Next Article in Journal
Characteristics of Channel Eigenvalues and Mutual Coupling Effects for Holographic Reconfigurable Intelligent Surfaces
Next Article in Special Issue
Self-Sufficient Sensor Node Embedding 2D Visible Light Positioning through a Solar Cell Module
Previous Article in Journal
LightFD: Real-Time Fault Diagnosis with Edge Intelligence for Power Transformers
Previous Article in Special Issue
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Time-Constrained Node Visit Planning for Collaborative UAV–WSN Distributed Applications

1
Department of Engineering, University of Palermo, Viale delle Scienze, Ed. 6, 90128 Palermo, Italy
2
Institute for High Performance Computing and Networking (ICAR), National Research Council (CNR), Via Ugo La Malfa, 153, 90146 Palermo, Italy
*
Author to whom correspondence should be addressed.
Submission received: 1 June 2022 / Revised: 10 July 2022 / Accepted: 12 July 2022 / Published: 15 July 2022
(This article belongs to the Special Issue IoT Enabling Technologies for Smart Cities: Challenges and Approaches)

Abstract

:
Unmanned Aerial Vehicles (UAVs) are often studied as tools to perform data collection from Wireless Sensor Networks (WSNs). Path planning is a fundamental aspect of this endeavor. Works in the current literature assume that data are always ready to be retrieved when the UAV passes. This operational model is quite rigid and does not allow for the integration of the UAV as a computational object playing an active role in the network. In fact, the UAV could begin the computation on a first visit and retrieve the data later. Potentially, the UAV could orchestrate the distributed computation to improve its performance, change its parameters, and even upload new applications to the sensor network. In this paper, we analyze a scenario where a UAV plays an active role in the operation of multiple sensor networks by visiting different node clusters to initiate distributed computation and collect the final outcomes. The experimental results validate the effectiveness of the proposed method in optimizing total flight time, Average Age of Information, Average cluster computation end time, and Average data collection time compared to prevalent approaches to UAV path-planning that are adapted to the purpose.

1. Introduction

Wireless Sensor Networks (WSNs) are an important component of the emerging distributed computing paradigms of IoT, Smart Cities, and Ambient Intelligence [1]. The introduction of one or more Unmanned Aerial Vehicles (UAVs) can greatly enhance the abilities of a WSN. For instance, a UAV in a WSN can either act as a mobile sink or a probing node, perform maintenance operations, or bring connectivity to a network [2]. This can be especially useful in emergency scenarios where part of the network may be disrupted [3].
UAVs, however, may have limited computational capacity and severe energy constraints. Hence, the dispatch of a drone must be carefully planned, making the optimization of paths and drone operations a prominent issue [4].
Many scenarios where UAV path-planning is required to support a WSN have been analyzed in the recent literature with the aim of optimizing some problem-specific metrics. For example, UAV trajectory and communication scheduling has been the subject of optimizations aiming to guarantee the required quality of service in terms of average throughput for a UAV-assisted networking emergency application [3]. In that case, the proposed solution was based on classical optimization algorithms.
Some works focus on localizing Sensor Nodes (SNs) on the ground, with no prior knowledge of their position. For instance, a genetic algorithm was proposed to optimize the path length and flight time of a UAV while trying to perform localization of ground SNs using a range-free technique [5]. Other works use reinforcement learning to minimize the positioning error when trying to locate ground SNs with a UAV [6].
A popular problem that has been extensively studied is that of computation offloading. In this case, the UAVs collaborate with the WSN, acting as mobile edge servers for the SNs.
This task-offloading problem has been tackled by trying to minimize the overall energy consumption of both the SNs, either static or non-static, on the ground and the UAV [7]. A single UAV is used to carry out computation tasks on behalf of fixed and mobile ground devices in another work [8]. Successive convex approximations are used to maximize computational efficiency in terms of the ratio between offloaded data and UAV energy consumption. The problem of computational efficiency maximization has been further extended to the multi-UAV case, also including the possibility of partial computation offloading [9].
The offloading idea has also been extended to the possibility of forwarding data to an edge server on the ground [10] instead of performing all computation on board the UAV. In the same scenario, the computation offloading policy has been determined through reinforcement learning with improved results with respect to the strategy of sticking to a single policy [11].
A use case that raises great interest is that of employing UAVs for data collection in WSNs [12]. The use of a UAV as a mobile sink node is one of the most commonly studied scenarios, entailing collaborations between UAVs and WSNs [13]. UAV-aided data collection not only increases the expected lifetime of the network but also reduces data processing and memory-related issues in the network [14].
A UAV can be used to extend the network lifetime by wirelessly charging the SNs when performing data collection [15].
The energy constraint of the UAV can also be a limiting factor in joint UAV-WSN operations. The authors of [16] use Q-learning to determine a flying route that enables data to be collected from remote SNs, while simultaneously maintaining acceptable energy levels. The UAV energy constraints are mitigated by assuming the presence of wireless UAV charging stations.
Data collection can also be subject to timing constraints: SNs have limited memory and may drop data that are not collected by the UAV in a timely manner. Node visit scheduling algorithms that outperform a naive, greedy flight strategy for this scenario have been proposed [17] for this purpose.
Even if not dropped by the SNs, data can quickly become outdated. The impact of the Age of Information (AoI) on UAV path-planning for data collection in a sensor network is investigated by the authors of [18]. AoI is defined by the authors as the time that elapses from data collection to the UAV landing. Minimizing the AoI in this scenario is shown to be equivalent to solving a Traveling Salesman Problem (TSP). AoI is then minimized using both dynamic programming and a genetic algorithm with up to 14 SNs, outperforming the greedy approach.
The positioning of the SNs can influence the algorithms used for path planning. If the SNs lie on a line, the visiting order is fixed and the total flight time can be minimized by modulating the UAV flying speed to collect data on the fly [19].
Data collection applications exploiting the positional information of SNs are further explored in [20]. In this case, the UAV can collect data from multiple physically close SNs from the same hovering position. After hovering positions are determined, SNs are assigned to one of these and the best path that visits all the waypoints is found by solving a TSP with energy consumption constraints.
If nodes are organized in clusters, the UAV only needs to retrieve data from each sink node, also referred to as Cluster Head (CH), instead of collecting data from multiple nearby SNs. Deep reinforcement learning has been used to design routes for the UAV to collect data from the CHs, outperforming Nearest Neighbor and genetic algorithms [21].
To the best of our knowledge, all UAV-aided data collection scenarios in the current literature assume that the data required by the UAV are either available on the nodes or computed by the nodes in a negligible time with respect to that of a visit to all the nodes by the UAV. This assumption may not necessarily hold true and limits the possible scope of the integration of UAVs and sensor networks.
In more sophisticated applications, such as maintenance, configuration, and testing operations, a UAV may send the code of a distributed algorithm whose execution could last several minutes to a network. The UAV-carried distributed algorithm could even self-propagate through a network, before eventually being delivered to every cluster. Making a deployed WSN execute distributed applications through the dynamic exchange of high-level symbolic code was demonstrated to be effective even when SNs are resource-constrained [22]. These distributed applications may be useful when assessing the state of the nodes [23] and for maintenance operations in networks that are otherwise not serviceable. The symbolic distributed programming approach was also proven to be able to support the verification of both hardware proper functioning [24] and the correctness of distributed applications on deployed WSN [25].
The use of UAV to control a WSN symbolic distributed application would be relevant to multiple real-world use-cases. For instance, in an emergency scenario, a UAV could be used to inject a network discovery application [23] in a WSN to assess which nodes are still functioning. Regarding maintenance operations, as the UAV substitutes malfunctioning nodes [26], it may also verify the soundness of the new network configuration, in terms of both connectivity [27] and high-level protocol execution [28]. Finally, even in the case of regular sensing operations, sending a UAV to start the sampling operations only when they are needed and retrieve the data when they are ready could reduce the energy consumption of the network.
In this work, we consider a scenario in which a single UAV initiates the execution of distributed applications and collects the computation results in a WSN comprising several disjoint clusters with static CHs and propose a method for effective flight planning.
The rest of the paper is structured as follows. Section 2 details the proposed scenario and introduces a mathematical model to deal with it. Section 3 describes our approach. Section 4 presents the experimental results. Finally, Section 5 reports our conclusions and directions for future works.

2. Problem Statement and Model Formulation

An instance of the scenario considered in this work is shown in Figure 1. The UAV departs from a fixed starting position and reaches every CH to initiate the execution of a distributed application. Later, the UAV collects the resulting data from the same CHs. While the application is running, the UAV can hover in place, waiting for the computation to be completed, or move to other clusters. Both displacement and hovering have a cost in terms of either the time required to reach the destination or time spent waiting in place. CHs can be visited in any order, and data can be collected from some clusters before others have been visited.
Let W = { w 1 , , w n } be the set of waypoints corresponding to the CHs, and W 0 = { w 0 } W the set including the UAV starting position. The UAV needs to visit each CH twice: the UAV goes to w i once at t i to start the execution of a distributed application, and a second time at t i to collect the computation results. While the SNs of a cluster execute their application, the UAV is free to visit other CHs to collect data or start another execution.
The execution time for the application, τ i w i W , may depend on the characteristics of the cluster, e.g, the topology or the number of nodes in the cluster. However, the execution time is assumed to be deterministic and known.
As a practical example, the model in Figure 1 with its three CHs is depicted with more details in Figure 2. Figure 2a represents a possible path, touching all the waypoints. The visiting order is shown for each of them, along with the arc cost enclosed in round brackets.
The UAV takes off at w 0 , then heads toward w 1 , where the execution of a distributed application is initiated. After this, the UAV reaches w 2 , starts the application, hovers in place until completion, and finally collects some data. The next visited cluster to begin computation corresponds to w 3 . Meanwhile, the data at w 1 are ready; the UAV collects them and heads back to w 3 , where it has to wait for the computation to end (as shown in Figure 2b). Then, data collection is finished and the UAV can return to w 0 .
In Figure 2b, the same sequence of actions is represented in terms of the process execution on the clusters. The empty rectangles correspond to the execution of a distributed computation process on a cluster; the filled rectangles represent data collection operations. In the distributed computation execution, the CH at waypoint w i starts a process at t i that lasts for the execution time τ i . Then, at time t i , the UAV collects the output data from the CH at w i For cluster 1, once the data are ready, some time will elapse before data are collected by the UAV. This time interval is labeled as the AoI in the figure.
Given a pair of waypoints w i , w j W 0 going through the edge e ( i , j ) , has a time cost that is equal to the flight time f ( i , j ) , proportional to the physical distance between w i and w j and inversely proportional to the UAV flying speed. Of course, f ( i , i ) = 0 i W 0 .
The cost c i j ( t ) of visiting the waypoint w j , departing from w i at time t, is then given by Equation (1). This cost does not depend on whether the starting node was visited for the first or second time. The cost formulation considers that, if w j is reached before it completed its computation, the UAV will need to wait before departing for the next node.
c i j ( t ) = f ( i , j ) visit 1 τ i i = j max { f ( i , j ) , t j + τ j t } visit 2
The objective of an algorithm that aims to find the optimal path is then to find a sequence of waypoints u = [ w 0 , , w i , w j , , w 0 ] that starts at w 0 , includes each waypoint in W twice, and ends at w 0 , such that the total cost of the path is minimized.

3. Proposed Approach

A naive solution to this problem would be to find an optimal Hamiltonian cycle [29], which is the shortest path that visits every node exactly once, for W 0 and another one for W. Then, to visit each CH twice, the UAV would have to go through the first cycle up to the last waypoint, then the second cycle, to finally return to the start position w 0 . This strategy is shown in Figure 3a. From now on this, strategy will be referred to as Double Round.
Although at a first glance this may seem a reasonable strategy, it explores a limited subset of the 2 n ! possible paths and may not always find the optimal route. For instance, Figure 3b shows how a path found through a greedy algorithm can be shorter than the one found with Double Round.
Greedy strategies, however, are known to sometimes yield poor solutions for this class of routing problems [30]. In Figure 4, a greedy approach is shown to find a suboptimal path (a) even though a shorter path exists (b).
Another factor to consider is that, depending on the execution time of the distributed application on a given cluster, hovering in place until completion (Figure 5a) may be preferable to visiting other clusters and then going back (Figure 5b). This possibility is intrinsic to the approach we present in the following.
To find an optimal route to start the application execution and collect data for n clusters, we turn this problem into a TSP over 2 n + 1 waypoints. Instead of finding a route that involves each waypoint in W twice, we introduce a second set of waypoints W = { w 1 , , w n } . These waypoints are in the same physical locations as the waypoints in W, so that f ( w i , w i ) = 0 w i W , w i W . The task of finding the optimal path then turns into finding the Hamiltonian cycle over W 0 W = { w 0 , w 1 , , w n , w 1 , , w n } (Figure 6) with minimal costs.
When the UAV reaches a CH for the first time, the visit is attributed to the waypoint in W. The corresponding waypoint in W is considered to be the one visited second or after hovering in place. The arc costs in this alternative problem formulation are given by Equation (2).
c i j ( t ) = f ( i , j ) w j W 0 max { f ( i , j ) , t j + τ j t } w j W
Note that if w j = w i then f ( i , j ) = 0 and t = t j , we have that c i j = c i i = τ i and t i = t i + τ i .
As we have shown, this problem is equivalent to a TSP instance, so it is also NP-hard. Moreover, since the search space has 2 n ! possible solutions, trying to find an exact one is more demanding than finding one among the n ! possible solutions of a regular TSP. Thus, we did not consider exhaustive searches. It should be noted that, while beyond the scope of this work, the proposed model can easily be extended to include an arbitrary number of visits to the same clusters by including more sets of duplicate nodes.
Swarm intelligence algorithms are a popular approach to UAV path planning [31,32]. We used the Bees Algorithm (BA) [33]. This algorithm performs both local and global searches through exploitation and exploration strategies: the algorithm starts with a population of scout bees that explore random locations in the search space, and the neighborhood of the best locations is explored by forager bees, while the scouts that found the worst locations abandon them to search for other random locations. This process is iterated until a stop condition is met. In our implementation, we used a population of 180 bees. As suggested by the literature [34], 20% of the total population were scouts. The stop condition for the algorithm was chosen as a fixed limit of 2500 iterations. The population size and number of iterations were chosen as the result of some preliminary experiments (Figure 7) that showed no added benefits to using larger populations or more iterations.
The computational cost of our BA implementation is proportional to both the population size and the number of iterations. In the remainder of the paper, our proposed solution to the problem using BA over the set of 2 n + 1 waypoints will be referred to as the B A 2 n + 1 strategy. As shown in Section 4, randomly choosing the starting location in the search space led to an overall good performance of the strategy. However, it did not always provide the best solutions. We thus decided to integrate the strategy with more options for the initialization step, as shown in Section 4.1, further improving the results.

4. Experimental Evaluation

In order to assess the feasibility of the BA strategy, we performed extensive numerical simulations using Python (3.8.10) and NumPy (1.22.0). The UAV is assumed to have a constant flying speed of 11 m/s through the whole simulation. This parameter choice is in accordance with other works in the literature [6]. We decided to use arrangements of 5, 10, 20, 50, and 100 clusters, scattered into a 2000 m × 2000 m area sampling from a uniform random distribution for CH coordinates (Figure 8). The number of clusters and area size were chosen according to reports in the literature for UAV sensing operations [35].
For each number of clusters, 10 arrangements were generated using different random seeds. For each arrangement, the simulations were performed with three possible UAV starting positions: the center of the area, a corner, and a random position within the area. Five choices for the number of clusters, ten arrangements per each choice of number of clusters, and three possible UAV starting positions resulted in 150 test configurations.
The application execution time for each cluster was randomly assigned from a 2–5 min range by uniform sampling. Given the typical flight duration abilities of a UAV, which is usually measurable in a few tens of minutes [35], a longer application execution time would not be realistic in the context of a single flight mission. The selected range is also comparable with the time the UAV takes to move from one CH to another.
We compared our B A 2 n + 1 strategy to the following ones:
  • The Double Round strategy, previously described in Section 3, which we implemented using the Google OR-Tools solver for routing problems [36]. This solver has been shown as able to match and sometimes outperform state-of-the-art reinforcement learning approaches for large problem spaces [37].
  • The Single Round with Wait strategy, which consists of finding the shortest path that visits each CH once and waiting in place until data collection before moving to the next waypoint. This strategy was implemented using the Google OR-Tools solver.
  • The Greedy nearest neighbor search strategy, as shown in Figure 3b and Figure 4a. This strategy has a time complexity of O ( n 2 ) , with n being the number of clusters.
We also performed comparisons with two more strategies that we derived from our 2 n + 1 -waypoint formulation, but adopting other optimization methods:
4.
The O R 2 n + 1 strategy using the OR-Tools solver.
5.
The G A 2 n + 1 strategy based on the genetic algorithm described in [38], which is one of the most popular algorithms for UAV path-planning [39]. A population of size 200 was used, with 2-opt mutation [40], roulette wheel selection [41], and two-point crossover with repair. Our implementation of the genetic algorithm has a computational cost that is proportional to the population size and the number of generations.
In all the considered strategies, path-planning is performed offline by a resource-rich device. The UAV simply receives the computed, ordered list of waypoints to visits with no additional burden on its computational abilities.
The experimental results for the selected strategies at an increasing number of clusters are summarized in Figure 9.
Waiting for application execution at each cluster (Strategy 2) gave the worst results for every network size, confirming the unfeasibility of directly extending traditional approaches to the analyzed scenario.
Trying to solve our formulation of the optimization problem as with strategy 4 also led to poor performances.
The genetic algorithm started out with good results for a few clusters, in accordance with the current literature [18], but the quality of the obtained solutions quickly degraded as the number of clusters increased.
The three top-performing strategies were Double Round (strategy 1), Greedy (strategy 3), and BA, so we focused on these in the rest of the section.
BA outperformed all the other strategies when used with fewer than 100 clusters. With 100 clusters, Double Round produced 1.97 % faster paths compared to BA (Figure 10). This drop in performance is attributed to the different rates at which the solution space increases for the two strategies: O ( n ! ) for the former and O ( 2 n ! ) for the latter.

4.1. Search Algorithm Initialization

Based on the first experimental result, we decided to focus on the neighborhood search part of the BA strategy in a promising region of the search space by splitting the initialization of the algorithm into two steps. In the first step, a good initial solution was found through either a Greedy search or Double Round. In the second step, the found solution was used as the starting state of one of the scout bees, while the others were randomly initialized as usual. Then, the BA algorithm ran unmodified with the same parameter choice described in Section 3. The performances of these primed BAs compared to the other strategies are shown in Figure 11.
BA improved the performance of the path found by the Greedy strategy by up to 12.64 % , outperforming the Double Round strategy even with 100 clusters, albeit by a small margin ( 0.60 % less total time). Priming BA with the Double Round path led to even better results, reaching a 3.22 % improvement compared to Double Round, and was overall 5.27 % less than unprimed BA with 100 clusters.
This version of BA, referred to as B A 2 n + 1 + Double Round in the following, was considered for the rest of the assessments, which target other desired properties of the interaction between UAVs and SN nodes.
To better assess how much of the path used for initialization is maintained in the final path, we computed the average edit distance between the paths found by pairs of different strategies. Then, we used the values to obtain a similarity score (Figure 12). We used the Levenshtein distance ( l e v ) [42] normalized in the [ 0 , 1 ] interval by dividing this by the total number of nodes in the paths ( 1 l e v / n ). This similarity corresponds to the fraction of the subsequences that match in the two paths. For up to 50 clusters, the paths found by BA, primed with Greedy initialization, were consistently more similar to the paths found by the unprimed BA than the one found by Greedy. The same is true for the Double Round priming with up to 20 clusters.
Overall, for few clusters, a high similarity can be noticed between all the paths, as the smaller solution space allows for all the techniques to converge to similar solutions in terms of both the performance and the structure of the found paths. On the other hand, the differences in performance with more clusters are obtained through BA by extensively editing the path used for initialization. As the number of clusters increased, the similarity to the path used for priming decreased, indicating that the search algorithm does not simply perform a local optimization but can conduct extensive explorations of the solution space.
To further verify the suitability of the chosen search algorithm in light of this optimization of an initial path, we performed the same priming operation for GA (strategy 5). The results of this evaluation are summarized in Figure 13.
In this set of experiments, the priming operation had little impact on the performance of the GA, which improved only marginally and remained significantly worse than the performance of the Double Round. These experiments showed that optimizing the initialization does not necessarily improve the quality of the solutions, as is the case with BA.

4.2. Optimization of Other Time-Related Metrics

Energy-intensive activities such as exchanging a large amount of messages, as in CH, can shorten the lifetime of sensor network nodes. In paradigms such as transient computing, nodes may only be active for short periods. Hence, in addition to minimizing the overall duration of the path, in some circumstances, other metrics (Table 1) may be more important:
  • Average AoI: once the computation is over, it is desirable to retrieve results as soon as possible, thus minimizing the chances of a node browning out while waiting until data are transmitted to the UAV. Moreover, in some scenarios, such as emergencies and industrial control, information may fast become obsolete as time passes. In Section 2, we reported the definition of AoI as the time elapsed from the moment data are available to the instant they are retrieved from the CH (see also Figure 2).
  • Average cluster computation end time: for some operations, e.g., calibration, retrieving the end result may not be as important as minimizing the average time from mission start taken by a cluster to complete its computation.
  • Average data collection time: in the event of having to abort a mission midway, retrieving as much data as possible early on minimizes the damage of not completing the mission.
The results of the evaluations of the solutions provided by the B A 2 n + 1 + Double Round, the Double Round, and the Greedy strategies to solve the problem of minimizing the total time with respect to the additional metrics are reported in Figure 14.
As expected, since its first round includes all the clusters, the Double Round strategy minimized the time required for nodes to end their computations. The Greedy strategy, however, outperformed the other two with respect to the other metrics, as privileging nearby clusters brought down the averages, albeit at the cost of a higher upper bound. B A 2 n + 1 + Double Round mitigated the shortcomings of the Double Round strategy, maintaining a similar performance for the average computation end.
Then, we used the B A 2 n + 1 + Double Round to explicitly minimize the other metrics and to better assess their relationship. The results of these experiments are reported in Figure 15.
Minimizing the average cluster computation end time produced paths, which visited many clusters first so that they started their computation as early as possible. Subsequently, the strategy scheduled the second visits for data collection and the remaining first visits. Overall, the emerging behavior was similar to that of the Double Round strategy.
Unsurprisingly, minimization of the average data collection time led to performances that were not dissimilar from those of total mission time minimization. This strategy also showed a good performance in reducing the average AoI. Sometimes, however, to collect data from more clusters early on to lower the average, some data were picked up late.
Minimizing the AoI was successful but led to overall poor performances for the other metrics. Nevertheless, the total wait time was still up to 39.13 % better than the Single Round with Wait strategy. Removing the constraint of hovering in place until data pickup allowed for the computation to begin on other clusters before returning to retrieve the computation results. Figure 16a,b show the difference in performance between the Single Round with Wait strategy and the B A 2 n + 1 + double round used to minimize the average AoI on a specific instance of test configurations with five clusters. Figure 16c shows the path found by minimizing the average data collection time. Despite not picking up some data immediately, this strategy managed to schedule most data retrieval operations early on in the process.

5. Conclusions

In this work, we discussed a scenario of UAV-enabled data collection for WSN that had been poorly investigated in the literature. In this case, a UAV plays a very active role in the network as it is able to command concurrent computations in different clusters of WSN nodes and then collect the outcomes efficiently. This ability could open up a wide range of distributed applications in which a UAV is not only a mere collector of data, but can act on the network and reprogram it when needed. For instance, this possibility can be highly valuable in emergency scenarios to reprogram the network ad hoc, after complex maintenance operations to verify which nodes are properly functioning, and to prolong the lifespan of the network by making it perform demanding computations only when needed.
In our proposed solution to this problem computation times of clusters may overlap to allow for a UAV to move from one CH to another, resulting in overall shorter collection times with respect to the prevalent path optimization techniques adapted to the purpose. The simulation results show that approaches that do not exploit this characteristic of the studied problem achieve worse performances. The proposed solution can also be easily adapted to optimize different metrics, such as Average AoI, Average cluster computation end time, and Average data collection time, depending on the requirements of the use case, achieving satisfactory performances.
Future works will consider extending mission planning to multiple cooperating UAVs, using a variable number of visits per cluster, adjusting the mission plan to manage contingencies, and joint optimization of multiple metrics.

Author Contributions

Conceptualization and methodology, D.P.; validation, S.G., G.L.R. and D.P.; investigation, A.A. and D.P.; writing—original draft preparation, A.A. and D.P.; supervision, S.G., G.L.R. and D.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially funded by the University of Palermo, FFR2021 Daniele Peri.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bellini, P.; Nesi, P.; Pantaleo, G. IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies. Appl. Sci. 2022, 12, 1607. [Google Scholar] [CrossRef]
  2. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.H.; Debbah, M. A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Commun. Surv. Tutor. 2019, 21, 2334–2360. [Google Scholar] [CrossRef] [Green Version]
  3. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-Assisted Emergency Networks in Disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  4. Thibbotuwawa, A.; Bocewicz, G.; Nielsen, P.; Banaszak, Z. Unmanned Aerial Vehicle Routing Problems: A Literature Review. Appl. Sci. 2020, 10, 4504. [Google Scholar] [CrossRef]
  5. Jasrotia, D.S.; Nene, M.J. UAV Aided Range Free Localisation of Heterogeneous Sensor Networks. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; pp. 453–458. [Google Scholar] [CrossRef]
  6. Ebrahimi, D.; Sharafeddine, S.; Ho, P.H.; Assi, C. Autonomous UAV trajectory for localizing ground objects: A reinforcement learning approach. IEEE Trans. Mob. Comput. 2021, 20, 1312–1324. [Google Scholar] [CrossRef]
  7. Guo, H.; Liu, J. UAV-Enhanced Intelligent Offloading for Internet of Things at the Edge. IEEE Trans. Ind. Inform. 2020, 16, 2737–2746. [Google Scholar] [CrossRef]
  8. Li, M.; Cheng, N.; Gao, J.; Wang, Y.; Zhao, L.; Shen, X. Energy-Efficient UAV-Assisted Mobile Edge Computing: Resource Allocation and Trajectory Optimization. IEEE Trans. Veh. Technol. 2020, 69, 3424–3438. [Google Scholar] [CrossRef]
  9. Zhang, J.; Zhou, L.; Zhou, F.; Seet, B.C.; Zhang, H.; Cai, Z.; Wei, J. Computation-Efficient Offloading and Trajectory Scheduling for Multi-UAV Assisted Mobile Edge Computing. IEEE Trans. Veh. Technol. 2020, 69, 2114–2125. [Google Scholar] [CrossRef]
  10. Zhang, T.; Xu, Y.; Loo, J.; Yang, D.; Xiao, L. Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT. IEEE Trans. Ind. Inform. 2020, 16, 5505–5516. [Google Scholar] [CrossRef] [Green Version]
  11. Li, S.; Hu, X.; Du, Y. Deep Reinforcement Learning for Computation Offloading and Resource Allocation in Unmanned-Aerial-Vehicle Assisted Edge Computing. Sensors 2021, 21, 6499. [Google Scholar] [CrossRef]
  12. Nguyen, M.T.; Nguyen, C.V.; Do, H.T.; Hua, H.T.; Tran, T.A.; Nguyen, A.D.; Ala, G.; Viola, F. UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey. Electronics 2021, 10, 2603. [Google Scholar] [CrossRef]
  13. Popescu, D.; Stoican, F.; Stamatescu, G.; Chenaru, O.; Ichim, L. A Survey of Collaborative UAV–WSN Systems for Efficient Monitoring. Sensors 2019, 19, 4690. [Google Scholar] [CrossRef] [Green Version]
  14. Ali, Z.A.; Masroor, S.; Aamir, M. UAV Based Data Gathering in Wireless Sensor Networks. Wirel. Pers. Commun. 2019, 106, 1801–1811. [Google Scholar] [CrossRef]
  15. Baek, J.; Han, S.I.; Han, Y. Optimal UAV Route in Wireless Charging Sensor Networks. IEEE Internet Things J. 2020, 7, 1327–1335. [Google Scholar] [CrossRef]
  16. Fu, S.; Tang, Y.; Wu, Y.; Zhang, N.; Gu, H.; Chen, C.; Liu, M. Energy-Efficient UAV enabled Data Collection via Wireless Charging: A Reinforcement Learning Approach. IEEE Internet Things J. 2021, 8, 10209–10219. [Google Scholar] [CrossRef]
  17. Wang, X.; Liu, X.; Cheng, C.T.; Deng, L.; Chen, X.; Xiao, F. A Joint User Scheduling and Trajectory Planning Data Collection Strategy for the UAV-Assisted WSN. IEEE Commun. Lett. 2021, 25, 2333–2337. [Google Scholar] [CrossRef]
  18. Liu, J.; Wang, X.; Bai, B.; Dai, H. Age-optimal trajectory planning for UAV-assisted data collection. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018; pp. 553–558. [Google Scholar] [CrossRef] [Green Version]
  19. Gong, J.; Chang, T.H.; Shen, C.; Chen, X. Flight Time Minimization of UAV for Data Collection Over Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2018, 36, 1942–1954. [Google Scholar] [CrossRef] [Green Version]
  20. Ghorbel, M.B.; Rodríguez-Duarte, D.; Ghazzai, H.; Hossain, M.J.; Menouar, H. Joint Position and Travel Path Optimization for Energy Efficient Wireless Data Gathering Using Unmanned Aerial Vehicles. IEEE Trans. Veh. Technol. 2019, 68, 2165–2175. [Google Scholar] [CrossRef]
  21. Zhu, B.; Bedeer, E.; Nguyen, H.H.; Barton, R.; Henry, J. UAV Trajectory Planning in Wireless Sensor Networks for Energy Consumption Minimization by Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2021, 70, 9540–9554. [Google Scholar] [CrossRef]
  22. Gaglio, S.; Lo Re, G.; Martorella, G.; Peri, D. DC4CD: A Platform for Distributed Computing on Constrained Devices. ACM Trans. Embed. Comput. Syst. 2017, 17, 27:1–27:25. [Google Scholar] [CrossRef]
  23. Gaglio, S.; Lo Re, G.; Martorella, G.; Peri, D. A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 18–21 February 2019; pp. 355–359. [Google Scholar] [CrossRef]
  24. Gaglio, S.; Lo Re, G.; Martorella, G.; Peri, D. WSN Design and Verification using On-board Executable Specifications. IEEE Trans. Ind. Inform. 2018, 15, 710–718. [Google Scholar] [CrossRef]
  25. Gaglio, S.; Lo Re, G.; Martorella, G.; Peri, D. Knowledge-Based Verification of Concatenative Programming Patterns Inspired by Natural Language for Resource-Constrained Embedded Devices. Sensors 2021, 21, 107. [Google Scholar] [CrossRef] [PubMed]
  26. Ouyang, F.; Cheng, H.; Lan, Y.; Zhang, Y.; Yin, X.; Hu, J.; Peng, X.; Wang, G.; Chen, S. Automatic delivery and recovery system of Wireless Sensor Networks (WSN) nodes based on UAV for agricultural applications. Comput. Electron. Agric. 2019, 162, 31–43. [Google Scholar] [CrossRef]
  27. Augello, A.; Gaglio, S.; Lo Re, G.; Peri, D. Simulation and Test of UAV Tasks with Resource-Constrained Hardware in the Loop. In Proceedings of the 2021 IEEE International Conference on Smart Computing, SMARTCOMP 2021, Irvine, CA, USA, 23–27 August 2021; pp. 347–352. [Google Scholar] [CrossRef]
  28. Augello, A.; D’Antoni, R.; Gaglio, S.; Lo Re, G.; Martorella, G.; Peri, D. Verification of Symbolic Distributed Protocols for Networked Embedded Devices. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Vienna, Austria, 8–11 September 2020; pp. 1177–1180. [Google Scholar] [CrossRef]
  29. Robinson, J. On the Hamiltonian Game (A Traveling Salesman Problem); Technical report, Rand project air force arlington va; RAND Corporation: Santa Monica, CA, USA, 1949. [Google Scholar]
  30. Bang-Jensen, J.; Gutin, G.; Yeo, A. When the greedy algorithm fails. Discret. Optim. 2004, 1, 121–127. [Google Scholar] [CrossRef] [Green Version]
  31. Zhou, Y.; Rao, B.; Wang, W. UAV Swarm Intelligence: Recent Advances and Future Trends. IEEE Access 2020, 8, 183856–183878. [Google Scholar] [CrossRef]
  32. Konatowski, S.; Pawłowski, P. Ant colony optimization algorithm for UAV path planning. In Proceedings of the 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, Ukraine, 20–24 February 2018; pp. 177–182. [Google Scholar] [CrossRef]
  33. Pham, D.T.; Ghanbarzadeh, A.; Koç, E.; Otri, S.; Rahim, S.; Zaidi, M. The Bees Algorithm—A Novel Tool for Complex Optimisation Problems. In Intelligent Production Machines and Systems; Elsevier: Amsterdam, The Netherlands, 2006; pp. 454–459. [Google Scholar]
  34. Pham, D.T.; Castellani, M. A comparative study of the Bees Algorithm as a tool for function optimisation. Cogent Eng. 2015, 2, 1091540. [Google Scholar] [CrossRef]
  35. Lambey, V.; Prasad, A.D. A Review on Air Quality Measurement Using an Unmanned Aerial Vehicle. Water Air Soil Pollut. 2021, 232, 109. [Google Scholar] [CrossRef]
  36. Perron, L.; Furnon, V. OR-Tools; Version 9.1; Google: Mountain View, CA, USA, 2019; Available online: https://developers.google.com/optimization/ (accessed on 31 May 2022).
  37. Mazyavkina, N.; Sviridov, S.; Ivanov, S.; Burnaev, E. Reinforcement learning for combinatorial optimization: A survey. Comput. Oper. Res. 2021, 134, 105400. [Google Scholar] [CrossRef]
  38. Razali, N.M.; Geraghty, J. Genetic algorithm performance with different selection strategies in solving TSP. In Proceedings of the World Congress on Engineering, London, UK, 6–8 July 2011; International Association of Engineers: Hong Kong, China, 2011; Volume 2, pp. 1–6. [Google Scholar]
  39. Zhao, Y.; Zheng, Z.; Liu, Y. Survey on computational-intelligence-based UAV path planning. Knowl.-Based Syst. 2018, 158, 54–64. [Google Scholar] [CrossRef]
  40. Zhang, J. An Improved Genetic Algorithm with 2-Opt Local Search for the Traveling Salesman Problem. In Proceedings of the International Conference on Application of Intelligent Systems in Multi-modal Information Analytics, Huhehaote, China, 23–24 April 2021; Springer: Berlin/Heidelberg, Germany, 2021; pp. 404–409. [Google Scholar]
  41. Yu, F.; Fu, X.; Li, H.; Dong, G. Improved Roulette Wheel Selection-Based Genetic Algorithm for TSP. In Proceedings of the 2016 International Conference on Network and Information Systems for Computers (ICNISC), Wuhan, China, 15–17 April 2016; pp. 151–154. [Google Scholar] [CrossRef]
  42. Levenshtein, V.I. Binary codes capable of correcting deletions, insertions, and reversals. Sov. Phys. Dokl. 1966, 10, 707–710. [Google Scholar]
Figure 1. Example scenario. The UAV either visits each CH twice or hovers (circle around the CH of cluster 2) over a CH until the computation ends. The number near each arrow indicates the visit order.
Figure 1. Example scenario. The UAV either visits each CH twice or hovers (circle around the CH of cluster 2) over a CH until the computation ends. The number near each arrow indicates the visit order.
Sensors 22 05298 g001
Figure 2. Path shown in terms of both the visit path through waypoints [ w 0 , w 1 , w 2 , w 2 , w 3 , w 1 , w 3 , w 0 ] (a) and the corresponding execution of processes on the nodes (b). The visit sequence has two consecutive w 2 because the UAV hovers there until the application execution in cluster 2 is over. The cost of each edge is shown in the round brackets next to the visit-order number. The empty rectangles correspond to the execution of the distributed computation, each associated with the respective execution time τ i ; the filled rectangles represent data collection operations.
Figure 2. Path shown in terms of both the visit path through waypoints [ w 0 , w 1 , w 2 , w 2 , w 3 , w 1 , w 3 , w 0 ] (a) and the corresponding execution of processes on the nodes (b). The visit sequence has two consecutive w 2 because the UAV hovers there until the application execution in cluster 2 is over. The cost of each edge is shown in the round brackets next to the visit-order number. The empty rectangles correspond to the execution of the distributed computation, each associated with the respective execution time τ i ; the filled rectangles represent data collection operations.
Sensors 22 05298 g002
Figure 3. Comparison of the Double Round (a) strategy and a greedy strategy (b). The latter produced a better path.
Figure 3. Comparison of the Double Round (a) strategy and a greedy strategy (b). The latter produced a better path.
Sensors 22 05298 g003
Figure 4. A greedy strategy (a) can lead to less than optimal paths (b).
Figure 4. A greedy strategy (a) can lead to less than optimal paths (b).
Sensors 22 05298 g004
Figure 5. Permitting the UAV to hover on a waypoint (a) may lead to shorter paths than visiting other clusters and then going back (b).
Figure 5. Permitting the UAV to hover on a waypoint (a) may lead to shorter paths than visiting other clusters and then going back (b).
Sensors 22 05298 g005
Figure 6. The same path as in Figure 4b is shown both as a path that visits each node twice in the original graph (a) and as a Hamiltonian cycle in a graph with duplicate nodes (b). The duplicate nodes are all visited after the original nodes.
Figure 6. The same path as in Figure 4b is shown both as a path that visits each node twice in the original graph (a) and as a Hamiltonian cycle in a graph with duplicate nodes (b). The duplicate nodes are all visited after the original nodes.
Sensors 22 05298 g006
Figure 7. Preliminary results for 100 waypoints at increasing population sizes and numbers of iterations used for parameter fine-tuning.
Figure 7. Preliminary results for 100 waypoints at increasing population sizes and numbers of iterations used for parameter fine-tuning.
Sensors 22 05298 g007
Figure 8. Overall coverage of the area of operation (2000 m × 2000 m) by the different experimental arrangements of 100 clusters.
Figure 8. Overall coverage of the area of operation (2000 m × 2000 m) by the different experimental arrangements of 100 clusters.
Sensors 22 05298 g008
Figure 9. Average time required for mission completion versus number of nodes clusters to be visited. All scales are logarithmic.
Figure 9. Average time required for mission completion versus number of nodes clusters to be visited. All scales are logarithmic.
Sensors 22 05298 g009
Figure 10. Average time required for mission completion versus number of node clusters to be visited. Only the three top strategies are shown.
Figure 10. Average time required for mission completion versus number of node clusters to be visited. Only the three top strategies are shown.
Sensors 22 05298 g010
Figure 11. Performance of the selected search strategies with increasing number of clusters. The performance metric is still the time required for mission completion, measured in seconds.
Figure 11. Performance of the selected search strategies with increasing number of clusters. The performance metric is still the time required for mission completion, measured in seconds.
Sensors 22 05298 g011
Figure 12. Pairwise path similarity based on their edit distance. As the number of clusters grows, the similarity between the paths found by the initialized BA and by the algorithm used for initialization decreases.
Figure 12. Pairwise path similarity based on their edit distance. As the number of clusters grows, the similarity between the paths found by the initialized BA and by the algorithm used for initialization decreases.
Sensors 22 05298 g012
Figure 13. Average time required for mission completion versus number of nodes clusters to be visited. The improvement in the performance of the genetic algorithm given by the priming is negligible.
Figure 13. Average time required for mission completion versus number of nodes clusters to be visited. The improvement in the performance of the genetic algorithm given by the priming is negligible.
Sensors 22 05298 g013
Figure 14. Performance of the strategies that produced the fastest routes with respect to other metrics.
Figure 14. Performance of the strategies that produced the fastest routes with respect to other metrics.
Sensors 22 05298 g014
Figure 15. Performance of BA 2 n + 1 with Double Round initialization at an increasing number of clusters on all the selected metrics, depending on the optimized metric.
Figure 15. Performance of BA 2 n + 1 with Double Round initialization at an increasing number of clusters on all the selected metrics, depending on the optimized metric.
Sensors 22 05298 g015
Figure 16. Example comparison of paths found by different strategies. Single round with wait (a), average AoI minimization (b), and average data-collection time minimization (c). Both Single Round with Wait and AoI minimization achieved zero AoI, as the data retrievals were scheduled for as soon as the computations were over. The second strategy, however, had a shorter overall mission time, as the UAV was not forced to remain idle when the clusters were busy with computation. The average data collection minimization scheduled more collections early on in the process and, without the constraint of having to pick up data as soon as possible, achieved a shorter mission time.
Figure 16. Example comparison of paths found by different strategies. Single round with wait (a), average AoI minimization (b), and average data-collection time minimization (c). Both Single Round with Wait and AoI minimization achieved zero AoI, as the data retrievals were scheduled for as soon as the computations were over. The second strategy, however, had a shorter overall mission time, as the UAV was not forced to remain idle when the clusters were busy with computation. The average data collection minimization scheduled more collections early on in the process and, without the constraint of having to pick up data as soon as possible, achieved a shorter mission time.
Sensors 22 05298 g016
Table 1. Definition of the additional metrics used for the optimizations described in Section 4.2.
Table 1. Definition of the additional metrics used for the optimizations described in Section 4.2.
MetricDefinition
Average AoI 1 | W | i = 1 | W | ( t i t i τ i )
Average cluster computation end time 1 | W | i = 1 | W | ( t i + τ i )
Average data collection time 1 | W | i = 1 | W | t i
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Augello, A.; Gaglio, S.; Lo Re, G.; Peri, D. Time-Constrained Node Visit Planning for Collaborative UAV–WSN Distributed Applications. Sensors 2022, 22, 5298. https://0-doi-org.brum.beds.ac.uk/10.3390/s22145298

AMA Style

Augello A, Gaglio S, Lo Re G, Peri D. Time-Constrained Node Visit Planning for Collaborative UAV–WSN Distributed Applications. Sensors. 2022; 22(14):5298. https://0-doi-org.brum.beds.ac.uk/10.3390/s22145298

Chicago/Turabian Style

Augello, Andrea, Salvatore Gaglio, Giuseppe Lo Re, and Daniele Peri. 2022. "Time-Constrained Node Visit Planning for Collaborative UAV–WSN Distributed Applications" Sensors 22, no. 14: 5298. https://0-doi-org.brum.beds.ac.uk/10.3390/s22145298

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop