Fact-checked by Grok 2 weeks ago

Ad hoc network

An ad hoc network, commonly referred to as a ad hoc network, is a decentralized system of mobile nodes that communicate directly with one another using links, without relying on fixed such as base stations or access points. These networks enable , where nodes function as both hosts and routers, often employing multi-hop relaying to extend communication range due to limitations in transmission power or channel conditions. The in ad hoc networks is highly dynamic, changing rapidly as nodes move, which distinguishes them from traditional infrastructure-based networks. Key characteristics of ad hoc networks include their distributed operation, fluctuating link capacities, and reliance on low-power devices, which make them suitable for environments lacking centralized control. They face challenges such as higher rates, increased and , constraints from battery-operated nodes, and vulnerability to threats due to the open medium and protocols. Despite these drawbacks, advantages include flexibility in deployment—"communication anytime and anywhere”—and potential improvements in throughput and through multihopping. The development of ad hoc networks traces back to the , originating from early experiments like the DARPA-funded Packet Radio Network (PRnet), which aimed to provide robust communication in mobile scenarios. Subsequent programs, such as DARPA's Global Mobile Information Systems (GloMo) in the and the Near Term Digital Radio (NTDR) system, advanced and medium protocols, while the standard formalized ad hoc modes for local area networks. By the early , interest expanded beyond applications to civilian uses, driven by portable computing and technology advancements. Applications of ad hoc networks span military for battlefield scenarios, response in areas, and civilian settings like networking, home device interconnections, and networks for . They also support operations, educational collaborations, and extensions through relaying. Ongoing focuses on optimizing protocols for , , and to address inherent limitations and enable broader adoption.

Overview

Definition

An ad hoc network is a decentralized composed of autonomous nodes that communicate directly with one another in a manner, without depending on any pre-established such as base stations, access points, or wired backbones. This setup enables spontaneous formation of connections among devices, typically using radio frequencies, where nodes dynamically discover and interact with nearby peers to exchange data. At its core, ad hoc networking relies on three foundational elements: peer-to-peer communication, multi-hop transmission, and self-organization. In peer-to-peer communication, nodes transmit data directly to one another without intermediaries, fostering equal participation among all devices. Multi-hop transmission allows packets to be relayed through intermediate nodes when the source and destination are out of direct range, extending the network's effective coverage through cooperative forwarding. Self-organization ensures that the network topology adapts automatically to changes, such as node mobility or failures, without centralized control, enabling rapid deployment in transient environments. Unlike infrastructure-based networks, such as traditional systems that require fixed access points to manage connections or cellular networks that depend on base stations for coordination, ad hoc networks eliminate these fixed components, promoting greater flexibility but also introducing challenges in maintaining stable links. In this paradigm, each node functions dually as both a —originating or consuming —and a router, responsible for discovering paths and forwarding traffic for others, with associations forming temporarily based on physical proximity and signal strength.

Key Characteristics

Ad hoc networks exhibit a dynamic primarily due to the of nodes, which can move freely and unpredictably, leading to frequent changes in and route . This inherent variability requires continuous adaptation in and to ensure reliable communication. A core feature is their and , where no central authority or fixed exists; instead, nodes self-configure, self-organize, and collaboratively manage the operations. Each node acts as both a and a router, enabling interactions without reliance on base stations or access points. Nodes in ad hoc networks typically face significant resource constraints, including limited battery power, narrow bandwidth, and modest computational capabilities, which necessitate energy-efficient protocols to prolong network lifetime. These limitations arise from the mobile, often battery-operated nature of the devices, making power management a critical design consideration. Communication in ad hoc networks relies on multi-hop transmission, where data packets are relayed through intermediate nodes to reach destinations beyond direct transmission range. The effective path length L can be approximated as L = h \times r, where h is the number of hops and r is the average transmission range per hop, highlighting the dependence on relay efficiency for end-to-end delivery. Scalability in ad hoc networks is challenged by increasing node density, which can degrade performance through higher interference, greater routing overhead, and reduced throughput as the network grows larger. While small-scale deployments perform adequately, large networks require advanced mechanisms to mitigate congestion and maintain efficiency. These characteristics enable key advantages, such as rapid deployment in infrastructure-less environments and cost-effectiveness by eliminating the need for dedicated hardware like routers or wired backbones. This makes ad hoc networks particularly suitable for temporary or emergent setups where quick establishment is essential.

Historical Development

Origins and Early Concepts

The foundational concepts of networks trace back to the late 1960s and early 1970s, when researchers sought decentralized methods for wireless data transmission without fixed infrastructure. A pivotal early development was the protocol, introduced in 1970 by Norman Abramson at the University of Hawaii as part of the system. This experimental UHF enabled multiple terminals to share a common broadcast channel using random-access in a centralized star topology, where users transmitted data packets unsynchronized to a central and retransmitted upon collisions due to . The protocol's pure variant achieved a theoretical maximum channel utilization of about 18.4%, demonstrating the feasibility of simple, infrastructure-free communication over radio links for applications like connecting remote computers across . ALOHAnet's success in supporting 100–500 users via teletype highlighted decentralized transmission as a core idea for future mobile networks. Building on these ideas, the Packet Radio Network (PRNET) emerged in the early 1970s as the first operational ad hoc-like system for mobile communication, sponsored by the . Developed collaboratively by , Bolt Beranek and Newman (BBN), and starting around 1973, PRNET extended packet-switching principles from the wired to wireless environments. It featured mobile nodes, such as vans equipped with radio terminals, communicating via multi-hop routing over UHF frequencies, with gateways connecting to for broader —the first such wireless-to-wired transmission occurred in 1976 using early protocols. This system addressed basic mobility by incorporating error detection, like cyclic redundancy checks, and retransmission mechanisms to handle in dynamic radio conditions. PRNET's experiments, including tests with ships and aircraft in later phases, validated ad hoc networking for scenarios requiring survivability without central bases. In the , DARPA's Survivable Adaptive Radio Networks (SURAN) program advanced these concepts, focusing on robust, large-scale systems for military applications. Established in 1983, SURAN built upon PRNET by developing adaptive protocols for and data transport in environments prone to disruption, such as or failures. It emphasized multi-hop routing algorithms that dynamically reconfigured paths among mobile radios, like those on naval units or , to maintain without . Early SURAN implementations, such as SURAP1, tackled key challenges including through channel-sharing techniques and basic routing efficiency in variable topologies, achieving reliable communication in simulated hostile settings. This program represented a crucial transition from ARPANET's fixed to fully wireless, adaptive paradigms, prioritizing survivability and for tactical operations.

Key Milestones and Standardization

The emergence of Mobile Ad Hoc Network (MANET) research gained momentum in the mid-1990s, coinciding with the standardization of (), which introduced ad hoc mode to enable connectivity without infrastructure. This mode, part of the standard, allowed devices to form independent basic service sets (IBSS) for dynamic, self-organizing networks, laying the groundwork for MANET experimentation in academic and military contexts. Key routing protocols emerged during this period to address the challenges of mobility and topology changes. The Destination-Sequenced Distance Vector (DSDV) , proposed in 1994, was one of the first proactive solutions, using sequence numbers to prevent loops in table-driven updates for mobile computers. In 1996, the Dynamic Source (DSR) introduced on-demand , where source nodes maintain route caches and append complete paths in packet headers to minimize overhead in multi-hop ad hoc environments. By the early 2000s, reactive and proactive approaches converged in standards: the Ad hoc On-Demand Distance Vector (AODV) was formalized in RFC 3561 (2003) as an experimental IETF standard for efficient route via broadcast requests in dynamic networks. Similarly, the Optimized Link State (OLSR) , detailed in 3626 (2003), optimized classical link-state mechanisms by selecting multipoint relays to reduce flooding overhead in proactive MANET . The (IETF) Mobile Ad-hoc Networks (MANET) , established around 1998 following 2501's outline of performance considerations, played a pivotal role in standardization efforts through the and into the 2010s. The group focused on protocols for scenarios, producing s for AODV, OLSR, and others like the Neighborhood Discovery Protocol (NHDP) in 6130 (2011), while addressing issues such as scalability and integration with networks; it concluded major work by 2015 with recharters emphasizing practical deployments. Concurrently, the U.S. (DARPA) advanced tactical applications in the through programs such as the Global Mobile Information Systems (GloMo), which developed advanced mobile networking technologies for heterogeneous environments, and the Near-Term (NTDR) program, which developed a mobile radio system for brigade-level transport in the U.S. Army, emphasizing waveform agility and for communications. Post-2010 milestones reflected networks' integration into broader cellular ecosystems, particularly through specifications. Enhancements in Release 14 (2016) and Release 15 (2018) improved device-to-device (D2D) sidelink communications for proximity services, enabling ad hoc-like direct links in networks for applications like public safety. Release 16 (2020) extended this to New Radio (NR) V2X sidelink, supporting multicast and unicast modes for vehicular and ad hoc formations with higher reliability and lower latency. Further advancements in Release 17 (2022) enhanced sidelink for multicast and power saving, while Release 18 (as of 2024) focuses on advanced sidelink for 5G-Advanced. In unmanned aerial vehicle (UAV) domains, the BRAMOR C4EYE system, introduced in 2013 with MANET capabilities for secure digital relay and data sharing among drones, exemplified practical ad hoc deployment in tactical . By the late 2010s, while dedicated standalone MANET research evolved toward integration with smartphone-based alternatives like and mesh protocols for civilian opportunistic networking, ongoing developments continued in and . For instance, in , RTX's BBN secured a DoD to develop 5G-based multi-hop mobile ad hoc networks for tactical edge communications. This evolution prioritizes hybrid architectures combining pure MANET paradigms with cellular and ecosystems.

Types and Variants

Mobile Ad Hoc Networks (MANETs)

Mobile Ad Hoc Networks (MANETs) are autonomous systems comprising mobile nodes, such as laptops or handheld devices, that communicate wirelessly through multi-hop relays without relying on fixed infrastructure. Each node functions as both a host and a router, enabling self-configuration and dynamic topology formation as nodes move independently. This infrastructure-less design allows for rapid deployment in scenarios where traditional networks are unavailable, with communication occurring via peer-to-peer links that adapt to changing node positions. A key aspect of MANETs is the impact of node mobility on network stability, modeled through various patterns to simulate real-world movements. The Random Waypoint Model, introduced in seminal work on , describes nodes selecting random destinations within a defined area, moving at a constant speed up to a maximum , and pausing upon arrival before repeating the process. In contrast, the Manhattan Grid Model restricts movement to a grid-like structure mimicking urban streets, where nodes travel along predefined paths with turns at intersections, better representing constrained environments like cityscapes. These models highlight how mobility influences link formation and breakage; for instance, the rate of link breakage is proportional to the of nodes divided by the transmission range, as higher speeds reduce the time nodes remain within communication range, leading to frequent disruptions. \text{Breakage Rate} \propto \frac{v}{R} where v is the relative velocity and R is the transmission range. MANETs find practical use in temporary setups, such as ad hoc laptop networks formed by conference attendees for file sharing or collaboration, and in disaster recovery operations where first responders deploy devices to establish communication in areas with damaged infrastructure, like post-earthquake zones. Unlike static ad hoc networks, which feature fixed node positions and stable routes suitable for sensor deployments, MANETs contend with frequent topology changes due to mobility, necessitating adaptive routing and emphasizing energy efficiency for battery-powered nodes to prolong operational life amid constant reconnections. Performance in MANETs is evaluated through metrics sensitive to , including throughput—the average rate of successful data packet delivery—and , which measures the time from source to destination, often increasing with node speed due to route rediscoveries. Studies show that mobility impacts these metrics, underscoring the need for mobility-aware protocols to mitigate degradation.

Vehicular and Flying Ad Hoc Networks (VANETs and FANETs)

Vehicular Ad Hoc Networks (VANETs) represent a specialized variant of networks tailored for high-mobility road environments, where vehicles act as mobile nodes to enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. These interactions primarily support traffic safety applications, such as broadcasting alerts for imminent collisions, warnings, and cooperative , thereby reducing accident risks and enhancing overall road efficiency. VANETs operate in dynamic topologies influenced by vehicular traffic patterns, with communication ranges typically extending up to 1 km to accommodate real-time data exchange. Key standards underpinning VANETs include , ratified in July 2010, which specifies the physical (PHY) and (MAC) layers for access in vehicular environments (WAVE), operating in the 5.9 GHz band with (OFDM) to handle Doppler shifts from motion. Complementing this is (DSRC), a broader protocol suite that incorporates for short-range, low-latency transmissions essential for safety-critical messages. A distinctive challenge in VANETs is the high relative speeds between vehicles, reaching up to 200 km/h on highways, which results in rapidly changing neighborhoods and requires robust protocols to maintain connectivity amid frequent handoffs. Hybrid extensions, such as Intelligent Vehicular Ad Hoc Networks (InVANETs), incorporate architectures to enhance decision-making for collision avoidance by integrating sensor data and across V2V and V2I links. Post-2020 developments have seen VANETs evolve through integration with vehicle-to-everything (V2X) technologies, as defined in Release 16 completed in July 2020, which introduces new radio (NR) sidelink enhancements for improved reliability, lower latency, and support for advanced services like platooning and remote driving. Flying Ad Hoc Networks (FANETs) adapt principles to unmanned aerial vehicles (UAVs), enabling swarm formations for aerial applications such as and disaster monitoring, where UAVs communicate directly without fixed . These networks leverage multi-UAV coordination to cover expansive areas, with topologies evolving in three dimensions due to varying altitudes and flight paths. FANETs face unique hurdles, including mobility models that account for unpredictable trajectories and intermittent arising from low densities (often kilometers apart) and environmental factors like wind or obstacles, leading to short link durations typically on the order of seconds. Coverage in FANETs is influenced by transmission range, node density, and altitude. This formulation helps optimize swarm deployment for uniform , as demonstrated in mobility-aware studies. Unlike ground-based VANETs, FANETs prioritize lightweight protocols to manage constraints in battery-powered UAVs, supporting missions like real-time through resilient multi-hop relaying.

