
显示样式: 排序: IF: - GO 导出
-
Blind signcryption scheme based on hyper elliptic curves cryptosystem Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Shamsher Ullah, Nizamud Din
In modern cryptography, the Discrete Logarithm Problem (DLP) plays a vital role, but a classical computer cannot efficiently solve it. Nowadays, the Hyper Elliptic Curve Discrete Logarithm Problem (HECDLP) of Genus two (G2) widely used in industry and also a research field of hot interest. This paper presents a novel blind signcryption scheme based on Hyper Elliptic Curves having properties of confidentiality
-
A uniformization-based approach to preserve individuals’ privacy during process mining analyses Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Edgar Batista, Agusti Solanas
Process Mining is a set of techniques that aim at discovering, monitoring and improving real processes by using logs of events created and stored by corporate information systems. The growing use of information and communication technologies and the imminent wide deployment of the Internet of Things enable the massive collection of events, which are going to be studied so as to improve all kinds of
-
Cross-domain trust management mechanism for internet of things systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Xu Wu
A large of smart nodes is connected in Internet of Things (IoT). These nodes in IoT often are resource-constrained nodes, so they have a greater need to collaborate with other nodes for performing advanced service and applications. When there are many providers who can provide similar collaboration service, a collaboration requestor (CR) node will have to make the decision of the “best” collaboration
-
Improved differentiable neural architecture search for single image super-resolution Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-14 Yu Weng, Zehua Chen, Tianbao Zhou
Deep learning has shown prominent superiority over other machine learning algorithms in Single Image Super-Resolution (SISR). In order to reduce the efforts and resources cost on manually designing deep architecture, we use differentiable neural architecture search (DARTS) on SISR. Since neural architecture search was originally used for classification tasks, our experiments show that direct usage
-
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-13 Junyan Guo, Ye Du
Nowadays, space information networks (SIN) has been widely used in navigation, observation and military activities due to its advantages of wide coverage, convenient communication and the ability to provide users with multiple services. However, because of the openness of the spatial channel, there are security threats such as information eavesdropping, interception and forgery. So far, many scholars
-
Trust estimation in peer-to-peer network using BLUE Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-11 Ruchir Gupta, Yatindra Nath Singh, Antriksh Goswami
Free-riding is a major problem in peer to peer networks. One of the ways to resolve this problem is by using a reputation management system. Each node provides resources to nodes with higher reputation, as he himself gains in reputation in proportion to the receiver’s reputation. So, free-riding becomes a non-optimal strategy as there is no resulting reputation gain, and hence no available resources
-
A novel spread estimation based abnormal flow detection in high-speed networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-11 Xiaofei Bu, Yu-E Sun, Yang Du, Xiaocan Wu, Boyu Zhang, He Huang
Detecting the flows with abnormally large spreads over big network data can help us identify network attacks, such as DDoS attacks and scanners. Most per-flow measurement studies use compact data structures to reduce their memory requirements, fitting in the limited on-chip memory and catching up with the line rate. In this paper, we study a novel problem called spread estimation among multi-periods
-
A reliable tree-based data aggregation method in wireless sensor networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-08 Elham Hasheminejad, Hamid Barati
Aggregating the sensed data by nodes is a natural way to increase the network lifetime and reduce the number of bits sent and received by each sensor node. This paper presents a reliable tree-based data aggregation method. In the proposed method, sensor nodes are organized in the form of a binary tree. Then, aggregation requests are authenticated by a shared key, and if the request is acknowledged
-
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-08 Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding
For the privacy-preserving computation of multi-source large scale data sets, the secure multi-party computation protocol with high-throughput is of the utmost importance. However, the existing high-throughput secure multi-party protocols only involve the fixed 3-party or 4-party setting, limiting its practicality. To achieve a high-throughput n-party (n ≥ 3) secure protocol, low communication and
-
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-08 Vrajesh Kumar Chawra, Govind P. Gupta
