Next Article in Journal
Improved Smart Pillow for Remote Health Care System
Previous Article in Journal
Intelligent Machine Vision Model for Defective Product Inspection Based on Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

MANET Performance Optimization Using Network-Based Criteria and Unmanned Aerial Vehicles

1
Faculty of Applied Mathematics and Control Processes, St. Petersburg State University, University Embankment, 7/9, St Petersburg 199034, Russia
2
Division of Computing Science and Mathematics, University of Stirling, Stirling FK9 4LA, UK
3
Laboratory of Multi-Agent, Distributed and Networked Control Systems, ITMO University, Kronverkskiy Prospekt, 49, St. Petersburg 197101, Russia
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2021, 10(1), 8; https://doi.org/10.3390/jsan10010008
Submission received: 2 December 2020 / Revised: 20 January 2021 / Accepted: 25 January 2021 / Published: 28 January 2021

Abstract

:
In this contribution we consider the problem of optimal drone positioning for improving the operation of a mobile ad hoc network. We build upon our previous results devoted to the application of game-theoretic methods for computing optimal strategies. One specific problem that arises in this context is that the optimal solution cannot be uniquely determined. In this case, one has to use some other criteria to choose the best (in some sense) of all optimal solutions. It is argued that centrality measures as well as node ranking can provide a good criterion for the selection of a unique solution. We showed that for two specific networks most criteria yielded the same solution, thus demonstrating good coherence in their predictions.

1. Introduction

In this paper we consider the problem of optimizing information transmission in self-organizing networks of various configurations using a game-theoretic approach. Self-organization means that the considered networks are formed by agents (transceivers) without any pre-existing network infrastructure (cell towers, routers, etc.) Such mobile networks are commonly referred to as Mobile Ad Hoc Networks (MANET) or Wireless Ad Hoc Networks (WANET) [1]. Since recently, there has been an increased interest in studying such systems, see, e.g., an overview in [1]. One specific direction of study that proved to be very useful in solving different problems related to the optimization of mobile networks consists in the application of game-theoretic methods [2,3]. Another important aspect is related to the resilience analysis of such networks, [4,5,6], see also the papers [7,8], where the issue of network resilience is addressed using the game-theoretic methods.
Often, mobile ad-hoc networks are used in situations when it is necessary to organize communication between groups of people in an area where cellular communication is not available. The application of this technology could potentially save lives. For instance, during search and rescue operations communication between search parties is a key requirement. When natural disasters occur, there is disruption to the communications infrastructure, the faster that communication can be established the faster search efforts can be coordinated. A mobile ad-hoc network does not rely on a predefined communications infrastructure and can be deployed quickly; a further advantage of this network is the mobility of the communicating nodes.
To consider more specific examples, MANETs are widely used to support the actions of rescue groups in mountains, swamps and other difficult-to-pass areas, [9,10]. Some groups use portable equipment to communicate with others. Moreover, due to restrictions on the transmission range of the radio signal, as well as landscape restrictions of the terrain, information often does not go directly, but through other network nodes, which act as intermediaries, broadcasting the message over the network.
When deploying a mobile network it is important to ensure that all agents can enjoy an efficient and stable communication. It is thus of particular importance to develop some approaches aimed at increasing network connectivity. Most results are focused on optimizing the routing protocols as in [11,12], possibly combined with topology management [13]. Among several paper developing alternative approaches we wish to mention [14], where the authors analyzed a MANET formed by unmanned air vehicles (UAV) and considered several approaches for computing the location and movement of UAVs based upon different connectivity models. While the mobile network formed by UAVs enjoys great flexibility, it is often not possible to use a large number of UAVs. There has been a number of papers analyzing the effect of introducing a limited number of UAVs to increase the overall performance of a MANET, see e.g., [15,16,17]. However, these papers consider the problem of placing an UAV in a broader context, without specifically taking into account the topology of a given MANET.
In this contribution we consider a particular problem statement in which the agents belong to several groups [18]. Each group is controlled by the respective control center (which we will refer to as the player later on) and contains a certain fixed set of agents (nodes). Only agents of the same player can transfer information to each other. In the considered variant of the problem, network agents are motionless. Optimization of the network operation is performed by changing its structure by adding new agents to it. Each player has a drone with a transceiver that can be placed in a certain position and connected to the network, and in addition, unlike stationary agents, a drone can interact with agents of any player.
It is to be stressed that the main feature of drones that we exploit in this paper is their mobility. In contrast to nearly static terrestrial nodes, a drone can be placed at any location at players’ will. Most papers on the use of drones do not address the problem of optimal drone location, but rather analyze their transmission, energy or protocol characteristics. The only paper that considers a similar setup is by Han et al. [14]. However, in this paper the authors assume that all agents can be arbitrarily placed, which is quite a strong assumption.
Within the stated research program, there have been several papers dealing with the problem of optimal placing of drones under different assumptions about the players’ strategies, see [18,19,20]. However, as was previously shown, the computed optimal solutions are in general non-unique. Hence, in this paper we address the problem of determining the best in some sense optimal solution based upon certain characteristics developed within the context of network theory [21] (see the recent paper [22] for an example of using different centrality measures). It should be noted that there have been a number of results devoted to the application of methods from network theory to the analysis and optimization of MANETs, see e.g., [23,24,25,26]. However, none of the mentioned works considered the problem of optimizing the interconnection structure of the mobile network.
This paper is organized as follows: Section 2 introduces the mathematical ingredients that are needed to formalize the obtained results. In Section 3, we consider different centrality measures and the node ranking algorithm used in the paper. Section 4 describes the application of considered measures to specific mobile networks, while Section 5 illustrates the obtained results with numerical simulation. The discussion section concludes the paper.

2. Mathematical Model

In the following, the mobile network is considered in the form of a graph. The task is to find positions for the drones of each player in order to maximize the total payoff of the players, where the individual payoff of each player is the amount of decrease in the diameter of its subgraph after the drone is “launched”. Each of the found positions will be the desired strategy of the corresponding player. The problem is solved in a cooperative version, since it is the total gain that is optimized. As a result, there are many optimal solutions that give the same maximum total payoff. Therefore, it is necessary to determine the criterion for selecting a solution. Below, we present the necessary mathematical notation and definitions that will be used in the sequel.

2.1. Game-Theoretic Description of the Problem

We consider the set N = { 1 , , N } of N players and assume that each player i N has a non-empty set A i = { a i j } , j = 1 , , k i , of agents. We associate an agent with its coordinates ( x i j , y i j ) and write a i j = ( x i j , y i j ) . Any agent can communicate with the adjacent agents of the same player.
We further assume that the agents can be located at the vertices of a uniform grid spanning a connected subset of the Euclidean plane X R 2 . In practice, one considers three kinds of grids: the triangular, the Cartesian (integer), and the hexagonal grids, which are formed by arranging the nodes in a mesh of equilateral triangles, squares, and hexagons. This implies, in particular, that in the respective grids an agent can have at most 6, 4, resp. 3 neighbors, i.e., adjacent agents. Henceforth we will denote the set of all admissible coordinates by W X .
While a MANET typically has a dynamic topology, we look at a snapshot of the network at a given point in time. Thus, we assume that the communication network formed by the respective agents does not change with time.
The key aspect of the considered setup consists in the use of drones. Each player has a mobile agent (drone), denoted δ i , at their disposal. This drone can be placed at any point of the grid at player’s will. It is further assumed that a drone can communicate with all agents within its reach and can be used to transmit information by the agents of all players. The considered problem fits well the game-theoretic framework as different players may have stride to achieve distinct, not necessarily aligned goals. Considering the problem from this viewpoint, the player’s strategy corresponds to choosing the location of the drone. The respective optimization problem consists in determining an optimal strategy such that the payoff function of the respective player is maximized. The formal definition of the respective payoff functions will be defined in Section 2.4.

2.2. Network Structure

The considered networks can well be described by undirected graphs as detailed in the following.
An undirected graph G is defined as a tuple G = ( V , E ) , where V is the set of vertices, and E V × V is the set of edges. We let N V denote the number of the vertices and N E the number of edges in the graph, i.e., N V = | V | and N E = | E | . We consider graphs without self-loops, i.e., ( v i , v i ) E for all v i V . The graph is said to be fully connected if any two distinct vertices are connected by an edge. In this case, N E = N V ( N V 1 ) , which is the maximal possible number of edges, denoted N ¯ E .
In a MANET, all vertices correspond to agents and hence are characterized by their physical coordinates. We define a location function σ : V R 2 that associates to any vertex its physical coordinates. As was said above, these coordinates do not need to be the physical coordinates, but can belong to the grid space and hence be restricted to a particular subset of R 2 . There is an edge between two vertices if the respective agents are located in the adjacent nodes of the respective grid. Thus, the set of edges is determined on the basis of the agents’ coordinates. We will reflect this by writing a graph as a triple G = ( V , σ , E σ ) , where the coordinate function is introduced above and the set of edges E σ is defined on the base of vertices adjacency. The definition of σ and E σ depends on the specific aspects of the network realization and will not be addressed here.
In this paper, we will consider the situations when the existing network is extended by an additional vertex (e.g., a drone). We formalize this as follows. Let G = ( V , σ , E σ ) be a graph and w be a vertex that does not belong to the set V . We define the union G ˜ = G { w } to be a new graph with an extended set of vertices V ˜ = V { w } and the accordingly adjusted set of edges E ˜ σ . The union operation can obviously be extended to the case G S , where S is a set of agents S = { s i } i = 1 k . The exclusion operation G = G ˜ \ { w } is defined in a similar way. Note that G ˜ can be disconnected if the location of the added vertex is such that no edge can form between this vertex and the remaining vertices of the graph.
The diameter of the graph G , denoted by D ( G ) , is defined as
D ( G ) = max ( v i , v j ) V × V d ( v i , v j ) ,
where d ( v i , v j ) is the shortest path between two vertices v i and v j . If no such path exists, d ( v i , v j ) = . This implies, in particular, that a disconnected graph has an infinite diameter.

2.3. Mobile Agent: Drone

Each player has a drone δ i at their disposal. The drone can be placed at any admissible point in W. While all the (stationary) agents have fixed coordinates, the position of the moving agent δ i , i N can be changed during the game. The edge between the moving agent and another agent is defined on the base of adjacency, similarly to the way the edges between the stationary agents are formed. In general, the moving agent δ i can have a larger transmissibility radius and hence can establish a link with other moving agents δ j and other stationary agents v i p A i , i N , that are located at a larger distance. However, this formulation does not lead to a substantial improvement in terms of theoretical analysis, except for increased notation. We thus stick to the original formulation in which a drone can communicate only with the adjacent vertices.
The set of all drones is denoted by by Δ = { δ i } i = 1 N and the set of all drones except the ith one by Δ i = Δ \ { δ i } .

