1.
P. Khuntia, and R. Hazra, “An efficient channel and power allocation scheme for D2D enabled cellular communication system: An IoT application,” IEEE Sensors Journal, vol. 21, no. 22, pp. 25340-25351, 2021.
2.
P.K. Barik, C. Singhal, and R. Datta, “An efficient data transmission scheme through 5G D2D-enabled relays in wireless sensor networks,” Computer Communications, vol. 168, no.1, pp. 102-113, 2021.
3.
I.O. Sanusi, K.M. Nasr, and K. Moessner, "Radio resource management approaches for reliable device-to-device (D2D) communication in wireless industrial applications," IEEE Transactions on cognitive communications and networking, vol. 7, no. 3, pp. 905-916, 2020.
4.
Z. Su, W. Feng, J. Tang, Z. Chen, Y. Fu, N. Zhao, and K.K. Wong, “Energy-efficiency optimization for D2D communications underlaying UAV-assisted industrial IoT networks with SWIPT,” IEEE Internet of Things Journal, vol. 10, no. 3, pp. 1990-2002, 2022.
5.
S. Feng, X. Lu, S. Sun, D. Niyato, and E. Hossain, “Securing large-scale d2d networks using covert communication and friendly jamming,” IEEE Transactions on Wireless Communications, vol. 23, no. 1, pp. 592-606, 2023.
6.
B. Chang, L. Li, G. Zhao, Z. Chen, and M.A. Imran, “Autonomous D2D transmission scheme in URLLC for real-time wireless control systems,” IEEE Transactions on Communications, vol. 69, no. 8, pp. 5546-5558, 2021.
7.
V. Hakami, H. Barghi, S. Mostafavi, and Z. Arefinezhad, “A resource allocation scheme for D2D communications with unknown channel state information,” Peer-to-peer networking and applications, vol. 15, no. 2, pp. 1189-1213, 2022.
8.
X. Cai, X. Mo, J. Chen, and J. Xu, "D2D-enabled data sharing for distributed machine learning at the wireless network edge," IEEE Wireless Communications Letters, vol. 9, no. 9, pp. 1457-1461, 2020.
9.
T. Van Nguyen, T.N. Do, V.N.Q. Bao, D.B. da Costa, and B. An, “On the performance of multihop cognitive wireless powered D2D communications in WSNs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 3, pp. 2684-2699, 2020.
10.
M. Pirani., A. Mitra, S. Sundaram, “A survey of graph-theoretic approaches for analyzing the resilience of networked control systems”, arXiv preprint arXiv:2205.12498. 2022.
11.
R. Zhang, F.R. Yu, J. Liu, T. Huang, and Y. Liu, “Deep reinforcement learning (DRL)-based device-to-device (D2D) caching with blockchain and mobile edge computing,” IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6469-6485, 2020.
12.
R. Zhang, F.R. Yu, J. Liu, R. Xie, and T. Huang, “Blockchain-incentivized D2D and mobile edge caching: A deep reinforcement learning approach,” IEEE Network, vol. 34, no. 4, pp. 150-157, 2020.
13.
R. Cheng, Y. Sun, Y. Liu, L. Xia, D. Feng, and M.A. Imran, “Blockchain-empowered federated learning approach for an intelligent and reliable D2D caching scheme,” IEEE Internet of Things Journal, vol. 9, no. 11, pp. 7879-7890, 2021.
14.
H. Alghafari, M.S. Haghighi, and A. Jolfaei, “High bandwidth green communication with vehicles by decentralized resource optimization in integrated access backhaul 5G networks,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 3, pp. 1438-1447, 2022.
15.
K. Kita, Y. Koizumi, T. Hasegawa, O. Ascigil, and I. Psaras, “Producer anonymity based on onion routing in named data networking,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 2420-2436, 2020.
16.
J. Pastor-Galindo, F.G. Mármol, and G.M. Pérez, “On the gathering of Tor onion addresses,” Future Generation Computer Systems, vol. 145, pp. 12-26, 2023.
17.
De la Cadena, W., Kaiser, D., Mitseva, A., Panchenko, A., Engel, T. “Analysis of multi-path onion routing-based anonymization networks,” In Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings 33, pp. 240-258, 2019. Springer International Publishing.
18.
N.K. Jadav, T. Rathod, R. Gupta, S. Tanwar, N. Kumar, R. Iqbal, S. Atalla, H. Mohammad, and S. Al-Rubaye, “Blockchain-based secure and intelligent data dissemination framework for UAVs in battlefield applications,” IEEE Communications Standards Magazine, vol. 7, no. 3, pp. 16-23, 2023.
19.
M.H. Zafar, I. Khan, and M.O. Alassafi, “An efficient resource optimization scheme for D2D communication,” Digital Communications and Networks, vol. 8, no. 6, pp. 1122-1129, 2022.
20.
A. Allakany, A. Saber, S.M. Mostafa, M. Alsabaan, M.I. Ibrahim, and H. Elwahsh, “Enhancing security in ZigBee wireless sensor networks: A new approach and mutual authentication scheme for D2D communication,” Sensors, vol. 23, no. 12, pp. 5703, 2023.
21.
N.K. Jadav, R. Kakkar, H. Mankodiya, R. Gupta, S. Tanwar, S. Agrawal, and R. Sharma, “GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G,” Digital Communications and Networks, vol. 9, no. 2, pp. 422-435, 2023.
22.
F.A. Yaseen, N.A. Alkhalidi, H.S. Al-Raweshidy, “ITor-SDN: Intelligent Tor Networks Based SDN for Data Forwarding Management,” IEEE Access, 2023.
23.
S. Liu, G. Yu, D. Wen, X. Chen, M. Bennis, and H. Chen, “Communication and energy efficient decentralized learning over D2D networks,” IEEE Transactions on Wireless Communications, vol. 22, no. 12, pp. 9549-9563, 2023.
24.
D. Yang, S. Yoo, I. Doh, and K. Chae, “Selective blockchain system for secure and efficient D2D communication,” Journal of Network and Computer Applications, vol. 173, no. 1. pp. 102-817, 2021.
25.
L. Luo, Z. Liu, Z. Chen, M. Hua, W. Li, and B. Xia, “Age of information-based scheduling for wireless D2D systems with a deep learning approach,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 3, pp. 1875-1888, 2022.
26.
S.H. Park, T. Mahboob, S.T. Shah, M.A. Shawky, M. Choi, and M.Y. Chung, “Blockchain-assisted Dynamic Resource Pool Selection for D2D Roaming Scenarios,” IEEE Open Journal of the Communications Society, 2024.
27.
J. Miao, Z. Wang, X. Xue, M. Wang, J. Lv, and M. Li, “Lightweight and secure D2D group communication for wireless IoT,” Frontiers in Physics, Vol. 11, no.1, pp. 1210777, 2023.
28.
J. Kiran, et al. "Enhancing Secure Data Transfer in Wireless Networks Using Onion Routing and Blockchain Technology." 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. pp. 1-6, doi: 10.1109 / GCCIT63234.2024.10862069.
29.
J, K.B., Nigam, M.K. and Shinde, S.B. A Hybrid Framework for Secure Device-To-Device Communication in Wireless Systems Using Blockchain and Onion Routing. ShodhKosh: Journal of Visual and Performing Arts. 5, 1 (Jun. 2024), 2269–2277.
30.
L. Almuqren, K. Mahmood, S.S. Aljameel, A.S. Salama, G.P. Mohammed, and A.A. Alneil, “Blockchain Assisted Secure Smart Home Network using Gradient Based Optimizer with Hybrid Deep Learning Model,” IEEE Access 11 (2023): 86999-87008.
31.
R.A. Chavan, “Cloud Data Security Improvement Using Cryptographic Steganography by Truly Random and Cryptographically Secure Random Number,” (Doctoral dissertation, Dublin, National College of Ireland), 2023.
32.
S. Schlor, R. Strässer, and F. Allgöwer, “Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange,” IFAC-PapersOnLine, vol. 56, no. 2, pp. 984-990, 2023.
33.
R. Gupta, S. Tanwar, and N. Kumar, “B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G”, Vehicular Communications, vol. 33, no. 1. p.100401, 2022.
34.
M.J. Pasha, K.P. Rao, A. MallaReddy, and V. Bande, “LRDADF: An AI-enabled framework for detecting low-rate DDoS attacks in cloud computing environments”, Measurement: Sensors, 28, p.100828, 2023.
35.
S.J. Rani, I.I. Ioannou, P. Nagaradjane, C. Christophorou, V. Vassiliou, H. Yarramsetti, S. Shridhar, L.M. Balaji, and A. Pitsillides, “A novel deep hierarchical machine learning approach for identification of known and unknown multiple security attacks in a d2d communications network”, IEEE Access, vol. 11, no.1, pp.95161-95194, 2023.
36.
K. Haseeb, A. Rehman, T. Saba, S.A. Bahaj, and J. Lloret, Device-to-device (D2D) multi-criteria learning algorithm using secured sensors. Sensors, Vol. 22, no. 6, p.2115, 2022.
37.
A. Goel, and S. Neduncheliyan, “An intelligent blockchain strategy for decentralized healthcare framework”, Peer-to-Peer Networking and Applications, vol. 16, no. 2, pp.846-857.