Moving Ad Hoc Networks—A Comparative Study
Abstract
:1. Introduction
2. Mobile Ad-Hoc Network (MANET)
- (a)
- Characteristics of MANET:
- Dynamic network topologies: The nodes can move freely and independently in any direction. The network topology may change randomly at any time (Figure 3).
- Multi-hop: Each node acts as a host and as a router in which the nodes are linked through wireless channels in the network. The message goes through multiple nodes from the sender to the receiver due to the bounded transmission radius.
- Limited battery power: Wireless has a finite bandwidth and the nodes have limited battery power. Therefore, power conservation is a substantial design optimization condition.
- Temporary and rapidly deployable: The network does not have any infrastructure (base station). In nature, this network is temporary. The nodes are rapidly deployable; for instance, when the nodes are in the transmission ring, they make an ad hoc network.
- Infrastructure-less, distributed, and self-organizing: There is no centralized control; due to unreliable links, MANET relies upon the collaboration of the participating nodes.
- Scalability: Because of the limitation of power and memory on the nodes, scalability is an issue when we consider a large network size.
- Low Bandwidth: This wireless network has a shorter transmission range than the fixed infrastructure network. Therefore, its communication is lower than wired communication due to the impact of fading, interference, noise, and multiple accesses.
- (b)
- Advantages and applications of MANET:
- It has more flexibility.
- It has better mobility.
- The network can be set up at any time.
- It is more economical.
- It can provide access to geographical position information and services.
- The local-level.
- The communication sector.
- The military battlefield.
- Personal area networks.
- Business associates.
- Information exchange when network infrastructure is destroyed, etc.
- (c)
- MANET routing protocols classification.
- Routing,
- Bandwidth-limited wireless range,
- Energy,
- Dynamic topology-induced changes in routes,
- Security threats,
- Mobility-induced packets may be lost,
- Limited battery life,
- Scalability problems,
- Routing overheating.
3. Vehicular Ad-Hoc Networks (VANET)
- (a)
- Architecture of VANETs.
- (b)
- Characteristics of VANETs.
- The topological structure of the nodes in a VANET changes rapidly, and the rapid mobility of vehicles determines the frequent changes of the topological structure in the onboard self-organizing network, which greatly shortens the survival time of the communication link between two vehicle nodes. The usual solution is to extend the lifetime of the link by increasing the transmission power, but the increase in the transmission power and the increase in the communication distance also reduce the throughput of the network.
- The rapidly changing topological structure makes it difficult to establish an accurate neighbor node list, and it becomes impractical for each node to obtain and maintain the global topological structure of the entire network. Therefore, the protocol based on the network’s topological structure is not suitable for the vehicle-mounted self-organizing network.
- High-speed vehicle driving brings rapid channel fading and a severe doppler effect. At the same time, the wireless channel quality is very unstable due to the influence of the road conditions, tall buildings, and trees around the road.
- Although the rapid movement of vehicle nodes poses serious challenges to the onboard self-organizing network because vehicles are always driving on the road, the movement of the vehicle nodes is regular, such that the topology changes of the nodes are regular and predictable.
- Vehicle self-organizing networks have abundant external auxiliary equipment. The vehicle-mounted Global Positioning System (GPS) can provide VANET with accurate timing and vehicle location information. The use of electronic maps brings convenience to the VANET networking and routing protocol design. Various functional sensors can be installed on the vehicle to collect the speed, acceleration, direction, and other status information of the vehicle node.
- The communication module in the general MANET is powered by a battery; as such energy saving becomes a key consideration in the protocol design process. In the on-vehicle ad hoc network, the vehicle itself provides power for various devices, which reduces the energy consumption and device volume requirements of the communication equipment.
- (c)
- Potential Applications of VANETs.
- Safety: For the reduction of injuries, saving lives, and the reduction of the number of accidents, VANET technologies are applied. These include collision warnings, accident warnings, lane departure warnings, obstacle detection, vehicle breakdown, work zone warnings, and so on.
- Periodic Messages: Information which is related to vehicles, such as position, speed, and direction, is to be known by the vehicles from another environment for decision-making, to try to avoid a hazardous situation occurring. Thus, the periodic messages are said to be an important message type that supports the decision that can be taken in safety applications; therefore, it might direct it to an unwanted consumption of bandwidth, especially in vast surroundings, to increase the probability of a storm problem occurring.
- Event-Driven Messages: These messages are only sent when a dangerous situation occurs. Otherwise, they will not be sent. Event-based messages are likely to take a higher priority. The main problem with these letters is the increased guarantee of message delivery to all known vehicles.
- Entertainment/Information Applications: One unsafe application, also known as an information/entertainment application, is to provide drivers with a comfortable ride by using traffic efficiency. Examples include explaining a restaurant menu and its prices, providing passengers with information to find the nearest gas station that provides information about the current weather conditions in a particular area, providing information about available parking spaces in the nearest parking lot, providing seamless access to internet service facilities while traveling, and providing games for online occupants, coupling/decapper tools, payment for parking, Electronic Toll Collection (ETC) and workshop communications.
- Traffic Efficiency: VANET technology can play an important role in improving flow efficiency and reducing flow congestion. Examples include electronic toll collection, traffic management, cooperative adaptive cruise control, and traffic jam-related information, etc.
- Driver Assistance: The provision of good communications and accurate data to vehicles for improving security, privacy, and safety [16] can be performed by VANET. Examples include parking information, digital road map downloading, automatic emergency calls, real-time traffic information, a navigation system and various warning information, etc [17,18].
- (d)
- Routing protocols used in VANET.
- The Non-Delay Tolerant Network (Non-DTN) protocol is the network without direct end-to-end paths and the reduction of connectivity.
- The Delay Tolerant Network (DTN) is routing using a greedy way to transmit packets.
- (e)
- VANET challenges include high node mobility, continuous changes in network topology, delicate data exchange, privacy, real-time, unlimited network size, potential help from infrastructure, time and the crucial impact of security. However, to achieve the purpose of the various applications related to our home network, we need to provide a large amount of communication bandwidth for vehicle traffic. The main challenges of V2V ad hoc are routing-related:
- There are many end-to-end delays and slow packet transmission.
- Security Frameworks: It needs a lightweight, extensible authentication framework, security, reliability, rapidity, and a lower cost of message exchange facilities.
- Quality of Service: Here, the issues are the connection time and the speed of the packet delivery.
- Broadcasting: In VANET, the content of broadcast messages mainly includes security messages and streaming media messages. How to effectively manage and transmit these two messages is a very important issue.
- Transport Layer Challenges: The congestion control mechanism is very poor because transmission errors are interpreted as congestion and reduce throughput. The main challenge for DSRC is channel congestion, especially BSM channel congestion.
