2020
DOI: 10.1002/ett.4068
|View full text |Cite
|
Sign up to set email alerts
|

SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks

Abstract: Unmanned aerial vehicles (UAVs) come up with eminent opportunities for military and civilian applications. Such opportunities come with unique challenges. The high mobility of UAVs leads to the frequent change in the network topology that results in packet loss or routing path failure, and so on. Moreover, secure routing is one of the most important features while organizing wireless communication among UAVs. To counter these challenges, a secure and reliable routing protocol (SecRIP) for the flying ad hoc net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 49 publications
(58 reference statements)
0
12
0
Order By: Relevance
“…Mobility models must account for realistic traffic conditions in real-time. [16][17][18][19] The ability of nodes to create dynamically changing networks is a key feature of an effective mobility model. In military applications, UAV mobility should not be limited by the mobility of participating nodes due to its time-critical nature.…”
Section: F I G U R E 1 a Sparse Flying Ad-hoc Network In Which Autono...mentioning
confidence: 99%
See 1 more Smart Citation
“…Mobility models must account for realistic traffic conditions in real-time. [16][17][18][19] The ability of nodes to create dynamically changing networks is a key feature of an effective mobility model. In military applications, UAV mobility should not be limited by the mobility of participating nodes due to its time-critical nature.…”
Section: F I G U R E 1 a Sparse Flying Ad-hoc Network In Which Autono...mentioning
confidence: 99%
“…Mobility models describe a node mobility scheme that simulates real‐world traffic, mobility, and response scenarios to present real‐world scenarios. Mobility models must account for realistic traffic conditions in real‐time 16‐19 . The ability of nodes to create dynamically changing networks is a key feature of an effective mobility model.…”
Section: Introductionmentioning
confidence: 99%
“…Although UAVs have introduced several innovations in the communication system; however, at the same time, they are vulnerable to protection, stability, and privacy concerns 84,85 . Broadly, these attacks could be from communication‐layer, sensors, or multi‐UAVs security and privacy 86 .…”
Section: State‐of‐the‐artmentioning
confidence: 99%
“…The authors in References 24,25 introduce a secure and efficient clustering mechanism. The mechanism is based on CH selection to reduce overhead and improve stability.…”
Section: Related Workmentioning
confidence: 99%