1 Introduction

Over the past few decades, Internet of Things (IoT), also recognized as the Internet of Everything, becomes an emerging technology domain in communication and embedded technology, where heterogeneous devices can globally interact with each other with built-in intelligence. Various industries are adopting IoT technology to build a global network of interconnected and integrated devices, including smartphones, body sensors, smart embedded objects, smart-watches, and many more. Heterogeneous interconnection between devices helps society grow a hyper-connected cyber-physical-social environment using heterogeneous and communication protocols (Gubbi et al. 2013). Recently, abstraction of the Internet of things and social networks is merging to form a socialized and collaborated integration of devices which is known a Social Internet of Things. SIoT is an emerging subset of IoT where globally interconnected devices establish a social relationship. SIoT is gaining significant attention from numerous industries for having wide application areas of hyper-connected smart societies such as smart city, smart community, healthcare and telemedicine, smart multimedia streaming, and system (Ali 2015). The most fundamental and challenging SIoT-enabled smart system requirement is the relationship management and establishment of trustworthiness among the integrated smart objects (Afzal et al. 2019; Ruiz et al. 2021). We establish different types of relationships between connected objects such as ownership, and social object relation. These are further extended to provide on-demand services by enhancing network navigability (Gulati and Kaur 2021). SIoT-enabled smart heterogeneous devices globally connected and collaborated to achieve a common goal that is mutually beneficial for all the interconnected objects (Roopa et al. 2019). However, there are some major challenges faced by the developers while establishing social connectivity among objects. The SIoT objects support heterogeneous communication protocols with various deployment features, which is the fundamental concern for establishing a complex IoT-enabled society. Apart from the diversity of perspectives, there is also a growing demand to increase the number of devices under the same network causing scalability concerns. The autonomous interaction among devices, beneficial for human users, covers both human–object and object–object relationships (Marche et al. 2018). Trustworthiness is one of the key functionalities of SIoT architecture, which defines the good collaboration and socialization of SIoT devices (Bao et al.62013). Some emerging subset of IoT includes Internet of Drone Things (IoDT) (Mukherjee et al. 2020a), Internet of Robotic Things (IoRT) (Simoens et al. 2018), Internet of Public Safety Things (IoPST) (Alsamhi et al. 2019; Kantarci and Mouftah 2014), Internet of Nano Things (IoNT) (Miraz et al. 2015), Internet of Underwater Things(IoUT) (Kao et al. 2017), Internet of Medical Things (IoMT) (Joyia et al. 2017), Internet of Cloud Things (IoCT) (Pawlick et al. 2018), and Internet of Mobile Things (IoMBT) (Nahrstedt et al.2016).

Unmanned Aerial Vehicles, also known as drones, are the key part of IoDT. Drones are mainly equipped with remotely controllable IoT devices, provide services in different civilian sectors, monitor and surveillance in industrial areas, managing wildfire, etc. The Internet of Drone Technology refers explicitly to a layered network architecture that coordinates the sensor services and UAV navigation. The drones can be considered a node that stores and redirects the sensor's information by using an ad hoc attribute to the UAV. This feature is also known as flying ad hoc network (FANET). FANET (Bekmezci et al. 2015) is a specialized subset of MANET and VANET, which can be effectively used to establish a multi-layered UAV communication network because of its high degree of mobility. Three extensive networks layered approach is followed on the Internet of Drone Technology (IoDT), namely mobile network, aerial sensor network, and Internet (Quaritsch et al. 2010). In SIoDT, each UAV is considered a set of flying ad hoc network nodes interconnected and collaborates and socializes via sensors to perform a mutually beneficial specific task. With the invention of 6G networks, SIoT can reshape society with superior performance (Katz et al. 2018). IoT-enabled devices, such as multi-UAV systems, can communicate more effectively using sixth-generation networks. These technologies facilitate the Social Internet of Drone Thing (SIoDT) services via wireless media. It also enables maximum data transfer rate even in a sparse network scenario. The communication between 6G wireless networks facilitates multi-UAV communications with nearly zero infrastructures, specifically in an emergency (Song et al. 2020; Akyildiz et al. 2002).

