Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs)
DOI:
https://doi.org/10.18196/jrc.v6i1.25351Keywords:
Lightweight Cryptographic Solutions, Flying Ad Hoc Networks (FANETs), Resource-Constrained Networks, Post-Quantum Cryptography (PQC), Quantum Computing, UAV SecurityAbstract
Flying Ad Hoc Networks (FANETs) are indispensable in applications such as Surveillance, Disaster response missions, and Military operations. Both security and communication efficiency must meet certain requirements. However, their effectiveness is hobbled by dynamic topologies, resource constraints, and cyber threats. Therefore, Post-Quantum Cryptography (PQC) is necessary. Classical algorithms and current PQC schemes for FANETs have been discussed in this thesis, including cryptographic solutions that are lightweight enough for resourceconstrained environments. The numerical results of the experiment show that while lattice-based cryptography involves minimal risk of breaches, its power consumption is 25% higher than that for other systems and its processing time 30% slower. In contrast, multivariate polynomial cryptography is better on metrics like usage of electricity: only 10% more power consumed energywise and 15% more CPU cycles needed for processing. The introduction of PQC algorithms and architectures resulted in a 5–10% reduction in network throughput and increased latency to 20% in some scenarios. The results show that hybrid cryptographic systems—combining classical with PQC techniques— have the potential to achieve both high efficiency and long-term security. Case studies have validated the feasibility of tailored quantum-safe algorithms in FANETs, which can offer considerable security benefits while standing rigorous scrutiny in terms of scalability and computational performance on dynamic, missioncritical operations.
References
S. Chen, B. Jiang, H. Xu, T. Pang, M. Gao, and Z. Liu, “A task-driven scheme for forming clustering-structure-based heterogeneous fanets,” Vehicular Communications, vol. 52, 2025, doi: 10.1016/j.vehcom.2025.100884.
M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.
M. A. Khan et al., “Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review,” in IEEE Transactions on Network and Service Management, 2024, doi: 10.1109/TNSM.2024.3487265.
A. S. Nair and S. M. Thampi, “Flying ad hoc networks: Security, authentication protocols, and future directions,” in Internet of Things and Secure Smart Environments, pp. 223–272, 2020, doi: 10.1201/9780367276706-6.
T. E. Ali, F. I. Ali, P. Dakic, and A. D. Zoltan, “Trends, prospects, ´ challenges, and security in the healthcare internet of things,” Computing, vol. 107, no. 28, 2025, doi: 10.1007/s00607-024-01352-4.
Z. Ghaleb Al-Mekhlafi et al., “Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models,” in IEEE Access, vol. 12, pp. 148935-148960, 2024, doi: 10.1109/ACCESS.2024.3476512.
M. J. Almansor, N. M. Din, M. Z. Baharuddin, M. Ma, H. M. Alsayednoor, M. A. Al-Shareeda, and A. J. Al-asadi, “Routing protocols strategies for flying ad-hoc network (fanet): Review, taxonomy, and open research issues,” Alexandria Engineering Journal, vol. 109, pp. 553–577, 2024, doi: 10.1016/j.aej.2024.09.032.
M. A. Al-Shareeda, S. Manickam and M. A. Saare, “Intelligent Dronebased IoT Technology for Smart Agriculture System,” 2022 International Conference on Data Science and Intelligent Computing (ICDSIC), pp. 41-45, 2022, doi: 10.1109/ICDSIC56987.2022.10076170.
M. A. Khan, S. Javaid, S. A. H. Mohsan, M. Tanveer and I. Ullah, “Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review,” in IEEE Open Journal of the Communications Society, vol. 5, pp. 6849-6871, 2024, doi: 10.1109/OJCOMS.2024.3486649.
Z. AlZamili, K. M. Danach and M. Frikha, “Deep Learning-Based PatchWise Illumination Estimation for Enhanced Multi-Exposure Fusion,” in IEEE Access, vol. 11, pp. 120642-120653, 2023, doi: 10.1109/ACCESS.2023.3328579.
H. Abulkasim, B. Goncalves, A. Mashatan and S. Ghose, “Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment,” in IEEE Access, vol. 10, pp. 94963-94972, 2022, doi: 10.1109/ACCESS.2022.3204793.
A. Malhotra and S. Kaur, “A comprehensive review on recent advancements in routing protocols for flying ad hoc networks,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, 2022, doi: 10.1002/ett.3688.
J. Vijitha Ananthi and P. Subha Hency Jose, “A review on various routing protocol designing features for flying ad hoc networks,” Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021, pp. 315–325, 2022, doi: 10.1007/978-981-16-1866-6_23.