Recent advancement in wireless charging technologies has enabled us to design and development of Wireless Rechargeable Sensor Networks (WRSNs) for sensing and data gathering tasks for a very long duration. The fundamental research challenge in WRSN is to design efficient path scheduling for Mobile Wireless Charging Vehicles (MWCVs) such that it maximizes utility of energy resource of MWCVs and minimizes
-
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-08 Mingfu Xue, Can He, Jian Wang, Weiqiang Liu
Deep neural network (DNN) based face recognition system has become one of the most popular modalities for user identity authentication. However, some recent studies have indicated that, the malicious attackers can inject specific backdoors into the DNN model of a face recognition system, which is known as backdoor attack. As a result, the attacker can trigger the backdoors and impersonate someone else
-
A location privacy protection scheme for convoy driving in autonomous driving era Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-07 Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin
Convoy driving has great potential in the development of autonomous driving industry, which can bring great improvement to the utilization rate of roads and the travel experience of passengers. However, the emergence of convoy driving also brings some new challenges to the location privacy of autonomous vehicles. In this paper, a novel dynamic mixed zone establishment scheme is proposed to protect
-
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-07 Bin Wu, Caifen Wang, Hailong Yao
Network coding is an effective method to optimize network throughput and improve routing reliability, and has been widely used in a decentralized Internet of Things system. However, the packet-mixing property of network coding renders transmission susceptible to pollution attacks, which may prevent the reconstruction of the original file. A homomorphic signature scheme is a powerful tool that enables
-
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-07 Bang Tran, Xiaohui Liang
Voice assistant system (VAS) is a popular technology for users to interact with the Internet and the Internet-of-Things devices. In the VAS, voice queries are linked to users’ accounts, resulting in long-term and continuous profiling at the service provider. In this paper, we propose a VAS anonymizer aiming to mix the queries of the VAS users to increase the source anonymity. The VAS anonymizer is
-
Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-06 Kun Tang, Shaowei Liao, Jian Dong, Ronghua Shi
In this paper, we consider a two-way cognitive radio network where an energy-constrained secondary transmitter (ST) first performs energy accumulation and then assists bidirectional communication for a pair of primary users (PUs) based on the principle of two-way relaying (TWR) strategy. To be specific, the ST can harvest energy from the received radio frequency (RF) signals broadcasting by both the
-
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-06 Irin Loretta G, V. Kavitha
Wireless Sensor Networks (WSN) are naturally resource-constrained and have been deployed in various applications such as home monitoring, health care monitoring and military systems. These applications are connected to numerous devices capable of interacting with each other over the internet called as Internet of Things (IoT). WSN application plays a main part in the IoT environment. In WSN, sensors
-
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-05 Vishal Kumar Arora, Vishal Sharma
Wireless Sensor Network has been recognized as an attractive candidate among the telecommunication, meteorology, and sensor industries for the last few years owing to its wide range of applications, including environmental- and industrial-monitoring. In this paper, the authors propose an Energy Balanced Multi-hop Routing Scheme (EBMRS) at both the inter- and intra-clustering level to discover the optimal
-
Three-stage Stackelberg game based edge computing resource management for mobile blockchain Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-05 Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan
Blockchain can provide a dependable environment for mobile applications. Mining, as an important component in blockchain, requires a lot of computing resources, and hence resource limited moblie devices are unable to perform the mining. Offloading mining computation tasks to an edge computing service provider (ESP) or a cloud computing service provider (CSP) is considered as a feasible solution to
-
AENEA: A novel autoencoder-based network embedding algorithm Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-04 Xiaolong Xu, Haoyan Xu, Yang Wang, Jing Zhang
Network embedding aims to represent vertices in the network with low-dimensional dense real number vectors, so that the attained vertices can acquire the ability of representation and inference in vector space. With the expansion of the scale of complex networks, how to make the high-dimensional network represented in low-dimensional vector space through network becomes an important issue. The typical
-
