Research Article

AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks

Table 1

Security techniques for FANETs.

AuthorUsed techniqueDescription

Atoev et al. [8]One-time pad (OTP) encryption techniqueThis technique enables a secure link between the drone and the ground control station (GCS), with improved accuracy and execution time in comparison with other systems
He et al. [9]Encryption bridging technique between IBE and ABEA new encrypted data switching protocol was introduced that minimizes client computation and communication costs, especially when the client’s data are encrypted and outsourced to a faraway cloud
Deng et al. [10]An identity-based encryption transformation (IBET) modelUsing identity-based encryption (IBE) and identity-based broadcast encryption (IBBE) for high-efficiency flexible sharing of encrypted data in the public cloud
Puthal et al. [11]Selective encryption (SEEN) methodSecure data streams were developed by encrypting data using a symmetric key block cipher with multiple shared keys to protect data confidentiality and integrity from malicious attackers
Islam and Shin [12]BUS: a block chain-enabled data acquisition schemeData acquisition scheme for IoT networks with the help of UAV swarm was designed, where the BUS technique is utilized to filter malicious devices. Simulation results illustrate the success of the technique and reduced energy consumption of IoT devices.