<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Research of UAV and sensor network integration features for routing optimization and energy consumption reduction ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nadiia</forename><surname>Dovzhenko</surname></persName>
							<email>nadezhdadovzhenko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudryavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yevhen</forename><surname>Ivanichenko</surname></persName>
							<email>y.ivanichenko@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudryavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Pavlo</forename><surname>Skladannyi</surname></persName>
							<email>p.skladannyi@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudryavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Institute of Mathematical Machines and Systems Problems</orgName>
								<orgName type="institution">National Academy of Sciences of Ukraine</orgName>
								<address>
									<addrLine>42 Ac. Glushkov ave</addrLine>
									<postCode>03680</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Zhyltsov</surname></persName>
							<email>o.zhyltsov@kubg.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudryavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Research of UAV and sensor network integration features for routing optimization and energy consumption reduction ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">5B4EBC92822D469E224D7BDAF79B4222</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:50+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>UAVs</term>
					<term>drones</term>
					<term>sensor networks</term>
					<term>IoT</term>
					<term>nodes</term>
					<term>energy efficiency</term>
					<term>routing</term>
					<term>security</term>
					<term>reliability</term>
					<term>connectivity</term>
					<term>data 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Modern unmanned aerial vehicles (UAVs) are increasingly integrating with sensor networks, significantly expanding the capabilities of real-time data collection, transmission, and processing. This integration is critically important for various sectors, including environmental monitoring, smart city infrastructure management, agriculture, and military operations. UAVs provide mobility and access to remote and hardto-reach locations, enabling effective monitoring in areas where traditional networks are unavailable or ineffective. However, alongside these advantages, numerous technical challenges arise. These challenges include optimizing UAV flight routes to ensure maximum sensor network coverage, minimizing energy consumption, and addressing data security issues such as cyber threats. Another important aspect is flight duration, which depends on UAV battery capacity and energy-saving methods for sensor nodes, especially through the use of alternative energy sources, such as solar panels. The study presents a model of dynamic interaction between UAVs and a sensor network, examining the process of data collection, and transmission to a central server, and the impact of increasing the number of sensor nodes on the overall mission time. A stochastic model is proposed to account for environmental heterogeneities, such as data transmission delays caused by obstacles or changes in connection speed. An analysis is conducted to evaluate the impact of these factors on data collection efficiency and to optimize flight routes, with a focus on dynamic programming algorithms and heuristic methods.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Unmanned aerial vehicles (UAVs) are increasingly being used in various fields of human activity. For example, in agriculture, GPS-guided UAVs are employed for spraying crops in the fields. The use of UAVs significantly saves resources (such as time and chemicals) and ensures accurate and precise treatment of agricultural lands compared to manned aviation <ref type="bibr" target="#b0">[1]</ref>.</p><p>In some European Union countries, drones are even used for customer deliveries. During military conflicts and wars, UAVs are utilized for delivering medications, humanitarian aid, and combat supplies to hard-to-reach areas. Certain drone models are also employed to inspect power lines, transformers, and pipelines <ref type="bibr" target="#b1">[2]</ref>.</p><p>Emergency services deploy drones for monitoring, forecasting, and controlling hazardous sites, contributing to both safety and environmental protection. In particular, UAVs can serve as platforms for meteorological measurement systems.</p><p>They have advantages over fixed-wing UAVs, whose high speed limits spatial and temporal resolution, making them less sensitive to turbulent processes <ref type="bibr" target="#b2">[3]</ref>.</p><p>Today, relatively affordable multicopters are available, capable of lifting payloads of 3-5 kg to altitudes of 2-4 km with flight durations of 30-40 minutes. Modern UAVs, equipped with onboard navigation and control systems, perform a wide range of functions. For example, UAVs can be programmed with fixed flight routes (using coordinates, altitude values, and specific waypoints) and can change their routes or return to the starting point upon command from the ground control station. Additionally, UAVs can fly over designated points, collect and transmit telemetry information about flight parameters and the operation of target equipment, and provide software control for this equipment <ref type="bibr" target="#b3">[4]</ref>. 