Skip to main content

Peer-to-Peer Networking and Applications OnlineFirst articles

27-03-2024

ARSL-V: A risk-aware relay selection scheme using reinforcement learning in VANETs

In high-speed and dynamic Vehicular Ad-hoc Networks (VANETs), cooperative transmission mechanism is a promising scheme to ensure the sustainable transmission of data. However, due to the possible malicious behavior of vehicles and the dynamic …

Authors:
Xuejiao Liu, Chuanhua Wang, Lingfeng Huang, Yingjie Xia

26-03-2024

Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system

In an evolving defense landscape with persistent security threats, enhancing Wireless Sensor Networks (WSN) for border security and advancing Intrusion Detection Systems (IDS) are vital for national defense and data integrity. In this research, we …

Authors:
Anirban Tarafdar, Azharuddin Sheikh, Pinki Majumder, Abhijit Baidya, Alak Majumder, Bidyut K. Bhattacharyya, Uttam Kumar Bera

23-03-2024

Node selection for model quality optimization in hierarchical federated learning based on deep reinforcement learning

In Hierarchical Federated Learning (HFL), data sample sizes and distribution of different clients vary greatly. Due to the heterogeneity of the data, it is crucial to select appropriate clients to participate in model training while ensuring the …

Authors:
Zhuo Li, Yashi Dang, Xin Chen

22-03-2024

Deep learning-based power usage effectiveness optimization for IoT-enabled data center

The proliferation of data centers is driving increased energy consumption, leading to environmentally unacceptable carbon emissions. As the use of Internet-of-Things (IoT) techniques for extensive data collection in data centers continues to grow …

Authors:
Yu Sun, Yanyi Wang, Gaoxiang Jiang, Bo Cheng, Haibo Zhou

21-03-2024

Enterprise Composite Blockchain Double Layer Consensus Algorithm Based on Improved DPoS and BFT

The consensus mechanism serves as the fundamental technology behind blockchain, enabling the establishment of a decentralized and reliable network system that achieves consensus among nodes without relying on the trustworthiness of individual …

Authors:
Su Li, Haolin Zhang, Ze Chen, Junlu Wang, Baoyan Song

13-03-2024

A UAV aided lightweight target information collection and detection approach

With the resumption of the World Cup and various concerts, the number of heavily crowded scenarios grows intensely. In these cases, it poses new challenges to massive information collection and lightweight target detection. Fortunately, the …

Authors:
Meng Huang, Hanming Li, Yina Zhou, Ting Ma, Jinshan Su, Haibo Zhou

11-03-2024

Sybil attack detection in ultra-dense VANETs using verifiable delay functions

Vehicular Ad Hoc Networks (VANETs) play a critical role in the future development of Intelligent Transportation Systems (ITS). These networks facilitate communication between vehicles and roadside infrastructure, establishing a dynamic network …

Authors:
Yuvaraj Rajendra, Venkatesan Subramanian, Sandeep Kumar Shukla

11-03-2024

Consortium blockchain-based secure cross-operator V2V video content distribution

Vehicle-to-vehicle (V2V) video content sharing is promising for connected and autonomous vehicles. However, various security, trust, and privacy risks, coupled with conflicts of interest among different operators, hinder the large-scale promotion …

Authors:
Hang Shen, Beining Zhang, Tianjing Wang, Xin Liu, Guangwei Bai

08-03-2024

A blockchain based lightweight and secure access control framework for IoT-enabled supply chain

To ensure safe exchange of data in IoT-enabled-supply-chain network and safeguard other security issues, IoT devices should have an access control system that can regulate resource access in a permissioned manner. Traditional access control …

Authors:
Rashmi Raj, Mohona Ghosh

08-03-2024

Cluster based hybrid optimization and kronecker gradient factored approximate optimum path curvature network for energy efficiency routing in WSN

Sensors are placed in a specified area in Wireless Sensor Networks (WSNs) which sense the physical parameter of an environment. Upon sensing, information is analysed and transferred through a predetermined route to the base station. Certainly …

Authors:
S. Syed Jamaesha, R. Sarath Kumar, M. S. Gowtham

06-03-2024

A personalized and efficient EMR sharing and management scheme based on smart contracts

Sharing electronic medical record (EMR) is essential to dig out the value of medical data. Current data-sharing schemes usually rely on trusted third-party institutions. Patients lack control and tracking capabilities for sensitive individual …

Authors:
Xiaohui Yang, Kun Zhang, Kai Jia, Peiyin Zhao

05-03-2024

Efficient energy consumption and fault tolerant method for clustering and reliable routing in wireless sensor network

A very important in Wireless Sensor Network (WSN) field are energy efficiency and network lifetime. Organizing nodes into clusters, choosing best cluster head, analyzing routing paths, preserving the clusters are the issues that significantly …

Authors:
Shreedhar Yadawad, S. M. Joshi

05-03-2024

Intelligent energy efficient routing in wireless body area network with mobile sink nodes using horse electric fish optimization

Wireless Body Area Network (WBAN) is the integration of the biosensors that are positioned in-vitro and in-vivo of the patient’s body. The internet connection is made with wearable sensors for the purpose of Personal Digital Assistance (PDA) which …

Authors:
R. Anirudh Reddy, N. Venkatram

04-03-2024

A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs

The Internet of Things (IoT) is a revolutionary technological trend that is reshaping the way people interact with the digital world, creating limitless possibilities for future life and work. With the exponential increase in the number of …

Authors:
Yao Li, Xingshu Chen, Wenyi Tang, Bingyu Chen

02-03-2024

A blockchain-based platform for decentralized trusted computing

Security and availability are crucial for users who outsource computational tasks to remote servers. However, computation services provided by cloud platforms suffer outage risks, potential enforced censorship, and network latency problems due to …

Authors:
Yihuai Liang, Yan Li, Byeong-Seok Shin

28-02-2024

Trust-based clustering and routing in WSNs using DST-WOA

Wireless sensor networks (WSNs) are increasingly being used in a variety of applications, such as smart healthcare systems and the Internet of Things (IoT). Trust in WSNs is the confidence in secure, efficient collaboration among nodes, crucial …

Authors:
Shashank Singh, Veena Anand, Sonal Yadav

23-02-2024

A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks

Traffic data generated by the vehicles are often transported in a wide open wireless communication channel which poses several security and privacy vulnerabilities. In case of any malicious or illicit behavior exhibited by the vehicles, it is …

Authors:
Y. Rajkumar, S. V. N. Santhosh Kumar

23-02-2024

Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features

The “Internet of Things (IoT)” technology has been utilized in various industries in the past few years. As the IoT technology has diverse and small devices connected to it, IoT gadgets are vulnerable to several attacks. These networks are …

Authors:
N. Sakthipriya, V. Govindasamy, V. Akila

22-02-2024

Voice over WiFi cell capacity enhancement using A-MPDU frame aggregation in WLAN standard

The rising popularity of Voice over WiFi (VoWiFi) needs a dedicated effort to find new solutions to expand VoWiFi cell capacity. The main aim of this research is to enhance the VoWiFi cell capacity using aggregate MAC protocol data unit (A-MPDU) …

Authors:
Ayes Chinmay, Hemanta Kumar Pati

22-02-2024

Centralized and distributed approaches of Artificial Bee Colony algorithm and Delaunay Triangulation for the coverage in IoT networks

A wireless data collection network (DCN) is the key constituent of the IoT. It is used in many applications such as transport, logistics, security and monitoring. Despite the continuous development of DCN, communication between nodes in such …

Authors:
Wajih Abdallah, Sami Mnasri, Thierry Val