2020
DOI: 10.24846/v29i1y202011
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Cross Layer Design for Efficient Power and Routing in UAV Communication Networks

Abstract: The unmanned aerial vehicle communication networks (UAVCN) is an emerging technology of wireless communication. By making use of this technology, the swarm of unmanned aerial vehicles (UAVs) forms a network in which the UAVs can communicate with each other and trigger the information for a particular operation of military and civilian applications. The UAV nodes frequently face design issues and power limitations , which affect the routing mechanism. It is a unique challenge for the researchers to introduce th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…The second type is peripheral forwarding: this forwarding method is applicable to the forwarding needs that are smaller than the straight-line distance between each node in the above greedy forwarding, so it can be regarded as a way of in-place forwarding. When the distance of communication data transmission is insufficient, the packets will encounter routing hole problem during transmission and thus cannot be carried out according to the above greedy forwarding method [8][9][10]. A right-hand rule for perimeter forwarding is established to prevent routing holes when UAVs are sent in a self-organizing network, and a sequence of traversal operations is completed in a clockwise direction, forming a polygon region in the process.…”
Section: Introductionmentioning
confidence: 99%
“…The second type is peripheral forwarding: this forwarding method is applicable to the forwarding needs that are smaller than the straight-line distance between each node in the above greedy forwarding, so it can be regarded as a way of in-place forwarding. When the distance of communication data transmission is insufficient, the packets will encounter routing hole problem during transmission and thus cannot be carried out according to the above greedy forwarding method [8][9][10]. A right-hand rule for perimeter forwarding is established to prevent routing holes when UAVs are sent in a self-organizing network, and a sequence of traversal operations is completed in a clockwise direction, forming a polygon region in the process.…”
Section: Introductionmentioning
confidence: 99%
“…The technique failed to utilize Artificial Intelligence (AI)‐based and bioinspired techniques for initiating elevated speed localization of nodes. Nawaz and Mansoor Ali 2 developed a technique for improving the performance of UAVs. The model integrated the layers, like, physical layer, link layer, and network layer.…”
Section: Literature Surveymentioning
confidence: 99%
“…In wireless technologies, a promising technique is expressed by UAV communication and its move towards the gloom of a Mobile Ad Hoc Network (MANET) that utilizes platformless infrastructures. The mobile nodes share the data amongst each other throughout the communication in the air 2 . There exist two types of UAV models; one is single, and the second is multi‐UAV models.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The confidentiality of the system is not protected if an attacker can obtain all that information by eavesdropping. Most of the routing protocols have this vulnerability [117]- [119].…”
Section: ) Analysis Of Security Issues In Routing Protocolsmentioning
confidence: 99%