Issue 1/2022
Content (51 Articles)
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search
Huarui Wu, Huaji Zhu, Xiao Han
A novel hierarchical fault management framework for wireless sensor networks: HFMF
Elham Moridi, Majid Haghparast, Mehdi Hosseinzadeh, Somayyeh Jafarali Jassbi
Double agents-DQL based D2D computing-offloading for SHVC
Jianlong Liu, Jiaye Wen, Lixia Lin, Wen’an Zhou
Enabling rank-based distribution of microservices among containers for green cloud computing environment
Abdul Saboor, Ahmad Kamil Mahmood, Abdullah Hisam Omar, Mohd Fadzil Hassan, Syed Nasir Mehmood Shah, Ali Ahmadian
Robustness against fraudulent activities of a blockchain-based online review system
Tanakorn Karode, Warodom Werapun
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks
C. Suganthi Evangeline, Vinoth Babu Kumaravelu
The reliable routing for software-defined vehicular networks towards beyond 5G
Yaoguang Lu, Xingwei Wang, Bo Yi, Min Huang
Machine-learning-based cache partition method in cloud environment
Jiefan Qiu, Zonghan Hua, Lei Liu, Mingsheng Cao, Dajiang Chen
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection
Duc V. Nguyen, Giang L. Nguyen, Thang T. Nguyen, Anh H. Ngo, Giang T. Pham
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT
Mohammed B. M. Kamel, Peter Ligeti, Adam Nagy, Christoph Reich
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems
Zheyi Chen, Hongqiang Zheng, Jianshan Zhang, Xianghan Zheng, Chunming Rong
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Vidyotma Thakur, Gaurav Indra, Nitin Gupta, Pushpita Chatterjee, Omar Said, Amr Tolba
Analytical modelling of false blocking problem in wireless ad hoc networks
Wai Kheong Chong, Micheal Drieberg, Varun Jeoti, Rizwan Ahmad
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks
Maryam Ataei Kachooei, Faramarz Hendessi, Behrouz Shahgholi Ghahfarokhi, Mostafa Nozari
Efficient topology control of blockchain peer to peer network based on SDN paradigm
Varun Deshpande, Hakim Badis, Laurent George
Clover: An anonymous transaction relay protocol for the bitcoin P2P network
Federico Franzoni, Vanesa Daza
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols
Guanglai Guo, Yan Zhu, E Chen, Guizhen Zhu, Di Ma, William ChengChung Chu
Deep action: A mobile action recognition framework using edge offloading
Deyu Zhang, Heguo Zhang, Sijing Duan, Yunzhen Luo, Fucheng Jia, Feng Liu
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs
Xuejiao Liu, Chuanhua Wang, Wei Chen, Yingjie Xia, Gaoxiang Zhu
LocTrust: A local and global consensus-combined trust model in MANETs
Shuai Zhou, Ge Zhang, Xianfu Meng
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing
Haina Song, Xinyu Han, Jie Lv, Tao Luo, Jianfeng Li
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks
Khaled S. El Gayyar, Ahmed I. Saleh, Labib M. Labib
AToM: Active topology monitoring for the bitcoin peer-to-peer network
Federico Franzoni, Xavier Salleras, Vanesa Daza
Energy aware MAC protocol with mobility management in wireless body area network
Mrinai Maneetkumar Dhanvijay, Shailaja C. Patil
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing
Qiaohong Hu, Hongju Cheng, Xiaoqi Zhang, Chengkuan Lin
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles
Leila Benarous, Benamar Kadri
A hybrid approach towards reduced checkpointing overhead in cloud-based applications
Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini
An autonomous intrusion detection system for the RPL protocol
Mohammad Shirafkan, Ali Shahidienjad, Mostafa Ghobaei-Arani
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
Guang Yang, Junling Guo, Lidong Han, Xuejiao Liu, Chengliang Tian
Application-aware QoS routing in SDNs using machine learning techniques
Weichang Zheng, Mingcong Yang, Chenxiao Zhang, Yu Zheng, Yunyi Wu, Yongbing Zhang, Jie Li
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks
Jianhua Huang, Tianqi Li, Zhigang Shi
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs
Shaik Shafi, D. Venkata Ratnam
Fuzzy routing for in-network aggregation in wireless sensor networks
Radhakrishnan Maivizhi, Palanichamy Yogesh
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network
Xuefei Peng, Xiaoming Yuan, Kuan Zhang
Big data analytics for critical information classification in online social networks using classifier chains
Douglas H. Silva, Erick G. Maziero, Muhammad Saadi, Renata L. Rosa, Juan C. Silva, Demostenes Z. Rodriguez, Kostromitin K. Igorevich
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
A. O. Bang, Udai Pratap Rao
An optimal load balancing strategy for P2P network using chicken swarm optimization
Dharmendra Kumar, Mayank Pandey
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks
Jie Jia, Yao Xu, Zhenjun Du, Jian Chen, Qinghu Wang, Xingwei Wang
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property
Chuxin Zhuang, Qingyun Dai, Yue Zhang
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network
Xu Zhao, Chaowei Lin, Jianshan Zhang
An intelligent traffic prediction framework for 5G network using SDN and fusion learning
K. Tamil Selvi, R. Thamilselvan
Reducing the number of transaction messages in bitcoin
Vojislav B. Mišić, Jelena Mišić, Xiaolin Chang
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing
Wenbin Chen, Wei Wang, Zuguang Li, Qiang Ye, Qihui Wu
Developing a novel methodology for virtual machine introspection to classify unknown malware functions
Rahul N. Vaza, Ramesh Prajapati, Dushyantsinh Rathod, Dineshkumar Vaghela
Efficient path-sense transmission based on IoT system in opportunistic social networks
Xiaoli Li, Huamei Qi, Jia Wu
Towards intelligent P2P IPTV overlay management through classification of peers
Muhammad Ali, Rizwan Asghar, Ihsan Ullah, Atiq Ahmed, Waheed Noor, Junaid Baber