2.4. Optimization Problem

For any type of communication structure the ith player solves the following optimization problem:
q ¯ i = arg min q i W i D ( G i , V i ) ,
where G is the extended graph and W i = W \ Q i is the set of admissible locations for the ith drone. The latter notation means that a drone cannot be placed at the position currently occupied by another drone. We have G i = G i Q , that is each player aims at placing its moving agent q i such that it minimizes the diameter of the player’s graph. Note that the drones themselves are not considered when computing the diameter of the graph as they are not assumed to be the sources of any useful information, but merely transmit information between the agents. Within this framework, we assume that each drone can be used by the agents of any player, i.e., the players cooperate through the collective use of transmission capabilities provided by drones.
Accordingly, the pay-off (utility) function of the ith player is defined as the difference between the diameter of the respective graph before placing the drone and afterwards:
H i ( G , Q ) = D ( G i , V i ) D ( G i , V i ) 0 ,
where G i ¯ = G i S Q . Note that the pay-off function is always non-negative as the drone is not considered when computing the diameter and hence cannot increase its value.
Within a game-theoretical framework one typically considers one of two possible optimal solutions: cooperative solution and a Nash equilibrium solution. The former one corresponds to the case when all players act together and aim at maximizing their total pay-off, while the latter one appears when each player maximizes their own pay-off function. In [18,19,20], the problem of determining the Nash equilibrium and best-reply solutions was was studied in detail within the framework of multi-stage and one-stage (static) games.
One specific issue that arose in the context of game-theoretic analysis of the problem consists in the non-uniqueness of the obtained solution. While this fact does not restrict the application of suggested techniques, it is desirable to exploit the additional degree of freedom that appears because of this non-uniqueness.
Specifically, we consider the cooperative scenario in which the players aim at maximizing their joint profit. In most considered problems the solution turns out to be non-unique, that is there are several possible positions for the drones that result in the same decrease in the network diameter. We thus consider several possibilities to further improve the performance of the overall mobile network using the methods from network theory as specified in the subsequent sections.

3. Centrality Measures and Node Ranking

After finding the set of optimal solutions to the problem, the question arises-how to choose the only solution? To answer it, it is necessary, first, to pay attention to the contribution of the installed drones to the speed of information transfer in the network as a whole. Secondly, one has to go beyond the stated goal and pay attention to other aspects of the system’s functioning. One of the most important of these aspects is the resilience of the network to the failure of some nodes. For example, if the most “extreme” node that interacts with only one of the nodes fails, then the interaction within the rest of the network will not be disrupted in any way. But if the failed node turns out to be the only one connecting between two separate parts of the network, then the structure will split in two parts that will not be able to interact with each other. Accordingly, the drone should be placed in a position that, to some extent, preserves the overall structure of the network when the central nodes fail. Both of these tasks-improving the operation of the network as a whole and increasing its resilience to breakdowns can be solved simultaneously using the measures of centrality [21] of network nodes.
Measures of centrality of network nodes allow to determine the value of the “contribution” that each of the nodes makes to the overall structure. The larger this value is, the more important the node is from the point of view of the network structure. That is to say, if it fails (i.e., when the corresponding vertex is removed from the network graph), the interaction of the remaining nodes will be significantly disrupted.
To evaluate the contribution of the respective node we will use different centrality measures. Below we consider several most widely used centrality measures. The simplest one the number of neighbors of a node, called the degree centrality:
C D ( v ) = deg ( v ) ,
where deg ( v ) is the number of neighbors of the vertex v V . In Figure 1, three different centrality measures are shown for a sample graph. Apart from degree centrality, also the betweenness centrality and closeness centrality, described below, are shown.
The next measure called the betweenness centrality appears to be better suited for this problem as it addresses the problem of optimizing the transmission of information in the network as a whole, as well as the requirement described above to preserve the structure of the network in the event of failure of the key nodes that gate the largest amount of information. When calculating this measure, the shortest paths between different pairs of nodes in the network are considered, while taking into account which nodes these paths pass through. The more shortest paths pass through a certain node, the greater its measure of centrality from the point of view of information transmission, since routing algorithms calculate exactly the shortest possible paths in the network. Thus, the formula for calculating this measure is as follows:
C B ( v ) = s v t π s t ( v ) π s t ,
where π s t ( v ) is the number of the shortest paths between nodes s and t passing through the node v, and π s t is the total number of shortest paths between nodes s and t.
Finally, the last measure, called the closeness centrality, measures the centrality of nodes by determining how close a node is to the others. The degree of closeness of a node in the network is thus computed as the inverse value of the sum of its distances to all other nodes:
C C ( v ) = 1 u v dist ( u , v ) ,
where the distance function dist ( u , v ) is defined in an appropriate way. For instance, for the mobile network defined on a Manhattan grid, the distance between two nodes can be taken as the Euclidean distance.
  PageRank  
The PageRank algorithm [27] can be seen as an extension of the centrality measures described above. The idea of this algorithm is that any node has its value that it shares with all neighboring nodes and itself in equal proportion (sometimes the share of the value that the node shares with itself is assumed to be slightly larger: this is controlled by the parameter α ). To describe this formally, we introduce the normalized adjacency matrix A ˜ ( G ) of the graph G, whose elements are defined as follows:
a i j = α , i = j 1 deg ( j ) , ( i j ) E ( G ) 0 , ( i j ) E ( G ) .
The values of the nodes are thus obtained as the solution of the fixed point problem A ˜ ( G ) w = w or, put differently, w = N ( I A ˜ ( G ) ) , where N denotes the null space. Note that there are some modifications of the described scheme aimed at improving its numerical stability. However, these differences will not be addressed in this contribution.
Figure 2 illustrates the application of the PageRank algorithm to the same sample graph as in Figure 1c.

