Next Article in Journal
An Error Prediction Model for Construction Bulk Measurements Using a Customized Low-Cost UAS-LIDAR System
Next Article in Special Issue
DEDG: Cluster-Based Delay and Energy-Aware Data Gathering in 3D-UWSN with Optimal Movement of Multi-AUV
Previous Article in Journal
Rotor Failure Compensation in a Biplane Quadrotor Based on Virtual Deflection
Previous Article in Special Issue
UAV Computing-Assisted Search and Rescue Mission Framework for Disaster and Harsh Environment Mitigation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0

1
Faculty of Engineering, IBB University, Ibb 70270, Yemen
2
Department of Operation of Road Transport and Car Service, North-Eastern Federal University, 677000 Yakutsk, Russia
3
Department of Transport and Technological Processes, Vladivostok State University of Economics and Service, 690014 Vladivostok, Russia
4
International Institute of Information Technology, Naya Raipur 493661, Chhattisgarh, India
5
School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia
6
Department of Electrical Engineering, University of Tabuk, Tabuk 71491, Saudi Arabia
7
Far Eastern Federal University (FEFU), 690922 Vladivostok, Russia
8
Faculty of Computer Science and Engineering, Hodeidah University, Al Hudaydah 207416, Yemen
9
School of Computer and Technology, University of Science and Technology of China, Hefei 230052, China
*
Author to whom correspondence should be addressed.
Drones 2022, 6(7), 177; https://doi.org/10.3390/drones6070177
Submission received: 30 May 2022 / Revised: 29 June 2022 / Accepted: 1 July 2022 / Published: 18 July 2022
(This article belongs to the Special Issue Drone Computing Enabling IoE)

Abstract

:
Unmanned Aerial Vehicles (UAVs) are increasingly being used in a high-computation paradigm enabled with smart applications in the Beyond Fifth Generation (B5G) wireless communication networks. These networks have an avenue for generating a considerable amount of heterogeneous data by the expanding number of Internet of Things (IoT) devices in smart environments. However, storing and processing massive data with limited computational capability and energy availability at local nodes in the IoT network has been a significant difficulty, mainly when deploying Artificial Intelligence (AI) techniques to extract discriminatory information from the massive amount of data for different tasks.Therefore, Mobile Edge Computing (MEC) has evolved as a promising computing paradigm leveraged with efficient technology to improve the quality of services of edge devices and network performance better than cloud computing networks, addressing challenging problems of latency and computation-intensive offloading in a UAV-assisted framework. This paper provides a comprehensive review of intelligent UAV computing technology to enable 6G networks over smart environments. We highlight the utility of UAV computing and the critical role of Federated Learning (FL) in meeting the challenges related to energy, security, task offloading, and latency of IoT data in smart environments. We present the reader with an insight into UAV computing, advantages, applications, and challenges that can provide helpful guidance for future research.

1. Introduction

Recently, with the rapid development of the Internet of Everything (IoE), a massive range of new applications and services, such as Augmented Reality (AR), Virtual Reality (VR), e-health, and face recognition have emerged and interacted with each other [1]. These applications begin to place greater demands on computing power, network throughput, and latency in order to provide a better Quality of Service (QoS) [2] and satisfy the Quality of Experience (QoE) [3]. The significant computing workload and storage requirements, on the other hand, place a strain on resource-constrained Internet of Things (IoT) devices. To solve this problem, Mobile Edge Computing (MEC) has been proposed as a paradigm that involves installing servers with rich services closer to IoT devices in smart environments, which can significantly enhance QoS, improve QoE, and minimize energy consumption [4,5]. However, the MEC comprises of infrastructure at fixed locations, preventing it to move closer to IoT devices in places with no communication coverage (e.g., harsh environments) or in particular instances when MEC deployment is difficult.
Aerial access networks are crucial enablers for future (e.g., B5G) wireless systems [6,7]. Aerial access networks comprise various platforms with a varying range of coverage, including low-altitude platforms, high-altitude platforms, and satellite communications. Furthermore, various characteristics of aerial access networks distinguish them, such as ubiquity, mobility, availability, simultaneity, and scalability [6]. These fundamentals will support the complete range of traditional terrestrial communications and enhance communication services and customer delight. Unmanned Aerial Vehicles (UAVs) are used as Access Points (APs) and radio towers at the low-altitude tier of supporting B5G aerial access networks, providing wireless and computing services to ground users from the air when the terrestrial communication network is unavailable [8]. UAVs can establish wireless networks as mobile Base Stations (BSs) in a short amount of time. In addition, UAVs can fly about to adjust their positions to provide Line-of-Sight (LoS) connectivity to the ground nodes, which can greatly enhance network performance compared with terrestrial communications. Furthermore, UAVs can be swiftly deployed to provide wireless communications in remote places with complicated conditions, such as disaster areas and emergency events [9,10], because of their flexibility and mobility. Moreover, UAVs with computer servers provide a new MEC paradigm. Therefore, UAVs have received much attention from the business world and researchers. However, critical technological hurdles in UAV computing, e.g., limited operating times, are yet to be overcome, and it is in the early stage.
A UAV equipped with an MEC can quickly respond to communication and processing demands. Recently, the MEC with UAV capability has received much interest. The UAV trajectory, the offloading task ratio, and the user scheduling variables were optimized together [11] to reduce the total of all users’ maximum delays. The authors of [12] investigated the weighted energy consumption reduction issue in a UAV-assisted MEC architecture, in which a UAV serves as a computational server or a relay for different offloading user workloads to the access point. In addition, the UAV’s processing bandwidth allocation, resources scheduling, and trajectory design were all optimized concurrently. The authors of [13] introduced the difficulties of computation rate maximization in a wirelessly powered UAV-enabled MEC system with partial and binary computation offloading. Figure 1 shows an MEC with UAV capability. The UAV receives data from the ground users, such as game data, facial recognition data, environmental monitoring data, AR and VR data, etc. After receiving data from ground users, the UAV begins processing and computing. Then, the UAV sends the computing results to the ground users, such as the identification results, environment analysis, stitching of video streams, and so on.
The authors of [14] investigated the challenge of minimizing computational energy consumption between IoT devices and UAV by concurrently optimizing task offloading decision making, resource allocation during transmission, and the UAV’s trajectory. The authors of [15] investigated the topic of minimizing overall mobile energy consumption in a UAV-based mobile cloud computing system. The cloudlet’s resource allocation and trajectory were optimized with orthogonal and nonorthogonal multiple access. The authors of [16] introduced the combined design of computing offloading and resource allocation and the UAV trajectory for minimizing energy consumption and task completion time in a UAV computing for the IoT. The energy reduction in UAV-enabled edge computing by making smart offloading decisions, distributing transmitted resources in downlink and uplink, and designing UAV path was presented in [17]. The authors of [18] discussed how to reduce the overall required energy of a UAV by optimizing the transmit power, offloading amount, and UAV path in a UAV-enabled wireless powered collaborative computing scenario. A novel UAV computing was discussed in [19], with a reduced weighted total of all IoT device service delays and UAV energy consumption by optimizing UAV communication, position, and computing resource allocation and task splitting choices at the same time [20,21,22]. The authors of [23] presented how to reduce UAV computing energy consumption in the binary offloading mode.
Machine Learning (ML) has demonstrated its power to provide intelligence to wireless networks, including IoT and UAV networks. However, traditional ML techniques are cloud-centric, requiring all data to be transmitted to a cloud data center and processed there, which may not be appropriate for UAV networks [24]. To begin with, the data created by each UAV may be unavailable owing to privacy risks since it may contain sensitive information (e.g., the identification and location of the UAV). Secondly, for real-time UAV applications, the delay encountered from providing raw data to obtaining a well-trained model may be unacceptable. Finally, sending large amounts of raw data such as images and videos to the cloud uses a lot of energy and bandwidth, which is inconvenient for UAV networks with limited power and bandwidth. As a result, it would be useful if ML model training could be performed directly inside the UAV networks without transferring data out to the cloud.
Recently, Federated Learning (FL), a decentralized ML approach [25,26], has been proposed to solve similar difficulties in which each participating user learns a model based on its local dataset. The local model modifications are then communicated to a parameter server so that a shared global model may be updated. Thus, the UAVs are fed the revised global model for the next round of local training. Local model changes are communicated back to the server in FL instead of the traditional case of sending back the training datasets to the cloud. As a result, training models may be shared while maintaining anonymity, and communication costs can be lowered. Because of these compelling benefits, researchers are increasingly focused on using FL in wireless communications [27,28,29,30,31]. FL was used in resource-constrained MEC [30], while it was also used in IoT applications [28]. Kang et al. [27] discussed a reputation-based worker selection approach for boosting FL’s performance, using advanced blockchain-assisted techniques for secure reputation management. It was also used to solve intercell interference and scheduling issues in wireless networks [31]. Furthermore, the performance could be achieved when the signal to interference plus noise ratio was high enough. In the Ultra-Reliable Low-Latency Communication (URLLC) of vehicle networks, Samarakoon et al. [29] introduced FL for solving a combined resource allocation and power issue, proving that vehicular users’ power consumption may be beneficially lowered.
The authors of [32] provided energy-efficient strategies for IoT devices regarding channel access schemes for computing offloading and resource management. However, UAV-assisted relaying was not taken into account. The authors of [33] studied ML and DL-based strategies in UAV-enabled MEC networks. However, the authors of [24] introduced Federated DL (FDL) for UAVs in wireless communication networks. Furthermore, the authors of [34] conducted a detailed assessment of computation offloading in UAV-enabled MEC, which was classified into partial, binary, and load relaying. Moreover, the authors of [35] discussed the data processing at the edge based on ML, which was a benefit and drawback in the context of UAVs. The authors of [36] introduced how edge AI will affect critical UAV technical applications and use. In comparison, the authors of [37] addressed where ML methods are applied to improve the network performance of UAVs. The authors of [38] discussed AI techniques related to enhancing Ground, Air, and Space (SAGIN) for remote areas. In Table 1, we provide a summary of related surveys.
Installing terrestrial systems (i.e., BSs and APs) and utilizing MEC to provide computing tasks to everything in temporary events [39], disaster relief operations, and military operations [40] will not be cost-effective. However, a UAV can collect data and perform computing activities for everything that does not have direct access to BSs [41] due to its flexibility and computation capability. Furthermore, UAV computing can act as a relay station for everything beyond the BS’s coverage area. Although UAV computing is a promising technology, it has several obstacles that must be overcome before being widely adopted. Firstly, a practical task offloading decision is necessary to decrease the energy consumption of smart things, UAVs, as well as latency. Secondly, because communication resources (i.e., bandwidth) are limited, an effective bandwidth allocation method at the UAV is required. Thirdly, efficient computing resource allocation techniques are required because the computing resources available in UAV computing are restricted. As a result, computing energy consumption at the UAV computing may grow due to the lack of appropriate allocation techniques, and offloaded device tasks may not be completed on time. We discuss various research related to UAV computing and their application and challenges. Therefore, the contribution of this paper is mainly focused on providing a comprehensive overview of the appropriate techniques that can be used to improve UAV computing performance in B5G networks for supporting services in smart and harsh environments. The contributions of this paper are summarized as follows:
  • We introduce UAV computing and review the existing work about UAV computing.
  • We discuss how FL plays a vital role in improving UAV computing for enabling B5G.
  • We identify and discuss the application of UAV computing.
The rest of the paper is organized as follows. Section 2 discusses the FL Paradigm which can facilitate the creation of a global learning model by multiple participants without sharing local data with each other. In Section 3, we discuss how UAV’s computing power can be used as a mobile edge computing infrastructure to support the data processing needs of resource-constrained IoT devices. In Section 4, we review literature on FL-assisted UAV edge computing, drawing special attention to the challenges that FL-empowered UAV computing faces. In Section 5, we analyze work on the collaboration of multi-UAV computing, highlighting various problems that must be addressed for the multi-UAV computing scenario. Geared with the fundamental knowledge provided by these sections, we review the application domains that can benefit from the use of UAV computing. Finally, we discuss challenges and opportunities of UAV computing in Section 7, followed by the conclusion.

2. Federated Learning

FL is a novel AI paradigm developed by Google in 2016 [26,42,43]. Multiple users work together to create a global learning model in FL, eliminating the requirement for data gathering and exchange with a central server. As a result, FL is a potential privacy-preserving solution that has applications in a variety of technical fields and issues, including healthcare [44], intelligent radio access networks [44], IoT intrusion detection [45], and industrial IoT [46]. On the other hand, the traditional FL technique necessitates the presence of a central server, such as an MEC at the network edge [42]. As a result, accomplishing FL activities may be challenging, especially if the terrestrial communication infrastructure is down.
The FL concept has been widely developed, implemented, and utilized in various domains [25]. With the rise of big data [47] and cloud computing, most large-scale research has used distributed learning [48]. FL entails creating an ML model with data located at numerous sources, without the need of sharing data. The issue of data privacy is thereby resolved. This has proven a viable answer to this problem since it maintains user privacy while exchanging information and expertise [49]. Smart behaviors, for example, are presently available on mobile devices. Image classification is used by mobile phones and tablets to anticipate the categorization of images that have been evaluated several times [50]. FL is built on improving user experience through data and information processing. Furthermore, some insurance businesses are concerned about their data security, which they refuse to share with third parties [51]. Multiparty data may be used in the FL framework in this scenario since it overcomes the ML privacy challenge. Recent FL research advances have focused on statistical difficulties [49] and security concerns [52,53,54]. Data interaction among scattered mobile users, imbalanced data distribution, and communication costs in equipment reliability are all elements in this process. It can motivate researchers to keep overcoming problems such as data privacy, computing restrictions, and communication costs. In addition, the FL idea has been expanded to encompass additional cross-organizational collaborative learning programs.
The FL approach allows ML and DL models to be trained collaboratively for edge network optimization, although the performance of a complex edge network consisting of diverse devices with varied restrictions might be affected, which creates a difficulty in this area. As a result, research is underway to develop new frameworks and methodologies for FL. The authors of [55] provided an overview of FL and its applications in many fields in edge networks. The study in [56] used the Stackelberg game to investigate the inefficiency in model update transfer. In addition, the authors in [57] designed a learning-based incentive system for FL using a Stackelberg game formulation and Deep Reinforcement Learning (DRL).
FL solves fundamental issues such as access rights, access to heterogeneous data, privacy, and security by allowing several nodes to create a cooperative learning model without sharing data samples [58]. Traffic prediction and monitoring [59], healthcare [60], communication, IoT [61], transportation and autonomous vehicles [62,63], pharmaceutics, and medical AI are just a few of the areas where this distributed learning technology is being used. Furthermore, because FL users such as IoT devices and small sensors may not have adequate power budgets to engage actively in the FL procedure, it is vital to provide sustainable and energy-efficient solutions to improve the performance of FL-enabled networks. For instance, in [64], an iterative approach for energy efficiency in FL is developed, with closed-form solutions obtained at each stage. Furthermore, in [65], developing technology in 6G wireless systems called Intelligent Reflecting Surface (IRS) is used to significantly lower FL users’ energy usage compared with those who do not utilize IRS.

3. UAV Computing

MEC is an excellent way to solve time-constrained computing problems in mobile IoT devices with limited resources. To reduce latency and backhaul network congestion, the goal is to deliver cloud computing closer to users. This allows processing to be offloaded from centralized data centers to the edge of IoT devices, lowering communication latency and energy consumption, as well as improving real-time decision making and control. Because the IoT system uses many end devices, a huge amount of data is offloaded to the edge devices; this necessitates the development of methods to manage and use the data for various reasons, including self-monitoring, automaintenance, and prediction. Many ML solutions for data processing at the edge are limited because of the significant differences in processing capacity and memory between edge computing and centralized cloud servers.
Mobile Edge Computing has lately been examined as an extension of the edge notion. MEC may provide information technology and cloud-computing capabilities to a mobile network, ensuring ultra-low latency and high bandwidth for users [66]. UAVs with communication capabilities, processing, and storage can act as flying MEC at the periphery of the IoT systems. In this scenario, either partially or completely, resource-constrained IoT devices may transfer their computational tasks to MEC-mounted UAVs through LoS communication. Nonetheless, task prediction, UAV deployment, user association, joint resource allocation, and signal processing are hurdles that the system must overcome. For example, UAV cameras acquire a lot of visual data, which the system should evaluate in real time to allow for excellent decision making. Sending data from UAVs to a cloud server would inevitably cause delays. In addition, the deployment of a significant number of IoT devices, such as UAVs, would limit bandwidth, dependability, and security. As a result, processing data at the network edge would result in faster response times, more efficient processing, and reduced network stress. Many strategies for next-generation IoT applications rely on MEC, which is widely recognized as a critical technology.
Due to the availability of on-demand communication services and deployment flexibility, UAVs with computing capabilities have grown in popularity. The authors of [11] introduced UAVs to reduce the total of all users’ maximum delays in each slot to the smallest possible value. The UAV’s offloading task ratio, trajectory, and user scheduling factors were optimized. Furthermore, due to the battery technology limitations of mobile devices and UAVs, energy-efficient strategies have received much attention. In [15], the authors investigated how to reduce mobile customers’ energy usage. The energy-efficient algorithms of UAVs, which have a substantial impact on the performance of the UAV-enabled MEC system, were not taken into account. The authors of [12] investigated minimizing the weighted aggregate energy consumption of the UAVs and users. The scheduling of computing resources, bandwidth allotment, and the UAV’s trajectory were optimized in the minimization problem. The authors in [67] also studied the IoT devices’ energy consumption minimization problem in a single UAV-assisted system with time-sensitive tasks. Interestingly, this study proposed the use of the UAV for both task computing and caching. The joint optimization considered the trajectory optimization, computing and communication resources allocated at the UAV, and task offloading decisions made at the IoT devices. UAV-assisted MECs for solving task offloading were discussed in detail by using different techniques [68,69,70,71,72,73,74].
In [75], a UAV-enabled wireless-powered MEC server was investigated to reduce the amount of energy required by the UAV. In a UAV-enabled wireless-powered MEC system, the weighted sum computation bits were maximized in the partial and binary offloading modes [13]. The UAV’s energy consumption restriction, on the other hand, was not taken into account in [12,13,75]. The duration of the flight is affected by the UAV’s energy consumption, which in turn affects the UAV-enabled MEC system performance. As a result, energy-efficient UAV-enabled MEC systems must be designed considering both the UAV’s and mobile devices’ energy usage.
UAVs have the features of high mobility and ease of deployment, allowing for the provision of on-demand communication services [76]. UAVs have recently gained interest in various applications, including delivery, agricultural, emergency response, and communication services [77]. A UAV computing with on-demand mobility may deliver computing services for mobile users better in some situations than fixed communication infrastructures. The advantages of a UAV computing are underlined in situations where fixed communication infrastructures cannot meet the computing requirements of ground users, such as sites far from communication facilities and places where natural catastrophes have damaged communication infrastructure. A UAV may fly to specific locations on demand to assist users with computational needs, such as monitoring equipment, to complete tasks. UAV computing can reduce the strain of computing in specific locations due to its on-demand mobility. UAVs can be equipped with lightweight CPUs to provide computing services. As a result, UAVs fly MEC servers in the sky, supplementing existing MEC servers on the ground with controlled mobility and high-quality communication connectivity.
UAVs can play various roles in offering edge computing services due to their mobility and ease of deployment. MEC designs with UAV capabilities can be categorized and assigned to a specific application situation. A UAV can function as an Edge Computing (EC) server, an IoT node, or a relay. Firstly, when UAVs transfer their computation to an MEC server, such as in [78,79], they may participate in the system as mobile devices. Secondly, the UAV can serve as the MEC for collecting task data of mobile end nodes to perform task computation. Thirdly, the UAV can be a relay or gateway between mobile end nodes and an MEC server, relaying task data of mobile nodes to the MEC server. A UAV-enabled MEC has been proposed in response to the disadvantages of terrestrial MEC networks [80,81], in which the edge server is installed on a UAV to allow computing offloading for users. Compared with standard terrestrial MEC networks, the UAV-enabled MEC network provided dependable LoS to users and was installed with variable mobility [82]. Furthermore, the terrestrial networks are damaged and destroyed during the disaster. Therefore, the terrestrial MEC network might be turned off (e.g., in [83]), and the UAV MEC will provide computing services to the users. Figure 2 demonstrates UAVs’ deployment to support terrestrial computing and enable UAV computing for everything in the disaster area. The collaboration of multi-UAV and Search and Rescue (SAR) teams in B5G plays a vital role in improving safety and reducing the economic impacts of disaster [84,85]. Interestingly, the authors in [86] studied a combination of roles of a single UAV in terms of edge computing functions and focused on reducing the computational complexity of a UAV-aided MEC system. In this work, the mobile users/devices have the option to compute their own tasks, offload some task bits to the UAV for computing, or the UAV can offload tasks on the devices’ behalf as a relay to the terrestrial AP for computing.
However, there are still some serious challenges with UAV computing. Firstly, placing the edge computing on a UAV increases the strain on the UAV and the amount of energy consumed by the propulsion system. Secondly, a UAV’s battery capacity is restricted, and a UAV’s service time is reduced. This is intensified by the transferring of users’ computing work to the UAV, which intensifies the UAV’s computation-related energy consumption. Furthermore, the relevance of selecting an energy-efficient UAV computing design while intending to extend the UAV’s service duration is highlighted because computation-related energy consumption is more significant than communication-related energy consumption. Finally, adding an extra edge server to a UAV raises the production cost of the UAV. As a result, there is still much interest in discovering new cost-effective and energy-efficient UAV computing solutions.
Figure 3a illustrates the importance of using UAVs as MEC servers on the board and flying to help everything, including users, sensors, robots, etc. The computing task is performed in a UAV with the help of intelligent techniques. Furthermore, the UAV serves as a central relay, as shown in Figure 3b. It is shown that the UAV is aiding the mobile users in offloading their computational responsibilities to a particular MEC server.
Despite the significant advantages provided by the design of UAV-enabled MECs in achieving low-latency and high-reliability services for IoT devices in smart environments, UAV computing faces several challenges. These challenges include intra-UAV communication, UAV security, air data security, data storage, and management. Because of the system’s mobility characteristics, which impede communication, coordination between UAVs and ground-based users requires significant improvement. The limited onboard battery capacity of UAVs is another critical restriction. As a result, developing practical resource and energy management systems are critical. Therefore, the multiple sources of variability in UAVs have prompted researchers to construct an incentive mechanism using a multidimensional contract theoretic approach [87]. The authors of [88] introduced the use of a matching problem to study the joint optimization of route planning and task assignment for UAVs from the energy efficiency perspective. Contract matching has been studied for resource allocation in vehicular fog computing in [89,90].
Due to memory capacity and energy consumption limitations, several parameters should be addressed before implementing any Artificial Intelligence (AI) approach to benefit from its resilience [91]. Even with limited computational capabilities, edge computing offers resources in a decentralized fashion, allowing for a speedier response to user requests than traditional cloud computing. Task scheduling, resource allocation, and offloading are just a few issues that significantly impact overall performance. Nonetheless, nonconvexity and complexity define the majority of the offered methods since they enable continuous learning in real-time inference and dynamic environments with minimal computing complexity. Over the last few decades, applying AI to networking problems has grown in popularity. Because of its capacity to interact with complicated surroundings and make judgments, ML has been widely applied in the networking area. A follow-me cloud controller collects information about the overall system status in most UAV-enabled MEC setups (i.e., MEC servers, UAVs, and users). This control unit is in charge of employing AI to manage offloading activities.
A cloudlet placed on a UAV for a UAV computing collaboration is shown in Figure 4. The UAV receives offloaded tasks from smart environments and returns the results after completing the task. Furthermore, if complicated processing needs exceed the capability of the onboard cloudlet, the UAV might send the acquired data to the nearest cloud center for other computing. The system might incorporate many UAVs that support deployed everything in smart environments, such as smartphones, sensors, people, cars, robots, etc.
For example, resource allocation in DRL does not require labeled training data. As a result, it may improve the making of offloading decisions depending on the channel environment’s various states. As a consequence, the energy bandwidth and calculations are reduced. By examining the instability of energy arrival, stochastic computation workloads offered by wireless users, and a time-varying channel state, a Markov Decision Process (MDP) approach was developed to minimize the latency, bandwidth, and energy consumption in UAV-assisted MEC [92].
Furthermore, the authors of [93] devised an optimization problem based on MDP to solve UAV path optimization in UAV-mounted MEC networks. The goal of the technique was to improve overall system QoS [11,94,95,96,97,97], optimize long-term system rewards, and fulfill the QoS constraint, which included mobile users’ computing duties. The use of Reinforcement Learning (RL) for QoS enhancement was studied in a multi-UAV MEC system to also achieve path planning and cost savings [98] with optimal locations [99,100]. The authors of [101] employed a semi-Markov process and DRL-based algorithms to handle the offloading choices and resource management rules of UAV-enabled MEC networks. A DL-based resource scheduling algorithm was proposed in [102] for hybrid MEC networks wherein the ground BSs, UAVs, and ground vehicles all have edge computing facilities to assist IoT devices with computing task offloading. In this work, the authors proposed an online algorithm for task offloading to minimize IoT devices’ energy consumption. This is achieved through an optimization of the positions of the UAVs, the ground vehicles, user association, and resource allocation. The authors in [103] applied the AI techniques of FL and Reinforcement Learning for intelligent task offloading and computing resource allocation decisions in a UAV-NOMA MEC system. The development of next-generation communications would be aided by UAV-assisted MEC-based DL and DRL [104].
Moreover, the Deep Supervised Learning (DSL) technique reduces mobile users’ computing and offloading overheads and costs in the MEC system [105]. This approach enables terrestrial users to achieve an appropriate offloading strategy that saves energy and improves processing performance. In UAV-enabled MEC networks, the authors of [106] employed RL and transfer learning algorithms to minimize latency and energy consumption. They demonstrated that combining transfer learning with RL may greatly improve system training performance when users operate dynamically. The authors of [107] applied AI approaches to UAV–NOMA–MEC networks. They presented an architecture built on FL and reinforcement learning. Furthermore, reference [108] discussed resource allocation and path design for drone-aided MEC.
In [109], the authors described a flying UAV–MEC platform, in which UAVs are equipped with computer resources and provide task-offloading services to users. The fundamental goal of the proposed design was to improve UAV aerial trajectory, user association, and resource allocation. The optimization problem was solved using the trajectory control approach, aided by an RL-based strategy. This strategy outperformed the outcomes of comparable benchmark approaches. Furthermore, by evaluating the user’s mobility data to discover ideal initial UAV deployment sites [110], an ML-based innovative framework was created to optimize UAV trajectories. A multiagent Q-learning-based approach was used to handle the combined problem of UAV trajectories and power control to increase the sum rate and maintain the data rate needs of mobile users. A smart offloading technique based on deep Q-learning was presented in [111] to maximize performance in terms of the delay observed by users linked to the Flying Ad hoc Networks (FANET) to allow MEC in the B5G field.
The combined trajectory design in UAV computing networks is a crucial design difficulty in meeting computing task needs by mobile users. In this context, research efforts should focus on predicting mobile user movements and tracking the trajectory so that computing tasks may be offloaded promptly and computation results can be returned to consumers on time. When dealing with multi-UAV computing, trajectory design is more complicated. Another issue is the blockchain’s interaction with UAVs. UAVs confront several hurdles as a stand-alone technology, including privacy concerns, air traffic violations, quantum assaults, ML, and algorithmic game-theory-based attacks [112].

4. Federated-Learning-Empowered UAV Computing

Recently, FL has emerged as a viable distributed ML paradigm to address the shortcomings of traditional cloud-centric ML, which relies on a single entity to aggregate continuous ML models. FL protects device privacy, improves perceived latency, and relieves bandwidth and energy strain by allowing numerous devices to train an ML model cooperatively without sending the raw data out. As a result, FL is more suited for wireless edge networks than cloud-centric ML [62]. FL allows wireless edge devices to simultaneously learn a shared ML model while maintaining all raw data on the device. Moreover, numerous FL paradigms, such as collaborative FL [113], multihop FL [114], and fog learning [115], have been discussed to better adapt to the features of wireless edge networks, such as multihop, while a first FL framework for UAV networks was presented in [116]. Figure 5 depicts an FL-powered UAV computing collaboration scenario.
Virtually all current FL paradigms are still centralized, which means that a single individual is responsible for ML model accumulation and fusion over the existing network, which can result in a single point of failure and is unsuitable with UAV networks with both unreliable links (or fluctuating links because of unpredictable UAV mobility) and nodes (due to node failures because of UAVs’ drained-out on-board battery). They could run into a single point of failure problem, which is undesirable for UAV networks with unreliable nodes and connections because FL training would also have to end if the UAV ran out of energy or the wireless links among the UAVs failed due to UAV mobility, for example. It is worth mentioning that much research on decentralized ML exists, such as in [117], whereas the authors of [118] are more concerned with classical distributed ML than with FL, and they seldom explore how to apply decentralized FL to UAV networks. The authors of [119] addressed the issues with typical cloud-centric ML for UAV, such as privacy concerns, unacceptable latency, and resource load.
To train a high-quality automated picture identification model, the authors of [120] developed an approach that depended on UAV swarms sharing ground-truth tagged data. Furthermore, they described a semisupervised FL (SSFL) for privacy-preserving UAV image identification. The proposed framework used Federated Mixing (FM) to enhance the naïve combination of FL and semisupervised learning methods. Below, we discuss related work on FL-empowered UAV computing.
  • WPC and EH: UAVs can be used as an MEC server and an energy transmitter for terrestrial users [13,18]. The optimization of a UAV’s trajectory is discussed to improve performance in terms of computing resources [13], whereas the authors in [18] optimized the total required energy by a single UAV in the UAV-assisted wireless-powered MEC system by jointly optimizing the UAV’s transmit power, CPU frequencies, trajectory, and offloading amount. The system, interestingly, used as MEC servers both the UAV and idle sensor devices that do not have computing tasks to offload tasks by other sensors. However, previous research on UAV-assisted Wireless-Powered Communication (WPC) [13,121,122,123] focused on communication impacts and overlooked the potential of UAV-assisted WPC in FL-enabled networks. Furthermore, the authors of [124] investigated using Energy Harvesting (EH) from stochastic sources for FL. Moreover, the authors of [125] applied DRL to tackle a UAV-FL WPC network’s long-term energy challenge.
    Several research papers suggest FL-based collaborative learning techniques, including UAVs. To the best of our knowledge, ref. [116] is the first work to suggest the use of FL for joint power allocation and scheduling of UAV swarms. With data privacy restrictions becoming more severe, FL adoption can help collaborative learning build successful AI models without requiring the transmission of potentially sensitive raw data to a cloud server. As a result, it is critical to think about how to construct an incentive mechanism for FL in UAV networks. Due to the lack of terrestrial connectivity and the battery limitations of FL users, conducting FL chores may be impossible. Therefore, the authors of [126] deployed UAVs and WPC for FL networks to overcome these difficulties. A UAV equipped with edge computing and WPC capabilities is deployed as an aerial energy source and an aerial server to conduct FL operations to allow sustainable FL solutions. Furthermore, the authors proposed an energy-efficient, combined approach for UAV placement, power control, transmission time, model accuracy, bandwidth allocation, and computing resources that aims to reduce the total energy consumption of the aerial server and users.
  • Channels propagation: The authors of [127] presented an FL-assisted categorization strategy in which each UAV performs local training on locally obtained pictures to generate a local model. Subsequently, each UAV sends its locally acquired model over a fading wireless channel, which generates a global model, then sends it back to each UAV for the next round of local training. In addition, a Weighted Zero Forcing (WZF) transmit precoding (TPC) based on genuine, imperfect channel state information is employed at each UAV to further reduce the computational cost.
    The authors of [128] developed UAV-assisted disaster relief networks based on blockchain and ML to accomplish safe and efficient data transfer. The authors initially described a lightweight blockchain-enabled collaborative aerial–ground networking architecture to ensure data transmission in a disaster, followed by a credit-based delegated proof-of-stake consensus protocol to improve consensus efficiency while encouraging UAVs to be honest. A new RL-based approach is designed to intelligently offload UAV computation missions to moving vehicles in the dynamic environment by using the idle processing resources of ground vehicles.
  • Reconfigurable Intelligent Surfaces (RIS): Reconfigurable Intelligent Surfaces (RIS), also known as Intelligent Reflecting Surfaces (IRS), are programmable structures that can be used to engineer the wireless propagation environment to enhance network performance. In the context of UAV air-to-ground networking, the integration of RIS is being proposed to improve the communication security and performance [129,130].
    Shang et al. [131] studied the UAV swarm-enabled ARIS (SARIS), including its motivations and competitive advantages over terrestrial RIS (TRIS) and ARIS, as well as its innovative wireless network applications. The authors focused on the beamforming design, SARIS channel estimate, and SARIS deployment and movement to solve the essential issues of developing the SARIS. With early numerical findings, the possible performance augmentation of SARIS was examined. To improve the performance of UAV-assisted air–ground networks, Pang et al. [129] proposed using RIS. The authors provided an overview of UAVs and RIS by describing the many uses of RIS and the compelling characteristics of UAVs and the advantages of combining them [129]. The authors next looked at two case studies in which the UAV trajectory, transmit beamforming, and RIS passive beamforming are all optimized together. The average attainable rate of the relaying network is maximized in the first case study by mounting the RIS on a UAV. The RIS is used in the second case study to aid UAV–ground communication while battling an adversary eavesdropper.
  • Privacy: UAVs-based service providers for data gathering and AI model training, also known as UAVs-as-a-Service (or Drones-as-a-service, DaaS), have been increasingly popular in recent years. However, the strict restrictions controlling data privacy may make data exchange between independently owned UAVs difficult. Therefore, the authors of [132] introduced an FL-based strategy to allow privacy-preserving collaborative ML across a federation of separate DaaS providers to develop Internet of Vehicles (IoV) applications such as traffic prediction and parking occupancy management.
  • Caching: Content caching in edge computing appears to be a viable approach [42]. It entails delivering popular material closer to the edge, which may be used locally at BSs or APs. Furthermore, UAVs can serve as BSs to improve caching efficiency by detecting users’ mobility and efficiently delivering popular material [133]. However, this use case inherits the aforementioned UAV deployment issues. The hybrid CNN with LSTM method is better in this situation for dealing with the spatio-temporal aspects of both mobility patterns and content request distribution. The aggregated learning model then assists in the deployment of UAVs.
    As mobile users, one of the primary issues of such a paradigm is determining which contents should be efficiently saved in each cache by estimating the popularity of UAVs. However, content discrimination necessitates direct access to private UAV information, which is not feasible. FL is a match made in heaven for content popularity prediction since it allows for local model training, respecting user data privacy. For example, an Augmented Reality (AR) application needs access to users’ privacy-sensitive data to collect popular augmentation elements. Because this task is a binary classification problem, an ANN algorithm may be utilized in a federated manner to learn these popular pieces before storing them locally to save latency.
  • Delivery Services: Traditional cloud-based facial recognition algorithms for receiver location and identification in UAV delivery services have several cost, latency, and dependability issues. The authors of [134] presented Fed-UAV, i.e., the edge-based FL framework to handle the person re-identification problem in the UAV delivery service. The framework allows the UAV to detect the target receivers rapidly and effectively decrease data transfer between the UAV and the cloud server, resulting in faster reaction times and data privacy protection. Experiments on three real-world datasets are undertaken, and the results indicate that Fed-UAV achieved high accuracy and efficiency in human re-identification while maintaining data privacy. The UAV primarily employs face recognition to determine the receiver’s identification [135,136]. On the other hand, facial recognition requires high-quality facial photos, which are difficult to produce in a complicated situation such as an outdoor and busy location for UAV delivery.

5. Collaboration of Multi-UAV Computing

Recently, UAV computing has emerged as a viable solution for offering computing services to everything in smart and harsh environments. However, due to the restricted UAV computing capability and UAV energy limitation, it is difficult to satisfy the computation requirements of smart and harsh environments because each UAV works separately as an independent unit. Therefore, a multi-UAV computing collaboration is required. A collaborative multi-UAV-assisted MEC system was introduced in [137], combined with an MEC-enabled ground BS. Then, the challenge of minimizing delay for everything is investigated by optimizing the offloading decision and allocating communication and computation resources while meeting the energy restrictions of both UAVs and everything in smart environments. The authors of [79] also proposed an intelligent task offloading algorithm for UAV-empowered MEC services in which the UAVs offload computing tasks to fixed MEC servers. UAV BSs are clients in this system, served by MEC and cloud servers, and the task latency performance improvement was studied.
Previous studies discussed UAV computing over a terrestrial MEC station [16,138,139,140,141,142,143,144]. For example, the authors of [138] presented UAV trajectory control based on DRL in UAV computing, but task offloading and resource allocation were not considered. The authors of [145] investigated the combined resource allocation and UAV trajectory optimization in UAV computing to maximize UAV energy efficiency. Moreover, the authors of [140] investigated the issue of hierarchical reinforcement learning-based task scheduling in UAV computing. The authors of [141] presented a non-cooperative game for effective resource management in UAV computing to decrease the age of information. A Stackelberg game-based resource pricing and trade mechanism for a blockchain application was proposed in [142]. This was used to optimally allocate computing resources at UAVs and BSs. The authors of [16] discussed UAV computing issues for task execution time and energy reduction [16]. However, all previous studies [16,138,139,140,141,142] focused on a single UAV computing. Meanwhile, the authors of [143] examined the multi-UAV scenario from trajectory planning. In multi-UAV computing, the aim is to optimize fairness among everything in smart environments. The authors of [144] proposed an energy-efficient communication and computation resource management in a two-stage mobile computing system aided by multi-UAVs. The authors postulated that the UAV compute a portion of users’ offloaded computing activities while the remainder is transmitted to the MEC-enabled BS. An integrated MEC system of UAVs and ground vehicles is considered in [146] for providing communication, storage, and computing services to the IoT devices. In contrast to this work, the system in [102], as we discussed in Section 3, is also an integrated MEC system, however, it includes ground BSs as well in the MEC system, whereas the system in [146] does not.
While the work reported in [143,144] introduced multi-UAV computing, this work did not go into the problem of joint job offloading and communication and computing resource allocation to reduce overall latency for users. Furthermore, previous research has not taken into consideration UAV collaboration. In contrast, in multi-UAV computing connected to enabled terrestrial BS, the authors of [137] presented a combined task offloading and resource allocation issue that considers collaboration among UAVs computing. Furthermore, the authors in [147] used a multi-UAV task offloading for ground users to minimize energy consumption of the users through a joint optimization of UAV trajectory, task scheduling, and bit allocation. A dynamic programming-based bidding optimization method was used for the task scheduling optimization.
Previous studies [148,149] presume that each server can only perform one task at a time and schedules each task separately, potentially resulting in increased communication overhead. Furthermore, the schedulers place tasks on nodes (virtual machines) with sufficient resource availability at random without taking into account dependent tasks, resulting in longer execution times, resource wastage due to underutilized nodes, and a reduction in the number of tasks that can be executed given the available resources. Therefore, the authors of [150] proposed a federated multioutput linear regression model for estimating multitask resource requirements and execution time. As a result, the closest multitask dispatching policy for selecting the closest UAV deployment with congruent resource availability and flight time executes tasks at a given time and autonomously deploys the selected UAV to the needed location. The mission response time minimization problem was studied in [151] using a multi-UAV MEC. The authors used multiagent reinforcement learning to minimize the average response time for traffic management applications, taking account of UAVs’ energy limitation, interdependencies of tasks, and the variable nature of the network states.
Multi-UAVs acquire and evaluate environmental photos of smart or harsh environments before submitting model changes to an aggregate server at the ground fusion center [127]. Multi-UAVs are deployed as FL users, and a swarm leader is considered the aggregation server in a holistic air quality monitoring architecture with two primary components, ground and air sensing [152]. Both studies treat UAVs as learners. In the next sections, we discuss various research related to UAV computing and its applications and challenges. In Table 2 (continued in Table 3), we provide a summary of related works that are reviewed throughout this paper.

6. Applications of UAV Computing

UAVs have recently gained a lot of interest in various applications, including delivery, agriculture, emergency response, communication services [77], and mars exploration [154]. The authors of [33] evaluated UAV mobile edge computing for upcoming IoT applications and the role of ML and DL in overcoming latency, job offloading, energy demand, and security constraints. Below, we provide a range of application domains where UAV edge computing could be used, as also shown in Figure 6.

6.1. Industry 4.0

As the need for quick and low-cost productivity grows, industrial and scientific groups are increasingly incorporating robots into the manufacturing process. AI and ML play a vital role for improving robotic communication effectively and efficiently [155,156]. In response to the rising requirement for productivity, industrial solution providers have recently focused on UAVs. For example, the authors of [157] presented an industrial IoT-based system that gathers data from a UAV camera and transfers it to a cloud server for processing. Using the robust intelligence of computer vision technologies [158], the design seeks to monitor the industrial zone to prevent unpleasant accidents in the manufacturing process. Drones have also become more popular in the mining industry for 3D mapping, public safety [159], and management [160]. The combination of AI, digital twins and blockchain can play a vital role in improving industry 4.0 [161,162,163,164]. However, UAV computing with the above-mentioned technologies will make the developments of Industry 4.0 easier.

6.2. Agriculture

Drones have been used to scan big agricultural fields to discover illnesses early on that jeopardize plant quality. Using image processing and AI classification based on IoT architecture and real-time data capture, the deployed system can forecast agricultural illnesses in real-time [165]. The authors of [166] presented an architecture that combines UAVs, Wireless Sensor Networks (WSNs), and IoT to deliver precision ecological agriculture. Another architecture has been developed to analyze pictures taken using UAV aerial multispectral sensors using the DL technique for crop mapping monitoring and disease evaluation based on satellite data [166]. In addition, in [167,168], UAVs played a vital role in increasing the productivity of farming activities. Furthermore, UAVs play an exciting role in agricultural monitoring by enabling various previously available tasks to laborers and former [169,170].

6.3. Healthcare

Drones can help manage various public health issues, including epidemics and dangerous illnesses such as COVID-19. During the COVID-19 pandemic, for example, certain governments and nations used drones to scan the virus’s fast spread, identify patients, and then estimate mortality risk factors using AI algorithms to the acquired data. Drones have been used to monitor crowds, transmit public announcements and information, spray disinfectants, and take thorough temperature readings in various residential environments [171]. The lifeguard community often uses UAVs for search and rescue operations that need quick action. Instead of utilizing human-crewed airplanes, which may take longer to deploy, UAVs’ adaptability quickly assesses the rescue scenario [172]. Using UAV computing, AI, and computer vision techniques to imitate visual reality might lead to new applications that allow for speedier and real-time judgments in emergencies. UAVs, for example, identify impediments by flying over them, collecting data, extracting the essential aspects, and making choices using machine vision and pattern recognition technology. People with vision impairments can navigate more quickly in this manner. This technology is anticipated to be a critical component of the healthcare revolution [172].

6.4. Natural Disaster

UAVs have the features of high mobility and ease of deployment, allowing for the provision of required communication services [76] quickly. UAV computing may deliver required computing services for mobile users with on-demand mobility in a more responsive way than fixed communication infrastructures. The advantages of UAV computing are underlined in situations where fixed communication infrastructures cannot meet the computing requirements of ground users, such as sites far from communication facilities and places where natural catastrophes have damaged communication infrastructure. The UAV may fly to specific locations to assist everything with computational needs, such as monitoring equipment to complete tasks. UAV computing can considerably reduce the strain of computing in specific locations due to its on-demand mobility. A timely and efficient reaction is essential during natural disasters to aid people, avoid increasing the number of victims, and reduce the economic damage [173,174]. For example, UAVs can promptly respond to earthquake assistance requests, locate missing individuals, and assist in monitoring and rescuing flood victims [175]. Furthermore, using UAV computing with AI to collect vast data from various sensors installed in the environment might assist in the forecasting and acting in natural disasters such as tornadoes, volcanic eruptions, tsunamis, and storms [176].

6.5. Surveillance

UAVs are being used to monitor and survey in numerous application scenarios, such as environmental and wildlife monitoring and traffic control for archaeological site monitoring and data aggregation. UAV technology can also be used as a support platform for older approaches in ecological monitoring systems to follow animals in varied territories and topographically demanding places [177]. Furthermore, this technique may aid geological researchers in gathering distant data on various species and animals [178]. Employing the latest computer vision techniques and cloud computing technologies, the authors of [179] suggested an intelligent model based on UAVs for monitoring various types of plants. UAVs are also employed to track huge groups of wild animals [180]. A fleet of MEC UAVs were used in [153] for video monitoring applications in 5G networks. The MEC UAVs platform was optimized for low-latency performance.

6.6. Smart Environments

Due to various activities in which UAVs as mobile vehicles will play many pivotal roles, such as transportation [181], infrastructure control and management [182], and building observation [183], the urban environment is expected to acquire a massive number of dynamically connected devices. UAVs are anticipated to provide communication services to heterogeneous smart devices in metropolitan settings to improve smart environments [184,185]. For instance, the authors of [186] presented a 5G hierarchical IoT network design in which UAV computing worked as a data fusion center, formation controller, and network gateway. In another study, UAVs were employed to deliver lightweight components to workstation operators within a manufacturing facility where GPS could not provide a realistic solution for interior locating and intelligent shipping, monitoring, and control [187].

6.7. B5G Networks

Many attempts have been made in the networks sector to fully realize the potential of UAV communications for cellular and wireless communications. The research community investigated the possibility of UAV-mounted usage via flying relays and BSs that can dynamically relocate themselves to extend network coverage, increase spectral efficiency, and improve user QoS. UAVs can have low-altitude support beyond LoS control and reliable communications [188]. Furthermore, UAVs can provide various services to cellular IoT-based networks by offering processing facilities for consumers close to the ground.

6.8. Industry 5.0

Industry 5.0 is a manufacturing paradigm change that prioritizes human–machine interaction. It has emerged due to advances in AI, distributed computing, and B5G connectivity [189,190], and it is likely to accelerate even further with the inclusion of supporting technologies such as FL and industrial edge computing [191]. In addition, industry 5.0 will minimize latency, boost overall data security and privacy, increase efficiency, and support transactions hindered by limited connection thanks to the development of UAV computing [192]. The availability of AI UAV computing to process data locally and make decisions in real time and UAV computing is a component of the 6G revolution; UAV can play a vital role in improving Industry 5.0. By providing characteristics such as reduced latency, continuous connection, and greater efficiency across many applications, UAV computing can allow essential elements of Industry 5.0 such as resilience, sustainability, cost effectiveness, security and human centeredness.

7. Challenges and Opportunities

7.1. Privacy and Security

Although the major goal of the FDL idea is to protect data privacy, sharing some local models may nevertheless divulge private information. As a result, the authors presented a safe aggregation approach in [193], which allows clients to encrypt their local models while enabling the FL server to aggregate them without decrypting them. Analyzing the global aggregated model, on the other hand, can nevertheless assist in revealing the participation of some learners. As a result, building algorithms to offer privacy at the participant level is critical rather than preserving obtained data.
Providing privacy at the UAV in the context of UAV networks necessitates high computing workloads and those required for local learning. As a result, efficient FDL algorithms that balance clients’ limited resources and privacy protection are critical. Similar to typical ML algorithms, the local models are updated regularly as new data is acquired. By inserting poison data or poison gradient updates, an adversary can affect the outcome of the FL process. In this context, FDL algorithms must resist data-poisoning and model-poisoning adversaries, whereas robust strategies against such adversarial assaults are also essential.
Another critical security challenge is that of selecting legitimate edge computing UAVs by the IoT devices for task offloading when there are eavesdropper UAVs in the environment [73]. This particularly is challenging in the context of edge computing since security solutions introduce additional latency, whereas the major attraction of using edge computing is to improve the response time of task computing needs by the IoT devices. The UAV MEC systems need to be designed to tackle this challenge. The optimization of UAV transmit power, UAV jamming signals, and UAV locations are useful in this respect. As was stated in [73], there exists a trade-off between security and the latency of UAV MEC systems which is dependent on the UAV energy budget and UAV self-interference efficiency.
Mobile Edge Computing using UAVs faces further security challenges due to attacks on the UAVs platforms. These attacks compromise UAV data and hamper their mission or physical safety [194,195]. A battery depletion attack [196], for example, can drain out the UAV’s battery faster, which shortens the mission time, creating unplanned service disruptions. There is a recent trend to use blockchain technology to address the cybersecurity problems of UAVs [197,198]. Additional research is needed to devise solutions for making the UAV platforms safe from external attacks so that a reliable UAV MEC infrastructure can be established.

7.2. FL Scalability

The success of the FL process is heavily reliant on the involvement of local learners, who enable both global and local model changes. In this context, additional research is needed to create scalable FL algorithms at all levels, including determining the ideal number of UAVs and the frequency of local and global model updates. Furthermore, participants are presumed to be linked to the FL system at all times. However, specific UAVs in UAV networks may turn off, affecting learning performance due to energy or connection limitations. As a result, FL algorithms must withstand client dropouts by predicting such events.
Another problem is finding the right UAV learners for the correct data, especially when the data is unlabeled or mislabeled. In reality, present research assumes that data is tagged, which is not necessarily the case with data collected by UAVs. As a result, the planned FL method should be resistant to such challenges, for example, by allowing the UAVs to learn the labels of acquired data as a first step.

7.3. Energy Efficiency

The energy efficiency of UAV computing is the most common and pressing concern hindering UAV’s commercial deployment. The endurance time of a UAV is limited, especially for small-sized ones, owing to battery technological limitations [199]. The energy consumption of communication, payload, and computation in UAV computing impacts flight duration, and therefore the service time. Furthermore, mobile IoT devices are constantly battery-powered, thus because of the long-distance transmission requiring higher power, task offloading performance is compromised. In certain hard-to-reach regions, such as monitoring devices in IoT [200], changing the batteries of mobile devices is problematic. As a result, to reduce the energy consumption of both the UAV and mobile devices, energy-efficient UAV computing with multicriteria optimization must be designed.

8. Conclusions

The next generation mobile communication networks, such as 6G, have stringent requirements of supporting a massive number of devices with their computing and communication needs with ultra-low latency and high bandwidth. UAVs are being considered as an integral part of these networks to bring additional capacity of communication and computing where the devices are located. To this end, mobile edge computing services provided by UAVs can significantly contribute to fulfilling the data processing needs of IoT devices, addressing computation-intensive offloading and latency issues. Motivated by applications of UAV computing in 6G and Industry 4.0/5.0, in this survey, we provided a comprehensive review of UAV edge computing technology for 6G smart environments. We illustrated the utility of UAV edge computing, which can be a crucial infrastructure in various application domains. We drew special attention to the need of providing privacy-preserving computing solutions, especially when ML is used, in UAV computing. In particular, we explained the role of FL in privacy-preserving UAV edge computing, drawing from the recent literature. We thoroughly investigated a novel area of research where federated learning methods are applied to improve the performance of UAV computing networks. Specifically, we elaborated the role of FL in UAV computing achieving privacy, which includes the decentralization of data for FL model development and the reduction in information sharing among the FL agents to achieve data privacy. We explained the collaboration of multi-UAV computing for achieving common goals in the real world. We further discussed UAV edge computing challenges and opportunities that will guide future research in this area. The UAV and IoT energy limitations, wireless communication security, data privacy, as well as the scalability of ML solutions will dictate future research in the domain of UAV-assisted mobile edge computing in smart IoT environments.

Author Contributions

Conceptualization, S.H.A.; Data curation, S.K.; Formal analysis, S.H.A., J.H., R.S. and A.H.; Funding acquisition, A.H.; Investigation, S.H.A., J.H. and R.S.; Methodology, S.H.A., A.V.S., J.H. and S.V.S.; Project administration, M.A.A. and A.H.; Resources, A.V.S. and M.A.A.; Software, S.V.S. and R.S.; Supervision, S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xie, C.; Yu, B.; Zeng, Z.; Yang, Y.; Liu, Q. Multilayer internet-of-things middleware based on knowledge graph. IEEE Internet Things J. 2020, 8, 2635–2648. [Google Scholar] [CrossRef]
  2. Alsamhi, S.H.; Almalki, F.A.; Al-Dois, H.; Ben Othman, S.; Hassan, J.; Hawbani, A.; Sahal, R.; Lee, B.; Saleh, H. Machine learning for smart environments in B5G networks: Connectivity and QoS. Comput. Intell. Neurosci. 2021, 2021. [Google Scholar] [CrossRef] [PubMed]
  3. She, C.; Sun, C.; Gu, Z.; Li, Y.; Yang, C.; Poor, H.V.; Vucetic, B. A Tutorial of Ultra-Reliable and Low-Latency Communications in 6G: Integrating Theoretical Knowledge into Deep Learning. arXiv 2020, arXiv:2009.06010. [Google Scholar]
  4. Yu, J.J.; Zhao, M.; Li, W.T.; Liu, D.; Yao, S.; Feng, W. Joint offloading and resource allocation for time-sensitive multi-access edge computing network. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020; pp. 1–6. [Google Scholar]
  5. Yu, J.J.; Wangt, H.; Zhao, M.; Li, W.T.; Bao, H.Q.; Yin, L.; Wu, M. Energy minimization for mobile edge computing networks with time-sensitive constraints. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  6. Dao, N.N.; Pham, Q.V.; Tu, N.H.; Thanh, T.T.; Bao, V.N.Q.; Lakew, D.S.; Cho, S. Survey on aerial radio access networks: Toward a comprehensive 6G access infrastructure. IEEE Commun. Surv. Tutorials 2021, 23, 1193–1225. [Google Scholar] [CrossRef]
  7. De Alwis, C.; Kalla, A.; Pham, Q.V.; Kumar, P.; Dev, K.; Hwang, W.J.; Liyanage, M. Survey on 6G frontiers: Trends, applications, requirements, technologies and future research. IEEE Open J. Commun. Soc. 2021, 2, 836–886. [Google Scholar] [CrossRef]
  8. Xu, L.; Chen, M.; Chen, M.; Yang, Z.; Chaccour, C.; Saad, W.; Hong, C.S. Joint location, bandwidth and power optimization for THz-enabled UAV communications. IEEE Commun. Lett. 2021, 25, 1984–1988. [Google Scholar] [CrossRef]
  9. Alsamhi, S.H.; Almalki, F.A.; Ma, O.; Ansari, M.S.; Angelides, M.C. Performance optimization of tethered balloon technology for public safety and emergency communications. Telecommun. Syst. 2020, 75, 235–244. [Google Scholar] [CrossRef]
  10. Alsamhi, S.H.; Ansari, M.S.; Rajput, N.S. Disaster coverage predication for the emerging tethered balloon technology: Capability for preparedness, detection, mitigation, and response. Disaster Med. Public Health Prep. 2018, 12, 222–231. [Google Scholar] [CrossRef]
  11. Hu, Q.; Cai, Y.; Yu, G.; Qin, Z.; Zhao, M.; Li, G.Y. Joint offloading and trajectory design for UAV-enabled mobile edge computing systems. IEEE Internet Things J. 2018, 6, 1879–1892. [Google Scholar] [CrossRef]
  12. Hu, X.; Wong, K.K.; Yang, K.; Zheng, Z. UAV-assisted relaying and edge computing: Scheduling and trajectory optimization. IEEE Trans. Wirel. Commun. 2019, 18, 4738–4752. [Google Scholar] [CrossRef]
  13. Zhou, F.; Wu, Y.; Hu, R.Q.; Qian, Y. Computation rate maximization in UAV-enabled wireless-powered mobile-edge computing systems. IEEE J. Sel. Areas Commun. 2018, 36, 1927–1941. [Google Scholar] [CrossRef] [Green Version]
  14. Xiong, J.; Guo, H.; Liu, J. Task offloading in UAV-aided edge computing: Bit allocation and trajectory optimization. IEEE Commun. Lett. 2019, 23, 538–541. [Google Scholar] [CrossRef]
  15. Jeong, S.; Simeone, O.; Kang, J. Mobile edge computing via a UAV-mounted cloudlet: Optimization of bit allocation and path planning. IEEE Trans. Veh. Technol. 2017, 67, 2049–2063. [Google Scholar] [CrossRef] [Green Version]
  16. Zhan, C.; Hu, H.; Sui, X.; Liu, Z.; Niyato, D. Completion time and energy optimization in the UAV-enabled mobile-edge computing system. IEEE Internet Things J. 2020, 7, 7808–7822. [Google Scholar] [CrossRef]
  17. Guo, H.; Liu, J. UAV-enhanced intelligent offloading for Internet of Things at the edge. IEEE Trans. Ind. Inform. 2019, 16, 2737–2746. [Google Scholar] [CrossRef]
  18. Liu, Y.; Xiong, K.; Ni, Q.; Fan, P.; Letaief, K.B. UAV-assisted wireless powered cooperative mobile edge computing: Joint offloading, CPU control, and trajectory optimization. IEEE Internet Things J. 2019, 7, 2777–2790. [Google Scholar] [CrossRef]
  19. Yu, Z.; Gong, Y.; Gong, S.; Guo, Y. Joint task offloading and resource allocation in UAV-enabled mobile edge computing. IEEE Internet Things J. 2020, 7, 3147–3159. [Google Scholar] [CrossRef]
  20. Almalki, F.; Alsamhi, S.H.; Sahal, R.; Hassan, J.; Hawbani, A.; Rajput, N.; Saif, A.; Morgan, J.; Breslin, J. Green IoT for eco-friendly and sustainable smart cities: Future directions and opportunities. Mob. Netw. Appl. 2021, 2021, 1–25. [Google Scholar] [CrossRef]
  21. Khaleefa, S.; Alsamhi, S.; Rajput, N. Tethered balloon technology for telecommunication, coverage and path loss. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 1–2 March 2014; pp. 1–4. [Google Scholar]
  22. Alsamhi, S.; Ma, O.; Ansari, M. Artificial intelligence-based techniques for emerging robotics communication: A survey and future perspectives. arXiv 2018, arXiv:1804.09671. [Google Scholar]
  23. Li, L.; Wen, X.; Lu, Z.; Pan, Q.; Jing, W.; Hu, Z. Energy-efficient uav-enabled mec system: Bits allocation optimization and trajectory design. Sensors 2019, 19, 4521. [Google Scholar] [CrossRef] [Green Version]
  24. Brik, B.; Ksentini, A.; Bouaziz, M. Federated learning for UAVs-enabled wireless networks: Use cases, challenges, and open problems. IEEE Access 2020, 8, 53841–53849. [Google Scholar] [CrossRef]
  25. Konečný, J.; McMahan, H.B.; Ramage, D.; Richtárik, P. Federated optimization: Distributed machine learning for on-device intelligence. arXiv 2016, arXiv:1610.02527. [Google Scholar]
  26. Konečný, J.; McMahan, H.B.; Yu, F.X.; Richtárik, P.; Suresh, A.T.; Bacon, D. Federated learning: Strategies for improving communication efficiency. arXiv 2016, arXiv:1610.05492. [Google Scholar]
  27. Kang, J.; Xiong, Z.; Niyato, D.; Xie, S.; Zhang, J. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 2019, 6, 10700–10714. [Google Scholar] [CrossRef]
  28. Ren, J.; Wang, H.; Hou, T.; Zheng, S.; Tang, C. Federated learning-based computation offloading optimization in edge computing-supported internet of things. IEEE Access 2019, 7, 69194–69201. [Google Scholar] [CrossRef]
  29. Samarakoon, S.; Bennis, M.; Saad, W.; Debbah, M. Distributed federated learning for ultra-reliable low-latency vehicular communications. IEEE Trans. Commun. 2019, 68, 1146–1159. [Google Scholar] [CrossRef] [Green Version]
  30. Wang, S.; Tuor, T.; Salonidis, T.; Leung, K.K.; Makaya, C.; He, T.; Chan, K. Adaptive federated learning in resource constrained edge computing systems. IEEE J. Sel. Areas Commun. 2019, 37, 1205–1221. [Google Scholar] [CrossRef] [Green Version]
  31. Yang, H.H.; Liu, Z.; Quek, T.Q.; Poor, H.V. Scheduling policies for federated learning in wireless networks. IEEE Trans. Commun. 2019, 68, 317–333. [Google Scholar] [CrossRef] [Green Version]
  32. Abrar, M.; Ajmal, U.; Almohaimeed, Z.M.; Gui, X.; Akram, R.; Masroor, R. Energy efficient UAV-enabled mobile edge computing for IoT devices: A review. IEEE Access 2021, 9, 127779–127798. [Google Scholar] [CrossRef]
  33. Yazid, Y.; Ez-Zazi, I.; Guerrero-González, A.; El Oualkadi, A.; Arioua, M. UAV-enabled mobile edge-computing for IoT based on AI: A comprehensive review. Drones 2021, 5, 148. [Google Scholar] [CrossRef]
  34. Huda, S.A.; Moh, S. Survey on computation offloading in UAV-Enabled mobile edge computing. J. Netw. Comput. Appl. 2022, 201, 103341. [Google Scholar] [CrossRef]
  35. Bithas, P.S.; Michailidis, E.T.; Nomikos, N.; Vouyioukas, D.; Kanatas, A.G. A survey on machine-learning techniques for UAV-based communications. Sensors 2019, 19, 5170. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. McEnroe, P.; Wang, S.; Liyanage, M. A Survey on the Convergence of Edge Computing and AI for UAVs: Opportunities and Challenges. IEEE Internet Things J. 2022; early access. [Google Scholar] [CrossRef]
  37. Lahmeri, M.A.; Kishk, M.A.; Alouini, M.S. Artificial intelligence for UAV-enabled wireless networks: A survey. IEEE Open J. Commun. Soc. 2021, 2, 1015–1040. [Google Scholar] [CrossRef]
  38. Fourati, F.; Alsamhi, S.H.; Alouini, M.S. Bridging the Urban-Rural Connectivity Gap through Intelligent Space, Air, and Ground Networks. arXiv 2022, arXiv:2202.12683. [Google Scholar]
  39. Tun, Y.K.; Park, Y.M.; Tran, N.H.; Saad, W.; Pandey, S.R.; Hong, C.S. Energy-efficient resource management in UAV-assisted mobile edge computing. IEEE Commun. Lett. 2020, 25, 249–253. [Google Scholar] [CrossRef]
  40. Samad, T.; Bay, J.S.; Godbole, D. Network-centric systems for military operations in urban terrain: The role of UAVs. Proc. IEEE 2007, 95, 92–107. [Google Scholar] [CrossRef]
  41. Cheng, N.; Xu, W.; Shi, W.; Zhou, Y.; Lu, N.; Zhou, H.; Shen, X. Air-ground integrated mobile edge networks: Architecture, challenges, and opportunities. IEEE Commun. Mag. 2018, 56, 26–32. [Google Scholar] [CrossRef] [Green Version]
  42. Lim, W.Y.B.; Luong, N.C.; Hoang, D.T.; Jiao, Y.; Liang, Y.C.; Yang, Q.; Niyato, D.; Miao, C. Federated learning in mobile edge networks: A comprehensive survey. IEEE Commun. Surv. Tutorials 2020, 22, 2031–2063. [Google Scholar] [CrossRef] [Green Version]
  43. Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Poor, H.V. Federated learning for internet of things: A comprehensive survey. arXiv 2021, arXiv:2104.07914. [Google Scholar] [CrossRef]
  44. Nguyen, D.C.; Pham, Q.V.; Pathirana, P.N.; Ding, M.; Seneviratne, A.; Lin, Z.; Dobre, O.; Hwang, W.J. Federated Learning for Smart Healthcare: A Survey. ACM Comput. Surv. (CSUR) 2022, 55, 1–37. [Google Scholar] [CrossRef]
  45. Rahman, S.A.; Tout, H.; Talhi, C.; Mourad, A. Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Netw. 2020, 34, 310–317. [Google Scholar] [CrossRef]
  46. Liu, Y.; Garg, S.; Nie, J.; Zhang, Y.; Xiong, Z.; Kang, J.; Hossain, M.S. Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach. IEEE Internet Things J. 2020, 8, 6348–6358. [Google Scholar] [CrossRef]
  47. Tong, Y.; Sun, W. The role of film and television big data in real-time image detection and processing in the Internet of Things era. J. Real-Time Image Process. 2021, 18, 1115–1127. [Google Scholar] [CrossRef]
  48. Dean, J.; Corrado, G.; Monga, R.; Chen, K.; Devin, M.; Mao, M.; Ranzato, M.; Senior, A.; Tucker, P.; Yang, K. Large scale distributed deep networks. Adv. Neural Inf. Process. Syst. 2012, 25. Available online: https://www.cs.toronto.edu/~ranzato/publications/DistBeliefNIPS2012_withAppendix.pdf (accessed on 28 May 2022).
  49. Smith, V.; Chiang, C.K.; Sanjabi, M.; Talwalkar, A.S. Federated multi-task learning. Adv. Neural Inf. Process. Syst. 2017, 30. Available online: https://proceedings.neurips.cc/paper/2017/file/6211080fa89981f66b1a0c9d55c61d0f-Paper.pdf (accessed on 28 May 2022).
  50. Ji, S.; Pan, S.; Long, G.; Li, X.; Jiang, J.; Huang, Z. Learning private neural language modeling with attentive aggregation. In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), Budapest, Hungary, 14–19 July 2019; pp. 1–8. [Google Scholar]
  51. Wang, G.; Dang, C.X.; Zhou, Z. Measure contribution of participants in federated learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 2597–2604. [Google Scholar]
  52. Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1175–1191. [Google Scholar]
  53. Tian, Y.; Yuan, J.; Song, H. Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 2019, 48, 102354. [Google Scholar] [CrossRef]
  54. Alsamhi, S.H.; Almalki, F.A.; Guizani, M.; Hawbani, A.; Shvetsor, A.V.; Afghah, F.; Song, H.; Lee, B. Drones’ Edge Intelligence over Smart Environments in B5G: Blockchain and Federated Learning Synergy. IEEE Trans. Green Commun. Netw. 2022, 2022, 295–312. [Google Scholar] [CrossRef]
  55. Shaheen, M.; Farooq, M.S.; Umer, T.; Kim, B.S. Applications of Federated Learning; Taxonomy, Challenges, and Research Trends. Electronics 2022, 11, 670. [Google Scholar] [CrossRef]
  56. Feng, S.; Niyato, D.; Wang, P.; Kim, D.I.; Liang, Y.C. Joint service pricing and cooperative relay communication for federated learning. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 815–820. [Google Scholar]
  57. Zhan, Y.; Li, P.; Qu, Z.; Zeng, D.; Guo, S. A learning-based incentive mechanism for federated learning. IEEE Internet Things J. 2020, 7, 6360–6368. [Google Scholar] [CrossRef]
  58. McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics; PMLR: Fort Lauderdale, FL, USA, 2017; pp. 1273–1282. [Google Scholar]
  59. Kang, J.; Xiong, Z.; Niyato, D.; Zou, Y.; Zhang, Y.; Guizani, M. Reliable federated learning for mobile networks. IEEE Wirel. Commun. 2020, 27, 72–80. [Google Scholar] [CrossRef] [Green Version]
  60. Xu, J.; Glicksberg, B.S.; Su, C.; Walker, P.; Bian, J.; Wang, F. Federated learning for healthcare informatics. J. Healthc. Inform. Res. 2021, 5, 1–19. [Google Scholar] [CrossRef] [PubMed]
  61. Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D. Mobile Edge Computing, Blockchain and Reputation-Based Crowdsourcing Iot Federated Learning: A Secure, Decentralized and Privacy-Preserving System. 2020. Available online: https://www.semanticscholar.org/paper/Mobile-Edge-Computing%2C-Blockchain-and-Crowdsourcing-Zhao-Zhao/7c7ccf8defa9c61eb2487af1249974b3f1213957 (accessed on 28 May 2022).
  62. Samarakoon, S.; Bennis, M.; Saad, W.; Debbah, M. Federated learning for ultra-reliable low-latency V2V communications. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar]
  63. Yang, M.D.; Boubin, J.G.; Tsai, H.P.; Tseng, H.H.; Hsu, Y.C.; Stewart, C.C. Adaptive autonomous UAV scouting for rice lodging assessment using edge computing with deep learning EDANet. Comput. Electron. Agric. 2020, 179, 105817. [Google Scholar] [CrossRef]
  64. Yang, Z.; Chen, M.; Saad, W.; Hong, C.S.; Shikh-Bahaei, M. Energy efficient federated learning over wireless communication networks. IEEE Trans. Wirel. Commun. 2020, 20, 1935–1949. [Google Scholar] [CrossRef]
  65. Zhang, T.; Mao, S. Energy-Efficient Federated Learning with Intelligent Reflecting Surface. IEEE Trans. Green Commun. Netw. 2021, 6, 845–858. [Google Scholar] [CrossRef]
  66. Mach, P.; Becvar, Z. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutorials 2017, 19, 1628–1656. [Google Scholar] [CrossRef] [Green Version]
  67. Li, W.T.; Zhao, M.; Wu, Y.H.; Yu, J.J.; Bao, L.Y.; Yang, H.; Liu, D. Collaborative offloading for UAV-enabled time-sensitive MEC networks. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
  68. Wang, G.; Yu, X.; Xu, F.; Cai, J. Task offloading and resource allocation for UAV-assisted mobile edge computing with imperfect channel estimation over Rician fading channels. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 1–19. [Google Scholar] [CrossRef]
  69. Li, J.; Liu, Q.; Wu, P.; Shu, F.; Jin, S. Task offloading for UAV-based mobile edge computing via deep reinforcement learning. In Proceedings of the 2018 IEEE/CIC International Conference on Communications in China (ICCC), Beijing, China, 16–18 August 2018; pp. 798–802. [Google Scholar]
  70. Ouyang, W.; Chen, Z.; Wu, J.; Yu, G.; Zhang, H. Dynamic Task Migration Combining Energy Efficiency and Load Balancing Optimization in Three-Tier UAV-Enabled Mobile Edge Computing System. Electronics 2021, 10, 190. [Google Scholar] [CrossRef]
  71. Messous, M.A.; Arfaoui, A.; Alioua, A.; Senouci, S.M. A sequential game approach for computation-offloading in an UAV network. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
  72. Sedjelmaci, H.; Boudguiga, A.; Jemaa, I.B.; Senouci, S.M. An efficient cyber defense framework for UAV-Edge computing network. Ad Hoc Netw. 2019, 94, 101970. [Google Scholar] [CrossRef]
  73. Zhou, Y.; Pan, C.; Yeoh, P.L.; Wang, K.; Elkashlan, M.; Vucetic, B.; Li, Y. Secure communications for UAV-enabled mobile edge computing systems. IEEE Trans. Commun. 2019, 68, 376–388. [Google Scholar] [CrossRef] [Green Version]
  74. Ren, Y.; Xie, Z.; Ding, Z.; Sun, X.; Xia, J.; Tian, Y. Computation offloading game in multiple unmanned aerial vehicle-enabled mobile edge computing networks. IET Commun. 2021, 15, 1392–1401. [Google Scholar] [CrossRef]
  75. Zhou, F.; Wu, Y.; Sun, H.; Chu, Z. UAV-enabled mobile edge computing: Offloading optimization and trajectory design. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  76. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2018, 6, 2241–2263. [Google Scholar] [CrossRef] [Green Version]
  77. Motlagh, N.H.; Taleb, T.; Arouk, O. Low-altitude unmanned aerial vehicles-based internet of things services: Comprehensive survey and future perspectives. IEEE Internet Things J. 2016, 3, 899–922. [Google Scholar] [CrossRef]
  78. Xu, J.; Liu, X.; Li, X.; Zhang, L.; Jin, J.; Yang, Y. Energy aware Computation Management Strategy for Smart Logistic System with MEC. IEEE Internet Things J. 2021, 9, 8544–8559. [Google Scholar] [CrossRef]
  79. Chen, J.; Chen, S.; Luo, S.; Wang, Q.; Cao, B.; Li, X. An intelligent task offloading algorithm (iTOA) for UAV edge computing network. Digit. Commun. Netw. 2020, 6, 433–443. [Google Scholar] [CrossRef]
  80. Diao, X.; Zheng, J.; Cai, Y.; Wu, Y.; Anpalagan, A. Fair data allocation and trajectory optimization for UAV-assisted mobile edge computing. IEEE Commun. Lett. 2019, 23, 2357–2361. [Google Scholar] [CrossRef]
  81. Zhang, W.; Li, L.; Zhang, N.; Han, T.; Wang, S. Air-ground integrated mobile edge networks: A survey. IEEE Access 2020, 8, 125998–126018. [Google Scholar] [CrossRef]
  82. Shang, B.; Liu, L. Mobile-edge computing in the sky: Energy optimization for air–ground integrated networks. IEEE Internet Things J. 2020, 7, 7443–7456. [Google Scholar] [CrossRef]
  83. Narang, M.; Xiang, S.; Liu, W.; Gutierrez, J.; Chiaraviglio, L.; Sathiaseelan, A.; Merwaday, A. UAV-assisted edge infrastructure for challenged networks. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 60–65. [Google Scholar]
  84. Alsamhi, S.H.; Almalki, F.A.; AL-Dois, H.; Shvetsov, A.V.; Ansari, M.S.; Hawbani, A.; Gupta, S.K.; Lee, B. Multi-drone edge intelligence and SAR smart wearable devices for emergency communication. Wirel. Commun. Mob. Comput. 2021, 2021, 1–12. [Google Scholar] [CrossRef]
  85. Saif, A.; Dimyati, K.; Noordin, K.A.; Alsamhi, S.H.; Hawbani, A. Multi-UAV and SAR collaboration model for disaster management in B5G networks. Internet Technol. Lett. 2021, e310. [Google Scholar] [CrossRef]
  86. Zhang, T.; Xu, Y.; Loo, J.; Yang, D.; Xiao, L. Joint computation and communication design for UAV-assisted mobile edge computing in IoT. IEEE Trans. Ind. Inform. 2019, 16, 5505–5516. [Google Scholar] [CrossRef] [Green Version]
  87. Wang, Z.; Gao, L.; Huang, J. Multi-cap optimization for wireless data plans with time flexibility. IEEE Trans. Mob. Comput. 2019, 19, 2145–2159. [Google Scholar] [CrossRef] [Green Version]
  88. Zhou, Z.; Feng, J.; Gu, B.; Ai, B.; Mumtaz, S.; Rodriguez, J.; Guizani, M. When mobile crowd sensing meets UAV: Energy-efficient task assignment and route planning. IEEE Trans. Commun. 2018, 66, 5526–5538. [Google Scholar] [CrossRef]
  89. Zhou, Z.; Liu, P.; Feng, J.; Zhang, Y.; Mumtaz, S.; Rodriguez, J. Computation resource allocation and task assignment optimization in vehicular fog computing: A contract-matching approach. IEEE Trans. Veh. Technol. 2019, 68, 3113–3125. [Google Scholar] [CrossRef]
  90. Nie, Y.; Zhao, J.; Gao, F.; Yu, F.R. Semi-Distributed Resource Management in UAV-Aided MEC Systems: A Multi-Agent Federated Reinforcement Learning Approach. IEEE Trans. Veh. Technol. 2021, 70, 13162–13173. [Google Scholar] [CrossRef]
  91. Wang, X.; Han, Y.; Leung, V.C.; Niyato, D.; Yan, X.; Chen, X. Convergence of edge computing and deep learning: A comprehensive survey. IEEE Commun. Surv. Tutorials 2020, 22, 869–904. [Google Scholar] [CrossRef] [Green Version]
  92. Wang, H.; Ke, H.; Sun, W. Unmanned-aerial-vehicle-assisted computation offloading for mobile edge computing based on deep reinforcement learning. IEEE Access 2020, 8, 180784–180798. [Google Scholar] [CrossRef]
  93. Liu, Q.; Shi, L.; Sun, L.; Li, J.; Ding, M.; Shu, F. Path planning for UAV-mounted mobile edge computing with deep reinforcement learning. IEEE Trans. Veh. Technol. 2020, 69, 5723–5728. [Google Scholar] [CrossRef] [Green Version]
  94. Gupta, A.; Sundhan, S.; Gupta, S.K.; Alsamhi, S.; Rashid, M. Collaboration of UAV and HetNet for better QoS: A comparative study. Int. J. Veh. Inf. Commun. Syst. 2020, 5, 309–333. [Google Scholar] [CrossRef]
  95. Alsamhi, S.; Rajput, N. Methodology for coexistence of high altitude platform ground stations and radio relay stations with reduced interference. Int. J. Sci. Eng. Res. 2012, 3, 1–7. [Google Scholar]
  96. Alsamhi, S.H.; Rajput, N. HAP antenna radiation pattern for providing coverage and service characteristics. In Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Delhi, India, 24–27 September 2014; pp. 1434–1439. [Google Scholar]
  97. Alsamhi, S.H.; Rajput, N. An efficient channel reservation technique for improved QoS for mobile communication deployment using high altitude platform. Wirel. Pers. Commun. 2016, 91, 1095–1108. [Google Scholar] [CrossRef]
  98. Chang, H.; Chen, Y.; Zhang, B.; Doermann, D. Multi-uav mobile edge computing and path planning platform based on reinforcement learning. IEEE Trans. Emerg. Top. Comput. Intell. 2021, 6, 489–498. [Google Scholar] [CrossRef]
  99. Alsamhi, S.; Ma, O.; Ansari, M. Predictive estimation of the optimal signal strength from unmanned aerial vehicle over internet of things using ANN. arXiv 2018, arXiv:1805.07614. [Google Scholar]
  100. Alsamhi, S.H.; Almalki, F.; Ma, O.; Ansari, M.S.; Lee, B. Predictive estimation of optimal signal strength from drones over IoT frameworks in smart cities. IEEE Trans. Mob. Comput. 2021. [Google Scholar] [CrossRef]
  101. Liu, Y.; Xie, S.; Zhang, Y. Cooperative offloading and resource management for UAV-enabled mobile edge computing in power IoT system. IEEE Trans. Veh. Technol. 2020, 69, 12229–12239. [Google Scholar] [CrossRef]
  102. Jiang, F.; Wang, K.; Dong, L.; Pan, C.; Xu, W.; Yang, K. Deep-learning-based joint resource scheduling algorithms for hybrid MEC networks. IEEE Internet Things J. 2019, 7, 6252–6265. [Google Scholar] [CrossRef] [Green Version]
  103. Yang, Z.; Chen, M.; Liu, X.; Liu, Y.; Chen, Y.; Cui, S.; Poor, H.V. AI-Driven UAV-NOMA-MEC in Next Generation Wireless Networks. IEEE Wirel. Commun. 2021, 28, 66–73. [Google Scholar] [CrossRef]
  104. Ullah, Z.; Al-Turjman, F.; Moatasim, U.; Mostarda, L.; Gagliardi, R. UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication. Comput. Netw. 2020, 182, 107478. [Google Scholar] [CrossRef]
  105. Yu, S.; Wang, X.; Langar, R. Computation offloading for mobile edge computing: A deep learning approach. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–6. [Google Scholar]
  106. Chen, L.; Zhao, R.; He, K.; Zhao, Z.; Fan, L. Intelligent ubiquitous computing for future UAV-enabled MEC network systems. Clust. Comput. 2021, 1–11. [Google Scholar] [CrossRef]
  107. Zhang, B.; Zhang, G.; Ma, S.; Yang, K.; Wang, K. Efficient multitask scheduling for completion time minimization in UAV-assisted mobile edge computing. Mob. Inf. Syst. 2020, 2020. [Google Scholar] [CrossRef]
  108. Diao, X.; Zheng, J.; Wu, Y.; Cai, Y.; Anpalagan, A. Joint trajectory design, task data, and computing resource allocations for NOMA-based and UAV-assisted mobile edge computing. IEEE Access 2019, 7, 117448–117459. [Google Scholar] [CrossRef]
  109. Liu, X.; Liu, Y.; Chen, Y.; Hanzo, L. Trajectory design and power control for multi-UAV assisted wireless networks: A machine learning approach. IEEE Trans. Veh. Technol. 2019, 68, 7957–7969. [Google Scholar] [CrossRef] [Green Version]
  110. Ma, X.; Yin, C.; Liu, X. Machine Learning Based Joint Offloading and Trajectory Design in UAV Based MEC System for IoT Devices. In Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 11–14 December 2020; pp. 902–909. [Google Scholar]
  111. Grasso, C.; Raftopoulos, R.; Schembra, G. Deep Q-Learning for Job Offloading Orchestration in a Fleet of MEC UAVs in 5G Environments. In Proceedings of the 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, 28 June–2 July 2021; pp. 186–190. [Google Scholar]
  112. Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun. 2020, 151, 518–538. [Google Scholar] [CrossRef]
  113. Chen, M.; Poor, H.V.; Saad, W.; Cui, S. Wireless communications for collaborative federated learning. IEEE Commun. Mag. 2020, 58, 48–54. [Google Scholar] [CrossRef]
  114. Pinyoanuntapong, P.; Janakaraj, P.; Wang, P.; Lee, M.; Chen, C. Fedair: Towards multi-hop federated learning over-the-air. In Proceedings of the 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Atlanta, GA, USA, 26–29 May 2020; pp. 1–5. [Google Scholar]
  115. Hosseinalipour, S.; Brinton, C.G.; Aggarwal, V.; Dai, H.; Chiang, M. From federated to fog learning: Distributed machine learning over heterogeneous wireless networks. IEEE Commun. Mag. 2020, 58, 41–47. [Google Scholar] [CrossRef]
  116. Zeng, T.; Semiari, O.; Mozaffari, M.; Chen, M.; Saad, W.; Bennis, M. Federated learning in the sky: Joint power allocation and scheduling with UAV swarms. In Proceedings of the ICC 2020–2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  117. Tang, Z.; Shi, S.; Chu, X. Communication-efficient decentralized learning with sparsification and adaptive peer selection. In Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), 29 November–1 December 2020; pp. 1207–1208. [Google Scholar]
  118. Nedic, A.; Ozdaglar, A. Distributed subgradient methods for multi-agent optimization. IEEE Trans. Autom. Control 2009, 54, 48–61. [Google Scholar] [CrossRef]
  119. Qu, Y.; Dai, H.; Zhuang, Y.; Chen, J.; Dong, C.; Wu, F.; Guo, S. Decentralized Federated Learning for UAV Networks: Architecture, Challenges, and Opportunities. IEEE Netw. 2021, 35, 156–162. [Google Scholar] [CrossRef]
  120. Zhang, Z.; Ma, S.; Yang, Z.; Xiong, Z.; Kang, J.; Wu, Y.; Zhang, K.; Niyato, D. Robust Semi-supervised Federated Learning for Images Automatic Recognition in Internet of Drones. arXiv 2022, arXiv:2201.01230. [Google Scholar] [CrossRef]
  121. Feng, W.; Zhao, N.; Ao, S.; Tang, J.; Zhang, X.; Fu, Y.; So, D.K.; Wong, K.K. Joint 3D trajectory design and time allocation for UAV-enabled wireless power transfer networks. IEEE Trans. Veh. Technol. 2020, 69, 9265–9278. [Google Scholar] [CrossRef] [Green Version]
  122. Xie, L.; Xu, J.; Zeng, Y. Common throughput maximization for UAV-enabled interference channel with wireless powered communications. IEEE Trans. Commun. 2020, 68, 3197–3212. [Google Scholar] [CrossRef] [Green Version]
  123. Yuan, X.; Yang, T.; Hu, Y.; Xu, J.; Schmeink, A. Trajectory design for UAV-enabled multiuser wireless power transfer with nonlinear energy harvesting. IEEE Trans. Wirel. Commun. 2020, 20, 1105–1121. [Google Scholar] [CrossRef]
  124. Hamdi, R.; Chen, M.; Said, A.B.; Qaraqe, M.; Poor, H.V. Federated Learning Over Energy Harvesting Wireless Networks. IEEE Internet Things J. 2021, 9, 92–103. [Google Scholar] [CrossRef]
  125. Do, Q.V.; Pham, Q.V.; Hwang, W.J. Deep Reinforcement Learning for Energy-Efficient Federated Learning in UAV-Enabled Wireless Powered Networks. IEEE Commun. Lett. 2021, 26, 99–103. [Google Scholar] [CrossRef]
  126. Pham, Q.V.; Le, M.; Huynh-The, T.; Han, Z.; Hwang, W.J. Energy-Efficient Federated Learning over UAV-Enabled Wireless Powered Communications. IEEE Trans. Veh. Technol. 2022, 71, 4977–4990. [Google Scholar] [CrossRef]
  127. Zhang, H.; Hanzo, L. Federated learning assisted multi-UAV networks. IEEE Trans. Veh. Technol. 2020, 69, 14104–14109. [Google Scholar] [CrossRef]
  128. Pokhrel, S.R. Federated Learning Meets Blockchain at 6G Edge: A Drone-Assisted Networking for Disaster Response. In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, London, UK, 25 September 2020; pp. 49–54. [Google Scholar]
  129. Pang, X.; Sheng, M.; Zhao, N.; Tang, J.; Niyato, D.; Wong, K.K. When UAV meets IRS: Expanding air-ground networks via passive reflection. IEEE Wirel. Commun. 2021, 28, 164–170. [Google Scholar] [CrossRef]
  130. Lu, W.; Ding, Y.; Gao, Y.; Hu, S.; Wu, Y.; Zhao, N.; Gong, Y. Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems. IEEE Trans. Ind. Inform. 2021, 18, 2704–2713. [Google Scholar] [CrossRef]
  131. Shang, B.; Shafin, R.; Liu, L. UAV Swarm-Enabled Aerial Reconfigurable Intelligent Surface (SARIS). IEEE Wirel. Commun. 2021, 28, 156–163. [Google Scholar] [CrossRef]
  132. Lim, W.Y.B.; Huang, J.; Xiong, Z.; Kang, J.; Niyato, D.; Hua, X.S.; Leung, C.; Miao, C. Towards federated learning in uav-enabled internet of vehicles: A multi-dimensional contract-matching approach. IEEE Trans. Intell. Transp. Syst. 2021, 22, 5140–5154. [Google Scholar] [CrossRef]
  133. Chen, M.; Mozaffari, M.; Saad, W.; Yin, C.; Debbah, M.; Hong, C.S. Caching in the sky: Proactive deployment of cache-enabled unmanned aerial vehicles for optimized quality-of-experience. IEEE J. Sel. Areas Commun. 2017, 35, 1046–1061. [Google Scholar] [CrossRef]
  134. Zhang, C.; Liu, X.; Xu, J.; Chen, T.; Li, G.; Jiang, F.; Li, X. An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service. In Proceedings of the 2021 IEEE International Conference on Web Services (ICWS), Chicago, IL, USA, 5–10 September 2021; pp. 500–505. [Google Scholar] [CrossRef]
  135. Li, R.; Li, X.; Xu, J.; Jiang, F.; Jia, Z.; Shao, D.; Pan, L.; Liu, X. Energy-aware decision-making for dynamic task migration in MEC-based unmanned aerial vehicle delivery system. Concurr. Comput. Pract. Exp. 2021, 33, e6092. [Google Scholar] [CrossRef]
  136. Motlagh, N.H.; Bagaa, M.; Taleb, T. UAV-based IoT platform: A crowd surveillance use case. IEEE Commun. Mag. 2017, 55, 128–134. [Google Scholar] [CrossRef] [Green Version]
  137. Tun, Y.K.; Dang, T.N.; Kim, K.; Anselwi, M.; Saad, W.; Hong, C.S. Collaboration in the Sky: A Distributed Framework for Task Offloading and Resource Allocation in Multi-Access Edge Computing. arXiv 2021, arXiv:2107.14502. [Google Scholar] [CrossRef]
  138. Wang, L.; Wang, K.; Pan, C.; Xu, W.; Aslam, N.; Nallanathan, A. Deep reinforcement learning based dynamic trajectory control for UAV-assisted mobile edge computing. IEEE Trans. Mob. Comput. 2021. [Google Scholar] [CrossRef]
  139. Li, M.; Cheng, N.; Gao, J.; Wang, Y.; Zhao, L.; Shen, X. Energy-efficient UAV-assisted mobile edge computing: Resource allocation and trajectory optimization. IEEE Trans. Veh. Technol. 2020, 69, 3424–3438. [Google Scholar] [CrossRef]
  140. Ren, T.; Niu, J.; Dai, B.; Liu, X.; Hu, Z.; Xu, M.; Guizani, M. Enabling efficient scheduling in large-scale UAV-assisted mobile edge computing via hierarchical reinforcement learning. IEEE Internet Things J. 2021, 9, 7095–7109. [Google Scholar] [CrossRef]
  141. Chen, X.; Wu, C.; Chen, T.; Liu, Z.; Bennis, M.; Ji, Y. Age of information-aware resource management in UAV-assisted mobile-edge computing systems. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  142. Xu, H.; Huang, W.; Zhou, Y.; Yang, D.; Li, M.; Han, Z. Edge computing resource allocation for unmanned aerial vehicle assisted mobile network with blockchain applications. IEEE Trans. Wirel. Commun. 2021, 20, 3107–3121. [Google Scholar] [CrossRef]
  143. Wang, L.; Wang, K.; Pan, C.; Xu, W.; Aslam, N.; Hanzo, L. Multi-agent deep reinforcement learning-based trajectory planning for multi-UAV assisted mobile edge computing. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 73–84. [Google Scholar] [CrossRef]
  144. Ei, N.N.; Alsenwi, M.; Tun, Y.K.; Han, Z.; Hong, C.S. Energy-efficient resource allocation in multi-UAV-assisted two-stage edge computing for beyond 5G networks. IEEE Trans. Intell. Transp. Syst. 2022. [Google Scholar] [CrossRef]
  145. Wang, H.; Shen, Y.; Wu, S.; Wang, S. Resource Allocation and Trajectory Optimization for UAV Assisted Mobile Edge Computing Systems with Energy Harvesting. In Neural Computing for Advanced Applications; Zhang, H., Yang, Z., Zhang, Z., Wu, Z., Hao, T., Eds.; Springer: Singapore, 2021; pp. 417–431. [Google Scholar]
  146. Zhou, Z.; Feng, J.; Tan, L.; He, Y.; Gong, J. An air-ground integration approach for mobile edge computing in IoT. IEEE Commun. Mag. 2018, 56, 40–47. [Google Scholar] [CrossRef]
  147. Luo, Y.; Ding, W.; Zhang, B. Optimization of task scheduling and dynamic service strategy for multi-UAV-enabled mobile-edge computing system. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 970–984. [Google Scholar] [CrossRef]
  148. Tong, L.; Li, Y.; Gao, W. A hierarchical edge cloud architecture for mobile computing. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  149. Urgaonkar, R.; Wang, S.; He, T.; Zafer, M.; Chan, K.; Leung, K.K. Dynamic service migration and workload scheduling in edge-clouds. Perform. Eval. 2015, 91, 205–228. [Google Scholar] [CrossRef]
  150. Awada, U.; Zhang, J.; Chen, S.; Li, S. Air-to-Air Collaborative Learning: A Multi-Task Orchestration in Federated Aerial Computing. 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 5–10 September 2021; pp. 671–680. [Google Scholar]
  151. Zhu, S.; Gui, L.; Zhao, D.; Cheng, N.; Zhang, Q.; Lang, X. Learning-based computation offloading approaches in UAVs-assisted edge computing. IEEE Trans. Veh. Technol. 2021, 70, 928–944. [Google Scholar] [CrossRef]
  152. Liu, Y.; Nie, J.; Li, X.; Ahmed, S.H.; Lim, W.Y.B.; Miao, C. Federated learning in the sky: Aerial-ground air quality sensing framework with UAV swarms. IEEE Internet Things J. 2020, 8, 9827–9837. [Google Scholar] [CrossRef]
  153. Grasso, C.; Schembra, G. A fleet of MEC UAVs to extend a 5G network slice for video monitoring with low-latency constraints. J. Sens. Actuator Netw. 2019, 8, 3. [Google Scholar] [CrossRef] [Green Version]
  154. Sharma, M.; Gupta, A.; Gupta, S.K.; Alsamhi, S.H.; Shvetsov, A.V. Survey on unmanned aerial vehicle for Mars exploration: Deployment use case. Drones 2021, 6, 4. [Google Scholar] [CrossRef]
  155. Alsamhi, S.H.; Ma, O.; Ansari, M. Convergence of machine learning and robotics communication in collaborative assembly: Mobility, connectivity and future perspectives. J. Intell. Robot. Syst. 2020, 98, 541–566. [Google Scholar] [CrossRef]
  156. Alsamhi, S.H.; Ma, O.; Ansari, M.S. Survey on artificial intelligence based techniques for emerging robotic communication. Telecommun. Syst. 2019, 72, 483–503. [Google Scholar] [CrossRef]
  157. Sharma, V.; Choudhary, G.; Ko, Y.; You, I. Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot). IEEE Access 2018, 6, 43368–43383. [Google Scholar] [CrossRef]
  158. Nooralishahi, P.; Ibarra-Castanedo, C.; Deane, S.; López, F.; Pant, S.; Genest, M.; Avdelidis, N.P.; Maldague, X.P. Drone-Based Non-Destructive Inspection of Industrial Sites: A Review and Case Studies. Drones 2021, 5, 106. [Google Scholar] [CrossRef]
  159. Alsamhi, S.H.; Ma, O.; Ansari, M.S.; Gupta, S.K. Collaboration of drone and internet of public safety things in smart cities: An overview of qos and network performance optimization. Drones 2019, 3, 13. [Google Scholar] [CrossRef] [Green Version]
  160. Shahmoradi, J.; Talebi, E.; Roghanchi, P.; Hassanalian, M. A comprehensive review of applications of drone technology in the mining industry. Drones 2020, 4, 34. [Google Scholar] [CrossRef]
  161. Sahal, R.; Alsamhi, S.H.; Breslin, J.G.; Brown, K.N.; Ali, M.I. Digital twins collaboration for automatic erratic operational data detection in industry 4.0. Appl. Sci. 2021, 11, 3186. [Google Scholar] [CrossRef]
  162. Sahal, R.; Alsamhi, S.H.; Brown, K.N.; O’Shea, D.; McCarthy, C.; Guizani, M. Blockchain-empowered digital twins collaboration: Smart transportation use case. Machines 2021, 9, 193. [Google Scholar] [CrossRef]
  163. Sahal, R.; Alsamhi, S.H.; Brown, K.N.; O’Shea, D.; Alouffi, B. Blockchain-Based Digital Twins Collaboration for Smart Pandemic Alerting: Decentralized COVID-19 Pandemic Alerting Use Case. Comput. Intell. Neurosci. 2022, 2022, 1–14. [Google Scholar] [CrossRef]
  164. Sahal, R.; Alsamhi, S.H.; Breslin, J.G.; Ali, M.I. Industry 4.0 towards Forestry 4.0: Fire detection use case. Sensors 2021, 21, 694. [Google Scholar] [CrossRef]
  165. Kitpo, N.; Inoue, M. Early rice disease detection and position mapping system using drone and IoT architecture. In Proceedings of the 2018 12th South East Asian Technical University Consortium (SEATUC), Yogyakarta, Indonesia, 12–13 March 2018; Volume 1, pp. 1–5. [Google Scholar]
  166. Mazzia, V.; Comba, L.; Khaliq, A.; Chiaberge, M.; Gay, P. UAV and machine learning based refinement of a satellite-driven vegetation index for precision agriculture. Sensors 2020, 20, 2530. [Google Scholar] [CrossRef]
  167. Grosso, R.; Mecca, U.; Moglia, G.; Prizzon, F.; Rebaudengo, M. Collecting built environment information using UAVs: Time and applicability in building inspection activities. Sustainability 2020, 12, 4731. [Google Scholar] [CrossRef]
  168. Panday, U.S.; Shrestha, N.; Maharjan, S.; Pratihast, A.K.; Shrestha, K.L.; Aryal, J. Correlating the plant height of wheat with above-ground biomass and crop yield using drone imagery and crop surface model, a case study from Nepal. Drones 2020, 4, 28. [Google Scholar] [CrossRef]
  169. Agapiou, A. Vegetation extraction using visible-bands from openly licensed unmanned aerial vehicle imagery. Drones 2020, 4, 27. [Google Scholar] [CrossRef]
  170. Hentschke, M.; Pignaton de Freitas, E.; Hennig, C.H.; Girardi da Veiga, I.C. Evaluation of altitude sensors for a crop spraying drone. Drones 2018, 2, 25. [Google Scholar] [CrossRef] [Green Version]
  171. Chamola, V.; Hassija, V.; Gupta, V.; Guizani, M. A comprehensive review of the COVID-19 pandemic and the role of IoT, drones, AI, blockchain, and 5G in managing its impact. IEEE Access 2020, 8, 90225–90265. [Google Scholar] [CrossRef]
  172. Jeyabalan, V.; Nouvet, E.; Meier, P.; Donelle, L. Context-specific challenges, opportunities, and ethics of drones for healthcare delivery in the eyes of program managers and field staff: A multi-site qualitative study. Drones 2020, 4, 44. [Google Scholar] [CrossRef]
  173. Saif, A.; Dimyati, K.; Noordin, K.A.; Shah, N.S.M.; Alsamhi, S.; Abdullah, Q.; Farah, N. Distributed clustering for user devices under UAV coverage area during disaster recovery. In Proceedings of the 2021 IEEE International Conference in Power Engineering Application (ICPEA), Selangor, Malaysia, 8–9 March 2021; pp. 143–148. [Google Scholar]
  174. Saif, A.; Dimyati, K.; Noordin, K.A.; Shah, N.S.M.; Alsamhi, S.; Abdullah, Q. Energy-efficient tethered UAV deployment in B5G for smart environments and disaster recovery. In Proceedings of the 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), Sana’a, Yemen, 10–12 August 2021; pp. 1–5. [Google Scholar]
  175. Cowley, D.C.; Moriarty, C.; Geddes, G.; Brown, G.L.; Wade, T.; Nichol, C.J. UAVs in context: Archaeological airborne recording in a national body of survey and record. Drones 2017, 2, 2. [Google Scholar] [CrossRef] [Green Version]
  176. Alsamhi, S.H.; Shvetsov, A.V.; Kumar, S.; Shvetsova, S.V.; Alhartomi, M.M.; Hawbani, A.; Rajput, N.S.; Srivastava, S.; Saif, A.; Nyangaresi, V.O. UAV Computing-Assisted Search and Rescue Mission Framework for Disaster and Harsh Environment Mitigation. Drones 2022, 6, 154. [Google Scholar] [CrossRef]
  177. Mangewa, L.J.; Ndakidemi, P.A.; Munishi, L.K. Integrating UAV technology in an ecological monitoring system for community wildlife management areas in Tanzania. Sustainability 2019, 11, 6116. [Google Scholar] [CrossRef] [Green Version]
  178. Rees, A.F.; Avens, L.; Ballorain, K.; Bevan, E.; Broderick, A.C.; Carthy, R.R.; Christianen, M.J.; Duclos, G.; Heithaus, M.R.; Johnston, D.W. The potential of unmanned aerial systems for sea turtle research and conservation: A review and future directions. Endanger. Species Res. 2018, 35, 81–100. [Google Scholar] [CrossRef] [Green Version]
  179. Salhaoui, M.; Molina-Molina, J.C.; Guerrero-González, A.; Arioua, M.; Ortiz, F.J. Autonomous underwater monitoring system for detecting life on the seabed by means of computer vision cloud services. Remote Sens. 2020, 12, 1981. [Google Scholar] [CrossRef]
  180. Wang, D.; Shao, Q.; Yue, H. Surveying wild animals from satellites, manned aircraft and unmanned aerial systems (UASs): A review. Remote Sens. 2019, 11, 1308. [Google Scholar] [CrossRef] [Green Version]
  181. Congress, S.S.; Puppala, A.J.; Lundberg, C.L. Total system error analysis of UAV-CRP technology for monitoring transportation infrastructure assets. Eng. Geol. 2018, 247, 104–116. [Google Scholar] [CrossRef]
  182. Outay, F.; Mengash, H.A.; Adnan, M. Applications of unmanned aerial vehicle (UAV) in road safety, traffic and highway infrastructure management: Recent advances and challenges. Transp. Res. Part A Policy Pract. 2020, 141, 116–129. [Google Scholar] [CrossRef]
  183. Malihi, S.; Valadan Zoej, M.J.; Hahn, M. Large-scale accurate reconstruction of buildings employing point clouds generated from UAV imagery. Remote Sens. 2018, 10, 1148. [Google Scholar] [CrossRef] [Green Version]
  184. Alsamhi, S.H.; Ma, O.; Ansari, M.S.; Almalki, F.A. Survey on collaborative smart drones and internet of things for improving smartness of smart cities. IEEE Access 2019, 7, 128125–128152. [Google Scholar] [CrossRef]
  185. Alsamhi, S.H.; Afghah, F.; Sahal, R.; Hawbani, A.; Al-qaness, M.A.; Lee, B.; Guizani, M. Green internet of things using UAVs in B5G networks: A review of applications and strategies. Ad Hoc Netw. 2021, 117, 102505. [Google Scholar] [CrossRef]
  186. Qian, Y.; Wu, D.; Bao, W.; Lorenz, P. The internet of things for smart cities: Technologies and applications. IEEE Netw. 2019, 33, 4–5. [Google Scholar] [CrossRef]
  187. Orgeira-Crespo, P.; Ulloa, C.; Rey-Gonzalez, G.; Pérez García, J.A. Methodology for indoor positioning and landing of an unmanned aerial vehicle in a smart manufacturing plant for light part delivery. Electronics 2020, 9, 1680. [Google Scholar] [CrossRef]
  188. Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.L.; Bergstrom, M.; Euler, S.; Wang, Y.P.E. The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef] [Green Version]
  189. Salh, A.; Audah, L.; Alhartomi, M.A.; Kim, K.S.; Alsamhi, S.H.; Almalki, F.A.; Abdullah, Q.; Saif, A.; Algethami, H. Smart Packet Transmission Scheduling in Cognitive IoT Systems: DDQN Based Approach. IEEE Access 2022, 10, 50023–50036. [Google Scholar] [CrossRef]
  190. Salh, A.; Audah, L.; Kim, K.S.; Alsamhi, S.H.; Alhartomi, M.A.; Abdullah, Q.; Almalki, F.A.; Algethami, H. Refiner GAN algorithmically enabled deep-RL for guaranteed traffic packets in real-time URLLC B5G communication systems. IEEE Access 2022, 10, 50662–50676. [Google Scholar] [CrossRef]
  191. Du, A.; Shen, Y.; Zhang, Q.; Tseng, L.; Aloqaily, M. CRACAU: Byzantine machine learning meets industrial edge computing in industry 5.0. IEEE Trans. Ind. Inform. 2021, 18, 5435–5445. [Google Scholar] [CrossRef]
  192. Maddikunta, P.K.R.; Pham, Q.V.; Prabadevi, B.; Deepa, N.; Dev, K.; Gadekallu, T.R.; Ruby, R.; Liyanage, M. Industry 5.0: A survey on enabling technologies and potential applications. J. Ind. Inf. Integr. 2022, 26, 100257. [Google Scholar] [CrossRef]
  193. Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for federated learning on user-held data. arXiv 2016, arXiv:1611.04482. [Google Scholar]
  194. Zhi, Y.; Fu, Z.; Sun, X.; Yu, J. Security and Privacy Issues of UAV: A Survey. Mob. Netw. Appl. 2019, 25, 95–101. [Google Scholar] [CrossRef]
  195. Syed, F.; Gupta, S.K.; Hamood Alsamhi, S.; Rashid, M.; Liu, X. A survey on recent optimal techniques for securing unmanned aerial vehicles applications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4133. [Google Scholar] [CrossRef]
  196. Desnitsky, V.; Kotenko, I. Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures. Simul. Model. Pract. Theory 2021, 107, 102244. [Google Scholar] [CrossRef]
  197. Ossamah, A. Blockchain as a solution to Drone Cybersecurity. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–9. [Google Scholar] [CrossRef]
  198. Ch, R.; Srivastava, G.; Reddy Gadekallu, T.; Maddikunta, P.K.R.; Bhattacharya, S. Security and privacy of UAV data using blockchain technology. J. Inf. Secur. Appl. 2020, 55, 102670. [Google Scholar] [CrossRef]
  199. Xu, X.; Zeng, Y.; Guan, Y.L.; Zhang, R. Overcoming endurance issue: UAV-enabled communications with proactive caching. IEEE J. Sel. Areas Commun. 2018, 36, 1231–1244. [Google Scholar] [CrossRef] [Green Version]
  200. Mao, Y.; Zhang, J.; Letaief, K.B. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J. Sel. Areas Commun. 2016, 34, 3590–3605. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Scenarios of MEC implemented using UAV computing.
Figure 1. Scenarios of MEC implemented using UAV computing.
Drones 06 00177 g001
Figure 2. UAV in MEC network for disaster area.
Figure 2. UAV in MEC network for disaster area.
Drones 06 00177 g002
Figure 3. UAV operation: (a) as a MEC and (b) as a relay to a terrestrial MEC.
Figure 3. UAV operation: (a) as a MEC and (b) as a relay to a terrestrial MEC.
Drones 06 00177 g003
Figure 4. Cloudlets of multi-UAV computing collaboration and UAV-assisted MEC.
Figure 4. Cloudlets of multi-UAV computing collaboration and UAV-assisted MEC.
Drones 06 00177 g004
Figure 5. FL for UAV computing collaboration.
Figure 5. FL for UAV computing collaboration.
Drones 06 00177 g005
Figure 6. UAV Computing Application Domains.
Figure 6. UAV Computing Application Domains.
Drones 06 00177 g006
Table 1. Summary of existing surveys on UAV computing.
Table 1. Summary of existing surveys on UAV computing.
Ref.Survey TitleHighlightABCD
[33]
(2021)
UAV-enabled mobile edge computing for
IoT based on AI: A comprehensive review
Using DL and ML approaches in UAV-enabled
MEC network architecture applications
×4.0
[32]
(2021)
Energy efficient UAV-enabled mobile edge
computing for IoT devices: a review
Using UAV-enabled MEC for energy-efficient
resource management approaches in smart IoT
device networks
×××
[34]
(2022)
Survey on computation offloading in UAV-
Enabled mobile edge computing
Focusing on computation offloading in UAV-enabled MEC××
[35]
(2019)
Survey on machine learning techniques for
UAV-based communications
Discussing UAV-enabled MEC based on ML×××
[24]
(2020)
Federated learning for UAVs-enabled wireless
networks: Use cases, challenges, and open problems
Discussing application of federated learning for UAVs in
wireless networks
××
[36]
(2022)
A Survey on the Convergence of Edge Computing
and AI for UAVs: Opportunities and Challenges
Discussing UAVs, AI, edge computing, and edge AI,
as well as technical issues and UAV applications
××
[37]
(2021)
Artificial intelligence for UAV-enabled wireless
networks: A survey
Combining intelligence at UAV networks in order
to solve issues regarding UAV applications
×
[38]
(2022)
Bridging the Urban–Rural Connectivity Gap through
Intelligent Space, Air, and Ground Networks
Introducing AI techniques for improving connectivity
in remote areas using SAGINs
××××
Our
work
Computing in the Sky: A Survey on Intelligent Ubiquit
ous Computing for UAV-Assisted 6G Networks and
Industry 4.0/5.0
Discussing intelligent UAV computing technology to enable
6G networks over industry 4.0/5.0 smart environments
A = Federated Learning; B = 6G; C = Computing; D = Industry 4.0/5.0.
Table 2. Summaries of the technical work on UAV computing.
Table 2. Summaries of the technical work on UAV computing.
Ref.HighlightZYRTPerformance Metrics
ABCDEFGHIJKLM
[147]
(2021)
Multi-UAVs act as computer
servers for processing data
gathered from users
××××××××××××××
[18]
(2019)
Single UAV as edge server and wireless
energy transmitter to IoT devices
×××××××××××××
[78]
(2021)
UAV-enabled MEC for
autonomous delivery system.
××××××××××
[67]
(2021)
IoT energy consumption in
UAV-enabled MEC system
××××××××××××
[151]
(2021)
MEC with UAVs for traffic
management
××××××××××××
[83]
(2017)
UAV-based MEC for enhancing
network connectivity in
uncovered areas.
××××××××××××××
[86]
(2019)
Reducing the computational
complexity of UAV-aided
MEC.
××××××××××××××
[98]
(2021)
RL for QoS enhancement
in a multi-UAV-enabled
MEC system.
×××××××××××××
[102]
(2019)
UAVs in a hybrid MEC
network.
×××××××××××××
[79]
(2020)
Intelligent task offloading
algorithm for UAV-empowered
MEC services.
××××××××××××
[153]
(2019)
Enhancing the performance
of the entire MEC UAV
platform.
××× ×××××××
[107]
(2020)
UAV-assisted MEC
acting as a relay between
MEC and users.
×× ×××××××××
[103]
(2021)
AI techniques are
used in a UAV-enabled
MEC for the NOMA system.
×× ×××××××××
[146]
(2018)
Integration of UAV and
ground vehicles in terms
of computing, communication,
and storage.
××××××××××××
[17]
(2019)
UAV for task offloading
improvement with reducing
energy consumption.
××××××××××××
[68]
(2020)
UAV-aided MEC of a
multiuser system based on
frequency division multiple access
for demonstrating task offloading.
××××××××××××
[108]
(2019)
UAV-aided MEC based on
NOMA.
××××××××××
[90]
(2020)
Power control and resource
allocation in a UAV-empowered
MEC system.
××××××××
[11]
(2018)
UAVs as MEC-assisted
wireless communication networks
to achieve excellent QoS
for users.
×××××××××××
[70]
(2021)
UAV-enabled MEC to
optimize users’ task offloading
and energy demands.
××××××××××
[73]
(2019)
Securing a UAV-MEC system
where multiple users offload
large computing tasks.
××××××××××××
A = security; B = computation offloading; C = latency; D = energy; E = bandwidth; F = connectivity; G = reliability; H = energy consumption; I = B5G; J = cost; K = QoS; L = resource allocation; M = task offloading; Z = AI; Y = FL; R = UAV; T = UAV computing.
Table 3. Continued from Table 2, summaries of the related work on UAV computing.
Table 3. Continued from Table 2, summaries of the related work on UAV computing.
Ref.HighlightZYRTPerformance Metrics
ABCDEFGHIJKLM
[72]
(2019)
Securing a UAV-enabled
MEC from offloading and
network attacks.
×××××××××××××
[130]
(2021)
Enhancing the processing capacity
and the security of UAV-enabled
MEC by optimizing the trajectory
and resources.
××××××××××××××
[53]
(2019)
Improving the security and
privacy of UAVs.
××××××××××××××
[54]
(2021)
Integration of blockchain and FL
for drone edge computing.
××××××
[63]
(2020)
DNN for image processing
in UAV, i.e., an edge
server and improving product
quality and cost.
××××××××××××
[74]
(2020)
Reducing computation time
and energy usage by using
task offloading techniques
for multi-UAV-enabled MEC.
×××××××××××
[71]
(2017)
Calculation of offloading task
in UAV-enabled MEC.
×××××××××××
[69]
(2018)
UAV deployment as a
mobile edge server to
manage real-time offloading
processing activities for users.
××××××××××××
A = security; B = computation offloading; C = latency; D = energy; E = bandwidth; F = connectivity; G = reliability; H = energy consumption; I = B5G; J = cost; K = QoS; L = resource allocation; M = task offloading; Z = AI; Y = FL; R = UAV; T = UAV computing.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alsamhi, S.H.; Shvetsov, A.V.; Kumar, S.; Hassan, J.; Alhartomi, M.A.; Shvetsova, S.V.; Sahal, R.; Hawbani, A. Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0. Drones 2022, 6, 177. https://doi.org/10.3390/drones6070177

AMA Style

Alsamhi SH, Shvetsov AV, Kumar S, Hassan J, Alhartomi MA, Shvetsova SV, Sahal R, Hawbani A. Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0. Drones. 2022; 6(7):177. https://doi.org/10.3390/drones6070177

Chicago/Turabian Style

Alsamhi, Saeed Hamood, Alexey V. Shvetsov, Santosh Kumar, Jahan Hassan, Mohammed A. Alhartomi, Svetlana V. Shvetsova, Radhya Sahal, and Ammar Hawbani. 2022. "Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0" Drones 6, no. 7: 177. https://doi.org/10.3390/drones6070177

APA Style

Alsamhi, S. H., Shvetsov, A. V., Kumar, S., Hassan, J., Alhartomi, M. A., Shvetsova, S. V., Sahal, R., & Hawbani, A. (2022). Computing in the Sky: A Survey on Intelligent Ubiquitous Computing for UAV-Assisted 6G Networks and Industry 4.0/5.0. Drones, 6(7), 177. https://doi.org/10.3390/drones6070177

Article Metrics

Back to TopTop