1.1 Motivation and contribution

The primary contribution of this work is to design a UAV-enabled seamless communication framework that can sense and transfer data captured by the sensor or intelligent devices. We have developed a framework, which acts as middleware in this case. This framework leverages the features of core IoT protocols amalgamate with opportunistic routing phenomena, which can efficiently work in a highly dynamic and sparse network topology. The ultra-low latency 6G network architecture is an obvious choice for developing such an ecosystem because message transfer in a highly sparse network can only be possible with the ultra-low latency software-defined network (SDN). Therefore, we have critically included SDN in our work to validate the effectiveness of the proposed framework.

Rest of the article is organized as follows: Section 2 describes the related research; Sect. 3 emphasizes the Social Internet of Drone things modeling. Section 4 shows the experimental setup and the performance metrics. Section 5 describes the performance analysis of different methodologies. Finally, discussions and the conclusion are made in Sects. 6 and 7, respectively.

2 Related work

In recent decade, the Internet of Drone Things enhanced a significant research field where the integrated objects are always related to drones. All the associated works, such as globally interconnecting through sensors, and message transfer, are performed either explicitly or implicitly by the UAV(s). Social IoDT is an emerging subset of IoDT. A multi-UAV system acts as a heterogeneous group of devices where each device collaborates and socializes to perform the same task. An implementation named Dragnet for amateur drone surveillance using the cognitive Internet of Things is done (Ding et al. 2018; García et al. 2019). The concept behind Dragnet is that the surveillance devices, i.e., drones, are interconnected and can learn, think, understand global decisions, and work like it have brains with minimum human intervention. In (Motlagh et al. 2017), an IoT-enabled UAV architecture is performed, focusing on crowd surveillance for suspicious activity monitoring. A cloud-based framework is proposed in Luo et al. (2015) to perform disaster monitoring with limited UAV resources. The power consumption and processing time of UAVs are more challenging for the developers in this domain. An energy-efficient UAV-based IoT framework is proposed in Motlagh et al. (2016); here, the authors highlight a selection technique of UAV for a specific goal. A comprehensive survey related to significant challenges and future perspectives of IoDT is illustrated in (Motlagh et al. 2016b). Mukerjee et al. (2020) propose a hybrid model named iGridEdgeDrone for building intelligent grid networks using IoDT.

IoDT comprises a layered network structure where each layer retrieves data from the previous layer (Gharibi et al. 2016). In another work, the author proposes an ad hoc network named FANET for the interconnection between multi-UAV system for communicating with the base station and satellites in a highly dynamic environment (Bekmezci et al. 2013). FANET is a subset of mobile ad hoc networks (MANET) and Vehicular ad hoc networks (VANET) with a superior mobility degree. A real-time CNN-based detection model named Dronet is proposed in Kyrkou et al. (2018) for UAV-based vehicle detection applications such as emergency response, and traffic monitoring. The concept of IoDT is much similar to IoD, but in IoDT the edge and fog layer are present with the perception layer. Aerial sensor network plays a vital role in the multi-UAV-based IoT system for localization, path planning, and sensor data aggregation (Mukherjee et al. 2020c). An aerial sensor network is used as a mobile sensor network that moves around the environment, senses using sensors present in UAVs and then finally, transfers the collected data to the ground base (Cabreira et al. 2018). In another work (Hua et al. 2018), authors propose an energy-efficient sensor network scheduling approach. Some factors like packet delivery ratio, low delay in delivery, and packet loss need to be considered for the increment of the collaborating devices. Several routing protocols are used in FANET, categorized as topology-based routing protocols, swarm-based routing protocols, and position-based routing protocols. A comprehensive study of different routing protocols is addressed in Oubbati et al. (2017). The routing in a UAV network is highly challenging due to the highly dynamic mobility of UAV nodes.

In some cases, the connections become intermittent, and the chance of message loss is high. In such a scenario, the traditional routing mechanism fails most of the time. Therefore, another most critical challenge in a multi-UAV system is trustworthiness. A fuzzy-based system is presented in Singh and Verma (2018) to control the behavioral unpredictability of FANET nodes, i.e., UAVs. Furthermore, the author proposes a topology construction model based on a nature-inspired particle swarm optimization algorithm (Srivastava and Prakash 2021) for end-to-end communication between UAVs and ground control stations.

