{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:46:53Z","timestamp":1774525613698,"version":"3.50.1"},"reference-count":150,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T00:00:00Z","timestamp":1656892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T00:00:00Z","timestamp":1656892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10462-022-10225-1","type":"journal-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T10:02:42Z","timestamp":1656928962000},"page":"2279-2324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of \u201cThings\u201d with \u201cUAV\u201d possibilities and tests"],"prefix":"10.1007","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1439-1885","authenticated-orcid":false,"given":"Ashish","family":"Srivastava","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6235-9735","authenticated-orcid":false,"given":"Jay","family":"Prakash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"issue":"5","key":"10225_CR1","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.3390\/s18051413","volume":"18","author":"F Aadil","year":"2018","unstructured":"Aadil F, Raza A, Khan MF, Maqsood M, Mehmood I, Rho S (2018) Energy aware cluster-based routing in flying ad-hoc networks. Sensors 18(5):1413","journal-title":"Sensors"},{"key":"10225_CR2","doi-asserted-by":"publisher","first-page":"58383","DOI":"10.1109\/ACCESS.2018.2875040","volume":"6","author":"HV Abeywickrama","year":"2018","unstructured":"Abeywickrama HV, Jayawickrama BA, He Y, Dutkiewicz E (2018) Comprehensive energy consumption model for unmanned aerial vehicles, based on empirical studies of battery performance. IEEE Access 6:58383\u201358394","journal-title":"IEEE Access"},{"issue":"4","key":"10225_CR3","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"10225_CR4","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1016\/j.asoc.2011.05.036","volume":"12","author":"H Ali","year":"2012","unstructured":"Ali H, Shahzad W, Khan FA (2012) Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl Soft Comput 12(7):1913\u20131928","journal-title":"Appl Soft Comput"},{"key":"10225_CR5","doi-asserted-by":"publisher","first-page":"36500","DOI":"10.1109\/ACCESS.2019.2903554","volume":"7","author":"J Al-Jaroodi","year":"2019","unstructured":"Al-Jaroodi J, Mohamed N (2019) Blockchain in industries: a survey. IEEE Access 7:36500\u201336515","journal-title":"IEEE Access"},{"issue":"11","key":"10225_CR6","doi-asserted-by":"publisher","first-page":"5908","DOI":"10.3390\/su13115908","volume":"13","author":"FA Almalki","year":"2021","unstructured":"Almalki FA, Soufiene BO, Alsamhi SH, Sakli H (2021) A low-cost platform for environmental smart farming monitoring system based on iot and uavs. Sustainability 13(11):5908","journal-title":"Sustainability"},{"key":"10225_CR7","unstructured":"Alsamhi S , Ma O, Ansari M (2018) Predictive estimation of the optimal signal strength from unmanned aerial vehicle over internet of things using ann. arXiv preprint arXiv:1805.07614)"},{"key":"10225_CR8","doi-asserted-by":"crossref","unstructured":"Alsamhi S, Rajput N (2014) Performance and analysis of propagation models for efficient handoff in high altitude platform system to sustain qos. 2014 ieee students\u2019 conference on electrical, electronics and computer science (pp. 1-6)","DOI":"10.1109\/SCEECS.2014.6804496"},{"key":"10225_CR9","doi-asserted-by":"crossref","unstructured":"Alsamhi SH, Afghah F, Sahal R, Hawbani A, Al-qaness A, Lee B, Guizani M (2021) Green internet of things using uavs in b5g networks: A review of applications and strategies. Ad Hoc Networks) 102505","DOI":"10.1016\/j.adhoc.2021.102505"},{"key":"10225_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3074442","author":"SH Alsamhi","year":"2021","unstructured":"Alsamhi SH, Almalki F, Ma O, Ansari MS, Lee B (2021) Predictive estimation of optimal signal strength from drones over iot frameworks in smart cities. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2021.3074442","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"10225_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11235-019-00580-w","volume":"75","author":"SH Alsamhi","year":"2020","unstructured":"Alsamhi SH, Almalki FA, Ma O, Ansari MS, Angelides MC (2020) Performance optimization of tethered balloon technology for public safety and emergency communications. Telecommun Syst 75(2):235\u2013244","journal-title":"Telecommun Syst"},{"issue":"9","key":"10225_CR12","doi-asserted-by":"crossref","first-page":"4255","DOI":"10.1002\/ett.4255","volume":"32","author":"SH Alsamhi","year":"2021","unstructured":"Alsamhi SH, Lee B, Guizani M, Kumar N, Qiao Y, Liu X (2021) Blockchain for decentralized multi-drone to combat covid-19 and future pandemics: framework and proposed solutions. Trans Emerg Telecommun Technol 32(9):4255","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10225_CR13","doi-asserted-by":"publisher","first-page":"128125","DOI":"10.1109\/ACCESS.2019.2934998","volume":"7","author":"SH Alsamhi","year":"2019","unstructured":"Alsamhi SH, Ma O, Ansari MS, Almalki FA (2019) Survey on collaborative smart drones and internet of things for improving smartness of smart cities. Ieee Access 7:128125\u2013128152","journal-title":"Ieee Access"},{"issue":"1","key":"10225_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.3390\/drones3010013","volume":"3","author":"SH Alsamhi","year":"2019","unstructured":"Alsamhi SH, Ma O, Ansari MS, Gupta SK (2019) Collaboration of drone and internet of public safety things in smart cities: an overview of qos and network performance optimization. Drones 3(1):13","journal-title":"Drones"},{"key":"10225_CR15","doi-asserted-by":"crossref","unstructured":"Alsamhi SH, Rajput N (2014) Hap antenna radiation pattern for providing coverage and service characteristics. In: 2014 International Conference on Advances in Computing, Communications and Informatics (icacci) (pp\u00a01434\u20131439)","DOI":"10.1109\/ICACCI.2014.6968274"},{"issue":"2","key":"10225_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3001836","volume":"1","author":"R Altawy","year":"2016","unstructured":"Altawy R, Youssef AM (2016) Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber-Phys