Research Article
AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks
Table 2
Security based routing protocols.
| Authors | Used protocol | Used environment | Attack type | Routing table | Encryption | Filtering malicious nodes | Privacy protection | Light weight |
| Shin et al. [25] | RO_INIT and RO_HO-based protocol | IoT | Exhaustion attack | No | Yes | No | Yes | No | Bujari et al. [26] | ESMR protocol | IoT | — | Yes | Yes | No | Yes | Yes | Shi et al. [27] | TDL-based protocol | WSN | Packet dropping attacks | Yes | No | Yes | No | Yes | Wang et al. [28] | TUE-OLSR protocol | MANET | Black hole and grey-hole attack | Yes | No | Yes | No | No | Kojima et al. [29] | ISDSR + protocol | Ad hoc | Active attacks | No | Yes | No | No | No | Ahutu and El-Ocla [30] | Multihop routing protocol | WSN | Wormhole attack | Yes | No | No | No | Yes | El-Semary and Diab [31] | BP-AODV protocol | MANET | Black hole attack | Yes | No | Yes | No | No | Stute et al. [32] | LIDOR protocol | IoT | DoS and wormhole attack | No | Yes | Yes | No | Yes | Velusamy et al. [33] | A cross-layer trust evaluation protocol | Smart grid | Cross-layer attacks | No | No | Yes | No | No |
|
|