4. Results

4.1. First Mobile Network

To illustrate the described approach we consider a specific configuration of the mobile network shown in Figure 3.
There, two sets of agents, indicated by dark red and yellow circles, form two networks. This scheme illustrates a rather common situation when a group of agents is deployed to a difficult region where there are some obstacles preventing the group from forming a dense mobile network. The goal of the players is to place the drones in the way that the sum of the respective payoff is maximal. We recall that the payoffs of the players are defined as the decrease in the diameter of the network after placing the drones, (2). The original diameters of the respective networks are D ( R 1 ) = 15 and D ( R 2 ) = 16 .
The described optimization problem has 4 solutions which are presented in Table 1. Two of the listed solutions are shown in Figure 4.
Thus, one faces the problem that was mentioned above: there are several optimal solutions that yield the same value of the total payoff function. To chose a unique solution we use different centrality measures introduced above. Table 2 contains the values of several centrality measures computed for specific positions of the drones. In there, we considered only two cases as the remaining two are equivalent to the original ones up to relabeling the drones.
One can see that while Degree centrality is not informative as it yields the same result for all positions, other centrality measures allow to distinguish between two positions. It can also be observed that while both the betweenness centrality and closeness centrality indicate that the second solution is better in terms of the respective measures, the rank of the second solution is slightly smaller than the rank of the first solution. This apparent contradiction disappears if we consider the normalized ranks of the nodes, i.e., the ranks divided by the maximal rank over all nodes. In this case, the normalized rank of the first solution is equal to 0.054 0.079 = 0.676 , while the normalized rank of the second solution is 0.053 0.077 = 0.680 , which is larger than the preceding number. It should be noted that both betweenness and closeness centrality measures the normalized values demonstrate the same order pattern: the normalized centrality measures for the second solution are larger than those of the first solution. Thus we conclude that the second solution outperforms the first one in terms of both centrality measures and PageRank weights.

4.2. Second Mobile Network

To provide a further illustration we consider a different configuration of the mobile network shown in Figure 5. There, two sets of agents, indicated by dark blue and light blue circles, form two networks. The original diameters of the respective networks are D ( R 1 ) = 10 and D ( R 2 ) = 14 .
Similar to the previous case, there are 4 optimal solutions. Two of them are shown in Table 3, the remaining two are obtained by interchanging the roles of the drones. The respective positions of the drones are shown in Figure 6.
However, the considered situation differs quite a lot from the previous case in that the position of drones influences the respective subgraphs to a different extent. While the first strategy results in a dramatic reduction of the diameter of the second subgraph, the diameter of the first subgraph remains unchanged. The second strategy is more balanced in contrast to the first one: it reduces the diameters of both graphs, but to a lesser extent.
Similarly to the previous case, the respective centrality measures for both drones are presented in Table 4. We present the computed characteristics for each subgraph separately. It can be readily seen that the centrality measures differ quite a lot for both subgraphs: for the first solution the centrality measures of the respective are quite small for the first subgraph (with the only exception for the rank of the first drone) and somewhat larger for the second subgraph (there is a substantial increase in Betweenness centrality). However, the second solution yields a substantial increase in all centrality measures compared to the first solution.
It is worth noting that while the first solution was locally better than the second one, the total value of all centrality measures corresponding to the second solution substantially exceeded the respective characteristics computed for the first solution. The numerical analysis supports the conclusion that the second solution results in a better overall performance than the first one.
We thus conclude that the total value of the respective centrality measure can serve as an appropriate measure for determining the better among several alternative choices.

5. Numerical Simulation

5.1. Simulation Environment

In this work, the NS-3 network simulator [28,29] was chosen as the simulation environment. NS-3 is a discrete event simulator that was designed to provide an open, flexible network modeling platform for research and education. NS-3 can be used to model various packet data networks and simulate their work. This tool is widely used to study the operation of large networks, as well as a validation tool for analytical models and algorithms under study. The network simulator allows one to conduct experiments without the need to deploy a real network, which can significantly reduce costs, reduce the labor intensity of the process and ensure sufficient speed and efficiency in organizing the simulation.
While the existing models set in NS-3 focus on simulating the operation of internet protocols and networks, the simulator is not limited to internet systems: it is possible to use NS-3 to simulate non-internet systems such as human behavior in society, analysis of the epidemiological dynamics, transport system functioning, etc. This flexibility is determined by the modular structure the simulator, which is designed as a set of libraries that can be combined with each other as well as with other external software libraries. The NS-3 can also use external animators and data analysis and visualization tools.

