ArticlePDF Available

Abstract and Figures

Drones or Unmanned Aerial Vehicles (UAVs) can be highly efficient in various applications like hidden area exploration, delivery, or surveillance and can enhance the quality of experience (QoE) for end-users. However, the number of drone-based applications are not very high due to the constrained flight time. The weights of the drones need to be kept less, and intuitively they cannot be loaded with big batteries. Frequent recharging and battery replacement processes limit the appropriate use of drones in most applications. A peer-to-peer distributed network of drones and charging stations is a highly promising solution to empower drones to be used in multiple applications by increasing their flight time. The charging stations are limited, and therefore, an adequate, fair, and cost-optimal scheduling algorithm is required to serve the most needed drone first. The proposed model allows the drones to enter into the network and request for a charging time slot from the station. The stations are also the part of the same network, this work proposes a scheduling algorithm for drones who compete for charging slots with constraints of optimizing criticality and task deadline. A game-theoretic approach is used to model the energy trading between the drones and charging station in a cost-optimal manner. Numerical results based on simulations show that the proposed model provides a better price for the drones to get charged and better revenue for the charging stations simultaneously.
Content may be subject to copyright.
10
2.25kg
2/3rd
2/3rd
x
x
D={1,2,3, . . . , d} |D|
C={1,2,3, . . . , c}
|C|
T={1,2,3, . . . , t}tT
|T |
Bddth
Bccth
Pch,c cth
Pdch,c cth
occth
oddth
η
ν
M
T.E
C
ρ
W
X
Y
Z
λ
NT
G
H
γ
ψ
ζ
x, y
ω
ξ
Btt
dBt
ddth
Pt
ch,d dth Pt
dch,d
dth ot
ch,d ot
dch,d
dth
Bt
d= ∆t× αt
dPt
ch,dot
ch,d βt
dPt
dch,d
ot
dch,d !+Btt
d
Bp
d≤ Bd≤ Bq
d
Bp
dBq
d
dth
αt
d+βt
d= 1, αt
d, βt
d∈ {0,1}
αt
dβt
ddth
(3)
Btt
cBt
ccth
Pt
ch,c cth
Pt
dch,c cth
ot
ch,c ot
dch,c cth
Bt
c= ∆t× αt
cPt
ch,cot
ch,c βt
cPt
dch,c
ot
dch,c !+Btt
c
Bp
c≤ Bc≤ Bq
c
Bp
cBq
c
cth
αt
c+βt
c= 1, αt
c, βt
c∈ {0,1}
αt
cβt
ccth
(6)
η
νd
dth
W=(νqνd)
(νqνp)×η, νpνdνq
Wνp, νq
Mddth
X=(Mq− Md)
(Mq− Mp)×η, Mp≤ Md≤ Mq
X Mp,Mq
MpMq[0.2,3]
Cddth
Cd= 1 Bt
d
T.Ed
Bt
dT.Ed
dth
Y=(Cd− Cp)
(Cq− Cp)×η, Cp≤ Cd≤ Cq
Y Cp,Cq
0 1 0
1
ρd
dth
Z=(ρdρp)
(ρqρp)×η, ρpρdρq
Zρp, ρq
[20,50]
ρρb
ρb
λd=pW2+X2+Y2+Z2
λddth W,X,Y,Z
ith
λw1
µi=λi
λw
, i D
λwλiith
µiith
Φi=Mi×Bi, i D
Φiith
MiBiith
T= [T1,T2,...,Td]
M= [M1,M2,...,Md]
C= [C1,C2,...,Cd]
ρ= [ρ1, ρ2, . . . , ρd]
λ= [λ1, λ2, . . . , λd]
(7)
(8)
(10)
(11)
(12)
K0
K6=
xarg maxλd, i, d D
KK+ 1;
iD
(14)
ρ(K+ 1) > ωi
(15)
(11)
(12)
previousP riorityV ector 6=newP rior ityV ector
γ=(Gq− Gd,c)
(Gq− Gp)×η, Gp≤ Gd,c ≤ Gq
γGd,c dth
cth Gp,Gq
cth dth
G11 G12 G1k
G21 G22 G2k
Gi1Gi2Gik
ψ=(Hc− Hp)
(Hq− Hp)×η, Hp≤ Hc≤ Hq
ψHccth
Hp,Hq
iD
(17)
(16)
Hb
(18)
(19)
L0
L6=
y= arg maxζd,c, j, c C, d D
LL+ 1;
j
(23)
H(K+ 1) > ξ
H(K+ 1) ξ
(11)
(12)
previousP riorityV ector 6=newP rior ityV ector
Hp
Hq[4,11]
ζd,c =pγ2+ψ2
ζd,c cth dth
xi= arg maxλd, i, d D
xi
ρ(k+ 1)) = ρ(k) + j, j ∈ {0,1,2,3}
ρ(k+ 1) > ω
ρ(k+ 1)) = ωi
ωiith
yc= arg maxζd,c, j, c C, d D
yccth
H(k+ 1)) = H(k) + j, j ∈ {0,1,2,3}
ξ
ξ
4
123456
1
2
3
4
0.8
0.85
0.9
0.95
1
Iterations
Drones
Normalized Time for Charging
Index1Energy1
Index2Energy2
IndexcEnergyc
22nd
[2500,6500]
[0.2,3]
[20,50]
4 3
[4,11]
1
(5)
1 (6a)
1 1
2 (6b)
3 2
1 3
(6c)
4 (6d) 1
123
Iterations
4
5
6
7
8
9
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
