LSOARP: A Link Stability and Obstacle-Aware Routing Protocol for UAV Networks
Jun 30, 2025
DOI:
Published in: Journal of Soft Computing and Data Mining
As using Unmanned Aerial Vehicles (UAVs) continues to grow across military, environmental, and public safety sectors, we are seeing a fast development of Flying Ad Hoc Networks (FANETs). Despite this progress, creating reliable routing protocols for UAVs remains complex because of their high mobility, constantly changing network topology, frequent link drops, and physical obstacles in the environment. Current protocols often overlook the importance of link stability and obstacle-aware navigation, which can lead to decreased performance in real-world applications. We present LSOARP: a Link Stability and Obstacle-Aware Routing Protocol customized for UAV networks. This new protocol combines Bézier-curve-based trajectory adjustments for better obstacle avoidance with a multi-criteria link evaluation that considers residual link lifetime, energy efficiency, and route availability. We model UAV movement using a realistic prediction mechanism that captures various states such as high, low, idle, and paused. Routing decisions are then made using a weighted cost function to select the most stable and energy-efficient paths, ensuring strong network performance. Simulation experiments conducted under different conditions—including varying node density, speed, pause times, and traffic loads—show that LSOARP considerably outperforms traditional protocols like RLPR and AODV. It offers higher packet delivery ratios, lower end-to-end delays, reduced energy consumption, and less control overhead. These promising results demonstrate that LSOARP is both scalable and reliable in complex UAV environments, making it a strong candidate for real-time FANET applications.
Other Researches
Modified YOLOv8x model for coronary stenosis detection and troponin risk stratification
Detection of coronary artery stenosis and risk stratification of troponin play a pivotal role in offering early diagnosis and treatment of cardiovascular diseases. In this paper, an improved deep learning framework that allows using both spatial and...
PUF-Enabled Key-Exchange Protocol for Vehicular Ad-Hoc Networks
The Internet of Vehicles (IoV) enables data exchange among individuals, cloud resources, road infrastructures, and vehicles, interconnected through Vehicular Ad Hoc Networks (VANETs). VANETs comprise vehicles with Onboard Units (OBUs), Roadside Unit...
Generalizing location-centric variations to enhance contactless human activity recognition
Contactless Human Activity Recognition (HAR) has played a critical role in smart healthcare and elderly care homes to monitor patient behavior and detect falls or abnormal activities in real time. The effectiveness of non-invasive HAR is often hinde...
Filtered orthogonal frequency division multiplexing (F-OFDM), employed in visible light communication (VLC) systems, has been considered a promising technique for overcoming OFDM’s large out-of-band emissions and thus reducing bandwidth efficiency. ...
Malware Detection with Subspace Learning-based One-Class Classification
Detecting malware is crucial for ensuring the security of computer systems. Traditional machine learning models face challenges in effectively detecting malware, mainly due to the class imbalance problem, where the number of malware samples is signi...
The filtered-orthogonal frequency division multiplexing (F-OFDM) scheme has gained attention as a promising solution in the field of visible light communication (VLC) systems. One crucial aspect in VLC is the conversion of the complex F-OFDM signal ...
Wildfires are common disasters that have long-lasting climate effects and serious ecological, social, and economic effects due to climate change. Since Earth observation (EO) satellites were launched into space, remote sensing (RS) has become a more...
Impact of portable executable header features on malware detection accuracy
One aspect of cybersecurity incorporates the study of Portable Executable (PE) file maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an ex...
Novel partial overlapped gaussian pulse multi-access system aided by data analysis
Orthogonal frequency-division multi-access (OFDMA) systems have limited flexibility to improve efficiency due to their dependency on subcarrier orthogonality. As a result of this restriction, attention has shifted to a new multi-access communication...
YOLO-V3 based real-time drone detection algorithm
Drones are currently being used in a wide range of useful tasks that are too dangerous and/or expensive to be performed by humans. However, this is increasingly developing security breaching issues due to the possibility of misuse of unmanned aircra...