ArticlePDF Available

Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory

Authors:

Abstract and Figures

Drones or Unmanned Aerial Vehicles (UAVs) can be highly efficient in various applications like hidden area exploration, delivery, or surveillance and can enhance the quality of experience (QoE) for end-users. However, the number of drone-based applications are not very high due to the constrained flight time. The weights of the drones need to be kept less, and intuitively they cannot be loaded with big batteries. Frequent recharging and battery replacement processes limit the appropriate use of drones in most applications. A peer-to-peer distributed network of drones and charging stations is a highly promising solution to empower drones to be used in multiple applications by increasing their flight time. The charging stations are limited, and therefore, an adequate, fair, and cost-optimal scheduling algorithm is required to serve the most needed drone first. The proposed model allows the drones to enter into the network and request for a charging time slot from the station. The stations are also the part of the same network, this work proposes a scheduling algorithm for drones who compete for charging slots with constraints of optimizing criticality and task deadline. A game-theoretic approach is used to model the energy trading between the drones and charging station in a cost-optimal manner. Numerical results based on simulations show that the proposed model provides a better price for the drones to get charged and better revenue for the charging stations simultaneously.
Content may be subject to copyright.
10
2.25kg
2/3rd
2/3rd
x
x
D={1,2,3, . . . , d} |D|
C={1,2,3, . . . , c}
|C|
T={1,2,3, . . . , t}tT
|T |
Bddth
Bccth
Pch,c cth
Pdch,c cth
occth
oddth
η
ν
M
T.E
C
ρ
W
X
Y
Z
λ
NT
G
H
γ
ψ
ζ
x, y
ω
ξ
Btt
dBt
ddth
Pt
ch,d dth Pt
dch,d
dth ot
ch,d ot
dch,d
dth
Bt
d= ∆t× αt
dPt
ch,dot
ch,d βt
dPt
dch,d
ot
dch,d !+Btt
d
Bp
d≤ Bd≤ Bq
d
Bp
dBq
d
dth
αt
d+βt
d= 1, αt
d, βt
d∈ {0,1}
αt
dβt
ddth
(3)
Btt
cBt
ccth
Pt
ch,c cth
Pt
dch,c cth
ot
ch,c ot
dch,c cth
Bt
c= ∆t× αt
cPt
ch,cot
ch,c βt
cPt
dch,c
ot
dch,c !+Btt
c
Bp
c≤ Bc≤ Bq
c
Bp
cBq
c
cth
αt
c+βt
c= 1, αt
c, βt
c∈ {0,1}
αt
cβt
ccth
(6)
η
νd
dth
W=(νqνd)
(νqνp)×η, νpνdνq
Wνp, νq
Mddth
X=(Mq− Md)
(Mq− Mp)×η, Mp≤ Md≤ Mq
X Mp,Mq
MpMq[0.2,3]
Cddth
Cd= 1 Bt
d
T.Ed
Bt
dT.Ed
dth
Y=(Cd− Cp)
(Cq− Cp)×η, Cp≤ Cd≤ Cq
Y Cp,Cq
0 1 0
1
ρd
dth
Z=(ρdρp)
(ρqρp)×η, ρpρdρq
Zρp, ρq
[20,50]
ρρb
ρb
λd=pW2+X2+Y2+Z2
λddth W,X,Y,Z
ith
λw1
µi=λi
λw
, i D
λwλiith
µiith
Φi=Mi×Bi, i D
Φiith
MiBiith
T= [T1,T2,...,Td]
M= [M1,M2,...,Md]
C= [C1,C2,...,Cd]
ρ= [ρ1, ρ2, . . . , ρd]
λ= [λ1, λ2, . . . , λd]
(7)
(8)
(10)
(11)
(12)
K0
K6=
xarg maxλd, i, d D
KK+ 1;
iD
(14)
ρ(K+ 1) > ωi
(15)
(11)
(12)
previousP riorityV ector 6=newP rior ityV ector
γ=(Gq− Gd,c)
(Gq− Gp)×η, Gp≤ Gd,c ≤ Gq
γGd,c dth
cth Gp,Gq
cth dth
G11 G12 G1k
G21 G22 G2k
Gi1Gi2Gik
ψ=(Hc− Hp)
(Hq− Hp)×η, Hp≤ Hc≤ Hq
ψHccth
Hp,Hq
iD
(17)
(16)
Hb
(18)
(19)
L0
L6=
y= arg maxζd,c, j, c C, d D
LL+ 1;
j
(23)
H(K+ 1) > ξ
H(K+ 1) ξ
(11)
(12)
previousP riorityV ector 6=newP rior ityV ector
Hp
Hq[4,11]
ζd,c =pγ2+ψ2
ζd,c cth dth
xi= arg maxλd, i, d D
xi
ρ(k+ 1)) = ρ(k) + j, j ∈ {0,1,2,3}
ρ(k+ 1) > ω
ρ(k+ 1)) = ωi
ωiith
yc= arg maxζd,c, j, c C, d D
yccth
H(k+ 1)) = H(k) + j, j ∈ {0,1,2,3}
ξ
ξ
4
123456
1
2
3
4
0.8
0.85
0.9
0.95
1
Iterations
Drones
Normalized Time for Charging
Index1Energy1
Index2Energy2
IndexcEnergyc
22nd
[2500,6500]
[0.2,3]
[20,50]
4 3
[4,11]
1
(5)
1 (6a)
1 1
2 (6b)
3 2
1 3
(6c)
4 (6d) 1
123
Iterations
4
5
6
7
8
9
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
0
2
4
6
8
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
4
5
6
7
8
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
4
5
6
7
8
9
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
(7)
(8)
123456
Iterations
20
22
24
26
28
Price
Drone 1
Drone 2
Drone 3
Drone 4
(9)
1
(9a)
(9c)
(9d)
123
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
123
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
123
Charging Station
0
1
2
3
4
5
6
7
8
Energy Rate
Proposed Model
First Bid
1 2 3
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
... It appears that using PET in the building of pressurized hydrogen storage containers for use in drones could be a promising alternative. Hassija et al. [28] Investigated drones can be quite effective in many different applications. What issues do drone energy storage systems have? ...
... Integrating UAVs with emerging technologies, including the Internet of Things (IoT), 5G, and Beyond 5G networks, has further expanded their application spectrum [4]. During the past decade, UAVs have been widely deployed in areas such as object detection, public safety, traffic monitoring, military operations, hazardous environment exploration, navigation, atmospheric data collection, disaster recovery, healthcare, data transmission, infrastructure monitoring, emergency management, cargo transport, wildfire surveillance, and logistics [5]. ...
Article
Full-text available
The evolution of Flying Ad Hoc Networks (FANETs) demands the development of advanced routing protocols that can address the unique challenges associated with UAV missions. This paper proposes a novel Air-to-Ground, Energy-Aware, mission-oriented protocol, leveraging Fuzzy Logic (AERO-FL), to enhance UAV cooperation and optimize network performance in deterministic scanning operations. The study focuses on a Smart Farming (SF) scenario for extensive crop surveillance, which traditionally relies on a single UAV. This conventional approach is often inefficient because of its inability to enable real-time data transmission and its vulnerability to operational failures. The proposed system replaces the single UAV approach with a cooperative FANET comprising multiple UAVs, significantly reducing mission completion time while facilitating real-time data transmission through the cooperation of aerial and ground nodes. The simulation results demonstrate that AERO-FL outperforms established routing protocols in key performance metrics. These findings underscore the potential of AERO-FL in a variety of scanning applications, including traffic monitoring, environmental observation, disaster response, and military operations. By enabling UAV cooperation in a mission-oriented routing framework, this study provides a foundation for future research aimed at achieving full FANET capabilities.
... Drones necessitate essential facilities such as stations for refueling and battery replacement. Consequently, various studies have been conducted in this context, including the optimization of charging station networks [72,73], the scheduling optimization of drone visits to charging stations [74], and the concurrent optimization of drone flight mission planning and recharging [75]. ...
Article
Full-text available
This study explores the evolving trends and research issues in the field of drone-assisted multimodal logistics over the past two decades. By employing various text-mining techniques on the related research publications, we identify the most frequently investigated topics and research issues within this domain. Specifically, we utilize titles, abstracts, and keywords from the collected studies to perform both Latent Dirichlet Allocation techniques and Term Frequency-Inverse Document Frequency analysis, which help in identifying latent topics and the core research themes within the field. Our analysis focuses on three primary categories of drone-assisted logistics: drone–truck, drone–ship, and drone–robot systems. The study aims to uncover which latent topics have been predominantly emphasized in each category and to highlight the distinct differences in research focuses among them. Our findings reveal specific trends and gaps in the existing literature, providing a clear roadmap for future research directions in drone-assisted multimodal logistics. This targeted analysis not only enhances our understanding of the current state of the field but also identifies critical areas that require further investigation to advance the application of drones in logistics.
... Some other existing work in literature such as [5], [6], [7] uses a game-theoretic approach to model the energy trading between UAVs and charging stations in a cost-optimal manner. Their proposed model allocates a time slot to the UAVs using an auctioning process. ...
Preprint
This paper introduces a novel formulation aimed at determining the optimal schedule for recharging a fleet of n heterogeneous robots, with the primary objective of minimizing resource utilization. This study provides a foundational framework applicable to Multi-Robot Mission Planning, particularly in scenarios demanding Long-Duration Autonomy (LDA) or other contexts that necessitate periodic recharging of multiple robots. A novel Integer Linear Programming (ILP) model is proposed to calculate the optimal initial conditions (partial charge) for individual robots, leading to the minimal utilization of charging stations. This formulation was further generalized to maximize the servicing time for robots given adequate charging stations. The efficacy of the proposed formulation is evaluated through a comparative analysis, measuring its performance against the thrift price scheduling algorithm documented in the existing literature. The findings not only validate the effectiveness of the proposed approach but also underscore its potential as a valuable tool in optimizing resource allocation for a range of robotic and engineering applications.
... Kim and Moon [35] proposed the TSP with a drone station as a facility for storing and recharging drones. Hassija et al. [36] developed a scheduling algorithm to manage drone charging within a network of drones and charging stations. Cokyasar et al. [37] minimized long-term delivery costs in a similar delivery network while considering service congestion at recharging stations. ...
Article
Full-text available
In the past few years, drones have been adopted as a novel delivery tool towards medical supplies, improving delivery service efficiency due to fast speed and neglection of geographical limitations. However, the flight endurance of a battery-operated drone is limited for long-distance medical supplies delivery operations. Recharging stations, as a kind of drone facility, allow multiple stops for drones to supplement the power to overcome the flight-range limitations. This paper studies drone-assisted long-distance medical supplies delivery with recharging stations in rural communities by a mixed integer linear programming model. To illustrate the applicability of this model and explore the key factors influencing delivery efficiency of medical supplies, a case study from China is conducted. The results indicate that enhancements on the speed of a truck or a drone can yield considerable delivery cost reduction. In addition, drone-recharging technology advances can improve delivery efficiency of medical supplies in rural communities.
Article
This paper introduces a novel formulation for finding the recharging schedule for a fleet of n heterogeneous robots that minimizes utilization of recharging resources. This study provides a foundational framework applicable to Multi-Robot Mission Planning, particularly in scenarios demanding Long-Duration Autonomy (LDA) or other contexts that necessitate periodic recharging of multiple robots. A novel Integer Linear Programming (ILP) model is proposed to calculate the optimal initial conditions (partial charge) for individual robots, leading to minimal utilization of charging stations. This formulation was further generalized to maximize the servicing time for robots when charging stations are limited. The efficacy of the proposed formulation is evaluated through a comparative analysis, measuring its performance against the thrift price scheduling algorithm documented in the existing literature. The findings not only corroborate the effectiveness of the proposed approach but also underscore its potential as a valuable tool in optimizing resource allocation for a range of robotic and engineering applications.
Chapter
Conventional power grids are converted to smart energy grids as an efficient way of integrating sustainability with eco-friendly use of energy sources. With increasing use of the population towards smart grids, they face numerous obstacles in peer-to-peer, energy trade, including overhead in communications, security concerns, and privacy difficulties. In the digital era using a typical centralized grid system, coordinating and integrating a huge number of expanding connections can cause a major security problem. This study suggests a blockchain-based, digitized, and secure architecture that enables energy providers and users to trade energy source without the requirement for intermediary. Thus, from its centralized configuration, the distributed energy system is transitioning to a decentralized architecture. These days, as a result, technology has gained pace in particular with the Bitcoins and Ethereum cryptocurrency industries. Blockchain applications in smart energy systems might give numerous creative and reasonably priced answers to different issues of the difficulties that both nowadays and future smart grid systems will run into. Blockchain provides a secure integration with a database which is more reliable and provides resistance to cyber-attacks by ensuring synchronization of all the nodes in blockchain networks. This paper also discusses the architecture design, security considerations, and the most pertinent applications. Finally, this paper provides a detailed study of the importance of blockchain along with working of smart energy grids with the decentralized version ensuring synchronization and resistance to any cyber threats.
Article
Purpose The purpose of this paper is to present and implement a task allocation method based on game theory for reconnaissance mission planning of UAVs and USVs system. Design/methodology/approach In this paper, the decision-making framework via game theory of mission planning is constructed. The mission planning of UAVs–USVs is transformed into a potential game optimization problem by introducing a minimum weight vertex cover model. The modified population-based game-theoretic optimizer (MPGTO) is used to improve the efficiency of solving this complex multi-constraint assignment problem. Findings Several simulations are carried out to exhibit that the proposed algorithm obtains the superiority on quality and efficiency of mission planning solutions to some existing approaches. Research limitations/implications Several simulations are carried out to exhibit that the proposed algorithm obtains the superiority on quality and efficiency of mission planning solutions to some existing approaches. Practical implications The proposed framework and algorithm are expected to be applied to complex real scenarios with uncertain targets and heterogeneity. Originality/value The decision framework via game theory is proposed for the mission planning problem of UAVs–USVs and a MPGTO with swarm evolution, and the adaptive iteration mechanism is presented for ensuring the efficiency and quality of the solution.
Article
Full-text available
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, in this paper, we describe the common attacks faced by consumer IoT devices and suggest potential mitigation strategies. We hope that the findings presented in this paper will inform the future design of IoT devices.
Article
Full-text available
This paper presents a blockchain enabled secure data acquisition scheme utilizing an Unmanned Aerial Vehicle (UAV) swarm where data are collected from internet of things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with IoT devices in order to maintain communications. However, prior to transmitting data, IoT devices encrypt the data and forward it to the UAV swarm. Upon receiving the data, the UAV swarm implements a two-phase validation utilizing the π-hash bloom filter and the digital signature algorithm to validate the sender; in addition, prior to forwarding data to the nearest server, it performs encryption. However, before adding data in blockchain, consent from all validators is required. Finally, the data are stored in blockchain with the approval of validators. A security analysis is performed to demonstrate the feasibility of the proposed scheme. Finally, the effectiveness of the proposed scheme is manifested through implementation and simulation. The security analysis and the performance results show that UAV assist IoT devices both in terms of connectivity and energy consumption, and provides security against the threats mentioned in the paper.
Article
Full-text available
Internet of things (IoT) is the next era of communication. Using IoT, physical objects can be empowered to create, receive and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in IoT applications are discussed. Four different technologies: Blockchain, fog computing, edge computing, and machine learning to increase the level of security in IoT are discussed.
Article
Full-text available
The range of operations of electric vehicles (EVs) is a critical aspect that may affect the user's attitude toward them. For manned EVs, range anxiety is still perceived as a major issue and recent surveys have shown that one-third of potential European users are deterred by this problem when considering the move to an EV. A similar consideration applies to aerial EVs for commercial use, where a careful planning of the flying range is essential not only to guarantee the service but also to avoid the loss of the EVs due to charge depletion during the flight. Therefore, route planning for EVs for different purposes (range estimation, route optimization) and/or application scenarios (terrestrial, aerial EVs) is an essential element to foster the acceptance of EVs as a replacement of traditional vehicles. One essential element to enable such accurate planning is an accurate model of the actual power consumption. While very elaborate models for the electrical motors of EVs do exist, the motor power does not perfectly match the power drawn from the battery because of battery non-idealities. In this paper, we propose a general methodology that allows to predict and/or optimize the operation range of EVs, by allowing different accuracy/complexity tradeoffs for the models describing the route, the vehicle, and the battery, and taking into account the decoupling between motor and battery power. We demonstrate our method on two use cases. The first one is a traditional driving range prediction for a terrestrial EV; the second one concerns an unmanned aerial vehicle, for which the methodology will be used to determine the energy-optimal flying speed for a set of parcel delivery tasks.
Article
Full-text available
Image segmentation is widely used in the field of agriculture to improve the yields and protecting them from pests, herbs, shrubs and weeds. Precision agriculture is also contributing to the inter and intra crop monitoring. Recently, unmanned ariel vehicles used widely for acquiring images. In this paper, we purpose Clifford geometric algebra to enhance the segmented images acquired from UAVs of different agricultural fields. Clifford geometric algebra is also sometimes used as a collective term for the diverse range of mathematical fields, both classical and modern algebraic mathematics. Previous image segmentation approaches depend upon the intensity of red, green and blue colors. But the complete perspective could not be obtained from these approaches. Geometric algebra overcomes this limitation and leads to a genuine color space image processing. It is mainly used in the processing of medical images. Subalgebra of the Clifford algebra is Quaternions. We have used this approach in agricultural images. Image segmentation of foreground and background is enhanced using Clifford geometric algebra hence the results obtained are fine-tuned segmented images. The anticipated result of our research would have a positive impact on the amelioration of the condition of the farmers and their livelihood.
Article
Mobile edge computing (MEC) reduces the computational distance between the source and the servers by fortifying near-user site evaluations of data for expedited communications, using caching. Caching provides ephemeral storage of data on designated servers for low-latency transmissions. However, with the network following a hierarchical layout, even the near-user site evaluations can be impacted by the overheads associated with maintaining a perpetual connection and other factors (e.g. those relating to the reliability of the underpinning network). Prior solutions study reliability as a factor of throughput, delays, jitters, or delivery ratio. However, with modern networks supporting high data rates, a current research trend is in ultra-reliability. The latter is defined in terms of availability, connectivity, and survivability. Thus, in this paper, we focus on the ultra-reliable communication in MEC. Specifically, in our setting, we use drones as on-demand nodes for efficient caching. While some existing solutions use cache-enabled drones, they generally focus only on the positioning problem rather than factors relating to ultrareliable communications. We present a novel neural-blockchain-based drone-caching approach, designed to ensure ultra-reliability and provide a flat architecture (via blockchain). This neural-model fortifies an efficient transport mechanism since blockchain maintains high reliability amongst the peers involved in the communications. Findings from the evaluation demonstrate that the proposed approach scores well in the following metrics: the probability of connectivity reaches 0.99, energy consumptions are decreased by 60.34%, the maximum failure rate is affected by 13.0%, survivability is greater than 0.90, and reliability reaches 1.0 even for a large set of users.
Article
Industrial Internet of Things (IIoT) plays an indispensable role for Industry 4.0, people are committed to implementing a general, scalable and secure IIoT system to be adopted across various industries. However, existing IIoT systems are vulnerable to single point of failure and malicious attacks, which cannot provide stable services. Due to the resilience and security promise of blockchain, the idea of combining blockchain and IoT gains considerable interest. However, blockchains are power-intensive and low-throughput, which are not suitable for power-constrained IoT devices. To tackle these challenges, we present a blockchain system with credit-based consensus mechanism for IIoT. We propose a credit-based proof-of-work (PoW) mechanism for IoT devices, which can guarantee system security and transaction efficiency simultaneously. In order to protect sensitive data confidentiality, we design a data authority management method to regulate the access to sensor data. In addition, our system is built based on directed acyclic graph (DAG)-structured blockchains, which is more efficient than the satoshi-style blockchain in performance. We implement the system on Raspberry Pi, and conduct a case study for the smart factory. Extensive evaluation and analysis results demonstrate that credit-based PoW mechanism and data access control are secure and efficient in IIoT.
Article
State-of-the-art drone technologies have severe flight time limitations due to weight constraints, which inevitably lead to a relatively small amount of available energy. Therefore, frequent battery replacement or recharging is necessary in applications such as delivery, exploration, or support to the wireless infrastructure. Mobile charging stations (i.e., mobile stations with charging equipment) for outdoor ad-hoc battery charging is one of the feasible solutions to address this issue. However, the ability of these platforms to charge the drones is limited in terms of the number and charging time. This paper designs an auctionbased mechanism to control the charging schedule in multidrone setting. In this paper, charging time slots are auctioned, and their assignment is determined by a bidding process. The main challenge in developing this framework is the lack of prior knowledge on the distribution of the number of drones participating in the auction. Based on optimal second-priceauction, the proposed formulation, then, relies on deep learning algorithms to learn such distribution online. Numerical results from extensive simulations show that the proposed deep learningbased approach provides effective battery charging control in multi-drone scenarios.