Next Article in Journal
Design of Non-Conventional Flight Control Systems for Bioinspired Micro Air Vehicles
Next Article in Special Issue
Non-Terrestrial Networks with UAVs: A Projection on Flying Ad-Hoc Networks
Previous Article in Journal
Constrained Predictive Tracking Control for Unmanned Hexapod Robot with Tripod Gait
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones

1
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 11671, Saudi Arabia
2
Department of Industrial Engineering, College of Engineering at Alqunfudah, Umm Al-Qura University, Mecca 24382, Saudi Arabia
3
Saudi Aramco Cybersecurity Chair, Networks and Communications Department, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam 31441, Saudi Arabia
4
Department of Computer Science, Community College, King Saud University, Riyadh 11437, Saudi Arabia
5
Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra 11911, Saudi Arabia
6
Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
7
Research Centre, Future University in Egypt, New Cairo 11845, Egypt
8
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam Bin Abdulaziz University, AlKharj 16278, Saudi Arabia
*
Author to whom correspondence should be addressed.
Drones 2022, 6(9), 247; https://doi.org/10.3390/drones6090247
Submission received: 29 July 2022 / Revised: 27 August 2022 / Accepted: 1 September 2022 / Published: 9 September 2022
(This article belongs to the Special Issue Recent Advances in UAVs for Wireless Networks)

Abstract

:
Over the last few years, unmanned aerial vehicles (UAV), also called drones, have attracted considerable interest in the academic field and exploration in the research field of wireless sensor networks (WSN). Furthermore, the application of drones aided operations related to the agriculture industry, smart Internet of things (IoT), and military support. Now, the usage of drone-based IoT, also called Internet of drones (IoD), and their techniques and design challenges are being investigated by researchers globally. Clustering and routing aid to maximize the throughput, reducing routing, and overhead, and making the network more scalable. Since the cluster network used in a UAV adopts an open transmission method, it exposes a large surface to adversaries that pose considerable network security problems to drone technology. This study develops a new dwarf mongoose optimization-based secure clustering with a multi-hop routing scheme (DMOSC-MHRS) in the IoD environment. The goal of the DMOSC-MHRS technique involves the selection of cluster heads (CH) and optimal routes to a destination. In the presented DMOSC-MHRS technique, a new DMOSC technique is utilized to choose CHs and create clusters. A fitness function involving trust as a major factor is included to accomplish security. Besides, the DMOSC-MHRS technique designs a wild horse optimization-based multi-hop routing (WHOMHR) scheme for the optimal route selection process. To demonstrate the enhanced performance of the DMOSC-MHRS model, a comprehensive experimental assessment is made. An extensive comparison study demonstrates the better performance of the DMOSC-MHRS model over other approaches.

1. Introduction

With the growth of modern wireless communication technology, the Internet of things (IoT) is becoming a broadly utilized technology in the domain of several intellectual applications and services [1]. Eventually, the rise in interconnectivity between numerous things or objects has produced massive data. But, such IoT applications were not as much as effective for making decisions, and data perception lacked the participation of human cognition processing. Currently, cognitive computing has grabbed the attention of IoT authors [2]. The IoT with the cognitive capability called cognitive IoT (CIoT) allows an object or things to study several data from devices or gadgets which is connected, i.e., sensors, UAVs, etc. Drones or unmanned aerial vehicles (UAV) are becoming a developing technology that has communication, sensing, storage, and processing abilities [3]. It is employed in diverse industries such as the Internet of things (IoT) scenarios, intelligent transportation systems, and smart cities. The placement of a swarm of UAVs for IoT services is a reality for numerous applications namely tracking and surveillance, package delivery, search and rescue, and public safety [4]. Such IoT-assisted applications facilitate the new pattern called the Internet of drones (IoD). It could offer a capability to a UAV drone network for accessing drones and users through the Internet. The features of drones are easy mobility and deployment, which makes UAVs helpful for transmission. Since drones are movable, it is utilized as information carriers i.e., sending the data to remote destinations [5]. When the destination does not in direct interaction range of the UAV, the transmission happens through multiple hops. The swarm of UAVs cooperates to constitute a network for sending the data to the destinations. Though reliability, survivability, and scalability were the distinctive traits of IoD; however, it put forward many complexities in transmissions and drones networking [6]. The UAV’s higher mobility makes the topologies very rapid, leading to communication issues.
The self-organizing UAV network constitutes a plurality of clusters by a clustering technique, with every cluster made up of some cluster members (CM) and a cluster head (CH) [7]. Such CHs form the high-layer virtual backbone network and present two critical operations they are direct interactions between CHs and a medium for cross-cluster transmission. The CMs in the same cluster interact directly via a single hop; however, the data sent between clusters were initially forwarded to the CH, and then forwarded to the CH of the cluster in which the destiny node was positioned via the virtual backbone networks [8]. The CH after sends to the destiny nodes for achieving cross-cluster transmission. In a clustered IoD, when a compromised node was chosen as a CH, this node not just illegitimately acquired information from the normal node but even forge data distributed to the sink [9]. In addition, attackers could grab control of the entire network by compromising tiny CHs; compromising every CHs becomes a very alluring target for them. As a drone-related network suffers from the same susceptibilities, secure CH choosing for the IoD becomes vital for its successful operations [10].

1.1. Existing Works on Cluster-Based Routing in IoD

In [11], the operation of drones in ad hoc mode and their cooperation with vehicles in vehicular ad hoc networks (VANET) were learned to aid the detection and routing procedure of malicious vehicles. A routing protocol termed vehicular routing unit (VRU) can be devised that involves two different ways they are routing packets of data between UAVs using a protocol termed VRU_u and supplying packets of data between vehicles by using drones utilizing a protocol called VRU_vu. In [12], a novel systematic structure can be presented for solving the issue of multi-drone collaborative task allotment. It can be developed as a combinatorial optimizing issue and resolved by the enhanced clustering technique. The main goal was to enable multi-drone for completing tasks has less energy utilization. Since the drone count increased, it appears that flight safety problems such as collisions between the drones, and an enhanced multi-UAV collision-resistant approach related to the enhanced artificial potential domain were devised. Namdev et al. [13] modeled a whale optimization algorithm-related optimized link state routing (WOA-OLSR) over a flying ad hoc network (FANET) for providing optimum routing for secure and energy-efficient FANET. The efficacy of OLSR can be improvised with the help of WOA and assessed performance displays superior efficacy of WOA-OLSR.
In [14], the optimal CH selection depends upon blockchain (BC) transactions, residual energy (RE), mobility, online duration, connectivity, and reputation by utilizing improved artificial bee colony optimization (IABC). The presented IABC uses two distinct search equations for onlooker bee and employee bee for enhancing exploitation abilities and convergence rate. In addition, a lightweight BC consensus technique, the AI-proof of witness consensus algorithm (AI-PoWCA) can be projected that employs the optimal CH for mining. In [15], drones that can act as mobile sinks were taken into account and prevailing work on wireless sensor network (WSN)-UAV atmosphere authentication was protracted. A secure authentication structure utilizing an elliptic-curve crypto-system was provided. The projected structure can be assessed to assure it is resilient to renowned potential assaults relevant to password guessing, data confidentiality, key impersonation, and mutual authentication.
In [16], a secure and reliable routing protocol (SecRIP) for the FANET can be devised for reliable and efficient data communication. This script operates toward the improvement of the quality of experience (QoE) metrics and quality of service (QoS). The script operates on two methods: the dragonfly technique and the chaotic algae technique; such methods serve the functionalities of cluster management, selection, and data communication in intercluster. Khan et al. [17] project a new routing approach as the extension of AntHocNet because of mobile features; it is called a flying nature-inspired method. Moreover, a case study was performed for improving the signal power with the help of modeled learning technique named decision tree (DT).

1.2. Paper Contributions

This study develops a new dwarf mongoose optimization-based secure clustering with a multi-hop routing scheme (DMOSC-MHRS) in the IoD environment. The goal of the DMOSC-MHRS technique involves the selection of CHs and optimal routes to a destination. In the presented DMOSC-MHRS technique, a new DMOSC technique is utilized to choose CHs and create clusters. A fitness function (FF) involving trust as a major factor is included to accomplish security. Besides, the DMOSC-MHRS technique designs a wild horse optimization-based multi-hop routing (WHOMHR) scheme for the optimal route selection process. To demonstrate the enhanced performance of the DMOSC-MHRS model, a comprehensive experimental assessment is made.

1.3. Paper Organization

The organization of the paper is given as follows. Section 2 introduces the proposed DMOSC-MHRS model and the experimental analysis of the DMOSC-MHRS model is provided in Section 3. Lastly, Section 4 concludes the study with major findings and possible future enhancements.

2. The Proposed Secure Clustering with Routing Protocol

In this study, a new DMOSC-MHRS technique has been developed for secure cluster-based communication in the IoD environment. The DMOSC-MHRS technique proficiently chooses CHs and optimal routes to a destination. The major intention of the proposed model is to accomplish security, energy efficiency, and improved lifetime. Figure 1 showcases the overall procedure of the DMOSC-MHRS algorithm.

2.1. Overview of DMO Algorithm

The DMO technique inspires the performance of dwarf mongooses when determining their food [18]. Generally, the DMO starts with setting the primary value to a group of solutions utilizing the subsequent equation:
x i , j = l j + r a n d × ( u j l j )
whereas r a n d refers to the arbitrary number created in zero and one. u j and l j implies the restrictions of the searching area. The swarm of DMO has three groups such as babysitters, alpha group, and scouts. All the groups have their individual performance for capturing the food, and the particulars of these groups are provided as:

2.1.1. Alpha Group

The fitness of all the solutions is calculated if the population was established. Equation (2) computes the possible value for all the fitness populations, and alpha female ( α ) is selective and dependent on this probability.
α = f i t i Σ i = 1 n f i t i
n relates to the number of mongooses from the alpha group. The number of babysitters was represented by bs. Peep is the vocalization of the dominant female which keeps the family on track.
All the mongooses sleep from the primary sleeping mound that is fixed . The DMO utilized for generating a candidate food place.
X i + 1 = X i + p h i × p e e p
The sleeping mound was offered in Equation (4) then all the repetitions, whereas p h i signifies the uniformly distributed arbitrary value in −1 and 1 .
s m i = f i t i + 1 f i t i   max   { | f i t i + 1 , f i t i | }
Equation (5) comprises the average value of sleeping mounds.
φ = Σ i = 1 n s m i n
If the babysitting alters condition is met, this technology advances to the scouting phase, in which the next sleeping mound or food source is assumed.

2.1.2. Scout Group

As mongooses are identified to not go back to past sleep mounds, the scout’s appearance is for the next sleeping mounds, making sure to search. In this method, scout and forage were carried out concurrently. This drive was exhibited then a successful/unsuccessful search for a novel sleeping mound. Specifically, the migration of mongooses is contingent on their entire efficiency. The scout mongoose is defined in Equation (12).
X i + 1 = { X i C F p h i r a n d [ X i M ]   i f   φ i + 1 > φ i   X i + C F p h i r a n d [ X i M ]
In which r a n d demonstrates a random number from the range of zero and one, C F = ( 1 i t e r Max i t e r ) ( 2 i t e r Max i t e r ) whereas the parameter which regulates the mongoose group, the collective-volitive movement was reduced linearly as the iterations developed. M = Σ i = 1 n X i × s m i X i in which the mongoose’s movement to the novel sleeping mound was defined by this vector.

2.1.3. Babysitters Group

The babysitters were commonly inferior group members which continue with the young and cycle on a regular basis allowing the alpha female (mother) for leading the rest of the group on daily forage expeditions. The number of babysitters was proportional to the size of the population; it can be a stimulus for the technique by decreasing the entire population size dependent upon the percentage set. The scout and food source data earlier indicated by the family members replaces them by resetting the use of the babysitter interchange parameter.

2.2. Design of DMOSC Technique

In the presented DMOSC-MHRS technique, a new DMOSC technique is utilized to choose CHs and create clusters. The FF in this MOTAHO is used for choosing the topical CH derived. Now, the FF is expressed by the four dissimilar parameters namely number of hops, trust, distance, and residual energy (RE) [19].
Trust: In CH selection, trust is regarded as a key parameter in the FF to improve security. The mutual trust made in a specific period is used for accomplishing the transmission.
Direct trust (DT) is predicated on the approximate period of communication among i t h node and d t h destination n . DT is measured as the gap on the list of actual and the projected period of i t h node for authenticating the public key expressed by the d t h destination. Hence, DT including i t h node and d t h the destination is given by,
D T i d ( τ ) = 1 3 [ D T i d ( τ 1 ) ( τ a p p x τ e s t τ a p p x ) + ω ]
In Equation (7), τ a p p x defines the approximate period and τ e s t determines the estimated period to authenticate the public keys. In other words, τ a p p x and τ e s t are the expected period for sending and receiving the public keys via the destination and also the node. ω implies the opinion parameter of this node.
The node with the opinion parameter is plotted based on DT. However, the node without a witness parameter is authenticated by the indirect trust (IDT) as follows that is given by,
I D T i d ( τ ) = 1 r i = 1 r D T i d ( d )
In Equation (8), r denotes the total neighbors of node i.
Recent trust (RT) is measured by the DT and IDT along with the crucial validity and admits the destination or sink that is given in part of the moment.
R T i d ( τ ) = α * D T i d ( τ ) + ( 1 α ) * I D T i d ( τ )
where α = 0.3 .
g 1 = D T i d ( τ ) + I D T i d ( τ ) + R T i d ( τ )
Distance: It determines the distance ( g 2 ) amongst the CH to the BS and the next-hop node. Since the energy usage of nodes is proportionate to the distance of the communication path. Consequently, it is essential to determine the communication path with a lesser distance for diminishing energy utilization.
Residual energy: The candidate CH with higher RE ( g 3 ) formulated in Equation (11) is greatly desirable at the time of CH selection. Since the CH has to perform different operations namely data transmission, collection, and aggregation.
g 3 = i = 1 a E C H i
In the above equation, E C H i illustrates the RE of CH.
Some hops: Some standard nodes belonging to the specific CH are described by some hops. The energy utilization of CH is lesser when it has a lesser number of hops. Therefore, the CH with lesser hops is regarded in the number of hops ( g 4 ) and CH selection is formulated as follows.
g 4 = i = 1 a I i
In Equation (12), the number of standard nodes for the specific CH can be represented as I i .   The mentioned objective values were converted into one objective related to the weighted sum technique as presented below in Equation (13).
f = δ 1 × g 1 + δ 2 × g 2 + δ 3 × g 3 + δ 4 × g 4
where the δ 1 ,   δ 2 ,   δ 3 , and δ 4 represents the weights allotted to every FF value. The devised FF was utilized from the DMOSC approach to choose an optimum CH.

2.3. Process Involved in WHOMHR Technique

In this study, the DMOSC-MHRS technique designs a WHOMHR scheme for optimal route selection process. The WHO algorithm is a metaheuristic algorithm dependent upon the social life of wild horses [20]. During this technique, distinct performances are demonstrated by wild horses namely leading, chasing, grazing, hunting, and mating. The horses were categorized into two social groups such as territorial and non-territorial. But, the WHO technique concentrates on the non-territorial group that comprises group leaders named stallions, several mares, and their offspring. The part of stallion is to lead the group and connect with mares, as the foals start their lives with grazing performance. In addition, if the foals exceed the age of puberty, they can leave their group and integrate into other groups. The process of the WHO technique was outlined in the subsequent steps:

2.3.1. Population Initialization

During this stage, the parameter needed for the WHO technique was established for evaluating the primary solution, afterward upgraded based on the technique process. The horses were separated into many groups and all the groups have one stallion. This division was estimated employing in Equation (14) as follows:
H = Q × S R
where H denotes the entire amount of groups, Q refers to the population size, and S R signifies the number of stallions from the population.

