Next Article in Journal
A Heterogeneous Time-Series Soft Actor–Critic Method for Quadruped Locomotion
Previous Article in Journal
Research on Scheduling Return Communication Tasks for UAV Swarms in Disaster Relief Scenarios
Previous Article in Special Issue
Intelligent Queue Scheduling Method for SPMA-Based UAV Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Network Design and Content Deployment Optimization for Cache-Enabled Multi-UAV Socially Aware Networks

1
Communication Research Center, Harbin Institute of Technology, Harbin 150001, China
2
School of Information Science and Engineering, Harbin Institute of Technology, Weihai 264209, China
3
Shandong Provincial Key Laboratory of Marine Electronic Information and Intelligent Unmanned Systems, Harbin Institute of Technology, Weihai 264209, China
4
Key Laboratory of Cross-Domain Synergy and Comprehensive Support for Unmanned Marine Systems, Ministry of Industry and Information Technology, Harbin Institute of Technology, Harbin 150001, China
5
School of Instrumentation Science and Engineering, Harbin Institute of Technology, Harbin 150001, China
*
Author to whom correspondence should be addressed.
Drones 2025, 9(8), 568; https://doi.org/10.3390/drones9080568
Submission received: 8 July 2025 / Revised: 7 August 2025 / Accepted: 11 August 2025 / Published: 12 August 2025

Abstract

Highlights

What are the main findings?
  • Proposes a socially aware multi-UAV network where UAVs with “selfish/selfless” attributes dynamically control cooperation levels to reduce aggregate system delay for edge users while enhancing stability under UAV disconnections and resource allocation under uneven demand.
  • Demonstrates that tuning social parameters N s (selfishness level) and N QoS (QoS strictness) directly balances fairness and efficiency of the socially aware network.
What is the implication of the main finding?
  • Proposes a novel socially aware network architecture which enables seamless transition between ad hoc networks and traditional UAV networks, offering a more adaptable resource allocation solution for real-world deployments with heterogeneous user demands.
  • Identifies a critical trade-off between content diversity and request probability, establishing an efficient method for transforming multi-objective optimization into single-objective optimization and facilitating deeper investigation of the proposed network.

Abstract

Unmanned aerial vehicles (UAVs) with high mobility and self-organization capabilities can establish highly connected networks to cache popular content for edge users, which improves network stability and significantly reduces access time. However, an uneven distribution of demand and storage capacity may reduce the utilization of the storage capacity of UAVs without a proper UAV coordination mechanism. This work proposes a multi-UAV-enabled caching socially aware network (SAN) where UAVs can switch roles by adjusting the social attributes, effectively enhancing data interaction within the UAVs. The proposed network breaks down communication barriers at the UAV layer and integrates the collective storage resources by incorporating social awareness mechanisms to mitigate these imbalances. Furthermore, we formulate a multi-objective optimization problem (MOOP) with the objectives of maximizing both the diversity of cached content and the total request probability (RP) of the network, while employing a multi-objective particle swarm optimization (MOPSO) algorithm with a mutation strategy to approximate the Pareto front. Finally, the impact of key parameters on the Pareto front is analyzed under various scenarios. Simulation results validate the benefits of leveraging social attributes for resource allocation and demonstrate the effectiveness and convergence of the proposed algorithm for the multi-UAV caching strategy.

