Ad Hoc Networks

Papers
(The TQCC of Ad Hoc Networks is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization201
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques152
Malware detection in industrial internet of things based on hybrid image visualization and deep learning model130
Green internet of things using UAVs in B5G networks: A review of applications and strategies116
IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks114
A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks101
Particle swarm optimization based energy efficient clustering and sink mobility in heterogeneous wireless sensor network84
End-to-end malware detection for android IoT devices using deep learning83
A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook79
An extensive survey on the Internet of Drones75
Proposing a Secure RPL based Internet of Things Routing Protocol: A Review75
A deep learning method based on an attention mechanism for wireless network traffic prediction65
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks58
Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks57
A Survey on Mobility in Wireless Sensor Networks57
Role of machine learning and deep learning in securing 5G-driven industrial IoT applications53
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks49
A deep reinforcement learning for user association and power control in heterogeneous networks47
Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks47
Federated learning for drone authentication45
Energy-efficient coverage optimization in wireless sensor networks based on Voronoi-Glowworm Swarm Optimization-K-means algorithm41
Mobile sink-based data gathering in wireless sensor networks with obstacles using artificial intelligence algorithms41
A distributed coverage hole recovery approach based on reinforcement learning for Wireless Sensor Networks41
Drone assisted Flying Ad-Hoc Networks: Mobility and Service oriented modeling using Neuro-fuzzy39
Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET37
An enhanced energy proficient clustering (EEPC) algorithm for relay selection in heterogeneous WSNs37
Data aggregation algorithms for wireless sensor network: A review37
Lightweight elliptic curve cryptography accelerator for internet of things applications35
Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept35
A performance modeling and analysis of a novel vehicular traffic flow prediction system using a hybrid machine learning-based model35
Enhancing intelligence in traffic management systems to aid in vehicle traffic congestion problems in smart cities35
A deep reinforcement learning-based on-demand charging algorithm for wireless rechargeable sensor networks34
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective34
CR-IoTNet: Machine learning based joint spectrum sensing and allocation for cognitive radio enabled IoT cellular networks33
A comprehensive survey on clustering in vehicular networks: Current solutions and future challenges33
Low latency and energy efficient routing-aware network coding-based data transmission in multi-hop and multi-sink WSN32
A combined online-learning model with K-means clustering and GRU neural networks for trajectory prediction31
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments31
Experimental evaluation of RSSI-based positioning system with low-cost LoRa devices31
Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things31
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks30
A new provably secure certificateless signature scheme for Internet of Things30
Link utility aware geographic routing for urban VANETs using two-hop neighbor information30
Resource management in UAV-assisted wireless networks: An optimization perspective29
Generative adversarial network to detect unseen Internet of Things malware29
Human tracking and identification through a millimeter wave radar28
A multi-view CNN-based acoustic classification system for automatic animal species identification27
Energy efficient multipath ant colony based routing algorithm for mobile ad hoc networks27
An optimized transaction verification method for trustworthy blockchain-enabled IIoT26
Load balancing for RPL-based Internet of Things: A review26
WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection26
A survey on congestion detection and control in connected vehicles26
APTEEN routing protocol optimization in wireless sensor networks based on combination of genetic algorithms and fruit fly optimization algorithm25
Dynamic directional routing for mobile wireless sensor networks25
Deep learning-driven opportunistic spectrum access (OSA) framework for cognitive 5G and beyond 5G (B5G) networks25
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things24
IoT Sensor Selection for Target Localization: A Reinforcement Learning based Approach23
Energy-aware system design for batteryless LPWAN devices in IoT applications23
A secure and efficient certificateless signature scheme for Internet of Things23
A blockchain and deep neural networks-based secure framework for enhanced crop protection22
Privacy reinforcement learning for faults detection in the smart grid22
Routing in Delay-Tolerant Networks under uncertain contact plans22
A flexible encryption technique for the internet of things environment22
Low-light image joint enhancement optimization algorithm based on frame accumulation and multi-scale Retinex22
A cognitive wireless networks access selection algorithm based on MADM22
Performance evaluation of CNN-based pedestrian detectors for autonomous vehicles22
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems21
Wireless communication protocols in smart agriculture: A review on applications, challenges and future trends21
