Next Article in Journal
A New Method for Surveying the World’s Smallest Class of Dragonfly in Wetlands Using Unoccupied Aerial Vehicles
Next Article in Special Issue
Backhaul-Aware User Association and Throughput Maximization in UAV-Aided Hybrid FSO/RF Network
Previous Article in Journal
Application and Development of Autonomous Robots in Concrete Construction: Challenges and Opportunities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Group Handover Scheme for Supporting Drone Services in IoT-Based 5G Network Architectures

by
Emmanouil Skondras
1,
Ioannis Kosmopoulos
1,
Emmanouel T. Michailidis
2,*,
Angelos Michalas
3 and
Dimitrios D. Vergados
1
1
Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou St., 18534 Piraeus, Greece
2
Department of Information and Communication Systems Engineering, School of Engineering, University of the Aegean, 83200 Samos, Greece
3
Department of Electrical and Computer Engineering, University of Western Macedonia, Karamanli and Ligeris, 50131 Kozani, Greece
*
Author to whom correspondence should be addressed.
Drones 2022, 6(12), 425; https://doi.org/10.3390/drones6120425
Submission received: 22 November 2022 / Revised: 12 December 2022 / Accepted: 14 December 2022 / Published: 17 December 2022
(This article belongs to the Special Issue UAVs in 5G and beyond Networks)

Abstract

:
Next generation mobile networks are expected to integrate multiple drones organized in Flying Ad Hoc Networks (FANETs) to support demanding and diverse services. The highly mobile drones should always be connected to the network in order to satisfy the strict requirements of upcoming applications. As the number of drones increases, they burden the network with the management of signaling and continuous monitoring of the drones during data transmission. Therefore, designing transmission mechanisms for fifth-generation (5G) drone-aided networks and using clustering algorithms for their grouping is of paramount importance. In this paper, a clustering and selection algorithm of the cluster head is proposed together with an efficient Group Handover (GHO) scheme that details how the respective Point of Access (PoA) groups will be clustered. Subsequently, for each cluster, the PoA elects a Cluster Head (CH), which is responsible for manipulating the mobility of the cluster by orchestrating the handover initiation (HO initiation), the network selection, and the handover execution (HO execution) processes. Moreover, the members of the cluster are informed about the impending HO from the CH. As a result, they establish new uplink and downlink communication channels to exchange data packets. In order to evaluate the proposed HO scheme, extensive simulations are carried out for a next-generation drone network architecture that supports Internet of Things (IoT) and multimedia services. This architecture relies on IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs) as well as Long-Term Evolution Advanced (LTE-A) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX). Furthermore, the proposed scheme is also evaluated in a real-world scenario using a testbed deployed in a controlled laboratory environment. Both simulation and real-world experimental results verify that the proposed scheme outperforms existing HO algorithms.

1. Introduction

In recent years, the use of swarms of drones and Flying Ad Hoc Networks (FANETs) [1] has been proposed to enhance the connectivity of fifth generation (5G) communication networks, Internet of Things (IoT) [2,3], and Internet of Drones (IoD) [4]. The FANETs involve highly dynamic network deployments [5] with multiple interconnected drones configured in groups. In FANETs, each drone can support several services including disaster management applications [6], eHealth applications [7], and streaming of multimedia content [8]. Drones can be equipped with Onboard Units (OBUs) [9,10] with computational, storage, and communication resources. In addition, some OBUs integrate IoT devices (e.g., speedometers and acceleration sensors) [11]. Moreover, Drone-to-Drone (D2D) [12] and Drone-to-Infrastructure (D2I) [13] communication can be established by leveraging Wireless Access in the Vehicular Environment (WAVE) Road Side Units (RSUs) [14,15], Long-Term Evolution Advanced (LTE-A) eNodeBs [16,17,18], and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Base Stations (BSs) [19,20].
In the special case of FANETs, a set of drones may simultaneously perform a handover (HO) to a new Point of Access (PoA). In addition, Group HOs (GHOs) may occur in cases where multiple drones with similar trajectories move from the coverage area of a PoA to the coverage area of another PoA. Among the advantages of GHOs is the reduction of the signaling burden on the network by simultaneously handing over multiple drones to the new PoA. As long as each drone carries out the HO individually, the required signaling is increased.
In order to perform a GHO, clustering of drones is deemed necessary. A clustered infrastructure consists of groups of drones called clusters, where the drones of each cluster have similar characteristics, such as speed, movement direction, received signal strength, or Quality of Service (QoS). In addition, the two main components of a cluster are the Cluster Head (CH) and the Cluster Member (CM). Typically, there is one main node for each cluster, i.e., the CH, which provides management services, such as media access, packet and message routing, optimal path-finding for long-distance packets, bandwidth allocation, and packet transmission within the cluster. Each CH can communicate with the CMs of its cluster, while in some cases, communication between CHs of different clusters can be performed. On the other hand, a CM is a simple member of a cluster [21].
Although clustering is typically used to solve mobility management, data routing, or resource allocation issues, existing algorithms from Mobile Ad Hoc Networks (MANETs) cannot successfully handle mobility problems arising from complex and highly dynamic FANET deployments. As a result, existing algorithms should be enhanced to support cluster of drones instead of supporting only individual mobile equipment. However, the time interval of cluster creation and maintenance adds additional overhead to the network owing to the complex nature of FANETs [22].
Motivated by the aforementioned observations, this paper proposes a GHO framework. The major contributions of this paper are synopsized as follows:
  • A scheme that enables the creation of clusters of drones is introduced, including an algorithm for the election of a CH for each cluster.
  • A Group HO methodology is implemented, including HO initiation, network selection, and HO execution processes, resulting in the minimization of the HO signaling costs.
  • During the HO initiation, decision making is performed by taking into consideration the relative importance between multiple services including IoT and multimedia drone applications.
  • The creation of a candidate networks list and the ranking of network alternatives are performed at the fog and cloud infrastructures in order to minimize the workloads at each drone.
The remainder of this paper is organized as follows: In Section 2, the related research literature is summarized. In addition, in Section 3, the proposed GHO scheme is described. Section 4 presents the simulation setup and the simulation results, while Section 5 evaluates the proposed scheme in real-world scenarios using an experimental testbed. Finally, Section 6 provides concluding remarks and discusses future research perspectives.

2. Background

In recent years, several HO management schemes for drone-aided network architectures have been proposed. Indicatively, as described in [23], among the main challenges in such network infrastructures is the provision of seamless network connectivity to drones, the handling of the increased mobility of drones, the design and development of efficient network selection algorithms, the manipulation of HO failures, and the minimization of the ping-pong effects that may occur during an HO. Furthermore, some authors have proposed methodologies for performing GHOs in order to minimize the HO signaling cost. In this section, some indicative works are discussed.

2.1. HO/GHO Schemes for Drone-Aided Networks

To address the issue of mobility management in drone networks, the Cluster-Based Routing for Sparse and Dense Networks (CBRSDN) algorithm was proposed in [24], as a comprehensive solution for creating clusters in drone-aided networks, selecting the CH of each cluster, and managing it smoothly. More specifically, a process was described, where the drones were divided into clusters with common characteristics, and one of these drones exchanged data with all network entities. This protocol was responsible for establishing a route between the source and destination of information when an arbitrary node intended to send packets to a destination. The specific algorithm was parameterized to appropriately adapt to several transmission scenarios.
Furthermore, in [25], a GHO scheme was proposed to increase capacity by deploying Drone Base Stations (DBSs). It was considered that a large amount of User Equipment (UE) can decrease the QoS and lead to service interruption. Particularly, the proposed scheme benefited from the GHO by electing the serving PoA as a group manager and resolved security issues concerning the authentication of nodes. The UE was handled at the DBS as a group, whereas data transmission between PoAs was not assessed. Moreover, the authentication process included two parts. Firstly, the DBSs were authenticated from the serving PoA using public keys. Then, the UE was authenticated by the DBSs, and the total HO time and energy consumption were decreased.
In [26], a machine learning (ML) HO mechanism was proposed to provide seamless connectivity for drone user equipment in a cellular environment. In this approach, the mechanism that enabled the connection to the cell with the highest Reference Signal Received Power (RSRP) was inadequate owing to the speed and flight trajectory of the drone. Thus, a Reinforcement Learning (RL)-based Q-learning algorithm was presented that considered a weighted function and included the values of the HO cost and the serving cell RSRP. This algorithm took into account the current state of the drone and the future state as a reward, which was estimated with a weighted function. The experimental results demonstrated that the proposed algorithm outperforms the standard RSRP cell selection algorithm by reducing the ping-pong effects and the signaling overhead. Additionally, this algorithm decreases the overall number of HOs during a flight, while connecting to the strongest cell at the same time.

2.2. HO Schemes for Other Network Infrastructures

Previously, several schemes that perform HO operations without performing mobility management in drone-aided networks have also been proposed. As such schemes describe fully functional HO methodologies, they can be applied to drone network infrastructures, maybe with modifications in some cases.
Indicatively, in [27], a mobility management model for LTE networks was presented with support of both macrocells and femtocells. In particular, a load-aware algorithm was described, which determined two HO thresholds, namely the γ t h M and the γ t h F , for macrocells and femtocells, respectively. These thresholds were calculated considering both the simple Reference Signal Received Power (RSRP)-based threshold defined in LTE as well as the network load information. When the RSRP dropped below the corresponding γ t h threshold, a Time-to-Trigger (TTT) timer was initialized to a certain value T, considering various parameters, such as the cell transmission power, the distances between the available cells, the path loss, the carrier frequency, the network traffic load, and the user velocity. During the countdown, the timer stops, and the user remains in the current network, provided that the RSRP returns above the corresponding γ t h threshold. In addition, the user should perform an HO to the network with the highest RSRP as soon as the timer equals zero. It is noted that this scheme can easily be applied to a drone network infrastructure, where the drones act as users.
In [28], a radio access selection algorithm for vehicular environments was proposed. The authors defined two network interface types, namely the primary interface and the secondary interface. In addition, the 802.11p network access technology was considered as the primary interface, while the 3GPP LTE was considered as the secondary one. By default, the vehicle was connected to the primary interface. The HO was initiated when the observed packet loss of user applications exceeded a maximum acceptable threshold. In this case, the vehicle performed an HO to the secondary interface. Thereafter, a timer was considered that specified the time duration when the secondary interface was used. As soon as the timer expired, the offered packet loss ratio of the primary interface was checked. Moreover, the vehicle performed an HO back to the primary interface when the packet loss ratio, which was offered by the primary interface, became lower than the maximum acceptable threshold. Although vehicular environments with ground nodes were considered, the proposed scheme can also be modified to include aerial ones.
In [29], a two-phase HO management scheme was proposed. Initially, the simple Received Signal Strength (RSS) -based HO initiation mechanism was applied, where the HO initiation took place when the observed RSS became lower than a predefined RSS threshold. Then, during the second phase, a triangular fuzzy Multi-Attribute Decision Making (MADM) algorithm was used that considered parameters, such as the RSS, the delay, the network load, and the battery utilization. This scheme can be applied to several types of network infrastructures, including drone-aided networks, since the aforementioned parameters can be available regardless of the type of the implemented network.
In [30], an IoT-enabled and Secrecy Aware GHO scheme (ISAG) for e-health services was introduced. The ISAG was applied to a Machine-to-Machine (M2M) communication network, where M2M devices (MMDs) provided services for patients. Specifically, the data transmission in the aforementioned scenario required both reliability and integrity, which were not fulfilled using standard HO algorithms. In this direction, several techniques were adopted to handle security issues during data transmission. The proposed scheme improved the HO preparation and registration processes by electing group leaders who aggregated the message authentication of the HO process. Notably, the group leader transmitted the aggregated request and response messages to the Home Subscriber Server (HSS) and the MMDs respectively. Hence, the computation, transmission, storage, and communication costs were decreased. The aforementioned scheme may also be applied to drone-aided networks, with D2D communication links.

3. The Proposed GHO Scheme for Drone-Aided Networks

In this section, a GHO scheme called enhanced-CBRSDN (eCBRSDN) is proposed that improves the CBRSDN algorithm, which as presented in [24] performs better than alternative solutions in both cluster formation and CH election procedures. The implementation of the procedures of this algorithm are also presented, including the clustering, the election of a CH for each cluster, and the handling of the mobility issues of the drones.

3.1. The Design of the Proposed Scheme

Figure 1 depicts the three-layer design of the proposed GHO scheme that consists of the Drone Layer (DL), the Access Network Layer (ANL), and the Service Layer (SL). The DL includes multiple drones, the ANL includes a set of PoAs, and the SL deploys a number of drone services. Each PoA of the ANL provides network access to a subset of the drones, which is organized into clusters, in order to efficiently handle their increased mobility. In addition, through the aforementioned network access, each drone obtains access to the services of the SL. Note that the SL can be implemented either on a Cloud infrastructure or on several physical servers.

3.2. The Clustering Process

The clustering process constitutes a key factor for efficient drone separation, whereas the goal of the proposed scheme is network load balancing and optimized bandwidth utilization. It is considered that the drones and PoAs are aware of their geographic location within the area covered by the access network. Moreover, each PoA is informed about the position of each drone.
To create clusters of drones, each PoA applies Formula (1) and calculates the number of segments A to which the underling geographical area should be divided. In this formula, the parameter C l u s t e r R P represents the target percentage of drones that should participate in each cluster.
A = 1 / C l u s t e r R P
It is noted that the flying position of each drone affects the creation of the cluster of drones in each segment. In addition, a unique identifier (ID) is generated for each cluster. The aforementioned procedure is executed three times, since three different altitude ranges are considered for the drones’ flights: low, medium, and high altitude (Algorithm 1).
Algorithm 1: Creation of the clusters of drones.
 Define three distinct level of altitudes: Low, Medium and High
for each level of altitude do
    Define the target C l u s t e r R P
    Calculate the number of segments (A) using (1)
    for each A i segment do
      Create a cluster containing the drones that are flying inside to its territory
    end for
end for

3.3. Cluster Head Election

The election of a CH is one of the most important functions of the proposed algorithm. Initially, for each cluster A i the corresponding PoA calculates the center ( c e n t r e p o i n t ). Thereafter, for the current time t, each drone calculates a score as follows:
C H s c o r e [ t ] = α · D i s t a n c e n o r m [ t ] + β · R S S n o r m [ t ] + γ · D i r e c t i o n [ t ] + δ · E T C
where the D i s t a n c e n o r m [ t ] parameter indicates the normalized value of the distance of the drone from the c e n t r e p o i n t , the R S S n o r m [ t ] is the normalized value of the signal strength that the drone receives from its current PoA, the D i r e c t i o n [ t ] indicates the movement direction of the drone with respect to the c e n t r e p o i n t , and the E T C represents the expected transmission count [31] or, in other words, the quality of bidirectional links that affect the lifetime of the cluster.
Regarding the estimation of the aforementioned parameters, it is noted that the D i s t a n c e n o r m [ t ] parameter is calculated using (3), where the D i s t a n c e [ t ] parameter represents the exact distance of the drone from the c e n t r e p o i n t , and the D i s t a n c e m a x represents the maximum distance that the drone can be from the c e n t r e p o i n t , namely the radius of the corresponding cluster. Correspondingly, the D i s t a n c e [ t ] parameter is estimated using (4), where the x i [ t ] , y i [ t ] , and z i [ t ] parameters indicate the current geographic latitude, the current geographic longitude, and the current altitude of the drone. Similarly, in this formula, the x j , y j , and z j parameters indicate the corresponding coordinates of the c e n t r e p o i n t . Additionally, the R S S n o r m [ t ] parameter is calculated using (5), where the R S S [ t ] represents the current strength of the signal that the drone receives from its PoA, and the R S S m a x is the higher value of the signal strength that has been observed for the entire access network environment until the current time t. In addition, the D i r e c t i o n parameter is calculated using (6) and obtains: (a) a positive value as long as the drone approaches the c e n t r e p o i n t , (b) a negative value as long as the drone moves from the c e n t r e p o i n t , and (c) a zero value as long as the drone remains stationary. Additionally, the E T C parameter is estimated using (7), where d f and d r represent the percentage of successful transmission and reception messages, respectively. Thus, the optimal value of the ETC could be equal to 0.5 for d f = 1 and d r = 1 . Overall, the drone that obtains the higher score is elected as the CH of its cluster (Algorithm 2).
D i s t a n c e n o r m [ t ] = D i s t a n c e [ t ] D i s t a n c e m a x
D i s t a n c e [ t ] = ( x i [ t ] x j ) 2 + ( y i [ t ] y j ) 2 + ( z i [ t ] z j ) 2
R S S n o r m [ t ] = R S S [ t ] R S S m a x
D i r e c t i o n [ t ] = D i s t a n c e n o r m [ t 1 ] D i s t a n c e n o r m [ t ]
E T C = 1 d f + d r
Additionally, the parameters α , β , γ , and δ are weighting factors and thus 0 α 1 , 0 β 1 , 0 γ 1 , 0 δ 1 , and α + β + γ + δ = 1 . The Analytic Network Process (ANP) [32] method is used for their calculation. The ANP analyzes the problem as a network of nodes, where each node represents a parameter, and the arcs between the nodes denote interactions between them. In addition, the ANP organized the parameters-nodes into clusters according to their type, while arcs within clusters are called inner dependencies, and arcs between clusters are called outer dependencies. Indicatively, in our case, we consider two clusters of parameters. The first cluster includes technical characteristics, namely the R S S and the E T C parameters. Accordingly, the second cluster includes movement characteristics, namely the D i s t a n c e and the D i r e c t i o n parameters.
To perform its task, the ANP initially creates a pairwise comparison matrix A for each cluster of parameters using the nine-point importance scale presented in Table 1 [33]. The form of the A matrix is expressed as follows:
A = [ 1 a 1 j a 1 p 1 / a 1 i 1 a i p 1 / a 1 n p 1 / a j p 1 ]
while p denotes the number of the parameters of the cluster. It is noted that in our case, during the instantiation of the system, the considered parameters are supposed to obtain equal importance with each other.
Algorithm 2: Election of the CH for each cluster.
for each cluster do
    Estimate c e n t r e p o i n t of the cluster
    for each drone of the cluster do
      Obtain the coordinates x i , y i and z i of its position
      Estimate its normalized distance from the c e n t r e p o i n t using (3)
      Estimate the normalized RSS that it perceives from its current PoA using (5)
      Obtain its movement direction with respect to the c e n t r e p o i n t using (6)
      Estimate the Expected Transmission Count (ETC) factor using (7)
      Calculate the score of the drone using (2)
    end for
    Elect the drone with the higher score as CH
end for
Subsequently, the geometric mean r A i of each row i in A is calculated using (9)
r A i = ( a i 1 · a i 2 · · a i p ) 1 p .
Then, the priority vector Ω i of each cluster parameter is created as follows:
Ω i = [ ω 1 ω 2 ω p ]
where each ω i is estimated using (11)
ω i = r A i / ( r A 1 + r A 2 + + r A i + + r A p ) .
Next, the ANP creates a supermatrix W representing the inner and outer dependencies of the ANP network. This is a partitioned matrix, with each matrix segment representing the relationship between two clusters of parameters. To construct the supermatrix, the local priority vectors Ω are grouped and placed in the appropriate positions in the supermatrix based on the flow of influence from one cluster to another. Indicatively, if we assume a network of q clusters where each cluster C k , k = [ 1 , 2 , , q ] contains p k parameters, denoted as e k 1 , e k 2 , , e k p k , then the supermatrix is expressed as:
W ˜ = C 1 C k C q e 11 e 1 p 1 e k 1 e k p k e q 1 e q p q C 1 C k C q e 11 e 1 p 1 e k 1 e k p k e q 1 e q p q [ W 11 W 1 j W 1 q W k 1 W k j W k q W q 1 W q j W q q ]
Then, the supermatrix is transformed to a stochastic one, namely the Weighted Supermatrix W , using (13).
W k , j = W k , j / q
Finally, the Weighted Supermatrix is raised to limiting powers, namely it is multiplied by itself, until all the entries converge and all the columns of the produced Limited Supermatrix become same, and their values show the weight of each parameter.

3.4. Mobility Management

The proposed mobility management methodology presented in Figure 2 is based on the Fast Proxy Mobile IPv6 (FPMIPv6) and Media Independent Handover (MIH) protocols. More specifically, FPMIPv6 offers solutions in heterogeneous terminal mobility environments by supporting a variety of different technologies. It also provides a common communication channel to quickly relay the appropriate signaling messages. Nevertheless, by only leveraging FPMIPv6, a satisfactory environment for initializing the transmission and selecting the next network cannot be provided. FPMIPv6 is actually characterized by a lack of relay initiation events, as well as a lack of procedures for searching and selecting candidate networks for relaying. Finally, control HO steps to the candidate network and link-level processes are not guaranteed. Consequently, the use of FPMIPv6 together with the MIH protocol is suggested to satisfactorily handle the aforementioned issues. Indeed, their combination consistently appears in the literature to permanently solve mobility issues, such as relay mis-initialization, failed HO to the new network, or the ping-pong effect.

3.4.1. HO Initiation

During this phase, the data rate C j , i of the j th Cluster Head (CH) from the current PoA is continuously monitored, as proposed in [34]. More specifically, C j , i depends on the bandwidth B j , i and on the Signal to Interference plus Noise Ratio S I N R j , i , and according to Shannon’s theorem, C j , i is calculated as follows:
C j , i = s = 1 S ( B s , j , i · l o g 2 ( 1 + S I N R j , i ) · W s )
where the parameter W s indicates the relative importance of each service s. As long as the CH of cluster A i with I D i perceives that the received data rate C j , i is below a certain threshold, it sends a 1 . M I H _ D a t a _ R a t e _ G o i n g _ D o w n message to the current Mobile Access Gateway (MAG) to initiate an HO for its cluster. In this message, the required data rate that the next network is requested to provide, as well as the identifiers of each Cluster Member (CM), are passed as parameters. Then, the current MAG starts buffering the received packets from the Local Mobility Anchor/Authentication, Authorization, and Accounting (LMA/AAA) entity.

3.4.2. Network Selection

During the network selection, the current MAG sends a 2 . M I H _ G E T _ I n f o r m a t i o n request message containing information about the minimum acceptable data rate for the collection of information about the candidate networks at the given time instance to the Media Independent Handover Information Services (MIIS) entity of the Software Defined Networking (SDN) controller. Subsequently, the SDN controller retrieves information about the candidate networks satisfying the required data rate and applies the Simple Additive Weighting (SAW) [35] method to rank these networks. In particular, the SDN controller uses (15) in order to estimate a score for each available PoA. It is noted that the C i , s , the P i , s , the L i , s , and the J i , s parameters indicate the normalized values about the data rate, the packet loss, the latency, and the jitter that the i th PoA offers for the s th service, respectively, while the W C , s , the W P , s , the W L , s , and the W J , s represent the corresponding relative importance of the aforementioned parameters for each service, calculated using the ANP method. Then, a sorted candidate networks list is created and transmitted to the current MAG using a 3 . M I H _ G E T _ I n f o r m a t i o n _ r e s p o n s e message. The current MAG checks the resources of each candidate MAG by exchanging 4 . M I H _ N 2 N _ H O _ R e s o u r c e _ r e q u e s t and 5 . M I H _ N 2 N _ H O _ R e s o u r c e _ r e s p o n s e messages. Note that the above process is repeated until a MAG with the required resources is found.
S A W i = s = 1 S C i , s · W C , s + P i , s · W P , s + L i , s · W L , s + J i , s · W J , s

3.4.3. HO Execution

During the HO execution, the current MAG first commits the resources to the new MAG for the upcoming HO by exchanging the 6 . M I H _ N 2 N _ H O _ C o m m i t _ r e q u e s t and 7 . M I H _ N 2 N _ H O _ C o m m i t _ r e s p o n s e messages. Then, for the commitment of the resources of the new MAG, the CH of the cluster sends the 8 . M I H _ N e t _ H O _ C o m m i t _ r e q u e s t message. Thereafter, the CH receives the message 9 . M I H _ N e t _ H O _ C o m m i t _ r e s p o n s e which confirms that the required resources are committed to the new MAG. Then, the current MAG informs the new MAG with relevant information for both the CH and the CMs of the cluster with the respective drone ID, drone-ID Logical Link Identifier, and the LMA/AAA from which data traffic is forwarded to the drones with the message 10 . H a n d o v e r _ I n i t i a t e . When the message is successfully received, the new MAG responds with 11 . H a n d o v e r _ A c k n o w l e d g m e n t to the CH, while the CH forwards this message to the CMs of his cluster. At the same time, a bidirectional tunnel is established between the MAGs to send a copy of the packets that were buffered during the initiation of the HO. These data will be sent later, as long as the CH and the CMs are connected to the new MAG. As a result, the new MAG sends a Proxy Binding Update (PBU) message, namely the 12 . P B U , to the LMA/AAA to create a transient entry in the Binding Cache Entry (BCE) by entering information about the MAGs affiliated with the drones, the home network prefix, as well as the active flags, namely the Buffering (B), the Transient (T), the Proxy (P) and the Forward (F) flags. When the LMA/AAA successfully receives the PBU, it starts buffering the packets from the network.
Now that the transient registration is registered in the BCE, a Proxy Binding Acknowledgment (PBA) message, namely the 13 . P B A , is sent to the new MAG to establish the bidirectional tunnel between these two entities. Subsequently, the downlink packets are destined by the LMA/AAA for the new MAG where they are buffered until the CH and CMs are connected to the new MAG. Specifically, the bidirectional tunnel between the LMA/AAA and the new MAG remains active until the transient registration is changed to permanent. Therefore, transient registration allows for a smoother transition from the current MAG to the new MAG by avoiding packet loss phenomena and HO failures. Both the CH and the CM send 14 . M I H _ L i n k _ u p messages via the locally installed Media Independent Handover Function (MIHF) entity to inform the new PoA that they can receive packets through the communication channel. Additionally, the CMs send the 15 . U N A message to the new MAG to inform the new PoA that the link and the Internet Protocol (IP) layers are established. The new MAG re-exchanges the 16 . P B U and 17 . P B A messages for each cluster entity, such that the entries from transients are permanent. Moreover, the resources of the current MAG are released by exchanging the 18 . M I H _ N 2 N _ C o m p l e t e _ r e q u e s t and 19 . M I H _ N 2 N _ C o m p l e t e _ r e s p o n s e messages. Finally, the two-way tunnel, which ensures smoother transition to the new MAG is abandoned, and packets reach their destination from the new MAG.

4. Simulation Setup and Results

In order to carry out the simulation procedure, a Fog infrastructure consisting of a set of PoAs is initially created. Specifically, the Fog includes two LTE-A Pro with Full Dimensional Multiple Input Multiple Output (FD-MIMO) macrocells, four WAVE RSUs, two LTE-A femtocells, and two WiMAX femtocells. The coverage radius of the macrocells is equal to 1000 m, the radius of the WAVE RSUs is equal to 200 m, and the radius of the LTE-A or WiMAX femtocells is equal to 100 m. Each LTE-A Pro FD-MIMO Macrocell offers B i = 100 MHz bandwidth, each WAVE RSU offers B i = 10 MHz, and each LTE-A or WiMAX Femtocell offers B i = 20 MHz. Additionally, a set of 300 drones is moving inside the coverage area of the network access environment. Initially, each LTE-A Pro FD-MIMO macrocell serves 100 of the aforementioned drones, each WAVE RSU serves 15 drones, and each LTE-A or WiMAX femtocell serves 10 drones. Additionally, three flying altitudes are considered for the drones, namely low, medium, and high altitude, while the simulated drones are equally distributed to these altitudes. Indicatively, for the cases of each LTE-A Pro FD-MIMO macrocell, 34 drones fly at low altitude, 33 drones fly at medium altitude, and 33 drones fly at high altitude. In addition, the Cloud infrastructure includes a set of Virtual Machines (VMs) providing video streaming and IoT services. The entire simulation blueis created using the Network Simulator 3 (NS3) [36], while the total simulation duration is equal to 200 s. Figure 3 depicts the simulated topology.
Initially, for each flying altitude, each PoA estimates the number of drones ( D D e n s i t y ) flying inside its coverage area, while at the same time the target percentage of drones to each cluster ( C l u s t e r R P ) is supposed to be equal to 0.11 . Then, each PoA calculates the number of segments (A) that should be created to each flying altitude using (1). Subsequently, a cluster of drones is created in each segment containing the drones flying inside the segment. After the formation of clusters of drones, a CH is elected for each cluster using the algorithm described in Section 3.1, by assuming that the D i s t a n c e , R S S , D i r e c t i o n , and E T C parameters obtain equal importance with each other, namely α = β = γ = δ = 0.25 . Indicatively, Figure 4 illustrates the clusters created from the LTE-A Pro FD-MIMO 1 macrocell when the simulation time becomes equal to 100 s. In this figure, the blue points represent the center of each cluster, while each green drone corresponds to the elected CH of each cluster. One observes that there exist nine created clusters in each flying altitude, while a cluster id is assigned to each cluster.
Table 2 shows the results for the cluster with id equal to m . 5 which is centered at the coordinates ( 500.0 , 500.0 , 500.0 ) .
Table 3 presents the simulation parameters, and Table 4 demonstrates the cost of each signaling message that can be exchanged between the network components during the mobility management.
The proposed eCBRSDN scheme is compared with the original CBRSDN [24] algorithm in terms of the average number of the CHs elected per PoA during the simulation, as well as in terms of the lifetime of the elected CHs. In particular, the original algorithm tends to elect drones as CHs without taking into consideration factors such as the movement direction or the quality of the communication link. Thus, in cases where the candidate drones move away the c e n t r e p o i n t of their cluster, or in cases where the quality of the communication link is poor, the proposed scheme performs better than the CBRSDN algorithm. More specifically, during the 200 s of the simulation, the CBRSDN algorithm elected 20 different CHs on average per PoA, while the proposed one elects 14 on average per PoA (Figure 5), indicating less CH election overhead to the entire system. It is noted that the number of clusters within the entire simulation remained constant for both algorithms.
Additionally, the results reveal how the lifetime of the elected CHs is affected from the average speed of the drones. In particular, the proposed eCBRSDN algorithm increases the lifetime of the elected CHs, enhancing the stability of the clusters by changing their CH fewer times. This situation occurs since the proposed algorithm takes into consideration the movement direction of each candidate CH during the selection of the CH for each cluster. Specifically, as illustrated in Figure 6, the average CH lifetime deceases for both algorithms as the movement speed of the drones increases from 10 m/s and up to 40 m/s. However, the proposed eCBRSDN algorithm achieves higher CH lifetimes in all cases, with the difference of the average CH lifetime becoming up to 6 s where the average speed of the drones becomes 40 m/s.
Furthermore, the efficiency of the HO initiation and the network selection, as well as the HO signaling cost [38] of the proposed scheme is compared with the ones achieved by the Mobile IP (MIP) [39], the Fast HO [40], the Fast Proxy Mobile IPv6 (FPMIPv6) [41], and the Enhanced Fast Proxy Mobile IPv6 (eFPMIPv6) [42,43] schemes.
For the calculation of the C j , V i d e o , i and C j , I o T , i values during the HO initiation process, the relative importance W s of each service is estimated using the respective service priority constraints defined in the LTE QoS class specifications [44,45]. Thus, we obtain W V i d e o = 0.43 and W I o T = 0.57 . Accordingly, the threshold values are calculated by considering S I N R = 14 db as proposed in [46]. Thus, we obtain C T h r e s h o l d , V i d e o = 0.812845 and C T h r e s h o l d , I o T = 1.077493 , whereas the overall HO initiation threshold is C T h r e s h o l d = C T h r e s h o l d , V i d e o + C T h r e s h o l d , I o T = 1.890338 . When the observed C j , s , i of a CH drops below the specified threshold, the drones of the corresponding cluster should perform an HO. Indicatively, Table 5 presents the HO initiation parameters of each C H of the low altitude clusters of the LTE-A Pro FD-MIMO 1 macrocell for a simulation time of 100 s.
It is noted that the MIP, Fast HO, FPMIPv6, and eFPMIPv6 schemes implement RSS-based HO initiation and network selection [47]. Figure 7 presents the average data rate indicator value (C) observed for each HO scheme and obtained via the HO initiation and network selection processes, namely the proposed one and the RSS-based one implemented by the aforementioned existing schemes. Clearly, the proposed GHO scheme achieves higher average data rate values in all cases.
The signaling cost for the proposed GHO scheme for each cluster of drones is estimated as follows:
S p r o p o s e d = P f 1 P f · H M N _ M A G · ( M 1 + M 11 + M 12 + M H A C K + c m s · ( M 2 + M U N A ) ) + H M A G _ M A G · ( m · ( M 7 + M 8 ) + M 9 + M 10 + M H I + M H A C K + M 13 + M 14 ) + H M A G _ M I I S · ( M 3 + M 4 ) + 2 · c m s · H M A G _ L M A · ( M P B U + M P B A )
where the P f parameter represents the connection failure probability, which in our work is supposed to be equal to 0.5 [37]. In addition, the c m s parameter indicates the number of the CMs, the H M N _ M A G is the number of hops between a drone (either a CH or a CM) and its current MAG, H M A G _ M A G is the number of hops between two MAGs of the simulated topology, H M A G _ M I I S is the number of hops between a MAG and the MIIS, and H M A G _ L M A is the corresponding number of hops between a MAG and the LMA/AAA. Furthermore, it is considered that H M N _ M A G = 1 , H M A G _ M A G = 1 , H M A G _ M I I S = 1 , and H M A G _ L M A = 1 , while the m parameter represents the number of the candidate MAGs. In addition, the signaling cost of the MIP scheme is calculated for each individual drone (this scheme does not perform clustering of drones) as follows:
S M I P = P f 1 P f · H M N _ M A G · ( M 3 + M 4 + M 5 + M 6 + M 15 + M 16 + M R S + M R A ) + H M A G _ M A G · ( m · ( M 7 + M 8 ) + M 9 + M 10 + M 13 + M 14 ) + H M A G _ M I I S · ( M 3 + M 4 ) + H M A G _ L M A · ( 3 · ( M P B U + M P B A ) + M 17 + M 18 )
Similarly, the signaling cost per drone of the Fast HO scheme is estimated as:
S F a s t H O = P f 1 P f · H M N _ M A G · ( M 1 + M 2 + M 11 + M 12 + M U N A ) + H M A G _ M A G · ( m · ( M 7 + M 8 ) + M 9 + M 10 + M H I + M H A C K + M 13 + M 14 ) + H M A G _ M I I S · ( M 3 + M 4 ) + 2 · H M A G _ L M A · ( M P B U + M P B A )
while the corresponding signaling cost of the FPMIPv6 scheme is estimated as:
S F P M I P v 6 = P f 1 P f · H M N _ M A G · ( M 1 + M 5 + M 6 + M 11 + M 12 + M R S + M R A ) + H M A G _ M A G · ( m · ( M 7 + M 8 + M 9 + M 10 + M 13 + M 14 + M H I + M H a c k ) + H M A G _ M I I S · ( M 3 + M 4 ) + 3 · H M A G _ L M A · ( M P B U + M P B A )
In addition, the signaling cost per drone of the eFPMIPv6 scheme is estimated as follows:
S e F P M I P v 6 = P f 1 P f · H M N _ M A G · ( M 1 + M 2 + M 5 + M 6 + M 11 + M 12 + M U N A ) + H M A G _ M A G · ( m · ( M 7 + M 8 ) + M 9 e + M 10 e + M 13 + M 14 ) + H M A G _ M I I S · ( M 3 + M 4 ) + 2 · H M A G _ L M A · ( M P B U + M P B A )
In general, the aforementioned schemes can achieve satisfactory signaling cost when they are applied for the manipulation of the increased mobility of individual drones in cases where the number of drones is low. However, as the number of drones increases, the proposed scheme achieves lower signaling cost since it exchanges fewer signaling messages than the other schemes. As the proposed scheme organizes the drones into clusters, the CH of each cluster exchanges some of the required signaling messages only one time on behalf of the entire drones of his cluster. More specifically, the first nine signaling messages of the proposed scheme, namely from the message 1 . M I H _ D a t a _ R a t e _ G o i n g _ D o w n and up to the message 9 . M I H _ N e t _ H O _ C o m m i t _ r e s p o n c e , are exchanged only one time, decreasing the overall signaling cost. On the other hand, the previously proposed schemes exchange similar signaling messages multiple times, namely one time for each individual drone, thus increasing the overall signaling cost.
As presented in Figure 8, the average signaling costs of the MIP, the Fast HO, the FPMIPv6, and the eFPMIPv6 schemes are equal to 357,680, 196,248, 265,478, and 261,188 Bytes, respectively. On the other hand, the proposed scheme achieves lower signaling cost which is equal to 18,700 Bytes, thus producing less signaling overhead during the mobility management process.

5. Testbed Deployment and Experimental Results

The proposed GHO scheme is also evaluated in real-world scenarios using a testbed that has been implemented in a controlled laboratory environment. Figure 9 presents the architecture of the implemented testbed which is based on the TP-Link Omada Cloud SDN platform [48]. Specifically, the network access environment consists of three TP-LINK EAP225 MU-MIMO outdoor PoAs [49]. In addition, a Huawei RH2288H V3 rack server [50] implements a Cloud infrastructure with a set of Virtual Machines (VMs) supporting video streaming services. In addition, in our testbed, the MAGs and the MIH FPMIPv6 entities of the PoAs, as well as the MIIS and the LMA/AAA entities of the SDN controller are also implemented as VMs on the aforementioned server. The PoAs and the VMs are connected to a TP-LINK T2600G-28TS Jetstream switch [51], while a TP-LINK OC200 cloud controller [52] along with the TP-Link Omada controller software [53] provide centralized control to the entire testbed architecture. Additionally, up to five Pixhawk Raspberry Pi drones [54] are initially connected to the LINK EAP225 MU-MIMO outdoor PoA 1, while each drone flies with constant velocity and streams live video to the corresponding VMs of the server. Table 6 presents the technical parameters of the implemented testbed.
To evaluate the proposed eCBRSDN scheme using the testbed, an experimental scenario was performed for 120 s. In this experiment, the eCBRSDN scheme is compared with the original CBRSDN [24] scheme in terms of the average number of CHs elected. It is noted that, similar to the simulation setup described in the previous section, the eCBRSDN scheme elects the CHs by assuming α = β = γ = δ = 0.25 , namely the Distance, RSS, Direction, and ETC parameters obtain equal importance with each other. One observes (in a similar basis to the simulation results presented in the previous section) that the CBRSDN algorithm tends to elect drones as CHs without considering factors such as the movement direction or the quality of the communication link. Thus, during the experiment, the CBRSDN algorithm elected eight different CHs on average per PoA while the proposed eCBRSDN scheme elected three on average (Figure 10), indicating less CH election overhead to the entire system. It is noted that both algorithms were executed using exactly the same mobility pattern for the entire drones.
Furthermore, similar to the previous section, the proposed scheme is evaluated and compared with the MIP, the Fast HO, the FPMIPv6, and the eFPMIPv6 schemes in terms of the average data rate indicator value (C) as well as in terms of the total signaling cost observed during the experiment performed using the testbed. According to Figure 11, the proposed scheme achieves higher values for the C indicator in all cases compared with the RSS-based methodology that is implemented by the aforementioned existing schemes.
Finally, Figure 12 indicates that the proposed scheme also outperforms the existing schemes in terms of the average cost of the signaling performed during our experiment. Specifically, the proposed scheme achieves lower signaling cost which is equal to 5445 Bytes, while at the same time the signaling costs of the MIP, the Fast HO, the FPMIPv6, and the eFPMIPv6 schemes are equal to 41,100, 25,050, 30,885, and 27,165 Bytes, respectively.

6. Conclusions

In this paper, a scheme for mitigating the connectivity issues in drone-aided networks has been presented. More specifically, an algorithm for efficiently creating clusters of drones has been proposed, along with a mechanism for electing a CH for each cluster. In addition, an algorithm for performing group HO has been described, including the HO initiation, the network selection, and the HO execution processes. The proposed scheme has been evaluated using simulations, where a next-generation drone-aided network architecture supporting IoT and multimedia services has been implemented. In addition, a testbed has been deployed in a controlled laboratory environment and provided results for a real-world experimental scenario. The access network environment of the simulated architecture consisted of IEEE 802.11p WAVE, LTE, and WiMAX PoAs. Both the simulation and experimental results showed that the proposed scheme outperforms existing methodologies in terms of the number of the required CHs, the average CH lifetime per drones’ velocity, and the cost of the signaling performed during the mobility management.
Future work includes the further evaluation and optimization of the CH election procedure for specific cases of network topologies, where the considered parameters (namely the Distance, RSS, Direction, and ETC) should obtain different relative importance with each other. Indicatively, in network topologies where the drones remain stationary or move with very low velocities, the importance of the Direction is decreased. In addition, future work wul include the enhancement of the proposed scheme using Machine Learning (ML) and Deep Learning (DL) techniques. In particular, DL can be used to add an artificially intelligent Mobility Management Entity (MME) to the network architecture. This MME could interact with the entire infrastructure by giving positive rewards to the corresponding network components (e.g., CHs, CMs, or PoAs), when the HOs are successful and negative rewards when HO failures occurred. Subsequently, the MME can adapt the overall HO policy based on the aforementioned interaction with the entire network architecture in order to optimize the HO procedure, increase the overall QoS, and also decrease the HO failures and ping-pong effect.

Author Contributions

Conceptualization, E.S., I.K., E.T.M., A.M. and D.D.V.; investigation, E.S., I.K. and E.T.M.; supervision, A.M. and D.D.V.; visualization, E.S.; writing—original draft, E.S. and I.K.; writing—review and editing, E.S., I.K., E.T.M., A.M. and D.D.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by the University of Piraeus Research Committee.

Data Availability Statement

Simulation data can be provided after contacting the corresponding author.

Acknowledgments

This work is partly supported by the University of Piraeus Research Committee.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wheeb, A.H.; Nordin, R.; Samah, A.; Alsharif, M.H.; Khan, M.A. Topology-based routing protocols and mobility models for flying ad hoc networks: A contemporary review and future research directions. Drones 2021, 6, 9. [Google Scholar] [CrossRef]
  2. Noor, F.; Khan, M.A.; Al-Zahrani, A.; Ullah, I.; Al-Dhlan, K.A. A review on communications perspective of flying ad-hoc networks: Key enabling wireless technologies, applications, challenges and open research topics. Drones 2020, 4, 65. [Google Scholar] [CrossRef]
  3. Ogbodo, E.U.; Abu-Mahfouz, A.M.; Kurien, A.M. A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security. Sensors 2022, 22, 6313. [Google Scholar] [CrossRef]
  4. Michailidis, E.T.; Vouyioukas, D. A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones. Drones 2022, 6, 41. [Google Scholar] [CrossRef]
  5. Colajanni, G.; Daniele, P.; Galluccio, L.; Grasso, C.; Schembra, G. Service Chain Placement Optimization in 5G FANET-Based Network Edge. IEEE Commun. Mag. 2022, 60, 60–65. [Google Scholar] [CrossRef]
  6. Skondras, E.; Zoumi, E.; Michalas, A.; Vergados, D.D. A network selection algorithm for supporting drone services in 5G network architectures. In Proceedings of the 2019 Wireless Telecommunications Symposium (WTS), New York, NY, USA, 9–12 April 2019; pp. 1–6. [Google Scholar]
  7. Nedelea, P.L.; Popa, T.O.; Manolescu, E.; Bouros, C.; Grigorasi, G.; Andritoi, D.; Pascale, C.; Andrei, A.; Cimpoesu, D.C. Telemedicine System Applicability Using Drones in Pandemic Emergency Medical Situations. Electronics 2022, 11, 2160. [Google Scholar] [CrossRef]
  8. Rajagopal, T.; Balakrishnan, A.; Valsalakumar, S.; Rajagopal, T.K.R.; Sundaram, S. Application of MSVPC-5G Multicast SDN Network Eminence Video Transmission in Drone Thermal Imaging for Solar Farm Monitoring. Energies 2021, 14, 8255. [Google Scholar] [CrossRef]
  9. Santa, J.; Fernández, P.J.; Ortiz, J.; Sanchez-Iborra, R.; Skarmeta, A.F. SURROGATES: Virtual OBUs to foster 5G vehicular services. Electronics 2019, 8, 117. [Google Scholar] [CrossRef] [Green Version]
  10. Gallego-Madrid, J.; Molina-Zarca, A.; Sanchez-Iborra, R.; Bernal-Bernabe, J.; Santa, J.; Ruiz, P.M.; Skarmeta-Gómez, A.F. Enhancing extensive and remote lora deployments through mec-powered drone gateways. Sensors 2020, 20, 4109. [Google Scholar] [CrossRef]
  11. Shea, C.; Hassanabadi, B.; Valaee, S. Mobility-based clustering in VANETs using affinity propagation. In Proceedings of the GLOBECOM 2009–2009 IEEE Global Telecommunications Conference, Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–6. [Google Scholar]
  12. Shi, L.; Jiang, Z.; Xu, S. Throughput-aware path planning for UAVs in D2D 5G networks. Ad Hoc Netw. 2021, 116, 102427. [Google Scholar] [CrossRef]
  13. Jotanovic, G.; Brtka, V.; Stojanov, J.; Stojanov, Z.; Jausevac, G.; Dobrilovic, D. Smart City IoT On-Demand Monitoring System Using a Drone Fleet. In International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures; Springer: Berlin/Heidelberg, Germany, 2022; pp. 105–121. [Google Scholar]
  14. 1609.3-2016; IEEE Standard for Wireless Access in Vehicular Environments (WAVE)–Networking Services. IEEE: Minneapolis, MN, USA, 2016.
  15. 1609.2.1/D10; IEEE Draft Wireless Access in Vehicular Environments (WAVE)–Certificate Management Interfaces for End-entities. IEEE: Minneapolis, MN, USA, 2020.
  16. TS 36.300 (V13.2.0); Evolved Universal Terrestrial Radio Access Network (E-UTRAN) (Rel.13). Technical Specification, 3GPP: Antipolis, France, 2016.
  17. TS 124.301 (V15.8.0); LTE, 5G, Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS) (Rel.15). Technical Specification, 3GPP: Antipolis, France, 2020.
  18. TS 123.501 (V15.8.0); System architecture for the 5G System (5GS) (Rel.15). Technical Specification, 3GPP: Antipolis, France, 2020.
  19. IEEE Std 802.16-2017; IEEE Standard for Air Interface for Broadband Wireless Access Systems. IEEE: Minneapolis, MN, USA, 2018.
  20. 802.16q-2015; IEEE Standard for Air Interface for Broadband Wireless Access Systems–Amendment 3 Multi-tier Networks. IEEE: Minneapolis, MN, USA, 2015.
  21. Ahizoune, A.; Hafid, A. A new stability based clustering algorithm (SBCA) for VANETs. In Proceedings of the 37th annual IEEE conference on local computer networks-workshops, Clearwater, FL, USA, 22–25 October 2012; pp. 843–847. [Google Scholar]
  22. Ren, M.; Zhang, J.; Khoukhi, L.; Labiod, H.; Vèque, V. A unified framework of clustering approach in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 19, 1401–1414. [Google Scholar] [CrossRef]
  23. Shayea, I.; Dushi, P.; Banafaa, M.; Rashid, R.A.; Ali, S.; Sarijari, M.A.; Daradkeh, Y.I.; Mohamad, H. Handover Management for Drones in Future Mobile Networks—A Survey. Sensors 2022, 22, 6424. [Google Scholar] [CrossRef]
  24. Qureshi, K.N.; Abdullah, A.H.; Bashir, F.; Iqbal, S.; Awan, K.M. Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks. Int. J. Commun. Syst. 2018, 31, e3533. [Google Scholar] [CrossRef]
  25. Aydin, Y.; Kurt, G.K.; Ozdemir, E.; Yanikomeroglu, H. Group handover for drone base stations. IEEE Internet Things J. 2021, 8, 13876–13887. [Google Scholar] [CrossRef]
  26. Chen, Y.; Lin, X.; Khan, T.; Mozaffari, M. Efficient drone mobility support using reinforcement learning. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Republic of Korea, 25–28 May 2020; pp. 1–6. [Google Scholar]
  27. Guidolin, F.; Pappalardo, I.; Zanella, A.; Zorzi, M. Context-aware handover policies in HetNets. IEEE Trans. Wirel. Commun. 2016, 15, 1895–1906. [Google Scholar] [CrossRef] [Green Version]
  28. Brahim, M.B.; Mir, Z.H.; Znaidi, W.; Filali, F.; Hamdi, N. QoS-Aware Video Transmission Over Hybrid Wireless Network for Connected Vehicles. IEEE Access 2017, 5, 8313–8323. [Google Scholar] [CrossRef]
  29. Zhang, L.; Ge, L.; Su, X.; Zeng, J. Fuzzy logic based vertical handover algorithm for trunking system. In Proceedings of the 2017 26th Wireless and Optical Communication Conference (WOCC), Newark, NJ, USA, 7–8 April 2017; pp. 1–5. [Google Scholar]
  30. Gupta, S.; Parne, B.L.; Chaudhari, N.S. ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network. Future Gener. Comput. Syst. 2021, 125, 168–187. [Google Scholar] [CrossRef]
  31. Zhang, D.; Ge, H.; Zhang, T.; Cui, Y.Y.; Liu, X.; Mao, G. New multi-hop clustering algorithm for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2018, 20, 1517–1530. [Google Scholar] [CrossRef]
  32. Saaty, T.L.; Vargas, L.G. The analytic network process. In Decision Making with the Analytic Network Process; Springer: Boston, MA, USA, 2013; pp. 1–40. [Google Scholar]
  33. Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process; RWS Publications: Pittsburgh, PA, USA, 1996. [Google Scholar]
  34. Kosmopoulos, I.; Skondras, E.; Michalas, A.; Vergados, D.D. An efficient mobility management scheme for 5G network architectures. In Proceedings of the 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Corfu, Greece, 25–27 September 2020; pp. 1–6. [Google Scholar]
  35. Vafaei, N.; Ribeiro, R.A. Camarinha-Matos Assessing Normalization Techniques for Simple Additive Weighting Method. Procedia Comput. Sci. J. 2022, 199, 1229–1236. [Google Scholar] [CrossRef]
  36. Network Simulator 3 (NS3). Available online: https://www.nsnam.org/ (accessed on 25 October 2022).
  37. Sharma, V.; Guan, J.; Kim, J.; Kwon, S.; You, I.; Palmieri, F.; Collotta, M. MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks. J. Netw. Comput. Appl. 2019, 125, 67–81. [Google Scholar] [CrossRef]
  38. Kosmopoulos, I.; Skondras, E.; Michalas, A.; Michailidis, E.T.; Vergados, D.D. Handover Management in 5G Vehicular Networks. Future Internet 2022, 14, 87. [Google Scholar] [CrossRef]
  39. Su, G.; You, P.; Yong, S. Comparative Handover Performance Analysis of MIPv6 and FMIPv6 in LEO Satellite Networks. In Proceedings of the 2017 International Conference on Network and Information Systems for Computers (ICNISC), Shanghai, China, 14–16 April 2017; pp. 30–36. [Google Scholar]
  40. Degefa, F.; Ryu, J.; Kim, H.; Won, D. MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks *. PLoS ONE 2022, 17, e0262696. [Google Scholar] [CrossRef]
  41. Wang, Y.; Wang, X.; Yi, B.; Huang, M. An efficient and reliable service customized routing mechanism based on deep learning in IPv6 network. IET Commun. 2022, 16, 2249–2264. [Google Scholar] [CrossRef]
  42. Zhang, L.; Tian, Y.C. An enhanced fast handover triggering mechanism for Fast Proxy Mobile IPv6. Wirel. Netw. 2018, 24, 513–522. [Google Scholar] [CrossRef] [Green Version]
  43. Hassan, M.M.; Tan, I.K.; Selvaretnam, B.; Poo, K.H. SINR-based conversion and prediction approach for handover performance evaluation of video communication in Proxy Mobile IPv6. Comput. Electr. Eng. 2019, 74, 164–183. [Google Scholar] [CrossRef]
  44. TS 123.501 (V15.2.0); System Architecture for the 5G System (Rel.15). Technical Specification, 3GPP: Antipolis, France, 2018.
  45. TS 123.203 (V12.6.0); LTE Policy and charging control architecture (Rel.12). Technical Specification, 3GPP: Antipolis, France, 2014.
  46. Sahu, R.; Chaurasia, K.K.; Gupta, A.K. SINR and rate coverage of broadcast networks using stochastic geometry. In Proceedings of the 2020 International Conference on Signal Processing and Communications (SPCOM), Bangalore, India, 19–24 July 2020; pp. 1–5. [Google Scholar]
  47. Yew, H.T.; Chekima, A.; Kiring, A.; Mbulwa, A.I.; Dargham, J.A.; Chung, S.K. RSS Based Vertical Handover Schemes in Heterogeneous Wireless Networks: Past, Present & Future. In Proceedings of the 2020 IEEE 2nd International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), Kota Kinabalu, Malaysia, 26–27 September 2020; pp. 1–5. [Google Scholar]
  48. TP-Link Omada Cloud SDN Platform. Available online: https://www.tp-link.com/us/omada-sdn/ (accessed on 29 November 2022).
  49. TP-LINK EAP225 Outdoor MU-MIMO Access Point. Available online: https://www.tp-link.com/gr/business-networking/outdoor-ap/eap225-outdoor/ (accessed on 29 November 2022).
  50. Huawei RH2288H V3 Rack Server. Available online: https://support.huawei.com/enterprise/en/intelligent-servers/rh2288h-v3-pid-9901881/ (accessed on 29 November 2022).
  51. TP-LINK T2600G-28TS Jetstream Switch. Available online: https://www.tp-link.com/gr/business-networking/managed-switch/t2600g-28ts/ (accessed on 29 November 2022).
  52. TP-LINK Omada OC200 Hardware Controller. Available online: https://www.tp-link.com/us/business-networking/omada-sdn-controller/oc200/ (accessed on 29 November 2022).
  53. TP-LINK Omada Software Controller. Available online: https://www.tp-link.com/us/support/download/omada-software-controller/ (accessed on 29 November 2022).
  54. Chitanvis, R.; Ravi, N.; Zantye, T.; El-Sharkawy, M. Collision avoidance and Drone surveillance using Thread protocol in V2V and V2I communications. In Proceedings of the 2019 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA, 15–19 July 2019; pp. 406–411. [Google Scholar]
Figure 1. The design of the proposed GHO scheme.
Figure 1. The design of the proposed GHO scheme.
Drones 06 00425 g001
Figure 2. The signaling performed by the proposed GHO scheme.
Figure 2. The signaling performed by the proposed GHO scheme.
Drones 06 00425 g002
Figure 3. The simulated topology used for the evaluation of the proposed GHO scheme.
Figure 3. The simulated topology used for the evaluation of the proposed GHO scheme.
Drones 06 00425 g003
Figure 4. The clusters created from the LTE-A Pro FD-MIMO 1 macrocell.
Figure 4. The clusters created from the LTE-A Pro FD-MIMO 1 macrocell.
Drones 06 00425 g004
Figure 5. The number of created CHs for each algorithm.
Figure 5. The number of created CHs for each algorithm.
Drones 06 00425 g005
Figure 6. The average lifetime of CHs regarding the average velocity of drones.
Figure 6. The average lifetime of CHs regarding the average velocity of drones.
Drones 06 00425 g006
Figure 7. The average data rate indicator value (C) observed for each HO scheme.
Figure 7. The average data rate indicator value (C) observed for each HO scheme.
Drones 06 00425 g007
Figure 8. The average signaling cost observed for each HO scheme.
Figure 8. The average signaling cost observed for each HO scheme.
Drones 06 00425 g008
Figure 9. The architecture of the implemented testbed.
Figure 9. The architecture of the implemented testbed.
Drones 06 00425 g009
Figure 10. The number of created CHs for each algorithm during the experiment performed using the testbed.
Figure 10. The number of created CHs for each algorithm during the experiment performed using the testbed.
Drones 06 00425 g010
Figure 11. The average data rate indicator value (C) observed for each HO scheme during the experiment performed using the testbed.
Figure 11. The average data rate indicator value (C) observed for each HO scheme during the experiment performed using the testbed.
Drones 06 00425 g011
Figure 12. The average signaling cost observed for each HO schemeduring the experiment performed using the testbed.
Figure 12. The average signaling cost observed for each HO schemeduring the experiment performed using the testbed.
Drones 06 00425 g012
Table 1. The nine-point importance scale used for the construction of the pairwise matrix.
Table 1. The nine-point importance scale used for the construction of the pairwise matrix.
Relative Importance ValueDefinition
1Equal Importance
3Moderate Importance
5Strong Importance
7Very Strong Importance
9Extreme Importance
2, 4, 6, 8Intermediate Values of Relative Importance
Table 2. The results for the cluster with id equal to m . 5 .
Table 2. The results for the cluster with id equal to m . 5 .
Drone IDDrone Coordinates (x,y,z)Distance [t]RSS [t]Direction [t]ETCCluster Head (CH)
d49(416,487,485)86.313 m−71 dB0.10.5No
d50(503,585,581)117.452 m−70 dB00.5No
d51(509,483,482)26.343 m−68 dB0.20.5Yes
Table 3. Simulation parameters.
Table 3. Simulation parameters.
AbbreviationValueDescription
Simulation time200 sThe duration of the simulation
C l u s t e r R P 0.11Target percentage of drones to each cluster
h m a c r o 1000 mHeight of macrocell coverage area
w m a c r o 1000 mRadius of macrocell coverage area
h r s u 200 mHeight of RSU coverage area
w r s u 200 mRadius of RSU coverage area
h f e m t o 100 mHeight of femtocell coverage area
w f e m t o 100 mRadius of femtocell coverage area
u10–40 m/sVelocity of drones
D t o t a l 300Total number of drones
D t o t a l , m a c r o 100Initial number of drones per macrocell
D t o t a l , r s u 15Initial number of drones per RSU
D t o t a l , f e m t o 10Initial number of drones per femtocell
P f 0.5 [37]Frame Error Rate
H M N _ M A G 1 hopDistance between drone (either CH or CM) and MAG
H M A G _ L M A 1 hopDistance between MAG and LMA/AAA
H M A G _ M I I S 1 hopDistance between MAG and MIIS
H M A G _ M A G 1 hopDistance between MAG and MAG
Table 4. Signaling costs.
Table 4. Signaling costs.
MessageCostAbbreviation
M I H _ L i n k _ G o i n g _ d o w n 78M1
M I H _ L i n k _ u p 95M2
M I H _ G e t _ I n f o r m a t i o n _ r e q u e s t 1500M3
M I H _ G e t _ I n f o r m a t i o n _ r e s p o n s e 1500M4
M I H _ N e t _ H O _ C a n d i d a t e _ Q u e r y _ r e q u e s t 63 + 118 n + 8 · m · n M5
M I H _ N e t _ H O _ C a n d i d a t e _ Q u e r y _ r e s p o n s e 77 + 101 · m M6
M I H _ N 2 N _ H O _ Q u e r y R e s o u r c e _ r e q u e s t 150 + 11 · m M7
M I H _ N 2 N _ H O _ Q u e r y R e s o u r c e _ r e s p o n s e 165M8
M I H _ N 2 N _ H O _ C o m m i t _ r e q u e s t 213M9
M I H _ N 2 N _ H O _ C o m m i t _ r e q u e s t ( E x t e n d e d ) 264M9e
M I H _ N 2 N _ H O _ C o m m i t _ r e s p o n s e 92M10
M I H _ N 2 N _ H O _ C o m m i t _ r e s p o n s e ( E x t e n d e d ) 92M10e
M I H _ N e t _ H O _ C o m m i t _ r e q u e s t 122M11
M I H _ N e t _ H O _ C o m m i t _ r e s p o n s e 103M12
M I H _ N 2 N _ H O _ C o m p l e t e _ r e q u e s t 109M13
M I H _ N 2 N _ H O _ C o m p l e t e _ r e s p o n s e 112M14
M I H _ M N _ H O _ C o m m i t _ r e q u e s t 75M15
M I H _ M N _ H O _ C o m m i t _ r e s p o n s e 78M16
AAA Query32M17
AAA Reply60M18
H a n d o v e r _ I n i t i a t e (HI)72 M H I
H a n d o v e r _ A c k (Hack)32 M H a c k
PBU76 M P B U
PBA52 M P B A
RS16 M R S
RA64 M R A
UNA52 M U N A
Table 5. The HO initiation parameters of each C H of the low altitude clusters of the LTE-A Pro FD-MIMO 1 macrocell at a simulation time of 100 s.
Table 5. The HO initiation parameters of each C H of the low altitude clusters of the LTE-A Pro FD-MIMO 1 macrocell at a simulation time of 100 s.
Cluster IDl.1l.2l.3l.4l.5l.6l.7l.8l.9
CHd2d5d9d13d16d20d25d28d31
SINRj,i (dB)5.34889.347810.95213.52919.16615.33314.37512.7776.9696
CVideo,j,i0.31925.31000.65037.96912.18161.7951.68850.76170.4167
CIoT,j,i0.42317.03890.86210.5632.89192.37942.23831.00970.5524
Csum,j,i0.742312.3491.512318.5325.07354.17453.92681.77150.9692
HO requiredyesnoyesnonononoyesyes
Table 6. The testbed parameters.
Table 6. The testbed parameters.
Points of Access (PoAs)
ModelUsed StandardChannelFrequencyDefault BandwidthMax TX Rate *TX Power
TP-LINK EAP245 PoA 1IEEE 802.11ac525260 MHz80 MHz866.7 Mbps25 dBm
TP-LINK EAP245 PoA 2IEEE 802.11ac645320 MHz80 MHz866.7 Mbps25 dBm
TP-LINK EAP245 PoA 3IEEE 802.11ac1005500 MHz80 MHz866.7 Mbps25 dBm
* Regarding the Default Bandwidth
Switch
ModelPorts
TP-LINK T2600G-28TS Jetstream24 Gigabit Ethernet ports and 4 Small Form-factor Pluggable (SFP) 4 Gbps ports
SDN Controller
ModelDescription
TP-LINK OC200Centralized Management of the Omada Cloud Platform, including the TP-LINK EAP PoAs
Services
ServiceSpecifications
Realtime Video Streaming4K video with 30 Frames per Second (FPS)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Skondras, E.; Kosmopoulos, I.; Michailidis, E.T.; Michalas, A.; Vergados, D.D. A Group Handover Scheme for Supporting Drone Services in IoT-Based 5G Network Architectures. Drones 2022, 6, 425. https://doi.org/10.3390/drones6120425

AMA Style

Skondras E, Kosmopoulos I, Michailidis ET, Michalas A, Vergados DD. A Group Handover Scheme for Supporting Drone Services in IoT-Based 5G Network Architectures. Drones. 2022; 6(12):425. https://doi.org/10.3390/drones6120425

Chicago/Turabian Style

Skondras, Emmanouil, Ioannis Kosmopoulos, Emmanouel T. Michailidis, Angelos Michalas, and Dimitrios D. Vergados. 2022. "A Group Handover Scheme for Supporting Drone Services in IoT-Based 5G Network Architectures" Drones 6, no. 12: 425. https://doi.org/10.3390/drones6120425

Article Metrics

Back to TopTop