Next Article in Journal
A Multi-Agent System Using Decentralized Decision-Making Techniques for Area Surveillance and Intruder Monitoring
Next Article in Special Issue
Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain
Previous Article in Journal
A Distributed Task Scheduling Method Based on Conflict Prediction for Ad Hoc UAV Swarms
Previous Article in Special Issue
Physical-Layer Security for UAV-Assisted Air-to-Underwater Communication Systems with Fixed-Gain Amplify-and-Forward Relaying
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhanced Artificial Gorilla Troops Optimizer Based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network

1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh 11671, Saudi Arabia
2
Department of Industrial Engineering, College of Engineering at Alqunfudah, Umm Al-Qura University, Makkah 24382, Saudi Arabia
3
Department of Information Systems, College of Computer Science, King Khalid University, Abha 62529, Saudi Arabia
4
Department of Information and Technology Systems, College of Computer Science and Engineering, University of Jeddah, Jeddah 23218, Saudi Arabia
5
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
6
Department of Digital Media, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt
7
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Drones 2022, 6(11), 358; https://doi.org/10.3390/drones6110358
Submission received: 12 October 2022 / Revised: 13 November 2022 / Accepted: 14 November 2022 / Published: 16 November 2022
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)

Abstract

:
The increasing demands of several emergent services brought new communication problems to vehicular networks (VNs). It is predicted that the transmission system assimilated with unmanned aerial vehicles (UAVs) fulfills the requirement of next-generation vehicular network. Because of its higher flexible mobility, the UAV-aided vehicular network brings transformative and far-reaching benefits with extremely high data rates; considerably improved security and reliability; massive and hyper-fast wireless access; much greener, smarter, and longer 3D communications coverage. The clustering technique in UAV-aided VN is a difficult process because of the limited energy of UAVs, higher mobility, unstable links, and dynamic topology. Therefore, this study introduced an Enhanced Artificial Gorilla Troops Optimizer–based Clustering Protocol for a UAV-Assisted Intelligent Vehicular Network (EAGTOC-UIVN). The goal of the EAGTOC-UIVN technique lies in the clustering of the nodes in UAV-based VN to achieve maximum lifetime and energy efficiency. In the presented EAGTOC-UIVN technique, the EAGTO algorithm was primarily designed by the use of the circle chaotic mapping technique. Moreover, the EAGTOC-UIVN technique computes a fitness function with the inclusion of multiple parameters. To depict the improved performance of the EAGTOC-UIVN technique, a widespread simulation analysis was performed. The comparison study demonstrated the enhancements of the EAGTOC-UIVN technique over other recent approaches.

1. Introduction

Transport commuting becomes a ubiquitous part of day to day lives; the vehicular network (VN) plays a positive role and increases the quality of life [1]. VN technology is advantageous in information applications, automatic toll collection, public safety, automatic driving, traffic coordination, event-driven safety message broadcasting, and so on. VN accesses the location where a traffic accident occurs, timely notifies the pertinent vehicle to adopt security measurement, and then offers quality of service of multimedia information for the tourist during the journey. Regarding the data services, VN is applied for the remainder of services with respect to infectious diseases, carbon emissions, pollution levels of the haze, and other related services that could enhance the living environment of humans [2]. Moreover, traffic-flow coordination could be benefitted by VN. People timely obtain present traffic data on the road of the vehicle and select the optimum path. These data are particularly effective for the best travel experience for the passenger and for preventing congested sections. Intelligent transport systems benefited considerably from VN [3]. It provides data with respect to restaurants, petrol stations, weather information, navigation, service areas, and every desirable datum regarding the neighboring environments. VN is employed to automated driving, namely the distance detection among velocity estimation, vehicles, road-condition perception, self-parking, and location service [4]. VN is employed to realize automated charging of the vehicle. In V2I transmission, RSU could automatically sense the journey mileage of a vehicle, the entrance location, and exit location, later realizing the automated charging that could decrease the congestion at the charging place and enhance the charging efficiency [5]. Figure 1 depicts the framework of UAV-assisted vehicular network.
A data-distribution technique is broadly employed in different circumstances, namely emergency collision avoidance [6], the data acquirement of public entertainment, and traffic-flow management that could decrease the number of traffic accidents, which promote the urban building of a smart city and discharge urban traffic congestion [7]. In certain scenarios, the timeliness of data dissemination is crucial. To accomplish the objective, unmanned aerial vehicle (UAV) is applied to help with data distribution. Due to better maneuverability of the UAV, it is widely used for completing the data dissemination task in certain scenarios [8]. For instance, in certain locations, once the transmission framework is damaged, the UAV could be deployed rapidly as the mobile base station to help the transmission network. Network lifetime is a significant parameter in UAV network that is based on whether a specific number of nodes die due to energy consumption [9]. In mobile UAV networks, topology control is the major aspect for extending network lifetime and reducing communication interference. A hierarchical network based on clustering model is widely employed in mobile networks. The cluster head (CH) selection and clustering process are major factors in the hierarchical network [10,11,12].
This study introduces an Enhanced Artificial Gorilla Troops Optimizer based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network (EAGTOC-UIVN). The goal of the EAGTOC-UIVN technique lies in the clustering of the nodes in UAV-based VN to achieve maximum lifetime and energy efficiency. In the presented EAGTOC-UIVN technique, the EAGTO algorithm is primarily designed by the use of circle chaotic mapping technique. Moreover, the EAGTOC-UIVN technique computes a fitness function with the inclusion of multiple parameters. To depict the improved performance of the EAGTOC-UIVN technique, a widespread simulation analysis was performed.

2. Literature Review

In Reference [13], an efficient routing technique depending upon a flooding method was developed for robust route identification. It assures an alternate path during path-failure scenarios. In addition, a forecasting approach is employed for anticipating the expiration time of every discovered route. The authors in Reference [14] considered the issue of content distribution to the vehicles on roadways with overloaded or no available communication structure. Incoming vehicles demand service from a library of content which is partially cached at the UAV; the content of the library is also considered for modifying new vehicles carrying more popular content. A non-orthogonal multiple access (NOMA)-enabled double-layer airborne access vehicular ad hoc networks (DLAA-VANETs) architecture was designed in Reference [15], which consists of a high-altitude platform (HAP), multiple unmanned aerial vehicles (UAVs), and vehicles. For the designed DLAA-VANETs, the UAV deployment and network optimization problem is addressed. Particularly, the UAV deployment method, depending upon particle swarm optimization, is presented. Next, the NOMA model is introduced into the designed model for improving the transmission rate.
Khabbaz et al. [16] aimed at enhancing the ground vehicle connectivity in the framework of an alternating vehicle-to-UAV (V2U) transmission condition, whereas vehicles create time-limited connectivity with transient by UAV served as flying BSs responsible to route arriving vehicle information on backbone network or Internet. Zheng et al. [17] used cyclic-flight UAVs for assisting RSU by offering video download services to vehicles. With the utilization of UAV, seamless communication coverage and stable broadcast connections ensure the optimum quality of services to vehicle. Moreover, the authors present a model-free technique dependent upon DQN for determining an optimum UAV decision procedure for achieving the minimization of stalling time. Raza et al. [18] examined a UAV-assisted VANET communication structure, whereas UAVs fly over the used region and offer communication service to basic coverage region. UAV-assisted VANET aims for the benefits of line-of-sight (LOS) communication, flexibility, load balancing (LB), and cost-effectual deployment.
Wu et al. [19] examined a deep supervised learning system to enable intelligence edge for making decisions on the extremely dynamic vehicular network. Specifically, the authors initially presented a clustering-based two-layered (CBTL) technique for solving the JCTO problem offline. Afterward, they planned a deep supervised learning structure of CNN for making fast decisions online. Ghazzai et al. [20] established a mobility- and energy-aware data routing protocol for UAV-supported VANETs. Most UAVs perform as a flying RSU, gathering information in ground vehicles, but another UAV role is the play of relays for providing the information to mobility service center (MSC). The UAV is modifying its 3D places in an existing range if required for ensuring reliable communication links.
A UAV-helped data dissemination system dependent upon network coding was presented in Reference [21]. Initially, the graph concept for modeling the occurrence of data loss of the vehicles was utilized; the data dissemination issue was changed to the maximal clique issue of graphs. With the coverage of directional antenna being restricted, a parallel system for determining the maximal clique dependent upon the area separation was presented. Alioua et al. [22] examine a new distributed SDN-related structure for UAV-support-structure-less vehicular networks. An important purpose is to fill the gap in which no SDN-based infrastructure was presented for these networks. The author’s concentrated mostly on a road safety use-case that integrated UAVs for assisting emergency vehicles in the exploration of affected regions from crucial emergency conditions. In addition, the authors examined an effectual data processing strategy with shared decision-making or computation-offloading problems. Though several models are available in the literature, the network efficiency in UAV-assisted VNs still needs to be improved. In addition, the inclusion of multiple parameters for optimal UAV selection is important as CHs become essential.

3. The Proposed Model

In this study, a new EAGTOC-UIVN technique was developed for clustering the UAV-assisted VN. The major aim of the EAGTOC-UIVN technique exists in the grouping of the nodes in the UAV-based VN to achieve maximum lifetime and energy efficiency. In the presented EAGTOC-UIVN technique, the EAGTO algorithm is primarily designed by the use of the circle chaotic mapping technique.

3.1. System Model

In the presented model, the types of UAVs considered could be middle-size drones or mini drones. A simple collision process is utilized for collision avoidance [23]. In this work, the UAV changed altitude for possible collision. The UAV’s maximum speed could reach up to 30 m/s. Every UAV device relies on a location-aware component. This location-conscious mechanism allows the routing method to function efficiently and precisely. In general, location data can be attained from an alternative scheme. In the presented method, inertial measurement units and GPS are given for the motion sensing and positioning of the UAV. Each UAV is aware of its ground station and neighbors’ positions. Each UAV is equipped with long- and short-range wireless transmission. Long-range wireless transmission can be utilized for inter-cluster transmission with the ground station and other CHs. Short-range wireless transmission is utilized for intra-transmission with its peers in the cluster.

3.2. Design of EAGTO Technique

With other metaheuristics, AGTO’s stability and convergence accuracy suffer as the optimization problem to be resolved grows in variety and complexity. This flaw requires the further development of novel mechanisms to perform exploitation and exploration and help accomplish improved performance [24]. A troop comprises a dominant adult male gorilla (silverback), numerous dominant adult females, and their offspring. A silverback gorilla is over 12 years old and obtains the name from the distinct hairs that grow on his back while he attains puberty. Furthermore, the silverback is the leader of the entire troop and is accountable for ensuring everyone’s safety, planning and executing group travel, allocating food and other resources, and making each decision, mediating any conflicts that arise. Male gorillas between the ages of 8 and 12 are considered “black” since the silver fur is not fully grown. It is common for gorillas to leave the birth group for joining a third. However, some male gorillas decide to stick around and keep following the silverback. Such males might fight viciously for controlling the group and accessing adult females when the silverback is killed. The idea of group behaviors in wild gorillas acts as the motivation for the AGTO algorithm. Initialization, local exploitation, and global exploration are the three phases that make up AGTO, the same as they are in other intelligent techniques.

3.2.1. Initialization Phase

Consider the D -dimension space has N gorillas. To specify where i - t h gorillas are in the universe, we could formulate X i = x i , 1 ,   x i , 2 ,   x i , D , whereas I = 1 , 2 , N , and it can be defined as follows:
X N × D = r a n d N ,   D × u b l b + l b   1
where rand () lies between 0 and 1. The search range can be determined by using the upper and lower limits, u b and l b , respectively; and the matrix, X , has a random value, A , within [0, 1] that is allocated to all the elements of the N rows and D columns in the matrix represented as r a n d   N ,   D .

3.2.2. Exploration Phase

G X t + 1 = u b l b × r 2 + l b ,   r 1 < p
r 3 C × X A t + L × Z × X t ,   r 1 0.5
X t L × L × X t X B t + r 4 × X t X B t r 1 < 0.5
In the above equations, t signifies iteration times, X t indicates the gorilla’s existing location vector, and G X t + 1 denotes the potential search agent position for the following iteration. Furthermore, the random numbers r 1 ,   r 2 ,   r 3 , and r 4 denote a number value between zero and one. Two locations among the existing population of gorillas, X A t and B t , are selected randomly; p is a predetermined value. By utilizing the problem dimension as an index, Z denotes the row vector where the component value was derived randomly from C ,   C . Additionally, C can be defined as follows:
C =   cos   2 × r 5 + 1 × 1 t M a x i t e r
where cos   denotes the cosine function, r 5 indicates positive real numbers amongst [0, 1], and M a x i t e r denotes the maximal iteration number. It is possible to evaluate L , the value of variable, as follows:
L = C × l  
where l indicates the arbitrary value within [−1, 1]. Afterward, every probable G X t + 1 solution is produced, owing to the exploration, and the fitness value is compared. If G X outperformes X , it is kept and utilized in the location of X . This is represented as the condition G X < F X , whereas F indicates the fitness function for the problem in question t . Additionally, the better option available at the time is now considered to be the silverback.

3.2.3. Exploitation Phase

Once the new troop of gorillas is formed, the silverback is the dominant male and is at the peak of his health and strength. They follow the silverback gorilla since they forage for food. Unavoidably, the silverback will age and die, and in his location, a younger blackback in the troop might engage in fighting over mating and leadership with other males. AGTO’s exploitation stage follows the silverback and competes for adult female gorillas. W is presented for controlling these transitions. When C in Equation (4) is higher than W , this follows the silverback’s initial model:
G X t + 1 = L × M × X t X s i l v e r b a c k + X t
In such cases, the optimum solution found so far is indicated as X silverback, the existing location vector is represented as t , and L is estimated by means of Equation (5). The values of M are defined as follows:
M = i = 1 n x i t N | x i t N | 2 l 1 2 l  
where N denotes the overall individual number, and X i t indicates a vector demonstrating the gorilla’s position:
G X t + 1 = X s i l v e r b a c k X s i l v e r b a c k × Q X t × Q × A  
Q = 2 × r 6 1  
A = ϕ × E ,  
E = N 1 ,   r 7 0.5   N 2 ,   r 7 < 0.5  
It is the existing location, represented as t , and the impact force, Q , that are evaluated by Equations (7) and (8). A random value within zero and one is utilized for r 6 in Equation (4). Additionally, Equation (9) is utilized for assessing the efficiency of the coefficient. A is utilized for stimulating the level of violence in the game. With the equation denoting a constant, we could define what number represents Equation (10). Equation (6) involves r 7 , which is a value selected randomly within zero and one. Standard distribution, E 1 ,   D , is when r70.5 is a coincidental event, and D indicates the number of spatial dimensions. However, if r 7 is less than half, E is equivalent to the random quantity that fits neatly into the standard distribution. Afterward, the exploitation stage is complete, and the value of candidate fitness for the recently generated G X t + 1 problems is calculated. G X is preserved if F G X F .  Figure 2 depicts the flowchart of GTOA.
In this work, the EAGTO algorithm was primarily designed by the use of the circle chaotic mapping technique. To increase the population diversity and exploit the data in the solution space, the circle chaotic function is proposed to increase the initialization mode of the GTOA. Additionally, it can be mathematically expressed as follows:
z k + 1 = z k + b a 2 π · sin a π z k m o d 1 , z k 0 , 1
whereas a = 0.5 and b = 0.2, the circle mapping and random search mechanism are chosen to be independently implemented 300 times. The traversal of circle chaotic mapping is more homogeneously distributed and wider in the range of [0, 1]. Thus, after integrating circle chaotic mapping, the presented technique has a robust global exploration capability.

3.3. Clustering Process Involved in EAGTOC-UIVN Technique

The EAGTOC-UIVN technique computes a fitness function with the inclusion of multiple parameters. The EAGTOC-UIVN method is proposed with the existence of 4 fitness variables, namely energy efficacy of cluster node density, UAV nodes, distance in CH to sink, and average distance of UAV for CH enclosed by their sensing series [25]. The data on fitness parameters was provided by the following:
Energy efficiency: The CH executes various events, such as gathered, sense, data broadcast, aggregation, and so on; hence, CH intakes the greatest amount of energy when compared to other nodes. Then it is vital for defining an FF that shared the load among each UAV from the network. The fitness variable for effective deployment of network energy is given below:
R e = e n i
A ν g e = 1 n i = 0 n e n i
f 1 = C H o p t R e A v g e = C H o p t e n i 1 n Σ i = 0 n e n i C H o p t = 5 %   o f   n ,   e n i
= 0.5 J   o r   1.25 J   o r   1.75 J
In Equation (12), R e ,   A ν g e , and n i denote the node RE, network average energy, and whole quantity of UAV nodes, respectively. C H o p t shows the optimum percentage of CHs.
Cluster node density: In intra-cluster communication, the cost is a crucial parameter for the high energy effectiveness of the network. Next, the network energy deployment was larger when the cost function of cluster was determined as follows:
f 2 =   max   n C H 1 , n C H 2 , n C H 3 n C H j n = 2   T o   95 ,   j = 1   t o   15
From the expression, n C H j denotes the number of UAVs from the range of j t h  CH  C H j . The values of objective function f 2 are greater than able choice of CH and exploits from reducing the energy reduction.
The average distance of UAVs to the CH within its sensing range: In intra-cluster communication, UAVs transmit information to the CH. When the CH is farther from the CM, the energy of the UAV diminishes; when the CH is closer to the member UAV nodes afterward, there is a deployment of minimal energy.
f 3 = 1 n s τ i = 0 n s r d i s T C H ,   i   d i s t C H ,   i = 1   t o   35   m , n s r = 1   t o   100  
where n s r and d i s t C H ,   i indicate the number of UAVs from the sensing sequence and Euclidean distance in node and CH from the sensing series of the cluster. Thus, the value of f 3 is minimal; however, the intra-cluster communication power is lessened.
Distance from CH to BS: The distance between the BSs and CHs takes a basic function, as if the CHS is farther from the sink and exploits energy quickly that is evaluated by the following:
f 4 = 1 C H i = 0 CH d i s t B S ,   C H i   d i s t B S ,   C H i = 1   t o   70 m ,   C H = 1   t o   15
In Equation (15), d i s t B S ,   C H i indicates the Euclidean distance among the BS and C H i . Minimizing the f 4 objective function specified that the CHS is not farther from the BS.
Once the f 1 , f 2 , f 3 , and f 4 function parameters were evaluated, the objective function was also named FF and calculated as follows:
F = M a x i m i z e   F i t n e s s = α f 1 + β f 2 + γ 1 f 3 + δ 1 f 4  
In Equation (16), α , β , γ , and δ denote the weight coefficient for the f 1 , f 2 , f 3 , and f 4 FF parameters, correspondingly. The range of weight coefficient ranges from 0 to 1.

4. Results and Discussion

The proposed model was simulated by using MATLAB R2019a. The simulation parameters are listed in Table 1. In this section, a detailed experimental validation of the EAGTOC-UIVN approach is investigated under distinct UAVs. Table 2 and Figure 3 report an overall PDR examination of the EAGTOC-UIVN model under several UAVs, with existing models such as swarm-intelligence-based clustering (SIC), EALC, ant-colony optimization (ACO), GBLADSR, and genetic algorithm (GA) [23].
The experimental value implies that the EAGTOC-UIVN technique obtained a better performance under all UAVs. For example, on 30 UAVs, the EAGTOC-UIVN method reached an increased PDR value of 90.15%. On the other hand, the SIC, EALC, ACO, GBLADSR, and GA approaches accomplished decreased PDR values of 85%, 71.21%, 67.81%, 64.83%, and 64%, correspondingly. Meanwhile, on 150 UAVs, the EAGTOC-UIVN technique attained an improved PDR value of 98.90%. In contrast, the SIC, EALC, ACO, GBLADSR, and GA techniques attained reduced PDR values of 95.09%, 87.78%, 84.49%, 80.89%, and 78.52%, correspondingly.
In Table 3 and Figure 4, a brief average end-to-end delay (AETED) assessment of the EAGTOC-UIVN with recent techniques is given. The results implied that the GA model failed to portray effectual outcomes with maximum values of AETED. At the same time, the EALC, ACO, and GBLADSR models reached closer AETED values. Although the SIC model tried to show a reasonable AETED value, the EAGTOC-UIVN model gained effectual outcomes with minimal AETED values. Notice that the EAGTOC-UIVN model reached an AETED value of at least 0.078 s under 30 UAVs.
In Table 4 and Figure 5, a brief cluster overhead (COH) assessment of the EAGTOC-UIVN with recent techniques is given. The result implies that the GA technique failed to represent effectual outcomes with a maximal value of COH. Simultaneously, the EALC, ACO, and GBLADSR techniques attained closer COH values. Even though the SIC method tried to demonstrate a reasonable COH value, the EAGTOC-UIVN technique obtained effectual outcomes with minimal COH values. Note that the EAGTOC-UIVN methodology attained a minimum COH value of 0.153 under 30 UAVs.
In Table 5 and Figure 6, a brief cluster building time (CBT) assessment of the EAGTOC-UIVN with recent approaches is given. The result implies that the GA approach failed to represent effectual outcomes with maximal value of CBT. Simultaneously, the EALC, ACO, and GBLADSR techniques attained closer CBT values. Even though the SIC approach tried to demonstrate a reasonable CBT value, the EAGTOC-UIVN technique obtained effectual outcomes with the lowest CBT values. Note that the EAGTOC-UIVN method has attained a minimum CBT value of 0.51 s under 30 nodes.
Table 6 and Figure 7 show the cluster average lifetime (CALT) analysis of the EAGTOC-UIVN technique under various nodes. The experimental value implies that the EAGTOC-UIVN approach attained an improved performance under all nodes. For example, on 30 nodes, the EAGTOC-UIVN technique attained an improved CALT value of 67.61 s. On the other hand, the SIC, EALC, ACO, GBLADSR, and GA systems attained minimized CALT values of 66.21 s, 65.20 s, 63.17 s, 54.66 s, and 47.81 s, correspondingly. Meanwhile, on 150 nodes, the EAGTOC-UIVN approach gained an improved CALT value of 55.04 s. In contrast, the SIC, EALC, ACO, GBLADSR, and GA techniques attained reduced CALT values of 50.35 s, 46.03 s, 40.45 s, 37.02 s, and 30.30 s, correspondingly.
Table 7 and Figure 8 show the number of alive nodes (NOAN) investigation of the EAGTOC-UIVN technique under various rounds. The experimental value implies that the EAGTOC-UIVN approach gained improved performance under all rounds. For example, on 400 rounds, the EAGTOC-UIVN system reached an improved NOAN value of 100. In contrast, the SIC, EALC, ACO, GBLADSR, and GA approaches attained reduced NOAN values of 98, 95, 93, 92, and 83, correspondingly. Meanwhile, on 1800 rounds, the EAGTOC-UIVN model gained an improved NOAN value of 71. In contrast, the SIC, EALC, ACO, GBLADSR, and GA methods attained improved NOAN values of 44, 20, 11, 4, and 0, correspondingly.
In Table 8 and Figure 9, a brief total energy consumption (TECON) assessment of the EAGTOC-UIVN technique with recent approaches is given. The outcomes imply that the GA technique has failed to describe effectual outcomes with maximal values of TECON.
Simultaneously, the EALC, ACO, and GBLADSR techniques obtained closer TECON values. Even though the SIC system tried to show a reasonable TECON value, the EAGTOC-UIVN approach attained effectual outcomes with minimal TECON values. Note that the EAGTOC-UIVN method attained a minimum TECON value of 38.61 J under 200 rounds. From these results, it is evident that the presented model improves the overall network efficacy.

5. Conclusions

In this study, a new EAGTOC-UIVN technique was developed for clustering the UAV-assisted VN. The major aim of the EAGTOC-UIVN technique exists in the grouping of the nodes in UAV-based VN to achieve maximum lifetime and energy efficiency. In the presented EAGTOC-UIVN technique, the EAGTO algorithm is primarily designed by the use of the circle chaotic mapping technique. Moreover, the EAGTOC-UIVN technique computes a fitness function with the inclusion of multiple parameters. To depict the improved performance of the EAGTOC-UIVN technique, a widespread simulation analysis was performed. The comparison study reported the enhancements of the EAGTOC-UIVN technique over other recent approaches. In the future, data aggregation and localization techniques can be designed to increase the overall network effectiveness of the UAV-based VNs.

Author Contributions

Conceptualization, H.A.; methodology, J.S.A.; software, M.M.A.; validation, J.S.A., A.S.A.A. and A.M.H.; formal analysis, M.A. and M.M.A; investigation, M.M..; resources, H.A.; data curation, A.Q.; writing—original draft preparation, H.A., J.S.A., M.M., M.A., A.Q., A.S.A.A. and A.M.H.; writing—review and editing, M.M.A.; visualization, A.M.H.; supervision, M.A.; project administration, A.M.H.; funding acquisition, H.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Small Groups Project under grant number (241/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R303), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: 22UQU4340237DSR54.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing is not applicable to this article, as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Fatemidokht, H.; Rafsanjani, M.K.; Gupta, B.B.; Hsu, C.H. Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2021, 22, 4757–4769. [Google Scholar] [CrossRef]
  2. Amantayeva, A.; Yerzhanova, M.; Kizilirmak, R.C. UAV location optimization for UAV-to-vehicle multiple access channel with visible light Communication. In Proceedings of the 2019 Wireless Days (WD), Manchester, UK, 24–26 April 2019; pp. 1–4. [Google Scholar]
  3. Huang, S.; Huang, C.; Wu, D.; Yin, Y.; Ashraf, M.; Fu, B. UAV-Assisted Sensor Data Dissemination in mmWave Vehicular Networks Based on Network Coding. Wirel. Commun. Mob. Comput. 2022, 2022, 2576182. [Google Scholar] [CrossRef]
  4. Al-Hilo, A.; Samir, M.; Assi, C.; Sharafeddine, S.; Ebrahimi, D. A cooperative approach for content caching and delivery in UAV-assisted vehicular networks. Veh. Commun. 2021, 32, 100391. [Google Scholar] [CrossRef]
  5. Barka, E.; Kerrache, C.A.; Lagraa, N.; Lakas, A. Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments. In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–7. [Google Scholar]
  6. Mokhtari, S.; Nouri, N.; Abouei, J.; Avokh, A.; Plataniotis, K.N. Relaying Data with Joint Optimization of Energy and Delay in Cluster-based UAV-assisted VANETs. IEEE Int. Things J. 2022. [Google Scholar] [CrossRef]
  7. Khabbaz, M.; Antoun, J.; Assi, C. Modeling and performance analysis of UAV-assisted vehicular networks. IEEE Trans. Veh. Technol. 2019, 68, 8384–8396. [Google Scholar] [CrossRef]
  8. Hu, J.; Chen, C.; Cai, L.; Khosravi, M.R.; Pei, Q.; Wan, S. UAV-assisted vehicular edge computing for the 6G internet of vehicles: Architecture, intelligence, and challenges. IEEE Commun. Stand. Mag. 2021, 5, 12–18. [Google Scholar] [CrossRef]
  9. Xing, N.; Zong, Q.; Dou, L.; Tian, B.; Wang, Q. A game theoretic approach for mobility prediction clustering in unmanned aerial vehicle networks. IEEE Trans. Veh. Technol. 2019, 68, 9963–9973. [Google Scholar] [CrossRef]
  10. Fawaz, W. Effect of non-cooperative vehicles on path connectivity in vehicular networks: A theoretical analysis and UAV-based remedy. Veh. Commun. 2018, 11, 12–19. [Google Scholar] [CrossRef]
  11. Nomikos, N.; Gkonis, P.K.; Bithas, P.S.; Trakadas, P. A Survey on UAV-Aided Maritime Communications: Deployment Considerations, Applications, and Future Challenges. arXiv 2022, arXiv:2209.09605. [Google Scholar]
  12. Wang, H.-M.; Zhang, X.; Jiang, J.-C. UAV-involved wireless physical-layer secure communications: Overview and research directions. IEEE Wirel. Commun. 2019, 26, 32–39. [Google Scholar] [CrossRef] [Green Version]
  13. Oubbati, O.S.; Chaib, N.; Lakas, A.; Lorenz, P.; Rachedi, A. UAV-assisted supporting services connectivity in urban VANETs. IEEE Trans. Veh. Technol. 2019, 68, 3944–3951. [Google Scholar] [CrossRef]
  14. Al-Hilo, A.; Samir, M.; Assi, C.; Sharafeddine, S.; Ebrahimi, D. UAV-assisted content delivery in intelligent transportation systems-joint trajectory planning and cache management. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5155–5167. [Google Scholar] [CrossRef]
  15. He, Y.; Nie, L.; Guo, T.; Kaur, K.; Hassan, M.M.; Yu, K. A NOMA-enabled framework for relay deployment and network optimization in double-layer airborne access VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22452–22466. [Google Scholar] [CrossRef]
  16. Khabbaz, M.; Assi, C.; Sharafeddine, S. Multihop V2U Path Availability Analysis in UAV-Assisted Vehicular Networks. IEEE Int. Things J. 2021, 8, 10745–10754. [Google Scholar] [CrossRef]
  17. Zheng, K.; Sun, Y.; Lin, Z.; Tang, Y. UAV-assisted online video downloading in vehicular networks: A reinforcement learning approach. In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May2020; pp. 1–5. [Google Scholar]
  18. Raza, A.; Bukhari, S.H.R.; Aadil, F.; Iqbal, Z. An UAV-assisted VANET architecture for intelligent transportation system in smart cities. Int. J. Distrib. Sens. Netw. 2021, 17, 15501477211031750. [Google Scholar] [CrossRef]
  19. Wu, H.; Lyu, F.; Zhou, C.; Chen, J.; Wang, L.; Shen, X. Optimal UAV caching and trajectory in aerial-assisted vehicular networks: A learning-based approach. IEEE J. Sel. Areas Commun. 2020, 38, 2783–2797. [Google Scholar] [CrossRef]
  20. Ghazzai, H.; Khattab, A.; Massoud, Y. Mobility and energy aware data routing for UAV-assisted VANETs. In Proceedings of the 2019 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Cairo, Egypt, 4–6 September 2019; pp. 1–6. [Google Scholar]
  21. Huang, S.; Huang, C.; Yin, Y.; Wu, D.; Ashraf, M.W.A.; Fu, B. UAV-assisted data dissemination based on network coding in vehicular networks. IET Intell. Transp. Syst. 2022, 16, 421–433. [Google Scholar] [CrossRef]
  22. Alioua, A.; Senouci, S.M.; Moussaoui, S.; Sedjelmaci, H.; Messous, M.A. Efficient data processing in software-defined UAV-assisted vehicular networks: A sequential game approach. Wirel. Pers. Commun. 2018, 101, 2255–2286. [Google Scholar] [CrossRef]
  23. Arafat, M.Y.; Moh, S. Localization and clustering based on swarm intelligence in UAV networks for emergency communications. IEEE Int. Things J. 2019, 6, 8958–8976. [Google Scholar] [CrossRef]
  24. Mohamed, T.A.; Mustafa, M.K. Adaptive trainer for multi-layer perceptron using artificial gorilla troops optimizer algorithm. Int. J. Nonlinear Anal. Appl. 2022. [Google Scholar] [CrossRef]
  25. Lakshmanna, K.; Subramani, N.; Alotaibi, Y.; Alghamdi, S.; Khalafand, O.I.; Nanda, A.K. Improved metaheuristic-driven energy-aware cluster-based routing scheme for IoT-assisted wireless sensor networks. Sustainability 2022, 14, 7712. [Google Scholar] [CrossRef]
Figure 1. Structure of UAV-assisted vehicular network.
Figure 1. Structure of UAV-assisted vehicular network.
Drones 06 00358 g001
Figure 2. Flowchart of GTOA.
Figure 2. Flowchart of GTOA.
Drones 06 00358 g002
Figure 3. PDR analysis of EAGTOC-UIVN system under varying UAVs.
Figure 3. PDR analysis of EAGTOC-UIVN system under varying UAVs.
Drones 06 00358 g003
Figure 4. AETED analysis of EAGTOC-UIVN algorithm under varying UAVs.
Figure 4. AETED analysis of EAGTOC-UIVN algorithm under varying UAVs.
Drones 06 00358 g004
Figure 5. COH analysis of EAGTOC-UIVN algorithm under varying UAVs.
Figure 5. COH analysis of EAGTOC-UIVN algorithm under varying UAVs.
Drones 06 00358 g005
Figure 6. CBT analysis of EAGTOC-UIVN technique under varying nodes.
Figure 6. CBT analysis of EAGTOC-UIVN technique under varying nodes.
Drones 06 00358 g006
Figure 7. CALT analysis of EAGTOC-UIVN algorithm under varying nodes.
Figure 7. CALT analysis of EAGTOC-UIVN algorithm under varying nodes.
Drones 06 00358 g007
Figure 8. NOAN analysis of EAGTOC-UIVN algorithm under varying rounds.
Figure 8. NOAN analysis of EAGTOC-UIVN algorithm under varying rounds.
Drones 06 00358 g008
Figure 9. TECON analysis of EAGTOC-UIVN algorithm under varying rounds.
Figure 9. TECON analysis of EAGTOC-UIVN algorithm under varying rounds.
Drones 06 00358 g009
Table 1. Parameter settings.
Table 1. Parameter settings.
Parameter Value
Network area1000 m*1000 m
UAV transmission range250–300 m
Number of UAVs150
Number of ground station1
Traffic typeCBR
CBR rate2 Mbps
Speed10–30 m/s
UAV transmission power5 W
Table 2. PDR analysis of EAGTOC-UIVN approach with other systems under varying UAVs.
Table 2. PDR analysis of EAGTOC-UIVN approach with other systems under varying UAVs.
Packet Delivery Ratio (%)
Number of UAVsEAGTOC-UIVNSICEALCACOGBLADSRGA
3090.1585.0071.2167.8164.8364.00
6094.3788.1977.2874.0968.7466.27
9096.1290.4684.4979.9673.4769.87
12098.1892.5287.8982.8477.3973.58
15098.9095.0987.7884.4980.8978.52
Table 3. AETED analysis of EAGTOC-UIVN approach with other systems under varying UAVs.
Table 3. AETED analysis of EAGTOC-UIVN approach with other systems under varying UAVs.
Average End-to-End Delay (s)
Number of UAVsEAGTOC-UIVNSICEALCACOGBLADSRGA
300.0780.0910.1100.1110.1110.122
600.0930.1050.1350.1520.1710.179
900.1020.1290.1660.1820.1940.216
1200.1210.1430.2270.2290.2420.269
1500.1360.1740.2620.2680.2860.302
Table 4. COH analysis of EAGTOC-UIVN technique with other systems under varying UAVs.
Table 4. COH analysis of EAGTOC-UIVN technique with other systems under varying UAVs.
Cluster Overhead
Number of UAVsEAGTOC-UIVNSICEALCACOGBLADSRGA
300.1530.1600.1680.1740.1770.195
600.1790.1970.2090.2180.2280.247
900.1950.2190.2400.2500.2580.274
1200.1980.2270.2680.2780.2910.309
1500.2160.2530.2900.3000.3070.329
Table 5. CBT analysis of EAGTOC-UIVN technique with other systems under varying nodes.
Table 5. CBT analysis of EAGTOC-UIVN technique with other systems under varying nodes.
Cluster Building Time (s)
Number of NodesEAGTOC-UIVNSICEALCACOGBLADSRGA
300.512.907.8710.4614.0317.41
605.298.0712.0513.4419.8030.14
905.6810.4614.6321.1928.1536.90
1205.4910.8617.0223.3839.8852.01
1506.089.2619.0129.7449.8260.36
Table 6. CALT analysis of EAGTOC-UIVN method with other techniques under varying nodes.
Table 6. CALT analysis of EAGTOC-UIVN method with other techniques under varying nodes.
Cluster Average Lifetime (s)
Number of NodesEAGTOC-UIVNSICEALCACOGBLADSRGA
3067.6166.2165.2063.1754.6647.81
6067.1064.5661.1457.9648.5741.59
9061.7754.2853.5251.2444.0034.61
12058.2251.2448.9546.0336.0131.06
15055.0450.3546.0340.4537.0230.30
Table 7. NOAN analysis of EAGTOC-UIVN technique with other systems under varying rounds.
Table 7. NOAN analysis of EAGTOC-UIVN technique with other systems under varying rounds.
No. of Alive Nodes
No. of RoundsEAGTOC-UIVNSICEALCACOGBLADSRGA
0100100100100100100
20010010099969592
4001009895939283
600999890857670
800979288776261
1000958783605551
1200947568524330
1400896959383315
160080554524153
18007144201140
200058289000
Table 8. TECON analysis of EAGTOC-UIVN technique with other systems under varying rounds.
Table 8. TECON analysis of EAGTOC-UIVN technique with other systems under varying rounds.
Total Energy Consumption (J)
No. of RoundsEAGTOC-UIVNSICEALCACOGBLADSRGA
00.000.000.000.000.000.00
20038.6170.9780.92100.84123.24247.68
40098.35165.55200.39225.28250.17466.71
600182.97265.11337.29392.04441.82568.76
800270.09369.64476.67553.83563.78643.43
1000377.11511.51578.72630.98708.14718.10
1200494.09578.72660.85787.79812.68790.28
1400603.61693.21770.37862.46899.79884.86
1600673.30795.26867.44912.24952.06937.13
1800755.43859.97917.22949.57979.44976.95
2000770.37869.93947.08954.55984.42996.86
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alsolai, H.; Alzahrani, J.S.; Maray, M.; Alghamdi, M.; Qahmash, A.; Alnfiai, M.M.; Aziz, A.S.A.; Mustafa Hilal, A. Enhanced Artificial Gorilla Troops Optimizer Based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network. Drones 2022, 6, 358. https://doi.org/10.3390/drones6110358

AMA Style

Alsolai H, Alzahrani JS, Maray M, Alghamdi M, Qahmash A, Alnfiai MM, Aziz ASA, Mustafa Hilal A. Enhanced Artificial Gorilla Troops Optimizer Based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network. Drones. 2022; 6(11):358. https://doi.org/10.3390/drones6110358

Chicago/Turabian Style

Alsolai, Hadeel, Jaber S. Alzahrani, Mohammed Maray, Mohammed Alghamdi, Ayman Qahmash, Mrim M. Alnfiai, Amira Sayed A. Aziz, and Anwer Mustafa Hilal. 2022. "Enhanced Artificial Gorilla Troops Optimizer Based Clustering Protocol for UAV-Assisted Intelligent Vehicular Network" Drones 6, no. 11: 358. https://doi.org/10.3390/drones6110358

Article Metrics

Back to TopTop