

Volume 15, issue 1, January 2022
51 articles in this issue
-
-
Decentralized access control technique with multi-tier authentication of user for cloud storage
Authors
- S. Shiny
- J. Jasper
- Content type: OriginalPaper
- Published: 04 August 2021
- Pages: 13 - 27
-
An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search
Authors
- Huarui Wu
- Huaji Zhu
- Xiao Han
- Content type: OriginalPaper
- Published: 05 August 2021
- Pages: 28 - 44
-
A novel hierarchical fault management framework for wireless sensor networks: HFMF
Authors (first, second and last of 4)
- Elham Moridi
- Majid Haghparast
- Somayyeh Jafarali Jassbi
- Content type: OriginalPaper
- Published: 12 August 2021
- Pages: 45 - 55
-
Double agents-DQL based D2D computing-offloading for SHVC
Authors (first, second and last of 4)
- Jianlong Liu
- Jiaye Wen
- Wen’an Zhou
- Content type: OriginalPaper
- Published: 16 August 2021
- Pages: 56 - 76
-
Enabling rank-based distribution of microservices among containers for green cloud computing environment
Authors (first, second and last of 6)
- Abdul Saboor
- Ahmad Kamil Mahmood
- Ali Ahmadian
- Content type: OriginalPaper
- Published: 18 August 2021
- Pages: 77 - 91
-
Robustness against fraudulent activities of a blockchain-based online review system
Authors
- Tanakorn Karode
- Warodom Werapun
- Content type: OriginalPaper
- Published: 23 August 2021
- Pages: 92 - 106
-
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks
Authors
- C. Suganthi Evangeline
- Vinoth Babu Kumaravelu
- Content type: OriginalPaper
- Published: 01 September 2021
- Pages: 107 - 133
-
The reliable routing for software-defined vehicular networks towards beyond 5G
Authors (first, second and last of 4)
- Yaoguang Lu
- Xingwei Wang
- Min Huang
- Content type: OriginalPaper
- Published: 03 September 2021
- Pages: 134 - 148
-
Machine-learning-based cache partition method in cloud environment
Authors (first, second and last of 5)
- Jiefan Qiu
- Zonghan Hua
- Dajiang Chen
- Content type: OriginalPaper
- Published: 06 September 2021
- Pages: 149 - 162
-
MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection
Authors (first, second and last of 5)
- Duc V. Nguyen
- Giang L. Nguyen
- Giang T. Pham
- Content type: OriginalPaper
- Published: 14 September 2021
- Pages: 163 - 177
-
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT
Authors (first, second and last of 4)
- Mohammed B. M. Kamel
- Peter Ligeti
- Christoph Reich
- Content type: OriginalPaper
- Open Access
- Published: 24 September 2021
- Pages: 178 - 193
-
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems
Authors (first, second and last of 5)
- Zheyi Chen
- Hongqiang Zheng
- Chunming Rong
- Content type: OriginalPaper
- Open Access
- Published: 25 September 2021
- Pages: 194 - 205
This is part of 2 collections: -
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Authors (first, second and last of 6)
- Vidyotma Thakur
- Gaurav Indra
- Amr Tolba
- Content type: OriginalPaper
- Published: 28 September 2021
- Pages: 206 - 220
-
Analytical modelling of false blocking problem in wireless ad hoc networks
Authors (first, second and last of 4)
- Wai Kheong Chong
- Micheal Drieberg
- Rizwan Ahmad
- Content type: OriginalPaper
- Published: 02 October 2021
- Pages: 221 - 245
-
An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks
Authors (first, second and last of 4)
- Maryam Ataei Kachooei
- Faramarz Hendessi
- Mostafa Nozari
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 246 - 266
-
Efficient topology control of blockchain peer to peer network based on SDN paradigm
Authors
- Varun Deshpande
- Hakim Badis
- Laurent George
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 267 - 289
-
Clover: An anonymous transaction relay protocol for the bitcoin P2P network
Authors
- Federico Franzoni
- Vanesa Daza
- Content type: OriginalPaper
- Open Access
- Published: 06 October 2021
- Pages: 290 - 303
-
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols
Authors (first, second and last of 6)
- Guanglai Guo
- Yan Zhu
- William ChengChung Chu
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 304 - 323
-
Deep action: A mobile action recognition framework using edge offloading
Authors (first, second and last of 6)
- Deyu Zhang
- Heguo Zhang
- Feng Liu
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 324 - 339
-
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs
Authors (first, second and last of 5)
- Xuejiao Liu
- Chuanhua Wang
- Gaoxiang Zhu
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 340 - 354
-
LocTrust: A local and global consensus-combined trust model in MANETs
Authors
- Shuai Zhou
- Ge Zhang
- Xianfu Meng
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 355 - 368
-
MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing
Authors (first, second and last of 5)
- Haina Song
- Xinyu Han
- Jianfeng Li
- Content type: OriginalPaper
- Published: 06 October 2021
- Pages: 369 - 385
-
A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks
Authors
- Khaled S. El Gayyar
- Ahmed I. Saleh
- Labib M. Labib
- Content type: ReviewPaper
- Published: 09 October 2021
- Pages: 386 - 407
-
AToM: Active topology monitoring for the bitcoin peer-to-peer network
Authors
- Federico Franzoni
- Xavier Salleras
- Vanesa Daza
- Content type: OriginalPaper
- Open Access
- Published: 14 October 2021
- Pages: 408 - 425
-
Energy aware MAC protocol with mobility management in wireless body area network
Authors
- Mrinai Maneetkumar Dhanvijay
- Shailaja C. Patil
- Content type: OriginalPaper
- Published: 16 October 2021
- Pages: 426 - 443
-
Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing
Authors (first, second and last of 4)
- Qiaohong Hu
- Hongju Cheng
- Chengkuan Lin
- Content type: OriginalPaper
- Published: 19 October 2021
- Pages: 444 - 460
This is part of 2 collections: -
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles
Authors
- Leila Benarous
- Benamar Kadri
- Content type: OriginalPaper
- Published: 19 October 2021
- Pages: 461 - 472
-
A hybrid approach towards reduced checkpointing overhead in cloud-based applications
Authors
- Bharati Sinha
- Awadhesh Kumar Singh
- Poonam Saini
- Content type: OriginalPaper
- Published: 26 October 2021
- Pages: 473 - 483
-
An autonomous intrusion detection system for the RPL protocol
Authors
- Mohammad Shirafkan
- Ali Shahidienjad
- Mostafa Ghobaei-Arani
- Content type: OriginalPaper
- Published: 29 October 2021
- Pages: 484 - 502
-
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy
Authors (first, second and last of 5)
- Guang Yang
- Junling Guo
- Chengliang Tian
- Content type: OriginalPaper
- Published: 01 November 2021
- Pages: 503 - 515
-
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system
Authors
- Yulei Chen
- Jianhua Chen
- Content type: OriginalPaper
- Published: 09 November 2021
- Pages: 516 - 528
-
Application-aware QoS routing in SDNs using machine learning techniques
Authors (first, second and last of 7)
- Weichang Zheng
- Mingcong Yang
- Jie Li
- Content type: OriginalPaper
- Published: 11 November 2021
- Pages: 529 - 548
-
Privacy-preserving comparison based data aggregation protocols for mobile sensing
Authors
- Weinan Liu
- Content type: OriginalPaper
- Published: 11 November 2021
- Pages: 549 - 558
-
An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks
Authors
- Jianhua Huang
- Tianqi Li
- Zhigang Shi
- Content type: OriginalPaper
- Published: 12 November 2021
- Pages: 559 - 575
-
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs
Authors
- Shaik Shafi
- D. Venkata Ratnam
- Content type: OriginalPaper
- Published: 10 January 2022
- Pages: 576 - 591
-
Fuzzy routing for in-network aggregation in wireless sensor networks
Authors
- Radhakrishnan Maivizhi
- Palanichamy Yogesh
- Content type: OriginalPaper
- Published: 10 January 2022
- Pages: 592 - 611
-
Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network
Authors
- Xuefei Peng
- Xiaoming Yuan
- Kuan Zhang
- Content type: OriginalPaper
- Published: 10 January 2022
- Pages: 612 - 625
-
Big data analytics for critical information classification in online social networks using classifier chains
Authors (first, second and last of 7)
- Douglas H. Silva
- Erick G. Maziero
- Kostromitin K. Igorevich
- Content type: OriginalPaper
- Published: 10 January 2022
- Pages: 626 - 641
-
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
Authors
- A. O. Bang
- Udai Pratap Rao
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 642 - 665
-
An optimal load balancing strategy for P2P network using chicken swarm optimization
Authors
- Dharmendra Kumar
- Mayank Pandey
- Content type: OriginalPaper
- Published: 08 January 2022
- Pages: 666 - 688
-
Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks
Authors (first, second and last of 6)
- Jie Jia
- Yao Xu
- Xingwei Wang
- Content type: OriginalPaper
- Published: 08 January 2022
- Pages: 689 - 702
-
Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
Authors
- J. Thresa Jeniffer
- A. Chandrasekar
- Content type: OriginalPaper
- Published: 09 January 2022
- Pages: 703 - 723
-
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property
Authors
- Chuxin Zhuang
- Qingyun Dai
- Yue Zhang
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 724 - 738
-
Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network
Authors
- Xu Zhao
- Chaowei Lin
- Jianshan Zhang
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 739 - 750
-
An intelligent traffic prediction framework for 5G network using SDN and fusion learning
Authors
- K. Tamil Selvi
- R. Thamilselvan
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 751 - 767
-
Reducing the number of transaction messages in bitcoin
Authors
- Vojislav B. Mišić
- Jelena Mišić
- Xiaolin Chang
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 768 - 782
-
Joint pricing and task allocation for blockchain empowered crowd spectrum sensing
Authors (first, second and last of 5)
- Wenbin Chen
- Wei Wang
- Qihui Wu
- Content type: OriginalPaper
- Published: 11 January 2022
- Pages: 783 - 792
-
Developing a novel methodology for virtual machine introspection to classify unknown malware functions
Authors (first, second and last of 4)
- Rahul N. Vaza
- Ramesh Prajapati
- Dineshkumar Vaghela
- Content type: OriginalPaper
- Published: 05 January 2022
- Pages: 793 - 810
-
Efficient path-sense transmission based on IoT system in opportunistic social networks
Authors
- Xiaoli Li
- Huamei Qi
- Jia Wu
- Content type: OriginalPaper
- Published: 05 January 2022
- Pages: 811 - 826