RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network

T Manjula, B Anand - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
… ) and trust based security. The unique characteristics of mobile ad hoc networks pose a number
of … challenges to security design, such as open peer-to peer network architecture, shared …

Routing in flying ad hoc networks: A comprehensive survey

DS Lakew, U Sa'ad, NN Dao, W Na… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
use intermediate UAVs to communicate with the ground controller in a multi-hop way.
FANET is considered a subset of vehicular ad Hoc network (VANET) or mobile ad hoc network (…

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - … on Wireless …, 2021 - ieeexplore.ieee.org
… Focusing on multi-hop ad hoc networks in the presence of … this model provides valuable
insights into the secure routingmodel cannot be applied to every possible wireless network, it …

An efficient routing protocol in mobile ad-hoc networks by using artificial immune system

F Sarkohaki, R Fotohi, V Ashrafian - arXiv preprint arXiv:2003.00869, 2020 - arxiv.org
… are regarded as the routing challenges in these networks. OLSR protocol is one of the
routing protocols in mobile ad hoc network that selects the shortest route between source and …

AGEN-AODV: an intelligent energy-aware routing protocol for heterogeneous mobile ad-hoc networks

M Nabati, M Maadani, MA Pourmina - Mobile Networks and Applications, 2022 - Springer
Mobile Ad-hoc Networks (MANETs) consist of mobile nodes that usually have limited energy
resources. MANET routing … and energy constraints of the network, and this makes them an …

New NSGA-II-based OLSR self-organized routing protocol for mobile ad hoc networks

N Harrag, A Refoufi, A Harrag - Journal of Ambient Intelligence and …, 2019 - Springer
… For the mobility model, to generate mobile ad hoc network nodes movement, we used the
commonly Random Way Point (RWP) used for simulation purposes to evaluate new network

Trust‐based secure routing and the prevention of vampire attack in wireless ad hoc sensor network

R Isaac Sajan, J Jasper - International Journal of …, 2020 - Wiley Online Library
Ad hoc network does not require any physical infrastructure like … of trust-based secure
routing in the wireless ad hoc sensor network. In the above figure, the network is divided into …

A review on various routing protocol designing features for flying ad hoc networks

J Vijitha Ananthi, P Subha Hency Jose - Mobile Computing and …, 2022 - Springer
Ad Hoc Network is derived from the mobile ad hoc network and it consists of unmanned aerial
vehicles (UAV) for high-speed communication. Flying Ad Hoc Network … in FANET, network

Fuzzy approach-based stable energy-efficient AODV routing protocol in mobile ad hoc networks

S Choudhary, V Narayan, M Faiz… - … Networking for Ad Hoc …, 2022 - Springer
mobile Ad hoc networks; this key makes MANET proper for various types of critical environments.
Mobile ad hoc network … relief, military operations, vehicular network, causal meeting, etc…

A deep reinforcement learning-based QoS routing protocol exploiting cross-layer design in cognitive radio mobile ad hoc networks

TN Tran, TV Nguyen, K Shim… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… learning-based quality-of-service (QoS) routing protocol, namely DRQR, exploiting cross-…
(EQS) routes in cognitive radio mobile ad hoc networks. An EQS route is a route with minimum …