0
2
4
6
8
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
4
5
6
7
8
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
123
Iterations
4
5
6
7
8
9
Energy Rate
Charging Station 1
Charging Station 2
Charging Station 3
(7)
(8)
123456
Iterations
20
22
24
26
28
Price
Drone 1
Drone 2
Drone 3
Drone 4
(9)
1
(9a)
(9c)
(9d)
123
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
123
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
123
Charging Station
0
1
2
3
4
5
6
7
8
Energy Rate
Proposed Model
First Bid
1 2 3
Charging Station
0
1
2
3
4
5
6
7
8
9
Energy Rate
Proposed Model
First Bid
... This could be another future research avenue [130,131].  Reactive solution methodologies (e.g., consensus-based algorithms) could be used for drone scheduling in order to deal with unplanned events [49,122,163].  Geographical features of monitored areas could be incorporated for effective scheduling of drones [56,78,88,165].  Sudden events and disruptions can happen at any place and any point of time. ...
... Hassija et al. [163] suggested that drones needed to be lightweighted and could not be equipped with large batteries. It was also implied that frequent recharge or battery replacements could hinder the use of drones. ...
...  Multiple auctions for the available mobile charging stations could be proposed in order to conduct a largerscale recharge of drones. However, additional formulations, analyses, and verifications would be required [159,163].  Capacitated charging stations with a limited number of drones and limited energy could be modeled by future studies and incorporated within the existing mathematical formulations for the drone scheduling problem [118,139].  Charging stations may fail due to overuse. ...
Article
Full-text available
Drones are receiving popularity with time due to their advanced mobility. Although they were initially deployed for military purposes, they now have a wide array of applications in various public and private sectors. Further deployment of drones can promote the global economic recovery from the COVID-19 pandemic. Even though drones offer a number of advantages, they have limited flying time and weight carrying capacity. Effective drone schedules may assist with overcoming such limitations. Drone scheduling is associated with optimization of drone flight paths and may include other features, such as determination of arrival time at each node, utilization of drones, battery capacity considerations, and battery recharging considerations. A number of studies on drone scheduling have been published over the past years. However, there is a lack of a systematic literature survey that provides a holistic overview of the drone scheduling problem, existing tendencies, main research limitations, and future research needs. Therefore, this study conducts an extensive survey of the scientific literature that assessed drone scheduling. The collected studies are grouped into different categories, including general drone scheduling, drone scheduling for delivery of goods, drone scheduling for monitoring, and drone scheduling with recharge considerations. A detailed review of the collected studies is presented for each of the categories. Representative mathematical models are provided for each category of studies, accompanied by a summary of findings, existing gaps in the state-of-the-art, and future research needs. The outcomes of this research are expected to assist the relevant stakeholders with an effective drone schedule design.