F. Pasandideh, T. D. E. Silva, A. A. S. d. Silva, and E. Pignaton de Freitas, “Topology management for flying ad hoc networks based on particle swarm optimization and software-defined networking,” Wireless Networks, vol. 28, pp. 257–272, 2022, doi: 10.1007/s11276-021-02835-4.
D. Sunitha and P. Latha, “A secure routing and black hole attack detection system using coot chimp optimization algorithm-based deep q network in manet,” Computers & Security, vol. 148, 2025, doi: 10.1016/j.cose.2024.104166.
R. Al Hilali, H. Shaker, Z. T. Sharef, B. T. Sharef, and S. Khan, “Study of geographical and energy-aware manet routing protocols,” in Innovations in Blockchain-Powered Intelligence and Cognitive Internet of Things (CIoT), pp. 135–228, 2025, doi: 10.4018/979-8-3693-2157-7.ch006.
N. Khatoon, V. Singh, and P. Kumar, “Energy-efficient dynamic load balanced clustering for manet,” International Journal of Wireless and Mobile Computing, vol. 28, no. 1, pp. 14–19, 2025, doi: 10.1504/IJWMC.2025.142911.
M. Z. Hassan, M. M. Hossain, and S. J. Alam, “The recent variants of olsr routing protocol in manet: A review,” International Journal of Advanced Networking and Applications, vol. 16, no. 1, pp. 6275–6280, 2024, doi: 10.35444/ijana.2024.16106.
M. M. A. Al-shareeda, M. Anbar, M. A. Alazzawi, S. Manickam, and I. H. Hasbullah, “Security schemes based conditional privacypreserving in vehicular ad hoc networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, 2020, doi: 10.11591/ijeecs.v21.i1.pp479-488.
M. A. Alazzawi, H. A. Al-behadili, M. N. Srayyih Almalki, A. L. Challoob, and M. A. Al-shareeda, “Id-ppa: Robust identity-based privacypreserving authentication scheme for a vehicular ad-hoc network,” in Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers 2, vol. 1347, pp. 80–94, 2021, doi: 10.1007/978-981-33-6835-4_6.
M. A. Al-shareeda, M. Anbar, S. Manickam, I. H. Hasbullah, N. Abdullah, M. M. Hamdi, and A. S. Al-Hiti, “Ne-cppa: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (vanets),” Applied Mathematics & Information Sciences, vol. 14, no. 6, pp. 957–966, 2020, doi: 10.18576/amis/140602.
T. R. Beegum, M. Y. I. Idris, M. N. B. Ayub and H. A. Shehadeh, “Optimized Routing of UAVs Using Bio-Inspired Algorithm in FANET: A Systematic Review,” in IEEE Access, vol. 11, pp. 15588-15622, 2023, doi: 10.1109/ACCESS.2023.3244067.
Z. Alzamili, K. Danach, and M. Frikha, “Revolutionizing covid-19 diagnosis: Advancements in chest x-ray analysis through customized convolutional neural networks and image fusion data augmentation,” in BIO Web of Conferences, vol. 97, 2024, doi: 10.1051/bioconf/20249700014.
G. Amponis, T. Lagkas, P. Sarigiannidis, V. Vitsas, P. Fouliras, and S. Wan, “A survey on fanet routing from a cross-layer design perspective,” Journal of Systems Architecture, vol. 120, 2021, doi: 10.1016/j.sysarc.2021.102281.
A. Djihene, B. Amal and K. Ali, “Enhance Energy Using Bio-Inspired Algorithms in Manet: An Overview,” 2024 2nd International Conference on Electrical Engineering and Automatic Control (ICEEAC), pp. 1-6, 2024, doi: 10.1109/ICEEAC61226.2024.10576396.
Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.
M. A. Khan, I. M. Qureshi, and F. Khanzada, “A hybrid communication scheme for efficient and low-cost deployment of future flying ad-hoc network (fanet),” Drones, vol. 3, no. 1, 2019, doi: 10.3390/drones3010016.
A. Aalsaud, H. Alrudainv, R. Shafik, F. Xia and A. Yakovlev, “MEMSBased Runtime Idle Energy Minimization for Bursty Workloads in Heterogeneous Many-Core Systems,” 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 198-205, 2018, doi: 10.1109/PATMOS.2018.8464152.
V. Sharma and R. Kumar, “G-fanet: an ambient network formation between ground and flying ad hoc networks,” Telecommunication Systems, vol. 65, no. 1, pp. 31–54, 2017, doi: 10.1007/s11235-016-0210-2.
