Skip to main content

Peer-to-Peer Networking and Applications OnlineFirst articles

24-09-2021 Open Access

Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT

To achieve a fully connected network in Internet of Things (IoT) there are number of challenges that have to be overcome. Among those, a big challenge is how to keep all of the devices accessible everywhere and every time. In the IoT network, the …

Mohammed B. M. Kamel, Peter Ligeti, Adam Nagy, Christoph Reich


MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection

With the proliferation of smartphone demand, the number of malicious applications has increased exponentially with about tens of thousands per month. Among smartphone platforms, the Android operating system with high popularity has become the most …

Duc V. Nguyen, Giang L. Nguyen, Thang T. Nguyen, Anh H. Ngo, Giang T. Pham


Machine-learning-based cache partition method in cloud environment

In the modern cloud environment, considering the cost of hardware and software resources, applications are often co-located on a platform and share such resources. However, co-located execution and resource sharing bring memory access conflict …

Jiefan Qiu, Zonghan Hua, Lei Liu, Mingsheng Cao, Dajiang Chen


The reliable routing for software-defined vehicular networks towards beyond 5G

An extension of Software-Defined Networking (SDN) to the vehicular networks can improve the network performance effectively. However, with the explosive growth of vehicles, the architecture of Software-Defined Vehicular Networks (SDVNs) cannot …

Yaoguang Lu, Xingwei Wang, Bo Yi, Min Huang


Convergence of Edge Computing and Next Generation Networking

Deze Zeng, Geyong Min, Qiang He, Song Guo


A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks

Vehicular ad hoc network (VANET) is a key element of an intelligent transportation system (ITS), where connected vehicles communicate with the infrastructure wirelessly. The continuous connectivity influences message dissemination, which affects …

C. Suganthi Evangeline, Vinoth Babu Kumaravelu


Robustness against fraudulent activities of a blockchain-based online review system

Fake reviews are a major problem in online consumer feedback systems that not only mislead people due to incorrect information but also damage the overall credibility of online businesses. Popular online review platforms have tried to overcome …

Tanakorn Karode, Warodom Werapun


Comparative analysis of probabilistic forwarding strategies in ICN for edge computing

Named data networking (NDN) is a promising future network architecture in 5G edge computing scenarios because it supports multicast, mobility, in-network caching, and security. The key problem of service invocation in edge computing is how to …

Meimei Zhang, Jun Luo, Liangjie Zhang, Xiquan Yu, Ting Xu, Kai Lei


Enabling rank-based distribution of microservices among containers for green cloud computing environment

Microservices architecture is a functional software design methodology that promises the redefinition of the architectural style that aims to create a single application as a suite of tiny, loosely coupled services or components, each performing …

Abdul Saboor, Ahmad Kamil Mahmood, Abdullah Hisam Omar, Mohd Fadzil Hassan, Syed Nasir Mehmood Shah, Ali Ahmadian


A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system

Edge intelligence, as a new computing paradigm, aims to allocate Artificial Intelligence (AI)-based tasks partly on the edge to execute for reducing latency, consuming energy and improving privacy. As the most important technique of AI, Deep …

Lei Shi, Zhigang Xu, Yabo Sun, Yi Shi, Yuqi Fan, Xu Ding


Double agents-DQL based D2D computing-offloading for SHVC

To make the network provide a better Quality-of-Service (QoS) guarantee for compute-intensive applications, many researchers study Device-to-Device (D2D) based Multi-access Edge Computing (MEC) for reducing computing task completion time and …

Jianlong Liu, Jiaye Wen, Lixia Lin, Wen’an Zhou


A novel hierarchical fault management framework for wireless sensor networks: HFMF

Wireless sensor nodes (WSNs) are employed to collect data for control and supervisory purposes in inaccessible areas. Applying sensors in inaccessible areas and their hardware limitations result in occurring faults and non-renewability of energy.

Elham Moridi, Majid Haghparast, Mehdi Hosseinzadeh, Somayyeh Jafarali Jassbi

09-08-2021 Open Access

Cryptocurrencies activity as a complex network: Analysis of transactions graphs

The number of users approaching the world of cryptocurrencies exploded in the last years, and consequently the daily interactions on their underlying distributed ledgers have intensified. In this paper, we analyze the flow of these digital …

Luca Serena, Stefano Ferretti, Gabriele D’Angelo


An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search

The multimedia Internet of Things system is helpful for real-time monitoring and research of vegetable growth status and related environmental variables in the greenhouse. However, dense interleaved growth of vegetables can create a blind area of …

Huarui Wu, Huaji Zhu, Xiao Han


Decentralized access control technique with multi-tier authentication of user for cloud storage

The information kept in cloud is greatly sensitive. Security and privacy are two leading issues that often ascend in cloud computing. The objective of the research is to provide security and authentication of cloud data. So, we put forward with a …

S. Shiny, J. Jasper


Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks

In wireless sensor networks (WSNs), the clustering architecture balances the energy consumption of the sensor nodes as compared with the flat network architecture. The cluster heads which are nearer to the sink node spend more energy than other …

Mohaideen Pitchai K


Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach

For the Internet of Things (IoT) that have low processing power, fog computing can play an essential role as a processing resource to execute their tasks. Timely execution of the service and the optimal service cost are two major challenges of …

Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi


Secure data sharing using Merkle hash digest based blockchain identity management

Blockchain identity management (BIdM) is a mechanism for identification, authentication and approval of user right to use the personal data. In the recently established BIdM systems, the third party takes control of maintaining the confidential …

Tripti Rathee, Parvinder Singh


Blockchain-based solution for Secure and Transparent Food Supply Chain Network

The global food supply chain industry has embraced digitalization and has changed consumer’s day-to-day lives in many aspects. Efficient tracking of food products when within the supply chain ensures the safety of the end consumers. However …

Munir Majdalawieh, Nishara Nizamuddin, Maher Alaraj, Shafaq Khan, Anoud Bani-Hani


Extending the coverage of evolved Node–B by relaying data using device-to-device offloading in next generation cellular network

The fifth-Generation mobile network introduces a new technology called Device-to-device (D2D) Communication which allows User Equipment (UE) to communicate directly with each other, without the need for Base Station or Evolved Node–B (eNB). Thus …

C. G. Balaji, K. Murugan