... In the last decade, there has been a rapidly growing advancement in the applicability of drones (also known as unmanned aerial vehicles (UAVs)) in different areas, including monitoring, public security, traffic surveillance, military operations, exploration of hidden or hazardous area, damage assessment, 3D mapping, indoor/outdoor navigation, disaster relief, precision agriculture, data sharing, infrastructure management and logistics, [1] owing to their lightweight, compact design and high maneuverability. Fig-ure 1 shows different applications of drones. ...
Article
Full-text available
The groundbreaking Unmanned Aerial Vehicles (UAVs) technology has gained significant attention from both academia and industrial experts due to several applications, such as military missions, power lines inspection, precision agriculture, remote sensing, delivery services, traffic monitoring and many more. UAVs are expected to become a mainstream delivery element by 2040 to address the ever-increasing demand for delivery services. Similarly, UAV-assisted monitoring approaches will automate the inspection process, lowering mission costs, increasing access to remote locations and saving time and energy. Despite the fact that unmanned aerial vehicles (UAVs) are gaining popularity in both military and civilian applications, they have a number of limitations and critical problems that must be addressed in order for missions to be effective. One of the most difficult and time-consuming tasks is charging UAVs. UAVs' mission length and travel distance are constrained by their low battery endurance. There is a need to study multi-UAV charging systems to overcome battery capacity limitations, allowing UAVs to be used for a variety of services while saving time and human resources. Wired and Wireless Power Transfer (WPT) systems have emerged as viable options to successfully solve this difficulty. In the past, several research surveys have focused on crucial aspects of wireless UAV charging. In this review, we have also examined the most emerging charging techniques for UAVs such as laser power transfer (LPT), distributed laser charging (DLC), simultaneous wireless information and power transfer (SWIPT) and simultaneous light wave information and power transfer (SLIPT). The classification and types of UAVs, as well as various battery charging methods, are all discussed in this paper. We've also addressed a number of difficulties and solutions for safe operation. In the final section, we have briefly discussed future research directions.
... Applications of UAVs are expanding exceptionally due to their advanced use in the internet of things (IoT), 5G and B5G. UAVs have been used in a variety of applications over the last decade, including object detection and tracking, public security, traffic surveillance, military operations, exploration of hidden or hazardous areas, indoor or outdoor navigation, atmospheric sensing, post-disaster operations, healthcare, data sharing, infrastructure management, emergency and crisis management, freight transportation, wildfire monitoring and logistics [1]. ...
Article
Full-text available
Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance. The drone industry has been getting significant attention as a model of manufacturing, service and delivery convergence, introducing synergy with the coexistence of different emerging domains. UAVs offer implicit peculiarities such as increased airborne time and payload capabilities, swift mobility, and access to remote and disaster areas. Despite these potential features, including extensive variety of usage, high maneuverability, and cost-efficiency, drones are still limited in terms of battery endurance, flight autonomy and constrained flight time to perform persistent missions. Other critical concerns are battery endurance and the weight of drones, which must be kept low. Intuitively it is not suggested to load them with heavy batteries. This study highlights the importance of drones, goals and functionality problems. In this review, a comprehensive study on UAVs, swarms, types, classification, charging, and standardization is presented. In particular, UAV applications, challenges, and security issues are explored in the light of recent research studies and development. Finally, this review identifies the research gap and presents future research directions regarding UAVs.
... This transaction is secured with hashed signatures that correlate with previous transactions. In [81], a novel charging system model for Multi-UAVs is proposed. The authors studied the storage of the charging station and UAVs. ...
Chapter
A non-predicted defect in Unmanned Aerial Vehicles (UAVs) could occur provisionally during their deployment process. Consequently, it is critical to optimize the detection of these instances. More specifically, the deviations in normal behavior indicate the possibility of triggered attacks, failures, and flaws. Therefore, intrusion detection (ID) is mandatory for UAVs security. Meanwhile, ID performance remains an arguable problem. Most of IDSs are applied for one predefined application. There is no general model for accurately detecting both anomalies and faults. To investigate this issue, this paper presents a new dynamic approach for UAVs fault and anomaly detection to investigate this issue. To resolve the drawbacks mentioned above, we propose an attack and fault detection approach. Our method shows better performance using a large dataset, trained on only a small fraction corresponding to normal flight strategy.
... So, the mission time will be directly affected if the batteries of the drones need to charged every 30 min. Battery swapping will take significantly less time than charging at the cost of a usually tedious manual operation and the need for more battery units in reserve [3]. To solve the insufficient power issues of the UAVs, several battery-charging stations or battery-swapping stations have been proposed. ...
Article
Full-text available
“Flight Time” and the “Scope of the mission” play major roles in using UAVs as they affect most industrial activities. Once the battery has depleted, the UAV has to land on the ground and human interaction is needed to change the battery with a fully charged one. Nowadays, several automatic battery swapping systems are catching interest in research. This research presents the novel concept of an Inverted Docking Station that allows a quadrotor UAV to attach to the ceiling during the automatic battery-swapping process. The proposed design consist of a docking station, a positioning system and gripper mechanisms. The proposed design allows the quadrotor to carry the load under the quadrotor and remain attached throughout the servicing period. A mathematical model and design guideline have been proposed, and a Finite Element Analysis (FEA) was performed to check that the developed platform is strong enough to withstand the above task. A `DJI TELLO’ small-scale quadrotor was chosen as a case study to demonstrate the proposed research. Finally the advantages and the limitations of the system are discussed.
... This transaction is secured with hashed signatures that correlate with previous transactions. In [81], a novel charging system model for Multi-UAVs is proposed. The authors studied the storage of the charging station and UAVs. ...
Article
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors. They open doors to new opportunities for investors and business service providers. Their exponential growth turns the visibility of attackers to a new target to implement attacks. Researchers aim to fend off these attacks to empower UAVs security. Based on this motivation, this survey stands for UAVs attacks assessments against the based-system and the charging system. Also, the paper highlights UAVs battery depletion attacks. Furthermore, the paper presents different mitigations that stand against UAVs battery depletion attacks and UAVs charging system attacks. Besides, related research projects are explored.
Article
We study the eVTOL aircraft recovery problem (eVTOL-ARP) raised in the use cases of airport shuttles and intercity flights in Urban Air Mobility (UAM). One distinctive feature of the eVTOL-ARP is that charging tasks are allowed to be deferred and canceled. An optional charging scheme is proposed to improve recovery flexibility. Jointly handling routing and charging in an integrated manner makes the problem different from classical aircraft recovery literature and much more challenging. We formulate an integer linear program model and propose a branch-and-price algorithm to solve the eVTOL-ARP exactly. A tailored label setting algorithm that exploits the structure of the problem is proposed for the parallel pricing subproblems. Extensive experiments are conducted on the instances based on the Beijing-Tianjin-Hebei airport cluster and the Zhejiang Province airport cluster. Experimental results show that the proposed algorithms can provide efficient and timely recovery solutions in real-world operations. The recovery cost gap is over 9% between non-flexible charging and the proposed flexible charging. We conduct sensitivity analysis on a key factor, i.e. charging time that may affect the recovery cost and highlight the decreasing marginal value of the charging time.
