Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Consensus in sensor networks in presence of hybrid faults461
Resource allocation and optimization in D2D communication with PDRAPC framework80
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things57
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value55
A secure and lightweight data sharing scheme in vehicular digital twin network48
A scalable identity management scheme via blockchain: Identity protection and traceability45
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature45
Parallel Byzantine fault tolerance consensus based on trusted execution environments39
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM38
SecShield: An IoT access control framework with edge caching using software defined network37
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model36
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network35
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism33
Security resource allocation in blockchain-based IoT33
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks33
Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices32
A ring signature scheme with linkability and traceability for blockchain-based medical data sharing system32
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing32
Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications29
QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy29
Small target disease detection based on YOLOv5 framework for intelligent bridges29
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems29
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs28
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking28
Forwarding information base construction and hybrid data transmission for information-centric IoT27
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme27
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system27
An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT26
IoT-enabled wireless sensor networks optimization based on federated reinforcement learning for enhanced performance26
Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security26
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system24
LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security22
Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks22
A multi-factor user authentication protocol for the internet of drones environment22
Efficient multi-job federated learning scheduling with fault tolerance22
Truthful double auction based incentive mechanism for participatory sensing systems21
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare19
A resource allocation scheme for D2D communications with unknown channel state information19
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches19
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things19
Traffic sign detection and recognition using RGSM and a novel feature extraction method19
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN18
Improved blockchain-based user authentication protocol with ring signature for internet of medical things18
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows18
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN18
Lightweight secure authentication and key agreement technique for smart grid18
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network18
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks18
Social relation based DAG blockchain inspired healthcare of livestock18
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks18
Trust-based clustering and routing in WSNs using DST-WOA17
A verifiable and privacy-preserving blockchain-based federated learning approach16
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks16
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing16
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles16
Preserving location privacy against inference attacks in indoor positioning system16
Low interruption ratio link fault recovery scheme for data plane in software-defined networks16
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN16
Energy aware MAC protocol with mobility management in wireless body area network15
Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks15
DRIVE: Dual rider-remora optimization for vehicular routing15
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications15
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties15
Quality of service aware routing in software defined video streaming: a survey15
Practical Byzantine fault tolerance consensus based on comprehensive reputation14
Developing a novel blockchain-based vaccine tracking and certificate system: An end-to-end approach14
A novel transfer extreme learning machine from multiple sources for intrusion detection14
A new method of network traffic prediction based on combination model14
Transaction graph based key node identification for blockchain regulation13
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system13
Proxy re-signature scheme with cryptographic reverse firewall for medical data security13
BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records13
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission13
Sybil attack detection in ultra-dense VANETs using verifiable delay functions13
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET13
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones12
Author Correction to: A composite blockchain associated event traceability method for financial activities12
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks12
Feature fusion federated learning for privacy-aware indoor localization12
Trust based task offloading scheme in UAV-enhanced edge computing network12
Resource management of GEO relays for real-time remote sensing12
Temporary relay: A more flexible way to cross chains12
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption11
Semi-shadow file system: An anonymous files storage solution11
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF11
Revisiting FAW attack in an imperfect PoW blockchain system11
A regional interest-aware caching placement scheme for reducing latency in the LEO satellite networks11
A privacy protection scheme for green communication combining digital steganography11
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks11
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading11
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets11
The reliable routing for software-defined vehicular networks towards beyond 5G11
Non-transferable blockchain-based identity authentication11
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach11
Privacy-preserving comparison based data aggregation protocols for mobile sensing10
HeadSee: Device-free head gesture recognition with commodity RFID10
Integrating the edge intelligence technology into image composition: A case study10
Privacy-preserving and fault-tolerant aggregation of time-series data without TA10
Optimal RSU deployment using complex network analysis for traffic prediction in VANET10
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system10
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing10
Efficient loop detection and congestion-free network update for SDN10
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs10
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords10
Dynamic shielding to secure multi-hop communications in vehicular platoons10
Supporting conflict-free replicated data types in opportunistic networks10
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage10
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks10
Reducing the number of transaction messages in bitcoin10
Energy efficient clustering with compressive sensing for underwater wireless sensor networks10
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm10
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective10
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks10
A high performance two-layer consensus architecture for blockchain-based IoT systems9
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks9
Desynchronization resistant privacy preserving user authentication protocol for location based services9
EICache: A learning-based intelligent caching strategy in mobile edge computing9
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing9
A blockchain-based coin mixing protocol with certificateless signcryption9
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques9
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain9
Energy-efficient sensory data gathering in IoT networks with mobile edge computing9
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET9
Verifiable dynamic ranked search with forward privacy over encrypted cloud data9
Parked vehicles crowdsourcing for task offloading in vehicular edge computing9
Scale-free networks: evolutionary acceleration of the network survivability and its quantification9
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment9
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems9
Blockchain-based trust management for verifiable time synchronization service in IoT9
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid9
SFIM: Identify user behavior based on stable features9
Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system9
DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN9
Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN9
Real-time reliable clustering and secure transmission scheme for QoS development in MANET8
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities8
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions8
Data-driven peer-to-peer blockchain framework for water consumption management8
Energy-efficient client selection in federated learning with heterogeneous data on edge8
Digital rights management scheme based on redactable blockchain and perceptual hash8
Fog-based low latency and lightweight authentication protocol for vehicular communication8
Network security based combined CNN-RNN models for IoT intrusion detection system8
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks8
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network8
Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network8
Blockchain-based system for tracking and rewarding recyclable plastic waste8
Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization8
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network8
A blockchain-based cyber-security for connected networks7
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation7
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks7
BBAD: Blockchain-based data assured deletion and access control system for IoT7
BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing7
A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities7
Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks7
Mitigating bias in heterogeneous federated learning via stratified client selection7
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network7
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model7
Deep learning for intrusion detection in IoT networks7
Service caching with multi-agent reinforcement learning in cloud-edge collaboration computing7
Mainstay: A hybrid protocol ensuring ledger temporality and security7
Bsfra: Blockchain based smart forward-reverse agrichain7
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling7
Hybrid Termite Queen and Walrus Optimization Algorithm-based energy efficient cluster-based routing with static and mobile sink node in WSNs7
Enabling efficient and verifiable secure search on cloud-based encrypted big data7
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks7
Homomorphic multi-party computation for Internet of Medical Things7
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action7
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks7
A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool6
Efficient dynamic-committee BFT consensus based on HotStuff6
Tangent Pelican search optimization for block assignment in blockchain based IoT6
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain6
Efficient data harvesting from boundary nodes for smart irrigation6
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT6
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud6
A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies6
Deep learning-based power usage effectiveness optimization for IoT-enabled data center6
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet6
A peer-to-peer energy trading model for community microgrids with energy management6
Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET6
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive6
A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks6
Systematic study of topology control methods and routing techniques in wireless sensor networks6
Sustaining immutability in pharmaceutical cold supply chain integrating quantum blockchain6
A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection6
An alliance chain-based incentive mechanism for PSG data sharing6
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning6
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system6
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS6
An intelligent behavioral-based DDOS attack detection method using adaptive time intervals6
A bayesian-based distributed trust management scheme for connected vehicles’ security5
An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model5
An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments5
A secure IoT-based micro-payment protocol for wearable devices5
A blockchain-based auditable deduplication scheme for multi-cloud storage5
The real estate tokenized investment system based on ethereum blockchain5
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method5
Adaptive SSO based node selection for partial charging in wireless sensor network5
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection5
Online budget-limited pricing incentives for remote mobile sensing5
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network5
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme5
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things5
ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks5
Reinforcement-Learning based energy efficient optimized routing protocol for WSN5
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks5
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications5
Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks5
An AI-based approach for dynamic routing in IoT networks5
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust5
A secure user authentication scheme for crypto-wallet in IoT environment5
A blockchain-based quantum-secure reporting protocol5
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions5
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN5
An efficient and secured voting system using blockchain and hybrid validation technique with deep learning5
SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing5
An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles5
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection5
WikiChain: An improved resilient, pseudo-transparent knowledge base5
A multi-cycle recursive clustering algorithm for the analysis of social media data streams5
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property5
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM5
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications5
An efficient blockchain-based anonymous authentication and supervision system5
0.12364912033081