ZTE Communications ›› 2021, Vol. 19 ›› Issue (1): 30-38.doi: 10.12142/ZTECOM.202101005
• Special Topic • Previous Articles Next Articles
LIN Xinhua, ZHANG Jing(), LI Qiang
Received:
2020-12-10
Online:
2021-03-25
Published:
2021-04-09
About author:
LIN Xinhua is a graduate student of Huazhong University of Science and Technology, China. His main research interests include UAV communications, blockchain technology and IoT networks.|ZHANG Jing (LIN Xinhua, ZHANG Jing, LI Qiang. Cluster Head Selection Algorithm for UAV Assisted Clustered IoT Network Utilizing Blockchain[J]. ZTE Communications, 2021, 19(1): 30-38.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
Table 1
Simulation parameters"
Parameter | Value |
---|---|
Network area | 100 m×100 m |
Number of UAVs | 5–30 |
Total number of IoT devices | 10–150 |
The number of IoT in a cluster | 4–20 |
UAV transmit power | 2–4 W |
UAV remaining energy | 400–900 kJ |
IoT transmit power | 0.5–1.5 W |
Computational capability of an IoT device | 0.1 GHz CPU cycles/bit |
Computational energy efficiency coefficient of the processors chip in an IoT device | |
Computation workload/intensity | 18 000 CPU cycles/bit |
Sizes of transaction | 256 bit |
Size of a packet transmitted by an IoT device | 4 000 bit |
Noise power, | -100 dBm |
Weighting factors, | 0.3, 0.2, 0.3, 0.2 |
1 |
BUTUN I, ÖSTERBERG P, SONG H B. Security of the Internet of Things: vulnerabilities, attacks, and countermeasures [J]. IEEE communications surveys & tutorials, 2020, 22(1): 616–644. DOI: 10.1109/COMST.2019.2953364
doi: 10.1109/COMST.2019.2953364 |
2 |
AGIWAL M, ROY A, SAXENA N. Next generation 5G wireless networks: a comprehensive survey [J]. IEEE communications surveys & tutorials, 2016, 18(3): 1617–1655. DOI: 10.1109/COMST.2016.2532458
doi: 10.1109/COMST.2016.2532458 |
3 |
XU L N, COLLIER R, O’HARE G M P. A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios [J]. IEEE Internet of Things journal, 2017, 4(5): 1229–1249. DOI: 10.1109/JIOT.2017.2726014
doi: 10.1109/JIOT.2017.2726014 |
4 |
BEHERA T M, MOHAPATRA S K, SAMAL U C, et al. Residual energy⁃based cluster⁃head selection in WSNs for IoT application [J]. IEEE Internet of Things journal, 2019, 6(3): 5132–5139. DOI: 10.1109/JIOT.2019.2897119
doi: 10.1109/JIOT.2019.2897119 |
5 |
ALI M S, VECCHIO M, PINCHEIRA M, et al. Applications of blockchains in the Internet of Things: a comprehensive survey [J]. IEEE communications surveys & tutorials, 2019, 21(2): 1676–1717. DOI: 10.1109/COMST.2018.2886932
doi: 10.1109/COMST.2018.2886932 |
6 |
HEINZELMAN W B, CHANDRAKASAN A P, BALAKRISHNAN H. An application⁃specific protocol architecture for wireless microsensor networks [J]. IEEE transactions on wireless communications, 2002, 1(4): 660–670. DOI: 10.1109/TWC.2002.804190
doi: 10.1109/TWC.2002.804190 |
7 |
YOUNIS O, FAHMY S. HEED: a hybrid, energy⁃efficient, distributed clustering approach for ad hoc sensor networks [J]. IEEE transactions on mobile computing, 2004, 3(4): 366–379. DOI: 10.1109/TMC.2004.41
doi: 10.1109/TMC.2004.41 |
8 |
AADIL F, KHAN M F, MAQSOOD M, et al. Energy aware cluster⁃based routing in flying ad⁃hoc networks [J]. Sensors, 2018, 18(5): 1413. DOI: 10.3390/s18051413
doi: 10.3390/s18051413 |
9 |
MOZAFFARI M, SAAD W, BENNIS M, et al. A tutorial on UAVs for wireless networks: applications, challenges, and open problems [J]. IEEE communications surveys & tutorials, 2019, 21(3): 2334–2360. DOI: 10.1109/COMST.2019.2902862
doi: 10.1109/COMST.2019.2902862 |
10 |
SUN Y, DONGFANG X, NG D W K, et al. Optimal 3D⁃trajectory design and resource allocation for solar⁃powered UAV communication systems [J]. IEEE transactions on communications, 2019, 67(6): 4281–4298. DOI: 10.1109/TCOMM.2019.2900630
doi: 10.1109/TCOMM.2019.2900630 |
