Ad Hoc Networks最新文献

筛选
英文 中文
Battery life optimization in LoRa networks using spreading factor reallocation 基于扩展因子再分配的LoRa网络电池寿命优化
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-27 DOI: 10.1016/j.adhoc.2025.103911
Ian H. de Andrade, Luís Henrique M.K. Costa, Rodrigo S. Couto
{"title":"Battery life optimization in LoRa networks using spreading factor reallocation","authors":"Ian H. de Andrade,&nbsp;Luís Henrique M.K. Costa,&nbsp;Rodrigo S. Couto","doi":"10.1016/j.adhoc.2025.103911","DOIUrl":"10.1016/j.adhoc.2025.103911","url":null,"abstract":"<div><div>This paper proposes a dynamic strategy for the allocation of resources used by end devices in LoRa networks, which employ chirp spread spectrum modulation. The proposed battery life optimization (BLO) strategy splits end devices into different spreading factor (SF) groups. The basic idea is to reduce the collisions between end devices using the same SF. Moreover, BLO also considers the current battery level of each end device, and periodically reallocates the SF groups to optimize the battery consumption of all nodes and extend the network lifetime. The main innovation of BLO is to consider in addition to the RSSI the air time of different SFs as a weighting factor in SF allocation. We compare BLO to state-of-the-art (SoA) SF-allocation strategies, achieving 77% improvement in successful message delivery compared to LoRaWAN’s ADR scheme. Furthermore, we obtain better energy efficiency with BLO. In a scenario with one gateway and 500 devices operating over 24 h, the remaining energy with BLO is 10 and 3.6 times larger than with EXPLoRa-SF and EXPLoRa-AT SoA strategies, respectively.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103911"},"PeriodicalIF":4.4,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144178546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location privacy-preserving ride matching with verifiable and collusion resistance for Ride-Hailing Services 网约车服务的位置隐私保护、可验证和抗合谋乘车匹配
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-26 DOI: 10.1016/j.adhoc.2025.103910
Hui Huang , Rui Zhang , Chenhuang Wu , Shihui Lin
{"title":"Location privacy-preserving ride matching with verifiable and collusion resistance for Ride-Hailing Services","authors":"Hui Huang ,&nbsp;Rui Zhang ,&nbsp;Chenhuang Wu ,&nbsp;Shihui Lin","doi":"10.1016/j.adhoc.2025.103910","DOIUrl":"10.1016/j.adhoc.2025.103910","url":null,"abstract":"<div><div>Ride-Hailing Services (RHS) provide riders with convenient travel services and offer drivers economic incentives. However, during the process of requesting ride-matching from the Ride-Hailing Service Provider (RHSP), the transmission of data and query processing between riders and drivers may potentially expose sensitive user information, such as boarding and alighting locations and movement trajectories. Moreover, the RHSP might collude with drivers to manipulate the accuracy and integrity of ride-matching results. In this paper, we propose a novel privacy-preserving and collusion-resistant driver verification scheme (PPCRV) that supports privacy protection, collusion resistance, verifiability, and accountability. Our approach allows for personalized settings, enabling both riders and drivers to protect their location privacy within predefined cloaked areas. Additionally, we employ prefix encoding to link identities with location prefixes, generating unpredictable movement trajectories. We also utilize Indistinguishable Bloom Filter (IBF) for efficient querying. By IBF trees and proof information, we ensure verifiable matching results, allowing riders to independently replicate the matching process. Simultaneously, we apply traceable signature technology to maintain user anonymity while enabling effective identity verification and traceability, ensuring that malicious users can be held accountable when required. Finally, we conduct theoretical analyses and experiments to evaluate the scheme’s performance in terms of computational cost and communication overhead.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103910"},"PeriodicalIF":4.4,"publicationDate":"2025-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144170512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TReB: Task dependency aware-Resource allocation for Internet of Things using Binary offloading TReB:任务依赖感知-使用二进制卸载的物联网资源分配
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-25 DOI: 10.1016/j.adhoc.2025.103909
Priyanka Soni , Ajay Gajanan Hajare , Keerthan Kumar T.G. , Sourav Kanti Addya
