Next Article in Journal
Achieving a Balanced Knee in Robotic TKA
Next Article in Special Issue
Intelligent Dynamic Real-Time Spectrum Resource Management for Industrial IoT in Edge Computing
Previous Article in Journal
An Optimal Parameter Selection Method for MOMEDA Based on EHNR and Its Spectral Entropy
Previous Article in Special Issue
An Energy-Efficient Unselfish Spectrum Leasing Scheme for Cognitive Radio Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling and Performance Analysis of Opportunistic Link Selection for UAV Communication

School of Aerospace, Transport and Manufacturing, Cranfield University, Cranfield MK43, UK
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(2), 534; https://doi.org/10.3390/s21020534
Submission received: 26 October 2020 / Revised: 17 December 2020 / Accepted: 9 January 2021 / Published: 13 January 2021
(This article belongs to the Special Issue Advances in Cognitive Radio Networks)

Abstract

:
In anticipation of wide implementation of 5G technologies, the scarcity of spectrum resources for the unmanned aerial vehicles (UAVs) communication remains one of the major challenges in arranging safe drone operations. Dynamic spectrum management among multiple UAVs as a tool that is able to address this issue, requires integrated solutions with considerations of heterogeneous link types and support of the multi-UAV operations. This paper proposes a synthesized resource allocation and opportunistic link selection (RA-OLS) scheme for the air-to-ground (A2G) UAV communication with dynamic link selections. The link opportunities using link hopping sequences (LHSs) are allocated in the GCSs for alleviating the internal collisions within the UAV network, offloading the on-board computations in the spectrum processing function, and avoiding the contention in the air. In this context, exclusive technical solutions are proposed to form the prototype system. A sub-optimal allocation method based on the greedy algorithm is presented for addressing the resource allocation problem. A mathematical model of the RA-OLS throughput with above propositions is formulated for the spectrum dense and scarce environments. An interference factor is introduced to measure the protection effects on the primary users. The proposed throughput model approximates the simulated communication under requirements of small errors in the spectrum dense environment and the spectrum scarce environment, where the sensitivity analysis is implemented. The proposed RA-OLS outperforms the static communication scheme in terms of the utilization rate by over 50% in case when multiple links are available. It also enables the collaborative communication when the spectral resources are in scarcity. The impacts from diverse parameters on the RA-OLS communication performance are analyzed.

1. Introduction

Unmanned aerial vehicles (UAVs) are gaining popularity in civil, commercial, and military services due to their mobility, flexibility, and ease of deployment. Given the fact that without holding valid spectrum licenses, most UAVs operate on the industry, scientific, and medical (ISM) band [1] or a mixture of those bands. Lacking the monitoring of the spectrum utilization leading to more spectrum conflicts toward existing users, the supervision of UAV communication behavior is major challenge in the federal aviation administration (FAA) [2]. Meanwhile, the multi-link operational concept (MLOC) [3] applied for the heterogeneous aeronautical network, such as the dual links with SatComm and cellular link [4], and mmWave with cmWave [5], is promising to increase the communication resilience. Moreover, MLOC ensures the reliability of UAV operations at the cost of the occupying multiple heterogeneous link resources dynamically.
The conventional aeronautical communication including the backhaul transmission typically applies static link solutions. The aeronautical telecommunication network (ATN) standard regulated by the international civil aviation organization (ICAO)is mostly adopted to support the aircraft ground-to-ground (G2G), air-to-ground (A2G) and avionic data exchange [6]. The TCP/IP suite of protocols and open systems interconnection (OSI) protocol stack are used to form the prototype ATN. Some ATNs are highlighted, such as the controller pilot data link communications (CPDLC), automatic dependent surveillance (ADS), flight information service (FIS), and data link in aircraft communications addressing and reporting system (ACARS) [7]. Nevertheless, the above solutions are originally designed for licensed operators and the access procedures are complex for UAVs. Additionally, the typical ATN is difficult to embrace heterogeneous UAV platforms and multiple data link types resulted by the mission-driven feature. Some common links are highlighted: short-range links of Bluetooth, Wifi, Zigbee/Xbee, WiMAX, UWB; medium-range link of AeroMACs; and long or worldwide range services of GSM, LTE, SatComm. Given the fact that no dominant regulations exist in the diverse communication links [2], there is a need of re-thinking the current ATN solution and proposing an integrated communication solution for UAV control and non-payload communications (CNPC) data links.
To achieve the sufficient exploitation of spectrum resources and manage the collaborative communication among multiple UAVs, two feasible technologies in the cognitive communication are highlighted. The the opportunistic spectrum access (OSA) aims at addressing the spectrum access problem, while the spectrum sharing is for coordinating spectrum resources among multiple users. The above approaches are successfully applied in cognitive radio networks (CRNs), vehicle-to-everything (V2X), Internet of things (IoTs), and cellular networks [8].
OSA allows secondary users, i.e., UAVs in this case, to occupy spectrum resources in an opportunistic manner under a presumption of causing non-interference to primary users. As an interweave mode in CRN concept [9], typical OSA employs a listening-before-transmission mechanism [10], where the spectrum sensing phase is required before each transmission to protect PUs [10,11,12]. The authors in [11] proposed an efficient spectrum sensing enabled OSA scheme for the ultra-dense operations, and discussed the determination of spectrum processing time where the priority control mechanism is employed. The authors in [12] investigated the trade-off problem between the saturation throughput and sensing time, where the optimization of spectrum sensing time is addressed by fusing collaborative sensor outcomes.
Dynamic spectrum allocation or assignment schemes for the spectrum sharing is extensively studied especially under the TV bands [13]. The spectrum allocation can be grouped into two categories, i.e., the central authority based structure and distributed structure [14]. The centralized communication networks require a coordinator and are enabled with an exclusive common control channel for delivering the access or the scheduling model. For instance, authors in [13] presented a channel assignment scheme in the link layer utilizing the layer graph to achieve a global optimized performance. Authors in [15] presented a modified game theory approach for maximizing the spectrum resources on account of the priority of sensing data and reduction of spectrum handoff. On the other hand, the distributed spectrum allocation requires a reporting and negotiation phase before each transmission to tackle the contention problem and avoid internal collisions. Some methods are highlighted, such as the exhaustive search enabled overlapping algorithm for the contention resolution [16], joint pricing enabled with the game theory for the collaborative spectrum allocation [17], and a size-negotiable auction-based allocation scheme [18]. Given the constraint computation power in the UAV processors, the computation loads can be mitigated with the centralized communication scheme. In specific, the link scheduling and link collision avoidance are offloaded to the terrestrial stations from the airborne.
The media access control (MAC) controls the hardware and makes the frequency or channel hopping (link hopping in this case) possible. Several capabilities can be achieved in the MAC layer, such as the optimization of the energy consumption, overhearing, and channel idle listening mechanism for determining the presence of signals and the quality of service (QoS) improvement. Authors in [19] firstly presented a synchronous duty cycle management scheme of Sensor MAC for the energy optimization purpose. The authors in [10] proposed a two-layer MAC scheme, i.e., CR-ALOHA based MAC protocol for the OSA scheme by applying the random access scheme in selecting channels and considering imperfect spectrum detectors. Authors in [20] presented a MAC design for the mesh networks with an integration of the energy awareness and routine algorithm. However, the above works neither lack the consideration of the spectrum sharing scheme nor assume to implement the spectrum sharing on-board. Therefore, the offloaded spectrum sharing based MAC layer is needed.
As a cross-layer protocol initially designed for autonomous vehicles, MAVLink has been successfully used in several autonomous systems, e.g., APM, Pixhawk, DJI, Mikrokopter, YUNEEC, Micropilot, micro unmanned systems, and Parrot (Ar.unmanned system) [21]. Two mechanisms exist in the conventional MAVLink, i.e., the delivery of command, control and communication (C3) messages, and the heartbeat message for the periodic monitoring purpose. In our case, providing the offloaded spectrum sharing, the communication scheme generated in the ground control stations (GCSs) needs to be forwarded to UAVs, hence the MAVLink data structure also demands to be modified for our case.
With the above remarks, this paper aims at presenting a synthesized resource allocation and opportunistic link selection (RA-OLS) scheme for supporting multiple links and delivering command and control (C2) messages for the air-to-ground (A2G) communication. RA-OLS enables the dynamic management of RF resources and allows for the opportunistic access in a sequential manner so as to facilitate the UAV operation under the spectrum scarce environment. UAVs envision to have multiple transmitters along with spectrum detectors to identify the vacancy of the link to prevent the collision, while the link selection and scheduling is implemented in GCSs. Spatial and temporal spectral information is processed, and the link scheduling resolutions, i.e., link hopping sequences (LHSs), are generated by a link allocation algorithm. LHSs are packed with time labels into the MAVLink data structure, and uploaded to UAVs through a predefined common control forward link. Enabled with a link-hopping based MAC protocol, UAVs start the data transmission in accordance with the uploaded LHSs.
The RA-OLS is a synthesized solution which embraces multiple methods, e.g., the link selection, OSA, and resource allocation. Different from the traditional link selection research, the time-varying feature is considered, hence the link resources are modeled as link opportunities in the frequency and time domain. Distinct from the OSA enabled communication or the resource allocation enabled communication, this paper aims at addressing the problems of when which and how links with high quality of service (QoS) are used for the UAV operations. The contribution of this paper is to propose and model a centralized link sharing based communication solution for UAV applications, where the link allocation, link access, upload link effect, and spectrum sensing effect are considered. Several features are highlighted with the proposed RA-OLS scheme.
We derive a mathematical performance model in terms of throughput for the RA-OLS scheme which can be used for the spectrum dense and scarce environments. Several aspects are integrated in the model, such as the link allocation algorithm, decision fusion with multiple on-board spectrum detectors, re-sensing scheme considering non-ideal spectrum detectors, and packet dropout rate among common control links. A Markov based Gilbert-Elliott model is presented for estimating the packet drop in uplinks, where the Ricean fading is used for modeling the channel environment. Statistics theory is used in the derivation. Moreover, we present an interference factor ( I F ) as the outrage probability to measure how UAVs cause interference to other existing users.
A lightweight cross-layer protocol is proposed which is modified from the MAVLink for uploading the LHSs to UAVs. A spectrum sensing based MAC protocol is presented for enabling the opportunistic link selection with the re-sensing policy.
An efficient greedy based spectrum allocation algorithm is developed to accelerate the computation and enables the spectrum sharing with QoS and fairness fitting among UAVs.
The rest of this paper is organized as follows: Section 2 presented the proposed RA-OLS communication scheme along with the corresponding technical solutions. Section 3 denotes mathematical models towards the proposed RA-OLS system. Numeral simulations are presented in Section 4 following by the conclusions in Section 5.

2. System Architecture and Technical Design

A conceptual diagram for the RA-OLS scheme is shown in Figure 1. The PU traffic model which reveals the occupancy information in wide bandwidth is represented as a binary ON/OFF model [22]. Given the time-varying feature in the spectrum, white blocks form a link opportunity set I aiming to be used by UAVs. The dark blocks are the congested links that need to be avoided in the utilization. The solid lines with arrows are the desired LHS schemes T , and the virtual lines represent the link-hopping maneuver between I.
Enabled with the presented link-hopping concept, the RA-OLS based UAV communication diagram is illustrated in the Figure 2, where some fundamental components are: K UAVs equipped with M transmitters, GCS network, spectrum detectors deployed among UAVs for acknowledging the PU vacancy, spectrum sensors deployed in terrestrial for collecting the PU traffic pattern information, and some general terrestrial infrastructures denoting the existing heterogeneous networks, such as wireless wide area network (WWAN), wireless local area network (WLAN), wireless metropolitan area network (WMAN) and low power wide area network (LPWAN).
Given some unique features existing in the RA-OLS scheme, such as the offloaded spectrum processing, central resource management, and dynamic access to heterogeneous links, some exclusive functions are highlighted in red virtual boxes, for instance monitoring RF environment, resource sharing, creating LHSs, forwarding LHSs, and link hopping function in the airborne.
With an assumption that PUs are unknown in prior, the spectrum processing is critical to obtain the real-time PU traffic information in the function of monitoring RF environment, where several detection, identification, and prediction methods [23,24] were proposed. Based on the extracted PU features, the resource sharing function enables the collaborative occupation of spectrum resources among UAVs, where the contention issue is mitigated in such a centralized mechanism. Along with the C2 messages received from UAV operators, the LHSs are segmented into multiple frames, packed with the unified data structure, and forwarded to UAVs, where the packet dropout effect is critical because of unreliable upload links and lacking static backhaul link solutions. The link hopping function conducted among UAVs is to implement the data transmission through multiple links, whilst the link establishment and maintenance in the current link solutions are not considered.
In specific, three technical gaps are put forward: (1) how to transmit the link opportunity information to individual UAVs; (2) how to allocate link opportunities over multiple UAVs in an equal manner; (3) and what is the MAC layer like given the link hopping function. The technical solutions are provided to address the above gaps to form a prototype scheme, i.e., the extended MAVLink (E-MAVLink), the enhanced MAC (E-MAC), and the link resource allocation algorithm.

2.1. Extended MAVLink

We assume that the link access is triggered by the time and event, and link opportunities I are characterized by the start time T m , end time T e , duration of the link opportunity L = T e T m , and a quality factor Q. Only T m , T e , and link identifier need to be uploaded to UAVs, while the link quality is estimated on-board with spectrum detectors. Multiple link opportunities are formed as an LHS. A completed LHS set may be separated into multiple data frames when the opportunity number exceeds the maximum number of n o . Developed from the MAVLink protocol [21], the proposed E-MAVLink frame structure is presented in Figure 3 with its explanations clarified in the Table 1.
Distinct from the typical MAVLink protocol, two additional fields, i.e., NLHS and SPAYLOAD, are appended before the payload of data. The NLHS is the number of LHS packet in this frame, and SPAYLOAD represents the specific content of LHS messages consisting of a link identifier, start time stamp, and end time stamp. The link identifier has 1 byte size, hence the hardware limitation of n o is n o [ 0 , 255 ] . The time stamps are unified into the same format with the fixed size of 6 bytes resulting in 13 bytes opportunity size. Consequently, the length of the E-MAVLink frame is extended from the traditional range of [ 11 , 279 ] [21] to [ 12 , 279 ] + n o · 13 bytes.

2.2. Enhanced MAC

The proposed E-MAC is developed from a two-stage slotted CR-ALOHA MAC layer [10]. Some distinctions are highlighted, for instance, the slotted CR-ALOHA MAC demands a periodic detection of the PU presence, whilst such periodicity is not reflected in the RA-OLS scheme; the CR-ALOHA MAC develops the random access within the determined time intervals, whilst the link selection function is offloaded in GCSs; the data frame length is fixed in the CR-ALOHA, whilst it is dynamic according to the PU traffic pattern among links; the CR-ALOHA MAC implements the hopping between the frequency or channels in interest, while the E-MAC switches between diverse links enabled with multiple detectors and fusion method. Moreover, the re-sensing mechanism with the MAX-N-RS policy [25] is considered in the E-MAC with the consideration of non-ideal spectrum detectors.
We define the symbol T as the extracted sets of link opportunities from LHSs with the labeled start time T m and end time T e as elements. T ( 1 ) represents the first element of T . t is the current processing time. The framework diagram of the proposed E-MAC layer is shown in Figure 4.
As depicted in Figure 4, the execution of E-MAC is processed as follows:
Considering the case of delay in retrieving the LHS set T , some LHSs are removed firstly following the equation: T f i T e < = t , where the f i function is to find elements in the dataset, and the operation of ‘−’ denotes the removal of elements from the dataset.
The operation remains awaiting until it is triggered by the start time, where the time synchronization problem can be solved by the coordination function in SUs [10].
Given the collaborative sensing result with multiple spectrum detectors, UAVs detect the occupation status among links in interest before performing the transmission. If the link is determined to be idle, the request data will be transmitted within the remaining time. Otherwise, the spectrum detectors would keep sensing for the maximum of R times to acquire the availability of PUs.
Only when the current time t is within the opportunity duration, i.e., t < = T e ( 1 ) , this opportunity is used, where t is affected by the re-sensing time T s e n and the MAC processing time δ T .
It is noted that this E-MAC layer aims at addressing the problem of the time-event triggered link access with a unified scheme. Some unique link maintenance and establishment mechanisms, e.g., request to send (RTS), clear to send (CTS), and acknowledgment (ACK) [25] are negligible in the E-MAC design and analysis.

2.3. Link Resource Allocation

The allocation of link resources runs in GCSs and is critical in managing spectrum resources among multiple UAVs. Two objectives are considered in the allocation, i.e., the allocation of link opportunities with the best quality and maximizing the link occupation time among UAVs. As discussed in Section 2.1, the link opportunities are characterized by the start time T m , end time T e , and a quality factor Q, where Q denotes channel properties, e.g., scattering, fading, and power decay, and can be obtained from channel state information (CSI) through heartbeat messages. The duration of link opportunity is obtained: L = T e T m . We define the utilization rate U = L T . The maximization of LHS T can be addressed by solving the following objective function:
max T S = k = 1 K Q T U k , T e . g . , T dom { I } , k dom { K }
It is noting that when T = T o which means the time length for the optimization is equivalent to the time of predicting PU patterns, the communication reaches the maximal throughput values by using the spectral resources sufficiently.
Given the time-varying feature in the T , we firstly make the following assumptions before addressing the function (1): (1) each link opportunity can only be allocated to one UAV; (2) UAV cannot switch to another link before finishing the current opportunity; and (3) the link opportunity can be accessed intermediately.
This paper presents an achievable sub-optimal algorithm, i.e., the ϵ -greedy resource allocation algorithm developed from our previous work in [26]. Some advantages are highlighted, such as the low complexity, feasibility in adding constraints, and convenience in modeling.
The optimization of U is substituted with two cases: (1) minimizing the time interval Δ T between the start time T m and the end time T e of the resource in the s 1 step, and (2) maximizing the remaining time duration Δ L between the end time T e of the resource in the s 1 step and the end time T e of the resource in interest. Moreover, regarding the purpose of leveraging resources among multiple K UAVs, a fairness fitting factor is integrated by summarizing the allocated resource length T b = s = 1 s 1 Δ L k , s . To this end, a monotonous differential objective function at the iteration s for the k t h UAV is formulated as:
max T Δ S k , s = λ L Δ L i λ Q Q n λ Δ T Δ T ( k , i , s ) λ b ( T k λ Q Q ) Δ T = T m i T e T k , s 1 Δ L = T e T k , s T e T k , s 1 T b = s = 1 s 1 Δ L ( k , s ) e . g . , T dom { I } , i dom { I } , n dom { N } , k dom { K }
where λ Δ T and λ b represent the discount weight for minimizing the time gap and balancing allocation results among UAVs with values ranging in [ 0 , 1 ] . λ L and λ Q are the coefficient weights. n and i are the index of link { N } and set of link opportunities { I } , respectively. The ( T k λ Q Q ) summarizes the resources weighted by λ Q for k t h UAV.
Given a pre-known I ( k ) for the k t h UAV, a general framework of the ϵ -greedy based link resource allocation strategy for one iterative processing is presented in the Algorithm 1 [26].
When having a small ϵ value, it might be possible that one link opportunity is allocated to multiple UAVs, thus the algorithm demands an avoidance mechanism to manage the spectrum and prevent collisions among UAVs. Specifically, only the UAV with the highest Δ S value is allocated to the opportunity. It is noted that the time effects, e.g., delay in the E-MAC progressing, and multi-sensing period, are not considered during the allocation phase. Moreover, given that one LHS consists of multiple iterative steps and the fairness fitting factor in the Equation (2) consists of an accumulative value of T k , s 1 , an appropriate selection of the accumulative length is critical to leveraging different effects in Δ S by way of periodic clearance of the template accumulative parameter.
Algorithm 1 Pseudo-code of Greedy Based Algorithm for Time Sequence Resource Allocation
1:
Initialization of parameters
2:
while I ( k ) do
3:
     Calculate the differential objective function Δ S towards k UAV with the closest link opportunity in the time domain.
4:
     Select a flexible threshold value T h = ϵ · max ( Δ S ( l , s ) ) according to the maximum value of objective functions.
5:
     Find link opportunities for each UAV that satisfies Δ S > = T h .
6:
     if Only one UAV is allocated to this opportunity then
7:
         Save link opportunity T to k t h UAV.
8:
         Remove elements in I ( k ) when T e ( I ( k ) ) < = T ( s ) .
9:
         Update parameters.
10:
     else
11:
         Save link opportunities T with the maximum Δ S value to k t h UAV.
12:
         Remove elements in I ( k ) when T e ( I ( k ) ) < = T ( s ) .
13:
         Update parameters.
14:
     end if
15:
end while
16:
return T

3. Modeling and Analysis

Due to lacking theoretical models for allocation algorithms, especially with sub-optimal algorithm, this section aims at presenting a mathematical model for RA-OLS with unknown spectrum allocation performance. Moreover, several aspects are considered in the model, e.g., the imperfect spectrum detectors with the probability of false alarm and miss detection, the unreliable forward links resulting in packet dropoutes, and delays in the E-MAC leading to the repeat sensing of PU states. A saturation throughput is modeled, along with an interference factor ( I F ) presented to measure the interference degree towards other PUs.
We assume that the active (run) state A in the PU transmission and the inactive state (burst) state I both follow exponential distributions [27] with the cumulative distribution functions (CDFs) of P r A ( N ( t ) = 0 ) = 1 e λ a t and P r I ( N ( t ) = 0 ) = 1 e λ v t , where λ a and λ v are the averaged active length and inactive length of the PU traffic, respectively. The estimation for λ a and λ v can be done by observing the occurrence of events through estimation methods, such as the moment estimation, maximum likelihood estimation (MLE), and least square estimation (LSE) [28]. We assume that the arrival of link opportunities in the LHS set T with the link allocation algorithm also follows a Poisson distribution. The probability mass function (PMF) of the link opportunity occurrence is denoted by P r T ( C 1 ( t ) = n ) = ( λ F t ) n e λ F t n ! , where λ F is regarded as the average number of spectrum opportunity. Owing to the fairness fitting function, UAVs share the same Poisson distribution with λ F , Therefore, we can estimate the number of spectrum opportunities F in one LHS schemes as: F = E [ P r T ( C 1 ( t < T o ) ] = λ F T o .
Moreover, we assume that the actions of UAV access to links are independent and follow the Poisson process, where the occurrence of the link opportunities I for all the UAVs satisfies the same λ F Poisson distributions owing to the fairness fitting function. Other time-delay effects, such as carrier sensing time, and link hopping time, are modeled as a fixed processing time δ T .

3.1. Throughput Model

Due to the additional integration of spectrum sensing before transmission mechanism, a successful transmission of data packets considers two aspects: (1) LHS is successfully received by UAVs through the forward links; (2) spectrum detectors equipped on UAVs correctly identify the spectrum occupancy of PU signals.

3.1.1. Packet Dropout

To enable a reasonable estimation of packet dropout probability for UAV communications, Gilbert-Elliott (GE) [29] is typically applied with a two-state discrete Markov model in modeling wireless A2G aeronautical data links [30]. Compared with the Bernoulli process model [31], GE considers the correlation of packet dropout patterns which are caused by failure in receivers and channel conditions (multi-path effect is dominant in UAV applications).
In this work, we use the Markov based GE model presented in [32] owing to its incorporation of Ricean fading effect and the time-varying nature of the packet dropout. Given two states are modeled, i.e., good (labeled by a subscript of g) and bad (labeled by a subscript of b), the Markov process presented in Figure 5 is characterized by probabilities, e.g., p g g , p g b , p b b and p b g . The p x y format denotes the probability of the state switching from x to y. Let π g and π b denote the stationary distributions for the good state and bad state, respectively. The following equations are obtained:
p g g = 1 p g b , p b b = 1 p b g ; π g = p b g p g b + p b g , π b = p g b p g b + p b g
Given the Ricean fading model can be represented by the Rice distribution, the received signal amplitude is characterized with the following two parameters:
v 2 = κ Ω 1 + κ , ω 2 = Ω 2 ( 1 + κ )
where κ denotes the proportion of the direct path effect to the scattered path effect. Ω denotes the received signal power, which is impacted by the distance d and the path loss via the direct link:
Ω = Ω 0 ( d d 0 ) η
where Ω 0 denotes the signal power received at the reference distance of d 0 . η is the path loss coefficient and is reasonably configured to 2 in UAV applications (corresponding to the free space model).
With a determined receiver sensitivity S r , the probability for the time sensitive error is denoted:
p g ( t ) = 1 Q v ω , 2 S r ω
where Q is the Marcum Q-function.
The estimated packet dropout rate P d hence is denoted:
P d = φ 0 π g + π b
where φ 0 = 1 N p t p g ( t ) and N p is the number of observations.
Consequently, the expectation of the opportunity number per each upload is denoted by:
E [ N d ] = ( f c ( n e ) 1 ) ( 1 P d ) n o + ( 1 P d ) f c ( f r e m ( λ F T o , n o ) )
where n e represents the number of E-MAVLink frames for one LHS which is estimated by n e = F / n o = λ F T o / n o ; f c function rounds the element to the nearest value which is greater than itself; and f r e m obtain the remainder after division.

3.1.2. Spectrum Sensing

Due to having the spectrum sensing mechanism before transmission and heterogeneous link types, this section investigates a unified spectrum detection method, i.e., energy detection [33,34] for identifying the availability of PUs. The main concept of the energy detection is to summarize the energy of samples over the bandwidth in interest and compare with a threshold.
Given multiple sub-channels may exist, such as IEEE 802.11 [35], we investigate the fusion of multiple narrow-band spectrum detectors defined as D m , n , where m is the index of links with the overall M link number and n is the index of N channels. Hence, the detection of the PU signals among narrow-band channels over heterogeneous links can be formulated as s m , n , t . A binary hypothesis testing model for denoting ON/OFF status of the PU signals is hence developed from [33]:
y m , n , t = n i m , n , t : H 0 h m , n , t s m , n , t + n i m , n , t : H 1
where y m , n , t is the observed samples over the m t h link and is received by the detector D m , n . s m , n , t is the sample of PU signals. h m , n , t is the channel gain between each detector and PUs [36]. n i m , n , t is the noise according to AWGN model. t is the selected sensing time. H 0 is the event that no signal exists, and H 1 represents the existence of PU signals.
Under a zero-mean circular symmetric complex Gaussian (CSCG) random vector and AWGN noise model [37], the detection probability P D over the single narrow-bandwidth can be developed from [33]:
P D m , n = P r y m , n , t > λ D m , n ; H 1 = Q λ D m , n N σ s m , n 2 + σ n m , n 2 2 N σ s m , n 2 + σ n m , n 2 2 .
where σ s stands for the signal variance among single channels, and λ D denotes the threshold for determining the ON or OFF state.
The probability of false alarm P F is denoted as:
P F m , n = P r y m , n , t > λ D m , n ; H 0 = Q N λ D m , n σ n m , n 2 σ n m , n 2 .
Given the more concerns on the probability of false alarm than the detection probability, the decision policy employs a constant detection rate (CDR) criterion in this paper. A central chi-square distribution Q [33] assumption is applied, and y assumes to be approximately Gaussian distributed. For a given detection probability P ¯ D , the threshold value λ D for the narrow channel n over link m can be defined [33] as:
λ D m , n = σ n m , n 2 Q 1 P ¯ D m , n 2 σ s m , n 2 + σ n m , n 2 N σ n m , n 2 + σ s m , n 2 + σ n m , n 2
where σ n is the standard deviation of noise, Q is the Gaussian Q-function following the distribution of Q ( x ) = 1 2 π x e s 2 / 2 d s , and N = F s · T s e n represents the sample length induced for the estimation within the T s e n duration.
Given the allowance of multiple n detectors to make decisions of the link occupancy over m links and fuse N n decisions into one, a k-out-of-N decision fusion rule [33] which is one typical hard fusion policy in the collaborative sensing is considered by agreeing with the decision when individual detector number reaches N k . Consequently, the fused detection probability P ^ D and the probability of false alarm P ^ F with multiple detectors working on the link m thus are expressed as [33]:
P ^ u n m = i = N k N n C ( i , N n ) j = 1 i P u n m , j j = i + 1 N n 1 P u n m , j
where u n = D denotes the detection probability, and u n = F denotes the probability of false alarm.
It is worth noting that with the CDR criteria, the detection probability P ^ D ( m ) is determined according to the design requirements. Therefore, the probability of false alarm P ^ F ( m ) is one major concern affecting the detector performance.

3.1.3. Saturation Throughput

We refer to the saturation throughput [38] which is a typical way to measure end-to-end MAC performance. In the saturation throughput analysis, we have a reasonable assumption that users continuously send C2 messages per every T o second.
We consider three effects when denoting the saturation throughput model, i.e., the uplink packet loss discussed in Section 3.1.1, opportunity loss considering the time delay in non-ideal spectrum detector, and miss detection in the sensing phase.
Let C 3 denote the case that UAV detects one link opportunity by mistake. We assume that the re-sensing mechanism follows a binomial distribution. Suppose the Max-N-RS scheme is employed in the E-MAC design discussed in Section 2.2, the PMF of the C 3 case over the T i k link opportunity within the re-sensing times R is denoted as:
P r ^ a ( T i C 3 = r , k ) = R r P ^ F ( T i k ) r ( 1 P ^ F ( T i k ) ) R r
where r is the index of access behaviours.
Given the maximum of R times for the re-sensing, the probability of missing detection of link opportunity for the k t h UAV denotes P r ^ a ( C 3 = R , k ) = P ^ F ( T i k ) R .
To simply the derivation of throughput, we assume that the links and detectors are homogeneous over the transmission rate and detection probability. Consider the time delay in the sensing phase may result in a smaller number of re-sensing, the possibility that the selected spectrum opportunity has been removed by the E-MAC denotes:
P r I [ N ( t > = T D ) ] = R e L u ( λ F T o K ( n t e T D λ v ) λ F T o K )
where n t = T o M 1 / λ v + 1 / λ a . T D is the time delay which is modeled by T D = δ T + T s e n P ^ F R . The R e L u function denotes rectified linear unit (ReLu) and has the formulation of R e L u ( x ) = m a x ( 0 , x ) .
We apply the order statistic theory [39] to estimate the possibility. With assumptions that opportunity length L is independent and identically distributed (i.i.d), we firstly re-order n t number of opportunities in the ascending order. Given the exponential distribution of random variables, the expectation of the first n variable is denoted by E X ( n ) = 1 λ ( 1 + 1 2 + 1 3 + + 1 n ) log n β . Therefore, the maximum opportunity number which has longer duration than T D denotes n t e x p ( T D λ v ) . Given the total received number λ F T o K , a ReLu function is needed to ensure a positive possibility value.
We define E [ L ] as the averaged time duration for link opportunities without the time delay effect, as well as E [ L a ] for the link duration with time delays. Therefore, the expectation of L a after the E-MAC layer is denoted by:
E [ L a ] E [ L ] = T D + x λ v e λ v x d x 0 + x λ v e λ v x d x E [ L a ] = E [ L ] ( λ v T D + 1 )
With the combination of (8), (13), (15), and (16), the saturation throughput model T h ^ U A V with considerations of E-MAC time delay, non-ideal on-board detection and packet dropout is given by:
T h ^ U A V = G ¯ E [ N d ] ( 1 P r I ( N ( t > = T D ) ) ) ( 1 P r ^ a ( C 3 = R ) ) ( E [ L a ] T D ) T o = G ¯ ( f c ( n e ) 1 ) ( 1 P d ) n o + ( 1 P d ) f c ( f r e m ( λ F T o , n o ) ) ( 1 R e L u ( λ F T o K ( n t e T D λ v ) λ F T o K ) ) · ( 1 P ^ F ( T i k ) R ) E [ L ] ( λ v ( δ T + T s e n P ^ F R ) + 1 ) T o
where G ¯ is the theoretical throughput with static connections.
With the acknowledge of λ F which can be calculated in statistic by the MLE method [28], another challenge is the estimation of E [ L ] . We consider two circumstances according to the uncertain relationship between the UAV number K and the link number M. When the UAV number K is bigger than the link number M, we define such as the spectrum scarce environment. All link opportunities aim to be allocated by the allocation algorithm. Therefore, the allocated opportunity length still follows the exponential distributions, hence E [ L ] = 1 λ v .
When the UAV number K is smaller than the link number M, which is defined as the spectrum dense environment, only the top K opportunities aim to be used during each allocation iterative. Similar with the proof in Equation (15), we use the statistics theory and the o t h order statistics formulation is denoted by E [ L ] ( o ) = i = M o + 1 M 1 i [39]. Therefore, the average opportunity length is denoted as E [ L ] = j = M K + 1 M ( 1 / j ) K λ v . Consequently, the integrated throughput model per each UAV can be rewritten as a piece-wise function:
T h ^ U A V = T h / λ v : M < = K T h · ( n = M K + 1 M j = M n + 1 M ( 1 / j ) K λ v ( λ v T D + 1 ) T D ) : M > K
where T h = G ¯ λ F ( 1 P d ) λ F T o / n o ( e λ v T D P ^ F ( T i k ) R ) .
However, by simulations, we find that a leap between two piece-wise equations exists. Meanwhile, each iterative may not always allocate top K resources at each time especially when K = M . Therefore, we fine-tune this model with an empirical equation by introducing a more accurate factor between spectrum resources and the user number. The fine-tuned throughput model is denoted by:
T h ^ U A V = T h / λ v : M < = K T h · ( n = M K + 1 M j = M n + 1 M ( 1 / j ) K λ v ( λ c a λ v M K C a ( λ v T D + 1 ) + 1 ) T D ) : M > K
where C a and λ c a are the coefficient weights for the adjustment purpose. λ c a < 1 which means that when spectrum resources are in relevantly scarcity ( λ v M K C a is large), the throughput tends to move closer to the case of M < = K with a shorter opportunity duration. Reversely, under the spectrum dense environment, the opportunity duration increases.
Considering the fact that the re-sensing number in the E-MAC layer is always bigger than one. Therefore, the following function is needed when estimating the re-sensing effect on the E-MAC:
T D = δ T + T s e n P ^ F ( T i k ) R < = 1 δ T + T s e n P ^ F ( T i k ) R 1 < P ^ F ( T i k ) R < = R
Similarly, in the Equation (18), the transmission number λ F T o / n o in the forward link should be substituted with the following function to guarantee that at least one transmission via the forward link is performed:
λ F T o / n o = 1 λ F T o / n o < 1 λ F T o / n o λ F T o / n o > = 1

3.2. Interference Measurement

Regarding the fact that non-ideal spectrum detectors could generate interference to existing PU users, this section discusses one measurement model I F from [10] for revealing the interference extent. Two interference cases are considered, i.e., the missed detection of PU signal may generate collisions towards existing PU activities, and the burst occurrence of PU signal may be disturbed during the UAV transmission.
First, we assume that the unknown PU communication system employs a one-unit system [27], which means that one disruption in the transmission would lead to the failure of the whole system. We use hypothesis of H 2 and H 3 to denote the inactive and active states of PU models [10], and the PU occurrence model is denoted:
P r u ( m ) = λ v ( m ) e λ v ( m ) T s e n ( m ) / ( λ a ( m ) + λ v ( m ) ) : H 2 1 λ v ( m ) e λ v ( m ) T s e n ( m ) / ( λ a ( m ) + λ v ( m ) ) : H 3
where T s e n denotes the length of sensing duration.
Providing the maximum R time of the re-sensing and F number of link opportunities in one LHS sagement, the measurement of the first case, i.e., the missed detection leading to the interference is formulated by combining (11) with (22): I F 1 = ( 1 P ¯ D ( m ) R λ F ) P r u ( m | H 3 ) .
For measuring the the second interference case, we define P r c as the probability that PU awakes during the UAV transmission E [ L a ] T D after satisfying the P r u ( m | H 2 ) assumption. Hence, the P r c is denoted: P r c ( m ) = λ v ( m ) e λ v ( m ) T s e n ( m ) / ( λ a ( m ) + λ v ( m ) ) λ v ( m ) e λ v ( m ) ( E [ L a ] T D ) / ( λ a ( m ) + λ v ( m ) ) . The interference factor for the second case is thus given as: I F 2 = ( 1 P ^ F ( m ) R λ F ) P r c ( m ) .
Consequently, the integrated interference factor I F which denotes the transmission collision degree over PUs is formulated:
I F ( m ) = I F 1 + I F 2 = ( 1 P ¯ D ( m ) R λ F ) P r u ( m | H 3 ) + ( 1 P ^ F ( m ) R λ F ) P r c ( m ) = ( 1 P ¯ D ( m ) R λ F ) ( 1 λ v ( m ) e λ v ( m ) T s e n ( m ) λ a ( m ) + λ v ( m ) ) + λ v ( m ) λ a ( m ) + λ v ( m ) ( 1 P ^ F ( m ) R λ F ) ( e λ v ( m ) T s e n ( m ) e λ v ( m ) ( E [ L a ] T D ) )
where E [ L a ] is discussed in the Section 3.1.3.
From the Equation (23), it is noting that with the increment of the T s e n value, I F 1 and the component of 1 P ^ F ( m ) R λ F in the I F 2 increase monotonically, and those factors relate to the performance of the airborne spectrum detector. However, the P r c ( m ) in the I F 2 is non-monotonic because of the uncertain relation between e λ ( m ) and E [ L a T D ] T s e n . Moreover, several parameters also present effects on the weights for separate components, which drive the needs for further analysis by simulations.

3.3. Analysis

We regard the typical static communication scheme as the benchmark, meaning that the dynamic hopping is not enabled, and SUs transmission is paused until PUs are in vacant. Therefore, the capacity of the static communication system is:
C = i = 1 M ( C i )
where C i is the maximum user number for i t h link.
Facilitated by the coordination of individual link opportunities, the capacity for the RA-OLS communication can be maximized by allocating one opportunity to one UAV (no minimum throughput requirements):
C = T o i = 1 M ( T o 1 / λ v i + 1 / λ a i C i )
where λ v i denotes to have λ v opportunity number for the i t h link.
We also have the definition of the utilization rate U = L T o discussed in the Section 2.3, hence the best U averaged with K UAVs for the static scheme solution is estimated by:
U 1 / λ v K ( 1 / λ v + 1 / λ a )
where the negative effects, such as the packet dropout, non-ideal detection and delay in E-MAC, are not included.
For the RA-OLS scheme, the achievable utilization rate is obtained from the Equation (18):
U = T h ^ U A V / G ¯
As presented in the throughput Equation (18), the throughput decreases monotonically with the increment of T o because the forward link model is not considered and more forward packages (longer E-MAVLink and more E-MAVLink frames) are delivered to UAVs leading to the bigger failure in the packet dropout.
Moreover, we group other parameters from the throughput Equation (18) into four categories, i.e., the PU pattern representatives denoted by M, K, λ v and λ a , the non-ideal detector denoted by σ s , σ n , N k , F s and T s e n , the time delay in E-MAC denoted by δ T , T s e n and R, and the E-MAVLink length denoted by n o . With the determined λ F values, the optimization of the throughput function for parameters can be done numerically. With the consideration of the I F function (23), the trade-off between throughput and interference effect might be challenging, especially with uncertain λ F . The examination of the time delay effect on the E-MAC processing can be done by differing T s e n only with the fixed δ T . Considering the difficulty in having λ F models, the throughput performance affected by parameters needs to be analyzed, as well as the I F result.

4. Experiments and Analysis

This section aims at evaluating the proposed RA-OLS communication scheme from the link perspective. Firstly, we demonstrate the communication with multiple heterogeneous links for single and multiple UAV operations. Afterwards, by using the Mento-Carlo method and developing a RA-OLS simulation, the performance for the mathematical model is analyzed in terms of the saturation throughput (in Section 3.1.3) along with the sensitivity analysis. The RA-OLS performance with IF is presented. The comparison analysis with the static communication is implemented.

4.1. Simulation for Practical Communication

According to the typical wireless communications discussed in [40], this paper considers three promising wireless communication links, i.e., Wi-Fi, Lora, and Sigfox operating on different frequency range. According to discussions in [40,41,42,43,44], we choose the reasonable configurations in Table 2. The reason of having multiple links is to embrace multiple UAV communication technologies for supporting the central management of UAV communication behaviors. Moreover, the dynamic communication via multiple links enables the frequency hopping to improve the communication reliability and flight safety when some frequency resources are congested, e.g., operation in urban areas.
The developed RA-OLS simulator flow chart is presented in Figure 6. In the RA-OLS simulation, the RF environment, i.e., PU traffic patterns are randomly generated following the exponential distributions in the vacant and busy states. The propagation in the uplink, which could lead to the packet dropout adopts the Rice propagation model. When detecting the PU existence, AWGN noises are added to evaluate the on-board spectrum sensing performance. The link resources are allocated by the algorithm presented in Section 2.3. The detailed explanations for Figure 6 are presented in Algorithm 2.
The implementation of random timing sequences for a Poisson process in steps (3) and (4) refers to the Knuth algorithm [45]. The next time of having a random exponential distribution is t i m e = ln ( r a n d ) λ , where r a n d denotes a normalized random value, whose elements are uniformly distributed in [ 0 , 1 ] .
It is noting that a successful UAV transmission applies only when three flags, i.e., f l a g t denoting the packet dropout, f l a g s denoting that the opportunity is detected, and f l a g f denoting that the opportunity duration is longer enough are all equivalent to 1. Therefore, the simulated saturation throughput per each UAV can be calculated in statistic following the equation:
T h U A V = m e a n k K ( i T i ( k ) ( f l a g t ( i ) · f l a g s ( i ) · f l a g f ( i ) · G ¯ ( i ) ( L ( i ) T s e n s e c o u n t · T s e n δ T ) ) T o )
where i is the index of the link opportunity T i , and T s e n s e c o u n t is the simulated re-sensing time. The throughput is averaged among K number of UAVs with the m e a n function.
Algorithm 2 Pseudo-code of RA-OLA Scheme for Random PU Traffic Patterns.
1:
Initialization of parameters
2:
while m { M } do // Create PU traffic patterns.
3:
     Generate random ON model with λ a exponential distribution for m t h link within T o .
4:
     Generate random OFF model with λ v exponential distribution for m t h link within T o .
5:
end while
6:
Calculate probability of false alarm P ^ F ( m ) following Equation (13) given determined P ^ D .
7:
Generate LHS T for each UAV following the allocation Algorithm 1.
8:
Create a two-stage Markov machine presented in Figure 5.
9:
while k { K } do
10:
    Calculate n e with n o , F and T .
11:
    while n { n e } do
12:
        Add Rice propagation model to the upload data.
13:
        Identify the Markov machine state.
14:
        Identify whether the upload data is received (power is within the threshold). The flag f l a g t sets to 0 when the data is lost.
15:
        Update the Markov machine state.
16:
         while the received LHSs have not been fully processed do
17:
              while Time of re-sensing is smaller than R do
18:
                   Generate AWGN noises with N d length for N n channels.
19:
                   Calculate the sub-channel number whose power is over the threshold.
20:
                   if More than N k sub-channels detect the busy state. then
21:
                      T s e n s e c o u n t = T s e n s e c o u n t + 1 .
22:
                     if The re-sensing time reaches R then
23:
                           f l a g s = 0 .
24:
                     end if
25:
                   end if
26:
              end while
27:
              if current opportunity length L > ( T s e n s e c o u n t · T s e n + δ T ) then f l a g f = 0 .
28:
              end if
29:
              if f l a g t , f l a g s , and f l a g f equal 1 then
30:
                  Summarize throughput for this opportunity.
31:
              end if
32:
        end while
33:
    end while
34:
end while
35:
Calculate the simulation throughput value T h U A V .

4.2. RA-OLS Communication Demonstration

We consider the case that UAVs fly away from the transmitter with the distance ranging from d = 4000 m to d = 40,000 m. The flying speed is constant of 20 m/s. The receiver sensitivity S r at UAV side is −50 dBm. The transmission power received at the reference point d 0 is 2 watts meaning that Ω 0 = 2 . p g g and p b b are configured as 0.995 and 0.96, respectively. The LHSs are generated in terrestrial stations and uploaded to UAVs per every T o = 2 seconds (distortion of PU patterns caused by the link degradation assumes to be compensated). To avoid the collision towards PUs, we use the required SNR in Table 2 to generate the probability of false alarm for each link. Given the CDR policy applied for the determination of PUs, the detection probability P ¯ D is configured to 0.9. λ Δ T and λ b are the parameters to balance the performance and fairness fitting during allocation. For the onboard spectrum sensing, since only the existence of PU patterns is needed, which means we can have a lower sampling frequency and sample number for the detection. We configure F s = 2000 Hz and T s e n = 0.01 in this case, hence we have N = F s · T s e n = 20 samples for detecting the PU presence. The maximum re-sensing time R in the E-MAC layer (discussed in Section 2.2) is 3. The maximum number of link opportunities n o (discussed in Section 2.1) is 4. The detailed configuration table is presented in Table 3.

4.2.1. Single UAV

For the single UAV operation, a demonstration of using the RA-OLS scheme in terms of spectrum utilization condition is plotted in Figure 7a, where the green lines represent theoretical access behavior, and the blue lines represent practical access. The details for Figure 7a are presented in Table 4 (table contents are unified with the format: start time stamp—end time stamp/s). We repeat the simulation for 50 times where PU patterns are randomly generated, the long-term simulation result is presented in Figure 7b.
As depicted in Figure 7a and Table 4, the transmission through Wi-Fi is preferable because of its high-throughput (Wi-Fi outperforms over 5000 times than Lora and Sigfox in Table 2). Therefore, the sufficient utilization of Wi-Fi is enabled firstly followed by using the remaining links (use Lora in the 10 t h opportunity) to mitigate the time gap. The 6 t h opportunity is filtered by the E-MAC due to the short opportunity length (the minimum duration is 0.02 s). Such latency is also observed in the practical start time (practical access time has an averaged time delay for 0.02 s). Consequently, by adopting such dynamic communication scheme, the proposed RA-OLS scheme is promising to coordinate with multiple links and improve the communication performance by hopping between links.
When observing the long-term data rate results in Figure 7b, the RA-OLS scheme reaches or slightly outperforms the static scheme by using Wi-Fi only (best link) if the transmission dropouts are negligible. The reason of minor superiority to static scheme is the low throughput among Lora and Sigfox. The dropout is introduced by the transmission failure of LHSs ( π b = 0.1111 in this case). The uplink degradation effect on the communication is further analyzed in the sensitivity section.

4.2.2. Multiple UAVs

We consider the RA-OLS communication scenario using two UAVs in Figure 8a. It is shown that the Wi-Fi link is sufficiently assigned and shared among two UAVs. To make up with the less usage of Wi-Fi for the second UAV (blue), additional Lora and Sigfox links are used. The reason that the second UAV does not start from the earlier time is the closest opportunity in the Wi-Fi link remains the highest cost function value because of significant high throughput.
When observing the long-term simulation result in Figure 8b, the transmission among two UAVs are balanced in equal with similar data rate, which reveals the effectiveness of using the cost function structure to manage spectrum among two UAVs. However, the Wi-Fi link may not always be assigned entirely leading to an extreme low data rate for the UAV which has not been allocated with Wi-Fi (the cause of extremely small data rate values). By counting up the data rate in two UAVs, the summarized data rate is close or over to the static communication rate with Wi-Fi link only when ignoring the transmission loss (static communication could also have transmission losses caused by the non-ideal detectors). This phenomenon means that the Wi-Fi is largely used in the long-term simulation, which can be further validated by plotting the link utilization figures in Figure 9. It is noting that Wi-Fi has not fully used especially at 85 s, and we attribute it to the sub-optimal allocation solution in the link assignment.

4.3. Saturation Throughput Analysis

This section aims at investigating the gap between the proposed theoretical model (19) in Section 3.1.3 and the practical communication simulation in Section 4.1 due to the unknown allocation performance. To mitigate the diversity among links and simplify the analysis, this section simulates multiple homogeneous link types with the Lora configuration (see Table 2). The data rate for each link is normalized to 1 b/s. The iterative duration time is extended to T o = 5 seconds to enable the simulation of large UAVs K operations in the spectrum scarce environment (small link number M). We estimate the coefficient weights in (19) with values of C a = 10 and λ C a = 0.15 . We set the following configurations as the reference, for instance, λ Δ T = 0.8 , λ b = 0.1 , λ L = 10 , λ Q = 10 1 and n o = 2 . The UAVs are randomly deployed with the distance ranging from 7000 to 11,000 m (following a unified distribution) in accordance with the packet dropout rate ranging in [ 0.16 , 0.77 ] . Other configurations remain the same in Table 3.
By repeating the simulation for 500 times and differing the UAV number and link number in [ 1 , 8 ] and [ 1 , 8 ] , respectively, the saturation throughput surface planes are presented in Figure 10.
By observing the throughput planes enabled with the RA-OLS in Figure 10, the throughput can be improved by reducing the UAV number K and increasing the link number M. Furthermore, the degradation of throughput tends to be faster with smaller K values and M values, whilst the drop rate tends to be constant with big K value. We attribute such phenomenon to the non-linearity in the spectrum dense environment. Moreover, the presented mathematical model approximates the simulated communication in terms of the non-linearity and values. The uneven surface plan in Figure 10b is caused by the discretization of n e when estimating the packet dropout rate.
For the further analysis of the saturation throughput error between Figure 10a,b, We define the relative error function: e = T h ^ U A V T h U A V T h U A V , where T h U A V is the simulated throughput value and T h ^ U A V is the mathematical throughput. The relative error plane figure is presented in Figure 11a. As is shown, the relative error e t h is limited within 20% for most cases (the mean of e t h is 13.81%). The error turns to be more constant in the spectrum dense ( M > K ) environment, whilst the error variance grows when M < K . Similar with the uneven reason in Figure 10b, we attribute such error to the mutation when discretizing n e especially when n e is small and n o is big.
It is noting that the coefficient weights aiming at adjusting the degradation and average value of the surface for M > K are effective by having small relative errors (less than 0.1). We remain the same configuration for the remaining simulations.
Given the fact that the RA-OLS mathematical model relies on a pre-knowledge of the allocated opportunity number factor λ F , we plot the λ F plane versus UAV number K and the link number M in Figure 11b to reflect the hidden coherence among λ F , K, and M. It is depicted in Figure 11b that λ F shows the biggest value when M = K , and declines either in the spectrum dense environment M > K or the spectrum scarcity M < K . The cause of dropping λ F when M < K is that UAVs tend to possess fewer resources when lacking resources. The cause of dropping λ F when M > K is that better opportunities (longer duration in this case) are used leading to the unacceptance of poor opportunities so that to save the opportunity number. Moreover, the spectrum scarcity issue shows more impact on the λ F providing the faster decline rate with smaller M and larger K.

4.3.1. Sensitivity to Packet Drop Via Uplinks

Given the parameters relevant to the packet drop rate P d , i.e., distance between UAVs and GCS d, reference distance d 0 , reference transmission power Ω 0 , receiver sensitivity s r , and good state and bad state probabilities p g g and p b b , this section performs the sensitivity analysis in terms of packet drop rate P d , relative error e and throughput by varying some of configurations. For instance, d ranges from 6000 m to 18,000 m with a constant interval of 4000 m; receiver sensitivity ranges from 6 × 10 9 to 1.8 × 10 8 with a constant interval of 4 × 10 9 ; and p g g ranges from 0.985 to 0.995 with an interval of 0.005 . The UAV number K and link number M are set to 5, respectively (the packet drop rate shows fixed impacts with various K and M). We calculate the relative error for N d which is the opportunity number received successfully by UAVs during T o , and UAV throughput by repeating simulation for 1000 times (the relative errors are denoted as e n d and e t h ). Other parameters remain the same discussed in Section 4.3. The thorough sensitivity table caused by the uplink packet drop factor is presented in Table 5.
As shown in Table 5, both e n d and e t h tend to present a small value (around 10%) with various P d values, which means the developed finite state machine and the mathematical model is robust against failures in upload links.
By observing the distance d effect on P d and T h U A V , with the current configuration ( d 0 = 1 , Ω 0 = 2 ), P d starts increasing from 1 π g = 0.1111 at 4000 m and reaches to 1 after 14,000 m. The growth rate of P d increases the most rapidly during 6000 to 10,000 m ( P d doubles when d increases by 2000 m). In the meantime, with the growing of P d , the practical UAV throughput declines from 0.31 at 4000 m to 0.0071 at 14,000 m. The decline rate tends to increase till the throughput shows a small value (the maximum decline rate is around 6 times at 14,000 m).
When observing the receiver sensitivity s r effect on P d and T h U A V , the P d shows similar growing tendency with the increment of s r as the d effect. The maximum growth rate of P d is also around 2 times when s r = 7 × 10 9 . Similarly, the decline of UAV throughput speeds up when s r = 4 × 10 9 and slows down when s r = 1.3 × 10 8 .
By reducing the p g g value, i.e., the possibility of maintaining good states in the uplink receiver, the P d increase along with the degradation of T h U A V . Especially, the improvement of T h U A V and decline of P d are dominant when p g g increase from 0.795 to 0.995 by 20%. T h U A V and P d remain relatively stable when p g g < 0.795 .

4.3.2. Sensitivity to Spectrum Sensing

The spectrum sensing configurations are: theoretical detection probability P D , received signal strength from unknown PUs δ s , noise strength δ n , sampling rate F s , parameters in sensor fusion policy N n and N k . Some other configurations relevant to the time delay caused by spectrum sensing, e.g., R and T s e n are evaluated in the following section. It is noting that the δ s denotes the PU strength which is randomly updated every T o seconds, hence the propagation model in PUs is not considered. For analyzing the spectrum sensing impacts on the UAV throughput, we select parameters of P D , δ s and N k for the evaluation. We define F p f = P F R , and e t h for representing the relevant errors for T h U A V . The sensitivity table is presented in Table 6.
As depicted in Table 6, the more strict P D value causes bigger probability of false alarm P ^ F leading to smaller UAV throughput. The increment rate of P ^ F slows down with the growing P D , whilst the degradation of T h U A V speeds up especially when P D > 0.96 . Both the theoretical F ^ p f and practical F p f increase. Theoretical F ^ p f shows a bigger growing rate when P D > 0.945 than F p f , and maintains a higher steady possibility value of 0.91. However, the presented model may fail under big P F environment because of having the large e t h result when P D = 0.945 , although the UAV throughput is extremely small.
Similar results are obtained when observing the SNR impact. Nevertheless, N k tends to have stronger negative influence. For instance, the relative error e t h still remains 0.88 when N k = 3 with P ^ F = 0.6359 , whilst the e t h is small (−0.1611) when P D = 0.945 with the similar P ^ F = 0.5385 . Therefore, the hard fusion model could bring more errors (may be resulted from the quasi random generation method when simulating AWGN noises) especially when N k is relatively small.

4.3.3. Sensitivity to E-MAVLink and E-MAC

Given the two primary configurations in E-MAVLink and E-MAC, i.e., the maximum re-sensing number R and the maximum opportunity number per LHS n o , we plot the following sensitivity table by differing R and n o values. P D is increased to 0.93 to amplify side effects in P ^ F . Other default configurations are presented in Section 4.3.
As shown in Table 7, the rising of R decreases the probability of false alarm effect and improves the UAV throughput by around 60%. Especially the performance is significantly improved when R is increased from 1 to 3. The errors between theoretical model and practical simulations for T h U A V and F p f are constant, which also validates the effectiveness in modeling R effect.
When observing the n o impact on the communication, there is no clear tendency in terms of UAV throughput T h U A V , in this simulation. There is a slightly decline in e ^ n d resulted from discretization. However, the less segment number with longer length could result in high interference.

4.4. RA-OLS Performance with IF

Regarding several parameters exist in the model bringing difficulty in choosing the favorable values, as well as the selection of values essentially is a trade-off problem, this section simulate the RA-OLS communication versus IF factor (23) (the LHS length is reflected in IF). We use the definition of U i in Section 4.1 to measure the density of link opportunities and λ v = λ a = λ to denote the length of link opportunities in the PU pattern factor. We use SNR and P ¯ D as the parameters to characterize the spectrum sensing failure. Time effect in the E-MAC is measured by differing R number, along with varying T s e n in the range of [ 0.001 , 0.03 ] . We use n o to differ the E-MAVLink length. The configurations, e.g., U i = 50 % , λ = 12.5 , SNR=1 dB, P D = 0.9 , R = 3 and n o = 4 are selected as the benchmark value along with other configurations presented in Section 4.1. The results of the utilization rate U obtained from Equation (27) versus I F are presented in Figure 12.
As depicted in Figure 12, all the U versus I F curves show an initial upward trend, i.e., having an increasing growth with the increment of T s e n till the curves reach to a peak. The cause of having such peaks is that the over-large T s e n value may waste more time in sensing leading to low-efficiency in transmission.
By observing the peak values of U versus I F curves in Figure 12, some results can be obtained. U i , λ , SNR, and R show a significant impact on the U vertical ordinates. The peak in U for the P D figure changes slightly, which means that the side effects of the P D can be compensated by configuring a bigger T s e n value.
In specific, as illustrated in Figure 12a,b, longer (bigger U i ) and more dense (bigger λ ) link opportunities enable a more efficient communication performance (higher U and smaller I F ). When analyzing the impact from the spectrum detector on the performance (see the Figure 12c,d, the stronger signal power received by UAVs could reduce the T s e n value corresponding to the peaks. The increasing P D also improves the communication by reducing the IF at a cost of bigger T s e n for maintaining the P D . In Figure 12e, the re-sensing scheme, i.e., the R effect improves the communication performance with small T s e n , whilst the peak value degrades when R increases. As shown in Figure 12f, the n o presents limited small impacts on both utilization rate and IF according to the derived models.
In accordance with above results in Figure 12, the favorable selection of configurations can be obtained following the procedure. When we have the PU pattern configurations, i.e., U i = 50 % and λ = 7.5 , a preferred T s e n can be obtained by selecting the peak values from curves (around 0.0013). A preferred SNR = 1 dB (relevant to the threshold selection) is obtained from Figure 12c, as well as having P d = 0.095 because of possessing higher utilization rate and small IF values. Moreover, R can be chosen to 5 owing to the largest peak value when T s e n = 0.0013 .

4.5. Performance Comparison

In this section, we use the static communication scheme (see the Section 3.3) without having the dynamic access mechanism as the benchmark for the performance comparison purpose, as well as using the definition of utilization rate U in the Equation (27) for measuring the performance. We use Wi-Fi configurations presented in Table 2. The implementation of the static link is similar to the RA-OLS discussed in Section 4.1, whilst only the determined links are allocated to its corresponding UAVs to prevent having the link-hopping mechanism.
The probability of detection is reconfigured as P ¯ D = 0.9 to amplify the side effect resulted from non-ideal detectors. Considering the link degradation effect, the SNR at the onboard spectrum detector side is set to 1 dB. We simulate the communication with static scheme discussed in Section 3.3 and calculate the throughput in statistic. By differing sensing time T s e n and sampling rate F s in the airborne detectors (see the Section 3.1.2), the comparison figure of the spectrum utilization rate U versus T s e n is illustrated in the Figure 13, where U is averaged by K UAVs.
As depicted in Figure 13a, it is observable that the performance with the RA-OLS scheme outperforms the static link scheme for nearly 50% under the spectrum dense environment when M > K . Providing that the static scheme is invalid when M < K , we apply the best utilization assumption of U = 50 % / 6 = 8.3 % from the Equation (26) as the benchmark. By observing Figure 13b, the RA-OLS enabled communication still outperforms the static link scheme with small T s e n value under the spectrum scarce environment.
Moreover, with the increment of T s e n , the U curve increases rapidly and declines gradually. The reason for having the upward tendency is that the probability of false alarm P ^ F becomes smaller and the link opportunities are more likely to be detected in the air. With the further growth of T s e n , U declines on account of consuming more time in the E-MAC processing. By increasing the F s values, the peak of U moves towards a smaller T s e n . The sample number N = F s · T s e n is determined around 5 samples in this case, but the optimal N value also relates to other parameters, such as SNR, N k , δ T , and λ F discussed in Section 4.4.
It worth noting that the capacity of RA-OLS for Figure 13b is 67 according to (25), whilst the capacity for the static scheme is only 3 because of the assumption of one user per link.
Furthermore, we compare the performance between the RA-OLS and the static scheme by differing the link number M and the result is presented in Figure 14. A similar result that the proposed mathematical throughput model is valid for measuring the simulated communication scheme can be obtained by having small absolute errors, i.e., less than 3% in Figure 13a and 2% in the Figure 13b.
As obtained in Figure 14, the RA-OLS and static schemes show the similar U results when M = K = 3 . The M value does not affect the U values with the static scheme (see Figure 14b, whilst the U with RA-OLS scheme improves with the increment of M (see Figure 14a, which reflects the advantages of using RA-OLS scheme on improving the communication performance. By observing the peak values in Figure 14a, the peak of U tends to slow down with the growing M, which also fits the tendency observed in Section 4.3.

5. Conclusions

For providing dynamic communication schemes among multiple UAVs and addressing the spectrum scarcity problem, this paper proposes an RA-OLS enabled UAV communication solution which is capable of supporting swarm operations under the spectrum scarce environments. The spectrum resources are coordinated by ground stations, and uploaded to UAVs. Technical solutions, such as the E-MAVLink and E-MAC layer design are considered, along with the mathematical saturation throughput model denoted for RA-OLS. The I F factor is applied for analyzing the interference extent to other PUs. By demonstrating some typical links, e.g., Wi-Fi, Lora, and Sigfox for single UAV and multiple UAVs, the proposed RA-OLS shows an improvement in utilizing link resources and throughput. The fine-tuned piece-wise throughput model proves to enable the approximation of the simulated communication behaviors with relative errors around 10%. The effects of PU traffic patterns, non-ideal detector, the re-sensing scheme in the E-MAC, and E-MAVLink length on the RA-OLS performance are analyzed with some results highlighted. For instance, the longer and more dense link opportunity in the PU traffic pattern enables an efficient communication; the side effect from the P D resulted by the time delay in non-ideal detectors can be compensated by having a bigger T s e n ; the re-sensing scheme alleviates the T s e n value at the cost of degradation of the peak value of U; and n o presents limited impact in terms of utilization rate and IF. Additionally, by comparing with the static communication scheme, the utilization rate for RA-OLS is improved by over 50% than the static scheme with sufficient link resources, and the utilization rate is greater than the best rate with the static scheme by nearly 20%.

Author Contributions

Conceptualization, Z.X., I.P. and A.T.; methodology software and validation, Z.X.; writing, Z.X.; supervision, I.P. and A.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jain, R.; Templin, F. Requirements, Challenges and Analysis of Alternatives for Wireless Datalinks for Unmanned Aircraft Systems. IEEE J. Sel. Areas Commun. 2012, 30, 852–860. [Google Scholar] [CrossRef]
  2. Reyes, H.; Kaabouch, N. Improving the reliability of unmanned aircraft system wireless communications through cognitive radio technology. Commun. Netw. 2013, 5, 225. [Google Scholar] [CrossRef] [Green Version]
  3. Kubera, B.; Ehammer, M. A survey of multilink concepts for aeronautical data link communications. In Proceedings of the IEEE 2013 Integrated Communications, Navigation and Surveillance Conference (ICNS), Herndon, VA, USA, 22–25 April 2013; pp. 1–12. [Google Scholar]
  4. Wang, D.; Wang, Y.; Dong, S.; Huang, G.; Liu, J.; Gao, W. Exploiting Dual Connectivity for Handover Management in Heterogeneous Aeronautical Network. IEEE Access 2019, 7, 62938–62949. [Google Scholar] [CrossRef]
  5. Wang, W.; Talvitie, J.; Adamova, E.J.; Fath, T.; Korenciak, L.; Valkama, M.; Lohan, E.S. Empowering Heterogeneous Communication Data Links in General Aviation through mmWave Signals. IEEE Wirel. Commun. 2019, 26, 164–171. [Google Scholar] [CrossRef]
  6. Niraula, M.; Graefe, J.; Dlouhy, R.; Layton, M.; Stevenson, M. ATN/IPS security approach: Two-way mutual authentication, data integrity and privacy. In Proceedings of the IEEE 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS), Herndon, VA, USA, 10–12 April 2018; pp. 1A3-1–1A3-17. [Google Scholar]
  7. Saccone, G.T.; Olive, M.L.; Matyas, M.E.; Smith, D.C. Safety services using the internet protocol suite: Benefits, progress, and challenges. In Proceedings of the 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), Prague, Czech Republic, 13–17 September 2015; pp. 2B1-1–2B1-10. [Google Scholar]
  8. He, Z.; Cao, J.; Liu, X. SDVN: Enabling rapid network innovation for heterogeneous vehicular communication. IEEE Netw. 2016, 30, 10–15. [Google Scholar] [CrossRef]
  9. Shamsoshoara, A.; Afghah, F.; Razi, A.; Mousavi, S.; Ashdown, J.; Turk, K. An Autonomous Spectrum Management Scheme for Unmanned Aerial Vehicle Networks in Disaster Relief Operations. IEEE Access 2020, 8, 58064–58079. [Google Scholar] [CrossRef]
  10. Chen, Q.; Liang, Y.C.; Motani, M.; Wong, W.C. A two-level MAC protocol strategy for opportunistic spectrum access in cognitive radio networks. IEEE Trans. Veh. Technol. 2011, 60, 2164–2180. [Google Scholar] [CrossRef]
  11. Luo, S.; Xiao, Y.; Lin, R.; Xie, X.; Bi, G.; Zhao, Y.; Huang, J. Opportunistic Spectrum Access for UAV Communications Towards Ultra Dense Networks. IEEE Access 2019, 7, 175021–175032. [Google Scholar] [CrossRef]
  12. Liang, Y.C.; Zeng, Y.; Peh, E.C.; Hoang, A.T. Sensing-throughput tradeoff for cognitive radio networks. IEEE Trans. Wirel. Commun. 2008, 7, 1326–1337. [Google Scholar] [CrossRef]
  13. Xin, C.; Ma, L.; Shen, C.C. A path-centric channel assignment framework for cognitive radio wireless networks. Mob. Networks Appl. 2008, 13, 463–476. [Google Scholar] [CrossRef]
  14. Xu, Z.; Petrunin, I.; Tsourdos, A.; Sabyasachi, M.; Williamson, A. Cognitive Communication Scheme for Unmanned Aerial Vehicle Operation. In Proceedings of the IEEE 2019 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED UAS), Cranfield, UK, 25–27 November 2019; pp. 271–277. [Google Scholar]
  15. Byun, S.S.; Gil, J.M. Fair dynamic spectrum allocation using modified game theory for resource-constrained cognitive wireless sensor networks. Symmetry 2017, 9, 73. [Google Scholar] [CrossRef] [Green Version]
  16. Le, L.B.; Le, L.T. Channel assignment with access contention resolution for cognitive radio networks. IEEE Trans. Veh. Technol. 2012, 61, 2808–2823. [Google Scholar]
  17. Chai, R.; Li, Y.; Chen, Q. Joint pricing and spectrum allocation for cognitive radio network. In Proceedings of the IEEE 2013 8th International Conference on Communications and Networking in China (CHINACOM), Guilin, China, 14–16 August 2013; pp. 633–637. [Google Scholar]
  18. Wang, H.; Nguyen, D.N.; Dutkiewicz, E.; Fang, G.; Mueck, M.D. Negotiable auction based on mixed graph: A novel spectrum sharing framework. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 390–403. [Google Scholar] [CrossRef]
  19. Ye, W.; Heidemann, J.; Estrin, D. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1567–1576. [Google Scholar]
  20. Chen, S.; Yuan, Z.; Muntean, G.M. Balancing energy and quality awareness: A MAC-layer duty cycle management solution for multimedia delivery over wireless mesh networks. IEEE Trans. Veh. Technol. 2016, 66, 1547–1560. [Google Scholar] [CrossRef] [Green Version]
  21. Koubâa, A.; Allouch, A.; Alajlan, M.; Javed, Y.; Belghith, A.; Khalgui, M. Micro Air Vehicle Link (MAVlink) in a Nutshell: A Survey. IEEE Access 2019, 7, 87658–87680. [Google Scholar] [CrossRef]
  22. Geirhofer, S.; Tong, L.; Sadler, B.M. Cognitive radios for dynamic spectrum access-dynamic spectrum access in the time domain: Modeling and exploiting white space. IEEE Commun. Mag. 2007, 45, 66–72. [Google Scholar] [CrossRef] [Green Version]
  23. Ding, G.; Jiao, Y.; Wang, J.; Zou, Y.; Wu, Q.; Yao, Y.; Hanzo, L. Spectrum Inference in Cognitive Radio Networks: Algorithms and Applications. IEEE Commun. Surv. Tutor. 2018, 20, 150–182. [Google Scholar] [CrossRef] [Green Version]
  24. Xu, Z.; Petrunin, I.; Tsourdos, A. Identification of Communication Signals Using Learning Approaches for Cognitive Radio Applications. IEEE Access 2020, 8, 128930–128941. [Google Scholar] [CrossRef]
  25. Gao, Y.; Jiang, Y. Performance analysis of a cognitive radio network with imperfect spectrum sensing. In Proceedings of the IEEE 2010 INFOCOM IEEE Conference on Computer Communications Workshops, San Diego, CA, USA, 15–19 March 2010; pp. 1–6. [Google Scholar]
  26. Xu, Z.; Ivan, P.; Li, T.; Tsourdos, A. Greedy Based Proactive Spectrum Handoff Scheme for Cognitive Radio Systems. In Proceedings of the 2019 IEEE Cognitive Communications for Aerospace Applications Workshop (CCAAW), Cleveland, OH, USA, 25–27 June 2019; pp. 1–5. [Google Scholar]
  27. Barlow, R.E.; Hunter, L.C. Reliability analysis of a one-unit system. Oper. Res. 1961, 9, 200–208. [Google Scholar] [CrossRef]
  28. Gupta, R.D.; Kundu, D. Generalized exponential distribution: Different method of estimations. J. Stat. Comput. Simul. 2001, 69, 315–337. [Google Scholar] [CrossRef]
  29. Hasslinger, G.; Hohlfeld, O. Analysis of packet errors in Gilbert-Elliott channels. In Proceedings of the 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications, San Francisco, CA, USA, 26–29 June 2011; pp. 216–220. [Google Scholar]
  30. Depoorter, D.G.; Kellerer, W. Designing the air–ground data links for future air traffic control communications. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 135–146. [Google Scholar] [CrossRef]
  31. Korhonen, J.; Wang, Y. Effect of packet size on loss rate and delay in wireless links. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005; Volume 3, pp. 1608–1613. [Google Scholar]
  32. Zhou, Y.; Li, J.; Lamont, L.; Rabbath, C.A. Modeling of packet dropout for UAV wireless communications. In Proceedings of the 2012 International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA, 30 January–2 February 2012; pp. 677–682. [Google Scholar]
  33. Olabiyi, O.; Annamalai, A. Extending the capability of energy detector for sensing of heterogeneous wideband spectrum. In Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 14–17 January 2012; pp. 454–458. [Google Scholar]
  34. Plata, D.M.M.; Reátiga, Á.G.A. Evaluation of energy detection for spectrum sensing based on the dynamic selection of detection-threshold. Procedia Eng. 2012, 35, 135–143. [Google Scholar] [CrossRef] [Green Version]
  35. Chieochan, S.; Hossain, E.; Diamond, J. Channel assignment schemes for infrastructure-based 802.11 WLANs: A survey. IEEE Commun. Surv. Tutor. 2010, 12, 124–136. [Google Scholar] [CrossRef]
  36. Ebrahimzadeh, A.; Najimi, M.; Andargoli, S.M.H.; Fallahi, A. Sensor selection and optimal energy detection threshold for efficient cooperative spectrum sensing. IEEE Trans. Veh. Technol. 2014, 64, 1565–1577. [Google Scholar] [CrossRef]
  37. Bai, L.; Choi, J. Low Complexity MIMO Detection; Springer Science & Business Media: Berlin, Germany, 2012. [Google Scholar]
  38. Le, L.; Hossain, E. A MAC protocol for opportunistic spectrum access in cognitive radio networks. In Proceedings of the 2008 IEEE Wireless Communications and Networking Conference, Las Vegas, NV, USA, 31 March–3 April 2008; pp. 1426–1430. [Google Scholar]
  39. David, H.A.; Nagaraja, H.N. Order statistics; John Wiley & Sons Media: Hoboken, NJ, USA, 2004. [Google Scholar]
  40. Neji, N.; Mostfa, T. Communication technology for Unmanned Aerial Vehicles: A qualitative assessment and application to Precision Agriculture. In Proceedings of the 2019 International Conference on Unmanned Aircraft Systems (ICUAS), Atlanta, GA, USA, 11–14 June 2019; pp. 848–855. [Google Scholar]
  41. Shuaib, K.; Boulmalf, M.; Sallabi, F.; Lakas, A. Performance analysis co-existence of IEEE 802.11 g with Bluetooth. In Proceedings of the Second IFIP International Conference on Wireless and Optical Communications Networks, WOCN, Dubai, UAE, 6–8 March 2005; pp. 40–44. [Google Scholar]
  42. Zhang, R.; Wang, M.; Cai, L.X.; Shen, X.; Xie, L.L.; Cheng, Y. Modeling and analysis of MAC protocol for LTE-U co-existing with Wi-Fi. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  43. Waret, A.; Kaneko, M.; Guitton, A.; El Rachkidy, N. LoRa throughput analysis with imperfect spreading factor orthogonality. IEEE Wirel. Commun. Lett. 2018, 8, 408–411. [Google Scholar] [CrossRef] [Green Version]
  44. Mikhaylov, K.; Petäjäjärvi, J.; Janhunen, J. On LoRaWAN scalability: Empirical evaluation of susceptibility to inter-network interference. In Proceedings of the IEEE 2017 European Conference on Networks and Communications (EuCNC), Oulu, Finland, 12–15 June 2017; pp. 1–6. [Google Scholar]
  45. Knuth, D.E. Art of Computer Programming, Volume 2: Seminumerical Algorithms; Addison-Wesley Professional: Boston, MA, USA, 2014. [Google Scholar]
Figure 1. Demonstration of a spectrum occupation diagram enabled by the RA-OLS scheme.
Figure 1. Demonstration of a spectrum occupation diagram enabled by the RA-OLS scheme.
Sensors 21 00534 g001
Figure 2. System diagram of the RA-OLS enabled UAV communication.
Figure 2. System diagram of the RA-OLS enabled UAV communication.
Sensors 21 00534 g002
Figure 3. E-MAVLink Header.
Figure 3. E-MAVLink Header.
Sensors 21 00534 g003
Figure 4. Enhanced MAC protocol enabled with the sensing before transmission scheme where the maximum re-sensing time R = 3 .
Figure 4. Enhanced MAC protocol enabled with the sensing before transmission scheme where the maximum re-sensing time R = 3 .
Sensors 21 00534 g004
Figure 5. State transition diagram based on a two-state Markov process [32].
Figure 5. State transition diagram based on a two-state Markov process [32].
Sensors 21 00534 g005
Figure 6. Simulation flow chart for dynamic spectrum sharing with RA-OLS scheme.
Figure 6. Simulation flow chart for dynamic spectrum sharing with RA-OLS scheme.
Sensors 21 00534 g006
Figure 7. Communication performance with single UAV operation.
Figure 7. Communication performance with single UAV operation.
Sensors 21 00534 g007
Figure 8. Communication performance with two UAVs operations.
Figure 8. Communication performance with two UAVs operations.
Sensors 21 00534 g008
Figure 9. Utilization rate among individual links with K = 2 UAVs. (The blue solid lines are the link utilizations with RA-OLS, while the orange virtual lines represent the initial link occupation without transmissions).
Figure 9. Utilization rate among individual links with K = 2 UAVs. (The blue solid lines are the link utilizations with RA-OLS, while the orange virtual lines represent the initial link occupation without transmissions).
Sensors 21 00534 g009
Figure 10. Saturation throughput per UAV derived from the simulated data and the mathematical model.
Figure 10. Saturation throughput per UAV derived from the simulated data and the mathematical model.
Sensors 21 00534 g010
Figure 11. Communication performance surface from the simulated data and the mathematical model.
Figure 11. Communication performance surface from the simulated data and the mathematical model.
Sensors 21 00534 g011
Figure 12. Utilization rate versus interference factor by differing T s e n with M = 6 links and K = 3 UAVs.
Figure 12. Utilization rate versus interference factor by differing T s e n with M = 6 links and K = 3 UAVs.
Sensors 21 00534 g012
Figure 13. Utilization rate versus sensing time and F s when S N R = 1 .
Figure 13. Utilization rate versus sensing time and F s when S N R = 1 .
Sensors 21 00534 g013
Figure 14. Spectrum utilization rate by differing link number with K = 3 UAVs, S N R = 1 dB, and F s = 400 Hz.
Figure 14. Spectrum utilization rate by differing link number with K = 3 UAVs, S N R = 1 dB, and F s = 400 Hz.
Sensors 21 00534 g014
Table 1. Explanation of E-MAVLink frame.
Table 1. Explanation of E-MAVLink frame.
AcronymDescription
STXState-of-test marker for indicating start of package.
LENLength of payload.
INCIncompatibility flag for compatibility of receivers.
CMPCompatiblity flag.
SEQNumber of packet sequence.
SYSIdentification of system.
COMPIdentification of components sending messages.
MSGIdentification of message type in payload.
PAYLOADMessages.
CKA/BChecksum.
SIGSignature of package for security purpose.
NLHSNumber of the segmented LHS. (0 × 00   n o )
SPAYLOADMessage of LHS.
Table 2. Link parameter configurations.
Table 2. Link parameter configurations.
FrequencyNetwork TypeTechnology N n N k Throughput bps λ a λ v Minimum SNR
2.4–2.49 GHz MHzWLANWi-Fi13410 M9910 dB
868–870 MHzLPWANLora1762 k66−2 dB
902–928 MHzLPWANSigFox8311 k77−1 dB
Table 3. PU traffic parameters and other parameters configurations.
Table 3. PU traffic parameters and other parameters configurations.
ParameterValueParameterValue
T o 2 s λ Δ T 0.6
λ b 0.1 ϵ 0.9
λ L 10 λ Q 10 7
F s 2000 T s e n 0.01 s
δ T 0.01 s P ¯ D 0.9
R3 n o 4
Table 4. Probability of false alarm with its threshold value over links.
Table 4. Probability of false alarm with its threshold value over links.
12345678910
Wi-Fi0.04–0.240.35–0.430.50–0.560.74–0.800.84–0.890.90–0.900.94–1.331.48–1.541.56–1.64N/A
Lora0.22–0.571.05–1.141.43–1.96N/AN/AN/AN/AN/AN/AN/A
Sigfox0.20–0.510.59–0.760.78–0.981.11–1.421.83–1.92N/AN/AN/AN/AN/A
TheoryWi-Fi
0.04–0.24
Wi-Fi
0.35–0.43
Wi-Fi
0.50–0.56
Wi-Fi
0.74–0.80
Wi-Fi
0.84–0.89
Wi-Fi
0.90–0.90
Wi-Fi
0.94–1.33
Wi-Fi
1.48–1.54
Wi-Fi
1.56–1.64
Lora
1.64–1.96
AccessWi-Fi
0.06–0.24
Wi-Fi
0.37–0.43
Wi-Fi
0.52–0.56
Wi-Fi
0.76–0.80
Wi-Fi
0.86–0.89
N/AWi-Fi
0.96–1.33
Wi-Fi
1.5–1.54
Wi-Fi
1.58–1.64
Lora
1.67–1.96
Table 5. Sensitivity table of performance to packet dropout rate parameters.
Table 5. Sensitivity table of performance to packet dropout rate parameters.
d/m40006000800010,00012,00014,000
P ^ d 0.11360.14310.28860.59390.87070.9799
T h U A V 0.30830.30440.25060.14570.04490.0071
e n d 0.10640.08040.10040.06740.08270.0839
e t h 0.14500.12100.13040.10990.14600.1232
s r 1 × 10 9 4 × 10 9 7 × 10 9 10 8 1.3 × 10 8 1.6 × 10 8
P ^ d 0.11180.15560.33510.59390.80460.9232
T h U A V 0.31650.30550.23970.14540.07020.0268
e n d 0.08650.07120.06910.08500.07020.1317
e t h 0.11760.10060.10490.11260.09590.1417
p g g 0.4950.5950.6950.7950.8950.995
P ^ d 0.96650.95890.94700.92540.87400.5939
T h U A V 0.01200.01460.02030.02910.04380.1438
e n d 0.08110.10880.04370.00850.09910.0844
e t h 0.10870.12150.04050.02140.14660.1245
Table 6. Sensitivity table of performance to spectrum sensing parameters.
Table 6. Sensitivity table of performance to spectrum sensing parameters.
P D 0.90.9150.930.9450.960.975
P ^ F 0.07870.16180.31080.53850.80020.9700
T h U A V 0.14130.13760.13410.11440.08150.0300
F ^ p f 0.000490.00420.03000.15620.51230.9126
F p f 0.00920.02770.07340.18520.42950.7808
e t h 0.14470.17070.17030.1611−0.0922−0.5682
SNR−5−4−3−2−10
P ^ F 0.98620.89540.52590.0787 0.00064 3.5 × 10 8
T h U A V 0.01940.05890.11470.14270.13890.1440
F ^ p f 0.95930.71790.14550.00049 2.6 × 10 12 4.5 × 10 25
F p f 0.85720.57720.17990.0090 5.2 × 10 07 0
e t h −0.6901−0.28220.17420.13310.16500.1238
N k 234567
P ^ F 0.85130.63590.39040.19460.07870.0258
T h U A V 0.02230.06140.10610.13160.13840.1417
F ^ p f 0.61690.25710.05950.00740.000490.0000017
F p f 0.83900.54900.23690.06200.00960.00091
e t h 1.58610.88030.42310.22020.16900.1421
Table 7. Sensitivity table of performance to E-MAVLink and E-MAC parameters.
Table 7. Sensitivity table of performance to E-MAVLink and E-MAC parameters.
R12345
T h U A V 0.08340.11610.13210.13330.1391
T h ^ U A V 0.11150.14620.15700.15860.1574
F ^ p f 0.31080.09660.03000.00930.0029
F p f 0.41530.17310.07330.03010.0131
n o 246810
T h U A V 0.12950.13850.12980.13110.1363
T h ^ U A V 0.15700.15700.15700.15700.1570
e n d 4.87374.87374.87374.87374.8737
e ^ n d 4.47244.42293.89673.62753.4366
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xu, Z.; Petrunin, I.; Tsourdos, A. Modeling and Performance Analysis of Opportunistic Link Selection for UAV Communication. Sensors 2021, 21, 534. https://doi.org/10.3390/s21020534

AMA Style

Xu Z, Petrunin I, Tsourdos A. Modeling and Performance Analysis of Opportunistic Link Selection for UAV Communication. Sensors. 2021; 21(2):534. https://doi.org/10.3390/s21020534

Chicago/Turabian Style

Xu, Zhengjia, Ivan Petrunin, and Antonios Tsourdos. 2021. "Modeling and Performance Analysis of Opportunistic Link Selection for UAV Communication" Sensors 21, no. 2: 534. https://doi.org/10.3390/s21020534

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop