{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T16:10:14Z","timestamp":1732291814012,"version":"3.28.0"},"reference-count":22,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T00:00:00Z","timestamp":1650931200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2024,3,20]]},"abstract":"\nPurpose<\/jats:title>\nIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nA trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc<\/jats:italic> network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nWhen compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nAdditionally, it reduces the amount of routing overhead and the average end-to-end delay.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-01-2022-0011","type":"journal-article","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T02:28:20Z","timestamp":1650680900000},"page":"193-205","source":"Crossref","is-referenced-by-count":0,"title":["Trusted routing protocol for federated UAV ad hoc<\/i> network"],"prefix":"10.1108","volume":"20","author":[{"given":"Elham","family":"Kariri","sequence":"first","affiliation":[]},{"given":"Kusum","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,4,26]]},"reference":[{"key":"key2024112215424131500_ref001","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/ICUFN.2018.8436724","article-title":"Geolocation-based routing protocol for flying ad hoc networks (FANETs)","year":"2018"},{"key":"key2024112215424131500_ref003","first-page":"1","article-title":"Multi-modal active learning with deep reinforcement learning for target feature extraction in multi-media image processing applications","year":"2022","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"key2024112215424131500_ref002","doi-asserted-by":"crossref","first-page":"2500","DOI":"10.3390\/su14052500","article-title":"Federated learning approach to protect healthcare data over big data scenario","volume":"14","year":"2022","journal-title":"Sustainability"},{"key":"key2024112215424131500_ref004","article-title":"Deep convolutional nets learning classification for artistic style transfer","volume":"2022","year":"2022","journal-title":"Scientific Programming"},{"key":"key2024112215424131500_ref005","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/ICCWAMTIP.2016.8079811","article-title":"Optimization of OLSR routing protocol in UAV ad HOC network","year":"2016"},{"issue":"7","key":"key2024112215424131500_ref006","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TITS.2020.3041746","article-title":"Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems","volume":"22","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"key2024112215424131500_ref007","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259","article-title":"A study and enhancement to the security of MANET AODV protocol against black hole attacks","year":"2019"},{"issue":"16","key":"key2024112215424131500_ref008","doi-asserted-by":"publisher","first-page":"12481","DOI":"10.1109\/JIOT.2020.3014947","article-title":"A provenance-aware distributed trust model for resilient unmanned aerial vehicle networks","volume":"8","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"key2024112215424131500_ref009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SECON.2015.7133020","article-title":"Performance evaluation of unmanned aerial vehicle ad hoc networks","year":"2015"},{"key":"key2024112215424131500_ref010","article-title":"Enhanced virtualization-based dynamic bin-packing optimized energy management solution for heterogeneous clouds","volume":"2022","year":"2022","journal-title":"Mathematical Problems in Engineering"},{"key":"key2024112215424131500_ref011","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/ICECC.2011.6066589","article-title":"A UAV mobile strategy in mobile ad hoc networks","year":"2011"},{"issue":"1","key":"key2024112215424131500_ref012","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MNET.011.2000177","article-title":"Blockchain-empowered trusted networking for unmanned aerial vehicles in the B5G era","volume":"35","year":"2021","journal-title":"IEEE Network"},{"key":"key2024112215424131500_ref013","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/COMPSAC.2019.00153","article-title":"Load balancing algorithm for multiple UAVs relayed tactical ad hoc networks","year":"2019"},{"key":"key2024112215424131500_ref014","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WTS.2018.8363941","article-title":"A new routing protocol for UAV relayed tactical mobile ad hoc networks","year":"2018"},{"key":"key2024112215424131500_ref015","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/MASS.2018.00034","article-title":"Hierarchical routing for unmanned aerial vehicle relayed tactical ad hoc networks","year":"2018"},{"key":"key2024112215424131500_ref016","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.57","article-title":"Towards trusted and efficient UAV-based communication","year":"2016"},{"key":"key2024112215424131500_ref017","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/ICUFN.2017.7993740","article-title":"Analysis of dynamic cluster head selection for mission-oriented flying ad hoc network","year":"2017"},{"key":"key2024112215424131500_ref018","article-title":"Detection of emotion of speech for RAVDESS audio using hybrid convolution neural network","volume":"2022","year":"2022","journal-title":"Journal of Healthcare Engineering"},{"key":"key2024112215424131500_ref019","first-page":"1","article-title":"Building trust of blockchain-based internet-of-thing services using public key infrastructure","year":"2022","journal-title":"Enterprise Information Systems"},{"key":"key2024112215424131500_ref020","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/ICCT.2018.8600107","article-title":"Survey of ad-hoc network technology for UAV","year":"2018"},{"key":"key2024112215424131500_ref021","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/ICACIA.2008.4770039","article-title":"Preliminary study of routing and date integrity in mobile ad hoc UAV network","year":"2008"},{"key":"key2024112215424131500_ref022","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/NCA51143.2020.9306710","article-title":"UAV-aided 5G network in suburban, urban, dense urban, and high-rise urban environments","year":"2020"}],"updated-by":[{"updated":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"DOI":"10.1108\/ijpcc-12-2024-0442","type":"retraction","label":"Retraction"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-01-2022-0011\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-01-2022-0011\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T15:42:52Z","timestamp":1732290172000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-01-2022-0011\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,26]]},"references-count":22,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,4,26]]},"published-print":{"date-parts":[[2024,3,20]]}},"alternative-id":["10.1108\/IJPCC-01-2022-0011"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-01-2022-0011","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"},{"type":"electronic","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2022,4,26]]}}}