Next Article in Journal
Public Acceptance of Remotely Piloted Aircraft (RPA) Operations in Sydney Harbour
Next Article in Special Issue
ESS-DETR: A Lightweight and High-Accuracy UAV-Deployable Model for Surface Defect Detection
Previous Article in Journal
Urban Medical Emergency Logistics Drone Base Station Location Selection
Previous Article in Special Issue
An Intelligent Passive System for UAV Detection and Identification in Complex Electromagnetic Environments via Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Uplink Opportunistic Scheduling for Multi-UAV-Assisted Internet of Things

College of Information Science and Technology & Artificial Intelligence, Nanjing Forestry University, Nanjing 210037, China
*
Author to whom correspondence should be addressed.
Drones 2026, 10(1), 18; https://doi.org/10.3390/drones10010018
Submission received: 24 November 2025 / Revised: 26 December 2025 / Accepted: 26 December 2025 / Published: 28 December 2025

Highlights

What are the main findings?
  • This paper proposes a low-overhead uplink opportunistic scheduling framework leveraging channel reciprocity. To address the prohibitive uplink training overhead resulting from conventional downlink scheduling methods, we innovatively utilize minimum downlink interference (MDI) and the maximum downlink signal-to-interference-plus-noise ratio (MD-SINR) as criteria for scheduling uplink users, effectively reducing system overhead while fully exploiting multiuser diversity gains.
  • Rigorous closed-form sum rate performance are provided for both dual-unmanned aerial vehicle (UAV) and three-UAV deployment scenarios under the MDI scheduling criterion. We further derive closed-form expressions for the asymptotic sum rate and prove that the dual-UAV system can achieve a total of 2 α degrees of freedom (DoF) when the number of users scales as K = ρ α , with ρ denoting the transmitted signal-to-noise ratio (SNR).
What are the implications of the main findings?
  • The proposed scheme offers an efficient scheduling solution for low-power, large-scale Internet of Things (IoT) data collection. By significantly reducing uplink channel training overhead, it enables UAVs to efficiently serve massive low-power ground sensors, making it particularly suitable for infrastructure-less scenarios such as environmental monitoring and disaster relief in remote areas.
  • The findings reveal an adaptive relationship between the number of deployed UAVs and the transmission strategy. Simulation results demonstrate that a dual-UAV deployment achieves superior performance over single- or three-UAV deployments at medium transmitted SNR levels, providing key theoretical guidance for dynamically selecting the optimal deployment strategy based on transmit power in practical systems.

Abstract

Due to the high mobility, flexibility, and low cost, unmanned aerial vehicles (UAVs) can provide an efficient way for provisioning data communication and computing offloading services for massive Internet of Things (IoT) devices, especially in remote areas with limited infrastructure. However, current transmission schemes for unmanned aerial vehicle-assisted Internet of Things (UAV-IoT) predominantly employ polling scheduling, thus not fully exploiting the potential multiuser diversity gains offered by a vast number of IoT nodes. Furthermore, conventional opportunistic scheduling (OS) or opportunistic beamforming techniques are predominantly designed for downlink transmission scenarios. When applied directly to uplink IoT data transmission, these methods can incur excessive uplink training overhead. To address these issues, this paper first proposes a low-overhead multi-UAV uplink OS framework based on channel reciprocity. To avoid explicit massive uplink channel estimation, two scheduling criteria are designed: minimum downlink interference (MDI) and the maximum downlink signal-to-interference-plus-noise ratio (MD-SINR). Second, for a dual-UAV deployment scenario over Rayleigh block fading channels, we derive closed-form expressions for both the average sum rate and the asymptotic sum rate based on the MDI criterion. A degrees-of-freedom (DoF) analysis demonstrates that when the number of sensors, K, scales as ρ α , the system can achieve a total of 2 α DoF, where α 0 , 1 is the user-scaling factor and ρ is the transmitted signal-to-noise ratio (SNR). Third, for a three-UAV deployment scenario, the Gamma distribution is employed to approximate the uplink interference, thereby yielding a tractable expression for the average sum rate. Simulations confirm the accuracy of the performance analysis for both dual- and three-UAV deployments. The normalized error between theoretical and simulation results falls below 1% for K > 30. Furthermore, the impact of fading severity on the system’s sum rate and DoF performance is systematically evaluated via simulations under Nakagami-m fading channels. The results indicate that more severe fading (a smaller m) yields greater multiuser diversity gain. Both the theoretical and simulation results consistently show that within the medium-to-high SNR regime, the dual-UAV deployment outperforms both the single-UAV and three-UAV schemes in both Rayleigh and Nakagami-m channels. This study provides a theoretical foundation for the adaptive deployment and scheduling design of UAV-assisted IoT uplink systems under various fading environments.

1. Introduction

Since the advent of the 4G and 5G eras, the application domains and market scale of the Internet of Things (IoT) have witnessed rapid and exponential growth. In the increasingly diverse IoT application scenarios, a massive number of IoT terminal devices such as wearable electronics, various sensors, and smart home appliances rely on a wide range of wireless and wired networks to support data transmission and network services [1,2].
As a promising IoT technology, cellular IoT can leverage existing cellular network infrastructures to provide ubiquitous coverage to numerous IoT connections, without investing and deploying dedicated IoT networks [3]. Some popular cellular IoT technologies developed in the 3rd-Generation Partnership Project (3GPP), such as Narrow-Band Internet of Things (NB-IoT), have been extensively deployed and have contributed about 80 percent of the increased IoT connections [4]. It is also forecasted that the cellular IoT connections will reach 5.5 billion by 2027 [5]. With the support of emerging technologies such as edge intelligence, Reconfigurable Intelligent Surfaces (RISs), space–air–ground–underwater communications, Terahertz communications, new modulation/demodulation technologies, and massive ultra-reliable and low-latency communications, the sixth-generation (6G) wireless communication networks will continue to promote the proliferation of IoT applications in new domains, including healthcare IoT, vehicular IoT and autonomous driving, unmanned aerial vehicles, satellite IoT, and industrial IoT [6,7,8,9].
A fundamental constraint of cellular IoT, however, is its reliance on existing infrastructure, which limits its applicability to support IoT devices in remote or inaccessible regions. Consequently, the Internet of Remote Things (IoRT) has emerged to deploy IoT solutions in remote and geographically isolated areas without terrestrial nor cellular networks. The typical prominent applications include environmental monitoring, wildlife tracking, disaster relief management, and internet of Underground/Underwater things [5]. Additionally, traditional cellular networks exhibit several limitations such as coverage gaps and low communication energy efficiency [10]. To overcome these challenges, the emerging unmanned aerial vehicle-assisted Internet of Things (UAV-IoT) has garnered substantial attention from both academia and industry in recent years. In this framework, highly mobile and low-cost UAVs can extend radio coverage to inaccessible and infrastructure-less areas or fill coverage gaps in terrestrial networks. Flexible three-dimensional trajectory planning can shorten the communication distance between UAVs and terminal devices and avoid obstructive paths that induce high signal attenuation. The resultant improvement in communication energy efficiency significantly extends the battery life of ground IoT devices [10,11].
In typical UAV-IoT scenarios, flight trajectories are pre-planned based on the positions of ground IoT devices. After takeoff, the UAVs disseminate data to or collect raw data from ground IoT devices when flying by. In data collection applications, the gathered data are sent forward to a cloud data center for further analysis. Due to the constraints of the low cost, the long deployment duration, and the need for unmanned operation maintenance, ground devices in UAV-IoT systems are typically limited in battery capacity, computing capability, transmit power, and data rate. In more stringent zero-power communication scenarios, battery-less IoT devices can harvest energy from ambient radio waves. These devices are characterized by ultra-low power consumption, minimal size, and extremely low cost [12].
In IoT systems, UAVs are capable of performing multiple functions. They can serve as aerial relays to expand communication range and ensure seamless multi-hop connectivity, act as Mobile Edge Computing (MEC) servers for processing offloaded tasks locally, and function as energy transmitters in Wireless Power Transfer (WPT) networks [13]. Therefore, compared with traditional wireless sensor networks and satellite networks, UAV-IoT offers advantages in performing information dissemination, data collection, and task execution with low cost and high energy efficiency [14,15,16]. In addition to communication services, UAV-mounted Edge Computing (UMEC) can further provide computation offloading for IoT devices with limited processing capabilities, where UAVs are equipped with computing servers and can process tasks onboard [17]. UMEC can significantly reduce end-to-end communication delays for many emerging applications, as well as perform preliminary processing of raw data to decrease the volume of data transmitted back to terrestrial data centers [18,19].
In UAV-IoT scenarios, a large number of ground terminal devices establish wireless links with multiple UAVs, forming a typical Interfering Broadcast Channel (IBC) or Interfering Multiple-Access Channel (IMAC). In such settings, different users experience independent time-varying channel fadings, and methods such as opportunistic scheduling (OS) or opportunistic beamforming (OBF) offer significant advantages [20,21].
The OBF method, which is also called random beamforming (RBF), was initially proposed to enhance multiuser diversity in slow-fading downlink multiuser Multiple-Input Single-Output (MISO) broadcast channels (BCs). By employing random beamforming vectors, it artificially induces larger and faster fluctuations in the effective channel gain. Then, the user whose instantaneous effective channel gain or SNR is near the peak is scheduled to establish communication connections [22]. In an independent Rayleigh fast-fading environment, when the base station transmits only a single random beamforming vector, the distribution of the users’ effective channel gain becomes identical to that of the single-antenna case. In this situation, OBF degenerates into OS [23]. In addition to multiuser diversity gain, OBF offers another advantage in multiuser Multiple-Input Multiple-Output (MIMO) systems in that it requires only partial Channel State Information (CSI), thereby achieving high spectral efficiency with lower implementation complexity and reduced feedback overhead [24,25,26]. In downlink MIMO BC or IBC scenarios, conventional beamforming requires the estimation and feedback of global Channel State Information (CSI). The transmitter then computes the transmit precoding and decoding matrices based on this global CSI, leading to high computational complexity. In contrast, OBF randomly selects the precoding matrix, and each user only feeds back channel side information instead of the full channel matrix, thereby reducing both the feedback overhead and the computational complexity for precoding and decoding matrices [27,28]. Although OS or OBF transmission strategies are well-suited for UAV-IoT scenarios, most current research still predominantly relies on simple polling-based scheduling and resource allocation schemes like Time Division Multiple Address (TDMA) or Frequency Division Multiple Access (FDMA). This approach fails to fully exploit the multiuser diversity gain offered by the massive number of IoT devices [29,30,31].
Recently, several studies have established performance analysis methods for OBF-based scheduling in downlink BC and IBC scenarios. In a multi-cell MISO BC setting, Sung-Hyun Moon et al. derived a closed-form expression for the asymptotic sum rate under homogeneous user deployment. They concluded that the system’s average achievable sum rate scales as M s log 2 log 2 K , where M s represents the number of concurrently scheduled users and K denotes the total number of users [24]. Suo et al. further extended the analysis framework to multi-cell MIMO broadcast channels, developed a more comprehensive analytical model, and derived a closed-form expression for the average sum rate, effectively accounting for heterogeneous user deployment and heterogeneous scheduling probabilities [25]. Aljumaily et al. investigated the impact of user mobility on the performance of OBF in millimeter-wave communication systems, concluding that user movement leads to beam misalignment, which in turn causes a significant throughput degradation of up to 27% [26]. Bao et al. conducted a study on the physical layer security of OBF. They compared the impact of eavesdropper collusion strategies and the establishment of a secrecy guard zone on the system’s secrecy performance and derived closed-form expressions for the secrecy outage probability under various scenarios [27]. Su et al. addressed the problem that conventional opportunistic beamforming suffers a severe performance degradation when the number of users is small. They proposed a scheme utilizing selection combining, equal-gain combining, or maximal-ratio combining in a multi-receive-antenna configuration. Closed-form expressions for the system achievable sum rate are derived over Nakagami-m fading channels. The results show that the proposed method can effectively exploit the combining gain from multiple antennas to compensate for the insufficient multiuser diversity gain [28].
In addition, researchers have integrated OS or RBF techniques with RISs, where the random phases introduced by the IRS are used to induce channel fluctuations. This approach can significantly enhance spectral efficiency while avoiding the increased CSI training requirements and overhead associated with large IRS arrays [32,33,34,35,36]. Psomas et al. analyzed the outage probability and energy-efficiency performance of an RBF transmission scheme in RIS-assisted single-user single-input single-output (SISO) systems. The effectiveness of the theoretical analysis was validated through numerical simulations, demonstrating that, in this setting, the RBF approach offers significant advantages in terms of low complexity, reduced CSI requirements, and high energy efficiency [32]. In [33], Nadeem et al. derived the closed-form expressions for the average achievable sum rate in a RIS-assisted SISO BC scenario that considers only the RIS-reflected link. Their analysis covers independent Rayleigh fading, independent Rician fading, and correlated Rayleigh fading channels. Subsequently, for RIS-assisted SISO/MISO BCs incorporating both the direct link and the RIS-reflected links, Nadeem et al. further derived the expressions for the average and asymptotic sum rate under slow fading and correlated Rayleigh fading conditions. Leveraging these expressions, they then optimized system configuration parameters such as the number of base station antennas, the number of RIS elements, and the transmit power with the objective of maximizing system energy efficiency [34,35]. Dimitropoulou et al. proposed an RBF scheduling method based on multiple beam-groups for IRS-assisted MISO BCs. During the channel training stage, multiple groups of random beams are transmitted, and the optimal group is then selected based on the signal-to-interference-plus-noise-ratio (SINR) feedback from users. The authors revealed a tradeoff between system performance and channel training overhead and derive an integral-form expression for the average sum rate along its upper bound by using extreme value theory tools. However, this upper bound shows a noticeable deviation from the simulation results [36].
Most existing performance analyses of OS and RBF systems focus on downlink BC and IBC scenarios. However, in UAV-IoT applications, uplink data collection is much more prevalent. Jung et al. analyzed the system performance of uplink IMACs employing opportunistic interference nulling (OIN) and opportunistic interference alignment (OIA) in terms of degrees of freedom (DoF), where DoF is defined as the ratio of the achievable sum rate to the logarithm of the transmitted signal-to-noise ratio (SNR), as the SNR approaches infinity [37].
Moreover, in uplink UAV-IoT scenarios, the number of ground devices is typically much larger than the number of UAVs. If traditional OS or OBF scheduling methods are applied directly, each ground device must perform uplink channel training and estimation, resulting in prohibitively high training overhead. Although employing traditional designed beamforming can reduce the channel training cost, it fails to fully exploit multiuser diversity gains. Therefore, it is necessary to design OS schemes specifically tailored for uplink UAV-IoT scenarios.
The workflow of the proposed uplink scheduling schemes and performance analysis results is shown in Figure 1, and the main contributions of this paper are summarized as follows:
  • We first propose a low-complexity and low-overhead OS strategy for uplink UAV-IoT scenarios. By leveraging channel reciprocity, we utilize downlink interference and downlink SINR as scheduling metrics for uplink users and design user scheduling procedures based on minimum downlink interference (MDI) and maximum downlink SINR (MD-SINR).
  • For the dual-UAV deployment case over Rayleigh block fading channels with the MDI scheduling criterion, we derive closed-form expressions for the sum rate and the asymptotic sum rate as the transmitted SNR is finite and approaches infinity, respectively, and analyze the DoF performance. The DoF analysis results show that when the number of sensors K scales as ρ α , the system can sustain a total DoF of 2 α where ρ is the transmitted SNR.
  • For the three-UAV deployment case over Rayleigh block fading channels, by approximating the uplink user interference with a Gamma distribution, we obtain the average sum rate expression under the MDI scheduling criterion.
  • We perform Monte Carlo simulations to validate the correctness of the theoretical analysis showing a normalized error of less than 1%. The simulation results under Nakagami-m fading channels reveal that the system sum rate and DoF decrease with the parameter m. Moreover, in the medium-to-high transmitted SNR regime, deploying two UAVs yields a higher system sum rate compared with deploying more UAVs or only one UAV.
Figure 1. Flowchart of proposed methods.
Figure 1. Flowchart of proposed methods.
Drones 10 00018 g001
The remainder of this paper is organized as follows. Section 2 introduces the system model. Section 3 presents the principles and procedures of the uplink OS scheme based on channel reciprocity. Section 4 and Section 5 are dedicated to the performance analysis for the dual-UAV and three-UAV scenarios, respectively. The simulation results and analyses are shown in Section 6, and Section 7 concludes the paper.

2. System Model

As illustrated in Figure 2, we consider a multi-UAV uplink data collection scenario for IoT applications. A massive number of IoT sensors belonging to various IoT applications, such as contamination detectors, environmental parameter collectors, fire and smoke sensors, and wildlife trackers, are scattered across remote areas lacking cellular infrastructure. Those sensors possess limited battery capacity and computing capability, and their collected data cannot be processed by themselves. Multiple UAVs are deployed to collect data from these ground sensors efficiently. The UAVs take off from a base, hover above the target area for a period, and subsequently relay the data to cellular base station. The offloaded data can be further processed at an edge data center or a remote cloud data center. If the UAVs are equipped with onboard servers, they can also provide computation services for ground sensors. We assume the number of sensors, denoted by K, is significantly larger than the number of UAVs, denoted by N, i.e., K N . Both UAVs and sensors are assumed to be equipped with a single antenna. The symbols used are listed in Table 1.
The UAVs are denoted as U 1 , U 2 , , U N and the sensors are denoted as s 1 , s 2 , , s K . It is assumed that all UAVs transmit with the same downlink power, denoted by P d , and all sensors transmit with the same uplink power, denoted by P u . The downlink and uplink complex channels between UAV U i and sensor s k are denoted by h k , i and g i , k , respectively.
Consider the homogeneous UAV and sensor deployment scenario with block fading, where all large-scale fading coefficients are equal to one, and the small-scale fading coefficients h k i for 1 k K and 1 i N are independently and identically distributed (i.i.d.). The channel coefficient h k i remains constant within each time block or frame but varies independently across different blocks. In this paper two typical channel models are considered, i.e., the Rayleigh channel and Nakagami-m channel. The Rayleigh channel model is suitable for scattering environments. For example, the field measurements in [38] verify that the air–to–ground (AG) propagation fading channel follows a Rayleigh distribution in mixed-urban scenarios with large elevation angles. In a Rayleigh channel, the complex channel coefficient h k i is distributed according to C N 0 , 1 , and the channel fading h k i follows a Rayleigh distribution. The Nakagami-m channel model is appropriate for characterizing the UAV fading channels in high-altitude applications [39]. The shape factor m describes the severity of channel fading. When m = 1 , the Nakagami-m channel model reduces to the Rayleigh fading channel model, and when m > 1 , it can be approximated by the Rician channel model. Although Rayleigh or Nakagami-m fading is assumed, the uplink and downlink channels are considered reciprocal under time-division duplexing (TDD) operation, i.e., g i k = h k i H holds within one channel coherence interval. This assumption does not contradict the Rayleigh or Nakagami-m fading model, as reciprocity applies to instantaneous channel realizations rather than their statistical distributions. In the following sections, the Rayleigh channel model is adopted in the closed-form sum rate analysis, while both channel models are used in the simulation part to evaluate the performance of proposed uplink scheduling schemes.

3. Uplink Opportunistic Scheduling Based on Channel Reciprocity

3.1. Principle of Uplink Opportunistic Scheduling

In downlink BC and IBC scenarios, the number of base stations is far smaller than the number of users. Consequently, when OS or OBF is employed, the overhead associated with downlink channel training is relatively small. Moreover, each user only needs to feed back channel-quality indicators such as the SNR, SINR, or interference chord distance, rather than the full channel matrix, which keeps the feedback overhead low. Furthermore, the feedback cost can be reduced even more through limited feedback or threshold-based feedback mechanisms [40,41]. However, in uplink MAC or IMAC scenarios, directly applying OS or OBF would require all users to sequentially transmit channel training symbols, which leads to excessively large uplink training overhead. In addition, because ground sensors typically transmit with much lower power than UAVs, the error in uplink channel estimation is generally larger than that in downlink channel estimation. Therefore, when designing low-overhead uplink scheduling strategies, one can exploit channel reciprocity and let UAVs or the base station perform downlink channel training in a time-division manner to avoid substantial uplink training costs. The uplink link channel quality used for scheduling can then be inferred indirectly from the downlink CSI channel information measured by the ground sensors.
Guided by this principle, this section designs two uplink opportunistic scheduling methods based on channel reciprocity: the MDI and the MD-SINR scheduling schemes. The MDI scheduling approach exploits a key property: if a ground sensor experiences weak interference from non-target UAVs during downlink transmission, it will also generate weak interference toward those non-target UAVs in the uplink. This property stems from channel reciprocity. In the MDI scheduling approach, each ground sensor first measures the received downlink signal powers from all UAVs based on downlink channel estimation. Then, treating the signal from a particular UAV as the desired signal, the sensor computes the total interference power contributed by the remaining UAVs. Let I k , i d denote the total downlink interference power received by sensor s k , when the signal of UAV U i is considered the desired signal, expressed as
I k , i d = 1 j N , j i P d h k , j 2 , k .
To reduce feedback overhead, each sensor s k compares the downlink interference power from all UAVs and identifies the UAV whose signal experiences the minimum level of downlink interference at s k , denoted by U i . U i is determined by s k according to
i = arg min 1 i N I k , i d .
Sensor s k then feeds back the corresponding minimum interference power value, denoted by
I k , i d = min 1 i N I k , i d ,
to UAV U i via the uplink feedback channel. Based on the received feedback, each UAV determines its target sensor according to the MDI criterion: UAV U i selects the sensor that reported the smallest downlink interference value, denoted by S Q , as its target sensor for uplink transmission, i.e.,
Q = arg min 1 k K I k , i d .
During the uplink data transmission phase, UAV U i treats the signal from sensor S Q as the desired signal while treating signals from other sensors as interference. Due to channel reciprocity, since sensor S Q experiences weak interference from its non-target UAVs besides U i in the downlink, it will also generate relatively weak interference to those UAVs during the uplink transmission phase.
When all UAVs adopt the MDI scheduling method, the interference received by the scheduled sensor from its interfering UAVs in the downlink decreases as the number of sensors K increases. Due to channel reciprocity, the interference that this sensor generates to its non-target UAVs in the uplink similarly decreases. As K becomes sufficiently large, the system performance approaches that of an interference-free parallel transmission system. Furthermore, to reduce feedback overhead, a threshold can be introduced, allowing a sensor to report only if its minimum downlink interference power falls below a certain value. This avoids scheduling sensors that may cause significant interference. When the number of ground sensors K is sufficiently large, this threshold-based feedback method approaches the ideal performance of the ideal non-threshold scheme. By setting an appropriate threshold, the system can achieve a good tradeoff between performance, complexity, and feedback overhead [40].
The MD-SINR scheduling method leverages the principle that when a sensor achieves the maximum downlink SINR, it is also likely to achieve good SINR performance during uplink transmission. To validate this result, Monte Carlo simulations were conducted for a dual-UAV deployment scenario with Rayleigh fading channels. In each snapshot, the channel coefficients were randomly generated. During the downlink, the SINR values of each sensor were calculated, and the uplink sum rate was computed for all possible C K 2 = K ( K 1 ) / 2 schedulable sensor combinations. Each combination consisted of two distinct sensors, and these combinations were ranked in descending order of their sum rates. Finally, the probability that the sensor with the MD-SINR value would be included in one of the top-ten uplink scheduling sensor groups was analyzed. As shown in Figure 3, when K = 10 , the sensor with the MD-SINR still belongs to the optimal uplink scheduling group with a probability greater than 95%, and this probability increases to over 98% when K = 30 .
In the MD-SINR scheduling method, each ground sensor measures the downlink signal power received from all UAVs. It then computes a downlink SINR value for each UAV by treating that UAV’s signal as the desired signal and the signals from the remaining UAVs as interference. When sensor s k considers the signal from UAV U i as the useful signal, the corresponding downlink SINR is given by
S I N R k , i d = P d | h k , i | 2 1 j N , j i P d | h k , j | 2 + P n , k ,
where P n is the noise power.
Then, sensor s k selects its target UAV U i that provides its MD-SINR value according to
S I N R k , i d = max 1 i N S I N R k , i d , k ,
and feeds the corresponding MD-SINR value S I N R k , i d back to U i . Subsequently, UAV U i selects the largest MD-SINR from multiple MD-SINR values it receives and chooses the corresponding sensor, denoted by S T , as its target sensor for uplink transmission, i.e.,
T = arg max 1 k K S I N R k , i d .

3.2. Procedures of MDI and MD-SINR Scheduling

The complete four-step implementation procedure for the uplink MDI and MD-SINR-based OS schemes is illustrated in Figure 4. The detailed steps are described below.
(1) Downlink Channel Training All UAVs sequentially transmit the training signal P d x ^ i , where x ^ i is the unit-power training symbol, satisfying E x ^ i 2 = 1 , and P d is the downlink transmit power. Thus, the received training signal at sensor s k from UAV U i can be expressed as
y k , i = P d h k , i x ^ i + n k ,
where n k C N 0 , σ 2 denotes the additive white Gaussian noise (AWGN) at sensor s k . Based on the received signal, sensor s k estimates the channel coefficient h k i . It is assumed that, in this step, the UAVs employ a sufficiently high transmit power P d for channel training to ensure that sensors can obtain accurate channel estimates.
(2) Channel Quality Feedback Based on the channel information measured from different UAVs in the previous step, sensor s k computes the downlink interference or the downlink SINR. Under the MDI scheduling criterion, sensor s k calculates the total downlink interference I k , i d , 1 i N for each UAV according to Equation (1) and feeds back the minimum value I k , i d = min 1 i N I k , i d to the corresponding UAV U i . Under the MD-SINR scheduling criterion, sensor s k computes the downlink SINR value S I N R k , i d , 1 i N corresponding to each UAV according to Equation (5) and feeds back the maximum value S I N R k , i d = max 1 i N S I N R k , i d to the corresponding UAV U i .
(3) Sensor Scheduling Based on the received channel quality, each UAV selects its corresponding target sensor and broadcasts the scheduling result via the downlink channel. Under the MDI scheduling criterion, UAV U i selects the sensor S Q that reported the MDI value according to (4). Under the MD-SINR scheduling criterion, UAV U i selects the sensor S T that reported the MD-SINR value according to (7). (4) Uplink Data Transmission The scheduled sensors transmit uplink data to their respective target UAVs simultaneously. They are allowed to share the same resource block while still maintaining favorable sum rate performance.
Figure 4. Scheduling procedures of MDI- and MD-SINR-OS.
Figure 4. Scheduling procedures of MDI- and MD-SINR-OS.
Drones 10 00018 g004

3.3. Complexity Analysis

The computational complexity is measured in terms of the number of floating-point operations (flops). Specifically, an addition, subtraction, multiplication, or division of real numbers is counted as one flop, while a complex addition and a complex multiplication are counted as two flops and six flops, respectively.
In the MDI scheme, each sensor first needs to calculate the interference experienced by the signal from each UAV, that is, sensor S k computes I k , i d for 1 i N according to Equation (1) and then finds its MDI term according to Equation (3). For sensor S k , the received power P d h k , i 2 from UAV U i has already been measured during the channel training phase. Therefore, obtaining P d h k , i 2 does not incur additional computational complexity. To compute I k , i d for 1 i N , the total interference term I k d = j P d h k , j 2 can be first calculated, which requires N 1 real addition operations, and then I k , i d = I k d P d h k , i 2 can be determined for 1 i N , which requires N real subtraction operations. Determining the MDI term I k , i d requires N 1 comparisons in S k . To reduce the uplink feedback overhead, by using the threshold-based feedback method, each sensor further needs to compare the obtained MDI value with the feedback threshold. Assume that each UAV can receive MDI values fed back from n u sensors on average, where the value of n u is affected by the feedback threshold. Then, each UAV needs to perform n u 1 comparisons. Therefore, in the MDI scheme, each sensor involves 3 N 1 arithmetic and comparison operations, and each UAV involves n u 1 comparison operations. The overall computational complexity of the MDI-OS is O K N + n u N , where O · is the big-O notation.
In the MD-SINR scheme, sensor S k first computes S I N R k , i d for 1 i N according to Equation (5) and then finds its MD-SINR term according to Equation (6). Note that the interference term in Equation (5) is exactly I k , i d for 1 i N , which requires N 1 real addition operations and N real subtraction operations. In S k , the computation of S I N R k , i d = P d | h k , i | 2 I k , i d + σ 2 for 1 i N requires N real addition operations and N real division operations, and determining the MD-SINR value S I N R k , i d requires N 1 comparisons. When the same threshold-based method is adopted, in the MD-SINR scheme, each sensor involves 5 N 1 arithmetic and comparison operations, and each UAV involves n u 1 comparison operations. Therefore, the overall computational complexity of the MD-SINR-OS is also O K N + n u N .

4. Performance Analysis of MDI-Based OS for the Dual-UAV Scenario

After the scheduling method is specified, a natural question arises: given the number of ground sensors K and the uplink and downlink transmit powers, how many UAVs should be deployed or, equivalently, how many sensors should be scheduled concurrently and participate in simultaneous uplink transmission to achieve better system performance? To answer this question, it is necessary to analyze the system’s average achievable rate performance under different scenarios. This section begins with the dual-UAV scenario, in which two ground sensors are scheduled to perform concurrent uplink communication in each transmission round.

