Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications

J. Vijitha Ananthi , P. Subha Hency Jose

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (1) : 100170

PDF (763KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (1) : 100170 DOI: 10.1016/j.hcc.2023.100170
Research Articles
research-article

Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications

Author information +
History +
PDF (763KB)

Abstract

Nowadays, Flying Adhoc Networks play a vital role due to its high efficiency in fast communication. Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication. In healthcare applications, wireless body area network transmits the data, whereas the security, which is the most important concern to be focused in a flying adhoc network is not satisfactory. Many intruders tamper the network, degrading the overall network performance. To avoid security issues, a unique and secure routing protocol that provides a single solution for five different types of attacks such as, black hole attacks, grey hole attacks, yoyo attacks, conjoint attack and jamming attacks, is proposed. The simulation results analyses the network performance by using the proposed routing table. In comparison to the other solutions rendered to resolve the affected network, this proposed routing protocol has a higher throughput, higher delivery rate, and lower delay. The Unique and Secure Routing Protocol (USRP) provides an integrated solution for an efficient and secure communication in a flying adhoc network.

Keywords

Secure routing protocol / Flying Adhoc Networks / Unmanned aerial vehicles / Mobile Adhoc network / Attackers / Denial of service attacks

Cite this article

Download citation ▾
J. Vijitha Ananthi, P. Subha Hency Jose. Performance of unique and secure routing protocol (USRP) in flying Adhoc Networks for healthcare applications. High-Confidence Computing, 2024, 4(1): 100170 DOI:10.1016/j.hcc.2023.100170

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

Ananthi J. Vijith P. Subha Hency Jose, A review on various routing protocol designing features for flying adhoc networks, in: Mobile Computing and Sustainable Informatics, Springer, Singapore, 2022, pp. 315-325.

[2]

Stefanos Tsimenidis, Thomas Lagkas, Konstantinos Rantos, Deep learning in IoT intrusion detection, J. Netw. Syst. Manage. 30 (1) (2022) 1-40.

[3]

Jing Yu, Xiaojun Ye, Hongbo Li, A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network, Future Gener. Comput. Syst. 129 (2022) 399-406.

[4]

Sihem Dadi, Mohamed Abid, Enhanced intrusion detection system based on AutoEncoder network and support vector machine, in: Networking, Intelligent Systems and Security, Springer, Singapore, 2022, pp. 327-341.

[5]

Chaimae Benjbara, Ahmed Habbani, Nada Mouchfiq, New multipath OLSR protocol version for heterogeneous adhoc networks, J. Sensor Actuator Netw. 11 (1) (2022) 3.

[6]

Moayad Aloqaily, Rasheed Hussain, Deena Khalaf, Dana Hani, Alma Orace-vic, On the role of futuristic technologies in securing UAV-supported autonomous vehicles, IEEE Consum. Electron. Mag. (2022).

[7]

Claudia Greco, Pasquale Pace, Stefano Basagni, Giancarlo Fortino, Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees, Appl. Soft Comput. 111 (2021) 107806.

[8]

Ananthi J. Vijitha P. Subha Hency Jose, A review on various routing protocol designing features for flying adhoc networks, in: Mobile Computing and Sustainable Informatics, Springer, Singapore, 2022, pp. 315-325.

[9]

Mousaab Bada, Djallel Eddine Boubiche, Nasreddine Lagraa, Chaker Abdelaziz Kerrache, Muhammad Imran, Muhammad Shoaib, A policy-based solution for the detection of colluding GPS-spoofing attacks in FANETs, Transp. Res. A 149 (2021) 300-318.

[10]

Shikha Gupta, Neetu Sharma, Rakesh Rathi, Deepak Gupta, Dual detection procedure to secure flying adhoc networks: A trust-based framework, in: Smart Technologies in Data Science and Communication, Springer, Singapore, 2021, pp. 83-95.

[11]

Chafiq Titouna, Farid Naït-Abdesselam, Securing unmanned aerial systems using mobile agents and artificial neural networks, in: 2021 International Wireless Communications and Mobile Computing, IWCMC, IEEE, 2021, pp. 825-830.

[12]

C. Anand , N. Vasuki, Trust based DoS attack detection in wireless sensor networks for reliable data transmission, Wirel. Pers. Commun. (2021) 1-16.

[13]

Ankit Kumar, Vijayakumar Varadarajan, Abhishek Kumar, Pankaj Dadheech, Surendra Singh Choudhary, V.D Ambeth Kumar, Bijaya Ketan Panigrahi, Kalyana C. Veluvolu, Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm, Microprocess. Microsyst. 80 (2021) 103352.

[14]

Chamika Sudusinghe, Subodha Charles, Prabhat Mishra, Denial-of-service attack detection using machine learning in network-on-chip architectures, in:Proceedings of the 15th IEEE/ACM International Symposium on Networks-on-Chip, 2021, pp. 35-40.

[15]

Somnath Sinha, Impact of DoS attack in IoT system and identifying the attacker location for interference attacks, in: 2021 6th International Conference on Communication and Electronics Systems, ICCES, IEEE, 2021, pp. 657-662.

[16]

G. Kalyani, Shilpa Chaudhari, Security aware routing: Rule based attack detection on optimal shortest route selection, Adhoc Sensor Wirel. Netw. 49 (2021).

[17]

P. Hemalatha, J. Vijitha Ananthi, R. Kalaivani, Analysis of reverse tracing algorithm for the detection of DOS attacks in MANET, Int. J. Autonomic Comput. 2 (4) (2017) 311-322.

[18]

Jianxiong Guo, Xingjian Ding, Tian Wang, Weijia Jia, Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy, Inform. Sci. 607 (2022) 211-229.

[19]

Jianxiong Guo, Xingjian Ding, Weili Wu, An architecture for distributed energies trading in Byzantine-based blockchains, IEEE Trans. Green Commun. Netw. 6 (2) (2022) 1216-1230.

[20]

T.V.P. Sundararajan, S.M. Ramesh, K.R. Deepak, Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET, Wirel. Netw. 20 (2014) 563-578.

[21]

Lelio Campanile, Marco Gribaudo, Mauro Iacono, Fiammetta Marulli, Michele Mastroianni, Computer network simulation with ns-3: A systematic literature review, Electronics 9 (2) (2020) 272.

[22]

Shelja Sharma, Suresh Kumar Bhardwaj, Experimental analysis of olsr and dsdv protocols on ns-2.35 in mobile ad-hoc networks, Int. J. Comput. Netw. Inf. Secur. 7 (8) (2015) 21-29.

[23]

Vijitha J. Ananthi P. Subha Hency Jose, Mobility management UAV-based grouping routing protocol in flying ad hoc networks for biomedical applications, Int. J. Commun. Syst. 36 (1) (2023) e5362.

[24]

Vijitha J. Ananthi P. Subha Hency Jose, Implementation of IoT and UAV based WBAN for healthcare applications, in: 2021 Third International Conference on Inventive Research in Computing Applications, ICIRCA, IEEE, 2021, pp. 37-42.

AI Summary AI Mindmap
PDF (763KB)

247

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/