C. Lu and F. Wang, “Towards secure internet of things-enabled intelligent transportation systems: A comprehensive review,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 7, 2024, doi: 10.14569/IJACSA.2024.0150708.
L. Zhu, M. M. Karim, K. Sharif, C. Xu and F. Li, “Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric SoftwareDefined FANET,” in IEEE Transactions on Vehicular Technology, vol. 72, no. 2, pp. 2453-2467, 2023, doi: 10.1109/TVT.2022.3213040.
M. A. Khan, I. U. Khan, A. Safi, and I. M. Quershi, “Dynamic routing in flying ad-hoc networks using topology-based routing protocols,” Drones, vol. 2, no. 3, 2018, doi: 10.3390/drones2030027.
Y. Ke et al., “Distributed Routing Optimization Algorithm for FANET Based on Multiagent Reinforcement Learning,” in IEEE Sensors Journal, vol. 24, no. 15, pp. 24851-24864, 2024, doi: 10.1109/JSEN.2024.3415127.
Q. Wu et al., “Routing protocol for heterogeneous FANETs with mobility prediction,” in China Communications, vol. 19, no. 1, pp. 186-201, 2022, doi: 10.23919/JCC.2022.01.014.
C. Grasso, R. Raftopoulos, and G. Schembra, “Slicing a fanet for heterogeneous delay-constrained applications,” Computer Communications, vol. 195, pp. 362–375, 2022, doi: 10.1016/j.comcom.2022.08.024.
A. Srivastava and J. Prakash, “Future fanet with application and enabling techniques: Anatomization and sustainability issues,” Computer science review, vol. 39, 2021, doi: 10.1016/j.cosrev.2020.100359.
A. Guillen-Perez and M.-D. Cano, “Flying ad hoc networks: A new domain for network communications,” Sensors, vol. 18, no. 10, 2018, doi: 10.3390/s18103571.
W. J. Lau, J. M.-Y. Lim, C. Y. Chong, N. S. Ho, and T. W. M. Ooi, “General outage probability model for uav-to-uav links in multi-uav networks,” Computer Networks, vol. 229, 2023, doi: 10.1016/j.comnet.2023.109752.
L. Zeng, X. Liao, Z. Ma, B. Xiong, H. Jiang and Z. Chen, “ThreeDimensional UAV-to-UAV Channels: Modeling, Simulation, and Capacity Analysis,” in IEEE Internet of Things Journal, vol. 11, no. 6, pp. 10054- 10068, 2024, doi: 10.1109/JIOT.2023.3325945.
M. Mustaqim, B. A. Khawaja, A. A. Razzaqi, S. S. H. Zaidi, S. A. Jawed, and S. H. Qazi, “Wideband and high gain antenna arrays for uav-to-uav and uav-to-ground communication in flying ad-hoc networks (fanets),” Microwave and Optical Technology Letters, vol. 60, no. 5, pp. 1164– 1170, 2018, doi: 10.1002/mop.31130.
B. Hua et al., “Channel Modeling for UAV-to-Ground Communications With Posture Variation and Fuselage Scattering Effect,” in IEEE Transactions on Communications, vol. 71, no. 5, pp. 3103-3116, 2023, doi: 10.1109/TCOMM.2023.3255900.
H. Li et al., “Measurement-based Vegetation Penetration Loss Model for UAV-to-Ground Communications,” 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), pp. 1-5, 2024, doi: 10.1109/VTC2024- Fall63153.2024.10757551.
Q. Song, Y. Zeng, J. Xu, and S. Jin, “A survey of prototype and experiment for uav communications,” Science China Information Sciences, vol. 64, no. 140301, pp. 1–21, 2021, doi: 10.1007/s11432-020-3030-2.
B. Zeng, Z. Zhang, X. Ding, X. Bu and J. An, “Predictive decision and reliable accessing for UAV communication in space-air-ground integrated networks,” in China Communications, vol. 19, no. 1, pp. 166-185, 2022, doi: 10.23919/JCC.2022.01.013.
O. Ceviz, S. Sen and P. Sadioglu, “A Survey of Security in UAVs and FANETs:Issues, Threats, Analysis of Attacks, and Solutions,” in IEEE Communications Surveys & Tutorials, 2023, doi: 10.1109/COMST.2024.3515051.
X. Du, Y. Cao, L. Wen, and Z. Yang, “A review of intrusion detection in fanets,” Secure and Digitalized Future Mobility: Shaping the Ground and Air Vehicles Cooperation, vol. 99, 2022.
A. Altaweel, H. Mukkath and I. Kamel, “GPS Spoofing Attacks in FANETs: A Systematic Literature Review,” in IEEE Access, vol. 11, pp. 55233-55280, 2023, doi: 10.1109/ACCESS.2023.3281731.
M. Bada, D. E. Boubiche, N. Lagraa, C. A. Kerrache, M. Imran, and M. Shoaib, “A policy-based solution for the detection of colluding gpsspoofing attacks in fanets,” Transportation Research Part A: Policy and Practice, vol. 149, pp. 300–318, 2021, doi: 10.1016/j.tra.2021.04.022.
C. Pu, “Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks,” in IEEE Access, vol. 6, pp. 68472-68486, 2018, doi: 10.1109/ACCESS.2018.2879758.
J. Ghelani, P. Gharia and H. El-Ocla, “Gradient Monitored Reinforcement Learning for Jamming Attack Detection in FANETs,” in IEEE Access, vol. 12, pp. 23081-23095, 2024, doi: 10.1109/ACCESS.2024.3361945.
S. Priyadharshini and P. Balamurugan, “An efficient ddos attack detection and prevention model using fusion heuristic enhancement of deep learning approach in fanet sector,” Applied Soft Computing, vol. 167, 2024, doi: 10.1016/j.asoc.2024.112438.
I. Bekmezci, O. K. Sahingoz, and S¸. Temel, “Flying ad-hoc networks (fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004.
T. Kim, S. Lee, K. H. Kim, and Y.-I. Jo, “Fanet routing protocol analysis for multi-uav-based reconnaissance mobility models,” Drones, vol. 7, no. 3, 2023, doi: 10.3390/drones7030161.
I. A. Sumra, P. Sellappan, A. Abdullah, and A. Ali, “Security issues and challenges in manet-vanet-fanet: A survey,” EAI Endorsed Transactions on Energy Web, vol. 18, no. 17, 2018, doi: 10.4108/eai.10-4-2018.155884.
N. Islam, M. K. Hossain, G. G. M. N. Ali and P. H. J. Chong, “An expedite group key establishment protocol for Flying Ad-Hoc Network(FANET),” 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), pp. 312-315, 2016, doi: 10.1109/ICIEV.2016.7760017.
S. U. Jan, I. A. Abbasi, F. Algarni and A. S. Khan, “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET,” in IEEE Access, vol. 10, pp. 95321-95343, 2022, doi: 10.1109/ACCESS.2022.3204271.
A. Gupta, A. Barthwal, H. Vardhan, S. Kakria, S. Kumar, and A. S. Parihar, “Evolutionary study of distributed authentication protocols and its integration to uav-assisted fanet,” Multimedia Tools and Applications, vol. 82, no. 27, pp. 42311–42330, 2023, doi: 10.1007/s11042-023-15197-0.
M. Namdev, S. Goyal, and R. Agarwal, “An optimized communication scheme for energy efficient and secure flying ad-hoc network (fanet),” Wireless personal communications, vol. 120, no. 2, pp. 1291–1312, 2021, doi: 10.1007/s11277-021-08515-y.
A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “Fanet: Communication, mobility models and security issues,” Computer Networks, vol. 163, 2019, doi: 10.1016/j.comnet.2019.106877.
S. Lateef, M. Rizwan, and M. A. Hassan, “Security threats in flying ad hoc network (fanet),” Computational Intelligence for Unmanned Aerial Vehicles Communication Networks, vol. 1033, pp. 73–96, 2022, doi: 10.1007/978-3-030-97113-7 5.
J. Sharma and P. S. Mehra, “Secure communication in iot-based uav networks: A systematic survey,” Internet of Things, vol. 23, 2023, doi: 10.1016/j.iot.2023.100883.
K. Prateek, N. K. Ojha, F. Altaf, and S. Maity, “Quantum secured 6g technology-based applications in internet of everything,” Telecommunication Systems, vol. 82, no. 2, pp. 315–344, 2023, doi: 10.1007/s11235- 022-00979-y.
A. Kumar et al., “Survey of Promising Technologies for Quantum Drones and Networks,” in IEEE Access, vol. 9, pp. 125868-125911, 2021, doi: 10.1109/ACCESS.2021.3109816.
U. Banerjee, Efficient algorithms, protocols and hardware architectures for next-generation cryptography in embedded systems, Ph.D. dissertation, Massachusetts Institute of Technology, 2021.
Y. Lu et al., “Uav ad hoc network routing algorithms in space–air–ground integrated networks: Challenges and directions,” Drones, vol. 7, no. 7, 2023, doi: 10.3390/drones7070448.
B. Barkee, M. Ceria, T. Moriarty, and A. Visconti, “Why you cannot even hope to use grobner bases in cryptography: an eternal golden braid ¨ of failures,” Applicable Algebra in Engineering, Communication and Computing, vol. 31, no. 3, pp. 235–252, 2020, doi: 10.1007/s00200-020- 00428-w.
C. W. Vernon, Ls-aodv: A routing protocol based on lightweight cryptographic techniques for a fanet of nano drones, Ph.D. dissertation, Monterey, CA; Naval Postgraduate School, 2022.
E. B. Aleksandrova, E. Shkorkina, and M. O. Kalinin, “Organization of the quantum cryptographic keys distribution system for transportation infrastructure users,” Automatic Control and Computer Sciences, vol. 53, pp. 969–971, 2019, doi: 10.3103/S0146411619080042.
D. Micciancio and O. Regev, “Lattice-based cryptography,” in Postquantum cryptography, pp. 147–191, 2009, doi: 10.1007/978-3-540- 88702-7_5.
H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee, and R. Cammarota, “Post-quantum lattice-based cryptography implementations: A survey,” ACM Computing Surveys (CSUR), vol. 51, no. 6, pp. 1–41, 2019, doi: 10.1145/3292548.
S. Temel and I. Bekmezci, “Scalability analysis of Flying Ad Hoc Networks (FANETs): A directional antenna approach,” 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 185-187, 2014, doi: 10.1109/BlackSeaCom.2014.6849036.
F. De Rango, G. Potrino, M. Tropea, A. F. Santamaria, and P. Fazio, “Scalable and ligthway bio-inspired coordination protocol for fanet in precision agriculture applications,” Computers & Electrical Engineering, vol. 74, pp. 305–318, 2019, doi: 10.1016/j.compeleceng.2019.01.018.
Z. G. Al-Mekhlafi, H. D. K. Al-Janabi, M. A. Al-Shareeda, B. A. Mohammed, J. S. Alshudukhi, and K. A. Al-Dhlan, “Fog computing and blockchain technology based certificateless authentication scheme in 5g-assisted vehicular communication,” Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 3703–3721, 2024, doi: 10.1007/s12083- 024-01778-9.
K. Le Hur, “Interacting topological quantum aspects with light and geometrical functions,” Physics Reports, vol. 1104, pp. 1–42, 2025, doi: 10.1016/j.physrep.2024.11.003.
T. Proctor, K. Young, A. D. Baczewski, and R. Blume-Kohout, “Benchmarking quantum computers,” Nature Reviews Physics, vol. 7, pp. 105– 118, 2025, doi: 10.1038/s42254-024-00796-z.
M. Kumar and P. Pattnaik, “Post Quantum Cryptography(PQC) - An overview: (Invited Paper),” 2020 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1-9, 2020, doi: 10.1109/HPEC43674.2020.9286147.
D. Joseph, R. Misoczki, M. Manzano, J. Tricot, F. D. Pinuaga, O. Lacombe, S. Leichenauer, J. Hidary, P. Venables, and R. Hansen, “Transitioning organizations to post-quantum cryptography,” Nature, vol. 605, no. 7909, pp. 237–243, 2022, doi: 10.1038/s41586-022-04623-2.
A. Aydeger, E. Zeydan, A. K. Yadav, K. T. Hemachandra and M. Liyanage, “Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography,” 2024 15th International Conference on Network of the Future (NoF), pp. 195-203, 2024, doi: 10.1109/NoF62948.2024.10741441.
Z. Alzamli, K. Danach and M. Frikha, “Machine Learning Techniques in Service of COVID-19: Data Augmentation Based on Multi-Exposure Image FusionTowards Anomaly Prediction,” 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA), pp. 54-58, 2022, doi: 10.1109/ICCRESA57091.2022.10352482.
J. Choi and J. Lee, “Secure and scalable internet of things model using post-quantum macsec,” Applied Sciences, vol. 14, no. 10, 2024, doi: 10.3390/app14104215.
J. Jailton, T. Carvalho, J. Araujo, and R. Franc ´ es, “Relay positioning ˆ strategy for traffic data collection of multiple unmanned aerial vehicles using hybrid optimization systems: A fanet-based case study,” Wireless Communications and Mobile Computing, vol. 2017, no. 1, 2017, doi: 10.1155/2017/2865482.
V. Bhardwaj and N. Kaur, “An efficient routing protocol for FANET based on hybrid optimization algorithm,” 2020 International Conference on Intelligent Engineering and Management (ICIEM), pp. 252-255, 2020, doi: 10.1109/ICIEM48762.2020.9160327.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Mahmood A. Al-shareeda

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License