No Access
Article
Dynamic intelligent resource allocation for emergency situations
When facing some emergency situations, such as fires, traffic accidents, etc., it is necessary for the network to use the available information to provide the best and fastest access routes. In these cases, it...
Chang Zhi-xian in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Design and implementation of blockchain-based digital advertising media promotion system
In recent years, the rapid development of the Internet digital advertising (IDA) market has brought many issues. Low-quality advertisements (ADs) have caused significant troubles for Internet users, and the “A...
Yong Ding, Decun Luo, Hengkui Xiang, Wenyao Liu… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
An optimistic technique to detect Cache based Side Channel attacks in Cloud
Data security is the most critical field in Cloud Computing. The Critical data can leak through unpredictable side channels, posing very risky threats to information security. The Cache-based Side Channel Atta...
G. Sangeetha, G. Sumathi in Peer-to-Peer Networking and Applications (2020)
No Access
Article
PriPresent: an embedded prime LightWeight block cipher for smart devices
Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet of Things (IoT) is a cutting edge technology which is developed for resource constrained devices for communicating and ...
M. Girija, P. Manickam, M. Ramaswami in Peer-to-Peer Networking and Applications (2020)
No Access
Article
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing
Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we p...
Feng Zeng, Yaojia Chen, Lan Yao, Jinsong Wu in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Penetration testing framework for smart contract Blockchain
Smart contracts powered by blockchain ensure transaction processes are effective, secure and efficient as compared to conventional contacts. Smart contracts facilitate trustless process, time efficiency, cost ...
Akashdeep Bhardwaj, Syed Bilal Hussian Shah… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
An efficient distributed algorithm for target-coverage preservation in wireless sensor networks
Maximizing the full coverage lifetime over a predefined set of target points (TPs) is one of the most fundamental functions in wireless sensor networks. However, coverage performance is challenging to maintain...
Tri Gia Nguyen, Trung V. Phan, Hai Hoang Nguyen… in Peer-to-Peer Networking and Applications (2020)
Article
Editorial: Emerging Trends on Data Analytics at the Network Edge
Deyu Zhang, Mianxiong Dong, Geyong Min in Peer-to-Peer Networking and Applications (2020)
Download PDF (121 KB) View Article
No Access
Article
AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network
Peer-assisted networks have recently emerged as an excellent tool for distributing video contents across the Internet. High peers’ participation and cooperation in peer-assisted networks can drastically reduce...
Oluwafolake E. Ojo, Cyril O. Iyadi… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Integration of ZigBee based GPS receiver to CAN network for precision farming applications
Precision farming applications are often data centric and aim collecting data from a set of sensor modules to be delivered to the central computer. For this aim, the ISO 11783 protocol which uses the Controlle...
İlker Ünal in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing
With the growing prence of Internet of Things (IoT) devices and technology, a burgeoning computing paradigm namely mobile edge computing (MEC) is delicately proposed and designed to accommodate the applica...
Jiwei Huang, Songyuan Li, Ying Chen in Peer-to-Peer Networking and Applications (2020)
No Access
Article
An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET
Vehicular ad-hoc network (VANET) is capable of offering a diverse set of services, and thus gains lot of attention from both academic and industrial communities. In VANET, the communicating links are prone to ...
Ankita Srivastava, Arun Prakash… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Hybrid conditional privacy-preserving authentication scheme for VANETs
In existing authentication schemes for vehicular ad hoc networks (VANETs), the public key infrastructure (PKI)-based pseudonym certificate, identity-based encryption and group signature technology are usually ...
Shibin Wang, Kele Mao, Furui Zhan, Dong Liu in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles
The advancement of hardware and software technology makes multiple cooperative unmanned surface vehicles (USVs) utilized in maritime escorting with low cost and high efficiency. USVs can work as edge computing...
Jiajia Xie, Jun Luo, Yan Peng, Shaorong Xie… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs
An efficient energy-aware clustering method helps in reducing the battery depletion of the different resources in WSNs. The selection of suitable sensors for cluster head can be an effective way to increase th...
Samayveer Singh in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Structuring communities for sharing human digital memories in a social P2P network
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities a...
Haseeb Ur Rahman, Madjid Merabti… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Power control of D2D communication based on quality of service assurance under imperfect channel information
In cellular networks, proximity users establish device-to-device(D2D) links directly under the control of base stations (BSs) for data exchange, and no base station forwarding is required. For the advantages s...
Zhixin Liu, Xiaopin Li, Yazhou Yuan… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
Smart Grid technology with the help of Information Technology (IT) adds many benefits to the traditional grids, but security concerns and especially privacy preserving of users is still a major practical issue...
Mahdi Tahavori, Farokhlagha Moazami in Peer-to-Peer Networking and Applications (2020)
No Access
Article
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach
A blockchain is resistant to modification based on the consensus of the network majority, which requires a large amount of communication among distributed nodes. Existing data dissemination protocol solves the...
Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin… in Peer-to-Peer Networking and Applications (2020)
No Access
Article
A lightweight three-factor authentication protocol for digital rights management system
Recent advances in communication technology and low-power devices have led digital-content services to be provided in various resource limited environments such as smart home, Internet of Things, and the Vehic...
SungJin Yu, KiSung Park, YoHan Park… in Peer-to-Peer Networking and Applications (2020)