Protocols and Mechanisms

Routing Protocols

Routing protocols in ad hoc networks are essential for discovering and maintaining paths between nodes in dynamic, infrastructureless environments where topology changes frequently due to node . These protocols must balance the trade-offs between in route establishment, bandwidth consumption from control messages, and adaptability to network variations, as traditional wired routing approaches like OSPF or are inefficient in such scenarios due to high overhead and slow convergence. Broadly categorized into proactive, reactive, , and position-based types, these protocols employ diverse strategies to ensure reliable while minimizing resource usage in bandwidth-constrained channels. Proactive protocols, also known as table-driven, continuously maintain tables for all reachable destinations by periodically exchanging information across the network, enabling low-latency route acquisition at the cost of higher overhead. The Destination-Sequenced Distance-Vector (DSDV) , introduced in 1994, exemplifies this approach by using sequence numbers to avoid loops and disseminating full or incremental updates based on changes, with routes selected by minimum hop count. Similarly, the Optimized Link State (OLSR) , standardized in 3626, optimizes classical link-state flooding through multipoint relays (MPRs) to reduce redundant transmissions, where only selected nodes rebroadcast messages, achieving substantial overhead reduction in dense networks compared to pure link-state methods. A key performance metric for proactive protocols is overhead, often quantified as the ratio of packets (e.g., table updates) to total packets transmitted, expressed as: \text{Overhead} = \frac{\text{Number of routing control packets}}{\text{Total number of packets (data + control)}} This metric highlights the bandwidth inefficiency in large or highly mobile networks, where frequent updates can exceed 20-30% of channel capacity. Reactive protocols, or on-demand, discover routes only when needed, reducing unnecessary overhead in sparse or low-traffic scenarios by flooding route requests and establishing paths via replies from destinations. The Ad-hoc On-Demand Distance Vector (AODV) protocol, defined in RFC 3561, uses Route Request (RREQ) broadcasts to initiate discovery, with intermediate nodes caching reverse routes; upon reaching the destination, a Route Reply (RREP) unicasts back along the path, incorporating sequence numbers to prevent loops and ensure freshness. Dynamic Source Routing (DSR), proposed in 1996, employs source routing where the complete path is embedded in packet headers, discovered through similar RREQ/RREP exchanges but without periodic updates, making it suitable for smaller networks with generally lower overhead than table-driven alternatives in simulations. These mechanisms limit flooding scope via expanding ring searches or promiscuous listening, though they introduce initial discovery delays in moderate mobility settings. Hybrid protocols integrate proactive and reactive elements to leverage their strengths, partitioning the network into zones for localized efficiency. The Zone Routing Protocol (ZRP), developed in , defines routing zones around each node based on a tunable radius (e.g., 2-3 ), using proactive intrazone (IARP) for table maintenance within zones and reactive interzone (IERP) for global queries, which propagate bordercasts to adjacent zones, achieving balanced overhead of 10-15% in networks with 50-100 nodes. This zoned approach minimizes query floods while ensuring , with performance optimizing at zone radii proportional to . Position-based routing protocols exploit geographic , often from GPS, to forward packets without global , ideal for highly mobile or large-scale networks. Perimeter Stateless (GPSR), introduced in 2000, primarily uses a forwarding that selects the neighbor closest to the destination in , switching to perimeter (face traversal in planar graphs) only when local maxima are encountered, delivering packets with 20-40% higher throughput than shortest-path protocols in urban-like topologies with obstacles. Path selection in these and other protocols often relies on metrics beyond hop count, such as the Expected Transmission Count (ETX), which estimates link reliability by measuring ratios in both directions and computing ETX as the inverse of successful delivery probability (e.g., ETX = 1 / (d_f * d_r), where d_f and d_r are forward and reverse delivery ratios), favoring high-throughput paths over minimal hops and improving end-to-end performance by 30-50% in lossy environments. Protocol performance is typically evaluated using discrete-event simulators like NS-3, which models MAC and mobility traces to assess metrics such as packet delivery ratio and under varying densities (e.g., 50-200 nodes/km²) and speeds (0-20 m/s), revealing AODV's superiority in high-mobility scenarios with 85-95% delivery rates. Similarly, OMNeT++ with the INET framework supports modular MANET simulations, enabling comparisons of OLSR and DSR in scenarios with realistic , where hybrid s like ZRP show reduced overhead (under 10%) in clustered topologies. These tools facilitate reproducible benchmarks, emphasizing the need for context-specific selection in deployments. Recent advancements in routing protocols include integration of for route optimization and enhanced variants of AODV incorporating QoS-aware and clustering mechanisms, particularly for flying networks (FANETs), as of 2024-2025.

Medium Access Control and Other Protocols

In networks, (MAC) protocols are essential for coordinating access to the shared wireless medium, preventing collisions, and ensuring fair utilization among nodes without a central coordinator. The standard, widely adopted for modes, employs with Collision Avoidance (CSMA/CA) as its core MAC mechanism, where nodes listen to the channel before transmitting and use a to resolve contention. This (DCF) operates in configurations by allowing communication, adapting to dynamic topologies through periodic carrier sensing and adjustments. A key challenge addressed by CSMA/CA in ad hoc environments is the hidden terminal problem, where nodes out of direct range interfere at a common receiver, leading to collisions. To mitigate this, the protocol incorporates Request-to-Send/Clear-to-Send () handshaking, in which a sender broadcasts a short RTS frame, prompting the intended receiver to reply with CTS, reserving the channel and notifying nearby nodes to defer transmissions. This mechanism reduces the overhead of full data frames in collision scenarios but can introduce delays in high-density networks due to the exposed terminal issue, where legitimate transmissions are unnecessarily blocked. Performance analyses of CSMA/CA highlight vulnerability to collisions as node density increases; the probability of collision for a transmission attempt is modeled as P_{coll} = 1 - (1 - \tau)^{n-1}, where \tau represents the probability of transmission attempt in a given slot, and n is the number of contending nodes. This formula, derived from a model of the backoff process, underscores how saturation conditions degrade throughput, motivating adaptations like adjusting \tau dynamically in settings. For resource-constrained ad hoc networks, such as wireless sensor networks (WSNs), (TDMA) and (FDMA) variants offer alternatives to CSMA/CA by allocating fixed time slots or frequency bands to minimize and contention. In TDMA-based schemes, nodes synchronize to transmit in predefined slots, reducing energy waste from idle listening; for instance, distributed randomized TDMA (DRAND) enables self-organizing slot assignment in ad hoc sensor deployments, achieving collision-free access with low overhead. TDMA/FDMA protocols, like HYMAC, further enhance scalability in WSNs by combining time and frequency division, allowing multiple non-interfering transmissions and improving throughput in multi-hop ad hoc topologies. At the transport layer, standard TCP struggles in ad hoc networks due to frequent route disruptions misinterpreted as congestion, prompting adaptations like TCP-F (TCP with Feedback), which incorporates explicit route failure notifications from the network layer to pause and resume sessions without unnecessary backoffs. This feedback mechanism distinguishes mobility-induced losses from true congestion, yielding up to 300% throughput gains in simulated multi-hop ad hoc scenarios compared to vanilla TCP. Energy efficiency remains critical in battery-limited ad hoc nodes, leading to protocols like S-MAC (Sensor-MAC), which implements duty cycling by scheduling listen/sleep periods synchronized across neighbors, reducing idle energy consumption significantly—up to 50% compared to in light traffic scenarios—while maintaining periodic neighbor discovery. S-MAC's adaptive listening further allows nodes to wake briefly during others' transmissions, balancing and power savings in dynamic environments. Cross-layer designs integrate mechanisms with higher layers, such as , to optimize performance in topology-varying ad hoc networks; for example, schemes that leverage to adjust MAC contention windows or power levels can improve end-to-end throughput under , as demonstrated in joint and scheduling models. These approaches violate traditional but enable holistic adaptations, prioritizing metrics like delay and reliability in resource-scarce settings.

Applications

Military and Emergency Response

Ad hoc networks play a critical role in operations, particularly through tactical Ad Hoc Networks (MANETs) that enable secure, self-organizing communications among soldiers and vehicles in dynamic battlefield environments. The (JTRS), initiated by the U.S. Department of Defense in the late , exemplifies this application by integrating software-defined radios to form MANETs that connect frontline sensors, enablers, and shooters to the (GIG). These networks support (NCW) by providing shared and rapid without fixed , allowing dismounted soldiers to communicate via IP-enabled radios or devices while vehicles act as mobile nodes. JTRS facilitates rapid deployment in contested areas, reducing logistical burdens and enhancing survivability through features like multiple input multiple output () antennas for improved bandwidth and interference mitigation. DARPA has advanced military ad hoc networking through programs like the Near-Term Digital Radio (NTDR), launched in the 1990s to prototype MANET radio systems for the U.S. Army at brigade and below levels. NTDR employed a two-tier hierarchical structure covering up to 20 x 30 km areas, using modules to minimize , , and jamming vulnerabilities while ensuring secure . Modern equivalents build on this foundation, incorporating jam-resistant waveforms and to maintain connectivity in scenarios, as seen in successors like the Joint Tactical Networks (JTN) that sustain mobile ad hoc waveforms for joint operations. As of 2024, MANET capabilities have been demonstrated in Combined (CJADC2) tests, enhancing interoperability in multi-domain operations. In emergency response, ad hoc networks enable quick restoration of communications in infrastructure-denied disaster zones, such as post-event setups following the 2011 Tohoku earthquake in , where hastily formed networks using and other wireless technologies bridged gaps left by damaged fixed systems and restricted satellite access. These networks support rapid sensor deployment for search-and-rescue operations, allowing teams to form multi-hop relays with portable devices to share on survivor locations and environmental hazards without relying on central infrastructure. For instance, systems like the Rapidly Deployable Wireless Ad Hoc System for Post-Disaster (RDSP) use multi-hop ad hoc configurations to provide resilient connectivity in urban rubble or remote areas, prioritizing voice, video, and sensor feeds for . Flying Ad Hoc Networks (FANETs) extend these capabilities in , where swarms of unmanned aerial vehicles (UAVs) form dynamic topologies for and target identification in hostile environments. Systems like the BRAMOR C4EYE tactical UAV, deployed since the early , integrate into FANETs using MANET mesh networks to enable intelligence sharing among multiple drones, supporting missions such as border monitoring and battlefield assessment with operations up to 5,000 m (16,000 ft). The platform has been used in conflicts, including provision to in 2023 for . Performance requirements for these ad hoc networks in and contexts emphasize low for time-sensitive decisions, such as tactical voice or video, and high reliability of packet delivery under from or multipath . Proactive protocols are often preferred to achieve low in predictable threat scenarios, while jam-resistant designs like those in NTDR reduce impacts compared to systems, ensuring robust in electronically contested or disaster-ravaged areas.

Civilian and IoT-Based Uses

Ad hoc networks enable (P2P) among smartphones through technologies like and , forming temporary connections without fixed infrastructure. Smartphone ad hoc networks (SPANs) leverage these capabilities to facilitate direct data exchange in scenarios such as content sharing during events or in areas with limited cellular coverage. For instance, allows devices to create self-organizing groups for efficient P2P transfers, supporting applications like photo and document sharing among nearby users. In gaming and social contexts, ad hoc networks support multiplayer interactions on mobile devices by enabling low-latency, local connections. Devices can form spontaneous networks via or for real-time , such as in proximity-based games where players connect without . This approach has been implemented in frameworks for devices, allowing collaborative in ad hoc mode to reduce dependency on centralized servers. For (IoT) applications, networks are integral to wireless sensor networks (WSNs), particularly through concepts like "Smart Dust," which envisions tiny, autonomous s forming dynamic clusters for . These networks use clustering to from distributed nodes, enabling efficient monitoring of parameters such as air quality or soil conditions in remote areas. Seminal work on Smart Dust highlights its potential for mobile networking in sensor motes that self-organize via multi-hop communication to relay . Clustering protocols in WSNs further optimize energy use by grouping nodes into hierarchies, where cluster heads manage local and forwarding, extending network lifetime in deployments. In home environments, dynamic mesh networks extend coverage using principles, where nodes automatically form backhaul connections to eliminate dead zones. The IEEE 802.11s standard supports this by enabling mesh points to route traffic in a decentralized manner, allowing consumer devices like routers to self-configure for seamless whole-home . This extension improves reliability for streaming and smart home IoT integration without manual wiring. Healthcare applications utilize networks for monitoring in hospitals, where wearable sensors form temporary networks to transmit without relying on fixed infrastructure. Such systems enhance coverage in dynamic settings, like during patient transport, by enabling multi-hop relaying among devices to ensure continuous data flow to central monitors. Frameworks based on mobile ad hoc networks have demonstrated reliability in aggregating physiological data, supporting alerts for clinical staff. Post-2020, ad hoc networks have seen growth in integrations, particularly through (VANET) extensions for traffic data collection and management. Vehicles form dynamic networks to share congestion information, aiding urban traffic optimization and reducing delays. Recent reviews emphasize AI-enhanced VANETs for predictive , enabling scalable data dissemination in city-wide ecosystems. As of 2025, integrations with tactical systems are emerging for enhanced civilian applications like disaster management.

Challenges and Limitations

Technical and Performance Issues

Ad hoc networks face significant technical challenges due to their decentralized and dynamic nature, particularly in maintaining stable communication amid node . Topology changes arise primarily from node movement, which disrupts stability by causing frequent disconnections and reconnections. The impact is quantified through metrics like link expiration time (LET), which estimates how long a link between two nodes remains active before -induced . Higher mobility speeds exacerbate instability and increase overhead. Interference poses another core issue in ad hoc networks, amplified by the shared wireless medium. The hidden terminal problem occurs when two nodes cannot detect each other's transmissions but both attempt to send data to a common receiver, leading to collisions and packet loss at the receiver. Conversely, the exposed terminal problem arises when a node unnecessarily defers transmission because it senses a nearby ongoing transmission, even though its intended receiver is out of interference range, resulting in reduced spatial reuse and throughput inefficiency. These problems are inherent to carrier-sense multiple access (CSMA) mechanisms in ad hoc settings and can degrade performance by up to 50% in dense scenarios without mitigation. Energy consumption is a critical concern, especially in battery-powered devices, as multi-hop relaying requires intermediate nodes to forward packets, draining their resources disproportionately compared to or destination nodes. In a typical multi-hop path, nodes expend on both and , leading to uneven depletion and network partitioning when nodes deplete. algorithms address this by dynamically adjusting power levels to minimize use while maintaining , such as through common-power control (CPC) or transmit-power control (TPC) schemes that reduce power for shorter links. These approaches can extend network lifetime in simulations, though they trade off against increased risks. Bandwidth limitations further constrain ad hoc network performance due to the contention-based shared medium, where all nodes compete for the same , causing delays and reduced effective throughput. The Gupta-Kumar bound provides a theoretical upper limit on , stating that the total throughput for n nodes in an area A is approximately \Theta\left( W \sqrt{\frac{n}{A}} \right), where W is the ; per-node thus scales as \Theta\left( \frac{W}{\sqrt{n}} \right), demonstrating that throughput diminishes with size even under optimal conditions. This bound underscores the impracticality of scaling ad hoc networks for high-data-rate applications without support. Providing (QoS) in networks is particularly challenging for applications, such as voice or video streaming, which demand bounded and . Dynamic changes and make delay guarantees difficult, as packets may experience variable queuing and propagation times across unpredictable multi-hop paths. Admission and priority scheduling mechanisms attempt to prioritize flows, but their effectiveness is limited by the lack of centralized coordination, resulting in frequent violations of delay bounds under load.

Security and Scalability Concerns

Ad hoc networks, characterized by their decentralized and dynamic nature, face significant security threats due to the open wireless medium and absence of centralized infrastructure. Eavesdropping is a primary vulnerability, as the shared medium allows unauthorized nodes to intercept communications, compromising without inherent or mechanisms. Blackhole attacks involve malicious nodes advertising false shortest paths to attract traffic, only to drop packets and disrupt , while attacks tunnel packets between distant points to manipulate and prevent legitimate route discovery. These threats exploit the lack of built-in , enabling impersonation and injection of falsified data in the absence of trusted authorities. To counter these vulnerabilities, defense mechanisms emphasize decentralized approaches tailored to mobility. Key management schemes leverage network redundancies for threshold cryptography, distributing trust without a central server to enable secure pairwise keys and authentication. Intrusion detection systems (IDS) are designed as distributed agents on each node, monitoring local audit data and cooperating via shared confidence levels to detect anomalies like unusual packet drops or routing inconsistencies, achieving detection rates up to 99% in simulations for protocols such as AODV and DSR. These cooperative IDS integrate multi-layer evidence, adapting to topology changes unlike traditional centralized systems. Scalability concerns arise primarily from the in overhead as node density increases, particularly in flood-based reactive protocols like AODV, where route discovery floods can generate O(n²) control packets in dense networks with frequent connections. In sparse networks, induces partitioning, fragmenting the and invalidating routes, which requires frequent reconfigurations and increases control packet overhead to Ω(log² n) in hierarchical schemes. These issues limit effective operation to hundreds of nodes, as state and message overhead scale poorly beyond small-scale deployments. Privacy risks are amplified in specialized ad hoc variants like vehicular ad hoc networks (VANETs), where frequent beaconing exposes location trajectories, enabling adversaries to track vehicles via pseudonym linkage or global passive . Similar concerns apply to flying ad hoc networks (FANETs), though less documented, due to analogous broadcast dependencies in dynamic environments. Mitigation often involves silent periods or group-based anonymity to unlink positions without compromising safety-critical communications. Post-2020 advancements incorporate for secure routing, enhancing AODV by maintaining tamper-proof ledgers of node reputations and QoS via smart contracts, reducing malicious node selection and improving packet delivery to 90% in unsafe scenarios. , such as bidirectional generative adversarial networks in VANETs, achieves 92% accuracy in identifying intrusions by modeling imbalanced traffic patterns, outperforming traditional methods in resource-constrained settings. As of 2025, emerging challenges include interoperability with networks, where modes must handle ultra-high mobility and dense deployments, and advanced persistent threats leveraging for sophisticated attacks on protocols.

Future Directions

Integration with Emerging Technologies

networks are increasingly hybridized with and emerging paradigms, serving as edge extensions for device-to-device (D2D) communications to enable infrastructure-independent connectivity in dynamic environments. The Release 17, finalized in 2022, expands NR sidelink capabilities beyond (V2X) applications, supporting , group communications, and modes that facilitate formations for public safety and commercial use cases, thereby reducing reliance on centralized base stations. This hybridization extends to visions, where D2D integrates with non-terrestrial networks (NTN) for seamless coverage, as outlined in ongoing studies for Releases 18 and 19. Additionally, millimeter-wave (mmWave) bands enhance high-density mobile networks (MANETs) by leveraging directional antennas to combat and interference, achieving higher per-node throughput and network efficiency in outdoor scenarios with node densities up to hundreds per square kilometer. Artificial intelligence (AI) and machine learning (ML) integration further optimizes ad hoc operations, particularly through predictive routing and security enhancements. Reinforcement learning (RL)-based approaches, such as the Predictive Ad-hoc Routing fueled by Reinforcement Learning and Trajectory knowledge (PARRoT) protocol, predict node mobility in UAV swarms to select robust paths, resulting in up to 50% lower end-to-end latency and improved packet delivery ratios compared to reactive protocols like AODV. In flying ad hoc networks (FANETs), ML-driven anomaly detection employs hybrid models combining variational autoencoders (VAE) and long short-term memory (LSTM) networks to identify distributed denial-of-service (DDoS) attacks by analyzing temporal traffic patterns, attaining 99.3% accuracy in simulated NS-3 environments and outperforming standalone LSTM or autoencoder baselines. Edge computing complements these advancements by enabling task offloading in ad hoc IoT deployments, where devices delegate compute-intensive operations to nearby nodes or satellites to minimize . In satellite-mobile (SMEC) setups tailored for ad hoc IoT in remote areas, martingale-based optimization and temporal-enhanced stochastic learning algorithms reduce delay violation probabilities by 37% for applications, addressing intermittent links inherent to mobile ad hoc topologies. Security integration incorporates (PQC) for resilient , with lightweight schemes like Diophantine Key Exchange (DIKE) generating small keys (under 1 KB) to protect vehicular ad hoc networks (VANETs) against quantum algorithms such as Shor's, while maintaining low overhead in blockchain-secured communications. A prominent example of this integration appears in NTN architectures, where FANETs of unmanned aerial vehicles (UAVs) extend terrestrial coverage as per IMT-2030 projections from 2023 studies. guidelines in Releases 17–19 emphasize NTN-terrestrial network convergence, with FANETs using AI-optimized non-orthogonal multiple access () to boost in public safety scenarios, stabilizing performance at 70 nodes despite increasing data loads. These developments position ad hoc networks as vital enablers for 's global, resilient connectivity. Recent research in ad hoc networks during the has increasingly focused on AI-driven optimizations to enhance performance in dynamic environments. algorithms, particularly and graph neural networks, are being integrated for dynamic spectrum access, enabling nodes to intelligently sense and utilize underutilized bands while minimizing in cognitive radio-based ad hoc setups. For instance, fusion models combining graph neural networks with deep Q-networks have demonstrated improved spectrum efficiency in ad hoc scenarios by adapting to variations. Sustainability efforts emphasize green protocols tailored for energy-harvesting nodes in IoT ad hoc networks, aiming to reduce reliance on batteries through ambient energy sources like or RF harvesting. These protocols incorporate techniques and wake-up radios to optimize duty cycles, achieving up to 50% savings in self-sustainable deployments while maintaining in resource-constrained environments. Research highlights communication as a key enabler, allowing nodes to reflect existing signals for data transmission without active transmission power, thus supporting prolonged operation in dense meshes. Standardization initiatives, such as enhancements in ( 7, ratified in 2024), are extending support for topologies through features like multi-link operations and improved spatial reuse, which facilitate higher throughput and lower latency in configurations. These updates enable seamless integration of modes in residential and , with potential throughput exceeding 40 Gbps in aggregated links. Key research gaps persist in areas like 6G-enabled networks for holographic communications, where high-bandwidth, low-latency requirements demand novel architectures to support immersive data streams amid mobility challenges. Cross-layer models address these by jointly optimizing , , and across layers, though in heterogeneous environments remains underexplored. Emerging trends include a shift toward ad hoc-cellular architectures, leveraging cellular backhaul for extended coverage in vehicular and applications while retaining ad hoc flexibility for local coordination. Additionally, simulations are gaining traction for testing vehicular ad hoc networks (VANETs), providing real-time replicas to validate protocols under urban scenarios without physical deployments. Projections indicate widespread adoption of networks in ecosystems and autonomous systems by 2030, driven by needs for decentralized, low-latency in virtual worlds and vehicle swarms, potentially generating trillions in economic impact through integrated / infrastructures.

References

  1. [1]
    [PDF] Ad Hoc Wireless Networks - Temple CIS
    An ad hoc wireless network consists of mobile hosts operating without a central infrastructure, communicating through wireless links among mobile hosts.
  2. [2]
    [PDF] Wireless Ad-hoc Networks Abstract 1. Introduction
    Oct 8, 2004 · Mobile Ad-hoc Networks are a collection of two or more devices equipped with wireless communications and networking capability.
  3. [3]
    Wireless ad hoc networking—The art of networking without a network
    ... Ad hoc networking refers to the utilisation of wireless technologies to establish network connections between devices without the need for pre-existing ...
  4. [4]
    [PDF] SEAD: secure efficient distance vector routing for mobile wireless ad ...
    An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any ...
  5. [5]
    Mobile ad hoc networking and the IETF - ACM Digital Library
    A Mobile Ad hoc NETwork (MANET) consists of mobile plat- forms (each platform logically consisting of a router, possibly. 1. 9. Page 2. RID: Router Identifier.
  6. [6]
    [PDF] AD HOC NETWORKING OVERVIEW AND APPLICATION TO A ...
    An ad hoc network is a collection of nodes that can discover one another and operate in an autonomous manner without relying on pre-existing or pre-defined ...
  7. [7]
    (PDF) A Survey on Ad Hoc Networks - ResearchGate
    Nov 20, 2016 · One of the main characteristics of ad hoc networks is that they are self-organizing, which necessitates that all networking functions be ...
  8. [8]
    [1503.03233] Security challenges in mobile ad hoc networks:a survey
    Mar 11, 2015 · In this paper, we present an elaborate view of issues in MANET security. Based on MANETs special characteristics, we define three security parameters for MANET.Missing: key | Show results with:key
  9. [9]
    Topology control and routing in ad hoc networks: a survey
    In this article, we review some of the characteristic features of ad hoc networks, formulate problems and survey research work done in the area.
  10. [10]
    Computer Networks—The ALOHA System - PMC - PubMed Central
    The ALOHA System, an experimental UHF radio computer communication network, was developed at the University of Hawaii, 1970–76.
  11. [11]
    [PDF] Chapter 3 Advances in Communications - SRI International
    Network (PRNET), sponsored at SRI by the. DoD's Advanced Research Projects Agency. (ARPA) starting about 1973. Placing a terminal on one of the wooden ...Missing: origins | Show results with:origins
  12. [12]
    Hobbes' Internet Timeline - the definitive ARPAnet & Internet history
    Packet Radio Network (PRNET) experiment starts with DARPA funding. Most communications take place between mobile vans. ARPANET connection via SRI. On April ...
  13. [13]
    Functional Summary of the DARPA SURAP1 Network - DTIC
    The Survivable Radio Networks SURAN program was established in 1983, under the sponsorship of the Defense Advanced Research Projects Agency DARPA, ...Missing: 1980s adaptive
  14. [14]
    The Birth and Growth of Wireless Ad Hoc Networks
    Oct 11, 2024 · Ad-Hoc Networking ... The idea was to permit a set of nodes with the capability of transmitting and receiving wirelessly to organize themselves ...
  15. [15]
    Video streaming over mobile wireless ad hoc networks
    At the end of the 1990s, the IEEE 802.11 subcommittee adopted the term “ad hoc model” to denote a new communication paradigm in which nearby nodes can ...
  16. [16]
    Highly dynamic Destination-Sequenced Distance-Vector routing ...
    DSDV makes each mobile host a router, advertising its topology view, using modified Bellman-Ford routing for dynamic, self-starting networks.Missing: original | Show results with:original
  17. [17]
    [PDF] The Dynamic Source Routing Protocol (DSR) for Mobile Ad ...
    The Dynamic Source Routing protocol is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile ...
  18. [18]
    RFC 3561: Ad hoc On-Demand Distance Vector (AODV) Routing
    The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network.
  19. [19]
    RFC 3626: Optimized Link State Routing Protocol (OLSR)
    This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link ...
  20. [20]
    RFC 2501: Mobile Ad hoc Networking (MANET)
    Goals of IETF Mobile Ad Hoc Network (manet) Working Group The intent of the newly formed IETF manet working group is to develop a peer-to-peer mobile ...Missing: history timeline
  21. [21]
    Mobile Ad-hoc Networks (manet) - IETF Datatracker
    The purpose of the MANET working group is to standardize IP routing protocol functionality suitable for wireless routing applications.
  22. [22]
    Communications networks for the force XXI digitized battlefield
    NTDR architecture. 4. Near-Term Digital Radio (NTDR). The objective of the NTDR program is to acquire a data- transport system for users at brigade and below ...
  23. [23]
    Release 15 - 3GPP
    Apr 26, 2019 · The scope of Release 15 expands to cover 'standalone' 5G, with a new radio system complemented by a next-generation core network.Missing: Ad hoc 4G 2015
  24. [24]
    [PDF] 5G sidelink brings new system efficiencies and opportunities
    Sep 8, 2022 · 5G support for sidelink started in 3GPP Release 16. 5G NR Sidelink. Release 16. Technical foundation applicable for broader sidelink use cases.
  25. [25]
    Bramor C4EYE - C-Astral Aerospace
    MANET RADIOS. MANET (Mobile Ad Hoc Network) secure digital communications. High-speed wireless IP networking; Network relay to send and receive IP data; 1775 ...Missing: 2021 | Show results with:2021
  26. [26]
    [PDF] From MANET to people-centric networking: milestones and open ...
    Oct 22, 2014 · Abstract. In this paper we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the.<|control11|><|separator|>
  27. [27]
    Mobile Adhoc Network (MANET) - an overview | ScienceDirect Topics
    A mobile ad hoc network (MANET) is a decentralized wireless network formed by mobile devices such as laptops, personal digital assistants (PDAs), mobile phones, ...Introduction to Mobile Ad Hoc... · Architecture, Characteristics...
  28. [28]
    [PDF] Chapter 1 A SURVEY OF MOBILITY MODELS - UF CISE
    Abstract: A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure ...
  29. [29]
    A Probabilistic Analysis of Path Duration Using Routing Protocol in ...
    Jul 17, 2014 · The relative velocity between nodes is inversely proportional to the link duration. The relative velocity of the source node and next-hop ...
  30. [30]
    [PDF] P2Pnet: A MANET Based Emergency Communication System for ...
    Disaster response workers, voluntary or mission-specific professional, could use their own laptops to construct a multi-hop ad-hoc network to construct a basic ...
  31. [31]
    Building Realistic Mobility Models for Mobile Ad Hoc Networks - MDPI
    A mobile ad hoc network (MANET) is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink.
  32. [32]
    [PDF] PERFORMANCE COMPARISON OF MOBILITY MODELS IN ...
    Throughput and end to end delay are the performance metrics used to measure the performance of MANET. Throughput is the average rate of data packets.
  33. [33]
    Vehicular Ad-hoc Network - an overview | ScienceDirect Topics
    VANETs, or vehicular ad hoc networks, can be defined as an extension of mobile ad hoc networks where vehicles function as mobile nodes, ...
  34. [34]
    [PDF] Advances in Vehicular Ad-Hoc Networks (VANETs)
    Vehicular Network consists of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications supported by wireless access technologies such as IEEE ...
  35. [35]
    [PDF] VANET: Superior System for Content Distribution in Vehicular ...
    vehicles themselves, operating at speeds up to 200 km/h, handling communication ranges as high as. 1,000 meters. PHY and MAC layers are based on. IEEE 802.11a ...
  36. [36]
    IEEE 802.11p-2010
    802.11-2020/Cor 2-2024​​ 11-2020/Cor 2-2024 was approved on February 15, 2024. This corrigendum is included in IEEE Std 802.11bc-2023 and was not published as a ...
  37. [37]
    Performance and Reliability Analysis of IEEE 802.11p Safety ...
    Oct 4, 2013 · IEEE 802.11p is a protocol that has been standardized as the medium access control (MAC) layer of the DSRC standard. Due to the highly dynamic ...
  38. [38]
    Load-Aware and Priority Adaptive Traffic Congestion Control ...
    Jul 16, 2024 · The acceptable maximum bandwidth on VANET as stated in [4] for a vehicle can move with a speed of up to 200km/h covering a communication extend ...
  39. [39]
    A Middleware Architectural framework for Vehicular Safety over ...
    A Middleware Architectural framework for Vehicular Safety over VANET (InVANET) ... Abstract: Vehicular ad-hoc networks (VANET) belonging to family of ad-hoc uses ...
  40. [40]
    [PDF] A Tutorial on 5G NR V2X Communications - arXiv
    This paper presents an in-depth tutorial of the 3GPP Release 16 5G NR V2X standard for V2X communications, with a particular focus on the sidelink, since it is ...
  41. [41]
    Release 16 - 3GPP
    Release 16 will be "5G phase 2" and will be completed in June 2020 (TSGs#88) - See adjustment noted above. Original schedule: Image. This ...Missing: VANET | Show results with:VANET
  42. [42]
    (PDF) Flying ad-hoc networks (FANETs): a survey - ResearchGate
    Aug 6, 2025 · In this paper, Flying Ad-Hoc Network (FANET), which is basically ad hoc network between UAVs, is surveyed as a new network family.
  43. [43]
    Flying Ad Hoc Networks: A New Domain for Network Communications
    In this paper, we review mobility, positioning, and propagation models proposed for FANETs in the related scientific literature.Missing: intermittent | Show results with:intermittent
  44. [44]
    Scalability analysis of Flying Ad Hoc Networks (FANETs)
    Jan 19, 2015 · In this paper, we present an analytical study to specify the maximum number of active UAV node pairs for three dimensional (3D) flight scenarios ...
  45. [45]
    Routing protocols strategies for flying Ad-Hoc network (FANET)
    The purpose of this paper is to provide a comprehensive analysis of the most important FANET characteristics, mobility models, applications, and routing ...
  46. [46]
    RFC 3561 - Ad hoc On-Demand Distance Vector (AODV) Routing
    The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network.
  47. [47]
    [PDF] Highly Dynamic Destination-Sequenced Distance-Vector Routing
    The D S D V protocol requires each mobile station to advertise, to each of its current neighbors, its own rout- ing table (for instance, by broadcasting its ...Missing: original | Show results with:original
  48. [48]
    RFC 3626 - Optimized Link State Routing Protocol (OLSR)
    This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link ...
  49. [49]
    [PDF] A Performance Analysis of Routing Protocols for ad-hoc Networks
    Routing Overhead (ROH). The routing overhead is the total amount of control data packets sent by the rout- ing protocol throughout the duration of the ...
  50. [50]
    [PDF] Dynamic Source Routing in Ad Hoc Wireless Networks
    We believe our dynamic source routing protocol offers a number of potential advantages over conven- tional routing protocols such as distance vector in an ad ...
  51. [51]
    The Dynamic Source Routing Protocol (DSR) for Mobile - » RFC Editor
    This document specifies the operation of the DSR protocol for routing unicast IPv4 packets. Johnson, et al. Experimental [Page 1] RFC 4728 The Dynamic Source ...Missing: paper | Show results with:paper
  52. [52]
    The performance of query control schemes for the zone routing ...
    In this paper, we study the performance of route query control mechanisms for the recently proposed Zone Routing Protocol (ZRP) for ad-hoc networks.
  53. [53]
    [PDF] Determining the optimal configuration for the zone routing protocol
    In this paper, we address the issue of configuring the ZRP to provide the best performance for a particular network at any time. Previous work has demonstrated ...
  54. [54]
    [PDF] GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
    GPSR makes greedy forwarding decisions us- ing only information about a router's immediate neighbors in the network topology. When a packet reaches a region ...
  55. [55]
    A high-throughput path metric for multi-hop wireless routing
    This paper presents the expected transmission count metric (ETX), which finds high-throughput paths on multi-hop wireless networks.
  56. [56]
    DSDV Routing — Model Library
    Jul 7, 2022 · DSDV routing protocol is a pro-active, table-driven routing protocol for MANETs developed by Charles E. Perkins and Pravin Bhagwat in 1994.
  57. [57]
    Exploring MANET Routing Protocols - INET Framework
    If you already have INET and OMNeT++ installed, start the IDE by typing omnetpp , import the INET project into the IDE, then navigate to the inet/showcases/ ...
  58. [58]
    [PDF] Evaluating wireless ad hoc network protocols with NS-3
    May 20, 2025 · This research evaluates AODV, DSDV, and OLSR routing protocols in wireless ad hoc networks using NS-3 simulator, measuring performance under ...
  59. [59]
    [PDF] Hidden vs. Exposed Terminal Problem in Ad hoc Networks
    However, the use of RTS/CTS-like schemes introduces the “exposed terminal problem”1, where some nodes that heard the RTS/CTS exchange refrain from transmission.
  60. [60]
  61. [61]
    (PDF) HYMAC: hybrid TDMA/FDMA medium access control protocol ...
    For instance, hybrid Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) schemes have been proposed to improve scalability and ...<|separator|>
  62. [62]
    [PDF] A Feedback Based Scheme For Improving TCP Performance In Ad ...
    To compare the behavior of TCP with that of the proposed TCP-F mechanism, as a prelim- inary study, we simulated a single unidirectional bulk transfer session.
  63. [63]
    [PDF] Cross-layer Congestion Control, Routing and Scheduling Design in ...
    Abstract— This paper considers jointly optimal design of cross- layer congestion control, routing and scheduling for ad hoc wireless networks.
  64. [64]
    [PDF] Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare
    An alternative approach is to use a partial or full mesh topology. In these configurations, some nodes, in a partial mesh, or all nodes, in a full mesh, act ...Missing: Decline smartphone
  65. [65]
    How the U.S. military helped develop mobile mesh networking
    Jul 30, 2020 · An incremental, evolutionary program, SURAN was tasked with developing survivable network management and data transport protocols for large- ...Missing: 1980s | Show results with:1980s
  66. [66]
    Joint Tactical Networks (JTN). - National Technical Reports Library
    Joint Tactical Networks (JTN) develops and sustains portable, interoperable, and mobile ad hoc networking software-defined waveforms for Joint operations, as ...
  67. [67]
    [PDF] The Evolution of Hastily Formed Networks for Disaster Response
    Mar 18, 2011 · For example, during the 2011 Japan Earthquake response, the government limited the use of C and Ku band satellites, forcing responders to ...
  68. [68]
    RDSP: Rapidly Deployable Wireless Ad Hoc System for Post ...
    Jan 19, 2020 · In this work, we propose a rapidly deployable system using multi-hop relays for a post-disaster wireless ad hoc network, named RDSP. The RDSP ...<|separator|>
  69. [69]
    Hybrid ant colony-based inter-cluster routing protocol for FANET
    Jul 7, 2024 · This method optimizes the transmission time of data in the network, making the path as short and efficient as possible. ... If the node receives a ...
  70. [70]
    Bramor C4EYE - Wikipedia
    The Bramor C4EYE (or otherwise known as Belin [1] ) is a tactical reconnaissance UAV classified as a NATO class 1 mini tactical drone with less than 5 kg MTOW.Missing: ad hoc
  71. [71]
    (PDF) Performance Evaluation of Ad Hoc Routing Protocols for ...
    Reactive routing protocols introduce a medium to high latency. •Proactive behavior. Proactive behavior is preferable when low latency is the main concern and.
  72. [72]
    Development of Mobile Ad-hoc Networks over Wi-Fi Direct with off ...
    With the proliferation of Android smart phones, it should be possible to set up Mobile Ad-hoc Networks (MANETs) to share information anywhere, anytime. To ...
  73. [73]
    [PDF] Wi-Fi Direct Based Mobile Ad hoc Network - arXiv
    This paper describes a Wi-Fi Direct based multi hop mobile ad hoc network. More specifically, a routing layer has been developed to support communication ...Missing: file | Show results with:file
  74. [74]
    Creating Real-Time Multiplayer Games Using Ad-Hoc Networking ...
    Our team chose to research the feasibility of implementing a real-time multiplayer game between two Android devices, specifically HTC Nexus Ones.
  75. [75]
    [PDF] The BlueGame Project: Ad-hoc Multilayer Mobile Game with Social ...
    The paper presents the BlueGame project – an ad-hoc multi- player mobile game based on the Dungeons&Dragons board game. The main idea lies in the adoption ...<|separator|>
  76. [76]
    [PDF] Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy ...
    Abstract—Prolonged network lifetime, scalability, and load balancing are important requirements for many ad-hoc sensor network applications. Clustering ...
  77. [77]
  78. [78]
    [PDF] IEEE 802.11s Tutorial
    Nov 1, 2006 · The mesh network should help to eliminate RF dead-spots and areas of low-quality wireless coverage throughout the home. High-bandwidth ...
  79. [79]
  80. [80]
  81. [81]
    Design and Implementation of a Framework for Monitoring Patients ...
