<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">20697</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2022.020697</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS</article-title>
<alt-title alt-title-type="left-running-head">Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS</alt-title>
<alt-title alt-title-type="right-running-head">Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western">
<surname>Khan</surname>
<given-names>Inam Ullah</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western">
<surname>Hassan</surname>
<given-names>Muhammad Abul</given-names>
</name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western">
<surname>Fayaz</surname>
<given-names>Muhammad</given-names>
</name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<contrib id="author-4" contrib-type="author" corresp="yes">
<name name-style="western">
<surname>Gwak</surname>
<given-names>Jeonghwan</given-names>
</name>
<xref ref-type="aff" rid="aff-4">4</xref>
<xref ref-type="aff" rid="aff-5">5</xref>
<xref ref-type="aff" rid="aff-6">6</xref>
<xref ref-type="aff" rid="aff-7">7</xref><email>jgwak@ut.ac.kr</email>
</contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western">
<surname>Aziz</surname>
<given-names>Muhammad Adnan</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Electronic Engineering, Isra University (SEAS)</institution>, <addr-line>Islamabad, 44000</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computing and Technology, Abasyn University Peshawar</institution>, <addr-line>25000</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-3"><label>3</label><institution>Deparment of Computer Engineering, Jeju National University</institution>, <addr-line>Jeju</addr-line>, <addr-line>Korea</addr-line></aff>
<aff id="aff-4"><label>4</label><institution>Department of Software, Korea National University of Transportation</institution>, <addr-line>Chungju, 27469, Korea</addr-line></aff>
<aff id="aff-5"><label>5</label><institution>Department of Biomedical Engineering, Korea National University of Transportation</institution>, <addr-line>Chungju, 27469, Korea</addr-line></aff>
<aff id="aff-6"><label>6</label><institution>Department of AI Robotics Engineering, Korea National University of Transportation</institution>, <addr-line>Chungju, 27469, Korea</addr-line></aff>
<aff id="aff-7"><label>7</label><institution>Department of IT &#x0026; Energy Convergence (BK21 FOUR), Korea National University of Transportation</institution>, <addr-line>Chungju, 27469</addr-line>, <country>Korea</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Jeonghwan Gwak. Email: <email>jgwak@ut.ac.kr</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-09-13"><day>13</day><month>9</month><year>2021</year></pub-date>
<volume>70</volume>
<issue>2</issue>
<fpage>3653</fpage>
<lpage>3666</lpage>
<history>
<date date-type="received"><day>04</day><month>6</month><year>2021</year>
</date>
<date date-type="accepted"><day>05</day><month>7</month><year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Khan et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Khan et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_20697.pdf"></self-uri>
<abstract>
<p>Most interesting area is the growing demand of flying-IoT mergers with smart cities. However, aerial vehicles, especially unmanned aerial vehicles (UAVs), have limited capabilities for maintaining node energy efficiency. In order to communicate effectively, IoT is a key element for smart cities. While improving network performance, routing protocols can be deployed in flying-IoT to improve latency, packet drop rate, packet delivery, power utilization, and average-end-to-end delay. Furthermore, in literature, proposed techniques are very much complex which cannot be easily implemented in real-world applications. This issue leads to the development of lightweight energy-efficient routing in flying-IoT networks. This paper addresses the energy conservation problem in flying-IoT. This paper presents a novel approach for the internet of flying vehicles using DSDV routing. ISH-DSDV gives the notion of bellman-ford algorithm consisting of routing updates, information broadcasting, and stale method. DSDV shows optimal results in comparison with other contemporary routing protocols. Nomadic mobility model is utilized in the scenario of flying networks to check the performance of routing protocols.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Flying-IoT</kwd>
