Next Article in Journal
Target Localization of a Quadrotor UAV with Multi-Level Coordinate System Transformation Based on Monocular Camera Position Compensation
Previous Article in Journal
A Software-Defined Gateway Architecture with Graphical Protocol Modeling for Industrial Control Systems
Previous Article in Special Issue
Evaluating HAS and Low-Latency Streaming Algorithms for Enhanced QoE
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation

1
Department of Computer Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah 25528, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(22), 4370; https://doi.org/10.3390/electronics14224370
Submission received: 12 October 2025 / Revised: 4 November 2025 / Accepted: 5 November 2025 / Published: 8 November 2025
(This article belongs to the Special Issue Video Streaming Service Solutions)

Abstract

Peer-to-peer (P2P) streaming networks are widely used for large-scale multimedia delivery, but they continue to face challenges related to reliability, security, and scalability. To address these issues, we propose a hybrid framework that integrates distributed software-defined networking (DSDN) with blockchain to provide a more reliable and secure P2P streaming environment. Based on this proposal, we simulated three scenarios using NS-3: P2P with blockchain only, P2P with DSDN only, and P2P with the combined DSDN–blockchain model. Network performance was evaluated through three key metrics: throughput, latency, and energy consumption. Furthermore, the hybrid model’s security was validated under simulated attack scenarios by integrating Intrusion Detection System and Access Control List (ACL) modules within the DSDN controller and an encryption module for data-in-transit. The experiments were conducted under varying numbers of nodes to assess scalability and consistency. Across all network sizes, the hybrid model consistently outperformed the single-technology scenarios. At 50 nodes, for example, the hybrid approach achieved 8–9 percent higher throughput, 5–6 percent lower latency, and 7–21 percent better energy efficiency compared to blockchain or DSDN alone. Overall, the findings demonstrate that combining DSDN and blockchain yields a P2P streaming network with enhanced performance, making the integration highly beneficial for future multimedia streaming applications.

1. Introduction

Peer-to-peer (P2P) streaming has emerged as a promising paradigm for delivering multimedia content to large-scale audiences, eliminating the need for centralized content distribution networks (CDNs). This decentralized model leverages the collective bandwidth of peers to distribute video content more efficiently, thereby reducing server loads and enhancing scalability [1]. With the increasing demand for multimedia services in entertainment, education, and surveillance, there is a growing need for more efficient and reliable P2P streaming solutions [2]. Recent years have witnessed exponential growth in network traffic, primarily driven by streaming video applications, highlighting the need for optimized Internet infrastructure to ensure smooth multimedia transmission. Reports indicate that video streaming accounts for the majority of Internet traffic and this dominance is expected to continue [3]. The rise of modern networking technologies, the expansion of over-the-top (OTT) content providers, and the increasing preference for online streaming over traditional broadcasting have made video transmission the most dominant type of Internet traffic. Video streaming applications account for approximately 66% of global Internet traffic, and live video made up more than 17% of all video traffic in 2023 [4].
However, ensuring reliability, security, and quality of service (QoS) in decentralized P2P environments remains a significant challenge. In recent research, software-defined networking (SDN) and blockchain have been increasingly explored as complementary technologies to address these issues. SDN introduces centralized programmability by decoupling the control and data planes, enabling more adaptive and manageable network configurations [5,6]. This architectural flexibility enables efficient traffic management in dynamic streaming environments [7], while also enhancing scalability and fault tolerance [8]. Meanwhile, blockchain provides decentralized, tamper-proof data storage and secure peer-to-peer interactions, eliminating the need for intermediaries. Its distributed consensus mechanisms and cryptographic integrity have been applied in various domains to enhance trust and transparency [9].
Although SDN–blockchain integration has been explored in domains such as IoT, 5G, and traditional CDNs [5], its joint application in P2P streaming networks remains underdeveloped and often addresses challenges in isolation. Existing research can be broadly categorized into two streams. The first stream leverages SDN to enhance P2P networks by improving traffic management [10], enabling reliable transmission for real-time video [11], or constructing efficient overlays [12]. However, these SDN-centric approaches typically lack a native mechanism for establishing decentralized trust and securing transactions between peers, leaving them vulnerable to malicious activities such as content pollution or peer collusion. The second stream of research employs blockchain to introduce trust and incentive models in P2P systems [13,14] or to optimize blockchain’s own P2P network for faster broadcast [15]. Conversely, these blockchain-focused solutions operate on a relatively static network layer and lack the dynamic, real-time control capabilities needed to guarantee QoS for latency-sensitive video streaming, such as proactive congestion mitigation or SVC-aware routing.
This dichotomy highlights a clear research gap: the absence of a unified architecture that synergistically combines the real-time, QoS-aware control of SDN with the decentralized, tamper-proof security of blockchain, specifically tailored for the high-performance demands of P2P streaming. Prior works have not fully leveraged the potential of having a control plane for dynamic network optimization and a trust plane for secure interactions working in concert. While our previously published study in Electronics [16] presented a comparative analysis of SDN–blockchain integration focusing on performance metrics, it stopped at a high-level comparison without proposing a detailed, implementable framework.
To address this gap, this study makes a distinct contribution by proposing a novel hybrid DSDN–blockchain framework. The key innovation lies in its hierarchical state machine design, which features two decoupled yet synergistic layers: a control plane layer managed by distributed SDN (DSDN) for real-time network orchestration, and a trust plane layer managed by blockchain for decentralized security and automation via smart contracts. This design explicitly tackles the intertwined challenges of performance, scalability, and security in a single, coherent model.
The primary objective of this research is to design, implement, and validate this framework through NS-3 simulations. Our specific goals are as follows:
  • To mitigate transmission delay through SDN real-time traffic optimization and blockchain-automated verification.
  • To manage overhead ratio by leveraging SDN centralized resource orchestration and distributing blockchain consensus load.
  • To ensure transmission security by combining SDN programmable security policies with a blockchain immutable ledger.
  • To quantitatively validate the framework’s efficacy against standalone blockchain and DSDN models by measuring throughput, latency, and energy consumption under varying network scales and security threats.
The remainder of this paper is organized as follows. Section 2 provides a comprehensive literature review and a systematic analysis of the gaps in existing research. Section 3 details the proposed hybrid framework and its operational workflow. Section 4 presents the experimental results and comparative analysis. Finally, Section 5 concludes the paper and outlines future work.

2. Literature Review

This section reviews the state-of-the-art approaches applied in P2P streaming networks, including SDN-based and blockchain-based solutions. It also highlights key research gaps and unresolved challenges in the existing methodologies.
The authors in [17] present a unique hybrid redundancy system that guarantees the consistency of video data in P2P cloud storage while facilitating the fast streaming of video files. Their work makes three primary contributions. First, by using replication and erasure coding simultaneously, both streaming speed and storage capacity utilization can be improved. Second, by dynamically varying the redundancy level of each video data based on its appeal, the number of simultaneous playback requests handled may be minimized while also minimizing the drop in file availability. Third, by using storage capacity effectively and implementing the researchers’ suggested two-phase replacement approach, performance may be further enhanced. Moreover, the authors aim to improve their model and conduct trials with an improved bandwidth allocation, taking into account variables such as network type, location, and device capabilities, to increase the usability of their technique in more diverse network settings. The author in [18] presented a “fuzzy logic-based prediction” technique to forecast, in terms of characteristics such as buffer size and bandwidth, the system of control that would be suitable for the desired peers. Depending on which threshold layer the model predicts, the model uses alternative control strategies in the event of a flash crowd. These include preserving system resources, giving top-performing peers precedence, rejecting the requests of the lowest-performing peers, and somewhat lowering service quality. They also describe peers’ credit scores, which indicate their respective achievements. However, the suggested solution has a high level of overall complexity.
The integration of SDN and blockchain is being actively explored to create robust security architectures beyond streaming. For instance, the author in [19] proposes an optimized, energy-efficient blockchain-based SDN framework for the IoT, which uses a trust-based classifier to handle and reduce malicious traffic, demonstrating improved throughput and energy efficiency [19]. Building on this, the author in [20] presents an AI-empowered, blockchain-and-SDN-integrated security architecture for the IoT, which uses a cluster-based routing protocol and distributed authentication to outperform traditional protocols in energy consumption and network throughput [20].
The author in [21] designed a “software-defined mobility architecture for NDN”, extending the SDN paradigm to facilitate NDN architecture mobility handling. Additionally, the software-defined mobile design for NDN, specifically addressing “intra-domain and inter-domain changeover management situations,” is explained. This includes a demonstration of the “Mininet and Opnet” scenarios with enhanced security. To reduce packet loss, the authors of [11] suggested the use of SDN switches with a retransmission mechanism that includes a buffering agent. Furthermore, the framework enhances practicality and dependability by utilizing SDN controllers to provide a reliable UDP structure for efficient data transport. Furthermore, the existing context has wide application to UDP streams, even if it does not expressly handle multimedia-specific optimizations or video frame prioritization. It is believed that incorporating these additional methods will significantly enhance the effectiveness of their work; therefore, the researchers wish to investigate them further in their subsequent studies. Beyond trust and security, the underlying P2P topology significantly impacts performance. The author in [12] presents a decentralized multi-venue real-time video broadcasting system that employs a novel P2P chain topology over IPv6 with intelligent self-healing mechanisms. This approach achieves substantial improvements in latency, video quality stability, and fault tolerance, demonstrating the performance gains possible with optimized overlays tailored for real-time streaming [12]. At the intersection of P2P networks and lightweight security, the author in [22] proposes a Physical Unclonable Function (PUF)-based mutual authentication and key exchange protocol for P2P IoT applications. This protocol allows two resource-constrained devices to authenticate each other directly without storing challenge–response pairs, providing a lightweight security solution resistant to replay and man-in-the-middle attacks.
FRING, a geography-based P2P overlay network for quick and reliable broadcast in blockchain systems, is presented in [23]. Three key characteristics of FRING are its rapid convergence, reduced message redundancy, and adequate resilience. FRING develops the network architecture by taking geographical closeness into account, which reduces convergence time. A new broadcast technique, based on the FRING topology, is proposed that reduces message redundancy while maintaining sufficient resilience. Reducing the possibility of topological inference via traffic pattern analysis is a significant task. FRING utilizes Intel SGX to ensure that nodes operate in an integrity-preserving manner and incorporates pattern obfuscation to thwart traffic pattern analysis. Additionally, by modeling the per-hop network latency fluctuations depending on the abstract length between every two nodes, large-scale tests are conducted in AWS data centers within a single region. It is widely recognized that simulating realistic networks is a challenging task. In [24], the author examines the “socio-technical interaction and mechanism for sustainable peer-to-peer (P2P)” energy trading from three perspectives: the social perspective, which focuses on the collaboration of multi-level marketplace players; the technical perspective, which emphasizes the exchange of advanced flexibility; and the financial perspective, which examines cooperative decentralized/regulated marketplaces.
There are three inquiries in this study: How does the operational structure in the P2P trading of energy achieve interoperable markets with the formation of P2P energy communities and the injection of multi-scale adaptability services? How does the use of ICT enable the co-creation of decentralized, diverse, user-centered digital frameworks to support large-scale P2P trading interaction? What services related to energy motivate international relationships for the exchange of multiple scales of P2P flexibility? The interplay among these factors may result in several problems, including the settlement issue. Furthermore, recent advances have refined the concept of blockchain-based incentivization. The author in [25] proposes a framework for blockchain-based P2P content delivery with monetary incentivization and fairness. Their FairStream protocol ensures that deliverers are paid proportionally to their in-time delivery, guaranteeing fairness for all parties even under collusion, which addresses critical trust issues in ad hoc P2P settings.
In [26], the author proposes a blockchain network design that ensures flexibility, fast reconfigurability, compactness, and efficient clustering, while reducing topology management overhead. To achieve this, they apply the SDN paradigm, where a secure overlay of synchronized servers takes control of the P2P topology, rather than the peers themselves. This overlay is built using random r-out digraphs and analyzed through binomial distribution and preferential attachment models to maintain a stable structure. The design sets controlled limits on inbound and outbound links to ensure connectivity while reducing peer load. Key network properties such as connectedness, diameter, and clustering are also examined. Finally, the system is designed to dynamically adjust the network’s structure based on usage needs, allowing the P2P layer to scale and adapt in practical scenarios.

2.1. Comparison with Recent SDN–Blockchain Integrations

While recent studies have made significant strides in integrating SDN and blockchain, key gaps remain for P2P streaming applications. For instance, in [26], the SDN paradigm is successfully applied in the management of blockchain P2P topologies for efficiency, but it does not address the specific QoS demands of real-time video streaming such as dynamic bandwidth allocation for SVC layers. Similarly, in [15], BlockP2P-EP enhances blockchain broadcast using trust and clustering but lacks the dynamic network control provided by SDN to proactively mitigate latency and congestion. Our work bridges this gap by proposing a unified control–trust layer that leverages both DSDN for real-time, QoS-aware traffic engineering and blockchain for decentralized security and incentives, creating a holistic solution tailored for the high-throughput, low-latency requirements of P2P video streaming. Table 1 summarizes the literature survey.
The analysis in Table 1 clearly demonstrates that while individual studies make progress in specific areas, none provide a holistic solution.

2.2. Existing Integrations and Gaps in Current Research

This section outlines some of the specific issues addressed in previous work. The majority of the problems faced by existing works are related to security issues, load balancing issues, and other concerns. Some of the specific difficulties encountered in previous works are described below.
The authors in [27] analyze the behavioral characteristics of P2P using formal verification approaches. To determine whether every potential activity within P2P streaming systems complies with the established criteria, temporal logic is used. The researchers use model checking to verify that the temporal characteristics of the suggested system meet the requirements and to assess the coherence, fullness, and confidence of the model. However, in this research, a transmission delay failure occurred.
In [28], a novel approach to reducing content pollution in peer-to-peer networks that transmit live video is proposed and comparison-based diagnostics are employed. This comprehensive approach effectively prevents the spread of contaminated information. Peers use the method to identify and steer clear of pollutants independently. Fireflies is a scalable overlay network on which the solution is built. The primary concerns include the fact that the research focuses on analyzing dynamic and self-adaptive monitoring, which can increase or decrease in runtime based on system load.
An “incentive-aware pricing game for interest-based socially aware forwarding” in DTNs is presented in [29]. To improve content distribution in DTNs, the researchers construct a price game between nodes based on the Rubinstein Bargain model. Based on three factors—the social strength of the communication nodes, message value, and remaining battery life—the authors determine the price and degree of collaboration. Moreover, the suggested technique enables nodes to exchange information peer-to-peer, thereby improving the dissemination of large messages in such networks. However, when the number of nodes increases, the overhead ratio rises slightly.
To reduce the burden on the SDN control plane, the author in [30] sought to enhance the general performance of TC by choosing a pertinent FS using the SL approach. To achieve this, the authors recommend the following actions. First, the Boruta FS mechanism should be used. Second, the authors suggest three streaming-based TC techniques for SDN: “k-nearest neighbor with adaptive sliding window detector (KNN-ADWIN), adaptable random forest (ARF), and Hoffding adaptive trees (HAT)”. These methods can reduce the overhead of the SDN controller by dynamically managing concept drift and resolving issues related to memory and time usage. Third, the performance of the suggested FS and streaming TC is assessed using both artificial and actual traffic traces. The primary concern of this research is that the approach needs to be validated across heterogeneous network topologies to confirm its efficiency and scalability.
A trust-enhanced blockchain P2P architecture that considers communication rate and transmission dependability was established in [15]. Transmission dependability indicates whether the transmission rate varies significantly over erratic network connections, while the transmission rate itself indicates how quickly blocks and transactions are distributed throughout a blockchain network. “BlockP2P-EP”, a unique “trust-enhanced blockchain topology”, is presented in this study to retain transmission reliability while accelerating transmission pace. BlockP2P-EP first manages the “geographical proximity sensing clustering”, which groups proximity peer nodes into clusters using the K-Means method. Subsequently, the node attribute classification-based hierarchical topological structure guarantees robust connections and a compact diameter. The authors suggest creating a network architecture that is strengthened by trust. BlockP2P-EP implements the parallel spanning tree broadcast technique on top of a trust-enhanced blockchain architecture, providing rapid data broadcast across nodes within and between clusters. To lessen the network burden, a proper node inactivation detection technique is implemented. To confirm the legitimacy of the BlockP2P-EP protocol, the researchers meticulously create and execute a blockchain network simulator. However, despite enhancing the efficiency of the existing blockchain network, BlockP2P-EP prioritizes both transmission speed and reliability, but does not correctly validate the data in transmission. This represents a lack of transmission security.

2.3. Integrated SDN–Blockchain Solution for P2P Streaming

The integration of SDN into P2P streaming networks significantly enhances scalability, enables system load optimization, and reduces communication delays. By leveraging SDN programmability and centralized control, these networks can dynamically adapt to various topologies while maintaining performance. At the same time, security issues in P2P streaming can be effectively mitigated through SDN’s centralized policy enforcement and flow control. On the other hand, blockchain contributes secure data distribution, end-to-end encryption, immutable audit trails, and decentralized trust mechanisms. These features reinforce transmission security and improve the integrity of communication in P2P systems.
The collaboration between SDN and blockchain yields highly efficient, secure, and resilient peer-to-peer (P2P) streaming. Together, they provide a robust architecture that addresses both latency and security challenges, ensuring a scalable and reliable user experience.

3. Proposed Work

We propose a novel hybrid framework that integrates distributed software-defined networking (DSDN) with blockchain technology to address key challenges in peer-to-peer (P2P) streaming systems. The framework is conceptualized as a hierarchical state machine with two synergistic control layers: a control plane layer (managed by DSDN) and a trust plane layer (managed by blockchain). This bifurcation allows for the decoupling of network efficiency from transactional security, enabling independent optimization and robust integration. The overall architecture, operates on the following hierarchical principle:
Control plane layer (DSDN): This layer is responsible for real-time network intelligence and orchestration. The distributed SDN controller maintains a global view of the network topology, monitors link states, and executes dynamic traffic engineering. Its functions include the following:
  • Path computation: Calculating optimal low-latency paths for media streams.
  • Traffic scheduling: Rerouting flows dynamically to avoid congestion.
  • QoS-aware routing: Prioritizing traffic based on application requirements.
  • Security policy enforcement: Implementation of proactive security via intrusion detection system (IDS) access control list (ACL) modules integrated directly into the controller.
Trust plane layer (blockchain): This layer provides a decentralized trust anchor for the P2P network. It manages secure identities, records all transactions immutably, and automates enforcement through smart contracts. Its functions include the following:
  • Peer authentication and authorization: Verifying the identity of participating nodes.
  • Immutable logging: Recording all data block requests, transfers, and peer reputations.
  • Smart contract execution: Automating processes like trustworthy peer discovery and incentive distribution.
  • Data-in-transit security: Leveraging cryptographic modules for securing communication channels.
The operational flow of the proposed system is illustrated in Figure 1, which presents a sequence diagram describing the interaction between the DSDN control plane and the blockchain ledger. The process begins when a peer (Peer A) requests a specific data block. This request is intercepted by the local SDN switch and forwarded to the distributed controller, which maintains a global view of the network. Before routing the request, the controller consults a blockchain-based smart contract to identify a trustworthy peer (Peer B) that holds the required resource. The smart contract uses historical transaction records to evaluate the reputation of Peer B. Once validated, the controller computes the optimal communication path and initiates data transfer over the DSDN-managed route. Upon successful transmission, the transaction is logged on the blockchain ledger, updating Peer B’s reputation score to encourage future cooperation and trust.
To implement this vision, the framework is decomposed into three major modules, as detailed below. Additionally, this study integrates established techniques, such as GPSC clustering and SHNT topology formation, into a unified simulation framework, enabling, for the first time, a practical evaluation of their combined effectiveness in decentralized P2P streaming—something not explored in our prior analytical study [16].

3.1. Hierarchical Model

To provide a rigorous theoretical foundation for our framework, we model the proposed system as a hierarchical state machine composed of three distinct planes: the control plane, the data plane, and the trust plane. This abstraction decouples the system’s concerns, allowing for independent analysis and verification of each layer’s logic and interactions.
  • Control plane (CP): This plane, managed by the distributed SDN (DSDN) controllers, is responsible for global network intelligence and real-time orchestration. It maintains the global view of the network topology and link states. Its states can be defined as S c p   =   G ,   L ,   F , where G is the network graph, L is the set of real-time link states, and F is the set of active flows.
  • Data plane (DP): This plane consists of the underlying network infrastructure that forwards traffic based on rules installed by the control plane. Its state is the collective state of all forwarding devices and data streams.
  • Trust plane (TP): This plane, managed by the blockchain, provides a decentralized trust anchor. Its state is the immutable, cryptographically secured ledger, represented as S t p = B 0 , B 1 , , B n , a chain of blocks containing transactions, peer reputations and smart contract code. The synergy between the control and trust planes is the core innovation of our framework. We define a state transition function δ that governs the system’s behavior in response to an event. The transition is not solely dependent on the control planes state: it is also conditioned on the state of the trust plane.
S c p t + 1 ,   S t p t + 1 = δ S c p t ,   S t p t ,   e
This function can be decomposed into the following coordinated workflow, which is also illustrated in the sequence diagram of Figure 1:
  • Event trigger: A peer P i requests a data block D k . This event e   =   P i ,   r e q u e s t ,   D k is intercepted by the local SDN switch and forwarded to the DSDN controller.
  • Trust verification: The control plane queries a smart contract in the trust plane to identify a trustworthy peer P j that possesses D k . The smart contract executes a reputation function R P j based on historical data in S t p .
    P j = arg max P ϵ P R P subject   to   P D k
    where P is the set of all peers and R P is the reputation score of peer P .
  • Control decision: Upon receiving a validated P j from the trust plane, the control plane computes the optimal path π * using a QoS-aware routing function Q G ,   L ,   P i ,   P j that minimizes latency and avoids congestion.
    π * = Q G ,   L ,   P i ,   P j
  • State update: The control plane installs forwarding rules on the data plane to enable the transfer of D k from P j to P i via path π * . Upon successful transmission, a transaction T x confirming the delivery is committed to the blockchain, updating the trust plane state S t p and incrementing P j reputation.
    S t p t + 1 = S t p t T x
This formal model ensures that every data flow is predicated on a verified trust relationship, and every successful transaction reinforces the trust model, creating a feedback loop that enhances both security and efficiency.

3.2. SDN-Enhanced Peer-to-Peer Network

Integrating software-defined networking (SDN) into peer-to-peer networks enables the efficient management of network resources and dynamic adaptation to changing conditions, thereby enhancing scalability and reliability and reducing delay. The primary aspects of the flow are outlined below.
  • Network construction.
  • Traffic scheduling.
  • Interconnected bandwidth allocation.
  • Enhanced QoS routing.

3.2.1. Network Construction

The suggested architecture offers high bandwidth, low latency, and management accessibility by establishing direct, dedicated communication lines between nodes using a point-to-point topology.

3.2.2. Traffic Scheduling

The traffic scheduling strategy, summarized in Figure 2, leverages the SDN controller’s global view of the network topology and real-time link load. Let F ( B ) and F ( D ) represent the traffic demands of nodes B and D , respectively both transmitting to destination node C . If the traffic load F ( B ) exceeds the capacity of the shortest path b c , causing congestion, a portion of this traffic can be rerouted via paths b d and d c . This multi-commodity flow issue is managed by the SDN controller, which dynamically allocates traffic to different connections by selecting independent output ports for each flow, subject to the capacity constraints of each network link. In Figure 2 the arrows indicate data flow paths: the blue arrow represents the primary congested path, while the green arrow shows the alternative traffic route allocated by the SDN controller to alleviate congestion.
B ( b d ) and B ( b c ) denote the flows that node B transmitted on connections b d and b c , respectively. The traffic transmitted by node D on link d c is denoted as D ( d c ) . The network performance may be negatively impacted by flows directed at the same node, congesting the same connection. The SDN controller can selectively choose the independent output ports for each flow and allocate traffic to various connections, as it has a global topology view and is aware of the real-time load on each link. In network flow theory, this is recognized as a multi-commodity flow problem. In current technologies, ports and interfaces can be utilized in a one-to-many correlation to accomplish dynamic link consolidation between connected switches, which can offer better controllability and flexibility by configuring forwarding gadgets in a bond mode (“enabling the LACP protocol”). While it is essential to ensure that a stream is delivered in the same manner for delay-sensitive applications, dividing a stream into multiple paths has no significant impact on other applications.

3.2.3. Interconnected Bandwidth Allocation

The interconnected bandwidth allocation model is illustrated in Figure 3. This scenario is fundamental to P2P networks and critically differentiates streaming from simple file sharing. In a classic P2P file sharing system, the primary goal is eventual, complete download. Bandwidth allocation can be more opportunistic, and temporary unfairness has a lesser impact on the end-user experience. However, in P2P streaming, the goal is the continuous, real-time, and timely delivery of data blocks to sustain video stuttering, buffering, and poor quality of experience (QoE). The scenario in Figure 3 depicts this core challenge: nodes B and D are simultaneously transmitting data to node C . Consequently, the peer-to-peer (P2P) connections B C and D C must compete for the available bandwidth on C access link.
This allocation is governed by an internal incentive mechanism, analogous to those found in systems such as BitTorrent. Node C evaluates the historical contributions of nodes B and D based on the volume of data each has previously uploaded to it. If the quantity of data received from node B over connection B C is insufficient for a sustained period, node C will assign it a lower priority. This may result in node C reducing its upload rate to node B or severing the connection entirely in favor of establishing links with more cooperative nodes. The SDN switches then use the specified output ports to execute this traffic scheduling, thereby implementing the intended bandwidth allocation plan. To realize these advanced quality of service (QoS) functions, the OpenFlow switch can be integrated with the Linux kernel’s traffic control module, supporting sophisticated policies such as hierarchical flow classification and bandwidth rate limiting. This SDN-driven enforcement of a streaming-aware incentive mechanism is crucial for maintaining low-latency, high-throughput data delivery and ensuring a fair and stable streaming environment for all participating peers.
The SDN controller defines each flow and populates the flow tables on the SDN switches. These switches then use the specified output ports and queues to execute traffic scheduling, thereby implementing the intended bandwidth allocation plan. To realize advanced quality of service (QoS) functions, the Open switch can be integrated with the Linux kernel’s traffic control module (Hierarchical Token Bucket), supporting sophisticated policies such as hierarchical flow classification and bandwidth rate limiting.

3.2.4. QoS-Aware Routing Mechanism

The proposed QoS routing technique is illustrated in Figure 4. It depicts a scenario where scalable video coding (SVC) data is transmitted from a source node B to destination node C . In a traditional peer-to-peer (P2P) system, all data would typically follow a single, identical path.
In contrast, the SDN-enabled QoS routing method allows for dynamic and differentiated path selection. The SDN controller continuously monitors the network and can select a path with higher available bandwidth, such as b d   a n d   d c   , for transmitting the crucial base layer of the SVC stream. Simultaneously, a shortest-path-first algorithm can be used to route enhancement layers along a faster, lower-latency path, like b c .
A fundamental metric for this routing is the bottleneck bandwidth, as it dictates the path’s maximum data transfer rate. In P2P streaming, the efficiency of transferring media blocks—measured by their timely and complete arrival—is the primary factor governing the user’s quality of experience (QoE). While traditional metrics such as delay and jitter are necessary, their impact is indirect, as they influence the transmission efficiency of this block, which ultimately governs video playback fluency.

3.3. Integration of Blockchain into Peer-to-Peer Network

The BlockP2P protocol enhances blockchain operations over a P2P network through three core components: node clustering, topology creation, and broadcast optimization. The overall architecture of the BlockP2P protocol, which enhances blockchain operations over a P2P network, is summarized in Figure 5.
The architecture operates through a structured, three-stage workflow:
Input and clustering: The process begins with the entire set of network nodes as input. The Geographical Proximity Sensing Clustering (GPSC) algorithm. Using network latency as a proxy for distance, GPSC partitions the nodes into several distinct, geographically proximal clusters. This step is crucial for reducing intra-cluster communication latency.
Topology construction: Within each cluster formed by GPSC, the Structured Hierarchical Network Topology (SHNT) mechanism, described in Section 3.3.2, organizes nodes into a hierarchical structure. This involves the following:
  • Electing a core node that maintains the full blockchain and manages cluster operations.
  • Connecting regular nodes to their closet core node.
  • Forming a robust, Haray-like network among the core nodes within a cluster to ensure resilience and efficiency.
  • Electing a routing node from the pool of core nodes in each cluster. This routing node is responsible for all inter-cluster communication.
Optimized broadcast: The parallel spanning tree broadcast (PSTB) mechanism, outlined in Section 3.3.3, leverages the established topology for efficient data dissemination. The process is two-fold:
  • Inter-cluster broadcast: When a routing node in one cluster receives a new block or transaction, it immediately forwards it in parallel to all other routing nodes across the network. This ensures rapid, network-wide propagation at the inter-cluster level.
  • Intra-cluster broadcast: Upon receiving data, a routing node initiates a broadcast within its own cluster. Instead of using a gossip protocol that generates significant overhead, the data is disseminated along a pre-computed spanning tree rooted at the routing node. This method is highly efficient and minimizes redundant messages within the cluster.

3.3.1. Node Clustering via Geographical Proximity Sensing Clustering (GPSC)

To manage network complexity and reduce latency, the BlockP2P protocol employs the GPSC algorithm to partition nodes into geographically proximal clusters. Using network latency as a proxy for Euclidean distance, GPSC applies a K-Means variant to group nodes to optimize cluster efficiency with inter-cluster overhead. The GPSC algorithm proceeds in three phases:
  • Phase 1: Cluster Center Selection. A computationally efficient method is used to select initial cluster centers, avoiding the O ( N 2 ) overhead of measuring all node pairs. From a candidate subset of nodes, the algorithm iteratively selects the K most dispersed nodes as centers.
  • Phase 2: Aggregation Node Election. Within each nascent cluster, an aggregation node C a g g r e is elected. This node acts as a local coordinator, responsible for intra-cluster management and serving as a gateway for inter-cluster communication. Its location is determined using a network coordinate system (NCS) to approximate the geometric center of the cluster, minimizing average latency to all cluster members. The node whose NCS coordinates are closest to this calculated center is designated the C a g g r e .
  • Phase 3: Cluster Formation. All remaining nodes are assigned to a cluster by minimizing a weighted objective function (Equation (3)) that considers both the distance to a cluster center d 1 and the distance from that center to its aggregation node d 2 . This ensures that clusters are not only tight-knit but also centered around a well-positioned coordinator. The formal steps for phases 1 and 2 are presented in Algorithm 1.
Algorithm 1: GPSC cluster center and aggregation node selection
Input: Set of all nodes N , number of clusters K
  • Phase 1: Center selection
  • Let C a n d i d a t e S u b s e t be a random subset of nodes from N .
  • Find the two nodes in C a n d i d a t e S u b s e t with the maximum pairwise latency.
  • For  1 = 3 to K do
  • Find the node in C a n d i d a t e S u b s e t with the maximum distance to any node in S .
  • Add this node to S and remove it from C a n d i d a t e S u b s e t .
  • End for
  • Phase 2: aggregation node selection
  • For each cluster S i in S  do
  • Using NCS, calculate the geometric center coordinates C ¯ a g g r e i , for the cluster led bu S i
  • Select the node C a g g r e , whose NCS coordinates are closest to C ¯ a g g r e i .
  • End for
  • Return  S ,   C
This structured approach reduces the overall algorithmic complexity to O ( K N ) , enabling rapid re-clustering in response to network churn.
  • Choice of Aggregation nodes
The assistance nodes, known as aggregation nodes C a g g r e , each of which is situated in the geometric center of a cluster, is selected to guarantee that all of the cluster centers are dispersed equally. Calculating C a g g r e only based on the network delay between two nodes is challenging. As a result, GPSC uses the network coordinate system (NCS) approach to determine C a g g r e . Using Equation (5), GPSC first assigns a network coordinate to each cluster center node.
F H S 1   , ,   H S k = S i , S j     S 1 , , S k , i > j d S i S j ,   d ¯ S i , S j
where ε stands for the error function that measures the discrepancy between actual and coordinate-based distances; d and d ¯ stand for the network distances among two nodes in the real system and the network coordinate scheme, respectively; and S i and H illustrate the cluster centers and the cluster center network coordinates, respectively. This equation serves as the optimization objective for the network coordinate system. It quantifies how accurately the virtual coordinate space H S 1   , ,   H S k represents the actual network topology. By minimizing this function, GPSC ensures that distances in the coordinate system closely approximate real network latencies, which is crucial for correctly identifying the geometric center of each cluster. Once the geometric center coordinates, C ¯ a g g r e , are obtained, GPSC selects the cluster aggregation node using Equation (6).
C a g g r e = D m i n H S i ,   C ¯ a g g r e ,   S i S 1   , . ,   S k
where illustrates the matching function of the cluster aggregation node, D m i n denotes the minimum network distance between two nodes in NCS, and C ¯ a g g r e means the geometric center coordinates.
  • Network Clustering
Relying on the above prerequisites, GPSC finally clusters all of the nodes, permitting an objective function D X i , S j in Equation (7).
D X i , S j = 1 ×   d 1 X i , S j + 2 ×   d 2 S j   ,   C a g g r e ,   1 + 2 = 1
where d 1 is the distance between a node ( X i ) and a center ( S j ) , and d 2 is the distance between the center and an aggregation node C a g g r e . X i and S j stand for the general node and the center node, respectively. Moreover, there are two weight factors: 1 and 1 . The resilience of the system is enhanced by GPSC’s ability to reduce algorithm complexity from O ( N 2 ) in BCBPT to O ( K     N ) . This allows for quick node re-clustering in response to potential network changes.

3.3.2. Topology Construction

The execution of the GPSC algorithm may result in clusters containing hundreds of nodes. Hence, a key challenge is enabling each node to identify a small, optimal subset of peers within its cluster to establish efficient neighbor lists. To address this, we adopt the Structured Hierarchical Network Topology (SHNT) approach, which is designed to achieve both low network diameter and high connectivity. The SHNT mechanism comprises two key procedures: network initialization and network maintenance.
After the clustering phase, the SHNT technique constructs a scalable and efficient topology by assigning specific roles to nodes within each cluster.
Leaf nodes: These are SPV (Simplified Payment Verification) nodes responsible for initiating transactions.
Core nodes: These are full nodes tasked with maintaining the blockchain, managing the associated leaf nodes, and forwarding blocks or transactions within their respective clusters.
Routing nodes: A selected subset of core nodes (one per cluster), determined using a secure hash function of their node IDs, are designated to handle inter-cluster data forwarding.
The establishment of the SHNT involves three main phases:
  • Connecting each leaf node to its closest core node based on proximity or latency.
  • Forming a resilient Harary-like network among the core nodes to ensure optimal intra-cluster communication.
  • Selecting routing nodes that facilitate secure and efficient communication across clusters.
Additionally, an autonomous maintenance procedure ensures that cluster sizes remain stable around O(log N) by dynamically adjusting cluster boundaries. This is achieved by splitting oversized clusters or merging undersized ones according to predefined scalability thresholds.

3.3.3. Parallel Spanning Tree Broadcast (PSTB)

The PSTB mechanism optimizes data dissemination by parallelizing broadcasts within and between clusters.
  • Inter-cluster broadcast: Routing nodes maintain a route table of all other routing nodes. Upon receiving data, a routing node immediately forwards it to all other routing nodes in parallel, enabling rapid network-wide propagation. For fault tolerance, a backup core node is assigned to each routing node.
  • Intra-cluster broadcast: To avoid the overhead of gossip protocols, data is broadcast within a cluster along a spanning tree rooted at the routing node. A center-based approach is used to construct and regularly update the spanning tree table, ensuring efficiency despite network churn.

3.4. Integrating SDN and Blockchain into a Peer-to-Peer Network

The integration of blockchain and software-defined networking (SDN) addresses the core challenges of reliability, security, and scalability in P2P streaming by leveraging their complementary strengths. This synergy creates a robust framework that enhances network management, secures transactions, and optimizes resource utilization. The integrated benefits are categorized below.

3.4.1. Mitigation of Transmission Delay

The hybrid framework directly targets latency reduction through coordinated action:
  • SDN’s role: The centralized SDN control plane enables real-time network monitoring and dynamic adaptation. It can instantly reroute traffic and reallocate bandwidth in response to congestion, minimizing delay and preventing packet loss.
  • Blockchain’s role: Blockchain provides a tamper-proof ledger for recording transactions. Smart contracts automate processes such as delivery verification and settlement, ensuring timely and reliable packet delivery without the need for protracted inter-peer negotiations, thereby reducing transactional latency.

3.4.2. Management of Overhead Ratio

The architecture ensures scalable efficiency as the network grows:
  • SDN’s role: SDN’s centralized orchestration optimizes resource allocation and path selection. Through intelligent traffic scheduling and dynamic reconfiguration, it eliminates redundant overhead and mitigates congestion, preserving streaming quality at scale.
  • Blockchain’s role: Blockchain distributes the computational load of consensus and transaction validation across all participating nodes. This decentralized approach prevents any single node from becoming a bottleneck, ensuring that the verification workload remains manageable as the network expands.

3.4.3. Validation Across Diverse Network Topologies

The combination provides a robust foundation for rigorous evaluation:
  • SDN’s role: SDN’s flexibility allows for the dynamic reconfiguration of the network environment. This enables efficient simulation and practical experimentation across various topological structures, which is crucial for assessing the scalability and robustness of the proposed model.
  • Blockchain’s role: Blockchain ensures the trustworthiness of validation data. An immutable ledger records all performance metrics and evaluation results, making findings verifiable and tamper-proof. Smart contracts can further automate testing protocols, standardize methods, and reduce manual overhead.

3.4.4. Assurance of Transmission Security

Security is enhanced through a layered, synergistic approach:
  • SDN’s role: The centralized control plane allows for the implementation of dynamic security policies. This includes enforcing encryption rules, deploying network-wide Intrusion Detection Systems (IDSs), and managing Access Control Lists (ACLs) to prevent unauthorized access and mitigate breaches.
  • Blockchain’s role: Blockchain provides a foundational layer of security through cryptographic techniques and decentralized consensus. Every transaction is cryptographically signed and recorded on an immutable ledger, creating a tamper-proof audit trail that ensures transparency and security. The consensus mechanism ensures network-wide agreement on data validity, eliminating single points of failure and making the system highly resilient to attacks.

3.4.5. Synthesis of the Integrated Architecture

The overall architecture (Figure 6) leverages SDN for dynamic, centralized network control—facilitating efficient traffic scheduling, bandwidth allocation, and QoS-aware routing. Concurrently, blockchain introduces a decentralized trust layer, ensuring transaction integrity and security through immutable logging and smart contracts.
An integrated incentive mechanism is key to this synergy. Blockchain can reliably track peer contributions (e.g., bandwidth shared, data forwarded). The SDN controller can then use this information to dynamically prioritize traffic and allocate resources to well-behaved peers, as governed by smart contract rules. This rewards cooperation and discourages malicious activity. Furthermore, blockchain’s decentralized nature enhances SDN’s QoS capabilities by enabling trustless routing decisions. The network can prioritize paths based on verified performance data and available bandwidth without relying solely on a central authority’s perspective.
This study complements our previous work [16] by re-evaluating the proposed framework under multiple configurations—blockchain-only, SDN-only, and the combined SDN–blockchain integration—within the same simulation environment and variable set. Unlike the prior comparative analysis, which focused on benchmarking performance across existing models, this study examines the implementation behavior and interaction dynamics of each configuration to provide deeper insights into scalability, security, and reliability.
In conclusion, the integration of SDN and blockchain into peer-to-peer (P2P) networks offers a comprehensive solution. It synergizes SDN’s operational efficiency with blockchain’s transactional security and trust to create a scalable, reliable, and high-performance streaming environment.

4. Results

This section assesses the effectiveness of the proposed DSDN–blockchain framework for secure and efficient peer-to-peer (P2P) streaming network management. It is structured into three parts: (1) the simulation setup and (2) a comparative analysis across three architectural scenarios, and (3) security performance validation.

4.1. Experimental Setup

We implemented the proposed framework in the NS-3.26 network simulator to evaluate its performance under controlled and scalable conditions. NS-3.26 was selected for its high-fidelity modeling of network protocols, customizable node behaviors, and proven capability to simulate both SDN and blockchain interactions, making it a standard in networking research for reproducible experiments.

4.1.1. Network Topology and Node Distribution

The network topology, illustrated in Figure 7, was constructed as a hybrid P2P-SDN infrastructure. This design reflects a realistic scenario where a programmable backbone, managed by SDN switches and controllers, interconnects a dynamic swarm of end-user peers. To rigorously assess scalability, the number of user nodes was varied from 10 to 50. This range was chosen to represent a scalable P2P swarm, moving from a small collaborative group to a medium-sized network, allowing us to observe performance trends without the excessive computational overhead of simulating thousands of nodes. The quadratic growth in potential connection states (O(N2)) with increasing node count makes this a critical factor for evaluating the scalability of each architecture. Nodes were randomly distributed within a logical address space to simulate a non-uniform network, and connections were established based on a hybrid logic combining random peer discovery with proximity-based preferences.

4.1.2. Traffic Model and Link Characteristics

The traffic model was designed to emulate real-world video-on-demand (VoD) streaming. Each peer generated a constant bit rate (CBR) video stream using UDP packets. A packet size of 1024 bytes was used, which is a common size for video data chunks, and the inter-packet interval was calibrated to generate a stream of 500 kbps per source, representing a standard-definition video stream. This model provides a consistent and measurable load to evaluate the network’s ability to handle sustained media flows. The links between the SDN switches and the core network were configured with a data rate of 1 Gbps and a latency of 2 ms, simulating a high-speed backbone. The access links connecting user nodes to the switches were set with a data rate of 100 Mbps and a latency of 5 ms, representing typical broadband or high-speed cellular access. A minimal packet loss rate of 0.1% was introduced on all links to model realistic, imperfect network conditions and to test the framework’s resilience beyond ideal scenarios.
The performance metrics: Throughput (T), latency (L), and energy consumption (E) were modeled against the number of nodes (N) using the fundamental relationships defined in Equations (8)–(10) (see Section 4.2), providing a mathematical basis for our scalability analysis. The specific hardware and software configurations for the simulation host are detailed in Table 2. The DSDN controllers were implemented with integrated security modules, including an Intrusion Detection System (IDS) for anomaly detection, Access Control Lists (ACLs) for policy enforcement, and an AES encryption module for securing data-in-transit, as validated in Section 4.3. These parameters, summarized in Table 3, collectively create a demanding environment that challenges the streaming framework’s efficiency and reliability.

4.2. Comparative Analysis

Three scenarios were compared: (i) blockchain-only, (ii) DSDN-only, and (iii) the hybrid DSDN–blockchain model. The impact of increasing the number of nodes on energy consumption, throughput, and latency for each scenario is plotted and analyzed below.

4.2.1. Analysis of Energy Consumption (j)

Energy efficiency is a crucial factor in the scalability of P2P streaming systems. As the number of participating peers increases, both computational and communication overheads rise, resulting in higher energy demands. In distributed P2P streaming systems, energy consumption ( E ) generally increases with the number of nodes ( N ) due to added processing and communication overhead. This trend can be approximated as a quadratic, expressed as
E = k × N 2
where k is a constant factor. This trend highlights the need for architectural enhancements to reduce unnecessary transmissions.
The results in Table 4 and Figure 8 demonstrate a clear differentiation in energy efficiency. The blockchain-only configuration consumed between 30 and 140 joules. The DSDN-only setup performed better, ranging from 28 to 118 joules. In contrast, the hybrid DSDN–blockchain configuration achieved the most efficient performance, with consumption values ranging from 25 to 110 joules. This improvement is attributed to the hybrid design: SDN controllers minimize control overhead through intelligent traffic direction, while blockchain mechanisms reduce redundant operations by establishing trust relationships and ensuring data consistency.

4.2.2. Analysis of Throughput (kbps)

Throughput ( T ) , representing the rate of successful data delivery, often follows a logarithmic growth model with respect to the number of peers ( N ) , expressed as
T = a × log N + b
where a and b are empirical constants. This model highlights the importance of architectures that can sustain throughput improvements without overloading the network.
The results in Table 5 and Figure 9 show distinct throughput trends. The blockchain-only setup increased steadily from 173 kilobits per second to 285 kilobits per second. The DSDN-only configuration exhibited competitive but fluctuating performance, peaking at 280 kilobits per second with 30 nodes, dipping to 210 kilobits per second at 40 nodes, and then rising to 287 kilobits per second at 50 nodes. These variations may be due to temporary load imbalances or control signaling overhead. In contrast, the hybrid DSDN–blockchain system achieves the highest and most stable throughput, peaking at 315 kbps with 30 nodes and maintaining a throughput of around 310 kbps at larger scales. This slight variation is normal in simulation-based networks, where factors such as node placement or random traffic patterns can introduce minor shifts. Overall, the hybrid consistently outperforms the other models thanks to SDN’s efficient routing and blockchain’s reliable peer coordination, which together minimize packet loss and optimize bandwidth usage as the network grows.

4.2.3. Analysis of Latency (ms)

Latency ( L ), the time required for data to travel across the network, often increases linearly with the number of peers ( N ), expressed as
L = c × N
where c is a constant that reflects the average delay per node. This linear trend underscores the need for architectural enhancements to mitigate delay growth.
The results in Table 6 and Figure 10 illustrate the latency scales across the architectures. Latency in the blockchain-only configuration rose from 19 to 79 milliseconds. The DSDN-only configuration exhibited slightly higher latency, ranging from 23 to 80 milliseconds, likely due to control plane overhead from dynamic routing decisions. The hybrid DSDN–blockchain model consistently demonstrated the lowest latency, from 17 milliseconds to 75 milliseconds. This performance benefit stems from the synergy of both technologies: SDN optimizes data paths to reduce hop count. At the same time, blockchain provides a secure trust layer that eliminates the need for repetitive peer verification, enabling more stable routing.

4.2.4. Security Performance Validation

To address the core security challenges in P2P streaming, the proposed hybrid framework incorporates a multi-layered defense mechanism within the DSDN controller and the blockchain layer. The security performance was rigorously evaluated under simulated attack scenarios, including DDoS, Malicious User injection, Forgery, and Content Pollution attacks.
  • Security Modules Implemented:
  • Intrusion Detection System (IDS): A signature-based IDS module was integrated into the DSDN controller to analyze flow statistics and detect anomalous traffic patterns indicative of DDoS floods or peer misbehavior.
  • Access Control List (ACL): Dynamic ACLs were enforced at the SDN switches, allowing the controller to instantly block traffic from malicious IPs identified by the IDS or based on low reputation scores from the blockchain ledger.
  • Encryption Module: An AES-256 cryptographic module was implemented to secure all data-in-transit between peers, ensuring confidentiality and integrity against eavesdropping and forgery attacks.
  • Validation Methodology and Results
For each scenario (blockchain-only, DSDN-only, hybrid), we injected a controlled number of malicious nodes (10% of the network) launching coordinated attacks. The performance was measured using detection rate, detection time, and the resulting packet loss for legitimate traffic.
The results, summarized in Table 7, demonstrate the superior security resilience of the hybrid model.

4.3. Quantitative Comparison with Previous Work

To explicitly address the advancements made in this study relative to our prior analytical work [16], this section provides a direct, quantitative comparison of the two studies’ scope, methodology, and outcomes. While [16] established a foundational performance benchmark for an integrated SDN–blockchain model, this work progresses significantly by designing a detailed framework and isolating the contributions of each technology. Table 8 systematically compares the key aspects of both studies, highlighting the evolution in model complexity, validation depth, and resulting performance insights.

5. Discussion

The experimental evaluation demonstrates that the hybrid DSDN–blockchain framework outperforms standalone approaches across all primary metrics: energy consumption, throughput, and latency. By integrating SDN’s adaptive control with blockchain’s secure transactions, the proposed system enhances quality of service, resource utilization, and scalability in P2P streaming. Specifically, the hybrid model demonstrated superior energy efficiency, consuming 110 joules at 50 nodes compared to 140 joules (blockchain-only) and 118 joules (DSDN-only), reflecting reductions of approximately 21% and 7%, respectively. For throughput, the hybrid system achieved 310 kilobits per second at 50 nodes, outperforming the blockchain-only model (285 kilobits per second) and the DSDN-only model (287 kilobits per second) by approximately 9% and 8%, respectively, in terms of latency; the hybrid model maintained the lowest end-to-end delay at 75 milliseconds, 5% lower than blockchain-only (79 milliseconds) and 6% lower than DSDN-only (80 milliseconds).
Critically, the security validation confirms the framework’s resilience. The hybrid model successfully neutralized 95% of malicious activity, combining the proactive mitigation of SDN with the inherent trust verification of blockchain. This layered security approach is essential for modern P2P applications facing diverse threats.
These results indicate that the hybrid approach successfully reduces control plane and verification delays, ensures secure transactions, and guarantees smoother content delivery, leading to a higher quality of service in larger networks. While practical deployment may involve integration challenges, the clear performance and security advantages make the hybrid DSDN–blockchain framework a promising solution for next-generation P2P streaming systems.

6. Conclusions and Future Work

A hybrid framework was introduced in this study that integrates distributed software-defined networking (DSDN) with blockchain to enhance the performance, scalability, and potential security of peer-to-peer (P2P) streaming systems. The architecture was formally modeled using a hierarchical state machine, and its security was validated under attack scenarios. The hybrid model consistently outperformed the baseline, demonstrating 9% higher throughput, 6% lower latency, and up to 21% better energy efficiency at 50 nodes, while successfully detecting and mitigating 95% of injected malicious flows. For future work, we plan to carry out the following:
  • Extend security testing: Conduct rigorous threat modeling against Syblil, Eclipse, and Spoofing attacks to further quantify the framework’s resilience.
  • Implement lightweight consensus: Explore and integrate lightweight blockchain consensus mechanisms to reduce the computational overhead for resource-constrained peers.
  • Integrate AI for control: Develop an AI-assisted DSDN controller that uses reinforcement learning to predict network congestion and proactively orchestrate resources, moving from reactive to proactive network management.
  • Real-world testbed validation: Deploy the framework on a physical testbed to validate the simulation results under real-world network conditions and heterogeneous devices.

Author Contributions

A.M.A. conceived the idea, conducted the literature review, proposed the framework, implemented the simulation, analyzed the results, and wrote the manuscript. M.A.K., F.E., K.J., and A.A. supervised the research, provided feedback, and guided the revision process. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

We would like to sincerely thank our supervisors at King Abdulaziz University for their continuous support and guidance throughout this research journey. Their insights and encouragement played an essential role in shaping this work. This study was conducted as part of my PhD research, and We are grateful for the opportunity to explore and grow within a supportive academic environment.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ding, Y.; Wu, Z.; Xie, L. Enabling manageable and secure hybrid P2P-CDN video-on-demand streaming services through the coordination of blockchain and zero-knowledge. IEEE Multimed. 2022, 30, 36–51. [Google Scholar]
  2. Kesavan, S.; Kumar, E.S.; Kumar, A.; Vengatesan, K. An investigation on adaptive HTTP media streaming Quality-of-Experience (QoE) and agility using cloud media services. Int. J. Comput. Appl. 2021, 43, 431–444. [Google Scholar] [CrossRef]
  3. Hu, N.; Cen, X.; Luan, F.; Sun, L.; Wu, C. A novel video transmission optimization mechanism based on reinforcement learning and edge computing. Mob. Inf. Syst. 2021, 2021, 6258200. [Google Scholar] [CrossRef]
  4. Farahani, R.; Çetinkaya, E.; Timmerer, C.; Shojafar, M.; Ghanbari, M.; Hellwagner, H. ALIVE: A Latency-and Cost-Aware Hybrid P2P-CDN Framework for Live Video Streaming. IEEE Trans. Netw. Serv. Manag. 2023, 21, 1561–1580. [Google Scholar] [CrossRef]
  5. Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Zhang, Q.; Choo, K.K.R. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans. Serv. Comput. 2020, 13, 625–638. [Google Scholar] [CrossRef]
  6. Aldabbas, H. Efficient bandwidth allocation in SDN-based peer-to-peer data streaming using a machine learning algorithm. J. Supercomput. 2023, 79, 6802–6824. [Google Scholar] [CrossRef]
  7. Shao, S.; Gong, W.; Yang, H.; Guo, S.; Chen, L.; Xiong, A. Data Trusted Sharing Delivery: A Blockchain-Assisted Software-Defined Content Delivery Network. IEEE Internet Things J. 2021, 10, 11949–11959. [Google Scholar] [CrossRef]
  8. Wang, S.; Zhang, J.; Zhang, T. AI-enabled blockchain and SDN-integrated IoT security architecture for cyber-physical systems. Adv. Control Appl. Eng. Ind. Syst. 2024, 6, e131. [Google Scholar] [CrossRef]
  9. Siddiqui, S.; Hameed, S.; Shah, S.A.; Khan, A.K.; Aneiba, A. Smart contract-based security architecture for collaborative services in municipal smart cities. J. Syst. Archit. 2023, 135, 102802. [Google Scholar]
  10. Fan, W.; Chang, S.Y.; Kumar, S.; Zhou, X.; Park, Y. Blockchain-based secure coordination for distributed SDN control plane. In Proceedings of the 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, 28 June–2 July 2021; pp. 253–257. [Google Scholar]
  11. Wang, M.H.; Hsieh, T.S.; Tseng, Y.Y.; Chi, P.W. An SDN-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality. IEEE Multimed. 2023, 31, 54–64. [Google Scholar] [CrossRef]
  12. Guo, T.; Song, Z.; Xin, H.; Liu, G. A Decentralized Multi-Venue Real-Time Video Broadcasting System Integrating Chain Topology and Intelligent Self-Healing Mechanisms. Appl. Sci. 2025, 15, 8043. [Google Scholar] [CrossRef]
  13. Guo, Z.; Qin, B.; Guan, Z.; Wang, Y.; Zheng, H.; Wu, Q. A high-efficiency and incentive-compatible peer-to-peer energy trading mechanism. IEEE Trans. Smart Grid 2023, 15, 1075–1088. [Google Scholar] [CrossRef]
  14. Zeraati, M.; Jabari, F.; Salarkheili, S. Blockchain-Based Transaction Platform for Peer-to-Peer Energy Trading. In Demand-Side Peer-to-Peer Energy Trading; Springer: Cham, Switzerland, 2023; pp. 77–97. [Google Scholar]
  15. Hao, W.; Zeng, J.; Dai, X.; Xiao, J.; Hua, Q.S.; Chen, H.; Li, K.C.; Jin, H. Towards a trust-enhanced blockchain P2P topology for enabling fast and reliable broadcast. IEEE Trans. Netw. Serv. Manag. 2020, 17, 904–917. [Google Scholar] [CrossRef]
  16. Alshiky, A.M. Comparative Analysis of SDN and Blockchain Integration in P2P Streaming Networks for Secure and Reliable Communication. Electronics 2025, 14, 1987. [Google Scholar] [CrossRef]
  17. Kim, J.; Kim, E. Supporting efficient video file streaming in P2P cloud storage. Peer-to-Peer Netw. Appl. 2024, 17, 1865–1884. [Google Scholar] [CrossRef]
  18. Ansari, M.S.A.; Pal, K.; Govil, P.; Govil, M.C. A fuzzy-based hierarchical flash crowd controller for live video streaming in P2P networks. Peer-to-Peer Netw. Appl. 2023, 16, 1027–1048. [Google Scholar] [CrossRef]
  19. Al Ghamdi, M.A. An optimized and secure energy-efficient blockchain-based framework in IoT. IEEE Access 2022, 10, 133682–133697. [Google Scholar] [CrossRef]
  20. Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Wang, L.L.F.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar] [CrossRef]
  21. Ali, J.; Adnan, M.; Gadekallu, T.R.; Jhaveri, R.H.; Roh, B.H. A QoS-aware software defined mobility architecture for named data networking. In Proceedings of the 2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, Brazil, 4–8 December 2022; pp. 444–449. [Google Scholar]
  22. Zheng, Y.; Liu, W.; Gu, C.; Chang, C.H. PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Trans. Dependable Secur. Comput. 2022, 20, 3299–3316. [Google Scholar] [CrossRef]
  23. Qiu, H.; Ji, T.; Zhao, S.; Chen, X.; Qi, J.; Cui, H.; Wang, S. A geography-based p2p overlay network for fast and robust blockchain systems. IEEE Trans. Serv. Comput. 2022, 16, 1572–1588. [Google Scholar] [CrossRef]
  24. Wu, Y.; Wu, Y.; Cimen, H.; Vasquez, J.C.; Guerrero, J.M. P2P energy trading: Blockchain-enabled P2P energy society with multi-scale flexibility services. Energy Rep. 2022, 8, 3614–3628. [Google Scholar] [CrossRef]
  25. He, S.; Lu, Y.; Tang, Q.; Wang, G.; Wu, C.Q. Blockchain-based P2P content delivery with monetary incentivization and fairness guarantee. IEEE Trans. Parallel Distrib. Syst. 2022, 34, 746–765. [Google Scholar] [CrossRef]
  26. Deshpande, V.; Badis, H.; George, L. Efficient topology control of blockchain peer to peer network based on SDN paradigm. Peer-to-Peer Netw. Appl. 2022, 15, 267–289. [Google Scholar] [CrossRef]
  27. Ojo, O.E.; Oluwatope, A.O.; Ajadi, S.O. Formal verification of a peer-to-peer streaming protocol. J. King Saud Univ.-Comput. Inf. Sci. 2020, 32, 730–740. [Google Scholar] [CrossRef]
  28. Ziwich, R.P.; Jr, E.P.D.; Silveira, G.P. Distributed mitigation of content pollution in peer-to-peer video streaming networks. IET Commun. 2020, 14, 1759–1767. [Google Scholar] [CrossRef]
  29. Haq, A.; Faheem, Y. A peer-to-peer communication based content distribution protocol for incentive-aware delay tolerant networks. Wirel. Netw. 2020, 26, 583–601. [Google Scholar] [CrossRef]
  30. Eldhai, A.M.; Mosab, H.; Ahmed, A.; Targio, H.I.A.; Sharief, B.; Marsono, M.N.; Muzaffar, H.; Zaman, J.N. Improved Feature Selection and Stream Traffic Classification based on Machine Learning in Software-Defined Networks. IEEE Access 2024, 12, 34141–34159. [Google Scholar] [CrossRef]
Figure 1. Sequence of operations for secure data resource retrieval.
Figure 1. Sequence of operations for secure data resource retrieval.
Electronics 14 04370 g001
Figure 2. Scheduling traffic.
Figure 2. Scheduling traffic.
Electronics 14 04370 g002
Figure 3. Interconnected bandwidth allocation.
Figure 3. Interconnected bandwidth allocation.
Electronics 14 04370 g003
Figure 4. Enhanced quality of service routing.
Figure 4. Enhanced quality of service routing.
Electronics 14 04370 g004
Figure 5. Overall view of BlockP2P.
Figure 5. Overall view of BlockP2P.
Electronics 14 04370 g005
Figure 6. The overall architecture of the proposed work.
Figure 6. The overall architecture of the proposed work.
Electronics 14 04370 g006
Figure 7. Network emulation topology in NS-3.
Figure 7. Network emulation topology in NS-3.
Electronics 14 04370 g007
Figure 8. Number of nodes vs. energy consumption (j).
Figure 8. Number of nodes vs. energy consumption (j).
Electronics 14 04370 g008
Figure 9. Number of nodes vs. throughput (kbps).
Figure 9. Number of nodes vs. throughput (kbps).
Electronics 14 04370 g009
Figure 10. Number of nodes vs. latency (ms).
Figure 10. Number of nodes vs. latency (ms).
Electronics 14 04370 g010
Table 1. Summary of related works.
Table 1. Summary of related works.
ReferenceMain ObjectivesAlgorithms or Methods UsedKey Limitation
[17]To allow for the efficient streaming of video files inside peer-to-peer cloud storage.Hybrid redundancy schemeLack of heterogeneous network conditions
[18]For live video streaming over a peer-to-peer network, a fuzzy-based hierarchical flash crowd controller is presented.Fuzzy logic High complexity
[19]To propose an optimized, secure, and energy-efficient SDN–blockchain framework for IoT.SDN–blockchain classifier, traffic fusionNot designed for high-throughput P2P streaming
[20]To integrate AI, blockchain, and SDN for a secure and energy-efficient IoT/CPS architecture.Cluster-based routing, distributed authenticationFocused on IoT networks, not video streaming performance
[21]To name data communication using a QOS-aware software-defined mobility design.SDNSecurity issues
[11]To develop a dependable transmission architecture that is driven by software-defined networking (SDN) to improve the quality of real-time video streaming.Retransmission mechanismCongestion control
[12]To design a low-latency, fault-tolerant P2P system for real-time video broadcasting.P2P chain topology, self-healing, SRT protocolLacks integrated trust/security mechanisms like blockchain
[22]To enable lightweight mutual authentication for resource-constrained P2P IoT devices.Physical unclonable function (PUF), key exchangeSecurity issues
[23]To develop a P2P overlay network that is based on geography and is designed for fast and robust blockchain systems.FRING topologyNetwork latency
[24]To present a peer-to-peer energy society enabled by blockchain technology that offers multi-scale flexibility services.Energy management mechanismSettlement issues
[25]To analyze the peer-to-peer network that underpins the Ethereum blockchain (ETHNA).Ethereum blockchain (ETHNA) Security issues
[26]To achieve monetary incentivization and fairness in P2P content delivery.Blockchain, FairExchange protocolsDoes not address network-level QoS or dynamic control
Table 2. System parameters.
Table 2. System parameters.
Hardware configurationHard disk62 GB
RAM4GB
ProcessorCPU: Intel(R) Core (TM) i5-4590S @ 3.00 GHz
Software configurationNetwork simulatorNS-3.26
Operating system Ubuntu 14.04 LTS
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParametersDescriptionsRationale
General Network Parameters
Users (Nodes)10 to 50To test scalability from small to medium-sized P2P swarms.
Switches2Represents a simplified but effective backbone for the hybrid P2P-SDN topology.
DSDN Controller with Security Modules2Provides distributed control and redundancy.
Traffic & Link Parameters
Packet Size1024 bytesCommon size for video data chunks.
Data Rate per Stream500 kbpsRepresents a standard-definition video stream.
Backbone Link (Switch-to-Switch)1 Gbps, 2 ms latencySimulates a high-speed core network.
Access Link (Node-to-Switch)100 Mbps, 5 ms latencyRepresents typical broadband/cellular access.
Packet Loss Rate0.1%Introduces a realistic level of network imperfection.
Scenario-Specific Components
Blockchain-onlyIncludes a blockchain component.Baseline for trust/security overhead.
DSDN-onlyIncludes a server and DSDN controllers.Baseline for network control performance.
DSDN-Blockchain (Hybrid)Includes all components.The proposed model for evaluation.
Table 4. Numerical outcomes of energy consumption (j).
Table 4. Numerical outcomes of energy consumption (j).
x-Axis (Number of Nodes)y-Axis (Energy Consumption (j))
BlockchainDSDNDSDN–Blockchain
10302825
20605842
301108580
401189082
50140118110
Table 5. Numerical outcomes of throughput (kbps).
Table 5. Numerical outcomes of throughput (kbps).
x-Axis (Number of Nodes)y-Axis (Throughput (kbps))
BlockchainDSDNDSDN–Blockchain
10173170240
20180199210
30183280315
40235210275
50285287310
Table 6. Numerical outcomes of latency (ms).
Table 6. Numerical outcomes of latency (ms).
x-Axis (Number of Nodes)y-Axis (Latency (ms))
BlockchainDSDNDSDN–Blockchain
10192317
20333533
30525348
40656663
50798075
Table 7. Security performance metrics under attack (at 50 nodes).
Table 7. Security performance metrics under attack (at 50 nodes).
MetricBlockchain-OnlyDSDN-OnlyHybrid DSDN–Blockchain
Detection Rate (%)78%85%95%
Detection Time (ms)1204538
Packet Loss (%)15%8%4%
Table 8. Quantitative and methodological comparison with previous work.
Table 8. Quantitative and methodological comparison with previous work.
Comparison AspectPrevious Work [16] Proposed Work Advancement and Implications
Research FocusComparative analysis of an integrated SDN–blockchain model vs. traditional P2P.Design and validation of a novel hybrid DSDN–blockchain framework.Progression from performance benchmarking to a comprehensive architectural proposal.
Methodology and Model ComplexitySingle, unified SDN–blockchain scenario. No detailed architectural decomposition.Three isolated scenarios (blockchain-only, DSDN-only, hybrid) with a hierarchical state machine architecture (control plane and trust plane).Increased granularity. Isolates the effects of each technology, proving their synergy. The hierarchical model is more complex and practical.
Performance MetricsLatency, throughput, packet delivery ratio.Adds energy consumption to latency and throughput.Broader evaluation. Provides a more holistic view of system efficiency and scalability.
Performance Improvement (Hybrid vs. Standalone)Not applicable (standalone models were not evaluated).Quantified synergy:
  • Throughput: +8–9% higher
  • Latency: −5–6% lower
  • Energy efficiency: +7–21% better
First direct evidence of the performance gain achieved by integration, which was only hypothesized in [16].
Security ValidationTheoretical discussion of security benefits.Experimental validation under attack:
  • Detection rate: 95%
  • Detection time: 38 ms
  • Packet loss: 4% (under attack)
Empirical proof. Moves from conceptual security claims to quantitative, data-backed resilience metrics.
Validation ScaleFixed network size (e.g., 50 nodes).Scalability analysis with node counts from 10 to 50, establishing performance trends.Robustness. Demonstrates that performance advantages are consistent across different network scales.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alshiky, A.M.; Khemakhem, M.A.; Eassa, F.; Jambi, K.; Alzahrani, A. A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation. Electronics 2025, 14, 4370. https://doi.org/10.3390/electronics14224370

AMA Style

Alshiky AM, Khemakhem MA, Eassa F, Jambi K, Alzahrani A. A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation. Electronics. 2025; 14(22):4370. https://doi.org/10.3390/electronics14224370

Chicago/Turabian Style

Alshiky, Aisha Mohmmed, Maher Ali Khemakhem, Fathy Eassa, Kamal Jambi, and Ahmed Alzahrani. 2025. "A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation" Electronics 14, no. 22: 4370. https://doi.org/10.3390/electronics14224370

APA Style

Alshiky, A. M., Khemakhem, M. A., Eassa, F., Jambi, K., & Alzahrani, A. (2025). A Hybrid DSDN–Blockchain Framework for Reliable and Secure P2P Streaming: Architecture Design and NS-3 Validation. Electronics, 14(22), 4370. https://doi.org/10.3390/electronics14224370

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop