Skip to main content

Peer-to-Peer Networking and Applications OnlineFirst articles


100+ FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing

In industrial production, personal protective equipment (PPE) protects workers from accidental injuries. However, wearing PPE is not strictly enforced among workers due to all kinds of reasons. To enhance the monitoring of workers and thus avoid …

Xiao Ke, Wenyao Chen, Wenzhong Guo


An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks

Due to the limited energy of sensor nodes in wireless sensor networks (WSNs), it is crucial to design an energy-efficient routing protocol for WSNs. However, most current routing protocols cannot balance the energy consumption of nodes well, which …

Jianhua Huang, Tianqi Li, Zhigang Shi


EICache: A learning-based intelligent caching strategy in mobile edge computing

With the rapid development of 5G mobile networks, data traffic has increased dramatically and is putting tremendous pressure on the backhaul link. In 5G-based mobile edge computing (MEC) environment, efficient caching at the edge of the network …

Bing Tang, Linyao Kang


Application-aware QoS routing in SDNs using machine learning techniques

Software Defined Networking has become an efficient and promising means for overcoming the limitations of traditional networks, e.g., by guaranteeing the corresponding Quality of Service (QoS) of various applications. Compared with the inherent …

Weichang Zheng, Mingcong Yang, Chenxiao Zhang, Yu Zheng, Yunyi Wu, Yongbing Zhang, Jie Li


Privacy-preserving comparison based data aggregation protocols for mobile sensing

Aggregation statistics in mobile sensing are very useful for many applications. Therefore, a large number of privacy-preserving data aggregation protocols have been proposed, most of which however, only consider privacy-preserving sum aggregation.

Weinan Liu


An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system

Telecare medicine information system (TMIS) is developing rapidly and widely used with the support of computer, communication and other advanced technologies. It can ensure the health of residents, improve the shortage of medical resources, and …

Yulei Chen, Jianhua Chen


A privacy-preserving multi-agent updating framework for self-adaptive tree model

The tree-based model is widely applied in classification and regression problems because of its interpretability. Self-adaptive forest models are proposed for adapting to dynamic environments by using active learning and online learning …

Qingyang Li, Bin Guo, Zhu Wang


Reputation management in vehicular network using blockchain

The recent advancements in the Internet of Things (IoT) have engendered an increased penetration of cyber-physical systems such as internet-enabled devices and sensors for surveillance and management applications. This has posed an increased risk …

Jennath H.S, Asharaf S


An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy

In cloud, sensitive data is stored in an encrypted form, and searchable encryption is a technique which allows user to search over encrypted data by keyword and it leaks no useful information. However, the secure searchable encryption scheme which …

Guang Yang, Junling Guo, Lidong Han, Xuejiao Liu, Chengliang Tian


An autonomous intrusion detection system for the RPL protocol

Routing Protocol for Low-Power and Lossy Networks (RPL) is a proactive routing protocol for wireless networks based on distance vectors operating on the platform of IEEE 802.15 (a working group of the Institute of Electrical and Electronics …

Mohammad Shirafkan, Ali Shahidienjad, Mostafa Ghobaei-Arani


A hybrid approach towards reduced checkpointing overhead in cloud-based applications

In recent years, cloud is being widely used to host numerous distributed applications. The expanding usage of cloud has introduced greater sensitivity in the environment. Therefore, most of the applications require that an effective fault tolerant …

Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini

19.10.2021 Open Access

SynergyGrids: blockchain-supported distributed microgrid energy trading

Growing intelligent cities is witnessing an increasing amount of local energy generation through renewable energy resources. Energy trade among the local energy generators (aka prosumers) and consumers can reduce the energy consumption cost and …

Moayad Aloqaily, Ouns Bouachir, Öznur Özkasap, Faizan Safdar Ali


Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles

The Cloud-Enabled Internet of Vehicles (CE-IoV) is a new paradigm that combines cloud computing, vehicular networks and the internet of things (IoT). It provides safety and infotainment applications for road users. It relies on the exchange of …

Leila Benarous, Benamar Kadri


Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing

Resource allocation aims at using the storage, computing and bandwidth between edge servers and end users while satisfying the requirement of different application scenarios. However, there are some security threats in the allocation process, such …

Qiaohong Hu, Hongju Cheng, Xiaoqi Zhang, Chengkuan Lin


O2D: An uncooperative taxi-passenger’s destination predication system via deep neural networks

Predicting passenger’s destination with the partial GPS trajectory is a challenging yet meaningful issue in the taxi industry. Existing destination prediction studies mainly focus on the trajectory data mining algorithms. Moreover, most of them …

Xingchen Wang, Chengwu Liao, Chao Chen, Jie Ma, Huayan Pu


Joint optimization of task caching and computation offloading in vehicular edge computing

The recent surge in the number of connected vehicles and vehicular applications really benefits citizens. Various vehicular applications are developed to cater for the increasingly sophisticated demands of drivers. Against this background …

Chaogang Tang, Huaming Wu


Energy aware MAC protocol with mobility management in wireless body area network

In recent era, the area of monitoring the health of the patients is gaining an interesting research due to its notable properties in the smart health environment. For such application the biomedical sensors are equipped to gather the condition of …

Mrinai Maneetkumar Dhanvijay, Shailaja C. Patil

14.10.2021 Open Access

AToM: Active topology monitoring for the bitcoin peer-to-peer network

Over the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps …

Federico Franzoni, Xavier Salleras, Vanesa Daza


A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks

Vehicular ad-hoc network (VANET) plays a significant role in future intelligent transportation systems. The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Many researchers proposed …

Khaled S. El Gayyar, Ahmed I. Saleh, Labib M. Labib


Deep action: A mobile action recognition framework using edge offloading

Recording users’ lives as short-form videos has been an emerging trend with the advance of mobile devices. The videos contain a wealth of information that requires a significant amount of computation to retrieve. In this paper, we propose Deep …

Deyu Zhang, Heguo Zhang, Sijing Duan, Yunzhen Luo, Fucheng Jia, Feng Liu