Ad Hoc Networks

Papers
(The median citation count of Ad Hoc Networks is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
MBC-SS: A multi-band cooperative sidelink scheme for NR V2X networks167
Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589]163
JamBIT: RL-based framework for disrupting adversarial information in battlefields125
Residual multiscale attention based modulated convolutional neural network for radio link failure prediction in 5G112
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET112
LESCA: LightwEight Stream Cipher Algorithm for emerging systems107
TemsRoute: A temporally and socially aware routing framework for delay-tolerant networks87
A secure and efficient certificateless signature scheme for Internet of Things81
BFL-SC: A blockchain-enabled federated learning framework, with smart contracts, for securing social media-integrated internet of things systems80
Reliable and cost-efficient session provisioning in CRNs using spectrum sensing as a service80
Fuzzy-AHP based optimal RSU deployment (Fuzzy-AHP-ORD) approach using road and traffic analysis in VANET75
Newton-interpolation-based zk-SNARK for Artificial Internet of Things75
Generative adversarial network to detect unseen Internet of Things malware74
Performance evaluation of CNN-based pedestrian detectors for autonomous vehicles71
Editorial Board68
Hybrid fusion of Pietra–Ricci index detector information for cooperative spectrum sensing67
CollOR: Distributed collaborative offloading and routing for tasks with QoS demands in multi-robot system66
Gas sensing in industry. A case study: Train hangar65
Performance of STAR-RIS-aided cooperative NOMA networks under Nakagami-m64
Multi-label active learning from crowds for secure IIoT57
Wireless communication protocols in smart agriculture: A review on applications, challenges and future trends57
An efficient energy saving scheme using reinforcement learning for 5G and beyond in H-CRAN56
Time–frequency fusion for enhancement of deep learning-based physical layer identification56
Federated Learning-based Misbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles55
Communication and Motion Coordination Awareness in Networked Aerial Robot Teams53
LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks53
Protect your data and I’ll rank its utility: A framework for utility analysis of anonymized mobility data for smart city applications51
Performance analysis and optimization of frequency division duplex based virtual full-duplex communication systems51
Special issue: Selected papers from COMSNETS 202050
Dwell time estimation at intersections for improved vehicular micro cloud operations48
Editorial Board48
Integrated network-computing resource allocation and optimized scheduling for cyber physical production system46
vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers45
Multi-agent reinforcement learning for network routing in integrated access backhaul networks45
Authentication and security challenges for Unmanned Aerial Vehicles: A survey45
CRT-based group rekeying with efficient dynamically aggregate signature for IoMT44
Sum rate maximization for RSMA aided small cells edge users using meta-learning variational quantum algorithm44
A delay-tolerant network approach to satellite pickup and delivery scheduling42
High-precision Time Synchronization Algorithm for Unmanned Aerial Vehicle Ad Hoc Networks based on Bidirectional Pseudo-range Measurements41
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures40
Energy-efficient clustering and path planning for UAV-assisted D2D cellular networks40
Enabling an inter-operator roaming capability in LoRaWAN networks40
Energy-efficient multi-hop LoRa broadcasting with reinforcement learning for IoT networks39
An adaptive and cooperative MAC protocol for safety applications in cognitive radio enabled vehicular Ad-hoc networks38
Machine learning attack detection based-on stochastic classifier methods for enhancing of routing security in wireless sensor networks37
FogJam: A Fog Service for Detecting Traffic Congestion in a Continuous Data Stream VANET37
ENSING: Energy saving based data transmission in Internet of Drones for 3D connectivity in 6G networks37
Communication architecture and operations for SDR-enabled UAVs network in disaster-stressed areas37
Indoor tracking using auxiliary particle filter and deep learning in wireless sensor networks37
Joint hierarchical placement and configuration of edge servers in C-V2X36
An incentive mechanism based on a Stackelberg game for mobile crowdsensing systems with budget constraint36
A security optimization scheme for data security transmission in UAV-assisted edge networks based on federal learning35
Instant on-demand charging strategy with multiple chargers in wireless rechargeable sensor networks35
Design and implementation for a UAV-based streaming media system35
Enhancing longevity: Sustainable channel modeling for wireless-powered implantable BANs34
A new delay-based broadcast suppression mechanism for efficient emergency messages dissemination in CAVs environment34
Editorial Board34
Adaptive link quality routing protocol for UASNs with double forwarding modes33
RPL-TSCH cross-layer design for improve quality of service in LLNs of IIoT33
A smart contract-based 6G-enabled authentication scheme for securing Internet of Nano Medical Things network32
THz band drone communications with practical antennas: Performance under realistic mobility and misalignment scenarios32
