PeerJ Computer Science:Computer Networks and Communicationshttps://peerj.com/articles/index.atom?journal=cs&subject=9200Computer Networks and Communications articles published in PeerJ Computer ScienceData aggregation algorithm for wireless sensor networks with different initial energy of nodeshttps://peerj.com/articles/cs-19322024-03-152024-03-15Zhenpeng LiuJialiang ZhangYi LiuFan FengYifan Liu
Data aggregation plays a critical role in sensor networks for efficient data collection. However, the assumption of uniform initial energy levels among sensors in existing algorithms is unrealistic in practical production applications. This discrepancy in initial energy levels significantly impacts data aggregation in sensor networks. To address this issue, we propose Data Aggregation with Different Initial Energy (DADIE), a novel algorithm that aims to enhance energy-saving, privacy-preserving efficiency, and reduce node death rates in sensor networks with varying initial energy nodes. DADIE considers the transmission distance between nodes and their initial energy levels when forming the network topology, while also limiting the number of child nodes. Furthermore, DADIE reconstructs the aggregation tree before each round of data transmission. This allows nodes closer to the receiving end with higher initial energy to undertake more data aggregation and transmission tasks while limiting energy consumption. As a result, DADIE effectively reduces the node death rate and improves the efficiency of data transmission throughout the network. To enhance network security, DADIE establishes secure transmission channels between transmission nodes prior to data transmission, and it employs slice-and-mix technology within the network. Our experimental simulations demonstrate that the proposed DADIE algorithm effectively resolves the data aggregation challenges in sensor networks with varying initial energy nodes. It achieves 5–20% lower communication overhead and energy consumption, 10–20% higher security, and 10–30% lower node mortality than existing algorithms.
Data aggregation plays a critical role in sensor networks for efficient data collection. However, the assumption of uniform initial energy levels among sensors in existing algorithms is unrealistic in practical production applications. This discrepancy in initial energy levels significantly impacts data aggregation in sensor networks. To address this issue, we propose Data Aggregation with Different Initial Energy (DADIE), a novel algorithm that aims to enhance energy-saving, privacy-preserving efficiency, and reduce node death rates in sensor networks with varying initial energy nodes. DADIE considers the transmission distance between nodes and their initial energy levels when forming the network topology, while also limiting the number of child nodes. Furthermore, DADIE reconstructs the aggregation tree before each round of data transmission. This allows nodes closer to the receiving end with higher initial energy to undertake more data aggregation and transmission tasks while limiting energy consumption. As a result, DADIE effectively reduces the node death rate and improves the efficiency of data transmission throughout the network. To enhance network security, DADIE establishes secure transmission channels between transmission nodes prior to data transmission, and it employs slice-and-mix technology within the network. Our experimental simulations demonstrate that the proposed DADIE algorithm effectively resolves the data aggregation challenges in sensor networks with varying initial energy nodes. It achieves 5–20% lower communication overhead and energy consumption, 10–20% higher security, and 10–30% lower node mortality than existing algorithms.Energy-efficient routing protocol for reliable low-latency Internet of Things in oil and gas pipeline monitoringhttps://peerj.com/articles/cs-19082024-02-292024-02-29Sana Nasim KaramKashif BilalAbdul Nasir KhanJunaid ShujaSaid Jadid Abdulkadir
The oil and gas industries (OGI) are the primary global energy source, with pipelines as vital components for OGI transportation. However, pipeline leaks pose significant risks, including fires, injuries, environmental harm, and property damage. Therefore, maintaining an effective pipeline maintenance system is critical for ensuring a safe and sustainable energy supply. The Internet of Things (IoT) has emerged as a cutting-edge technology for efficient OGI pipeline leak detection. However, deploying IoT in OGI monitoring faces significant challenges due to hazardous environments and limited communication infrastructure. Energy efficiency and fault tolerance, typical IoT concerns, gain heightened importance in the OGI context. In OGI monitoring, IoT devices are linearly deployed with no alternative communication mechanism available along OGI pipelines. Thus, the absence of both communication routes can disrupt crucial data transmission. Therefore, ensuring energy-efficient and fault-tolerant communication for OGI data is paramount. Critical data needs to reach the control center on time for faster actions to avoid loss. Low latency communication for critical data is another challenge of the OGI monitoring environment. Moreover, IoT devices gather a plethora of OGI parameter data including redundant values that hold no relevance for transmission to the control center. Thus, optimizing data transmission is essential to conserve energy in OGI monitoring. This article presents the Priority-Based, Energy-Efficient, and Optimal Data Routing Protocol (PO-IMRP) to tackle these challenges. The energy model and congestion control mechanism optimize data packets for an energy-efficient and congestion-free network. In PO-IMRP, nodes are aware of their energy status and communicate node’s depletion status timely for network robustness. Priority-based routing selects low-latency routes for critical data to avoid OGI losses. Comparative analysis against linear LEACH highlights PO-IMRP’s superior performance in terms of total packet transmission by completing fewer rounds with more packet’s transmissions, attributed to the packet optimization technique implemented at each hop, which helps mitigate network congestion. MATLAB simulations affirm the effectiveness of the protocol in terms of energy efficiency, fault-tolerance, and low latency communication.
The oil and gas industries (OGI) are the primary global energy source, with pipelines as vital components for OGI transportation. However, pipeline leaks pose significant risks, including fires, injuries, environmental harm, and property damage. Therefore, maintaining an effective pipeline maintenance system is critical for ensuring a safe and sustainable energy supply. The Internet of Things (IoT) has emerged as a cutting-edge technology for efficient OGI pipeline leak detection. However, deploying IoT in OGI monitoring faces significant challenges due to hazardous environments and limited communication infrastructure. Energy efficiency and fault tolerance, typical IoT concerns, gain heightened importance in the OGI context. In OGI monitoring, IoT devices are linearly deployed with no alternative communication mechanism available along OGI pipelines. Thus, the absence of both communication routes can disrupt crucial data transmission. Therefore, ensuring energy-efficient and fault-tolerant communication for OGI data is paramount. Critical data needs to reach the control center on time for faster actions to avoid loss. Low latency communication for critical data is another challenge of the OGI monitoring environment. Moreover, IoT devices gather a plethora of OGI parameter data including redundant values that hold no relevance for transmission to the control center. Thus, optimizing data transmission is essential to conserve energy in OGI monitoring. This article presents the Priority-Based, Energy-Efficient, and Optimal Data Routing Protocol (PO-IMRP) to tackle these challenges. The energy model and congestion control mechanism optimize data packets for an energy-efficient and congestion-free network. In PO-IMRP, nodes are aware of their energy status and communicate node’s depletion status timely for network robustness. Priority-based routing selects low-latency routes for critical data to avoid OGI losses. Comparative analysis against linear LEACH highlights PO-IMRP’s superior performance in terms of total packet transmission by completing fewer rounds with more packet’s transmissions, attributed to the packet optimization technique implemented at each hop, which helps mitigate network congestion. MATLAB simulations affirm the effectiveness of the protocol in terms of energy efficiency, fault-tolerance, and low latency communication.Algorithm design of a combinatorial mathematical model for computer random signalshttps://peerj.com/articles/cs-18732024-02-272024-02-27Qinghua YaoBenhua Qiu
To improve the processing effect of computer random signals, the manuscript employs the intelligent signal recognition algorithm to design a combinatorial mathematical model for computer random signals, and studies the parameter estimation of conventional frequency hopping signal (FHS) based on optimizing kernel function (KF). First, the mathematical form and graphical representation of the ambiguity function of the conventional FHS are explored. Furthermore, a new KF is presented according to its fuzzy function (FF) and the parameters of conventional FHSs are estimated according to the time-frequency distribution corresponding to the KF. Then, simulation experiments are carried out in different types of interference noise environments. The proposed combinatorial mathematical model for computer random signals shows a practical impact, and can effectively improve the effect of random signal combination.
To improve the processing effect of computer random signals, the manuscript employs the intelligent signal recognition algorithm to design a combinatorial mathematical model for computer random signals, and studies the parameter estimation of conventional frequency hopping signal (FHS) based on optimizing kernel function (KF). First, the mathematical form and graphical representation of the ambiguity function of the conventional FHS are explored. Furthermore, a new KF is presented according to its fuzzy function (FF) and the parameters of conventional FHSs are estimated according to the time-frequency distribution corresponding to the KF. Then, simulation experiments are carried out in different types of interference noise environments. The proposed combinatorial mathematical model for computer random signals shows a practical impact, and can effectively improve the effect of random signal combination.Enhanced architecture and implementation of spectrum shaping codeshttps://peerj.com/articles/cs-18832024-02-212024-02-21Bingrui WangZhaopeng XieXingang Zhang
Spectral shaping codes are modulation codes widely used in communication and data storage systems. This research enhances the algorithms employed in constructing spectral shaping codes for hardware implementation. We present a parallel scrambling calculation with a time complexity of O(1). Second, in the minimum accumulated signal power (MASP) module, the sine-cosine accumulation needs to be determined by remainder with time complexity O(n2). We offer reduced MASP computations for short bit-width data, ROM storage, and addition pipelines. It can remove the remainder operation, reducing accumulated complexity to O(1). In addition, we present a search algorithm to generate segmented lines to replace the square operations in the MASP module. By employing the search algorithm and shift operations, we can reduce the complexity of the square from O(n2) to O(1). The implementation results reveal that the original and proposed MASPs yield nearly identical spectrum nulls. The encoder-decoder of the spectral shaping codes with proposed approaches consumes just 6% of the hardware resources when carried out with a Spartan6 XC6SLX25.
Spectral shaping codes are modulation codes widely used in communication and data storage systems. This research enhances the algorithms employed in constructing spectral shaping codes for hardware implementation. We present a parallel scrambling calculation with a time complexity of O(1). Second, in the minimum accumulated signal power (MASP) module, the sine-cosine accumulation needs to be determined by remainder with time complexity O(n2). We offer reduced MASP computations for short bit-width data, ROM storage, and addition pipelines. It can remove the remainder operation, reducing accumulated complexity to O(1). In addition, we present a search algorithm to generate segmented lines to replace the square operations in the MASP module. By employing the search algorithm and shift operations, we can reduce the complexity of the square from O(n2) to O(1). The implementation results reveal that the original and proposed MASPs yield nearly identical spectrum nulls. The encoder-decoder of the spectral shaping codes with proposed approaches consumes just 6% of the hardware resources when carried out with a Spartan6 XC6SLX25.Laser communications system with drones as relay medium for healthcare applicationshttps://peerj.com/articles/cs-17592024-02-072024-02-07Adeeb SaitTawfik Al-HadhramiFaisal SaeedShadi BasurraSultan Noman Qasem
This article introduces a prototype laser communication system integrated with uncrewed aerial vehicles (UAVs), aimed at enhancing data connectivity in remote healthcare applications. Traditional radio frequency systems are limited by their range and reliability, particularly in challenging environments. By leveraging UAVs as relay points, the proposed system seeks to address these limitations, offering a novel solution for real-time, high-speed data transmission. The system has been empirically tested, showcasing its ability to maintain data transmission integrity under various conditions. Results indicate a substantial improvement in connectivity, with high data transmission success rate (DTSR) scores, even amidst environmental disturbances. This study underscores the system’s potential for critical applications such as emergency response, public health monitoring, and extending services to remote or underserved areas.
This article introduces a prototype laser communication system integrated with uncrewed aerial vehicles (UAVs), aimed at enhancing data connectivity in remote healthcare applications. Traditional radio frequency systems are limited by their range and reliability, particularly in challenging environments. By leveraging UAVs as relay points, the proposed system seeks to address these limitations, offering a novel solution for real-time, high-speed data transmission. The system has been empirically tested, showcasing its ability to maintain data transmission integrity under various conditions. Results indicate a substantial improvement in connectivity, with high data transmission success rate (DTSR) scores, even amidst environmental disturbances. This study underscores the system’s potential for critical applications such as emergency response, public health monitoring, and extending services to remote or underserved areas.Cyberterrorism as a global threat: a review on repercussions and countermeasureshttps://peerj.com/articles/cs-17722024-01-152024-01-15Saman Iftikhar
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological power through threat or intimidation. Data theft, data manipulation, and disruption of essential services are all forms of cyberattacks. As digital infrastructure becomes more critical and entry barriers for malicious actors decrease, cyberterrorism has become a growing concern. Detecting, responding, and preventing this crime presents unique challenges for law enforcement and governments, which require a multifaceted approach. Cyberterrorism can have devastating effects on a wide range of people and organizations. A country’s reputation and stability can be damaged, financial losses can occur, and in some cases, even lives can be lost. As a result of cyberattacks, critical infrastructure, such as power grids, hospitals, and transportation systems, can also be disrupted, leading to widespread disruptions and distress. The past ten years have seen several cyber-attacks around the globe including WannaCry attack (2017), Yahoo data breaches (2013–2014), OPM data breach (2015), SolarWinds supply chain attack (2020) etc. This study covers some of the cyberterrorism events that have happened in the past ten years, their target countries, their devastating effects, their impacts on nation’s economy, political instability, and measures adopted to counter them over the passage of time. Our survey-based research on cyberterrorism will complement existing literature by providing valuable empirical data, understanding of perceptions and awareness, and insights into targeted populations. It can contribute to the development of better measurement tools, strategies, and policies for countering cyberterrorism.
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological power through threat or intimidation. Data theft, data manipulation, and disruption of essential services are all forms of cyberattacks. As digital infrastructure becomes more critical and entry barriers for malicious actors decrease, cyberterrorism has become a growing concern. Detecting, responding, and preventing this crime presents unique challenges for law enforcement and governments, which require a multifaceted approach. Cyberterrorism can have devastating effects on a wide range of people and organizations. A country’s reputation and stability can be damaged, financial losses can occur, and in some cases, even lives can be lost. As a result of cyberattacks, critical infrastructure, such as power grids, hospitals, and transportation systems, can also be disrupted, leading to widespread disruptions and distress. The past ten years have seen several cyber-attacks around the globe including WannaCry attack (2017), Yahoo data breaches (2013–2014), OPM data breach (2015), SolarWinds supply chain attack (2020) etc. This study covers some of the cyberterrorism events that have happened in the past ten years, their target countries, their devastating effects, their impacts on nation’s economy, political instability, and measures adopted to counter them over the passage of time. Our survey-based research on cyberterrorism will complement existing literature by providing valuable empirical data, understanding of perceptions and awareness, and insights into targeted populations. It can contribute to the development of better measurement tools, strategies, and policies for countering cyberterrorism.Online shopping consumer perception analysis and future network security service technology using logistic regression modelhttps://peerj.com/articles/cs-17772024-01-152024-01-15Feng Lu
In order to understand consumer perception, reduce risks in online shopping, and maintain online security, this study employs data envelopment analysis (DEA) to confirm the relationship between evaluation and stimuli. It establishes a model of stimuli-organism response and uses regression analysis to explore the relationships among negative online shopping evaluations, consumer perception of risk, and consumer behavior. This study employs attribution theory to analyze the impact of evaluations on consumer behavior and assesses the role of perceived risk as a mediator. The independent variable is negative comments, the dependent variable is consumer behavior, and logistic regression is used to empirically analyze the factors influencing online shopping security. The results indicate a positive correlation between the number of negative comments and consumers’ delayed purchase behavior, with a correlation coefficient of 41%. The intensity of negative comments significantly impacts consumers’ refusal to make a purchase, with a correlation coefficient of 38%. The length of negative comments substantially influences consumers’ opposition to purchasing, also with a correlation coefficient of 38%. There is a close relationship between perceived risk and consumers’ delayed shopping behavior and the number of negative comments, with 41% and 4% correlation coefficients, respectively. Perceived risk has a relatively smaller impact on consumers’ opposition to purchase behavior, with a correlation coefficient of 27%. The length, intensity, and number of negative comments are correlated with consumers’ opposition, refusal, and delayed consumption, negatively affecting consumer intent. Additionally, negative comments are related to perceived risk and consumer behavior. Perceived risk causally influences consumer behavior, while the convenience of shopping has a relatively minor impact on online shopping security. Factors like delivery speed, buyer reviews, brand, price, and consumer perception are significantly related to online shopping security. Consumer perception has the most significant impact on online shopping security, balancing secure and fast consumption under the guarantee of user experience. Strengthening consumer perception enhances consumers’ ability to process risk information, helping them better identify risks and avoid using hazardous network software, tools, or technologies, thereby reducing potential online security risks.
In order to understand consumer perception, reduce risks in online shopping, and maintain online security, this study employs data envelopment analysis (DEA) to confirm the relationship between evaluation and stimuli. It establishes a model of stimuli-organism response and uses regression analysis to explore the relationships among negative online shopping evaluations, consumer perception of risk, and consumer behavior. This study employs attribution theory to analyze the impact of evaluations on consumer behavior and assesses the role of perceived risk as a mediator. The independent variable is negative comments, the dependent variable is consumer behavior, and logistic regression is used to empirically analyze the factors influencing online shopping security. The results indicate a positive correlation between the number of negative comments and consumers’ delayed purchase behavior, with a correlation coefficient of 41%. The intensity of negative comments significantly impacts consumers’ refusal to make a purchase, with a correlation coefficient of 38%. The length of negative comments substantially influences consumers’ opposition to purchasing, also with a correlation coefficient of 38%. There is a close relationship between perceived risk and consumers’ delayed shopping behavior and the number of negative comments, with 41% and 4% correlation coefficients, respectively. Perceived risk has a relatively smaller impact on consumers’ opposition to purchase behavior, with a correlation coefficient of 27%. The length, intensity, and number of negative comments are correlated with consumers’ opposition, refusal, and delayed consumption, negatively affecting consumer intent. Additionally, negative comments are related to perceived risk and consumer behavior. Perceived risk causally influences consumer behavior, while the convenience of shopping has a relatively minor impact on online shopping security. Factors like delivery speed, buyer reviews, brand, price, and consumer perception are significantly related to online shopping security. Consumer perception has the most significant impact on online shopping security, balancing secure and fast consumption under the guarantee of user experience. Strengthening consumer perception enhances consumers’ ability to process risk information, helping them better identify risks and avoid using hazardous network software, tools, or technologies, thereby reducing potential online security risks.DDoS attack detection in smart grid network using reconstructive machine learning modelshttps://peerj.com/articles/cs-17842024-01-092024-01-09Sardar Shan Ali NaqviYuancheng LiMuhammad Uzair
Network attacks pose a significant challenge for smart grid networks, mainly due to the existence of several multi-directional communication devices coupling consumers to the grid. One of the network attacks that can affect the smart grid is the distributed denial of service (DDoS), where numerous compromised communication devices/nodes of the grid flood the smart grid network with false data and requests, leading to disruptions in smart meters, data servers, and the state estimator, ultimately effecting the services for end-users. Machine learning-based strategies show distinctive benefits in resolving the challenge of securing the network from DDoS attacks. Regardless, a notable hindrance in deploying machine learning-based techniques is the requirement of model retraining whenever new attack classes arise. Practically, disrupting the normal operations of smart grid is really discouraged. To handle this challenge effectively and detect DDoS attacks without major disruptions, we propose the deployment of reconstructive deep learning techniques. A primary benefit of our proposed technique is the minimum disruption during the introduction of a new attack class, even after complete deployment. We trained several deep and shallow reconstructive models to get representations for each attack type separately, and we performed attack detection by class-specific reconstruction error-based classification. Our technique experienced rigid evaluation via multiple experiments using two well-acknowledged standard databases exclusively for DDoS attacks, including their subsets. Later, we performed a comparative estimation of our outcomes against six methods prevalent within the same domain. Our outcomes reveal that our technique attained higher accuracy, and notably eliminates the requirement of a complete model retraining in the event of the introduction of new attack classes. This method will not only boost the security of smart grid networks but also ensure the stability and reliability of normal operations, protecting the critical infrastructure from ever-evolving network attacks. As smart grid is advancing rapidly, our approach proposes a robust and adaptive way to overcome the continuous challenges posed by network attacks.
Network attacks pose a significant challenge for smart grid networks, mainly due to the existence of several multi-directional communication devices coupling consumers to the grid. One of the network attacks that can affect the smart grid is the distributed denial of service (DDoS), where numerous compromised communication devices/nodes of the grid flood the smart grid network with false data and requests, leading to disruptions in smart meters, data servers, and the state estimator, ultimately effecting the services for end-users. Machine learning-based strategies show distinctive benefits in resolving the challenge of securing the network from DDoS attacks. Regardless, a notable hindrance in deploying machine learning-based techniques is the requirement of model retraining whenever new attack classes arise. Practically, disrupting the normal operations of smart grid is really discouraged. To handle this challenge effectively and detect DDoS attacks without major disruptions, we propose the deployment of reconstructive deep learning techniques. A primary benefit of our proposed technique is the minimum disruption during the introduction of a new attack class, even after complete deployment. We trained several deep and shallow reconstructive models to get representations for each attack type separately, and we performed attack detection by class-specific reconstruction error-based classification. Our technique experienced rigid evaluation via multiple experiments using two well-acknowledged standard databases exclusively for DDoS attacks, including their subsets. Later, we performed a comparative estimation of our outcomes against six methods prevalent within the same domain. Our outcomes reveal that our technique attained higher accuracy, and notably eliminates the requirement of a complete model retraining in the event of the introduction of new attack classes. This method will not only boost the security of smart grid networks but also ensure the stability and reliability of normal operations, protecting the critical infrastructure from ever-evolving network attacks. As smart grid is advancing rapidly, our approach proposes a robust and adaptive way to overcome the continuous challenges posed by network attacks.An efficient and straightforward online vector quantization method for a data stream through remove-birth updatinghttps://peerj.com/articles/cs-17892024-01-082024-01-08Kazuhisa Fujita
The growth of network-connected devices has led to an exponential increase in data generation, creating significant challenges for efficient data analysis. This data is generated continuously, creating a dynamic flow known as a data stream. The characteristics of a data stream may change dynamically, and this change is known as concept drift. Consequently, a method for handling data streams must efficiently reduce their volume while dynamically adapting to these changing characteristics. This article proposes a simple online vector quantization method for concept drift. The proposed method identifies and replaces units with low win probability through remove-birth updating, thus achieving a rapid adaptation to concept drift. Furthermore, the results of this study show that the proposed method can generate minimal dead units even in the presence of concept drift. This study also suggests that some metrics calculated from the proposed method will be helpful for drift detection.
The growth of network-connected devices has led to an exponential increase in data generation, creating significant challenges for efficient data analysis. This data is generated continuously, creating a dynamic flow known as a data stream. The characteristics of a data stream may change dynamically, and this change is known as concept drift. Consequently, a method for handling data streams must efficiently reduce their volume while dynamically adapting to these changing characteristics. This article proposes a simple online vector quantization method for concept drift. The proposed method identifies and replaces units with low win probability through remove-birth updating, thus achieving a rapid adaptation to concept drift. Furthermore, the results of this study show that the proposed method can generate minimal dead units even in the presence of concept drift. This study also suggests that some metrics calculated from the proposed method will be helpful for drift detection.A novel fuzzy programming approach for piece selection problem in P2P content distribution networkhttps://peerj.com/articles/cs-16452024-01-032024-01-03M. AnandarajP. GaneshkumarS. NaganandhiniK. Selvaraj
Piece selection policy in dynamic P2P networks play crucial role and avoid the last piece problem. BitTorrent uses rarest-first piece selection mechanism to deal with this problem, but its efficacy is limited because each peer only has a local view of piece rareness. The problem of piece section is multiple objectives. A novel fuzzy programming approach is introduced in this article to solve the multiple objectives piece selection problem in P2P network, in which some of the factors are fuzzy in nature. Piece selection problem has been prepared as a fuzzy mixed integer goal programming piece selection problem that includes three primary goals such as minimizing the download cost, time, maximizing speed and useful information transmission subject to realistic constraints regarding peer’s demand, capacity and dynamicity. The proposed approach has the ability to handle practical situations in a fuzzy environment and offers a better decision tool to each peer to select optimal pieces to download from other peers in dynamic P2P network. Extensive simulations are carried out to demonstrate the effectiveness of the proposed model. It is proved that proposed system outperforms existing with respect to download cost, time and meaningful exchange of useful information.
Piece selection policy in dynamic P2P networks play crucial role and avoid the last piece problem. BitTorrent uses rarest-first piece selection mechanism to deal with this problem, but its efficacy is limited because each peer only has a local view of piece rareness. The problem of piece section is multiple objectives. A novel fuzzy programming approach is introduced in this article to solve the multiple objectives piece selection problem in P2P network, in which some of the factors are fuzzy in nature. Piece selection problem has been prepared as a fuzzy mixed integer goal programming piece selection problem that includes three primary goals such as minimizing the download cost, time, maximizing speed and useful information transmission subject to realistic constraints regarding peer’s demand, capacity and dynamicity. The proposed approach has the ability to handle practical situations in a fuzzy environment and offers a better decision tool to each peer to select optimal pieces to download from other peers in dynamic P2P network. Extensive simulations are carried out to demonstrate the effectiveness of the proposed model. It is proved that proposed system outperforms existing with respect to download cost, time and meaningful exchange of useful information.