Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things59
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing57
Network security based combined CNN-RNN models for IoT intrusion detection system57
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation54
IoT data caching and scheduling in heterogeneous mobile networks by exploiting mobility and transient data characteristics51
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things39
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities38
Optimal RSU deployment using complex network analysis for traffic prediction in VANET37
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network36
Forwarding information base construction and hybrid data transmission for information-centric IoT36
Efficient multi-job federated learning scheduling with fault tolerance35
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare34
Energy efficient clustering with compressive sensing for underwater wireless sensor networks34
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks33
SpiderWeb protector: a biomimetic defense against targeted attacks on graph neural networks32
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks31
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks31
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value31
Threshold-sensitive energy efficient routing for precision agriculture29
A systematic review of secure federated learning based on blockchain and Multi-Party computation29
Sybil attack detection in ultra-dense VANETs using verifiable delay functions29
Dependency-aware task offloading and energy optimization in UAV-assisted MEC systems28
BATKA: batch authentication and tree-based key agreement for secure and efficient grouping of vehicles in 5G-VANET28
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance27
Lightweight secure authentication and key agreement technique for smart grid27
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks26
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method25
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization24
An autonomous intrusion detection framework leveraging multi-layered stacking ensemble architectures with dynamic machine learning-driven feature subset optimisation23
LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation23
Enhanced QoS-aware secure routing protocol for WAHNs using advanced fast double decker new binary archimedes kepler pure convolutional transformer network and cryptographic techniques23
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection22
A dynamic evaluation model of data price based on game theory22
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace22
PTSC: an efficient random boolean consensus algorithm for distributed systems with the probabilistic propagation model21
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks21
Attentional value-factorization-based resource allocation and performance evaluation for intelligent connected vehicles21
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies21
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS21
EMKPPA: Efficient multi-key privacy-preserving aggregation in federated learning21
Tangent Pelican search optimization for block assignment in blockchain based IoT20
ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs20
Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework20
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme20
Efficient dynamic-committee BFT consensus based on HotStuff20
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things20
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT20
SJO-MRL: Energy efficient path selection algorithm for WSNs19
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals19
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology19
Paths in the cloud: Geolocation mapping of Amazon’s cross-border connectivity19
Data security and access control method of blockchain with revocable attribute encryption in steel supply chain19
$$\chi$$perbp: a cloud-based lightweight mutual authentication protocol19
Energy-aware and efficient cluster head selection and routing in wireless sensor networks using improved artificial bee Colony algorithm19
Intrusion detection system for Denial of Service (DoS) attacks in healthcare cybersecurity on System on Chip (SoC) – PYTHON productivity for ZYNQ (PYNQ Z1)19
A lightweight pairing-free authentication key agreement protocol with anonymity for mobile edge computing infrastructure18
A highly secure and stable energy aware multi-objective constraints-based hybrid optimization algorithms for effective optimal cluster head selection and routing in wireless sensor networks18
AE-MCDD: Attention-enhanced multiple component defects detection for UAV-assisted powerline inspection18
BiEnTracer: a scalable complex network-based entity aggregation and recognition system in bitcoin network18
Multi-objective M-Lion optimization for energy proficient multi-path approach for scalable WSNs18
A blockchain-based integrated and interconnected hybrid platform for Smart City ecosystem17
Analysis of P2P networks based on Geo/Geo/c+d discrete-time queue17
EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens17
Exploring the potential of blockchain technology in modern healthcare systems17
Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies17
TDCTO: TOPSIS based deadline aware and cost effective taskoffloading in edge-fog-cloud computing environment17
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks17
A hybrid shuffled frog-leaping scheduling algorithm for power management of directional sensor networks17
A GNN-based proactive caching strategy in NDN networks17
Social-aware D2MD user grouping based on game theory and deep Q-learning17
Privacy-preserving revocable access control for LLM-driven electrical distributed systems17
Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator16
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator16
CSSA-based collaborative optimization recommendation of users in mobile crowdsensing16
A delay aware routing approach for FANET based on emperor penguins colony algorithm16
Tamper-proof multitenant data storage using blockchain16
A bio-inspired adaptive junction-based routing protocol for VANETs16
Retraction Note: Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network16
ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN16
Service function path selection methods for multi-layer satellite networks16
An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials15
A truthful mechanism for multi-access multi-server multi-task resource allocation in mobile edge computing15
A blockchain-based one-to-many traceless covert communication model for secure high-capacity information transmission15
Adaptive sensor clustering for environmental monitoring in dynamic forest ecosystems15
Anomal-EFD: A self-supervised model for anomaly detection in dynamic IoT networks15
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks15
Integrating ABHA for authentication and key exchange: A hybrid security framework for smart healthcare in India15
Security analysis and trends in signcryption for WBAN: A research study15
Blockchain-Based intrusion detection system for IoMT utilizing an enhanced artificial bee colony (E-ABC) and deep belief network (DBN)15
A blockchain assisted multi-gateway authentication scheme for IIoT based on group15
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system15
The security and vulnerability issues of blockchain technology: A SWOC analysis15
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network14
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks14
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks14
HAP-SG: Heterogeneous authentication protocol for smart grid14
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system14
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis14
Creating a realistic sybil attack dataset for inter-vehicle communication14
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment13
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks13
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs13
An intelligent blockchain strategy for decentralised healthcare framework13
An enhanced asynchronous advantage actor-critic-based algorithm for performance optimization in mobile edge computing -enabled internet of vehicles networks13
Multi-layered retrieval integrity verification mechanism for blockchain oracle13
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment13
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint13
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks13
Supporting efficient video file streaming in P2P cloud storage12
Impact assessment of sinkhole attack in IoT networks: a mathematical modeling approach12
Hague: a hybrid scaling stateless blockchain12
An edge-based IDS for the IoT using combined ML and generative AI models12
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment12
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance12
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm12
Power level aware charging schedule in wireless rechargeable sensor network12
Cyber Attack Detection in Internet of Things using Verifiable Convolutional Neural Network based Blockchain technology12
Optimum deployment of sensor nodes in wireless sensor network using hybrid fruit fly optimization algorithm and bat optimization algorithm for 3D Environment12
D2DA: Machine learning-empowered distributed authorization model in smart homes12
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices12
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET12
Retraction Note: Secure access control for manufacturing sector with application of ethereum blockchain12
Multimodal data privacy protection and completeness verification method for mobile crowd sensing12
An intelligent sleep-awake energy management system for wireless sensor network11
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment11
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking11
A data encryption and file sharing framework among microservices-based edge nodes with blockchain11
Blockchain based deep learning model for the security in industrial internet of things11
Heterogeneous signcryption scheme from CLC to IBC for IIoT11
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive11
A feature selection-driven machine learning framework for anomaly-based intrusion detection systems11
A privacy preserving batch audit scheme for IoT based cloud data storage11
A hybrid optimization and machine learning based energy-efficient clustering algorithm with self-diagnosis data fault detection and prediction for WSN-IoT application11
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol11
Multifactor SM9 blind signature large models data privacy preservation approach11
Blockchain assisted conditional privacy-preserving authentication scheme based on ring signcryption in VANETs11
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration11
Enhanced cluster head selection and energy efficient routing using optimized dual-path multi‐scale attention guided network in WSN environment11
Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit11
Novel joint data collection and wireless charging algorithm for rechargeable wireless sensor networks11
EPDL: An efficient and privacy-preserving deep learning for crowdsensing11
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot11
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN11
Quantum-resistant traceable, revocable, and key escrow-free CP-ABE for cloud storage11
BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning10
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain10
Efficient loop detection and congestion-free network update for SDN10
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks10
Deadline-aware workload scheduling for edge-enhanced iot devices: A blockchain-enabled approach to incentive-based computing10
Machine learning driven centroid localization algorithm for wireless sensor networks10
DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning10
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform10
A double-layer blockchain-assisted conditional privacy-preserving authentication and emergency reporting scheme for VANETs10
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid10
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network10
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things10
An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network10
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles10
A privacy-preserving method for cross-chain interoperability using homomorphic encryption10
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN10
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF10
An adaptive framework for real-time detection and mitigation of DDoS attacks in software-defined networks10
Cluster based hybrid optimization and kronecker gradient factored approximate optimum path curvature network for energy efficiency routing in WSN10
LAPMS: A lightweight and privacy-preserving management scheme for secure vehicle platoons10
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature9
Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem9
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET9
A novel approach for ensuring drug safety in the pharmaceutical supply Chain by using IoT devices and blockchain technology9
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system9
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks9
Quality of service aware routing in software defined video streaming: a survey9
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles9
Small target disease detection based on YOLOv5 framework for intelligent bridges9
A verifiable and privacy-preserving blockchain-based federated learning approach9
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme9
SecShield: An IoT access control framework with edge caching using software defined network9
DPSLS: an efficient local search algorithm for pure MaxSAT9
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption9
Parallel Byzantine fault tolerance consensus based on trusted execution environments9
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions9
Security resource allocation in blockchain-based IoT9
Proxy re-signature scheme with cryptographic reverse firewall for medical data security9
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT9
Energy-efficient wireless sensor networks: A novel hybrid adaptive archimedes marine predator-based routing strategy9
DRIVE: Dual rider-remora optimization for vehicular routing9
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization9
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET9
Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network9
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN9
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective9
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks8
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet8
MP-BADNet$$^+$$: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs8
Lightweight batch tamper proof detection for anonymous outsourced data in cloud-assisted industrial internet of things8
A technique for improving healthcare privacy by applying principal component analysis8
A context-aware multi-modal generative adversarial network for real-time anomaly detection in video surveillance8
Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation8
An efficient blockchain-based anonymous authentication and supervision system8
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks8
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling8
Ensemble bagging-based classifier for eavesdropper detection in 6G wireless networks8
Exploring equivariant and invariant features for website fingerprinting in distributed networks8
Privacy-preserving federated learning scheme for distributed smart grid based on multi-key homomorphic encryption8
Homomorphic multi-party computation for Internet of Medical Things8
WikiChain: An improved resilient, pseudo-transparent knowledge base8
Energy-efficient OFDMA resource allocation in HetNets using discrete particle swarm optimization8
A peer-to-peer energy trading model for community microgrids with energy management8
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud8
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction8
An AI-based approach for dynamic routing in IoT networks8
Optimized stochastic particle swarm optimization integrated ranked backoff medium access control for optimal route selection in wireless sensor networks7
Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication7
A data-driven cognitive cyber-physical systems for cyber threat mitigation in medical internet of things7
Research on distributed UWSN power control algorithm based on cooperative game7
A greedy energy efficient clustering scheme based reinforcement learning for WSNs7
CuraFrame: a patient-centric secure and privacy preserving medical framework with zero-leak using blockchain7
Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network7
An identity-based traceable ring signatures based on lattice7
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM7
HessianAuth: A Secure and Efficient Authentication Mechanism for Resource-Constrained IoT Networks7
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning7
Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks7
An intelligent fault node diagnosis and classification approach using XGBoost with whale optimization in wireless sensor networks7
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT7
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework7
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs7
A multi-objective approach for secure cluster based routing & attack classification in VANETs7
DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment7
A blockchain-based framework for enhancing fraud detection, transparency, and efficiency in health insurance claims7
A privacy-preserving hybrid ensemble classifier using decision tree and naïve bayes approach for federated learning7
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey7
Joint task assignment and path planning for truck and drones in mobile crowdsensing7
(k, n) Threshold Secret Image Sharing using linear algebra for secure multimedia transmission7
An optimized incremental learning strategy for efficient intrusion detection7
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning7
IPML-ANP: An integrated polynomial manifold learning model and anchor node placement for wireless sensor node localization7
Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network7
Starkburger-game-based real-time pricing method for energy transactions in smart grid7
BT-CSRS: A decentralized and distributed solution for sustainable seafood supply chain system utilizing zero-knowledge proofs and permissionless blockchain7
A decentralized scheme for multi-user edge computing task offloading based on dynamic pricing7
Optimize the model performance in federated learning: a contract theory-based heuristic approach7
Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs7
Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach7
An innovative key agreement protocol with complex attribute authentication based on blockchain7
Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation7
Exploring blockchain-based open finance: The role of advanced cryptographic tools, state-of-the-art achievements, and background challenges7
Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing7
Deep learning for intrusion detection in IoT networks7
Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation7
Design, formal verification, and security analysis of SCMChain: A lightweight blockchain-based authentication protocol for IoT-enabled supply chain management7
0.16842699050903