High-throughput and energy-efficient data gathering in heterogeneous multi-channel wireless sensor networks using genetic algorithm31
Privacy computing meets metaverse: Necessity, taxonomy and challenges31
A CrowdSensing-based approach for proximity detection in indoor museums with Bluetooth tags31
Machine learning for 5G security: Architecture, recent advances, and challenges31
The partial cloud member replacement for reconstructing vehicular clouds in VANETs: Reactive and proactive schemes30
BitCover: Enhanced BitTorrent for interactive VoD streaming over 5G and WiFi-Direct30
Probabilistic and distributed traffic control in LPWANs30
ADRP-DQL: An adaptive distributed routing protocol for underwater acoustic sensor networks using deep Q-learning29
Routing in Delay-Tolerant Networks under uncertain contact plans29
Editorial Board29
A Lightweight_PAEKS-based energy scheduling model considering priority in MicroGrid29
Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook29
V2X application server and vehicle centric distribution of commitments for V2V message authentication28
Optimum power allocation for an energy harvesting wireless communication system considering energy storage losses28
Capacity and delay analysis of multi-hop wireless networks28
Travel Hopping Enabled Resource Allocation (THEResA) and delay tolerant networking through the use of UAVs in railroad networks27
Interlocking IT/OT security for edge cloud-enabled manufacturing27
Efficient configuration for multi-objective QoS optimization in wireless sensor network26
An integrated routing and data fragmentation strategy for optimizing end-to-end delay in LEO satellite networks26
Secure and multi-access offloading for computational efficiency optimization in ultra-dense NOMA-enabled networks26
A novel method for spectrum sensing in cognitive radio networks using fractional GWO CS optimization25
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems25
Resource allocation for multiple RISs assisted NOMA empowered D2D communication: A MAMP-DQN approach25
Cost optimization of UAV-MEC network calculation offloading: A multi-agent reinforcement learning method25
Age of information is not just a number: Status updates against an eavesdropping node25
A coarse to accurate noise-tolerant positioning evaluation for mobile target based on modified genetic algorithm25
Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks25
Editorial Board24
HWMP-based secure communication of multi-agent systems24
Traffic based power consumption and node deployment in green LTE-A cellular networks24
Editorial Board24
MOANS DV-Hop: An anchor node subset based localization algorithm for wireless sensor networks24
Detection and Mitigation of Clock Deviation in the Verification & Validation of Drone-aided Lifting Operations23
Editorial Board23
Age and energy aware data collection scheme for urban flood monitoring in UAV-assisted Wireless Sensor Networks23
An edge computing and distributed ledger technology architecture for secure and efficient transportation22
Blockchain-based vehicular ad-hoc networks: A comprehensive survey22
Joint computation offloading and resource allocation in space-air-terrestrial integrated networks for IoT Applications22
A review of on-device machine learning for IoT: An energy perspective22
Deployment of UAV-BSs for on-demand full communication coverage22
Mobile association scheme based on auction algorithm in heterogeneous wireless networks22
An adaptive social-aware device-to-device communication mechanism for wireless networks22
A cross layer based cooperative broadcast protocol for multichannel VANET21
An Hybrid Heuristic optimal relay selection strategy for energy efficient multi hop cooperative cellular communication21
ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks21
Proof of Evaluation-based energy and delay aware computation offloading for Digital Twin Edge Network21
Vehicular edge cloud computing content caching optimization solution based on content prediction and deep reinforcement learning21
An innovative multi-agent approach for robust cyber–physical systems using vertical federated learning21
ALSNAP: Attention-based long and short-period network security situation prediction21
MRPSO-Loc: Multi-targets UHF RFID localization system based on MRPSO algorithm21
Regularized constrained total least squares localization for underwater acoustic sensor networks using angle-delay-doppler measurements21
Joint robust 3D trajectory and communication design for dual-UAV enabled secure communications in probabilistic LoS channel20
Bandwidth partitioning in random-access Poisson networks: Stability, throughput and delay20
A novel and lightweight wireless communication scheme for Vehicular Ad hoc Networks20
WSN-based wildlife localization framework in dense forests through optimization techniques20
Optimizing UAV-UGV coalition operations: A hybrid clustering and multi-agent reinforcement learning approach for path planning in obstructed environment20
Defending edge computing based metaverse AI against adversarial attacks20
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols20
Editorial Board19
Joint resource allocation and UAV placement in UAV-assisted Wireless Powered Sensor Networks using TDMA and NOMA19
Reliability and bandwidth aware routing in SDN-based fog computing for IoT applications19
Battery life optimization in LoRa networks using spreading factor reallocation19
Editorial Board19
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks19
D2D routing aided networking for efficient energy consumption management of wireless IoT18
Editorial Board18
Resource and trajectory optimization for UAV-assisted MEC communication systems over unlicensed spectrum band18
DV-Hop-based localization algorithm using optimum anchor nodes subsets for wireless sensor network18
A new energy-efficient and temperature-aware routing protocol based on fuzzy logic for multi-WBANs18
Whale optimization-orchestrated Federated Learning-based resource allocation scheme for D2D communication18
Inferring mobile applications usage from DNS traffic18
Distributed topology control of multiple ISAC-UAVs for mobile search teams in unknown 3-D terrains18
Multiple hypothesis testing in cognitive IoT sensor network18
Improved junction-based routing for VANETs using a Bio-inspired route stability approach17
Bio-inspired multi-hop clustering algorithm for FANET17
Editorial Board17
Verifying trust over IoT-ad hoc network-based applications under uncertainty17
LB-OPAR: Load balanced optimized predictive and adaptive routing for cooperative UAV networks17
EDRP-GTDQN: An adaptive routing protocol for energy and delay optimization in wireless sensor networks using game theory and deep reinforcement learning17
A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNs17
A two-context-aware approach for navigation: A case study for vehicular route recommendation17
Greedy cooperative cache placement for mobile edge networks with user preferences prediction and adaptive clustering17
Joint spectrum sensing and D2D communications in Cognitive Radio Networks using clustering and deep learning strategies under SSDF attacks17
Task offloading strategy and scheduling optimization for internet of vehicles based on deep reinforcement learning17
Collecting large volume data from wireless sensor network by drone17
Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing17
EVRP: A novel geometrical based energy efficient eye vision routing protocol for wireless sensor networks based on the k-means algorithm17
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction16
On the performance of Zenoh in Industrial IoT Scenarios16
Enhancing quality of service through federated learning in edge-cloud architecture16
Cross-layer UAV network routing protocol for spectrum denial environments16
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning16
RGSO-UAV: Reverse Glowworm Swarm Optimization inspired UAV path-planning in a 3D dynamic environment16
A spectral clustering-based deployment strategy for roadside units in vehicular edge computing environments16
DIVE: A distributed ID assignment and topology discovery protocol for underwater acoustic networks16
Security in wireless body area networks via anonymous authentication: Comprehensive literature review, scheme classification, and future challenges16
Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure16
Enhancing MPTCP performance in wireless networks with PRS-MPTCP16
A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks15
Editorial Board15
NMSFRA: Heterogeneous routing protocol for balanced energy consumption in mobile wireless sensor network15
A game-theoretic approach of cyberattack resilient constraint-following control for cyber–physical systems15
Distributed Detecting of Critical Nodes for Maximization of Connected Components in Wireless Multi-hop Networks15
Editorial Board15
Energy efficient deployment of aerial base stations for mobile users in multi-hop UAV networks15
Coexistence of NR-U operators in multichannel scenarios: Fair cooperation or endless struggle for channel resources15
URNFresh: Age-of-infomation-based 60 GHz UAV relay networks for video surveillance in linear environments15
Approximation schemes for age of information minimization in UAV grid patrols15
An IPSO-assisted DNN operation scheme in UAV-mounted MEC networks15
Data-driven cell-free scheduler15
SFEM3: A performance comparative analysis for SDN-based FANET Emulation using Mininet-WiFi and ns-315
THz-enabled UAV communications: Motivations, results, applications, challenges, and future considerations14
AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security14
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime14
Li-Wi: An upper layer hybrid VLC-WiFi network handover solution14
High-integrity based cooperative file transmission at urban intersections using pure V2V communication14
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks14
STAG: A novel interaction-aware path prediction method based on Spatio-Temporal Attention Graphs for connected automated vehicles14
Deep reinforcement learning in NOMA-assisted UAV networks for path selection and resource offloading14
Positioning aerial relays to maintain connectivity during drone team missions14
Fuzzy cluster-based multi-node charging strategy in mobile sensor networks14
Energy efficient and coverage aware grey wolf optimizer based clustering process for Software-defined wireless sensor networks14
Multi-user motion state task offloading strategy for load balancing in mobile edge computing networks13
A novel coverage-aware task allocation scheme in Cooperative Mobile Crowd Sensing13
FLAV: Federated Learning for Autonomous Vehicle privacy protection13
BFSearch: Bloom filter based tag searching for large-scale RFID systems13