Light forwarding based optimal CCN content delivery: a case study in metropolitan area network Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-04 Songzhu Zhang, Xingwei Wang, Jianhui Lv, Min Huang
Content Centric Networking (CCN) has been introduced in recent years to effectively deliver the named content objects rather than relying on the traditional host-to-host communication model, in which a significant and non-negligible characteristic of CCN is in-network caching. In this paper, we stand on the shoulders of in-network caching to propose the light forwarding based approach in order to optimize
-
Cancelable Iris template for secure authentication based on random projection and double random phase encoding Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-03 Vani Rajasekar, J. Premalatha, K. Sathya
Biometric recognition approaches have overwhelmed major issues in traditional authentication systems. Privacy invasion and security are the needed features in the effective development of biometric recognition systems. Recently some biometric techniques have been suffered to hacking trails also. Hence there is a despairing need to propose a novel cancelable iris recognition scheme. The prime objective
-
A consensus-based cooperative Spectrum sensing technique for CR-VANET Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-03 Sahar Zargarzadeh, Neda Moghim, Behrouz Shahgholi Ghahfarokhi
Internet of Things (IoT) is expected to empower all aspects of the Intelligent Transportation System (ITS), the main goal of which is to improve transportation safety. However, due to high demands by the increasing number of associated vehicles, the allocated bandwidth of ITS is inadequate. Cognitive Radio (CR) technology can be used as a solution for this high demand level. In CR, the pre-allocated
-
Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-03 Guisong Yang, Yanglin Zhang, Buye Wang, Xingyu He, Jiangtao Wang, Ming Liu
Mobile Crowd Sensing (MCS) is an emerging sensing paradigm which employs mobile devices, carried by participants, to sense real-time information. Most previous studies on task allocation in practical applications lack a way of calculating real participant density and making a detailed analysis of it. In this work, first, a fuzzy logic control method is employed to obtain the participant density in
-
An improved steganography without embedding based on attention GAN Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-03 Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-qiu Zhao
Steganography is an art to hide information in the carriers to prevent from being detected, while steganalysis is the opposite art to detect the presence of the hidden information. With the development of deep learning, several state-of-the-art steganography and steganalysis based on deep learning techniques have been proposed to improve hiding or detection capabilities. Generative Adversarial Networks
-
Influencing factors analysis in pear disease recognition using deep learning Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-12-11 Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li
Influencing factors analysis plays an important role in plant disease identification. This paper explores the key influencing factors and severity recognition of pear diseases using deep learning based on our established pear disease database (PDD2018), which contains 4944 pieces of diseased leaves. Using the deep learning neural networks, including VGG16, Inception V3, ResNet50 and ResNet101, we developed
-
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-26 Elahe Khatibi, Mohsen Sharifi
The concept of unstructured Peer-to-Peer (P2P) systems—setting free from any structural constraints—has put forward an appropriate paradigm for sharing a wide assortment of resources in a distributed-sharing manner efficiently. More importantly, unstructured P2P systems’ architecture and concepts have permeated diverse spheres of today’s successful and world-famous computer science areas, including
-
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-25 Lein Harn, Zhe Xia, Chingfang Hsu
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among a heterogeneous community of participants. Secure Multi-Party Computation (SMPC) finds ways for parties to jointly compute a function using their inputs, while keeping these inputs private. In this paper, we propose a secure three-party computation which takes three inputs and outputs their sum and product without
-
Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-24 Malini Balachandran, Noor Mohammed Vali Mohamad
A Correction to this paper has been published: https://doi.org/10.1007/s12083-020-01040-y
-
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-21 Mohammad Mamun, Atsuko Miyaji, Rongxing Luv, Chunhua Su
The rapid proliferation of Radio Frequency Identification (RFID) tags in the past decade has made tremendous impact on our daily lives. As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare. Several lightweight authentication solutions have been proposed
-
Correction to: LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-19 Vinod Kumar, Rajendra Kumar, S. K. Pandey
The original version of this article unfortunately contained mistakes.
