Abstract
This paper proposes a novel approach to routing architecture based on the Session–Cookie protocol. The proposed architecture performs service discovery by integrating IoTs geographic clustering technique and polymorphism mechanism. Prioritizing requests is done in cookies and the load balancing on sessions. The efficiency of the proxy server’s distributed cache and service discovery is improved. Smart devices, vehicles, and people inaugurate a p2p connection to receive the service, exchange data, and share files in applications such as parking systems, navigation, and vehicle insurance companies. According to the results, the average response time and the bandwidth consumption have decreased, and the cache hit rate has reached 86%. Based on the principles of game theory, the proposed architecture in the extensive game model with imperfect information in the conditions ((mtcp, mudp), (Y, Y); λ = 1, µ = 0)) has a weak sequential equilibrium and Nash equilibrium.




















Similar content being viewed by others
Availability of data and materials
The data and files of the NS2 network simulator software and the codes written in C++ programming language can be sent through the following email addresses: Jafari@phd.iaurasht.ac.ir or Jafari_Bita@yahoo.com.
References
Ketu SH, Mishra PK (2022) Cloud fog and mist computing in IoT. An indication of emerging opportunities. IETE Tech Rev 39(3):713–724. https://doi.org/10.1080/02564602.2021.1898482
Lu Q, Wang H, Guo J, Yang W, Lv J (2021) On-path caching based on content relevance in information-centric networking. Comput Commun 176(10):272–281. https://doi.org/10.1016/j.comcom.2021.06.015
Joshi T, Goyal N, Ram M (2022) An approach to analyze reliability indices in peer-to-peer communication systems. Cybern Syst 53(8):716–733. https://doi.org/10.1080/01969722.2022.2047273
He H, Cui L, Zhou F, Wang D (2017) Distributed proxy cache technology based on autonomic computing in smart cities. Fut Gener Comput Syst 76:370–383. https://doi.org/10.1016/j.future.2016.03.015
Renuka BS, Prafulla Shashikiran GT (2020) Model of load distribution between web proxy servers using network traffic analysis. SN Comput Sci 1(2):1–8. https://doi.org/10.1007/s42979-020-0108-7
Vitor G, Rito P, Sargento S, Pinto F (2022) A scalable approach for smart city data platform: Support of real-time processing and data sharing. Comput Net 213(12):109027. https://doi.org/10.1016/j.comnet.2022.109027
Kalantary S, Akbari Torkestani J, Shahidinejad A (2021) Resource discovery in the internet of things integrated with fog computing using Markov learning model. J Supercomp 77(12):13806–13827
Jazaeri SS, Asghari PA, Jabbehdari SA (2023) Javadi HHS (2023) Composition of caching and classifcation in edge computing based on quality optimization for SDN-based IoT healthcare solutions. Supercomputing 79:17619–17669
Mangla T, Halepovic E, Ammar M, Zegura E (2019) Using session modeling to estimate HTTP-based video QoE metrics from encrypted network traffic. IEEE Trans Netw Serv Manag 16(3):1086–1099
Liupengfei Wu, Weisheng Lu, Chen C (2023) Strengths and weaknesses of client- server and peer-to-peer network models in construction projects. Int J Constr Manag. https://doi.org/10.1080/15623599.2023.2185950
Tanganelli G, Vallati C, Mingozzi E (2017) Edge-centric distributed discovery and access in the internet of things. IEEE Internet Things J 5(1):425–438
Woungang I, Tseng F, Lin Y, Chou L, Chao H, Obaidat MS (2015) Mr-chord: Improved chord lookup performance in structured mobile p2p networks. IEEE Syst J 9(3):743–751. https://doi.org/10.1109/JSYST.2014.2306147
Thanikaivel B, Venkatalakshmi K, Kannan A (2021) Optimized mobile cloud resource discovery architecture based on dynamic cognitive and intelligent technique. Microproc Microsyst 81:103716
Jamil B, Ijaz H, Shojafar M, Munir K (2023) IRATS: a DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network. Ad Hoc Netw 141:10309. https://doi.org/10.1016/j.adhoc.2023.103090
Osamy W, Khedr AM, Salim A (2019) ADSDA: adaptive distributed service discovery algorithm for internet of things based mobile wireless sensor networks. IEEE Sens J 19(22):10869–10880
Ameur AI, Lakas A, Bachir YM, Oubbati OS (2022) Peer-to-peer overlay techniques for vehicular ad hoc networks: survey and challenges. Veh Commun 34:100455. https://doi.org/10.1016/j.vehcom.2022.100455
Li Ch, Liu J, Zhang Q, Luo Y (2021) Efficient cooperative cache management for latency-aware data intelligent processing in edge environment. Fut Gener Comput Syst 123(10):48–67
Tang Y, Guo K, Ma J, Shen Y, Chi T (2019) A smart caching mechanism for mobile multimedia in information centric networking with edge computing. Fut Gener Comput Syst 91(2):590–600. https://doi.org/10.1016/j.future.2018.08.019
Xiang M, Jiang Y, Xia Z, Huang C (2020) Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster. Cluster Comput 23(4):3139–3155. https://doi.org/10.1007/s10586-020-03076-4
Ali AM, Bagchi S (2018) Hybrid architecture for autonomous load balancing in distributed systems based on smooth fuzzy function. Intell Autom Soft Comput Doi 10(31209/2018):100000043
Nath S, Paul A, Banerjee R, Bhaumik S, Sing JK, Kumar Sarkar S (2020) Optimizing fanet routing using a hybrid approach of firefly algorithm and aco-l'evy flight. In: The 2020 IEEE Vlsi device circuit and system (VLSI DCS), pp 378–383. https://doi.org/10.1109/VLSIDCS47293.2020.9179956
