Next Article in Journal
Object Detection in Drone Video with Temporal Attention Gated Recurrent Unit Based on Transformer
Previous Article in Journal
Impact of Wind on eVTOL Operations and Implications for Vertiport Airside Traffic Flows: A Case Study of Hamburg and Munich
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Two-Hop Cooperative Caching and UAVs Deployment Based on Potential Game

1
School of Equipment Management and UAV Engineering, Air Force Engineering University, Xi’an 710043, China
2
State Key Laboratory of Astronautic Dynamics, Xi’an Satellite Control Center, Xi’an 710043, China
3
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
4
Xi’an Institute of Aviation Computing Technology, Xi’an 710043, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(7), 465; https://doi.org/10.3390/drones7070465
Submission received: 5 May 2023 / Revised: 6 July 2023 / Accepted: 6 July 2023 / Published: 11 July 2023
(This article belongs to the Section Drone Communications)

Abstract

:
This paper explores the joint cache placement and 3D deployment of Unmanned Aerial Vehicle (UAV) groups, utilizing potential game theory and a two-hop UAV cooperative caching mechanism, which could create a tradeoff between latency and coverage. The proposed scheme consists of three parts: first, the initial 2D location of UAV groups is determined through K-means, with the optimal altitude based on the UAV coverage radius. Second, to balance the transmission delay and coverage, the MOS (Mean Opinion Score) and coverage are designed to evaluate the performance of UAV-assisted networks. Then, the potential game is modeled, which transfers the optimization problem into the maximization of the whole network utility. The locally coupling effect resulting from action changes among UAVs is considered in the design of the potential game utility function. Moreover, a log-linear learning scheme is applied to solve the problem. Finally, the simulation results verify the superiority of the proposed scheme in terms of the achievable transmission delay and coverage performance compared with two other tested schemes. The coverage ratio is close to 100% when the UAV number is 25, and the user number is 150; in addition, this game outperforms the benchmarks when it comes to maximizing MOS of users.

1. Introduction

With the rapid development of 5G communication technology and the ever-increasing data demands from mobile devices, the current number and placement of ground-base stations are inadequate to meet the exploding demand [1]. Particularly in challenging environments, such as those that are hostile or unknown, this dearth not only creates economic pressure but also results in empty loads during non-off-peak traffic periods. To address this, UAVs equipped with wireless transceivers offer high mobility, deployment flexibility, and low cost, enabling them to serve as aerial base stations that can provide data services for some areas, including major events and conference activities, regardless of geography [2].
As a further advancement, a cache-enabled UAV has become an effective solution by caching popular contents in mobile edge networks, which alleviates the access load of ground-base stations, reduces the transmission delay, and improves the quality of the user experience. Thus, especially in this era of data explosion, users could fetch the requested contents from a cache-enabled UAV with less waiting time and fewer network congestion issues than with current technology. Therefore, a cache-enabled UAV-assisted network is considered a promising technology for dealing with the relevant challenges [3,4].

2. Related Works

In recent years, significant attention has focused on cache-enabled UAV-assisted networks as a means of ensuring quality of service [5]. Extensive research has been conducted on various aspects, including the channel-state information and performance, such as the communication model, bit error rate (BER), and channel capacity. In [6], a statistical propagation model was proposed to predict the air-to-ground path loss between a low-altitude platform and a terrestrial terminal, which characterized the air-to-ground path into two distinct path-loss profiles. Furthermore, ref. [7] provided statistical models for air-to-ground radio channels in dense urban environments, demonstrating that airborne platforms can act as relaying nodes to extend the range and improve connectivity between terrestrial ad hoc terminals. Additionally, refs. [8,9] presented an elaborate analysis of mixed RF/FSO systems, providing an integrated investigation of UAV-assisted wireless communication systems.
Moreover, critical issues of UAV-assisted networks have been classified into three groups: 3D deployment, resource allocation, and UAV trajectory.
With regard to 3D deployment, there are various performance metrics, such as coverage, connectivity, energy, and throughput, which have been used as objectives for optimizing UAV deployment. For example, in [10], the authors addressed the issue of ground- target coverage using UAVs while ensuring connectivity. In [11], the focus was on maximizing the coverage region of a single UAV by optimizing its vertical and horizontal dimensions and minimizing transmit power. Furthermore, ref. [12] proposed an algorithm to minimize task completion time in UAV-enabled MEC systems based on SCA. In [13], potential game theory was used to control the quasi-stationary deployment of UAVs and maximize the downlink wireless coverage of a UAV swarm in an unknown mission area. Additionally, ref. [14] considered location, power control, and connectivity to address the area coverage problem. In [15], the deployment scheme of UAVs was adjusted using Virtual Force Field theory to maximize the total network throughput based on statistical user position information.
With respect to joint 3D deployment and resource allocation, ref. [16] addressed the joint placement of UAVs and their association with users to maximize the network sum-rate under bandwidth limitation and quality of service constraints. In contrast, ref. [17] formulated the problem of the long-term caching placement and the optimization of resource allocation to minimize content delivery delay as a Markov decision process solved by Q-learning. Meanwhile, in [18], the focus was on investigating jointly UAV deployment and power allocation in a UAV-assisted MIMO-NOMA WCN (wireless caching network) to minimize user delay.
With regard to trajectory optimization, ref. [19] studied the optimization of a single UAV’s trajectory based on a new design paradigm of communication throughput and energy consumption. In [20], the optimization of deployment and movement for multiple UAVs was studied while considering several ground terminals (GTs) communicating with the UAVs using variable transmission power and a fixed data rate. The corresponding trajectory optimization algorithm introduced was shown to guarantee a convergent Lagrangian. Furthermore, ref. [21] considered a practical 3D urban environment with imperfect CSI and designed the UAV’s trajectory to minimize the completion time of data collection while adhering to practical throughput and flight movement constraints.
Previous studies have focused on optimizing both UAV deployment and content placement for cache placement to enhance overall network performance. In [22], an optimal configuration for content-aware UAV-assisted network content caching and location services was suggested, taking into account the correlation between users and the surroundings. This approach considered a trade-off between the user’s service probability and transmission overhead when sharing cached content among one-hop neighbors. However, the system model consists of a substantial central UAV and several service UAVs, with the former being accountable for delivering the cached content to designated UAVs for collaborative purposes. The research paper failed to account for the flight duration of the central UAV and the communication cost of real-time information exchange between each service UAV and central UAV.
The focus of [23] pertains to a scenario where a single UAV handles random and asynchronous content requests for ground nodes. In contrast to [22], the files were cached in specific ground nodes during the initial phase of each operation cycle and shared via device-to-device (D2D) communication. The optimization problem was aimed to minimize the weighted sum of file caching and retrieval costs by jointly designing the file caching strategy, UAV flight trajectory, and transmission scheduling. The extension of the proposed scheme to encompass multiple UAVs and the storage of files in both UAVs and ground terminals is a task left for future exploration.
In [24], the authors presented a joint optimization problem aimed at maximizing the quality of experience (QoE) of users by mean opinion score (MOS) through the deployment of UAVs, caching placement, and user association. The solution was decomposed into three sub-problems, namely, swap-matching-based UAV deployment, greedy-based caching placement, and Lagrange dual-based user association. It is worth noting that the paper provided a list of candidate UAV deployment locations.
The objective of the proposed study, as outlined in reference [25], was to enhance the QoE evaluated through the content delay index (CDI) while considering the latency in delivering content to mobile users on the ground. To achieve this, the optimization process problem was decomposed into three stages following the procedure of optimizing the 2D position, height, and proactive content caching. It could be found that UAVs serve autonomously for ground users, with no collaborative caching mechanism in place.
In another study, ref. [26] proposed a three-layer cache architecture for UAVs that enabled hierarchical adaptation to the dynamic changes of users and UAVs. By utilizing a user-adaptive UAV trajectory model in the UAV-based MEC layer, as well as a UAV-adaptive cache model in the cognitive center layer, both the transmission efficiency and hit rate of the system were improved. Additionally, ref. [27] utilized mean-field game theory to optimize the placement of content in UAVs by modeling user social attributes as spatial and temporal attributes.
Regarding cache placement, previous works [24,25,26,27] have primarily focused on two aspects: on the one hand, some works investigated the impact of users’ attributes on content placement and utilized mathematical models to demonstrate the relationship between users and the deployment of UAVs using indicators such as transmission delay, MOS, and CDI. On the other hand, other works concentrated on trajectory [28] or transmission-scheduling [29] techniques with a focus on transmission power and content caching. While most of the existing research concentrated on individual UAV caching strategies or cooperative, complementary content transmission of one-hop [30], very few studies have considered cooperative transmission among UAVs of two-hop. Such an approach could significantly reduce the number of times UAVs need to access the MBS to obtain un-cached files. Additionally, the utility function design as in reference [24] did not consider the locally coupling effect between the UAV and its two-hop neighborhood, and any action taken by the UAV could lead to changes in the utility values of its neighborhhood. Consequently, designing a joint, efficient, proactive two-hop cooperative-content caching and UAV-deployment scheme while also taking into account the interdependence among UAVs poses a significant challenge.
Motivated by the above observations, in this paper, we propose a cache-able UAV-assisted network system where a cooperative transmission strategy and a spatial adaptive UAV deployment are jointly adopted to reduce transmission delay and improve coverage. Table 1 illustrates the contrasting analysis of the suggested methodology against other relevant sources. The contributions of this paper are summarized as follows:
  • First, UAV cache placement and deployment are combined to optimize system efficiency considering communication delay and coverage. To enhance the utility of the network, a two-hop UAV cooperative-caching mechanism is proposed.
  • Second, we aim to formulate the problem of joint cooperative caching and 2D placement optimization as a strict potential game. To design the utility function of the potential game, we consider the locally coupling effect resulting from action changes among UAVs. The problem is transferred to maximize the whole network utility, which is defined by jointly considering MOS and coverage.
  • Third, the log-linear learning scheme is proposed to arrive at the solution of the potential game.
The subsequent sections of this paper are structured as follows: Section 3 presents a detailed description of the system model, while Section 4 introduces a joint proactive cooperative-content caching scheme and UAV deployment strategy. The proposed approach leverages the log-linear caching algorithm to effectively achieve the desired outcomes. Simulation experiments and discussion are carried out in Section 5, and the conclusion is drawn in Section 6.

3. System Model and Problem Definitions

In this section, we begin by presenting the system model (Section 3.1) in mathematical terms, followed by an explanation of the transmission model (Section 3.2), network model (Section 3.3), and content cache model (Section 3.4). As caching storage on a single UAV is limited, we propose a mechanism in Section 3.5 that utilizes cooperative content caching to minimize transmission delay. In Section 3.6, we formulate a weighted function with associated constraints to evaluate critical attributes that impact the system performance.

3.1. System Model

As depicted in Figure 1, the network model comprises a macro base station (MBS) that connects to the core network and several Unmanned Aerial Vehicles (UAVs) that act as edge servers while hovering in the air. All UAVs are connected with the MBS via wireless links. Additionally, much user equipment (UE) is present on the ground as consumers accept the services from the UAVs. This network model adequately portrays a UAV-assisted communication system that can meet increasing data traffic needs.
Assuming the presence of UAV-BSs, denoted by the set N , N { 1 , 2 , 3 , N } , flying at the same fixed height h. The 2D position of UAV-BS n is denoted by l n , where l n = ( x n , y n ) R 2 . There exist I static UEs with randomly assigned locations, and the location of UE is denoted by l i = ( x i , y i ) R 2 . Assumes that the cache capacity of each UAV is H bits, and the UAVs receive the un-cached files from the Macro Base Station (MBS) through a wireless link while also actively caching multiple copies of popular content during off-peak hours. The variables of the system are shown in Table 2.

3.2. Network Model

Given the low transmission rates of each UAV independently utilizing the backhaul link to receive a file from the MBS, a collaborative caching approach using a two-hop mechanism has been proposed to enhance the data service performance. The associated UAV can request the un-cached files from its two-hop range neighbors rather than the MBS. These neighbor nodes constitute the set J n = J 1 n J 2 n denoted below:
J 1 n = U A V m l m l n l t h ,   m , n { 1,2 , 3 , N } , m n
J 2 n = U A V m l m l m l t h ,   m ,   m { 1,2 , 3 , N } , m m   o r   n
where l t h   is the maximum communication distance between two UAVs. Additionally, to prevent serious interference and potential collision during flight, the distance between any two nodes must meet the following condition:
l m l n d m i n , m , n { 1,2 , 3 , N }   , m n
where d m i n is the minimum safe distance between any two nodes.

3.3. Transmission Model

The transmission link of UAV-to-UE, UAV-to-UAV, MBS-to-UAV is modeled by 3GPP [31].
I.
UAV-to-UE link
As discussed in [6,32,33], when considering the link between the UAV and users, the ground receiver obtains three types of signals: line-of-sight (LOS), strong reflected signals (NLOS), and multiple reflected components that can cause multi-path fading. These signal groups can be examined individually, each with varying probabilities of occurrence. Typically, as discussed in [34], the received signal is assumed to belong to only one of these groups. The probability of occurrence for each group is dependent on the environment, building density and height, and the elevation angle. LOS and strong NLOS components are more likely to occur than fading, as explained in [34,35], rendering the impact of small-scale fading negligible. A common approach to modeling the air-to-ground propagation channel involves analyzing the LOS and NLOS components separately and considering their respective probabilities of occurrence, which are denoted by:
P L n , i L o s = 20 l o g ( 4 π f d n , i / c ) + η L o s
P L n , i N L o s = 20 l o g ( 4 π f d n , i / c ) + η N L o s
where d n , i is the distance between UAV n and ground user UE i; f is the carrier frequency; c represents the speed of light. η L o s and η N L o s are variables denoting the attenuation factors of the LoS and NLoS links, respectively. To ensure the communication success, the probability of an LoS link and an NLoS link connection between UAV n and the ground user UE i are respectively expressed as follows:
P L o s = 1 1 + a e x p ( b ( 180 π θ i , n a ) )
P N L o s = 1 P L o s
where a , b are constant values associated with the environment. θ i , n represents the elevation angle with θ i , n = a r c t a n ( h ( x n x i ) 2 + ( y n y i ) 2 ) . The UAV-to-UE average path loss and transmission rate can be determined as follows:
P L n , i = P L o s × P L n , i L o s + P N L o s × P L n , i N L o s = A 1 + a e x p ( b ( 180 π θ i , n a ) ) + 20 l o g ( ( x n x i ) 2 + ( y n y i ) 2 + h 2 ) + B
C n , i = B 0 A n l o g 2 ( 1 + S N R n , i ) , j i
A = η L o s η N L o s , B = 20 l o g ( 4 π f / c ) + η N L o s
Assume that the available bandwidth B 0 of UAVs is divided equally among users. The signal-to-noise ratio (SNR) is determined as follows:
  S N R n , i = P n P L n , i σ .
The total number of users associated with UAV n is denoted by A n . To account for the link quality between UAV n and ground user UE i, a threshold σ i , n is set for constraint as Equation (10).
σ i , n = 1   ,   d i , n h r n   a n d   S N R n , i < S N R t h 0   ,   d i , n h > r n     o r     S N R n , i S N R t h
II.
UAV to UAV link
With regard to the link between UAVs, we rely on the research presented in [7], which establishes that the UAV-UAV channels are primarily influenced by the Line of Sight (LoS) component. While there may be some limited multi-path fading due to ground reflections, it has a negligible impact when compared to the effects experienced in UAV-ground or ground–ground channels. The communication between UAVs is mainly a line-of-sight link. Consequently, the path loss of communication between UAVs can be attributed to the free space loss and expressed in the following manner:
P L n , m L o s = 20 l o g d n , m + 20 l o g f + 20 l o g 4 π / c
With respect to the issue of interference among UAVs [36], the assumption is that assigning different frequencies to different UAVs can help avoid annoyance and interference, which is not considered among UAVs in this paper. Hence, the signal-to-noise ratio and transmission rate between UAV n and UAV m are outlined below.
S N R n , m = P n P L n , m σ
C n , m = B c J 1 n l o g 2 ( 1 + S N R n , m )
where P n is the transmitting power of UAV n; B c is the communication bandwidth between UAV n and UAV m, and J 1 n is the number of one-hop nodes of UAVs.
III.
MBS to UAV link
When it comes to the connection between the UAV and the long-distance MBS, the signal strength varies according to the distance (which could span hundreds or thousands of wavelengths) and is directly proportional to the square of the distance due to the wave- energy diffusion phenomenon. This phenomenon is solely related to the transmission path, whereby the longer the path, the higher the path loss. Therefore, the path loss of communication between MBS and UAV n is denoted as follows:
P L n , M B S L o s = d n , M B S 2 ,   P L n , M B S N L o s = ξ d n , M B S 2
θ n , M B S = a r c t a n ( z n ( x n x M B S ) + ( y n y M B S ) 2 )
P L o s n , M B S = 1 1 + a e x p ( b ( 180 π θ n , M B S a ) ) ,   P N L o s n , M B S = 1 P L o s n , M B S
P L n , M B S = P L o s n , M B S × P L n , M B S L o s + P N L o s n , M B S × P L n , M B S N L o s
where d n , M B S denotes the distance between the MBS, and the coordinates of the MBS are l M B S = ( x M B S , y M B S ) . The signal-to-noise ratio and transmission rate between the MBS and UAV n are illustrated below.
S N R n , M B S = P s P L n , M B S σ , C n , M B S = B 0 N l o g 2 ( 1 + S N R n , M B S )
where is B 0 is the back-haul network bandwidth, and N is the number of drones accessing the MBS.

3.4. Content Cache Model

In a cache-enabled UAV-assisted network, each UAV is assumed to have a limited cache capacity and the ability to actively store a certain amount of content in its memory. All contents are accessible for reading in the MBS, and the file library is defined as F = { 1,2 , F } . To simplify the analysis, the size of each file item is set to be equal, which is denoted as M bits, and the UAV’s storage is limited to H bits. The file popularity is assumed to follow the Zipf distribution [37], with parameter κ indicating the skewness of popularity.
P f = i κ l = 1 F l κ
where   Q f   is the popularity of the content f . To increase the cache-hit probability, UAVs utilize a probability distribution of file popularity to cache specific files, and the file popularity of all items can be denoted as [ P 1 , P 2 , , P f , P F ] . The cache status of the UAV is described using a binary decision τ f , n . The value of τ f , n equal to 1 represents that the requested file is stored in the UAV n, while the value equal to 0 indicates that the file is not cached in the UAV n.

3.5. MOS Model

To assess the users’ satisfaction, we employ the Mean Opinion Score (MOS) model [38] to evaluate the quality of the network system service, which takes the transmission delay into account.
M O S i , n , f = c 1 l n ( 1 / D i , n , f ) + c 2
where D i , n , f denotes the content transmission delay; the c 1 and c 2 are constants, and c 1 = 1.3254 ,   c 2 = 4.6746 . It is evident that a shorter transmission delay results in a higher M O S i , n , f , which provides a better user experience. The various potential scenarios are elucidated below:
When the file f is cached in UAV n, where R ( S n ) denotes the cache file set of UAV n, the transmission delay for UE i to obtain the file is as shown below.
D i , n , f = M C n , i ,   f R ( S n )
When the file is not cached in UAV n or in its neighbor nodes, then it needs to get the demanded file from the MBS through the wireless link to satisfy the user’s request, and the transmission delay for UE i to obtain the file is expressed as below.
D i , n , f = M C s , n + M C n , i ,   f R ( S R B S )
When the file is not cached in UAV n but in its one-hop neighbor node m, and m is the closest cache node to n among all one-hop nodes, the transmission delay for UE i to obtain the file is as follows:
D i , n , f = M C n , i + M C n , m , f R ( C J 1 n )
If the file is not cached in UAV n or its one-hop neighborhood node m, but in node m’s one-hop neighbor m , and m is the node with the shortest path away from node n among all two-hop cache nodes, the equation below showcases the transmission delay for UE i to acquire the file.
D i , n , f = M C i , n + M C n , m + M C m , m ,   f R ( C J 1 n ) ,   f R ( C J 2 n )
In conclusion, the transmission delay for UE i to obtain the content from the associated UAV n can be summarized as follows:
D i , n , f = σ i , n [ τ f , n M C i , n + ( 1 τ f , n ) τ f , m ( M C i , n + M C n , m ) + ( 1 τ f , n ) ( 1 τ f , m ) τ f , m × ( M C i , n + M C n , m + M C m , m ) + ( 1 τ f , n ) ( 1 τ f , m ) ( 1 τ f , m ) ( M C s , n + M C i , n ) ]
Considering the possibility of a delay that may be lower than 1, which results in a negative M O S i , n , f , we revise the Equation (22). Therefore, the M O S i , n , f of UE i appealing content f from the associated UAV n is expressed as follows:
M O S i , n , f = P i , f × [ c 1 l n ( 100 / D i , n , f ) + c 2 ]
where P i , f is the probability that user i requests for file f.

3.6. Problem Generation

In this section, we analyze the users’ satisfaction and coverage of the whole system performance. Based on the given M O S i , n , f , the MOS for the whole system is expressed as follows:
M O S = n N i I f F M O S i , n , f
Also, the user coverage of the system is expressed as the following:
p c o v e r = i I n ϵ N σ i , n
Based on the above analysis, this paper takes both users’ satisfaction and coverage into account. Consequently, the optimization problem under certain constraints can be defined as follows:
P :   m a x ( α   M O S + β p c o v e r ) = m a x   ( α n N i I f F M O S i , n , f E n + β i I n ϵ N σ i , n )
s . t . C 1 : l m l n d m i n , m , n N , m n C 2 : σ i , n = { 0,1 } , n N , i I C 3 : n ϵ N σ i , n 1 C 4 : τ f , n = { 1,0 } , n N , f F C 5 : f F n ϵ N τ f , n × S H , n N , f F
The defined optimization problem is constrained by the binary decision σ i , n   and τ f , n . C3 means that each user only associates with a single UAV. C5 is set to limit the caching capacity of each UAV.

4. Location and Cache Strategy Based on Potential Game

Based on the optimization problem formulated in Section 2, we leverage potential game theory to present a novel approach for tackling the optimization problem outlined in Section 3.6, which aims to optimize both the cache file placement and the locations of UAVs to maximize the users’ satisfaction and coverage. First, the UAV 3D position deployment is decoupled into 2D planar deployment and altitude optimization. To achieve this, we utilize the K-means algorithm to initialize the 2D placement, followed by the calculation of the optimal altitude that can meet the SNR threshold. Then, the potential game theory is applied to model the joint optimization of the users’ satisfaction and coverage, in which the log-linear-learning algorithm is employed to obtain the optimal results.

4.1. UAV Placement of Altitude

To guarantee the connection probability between UE and UAV, the ground users are clustered into several subsets using the K-means [39] clustering algorithm. The process involves initializing k cluster centers, calculating the Euclidean distance between each user and the cluster center using Equation (33), and assigning each user to the closest cluster center. Therefore, the initial horizontal coordinates of UAVs are then determined as the center of each user cluster.
d n , i = ( x n x i ) 2 + ( y n y i ) 2 ,   i I ,   n N
As discussed in references [6,40], the UAV coverage is related to the altitude of the UAV, and the height of the UAVs is uniformly set for facilitating the establishment of the two-hop network for cooperative caching. The received SNR of the user must exceed a specific threshold value to ensure the quality of the user’s service. From Equation (8), it is concluded that:
A 1 + a e x p ( b ( 180 π θ i , n a ) ) + 20 l o g ( d n , i ) + B P n σ γ t h
In fact, the maximum path loss can be determined from the above equation as follows:
P L m a x = A 1 + a e x p ( b ( 180 π θ i , n a ) ) + 20 l o g ( d n , i ) + B = P n σ γ t h
To determine the optimal altitude point for achieving the best coverage, h can be expressed in the following manner:
d n , i = h s i n θ i , n ,   B = 20 l o g ( 4 π f / c ) + η N L o s
h = 10 e x p [ ( P n σ γ t h B A 1 + a e x p ( b ( 180 π θ i , n a ) ) ) 1 20 ] s i n θ i , n  
Then, compute the first order partial derivatives of h with respect to θ , denoted as follows, respectively:
h θ = 1 20 l n 10 × 10 ( P n σ γ t h B A 1 + a e x p ( b ( 180 π θ i , n a ) ) ) 1 20 × A a b 180 π e x p ( b ( 180 π θ i , n a ) ) [ 1 + a e x p ( b ( 180 π θ i , n a ) ) ] 2 × s i n θ i , n + c o s θ i , n × 10 ( P n σ γ t h A 1 + a e x p ( b ( 180 π θ i , n a ) ) ) 1 20 = 0
In this case, the optimal altitude of the UAV is approximated with the determined values of UAV coverage radius and θ o p t .
1 20 l n 10 × A a b 180 π e x p ( b ( 180 π θ i , n a ) ) [ 1 + a e x p ( b ( 180 π θ i , n a ) ) ] 2 s i n θ i , n + c o s θ i , n = 0
A a b e x p ( b ( 180 π θ i , n a ) ) [ 1 + a e x p ( b ( 180 π θ i , n a ) ) ] 2 + π 9 l n 10 t a n θ i , n = 0
As A , a and b are known parameters, we could calculate the optimal angle θ o p t from Equation (37). Then, the optimal altitude is derived from Equation (34).

4.2. Joint Strategy for UAV Cooperative Caching and 2D Deployment

4.2.1. Potential Game

Formally, the game is denoted as G = { N , { T n } N , { A n } N , { u n } N } , in which UAVs act as the players. N = { 1 , 2 , 3 , N } is the set of UAVs. The set T n consists of all two-hop neighbors of UAV n. A n is a set of the available actions for UAV n, and u n is the utility of UAV n. The system utility function is denoted as U n ( a n , a n ) , where a n = { f 1 , , f K , l n } is the action of UAV n incorporating the file-caching strategy and 2D location, and a n represents the action profile of all UAVs except UAV n with respect to file-caching strategy and 2D location. The Nash equilibrium and the exact potential game of the formulated game are defined as follows.
Definition 1. 
(Nash equilibrium): For a strategic game  G , a joint cache and horizontal action profile  a = { a 1 , , a n }   is a mixed strategy NE if and only if no UAV can improve its utility by unilaterally deviating its strategy while the others keep theirs unchanged. Then the action profile  a  is said to be a NE of the game  G . If the inequality is strict, then the action profile  a  is said to be a strict NE of the game  G .
U n ( a n , a n ) U n ( a n , a n ) , n N ,   a n A n , a n a n
Definition 2. 
(Exact potential game): If there exists a potential function satisfying with the following equation  Φ : A 1 A 2 A n R, when UAV  n  changes its strategy ( a n a n ), the increment of its game utility  Φ  is equal to that of the potential function  U n , then it is an exact potential game (EPG). The exact potential game model has at least one pure Nash equilibrium solution.
Φ ( a n , a n ) Φ ( a n , a n ) = U n ( a n , a n ) U n ( a n , a n )   ,   n N ,   a n ,   a n A n
Equation (37) indicates that the change in the utility function due to the unilateral deviation of a single UAV is identical to the change in the potential function. According to the utility theory, the purpose of the utility function is to assess the individual performance of each UAV while maintaining a reasonable trade-off between the MOS and coverage. It can be achieved by rationalizing the cache placement and location. The defined utility function is expressed as follows.
U n ( a n , a T n ) = u n ( a n , a T n ) + k T n u k ( a k , a T k ) ( u n ( a 0 , a n ) + k T n u k ( a k , a T k \ n ) ) = α i I f F M O S i , n , f + β i I σ i , n + ( α k T n f F M O S i , n , f + β i I σ i , n ) ( u n ( a 0 , a n ) + k T n u k ( a k , a T k \ n ) )
where a T n is the strategy profile of UAV n’s two-hop neighbors, and a 0 means that UAV n does not provide any service for any UE. Thus a T k \ n is the strategy profile of UAV k’s two-hop neighbors when UAV n gives up working.
To optimize the problem P, the total potential function is defined as follows:
Φ ( a 1 , , a n 1 , a n ,   a n + 1 , a N ) = n N u n ( a n , a T n ) = n N ( α i I f F M O S i , n , f + β i I σ i , n )
Theorem 1. 
The proposed joint strategy for UAV cooperative caching and the 2D deployment model is an exact potential game for which there exists at least one stable Nash equilibrium solution.
Proof of Theorem 1. 
Based on Equation (44), the alteration attributed to the unilateral change in the individual utility of UAV n can be expressed as follows.
Φ ( a n , a n ) Φ ( a n , a n ) = n ϵ T n { n } N \ T n \ { n } u n ( a n , T n ) n ϵ T n { n } N \ T n \ { n } u n ( a n , T n )
where a n is derived from a n by changing UAV n’s cache placement or 2D position strategy. The change of the potential function caused by the unilateral change is demonstrated below.
If it is assumed that the UAV n undergoes one-step changes at a time, only one alternative for caching placement or 2D position can be modified at a time. As a result, there are possible scenarios that result in action changes.
Case 1: The first scenario is when a cached content in UAV n is changed while the 2D position remains unchanged. The detailed proof of the potential function change is demonstrated below.
Φ ( a n , a n ) Φ ( a n , a n ) = u n ( a n , T n ) u n ( a n , T n ) + k ϵ T n u k ( a k , T k ) k ϵ T n u k ( a k , T k ) + k ϵ N \ T n ,   k n u k ( a k , T k ) k ϵ N \ T n ,   k n u k ( a k , T k )
where a n = ( a 1 , , a n 1 , , a n + 1 , a N ) , and u n ( a n , T n ) denotes the changed utility of UAV n after unilaterally taking the action a n .
Considering that the UAV n’s alteration of the caching file impacts solely the utility of its two-hop neighbors, the following equation can be concluded.
k ϵ N \ T n ,   k n u k ( a k , T k ) k ϵ N \ T n ,   k n u k ( a k , T k ) = 0
Therefore, based on Equations (44), (46) and (47), it can be inferred that if the UAV n takes a unilateral action, the alteration in the utility function presented in Equation (43) is equivalent to the modification in the potential function detailed in Equation (45).
Φ ( a n , a n ) Φ ( a n , a n ) = [ u n ( a n , T n ) + k ϵ T n u k ( a k , T k ) ( u n ( a 0 , a n ) + k T n u k ( a k , a T k \ n ) ) ] { u n ( a n , T n ) + k ϵ T n u k ( a k , T k ) ( u n ( a 0 , a n ) + k T n u k ( a k , a T k \ n ) ) } = U n ( a n , a T n ) U n ( a n , a T n )
Case 2: When the 2D position of UAV n is changed from l n and changes to l n , the set of two-hop neighbors of the UAV n becomes T n , and the detailed proof of the change about the potential function is demonstrated as follows:
Φ ( a n , a n ) Φ ( a n , a n ) = n Z T n \ Z Y N \ T n \ { n } \ Y { n } u n ( a n , T n ) n Z T n \ Z Y N \ T n \ { n } \ Y { n } u n ( a n , T n ) = u n ( a n , T n ) + n Z T n \ Z Y N \ T n \ { n } \ Y u n ( a n , T n ) [ u n ( a n , T n ) + n Z T n \ Z Y N \ T n \ { n } \ Y u n ( a n , T n ) ]
Let Z = T n T n , Y = N \ T n \ { n } N \ T n \ { n } , then it could be found that N = Z T n \ Z Y N \ T n \ { n } \ Y { n } . Likewise, it could be obtained that N = Z T n \ Z Y N \ T n \ { n } \ Y { n } . Based on the above analysis, the subsequent equation has been established.
n Y u n ( a n , T n ) n Y u n ( a n , T n ) = 0
where N \ T n \ { n } \ Y = T n \ Z ,   N \ T n \ { n } \ Y = T n \ Z . Since UAV n’s action only affects the utility of its specific two-hop neighbors, UAV n in the set T n \ Z and n in the set T n \ Z are not benefited by UAV n’s individual changes. As a result, we can conclude that:
Φ ( a n , a n ) Φ ( a n , a n ) = u n ( a n , T n ) + n Z T n \ Z T n \ Z u n ( a n , T n ) [ u n ( a n , T n )   + n Z T n \ Z T n \ Z u n ( a n , T n ) ] = [ u n ( a n , T n ) + k ϵ T n u k ( a k , T k ) + n T n \ Z u n ( a n , T n ) ) ] [ u n ( a n , T n ) + n T n u n ( a n , T n ) + n T n \ Z u n ( a n , T n ) ] = U n ( a n , a T n ) U n ( a n , a T n )
From Equations (46)–(51), we can find that when UAV n takes a unilateral action; the change in utility function given in (43) is the same as the change in the potential function in (44).
  Φ ( a n , a n ) Φ ( a n , a n ) = U n ( a n , a T n ) U n ( a n , a T n )
According to Definition 2, the proposed game model is an exact potential game with at least one Nash equilibrium. Moreover, the solution to the maximization problem P also serves as a Nash equilibrium. Therefore, the game model satisfies the conditions of an exact potential game. □

4.2.2. Log-Linear-Learning Algorithm

To address the problem in the game, it is essential to develop an uncoupled learning approach that has minimal reliance on interaction information, ensures rapid convergence, and can be efficiently distributed to achieve the globally optimal solution. The log-linear-based learning rule, a well-established scheme known for attaining optimal policy solutions, has been successfully employed to address this problem, as referenced in [41,42,43,44] (Algorithm 1).
Algorithm 1. Joint Strategy for UAV Cooperative Caching and 2D Deployment
Input: The set of UEs { 1 , 2 , 3 , I } ,
Output: UAV horizontal location { l n } N , content cache strategy.
Initialization: Initialize a n ( n N ), while the initial 2D position of UAVs are the center of the clusters, respectively; set the number of iterations t = 1 ,   t t m a x ,  t m a x as the maximum round.
Step 1: All UAVs exchange information of current action a n with their two-hop neighbor nodes UAVs.
Step 2: Randomly select UAV n. Then, for the selected UAV n, calculate its utility function U n ( t ) ( a n , a n ) by (37).
Step 3: The selected UAV n randomly chooses an action a n A n with equal probability and keeps all the other UAVs’ action profile unchanged. Then it calculates the utility function based on the selection a n , denoted as U n ( a n , a n ) .
Step 4: The selected UAV n adheres to the following rules to update its selection in iteration t + 1 ,   which   means   the   probability   of   choosing   action   a n in iteration t + 1 is P a m ( t + 1 ) .
P a n ( t + 1 ) = e x p { υ U n ( a n , a n ( t ) ) } a n ¯ A n e x p { υ U n ( a n ¯ , a n ( t ) ) } (53)
Where υ is the learning parameter.
Step 5: If P a m ( t + 1 ) = 0.99 or t = t m a x , then stop the iteration; otherwise, let t = t + 1 , go to Step 2.

4.3. Algorithm Convergence Analysis

In the scheme designed above, at every time step t, one UAV n N is randomly selected. It updates its state by choosing one action a n from action set A n according to the Boltzmann distribution with parameter υ 0 . The action a n is selected with probability P a n ( t ) , which is denoted as follows.
p a n ( t ) = e x p { υ U n ( a n , a n ( t 1 ) ) } a n ¯ A n e x p { υ U n ( a n ¯ , a n ( t 1 ) ) }
The above statement clearly establishes a Markov chain with a state space equivalent to the set A of all joint actions.
A = A 1 A 2 A n
Moreover, the logit dynamics can be defined as follows.
Definition 3. 
Let space  A = n ϵ N A n  be the state space of all actions of the UAV sets  N , and the combination of all node actions is  a ( t ) = { a n ( t ) }   ( n ϵ N ) , and the state transfer payoff is  U n ( a n , a n ( t ) ) .  M υ = { A , a ( t ) , P ( t ) }  on the joint actions  A  ith transition probability  P  is the homogeneous Markov chain.
P ( a 1 , a 2 ) = 1 N P a n 2 ( t )   ,   a n 2 = a n 1   a n d   a 1 a 2 n N P a n 2 ( t ) ,   a 1 = a 2  
where   a 1  and  a 2  are the assumed state, and    a 1 , a 2 A . Where  a n 1  represents the action profile of UAV n that facilitates the transition from the current state into state 1,  a n 2  is the action profile of UAV n that facilitates the transition from the current state into state 2.
The proof for the unique distribution in the potential game is as follows:
Theorem 2. 
If  M υ = { A , a ( t ) , P ( t ) }  is a potential game with utility function  Φ , then the Markov chain is a unique stationary distribution  π  with
π ( a ) = e x p { υ Φ ( a ) } S A e x p { υ Φ ( S ) }
Proof of Theorem 2. 
According to the detailed balance condition for Markov chains: given a Markov chain, a distribution π and a probability transfer matrix P, if the following formula is satisfied, then this Markov chain has a stationary distribution.
π (   a 1 ) P   a 1   a 2 = π (   a 2 ) P   a 2   a 1
It is clearly fulfilled in Equation (58) if a 1 equal to a 2 , and if a 1 and a 2 differ in more by the nth UAV, the detailed proof is demonstrated as follows.
Assuming that the state distribution at the current time step is π (   a 1 ) , the state is transferred to π (   a 2 ) with the probability of P a 1 a 2 . As the proposed algorithm selects only one UAV randomly to update its action, only the certain UAV’s state is transferred between   a 1 and a 2 .
Let a n denote the strategy of UAV n, a n A n , then the state distribution of the UAV’s changing from π ( a 1 ) with transfer probability P a 1 a 2 is denoted as follows:
π (   a 1 ) P   a 1   a 2 = 1 N e x p { υ Φ (   a 1 ) } S A e x p { υ Φ ( S ) } P a n 2 ( t ) = 1 N e x p { υ Φ (   a 1 ) } S A e x p { υ Φ ( S ) } e x p { υ U n ( a n 2 , a n 2 ( t 1 ) ) } a n ¯ A n e x p { υ U n ( a n ¯ , a n ( t 1 ) ) } = 1 / N ( e x p { υ Φ (   a 1 ) + υ U n ( a n 2 , a n 2 ( t 1 ) } ) S A e x p { υ Φ ( S ) } a n ¯ A n e x p { υ U n ( a n ¯ , a n ( t 1 ) ) }
Similarly, it could be obtained as follows:
π (   a 2 ) P   a 2   a 1 = 1 / N ( e x p { υ Φ (   a 2 ) + υ U n ( a n 1 , a n 1 ( t 1 ) } ) S A e x p { υ Φ ( S ) } a n ¯ A n e x p { υ U n ( a n ¯ , a n ( t 1 ) ) }
Considering the potential game theory presented in Equation (42), it can be inferred that:
υ ( Φ ( a 1 ) Φ ( a 2 ) ) = υ ( U n ( a n 1 , a n 1 ) U n ( a n 2 , a n 2 ) )
Therefore, it can be presented to demonstrate the equation below, which is exactly the balanced stationary equation of the Markov process [43]. Then, its stationary distribution is characterized by Equation (57) since the above algorithm has a unique stationary distribution, and the distribution satisfies the balanced equations of its Markov process.
π (   a 1 ) P   a 1   a 2 = π (   a 2 ) P   a 2   a 1
Hence, Theorem 2 is demonstrate; thus the above log-linear learning algorithm can be converged and established to possess asymptotic optimality. □

5. Performance Evaluation

In this section, we perform a series of numerical simulations and evaluate the proposed Joint Strategy for UAV Cooperative Caching placement and 2D Deployment scheme for the UAV deployment.

5.1. Parameter Setting

In the simulation, the network parameters are summarized in Table 1. The coverage area of the network is assumed to be a square region measuring 3000 m × 3000 m, with ground users randomly distributed throughout the area. Inspired by reference [6,30], the parameters are set as presented in Table 3. To evaluate the effectiveness of the proposed two-hop-based algorithm, we compare it with benchmark algorithms. These benchmark algorithms are defined as follows:
  • one-hop-based algorithm: the UAV provides the service for ground users with sharing cooperation of its one-hop neighbors. In fact, we have achieved the implementation of the one-hop-based algorithm using the framework of K-means, along with the one-hop mechanism and log-linear-learning method.
  • Non-cooperative cache-based algorithm: the UAV provides the service with its own cache or with the help of the MBS. This is the implementation of the non-cooperative cache-based algorithm using the framework of K-means, along with the log-linear-learning method.
We assume file caching randomly in the three schemes above according to the same content popularity distribution.

5.2. Performance of the Proposed Scheme

The relationship between the utility and varying the number of users is described in Figure 2, where the number of UAVs is 15, and there are 40 item files. As shown in Figure 2, the performance of our proposed two-hop cooperative-caching strategy is compared with that of one-hop-based caching strategy and a strategy without cooperative caching (only consider the random-cached file in the associated file). It can be seen that the total system utility of the one-hop and the proposed scheme is better than that of the random-base algorithm. The reason is that the former two strategies reduce the additional latency associated with requesting content from the base station over the back-haul network. Moreover, the performance of the proposed scheme is better than that of the one-hop strategy. The two-hop strategy has been developed to effectively share cached content with the two-hop neighborhood, enhancing the efficiency of content caching in UAVs for users. Moreover, it aims to strike a balance between transmission delay and coverage. It is observed that as the number of ground users increases, the system utility of all three methods also increases. This phenomenon can be attributed to the fact that the utility is the combined measure of users’ MOS and coverage. The increase in users ultimately results in the expansion of the service number of associated UAVs in the cluster, consequently leading to a higher number of users being served by each given UAV. In addition, the probability of the shared cache being utilized also increases due to the greater number of users.
The relationship between the utility of the whole system and varying the number of UAVs is described in Figure 3, where the number of users is 150, and there are 20 item files. As shown in the figure, the proposed scheme performs better than those of other algorithms tested. As the number of UAV increases, system performance will increase accordingly because the more users are covered and served as the number of drones increases, and the two-hop shared cache files can be utilized effectively by more users.
Coverage ratio and MOS for various numbers of UAVs are represented in Figure 4 and Figure 5, respectively, where the number of users is 150, and there are 20 item files. It can be seen in Figure 4 that when the number of UAVs increases, the coverage ratio increases. However, the coverage ratio of the one-hop-based algorithm and the random-cache algorithm are gradually approaching the proposed scheme while still lower than that of the proposed. We can find that when the number of UAVs increases, the overall trend of the one-hop-based algorithm and the proposed scheme are obviously better than non-cooperative cache-based algorithm. However, the MOS of the system of the one-hop-based algorithm is larger than that of the proposed one when the UAV number is 25 in Figure 5. The essence of the proposed algorithm is to utilize the advantage of gathering UAV groups, which naturally leads to the decrease of coverage. Therefore, the utility function is designed to make a balance between the coverage and MOS. That is why sometimes the MOS of the system of the proposed scheme is lower than the one-hop-based algorithm.
The total utility of the system for various file items is represented in Figure 6, where the cache capacity of each UAV is 3 items, the number of UAVs is set to be 20, and the number of users is 150. The simulation results show that the proposed algorithm achieves the highest system utility out of all three algorithms because the proposed scheme can fully utilize the neighborhood UAVs’ caches. As the file items increase, the overall trend of the three schemes is down accordingly because the probability of the cache hit decreases.
Figure 7 and Figure 8 display the coverage and MOS values for varying numbers of file items. Upon examination of Figure 7, it is apparent that an increase in cache file items results in the sacrifice of coverage to maintain communication delays, leading to a slight decrease in the coverage rate. Additionally, the proposed scheme exhibits a flatter coverage trend compared to those of the one-hop-based algorithm and non-cooperative cache-based scheme, both of which do not perform as well. This is primarily because the coverage effect is heavily influenced by the number of UAVs, users, and their distribution.
Considering the probability of the cache items of the UAVs and user requirements, the effect fluctuates when the number of file items changes in Figure 8. However, the proposed scheme has a better permanence on MOS than the other schemes tested when the file items increase.

5.3. Convergence and Complexity Analysis

Currently, numerous scholars are utilizing the game theory model for cache placement and deployment in UAV-assisted networks. Consequently, this paper’s approach is scrutinized against other conventional cooperative caching mechanisms in the existing literature.
Table 4 demonstrates that the literature [22] just gave a brief procedure about a mixed-strategy equilibrium solution while the proposed method proves the existence and convergence of the equilibrium. Moreover, refs. [22,30] fail to consider the principle of the locality coupling effect, whereas the design of the utility function in this paper uniquely addresses this issue. Our proposed method meticulously describes the impact of cache placement or deployment on the utility of neighboring nodes, which can be adopted in various sequences.
In reference [22], step 1 involves a complexity of O ( N ) for selecting any UAV, where N is determined by the number of UAVs. Furthermore, once a UAV senses the utility under this partition, the complexity is expressed as O ( C 1 ) , where C 1 is a small constant determined by the calculation method specified in Equation (63). For steps 2 and 3, since the utility calculation of each action taken by the UAV n needs to calculate the changed utility value of all UAVs as depicted in Equation (63), calculating the changed utility value for all actions taken by the selected UAV n has a complexity of O ( S C 1 N ) , where S is the strategy space. In step 4, after the utility values are compared, the complexity for UAV to update its action is O ( C 2 ) , where C 2 is a small constant. Finally, the complexity of reference [22] can be represented by Equation (64).
U n ( a n , a J n ) = R ( a n , a n ) R ( a n = 0 , a n )
C [ 22 ] = O ( N ) ( O ( C 1 ) + O ( S C 1 N ) + O ( C 2 ) )
Similarly, the complexity of reference [30] can be calculated as follows:
C [ 30 ] = O ( N ) ( O ( D 1 ) + O ( S D 1 N ) + O ( D 2 ) + O ( D 3 ) )
In reference to [30], the complexity of Step 2 is augmented by incorporating the computation of both the coalition utility and the system utility subsequent to the inclusion of UAV n to the coalitions. Meanwhile, the complexity ( D 2 ) of Step 3, which pertains to joining the optimal coalition, and D 3 of Step 4, which is about updating the coalition structure, remains as small constants.
As for the proposed scheme, step 1 involves a complexity of O ( N ) for selecting any UAV. The complexity of step 3, calculating the neighbor node’s utility calculation of each action taken by the UAV n as depicted in Equation (43), is O ( S E 1 K ) ( K < N ). Similarly, the complexity of the proposed scheme can be calculated as follows:
C p r o p o s e d = O ( N ) ( O ( E 1 ) + O ( S E 1 K ) + O ( E 2 ) + O ( E 3 ) )
Based on the above calculations, the proposed scheme boasts a lower computational complexity when compared to the references [22,30]. This can be primarily attributed to the inclusion of the local coupling effect between UAVs in the function design.

6. Conclusions and Future Work

In this paper, we conduct a joint investigation of UAV deployment and cache placement in a UAV-assisted network to achieve a balance between the user’s satisfaction and coverage. We formulate an optimization problem that is designed to maximize the sum of the user’s satisfaction and overall coverage, which we then decompose into three distinct parts. First, we use K-means to obtain initial 2D locations for the UAV and determine the optimal altitude. Second, we design a two-hop cooperative-cache mechanism to improve the MOS and employ a potential game to model the joint optimization of the user’s satisfaction and coverage. To obtain optimal results, we utilize the log-linear-learning algorithm. We additionally prove that the proposed scheme is convergent. Finally, we demonstrate the feasibility and effectiveness of our proposed algorithm through simulation results, which show that the UAV deployment and cache placement improve the system performance and confirm the advantages of the two-hop cooperative cache.
The proposed method has some limitations that require attention. First, the approach outlined in this paper assumes that users have similar kinds of data requirements and employs an equal distribution strategy for bandwidth allocation, overlooking individual differences in user needs. Going forward, our research will involve addressing the challenge of managing resources for a UAV-assisted cache in the context of multi-demand user groups. Additionally, when a communication model is selected, it is assumed that various frequency bands are assigned to each UAV to prevent interference. However, a limited availability of spectrum resources necessitates the careful assessment of the impact of interference between UAVs. Furthermore, to simplify the model, we have uniformly set the height of the UAV, which will facilitate the establishment of a two-hop network for cooperative caching in the later stage. In future research, we aim to investigate cooperative caching of UAVs at varying altitudes to provide network services. Furthermore, the endurance of UAVs and energy consumption will be a crucial factor to consider in the future.

Author Contributions

Conceptualization, Y.B. and J.H.; methodology and writing—original draft, Y.B.; writing—review and editing, Y.B. and S.W.; visualization Y.H. and C.F.; supervision W.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. He, X.; Wang, K.; Huang, H.; Miyazaki, T.; Wang, Y.; Guo, S. Green Resource Allocation based on Deep Reinforcement Learning in Content-Centric IoT. IEEE Trans. Emerg. Top. Comput. 2022, 8, 781–796. [Google Scholar] [CrossRef]
  2. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef] [Green Version]
  3. Jiang, X.; Sheng, M.; Zhao, N.; Xing, C.; Lu, W.; Wang, X. Green UAV communications for 6G: A survey. Chin. J. Aeronaut. 2022, 35, 16. [Google Scholar] [CrossRef]
  4. Trung, D.; Jin, K.K.; Zeeshan, K.; Minh-Phung, B.; Nguyen-Son, V. UAV Caching in 6G Networks: A Survey on models, techniques, and applications. Phys. Commun. 2022, 51, 1874–4907. [Google Scholar]
  5. Chen, J.; Chen, P.; Wu, Q.; Xu, Y.; Qi, N.; Fang, T. A Game-Theoretic Perspective on Resource Management for Large-Scale UAV Communication Networks. China Commun. 2021, 18, 70–87. [Google Scholar] [CrossRef]
  6. Hourani, A.; Kandeepan, S.; Jamalipour, A. Modeling air-to-ground path loss for low altitude platforms in urban environments. In Proceedings of the IEEE Global Telecommunications Conference, Austin, TX, USA, 8–12 December 2014; pp. 2898–2904. [Google Scholar]
  7. Feng, Q.; McGeehan, J.; Tameh, E.K.; Nix, A.R. Path loss models for air-to-ground radio channels in urban environments. In Proceedings of the IEEE Vehicular Technology Conference, Melbourne, VIC, Australia, 7–10 May 2006; pp. 2901–2905. [Google Scholar]
  8. Xu, G.; Zhang, N.; Xu, M.; Xu, Z.; Zhang, Q.; Song, Z. Outage Probability and Average BER of UAV-assisted Dual-hop FSO Communication with Amplify-and-Forward Relaying. IEEE Trans. Veh. Technol. 2023, 1–16. [Google Scholar] [CrossRef]
  9. Song, T.; Kam, P.-Y. A Robust GLRT Receiver with Implicit Channel Estimation and Automatic Threshold Adjustment for the Free Space Optical Channel with IM/DD. J. Light. Technol. 2014, 32, 369–383. [Google Scholar] [CrossRef]
  10. Caillouet, C.; Razafindralambo, T. Efficient Deployment of Connected Unmanned Aerial Vehicles for Optimal Target Coverage. In Proceedings of the 2017 Global Information Infrastructure and Networking Symposium (GIIS), Saint Pierre, France, 25–27 October 2017; pp. 1–8. [Google Scholar]
  11. Alzenad, M.; El-Keyi, A.; Lagum, F.; Yanikomeroglu, H. 3-D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage. IEEE Wirel. Commun. Lett. 2017, 6, 434–437. [Google Scholar] [CrossRef] [Green Version]
  12. Sun, S.; Zhang, G.; Mei, H.; Wang, K.; Yang, K. Optimizing Multi-UAV Deployment in 3-D Space to Minimize Task Completion Time in UAV-Enabled Mobile Edge Computing Systems. IEEE Commun. Lett. 2021, 25, 579–583. [Google Scholar] [CrossRef]
  13. Gao, N.; Liang, L.; Cai, D.; Li, X.; Jin, S. Coverage Control for UAV Swarm Communication Networks: A Distributed Learning Approach. IEEE Internet Things J. 2022, 9, 19854–19867. [Google Scholar] [CrossRef]
  14. Messous, M.A.; Senouci, S.M.; Sedjelmaci, H. Network connectivity and area coverage for UAV fleet mobility model with energy constraint. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  15. Wang, L.; Zhang, H.; Guo, S.; Yuan, D. 3D UAV Deployment in Multi-UAV Networks with Statistical User Position Information. IEEE Commun. Lett. 2022, 26, 1363–1367. [Google Scholar] [CrossRef]
  16. El Hammouti, H.; Benjillali, M.; Shihada, B.; Alouini, M.S. Learn-As-You-Fly: A Distributed Algorithm for Joint 3D Placement and User Association in Multi-UAVs Networks. IEEE Trans. Wirel. Commun. 2019, 18, 5831–5844. [Google Scholar] [CrossRef] [Green Version]
  17. Zhang, T.; Wang, Z.; Liu, Y.; Xu, W.; Nallanathan, A. Caching Placement and Resource Allocation for Cache-Enabling UAV NOMA Networks. IEEE Trans. Veh. Technol. 2020, 69, 12897–12911. [Google Scholar] [CrossRef]
  18. Yin, Y.; Liu, M.; Gui, G.; Gacanin, H.; Sari, H. Minimizing Delay for MIMO-NOMA Resource Allocation in UAV-Assisted Caching Networks. IEEE Trans. Veh. Technol. 2023, 72, 4728–4732. [Google Scholar] [CrossRef]
  19. Zeng, Y.; Zhang, R. Energy-Efficient UAV Communication with Trajectory Optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar] [CrossRef] [Green Version]
  20. Koyuncu, M.; Shabanighazikelayeh; Seferoglu, H. Deployment and Trajectory Optimization of UAVs: A Quantization Theory Approach. IEEE Trans. Wirel. Commun. 2018, 17, 8531–8546. [Google Scholar] [CrossRef] [Green Version]
  21. Wang, Y.; Gao, Z.; Zhang, J.; Cao, X.; Zheng, D.; Gao, Y.; Ng, D.W.K.; Di Renzo, M. Trajectory Design for UAV-Based Internet of Things Data Collection: A Deep Reinforcement Learning Approach. IEEE Internet Things J. 2022, 9, 3899–3912. [Google Scholar] [CrossRef]
  22. Fang, T.; Tian, H.; Zhang, X.; Chen, X.; Shao, X.; Zhang, Y. Context-Aware Caching Distribution and UAV Deployment: A Game-Theoretic Approach. Appl. Sci. 2018, 8, 1959. [Google Scholar] [CrossRef] [Green Version]
  23. Xu, X.; Zeng, Y.; Guan, Y.L.; Zhang, R. Overcoming Endurance Issue: UAV-Enabled Communications with Proactive Caching. IEEE J. Sel. Areas Commun. 2018, 36, 1231–1244. [Google Scholar] [CrossRef] [Green Version]
  24. Zhang, T.; Wang, Y.; Liu, Y.; Xu, W.; Nallanathan, A. Cache-Enabling UAV Communications: Network Deployment and Resource Allocation. IEEE Trans. Wirel. Commun. 2020, 19, 7470–7483. [Google Scholar] [CrossRef]
  25. Bera, A.; Misra, S.; Chatterjee, C. QoE Analysis in Cache-Enabled Multi-UAV Networks. IEEE Trans. Veh. Technol. 2020, 69, 6680–6687. [Google Scholar] [CrossRef]
  26. Wu, G.; Miao, Y.; Alzahrani, B.; Barnawi, A.; Alhindi, A.; Chen, M. Adaptive Edge Caching in UAV-assisted 5G Network. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  27. Wang, E.; Dong, Q.; Li, Y.; Zhang, Y. Content Placement Considering the Temporal and Spatial Attributes of Content Popularity in Cache-Enabled UAV Networks. IEEE Wirel. Commun. Lett. 2022, 11, 250–253. [Google Scholar] [CrossRef]
  28. Ji, J.; Zhu, K.; Niyato, D.; Wang, R. Joint Cache Placement, Flight Trajectory, and Transmission Power Optimization for Multi-UAV Assisted Wireless Networks. IEEE Trans. Wirel. Commun. 2020, 19, 5389–5403. [Google Scholar] [CrossRef]
  29. Hajiakhondi-Meybodi, Z.; Mohammadi, A.; Abouei, J.; Hou, M.; Plataniotis, K.N. Joint Transmission Scheme and Coded Content Placement in Cluster-Centric UAV-Aided Cellular Networks. IEEE Internet Things J. 2022, 9, 11098–11114. [Google Scholar] [CrossRef]
  30. Sun, Y.; Zhong, X.; Wu, F.; Chen, X.; Zhang, S.; Dong, N. Multi-UAV Content Caching Strategy and Cooperative, Complementary Content Transmission Based on Coalition Formation Game. Sensors 2022, 22, 3123. [Google Scholar] [CrossRef]
  31. 3GPP TR36.777. Enhanced LTE Support for Aerial Vehicles. Available online: http://www.3gpp.org/specs/archive/36_series/36.777 (accessed on 17 May 2019).
  32. Yu, Y.; Rodríguez-Piñeiro, J.; Shunqin, X.; Tong, Y.; Zhang, J.; Yin, X. Measurement-Based Propagation Channel Modeling for Communication between a UAV and a USV. In Proceedings of the 2022 16th European Conference on Antennas and Propagation (EuCAP), Madrid, Spain, 27 March–1 April 2022; pp. 1–5. [Google Scholar]
  33. Hourani, A.; Sithamparanathan, K.; Lardner, S. Optimal LAP altitude for maximum coverage. IEEE Wirel. Commun. Lett. 2014, 3, 569–572. [Google Scholar] [CrossRef] [Green Version]
  34. Ouamri, M.A.; Alkanhel, R.; Gueguen, C.; Alohali, M.A.; Ghoneim, S.S.M. Modeling and analysis of uav-assisted mobile network with imperfect beam alignment. Comput. Mater. Contin. 2023, 74, 453–467. [Google Scholar] [CrossRef]
  35. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef] [Green Version]
  36. Cai, X.; Zhang, C.; Rodríguez-Piñeiro, J.; Yin, X.; Fan, W.; Pedersen, G.F. Interference Modeling for Low-Height Air-to-Ground Channels in Live LTE Networks. IEEE Antennas Wirel. Propag. Lett. 2019, 18, 2011–2015. [Google Scholar] [CrossRef]
  37. Breslau, L.; Cao, P.; Fan, L.; Phillips, G.; Shenker, S. Web caching and zipf-like distributions: Evidence and implications. In Proceedings of the IEEE INFOCOM’99, Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 21–25 March 1999; pp. 126–134. [Google Scholar]
  38. Rugelj, M.; Sedlar, U.; Volk, M.; Sterle, J.; Hajdinjak, M.; Kos, A. Novel cross-layer QoE-aware radio resource allocation. algorithms in multiuser OFDMA systems. IEEE Trans. Commun. 2014, 62, 3196–3208. [Google Scholar] [CrossRef]
  39. MacQueen, J. Some Methods for Classification and Analysis of Multivariate Observations. Proc. Fifth Berkeley Symp. Math. Cal Stat. Probab. 1967, 1, 281–297. [Google Scholar]
  40. Ouamri, M.A.; Singh, D.; Muthanna, M.A.; Bounceur, A.; Li, X. Performance analysis of UAV multiple antenna-assisted small cell network with clustered users. Wirel. Netw. 2023, 29, 1859–1872. [Google Scholar] [CrossRef]
  41. Alós-Ferrer, C.; Netzer, N. The logit-response dynamics. Games Econ. Behav. 2010, 68, 413–427. [Google Scholar] [CrossRef]
  42. Wu, Q.; Wu, D.; Xu, Y.; Wang, J. Demand-Aware Multichannel Opportunistic Spectrum Access: A Local Interaction Game Approach with Reduced Information Exchange. IEEE Trans. Veh. Technol. 2015, 64, 4899–4904. [Google Scholar] [CrossRef]
  43. Marden, J.R.; Shamma, J.S. Revisiting log-linear learning: Asynchrony, completeness and payoff-based implementation. Games Econ. Behav. 2012, 75, 788–808. [Google Scholar] [CrossRef] [Green Version]
  44. Tatarenko, T. Proving convergence of log-linear learning in potential games. In Proceedings of the 2014 American Control Conference, Portland, OR, USA, 4–6 June 2014; pp. 972–977. [Google Scholar]
Figure 1. The total utility of the system with varying numbers of ground users.
Figure 1. The total utility of the system with varying numbers of ground users.
Drones 07 00465 g001
Figure 2. The total utility of the system with varying numbers of ground users.
Figure 2. The total utility of the system with varying numbers of ground users.
Drones 07 00465 g002
Figure 3. The total utility of system with varying numbers of UAVs.
Figure 3. The total utility of system with varying numbers of UAVs.
Drones 07 00465 g003
Figure 4. Impact of increasing UAVs on coverage ratio.
Figure 4. Impact of increasing UAVs on coverage ratio.
Drones 07 00465 g004
Figure 5. Impact of increasing UAVs on coverage ratio.
Figure 5. Impact of increasing UAVs on coverage ratio.
Drones 07 00465 g005
Figure 6. The total utility of the system with varying numbers of file items.
Figure 6. The total utility of the system with varying numbers of file items.
Drones 07 00465 g006
Figure 7. Impact of increasing file items on coverage.
Figure 7. Impact of increasing file items on coverage.
Drones 07 00465 g007
Figure 8. Impact of increasing UAVs on MOS.
Figure 8. Impact of increasing UAVs on MOS.
Drones 07 00465 g008
Table 1. Comparison of literatures.
Table 1. Comparison of literatures.
ReferenceCooperative Cache StrategyCache in UAVMetricsApproachCandidate Location of UAVsNotes
[22]
One-hop collaborative
User’s service and
probability transmission overhead
Potential gameunknownThe duration of the central UAV’s flight and the costs of communication for real-time information exchange between each service UAV and the central UAV have not been factored in.
[23]××Weighted sum of
file caching and retrieval costs
Swap matching
Greedy algorithm
Lagrange dual
trajectoryOnly consider the single UAV which does not provide service for users.
[24]×MOSDecomposition the optimization problemknownThe coverage has not been considered.
[25]×CDIDecomposition the optimization problemunknownThe joint consideration of cache content and UAV horizontal position has not been taken into account.
[26]×Transmission efficiency and hit rateTrajectory and cache modelunknownCollaborative caching of UAVs could be considered in the future.
[27]×User social attributesMean-field gameunknownThe mean-field game is mainly for a large number of players
[28]×ThroughputBlock alternating descent and successive convex approximationtrajectoryThe joint consideration of cache content and UAV horizontal position has not been taken into account.
[29]×Access delay and cache-hit delayDecomposition the optimization problemtrajectoryCollaborative cache mechanism could be considered in the future.
[30]
One-hop collaborative
Transmission reliability and transmission energy consumption Coalition Formation GameunknownLocally coupling effect between UAVs is not considered.
proposedtwo-hop collaborativeModified MOS and. CoverageDecomposition the optimization problem.
Potential game
unknownPlease refer to the Conclusions and Future Work section for further details.
Table 2. Nomenclature of Variables.
Table 2. Nomenclature of Variables.
SymbolDescription
NNumber of UAVs
INumber of users
hFixed UAV height
HUAV cache capacity
J n Two-hop range neighbors of UAV n
J 1 n One-hop neighbors of UAV n
J 2 n Two-hop neighbors of UAV n
MSize of each file
τ f , n Indicator of whether UAV n caches content f
σ i , n Indicator of the link between UAV and user
d n , i ,   d n , m ,   d n , M B S Distance between UAV and user, UAV and UAV, MBS and UAV
θ i , n , θ n , M B S Elevation angle of UAV-to-User, MBS-to-UAV
P L o s , P N L o s The probability of LoS link and NLoS link connection between UAV n and the ground user UE i
P L o s n , M B S ,   P L o s n , M B S The probability of LoS link and NLoS link connection between MBS and UAV n
P L n , i , P L n , m L o s , P L n , M B S Pathloss of UAV-to-User link, UAV-to-UAV link,
MBS-to-UAV link
  S N R n , i , S N R n , m , S N R n , M B S SNR of UAV-to-User link, UAV-to-UAV link,
MBS-to-UAV link
C n , i , C n , m , C n , M B S Transmission rate of UAV-to-User link, UAV-to-UAV link,
MBS-to-UAV link
D i , n , f Transmission delay
P i , f The probability that user i requests for file f.
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
ParameterValueParameterValue
Target region3 km × 3 km η L o s 1.6 dBm
Altitude h500 m η N L o s 23 dBm
Total bandwidth B 0 20 MHZEnvironmental parameter a9.6177
Learning parameter υ 0.01Environmental parameter b0.28
File size M10 Mlearning parameter0.1
UAV cache capability H30 MUAV minimum safe distance100 m
Carrier frequency f 5 GHZUAV communication
distance
800 m
The MBS’s position ( x M B S , y M B S ) (10,000,10,000) α 1
UAV transmit power 20 dBm β 100
MBS transmit power43 dBmZipf parameter κ 0.6
communication bandwidth B c 20 MHZGaussian Noise σ −80 dBm
Excessive pathloss coeffificient ξ 100Threshold of communication γ t h 0.1
Table 4. Methods comparison about game theory.
Table 4. Methods comparison about game theory.
MethodScene DescriptionMethod VersatilityEquilibrium SolutionCoupling MetricsAction Space ConvergenceComplexity
Reference [22]DetailedGeneralBriefNot consideredSpace coordinates
and cache files
Converged O ( N ) ( O ( C 1 ) + O ( S C 1 N ) + O ( C 2 ) )
Reference
[30]
DetailedGoodDetailedNot consideredChoice of coalitionConverged O ( N ) ( O ( D 1 ) + O ( S D 1 N ) + O ( D 2 ) + O ( D 3 ) )
Proposed ApproachDetailedGoodDetailedConsideredDisplacement in four directions and cache changeConverged O ( N ) ( O ( E 1 ) + O ( S E 1 K ) + O ( E 2 ) + O ( E 3 ) )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bian, Y.; Hu, J.; Wang, S.; Hao, Y.; Liu, W.; Fu, C. Two-Hop Cooperative Caching and UAVs Deployment Based on Potential Game. Drones 2023, 7, 465. https://doi.org/10.3390/drones7070465

AMA Style

Bian Y, Hu J, Wang S, Hao Y, Liu W, Fu C. Two-Hop Cooperative Caching and UAVs Deployment Based on Potential Game. Drones. 2023; 7(7):465. https://doi.org/10.3390/drones7070465

Chicago/Turabian Style

Bian, Yuan, Jianbo Hu, Shuo Wang, Yukai Hao, Wenjie Liu, and Chaoqi Fu. 2023. "Two-Hop Cooperative Caching and UAVs Deployment Based on Potential Game" Drones 7, no. 7: 465. https://doi.org/10.3390/drones7070465

Article Metrics

Back to TopTop