-
Secure and efficient mutual authentication protocol for smart grid under blockchain Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-14 Weizheng Wang, Huakun Huang, Lejun Zhang, Chunhua Su
Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication channel, suppliers and users can dynamically adjust power transmission in real time. Nonetheless, many security issues occur with the widespread deployment of smart grid, e.g., centralized register authority and potential Distributed-Denial-of-Service
-
Revisiting the coupon collector’s problem to unveil users’ online sessions in networked systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-13 Weverton Cordeiro, Luciano Gaspary, Rafael Beltran, Kayuã Paim, Rodrigo Mansilha
Accuratecomprehension of users’ behavior is paramount for understanding the dynamics of several systems, such as e-commerce platforms, social networks, and mobile computing. To this end, several strategies have been proposed to obtain data sets based on the capture of usage information, which can then serve for user analytics. A popular strategy consists of taking periodic snapshots of online users
-
A digital rights management system based on a scalable blockchain Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-12 Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen
Even though the Internet promotes data sharing and transparency, however it does not protect digital content. In today’s digital world, it has become a difficult task to release a DRM (Digital Rights Management) system that can be considered well-protected. Digital content that becomes easily available in open-source environments will in time be worthless to the creator. There may only be a one-time
-
A secure vehicle theft detection framework using Blockchain and smart contract Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-06 Debashis Das, Sourav Banerjee, Utpal Biswas
Nowadays, vehicle theft has been increased drastically all over the world. The prevention of vehicle theft is essential to enhance vehicle security. A large number of vehicles have been stolen for the lack of essential foundation and administration of a secure platform. Several existing systems were developed to protect the vehicle from unauthorized access. But, they suffer from various limitations
-
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-05 Zuyan Wang, Jun Tao, Yang Gao, Yifan Xu, Weice Sun, Xiaoyan Li
With the increasing popularity of the IoTs (Internet of Things), the efficient data collection with Unmanned Aerial Vehicles (UAVs) is demanded by numerous applications. The technical challenge, which restricts the deployment of the UAVs, is the high latency of the data collection. In this paper, we focus on the problem of trajectory planning, specifically, determination of how the UAVs traverse through
-
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-11-03 Qianjun Wei, Qiang Li, Zhipeng Zhou, ZhengQiang Ge, Yonggang Zhang
The full application of machine learning has caused plenty of problems with privacy-preserving. Especially in multi-party machine learning, private data is often exposed in the aggregation,transmission, and communication phase, which leads to the problem of private data leakage. Existing works use secure multi-party computing (SMPC) or secret-sharing technology to ensure the privacy-preserving of multi-party
-
An efficient secure data compression technique based on chaos and adaptive Huffman coding Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-19 Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal
Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression techniques lack proper security measures, e.g., secret key control, leaving the data susceptible to attack. Data encryption is therefore needed to achieve data security in keeping
-
A reliable peer-to-peer streaming protocol in low-capacity networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-14 Oluwafolake E. Ojo, Ayodeji O. Oluwatope, Suraju O. Ajadi
The recent global demand for video streaming applications has paved the way for peer-to-peer streaming system (P2PSS). Strategic scheduling scheme and dynamic overlay topology are essential to maintain quality of service (QoS) and quality of experience (QoE) in P2PSS. The concept of P2PSS was tailored towards relying on active peers’ bandwidth to achieve cheap and scalable means of distribution over
-
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-09 Amir Nader Shahbaz, Hamid Barati, Ali Barati
Routing is one of the major challenges in wireless sensor networks (WSNs). Unbalanced energy consumption in the routing process of data packets is one of the main issues in WSNs. The issue needs consideration, because the energy level of sensor nodes is limited. Multipath routing methods reduce energy consumption, improve scalability and provide load balancing in WSNs. In this study, we suggested a
-
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-07 Qian Wang, Zhipeng Gao, Zifan Li, Xiaojiang Du, Mohsen Guizani
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact duration) the offloading method could not ensure the data to be successfully offloaded to Wi-Fi Access Points (APs) within a time constraint. In this paper, we focus on maximizing the
-
Deep learning based modulation classification for 5G and beyond wireless systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-06 J. Christopher Clement, N. Indira, P. Vijayakumar, R. Nandakumar
The 5G and beyond wireless networks will be more dynamic and heterogeneous, which needs to work on multistrand waveforms. One of the most significant challenges in such a dynamic network, especially non cooperated cases, is the identification of particular modulation type, which the transmitter uses at the given time to decode the data successfully. This research proposes a modulation classification
-
Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-06 Malini Balachandran, Noor Mohammed Vali Mohamad
Fifth generation (5G) mobile communication networks have the ability to deal with the growing need for increased data rates, decreased network latencies, low power consumption, seamless coverage, and massive connectivity while sustaining the high Quality of Service (QoS) at the subscriber’s end. The key drivers of beyond 5G (B5G) are anticipated to be the convergence of all the features of 5G and B5G
-
Efficient distributed privacy-preserving collaborative outlier detection Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-05 Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma
As a common way to identify anomalous data, outlier detection is widely applicable for intrusions detection, adverse reactions analysis, financial fraud prevention, etc. The accuracy of outlier detection depends crucially on the number of data involved in the test, i.e., the more data participate in detection, the higher accuracy we get. For this reason, cross-dataset collaborative outlier detection
-
Group task allocation approach for heterogeneous software crowdsourcing tasks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-03 Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu, Lizhen Cui
It is more common for multiple users to collaborate to develop a software application in a P2P collaborative working environment. In collaborative software development, the rational allocation of software development tasks is of great significance. However, heterogeneous of software development tasks, such as the value of the task, the skill required, the effort required and difficulty, increase the
-
SAES: A self-checking authentication scheme with higher efficiency and security for VANET Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-10-01 Haobin Jiang, Lei Hua, Lukuman Wahab
Vehicular Ad Hoc Network (VANET), a wireless network for V2X communication, provides a new opportunity to create a safer, comfortable and efficient traffic environment. However, the large scale and open environment of VANET brings many problems and challenges to information security, especially the vehicular authentication problem. Many existing authentication schemes always used complex cryptographic
-
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-30 Yanwu Ding, Yazan Ibdah
Recent radio channel measurements in peer-to-peer (P2P) and mobile-to-mobile network indicate that, depending on the mobility of the terminals and scattering properties of the environment, the predominate fading mechanism contains a combination of Rayleigh and double Rayleigh fading with or without line-of-sight (LoS) component. In this paper, we present the statistical and deterministic models by
-
Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-30 Zhun Tian, Shengrui Zhang
As the usage rate of cars is getting higher and higher, the injuries and losses caused by traffic accidents are also getting bigger and bigger. If some traffic accidents can be predicted, then such losses can be greatly solved. Although there are abundant research results on intelligent transportation, there are not many research results on how to predict traffic accidents. For this issue, the main
-
Charging path optimization for wireless rechargeable sensor network Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-28 Qian Wang, Zhihua Cui, Lifang Wang
In wireless rechargeable sensor networks(WRSNs), charging path planning becomes more and more important. In this paper, a charging path planning model based on high-dimensional multi-objective optimization is proposed, which takes life cycle, distance, energy consumption and charging time into consideration. At the same time, an improved algorithm is proposed to improve the crossover mode and diversity
-
The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-26 Xu Ding, Jing Wang, Chong Zhao, Peng Zhang, Yucheng Wu, Honghao Gao
Interference management has always been a research hotspot in the field of wireless communications. Currently, researches based on interference management mostly focus on an interference management technology, and few studies have combined multiple interference management technologies. This paper proposes an interference management technology that combines Interference Alignment (IA) and Successive
-
Intelligent physical systems for strategic planning and management of enterprise information Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-19 Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha
Recently developed advanced metering infrastructure in an intelligent physical system (IPS) sorts large quantities of data available in design, whereas the potential electricity system is implemented for profits and aid in the client’s transition from inactive to an active role. This paper investigates the usage of Deep Reinforcement Learning (DRL), in Intelligent Physical System for Strategic Planning
-
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-17 Sahil Khatri, Hrishikesh Vachhani, Shalin Shah, Jitendra Bhatia, Manish Chaturvedi, Sudeep Tanwar, Neeraj Kumar