{"title":"TReB: Task dependency aware-Resource allocation for Internet of Things using Binary offloading","authors":"Priyanka Soni ,&nbsp;Ajay Gajanan Hajare ,&nbsp;Keerthan Kumar T.G. ,&nbsp;Sourav Kanti Addya","doi":"10.1016/j.adhoc.2025.103909","DOIUrl":"10.1016/j.adhoc.2025.103909","url":null,"abstract":"<div><div>The rapid growth of Internet of Things (IoT) applications in domains such as healthcare, smart homes, and autonomous vehicles has led to an exponential increase in data generated by compute intensive tasks. Efficiently offloading these tasks to nearby computational resources in fog environments remains a significant challenge due to the inherent heterogeneity and constrained resources of Fog Nodes (FNs). Most of the existing approaches fail to address the trade-offs between latency, energy, and resource utilization, particularly when managing dependent and independent task workloads. Moreover, establishing an offloading strategy within a densely interconnected IoT network is known to be <span><math><mrow><mi>N</mi><mi>P</mi></mrow></math></span>-hard. To overcome these limitations, in this work, we propose a <strong>T</strong>ask dependency-Aware <strong>Re</strong>source allocation for IoT using <strong>B</strong>inary offloading (<span>TReB</span>) framework by considering both independent and dependent tasks of IoT applications. The <span>TReB</span> utilizes the Analytic Hierarchy Process (AHP) technique to generate the preferences of FNs and tasks by considering diverse attributes. With preferences established, a binary offloading is handled through a one-to-many matching procedure, utilizing a Deferred Acceptance Algorithm (DAA). It allows <span>TReB</span> to jointly minimize system energy consumption, latency, and the number of outages in an IoT network. We evaluated the effectiveness of <span>TReB</span> through simulation experiments, and results show that the proposed approach achieves a 49.1%, 62.4%, and 41.7% minimization in overall system latency, energy, and outages compared to the existing baselines.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103909"},"PeriodicalIF":4.4,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144147765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing 5G and 6G networks through a dynamic dual-stage machine learning heuristic framework for selecting UEs as UE-VBSs 通过选择ue作为ue - vbs的动态双阶段机器学习启发式框架增强5G和6G网络
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-24 DOI: 10.1016/j.adhoc.2025.103908
Iacovos Ioannou , S.V. Jansi Rani , Prabagarane Nagaradjane , Christophoros Christophorou , Vasos Vassiliou , Andreas Pitsillides
{"title":"Enhancing 5G and 6G networks through a dynamic dual-stage machine learning heuristic framework for selecting UEs as UE-VBSs","authors":"Iacovos Ioannou ,&nbsp;S.V. Jansi Rani ,&nbsp;Prabagarane Nagaradjane ,&nbsp;Christophoros Christophorou ,&nbsp;Vasos Vassiliou ,&nbsp;Andreas Pitsillides","doi":"10.1016/j.adhoc.2025.103908","DOIUrl":"10.1016/j.adhoc.2025.103908","url":null,"abstract":"<div><div>Adapting mobile networks to the diverse and evolving demands of 5G and forthcoming 6G technologies requires flexible, efficient, and dynamic strategies—especially in ultra-dense environments and infrastructure-limited areas. This paper proposes a robust two-stage Machine Learning (ML) heuristic framework to dynamically select a group of User Equipment (UEs) to act as Virtual Base Stations (UE-VBSs) for network augmentation. In the first stage, Self-Organizing Maps (SOM) are employed to cluster UEs based on their spatial characteristics while preserving topological relationships, achieving a silhouette score of 0.64—a 30% improvement over conventional methods such as <span><math><mi>K</mi></math></span>-Means (0.46) and Mean-Shift (0.43). In the second stage, a Random Forest classifier enhanced via the Synthetic Minority Over-sampling Technique (SMOTE) attains an average accuracy of 97% and an F1-Score of 0.88 in identifying eligible devices to become UE-VBSs, outperforming recent frameworks that typically report accuracies ranging between 85% and 92%.</div><div>Comparative evaluation results demonstrate that our two-stage ML heuristic framework not only improves clustering accuracy and UE-VBS classification but also consistently outperforms state-of-the-art clustering methods in terms of network sum rate, power consumption, and scalability. Specifically, across all device densities (i.e., 200, 400, 600, 800, and 1000 UEs), our approach achieves the highest sum rate—peaking at nearly 1.8 billion bps (or 1.8 Gbps) at 1000 UEs—thus surpassing methods such as Affinity Propagation and Grid-based Clustering. Furthermore, by intelligently selecting UE-VBSs, the framework significantly reduces power consumption by effectively minimizing redundant transmissions and interference, making it an energy-efficient solution for large-scale 5G networks. Although the complexity of SOM clustering and Random Forest classification introduces higher computational overhead, the resulting improvements in throughput, energy efficiency, and scalability justify this cost, making it a robust and practical solution for real-world deployments. Validated on both synthetic and real-world datasets, our findings underscore the efficacy, scalability, and high impact of employing robust unsupervised and ensemble learning techniques for dynamic network optimization in next-generation architectures, delivering up to a five-fold increase in network sum rate under high-density conditions compared to state-of-the-art approaches like grid-assisted clustering and affinity propagation.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103908"},"PeriodicalIF":4.4,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144135202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing energy efficiency in Long Term Evolution-Advanced networks: Analyzing latency through Connected mode Discontinuous Reception with Markov modeling 提高长期进化高级网络的能源效率:用马尔可夫模型分析连接模式不连续接收的延迟
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-23 DOI: 10.1016/j.adhoc.2025.103905
B. Arunsundar, P. Sakthivel
{"title":"Enhancing energy efficiency in Long Term Evolution-Advanced networks: Analyzing latency through Connected mode Discontinuous Reception with Markov modeling","authors":"B. Arunsundar,&nbsp;P. Sakthivel","doi":"10.1016/j.adhoc.2025.103905","DOIUrl":"10.1016/j.adhoc.2025.103905","url":null,"abstract":"<div><div>Long Term Evolution, particularly Long Term Evolution-Advanced, has revolutionized mobile communication by delivering high-bandwidth connectivity for data-intensive applications. To meet the growing demand for high-speed data transmission in the rapidly expanding global mobile communication industry, Long Term Evolution-Advanced has emerged as the standard for 5G networks. However, energy consumption and latency remain critical challenges in wireless network communications. Discontinuous Reception, specifically Connected mode Discontinuous Reception, has been implemented to optimize the energy consumption of User Equipment while maintaining network performance. This paper analyzes the average latency of the Discontinuous Reception mechanism using both Markov and recursive models. Analytical modeling is employed to validate simulation results, incorporating various Discontinuous Reception parameters. The study demonstrates that the proposed Discontinuous Reception system, with adaptive settings based on a logic controller, enhances energy conservation performance by learning from past delay times and packet arrival rates. The simulation results highlight the improved efficacy of the Discontinuous Reception system in terms of latency and energy efficiency, offering valuable insights into the evolving landscape of wireless communication networks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103905"},"PeriodicalIF":4.4,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144190451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning framework for inferring properties of embedded devices 用于推断嵌入式设备属性的机器学习框架
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-23 DOI: 10.1016/j.adhoc.2025.103907
Shariq Bashir
{"title":"A machine learning framework for inferring properties of embedded devices","authors":"Shariq Bashir","doi":"10.1016/j.adhoc.2025.103907","DOIUrl":"10.1016/j.adhoc.2025.103907","url":null,"abstract":"<div><div>Nowadays, the prevalence of Internet of Things (IoT) devices has increased in our homes and workplaces, providing us with more convenience. However, the security of these devices is often compromised. The objective of this paper is to assess the security of embedded IoT devices. Existing passive fingerprinting approaches are inapplicable in the configuration when the network traffic of devices connected to an IoT hub is inaccessible. We proposed a firmware analysis technique for analyzing devices’ security by inspecting their firmware contents. Our aim is not to identify unknown vulnerabilities, but only those that are already known. We also intend to investigate whether the software that is executing services is outdated or not. Precise information regarding the name and version of servers, as well as login credentials and passwords, can be obtained through the analysis of firmware. Having obtained this information, we have created an active identification technique that enables an attacker to deduce specific characteristics of a connected device, such as the name of the software employed for the HTTP server or usernames. Our method involves training a classifier using data extracted from firmware. The results of our experiments indicate that our approach is more effective and covert compared to a brute-force method. We scrutinized 5,204 firmware of devices using our approach. Our findings suggest that the level of exposure of connected devices has grown in recent years. As connected devices become more open to services, it increases the potential attack surface while reducing their security.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103907"},"PeriodicalIF":4.4,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144131737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AGV-Integrated Noise-Aware Adaptive Clustering for Industrial Wireless Sensor Networks in smart factories 集成agv的智能工厂工业无线传感器网络噪声感知自适应聚类
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-23 DOI: 10.1016/j.adhoc.2025.103906
Ying Duan , Tongyao Fu , Lingling Li , Pasquale Pace , Gianluca Aloi , Giancarlo Fortino
{"title":"AGV-Integrated Noise-Aware Adaptive Clustering for Industrial Wireless Sensor Networks in smart factories","authors":"Ying Duan ,&nbsp;Tongyao Fu ,&nbsp;Lingling Li ,&nbsp;Pasquale Pace ,&nbsp;Gianluca Aloi ,&nbsp;Giancarlo Fortino","doi":"10.1016/j.adhoc.2025.103906","DOIUrl":"10.1016/j.adhoc.2025.103906","url":null,"abstract":"<div><div>Industrial Wireless Sensor Networks (IWSNs) play a critical role in real-time monitoring and data collection in smart factories. However, energy constraints in sensor nodes significantly limit the network lifespan. In addition, traditional simulation methods overlook the impact of industrial noise, reducing the truthfulness of experimental results. To address these challenges, we propose an Automated Guided Vehicle-Integrated Noise-Aware Adaptive Clustering (A-INAC) algorithm. The algorithm incorporates an Industrial Wireless Noise Model (IWNM) to reflect noise characteristics in the factory environment and optimizes the selection of cluster directors to achieve more balanced energy consumption. In addition, a hierarchical transmission strategy leveraging the mobility of AGVs is designed to meet large-scale network transmission needs. Simulation results demonstrate that the A-INAC algorithm can effectively reduce network energy consumption and extend network lifetime by 39% and 118% compared to LEACH and LEACH-C, respectively.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103906"},"PeriodicalIF":4.4,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144170515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic and reinforcement learning-based survivable trust-aware virtual network embedding for IoT networks 基于启发式和强化学习的物联网可生存信任感知虚拟网络嵌入
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-21 DOI: 10.1016/j.adhoc.2025.103898
Parinaz Rezaeimoghaddam, Irfan Al-Anbagi
{"title":"Heuristic and reinforcement learning-based survivable trust-aware virtual network embedding for IoT networks","authors":"Parinaz Rezaeimoghaddam,&nbsp;Irfan Al-Anbagi","doi":"10.1016/j.adhoc.2025.103898","DOIUrl":"10.1016/j.adhoc.2025.103898","url":null,"abstract":"<div><div>Integrating virtual wireless sensor networks (VWSNs) with the Internet of Things (IoT) improves the quality of information (QoI) and quality of service (QoS). It manages wireless interference, critical to providing efficient and reliable services. Among the challenges in IoT-WSN virtualization, the survivable virtual network embedding (SVNE) problem stands out, as it efficiently maps a virtual network request (VNR) onto a WSN substrate while considering potential substrate failures and network security standards. This paper proposes a trust-aware fault recovery mechanism to address the security and survivability of virtualized IoT-WSN applications against physical infrastructure failures with two heuristic and intelligent approaches. Our proposed heuristic approach utilizes a node importance measurement strategy for faulty nodes based on the technique for order of preference by similarity to the ideal solution (TOPSIS) method. On the other hand, in our intelligent approach, we apply the deep Q-Learning (DQL) method to ensure end-to-end failure recovery for both nodes and links and improve physical resource utilization. To maintain cost efficiency, when a VNR experiences failure due to a fault in the physical infrastructure, its operation is restored through node/link migration without considering any backup resources. Our simulation results demonstrate that the proposed strategy effectively ensures the survivability of the VNRs, mitigates failures with our proposed failure recovery algorithms, and enhances the VNR acceptance rate.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103898"},"PeriodicalIF":4.4,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144131736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path planning for multi-UAV-assisted mobile edge computing framework using reinforcement learning in urban environment disaster scenarios 城市环境灾害场景下基于强化学习的多无人机辅助移动边缘计算框架路径规划
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-21 DOI: 10.1016/j.adhoc.2025.103928
Mohd Hirzi Adnan PhD. in Computer Networks, Zuriati Ahmad Zukarnain Prof. PhD in Quantum Computation and Information, Shamala K. Subramaniam Prof. PhD. in Computer Science
{"title":"Path planning for multi-UAV-assisted mobile edge computing framework using reinforcement learning in urban environment disaster scenarios","authors":"Mohd Hirzi Adnan PhD. in Computer Networks,&nbsp;Zuriati Ahmad Zukarnain Prof. PhD in Quantum Computation and Information,&nbsp;Shamala K. Subramaniam Prof. PhD. in Computer Science","doi":"10.1016/j.adhoc.2025.103928","DOIUrl":"10.1016/j.adhoc.2025.103928","url":null,"abstract":"<div><div>Unmanned aerial vehicles (UAVs) are significantly used in a various field, including disaster relief and rescue operations. The goal of path planning is to determine the shortest or most efficient route while using the least amount of energy and resources possible. In environmental disaster scenarios, multiple UAVs can be deployed in search and rescue operations to look for individuals that are trapped in the disaster areas. To address the issue of multi-UAV path planning, numerous academics have recently proposed heuristic, sampling, and machine learning-based techniques. However, deploying UAVs in dynamic environments with moving obstacles and inter-UAV interaction presents considerable problems. This paper presents the framework for path planning optimization for multi-UAV-assisted Mobile Edge Computing (MEC) network using Reinforcement Learning (RL) strategy during disaster relief operations in an urban environment. To tackle these challenges, we provide a novel multi-UAV Mobile Edge Computing architecture that uses reinforcement learning to improve Quality-of-Service and path planning. Our primary contributions include: 1) maximizing the quality of service for UAV-assisted mobile edge computing and path planning strategy in the reinforcement learning framework; 2) illustrating the computational demand of terminal users to secure higher level quality-of-service using a sigmoid-like function; 3) applying a reinforcement learning incentive matrix that incorporates synthetic considerations of the geometric distance, risk level, and demand of the terminal users to guarantee cost savings, risk avoidance, and the service quality. In this paper, the proposed framework considers the configuration of urban surroundings, including critical operational constraints, such as obstacle mobility and obstacle avoidance. From the simulation testing results, it shows that the proposed strategy is more appropriate in the disaster scenario since it is effective and performs better than the benchmark systems.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"178 ","pages":"Article 103928"},"PeriodicalIF":4.4,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144471281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SFEM3: A performance comparative analysis for SDN-based FANET Emulation using Mininet-WiFi and ns-3 SFEM3:使用mini - wifi和ns-3的基于sdn的FANET仿真性能比较分析
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-05-19 DOI: 10.1016/j.adhoc.2025.103859
Mauro Tropea , Carlos Enrique Quispe Aldana , Edison Pignaton de Freitas , Floriano De Rango
{"title":"SFEM3: A performance comparative analysis for SDN-based FANET Emulation using Mininet-WiFi and ns-3","authors":"Mauro Tropea ,&nbsp;Carlos Enrique Quispe Aldana ,&nbsp;Edison Pignaton de Freitas ,&nbsp;Floriano De Rango","doi":"10.1016/j.adhoc.2025.103859","DOIUrl":"10.1016/j.adhoc.2025.103859","url":null,"abstract":"<div><div>The integration of Software-Defined Networking (SDN) in Flying Ad-Hoc Networks (FANETs) introduces centralized control and programmability, enhancing network flexibility and UAV resource optimization. This study evaluates and compares the performance of SDN-based FANETs using two platforms: ns-3 and Mininet-WiFi. A multi-layer architecture was implemented to analyze network behavior under different scenarios, including single-hop, multihop, multipath, and mesh topologies. Performance metrics such as bandwidth, jitter, round-trip time (RTT), and packet loss were assessed. The results reveal that Mininet-WiFi consistently outperforms ns-3, achieving up to 87% higher bandwidth, 26 times lower packet loss, and significantly reduced jitter and latency. The study highlights key limitations in ns-3, such as excessive packet fragmentation, retransmissions, and high processing overhead due to VXLAN tunneling. Recommendations for improving FANET-SDN emulation, including MTU optimizations, alternative tunneling methods, and enhanced controller configurations, are provided. These findings serve as a foundation for future research on optimizing SDN-based UAV networks for real-world deployments.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"177 ","pages":"Article 103859"},"PeriodicalIF":4.4,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144138116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信