A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges
by Frederick Ojiemhende Ehiagwina*,1 , Nurudeen Ajibola Iromini2, Ikeola Suhurat Olatinwo3, Kabirat Raheem1, Khadijat Mustapha1
1 Department of Electrical/Electronic Engineering, The Federal Polytechnic Offa, Offa, Nigeria
2 Department of Computer Engineering, The Federal Polytechnic Offa, Offa, Nigeria
3 Department of Computer Science, The Federal Polytechnic Offa, Offa, Nigeria
* Author to whom correspondence should be addressed.
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Keywords: Bitcoin, file-sharing, hybrid P2P, overlay network, peer-to-peer network, privacy, security
Received: 03 January 2022, Revised: 07 February 2022, Accepted: 08 February 2022, Published Online: 28 February 2022
AMA Style
Ehiagwina FO, Iromini NA, Olatinwo IS, Raheem K, Mustapha K. A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges. Journal of Engineering Research and Sciences. 2022;1(1):19-38. DOI: 10.55708/js0101003
Chicago/Turabian Style
Ehiagwina, Frederick Ojiemhende, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem, and Khadijat Mustapha. “A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges.” Journal of Engineering Research and Sciences 1, no. 1 (2022): 19–38. DOI: 10.55708/js0101003
IEEE Style
F. O. Ehiagwina, N. A. Iromini, I. S. Olatinwo, K. Raheem, and K. Mustapha, “A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges,” Journal of Engineering Research and Sciences, vol. 1, no. 1, pp. 19–38, 2022. DOI: 10.55708/js0101003
Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust and reputation management issues, coexistence with other existing networks, and so on have not been comprehensively reviewed. In addition, existing reviews were limited to articles published in or before 2012. This paper performs a state-of-the-art literature survey on the emerging research areas of P2P networks, applications and ensuing challenges along with proposed solutions by scholars. The literature search for this survey was limited to the top-rated publisher of scholarly articles. This research shows that issues with security, privacy, the confidentiality of information and trust management will need greater attention, especially in sensitive applications like health services and vehicle to vehicle communication ad hoc networks. In addition, more work is needed in developing solutions to effectively investigate and curb deviant behaviours among some P2P networks.
- Lin, W. Dou, Z. Xu, and J. Chen, “A QoS-aware service discovery method for elastic cloud computing in an unstructured peer-to-peer network,” Concurr. Comput. Pract. Exp., vol. 25, no. 13, pp. 1843–1860, 2013. https://doi.org/10.1002/cpe.2993
- Hughes, J. Walkerdine, G. Coulson, and S. Gibson, “Peer-to-Peer : Is Deviant Behavior the Norm on P2P File- Sharing Networks?,” IEEE Distrib. Syst. Online, vol. 7, no. 2, pp. 1–11, 2006. https://doi.org/10.1109/MDSO.2006.13
- Wang and Y. Sun, “Self-organizing Peer-to-peer social networks,” Comput. Intell., vol. 24, no. 3, pp. 213–233, 2008. https://doi.org/10.1111/j.1467-8640.2008.00328.x
- Hofstätter, “Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer Network,” in Networked Services and Applications – Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, F. A. Aagesen and S. J. Knapskog, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 256–258. https://doi.org/10.1007/978-3-642-13971-0_25
- Zhang, E. El Ajaltouni, and A. Boukerche, “A scheduling and load balancing scheme for dynamic P2P-based system,” Concurr. Comput. Pract. Exp., vol. 22, no. 10, pp. 1325–1334, 2010. https://doi.org/10.1002/cpe.1578
- K. Lua, J. Crowcroft, and M. Pias, “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Commun. Surv. Tutorials, vol. 7, no. 2, pp. 72–93, 2005. https://doi.org/10.1109/COMST.2005.1610546
- Dhara, Y. Guo, M. Kolberg, and X. Wu, “Overview of Structured Peer-to-Peer Overlay Algorithms,” in Handbook of Peer-to-Peer Networking, X. Shen, H. Yu, J. Buford, and M. Akon, Eds. Boston, MA: Springer US, 2010, pp. 223–256. https://doi.org/10.1007/978-0-387-09751-0_9
- Linga, “Indexing in peer-to-peer system,” Cornell University, 2007.
