<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Research of UAV and sensor network integration features for routing optimization and energy consumption reduction⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadiia Dovzhenko</string-name>
          <email>nadezhdadovzhenko@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Ivanichenko</string-name>
          <email>y.ivanichenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Zhyltsov</string-name>
          <email>o.zhyltsov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudryavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute of Mathematical Machines and Systems Problems of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>42 Ac. Glushkov ave., 03680 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>236</fpage>
      <lpage>241</lpage>
      <abstract>
        <p>Modern unmanned aerial vehicles (UAVs) are increasingly integrating with sensor networks, significantly expanding the capabilities of real-time data collection, transmission, and processing. This integration is critically important for various sectors, including environmental monitoring, smart city infrastructure management, agriculture, and military operations. UAVs provide mobility and access to remote and hardto-reach locations, enabling effective monitoring in areas where traditional networks are unavailable or ineffective. However, alongside these advantages, numerous technical challenges arise. These challenges include optimizing UAV flight routes to ensure maximum sensor network coverage, minimizing energy consumption, and addressing data security issues such as cyber threats. Another important aspect is flight duration, which depends on UAV battery capacity and energy-saving methods for sensor nodes, especially through the use of alternative energy sources, such as solar panels. The study presents a model of dynamic interaction between UAVs and a sensor network, examining the process of data collection, and transmission to a central server, and the impact of increasing the number of sensor nodes on the overall mission time. A stochastic model is proposed to account for environmental heterogeneities, such as data transmission delays caused by obstacles or changes in connection speed. An analysis is conducted to evaluate the impact of these factors on data collection efficiency and to optimize flight routes, with a focus on dynamic programming algorithms and heuristic methods.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;UAVs</kwd>
        <kwd>drones</kwd>
        <kwd>sensor networks</kwd>
        <kwd>IoT</kwd>
        <kwd>nodes</kwd>
        <kwd>energy efficiency</kwd>
        <kwd>routing</kwd>
        <kwd>security</kwd>
        <kwd>reliability</kwd>
        <kwd>connectivity</kwd>
        <kwd>data 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Unmanned aerial vehicles (UAVs) are increasingly being
used in various fields of human activity. For example, in
agriculture, GPS-guided UAVs are employed for spraying
crops in the fields. The use of UAVs significantly saves
resources (such as time and chemicals) and ensures accurate
and precise treatment of agricultural lands compared to
manned aviation [1].</p>
      <p>In some European Union countries, drones are even
used for customer deliveries. During military conflicts and
wars, UAVs are utilized for delivering medications,
humanitarian aid, and combat supplies to hard-to-reach
areas. Certain drone models are also employed to inspect
power lines, transformers, and pipelines [2].</p>
      <p>Emergency services deploy drones for monitoring,
forecasting, and controlling hazardous sites, contributing to
both safety and environmental protection. In particular,
UAVs can serve as platforms for meteorological
measurement systems.</p>
      <p>They have advantages over fixed-wing UAVs, whose
high speed limits spatial and temporal resolution, making
them less sensitive to turbulent processes [3].</p>
      <p>Today, relatively affordable multicopters are available,
capable of lifting payloads of 3–5 kg to altitudes of 2–4 km
with flight durations of 30–40 minutes. Modern UAVs,
equipped with onboard navigation and control systems,
perform a wide range of functions. For example, UAVs can
be programmed with fixed flight routes (using coordinates,
altitude values, and specific waypoints) and can change
their routes or return to the starting point upon command
from the ground control station. Additionally, UAVs can fly
over designated points, collect and transmit telemetry
information about flight parameters and the operation of
target equipment, and provide software control for this
equipment [4].</p>
      <p>0000-0003-4164-0066 (N. Dovzhenko);
0000-0002-6408-443X (Y. Ivanichenko);
0000-0002-7775-6039 (P. Skladannyi);
0000-0002-7253-5990 (O. Zhyltsov)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>Moreover, modern UAVs are actively integrated into fields
such as environmental monitoring, terrain mapping, and
construction. Drones are also used in search and rescue
operations and to assess agricultural land conditions.
Advancements in artificial intelligence, sensor networks,
and microchips have significantly improved the autonomy
and accuracy of UAV flights, making them indispensable
across many industries. This enables greater mobility and
efficiency in operations while maintaining relatively low
operational costs for UAVs [5].
2. Evolution, classification, and
modern applications of unmanned
aerial vehicles
Research in the field of unmanned aerial vehicles (UAVs)
has a long and rich history. It began during World War I, in
1917–1918, with developments in the United States and the
United Kingdom. One of the prototypes, the Kettering Bug,
was an early cruise missile with a simple control system that
allowed it to fly along a predetermined route. Another
example, is the Aerial Target, an unmanned aircraft
controlled via radio, which was developed for anti-aircraft
artillery training. Although the project faced numerous
technical limitations and was ultimately unsuccessful, it laid
the foundation for further advancements in aviation.</p>
      <p>During World War II, the German army deployed the
first attack unmanned aerial vehicle (UAV)—the V-1 flying
bomb. Later, researchers classified this aircraft, and its
predecessors, as cruise missiles rather than conventional
UAVs. However, it is important to note that their
characteristics laid the groundwork for modern UAVs,
particularly in terms of autonomy and the ability to
accurately reach targets without a pilot.</p>
      <p>From the 1950s to the 1970s, significant scientific
research and development were conducted in the field of
combat UAVs, particularly in versions capable of flying at
high altitudes, remaining airborne for extended periods, and
conducting surveillance. UAVs such as the Ryan Firebee,
AQM-34 Ryan Model 147, and Teledyne Ryan AQM-91
Firefly were not only used for reconnaissance and training
tasks but also represented advancements in remote control
technologies that eventually became fully operational
combat platforms.</p>
      <p>Modern drones are used not only for military purposes,
reconnaissance, and precision strikes but also for civilian
tasks, such as search and rescue operations, infrastructure
monitoring, agriculture, environmental monitoring, and
cybersecurity. UAVs such as the RQ-1 Predator, MQ-9
Reaper, DJI Phantom, MQ-25 Stingray, Bayraktar TB2,
Hermes 900, Wing Loong II, XQ-58A Valkyrie, and others
have significantly expanded their capabilities thanks to the
continuous development of artificial intelligence
technologies, improvements in computing power, and the
implementation of sensor systems [6].</p>
      <p>Analyzing the existing varieties of unmanned aerial
vehicles, they can generally be classified by their structural
features. For example:
</p>
      <p>Small UAVs are typically built based on classic
aerodynamic designs, with variations such as
“flying wings”. These aircraft usually have
highmounted wings, often in a V-shape, with electric
motors. They may also feature more complex
fuselage designs—from gondolas to single-fuselage
solutions. They are equipped with piston engines
and typically take off from specially designed
launch platforms. Their landing is accomplished
either by parachute or via traditional aircraft
methods. The advantage of such drones is their
ability to perform much longer and more complex
missions, remaining airborne for up to 5 hours.</p>
      <p>Medium UAVs have heavier landing gear and
more complex takeoff and landing systems, which
are more similar to traditional aviation principles.
These drones can perform long-duration flights
(approximately up to 20 hours) and can ascend to
altitudes of up to 6 kilometers.</p>
      <p>Heavy UAVs are designed as “air giants” compared
to other UAVs. They can reach altitudes of up to
20 kilometers and remain airborne for more than
24 hours. The construction of such UAVs involves
the use of sufficiently complex and powerful
engines and landing gear, making them effective
for strategic missions and multifunctional tasks.</p>
      <p>
        It is also appropriate to classify UAVs by weight, as this
represents a separate classification for determining the
capabilities of such devices. Small UAVs (weighing up to 5
kg) can perform short-term reconnaissance missions, such
as target detection in hard-to-reach areas. Research
indicates the potential for the weight of heavy UAVs to
increase to 15 tons in the coming decades [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        These options will be capable of performing strategic
functions, combining reconnaissance, monitoring, and the
management of a large amount of equipment for various
tasks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
3. Technical aspects of integrating
sensor networks and UAVs
The world of the Internet of Things (IoT) is broad and
multifaceted, encompassing a wide range of industries, each
with its own unique features and technological
requirements. However, it is more appropriate to view IoT
not as a single technological domain, but as a combination
of different concepts, protocols, and technologies that vary
depending on the application.
      </p>
      <p>Sensor networks are a key component of IoT, providing
monitoring of physical parameters of the environment. Due
to limited resources and the need to operate in harsh
conditions, these networks often face challenges such as
node failures and malfunctions, leading to new issues,
particularly in scaling the network to accommodate large
numbers of connected devices, processing large volumes of
data, and ensuring security.</p>
      <p>Therefore, a logical step in the development of these
technologies is the integration of UAVs with sensor
networks, opening up new possibilities for efficient data
collection, monitoring, and management in various areas of
human activity, including the deployment of “smart” cities,
environmental monitoring, critical infrastructure systems,
cybersecurity, and even military applications.</p>
      <p>
        One of the main advantages of using UAVs as mobile base
networks. The use of modern encryption and authentication
stations is the improvement of communication between
mechanisms helps prevent unauthorized access to data,
sensor nodes and drones, reducing signal loss, increasing
which is especially important for military and industrial
the likelihood of direct line of sight, and, most importantly,
applications [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
decreasing the energy consumption of sensor resources. It
is worth noting that sensor networks consist of hundreds or
thousands of nodes that collect, process, and transmit data
to central servers or cloud platforms using
wireless
communication protocols for further analysis.
      </p>
      <p>
        Therefore, reducing energy consumption is especially
important for nodes with low battery power, as it helps
extend their operational life [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>To ensure effective data collection and transmission
between UAVs and sensor nodes, technologies such as
LoRaWAN, Zigbee, and 5G are used.</p>
      <p>For comparison, LoRaWAN and Zigbee provide stable
communication in difficult conditions with low power
consumption, extending the operational life of the sensors.</p>
      <p>5G technology enables the transmission of large
amounts of data in real time and ensures low latency, which
is critical for tasks that require an immediate response.</p>
      <p>Additionally, drones can be used to install sensor nodes
in hard-to-reach or dangerous locations for humans, such as
disaster zones, mountainous regions, seismically active
areas, or sites of industrial accidents. In this case, the use of
UAVs as mobile platforms for sensor networks allows for
flexible</p>
      <p>
        positioning, data collection, and
processing
over
large
areas,
providing
preliminary
continuous
monitoring and rapid response to real-time changes [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Another key aspect of integrating sensor networks and
UAVs is the optimization of drone flight paths to ensure
maximum sensor network coverage
while minimizing
energy consumption. Key parameters that affect the
efficiency of data collection include flight speed, distance to
sensor nodes, transmitter power, flight altitude, and more.</p>
      <p>The use of dynamic programming, heuristic algorithms,
and
machine learning</p>
      <p>methods enables the real-time
optimization of drone routes, improving the performance of
the data collection system and reducing the likelihood of
errors or failures.</p>
      <p>However, one of the biggest challenges remains the
limited capacity of drone batteries, which determines their
capabilities and flight duration. Due to several factors,
lithium-ion batteries remain the most efficient; however,
4. Model of dynamic interaction
between UAVs and sensor
networks
The integration of UAVs and sensor networks offers vast
opportunities to improve efficiency and security in many
sectors, but it also requires addressing several technical
challenges to ensure the stable and reliable operation of such
systems.</p>
      <p>A</p>
      <p>model of the dynamics of data collection and
interaction between UAVs and a sensor network is proposed,
based on a specific scenario. In this scenario, the drone flies
over several sensor nodes, collecting data from them and
transmitting it to a central server. For modeling this process,
a sensor network consisting of 50, 100, 200, or 500 nodes is
considered. The time for data collection, data transmission,
and command processing is also taken into account.</p>
      <p>For example, the flight time to the sensor network nodes
is determined by formula (1) and depends on the distance
between the sensor nodes and their quantity.</p>
      <p>=
,
 is the distance between sensor nodes (e.g., 100 m),  is
the speed of the drone (for example, 10 m/s). If the number
of nodes increases but the area size remains unchanged, the
distance between the nodes decreases proportionally.</p>
      <p>This, in turn, will affect the flight time, reducing it, but
increasing the number of nodes the drone interacts with and</p>
      <p>The total interaction time between a sensor node and
the drone is calculated as follows:
+ 
+ 
is time for data collection from a</p>
      <p>is time for data transfer from a
is flight time.</p>
      <p>The data transfer rate is determined as follows:

=
where</p>
      <p>
        is data volume from one node (for example, 10
connects to [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p />
      <p>
        = 
where 
single node, 
single node, and 
the issue of limited energy forces the search for new
MB), and  is transfer speed (for example, 1 Mbit/s).
approaches and solutions. For example, new types of
batteries, fuel cells, or hybrid power sources may be
considered for drones. For sensor nodes, solar panels are
used, reducing the frequency of recharging and ensuring
continuous system operation. Energy-saving methods for
sensor components, such as adaptive module shutdowns
and optimization of data collection frequency, are also
actively being researched [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>To formulate the mathematical model of the interaction
between sensor nodes and UAVs (drones) in such a scenario,
a system of equations can be used to describe the process of
data collection, transmission, and processing from sensors,
taking into account discrete time intervals.</p>
      <p>
        The model will be based on stochastic process concepts
to simulate random delays and heterogeneities [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>The model for drone data collection and transmission
Additionally, to ensure proper synchronization between
can be described as a discrete process that defines the
sensor nodes and drones, especially in complex or dynamic
environments, special routing algorithms, and dynamic data
correction are used. Reliable synchronization is critically
important to prevent data loss and ensure the stable
operation of the entire system.</p>
      <p>It is also worth noting the importance of cybersecurity,
which is another key aspect of integrating UAVs and sensor
change in system state at the time  , when the drone moves
between sensors and collects information:
 ,
=  , +  ,  , ( ,  , ),
(4)
where  , is the volume of collected data at a given time  ,
 , is discretization step parameter, which regulates data
state changes,  , ( ,  , ) is a function that describes the
process of data collection and transmission from sensor
(1)
(3)
node  under certain conditions,  , is models random
delays or other changes in the system.</p>
      <p>For a system
with</p>
      <p>sensor nodes, the total data
collection time will be defined as:

=  ∗ 
,
where  is the number of sensors, and 
interaction time with one sensor node.</p>
      <p>The overall interaction time of the drone with the sensor
network increases almost linearly with the number of
sensor nodes, as shown in Fig. 1.</p>
      <p>Each additional sensor node increases the total mission
time due to the time required for flight, data collection, and
data transmission to the gateway or server.</p>
      <p>With a significant increase in the number of sensor
nodes, optimization strategies should be considered, such as
using
multiple drones in
parallel, dividing areas of
responsibility, or using faster data transmission channels.</p>
      <p>To optimize the route between sensor nodes,
graphbased approaches or the traveling salesman problem can be
used, where the drone must find the most efficient route
that minimizes the distance between nodes.</p>
      <p>(5)
is the total</p>
      <p>However, the presented calculations do not always
reflect
realistic
scenarios. In
real-world
conditions,
heterogeneities may arise, such as delays due to obstacles
(e.g., trees, buildings, or other objects that may slow down
the drone or cause additional energy expenditure), changes
in data transmission speed (sometimes the speed may
fluctuate due to interference, the distance between drones
and the server, etc.), or variations in flight time due to
differing distances between sensors (sensors may be
distributed unevenly), and so on.</p>
      <p>To account for such heterogeneities, random delays or
variables can be added to the flight time, data collection, and
information transmission time, for example:



=
+  ,
(6)
where  is a random value of delay or change that creates
heterogeneity.
number of sensor nodes, considering heterogeneities in
flight, data collection, and transmission times
Fig. 2 shows the heterogeneities accounted for in the time
for flight, data collection, and transmission.</p>
      <p>
        It can be argued that adding random variations in time
simulates real conditions, where delays due to obstacles or
changes in data transmission speed may occur [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
5. Data Security Challenges in
UAV
      </p>
      <p>Integrated Sensor Networks
Since sensor networks and their components are often
deployed
in
uncontrolled
or insufficiently
protected
physical environments, especially in the case of integration
with UAVs, it is crucial to pay particular attention to the
impact
of
attacks
and
threats
on
both
individual
nodes/sensors and drones.</p>
      <p>Due to the numerous advantages of UAVs interacting
with sensor nodes, there is an increased risk of unauthorized
access, data</p>
      <p>manipulation, or modification, as well as
heightened vulnerability to the compromise of nodes and
drones through physical access to network elements. In
such cases, malicious software can be implanted, potentially
compromising the integrity and confidentiality of the
processed
information.</p>
      <p>
        The
aforementioned
threats
jeopardize not only individual network components but also
the security of the entire system [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>Today, there is a broad range of threats and types of
attacks that can target sensor networks, occurring at
various levels. One of the most common types of attacks is
jamming, aimed at introducing
additional noise
and
interference in the physical channel for wireless signal
transmission, which can disrupt the correct interaction
between nodes and UAVs. Other common threats include
physical interference
with
network operations, sensor
spoofing, or attacks on information leakage through direct
access to network components. Such threats may lead to
unpredictable consequences, including modification, delay,
or loss of data sent to gateways, routers, or central servers,
potentially causing</p>
      <p>misinformation or improper data
processing.</p>
      <p>For instance, at the link layer, a significant threat
includes
collision
attacks,
where
identical frequency
channels are used. Such attacks lead to resource depletion
of nodes by forcing them to repeatedly retransmit damaged
or lost packets to recipient nodes, ultimately negatively
affecting network performance. When interacting
with
UAVs,
these
attacks
can
trigger
excessive
energy
consumption by nodes, reducing the overall system uptime
and increasing the risk of node disconnections from the
network.</p>
      <p>At the network level, attackers can alter or spoof
routing data, redirecting legitimate traffic to compromised
nodes. An example is the Black Hole attack, in which a node
intercepts data and does not forward it, creating a "black
hole" in routing. Another example is the Selective
Forwarding attack, where a malicious node selectively
forwards only part of the packets, ignoring the rest. During
interactions with UAVs, these attacks can cause serious
disruptions in data delivery and negatively affect the
timeliness of data receipt.</p>
      <p>Additionally, sensor networks are vulnerable to
eavesdropping and traffic analysis attacks, which allow
attackers to access confidential information, modify it, or
alter it for further attacks on the network. To mitigate risks
associated with these threats, robust encryption and
authentication methods must be employed to protect data
transmitted between UAVs and sensor nodes.</p>
      <p>Thus, ensuring the security of sensor network
components, especially when used in conjunction with
unmanned aerial vehicles (UAVs), is a highly challenging
task due to the limited resources of each sensor. The
constrained processing power, memory, and energy
resources of sensor nodes create challenges for effective
encryption key management, which is essential for data
protection.</p>
      <p>Modern strategies require the development of
distribution and key-update mechanisms that can adapt to
rapid network topology changes while maintaining a high
level of security amidst constant UAV interaction. It is
worth emphasizing that the dynamic nature of this topology
also places additional demands on the speed of adaptation
of security mechanisms.</p>
      <p>As the number of sensor nodes increases, the load on
data storage and transmission systems also rises,
complicating security maintenance. The use of data
compression technologies and selective data transmission
algorithms can optimize network performance, reducing the
volume of transmitted data and thereby shortening the
period during which the network remains vulnerable to
attacks.</p>
      <p>However, resource limitations necessitate additional
approaches to achieve comprehensive protection for sensor
networks and UAVs.</p>
      <p>To ensure protection at every level of the system, it is
crucial to enable interaction between security mechanisms.
For instance, effective energy resource management at the
channel level can significantly reduce vulnerability to
resource-depleting attacks, such as Denial of Service (DoS)
attacks. For this purpose, it is beneficial to implement
strengthened authentication and encryption protocols that
provide additional protection against unauthorized access at
the physical and network levels.</p>
      <p>Modern encryption methods and advanced security
algorithms at the network level allow for the prevention of
routing data spoofing and protect the system from Black
Hole and Selective Forwarding attacks. At the transport
level, Flooding attacks and similar strategies targeting the
depletion of node memory and computational resources
represent another threat that must be taken into account.</p>
      <p>Additionally, the threat of synchronization attacks
should be considered, as such intrusions can disrupt data
transmission and interfere with coordinated operations
between sensors and UAVs.</p>
      <p>In addition to the core information security goals
(confidentiality, integrity, and availability), sensor networks
also require secondary security objectives, such as data
relevance, network self-organization capabilities, time
synchronization, as well as node tracking and security
incident localization. In the case of UAV integration, these
aspects become critically important, as the constant
movement of drones imposes additional requirements on
the system’s response time to potential threats.</p>
      <p>
        Therefore, ensuring the security of wireless sensor
networks when used with UAVs demands a comprehensive
approach that includes multi-level protection against
various types of attacks, adaptive resource management,
and continuous improvement of security mechanisms to
effectively counter emerging cyber threats [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>6. Conclusions</title>
      <p>The integration of unmanned aerial vehicles (UAVs) with
sensor networks opens new opportunities for efficient data
collection and transmission across various industries,
particularly in remote and hard-to-reach locations. The
results presented in this study indicate that such integration
significantly enhances the quality of real-time monitoring
and process management.</p>
      <p>The proposed mathematical model describes a linear
increase in total mission time as the number of sensor nodes
grows, underscoring the need for optimizing UAV flight
routes. Such optimization reduces interaction time with
sensor nodes and improves data collection efficiency.</p>
      <p>The study also examines the implementation of
alternative power sources, such as solar panels for sensor
nodes and hybrid batteries for UAVs. These solutions
positively impact the system's continuous operation time
and extend flight durations.</p>
      <p>Additionally, special attention is given to data security,
as the use of UAVs increases the risk of unauthorized access,
manipulation, and attacks on the sensor network.
Implementing multi-level protection mechanisms, adaptive
resource management, and advanced encryption methods
ensures data protection and system stability amid
continuous UAV interactions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          , et al.,
          <article-title>An Adaptive and Automatic Power Supply Distribution System with Active Landmarks for Autonomous Mobile Robots</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3390/s24186152.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Deng</surname>
          </string-name>
          , et al.,
          <article-title>A Methodology to Monitor Urban Expansion and Green Space Change Using a Time Series of Multi-Sensor SPOT</article-title>
          and Sentinel-2A
          <string-name>
            <surname>Images</surname>
          </string-name>
          , Remote Sens.
          <volume>11</volume>
          (
          <year>2019</year>
          )
          <article-title>1230</article-title>
          . doi:
          <volume>10</volume>
          .3390/rs11101230.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          , et al.,
          <article-title>Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>275</fpage>
          -
          <lpage>280</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>N.</given-names>
            <surname>Cheng</surname>
          </string-name>
          , et al.,
          <article-title>AI for UAV-Assisted IoT Applications: A Comprehensive Review</article-title>
          ,
          <source>IEEE Internet of Things Journal</source>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2023</year>
          .
          <volume>3268316</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>K. P. Valavanis</surname>
            ,
            <given-names>G. J.</given-names>
          </string-name>
          <string-name>
            <surname>Vachtsevanos</surname>
          </string-name>
          , Handbook of Unmanned Aerial Vehicles, Springer Publishing Company, Incorporated (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>J. M. Maddalon</surname>
          </string-name>
          , et al.,
          <source>Perspectives on Unmanned Aircraft Classification for Civil Airworthiness Standards (No. NF1676L-16131)</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Asadpour</surname>
          </string-name>
          , et al.,
          <source>Micro Aerial Vehicle networks: An Experimental Analysis of Challenges and Opportunities, IEEE Communications Magazine</source>
          <volume>52</volume>
          (
          <issue>7</issue>
          ) (
          <year>2014</year>
          )
          <fpage>141</fpage>
          -
          <lpage>149</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MCOM</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <volume>6852096</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dovzhenko</surname>
          </string-name>
          , et al.,
          <article-title>Method of Sensor Network Functioning under the Redistribution Condition of Requests between Nodes</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>278</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mozaffari</surname>
          </string-name>
          , et al.,
          <article-title>A Tutorial on UAVs for Wireless Networks: Applications, Challenges,</article-title>
          and Open Problems,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          ,
          <volume>21</volume>
          (
          <issue>3</issue>
          ) (
          <year>2018</year>
          )
          <fpage>2334</fpage>
          -
          <lpage>2360</lpage>
          . doi:
          <volume>10</volume>
          .1109/COMST.
          <year>2019</year>
          .
          <volume>2902862</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. J.</given-names>
            <surname>FitzPatrick</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. B. Lee</surname>
          </string-name>
          ,
          <article-title>Smart Sensors and Standard-based Interoperability in Smart Grids</article-title>
          , IEEE Sensors J.
          <volume>17</volume>
          (
          <issue>23</issue>
          ) (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/JSEN.
          <year>2017</year>
          .
          <volume>2729893</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hassanien</surname>
          </string-name>
          , et al.,
          <article-title>Signaling Strategies for Dualfunction radar Communications: An Overview</article-title>
          ,
          <source>IEEE Aerospace and Electronic Systems Magazine</source>
          ,
          <volume>31</volume>
          (
          <issue>10</issue>
          ) (
          <year>2016</year>
          )
          <fpage>36</fpage>
          -
          <lpage>45</lpage>
          . doi:
          <volume>10</volume>
          .1109/MAES.
          <year>2016</year>
          .
          <volume>150225</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R. W.</given-names>
            <surname>Beard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. W.</given-names>
            <surname>McLain</surname>
          </string-name>
          ,
          <source>Small Unmanned Aircraft: Theory and Practice</source>
          , Princeton, NJ, USA: Princeton Univ. Press (
          <year>2012</year>
          ). doi:
          <volume>10</volume>
          .1515/9781400840601.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Liu</surname>
          </string-name>
          , et al.,
          <article-title>Joint radar communication system design based on filter bank multicarrier modulation scheme</article-title>
          ,
          <source>IET Radar, Sonar &amp; Navigation</source>
          ,
          <volume>17</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          ) doi: 10.1049/rsn2.
          <fpage>12323</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Beard</surname>
          </string-name>
          , et al.,
          <article-title>Autonomous Vehicle Technologies for Small Fixed-Wing UAVs</article-title>
          ,
          <source>J. Aerospace Comput. Inf. Commun</source>
          .
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2005</year>
          )
          <fpage>92</fpage>
          -
          <lpage>108</lpage>
          . doi:
          <volume>10</volume>
          .2514/1.8371.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          , et al.,
          <article-title>Development of a hybrid network traffic load management mechanism using smart components</article-title>
          ,
          <source>in: IEEE 7th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          (
          <year>2023</year>
          )
          <fpage>38</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <article-title>Analytical Assessment of Security Level of Distributed and Scalable Computer Systems</article-title>
          .
          <source>International Journal of Intelligent Systems and Applications</source>
          , vol.
          <volume>8</volume>
          , no.
          <volume>12</volume>
          (
          <year>2016</year>
          )
          <fpage>57</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Openko</surname>
          </string-name>
          , et al.,
          <article-title>Zabezpechennia nadiinosti ta bezpeky u suchasnykh bezprovodovykh sensornykh merezhakh na osnovi vprovadzhennia metryky RSSI</article-title>
          .
          <source>Povitriana mits Ukrainy</source>
          ,
          <volume>1</volume>
          (
          <issue>6</issue>
          ) (
          <year>2024</year>
          )
          <fpage>131</fpage>
          -
          <lpage>136</lpage>
          . doi:
          <volume>10</volume>
          .33099/
          <fpage>2786</fpage>
          -7714-2024-1-6-
          <fpage>131</fpage>
          -136
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>