首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
With technological advancements in 6G and Internet of Things (IoT), the incorporation of Unmanned Aerial Vehicles (UAVs) and cellular networks has become a hot research topic. At present, the proficient evolution of 6G networks allows the UAVs to offer cost-effective and timely solutions for real-time applications such as medicine, tracking, surveillance, etc. Energy efficiency, data collection, and route planning are crucial processes to improve the network communication. These processes are highly difficult owing to high mobility, presence of non-stationary links, dynamic topology, and energy-restricted UAVs. With this motivation, the current research paper presents a novel Energy Aware Data Collection with Routing Planning for 6G-enabled UAV communication (EADCRP-6G) technique. The goal of the proposed EADCRP-6G technique is to conduct energy-efficient cluster-based data collection and optimal route planning for 6G-enabled UAV networks. EADCRP-6G technique deploys Improved Red Deer Algorithm-based Clustering (IRDAC) technique to elect an optimal set of Cluster Heads (CH) and organize these clusters. Besides, Artificial Fish Swarm-based Route Planning (AFSRP) technique is applied to choose an optimum set of routes for UAV communication in 6G networks. In order to validated whether the proposed EADCRP-6G technique enhances the performance, a series of simulations was performed and the outcomes were investigated under different dimensions. The experimental results showcase that the proposed model outperformed all other existing models under different evaluation parameters.  相似文献   

2.
With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed according to Poisson Cluster Process (PCP) around base stations, in particular, Thomas Cluster Process (TCP). Using this model, the impact of beam alignment errors on the coverage probability was investigated. Initially, the Probability Density Function (PDF) of directional antenna gain between the user and its serving base station was obtained. Then, association probability with each tier was achieved. A tractable expression was derived for coverage probability in both Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) condition links. Numerical results demonstrated that at low UAVs altitude, beam alignment errors significantly degrade coverage performance. Moreover, for a small cluster size, alignment errors do not necessarily affect the coverage performance.  相似文献   

3.
The main aim of future mobile networks is to provide secure, reliable, intelligent, and seamless connectivity. It also enables mobile network operators to ensure their customer’s a better quality of service (QoS). Nowadays, Unmanned Aerial Vehicles (UAVs) are a significant part of the mobile network due to their continuously growing use in various applications. For better coverage, cost-effective, and seamless service connectivity and provisioning, UAVs have emerged as the best choice for telco operators. UAVs can be used as flying base stations, edge servers, and relay nodes in mobile networks. On the other side, Multi-access Edge Computing (MEC) technology also emerged in the 5G network to provide a better quality of experience (QoE) to users with different QoS requirements. However, UAVs in a mobile network for coverage enhancement and better QoS face several challenges such as trajectory designing, path planning, optimization, QoS assurance, mobility management, etc. The efficient and proactive path planning and optimization in a highly dynamic environment containing buildings and obstacles are challenging. So, an automated Artificial Intelligence (AI) enabled QoS-aware solution is needed for trajectory planning and optimization. Therefore, this work introduces a well-designed AI and MEC-enabled architecture for a UAVs-assisted future network. It has an efficient Deep Reinforcement Learning (DRL) algorithm for real-time and proactive trajectory planning and optimization. It also fulfills QoS-aware service provisioning. A greedy-policy approach is used to maximize the long-term reward for serving more users with QoS. Simulation results reveal the superiority of the proposed DRL mechanism for energy-efficient and QoS-aware trajectory planning over the existing models.  相似文献   

4.
The smart city comprises various interlinked elements which communicate data and offers urban life to citizen. Unmanned Aerial Vehicles (UAV) or drones were commonly employed in different application areas like agriculture, logistics, and surveillance. For improving the drone flying safety and quality of services, a significant solution is for designing the Internet of Drones (IoD) where the drones are utilized to gather data and people communicate to the drones of a specific flying region using the mobile devices is for constructing the Internet-of-Drones, where the drones were utilized for collecting the data, and communicate with others. In addition, the SIRSS-CIoD technique derives a tuna swarm algorithm-based clustering (TSA-C) technique to choose cluster heads (CHs) and organize clusters in IoV networks. Besides, the SIRSS-CIoD technique involves the design of a biogeography-based optimization (BBO) technique to an optimum route selection (RS) process. The design of clustering and routing techniques for IoD networks in smart cities shows the novelty of the study. A wide range of experimental analyses is carried out and the comparative study highlighted the improved performance of the SIRSS-CIoD technique over the other approaches.  相似文献   

5.
Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution. The research’s noteworthy findings demonstrate UVs’ logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information. The results suggest that detecting the submarine early increases the likelihood of averting a collision. The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency. Securing communication between Unmanned Aerial Vehicles (UAVs) improves the level of secrecy necessary for the task. The swarm navigation is based on a peer-to-peer system, which allows each UAV to access information from its peers. This, in turn, helps the UAVs to determine the best route to take and to avoid collisions with other UAVs. The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.  相似文献   

6.
Internet of Everything (IoE) indicates a fantastic vision of the future, where everything is connected to the internet, providing intelligent services and facilitating decision making. IoE is the collection of static and moving objects able to coordinate and communicate with each other. The moving objects may consist of ground segments and flying segments. The speed of flying segment e.g., Unmanned Ariel Vehicles (UAVs) may high as compared to ground segment objects. The topology changes occur very frequently due to high speed nature of objects in UAV-enabled IoE (Ue-IoE). The routing maintenance overhead may increase when scaling the Ue-IoE (number of objects increases). A single change in topology can force all the objects of the Ue-IoE to update their routing tables. Similarly, the frequent updating in routing table entries will result more energy dissipation and the lifetime of the Ue-IoE may decrease. The objects consume more energy on routing computations. To prevent the frequent updation of routing tables associated with each object, the computation of routes from source to destination may be limited to optimum number of objects in the Ue-IoE. In this article, we propose a routing scheme in which the responsibility of route computation (from neighbor objects to destination) is assigned to some IoE-objects in the Ue-IoE. The route computation objects (RCO) are selected on the basis of certain parameters like remaining energy and mobility. The RCO send the routing information of destination objects to their neighbors once they want to communicate with other objects. The proposed protocol is simulated and the results show that it outperform state-of-the-art protocols in terms of average energy consumption, messages overhead, throughput, delay etc.  相似文献   

7.
Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification. Primarily, the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation (ML-DWT), CSO-related Optimal Pixel Selection (CSO-OPS), and signcryption-based encryption. The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images. The secret images, encrypted by signcryption technique, are embedded into cover images. Besides, the image classification process includes three components namely, Super-Resolution using Convolution Neural Network (SRCNN), Adam optimizer, and softmax classifier. The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication. The proposed CSODL-SUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects. The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.  相似文献   

8.
In this article, the problem of two Unmanned Aerial Vehicles (UAVs) cooperatively searching an unknown region is addressed. The search region is discretized into hexagonal cells and each cell is assumed to possess an uncertainty value. The UAVs have to cooperatively search these cells taking limited endurance, sensor and communication range constraints into account. Due to limited endurance, the UAVs need to return to the base station for refuelling and also need to select a base station when multiple base stations are present. This article proposes a route planning algorithm that takes endurance time constraints into account and uses game theoretical strategies to reduce the uncertainty. The route planning algorithm selects only those cells that ensure the agent will return to any one of the available bases. A set of paths are formed using these cells which the game theoretical strategies use to select a path that yields maximum uncertainty reduction. We explore non-cooperative Nash, cooperative and security strategies from game theory to enhance the search effectiveness. Monte-Carlo simulations are carried out which show the superiority of the game theoretical strategies over greedy strategy for different look ahead step length paths. Within the game theoretical strategies, non-cooperative Nash and cooperative strategy perform similarly in an ideal case, but Nash strategy performs better than the cooperative strategy when the perceived information is different. We also propose a heuristic based on partitioning of the search space into sectors to reduce computational overhead without performance degradation.  相似文献   

9.
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure the Mavlink communication protocol. By leveraging the Mavlink packet’s vulnerabilities, this research work introduces an experiment in which, first, the Mavlink packets are compromised in terms of security requirements based on our threat model. The results show that the protocol is insecure and the attacks carried out are successful. To overcome Mavlink security, an additional security layer is added to encrypt and secure the protocol. An encryption technique is proposed that makes the communication between the UAV and GCS secure. The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency. The results are validated in terms of transfer speed, performance, and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol. Our achieved results have significant improvement over the literature and Mavlink in terms of security.  相似文献   

10.
In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the system in the process of data transmission by optimizing the deployment of UAVs. The DEVIPSK (differential evolution algorithm with variable population size based on a mutation strategy pool initialized by K-Means) is proposed to solve the model. In DEVIPSK, the population is initialized by K-Means to obtain better initial positions of UAVs. Besides, considering the limitation of the fixed mutation strategy in the traditional evolutionary algorithm, a mutation strategy pool is used to update the positions of UAVs. The experimental results show the superiority of the DEVIPSK and provide guidance for the deployment of UAVs in the field of edge data collection in the IoT system.  相似文献   

11.
In recent times, Unmanned Aerial Vehicles (UAVs) popularly known as drone technology have gradually gained widespread adoption all over the world. UAVs’ relevance within modern society stems from it being able to solve socio-economic issues as well as improve productivity. Sub-Saharan Africa has become a region of global interest with regards to technological development, leapfrogging and foreign investment, despite the lag in socio-economic development in comparison with other regions. Backed by socio-technical theory, the aim of this paper is to investigate UAV adoption and its usage in Sub-Saharan Africa by means of a systematic literature review methodology. Selected papers were reviewed, assessed and results were categorized according to the domain within which UAVs have been and are being deployed in Sub-Saharan Africa. We also determined whether the research reported on existing projects or rather made proposals on the use of UAVs.Our results reveal that UAV adoption in the sub-region is still in its early phase, with a number of implemented cases primarily focusing on healthcare and crop farming. The study makes theoretical and practical contributions to the topic of UAVs/drone technology within the sphere of Sub-Saharan Africa from a socio-technical perspective.  相似文献   

12.
The Wireless Sensor Network (WSN) is a promising technology that could be used to monitor rivers’ water levels for early warning flood detection in the 5G context. However, during a flood, sensor nodes may be washed up or become faulty, which seriously affects network connectivity. To address this issue, Unmanned Aerial Vehicles (UAVs) could be integrated with WSN as routers or data mules to provide reliable data collection and flood prediction. In light of this, we propose a fault-tolerant multi-level framework comprised of a WSN and a UAV to monitor river levels. The framework is capable to provide seamless data collection by handling the disconnections caused by the failed nodes during a flood. Besides, an algorithm hybridized with Group Method Data Handling (GMDH) and Particle Swarm Optimization (PSO) is proposed to predict forthcoming floods in an intelligent collaborative environment. The proposed water-level prediction model is trained based on the real dataset obtained from the Selangor River in Malaysia. The performance of the work in comparison with other models has been also evaluated and numerical results based on different metrics such as coefficient of determination (), correlation coefficient (), Root Mean Square Error (), Mean Absolute Percentage Error (), and are provided.  相似文献   

13.
IEEE 802.15.4 is the prevailing standard for low-rate wireless personal area networks. It specifies the physical layer and medium access control sub-layer. Some emerging standards such as ZigBee define the network layer on top of these lower levels to support routing and multi-hop communication. Tree routing is a favourable basis for ZigBee routing because of its simplicity and limited use of resources. However, in data collection systems that are based on spanning trees rooted at a sink node, non-optimal route selection, congestion and uneven distribution of traffic in tree routing can adversely contribute to network performance and lifetime. The imbalance in workload can result in hotspot problems and early energy depletion of specific nodes that are normally the crucial routers of the network. The authors propose a novel light-weight routing protocol, energy aware multi-tree routing (EAMTR) protocol, to balance the workload of data gathering and alleviate the hotspot and single points of failure problems for high-density sink-type networks. In this scheme, multiple trees are formed in the initialisation phase and according to network traffic, each node selects the least congested route to the root node. The results of simulation and performance evaluation of EAMTR show significant improvement in network lifetime and traffic distribution.  相似文献   

14.
A mobile ad hoc network (MANET) is a wireless, dynamic, infrastructure-less, self-organized, multi-hop, and decentralized network. Each node in MANET can act as a router as well as a work station. Many routing protocols have been developed to increase the efficiency of MANET. The primary objective of this paper is a detailed QoS comparison of reactive (AODV), proactive (DSDV), and hybrid (ZRP) routing protocols of MANET in order to find which routing protocol works best in a particular network scenario. The analysis was made for TCP-based traffic patterns. The performance differentials were analyzed on the basis of normalized routing overhead, packet loss, packet delivery ratio, control packets, end-to-end delay, packet received, and packet sent with a variation of nodes density and mobility. The results were obtained using the NS-2 simulator.  相似文献   

15.
Unmanned Ariel Vehicles (UAVs) are flying objects whose trajectory can be remotely controlled. UAVs have lot of potential applications in the areas of wireless communications, internet of things, security, traffic management, monitoring, and smart surveying. By enabling reliable communication between UAVs and ground nodes, emergency notifications can be efficiently and quickly disseminated to a wider area. UAVs can gather data from remote areas, industrial units, and emergency scenarios without human involvement. UAVs can support ubiquitous connectivity, green communications, and intelligent wireless resource management. To efficiently use UAVs for all these applications, important challenges need to be investigated. In this paper, we first present a detailed classification of UAVs based on factors such as their size, communication range, weight, and flight altitude. We also explain the hardware system configuration and uses of these UAVs. We present a brief overview of recent work done related to three major challenges in UAVs. These challenges include trajectory control, energy efficiency and resource allocation. We also present three open challenges and future opportunities for efficient UAV communications. These include use of learning algorithms for resource allocation and energy efficiency in UAVs, intelligent surfaces-based communications for enhanced reliability in UAVs, and security algorithms to combat malicious attacks against UAVs.  相似文献   

16.
设计了一种基于HLA/RTI的卫星组网仿真系统,在该系统中卫星节点、星间链路、卫星轨道和通信节点路由被划分为功能独立的联邦成员.这种结构具有良好的可扩展性,可适用于不同的卫星星座结构,同时可以适应不同的路由策略和各类空间通信链路模型.最后通过统计卫星组网网管报文响应时间验证了该仿真系统的可行性.卫星组网仿真系统为卫星组网的其他研究提供了仿真验证平台.  相似文献   

17.
Technological advances can significantly transform agrarian rural areas by increasing productivity and efficiency while reducing labour intensive processes. For instance, the usage of Unmanned Aerial Vehicles (UAVs) can offer flexibility collecting real-time information of the crops enabling farmers to take timely decisions. However, little is known about the barriers to the adoption of such technologies by rural farmers in emerging economies like India. Building on an extensive literature review, focussed group discussions, and field visits, the barriers impacting the adoption are identified and classified into technical, social, behavioural, operational, economic, and implementation categories. The relevance of each barrier and its importance is evaluated using a hybrid multi-criteria framework built on the theory of Fuzzy Delphi and Fuzzy Analytical Hierarchy Process to identify the most crucial barriers to the adoption of UAVs to implement precision agriculture in rural India. The paper suggests new avenues for accelerating technology adoption in rural areas of emerging economies.  相似文献   

18.
Performance evaluation of shortest multipath source routing scheme   总被引:2,自引:0,他引:2  
Multipath routing in mobile ad-hoc networks allows the establishment of multiple paths for routing between a source-destination pair. It exploits the resource redundancy and diversity in the underlying network to provide benefits such as fault tolerance, load balancing, bandwidth aggregation and the improvement in quality-of-service metrics such as delay. Previous work shows that on-demand multipath routing schemes achieve better performance under certain scenarios with respect to a number of key performance metrics when compared with traditional single-path routing mechanisms. A multipath routing scheme, referred to as shortest multipath source (SMS) routing based on dynamic source routing (DSR) is proposed here. The mechanism has two novel aspects compared with other on-demand multipath routing schemes: it achieves shorter multiple partial-disjoint paths and allows more rapid recovery from route breaks. The performance differentials are investigated using NS-2 under conditions of varying mobility, offered load and network size. Results reveal that SMS provides a better solution than existing source-based approaches in a truly mobile ad-hoc environment.  相似文献   

19.
Multi-constrained quality-of-service (QoS) routing is used to find routes in a network to satisfy multiple independent QoS constraints. This problem is considered to be NP-complete, and most existing QoS routing algorithms are based on maintaining a global network state at every node. A multi-constrained, flooding-limited, QoS routing method to deal with limited available resources and minimum computation in a dynamic environment is proposed. The solution is based on decomposition of a routing area and a restriction in the exchange of routing information. It reduces the size of the control messages, restricts the amount of routing information, minimises the overhead from the flooding of control traffic and decreases the complexity of path selection. It is also proved that the flooding-limited-path heuristic can achieve very high performance by maintaining entries in each node, which indicates that the performance of the limited-path heuristic is not sensitive to the number of constraints. Simulation results show that this protocol provides better performance than other protocols, especially with regards to end-to-end delay, throughput and packet loss.  相似文献   

20.
一种新的基于移动预测的MANET路由协议   总被引:7,自引:0,他引:7  
移动自组网是一种由一系列可以自由移动的节点主机聚集而成的一个临时性动态网络。它没有固定基站,也没有作为控制管理中心的节点主机,由于其拓扑的动态性,其路由协议与其他传统网络有很大的区别。为了能更有效地移动自组网中实现数据的传送,本文提出了一种基于移动预测下的MANET路由协议,该协议综合考虑了传输路径的延时和稳定性,选择在延时限制下平均拥有最稳特性的传输路径,模拟结果表明,这种方法比基于移动预测量稳路径路由协议的传输时延要短,传送成功概率要高,而控制开销却相关不大。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号