2018
DOI: 10.1109/access.2018.2879758
|View full text |Cite
|
Sign up to set email alerts
|

Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(51 citation statements)
references
References 37 publications
0
49
0
2
Order By: Relevance
“…(3) E=(1,2), (1,8), (2,3), (2,8), (3,9), (3,4), (3,6), (4,6), (4,5), (5,6), (6,7), (7,9), (7,8), (8,9)…”
Section: Proposal Of To Design Different Broadcast Network a Hfunclassified
See 2 more Smart Citations
“…(3) E=(1,2), (1,8), (2,3), (2,8), (3,9), (3,4), (3,6), (4,6), (4,5), (5,6), (6,7), (7,9), (7,8), (8,9)…”
Section: Proposal Of To Design Different Broadcast Network a Hfunclassified
“…(5) E = (1, 2), (1,8), (7,8), (3,9), (6,7), (3,6), (3,4), (4, 5) (6) In MCST based broadcast network, all the nodes of an initial MANET network are connected but only reflected edges would be used to transmit control messages for route discovery. As an example, when node '1' is a source and node '9' is destination the control message will only flows through (1,2), (1,8,7,6,3,9) and (1,8,7,6,3,4,5) using MCST based broadcast network as shown in Fig.4(h) but according to MANET's base topology Fig.3 the control messages will flows through all the paths (1,2,3,9), (1,8,9), (1,8,7,9), (1,2,8,9) etc. In contrary, let source node is '1' and the destination node is '5', the path cost to travel the control message from a node (1, 5) is 37 according to Fig.4(h).…”
Section: Proposal Of To Design Different Broadcast Network a Hfmentioning
confidence: 99%
See 1 more Smart Citation
“…Jamming attacks pose a significant threat. Jamming attacks target communication and surveillance components of the UAV device which has implications for the relay of information [54]. For example, jamming attacks are used to perpetrate Automatic Detection Surveillance-Broadcast (ADS-B).…”
Section: Cyber Attacks In Uav Network and Sdn-based Countermeasuresmentioning
confidence: 99%
“…Pu et al [54], present a multipath routing protocol to allow for more efficient data transmission and increasingly reliable communication. During the occurrence of jamming attacks, in FANETs the network resiliency is also improved.…”
Section: Availability Attacks On Uav Networkmentioning
confidence: 99%