- Network Layer Challenges: Given the rapid changes in the network topology caused by the high-speed movement of vehicles in VANET, the way in which to design an effective routing protocol has become a difficult problem for network layer research. The GSR protocol tries to overcome the shortcomings of the routing protocol using location information in MANET, which then applies to VANET. For example, the GPSR protocol in MANET is a greedy forwarding protocol that utilizes location information, but the disadvantage is that there will be a topology hole problem. The GSR protocol uses the static road map and the location information of each vehicle node to find the transmission path to the destination node, thereby overcoming the above problems. Like the GSR protocol, the SAR protocol uses road map information obtained by external devices to construct a “spatial model” for path finding, which can predict and avoid routing recovery problems caused by holes in the network topology. However, the disadvantage of the SAR protocol is that it does not know whether there are vehicles on the selected road to complete the forwarding task. The STAR protocol solves this problem by choosing to find a route along the road with vehicles. The A-STAR protocol uses urban bus lines as a strategy to find an efficient path for data transmission. The protocol is suitable for scenarios with dense urban traffic, and it assumes that bus vehicles cover major urban roads. Based on GSR and A-STAR, the GyTAR protocol fully considers factors such as vehicle driving directions, vehicle density, road multidirectional, and traffic environment changes, making the routing protocol more in line with actual traffic scenarios. Because the road conditions in real life are complicated and the driving conditions of vehicles are also ever-changing, the design of the routing protocol in VANET must be more in line with the actual scene. At present, designing an efficient routing protocol that can effectively find transmission paths in various scenarios is still a major challenge for network layer research.
- Other Challenges: These include the lack of centralized management entities and link-layer synchronization, the ideal connectivity to maintain high portability, the seamless switching of channels between Layer 2 and Layer 3, equal insurance on wires based on user acceptance of the appropriate safety level and personal cost, balanced vehicle safety standards, and parcels being lost when driving at high speed.
4. Flying Ad-Hoc Network (FANET)
- (a)
- Challenges in UAV Communications:
- Geographical and environmental constraints,
- Mobility of the node,
- Sufficient bandwidth availability and low latency,
- Synchronization between the UAVs swarms.
- (b)
- Advantages of using multi-UAV over single UAV:
- Cost: Many interviewees said that using drones to collect data is not difficult, but the real problem and challenge is how to use the massive amounts of data collected. At present, there are a lot of companies focusing on front-end data collection in the market, and the cost of pure data collection is getting lower and lower, but there are not many companies capable of back-end data processing and industry-combined applications, and the front and back ends are fighting each other. This leads end-users not only to ensure that the quantity and quality of data collection meet business needs but also to consider multi-party cooperation, thereby increasing a lot of the costs and communication barriers.
- Speed up: Different types of drones can be used in different scenarios based on their characteristics. For example, the advantages of fixed-wing UAVs are long battery life, fast cruising speeds and a strong load capacity, which can be applied to high-speed, heavy-load, large-scale, and long-distance mission types, such as aerial surveying and mapping. Rotary-wing UAVs are characterized by strong maneuverability and being capable of vertical take-off and landing and hovering. They are mainly suitable for mission types with low altitudes, low speeds, and vertical take-off and landing and hovering requirements, such as post-disaster search and rescue.
- Small radar: The radar cross-section of a multi-UAV system is very small, rather than a larger radar cross-section, which is very important for military applications.
- Mission completion time: With many drones, surveillance, reconnaissance, and search operations can be carried out quickly. If a single drone cannot perform the mission, the mission cannot successfully compete. However, in the multi-drone system, if the drone takes off, the mission can survive with other drones.
- (c)
- Characteristics of FANETs.
- Node Mobility: In FANET mobility, the degree is bigger than VANET and MANET, in which the UAV node has a speed of 30–460 km/h, which causes communication problems among the UAV nodes.
- Low node density with a large distance between the UAVS.
- The network topology changes frequently.
- power consumption and network lifetime.
- The radio propagation model.
- GPS provides the geospatial localization.
- Access to LoS ( Line-of-Sight).
- (d)
- Routing Protocols used in the FANET Network.
5. Sea Ad-Hoc Networks (SANET)
- (a)
- Terrestrial wireless communication.
- The Broadcasting of Maritime Safety Information.
- (b)
- Satellite wireless communication.
- (c)
- Distress signals:
- Inmarsat Ship Earth Station Radio Equipment.
- Inmarsat B, C, and F can send distress information from ships to land.
- 406 MHz satellite EPIRB.
- Distress alerts from the 406 MHz satellite EPIRB are relayed by the Cospas-Sirsat polar orbit orbiting satellite and notified to the rescue coordination headquarters via the land receiving station (LUT). The distress signal measures the position of the ship in distress.
- (d)
- Search and rescue information.
- (e)
- SANET applications.
- Disasters: The sea ad hoc network is helpful when natural disasters happen, such as oil barges capsizing, the sinking of the ship/boat, and the sinking of ferries carrying goods or people.
- Weather: SANET is helpful to predict tsunamis or to track the water movements, and it utilizes different sensors for this application
- SANET can be used for search operation and release processes.
- Military applications: SANET is very important for the exchange of information between headquarters and soldiers when they are in the ocean.
- (f)
- The challenges of SANET include:
- Quality of Service (QoS): The maintenance of the best quality of service for packet forwarding is very important because it involves certain requirements, delays, throughput, and the packet error rate connected with the application.
- Security: These requirements include rapidity, scalable authentication frameworks, and being lightweight, reliable, and secure. For information transfer, it is important to guarantee confidentiality and integrity.
- Scalability: The most important and necessary step toward the realization of effective ship communications is to guarantee a stable and scalable routing mechanism over SANETs. The routing paths are disrupted frequently due to varying ship mobility and network topologies, and it is very difficult to ensure their stability.
- Routing protocol: There are large end-to-end delays and reduced packet delivery ratio.
- Reliability: Because of the sensitive information we send, SANET must be very reliable.
- (g)
- Routing Protocols used in SANET.
- First, the source node sends routing requests to the neighboring nodes.
- After the surroundings receive the request, they will automatically form a virtual node. In this process, more than one node may receive the request, and these requested nodes are all unified virtual nodes.
- The virtual node continues to send the routing request. If the destination node cannot be reached, there will still be several nodes receiving the request, and these nodes form another virtual node.
- Step 3 is performed recursively until some of the nodes can deliver the message to the destination node, and these nodes form the last virtual node. At this time, the route between each virtual node has been determined.
- At this point, data is sent from the source node to the first virtual node. Currently, all of the nodes in the first virtual node receive the message and distribute the message to each node in the second virtual node, recursively. This process is carried out until the last virtual node sends the message to the destination node.
6. Comparison of MANET, VANET, FANET, and SANET (MVFS)
- Independence: Compared with conventional communication networks, the biggest difference from ad hoc networks is the ability to quickly set up mobile communication networks, anytime and anywhere, without the need for hardware support for the infrastructure network equipment. This organization is not dependent on existing telecom network equipment and has a degree of independence. This dedicated networking feature is great for disaster management, remote communications, and other applications.
- Structure: Ad hoc networks allow the mobile host to move freely within the network. The movement of the host will cause the link between the hosts to increase or disappear, and the connections among the hosts are constantly changing. The host may also be a router in an ad hoc network. Therefore, the movement will continuously change the network topology. For conventional networks, the network topology is relatively stable.
- Communication bandwidth: Wired infrastructure is not supported in ad hoc networks. However, communication between the stations is achieved via wireless transmission. Because of the physical characteristics of the wireless channel, the network bandwidth provided by the wireless channel is much smaller than the wired channel bandwidth. Furthermore, considering various factors such as collision, signal attenuation, and the noise interference caused by competing to share wireless channels, the actual available bandwidth of the mobile terminals is less than the maximum theoretical bandwidth value.
- Host energy: In an ad hoc network, the hosts are all mobile device nodes, for instance, PDAs, portable computers, or palmtop computers. Because the host may be in a state of non-stop movement, the energy of the host is mainly provided by the battery, such that the ad hoc network has the characteristic of limited energy.
- Distributed characteristics: Ad hoc networks do not have central control nodes, and hosts communicate with each other through distributed protocols. If one or more nodes on the network fail, the other nodes will continue to function properly.
- Life cycle: Wireless networks are mainly used to meet temporary communication needs. The survival times are generally short compared to those of wired networks.
- Physical security: Compared to fixed networks, mobile networks are generally more vulnerable to physical security attacks, and are vulnerable to eavesdropping, denial of service attacks, and spoofing. Some of the current connection security technologies are used on wireless networks to reduce security attacks. However, the natural distribution of the ad hoc network has a certain survivability compared to a centralized network.
7. Comparison of Short and Long-Distance Wireless Communication Technologies
- Short distance wireless transmission technology.
- Zig-Bee is a short-distance, low-power wireless communication technology based on the IEEE802.15.4 standard. Zig-Bee comes from the communication method of the bee colony. The bee (Bee) relies on flying and buzzing (Zig) to shake its wings to determine the direction, location, and distance of the food source with its companions. However, it is characterized by a short distance, and its usual transmission distance is 10–100 m. However, it requires low power consumption.
- Bluetooth can realize point-to-point or point-to-multipoint wireless data and sound transmission within a radius of 10 m, and its data transmission bandwidth can reach 1 Mbps. The communication medium is a frequency between 2.402 GHz and 2.480 GHz Electromagnetic waves.
- Ultra-wideband (UWB) is a non-carrier communication technology that uses nanosecond to picosecond non-sine wave narrow pulses to transmit data. The transmission distance is usually within 10 M, using a bandwidth above 1 GHz, and the communication speed can be up to several hundred megabits/s or more. UWB’s working frequency range ranges from 3.1 GHz to 10.6 GHz, and the minimum working bandwidth is 500 MHz.
- NFC is a new short-range wireless communication technology with a working frequency of 13.56 MHz. It was developed from 13.56 MHz radio frequency identification (RFID) technology. NFC uses Amplitude Shift Keying (ASK) modulation, and its data transmission rate is generally 106 kbit/s and 424 kbit/s. The main advantages of NFC are its short distance, high bandwidth, low energy consumption, compatibility with non-contact smart card technology, and broad application value in fields such as access control, public transportation, and mobile payment.
- 2.
- Long-distance wireless transmission technology.
- Digital radio communication is a wireless data transmission station that adopts digital signal processing, digital modulation and demodulation, forward error correction, equalization soft decision, and other functions. Most of the working frequencies of digital radio stations use the 220–240 MHz or 400–470 MHz frequency bands, which are compatible with data phones, and offer good real-time data transmission, dedicated data transmission channels, and one-time investment.
- A wireless network bridge is the product of the combination of wireless radio frequency technology and traditional wired network bridge technology. The wireless bridge is designed for point-to-point network interconnection using wireless technology for long-distance data transmission. It is a storage and forwarding device that realizes LAN interconnection at the link layer. It can be used for long-distance (up to 50 Km), high-speed (up to 100 Mbps) wireless networking between fixed digital devices and other fixed digital devices.
- Satellite communication systems usually consist of two parts, namely the satellite end and the ground end. The satellite end is in the air and is mainly used to amplify the signal sent by the ground station and then forward it to other ground stations. The ground station is mainly used to control and track the satellites, and to realize the connection of the ground communication system to the satellite communication system.
- Shortwave communication: According to the division of the International Radio Advisory Committee, “shortwave” refers to electromagnetic waves with a wavelength of 10 m–100 m and a frequency of 3 MHz–30 MHz. Shortwave communication refers to radio communication using short waves, also known as high frequency (HF) communication.
8. Simulation Tools for Ad Hoc Network
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Banerjee, S.; Ghosh, A.; Mahapatra, S.; Karmakar, R. Performance Survey of MANET Routing Protocols with TCP Congestion Control Algorithms. In Proceedings of the 2020 IEEE 1st International Conference for Convergence in Engineering (ICCE), Kolkata, India, 5–6 September 2020; pp. 433–438. [Google Scholar] [CrossRef]
- Abdel-Fattah, F.; Farhan, K.A.; Al-Tarawneh, F.H.; Altamimi, F. Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs. In Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9–11 April 2019; pp. 28–33. [Google Scholar] [CrossRef]
- Kariyannavar, S.S.; Thakur, S.; Maheshwari, A. Security in Mobile ADHOC Networks: Survey. In Proceedings of the 2021 6th International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 20–22 January 2021; pp. 135–143. [Google Scholar] [CrossRef]
- Al Mojamed, M. Integrating IP Mobility Management Protocols and MANET: A Survey. Future Internet 2020, 12, 150. [Google Scholar] [CrossRef]
- Kanellopoulos, D.; Sharma, V.K. Survey on Power-Aware Optimization Solutions for MANETs. Electronics 2020, 9, 1129. [Google Scholar] [CrossRef]
- Nadeem, A.; Howarth, M.P. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2027–2045. [Google Scholar] [CrossRef] [Green Version]
- Singh, S.K.; Prakash, J. Energy Efficiency and Load Balancing in MANET: A Survey. In Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Kondampatty, India, 6–7 March 2020; pp. 832–837. [Google Scholar] [CrossRef]
- Muruganandam, S.; Renjit, J.A.; Kumar, R.S. A Survey: Comparative study of security methods and trust manage solutions in MANET. In Proceedings of the 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 14–15 March 2019; Volume 1, pp. 125–131. [Google Scholar] [CrossRef]
- Boulaiche, M. Survey of Secure Routing Protocols for Wireless Ad Hoc Networks. Wirel. Pers. Commun. 2020, 114, 483–517. [Google Scholar] [CrossRef]
- Al-Absi, M.A.; Al-Absi, A.A.; Kim, T.; Lee, H.J. An environmental channel throughput and radio propagation modeling for vehicle-to-vehicle communication. Int. J. Distrib. Sens. Netw. 2018, 14, 1–10. [Google Scholar] [CrossRef]
- Mohammed, A.A.; Ahmed, A.A.; Hind, R.; Lee, H.J. A Novel Throughput and Collision for City Environment in V2V Communication. In Proceedings of the 10th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 16–18 October 2019; pp. 1413–1415. [Google Scholar]
- Mohammed, A.A.; Ahmed, A.A.; Lee, H.J. Comparison between DSRC and other Short-Range Wireless Communication Technologies. In Proceedings of the 2020 22nd International Conference on Advanced Communication Technology (ICACT) Phoenix Park, PyeongChang, Korea, 16–19 February 2020; pp. 1–5. [Google Scholar]
- Al-Absi, M.A.; Lee, H.J.; Al-Absi, A.A. A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication. Sensors 2020, 20, 1000. [Google Scholar] [CrossRef] [Green Version]
- Al-Absi, A.A.; Al-Absi, M.A.; Sain, M.; Lee, H.J. Channel Allocation for Connected Vehicles in Internet of Things Services. Sensors 2021, 21, 3646. [Google Scholar] [CrossRef]
- Han, Z.; Swindlehurst, A.L.; Liu, K.J.R. Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles. IEEE Trans. Veh. Technol. 2009, 58, 3533–3546. [Google Scholar] [CrossRef]
- Mejri, M.N.; Ben-Othman, J.; Hamdi, M. Survey on VANET security challenges and possible cryptographic solutions. Veh. Commun. 2014, 1, 53–66. [Google Scholar] [CrossRef]
- Manvi, S.S.; Tangade, S. A survey on authentication schemes in VANETs for secured communication. Veh. Commun. 2017, 9, 19–30. [Google Scholar] [CrossRef]
- Muhammad, M.; Safdar, G.A. Survey on existing authentication issues for cellular-assisted V2X communication. Veh. Commun. 2018, 12, 50–65. [Google Scholar] [CrossRef]
- Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Ali, G.G.M.N.; Pesch, D.; Xiao, P. A survey on resource allocation in vehicular networks. IEEE Trans. Intell. Transp. Syst. 2020, 1–21. [Google Scholar] [CrossRef]
- Nazib, R.A.; Moh, S. Reinforcement Learning-Based Routing Protocols for Vehicular Ad Hoc Networks: A Comparative Survey. IEEE Access 2021, 9, 27552–27587. [Google Scholar] [CrossRef]
- Malhi, A.K.; Batra, S.; Pannu, H.S. Security of vehicular ad-hoc networks: A comprehensive survey. Comput. Secur. 2020, 89, 101664. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks. IEEE Sens. J. 2021, 21, 2422–2433. [Google Scholar] [CrossRef]
- Hussain, R.; Lee, J.; Zeadally, S. Trust in VANET: A Survey of Current Solutions and Future Research Opportunities. IEEE Trans. Intell. Transp. Syst. 2021, 22, 2553–2571. [Google Scholar] [CrossRef]
- Farooq, S.M.; Hussain, S.M.S.; Ustun, T.S. Survey of Authentication Techniques in Vehicular Ad-hoc Networks (VANETs). IEEE Intell. Transp. Syst. Mag. 2020. [Google Scholar] [CrossRef]
- Al-Heety, O.S.; Zakaria, Z.; Ismail, M.; Shakir, M.M.; Alani, S.; Alsariera, H. A Comprehensive Survey: Benefits, Services, Recent Works, Challenges, Security, and Use Cases for SDN-VANET. IEEE Access 2020, 8, 91028–91047. [Google Scholar] [CrossRef]
- Raza, S.; Wang, S.; Ahmed, M.; Anwar, M.R. A survey on vehicular edge computing: Architecture, applications, technical issues, and future directions. Wirel. Commun. Mob. Comput. 2019, 2019, 1–19. [Google Scholar] [CrossRef]
- Azam, F.; Yadav, S.K.; Priyadarshi, N.; Padmanaban, S.; Bansal, R.C. A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network. IEEE Access 2021, 9, 31309–31321. [Google Scholar] [CrossRef]
- Sheikh, M.S.; Liang, J.; Wang, W. A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs). Sensors 2019, 19, 3589. [Google Scholar] [CrossRef] [Green Version]
- Arif, M.; Wang, G.; Alam Bhuiyan, Z.; Wang, T.; Chen, J. A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 2019, 19, 100179. [Google Scholar] [CrossRef]
- Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2019, 20, 760–776. [Google Scholar] [CrossRef]
- Khan, U.A.; Lee, S.S. Multi-Layer Problems and Solutions in VANETs: A Review. Electronics 2019, 8, 204. [Google Scholar] [CrossRef] [Green Version]
- Pu, C. Jamming-Resilient Multipath Routing Protocol for Flying Ad Hoc Networks. IEEE Access 2018, 6, 68472–68486. [Google Scholar] [CrossRef]
- Miya, T.; Ohshima, K.; Kitaguchi, Y.; Yamaoka, K. Experimental Analysis of Communication Relaying Delay in Low-Energy Ad-hoc Networks. arXiv 2020, arXiv:2010.15572. [Google Scholar]
- Yaacoub, J.P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 1–39. [Google Scholar] [CrossRef]
- Boccadoro, P.; Striccoli, D.; Grieco, L.A. Internet of Drones: A Survey on Communications, Technologies, Protocols, Architectures and Services. arXiv 2020, arXiv:2007.12611. [Google Scholar]
- Motlagh, N.H.; Taleb, T.; Arouk, O. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives. IEEE Internet Things J. 2016, 3, 899–922. [Google Scholar] [CrossRef]
- Altawy, R.; Youssef, A.M. Security privacy and safety aspects of civilian drones: A survey. ACM Trans. Cyber-Phys. Syst. 2016, 1, 7. [Google Scholar] [CrossRef]
- Nassi, B.; Shabtai, A.; Masuoka, R.; Elovici, Y. SoK—Security and privacy in the age of drones: Threats challenges solution mechanisms and scientific gaps. arXiv 2019, arXiv:1903.05155. [Google Scholar]
- Ritchie, M.; Fioranelli, F.; Borrion, H. Micro UAV crime prevention: Can we help Princess Leia? In Preventing Crime in the 21st Century; Springer: Cham, Swizerland, 2017; pp. 359–376. [Google Scholar]
- Eshel, T. Mobile Radar Optimized to Detect Uavs, Precision Guided Weapons. Def. Update. 8 February 2013. Available online: https://defense-update.com/20130208_mobile-radar-optimized-to-detect-uavs-precision-guided-weapons.html (accessed on 10 November 2020).
- Jiang, Z.J.; Cheng, X.G.; Peng, Y.Q. Research on UAV identification algorithm based on deeplearning. App. Elec. Tech. 2017, 43, 84–87. [Google Scholar]
- Zhao, J.; Fu, X.; Yang, Z.; Xu, F. Radar-Assisted UAV Detection and Identification Based on 5G in the Internet of Things. Wirel. Commun. Mob. Comput. 2019, 2019, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Amponis, G.; Lagkas, T.; Sarigiannidis, P.; Vitsas, V.; Fouliras, P. Inter-UAV Routing Scheme Testbeds. Drones 2020, 5, 2. [Google Scholar] [CrossRef]
- Nikitas, A.; Michalakopoulou, K.; Njoya, E.T.; Karampatzakis, D. Artificial Intelligence, Transport and the Smart City: Definitions and Dimensions of a New Mobility Era. Sustainability 2020, 12, 2789. [Google Scholar] [CrossRef] [Green Version]
- Erdelj, M.; Natalizio, E.; Chowdhury, K.R.; Akyildiz, I.F. Help from the Sky: Leveraging UAVs for Disaster Management. IEEE Pervasive Comput. 2017, 16, 24–32. [Google Scholar] [CrossRef]
- ANCHORS Project. Available online: http://anchorsproject.org/index.php/en/home/14-das-projekt-im-ueherhlick17-projectoverview.htm! (accessed on 2 February 2016).
- Khan, M.F.; Yau, K.-L.A.; Noor, R.M.; Imran, M.A. Routing Schemes in FANETs: A Survey. Sensors 2019, 20, 38. [Google Scholar] [CrossRef] [Green Version]
- Nawaz, H.; Ali, H.M.; Laghari, A.A. UAV Communication Networks Issues: A Review. Arch. Comput. Methods Eng. 2021, 28, 1349–1369. [Google Scholar] [CrossRef]
- Lakew, D.S.; Sa’Ad, U.; Dao, N.-N.; Na, W.; Cho, S. Routing in Flying Ad Hoc Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1071–1120. [Google Scholar] [CrossRef]
- Kaushik, P. FANET Routing Protocols: Review. Int. J. Adv. Res. Dev. 2018, 3. Available online: www.IJARnD.com (accessed on 10 May 2020).
- Oubbati, O.S.; Atiquzzaman, M.; Lorenz, P.; Tareque, H.; Hossian, S. Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives. IEEE Access 2019, 7, 81057–81105. [Google Scholar] [CrossRef]
- Hong, J.; Zhang, D.H. TARCS: A Topology Change Aware-Based Routing Protocol Choosing Scheme of FANETs. Electronics 2019, 8, 274. [Google Scholar] [CrossRef] [Green Version]
- Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garciarodriguez, A.; Yuan, J. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef] [Green Version]
- Pu, C. Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks. In Proceedings of the MILCOM 2019—2019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA, 12–14 November 2019; pp. 490–495. [Google Scholar]
- Yin, C.; Xiao, Z.; Cao, X.; Xi, X.; Yang, P.; Wu, D. Enhanced routing protocol for fast flying UAV network. In Proceedings of the 2016 IEEE International Conference on Communication Systems (ICCS), Shenzhen, China, 14–16 December 2016; pp. 1–6. [Google Scholar]
- Arafat, M.Y.; Moh, S. Location-Aided Delay Tolerant Routing Protocol in UAV Networks for Post-Disaster Operation. IEEE Access 2018, 6, 59891–59906. [Google Scholar] [CrossRef]
- Pu, C. Aware routing for UAV ad hoc networks. In Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, 18–20 October 2018; pp. 71–79. [Google Scholar]
- Zheng, Y.; Jiang, Y.; Dong, L.; Wang, Y.; Li, Z.; Zhang, H. A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks. In Proceedings of the 2014 International Conference on Information and Communications Technologies (ICT 2014), Nanjing, China, 15–17 May 2014; pp. 1–7. [Google Scholar]
- Rosati, S.; Kruzelecki, K.; Traynard, L.; Rimoldi, B. Speed-aware routing for UAV ad-hoc networks. In Proceedings of the 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GA, USA, 9–13 December 2013; pp. 1367–1373. [Google Scholar]
- Silva, T.D.; De Melo, C.F.E.; Cumino, P.; Rosario, D.; Cerqueira, E.; De Freitas, E.P. STFANET: SDN-Based Topology Management for Flying Ad Hoc Network. IEEE Access 2019, 7, 173499–173514. [Google Scholar] [CrossRef]
- Wang, F.; Chen, Z.; Zhang, J.; Zhou, C.; Yue, W. Greedy Forwarding and Limited Flooding based Routing Protocol for UAV Flying Ad-Hoc networks. In Proceedings of the 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, 12–14 July 2019; pp. 1–4. [Google Scholar]
- Gankhuyag, G.; Shrestha, A.P.; Yoo, S.-J. Robust and Reliable Predictive Routing Strategy for Flying Ad-Hoc Networks. IEEE Access 2017, 5, 643–654. [Google Scholar] [CrossRef]
- Toorchi, N.; Hu, F.; Bentley, E.S.; Kumar, S. Skeleton-Based Swarm Routing (SSR): Intelligent Smooth Routing for Dynamic UAV Networks. IEEE Access 2021, 9, 1286–1303. [Google Scholar] [CrossRef]
- Arafat, M.Y.; Poudel, S.; Moh, S. Medium Access Control Protocols for Flying Ad Hoc Networks: A Review. IEEE Sens. J. 2021, 21, 4097–4121. [Google Scholar] [CrossRef]
- Chaker, B.M.; Amine, R.M.; Aimad, A. A summary of the existing challenges in the design of a routing protocol in UAVs network. In Proceedings of the 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH), Boumerdès, Algeria, 9–10 February 2021; pp. 59–64. [Google Scholar] [CrossRef]
- Sang, Q.; Wu, H.; Xing, L.; Xie, P. Review and Comparison of Emerging Routing Protocols in Flying Ad Hoc Networks. Symmetry 2020, 12, 971. [Google Scholar] [CrossRef]
- Yahuza, M.; Idris, M.Y.I.; Bin Ahmedy, I.; Wahab, A.W.B.A.; Nandy, T.; Noor, N.M.; Bala, A. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges. IEEE Access 2021, 9, 57243–57270. [Google Scholar] [CrossRef]
- Chamola, V.; Kotesh, P.; Agarwal, A.; Gupta, N.; Guizani, M. A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques. Ad Hoc Netw. 2021, 111, 102324. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sahu, N.; Guizani, M. Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 2020, 23, 100249. [Google Scholar] [CrossRef]
- Li, Y.; Wang, S.; Jin, C.; Zhang, Y.; Jiang, T. A Survey of Underwater Magnetic Induction Communications: Fundamental Issues, Recent Advances, and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2466–2487. [Google Scholar] [CrossRef]
- Luo, J.; Chen, Y.; Wu, M.; Yang, Y. A Survey of Routing Protocols for Underwater Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2021, 23, 137–160. [Google Scholar] [CrossRef]
- Wang, M.M.; Zhang, J.; You, X. Machine-Type Communication for Maritime Internet of Things: A Design. IEEE Commun. Surv. Tutor. 2020, 22, 2550–2585. [Google Scholar] [CrossRef]
- Ohki, T.; Nakatani, T.; Nishida, Y.; Thornton, B. Unmanned Seafloor Survey System Without Support Vessel and its Recent Operations in Sea Trials. In Proceedings of the 2019 IEEE Underwater Technology (UT), Kaohsiung, Taiwan, 16–19 April 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Hashmani, M.A.; Umair, M.; Rizvi, S.S.H.; Gilal, A.R. A Survey on Edge Detection based recent Marine Horizon Line Detection Methods and their Applications. In Proceedings of the 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 29–30 January 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Karimi, H.R.; Lu, Y. Guidance and control methodologies for marine vehicles: A survey. Control Eng. Pract. 2021, 111, 104785. [Google Scholar] [CrossRef]
- Jouhari, M.; Ibrahimi, K.; Tembine, H.; Ben-Othman, J. Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things. IEEE Access 2019, 7, 96879–96899. [Google Scholar] [CrossRef]
- Fattah, S.; Gani, A.; Ahmedy, I.; Idris, M.Y.I.; Hashem, I.A.T. A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges. Sensors 2020, 20, 5393. [Google Scholar] [CrossRef] [PubMed]
- Jiang, L.; Ke, S.Q.; Zhang, L. Research on Key Technologies of Topology Control in Mobile Predictive Ad Hoc Networks. In Proceedings of the 2020 International Conference on Wireless Communications and Smart Grid (ICWCSG), Qingdao, China, 12–14 June 2020; pp. 190–194. [Google Scholar] [CrossRef]
- Yanmaz, E.; Kuschnig, R.; Bettstetter, C. Channel measurements over 802.11a-based UAV-to-ground links. In Proceedings of the 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, 5–9 December 2011; pp. 1280–1284. [Google Scholar] [CrossRef]
- Clapper, J.; Young, J.; Cartwright, J.; Grimes, J. Unmanned Systems Roadmap 2007–2032; Tech. Rep.; United States. Department of Defense: Arlington, VA, USA, 2007. [Google Scholar]
- Al-Absi, M.A.; Al-Absi, A.A.; Lee, H.J. V2V communication modeling for environmental channel throughput and radio propagation. In Proceedings of the 8th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 18–20 October 2017; pp. 507–512. [Google Scholar]
- Al-Absi, M.A.; Al-Absi, A.A.; Kang, Y.J.; Lee, H.J. Obstacles Effects on Signal Attenuation in Line of Sight for Different Environments in V2V. In Proceedings of the 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon-si, Korea, 11–14 February 2018; pp. 17–20. [Google Scholar]
- Al-Absi, M.A.; Al-Absi, A.A.; Lee, H.J. Performance Analysis for City, Highway, and Rural Area in Vehicle-to-Vehicle Network. In Proceedings of the 8th IEEE International Conference on ICTC Convergence, Jeju Island, Korea, 17–19 October 2018. [Google Scholar]
- Anderson, B.; Fidan, B.; Yu, C.; Walle, D. UAV formation control: Theory and application. In Recent Advances in Learning and Control; Blondel, V., Boyd, S., Kimura, H., Eds.; Lecture Notes in Control and Information Sciences; Springer: Berlin/Heidelberg, Germany, 2008; Volume 371, pp. 15–33. [Google Scholar]
- Al-Absi, M.A.; Kamolov, A.; Al-Absi, A.A.; Sain, M.; Lee, H.J. IoT Technology with Marine Environment Protection and Monitoring. In Proceedings of the International Conference on Smart Computing and Cyber Security, SMARTCYBER 2020, Lecture Notes in Networks and Systems, Goseong, Korea, 23–24 April 2020; Volume 149. [Google Scholar]
- Al-Absi, M.A.; Kamolov, A.; Al-Absi, A.A.; Lee, H.J. Secure Marine Communication Under Distributed Slotted MAC. In Proceedings of the International Conference on Smart Computing and Cyber Security, SMARTCYBER 2020, Lecture Notes in Networks and Systems, Goseong, Korea, 23–24 April 2020; Volume 149. [Google Scholar]
- Kamolov, A.A.; Park, S. Prediction of Depth of Seawater Using Fuzzy C-Means Clustering Algorithm of Crowdsourced SONAR Data. Sustainability 2021, 13, 5823. [Google Scholar] [CrossRef]
- Kamolov, A.; Park, S. An IoT-Based Ship Berthing Method Using a Set of Ultrasonic Sensors. Sensors 2019, 19, 5181. [Google Scholar] [CrossRef] [Green Version]
- Raw, R.S.; Lobiyal, D.K.; Das, S. An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. Commun. Comput. Inform. Sci. 2012, 335, 147–156. [Google Scholar]
- Misra, S.; Xue, G.; Bhardwaj, S. Secure and Robust Localization in a Wireless Ad Hoc Environment. IEEE Trans. Veh. Technol. 2008, 58, 1480–1489. [Google Scholar] [CrossRef]
- Wang, J.; Ghosh, R.K.; Das, S.K. A survey on sensor localization. J. Control Theory Appl. 2010, 8, 2–11. [Google Scholar] [CrossRef]
- Ahn, H.-S.; Won, C.-H. DGPS/IMU integration-based geolocation system: Airborne experimental test results. Aerosp. Sci. Technol. 2009, 13, 316–324. [Google Scholar] [CrossRef]
- Wong, A.K.-S.; Woo, T.K.; Lee, A.T.-L.; Xiao, X.; Luk, V.W.-H.; Cheng, K.W. An AGPS-based elderly tracking system. In Proceedings of the 2009 First International Conference on Ubiquitous and Future Networks, Hong Kong, China, 7–9 June 2009. [Google Scholar]
- Official U.S. Government Information about the Global Positioning System (GPS) and Related Topics 2006. Available online: https://www.gps.gov/applications/marine/ (accessed on 27 December 2020).
Reference | Major Contribution | Year | |
---|---|---|---|
MANET | [1] | A survey on the performance of different routing protocols under Transmission Control Protocol (TCP) congestion control algorithms in MANET. | 2020 |
[2] | A survey on different types of attacks and security issues to MANET layers, MANET topology | 2019 | |
[3] | A survey summarizes existing excellent research to defog uncertainties regarding the practical implementation of MANETs | 2021 | |
[4] | A survey of the use of mobility management systems analyzes the existing integrating of MANET with the internet. | 2020 | |
[5] | A Survey on Power-Aware Optimization Solutions and design challenges for MANETs | 2020 | |
[6] | A survey of the main types of attack at the network layer, protection mechanisms, detection algorithms in MANET | 2013 | |
[7] | A survey of various techniques to solve the problem of energy efficiency and load balancing in MANET. | 2020 | |
[8] | Comparative survey of security issues of MANET and the various methods, and prevent major attacks in MANET | 2019 | |
[9] | Survey of Secure Routing Protocols for Wireless Ad Hoc Networks | 2020 |
Reference | Major Contribution | Year | |
---|---|---|---|
VANET | [19] | A comprehensive overview of the resource allocation approach for VANETs, as well as challenges and opportunities. | 2021 |
[20] | A Comparative Survey of Reinforcement Learning-based VANET routing algorithms | 2021 | |
[21] | A comprehensive survey in the security of vehicular ad hoc networks, trust management, arracks, and security mechanisms. | 2020 | |
[22] | A comprehensive Survey of Privacy Schemes and Authentication to different types of attacks in vehicular ad hoc Networks | 2020 | |
[23] | A Survey of the inadequacies of existing trust and weaknesses establishment, management mechanisms, and some future challenges for trustworthy communication in VANET | 2020 | |
[24] | A survey on the different authentication mechanisms and possible security attacks in VANETs | 2020 | |
[25] | Exhaustive review based on wireless communication, Benefits, Recent Works, Security, Services, Challenges, and Use Cases for SDN-VANET | 2020 | |
[26] | A survey of vehicular edge computing for architecture, mobility, applications, and research directions | 2019 | |
[27] | Authentication schemes, privacy, security, architecture, and open challenges, in VANET | 2021 | |
[28] | A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks | 2019 | |
[29] | Communication, security and privacy, applications, and challenges in VANET | 2019 | |
[30] | Architecture, security classification and solutions, challenges, and various simulators in VANET | 2019 | |
[31] | A survey on Multi-Layer Problems and Solutions in VANETs | 2019 |
Feature | Multi-UAV | Single-UAV |
---|---|---|
Scalability | High | Limited |
Antenna | Directional | Omni-directional |
mission speed | Fast | Slow |
Required bandwidth | Medium | High |
Control complexity | High | Low |
Failure effect | System can reconfigure | Mission fails |
Topology | Direct, and simple connection | Complex topology |
Survivability | High | Poor |
Heterogeneous configuration | Applicable | Inapplicable |
Coverage area | Large | Small |
Reference | Routing Protocols | Routing Category | Metrics | Load Balancing | Communication Overhead | Computational Complexity |
---|---|---|---|---|---|---|
[54] | Stochastic Packet Algorithm (SPA) | Stochastic Forward | Link throughput, Link expiration information | No | Low | Low |
[55] | Fountain-code based Greedy Queue and Position Assisted (FGQPA) | Store–carry–forward (SCF) | Queue backlog, Position information | Yes | High | High |
[56] | Location-Aided Delay Tolerant Routing (LADTR) | Geographic, Store–carry–forward (SCF) | Position Information | No | Low | High |
[57] | Link-quality and Traffic-load Aware Optimized Link-State Routing (LTA-OLSR) | Proactive | Link quality, Traffic load | Yes | High | High |
[58] | Mobility and Load Optimized Link-State Routing (ML-OLSR) | Proactive | Stability degree of node, butter load | Yes | High | High |
[59] | Predictive OLSR (P-OLSR) | Proactive | Relative speed- weighted ETX | No | High | High |
[60] | SDN-based UAV communication for routing and topology management of flying ad hoc networks (STFANET) | Centralized SDN | Length of each link. | No | High | High |
[61] | Particle Swarm Optimization—Greedy and Limited Flooding Routing (PSO-GLFR) | Geographic, Reactive | Distance, # neighbors, the Deflection angle | No | Low | High |
[62] | Reliable and Predictive Routing Protocol (RARP) | Reactive | Hop, Failure prob., Connection time. | No | High | Low |
Reference | Major Contribution | Year | |
---|---|---|---|
FANET | [64] | Investigates the existing MAC protocols for FANET, open issues, and research challenges discussed and summarized | 2021 |
[65] | A summary of the existing challenges in the design of a routing protocol in a UAV network | 2021 | |
[66] | A survey on the state-of-the-art routing protocols proposed in recent years, propose some unsolved problems for FANET routing | 2020 | |
[67] | The recent trends in the security and privacy issues that affect the Internet of Drones, and open challenges. | 2021 | |
[68] | A comprehensive survey of the limited research work of routing schemes in FANETs. Different aspects, including objectives, challenges, routing metrics, characteristics, and performance measures. | 2020 | |
[68] | A literature review of UAVs, discuss the different types of UAVs, case studies, and military UAV incidents. | 2021 | |
[69] | Review various applications of blockchain in UAV networks and discuss various challenges | 2020 | |
[51] | A comprehensive survey presented the architecture, the mobility models, the constraints, the routing techniques, future challenge perspectives, and the simulation tools for FANETs. | 2019 |
Sear Area | Device | Communication Coverage | Technology |
---|---|---|---|
Sea Area A1 | (20–30 nautical miles) | VHF-MF/DSC | |
Sea Area A2 | (400 nautical miles) | MF/DSC | |
Sea Area A3 | North latitude 70 degrees-South Latitude 70 degree | INMARSAT/HF | |
Sea Area A4 | Worldwide | EPIRB/HF |
System | Advantage | Disadvantage |
---|---|---|
Maritime wireless communications | MF/HF, Medium/long distance, free of charge VHF, Visual range, free of charge | Narrow band access, low stability |
Marine satellite communications | Wide area coverage, broadband access | High cost of equipment, high monthly fee |
Shore-based mobile communications | Broadband access | Near shore coverage, charging by service time and amount of data |
Reference | Major Contribution | Year | |
---|---|---|---|
SANET | [70] | Survey of the existing research on underwater Marine communications, reliability guarantee, classified as the four topics of channel modeling, range extension, and capacity enhancement in SANET | 2019 |
[71] | The survey paper summarizes the underwater routing protocols proposed in recent years, the performance of different underwater routing protocols, and research challenges in SANET | 2021 | |
[72] | A survey on interoperability, simplicity, and scalability for maritime services and IoT applications in SANET | 2020 | |
[73] | Unmanned survey systems that consist of autonomous underwater vehicles, transporting AUVs roles between a survey site and shore base, and communication relaying between ground-based mission control and the AUVs. | 2019 | |
[74] | comprehensive overview of edge detection based on recent marine horizon line detection, and challenging problem in SANET | 2020 | |
[75] | A survey on marine vehicles with the guidance and control methodologies in SANET | 2021 | |
[76] | Review in most used technologies for underwater networking, a trade-off between underwater properties, wireless communication technologies, and communication quality in SANET. | 2019 | |
[77] | A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges in SAMET | 2020 |
Mobile Ad-Hoc Network (MANETs) | Vehicular Ad-Hoc Networks (VANETs) | Flying Ad-Hoc Networks (FANETs) | Ship Ad-Hoc Networks (SANETs) | |
---|---|---|---|---|
Topology Change | Topology alters low | Topology alters fast | Topology alters is rapid and very fast | Topology alters medium |
Radio Propagation | The radio propagation typical close to the ground | The radio propagation typical close to the ground | The radio propagation typical, not close to the ground | The radio propagation typical close to the ground |
Power consumes | Power consumes low | Power consumes high | Power consumption is high for mini-UAV/Small UAV not needed. | Power consumes high |
Power Computational | Limited | High | High | High |
Mobility | Node/device mobility is low | Node/device mobility is high | Node/device mobility is very high | Node/device mobility isMedium |
Mobility Model | The mobility model is random | The mobility model is regular | The mobility model is regular under the condition | The mobility model is random |
Line of Sight | Not available for all cases | available in some cases | Available in most cases | available in some cases |
Security |
|
|
|
|
Localization | GPS | DGPS, GPS, AGPS | IMU, GPS, AGPS, and DGPS | GPS, DGPS |
Density | Low | High | Very Low | High |
Number of Nodes | High | Hight | Low | Low |
Update topology | Not Often | Often | Often | Not Often |
Routing Protocol | Proactive
| Proactive
| Proactive
| Proactive
|
Simulator | OMNET++, NS-2, NS-3, GloMoSim, OPNET, QualNet | OMNET++, NS-2, NS-3, GloMoSim, OPNET, QualNet, SIMITS, MATLAB | OMNET++, NS-2, NS-3, GloMoSim, OPNET, QualNet, MATLAB | OMNET++, NS-2, NS-3, GloMoSim, OPNET, QualNet, MATLAB |
DSRC-ETC | DSRC-IVC | WLAN | IR | WiMAX | GSM/GPRS | UMTS | |
---|---|---|---|---|---|---|---|
Technical standard | IEEE 802.11p | IEEE 802.11a/b/g | ISO 21214 | IEEE 802.16 | GSM | 3GPP | |
Antenna type (MHz) | Roof antenna | Roof antenna | Roof antenna | Directional antenna | Smart Antenna (MIMO) | Roof antenna | Roof antenna |
Spectrum range (MHz) | 5795~5815 (early: 902~928) | Europe: 5855~5925 United States: 5850~5925 Japan: 5770~5850 | 11a: 5 GHz (UNII) 11 b/g: 2.4 GHz (ISM) | 800~1000 nm | 2~66 GHz can be User choice | Europe: 900/1800 United States: 850/1900 | Europe: 900/2100 United States: 850/1700/1900 |
Channel bandwidth | 4 × 5 MHz or 2 × 10 MHz | Control channel: 1 × 10 MHz Service channel: 6 × 10 MHz | 20 MHz | 4 independent channels | - | 124 × 200 kHz 8-time slots/carrier frequency | 5 MHz |
Equivalent omnidirectional Radiated power | ≤33 dBm | Roadside node: ≤44.8 dBm Vehicle node: ≤33 dBm | 17 dBm/MHz ≤30 dBm | - | Depending on the frequency range used | (MS) ≤ 2 W(850/900) ≤1 W(1800/1900) | Power Control |
Data rate (kbps) | Downstream: 500 Upstream: 250 | 3000~27,000 Typical rate: 6000 | 802.11 a/g: ≤54,000 802.11 b: ≤11,000 | 1000~2000 | ≤70,000 Typical rate: 10,000 | (GPRS) Downstream: 60~80 Upstream: 20~40 | Car environment: 384 |
Communication distance(m) | 3~15 | ≤1000 | Access point Coverage | 1~100 Typical distance: 7 | Access point Coverage Maximum: 50 km | Base station Coverage Maximum: 35 km | Dependent on base station coverage maximum: 2 km |
Connection establishment time(ms) | 5~12 | Self-organizing | - | 10 | Connection delay Support for handoff | Network access time: 10 s Support for handoff | Network access time: 2.12 s Support for handoff |
System response time(ms) | 10 | Depending on the specific implementation | Depending on the specific implementation | 10 | Depending on the specific implementation | 500~700 | 200~300 |
Channel access mechanism | TDMA | EDCA (~802.11 e) | CSMA | TDMA | OFDMA | TDMA | CDMA |
Priority or QoS support | No priority QoS support | 4 service levels No real-time support | Priority support No QoS/RT support | CALM~IR support 8 Different priorities | QoS depends on it Distance to AP | No QoS support | QoS depends on it Distance to BS |
Communication mode | Directional duplex asymmetry Broadcast, no P2P | Omnidirectional duplex symmetry Broadcast/unicast/multicast | Omnidirectional duplex symmetry Broadcast, no P2P | Directional duplex symmetry Broadcast/unicast/multicast | Omnidirectional duplex asymmetry Limited broadcast, no P2P | Omnidirectional duplex asymmetry No broadcast, no P2P | Omnidirectional duplex asymmetry Limited broadcast, no P2P |
system requirement | Roadside equipment | GPS (but not mandatory) | Access point device | Line-of-sight directional antenna | Access point device | Base station equipment | Base station equipment |
Main source of interference | DSRC-IVC | DSRC-ETC WLAN 5 GHz | DSRC-IVC | Visible light, rain, snow | Depends on use Frequency range | Reserved frequency band | Reserved frequency band |
Simulator | Open-Source | Free | Language | Features | Website |
---|---|---|---|---|---|
OMNET++ | Yes | Yes | NED/C++ | Wired, Wireless ad hoc, routing traffic in the network, easy debugging, and traceability of simulation models, turn off the graphical user interface altogether, and run the simulation as a pure command-line program | http://www.omnetpp.org, (accessed on 3 December 2020) |
NS-2 | Yes | Yes | OTCL/C++ | Wired, TCP, wireless ad hoc, AODV, DSR, DSDV, satellite, UDP | https://www.isi.edu/nsnam/ns/, (accessed on 17 December 2020) |
NS-3 | Yes | Yes | C++/Python | IP and Non-IP based network Wired, Wireless ad hoc, OSLR, WSN, IPv6, AODV, DSR, IPv4, DSDV | https://www.nsnam.org/, (accessed on 4 January 2021) |
GloMoSim | Yes | Yes | C/PABSEC | Wireless, WSN, ad hoc, distributed Bellman-Ford, Flooding, Fisheye, DSR, DSDV, WRP, LAR, NS-DSDV, DREAM, MMWN | http://en.pudn.com/Download/item/id/1137018.html, (accessed on 8 January 2021) |
OPNET | No | No | C++ | Wireless ad hoc, Cellular, WLAN, Satellite, IPv6, TCP, VoIP, OSPF, grid computing, ad hoc networks | https://opnetprojects.com/opnet-network-simulator/, (accessed on15 January 2021) |
SUMO | Yes | Yes | C++ | Wired, wireless ad hoc, Vehicle speed, Vehicle insertion, Vehicle permissions (access restrictions), Intersection dynamics, Randomness, Routing and Re-routing, Sublane Model, Opposite Direction Driving, Safety, Mesoscopic model, Lengths and Distances | https://sumo.dlr.de/docs/index.html, (accessed on 21 February 2021) |
QualNet | No | No | PABSEC | MANET, Wired, Cellular, Satellite, Models in parallel environments can improve speed and scalability, support multiple parallel computing environments, the protocol model is pre-optimized, Designed from the beginning as a tool with parallel processing capabilities. | https://www.scalable-networks.com/products/qualnet-network-simulation-software-tool/, (accessed on 28 February 2021) |
SIMITS | Yes | Yes | C# | Communications simulator in the field of Intelligent Transportation Systems (ITS). It can simulate and measure the performance of different medium access control mechanisms (MAC), including the following: Slotted aloha, RR-Aloha | https://github.com/neur0nid/SIMITS, (accessed on 25 March 2021) |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Absi, M.A.; Al-Absi, A.A.; Sain, M.; Lee, H. Moving Ad Hoc Networks—A Comparative Study. Sustainability 2021, 13, 6187. https://doi.org/10.3390/su13116187
Al-Absi MA, Al-Absi AA, Sain M, Lee H. Moving Ad Hoc Networks—A Comparative Study. Sustainability. 2021; 13(11):6187. https://doi.org/10.3390/su13116187
Chicago/Turabian StyleAl-Absi, Mohammed Abdulhakim, Ahmed Abdulhakim Al-Absi, Mangal Sain, and Hoonjae Lee. 2021. "Moving Ad Hoc Networks—A Comparative Study" Sustainability 13, no. 11: 6187. https://doi.org/10.3390/su13116187
APA StyleAl-Absi, M. A., Al-Absi, A. A., Sain, M., & Lee, H. (2021). Moving Ad Hoc Networks—A Comparative Study. Sustainability, 13(11), 6187. https://doi.org/10.3390/su13116187