scispace - formally typeset
Search or ask a question
JournalISSN: 1936-6442

Peer-to-peer Networking and Applications 

Springer Nature
About: Peer-to-peer Networking and Applications is an academic journal published by Springer Nature. The journal publishes majorly in the area(s): Computer science & Cloud computing. It has an ISSN identifier of 1936-6442. Over the lifetime, 1468 publications have been published receiving 17547 citations. The journal is also known as: P2PNA (Internet) & P2PNA (Print).


Papers
More filters
Journal ArticleDOI
TL;DR: An IoT E-business model is proposed, which is specially designed for the IoTE-business, which redesign many elements in traditional E- business models; and the transaction of smart property and paid data on the IoT with the help of P2P trade based on the Blockchain and smart contract is realized.
Abstract: Nowadays, the development of traditional business models become more and more mature that people use them to guide various kinds of E-business activities. Internet of things (IoT), being an innovative revolution over the Internet, becomes a new platform for E-business. However, old business models could hardly fit for the E-business on the IoT. In this article, we 1) propose an IoT E-business model, which is specially designed for the IoT E-business; 2) redesign many elements in traditional E-business models; 3) realize the transaction of smart property and paid data on the IoT with the help of P2P trade based on the Blockchain and smart contract. We also experiment our design and make a comprehensive discuss.

450 citations

Journal ArticleDOI
TL;DR: The challenges and solutions of providing live and on-demand video streaming in P2P environment are described and tree, multi-tree and mesh based systems are introduced.
Abstract: Video-over-IP applications have recently attracted a large number of users on the Internet. Traditional client-server based video streaming solutions incur expensive bandwidth provision cost on the server. Peer-to-Peer (P2P) networking is a new paradigm to build distributed network applications. Recently, several P2P streaming systems have been deployed to provide live and on-demand video streaming services on the Internet at low server cost. In this paper, we provide a survey on the existing P2P solutions for live and on-demand video streaming. Representative P2P streaming systems, including tree, multi-tree and mesh based systems are introduced. We describe the challenges and solutions of providing live and on-demand video streaming in P2P environment. Open research issues on P2P video streaming are also discussed.

424 citations

Journal ArticleDOI
TL;DR: This survey evaluated the techniques of deep learning in developing SDN-based Network Intrusion Detection Systems (NIDS) and covered tools that can be used to develop NIDS models in SDN environment.
Abstract: Software Defined Networking Technology (SDN) provides a prospect to effectively detect and monitor network security problems ascribing to the emergence of the programmable features. Recently, Machine Learning (ML) approaches have been implemented in the SDN-based Network Intrusion Detection Systems (NIDS) to protect computer networks and to overcome network security issues. A stream of advanced machine learning approaches – the deep learning technology (DL) commences to emerge in the SDN context. In this survey, we reviewed various recent works on machine learning (ML) methods that leverage SDN to implement NIDS. More specifically, we evaluated the techniques of deep learning in developing SDN-based NIDS. In the meantime, in this survey, we covered tools that can be used to develop NIDS models in SDN environment. This survey is concluded with a discussion of ongoing challenges in implementing NIDS using ML/DL and future works.

341 citations

Journal ArticleDOI
Daniel Kraft1
TL;DR: This work model mining as a Poisson process with time-dependent intensity and uses this model to derive predictions about block times for various hash-rate scenarios, and analyses Bitcoin’s method to update the “network difficulty” as a mechanism to keep block times stable.
Abstract: Crypto-currencies like Bitcoin have recently attracted a lot of interest. A crucial ingredient into such systems is the “mining” of a Nakamoto blockchain. We model mining as a Poisson process with time-dependent intensity and use this model to derive predictions about block times for various hash-rate scenarios (exponentially rising hash rate being the most important). We also analyse Bitcoin’s method to update the “network difficulty” as a mechanism to keep block times stable. Since it yields systematically too fast blocks for exponential hash-rate growth, we propose a new method to update difficulty. Our proposed method performs much better at ensuring stable average block times over longer periods of time, which we verify both in simulations of artificial growth scenarios and with real-world data. Besides Bitcoin itself, this has practical benefits particularly for systems like Namecoin. It can be used to make name expiration times more predictable, preventing accidental loss of names.

247 citations

Journal ArticleDOI
TL;DR: The proposed enhanced authentication scheme with unlinkability not only remedies its security flaws but also improves its performance and is more suitable for practical applications of WSNs than Xue et al.
Abstract: User authentication with unlinkability is one of the corner stone services for many security and privacy services which are required to secure communications in wireless sensor networks (WSNs). Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs, and claimed that their scheme achieves identity and password protection, and the resiliency of stolen smart card attacks. However, we observe that Xue et al.’s scheme is subject to identity guessing attack, tracking attack, privileged insider attack and weak stolen smart card attack. In order to fix the drawbacks, we propose an enhanced authentication scheme with unlinkability. Additionally, the proposed scheme further cuts the computational cost. Therefore, the proposed scheme not only remedies its security flaws but also improves its performance. It is more suitable for practical applications of WSNs than Xue et al.’s scheme.

165 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202389
2022186
2021311
2020170
2019133
201898