{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:54:14Z","timestamp":1772643254079,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11277-021-08513-0","type":"journal-article","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T16:03:02Z","timestamp":1620403382000},"page":"1251-1277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets"],"prefix":"10.1007","volume":"120","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9944-1759","authenticated-orcid":false,"given":"Vinay","family":"Bhardwaj","sequence":"first","affiliation":[]},{"given":"Navdeep","family":"Kaur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"8513_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.compeleceng.2019.01.007","volume":"74","author":"G Choudhary","year":"2019","unstructured":"Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military internet of drones (iod) through an e cient medium access control (mac) protocol. Computers & Electrical Engineering, 74, 59\u201373","journal-title":"Computers & Electrical Engineering"},{"key":"8513_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2018.02.002","volume":"119","author":"J Sanchez-Garc","year":"2018","unstructured":"Sanchez-Garc, J., Garc A-Campos, J., Arzamendia, M., Reina, D. G., Toral, S., & Gregor, D. (2018). A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications. Computer Communications, 119, 43\u201365","journal-title":"Computer Communications"},{"key":"8513_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.vehcom.2017.10.003","volume":"10","author":"OS Oubbati","year":"2017","unstructured":"Oubbati, O. S., Lakas, A., Zhou, F., Gunes, M., & Yagoubi, M. B. (2017). A survey on position-based routing protocols for ying ad hoc networks (fanets). Vehicular Communications, 10, 29\u201356","journal-title":"Vehicular Communications"},{"key":"8513_CR4","doi-asserted-by":"crossref","unstructured":"Rubin, I., Zhang, R. (2007). Placement of uavs as communication relays aiding mobile ad hoc wireless networks. In: MILCOM 2007-IEEE Military Communications Conference, IEEE, pp. 1\u20137.","DOI":"10.1109\/MILCOM.2007.4455114"},{"key":"8513_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jnca.2017.08.013","volume":"97","author":"V Sharma","year":"2017","unstructured":"Sharma, V., Song, F., You, I., & Atiquzzaman, M. (2017). Energy e cient device discovery for reliable communication in 5g-based iot and bsns using unmanned aerial vehicles. Journal of Network and Computer Applications, 97, 79\u201395","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"8513_CR6","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11276-012-0421-8","volume":"18","author":"H Halabian","year":"2012","unstructured":"Halabian, H., Changiz, R., Yu, F. R., Lambadaris, I., & Tang, H. (2012). Optimal reliable relay selection in multiuser cooperative relaying networks. Wireless Networks, 18(6), 591\u2013603","journal-title":"Wireless Networks"},{"issue":"1\u20133","key":"8513_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10846-008-9253-2","volume":"54","author":"EW Frew","year":"2009","unstructured":"Frew, E. W., & Brown, T. X. (2009). Networking issues for small unmanned aircraft systems. Journal of Intelligent and Robotic Systems, 54(1\u20133), 21\u201337","journal-title":"Journal of Intelligent and Robotic Systems"},{"key":"8513_CR8","doi-asserted-by":"publisher","first-page":"11100","DOI":"10.1109\/ACCESS.2017.2710379","volume":"5","author":"D Shin","year":"2017","unstructured":"Shin, D., Sharma, V., Kim, J., Kwon, S., & You, I. (2017). Secure and e cient protocol for route optimization in pmipv6-based smart home iot networks. IEEE Access, 5, 11100\u201311117","journal-title":"IEEE Access"},{"issue":"2","key":"8513_CR9","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s11276-015-1154-2","volume":"23","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2017). Energy and delay e cient dynamic cluster formation using hybrid aga with faco in eaack manets. Wireless Networks, 23(2), 371\u2013385","journal-title":"Wireless Networks"},{"issue":"3","key":"8513_CR10","doi-asserted-by":"publisher","first-page":"200","DOI":"10.4304\/jnw.4.3.200-207","volume":"4","author":"Y He","year":"2009","unstructured":"He, Y., & Han, Z. (2009). User authentication with provable security against online dictionary attacks. Journal of Networks, 4(3), 200\u2013207","journal-title":"Journal of Networks"},{"issue":"1","key":"8513_CR11","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11277-018-5835-x","volume":"102","author":"S Jayaraman","year":"2018","unstructured":"Jayaraman, S., Bhagavathiperumal, R., & Mohanakrishnan, U. (2018). A three layered peer-to-peer energy e cient protocol for reliable and secure data transmission in eaack manets. Wireless Personal Communications, 102(1), 201\u2013227","journal-title":"Wireless Personal Communications"},{"key":"8513_CR12","doi-asserted-by":"publisher","first-page":"100163","DOI":"10.1016\/j.vehcom.2019.100163","volume":"18","author":"KA Darabkh","year":"2019","unstructured":"Darabkh, K. A., Alfawares, M. G., & Althunibat, S. (2019). Mdrma: Multi-data rate mobility-aware aodv-based protocol for ying ad-hoc networks. Vehicular Communications, 18, 100163","journal-title":"Vehicular Communications"},{"key":"8513_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.aeue.2018.07.020","volume":"94","author":"KA Darabkh","year":"2018","unstructured":"Darabkh, K. A., Judeh, M. S., Salameh, H. B., & Althunibat, S. (2018). Mobility aware and dual phase aodv protocol with adaptive hello messages over vehicular ad hoc networks. AEU-International Journal of Electronics and Communications, 94, 277\u2013292","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"8513_CR14","doi-asserted-by":"publisher","first-page":"101759","DOI":"10.1016\/j.adhoc.2018.09.004","volume":"90","author":"J-P Condomines","year":"2019","unstructured":"Condomines, J.-P., Zhang, R., & Larrieu, N. (2019). Network intrusion detection system for uav ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks, 90, 101759","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"8513_CR15","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","volume":"11","author":"I Bekmezci","year":"2013","unstructured":"Bekmezci, I., Sahingoz, O. K., & Temel, S. (2013). Flying ad-hoc networks (fanets): A survey. Ad Hoc Networks, 11(3), 1254\u20131270","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"8513_CR16","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2015","unstructured":"Gupta, L., Jain, R., & Vaszkun, G. (2015). Survey of important issues in uav communication networks. IEEE Communica-tions Surveys & Tutorials, 18(2), 1123\u20131152","journal-title":"IEEE Communica-tions Surveys & Tutorials"},{"issue":"2","key":"8513_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.5815\/ijcnis.2016.02.08","volume":"8","author":"J Sathiamoorthy","year":"2016","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). Ceaack{a reduced acknowledgment for better data transmission for manets. International Journal of Computer Network and Information Security (IJCNIS), 8(2), 64\u201371","journal-title":"International Journal of Computer Network and Information Security (IJCNIS)"},{"issue":"19","key":"8513_CR18","doi-asserted-by":"publisher","first-page":"6545","DOI":"10.1007\/s00500-017-2704-6","volume":"22","author":"J Sathiamoorthy","year":"2018","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2018). A competent three-tier fuzzy cluster algorithm for enhanced data trans-mission in cluster eaack manets. Soft Computing, 22(19), 6545\u20136565","journal-title":"Soft Computing"},{"key":"8513_CR19","doi-asserted-by":"crossref","unstructured":"Arnosti, S. Z., Pires, R. M., Branco, K. R. (2017). Evaluation of cryptography applied to broadcast storm mitigation algorithms in fanets. In 2017 International Conference on Unmanned Aircraft Systems (ICUAS), IEEE, pp. 1368\u20131377.","DOI":"10.1109\/ICUAS.2017.7991377"},{"key":"8513_CR20","doi-asserted-by":"crossref","unstructured":"Thompson, R. B., Thulasiraman, P. (2016). Condential and authenticated communications in a large xed-wing uav swarm. In 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, pp. 375\u2013382.","DOI":"10.1109\/NCA.2016.7778644"},{"issue":"1","key":"8513_CR21","first-page":"144","volume":"5","author":"J Sathiamoorthy","year":"2015","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmis-sion in ceaack manets. Journal of Network Communications and Emerging Technologies, 5(1), 144\u2013151","journal-title":"Journal of Network Communications and Emerging Technologies"},{"issue":"7","key":"8513_CR22","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1002\/wcm.432","volume":"6","author":"MK Marina","year":"2006","unstructured":"Marina, M. K., & Das, S. R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless communications and mobile computing, 6(7), 969\u2013988","journal-title":"Wireless communications and mobile computing"},{"issue":"3","key":"8513_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10586-012-0198-7","volume":"15","author":"P Chatterjee","year":"2012","unstructured":"Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). Stacrp: A secure trusted auction oriented clustering based routing protocol for manet. Cluster Computing, 15(3), 303\u2013320","journal-title":"Cluster Computing"},{"issue":"4","key":"8513_CR24","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1007\/s11277-017-4812-0","volume":"97","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). Stfdr: Architecture of competent protocol for e cient route discovery and reliable transmission in ceaack manets. Wireless Personal Communications, 97(4), 5817\u20135839","journal-title":"Wireless Personal Communications"},{"key":"8513_CR25","unstructured":"Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocol. In 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting."},{"key":"8513_CR26","doi-asserted-by":"crossref","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in ceaack manets using distinct dynamic key with classi ed digital signature cryptographic algorithm. In 2015 International Conference on Computing and Communications Technologies (ICCCT), IEEE, pp. 144\u2013151.","DOI":"10.1109\/ICCCT2.2015.7292735"},{"issue":"7","key":"8513_CR27","first-page":"123","volume":"2","author":"C Nayak","year":"2012","unstructured":"Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Managment, IT and Engineering, 2(7), 123\u2013128","journal-title":"International Journal of Managment, IT and Engineering"},{"key":"8513_CR28","doi-asserted-by":"crossref","unstructured":"Singh, K., & Verma, A. K. (2015). Experimental analysis of aodv, dsdv and olsr routing protocol for ying adhoc networks (fanets). In 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), IEEE, pp. 1\u20134.","DOI":"10.1109\/ICECCT.2015.7226085"},{"key":"8513_CR29","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.comcom.2018.03.002","volume":"122","author":"V Sharma","year":"2018","unstructured":"Sharma, V., Kumar, R., & Kumar, N. (2018). Dptr: Distributed priority tree-based routing protocol for fanets. Computer Communications, 122, 129\u2013151","journal-title":"Computer Communications"},{"key":"8513_CR30","unstructured":"Li, X., & Yan, J. (2017). Lepr: Link stability estimation-based preemptive routing protocol for ying ad hoc networks. In 2017 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp. 1079\u20131084."},{"key":"8513_CR31","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.jisa.2017.08.001","volume":"36","author":"J Sathiamoorthy","year":"2017","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., et al. (2017). Design of a pro cient hybrid protocol for efficient route discovery and secure data transmission in ceaack manets. Journal of information security and applications, 36, 43\u201358","journal-title":"Journal of information security and applications"},{"key":"8513_CR32","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/ACCESS.2017.2647817","volume":"5","author":"G Gankhuyag","year":"2017","unstructured":"Gankhuyag, G., Shrestha, A. P., & Yoo, S.-J. (2017). Robust and reliable predictive routing strategy for ying ad-hoc networks. IEEE Access, 5, 643\u2013654","journal-title":"IEEE Access"},{"key":"8513_CR33","unstructured":"Clapper, J., Young, J., Cartwright, J., & Grimes, J. Unmanned systems roadmap 2007\u20132032, O ce of the Secretary of Defense 188."},{"key":"8513_CR34","doi-asserted-by":"crossref","unstructured":"Kerrache, C. A., Barka, E., Lagraa, N., & Lakas, A. (2017). Reputation-aware energy-efficient solution for fanet monitoring. In 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), IEEE, pp. 1\u20136.","DOI":"10.1109\/WMNC.2017.8248851"},{"issue":"6","key":"8513_CR35","doi-asserted-by":"publisher","first-page":"208","DOI":"10.22247\/ijcna\/2020\/205321","volume":"7","author":"R Denis","year":"2020","unstructured":"Denis, R., & Madhubala, P. (2020). Evolutionary computing assisted visually imperceptible hybrid cryptography and steganography model for secure data communication over cloud environment. International Journal of Computer Networks and Applications (IJCNA), 7(6), 208\u2013230.","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"issue":"4","key":"8513_CR36","doi-asserted-by":"publisher","first-page":"93","DOI":"10.22247\/ijcna\/2020\/196041","volume":"7","author":"R Rahim","year":"2020","unstructured":"Rahim, R., Murugan, S., Priya, S., Magesh, S., & Manikandan, R. (2020). Taylor based grey wolf optimization algorithm (TGWOA) for energy aware secure routing protocol. International Journal of Computer Networks and Applications (IJCNA), 7(4), 93\u2013102.","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"key":"8513_CR37","doi-asserted-by":"crossref","unstructured":"Bhardwaj, V., Kaur, N., Vashisht, S., & Jain, S. (2020). SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks. Transactions on Emerging Telecommunications Technologies.","DOI":"10.1002\/ett.4068"},{"issue":"2","key":"8513_CR38","doi-asserted-by":"publisher","first-page":"28","DOI":"10.22247\/ijcna\/2020\/195674","volume":"7","author":"M Usha","year":"2020","unstructured":"Usha, M., Sathiamoorthy, J., Ashween, R., & Ramakrishnan, B. N. (2020). Eemccp-a novel architecture protocol design for e cient data transmission in underwater acoustic wireless sensor network. International Journal of Computer Networks and Applications, 7(2), 28\u201342","journal-title":"International Journal of Computer Networks and Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08513-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08513-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08513-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T12:21:17Z","timestamp":1630326077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08513-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,7]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["8513"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08513-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,7]]},"assertion":[{"value":"13 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}