UAVs have broadly three communication architectures, named UAV ad hoc Network, multi-group UAV ad hoc network, and multi-layer UAV ad hoc network (Khan et al. 2021; Pereira et al. 2019). SIoDT majorly follows a robust multi-layer UAV ad hoc network where UAVs' heterogeneous connection is natural without a single point of failure. With the invention of the 6G network development, almost everything is connected, and we are moving a step forward toward a fully digital society. An emerging technology integrated into 6G networks, known as software-defined networks (SDN), is used for network flexibility, centralized network control, and program the network for application development (Alomari et al. 2021). SDN plays a significant role in future Internet by solving significant challenges like ubiquitous accessibility, excessive bandwidth, and dynamic instantiation (Zhang et al. 2019).

Furthermore, 6G networks play an essential role in establishing communication in multi-UAV systems by overcoming the power consumption issue caused by propulsion and direction adjustment. In research (Alzenad et al. 2018), the authors introduce an approach where they use point-to-point free-space optics (FSO) to transmit information between UAVs with excessive data rates in different weather situations. However, due to high mobility, network security management is a critical concern in UAVs, which requires software-defined networking. Network function virtualization (NFV) is a cost-effective solarization technique to fulfill network security to vulnerable UAVs at less expense. Furthermore, NFV provides flexible, dynamic, and instant decision capabilities to the UAVs by using user authentication, access control mechanisms for effective and secure communication (Kumari et al. 2020).

3 Social internet of drone things modeling

Internet of Drone is a new paradigm in the recent advancement of the IoT era. Internet of Drone Things (IoDT) is the specialized concept where the drones can make an ad hoc network connection and have additional features like sensing, and local level processing as an edge device. The idea of social IoT fundamentally deals with the massive cluster of people's social behaviors and social gatherings in a closed area (Cheng et al. 2019).

We can often realize a social structure like a crowded football ground, congested traffic, a crowded shopping mall before Christmas, Durgapuja, emergency evacuation of mob due to fire, and earthquake (López-Quintero et al. 2018). The deployment of FANET-based SIoDT is highly relevant in this context for better signal coverage. Figure 1 depicts situations where we can physically build several network slices under a single 6G backbone. Each slice, in this case, provides a dedicated service and comprises the network of drones to transfer and stream the messages effectively.

Fig. 1
figure 1

FANET-based Social IoDT deployment scenario under 6G network infrastructures

In the proposed work, the concept of SIoDT comprises three distinct components. In the first part, the primary concern is drone mobility and routing. To achieve this, we establish a group of Flying ad hoc networks of 'n' nodes in the perception layer. Here, the key role is to sense and gather the data based on the social relationship of the people and the community within a society and city. In such cases, the ecosystem assigns a dedicated FANET for data gathering. We primarily deployed FANETS that are under 'n' ultra-low latency massive MIMO network considered the network layer. The network is segregated into several software-defined networks (SDN) slices based on the social feature and utility. The FANET nodes are part of IoDT. The data gathered by the node also can process the drone nodes. Therefore, an edge sub-layer is considered a part of the network layer that can perform processing within the network's edge. The processed information is then transmitted to the higher layers (dew, fog, and cloud layers) using the same low latency network. Finally, the network itself also comprises static hardware infrastructure on which we use virtualization. The core part of the software-defined network slice illustrates SIoDT in Fig. 2. SDN controller, access and core network, virtual computation, and storage infrastructure, and slice controller are the key components here. We have discussed more on SDN in Sect. 3.2.

Fig. 2
figure 2

Social IoDT ecosystem with SDN slices comprises of services, access network, and the core networks

Fig. 3
figure 3

Message delivery performance of enhanced message transfer strategies in various Quality-of-Service levels under varying transmission ranges

Fig. 4
figure 4

a The impact of node density on the message delivery probability under various QoS values. b Average message DP for the standard and the proposed message transfer models.

As mentioned previously, the fundamental objective of our work incorporates the selection of the proper message transfer strategy in a highly dynamic topology for social FANET so that they can perform data gathering and social action of the objects. In addition to that with proper Quality of Service in routing is another crucial objective. In a FANET, IoDT nodes often form a sparse network topology. Therefore, to efficiently perform the message relay with a proper QoS, an enhancement of the standard protocol is highly required. Consequently, we re-engineered the standard MQTT messaging policy so that they can work optimally in a dense and sparse, and highly dynamic network scenario.

3.1 Opportunistic IoDT design

We choose an appropriate selection of the opportunistic routing for the message transfer under IoDT. The performance of the standard MQTT protocol gets sacrificed in a FANET due to its high degree of mobility. In such a case, broadcast messages from one node to another node may not reach in proper time. Thereby the time to live (TTL) gets expired, and the message gets dropped. This problem becomes even more critical when the network is sparse. The opportunistic routing scheme is the best approach for precise message transfer. The enhanced protocol, in this case, ensures a high message delivery probability. We have employed two renowned message routing mechanisms, namely MaxProp and Spray and Focus (Mukherjee et al. 2019; Avasalcai et al. 2019). Therefore, we amalgamate the existing functionality of the MQTT protocol with the opportunistic message transfer scheme to improve the QoS in a highly dynamic network topology. The new terminology for those message transfer mechanisms is termed MP-MQTT and SF-MQTT, respectively. The MaxProp strategy increases the chance of delivering the message in a challenging scenario where network coverage is low. Three key things are involved: neighbor discovery, data transfer, and storage management, which we can explain with the standard mathematical model. If 'n' is the number of nodes, each of the nodes \(i\in n\) keeps tracking the contact probability \(\in n\). Now, we have to set \({f}_{j}^{i}=\frac{1}{\left|n\right|+1}\) where \({f}_{j}^{i}\) is considered as the likelihood of a connection between i and j. Each time i encounters j, \({f}_{j}^{i}\leftarrow {f}_{j}^{i}\)+1. The cost to each path along d direction has computed as

$$ c\left( {i,i + 1, \ldots ,y} \right) = \mathop \sum \limits_{x = i}^{y - 1} \left( {1 - \left( {f_{x + 1}^{x} } \right)} \right) $$
(1)

Therefore, we can compute the cost of transferring the message toward the destination y as

$$ \left( y \right) \leftarrow \min \left( {c\left( {i,i + 1, \ldots ,y} \right)} \right) $$
(2)

The second message transfer scheme that works with MQTT will also significantly improve message delivery by utilizing maximum bandwidth and minimum forwarding latency (Bao et al. 2013; Kumari et al. 2020). The transfer scheme maintains a summary vector between nodes based on the rapid flooding rule. Each time before the message transfer, a timestamp token has to be sent to all nodes present within the communication range in a particular instance of time. The model then chooses the best message forwarder as a subscriber of the message in such a case based on the timestamp and the forwarder distance. For example, if p and q are two nodes considered a publisher and the subscriber, the encounter distance Δpq and the timer τm have to be computed with an incremental timestamp value.

figure a

While a node encounters with a source node, the model immediately checks the timestamp value, and the minimum timestamp valued nodes are considered a better forwarder based on the following relation

$$ {\uptau }_{m} \left( N \right) = {\uptau }_{m} \left( j \right) - {\uptau }_{m} \left( i \right) + {\Delta }_{pq} $$
(3)

where \({\uptau }_{m}\left(N\right)\) can be considered as the newly computed times value for the encounter to the forwarder. In this way, the best forwarder or subscriber of the message has to be chosen based on the relation

$$ {\uptau }_{m} \left( {sub} \right) = \min \left[ {\tau_{m} \left( {N_{1} } \right), \tau_{m} \left( {N_{2} } \right), \ldots \tau_{m} \left( {N_{x} } \right)} \right] $$
(4)

where x is the number of subscriber nodes encountered within a particular instance of time, algorithm 1 is showing the message transfer strategy 1. Algorithm 2, on the other hand, reflects the message transfer strategy 2.

figure b

3.2 Implementation of SDN

The SDN fundamentally comprises of slices that logically share the channels and the network resources (Nguyen et al. 2017). The slicing of the network enables the heterogeneity of the functions and operations within a shared infrastructure. We have created seven distinguished Network Slice Instance (NSI) under a single MIMO infrastructure in this work. We have generated SDN through NFV, and each network has its own virtualized resources shared across the slice. The cross-domain network slices (Gligoroski and Kralevska 2019; Zhirnov et al. 2019; Luo et al. 2018) provide seven services: smart-grid communication, healthcare, transport, e-commerce, education, disaster response application, and infotainment for society 4.0. The SDN slices are distinctively identified as a combination of the services (SR), core networks (CN), and access networks (AN). While assigning the service under a slice, we have to consider it as a Latin rectangle table to identify the benefits under a particular AN and CN quickly and distinctly. There are two different cases we can consider to slice the network and allocate the services.

Firstly, we can have dedicated CN and the AN for each service so that one particular service can able to avail the functionality of the CN and AN. Secondly, an imbalance in resource allocation happens when we assign more than one service within a single AN or CN. Obviously, in such cases, either the resource of either AN or CN or both have been shared. Such an approach is often called soft slicing. Tables 1, 2 depict the hard and soft slicing through the Latin square method considered in our scenario.

Table 1 Hard slicing of seven different services under specified AN and CN
Table 2 Soft slicing of seven different services under specified AN and CN

To understand the mathematical model, we can consider the slice as \(\Sigma\), which is a three-variable tuple, and we can represent it as \(\Sigma = \left\{ {{\text{S}},{\text{ A}},{\text{ C}}} \right\}\) where\(S = \left\{ {s_{1} , s_{2} , \ldots , s_{n} } \right\},{ }A = \left\{ {a_{1} , a_{2} , \ldots , a_{n} } \right\}\), and \(C = \left\{ {c_{1} , c_{2} , \ldots , c_{n} } \right\}\) is the set of service, AN and CN, respectively. Therefore, the hard-core network slicing can be obtained by

$$ \Sigma_{HCS} = {\text{\{ }}(s_{i} , a_{i} , c_{i} {)}: s_{i} \in S, a_{i} \in A, c_{i} \in C\} $$
(5)

where minimum two tuple {(s1, a1, c1) and (s2, a2, c2)\(\} \in \Sigma_{HCS}\) and the following condition should hold:

$$ \begin{gathered} \forall s_{i} = s_{j} : a_{i} \ne a_{j} \Lambda c_{i} \ne c_{j} \hfill \\ \forall a_{i} = a_{j} : s_{i} \ne s_{j} \Lambda c_{i} \ne c_{j} \hfill \\ \end{gathered} $$

where \({s}_{i} , {a}_{i}, {c}_{i}\) are the ith instances and \({s}_{j} , {a}_{j}, {c}_{j}\) are the jth instances of service, AN, and CN, respectively.

In the same way, we can perform the AN slicing using \(\Sigma_{HAS} = {\text{\{ }}(s_{i} , a_{i} , c_{i} {)}: s_{i} \in S, a_{i} \in A, c_{i} \in C\}\) where minimum two tuple {(s1, a1, c1) and (s2, a2, c2)\(\} \in \Sigma_{HCS}\) and the following condition should hold:

$$ \begin{gathered} \forall s_{i} = s_{j} : a_{i} \ne a_{j} \Lambda c_{i} \ne c_{j} \hfill \\ \forall c_{i} = c_{j} : s_{i} \ne s_{j} \Lambda a_{i} \ne a_{j} \hfill \\ \end{gathered} $$

Also, it is possible to prove that if \(\Sigma_{HS} = {\text{\{ }}(s_{i} , a_{i} , c_{i} {)}: s_{i} \in S, a_{i} \in A, c_{i} \in C\}\) is a hard network slice, then \(\exists a^{ - } \mathop{\left(\acute{S}, \acute{A}, \acute{C}\right)}\limits^{\prime }\) such that \( \acute{S} \subseteq S, \acute{A} \subseteq A\), and \( \acute{C} \subseteq C\).

It is evident that while creating a hard slice \(\Sigma_{HAS} ,\) we can consider a vector of services λ that maps to AN and CN. In such case, the service set \( \acute{S} \subseteq S\), will always hold. The AN and CN set also flows the same rule. Therefore, the list λ contains either an empty cell {ϕ} or have a single symbol \(\in \) S. Hence, we can conclude the conjugate \(^{ - } \mathop{\left(\acute{S} , \acute{A} \acute{C} \right)}\limits^{\prime }\) exists so that\( \acute{S} \subseteq S, \acute{A} \subseteq A\), and \( \acute{C} \subseteq C\)holds. Algorithm 3 presents the slicing mechanism under dedicated AN and CN.

figure c

4 Experimental setup and performance metric

We have carried out the simulation experiment in two phase. Firstly, we deploy the IoDT nodes in a smart city scenario through an opportunistic network simulator. We have segmentized the client nodes into seven distinct social groups, and the dedicated IoDT networks are assigned to each group. We choose the shortest path map-based mobility for each group to realize more accurate social behavior. The reason behind that is to find out the optimal sequence of the path to reach a particular destination. The time complexity of such a model lies in between O(e log v) to O(v2). Table 3 shows the simulation parameters for IoDT nodes under the smart city scenario. In phase 2, we assign the dedicated frequency slot to each of the seven groups in the form of an SDN slice.

Table 3 Standard simulation parameters for IoDT nodes

The slices, in this case, are considered hard slices. In our experimental scenario, we have statically created seven slices for seven different services. We distribute the size of each slice equally with the equal segment and incremental frequency values. Furthermore, each slice has its own dedicated AN and CN. As the philosophy of 6G ensures network availability anywhere irrespective of ground, underground /underwater, and deep space, ultra-low latency opportunistic message transfer is the key ingredient. We have modeled the system to achieve an opportunistic capability by leveraging an ultra-high-frequency band. Table 4 depicts the functional parameters of the SDN slice. To simulate SDN, we have used the Slicesim simulator. The simulator is a python-based open-source simulator where we create a slicing scheme as a script and give all parameters into a yml script file to execute.

Table 4 Simulation parameters for SDN

5 Performance analysis

We have made the performance analysis in two phases. In the first phase, we analyze the performance of the enhanced message transfer strategy over the proposed ecosystem. Then, we have done the simulation. We have considered the IoDT nodes here as the subset of the entire node group. Majorly, they are either fixed-wing or multi-rotor lightweight drones. Other nodes are in the class of human nodes, vehicular nodes, and base stations.

5.1 Performance of IoDT nodes under social scenario

Figure 3 represents the message delivery performance of the enhanced message transfer models under various MQTT-QoS levels in varying transmission ranges. The figure illustrates an increasing rate of delivery probability (DP) in both cases. It is evident that change in the transmission range proportionally affects the DP. For example, in Spray- and Focus-based message transfer, the QoS 2 ensures the highest benchmark of DP, which is at around 0.99. The acknowledgment at each step made by the publisher, subscribe, and a broker causes this phenomenon.

Figure 4 show message delivery probability with varying node density. In a typical opportunistic scenario, we report that the DP may decrease as the number of clients increases within a particular network due to the limited bandwidth. The message routing strategies do not perform well in such a case. However, under ultra-low latency 6G network scenario, this performs quite well. As the number of hosts increases, message delivery also increases with the number of nodes.

As the number of hosts expands, the higher number of the node gets selected for potential message forwarder. In Spray and Focus, we can choose more message subscribers with a smaller number of tokens. Thereby delivery ratio reaches a higher benchmark. As the number of subscribers increases, the DP is also increasing proportionally and reaches up to 0.99. MaxProp obeys the same rule because the higher the number of nodes, the better the delivery predictability. In the case of MaxProp, the QoS 0 gives a minimum benchmark due to the significant amount of packet loss. The decreasing number of nodes makes this chance pretty high which is at about 0.67.

Figure 5 illustrates the forwarding latency corresponding to varying node densities. The increasing number of nodes in the smart city here shows a falling latency. The introduction of more base stations and the relay nodes into the network results in a phenomenon that ensures the near-real-time message forwarding capability.

.

On the other hand, Fig. 4 shows a comparative study between the average message delivery performance of the standard MQTT protocol and the proposed MP-MQTT, SF-MQTT model, respectively. The classic MQTT scheme is generally designed to transfer the packet to a stationary node or a mobile node that is always connected with the backbone. In the case of IoDT scenario, the node is flying with a variable altitude and speed. Therefore, the performance of the standard MQTT is not satisfactory as in most cases. The figure shows that the average delivery ratio for MQTT, in that case, reaches 0.78. On the other hand, the SF-MQTT offers its best performance and reaches a maximum benchmark of 0.97.

Fig. 5
figure 5

Mean forwarding latency performance with varying node density under different QoS level

Fig. 6
figure 6

Simulation snapshot of SDN slicing. The initial number of nodes: 200. The final number of nodes: 6000

5.2 Performance of SDN under social scenario

Figure 6 shows the simulation snapshot that shows the varying node density under seven different SDN slices. The increasing amount of bandwidth involves the accommodation of the more significant number of IoT nodes. The modeling of the SDN under the social IoDT scenario involves seven different network slices for various services. Each service receives dedicated access and the core network in this case. Network configuration with 200 to 6000 nodes is identifiable in Fig. 6. We can consider the drone nodes as part of the SDN slice, and the SDN forwards the message in the form of MQTT pub/sub mechanism with an enhanced opportunistic phenomenon. Figure 7 shows the coverage ratio of the SDN slice under different QoS levels. The coverage ratio here gets computed as coverage per user divided by the number of the active slice.

Fig. 7
figure 7

Coverage ratio under various QoS levels under proposed SDN

Fig. 8
figure 8

Connected user ratio (β) per SDN slice within the simulation time

We can observe from Fig. 7 that the coverage ratio decreases drastically in QoS 0 for an increasing number of nodes at about 0.86. As a result, more nodes are out of coverage. In the case of QoS 0, the message delivery chance is minor. A dedicated frequency band is allocated for each node; therefore, the node with less delivery probability moves out of coverage. On the other hand, QoS 2 shows the highest benchmark of coverage which reaches beyond 99% at the number of nodes 1000. The number of connected client ratio per slice and the connection probability is illustrated in Figs. 8 and 9, respectively.

Fig. 9
figure 9

Connection probability of clients under various QoS levels

Fig. 10
figure 10

Bandwidth ratio per SDN slice for three different QoS level under varying node density a QoS 0 b QoS 1 c QoS 2

We can obtain the connected client ratio β as the difference between the total available client in slice and the total rejected client plus total handed-off clients with the total available client in the slice. Therefore, we can write as:

$$ \beta = \left\{ {{\text{TACS}} - \left( {{\text{TCH}} + {\text{TCR}}} \right)} \right\}/{\text{TACS}} $$
(6)

TACS is the total number of available clients in the slice, TCH, TCR, handoff clients, and rejected clients. It is noticed from Fig. 8 that as time elapsed, the connected client ratio per slice increases. Based on the time, the more users got the chance to connect the slice, and the SDN itself schedules this connection. In QoS 2, the ratio reaches more than 0.98; therefore, the users with QoS 2 will get the best connectivity and uninterrupted services from the network. Further, we have observed that the increasing number of clients is inversely proportional to the client connection probability. As the number of users increases, the clients' chance to move into the rejection list also increases rapidly. This phenomenon is even more critical while the client uses QoS 0. In such cases, we report that the connection probability is 0.76, which is the minimum benchmark. The bandwidth utilization is perhaps the most crucial factor in the case of a social IoT scenario. As the channels are considered an ultra-low latency transmission capability, the data transmission under slices will happen in order of gigabits per second.

The bandwidth utilization within the SDN slice is linearly increasing as the numbers of nodes are increasing. As shown in Fig. 11, the bandwidth utilization of both QoS 1 and 2 is almost similar, growing linearly. The enormous number of messages and the acknowledged transfer within the network is the reason behind this phenomenon. On the other hand, QoS utilizes a minimum bandwidth of about 250 Gbps. Figure 10a also shows the bandwidth utilization ratio per slice, which also clearly mentions that the QoS 0 utilizes low bandwidth compared to QoS 1 and 2. From Fig. 10a, b, and c, it is understandable that the bandwidth utilization/slice is increasing as the number of nodes increases. We also report that the QoS 0 message transfer bandwidth ratio per slice is significantly low for the lower value of node density reflected in the red region of Fig. 10a.

Fig. 11
figure 11

Average bandwidth usage of the nodes under various QoS levels

On the other hand, the magenta region shows the bandwidth ratio/slice while the node density is between 3000 and 4000. In this scenario, we observe that the bandwidth utilization for QoS 1 and 2 is almost similar, where the ratio increases drastically as the number of nodes increases. This characteristic significantly illustrates that with the introduction of more clients in slices, the performance is not degraded but shows stability.

6 Discussion

The study reveals that the opportunistic message transfer scheme designed to enhance the capability of the MQTT pub/sub messaging scheme is considered highly effective in a situation where there is a lack of coverage. In such cases, the node having a high chance of encountering is automatically chosen as the best forwarder or subscriber. Due to that extended feature, message delivery probability drastically increases. And this reaches its top benchmark while the MQTT protocol is using QoS level 2. We also observe that the Spray and Focus perform best among two of the message forwarding techniques.

In contrast, we record the delivery ratio of MaxProp in QoS 0 to be the worse, which is 66%. In the latency point of view, QoS 0 for both the strategy shows a better performance which is 1000 and 1100 ms, respectively, and QoS 2, in this case, takes more time in comparison with this. Next, the study on the generated SDN slices divulges at about 95% of bandwidth utilization per slice, while the node density is about 6000 and the QoS level is 2. We also observe that the coverage ratio is drastically decreasing in QoS 0 in an increasing number of nodes, which may negatively impact the network. The lightweight devices with low power, which are preferred to transfer messages in QoS 0 level, must shift to QoS 1 in such a case to avoid the coverage issue. From the bandwidth utilization characteristics study, it is also evident that real-time mission-critical applications like remote surgery, disaster management, and real-time traffic congestion management systems must strictly use quality of service level 2. In contrast, near-real-time IoT applications like live streaming and augmented-reality-based recommendation systems for smart malls may use QoS 1 or 2 depending on bandwidth availability. However, some of the limitations can be observed in this methodology like the limitation of the QoS availability. This might affect the high bandwidth data in some cases. Further, the study mainly emphasizes the telemetry transport protocols. Implementation of the same methodology for the streaming protocols like real-time streaming protocol (RTSP) can be considered as a future work for the proposed methodology.

7 Conclusion

In this work, we propose a message transfer framework for the Social Internet of Drone Things ecosystem. We have tested the framework for different services under a 6G network scenario, and we have set up seven slices for seven distinct slots. We assign the core and the access network for each slice. The standard MQTT message transfer mechanism modification has also been performed at the IoT level by introducing an additional opportunistic feature on message transfer that utilizes opportunistic behavior. We amalgamate the two different opportunistic routing techniques with the MQTT publish–subscribe mechanism. In the first case, the subscriber is chosen based on the message delivery predictability. In the second case, the timestamp-based forwarding token-based approach selects the best subscriber and the relay node to transfer the message into the destination. We have made the testbed under both mechanisms with varying quality of service, and the latency and delivery performance are measured. The results show that the timestamp-based Spray and Focus approach performs the best among them. Secondly, the performance SDN slices have also measured user connection support, coverage of the network, and the bandwidth utilization by the clients under QoS 0, 1, and 2. We observe that the MQTT QoS2 technique is the best mechanism for achieving the best performance from the network slices under 6G networks. In our belief, the enhanced message transfer mechanism and the SDN network slices implementation give way forward to establish a research direction toward an ultra-low latency data communication. These mechanisms are beneficial for mission-critical social scenarios like disaster management and mobile crowdsensing. We can also introduce an intelligent network slice selection methodology for precise slice allocation to the mission-critical services.