Abstract: Security analysis of ad hoc routing protocols in an adversarial environment is a challenging task. The paper utilizes Event-B to model and verify the Secure Routing Protocol (SRP), a secure ...
Abstract: Mobile Ad Hoc Networks (MANETs) possess several unique qualities, including multiple nodes, dynamic topology changes, decentralized operation, and adaptability. However, conventional routing ...
Abstract: To enhance the multi-target path planning and tracking performance of Unmanned Surface Vehicles (USVs), a combined control strategy integrating the Serret-Frenet Line-of-Sight (SFLOS) ...
Abstract: Underwater Wireless Sensor Networks (UWSNs) face significant communication and performance challenges due to their harsh and dynamic underwater environment. To address these issues, ...
Abstract: Cluster head (CH) nodes near the base station (BS) die prematurely due to the need to perform more communication tasks, which can lead to disruption of network connectivity and makes it ...
Abstract: Focusing on the characteristics of low-latency transmission and chain-distributed sensors along intelligent roads, this article investigates a multichain multihop routing protocol (MMRP) ...
Abstract: Wireless networks consisting of small, lightweight, and low-power fixed-wing unmanned aerial vehicles (UAVs) are used in many applications, such as monitoring, search, and surveillance of ...
Abstract: Underwater acoustic communication networks face unique challenges such as limited bandwidth, long propagation delay, and high error rate. To address these ...
Abstract: This systematic literature review critically examines the current state of cache improvement strategies in the routing protocol for Ad-Hoc Networks. Despite the growing significance of ...
Abstract: This research investigates the challenges of achieving efficient, reliable data transmission in underwater sensor networks (UWSNs) considering the unique underwater environment, which is ...
Abstract: Attacks that aim to disrupt services, known as Distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening ...
Abstract: This paper proposes an evaluation of scalable routing protocols for huge-scale communications. Especially, it focuses on the two most important training of scalable routing protocols: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results