Next Article in Journal
Optimal and Efficient Deep Learning Model for Brain Tumor Magnetic Resonance Imaging Classification and Analysis
Next Article in Special Issue
A Quasi-Velocity-Based Tracking Controller for a Class of Underactuated Marine Vehicles
Previous Article in Journal
Editorial for the Special Issue: “Laser Cooling of Solids: Novel Advances and Applications”
Previous Article in Special Issue
A Neural Network-Based Navigation Approach for Autonomous Mobile Robot Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhanced Search-and-Rescue Optimization-Enabled Secure Route Planning Scheme for Internet of Drones Environment

1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Information Systems, College of Science & Art at Mahayil, King Khalid University, Abha 62529, Saudi Arabia
3
Research Team on Intelligent Systems in Imaging and Artificial Vision (SIIVA)—Lab LIMTIC, Higher Institute of Computer, University of Tunis EL Manar, Aryanah 2036, Tunisia
4
Department of Industrial Engineering, College of Engineering at Alqunfudah, Umm Al-Qura University, Mecca 24382, Saudi Arabia
5
Department of Digital Media, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11845, Egypt
6
Department of Computer Science, College of Sciences and Humanities—Aflaj, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
7
Department of Computer and Self Development, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(15), 7950; https://doi.org/10.3390/app12157950
Submission received: 25 May 2022 / Revised: 28 July 2022 / Accepted: 30 July 2022 / Published: 8 August 2022
(This article belongs to the Special Issue New Trends in Robotics, Automation and Mechatronics (RAM))

Abstract

:
The Internet of Drones (IoD) is greatly developed and promotes many civil applications. However, it can still be prone to several security problems which threaten public safety. The issue of security poses further problems upon linking the IoD to the Internet, as its data stream is exposed to attack. For secure communication between drones, an effective route planning scheme with a major intention of accomplishing security is needed. With this aim, this study develops an enhanced search-and-rescue optimization-enabled secure route planning (ESRO-SRP) scheme for the IoD environment. The presented ESRO-SRP technique mainly aims to derive a set of optimal routes to the destination. In addition, the ESRO-SRP algorithm is derived by the integration of the quasi-oppositional-based learning (QOBL) concept with the conventional SRO algorithm. Moreover, the presented ESRO-SRP technique derived a fitness function encompassing different input parameters such as residual energy, distance, and degree of trust. The experimental validation of the ESRO-SRP technique is carried out under several aspects, and the results demonstrated the enhancements of the ESRO-SRP model over recent approaches. The ESRO-SRP model has provided an increased packet delivery ratio (PDR) of 86%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm approaches have accomplished a minimal PDR of 79.60%, 73.60%, 67.60%, and 63.20%, respectively.

1. Introduction

The use of unmanned aerial vehicles (UAVs), also termed drones, is anticipated to incline at exceptional rates because of growing curiosity from investors, hobbyists, and researchers; the quantity of drones is quickly rising, and the Internet of Drones (IoD) environment and number of related applications are expanding rapidly, in which an infinite number of multi-sized drones flawlessly communicate with one another via area service providers whose objective it is to understand and align the accessibility of drones to a controlled airspace and operate a navigation service [1]. The economic development of drone industries in the United States, involving military scouting, traffic, wildlife surveillance, urban safety scrutiny of infrastructure, on-demand package supply, aerial photography, etc., is reported to be substantial for industries or business operations [2,3]. Figure 1 depicts the procedure of IoD.
Even though the IoD network offers numerous benefits, it also carries numerous susceptibilities which should be handled, the most important criteria of which are privacy and security problems [4]. However, the IoD network system is commonly placed for real-time application zones where end users need to obtain real-time information from UAVs which are connected to a particular area. So, there are high chances of security assaults occurring, leading to the colossal ruin of the data exchange functions inside the network [5,6,7]. An attacker can gain access to the keys and block transmissions. For the accessibility of keys, the intruder can abuse a susceptibility in the IoD network and its application zones. The intruder might alter this information, resulting in the misguidance of the receivers. However, IoD access management is a significant variable, and security problems regarding authorization and accessibilities must be emphasized [8,9]. This applies to the data in transfer, which should be protected for confidentiality, authenticity, and integrity.
Most of the privacy and security methods advanced by authors were intended to ensure security measures on the IoD network [10,11]. The approaches focused on mitigating problems which influence the secure localization of drones or privacy and security necessities linked with the IoD network system. Localization fault assaults impede the reliability position of UAVs, leading to distressing costs for the overall functionality of the IoD network [12]. Additionally, privacy and security necessities are the objectives that decide the functions and capacities of the IoD network attained in justifying certain privacy and security measures [13]. The privacy and security needs of the IoD network involve authenticity, integrity, availability, privacy preservation, and confidentiality [14].
Tian et al. [15] suggested a powerful privacy-preserving validation architecture. With the help of a lightweight online/offline signature model, this architecture guarantees verification effectiveness while placing resource constraints on small-scale UAVs. Considering the high mobility of UAVs, a prediction validation model is explored by using mobile edge computing (MEC) in this architecture for reducing the verification expenses for possible verification activity. Allouch et al. [16] developed an Unmanned Traffic Management (UTM)-Chain, a light-weight blockchain-related security model with hyper ledger fabric for UTM of lower-altitude UAV that fits the storage and computation resource constraints of UAV. Furthermore, UTM-Chain offers secured and unchangeable traffic information among their ground control stations and the UAVs. In [8], a blockchain-related security model for cyber-physical systems is introduced for ensuring secured transmission of datasets amongst drones. In this model, the miner node is chosen by deep learning (DL)-based technique, that is, a deep Boltzmann machine, with features such as flight time of the drone, computation resource, and the available battery power.
The authors in [17] developed a lightweight user verification system where the client in the IoD environments needs to directly access information from a drone to show that the client is authorized for accessing the dataset from that drone. The formal security validation with the generally recognized automatic confirmation of Internet security protocol and application tool alongside informal security investigation shows that the suggested technique is secured against well-known attacks. In [18], the authors developed a Drone-map organizer, viz., a service-related fog-based drone managing scheme that monitors, communicates, and controls with drones through the networks. The suggested technique enables interaction with various drones through the internet that allows drones to be controlled anyplace and anywhere, with no long-distance restrictions. This model offers drones access to fog computational resources for drones to perform heavyweight load computation. Though existing works have focused on the IoD environment, it is still necessary to design energy-efficient and security-based solutions for the IoD environment with the inclusion of multiple input parameters of the drones.
This study develops an enhanced search-and-rescue optimization-enabled secure route planning (ESRO-SRP) scheme for the IoD environment. The presented ESRO-SRP technique mainly aims to derive a set of optimal routes to the destination. In addition, the ESRO-SRP algorithm is derived by the integration of the quasi-oppositional-based learning (QOBL) concept with the conventional SRO algorithm. Moreover, the presented ESRO-SRP technique derived a fitness function encompassing different input parameters such as residual energy (RE), distance, and trust degree. The experimental validation of the ESRO-SRP technique is carried out under several aspects. In short, the major contributions are summarized as follows.
  • To the best of our knowledge, the ESRO-SRP technique for the IoD environment does not exist in the literature.
  • Develop a new ESRO-SRP technique for a secure route selection process in the IoD environment.
  • Derive an ESRO-SRP algorithm using the combination of QOBL with the traditional SRO algorithm and derive a fitness function involving multiple input parameters.
  • Simulate the performance of the ESRO-SRP technique under varying levels of energy consumption in the IoD environment.
The rest of the paper is organized as follows. Section 2 offers a detailed discussion of the proposed model and Section 3 validates the experimental results of the proposed model. Finally, Section 4 concludes the study with key findings and possible future enhancements.

2. Materials and Methods

In this study, a novel ESRO-SRP technique has been developed for secure communication among drones in the IoD environment. The presented ESRO-SRP technique mainly aims to derive a set of optimal routes to the destination. In addition, the ESRO-SRP algorithm is derived by the integration of the QOBL concept with the conventional SRO algorithm. Moreover, the presented ESRO-SRP technique derived a fitness function encompassing different input parameters such as RE, distance, and trust degree.

2.1. Overview of ESRO-SRO Algorithm

In the SRO approach, the human position is equal to the resolution of the optimization issues, and the clue quantity accomplished in the location characterizes the objective function. The group members gather clue information in the search. Few clues are absent in the event of gaining optimal clues in another position, but the dataset is exploited for optimizing the searching technique [19]. Here, the position of the left clue can be stored in the ( M memory matrix), where the position of the human is stored in the ( X position matrix). The M matrix dimension is the same as X . They are N × D matrices, whereas D symbolizes problem dimension and N embodies human count. The clue matrixes have the attained clue position. The M and C matrixes are upgraded in all human searching processes [19]:
C = { X M } = { X 11 X 1 D X N 1 X N D M 11 M 1 D M N 1 M N D } ,
In Equation (1), X and M represent the position of human and memory matrixes; correspondingly, X N 1 embodies the position of initialized dimension for N th human, and M 1 D characterizes D th dimensional position for the preliminary memory. Given the description presented in the previous section, in addition to an arbitrary clue amid accomplished clues, the search path is described as follows:
SD i = ( X i C k )   ,   k i ,
In Equation (2), X i ,   C k , and SD i correspondingly symbolize j th human location, the k th clue location, and j th human searching direction; k suggests arbitrary numbers within 1 and 2 N and appropriately chosen k i . It is important to emphasize that human usually seeks accordingly, and some repetitious positions could not be searched another time. Henceforth, the search should be generated if the group member is restrained. Therefore, X j dimension could not be rehabilitated.
For applying this constraint, the binomial crossover operator has been exploited when the clue is larger than that of the clue associated with the present position, an SD j direction and the position of that search clue; next, the searching method undergoes the present location beside the SD i direction [16].
X i , j =   { { C k , j + r l × ( X i , j C k , j ) , i f   f ( C k ) > , f ( X i ) X i , j + r l × ( X i , j C k , j ) , o t h e r w i s e X i , j i f   r 2 < SEor   j = j r a n d , o t h e r w i s e , j = 1 ,   ,   D ,
where the following are defined: X i , j symbolizes the novel place of j th parameters of i th humans; C k ,   j specifies place of j th parameter for the k th accomplished clues; f C k and f X i correspondingly imply an objective function for the C k and X i solution; r l and r 2 epitomize arbitrary value; j rand symbolizes arbitrary value within 1 and D that assures that 1D of X i , j is varied from X i , j   . Equation (3) is applied to accomplish a new place of j th human in all dimensions.
Next, humans search nearby the current place, and the concept of related discrete clues applied in the social phase is exploited for searching. In conflict with the social phase, X i dimension is attuned in the separation phase. The novel place of j th human can be accomplished as follows [16]:
X i = X j + r 3 × C k C m   ,   i k m ,
In Equation (4), k and m characterize arbitrary numbers within 1 and 2 N . To evade motion besides another clue, k and m are designated in this manner, such that i k m .   r 3 symbolizes an arbitrary value between zero and one. In the metaheuristic method, each solution should be positioned in the solution region, and when they are farther from the permitted solution region, they should be altered. If the novel place of a human is farther from the solution region, the succeeding equation is exploited for altering the novel place:
X i , j = X i , j + X j   m a x   2 , i f   X i , j > x j m a x , X i , j + X j   m i n   2 , i f   X i , j < x j m i n ,   j = 1 , ,   D
The process involved in the SRO algorithm is given in Algorithm 1.
Algorithm 1: Pseudo-code of the SRO algorithm
Begin
Initialize   parameters :   Arbitrary   population   initialization   of   2 N   solutions ,   X j m i n ,   X j m a x ,   j = 1 , ,   D
Organize   the   solution   in   a   decreasing   manner   and   decide   the   optimal   location   ( Xbest )
Exploit   the   1 st   half   of   the   organized   outcome   for   X   and   the   remaining   for   M
Represent   variables   ( SE ,   MU )   and   set   the   USN i = 0   where   i = 1 , ,   N
While   end   criteria   are   not   met   do
For   i = 1   to   N   do
   C =   X M / / Social   Phase
   SD j = X j C k , k   was   chosen   arbitrarily   that   i k
   j rand =   rand   int   [ 1 ,   D ]
   r 1 = rand [−1, 1]
   For   j = 1 to   D do
     X i , j = C k , j + r 1 × S D i , j ,   i f   f C k > f X i , X i , j + r 1 × S D i , j , o t h e r w i s e      
     X i , j = X i , j + X j m a x / 2 , if   X i , j > X j m a x X i , j + X j m i n / 2 , if   X i , j < X j m i n
  End For
   M n = X i , if   f X i > f X i , M n , o t h e r w i s e
   X i = X i ,   if   f X i > f X i X i ,   o t h e r w i s e
   USN i = USN i + 1 ,   if f X i < f X i 0 ,   o t h e r w i s e
   C =   X M / / Individual   Stage
   X i = X i +   rand   0 ,   1 × C k C m ,
   For   j = l to   D do
    X i , j = X i , j + X j m a x / 2 , if   X i , j > X j m a x X i , j + X j m i n / 2 , if   X i , j > X j m i n
  End For
   M n = X i , if   f X i > f X i , M n , o t h e r w i s e n   r a n d o m l y   c h o s e n
   X i = X i   if   f X j > f X i X i   otherwise
   USN i = USN i + 1 ,   if   f X i < f X i 0 , o t h e r w i s e
   If   the   USN i >   MU   do
    For   j = l to   D do
     X i , j = X j m i n i +   rand   0 ,   1 × X j m a x i X j m i n i
   End for
    USN i = 0
    End If
  End for
  Decide the existing finest place and upgrade Xbest
End while
Return Xbest
End
Next, in all iterations, the member of the group searched according to the two phases, and after each stage, once the value of the main function is in position, X i f X i is greater than that of the preceding one ( f   X i ) , thus the earlier position X i would be stored in an arbitrary place of the M memory matrix and it would be adopted as a novel place. If not, the position is left and memory is not improved:
M n = X i , i f   f   X i > , f X i   M n ,   otherwise  
X i = X i , i f   f   X i > , f X i   X i ,   otherwise ,
where M n indicates the location of n th clue saved in the M , and n represents arbitrary numbers within 1 and N . With that memory, upgrading increases the different kinds of techniques and the ability of methods for detecting a globally optimum solution. Firstly, the unsuccessful search number (USN) is fixed as zero for all human beings. Once the human discovers an optimal clue in the first and second stages of the searching technique, the USN is fixed as zero for that human; if not, it raises it by one point as follows [16]:
USN i = USN i + l , i f   f X i < , f X j 0 , o r   e l s e
The arbitrary place from the search region is represented in the following equation and USN i is fixed as zero for that human:
X i , j = X j min + r 4 × X j max X j   min   j = 1 ,   ,   D ,  
In Equation (9), r 4 designates an arbitrary value and is discrete for each dimension. Tizhoosh proposed the concept of oppositional-based learning (OBL) that includes opposite numbers having the highest possibility of accomplishing a solution compared to arbitrary numbers. The incorporation of OBL with the SRO method leads to an improved convergence rate and effective result of the presented ESRO-SRP algorithm. The QOBL method applies quasi-opposite value efficiently through the opposite number in the global optimal outcome. Assume χ represents a real number in I -dimensional region. The x o and x q o of   x opposite and quasi-opposite numbers are shown in the following [20]:
x 0 = a + b x
In which x and   b ].
x q o = r a n d a + b 2 ,   x 0
Let X x 1 ,   x 2 ,   ,   x n be a point from the n -dimensional region. The opposite point, X o x 1 o ,   x 2 o ,   ,   x n 0 and quasi-opposite point, X q o x 1 q o ,   x 2 q o ,   ,   x n q o are shown in the following.
x i o = a i + b i x i
Here, x i and x i a i ,   b i i 1 ,   2 ,   ,   n .
x i q o = r a n d a i + b i 2 ,   x i o
In QOBL is exploited to the SRO algorithm to initialize the population as well as creation jumping. It generates a group of optimum outcomes for population initialization [8]. Algorithm 2 defines the QOBL pseudo-code to the novel population.
Algorithm 2: Pseudo-code of QOBL
for   i = 1 :   E c o _ s i z e
for   j = 1 :   D
    X i , j o = l b j + u p j X i , j ;
    C i , j = l b j + u p j / 2 ;
    if   ( X i , j < C i , j )
       X i , j q o = C i , j + X i , j o C i , j × r a n d ;
    else
       X i , j q o = X i , j o + C i , j X i , j o × r a n d ;
    end if
end for
end for

