{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T12:32:54Z","timestamp":1721651574108},"reference-count":48,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Networks"],"published-print":{"date-parts":[[2024,3]]},"abstract":"Abstract<\/jats:title>Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the challenges of transmitting tactical messages via conventional satellite methods increase the processing overhead related to cost, Line of Sight (LOS) communication, packet loss, delay, and retransmission requests. Modern mobile communication systems use Airborne Node Networks (ANN) between satellites and Mobile Ground Nodes (MGNs) as they provide many advantages in mobile communication systems. Hence airborne network reduces the burden of satellites as they are only used as relay stations. The mobility problem caused by ANN and MGNs is solved by proposing a novel constructive airborne\u2010ground matrix algorithm known as the Who\u2010To\u2010Whom (WTW) matrix. With the help of this matrix acting as a reference index, it determines which nodes relate to whom at every time interval T in the tactical environment. This WTW matrix holds precise status\/information about connectivity among all stakeholders in the operating environment by carefully and effectively accounting for frequent location changes. The methodology of the proposed matrix is that it contains the physical parameters of the nodes and their behaviour in the tactical environment. The WTW matrix construction algorithm discusses how the reference matrix is constructed in every aerial node to monitor the mobile ground nodes by leading them to safety and providing aerial guidance as they move along the tactical environment. The performance metrics are measured with other existing schemes, and the merits and demerits of the proposed WTW matrix are identified and discussed in detail.<\/jats:p>","DOI":"10.1049\/ntw2.12103","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T12:32:32Z","timestamp":1695731552000},"page":"147-164","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A constructive airborne\u2010ground matrix algorithm for modern telecommunication systems"],"prefix":"10.1049","volume":"13","author":[{"given":"Samson","family":"Arun Raj A","sequence":"first","affiliation":[{"name":"Department of Computer Science Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India"}]},{"given":"Basil","family":"Xavier S","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India"}]},{"given":"Jaspher Wilisie","family":"Kathrine G","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India"}]},{"given":"Salaja","family":"Silas","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3592-6543","authenticated-orcid":false,"given":"Andrew","family":"J","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal Karnataka India"}]}],"member":"265","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"e_1_2_10_2_1","volume-title":"Northrop Grumman Corporation. Understanding Voice and Data Link Networking","author":"Stanley P.S.","year":"2014"},{"key":"e_1_2_10_3_1","unstructured":"Airborne wireless network.http:\/\/www.airbornewirelessnetwork.com\/index.asp"},{"key":"e_1_2_10_4_1","unstructured":"Recent developments in aircraft wireless networks.www.cse.wustl.edu\/~jain\/cse574-06\/ftp\/aircraft_wireless\/index.html"},{"key":"e_1_2_10_5_1","unstructured":"Mobile area of responsibility.https:\/\/www.revolvy.com\/topic\/Mobile-area-of-responsibility"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2021.000043"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2013.6619564"},{"key":"e_1_2_10_8_1","unstructured":"Unattended ground sensor.https:\/\/www.revolvy.com\/topic\/Unattended-ground-sensor"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.23919\/JSEE.2021.000116"},{"key":"e_1_2_10_10_1","volume-title":"13th IASTED International Conference on Robotics & Applications, Wurzburg, Germany","author":"Pezeshkian N.","year":"2017"},{"key":"e_1_2_10_11_1","volume-title":"Mobile Communications for the Digitized Battlefield","author":"Michael J.R.","year":"2002"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3005737"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027797"},{"issue":"4","key":"e_1_2_10_14_1","first-page":"1","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","author":"Padmavathi G.","year":"2009","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-016-9337-5"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047825"},{"key":"e_1_2_10_17_1","unstructured":"Border surveillance.www.cassindia.com\/inner_page.php?task=research&&id=53"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2320"},{"key":"e_1_2_10_19_1","first-page":"575","volume-title":"2015 International Conference on Computer, Communications, and Control Technology (I4CT), Kuching","author":"Zakhele C.N.","year":"2015"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.012"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-009-9079-8"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-011-9166-5"},{"key":"e_1_2_10_23_1","first-page":"404","volume-title":"Military Communications Conference","author":"Leonard J.S.","year":"2004"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6917398"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322275"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-010-9127-4"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2013.052613.130019"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-011-9556-6"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/878536"},{"key":"e_1_2_10_30_1","first-page":"407","volume-title":"Military Communications Conference","author":"Wang J.N.","year":"2015"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-014-0091-0"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.06.009"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2015.36"},{"key":"e_1_2_10_34_1","first-page":"200","volume-title":"Radio and Wireless Symposium (RWS)","author":"Danda B.R.","year":"2015"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2015.2467381"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.06.017"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795456"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2015-9"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2017.8289812"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11771-016-3132-y"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2736598"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700643"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/mvt.2016.2645481"},{"issue":"7","key":"e_1_2_10_44_1","first-page":"1","article-title":"Connectivity maintenance based on multiple relay UAVs selection scheme in cooperative surveillance","author":"Zhu Q.","year":"2017","journal-title":"Appl. Sci."},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800288"},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2524405"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01092-8"},{"key":"e_1_2_10_48_1","volume-title":"Computer Networks: A Systems Approach","author":"Peterson L.L.","year":"2012"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224771"}],"container-title":["IET Networks"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T04:27:08Z","timestamp":1710217628000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ntw2.12103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10.1049\/ntw2.12103"],"URL":"https:\/\/doi.org\/10.1049\/ntw2.12103","archive":["Portico"],"relation":{},"ISSN":["2047-4954","2047-4962"],"issn-type":[{"value":"2047-4954","type":"print"},{"value":"2047-4962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"2023-03-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}