An optimization routing protocol for FANETs

H Yang, Z Liu - EURASIP Journal on Wireless Communications and …, 2019 - Springer
With the wide-ranging application of mobile ad hoc networks, flying ad hoc networks
(FANETs) have received more and more attention from the industry. Routing technology is a …

Performance evaluation of data dissemination protocols for connected autonomous vehicles

FM Malik, HA Khattak, A Almogren, O Bouachir… - IEEE …, 2020 - ieeexplore.ieee.org
An overwhelmed number of vehicles has wrecked the current system of transportation due to
rapid growth in population. Smart cities are the novel innovation that is inevitable to curb the …

Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN

SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …

A performance‐aware routing mechanism for flying ad hoc networks

H Ali, S Islam, H Song, K Munir - Transactions on Emerging …, 2021 - Wiley Online Library
Flying ad hoc networks (FANETs) are visioned to unlock the potential of the Internet of
Drones in various application scenarios like surveillance, agriculture, health care, disaster …

A multi-parameter comparative study of manet routing protocols

IA Alameri, J Komarkova - 2020 15th Iberian Conference on …, 2020 - ieeexplore.ieee.org
The process of selecting the routing protocols is one of the most critical choices to be made
during the design of an advert hoc network Several things are essential to be known to …

EOEEORFP: Eagle optimized energy efficient optimal route-finding protocol for secure data transmission in FANETs

M Usha, T Mahalingam, A Ahilan… - IETE Journal of …, 2024 - Taylor & Francis
This FANETs (Flying Adhoc NETworks) are supported by UAVs (Unmanned Aerial Vehicles)
which carry out the task of transmitting and receiving data. Transmission and routing are …

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

Performance investigation of topology-based routing protocols in flying ad-hoc networks using NS-2

S Kumar, A Bansal - IoT and cloud computing advancements in …, 2020 - igi-global.com
Recently, with the rapid technological advancement in communication technologies, it has
been possible to establish wireless communication between small, portable, and flexible …

Achieving manet protection without the use of superfluous fictitious nodes

N Schweitzer, L Cohen, T Hirst, A Dvir… - Computer …, 2025 - Elsevier
Mobile ad-hoc networks (manet s) are everywhere. They are the basis for many current
technologies (including vanet s, iot, etc.), and used in multiple domains (including military …

An improved security OLSR protocol against black hole attack based on FANET

S Ren, D Li, Q Hu, Y Liu, J Liu - 2022 13th Asian Control …, 2022 - ieeexplore.ieee.org
Flying ad hoc network (FANET) is an unmanned aerial vehicle multi-hop, autonomous
Mobile ad hoc network (MANET). FANET has many applications in military and civilian …