1. Introduction

In recent years, the rapid development of mobile communication technology and the widespread adoption of smart mobile devices have led to explosive growth in data traffic [1]. To ensure the quality of communication services, future networks urgently need to meet performance demands such as ultra-low latency, ultra-high reliability, ultra-high density, and ultra-high security [2,3]. However, deploying more ground base stations (BSs) is not an ideal solution from a cost perspective. Therefore, caching is considered a technology with the potential to reduce transmission latency in cellular networks [4,5].
In caching networks, small BS caching architectures significantly reduce system latency and increase the number of serviceable users compared to conventional macro BS caching networks [6,7,8,9,10,11]. In [6], a proactive, cooperative caching strategy for a multi-cell network is proposed to meet the demand of the user, effectively reducing the latency of the network. In [7], the authors deploy micro BSs within the traditional BS network to expand its storage space, and utilize macro BSs to control the caching strategies of micro BSs, addressing user requests during different time periods. The work in [8] proposed a two-tier heterogeneous Internet of Things (IoTs) network which simultaneously operates with edge micro BSs and cache-enabled IoT devices to improve the cache hit rate. In [9], the authors consider a two-tier heterogeneous caching network, where the most popular content is cached in the macro BS, and the remaining content is cached randomly in the small BS. To address the randomness of user trajectories, a three-tier network consisting of Macro-BSs, micro-BSs, and pico-BSs is established to maximize the amount of cached content [10]. In [11], the authors focus on a cache-enabled heterogeneous network, where MUs can flexibly schedule their traffic between traditional sub-6 GHz macro cells and dense millimeter-wave small cells. Unfortunately, the fixed location of BSs has some drawbacks. Firstly, serving users with trajectory randomness by deploying more micro BSs will lead to severe resource wastage. Additionally, frequent user handovers between networks must also be considered.
Due to the flexible mobility, cache-enabled unmanned aerial vehicles (UAVs) can dynamically adjust their positions based on the caching needs of specific ground users and intelligently store content according to specific requests [12]. Some recent works focused on the applications of the cache-enabled UAVs [13,14,15,16,17]. The authors in [13] investigated a cache-enabled UAV emergency communication network, where the UAVs are regarded as aerial BSs to assist damaged cellular networks. In [14], an adjustable cache distribution model was developed to support caching in UAV networks. Moreover, the average service success probability of cache placement was studied to evaluate the performance of heterogeneous UAV networks [15]. The work in [16] proposed a layered caching scheme using scalable video coding for cache-enabled multi-UAV networks to balance video content quality and diversity. The aforementioned studies still regarded a single UAV and multiple users within the same jurisdiction as the benchmark unit. This paper refers to it as a traditional UAV caching network. When UAVs could not meet user requirements, they were connected to the BS via direct wireless links. Compared to the BS, nearby available UAVs can provide faster access services. The absence of UAV cooperation may lead to increased latency for uncached content. Therefore, a user-centric cooperation approach for cache-enabled UAV networks was proposed, where a user-centric UAV group is formed for each user to increase cache hit probability, thus reducing latency [17]. However, such a cooperation mechanism did not consider the interaction among UAVs. When the number of UAVs is small, collaborating with dynamically flying UAVs to serve one user might reduce the cache hit probability for others. As a result, it is impossible to guarantee the quality of service (QoS) for users in the jurisdiction of those UAVs. Additionally, a large UAV group could lead to resource dissipation, and uneven distribution of demand and storage capacity might further exacerbate this issue. In a multi-UAV network, considering collaboration to allocate resources reasonably to ensure resource utilization while guaranteeing the QoS for users in the jurisdiction needs to be addressed urgently.
Recently, integrating individual social attributes with device-to-device (D2D) communications has also shown significant application potential for collaboration mechanisms in terrestrial networks [18,19,20]. A network that combines social selfishness with D2D link quality optimization was proposed to enable effective collaboration [18]. However, D2D communication for user caching devices, such as a smartphone, often involves user privacy policies, posing certain risks to overall resource planning in the user layer. Fortunately, UAVs with social attributes are considered public resources. The cached content of UAV does not require the permission of the users in the jurisdiction and is not subject to the privacy agreement. Thus, they possess tremendous potential and should be studied in depth. To the best of our knowledge, developing a multi-UAV network that considers the interaction among UAVs to enhance resource utilization and introduces social attributes to guarantee QoS for users has yet to be investigated in prior research.
To tackle the aforementioned issue, this paper bridges this gap by proposing a cache-enabled multi-UAV socially aware network (SAN), which considers resource utilization and user QoS. In the network, UAVs prioritize connecting to nearby available UAVs to enhance interaction at the UAV layer. Meanwhile, UAVs possess social attributes that enable them to decide whether to assist other UAVs with task offloading. Specifically, UAVs reserve storage space of different sizes according to different social attributes. These storage spaces are integrated into a huge resource pool to optimize and allocate resources uniformly. Among them, “selfish” UAVs with less storage space can only provide less help to other UAVs, while “selfless” UAVs with more storage space can provide more help. The proposed network can be transitioned into an ad hoc network or a traditional cache-enabled UAV network by adjusting the proportion of assistant UAVs, which demonstrates the extremely strong universality of the proposed network. The key contributions of this work are as follows:
  • Novel Socially Aware UAV Network Model: We propose a cache-enabled multi-UAV SAN, where UAVs possess inherent social attributes, providing a novel architecture for controlling cooperation and resource allocation.
  • Comprehensive Multi-Objective Formulation: We formulate the caching deployment as a multi-objective optimization problem (MOOP) that captures the fundamental trade-off between the cached content diversity (a proxy for fairness) and the aggregation of the request probability (RP) (a proxy for efficiency).
  • Advanced Algorithmic Solution: To address this MOOP, we transform it into a form that is easily solvable by the multi-objective particle swarm optimization (MOPSO) algorithm. The Pareto optimal solution set is approximated by establishing the MOPSO algorithm with a mutation strategy for the proposed MOOP.
  • In-depth simulation Evaluation: The simulation demonstrates the substantial advantages of social attributes on the caching resource allocation when demand and storage capacity are not evenly distributed. The gain of constraints imposed by social attributes can promote the diversity of cached content. Furthermore, two approaches—the establishment of a constructor and the adjustment of constraints—are thoroughly examined to balance the objective functions.
The remainder of this paper is organized as follows. Section 2 details the system model of the proposed cache-enabled multi-UAV SAN framework. Section 3 presents the MOPSO with a mutation strategy-based proposed MOOP. Section 4 provides and discusses the simulation results. Finally, Section 5 concludes the paper.

2. System Model

2.1. Cache-Enabled UAV Model

As illustrated in Figure 1, we consider a cache-enabled multi-UAV SAN serving multiple users, where each UAV serves a group of ground users. The number of the UAVs is denoted by M. The number of users served by UAV m is K m , with the set defined as K m = 1 , 2 , , K m . Different from the traditional cache-enabled UAV model, the target UAV is linked to available UAVs nearby prior to the BS when it is unable to fulfill user requests in the proposed network. Each UAV possesses either a “selfish” or “selfless” attribute. The role of each UAV depends on whether the storage resources of the target UAV are sufficient. “Selfish” UAVs must prioritize their own needs, resulting in limited available space. Therefore, it can only provide a small amount of resources to other UAVs. In contrast, “selfless” UAVs prioritize the needs of other UAVs, enabling them to provide more resources. A network comprised entirely of “selfish” UAVs degenerates into the traditional cache-enabled UAV network. Conversely, the network with all “selfless” UAVs is transformed into an ad hoc network. To better discuss the impact of the social attributes of UAVs on networks, this paper assumes that multiple UAVs are flying in a relatively small area, within which they remain within communication range of each other.
All content requests can only be predicted in probabilistic terms [13], and generated through the recommendation algorithm that integrates user preferences [21]. Assuming that the number of content requests of all users connected to UAV m is N m , and its set is represented as N m = 1 , 2 , , N m . The total number of the predicted content is N; its set is N = 1 , 2 , , N . To simplify the design and facilitate understanding, suppose m = 1 m = M N m = N , m = 1 m = M N m = Ø . For all users connected to UAVs, content requests follow Zipf’s law [13]. Thus, the request probability a m j and the normalized request probability a ^ m j of the content j for the UAV m are expressed as
a m j = 1 1 j κ j κ j = 1 N m 1 1 j κ j κ , j N m , m ,
a ^ m n = a m j m = 1 M j = 1 N m a m j = a m j M , m ,
The request matrix r m UAV = r m , 1 UAV , r m , 2 UAV , , r m , N UAV Z 1 × N of the UAV m is expressed as
r m , n UAV = 1 , a ^ m n > 0 , 0 , otherwise .
where content j of the set N m is content n in the set N .
In practice, the size of cached content is different. Therefore, it is necessary to establish a baseline content size. This can be achieved by dividing each cached content into several baseline segments with the same size for storage. In fact, the current data transmission is also conducted by segmenting the content into multiple data packets. Therefore, we assume that the size of each content item is the same. Because of the limited storage capacity of UAVs, the storage capacity can be converted into the quantity of the stored contents, that is L m UAV . Define a caching policy e m = e m 1 , e m 2 , , e m N Z 1 × N , where e m n = 1 means that the UAV m will cache the content n. Therefore, the constraints on the local caching capacity of UAV m can be obtained
n = 1 N e m n L m UAV , m .
Table 1 summarizes the key symbols and their meanings as used in the system model. It defines the notation for the main components, including UAVs, users, and their associated parameters like storage capacity and demand matrices. The table also explains important coefficients that govern network behavior, such as local affinity and QoS.

2.2. Socially Aware Model

The matching quantity of local cached contents and local requests is introduced, reflecting the degree of satisfaction of user requests. The constraint is as
r m UAV · e m min n = 1 N N s r m , n UAV , L m UAV , m ,
where r m UAV · e m represents the dot product of two matrices. When N s = 1 , it means that the UAV must prioritize ensuring its users requests, embodying a “selfish” attribute; when N s 0 , it implies that the UAV can allocate more and more resources to assist other UAVs, having a “selfless” attribute. In practice, when UAVs have a small amount of requested content or a lot of idle storage space, they can be converted into “selfless” UAVs. In different time periods, “selfless” UAVs and “selfish” UAVs can be transformed into each other according to their own idle space. This makes the network extremely risk-resistant. In the SAN, the socially aware coefficient is a pivotal metric to determine whether the data can be exchanged among individuals. According to [19], the socially aware coefficient s m , m UAV and connectivity variable c m , m UAV between UAV m and UAV m are defined as
μ m , m n = 0 , e m n = e m n = 0 , 1 , otherwise .
s m , m UAV = Δ n = 1 N r m , n UAV μ m , m n ,
c m , m UAV = 1 s m , m UAV s ¯ or s m , m UAV s ¯ and m m , 0 otherwise .
The threshold s ¯ can control the strict degree of connectivity among UAVs. In this paper, s ¯ = r m UAV · e m + 1 . Define c m , m UAV = c m , m UAV . Such loose conditions foster the generation of large-scale connectivity. According to (8), the constraints on fulfilling the QoS of the user are delineated as
p m n = 1 , if e m n + m = 1 , m m M c m , m UAV e m n > 0 0 , otherwise . , m , n ,
m = 1 M n = 1 N p m n r m , n UAV min m = 1 M n = 1 N N Q o S r m , n UAV , m = 1 M L m UAV .
where N Q o S represents the proportion of fulfillment of all system requests.

2.3. Problem Statement

Let v n denote the caching policy for content n, such as (11). Consequently, the objective function f 1 : V = n = 1 N v n represents the total amount of distinct contents within the network, where
v n = 1 , m = 1 M e m n 1 , 0 , otherwise .
Maximizing f 1 guarantees the requests of more users. When f 1 N , the diversity of the cache content is maximized, and all requests can be met in the cache network. Simultaneously, maximizing the overall RP of the network (the quantity of contents with the highest RP) is an inevitable outcome of the evolution driven by interests. Imagine a caching network where UAVs are independent of each other and will only evolve in the direction of maximizing profits. Suppose two UAVs with the same requests a 1 , a 2 can only cache one file; will they cache both a 1 to maximize their benefits or will they cache a 1 and a 2 , respectively? However, the latter can benefit more from the collaborative mechanism. An intuitive example of the above situation is the prisoner’s dilemma game. The two UAVs stand for two prisoners, each making the seemingly optimal choice from their own perspective. However, this approach fails to achieve the maximum overall gain. Paradoxically, when the two prisoners cooperate by making decisions that appear suboptimal for their individual interests, they collectively maximize the total gain. Therefore, the objective function f 2 is expressed as
f 2 : I = m = 1 M n = 1 N a ^ m n e m n + m = 1 , m m M c m , m UAV e m n
It is worth noting that f 1 and f 2 can be regarded as the cost function and benefit function of the network, respectively. f 1 and f 2 are mutually conflicting objectives. Increasing content diversity will inevitably crowd out cache space for high-RP content, thereby reducing the overall system gain. Assuming that the RPs of users are known, this paper aims to maximize simultaneously f 1 and f 2 by optimizing the multi-UAV caching strategy e . The MOOP is as follows:
P 1 : max e f 1 : V , f 2 : I
s . t . e m n 0 , 1 , m , n ,
i = 1 n e m n L m UAV , m ,
r m UAV · e m min n = 1 N N s r m , n UAV , L m UAV , m ,
m = 1 M n = 1 N p m n r m , n UAV min m = 1 M n = 1 N N Q o S r m , n UAV , m = 1 M L m UAV .
where (13b) specifies the binary nature of the variables. (13c) indicates that the number of cached items for each UAV cannot exceed its capacity limit. (13d) requires that the cached content on each UAV must satisfy a certain proportion of local demand. (13e) mandates that the total cached content in the system must meet the QoS minimum threshold. This problem enables multiple UAVs to identify the equilibrium point between content diversity and overall system gain under multiple constraints, delivering the optimal UAV deployment as a trade-off solution.

3. Solution Approach

In this section, the caching strategy optimization for multi-UAV SAN is examined. It is intrinsically tough because P1 is a discrete MOOP and an NP-hard problem [19]. Thus, we re-encode the variables and transform P1 into a solvable form that applies to the MOPSO algorithm. A MOPSO algorithm with a mutation strategy based on the Pareto model is proposed to solve P1.

3.1. Problem Transformation

The objective functions and the bivariate variables e are discrete, which results in the non-convexity of P1. To adapt to the MOPSO algorithm, the variables e are transformed into the variables e index , which are a set of e m index . e m index represent the index set of cached contents in UAV m, and their sizes are no greater than L m UAV , assuming that UAV m caches the 1st, 3rd, 5th, and 7th content items in N , e m index = 1 , 3 , 5 , 7 .
Theorem 1.
In P1, the constraint (13c) is a sufficient condition for the constraint u e m index = L m UAV , m . Here, u e denotes the quantity of elements for vector e .
Proof. 
We assume that u e m index < L m UAV . Because V x and I x are incremented within x e m index . Then an uncached content n always exists that makes V e m index V e m index n and I e m index I e m index n . So the solution set e m index n is not inferior to e m index , let e m index e m index n up to u e m index = L m UAV .    □
Theorem 1 states that UAV m can always fetch L m UAV contents, which means that UAV m has C N L m UAV schemes, so we define the mapping Θ : e m i n d e x z ,
Θ e m index z m UAV , z m UAV N m UAV = 1 , 2 , , C N L m UAV , m .
Table 2 summarizes the key symbols and their meanings as used in Section 3. The MOOP P1 can be rewritten as follows:
P 2 : max e index f 1 : V , f 2 : I
s . t . Θ e m index 1 , 2 , , C N L m UAV , m ,
u e m index = L m UAV , m ,
u N m e m index c m , m ,
u m = 1 M e m index N d ,
where d = min N Q o S u N , m = 1 M L m UAV and c m = min L m UAV , N s · u N m in (15e) and (15d), respectively. (15b) specifies that each UAV selects one caching strategy from C N L m UAV alternative strategies. (15c) mandates that the number of cached items per UAV is strictly equal to its capacity limit. (15d) requires that the intersection between cached content and local demand on each UAV must exceed a threshold ratio. (15e) ensures that the intersection between cached content and the total demand of the system satisfies the QoS requirement.

3.2. MOPSO Algorithm with Mutation Strategy

The MOPSO algorithm with a mutation strategy exhibits capabilities in rapid convergence and global optimization. The critical steps of the algorithm are illustrated, including mutation strategy, density estimation, and setting of step size and direction. The detailed process is shown in Algorithm 1.
Algorithm 1: A MOPSO Algorithm with Mutation Strategy for Multi-UAV Caching Strategy.
Phase 1: Initialization
  1.
Set population size N p , max iterations l max , learning factors β 1 , β 2 , inertia weight bounds ω max , ω min , and mutation coefficient ρ mu . Initialize positions z 0 , velocities Y 0 and the external archive A 0 .
Phase 2: Iterative Optimization
  2.
Set iteration counter l 0 .
  3.
repeat
  4.
    for each particle i = 1 , , N p do
  5.
      Update velocity Y i l + 1 based on its inertia, cognitive component (distance to zbest i l ), and social component (distance to gbest l ) via (18).
  6.
      Update position znew i l + 1 by applying the new velocity to the old position via (21).
  7.
    end  O ( N p M )
  8.
    Apply mutation strategy to znew l + 1 to generate zmu l + 1 for population diversity, then select the next generation population z l + 1 . O ( N p )
  9.
    Evaluate the new population z l + 1 by calculating fitness and penalty values. O ( ( N m req + L ) L N p M 2 )
10.
    Update the historical best zbest l + 1 for each particle by comparing its new solution with its previous best. O ( ( N p ) 2 )
11.
    Update the external archive A l + 1 : combine A l with the current population z l + 1 , remove all dominated solutions, and if necessary, use density estimation to prune the archive to its maximum size. Then, select a new gbest l + 1 from A l + 1 . O ( ( N p ) 2 )
12.
    l l + 1 .
13.
until  l l max or the stopping criterion (e.g., convergence) is met.
Phase 3: Output
14.
return The final set of non-dominated solutions stored in the archive A l .
Calculation of penalty function: The penalty function g = g 1 + g 2 guides the population for the constraints in P2. During the execution of the algorithm, the precedence of the penalty function value supersedes that of the fitness function.
g 1 = m = 1 M max 0 , c m u N m e m index ,
g 2 = max 0 , d u m = 1 M e m index N .
Density estimation: In the process of identifying optimal solutions gbes t l within a population, the random selection process may inadvertently lead to individuals who have identical fitness function values predominantly occupying the elite population. Consequently, despite these individuals having a high frequency of occurrence, they may not contribute to the diversity required for effective evolutionary progress. To augment the population diversity, density estimation is employed to select the individuals with the least frequency of fitness function values in the elite population. Thus, the population can constantly explore minorities, thereby avoiding falling into the local optimal solution.
Setting of step size and direction: The selection of step size and direction profoundly affects the convergence speed of the MOPSO algorithm. If the step size is excessively large, it becomes too easy to surpass the optimal solution and results in a solution explosion. Conversely, it will lead to a slow convergence rate and increase the likelihood of falling into the local optimal solution. The velocity Y and position z of the particles are updated as
Y m l + 1 : = ω l Y m l + β 1 λ 1 l z b e s t m l z m l + β 2 λ 2 l g b e s t m l z m l ,
χ l = m = 1 M g b e s t m l z m l m = 1 M g b e s t m l z m l M C N L m UAV 1 M C N L m UAV 1 ,
ω l = ω max ω max ω min · χ l 1 2 ,
z m l + 1 = z m l + Y m l + 1 + C N L m UAV mod C N L m UAV ,
where mod denotes the modular operator. The notation description is detailed in Table 3. Equation (21) illustrates that when the step size exceeds the boundaries of the feasible domain, it is recalibrated through the remainder operation. This mechanism is also a means to prevent the solution from exploding.
Mutation strategy: A mutation strategy is employed to enhance the diversity within the population. During the mutation process, the mutation probability p mu is calculated by the mutation coefficient ρ mu ,
p mu = 1 l 1 l max 1 1 1 ρ mu ρ mu .
This calculation yields the upper and lower bounds of the mutation range. In the mutation process, the mutation operation randomly selects one dimension of a particle and randomly generates a new value for it within the predefined mutation range, while the remaining dimensions of the particle remain unaltered.
Complexity and convergence of Algorithm 1:  N m req is defined as the total amount of user requests for UAV m. The population size is N p . The computational complexity of each step is shown in Algorithm 1. In general, the number of the particles is larger than UAVs, so O N p 2 > O N p M . Meanwhile, O N m req + L L N p M 2 O N p 2 . Thus, the computational complexity of Algorithm 1 is O N m req + L L N p M 2 l max . Refs. [22,23] concluded that the MOPSO algorithm could converge globally to the Pareto optimal solution set by introducing a mutation strategy. The measure ρ A defined the convergence of the algorithm, i.e., lim l D A l = lim l ρ A l ρ Λ 0 . Different from the continuous function in [22], the non-dominated solution set f 1 l , f 2 l is sequentially connected in the lth iteration. Next, the edge points min f 1 l , max f 2 l and max f 1 l , min f 2 l are obtained. Finally, two line segments that start from min f 1 l , max f 2 l and max f 1 l , min f 2 l are perpendicular to the Y-axis and X-axis, respectively. The closed area mentioned above is ρ A l . The generation method for this closed region is also suitable for cases where the non-dominated solution set is a single point.

4. Simulation Results

In this section, numerical results are provided to elaborate the advantages of cache-enabled multi-UAV SAN. We consider a multi-UAV scenario with M = 4 , where user requests N req and storage capacity L are set in different schemes, which is detailed in Table 4. In S1, N s , N Q o S is set as 0 , 0 , 0.3 , 0.5 , and 0.3 , 1 , respectively. We set Algorithm 1 with parameters N p = 200 , β 1 = 0.8 , β 2 = 1.2 , ω max = 1.7 , ω min = 0.1 , ρ mu = 0.8 , and l max = 20 , 000 .
Figure 2 shows the Pareto front approximation of S1. An inverse relationship is observed between f 1 and f 2 . The observation that low RP contents replace the higher leads to an augmentation of diversity, and vice versa. A conventional approach to the compromise between f 1 and f 2 is to establish a constructor
f = η f 1 max f 1 f 1 max f 1 min + 1 η f 2 max f 2 f 2 max f 2 min ,
where η represents the weight coefficient of f 1 and can control whether the system tends towards f 1 or f 2 .
As depicted in Figure 2, the optimal point f 1 * , f 2 * can be calculated by the linear function f f 1 , f 2 and the Pareto optimal solution set. Subsequently, the optimal configuration scheme e * can be obtained. In S1, the Pareto front approximation continues to expand towards higher values as n increases. When the diversity of cached contents remains constant, an increase in cache capacity causes multi-UAV to sequentially cache existing contents from high RP to low RP until the cache limit is reached. This not only augments the total RP but also enhances the connectivity of the network. On the contrary, an increase in cache capacity ensures the storage of more contents when the total RP remains unchanged. It elucidates that enhancements in storage capacity can significantly elevate the gain of the diversity and total RP for the network.
Figure 2 displays that the solution set that satisfies (13d) and (13e) is a subset of the unconstrained solution set in each Pareto front approximation. Relaxing constraint (13d) results in an increase in network connectivity. Conversely, enforcing this constraint leads to a decrease in connectivity. By manipulating the parameter N s , we can effectively balance the risks associated with latency and network stability. The connectivity can serve as a quantifiable metric for assessing these risks. When constraint (13e) is relaxed, the diversity of cached contents will decrease; otherwise, it will increase. In scenarios involving a lower N Q o S , the system can utilize the additional available space to cache existing high RP content, thereby ensuring profitability after satisfying a smaller portion of the content restrictions. This strategy helps to enhance content diversity and profitability while ensuring network performance. In summary, adjusting N s and N Q o S has a significant impact on the connectivity, latency, content diversity, and profitability of the network. The gain of N s and N Q o S jointly promotes the diversity of cached content. Therefore, the method on balancing f 1 and f 2 can also be obtained by adjusting N Q o S and N s . Concurrently, more efficient and reliable solutions can be designed for UAV network systems by optimizing these parameters and constraints.
Figure 3 displays the Pareto front approximation of S2, S3, and S4. In S2, N req completely exceeds L as n increases, resulting in a continual contraction of the Pareto front toward smaller values. When N req < L , the UAVs have the idle space after fulfilling diversity requirements. The idle space will cache contents with higher RP until the space is fully occupied. As N req exceeds L , the UAVs must abandon some low RP contents to prioritize the total RPs. This leads to the contraction of the Pareto front. It is worth noting that the social attributes make the storage space of multi-UAV a cohesive entity, which transforms the relationship between N req and L into the relationship between the aggregate quantity of request contents m M N req m and total storage space m M L m . In fact, the various relationships between N req m and its corresponding L m simultaneously exist in a network, as in S3. The UAV social network can adjust the overall storage space to mitigate resource scarcity among other UAVs. Comparing S3 with S4, the benefits of networks devoid of social attributes diminish significantly. Since the UAVs only rely on local content to serve the users within their jurisdiction, it reduces the total profit of the network.
Figure 4 illustrates the impact of parameter N Q o S on overall network performance. To demonstrate the advantages of social attributes, we compare the proposed UAV SAN with conventional UAV networks in [13,15]. In the SAN, the total system RP decreases as N Q o S increases, consistent with trends in Figure 2. The system must maintain a minimum cached content number to preserve network connectivity for RP maximization, resulting in stable RP during low N Q o S phases. As n increases, RP gradually declines—aligning with Figure 2. Critically, SAN consistently achieves higher RP than conventional networks due to the latter’s isolated UAV layers that cannot cooperatively cache high-RP content. Increasing N Q o S reduces unconstrained storage space, forcing systems to deprioritize high-RP content for low-RP items. Notably, in both S2 and S3 schemes, SAN’s RP strictly dominates conventional networks.
Figure 5 characterizes the impact of N s on network performance. Increasing N s compresses unconstrained storage space, weakening network connectivity and driving a decline in total system RP. At maximum N s , RP of SAN converges with conventional networks under demand-uniform scenarios, indicating that SAN degenerates to conventional networks when devices operate in absolute selfishness states. As n rises, resource scarcity forces systems to prioritize high-RP content over low-RP items, further reducing RP. Crucially, in S3 (demand-maldistributed scenarios), UAV storage limitations prevent full selfishness, resulting in total RP of SAN superiority over conventional networks.“Selfish” UAVs prioritize their own demands at the expense of overall system gain. An increase in such “selfish” UAVs diminishes the collective resource pool and causes severe network degradation. Ultimately, all nodes lose interaction capability, resulting in catastrophic resource wastage.
Figure 6 presents the total system RP under UAV disconnection scenarios. To demonstrate the stability advantages of SAN, we simulate scenarios with exactly one UAV disconnecting at a probability P uav . P uav is defined as probability of disconnection. Results show that greater UAV storage capacity reduces disconnection impact—i.e., storage sufficiency directly enhances network robustness. Crucially, UAV SAN maintains significantly higher RP than conventional UAV networks after post-disconnection, confirming its superior stability.
Figure 7 and Figure 8 compare delay performance across micro BS networks [6,7], UAV networks [13,15], and the proposed UAV SAN. Simulation parameters are specified in Table 5. Comparing S3 and S5, the severely maldistributed demand (S5) increases system delay because high-demand content must be fetched from distant micro BSs and neighboring UAVs, extending communication paths and amplifying delay. In both S3 and S5, UAV networks significantly outperform micro BSs in maximum access delay and aggregate system delay. Crucially, UAV SAN further reduces both delay metrics through its integrated social architecture.
Figure 9 reveals the convergence of S1. The convergence curves of n = 3 , 4 converge before 2000 iterations, while the curve of n = 5 converges around 7000 iterations. The increase in n significantly broadens the feasible range, which leads to a decrease in convergence speed. Figure 10 demonstrates that the MOPSO algorithm exhibits significantly stronger convergence than the matching method. While the greedy algorithm achieves rapid convergence, its substantial computational overhead per iteration leads to a notable increase in overall runtime. Moreover, increasing the population size accelerates the convergence of the MOPSO algorithm.

5. Conclusions

In this paper, we addressed the pressing challenge of optimizing resource allocation in cache-enabled multi-UAV networks, where imbalances in user demand and storage capacity can degrade performance. We introduced a novel cache-enabled multi-UAV socially aware network (SAN) that incorporates “selfish” and “selfless” social attributes to intelligently control the degree of cooperation among UAVs. To balance the competing goals of network-wide efficiency and fairness to user groups, we formulated the caching deployment strategy as a multi-objective optimization problem (MOOP), aiming to simultaneously maximize the aggregated request probability (a proxy for QoS) and the diversity of cached content (a proxy for fairness). The MOPSO algorithm demonstrates superior convergence speed and enhanced exploration capability in 10-objective problems compared to other metaheuristics (e.g., NSGA-II). Furthermore, through the problem transformation proposed in this paper, it effectively reduces the feasible region relative to conventional binary encoding schemes, thereby substantially lowering computational complexity. Confronting the NP-hard nature of this discrete MOOP, we designed an effective solution based on a Multi-Objective Particle Swarm Optimization (MOPSO) algorithm, enhanced with a mutation strategy to ensure population diversity and prevent premature convergence to local optima. The algorithm efficiently approximates the Pareto optimal front, offering network operators a valuable set of optimal trade-off solutions rather than a single, rigid operating point.
The simulation results validated the efficacy of our approach and yielded several key insights. Firstly, the introduction of the social awareness mechanism provides a significant performance gain over traditional, non-cooperative caching schemes, particularly in realistic scenarios with uneven distributions of user requests and storage resources. By enabling collaboration, the framework allows the collective storage of all UAVs to be utilized as a cohesive whole, effectively mitigating localized resource shortages. Secondly, our results confirmed the fundamental trade-off between maximizing content diversity and total request probability, demonstrating the validity of the MOOP formulation. Finally, we demonstrated that the social constraint parameters, N s and N Q o S , serve as effective tools for tuning network behavior, allowing for a deliberate balance between fairness and efficiency to meet diverse operational requirements. N s determines the priority level of UAV cells, while N Q o S governs the priority of the entire macro zone. Thus, the configuration of N s and N Q o S is traffic-dependent. In high-traffic venues (e.g., stadiums), both N s = 1 and N Q o S = 1 can be set to prioritize user demands in cells and macro zones. During low-traffic periods, N s and N Q o S can be reduced to release resources for neighboring cells and macro zones. The convergence of the proposed algorithm was also verified, confirming its robustness and suitability for this complex optimization task.

Author Contributions

Conceptualization, Y.Z. and J.W.; methodology, Y.Z.; software, Y.Z.; validation, G.C., S.Y., C.W. and Z.Z.; formal analysis, Y.Z.; investigation, Y.Z.; resources, G.W. and J.W.; data curation, G.C. and S.Y.; writing—original draft preparation, Y.Z.; writing—review and editing, J.W. and G.W.; visualization, Y.Z.; supervision, J.W. and G.W.; project administration, J.W.; funding acquisition, J.W. and G.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (No. U23A20336), the Research Project No. JCKY2023603C029 and the Major Scientific and Technological Innovation Project of Shandong Province of China (No. 2022ZLGX04, 2021ZLGX05), and the National Key Research and Development Program of China (No. 2023YFC3107501).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Zhang, X.; Lv, T.; Ren, Y.; Ni, W.; Beaulieu, N.C.; Guo, Y.J. Economical Caching for Scalable Videos in Cache-Enabled Heterogeneous Networks. IEEE J. Sel. Areas Commun. 2019, 37, 1608–1621. [Google Scholar] [CrossRef]
  2. Rui, L.; Song, D.; Chen, S.; Yang, Y.; Yang, Y.; Gao, Z. Content Collaborative Caching Strategy in the Edge Maintenance of Communication Network: A Joint Download Delay and Energy Consumption Method. IEEE Trans. Parallel Distrib. Syst. 2022, 33, 4148–4163. [Google Scholar] [CrossRef]
  3. Jia, S.; Wang, R.; Lou, Y.; Wang, N.; Zhang, D.; Singh, K.; Mumtaz, S. Secrecy Performance Analysis of UAV-Assisted Ambient Backscatter Communications with Jamming. IEEE Trans. Wirel. Commun. 2024, 23, 18111–18125. [Google Scholar] [CrossRef]
  4. Pervej, M.F.; Jin, R.; Lin, S.-C.; Dai, H. Efficient Content Delivery in User-Centric and Cache-Enabled Vehicular Edge Networks with Deadline-Constrained Heterogeneous Demands. IEEE Trans. Veh. Technol. 2024, 73, 1129–1145. [Google Scholar] [CrossRef]
  5. Zhu, Q.; Zheng, J.; Jamalipour, A. Coverage Performance Analysis of a Cache-Enabled UAV Base Station Assisted Cellular Network. IEEE Trans. Wirel. Commun. 2023, 22, 8454–8467. [Google Scholar] [CrossRef]
  6. Mehrizi, S.; Chatterjee, S.; Chatzinotas, S.; Ottersten, B. Online spatiotemporal popularity learning via variational bayes for cooperative caching. IEEE Trans. Commun. 2020, 68, 7068–7082. [Google Scholar] [CrossRef]
  7. Gao, S.; Dong, P.; Pan, Z.; Li, G.Y. Reinforcement learning based cooperative coded caching under dynamic popularities in Ultra-Dense networks. IEEE Trans. Veh. Technol. 2020, 69, 5442–5456. [Google Scholar] [CrossRef]
  8. Zhang, S.; Liu, J. Optimal probabilistic caching in heterogeneous IoT networks. IEEE Internet Things J. 2020, 7, 3404–3414. [Google Scholar] [CrossRef]
  9. Cui, Y.; Jiang, D. Analysis and optimization of caching and multicasting in Large-Scale Cache-Enabled heterogeneous wireless networks. IEEE Trans. Wirel. Commun. 2016, 16, 250–264. [Google Scholar] [CrossRef]
  10. Li, X.; Wang, X.; Li, K.; Han, Z.; Leung, V.C.M. Collaborative Multi-Tier Caching in heterogeneous networks: Modeling, analysis, and design. IEEE Trans. Wirel. Commun. 2017, 6, 6926–6939. [Google Scholar] [CrossRef]
  11. Zhao, J.; Zhao, S.; Qu, H.; Ren, G.; Shi, Y. Analysis and optimization of probabilistic caching in Micro/Millimeter wave hybrid networks with dual connectivity. IEEE Access 2018, 6, 72372–72380. [Google Scholar] [CrossRef]
  12. Muslih, H.; Kazmi, S.M.A.; Mazzara, M.; Baye, G. Cache Sharing in UAV-Enabled Cellular Network: A Deep Reinforcement Learning-Based Approach. IEEE Access 2024, 12, 43422–43435. [Google Scholar] [CrossRef]
  13. Fan, C.; Zhou, X.; Zhang, T.; Yi, W.; Liu, Y. Cache-Enabled UAV Emergency Communication Networks: Performance Analysis with Stochastic Geometry. IEEE Trans. Veh. Technol. 2023, 72, 9308–9321. [Google Scholar] [CrossRef]
  14. Tang, W.; Zhang, H. A Tunable Caching Distribution Model for Unmanned Aerial Vehicle Networks. IEEE Internet Things J. 2022, 9, 8646–8656. [Google Scholar] [CrossRef]
  15. Ji, J.; Zhu, K.; Niyato, D.; Wang, R. Probabilistic Cache Placement in UAV-Assisted Networks with D2D Connections: Performance Analysis and Trajectory Optimization. IEEE Trans. Commun. 2020, 68, 6331–6345. [Google Scholar] [CrossRef]
  16. Zeng, B.; Zhan, C.; Xu, C.; Liao, J. Caching and 3D Deployment Strategy for Scalable Videos in Cache-Enabled Multi-UAV Networks. IEEE Trans. Veh. Technol. 2023, 72, 14875–14888. [Google Scholar] [CrossRef]
  17. Tang, W.; Zhang, H.; Peng, J. Performance Analysis of Cooperative Caching and Transmission Diversity in Cache-Enabled UAV Networks. IEEE Trans. Wirel. Commun. 2024, 23, 4411–4423. [Google Scholar] [CrossRef]
  18. Long, H.; Xu, C.; Zheng, G.; Sheng, Y. Socially-Aware Energy-Efficient Task Partial Offloading in MEC Networks with D2D Collaboration. IEEE Trans. Green Commun. Netw. 2022, 6, 1889–1902. [Google Scholar] [CrossRef]
  19. Fu, Y.; Salaün, L.; Yang, X.; Wen, W.; Quek, T.Q.S. Caching Efficiency Maximization for Device-to-Device Communication Networks: A Recommend to Cache Approach. IEEE Trans. Wirel. Commun. 2021, 20, 6580–6594. [Google Scholar] [CrossRef]
  20. Wu, D.; Li, J.; He, P.; Cui, Y.; Wang, R. Social-Aware Graph-Based Collaborative Caching in Edge-User Networks. IEEE Trans. Veh. Technol. 2023, 72, 7926–7941. [Google Scholar] [CrossRef]
  21. Yu, J.; Yin, H.; Li, J.; Gao, M.; Huang, Z.-L.; Cui, L.Z. Enhancing Social Recommendation with Adversarial Graph Convolutional Networks. IEEE Trans. Knowl. Data Eng. 2022, 34, 3727–3739. [Google Scholar] [CrossRef]
  22. Hu, L.; Yang, Y.; Tang, Z.; He, Y.; Luo, X. FCAN-MOPSO: An Improved Fuzzy-Based Graph Clustering Algorithm for Complex Networks with Multiobjective Particle Swarm Optimization. IEEE Trans. Fuzzy Syst. 2023, 31, 3470–3484. [Google Scholar] [CrossRef]
  23. Xu, G.; Luo, K.; Jing, G.; Yu, X.; Ruan, X.; Song, J. On Convergence Analysis of Multi-Objective Particle Swarm Optimization Algorithm. Eur. J. Oper. Res. 2020, 286, 32–38. [Google Scholar] [CrossRef]
Figure 1. System model of a cache-enabled multi-UAV SAN.
Figure 1. System model of a cache-enabled multi-UAV SAN.
Drones 09 00568 g001
Figure 2. The Pareto front approximation of S1 and the corresponding constructor for η .
Figure 2. The Pareto front approximation of S1 and the corresponding constructor for η .
Drones 09 00568 g002
Figure 3. The Pareto front approximation of of S2, S3, and S4.
Figure 3. The Pareto front approximation of of S2, S3, and S4.
Drones 09 00568 g003
Figure 4. Impact of QoS coefficient N Q o S on SAN across demand scenarios ( N s = 0 ).
Figure 4. Impact of QoS coefficient N Q o S on SAN across demand scenarios ( N s = 0 ).
Drones 09 00568 g004
Figure 5. Effect of local content affinity N s on SAN under varying demand schemes ( N Q o S = 0 ).
Figure 5. Effect of local content affinity N s on SAN under varying demand schemes ( N Q o S = 0 ).
Drones 09 00568 g005
Figure 6. Comparative resilience analysis of UAV SAN vs. conventional UAV networks [13,15] under disconnection scenarios ( N s = 0 , P uav = 0.5 ).
Figure 6. Comparative resilience analysis of UAV SAN vs. conventional UAV networks [13,15] under disconnection scenarios ( N s = 0 , P uav = 0.5 ).
Drones 09 00568 g006
Figure 7. Aggregate system delay comparison of Micro BS networks [6,7], UAV networks [13,15], and the proposed UAV SAN across demand scenarios.
Figure 7. Aggregate system delay comparison of Micro BS networks [6,7], UAV networks [13,15], and the proposed UAV SAN across demand scenarios.
Drones 09 00568 g007
Figure 8. Maximum access delay performance of Micro BS networks [6,7], UAV networks [13,15], and the proposed UAV SAN under different demand distributions.
Figure 8. Maximum access delay performance of Micro BS networks [6,7], UAV networks [13,15], and the proposed UAV SAN under different demand distributions.
Drones 09 00568 g008
Figure 9. The convergence curve of measure ρ A for S1.
Figure 9. The convergence curve of measure ρ A for S1.
Drones 09 00568 g009
Figure 10. The convergence curve of measure ρ A for different algorithms.
Figure 10. The convergence curve of measure ρ A for different algorithms.
Drones 09 00568 g010
Table 1. Explanation of symbols in the system model.
Table 1. Explanation of symbols in the system model.
SymbolMeaning
M , K , K m The number of UAVs, users, and users served by the m-th UAV
L m UAV The storage capacity limit of UAV m
a ^ m j ,The RP of the content j for the UAV m
r m UAV The demand matrices of UAV m
e m The caching strategy of UAV m
N s Local content affinity of UAV
s UAV The social awareness coefficient matrices of UAV
c UAV The connectivity matrices of UAV-UAV
N Q o S Quality of Service coefficient
VThe diversity of the content
IThe total RP of the system
Table 2. New notation description of Section 3.
Table 2. New notation description of Section 3.
NotationDescription
e m index The index set of cached contents in UAV m
u e The quantity of elements for vector e
c m Local demand constraint for UAV m
dQoS guarantee constraint for the system
gThe penalty function
Table 3. Notation description of the MOPSO algorithm.
Table 3. Notation description of the MOPSO algorithm.
NotationDescription (The mth Dimension in the lth Iteration)
Y m l , z m l , ω l Velocity, position, and inertia weight of particles
β 1 , β 2 Individual learning factors, social learning factors
λ 1 l , λ 2 l Random numbers with normal distribution
z b e s t m l Historical optimal solution
g b e s t m l Population optimal solution
ω max , ω min Maximum inertia weight, minimum inertia weight
ρ mu Coefficient of mutation
N p Population size
l max Max iterations
Table 4. Different schemes of user requests and storage capacity.
Table 4. Different schemes of user requests and storage capacity.
SchemeDescription
Scheme 1 (S1) L m UAV = N m req = n , m , and n is 3, 4, and 5 respectively
Scheme 2 (S2) L m UAV = 4 , N m req = n , m , and n is 3, 4, and 5 respectively
Scheme 3 (S3) L m UAV = 4 , m , N m req = [ 5 , 3 , 6 , 2 ]
Scheme 4 (S4)S3 without social mechanism
Scheme 5 (S5) L m UAV = 4 , m , N m req = [ 7 , 1 , 7 , 1 ]
Table 5. Parameters configuration for delay calculation.
Table 5. Parameters configuration for delay calculation.
ParameterValueParameterValue
Transmit power of UAV1 WTransmit power of Micro BS1 W
Content size500 MBBandwidth100 MHz
Noise power−110 dBmRice factor0.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zou, Y.; Wang, G.; Chen, G.; Wang, J.; Yu, S.; Wang, C.; Zhou, Z. Network Design and Content Deployment Optimization for Cache-Enabled Multi-UAV Socially Aware Networks. Drones 2025, 9, 568. https://doi.org/10.3390/drones9080568

AMA Style

Zou Y, Wang G, Chen G, Wang J, Yu S, Wang C, Zhou Z. Network Design and Content Deployment Optimization for Cache-Enabled Multi-UAV Socially Aware Networks. Drones. 2025; 9(8):568. https://doi.org/10.3390/drones9080568

Chicago/Turabian Style

Zou, Yikun, Gang Wang, Guanyi Chen, Jinlong Wang, Siyuan Yu, Chenxu Wang, and Zhiquan Zhou. 2025. "Network Design and Content Deployment Optimization for Cache-Enabled Multi-UAV Socially Aware Networks" Drones 9, no. 8: 568. https://doi.org/10.3390/drones9080568

APA Style

Zou, Y., Wang, G., Chen, G., Wang, J., Yu, S., Wang, C., & Zhou, Z. (2025). Network Design and Content Deployment Optimization for Cache-Enabled Multi-UAV Socially Aware Networks. Drones, 9(8), 568. https://doi.org/10.3390/drones9080568

Article Metrics

Back to TopTop