Next Article in Journal
Multiaxial Fatigue Analysis of Connecting Bolt at High-Speed Train Axle Box under Structural Subharmonic Resonance
Next Article in Special Issue
A Deep-Learning-Based Secure Routing Protocol to Avoid Blackhole Attacks in VANETs
Previous Article in Journal
Random Telegraph Noise Degradation Caused by Hot Carrier Injection in a 0.8 μm-Pitch 8.3Mpixel Stacked CMOS Image Sensor
Previous Article in Special Issue
Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks
 
 
Article
Peer-Review Record

DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output†

Sensors 2023, 23(18), 7960; https://doi.org/10.3390/s23187960
by Yushintia Pramitarini 1, Ridho Hendra Yoga Perdana 1, Kyusung Shim 2 and Beongku An 3,*
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Sensors 2023, 23(18), 7960; https://doi.org/10.3390/s23187960
Submission received: 14 August 2023 / Revised: 11 September 2023 / Accepted: 15 September 2023 / Published: 18 September 2023

Round 1

Reviewer 1 Report

The paper proposes a new secure multicast routing method against wormhole attack based on DL in FANET.  The effectiveness of the proposed technique is verified with simulation. However, the paper needs to address the following comments for publication.

 -          More description on recent studies on wormhole or other attacks against UAV networks should be provided in Section 1 Introduction as related works.

 -          A section describing wormhole attack model and PSO method should be added to help the readers’ understanding.

 -          Detailed design settings on DL and wormhole attack in Section 3 Performance Evaluation is missing.

 -          In Section 3 Performance Evaluation, other recently proposed secure UAV routing protocol against wormhole attack should be presented for better comparative analysis.

 -          In Conclusion, a deep insight on robustness of the proposed method against wormhole attack based on simulation results should be provided.

None.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

The following are comments to improve the paper:

1. The abstraction lacks a proper motivation. A brief overview of previous works and their shortcomings should be noted here. Additionally, the obtained improvement should be explicitly mentioned.

2. Use of "Can" in the abstract should be removed. Be-sure for for your proposed work.

3.  The introduction also needs a proper motivation. The previous works and their advantages and shortcomings should be added to this section. Additionally, add some references to the introduction. The beginning paragraphs of the introduction focus on general information, which should be summarized

4. List pointwise contributions in the abstract in third paragraph.

5. - In the conclusion, mention the summary of your experimental analysis in statistical form along with the future works.

 

Grammatical issues:
a. There are a lot of grammatical errors in the text. Some of them are highlighted. Please read the text carefully and fix the errors.
b. Don't omit "the" and "a" when it is necessary.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The authors have successfully addressed all the review comments. Therefore, I recommend publication of the submitted manuscript.

No comment.

Reviewer 2 Report

I have no more comments.

Back to TopTop