<kwd>DSR</kwd>
<kwd>smart cities</kwd>
<kwd>UAV&#x2019;s</kwd>
<kwd>FANETS</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>A new paradigm of the Smart City model is correlated with quality of life, public security, emergency relief and other urban development resources [<xref ref-type="bibr" rid="ref-1">1</xref>]. Connectivity of aerial vehicles can only be made possible by using internet of things to reshape the concept of smart cities [<xref ref-type="bibr" rid="ref-2">2</xref>]. Due to aerial vehicles changing topological structure, measuring signal strength either indoor or open-air is a tough task. However, proposed model utilized decision tree to find out UAV&#x2019;s location and improve signal power [<xref ref-type="bibr" rid="ref-3">3</xref>]. Flying vehicles may be scheduled for effective transfer of items using intelligent transportation. UAVs move in three dimensions which can be useful in agriculture, transportation, &#x0026; military missions. As a result, the urgent demand for vehicle-aided computing in aerial vehicles for smart cities is introduced [<xref ref-type="bibr" rid="ref-4">4</xref>]. In general, <?A3B2 "fig1",5,"anchor"?><xref ref-type="fig" rid="fig-1">Fig. 1</xref> demonstrates the concept of smart cities integration with aerial vehicles.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Smart cities integration with flying-IoT network</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-1.png"/>
</fig>
<p>Aerial <italic>ad hoc</italic> networks require routing protocols for selecting optimal route selection. Enhance-AntHocNet routing technique is suggested to increase network lifetime. A novel parameter energy stabilizing threshold is incorporated in working of ant colony optimization to conserve UAV&#x2019;s energy [<xref ref-type="bibr" rid="ref-5">5</xref>]. Flying <italic>ad hoc</italic> network (FANET) has an advantage over other areas, due to its availability, easy and fast deployment in every situation. It also enables inter- and intra-UAV networking for collaboration and cooperation among the Internet of Flying Things (IoFT) [<xref ref-type="bibr" rid="ref-6">6</xref>]. Moreover, multi-point relay (MPR) technique can be utilized to tackle duplicate data transmission of packets illustrated in <?A3B2 "fig2",5,"anchor"?><xref ref-type="fig" rid="fig-2">Fig. 2</xref> Since UAVs operate in swarms and exchange data in offline mode, they can compile data without access to the internet. FANETs have enhanced IoFT with no Line of Sight (LoS) issues and data sharing from very far missions. UAVs are lightweight and can move in any direction at a speed of 30&#x2013;460 km/h. Due to changing network topology frequently during operation data routing from air-to-air and air-to-ground suffers. The ability to embed an effective routing protocol is a key component in the life of UAVs. Drones are categorized into two types: F-i-x-e-d- W-i-n-g (FW) and R-o-t-a-r-y-W-i-n-g (RW). Fixed-wing aerial vehicles are more capable for longer surveillance fight time with optimal aero-dynamic design and flight speed. In contrast, rotary-Wing can vertically take-off from any position and fly in much lower altitudes [<xref ref-type="bibr" rid="ref-7">7</xref>]. <?A3B2 "tbl1",5,"anchor"?><xref ref-type="table" rid="table-1">Tab. 1</xref> describes the main difference between Fixed-wing and Rotary-wing.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Multi-point relay</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-2.png"/>
</fig>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Fixed and rotary UAVs having metrics energy, static &#x0026; altitude</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Size of UAV&#x2019;s</th>
<th>Types</th>
<th>Energy</th>
<th>Mobility</th>
<th>Static</th>
<th>Altitude</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2">Large size UAV</td>
<td>FW</td>
<td>High</td>
<td>Low</td>
<td>No</td>
<td>High</td>
</tr>
<tr>
<td>RW</td>
<td>Low-M</td>
<td>M-H</td>
<td>Yes</td>
<td>M-H</td>
</tr>
<tr>
<td rowspan="2">Small size UAV</td>
<td>FW</td>
<td>M-H</td>
<td>M-H</td>
<td>No</td>
<td>L-M</td>
</tr>
<tr>
<td>RW</td>
<td>Low</td>
<td>Low</td>
<td>Yes</td>
<td>Low</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Intelligent UAVs are small in size and light-weighted with limited resources, such as band-width and storage. In the light of the above problems, the contributions of this article are as below.
<list list-type="bullet">
<list-item>
<p>Implementation of various routing protocols in the area of flying Ad-hoc networks.</p></list-item>
<list-item>
<p>Novel routing scheme ISH-DSDV is introduced in aerial networks.</p></list-item>
<list-item>
<p>Protocols are investigated using metrics which are jitter, throughput, channel/bandwidth utilization, packet drop rate, packet loss, packet delivery ratio.</p></list-item>
<list-item>
<p>Nomadic mobility model is used to enhance the capabilities of UAV&#x2019;s.</p></list-item>
</list></p>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>The diverse nature of IoT devices gives solutions to design smart cities. In smart cities, IoT has allowed various types of devices to communicate and share information using special protocols. It also offers services to citizens and government entities. IoT-based routing protocol is introduced to strengthen various connected gadgets. The best-fit approach reinforces to repair channel links while connecting with nodes. However, the alternative opportunistic routing, which eliminates unnecessary data packets while improving transmission end-to-end delay to boost-up performance [<xref ref-type="bibr" rid="ref-8">8</xref>]. UAVs and fifth-generation (5G) IoT networks were introduced for Smart Cities. Novel hierarchical multi-UAV architecture is proposed for collaboration and trajectory problem-solving. The UAV mission control pattern distribution and swarm behaviors which address to elect cluster head. Among aerial vehicles and base stations, the use of 5G technologies helps to prevent handover problems [<xref ref-type="bibr" rid="ref-9">9</xref>]. The loss of connection breakage is caused by low-power energy nodes. As a result, an attacker will easily breach the network; thus, a robust neural technique called back propagation learning algorithm is used to protect communication in IoT-based networks [<xref ref-type="bibr" rid="ref-10">10</xref>]. Although intelligent IoT introduces multi-tier computing, which integrates Cloud, Fog, and Edge approaches [<xref ref-type="bibr" rid="ref-11">11</xref>]. However, attackers can access a complex IoT network by increasing the length of transmitted packets in order to degrade resources. An intrusion detection system is programmed to filter data packets that cause disruption [<xref ref-type="bibr" rid="ref-12">12</xref>]. Decision-making is having a special role in between aerial vehicles and IoT devices while transferring data packets. In order to mitigate packet length and balancing node energy, the Markov decision mechanism formulates a threshold that allows UAVs to transfer energy. UAV-enabled wireless power transfer system shows the dependency of each node to solve cognitive processes [<xref ref-type="bibr" rid="ref-13">13</xref>]. At the same time, aerial vehicles take part in industrial internet of things (IIoT) applications for inter and intra communication to perform optimal multipath routing [<xref ref-type="bibr" rid="ref-14">14</xref>]. A hybrid algorithm is proposed which is based on Markov decision process and random serial dictatorship for wireless charging of IoT devices using unmanned aerial vehicles [<xref ref-type="bibr" rid="ref-15">15</xref>].</p>
<p>Scientists have observed a number of problems with flying vehicles, including congestion, delay, and unbalanced energy while receiving data packets. While delivering value-added internet of things services to maintain a trade-off between energy consumption and operating time, although providing a solution to delay and energy-aware UAV selection [<xref ref-type="bibr" rid="ref-16">16</xref>]. AntHocNet routing is the approach inspired from the behavior of ants which can be implemented with different mobility models in the area of flying networks. Using our proposed scheme, ISH-DSDV is a table-driven routing by targeting flying <italic>ad hoc</italic> networks. To control the problem of energy imbalance and conserve aerial vehicles network life-time ISH-DSDV routing is formulated.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed Scheme</title>
<p>The DSDV routing protocol is used in the dynamics of aerial networks in this section. In addition, each UAV receives routing packet information from flying networks, which causes topology changes or, in some cases, forwards data packets and terminates the process. Because of the deployment of DSDV, every aerial node must have all of neighbors&#x2019; information. To avoid congestion, this strategy uses a unique mechanism called sequence number allocation by target node, which optimizes phase shifts. Every flying-IoT node prefers high sequence number in comparison with low. This protocol updates information in the routing table, which includes three metrics: final destination, distance, and next node [<xref ref-type="bibr" rid="ref-17">17</xref>]. Formulated approach gives the best use of information during transferring from one node to another. Working in the area of flying networks, a stale data entry method is introduced, which allows for the easy removal of entries that are not updated. Whereas the <?A3B2 "fig3",5,"anchor"?><xref ref-type="fig" rid="fig-3">Fig. 3</xref>, elaborates the concept of improved sequencing heuristic based DSDV routing protocol for flying networks. The proposed algorithm consists of the following steps which are as under.
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Improved sequencing heuristic DSDV routing protocol</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-3.png"/>
</fig>
<list list-type="bullet">
<list-item>
<p>Incremental Updates</p></list-item>
</list></p>
<p>This parameter updates the overall routing table and broadcasts to all nodes in the network.
<list list-type="bullet">
<list-item>
<p>Full-Dumps</p></list-item>
</list></p>
<p>Offers the best loop-free routing method.