Gupta AN, Barthwal AN, Vardhan HA, Kakria SH, Kumar SU, Parihal AS, Chopra R (2023) Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15197-0
Yu K, Lin L, Alazab M, Tan L, Gu B (2021) Deep learning-based traffic safety solution for a mixture of autonomous and manual vehicles in a 5g-enabled intelligent transportation system. IEEE Trans Intell Transp Syst 22(7):4337–4347. https://doi.org/10.1109/TITS.2020.3042504
Jeong J, Shen Y, Oh T, C’espedes S, Benamar N, Wetterwald M, H¨arri J, (2021) A comprehensive survey on vehicular networks for smart roads: A focus on ip-based approaches. Veh Commun 29:100334. https://doi.org/10.1016/j.vehcom.2021.100334
Hussain R, Lee J, Zeadally S (2021) Trust in vanet: A survey of current solutions and future research opportunities. IEEE Trans Intell Transp Syst 22(5):2553–2571. https://doi.org/10.1109/TITS.2020.2973715
Srivastava A, Prakash A, Tripathi R (2020) Location based routing protocols in vanet: Issues and existing solutions. Veh Commun 23:100231. https://doi.org/10.1016/j.vehcom.2020.100231
Hussain R, Hussain F, Zeadally S (2019) Integration of vanet and 5g security: A review of design and implementation issues. Future Gener Comput Syst 101:843–864. https://doi.org/10.1016/j.future.2019.07.006
Jahangeer N, Aldabbas PBH (2021) A study on modeling vehicles mobility with mlc for enhancing vehicle-to-vehicle connectivity in vanet. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02559-x
Wang S, Lu S, Zhang Q (2019) Instantly decodable network coding–assisted data dissemination for prioritized services in vehicular ad hoc networks. Int J Distrib Sens Netw 15(4):1550147719842137. https://doi.org/10.1177/1550147719842137
Jeong MW, Ryu JY, Kim S, Lee W, Ban TW (2020) A completely distributed transmission algorithm for mobile device-to-device caching networks. Comput Electr Eng 87(7):106803. https://doi.org/10.1016/j.compeleceng.2020.106803
Guo N, Zhao C, Gao T (2020) An anonymous authentication scheme for edge computing-based car–home connectivity services in vehicular networks. Future Gener Comput Syst 106(5):659–671. https://doi.org/10.1016/j.future.2020.01.028
Barberis C, Malnati G (2011) Design and evaluation of a collaborative system for content diffusion and retrieval in vehicular networks. IEEE Trans Consum Electron 57(1):105–112. https://doi.org/10.1109/TCE.2011.5735489
Guezzi A, Lakas A, Korichi A, Cherbal S (2020) Peer to peer approach based replica and locality awareness to manage and disseminate data in vehicular ad hoc networks. Int J Comput Netw Commun 12:65–81. https://doi.org/10.5121/ijcnc.2020.12605
Haq A, Faheem Y (2020) A peer-to-peer communication based content distribution protocol for incentiveaware delay tolerant networks. Wirel Netw. https://doi.org/10.1007/s11276-019-02167-4
Ilyas A, Alatawi MN, Hamid Y, Mahfooz S, Zada I, Gohar N (2022) Shah MA (2022) Software architecture for pervasive critical health monitoring system using fog computing. J Cloud Comp 11:84. https://doi.org/10.1186/s13677-022-00371-w
You Z, Cheng G, Wang Y, Chen P, Chen S (2019) Cross-layer and sdn based routing scheme for p2p communication in vehicular ad-hoc networks. Appl Sci. https://doi.org/10.3390/app9224734
Alden FZ, Hassan S, Habbal A, Wei X (2022) An adaptive social-aware device-to-device communication mechanism for wireless networks. Ad Hoc Netw 137(14):102955. https://doi.org/10.1016/j.adhoc.2022.102955
Yuan P, Shao S, Geng L, Zhao X (2021) Caching hit ratio maximization in mobile edge computing with node cooperation. Comput Netw 200(17):108507. https://doi.org/10.1016/j.comnet.2021.108507
Gibbons R (1992) Games in extensive form. In: A Primer in Game Theory. Harvester Wheatheaf of press, Harlow
Javadpour A, Pinto P, Ja’fari F, Zhang W (2023) A distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput 26(4):367–384. https://doi.org/10.1007/s10586-022-03621-3
Acknowledgements
This manuscript is prepared based on the Ph.D. thesis of the first author at Rasht Branch, Islamic Azad University, Rasht, Iran.
Funding
No funding was received for conducting this study.
Author information
Authors and Affiliations
Contributions
BJ was involved in conceptualization; data curation; formal analysis; investigation; methodology; resources; software; validation; visualization; roles/writing—original draft; and writing—review and editing. PB was involved in conceptualization; data curation; formal analysis; funding acquisition; investigation; methodology; project administration; resources; supervision; validation; visualization; draft; and writing—review and editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare they have no conflicts of interest to report regarding the present study.
Ethical approval
This study is only based on theoretical basic research. It is not involving humans.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Each line represents a simulated action, and the numbers indicate the arbitrary time it takes for that action to complete. The actual results and timing will depend on the specifics of our implementation, the environment in which it is running, and the efficiency of the operations being performed.

Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jafari, B., Bayat, P. Performance improvement of distributed cache using middleware session. J Supercomput 80, 10818–10862 (2024). https://doi.org/10.1007/s11227-023-05823-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05823-x