    Design and Implementation of a Framework for Monitoring Patients in Hospitals Using Wireless Sensors in Ad Hoc Configuration · 8 Citations · 18 References.
  82. [82]
    A Comprehensive Review of Recent Developments in VANET for ...
    Aug 8, 2024 · This article provides a comprehensive view of network technologies, data acquisition devices, clustering techniques, and energy-efficient routing protocols.
  83. [83]
    The Evolution of VANET: A Review of Emerging Trends in Artificial ...
    Mar 25, 2025 · ABSTRACT This paper presents an in-depth look at the evolution of Vehicular Ad Hoc Networks (VANET) and their increasing importance in the ...
  84. [84]
    A mathematical framework for link failure time estimation in MANETs
    Due to mobility, nodes may go beyond the communication range of each other and lead to link failure. Failure of those links which are part of a route may ...
  85. [85]
    [PDF] Link Stability in MANETs Routing Protocols - UPV
    In [2] a mobility metric (link duration) is defined, attempting to quantify the effect of node movement in order to develop an adaptive ad hoc network protocol.Missing: reconnection | Show results with:reconnection
  86. [86]
    Power control algorithms for mobile ad hoc networks - ScienceDirect
    Power control algorithms are an important consideration in mobile ad hoc networks since they can improve network capacity and lifetime.
  87. [87]
    [PDF] Power Control in Wireless Ad Hoc Networks for Energy Efficient ...
    In this paper, we present a simple and energy efficient on-demand routing scheme by using discrete level of power control and priority based packet scheduling.
  88. [88]
    [PDF] The capacity of wireless networks
    In this paper we analyze the capacity of wireless networks. We ... GUPTA AND KUMAR: THE CAPACITY OF WIRELESS NETWORKS. 389. Fig. 1. An ad hoc wireless network.
  89. [89]
    Challenges and solutions of QoS provisioning for real time traffic in ...
    The need to transmit real time traffic over mobile ad hoc network is rising. Real time applications have quality of service requirements such as delay, ...
  90. [90]
    [PDF] quality of service in ad hoc wireless
    Real-time applications require mechanisms that guarantee bounded delay and delay jitter. The end-to-end delay in packet delivery includes the queuing delay at ...
  91. [91]
    A SURVEY OF ATTACKS AND COUNTERMEASURES IN MOBILE ...
    For example, when a wormhole attack is used against an on-demand routing protocol such as DSR or AODV, the attack could prevent the discovery of any routes ...
  92. [92]
    [PDF] Intrusion Detection Techniques for Mobile Wireless Networks ∗
    Intrusion detection and response systems should be both distributed and cooperative to suite the needs of mobile ad-hoc networks. In our proposed architecture.
  93. [93]
    [PDF] Routing Scalability in MANETs - University of California, Riverside
    Typical metrics that are used to evaluate routing protocols are overall message or byte overhead, amount of per-node state to be maintained, latency and total ...
  94. [94]
    [PDF] CARAVAN: Providing Location Privacy for VANET - Research
    In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications. We first,.
  95. [95]
    An improved AODV routing security algorithm based on blockchain ...
    Mar 9, 2021 · The application of blockchain technology in Ad Hoc networks routing security is a new method, and there are many aspects that need further study, such as data ...
  96. [96]
    Artificial Intelligence-based intrusion detection system for V2V ...
    Apr 17, 2024 · To cope with these issues, this paper presents an artificial intelligence-based intrusion detection system for V2V communication in vehicular ad hoc networks.
  97. [97]
    Release 17 - 3GPP
    Network automation for 5G (Phase 2). During 2022, Release 18 started its progress - becoming the main focus from June onwards. Some Background on Release 17.Missing: ad hoc 6G D2D communication
  98. [98]
    Performance Analysis of Outdoor mmWave Ad Hoc Networks
    Insufficient relevant content. The provided content only includes a title and a partial URL, with no substantive information available for extraction or summarization regarding the performance analysis of outdoor mmWave ad hoc networks, high-density scenarios, or benefits for MANETs.
  99. [99]
    [2012.05490] PARRoT: Predictive Ad-hoc Routing Fueled by ... - arXiv
    Dec 10, 2020 · For addressing these challenges, we present Predictive Ad-hoc Routing fueled by Reinforcement learning and Trajectory knowledge (PARRoT) as a ...
  100. [100]
    Hybrid Deep Learning for Anomaly Detection in FANETs
    Jun 12, 2024 · We present VLDD-FANET (VAE-LSTM for DDoS Detection in FANETs), a novel framework designed to identify anomalies in FANETs.
  101. [101]
    Task offloading in satellite-MEC networks for latency-sensitive IoT ...
    Oct 24, 2025 · Mobile edge computing (MEC) addresses this challenge by offloading computational tasks from IoT user devices (UDs) to edge servers, thereby ...
  102. [102]
    Secured Small-Key-Based Post Quantum Cryptographic Scheme for ...
    Feb 9, 2024 · It uses large-size keys, which increase the complexity of the decryption of the key, such as a lattice-based architecture. Hash-based ...
  103. [103]
    [PDF] Non-Terrestrial Networks for 6G: Integrated, Intelligent and ... - arXiv
    Jul 2, 2024 · Therefore, in this article, we have illustrated through 3GPP guidelines, on how NTN and. TN can effectively be integrated. Moreover, the role of ...
  104. [104]
    Artificial Intelligence Empowering Dynamic Spectrum Access in ...
    Oct 10, 2025 · This review paper examines the integration of artificial intelligence (AI) in wireless communication, focusing on cognitive radio (CR), ...
  105. [105]
    Dynamic spectrum access for Internet-of-Things with joint GNN and ...
    In this paper, we propose a dynamic spectrum access method based on a fusion algorithm of graph neural network (GNN) and deep Q network (DQN), improving ...
  106. [106]
    How Beyond-5G and 6G Makes IIoT and the Smart Grid Green—A ...
    We examine major technological enablers for green IoT, including low-power wide-area networks (LPWAN), wake-up radios, energy harvesting methods, and edge ...
  107. [107]
    A Survey on Green Designs for Energy Harvesting Backscatter ...
    This technology opens up new opportunities for green and sustainable IoT development, reducing dependence on traditional power sources and offering the ...
  108. [108]
    Next Generation Wi-Fi Mesh for Indoor Residential Deployments
    ... mesh network [15] . IEEE 802.11be, the standard Wi-Fi 7 over which the next generation Wi-Fi is going to be built, presents a number of enhancements, which ...<|separator|>
  109. [109]
    [PDF] The Next Generation of Wi-Fi Technology Beyond 802.11ax
    In this article, we introduce to the wireless community the next generation Wi-Fi, based on. IEEE 802.11be Extremely High Throughput (EHT), present the main ...
  110. [110]
    Will Holograms Drive 6G's Performance Leap?
    Aug 9, 2024 · Holographic MIMO offers a promising trajectory in shaping energy efficient communications and sensing in future 6G commercial applications.
  111. [111]
    [PDF] Where 6G Stands Today: Evolution, Enablers, and Research Gaps
    Sep 23, 2025 · This paper offers a comprehensive overview of 6G, beginning with its main stringent requirements while focusing on key enabling technologies ...
  112. [112]
    (PDF) Journal for Current Sign REDESIGNING CROSS-LAYER ...
    Oct 9, 2025 · The traditional OSI model is being replaced in ad hoc networks by a cross-layer approach due to dynamic topologies and poor radio conditions.
  113. [113]
    Enhancing Communication Networks in the New Era with Artificial ...
    This study explores key AI applications, including traffic prediction, load balancing, intrusion detection, and self-organizing network capabilities.
  114. [114]
    Digital Twin-boosted Autonomous Attack Detection for Vehicular Ad ...
    Feb 9, 2024 · This structure forms a comprehensive cyber-twin framework within vehicular ad hoc networks (VANET). Our system is segmented into three layers: ...
  115. [115]
    Hierarchical Federated Transfer Learning in digital twin-based ...
    Feb 28, 2025 · In recent research on the Digital Twin-based Vehicular Ad hoc Network(DT-VANET), Federated Learning (FL) has shown its ability to provide data ...
  116. [116]
    A Moving Metaverse: QoE challenges and standards requirements ...
    By the year 2030, the metaverse is expected to present a lucrative opportunity, estimated to reach a value of $626.5 billion [7].
  117. [117]
    Digital Twin Technology for Intelligent Vehicles and Transportation ...
    Abstract—This survey provides a comprehensive analysis of digital twin (DT) technology as a transformative tool for advanc- ing connected and autonomous ...