Syst 1(2):1\u201325","journal-title":"ACM Trans Cyber-Phys Syst"},{"issue":"13","key":"10225_CR17","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-018-6288-7","volume":"79","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman F, Alturjman S (2020) 5g\/iot-enabled uavs for multimedia delivery in industry-oriented applications. Multimed Tools Appl 79(13):8627\u20138648","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10225_CR18","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/LWC.2017.2700840","volume":"6","author":"M Alzenad","year":"2017","unstructured":"Alzenad M, El-Keyi A, Lagum F, Yanikomeroglu H (2017) 3-d placement of an unmanned aerial vehicle base station (uav-bs) for energy-efficient maximal coverage. IEEE Wirel Commun Lett 6(4):434\u2013437","journal-title":"IEEE Wirel Commun Lett"},{"key":"10225_CR19","doi-asserted-by":"crossref","unstructured":"Aman W, Snekkenes E (2015) Managing security trade-offs in the internet of things using adaptive security. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp\u00a0362\u2013368","DOI":"10.1109\/ICITST.2015.7412122"},{"issue":"6","key":"10225_CR20","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/LWC.2018.2841386","volume":"7","author":"R Amorim","year":"2018","unstructured":"Amorim R, Nguyen H, Wigard J, Kov\u00e1cs IZ, S\u00f8rensen TB, Biro DZ, Mogensen P (2018) Measured uplink interference caused by aerial vehicles in lte cellular networks. IEEE Wirel Commun Lett 7(6):958\u2013961","journal-title":"IEEE Wirel Commun Lett"},{"key":"10225_CR21","unstructured":"Analytics I (2018) State of the iot 2018: Number of iot devices now at 7b-market accelerating. https:\/\/iot-analytics.com\/state-ofthe-iot-update-q1-q2-2018-number-of-iotdevices-now-7b\/ Accessed 12 Apr 2021"},{"key":"10225_CR22","doi-asserted-by":"publisher","first-page":"18649","DOI":"10.1109\/ACCESS.2021.3053605","volume":"9","author":"MY Arafat","year":"2021","unstructured":"Arafat MY, Moh S (2021) Bio-inspired approaches for energy-efficient localization and clustering in uav networks for monitoring wildfires in remote areas. IEEE Access 9:18649\u201318669","journal-title":"IEEE Access"},{"key":"10225_CR23","doi-asserted-by":"crossref","unstructured":"Arasteh H, Hosseinnezhad V, Loia V, Tommasetti A, Troisi O, Shafie-khah M, Siano P (2016) Iot-based smart cities: a survey. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), pp\u00a01\u20136","DOI":"10.1109\/EEEIC.2016.7555867"},{"issue":"15","key":"10225_CR24","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"10225_CR25","doi-asserted-by":"crossref","unstructured":"Bacco M, Cassar\u00e1 P, Colucci M, Gotta A, Marchese M, Patrone F (2017) A survey on network architectures and applications for nanosat and uav swarms. In: International Conference on Wireless and Satellite Systems, pp\u00a075\u201385","DOI":"10.1007\/978-3-319-76571-6_8"},{"key":"10225_CR26","unstructured":"Bento MdF (2008) Unmanned aerial vehicles: an overview. Inside GNSS,3,1,54-61. http:\/\/www.insidegnss.com\/auto\/janfeb08-wp.pdf"},{"issue":"4","key":"10225_CR27","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.3390\/s18041170","volume":"18","author":"JA Besada","year":"2018","unstructured":"Besada JA, Bergesio L, Campa\u00f1a I, Vaquero-Melchor D, L\u00f3pez-Araquistain J, Bernardos AM, Casar JR (2018) Drone mission definition and implementation for automated infrastructure inspection using airborne sensors. Sensors 18(4):1170","journal-title":"Sensors"},{"key":"10225_CR28","doi-asserted-by":"crossref","unstructured":"Brust MR, Danoy G, Bouvry P, Gashi D, Pathak H, Gon\u00e7alves MP (2017) Defending against intrusion of malicious uavs with networked uav defense swarms. In: 2017 IEEE 42nd Conference on Local Computer Networks Workshops (lcn workshops), pp\u00a0103\u2013111","DOI":"10.1109\/LCN.Workshops.2017.71"},{"key":"10225_CR29","volume":"55","author":"R Ch","year":"2020","unstructured":"Ch R, Srivastava G, Gadekallu TR, Maddikunta PKR, Bhattacharya S (2020) Security and privacy of uav data using blockchain technology. J Inf Secur Appl 55:102670","journal-title":"J Inf Secur Appl"},{"key":"10225_CR30","doi-asserted-by":"crossref","unstructured":"Chae H, Park J, Song H, Kim Y, Jeong H (2015) The iot based automate landing system of a drone for the round-the-clock surveillance solution. In: 2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), pp 1575\u20131580","DOI":"10.1109\/AIM.2015.7222767"},{"key":"10225_CR31","doi-asserted-by":"crossref","unstructured":"Challita U, Saad W, Bettstetter C (2018) Deep reinforcement learning for interference-aware path planning of cellular-connected uavs. In: 2018 IEEE International Conference on Communications (icc), pp\u00a01\u20137","DOI":"10.1109\/ICC.2018.8422706"},{"issue":"4","key":"10225_CR32","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1109\/TSG.2015.2510325","volume":"8","author":"K-L Chen","year":"2016","unstructured":"Chen K-L, Chen Y-R, Tsai Y-P, Chen N (2016) A novel wireless multifunctional electronic current transformer based on zigbee-based communication. IEEE Trans Smart Grid 8(4):1888\u20131897","journal-title":"IEEE Trans Smart Grid"},{"issue":"4","key":"10225_CR33","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2014.2337336","volume":"1","author":"S Chen","year":"2014","unstructured":"Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of iot: applications, challenges, and opportunities with china perspective. IEEE Internet Things J 1(4):349\u2013359","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"10225_CR34","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and iot: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"key":"10225_CR35","unstructured":"CISCO (2014) The internet of things reference model. http:\/\/cdn.iotwf.com\/resources\/71\/IoTReferenceModelWhitePaperJune42014.pdf. Accessed 29 Mar 2021"},{"key":"10225_CR36","unstructured":"Consortiq (2018) Short history unmanned aerial vehicles uavs. https:\/\/consortiq.com\/short-history-unmanned-aerial-vehicles-uavs\/?v=79cba1185463. Accessed 27 Jan 2021"},{"issue":"8","key":"10225_CR37","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R (2016) Fog computing: helping the internet of things realize its potential. Computer 49(8):112\u2013116","journal-title":"Computer"},{"key":"10225_CR38","unstructured":"Deepa N, Pham Q-V, Nguyen DC, Bhattacharya S, Gadekallu TR, Maddikunta PKR others (2020) A survey on blockchain for big data: Approaches, opportunities, and future directions. arXiv preprint arXiv:2009.00858)"},{"key":"10225_CR39","unstructured":"Domin K, Symeonidis I, Marin E (2016) Security analysis of the drone communication protocol: Fuzzing the mavlink protocol"},{"issue":"10","key":"10225_CR40","doi-asserted-by":"publisher","first-page":"10187","DOI":"10.1109\/TVT.2019.2935877","volume":"68","author":"Y Du","year":"2019","unstructured":"Du Y, Yang K, Wang K, Zhang G, Zhao Y, Chen D (2019) Joint resources and workflow scheduling in uav-enabled wirelessly-powered mec for iot systems. IEEE Trans Veh Technol 68(10):10187\u201310200","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"10225_CR41","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MPRV.2017.11","volume":"16","author":"M Erdelj","year":"2017","unstructured":"Erdelj M, Natalizio E, Chowdhury KR, Akyildiz IF (2017) Help from the sky: leveraging uavs for disaster management. IEEE Pervas Comput 16(1):24\u201332","journal-title":"IEEE Pervas Comput"},{"issue":"13","key":"10225_CR42","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.3390\/s19132955","volume":"19","author":"SS Fakhrulddin","year":"2019","unstructured":"Fakhrulddin SS, Gharghan SK, Al-Naji A, Chahl J (2019) An advanced first aid system based on an unmanned aerial vehicles and a wireless body area sensor network for elderly persons in outdoor environments. Sensors 19(13):2955","journal-title":"Sensors"},{"key":"10225_CR43","doi-asserted-by":"publisher","first-page":"125827","DOI":"10.1109\/ACCESS.2019.2939000","volume":"7","author":"C Fan","year":"2019","unstructured":"Fan C, Bao S, Tao Y, Li B, Zhao C (2019) Fuzzy reinforcement learning for robust spectrum access in dynamic shared networks. IEEE Access 7:125827\u2013125839","journal-title":"IEEE Access"},{"issue":"2","key":"10225_CR44","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1109\/JIOT.2018.2874531","volume":"6","author":"W Feng","year":"2018","unstructured":"Feng W, Wang J, Chen Y, Wang X, Ge N, Lu J (2018) Uav-aided mimo communications for 5g internet of things. IEEE Internet Things J 6(2):1731\u20131740","journal-title":"IEEE Internet Things J"},{"key":"10225_CR45","doi-asserted-by":"crossref","unstructured":"Ferati M, Kurti A, Vogel B, Raufi B (2016) Augmenting requirements gathering for people with special needs using iot: a position paper. In: Proceedings of the 9th International Workshop on Cooperative and Human Aspects of Software Engineering, pp\u00a048\u201351","DOI":"10.1145\/2897586.2897617"},{"key":"10225_CR46","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Blanco-Novoa O, Froiz-M\u00edguez I, Fraga-Lamas P (2019) Towards an autonomous industry 4.0 warehouse: A uav and blockchain-based system for inventory and traceability applications in big data-driven supply chain management. Sensors 19(10): 2394","DOI":"10.3390\/s19102394"},{"issue":"1","key":"10225_CR47","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10846-008-9253-2","volume":"54","author":"EW Frew","year":"2009","unstructured":"Frew EW, Brown TX (2009) Networking issues for small unmanned aircraft systems. J Intell Rob Syst 54(1):21\u201337","journal-title":"J Intell Rob Syst"},{"key":"10225_CR48","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","volume":"71","author":"P Gandotra","year":"2016","unstructured":"Gandotra P, Jha RK (2016) Device-to-device communication in cellular networks: a survey. J Netw Comput Appl 71:99\u2013117","journal-title":"J Netw Comput Appl"},{"key":"10225_CR49","unstructured":"gsma (2010) Characteristics of unmanned aircraft systems and spectrum requirements to support their safe operation in nonsegregated airspace. http:\/\/www.itu.int\/pub\/R-REP-M.2171\/fr. Accessed 05 Apr 2021"},{"key":"10225_CR50","unstructured":"gsma (2014) Connected living: mobilising the internet of things. http:\/\/www.gsma.com\/connectedliving\/. Accessed 27 Oct 2020"},{"key":"10225_CR51","unstructured":"GSMA (2018) Gsma network slicing: Use case requirements. https:\/\/www.gsma.com\/futurenetworks\/wp-content\/uploads\/2018\/04\/NS-Final.pdf. Accessed 17 Feb 2021"},{"issue":"3","key":"10225_CR52","first-page":"309","volume":"5","author":"A Gupta","year":"2020","unstructured":"Gupta A, Sundhan S, Gupta SK, Alsamhi S, Rashid M (2020) Collaboration of uav and hetnet for better qos: a comparative study. Int J Veh Inf Commun Syst 5(3):309\u2013333","journal-title":"Int J Veh Inf Commun Syst"},{"issue":"4","key":"10225_CR53","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1109\/COMST.2016.2560343","volume":"18","author":"S Hayat","year":"2016","unstructured":"Hayat S, Yanmaz E, Muzaffar R (2016) Survey on unmanned aerial vehicle networks for civil applications: a communications viewpoint. IEEE Commun Surv Tutor 18(4):2624\u20132661","journal-title":"IEEE Commun Surv Tutor"},{"key":"10225_CR54","doi-asserted-by":"crossref","unstructured":"Hellaoui H, Chelli A, Bagaa M, Taleb T (2018) Towards mitigating the impact of uavs on cellular communications. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp\u00a01\u20137","DOI":"10.1109\/GLOCOM.2018.8648083"},{"key":"10225_CR55","doi-asserted-by":"publisher","first-page":"14959","DOI":"10.1109\/ACCESS.2019.2892996","volume":"7","author":"M Hua","year":"2019","unstructured":"Hua M, Wang Y, Lin M, Li C, Huang Y, Yang L (2019) Joint comp transmission for uav-aided cognitive satellite terrestrial networks. IEEE Access 7:14959\u201314968","journal-title":"IEEE Access"},{"issue":"4","key":"10225_CR56","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MWC.001.2000429","volume":"28","author":"A Islam","year":"2021","unstructured":"Islam A, Rahim T, Masuduzzaman M, Shin SY (2021) A blockchain-based artificial intelligence-empowered contagious pandemic situation supervision scheme using internet of drone things. IEEE Wirel Commun 28(4):166\u2013173","journal-title":"IEEE Wirel Commun"},{"issue":"5","key":"10225_CR57","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/JCN.2019.000050","volume":"21","author":"A Islam","year":"2019","unstructured":"Islam A, Shin SY (2019) Buav: a blockchain based secure uav-assisted data acquisition scheme in internet of things. J Commun Networks 21(5):491\u2013502","journal-title":"J Commun Networks"},{"key":"10225_CR58","doi-asserted-by":"publisher","first-page":"103231","DOI":"10.1109\/ACCESS.2019.2930774","volume":"7","author":"A Islam","year":"2019","unstructured":"Islam A, Shin SY (2019) Bus: a blockchain-enabled data acquisition scheme with the assistance of uav swarm in internet of things. IEEE Access 7:103231\u2013103249","journal-title":"IEEE Access"},{"key":"10225_CR59","doi-asserted-by":"publisher","first-page":"106627","DOI":"10.1016\/j.compeleceng.2020.106627","volume":"84","author":"A Islam","year":"2020","unstructured":"Islam A, Shin SY (2020) A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in internet of things. Comput Electr Eng 84:106627","journal-title":"Comput Electr Eng"},{"key":"10225_CR60","unstructured":"ISO (2018). Iso\/iec 30141:2018 internet of things (lot)-reference architecture; standard. International Organization for Standardization)"},{"key":"10225_CR61","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jnca.2017.02.008","volume":"84","author":"I Jawhar","year":"2017","unstructured":"Jawhar I, Mohamed N, Al-Jaroodi J, Agrawal DP, Zhang S (2017) Communication and networking of uav-based systems: classification and associated architectures. J Netw Comput Appl 84:93\u2013108","journal-title":"J Netw Comput Appl"},{"key":"10225_CR62","doi-asserted-by":"crossref","unstructured":"Jawhar I, Mohamed N, Al-Jaroodi J, Zhang S (2013) Data communication in linear wireless sensor networks using unmanned aerial vehicles. In: 2013 International Conference on Unmanned Aircraft Systems (ICUAS), pp\u00a0492\u2013499","DOI":"10.1109\/ICUAS.2013.6564725"},{"key":"10225_CR63","doi-asserted-by":"crossref","unstructured":"Jia Z, Sheng M, Li J, Niyato D, Han Z (2020) Leo satellite-assisted uav: Joint trajectory and data collection for internet of remote things in 6g aerial access networks. IEEE Internet Things J","DOI":"10.1109\/JIOT.2020.3021255"},{"key":"10225_CR64","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.comnet.2019.02.002","volume":"153","author":"A Jindal","year":"2019","unstructured":"Jindal A, Aujla GS, Kumar N (2019) Survivor: a blockchain based edge-as-a-service framework for secure energy trading in sdn-enabled vehicle-to-grid environment. Comput Netw 153:36\u201348","journal-title":"Comput Netw"},{"issue":"8","key":"10225_CR65","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wireless Netw 20(8):2481\u20132501","journal-title":"Wireless Netw"},{"key":"10225_CR66","doi-asserted-by":"crossref","unstructured":"Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6lowpan based internet of things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (wimob), pp\u00a0600\u2013607","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"10225_CR67","doi-asserted-by":"crossref","unstructured":"Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp\u00a0257\u2013260","DOI":"10.1109\/FIT.2012.53"},{"key":"10225_CR68","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","volume":"114","author":"A Khanna","year":"2020","unstructured":"Khanna A, Kaur S (2020) Internet of things (iot), applications and challenges: a comprehensive review. Wirel Person Commun 114:1687\u20131762","journal-title":"Wirel Person Commun"},{"issue":"12","key":"10225_CR69","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1109\/LCOMM.2018.2875477","volume":"22","author":"H Kim","year":"2018","unstructured":"Kim H, Ben-Othman J (2018) A collision-free surveillance system using smart uavs in multi domain iot. IEEE Commun Lett 22(12):2587\u20132590","journal-title":"IEEE Commun Lett"},{"issue":"8","key":"10225_CR70","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr T, Schmitt C, Hu W, Br\u00fcnig M, Carle G (2013) Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710\u20132723","journal-title":"Ad Hoc Netw"},{"key":"10225_CR71","doi-asserted-by":"crossref","unstructured":"Kumar R (1997) Tactical reconnaissance: Uavs versus manned aircraft (Tech. Rep.). AIR COMMAND AND STAFF COLL MAXWELL AFB AL","DOI":"10.21236\/ADA398405"},{"issue":"11","key":"10225_CR72","doi-asserted-by":"publisher","first-page":"4015","DOI":"10.3390\/s18114015","volume":"18","author":"T Lagkas","year":"2018","unstructured":"Lagkas T, Argyriou V, Bibi S, Sarigiannidis P (2018) Uav iot framework views and challenges: towards protecting drones as things. Sensors 18(11):4015","journal-title":"Sensors"},{"key":"10225_CR73","unstructured":"Li J, Zhou Y, Lamont L (2013) Communication architectures and protocols for networking unmanned aerial vehicles. In: 2013 IEEE Globecom Workshops (GC WKSHPS), pp\u00a01415\u20131420"},{"key":"10225_CR74","unstructured":"Li J, Zhou Y, Lamont L (2013) Communication architectures and protocols for networking unmanned aerial vehicles. In: 2013 IEEE Globecom Workshops (GC WKSHPS), pp\u00a01415\u20131420"},{"issue":"1","key":"10225_CR75","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/TNET.2004.842229","volume":"13","author":"L Li","year":"2005","unstructured":"Li L, Halpern JY, Bahl P, Wang Y-M, Wattenhofer R (2005) A cone-based distributed topology-control algorithm for wireless multi-hop networks. IEEE\/ACM Trans Netw 13(1):147\u2013159","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"9","key":"10225_CR76","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/JSAC.2018.2864419","volume":"36","author":"M Li","year":"2018","unstructured":"Li M, Hong Y, Zeng C, Song Y, Zhang X (2018) Investigation on the uav-to-satellite optical communication systems. IEEE J Sel Areas Commun 36(9):2128\u20132138","journal-title":"IEEE J Sel Areas Commun"},{"key":"10225_CR77","doi-asserted-by":"publisher","first-page":"15292","DOI":"10.1109\/ACCESS.2019.2894172","volume":"7","author":"T Li","year":"2019","unstructured":"Li T, Ota K, Wang T, Li X, Cai Z, Liu A (2019) Optimizing the coverage via the uavs with lower costs for information-centric internet of things. IEEE Access 7:15292\u201315309","journal-title":"IEEE Access"},{"issue":"6","key":"10225_CR78","doi-asserted-by":"publisher","first-page":"10902","DOI":"10.1109\/JIOT.2019.2943147","volume":"6","author":"X Li","year":"2019","unstructured":"Li X, Yao H, Wang J, Wu S, Jiang C, Qian Y (2019) Rechargeable multi-uav aided seamless coverage for qos-guaranteed iot networks. IEEE Internet Things J 6(6):10902\u201310914","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"10225_CR79","doi-asserted-by":"publisher","first-page":"9098","DOI":"10.1109\/TVT.2019.2927425","volume":"68","author":"X Li","year":"2019","unstructured":"Li X, Yao H, Wang J, Xu X, Jiang C, Hanzo L (2019) A near-optimal uav-aided radio coverage strategy for dense urban areas. IEEE Trans Veh Technol 68(9):9098\u20139109","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"10225_CR80","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MNET.2017.1600280","volume":"31","author":"Y Li","year":"2017","unstructured":"Li Y, Cai L (2017) Uav-assisted dynamic coverage in a heterogeneous cellular system. IEEE Netw 31(4):56\u201361","journal-title":"IEEE Netw"},{"issue":"1","key":"10225_CR81","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Kumar N, Choo K-KR, Vinel A, Huang X (2018) Security and privacy for the internet of drones: challenges and solutions. IEEE Commun Mag 56(1):64\u201369","journal-title":"IEEE Commun Mag"},{"key":"10225_CR82","unstructured":"Louis C (2018) Roundup of internet of things forecasts and market estimates. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/12\/13\/2018-roundup-of-internet-of-things-forecastsand-market-estimates\/#5fda8f287d83. Accessed 07 Mar 2021"},{"key":"10225_CR83","unstructured":"Lu C (2014) Overview of security and privacy issues in the internet of things, 1-11. Mahalle P, Babar S, Prasad NR Prasad) 430\u2013439"},{"issue":"4","key":"10225_CR84","doi-asserted-by":"publisher","first-page":"641","DOI":"10.3390\/rs10040641","volume":"10","author":"S Manfreda","year":"2018","unstructured":"Manfreda S, McCabe MF, Miller PE, Lucas R, Pajuelo Madrigal V, Mallinis G et al (2018) On the use of unmanned aerial systems for environmental monitoring. Remote Sens 10(4):641","journal-title":"Remote Sens"},{"issue":"17","key":"10225_CR85","doi-asserted-by":"publisher","first-page":"3704","DOI":"10.3390\/s19173704","volume":"19","author":"M Marchese","year":"2019","unstructured":"Marchese M, Moheddine A, Patrone F (2019) Iot and uav integration in 5g hybrid terrestrial-satellite networks. Sensors 19(17):3704","journal-title":"Sensors"},{"key":"10225_CR86","doi-asserted-by":"crossref","unstructured":"Martins R, Dias PS , Marques ER, Pinto J, Sousa JB, Pereira FL (2009) Imc: A communication protocol for networked vehicles and sensors. Oceans 2009-europe, pp\u00a01\u20136","DOI":"10.1109\/OCEANSE.2009.5278245"},{"key":"10225_CR87","doi-asserted-by":"crossref","unstructured":"Massis B (2016) The internet of things and its impact on the library. New library world","DOI":"10.1108\/NLW-12-2015-0093"},{"key":"10225_CR88","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","volume":"52","author":"SR Moosavi","year":"2015","unstructured":"Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) Sea: a secure and efficient authentication and authorization architecture for iot-based healthcare using smart gateways. Procedia Comput Sci 52:452\u2013459","journal-title":"Procedia Comput Sci"},{"key":"10225_CR89","doi-asserted-by":"crossref","unstructured":"Motlagh NH, Bagaa M, Taleb T (2016) Uav selection for a uav-based integrative iot platform. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp\u00a01\u20136","DOI":"10.1109\/GLOCOM.2016.7842359"},{"issue":"2","key":"10225_CR90","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2017.1600587CM","volume":"55","author":"NH Motlagh","year":"2017","unstructured":"Motlagh NH, Bagaa M, Taleb T (2017) Uav-based iot platform: a crowd surveillance use case. IEEE Commun Mag 55(2):128\u2013134","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"10225_CR91","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1109\/JIOT.2016.2612119","volume":"3","author":"NH Motlagh","year":"2016","unstructured":"Motlagh NH, Taleb T, Arouk O (2016) Low-altitude unmanned aerial vehicles-based internet of things services: comprehensive survey and future perspectives. IEEE Internet Things J 3(6):899\u2013922","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"10225_CR92","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/LCOMM.2016.2578312","volume":"20","author":"M Mozaffari","year":"2016","unstructured":"Mozaffari M, Saad W, Bennis M, Debbah M (2016) Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. IEEE Commun Lett 20(8):1647\u20131650","journal-title":"IEEE Commun Lett"},{"key":"10225_CR93","doi-asserted-by":"crossref","unstructured":"Mozaffari M, Saad W, Bennis M, Debbah M (2016). Mobile internet of things: can uavs provide an energy-efficient mobile architecture? In: 2016 IEEE Global Communications Conference (GLOBECOM), pp\u00a01\u20136","DOI":"10.1109\/GLOCOM.2016.7841993"},{"issue":"3","key":"10225_CR94","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/COMST.2019.2902862","volume":"21","author":"M Mozaffari","year":"2019","unstructured":"Mozaffari M, Saad W, Bennis M, Nam Y-H, Debbah M (2019) A tutorial on uavs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor 21(3):2334\u20132360","journal-title":"IEEE Commun Surv Tutor"},{"key":"10225_CR95","unstructured":"Nassi B, Shabtai A, Masuoka R, Elovici Y (2019) Sok-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps. arXiv preprint arXiv:1903.05155)"},{"key":"10225_CR96","first-page":"012001","volume":"914","author":"T Nasution","year":"2017","unstructured":"Nasution T, Siregar I, Yasir M (2017) Uav telemetry communications using zigbee protocol. J Phys 914:012001","journal-title":"J Phys"},{"key":"10225_CR97","doi-asserted-by":"crossref","unstructured":"Peng Z, Kato T, Takahashi H, Kinoshita T (2015) Intelligent home security system using agent-based iot devices. In: 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pp\u00a0313\u2013314","DOI":"10.1109\/GCCE.2015.7398644"},{"issue":"1","key":"10225_CR98","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2013","unstructured":"Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2013) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutor 16(1):414\u2013454","journal-title":"IEEE Commun Surv Tutor"},{"key":"10225_CR99","doi-asserted-by":"crossref","unstructured":"R\u00e9ti I, Luk\u00e1tsi M, Vanek B, G\u0151zse I, Bakos \u00c1, Bokor J (2013) Smart mini actuators for safety critical unmanned aerial vehicles. In: 2013 Conference on Control and Fault-Tolerant Systems (SYSTOL), pp\u00a0474\u2013479","DOI":"10.1109\/SysTol.2013.6693929"},{"key":"10225_CR100","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.310","author":"A Saif","year":"2021","unstructured":"Saif A, Dimyati K, Noordin KA, Alsamhi SH, Hawbani A (2021) Multi-uav and sar collaboration model for disaster management in b5g networks. Internet Technol Lett. https:\/\/doi.org\/10.1002\/itl2.310","journal-title":"Internet Technol Lett"},{"key":"10225_CR101","doi-asserted-by":"crossref","unstructured":"Saif A, Dimyati K, Noordin KA, Shah NSM, Alsamhi S, Abdullah Q (2021) Energy-efficient tethered uav deployment in b5g for smart environments and disaster recovery. In: 2021 1st International Conference on Emerging Smart Technologies and Applications (ESMARTA), pp\u00a01\u20135","DOI":"10.1109\/eSmarTA52612.2021.9515754"},{"key":"10225_CR102","doi-asserted-by":"crossref","unstructured":"Saif A, Dimyati K, Noordin KA, Shah NSM, Alsamhi S, Abdullah Q, Farah N (2021) Distributed clustering for user devices under uav coverage area during disaster recovery. In: 2021 IEEE International Conference in Power Engineering Application (ICPEA), pp\u00a0143\u2013148","DOI":"10.1109\/ICPEA51500.2021.9417847"},{"key":"10225_CR103","doi-asserted-by":"crossref","unstructured":"Saif A, Dimyati KB, Noordin KAB, Shah NSM, Alsamhi S, Abdullah Q, Farah N (2021). Distributed clustering for user devices under unmanned aerial vehicle coverage area during disaster recovery. arXiv preprint arXiv:2103.07931)","DOI":"10.1109\/ICPEA51500.2021.9417847"},{"issue":"21","key":"10225_CR104","doi-asserted-by":"publisher","first-page":"4779","DOI":"10.3390\/s19214779","volume":"19","author":"N Samir Labib","year":"2019","unstructured":"Samir Labib N, Danoy G, Musial J, Brust MR, Bouvry P (2019) Internet of unmanned aerial vehicles-a multilayer low-altitude airspace model for distributed uav traffic management. Sensors 19(21):4779","journal-title":"Sensors"},{"key":"10225_CR105","unstructured":"Samir\u00a0Labib N, Liu C, Esmaeilzadeh\u00a0Dilmaghani S, Brust MR, Danoy G, Bouvry P (2018) White paper: data protection and privacy in smart ict-scientific research and technical standardization (Tech. Rep.). ILNAS"},{"issue":"1","key":"10225_CR106","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30\u201339","journal-title":"Computer"},{"key":"10225_CR107","doi-asserted-by":"crossref","unstructured":"Shaikh Z, Baidya S, Levorato M (2018) Robust multi-path communications for uavs in the urban iot. In: 2018 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops), pp\u00a01\u20135","DOI":"10.1109\/SECONW.2018.8396356"},{"issue":"9","key":"10225_CR108","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCOM.2015.7263367","volume":"53","author":"H Shariatmadari","year":"2015","unstructured":"Shariatmadari H, Ratasuk R, Iraji S, Laya A, Taleb T, J\u00e4ntti R, Ghosh A (2015) Machine-type communications: current status and future perspectives toward 5g systems. IEEE Commun Mag 53(9):10\u201317","journal-title":"IEEE Commun Mag"},{"key":"10225_CR109","doi-asserted-by":"crossref","unstructured":"Sharma V, You I, Kumar R (2016) Energy efficient data dissemination in multi-uav coordinated wireless sensor networks. Mobile Information Systems 2016","DOI":"10.1155\/2016\/8475820"},{"key":"10225_CR110","doi-asserted-by":"crossref","unstructured":"Sharp CS, Shakernia O, Sastry SS (2001) A vision system for landing an unmanned aerial vehicle. Proceedings 2001 icra. In: IEEE International Conference on Robotics and Automation (Cat. No. 01ch37164) (Vol\u00a02, pp\u00a01720\u20131727)","DOI":"10.1109\/ROBOT.2001.932859"},{"key":"10225_CR111","doi-asserted-by":"crossref","unstructured":"Singh D, Tripathi G, Jara AJ (2014) A survey of internet-of-things: Future vision, architecture, challenges and services. In: 2014 IEEE World Forum on Internet of Things (WF-IOT), pp\u00a0287\u2013292","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"10225_CR112","doi-asserted-by":"crossref","unstructured":"Singh PJ, de Silva R, Seher I (2016) Comparison of communication protocols for uavs and vanets. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp\u00a0616\u2013619","DOI":"10.1109\/CCAA.2016.7813795"},{"key":"10225_CR113","doi-asserted-by":"crossref","unstructured":"Srivastava A, Mishra A, Upadhyay B, kumar Yadav A (2014) Survey and overview of mobile ad-hoc network routing protocols. In: 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), pp\u00a01\u20136","DOI":"10.1109\/ICAETR.2014.7012959"},{"key":"10225_CR114","doi-asserted-by":"crossref","unstructured":"Srivastava A, Prakash J (2020) Role of antenna in flying adhoc networks communication: Provocation and open issues. In: International Conference on Intelligent Systems Design and Applications, pp\u00a0711\u2013721","DOI":"10.1007\/978-3-030-71187-0_65"},{"key":"10225_CR115","doi-asserted-by":"publisher","first-page":"100359","DOI":"10.1016\/j.cosrev.2020.100359","volume":"39","author":"A Srivastava","year":"2021","unstructured":"Srivastava A, Prakash J (2021) Future fanet with application and enabling techniques: anatomization and sustainability issues. Comput Sci Rev 39:100359","journal-title":"Comput Sci Rev"},{"key":"10225_CR116","doi-asserted-by":"crossref","unstructured":"Srivastava A, Prakash J (2022) Cdf based dual transform approach for uav video visual enhancement in rgb model. International Journal of System Assurance Engineering and Management)1-13","DOI":"10.1007\/s13198-022-01665-7"},{"issue":"1","key":"10225_CR117","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11277-021-09334-x","volume":"124","author":"A Srivastava","year":"2022","unstructured":"Srivastava A, Prakash J (2022) Edge enhancement by noise suppression in hsi color model of uav video with adaptive thresholding. Wirel Pers Commun 124(1):163\u2013186","journal-title":"Wirel Pers Commun"},{"issue":"17","key":"10225_CR118","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.3390\/rs11172021","volume":"11","author":"W Su","year":"2019","unstructured":"Su W, Zhang M, Bian D, Liu Z, Huang J, Wang W, Guo H (2019) Phenotyping of corn plants using unmanned aerial vehicle (uav) images. Remote Sens 11(17):2021","journal-title":"Remote Sens"},{"issue":"3","key":"10225_CR119","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.adhoc.2010.09.008","volume":"9","author":"Z Sun","year":"2011","unstructured":"Sun Z, Wang P, Vuran MC, Al-Rodhaan MA, Al-Dhelaan AM, Akyildiz IF (2011) Bordersense: Border patrol through advanced wireless sensor networks. Ad Hoc Netw 9(3):468\u2013477","journal-title":"Ad Hoc Netw"},{"issue":"7","key":"10225_CR120","doi-asserted-by":"crossref","first-page":"e4133","DOI":"10.1002\/ett.4133","volume":"32","author":"F Syed","year":"2021","unstructured":"Syed F, Gupta SK, Hamood Alsamhi S, Rashid M, Liu X (2021) A survey on recent optimal techniques for securing unmanned aerial vehicles applications. Trans Emerg Telecommun Technol 32(7):e4133","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"4","key":"10225_CR121","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1109\/TII.2018.2873186","volume":"15","author":"F Tao","year":"2018","unstructured":"Tao F, Zhang H, Liu A, Nee AY (2018) Digital twin in industry: state-of-the-art. IEEE Trans Ind Inf 15(4):2405\u20132415","journal-title":"IEEE Trans Ind Inf"},{"key":"10225_CR122","unstructured":"Thompson RM (2012) Drones in domestic surveillance operations: Fourth amendment implications and legislative responses"},{"issue":"2","key":"10225_CR123","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCC.2015.23","volume":"2","author":"H-L Truong","year":"2015","unstructured":"Truong H-L, Dustdar S (2015) Principles for engineering iot cloud systems. IEEE Cloud Comput 2(2):68\u201376","journal-title":"IEEE Cloud Comput"},{"key":"10225_CR124","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2013.10.002","volume":"41","author":"G Tuna","year":"2014","unstructured":"Tuna G, Nefzi B, Conte G (2014) Unmanned aerial vehicle-aided communications system for disaster recovery. J Netw Comput Appl 41:27\u201336","journal-title":"J Netw Comput Appl"},{"key":"10225_CR125","doi-asserted-by":"crossref","unstructured":"Upadhyay B, Srivastava A, Mishra A, Upadhyay S (2014) Distinctive approach for quality of service (qos) routing in manet. In: 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), pp\u00a01\u20134","DOI":"10.1109\/ICAETR.2014.7012889"},{"key":"10225_CR126","doi-asserted-by":"crossref","unstructured":"Vanitha N, Padmavathi G (2018) A comparative study on communication architecture of unmanned aerial vehicles and security analysis of false data dissemination attacks. In: 2018 International Conference on Current Trends Towards Converging Technologies (ICCTCT), pp\u00a01\u20138","DOI":"10.1109\/ICCTCT.2018.8550873"},{"key":"10225_CR127","volume-title":"Internet of things-from research and innovation to market deployment","author":"O Vermesan","year":"2014","unstructured":"Vermesan O, Friess P et al (2014) Internet of things-from research and innovation to market deployment, vol 29. River Publishers, Aalborg"},{"key":"10225_CR128","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.adhoc.2014.12.005","volume":"32","author":"M Vu\u010dini\u0107","year":"2015","unstructured":"Vu\u010dini\u0107 M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) Oscar: object security architecture for the internet of things. Ad Hoc Netw 32:3\u201316","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"10225_CR129","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/JIOT.2018.2875493","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang J, Jiang C, Wei Z, Pan C, Zhang H, Ren Y (2018) Joint uav hovering altitude and power control for space-air-ground iot networks. IEEE Internet Things J 6(2):1741\u20131753","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10225_CR130","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/JBHI.2014.2311232","volume":"19","author":"L.-H Wang","year":"2014","unstructured":"Wang L.-H, Chen T.-Y, Lin K.-H, Fang Q, Lee S.-Y (2014) Implementation of a wireless ecg acquisition soc for ieee 802.15. 4 (zigbee) applications. IEEE J Biomed Health Inform 19(1):247\u2013255","journal-title":"IEEE J Biomed Health Inform"},{"issue":"4","key":"10225_CR131","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s41650-018-0039-9","volume":"3","author":"X Wang","year":"2018","unstructured":"Wang X, Feng W, Chen Y, Ge N (2018) Coverage optimization for uav-aided internet of things with partial channel knowledge. J Commun Inf Netw 3(4):55\u201363","journal-title":"J Commun Inf Netw"},{"issue":"2","key":"10225_CR132","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","volume":"17","author":"A Whitmore","year":"2015","unstructured":"Whitmore A, Agarwal A, Da Xu L (2015) The internet of things-a survey of topics and trends. Inf Syst Front 17(2):261\u2013274","journal-title":"Inf Syst Front"},{"issue":"10","key":"10225_CR133","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D Wood","year":"2002","unstructured":"Wood A.D, Stankovic J.A (2002) Denial of service in sensor networks. Computer 35(10):54\u201362","journal-title":"Computer"},{"issue":"9","key":"10225_CR134","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.1109\/JSAC.2018.2864418","volume":"36","author":"H Wu","year":"2018","unstructured":"Wu H, Tao X, Zhang N, Shen X (2018) Cooperative uav cluster-assisted terrestrial cellular networks for ubiquitous coverage. IEEE J Sel Areas Commun 36(9):2045\u20132058","journal-title":"IEEE J Sel Areas Commun"},{"key":"10225_CR135","doi-asserted-by":"crossref","unstructured":"Yajnanarayana V, Wang Y-PE , Gao S, Muruganathan S, Ericsson XL (2018) Interference mitigation methods for unmanned aerial vehicles served by cellular networks. In: 2018 IEEE 5g World Forum (5gwf), pp\u00a0118\u2013122","DOI":"10.1109\/5GWF.2018.8517087"},{"issue":"2","key":"10225_CR136","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/JIOT.2018.2873308","volume":"6","author":"S Yan","year":"2018","unstructured":"Yan S, Peng M, Cao X (2018) A game theory approach for joint access selection and resource allocation in uav assisted iot communication networks. IEEE Internet Things J 6(2):1663\u20131674","journal-title":"IEEE Internet Things J"},{"key":"10225_CR137","doi-asserted-by":"publisher","first-page":"102015","DOI":"10.1016\/j.adhoc.2019.102015","volume":"97","author":"J Yang","year":"2020","unstructured":"Yang J, Poellabauer C, Mitra P, Neubecker C (2020) Beyond beaconing: emerging applications and challenges of ble. Ad Hoc Netw 97:102015","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"10225_CR138","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.icte.2016.08.005","volume":"2","author":"S-J Yoo","year":"2016","unstructured":"Yoo S-J, Park J-H, Kim S-H, Shrestha A (2016) Flying path optimization in uav-assisted iot sensor networks. ICT Express 2(3):140\u2013144","journal-title":"ICT Express"},{"key":"10225_CR139","doi-asserted-by":"crossref","unstructured":"Yu Y, Lee S , Lee J, Cho K, Park S (2016) Design and implementation of wired drone docking system for cost-effective security system in iot environment. In: 2016 IEEE International Conference on Consumer Electronics (ICCE), pp\u00a0369\u2013370","DOI":"10.1109\/ICCE.2016.7430651"},{"key":"10225_CR140","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comcom.2020.10.023","volume":"165","author":"S Zaidi","year":"2021","unstructured":"Zaidi S, Atiquzzaman M, Calafate CT (2021) Internet of flying things (ioft): a survey. Comput Commun 165:53\u201374","journal-title":"Comput Commun"},{"issue":"3","key":"10225_CR141","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/LWC.2017.2776922","volume":"7","author":"C Zhan","year":"2017","unstructured":"Zhan C, Zeng Y, Zhang R (2017) Energy-efficient data collection in uav enabled wireless sensor network. IEEE Wirel Commun Lett 7(3):328\u2013331","journal-title":"IEEE Wirel Commun Lett"},{"issue":"5","key":"10225_CR142","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/JPROC.2019.2909694","volume":"107","author":"J Zhang","year":"2019","unstructured":"Zhang J, Chen T, Zhong S, Wang J, Zhang W, Zuo X, Hanzo L (2019) Aeronautical ad hoc networking for the internet above the clouds. Proc IEEE 107(5):868\u2013911","journal-title":"Proc IEEE"},{"issue":"3","key":"10225_CR143","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TASE.2015.2497663","volume":"13","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Shen Y, Wang H, Yong J, Jiang X (2015) On secure wireless communications for iot under eavesdropper collusion. IEEE Trans Autom Sci Eng 13(3):1281\u20131293","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"2","key":"10225_CR144","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/JSAC.2018.2804239","volume":"36","author":"J Zhao","year":"2018","unstructured":"Zhao J, Gao F, Wu Q, Jin S, Wu Y, Jia W (2018) Beam tracking for uav mounted satcom on-the-move with massive antenna array. IEEE J Sel Areas Commun 36(2):363\u2013375","journal-title":"IEEE J Sel Areas Commun"},{"issue":"5","key":"10225_CR145","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1109\/TCOMM.2018.2792014","volume":"66","author":"N Zhao","year":"2018","unstructured":"Zhao N, Cheng F, Yu FR, Tang J, Chen Y, Gui G, Sari H (2018) Caching uav assisted secure transmission in hyper-dense networks based on interference alignment. IEEE Trans Commun 66(5):2281\u20132294","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"10225_CR146","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MWC.2018.1800160","volume":"26","author":"N Zhao","year":"2019","unstructured":"Zhao N, Lu W, Sheng M, Chen Y, Tang J, Yu FR, Wong K-K (2019) Uav-assisted emergency networks in disasters. IEEE Wirel Commun 26(1):45\u201351","journal-title":"IEEE Wirel Commun"},{"issue":"14","key":"10225_CR147","doi-asserted-by":"publisher","first-page":"3106","DOI":"10.3390\/s19143106","volume":"19","author":"C Zhou","year":"2019","unstructured":"Zhou C, Ye H, Hu J, Shi X, Hua S, Yue J, Yang G (2019) Automated counting of rice panicle by applying deep learning model to images from unmanned aerial vehicle platform. Sensors 19(14):3106","journal-title":"Sensors"},{"issue":"8","key":"10225_CR148","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCOM.2018.1701111","volume":"56","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Feng J, Tan L, He Y, Gong J (2018) An air-ground integration approach for mobile edge computing in iot. IEEE Commun Mag 56(8):40\u201347","journal-title":"IEEE Commun Mag"},{"key":"10225_CR149","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1109\/ACCESS.2015.2497312","volume":"3","author":"C Zhu","year":"2015","unstructured":"Zhu C, Leung VC, Shu L, Ngai ECH (2015) Green internet of things for smart world. IEEE Access 3:2151\u20132162","journal-title":"IEEE Access"},{"issue":"4","key":"10225_CR150","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu S, Setia S, Jajodia S (2006) Leap+ efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Networks 2(4):500\u2013528","journal-title":"ACM Trans Sens Networks"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-022-10225-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-022-10225-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-022-10225-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T11:38:29Z","timestamp":1727523509000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-022-10225-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,4]]},"references-count":150,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10225"],"URL":"https:\/\/doi.org\/10.1007\/s10462-022-10225-1","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,4]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"NA","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"NA","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data and material"}},{"value":"NA","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}