Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (348)

Search Parameters:
Keywords = ad hoc wireless networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1885 KiB  
Article
Applying Machine Learning to DEEC Protocol: Improved Cluster Formation in Wireless Sensor Networks
by Abdulla Juwaied and Lidia Jackowska-Strumillo
Network 2025, 5(3), 26; https://doi.org/10.3390/network5030026 - 24 Jul 2025
Viewed by 204
Abstract
Wireless Sensor Networks (WSNs) are specialised ad hoc networks composed of small, low-power, and often battery-operated sensor nodes with various sensors and wireless communication capabilities. These nodes collaborate to monitor and collect data from the physical environment, transmitting it to a central location [...] Read more.
Wireless Sensor Networks (WSNs) are specialised ad hoc networks composed of small, low-power, and often battery-operated sensor nodes with various sensors and wireless communication capabilities. These nodes collaborate to monitor and collect data from the physical environment, transmitting it to a central location or sink node for further processing and analysis. This study proposes two machine learning-based enhancements to the DEEC protocol for Wireless Sensor Networks (WSNs) by integrating the K-Nearest Neighbours (K-NN) and K-Means (K-M) machine learning (ML) algorithms. The Distributed Energy-Efficient Clustering with K-NN (DEEC-KNN) and with K-Means (DEEC-KM) approaches dynamically optimize cluster head selection to improve energy efficiency and network lifetime. These methods are validated through extensive simulations, demonstrating up to 110% improvement in packet delivery and significant gains in network stability compared with the original DEEC protocol. The adaptive clustering enabled by K-NN and K-Means is particularly effective for large-scale and dynamic WSN deployments where node failures and topology changes are frequent. These findings suggest that integrating ML with clustering protocols is a promising direction for future WSN design. Full article
Show Figures

Figure 1

16 pages, 2468 KiB  
Article
Temperature State Awareness-Based Energy-Saving Routing Protocol for Wireless Body Area Network
by Yu Mu, Guoqiang Zheng, Xintong Wang, Mengting Zhu and Huahong Ma
Appl. Sci. 2025, 15(13), 7477; https://doi.org/10.3390/app15137477 - 3 Jul 2025
Viewed by 292
Abstract
As an emerging information technology, Wireless Body Area Networks (WBANs) provide a lot of convenience for the development of the medical field. A WBAN is composed of many miniature sensor nodes in the form of an ad hoc network, which can realize remote [...] Read more.
As an emerging information technology, Wireless Body Area Networks (WBANs) provide a lot of convenience for the development of the medical field. A WBAN is composed of many miniature sensor nodes in the form of an ad hoc network, which can realize remote medical monitoring. However, the data transmission between sensor nodes in the WBAN not only consumes the energy of the node but also causes the temperature of the node to rise, thereby causing human tissue damage. Therefore, in response to the energy consumption problem in the Wireless Body Area Network and the hot node problem in the transmission path, this paper proposes a temperature state awareness-based energy-saving routing protocol (TSAER). The protocol senses the temperature state of nodes and then calculates the data receiving probability of nodes in different temperature state intervals. A benefit function based on several parameters such as the residual energy of the node, the distance to sink, and the probability of receiving data was constructed. The neighbor node with the maximum benefit function was selected as the best forwarding node, and the data was forwarded. The simulation results show that compared with the existing M-ATTEPMT and iM-SIMPLE protocols, TSAER effectively prolongs the network lifetime and controls the formation of hot nodes in the network. Full article
Show Figures

Figure 1

31 pages, 1240 KiB  
Article
An Adaptive PSO Approach with Modified Position Equation for Optimizing Critical Node Detection in Large-Scale Networks: Application to Wireless Sensor Networks
by Abdelmoujib Megzari, Walid Osamy, Bader Alwasel and Ahmed M. Khedr
J. Sens. Actuator Netw. 2025, 14(3), 62; https://doi.org/10.3390/jsan14030062 - 16 Jun 2025
Viewed by 862
Abstract
In recent years, wireless sensor networks (WSNs) have been employed across various domains, including military services, healthcare, disaster response, industrial automation, and smart infrastructure. Due to the absence of fixed communication infrastructure, WSNs rely on ad hoc connections between sensor nodes to transmit [...] Read more.
In recent years, wireless sensor networks (WSNs) have been employed across various domains, including military services, healthcare, disaster response, industrial automation, and smart infrastructure. Due to the absence of fixed communication infrastructure, WSNs rely on ad hoc connections between sensor nodes to transmit sensed data to target nodes. Within a WSN, a sensor node whose failure partitions the network into disconnected segments is referred to as a critical node or cut vertex. Identifying such nodes is a fundamental step toward ensuring the reliability of WSNs. The critical node detection problem (CNDP) focuses on determining the set of nodes whose removal most significantly affects the network’s connectivity, stability, functionality, robustness, and resilience. CNDP is a significant challenge in network analysis that involves identifying the nodes that have a significant influence on connectivity or centrality measures within a network. However, achieving an optimal solution for the CNDP is often hindered by its time-consuming and computationally intensive nature, especially when dealing with large-scale networks. In response to this challenge, we present a method based on particle swarm optimization (PSO) for the detection of critical nodes. We employ discrete PSO (DPSO) along with the modified position equation (MPE) to effectively solve the CNDP, making it applicable to various k-vertex variations of the problem. We examine the impact of population size on both execution time and result quality. Experimental analysisusing different neighborhood topologies—namely, the star topology and the dynamic topology—was conducted to analyze their impact on solution effectiveness and adaptability to diverse network configurations. We consistently observed better result quality with the dynamic topology compared to the star topology for the same population size, while the star topology exhibited better execution time. Our findings reveal the promising efficacy of the proposed solution in addressing the CNDP, achieving high-quality solutions compared to existing methods. Full article
Show Figures

Figure 1

22 pages, 740 KiB  
Article
Enabling Autonomous Agents for Mobile Wireless Sensor Networks
by José-Borja Castillo-Sánchez, José-Manuel Cano-García, Eva González-Parada and Mirgita Frasheri
Appl. Sci. 2025, 15(11), 6193; https://doi.org/10.3390/app15116193 - 30 May 2025
Viewed by 487
Abstract
Wireless sensor networks (WSNs) play a pivotal role in monitoring and acting applications. However, suboptimal deployments and traffic imbalances lead to rapid network exhaustions. To address this, topology changes could be carried out by mobile robots. In this work, a software package to [...] Read more.
Wireless sensor networks (WSNs) play a pivotal role in monitoring and acting applications. However, suboptimal deployments and traffic imbalances lead to rapid network exhaustions. To address this, topology changes could be carried out by mobile robots. In this work, a software package to study different strategies and algorithms for the deployment, operation, and retrieval of mobile WSN is introduced. This package employs the globally known software ecosystem for robotics, ROS (Robot Operating System) 2, allowing to study the above-mentioned strategies and algorithms in simulation or in actual deployments. Two strategies concerning robot control are compared, the Social Potential Fields-only approach and an intelligent Agent layer. Each strategy is tested and optimized with different parameters. Results show that the Agents approach yields more consistent results and globally better metrics in terms of network lifetime and coverage. Full article
Show Figures

Graphical abstract

20 pages, 3177 KiB  
Article
Smart Underwater Sensor Network GPRS Architecture for Marine Environments
by Blanca Esther Carvajal-Gámez, Uriel Cedeño-Antunez and Abigail Elizabeth Pallares-Calvo
Sensors 2025, 25(11), 3439; https://doi.org/10.3390/s25113439 - 30 May 2025
Viewed by 542
Abstract
The rise of the Internet of Things (IoT) has made it possible to explore different types of communication, such as underwater IoT (UIoT). This new paradigm allows the interconnection of ships, boats, coasts, objects in the sea, cameras, and animals that require constant [...] Read more.
The rise of the Internet of Things (IoT) has made it possible to explore different types of communication, such as underwater IoT (UIoT). This new paradigm allows the interconnection of ships, boats, coasts, objects in the sea, cameras, and animals that require constant monitoring. The use of sensors for environmental monitoring, tracking marine fauna and flora, and monitoring the health of aquifers requires the integration of heterogeneous technologies as well as wireless communication technologies. Aquatic mobile sensor nodes face various limitations, such as bandwidth, propagation distance, and data transmission delay issues. Owing to their versatility, wireless sensor networks support remote monitoring and surveillance. In this work, an architecture for a general packet radio service (GPRS) wireless sensor network is presented. The network is used to monitor the geographic position over the coastal area of the Gulf of Mexico. The proposed architecture integrates cellular technology and some ad hoc network configurations in a single device such that coverage is improved without significantly affecting the energy consumption, as shown in the results. The network coverage and energy consumption are evaluated by analyzing the attenuation in a proposed channel model and the autonomy of the electronic system, respectively. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

26 pages, 2368 KiB  
Article
Connectivity Analysis in VANETS with Dynamic Ranges
by Kenneth Okello, Elijah Mwangi and Ahmed H. Abd El-Malek
Telecom 2025, 6(2), 33; https://doi.org/10.3390/telecom6020033 - 21 May 2025
Viewed by 427
Abstract
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel [...] Read more.
Vehicular Ad Hoc Networks (VANETs) serve as critical platforms for inter-vehicle communication within constrained ranges, facilitating information exchange. However, the inherent challenge of dynamic network topology poses persistent disruptions, hindering safety and emergency information exchange. An alternative generalised statistical model of the channel is proposed to capture the varying transmission range of the vehicle node. The generalised model framework uses simple wireless fading channel models (Weibull, Nakagami-m, Rayleigh, and lognormal) and the large vehicle obstructions to model the transmission range. This approach simplifies analysis of connection of vehicular nodes in environments were communication links are very unstable from obstructions from large vehicles and varying speeds. The connectivity probability is computed for two traffic models—free-flow and synchronized Gaussian unitary ensemble (GUE)—to simulate vehicle dynamics within a multi-lane road, enhancing the accuracy of VANET modeling. Results show that indeed the dynamic range distribution is impacted at shorter inter-vehicle distances and vehicle connectivity probability is lower with many obstructing vehicles. These findings offer valuable insights into the overall effects of parameters like path loss exponents and vehicle density on connectivity probability, thus providing knowledge on optimizing VANETs in diverse traffic scenarios. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

29 pages, 3403 KiB  
Review
A Review of Physical Layer Security in Aerial–Terrestrial Integrated Internet of Things: Emerging Techniques, Potential Applications, and Future Trends
by Yixin He, Jingwen Wu, Lijun Zhu, Fanghui Huang, Baolei Wang, Deshan Yang and Dawei Wang
Drones 2025, 9(4), 312; https://doi.org/10.3390/drones9040312 - 16 Apr 2025
Viewed by 1136
Abstract
The aerial–terrestrial integrated Internet of Things (ATI-IoT) utilizes both aerial platforms (e.g., drones and high-altitude platform stations) and terrestrial networks to establish comprehensive and seamless connectivity across diverse geographical regions. The integration offers significant advantages, including expanded coverage in remote and underserved areas, [...] Read more.
The aerial–terrestrial integrated Internet of Things (ATI-IoT) utilizes both aerial platforms (e.g., drones and high-altitude platform stations) and terrestrial networks to establish comprehensive and seamless connectivity across diverse geographical regions. The integration offers significant advantages, including expanded coverage in remote and underserved areas, enhanced reliability of data transmission, and support for various applications such as emergency communications, vehicular ad hoc networks, and intelligent agriculture. However, due to the inherent openness of wireless channels, ATI-IoT faces potential network threats and attacks, and its security issues cannot be ignored. In this regard, incorporating physical layer security techniques into ATI-IoT is essential to ensure data integrity and confidentiality. Motivated by the aforementioned factors, this review presents the latest advancements in ATI-IoT that facilitate physical layer security. Specifically, we elucidate the endogenous safety and security of wireless communications, upon which we illustrate the current status of aerial–terrestrial integrated architectures along with the functions of their components. Subsequently, various emerging techniques (e.g., intelligent reflective surfaces-assisted networks, device-to-device communications, covert communications, and cooperative transmissions) for ATI-IoT enabling physical layer security are demonstrated and categorized based on their technical principles. Furthermore, given that aerial platforms offer flexible deployment and high re-positioning capabilities, comprehensive discussions on practical applications of ATI-IoT are provided. Finally, several significant unresolved issues pertaining to technical challenges as well as security and sustainability concerns in ATI-IoT enabling physical layer security are outlined. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications—2nd Edition)
Show Figures

Figure 1

29 pages, 6184 KiB  
Article
MANET Routing Protocols’ Performance Assessment Under Dynamic Network Conditions
by Ibrahim Mohsen Selim, Naglaa Sayed Abdelrehem, Walaa M. Alayed, Hesham M. Elbadawy and Rowayda A. Sadek
Appl. Sci. 2025, 15(6), 2891; https://doi.org/10.3390/app15062891 - 7 Mar 2025
Viewed by 2669
Abstract
Mobile Ad Hoc Networks (MANETs) are decentralized wireless networks characterized by dynamic topologies and the absence of fixed infrastructure. These unique features make MANETs critical for applications such as disaster recovery, military operations, and IoT systems. However, they also pose significant challenges for [...] Read more.
Mobile Ad Hoc Networks (MANETs) are decentralized wireless networks characterized by dynamic topologies and the absence of fixed infrastructure. These unique features make MANETs critical for applications such as disaster recovery, military operations, and IoT systems. However, they also pose significant challenges for efficient and effective routing. This study evaluates the performance of eight MANET routing protocols: Optimized Link State Routing (OLSR), Destination-Sequenced Distance Vector (DSDV), Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Ad Hoc On-Demand Multipath Distance Vector (AOMDV), Temporally Ordered Routing Algorithm (TORA), Zone Routing Protocol (ZRP), and Geographic Routing Protocol (GRP). Using a custom simulation environment in OMNeT++ 6.0.1 with INET-4.5.0, the protocols were tested under four scenarios with varying node densities (20, 80, 200, and 500 nodes). The simulations utilized the Random Waypoint Mobility model to mimic dynamic node movement and evaluated key performance metrics, including network load, throughput, delay, energy consumption, jitter, packet loss rate, and packet delivery ratio. The results reveal that proactive protocols like OLSR are ideal for stable, low-density environments, while reactive protocols such as AOMDV and TORA excel in dynamic, high-mobility scenarios. Hybrid protocols, particularly GRP, demonstrate a balanced approach; achieving superior overall performance with up to 30% lower energy consumption and higher packet delivery ratios compared to reactive protocols. These findings provide practical insights into the optimal selection and deployment of MANET routing protocols for diverse applications, emphasizing the potential of hybrid protocols for modern networks like IoT and emergency response systems. Full article
(This article belongs to the Special Issue Applications of Wireless and Mobile Communications)
Show Figures

Figure 1

26 pages, 18654 KiB  
Article
A Study of MANET Routing Protocols in Heterogeneous Networks: A Review and Performance Comparison
by Nurul I. Sarkar and Md Jahan Ali
Electronics 2025, 14(5), 872; https://doi.org/10.3390/electronics14050872 - 23 Feb 2025
Viewed by 1781
Abstract
Mobile ad hoc networks (MANETs) are becoming a popular networking technology as they can easily be set up and provide communication support on the go. These networks can be used in application areas, such as battlefields and disaster relief operations, where infrastructure networks [...] Read more.
Mobile ad hoc networks (MANETs) are becoming a popular networking technology as they can easily be set up and provide communication support on the go. These networks can be used in application areas, such as battlefields and disaster relief operations, where infrastructure networks are not available. Like media access control protocols, MANET routing protocols can also play an important role in determining network capacity and system performance. Research on the impact of heterogeneous nodes in terms of MANET performance is required for proper deployment of such systems. While MANET routing protocols have been studied and reported extensively in the networking literature, the performance of heterogeneous nodes/devices in terms of system performance has not been fully explored yet. The main objective of this paper is to review and compare the performance of four selected MANET routing protocols (AODV, OLSR, BATMAN and DYMO) in a heterogeneous MANET setting. We consider three different types of nodes in the MANET routing performance study, namely PDAs (fixed nodes with no mobility), laptops (low-mobility nodes) and mobile phones (high-mobility nodes). We measure the QoS metrics, such as the end-to-end delays, throughput, and packet delivery ratios, using the OMNeT++-network simulator. The findings reported in this paper provide some insights into MANET routing performance issues and challenges that can help network researchers and engineers to contribute further toward developing next-generation wireless networks capable of operating under heterogeneous networking constraints. Full article
(This article belongs to the Special Issue Multimedia in Radio Communication and Teleinformatics)
Show Figures

Figure 1

25 pages, 2389 KiB  
Review
A Critical Analysis of Cooperative Caching in Ad Hoc Wireless Communication Technologies: Current Challenges and Future Directions
by Muhammad Ali Naeem, Rehmat Ullah, Sushank Chudhary and Yahui Meng
Sensors 2025, 25(4), 1258; https://doi.org/10.3390/s25041258 - 19 Feb 2025
Cited by 1 | Viewed by 972
Abstract
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable [...] Read more.
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable efficient data distribution and support the mobility, scalability, and manageability of wireless networks. Mobile ad hoc networks (MANETs), wireless mesh networks (WMNs), Wireless Sensor Networks (WSNs), and Vehicular ad hoc Networks (VANETs) have adopted caching practices to overcome these hurdles progressively. In this paper, we discuss the problems and issues in the current wireless ad hoc paradigms as well as spotlight versatile cooperative caching as the potential solution to the increasing complications in ad hoc networks. We classify and discuss multiple cooperative caching schemes in distinct wireless communication contexts and highlight the advantages of applicability. Moreover, we identify research directions to further study and enhance caching mechanisms concerning new challenges in wireless networks. This extensive review offers useful findings on the design of sound caching strategies in the pursuit of enhancing next-generation wireless networks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

26 pages, 1143 KiB  
Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by Muhammet A. Sen, Saba Al-Rubaye and Antonios Tsourdos
Sensors 2025, 25(4), 1194; https://doi.org/10.3390/s25041194 - 15 Feb 2025
Cited by 4 | Viewed by 1489
Abstract
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication [...] Read more.
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication against cyber threats, considering both intra-UAV and UAV–ground station interactions in the scope of the Flying Ad Hoc Networks (FANETs). To leverage the advancements in security methodologies, particularly focusing on Physical Unclonable Functions (PUFs), this paper proposes a novel authentication framework tailored for UAV networking systems. Investigating the existing literature, we categorize related studies into authentication strategies, illuminating the evolving landscape of UAV security. The proposed framework demonstrated a high level of security with lower communication and computation costs in comparison with selected studies with similar types of attacks. This paper highlights the urgent need for strong security measures to mitigate the increasing threats that UAVs encounter and ensure their sustained effectiveness in a variety of applications. The results indicate that the proposed protocol is sufficiently secure and, in terms of communication cost, achieves an 18% improvement compared to the best protocol in the referenced studies. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)
Show Figures

Figure 1

18 pages, 7977 KiB  
Article
Active RFID Wake-Up Receiver Subsystem for Freight Wagon Localization Devices
by Łukasz Krzak and Cezary Worek
Sensors 2025, 25(4), 1124; https://doi.org/10.3390/s25041124 - 13 Feb 2025
Cited by 1 | Viewed by 804
Abstract
This paper presents the concept, design, and performance analysis of an active radio wake-up and radio identification subsystem as part of an advanced localization device intended to operate within a large-scale freight wagon localization system. The system provides an efficient and cost-effective way [...] Read more.
This paper presents the concept, design, and performance analysis of an active radio wake-up and radio identification subsystem as part of an advanced localization device intended to operate within a large-scale freight wagon localization system. The system provides an efficient and cost-effective way to localize freight carriages, which, in the majority of cases, are currently not tracked. The localization device is battery-powered and uses an ultra-low-power radio interface for detecting wake-on-radio signals from nearby operator devices. The same interface is also used for communication within an ad-hoc wireless mesh network, which allows the localization devices to select the best device to send out localization information from the whole cluster through a cellular connection in order to minimize overall battery energy usage. The article presents the overall system architecture construction of the radio interface, including the wake-up subsystem, as well as the results of performance measurements. Full article
(This article belongs to the Special Issue RFID-Enabled Sensor Design and Applications)
Show Figures

Figure 1

11 pages, 653 KiB  
Article
Routing Protocols Performance on 6LoWPAN IoT Networks
by Pei Siang Chia, Noor Hisham Kamis, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Warusia Yassin and Mohd Faizal Abdollah
IoT 2025, 6(1), 12; https://doi.org/10.3390/iot6010012 - 10 Feb 2025
Cited by 1 | Viewed by 1616
Abstract
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect [...] Read more.
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. This study focuses on examining the performance and power consumption of routing protocols in the context of 6LoWPAN, drawing insights from prior research and utilizing simulation techniques. The simulation involves the application of routing protocols, namely Routing Protocol for Low-power and Lossy (RPL) Networks, Ad hoc On-demand Distance Vector (AODV), Lightweight On-demand Ad hoc Distance-vector Next Generation (LOADng), implemented through the Cooja simulator. The simulation also runs in different network topologies to gain an insight into the performance of the protocols in the specific topology including random, linear, and eclipse topology. The raw data gathered from the tools including Powertrace and Collect-View were then analyzed with Python code to transfer into useful information and visualize the graph. The results demonstrate that the power consumption, specifically CPU power, Listen Power, and Total Consumption Power, will increase with the incremental of motes. The result also shows that RPL is the most power-efficient protocol among the scenarios compared to LOADng and AODV. The result is helpful because it brings insights into the performance, specifically power consumption in the 6LoWPAN network. This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements. Full article
Show Figures

Figure 1

22 pages, 6807 KiB  
Article
High-Performance Data Throughput Analysis in Wireless Ad Hoc Networks for Smart Vehicle Interconnection
by Alaa Kamal Yousif Dafhalla, Amira Elsir Tayfour Ahmed, Nada Mohamed Osman Sid Ahmed, Ameni Filali, Lutfieh S. Alhomed, Fawzia Awad Elhassan Ali, Asma Ibrahim Gamar Eldeen, Mohamed Elshaikh Elobaid and Tijjani Adam
Computers 2025, 14(2), 56; https://doi.org/10.3390/computers14020056 - 10 Feb 2025
Cited by 1 | Viewed by 1105
Abstract
Vehicular Ad Hoc Networks play a crucial role in enabling Smart City applications by facilitating seamless communication between vehicles and infrastructure. This study evaluates the throughput performance of different routing protocols, specifically AODV, AODV:TOM, AODV:DEM, GPSR, GPSR:TOM, and GPSR:DEM, under various city and [...] Read more.
Vehicular Ad Hoc Networks play a crucial role in enabling Smart City applications by facilitating seamless communication between vehicles and infrastructure. This study evaluates the throughput performance of different routing protocols, specifically AODV, AODV:TOM, AODV:DEM, GPSR, GPSR:TOM, and GPSR:DEM, under various city and highway scenarios in complex networks. The analysis covers key parameters including traffic generation, packet sizes, mobility speeds, and pause times. Results indicate that TOM and DEM profiles significantly improve throughput compared to traditional AODV and GPSR protocols. GPSR:TOM achieves the highest throughput across most scenarios, making it a promising solution for high-performance data transmission in Smart Cities. For instance, GPSR:TOM achieves an average throughput of 3.2 Mbps in city scenarios compared to 2.8 Mbps for GPSR, while in highway scenarios, the throughput increases to 3.6 Mbps. Additionally, AODV:DEM records a throughput of 3.4 Mbps for high traffic generation, outperforming AODV:TOM at 3.1 Mbps and baseline AODV at 2.7 Mbps. The findings highlight the importance of optimizing data throughput to ensure reliability and efficiency in complex vehicle interconnection systems, which are critical for traffic management, accident prevention, and real-time communication in smart urban environments. Full article
Show Figures

Figure 1

25 pages, 1011 KiB  
Article
Relay Node Selection Methods for UAV Navigation Route Constructions in Wireless Multi-Hop Network Using Smart Meter Devices
by Shuto Ohkawa, Kiyoshi Ueda, Takumi Miyoshi, Taku Yamazaki, Ryo Yamamoto and Nobuo Funabiki
Information 2025, 16(1), 22; https://doi.org/10.3390/info16010022 - 5 Jan 2025
Cited by 1 | Viewed by 1182
Abstract
Unmanned aerial vehicles (UAVs) offer solutions to issues like traffic congestion and labor shortages. We developed a distributed UAV management system inspired by virtual circuit and datagram methods in packet-switching networks. By installing houses with wireless terminals, UAVs navigate routes in a multi-hop [...] Read more.
Unmanned aerial vehicles (UAVs) offer solutions to issues like traffic congestion and labor shortages. We developed a distributed UAV management system inspired by virtual circuit and datagram methods in packet-switching networks. By installing houses with wireless terminals, UAVs navigate routes in a multi-hop network, communicating with ground nodes. UAVs are treated as network packets, ground devices are treated as routers, and their connections are treated as links. Activating all nodes as relays increases control message traffic and node load. To optimize connectivity, we minimize relay nodes, connecting non-relay nodes to the nearest relay. This study proposes four relay node selection methods: random selection, two adjacency-based methods, and our innovative approach using Multipoint Relay (MPR) from the Optimized Link State Routing Protocol (OLSR). We evaluated these methods according to their route construction success rates, relay node counts, route lengths, and so on. The MPR-based method proved most effective for UAV route construction. However, fewer relay nodes increase link collisions, and we identify the minimum relay density needed to balance efficiency and conflict reduction. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
Show Figures

Figure 1

Back to TopTop