Journal Pre-proof A UAV-assisted CH election framework for secure data collection in wireless sensor networks G. Wang, B. Lee, J. Ahn, G. Cho
PII: DOI: Reference:
S0167-739X(18)32505-6 https://doi.org/10.1016/j.future.2019.07.076 FUTURE 5129
To appear in:
Future Generation Computer Systems
Received date : 15 October 2018 Revised date : 4 June 2019 Accepted date : 31 July 2019 Please cite this article as: G. Wang, B. Lee, J. Ahn et al., A UAV-assisted CH election framework for secure data collection in wireless sensor networks, Future Generation Computer Systems (2019), doi: https://doi.org/10.1016/j.future.2019.07.076. This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
© 2019 Published by Elsevier B.V.
Journal Pre-proof
pro of
A UAV-assisted CH Election Framework for Secure Data Collection in Wireless Sensor Networks G. Wanga,∗, B. Leea , J. Ahna , G. Chob b 567
a 128 Gajeong-ro, Yuseong-gu, Daejeon 34129, Korea Baekje-daero, Deokjin-gu, Jeonju-si, Jeollabuk-do 54896, Korea
Abstract
With the advance of UAV-related technologies, UAV-assisted wireless communications such as UAV-assisted coverage extension, UAV-assisted relaying and
re-
UAV-assisted data distribution and collection are gathering a lot of interests from government and industry fields. More specifically, the UAV-assisted data distribution and collection is implemented as a UAV-based WSN (Wireless Sensor Network). In the UAV-based WSN, a CH (Cluster Head) plays a crucial
lP
role such as data collection from members, data transfer toward a UAV and data distribution from the UAV to its members. Due to the role of a CH, many attackers try to make their compromised nodes CHs. In the general CH election framework, since each node determines a CH role by itself, compromised nodes declare themselves as a CH regardless of their disqualification. Generally, a com-
urn a
promised CH consumes much more energy than a normal CH because it keeps fulfilling the CH role to deliver corrupted messages to the sink greedily. Inspired by this phenomenon, we propose a UAV-assisted CH election framework which collects residual energy of nodes, and employs them for electing new CHs and excluding the lowest energy nodes from CH candidates. Simulation results show that our framework outperforms the general CH election framework even when the number of compromised nodes is large. Concerning the CH election period,
Jo
our framework provides better security and performance than the general CH ∗ Corresponding
author Email addresses:
[email protected] (G. Wang),
[email protected] (B. Lee),
[email protected] (J. Ahn),
[email protected] (G. Cho)
Preprint submitted to Journal of LATEX Templates
June 4, 2019
Journal Pre-proof
election framework with a short CH election period. Besides, the variation of node compromise time had no impact on our framework’s superiority to the
pro of
general CH election framework. Another simulation results show that the increase of UAV tour frequency enhances both security and performance of our framework. Our CH election framework is easily applied to a network of IoT devices because the IoT network also demands clustering for energy and data management efficiency. Our future work item is applying as many other CH election schemes as possible to our framework and comparing their security and performance.
Keywords: Unmanned Aerial System, Wireless Sensor Network, Cluster Head
2010 MSC: 00-01, 99-00
1. Introduction
re-
Election, Unmanned Aerial Vehicle, Security
lP
Recently, UAS (Unmanned Aerial System) has drawn a lot of interests from the general public as well as government agency and UAV-related industry. A UAV (Unmanned Aerial Vehicle) with some mission devices, a GCS (Ground 5
Control Station) maneuvering the UAV, and a communication link connecting the UAV with the GCS constitute a UAS[1].
urn a
As UAS-related technologies advance greatly, UAV-assisted wireless communications such as UAV-assisted coverage extension, UAV-assisted relaying and UAV-assisted data collection and dissemination are emerging [2]. The UAV10
assisted data collection and dissemination is substantiated as a UAV-based wireless sensor network. In conventional wireless sensor networks, data of sensors are delivered from one sensor node to the other until they arrived at the sink. During the delivery process, nodes expend energy both for delivering their own
Jo
data and for relaying data from other sensor nodes. So, the delivery process
15
is an energy-intensive task to nodes, and the situation gets worse when node population grows up. In addition, when the sink disseminates some data to sensors, the energy-intensive task happens again in the opposite direction. If a
2
Journal Pre-proof
UAV was employed for the delivery process, it could speed up the data collection and dissemination and save the precious energy resource of nodes. Fig. 1 shows the data collection and dissemination process using a UAV. As depicted in Fig.
pro of
20
1, the UAV visits CHs of clusters 1 through 4 and collects data from the CHs which gathered the data from their members in advance. If any data sould be disseminated to members of cluster 5, the UAV visits the CH of cluster 5 and
lP
re-
disseminates the data to the members through the CH.
25
urn a
Figure 1: Data collection and dissemination in a UAV-based WSN
In the UAV-based WSN, grouping nodes into clusters and allowing only a cluster leader to communicate with the UAV is preferred for reducing energy consumption of nodes, and the cluster leader is called the CH (Cluster Head). Note that the process of grouping nodes into clusters is called the cluster formation. Contrarily, selecting a data collector or disseminator in a cluster is called the CH election. Any CH election can be performed in two ways; CH-
Jo
30
first election and cluster-first election. In the CH-first election, CHs are first determined, and clusters are formed later through membership confirmation between the CHs and their members. In the cluster-first election, nodes first
3
Journal Pre-proof
form clusters by exchanging messages with neighbors, and they select CHs of 35
the clusters later.
pro of
In a UAV-based WSN, a CH transfers collected data to a UAV and disseminates information from the UAV to its members as illustrated in Fig. 1. Due to this attractive role, attackers try to make a compromised node a CH. In the UAV-based WSN, if a compromised node becomes a CH, this node can forge 40
data delivered to a UAV. Even worse, if all CHs were occupied by compromised nodes, attackers would control the whole network through the compromised CHs [3].
Even though the LEACH (Low-Energy Adaptive Clustering Hierarchy) [4]
45
re-
was employed for a UAV-based WSN in [5], the UAV is not employed for protecting CH elections in the network. In the LEACH, since each node determines its CH role by itself, a compromised node can become a CH in spite of disqualification. Even worse, this malfunctioning self-election cannot be stopped by other nodes. If a UAV is employed for CH elections, the UAV can determine
50
lP
appropriate and inappropriate candidates of CHs by gathering remained energy of nodes. In addition, the UAV can distribute the selection result to all nodes of the network. Even if a compromised node elects itself as a CH, other nodes can negate the self-election thanks to the appropriate or the inappropri-
urn a
ate candidates of CHs which were broadcasted by the UAV. As a result, this UAV-enabled CH election shortens the work hour of any compromised CH. To 55
this end, we propose a UAV-assisted CH election framework in this paper, and apply the the framework into the well-known LEACH protocol. Then, we compare performance and security of our framework with those of the general CH election framework. Our paper’s organization is as follows. In Section 2, related work concerning UAV designs and applications, multi-UAV network, UAV-based WSN and flight route planning are reviewed. Section 3 describes the network and the threat model of our UAV-assisted CH election framework. In Section 4,
Jo
60
the UAV-assisted CH election procedure is described in detail. In Section 5, we compare the UAV-assisted CH election framework with the general CH election framework through various simulations. In Section 6, we deal with the issues of 4
Journal Pre-proof
65
extending a UAV’s flight time and applying our framework to an IoT netowrk.
pro of
We conclude this paper in Section 7.
2. Related Work
Recently, a lot of prospective UAV applications have been introduced. To support those applications, customized UAV designs and their prototypes also 70
have been rolled out. A fixed-wing UAV perching on walls [6] and a hybird UAV switching between hovering and curising [7] are two examples of them. Another intersting UAV-related work include UAV-navigation based on machine learning [8], UAV-based military cargo delivery [9], GPS spoofing detection based on
75
re-
UAV’s camera and IMU [10] and development of realistic UAV simulator [11]. As UAV-related technologies develop greatly, multi-UAV applications have been preferred by their users. This is because multi-UAV applications enhance service reliability and availability preventing a single point of failures
lP
[12]. Menouar et al. proposed three multi-UAV applications for intelligent transportation system [13]; traffic accident report, flying road side unit and fly80
ing ploice eye. In the traffic accident report, UAVs detect a trafic accident and quickly advertise it to the following vehicles. In the flying road side unit, UAVs detect an emergent situation on a road and advertise it to the following vehicles.
urn a
In the flying police eye, UAVs detect illegally running vehicles and provide their information to the police. 85
Generally, a multi-UAV application requires a network of UAVs which is called a FANET (Flying Ad Hoc Network). The FANET exposes a lot of challenges including secure and reliable routing, delay and disruption tolerance and energy consumption optimization [12]. Among the challenges, the secure and reliable routing is the most important issue because its malfunction disables the operation of FANET [14]. Some survey papers [14, 15] have investigated advan-
Jo
90
tages and weaknesses of existing FANET routing protocols systematically. Note that the above challegnes require modifications of the MAC (Medium Access Control) and the network layer at each UAV node.
5
Journal Pre-proof
Zeng et al. introduced three prominent applications of UAV-based wireless 95
communications [2]. In the first application, UAVs recover wireless commu-
pro of
nication of mobile phones when base stations are overloaded or unavailable. Mekikis et al. presented detailed examples of the UAV-based communication recovery and their performance benefits in [16, 17]. In the second application, UAVs indirectly connect any two distant users through their communication 100
relay. The last one is UAV-assisted data distribution and gathering where a UAV distributes (or gathers) data to (from) sensors deployed in a duty field. As shown in Fig. 1, clustering a network makes the data distribution and gathering efficient.
105
re-
Ho et al. presented a UAV’s fligth route selection scheme which optimizes energy consumption of nodes for a UAV-based WSN [18]. As an improved scheme, the PSO (Particle Swarm Optimization) scheme was proposed in [19]. The scheme tries to reduce the following three metrics; energy consumption of nodes, BER (Bit Error Rate) and UAV travel time. Then, the PSO scheme was
110
lP
compared with the LEACH-C [20] using the three metrics, and its superiority was proved through simulations.
An agent-based data collection scheme for a UAV-based WSN was proposed in [21]. In the scheme, a UAV dispatches a mobile agent to each cluster of the
urn a
network, and the mobile agent gathers data from all nodes in the cluster. After gathering all data from the cluster, the mobile agent goes back to the UAV 115
carrying the data, and the UAV reacts to the network using the gathered data. This process is repeated until all clusters are visited by the UAV. However, it is unclear whether this scheme is superior to the LEACH or the LEACH-C with regard to security and performance. Say et al. proposed a novel data collection framework for a UAV-based WSN in [5]. First, the UAV’s coverage area is divided into different frames in line with nodes’ location, and each frame has a different transmission priority. Next, a
Jo
120
lower contention window is assigned to a frame with a higher priority to reduce packet losses and collisions of nodes under the frame. A routing protocol which optimizes the energy consumption of nodes on the framework was also proposed 6
Journal Pre-proof
125
in [5]. Zhan et al. proposed a data collection scheme for UAV-enabled WSNs suf-
pro of
fering under fading channels [22]. The scheme jointly optimizes nodes’ wake-up schedule and UAV’s trajectory to minimize energy consumption and communication falures of nodes in the fading channels.
130
3. Network and Threat Model 3.1. Assumptions
Before describing network and threat model of UAV-assisted CH election framework, some assumptions are defined as follows in order to facilitate under-
135
re-
standing.
First, we employ a cluster formation scheme to create initial clusters having no CHs in them. We need initial clusters to save energy consumption for key establishments between a CH and its members whenever a new CH election is
lP
required. After initial clusters are formed, cluster membership of the clusters is fixed and CH roles are rotated among the members. Therefore, if pairwise 140
keys are established for all pairs of members in an initial cluster, the pairwise keys are still valid after a new CH is elected. We employ a connectivity-based cluster formation protocol where each node compares its connectivity with other
urn a
neighbors and declares itself as a CH when it has the highest connectivity among neighbors. 145
Second, some keys are pre-assigned from the sink to each node to enable the node to establish pairwise keys and a group key using the pre-assigned keys. The group key is employed for encrypted communication between a cluster and the UAV. Pairwise keys are employed for encrypted communications between a CH and its members along with encrypted communications between CHs and the UAV. If a node’s ID is known to other nodes, the IDs of pre-assigned keys
Jo
150
of the node are also known to them as in [23]. So, if any two members share
same pre-assigned keys, they establish a pairwise key using the common preassigned keys. Up to now, many key establishment schemes for WSNs have
7
Journal Pre-proof
been proposed, and some of them can be employed for the pairwise and group 155
key establishments.
pro of
Third, we assume that all nodes are trustworthy at network boot-up time. The trustworthiness are not corrupted during the initial cluster formation and the pairwise and group key establishments. Since the preliminary two steps occur only once and finish within a very short time, this assumption is reasonable. Fourth, the location of all sensor nodes are known to the sink and its UAV.
160
Fifth, the time of all nodes is synchronized, and the CH election step of all nodes starts at the same time as in the LEACH. We can achieve the synchronization by making the sink broadcast synchronization messages periodically
165
re-
[4].
Last, we assume that each node can measure its residual energy. However, it is difficult to measure a sensor’s residual energy [24]. Contrarily, we can easily know the amount of energy which is consumed for sensing, processing, and communication [25]. That is, we can roughly estimate the residual energy
170
3.2. Network Model
lP
of a sensor node by counting the number of the above energy-consuming actions.
Fig. 2 depicts the network operation of a UAV-based WSN. As shown in Fig. 2, The network operation is divided into three steps; initial cluster formation,
urn a
pairwise and group key establishments and UAV-assisted CH election. Zooming in the UAV-assisted CH election, its timeline consists of multiple rounds as 175
shown in Fig. 3. One CH election time and multiple data frames constitute a round. In one data frame, there are multiple slot time, one UAV tour time for data collection and broadcast of new CHs or blacklists. Here, a blacklist means a list of nodes whose residual energy is lowest in their cluster. We explain the reason why the lowest enegry nodes should be included in a blacklist for secure CH elections in Subsection 3.3. One slot time is assigned to each member
Jo
180
according to a TDMA schedule created by the CH. Before the UAV-assisted CH election begins, the sink calculates the UAV tour time for data collection and broadcast of new CHs or blacklists, and broadcasts the time to nodes. The 8
Journal Pre-proof
UAV tour time means the time interval during which the UAV collects data from 185
all CHs and advertises new CHs or blacklists by visiting the clusters according to
pro of
the UAV’s flight route. Because there are multiple frames in a round, the UAV broadcasts a new CH for each cluster at non-last frames to support the next frame’s data transmission. Contrarily, at the last frame, the UAV broadcasts a
lP
re-
blacklist for each cluster to support the next round’s CH election.
Figure 2: Network operation of a UAV-based WSN
190
3.3. Threat Model
urn a
The primaty goal of attackers is to transform as many compromised nodes as possible into CHs. Since we assumed that the LEACH is employed for CH elections, compromised nodes can elect themselves as CHs in spite of their disqualification. In our therat model, a compromised node keeps declaring itself 195
as a CH until it is removed from a new CH list or it is shown in the blacklist. We explain the reason why a compromised node should keep declaring itself as a CH in the following. First, since pairwise keys were established between a CH
Jo
and its members, a non-CH member cannot obtain data from other members. Second, if a compromised node wants to replace collected data of its cluster with
200
fabricated data and convince the sink to accept the fabricated data, it should be a CH. Because a CH and the UAV communicate with each other using a shared 9
lP
re-
pro of
Journal Pre-proof
urn a
Figure 3: Timeline of UAV-assisted CH election
pairwise key, a non-CH member cannot fabricate the collected data and deliver the fabricated data to the UAV. Therefore, if a compromised node intentionally avoids becoming a CH, it cannot achieve its instrinsic goal such as illegal 205
data collection and corruption in spite of its extended lifespan. Meanwhile, it is not desirable that multiple compromised nodes declare themselves as CHs in a cluster. This is because multiple CH declarations separate the cluster and
Jo
the separation reduces influence range of the compromised CHs. So, we make only one compromised node declare as a CH in a cluster by comparing the CH
210
winning frequency among the compromised nodes. By doing so, we can get two advantages. First, a cluster is not separated into multiple ones by preventing
10
Journal Pre-proof
multiple CH declarations. Second, the compromised non-CH nodes can save their precious energy to extend their lifespan.
215
pro of
After a compromised node becomes a CH, it fabricates all data collected from its members and delivers the fabricated data to an UAV. When a compromised node fails in becoming a CH, it still fabricates its own data and delivers it to the CH. Contrarily, a compromised node does not fabricate its residual energy reported to the UAV because the fabrication is easily detected by the UAV. At network boot-up time, initial energy of all nodes are equal, and residual 220
energy of nodes are reported to the sink and the UAV continuously. If a node is suspected to fabricate its residual energy, it will be removed from new CH
more.
re-
cadidates or even shown in the blacklist so that it cannot become a CH any
4. UAV-Assisted CH Election Procedure 4.1. Initial Cluster Formation
lP
225
At network boot-up time, each node exchanges its ID and neighbor list with its neighbors. After these exchanges, each node can detect other nodes sharing common pre-assigned keys within its two-hop range. After exchanging the ID and the neighbor list, each node performs the extended HCCP (Highest Connectivity Clustering Protocol) [26] to generate initial clusters. In the HCCP
urn a
230
[27], a member with the highest connectivity among neighbors declares itself as a CH and the receivers become the members of the CH. In the extended HCCP [26], a single cluster which consists of only one member joins into one of neighboring clusters because those single clusters deteriorates efficiency of 235
clustering. We employ the extended HCCP not only for removing single clusters but also for efficiency of key establishments between members. We deal with the
Jo
efficiency in Subsection 4.2. After the initial cluster formation, each CH registers itself into the sink so as to assign a unique spreading code to its cluster. The code assignment method is very simple. The first code on a predefined list is
11
Journal Pre-proof
240
assigned to the first CH which registers itself into the sink. The second code from the same list is assigned to the second CH registering into the sink.
pro of
After all CHs register themselves into the sink, both the sink and the UAV recognize the initial CHs as nodes with which the UAV will contact during any UAV tour time. Hereafter, we refer to the initial CHs as the contact nodes to 245
avoid confusion. The UAV produces an optimal flight route which visits all the contact nodes and returns to the sink’s position. However, producing a UAV’s optimal flight route is beyond the scope of this paper, and it is covered in [28, 29]. If new CHs are elected, they should be notified to the UAV through long distant communications between the CHs and the UAV. Otherwise, the UAV makes an extra visit to all clusters to know the newly elected CHs. Because this is a very
re-
250
time- and energy-consuming work, we never change the optimal flight route once it has been determined. In case of election of new CHs, the UAV first approaches a contact node in a cluster and advertises that it is ready to receive collected data from the CH using the shared key between the UAV and the cluster. A shared key between the UAV and a cluster is referred to as a gorup
lP
255
key, and details about the group key generation are explained in Subsection 4.2. Then, the newly elected CH delivers its collected data to the UAV using the shared pairiwse key between the UAV and the CH. Details about the pairwise
260
urn a
key generation between the UAV and a CH are also explained in Subsection 4.2. Next, the sink computes the UAV tour time during which the UAV collects data and broadcasts a new CH or a blacklist for all clusters. Note that the frequency of UAV tour is already known to nodes as a system parameter. After the registration of CHs, the sink notifies all nodes of the UAV tour time. The notified time enables all nodes to recognize the next data transmission time, the next UAV tour time and the next CH election time. 4.2. Pairwise and Group Key Establishments
Jo
265
Each CH establishes pairwise keys with all members using shared keys or
a proxy node. Here, the shared keys mean common pre-assigned keys shared between any two members. If any two members share no common pre-assigned 12
Journal Pre-proof
270
keys, they can find a proxy node which shares a common pre-assigned key(s) with each member exclusively. The proxy node can establish a pairwise key for
pro of
the two members using those exclusive pre-assigned keys. If there is no proxy between a CH and a member, the CH requests the sink to create a pairwise key and distribute it to them. This action requires a lot of energy consumption 275
because sometimes the sink is far away from a CH. So, the case in which there is no proxy node among a CH and any member should be minimized. Because, the extended HCCP minimizes the case as compared with other schemes under the same condition [26], we chose the extended HCCP as the initial cluster formation scheme. Then, each member in a cluster establishes pairwise keys with other members using common pre-assigned keys. If a member shares no pre-assigned
re-
280
keys with any other member, it requests its CH to distribute a common key for the two members. The CH creates a pairwise key and distributes it to the two members securely. Note that the CH role as a helper of key establishment is tentative, and it turns to the normal node again after the key establishment. Group keys are also established for communication between clusters and the
lP
285
UAV using common pre-assigned keys. In other words, all members in a cluster establish the group key with the UAV by employing all common pre-assigned keys among the members. The UAV also can easily generate the same group key
290
urn a
because it has all pre-assigned keys of nodes and knows which keys are assigned to any node. The group key is employed for the UAV to broadcast a new CH or a blacklist to all members of the cluster. 4.3. UAV-Assisted CH Election 4.3.1. CH Election
During a CH election time, each node elects itself as a CH based on its CH winning probability as in the LEACH. If a node’s CH winning probability is higher than a threshold, it becomes a CH by broadcasting a CH declaration
Jo
295
message. Note that the CH declaration message is propagated within only the cluster thanks to employment of different spreading codes. After election of a CH, the CH generates the pairwise key with the UAV using all pre-assigned 13
Journal Pre-proof
300
keys of the CH. The UAV can easily get the same key because it has all preassigned keys of nodes and knows which keys are pre-assigned to a specific
pro of
node. Before flight, the UAV can download all pre-assigned keys of nodes and the pseudo random number generator which generates a set of key numbers from the sink. Then, before the UAV communicates with a CH, the UAV picks 305
up the pre-assigned keys of the CH using the pseudo random number generator and generates the pairwise key using all pre-assigned keys of the CH. 4.3.2. Data Transmissions from Sensors to CH
Each CH creates a TDMA transmission schedule, and distributes the schedule to members of the cluster. Due to the TDMA schedule, transmission of each member is separated from that of other memebres, and each member can
re-
310
turn off its transceiver except its assigned time slot. Each member transmits its data and residual energy to its CH during its assigned time slot. Note that the transmission of the data and the residual energy is encrypted by a member,
315
lP
and it is decrypted by its CH using the shared pairwise key. Note that each CH delivers the gathered data and residual energy of members to the UAV. Gathering residual energy of members enables the UAV to select a maximum energy member as the CH which will serve during the next frame.
urn a
4.3.3. UAV’s Visit to All Clusters and the Sink Before visiting to all clusters, the UAV stores the latest residual energy of 320
nodes into its memory to check if a compromised node fabricates its residual energy. During each UAV tour time, the UAV visits each contact node and broadcasts a message advertising its readiness of data collection. When the CH delivers data and residual energy of all members to the UAV, the message is encrypted and decrypted using the pairwise key between the CH and the UAV. Then, the UAV selects the highest energy node as the new CH and broadcasts
Jo
325
the message containing the new CH’s ID which is encrypted with the cluster’s group key. All members of the cluster get the new CH’s ID after decrypting the message with the same group key. After visiting all CHs, the UAV hands over
14
Journal Pre-proof
the collected pairs of data and residual energy to the sink. 330
During the last UAV tour time at a given round, the UAV first selects the
pro of
lowest energy members in each cluster and encrypts their IDs with the cluster’s group key. Recall that a list of the lowest energy members has been called a blacklist in this paper. The UAV boradcasts the encrypted blacklist to all mambers in each cluster. Upon receiving the encrypted blacklist, each member 335
in a cluster recovers the plaintext blacklist by decrypting with the cluster’s group key. Each member removes the members on the blacklist from CH candidates for the next CH election.
re-
5. Simulations
We evaluated the security and performance of our framework using the well340
known ns-2 simulator. In the simulation environment, 100 nodes were randomly deployed in an area of 100 meters by 100 meters. The sink was laid in the
lP
location of (50 meters, 175 meters), and takeoff and landing location of the UAV was eqaul to the location of the sink. The energy consumption model of [4] was applied to these simulations. Two different clustering frameworks were 345
performed 20 times for each number of compromised nodes, and the results were averaged to get a representative value. Note that we changed the locations of
urn a
nodes for each simulation run to give the randomness to each simulation. In addition, compromised nodes and their compromise time were selected randomly for each simulation run. All simulation results have 95% confidence intervals. 350
We evaluated the impact of increasing the CH election period and the node compromise time on security and performance of two frameworks by executing additional simulations. Last, for the UAV-assisted CH election framework, we executed extra simulations to evaluate the impact of increasing the UAV tour
Jo
frequency on the security and the performance. Table 1 shows the simulation 355
parameters and their values. In this paper, our goal is creating a UAV-assisted CH election framework
which houses all CH election schemes and enables secure communications among
15
Journal Pre-proof
pro of
Table 1: Parameters for simulations
Parameter value
Simulation time
1800 sec.[3]
Initial energy of nodes
2 Joules[4]
Data bit rate
1 Mbps[4]
Data packet size
500 bytes[4]
Pakcet header size
25 bytes[4]
Number of compromised nodes
10∼50[3]
Compromise time of nodes
<180, <300, <450, <900
CH election period
20 sec., 30 sec., 40 sec., 50sec.
re-
Simulation parameter
Frequency of UAV tours per round
2, 3, 4, 5
Initial cluster formation protocol
Extended HCCP[26]
CH election protocol
Cluster-first LEACH LEACH[4]
Radio propagation model
Two ray ground model(sensor node, sink),
lP
Energy consumption model of nodes
Free space model(UAV)[30]
urn a
nodes. A cluster-first scheme which first generates clusters and later elects CHs suits well to the framework. However, a CH-first scheme like the LEACH which 360
first elects new CHs and generates membership of the new CHs cannot support the framework. That is, whenever any cluster membership changes, keys between the members should be also reestablished, and this key establishment overhead is quite burdensome to sensor nodes. For this reason, we modified the LEACH to make it operate as if it were a cluster-first protocol, and to support secure communication not only within a cluster but also between the
Jo
365
UAV and sensor nodes. However, the cluster-first LEACH still makes all nodes autonomously elect a CH in their cluster boundary. The general CH election framework employs the cluster-first LEACH as the CH election protocol. Next,
16
Journal Pre-proof
we implemented our UAV-assisted CH election framework which employs the 370
cluster-first LEACH as well. We employed the extended HCCP [26] as an ini-
pro of
tial cluster formation protocol because it succeeds in all key establishments for members without increasing energy consumption [26]. Our UAV-assisted CH election framework is compared with the general CH election framework in terms of security and performance. To evaluate the security and performance, 375
we introduce the following metrics.
• Number of corrupted messages: it means the number of corrupted messages which are received by the UAV during network operation.
re-
• CH winning frequency of compromised nodes: it means the frequency that a compromised node is elected as a CH. 380
• Energy consumption: it means the total amount of energy that a framework consumes per unit time.
lP
• Average node lifetime: it means the average lifespan of nodes, and it is represented as a ratio of node lifetime-to-network lifetime. 5.1. Security and Performance with Fixed CH Election Period and Latest Com385
promise Time
urn a
Fig. 4 through 7 show the security and performance of two frameworks (that is, the general CH election framework and the UAV-assisted CH election framework) as the number of compromised nodes increases. Note that the CH election period is set to 20 seconds and the latest compromise time of nodes is 390
set to 450 seconds in these simulations. Fig. 4 depicts the number of corrupted messages as the number of compromised nodes rises up. The increase in the number of compromised nodes
Jo
correspondingly increases the corrupted messages at the UAV. However, our scheme greatly reduces the increase rate as shown in Fig. 4.
395
Fig. 5 depicts how the increase of compromised nodes affects the CH win-
ning frequency of compromised nodes. As shown in Fig. 5, both frameworks 17
pro of
Journal Pre-proof
urn a
lP
re-
Figure 4: Number of corrupted messages vs. compromised nodes
Figure 5: CH winning frequency of compromised nodes vs. compromised nodes
make more compromised nodes CHs as the number of compromised nodes increases. However, our framework reduces the increase rate of compromised CHs as compared with the general CH election framework. Fig. 6 depicts the energy consumption of nodes as the number of compromised nodes increases. As shown in Fig. 6, the increase of compromised nodes
Jo
400
does not affect the energy consumption of nodes in both frameworks. Nevertheless, the UAV-assisted CH election framework causes less energy consumption
18
pro of
Journal Pre-proof
re-
Figure 6: Energy consumption vs. compromised nodes
than the general CH election framework. 405
Fig. 7 depicts the relative node lifetime as the number of compromised nodes rises up. Because both frameworks cause different network lifetime for
lP
each number of compromised nodes, direct comparison of their node lifetime is meaningless. To address this problem, the relative node lifetime is introduced as a ratio of node lifetime-to-network lifetime. In the general CH election 410
framework, compromised nodes elect themselves as CHs regardless of their qualification, and keep serving as CHs until they fail in becoming a new CH or they
urn a
are included in a blacklist. For this reason, the increase of compromised nodes slightly reduces the relative node lifetime. In the UAV-assisted CH election framework, even if a compromised node elects itself as a CH, the malicious be415
havior cannot be repeated in the next election. This is because the compromised node is prone to be excluded from a CH candidate in the next election by the UAV which gathers remained energy of members in the cluster and selects CH candidates using them. As a result, the UAV-assisted CH election framework
Jo
extends the node lifetime significantly as compared with the general CH election
420
framework as shown in Fig. 7.
19
pro of
Journal Pre-proof
re-
Figure 7: Node lifetime vs. compromised nodes
5.2. Security and Performance Under Variation of CH Election Period Fig. 8 through 11 show the security and performance of two frameworks as the CH election period increases. Note that the number of compromised
425
respectively.
lP
nodes and the latest compromise time of nodes are set to 30 and 180 seconds
Fig. 8 shows the number of corrupted messages as CH election period increases. As shown in Fig. 8, the UAV-assisted CH election framework gurantees
urn a
lower corrupted messages than the general CH election framework up to 30 seconds of CH election period. As the CH election period increases further, the 430
UAV-assisted CH election framework shows almost equal or worse security than the general CH election framework. Fig. 9 shows the CH winning frequency of compromised nodes as the CH election period increases. As shown in Fig. 9, the UAV-assisted CH election framework sharply cuts the the CH winnig frequency of compromised nodes when the CH election period is less than or equal to 30 seconds. However, the difference between two frameworks becomes very small when the CH election
Jo
435
period is longer than 30 seconds. This is because the UAV-assistd CH election framework enlarges energy consumption of nodes as the CH election period increases. Namely, energy consumption of non-CH nodes increases as the CH 20
pro of
Journal Pre-proof
urn a
lP
re-
Figure 8: Number of corrupted messages vs. CH election period
Figure 9: CH winning frequency of compromised nodes vs. CH election period
440
election period increases. This evens the energy consumption among nodes, and a compromised node gets an opportunity of being a CH more frequently. Fig. 10 shows the energy consumption of nodes as CH election period increases. As shown in Fig. 10, the general CH election framework makes the
Jo
energy consumption of nodes almost constant regardless of variation of CH
445
election period. The UAV-assisted CH election framework consumes more energy than the general CH election framework except the CH election period of
21
pro of
Journal Pre-proof
re-
Figure 10: Energy consumption of nodes vs. CH election period
20 seconds. In the general CH election framework, as the CH election period increases, the transmission frequency of members and CHs increases accordingly while the control overhead for CH reelection decreases. As a result, the energy consumption of nodes keep constant in the general CH election framework. How-
lP
450
ever, since the UAV-assisted CH election framework removes the long-distance transmissions of CHs, the increase of CH election period greatly impacts on growth of the transmission freqeuncy of members. That is the reason why the UAV-assisted CH election framework induces more energy consumption than the general CH election framework.
urn a
455
Fig. 11 shows the relative node lifetime as the CH election period increases. As shown in Fig. 11, both frameworks decrease the relative node lifetime when the CH election period increases. In all cases of CH election period, the UAVassisted CH election framework extends the relative lifetime of nodes greatly. 460
Considering the above simulation results with the variation of CH election
Jo
period, we can draw the following insight. The UAV-assisted CH election framework provides better security when the CH election period is equal to or less than 30 seconds. The general CH election framework consumes less energy than
465
the UAV-assisted CH election framework when the CH election period is higher 22
pro of
Journal Pre-proof
re-
Figure 11: Node lifetime vs. CH election period
than 20 seconds. However, the UAV-assisted CH election framework evens the energy consumption among nodes so that it makes the lifetime of nodes much
lP
longer than the general CH election framework.
5.3. Security and Performance Under Variaton of Node Compromise Time 470
Fig. 12 through 15 show the variation of security and performance of two frameworks as compromise time of nodes is delayed. Note that the CH election period and the number of compromised nodes are set to 20 seconds and 30 each.
urn a
Fig. 12 depicts the the number of corrupted messages as the compromise time of nodes is delayed. As the compromise of nodes slows down, the UAV475
assisted CH election framework shrinks the corrupted messages while the general CH election framework fluctuates the number of corrupted messages. The UAV-assisted CH election framework greatly reduces the number of corrupted messages as compared with the general CH election framework. Fig. 13 depicts the CH winning frquency of compromised nodes as the compromise time of nodes is delayed. Naturally, the CH winnig frequency of
Jo
480
compromised nodes decreases in both frameworks as the compromise of nodes slows down. The UAV-assisted CH election framework allows smaller compromised nodes to be a CH than the general CH election framework under the same
23
pro of
Journal Pre-proof
urn a
lP
re-
Figure 12: Number of corrupted messages vs. Compromise time of nodes
Figure 13: CH winning frquency of compromised nodes vs. Compromise time of nodes
condition. As shown in Fig. 13, the earlier nodes are compromised, the larger 485
benefit the UAV-assisted CH election framework induces. Fig. 14 depicts the energy consumption of nodes as the compromise time of nodes is delayed. Both frameworks maintain the energy consumption of nodes
Jo
evenly regardless of compromise time of nodes. However, the UAV-assisted CH election framework greatly reduces the energy consumption of nodes as
490
compared with the general CH election framework.
24
pro of
Journal Pre-proof
urn a
lP
re-
Figure 14: Energy consumption of nodes vs. Compromise time of nodes
Figure 15: Node lifetime vs. Compromise time of nodes
Fig. 15 depicts the relative node lifetime as the compromise time of nodes is delayed. As suggested in the result of Fig. 14, both frameworks maintain the node lifetime evenly regardless of compromise time of nodes. However, the UAV-assisted CH election framework extends the node lifetime greatly as compared with the general CH election framework.
Jo
495
Considering the above simulation results with the variation of compromise
time of nodes, we can draw the following insight. The UAV-assisted CH elec-
25
pro of
Journal Pre-proof
Figure 16: Number of corrupted messages vs. UAV tour frequency per round
re-
tion framework provides better security and performance than the general CH election framework regardless of compromise time of nodes. 500
5.4. Security and Performance Under Variation of UAV Tour Frequency Fig. 16 through 19 show the variation of security and performance of our
lP
framework as UAV tour frequency per round increases. Note that the CH election period and the latest compromise time of nodes are set to 20 seconds and 900 each. 505
Fig. 16 illustrates the number of corrupted messages as the UAV tour fre-
urn a
quency per round increases. The UAV-assisted CH election framework removes more compromised nodes from a CH candidate list as the UAV tour frequency rises up. This is because the UAV maintains the most recent data of residual energy and changes CH roles in line with the data. 510
Fig. 17 illustrates the CH winning frquency of compromised nodes as the UAV tour frequency per round rises up. The UAV-assisted CH election framework increases the CH winning frequency of compromised nodes with the increase of the UAV tour frequency. The increase of UAV tour frequency rotates
Jo
CH roles among nodes more frequently, and limits working hour of compromised
515
CHs. Since this extends the lifetime of compromised nodes significantly, their CH winning frequency also increases during the network lifetime.
26
pro of
Journal Pre-proof
lP
re-
Figure 17: CH winning frquency of compromised nodes vs. UAV tour frequency per round
Figure 18: Energy consumption of nodes vs. UAV tour frequency per round
urn a
Fig. 18 illustrates the energy consumption of nodes as the UAV tour frequency per round rises up. The UAV-assisted CH election framework reduces the energy consumption of nodes as the UAV tour frequency increases. The in520
crease of UAV tour frequency changes CH nodes more frequently so that energy consumption among nodes becomes even. The even distribution of energy consumption among nodes extends lifetime of nodes, and consequently the energy consumption of nodes decreases accordingly.
Jo
Fig. 19 illustrates the relative node lifetime as the UAV tour frequency per
525
round rises up. The UAV-assisted CH election framework extends the lifetime of nodes with the increase of UAV tour frequency. The increase of UAV tour frequency changes CH nodes more fequently and reduces the energy consump-
27
pro of
Journal Pre-proof
Figure 19: Node lifetime vs. UAV tour frequency per round
re-
tion of nodes as shown in Fig. 18. This saving of energy consumption at each node extends the node’s lifetime as shown in Fig. 19. 530
Considering the above simulation results with the variation of UAV tour frequency, we can draw the following insight. Even though the increase of UAV
lP
tour frequency raises the CH winning frequency of compromised nodes, their CH role duration time is too short to deliver corrupted messages enough, as shown in Fig. 16. In terms of performance, the increase of UAV tour frequency 535
evens the energy consumption of nodes and consequently extends the lifetime
urn a
of network.
6. Discussion
6.1. Extending the UAV’s Flight Time Generally, flight time of a UAV is shorter than 60 minutes because its bat540
tery power is limited, and a UAV consumes a lot of energy for its flight only. Therefore, it is very important that we make the UAV’s flight time as long as possible. The first solution is making an optimal flight route for a UAV so as
Jo
to save its precious energy resource. This approach is covered in [19, 28]. The second solution is making more than one UAV serve for a UAV-assisted WSN at
545
the same time. Since the service area is distributed to each UAV, its flight time and energy consumption are also reduced. Employment of multiple UAVs and 28
Journal Pre-proof
the impact of their mobility pattern on the performance are covered in [31]. The third solution is deploying some recharging stations in the network and making
550
pro of
them recharge UAVs on a request basis. Tseng et al. proposed a scheme which deploys recharging stations in a UAV-assisted WSN and makes an optimal flight route including the recharging stations [29]. Note that employing the recharging stations is also helpful when UAVs are struggling from bad weather conditions. 6.2. Applying the UAV-assisted CH election framework to an IoT network
Now, we examine applying the UAV-assisted CH election framework to an 555
IoT network. WSNs are considered as the technological predecessor and foundation for IoT networks [24]. Besides, dynamics, diversities of devices, and
re-
deployment scales of the IoT network are much higher than those of WSN. Neverthless, clustering techniques are also required in the IoT network to provide energy and data management efficiency in the IoT network [24]. In the same 560
context, the UAV-assisted CH election framework can be applied to an IoT
7. Conclusions
lP
network, and it brings many benefits to the IoT network.
In this paper, we proposed a UAV-assisted CH election framework for a
565
urn a
UAV-based WSN. Even though we applied the well-known LEACH protocol into our framework in this paper, almost all CH election protocols can be applied into our framework with some modifications. Simulation results show that the UAV-assisted CH election framework significantly lowers the number of corrupted messages and the CH winning frequency of compromised nodes. Besides, another simulation results show that the framework provides less energy con570
sumption and longer network lifetime than the general CH election framework.
Jo
Concerning the CH election period, the UAV-assisted CH election framework provides better security and performance than the general CH election framework with a short CH election period. Besides, the variation of node compromise time had no impact on our framework’s superiority to the general CH election
29
Journal Pre-proof
575
framework. Last, the increase of UAV tour frequency enhances both security and performance of our framework. Our future work item is to apply as many
pro of
existing CH election protocols as possible to our framework, and to reveal their security and performance.
Aknowledgement 580
This work was supported by Korea government (MSIT) 19ZR1110, (Development of Fundamental Technology for Hyper-Realistic Media Space).
re-
References
[1] D. C. Iannicca, J. A. Ishac, K. A. Shalkhauser, Control and non-payload communications (CNPC) prototype radio generation 2 security flight lab 585
test report, Tech. Rep. NASA/TM-2015-218821.
lP
[2] Y. Zeng, R. Zhang, T. J. Lim, Wireless communications with unmanned aerial vehicles: Opportunities and challenges, IEEE Communications Magazine 54(5) (2016) 36–42.
[3] G. Wang, G. Cho, Reputation-based cluster head elections in wireless sensor networks, SIMULATION: Transactions of The Society for Modeling
urn a
590
and Simulation International 89(7) (2013) 829–845. [4] W. Heinzelman, A. P. Chandrakasan, H. Balakrishnan, An applicationspecific protocol architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications 1(4) (2002) 660–670. 595
[5] S. Say, H. Inata, J. Liu, S. Shimamoto, Priority-based data gathering framework in UAV-assisted wireless sensor networks, IEEE Sensors Journal
Jo
16(14) (2016) 5785–5794.
[6] D. Mehanovic, J. Bass, T. Courteous, D. Rancounrt, A. L. Desbian, Autonomous thrust-assisted perching of a fixed-wing UAV on vertical surfaces,
30
Journal Pre-proof
600
Proc. 6th Int’l Conf. on Biomimetic and Biohybrid Systems, Living Machines 2017 (2017) 302–314.
pro of
[7] J. E. Low, L. T. S. Win, D. S. B. Shaiful, C. H. Tan, G. S. Soh, S. Foong, Design and dynamic analysis of a transformable hovering rotorcraft (THOR), Proc. 2017 IEEE Intl Conf. on Robotics and Automation (ICRA 17) (2017) 605
6389–6396.
[8] D. Ghandi, L. Pinto, A. Gupta, Learning to fly by crashing, CoRR abs/1704.05588.
[9] E. Ackerman, U. S. marines testing disposable delivery drones, IEEE
610
URL
re-
Spectrum.
http://spectrum.ieee.org/automaton/robotics/drones/
marines-testing-disposable-gliding-delivery-drones. [10] D. He, Y. Qiao, S. Chan, N. Guizani, Flgith security and safety of drones
(2018) 66–71. 615
lP
in airborne fog computing systems, IEEE Communications Magazine 56(5)
[11] S. Shan, D. Dey, C. Lovett, A. Kapoor, Airsim: High-fidelity visual and physical simulation for autonomous vehicles, CoRR abs/1705.05065.
urn a
[12] L. Gupta, R. Jain, G. Vaszcun, Survey of important issues in UAV communication networks, IEEE Communications Surveys and Tutorials 18(2) (2016) 1123–1152. 620
[13] H. Menouar, I. Cuvenc, K. Akkaya, A. S. Uluagac, A. Kadri, A. Tuncer, UAV-enabled intelligent transportation systems for the smart city: Applications and challenges, IEEE Communications Magazine 55(3) (2016)
Jo
22–28.
[14] O. S. Oubbati, A. Lakas, F. Zhou, M. Gunes, M. B. Yagoubi, A survey
625
on position-based routing protocols for flying ad hoc networks(FANETs), Vehicluar Communications 10 (2017) 29–56.
31
Journal Pre-proof
[15] J. Jaing, G. Han, Routing protocols for unmanned aerial vehicles, IEEE Communications Magazine 56(1) (2018) 58–63.
630
pro of
[16] P. Mekikis, A. Antonopoulos, E. Kartsakli, L. Alonso, C. Verikoukis, Communication recovery with emergency aerial networks, IEEE Transactions on Consumer Electronics 63(3) (2017) 291–299.
[17] P. Mekikis, E. Kartsakli, L. Alonso, C. Verikoukis, Flexible aerial relay nodes for communication recovery and D2D relaying, Proc. 5th IEEE Global Conference on Consumer Electronics(GCCE 2016) (2016) 1–2. 635
[18] D. Ho, E. I. Grotli, T. A. Johansen, Heuristic algorithm and cooperative
re-
relay for energy efficient data collection with a UAV and WSN, Proc. IEEE Intl Conf. on Computing, Management and Telecommunications (CommManTel 13) (2013) 346–351.
[19] D. Ho, E. I. Grotli, P. B. Sujit, T. A. Johansen, J. B. Sousa, Optimization of wireless sensor network and UAV data acquisition, Journal of Intelligent
lP
640
and Robotic Systems 78(1) (2015) 159–179. [20] S. Shi, X. Liu, X. Gu, An energy-efficiency optimized LEACH-C for wireless sensor networks, Proc. Int’l ICST Conf. on Communication and Networking
645
urn a
in China (CHINACOM 12) (2012) 487–492. [21] M. Dong, K. Ota, M. Lin, Z. Tang, S. Du, H. Zhu, UAV-assisted data gathering in wireless sensor networks, The Journal of Supercomputing 70(3) (2014) 1142–1155.
[22] C. Zhan, Y. Zeng, R. Zhang, Energy-efficient data collection in UAV enabled wireless sensor networks, IEEE Wireless Communication Letters 7(3) (2017) 328–331.
Jo
650
[23] S. Zhu, S. . Xu, S. Setia, S. Jajodia, Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach, Proc. 11th IEEE International Conference on Network Protocols.
32
Journal Pre-proof
[24] L. Xu, R. Collier, G. M. P. O’Hare, A survey of clustering techniques 655
in WSNs and consideration of the challenges of applying such to 5G IoT
pro of
scenarios, IEEE Internet of Things 4(5) (2017) 1229–1249. [25] O. Younis, S. Fahmy, HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Transactions on Mobile Computing 3(4) (2004) 366–379. 660
[26] G. Wang, G. Cho, Secure cluster head sensor elections using signal strength estimation and ordered transmissions, Sensors 9(6) (2009) 4709–4727.
[27] M. Gerla, J. T. Tsai, Multicluster, mobile, multimerdia radio network,
re-
Journal of Wireless Networks 1(3) (1995) 255–265.
[28] J. Xu, G. Solmaz, R. Rahmatizadeh, D. Turgut, L. B¨ol¨ oni, Animal moni665
toring with unmanned aerial vehicle-aided wireless sensor networks, Proc.
334–341.
lP
40th Annual IEEE Conf. on Local Computer Networks(LCN ’15) (2015)
[29] C. Tseng, C. Chau, K. Elbassioni, M. Khonji, Autonomous recharging and flight mission planning for battery-operated autonomous drones, CoRR 670
abs/1703.10049. Maxa,
G.
Roudierem,
urn a
[30] J.
N.
Larrieu,
Emulation-based
mance evaluation of routing protocols for UAANETs,
perfor-
Proc. In-
ternational Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2015 (2015) 227–240. 675
[31] M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Mobile unmanned aerial vehicles (UAVs) for energy-efficient internet of things communications, IEEE
Jo
Transactions of Wireless Communications 16(11) (2017) 7574–7589.
33
Journal Pre-proof
pro of
Gicheol Wang received the B.S. degree from Gwangju University, Gwangju, Korea, in 1997, and the M.S. degree from Mokpo Nat’l University, Mokpo, Korea, in 2000, in computer science and statistics. He received Ph. D degree in computer science and statistics from Chonbuk Nat’l University, Jeonju, Korea, in 2005. He worked for CAIIT(Center for Advanced Image and Information Technology) at Chonbuk Nat’l University, Jeonju, Korea, as a Postdoctoral Research Fellow from Jan. 2006 to Dec. 2007, for the Research Center for Ubiquitous Information Appliances at Chonnam Nat’l University, Gwangju, Korea, as a Postdoctoral Research Fellow from Jan. 2008 to Dec. 2008. From Jan. 2009 to Nov. 2013, he worked for KISTI(Korea Institute of Science and Technology Information), Daejeon, Korea. From Dec. 2013 to Jan. 2016, he worked for ADD(Agency for Defense Development). and he is currently serving as a principal research scientist. From Feb. 2016, he joined to Autonomous Unmanned Vehicle Research Div. at ETRI(Electronics and Telecommunications Research Institute) as a principal research scientist. His current research interests include UAS, sensor networks, FANET, security of wireless networks, and mobile computing. Byoung-Sun Lee
Jae Young Ahn
Jo
urn a
lP
re-
Gihwan Cho received the B.S. degree in Computer Science and Statistics from Chonnam University, Gwangju, Korea in 1985 and the M.S. degree in Computer Science and Statistics from Seoul National University, Seoul, Korea in 1987. He received Ph. D degree in Computer Science from Newcastle upon Tyne, England in 1996. He worked for ETRI(Electronics and Telecommunications Research Institute), Daejeon, S. Korea, as a senior member of technical stuff, and from Sep. 1997 to Feb. 1999, for the Dept. of Computer Science at Mokpo National University, Mokpo, S. Korea, as a full time lecturer. From Mar. 1999, he joined to the Division of Electronic & Information Engineering at Chonbuk National University, Chonju, S. Korea, as a professor. His current research interests include mobile computing, computer communication, security of wireless networks, sensor networks, and distributed computing system.
Journal Pre-proof
pro of
Gicheol Wang
re-
Byoung-Sun Lee
urn a
Jo
Gihwan Cho
lP
Jae Young Ahn
Journal Pre-proof Conflict of interests
Jo
urn a
lP
re-
pro of
None
Journal Pre-proof UAV-assisted CH election framework houses almost all CH election protocols UAV-assisted CH election outperforms the general CH election framework in terms of security enhancement and energy savings Increase of CH election period makes security and energy consumption of the UAV-assisted CH election framework worse than the general CH election framework Delay of node compromise time has no impact on the superiority of the UAVassisted CH election framework
Jo
urn a
lP
re-
pro of
Increase of UAV tour frequency enhances both the security and performance of UAV-assisted CH election