0000-0003-4164-0066 (N. Dovzhenko); 0000-0002-6408-443X (Y. Ivanichenko); 0000-0002-7775-6039 (P. Skladannyi); 0000-0002-7253-5990 (O. Zhyltsov) Moreover, modern UAVs are actively integrated into fields such as environmental monitoring, terrain mapping, and construction. Drones are also used in search and rescue operations and to assess agricultural land conditions. Advancements in artificial intelligence, sensor networks, and microchips have significantly improved the autonomy and accuracy of UAV flights, making them indispensable across many industries. This enables greater mobility and efficiency in operations while maintaining relatively low operational costs for UAVs <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Evolution, classification, and modern applications of unmanned aerial vehicles</head><p>Research in the field of unmanned aerial vehicles (UAVs) has a long and rich history. It began during World War I, in 1917-1918, with developments in the United States and the United Kingdom. One of the prototypes, the Kettering Bug, was an early cruise missile with a simple control system that allowed it to fly along a predetermined route. Another example, is the Aerial Target, an unmanned aircraft controlled via radio, which was developed for anti-aircraft artillery training. Although the project faced numerous technical limitations and was ultimately unsuccessful, it laid the foundation for further advancements in aviation.</p><p>During World War II, the German army deployed the first attack unmanned aerial vehicle (UAV)-the V-1 flying bomb. Later, researchers classified this aircraft, and its predecessors, as cruise missiles rather than conventional UAVs. However, it is important to note that their characteristics laid the groundwork for modern UAVs, particularly in terms of autonomy and the ability to accurately reach targets without a pilot.</p><p>From the 1950s to the 1970s, significant scientific research and development were conducted in the field of combat UAVs, particularly in versions capable of flying at high altitudes, remaining airborne for extended periods, and conducting surveillance. UAVs such as the Ryan Firebee, AQM-34 Ryan Model 147, and Teledyne Ryan AQM-91 Firefly were not only used for reconnaissance and training tasks but also represented advancements in remote control technologies that eventually became fully operational combat platforms.</p><p>Modern drones are used not only for military purposes, reconnaissance, and precision strikes but also for civilian tasks, such as search and rescue operations, infrastructure monitoring, agriculture, environmental monitoring, and cybersecurity. UAVs such as the RQ-1 Predator, MQ-9 Reaper, DJI Phantom, MQ-25 Stingray, Bayraktar TB2, Hermes 900, Wing Loong II, XQ-58A Valkyrie, and others have significantly expanded their capabilities thanks to the continuous development of artificial intelligence technologies, improvements in computing power, and the implementation of sensor systems <ref type="bibr" target="#b5">[6]</ref>.</p><p>Analyzing the existing varieties of unmanned aerial vehicles, they can generally be classified by their structural features. For example:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Small UAVs are typically built based on classic aerodynamic designs, with variations such as "flying wings". These aircraft usually have highmounted wings, often in a V-shape, with electric motors. They may also feature more complex fuselage designs-from gondolas to single-fuselage solutions. They are equipped with piston engines and typically take off from specially designed launch platforms. Their landing is accomplished either by parachute or via traditional aircraft methods. The advantage of such drones is their ability to perform much longer and more complex missions, remaining airborne for up to 5 hours.  Medium UAVs have heavier landing gear and more complex takeoff and landing systems, which are more similar to traditional aviation principles. These drones can perform long-duration flights (approximately up to 20 hours) and can ascend to altitudes of up to 6 kilometers.  Heavy UAVs are designed as "air giants" compared to other UAVs. They can reach altitudes of up to 20 kilometers and remain airborne for more than 24 hours. The construction of such UAVs involves the use of sufficiently complex and powerful engines and landing gear, making them effective for strategic missions and multifunctional tasks.</p><p>It is also appropriate to classify UAVs by weight, as this represents a separate classification for determining the capabilities of such devices. Small UAVs (weighing up to 5 kg) can perform short-term reconnaissance missions, such as target detection in hard-to-reach areas. Research indicates the potential for the weight of heavy UAVs to increase to 15 tons in the coming decades <ref type="bibr" target="#b6">[7]</ref>.