Research Article

AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks

Table 2

Security based routing protocols.

AuthorsUsed protocolUsed environmentAttack typeRouting tableEncryptionFiltering malicious nodesPrivacy protectionLight weight

Shin et al. [25]RO_INIT and RO_HO-based protocolIoTExhaustion attackNoYesNoYesNo
Bujari et al. [26]ESMR protocolIoTYesYesNoYesYes
Shi et al. [27]TDL-based protocolWSNPacket dropping attacksYesNoYesNoYes
Wang et al. [28]TUE-OLSR protocolMANETBlack hole and grey-hole attackYesNoYesNoNo
Kojima et al. [29]ISDSR + protocolAd hocActive attacksNoYesNoNoNo
Ahutu and El-Ocla [30]Multihop routing protocolWSNWormhole attackYesNoNoNoYes
El-Semary and Diab [31]BP-AODV protocolMANETBlack hole attackYesNoYesNoNo
Stute et al. [32]LIDOR protocolIoTDoS and wormhole attackNoYesYesNoYes
Velusamy et al. [33]A cross-layer trust evaluation protocolSmart gridCross-layer attacksNoNoYesNoNo