Figures
Abstract
The performance of drones, especially for time-sensitive tasks, is critical in various applications. Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. However, the limited battery capacity of drones poses a challenge, necessitating energy-efficient Internet of Drones (IoD) systems. Despite the increasing demand for drone flying automation, there is a significant absence of a comprehensive drone network service architecture tailored for secure and efficient operations of drones. This research paper addresses this gap by proposing a safe, reliable, and real-time drone network service architecture, emphasizing collaboration with fog computing. The contribution includes a systematic architecture design and integration of blockchain technology for secure data storage. Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. The proposed algorithm dynamically plans drone trajectories and optimizes computation offloading. Results from simulations demonstrate the effectiveness of the proposed architecture, showcasing reduced average response latency and improved throughput, particularly when accessing resources from fog nodes. Furthermore, the model evaluates blockchain consensus algorithms (PoW, PoS, DAG) and recommends DAG for superior performance in handling IoT data. Fog; Drones; Blockchain; PSO; IoT; Vehicular.
Citation: Wadhwa S, Gupta D, Rani S, Driss M, Boulila W (2025) Empowering drones in vehicular network through fog computing and blockchain technology. PLoS ONE 20(1): e0314420. https://doi.org/10.1371/journal.pone.0314420
Editor: Fazlullah Khan, Abdul Wali Khan University Mardan, PAKISTAN
Received: April 18, 2024; Accepted: November 10, 2024; Published: January 24, 2025
Copyright: © 2025 Wadhwa et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: Data is shared on https://github.com/Shivani-Wadhwa/Shivani-Wadhwa/blob/main/drones%20-%20data.xlsx.
Funding: The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.
Competing interests: no authors have competing interest.
1 Introduction
With the progress of Beyond fifth-generation (B5G) networks, the Internet of Things (IoT) has significantly grown in various smart surroundings. This growth has improved people’s daily lives by integrating numerous intelligent devices. Yet, the widespread use of dispersed intelligent IoT devices in smart environments has brought about a range of difficulties with the effective handling of data processing, storage, and transfer [1]. The proliferation of smart gadgets necessitates substantial computational resources, energy consumption, and radio bandwidth, hence necessitating meticulous deliberation and strategic remedies.
The rapid advancement of the IoT has led to the expansion of IoT device usage outside industrial sectors such as smart manufacturing, logistics, and energy trading. These technologies are currently being smoothly incorporated into daily life, exerting an impact on domains such as smart healthcare, cities, and homes [2–5]. In recent years, drones, also known as Unmanned Aerial Vehicles (UAVs), have become widely used IoT devices. This is primarily because they offer exceptional flexibility, adaptability, cost-effectiveness, and compact size [6].
Drones serve as crucial mobile drone edge intelligence by acting as relay stations, enabling the gathering of data from low-power, short-range IoT devices in smart surroundings [7]. This feature not only simplifies the process of collecting data but also enhances energy efficiency optimization in these environments [8, 9]. The unique characteristics of drones, such as their simple deployment, ability to move in three dimensions, and higher probability of establishing direct communication, make them an essential tool for expanding network coverage. This upgrade greatly improves the Quality of Service (QoS) for smart IoT devices while also bringing computing capabilities closer to these devices. Drones essentially serve as dynamic mediators that enhance the connectivity and computing capabilities of IoT devices, creating an ecosystem characterized by enhanced efficiency and service quality [10].
Drones play a pivotal role in the evolution of smart environments within the B5G framework [11, 12]. Operating as intelligent edge nodes, they facilitate data gathering, efficient computing, and localized data model training, making significant contributions to environmental consciousness across various domains [13]. By utilizing drones as intelligent edge nodes, these airborne devices elevate smart environments into hubs of innovation and efficiency. The localized processing and computing enhance overall intelligence while promoting ecological sustainability. Despite their potential, integrating drones into IoT for smart environments presents security and energy consumption challenges. Limited energy resources impact network access lifespan, necessitating a focus on addressing these challenges for sustainable and efficient smart environments. Despite challenges, the integration of drones signifies a stride towards greener and more intelligent technological landscapes [14].
Incorporating drones into IoT networks, where drones assume the role of IoT devices, is commonly known as the Internet of Drones (IoD). This integration has found applications in traffic surveillance, object tracking, and disaster rescue. One primary use of IoD is its sensing service, which involves capturing pictures and videos to gather information about specific locations of interest. Drones subsequently generate various computing tasks, offloading them to the Internet through IoD gateways for further processing. The computed results are then transmitted back to the drones and reported to clients [15]. Typically, drones adhere to predetermined transit routes to visit all designated locations of interest [16].
In numerous applications, drones are enlisted to handle computationally intensive tasks like path planning and pattern recognition. However, the inherent limitations in resources, such as battery power and computing capability, make it challenging for a single drone to efficiently manage complex tasks locally [17]. Consequently, to tackle these demanding computational tasks, researchers have explored the option of offloading computations to a cloud server and retrieving results afterward. This approach significantly augments the capabilities of a swarm of drones virtually, making it well-suited for specific business applications like topographic mapping, resource exploration, and environmental monitoring, where latency and reliability are not critical considerations.
Some practical scenarios often involve computing tasks with stringent low latency and high-reliability requirements, such as object recognition, disaster rescue, and emergency obstacle avoidance. Cloud servers, usually located at a considerable distance from drones, introduce notable latency during data transmission [18]. Meanwhile, in some challenging environments, the absence of a functional wireless infrastructure further exacerbates the issue, rendering cloud-based computation offloading unsuitable for latency- and reliability-sensitive business applications.
Traditionally, drones have relied on offloading computing tasks to remote cloud servers, benefiting from extensive computing resources. However, this approach introduces significant network latency, impacting user QoS. To address this, Fog-aided IoT networks have been proposed, aiming to enhance IoD service performance, especially for time-sensitive tasks. As Fog devices are closer to the drone network, their processing speed also increases. This improves the decision-making power of the drones, whereas higher latency is observed in the case of cloud computing. Fog nodes are placed near IoT devices, typically attached to gateways, providing computational resources for deadline-driven tasks from drones, ensuring swift service responses.
The performance of a drone is notably influenced by its limited battery capacity due to size and weight constraints. Efficient IoD systems must tackle this challenge by minimizing energy consumption. In IoD networks, drone energy usage encompasses wireless communication and propulsion for hovering and transitions [19]. Designing energy-efficient IoD systems requires careful consideration of both types of energy consumption.
To fulfill the increasing demand for drone flying automation, user drones are expected to engage in a broader range of applications, necessitating corresponding network services. Surprisingly, few studies have more focussed on establishing a secure service architecture specifically tailored for drone networks [20–23]. Existing research predominantly employs drones as auxiliary components to address the security challenges of IoD data processing.
The absence of a systematic architecture for drone network services has created a hindrance to the rapid generation of services and applications, consequently hindering the realization of drone flying automation. Recognizing this gap, there is an urgent need for a comprehensive drone network service architecture to catalyze and expedite the implementation of drone flying automation. Consequently, this article addresses this imperative need by proposing a secure, reliable, and real-time drone network service architecture, with a particular emphasis on collaboration with fog computing.
The main contributions of the paper are:
- Dynamic Trajectory Planning for drones is done on the basis of factors such as velocity, acceleration coefficients, and random values (selection of trajectory path, change in path due to wind, temperature, etc.). The dynamic nature of trajectory planning contributes to efficient and adaptive drone movement within the specified area.
- Fog Computing for Drone with Blockchain Technology (FCDBT) is proposed for the vehicular network. This architecture is designed to facilitate efficient communication and collaboration among drones, smart vehicles, fog computing nodes, and blockchain technology.
- Offloading of computation to other fog nodes is done based on the algorithm proposed. This algorithm is based on the Particle Swarm Optimization (PSO).
- Blockchain technology is used for secure data storage of processed data generated by drones. Different consensus algorithms, including Proof of Work (PoW), Proof of Stake (PoS), and Directed Acyclic Graph (DAG), are used to evaluate the best consensus approach for this data.
The organization of the paper is structured as follows:
Related work of the study is presented in section 2. Section 5 provides the trajectory motion of drones. The system model is formulated in section 4. FCDBT model is proposed in section 3. Section 6 discusses the results. Section 7 concludes the paper.
2 Related work
Extensive research has been conducted on ensuring security, managing trajectory control, and optimizing resource utilization for computational tasks.
Authors in [24] thoroughly examined drone security, addressing issues such as collisions within drone swarms, network attacks, and unforeseen problems. They proposed methods to manage task allocation within drone swarms and substantiated the effectiveness of their approach through multiple real physical flying experiments. The research paper [25] endeavors to introduce a conceptual model illustrating the organization of such an architecture and outlines the specific features that an IoD system, based on this architecture, should incorporate to effectively support diverse drone applications. Drones enhance network architectures by positively impacting reliability, connectivity, throughput, and delay. However, challenges such as wireless medium unreliability, battery duration, high mobility, and security and privacy concerns have led to a substantial body of recent literature on IoD-related issues as stated in a recent study [26].
The study [27] examines physical layer aspects in aerial/ground environments, emphasizing channel characterization and modeling through measurement approaches. It classifies models into empirical or analytical categories, detailing empirical studies based on measurement campaigns that consider signal frequency, environmental conditions, and UAV parameters. The article [28] surveys area coverage challenges in UAV networks, addressing factors like coverage capabilities, UAV mobility, network connectivity, and environmental obstacles. Coverage types, categorized by UAV motion and network deployment, are discussed. Energy consumption, UAV coordination, and path planning constraints are briefly outlined, along with adopted path models for studying dynamic coverage problems.
The IoD network relies on the interconnection of drones through the IoT, making it susceptible to security and privacy threats that impact IoT networks. Safeguarding against these threats is crucial for optimal IoD application performance, as security and privacy concerns have considerably limited the broader impact of the IoD paradigm [29]. The study [30] focuses on optimizing multiuser communication scheduling and UAV trajectory to maximize minimum throughput, presenting an efficient iterative algorithm for convergence. Simulation results demonstrate substantial throughput gains compared to benchmark schemes, emphasizing the effectiveness of the proposed design. The research [31] paper explores the role of drones in smart city management, particularly in addressing security concerns. The research emphasizes the integration of AI-based drones to enhance security measures in urban areas. It also discusses the potential contribution of emerging technologies like blockchain to improve overall smart city management. Specifically, both the movement of drones and inadequate security pose potential issues that have not yet materialized. These concerns encompass unauthorized access, increased latency, and elevated energy consumption within the drone network [32]. A novel model-based aggregation technique is introduced for Federated Learning in Industrial Cyber-Physical Systems, enhancing sensor data privacy using Lime for transparency and Blockchain for security. It incorporates transfer learning to improve adaptability to evolving threats and proposes a comprehensive privacy evaluation method [33].
A dynamic collaborative task offloading (DCTO) method is proposed to address challenges in offloading strategies [34]. This method considers fog nodes’ resource status, allowing tasks to be executed by single or multiple fog nodes to reduce latency. Their approach significantly decreased latency, especially under high service request rates, while maintaining low computational complexity for online implementation, distinguishing it from other algorithms. A dynamic programming is utilized to optimize computation offloading for stationary edge nodes [35]. Their novel approach, Dynamic Programming with Hamming distance termination (DPH), addresses the limited battery power of mobile devices. In high network bandwidth scenarios, DPH strategically offloads tasks to the cloud, enhancing execution time and reducing mobile device energy usage. Notably, DPH is scalable and efficiently handles larger offloading problems, showcasing its versatility and effectiveness. Fog computing enhances vehicular ad hoc networks, but load balancing among fog nodes remains a challenge, impacting service availability and resource efficiency. A dynamic resource management (DRM) method is introduced that utilizes service migration to allocate fog resources to autonomous cars [36]. Solved efficiently in polynomial time, the method significantly improves capacity, maintainability, accessibility, availability, and throughput, addressing the load balancing challenge in vehicular ad hoc networks. A task offloading and scheduling method are proposed based on osmosis [37]. This algorithm categorizes devices and tasks and then assigns tasks to nodes based on their respective capacities. The osmotic-based scheduling algorithm exhibited notably superior performance when compared to traditional random and round-robin task offloading algorithms. The effectiveness of this approach was validated through a comparison using synthetic datasets, highlighting its advantages over other algorithms. The existing algorithms either exhibit slow convergence or lack the assurance of reaching the optimal solution. These limitations make them unsuitable for tasks that demand both low latency and high reliability, which is the specific focus of our study.
3 FCDBT: Fog computing for drone with blockchain technology
The drones encounter a significant demand for computational resources as they engage in the complex task of interpreting data from the IoT during their flight within a designated area. Navigating through this fixed space, the drones actively sense and collect data from the smart vehicular environment, as shown in Fig 1. These IoT devices, which serve as the primary data sources, are inherently constrained by low power and limited computational capabilities. This inherent limitation poses a challenge in directly extracting intelligent data from the vast pool of sensed data.
In response to this challenge, each drone is responsible for autonomously processing a fraction of the overall computation task. However, recognizing the complexity and volume of the data, a collaborative approach is adopted. A portion of the computational task is intelligently offloaded to other drones that traverse within the trajectory area of the originating drone. This cooperative effort transforms the neighboring drones into fog nodes, acting collectively to share and execute computational tasks efficiently. The allocation of the specific fraction of computation to other nodes is intricately determined by a coefficient, a pivotal parameter calculated by the algorithm based on Particle Swarm Optimization (PSO) presented in Algorithm 1. PSO model automatically represents the decentralized networking of drones. Each drone acts as a swarm particle and performs the adjustment on the basis of its own experience and the joint experience of the swarm. This performs the efficient task of offloading and improves trajectory management.
A robust solution is implemented to strengthen the integrity and security of the processed data, as shown in Fig 2. The data is securely stored within the blockchain network, a decentralized and tamper-resistant ledger. This blockchain ledger not only safeguards the processed data but also ensures the immutability and confidentiality of the information. This security framework enables the extraction of intelligent decisions from securely processed data, thereby enhancing the overall efficiency and reliability of the drone-based system within the smart environment.
The sensors embedded in drones actively monitor the vehicular network, where intelligent vehicles navigate the roadways. Drones adeptly hover around these smart vehicles, consistently collecting real-time data. Operating at a predetermined altitude and within designated zones, the drones capture and process this information. The processed and securely stored data within the blockchain network plays a pivotal role in facilitating informed decision-making.
Utilizing this processed data, the system provides crucial information to vehicular users. Information regarding impending traffic congestion, accident-prone zones, and other relevant updates is provided to the users in real-time. This proactive approach empowers users by offering alternative routes, enhancing their ability to make informed decisions and navigate traffic intelligently.
Algorithm 1: PSO for coefficient computation of offloading
1: Initialize swarms with different combinations of coefficients of computation.
2: Initialize vi and position X(xi, yi, zi) of the ith drone moving within the trajectory area.
3: while True do
4: for each drone do
5: Compute coefficient, update pbest, and gbest.
6: Update inertia weight.
7: for each drone do
8: Update v and X.
9: end for
10: end for
11: end while
12: return gbest = 0
4 System model
‘N’ number of dynamic moving drones are present in the network region of drones. Drones are represented by d0, d1, d2, d3,……, dN. Due to less computational resources available with the drones, the drone d0 performs a computational offloading to the nearby drones. Drone, d0 is moving in its trajectory area. Within its trajectory area, let us assume that n (n < N) drones are moving.
Number of subtasks, α = T/n,
Computation to be done by d0 = α * β
Computation to be done by other drones = α * (1 − β)
Each drone performs computation = ki * α * (1 − β)
ki performs the computation offloading coefficient of each drone present in the trajectory area of d0.
The velocity variable represented in Eq 1, changing dynamically, determines the speed of the drone in its trajectory motion. By varying the values of w, c1, c2, the motion of the drone is affected. w determines the pace with which the coefficient, ki is computed. A lower value of ‘w’ computes the value of ‘k’ faster.
Effective communication among dynamically moving drones demands data exchange in a synchronized manner. More complexity is introduced in the system when computational tasks are distributed. The drones need to perform in their operational range only, otherwise their exist chances of their failure.
5 Trajectory motion of drones
The operator of the drone utilizes a remote controller to transmit signals to the flight controller, specifying the preferred direction and speed for the drone. Advanced flight controller algorithms analyze the inputs received from the remote controller and additional sensors like GPS and a compass. These algorithms then compute the optimal motor speed and direction necessary for executing the specified commands.
5.1 Trajectory motion
Deploying a solitary drone for mission execution poses certain challenges. For instance, in reconnaissance missions, a single UAV may encounter limitations in observation angles, restricting its ability to observe the target area comprehensively. When confronted with expansive search tasks, the coverage of a single UAV may prove insufficient for the entire reconnaissance area. Additionally, in offensive operations, constraints on combat range, killing radius, destruction capability, and attack accuracy can hamper the success rate of the overall mission. Furthermore, if a single drone experiences a malfunction mid-mission, an immediate interruption and return are necessary, potentially causing delays and disrupting the entire operational plan in a wartime scenario.
To address these shortcomings and enhance combat effectiveness, proper planning of the dynamic drone’s trajectory is needed. There is a requirement to organize, maintain, or reconstruct a specific geometric formation using multiple drones during task execution. Such formations are designed to adapt dynamically to the ever-changing battlefield situation and the specific requirements of the mission. Dynamic trajectory motion means adapting the flight of the drone based on real-time scenarios of obstacles, climate, sensor data, etc. Dynamic planning will allow the efficient navigation of drones and optimize safety and performance measures.
5.2 Trajectory equations
Efficient dynamic trajectory planning is a critical aspect of executing the Internet of Drones. Graphs are instrumental in defining drone targets, encompassing both horizontal and vertical distances. Various algorithms, such as Dubins Curve, Probabilistic Roadmaps, Floyd algorithm [38], Dijkstra algorithm [39], and the Voronoi graph method [40, 41], can be applied to ensure the secure navigation of multiple drones. The dynamic nature of longitude, latitude, and altitude over time characterizes the velocity along the three axes. The trajectory angle and velocity during takeoff determine the drone’s horizontal and vertical distances. The symbols used in the equations are defined in Table 1.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
These equations represent the trajectory position equations of a drone.
Eqs 2–4 represents the motion along three axes, i.e., the x, y, and z axes. Eqs 5–7 describe the adaption of dynamic motion of drone moves in space by keeping in view the impact of thrust (force), gravity, and orientation angles. Eqs 8–10 mention the distance of a drone from the earth’s surface. Here, the curvature of the Earth and gravitational impacts are generally ignored due to the operations of drones on a small scale.
6 Results and discussions
The simulation involved ten client threads running on a Win10 Operating System with 8 CPUs and 16G RAM, representing nine user drones. Additionally, specific parameters were pre-set for the application based on real-world drone conditions. The configured maximum flight speed of the user drone is 15 m/s, and the defined trajectory area of the attention area is 90 m2. The master drone, dr0, is positioned at the origin, denoted as (0, 0, 0). The failure rates for both dr0 and neighboring drones, dri, are assumed to follow a uniform distribution, represented as v0 and vi U([0, 0.005]). The open-source traffic simulator SUMO is used to generate the flow of vehicles to simulate the movement trace of vehicles. To benchmark and compare the performance of the proposed model, fog, edge, and cloud resources are used.
6.1 Average response latency
The average response latency signifies the duration drones require to offload their computations to other devices. Low latency is essential to deliver efficient services to vehicular users, enabling them to make timely decisions. Computation offloading is distributed across fog, edge, and cloud devices, as depicted in Fig 3. With an increase in concurrent requests, drones (fog nodes) situated within the trajectory area respond quickly. This results in reduced latency and enhances the quality of service compared to edge and cloud alternatives.
6.2 Throughput in accessing resources from fog, edge, and cloud
The average throughput represents the drone’s ability to handle and process data locally, as well as its efficiency in offloading computations to fog nodes. A comparison was conducted to evaluate the offloading of computations to fog, edge, and cloud nodes, as depicted in Fig 4. Fog nodes exhibit superior throughput primarily because they are readily available within the drone’s trajectory area. The reduced latency at fog nodes contributes to this improved throughput.
6.3 Througput in blockchain network
The throughput of a blockchain network is evaluated based on various consensus algorithms employed within the network. This evaluation is conducted using the Blocksim simulator. Consensus algorithms such as PoW, PoS, and DAG are considered in this assessment. DAG demonstrates superior performance, particularly in handling IoT data, when compared to PoW and PoS. The comparison of these three consensus approaches in storing processed drone data is illustrated in Fig 5. DAG’s effectiveness in managing IoT data contributes to its good performance in sensed data. Organization of tasks on the basis of dependencies in DAG helps the drones in processing the critical input data. Hence, latency is minimized, which helps the drones to quickly respond to real-time scenarios.
7 Conclusion
This study addresses the escalating need for applications with low-latency and high-throughput capabilities through the widespread adoption of IoT and drone devices. Our work presents the innovative concept of harnessing drones equipped with fog nodes. Trajectory motion and equations are also presented to know the area of motion of drones. The FCDBT model proposed in drone network service architecture addresses security concerns, optimizes computational tasks, and ensures real-time responsiveness. The consideration of limited drone battery capacity is addressed by designing an energy-efficient IoD system. By minimizing energy consumption in both wireless communication and propulsion, the architecture aims to extend the operational lifespan of drones, contributing to sustainable and prolonged use. The integration of blockchain technology ensures secure and tamper-resistant storage of processed data. This not only safeguards the integrity of the information but also provides a decentralized and confidential ledger for storing critical data, enhancing overall security within the IoD system. The proposed model evaluates various consensus algorithms, with DAG emerging as the recommended choice for its superior performance, particularly in handling IoT data. Reduced average response latency, improved throughput, and successful integration of fog computing and blockchain technology demonstrate the architecture’s effectiveness. In the future, this model can be proposed for different types of networks to respond quickly to the decisions made using the processed data of drones.
References
- 1. Heintz B, Chandra A, Sitaraman RK. Optimizing grouped aggregation in geo-distributed streaming analytics. InProceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing 2015 Jun 15 (pp. 133-144). Nat Rev Genet. 2008 Dec;9(12):938–950.
- 2. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE communications surveys tutorials. 2015 Jun 15;17(4):2347–76.
- 3. Hemdan EE, Al-Atroush ME. An efficient IoT-based soil image recognition system using hybrid deep learning for smart geotechnical and geological engineering applications. Multimedia Tools and Applications. 2024 Jan 24:1–22.
- 4. Siddique AA, Alasbali N, Driss M, Boulila W, Alshehri MS, Ahmad J. Sustainable collaboration: Federated learning for environmentally conscious forest fire classification in green internet of things (IoT). Internet of Things. 2024 Apr 1;25:101013.
- 5. Varone G, Boulila W, Driss M, Kumari S, Khan MK, Gadekallu TR, et al. Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications. Information Fusion. 2024 Jan 1;101:102006.
- 6. Qiu J, Grace D, Ding G, Zakaria MD, Wu Q. Air-ground heterogeneous networks for 5G and beyond via integrating high and low altitude platforms. IEEE Wireless Communications. 2019 Oct 16;26(6):140–8.
- 7. Koubâa A, Ammar A, Alahdab M, Kanhouch A, Azar AT. Deepbrain: Experimental evaluation of cloud-based computation offloading and edge computing in the internet-of-drones for deep learning applications. Sensors. 2020 Sep 14;20(18):5240. pmid:32937865
- 8. Li B, Fei Z, Zhang Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet of Things Journal. 2018 Dec 16;6(2):2241–63.
- 9.
Du J, Cheng Y, Li S, Li X, Gadekallu TR. Cramér-Rao Bound for Drone-Assisted MIMO-OFDM IoT Systems Based on PARATUCK Tensor Model. InIEEE INFOCOM 2024-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2024 May 20 (pp. 1–6). IEEE.
- 10. Shamsoshoara A, Afghah F, Blasch E, Ashdown J, Bennis M. UAV-assisted communication in remote disaster areas using imitation learning. IEEE Open Journal of the Communications Society. 2021 Mar 18;2:738–53.
- 11. Almalki FA, Soufiene BO, Alsamhi SH, Sakli H. A low-cost platform for environmental smart farming monitoring system based on IoT and UAVs. Sustainability. 2021 May 24;13(11):5908.
- 12. Alsamhi SH, Ma O, Ansari MS, Meng Q. Greening internet of things for greener and smarter cities: a survey and future prospects. Telecommunication Systems. 2019 Dec;72:609–32.
- 13. Zhou F, Hu RQ, Li Z, Wang Y. Mobile edge computing in unmanned aerial vehicle networks. IEEE Wireless Communications. 2020 Jan 17;27(1):140–6.
- 14. Alsamhi SH, Afghah F, Sahal R, Hawbani A, Al-qaness MA, Lee B, et al. Green internet of things using UAVs in B5G networks: A review of applications and strategies. Ad Hoc Networks. 2021 Jun 1;117:102505.
- 15. Gu Y, Chang Z, Pan M, Song L, Han Z. Joint radio and computational resource allocation in IoT fog computing. IEEE Transactions on Vehicular Technology. 2018 Mar 29;67(8):7475–84.
- 16. Yao J, Ansari N. QoS-aware power control in internet of drones for data collection service. IEEE Transactions on Vehicular Technology. 2019 May 7;68(7):6649–56.
- 17.
Messous MA, Arfaoui A, Alioua A, Senouci SM. A sequential game approach for computation-offloading in an UAV network. InGLOBECOM 2017-2017 IEEE Global Communications Conference 2017 Dec 4 (pp. 1–7). IEEE.
- 18. Kumar K, Lu YH. Cloud computing for mobile users: Can offloading computation save energy?. Computer. 2010 Apr 8;43(4):51–6.
- 19. Yao J, Han T, Ansari N. On mobile edge caching. IEEE Communications Surveys Tutorials. 2019 Mar 29;21(3):2525–53.
- 20. Shi W, Zhou H, Li J, Xu W, Zhang N, Shen X. Drone assisted vehicular networks: Architecture, challenges and opportunities. IEEE Network. 2018 Jan 10;32(3):130–7.
- 21. Mayor V, Estepa R, Estepa A, Madinabeitia G. Energy-efficient UAVs deployment for QoS-guaranteed VoWiFi service. Sensors. 2020 Aug 10;20(16):4455. pmid:32785009
- 22. Derhab A, Cheikhrouhou O, Allouch A, Koubaa A, Qureshi B, Ferrag MA, et al. Internet of drones security: Taxonomies, open issues, and future directions. Vehicular Communications. 2023 Feb 1;39:100552.
- 23. Allouch A, Cheikhrouhou O, Koubâa A, Toumi K, Khalgui M, Nguyen Gia T. Utm-chain: blockchain-based secure unmanned traffic management for internet of drones. Sensors. 2021 Apr 27;21(9):3049. pmid:33925489
- 24. Fu Z, Mao Y, He D, Yu J, Xie G. Secure multi-UAV collaborative task allocation. Ieee Access. 2019 Mar 12;7:35579–87.
- 25. Gharibi M, Boutaba R, Waslander SL. Internet of drones. IEEE Access. 2016 Mar 2;4:1148–62.
- 26. Boccadoro P, Striccoli D, Grieco LA. An extensive survey on the Internet of Drones. Ad Hoc Networks. 2021 Nov 1;122:102600.
- 27. Khuwaja AA, Chen Y, Zhao N, Alouini MS, Dobbins P. A survey of channel modeling for UAV communications. IEEE Communications Surveys Tutorials. 2018 Jul 16;20(4):2804–21.
- 28.
Chen Y, Zhang H, Xu M. The coverage problem in UAV network: A survey. InFifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2014 Jul 11 (pp. 1–5). IEEE.
- 29. Yahuza M, Idris MY, Ahmedy IB, Wahab AW, Nandy T, Noor NM, et al. Internet of drones security and privacy issues: Taxonomy and open challenges. IEEE Access. 2021 Apr 9;9:57243–70.
- 30.
Wu Q, Zeng Y, Zhang R. Joint trajectory and communication design for UAV-enabled multiple access. In: GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE; 2017. p. 1–6.
- 31. Rawat B, Bist AS, Apriani D, Permadi NI, Nabila EA. Ai based drones for security concerns in smart cities. APTISI Transactions on Management. 2023;7(2):122–127.
- 32. Yazdinejad A, Parizi RM, Dehghantanha A, Srivastava G, Mohan S, Rababah AM. Cost optimization of secure routing with untrusted devices in software defined networking. Journal of Parallel and distributed Computing. 2020;143:36–46.
- 33. Aflaki A, Karimipour H, Gadekallu TR. Privacy-Prioritized Model Aggregation in ICPS: A Novel Approach to Federated Learning Aggregation with Lime and Blockchain. IEEE Transactions on Industrial Cyber-Physical Systems. 2024;.
- 34. Tran-Dang H, Kim DS. Dynamic collaborative task offloading for delay minimization in the heterogeneous fog computing systems. Journal of Communications and Networks. 2023;.
- 35.
Shahzad H, Szymanski TH. A dynamic programming offloading algorithm for mobile cloud computing. In: 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE; 2016. p. 1–5.
- 36. Thanedar MA, Panda SK. A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks. Peer-to-Peer Networking and Applications. 2023; p. 1–15.
- 37. Reddy PB, Sudhakar C. An osmotic approach-based dynamic deadline-aware task offloading in edge–fog–cloud computing environment. The Journal of Supercomputing. 2023; p. 1–23.
- 38.
Zhou F, Nie H. Quick path planning based on shortest path algorithm for multi-uav system in windy condition. 2021.
- 39.
Tin C. Robust multi-UAV planning in dynamic and uncertain environments. Massachusetts Institute of Technology; 2004.
- 40.
Chen X, Li Gy, Chen Xm. Path planning and cooperative control for multiple UAVs based on consistency theory and Voronoi diagram. In: 2017 29th Chinese control and decision conference (CCDC). IEEE; 2017. p. 881–886.
- 41.
Chen S, Li C, Zhuo S. A distributed coverage algorithm for multi-UAV with average voronoi partition. In: 2017 17th International Conference on Control, Automation and Systems (ICCAS). IEEE; 2017. p. 1083–1086.