11 | GUPTA L, JAIN R, VASZKUN G. Survey of important issues in UAV communication networks [EB/OL]. (2016⁃03⁃28)[2020⁃10⁃16]. |
12 |
MAO G, FIDAN B, ANDERSON B D O. Wireless sensor network localization techniques [J]. Computer networks, 2007, 51(10): 2529–2553. DOI: 10.1016/j.comnet.2006.11.018
doi: 10.1016/j.comnet.2006.11.018 |
13 |
FERNÁNDEZ⁃CARAMÉS T M, FRAGA⁃LAMAS P. A review on the use of blockchain for the Internet of Things [J]. IEEE access, 2018, 6: 32979–33001. DOI: 10.1109/ACCESS.2018.2842685
doi: 10.1109/ACCESS.2018.2842685 |
14 |
ARAFAT M Y, MOH S. Localization and clustering based on swarm intelligence in UAV networks for emergency communications [J]. IEEE Internet of Things journal, 2019, 6(5): 8958–8976. DOI: 10.1109/JIOT.2019.2925567
doi: 10.1109/JIOT.2019.2925567 |
15 | WU Q Q, MEI W D, ZHANG R. Safeguarding wireless network with UAVs: a physical layer security perspective [EB/OL]. (2019⁃07⁃24)[2020⁃10⁃16]. |
16 | ZENG Y, XU J, ZHANG R. Energy minimization for wireless communication with rotary⁃wing UAV [EB/OL]. (2018⁃04⁃06)[2020⁃10⁃16]. |
[1] | LI Xiuxian, LI Zhetao, OUYANG Yan, DUAN Haohua, XIANG Liyao. Using UAV to Detect Truth for Clean Data Collection in Sensor‑Cloud Systems [J]. ZTE Communications, 2021, 19(3): 30-45. |
[2] | HAN Suning, LI Xiuhua, SUN Chuan, WANG Xiaofei, LEUNG Victor C. M.. RecCac: Recommendation-Empowered Cooperative Edge Caching for Internet of Things [J]. ZTE Communications, 2021, 19(2): 2-10. |
[3] | TAN Jie, SHA Xiubin, DAI Bo, LU Ting. Analysis of Industrial Internet of Things and Digital Twins [J]. ZTE Communications, 2021, 19(2): 53-60. |
[4] | ZHAO Tian, LI Hui, YANG Xin, WANG Han, ZENG Ming, GUO Haisheng, WANG Dezheng. Differentially Authorized Deduplication System Based on Blockchain [J]. ZTE Communications, 2021, 19(2): 67-76. |
[5] | XING Kaixuan, LI Hui, YIN Feng, MA Huajun, HOU Hanxu, XU Huanle, HAN Yunghsiang S., LIU Ji, SUN Tao. Prototype of Multi-Identifier SystemBased on Voting Consensus [J]. ZTE Communications, 2020, 18(1): 7-17. |
[6] | Mohammed SEID, Stephen ANOKYE, SUN Guolin. Machine Learning Based Unmanned Aerial Vehicle Enabled Fog-Radio Aerial Vehicle Enabled Fog-Radio Access Network and Edge Computing [J]. ZTE Communications, 2019, 17(4): 33-45. |
[7] | Stephen ANOKYE, Mohammed SEID, SUN Guolin. A Survey on Machine Learning Based Proactive Caching [J]. ZTE Communications, 2019, 17(4): 46-55. |
[8] | ZHANG Shuang, ZHANG Ningbo, KANG Guixia. Energy Efficiency for NPUSCH in NB-IoT with Guard Band [J]. ZTE Communications, 2018, 16(4): 46-51. |
[9] | FU Shousai, ZHANG Hesheng, CHEN Jinghe. Time Sensitive Networking Technology Overview and Performance Analysis [J]. ZTE Communications, 2018, 16(4): 57-64. |
[10] | Amulya Karaadi, Is-Haka Mkwawa, Lingfen Sun. How to Manage Multimedia Traffic: Based on QoE or QoT? [J]. ZTE Communications, 2018, 16(3): 23-29. |
[11] | LI Tongxin, SHENG Min, LYU Ruiling, LIU Junyu, LI Jiandong. UAV Assisted Heterogeneous Wireless Networks: Potentials and Challenges [J]. ZTE Communications, 2018, 16(2): 3-8. |
[12] | TU Yaofeng, DONG Zhenjiang, YANG Hongzhang. Key Technologies and Application of Edge Computing [J]. ZTE Communications, 2017, 15(2): 26-34. |
[13] | LEI Ao, Chibueze Ogah, Philip Asuquo, Haitham Cruickshank, SUN Zhili. A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems [J]. ZTE Communications, 2016, 14(S0): 21-31. |
[14] | Mahyar Shirvanimoghaddam, Sarah J. Johnson. Multiple Access Technologies for Cellular M 2M Communications [J]. ZTE Communications, 2016, 14(4): 42-49. |
[15] | Kai-Di Chang, Jiann-Liang Chen, and Han-Chieh Chao. Prototype for Integrating Internet of Things and Emergency Service in an IP Multimedia Subsystem forWireless Body Area Networks [J]. ZTE Communications, 2014, 12(3): 30-37. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||