{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:47:46Z","timestamp":1747190866000,"version":"3.40.5"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2022,9,16]]},"abstract":"<jats:p>Artificial intelligence has recently been used in FANET-based routing strategies for decision-making, which is a unique paradigm. For effective communication in flying vehicles that use routing protocols to accomplish tasks collectively, aerial vehicles are used in both civic and military applications. Aerial ad hoc networks are wirelessly connected, and designing routing schemes is difficult due to the rapid mobility. Ground base stations and satellites are frequently used to interconnect UAV ad hoc networks. This paper developed a novel routing protocol with a focus on ant behavior routing, which assists in end-to-end security. For the first time in flying networks, the column mobility model is used to evaluate the performance of routing protocols. While merging with aerial ad hoc networks, AI-based networking is a relatively new field. In simulation results, AntHocNet shows better results in comparison with other contemporary routing algorithms. Pheromone update process is used for data encryption in AntHocNet. This research study is performed on network simulator-2.<\/jats:p>","DOI":"10.1155\/2022\/3330168","type":"journal-article","created":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T03:51:45Z","timestamp":1663386705000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4629-7466","authenticated-orcid":true,"given":"Sadoon","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Physic, College of Science, University of Mosul, Mosul, Iraq"}]},{"given":"Ahmed","family":"Sami","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq"}]},{"given":"Abida","family":"Thasin","sequence":"additional","affiliation":[{"name":"Department of Physic, College of Science, University of Mosul, Mosul, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7241-9327","authenticated-orcid":true,"given":"Redhwan M. A.","family":"Saad","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Ibb University, Ibb 70270, Yemen"},{"name":"Department of Computer Engineering, Faculty of Engineering, Cairo University, Giza 12613, Egypt"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2010.5480260"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCN51052.2020.9362867"},{"key":"3","first-page":"220","article-title":"A multi-agent approach for the construction of a peer-to-peer information system in grids","volume-title":"Self-Organization and Autonomic Informatics (I)","author":"A. Forestiero","year":"2005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115904"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/326295"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2740654"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110855"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2019.8806165"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906290"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985532"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2702172"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930774"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IES50839.2020.9231951"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.3390\/s18103351"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_37"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3390\/s21062057"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486326"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981531"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5523553"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/3440749.3442621"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956724"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-007-9062-z"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1686946"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07139-y"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943929"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717738192"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913679"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978143"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916318"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983438"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928804"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2985044"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2952035"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.01.034"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4885"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922971"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3330168.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3330168.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2022\/3330168.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T03:51:50Z","timestamp":1663386710000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2022\/3330168\/"}},"subtitle":[],"editor":[{"given":"Agostino","family":"Forestiero","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,9,16]]},"references-count":36,"alternative-id":["3330168","3330168"],"URL":"https:\/\/doi.org\/10.1155\/2022\/3330168","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"type":"electronic","value":"1687-9732"},{"type":"print","value":"1687-9724"}],"subject":[],"published":{"date-parts":[[2022,9,16]]}}}