang, Youlu Zeng, Ting Yang:
GradingShard: A new sharding protocol to improve blockchain throughput. 1327-1339 - Anmulin Wu, Yajun Guo, Yimin Guo:
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles. 1340-1353 - Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. 1354-1364 - Egide Nkurunziza, Fagen Li:
HAP-SG: Heterogeneous authentication protocol for smart grid. 1365-1379 - Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. 1380-1431 - Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. 1432-1444 - Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao, Sonu Kumar:
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. 1445-1467 - Zhibin Liu, Yuhan Liu, Yuxia Lei, Zhenyou Zhou, Xinshui Wang:
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing. 1468-1480 - Jigyasa Chadha, Aarti Jain, Yogesh Kumar:
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches. 1481-1498 - Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari:
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm. 1499-1512 - Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network. 1513-1535 - Guosheng Zhao, Xiao Wang, Jian Wang, Jia Liu:
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. 1536-1550 - Shengzhou Hu, Wenhao Li, Tingting Zhong, Hua He:
An innovative key agreement protocol with complex attribute authentication based on blockchain. 1551-1569 - Changzhen Zhang, Zhanyou Ma, Lin Liu, Yilin Liu:
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system. 1570 - S. Kranthi, M. Kanchana, M. Suneetha:
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 1571 - M. Sudha, V. P. Galdis pushparathi:
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method. 1572 - Retraction Note: RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. 1573
- Retraction Note: SPAHN novel approach for PL-AG gateway discovery for internet connectivity. 1574
- Retraction Note: Machine learning based multi scale parallel K-means + + clustering for cloud assisted internet of things. 1575
- Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1576
- Retraction Note: Defense model for preserving the wind turbine records in cloud using fog computing with coupling based cryptography. 1577
- Retraction Note: Secure access control for manufacturing sector with application of ethereum blockchain. 1578
- Retraction Note: Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1579
- Retraction Note: Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1580
- Retraction Note: Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 1581
Volume 16, Number 4, August 2023
- Du Chen, Deyun Gao, Lu Jin, Wei Quan, Hongke Zhang:
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks. 1583-1595 - Xuewen He, Kaihua Cao:
LoRa network communication protocol based on location and time planning. 1596-1608 - Vijay Rayar, Udaykumar Naik, Prabhakar S. Manage:
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. 1609-1623 - Nour El Houda Bourebia, Chunlin Li:
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs. 1624-1640 - Peiyan Yuan, Zhao Han, Xiaoyan Zhao:
Integrating the edge intelligence technology into image composition: A case study. 1641-1651 - Tao Li, Yali Liu, Jianting Ning:
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance. 1652-1667 - Zijia Wang, Baoxian Zhang, Yangxia Xiang, Cheng Li:
Joint task assignment and path planning for truck and drones in mobile crowdsensing. 1668-1679 - Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui:
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things. 1680-1695 - Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:
A composite blockchain associated event traceability method for financial activities. 1696-1715 - Shengchen Duan, Hong Liu, Lize Gu:
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system. 1716-1738 - Suguna Paramasivam, R. Leela Velusamy:
Quality of service aware routing in software defined video streaming: a survey. 1739-1760