5.2. Problem Formulation and Analysis

The simulation model was written in C ++ using third party libraries provided by the NS-3 simulator. The program takes as input the file that has the following format: the first line is the number of nodes in the network. Next come the coordinates of all the nodes of the network to be simulated. The rest of the file contains the binary adjacency matrix A of all network nodes. The adjacency matrix is formed on the basis of the physical location of the nodes in the considered network.
We use the reactive topology-based table-driven protocol DSDV as it may be considered as a good choice when network contains not too many nodes [30]. It should be noted that routing protocol selection is a hot area in MANET/FANET performance optimisation, see for example [31]. The problem of choosing the most appropriate protocol remains open and will be addressed in our future work.
We consider two scenarios illustrating the above concept, i.e., the nodes chosen accordingly for Network 1 (see Section 4.1) and Network 2 (see Section 4.2). The physical distance between the agents is measured in units that are equal to 100 meters. We used Internet protocols setting for data transmission as well as the Friis propagation loss model [32]. The latter model is good for the line-of-sight free space propagation.
In order to analyze the quality of the constructed network, it is necessary to choose a specific characteristic that can be used to evaluate the performance of the system. The transmission parameters were set such that the nodes at distance 100 m from each other get clear connection, and the transmission decays fast for the distances above that. This was necessary to realistically test conditions of theoretical Networks 1 and 2, and we used the parameters indicated in Table 5. A part of the presented results was previously demonstrated in [33].
We have chosen information delivery ratio, i.e., the ration of successfully received bytes to transmitted bytes as the network performance measure. The required information can be obtained using the built-in technology for monitoring flows in the NS-3 network. Namely, we use the Flow Monitor module which is developed to provide a flexible system for measuring the performance of network protocols. The module uses sensors installed in network nodes to track packets exchanged between nodes, thus providing required information on the amount of data successfully sent and received.
During the execution of the program, information about all flows that traverse the network is stored in the .flowmon file. From there, one can observe at what point in the simulation time the stream began, at what time it ended, how many packets were transmitted during the data transfer, and of what size.
For either theoretical network, both sources and sinks were randomly allocated to the regular nodes using uniform distribution, and 100 simulation have been run to obtain the mean packet delivery ratio. Furthermore, to simulate a realistic process of data transmission the number of packages sent was chosen to be high enough such that the networks gets congested. In such a situation, there are numerous packets that get lost, resp., are dropped due to many reasons such as buffer overflow, insufficient room in pending queue, packet damage etc. In this way we emulated a realistic scenario in which agents send and receive large amounts of data such a video streams.
For both Networks 1 and 2 we have compared two solutions, both Pareto-optimal solution, but different according to centrality measures.

5.2.1. Simulation Results for Network 1

For the network described in Section 4.1, the results for both agents shown an improvement of slightly less than 2%: for the solution ( 3 ; 4 ) / ( 3 ; 3 ) the sent-to-receive ratio was 0.3262 , while the solution ( 4 ; 4 ) / ( 4 ; 3 ) corresponded to the sent-to-receive ratio equal to 0.3302 (both numbers rounded to the fourth digit). This minute improvement can be attributed to the fact that both solutions are rather similar and hence do not allow to clearly see the difference. In contrast to Network 1, the case described in the next subsection correspond to the solutions that are structurally very different. In this case, the improvement is better pronounced as demonstrated below.

5.2.2. Simulation Results for Network 2

The resulted simulation data are visualized in Figure 7 (see Supplementary Materials for more details). This Figure contains aggregated information for both Players separately and also provides the average performance characteristic of the whole system. We recall that we simulated two solutions, ( 5 ; 3 ) / ( 5 ; 4 ) and ( 4 ; 4 ) / ( 5 ; 4 ) . Both solutions yielded the same improvement in the diameter of the overall network, but the second solution was better according to the centrality measures. One can see that the second solution brought an approximate 14% increase in information delivery ratio for Player 1, approximate 2% increase for Player 2, and 7% increase for the whole of the network. All the data were average over 100 simulations with uniformly distributed sources and destinations.
Thus the numerical results indicate that the solution ( 4 ; 4 ) / ( 5 ; 4 ) does indeed yields a substantial performance improvement for the total network. It is interesting to note that while the first solution resulted in a larger decrease of diameter than the second one, it did not lead to any substantial improvement in received-to-sent ratio. This might indicate that the performance of the network can depend on the network diameter in a more complex way that was initially assumed. This aspect requires a thorough investigation with a larger set of test networks.

6. Discussion

In this contribution we considered the problem of determining the best solution to the problem of mobile agent (drone) placement in a mobile ad-hoc network. Typically, the optimal position of a drone is chosen to minimize the diameter of the network. However, as was often demonstrated in other papers, such solution can be non-unique. In this case, the additional degree of freedom can be exploited to increase the quality of the network even further performing a higher-order optimization with respect to additional criteria. We studied different centrality measures and also PageRank weights of the nodes. It was shown that while the degree centrality did not provide any useful information, both betweenness and closeness centrality agreed with PageRank and yielded the solution that was both more resilient and also outperformed the alternative one. Further, it has been shown that when the subgraphs of the respective players are different, the total value of the centrality measures can be used to choose the better solution. This is a promising illustration of how the optimization procedure introduced previously could be better improved by considering centrality measures.
While the obtained results were demonstrated for relatively small mobile networks, it remains open if the observed regularities can be extended to larger networks, in particular networks with a less regular structure. The analysis of large networks of a general structure will be carried out in our future work. It is hoped that such analysis can not only help improving the performance of mobile networks, but can also shed a new light to the role and function of different centrality measures.
Another direction of future investigations will consist in establishing the connection between the computed network characteristics and the actual performance of the network evaluated in terms of amount of information transferred and received, minimal time required for transmitting a fixed amount of information between two nodes and so on. It is expected that these performance criteria strongly depend on the protocols used in the network. This interplay adds to the complexity of the considered problem and will be the subject our future analysis.

Supplementary Materials

The following are available at https://www.mdpi.com/2224-2708/10/1/8/s1.

Author Contributions

Conceptualization, E.V.G.; methodology, E.V.G. and D.G.; software, S.K.; validation, A.K. and D.G.; formal analysis, E.V.G., S.K. and D.G.; investigation, S.K. and A.L.; resources, A.K.; data curation, S.K. and A.K.; writing–original draft preparation, S.K. and D.G.; writing–review and editing, E.V.G. and D.G..; visualization, S.K., A.L. and A.K.; supervision, D.G.; project administration, E.V.G.; funding acquisition, E.V.G. All authors have read and agreed to the published version of the manuscript.

Funding

The reported study was supported by RFBR according to the research project N 18-00-00727 (18-00-00725) and by the Government of the Russian Federation under Grant 08-08.

Data Availability Statement

Data is contained within the see Supplementary Materials.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bang, A.O.; Ramteke, P.L. MANET: History, challenges and applications. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2013, 2, 249–251. [Google Scholar]
  2. Han, Z.; Niyato, D.; Saad, W.; Başar, T.; Hjørungnes, A. Game Theory in Wireless and Communication Networks: Theory, Models and Applications; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  3. Novikov, D.A. Games and networks. Autom. Remote Control 2014, 75, 1145–1154. [Google Scholar] [CrossRef]
  4. Jen, S.M.; Laih, C.S.; Kuo, W.C. A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors 2009, 9, 5022–5039. [Google Scholar] [CrossRef] [PubMed]
  5. Chaubey, N.; Aggarwal, A.; Gandhi, S.; Jani, K.A. Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size. In Proceedings of the Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on IEEE, Haryana, India, 21–22 February 2015; pp. 320–324. [Google Scholar] [CrossRef]
  6. Pathan, M.S.; Zhu, N.; He, J.; Zardari, Z.A.; Memon, M.Q.; Hussain, M.I. An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 2018, 10, 16. [Google Scholar] [CrossRef] [Green Version]
  7. Li, F.; Yang, Y.; Wu, J. Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. Syst. Man Cybern. Part B Cybern. IEEE Trans. 2010, 40, 612–622. [Google Scholar] [CrossRef]
  8. Li, F.; Wu, J. Hit and run: A Bayesian game between malicious and regular nodes in MANETs. In Proceedings of the Sensor, Mesh and Ad Hoc Communications and Networks, 2008 SECON’08, 5th Annual IEEE Communications Society Conference on IEEE, San Francisco, CA, USA, 16–20 June 2008; pp. 432–440. [Google Scholar] [CrossRef]
  9. Anjum, S.S.; Noor, R.M.; Anisi, M.H. Survey on MANET based communication scenarios for search and rescue operations. In Proceedings of the IT Convergence and Security (ICITCS), 2015 5th International Conference on IEEE, Kuala Lumpur, Malaysia, 24–27 August 2015; pp. 1–5. [Google Scholar] [CrossRef]
  10. Erim, O.; Wright, C. Optimized mobility models for disaster recovery using UAVs. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, Montreal, QC, Canada, 8–13 October 2017; pp. 1–5. [Google Scholar]
  11. Adoni, K.A.; Joshi, R.D. Optimization of energy consumption for OLSR routing protocol in MANET. Int. J. Wirel. Mob. Netw. 2012, 4, 251. [Google Scholar] [CrossRef]
  12. Anand, M.; Sasikala, T. Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol. Clust. Comput. 2019, 22, 12681–12687. [Google Scholar] [CrossRef]
  13. Devika, B.; Sudha, P. Power optimization in MANET using topology management. Eng. Sci. Technol. Int. J. 2020, 23, 565–575. [Google Scholar] [CrossRef]
  14. Han, Z.; Swindlehurst, A.L.; Liu, K.R. Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles. IEEE Trans. Veh. Technol. 2009, 58, 3533–3546. [Google Scholar] [CrossRef]
  15. Sahingoz, O.K. Mobile networking with UAVs: Opportunities and challenges. In Proceedings of the 2013 International Conference on Unmanned Aircraft Systems (ICUAS), IEEE, Atlanta, GA, USA, 28–31 May 2013; pp. 933–941. [Google Scholar]
  16. Lysenko, O.I.; Uriadnikova, I.V.; Valuiskyi, S.V.; Chumachenko, S.M.; Kirchu, P.I.; Semenchenko, A.I. Increasing of MANET throughput using quasi-optimal UAVs placement control. Sci. Mil. J. 2013, 8, 24. [Google Scholar]
  17. Larsen, E.; Landmark, L.; Kure, Ø. The Effects of a UAV on a Terrestrial MANET. In Proceedings of the MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), IEEE, Los Angeles, CA, USA, 29–31 October 2018; pp. 816–821. [Google Scholar]
  18. Blakeway, S.; Gromov, D.; Gromova, E.; Kirpichnikova, A.; Plekhanova, T. Increasing the performance of a Mobile Ad-hoc Network using a game-theoretic approach to drone positioning. Vestn. Saint Petersb. State Univ. Appl. Math. Comput. Sci. Control Process. 2019, 15, 22–38. [Google Scholar] [CrossRef]
  19. Gromova, E.; Gromov, D.; Timonin, N.; Kirpichnikova, A.; Blakeway, S. A dynamic game of Mobile Agent placement in a MANET. In Proceedings of the 2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS), IEEE, Riga, Latvia, 1–3 June 2016; pp. 153–158. [Google Scholar] [CrossRef]
  20. Plekhanova, T.; Gromova, E.; Gromov, D.; Blakeway, S.; Kirpichnikova, A. The strategic placement of mobile agents on a hexagonal graph using game theory. In Proceedings of the 2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT), IEEE, Sarajevo, Bosnia-Herzegovina, 26–28 October 2017; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  21. Newman, M. Networks, 2nd ed.; Oxford University Press: Oxford, UK, 2018. [Google Scholar]
  22. Vignery, K.; Laurier, W. A methodology and theoretical taxonomy for centrality measures: What are the best centrality indicators for student networks? PLoS ONE 2021, 15, e0244377. [Google Scholar] [CrossRef]
  23. Daly, E.M.; Haahr, M. Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing, Montreal, QC, Canada, 9–14 September 2007; pp. 32–40. [Google Scholar]
  24. Souihli, O.; Frikha, M.; Hamouda, M.B. Load-balancing in MANET shortest-path routing protocols. Ad Hoc Netw. 2009, 7, 431–442. [Google Scholar] [CrossRef]
  25. Zhang, D.; Cetinkaya, E.K.; Sterbenz, J.P. Robustness of mobile ad hoc networks under centrality-based attacks. In Proceedings of the 2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, Almaty, Kazakhstan, 10–13 September 2013; pp. 229–235. [Google Scholar]
  26. Pushpalatha, M.; Ramarao, T.; Venkataraman, R. Applicability of sub graph centrality to improve data accessibility among peers in MANETs. Peer Peer Netw. Appl. 2014, 7, 129–146. [Google Scholar] [CrossRef]
  27. Brin, S.; Page, L. The Anatomy of a Large-Scale Hypertextual Web Search Engine. Comput. Netw. 1998, 30, 107–117. [Google Scholar] [CrossRef]
  28. Henderson, T.R.; Lacage, M.; Riley, G.F.; Dowell, C.; Kopena, J. Network simulations with the NS-3 simulator. In Proceedings of the SIGCOMM, Washington, DC, USA, 17–22 August 2008; p. 527. [Google Scholar]
  29. Riley, G.F.; Henderson, T.R. The NS-3 network simulator. In Modeling and Tools for Network Simulation; Springer: Berlin, Germany, 2010; pp. 15–34. [Google Scholar]
  30. Khan, M.F.; Yau, K.L.A.; Noor, R.M.; Imran, M.A. Routing Schemes in FANETs: A survey. Sensors 2020, 20, 38. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Tan, X.; Zuo, Z.; Su, S.; Guo, X.; Sun, X.; Jiang, D. Performance Analysis of routing Protocols for UAV Communication Networks. IEEE Access 2020, 8, 92212–92224. [Google Scholar] [CrossRef]
  32. Friis, H.T. A note on a simple transmission formula. Proc. IRE 1946, 34, 254–256. [Google Scholar] [CrossRef]
  33. Golubeva, M. On the Sharing of Nodes in a Decentralized Wireless Self-Organizing Network. Ph.D. Thesis, St. Petersburg State University, St Petersburg, Russia, 2020. [Google Scholar]
Figure 1. This figure illustrates three different centrality measures for a sample graph. The sizes of the vertices are proportional to the respective measures. All measures are normalized such that the maximal values are equal for all measures. Schemes follow the same formatting. The respective measures are: (a) Degree centrality. (b) Betweenness centrality. (c) Closeness centrality.
Figure 1. This figure illustrates three different centrality measures for a sample graph. The sizes of the vertices are proportional to the respective measures. All measures are normalized such that the maximal values are equal for all measures. Schemes follow the same formatting. The respective measures are: (a) Degree centrality. (b) Betweenness centrality. (c) Closeness centrality.
Jsan 10 00008 g001
Figure 2. The illustration of the PageRank ranking algorithm.
Figure 2. The illustration of the PageRank ranking algorithm.
Jsan 10 00008 g002
Figure 3. Initial position of the network. Sub-graph diameters D ( R 1 ) = 15 and D ( R 2 ) = 16 .
Figure 3. Initial position of the network. Sub-graph diameters D ( R 1 ) = 15 and D ( R 2 ) = 16 .
Jsan 10 00008 g003
Figure 4. Two optimal strategies yielding the same value of the total payoff function. There are two more equally optimal solutions that differ from the shown ones by the reverse order of the drones. (a) strategy (3; 4)/(3; 3); (b) strategy (4; 4)/(4; 3).
Figure 4. Two optimal strategies yielding the same value of the total payoff function. There are two more equally optimal solutions that differ from the shown ones by the reverse order of the drones. (a) strategy (3; 4)/(3; 3); (b) strategy (4; 4)/(4; 3).
Jsan 10 00008 g004
Figure 5. Initial position of the network. The nodes of Player 1 and Player 2 are indicated by dark blue, resp. light blue. Subgraph diameters D ( R 1 ) = 10 and D ( R 2 ) = 14 .
Figure 5. Initial position of the network. The nodes of Player 1 and Player 2 are indicated by dark blue, resp. light blue. Subgraph diameters D ( R 1 ) = 10 and D ( R 2 ) = 14 .
Jsan 10 00008 g005
Figure 6. Two optimal strategies yielding the same value of the total payoff function. (a) strategy (5; 4)/(5; 3); (b) strategy (5; 4)/(4; 4).
Figure 6. Two optimal strategies yielding the same value of the total payoff function. (a) strategy (5; 4)/(5; 3); (b) strategy (5; 4)/(4; 4).
Jsan 10 00008 g006
Figure 7. Two diagrams illustrate the improvement in Network 2 performance for the individual networks of Player 1, resp., Player 2, and the total network. Subfigure (a) shows the average bytes received for both Pareto optimal solutions (5;3)–(5;4) (dark green) and (4;4)–(5;4) (darker blue). The second histogram in Subfigure (b) illustrates differences in received to sent ratio.
Figure 7. Two diagrams illustrate the improvement in Network 2 performance for the individual networks of Player 1, resp., Player 2, and the total network. Subfigure (a) shows the average bytes received for both Pareto optimal solutions (5;3)–(5;4) (dark green) and (4;4)–(5;4) (darker blue). The second histogram in Subfigure (b) illustrates differences in received to sent ratio.
Jsan 10 00008 g007
Table 1. Optimal strategies: Network 1.
Table 1. Optimal strategies: Network 1.
StrategyDrone of the 1st PlayerDrone of the 2nd PlayerPayoff Function
1(3; 4)(3; 3)(6; 6)
2(4; 4)(4; 3)(6; 6)
3(3; 3)(3; 4)(6; 6)
4(4; 3)(4; 4)(6; 6)
Table 2. Centrality measures computed for two optimal positions of the drones. The respective values for the first and the second drone are separated by a slash: C x ( δ 1 ) / C x ( δ 2 ) .
Table 2. Centrality measures computed for two optimal positions of the drones. The respective values for the first and the second drone are separated by a slash: C x ( δ 1 ) / C x ( δ 2 ) .
1st Drone2nd DroneDegree CentralityBetweenness CentralityCloseness CentralityPageRank
(3; 4)(3; 3)2/242/420.016/0.0160.054/0.054
(4; 4)(4; 3)2/245.5/45.50.018/0.0180.053/0.053
Table 3. Optimal strategies: Network 2.
Table 3. Optimal strategies: Network 2.
StrategyDrone of the 1st PlayerDrone of the 2nd PlayerPayoff Functions
1(5; 4)(5; 3)(0; 6)
2(5; 4)(4; 4)(3; 3)
Table 4. Centrality measures computed for two optimal positions of the drones. The respective values for the first and the second drone are separated by a slash: C x ( δ 1 ) / C x ( δ 2 ) . Normalized values of PageRank measures are shown in round brackets.
Table 4. Centrality measures computed for two optimal positions of the drones. The respective values for the first and the second drone are separated by a slash: C x ( δ 1 ) / C x ( δ 2 ) . Normalized values of PageRank measures are shown in round brackets.
1st Drone2nd DroneDegree
Centrality
Betweenness
Centrality
Closeness
Centrality
PageRankSubgraph
(5; 4)(5; 3)2/112/00.016/0.0130.08/0.045
(0.722/0.403)
1
2/237/360.015/0.0150.055/0.055
(0.669/0.670)
2
(5; 4)(4; 4)2/217.7/21.70.025/0.0280.067/0.065
(0.659/0.636)
1
2/328/60.50.018/0.0210.051/0.071
(0.65/0.916)
2
Table 5. Simulation parameters.
Table 5. Simulation parameters.
ParameterValue
Transmission Radius105
Number of Nodes (player 1)16 (Network 1) and 12 (Network 2)
Number of Nodes (player 2)17
Physical ModeDSSS at 11 Mbps
Transfer RateCBR at 11 Mbps
Routing ProtocolDSDV
Transport ProtocolUDP
Propagation modelFriisPropagationLossModel
Simulation time100 sec.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gromova, E.V.; Kireev, S.; Lazareva, A.; Kirpichnikova, A.; Gromov, D. MANET Performance Optimization Using Network-Based Criteria and Unmanned Aerial Vehicles. J. Sens. Actuator Netw. 2021, 10, 8. https://doi.org/10.3390/jsan10010008

AMA Style

Gromova EV, Kireev S, Lazareva A, Kirpichnikova A, Gromov D. MANET Performance Optimization Using Network-Based Criteria and Unmanned Aerial Vehicles. Journal of Sensor and Actuator Networks. 2021; 10(1):8. https://doi.org/10.3390/jsan10010008

Chicago/Turabian Style

Gromova, Ekaterina V., Sergei Kireev, Alina Lazareva, Anna Kirpichnikova, and Dmitry Gromov. 2021. "MANET Performance Optimization Using Network-Based Criteria and Unmanned Aerial Vehicles" Journal of Sensor and Actuator Networks 10, no. 1: 8. https://doi.org/10.3390/jsan10010008

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop