Ad Hoc Networks

Papers
(The TQCC of Ad Hoc Networks is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization255
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques191
Green internet of things using UAVs in B5G networks: A review of applications and strategies129
A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks129
A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook108
An extensive survey on the Internet of Drones101
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks86
A Survey on Mobility in Wireless Sensor Networks78
Role of machine learning and deep learning in securing 5G-driven industrial IoT applications67
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks64
Federated learning for drone authentication60
Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks59
Energy-efficient coverage optimization in wireless sensor networks based on Voronoi-Glowworm Swarm Optimization-K-means algorithm49
Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET47
A deep reinforcement learning-based on-demand charging algorithm for wireless rechargeable sensor networks45
Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things43
A comprehensive survey on clustering in vehicular networks: Current solutions and future challenges43
An enhanced energy proficient clustering (EEPC) algorithm for relay selection in heterogeneous WSNs43
CR-IoTNet: Machine learning based joint spectrum sensing and allocation for cognitive radio enabled IoT cellular networks42
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective40
A combined online-learning model with K-means clustering and GRU neural networks for trajectory prediction39
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems39
A survey of mobility-aware Multi-access Edge Computing: Challenges, use cases and future directions38
Human tracking and identification through a millimeter wave radar37
Generative adversarial network to detect unseen Internet of Things malware35
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey35
Load balancing for RPL-based Internet of Things: A review35
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks34
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things34
Energy efficient multipath ant colony based routing algorithm for mobile ad hoc networks32
Resource management in UAV-assisted wireless networks: An optimization perspective32
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments32
Wireless communication protocols in smart agriculture: A review on applications, challenges and future trends31
Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities31
An optimized transaction verification method for trustworthy blockchain-enabled IIoT31
IoT Sensor Selection for Target Localization: A Reinforcement Learning based Approach30
MOCRAW: A Meta-heuristic Optimized Cluster head selection based Routing Algorithm for WSNs30
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures29
A novel self-adaptive multi-strategy artificial bee colony algorithm for coverage optimization in wireless sensor networks29
Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks29
Performance evaluation of CNN-based pedestrian detectors for autonomous vehicles29
Dynamic directional routing for mobile wireless sensor networks29
A survey on congestion detection and control in connected vehicles29
A content distribution method of internet of vehicles based on edge cache and immune cloning strategy28
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things28
RBF-SVM kernel-based model for detecting DDoS attacks in SDN integrated vehicular network27
Low-light image joint enhancement optimization algorithm based on frame accumulation and multi-scale Retinex27
Deep learning-driven opportunistic spectrum access (OSA) framework for cognitive 5G and beyond 5G (B5G) networks27
Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook27
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework27
An overview of massive MIMO localization techniques in wireless cellular networks: Recent advances and outlook26
RGSO-UAV: Reverse Glowworm Swarm Optimization inspired UAV path-planning in a 3D dynamic environment26
An efficient partial charging scheme using multiple mobile chargers in wireless rechargeable sensor networks26
A new deep learning-based distance and position estimation model for range-based indoor localization systems26
A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography26
Routing in Delay-Tolerant Networks under uncertain contact plans25
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications25
IRATS: A DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network25
A blockchain and deep neural networks-based secure framework for enhanced crop protection25
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET25
EEHCHR: Energy Efficient Hybrid Clustering and Hierarchical Routing for Wireless Sensor Networks25
Energy-aware system design for batteryless LPWAN devices in IoT applications25
A secure and efficient certificateless signature scheme for Internet of Things24
Efficient configuration for multi-objective QoS optimization in wireless sensor network24
On the privacy and security for e-health services in the metaverse: An overview24
Trusted and secured D2D-aided communications in 5G networks24
Privacy reinforcement learning for faults detection in the smart grid24
A cognitive wireless networks access selection algorithm based on MADM24
An energy optimized and QoS concerned data gathering protocol for wireless sensor network using variable dimensional PSO22
Inspecting VANET with Various Critical Aspects – A Systematic Review22
Fuzzy-based beaconless probabilistic broadcasting for information dissemination in urban VANET22
Blockchain incentivized data forwarding in MANETs: Strategies and challenges22
A novel approach of privacy protection of mobile users while using location-based services applications22
Machine learning for 5G security: Architecture, recent advances, and challenges22
Newton-interpolation-based zk-SNARK for Artificial Internet of Things22
IoT-based data-driven fault allocation in microgrids using advanced µPMUs21
Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks21
Combined sensor selection and node location optimization for reducing the localization uncertainties in wireless sensor networks21
A new energy-efficient and temperature-aware routing protocol based on fuzzy logic for multi-WBANs20
Q-learning-Based Opportunistic Routing with an on-site architecture in UASNs20
An incentive mechanism based on a Stackelberg game for mobile crowdsensing systems with budget constraint20
Joint or decoupled optimization: Multi-UAV path planning for search and rescue20
Dynamic and intelligent edge server placement based on deep reinforcement learning in mobile edge computing20
Energy-efficient and solar powered mission planning of UAV swarms to reduce the coverage gap in rural areas: The 3D case20
AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT20
A blockchain-enabled relay selection for QoS-OLSR in urban VANET: A Stackelberg game model20
Secure resource management in beyond 5G heterogeneous networks with decoupled access19
High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm19
A blockchain-based reputation system for trusted VANET nodes19
Survey and taxonomy of information-centric vehicular networking security attacks19
Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode19
Blockchain-based vehicular ad-hoc networks: A comprehensive survey18
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions18
FogJam: A Fog Service for Detecting Traffic Congestion in a Continuous Data Stream VANET18
A reliable deep learning-based algorithm design for IoT load identification in smart grid18
Bluetooth low energy indoor localization for large industrial areas and limited infrastructure18
Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network18
Joint traffic-aware UAV placement and predictive routing for aerial networks18
An adaptive backoff and dynamic clear channel assessment mechanisms in IEEE 802.15.4 MAC for wireless body area networks18
A node trust evaluation method of vehicle-road-cloud collaborative system based on federated learning18
A hybrid coverage control for enhancing UWSN localizability using IBSO-VFA17
Provably secured lightweight authenticated key agreement protocol for modern health industry17
Adaptive clustering routing protocol for underwater sensor networks17
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems17
Cost optimization of UAV-MEC network calculation offloading: A multi-agent reinforcement learning method17
On-demand vehicle-assisted charging in wireless rechargeable sensor networks17
LTE-V2X Mode 3 scheduling based on adaptive spatial reuse of radio resources17
Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability17
Geographic Position based Hopless Opportunistic Routing for UAV networks16
Energy-efficient decentralized navigation of a team of solar-powered UAVs for collaborative eavesdropping on a mobile ground target in urban environments16
Salient object detection on hyperspectral images in wireless network using CNN and saliency optimization16
Blockchain and trust-based clustering scheme for the IoV16
Positioning aerial relays to maintain connectivity during drone team missions16
Throughput-aware path planning for UAVs in D2D 5G networks16
Outperforming RPL with scalable routing based on meaningful MAC addressing16
PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs16
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks16
Resource allocation for UAV-aided energy harvesting-powered D2D communications: A reinforcement learning-based scheme15
THz-enabled UAV communications: Motivations, results, applications, challenges, and future considerations15
A cooperative crowdsensing system based on flying and ground vehicles to control respiratory viral disease outbreaks15
A trust management-based secure routing protocol with AUV-aided path repairing for Underwater Acoustic Sensor Networks15
UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks15
DV-Hop-based localization algorithm using optimum anchor nodes subsets for wireless sensor network15
Collaborative advanced machine learning techniques in optimal energy management of hybrid AC/DC IoT-based microgrids15
ADAPT: An Adaptive Directional Antenna Protocol for medium access control in Terahertz communication networks14
Relay selection in millimeter wave D2D communications through obstacle learning14
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing14
Effective malware detection scheme based on classified behavior graph in IIoT14
HFLFO: Hybrid fuzzy levy flight optimization for improving QoS in wireless sensor network14
Towards a robust FANET: Distributed node importance estimation-based connectivity maintenance for UAV swarms14
A vertical handoff decision scheme using subjective-objective weighting and grey relational analysis in cognitive heterogeneous networks14
Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS14
A dynamic task offloading algorithm based on greedy matching in vehicle network14
TGRV: A trust-based geographic routing protocol for VANETs14
Geometric least square curve fitting method for localization of wireless sensor network14
Multi-objective-derived energy efficient routing in wireless sensor network using adaptive black hole-tuna swarm optimization strategy14
Hybrid RNN-LSTM deep learning model applied to a fuzzy based wind turbine data uncertainty quantization method13
Enhanced UAV-aided vehicular delay tolerant network (VDTN) routing for urban environment using a bio-inspired approach13
Region-of-interest based video coding strategy for rate/energy-constrained smart surveillance systems using WMSNs13
Methods of improving Secrecy Transmission Capacity in wireless random networks13
Federated Learning-based Misbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles13
Energy-efficient and balanced routing in low-power wireless sensor networks for data collection13
An energy efficient IoD static and dynamic collision avoidance approach based on gradient optimization13
Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing13
A novel Network Partitioning Attack against Routing Protocol in Internet of Things12
Channel characteristics aware zero knowledge proof based authentication scheme in body area networks12
Adaptive multi-PHY IEEE802.15.4 TSCH in sub-GHz industrial wireless networks12
Unsupervised concept drift detection based on multi-scale slide windows12
Fresh data collection for UAV-assisted IoTs based on proximity-remote region collaboration12
Energy balancing in mobile opportunistic networks with wireless charging: Single and multi-hop approaches12
Survey on the state-of-the-art in device-to-device communication: A resource allocation perspective12
An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks12
Differential privacy protection on weighted graph in wireless networks12
A reinforcement learning-based sleep scheduling algorithm for cooperative computing in event-driven wireless sensor networks12
Joint hierarchical placement and configuration of edge servers in C-V2X12
ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments12
Multi-objective cluster head using self-attention based progressive generative adversarial network for secured data aggregation11
A lightweight mutual and transitive authentication mechanism for IoT network11
Task-driven charger placement and power allocation for wireless sensor networks11
Swarm intelligence inspired meta-heuristics for solving multi-constraint QoS path problem in vehicular ad hoc networks11
Joint multi-user DNN partitioning and task offloading in mobile edge computing11
Network lifetime enhancement of WSNs using correlation model and node selection algorithm11
QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-Learning11
A multi-hop routing protocol based on link state prediction for intra-body Wireless Nanosensor Networks11
An accurate RSS/AoA-based localization method for internet of underwater things11
Novel metaheuristic routing algorithm with optimized energy and enhanced coverage for WSNs11
Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks11
Analysis of the interplay between RPL and the congestion control strategies for CoAP11
Survey on positioning information assisted mmWave beamforming training11
SmartLight: A smart efficient traffic light scheduling algorithm for green road intersections11
A decision-making scheme for UAV maximizes coverage of emergency indoor and outdoor users11
Deployment of UAV-BSs for on-demand full communication coverage11
Distributed optimization via primal and dual decompositions for delay-constrained FANETs11
Knapsack Cipher-based metaheuristic optimization algorithms for cryptanalysis in blockchain-enabled internet of things systems10
STAG: A novel interaction-aware path prediction method based on Spatio-Temporal Attention Graphs for connected automated vehicles10
Next-power: Next-generation framework for secure and sustainable energy trading in the metaverse10
LB-OPAR: Load balanced optimized predictive and adaptive routing for cooperative UAV networks10
A cluster-based cooperative computation offloading scheme for C-V2X networks10
Optimal IoT-based decision-making of smart grid dispatchable generation units using blockchain technology considering high uncertainty of system10
An energy-balanced unequal clustering approach for circular wireless sensor networks10
On improving the cooperative localization performance for IoT WSNs10
Practical server-side WiFi-based indoor localization: Addressing cardinality & outlier challenges for improved occupancy estimation10
An adaptive and cooperative MAC protocol for safety applications in cognitive radio enabled vehicular Ad-hoc networks10
Task offloading strategy and scheduling optimization for internet of vehicles based on deep reinforcement learning10
VOCkit: A low-cost IoT sensing platform for volatile organic compound classification10
Joint trajectory and transmission optimization for energy efficient UAV enabled eLAA network10
A novel two-factor multi-gateway authentication protocol for WSNs10
A dynamic multi-sink routing protocol for static and mobile self-organizing wireless networks: A routing protocol for Internet of Things10
An enhanced nonlinear iterative localization algorithm for DV_Hop with uniform calculation criterion10
Li-Wi: An upper layer hybrid VLC-WiFi network handover solution10
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things10
TRFR: A ternary relation link prediction framework on Knowledge graphs10
Energy Efficient Routing for Wireless Mesh Networks with Directional Antennas: When Q-learning meets Ant systems10
Healthcare: A priority-based energy harvesting scheme for managing sensor nodes in WBANs10
Machine learning approaches for underwater sensor network parameter prediction10
Genetic algorithm for delay efficient computation offloading in dispersed computing9
Characteristics analysis and suppression strategy of energy hole in wireless sensor networks9
Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles9
ACGSOR: Adaptive cooperation-based geographic segmented opportunistic routing for underwater acoustic sensor networks9
V-RPL: An effective routing algorithm for low power and lossy networks using multi-criteria decision-making techniques9
Coverage hole optimization with a mobile sensor in wireless sensor networks for smart grid9
Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions9
Reliable task offloading mechanism based on trusted roadside unit service for internet of vehicles9
Reinforcement learning based effective communication strategies for energy harvested WBAN9
ALSNAP: Attention-based long and short-period network security situation prediction9
Covert communication in multi-hop UAV network9
Study of the influence of human subject on the indoor channel using compact UWB directive/omni-directional antennas for wireless sensor network applications9
Consensus-based mutual authentication scheme for Industrial IoT9
Do not get fooled: Defense against the one-pixel attack to protect IoT-enabled Deep Learning systems9
0.053266048431396