Skip to main content

Peer-to-Peer Networking and Applications OnlineFirst articles

18-04-2024

An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET systems that exist nowadays have issues regarding user privacy and authentication. In internal …

Authors:
M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, E Mohan, A. Rajesh

18-04-2024

A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements

Vehicular Ad-hoc Networks (VANETs) have received extensive consideration from the industry and the research community because of their expanding emphasis on constructing Intelligent Transportation Systems (ITS) to enhance road safety. ITS is a …

Authors:
Ishita Seth, Kalpna Guleria, Surya Narayan Panda

17-04-2024

Lower rounds lattice-based anonymous AKA under the seCK model for the IoT

The authenticated key agreement (AKA) method used in the Internet of Things (IoT) provides identity authentication and agreed symmetric keys to encrypt large amounts of communication messages for devices and servers. With the rapid development of …

Authors:
Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang

17-04-2024

DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning

The rapid expansion of the mobile Internet has led to online social networks becoming an increasingly integral part of our daily lives, this offers a new perspective in the study of human behavior. Existing methods can not effectively monitor the …

Authors:
Jun Ge, Lei-lei Shi, Lu liu, Zi-xuan Han, Anthony Miller

15-04-2024

Hybrid Multipath Routing Cluster head prediction based on SDN-enabled IoT and Heterogeneous context-aware graph convolution network

Intelligent technology and devices have affected nearly every aspect of human lives. The type of connection and means of communication among such a huge number of devices has led to development of Internet of Things (IoT), broad sector that has …

Authors:
R. Prabha, Senthil G. A, G. P. Bharathi, S. Sridevi

13-04-2024

Deep reinforcement learning-based joint optimization model for vehicular task offloading and resource allocation

With the rapid advancement of Internet of vehicles and autonomous driving technology, there is a growing need for increased computing power in vehicle operations. However, the strict latency requirements of vehicle tasks may pose challenges to …

Authors:
Zhi-Yuan Li, Zeng-Xiang Zhang

12-04-2024

Bsfra: Blockchain based smart forward-reverse agrichain

The agriculture supply chain is an integral part of the whole agriculture sector. A top-notch cost efficient supply chain management system that can protect itself from outside security attacks and also from malicious activities by supply chain …

Authors:
Rishikesh, Ditipriya Sinha

11-04-2024

Energy efficient multi-objective cluster-based routing protocol for WSN using Interval Type-2 Fuzzy Logic modified dingo optimization

In the design of Wireless sensor networks (WSNs), maximizing network lifetime and sustaining energy stability is identified as the challenging problem since it comprises of compact sized and energy limited sensor nodes that cooperates during data …

Authors:
S. Kishore Verma, K. Lokeshwaran, J. Martin Sahayaraj, J. S. Adeline Johnsana

11-04-2024

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain in enhancing the security and …

Authors:
Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu

11-04-2024

ONMCA: One-Network-Multi-Chain Architecture for customizable asset-oriented blockchain systems

The development of modern digital economies requires trusted digital asset management (DAM), for which blockchain technology is increasingly being adopted. However, the current architecture for constructing blockchain-based DAM systems (BDAMSs) is …

Authors:
Liang Wang, Wenying Zhou, Lina Zuo, Haibo Liu, Wenchi Ying

10-04-2024

A supervised privacy preservation transaction system for aviation business

Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict …

Authors:
Xingguang Zhou, Weihan Li, Lin Zhong

04-04-2024

Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing

With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here …

Authors:
J. Sangeethapriya, Michael Arock, U. Srinivasulu Reddy

04-04-2024

Supporting efficient video file streaming in P2P cloud storage

Peer-to-Peer cloud storage has emerged as an alternative to address the high installation and maintenance costs in conventional cloud storage based on client/server architectures. Since P2P cloud storage must guarantee the same level of data …

Authors:
Jinsung Kim, Eunsam Kim

04-04-2024

An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT

Internet of Things (IoT) is the collection of physical objects which consists of integrated technologies to sense, interact and collaborate with other smart objects to collect the data from the deployed environment and send it to the base station.

Authors:
R. Shanmugapriya, Santhosh Kumar SVN

02-04-2024

Efficient hybrid resource allocation for uplink and downlink device-to-device underlay communication in 5G and beyond wireless networks

The device-to-device communication (D2D) concept allows direct communication between nearby devices without a base station. At the same time, cellular resources are reused. It reduces the end-to-end delay of D2D active users significantly. Most of …

Authors:
Malle Gopal, T. Velmurugan

28-03-2024

IGWOA: Improved Grey Wolf optimization algorithm for resource scheduling in cloud-fog environment for delay-sensitive applications

Fog computing, a technology that offers adaptable and scalable computing resources, facing a significant difficulty in task scheduling, affecting system performance and customer satisfaction. Finding solutions to the task scheduling problem is …

Authors:
Gaurav Goel, Rajeev Tiwari

27-03-2024

ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs

In high-speed and dynamic Vehicular Ad-hoc Networks (VANETs), cooperative transmission mechanism is a promising scheme to ensure the sustainable transmission of data. However, due to the possible malicious behavior of vehicles and the dynamic …

Authors:
Xuejiao Liu, Chuanhua Wang, Lingfeng Huang, Yingjie Xia

26-03-2024

Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system

In an evolving defense landscape with persistent security threats, enhancing Wireless Sensor Networks (WSN) for border security and advancing Intrusion Detection Systems (IDS) are vital for national defense and data integrity. In this research, we …

Authors:
Anirban Tarafdar, Azharuddin Sheikh, Pinki Majumder, Abhijit Baidya, Alak Majumder, Bidyut K. Bhattacharyya, Uttam Kumar Bera

23-03-2024

Node selection for model quality optimization in hierarchical federated learning based on deep reinforcement learning

In Hierarchical Federated Learning (HFL), data sample sizes and distribution of different clients vary greatly. Due to the heterogeneity of the data, it is crucial to select appropriate clients to participate in model training while ensuring the …

Authors:
Zhuo Li, Yashi Dang, Xin Chen

22-03-2024

Deep learning-based power usage effectiveness optimization for IoT-enabled data center

The proliferation of data centers is driving increased energy consumption, leading to environmentally unacceptable carbon emissions. As the use of Internet-of-Things (IoT) techniques for extensive data collection in data centers continues to grow …

Authors:
Yu Sun, Yanyi Wang, Gaoxiang Jiang, Bo Cheng, Haibo Zhou