Status-aware and energy-efficient data aggregation for inter-tidal monitoring systems13
Cost-effective live video streaming for internet of connected vehicles using heterogeneous networks13
A weighted hybrid indoor positioning method based on path loss exponent estimation13
Deep learning with synthetic data for wireless NLOS positioning with a single base station13
Editorial Board13
Towards a robust FANET: Distributed node importance estimation-based connectivity maintenance for UAV swarms13
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT13
Trust secure data aggregation in WSN-based IIoT with single mobile sink13
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things13
FFP: A Force Field Protocol for the tactical management of UAV conflicts12
UAV-assisted task offloading system using dung beetle optimization algorithm & deep reinforcement learning12
Impact of urban environments on FANET communication: A comparative study of propagation models12
A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography12
Reduced network forwarding with controller enabled named software defined Internet of Mobile Things12
UAV relay network deployment through the area with barriers12
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions12
A Meta Meeting Mountain based opportunistic message forwarding strategy12
RSSI-based fingerprint localization in LoRaWAN networks using CNNs with squeeze and excitation blocks12
Mobility-aware Vehicular Cloud formation mechanism for Vehicular Edge Computing environments12
EMBN-MANET: A method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network12
Self-detection based fault diagnosis for wireless sensor networks12
Editorial Board12
A comprehensive survey on clustering in vehicular networks: Current solutions and future challenges11
Fractional function energy efficiency optimization in wireless networks: A graph convolutional network approach11
A 5G-TSN joint resource scheduling algorithm based on optimized deep reinforcement learning model for industrial networks11
A privacy-preserving route planning scheme for the Internet of Vehicles11
An optimizing geo-distributed edge layering with double deep Q-networks for predictive mobility-aware offloading in mobile edge computing11
A Hybrid Charging Scheme for Non-deterministic Mobile Nodes aimed at minimizing the number of dead nodes11
Edge assisted heterogeneity aware vehicular selection using Federated Learning11
Characteristics analysis and suppression strategy of energy hole in wireless sensor networks11
Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC11
Editorial Board11
A hybrid and self-adaptive QoS and QoE-driven RAT selection strategy for IoT devices11
IEEE 802.11ay enabled integrated mmWave radar detection and wireless communications11
Vehicle task offloading strategy based on DRL in communication and sensing scenarios11
A compendium of radio resource management in UAV-assisted next generation computing paradigms11
Mission-based PTR triangle for multi-UAV systems flight planning11
Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks11
Intelligent agent based virtual clustering and multi-context aware routing for congestion mitigation in secure RPL-IoT environment11
Remediation of chaos in cognitive Internet of Things sensor network11
Distributed sparsity-based non-linear regression with multiple kernels in wireless sensor networks11
An energy efficient prediction based protocol for target tracking in wireless sensor networks10
Connectivity analysis of 2D underwater optical wireless sensor networks using a geometric approach10
Voronoi diagrams and tree structures in HRP-EE: Enhancing IoT network lifespan with WSNs10
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment10
Fairness-aware task offloading and load balancing with delay constraints for Power Internet of Things10
Blockchain and trust-based clustering scheme for the IoV10
Multi-objective-derived energy efficient routing in wireless sensor network using adaptive black hole-tuna swarm optimization strategy10
A novel resource allocation method based on supermodular game in EH-CR-IoT networks10
Multi-agent deep reinforcement learning based resource management in SWIPT enabled cellular networks with H2H/M2M co-existence10
Efficient and secure selective cipher scheme for MIoT compressed images10
Realization of maximum flow in DTN and application in CGR10
Non-Terrestrial UAV Clients for Beyond 5G Networks: A Comprehensive Survey10
A dynamic method to protect user privacy against traffic-based attacks on smart home10
A branch-and-price approach to a variant of the cognitive radio resource allocation problem10
PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks10
A schedulability-aware routing algorithm for time sensitive network based on improved ant colony algorithm10
Lightweight and Fast Physical-Layer Key Generation in FDD Systems using Random Forest10
Collaborative multi-target-tracking via graph-based deep reinforcement learning in UAV swarm networks10
K-means online-learning routing protocol (K-MORP) for unmanned aerial vehicles (UAV) adhoc networks10
HPS: A Hybrid Proactive Scheduler with adaptive channel selection for industrial 6TiSCH networks10
SPY-BOT: Machine learning-enabled post filtering for Social Network-Integrated Industrial Internet of Things10
Metaheuristic Algorithms for 6G wireless communications: Recent advances and applications10
0.077843904495239