</p><p>These options will be capable of performing strategic functions, combining reconnaissance, monitoring, and the management of a large amount of equipment for various tasks <ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Technical aspects of integrating sensor networks and UAVs</head><p>The world of the Internet of Things (IoT) is broad and multifaceted, encompassing a wide range of industries, each with its own unique features and technological requirements. However, it is more appropriate to view IoT not as a single technological domain, but as a combination of different concepts, protocols, and technologies that vary depending on the application.</p><p>Sensor networks are a key component of IoT, providing monitoring of physical parameters of the environment. Due to limited resources and the need to operate in harsh conditions, these networks often face challenges such as node failures and malfunctions, leading to new issues, particularly in scaling the network to accommodate large numbers of connected devices, processing large volumes of data, and ensuring security.</p><p>Therefore, a logical step in the development of these technologies is the integration of UAVs with sensor networks, opening up new possibilities for efficient data collection, monitoring, and management in various areas of human activity, including the deployment of "smart" cities, environmental monitoring, critical infrastructure systems, cybersecurity, and even military applications.</p><p>One of the main advantages of using UAVs as mobile base stations is the improvement of communication between sensor nodes and drones, reducing signal loss, increasing the likelihood of direct line of sight, and, most importantly, decreasing the energy consumption of sensor resources. It is worth noting that sensor networks consist of hundreds or thousands of nodes that collect, process, and transmit data to central servers or cloud platforms using wireless communication protocols for further analysis.</p><p>Therefore, reducing energy consumption is especially important for nodes with low battery power, as it helps extend their operational life <ref type="bibr" target="#b8">[9]</ref>.</p><p>To ensure effective data collection and transmission between UAVs and sensor nodes, technologies such as LoRaWAN, Zigbee, and 5G are used.</p><p>For comparison, LoRaWAN and Zigbee provide stable communication in difficult conditions with low power consumption, extending the operational life of the sensors.</p><p>5G technology enables the transmission of large amounts of data in real time and ensures low latency, which is critical for tasks that require an immediate response.</p><p>Additionally, drones can be used to install sensor nodes in hard-to-reach or dangerous locations for humans, such as disaster zones, mountainous regions, seismically active areas, or sites of industrial accidents. In this case, the use of UAVs as mobile platforms for sensor networks allows for flexible positioning, data collection, and preliminary processing over large areas, providing continuous monitoring and rapid response to real-time changes <ref type="bibr" target="#b9">[10]</ref>.</p><p>Another key aspect of integrating sensor networks and UAVs is the optimization of drone flight paths to ensure maximum sensor network coverage while minimizing energy consumption. Key parameters that affect the efficiency of data collection include flight speed, distance to sensor nodes, transmitter power, flight altitude, and more.</p><p>The use of dynamic programming, heuristic algorithms, and machine learning methods enables the real-time optimization of drone routes, improving the performance of the data collection system and reducing the likelihood of errors or failures.</p><p>However, one of the biggest challenges remains the limited capacity of drone batteries, which determines their capabilities and flight duration. Due to several factors, lithium-ion batteries remain the most efficient; however, the issue of limited energy forces the search for new approaches and solutions. For example, new types of batteries, fuel cells, or hybrid power sources may be considered for drones. For sensor nodes, solar panels are used, reducing the frequency of recharging and ensuring continuous system operation. Energy-saving methods for sensor components, such as adaptive module shutdowns and optimization of data collection frequency, are also actively being researched <ref type="bibr" target="#b10">[11]</ref>.</p><p>Additionally, to ensure proper synchronization between sensor nodes and drones, especially in complex or dynamic environments, special routing algorithms, and dynamic data correction are used. Reliable synchronization is critically important to prevent data loss and ensure the stable operation of the entire system.</p><p>It is also worth noting the importance of cybersecurity, which is another key aspect of integrating UAVs and sensor networks. The use of modern encryption and authentication mechanisms helps prevent unauthorized access to data, which is especially important for military and industrial applications <ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Model of dynamic interaction between UAVs and sensor networks</head><p>The integration of UAVs and sensor networks offers vast opportunities to improve efficiency and security in many sectors, but it also requires addressing several technical challenges to ensure the stable and reliable operation of such systems.</p><p>A model of the dynamics of data collection and interaction between UAVs and a sensor network is proposed, based on a specific scenario. In this scenario, the drone flies over several sensor nodes, collecting data from them and transmitting it to a central server. For modeling this process, a sensor network consisting of 50, 100, 200, or 500 nodes is considered. The time for data collection, data transmission, and command processing is also taken into account.</p><p>For example, the flight time to the sensor network nodes is determined by formula (1) and depends on the distance between the sensor nodes and their quantity.</p><formula xml:id="formula_0">𝑡 = ,<label>(1)</label></formula><p>𝑑 is the distance between sensor nodes (e.g., 100 m), 𝜐 is the speed of the drone (for example, 10 m/s). If the number of nodes increases but the area size remains unchanged, the distance between the nodes decreases proportionally. This, in turn, will affect the flight time, reducing it, but increasing the number of nodes the drone interacts with and connects to <ref type="bibr" target="#b12">[13]</ref>.</p><p>The total interaction time between a sensor node and the drone is calculated as follows:</p><formula xml:id="formula_1">𝑡 = 𝑡 + 𝑡 + 𝑡 , (<label>2</label></formula><formula xml:id="formula_2">)</formula><p>where 𝑡 is time for data collection from a single node, 𝑡 is time for data transfer from a single node, and 𝑡 is flight time. The data transfer rate is determined as follows:</p><formula xml:id="formula_3">𝑡 = ,<label>(3)</label></formula><p>where 𝑅 is data volume from one node (for example, 10 MB), and 𝑆 is transfer speed (for example, 1 Mbit/s).</p><p>To formulate the mathematical model of the interaction between sensor nodes and UAVs (drones) in such a scenario, a system of equations can be used to describe the process of data collection, transmission, and processing from sensors, taking into account discrete time intervals.</p><p>The model will be based on stochastic process concepts to simulate random delays and heterogeneities <ref type="bibr" target="#b13">[14]</ref>.</p><p>The model for drone data collection and transmission can be described as a discrete process that defines the change in system state at the time 𝑡 , when the drone moves between sensors and collects information: 𝑋 , = 𝑋 , + 𝜇 , 𝐿 , (𝑋 , 𝜉 , ), (4) where 𝑋 , is the volume of collected data at a given time 𝑡 , 𝜇 , is discretization step parameter, which regulates data state changes, 𝐿 , (𝑋 , 𝜉 , ) is a function that describes the process of data collection and transmission from sensor node 𝑖 under certain conditions, 𝜉 , is models random delays or other changes in the system.</p><p>For a system with 𝑁 sensor nodes, the total data collection time will be defined as: 𝑇 = 𝑁 * 𝑡 , (5) where 𝑁 is the number of sensors, and 𝑡 is the total interaction time with one sensor node.</p><p>The overall interaction time of the drone with the sensor network increases almost linearly with the number of sensor nodes, as shown in Fig. <ref type="figure" target="#fig_0">1</ref>.</p><p>Each additional sensor node increases the total mission time due to the time required for flight, data collection, and data transmission to the gateway or server.</p><p>With a significant increase in the number of sensor nodes, optimization strategies should be considered, such as using multiple drones in parallel, dividing areas of responsibility, or using faster data transmission channels.</p><p>To optimize the route between sensor nodes, graphbased approaches or the traveling salesman problem can be used, where the drone must find the most efficient route that minimizes the distance between nodes.  <ref type="figure" target="#fig_0">1</ref>, it can be observed that as the number of sensors increases, the total time increases linearly, as the drone needs more time to fly over all the sensors, collect data, and transmit it to the server.</p><p>However, the presented calculations do not always reflect realistic scenarios. In real-world conditions, heterogeneities may arise, such as delays due to obstacles (e.g., trees, buildings, or other objects that may slow down the drone or cause additional energy expenditure), changes in data transmission speed (sometimes the speed may fluctuate due to interference, the distance between drones and the server, etc.), or variations in flight time due to differing distances between sensors (sensors may be distributed unevenly), and so on.</p><p>To account for such heterogeneities, random delays or variables can be added to the flight time, data collection, and information transmission time, for example:</p><formula xml:id="formula_4">𝑡 = 𝑑 𝜐 + 𝜖 ,<label>(6)</label></formula><p>where 𝜖 is a random value of delay or change that creates heterogeneity. It can be argued that adding random variations in time simulates real conditions, where delays due to obstacles or changes in data transmission speed may occur <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Data Security Challenges in UAV-Integrated Sensor Networks</head><p>Since sensor networks and their components are often deployed in uncontrolled or insufficiently protected physical environments, especially in the case of integration with UAVs, it is crucial to pay particular attention to the impact of attacks and threats on both individual nodes/sensors and drones. Due to the numerous advantages of UAVs interacting with sensor nodes, there is an increased risk of unauthorized access, data manipulation, or modification, as well as heightened vulnerability to the compromise of nodes and drones through physical access to network elements. In such cases, malicious software can be implanted, potentially compromising the integrity and confidentiality of the processed information. The aforementioned threats jeopardize not only individual network components but also the security of the entire system <ref type="bibr" target="#b15">[16]</ref>.</p><p>Today, there is a broad range of threats and types of attacks that can target sensor networks, occurring at various levels. One of the most common types of attacks is jamming, aimed at introducing additional noise and interference in the physical channel for wireless signal transmission, which can disrupt the correct interaction between nodes and UAVs. Other common threats include physical interference with network operations, sensor spoofing, or attacks on information leakage through direct access to network components. Such threats may lead to unpredictable consequences, including modification, delay, or loss of data sent to gateways, routers, or central servers, potentially causing misinformation or improper data processing.</p><p>For instance, at the link layer, a significant threat includes collision attacks, where identical frequency channels are used. Such attacks lead to resource depletion of nodes by forcing them to repeatedly retransmit damaged or lost packets to recipient nodes, ultimately negatively affecting network performance. When interacting with UAVs, these attacks can trigger excessive energy consumption by nodes, reducing the overall system uptime and increasing the risk of node disconnections from the network.</p><p>At the network level, attackers can alter or spoof routing data, redirecting legitimate traffic to compromised nodes. An example is the Black Hole attack, in which a node intercepts data and does not forward it, creating a "black hole" in routing. Another example is the Selective Forwarding attack, where a malicious node selectively forwards only part of the packets, ignoring the rest. During interactions with UAVs, these attacks can cause serious disruptions in data delivery and negatively affect the timeliness of data receipt.</p><p>Additionally, sensor networks are vulnerable to eavesdropping and traffic analysis attacks, which allow attackers to access confidential information, modify it, or alter it for further attacks on the network. To mitigate risks associated with these threats, robust encryption and authentication methods must be employed to protect data transmitted between UAVs and sensor nodes.</p><p>Thus, ensuring the security of sensor network components, especially when used in conjunction with unmanned aerial vehicles (UAVs), is a highly challenging task due to the limited resources of each sensor. The constrained processing power, memory, and energy resources of sensor nodes create challenges for effective encryption key management, which is essential for data protection.</p><p>Modern strategies require the development of distribution and key-update mechanisms that can adapt to rapid network topology changes while maintaining a high level of security amidst constant UAV interaction. It is worth emphasizing that the dynamic nature of this topology also places additional demands on the speed of adaptation of security mechanisms.</p><p>As the number of sensor nodes increases, the load on data storage and transmission systems also rises, complicating security maintenance. The use of data compression technologies and selective data transmission algorithms can optimize network performance, reducing the volume of transmitted data and thereby shortening the period during which the network remains vulnerable to attacks.</p><p>However, resource limitations necessitate additional approaches to achieve comprehensive protection for sensor networks and UAVs.</p><p>To ensure protection at every level of the system, it is crucial to enable interaction between security mechanisms. For instance, effective energy resource management at the channel level can significantly reduce vulnerability to resource-depleting attacks, such as Denial of Service (DoS) attacks. For this purpose, it is beneficial to implement strengthened authentication and encryption protocols that provide additional protection against unauthorized access at the physical and network levels.</p><p>Modern encryption methods and advanced security algorithms at the network level allow for the prevention of routing data spoofing and protect the system from Black Hole and Selective Forwarding attacks. At the transport level, Flooding attacks and similar strategies targeting the depletion of node memory and computational resources represent another threat that must be taken into account.</p><p>Additionally, the threat of synchronization attacks should be considered, as such intrusions can disrupt data transmission and interfere with coordinated operations between sensors and UAVs.</p><p>In addition to the core information security goals (confidentiality, integrity, and availability), sensor networks also require secondary security objectives, such as data relevance, network self-organization capabilities, time synchronization, as well as node tracking and security incident localization. In the case of UAV integration, these aspects become critically important, as the constant movement of drones imposes additional requirements on the system's response time to potential threats.</p><p>Therefore, ensuring the security of wireless sensor networks when used with UAVs demands a comprehensive approach that includes multi-level protection against various types of attacks, adaptive resource management, and continuous improvement of security mechanisms to effectively counter emerging cyber threats <ref type="bibr" target="#b16">[17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>The integration of unmanned aerial vehicles (UAVs) with sensor networks opens new opportunities for efficient data collection and transmission across various industries, particularly in remote and hard-to-reach locations. The results presented in this study indicate that such integration significantly enhances the quality of real-time monitoring and process management.</p><p>The proposed mathematical model describes a linear increase in total mission time as the number of sensor nodes grows, underscoring the need for optimizing UAV flight routes. Such optimization reduces interaction time with sensor nodes and improves data collection efficiency.</p><p>The study also examines the implementation of alternative power sources, such as solar panels for sensor nodes and hybrid batteries for UAVs. These solutions positively impact the system's continuous operation time and extend flight durations.</p><p>Additionally, special attention is given to data security, as the use of UAVs increases the risk of unauthorized access, manipulation, and attacks on the sensor network. Implementing multi-level protection mechanisms, adaptive resource management, and advanced encryption methods ensures data protection and system stability amid continuous UAV interactions.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Dependence of total data collection time on the number of sensor nodes From Fig.1, it can be observed that as the number of sensors increases, the total time increases linearly, as the drone needs more time to fly over all the sensors, collect data, and transmit it to the server.However, the presented calculations do not always reflect realistic scenarios. In real-world conditions, heterogeneities may arise, such as delays due to obstacles (e.g., trees, buildings, or other objects that may slow down the drone or cause additional energy expenditure), changes in data transmission speed (sometimes the speed may fluctuate due to interference, the distance between drones and the server, etc.), or variations in flight time due to differing distances between sensors (sensors may be distributed unevenly), and so on.To account for such heterogeneities, random delays or variables can be added to the flight time, data collection, and information transmission time, for example:</figDesc><graphic coords="4,73.68,323.28,214.56,164.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Dependence of total data collection time on the number of sensor nodes, considering heterogeneities in flight, data collection, and transmission times Fig. 2 shows the heterogeneities accounted for in the time for flight, data collection, and transmission.It can be argued that adding random variations in time simulates real conditions, where delays due to obstacles or changes in data transmission speed may occur<ref type="bibr" target="#b14">[15]</ref>.</figDesc><graphic coords="4,304.32,71.76,235.68,160.32" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">An Adaptive and Automatic Power Supply Distribution System with Active Landmarks for Autonomous Mobile Robots</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.3390/s24186152</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Methodology to Monitor Urban Expansion and Green Space Change Using a Time Series of Multi-Sensor SPOT and Sentinel-2A Images</title>
		<author>
			<persName><forename type="first">J</forename><surname>Deng</surname></persName>
		</author>
		<idno type="DOI">10.3390/rs11101230</idno>
	</analytic>
	<monogr>
		<title level="j">Remote Sens</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">1230</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing</title>
		<author>
			<persName><forename type="first">N</forename><surname>Dovzhenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems II</title>
		<imprint>
			<biblScope unit="volume">3550</biblScope>
			<biblScope unit="page" from="275" to="280" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">AI for UAV-Assisted IoT Applications: A Comprehensive Review</title>
		<author>
			<persName><forename type="first">N</forename><surname>Cheng</surname></persName>
		</author>
		<idno type="DOI">10.1109/JIOT.2023.3268316</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">P</forename><surname>Valavanis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Vachtsevanos</surname></persName>
		</author>
		<title level="m">Handbook of Unmanned Aerial Vehicles</title>
				<imprint>
			<publisher>Springer Publishing Company, Incorporated</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Maddalon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Perspectives on Unmanned Aircraft Classification for Civil Airworthiness Standards</title>
		<imprint>
			<biblScope unit="page" from="F1676L" to="16131" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Micro Aerial Vehicle networks: An Experimental Analysis of Challenges and Opportunities</title>
		<author>
			<persName><forename type="first">M</forename><surname>Asadpour</surname></persName>
		</author>
		<idno type="DOI">10.1109/MCOM.2014.6852096</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Magazine</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="141" to="149" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Method of Sensor Network Functioning under the Redistribution Condition of Requests between Nodes</title>
		<author>
			<persName><forename type="first">N</forename><surname>Dovzhenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="278" to="283" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mozaffari</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMST.2019.2902862</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="2334" to="2360" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Smart Sensors and Standard-based Interoperability in Smart Grids</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Y</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Fitzpatrick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">B</forename><surname>Lee</surname></persName>
		</author>
		<idno type="DOI">10.1109/JSEN.2017.2729893</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Sensors J</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">23</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Signaling Strategies for Dualfunction radar Communications: An Overview</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hassanien</surname></persName>
		</author>
		<idno type="DOI">10.1109/MAES.2016.150225</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Aerospace and Electronic Systems Magazine</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="36" to="45" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>Beard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">W</forename><surname>Mclain</surname></persName>
		</author>
		<idno type="DOI">10.1515/9781400840601</idno>
		<title level="m">Small Unmanned Aircraft: Theory and Practice</title>
				<meeting><address><addrLine>Princeton, NJ, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Princeton Univ. Press</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Joint radar communication system design based on filter bank multicarrier modulation scheme</title>
		<author>
			<persName><forename type="first">G</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1049/rsn2.12323</idno>
	</analytic>
	<monogr>
		<title level="j">IET Radar, Sonar &amp; Navigation</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Autonomous Vehicle Technologies for Small Fixed-Wing UAVs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Beard</surname></persName>
		</author>
		<idno type="DOI">10.2514/1.8371</idno>
	</analytic>
	<monogr>
		<title level="j">J. Aerospace Comput. Inf. Commun</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="92" to="108" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Development of a hybrid network traffic load management mechanism using smart components</title>
		<author>
			<persName><forename type="first">O</forename><surname>Barabash</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 7 th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="38" to="41" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Analytical Assessment of Security Level of Distributed and Scalable Computer Systems</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Intelligent Systems and Applications</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="57" to="64" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Zabezpechennia nadiinosti ta bezpeky u suchasnykh bezprovodovykh sensornykh merezhakh na osnovi vprovadzhennia metryky RSSI</title>
		<author>
			<persName><forename type="first">P</forename><surname>Openko</surname></persName>
		</author>
		<idno type="DOI">10.33099/2786-7714-2024-1-6-131-136</idno>
	</analytic>
	<monogr>
		<title level="j">Povitriana mits Ukrainy</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="131" to="136" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