<list list-type="bullet">
<list-item>
<p>Stale-data process</p></list-item>
</list></p>
<p>The UAV will be automatically removed from the network if the flying node does not refresh the routing table information.</p>
<p>The ISH-DSDV is the optimum technique for the internet of flying vehicles because it is appropriate for a minimal number of nodes. This method, on the other hand, is ideal for dynamic pattern-based flying networks.</p>
</sec>
<sec id="s4">
<label>4</label>
<title>Mobility Model</title>
<p>Using the idea of nomadic mobility in this research, flying nodes move randomly at a specific point. Within the zone, aerial vehicles cover the maximum distance from the reference point. A random way point is employed while going from one region to another. This mobility pattern divides the flying-space to avoid collision [<xref ref-type="bibr" rid="ref-18">18</xref>]. <?A3B2 "fig4",5,"anchor"?><xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows the moment of thirty unmanned aerial vehicles using nomadic mobility model.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Network topology of UAV-network using nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-4.png"/>
</fig>
</sec>
<sec id="s5">
<label>5</label>
<title>Simulation Environment Setup</title>
<p>UAV&#x2019;s are placed in a diverse topological structure having network size of 1000 m &#x00D7; 1000 m. The flying network employs a nomadic mobility paradigm with thirty-one nodes, one of which is a land station. For comparison, we examined six routing protocols, and our proposed solution is based on DSDV routing.</p>
</sec>
<sec id="s6">
<label>6</label>
<title>Simulation Metrics</title>
<p>This section includes the parameters to evaluate the behavior of the network.</p>
<sec id="s6_1">
<label>6.1</label>
<title>Network Throughput</title>
<p>The rate of successful packets delivered over a communication medium to the final destination. Throughput is measured in kilobyte per second (Kbps), as shown in <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>. Internet of flying vehicles faces a lot of problems due to dynamic behavior. In terms of throughput estimation, moreover, AntHocNet and DSDV routing shows better results. AntHocNet, AOMDV, DSDV, DSR, M-DART and ZRP routing methods are used to evaluate network throughput in <?A3B2 "tbl2",5,"anchor"?><xref ref-type="table" rid="table-2">Tab. 2</xref> and <?A3B2 "fig5",5,"anchor"?><xref ref-type="fig" rid="fig-5">Fig. 5</xref>. While the graphical view of <xref ref-type="table" rid="table-2">Tab. 2</xref> is mentioned in <?A3B2 "fig6",5,"anchor"?><xref ref-type="fig" rid="fig-6">Fig. 6</xref>.</p>
<p><disp-formula id="eqn-1">
<label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mi>T</mml:mi><mml:mi>h</mml:mi><mml:mi>r</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>g</mml:mi><mml:mi>h</mml:mi><mml:mi>p</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mstyle displaystyle='true'><mml:mo>&#x2211;</mml:mo> <mml:mo>&#x00B0;</mml:mo></mml:mstyle><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>e</mml:mi><mml:mi>i</mml:mi><mml:mi>v</mml:mi><mml:mi>e</mml:mi><mml:mi>d</mml:mi><mml:mo>&#x00A0;</mml:mo><mml:mi>p</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>k</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>z</mml:mi><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>K</mml:mi><mml:mi>b</mml:mi><mml:mi>p</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Throughput analysis of nomadic mobility model (Kbps)</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>AntHocNet</th>
<th>AOMDV</th>
<th>DSDV</th>
<th>DSR</th>
<th>M-DART</th>
<th>ZRP</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum</td>
<td>40.15625</td>
<td>77.5625</td>
<td>24</td>
<td>60</td>
<td>24</td>
<td>60.96875</td>
</tr>
<tr>
<td>Maximum</td>
<td>509.8125</td>
<td>717.3125</td>
<td>742.25</td>
<td>712</td>
<td>489.0313</td>
<td>655.4375</td>
</tr>
<tr>
<td>Average</td>
<td>289.864986</td>
<td>434.7788</td>
<td>544.2037</td>
<td>423.4696</td>
<td>162.3531</td>
<td>496. 9663</td>
</tr>
<tr>
<td>Standard deviation</td>
<td>104.887032</td>
<td>177.3229</td>
<td>171.5673</td>
<td>207.6131</td>
<td>104.4426</td>
<td>100.2816</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Network throughput for nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-5.png"/>
</fig>
</sec>
<sec id="s6_2">
<label>6.2</label>
<title>Packet Drop Analysis</title>
<p>Number of data packets drops, it causes delays and has a negative effect on the performance of the service. High level of latency indicates a less reliable network which is not feasible for fast-changing topological networks. <?A3B2 "tbl3",5,"anchor"?><xref ref-type="table" rid="table-3">Tab. 3</xref> describe packet drop rate study of each routing protocol. Therefore the packet drop counts are presented in <?A3B2 "fig7",5,"anchor"?><xref ref-type="fig" rid="fig-7">Figs. 7</xref> &#x0026; <?A3B2 "fig8",5,"anchor"?><xref ref-type="fig" rid="fig-8">8</xref> which shows the abstract graphical view.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Throughput analysis of different protocols using nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-6.png"/>
</fig>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Packet drop rate for nomadic mobility model (Kbps)</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>AntHocNet</th>
<th>AOMDV</th>
<th>DSDV</th>
<th>DSR</th>
<th>M-DART</th>
<th>ZRP</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum</td>
<td>1</td>
<td>2</td>
<td>49</td>
<td>3</td>
<td>30</td>
<td>36</td>
</tr>
<tr>
<td>Maximum</td>
<td>1480</td>
<td>918</td>
<td>300</td>
<td>381</td>
<td>718</td>
<td>158</td>
</tr>
<tr>
<td>Average</td>
<td>135.444444</td>
<td>187.9444</td>
<td>171.5083</td>
<td>187.7459</td>
<td>2629779</td>
<td>96.30409</td>
</tr>
<tr>
<td>Standard deviation</td>
<td>239.250687</td>
<td>174.4598</td>
<td>46.81415</td>
<td>70.9609</td>
<td>75.31371</td>
<td>23.63145</td>
</tr>
<tr>
<td>Total</td>
<td>24380</td>
<td>33830</td>
<td>30946</td>
<td>33828</td>
<td>47428</td>
<td>16468</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Packet drop rate for nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-7.png"/>
</fig>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Packet drop count using six routing protocols</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-8.png"/>
</fig>
</sec>
<sec id="s6_3">
<label>6.3</label>
<title>Packet Delivery Ratio</title>
<p>Total packets delivered by every-node in per unit time. In this research study, the packet delivery ratio is derived from the following formula. DSDV provides optimal analysis in the area of internet of flying networks by enhancing packet delivery ratio. <?A3B2 "fig9",5,"anchor"?><xref ref-type="fig" rid="fig-9">Fig. 9</xref> shows three parameters: data packets sent and received data packets. <?A3B2 "tbl4",5,"anchor"?><xref ref-type="table" rid="table-4">Tab. 4</xref> depicts the routing approaches used to compare by applying PDR.</p>
<p><disp-formula id="eqn-2">
<label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mtext>Packet Delivery ratio&#xA0;</mml:mtext><mml:mo>=</mml:mo><mml:mn>100</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mfrac><mml:mtext>Packet Delivered</mml:mtext><mml:mtext>Total Number of Packets&#xA0;</mml:mtext></mml:mfrac></mml:math>
</disp-formula></p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Packet delivery ratio using nomadic mobility model for UAV-network</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-9.png"/>
</fig>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Packet delivery ratio (PDR)</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>Sent packets</th>
<th>Received packets</th>
<th>PDR (%)</th>
</tr>
</thead>
<tbody>
<tr>
<td>DSR</td>
<td>27775</td>
<td>17361</td>
<td>62.50585</td>
</tr>
<tr>
<td>AOMDV</td>
<td>25776</td>
<td>17111</td>
<td>66.38346</td>
</tr>
<tr>
<td>AntHocNet</td>
<td>17884</td>
<td>10890</td>
<td>60.89242</td>
</tr>
<tr>
<td>M-DART</td>
<td>15582</td>
<td>5337</td>
<td>34.25106</td>
</tr>
<tr>
<td>DSDV</td>
<td>26547</td>
<td>21965</td>
<td>82.74005</td>
</tr>
<tr>
<td>ZRP</td>
<td>26109</td>
<td>19888</td>
<td>76.17297</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6_4">
<label>6.4</label>
<title>Packet Loss</title>
<p>The parameter packet-loss is well explained in <?A3B2 "tbl5",5,"anchor"?><xref ref-type="table" rid="table-5">Tab. 5</xref> and <?A3B2 "fig10",5,"anchor"?><xref ref-type="fig" rid="fig-10">Fig. 10</xref> shows the same metrics in graphical form where different routing protocols are used. DSDV shows very less packet loss in comparison with other routing techniques. However <xref ref-type="table" rid="table-5">Tab. 5</xref> is having the brief study regarding packet loss using DSR, AOMDV, AntHocNet, M-DART, DSDV &#x0026; ZRP.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Packet loss</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>Sent packets</th>
<th>Received packets</th>
<th>Packet loss</th>
</tr>
</thead>
<tbody>
<tr>
<td>DSR</td>
<td>27775</td>
<td>17361</td>
<td>10414</td>
</tr>
<tr>
<td>AOMDV</td>
<td>25776</td>
<td>17111</td>
<td>8665</td>
</tr>
<tr>
<td>AntHocNet</td>
<td>17884</td>
<td>10890</td>
<td>6994</td>
</tr>
<tr>
<td>M-DART</td>
<td>15582</td>
<td>5337</td>
<td>10245</td>
</tr>
<tr>
<td>DSDV</td>
<td>26547</td>
<td>21965</td>
<td>4582</td>
</tr>
<tr>
<td>ZRP</td>
<td>26109</td>
<td>19888</td>
<td>6221</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Packet loss</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-10.png"/>
</fig>
</sec>
<sec id="s6_5">
<label>6.5</label>
<title>Bandwidth/Channel Utilization</title>
<p>The overall sum of the delivered data packets divided by per unit time in kilo bits per second use to calculate network utilization. Channel utilization with two different scenarios in flying-IoT networks are given in <?A3B2 "tbl6",5,"anchor"?><xref ref-type="table" rid="table-6">Tab. 6</xref>. The performance is properly checked and presented in <?A3B2 "fig11",5,"anchor"?><xref ref-type="fig" rid="fig-11">Fig. 11</xref>.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Network utilization for nomadic mobility model (Kbps)</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>AntHocNet</th>
<th>AOMDV</th>
<th>DSDV</th>
<th>DSR</th>
<th>M-DART</th>
<th>ZRP</th>
</tr>
</thead>
<tbody>
<tr>
<td>Minimum</td>
<td>893.5</td>
<td>1000.578</td>
<td>848.5938</td>
<td>1502.656</td>
<td>720</td>
<td>720</td>
</tr>
<tr>
<td>Maximum</td>
<td>8895.4375</td>
<td>3965.969</td>
<td>3623.031</td>
<td>5241.734</td>
<td>3956.547</td>
<td>1320</td>
</tr>
<tr>
<td>Average</td>
<td>8895.4375</td>
<td>3965.969</td>
<td>3623.031</td>
<td>5241.734</td>
<td>3956.547</td>
<td>1320</td>
</tr>
<tr>
<td>Standard Deviation</td>
<td>1154.10007</td>
<td>426.9384</td>
<td>408.6488</td>
<td>692.3719</td>
<td>500.1647</td>
<td>129.4262</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>Bandwidth/Channel utilization using nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-11.png"/>
</fig>
</sec>
<sec id="s6_6">
<label>6.6</label>
<title>Average End-to-End Delay</title>
<p>Network flow in NS-2(v2.35) may trace the cycle from initializing information packets until it reach by the target node. While doing simulation three routing techniques shows better results which include DSDV, M-DART and ZRP. <?A3B2 "fig12",5,"anchor"?><xref ref-type="fig" rid="fig-12">Fig. 12</xref> and <?A3B2 "tbl7",5,"anchor"?><xref ref-type="table" rid="table-7">Tab. 7</xref> illustrates DSDV routing is having very less delay factor in comparison with other protocols. <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> shows delay formula which are as under.</p>
<p><disp-formula id="eqn-3">
<label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:mtext>Average End-to-End Delay</mml:mtext><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mtext>Receive~Time</mml:mtext><mml:mrow><mml:mtext>avg</mml:mtext></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mtext>Send~Time</mml:mtext><mml:mrow><mml:mtext>avg</mml:mtext></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>Average-end-to-end delay using nomadic mobility model</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CMC_20697-fig-12.png"/>
</fig>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Average end-to-end-delay for nomadic mobility model</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Protocols</th>
<th>Average end-to-end-delay (ms)</th>
</tr>
</thead>
<tbody>
<tr>
<td>DSDV</td>
<td>1468</td>
</tr>
<tr>
<td>DSR</td>
<td>3908</td>
</tr>
<tr>
<td>AOMDV</td>
<td>7707</td>
</tr>
<tr>
<td>M-DART</td>
<td>1714</td>
</tr>
<tr>
<td>ZRP</td>
<td>2849</td>
</tr>
<tr>
<td>AntHocNet</td>
<td>10538</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion &#x0026; Future Directions</title>
<p>Flying-IoT with the integration of smart cities is the better approach to overcome on end-to-end delay. FANETs are the most reliable and easy to deploy in any situation, which has gained the interest of the scientific community and industrial stakeholders. Flying-IoT works mostly in three-dimensional environments to better support applications. The key problem that a flying-IoT network faces is to ensure that all limited resources can be used effectively. The main aim behind this research study is to address resource problems in terms of throughput, bandwidth, End-to-End delay, packet delivery ratio. In the area of flying-IoT networks, DSDV is lightly weighted for enhancing network lifetime. The nomadic mobility model has played an essential role in solving the problems associated with UAV networks.</p>
<p>In overall analysis, the proposed solution has performed well and utilized resources more efficiently. Simulation results showed that light-weighted-ISH-DSDV is a better choice to deploy into the dense network. In the future, for secure communication in smart cities, cyber-secure protocol will be a novel contribution.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant No. NRF-2020R1I1A3074141), the Brain Research Program through the NRF funded by the Ministry of Science, ICT and Future Planning (Grant No. NRF-2019M3C7A1020406), and &#x201C;Regional Innovation Strategy (RIS)&#x201D; through the NRF funded by the Ministry of Education.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. H.</given-names> <surname>Alsamhi</surname></string-name>, <string-name><given-names>O.</given-names> <surname>Ma</surname></string-name>, <string-name><given-names>M. S.</given-names> <surname>Ansari</surname></string-name> and <string-name><given-names>F. A.</given-names> <surname>Almalki</surname></string-name></person-group>, &#x201C;<article-title>Survey on collaborative smart drones and internet of things for improving smartness of smart cities</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>128125</fpage>&#x2013;<lpage>128152</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Awan</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>M. K. I.</given-names> <surname>Rahmani</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Tahir</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Alam</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Machine learning-enabled power scheduling in IoT-based smart cities</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>67</volume>, no. <issue>2</issue>, pp. <fpage>2449</fpage>&#x2013;<lpage>2462</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. U.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Alturki</surname></string-name>, <string-name><given-names>H. J.</given-names> <surname>Alyamani</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Ikram</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Aziz</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>RSSI controlled long range communication in secured IoT-Enabled unmanned aerial vehicles</article-title>,&#x201D; <source>Mobile Information Systems</source>, vol. <volume>2021</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Su</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Xu</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Vehicle assisted computing offloading for unmanned aerial vehicles in smart city</article-title>,&#x201D; <source>IEEE Transactions on Intelligent Transportation Systems</source>, vol. <volume>22</volume>, no. <issue>3</issue>, pp. <fpage>1932</fpage>&#x2013;<lpage>1944</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. U.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>I. M.</given-names> <surname>Qureshi</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Aziz</surname></string-name>, <string-name><given-names>T. A.</given-names> <surname>Cheema</surname></string-name> and <string-name><given-names>S. B. H.</given-names> <surname>Shah</surname></string-name></person-group>, &#x201C;<article-title>Smart IoT control-based nature inspired energy efficient routing protocol for flying ad hoc network (FANET)</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>56371</fpage>&#x2013;<lpage>56378</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. F.</given-names> <surname>Pigatto</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Rodrigues</surname></string-name>, <string-name><given-names>J. V. D. C.</given-names> <surname>Fontes</surname></string-name>, <string-name><given-names>A. S. R.</given-names> <surname>Pinto</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Smith</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>The internet of flying things</article-title>,&#x201D; <source>Internet of Things A to Z: Technologies and Applications</source>, vol. <volume>165</volume>, pp. <fpage>529</fpage>&#x2013;<lpage>562</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. G.</given-names> <surname>Perez</surname></string-name> and <string-name><given-names>M. D.</given-names> <surname>Cano</surname></string-name></person-group>, &#x201C;<article-title>Flying ad hoc networks: A new domain for network communications</article-title>,&#x201D; <source>Sensors</source>, vol. <volume>18</volume>, no. <issue>10</issue>, pp. <fpage>3571</fpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>AlZubi</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>Maitah</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Alarifi</surname></string-name></person-group>, &#x201C;<article-title>A best-fit routing algorithm for non-redundant communication in large-scale IoT based network</article-title>,&#x201D; <source>Computer Networks</source>, vol. <volume>152</volume>, no. <issue>7</issue>, pp. <fpage>106</fpage>&#x2013;<lpage>113</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Qi</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Mang</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kadoch</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>UAV network and IoT in the sky for future smart cities</article-title>,&#x201D; <source>IEEE Network</source>, vol. <volume>33</volume>, no. <issue>2</issue>, pp. <fpage>96</fpage>&#x2013;<lpage>101</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Qiu</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Atiquzzaman</surname></string-name></person-group>, &#x201C;<article-title>An intelligent robust networking mechanism for the Internet of Things</article-title>,&#x201D; <source>IEEE Communications Magazine</source>, vol. <volume>57</volume>, no. <issue>11</issue>, pp. <fpage>91</fpage>&#x2013;<lpage>95</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Yang</surname></string-name></person-group>, &#x201C;<article-title>Multi-tier computing networks for intelligent IoT</article-title>,&#x201D; <source>Nature Electronics</source>, vol. <volume>2</volume>, no. <issue>1</issue>, pp. <fpage>4</fpage>&#x2013;<lpage>5</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Abdollahi</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Fathi</surname></string-name></person-group>, &#x201C;<article-title>An intrusion detection system on ping of death attacks in IoT networks</article-title>,&#x201D; <source>Wireless Personal Communication</source>, vol. <volume>112</volume>, no. <issue>4</issue>, pp. <fpage>2057</fpage>&#x2013;<lpage>2070</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Lhazmir</surname></string-name>, <string-name><given-names>O. A.</given-names> <surname>Oualhaj</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kobbane</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Mokdad</surname></string-name></person-group>, &#x201C;<article-title>A decision-making analysis in UAV-enabled wireless power transfer for IoT networks</article-title>,&#x201D; <source>Simulation Modelling Practice and Theory</source>, vol. <volume>103</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. A.</given-names> <surname>Turjman</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Alturjman</surname></string-name></person-group>, &#x201C;<article-title>5G/IoT-enabled UAVs for multimedia delivery in industry-oriented applications</article-title>,&#x201D; <source>Multimedia Tools and Applications</source>, vol. <volume>79</volume>, no. <issue>13</issue>, pp. <fpage>8627</fpage>&#x2013;<lpage>8648</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Su</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Ye</surname></string-name>, <string-name><given-names>L. C.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Tian</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>UAV-assisted wireless charging for energy-constrained IoT devices using dynamic matching</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>7</volume>, no. <issue>6</issue>, pp. <fpage>4789</fpage>&#x2013;<lpage>4800</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. H.</given-names> <surname>Motlagh</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Bagaa</surname></string-name> and <string-name><given-names>T.</given-names> <surname>Taleb</surname></string-name></person-group>, &#x201C;<article-title>Energy and delay aware task assignment mechanism for UAV-based IoT platform</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>6</volume>, no. <issue>4</issue>, pp. <fpage>6523</fpage>&#x2013;<lpage>6536</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Nayyar</surname></string-name></person-group>, &#x201C;<article-title>Flying Adhoc Network (FANETs): Simulation based performance comparison of routing protocols</article-title>,&#x201D; in <conf-name>2018 Int. Conf. on Advances in Big Data, Computing and Data Communication Systems</conf-name>, <conf-loc>Durban, South Africa</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>9</lpage>, <year>2018</year>. </mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Bujari</surname></string-name>, <string-name><given-names>C. T.</given-names> <surname>Calafate</surname></string-name>, <string-name><given-names>J. C.</given-names> <surname>Cano</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Manzoni</surname></string-name>, <string-name><given-names>C. E.</given-names> <surname>Palazzi</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Flying ad-hoc network application scenarios and mobility models</article-title>,&#x201D; <source>International Journal of Distributed Sensor Networks</source>, vol. <volume>13</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>17</lpage>, <year>2017</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>
