Next Article in Journal
Long-Wavelength Luminescence of InSb Quantum Dots in Type II Broken-Gap Heterostructure
Next Article in Special Issue
Unmanned-Aircraft-System-Assisted Early Wildfire Detection with Air Quality Sensors
Previous Article in Journal
Development and Assessment of an Indoor Air Quality Control IoT-Based System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing

1
Institute of Computing, Kohat University of Science and Technology, Kohat 26000, Pakistan
2
Secure Cyber Systems Research Group (CSCRG), Warick Manufacturing Group, University of Warwick, Coventry CV4 7AL, UK
3
Integrated Management Coastal Research Institute, Universitat Politecnica de Valencia, Camino Vera s/n, 46022 Valencia, Spain
*
Authors to whom correspondence should be addressed.
Electronics 2023, 12(3), 607; https://doi.org/10.3390/electronics12030607
Submission received: 21 November 2022 / Revised: 18 January 2023 / Accepted: 19 January 2023 / Published: 26 January 2023

Abstract

:
It has been observed that the use of UAVs in search and rescue (SAR) operations is very advantageous. When, all of a sudden, a crisis strikes, UAV technology is incredibly helpful and works more effectively to identify the entire region of a disaster and identify victims trapped in the region. The deployment of a UAV network with a high battery lifespan and complete coverage of the disaster region is the primary emphasis of this article. For the efficient communication of UAVS, we suggested the intelligent cluster-based multi-unmanned aerial vehicle (ICBM-UAV) protocol. In order to discover victims swiftly and rescue those who are trapped in the afflicted region as soon as possible, ICBM-UAV uses the clustering technique smartly, which helps conserve drone batteries and performs some of the useful computations within the CH and hence helps to lessen workload on network congestion. Dividing the CMBM-UAV into two parts, the information gathering and the user equipment location identification, improves network life and makes the search and rescue operation more efficient and successful. After going to through vigorous result calculation, it is deduced that the proposed scheme has outperformed the existing state-of-the-art protocols such as AODV, OSLR and flocking mechanisms in terms of throughput, PDR, and coverage area probability by considering each scenario with and without the presence of obstacles. Hence, by delivering an exploitable estimate before reaching the victim, the proposed approach could drastically minimize the search and rescue time to save valuable lives.

1. Introduction

In recent years, both industrialized and developing nations have shown a great deal of interest in the use of unmanned aerial vehicles (UAVs) for environmental protection, emergency assistance, catastrophe monitoring, border surveillance, and rescue missions [1]. Drones were initially only utilized in military activities [2]. However, research academia and industries in a variety of sectors such as filmmaking, news broadcasting, civil application, and various rescuing services regarding disaster management have been putting a lot of emphasis to the features of UAVs, such as building aerial communication networks, small volume, mobility, low overhead communication, monitoring, and scanning [3,4,5]. UAVs can easily and effectively obtain awareness of situations on the ground. Even in locations without network infrastructure, UAVs can provide surveillance [4]. Quality of service (QoS) provisioning in UAV-assisted communication is a difficult study topic in aerial ad hoc network systems [6,7]. When a natural disaster (damaging a large area) such as an earthquake, flood, or storm occurs, multi-UAVs are used to complete a complex mission. Multi-UAVs are launched, execute some operations to gather proof of the presence of disaster victims, and then communicate the acquired data to the base station or the ground rescue team. In a crisis scenario, the primary goal of this paper is to assist the rescue team in rescuing victims. In order to achieve maximum protection of the victims by leveraging UAVs technology, the drone integration pilot project has been launched in the USA [8].
Disaster is a terrible problem, either natural or artificial, for any country. A minor delay in a disaster leads to the loss of many precious lives. Natural disasters, such as hydrological, meteorological geophysical, hydrological, and climatological, always cause tremendous unpredictable loss of life and damage to property. In the post-disaster phase, whenever a disaster occurs, it damages large areas due to not identifying the total affected area. In a disaster scenario, it is a very difficult task for the rescue team to provide rescue services; as well as it identifying the populated area in a disaster, it is also hard for rescue teams to reach there on time without knowing the condition of the area. On the other hand, UAVs having a flying nature, fast strong mobility, low communication overhead, small volume, communication technology, and computing capabilities also mean that they are a suitable alternative candidate to play an important role in times of disaster. Their scanning capabilities help in identifying the affected area and their monitoring capabilities also provide and show the live condition of the area [9].
The efficient and fastest awareness of disaster scenarios can easily be achieved by UAVs. Single UAVs often fail to fulfill the requirements of complicated missions because the disaster may occur on a large scale. The multi-UAVs communication system played an effective role in addressing the above issues. UAVs’ communication is effective in such scenarios where the multi-UAVs and various models are used for communication, as well as to avoid collision between the UAVs [10]. Identifying the exact location of the victim at the time of disaster can be carried out proficiently by the UAVs. Scanning the area through UAVs and detecting any user equipment capable of aerial communication, tracing the location, and providing communication on the spot can be carried out by UAVs [11].
Our goal in this work is to provide a useful scanning and rescue technique. Recent research can also be divided into three categories. In the first layer, certain studies are primarily concerned with the deployment of UAVs in dangerous areas in order to maximize drone connectivity and forge solid connections. To maximize network connectivity, they primarily concentrate on UAVs’ network topology. However, they did not take into account the ground user equipment. They exclusively concentrate on creating protocols that can accommodate the UAV network’s primary requirements, which include high mobility, dynamic topology, intermittent connectivity, power limits, and variable link quality. Second, many studies concentrated on UAV applications that either tracked or targeted ground equipment, but the UAVs lacked cooperation since they employed sensors to detect their target ground user equipment before tracking it. However, no consideration is given to UAVs and target equipment communicating. Researchers in the third category concentrated on the ground or aerial base station that serves the user equipment that is located on the ground. The base station connects to and manages UAVs. The UAVs’ ability to communicate with one another is not taken into account. For controlling and deploying UAVs in disaster or afflicted areas, multiple controllers are also deployed at once. A controller can connect the UAVs’ network to other networks and communicate with at least one UAV to transfer control packets.
In this research, we proposed a communication protocol called intelligent cluster-based multi-unmanned aerial vehicle (ICBM-UAV) to get beyond the aforementioned restrictions. The ICBM-UAV protocol has three different modes of communication; base station (BS) comes first, followed by user equipment (UE), then drone (UAV). For an effective survey of the ground and detection of the user equipment, a protocol scenario where there is a significant number of user equipment in the ground was taken into consideration. The suggested work is separated into two sections: first, the scanning part, in which a UAV scans the area and marks or identifies the precise location of the smart devices; second, the part in which base station information is provided; the last section offers communication through UAVs throughout the entire damage area. One CH (cluster head) is made up of an average of every five drones in the proposed protocol, which allows for effective communication.
The remainder of this paper is organized as follows. Section 2 introduces the literature review of a different model of the UAV-based search and rescue model in various situations. In Section 3, the proposed algorithm and the hovering positions for the UAVs based on different creation of cluster searching strategies are described. Section 4 presented the simulation results, and Section 5 concludes the paper.

2. Literature Review

This section reviews the literature works on the deployment of UAVs and maximizes the coverage of the UAVs’ network. Furthermore, the extensive literature provides the study of the various proposed methodology used for the deployment of drones, maximizing the coverage, and the various techniques used for identifying the object (car, user equipment, etc.) on the ground.
Minaeian S et al. [2] developed a system for UAVs to assist the SAR mission after the occurrence of a disaster. In one single flight, the UAV system acquits the geo-information and searches information with the help of various sensors. They present an algorithm for target identification with the ability of self-adapting threshold.
Alotaibi ET et al. [3] had discussed various strategies for searching based on the greedy heuristic, partially observable decision process, and potential-based algorithm to design the control of several UAVs. They make sure to extract as much information as they can from the search activity. Barritt et al. [9] discussed the aerial network communication application based on SDN communication to the direct user and connectivity of backhaul. Scientia et al. [10] proposed architecture of SDN-based UAV network using multiple radio technologies such as LET and IEEE 802.11. Zhao et al. [11] discussed the caching-based mechanism work that showed how UAVs worked cooperatively with the base stations helping in the delivery of video in the dense networks. The UAVs and base station deliver and store the content at an off-peak time, reducing the backhaul pressure.
Cheng et al. [12] proposed the scheme-optimizing trajectory of unmanned aerial vehicles by providing various adjacent base stations for offloading data. An iterative algorithm is also proposed for solving the problem by optimizing the edge user scheduling.
Rosario et al. [13] proposed their work by providing a UAV relay service to transmit high-quality live streaming. Ming Chen et al. [14] suggested a flocking model for UAVs based on biological studies, which assisted in avoiding collisions. The proposed flocking model employs highly intelligent, autonomous UAVs with real-time UAV control. The flocking algorithm is implemented using commercial equipment, and Wi-Fi-based positioning and communication is suggested for the UAV flocking network. They proposed a distributed flocking strategy in which UAVs use a boids model [15] to autonomously change their position. UAVs may detect adjacent flight information and modify their position within a specific range. They also exhibit separation, cohesion, and alignment behaviors. The follower must adjust autonomously depending on the pertinent received information, according to the distributed flocking model; the essential idea of the DFM is that when the follower is too close to the leader, it should fly away from it. When the follower is far away, it should fly toward the leader. When the distance between the leader and the follower changes, the follower must keep the same pace and distance from the leader. Cohesiveness can be avoided by adhering to these guidelines.
Jin Chen et al. [16] proposed a multi-UAV coverage deployment model based on the energy-efficient network communication in UAVs. Energy is the major problem in the UAVs; addressing this problem, their model was introduced, which is further divided into two steps coverage maximization and power control: both proved EPG (exact potential game) and NE (Nash equilibrium) point. The deployment of an energy-efficient algorithm can guarantee coverage maximization and power control.
H. Duan [17] proposed the game-theoretic approach for multi-unmanned aerial vehicle searching and surveillance cooperatively and formulated the constrained set of actions for vehicles for preparation of deployment calculation. From the game-theoretic, the interaction of multi-UAVs can be studied effectively, which helps in providing the theoretical support for relevant methods optimized in UAV networks.
Boyang Li et al. [18] designed and implemented the relay control protocol. They created ground station control software to help with the relay system. They ran the test in two scenarios: inside and outdoor. Their effort was primarily focused on delivering communication relays via a single drone (node). Zhan et al. [19] discussed the work based on the algorithm that helped relay the network base station and the ground terminals. These works help in optimizing the relay system performance. Cetin et al. [20] proposed the novel dynamic approach for maintaining the communication for vehicles in long-range relay communication infrastructure. The artificial potential was their base for path planning.
Guo et al. [21] analyzed the use of UAVs for providing relay services for cellular networks. The throughput and ping of the upload and download were tested in both the rural and urban environments. Haitao Zhao et al. [22] developed two techniques for distinct scenarios in their work: centralized deployment and dispersed motion. The information of the UE on the ground is already known in a centralized algorithm, which aids in the deployment of the minimum number of UAVs in that area, whereas in a distributed algorithm, the UAVs take flight toward the area on demand, control their motion, and also find the UE on run time, which aids in the on-demand coverage problem. However, in both instances, the algorithm is designed to keep the UAV networks connected.
The two network techniques presented by Haole Chen et al. [23] are for maximizing communication and network efficiency. They employ the greedy method to locate the hovering spot in the area. They separated the global optimization problem into sub problems, and the solution to each subgroup problem was derived using the range determination approach. Multiple UAVs may collaborate to build a UAV network (UAVNet) to execute tasks more efficiently and economically than a single UAV.
J. Yoon et al. [24] proposed a method to gather the information of the network from the air about delay-sensitive data. In the context of UAVs’ usage, some recent studies have designed optimal path planning using a UAVs. Arzamendia et al. [25] aimed to solve a traveling salesman problem for environmental monitoring based on a genetic algorithm that calculated fitness functions to maximize coverage. Devaurs et al. [26] conducted substantial research on the problem of path planning and space exploration. Although most of them were designed to reduce duplicate coverage across agents, they cannot be immediately transferred to the UAV context because networking capability and lightweight computation are not taken into account. Through their ad hoc deployment, UAVs can be employed as suitable communication resources to quickly rejoin separated networks. UAVs can help to solve the network hole problem by acting as temporary relay nodes [20,21].
Zhang et al. [27] proposed using an unmanned surface vehicle (USV) and an UAV to provide rescue services in a flooded area. The USV transports the UAVs to the spot, obtains information, and assists the survivors. USV is in charge of gathering environmental information using a laser and a camera, and with such capabilities, USV can generate a map and provide rescue materials to catastrophe victims. The combination of USV with UAVs allows the USV to obtain general area information for path planning while also being capable of designing a local path using its local information.
In [28], focused on network and communication technologies that can aid drone disaster management and early warning systems, SAR operations, data collection, and emergency communication and network provision. Their report also investigated network technologies that play a crucial role in drone deployment during disaster management. The author also discusses the design and difficulties (antenna structure, drone cooperation, path planning, channel modelling disaster areas, and energy efficiency).
Yanmaz et al. [29] presented a cooperative air-borne system of unmanned aerial vehicles (UAVs) with high-level architecture to test their capabilities in disaster SAR operations and aerial surveillance. In addition, the author discusses certain crucial aspects in the UAV network system (sensing, coordination, and communication modules). The primary goal of the research was to support and assist firefighters in times of catastrophe, to give real-time video streaming, and to expand coverage capabilities to support the SAR mission.
M. Erdelj et al. [30] proposed forecasting, response, and evaluation of inland flooding systems. The proposed architecture enables multi-UAV dependability and security, as well as a UAV remote control system for usage with the smart cell and UAV infrastructure on-demand. Matias et al. proposed a flying real-time network (FRTN) [31] for connecting the field’s deployed static and mobile devices via flying units. Given the time constraints, the proposed network sends signals from the field to the incident commander and from the incident commander to the field. They also talk about digital communication in SAR missions using UAVs during the initial reaction to natural disasters.
In [32], Ruetten et al. proposed a search and rescue scheme by using a genetic algorithm for the UAV swarm. For optimizing the coverage area, UAVs are capable of a self-organizing mesh network. The communication strength of connected UAVs is constantly checked through RSSI, and UAVs adjust their position close to neighbor UAVs when the strength is lower than the threshold. The scheme is capable of maintaining group communication while moving together for searching.
In [3], Alotaibi et al. proposed a technique focusing on achieving SAR missions in minimum time while rescuing the maximum disaster victims. The authors simulate the proposed work in a real scenario task distribution among UAV. They compared their proposed work with bio-inspired in the real scenario regarding the number of victims rescued with limited execution time for performance evaluation.
M.Rahmes et al. tackled the marine SAR mission problem employing cognitive and autonomous UAVs in their suggested work [33]. To enable the cognitive multi-UAVs and achieve their goal, they used cooperative game theory and a computer on board with the victim’s last spotted location. In [34], extending the wireless coverage of the UAV unified framework of a UAV-assisted emergency network is reported based on the multi-hop ground device to device communication. In [35] serving the ground user, UAVs and the BS cooperatively introduced non-orthogonal multiple access.
Muhammad Asif et al. presented a UAV-aided Wi-Fi direct network design in [36]. They suggested an effective approach for optimal UAV deployment and decreasing GO and client device distance. The planned effort focuses on keeping devices connected and enhancing network speed. The suggested system has a flaw in that it does not address UAV coordination and trajectory optimization to avoid collisions.
In [37], Malandrino et al. discussed improving wireless network coverage in disasters by replacing the traditional yet affected communication with a UAV network. They also present the optimized range while maximizing the user throughput. In [38], Erdelj et al. devised the IoT UAV ecosystem for providing real-time data (multimedia) communication in affected-communication environments with the help of multi-UAVs. Additionally, this also offers on-demand usage of various available sensor mobile phone and UAV infrastructures. In [39], Chen et al. proposed the usage of cache-enabled UAVs and provided the quality of experience to mobile word users using a cloud radio access network while minimizing and reducing the UAV transmitting power and transmission delay in the system. With the use of machine learning, centric-human information can be used to predict a user’s content distribution and mobility.
In [40], Kim et al. propose a solution to create UAV-based network topology that is adjustable with the topological changes that occur due to the unpredictable mission-based movement of UAVs. For making topology adaptive, they use relay nodes named relay UAVs for relaying data between adjacent UAVs. This also supports reliable communication in-ground site wireless link and also maximizes the performance of a network. In the proposed particle swarm optimization (PSO), they considered dependency between metric and routing protocol. In [41], an iterative algorithm is proposed to obtain the suboptimal solutions used to efficiently solve the power allocation sub problem. Reconfigurable intelligent surface (RIS) has been identified as a promising solution for constructing a reconfigurable radio environment of the propagation channel and increasing received signal power by smartly coordinating the phase shifts of the passive elements at the RIS [42]. To properly group the multiple users into clusters, [43] proposed a novel user pairing scheme in which more than two users are paired in each cluster based on channel correlation and channel gain difference.
We have examined the research carried out between 2012 and 2022. The literature review mentioned above came to the conclusion that a number of researchers have looked for and used UAVs in a disaster area. They prioritize UAV deployment and primarily expand the network’s coverage. In some research publications, the tracking of user equipment and UAV communication were studied. They have not, however, concentrated on the UAV’s limitations, such as battery life, communication range, and processing power. When deploying a UAV network, it is crucial to consider battery longevity; instead, they primarily concentrate on expanding UAV coverage. The majority of the researchers spend a lot of time on each drone or ground station performing computing work. To overcome the drawbacks of earlier work, a protocol for optimal UAV deployment is required. In this protocol, an effective UAV network employs the clustering technique to perform computation tasks, conserve battery life, and assist the ground team in searching for and locating missing people during rescue operations. Additionally, information gathered from the disaster region aids in pinpointing a stranded person’s specific location. Additionally, in a disaster area, the enabled communication services promptly alert trusted authorities.

3. Research Methodology

We developed a protocol called intelligent cluster-based multi-unmanned aerial vehicles (ICBM-UAVs). In an ICBM-UAV, where communication takes place at three levels. As depicted in Figure 1, the base station (BS) comes first, followed by the drone (UAV), and finally user equipment (UE). All of the data collected from the disaster area were recorded by the BS. All of the data collected from the disaster area were stored by the BS. Additionally, ICBM-UAVs aid in updating the emergency and other security departments. UAVs play a big role in the network. They aid in locating the victims in a disaster region and determining the entire area that has been impacted. The drones’ ability to see victims in a disaster zone comes from UE. They are sophisticated devices with the ability to communicate in the air. In this context, we started by introducing the architecture that would ensure the efficient operation of our suggested routing protocol.

3.1. The Architecture of ICBM-UAV Protocol

The architecture of the ICBM-UAV is further divided into four layers. The first layer is the base station layer, the second layer is the relay layer, the third layer is known as the cluster layer, and the last layer is the client layer. Each layer has a specific task to perform. The first two layers use the cellular network for communication and data transfer; the other two layers use the radio or wireless connection between them for communication and data transfer. The working of each layer is as follow:

3.1.1. Base Station Layer

The base station is a central part that controls the flight of drones. This layer helps in storing all the gathered information and helps in the deployment of a drone in the disaster area. The base station collects all the data and also informs the other emergency department. It provides the location of the disaster area by sending the coordinates X and Y (cod x,y) toward the CHs, which is very helpful in the deployment of drone for communication layer 1 using the cellular network LTE/5G to enhance the security and operation of a drone, as shown in Figure 2.

3.1.2. Relay Layer

The relay layer consists of a cellular pool and relay drone. The relay layer uses the LTE/5G technology to connect layer 1 with layer 2 and provides the relay for the drone that is far from the base station. The relay can be achieved by the cellular pool in case the cellular network or cellular pool is not available near the disaster area; then the relay drone will act as a relay to facilitates the drones and establish the connection between layer 1 and layer 3.

3.1.3. Cluster Layer

This layer covers the responsibility of controlling the constant number of drones. The CH contains all the information of their client drone (energy, movement, sensory information). Two types of communication will take place between CH to CH and CH to client drone. The drones’ communication with each other will takes place with the help of dedicated radio/wireless technology, as shown in Figure 1.

3.1.4. Client Layer

The last layer is known as the client layer. This layer consists of a drone with a specially dedicated sensor, known as a target recognition sensor, used when the client drone flies over the UEs. These drones are controlled by the CH. They communicate with the CH using radio/wireless technology. They forward some parameters (such as D-id, UE cod x/y, d-energy, no of UE), and this information is forwarded to the CH.

3.2. Working on the Proposed Protocol

UAVs are divided into CH (CH) and client. CH always flies above the clients at a fixed height and controls the client. In this paper, the UE is a mobile phone, which used the aerial base backbone network to transmit information. The UE (Mobile) is spread over the ground because of terrain limitations. UAVs are considered to be equipped with omnidirectional antennas for transmitting and receiving signals in a highly mobile environment. There is more than one CH that provides stability and connection toward BS. Scanning and detecting the mobile in the disaster area is a major task in disaster times. After detecting and scanning the area, providing communication in the area is also important. The scanning area helps in providing the communication and deployment of communication drones. The work is divided into two parts, scanning of the area and providing communication in the area. In the scanning part, the detection and the calculating the total affected area are carried out. The providing of communication and monitoring of the area is achieved with the help of a Wi-Fi hotspot/antennas for providing communication toward ground users and a camera for monitoring the ground conditions.
(i). Part I: Scanning of Disaster Affected Area: Disaster causes loss of life. Disasters are classified as either natural disasters or artificial disasters. If a disaster happens, then one of the most important tasks is to scan the area, which helps in calculating the total affected area. Through scanning, the detection task will be performed. Afterward, the next step is hovering drones, in which the scanning of area and detection of UE are carried out; this step achieves the exact location of UE.
a. Hovering UAV: Unmanned aerial vehicles start flying from the base station (BS) toward the disaster area. The UAV is mainly divided into two categories, (i) CH (CH) and (ii) worker UAV (client). CH mainly focuses on the data gathering from its workers (client), data transferring and data filtering. By using a target recognition sensor, the client’s UAV hovers over the disaster region and detects the user equipment’s (UE) mobile capable connectivity. CH constantly forwards its location to the nearest CH to avoid redundancy of the data. UAV uses the flocking model, which has some desirable properties and helps UAVs in separation, alignment, cohesion, and obstacle avoidance. The algorithm of hovering UAVs is given in Algorithm 1. The algorithm shows the creation of the CH and the connectivity of UAV. The flow diagram of the CH of the hovering UAVs is shown in Figure 3.
b. Environmental Hazards: During the flight, a drone should possess some properties, such as the ability to avoid obstacles (trees, buildings, etc.); obstacle avoidance is also important during UAV flight in order to avoid collision with other UAVs. We assume that the drone flies at some height and automatically avoids the obstacles in the disaster area.
Algorithm 1: Creation of CH Algorithm.
Input Model: Disaster location
Output Model: Total damage area with No of UE.
Disaster Area ← UAV; Scanning← UAV; UAV ← Find UE (target recognition sensor)
if (UE ! = found && Disaster Area = true) ; Drop sensor and fly forward
if else (UE == Found || UE == connected) ; UE connected == yes ; Move forward
if else (UE ! = connected); UAV ← location (X,Y) UE;
Broadcast the CH Request;
If else (CH == found); Forward the information plus location,
else UAV ← CH; UAV broadcast client request; End if
In Algorithm 1, every five drones have one CH, which is also known as the sleeping drone, as shown in Figure 3. The CH provides communication, data transferring, and data mining. The sleeping drone (CH) comes to work whenever the power or battery of one drone is below the threshold, so the CH will replace it. Hovering drones contains dual power; they use solar power as well as batteries. In the daytime, the drones work on solar power, which gives them a longer life.
c. Cluster Head Flow Diagram: The drone will take a flight to provide communication and monitoring of the area. Furthermore, it helps in information gathering of the user equipment, which helps in rescuing the victims. The drone takes flight from a base station and hovers over the disaster area; once the drone detects the user equipment after the detection of user equipment, then the drone confirms if the user equipment is already detected or not if the UE is detected, then the drone flies toward next position. The drone requests for CH, and in the case that there is no CH, then the drone itself becomes CH, or if the drone finds the CH then it hands over its data to CH as, shown in Figure 3.
In Algorithm 2, the UAV hovers over the disaster area; it is not stable at one fixed position, moving from one position to another. The hovering UAV changes its position for the discovering of UE in the disaster area. As the hovering UAV changes its position at some specific time for discovering the new UE, the optimal position is a must for the UAVs to avoid collisions between them and to avoid the redundancy of the data from the hovering drone.
Algorithm 2: Client UAV algorithm
Input Model: CH and next position
Output Model: No of UE and location of UE
UAV ← Hovering Disaster area; CUAV ← Search UE.
If (UE == Yes & UE == connected); UAV ← Move next position;
If else (UE == Yes & UE ! = connected); UAV ← connect UE; UAV ← location UE
if else (UE ! = connected); UAV ← location (X,Y) UE;
UAV ← Move next position; End if
(ii). Part II: Providing Communication in Area: After the allocation of UE is carried out in the scanning part, then the communication part will take place in this surveillance.
a. Surveillance UAV: Surveillance drone comes after the scanning using hovering drones. Now the exact location of the UE is known, so enough drones take flight toward the disaster area. These drones contain the following: (i) camera for video monitoring or live coverage, (ii) Wi-Fi communication capability, and (iii) solar power system for energy consumption. These drones are further divided into CH and client drones, which both perform dedicated tasks.
CH are used for communication and data transfer. Data are gathered by client UAVs from the UE or disaster area and then sent toward the CH. Afterward, the CH finds the nearest CH, so CH can transfer the data to the next CH. In this way, data reaches the center base station. CH also runs the algorithm that performs the data filtering if the two UAVs send the same data; in this case, the CH takes a step and iteratively puts the redundant UAV into sleep mood, which can be used later for replacing the low-power drone. The redundant algorithm puts the UAV that sends the same data to the CH into periods of sleep, as shown in Algorithm 3 and Figure 4.
Algorithm 3: Redundant Drone Algorithm
Input Model: Position of CUAV
Output Model: No of UE and location of UE
CH ← redundant Data (UAVx & UAVy)
If (Distance < threshold); CH ←weight of UAV
If else (UAVx < UAVy); UAVx ← sleep; CH ← connection Update
CH ← change UAV position; End if
b. Communication UAV: Communication UAVs focus on the case scenario in which cellular network infrastructure is totally damaged due to the disaster and when the cellular network is not fully functioning; in such cases of reduced communication, these UAVs can be deployed. However, at this time, the rehabilitation of cellular networks is a major need to facilitate and support the rescue operation of the first responder. For rehabilitation of the network, the communication UAVs (CUAVs) are used to provide alternate connectivity in the disaster area. UAVs use the flocking model to avoid collision and obstacles for communication purposes. There is also one sleeping drone. The sleeping drone becomes alive when the battery life of an already alive drone is less than the threshold. The drone with less battery life passes the information to the newly alive drone. The communication between the drone and BS takes place through the relay drone or nearest cellular pool. Communication UAVs are divided into two categories, (i) relay UAVs (RUAVs) and (ii) client UAVs. The major task of RUAVs is to provide the relay between the center base station (CBS) or nearest cellular poll, and client UAV, as the distance between the disaster area or CBS and the total affected area is known with the help of hovering UAVs, so several RUAVs and client UAVs can be selected accordingly. The client UAVs are connected to the RUAVs and transfer cellular signals to the ground. The architecture of communication of the UAVs is shown in Figure 5. The UAVs are given a better battery life with the help of solar power and a fixed battery.

4. Problem Formulation

4.1. Average Departure Distance

In [14,44], the average distance between the UAVs at the time of departure from the base station can be calculated from Equation (1):
A D D = i = i N d t i + 1 d t i N Δ t
The average distance between UAVs a and b in the network at the time of departure is represented in Equation (2) above, where dti+1 is the distance between a and b at the time of ti+1 and dti is the distance between a and b at time ti. Δt shows the time interval of ti+1 and ti. N is the total no. of intervals. The unit of average departing distance is m/s.

4.2. Stable Moment between Two Neighbor UAVs

From [44], the model of free space attenuation, the strength of the single received Pij of hello packet in the current UAV i transmitted from its neighbor UAV j in a distance d is:
P i j = P t G t G r λ 4 π d 2
Here, Gt represents the transmitting antenna, Gr represents the receiving antenna, and λ shows the length of the radio wave, where Pt stands for the transmitting power of hello packet from the neighbor UAV. The covering range of the antenna is a circular region with radius R, as shown in Figure 6. Then, the threshold value of received signal strength from the neighboring UAV is:
P threshold = P t G t G r λ 4 π R 2
Based on the known information of the current UAV and with hello packet information received from the neighboring UAV, the threshold value can be calculated. Using the real-time signal strength and the threshold value of the received single strength, we have:
X i j t k = 0 ,   P i j P t h e r s h o l d 1 P t h e r s o l d P i j ,   P i j P t h e r s h o l d
The Bienaymé–Chebyshev inequality [31] is as follows:
P X E X < ε 1 v a r X ε 2
where X is a discrete variable, E(X) is the expectation value of X, var(X) is the variance of X, ε is a positive arbitrary number. Here, if var(X) is equal to 0, then P{|XE(X)| < ε} is equal to 1, which means the variable X is equal to its expected value, which shows that the smaller the variance of X is, the closer X will be its expected value. With multiple measurements of X, the variance of var(X) is:
v a r X = k X k 2 n k X k n 2
For obtaining the variation of the received signal strength of packet hello in a live UAV, transmitted from neighbor UAV b, we take the different values of Xij (tk) at different moments and substitute these values into Equation (6). We can judge the current UAV i and UAV j moment condition. The moment stability between two neighboring UAVs NSij is calculated as follows:
v a r X i j = k X i j   t k 2 n k X i j   t k n 2
N S i j = 1 v a r X i j
The higher the value of NSij, the better the movement stability will be between two neighboring UAVs.

4.3. Probability of Link Subsistence between UAVs

Through Equation (1), the distance between UAVs can be obtained at the time of departure. For the link subsistence between two UAVs, in-network UAVs broadcast hello packet, with the help of which we can calculate the link subsistence probability between two UAVs, UAV iJ and UAV j, extracting two parameters from the packet strength and frequency. In [44], approaching and receding are two scenarios presented. Figure 7 represents the approaching scenario; here, UAV i is at a fixed position located at a, where UAV j moves from b to c. Its relative moment speed is vr. The center of the circle shows the maximum communication range of UAV i. Interruption occurs when two UAVs are at their maximum communication range.
The link subsistence probability between two UAVs, UAV i, and UAV j, also has an impact on the relative speed and distance between them. Thus, the probability of link subsistence can be calculated as:
P L S i j = d c e v r t t h e r s h o l d ,   d c e v r < t t h e r s h o l d 1 ,   d c e v r t t h e r s h o l d
PLSij represents the probability of link subsistence between UAV i and UAV j. The higher the value, the better link will be. dce represents the distance between c and e. t t h e r s h o l d   represents the threshold value of the link subsistence. The relative speed is zero between the two neighbor UAVs. d c e / v r goes on for infinity. As d c e / v r = t t h e r s h o l d when dce/vr >= tthreshold, therefore PLSij = 1.

4.4. Probability of UAV Becoming Cluster Head

UAVs broadcast hello packet to neighbor UAVs. When a UAV receives a packet, it will calculate the sum of the value of Δ P i j   t / d t of its neighbor, which represents the probability of the neighbor UAV becoming CH. The process of calculation is as follows:
C H P i t = j N d d t Δ P i j t
C H P i represents the probability of the current UAV i becoming CH. The higher the value, the higher the chance of UAVi becoming CH. N is the set of neighbor UAVs of i.
(1) CLUSTER FORMATION: The process of CH selection contains the following step: when a UAV receives two packets, it starts calculating the PLS and stable moment between itself and neighbor UAVs. As each UAV calculates the probability of itself becoming CH (Equation (10)), they broadcast the packet, and then the received UAV compares their CHP value with the received packet; if the CHPi is greater than the CHPj, then i doesn’t broadcast the packet. If the CHPi is less than CHPj, then i broadcasts the packet without the CHPi.
(2) CLUSTER MEMBER: There is a static cluster member for each UAV. As the number of UAVs increases in a cluster, they become a burden for the CH. In AoI, the lifetime of a network is very important. If the UAV receives more than one CH request, then the current UAV will calculate the PLS through Equation (9) and join the CH whose value is higher.
(3) MERGING CLUSTER: There is a situation when two clusters intersect at the point where the merging concept takes place that causes the size of the cluster to exceed the predefined threshold value; the merging procedure will not take place, as managing a larger cluster is also a major issue for the CHs. In this case, both CHs will continue to perform their roles and manage their clusters.

5. Simulation Results and Analysis

This chapter displays the simulation results of our work. This research work is simulated using Network Simulator 2.34, based on Red Hat 7.6. We also simulated various scenarios to show the efficiency of our proposed work and compared our proposed approach with some existing approaches. The simulation environment created was 2000 m × 2000 m AoI with 200 UE distributed randomly. We also considered various scenarios in simulation, which are given below. Table 1 shows the parameters used in the simulation.

5.1. Distribution and Motion of UE

As the UEs are any smart devices that are capable of aerial communication, in a disaster scenario they are distributed randomly in the AoI. We considered a static scenario where the UEs are distributed through random patterns in the AoI. A static scenario means one where the UE does not move from their position. Obstacles: in the simulation, we also carried out the experiment in an obstacle environment in order to check the stability of the proposed work in AoI.

5.2. Initial Deployment of UAV

Initially, UAVs take flight from the base station, as shown in Figure 8, where UAVs start scanning the area. UEs were randomly distributed in the AoI. UAVs scatter in the area immediately and connect the undiscovered UE. Once a UAV discovers the UE, they start sending a CH request packet to their neighbor UAV and start creating a cluster network. When the network is established, the redundancy of data is checked and the redundant drones put on sleep to keep their battery life for later use, as shown in Figure 9. 200 nodes are distributed for simulation purposes. 30 green nodes were declared as UAV; these nodes were mobile nodes that move with 10 m/s, and among them ‘0′ node was declared as a BS. In a scenario, 200 nodes are distributed randomly. UAV nodes were scattered in the AoI; green UAV nodes are active nodes; the nodes in yellow color present similar data put to sleep as shown in the Figure 8, whereas the red nodes area’s CH controls the client UAV and information that reaches the BS through the CH.

5.3. Obstacle Area Deployment of UAV

As the area of interest can have obstacles to evaluating our proposed work, we assume that the position of and obstacles are known in the geo-map, and we avoided deployment of UAVs in the area. In Figure 9, obstacles were placed in an area, and 200 nodes were distributed with obstacles in a random pattern. This shows the UAVs formed a network while avoiding the obstacles in the area, and also connected all UEs in area flocking model properties for the avoidance of collision between the UAVs and providing the quality of communication between the UAVs, which also helps with the avoidance of collision. We deployed the UAVs at a height that helps in avoiding obstacles. The result in all cases is not much affected. ICBM-UAVs perform a little higher than DFM, as ICBM-UAVs keep their table updated in a timely manner and always keep an active transmission route for packet transmission.

5.4. Network Throughput without Obstacles

Based on IEEE 802.11 g, network bandwidth is about 5.8 MBps; we evaluate the proposed work on that basis. The ICBM-UAV protocol performed better than the DFM flocking algorithm, as shown in Figure 10. The ICBM-UAV performs much better than AODV and OLSR protocols, as shown in Figure 10. In FANET, the drones are continually moving and changing their coordinates, which impacts packet transferring routes since OSLR changes the database and develops a route in advance for packet transfer. This effect can be seen in the graph. On other hand, AODV carries out on-demand routing; AODV performs better than OSLR because it builds the route for a packet when needed. DFM flocking throughput is higher than the AODV’s and OSLR’s due to its leader and follower mechanism. Each leader contains two followers, which means the route is predefined for packet transfer. On the other hand, ICBM-UAV performs a little higher than DFM, as ICBM-UAVs keep their table updated in a timely manner and always keep an active transmission route for packet transmission.

5.5. Network Throughput with an Obstacle

We also evaluated the network throughput in an area with obstacles. ICBM-UAV maintains the throughput better in an obstacle environment. When compared to the performance in an obstacle-free environment, the flocking model performs marginally worse, as illustrated in Figure 11. When the UAVs travel at 10 m/s, the DFM flocking model was not built for the obstacle environment, which has an impact on network throughput. AODV and OSLR perform a little worse than the non-obstacle environment, as the UAVs change their positions due to obstacles, which causes the UAVs to change coordinates; rebuilding the path will have an effect on the throughput of a network, where the DFM model works below the non-obstacle environment as the appearance of obstacle between the leader and follower will affect the transmission of packets and throughput if a network is lower.

5.6. Packet Delivery Ratio (PDR)

In Figure 12, we show the comparison of PDR between the AODV, DFM, LADTR, and ICBM-UAV. The ICBM-UAV and LADTR show better performance than the AODV, DFM, and epidemic routing protocols. ICBM-UAV performs better in the beginning. Initially, the PDR of ICBM-UAV is 67%. With the increase in number of the UAVs, the PDR of ICBM-UAV also increases. LADTR performs better than the other protocols due to the multi-hop forwarding, where the ICBM performs better due to the use of the clustering technique. LADTR shows a higher packet delivery ratio compared to epidemic routing, as epidemic routing uses flooding-based forwarding and, in case of route failure, does not have a packet recovery method. As UAV density increases, the AODV performs better.

5.7. Packet Delivery Ratio (PDR) with Obstacles

In Figure 13, we show the comparison of PDR in an environment with obstacles with the AODV, DFM, LADTR, and ICBM-UAV. ICBM-UAV performs better than LADTR, AODV, DFM, and Epidemic routing protocol, because none of them had been considered in an obstacle situation. Initially, the PDR of ICBM-UAV in an environment with obstacles is the same as the environment without: 67%. With the increase in number of the UAVs, the PDR of ICBM-UAV also increases. LADTR performs higher than the epidemic and AODV, as they use ferrying UAVs and multi-hop forwarding of the packet.

5.8. Coverage Probability

We exhibit the statistics for the probability of coverage of all user equipment in the area in Figure 14. With 50, 100, and 200 items of user equipment in the vicinity, we mimic the ICBM-UAV. Additionally, the ICBM-UAV was compared to distributed and centralized methods. In Figure 14, the centralized algorithm performance is worse than distributed and ICBM-UAV. As for the ICBM-UAV scheme at 50 UE scenario, the coverage probability is a little less than the distributed algorithm, as the affected area is larger than the number of UE distributed in the area. With the increase in UE in areas, with 100 and 200, the probability of covering UE gets better, as τ = 0.02, which shows that its ICBM- UAV scheme satisfies the required coverage probability threshold, which is set as 98%.

5.9. Coverage Probability with Obstacles

In Figure 15, we also plot the statistics for coverage probability in an environment with obstacles. A similar no. of UE was taken in an obstacle environment to evaluate the probability of covering all UE in an area with different schemes. In Figure 15, the ICBM-UAV scheme works slightly more efficiently than the distributed and centralized algorithms. Our main focus is to cover all UE in the area, either with obstacles or without.

6. Conclusions

In this paper, we propose a protocol, intelligent cluster-based multi-unmanned aerial vehicle (ICBM-UAV), used the UAVs’ deployment in the disaster area to achieve coverage on-demand. For handling multi-UAVs and data transferring from disaster areas toward the CBS, the clustering methodology is used, which provides reliable and effective communication among UAVs, CHs, and the base station (BS). The ICBM-UAV protocol can realize CH formation and the maintenance of the network, establishes the cluster structure with more stability, and decreases control overhead in both environments with and without obstacles. The protocol focused on avoiding the redundancy of UAVs in such a way that if two drones send similar data to a CH, one drone is put into a sleeping mode. Afterwards, when the active UAV’s energy is decreased below the given threshold, then the CH will activate the sleeping UAV and replace the current one with the activated one by using the clustering technique. This helps significantly in decreasing workload and network congestion. The results show that the average lifetime of the cluster versus the maximum range or coverage area in which the average number of nodes in each CH selected is the same as the existing protocols, which makes our protocol more effective. The results show that ICBM-UAV works more efficiently than the existing state-of-the-art protocols such as AODV, OSLR, and flocking mechanisms in terms of throughput, PDR, and coverage area probability, in both environments with and without obstacles.
In the future, we will extend the working of the ICBM-UAV protocol by applying AI strategies to perform and predict the further requirements and challenges of the entire network.

Author Contributions

A.M., Z.I. and A.A.S. conceived the presented idea and developed the theory and performed the computations. A.M. and Z.I. verified the analytical methods. A.M., C.M. and G.E encouraged A.A.S. to investigate Intelligent Cluster-Based Multi-Unmanned Aerial Vehicle Communication System for Searching and Rescuing in Disaster. A.M. and C.M. supervised the findings of this work. All authors discussed the results and contributed to the final manuscript. A.A.S. and A.A.S. carried out the experiment under the supervision of C.M., A.M. and J.L.; J.L. developed the theoretical formalism, performed the analytic calculations, and performed the numerical simulations. All authors contributed to the final version of the manuscript. A. Mehmood supervised the project. A.A.S., A.M., Z.I., C.M. and J.L. conceived and planned the experiments. A.M., Z.I., C.M. and J.L. conducted the experiments. A.M., Z.I., C.M. and J.L. planned and carried out the simulations. A.M., Z.I., A.A.S. and C.M., contributed to the interpretation of the results. A.M. and A.A.S. took the lead in writing the manuscript. All authors provided critical feedback and helped shape the research, analysis, and manuscript. A.M., A.A.S. and Z.I. designed the model and the computational framework and analyzed the data. A. Mehmood wrote the manuscript with input from all authors. J.L. and C.M. carried out the review and editing of the paper. J.L. helped us in providing funding acquisition. J.L. performed investigation of the work. Finally, A.M., A.A.S., C.M. and J.L. worked on the verification and validation of the work. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Brzozowski, B.; Daponte, P.; De Vito, L.; Lamonaca, F.; Picariello, F.; Pompetti, M.; Tudosa, I.; Wojtowicz, K. A remote-controlled platform for UAS testing. IEEE Aerosp. Electron. Syst. Mag. 2018, 33, 48–56. [Google Scholar] [CrossRef]
  2. Minaeian, S.; Liu, J.; Son, Y.-J. Effective and Efficient Detection of Moving Targets From a UAV’s Camera. IEEE Trans. Intell. Transp. Syst. 2018, 19, 497–506. [Google Scholar] [CrossRef]
  3. Alotaibi, E.T.; Alqefari, S.S.; Koubaa, A. LSAR: Multi-UAV Collaboration for Search and Rescue Missions. IEEE Access 2019, 7, 55817–55832. [Google Scholar] [CrossRef]
  4. Rego, A.; Garcia, L.; Sendra, S.; Lloret, J. Software Defined Network-based control system for an efficient traffic management for emergency situations in smart cities. Futur. Gener. Comput. Syst. 2018, 88, 243–253. [Google Scholar] [CrossRef]
  5. García-Magariño, I.; Lacuesta, R.; Rajarajan, M.; Lloret, J. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks 2019, 86, 72–82. [Google Scholar] [CrossRef]
  6. Kumar, K.; Kumar, S.; Kaiwartya, O.; Sikandar, A.; Kharel, R.; Mauri, J.L. Internet of Unmanned Aerial Vehicles: QoS Provisioning in Aerial Ad-Hoc Networks. Sensors 2020, 20, 3160. [Google Scholar] [CrossRef]
  7. Hadiwardoyo, S.A.; Dricot, J.M.; Calafate, C.T.; Cano, J.C.; Hernandez-Orallo, E.; Manzoni, P. UAV Mobility Model for Dynamic UAV-To-Car Communications. In Proceedings of the 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Montreal, Canada, 24–28 October 2022; pp. 1–6. [Google Scholar]
  8. Rahman, S.U.; Kim, G.-H.; Cho, Y.-Z.; Khan, A. Positioning of UAVs for throughput maximization in software-defined disaster area UAV communication networks. J. Commun. Networks 2018, 20, 452–463. [Google Scholar] [CrossRef]
  9. Barritt, B.; Kichkaylo, T.; Mandke, K.; Zalcman, A.; Lin, V. Operating a UAV mesh & internet backhaul network using temporospatial SDN. In Proceedings of the 2017 IEEE Aerospace Conference, Big Sky, MT, USA, 4–11 March 2017; pp. 1–7. [Google Scholar] [CrossRef]
  10. Secinti, G.; Darian, P.B.; Canberk, B.; Chowdhury, K.R. SDNs in the Sky: Robust End-to-End Connectivity for Aerial Vehicular Networks. IEEE Commun. Mag. 2018, 56, 16–21. [Google Scholar] [CrossRef]
  11. Zhao, N.; Cheng, F.; Yu, F.R.; Tang, J.; Chen, Y.; Gui, G.; Sari, H. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment. IEEE Trans. Commun. 2018, 66, 2281–2294. [Google Scholar] [CrossRef] [Green Version]
  12. Cheng, F.; Zhang, S.; Li, Z.; Chen, Y.; Zhao, N.; Yu, F.R.; Leung, V.C.M. UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells. IEEE Trans. Veh. Technol. 2018, 67, 6732–6736. [Google Scholar] [CrossRef] [Green Version]
  13. Rosario, D.; Rosario, D.; Filho, J.A.; Santos, A.; Gerla, M. A Relay Placement Mechanism Based on UAV Mobility for Satisfactory Video Transmissions. In Proceedings of the 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Budva, Montenegro, 28–30 June 2017; pp. 1–8. [Google Scholar]
  14. Chen, M.; Dai, F.; Wang, H.; Lei, L. DFM: A Distributed Flocking Model for UAV Swarm Networks. IEEE Access 2018, 6, 69141–69150. [Google Scholar] [CrossRef]
  15. Li, H.; Peng, J.; Liu, W.; Wang, J.; Liu, J.; Huang, Z. Flocking control for multi-agent systems with communication optimization. In Proceedings of the 2013 American Control Conference, Washington, DC, USA, 17–19 June 2013; pp. 2056–2061. [Google Scholar]
  16. Ruan, L.; Wang, J.; Chen, J.; Xu, Y.; Yang, Y.; Jiang, H.; Zhang, Y.; Xu, Y. Energy-efficient multi-UAV coverage deployment in UAV networks: A game-theoretic framework. China Commun. 2018, 15, 194–209. [Google Scholar] [CrossRef]
  17. Li, P.; Duan, H. A potential game approach to multiple UAV cooperative search and surveillance. Aerosp. Sci. Technol. 2017, 68, 403–415. [Google Scholar] [CrossRef]
  18. Li, B.; Jiang, Y.; Sun, J.; Cai, L.; Wen, C.-Y. Development and Testing of a Two-UAV Communication Relay System. Sensors 2016, 16, 1696. [Google Scholar] [CrossRef] [Green Version]
  19. Zhan, P.; Yu, K.; Swindlehurst, A.L. Wireless Relay Communications with Unmanned Aerial Vehicles: Performance and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2011, 47, 2068–2085. [Google Scholar] [CrossRef]
  20. Cetin, O.; Zagli, I.; Yilmaz, G. Establishing Obstacle and Collision Free Communication Relay for UAVs with Artificial Potential Fields. J. Intell. Robot. Syst. 2012, 69, 361–372. [Google Scholar] [CrossRef]
  21. Guo, W.; Devine, C.; Wang, S. Performance Analysis of Micro Unmanned Airborne Communication Relays for Cellular net-Works. In Proceedings of the 2014 9th International Symposium on Communication Systems, Networks\& Digital Sign (CSNDSP), Manchester, UK, 23–25 July 2014; pp. 658–663. [Google Scholar]
  22. Zhao, H.; Wang, H.; Wu, W.; Wei, J. Deployment Algorithms for UAV Airborne Networks Toward On-Demand Coverage. IEEE J. Sel. Areas Commun. 2018, 36, 2015–2031. [Google Scholar] [CrossRef]
  23. Chen, H.; Li, D.; Wang, Y.; Yin, F. UAV Hovering Strategy Based on a Wirelessly Powered Communication Network. IEEE Access 2018, 7, 3194–3205. [Google Scholar] [CrossRef]
  24. Yoon, J.; Jin, Y.; Batsoyol, N.; Lee, H. Adaptive Path Planning of UAVs for Delivering Delay-Sensitive Information to Ad-Hoc Nodes. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar] [CrossRef]
  25. Arzamendia, M.; Gregor, D.; Reina, D.G.; Toral, S.L. An evolutionary approach to constrained path planning of an autonomous surface vehicle for maximizing the covered area of Ypacarai Lake. Soft Comput. 2017, 23, 1723–1734. [Google Scholar] [CrossRef]
  26. Devaurs, D.; Simeon, T.; Cortes, J. Optimal Path Planning in Complex Cost Spaces with Sampling-Based Algorithms. IEEE Trans. Autom. Sci. Eng. 2015, 13, 415–424. [Google Scholar] [CrossRef] [Green Version]
  27. Zhang, J.; Xiong, J.; Zhang, G.; Gu, F.; He, Y. Flooding disaster oriented USV & UAV system development & demonstration. In Proceedings of the OCEANS 2016-Shanghai, Shanghai, China, 10–13 April 2016; pp. 1–4. [Google Scholar] [CrossRef]
  28. Luo, C.; Miao, W.; Ullah, H.; McClean, S.; Parr, G.; Min, G. Unmanned Aerial Vehicles for Disaster Management. Geological Disaster Monitoring Based on Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 83–107. [Google Scholar]
  29. Yanmaz, E.; Yahyanejad, S.; Rinner, B.; Hellwagner, H. Drone Networks: Communications, Coordination, and Sensing. Ad Hoc Netw. 2017, 1, 1–5. [Google Scholar] [CrossRef]
  30. Erdelj, M.; Natalizio, E.; Chowdhury, K.R.; Akyildiz, I.F. Help from the Sky: Leveraging UAVs for Disaster Management. IEEE Pervasive Comput. 2017, 16, 24–32. [Google Scholar] [CrossRef]
  31. Micheletto, M.; Petrucci, V.; Santos, R.; Orozco, J.; Mosse, D.; Ochoa, S.F.; Meseguer, R. Flying Real-Time Network to Coordinate Disaster Relief Activities in Urban Areas. Sensors 2018, 18, 1662. [Google Scholar] [CrossRef] [Green Version]
  32. Ruetten, L.; Regis, P.A.; Feil-Seifer, D.; Sengupta, S. Area-Optimized UAV Swarm Network for Search and Rescue Operations. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0613–0618. [Google Scholar]
  33. Rahmes, M.D.; Chester, D.; Hunt, J.; Chiasson, B. Optimizing Cooperative Cognitive Search and Rescue UAVs. In Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything; International Society for Optics and Photonics: Washington, DC, USA, 2018; Volume 10643. [Google Scholar] [CrossRef]
  34. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.-K. UAV-Assisted Emergency Networks in Disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  35. Zhao, N.; Pang, X.; Li, Z.; Chen, Y.; Li, F.; Ding, Z.; Alouini, M.-S. Joint Trajectory and Precoding Optimization for UAV-Assisted NOMA Networks. IEEE Trans. Commun. 2019, 67, 3723–3735. [Google Scholar] [CrossRef] [Green Version]
  36. Khan, M.A.; Hamila, R.; Kiranyaz, M.S.; Gabbouj, M. A novel UAV-aided network ar-chitecture using Wi-Fi direct. IEEE Access 2019, 7, 67305–67318. [Google Scholar] [CrossRef]
  37. Malandrino, F.; Chiasserini, C.-F.; Casetti, C.; Chiaraviglio, L.; Senacheribbe, A. Planning UAV activities for efficient user coverage in disaster areas. Ad Hoc Netw. 2019, 89, 177–185. [Google Scholar] [CrossRef] [Green Version]
  38. Erdelj, M.; Uk, B.; Konam, D.; Natalizio, E. From the Eye of the Storm: An IoT Ecosystem Made of Sensors, Smartphones, and UAVs. Sensors 2018, 18, 3814. [Google Scholar] [CrossRef] [Green Version]
  39. Chen, M.; Mozaffari, M.; Saad, W.; Yin, C.; Debbah, M.; Hong, C.S. Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience. IEEE J. Sel. Areas Commun. 2017, 35, 1046–1061. [Google Scholar] [CrossRef]
  40. Wheeb, A.H.; Nordin, R.; Abu Samah, A.; Alsharif, M.H.; Khan, M.A. Topology-Based Routing Protocols and Mobility Models for Flying Ad Hoc Networks: A Contemporary Review and Future Research Directions. Drones 2021, 6, 9. [Google Scholar] [CrossRef]
  41. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based Secure Energy Efficient Beamforming in Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2022, 1–4. [Google Scholar] [CrossRef]
  42. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  43. Lin, Z.; Lin, M.; Wang, J.-B.; de Cola, T.; Wang, J. Joint Beamforming and Power Allocation for Satellite-Terrestrial Integrated Networks with Non-Orthogonal Multiple Access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef] [Green Version]
  44. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. UAV-Enabled Communication Using NOMA. IEEE Trans. Commun. 2019, 67, 5126–5138. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Architecture diagram for proposed work.
Figure 1. Architecture diagram for proposed work.
Electronics 12 00607 g001
Figure 2. Multi-hovering UAVs’ communication.
Figure 2. Multi-hovering UAVs’ communication.
Electronics 12 00607 g002
Figure 3. Creation of UAV CH and UAV client.
Figure 3. Creation of UAV CH and UAV client.
Electronics 12 00607 g003
Figure 4. Redundant Flow Diagram.
Figure 4. Redundant Flow Diagram.
Electronics 12 00607 g004
Figure 5. Architecture of communication UAVs.
Figure 5. Architecture of communication UAVs.
Electronics 12 00607 g005
Figure 6. Antenna coverage.
Figure 6. Antenna coverage.
Electronics 12 00607 g006
Figure 7. Approaching scenario.
Figure 7. Approaching scenario.
Electronics 12 00607 g007
Figure 8. Final result without obstacles.
Figure 8. Final result without obstacles.
Electronics 12 00607 g008
Figure 9. Final result with obstacle placement.
Figure 9. Final result with obstacle placement.
Electronics 12 00607 g009
Figure 10. Throughput over time without obstacles.
Figure 10. Throughput over time without obstacles.
Electronics 12 00607 g010
Figure 11. Throughput over time with obstacles.
Figure 11. Throughput over time with obstacles.
Electronics 12 00607 g011
Figure 12. Packet delivery ratio without obstacles.
Figure 12. Packet delivery ratio without obstacles.
Electronics 12 00607 g012
Figure 13. Packet delivery ratio with obstacles.
Figure 13. Packet delivery ratio with obstacles.
Electronics 12 00607 g013
Figure 14. Coverage probability without obstacles.
Figure 14. Coverage probability without obstacles.
Electronics 12 00607 g014
Figure 15. Coverage probability with obstacles.
Figure 15. Coverage probability with obstacles.
Electronics 12 00607 g015
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
ParameterValue
SimulatorNS2(v-2.34)
Time of simulation100 s
Range of UAV500 m
Deployment Area1000 × 1000
Number of Nodes80–100
Distribution of NodesRandom
Trace of MovementOff
No of UAV42
CHs 10–12
Followers7 nodes/CH
Channel PL: path loss,
Distance between Nodes (Range)8–10
Distance between CH and Nodes2–12
Between CHs10–12
CH and BS10–16
UAVQuadcopter
Altitude10–40
Frequency Range0.97
Sound Sig.OFDM
Antenna and Mounting 1 monopole antenna on GS
for TX, 1 monopole on
aircraft for RX
Maximum Speed of UAV10 m/s
Packet Size512 bytes
ChannelWifi
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mehmood, A.; Iqbal, Z.; Shah, A.A.; Maple, C.; Lloret, J. An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing. Electronics 2023, 12, 607. https://doi.org/10.3390/electronics12030607

AMA Style

Mehmood A, Iqbal Z, Shah AA, Maple C, Lloret J. An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing. Electronics. 2023; 12(3):607. https://doi.org/10.3390/electronics12030607

Chicago/Turabian Style

Mehmood, Amjad, Zeeshan Iqbal, Arqam Ali Shah, Carsten Maple, and Jaime Lloret. 2023. "An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing" Electronics 12, no. 3: 607. https://doi.org/10.3390/electronics12030607

APA Style

Mehmood, A., Iqbal, Z., Shah, A. A., Maple, C., & Lloret, J. (2023). An Intelligent Cluster-Based Communication System for Multi-Unmanned Aerial Vehicles for Searching and Rescuing. Electronics, 12(3), 607. https://doi.org/10.3390/electronics12030607

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop