International Journal of Wireless and Ad Hoc Communication

Submit Your Paper

2692-4056ISSN (Online)

Statistical Performance Evaluation of UDP Communication in IoT Environments: A Comparative Study of Small-Scale vs Large-Scale Packet Transmission under Latency Variations

Eman Gaber

With the rapid expansion of the Internet of Things (IoT), reliable and efficient data transmission has become a critical requirement for large-scale heterogeneous deployments. This paper presents a comprehensive simulation-based performance analysis of three widely adopted IoT transport protocols—UDP, CoAP, and MQTT—under Rayleigh fading channel conditions using a MATLAB-based framework. The study evaluates the transmission of 100 and 1000 data packets under three distinct latency regimes: low, medium, and high. Key performance metrics include end-to-end delay, jitter, packet loss ratio, and throughput. A novel Adaptive Exponential Moving Average (EMA) jitter buffer algorithm is proposed, achieving 57–65% jitter reduction across all tested scenarios. Protocol comparison reveals that UDP achieves the lowest average delay (20 ms under low conditions), while MQTT incurs the highest overhead (+20 ms) due to broker relay. Monte Carlo statistical analysis with 500 simulation runs confirms result convergence within 0.5 ms between 100-packet and 1000-packet scales. The findings provide practical design guidelines for IoT protocol selection and establish a reproducible benchmark for evaluating transport-layer behavior in constrained wireless ad hoc networks.

Read More

Doi: https://doi.org/10.54216/IJWAC.100101

Vol. 10 Issue. 1 PP. 01-14, (2026)

Trust-Aware Early Detection of Grey-Hole Behaviour in Flying Ad Hoc Wireless Networks: A Data-Driven Study Using Recent FANET Traces

Meinhaj Hussain , Andino Maseleno

Flying ad hoc networks (FANETs) enable dynamic multi-hop communication in un-manned aerial nodes, but their routing plane is vulnerable to selective forwarding attacks that decrease packet delivery rates while avoiding the sudden effects of denial. This paper proposes a trust-aware routing and detection approach for early detection of grey-holes in ad hoc flying networks. The paper employs an analysis-ready data set based on the public FAN-GHETS24 data set, a new data set for early time-series classification of attacks in FANETs. The Trust-Aware Routing Grey-Hole Detection (TAR-GHD) model uses a com-bination of link quality evidence, route stability, packet consistency and trust dynamics in a lightweight detection layer that can be executed alongside traditional ad hoc routing. A mathematical formulation is given for evidence aggregation, temporal trust evolution, risk assessment and route warning. The empirical study measures the detection of normal, mild, moderate and heavy grey-hole attacks in various node-density, mobility, observation window, and classification settings. The findings demonstrate that trust and packet-loss dynamics offer reliable early indicators of grey-hole attacks, while mobility and route changes make it harder to distinguish normal loss from malicious loss. The best-performed configuration resulted in an F1-score over 0.93 (held-out evaluation), with the most influential features related to packet delivery, forwarding ratio, trust score and drop-rate dynamics. The results highlight lightweight and explainable trust evidence as a viable technique for enhancing the security of wireless ad hoc routing in UAV-assisted applications.

Read More

Doi: https://doi.org/10.54216/IJWAC.100102

Vol. 10 Issue. 1 PP. 15–27, (2026)

ADML-IDS: An Adaptive Ensemble Machine Learning Framework for Intrusion Detection in Wireless Ad Hoc and Sensor Networks

Ahmed Aziz , Mahmoud Abdel-Salam

As wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs) are (DoS) attacks has become a critical security concern in mission-critical wireless (DoS) attacks has become a critical security issue. This paper proposes ADML-IDS, an Adaptive Machine Learning Intrusion Detection System that integrates ensemble of Random Forest, XGBoost and Gradient Boosting classifiers using a Flooding, and Scheduling—as well as normal traffic. Flooding, Scheduling and normal traffic. Experiments are conducted on the open-source WSN-DS dataset, which contains 166,000 network observations using the LEACH hierarchical routing protocol with 23 features obtained from NS-2 simulation. The data preprocessing steps include Min- Max normalisation and Synthetic Minority Over-Sampling Technique (SMOTE) to balance classes, and importance-based feature selection to retain 19 features. A rigorous ten-fold crossvalidation strategy is followed. ADML-IDS achieves an overall accuracy of 99.57%, weighted F1-score of 0.9956 and AUC-ROC of 0.9985. AUC-ROC of 0.9985, outperforming each of the sub-classifiers and five state-of-the-art methods. Scalability experiments demonstrate that the accuracy of detection remains above network size reaches 200 nodes, and with a reasonable computational cost. A formal presentation of the energy-aware network model and ensemble decision rule is tables are also included along with a full description of the algorithm tables.

Read More

Doi: https://doi.org/10.54216/IJWAC.100103

Vol. 10 Issue. 1 PP. 28–41, (2026)

Key-Aware Link Selection for Quantum Wireless Networks: A Data-Driven Study of Satellite-to-Ground QKD Access Links

Khaled Sh. Gaber , S. K. Towfek

The application of quantum key distribution, satellite communication and programmable wireless access in future secure wireless networks is anticipated to enhance secure communication infrastructure. But their realisation demands more than just the physical realisation of quantum links. The network controller needs to determine when a quantum-secured wireless link can be used to serve a request, how orbit type and weather conditions impact the volume of usable keys, and whether the secure key rate is high enough to admit a route. In this paper, we introduce Q-SARA, a quantum-secure access and routing admission model for satellite-assisted quantum wireless networks. It assesses candidate QKD access links with secure key rate (SKR), quantum bit error rate (QBER), link loss, contact duration, visibility probability and propagation delay. A smaller, pre-processed dataset is derived from the public Satellite-to-Ground QKD SKR dataset, which contains the calculated key performance indicators for Low Earth Orbit, Medium Earth Orbit and Geostationary satellite-to-ground QKD links using the prepare-and-measure and entanglement-based protocols. The empirical analysis examines 7,200 link-level data and assesses Q-SARA across orbit, protocol, optical ground station, elevation, atmospheric, and service classes. The findings demonstrate that link selection based only on key volume can be misleading when assessing service quality, while the multi-criteria score provides better balance between security, visibility and latency. LEO links have better instantaneous key rates, GEO links have better visibility, and MEO links lie in between and can be exploited when link quality and service are taken into account together. The results suggest that quantum wireless access should be considered as a service admission problem rather than a physical-layer key generation problem.

Read More

Doi: https://doi.org/10.54216/IJWAC.100104

Vol. 10 Issue. 1 PP. 42–51, (2026)