2.3.2. Grazing Behavior

This step presents the grazing performance of foals before they can obtain puberty. The stallion was considered at the center of the grazing region, whereas the residual group members were adjacent to the center of the region. This performance is demonstrated employing in Equation (15):
X i + 1 , H j = 2 A × c o s ( 2 π R A ) × ( S j X i , H j ) + S j
In which i signifies the number of group members, j denotes the number of stallions, X ι + 1 , H j ,   X i , H j stands for the place of group members from the next and present iteration correspondingly, A has an arbitrarily selective adaptive process, R represents the arbitrary number in −2 and 2, and S j denotes the stallion place.

2.3.3. Horse Mating Behavior

This phase offers the performance of foals afterward obtaining puberty age. As previously noted, foals leave their groups and combine with another group for mating and for preventing fathers from marrying their daughters and sisters. Besides, this performance was demonstrated in employing Equation (16):
X H , l t = M e a n ( X H , i u ,   X H , j w ) a n d   i j l
where X H , l t signifies the place of horse t of group l ,   X H , i u refers to the place of foals u of group i , and X H , j w signifies the place of foal w of group j , in which the foal u mate with foal w from the group l . Therefore, an essential state to mate was obtained. Algorithm 1 demonstrates the working of the WHO algorithm.
Algorithm 1: Pseudocode of WHO algorithm
Arbitrary initiation of the primary horse population
Parameter initiatin
Determine fitness of Horses
Produce Foal groups and elect Stallions
Determine optimum horse
While the stopping criteria were unsatisfied
Determine TDR
For the number of Stallions
  Find Z
  For the number of Foals under various groups
     If   rand > P C
        Update foal position
    End
  End
  If rand > 0.5
     Update   S t a l l i o n G ¯  position
  Else
     Update   S t a l l i o n G i ¯ b position
  End
   If   cost ( S t a l l i o n   G i ¯ ) < c o s t ( Stallion)
     Stallion = S t a l l i o n G i ¯
  End
  Arrange Foals of the group by cost
  Elect Foal with the least cost
  If the cost (Foa1) < cos (Stallion)
    Swap Foal and Stallion position
  End
End
Upgrade optimal
End

2.3.4. Group Leadership

During this stage, the group stallion leads the members of the group to the waterhole for food. Likewise, the stallion fights with another stallion for dominating the waterhole. This performance is defined utilizing Equation (17):
S ι + 1 , G = { 2 A × c o s ( 2 π R A ) × ( W P S i , G ) + W P   i f   r 1 > 0.5 2 A × c o s ( 2 π R A ) × ( W P S i , G ) W P   i f   r 1 0.5
In which S ι + 1 , G ,   S ι , G demonstrates the next and present place of leaders correspondingly, W P implies the place of waterholes and r 1 is a random vector among zero and one.

2.3.5. Leaders’ Exchange and Selection

At last, the group leader was chosen for obtaining an optimum fitness value. During all the iterations, the group leader was selected, whereas an optimum leader is obtained amongst the entire leaders from the iterations. This step is demonstrated by Equation (18):
S i , G = { X i , G i f   cos   t ( X i , G ) <   cos   t ( S i , G ) S i , G i f   cos   t ( X i , G ) >   cos   t ( S i , G )
During this work, the ending condition is for performing the optimized procedure up to the maximal count of iterations (Max. It). The optimized approach was computed employing 100 iterations, with a population size of 30.
An important objective of the WHOMHR approach is maximizing network lifespan and minimizing energy consumption of all drones [21]. Assuming that h 1 is a most main function such that CHs select next-hop CHs with superior RE to route the data such that for maximizing the network lifespan viz., h 1 is maximized. Consider h 2 to be another objective function that is minimal distance amongst CHs to next-hop CHs and next-hop CHs to BS. Decreasing the energy consumption of networks requires minimizing the h 2 . Assume that h 3 is the 3rd objective function such that CHs are select as the next-hop CHs with lesser node degree. To enhance the network, lifespan requires minimizing h 3 .   Let b i j be a Boolean variable determined as:
b   ij   = { 1   i f   n e x t h o p ( C H i ) = C H j , i , j 1 i ,   j m 0   O t h e r w i s e
M i n i m i z e   F = 1 / h 1 × β 1 + h 2 × β 2 + h 2 × β 3
subject to,
d i s ( C H i ,   C H j ) × d   max   C H j { C + B S }
j = 1 m b i j = 1   a n d   1 j
0 < β 1 ,   β 2 ,   β 3 < 1

3. Results and Discussion

In this section, the secure communication performance of the DMOSC-MHRS model is investigated in detail. The proposed model is simulated using MATLAB under three different scenarios based on grid size.
  • Scenario-1: Grid size of 1000 × 1000 m2
  • Scenario-2: Grid size of 2000 × 2000 m2
  • Scenario-3: Grid size of 3000 × 3000 m2
Table 1 and Figure 2 highlight the cluster building time (CBT) of the DMOSC-MHRS approach under varying drones with existing methods such as the hybrid self-organized clustering scheme (HSCS), bio-inspired clustering scheme for FANET (BICSF), and SCA-ITV [22]. The experimental values indicated that the DMOSC-MHRS algorithm has demonstrated enhanced results under all drones. For example, with 15 drones, the DMOSC-MHRS model offered a lower CBT of 0.33 s whereas the SCA-ITV, BICSF, and HSCS algorithms obtained higher CBT of 0.61 s, 0.44 s, and 0.44 s, correspondingly. In line, with 20 drones, the DMOSC-MHRS approach presented a lower CBT of 0.47 s whereas the SCA-ITV, BICSF, and HSCS methods acquired higher CBT of 0.84 s, 0.70 s, and 0.59 s, correspondingly. Along with 25 drones, the DMOSC-MHRS technique has presented a lower CBT of 0.62 s whereas the SCA-ITV, BICSF, and HSCS algorithms gained higher CBT of 1.05 s, 0.86 s, and 0.79 s, correspondingly.
Table 2 presents an overall energy consumption (ECM) inspection of the DMOSC-MHRS algorithm with recent models on different scenarios. Figure 3 reports a comparative ECM assessment of the DMOSC-MHRS technique with existing models on Scenario-1.
The figure indicates that the DMOSC-MHRS approach shows enhanced results with minimal ECM values. For instance, with 15 drones, the DMOSC-MHRS model gained the least ECM of 0.33 J whereas the SCA-ITV, BICSF, and HSCS models obtained higher ECM of 0.61 J, 0.44 J, and 0.44 J, respectively. In the meantime, with 20 drones, the DMOSC-MHRS approach has achieved the least ECM of 0.47 J whereas the SCA-ITV, BICSF, and HSCS methodologies obtained higher ECM of 0.84 J, 0.70 J, and 0.59 J, correspondingly. In due course, with 25 drones, the DMOSC-MHRS method acquired the least ECM of 0.62 J whereas the SCA-ITV, BICSF, and HSCS algorithms reached higher ECM of 1.05 J, 0.86 J, and 0.79 J, correspondingly.
Figure 4 reports a brief ECM assessment of the DMOSC-MHRS methodology with existing models in Scenario-2. The figure denoting the DMOSC-MHRS approach shows enhanced results with minimum ECM values. For example, with 15 drones, the DMOSC-MHRS approach gained least ECM of 1.07 J whereas the SCA-ITV, BICSF, and HSCS models obtained higher ECM of 1.73 J, 1.66 J, and 1.39 J, correspondingly. Simultaneously with 20 drones, the DMOSC-MHRS approach attained the least ECM of 1.47 J whereas the SCA-ITV, BICSF, and HSCS techniques obtained higher ECM of 2.81 J, 2.49 J, and 2.25 J, correspondingly. Eventually, with 25 drones, the DMOSC-MHRS method acquired the least ECM of 2.11 J whereas the SCA-ITV, BICSF, and HSCS algorithms reached higher ECM of 3.57 J, 3.30 J, and 2.91 J, correspondingly.
Figure 5 reports a comprehensive ECM assessment of the DMOSC-MHRS approach with existing models on Scenario-3. The figure representing the DMOSC-MHRS technique exhibits enhanced results with minimal ECM values. For example, with 15 drones, the DMOSC-MHRS model gained the least ECM of 1.23 J whereas the SCA-ITV, BICSF, and HSCS approaches reached higher ECM of 2.78 J, 2.03 J, and 1.77 J, correspondingly. Concurrently, with 20 drones, the DMOSC-MHRS approach attained the least ECM of 1.95 J whereas the SCA-ITV, BICSF, and HSCS methodologies obtained higher ECM of 3.38 J, 2.74 J, and 2.58 J, correspondingly. Similarly, with 25 drones, the DMOSC-MHRS model gained the least ECM of 2.55 J whereas the SCA-ITV, BICSF, and HSCS approaches reached higher ECM of 3.95 J, 3.52 J, and 23.18 J, correspondingly.
A comprehensive cluster lifetime (CLT) inspection of the DMOSC-MHRS model with other models is performed on different scenarios in Table 3. Figure 6 performs a comparative analysis of the DMOSC-MHRS technique with recent models in Scenario-1. The figure highlights that the DMOSC-MHRS algorithm displays enhanced performance with maximal CLT values under all drones. For example, with 15 drones, the DMOSC-MHRS methodology attained enhanced results with improved CLT of 52.34 s whereas the SCA-ITV, BICSF, and HSCS models obtained reduced CLT of 36.73 s, 46.37 s, and 48.67 s, respectively. Also, with 25 drones, the DMOSC-MHRS approach reached enhanced results with improved CLT of 50.35 s whereas the SCA-ITV, BICSF, and HSCS approaches gained reduced CLT of 32.60 s, 40.41 s, and 44.54 s, correspondingly. Along with 35 drones, the DMOSC-MHRS technique reached enhanced results with improved CLT of 48.36 s whereas the SCA-ITV, BICSF, and HSCS models obtained reduced CLT of 28.78 s, 34.74 s, and 37.65 s, correspondingly.
Figure 7 portrays a comparative analysis of the DMOSC-MHRS algorithm with recent models in Scenario-2. The figure highlights that the DMOSC-MHRS methodology shows enhanced performance with maximal CLT values under all drones. For example, with 15 drones, the DMOSC-MHRS approach attained enhanced results with an improved CLT of 55.71 s whereas the SCA-ITV, BICSF, and HSCS methodologies reached reduced CLT of 43.85 s, 50.78 s, and 52.78 correspondingly. Besides, with 25 drones, the DMOSC-MHRS model attained enhanced results with improved CLT of 53.24 s whereas the SCA-ITV, BICSF, and HSCS models obtained reduced CLT of 37.70 s, 44.78 s, and 47.86 s, correspondingly. Further, with 35 drones, the DMOSC-MHRS approach achieved enhanced results with improved CLT of 49.70 s whereas the SCA-ITV, BICSF, and HSCS models obtained reduced CLT of 32.77 s, 38.77 s, and 41.39 s, correspondingly.
Figure 8 depicts a detailed study of the DMOSC-MHRS technique with recent models in Scenario-3. The figure points out that the DMOSC-MHRS approach displays enhanced performance with maximum CLT values under all drones. For example, with 15 drones, the DMOSC-MHRS approach attained enhanced results with an improved CLT of 58.59 s whereas the SCA-ITV, BICSF, and HSCS algorithms reached reduced CLT of 48.78 s, 55.01 s, and 56.26 s, correspondingly. Besides, with 25 drones, the DMOSC-MHRS technique gained enhanced results with improved CLT of 56.26 s whereas the SCA-ITV, BICSF, and HSCS techniques achieved reduced CLT of 38.81 s, 45.51 s, and 50.49 s, correspondingly. Along with 35 drones, the DMOSC-MHRS approach gained enhanced results with improved CLT of 52.83 s whereas the SCA-ITV, BICSF, and HSCS models obtained reduced CLT of 35.69 s, 40.83 s, and 43.79 s, correspondingly.
Table 4 and Figure 9 highlight the reliability (REL) of the DMOSC-MHRS model under varying drones. The experimental values indicate that the DMOSC-MHRS model has demonstrated enhanced results under all drones. For instance, with 15 drones, the DMOSC-MHRS model offered a higher REL of 94.29% whereas the SCA-ITV, BICSF, and HSCS techniques obtained lower REL of 87.36%, 89.13%, and 90.43%, respectively. Concurrently, with 20 drones, the DMOSC-MHRS approach presented a higher REL of 94.90% whereas the SCA-ITV, BICSF, and HSCS algorithms attained lower REL of 88.05%, 89.60%, and 91.06%, correspondingly. Concurrently, with 25 drones, the DMOSC-MHRS method rendered a higher REL of 94.98% whereas the SCA-ITV, BICSF, and HSCS approaches attained lower REL of 89.56%, 90.91%, and 92.52%, correspondingly. Finally, the experimental values demonstrated the enhanced performance of the DMOSC-MHRS model compared to recent models.

4. Conclusions

In this study, a new DMOSC-MHRS algorithm was devised for secure cluster-based communication in the IoD environment. The DMOSC-MHRS technique proficiently chooses CHs and optimal routes to a destination. In the presented DMOSC-MHRS approach, a new DMOSC technique is utilized to choose CHs and create clusters. A FF involving trust as a major factor is included to accomplish security. Besides, the DMOSC-MHRS technique designs a WHOMHR scheme for the optimal route selection process. To demonstrate the enhanced performance of the DMOSC-MHRS model, a comprehensive experimental assessment is made. Extensive comparison studies illustrate the better performance of the DMOSC-MHRS model over other approaches, with maximum reliability of 96.99%. Therefore, the proposed model can be employed in future real-time applications such as environmental monitoring, forest fire detection, disaster management, search and rescue, and smart cities. In the future, the performance of the DMOSC-MHRS algorithm can be enhanced by the utilization of data aggregation approaches, thereby enhancing overall network efficiency. In addition, the overall network performance can be improved by the use of unequal clustering techniques to mitigate hot spot problems.

Author Contributions

Conceptualization, F.S.A. and J.S.A.; methodology, K.A.A.; software, A.M.H.; validation, H.A., M.A.E. and A.Y.; formal analysis, A.Y.; investigation, A.M.; resources, A.M.; data curation, A.M.H.; writing—original draft preparation, F.S.A., A.A., J.S.A. and H.A.; writing—review and editing, K.A.A. and A.A.; visualization, A.M.; supervision, A.M.H.; project administration, J.S.A.; funding acquisition, F.S.A. and A.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R319), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: 22UQU4340237DSR47. Research Supporting Project number (RSP2022R444), King Saud University, Riyadh, Saudi Arabia.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rovira-Sugranes, A.; Razi, A.; Afghah, F.; Chakareski, J. A review of AI-enabled routing protocols for UAV networks: Trends, challenges, and future outlook. Ad Hoc Netw. 2022, 130, 102790. [Google Scholar] [CrossRef]
  2. Nazib, R.A.; Moh, S. Routing protocols for unmanned aerial vehicle-aided vehicular ad hoc networks: A survey. IEEE Access 2020, 8, 77535–77560. [Google Scholar] [CrossRef]
  3. Gupta, V.; Seth, D. Design issues for developing routing protocols for flying ad hoc network. Multimed. Technol. Internet Things Environ. 2022, 3, 135–145. [Google Scholar]
  4. Lagkas, T.; Argyriou, V.; Bibi, S.; Sarigiannidis, P. UAV IoT framework views and challenges: Towards protecting drones as “Things”. Sensors 2018, 18, 4015. [Google Scholar] [CrossRef] [PubMed]
  5. Alsamhi, S.H.; Shvetsor, A.V.; Shvetsova, S.V.; Hawbani, A.; Guizan, M.; Alhartomi, M.A.; Ma, O. Blockchain-Empowered Security and Energy Efficiency of Drone Swarm Consensus for Environment Exploration. IEEE Trans. Green Commun. Netw. 2022. [Google Scholar] [CrossRef]
  6. Gopi, S.P.; Magarini, M.; Alsamhi, S.H.; Shvetsov, A.V. Machine learning-assisted adaptive modulation for optimized drone-user communication in b5g. Drones 2021, 5, 128. [Google Scholar] [CrossRef]
  7. Sharma, B.; Obaidat, M.S.; Sharma, V.; Hsiao, K.F. Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions. Int. J. Commun. Syst. 2020, 33, e4628. [Google Scholar] [CrossRef]
  8. Arafat, M.Y.; Moh, S. A survey on cluster-based routing protocols for unmanned aerial vehicle networks. IEEE Access 2018, 7, 498–516. [Google Scholar] [CrossRef]
  9. Semiz, F.; Polat, F. Solving the area coverage problem with UAVs: A vehicle routing with time windows variation. Robot. Auton. Syst. 2020, 126, 103435. [Google Scholar] [CrossRef]
  10. Wang, H.; Fang, H.; Wang, X. Safeguarding cluster heads in UAV swarm using edge intelligence: Linear discriminant analysis-based cross-layer authentication. IEEE Open J. Commun. Soc. 2021, 2, 1298–1309. [Google Scholar] [CrossRef]
  11. Fatemidokht, H.; Rafsanjani, M.K.; Gupta, B.B.; Hsu, C.H. Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2021, 22, 4757–4769. [Google Scholar] [CrossRef]
  12. Fu, Z.; Mao, Y.; He, D.; Yu, J.; Xie, G. Secure multi-UAV collaborative task allocation. IEEE Access 2019, 7, 35579–35587. [Google Scholar] [CrossRef]
  13. Namdev, M.; Goyal, S.; Agarwal, R. An optimized communication scheme for energy efficient and secure flying ad-hoc network (FANET). Wirel. Pers. Commun. 2021, 120, 1291–1312. [Google Scholar] [CrossRef]
  14. Zhao, L.; Saif, M.B.; Hawbani, A.; Min, G.; Peng, S.; Lin, N. A novel improved artificial bee colony and blockchain-based secure clustering routing scheme for FANET. China Commun. 2021, 18, 103–116. [Google Scholar] [CrossRef]
  15. Ever, Y.K. A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Comput. Commun. 2020, 155, 143–149. [Google Scholar] [CrossRef]
  16. Bhardwaj, V.; Kaur, N.; Vashisht, S.; Jain, S. SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks. Trans. Emerg. Telecommun. Technol. 2021, 32, e4068. [Google Scholar] [CrossRef]
  17. Khan, I.U.; Shah, S.B.H.; Wang, L.; Aziz, M.A.; Stephan, T.; Kumar, N. Routing protocols & unmanned aerial vehicles autonomous localization in flying networks. Int. J. Commun. Syst. 2021, e4885. [Google Scholar] [CrossRef]
  18. Aldosari, F.; Abualigah, L.; Almotairi, K.H. A Normal Distributed Dwarf Mongoose Optimization Algorithm for Global Optimization and Data Clustering Applications. Symmetry 2022, 14, 1021. [Google Scholar] [CrossRef]
  19. Veerabadrappa, K.; Lingareddy, S.C. Secure Routing using Multi-Objective Trust Aware Hybrid Optimization for Wireless Sensor Networks. Int. J. Intell. Eng. Syst. 2022, 15, 540–548. [Google Scholar]
  20. Ali, M.H.; Kamel, S.; Hassan, M.H.; Tostado-Véliz, M.; Zawbaa, H.M. An improved wild horse optimization algorithm for reliability based optimal DG planning of radial distribution networks. Energy Rep. 2022, 8, 582–604. [Google Scholar] [CrossRef]
  21. Rao, P.C.; Lalwani, P.; Banka, H.; Rao, G. Competitive swarm optimization based unequal clustering and routing algorithms (CSO-UCRA) for wireless sensor networks. Multimed. Tools Appl. 2021, 80, 26093–26119. [Google Scholar] [CrossRef]
  22. Aftab, F.; Khan, A.; Zhang, Z. Hybrid self-organized clustering scheme for drone based cognitive Internet of Things. IEEE Access 2019, 7, 56217–56227. [Google Scholar] [CrossRef]
Figure 1. The overall process of the DMOSC-MHRS algorithm.
Figure 1. The overall process of the DMOSC-MHRS algorithm.
Drones 06 00247 g001
Figure 2. CBT analysis of DMOSC-MHRS approach under distinct drones.
Figure 2. CBT analysis of DMOSC-MHRS approach under distinct drones.
Drones 06 00247 g002
Figure 3. ECM analysis of DMOSC-MHRS approach under Scenario-1.
Figure 3. ECM analysis of DMOSC-MHRS approach under Scenario-1.
Drones 06 00247 g003
Figure 4. ECM analysis of DMOSC-MHRS approach under Scenario-2.
Figure 4. ECM analysis of DMOSC-MHRS approach under Scenario-2.
Drones 06 00247 g004
Figure 5. ECM analysis of DMOSC-MHRS approach under Scenario-3.
Figure 5. ECM analysis of DMOSC-MHRS approach under Scenario-3.
Drones 06 00247 g005
Figure 6. CLT analysis of DMOSC-MHRS approach under Scenario-1.
Figure 6. CLT analysis of DMOSC-MHRS approach under Scenario-1.
Drones 06 00247 g006
Figure 7. CLT analysis of DMOSC-MHRS approach under Scenario-2.
Figure 7. CLT analysis of DMOSC-MHRS approach under Scenario-2.
Drones 06 00247 g007
Figure 8. CLT analysis of DMOSC-MHRS approach under Scenario-3.
Figure 8. CLT analysis of DMOSC-MHRS approach under Scenario-3.
Drones 06 00247 g008
Figure 9. Reliability analysis of DMOSC-MHRS approach under distinct drones.
Figure 9. Reliability analysis of DMOSC-MHRS approach under distinct drones.
Drones 06 00247 g009
Table 1. CBT analysis of DMOSC-MHRS approach with existing algorithms under distinct drones.
Table 1. CBT analysis of DMOSC-MHRS approach with existing algorithms under distinct drones.
Cluster Building Time (s)
No. of DronesSCA-ITVBICSFHSCSDOC-MHRS
150.610.440.440.33
200.840.700.590.47
251.050.860.790.62
301.191.060.920.73
351.251.141.110.89
Table 2. ECM analysis of DMOSC-MHRS approach with existing algorithms under distinct scenarios.
Table 2. ECM analysis of DMOSC-MHRS approach with existing algorithms under distinct scenarios.
Energy Consumption (J)
No. of DronesSCA-ITVBICSFHSCSDMOSC-MHRS
Scenario-1
150.610.440.440.33
200.840.700.590.47
251.050.860.790.62
301.191.060.920.73
351.251.141.110.89
Scenario-2
151.731.661.391.07
202.812.492.251.47
253.573.302.912.11
304.373.903.202.76
354.664.143.773.02
Scenario-3
152.782.031.771.23
203.382.742.581.95
253.953.523.182.55
304.524.043.662.91
354.664.463.953.45
Table 3. CLT analysis of DMOSC-MHRS approach with existing algorithms under distinct scenarios.
Table 3. CLT analysis of DMOSC-MHRS approach with existing algorithms under distinct scenarios.
Cluster Life Time (s)
No. of DronesSCA-ITVBICSFHSCSDMOSC-MHRS
Scenario-1
1536.7346.3748.6752.34
2034.9044.0847.7552.49
2532.6040.4144.5450.35
3030.3138.7241.7849.13
3528.7834.7437.6548.36
Scenario-2
1543.8550.7852.7855.71
2040.7848.6351.0954.78
2537.7044.7847.8653.24
3036.0042.6246.1650.32
3532.7738.7741.3949.70
Scenario-3
1548.7855.0156.2658.59
2043.4850.6554.0857.50
2538.8145.5150.4956.26
3035.8544.8846.7552.83
3535.6940.8343.7952.83
Table 4. Reliability analysis of DMOSC-MHRS approach with existing algorithms under distinct drones.
Table 4. Reliability analysis of DMOSC-MHRS approach with existing algorithms under distinct drones.
Reliability (%)
No. of DronesSCA-ITVBICSFHSCSDMOSC-MHRS
1587.3689.1390.4394.29
2088.0589.6091.0694.90
2589.5690.9192.5294.98
3090.6392.0593.7795.56
3591.9093.6695.1196.99
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alrayes, F.S.; Alzahrani, J.S.; Alissa, K.A.; Alharbi, A.; Alshahrani, H.; Elfaki, M.A.; Yafoz, A.; Mohamed, A.; Hilal, A.M. Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones. Drones 2022, 6, 247. https://doi.org/10.3390/drones6090247

AMA Style

Alrayes FS, Alzahrani JS, Alissa KA, Alharbi A, Alshahrani H, Elfaki MA, Yafoz A, Mohamed A, Hilal AM. Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones. Drones. 2022; 6(9):247. https://doi.org/10.3390/drones6090247

Chicago/Turabian Style

Alrayes, Fatma S., Jaber S. Alzahrani, Khalid A. Alissa, Abdullah Alharbi, Hussain Alshahrani, Mohamed Ahmed Elfaki, Ayman Yafoz, Abdullah Mohamed, and Anwer Mustafa Hilal. 2022. "Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones" Drones 6, no. 9: 247. https://doi.org/10.3390/drones6090247

APA Style

Alrayes, F. S., Alzahrani, J. S., Alissa, K. A., Alharbi, A., Alshahrani, H., Elfaki, M. A., Yafoz, A., Mohamed, A., & Hilal, A. M. (2022). Dwarf Mongoose Optimization-Based Secure Clustering with Routing Technique in Internet of Drones. Drones, 6(9), 247. https://doi.org/10.3390/drones6090247

Article Metrics

Back to TopTop