A new deep learning-based distance and position estimation model for range-based indoor localization systems21
Trusted and secured D2D-aided communications in 5G networks21
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework21
RSSI quantization and genetic algorithm based localization in wireless sensor networks21
A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography21
An overview of massive MIMO localization techniques in wireless cellular networks: Recent advances and outlook20
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET20
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures20
Immigrant imperialist competitive algorithm to solve the multi-constraint node placement problem in target-based wireless sensor networks20
An energy optimized and QoS concerned data gathering protocol for wireless sensor network using variable dimensional PSO19
RBF-SVM kernel-based model for detecting DDoS attacks in SDN integrated vehicular network19
An incentive mechanism based on a Stackelberg game for mobile crowdsensing systems with budget constraint19
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things19
A secure multipath reactive protocol for routing in IoT and HANETs19
Fuzzy-based beaconless probabilistic broadcasting for information dissemination in urban VANET19
Novel path similarity aware clustering and safety message dissemination via mobile gateway selection in cellular 5G-based V2X and D2D communication for urban environment19
Blockchain incentivized data forwarding in MANETs: Strategies and challenges19
Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks19
Gait-Watch: A Gait-based context-aware authentication system for smart watch via sparse coding19
A blockchain-enabled relay selection for QoS-OLSR in urban VANET: A Stackelberg game model19
IoT-based data-driven fault allocation in microgrids using advanced µPMUs19
Secure resource management in beyond 5G heterogeneous networks with decoupled access18
Increasing the lifetime of sensor networks by a data dissemination model based on a new approximation algorithm18
Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities18
Newton-interpolation-based zk-SNARK for Artificial Internet of Things18
A survey of mobility-aware Multi-access Edge Computing: Challenges, use cases and future directions18
Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook18
An efficient partial charging scheme using multiple mobile chargers in wireless rechargeable sensor networks18
Context-aware self-adaptive routing for delay tolerant network in disaster scenarios18
EEHCHR: Energy Efficient Hybrid Clustering and Hierarchical Routing for Wireless Sensor Networks18
Energy-efficient user selection and resource allocation in mobile edge computing18
Age of information in wireless powered IoT networks: NOMA vs. TDMA17
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications17
Efficient configuration for multi-objective QoS optimization in wireless sensor network17
Evaluating and Modeling IEEE 802.15.4 TSCH Resilience against Wi-Fi Interference in New-Generation Highly-Dependable Wireless Sensor Networks17
An enhanced geographical routing protocol based on multi-criteria decision making method in mobile ad-hoc networks17
A hybrid coverage control for enhancing UWSN localizability using IBSO-VFA16
A content distribution method of internet of vehicles based on edge cache and immune cloning strategy16
MOCRAW: A Meta-heuristic Optimized Cluster head selection based Routing Algorithm for WSNs16
Energy-efficient decentralized navigation of a team of solar-powered UAVs for collaborative eavesdropping on a mobile ground target in urban environments16
Mobile wireless sensor network lifetime maximization by using evolutionary computing methods16
AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT16
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints16
Non-cooperative game based congestion control for data rate optimization in vehicular ad hoc networks16
Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode16
A reliable deep learning-based algorithm design for IoT load identification in smart grid16
Bio-inspired routing algorithm for MANETs based on fungi networks16
Energy-efficient and solar powered mission planning of UAV swarms to reduce the coverage gap in rural areas: The 3D case16
Defense against primary user emulation attackers based on adaptive Bayesian learning automata in cognitive radio networks15
Enhanced OLSR routing for airborne networks with multi-beam directional antennas15
A novel self-adaptive multi-strategy artificial bee colony algorithm for coverage optimization in wireless sensor networks15
Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network15
A new energy-efficient and temperature-aware routing protocol based on fuzzy logic for multi-WBANs15
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems15
Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks15
Salient object detection on hyperspectral images in wireless network using CNN and saliency optimization15
Joint resource allocation for cognitive OFDM-NOMA systems with energy harvesting in green IoT15
On-demand vehicle-assisted charging in wireless rechargeable sensor networks15
Q-learning-Based Opportunistic Routing with an on-site architecture in UASNs15
Combined sensor selection and node location optimization for reducing the localization uncertainties in wireless sensor networks15
Survey and taxonomy of information-centric vehicular networking security attacks15
A cost-efficient elastic UAV relay network construction method with guaranteed QoS15
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks14
EBEESU: ElectriBio-inspired Energy-Efficient Self-organization model for Unmanned Aerial Ad-hoc Network14
Relay selection in millimeter wave D2D communications through obstacle learning14
Machine learning for 5G security: Architecture, recent advances, and challenges14
Throughput-aware path planning for UAVs in D2D 5G networks14
On the privacy and security for e-health services in the metaverse: An overview14
A blockchain-based reputation system for trusted VANET nodes13
An adaptive backoff and dynamic clear channel assessment mechanisms in IEEE 802.15.4 MAC for wireless body area networks13
Adaptive clustering routing protocol for underwater sensor networks13
Outperforming RPL with scalable routing based on meaningful MAC addressing13
Blockchain-based vehicular ad-hoc networks: A comprehensive survey13
Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks13
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks13
A cooperative crowdsensing system based on flying and ground vehicles to control respiratory viral disease outbreaks13
Cooperative multipath routing with path bridging in wireless sensor network toward IoTs service13
A residual network framework based on weighted feature channels for multispectral image compression13
RGSO-UAV: Reverse Glowworm Swarm Optimization inspired UAV path-planning in a 3D dynamic environment13
Provably secured lightweight authenticated key agreement protocol for modern health industry12
FogJam: A Fog Service for Detecting Traffic Congestion in a Continuous Data Stream VANET12
FLAT: Federated lightweight authentication for the Internet of Things12
Joint traffic-aware UAV placement and predictive routing for aerial networks12
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing12
Design of and research on industrial measuring devices based on Internet of Things technology12
A dynamic task offloading algorithm based on greedy matching in vehicle network12
Geometric least square curve fitting method for localization of wireless sensor network12
Enhanced UAV-aided vehicular delay tolerant network (VDTN) routing for urban environment using a bio-inspired approach11
UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks11
Collaborative advanced machine learning techniques in optimal energy management of hybrid AC/DC IoT-based microgrids11
Region-of-interest based video coding strategy for rate/energy-constrained smart surveillance systems using WMSNs11
Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS11
Modularity based mobility aware community detection algorithm for broadcast storm mitigation in VANETs11
Towards a robust FANET: Distributed node importance estimation-based connectivity maintenance for UAV swarms11
TGRV: A trust-based geographic routing protocol for VANETs11
Unsupervised concept drift detection based on multi-scale slide windows11
Effective malware detection scheme based on classified behavior graph in IIoT11
Differential privacy protection on weighted graph in wireless networks11
Cost optimization of UAV-MEC network calculation offloading: A multi-agent reinforcement learning method11
An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks11
A joint optimization approach for distributed collaborative beamforming in mobile wireless sensor networks11
IRATS: A DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network11
MSLG-RGSO: Movement score based limited grid-mobility approach using reverse Glowworm Swarm Optimization algorithm for mobile wireless sensor networks11
LTE-V2X Mode 3 scheduling based on adaptive spatial reuse of radio resources11
Analysis of the interplay between RPL and the congestion control strategies for CoAP10
High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm10
Practical server-side WiFi-based indoor localization: Addressing cardinality & outlier challenges for improved occupancy estimation10
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey10
WiRelax: Towards real-time respiratory biofeedback during meditation using WiFi10
Resource allocation for UAV-aided energy harvesting-powered D2D communications: A reinforcement learning-based scheme10
Energy balancing in mobile opportunistic networks with wireless charging: Single and multi-hop approaches10
Distributed optimization via primal and dual decompositions for delay-constrained FANETs10
Methods of improving Secrecy Transmission Capacity in wireless random networks10
An enhanced nonlinear iterative localization algorithm for DV_Hop with uniform calculation criterion10
Positioning aerial relays to maintain connectivity during drone team missions10
VOCkit: A low-cost IoT sensing platform for volatile organic compound classification10
Swarm intelligence inspired meta-heuristics for solving multi-constraint QoS path problem in vehicular ad hoc networks10
TRFR: A ternary relation link prediction framework on Knowledge graphs10
Energy-efficient and balanced routing in low-power wireless sensor networks for data collection10
Joint or decoupled optimization: Multi-UAV path planning for search and rescue10
PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs10
Bluetooth low energy indoor localization for large industrial areas and limited infrastructure10
Evolutionary computation technique enhancing the performance of cognitive radio networks with energy harvesting10
Reinforcement learning based effective communication strategies for energy harvested WBAN10
CAPODAZ: A containerised authorisation and policy-driven architecture using microservices10
Geographic Position based Hopless Opportunistic Routing for UAV networks10
A novel Network Partitioning Attack against Routing Protocol in Internet of Things10
Channel characteristics aware zero knowledge proof based authentication scheme in body area networks10
0.049644947052002