Welcome to the special issue of Peer-to-Peer Networking and Applications. This issue contains a collection of the best papers out of various authors who have been submitted to this special issue. Most multimedia-based content service environments are embedded in a large-capacity server and adopt the client–server model. In such a model, excessive load on the server can slow down or break the network. This problem can be solved by applying a peer-to-peer (P2P) network in a distributed environment for smoother sharing and distribution of resources. Depending on the existence of an index server, the P2P models are categorized as hybrid peer-to-peer and pure peer-to-peer networks. A hybrid P2P network is one that has an index server containing information on the locations of resources at the center, and which uses the index server for search. A pure P2P network is one that directly executes the search process among hosts without a server between the hosts [911].

The main goal of this issue is to bring together researchers and practitioners in areas of media streaming, multicasting and multimedia delivery, P2P file sharing to share their visions, research achievements and solutions, to resolve the challenge issues and to establish worldwide cooperative researches and developments. This will give an opportunity to push further the discussion upon the potential distributed hybrid networking systems across many communities. Some of these research areas are listed below.

  • Hybrid P2P networking system

  • Knowledge based Applications and Management

  • Multicasting and multimedia delivery

  • P2P Overlay networks

  • P2P Security issues

  • P2P Wireless and mobile networks

  • Architectures and protocols

  • Convergence/co-existence of P2P and other networks

  • Data and index structures

  • Modeling, performance and robustness

  • Semantic routing and search

  • Systems Analysis, Design and Development

This special issue has become one of the hottest topics in distributed hybrid P2P networking systems. We believe that issue will have a high citation in the areas of Peer-to-Peer Networking and Applications.

The paper by Kim et al. [1] presents a quantum-dot-doped fiber amplifier (QDFA) that is used to obtain packet transmission times and packet arrival times during the QDFA synchronization process and which is a new framework for guaranteeing users with quality of service (QoS) from multimedia streaming services in hybrid P2P networks. In addition, the proposed QDFA utilizes IEEE 1588 technology, which is a packet network synchronization technique to accurately measure packet transmission time, and it ensures users’ QoS based on this information. The paper by Joh et al. [2] presents a cross-layer system design for optimizing smart-device communication properties by utilizing the characteristics of high-speed data transmission rates for Wi-Fi P2P networks and the low power–consumption communication of Bluetooth. They also verified that the proposed technique outperforms existing Bluetooth and Wi-Fi P2P networks by comparing throughput as well as transmission delay through OPNET simulations, which leads to faster user connections and provides better QoS to end users.

The paper by Park et al. [3] suggests methods and a system to align content with annotation data to be used for T-Commerce through a P2P-TV system while evaluating system performance. Experimentation on five different types of content corruption generated relatively strong annotation results of 82.63 %. The paper by Kim et al. [4] analyzes security services for secure multiple communications in P2P networks, and proposes a key exchange process that provides PIM-SM–based authentication and confidentiality to securely join multiple communication services in P2P networks.

The paper by Moon et al. [5] proposes a reliable information retrieval system for P2P services based in the mobile cloud environment. The proposed system is applied to the keyword–based concept net applying an ontology method. Additionally, for effective information retrieval by peers, connectivity between keyword concepts is applied. The paper by Oh et al. [6] presents an estimation method for abnormal objects and reliability in a P2P network. The proposed method is very useful for detection of abnormal objects in a P2P network that occur through abnormal faults in software and data. While they manage the P2P network, the reliability of the system can be predicted.

The paper by Kim et al. [7] presents a messenger real IP trace method that extracts the user-connected IP address or extracts an installed IP address in the computer via an agent. This can prevent crimes that make tracing impossible through use of a virtual private network (VPN) or a proxy server to hide the criminals’ identities. Using the method proposed in this paper can prove to be a valuable method for the prevention of crime. The paper by Yun et al. [8] presents a biometric signature delegation scheme. The proposed scheme consists of biometric key–generation, signature delegation, and signature generation and verification protocols. The authors also show how the scheme could be applied to distribute content in a hybrid P2P network.

This fine collection of papers was achieved by fruitful collaborations. We wish to thank all the authors for their contributions and the reviewers for assisting our editorial work. We do hope that the papers included in this issue will satisfy the audience of the Peer-to-Peer Networking and Applications Journal and readers will find them interesting. Furthermore, we would like to thank Professor Sherman Shen, editor-in-chief of the international journals Peer-to-Peer Networking and Applications, for his valuable remarks and his undeterred help throughout the publication process of special issue.