Next Article in Journal
UAV Localization Method with Keypoints on the Edges of Semantic Objects for Low-Altitude Economy
Previous Article in Journal
A Lightweight Anti-Unmanned Aerial Vehicle Detection Method Based on Improved YOLOv11
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches

1
College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China
2
Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems, Jiaxing University, Jiaxing 314001, China
3
Jiaxing Key Laboratory of Smart Transportations, Jiaxing 314001, China
4
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Authors to whom correspondence should be addressed.
Drones 2025, 9(1), 12; https://doi.org/10.3390/drones9010012
Submission received: 25 November 2024 / Revised: 18 December 2024 / Accepted: 24 December 2024 / Published: 26 December 2024
(This article belongs to the Section Drone Communications)

Abstract

:
The integration of unmanned aerial vehicles (UAVs) into vehicular networks offers numerous advantages in enhancing communication and coverage performance. With the ability to move flexibly in three-dimensional space, UAVs can effectively bridge the communication gap between intelligent connected vehicles (ICVs) and infrastructure. However, the rapid movement of UAVs and ICVs poses significant challenges to the stability and reliability of communication links. Motivated by these challenges, integrated UAV–ICV networks can be viewed as vehicular delay-tolerant networks (VDTNs), where data delivery is accomplished through the “store-carry-forward” transmission mechanism. Since VDTNs exhibit social attributes, this paper first investigates the opportunistic transmission problem in the presence of selfish nodes. Then, by enabling node cooperation, this paper proposes an opportunistic transmission scheme for integrated UAV–ICV networks. To address the issue of node selfishness in practical scenarios, the proposed scheme classifies the degree of cooperation and analyzes the encounter probability between nodes. Based on this, information is initially flooded, and the UAV is selected for data distribution by jointly considering the node centrality, energy consumption, and cache size. Finally, simulation results demonstrate that the proposed scheme can effectively improve the delivery ratio and reduce the average delivery delay compared to state-of-the-art schemes.

1. Introduction

1.1. Background and Motivations

The vehicular delay-tolerant network (VDTN) is a novel transmission architecture designed to address issues, such as the potential unavailability of an end-to-end path between the source and destination in vehicular communication environments [1,2,3,4]. In VDTNs, intelligent connected vehicles (ICVs) can store, carry, and forward data asynchronously [5]. Communication is possible even when there is no continuous network connection. This transmission architecture is particularly suitable for scenarios where infrastructure is inadequate, such as highways or remote areas [6]. In this situation, by adopting “store-carry-forward” mechanisms, vehicular networks can effectively reduce link interruptions, thereby enhancing the efficiency of information exchange between ICVs [7,8,9].
The application domains of VDTNs are diverse, including autonomous driving, geographic information retrieval, and emergency response services. In VDTNs, road side units (RSUs) typically serve as local central nodes, responsible for data forwarding and information caching [10]. However, because the RSUs are fixed, they will face serious challenges in actual vehicular networks. Especially in environments with high mobility, fixed RSUs can lead to reduced delivery ratio and increased delivery delay. Additionally, in rural road scenarios, the coverage of fixed RSUs is limited, which affects transmission performance [11,12,13].
Facing the above challenges, the introduction of unmanned aerial vehicles (UAVs) as replacements for traditional RSUs has emerged as a potential solution [14,15,16]. UAVs are highly mobile and can be deployed flexibly, enabling them to cover areas that are difficult for fixed RSUs to reach. Therefore, the limitations of RSUs can be addressed to provide wider network coverage. In addition, the coverage of blind spots can be reduced. In this situation, UAVs not only enhance network flexibility but also facilitate rapid deployment in emergency scenarios, positioning them as a critical technique for optimizing the performance of VDTNs [17,18,19]. Furthermore, using UAVs in VDTNs can promote vehicular applications in complex scenarios and provide feasible ideas and technical support for the development of future intelligent transportation systems.

1.2. Related Works

Due to their highly flexible mobility, UAVs have attracted significant research interest in the field of VDTNs. There are numerous works that combine UAVs with different techniques to improve the quality of service (QoS) of vehicular applications. The authors in [20] addressed the challenge of the low transmission efficiency in DTNs by proposing a social-based mechanism that utilizes community and centrality information to enhance the delivery rate. In this mechanism, a collaborative multiagent reinforcement learning algorithm is introduced, which can enable distributed nodes to learn effective collaboration strategies for relay selection. In [21], the authors investigated the feasibility of deploying the epidemic routing protocol in VDTNs. The study demonstrates that maintaining an appropriate time-to-live (TTL) value in the epidemic routing protocol ensures high packet delivery and low packet loss rates, even in large-scale VDTNs. Additionally, the authors in [22] proposed a novel service discovery algorithm based on Markov models to address the challenges of high mobility in VDTNs. Building upon the BUBBLE Rap forwarding protocol, two relay selection approaches were designed in [23], aiming to improve delivery delay.
Moreover, UAVs have garnered significant interest in supporting VDTNs due to their cost-effectiveness, high maneuverability, and flexible deployment. Inspired by these, the authors in [24] presented an optimal deployment strategy for relaying UAVs in vehicular networks. The proposed strategy can improve the system capacity by maximizing user rates and reducing outage probabilities. To deal with the problem of the uneven distribution of on-board tasks, a mobility-aware service offloading scheme is proposed for UAV-assisted vehicular networks [25]. This scheme effectively minimizes task processing delays while attaining near-optimal performance in service offloading and migration costs. Furthermore, efforts [26,27,28] have been made to explore the use of both cooperative and non-cooperative UAVs in vehicular networks.
The above works promote the application of UAVs into VDTNs to support opportunistic transmissions. Nevertheless, there are still some problems remained to be further investigated.
  • First, the authors in [20,21,22,23] have explored the application of opportunistic transmission in VDTNs. However, these studies primarily focused on leveraging the mobility of ICVs or temporary caching at roadside RSUs to facilitate data distribution. While these studies effectively improve the transmission performance of vehicular communications, they ignore the potential benefits of integrating UAVs into VDTNs. Therefore, additional research is essential to investigate the integration of UAVs in opportunistic transmission strategies and to assess their effects on delivery ratios and latency.
  • Second, although the authors in [24,25,26,27,28] have investigated the deployment of relaying UAVs in vehicular networks, these works have primarily focused on end-to-end delay-sensitive transmissions and optimized network resources (such as spectrum, power, and trajectory) to enhance network performance. However, they did not address the transmission problem in scenarios where direct communication links are not available within vehicular networks.
  • Finally, most of the aforementioned studies assumed that all communication nodes in vehicular networks are cooperative. The existence of selfish nodes that can negatively affect transmission performance was not taken into account. It is noted that, in vehicular networks characterized by social attributes, selfish nodes may exhibit non-cooperative behavior by refusing to forward data or by consuming excessive resources, resulting in lower overall efficiency.

1.3. Contributions

Motivated by the above, this paper proposes an integrated UAV–ICV networking framework to explore the potential for air-to-ground node collaboration. The contributions of this paper are summarized as follows:
  • First, this paper investigates the application of opportunistic transmission in integrated UAV–ICV networks, where the “store-carry-forward” mechanisms are adopted. Then, considering the selfish behavior of communication nodes due to factors such as energy, cache, and other practical constraints, this paper defines the types of node cooperation and analyzes the probability of encounters between nodes.
  • Second, an opportunistic transmission scheme for integrated UAV–ICV networks, enabled by node cooperation, is proposed. By evaluating the forwarding capabilities of each relay node, this paper initially floods the information to be transmitted. On this basis, this paper uses UAVs to assist with delivery.
  • Finally, to demonstrate the advantages of the designed scheme, this paper compares it with the state-of-the-art schemes [21,22,23] via simulations. Real map data are used for the simulations. The simulation results indicate that the designed scheme outperforms the state-of-the-art schemes in terms of the delivery ratio and average delivery delay. Furthermore, the effect of the proportion of selfish nodes and the cooperation threshold on the performance of integrated UAV–ICV networks is fully discussed.

1.4. Organization

The remainder of this paper is organized as follows: Section 2 introduces the considered system model, which includes the opportunistic transmission model with selfish nodes and the encounter probability analysis model. In Section 3, this paper elaborates the proposed opportunistic transmission scheme. The simulation results are presented in Section 4. Finally, this paper concludes our paper in Section 5.

2. System Model

2.1. Opportunistic Transmission Model with Selfish Nodes

In this paper, the opportunistic transmission-enhanced integrated UAV–ICV network consists of N ICVs and R UAVs. As shown in Figure 1, both ICVs and UAVs can be regarded as communication nodes, with functions such as information storage, carrying, and forwarding. In integrated UAV–ICV networks, the behavior of each communication node is typically social rather than isolated [6]. For example, a bus node may only forward message copies belonging to its bus company. Specifically, selfish behaviors can be categorized into two types: drop and non-forwarding. The “drop” behavior refers to a communication node receiving a message copy from another node but not forwarding it, instead dropping it. In contrast, the “non-forwarding” behavior refers to a communication node refusing to receive the message copy entirely.
Additionally, this paper classifies the node types in integrated UAV–ICV networks into three categories. Specifically, selfish nodes are private cars without public service attributes, and they neither broadcast nor forward information when encountering traffic congestion. Normal nodes are ICVs (e.g., taxis and passenger cars), which have partial public service attributes and generate or forward traffic information based on demand. Voluntary nodes are government vehicles or UAVs with public service attributes, and they generate or forward traffic information whenever they move. To analyze the impact of selfish behavior on integrated UAV–ICV networks, this paper defines the degree of node cooperation. The cooperation level is evaluated based on a metric that is negatively linearly correlated with the selfishness of nodes. When the cooperation level of a node is 0, it is considered completely non-cooperative. When the cooperation level is 100, it represents the ideal state of full cooperation, where each node forwards information as expected. Based on this analysis, this paper defines the three types of nodes and provides specific calculation methods.
Node cooperation type I (defined as  i 1 ): This type represents the ideal state. In this case, all nodes in integrated UAV–ICV networks do not exhibit selfish behavior and only drop message copies due to energy exhaustion or a full cache. The cooperation level of type I is defined as  C I . The total number of dropped message copies is denoted as  E drop , and the total number of message copies that need to be forwarded is denoted as  E forward . For type I, the node cooperation level can be calculated as
C I = 1 E drop E forward .
Therefore, when the relay type is type I, information is directly forwarded. The number of hops experienced by the message copy is increased by one.
Node cooperation type II (defined as  i 2 ): In practical integrated UAV–ICV networks, there are inevitably some selfish nodes. It is assumed that different types of communication nodes are allowed to exchange messages with each other. However, selfish communication nodes drop all message copies from other nodes that need to be forwarded. In contrast, non-selfish communication nodes do not drop the message copies from other nodes that need to be forwarded. Let the number of non-selfish communication nodes be  N non sel  and the number of selfish communication nodes be  N sel . In this case, for type II, the node cooperation level  C II  is given by
C II = 1 N sel N non sel + N sel .
Therefore, when the relay type is type II, if the communication node carrying the source node’s message copy is also of type II, the message is forwarded. In this situation, the number of hops experienced by the message copy is increased by one. Otherwise, the message copy is not == forwarded, and the number of hops experienced by the message copy remains unchanged.
Node cooperation type III (defined as  i 3 ): In integrated UAV–ICV networks, this paper adds voluntary nodes to improve the performance of on-board information distribution [17]. This paper assumes that the number of voluntary nodes is  N pub . For type III, the node cooperation level  C III  can be expressed as
C III = 1 N sel N non sel + N sel + N pub .
Therefore, when the relay type is type III, if the communication node carrying the source node’s message copy contains information relevant to the relay node, the message is forwarded. In this situation, the number of hops experienced by the message copy is increased by one. In addition, if the communication node carrying the source node’s message copy contains information unrelated to the relay node, the message is not forwarded, and the number of hops experienced by the message copy remains unchanged.

2.2. Encounter Probability Analysis Model

As mentioned above, there are three different types of node cooperation in the considered integrated UAV–ICV networks. In this paper, when communication node i, which carries a message copy, moves into the communication range of the next-hop relay node j, communication nodes i and j are referred to as a communication node pair, denoted as  φ x = i , j . All communication nodes in integrated UAV–ICV networks can be represented by a set  φ φ = φ 1 , . . . , φ x , . . . , φ n . Based on the different node types, there are nine distinct states of communication node pairs in integrated UAV–ICV networks, namely,  Node i 1 , Node i 1 Node i 1 , Node i 2 Node i 1 , Node i 3 Node i 2 , Node i 1 Node i 2 , Node i 2 Node i 2 , Node i 3 Node i 3 , Node i 1 Node i 3 , Node i 2 , and  Node i 3 , Node i 3 . Therefore, depending on the node type, three different behaviors are generated: (1) forwarding all message copies of the nodes; (2) forwarding message copies of some nodes; (3) refusing to forward message copies of all other nodes. In this situation, we need to consider both the reception and packet loss of message copies to evaluate the behavior of communication nodes.
When communication node i moves into the communication range of the next-hop relay node j, the probability that node j successfully receives the message copy from node i mainly depends on the size of the message copy, the number of copies, and the cache size of node j. Let t be the current time and  Δ t  be the duration of contact between nodes i and j. By using (4), this paper derives the cumulative distribution function (CDF)  F X  of the random variable X as
F X = x f t d t ,
where  f t  is the probability density function (PDF) of successfully receiving a message copy for a pair of communication nodes. We have  f t 0 t , + , and  + f t d t = 1 . Similarly, the PDF  f Δ t  of  Δ t  is given by
f Δ t = λ i , j × exp λ i , j Δ t k = 1 n X k t ,
where  λ i , j  is the encounter probability between nodes i and j, and  X k t  is an index that represents whether the node buffer is full,  X k t 0 , 1 . In addition,  X k  can be further expressed as
X k = 1 , L u i L r j + z m L m j , 0 , L u i > L r j + z m L m j ,
where  L u i  is the size of the message copy that node i needs to transmit;  L r j  is the remaining cache size of node j L m j  is the size of the message copy cached by node j z m  is the priority function, which is used to indicate that the priority of the message copies cached in node j is lower than the number of message copies transmitted by node i.
According to the above content, we can calculate the probability  P suc i , j  of a pair of communication node  i , j  successfully receiving message copies within  Δ t  time, which can be expressed as
P suc i , j = F t , Δ t = t t + Δ t f t , Δ t d Δ t = t T max λ i , j Δ t k = 1 n X k t d Δ t ,
where  T max  is the TTL of the message copies.
After the relay node successfully receives the message copy, it may refuse to forward the message copy to non-destination nodes due to selfish behavior and drop this message copy. Therefore, in integrated UAV–ICV networks, the packet loss rate of node j can be estimated as
P drop j = z m L m j L tot j ,
where  L tot j  is the total number of message copies in node j.
In summary, the probabilities that communication node i encounters the next-hop relay nodes of types I, II, and III can be represented as  P I P II , and  P III , respectively. We have
P I = P i 1 , i 1 = P i 2 , i 1 = P i 3 , i 1 = ρ I λ i , j P suc i , j ,
P II = P i 1 , i 2 = P i 2 , i 2 = P i 3 , i 2 = ρ II λ i , j P suc i , j 1 P drop j ,
and
P III = P i 1 , i 3 = P i 2 , i 3 = P i 3 , i 3 = ρ III λ i , j P suc i , j P drop j .
In (9)–(11),  ρ I ρ II , and  ρ III  are the probabilities that communication nodes of type I, II, and III forward message copies, respectively.

3. Opportunistic Transmission Scheme for Integrated UAV–ICV Networks Enabled by Node Cooperation

Based on the node cooperation types elaborated in Section 2 and the constructed encounter probability analysis model, this paper evaluates the forwarding capabilities of each relay node. Specifically, the node cooperation type of a relay node can be determined by whether the value of  H max  changes, where  H max  changes, and  H max  is the maximum hop for information to reach the destination node or fail. Based on this, a decision can be made on whether to forward the information. Additionally, to prolong the network lifetime, the opportunistic transmission scheme should consider both the number of copies and transmission reliability. Taking into account the described practical factors, an opportunistic transmission scheme for integrated UAV–ICV networks enabled by node cooperation is proposed. The information transmission process in this scheme consists of two main parts: initial information flooding and UAV-assisted information transmission. The detailed flow chart of the proposed solution is shown in Figure 2.

3.1. Information Flooding

When the source node (UAV or ICV) generates information, it creates several message copies and forwards them to neighboring nodes that have not yet received this copy. During the forwarding process, the proposed opportunistic transmission scheme determines whether to transmit the message copy based on the encounter probability analysis model derived in Section 2.2 and then updates the encounter probabilities of the communication nodes. As discussed in [7], this paper uses Bayes’s theorem to establish the node transfer update equation, which is given by
P Transfer = P X M , k 1 , k 2 , H max × P X M , k 1 , k 2 , H max ,
where  P Transfer  is the updated encounter probability,  P X M , k 1 , k 2 , H max  is the likelihood function, and  P X M , k 1 , k 2 , H max  is the prior probability. In addition, in (12), M represents the number of communication nodes involved in the communication,  M N + R k 1  and  k 2  are the number of type II and type III nodes participating in relay transmission in integrated UAV–ICV networks, respectively. It should be noted that for ICVs, the number of type I nodes is  N k 1 k 2 , and all R UAVs are type I nodes. After the message copy reaches the relay communication node,  P X M , k 1 , k 2 , H max  can be further calculated as (13) based on the node type of relay nodes and the encounter probability analysis model. We have
P X M , k 1 , k 2 , H max = N + R k 1 k 2 M k 1 k 2 λ i , j P suc i , j , if X = M + 1 , k 1 , k 2 , H max + 1 , K 1 + K 2 k 1 k 2 λ i , j P suc i , j × 1 P drop j , elseif X = M + 1 , k 1 , k 2 , H max , K 1 + K 2 k 1 k 2 λ i , j P suc i , j P drop j , elseif X = M , k 1 , k 2 , H max , λ i , j P suc i , j , else .
where  K 1  and  K 2  are the number of type II and type III nodes in integrated UAV–ICV networks, respectively; X denotes the state of the transition model; D indicates that the relay node is the destination node, meaning the message copy will no longer be forwarded.
In addition, the forwarding conditions of message copies are related to the cooperation threshold of the communication nodes in integrated UAV–ICV networks and the type of message copies. These conditions are mainly divided into the following two cases:
  • Case 1: When the next-hop node is a type II communication node, the transfer probability  P Transfer  of the communication node is compared with the cooperation threshold  P Transfer II  of the type II communication node. If  P Transfer II P Transfer , the message copy is transmitted. If  P Transfer II > P Transfer , the message copy is not transmitted.
  • Case 2: When the next-hop node is a type III communication node, the message copy type is first evaluated, with  M Mes _ type  defined as the message type. If  M Mes _ type = 1 , it indicates that the message copy is related to the relay node, and the message copy is transmitted. If  M Mes _ type = 0 , it indicates that the message is not related to the relay node, and the cooperation threshold  P Transfer III  must be compared. If  P Transfer III P Transfer , the message copy is transmitted. If  P Transfer III > P Transfer , the message copy is not transmitted.

3.2. UAV-Assisted Information Transmission

After the initial information flooding, the proposed opportunistic transmission scheme leads to a continuous decrease in the number of remaining message copies at communication nodes as the copies are forwarded. Generally, when a communication node has only one remaining message copy and fails to successfully transmit it to its destination node, the relay communication node can only encounter the destination node either by moving or waiting. However, this stage may introduce significant delays in information transmission. Therefore, the proposed opportunistic transmission scheme can be combined with the information forwarding probability in the Prophet routing protocol [9] and the UAV-assisted mechanism to transmit message copies.
Specifically, in the proposed opportunistic transmission scheme, during the initial information flooding process, the encounter probability  P i , d  between node i and the destination node d, as well as the encounter probability  P k , d  between the next-hop relay node k and the destination node d, should be calculated. If  P i , d P k , d  the information is transmitted. Otherwise, to prevent excessive message flooding, the transmission does not occur. However, under this scheme, there may still be cases where certain communication nodes have only one remaining message copy and fail to successfully transmit it to the destination node. In such cases, the message copy can be forwarded to a UAV. Compared to ICVs, UAVs have a wider communication range, greater cache size, and lack selfishness. Therefore, in integrated UAV–ICV networks, UAVs have more centrality. Strong node centrality means that, within the same time period, a UAV node can contact more communication nodes. According to the above analysis, UAV nodes are more suitable as relay nodes for message forwarding. The node centrality  D Centrality  can be expressed as
D Centrality = k = 1 , k i N + R x i , k N + R 1 ,
where  x i , k 0 , 1 . If nodes i and k are within each other’s communication range,  x i , k = 1 , otherwise,  x i , k = 0 .
This paper defines the initial energy of UAVs as  E init _ UAV  and its standby energy consumption as  E st _ UAV . The initial energy of ICVs is defined as  E init _ veh , with a standby energy consumption of  E st _ veh . The energy refresh cycle for both types of communication nodes is T. The energy consumed by the UAV and ICV for a single node detection is  E det _ UAV  and  E det _ veh , respectively. Moreover, the energy consumed by the UAV and ICV for a single information transmission is defined as  E tran _ UAV  and  E tran _ veh , respectively. Furthermore, during one refresh cycle, the UAV performs node detection and information transmission  N det _ UAV  and  N tran _ UAV  times, respectively. The ICV performs node detection and information transmission  N det _ veh  and  N tran _ veh  times, respectively. Based on the above analysis, for the l-th transmission, the remaining energy of the UAV and ICV, denoted as  E rest _ UAV  and  E rest _ veh , can be calculated by using (15) and (16), respectively.
E rest _ UAV l = E rest _ UAV l 1 E det _ UAV l × N det _ UAV l E tran _ UAV l × N tran _ UAV l E st _ UAV l ,
and
E rest _ veh l = E rest _ veh l 1 E det _ veh l × N det _ veh l E tran _ veh l × N tran _ veh l E st _ veh l ,
where  E rest _ UAV 0 = E init _ UAV  and  E rest _ veh 0 = E init _ veh .
Meanwhile, when transmitting message copies to communication nodes with higher centrality, the remaining cache space of these nodes must also be considered. In practical integrated UAV–ICV networks, the cache size of nodes is limited. Once the cache is full, the node is unable to store newly received information and mst drop these message copies, which reduces the delivery ratio of integrated UAV–ICV networks. Therefore, the selected UAV nodes must not only have high centrality and sufficient energy but also consider their remaining cache size. It is assumed that the initial cache space of UAV and ICV is  B init _ UAV  and  B init _ veh , respectively. In addition, the size of each message copy is  α . The number of message copies currently cached by the UAV and ICV is  β UAV  and  β veh , respectively. According to the above-mentioned analysis, for the l-th transmission, the remaining cache size of the UAV and ICV can be calculated by (17) and (18), respectively.
B rest _ UAV l = B rest _ UAV l 1 α × β UAV l ,
and
B rest _ veh l = B rest _ veh l 1 α × β veh l ,
where  B rest _ UAV  and  B rest _ veh  are the remaining cache sizes of UAVs and ICVs, respectively. We have  B rest _ UAV 0 = B init _ UAV  and  B rest _ veh 0 = B init _ veh .
Therefore, the selected UAV nodes for transmission should consider the node centrality, remaining energy, and remaining cache. The selection criterion is
Φ = lg a × D Centrality + 10 × lg b × E rest _ UAV l + 10 × lg c × B rest _ UAV l + 10 ,
where a, b, and c are the tuned parameters. In (19), logarithmic operations are performed to eliminate heteroscedasticity of tuned parameters. Additionally, the higher the value of  Φ , the better the forwarding performance to that node. A diagram of UAV-assisted information transmission is shown in Figure 3.

4. Performance Evaluation

4.1. Simulation Parameters

In this section, the performance of the proposed opportunistic transmission scheme is evaluated through simulation experiments. This paper compared it with three state-of-the-art schemes: (A) Scheme 1 [21]; (B) Scheme 2 [22]; (C) Scheme 3 [23]. The employed simulation software was the opportunistic network environment (ONE). The mobility model for UAVs and ICVs is the shortest path map-based movement (SPMBM) model [29]. The SPMBM model utilizes a “shortest path map”, a method from graph theory, to predict and optimize the movement paths between network nodes (i.e., UAVs and ICVs). Therefore, the movement of nodes in integrated UAV–ICV networks is not completely random but depends on the physical distances between nodes and the communication opportunities available. In this model, each node is equipped with the global positioning system (GPS). Additionally, each node is represented as a graph to denote its position within the network, and the shortest paths between each node and all other nodes are taken into account. In the simulations, we considered scenarios where UAVs and ICVs equipped with smart Wi-Fi devices communicate in a real urban environment. Moreover, this paper classified ICVs into three types based on their cooperation level. The ratio of type II nodes to type III nodes is 1:1. Furthermore, the UAVs were defined as non-selfish nodes. When any node encountered a non-selfish node, information could be transmitted directly without an interaction request. However, when interacting with selfish nodes, an interaction request was required.
The simulation scenario settings are shown in Table 1. In Table 1, OFDMA and LoS are abbreviations for orthogonal frequency division multiple access and line-of-sight, respectively. It should be noted that, to ensure a fair comparison, the simulation settings not only considered the proposed scheme but also included the baseline mechanisms. This allowed us to evaluate the performance of the proposed scheme in relation to existing solutions under the same conditions, ensuring that the results were meaningful and comparable. Moreover, we used Open Street Map (OSM) to export real-world road data and integrated OSM with the event-driven simulator by using the osm2wkt.jar package and Open Jump. Furthermore, we employed an opportunistic multihop multiple access control (MAC) protocol, which enables nodes to take advantage of brief opportunities to exchange data while they are within transmission range of each other.

4.2. Simulation Results

In this section, the obtained results are based on the scenario described in Table 1; we focus on two metrics: delivery ratio and average delivery delay.
  • Delivery Ratio: This metric is the most important for evaluating the opportunistic transmission scheme in integrated UAV–ICV networks. A higher delivery ratio indicates greater accuracy in information delivery by the scheme.
  • Average Delivery Delay: This metric can assess the transmission ability of the opportunistic transmission scheme in integrated UAV–ICV networks. Smaller delays indicate higher ability and efficiency of the scheme.

4.2.1. Performance Comparison Under Different Proportions of Selfish Nodes

Figure 4 and Figure 5, respectively, present the delivery ratio and average delivery delay of each scheme under varying proportions of selfish nodes. The results indicate that as the proportion of selfish nodes increases, the performance of all opportunistic transmission schemes shows a declining trend. However, the proposed opportunistic transmission scheme for integrated UAV–ICV networks exhibits the smallest performance degradation. When the proportion of selfish nodes increases from 20% to 50%, the delivery ratios of the proposed scheme, Scheme 1, Scheme 2, and Scheme 3 decrease by 6.7%, 25.8%, 22.9%, and 15.1%, respectively. This demonstrates that the performance of the proposed scheme is more stable compared to that of the other three schemes.
When the proportion of selfish nodes is 50%, the delivery ratio of the proposed opportunistic transmission scheme is 1.72 times, 1.39 times, and 1.22 times higher than that of Scheme 1, Scheme 2, and Scheme 3, respectively. Additionally, its average delivery delay is only 77.3%, 82.3%, and 89.7% of that of these three schemes. Notably, this disparity becomes particularly evident when the proportion of selfish nodes is high. The primary reason for this is that the proposed scheme does not blindly transmit message copies during the initial information flooding and UAV-assisted information forwarding processes. Instead, it prioritizes nodes with higher cooperation levels for relay transmission. Furthermore, the proposed scheme fully considers the energy and cache size of nodes, effectively improving the delivery ratio and reducing the average delivery delay.
Based on the aforementioned findings, it is evident that in VDTNs, the average delivery delay frequently exceeds 1000 s, attributed to the dynamic characteristics of their operational environment. The reason is that integrated UAV–ICV networks are designed to handle intermittent connectivity and high mobility, where continuous communication cannot be guaranteed. Particularly, UAVs and ICVs are in constant motion, leading to frequent changes in the network topology and connectivity, which results in disconnections. VDTNs typically rely on “store-carry-forward” transmission mechanisms, where data are temporarily stored at relay nodes until a viable communication opportunity arises, at which point the data can be forwarded. Despite such high delays, VDTNs remain valuable in specific scenarios, where the timely delivery of information is not always critical, but ensuring high reliability and extensive coverage is critical. For example, VDTNs can be used in applications such as real-time traffic management and entertainment information services, where data can be delivered in a delayed manner but still provide valuable services to users. The main difference between VDTNs and traditional direct data transmission is that VDTNs do not require continuous end-to-end connectivity.

4.2.2. Impact of Different Node Cooperation Thresholds on Transmission Performance

Figure 6 and Figure 7, respectively, show the impact of different cooperation thresholds on the delivery ratio and average delivery delay under varying proportions of selfish nodes. The simulation results indicate that the delivery ratio and average delivery delay in integrated UAV–ICV networks are closely related to the cooperation threshold, exhibiting a trend of first increasing and then decreasing. Specifically, when the cooperation threshold is low, selfish nodes receive a large number of message copies from non-cooperative nodes. This leads to an inundation of message copies within integrated UAV–ICV networks, which in turn reduces the delivery ratio. Conversely, when the cooperation threshold is high, selfish nodes may refuse to receive message copies not only from non-cooperative nodes but also from cooperative nodes, which also results in a decrease in the delivery ratio. From the results in Figure 6 and Figure 7, it is evident that when the cooperation threshold is set at 0.6, the integrated UAV–ICV networks achieve a higher delivery ratio and a shorter average delivery delay.
In integrated UAV–ICV networks, since data transmission relies on opportunistic communications, the optimal cooperation threshold is difficult to express using a closed-form solution. Additionally, given that the network conditions are dynamic, the optimal cooperation threshold is not a fixed value and may vary over time. To address this, we conducted Monte Carlo simulations to explore the impact of different cooperation thresholds on transmission performance. While we analyzed a set of thresholds in Figure 6 and Figure 7, the optimal threshold may not be limited to just those values. Thus, the exploration of the optimal cooperation threshold is indeed an interesting topic for further investigation.

4.2.3. Impact of Different Number of Nodes on Transmission Performance

Figure 8 and Figure 9, respectively, illustrate the impact of the number of communication nodes on the delivery ratio and average delivery delay under varying proportions of selfish nodes. The results demonstrate that the delivery ratio is positively correlated with the number of nodes. As the number of nodes increases, the delivery ratio rises, while the average delivery delay decreases. With a cooperation threshold of 0.2, the delivery ratio is lower, and the average delivery delay is larger. This occurs because nodes with lower cooperation levels are selected for relay during the initial flooding process, hindering rapid delivery to the destination node and causing significant packet loss.
In contrast, with a cooperation threshold of 0.8, the delivery ratio is higher, as nodes with higher cooperation levels are chosen for each relay transmission. However, due to the opportunistic transmission mechanism in integrated UAV–ICV networks, the type of communication nodes encountered is highly uncertain. Under this condition, using a higher cooperation threshold necessitates waiting for nodes with higher cooperation levels for relay transmission, thereby increasing the average delivery delay. Therefore, it is essential to elaborately set a reasonable cooperation threshold to enhance transmission performance.

5. Conclusions

In VDTNs, the selfishness of communication nodes leads to relay nodes refusing to receive message copies from non-cooperative nodes, thereby reducing network performance. Although traditional incentive schemes promote cooperation among nodes, they result in high-resource consumption by non-selfish nodes with high centrality, which also decreases network performance. Motivated by the above, we investigated the opportunistic transmission problem in integrated UAV–ICV networks. By using the “store-carry-forward” transmission mechanism, an opportunistic transmission scheme for integrated UAV–ICV networks, enabled by node cooperation, was proposed. According to the selfish behavior of nodes in the actual use scenario, the cooperation type and encounter probability of nodes were modeled and analyzed. Then, by jointly considering the node centrality, energy consumption, and cache size, information was initially flooded and transmitted with the assistance of UAVs. Finally, this paper performed simulations using real maps to evaluate the performance of the proposed opportunistic transmission scheme. It was observed that compared to state-of-the-art schemes, the delivery ratio was improved, and the average delivery delay was reduced. Additionally, the influence of network parameters (e.g., the proportion of selfish nodes, cooperation thresholds, and number of nodes) on the delivery ratio and average delivery delay was fully demonstrated.
In addition to the issues outlined in the previous sections, numerous research issues warrant further exploration. First, this paper assumed that the communication range and rate for integrated UAV–ICV networks are fixed. However, in actual vehicular networks, the communication range and rate dynamically change with environmental factors such as building density, power, and spectrum. In future work, it is necessary to combine our previous work [14] to further optimize the transmission mechanism and improve network performance. Additionally, this paper sets the mobility model for both UAVs and ICVs based on the SPMBM model using the Dijkstra algorithm. However, the movement of UAVs should theoretically be constrained by regulations. Meanwhile, the mobility of ICVs is influenced by social attributes, and the mobility model should not be singular. Thus, we can further explore the impact of mobility models on the delivery ratio and average delivery delay. Nevertheless, the opportunistic transmission scheme proposed in this paper offers important insights and points out a promising direction for the design of relay selection protocols in the presence of selfish nodes within integrated UAV–ICV networks.

Author Contributions

M.Y.: conceptualization, methodology, software, writing—original draft preparation, and visualization. Z.Z.: conceptualization, methodology, software, and writing—original draft preparation. L.Z.: data curation, resources, and funding acquisition. F.H.: conceptualization, methodology, and formal analysis. T.L.: formal analysis, resources, and writing—review and editing. D.W.: conceptualization, resources, and writing—review and editing. Y.J.: software, resources, and writing–review and editing. Y.H.: conceptualization, resources, writing—review and editing, supervision, project administration, and funding acquisition. All authors have read and agreed to the published version of this manuscript.

Funding

This work was supported in part by the “Pioneer” and “Leading Goose” R&D Program of Zhejiang under Grants 2024C04004 and 2023C01162, in part by the National Natural Science Foundation of China under Grants 62401230, 62271399, and 62201462, in part by the National Key Research and Development Program of China under Grant 2024YFC2206804, in part by the General Research Projects of Zhejiang Provincial Department of Education under Grant Y202352050, and in part by the Student Research Training Program of Jiaxing University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lin, H.; Qian, J.; Di, B. Learning for Adaptive Multi-Copy Relaying in Vehicular Delay Tolerant Network. IEEE Trans. Intell. Transp. Syst. 2024, 25, 3054–3063. [Google Scholar] [CrossRef]
  2. Nakayima, O.; Soliman, M.I.; Ueda, K.; Mohamed, S.A.E. Combining Software-Defined and Delay-Tolerant Networking Concepts With Deep Reinforcement Learning Technology to Enhance Vehicular Networks. IEEE Open J. Veh. Technol. 2024, 5, 721–736. [Google Scholar] [CrossRef]
  3. Zou, Y.; Wei, Z.; Cui, Y.; Liu, X.; Feng, Z. UD-MAC: Delay Tolerant Multiple Access Control Protocol for Unmanned Aerial Vehicle Networks. IEEE Sens. J. 2023, 23, 23653–23663. [Google Scholar] [CrossRef]
  4. Wang, D.; Wang, Z.; Yu, K.; Wei, Z.; Zhao, H.; Al-Dhahir, N.; Guizani, M.; Leung, V.C.M. “Active aerial reconfigurable intelligent surface assisted secure communications: Integrating sensing and positioning. IEEE J. Sel. Areas Commun. 2024, 42, 2769–2785. [Google Scholar] [CrossRef]
  5. Du, H.; Wen, Q.; Zhang, S.; Gao, M. An Improved Conditional Privacy Protection Scheme Based on Ring Signcryption for VANETs. IEEE Internet Things J. 2023, 10, 17881–17892. [Google Scholar] [CrossRef]
  6. Tornell, S.M.; Calafate, C.T.; Cano, J.-C.; Manzoni, P. DTN Protocols for Vehicular Networks: An Application Oriented Overview. IEEE Commun. Surv. Tutor. 2015, 17, 868–887. [Google Scholar] [CrossRef]
  7. Asuquo, P.; Cruickshank, H.; Ogah, C.P.A.; Lei, A.; Sun, Z. A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency Communications. IEEE J. Sel. Areas Commun. 2018, 36, 246–256. [Google Scholar] [CrossRef]
  8. Fan, Z.; Gong, S.; Long, Y.; Li, L.; Gu, B.; Luong, N.C. Delay-Tolerant Multi-Agent DRL for Trajectory Planning and Transmission Control in UAV-Assisted Wireless Networks. In Proceedings of the 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring), Singapore, 24–27 June 2024; pp. 1–5. [Google Scholar]
  9. Abdelkader, T.; Naik, K.; Nayak, A.; Goel, N.; Srivastava, V. A performance comparison of delay-tolerant network routing protocols. IEEE Netw. 2016, 30, 46–53. [Google Scholar] [CrossRef]
  10. Tan, H.; Zheng, W.; Vijayakumar, P. Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs. IEEE Trans. Intell. Transp. Syst. 2023, 24, 6389–6400. [Google Scholar] [CrossRef]
  11. Liao, Z.; Ma, Y.; Huang, J.; Wang, J. Energy-Aware 3D-Deployment of UAV for IoV With Highway Interchange. IEEE Trans. Commun. 2023, 71, 1536–1548. [Google Scholar] [CrossRef]
  12. He, Y.; Huang, F.; Wang, D.; Zhang, R.; Gu, X.; Pan, J. NOMA-Enhanced Cooperative Relaying Systems in Drone-Enabled IoV: Capacity Analysis and Height Optimization. IEEE Trans. Veh. Technol. 2024; early access. [Google Scholar] [CrossRef]
  13. Wang, W.; Xu, X.; Bilal, M.; Khan, M.; Xing, Y. UAV-Assisted Content Caching for Human-Centric Consumer Applications in IoV. IEEE Trans. Consum. Electron. 2024, 70, 927–938. [Google Scholar] [CrossRef]
  14. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Min, L. Aerial-Ground Integrated Vehicular Networks: A UAV-Vehicle Collaboration Perspective. IEEE Trans. Intell. Transp. Syst. 2024, 25, 5154–5169. [Google Scholar] [CrossRef]
  15. Wang, Y.; Tang, Z.; Huang, A.; Zhang, H.; Chang, L.; Pan, J. Placement of UAV-Mounted Edge Servers for Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 10587–10601. [Google Scholar] [CrossRef]
  16. Sun, L.; Wan, L.; Wang, J.; Lin, L.; Gen, M. Joint Resource Scheduling for UAV-Enabled Mobile Edge Computing System in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2023, 24, 15624–15632. [Google Scholar] [CrossRef]
  17. Du, Z.; Wu, C.; Yoshinaga, T.; Chen, X.; Wang, X.; Yau, K.L.A.; Ji, Y. A Routing Protocol for UAV-Assisted Vehicular Delay Tolerant Networks. IEEE Open J. Comput. Soc. 2021, 2, 85–98. [Google Scholar] [CrossRef]
  18. Gu, S.; Sun, X.; Yang, Z.; Huang, T.; Xiang, W.; Yu, K. Energy-Aware Coded Caching Strategy Design With Resource Optimization for Satellite-UAV-Vehicle-Integrated Networks. IEEE Internet Things J. 2022, 9, 5799–5811. [Google Scholar] [CrossRef]
  19. Hazarika, B.; Singh, K. AFL-DMAAC: Integrated Resource Management and Cooperative Caching for URLLC-IoV Networks. IEEE Trans. Intell. Veh. 2024, 9, 5101–5117. [Google Scholar] [CrossRef]
  20. Han, C.; Yao, H.; Mai, T.; Zhang, N.; Guizani, M. QMIX Aided Routing in Social-Based Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 2022, 71, 1952–1963. [Google Scholar] [CrossRef]
  21. Taileb, S.; Loucif, S.; Khaoua, M.O. On the Performance of Epidemic DTN Routing on Low-Power and Lossy Networks. In Proceedings of the 2023 2nd International Conference on Electronics, Energy and Measurement (IC2EM), Medea, Algeria, 28–29 November 2023; pp. 1–5. [Google Scholar]
  22. Jia, B.; Li, W.; Zhou, T. A Novel P2P Service Discovery Algorithm Based on Markov in Internet of Things. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 21–24 July 2017; pp. 26–31. [Google Scholar]
  23. Gupta, A.; Agrawal, A.; Nagrath, P. Variant of BUBBLE Rap forwarding Algorithm for delay tolerant networks. In Proceedings of the 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India, 11–13 March 2016; pp. 63–68. [Google Scholar]
  24. Su, Y.; Liwang, M.; Chen, Z.; Du, X. Toward Optimal Deployment of UAV Relays in UAV-Assisted Internet of Vehicles. IEEE Trans. Veh. Technol. 2023, 72, 13392–13405. [Google Scholar] [CrossRef]
  25. Liu, Y.; Lin, P.; Zhang, M.; Zhang, Z.; Yu, F.R. Mobile-Aware Service Offloading for UAV-Assisted IoV: A Multiagent Tiny Distributed Learning Approach. IEEE Internet Things J. 2024, 11, 21191–21201. [Google Scholar] [CrossRef]
  26. Wan, L.; Sun, L.; Liu, K.; Wang, X.; Lin, Q.; Zhu, T. Autonomous Vehicle Source Enumeration Exploiting Non-Cooperative UAV in Software Defined Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3603–3615. [Google Scholar] [CrossRef]
  27. Qin, P.; Fu, Y.; Ding, R.; He, H. Competition-Awareness Partial Task Offloading and UAV Deployment for Multitier Parallel Computational Internet of Vehicles. IEEE Syst. J. 2024, 18, 1753–1764. [Google Scholar] [CrossRef]
  28. Sami, H.; Saado, R.; Saoudi, A.E.; Mourad, A.; Otrok, H.; Bentahar, J. Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3428–3442. [Google Scholar] [CrossRef]
  29. Zhu, Y.; Xu, B.; Shi, X.; Wang, Y. A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects. IEEE Commun. Surv. Tutor. 2013, 15, 387–401. [Google Scholar] [CrossRef]
  30. Liang, L.; Kim, J.; Jha, S.C.; Sivanesan, K.; Li, G.Y. Spectrum and power allocation for vehicular communications with delayed CSI feedback. IEEE Wirel. Commun. Lett. 2017, 6, 458–461. [Google Scholar] [CrossRef]
Figure 1. A diagram of opportunistic transmission-enhanced integrated UAV–ICV networks.
Figure 1. A diagram of opportunistic transmission-enhanced integrated UAV–ICV networks.
Drones 09 00012 g001
Figure 2. A flow chart of the proposed solution.
Figure 2. A flow chart of the proposed solution.
Drones 09 00012 g002
Figure 3. A diagram of UAV-assisted information transmission.
Figure 3. A diagram of UAV-assisted information transmission.
Drones 09 00012 g003
Figure 4. The delivery ratio versus the proportion of selfish nodes.
Figure 4. The delivery ratio versus the proportion of selfish nodes.
Drones 09 00012 g004
Figure 5. The average delivery delay versus the proportion of selfish nodes.
Figure 5. The average delivery delay versus the proportion of selfish nodes.
Drones 09 00012 g005
Figure 6. Impact of cooperation thresholds on the delivery ratio.
Figure 6. Impact of cooperation thresholds on the delivery ratio.
Drones 09 00012 g006
Figure 7. Impact of cooperation thresholds on the average delivery delay.
Figure 7. Impact of cooperation thresholds on the average delivery delay.
Drones 09 00012 g007
Figure 8. The impact of the number of nodes on the delivery ratio.
Figure 8. The impact of the number of nodes on the delivery ratio.
Drones 09 00012 g008
Figure 9. The impact of the number of nodes on the average delivery delay.
Figure 9. The impact of the number of nodes on the average delivery delay.
Drones 09 00012 g009
Table 1. Simulation scenario settings.
Table 1. Simulation scenario settings.
CategoryParameterValue
ScenarioSimulation Time24 h
Simulation Range 50 km × 50 km
Simulation CityXi’an
NodeTransmission ModeWi-Fi
Transmission Range of ICVs200 m
Transmission Range of UAVs1500 m
Movement Speed 30 , 70  km/h
UAV/ICV Cache Size50/150 MB
MessageMessage Size 1 , 2  MB
Message TTL5 h
Generation Frequency 1 , 20  min
CommunicationTransmission MechanismOFDMA
Channel Bandwidth180 KHz
Transmission Power30 dBm
Path Loss Model (ICV-UAV) 32.44 + 20 lg d km + 20 lg f c MHz
Path Loss Model (ICV-ICV)LoS in WINNER + B1 [30]
Noise Power 174 dBm / Hz
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ye, M.; Zhou, Z.; Zhu, L.; Huang, F.; Li, T.; Wang, D.; Jin, Y.; He, Y. Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches. Drones 2025, 9, 12. https://doi.org/10.3390/drones9010012

AMA Style

Ye M, Zhou Z, Zhu L, Huang F, Li T, Wang D, Jin Y, He Y. Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches. Drones. 2025; 9(1):12. https://doi.org/10.3390/drones9010012

Chicago/Turabian Style

Ye, Meixin, Zhenfeng Zhou, Lijun Zhu, Fanghui Huang, Tao Li, Dawei Wang, Yi Jin, and Yixin He. 2025. "Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches" Drones 9, no. 1: 12. https://doi.org/10.3390/drones9010012

APA Style

Ye, M., Zhou, Z., Zhu, L., Huang, F., Li, T., Wang, D., Jin, Y., & He, Y. (2025). Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches. Drones, 9(1), 12. https://doi.org/10.3390/drones9010012

Article Metrics

Back to TopTop