Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

  • Published: 18 April 2020
  • Volume 114 , pages 483–517, ( 2020 )

Cite this article

research papers ad hoc

  • Mehdi Boulaiche 1  

635 Accesses

18 Citations

Explore all metrics

The diverse network technologies and low-end wireless technologies have enabled the deployment of self-organized wireless ad hoc networks. Nodes forming such networks have the ability to autonomously organize and cooperate among them to form an infrastructure that allows data communication in the network. Routing protocols constitute the core of this cooperation. Many routing protocols have been developed to achieve data communication in wireless ad hoc networks and a large number of high quality research papers have appeared and addressed the issue of routing at length. Although they have proved their effectiveness, these routing protocols have been designed for trustworthy environments without any security requirements. However, the presence of an adversary in the network can degrade the routing functionalities and may breaking down the entire network. Therefore, securing routing protocols in such networks becomes an issue. In this paper, we survey the-state-of-the-art of secure routing protocols proposed in the literature that address routing security issue, classifying secure routing protocols in categories according to the secured protocol, and finally discussing the proposed solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research papers ad hoc

Similar content being viewed by others

research papers ad hoc

Secure Routing Protocol for MANET: A Survey

research papers ad hoc

Secure Routing Technique in MANET: A Review

research papers ad hoc

On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks

Fleury, M., Kanellopoulos, D., & Qadri, N. N. (2019). Video streaming over MANETs: An overview of techniques. Multimedia Tools and Applications, 78 , 23749–23782.

Google Scholar  

Anjum, S. S., Md Noor, R., & Anisi, M. H. (2017). Review on MANET based communication for search and rescue operations. Wireless Personal Communications, 94 , 31–52.

Boukerche, A., et al. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55 (13), 3032–3080.

Moussaoui, A., & Boukeream, A. (2015). A survey of routing protocols based on link-stability in mobile ad hoc networks. Journal of Network and Computer Applications, 47 , 1–10.

Robinson, Y. H., & Julie, E. G. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109 , 739–760.

Mohandas, R., & Krishnamoorthi, K. (2017). MANET security betterment by enhanced multiple key management scheme. Wireless Personal Communications, 94 , 2173–2188.

Ramesh, V., Subbaiah, D. P., Rao, N. K., & Raju, M. J. (2010). Performance comparison and analysis of DSDV and AODV for MANET. International Journal on Computer Science and Engineering, 2 (02), 183–188.

Ade, S. A., & Tijare, P. A. (2010). Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. International Journal of Information Technology and Knowledge Management, 2 (2), 545–548.

Mulert, J., Welch, I., & Seah, W. K. G. (2012). Security threats and solutions in MANETS: A case study using AODV and SAODV. Journal of Network and Computer Applications, 35 (4), 1249–1259.

Stojmenovic, I. (2002). Position-based routing in ad hoc networks. IEEE Communications Magazine, 40 (7), 128–134.

Mauve, M., Widmer, J., Hartenstein, H., & Europs, N. (2001). A survey on position based routing in mobile ad hoc networks. IEEE Network, 15 (6), 30–39.

Tao, S., Ananda, A. L., & Chan, M. C. (2010). Greedy face routing with face identification support in wireless networks. Computer Networks, 54 , 3431–3448.

MATH   Google Scholar  

Chen, D., & Varshney, P. K. (2007). A survey of void handling techniques for geographic routing in wireless networks. IEEE Communications Surveys and Tutorials, 9 (1), 50–67.

Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254), CM Press.

Frey, H., & Stojmenovic, I. (2006). On delivery guarantees of face and combined greedy face routing in ad hoc and sensor networks. In Proceedings of the 12th international conference on mobile computing and networking (pp. 390–401).

Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications Journal, 51 , 1–20.

Cai, R. J., Tan, W. C., & Chong, P. H. J. (2017). An overview of trust-based routing design under adversarial mobile ad hoc network environment. Wireless Personal Communications, 96 , 3923–3946.

Vasudeva, A., & Sood, M. (2018). Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, 120 , 78–118.

Rehman, A., Rehman, S. U., & Raheem, H. (2019). Sinkhole attacks in wireless sensor networks: A survey. Wireless Personal Communications, 106 , 2291–2313.

Kaur, P., Kaur, D., & Mahajan, R. (2017). Simulation based comparative study of routing protocols under wormhole attack in Manet. Wireless Personal Communications, 96 , 47–63.

Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications, 36 (2), 582–592.

Kaur, P., Kaur, D., & Mahajan, R. (2017). Wormhole attack detection technique in mobile ad hoc networks. Wireless Personal Communications, 97 , 2939–2950.

Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad HOC Networks, 1 (1), 175–192.

Wan, T., Kranakis, E., &Van oorschot, P. (2004). Securing the destination sequenced distance vector routing protocol (s-dsdv). In Proceedings of 6th international conference on information and communications security (pp. 358–374).

Wang, J., Chen, H., & Lin, Y. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5 (8), 942–948.

