Trusted fuzzy routing scheme in flying ad-hoc network

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 28

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JFEA-5-1_004

تاریخ نمایه سازی: 18 شهریور 1403

Abstract:

Unmanned Aerial Vehicles (UAVs) bring both potential and difficulties for emergency applications, including packet loss and changes in network topology. UAVs are also quickly taking up a sizable portion of the airspace, allowing Flying Ad-hoc NETworks (FANETs) to conduct effective ad hoc missions. Therefore, building routing protocols for FANETs is difficult due to flight restrictions and changing topology. To solve these problems, a bio-inspired route selection technique is proposed for FANET. A combined trustworthy and bioinspired-based transmission strategy is developed as a result of the growing need for dynamic and adaptable communications in FANETs. The fitness theory is used to assess direct trust and evaluate credibility and activity to estimate indirect trust. In particular, assessing UAV behavior is still a crucial problem in this field. It recommends fuzzy logic, one of the most widely utilized techniques for trusted route computing, for this purpose. Fuzzy logic can manage complicated settings by classifying nodes based on various criteria. This method combines geocaching and unicasting, anticipating the location of intermediate UAVs using ۳-D estimates. This method guarantees resilience, dependability, and an extended path lifetime, improving FANET performance noticeably. Two primary features of FANETs that shorten the route lifetime must be accommodated in routing. First, the collaborative nature necessitates communication and coordination between the flying nodes, which uses a lot of energy. Second, the flying nodes' highly dynamic mobility pattern in ۳D space may cause link disconnection because of their potential dispersion. Using ant colony optimization, it employs trusted leader drone selection within the cluster and safe routing among leaders. a fuzzy‐based UAV behavior analytics is presented for trust management in FANETs. Compared to existing protocols, the simulated results demonstrate improvements in delay routing overhead in FANET.

Authors

Sahabul Alam

Department of Computer Science and Engineering, Brainware University, Barasat, Kolkata-۷۰۰۱۲۵, West Bengal, India.

Joydeep Kundu

Department of Computer Science and Engineering, Brainware University, Barasat, Kolkata-۷۰۰۱۲۵, West Bengal, India.

Shivnath Ghosh

Brainware University, Barasat, Kolkata-۷۰۰۱۲۵, West Bengal, India.

Arindam Dey

School of Computer Science and Engineering, VIT-AP University, Amaravati, Andhra Pradesh, India.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Hosseinzadeh, M., Mohammed, A. H., Alenizi, F. A., Malik, M. ...
  • Wang, Z., Tian, L., Lin, L., Xie, J., Wu, W., ...
  • Abdulhae, O. T., Mandeep, J. S., & Islam, M. (۲۰۲۲). ...
  • Liu, Y., Xie, J., Xing, C., & Xie, S. (۲۰۲۳). ...
  • Ye, Z., Wang, K., Chen, Y., Jiang, X., & Song, ...
  • Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (۲۰۲۲). ...
  • Messaoudi, K., Oubbati, O. S., Rachedi, A., Lakas, A., Bendouma, ...
  • Tlili, F., Fourati, L. C., Ayed, S., & Ouni, B. ...
  • Singh, K., & Verma, A. K. (۲۰۲۰). TBCS: A trust ...
  • Barka, E., Kerrache, C. A., Lagraa, N., Lakas, A., Calafate, ...
  • Ganesan, R., Raajini, X. M., Nayyar, A., Sanjeevikumar, P., Hossain, ...
  • Du, X., Li, Y., Zhou, S., & Zhou, Y. (۲۰۲۲). ...
  • Bhardwaj, V., Kaur, N., Vashisht, S., & Jain, S. (۲۰۲۱). ...
  • Gankhuyag, G., Shrestha, A. P., & Yoo, S. J. (۲۰۱۷). ...
  • Yu, S., Lee, J., Sutrala, A. K., Das, A. K., ...
  • Bhardwaj, V., & Kaur, N. (۲۰۲۱). SEEDRP: a Secure energy ...
  • Zhai, W., Liu, L., Ding, Y., Sun, S., & Gu, ...
  • Namdev, M., Goyal, S., & Agarwal, R. (۲۰۲۱). An optimized ...
  • Khan, M. A., Qureshi, I. M., & Khanzada, F. (۲۰۱۹). ...
  • Lu, Y., Wen, W., Igorevich, K. K., Ren, P., Zhang, ...
  • Sharma, B., Obaidat, M. S., Sharma, V., & Hsiao, K. ...
  • Khan, M. F., Yau, K. L. A., Noor, R. M., ...
  • Xu, M., Xie, J., Xia, Y., Liu, W., Luo, R., ...
  • Mukherjee, A., Dey, N., Kausar, N., Ashour, A. S., Taiar, ...
  • Kaur, M., Verma, S., & Kavita. (۲۰۲۰). Flying ad-hoc network ...
  • Pan, H., Liu, Y., Sun, G., Fan, J., Liang, S., ...
  • Beegum, T. R., Idris, M. Y. I., Ayub, M. N. ...
  • Alkadi, R., & Shoufan, A. (۲۰۲۳). Unmanned aerial vehicles traffic ...
  • Mohsan, S. A. H., Othman, N. Q. H., Li, Y., ...
  • Bansal, G., Naren, Chamola, V., & Sikdar, B. (۲۰۲۲). SHOTS: ...
  • Khayat, G., Mavromoustakis, C. X., Pitsillides, A., Batalla, J. M., ...
  • Wei, W., Wang, J., Fang, Z., Chen, J., Ren, Y., ...
  • Bastami, H., Moradikia, M., Abdelhadi, A., Behroozi, H., Clerckx, B., ...
  • Shimaa S. Mohamed, Ahmed Abdel Monem, & Alshaimaa A. Tantawy. ...
  • Nada A.Nabeeh, Karam M. Sallam, & Ali Wagdy Mohamed. (۲۰۲۳). ...
  • Maia, A. L. M. D., & Frogeri, R. F. (۲۰۲۳). ...
  • Pajić, V., & Andrejić, M. (۲۰۲۳). Risk analysis in internal ...
  • Ghanbari Talouki, A., Koochari, A., & Ahmad Edalatpanah, S. (۲۰۲۴). ...
  • Venugopal, R., Veeramani, C., & Edalatpanah, S. A. (۲۰۲۴). Enhancing ...
  • نمایش کامل مراجع