4.8 Article

An Efficient 3-D Positioning Approach to Minimize Required UAVs for IoT Network Coverage

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 1, Pages 558-571

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3084521

Keywords

Three-dimensional displays; Mathematical model; Internet of Things; Unmanned aerial vehicles; Quality of service; Wireless networks; Satellite broadcasting; Internet of Things (IoT); optimization; positioning; unmanned aerial vehicle (UAV)

Ask authors/readers for more resources

This article proposes an efficient method for determining the minimum number and optimal positions of UAVs in wireless networks. It uses an iterative algorithm to update the number of UAVs and solves a mathematical model to determine their positions. The proposed method outperforms existing approaches in terms of UAV quantity, user data rates, and simulation time.
Using unmanned aerial vehicles (UAVs) to cover users in wireless networks has increased in recent years. Deploying UAVs in appropriate positions is important to cover users and nodes properly. In this article, we propose an efficient approach to determine the minimum number of required UAVs and their optimal positions. To this end, we use an iterative algorithm that updates the number of required UAVs at each iteration. To determine the optimal position for the UAVs, we present a mathematical model and solve it accurately after linearizing. One of the inputs of the mathematical model is a set of candidate points for UAV deployments in 2-D space. The mathematical model selects a set of points among candidate points and determines the altitude of each UAV. To provide a suitable set of candidate points, we also propose a candidate point selection method: the MergeCells method. The simulation results show that the proposed approach performs better than the 3-D P-median approach introduced in the literature. We also compare different candidate point selection approaches, and we show that the MergeCells method outperforms other methods in terms of the number of UAVs, user data rates, and simulation time.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)

Masoud Abdan, Seyed Amin Hosseini Seno

Summary: This paper discusses wormhole attack and its classification using machine learning methods. The experimental results show that the decision tree method has the highest accuracy, while other methods also exhibit relatively high accuracies.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Theory & Methods

Adaptive cache content placement for software-defined Internet of Things

Samane Sharif, Mohammad Hossein Yaghmaee Moghaddam, Seyed Amin Hosseini Seno

Summary: In this paper, a sliding window-based adaptive cache placement framework is proposed for the ICN-IoT architecture. By utilizing an optimization model and a software-defined cache controller, the system is able to adapt to changes in data popularity over time, resulting in reduced total energy consumption and increased robustness.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach

Shirzad Shahryari, Farzad Tashtarian, Seyed-Amin Hosseini-Seno

Summary: Edge Cloud Computing (ECC) is a new approach to provide cloud computing services to mobile users, aiming to reduce latency and increase bandwidth. This study proposes a Cost-aware Virtual Machine (VM) placement and migration (CoPaM) framework that selects optimal Cloudlets using path prediction methods to optimize service efficiency and costs.

COMPUTER COMMUNICATIONS (2022)

Article Telecommunications

DMPFS: Delay-efficient multicasting based on parked vehicles, fog computing and SDN in vehicular networks

Ahmed Jawad Kadhim, Seyed Amin Hosseini Seno, Jaber Ibrahim Naser, Jawad Javad Hajipour

Summary: This paper presents a Delay efficient Multicasting approach depending on Parked vehicles, Fog Computing (FC) and Software Defined Network (SDN) for Vehicular Ad Hoc Networks (VANETs). The proposed approach considers bandwidth constraint, introduces a scheduling method based on application priority, and utilizes a partitioning technique to reduce overhead and time complexity. Simulation results demonstrate that the proposed approach outperforms other existing protocols in terms of packet delivery ratio, average end to end delay, and communication overhead.

VEHICULAR COMMUNICATIONS (2022)

Article Multidisciplinary Sciences

A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Mustafa Azeez Al Mayyahi, Seyed Amin Hosseini Seno

Summary: Cloud computing plays a prominent role in our day-to-day lives, offering robustness, cost-effectiveness, and pervasive nature. However, ensuring data security and privacy remains a challenge. This paper proposes a method that utilizes order-preserving symmetric encryption (OPES) to track malicious users and protect system security.

BAGHDAD SCIENCE JOURNAL (2022)

Article Engineering, Electrical & Electronic

Managing Sets of Flying Base Stations Using Energy Efficient 3D Trajectory Planning in Cellular Networks

Mohammad Javad Sobouti, Amir Hossein Mohajerzadeh, Seyed Amin Hosseini Seno, Halim Yanikomeroglu

Summary: In this article, a method for solving the multi-FBS 3D trajectory problem is proposed, taking into account FBS energy consumption, operation time, flight distance limits, and intercell interference constraints. The method is divided into two phases: FBS placement and FBS trajectory. The problem is broken into several snapshots, where the minimum number of FBSs and their positions are determined. The trajectory phase determines the optimal path for each FBS, considering energy consumption, flight distance, obstacles, and collision avoidance. The number of FBSs needed may vary between snapshots, and an FSM technique is presented to manage the FBS set and their power.

IEEE SENSORS JOURNAL (2023)

Article Computer Science, Information Systems

A Transfer Learning Approach for UAV Path Design With Connectivity Outage Constraint

Gianluca Fontanesi, Anding Zhu, Mahnaz Arvaneh, Hamed Ahmadi

Summary: In this article, a transfer learning approach is proposed to enhance the path learning of autonomous unmanned aerial vehicles (UAVs) in a new domain, using a teacher policy trained in an old domain. The approach is evaluated in different urban environment scenarios at sub-6 GHz and millimeter-wave (mmWave). Results show that this approach considerably reduces the training time at mmWave.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Detecting the software usage on a compromised system: A triage solution for digital forensics

Somayeh Soltani, Seyed Amin Hosseini Seno

Summary: One challenge in digital forensics is the large number of investigative cases. Researchers have proposed different triage methods to tackle this problem. In this paper, a software signature detection engine (SSDE) is introduced to identify the usage of software on the system being investigated. The experimental results show that some SSDE models have achieved high precision and recall rates.

FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION (2023)

Article Telecommunications

A comprehensive survey on using fog computing in vehicular networks

Kobra Behravan, Nazbanoo Farzaneh, Mohsen Jahanshahi, Seyed Amin Hosseini Seno

Summary: With the rise of fog computing, the use of real-time services at the network's edge has increased. However, the limited storage and computation capacity and energy consumption of smart vehicles make it difficult to run computationally-demanding applications. A suitable solution is to offload these applications to a centralized cloud, but this comes at the cost of wasted bandwidth and increased delay. As the number of smart vehicles is expected to grow, fog computing emerges as a new technology to meet unique requirements in vehicular ad-hoc networks.

VEHICULAR COMMUNICATIONS (2023)

Article Computer Science, Information Systems

VCG-Based Auction for Incentivized Energy Trading in Electric Vehicle Enabled Microgrids

Ifiok Anthony Umoren, Muhammad Zeeshan Shakir, Hamed Ahmadi

Summary: This article introduces an incentivized energy trading approach to study the interaction between electric vehicles (EVs) and critical loads (CL) in the context of vehicle-to-grid (V2G) concept. The approach considers EV mobility, battery degradation, and bidder satisfaction. It models EV-CL association as a single auction in the first phase to determine winning bids and payments, while EV discharging scheduling determines operating costs and discharging power in the second phase. Simulation results demonstrate comparable performance with reference schemes and guarantee bidder satisfaction. Theoretical analysis verifies the economic properties of truthfulness and individual rationality.

IEEE ACCESS (2023)

Review Computer Science, Information Systems

A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city

Mohammad Hosein Panahi Rizi, Seyed Amin Hosseini Seno

Summary: The development of smart cities has improved citizens' quality of life, but the violation of privacy and security is a critical challenge. Protecting citizens' privacy is necessary to gain their trust.

INTERNET OF THINGS (2022)

Article Computer Science, Information Systems

Robust Authentication and Session Key Agreement Protocol for Satellite Communications

Somayeh Soltani, Seyed Amin Hosseini Seno, Juli Rejito, Rahmat Budiarto

Summary: This paper discusses the importance of satellite networks and the vulnerabilities in existing protocols for satellite communications. It proposes a secure authentication and session key agreement protocol using elliptic curve cryptography (ECC), and demonstrates its security through validation tools and model checkers, as well as comparing it with similar methods.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

No Data Available