Ye, Y., Feng, S., Liu, M., Sun, X., Xu, T., & Tong, X. (2018). A safe proactive routing protocol sdsdv for ad hoc network. International Journal of Wireless Information Networks, 25 , 348–357.

Halfslund, A., Tonnesen, A., Rotvik, R. B., Andersson, J., & Kure, O. (2004). Secure extension to the OLSR protocol. In Proceedings of the OLSR interop and workshop , San Diego.

Raffo, D., Clausen, T., Adjih, C., & Muhlethaler, P. (2004). An advanced signature system for OLSR. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, SASN 04 (pp. 10–16).

Papadimitratos, P. & Haas, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In Proceedings of the IEEE workshop on security and assurance in ad hoc networks , Orlando, FL (pp. 379–383).

Tan, S., Li, X., & Dong, Q. (2015). Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Networks, 30 , 84–98.

Robert, J.-M., Otrok, H., & Chriqi, A. (2012). RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Computer Communications, 35 , 487–499.

Marimuthu, M., & Krishnamurthi, I. (2013). Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks, 15 (1), 31–37.

Zapata, M. G. & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 2002 ACM workshop on wireless security (WiSe2002) (pp. 1–10) Atlanta Georgia, USA.

Li, Q., Hu, C. Y., Zhao, M., Perrig, A., Walker, J. & Trappe, W. (2008). SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks. In Proceedings of the 2008 ACM symposium on information computer and communications security, ASIACCS'08 . New York, NY, USA (pp. 201–204).

Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., & Yesha, Y. (2008). Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Networks, 6 , 578–599.

Li, X., Lyu, M. R., & Liu, J. (2004). A trust model based routing protocol for secure ad hoc networks. In Proceedings of aerospace conference (AC'04) (pp. 1286–1295).

Rajeshwar, J., & Narsimha, G. (2017). Secure way routing protocol for mobile ad hoc network. Wireless Networks, 23 (2), 345–354.

Li, T., Ma, J i a n Feng, & Sun, C. (2019). SRDPV: Secure route discovery and privacy-preserving verification in MANETs. Wireless Networks, 25 (4), 1731–1747.

Hu, Y. C., Perrig, A., & Johnson, D. (2005). ARIADNE: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11 (1), 21–38.

Perrig, A., Canetti, R., Tygar, D., & Song, D. (2002). The tesla broadcast authentication protocol. RSA Cryptobytes (RSA Laboratories), 5 (2), 2–13.

Buttyan, L., Acs, G., & Vajda, I. (2006). Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 11 (5), 1533–1546.

Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in manets. Ad Hoc Networks, 7 , 1097–1109.

Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in manet. Computers and Electrical Engineering, 40 , 530–538.

Djenouri, D., & Badache, N. (2009). On eliminating packet droppers in MANET: A modular solution. Ad Hoc Networks, 7 , 1243–1258.

Avramopoulos, I., Kobayashi, H., Wang, R., & Krishnamurthy, A. (2004). Highly secure and efficient routing. In INFOCOM 2004 twenty-third annual joint conference of the IEEE computer and communications societies .

Cong, Pu, Lim, S., Chae, J., & Jung, B. (2019). Active detection in mitigating routing misbehavior for MANETs. Wireless Networks, 25 (4), 1669–1683.

Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 10th IEEE international conference on network protocols (ICNP) (pp. 78–87).

Kravets, R., Yi, S., & Naldurg, P. (2001). A security-aware routing protocol for wireless ad hoc networks. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking computing (pp. 299–302).

Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002) (pp. 193–204).

Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., & Rubens, H. ()2008. ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. In ACM transactions on information and system security (TISSEC) (vol. 10, No. 4).

Khan, F. A., Imran, M., Abbas, H., & Durad, M. H. (2017). A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Generation Computer Systems, 86 , 416–427.

Khan, F. A., Imran, M., Abbas, H., & Durad, M. (2017). A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Generation Computer Systems, 68 , 416–427.

Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications, 35 , 1130–1139.

Baadache, A., & Belmehdi, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks, 73 , 173–184.

Buchmann, J., Dahmen, E., & Schneider, M. (2008). Merkle tree traversal revisited. In Proceedings of the 2nd international workshop on post-quantum cryptography (PQCrypto'08) (pp. 63–78).

Stephen Dabideen, J. J. (2012). Garcia-Luna-Aceves, "Secure routing in MANETs using local times". Wireless Networks, 18 (7), 811–826.

Pani, N. K., &Mishra, S. (2014). Secure hybrid routing for manet resilient to internal and external attacks. In Proceedings of the 48th annual convention of computer society of India (pp. 449–458).

Usman, M., Jan, M. A., He, X., & Nanda, P. (2018). QASEC: A secured data communication scheme for mobile ad-hoc networks. Future Generation Computer Systems . https://doi.org/10.1016/j.future.2018.05.007 .

Article   Google Scholar  

Casado, L. S., Fernández, G. M., Teodoro, P. G., & Carrión, R. M. (2015). A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Computer Networks, 87 , 44–58.

Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2003 ACM workshop on wireless security (WiSeâ03), New York, NY, USA (pp. 1–10).

Liu, K., Abu-Ghazaleh, N., & Kang, K. (2007). location verification and trust management for resilient geographic routing. Journal of Parallel and Distributed Computing, 67 , 215–228.

Pagnin, E., Hancke, G., & Mitrokotsa, A. (2015). Using distance-bounding protocols to securely verify the proximity of two-hop neighbours. IEEE Communication Letters, 19 (7), 1173–1176.

Pathak, V., Yao, D., & Iftode, L. (2008). Securing geographical routing in mobile ad-hoc networks.In Department of Computer Science, Rutgers University. Technical Report (p. 638).

Song, J., Wong, V. W. S., & Leung, V. C. M. (2007). Secure position-based routing protocol for mobile ad hoc networks. Ad Hoc Networks, 5 , 76–86.

Boulaiche, M., & Bouallouche-Medjkoune, L. (2017). HSecGR: Highly secure geographic routing. Journal of Network and Computer Applications, 80 , 189–199.

Xia, H., Yu, J., Pan, Z., et al. (2016). Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wireless Networks, 22 (7), 2239–2257.

Singh, T., Singh, J., & Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23 (4), 1001–1009.

Priya, S., & K annan, N. (2017). Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET. Wireless Networks, 23 (7), 2227–2237.

Abdel-Halim, I. T., Fahmy, H. M. A., & Bahaa-Eldin, A. M. (2015). Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wireless Networks, 21 (2), 467–483.

Kout, A., Labed, S., Chikhi, S., & Bourennane, E. B. (2018). AODVCS, a new bio-inspired routing protocol based on cuckoo search algorithm for mobile ad hoc networks. Wireless Networks, 24 (7), 2509–2519.

Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications, 100 , 311–320.

Yun, J. H., & Park, M. H. (2013). Single-adversary relaying attack defense mechanism in wireless ad hoc networks. Wireless Personal Communications, 72 , 2519–2532.

Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90 , 1039–1050.

Download references

Author information

Authors and affiliations.

University of 20 August 1955 Skikda, Skikda, Algeria

Mehdi Boulaiche

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Mehdi Boulaiche .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Boulaiche, M. Survey of Secure Routing Protocols for Wireless Ad Hoc Networks. Wireless Pers Commun 114 , 483–517 (2020). https://doi.org/10.1007/s11277-020-07376-1

Download citation

Published : 18 April 2020

Issue Date : September 2020

DOI : https://doi.org/10.1007/s11277-020-07376-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Wireless ad-hoc networks
  • Secure routing
  • Security attack
  • Find a journal
  • Publish with us
  • Track your research

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • J Health Monit
  • v.3(3); 2018 Sep

Ad hoc surveys at the Robert Koch Institute

The Robert Koch Institute (RKI) regularly conducts nationally representative cross-sectional studies (KiGGS, DEGS and GEDA) as part of the nationwide health monitoring system. In addition to these health surveys, data is collected in telephone interviews either on specific thematic fields (such as diabetes) or specific groups (such as medical staff) that were not or only insufficiently covered by the larger health surveys. As they are flexible and fast, ad hoc surveys conducted via telephone interviews can respond to specific epidemiological and health political questions. This article describes the procedures applied in ad hoc telephone interview surveys, which were newly introduced as a standardised method in 2017 and are applied by the Laboratory for Health Surveys at the RKI. The article presents the stages of project management such as concept development, establishment of a concept for data protection, questionnaire development, pre-test and field phase, calculation of weighting factors and provision of the final data set. The aim is to describe the process and shed light on the standardised procedures, the reported quality indicators and the breadth of possible scenarios of application.

1. Introduction

The Robert Koch Institute (RKI) regularly conducts nationally representative cross-sectional studies as part of the nationwide health monitoring system. These surveys include the German Health Interview and Examination Survey for Children and Adolescents (KiGGS) [ 1-3 ] as well as the German Health Interview and Examination Survey for Adults (DEGS) [ 4 ]. As regards their content, the broad spectrum of the data collected as well as preparation and implementation of data collection render them highly complex surveys requiring lengthy preparatory work. For example, sampling for these surveys through the official population registries is highly time-consuming and therefore an additional factor to consider. The planning, implementation and preparation of such extensive surveys is usually a process which takes several years. Often, however, new questions arise that cannot be mapped out by these large surveys or only in an insufficient way. This creates the need for additional telephone interview surveys on specific issues (such as diabetes [ 5 ]) or for interviews with particular groups of people (such as physicians). Flexible and most importantly fast, these ad hoc surveys provide information that complements examination and interview surveys such as KiGGS and DEGS and on the short-term produce information on health-related issues.

Ad hoc research is not a new approach at the RKI. Between 2008 and 2014, in addition to KiGGS and DEGS, the German Health Update (GEDA) regularly conducted health interviews [ 6-9 ]. From 2008 to 2010, GEDA telephone interview surveys took place in-house, and were outsourced 2012 for the first time.

The need to rapidly conduct surveys at the RKI has increased continuously and as maintaining a permanent and efficient in-house Call Center is not possible, an external market and social research institute (USUMA GmbH) was commissioned in 2017, initially for a period of four years. The contracted services include conducting pre-tests and telephone interviews, quality assurance, data processing, provision of sets of data for analysis including weighting factors, as well as report compilation. Despite outsourcing the data collection, the RKI maintains significant influence and monitors planning, quality assurance and supervision as well as the training of interviewers. Table 1 provides an overview of the ad hoc surveys that have been conducted since 2017.

Overview of ad hoc surveys conducted at the Robert Koch Institute

Source: Own table

2. The course of the ad hoc surveys

At the early stage of the projects, the Laboratory for Health Surveys (LfG) assists USUMA GmbH (the company contracted by the RKI) in developing a concept for data collection and thereby serves as a coordinating body and intermediary point of contact. While project leaders are responsible for the conceptual development of questionnaires, they may receive methodological support from the LfG (for example regarding particular terms and their operationalisation in questionnaires). After the final instrument for data collection has been developed, USUMA GmbH programmes it into Voxco, a software programme for telephone interviews. In the run-up to the ad hoc survey, interviewers receive comprehensive training to familiarise themselves with the aims of the project. During these training sessions over several hours, project leaders, the LfG and the market and social research institute present the planned ad hoc survey.

A pre-test before the actual fieldwork serves to detect structural inconsistencies in data collection (for example regarding the length of questionnaires, filtering, obviously missing values regarding specific questions) and allows the survey to be fine-tuned.

In ad hoc surveys, the amount of time spent on data collection will vary depending on the research question, design and the required number of participants. In most cases, the fieldwork of ad hoc surveys will take between one and three months to complete. During the entire fieldwork, the LfG provides supervision (of interviewers) and quality assurance and thereby ensures the RKI’s standards for data collection are complied with.

The market and social research institute records the collected data anonymously (the following section provides further information on data protection). After finalising the fieldwork, the RKI receives the anonymised data set including a methodology report. At this point, data collection for the ad hoc survey is completed. The course of the ad hoc surveys is shown in Figure 1 .

An external file that holds a picture, illustration, etc.
Object name is johm-3-3-70-g001.jpg

The course of the ad hoc surveys

Source: Own diagram

3. Data protection

Data protection in ad hoc surveys is based on the EU’s General Data Protection Regulation (GDPR) and a voluntary commitment to the guidelines of the ADM (Arbeitskreis Deutscher Markt- und Sozialforschungsinstitute) [ 10 ]. An important and fundamental aspect in all ad hoc surveys is ensuring that the informed consent of all interviewees has been obtained. All participants are informed at the start of the telephone interview that their participation is voluntary, receive information about the aims of the survey and data protection and are asked for their verbal consent. Further aspects of data protection measures in ad hoc surveys include:

  • ► The separation of personal data (such as telephone numbers) and survey data is strictly observed during data collection. Personal information (in particular telephone numbers) are deleted after the survey is completed.
  • ► Interviewers do not have access to survey data and are barred from opening closed datasets.
  • ► Contacting interviewees, managing schedules and the interviews themselves are conducted using a specialised computer software programme. The software minimises data entry mistakes and maximises data quality. Only employees involved in process management and data analysis have access to the pool of telephone numbers of interviewees and survey data sheets.
  • ► After finishing the ad hoc survey, USUMA GmbH provides the final data set in anonymised format to the RKI.
  • ► Data is encoded and transferred via a cryptshare server in line with RKI provisions and in accordance with data protection regulations.

The RKI’s data protection officer ensures that each ad hoc survey complies with the generally applicable General Data Protection Regulation (GDPR) as well as Germany’s Federal Data Protection Act (BDSG-neu). To simplify the processing of the required documentation, a data protection questionnaire developed specifically for ad hoc surveys is applicable. For individual ad hoc surveys, clearance certificates from the ethics commission and the Federal Commissioner for Data Protection and Freedom of Information are obtained.

4. Methodology

4.1 design of sampling and data collection.

Ad hoc surveys are carried out as computer-assisted telephone interviewing surveys (CATI). This allows for comparisons with previous telephone interview surveys that have taken place within the context of health monitoring (GEDA 2009, GEDA 2010 or GEDA 2012) [ 6-8 ]. In principle, the same also applies to the sampling procedure. For statements on the German population in general, there are only few practicable and efficient options for sampling [ 11 ]. One method is sampling through existing official registers such as those held by official residency registries, or by using a generated telephone sampling frame. It should be noted that these concepts are both grounded on a two-step registry sample. The only difference between these sampling procedures is the selected primary survey unit (for example municipalities or types of municipalities). Another method is the ADM design for a personal face-to-face interview. As Germany, however, does not have a complete registry of all telephone numbers for personal use, the telephone sampling frame has to be generated first. The Arbeitsgemeinschaft ADM-Telefonstichproben has filled this gap by providing a sampling frame to member institutes. This generated sampling frame contains all private households in Germany that can be reached by telephone.

For the ad hoc surveys, the ADM’s sampling system for telephone surveys, which is based on a dual frame procedure ( Figure 2 ) is applied. The procedure consists of using two sets of numbers: the totality of mobile phone numbers and the totality of landline numbers [ 12 ].

An external file that holds a picture, illustration, etc.
Object name is johm-3-3-70-g002.jpg

Visualisation of a dual frame sample; all telephone numbers in the sampling frame, including those that cannot be reached

An additional practicable dual frame for selection is the GESIS framework [ 13 ]. Except for a few minor differences (the GESIS mobile phone sample for example is based on a person-centred approach), it works in a very similar way. Figure 2 is a schematic depiction of this approach. For dual frame approaches, research currently recommends a mobile phone proportion of at least 40% [ 14 ]. Only sampling from both mobile and landline telephone number sets ensures an (almost) complete coverage of the population [ 15 ].

When a person in a household of several people is contacted, an interviewee is randomly selected. Ad hoc surveys thereby apply the Kish Selection Grid [ 16 ]. All potential interviewees in any one household are equally likely to be selected. The CATI software randomly selects the target person and the selected target person is then identified based on their recorded age and gender.

4.2 Call-back and sample management

The provided sample is divided into tranches, i.e. the total of telephone numbers generated is not used from the outset. The separation into tranches is aimed at minimising the number of numbers used and maximising response rates. Moreover, using tranches of telephone numbers which have not yet been used has a positive impact on the motivation of interviewers because they receive fresh numbers with every new tranche, which increases the likelihood of a successful interview [ 17 ].

Each ad hoc survey pre-defines return call rules. These rules are established based on the AAPOR standard (American Association of Public Opinion Research) [ 18 ]. Based on the ADM recommendations, the maximum number of contact attempts is limited to ten calls per number [ 19 ]. Furthermore, sample generation ensures an optimal processing of all telephone numbers and helps to achieve the highest possible response rates. Making appointments with a target person for example is awarded the highest priority because the available surveys indicate that this makes a successful interview most likely [ 17 ].

4.3 Pre-test

Before each ad hoc survey, a pre-test is conducted. In most cases, the pre-test is a standard pre-test in the field [ 20 ]. When testing the survey instruments, the focus is on the logical and structured use of filters, the overall design of the questionnaire (e.g. nonresponse), content related duplications and the length of the questionnaire (the time required for a successful interview). These aspects of the quality of questionnaires are evaluated based on the pre-defined parameters of programming, filter application, frequency count, spread of missing values, time required for each thematic block and feedback from interviewers and interviewees. Generally, pre-test interviews take place ten days before the main stage of the survey.

4.4 Fieldwork

Fieldwork here relates to data collection by telephone and all the processes associated with it, i.e. the calls made by interviewers, as well as measures of supervision and quality assurance [ 17 ]. Fieldwork is left largely in the hands of USUMA GmbH. However, LfG has a quality assurance function through monitoring the supervision and quality assurance of interviewers at their workplace.

The number of interviewers working on individual ad hoc surveys varies between 20 and 100. This mainly depends on the time envisaged for fieldwork and the number of interviews that have to be conducted. To minimise interviewer effects the group of interviewers should be as heterogeneous as possible [ 21 ]. For reasons of quality assurance during the fieldwork, all interviewers receive training beforehand and are thoroughly supervised during the survey. USUMA GmbH ensures the supervision of interviewers. The company thereby receives support from and is monitored by LfG ( Figure 3 ).

An external file that holds a picture, illustration, etc.
Object name is johm-3-3-70-g003.jpg

Ad hoc survey quality assurance process

The constant supervision of all interviewers serves to maintain continuous data collection quality standards. Quality assurance during the entire fieldwork is part of supervision and as such organised by LfG. Quantitative and qualitative methods aim to maintain data quality. Quantitative quality assurance includes monitoring certain process data (number of call attempts/interviews made, refusals to grant interview/telephone appointments agreed) for example. This serves chiefly to compare interviewers and identify those requiring more support as part of the qualitative measures for quality assurance being pursued. One element of qualitative methods that is used to ensure data quality during the fieldwork is the monitoring of first contact and interview situation of individual interviewers. The aim is to continuously follow-up on the first contact and interview situation of all interviewers during the fieldwork. This is achieved by using standardised quality assurance sheets, which are discussed in detail following supervision with the interviewers. Supervisors have this bank at their disposal during the entire field phase allowing them to judge the development potentials of interviewers during the fieldwork. If quality assurance reveals a poor performance on the part of individual interviewers, they are invited to participate in further training and where appropriate training in putting forward arguments [ 21 ]. Ultimately, where these measures fail to deliver results interviewers are excluded from making further calls.

4.5 Weighting

The ‘weighting’ of data from a random sample describes a process by which the relative importance of data from individual target persons or groups in a sample is changed. Frequently weighting factors are employed to project the results of a survey for a random sample (as opposed to the total population) in which target persons have the possibility to refuse answers. Weighting processes are differentiated between those that consider the potentially diverging probabilities with which individual target persons will select an answer (design weighting) and procedures for subsequent stratification and reducing non-response bias, i.e. bias owing to the systematic non-participation by different target population groups (calibration/post stratification). Weighting for telephone ad hoc surveys is developed in close co-operation between the RKI and the institute commissioned. Design weighting is followed by post stratification. Post stratification has primarily two goals: to increase the precision of estimate values and to reduce bias through non-response [ 15 ]. Weighting must be adapted to each specific ad hoc survey because the underlying selection processes vary, the targeted subgroups differ as does the reason for weighting. Frequent sociodemographic markers used in weighting are nevertheless age, gender, federal state and education.

4.6 Response rates

Response rates are an indicator of the degree to which a specific target group has been reached. They serve as a possible but not compelling quality indicator for a possible bias of the sample through the systematic non-participation of particular target groups (non-response bias). For every ad hoc survey, the response rate is calculated based on the AAPOR standard [ 18 ]. This standard is favoured particularly in survey method research and guarantees comparability with other surveys worldwide (in particular ad hoc surveys) [ 22 ]. The AAPOR standard allows the reporting of different response rates that are calculated using similar but slightly modified formulas. One of the most commonly used measures is response rate 3, RR3. This rate was calculated for GEDA 2009, GEDA 2010 and GEDA 2012, rendering comparisons with these surveys. The response rate 3 reflects the proportion of realised interviews in relation to all probable households of the total population. For those telephone numbers that remain unclear to the end of the fieldwork whether they belong to the population or not, an estimate of the proportion of those that do belong to the population is made (eligibility rate). This estimate is extracted from the data collected as a proportion of eligible valid telephone numbers (respondents and non-respondents) to all numbers with a clear status (valid and invalid telephone numbers) [ 23 ].

5. Discussion

The format of ad hoc surveys, as described in this article, provides the RKI with tools to quickly and efficiently generate data and related information for scientific and/or political debate. The structured processes ensure the efficient management of the respective surveys. The cornerstones are bindingly described in the framework agreement allowing for fast and transparent communication with the external service provider and ensuring that costs can be estimated beforehand.

Yet it needs to be noted that each interview format has its advantages and disadvantages. Temporal, economic, practical and methodological dimensions are all contained in the valuation standards [ 24 ]. Advantages of the telephone interview format consist of: a framework for selection, fast and up-to-date availability of data, relatively low costs, the geographic spread of interviewees, the potential to implement screening procedures (i.e. specific target popoulations) and efficient quality management of interviewers and the data collected. These advantages come up against certain disadvantages: the limited number of questions compared to surveys sent by post, the lack of possibilities for visual input to questions and a greater risk of receiving biased results due to social desirability, avoidance behaviour, or more generally through interviewer effect. Before any survey, these and other advantages and disadvantages need to be weighed up and considered within the context of the survey.

Telephone surveys, like all other forms of surveying, have experienced a continuous decrease in response rates over the last few years, even though this trend has petered off recently [ 25 ]. This development entails risks due to bias for the estimated parameters in the individual surveys. Survey research, however, indicates that low response rates do not necessarily translate into a bias of survey results (i.e. a rising non-response bias) [ 26 ].

Looking back at previous ad hoc surveys at the RKI, numerous experiences have been gained. For example it has become clear that already at the stage of questionnaire design and programming providing advice is essential because researchers have no or hardly any experience regarding the telephone interview format. This is particularly important regarding the customisation of questionnaires and related processes. Field pre-tests also revealed that the majority of implemented ad hoc surveys underestimated the true length of questionnaires. Together these experiences provide the basis for a more precise estimation of the length of questionnaires in future. Prior to the pre-testing of future ad hoc surveys the questions or indicators to be analysed using criteria (such as the number of missing values, the required response time etc.) must be clearly defined with the researchers working on questionnaire content. During the actual fieldwork, we will in future strive to further intensify the supervision of interviewers. In the past, supervision has enhanced the quality of data [ 21 ]. If the budget allows it, the aim is to increase the supervisor to interviewer ratio to one to ten, i.e. to have one supervisor for every ten interviewers. It is conceivable that qualitative quality assurance could be digitalised in the form of online feedback questionnaires.

In the long-term, the increasing need for multi-mode or mixed-mode surveys will necessitate an amplification of the framework agreement. The methodological opportunities and limitations of telephone interview surveys will therefore have to be constantly re-analysed and re-interpreted. The accumulated experience and networks of the people working at LfG will be crucial to keeping the quality of data collected at a constantly high level.

Key statements

  • The Robert Koch Institute regularly plans ad hoc telephone interview surveys and supervises their implementation.
  • The Robert Koch Institute commissions an external market and social research institute with extensive experience in data collection to implement ad hoc surveys.
  • One advantage to ad hoc surveys is the capacity to respond to urgent issues in a fast and flexible way.
  • While based on a single methodology, depending on the research question, ad hoc surveys can be created in a bespoke way.
  • After data collection, researchers at the Robert Koch Institute analyse the data.

Conflicts of interest

The authors declared no conflicts of interest.

Note: External contributions do not necessarily reflect the opinions of the Robert Koch Institute

Security Technologies in Ad-hoc Networks: A Survey

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Help | Advanced Search

Computer Science > Multiagent Systems

Title: a survey of ad hoc teamwork research.

Abstract: Ad hoc teamwork is the research problem of designing agents that can collaborate with new teammates without prior coordination. This survey makes a two-fold contribution: First, it provides a structured description of the different facets of the ad hoc teamwork problem. Second, it discusses the progress that has been made in the field so far, and identifies the immediate and long-term open problems that need to be addressed in ad hoc teamwork.

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

research papers ad hoc

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Ad Hoc Networks

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Last »
  • Wireless Relay Networks Follow Following
  • Cooperative Communication Follow Following
  • Multi-User MIMO Communication Follow Following
  • Sensor networks Follow Following
  • Cellular Networks Follow Following
  • Cognitive Radio Networks Follow Following
  • Wireless Communications Follow Following
  • Routing, Mobility, and Reliability Follow Following
  • Wireless ad-hoc Networks Follow Following
  • Wireless Sensor Networks Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. Ad Hoc Analysis: A Quick Explanation

    research papers ad hoc

  2. (PDF) Research Issues on Vehicular Ad hoc Network

    research papers ad hoc

  3. International Journal of Ad Hoc and Ubiquitous Computing Template

    research papers ad hoc

  4. How to Write and Publish a Research Paper.pdf

    research papers ad hoc

  5. (PDF) Flying Ad Hoc Network: A Newest Research Area for Ad Hoc Networks

    research papers ad hoc

  6. (PDF) Ad hoc innovation: Distributed decision making in ad hoc networks

    research papers ad hoc

VIDEO

  1. #T39 : COPA : Adding Indices ( ઇન્ડેક્સને ઉમેરવી )

  2. My husband had hidden divorce papers. So I took the liberty of filing them

  3. TOP 10 COLLEGES 🔥| DELHI UNIVERSITY

  4. Chandigarh JBT & NTT

  5. Bharat Ratna Prof. C.N.R. Rao: Scientific Progress of India

  6. BPCS 188 solved assignment 2023-24 in Hindi / bpcs 188 solved assignment 2024 / bpcs-188

COMMENTS

  1. Vehicular Ad Hoc Networks: Architectures, Research Issues

    Vehicular ad hoc networks (VANETs) have been quite a hot research area in the last few years. ... In this paper, we provide an overview of the main aspects of VANETs from a research perspective. This paper starts with the basic architecture of networks, then discusses three popular research issues and general research methods, and ends up with ...

  2. Classification and comparison of ad hoc networks: A review

    Research on ad hoc network. It is a part of a self-aware system that connects wirelessly. Ad-hoc networks don't have physical representations of the nodes, so they cannot see them. ... This paper is a brief overview of ad hoc networks, including the types of mobile ad hoc networks, wireless sensor networks, and wireless mesh networks, as well ...

  3. Ad Hoc Networks

    The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor ... Research article Full text access. ... Special issue on Selected Best Papers from the 41st Brazilian Symposium on Computer Networks and Distributed Systems (SBRC ...

  4. A comprehensive review on vehicular ad-hoc networks routing ...

    Vehicular Ad-hoc Networks (VANETs) have received extensive consideration from the industry and the research community because of their expanding emphasis on constructing Intelligent Transportation Systems (ITS) to enhance road safety. ITS is a collection of technologies and applications that aim to improve transportation safety and mobility while lowering the number of accidents. In VANET ...

  5. (PDF) Recent Advances in Mobile Ad Hoc Networks

    Department of Electrical Engineering, Ecole de Technologie Superieur e, Montreal, QC H3C 3J7, Canada; [email protected]. 1. Introduction. Mobile ad hoc networks (MANET s) represent a ...

  6. (PDF) MOBILE AD-HOC NETWORKS: APPLICATIONS AND CHALLENGES

    This research paper describes the characteristics of ad hoc routing protocols Ad-hoc On Demand Distance Vector Routing (AODV), Optimized link State Routing (OLSR), Temporally Ordered Routing ...

  7. Mobile Ad Hoc Networks: Recent Advances and Future Trends

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... A CR ad-hoc network (CRAHN ...

  8. Vehicular Ad-hoc Networks: Architecture, Applications and Challenges

    An AU is a dedicated device, which can be an integrated part of a vehicle or a separate portable device such as smartphone, laptop, etc. It runs one or many applications that exploit the OBU communication capabilities. The AUs and OBU are permanently connected through a wired or wireless connection. Ad-hoc.

  9. Routing in Mobile Ad-hoc Networks

    From the last decade, there has been expeditious growth and a worldwide success is perceived in the area of wireless ad-hoc networking. Especially, one class of wireless ad-hoc networks, that is, mobile ad-hoc network (MANET) drawing a great attention from the critical applications like emergency search and rescue operations and disaster recovery services. A MANET consists of mobile nodes that ...

  10. Ad Hoc Networks

    Ad Hoc Networks. Supports open access. 12.1 CiteScore. 4.8 Impact Factor. Articles & Issues. About. Publish. Order journal. Menu. Articles & Issues. Latest issue; ... Research article Full text access Connectivity analysis of 2D underwater optical wireless sensor networks using a geometric approach. Reza Habibiyan, Abbasali Ghorban Sabbagh ...

  11. Vehicular Ad-hoc Networks: A Review on Applications and Security

    Vehicular Ad-hoc Networks (VANETs) have emerged as a promising technology for enabling efficient communication among vehicles and between vehicles and the infrastructure. The proposed work provides a review of the current state of research and development in the field of VANETs. VANETs facilitate the exchange of information related to traffic ...

  12. PDF Ad Hoc Networks

    showcase recent research advances in ad hoc networks. AdHocNets 2010, the second edition of this event, was held in Victoria, Canada, in August 2010. This special issue in-cludes a collection of five outstanding research papers se-lected through a rigorous review process from 41 papers in the technical program of AdHocNets 2010.

  13. Mobile Ad Hoc Networks: Issues, Research Trends and Experiments

    This paper describes the fundamental problems of ad hoc networking by giving its related background including the concept, features, applications, issues of MANETs, investigates and presents recent research trends and identifies Simulators for MANETs[5].

  14. Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

    Routing in wireless ad hoc networks has been studied extensively over the last years [ 3, 4] and a large number of high quality research papers have appeared and addressed the issue of routing at length. These routing solutions can be classified into two main categories: topology-based and position-based solutions.

  15. Ad hoc surveys at the Robert Koch Institute

    Ad hoc research is not a new approach at the RKI. Between 2008 and 2014, in addition to KiGGS and DEGS, the German Health Update (GEDA) regularly conducted health interviews [ 6-9 ]. From 2008 to 2010, GEDA telephone interview surveys took place in-house, and were outsourced 2012 for the first time.

  16. PDF TOP 10 AD HOC NETWORKS PAPERS

    ABSTRACT. The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs). We consider the following MANET mobility models: Random Waypoint, Random Direction, Gauss-Markov ...

  17. Routing protocols in Vehicular Adhoc Networks (VANETs ...

    Vehicular Ad-hoc Networks (VANETs) are pivotal for realizing smart cities' vision due to their rich services in road traffic safety, surveillance, traffic control, and traffic monitoring. ... and the message dissemination mechanism, i.e., unicast, multicast, broadcast, etc. This paper comprehensively surveys the VANETs routing protocols and ...

  18. Security Technologies in Ad-hoc Networks: A Survey

    However, the openness of the ad-hoc networks makes them vulnerable to malicious attacks. Till now, multiple researchers have carried out a lot of work on solving ad-hoc security issues. This paper discusses these security threats and solutions from different aspects in the first place. Then, this paper analyzes the existing security solutions.

  19. [2202.10450] A Survey of Ad Hoc Teamwork Research

    Ad hoc teamwork is the research problem of designing agents that can collaborate with new teammates without prior coordination. This survey makes a two-fold contribution: First, it provides a structured description of the different facets of the ad hoc teamwork problem. Second, it discusses the progress that has been made in the field so far, and identifies the immediate and long-term open ...

  20. Ad Hoc Networks Research Papers

    Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in which a user's social properties (such as the social connections and communications metadata as well as application data) are leveraged for offering enhanced services in a distributed infrastructureless environments.

  21. Guide for authors

    The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. Specific areas of interest include, but are not limited to: • Mobile and Wireless Ad Hoc Networks. • Sensor Networks.

  22. Flying Ad Hoc Network: A Newest Research Area for Ad Hoc Networks

    This paper identifies the challenges with using UAVs as relay nodes in an ad-hoc manner, introduces network models of UAVs, and depicts open research issues with analyzing opportunities and future ...

  23. A survey on hybrid routing mechanisms in mobile ad hoc networks

    Abstract. Routing is one of the most challenging task in mobile ad hoc networks (MANETs). Several works have been proposed to address this challenge. In recent past, some of the research articles are focused on design of hybrid routing mechanisms for MANETs. In this paper, we present an overview of analytical, network, and simulation model used ...

  24. (PDF) Mobile Ad-hoc Networks

    PDF | On Jan 1, 2010, D Jeyabharathi and others published Mobile Ad-hoc Networks | Find, read and cite all the research you need on ResearchGate