2.2. Process Involved in ESRO-SRP Technique

To define an optimum group of routes, an offered function was employed to determine the following hop to destination and is represented by:
f x = { i ,   f o r   w h i c h i k X i f j   i s   m i n i m u m ,   i 1 i k  
The drive is to determine an optimum group of routes from the cluster heads (CHs) to the base station (BS), employing a fitness function (FF) comprising 2 parameters such as energy and distance. Primarily, the RE of the next-hop node is determined, and a node with higher energy was provided as a relay node. To transfer data, the source node sends it to the relay node, which is further forwarded to BS utilizing inter CHs. Thus, the node with higher RE is provided as the next-hop node. A primary sub-objective f 1 was offered as:
f 1 = E C H
In addition, the Euclidean distance was executed to define the distance from CH to BS. The minimized energy dissipation was frequently dependent on the broadcast distances. With a lesser distance, the energy was retained significantly [21]. Once the distance is improved, a further count of energy is spent. Hence, the node with lesser distances is chosen to relay nodes. So, the next sub-objective using distance is f 2 which is formulated as:
f 2 = 1 i = 1 m d   i s C H i ,   N H + d i s N H ,   B S
The present research work utilized direct trust values (TVs) amongst drones, and their mathematical process was signified as:
f 3 = T r u s t
T r i , j = T r i j D i r + T r i j I n d i r / 2 .
Here, T r i j d i r and T r i j i n d i r denotes the direct as well as indirect TVs of one node to another node correspondingly. The count of trust nodes from the cluster is attained in the group with maximal TVs, and their state value was provided by the level of confidence values suggested in one node to another node. The TV of BS was computed as:
T r C = j = 1 S 1 T r C i , j / S 1 .
In the above formula, T r C refers to the trusted value and S represents the amount of drones. If the path trust was smaller than the trust requirement value, the path trust alert occurrence was triggered.
The above-mentioned sub-objective was revised as to FF as offered in that α 1 and α 2 denotes the weight assigned to every sub-objective.
F i t n e s s = α 1 f 1 + α 2 f 2 + α 1 f 3 ,   w h e r e i = 1 3 α i = 1 α i ε 0 , 1 ;

3. Results and Discussion

In this section, the performance validation of the ESRO-SRP model is examined under distinct levels of energy consumption (EC). The EC is varied from 5% to 100% with a step size of 5%. Table 1 and Figure 2 report a comparative throughput (THRP) inspection of the ESRO-SRP model with recent models under distinct levels of energy [22,23,24,25]. The results portrayed that the ESRO-SRP model has accomplished maximum values of THRP under all energy levels. For instance, with an EC of 5%, the ESRO-SRP model has provided an increased THRP of 33.95 bytes/s, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm models have accomplished a reduced THRP of 14.54 bytes/s, 14.54 bytes/s, 9.69 bytes/s, and 7.75 bytes/s, respectively. Moreover, with an EC of 100%, the ESRO-SRP system has offered a maximal THRP of 189.20 bytes/s, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm techniques have accomplished a lower THRP of 165.91 bytes/s, 140.68 bytes/s, 110.60 bytes/s, and 99.93 bytes/s, respectively.
Table 2 and Figure 3 define a comparative PDR examination of the ESRO-SRP approach with recent models under distinct levels of energy. The results exposed that the ESRO-SRP model has accomplished maximal values of PDR under all energy levels. For example, with an EC of 5%, the ESRO-SRP model has provided an increased PDR of 65.20%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm systems have accomplished a decreased PDR of 58.40%, 49.60%, 40.80%, and 39.20%, respectively. Additionally, with an EC of 100%, the ESRO-SRP model has provided an increased PDR of 86%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm approaches have accomplished a minimal PDR of 79.60%, 73.60%, 67.60%, and 63.20%, respectively.
Table 3 and Figure 4 demonstrate a comparative average HOPS (AHOPS) analysis of the ESRO-SRP system with recent models under distinct levels of energy. The results depicted that the ESRO-SRP approach has accomplished higher AHOPS values under all energy levels. For instance, with an EC of 5%, the ESRO-SRP model has provided an increased AHOPS of 9%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm algorithms have accomplished a minimal AHOPS of 7%, 5%, 5%, and 2%, respectively. Finally, with an EC of 100%, the ESRO-SRP model has offered superior AHOPS of 23%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm methodologies have accomplished a lower AHOPS of 22%, 21%, 11%, and 7% correspondingly.
Table 4 and Figure 5 illustrate a comparative coverage inspection of the ESRO-SRP approach with recent models under distinct levels of energy. The outcomes represented that the ESRO-SRP model has accomplished improved values of coverage under all energy levels. For instance, with an EC of 5%, the ESRO-SRP model has provided a maximal coverage of 97.69%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm methods have accomplished a decreased coverage of 91.18%, 83.58%, 81.41%, and 73.26%, respectively. Finally, with an EC of 100%, the ESRO-SRP model has provided an enhanced coverage of 48.29%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm models have accomplished minimal coverage of 33.63%, 16.26%, 15.18%, and 3.24%, respectively.
Table 5 and Figure 6 depict a comparative lifetime analysis of the ESRO-SRP algorithm with recent methodologies under distinct levels of energy. The results outperformed in that the ESRO-SRP model has accomplished maximum values of a lifetime under all energy levels. For instance, with an EC of 5, the ESRO-SRP system has provided a higher lifetime of 57 rounds, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm algorithms have accomplished a minimal lifetime of 41, 25, 10, and 1 round, respectively. Moreover, with an EC of 100, the ESRO-SRP model has an obtainable increased lifetime of 176 rounds, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm approaches have accomplished a decreased lifetime of 157, 144, 124, and 107 rounds, respectively.
The experimental results ensured the superior outcomes of the proposed model over other models in the IoD environment.

4. Conclusions

In this study, a novel ESRO-SRP technique was established for secure communication among the drones in the IoD environment. The presented ESRO-SRP technique mainly aims to derive a set of optimal routes to the destination. In addition, the ESRO-SRP algorithm is derived by the integration of the QOBL concept with the conventional SRO algorithm. Moreover, the presented ESRO-SRP technique derived a fitness function encompassing different input parameters such as RE, distance, and trust degree. The experimental validation of the ESRO-SRP technique is carried out under several aspects, and the results demonstrated the enhancements of the ESRO-SRP model over recent approaches. The ESRO-SRP model has provided an increased PDR of 86%, whereas the BRUe-IoE, ORP-FANET, UAVe-WSN, and TR-UAV Swarm approaches have accomplished a minimal PDR of 79.60%, 73.60%, 67.60%, and 63.20%, respectively. Therefore, the ESRO-SRP technique can be exploited as an effective tool to improve security and network efficiency. In the future, the performance of the ESRO-SRP algorithm will be extended to the integration of lightweight cryptographic techniques.

Author Contributions

Conceptualization, S.D. and F.S.A.; methodology, J.S.A.; software, I.Y.; validation, F.S.A., J.S.A. and A.M.; formal analysis, A.S.M.; investigation, A.A.A.; resources, M.A.D.; data curation, A.M.; writing—original draft preparation, F.S.A., J.S.A. and M.A.D.; writing—review and editing, S.D. and A.S.M.; visualization, I.Y.; supervision, J.S.A.; project administration, M.A.D.; funding acquisition, F.S.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through the Large Groups Project under grant number (142/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R319), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4340237DSR31).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Singh, M.; Aujla, G.S.; Bali, R.S. A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment. IEEE Trans. Intell. Transport. Syst. 2021, 22, 4404–4413. [Google Scholar] [CrossRef]
  2. Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
  3. Alsamhi, S.H.; Ma, O.; Ansari, M.S.; Almalki, F.A. Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities. IEEE Access 2019, 7, 128125–128152. [Google Scholar] [CrossRef]
  4. Chatterjee, S.; Perumalla, S.; Siva Kumar, A.P. Design and Implementation of Novel Secure User Authentication System over Internet of Drones. Int. J. Syst. Syst. Eng. 2021, 11, 105–120. [Google Scholar] [CrossRef]
  5. Putranto, D.S.C.; Aji, A.K.; Wahyudono, B. Design and Implementation of Secure Transmission on Internet of Drones. In Proceedings of the 2019 IEEE 6th Asian Conference on Defence Technology (ACDT), Bali, Indonesia, 13–15 November 2019; pp. 128–135. [Google Scholar] [CrossRef]
  6. Al-Wesabi, F.N.; Obayya, M.; Hamza, M.A.; Alzahrani, J.S.; Gupta, D.; Kumar, S. Energy Aware Resource Optimization using Unified Metaheuristic Optimization Algorithm Allocation for Cloud Computing Environment. Sustain. Comput. Informatics Syst. 2022, 35, 100686. [Google Scholar] [CrossRef]
  7. Fitwi, H.; Nagothu, D.; Chen, Y.; Blasch, E. A Distributed Agent-Based Framework for a Constellation of Drones in a Military Operation. In Proceedings of the 2019 Winter Simulation Conference (WSC), National Harbor, MD, USA, 8–11 December 2019; pp. 2548–2559. [Google Scholar] [CrossRef]
  8. Abunadi, I.; Althobaiti, M.M.; Al-Wesabi, F.N.; Hilal, A.M.; Medani, M.; Hamza, M.A.; Rizwanullah, M.; Zamani, A.S. Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks. Comput. Mater. Contin. 2022, 72, 1195–1212. [Google Scholar] [CrossRef]
  9. Sirohi, P.; Al-Wesabi, F.N.; Alshahrani, H.M.; Maheshwari, P.; Agarwal, A.; Dewangan, B.K.; Hilal, A.M.; Choudhury, T. Energy-Efficient Cloud Service Selection and Recommendation Based on QoS for Sustainable Smart Cities. Appl. Sci. 2021, 11, 9394. [Google Scholar] [CrossRef]
  10. Alrowais, F.; Almasoud, A.S.; Marzouk, R.; Al-Wesabi, F.N.; Hilal, A.M.; Rizwanullah, M.; Motwakel, A.; Yaseen, I. Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems. Comput. Mater. Contin. 2022, 72, 2783–2795. [Google Scholar] [CrossRef]
  11. Singh, M.; Aujla, G.S.; Bali, R.S. ODOB: One Drone One Block-based Lightweight Blockchain Architecture for Internet of Drones. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 249–254. [Google Scholar] [CrossRef]
  12. Guerber, C.; Royer, M.; Larrieu, N. Machine Learning and Software Defined Network to secure communications in a swarm of drones. J. Inf. Secur. Appl. 2021, 61, 102940. [Google Scholar] [CrossRef]
  13. Kuzmin, A.; Znak, E. Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles. In Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, 31 July–2 August 2018; pp. 32–37. [Google Scholar] [CrossRef]
  14. Ravi, N.; Chitanvis, R.; El-Sharkawy, M. Applications of Drones using Wireless Sensor Networks. In Proceedings of the 2019 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 15–19 July 2019; pp. 513–518. [Google Scholar] [CrossRef]
  15. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
  16. Allouch, A.; Cheikhrouhou, O.; Koubâa, A.; Toumi, K.; Khalgui, M.; Gia, T.N. UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones. Sensors 2021, 21, 3049. [Google Scholar] [CrossRef] [PubMed]
  17. Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2018, 6, 3572–3584. [Google Scholar] [CrossRef]
  18. Gorrepati, R.R.; Guntur, S.R. DroneMap: An IoT Network Security in Internet of Drones. In Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead; Springer: Cham, Switzerland, 2021; pp. 251–268. [Google Scholar] [CrossRef]
  19. Jain, D.K.; Tyagi, S.K.S.; Neelakandan, S.; Prakash, M.; Natrayan, L. Metaheuristic Optimization-Based Resource Allocation Technique for Cybertwin-Driven 6G on IoE Environment. IEEE Trans. Ind. Inform. 2021, 18, 4884–4892. [Google Scholar] [CrossRef]
  20. Goswami, P.; Mukherjee, A.; Maiti, M.; Tyagi, S.K.S.; Yang, L. A Neural-Network-Based Optimal Resource Allocation Method for Secure IIoT Network. IEEE Internet Things J. 2021, 9, 2538–2544. [Google Scholar] [CrossRef]
  21. Padmaa, M.; Jayasankar, T.; Venkatraman, S.; Dutta, A.K.; Gupta, D.; Shamshirband, S.; Rodrigues, J.J. Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems. J. Parallel Distrib. Comput. 2022, 164, 142–151. [Google Scholar] [CrossRef]
  22. Ahmad, M.; Ullah, F.; Wahid, I.; Khan, A.; Uddin, M.I.; Alharbi, A.; Alosaimi, W. A Bio-inspired Routing Optimization in UAV-enabled Internet of Everything. Comput. Mater. Contin. 2021, 67, 321–336. [Google Scholar] [CrossRef]
  23. Liu, B.; Zhang, W.; Chen, W.; Huang, H.; Guo, S. Online computation ofoading and trafc routing for UAV swarms in edge-cloud computing. IEEE Trans. Veh. Technol. 2020, 69, 8777–8791. [Google Scholar] [CrossRef]
  24. Baek, J.; Han, S.I.; Han, Y. Energy-efficient UAV routing for wireless sensor networks. IEEE Trans. Veh. Technol. 2020, 69, 1741–1750. [Google Scholar] [CrossRef]
  25. Yang, H.; Liu, Z. An optimization routing Protocol for FANETs. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 2–8. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Application areas of IoD.
Figure 1. Application areas of IoD.
Applsci 12 07950 g001
Figure 2. Throughput analysis of ESRO-SRP technique under distinct levels of energy.
Figure 2. Throughput analysis of ESRO-SRP technique under distinct levels of energy.
Applsci 12 07950 g002
Figure 3. PDR analysis of ESRO-SRP technique under distinct levels of energy.
Figure 3. PDR analysis of ESRO-SRP technique under distinct levels of energy.
Applsci 12 07950 g003
Figure 4. AHOPS analysis of ESRO-SRP technique under distinct levels of energy.
Figure 4. AHOPS analysis of ESRO-SRP technique under distinct levels of energy.
Applsci 12 07950 g004
Figure 5. Coverage analysis of ESRO-SRP technique under distinct levels of energy.
Figure 5. Coverage analysis of ESRO-SRP technique under distinct levels of energy.
Applsci 12 07950 g005
Figure 6. Lifetime analysis of ESRO-SRP technique under distinct levels of energy.
Figure 6. Lifetime analysis of ESRO-SRP technique under distinct levels of energy.
Applsci 12 07950 g006
Table 1. Throughput analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Table 1. Throughput analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Throughput (bytes/s)
EC (%)ESRO-SRPBRUe-IoEORP-FANETUAVe-WSNTR-UAV Swarm
533.9514.5414.549.697.75
1036.8617.4514.5412.601.93
1544.6219.3920.3612.605.81
2060.1534.9220.3615.519.69
25100.9074.7025.2117.458.72
30114.4889.2631.0421.3314.54
35138.74112.5437.8328.1215.51
40142.62105.7537.8331.0421.33
45149.42123.2244.6238.8024.24
50152.33126.1364.0352.3832.98
55157.18129.0481.4963.0636.86
60154.27133.8992.1771.7944.62
65155.24134.86102.8471.7947.53
70163.00141.65100.9079.5555.29
75178.53148.45108.6684.4064.03
80187.26157.18108.6688.2869.85
85187.26160.09112.5497.9979.55
90187.26162.03125.16100.9085.37
95188.23164.94142.62110.6096.05
100189.20165.91140.68110.6099.93
Table 2. PDR analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Table 2. PDR analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Packet Delivery Ratio (%)
EC (%)ESRO-SRPBRUe-IoEORP-FANETUAVe-WSNTR-UAV Swarm
565.2058.4049.6040.8039.20
1064.8060.0050.0042.0039.60
1566.0060.0053.2046.8039.60
2070.8061.6054.0046.4042.00
2572.4064.0056.0047.6043.60
3073.2066.4056.4050.0044.80
3574.4066.4057.6051.6046.40
4074.4066.4059.2053.6048.00
4575.2066.0060.0054.0050.80
5076.4067.2061.6054.4050.00
5576.0068.0061.6054.4050.80
6076.4069.6064.4055.2051.60
6578.4072.8064.8058.4052.80
7080.4073.6066.8059.2054.00
7583.2075.2070.0061.2054.40
8081.6076.8071.6062.8056.40
8586.0077.6071.6064.0059.20
9085.6079.2072.8064.8061.20
9589.2080.4073.2065.6060.00
10086.0079.6073.6067.6063.20
Table 3. Average HOPS analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Table 3. Average HOPS analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Average HOPS (%)
EC (%)ESRO-SRPBRUe-IoEORP-FANETUAVe-WSNTR-UAV Swarm
597552
1097652
15107652
20118652
251410852
301612953
3516121063
4016131064
4517141164
5017141173
5518151174
6020151284
6520151285
7021161296
7521181396
8021181596
85221918107
90242018107
95242220106
100232221117
Table 4. Coverage analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Table 4. Coverage analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Coverage (%)
EC (%)ESRO-SRPBRUe-IoEORP-FANETUAVe-WSNTR-UAV Swarm
597.6991.1883.5881.4173.26
1098.7892.8181.4175.4370.01
1596.6190.0979.2373.2666.21
2092.8189.0175.9871.6365.12
2589.0185.2172.1871.6358.61
3086.8382.4970.0164.0353.18
3586.8377.0659.1565.6643.95
4077.6168.3856.4355.3542.32
4575.9867.8356.9851.0139.06
5065.1260.7849.9247.2136.35
5562.4154.2645.0342.3235.26
6061.3250.4642.8639.6128.21
6560.7847.7538.5236.3526.03
7058.6146.6636.3531.4625.49
7555.8943.9530.9227.6623.86
8052.0940.6930.3827.6621.15
8551.0138.5227.6619.5216.81
9051.0137.4321.6919.5213.01
9551.0135.2618.9815.183.24
10048.2933.6316.2615.183.24
Table 5. Lifetime analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Table 5. Lifetime analysis of ESRO-SRP technique with existing algorithms under distinct levels of energy.
Lifetime (No. of Rounds)
EC (%)ESRO-SRPBRUe-IoEORP-FANETUAVe-WSNTR-UAV Swarm
5574125101
10654838156
156553403514
207556484115
257562524319
308865584322
359472665230
4011396735132
45124110805837
50130108936040
55142121966639
601481241057244
651491301077544
701571391207858
751631471199578
801671471179486
8517015112410290
9017415413510494
95175157136119100
100176157144124107
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

S. Alrayes, F.; Dhahbi, S.; S. Alzahrani, J.; Mehanna, A.S.; Al Duhayyim, M.; Motwakel, A.; Yaseen, I.; Atta Abdelmageed, A. Enhanced Search-and-Rescue Optimization-Enabled Secure Route Planning Scheme for Internet of Drones Environment. Appl. Sci. 2022, 12, 7950. https://doi.org/10.3390/app12157950

AMA Style

S. Alrayes F, Dhahbi S, S. Alzahrani J, Mehanna AS, Al Duhayyim M, Motwakel A, Yaseen I, Atta Abdelmageed A. Enhanced Search-and-Rescue Optimization-Enabled Secure Route Planning Scheme for Internet of Drones Environment. Applied Sciences. 2022; 12(15):7950. https://doi.org/10.3390/app12157950

Chicago/Turabian Style

S. Alrayes, Fatma, Sami Dhahbi, Jaber S. Alzahrani, Amal S. Mehanna, Mesfer Al Duhayyim, Abdelwahed Motwakel, Ishfaq Yaseen, and Amgad Atta Abdelmageed. 2022. "Enhanced Search-and-Rescue Optimization-Enabled Secure Route Planning Scheme for Internet of Drones Environment" Applied Sciences 12, no. 15: 7950. https://doi.org/10.3390/app12157950

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop