Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs)

Authors

  • Abdulnasser AbdulJabbar Abbood Southern Technical University
  • Faris K. AL-Shammri University of Warith Al Anbiyaa
  • Zainab Marid Alzamili Education Directorate of Thi-Qar
  • ‪Mahmood A. Al-Shareeda‬‏ Southern Technical University
  • Mohammed Amin Almaiah The University of Jordan
  • Rommel AlAli King Faisal University

DOI:

https://doi.org/10.18196/jrc.v6i1.25351

Keywords:

Lightweight Cryptographic Solutions, Flying Ad Hoc Networks (FANETs), Resource-Constrained Networks, Post-Quantum Cryptography (PQC), Quantum Computing, UAV Security

Abstract

Flying Ad Hoc Networks (FANETs) are indispensable in applications such as Surveillance, Disaster response missions, and Military operations. Both security and communication efficiency must meet certain requirements. However, their effectiveness is hobbled by dynamic topologies, resource constraints, and cyber threats. Therefore, Post-Quantum Cryptography (PQC) is necessary. Classical algorithms and current PQC schemes for FANETs have been discussed in this thesis, including cryptographic solutions that are lightweight enough for resourceconstrained environments. The numerical results of the experiment show that while lattice-based cryptography involves minimal risk of breaches, its power consumption is 25% higher than that for other systems and its processing time 30% slower. In contrast, multivariate polynomial cryptography is better on metrics like usage of electricity: only 10% more power consumed energywise and 15% more CPU cycles needed for processing. The introduction of PQC algorithms and architectures resulted in a 5–10% reduction in network throughput and increased latency to 20% in some scenarios. The results show that hybrid cryptographic systems—combining classical with PQC techniques— have the potential to achieve both high efficiency and long-term security. Case studies have validated the feasibility of tailored quantum-safe algorithms in FANETs, which can offer considerable security benefits while standing rigorous scrutiny in terms of scalability and computational performance on dynamic, missioncritical operations.

References

S. Chen, B. Jiang, H. Xu, T. Pang, M. Gao, and Z. Liu, “A task-driven scheme for forming clustering-structure-based heterogeneous fanets,” Vehicular Communications, vol. 52, 2025, doi: 10.1016/j.vehcom.2025.100884.

M. A. Al-Shareeda, M. A. Saare, and S. Manickam, “Unmanned aerial vehicle: a review and future directions,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 30, no. 2, pp. 778–786, 2023, doi: 10.11591/ijeecs.v30.i2.pp778-786.

M. A. Khan et al., “Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review,” in IEEE Transactions on Network and Service Management, 2024, doi: 10.1109/TNSM.2024.3487265.

A. S. Nair and S. M. Thampi, “Flying ad hoc networks: Security, authentication protocols, and future directions,” in Internet of Things and Secure Smart Environments, pp. 223–272, 2020, doi: 10.1201/9780367276706-6.

T. E. Ali, F. I. Ali, P. Dakic, and A. D. Zoltan, “Trends, prospects, ´ challenges, and security in the healthcare internet of things,” Computing, vol. 107, no. 28, 2025, doi: 10.1007/s00607-024-01352-4.

Z. Ghaleb Al-Mekhlafi et al., “Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models,” in IEEE Access, vol. 12, pp. 148935-148960, 2024, doi: 10.1109/ACCESS.2024.3476512.

M. J. Almansor, N. M. Din, M. Z. Baharuddin, M. Ma, H. M. Alsayednoor, M. A. Al-Shareeda, and A. J. Al-asadi, “Routing protocols strategies for flying ad-hoc network (fanet): Review, taxonomy, and open research issues,” Alexandria Engineering Journal, vol. 109, pp. 553–577, 2024, doi: 10.1016/j.aej.2024.09.032.

M. A. Al-Shareeda, S. Manickam and M. A. Saare, “Intelligent Dronebased IoT Technology for Smart Agriculture System,” 2022 International Conference on Data Science and Intelligent Computing (ICDSIC), pp. 41-45, 2022, doi: 10.1109/ICDSIC56987.2022.10076170.

M. A. Khan, S. Javaid, S. A. H. Mohsan, M. Tanveer and I. Ullah, “Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review,” in IEEE Open Journal of the Communications Society, vol. 5, pp. 6849-6871, 2024, doi: 10.1109/OJCOMS.2024.3486649.

Z. AlZamili, K. M. Danach and M. Frikha, “Deep Learning-Based PatchWise Illumination Estimation for Enhanced Multi-Exposure Fusion,” in IEEE Access, vol. 11, pp. 120642-120653, 2023, doi: 10.1109/ACCESS.2023.3328579.

H. Abulkasim, B. Goncalves, A. Mashatan and S. Ghose, “Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment,” in IEEE Access, vol. 10, pp. 94963-94972, 2022, doi: 10.1109/ACCESS.2022.3204793.

A. Malhotra and S. Kaur, “A comprehensive review on recent advancements in routing protocols for flying ad hoc networks,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, 2022, doi: 10.1002/ett.3688.

J. Vijitha Ananthi and P. Subha Hency Jose, “A review on various routing protocol designing features for flying ad hoc networks,” Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021, pp. 315–325, 2022, doi: 10.1007/978-981-16-1866-6_23.

F. Pasandideh, T. D. E. Silva, A. A. S. d. Silva, and E. Pignaton de Freitas, “Topology management for flying ad hoc networks based on particle swarm optimization and software-defined networking,” Wireless Networks, vol. 28, pp. 257–272, 2022, doi: 10.1007/s11276-021-02835-4.

D. Sunitha and P. Latha, “A secure routing and black hole attack detection system using coot chimp optimization algorithm-based deep q network in manet,” Computers & Security, vol. 148, 2025, doi: 10.1016/j.cose.2024.104166.

R. Al Hilali, H. Shaker, Z. T. Sharef, B. T. Sharef, and S. Khan, “Study of geographical and energy-aware manet routing protocols,” in Innovations in Blockchain-Powered Intelligence and Cognitive Internet of Things (CIoT), pp. 135–228, 2025, doi: 10.4018/979-8-3693-2157-7.ch006.

N. Khatoon, V. Singh, and P. Kumar, “Energy-efficient dynamic load balanced clustering for manet,” International Journal of Wireless and Mobile Computing, vol. 28, no. 1, pp. 14–19, 2025, doi: 10.1504/IJWMC.2025.142911.

M. Z. Hassan, M. M. Hossain, and S. J. Alam, “The recent variants of olsr routing protocol in manet: A review,” International Journal of Advanced Networking and Applications, vol. 16, no. 1, pp. 6275–6280, 2024, doi: 10.35444/ijana.2024.16106.

M. M. A. Al-shareeda, M. Anbar, M. A. Alazzawi, S. Manickam, and I. H. Hasbullah, “Security schemes based conditional privacypreserving in vehicular ad hoc networks,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, 2020, doi: 10.11591/ijeecs.v21.i1.pp479-488.

M. A. Alazzawi, H. A. Al-behadili, M. N. Srayyih Almalki, A. L. Challoob, and M. A. Al-shareeda, “Id-ppa: Robust identity-based privacypreserving authentication scheme for a vehicular ad-hoc network,” in Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers 2, vol. 1347, pp. 80–94, 2021, doi: 10.1007/978-981-33-6835-4_6.

M. A. Al-shareeda, M. Anbar, S. Manickam, I. H. Hasbullah, N. Abdullah, M. M. Hamdi, and A. S. Al-Hiti, “Ne-cppa: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (vanets),” Applied Mathematics & Information Sciences, vol. 14, no. 6, pp. 957–966, 2020, doi: 10.18576/amis/140602.

T. R. Beegum, M. Y. I. Idris, M. N. B. Ayub and H. A. Shehadeh, “Optimized Routing of UAVs Using Bio-Inspired Algorithm in FANET: A Systematic Review,” in IEEE Access, vol. 11, pp. 15588-15622, 2023, doi: 10.1109/ACCESS.2023.3244067.

Z. Alzamili, K. Danach, and M. Frikha, “Revolutionizing covid-19 diagnosis: Advancements in chest x-ray analysis through customized convolutional neural networks and image fusion data augmentation,” in BIO Web of Conferences, vol. 97, 2024, doi: 10.1051/bioconf/20249700014.

G. Amponis, T. Lagkas, P. Sarigiannidis, V. Vitsas, P. Fouliras, and S. Wan, “A survey on fanet routing from a cross-layer design perspective,” Journal of Systems Architecture, vol. 120, 2021, doi: 10.1016/j.sysarc.2021.102281.

A. Djihene, B. Amal and K. Ali, “Enhance Energy Using Bio-Inspired Algorithms in Manet: An Overview,” 2024 2nd International Conference on Electrical Engineering and Automatic Control (ICEEAC), pp. 1-6, 2024, doi: 10.1109/ICEEAC61226.2024.10576396.

Z. Ghaleb Al-Mekhlafi et al., “Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review,” in IEEE Sensors Journal, vol. 24, no. 19, pp. 29575-29602, 2024, doi: 10.1109/JSEN.2024.3436612.

M. A. Khan, I. M. Qureshi, and F. Khanzada, “A hybrid communication scheme for efficient and low-cost deployment of future flying ad-hoc network (fanet),” Drones, vol. 3, no. 1, 2019, doi: 10.3390/drones3010016.

A. Aalsaud, H. Alrudainv, R. Shafik, F. Xia and A. Yakovlev, “MEMSBased Runtime Idle Energy Minimization for Bursty Workloads in Heterogeneous Many-Core Systems,” 2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS), pp. 198-205, 2018, doi: 10.1109/PATMOS.2018.8464152.

V. Sharma and R. Kumar, “G-fanet: an ambient network formation between ground and flying ad hoc networks,” Telecommunication Systems, vol. 65, no. 1, pp. 31–54, 2017, doi: 10.1007/s11235-016-0210-2.

C. Lu and F. Wang, “Towards secure internet of things-enabled intelligent transportation systems: A comprehensive review,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 7, 2024, doi: 10.14569/IJACSA.2024.0150708.

L. Zhu, M. M. Karim, K. Sharif, C. Xu and F. Li, “Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric SoftwareDefined FANET,” in IEEE Transactions on Vehicular Technology, vol. 72, no. 2, pp. 2453-2467, 2023, doi: 10.1109/TVT.2022.3213040.

M. A. Khan, I. U. Khan, A. Safi, and I. M. Quershi, “Dynamic routing in flying ad-hoc networks using topology-based routing protocols,” Drones, vol. 2, no. 3, 2018, doi: 10.3390/drones2030027.

Y. Ke et al., “Distributed Routing Optimization Algorithm for FANET Based on Multiagent Reinforcement Learning,” in IEEE Sensors Journal, vol. 24, no. 15, pp. 24851-24864, 2024, doi: 10.1109/JSEN.2024.3415127.

Q. Wu et al., “Routing protocol for heterogeneous FANETs with mobility prediction,” in China Communications, vol. 19, no. 1, pp. 186-201, 2022, doi: 10.23919/JCC.2022.01.014.

C. Grasso, R. Raftopoulos, and G. Schembra, “Slicing a fanet for heterogeneous delay-constrained applications,” Computer Communications, vol. 195, pp. 362–375, 2022, doi: 10.1016/j.comcom.2022.08.024.

A. Srivastava and J. Prakash, “Future fanet with application and enabling techniques: Anatomization and sustainability issues,” Computer science review, vol. 39, 2021, doi: 10.1016/j.cosrev.2020.100359.

A. Guillen-Perez and M.-D. Cano, “Flying ad hoc networks: A new domain for network communications,” Sensors, vol. 18, no. 10, 2018, doi: 10.3390/s18103571.

W. J. Lau, J. M.-Y. Lim, C. Y. Chong, N. S. Ho, and T. W. M. Ooi, “General outage probability model for uav-to-uav links in multi-uav networks,” Computer Networks, vol. 229, 2023, doi: 10.1016/j.comnet.2023.109752.

L. Zeng, X. Liao, Z. Ma, B. Xiong, H. Jiang and Z. Chen, “ThreeDimensional UAV-to-UAV Channels: Modeling, Simulation, and Capacity Analysis,” in IEEE Internet of Things Journal, vol. 11, no. 6, pp. 10054- 10068, 2024, doi: 10.1109/JIOT.2023.3325945.

M. Mustaqim, B. A. Khawaja, A. A. Razzaqi, S. S. H. Zaidi, S. A. Jawed, and S. H. Qazi, “Wideband and high gain antenna arrays for uav-to-uav and uav-to-ground communication in flying ad-hoc networks (fanets),” Microwave and Optical Technology Letters, vol. 60, no. 5, pp. 1164– 1170, 2018, doi: 10.1002/mop.31130.

B. Hua et al., “Channel Modeling for UAV-to-Ground Communications With Posture Variation and Fuselage Scattering Effect,” in IEEE Transactions on Communications, vol. 71, no. 5, pp. 3103-3116, 2023, doi: 10.1109/TCOMM.2023.3255900.

H. Li et al., “Measurement-based Vegetation Penetration Loss Model for UAV-to-Ground Communications,” 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), pp. 1-5, 2024, doi: 10.1109/VTC2024- Fall63153.2024.10757551.

Q. Song, Y. Zeng, J. Xu, and S. Jin, “A survey of prototype and experiment for uav communications,” Science China Information Sciences, vol. 64, no. 140301, pp. 1–21, 2021, doi: 10.1007/s11432-020-3030-2.

B. Zeng, Z. Zhang, X. Ding, X. Bu and J. An, “Predictive decision and reliable accessing for UAV communication in space-air-ground integrated networks,” in China Communications, vol. 19, no. 1, pp. 166-185, 2022, doi: 10.23919/JCC.2022.01.013.

O. Ceviz, S. Sen and P. Sadioglu, “A Survey of Security in UAVs and FANETs:Issues, Threats, Analysis of Attacks, and Solutions,” in IEEE Communications Surveys & Tutorials, 2023, doi: 10.1109/COMST.2024.3515051.

X. Du, Y. Cao, L. Wen, and Z. Yang, “A review of intrusion detection in fanets,” Secure and Digitalized Future Mobility: Shaping the Ground and Air Vehicles Cooperation, vol. 99, 2022.

A. Altaweel, H. Mukkath and I. Kamel, “GPS Spoofing Attacks in FANETs: A Systematic Literature Review,” in IEEE Access, vol. 11, pp. 55233-55280, 2023, doi: 10.1109/ACCESS.2023.3281731.

M. Bada, D. E. Boubiche, N. Lagraa, C. A. Kerrache, M. Imran, and M. Shoaib, “A policy-based solution for the detection of colluding gpsspoofing attacks in fanets,” Transportation Research Part A: Policy and Practice, vol. 149, pp. 300–318, 2021, doi: 10.1016/j.tra.2021.04.022.

C. Pu, “Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks,” in IEEE Access, vol. 6, pp. 68472-68486, 2018, doi: 10.1109/ACCESS.2018.2879758.

J. Ghelani, P. Gharia and H. El-Ocla, “Gradient Monitored Reinforcement Learning for Jamming Attack Detection in FANETs,” in IEEE Access, vol. 12, pp. 23081-23095, 2024, doi: 10.1109/ACCESS.2024.3361945.

S. Priyadharshini and P. Balamurugan, “An efficient ddos attack detection and prevention model using fusion heuristic enhancement of deep learning approach in fanet sector,” Applied Soft Computing, vol. 167, 2024, doi: 10.1016/j.asoc.2024.112438.

I. Bekmezci, O. K. Sahingoz, and S¸. Temel, “Flying ad-hoc networks (fanets): A survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270, 2013, doi: 10.1016/j.adhoc.2012.12.004.

T. Kim, S. Lee, K. H. Kim, and Y.-I. Jo, “Fanet routing protocol analysis for multi-uav-based reconnaissance mobility models,” Drones, vol. 7, no. 3, 2023, doi: 10.3390/drones7030161.

I. A. Sumra, P. Sellappan, A. Abdullah, and A. Ali, “Security issues and challenges in manet-vanet-fanet: A survey,” EAI Endorsed Transactions on Energy Web, vol. 18, no. 17, 2018, doi: 10.4108/eai.10-4-2018.155884.

N. Islam, M. K. Hossain, G. G. M. N. Ali and P. H. J. Chong, “An expedite group key establishment protocol for Flying Ad-Hoc Network(FANET),” 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), pp. 312-315, 2016, doi: 10.1109/ICIEV.2016.7760017.

S. U. Jan, I. A. Abbasi, F. Algarni and A. S. Khan, “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET,” in IEEE Access, vol. 10, pp. 95321-95343, 2022, doi: 10.1109/ACCESS.2022.3204271.

A. Gupta, A. Barthwal, H. Vardhan, S. Kakria, S. Kumar, and A. S. Parihar, “Evolutionary study of distributed authentication protocols and its integration to uav-assisted fanet,” Multimedia Tools and Applications, vol. 82, no. 27, pp. 42311–42330, 2023, doi: 10.1007/s11042-023-15197-0.

M. Namdev, S. Goyal, and R. Agarwal, “An optimized communication scheme for energy efficient and secure flying ad-hoc network (fanet),” Wireless personal communications, vol. 120, no. 2, pp. 1291–1312, 2021, doi: 10.1007/s11277-021-08515-y.

A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “Fanet: Communication, mobility models and security issues,” Computer Networks, vol. 163, 2019, doi: 10.1016/j.comnet.2019.106877.

S. Lateef, M. Rizwan, and M. A. Hassan, “Security threats in flying ad hoc network (fanet),” Computational Intelligence for Unmanned Aerial Vehicles Communication Networks, vol. 1033, pp. 73–96, 2022, doi: 10.1007/978-3-030-97113-7 5.

J. Sharma and P. S. Mehra, “Secure communication in iot-based uav networks: A systematic survey,” Internet of Things, vol. 23, 2023, doi: 10.1016/j.iot.2023.100883.

K. Prateek, N. K. Ojha, F. Altaf, and S. Maity, “Quantum secured 6g technology-based applications in internet of everything,” Telecommunication Systems, vol. 82, no. 2, pp. 315–344, 2023, doi: 10.1007/s11235- 022-00979-y.

A. Kumar et al., “Survey of Promising Technologies for Quantum Drones and Networks,” in IEEE Access, vol. 9, pp. 125868-125911, 2021, doi: 10.1109/ACCESS.2021.3109816.

U. Banerjee, Efficient algorithms, protocols and hardware architectures for next-generation cryptography in embedded systems, Ph.D. dissertation, Massachusetts Institute of Technology, 2021.

Y. Lu et al., “Uav ad hoc network routing algorithms in space–air–ground integrated networks: Challenges and directions,” Drones, vol. 7, no. 7, 2023, doi: 10.3390/drones7070448.

B. Barkee, M. Ceria, T. Moriarty, and A. Visconti, “Why you cannot even hope to use grobner bases in cryptography: an eternal golden braid ¨ of failures,” Applicable Algebra in Engineering, Communication and Computing, vol. 31, no. 3, pp. 235–252, 2020, doi: 10.1007/s00200-020- 00428-w.

C. W. Vernon, Ls-aodv: A routing protocol based on lightweight cryptographic techniques for a fanet of nano drones, Ph.D. dissertation, Monterey, CA; Naval Postgraduate School, 2022.

E. B. Aleksandrova, E. Shkorkina, and M. O. Kalinin, “Organization of the quantum cryptographic keys distribution system for transportation infrastructure users,” Automatic Control and Computer Sciences, vol. 53, pp. 969–971, 2019, doi: 10.3103/S0146411619080042.

D. Micciancio and O. Regev, “Lattice-based cryptography,” in Postquantum cryptography, pp. 147–191, 2009, doi: 10.1007/978-3-540- 88702-7_5.

H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee, and R. Cammarota, “Post-quantum lattice-based cryptography implementations: A survey,” ACM Computing Surveys (CSUR), vol. 51, no. 6, pp. 1–41, 2019, doi: 10.1145/3292548.

S. Temel and I. Bekmezci, “Scalability analysis of Flying Ad Hoc Networks (FANETs): A directional antenna approach,” 2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pp. 185-187, 2014, doi: 10.1109/BlackSeaCom.2014.6849036.

F. De Rango, G. Potrino, M. Tropea, A. F. Santamaria, and P. Fazio, “Scalable and ligthway bio-inspired coordination protocol for fanet in precision agriculture applications,” Computers & Electrical Engineering, vol. 74, pp. 305–318, 2019, doi: 10.1016/j.compeleceng.2019.01.018.

Z. G. Al-Mekhlafi, H. D. K. Al-Janabi, M. A. Al-Shareeda, B. A. Mohammed, J. S. Alshudukhi, and K. A. Al-Dhlan, “Fog computing and blockchain technology based certificateless authentication scheme in 5g-assisted vehicular communication,” Peer-to-Peer Networking and Applications, vol. 17, no. 6, pp. 3703–3721, 2024, doi: 10.1007/s12083- 024-01778-9.

K. Le Hur, “Interacting topological quantum aspects with light and geometrical functions,” Physics Reports, vol. 1104, pp. 1–42, 2025, doi: 10.1016/j.physrep.2024.11.003.

T. Proctor, K. Young, A. D. Baczewski, and R. Blume-Kohout, “Benchmarking quantum computers,” Nature Reviews Physics, vol. 7, pp. 105– 118, 2025, doi: 10.1038/s42254-024-00796-z.

M. Kumar and P. Pattnaik, “Post Quantum Cryptography(PQC) - An overview: (Invited Paper),” 2020 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1-9, 2020, doi: 10.1109/HPEC43674.2020.9286147.

D. Joseph, R. Misoczki, M. Manzano, J. Tricot, F. D. Pinuaga, O. Lacombe, S. Leichenauer, J. Hidary, P. Venables, and R. Hansen, “Transitioning organizations to post-quantum cryptography,” Nature, vol. 605, no. 7909, pp. 237–243, 2022, doi: 10.1038/s41586-022-04623-2.

A. Aydeger, E. Zeydan, A. K. Yadav, K. T. Hemachandra and M. Liyanage, “Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography,” 2024 15th International Conference on Network of the Future (NoF), pp. 195-203, 2024, doi: 10.1109/NoF62948.2024.10741441.

Z. Alzamli, K. Danach and M. Frikha, “Machine Learning Techniques in Service of COVID-19: Data Augmentation Based on Multi-Exposure Image FusionTowards Anomaly Prediction,” 2022 4th International Conference on Current Research in Engineering and Science Applications (ICCRESA), pp. 54-58, 2022, doi: 10.1109/ICCRESA57091.2022.10352482.

J. Choi and J. Lee, “Secure and scalable internet of things model using post-quantum macsec,” Applied Sciences, vol. 14, no. 10, 2024, doi: 10.3390/app14104215.

J. Jailton, T. Carvalho, J. Araujo, and R. Franc ´ es, “Relay positioning ˆ strategy for traffic data collection of multiple unmanned aerial vehicles using hybrid optimization systems: A fanet-based case study,” Wireless Communications and Mobile Computing, vol. 2017, no. 1, 2017, doi: 10.1155/2017/2865482.

V. Bhardwaj and N. Kaur, “An efficient routing protocol for FANET based on hybrid optimization algorithm,” 2020 International Conference on Intelligent Engineering and Management (ICIEM), pp. 252-255, 2020, doi: 10.1109/ICIEM48762.2020.9160327.

Downloads

Published

2025-02-26

Issue

Section

Articles