4.1. Average Achievable Sum Rate Analysis

In the uplink data transmission stage, when the target sensor corresponding to UAV U i is s k , the received signal at U i can be written as
y i u = g i , k P u x k + j k g i , j P u x j + n i ,
where P u is the uplink transmit power, and n i C N 0 , σ 2 is the AWGN at U i . By exploiting channel reciprocity g i , k = h k , i H , the corresponding uplink SINR can be expressed as
S I N R i , k u = P u | g i , k | 2 j k P u g i , j 2 + σ 2 = | h k , i | 2 j k h j , i 2 + σ 2 P u .
In the SINR expression (10), the relationship between the uplink SINR and the downlink channel is established. When the number of UAVs is N = 2 , closed-form expressions for the average sum rate of the dual-UAV system can be derived.
Theorem 1.
In a dual-UAV and K-sensor scenario with Rayleigh block fading channels, when MDI-based OS is performed, the average achievable sum rate is given by
R sum = 2 K ln 2 K 1 e 1 ρ E 1 ( 1 ρ ) e K ρ E 1 ( K ρ ) ,
where E 1 x = 1 e t x t d t is the exponential integral function, and ρ = P u σ 2 denotes the transmitted SNR.
Proof. 
Let the two UAVs be denoted by U 1 and U 2 . Based on the MDI-based OS method, suppose that in a given scheduling round, U 1 and U 2 select sensors S I and S J as their respective target sensors. The uplink SINR corresponding to U 1 can then be simplified as
S I N R 1 , I u = P u | g 1 , I | 2 P u | g 1 , J | 2 + σ 2 = h I , 1 2 h J , 1 2 + σ 2 P u = Z Y + 1 / ρ ,
where Z and Y separately represent the normalized desired signal power and normalized interference power.
According to the MDI criterion, sensor S J experiences the MDI from U 1 . Consequently, we have
J = arg min 1 k K h k , 1 2
and
Y = h J , 1 2 = min 1 k K h k , 1 2 .
In Rayleigh fading channels, Z = h I , 1 2 follows a chi-square distribution with two DoFs, which is equivalent to an exponential distribution. Its probability density function (PDF) and cumulative density function (CDF) are f Z x = e x , x 0 and F Z x = 1 e x ,   x 0 , respectively.
Let X k 1 k K = | h k , 1 | 2 denote K random variables with h k , 1 CN ( 0 , 1 ) and then X k 1 k K are i.i.d. exponential random variables with the same CDF and PDF as Z, i.e., F k x = 1 e x , x 0 and f k x = e x , x 0 . Let F Y ( x ) denote the CDF of Y. With Y = min 1 k K | h k , 1 | 2 = min 1 k K X k , the CDF of Y can be derived as
F Y ( x ) = P ( Y x ) = 1 P ( Y > x ) = 1 P min 1 k K X k > x = 1 P ( X 1 > x , , X K > x ) = 1 k = 1 K P ( X k > x ) = 1 k = 1 K 1 F k x = 1 1 F k x K = 1 e K x , x 0 .
Accordingly, the associated PDF is f Y ( x ) = K e K x .
Since the MDI scheduling procedure does not involve the desired signal, Z and Y are mutually independent. By applying the law of total probability, the PDF of S I N R 1 , I u can be written as
f S I N R 1 , I u x = 0 f Z | Y x | y f Y y d y = 0 e 1 ρ + y x · 1 ρ + y · K e K y d y = K e x ρ · ( 1 + x + K ρ ) x + K 2 .
Accordingly, the corresponding CDF of S I N R 1 , I u is
F SINR 1 , I u x = 0 x f S I N R 1 , I u y d y = 1 K e x ρ x + K .
Across scheduling processes in different time blocks, although the sensor selected by U 1 may vary, the uplink SINRs of U 1 in each scheduling instance are i.i.d. in a homogeneous sensor deployment scenario with negligible large-scale fading. Consequently, the average achievable rate of U 1 can be written as
R 1 = E [ log 2 ( 1 + S I N R 1 , I u ) ] = 1 ln 2 E [ ln ( 1 + S I N R 1 , I u ) ] .
For any nonnegative random variable X, it holds that
E [ ln ( 1 + X ) ] = 0 P ( X > t ) 1 + t d t = 0 1 F X ( t ) 1 + t d t .
Therefore, according to Equation (19), R 1 can be further derived as
R 1 = 1 ln 2 E [ ln ( 1 + S I N R 1 , I u ) ] = 1 ln 2 0 1 F S I N R 1 , I u x 1 + x d x = 1 ln 2 0 K e x ρ 1 + x K + x d x = K ln 2 ( K 1 ) 0 e x ρ 1 + x d x 0 e x ρ K + x d x .
Let x 1 = ρ t 1 and x 2 = ρ t K , and we have
R 1 = K ln 2 ( K 1 ) 1 / ρ e ( ρ t 1 ) / ρ 1 + ( ρ t 1 ) ρ d t K / ρ e ( ρ t K ) / ρ K + ( ρ t K ) ρ d t = K ln 2 ( K 1 ) 1 / ρ e t + 1 / ρ ρ t ρ d t K / ρ e t + K / ρ ρ t ρ d t = K ln 2 ( K 1 ) e 1 / ρ 1 / ρ e t t d t e K / ρ K / ρ e t t d t = K ln 2 ( K 1 ) e 1 / ρ E 1 1 ρ e K / ρ E 1 K ρ .
Since the dual-UAV case is a symmetric scenario, the average achievable rate of U 1 and U 2 are almost the same. Therefore, the average achievable sum rate of the dual-UAV system can be approximated as twice the achievable rate of a single UAV, expressed as
R sum = 2 R 1 = 2 K ln 2 K 1 e 1 ρ E 1 ( 1 ρ ) e K ρ E 1 ( K ρ ) .

4.2. Asymptotic Sum Rate Analysis

In conventional downlink OS or RBF schemes, the asymptotic sum rate is a commonly used performance metric, referring to the system performance as the transmitted SNR ρ tends to infinity for a given number of sensors K. This case is also known as the interference-limited or high-SNR regime [42]. As ρ , the PDF of the asymptotic SINR is given by
f a x = lim ρ f S I N R 1 , I u x = K x + K 2 ,
and the corresponding CDF is F a x = 1 K x + K . Accordingly, the asymptotic average sum rate of the system can be expressed as
R s u m 0 = 2 E log 2 ( 1 + lim ρ S I N R 1 , I u ) = 2 0 log 2 ( 1 + x ) · K ( x + K ) 2 d x = 2 K K 1 log 2 K .

4.3. DoF Analysis

DOF is also a commonly used performance metric in wireless networks. By definition, the DoF can be interpreted as the number of interference-free data streams that can be simultaneously supported in the network [37]. In the dual-UAV uplink transmission scenario, the signals sent by the two scheduled sensors inevitably interfere with each other; however, this interference diminishes as the number of ground sensors increases. Therefore, based on the closed-form expressions of the sum rate derived in the previous subsection, we can further obtain the DoF performance of the dual-UAV IMAC under the MDI criterion.
Theorem 2.
In a dual-UAV K-sensor scenario using the MDI-based OS over Rayleigh block fading channels, 2 α DoFs can be achieved if K scales as K = ρ α , where α 0 , 1 and ρ denotes the transmitted SNR.
Proof. 
Let the number of sensors in the system scale with K = β ρ α , where α > 0 and β > 0 separately represent the exponential scaling factor and linear coefficient. When ρ , the achievable DoF of the system can be expressed as
D o F = lim ρ R s u m log 2 ρ = lim ρ 2 K K 1 log 2 K log 2 ρ .
Substituting K = β ρ α into the expression, we obtain that when ρ ,
D o F = lim ρ 2 β ρ α β ρ α 1 log 2 β ρ α log 2 ρ = 2 lim ρ α log 2 ρ + log 2 β log 2 ρ = 2 α .
It can be observed that the linear coefficient β has no effect on the DoF performance. In the dual-UAV scenario, at most two sensors can be scheduled for uplink transmission in each time slot, which forms a typical two-user SISO interference channel (IC) model [43]. When treating interference as noise, the maximum DoF for the SISO IC is two. However, achieving this bound requires the inter-user interference to be asymptotically zero. Consequently, the maximum achievable DoF in the dual-UAV system is also upper-bounded by two, thus resulting in α 1 .
According to Theorem 2, maintaining the system’s DoF performance under the MDI scheduling criterion requires a sufficiently large number of schedulable sensors to ensure that the sum rate continues to scale with log 2 ρ . Moreover, the fact that the total DoF of the dual-UAV opportunistic scheduling system exceeds one indicates that, when the number of ground users is large, deploying two UAVs within the same area is more effective than deploying a single UAV.
Based on the results reported in [44,45], in a two-cell MISO IBC with single-antenna users and single-stream transmission at each base station, the OBF scheduling yields a per-cell DoF of α if the number of users per cell scales as ρ α with 0 α 1 . The dual-UAV scenario considered in this work can be viewed as a special case of a two-cell deployment where the two base stations are co-located and jointly serve all users. Consequently, it can be seen that OS achieves the same multiuser diversity gain in both the uplink and downlink of the dual-UAV system.

5. Sum Rate Analysis of MDI-Based OS for the Three-UAV Scenario

In this subsection, we continue to analyze the sum rate performance of the three-UAV scenario under the MDI scheduling criterion over Rayleigh block fading channels.

5.1. Distribution of Normalized Downlink Interference

In each scheduling round, three ground sensors can be scheduled for simultaneous uplink transmission. Denote the three UAVs by U 1 , U 2 , and U 3 , respectively. According to the MDI criterion, suppose that in a given scheduling instance the three UAVs select ground sensors S I , S J , and S Q , respectively, as their target sensors.
According to the MDI scheduling rules, sensor S I experiences the smallest total downlink interference from UAVs U 2 and U 3 . Accordingly, the SINR of the signal received at sensor S I can be expressed as
S I N R I , 1 d = P d | h I , 1 | 2 P d | h I , 2 | 2 + P d | h I , 3 | 2 + σ 2 = | h I , 1 | 2 min 1 k K h k , 2 2 + h k , 3 2 + σ 2 P d = | h I , 1 | 2 Δ I + σ 2 P d ,
where Δ I = min 1 k K h k , 2 2 + h k , 3 2 denotes the normalized MDI. Define K random variables Ω k = h k , 2 2 + h k , 3 2 , 1 k K . Under a Rayleigh block fading channel, Ω k follows a chi-square distribution with four DoFs. The PDF and CDF of Ω k are given, respectively, by f Ω x = x e x , x 0 and F Ω ( s ) = 0 x t e t d t = 1 ( x + 1 ) e x , x 0 .
Since Ω k , 1 k K consists of K i.i.d. random variables and Δ I = min 1 k K Ω k , the CDF of Δ I can be derived as
F Δ ( s ) = 1 [ 1 F Ω ( x ) ] K = 1 [ ( x + 1 ) e x ] K , x 0 ,
and the corresponding PDF can thus be obtained as
f Δ ( x ) = K x ( x + 1 ) K 1 e K x , x 0 .
Furthermore, let Δ I = Δ I , 2 + Δ I , 3 = | h I , 2 | 2 + | h I , 3 | 2 , where Δ I 2 and Δ I , 3 denote the normalized downlink interference powers sent from U 2 and U 3 , respectively, when the total interference experienced at sensor S I from U 2 and U 3 is minimized. Before scheduling, Δ I 2 and Δ I , 3 are i.i.d. exponential random variables, whereas after sensor S I is scheduled, their distributions are no longer independent. For two i.i.d. exponential random variables X and Y, conditioned on their sum X + Y = S , the conditional distribution of either X or Y is uniform over [ 0 , S ] . Therefore, the PDF of Δ I , 2 can be formulated as
f Δ I , 2 ( x ) = 0 f Δ I 2 | Δ ( x | s ) f Δ ( s ) d s = x 1 s · K s ( s + 1 ) K 1 e K s d s = K x ( s + 1 ) K 1 e K s d s = K e K x + 1 t K 1 e K t d t .
By using the definition of the upper incomplete Gamma function
Γ ( n , x ) = x t n 1 e t d t ,
and applying the change in variables t = u p , we have
x t n 1 e p t d t = p x u p n 1 e u d u p = 1 p n p x u n 1 e u d u = p n Γ ( n , p x ) .
Substituting the above result into Equation (30), the expression of f Δ I , 2 ( x ) can be further written in a closed form as
f Δ I , 2 ( x ) = K e K x + 1 t K 1 e K t d t = K e K K K Γ K , K ( x + 1 ) = K 1 K e K Γ K , K ( x + 1 ) .
Under a homogeneous sensor deployment where large-scale fading is not considered, the normalized downlink interference from the same UAV to different sensors, such as Δ J , 1 and Δ Q , 1 , are i.i.d. random variables. Therefore, the subscripts in f Δ I , 2 ( x ) can be simplified, and the PDF of these interference random variables can all be denoted by f Δ ( x ) .

5.2. Approximation of Normalized Uplink Interference A

During the uplink transmission, the received uplink SINR at U 2 can be represented as
S I N R 2 , J u = P u | g 2 , J | 2 P u g 2 , I 2 + P u g 2 , Q 2 + σ 2 = | h J , 2 | 2 | h I , 2 | 2 + | h Q , 2 | 2 + σ 2 P u = Z Δ I , 2 + Δ Q , 2 + 1 / ρ .
In this expression, Z = h I , 1 2 follows an exponential distribution with PDF f Z x = e x . To derive the PDF of S I N R 2 , J u , the key lies in characterizing the distribution of the interference term A = Δ I , 2 + Δ Q , 2 . It is worth noting that the term A represents the ratio of the uplink received interference power to the transmit power P u , i.e., the normalized uplink received interference power rather than the absolute interference power. In addition, Δ I , 2 and Δ Q , 2 are i.i.d. with the same pdf as Equation (33). However, Equation (33) possesses a complex structure, which makes deriving the accurate pdf of A intractable. Therefore, in this paper we approximate the distribution of A = Δ I , 2 + Δ Q , 2 by a Gamma distribution,
f A ( x ) f A ( x , α , β ) = x α 1 e x β β α Γ ( α ) , x 0 ,
where α > 0 is the shape parameter, β > 0 is the scale parameter, and Γ ( α ) denotes the Gamma function with Γ ( x ) = 0 t x 1 e t d t , x > 0 .
Lemma 1.
Let Z and A be independent random variables with PDFs f Z x = e x and f A ( x , α , β ) = x α 1 e x β β α Γ ( α ) , x 0 , respectively. Then, for the random variable S = Z A + 1 / ρ , the CDF and PDF are given as follows.
F S ( x ) = 1 e x / ρ ( 1 + β x ) α
f S ( x ) = α β e x / ρ ( 1 + β x ) α 1 + e x / ρ ρ ( 1 + β x ) α
Proof. 
Given A = a , S = Z a + 1 ρ is a linear function of Z. Thus, the conditional PDF of S with A = a can be expressed as
f S | A ( x | a ) = a + 1 ρ exp a + 1 ρ x .
By the law of total probability, the PDF of S is obtained by
f S ( x ) = 0 f S | A ( x | y ) f A ( y ) d y = 0 y + 1 ρ e ( y + 1 ρ ) x y α 1 e y / β β α Γ ( α ) d y = e x / ρ β α Γ ( α ) 0 y + 1 ρ y α 1 e y x + 1 β d y .
Let λ = x + 1 β . Using the Gamma integral identities
0 y α e λ y d y = Γ ( α + 1 ) λ α + 1 = α Γ ( α ) λ α + 1 ,
and
0 y α 1 e λ y d y = Γ ( α ) λ α ,
we obtain
f S ( x ) = e x / ρ β α Γ ( α ) 0 y α e λ y d y + 1 ρ 0 y α 1 e λ y d y = α β e x / ρ ( 1 + β x ) α 1 + e x / ρ ρ ( 1 + β x ) α , x 0 .
Define function
g ( x ) = e x / ρ ( 1 + β x ) α .
Then, its derivative is
g ( x ) = α β e x / ρ ( 1 + β x ) α + 1 e x / ρ ρ ( 1 + β x ) α = f S ( x ) .
By integration by parts, the CDF of S is given by
F S ( x ) = 0 x f S ( t ) d t = g ( 0 ) g ( x ) = 1 e x / ρ ( 1 + β x ) α , x 0 .
To determine the parameters α and β in the Gamma distribution, the mean and variance of the approximating Gamma variable A must match those of the original distribution A = Δ I , 2 + Δ Q , 2 . Based on this requirement, Theorem 3 is obtained as follows.
Theorem 3.
For the Gamma-distributed random variable A used to approximate the normalized uplink interference term A = Δ I , 2 + Δ Q , 2 the parameters α and β that ensure the moment-matching conditions E [ A ] = E [ A ] and V a r ( A ) = V a r ( A ) are given as follows.
α = 6 1 K + ( K 1 ) ! K K j = 0 K 1 K j j ! 2 3 ( K 1 ) ! K K j = 0 K 1 K j j ! 2 + 2 ( K 1 ) ! K K + 1 j = 0 K 1 K j j ! + 8 K + 5 K 2
β = 3 ( K 1 ) ! K K j = 0 K 1 K j j ! 2 + 2 ( K 1 ) ! K K + 1 j = 0 K 1 K j j ! + 8 K + 5 K 2 6 1 K + ( K 1 ) ! K K j = 0 K 1 K j j !
The proof is provided in the Appendix A.
To demonstrate the effectiveness of approximating the uplink interference A = Δ I , 2 + Δ Q , 2 by the Gamma-distributed random variable A , Figure 5 presents a comparison of their PDFs under different numbers of sensors. It can be observed that the two PDF curves exhibit the same trend and match closely.
Based on Lemma 1 and Theorem 3, the CDF and PDF expressions of the uplink SINR for each UAV in the three-UAV scenario under the MDI criterion can be derived as Equations (36) and (37) over Rayleigh block fading channels. Owing to the symmetry of the three-UAV setting, the system’s average sum rate equals three times the achievable rate of a single UAV. The resulting sum rate expression is given as follows in an integral form, which can be efficiently evaluated via numerical methods to obtain accurate results.
R s u m = 3 E [ log 2 ( 1 + S I N R 2 , J u ) ] = 3 ln 2 0 1 F S ( x ) 1 + x d x = 3 ln 2 0 e x / ρ ( 1 + β x ) α 1 + x d x

5.3. Kolmogorov–Smirnov Test

To quantitatively validate the accuracy of the proposed Gamma approximation, we further conduct the Kolmogorov–Smirnov (KS) goodness-of-fit test between the empirical interference distribution of A obtained via Monte Carlo simulations and the theoretical Gamma distribution of A with analytically derived parameters. It is well known that the KS test becomes overly sensitive with extremely large sample sizes and may reject the null hypothesis even for very small deviations. Therefore, the KS test is performed on a randomly selected subset of Monte Carlo samples with size N = 500 , which is a common practice for distributional validation.
The detailed KS test results are summarized in Table 2. For K = 50 and K = 200 , the p-values are greater than 0.05 , indicating that the null hypothesis cannot be rejected at the 5 % significance level. This confirms the statistical validity of the proposed Gamma approximation. The corresponding KS statistics further show that the maximum discrepancy between the empirical and theoretical CDFs of A and A remains small.

6. Simulation Results

In this section, Monte Carlo simulations are conducted to validate the correctness of the theoretical analysis derived in the previous two sections for the dual-UAV and three-UAV scenarios and to compare the performance of different transmission strategies and channel models. Unless otherwise specified, the simulation parameters used throughout this section are summarized in Table 3.

6.1. Comparison of Theoretical and Simulation Results Under Rayleigh Channel

For the dual-UAV case with Rayleigh block fading channels, comparisons among the theoretical average sum rate, the asymptotic sum rate, and the simulation results under the MDI criterion scheduling scheme for different numbers of sensors are shown in Figure 6. The horizontal axis represents the transmitted SNR ρ . The theoretical average sum rate results are obtained from Equation (11), whereas the asymptotic sum rate results are based on Equation (24). It can be observed that the theoretical average sum rate agrees well with the simulated values, which verifies the accuracy of the theoretical analysis, and the discrepancy decreases as K increases. The asymptotic sum rate appears as a straight line independent of the transmit power, representing an upper bound on the achievable sum rate performance. The average sum rate of MDI-based OS first increases with and then converges to the asymptotic sum rate curve at high transmit-power levels. Moreover, the upper bound of the achievable sum rate increases with K, indicating that a larger number of scheduled sensors yields greater exploitable multiuser diversity gain.
For the three-UAV scenario with Rayleigh block fading channels, comparisons among the theoretical average sum rate and the simulation results under the MDI criterion with different numbers of sensors are shown in Figure 7. The theoretical average sum rate results are computed according to Equation (47). It can be seen that the theoretical average sum rate also matches the simulated values closely, thereby confirming the validity of approximating the uplink interference distribution with a Gamma distribution to reduce computational complexity. The discrepancy between theory and simulation decreases as K increases. Similar to the dual-UAV case, as the transmit power grows, the average sum rate curve first increases and then converges to a horizontal line, and the corresponding convergence level rises with increasing K.
Figure 8 illustrates the normalized error between the theoretical sum rate and the simulation results shown in Figure 6 and Figure 7. When K is larger than 30, the normalized error remains below 1 % in both scenarios and across the entire transmitted SNR range, indicating that the derived theoretical expressions can accurately characterize the average rate performance of the MDI-based OS. In the dual-UAV scenario, as K increases, the normalized error decreases and shows little sensitivity to increases in the SNR. In the three-UAV scenario, the decrease in normalized error with increasing K is more pronounced in the low- and medium-SNR regimes (0–20 dB). When the transmitted SNR exceeds 30 dB, the normalized errors for different values of K become almost identical in the three-UAV scenario.

6.2. Sum Rate Performance of MDI-OS Under Rayleigh and Nakagami Channels

Figure 9 and Figure 10 present the average sum rate performance of MDI-OS under Rayleigh and Nakagami-m fading channels (with m = 2 and m = 0.75), for the dual-UAV and three-UAV scenarios, respectively. Note that the Rayleigh fading channel corresponds to a special case of the Nakagami-m model with m = 1. For each channel scenario, the number of sensors K varies from 10 to 100. Two main observations can be drawn from these figures. First, for a given number of UAVs, transmit SNR, and K, a smaller value of the Nakagami parameter m results in a higher average sum rate. Second, the performance gap between different m values becomes more pronounced in the high SNR region and when the number of sensors is large. These observations indicate that in MDI-OS, the system performance is highly sensitive to the fading severity (captured by the parameter m), and more severe fading (smaller m) paradoxically leads to a higher multiuser scheduling diversity gain and thus a higher sum rate.
In Nakagami-m fading channels, the shape factor m characterizes the severity of channel fading. The channel gain in a Nakagami-m channel follows a Gamma distribution, and a larger m corresponds to a smaller variance of the channel gain. This implies a stronger line-of-sight component and weaker scattered components in the channel. As m increases, the differences in downlink interference or downlink SINR among different sensors decrease, thereby limiting the multiuser diversity potential. Consequently, the multiuser diversity-based OSs are more suitable for Nakagami fading environments with smaller m values.

6.3. DoF Performance

To verify the relationship between the system DoF performance and the user-scaling law in the dual-UAV scenario, Figure 11 plots the system sum rate versus the transmitted SNR for different values of α when the number of users scales as K = ρ α . The curves for the MDI scheme in Rayleigh channels are obtained from theoretical asymptotic sum rate analysis, whereas those for the MD-SINR scheme and the MDI scheme in Nakagami channels are generated from simulation results. Reference curves with rate 2 α log 2 1 + ρ are also plotted in Figure 11, representing a DoF of 2 α . In the high transmitted SNR regime (35–40 dB), the slopes of the sum rate curves for both MDI-OS and MD-SINR-OS in Rayleigh channels coincide with that of the reference curve for different values of α , thereby validating the conclusion of Theorem 2 and indicating that the two scheduling schemes share the same DoF performance and user-scaling law.
As shown in Figure 11, the DoF performance of MDI-OS in Nakagami-m fading channels is significantly influenced by the fading parameter m. For more severe fading conditions characterized by m = 0.75, the DoF can reach the maximum value of two even with a user-scaling factor of α = 0.8. This performance surpasses the DoF of 1.6 achieved in Rayleigh fading channels (which correspond to m = 1). For a shape parameter of m = 2, the achievable DoF falls below 2 α . These results demonstrate that the user-scaling law governing the DoF performance of MDI-OS is inherently affected by the parameter m in Nakagami channels.

6.4. Sum Rate Performance of Different Transmission Strategies in Dual-UAV Scenario

To validate the effectiveness of the dual-UAV deployment and the proposed OS schemes, Figure 12 and Figure 13 compare the sum rate performance of several transmission strategies, including MDI-OS, MD-SINR-OS, and TDMA-based round-robin methods, in Rayleigh and Nakagami channels, respectively. For the TDMA-based two-sensor round-robin scheduling, two sensors are selected sequentially in each slot to transmit. However, the presence of co-channel interference results in the lowest achievable rate. Under the TDMA-based single-sensor round-robin scheme, only one UAV is required, and inter-sensor interference is absent. Consequently, its sum rate increases monotonically with the transmit power, but it can outperform the MDI and MD-SINR schemes only when the transmit power is sufficiently high. However, due to the limited transmission power of ground sensors, the actual uplink transmission SNR cannot reach the favorable SNR range for the TDMA scheme. These results demonstrate that dual-UAV deployment combined with OS yields better system performance than single-UAV deployment with round-robin scheduling in both Rayleigh and Nakagami channels.

6.5. Sum Rate Performance of Different UAV Numbers

To identify the optimal deployment number of UAVs where both the UAVs and sensors are equipped with single antennas, Figure 14 compares the sum rate performance of several deployment scenarios under a different numbers of sensors in Rayleigh fading channels, including the dual-UAV deployment with MDI-OS, the three-UAV deployment with MDI-OS, and the single-UAV deployment with TDMA. The sum rate performance of the same deployment scenarios are compared again in Nakagami channels with K = 100 in Figure 15.
Although the three-UAV deployment allows for more sensors to transmit concurrently, the additional inter-user interference it introduces causes its achievable sum rate to remain lower than that of the two-UAV deployment at medium-to-high transmitted SNR levels. As indicated by Figure 14 and Figure 15, different strategies should be adopted at different transmitted SNR regimes. For instance, in Figure 14, when K = 50 , the three-UAV deployment with MDI-OS in Rayleigh fading channels is preferred for transmitted SNR ρ < 10 dB; the dual-UAV deployment yields better performance for ρ 10 , 36 dB; and when the transmit power becomes even larger, the single-UAV TDMA-based scheme becomes more advantageous because it completely eliminates inter-user interference. Therefore, in Figure 14 with K = 50, ρ = 10 dB serves as the performance intersection point for the dual-UAV deployment and the three-UAV deployment scenarios, while ρ = 36 dB serves as the performance intersection point for the dual-UAV deployment and the single-UAV deployment scenarios. As shown in Figure 14 and Figure 15, under the MDI-OS transmission strategy, the performance intersection point (denoted by an SNR threshold) between the dual-UAV and three-UAV deployment scenarios increases with the number of sensors K and with a decrease in the Nakagami fading parameter m. In addition, the performance intersection SNR between the dual-UAV and single-UAV deployments is relatively high and lies beyond the commonly used practical SNR range. Therefore, it can be concluded again that in typical scenarios with a large number of sensors K, the two-UAV deployment based on MDI-OS achieves a higher sum rate than the single-UAV deployment, under both Rayleigh and Nakagami fading channels.
The optimal number of UAVs to be deployed is a function of key system parameters, including the channel characteristics, the number of sensors, and the sensors’ uplink transmit power. In Rayleigh fading channels, the average achievable sum rate of MDI-OS has been derived in closed form for both dual-UAV and three-UAV scenarios, as given in Equations (11) and (47), respectively. Although the performance intersection SNR value for the dual-UAV and three-UAV deployment scenarios cannot be solved directly due to the complex form of the equations, it can still be quickly determined using numerical methods such as the binary search method. Therefore, these analytical results enable quick and direct performance comparison, allowing for an efficient identification of the superior deployment strategy under these specific channel conditions. However, for the more general Nakagami-m fading channels, analogous closed-form expressions for the average sum rate of different UAV deployment scenarios are not yet available. Therefore, performance evaluation and scheme comparison necessarily rely on Monte Carlo simulation methods. This simulation-based approach is essential for characterizing the average rate performance and determining the optimal number of UAVs in Nakagami-m environments.
From an engineering perspective, the number of UAVs can be dynamically selected in practice using a threshold-based or lookup-table strategy. For Rayleigh fading channels, the decision threshold can be set as the performance intersection SNR for different UAV deployment counts, which can be determined numerically using the analytical results derived in this paper. For Nakagami-m channels, a lookup table can be constructed based on extensive offline simulations covering typical parameter combinations, including the transmit SNR, the Nakagami-m parameter, and the number of sensors. During online operation, the system controller can then select the appropriate number of UAVs through a simple threshold comparison or table lookup, without introducing significant additional computational complexity.

7. Conclusions

This paper investigates low-overhead OS strategies and their performance analysis for uplink data collection in multi-UAV-IoT systems. By leveraging uplink–downlink channel reciprocity, two uplink scheduling schemes based on MDI and MD-SINR are proposed. These schemes significantly reduce uplink channel training overhead while effectively preserving multiuser diversity gain. In terms of theoretical analysis, for the dual-UAV deployment scenario under Rayleigh fading channels, closed-form expressions for the system’s average sum rate, asymptotic sum rate, and DoF are derived. This reveals the quantitative relationship between user-scaling law and system DoF. For the three-UAV deployment scenario, the average sum rate expression is achieved by approximating the uplink interference as a Gamma distribution. The simulation results show strong agreement with theoretical analyses, validating the effectiveness of the established analytical framework. Under the more general Nakagami-m fading channels, this paper further illustrates the impact of channel fading severity on the performance of OS schemes. The results indicate that a smaller Nakagami parameter m enhances channel fluctuation, thereby increasing the multiuser diversity gain. This leads to superior sum rate and DoF performance compared to Rayleigh and weaker fading scenarios. The study also demonstrates that increasing the number of UAVs does not necessarily improve performance. Due to additional interference effects, the dual-UAV deployment exhibits better system performance within the practically usable medium-to-high SNR range, in both Rayleigh and Nakagami-m channels. Based on the above conclusions, the actual system can dynamically select the UAV deployment scale using low-complexity methods such as threshold decision or lookup tables, considering transmit power, sensor number, and channel fading characteristics. The research outcomes of this paper provide generalizable theoretical support and engineering guidance for the design of UAV-assisted uplink communication systems for large-scale, low-power IoT scenarios.

Author Contributions

Conceptualization and methodology, L.S.; formal analysis, and writing—original draft preparation, Z.Z.; software, and validation, L.Y.; writing—review and editing, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Free Exploration General Project of the Natural Science Foundation of Jilin Province (No. YDZJ202301ZYTS421).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The authors would like to thank the Editor-in-Chief, Editor, and anonymous reviewers for their valuable reviews.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Proof of Theorem 3.
For a Gamma-distributed random variable A , we have E A = α β and V a r ( A ) = α β 2 . To satisfy the matching conditions of E [ A ] = α β and V a r ( A ) = α β 2 , equations α = E 2 A V a r ( A ) and β = V a r ( A ) E A should hold.
The two interference terms in A = Δ I , 2 + Δ Q , 2 are i.i.d. random variables with PDF f Δ x = K 1 K e K Γ K , K x + 1 , in which Γ K , K x + 1 denotes the upper incomplete Gamma function. Consequently, the mean of Δ I , 2 is
E Δ I , 2 = 0 x f Δ x d x = 0 x K 1 K e K K x + 1 t K 1 e t d t d x = K 1 K e K 0 K x + 1 x t K 1 e t d t d x = K 1 K e K K 0 t K 1 x d x t K 1 e t d t = 1 2 K 1 K e K K t K 1 2 t K 1 e t d t = 1 2 K K 1 e K K t 2 2 K t + K 2 t K 1 e t d t = 1 2 K K 1 e K K t K + 1 e t d t 2 K K t K e t d t + K 2 K t K 1 e t d t = 1 2 K K 1 e K Γ K + 2 , K 2 K Γ K + 1 , K + K 2 Γ K , K .
The mean square of Δ I , 2 is expressed by
E Δ I , 2 2 = 0 x 2 f Δ x d x = 0 x 2 K 1 K e K K x + 1 t K 1 e t d t d x = K 1 K e K K 0 t K 1 x 2 d x t K 1 e t d t = 1 3 K K 2 e K K t K 3 t K 1 e t d t = 1 3 K K 2 e K K t K + 2 e t d t 3 K K t K + 1 e t d t + 3 K 2 K t K e t d t K 3 K t K 1 e t d t = 1 3 K K 2 e K Γ K + 3 , K 3 K Γ K + 2 , K + 3 K 2 Γ K + 1 , K K 3 Γ K , K .
By applying the properties of the incomplete Gamma function, we obtain the following equations.
Γ K + 3 , K = K + 2 Γ K + 2 , K + K K + 2 e K Γ K + 2 , K = K + 1 Γ K + 1 , K + K K + 1 e K Γ K + 1 , K = K Γ K , K + K K e K
With D = K K e K Γ K , K = K 1 ! K K j = 0 K 1 K j j ! , the mean and the mean square of Δ I , 2 can be simplified as follows.
E Δ I , 2 = 1 2 K K 1 e K K Γ K , K + K K e K = 1 2 K K e K Γ K , K + 1 2 K = 1 2 D + 1 2 K
E Δ I , 2 2 = 1 3 K K 2 e K 2 K Γ K , K + 2 K + 1 K K e K = 2 3 K K 1 e K Γ K , K + 2 3 K 2 K + 1
From the definition A = Δ I , 2 + Δ Q , 2 , the mean, the mean square, and the variance of A can be derived as follows.
E A = 2 E Δ I , 2
E A 2 = E Δ I , 2 2 + Δ Q , 2 2 + 2 Δ I , 2 Δ Q , 2 = 2 E Δ I , 2 2 + 2 E 2 Δ I , 2
V a r A = E A 2 E 2 A = 2 E Δ I , 2 2 2 E 2 Δ I , 2 = 2 V a r Δ I , 2
Thus, the values of α and β are given, respectively, by
α = E 2 A V a r ( A ) = 2 E 2 Δ I , 2 V a r ( Δ I , 2 ) = 2 1 2 D + 1 2 K 2 D 2 4 + D 6 K + 2 3 K + 5 12 K 2 = 6 1 K + ( K 1 ) ! K K j = 0 K 1 K j j ! 2 3 ( K 1 ) ! K K j = 0 K 1 K j j ! 2 + 2 ( K 1 ) ! K K + 1 j = 0 K 1 K j j ! + 8 K + 5 K 2
β = V a r ( A ) E A = V a r ( Δ I , 2 ) E Δ I , 2 = D 2 4 + D 6 K + 2 3 K + 5 12 K 2 1 2 D + 1 2 K = 3 ( K 1 ) ! K K j = 0 K 1 K j j ! 2 + 2 ( K 1 ) ! K K + 1 j = 0 K 1 K j j ! + 8 K + 5 K 2 6 1 K + ( K 1 ) ! K K j = 0 K 1 K j j !

References

  1. Ni, J.; Lin, X.; Shen, X.S. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT. IEEE J. Sel. Areas Commun. 2018, 36, 644–657. [Google Scholar] [CrossRef]
  2. Lu, H.; He, X.; Du, M.; Ruan, X.; Sun, Y.; Wang, K. Edge QoE: Computation Offloading With Deep Reinforcement Learning for Internet of Things. IEEE Internet Things J. 2020, 7, 9255–9265. [Google Scholar] [CrossRef]
  3. Wang, J.; Liang, Y.C.; Sun, S. Multi-User Multi-IoT-Device Symbiotic Radio: A Novel Massive Access Scheme for Cellular IoT. IEEE Trans. Wirel. Commun. 2024, 23, 11876–11889. [Google Scholar] [CrossRef]
  4. Ballal, K.D.; Singh, R.; Dittmann, L. Real-Time Remote Heart Monitoring Using Cellular IoT Network. In Proceedings of the 2022 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Gandhinagar, India, 18–21 December 2022; pp. 1–6. [Google Scholar] [CrossRef]
  5. Plastras, S.; Tsoumatidis, D.; Skoutas, D.N.; Rouskas, A.; Kormentzas, G.; Skianis, C. Non-Terrestrial Networks for Energy-Efficient Connectivity of Remote IoT Devices in the 6G Era: A Survey. Sensors 2024, 24, 1227. [Google Scholar] [CrossRef]
  6. Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Niyato, D.; Dobre, O.; Poor, H.V. 6G Internet of Things: A Comprehensive Survey. IEEE Internet Things J. 2022, 9, 359–383. [Google Scholar] [CrossRef]
  7. Hua, M.; Wu, Z.; Zhang, C.; Xu, Z.; Liu, X.; Zhou, W. Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems. Sensors 2025, 25, 5602. [Google Scholar] [CrossRef]
  8. Paniagua-Gómez, M.; Fernandez-Carmona, M. Trends and Challenges in Real-Time Stress Detection and Modulation: The Role of the IoT and Artificial Intelligence. Electronics 2025, 14, 2581. [Google Scholar] [CrossRef]
  9. Ma, H.; Tao, Y.; Fang, Y.; Chen, P.; Li, Y. Multi-Carrier Initial-Condition-Index-Aided DCSK Scheme: An Efficient Solution for Multipath Fading Channel. IEEE Trans. Veh. Technol. 2025, 74, 15743–15757. [Google Scholar] [CrossRef]
  10. Bushnaq, O.M.; Chaaban, A.; Al-Naffouri, T.Y. The Role of UAV-IoT Networks in Future Wildfire Detection. IEEE Internet Things J. 2021, 8, 16984–16999. [Google Scholar] [CrossRef]
  11. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Min, L. Aerial-Ground Integrated Vehicular Networks: A UAV-Vehicle Collaboration Perspective. IEEE Trans. Intell. Transp. Syst. 2024, 25, 5154–5169. [Google Scholar] [CrossRef]
  12. Pandey, G.K.; Gurjar, D.S.; Yadav, S.; Jiang, Y.; Yuen, C. UAV-Assisted Communications with RF Energy Harvesting: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, 27, 782–838. [Google Scholar] [CrossRef]
  13. Poorvi, J.; Kalita, A.; Gurusamy, M. Reliable and Efficient Data Collection in UAV based IoT Networks. IEEE Commun. Surv. Tutor. 2025. [Google Scholar] [CrossRef]
  14. Nguyen, M.T.; Nguyen, C.V.; Do, H.T.; Hua, H.T.; Tran, T.A.; Nguyen, A.D.; Ala, G.; Viola, F. UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey. Electronics 2021, 10, 2603. [Google Scholar] [CrossRef]
  15. Moheddine, A.; Patrone, F.; Marchese, M. Comparison between UAV IoT solutions with and without satellite backhaul link. In Proceedings of the 2022 IEEE Aerospace Conference (AERO), Big Sky, MT, USA, 5–12 March 2022; pp. 1–8. [Google Scholar] [CrossRef]
  16. Hua, M.; Meng, S.; Juan, Y.; Bian, B.; Liu, X. A Lightweight Stepwise SCMA Codebook Design Scheme for AWGN Channels. Forests 2025, 16, 257. [Google Scholar] [CrossRef]
  17. Guo, H.; Liu, J. UAV-Enhanced Intelligent Offloading for Internet of Things at the Edge. IEEE Trans. Ind. Inform. 2020, 16, 2737–2746. [Google Scholar] [CrossRef]
  18. Li, X.; Suo, L.; Jiao, W.; Liu, X.; Liu, Y. Cooperative Overbooking-Based Resource Allocation and Application Placement in UAV-Mounted Edge Computing for Internet of Forestry Things. Drones 2025, 9, 22. [Google Scholar] [CrossRef]
  19. Liu, Z.; Cao, Y.; Gao, P.; Hua, X.; Zhang, D.; Jiang, T. Multi-UAV network assisted intelligent edge computing: Challenges and opportunities. China Commun. 2022, 19, 258–278. [Google Scholar] [CrossRef]
  20. Wang, H.; Zhang, Z.; Chen, X. Successive Interference Cancellation Based Non-Orthogonal Opportunistic Beamforming. In Proceedings of the 2018 International Conference on Microwave and Millimeter Wave Technology (ICMMT), Chengdu, China, 7–11 May 2018; pp. 1–3. [Google Scholar] [CrossRef]
  21. Sun, W.B.; Meng, W.X.; Guo, J.C.; Li, C. Multiuser MIMO Opportunistic Beamforming Communications: State-of-the-Art and Perspectives. IEEE Wirel. Commun. 2022, 29, 95–101. [Google Scholar] [CrossRef]
  22. Viswanath, P.; Tse, D.; Laroia, R. Opportunistic beamforming using dumb antennas. IEEE Trans. Inf. Theory 2002, 48, 1277–1294. [Google Scholar] [CrossRef]
  23. Kim, I.M.; Hong, S.C.; Ghassemzadeh, S.; Tarokh, V. Opportunistic beamforming based on multiple weighting vectors. IEEE Trans. Wirel. Commun. 2005, 4, 2683–2687. [Google Scholar] [CrossRef]
  24. Moon, S.H.; Lee, S.R.; Lee, I. Sum-Rate Capacity of Random Beamforming for Multi-Antenna Broadcast Channels with Other Cell Interference. IEEE Trans. Wirel. Commun. 2011, 10, 2440–2444. [Google Scholar] [CrossRef]
  25. Suo, L.; Li, J.; Li, H.; Zhang, S.; Zhou, M. Sum Rate Analysis for Multi-Cell Random Beamforming With Heterogeneous Schedule Probabilities. IEEE Commun. Lett. 2017, 21, 2706–2709. [Google Scholar] [CrossRef]
  26. Aljumaily, M.S.; Li, H. Throughput Degradation Due to Mobility in Millimeter Wave Communication Systems Using Random Beamforming. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–5. [Google Scholar] [CrossRef]
  27. Bao, T.; Yang, H.C.; Hasna, M.O. Secrecy Outage Analysis over Random Beamforming Transmission with User Scheduling: Collusion vs. Exclusion. IEEE Signal Process. Lett. 2020, 27, 1295–1299. [Google Scholar] [CrossRef]
  28. Sun, W.B.; Yu, Q.Y.; Guo, J.C.; Meng, W.X. Multiuser Opportunistic Beamforming Systems with Multiple Receive Antennas in Nakagami-m Fading Channels. IEEE Syst. J. 2022, 16, 2602–2613. [Google Scholar] [CrossRef]
  29. Yu, Z.; Gong, Y.; Gong, S.; Guo, Y. Joint Task Offloading and Resource Allocation in UAV-Enabled Mobile Edge Computing. IEEE Internet Things J. 2020, 7, 3147–3159. [Google Scholar] [CrossRef]
  30. Chai, R.; Cui, X.; Sun, R.; Zhao, D.; Chen, Q. Precoding and Trajectory Design for UAV-Assisted Integrated Communication and Sensing Systems. IEEE Trans. Veh. Technol. 2024, 73, 13151–13163. [Google Scholar] [CrossRef]
  31. Sun, W.B.; Zhou, R.; Yang, X.; Zhang, J.; Wang, L. UAV-Assisted Opportunistic Beamforming in Internet of Things Networks. IEEE Internet Things J. 2023, 10, 15393–15407. [Google Scholar] [CrossRef]
  32. Psomas, C.; Krikidis, I. Low-Complexity Random Rotation-Based Schemes for Intelligent Reflecting Surfaces. IEEE Trans. Wirel. Commun. 2021, 20, 5212–5225. [Google Scholar] [CrossRef]
  33. Nadeem, Q.U.A.; Chaaban, A.; Debbah, M. Reconfigurable Surface Assisted Multi-User Opportunistic Beamforming. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 2971–2976. [Google Scholar] [CrossRef]
  34. Nadeem, Q.U.A.; Chaaban, A.; Debbah, M. Opportunistic Beamforming Using an Intelligent Reflecting Surface Without Instantaneous CSI. IEEE Wirel. Commun. Lett. 2021, 10, 146–150. [Google Scholar] [CrossRef]
  35. Nadeem, Q.U.A.; Zappone, A.; Chaaban, A. Intelligent Reflecting Surface Enabled Random Rotations Scheme for the MISO Broadcast Channel. IEEE Trans. Wirel. Commun. 2021, 20, 5226–5242. [Google Scholar] [CrossRef]
  36. Dimitropoulou, M.; Psomas, C.; Krikidis, I. Opportunistic Beamforming with Beam Selection in IRS-aided Communications. In Proceedings of the ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 823–828. [Google Scholar] [CrossRef]
  37. Jung, B.C.; Park, D.; Shin, W.Y. Opportunistic Interference Mitigation Achieves Optimal Degrees-of-Freedom in Wireless Multi-Cell Uplink Networks. IEEE Trans. Commun. 2012, 60, 1935–1944. [Google Scholar] [CrossRef][Green Version]
  38. Newhall, W.G.; Mostafa, R.; Dietrich, C.; Anderson, C.R.; Dietze, K.; Joshi, G.; Reed, J.H. Wideband air-to-ground radio channel measurements using an antenna array at 2 GHz for low-altitude operations. In Proceedings of the IEEE Military Communications Conference, MILCOM 2003, Boston, MA, USA, 13–16 October 2003; IEEE: New York, NY, USA, 2003; Volume 2, pp. 1422–1427. [Google Scholar]
  39. Abualhaol, I.Y.; Matalgah, M.M. Performance analysis of multi-carrier relay-based UAV network over fading channels. In Proceedings of the 2010 IEEE Globecom Workshops, Miami, FL, USA, 6–10 December 2010; IEEE: New York, NY, USA, 2010; pp. 1811–1815. [Google Scholar]
  40. Wang, H.; Kirubarajan, T. Random Unitary Beamforming with Partial Feedback for MISO Downlink Transmission Using Multiuser Diversity. IEEE Trans. Signal Process. 2007, 55, 3380–3389. [Google Scholar] [CrossRef]
  41. Huang, K.; Andrews, J.G.; Heath, R.W. Performance of Orthogonal Beamforming for SDMA with Limited Feedback. IEEE Trans. Veh. Technol. 2009, 58, 152–164. [Google Scholar] [CrossRef]
  42. Pun, M.O.; Koivunen, V.; Poor, H.V. Performance Analysis of Joint Opportunistic Scheduling and Receiver Design for MIMO-SDMA Downlink Systems. IEEE Trans. Commun. 2011, 59, 268–280. [Google Scholar] [CrossRef]
  43. Shang, X.; Chen, B. Two-user Gaussian interference channels: An information theoretic point of view. Found. Trends® Commun. Inf. Theory 2013, 10, 247–378. [Google Scholar] [CrossRef]
  44. Lee, J.H.; Choi, W.; Rao, B.D. Multiuser Diversity in Interfering Broadcast Channels: Achievable Degrees of Freedom and User Scaling Law. IEEE Trans. Wirel. Commun. 2013, 12, 5837–5849. [Google Scholar] [CrossRef][Green Version]
  45. Suo, L.; Li, J.; Li, H.; Zhang, S.; Davidson, T.N. Achievable Sum Rate and Degrees of Freedom of Opportunistic Interference Alignment in MIMO Interfering Broadcast Channels. IEEE Trans. Commun. 2019, 67, 4062–4073. [Google Scholar] [CrossRef]
Figure 2. System model for multi-UAV-aided IoT.
Figure 2. System model for multi-UAV-aided IoT.
Drones 10 00018 g002
Figure 3. Probability distribution for MD-SINR sensors in the top-10 uplink sum rate groups for a dual-UAV system. (a) K = 10 . (b) K = 30 .
Figure 3. Probability distribution for MD-SINR sensors in the top-10 uplink sum rate groups for a dual-UAV system. (a) K = 10 . (b) K = 30 .
Drones 10 00018 g003
Figure 5. PDFs of the uplink normalized interference A = Δ I , 2 + Δ Q , 2 and its Gamma-approximated random variable A in a three-UAV scenario. (a) K = 50. (b) K = 200.
Figure 5. PDFs of the uplink normalized interference A = Δ I , 2 + Δ Q , 2 and its Gamma-approximated random variable A in a three-UAV scenario. (a) K = 50. (b) K = 200.
Drones 10 00018 g005
Figure 6. Theoretical sum rate and simulation results under the MDI criterion in the dual-UAV scenario with Rayleigh block fading channels.
Figure 6. Theoretical sum rate and simulation results under the MDI criterion in the dual-UAV scenario with Rayleigh block fading channels.
Drones 10 00018 g006
Figure 7. Theoretical sum rate and simulation results under the MDI criterion in the three-UAV scenario with Rayleigh block fading channels.
Figure 7. Theoretical sum rate and simulation results under the MDI criterion in the three-UAV scenario with Rayleigh block fading channels.
Drones 10 00018 g007
Figure 8. Normalized error between the theoretical sum rate and the simulation results in dual-UAV and three-UAV scenarios. (a) The Dual-UAV scenario. (b) The Three-UAV scenario.
Figure 8. Normalized error between the theoretical sum rate and the simulation results in dual-UAV and three-UAV scenarios. (a) The Dual-UAV scenario. (b) The Three-UAV scenario.
Drones 10 00018 g008
Figure 9. Sum rate performance of MDI-OS in the dual-UAV scenario under Rayleigh and Nakagami channels.
Figure 9. Sum rate performance of MDI-OS in the dual-UAV scenario under Rayleigh and Nakagami channels.
Drones 10 00018 g009
Figure 10. Sum rate performance of MDI-OS in the three-UAV scenario under Rayleigh and Nakagami channels.
Figure 10. Sum rate performance of MDI-OS in the three-UAV scenario under Rayleigh and Nakagami channels.
Drones 10 00018 g010
Figure 11. DoF Performance of MDI and MD-SINR-based OS schemes in the dual-UAV scenario.
Figure 11. DoF Performance of MDI and MD-SINR-based OS schemes in the dual-UAV scenario.
Drones 10 00018 g011
Figure 12. Sum rate performance of different transmission strategies in the dual-UAV scenario with Rayleigh channels.
Figure 12. Sum rate performance of different transmission strategies in the dual-UAV scenario with Rayleigh channels.
Drones 10 00018 g012
Figure 13. Sum rate performance of different transmission strategies in the dual-UAV scenario with Nakagami channels; K = 300.
Figure 13. Sum rate performance of different transmission strategies in the dual-UAV scenario with Nakagami channels; K = 300.
Drones 10 00018 g013
Figure 14. Sum rate performance under different numbers of deployed UAVs in Rayleigh fading channels.
Figure 14. Sum rate performance under different numbers of deployed UAVs in Rayleigh fading channels.
Drones 10 00018 g014
Figure 15. Sum rate performance under different numbers of deployed UAVs in Nakagami channels; K = 100.
Figure 15. Sum rate performance under different numbers of deployed UAVs in Nakagami channels; K = 100.
Drones 10 00018 g015
Table 1. List of symbols.
Table 1. List of symbols.
SymbolDescription
NNumber of deployed UAVs
KNumber of ground sensors
U i The i-th UAV, i = 1 , 2 , , N
s k The k-th ground sensor, k = 1 , 2 , , K
P d Downlink transmit power of each UAV
P u Uplink transmit power of each sensor
P n , σ 2 Noise power
ρ Uplink transmitted SNR, ρ = P u / σ 2
h k , i Downlink channel coefficient from UAV U i to sensor s k
g i , k Uplink channel coefficient from sensor s k to UAV U i
I k , i d Downlink interference power at sensor s k when U i is the desired UAV
SINR k , i d Downlink SINR at sensor s k corresponding to UAV U i
SINR i , k u Uplink SINR at UAV U i corresponding to sensor s k
i Index of the UAV providing the minimum interference or maximum SINR
Q , T Indices of the scheduled sensors under MDI or MD-SINR criteria
Δ I The normalized MDI for sensor S I in the three-UAV scenario
AThe normalized uplink received interference power for U 2 in the
three-UAV scenario
E 1 ( x ) Exponential integral function, E 1 x = 1 e t x t d t
Γ ( n ) Gamma function, Γ ( x ) = 0 t x 1 e t d t , x > 0
Γ ( n , x ) Upper incomplete Gamma function, Γ ( n , x ) = x t n 1 e t d t
Table 2. Kolmogorov–Smirnov test results for Gamma approximation.
Table 2. Kolmogorov–Smirnov test results for Gamma approximation.
KKS Statistic Dp-ValueDecision ( α = 0.05 )
500.05950.0556Not rejected
2000.05000.1580Not rejected
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
ParameterValue/Description
Number of UAVs (N) N = 2 or N = 3
Number of sensors (K) K = 10 , 30 , 50 , 100 , 300
Channel fading modelRayleigh fading channel and Nakagami-m channel
Nakagami-m parameter Ω = 1, m = 0.75 or 2
Uplink transmitted SNR ( ρ = P u / σ 2 )0–50 dB
Scheduling schemesMDI-OS, MD-SINR-OS, TDMA
Number of snapshots 10 5 independent channel realizations
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Suo, L.; Zhang, Z.; Yang, L.; Liu, Y. Performance Analysis of Uplink Opportunistic Scheduling for Multi-UAV-Assisted Internet of Things. Drones 2026, 10, 18. https://doi.org/10.3390/drones10010018

AMA Style

Suo L, Zhang Z, Yang L, Liu Y. Performance Analysis of Uplink Opportunistic Scheduling for Multi-UAV-Assisted Internet of Things. Drones. 2026; 10(1):18. https://doi.org/10.3390/drones10010018

Chicago/Turabian Style

Suo, Long, Zhichu Zhang, Lei Yang, and Yunfei Liu. 2026. "Performance Analysis of Uplink Opportunistic Scheduling for Multi-UAV-Assisted Internet of Things" Drones 10, no. 1: 18. https://doi.org/10.3390/drones10010018

APA Style

Suo, L., Zhang, Z., Yang, L., & Liu, Y. (2026). Performance Analysis of Uplink Opportunistic Scheduling for Multi-UAV-Assisted Internet of Things. Drones, 10(1), 18. https://doi.org/10.3390/drones10010018

Article Metrics

Back to TopTop