Token Based K-Mutual Exclusion For MultiUAV Fanet
Token Based K-Mutual Exclusion For MultiUAV Fanet
https://doi.org/10.1007/s11277-022-09886-6
Abstract
Mutual exclusion is a well-studied topic in distributed systems. A distributed system with
the duplicate copy of resources can increase throughput by allowing many processes to
call their critical sections simultaneously through parallel execution. Because of the ongo-
ing development of wireless technologies and dynamic networks such as mobile ad hoc
networks, they are becoming increasingly complicated and varied in today’s world. Fly-
ing ad hoc network (FANET), as a special variant of mobile ad hoc network, has nodes in
which the cooperation and collaboration are highly dynamic and unpredictable in nature.
In FANET, resources are mounted on an unmanned aerial vehicle (UAV) which can oper-
ate remotely with a flying capacity in the air without any human personnel. Various pro-
tocols as distributed mutual exclusion algorithms have been proposed as a solution to the
mutual exclusion problem in a distributed system. To the best of our knowledge, such algo-
rithms in FANETs haven’t been exposed much and moreover through this paper, we pre-
sent a novel token-based k mutual exclusion algorithm as mutual exclusion algorithm for
flying network-multi UAV with its correctness proof and fault handling capabilities. To
improve overall throughput as compared to single-UAV FANET, our approach works in a
multi resource occupied flying environment and allows k duplicated resources mounted on
available UAVs that facilitate processes at most k to invoke their critical sections simulta-
neously. This solution is also fault-tolerant to UAV failure in the system, whereas in sin-
gle-UAV FANET, this considers a failure of the entire system. We have also presented sim-
ulation results for our algorithm with range of 5–20 resource-equipped UAVs architecture
support that indicate more efficient results for performance throughput metric.
13
Vol.:(0123456789)
3694 A. S. Parihar, S. K. Chakraborty
1 Introduction
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3695
• Simulation setup and execution for the suggested art-of-study and evaluation of various
performance measures such as message complexity, throughput, synchronization delay
and response time.
In this section, FANET [7] has been discussed. MANET is a special variant of ad hoc net-
work and FANET is classified as a sub-variant of MANET in which resources are on UAV.
UAV has the capacity to operate remotely and fly in the air autonomously without any
human personnel. FANET based on multi-UAV systems, has an advantage over the sin-
gle-UAV systems in terms of cost, scalability, survivability, and speed-up. An instance of
single-UAV FANET and Multi-UAV FANET can be seen in Fig. 1, in which circular parts
indicate the communication range of UAV. Although due to the highly dynamic behavior
of nodes in the FANET, the communication between the nodes is complex for the estab-
lishment of collaboration and cooperation between them in both single-UAV and multi-
UAV FANETs. FANET is considered as in-infrastructure if all the UAVs are connected to
any ground base and can be applicable in single-UAV FANET. Such FANET has a restric-
tion like limited range, bounded speed and dependency on ground base over the UAV-UAV
communication-based FANET. A detailed characteristic comparison between various vari-
ants of ad hoc networks is presented in Table 1.
Nowadays due to the versatile nature of UAVs, they have a huge application in the field
of defence, monitoring, transportation, spying and civilian. The communication coverage
13
3696 A. S. Parihar, S. K. Chakraborty
3 Literature Survey
Mutual exclusion in a distributed system is a highly researched area. Walter et al. [27] pre-
sented the first token-based DME algorithm as a reverse link (RL) in which the location
of system nodes is mobile. Communication among nodes is possible directly or through
some intermediate nodes where transmission range is the deciding factor by considering a
directed acyclic graph (DAG) as an underlying network topology. They used bidirectional
links for signal passing and eliminated the concept of node failure and network partition in
their discussion. They claimed better results as compared to Raymond [38]. Another token-
asking algorithm as ad hoc distributed mutual exclusion (AHDME) algorithm, is presented
by Zheng et al. [39], in which they incorporated concepts to finalize the CS request priori-
ties of nodes. The concepts of distributed and centralized DME schemes are integrated by
Bharti et al. [41] for mobile networks. The subdivision of these networks is formed into
the number of clusters in such a way that the overall system can be realized as inter-cluster
(Ie_C) and each sub-cluster is observed as intra-cluster (Ia_C). Ia_C of the network used
the centralized token passing scheme, while the distributed scheme took place in Ie_C.
Various fault-tolerant capabilities like- loss of token and failure of nodes are discussed
through their methodology. To serve any CS request of node, their approach used the token
circulation scheme and maintained a unique token at the Ie_C level. Each Ia_C had its local
token. Therefore solution can also be treated as a dual token-based approach. Cluster head
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3697
(CH) had been elected at every level of Ie_C and Ia_C through which transmission of the
token occurred. By considering K number of cluster heads and M number of nodes, their
proposed work has a message complexity as O(K) and O(1/M) in low and high load situa-
tions in the network.
As a mobile resource mutual exclusion (MRME) approach, Khanna et al. [42] presented
the first token-based system to enable resource sharing in FANET. They demonstrated the
success of their method by displaying the message complexity as O(N) and the synchro-
nization delay as T, as well as its fault tolerance. Each node has a unique identifier and
can be in one of four states: reminder (REM), critical section (CS), requesting for token
(REQ), and HOLDING the token (HI), according to their algorithm methodology. At first,
the node with the lowest identifier is the token-holder node, broadcasting token informa-
tion to its neighbors (nodes that are in the range of UAV). Khanna et al. [43] developed the
local mutual exclusion (LME) idea in FANETs as request collector local mutual exclusion
(RCLME) with fault-tolerant token loss capability. In LME, more than one neighboring
node is not permitted to enter its CS. By presenting the LME notion in FANETs, they
claimed their work was novel. RCLME is primarily a solution based on leader election, in
which a leader is chosen using fuzzy logic that considers a variety of system criteria such
as link quality and speed among nodes, shared resource distance, and so on (Table 2).
Multi-UAV FANET based distributed system containing N number of mobile nodes with
unique identifiers has been shown in Fig. 2 in which the communication range of UAV is
represented by a circular area as neighborhood [45] of UAV. Total k replicas of a resource
are available in the system and mounted on each UAV. Initial assumptions are as follows:
Assumption 1 The number of UAVs, resource replicas and tokens are k in the case of
k-UAV FANET.
Assumption 3 Nodes available within the neighborhood of any UAV can access the
shared resource mounted on the same UAV, but not from the other UAVs.
Assumption 4 In each neighborhood of UAV, a unique token exit and the node that have
the token can’t leave the neighborhood i.e., the token can’t go outside of the UAV neigh-
borhood with token.
Assumption 6 The token holder node can invoke its CS and at the same time, more than
one token holder nodes can invoke their CS belonging to a different UAV neighborhood.
13
3698
13
Table 2 Characteristics comparison between various variants of ad hoc network
DME algorithm Network topology Publisher Message Complexity Synchroni- Fault-tolerant capabilities
zation delay
Worst Case Best Case Token Loss Node Loss Network
Link
Loss
Notation
N: Total number of nodes in model
T: message propagation delay
α(ω): Time unit in average for next CS request generation by a node
ON: Opportunistic networks
A. S. Parihar, S. K. Chakraborty
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3699
4.1 Proposed Algorithm
Here in this section, we present our token-based k mutual exclusion algorithm for multi-
UAV FANET as mutual exclusion algorithm for flying network-multi-UAV (MEAFN-
MUAV). This solution works in a multi-UAV FANET environment and allows k dupli-
cated resources mounted on available UAVs that facilitate processes at most k to invoke
their CS simultaneously. Firstly, we provide the data structures and various messages
used by MEAFN-MUAV and then we discuss its corresponding working algorithms
(Sect. 4.1.3: Algorithm 1–7).
• Token_Holderi Contains the token holder identifier corresponding to its UAV neigh-
borhood.
• Previousely_Token_Holderi Contains the previous token holder identifier corre-
sponding to its UAV neighborhood.
• CS_Request_Queuei List of pending CS requests of nodes in terms of their identi-
fiers.
• CS_Executingi Boolean variable as T or F indicating the node’s CS executing state.
13
3700 A. S. Parihar, S. K. Chakraborty
• Have_Token(i) Token holder node (say, Nodei) broadcasts this message to its UAV
neighborhood nodes to inform them that it has the token. While receiving this mes-
sage, each node updates its Token_Holder variable.
• Ask_CS(i) Message generated by Nodei for asking a token and sent to token holder node
using its Token_Holder variable.
• Previousely_Have_Token(i) Token holder node (say, Nodei) broadcasts this message to
its UAV neighborhood nodes just before sending the token to the next token asking
node. While receiving this message, each node updates its Previousely_Token_Holder
variable.
• Update_Your_Queue(CS_Request_Queuei) The message is sent from the current token
node to the next token asking node and contains the CS_Request_Queue of the current
token holder node. While receiving this message, the node updates its CS_Request_
Queue variable with the incoming CS_Request_Queue along with the message param-
eter.
• Hello_Message() The formal message is sent between two nodes to ensure whether the
receiving node is alive or in a range of UAV neighborhoods.
• Create_Token(i) Message generated and sent by any arbitrary node in the system ask-
ing for CS to the previous token holder node. While receiving this message, the node
creates a copy of the token from the token’s replica and becomes the new token holder.
• Get_Me_Info(i): Newly joined Nodei to any UAV neighborhood broadcast this message
to the rest of the nodes. Only the token holder node responds to this message along
with its Token_Holder and Previousely_Token_Holder data to the originator node of
this message. Nodei updates its Token_Holder and Previousely_Token_Holder based on
the information received from the token holder node.
4.1.3 MEAFN‑MUAV Algorithm
We start our discussion with a formal description of the proposed algorithm, namely as
MEAFN-MUAV. In the very first phase of its Initialization (Algorithm 1–2), our solution
felicitates initial values to various data structures at each node and broadcasts token-
holder node information to every UAV neighborhood as one unique token-holder node
exists in each UAV neighborhood (Assumption 4). Each node updates its Token_Holder
with the token-holder node’s identifier belonging to the corresponding neighborhood
of UAV in the system. In the second phase as CS_Asking (Algorithm 3), whenever any
node, say Nodek demands its CS to invoke, it sends a Hello_Message() message to the
token-holder node say Nodel, that is unique to its neighborhood to confirm its aliveness.
After receiving an acknowledgment from Nodel, Nodek sends a Ask_CS(k) to Nodel. If
the token is idle at Nodel, Nodel sends the token to Nodek after creating a replica of the
token and becomes the previous token-holder node for the corresponding UAV neigh-
borhood in case to handle token loss, add the incoming request into its CS_Request_
Queuel otherwise. The third phase as CS_Release (Algorithm 4) explains the working
scenario of CS release by token-holder node. When the token-holder node releases its
CS then it fetches the next CS asking request from its CS_Request_Queue and sends the
token towards that node by confirming its existence using Hello_Message() along with
Update_Your_Queue(CS_Request_Queue) message. In case the CS_Request_Queue of
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3701
the token-holder node is empty, then the algorithm remains idle. Any node, after receiv-
ing the token, broadcasts its information to the rest of the nodes belonging to the same
UAV neighborhood (Algorithm 5). Since in FANET, the movements of nodes are highly
unpredictable, algorithm effectively handles such cases where any node leaves or join
any UAV neighborhood (Algorithm 6–7).
13
3702 A. S. Parihar, S. K. Chakraborty
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3703
Case 1 (Node doesn’t belong to any UAV neighborhood) Node failure in such case has
no impact on the system because the node doesn’t belong to any UAV neighborhood that
can’t participate in DME (Assumption 7) and also, such node failure can’t be responsible
for the token loss as per Assumption 4.
Case 2 (Node belong to any of the UAV neighborhood)-
Case i (Node is not a token holder node)
Case a (Node has the pending CS request in token holder node queue): In this case,
whenever the node turn comes for getting the token from the token holder node,
the token holder node simply identifies this node as dead using the Hello_Mes-
sage() and ignore the CS request.
Case b (Node doesn’t have any pending CS request in token holder node queue):
Such a case has no impact on the system; hence no action is required.
Case ii (Node is a token holder node): In such a case, MEAFN-MUAV becomes a
self-stabilizing algorithm whenever any new CS request comes into the system (in a
UAV neighborhood) and generates a new token within the UAV neighborhood.
Theorem 4.2.2 MEAFN-MUAV handles token loss.
Proof Loss of token in the system occurs either in the failure of the token holder node
within the UAV neighborhood or the token holder node about to leave the UAV neighbor-
hood. In both cases, the proposed solution behaves as a self-stabilizing algorithm. (Theo-
rem 4.2.1, Case 2 (ii)).
Proof Any UAV failure in the system also destroys the corresponding resource and token
(Assumption 4). Such failure of UAV only impacts the corresponding neighborhood nodes
participating in DME till the time they haven’t joined the new UAV neighborhood and
doesn’t have an impact on the rest of the system.
5 Correctness Proof
Theorem 5.1 Mutual exclusion is guaranteed in every UAV neighborhood and at most k
nodes are allowed to invoke their CS in the entire system i.e., MEAFN-MUAV supports
safety.
Proof By contradiction, to support such a statement, two or more nodes must be in their
CS and there must be more than one token exit in every UAV neighborhood. In such a
case before invoking the CS, nodes send Ask_CS() message to their Token_Holder vari-
able which contains the node identifier of token holder node. Having more than one token
within a UAV neighborhood implies more than one entry in Token_Holder variable. Now
since Token_Holder variable is a single-valued attribute that is updated by broadcasting
Have_Token() message by token holder node (Sect. 4.1.3, MEAFN-MUAV Initialization
(For each Nodei)). Observing a contradiction exists that proves our initial assumption that
two or more nodes must be in their CS and there must be more than one token exit in every
UAV neighborhood is false. Also, our Assumption 4 supports unique token existence in
13
3704 A. S. Parihar, S. K. Chakraborty
every UAV neighborhood. Extending the same to the entire k-UAV FANET with k dupli-
cate resources mounted on each UAV, at most k nodes belonging to different UAV neigh-
borhoods can invoke their CS simultaneously.
Theorem 5.2 Each CS request will be served in a finite time i.e., MEAFN-MUAV is free
from starvation.
For the simulation purpose, we have used The opportunistic network environment (The
ONE) simulator [46], which can generate node movement with various supported move-
ment models and also provide a graphical view of messages passing between the nodes
in a real-time system. In our simulation model, we create a multi-UAV FANET with 5
interconnected UAVs with transmitting speed of 10–20 mbps and transmitting range of
10 km. Each UAV has a buffer size of 1 gb and follows the ShortestPathMapBasedMove-
ment movement model to support a fixed range of movement. Firstly, we collect the various
message stats during our finite simulation time of 3600 s with 25 nodes having a transmit-
ting range of 800 m with RandomWaypoint movement model. The same can be seen in
Fig. 3a–d with different node moving speeds. With a continuous random number of mes-
sage packets, nodes within the system start their communication with message passing and
these messages are relayed over multiple internal nodes in the network as shown in Fig. 3a.
Also in Fig. 3b, with delivery probability in the range of 0.73–0.93, an average number of
hops are captured via sharing a message among two different nodes. Latency and buffer
time count can be seen in Fig. 3c, d. Sample instances of our simulator during this experi-
mental setup are available in Fig. 4a, b.
Secondly, while keeping all the basic configurations the same as earlier, we have con-
tinuously increased the number of nodes in the system. Figure 5 contains the various stats
(discussed earlier) while performing on such a simulation setup. Figures 6a, b are the
sample snapshot with 75 nodes with a moving speed of 40–50 m/s. Under such a simula-
tion model, few observations have been made. Average latency to the system is getting
decreased in both the cases of a higher number of nodes and as well as the higher node
movement. Message delivery probability lies in the range of 0.70–0.85 while the overhead
ratio is getting increased with a higher number of nodes and larger node movements.
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3705
Fig. 3 Various message stats with 5-UAV FANET system with different node movement speeds using The
ONE simulator. a Message packet counts. b Number stats. c Latency count. d Buffer time in seconds
6.2.1 Message Complexity
Let us discuss the total number of message exchanges during a CS invocation by any pro-
cess in all the aspects of best, average and worst-case by our algorithm. MEAFN-MUAV
has been organized in the form of Algorithm 1–7 (Sect. 4.1.3). In the best case, the token
holder node with no pending CS requests asks for the CS to invoke, hence requires no mes-
sage exchange and the node can enter its CS. The same case can be applied to each UAV
neighborhood and overall, this solution requires no message exchange in the best case.
In worst case, all existing nodes (say N) in the system can come within the communica-
tion range or neighborhood of a particular UAV, say UAVx and ask for the CS invocation.
With N node multi-UAV FANET, in such case, token holder node of UAVx contains all CS
requests in its CS_Request_Queue and the last CS request can be served after N message
exchanges. Hence overall message complexity of suggested work in worst case is O(N).
Likewise, average message complexity is the case where nodes are equally distributed in
all UAV neighborhoods and with the total number of M-UAVs in the system, this defines
message complexity as O(N/M) in the average case. Figure 7a–c represents average mes-
sage exchanges per CS execution by MEAFN-MUAV through our simulation setup (dis-
cussed in Sect. 6.1).
13
3706 A. S. Parihar, S. K. Chakraborty
Fig. 4 The ONE simulator snapshot of 5-UAV FANET with 25 nodes. a At simulation time = 0 s. b At
simulation time = 233 s
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3707
Fig. 5 Various message stats with 5-UAV FANET system with different node movement speed using The
ONE simulator. a Message packet counts. b Number stats. c Latency count. d Buffer time in seconds
6.2.2 Throughput
6.2.3 Synchronization Delay
Once the token holder node releases its CS, the total time required for the algorithm to
allow the next node to invoke its CS is the time required to propagate the message token
holder node to the next pending CS request node in CS_Request_Queue. Hence consider-
ing the message propagation delay as T defines synchronization delay in MEAFN-MUAV
also T.
This research paper presents a token-based k mutual exclusion algorithm for multi-
UAV FANET as mutual exclusion algorithm for flying network-multi UAV with its
correctness proof, performance metrics and fault handling capabilities. We began our
13
3708 A. S. Parihar, S. K. Chakraborty
Fig. 6 The ONE simulator snapshot of 5-UAV FANET with 75 nodes. a At simulation time = 0 s. b At
simulation time = 229.5 s
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3709
Fig. 7 Average message exchanges per CS. a With 5-UAV FANET. b With 10-UAV FANET. c With
20-UAV FANET
13
3710 A. S. Parihar, S. K. Chakraborty
Fig. 8 MEAFN-MUAV system throughput. a With 5-UAV FANET. b With 10-UAV FANET. c With
20-UAV FANET
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3711
the literature survey. We then present our proposed algorithm as MEAFN-MUAV with
its fault handling capabilities and correctness proof thereafter. For our simulation result
and analysis, we have used The opportunistic network environment simulator.
Flying networks have grown in popularity in recent years because of the wide range
of applications that UAVs can perform, including weather monitoring, ground target
detection, remote sensing, remote sensing in agriculture, attacks in hostile areas, disas-
ter monitoring, wind estimation, search and rescue operations, wild/forest fire monitor-
ing, real-time surveillance, goods delivery and transportation, and so on. UAVs are an
important part of flying networks since they can fly without human intervention and
can be controlled remotely. During operations, information sharing in such a network
is also critical. Distributed mutual exclusion ensures that nodes can only access shared
information in a mutually exclusive way. Such algorithms in FANETs have received
little attention to date, and in this work, we offer MEAFN-MUAV, a token-based k
mutual exclusion algorithm for multi-UAV FANETs. This approach operates in a multi-
UAV FANET environment, allowing k duplicated resources to be mounted on avail-
able UAVs, allowing up to k processes to invoke their CS at the same time, with more
efficient performance than a single-UAV FANET. This solution is also fault-tolerant to
UAV failure in the system, whereas with a single-UAV FANET, this is treated as a sys-
tem failure.
Finally, we believe that the research presented in this article will be valuable and can be
used as a quick reference for learning about distributed mutual exclusion in the flying net-
work context. Identifying and monitoring the pattern of node migrations in such dynamic
networks through trending machine understanding technologies could be a future focus of
this research. Apart from this, a tamper-proof transaction might be another future aspect of
this study through blockchain technologies.
Declarations
Conflict of interest The authors have no a conflict of interest in relation to this work.
References
1. Tanenbaum, A. S., and Steen, M. V. (2013). Distributed Systems. Pearson Education
2. Parihar, A. S., & Chakraborty, S. K. (2021). Token-based approach in distributed mutual exclusion
algorithms: A review and direction to future research. The Journal of Supercomputing, 77, 14305–
14355. https://doi.org/10.1007/s11227-021-03802-8
3. Parihar, A. S., & Chakraborty, S. K. (2022). Handling of resource allocation in flying ad hoc network
through dynamic graph modeling. Multimedia Tools and Applications, 81(13), 18641–18669. https://
doi.org/10.1007/s11042-022-11950-z
13
3712 A. S. Parihar, S. K. Chakraborty
4. Parihar, A. S., & Chakraborty, S. K. (2022). A cross-sectional study on distributed mutual exclu-
sion algorithms for ad hoc networks. In D. Gupta, K. Sambyo, M. Prasad, & S. Agarwal. (Eds.),
Proceedings of international conference onadvanced machine intelligence and signal processing.
Pattern Recognition and Data Analysis with Applications. Singapore: Springer. https://doi.org/10.
1007/978-981-19-1520-8.
5. Parihar, A. S., & Chakraborty, S. K. (2022). A simple R-UAV permission-based distributed
mutual exclusion in FANET. Wireless Networks, 28(2), 779–795. https://doi.org/10.1007/
s11276-022-02889-y
6. Jain, M., & Saxena, R. (2017). Overview of VANET: Requirements and its routing protocols. In:
2017 International Conference on Communication and Signal Processing (ICCSP). https://doi.org/
10.1109/iccsp.2017.8286742
7. Srivastava, A., & Prakash, J. (2021). Future FANET with application and enabling techniques:
Anatomization and sustainability issues. Computer Science Review, 39(2021), 100359. https://doi.
org/10.1016/j.cosrev.2020.100359
8. Chriki, A., Touati, H., Snoussi, H., & Kamoun, F. (2019). FANET: communication, mobility mod-
els and security issues. Computer Networks. https://doi.org/10.1016/j.comnet.2019.106877
9. Curry, J. A., Maslanik, J., Holland, G., et al. (2004). Applications of aerosondes in the Arctic.
Bulletin of the American Meteorological Society, 85(12), 1855–1861. https://doi.org/10.1175/
BAMS-85-12-1855
10. York, G., & Pack, D. J. (2012). Ground target detection using cooperative unmanned aerial sys-
tems. Journal of Intelligent and Robotic Systems, 65(1–4), 473–478. https://doi.org/10.1007/
s10846-011-9590-4
11. Zhu, S., Wang, D., & Boon, L. C. (2013). Ground target tracking using UAV with input con-
straints. Journal of Intelligent and Robotic Systems, 69(1–4), 417–429. https://doi.org/10.1007/
s10846-012-9737-y
12. Corrigan, C. E., Roberts, G. C., Ramana, M. V., et al. (2008). Capturing vertical profiles of aerosols
and black carbon over the Indian Ocean using autonomous unmanned aerial vehicles. Atmospheric
Chemistry and Physics, 8(3), 737–747. https://doi.org/10.5194/acp-8-737-2008
13. Xiang, H., & Tian, L. (2011). Development of a low-cost agricultural remote sensing system based
on an autonomous unmanned aerial vehicle (UAV). Biosystems Engineering, 108(2), 174–190.
https://doi.org/10.1016/j.biosystemseng.2010.11.010
14. Cevik, P., Kocaman, I., Akgul, A. S., et al. (2013). The small and silent force multiplier: A swarm
UAVelectronic attack. Journal of Intelligent and Robotic Systems, 70(1–4), 595–608. https://doi.
org/10.1007/s10846-012-9698-1
15. Maza, I., Caballero, F., Capitn, J., et al. (2011). Experimental results in multi-UAV coordination
for disaster management and civil security applications. Journal of Intelligent and Robotic Systems,
61(1–4), 563–585. https://doi.org/10.1007/s10846-010-9497-5
16. Cho, A., Kim, J., Lee, S., & Kee, C. (2011). Wind estimation and airspeed calibration using a UAV
with a single-antenna GPS receiver and pitot tube. IEEE Transactions on Aerospace and Electronic
Systems, 47(1), 109–117. https://doi.org/10.1109/TAES.2011.5705663
17. De Freitas, E. P., Heimfarth, T., Netto, I. F., Lino, C. E., Pereira, C. E., Ferreira, A. M., Wagner, F.
R., & Larsson, T. (2010). UAV relay network to support WSN connectivity. In Proc. IEEE int. con-
gress on ultra modern telecommunications and control systems and workshops (ICUMT), Moscow,
Russia (pp. 309–314). https://doi.org/10.1109/ICUMT.2010.5676621
18. Jiang, F., & Swindlehurst, A.L. (2010). Dynamic UAV relay positioning for the ground–to-air
uplink. In Proceedings of the IEEE GLOBECOM workshops (GC workshop), IEEE (pp. 1766–
1770). https://doi.org/10.1109/GLOCOMW.2010.5700245
19. Sahingoz, O.K. (2013). Multi-level dynamic key management for scalable wireless sensor networks
with UAV. In Ubiquitous information technologies and applications, Springer, Dordrecht (pp.
11–19). https://doi.org/10.1007/978-94-007-5857-5_2
20. Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key man-
agement scheme. Journal of Systems Architecture, 59(9), 801–807. https://doi.org/10.1016/j.sysarc.
2013.05.022
21. Manathara, J. G., Sujit, P., & Beard, R. W. (2011). Multiple UAV coalitions for a search and pros-
ecute mission. Journal of Intelligent & Robotic Systems, 62(1), 125–158. https://doi.org/10.1007/
s10846-010-9439-2
22. Asadpour, M., Giustiniano, D., Hummel, K. A., & Egli, S. (2013). UAV networks in rescue mis-
sions. In Proceedings of the 8th ACM international workshop on wireless network testbeds, experi-
mental evaluation & characterization - WiNTECH ’13. https://doi.org/10.1145/2505469.2506491
13
Token Based k‑Mutual Exclusion for Multi‑UAV FANET 3713
23. Barrado, C., Messeguer, R., & L´opez, J., Pastor, E., Santamaria, E. and P. Royo,. (2010). Wildfire
monitoring using a mixed air-ground mobile network. IEEE Pervasive Computing, 9(4), 24–32.
https://doi.org/10.1109/MPRV.2010.54
24. Parihar, A.S., Prasad, D., Gautam, A.S. & Chakraborty, S.K. (2021). Proposed end-to-end auto-
mated e-voting through blockchain technology to increase voter’s turnout. In: Prateek, M., Singh,
T.P., Choudhury, T., Pandey, H.M. & Gia Nhu, N. (eds) Proceedings of international conference on
machine intelligence and data science applications. Algorithms for intelligent systems. Springer, Sin-
gapore. https://doi.org/10.1007/978-981-33-4087-9_5
25. Semsch, E., Jakob, M., Pavlicek, D. & M. Pechoucek, (2009). Autonomous UAV surveillance in com-
plex urban environments. In Proc. IEEE/WIC/ACM int. joint conf. on web intelligence and intelligent
agent technologies (WI-IAT), Washington, DC, USA (vol. 2, pp. 82–85). https://doi.org/10.1109/WI-
IAT.2009.132
26. Kerr, S. (2014). UAE to develop fleet of drones to deliver public services. The Financial Times, World
News, Volume 12.
27. Walter, J. E., Welch, J. L., & Vaidya, N. H. (2001). A mutual exclusion algorithm for ad hoc mobile
networks. Wireless Networks, 7, 585–600. https://doi.org/10.1023/A:1012363200403
28. Benchaïba, M., Bouabdallah, A., Badache, N., & Ahmed-Nacer, M. (2004). Distributed mutual exclu-
sion algorithms in mobile ad hoc networks. ACM SIGOPS Operating Systems Review, 38(1), 74–89.
https://doi.org/10.1145/974104.974111
29. Chen, Y., & Welch, J. L. (2005). Self-stabilizing dynamic mutual exclusion for mobile ad hoc net-
works. Journal of Parallel and Distributed Computing, 65(9), 1072–1089. https://doi.org/10.1016/j.
jpdc.2005.03.009
30. Mellier R., Myoupo JF., & Ravelomanana V. (2005). A non-token-based-distributed mutual exclusion
algorithm for single-hop mobile ad hoc networks. In: Belding-Royer E.M., Al Agha K., Pujolle G.
(eds) Mobile and wireless communication networks. MWCN 2004. IFIP international federation for
information processing, Volume 162. Springer, Boston, MA. https://doi.org/10.1007/0-387-23150-1_
25
31. Wu W., Cao J., & Raynal M. (2007). A dual-token-based fault tolerant mutual exclusion algorithm for
MANETs. In: Zhang H., Olariu S., Cao J., Johnson D.B. (eds) mobile ad-hoc and sensor networks.
MSN 2007. Lecture notes in computer science, Volume 4864. Springer, Berlin, Heidelberg. https://doi.
org/10.1007/978-3-540-77024-4_52
32. Thiare O., Naimi M., & Gueroui M. (2007). A group mutual exclusion algorithm for mobile ad hoc
networks. In: Sobh T. (eds) Innovations and advanced techniques in computer and information sci-
ences and engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_67
33. Wu, W., Cao, J., & Yang, J. (2008). A fault tolerant mutual exclusion algorithm for mobile ad hoc net-
works. Pervasive and Mobile Computing, 4(1), 139–160. https://doi.org/10.1016/j.pmcj.2007.08.001
34. Thiare O. (2012). A token-based group mutual exclusion algorithm for MANETs. In: Kim T., Ko D.,
Vasilakos T., Stoica A., Abawajy J. (eds) Computer applications for communication, networking, and
digital contents. FGCN. Communications in computer and information science, Volume 350. Springer,
Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35594-3_34
35. Sharma B., Bhatia R.S., & Singh A.K. (2011). An O(1/n) protocol for supporting distributed mutual
exclusion in vehicular ad hoc networks. In: Nagamalai D., Renault E., Dhanuskodi M. (eds) Advances
in parallel distributed computing. PDCTA 2011. Communications in computer and information sci-
ence, Volume 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_14
36. Tamhane, S. A., & Kumar, M. (2012). A token based distributed algorithm for supporting mutual
exclusion in opportunistic networks. Pervasive and Mobile Computing, 8(5), 795–809. https://doi.org/
10.1016/j.pmcj.2011.08.002
37. Wu, W., Zhang, J., Luo, A., & Cao, J. (2015). Distributed mutual exclusion algorithms for intersection
traffic control. IEEE Transactions on Parallel and Distributed Systems, 26(1), 65–74. https://doi.org/
10.1109/tpds.2013.2297097
38. Raymond, K. (1989). A tree-based algorithm for distributed mutual exclusion. ACM Transactions on
Computer Systems, 7(1), 61–77. https://doi.org/10.1145/58564.59295
39. Zheng, W., Song, L. X., & Mei’an, L. (2007). Ad hoc distributed mutual exclusion algorithm based
on token-asking. Journal of Systems Engineering and Electronics, 18(2), 398–406. https://doi.org/10.
1016/s1004-4132(07)60104-2
40. Lamport, L. (1978). Time, clocks, and the ordering of events in a distributed system. Communications
of the ACM, 21(7), 558–565. https://doi.org/10.1145/359545.359563
41. Sharma, B., Bhatia, R. S., & Singh, A. (2014). A token based protocol for mutual exclusion in mobile
ad hoc networks. Journal of Information Processing Systems, 10, 36–54. https://doi.org/10.3745/JIPS.
2014.10.1.036
13
3714 A. S. Parihar, S. K. Chakraborty
42. Khanna, A., Rodrigues, J. J. P. C., Gupta, N., Swaroop, A., Gupta, D., Saleem, K., & De Albuquerque,
V. H. C. (2019). A mutual exclusion algorithm for flying ad hoc networks. Computers & Electrical
Engineering, 76, 82–93. https://doi.org/10.1016/j.compeleceng.2019.03.005
43. Khanna, A., Rodrigues, J. J. P. C., Gupta, N., Swaroop, A., & Gupta, D. (2020). Local mutual exclu-
sion algorithm using fuzzy logic for flying ad hoc networks. Computer Communications, 156, 101–
111. https://doi.org/10.1016/j.comcom.2020.03.036
44. Shehu, H. A., Sharif, M. H., & Ramadan, R. A. (2020). Distributed mutual exclusion algorithms for
intersection traffic problems. IEEE Access, 8, 138277–138296. https://doi.org/10.1109/ACCESS.2020.
3012573
45. Attiya, H., Kogan, A., & Welch, J. L. (2008). Efficient and robust local mutual exclusion in mobile ad
hoc networks. In The 28th International Conference on Distributed Computing Systems, Beijing (pp.
321–328). https://doi.org/10.1109/ICDCS.2008.82
46. Keranen, A., Ott, J., & Karkkainen, T. (2009). The ONE simulator for DTN protocol evaluation. In
Proc. 2nd international conference on simulation tools and techniques (pp. 55:1–55:10). https://doi.
org/10.4108/ICST.SIMUTOOLS2009.5674
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
13