- Malatras, “State-of-the-art survey on P2P overlay networks in pervasive computing environments,” J. Netw. Comput. Appl., vol. 55, pp. 1–23, 2015. https://doi.org/10.1016/j.jnca.2015.04.014
- Ganguly and S. Bhatnagar, “P2P Technology,” in VoIP, John Wiley & Sons, Ltd, 2008, pp. 87–102. https://doi.org/10.1002/9780470997925.ch7
- Han, “Distributed hybrid P2P networking systems,” Peer-to-Peer Netw. Appl., vol. 8, pp. 555–556, 2015. https://doi.org/10.1007/s12083-014-0298-7
- Garmehi and M. Analoui, “Envy-Free Resource Allocation and Request Routing in Hybrid CDN–P2P Networks,” J. Netw. Syst. Manag., vol. 24, no. 4, pp. 884–915, 2016. https://doi.org/10.1007/s10922-015-9359-3
- Hammami, I. Jemili, A. Gazdar, and A. Belghith, “Hybrid Live P2P Streaming Protocol,” Procedia Comput. Sci., vol. 32, pp. 158–165, 2014. https://doi.org/10.1016/j.procs.2014.05.410
- Bartlang and J. P. Müller, “A flexible content repository to enable a peer-to-peer-based wiki,” Concurr. Comput. Pract. Exp., vol. 22, no. 7, pp. 831–871, 2010. https://doi.org/10.1002/cpe.1465
- -H. Chen, E. J.-L. Lu, Y.-T. Chang, and S.-Y. Huang, “RDF-Chord: A hybrid PDMS for P2P systems,” Comput. Stand. Interfaces, vol. 43, pp. 53–67, 2016. https://doi.org/10.1016/j.csi.2015.08.008
- Polar, M. Bunruangses, K. Luangxaysanam, S. Mitatha, and P. P. Yupapin, “Overlay Fiber Network Based MNRs for P2P Networks,” Procedia Eng., vol. 32, pp. 482–488, 2012. https://doi.org/10.1016/j.proeng.2012.01.1297
- Amad, A. Meddahi, D. Aïssani, and G. Vanwormhoudt, “GPM: A generic and scalable P2P model that optimizes tree depth for multicast communications,” Int. J. Commun. Syst., vol. 25, no. 4, pp. 491–514, 2012. https://doi.org/10.1002/dac.1275
- Liu, J. Song, and J. Yu, “An Overlapping Structured P2P for REIK Overlay Network,” Physics Procedia, vol. 33, pp. 1022–1028, 2012. https://doi.org/10.1016/j.phpro.2012.05.168
- Srivastava and P. Ahmad, “A Probabilistic Gossip-based Secure Protocol for Unstructured P2P Networks,” Procedia Comput. Sci., vol. 78, pp. 595–602, 2016. https://doi.org/10.1016/j.procs.2016.02.122
- Caubet, O. Esparza, J. L. Muñoz, J. Alins, and J. Mata-Díaz, “RIAPPA: A Robust Identity Assignment Protocol for P2P overlays,” Secur. Commun. Networks, vol. 7, no. 12, pp. 2743–2760, 2014. https://doi.org/10.1002/sec.956
- Lu and P. Hui, “A Mobile Peer to Peer Content Dissemination Model to Minimize Load on Cellular Network,” 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI). pp. 272–275, 2015. https://doi.org/10.1109/IIKI.2015.65
- P. Duarte Jr, P. Elias, Z. G. Lisandro, J. N. S. Luci Pirmez, C. A. Rossana, T. Liane, B. C. Reinaldo, and L. Alexandre, “GigaManP2P: An overlay network for distributed QoS management and resilient routing,” Int. J. Netw. Manag., vol. 22, no. 1, pp. 50–64, 2012. https://doi.org/10.1002/nem.785
- M. Nallakannu and R. Thiagarajan, “PSO-based optimal peer selection approach for highly secure and trusted P2P system,” Secur. Commun. Networks, vol. 9, no. 13, pp. 2186–2199, 2016. https://doi.org/10.1002/sec.1478
- Li, H. Zhu, B. Jun, and D. Choi, “Guest editorial : Security and privacy of P2P networks in emerging smart city,” Peer-to-Peer Netw. Appl., vol. 8, pp. 1023–1024, 2015. https://doi.org/10.1007/s12083-015-0393-4
- Fuchs, D. Herrmann, A. Micheloni, and H. Federrath, “Laribus : Privacy-preserving detection of fake SSL certificates with a social P2P notary network,” Eurasip J. Inf. Secur., vol. 2015, no. 1, pp. 1–17, 2015.
- Chen, W. S. Soh, and A. Hu, “An improved Kademlia protocol with double-layer design for P2P voice communications,” 2014 Communications Security Conference (CSC 2014). pp. 1–8, 2014.
- Pecori, “Trust-based storage in a Kademlia network infected by Sybils,” 2015 7th International Conference on New Technologies, Mobility and Security (NTMS). pp. 1–5, 2015. https://doi.org/10.1109/NTMS.2015.7266529
- Tian, Z. Duan, T. Baumeister, and Y. Dong, “Thwarting traceback attack on Freenet,” 2013 IEEE Global Communications Conference (GLOBECOM). pp. 741–746, 2013. https://doi.org/10.1109/GLOCOM.2013.6831161
- Tian, Z. Duan, T. Baumeister, and Y. Dong, “A Traceback Attack on Freenet,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99. p. 1, 2015. https://doi.org/10.1109/TDSC.2015.2453983
- Roos, F. Platzer, J. M. Heller, and T. Strufe, “Inferring obfuscated values in Freenet,” 2015 International Conference and Workshops on Networked Systems (NetSys). pp. 1–8, 2015. https://doi.org/10.1109/NetSys.2015.7089062
- Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Fujii, and A. Takahara, “THUP: A P2P Network Robust to Churn and DoS Attack Based on Bimodal Degree Distribution,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9. pp. 247–256, 2013. https://doi.org/10.1109/JSAC.2013.SUP.0513022
- D. A. López-Fuentes and S. Balleza-Gallegos, “Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks,” 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. pp. 1262–1267, 2015. https://doi.org/10.1109/HPCC-CSS-ICESS.2015.252
- A. Simplicio, M. A. S. Santos, R. R. Leal, M. A. L. Gomes, and W. A. Goya, “SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games,” Secur. Commun. Networks, vol. 7, no. 12, pp. 2412–2431, 2014. https://doi.org/10.1002/sec.952
- Deltouzos, I. Gkortsilas, N. Efthymiopoulos, M. Efthymiopoulou, and S. Denazis, “SeekStream: Adapting to dynamic user behavior in P2P video-on-demand,” Int. J. Commun. Syst., vol. 29, no. 8, pp. 1365–1394, 2016. https://doi.org/10.1002/dac.3105
- Mu, J. Ishmael, W. Knowles, M. Rounce, N. Race, and M. Stuart, “P2P-Based IPTV Services : Design, Deployment, and QoE Measurement,” IEEE Trans. Multimed., vol. 14, no. 6, pp. 1515–1527, 2012. https://doi.org/10.1109/TMM.2012.2217119
- Yildirim, M. Sayit, and G. Kardas, “A belief-desire-intention agent architecture for partner selection in peer-to-peer live video streaming applications,” Expert Syst., vol. 32, no. 3, pp. 327–343, 2015. https://doi.org/10.1111/exsy.12086
- R. Ghaeini, B. Akbari, B. Barekatain, and A. Trivino-Cabrera, “Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks,” Int. J. Commun. Syst., vol. 29, no. 18, pp. 2580–2603, Dec. 2016. https://doi.org/10.1002/dac.3088
- Luo, W. An, S. Ci, and D. Wu, “A distributed utility-based scheduling for peer-to-peer video streaming over wireless networks,” Wirel. Commun. Mob. Comput., vol. 16, no. 12, pp. 1556–1569, 2016. https://doi.org/10.1002/wcm.2614
- Peersman, C. Schulze, A. Rashid, M. Brennan, and C. Fischer, “iCOP : Automatically Identifying New Child Abuse Media in P2P Networks,” In 2014 IEEE Security and Privacy Workshops (pp. 124-131). IEEE. https://doi.org/10.1109/SPW.2014.27
- Efthymiopoulos, S. L. Tompros, A. Christakidis, K. Koutsopoulos, and S. Denazis, “Enabling live video streaming services realization in telecommunication networks using P2P technology,” Int. J. Commun. Syst., vol. 24, no. 10, pp. 1354–1374, 2011. https://doi.org/10.1002/dac.1250
- Alasaad, S. Gopalakrishnan, and V. C. M. Leung, “Extending P2PMesh: topology-aware schemes for efficient peer-to-peer data sharing in wireless mesh networks,” Wirel. Commun. Mob. Comput., vol. 13, no. 5, pp. 483–499, 2013. https://doi.org/10.1002/wcm.1115
- Peersman, C. Schulze, A. Rashid, M. Brennan, and C. Fischer, “iCOP: Live forensics to reveal previously unknown criminal media on P2P networks,” Digit. Investig., vol. 18, pp. 50–64, 2016. https://doi.org/10.1016/j.diin.2016.07.002
- Kang and Y. Wu, “Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach,” in Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, D. Gritzalis, S. Furnell, and M. Theoharidou, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–542. https://doi.org/10.1007/978-3-642-30436-1_45
- -C. G. Anadiotis, C. Z. Patrikakis, and A. Murat Tekalp, “Information-centric networking for multimedia, social and peer-to-peer communications,” Trans. Emerg. Telecommun. Technol., vol. 25, no. 4, pp. 383–391, 2014. https://doi.org/10.1002/ett.2814
- Yang, M. Liu, B. Li and Z. Dong, “A P2P network framework for interactive streaming media”, Proc. 11th Int. Conf. Intell. Hum.-Mach. Syst. Cybern. (IHMSC), vol. 2, pp. 288-292, 2019. https://doi.org/10.1109/IHMSC.2019.10162
- Li, C. Li, Z. Fang, H. Wang, and Y. Wu, “Optimal layer division for low latency in DHT-based hierarchical P2P network,” Int. J. Netw. Manag., vol. 26, no. 2, pp. 95–110, 2016. https://doi.org/10.1002/nem.1922
- Ma, Z. Tan, G. Chang, and X. Wang, “A New P2P Network Routing Algorithm Based on ISODATA Clustering Topology,” Procedia Eng. Adv. Control Eng. Inf. Sci., vol. 15, pp. 2966–2970, 2011. https://doi.org/10.1016/j.proeng.2011.08.558
- Yang, Y. Zhang, H. Zhang, T.-Y. Wu, and H.-C. Chao, “Multi-factors oriented study of P2P Churn,” Int. J. Commun. Syst., vol. 22, no. 9, pp. 1089–1103, 2009. https://doi.org/10.1002/dac.1001
- Narang, S. Ray, and C. Hota, “PeerShark : Detecting Peer-to-Peer Botnets by Tracking Conversations,” In 2014 IEEE Security and Privacy Workshops (pp. 108-115). IEEE, 2014. https://doi.org/10.1109/SPW.2014.25
- Althobaiti, S. J. Alotaibi, and H. Alqahtani, “Random walk with jumps: A new query search method based on analysing Gnutella protocol,” 2015 World Congress on Internet Security (WorldCIS). pp. 125–130, 2015. https://doi.org/10.1109/WorldCIS.2015.7359427
- Corigliano and P. Trunfio, “Exploiting sleep-and-wake strategies in the Gnutella network,” 2014 International Conference on Collaboration Technologies and Systems (CTS). pp. 406–412, 2014. https://doi.org/10.1109/CTS.2014.6867596
- Chen, W. S. Soh, and A. Hu, “An improved Kademlia protocol with double-layer design for P2P voice communications,” in Communications Security Conference (CSC 2014), pp. 1–8. https://doi.org/10.1049/cp.2014.0727
- Gao, J. Shi, X. Wang, Q. Tan, C. Zhao and Z. Yin, “Topology measurement and analysis on Ethereum P2P network”, Proc. IEEE Symp. Comput. Commun., pp. 1-7, 2019. https://doi.org/10.1109/ISCC47284.2019.8969695
- Ookita and S. Fujita, “Cost-effective index poisoning scheme for P2P file sharing systems,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). https://doi.org/10.1109/ICIS.2016.7550732
- K. Awasthi, and Y. N. Singh, “Simplified Biased Contribution Index (SBCI): A mechanism to make P2P network fair and efficient for resource sharing”. Journal of Parallel and Distributed Computing, vol. 124, pp. 106-118, 2019. https://doi.org/10.1016/j.jpdc.2018.10.002
- Wang, J. Wang, J. Yu, M. Yu, and Y. Zhang, “Trust-aware query routing in P2P social networks,” Int. J. Commun. Syst., vol. 25, no. 10, pp. 1260–1280, 2012. https://doi.org/10.1002/dac.1320
- A. Kurid, T. S. Alnusairi, and H. S. Almujahed, “OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P Databases,” Procedia Comput. Sci., vol. 21, pp. 60–67, 2013. https://doi.org/10.1016/j.procs.2013.09.010
- Adala and N. Tabbane, “Discovery of semantic Web Services with an enhanced-Chord-based P2P network,” Int. J. Commun. Syst., vol. 23, no. 11, pp. 1353–1365, 2010. https://doi.org/10.1002/dac.1110
- Ricci, A. Iosup, and R. Prodan, “Large scale distributed cooperative environments on clouds and P2P,” Peer-to-Peer Netw. Appl., vol. 9, pp. 1126–1127, 2016. https://doi.org/10.1007/s12083-016-0447-2
- Boukhadra, K. Benatchba, and A. Balla, “Similarity Flooding for Efficient Distributed Discovery of OWL-S Process Model in P2P Networks,” Procedia Comput. Sci., vol. 56, pp. 317–324, 2015. https://doi.org/10.1016/j.procs.2015.07.214
- Ali, K. Wu, and H. Khan, “Traffic Anomaly Detection in the Presence of P2P Traffic,” in 39th Annual IEEE Conference on Local Computer Networks, 2014, pp. 482–485. https://doi.org/10.1109/LCN.2014.6925822
- Jusko and M. Rehak, “Identifying peer-to-peer communities in the network by connection graph analysis,” Int. J. Netw. Manag., vol. 24, no. 4, pp. 235–252, 2014. https://doi.org/10.1002/nem.1862
- Hsieh and M. Chiang, “Improvement of the Byzantine Agreement Problem under Mobile P2P Network,” IERI Procedia, vol. 10, pp. 45–50, 2014. https://doi.org/10.1016/j.ieri.2014.09.089
- Alasaad, S. Gopalakrishnan, and V. C. M. Leung, “Replication schemes for peer-to-peer content in wireless mesh networks with infrastructure support,” Wirel. Commun. Mob. Comput., vol. 15, no. 4, pp. 699–715, 2015. https://doi.org/10.1002/wcm.2376
- Kavalionak and A. Montresor, “P2P and Cloud : A Marriage of Convenience for Replica Management,” In: Kuipers F.A., Heegaard P.E. (eds) Self-Organizing Systems. IWSOS 2012. Lecture Notes in Computer Science, vol 7166. Springer, Berlin, Heidelberg, pp. 60–71, 2012.. https://doi.org/10.1007/978-3-642-28583-7_6
- Jo, G. Kim, and J. Han, “Convergence P2P context awareness,” Peer-to-Peer Netw. Appl., vol. 9, pp. 461–464, 2016. https://doi.org/10.1007/s12083-015-0419-y
- Anjum, D. Karamshuk, M. Shikh-Bahaei, and N. Sastry, “Survey on Peer-assisted Content Delivery Networks,” Comput. Networks, 2017. https://doi.org/10.1016/j.comnet.2017.02.008
- Lee, and J. Cho, “RFID-based sensing system for context information management using P2P network architecture”, Peer-to-Peer Networking and Applications, vol. 11, no. 6, pp. 1197-1205, 2018. https://doi.org/10.1007/s12083-018-0636-2
- Mousavi Khaneghah, S. L. Mirtaheri, M. Sharifi, and B. Minaei Bidgoli, “Modeling and analysis of access transparency and scalability in P2P distributed systems,” Int. J. Commun. Syst., vol. 27, no. 10, pp. 2190–2214, 2014. https://doi.org/10.1002/dac.2467
- Garmehi, M. Analoui, M. Pathan, and R. Buyya, “An economic mechanism for request routing and resource allocation in hybrid CDN–P2P networks,” Int. J. Netw. Manag., vol. 25, no. 6, pp. 375–393, 2015. https://doi.org/10.1016/j.csi.2015.08.008
- Cui, M. Li, Z. Wang, J. Ren, D. Jiao, and J. Ma, “Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective,” Concurr. Comput. Pract. Exp., vol. 27, no. 12, pp. 3044–3064, 2015. https://doi.org/10.1002/cpe.3207
- Liu, N. Antonopoulos, S. Mackin, J. Xu, and D. Russell, “Efficient resource discovery in self-organized unstructured peer-to-peer networks,” Concurr. Comput. Pract. Exp., vol. 21, no. 2, pp. 159–183, 2009. https://doi.org/10.1002/cpe.1329
- Li, J. Wang, K. Lu, C. Guo, and X. Tan, “A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks,” Procedia Comput. Sci., vol. 94, pp. 360–365, 2016. https://doi.org/10.1016/j.procs.2016.08.055
- Lu, J. Wang, L. Xie, Q. Zhen, and M. Li, “An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks,” Procedia Comput. Sci., vol. 94, no. Bdstc, pp. 366–371, 2016.
- Alharbi and A. Hussain, “An Agent-Based Approach for Modelling Peer to Peer Networks,” 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim). pp. 532–537, 2015. https://doi.org/10.1109/UKSim.2015.47
- H. Lin, J. J. Zseng, and S. Y. Hsieh, “Improving the Search Mechanism for Unstructured Peer-to-Peer Networks Using the Statistical Matrix Form,” IEEE Access, vol. 3. pp. 926–941, 2015. 10.1109/ACCESS.2015.2444872
- Ieong, P. Lai, K.-P. Chow, F. Law, M. Kwan, and K. Tse, “A Model for Foxy Peer-to-Peer Network Investigations,” in Networked Services and Applications – Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, G. Peterson and S. Shenoi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 175–186. https://doi.org/10.1007/978-3-642-04155-6_13
- Vélez-Rivera, E. Arzuaga-Cruz, A. A. Irizarry-Rivera, and F. Andrade, “Global data prefetching using BitTorrent for distributed smart grid control,” 2016 North American Power Symposium (NAPS). pp. 1–6, 2016. https://doi.org/10.1109/NAPS.2016.7747904
- Kopiczko, W. Mazurczyk, and K. Szczypiorski, “StegTorrent : A Steganographic Method for the P2P File Sharing Service,” in IEEE Security and Privacy Workshops, 2013. https://doi.org/10.1109/SPW.2013.11
- Mitra, S. Ghose, N. Ganguly, and F. Peruani, “Stability analysis of peer-to-peer networks against churn,” Pramana, vol. 71, no. 2, pp. 263–273, 2008. https://doi.org/10.1007/s12043-008-0159-0
- Huang, E. Izquierdo, and P. Hao, “Adaptive packet scheduling for scalable video streaming with network coding,” J. Vis. Commun. Image Represent., vol. 43, pp. 10–20, 2017. https://doi.org/10.1016/j.jvcir.2016.11.014
- Chauhan, “Fault Tolerant Decentralized Scheduling Algorithm for P2P Grid,” vol. 6, pp. 698–707, 2012. https://doi.org/10.1016/j.comnet.2014.12.009
- Meng and D. Liu, “GeTrust: A guarantee-based trust model in Chord-based P2P networks,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99. p. 1, 2016. https://doi.org/10.1109/TDSC.2016.2530720
- Ullah, “mSCTP & P2P (2-layered CHORD) supported decentralized seamless mobility framework,” 2015 International Conference on Emerging Technologies (ICET). pp. 1–5, 2015. https://doi.org/10.1109/ICET.2015.7389214
- M. Ding and Q. Qian, “A chord-based load balancing algorithm for P2P network,” ICINS 2014 – 2014 International Conference on Information and Network Security. pp. 91–96, 2014. https://doi.org/10.1049/cp.2014.1271
- Skodzik, P. Danielis, V. Altmann, and D. Timmermann, “HaRTKad: A hard real-time Kademlia approach,” 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC). pp. 309–314, 2014. https://doi.org/10.1109/CCNC.2014.6866588
- Y. Lee and A. Nakao, “Approaches for Practical BitTorrent Traffic Control,” in 38th Annual IEEE Conference on Local Computer Networks Approaches, 2013, pp. 382–389. https://doi.org/10.1109/LCN.2013.6761270
- Neuner, M. Schmiedecker, and E. R. Weippl, “PeekaTorrent : Leveraging P2P hash values for digital forensics,” Digit. Investig., vol. 18, pp. S149–S156, 2016. https://doi.org/10.1016/j.diin.2016.04.011
- Heymann and B. L. Grand, “Monitoring user-system interactions through graph-based intrinsic dynamics analysis,” IEEE 7th International Conference on Research Challenges in Information Science (RCIS). pp. 1–10, 2013. https://doi.org/10.1109/RCIS.2013.6577695
- Roy, B. Gupta, B. Rekabdar, and H. Hexmoor, “A Novel approach toward designing a non-DHT Based Structured P2P network architecture”, in Proceedings of 32nd International Conference on, vol. 63, pp. 182-188, 2020.
- Fukuchi, C. Sommer, Y. Sei, and S. Honiden, “Distributed Arrays: A P2P Data Structure for Efficient Logical Arrays,” IEEE INFOCOM 2009. pp. 1458–1466, 2009. https://doi.org/10.1109/INFCOM.2009.5062062
- D. A. López-fuentes, I. Eugui-de-alba, and O. M. Ortíz-ruiz, “Evaluating P2P Networks against Eclipse Attacks,” Procedia Technology, vol. 3, pp. 61–68, 2012. https://doi.org/10.1016/j.protcy.2012.03.007
- Hwang and A. T. Liem, “A Hybrid Scalable Peer-to-Peer IP-Based Multimedia Services Architecture in Ethernet Passive Optical Networks,” J. Light. Technol., vol. 31, no. 2, pp. 213–222, 2013. https://doi.org/10.1109/JLT.2012.2227941
- Germanus, H. Ismail, and N. Suri, “PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation,” 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS). pp. 74–83, 2015. https://doi.org/10.1109/SRDS.2015.14
- Kellett, T. Tran, and M. Li, “Trust by association: A meta-reputation system for peer-to-peer networks,” Comput. Intell., vol. 27, no. 3, pp. 363–392, 2011. https://doi.org/10.1111/j.1467-8640.2011.00388.x
- Liu, P. Ren, D. Sun, K. Liu, and J. Wu, “TrustP2PNet: P2P Social Network with Admission Control Model based on Trust,” AASRI Procedia, vol. 5, pp. 281–286, 2013. https://doi.org/10.1016/j.aasri.2013.10.090
- Yan, C. Zhuo, and Z. Hua, “Improving Sharing Efficiency in Online Short Video System through Using P2P Based Mechanism,” Procedia Engineering, vol. 29, pp. 3207–3211, 2012. https://doi.org/10.1016/j.proeng.2012.01.467
- Liu, G. Huang, J. Cheng, S. Feng, and J. Fan, “Fibonacci Ring Overlay Networks with Distributed Chunk Storage for P2P VoD Streaming,” Procedia Comput. Sci., vol. 9, pp. 1354–1362, 2012. https://doi.org/10.1016/j.procs.2012.04.149
- Song, W. Gao, G. Zhang, D. Gao, and H. Jiang, “A P2P Based Video on Demand System for Embedded Linux,” Procedia Eng., vol. 29, pp. 3070–3074, 2012. https://doi.org/10.1016/j.proeng.2012.01.442
- Datta and H. Kargupta, “A communication efficient probabilistic algorithm for mining frequent itemsets from a peer-to-peer network,” Stat. Anal. Data Min., vol. 2, no. 1, pp. 48–69, 2009. https://doi.org/10.1002/sam.10033
- Pal, M. C. Govil, and M. Ahmed, “Slack time–based scheduling scheme for live video streaming in P2P network”, International Journal of Communication Systems, vol. 31, no. 2, e3440, 2018. https://doi.org/10.1002/dac.3440
- Picone, M. Amoretti, and F. Zanichelli, “An Evaluation Criterion for Adaptive Neighbor Selection in Heterogeneous Peer-to-Peer Networks,” pp. 144–156, 2009. https://doi.org/10.1007/978-3-642-04994-1_12
- Guo, J. Liu, and Z. Wang, “Frequency-Aware Indexing for Peer-to-Peer On-Demand Video Streaming,” 2010 IEEE International Conference on Communications. pp. 1–5, 2010. https://doi.org/10.1109/ICC.2010.5502373
- S. Cruz and M. S. Nunes, “A P2P streaming architecture supporting scalable media,” Peer-to-Peer Netw. Appl., vol. 8, no. 5, pp. 758–776, 2015. https://doi.org/10.1007/s12083-014-0284-0
- Liu, J. Liu, J. Song, and A. Argyriou, “Scalable 3D video streaming over P2P networks with playback length changeable chunk segmentation,” J. Vis. Commun. Image Represent., vol. 31, pp. 41–53, 2015. https://doi.org/10.1016/j.jvcir.2015.05.012
- Cuajimalpa, “P2P Video Streaming Strategies based on Scalable Video Coding,” J. Appl. Res. Technol., vol. 13, no. 1, pp. 113–124.
- A. Lopez-Fuentes, “P2P video streaming strategies based on scalable video coding,” J. Appl. Res. Technol., vol. 13, no. Feb., pp. 113–124, 2014.
- S. Raheel, R. Raad, and C. Ritz, “Achieving maximum utilization of peer’s upload capacity in p2p networks using SVC,” Peer-to-Peer Netw. Appl., pp. 1–21, 2015. https://doi.org/10.1007/s12083-015-0406-3
- R. Haque, R. Ahmed, and R. Boutaba, “QPM: Phonetic aware P2P search,” 2009 IEEE Ninth International Conference on Peer-to-Peer Computing. pp. 131–134, 2009. https://doi.org/10.1109/P2P.2009.5284536
- Talia and P. Trunfio, “Dynamic Querying in Structured Peer-to-Peer Networks,” in Managing Large-Scale Service Deployment: 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, F. De Turck, W. Kellerer, and G. Kormentzas, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 28–41. https://doi.org/10.1007/978-3-540-87353-2_3
- Arunachalam and O. Sornil, “Issues of Implementing Random Walk and Gossip Based Resource Discovery Protocols in P2P MANETs & Suggestions for Improvement,” Procedia Comput. Sci., vol. 57, pp. 509–518, 2015. https://doi.org/10.1016/j.procs.2015.07.374
- Loganathan, Logitha, and A. Veronica, “Distributed resource management scheme using enhanced artificial bee-colony in P2P,” 2015 2nd International Conference on Electronics and Communication Systems (ICECS). pp. 1035–1039, 2015. https://doi.org/10.1109/ECS.2015.7124737
- Julius, M. Wichtlhuber, P. Heise, and D. Hausheer, “vINCENT : An Incentive Scheme Supporting Heterogeneity in Peer-to-Peer Content Distribution,” in 39th Annual IEEE Conference on Local Computer Networks, pp. 19–27, 2014. https://doi.org/10.1109/LCN.2014.6925752
- Lu, S. Wang, G. Cui, M. Li, and H. Liaqat, “Multi-reciprocity Policies Co-evolution Based Incentive Evaluating Framework for Mobile P2P Systems,” IEEE ACCESS, vol. 5, pp. 3313 – 3321, 2016. https://doi.org/10.1109/ACCESS.2016.2630736
- Goth and T. Commission, “ISP Traffic Management: Will Innovation or Regulation Ensure Fairness?,” IEEE Distributed Systems Online, vol. 9, no. 9, pp. 1–4, 2008. https://doi.org/10.1109/MDSO.2008.27
- Zhi-jie, W. Ru-chuan, and D. Xiao-yang, “A Novel P2P traffic Prediction Algorithm Based on Hybrid Model,” Phys. Procedia, vol. 25, no. 1, pp. 1218–1225, 2012. https://doi.org/10.1016/j.phpro.2012.03.223
- Dedinski, H. DeMeer, L. Han, L. Mathy, D. P. Pezaros, J. S. Sventek, and X. Y. Zhan, “Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking,” in Active and Programmable Networks: IFIP TC6 7th International Working Conference, D. Hutchison, S. Denazis, L. Lefevre, and G. J. Minden, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 13–27. https://doi.org/10.1007/978-3-642-00972-3_2
- -H. Hsu, C.-G. Hsu, S.-C. Chen, and T.-L. Chen, “Message transmission techniques for low traffic P2P services,” Int. J. Commun. Syst., vol. 22, no. 9, pp. 1105–1122, 2009. https://doi.org/10.1002/dac.1010
- Li and Q. Liao, “Network pricing: can both ISP and P2P benefit?,” Int. J. Netw. Manag., vol. 24, no. 6, pp. 433–449, 2014. https://doi.org/10.1002/nem.1869
- Casadesus-Masanell and A. Hervas-Drane, “Peer-to-Peer File Sharing and the Market for Digital Information Goods,” J. Econ. Manag. Strateg., vol. 19, no. 2, pp. 333–373, 2010. https://doi.org/10.1111/j.1530-9134.2010.00254.x
- Yimu, Y. Yongge, Z. Chuanxin, J. Chenchen, and W. RuChuan, “Research of a Novel Flash P2P Network Traffic Prediction Algorithm,” Procedia Comput. Sci., vol. 55, pp. 1293–1301, 2015. https://doi.org/10.1016/j.procs.2015.07.140
- Rossow, D. Andriesse, T. Werner, and F. Fkie, “SoK : P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets,” in IEEE Symposium on Security and Privacy, 2013. https://doi.org/10.1109/SP.2013.17
- Z. M. Safar, N. Abdullah, H. Kamaludin, S. Abd Ishak, and M. R. M. Isa, “Characterising and detection of botnet in P2P network for UDP protocol” Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 3, pp. 1584-1595, 2020. https://doi.org/10.11591/ijeecs.v18.i3
- -S. Hua, S.-M. Huang, D. C. Yen, and C.-W. Chena, “A dynamic game theory approach to solve the free riding problem in the peer-to-peer networks,” J. Simul., vol. 6, no. 1, pp. 43–55, 2012. https://doi.org/10.1057/jos.2011.11
- Kang and J. Yang, “Viewing experience optimization for peer-to-peer streaming networks with credit-based incentive mechanisms,” Comput. Networks, vol. 114, pp. 67–79, Feb. 2017. https://doi.org/10.1016/j.comnet.2017.01.005
- Wang, C. Wu, L. Sun, and S. Yang, “Strategies of collaboration in multi-swarm peer-to-peer content distribution,” Tsinghua Sci. Technol., vol. 17, no. 1, pp. 29–39, 2012. https://doi.org/10.1109/TST.2012.6151905
- Yulan and J. Chunfeng, “Research of Trust Model in P2P File-Sharing System,” Procedia Environ. Sci., vol. 12, pp. 1208–1212, 2012. https://doi.org/10.1016/j.proenv.2012.01.409
- A. Kurdi, “HonestPeer : An enhanced EigenTrust algorithm for reputation management in P2P systems,” J. King Saud Univ. – Comput. Inf. Sci., vol. 27, no. 3, pp. 315–322, 2015. https://doi.org/10.1016/j.jksuci.2014.10.002
- Tauhiduzzaman and M. Wang, “Fighting pollution attacks in P2P streaming,” Comput. Networks, vol. 79, pp. 39–52, 2015.
- Rahmadika, S. Noh, K. Lee, B. J. Kweka, and K. H. Rhee, “The dilemma of parameterizing propagation time in blockchain P2P network”. Journal of Information Processing Systems, vol. 16 no. 3, pp. 699-717, 2020. https://doi.org/10.3745/JIPS.03.0140
- Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2294–2303, 2016. 10.1109/ACCESS.2016.2566339
- Yi . “Securing e-voting based on blockchain in P2P network”. EURASIP Journal on Wireless Communications and Networking, vol. 1, pp. 1-9, 2019. https://doi.org/10.1186/s13638-019-1473-6
- Franzoni, and V. Daza, “Clover: An anonymous transaction relay protocol for the bitcoin P2P network”, Peer-to-Peer Networking and Applications, vol. 15, no.1, pp. 290-303, 2022. https://doi.org/10.1007/s12083-021-01241-z
- Jo, and J. Han, “Convergence P2P cloud computing”. Peer-to-Peer Networking and Applications, vol. 11, no. 6, pp. 1153-1155, 2018. https://doi.org/10.1007/s12083-018-0661-1
- -C. Wang and Y.-D. Lin, “CDNPatch: A cost-effective failover mechanism for hybrid CDN-P2P live streaming systems,” Int. J. Commun. Syst., vol. 29, no. 17, pp. 2517–2533, 2016.
- Thomas, M. Thomas, and K. Chandrasekaran, “Multimedia Streaming using Cloud-Based P2P Systems,” Procedia Comput. Sci., vol. 57, no. Icrtc, pp. 25–32, 2015. https://doi.org/10.1002/dac.3193
- Wahidah, B. Ab, K. Jenni, S. Mandala, and E. Supriyanto, “Review On Cloud Computing Application In P2P Video Streaming,” Procedia – Procedia Comput. Sci., vol. 50, pp. 185–190, 2015. https://doi.org/10.1016/j.procs.2015.04.082
- Myneedu and Y. Guan, “Evidence Collection in Peer-to-Peer Network Investigations,” in Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International Conference on Digital Forensics, G. Peterson and S. Shenoi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 215–230. https://doi.org/10.1007/978-3-642-33962-2_15
- Ren, Z. Zeng, T. Wang, S. Zhang, and G. Zhi, “A trust-based minimum cost and quality aware data collection scheme in P2P network”. Peer-to-Peer Networking and Applications, vol. 13, no. 6, pp. 2300-2323, 2020. https://doi.org/10.1007/s12083-020-00898-2
- Hou, Y. Jiang, W. Lei, A. Xu, H. Wen, and S. Chen, “A P2P network based edge computing smart grid model for efficient resources coordination”. Peer-to-Peer Networking and Applications, vol. 13 , no. 3, pp. 1026-1037, 2020. https://doi.org/10.1007/s12083-019-00870-9
- Averkiou, “Digital Watermarking.” Department of Computer Science University of Cyprus