UAVs assessment in software-defined IoT networks: An overview

Al-Turjman, Fadi
Abujubbeh, Mohammad
Malekloo, Arman
Mostarda, Leonardo
The technological advancements in the ubiquitous IoT era and the ever-growing desire of communities to enforce smart cities with security and safety of user data as their priority, mini Unmanned Aerial Vehicles (UAVs), or drones, are perceived as a tool for raising living standards by meeting the requirements of societies. Traditionally in UAV communication links, meshed ad hoc networks were among the first options of connectivity. However, the increased demand for deploying multi-UAV networks necessitates the development of a more robust and more secure networking infrastructure. In this regard, Software-Defined Networking (SDN) paradigm has proved to be the better alternative for multi-UAV communication since it can offer flexible services for management and control owing to its unique features such as decoupling control from UAVs and network programmability. Therefore, in this paper, we provide an overview of drone applications in SDN-enabled Drone Base Stations (DBS), surveillance monitoring and emergency networks, and review the performance assessment techniques and the associated cybersecurity aspects in these applications. Moreover, future research directions, after a thorough analysis of the literature, is presented in this paper. Through the development of an innovative and multifaceted drone performance-assessment framework with the primal concerns, that are meeting user-defined requirements and the provision of secure and reliable services, it is, therefore, necessary to advance in IoT-enabled spaces. We believe the present work is a step in the right direction, and it is essential for fastening the movement toward UAV-enabled smart cities.


Optimized Unmanned Aerial Vehicles Deployment for Static and Mobile Targets' Monitoring
Al-Turjman, Fadi; Zahmatkesh, Hadi; Al-Oqily, Ibrhaim; Daboul, Reda (Elsevier BV, 2020-01-01)
In the recent decade, drones or Unmanned Aerial Vehicles (UAVs) are getting increasing attention by both industry and academia. Due to the support of advanced technologies, they might be soon an integral part of any smart-cities related project. In this paper, we propose a cost-effective framework related to the optimal placement of drones in order to monitor a set of static and/or dynamic targets in the IoT era. The main objective of this study is to minimize the total number of drones required to monitor ...
Mobile multi-access IP: a proposal for mobile multi-access management in future wireless IP networks
Altuntas, S; Baykal, Buyurman (Elsevier BV, 2005-03-15)
As the wireless networking technologies advance rapidly, providing mobile users with roaming freely in heterogeneous wireless access domains, the need for multi-access arises. This paper introduces the Mobile Multi-Access Management Architecture (MMA-IP) for IP-based future wireless networks. MMA-IP enables mobile users to utilize multiple access domains synchronously and to switch between different access domains. In order to handle multi-access operations, MMA-IP defines a new special mobility agent, call...
How many sensors for an acceptable breach detection probability?
Onur, Ertan; Delic, H (Elsevier BV, 2006-01-10)
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra's shortest path algorithm. We propose a method to determine the required number of sensors to be deployed and to gain insight about...
Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours
Onur, Ertan; Delic, Hakan; Akarun, Lale (Elsevier BV, 2010-02-01)
For surveillance applications of wireless sensor networks, analysis of sensing coverage and quality of sensing is crucial. For rough terrains where obstacles block the sensing capability, region-based approaches must be employed to determine the sensing quality. In this paper, we present a method to determine the breach paths and the deployment quality defined as the minimum of the maximum detection probabilities on the breach paths in the presence of obstacles. We propose the utilization of watershed segme...
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
Ranchal, Rohit; Bhargava, Bharat; Angın, Pelin; ben Othmane, Lotfi (Institute of Electrical and Electronics Engineers (IEEE), 2019-05-01)
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of...
Citation Formats
F. Al-Turjman, M. Abujubbeh, A. Malekloo, and L. Mostarda, “UAVs assessment in software-defined IoT networks: An overview,” COMPUTER COMMUNICATIONS, pp. 519–536, 2020, Accessed: 00, 2020. [Online]. Available: