Research Article
AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks
Table 2
Security based routing protocols.
| | 
 |  | Authors | Used protocol | Used environment | Attack type | Routing table | Encryption | Filtering malicious nodes | Privacy protection | Light weight |  | 
 |  | Shin et al. [25] | RO_INIT and RO_HO-based protocol | IoT | Exhaustion attack | No | Yes | No | Yes | No |  | Bujari et al. [26] | ESMR protocol | IoT | — | Yes | Yes | No | Yes | Yes |  | Shi et al. [27] | TDL-based protocol | WSN | Packet dropping attacks | Yes | No | Yes | No | Yes |  | Wang et al. [28] | TUE-OLSR protocol | MANET | Black hole and grey-hole attack | Yes | No | Yes | No | No |  | Kojima et al. [29] | ISDSR + protocol | Ad hoc | Active attacks | No | Yes | No | No | No |  | Ahutu and El-Ocla [30] | Multihop routing protocol | WSN | Wormhole attack | Yes | No | No | No | Yes |  | El-Semary and Diab [31] | BP-AODV protocol | MANET | Black hole attack | Yes | No | Yes | No | No |  | Stute et al. [32] | LIDOR protocol | IoT | DoS and wormhole attack | No | Yes | Yes | No | Yes |  | Velusamy et al. [33] | A cross-layer trust evaluation protocol | Smart grid | Cross-layer attacks | No | No | Yes | No | No |  | 
 | 
 |