Low latency in communication among the vehicles and RSUs, smooth traffic flow, and road safety are the major concerns of the Intelligent Transportation Systems. Vehicular Ad hoc Network (VANET) has gained attention from various research communities for such a matters. These systems need constant monitoring for proper functioning, opening the doors to apply Machine Learning algorithms on enormous data
-
Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-15 Binbin Jiang
Biological signal measurement system based on wireless sensor network is a combination of traditional medical monitor and modern communication technology. It is of great significance for clinical application and the development of medical instruments, especially in family medical treatment. The application of intelligent bionic algorithm in wireless sensor network node location has become a hot topic
-
Dynamic intelligent resource allocation for emergency situations Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-11 Chang Zhi-xian
When facing some emergency situations, such as fires, traffic accidents, etc., it is necessary for the network to use the available information to provide the best and fastest access routes. In these cases, it is important to centrally manage all devices throughout the network, so a software-defined network (SDN) -based architecture is used to manage and control emergency service actions and evacuation
-
Design and implementation of blockchain-based digital advertising media promotion system Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-10 Yong Ding, Decun Luo, Hengkui Xiang, Wenyao Liu, Yujue Wang
In recent years, the rapid development of the Internet digital advertising (IDA) market has brought many issues. Low-quality advertisements (ADs) have caused significant troubles for Internet users, and the “AD fraud” has plunged the IDA ecosystem into a crisis of trust. The blockchain’s trusted computing model provides new ideas for solving the above problems. In this paper, we designed and implemented
-
An optimistic technique to detect Cache based Side Channel attacks in Cloud Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-07 G. Sangeetha, G. Sumathi
Data security is the most critical field in Cloud Computing. The Critical data can leak through unpredictable side channels, posing very risky threats to information security. The Cache-based Side Channel Attacks (CSCAs) is one of the most challenging attacks. Different secure cache architectures have been proposed to defend against these attacks. But these solutions are not reliable to detect and
-
PriPresent: an embedded prime LightWeight block cipher for smart devices Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-07 M. Girija, P. Manickam, M. Ramaswami
Lightweight cryptography (LWC) is a compact and advancing cryptography protocol. Internet of Things (IoT) is a cutting edge technology which is developed for resource constrained devices for communicating and sharing of information among fellow devices over internet. IoT smart objects are smallest tiny devices and it has limited processing and storage capacities and that often runs on small, low power
-
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-06 Feng Zeng, Yaojia Chen, Lan Yao, Jinsong Wu
Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we propose a new vehicle edge computing framework based on software defined networks, which introduces the reputation to measure the contribution of each vehicle as the basis for providing different
-
Penetration testing framework for smart contract Blockchain Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-05 Akashdeep Bhardwaj, Syed Bilal Hussian Shah, Achyut Shankar, Mamoun Alazab, Manoj Kumar, Thippa Reddy Gadekallu
Smart contracts powered by blockchain ensure transaction processes are effective, secure and efficient as compared to conventional contacts. Smart contracts facilitate trustless process, time efficiency, cost effectiveness and transparency without any intervention by third party intermediaries like lawyers. While blockchain can counter traditional cybersecurity attacks on smart contract applications
-
An efficient distributed algorithm for target-coverage preservation in wireless sensor networks Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-09-02 Tri Gia Nguyen, Trung V. Phan, Hai Hoang Nguyen, Phet Aimtongkham, Chakchai So-In
Maximizing the full coverage lifetime over a predefined set of target points (TPs) is one of the most fundamental functions in wireless sensor networks. However, coverage performance is challenging to maintain due to the energy consumption of self-contained sensor nodes (SNs). Therefore, in this paper, we propose an energy-efficient distributed algorithm for target-coverage preservation (DATCP) that
-
High utility itemset mining using path encoding and constrained subset generation Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2020-08-22 Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari
In this paper a two phase approach for high utility itemset mining has been proposed. In the first phase potential high utility itemsets are generated using potential high utility maximal supersets. The transaction weighted utility measure is used in ascertaining the potential high utility itemsets. The maximal supersets are obtained from high utility paths ending in the items in the transaction database