DONE - 2021 - Priority-Aware - Fast - MAC - Protocol - For - UAV-Assisted - Industrial - IoT - Systems
DONE - 2021 - Priority-Aware - Fast - MAC - Protocol - For - UAV-Assisted - Industrial - IoT - Systems
ABSTRACT Many hazardous industrial incidents can occur due to the inadequate and inefficient monitoring
of the offshore plants. Manual inspections of the offshore plants on a regular basis is not only time consuming
but also dangerous regarding to human safety. For considering the safety measurement and alleviating the
burden of the manual inspection, unmanned aerial vehicles (UAVs) can be effectively utilized to collect
data from the remote industrial environment. In an industrial scenario, less delay is required for emergency
packets and high throughput is needed for monitoring packets. This paper proposes a priority-aware fast
MAC (PF-MAC) protocol for UAV-assisted industrial Internet-of-things (IIoT) systems, ensuring fast and
robust data delivery. At first, the IoT devices under the UAV communication range transmit a reservation
frame to the UAV to catch transmission opportunities using CSMA/CA. The devices utilize static traffic
priority and a novel adaptive backoff mechanism during CSMA/CA. After receiving the reservation frames
from the IoT devices, the UAV calculates the dynamic device priority based on their static traffic priority,
communication duration, sampling frequency, and remaining energy. Then, time slot is assigned by the UAV
to each device for data transmission. To ensure fairness, if a device fails in contention during the CSMA/CA
period, the static traffic priority is raised in the next retransmission. There is no prior work in the literature
that considers both the traffic priority and the device priority to ensure Quality of Service in IIoT and related
systems. According to our performance study, the proposed PF-MAC outperforms the conventional protocols
in terms of delay and throughput.
INDEX TERMS Internet of Things, unmanned aerial vehicle, medium access control, traffic priority, device
priority, delay, quality of service.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 9, 2021 57089
S. Khisa, S. Moh: PF-MAC Protocol for UAV-Assisted IIoT Systems
to both academia and industry. Many organizations such as Therefore, limited communication time is one of the chal-
Global Information Grid [11], Oneweb [12], and SpaceX [13] lenges while developing a UAV–IoT communication system.
began their SAGIN ventures in recent years. SAGIN can be At most times, UAVs are equipped with directional anten-
used in many functional areas such as earth observation and nas and the formation of coverage in ground is circular. The
mapping, intelligent transport [14], and disaster rescue [15] ground devices can access UAVs at different times. There-
due to the inherent benefits of broad coverage, high through- fore, fair access to the channel by all ground devices is neces-
put, and good resilience. Satellites, on the other hand, are able sarily important. In addition, a priority-based channel access
to provide consistent coverage to ocean, rural, and moun- mechanism may be needed for Quality of Service (QoS) in
tain areas. UAV-based networks can expand bandwidth for IoT networks. Furthermore, energy efficiency has become
large areas with high service requirements, while Internet a major challenge for remotely located IoT systems. Such
of Things (IoT) devices located on ground can provide the battery-constrained devices can need energy-efficient mecha-
connectivity with high data rate. In the next few years, SAGIN nisms for channel access and transmission control. Therefore,
will carry many facilities and resources from space to the selecting and developing a medium access control (MAC)
earth. protocol for data transmissions to handle the challenges is
Currently, we are experiencing a steady and continuous extremely demanding.
penetration of IoT concepts into the industrial domain, called Contention-based MAC protocols are popular owing to
industrial IoT (IIoT) or Industry 4.0. Every industry is trying their comprehensibility, adaptability, and less overhead char-
to enjoy the benefits of the industrial revolution by adopt- acteristics. Devices have the ability, without undue overhead,
ing IIoT features. Oil and gas industries are also not an to dynamically enter or quit the network. However, collisions
exception in this aspect. However, the processing of off- increase when the number of devices is high. However, a
shore oil and gas (O&G) is highly dynamic and precari- time-division multiple-access (TDMA)-based channel access
ous. O&G companies find it difficult to obtain a timely and mechanism can solve this problem. The TDMA system is
accurate image of their ongoing output due to the remote- divided into time slots, and each device can only trans-
ness and isolation of offshore rigs. Insufficient monitoring mit within its own allocated slots. [19]. The key primary
capacity may lead to catastrophic explosions that take a disadvantage of TDMA is that if there are a few num-
heavy toll on the environment, the lives of employees, and bers of IoT devices, the transmission slot can be wasted.
the reputation of companies. Tragic incidents such as the Therefore, to construct a scalable and versatile communica-
Exxon Valdez [16] and Deepwater Horizon oil spills [17] tion system for UAV-IoT communication network, only the
are examples. contention-based or contention-free mechanism cannot be
O&G manufacturing requires day-and-night observance of suitable.
various equipment (pipes, valves, wellheads, and tanks) and This paper proposes a priority-aware fast MAC (PF-MAC)
parameters (temperature, vibration, friction, flow rates, cor- protocol for UAV-assisted IIoT systems, ensuring fast and
rosion, and gas leaks) to maximize efficiency and protection. robust data delivery. The hybrid PF-MAC protocol integrates
However, conventional communication methods for linking a the benefits of both contention-based and contention-free
large number of different assets on offshore drilling platforms protocols for a remote IoT scenario.
are limited, costly, or cumbersome. Wired technology like This paper’s main contributions are as follows:
supervisory control and data acquisition (SCADA), which is 1) A priority-aware fast MAC (PF-MAC) protocol is pro-
suitable for real-time control management activities, is not posed for UAV-assisted remotely located IIoT systems
equipped for data acquisition from remote locations. In the with QoS requirements, which is a hybrid MAC pro-
center of the ocean, cellular connectivity is most possibly tocol incorporated with the CSMA/CA and TDMA
absent. In addition, setting up mesh networks is also a dif- mechanisms. The UAV acts to gather data from IoT
ficult effort due to the enormous scale, complexity, and dense devices as a wireless relay.
structure of oilrigs. The emerging use of UAVs in remote 2) We introduce an incremental contention priority (ICP)
monitoring applications makes it a suitable candidate for scheme wherein, if an IoT device fails in con-
O&G industries offshore. tention, its static priority is increased by one in the
Several UAV-based air–ground IoT systems have already next retransmission. It ensures the access fairness of
been proposed in the literature, wherein UAV is placed as a devices and prevents the low-priority devices from
mobile base station (BS) [18]. In this manner, UAV-based starvation.
networks eliminate complex routing schemes and greatly 3) We adopt the ABO mechanism wherein the backoff
improve data collection capabilities. Analyzing and devel- period is calculated according to the collision rate with
oping a UAV-based data acquisition system is highly difficult respect to the maximum retransmission of the channel.
due to the mobility and complex nature of the UAV. Devices It helps to reduce the delay significantly.
can reach UAV when the UAV is near to them because of 4) We design the dynamic priority of the devices based
the mobility of UAVs, and the devices lose their wireless on the static traffic priority, communication duration,
link connection if the UAV flies outside of their coverage. sampling rate, and remaining energy. This helps UAV
to allot a timeslot for the devices depending on the optimizing the hovering altitude of UAV and controlling the
significance and emergence of the data frame. power of ground users in SAGIN environment is discussed.
5) Our performance evaluation shows that, the PF-MAC Recently, machine learning-based techniques are becom-
beats the conventional protocols in terms of throughput, ing famous for its adaptability with the dynamic environ-
and average delay. ment. A Q-learning-based resource allocation algorithm is
presented in [30] by handling the channel collision problem in
The paper is organized in the following way. In Section II, dense wireless local area networks. In order to reduce energy
the related works are reviewed. In Section III, the system consumption, a Q-learning-based MAC protocol is proposed
model of our study is introduced. Subsequently, the pro- in [31] which is called greenMAC. Energy consumption
posed PF-MAC protocol is presented in detail in Section IV. decreases by managing the channel collisions properly, which
In Section V, the proposed PF-MAC is analyzed in terms of also enhances system reliability.
major performance metrics. In Section VI, the performance of Some studies have recently focused on the MAC protocol
PF-MAC evaluated via extensive simulation and compared to regarding the communication process between the UAV and
that of conventional schemes. In Section VII, the conclusion ground IoT devices. A comprehensive survey of MAC proto-
of the paper is drawn. cols for UAV-based IoT is presented in [32]. A UAV-based
IoT data collection system for aggressive and inaccessible
areas was proposed by Lin et al. [33]. The key aim of their
II. RELATED WORKS analysis was to improve the entire system’s energy efficiency.
This section presents the related works on UAV-based IoT For data collection, slotted ALOHA-based approach is fol-
communication network and the problems of existing studies, lowed. However, considerable energy is wasted due to col-
which form the motivation of our work. lided slots, empty slots, and overhearing. CSMA/CA-based
Several studies have considered UAV-based IoT networks. MAC protocol for a UAV-based IoT network was explored by
Different types of gateway selection algorithms and cloud- the authors of [34]. For each device in each cluster, the size
based stability-control mechanisms for flying ad-hoc net- of the contention window is modified according to the com-
works (FANETs) is presented in [20], where FANET and its munication period between the IoT and the UAVs. The CW
protocol architectures are also discussed. To provide seamless size must be periodically measured and modified, adding to
network coverage in dense urban areas, an energy-efficient the system’s consumption of energy and time.
UAV deployment strategy is presented in [21], which opti- In [35], a TDMA-based workflow model is introduced
mizes both UAV deployment and UAV recharging strategy where UAVs work both as a data collector and wireless
using particle swarm optimization (PSO). The efficient path power transferor to the ground IoT devices. However, due to
planning of UAVs for data gathering from IoT devices is a the usage of the TDMA for modeling the multi-workflow,
widely popular research area. A previous study [22] investi- high synchronization overhead is predicted. Our PF-MAC
gated the timely delivery of information using UAVs as relays can handle these problems by utilizing both contention-based
by optimizing UAV flight trajectory. Using a bio-inspired and contention-free mechanisms. Only successful devices in
algorithm, UAV path planning is developed in [23]. A joint contention use the timeslots for data transmission during a
optimization technique for UAV trajectory and resource allo- contention-free process. Hence, no energy is wasted due to
cation is considered in [24]. UAV is an essential element for empty slots. We used a predefined CW size for each IoT
creating a future smart city. In [25], a smart city architecture device according to its static priority. Therefore, there is no
is proposed where UAVs form a 5G hierarchical IoT net- need of frequent calculation of the CW size. Moreover, the
work in the sky, linking to a number of BSs on the ground. integration of contention-based and contention-free mecha-
An architecture is presented in [26] considering UAV-aided nisms helps to reduce the large synchronization overhead,
IoT for air quality sensing in smart cities. These studies which is a major problem in TDMA mechanism if we use it
mainly focused on network architecture and UAV trajectory for the entire process. Our proposed study will be presented
optimization. Only few of them have worked on the UAV–IoT exhaustively in Section IV.
data communication protocol. However, it is very important
for efficient data gathering from IoT devices. III. SYSTEM MODEL
The integration of UAVs with terrestrial and satellite net- We consider an industrial offshore environment such as
works has shown a new research path to the industries and oil/gas rig monitoring, situated far away from the main indus-
researchers. In [27], a comprehensive survey on space–air– try that is difficult and dangerous for human access on a daily
ground-integrated (SAGIN) network is presented that covers basis. It is quite impossible to obtain cellular connectivity in
design of network, resource allocation, and optimization. the middle of the ocean. The remote location and isolation of
In [28], a SAGIN-based scheduling approach for task offload- offshore rigs make it difficult to obtain a proper estimation
ing is presented where IoT devices can offload their tasks of the ongoing output for O&G companies. O&G businesses
to closer UAVs. Based on the task’s importance and weight, rely on manual data reading and visual inspection to track
the UAV decides whether to transfer the task to a nearby BS large parts of their processes, equipment and facilities owing
or satellite. In [29], a methodology for resource allocation by to the lack of a cost-effective and scalable communication
a: EMERGENCY TRAFFIC te
This refers to critical and urgent traffic. These packets need
to be sent to the UAV as soon as possible. However, it is
B. MULTICHANNEL STRUCTURE assumed that the generation of emergency traffic te does not
As shown in Fig. 2, the use of two channels is conducted: occur frequently and is only generated when the system does
a control channel Cc and a data channel Cd . The control not perform in a normal manner and something goes wrong
channel Cc is dedicated for exchanging control information internally. This type of situation is life threatening and haz-
such as broadcasting beacons, exchange of control packets ardous to humankind. A few circumstances when emergency
and acknowledgment between the UAV and the IoT devices. traffic can be generated are fire alarm, oil/gas leakage, and
On the contrary, remaining communication is performed high air-pollution level. For emergency traffic te the value of
using data channel Cd . The UAV flies over the target area σ is 1.
and starts to transmit beacon, bn via control channel Cc . The
IoT devices receive the beacon in control channel Cc and b: MONITORING TRAFFIC tm
then send control packets (reservation frame, Lr ) to the UAV. Monitoring traffics tm are generated regularly for mon-
Upon reception of the control packets, the UAV calculates itoring purposes and do not have any deadline bound.
the dynamic device priority and transmits another beacon ba Considering the characteristics of the monitoring traffic,
to the IoT devices, including the data transmission schedul- the static traffic priority factor for monitoring traffic tm is
ing and synchronization information. The UAV switches to σ = 0; this is because it does not have any urgency of
the data channel Cd immediately after sending the beacon transmission.
Algorithm 2 Reservation Period – UAV Side packet in the channel. In comparison to the traditional backoff
Input: Reservation frame Lr mechanism where the CW size always gets increased in the
Output: TDMA scheduling information same way without considering the current condition of the
1: Dlist ← {} channel, our ABO adjusts the BO length according to the
2: Clist ← {} medium collision rate.
3: K = number of IoT devices, vc = K + 1 Fig. 4 shows the flowchart of the ABO mechanism. The
4: for each IoT device i ∈ K primary backoff period BO0 is set to CW min . The next BO
5: calculate cp using (3) is determined with the following equation after a packet is
6: insert (Clist [i]) dropped due to collisions in the channel:
7: end for BOj = j × (2CWmax − 1) × α, (8)
8: sort_ascending (Clist )
9: for each IoT device i ∈ K where j presents the collision rate in the channel in the j-th
10. Clist [i] = vc − 1 attempt. CW max is the maximum value of CW , α is a random
11: calculate sp using (4) number, the value of which lies in [0, 1].
12: calculate RmE using (5) The collision rate j can be calculated with the number of
13: if (RmE i > RmE th,i ) transmission failures and the maximum retransmission limit
14: calculate Pt using (6) after each transmission of reservation frame. Hence, collision
15: insert (Dlist [i]) rate j in respect to the maximum retransmissions can be
16: else calculated using the following equation:
17: Pt = 0 =max − ψj
18: end if j = , (9)
=max
19: end for
20: sort_descending (Dlist ) where ψj presents the number of collisions in the channel in
21: assign tslot to Dlist the j-th attempt and =max represents the maximum number of
retransmissions (=max = 7).
The parameter α in (8) is effectively used to avoid colli- devices can fail during the RP in contention. When a device
sions between the same static priority devices with similar σ fails frequently during contention, the transmission efficiency
value. For example: if device A and device B have the same of the device would degrade dramatically. Moreover, due to
static priority and both have encountered the similar number the static traffic priority Ps of the devices, the low-priority
of collisions, then they will have similar backoff value and devices will suffer from starvation. Moreover, when two or
will collide again. To resolve this problem, we consider a more high priority devices try to transmit at the same time,
random value α and multiply it by the collision rate. Hence, they will face collision. Our ICP model helps to ensure
the calculated backoff value will never be the same with each fairness among the same priority devices and protect the
other. Each IoT device locally calculates the number of col- low-priority devices from starvation. In ICP, if reservation
lisions after transmission failure. The next backoff stage can frame of a specific device fails during transmission, the prior-
adjust its length according to the collision rate. In case of high ity of that frame is increased by one to get channel access in
collision rate, the backoff window size can be minimized in the next transmission. After increasing the priority, when the
order to transmit the packet as soon as possible. On the other device transmits the data successfully, the phase of increasing
hand, if the collision rate is low, then the backoff length will priority will be halted and the device priority will return to the
be larger and the packet will get time to get transmitted in the preliminary level. Fig. 5 shows that when a collision occurs
next transmission. between B and C, following ICP, each device increments its
For example, as shown in Fig. 5, four IoT devices A, B, C, σ value by 1 during retransmission. This mechanism helps
and D compete to transmit reservation frames. Devices A, B, fair access among the IoT devices with different priorities.
and C have emergency traffic te and hence have a similar σ However, due to the use of different CW sizes for the different
value of 1. However, device D has monitoring traffic tm and priority of traffic, most of the time, only emergency traffic te
the value of σ is 0. Devices A, B, and C utilize a small CW will compete and no normal monitoring traffic will compete
range and hence have the opportunity to transmit reservation with them. It also guarantees that to access the channel,
frame Lr rather than device D. Fig. 5 shows that after the competition between different types of traffic will not occur.
collision occurred between devices B and C, BO does not get Therefore, emergency traffic te will always be transmitted
doubled. Instead, ABO calculates BO efficiently and reduces before monitoring traffic tm .
extra delay in channel access.
devices that succeeded in RP switch to data channel and control channel. As shown in Fig. 6, after receiving notifi-
prepare to send data packets according to their designated cation beacon, the active devices A, B, and C contend with
time slot. each other for reservation opportunity using the basic access
mechanism of CSMA/CA. In the figure, we assume that IoT
E. DATA COLLECTION PERIOD (DCP) devices A and B have high static priority with σ = 1 and IoT
Algorithm 3 displays the data packet transmission during device C has low static priority with σ = 0. Two contention
data collection period. In this period, the devices that became windows are selected based on the static traffic priority Ps of
successful in the RP start sequentially transmitting their data the IoT devices.
using the TDMA mechanism. The timeslots of TDMA are The IoT devices A and B use small CW size, allowing
divided into M number of equal timeslots, which is indexed them to access the channel within a shorter time. Therefore,
by n = 1, . . . .., M with each of length ∂t . In general, the dura- they can transfer their reservation frame with lower delay. IoT
tion of ∂t tends to be small. Therefore, we can assume that the device C is not delay-sensitive. Hence, it utilizes larger CW
position change of the UAV in ∂t is insignificant. Timeslots so that it can obtain channel access after the high-priority
for each IoT device are selected by the UAV according to the devices. As shown in Fig. 7, the IoT devices A and B have
dynamic device priority so that the device with the highest the same value of σ . Both IoT devices A and B use the
dynamic device priority gets the timeslot allocated faster small CW window and try to transmit the reservation frame.
than the other devices. UAV works as a mobile sink and it However, unfortunately, they face a collision due to the trans-
synchronizes with the IoT devices using the announcement mission at the same time. Therefore, following ICP model (in
beacon message. Section IV.C-4), the σ value of both devices is increased by
1 and becomes 2. Both of the devices calculate the backoff
period using the ABO method (in Section IV.C-3) and then
Algorithm 3 Data Collection Period
again try to retransmit the reservation frame. This time IoT
Input: TDMA scheduling information via announcement device A gets the chance to transmit earlier than IoT device
beacon message, ba B and sends the reservation frame successfully.
Output:Successful data transmission On the other hand, after DIFS time, device B can sense
1: for each IoT device i ∈ K that the channel is busy and hence it waits for some time.
2: if ba is received After waiting for some time, when the channel becomes free,
3: switch to Cd IoT device B transmits its reservation frame successfully.
4: synchronizes with the UAV Then, the priority value σ returns to the initial value. In the
5: IoT devices wait for their time slot meantime, IoT device C uses large CW value and after DIFS
6: IoT devices transmit data in their designated tslot and backoff time, it sends the reservation frame successfully.
7: else The devices with no data to send will switch to sleep mode.
8: go to sleep mode The UAV replies with an ACK packet to the every IoT device,
9: end if which has successful transmission. As we consider a con-
10: end for trolled scenario and UAV is going to collect data on a regular
basis from the IoT devices, the UAV will aware of all the IoT
According to the application scenario, the IoT devices devices after the first round of data collection.
should periodically collect and transmit data. It is very much We do not consider any mobility of the IoT devices and
important to synchronize the IoT devices clocks with the hence their position will not change. The IoT devices will
UAV’s clock. It is because the clocks can shift due to the send their location information only in the first round of the
drift in crystal oscillators and data transmission delay. After data collection. If a new device joins the network, it will
receiving the announcement beacon message, all the IoT send the location information to UAV only during its first
devices are synchronized by taking the UAV’s clock as a data transmission. Therefore, UAV is well aware of all IoT
global time. Therefore, all the IoT devices will have the devices and ends the RP period after collecting all reserva-
same clock as the UAV’s clock and thus all IoT devices are tion frame. After getting all the reservation frame, the UAV
synchronized. As we do not use any other control frames for extracts all the information from the reservation frame such
synchronization, it reduces control overhead in comparison to as location information, residual energy, sampling rate, and
the conventional TDMA mechanism. After proper synchro- static priority value. Then, UAV calculates the dynamic
nization, the devices transmit their data packets according to device priority of the devices, which is mentioned in detail in
the scheduled time slot using the data channel. Section III.C-2. Subsequently, UAV assigns TDMA time slot
to the IoT devices based on the calculated dynamic priority.
F. WHOLE COMMUNICATION SCENARIO The UAV notifies the IoT devices about the timeslots with
Fig. 6 illustrates the whole communication scenario of our the announcement beacon message in AP duration. Upon
proposed PF-MAC protocol. For simplicity, we have consid- receiving the announcement beacon message, the IoT devices
ered three IoT devices and a UAV. When UAV reaches to the immediately switch to the data channel and start to transmit
monitoring area, it starts broadcasting notification beacon via data in the designated timeslot.
device transmits a packet at the same time. The collision where δgen , is the time to generate Lr , δBO is total BO duration,
probability Pc can be expressed as δDIFS represents the DIFS time, δr is Lr transmission time,
Pc = 1 − (1 − τq )k−1 . (12) δcollision is the time spent due to the collision, δACK is the
time spent for receiving ACK , and δSIFS is the SIFS time. The
On the other hand, Ps represents the successful transmission reservation frame transmission time δr can be calculated by
probability that the reservation packet is transmitted success- Lr
fully, which will only be take place if no IoT device transmits δr = , (19)
}
in the same time. Therefore, successful transmission proba-
bility Ps can be expressed as follows: where Lr is the length of reservation frame and } is the data
transmission rate.
kτq (1 − τq )k−1
Ps,RP = . (13)
Pb 2) DELAY IN DCP
Let the total number of generated reservation packets be M . DCP follows the TDMA mechanism. Therefore, there is no
Then, the total number of successfully received reservation delay occurring due to collisions. δDCP represents the delay
packets can be calculated as follows: in DCP.
ξRP = M × Ps,RP . (14) δDCP = δswitch + δsense + δwait + δmedium + δprop , (20)
During DCP, we consider that all IoT devices are synchro- where δswitch is the channel-switching time, δsense is the data
nized with UAV and no synchronization error occurs dur- sensing time for IoT devices, δwait is the waiting time in queue
ing TDMA. There is no collision during TDMA period and before it is transmitted, δmedium is the time placing a packet
IoT devices transmit data during their designated time slot. into medium, and δprop represents the propagation time. Here,
Transmission failure of packet loss can only occur due to the δmedium and δprop can be represented as
transmission delay of the packets. UAV allocates timeslot to
all of the IoT devices based on their dynamic device priority. Ld
δmedium = (21)
If the total number of data packet is G and the total number td
of timeslots are T , then the number of successfully received and
data packets can be given as χ
δprop = , (22)
ξDCP = G × Ps,DCP , (15) st
where Ps,DCP represents the probability of successful trans- respectively, where Ld represents the length of the data
mission during DCP. Ps,DCP can be calculated as following packet, td is the data transmission time, χ is the distance
equation: between IoT device and UAV, and st is the propagation period.
The waiting time in queue twait can be calculated as
k
Ps,DCP = pi (1 − pi )k−1 , (16) PL
1 X
twait = Si + w, (23)
where pi represents successful data packets transmission in
i=1
time slot ti .
Therefore, combining (13) and (16), we can calculate the where Si is the service period of each IoT device, w is the
total successful transmission probability during RP and DCP waiting time until it is scheduled, and PL denotes the num-
as follows: ber of priority levels for different IoT devices based on the
dynamic device priority.
Ps = Ps,RP + Ps,DCP Combining (18) and (20), we can get the total delay as
kτq (1 − τq )k−1
k follows:
= + pi (1 − pi )k−1 . (17)
Pb 1 N
X N
X
δTotal = δRP + δDCP (24)
B. DELAY i=1 i=1
The delay observed by each IoT devices can be computed by
dividing the process into two steps: reservation period (RP) C. THROUGHPUT
and data collection period (DCP). Let T be the system total throughput. T represents the data
transmitted over a transmission time. The throughput for RP
1) DELAY IN RP and DCP duration can be separately calculated as
RP is contention-based and follows the CSMA/CA mecha- Ps,RP × Lr × 8 × }
nism. Hence, extra delay can be observed due to collisions. TRP = (25)
δRP
So, delay in the RP phase can be calculated as follows:
and
δRP = δgen +δBO +δDIFS + δr + δcollision + δACK + δSIFS , Ps,DCP × Ld × 8 × }
TDCP = , (26)
(18) δDCP
57100 VOLUME 9, 2021
S. Khisa, S. Moh: PF-MAC Protocol for UAV-Assisted IIoT Systems
respectively. Combining (25) and (26), we can calculate the UAV at its designated ith time slot, ti .
total throughput of the system: m
X
T = TRP + TDCP Etrans = ETx,i × ti , (32)
Ps,RP × Lr × 8 × } Ps,DCP × Ld × 8 × } i=1
= + . (27)
δRP δDCP Failed devices in contention go to idle mode during DCP.
Thus, it consumes the following energy:
D. NORMALIZED CONTROL OVERHEAD
Normalized control overhead is the ratio of control packet Ein = (k − m) × ti , (33)
transmission for packets being delivered from the source node
Therefore, during DCP, the overall energy intake is
to the destination node. If the number of transmitted control
packets is Nc and the number of successfully transmitted data EDCP = Etrans + Ein , (34)
packets is Nd , then the normalized control overhead (NCO)
can be calculated with the following equation: Therefore, during the whole process, the overall energy con-
P sumption of all devices is
Nc
NCO = P . (28)
Nd Etotal = ENP + ERP + EAP + EDCP , (35)
FIGURE 8. Transmission delay for emergency traffic. FIGURE 10. Average throughput.
delay and the transmission of normal monitoring traffics [17] M. G. Barron, ‘‘Ecological impacts of the deepwater horizon oil spill:
achieves higher throughput. Implications for immunotoxicity,’’ Toxicologic Pathol., vol. 40, no. 2,
pp. 315–320, Feb. 2012.
In our future study, we are going to exploit an artificial- [18] Q. Wu, Y. Zeng, and R. Zhang, ‘‘Joint trajectory and communication
intelligence-enabled MAC protocol with an optimized UAV design for multi-UAV enabled wireless networks,’’ IEEE Trans. Wireless
trajectory, which can help to reduce the energy consumption Commun., vol. 17, no. 3, pp. 2109–2121, Mar. 2018.
[19] T.-H. Hsu and P.-Y. Yen, ‘‘Adaptive time division multiple access-based
of the whole system. We also plan to incorporate multi-UAV medium access control protocol for energy conserving and data trans-
scenarios and emphasize on the increasing the lifetime of mission in wireless sensor networks,’’ IET Commun., vol. 5, no. 18,
UAV-assisted IoT systems. pp. 2662–2672, Dec. 2011.
[20] J. Wang, C. Jiang, Z. Han, Y. Ren, R. G. Maunder, and L. Hanzo, ‘‘Tak-
ing drones to the next level: Cooperative distributed unmanned-aerial-
ACKNOWLEDGMENT vehicular networks for small and mini drones,’’ IEEE Veh. Technol. Mag.,
The authors thank the editor and the anonymous referees for vol. 12, no. 3, pp. 73–82, Sep. 2017.
[21] X. Li, H. Yao, J. Wang, X. Xu, C. Jiang, and L. Hanzo, ‘‘A near-optimal
their comments that have helped improve the quality of this UAV-aided radio coverage strategy for dense urban areas,’’ IEEE Trans.
paper. Veh. Technol., vol. 68, no. 9, pp. 9098–9109, Sep. 2019.
[22] M. A. Abd-Elmagid and H. S. Dhillon, ‘‘Average peak age-of-information
minimization in UAV-assisted IoT networks,’’ IEEE Trans. Veh. Technol.,
REFERENCES vol. 68, no. 2, pp. 2003–2008, Feb. 2019.
[1] G. Cai, J. Dias, and L. Seneviratne, ‘‘A survey of small-scale unmanned [23] Q. Yang and S.-J. Yoo, ‘‘Optimal UAV path planning: Sensing data
aerial vehicles: Recent advances and future development trends,’’ acquisition over IoT sensor networks using multi-objective bio-inspired
Unmanned Syst., vol. 2, no. 2, pp. 175–199, Apr. 2014. algorithms,’’ IEEE Access, vol. 6, pp. 13671–13684, 2018.
[2] S. Yahyanejad, D. Wischounig-Strucl, M. Quaritsch, and B. Rinner, [24] M. Samir, S. Sharafeddine, C. M. Assi, T. M. Nguyen, and A. Ghrayeb,
‘‘Incremental mosaicking of images from autonomous, small-scale ‘‘UAV trajectory planning for data collection from time-constrained IoT
UAVs,’’ in Proc. 7th IEEE Int. Conf. Adv. Video Signal Based Surveill., devices,’’ IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 34–46,
Boston, MA, USA, Aug. 2010, pp. 329–336. Jan. 2020.
[3] S. Waharte and N. Trigoni, ‘‘Supporting search and rescue operations [25] F. Qi, X. Zhu, G. Mang, M. Kadoch, and W. Li, ‘‘UAV network and IoT
with UAVs,’’ in Proc. Int. Conf. Emerg. Secur. Technol., Canterbury, U.K., in the sky for future smart cities,’’ IEEE Netw., vol. 33, no. 2, pp. 96–101,
Sep. 2010, pp. 142–147. Mar. 2019.
[4] L. Merino, F. Caballero, J. R. Martínez-de-Dios, I. Maza, and A. Ollero, [26] Z. Hu, Z. Bai, Y. Yang, Z. Zheng, K. Bian, and L. Song, ‘‘UAV aided
‘‘An unmanned aircraft system for automatic forest fire monitoring and aerial-ground IoT for air quality sensing in smart city: Architecture, tech-
measurement,’’ J. Intell. Robotic Syst., vol. 65, nos. 1–4, pp. 533–548, nologies, and implementation,’’ IEEE Netw., vol. 33, no. 2, pp. 14–22,
Jan. 2012. Mar. 2019.
[5] P. G. Martin, S. Kwong, N. T. Smith, Y. Yamashiki, O. D. Payton, [27] J. Liu, Y. Shi, Z. M. Fadlullah, and N. Kato, ‘‘Space-air-ground inte-
F. S. Russell-Pavier, J. S. Fardoulis, D. A. Richards, and T. B. Scott, grated network: A survey,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 4,
‘‘3D unmanned aerial vehicle radiation mapping for assessing contaminant pp. 2714–2741, May 2018.
distribution and mobility,’’ Int. J. Appl. Earth Observ. Geoinf., vol. 52, [28] C. Zhou, W. Wu, H. He, P. Yang, F. Lyu, N. Cheng, and X. Shen,
pp. 12–19, Oct. 2016. ‘‘Delay-aware IoT task scheduling in space-air-ground integrated net-
work,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2019,
[6] E. Natalizio, R. Surace, V. Loscri, F. Guerriero, and T. Melodia, ‘‘Filming
pp. 1–6.
sport events with mobile camera drones: Mathematical modeling and
algorithms,’’ HAL-INRIA, Lyon, France, Res. Rep. hal-00801126, 2012. [29] J. Wang, C. Jiang, Z. Wei, C. Pan, H. Zhang, and Y. Ren, ‘‘Joint UAV
hovering altitude and power control for space-air-ground IoT networks,’’
[7] S. Katikala, ‘‘Google project loon,’’ InSight, Rivier Academic J., vol. 10,
IEEE Internet Things J., vol. 6, no. 2, pp. 1741–1753, Apr. 2019.
no. 2, pp. 1–6, 2014.
[30] R. Ali, N. Shahin, Y. B. Zikria, B.-S. Kim, and S. W. Kim, ‘‘Deep
[8] M. L. Gomez and A. Cox, ‘‘Flying Aquila: Early lessons from the first full-
reinforcement learning paradigm for performance optimization of channel
scale test flight and the path ahead,’’ Facebook Code, Tech. Rep., Jul. 2016.
observation–based MAC protocols in dense WLANs,’’ IEEE Access, vol. 7,
[9] W. Guo, C. Devine, and S. Wang, ‘‘Performance analysis of micro pp. 3500–3511, 2019.
unmanned airborne communication relays for cellular networks,’’ in Proc. [31] R. Ali, M. Sohail, A. O. Almagrabi, A. Musaddiq, and B.-S. Kim, ‘‘Green-
9th Int. Symp. Commun. Syst., Netw. Digit. Sign (CSNDSP), Manchester, MAC protocol: A Q-learning-based mechanism to enhance channel reli-
U.K., Jul. 2014, pp. 658–663. ability for WLAN energy savings,’’ Electronics, vol. 9, no. 10, p. 1720,
[10] T. Akiyoshi, E. Okamoto, H. Tsuji, and A. Miura, ‘‘Performance improve- Oct. 2020.
ment of satellite/terrestrial integrated mobile communication system using [32] S. Khisa and S. Moh, ‘‘Medium access control protocols for the Internet
unmanned aerial vehicle cooperative communications,’’ in Proc. Int. Conf. of Things based on unmanned aerial vehicles: A comparative survey,’’
Inf. Netw. (ICOIN), Da Nang, Vietnam, Jan. 2017, pp. 417–422. Sensors, vol. 20, no. 19, p. 5586, Sep. 2020.
[11] V. P. Hubenko, R. A. Raines, R. F. Mills, R. O. Baldwin, B. E. Mullins, [33] X. Lin, G. Su, B. Chen, H. Wang, and M. Dai, ‘‘Striking a balance between
and M. R. Grimaila, ‘‘Improving the global information grid’s performance system throughput and energy efficiency for UAV-IoT systems,’’ IEEE
through satellite communications layer enhancements,’’ IEEE Commun. Internet Things J., vol. 6, no. 6, pp. 10519–10533, Dec. 2019.
Mag., vol. 44, no. 11, pp. 66–72, Nov. 2006. [34] B. Li, X. Guo, R. Zhang, X. Du, and M. Guizani, ‘‘Performance analysis
[12] J. Radtke, C. Kebschull, and E. Stoll, ‘‘Interactions of the space debris and optimization for the MAC protocol in UAV-based IoT network,’’ IEEE
environment with mega constellations—Using the example of the OneWeb Trans. Veh. Technol., vol. 69, no. 8, pp. 8925–8937, Aug. 2020.
constellation,’’ Acta Astronautica, vol. 131, pp. 55–68, Feb. 2017. [35] Y. Du, K. Yang, K. Wang, G. Zhang, Y. Zhao, and D. Chen, ‘‘Joint
[13] T. Pultarova, ‘‘Telecommunications-space tycoons go head to head resources and workflow scheduling in UAV-enabled wirelessly-powered
over mega satellite network,’’ Eng. Technol., vol. 10, no. 2, p. 20, MEC for IoT systems,’’ IEEE Trans. Veh. Technol., vol. 68, no. 10,
Mar. 2015. pp. 10187–10200, Oct. 2019.
[14] G. Xiong, F. Zhu, X. Dong, H. Fan, B. Hu, Q. Kong, W. Kang, and T. Teng, [36] W. Khawaja, I. Guvenc, D. W. Matolak, U.-C. Fiebig, and
‘‘A kind of novel ITS based on space-air-ground big-data,’’ IEEE Intell. N. Schneckenburger, ‘‘A survey of air-to-ground propagation channel
Transp. Syst. Mag., vol. 8, no. 1, pp. 10–22, Jan. 2016. modeling for unmanned aerial vehicles,’’ IEEE Commun. Surveys Tuts.,
[15] M. Casoni, C. A. Grazia, M. Klapez, N. Patriciello, A. Amditis, and vol. 21, no. 3, pp. 2361–2391, 3rd Quart., 2019.
E. Sdongos, ‘‘Integration of satellite and LTE for disaster recovery,’’ IEEE [37] Y. S. Meng and Y. H. Lee, ‘‘Measurements and characterizations of
Commun. Mag., vol. 53, no. 3, pp. 47–53, Mar. 2015. air-to-ground channel over sea surface at C-band with low airborne
[16] P. Daley and D. O’Neill, ‘‘Sad is too mild a word,’ press coverage altitudes,’’ IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1943–1948,
Exxon Valdez oil spill,’’ J. Commun., vol. 41, no. 4, pp. 42–57, 1991. May 2011.
[38] V. E. Hovstein, A. Saegrov, and T. A. Johansen, ‘‘Experiences with coastal SANGMAN MOH (Member, IEEE) received the
and maritime UAS BLOS operation with phased-array antenna digital M.S. degree in computer science from Yonsei Uni-
payload data link,’’ in Proc. Int. Conf. Unmanned Aircr. Syst. (ICUAS), versity, South Korea, in 1991, and the Ph.D. degree
Orlando, FL, USA, May 2014, pp. 261–266. in computer engineering from the Korea Advanced
[39] G. Wu, C. Dong, A. Li, L. Zhang, and Q. Wu, ‘‘FM-MAC: A multi-channel Institute of Science and Technology (KAIST),
MAC protocol for FANETs with directional antenna,’’ in Proc. IEEE South Korea, in 2002. Since 2002, he has been a
Global Commun. Conf. (GLOBECOM), Abu Dhabi, UAE, Dec. 2018, Professor with the Department of Computer Engi-
pp. 1–7.
neering, Chosun University, South Korea. From
[40] S. Temel and I. Bekmezci, ‘‘LODMAC: Location oriented directional
2006 to 2007, he was on leave from Cleveland
MAC protocol for FANETs,’’ Comput. Netw., vol. 83, pp. 76–84,
Jun. 2015. State University, USA. Until 2002, he was with
[41] H.-S.-W. So, G. Nguyen, and J. Walrand, ‘‘Practical synchronization the Electronics and Telecommunications Research Institute (ETRI), South
techniques for multi-channel MAC,’’ in Proc. 12th Annu. Int. Conf. Korea, where he served as a Project Leader. His research interests include
Mobile Comput. Netw. (MobiCom), Los Angeles, CA, USA, Sep. 2006, mobile computing and networking, ad hoc and sensor networks, cognitive
pp. 134–145. radio networks, and parallel and distributed computing systems. He is a
member of the ACM, the IEICE, the KIISE, the IEIE, the KIPS, the KICS,
the KMMS, the IEMEK, the KISM, and the KPEA.