Ad Hoc NetworksPub Date : 2024-10-28DOI: 10.1016/j.adhoc.2024.103692
Adi Surendra Mohanraju M., Anjaneyulu Lokam
{"title":"ADRP-DQL: An adaptive distributed routing protocol for underwater acoustic sensor networks using deep Q-learning","authors":"Adi Surendra Mohanraju M., Anjaneyulu Lokam","doi":"10.1016/j.adhoc.2024.103692","DOIUrl":"10.1016/j.adhoc.2024.103692","url":null,"abstract":"<div><div>Underwater Wireless Sensor Networks (UWSNs) face unique constraints due to their unstructured and dynamic underwater environment. Data gathering from these networks is crucial as energy resources are limited. In this regard, efficient routing protocols are needed to optimize energy consumption, increase the network lifetime, and enhance data delivery in these networks. In this work, we develop an Adaptive Distributed Routing Protocol for UWSNs using Deep Q-Learning (ADRP-DQL). This protocol employs the ability of reinforcement learning to dynamically learn the best routing decisions based on the network’s state and action-value estimates. It allows nodes to make intelligent routing decisions, considering residual energy, depth and node degree. A Deep Q-Network (DQN) is employed as the function approximator to estimate action values and choose the optimal routing decisions. The DQN is trained using off-policy and on-policy strategies and the neural network model. Simulation results demonstrate that ADRP-DQL performs well regarding energy efficiency (EE), data delivery ratio, and network lifetime. The results highlight the proposed protocol’s effectiveness and adaptability to UWSNs. The ADRP-DQL protocol contributes to intelligent routing for UWSNs, offering a promising approach to enhance performance and optimize energy utilization in these demanding environments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103692"},"PeriodicalIF":4.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-28DOI: 10.1016/j.adhoc.2024.103694
Izhar Ahmed Khan , Marwa Keshk , Yasir Hussain , Dechang Pi , Bentian Li , Tanzeela Kousar , Bakht Sher Ali
{"title":"A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security","authors":"Izhar Ahmed Khan , Marwa Keshk , Yasir Hussain , Dechang Pi , Bentian Li , Tanzeela Kousar , Bakht Sher Ali","doi":"10.1016/j.adhoc.2024.103694","DOIUrl":"10.1016/j.adhoc.2024.103694","url":null,"abstract":"<div><div>With the speedy progression and adoption of IoT devices in modern self-driving vehicles (SDVs), autonomous driving industry is gradually reforming its capabilities to provide better transportation services. However, this domain faces enormous security and privacy challenges and thus has become an attractive target for attackers due to its rapid growth and market worth. Furthermore, the rapid transformation in technological tools in transport industry and speedy evolution of cyber-attacks paved the way for designing efficient IDSs. Motivated by these challenges, we put forward a new secure and efficient IDS approach for the security of SDVs. The propose approach utilizes an emerging strategy to mitigate security vulnerabilities and cyber attacks detection using zero trust (ZT) model. Through this work, we put forward a context-aware zero trust security framework for IoT-based SDVs. The proposed framework utilizes a context-aware design to evaluate the trustworthiness of the devices using multi-source trust and reputation model. Then, to make the framework more effective and reliable, we introduce crawler system into the context of the IoT-devices in SDVs to make the system unbiased. Additionally, an observer module is developed that employs state-of-the-art machine learning algorithm to detect malicious actions. Empirical results on two standard benchmark datasets (i.e., Car Hacking and ToN_IoT) validate the practicality and robustness of propose framework in real-world transport systems with enhanced security and trust management against evolving cyber-threats. Detection results demonstrate that the proposed framework secured the best performance by achieving 99.43% and 99.52% accuracy for Car Hacking and ToN_IoT, respectively. The findings of this study will help the security professionals and researchers to comprehend the importance of ZT architecture in developing effective and robust security solutions for modern IoT-based SDVs.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103694"},"PeriodicalIF":4.4,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-25DOI: 10.1016/j.adhoc.2024.103691
Francesco Furfari, Michele Girolami, Fabio Mavilia, Paolo Barsocchi
{"title":"Indoor localization algorithms based on Angle of Arrival with a benchmark comparison","authors":"Francesco Furfari, Michele Girolami, Fabio Mavilia, Paolo Barsocchi","doi":"10.1016/j.adhoc.2024.103691","DOIUrl":"10.1016/j.adhoc.2024.103691","url":null,"abstract":"<div><div>Indoor localization is crucial for developing intelligent environments capable of understanding user contexts and adapting to environmental changes. Bluetooth 5.1 Direction Finding is a recent specification that leverages the angle of departure (AoD) and angle of arrival (AoA) of radio signals to locate objects or people indoors. This paper presents a set of algorithms that estimate user positions using AoA values and the concept of the Confidence Region (CR), which defines the expected position uncertainty and helps to remove outlier measurements, thereby improving performance compared to traditional triangulation algorithms. We validate the algorithms with a publicly available dataset, and analyze the impact of body orientation relative to receiving units. The experimental results highlight the limitations and potential of the proposed solutions. From our experiments, we observe that the Conditional All-in algorithm presented in this work, achieves the best performance across all configuration settings in both line-of-sight and non-line-of-sight conditions.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103691"},"PeriodicalIF":4.4,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-23DOI: 10.1016/j.adhoc.2024.103690
Dun Cao , WenQian Wang , Meihua Wu , Shuo Cai , Fayez Alqahtani , Jin Wang
{"title":"A general task offloading and resources allocation strategy for multi-RSUs with load unbalance and priority awareness","authors":"Dun Cao , WenQian Wang , Meihua Wu , Shuo Cai , Fayez Alqahtani , Jin Wang","doi":"10.1016/j.adhoc.2024.103690","DOIUrl":"10.1016/j.adhoc.2024.103690","url":null,"abstract":"<div><div>Vehicular Edge Computing is a new computing paradigm that enables real-time response to vehicular applications and servers by performing data processing on edge computing devices near the vehicle. However, on the one hand, the random distribution and the mobility of vehicles may lead to load unbalance among different Roadside Units (RSUs), and some tasks may not be able to get timely response due to inadequate computing resources and communication resources in the high-load RSU areas. On the other hand, considering the different urgency of the tasks, the service quality of the system will be seriously affected if these tasks are not treated indistinguishably. To address the above challenges, this paper constructs a priority-aware task offloading and computing&communication resources allocation problem in a general scenario of unbalanced load among multi-RSUs, aiming at minimising the average delay. In the problem, considering the absence of communication resources, the relay vehicle is used to offload the subtasks of splittable tasks to the RSUs that are in the neighbouring and low-load. Moreover, to take full advantage of computing resources, the task can be reasonably split into at most four parts and processed in parallel on a relay vehicle, a current RSU, a neighbouring RSU and a local vehicle. To solve the problem, a Split-Hop Offloading and Resources Allocation Strategy (SHORAS) based on an improved particle swarm optimisation algorithm is proposed, which uses a penalty function to incline resources towards high priority tasks. Simulation results show that SHORAS improves 24% in terms of the total system delay and effectively reduces the processing delay in the high-load areas compared to other strategies, while ensuring the delay requirements of high priority tasks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103690"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-23DOI: 10.1016/j.adhoc.2024.103689
Zongheng Wei , Huakun Wu , Zhiyong Lin , Qingji Wen , Lili Zheng , Jianfeng Wen , Hai Liu
{"title":"Enhanced reinforcement learning-based two-way transmit-receive directional antennas neighbor discovery in wireless ad hoc networks","authors":"Zongheng Wei , Huakun Wu , Zhiyong Lin , Qingji Wen , Lili Zheng , Jianfeng Wen , Hai Liu","doi":"10.1016/j.adhoc.2024.103689","DOIUrl":"10.1016/j.adhoc.2024.103689","url":null,"abstract":"<div><div>The utilization of directional antennas for neighbor discovery in wireless ad hoc networks brings notable benefits, such as extended transmission range, reduced transmission interference, and enhanced antenna gain. However, when nodes use directional antennas for neighbor discovery, the communication range is limited, resulting in a lack of knowledge of potential neighbors. Hence, it is necessary to design a special antenna direction switching strategy for neighbor discovery based on directional antennas. Traditional methods of switching antenna directions are often random or follow predefined sequences, overlooking the historical knowledge of sector exploration for antenna directions. In contrast, existing machine learning approaches aim to leverage observed historical knowledge to adjust antenna directions for faster neighbor discovery. Nonetheless, the latency of neighbor discovery is still high because the node cannot fully utilize the observed historical knowledge (<em>i.e.</em>., only using the knowledge observed by the node in transmission mode, ignoring the knowledge observed by the node in reception mode). Meanwhile, the corresponding reward and penalty mechanisms are still not detailed enough (<em>i.e.</em>., these reward and penalty mechanisms only consider the sectors of discovered and undiscovered neighboring nodes, ignoring the scenario of sectors that have been rewarded). In this paper, the neighbor discovery process is modeled as a reinforcement learning-based learning automaton. We propose an enhanced reinforcement learning-based two-way transmit-receive directional antennas neighbor discovery algorithm, called ERTTND. The algorithm consists of a two-way transmit-receive reinforcement learning mechanism (TTRL) and an enhanced reward-and-penalty mechanism (ERAP). This algorithm leverages insights from nodes in transmission and reception modes to refine their tactical decisions. Then, through an enriched reward-and-penalty framework, nodes optimize their strategies, thus expediting neighbor discovery based on directional antennas in wireless ad hoc networks. Simulation results demonstrate that compared to existing representative algorithms, the proposed ERTTND algorithm can achieve over 30% savings in terms of average discovery delay and energy consumption.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103689"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-21DOI: 10.1016/j.adhoc.2024.103684
Yiting Wang, Jingqi Fu, Yifan Cao
{"title":"A weighted hybrid indoor positioning method based on path loss exponent estimation","authors":"Yiting Wang, Jingqi Fu, Yifan Cao","doi":"10.1016/j.adhoc.2024.103684","DOIUrl":"10.1016/j.adhoc.2024.103684","url":null,"abstract":"<div><div>With the rapid development of the Internet of Things (IoT), location-based services (LBS) have gained significant attention due to their widespread applications in daily life. This paper addresses the indoor target positioning problem in wireless sensor networks (WSNs). A weighted constrained linear least squares algorithm based on path loss exponent estimation (PLE-WCLLS) with received signal strength (RSS) and angle of arrival (AoA) hybrid measurements is proposed. To address the challenges of unknown transmission power and path loss exponent (PLE), the proposed method employs a linear least squares (LLS) estimation approach based on the ranging maximum likelihood (ML) estimation model to estimate both parameters. Subsequently, a confidence weight adjustment strategy is designed to reduce positioning errors. To handle the highly non-convex and nonlinear nature of the RSS/AoA hybrid optimization model, a linearization method based on Taylor series expansion is presented. Accurate target position estimation is achieved by solving a constrained quadratic programming problem. The effectiveness of the proposed algorithm is validated through numerical simulations and experimental evaluation in a real indoor environment. Compared to traditional positioning methods, the PLE-WCLLS algorithm improves positioning accuracy by 13.2%, and it performs exceptionally well even in scenarios with fewer sensor nodes. This gives it broad application prospects in areas such as IoT device management, personnel tracking in smart buildings, and asset localization in industrial automation.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103684"},"PeriodicalIF":4.4,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-20DOI: 10.1016/j.adhoc.2024.103688
Nadia Khiadani , Faramarz Hendessi
{"title":"An energy efficient prediction based protocol for target tracking in wireless sensor networks","authors":"Nadia Khiadani , Faramarz Hendessi","doi":"10.1016/j.adhoc.2024.103688","DOIUrl":"10.1016/j.adhoc.2024.103688","url":null,"abstract":"<div><div>Target tracking is one of the most attractive applications of wireless sensor networks, used for estimating the moving target's position accurately. A primary challenge in this domain is achieving precise target path estimation while conserving energy resources. This paper introduces an energy-efficient target tracking protocol in wireless sensor networks, considering both accuracy and reduced energy consumption. The protocol uses the Kalman filter to estimate the target's position and predict the subsequent step of its path. In each step of target tracking, a selected sensor, named the ‘leader’ performs computations for position estimation and path prediction, while two other sensors, known as ‘assistants’ help the leader in the tracking process. Leader selection within the protocol is performed in two phases: an initial phase occurring upon the target's entry to the network and a subsequent phase named the forced handoff phase. The forced handoff phase performs the selection of a new leader when either the target exits the sensing range of the current leader or the leader's energy decreases significantly. Although the proposed protocol is a new work, it can be considered as an improvement of the PPCP protocol by adding several changes and also replacing the binary variational filter with the Kalman filter. The efficiency of the proposed protocol is evaluated through simulations in Matlab. Results demonstrate the protocol's ability to achieve high-precision target tracking while maintaining low energy consumption. Comparative analysis shows its energy efficiency, which significantly increases the network lifetime.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103688"},"PeriodicalIF":4.4,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142656958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-19DOI: 10.1016/j.adhoc.2024.103687
Ning Liu, Jun Wang, Fazhan Tao, Zhumu Fu, Bo Liu
{"title":"EDRP-GTDQN: An adaptive routing protocol for energy and delay optimization in wireless sensor networks using game theory and deep reinforcement learning","authors":"Ning Liu, Jun Wang, Fazhan Tao, Zhumu Fu, Bo Liu","doi":"10.1016/j.adhoc.2024.103687","DOIUrl":"10.1016/j.adhoc.2024.103687","url":null,"abstract":"<div><div>Routing protocols, as a crucial component of the internet of things (IoT), play a significant role in data collection and environmental monitoring tasks. However, existing clustering routing protocols suffer from issues such as uneven network energy consumption, high communication delays, and inadequate adaptation to topology changes. To address these issues, this study proposes an adaptive routing algorithm to balance energy consumption and delay using game theory and deep Q-network (DQN) algorithms (EDRP-GTDQN). Specifically, EDRP-GTDQN evaluates the importance of node positions using node centrality and integrates a game-theoretic-based approach to select optimal cluster heads in terms of node centrality and residual energy. Moreover, graph convolutional networks (GCN) and DQN are incorporated to construct transmission paths for cluster heads, adapt to network topology changes, and balance energy consumption and performance. Furthermore, a cluster rotation mechanism is employed to optimize overall network energy consumption and prevent the formation of hotspots. Experimental results demonstrate that EDRP-GTDQN achieves average performance improvements of 19.76%, 30.04%, 44.2%, and 61.42% in average energy consumption, network lifetime, and average end-to-end delay compared to conventional routing protocols such as EECRAIFA, MRP-GTCO, DEEC, and MH-LEACH. Therefore, EDRP-GTDQN is undoubtedly an effective solution to reduce energy consumption and enhance service quality in wireless sensor networks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103687"},"PeriodicalIF":4.4,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-18DOI: 10.1016/j.adhoc.2024.103676
Yang Yang, Chengwen Fan, Shaoyin Chen, Zhipeng Gao, Lanlan Rui
{"title":"Growth-adaptive distillation compressed fusion model for network traffic identification based on IoT cloud–edge collaboration","authors":"Yang Yang, Chengwen Fan, Shaoyin Chen, Zhipeng Gao, Lanlan Rui","doi":"10.1016/j.adhoc.2024.103676","DOIUrl":"10.1016/j.adhoc.2024.103676","url":null,"abstract":"<div><div>The development of the Internet of Things (IoT) has led to the rapid growth of the types and number of connected devices and has generated large amounts of complex and diverse traffic data. Traffic identification on edge servers solves the real-time and privacy requirements of IoT management and has attracted much attention, but still faces several problems: (1) traditional machine learning (ML) models rely on artificially constructed features, and the existing deep learning (DL) traffic identification models have reached their performance limit; and (2) insufficient computing resources of edge servers limit the possible improvement in the performance of deep learning models by increasing the number of parameters and structural complexity. To address these issues, we propose a lightweight fusion model. First, the Network-in-Network (NiN) model and Random Forest (RF) model are used on the cloud server to construct a traffic identification fusion model. The excellent representation extraction capability of the NiN compensates for the RF’s dependence on manual feature extraction, and its modular structure is suitable for the subsequent model compression operations. Then, the NiN was distilled. We propose Growth-Adaptive Distillation to lightweight the NiN model, which can reduce the operation of manually adjusting the structure of the student model and ensure the efficiency and low power consumption of the fusion model deployment. In addition, both the RF in the cloud and the distilled NiN are deployed on the edge server. Comparisons with multiple algorithms on two network traffic datasets show that the proposed model achieves state-of-the-art performance while ensuring the use of minimal computational resources.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"167 ","pages":"Article 103676"},"PeriodicalIF":4.4,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ad Hoc NetworksPub Date : 2024-10-18DOI: 10.1016/j.adhoc.2024.103686
Weiqi Wang , Jin Xu
{"title":"Approximation schemes for age of information minimization in UAV grid patrols","authors":"Weiqi Wang , Jin Xu","doi":"10.1016/j.adhoc.2024.103686","DOIUrl":"10.1016/j.adhoc.2024.103686","url":null,"abstract":"<div><div>Motivated by the critical need for unmanned aerial vehicles (UAVs) to patrol grid systems in hazardous and dynamically changing environments, this study addresses a routing problem aimed at minimizing the time-average Age of Information (AoI) for edges in general graphs. We establish a lower bound for all feasible patrol policies and demonstrate that this bound is tight when the graph contains an Eulerian cycle. For graphs without Eulerian cycles, it becomes challenging to identify the optimal patrol strategy due to the extensive range of feasible options. Our analysis shows that restricting the strategy to periodic sequences still results in an exponentially large number of possible strategies. To address this complexity, we introduce two polynomial-time approximation schemes, each involving a two-step process: constructing multigraphs first and then embedding Eulerian cycles within these multigraphs. We prove that both schemes achieve an approximation ratio of 2. Further, both analytical and numerical results suggest that evenly and sparsely distributing edge visits within a periodic route significantly reduces the average AoI compared to strategies that merely minimize the route travel distance. Building on this insight, we propose a heuristic method that not only maintains the approximation ratio of 2 but also ensures robust performance across varying random graphs.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"166 ","pages":"Article 103686"},"PeriodicalIF":4.4,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}