Conference Paper
Full-text available
The 3rd International Scientific Conference of Computer Sciences (3SCCS 2021) that will be held in Muscat, Oman by the University of Technology/Computer Sciences department. SCCS 2021 follows footsteps of the first SCCS that has been held in University of Technology, Iraq, and the second SCCS which was technically supported by IEEE that is represented by IEEE Iraq Section with (36) published research papers after its conclusion. The aims of the Conference are to gather academic scientists and researchers to exchange and share their experiences and research results on all aspects of Computer Sciences and Engineering. It also provides a prime interdisciplinary platform for researchers to present and discuss their most recent innovations and trends in their research, as well as practical challenges encountered, and solutions adopted in the fields of Computer Sciences and Engineering.
Article
Full-text available
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, in this paper, we describe the common attacks faced by consumer IoT devices and suggest potential mitigation strategies. We hope that the findings presented in this paper will inform the future design of IoT devices.
Article
Full-text available
This paper presents a blockchain enabled secure data acquisition scheme utilizing an Unmanned Aerial Vehicle (UAV) swarm where data are collected from internet of things (IoT) devices and subsequently, forwarded to the nearest server through the UAV swarm. Before initiating data acquisition, the UAV swarm shares a shared key with IoT devices in order to maintain communications. However, prior to transmitting data, IoT devices encrypt the data and forward it to the UAV swarm. Upon receiving the data, the UAV swarm implements a two-phase validation utilizing the π-hash bloom filter and the digital signature algorithm to validate the sender; in addition, prior to forwarding data to the nearest server, it performs encryption. However, before adding data in blockchain, consent from all validators is required. Finally, the data are stored in blockchain with the approval of validators. A security analysis is performed to demonstrate the feasibility of the proposed scheme. Finally, the effectiveness of the proposed scheme is manifested through implementation and simulation. The security analysis and the performance results show that UAV assist IoT devices both in terms of connectivity and energy consumption, and provides security against the threats mentioned in the paper.
Article
Full-text available
Internet of things (IoT) is the next era of communication. Using IoT, physical objects can be empowered to create, receive and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in IoT applications are discussed. Four different technologies: Blockchain, fog computing, edge computing, and machine learning to increase the level of security in IoT are discussed.
Article
Full-text available
The range of operations of electric vehicles (EVs) is a critical aspect that may affect the user's attitude toward them. For manned EVs, range anxiety is still perceived as a major issue and recent surveys have shown that one-third of potential European users are deterred by this problem when considering the move to an EV. A similar consideration applies to aerial EVs for commercial use, where a careful planning of the flying range is essential not only to guarantee the service but also to avoid the loss of the EVs due to charge depletion during the flight. Therefore, route planning for EVs for different purposes (range estimation, route optimization) and/or application scenarios (terrestrial, aerial EVs) is an essential element to foster the acceptance of EVs as a replacement of traditional vehicles. One essential element to enable such accurate planning is an accurate model of the actual power consumption. While very elaborate models for the electrical motors of EVs do exist, the motor power does not perfectly match the power drawn from the battery because of battery non-idealities. In this paper, we propose a general methodology that allows to predict and/or optimize the operation range of EVs, by allowing different accuracy/complexity tradeoffs for the models describing the route, the vehicle, and the battery, and taking into account the decoupling between motor and battery power. We demonstrate our method on two use cases. The first one is a traditional driving range prediction for a terrestrial EV; the second one concerns an unmanned aerial vehicle, for which the methodology will be used to determine the energy-optimal flying speed for a set of parcel delivery tasks.
Article
Mobile edge computing (MEC) reduces the computational distance between the source and the servers by fortifying near-user site evaluations of data for expedited communications, using caching. Caching provides ephemeral storage of data on designated servers for low-latency transmissions. However, with the network following a hierarchical layout, even the near-user site evaluations can be impacted by the overheads associated with maintaining a perpetual connection and other factors (e.g. those relating to the reliability of the underpinning network). Prior solutions study reliability as a factor of throughput, delays, jitters, or delivery ratio. However, with modern networks supporting high data rates, a current research trend is in ultra-reliability. The latter is defined in terms of availability, connectivity, and survivability. Thus, in this paper, we focus on the ultra-reliable communication in MEC. Specifically, in our setting, we use drones as on-demand nodes for efficient caching. While some existing solutions use cache-enabled drones, they generally focus only on the positioning problem rather than factors relating to ultrareliable communications. We present a novel neural-blockchain-based drone-caching approach, designed to ensure ultra-reliability and provide a flat architecture (via blockchain). This neural-model fortifies an efficient transport mechanism since blockchain maintains high reliability amongst the peers involved in the communications. Findings from the evaluation demonstrate that the proposed approach scores well in the following metrics: the probability of connectivity reaches 0.99, energy consumptions are decreased by 60.34%, the maximum failure rate is affected by 13.0%, survivability is greater than 0.90, and reliability reaches 1.0 even for a large set of users.
Article
Image segmentation is widely used in the field of agriculture to improve the yields and protecting them from pests, herbs, shrubs and weeds. Precision agriculture is also contributing to the inter and intra crop monitoring. Recently, unmanned ariel vehicles used widely for acquiring images. In this paper, we purpose Clifford geometric algebra to enhance the segmented images acquired from UAVs of different agricultural fields. Clifford geometric algebra is also sometimes used as a collective term for the diverse range of mathematical fields, both classical and modern algebraic mathematics. Previous image segmentation approaches depend upon the intensity of red, green and blue colors. But the complete perspective could not be obtained from these approaches. Geometric algebra overcomes this limitation and leads to a genuine color space image processing. It is mainly used in the processing of medical images. Subalgebra of the Clifford algebra is Quaternions. We have used this approach in agricultural images. Image segmentation of foreground and background is enhanced using Clifford geometric algebra hence the results obtained are fine-tuned segmented images. The anticipated result of our research would have a positive impact on the amelioration of the condition of the farmers and their livelihood.
Article
Industrial Internet of Things (IIoT) plays an indispensable role for Industry 4.0, people are committed to implementing a general, scalable and secure IIoT system to be adopted across various industries. However, existing IIoT systems are vulnerable to single point of failure and malicious attacks, which cannot provide stable services. Due to the resilience and security promise of blockchain, the idea of combining blockchain and IoT gains considerable interest. However, blockchains are power-intensive and low-throughput, which are not suitable for power-constrained IoT devices. To tackle these challenges, we present a blockchain system with credit-based consensus mechanism for IIoT. We propose a credit-based proof-of-work (PoW) mechanism for IoT devices, which can guarantee system security and transaction efficiency simultaneously. In order to protect sensitive data confidentiality, we design a data authority management method to regulate the access to sensor data. In addition, our system is built based on directed acyclic graph (DAG)-structured blockchains, which is more efficient than the satoshi-style blockchain in performance. We implement the system on Raspberry Pi, and conduct a case study for the smart factory. Extensive evaluation and analysis results demonstrate that credit-based PoW mechanism and data access control are secure and efficient in IIoT.
Article
State-of-the-art drone technologies have severe flight time limitations due to weight constraints, which inevitably lead to a relatively small amount of available energy. Therefore, frequent battery replacement or recharging is necessary in applications such as delivery, exploration, or support to the wireless infrastructure. Mobile charging stations (i.e., mobile stations with charging equipment) for outdoor ad-hoc battery charging is one of the feasible solutions to address this issue. However, the ability of these platforms to charge the drones is limited in terms of the number and charging time. This paper designs an auctionbased mechanism to control the charging schedule in multidrone setting. In this paper, charging time slots are auctioned, and their assignment is determined by a bidding process. The main challenge in developing this framework is the lack of prior knowledge on the distribution of the number of drones participating in the auction. Based on optimal second-priceauction, the proposed formulation, then, relies on deep learning algorithms to learn such distribution online. Numerical results from extensive simulations show that the proposed deep learningbased approach provides effective battery charging control in multi-drone scenarios.