Next Article in Journal
Fixed Point Results in Controlled Fuzzy Metric Spaces with an Application to the Transformation of Solar Energy to Electric Power
Previous Article in Journal
Clustering Methods over the Tropical Projective Torus
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of U-V2X Communications with Non-Clustered and Clustered Jamming in the Presence of Fluctuating UAV Beam Width

Department of Computer Engineering, Gachon University, Seongnam-si 13120, Republic of Korea
*
Authors to whom correspondence should be addressed.
Mathematics 2023, 11(15), 3434; https://doi.org/10.3390/math11153434
Submission received: 17 July 2023 / Revised: 5 August 2023 / Accepted: 6 August 2023 / Published: 7 August 2023

Abstract

:
Jammers emit strong intentional jamming signals aiming to limit or block legitimate communications. The distribution of jammers, whether in non-clustered or clustered form, significantly influences the performance of vehicle-to-everything (V2X) networks. In addition, the fluctuations in the three-dimensional (3D) antenna beam width of unmanned aerial vehicles (UAVs) can exert a substantial impact on the network’s overall performance. This paper introduces a model for UAV-V2X (U-V2X) communications in mm-Wave bands, considering non-clustered and clustered jammers, as well as the varying 3D antenna beam width. The roads are modeled using a Poisson line process, vehicular nodes (VNs) are modeled using a 1D Poisson point process (PPP), and UAVs are modeled using a 3D PPP. The jammers are distributed in two ways: non-clustered and clustered distributions. Moreover, the fluctuations in the 3D antenna beam width follow a normal distribution. To this end, a typical node’s performance in U-V2X communications is evaluated for various network configurations, including the number of UAVs, VNs, roads, jammers, and jammer’s transmission power. The analytical expressions for the outage probability (OP) of VN to VN connection (i.e., V2V), VN to UAV connection (i.e., V2U2V), and an overall connection (i.e., U-V2X), under non-clustered and clustered jamming, along with the fluctuating antenna beam width, are derived. The results revealed that the performance of the U-V2X communications utilizing mm-Waves is significantly degraded with the non-clustered jamming in comparison with the clustered jamming. The fluctuations in the 3D beam width of the UAV antennas further compromise the network’s performance. Thus, accurate modeling of these fluctuations is crucial, particularly in the presence of non-clustered jammers. Furthermore, the system designers should focus on implementing additional anti-jamming countermeasures specifically targeting non-clustered jammers in U-V2X communications.

1. Introduction

Jammers intentionally produce signals to interfere with legitimate communications. The disruption created by the jammers, which can result in signal deterioration, communication failures, or reduced network performance, is referred to as jamming interference. Jamming interference compromises the performance of various applications in vehicle-to-everything (V2X) communications. For instance, jamming signals can disrupt the signals transmitted by ambulances or fire brigades requesting neighboring vehicles for enhanced safety and emergency response. Similarly, jamming signals can disrupt the performance of advanced driver assistance systems, such as warning for collision avoidance, detection for blind spots, assistance for lane change, and safety at junctions.
The third-generation partnership project (3GPP) supports various modes of reliable communication by unmanned aerial vehicle (UAV) V2X (U-V2X) networks such as vehicle-to-vehicle, vehicle-to-UAV, vehicle-to-infrastructure, and vehicle-to-pedestrian, as shown in Figure 1 [1,2,3,4]. U-V2X communications improve network outage and SE performance by deploying UAVs over critical roads or highways for various applications such as autonomous driving in vehicular platooning [5,6] and for entertainment or disseminating emergency messages in internet of vehicles [7]. This addresses system reliability and connectivity, specifically in the aftermath of natural disasters where conventional wireless infrastructure is disrupted, as well as during events such as concerts or sports matches, where the network is overloaded with extensive data traffic.

1.1. Related Works

Jamming in U-V2X communications can compromise vehicular-node (VN)-to-VN mode communication (i.e., exchange of information in VNs, e.g., vehicles, road-side units (RSUs), and pedestrians) or VN-to-UAV mode communication (i.e., exchange of information between VNs and UAVs). Jamming in U-V2X communications can be broadly categorized as non-clustered jamming (NCJ) and clustered jamming (CJ). NCJ is a form of jamming in which the jammers are dispersed throughout the given area without displaying an organized clustering structure. In this situation, the jammers are dispersed and are not concentrated in one area. Conventionally, this type of non-clustered deployment follows a uniform distribution. CJ, on the contrary, relates to a sort of jamming in which the jammers have close proximity, frequently forming groups or clusters. As a result of the clustered arrangement of jammers, it ends up in a limited and concentrated interfering pattern [8,9]. Conventionally, this type of deployment for clustered jammers follows the Matern cluster process (MCP).
MCP is a clustering point process that constitutes of parent and child nodes [10,11]. The jammers or child nodes are distributed around the cluster center or parent node in a specific radius following uniform distribution and the parent nodes do not participate in the overall point process [12,13]. In [14], a V2X network assisted by UAV is modeled with clustered jamming. The jammers are distributed using an MCP. The VNs consisting of vehicles, RSUs, and pedestrians are distributed using the Poisson line process (PLP), such that the VNs are assumed to reside along the roads (for details, see [15,16,17]). The UAVs are distributed randomly in the geographical region following the three-dimensional (3D) Poisson point process (PPP) (for details, see [18,19]). It was shown in [14] that the performance of the V2X networks is extremely degraded when MCP-distributed jammers are found in the neighborhood of VNs.
Some studies [20,21,22] focused on addressing jamming attacks on sink nodes positioned both within and outside clusters in wireless networks. The sink node, a crucial element in U-V2X communications, is responsible for transferring data from VNs to the network. It is essential to analyze jamming interference, particularly when the sink node is at the center of a cluster and encounters jamming attacks from clustered jammers [23]. The sink node is typically positioned outside jamming clusters to enhance network performance in terms of capacity, connectivity, and reliability. However, when the sink node is at the center of a jamming cluster, enhancing the instantaneous received UL SIR at the typical node can improve the jamming interference. Reducing the number of jamming clusters and jammers per cluster can also enhance network performance. Additionally, increasing the size of the cluster representing the distribution of jammers in the geographical area and using narrow band frequency domain directional antennas with smaller beam width can further improve the negative effects of jamming in vehicular networks [24].
The importance of antenna beam width in controlling the jamming interference of wireless networks has been extensively studied in various research works [24,25,26,27]. Narrow beam width naturally limits the jamming area around the typical node, while wider beam width can be confined by improving the typical node’s received SIR. Additionally, reducing the radius (or the size) of the cluster as well as the number of jamming clusters and jammers per cluster further confines the jamming area.
The path planning for UAVs with a focus on power and signal-to-noise ratio is explored in [28], using graphic- and heuristic-based algorithms to enhance UAV distance in anti-jamming environments. In [29], an anti-jamming power control scenario is proposed for UAV-assisted wireless networks, improving network performance in terms of sum rate and energy efficiency. For satellite-air-ground networks, [30] presents a two-stage scheme optimizing UAVs altitude and antenna beam-forming to address anti-jamming for Line-of-Sight links. Similarly, [31] considers the performance of aerial networks under Line-of-Sight links, optimizing jamming power control using a successive convex approximation technique. However, [28,29,30,31] did not provide insight into coverage and capacity performance for U-V2X communications.
Investigations into the data rate of typical user equipment in aerial terrestrial heterogeneous networks were conducted in [32]. The authors optimized the UAV trajectories and transmission power to enhance network performance. Additionally, they considered the impact of intentional jamming by smart jammers capable of tracking the UAVs. In [14], modeling the jamming interference in an aerial terrestrial heterogeneous network revealed that clustered ground jammers based on MCP degrade coverage and spectral efficiency (SE) performance. The work in [33] demonstrated compromised performance, particularly in probability of error, due to jamming signals in heterogeneous networks. The analysis in [34] addressed the aerial terrestrial heterogeneous networks with uniformly distributed jammers, focusing the crucial role of jammer height in characterizing jamming signals and their effect on outage probability (OP). However, the above-mentioned works are limited in the sense that they do not consider U-V2X communications.

1.2. Contributions and Organization

Typically, U-V2X networks encounter fluctuations in the 3D beam width of the antenna due to strong winds, high atmospheric pressure, mechanical noise, or error in the mechanical controllers. These fluctuations in the 3D beam width of the antenna can significantly reduce networks’ performance. Recently, the authors in [35,36,37] modeled the fluctuations of the 3D beam width of the UAV antenna for mm-Waves. The authors showed that the system’s performance is severely degraded with fluctuating beam width of the UAV and that it is very important to consider the antenna fluctuations for analyzing the realistic aerial network’s performance. Thus, we investigate jamming in U-V2X networks for mm-Waves along with the UAV beam-width fluctuations. In the following ways, our work differs from recent related works:
  • The work in [34] focused on jamming in aerial heterogeneous networks without considering UAV’s fluctuating beam width and mm-Waves for vehicular communications. Moreover, this work focused on jamming in U-V2X communications by considering mm-Waves and UAV’s fluctuating antenna beam width.
  • The work in [35,36,37] focused on UAV’s fluctuating 3D beam width with mm-Waves for aerial heterogeneous networks without focusing on U-V2X networks and jamming. Moreover, this work focused on UAV’s fluctuating beam width with mm-Waves along with the jamming interference in U-V2X communications.
  • The work in [14] explored C-V2X communications with micro-waves and jamming interference; this work specifically examined U-V2X communications with mm-Waves, taking into account both jamming interference and the fluctuating UAV beam width.
  • The work in [9] concentrated on UAV beam-width fluctuations in U-V2X communications and their impact on success probability without considering jamming interference; this study focused on both jamming interference and UAV beam-width fluctuations in U-V2X communications, evaluating their impact on OP. Additionally, this research examined the effects of both non-clustered and clustered jammers on network performance. Furthermore, this work suggests prioritizing the implementation of anti-jamming techniques for non-clustered jammers with a higher probability rather than focusing solely on clustered jammers.
In all the aforementioned articles, analyzing the jamming of U-V2X communications along with the fluctuating beam width of the UAV is not considered, which can severely disrupt the networks’ performance. Thus, in this article, we investigate the 3D beam width of the antenna fluctuations in U-V2X communications in the presence of jamming interference. The novel contributions of this article are as follows:
  • The U-V2X system employing non-clustered and clustered jamming signals is presented, which faces disturbances owing to fluctuating 3D antenna beam width. Under this system, VNs communicate with adjacent VNs in their vicinity via a V2V connection or with UAVs via a V2U connection, taking into account characteristics such as network conditions, distance, and antenna strength.
  • The analytical equations of the shortest distance and the probability of associations of the VNs with the surrounding VNs and UAVs are derived. By incorporating jammers along with the fluctuating antenna beam width, the derived equations provide a helpful understanding of the system’s operation under a jamming environment.
  • The analytical equations for the OP of V2V connection, VN to UAV connection (i.e., V2U2V), and U-V2X connection, considering both non-clustered and clustered jammers, are presented. The investigation also evaluates the impact of different setups for system effectiveness concerning OP and SE, such as the jammer’s transmission power, average jammers, average UAVs, average VNs, and average roadways.
  • The results illustrate that if challenged by impacts of non-clustered or clustered jammers along with 3D beam width of UAV antenna variations, the U-V2X system suffers significant operational deterioration. The findings suggested that anti-jamming countermeasures should be prioritized, specifically for non-clustered jammers in comparison with the clustered jammers. Furthermore, anti-jamming scenarios may reduce the negative impacts while improving the efficiency of U-V2X communications.
  • The results further illustrate that at places with lesser vehicles, roads, and people; UAVs have a greater level of credibility in comparison with the VNs when it comes to setting up communication in intense jamming with non-clustered jammers. Additionally, it has been demonstrated that fewer variations in the beam width lead to more stable links provided by UAVs in U-V2X systems with jammers.
The paper is structured as follows: Section 2 describes the U-V2X system model, which takes into consideration non-clustered as well as clustered jammers, including UAV beam-width variations. The shortest path of a VN and adjoining UAV/VN is calculated in Section 3. Section 4 discusses the VN’s AP in the presence of jammers, whereas Section 5 looks at the analysis of interference. Section 6 examines the VN’s OP and SE. Section 7 offers the findings of the analysis and their implications, which leads to the conclusions in Section 8.

2. System Model

Our network for U-V2X communications under jamming interference consists of UAVs, VNs, and jammers as shown in Figure 2. UAVs were modeled according to a 3D PPP, Φ U , with density, μ U , and height, h U . VNs were modeled on each road according to PLP, such that the roads follow PPP, Φ L with the density of roads, λ L , and the VNs are modeled on each road following 1D PPP, Φ V , with density, μ V , where μ V = μ v + μ p + λ r . μ v indicates the density of vehicles in the area of interest, μ p indicates the density of pedestrians in the area of interest, and μ r indicates the density of RSUs in the region-of-interest. The non-clustered jammer density is given by λ J , where the jamming devices are scattered equally in the entire 2D space with radius, z. Conversely, the density of MCP-distributed jammers is given by λ J = λ c × J , where λ c is the density of parent nodes or cluster centers and J is the value of the number of jammers. The jamming devices are spread equally in a particular radius cluster, r J . For a fair comparison of non-clustered jammers with clustered jammers, the total number of jammers’ value is kept the same.
P W indicates the node’s transmission power, where W { U , V } , such that P U indicates the UAV’s transmission power and it is assumed that UAVs do not have energy constraints and possess sufficient energy for communication purposes. The VN’s transmit power is given by P V and the jammer’s transmit power is given by P J . The path loss exponent associated with the UAV is given by α U and the path loss associated with the VN is given by α V . The path loss exponent associated with the jammers is given by α J . The bias component is specified by B , i.e., B = 0 indicates that only UAVs are used by VNs and B = indicates that VNs only utilize adjacent VNs for vehicular communications. The Rayleigh fading gain assumed between the channels of VNs and UAVs is given as g W . For instance, g U indicates the channel gain between the UAV, i.e., g U exp ( 1 ) . Similarly, g V is the channel gain between the VNs, i.e., g V exp ( 1 ) .
The 3D gain of the N W × N W number of antenna is given as G Q , i.e., Q = { t , r } , where t indicates a transmitting node and r indicates a receiving node. The deviation of the primary lobe of the antenna in the elevation and azimuth plane is given by θ and ϕ , respectively. The antenna gain can be defined by G Q = G Q , O × G Q , E ( N , θ , ϕ ) × G Q , A ( N , θ , ϕ ) , where G Q , O indicates the optimal gain along the primary beam width, G Q , A ( N , θ , ϕ ) indicates the gain of the antenna array factor, and G Q , E ( θ , ϕ ) indicates the gain of the individual antenna element.
By considering uniform amplitude, the excitation gain of the antenna array factor is given as follows:
G W , A ( N W , θ , ϕ ) = ( sin N W κ x ψ x sin ( θ ) cos ( ϕ ) + Δ x 2 N W sin κ x ψ x sin ( θ ) cos ( ϕ ) + Δ x 2 × sin N W κ y ψ y sin ( θ ) sin ( ϕ ) + Δ y 2 N W sin κ y ψ y sin ( θ ) sin ( ϕ ) + Δ y 2 ) 2 ,
where κ x = κ y is the wave number and is given by 2 π f c , where f c is the frequency. Moreover, the plate width and progressive phase shift for the x-axis are ψ x = c / 2 f c and Δ x = 0 , respectively, and for the y-axis are ψ y = c / 2 f c and Δ y = 0 , respectively, where c is the speed of light.
The gain of the single antenna element is defined as [38]:
G W , E ( θ , ϕ ) = G E max min { G ( θ E ) + G ( θ x ) , η } ,
where G = min 12 θ E 90 V 2 , ζ , G = min 12 θ E H 2 , η ,
θ E = tan 1 1 + sin 2 ( θ x ) sin ( θ y ) , G E max is the highest gain, i.e., 8 dBi, H is the horizontal 3D beam width, i.e., 65 , V is the vertical 3D beam width, i.e., 65 , ζ = 30 dB is the side-lobes limit, and η = 30 dB is the front-back ratio of antenna.
The transmission power with an equal and comparable outcome is given by Equation (2.22) of [39] as:
G W , 0 = 4 π 0 2 π 0 π G W , A ( N W , θ , ϕ ) sin ( θ ) d θ d ϕ .
The path loss model for mm-Waves communications is not standardized yet, and thus, the path loss model defined by the 3GPP in [3] can be considered for a region with building height, h b 50 m. The distance-dependent path loss at a distance, z, [dB] is defined as [36,37,40]:
Z ( z ) = 20 log 10 40 π z f c 3 + min 0.03 h b 1.73 , 10 × log 10 ( z ) min 0.044 h b 1.73 , 14.77 + 0.002 z log 10 ( h b ) .
The uplink signal-to-interference ratio (SIR) can be computed as:
SIR t r = P t g t G t G r z r z t α r i = 1 I n P t g i G t , i G r , i z r z i α r + j = 1 J n P J g j z r z j α J ,
where the receiving/transmitting node is given as { r / t U , V } , the distance from the center of the coordinate plane to the transmitting node is given as z t , the distance from the center of the coordinate plane to the receiving node is given as z r , the distance from the center of the coordinate plane to the location of the i-th interferer is given as z i , the number of interferers is given as I n , the distance from the center of the coordinate plane to the location of the j-th jammer is given as z j , and the number of jammers is given as J n . Please note that the intended or serving signal from the sending node to the receiving node is declined from the interference analysis. Moreover, VN transmission utilizes F1 frequency and UAV transmission utilizes F2 frequency, such that, when VNs transmit, I n indicates the maximum number of interfering VNs, and when UAVs transmit, I n indicates the maximum number of interfering UAVs. Furthermore, this work highlights the communication of a VN with another VN either directly or through UAV. Thus, for for the direct V2V transmission, z r is assumed to be at the center of the coordinate system, whereas for the V2U transmission, z r is the distance from the center of the coordinate system to the UAV. Slivnyak’s theorem states that by setting a single VN on a road at the coordinate system’s center, the point process stays unaffected [15,41].

3. Distribution of Shortest Distance

3.1. Shortest Distance to a VN

The shortest distance for the communication of the VN with the nearest VN in V2V connection is defined according to the VN’s shortest distance distribution to the nearby VN. The characterization of the shortest distance distribution of the VN with the nearest VN (referred by serving VN) located at a distance of z V assumes that there is no other VN in its vicinity than the serving VN (i.e., the nearest VN), which can create an interfering signal stronger than the strength of the serving signal. The probability density function (PDF) of the distance to the VN is derived in Appendix A and is given as:
f z V ( z V ) = d F z V ( z V ) d z V = 2 exp 2 μ V z V + 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y μ V + 2 π λ L μ V 0 z V z V e 2 μ V z V 2 y 2 z V 2 y 2 d y .

3.2. Shortest Distance to a UAV

The shortest distance for the communication of the VN with the closest UAV connection is characterized by the shortest distance distribution of the VN to the UAV. The characterization of the shortest distance distribution of the VN with the closest UAV (referred to as a serving UAV) positioned at a distance of z U assumes that no other UAV resides in a spherical shape of the radius, z U , from the serving UAV (i.e., the closest UAV), which can create an interfering signal stronger than the serving signal’s strength. This PDF distance is expressed by [15,42]:
f z U ( z U ) = 2 π μ U exp π μ U z U 2 .

4. Association Probability of the VN with a Nearby UAV and VN

VNs can communicate with other VNs by associating with adjacent UAVs or other VNs. The association of the VN with the adjacent VN or UAV is characterized in terms of the AP. Typically, the AP of the VN with another VN or UAV is governed by the received strength at the VN or UAV.

4.1. V2V Connection’s AP

The probability that the VN will associate itself with the adjacent VN based on the received power at the adjacent VN is referred to as a V2V connection’s AP. Conventionally, when the power that is obtained by the VN from the closest VN exceeds the power obtained by the closest UAV, VN associates itself with the closest VN. The likelihood of association of the VN with the adjacent VN is referred to as the AP of the VN and is given as:
A V = 0 Pr A V ( V 2 V \ z V ) f z V ( z V ) d z V ,
where the probability of association of the VN with the adjacent VN, A V ( V 2 V \ z V ) is computed under the assumption that there is not any other VN located within a spherical shape of the radius, z V , from the coordinate system’s center. The AP of the VN is derived as:
Pr A V ( V 2 V \ z V ) = Pr B z V α V G r , V > z U α U G r , U = Pr B z V α V G r , V G r , U > z U α U = Pr z U > z V α V G r , U B G r , V 1 / α U .
We may construct the subsequent equation by replacing the complementary cumulative distribution function (CCDF) for z U into (9), which is given as:
Pr A V ( V 2 V \ z V ) = exp π μ U z V α V G r , U B G r , V 1 / α U 2 .
VNs may increase the gain by aligning their antennas since they are not bound by issues such as battery limits or payload restraints. As a result, (10) may be reduced to G r , 0 ( N V ) = G r , V ( N V , θ , ϕ ) . We can calculate the AP of the V2V link by inserting (10) and (6) into (8). The final expression is as follows:
A V = 0 2 exp π μ U z V α V G r , U B G r , 0 1 / α U 2 exp 2 μ V z V + 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y μ V + 2 π λ L μ V 0 z V z V e 2 μ V z V 2 y 2 z V 2 y 2 d y d z V .

4.2. V2U Connection’s AP

The probability that the VN will associate itself with the adjacent UAV based on its received power at the UAV is referred to as a V2U connection’s AP. Conventionally, when the power that is obtained by the VN from the closest VN is lower the power obtained by the closest UAV, VN associates itself with the UAV. The likelihood of association of the VN with the UAV is referred to as the AP of the UAV and is given as:
A U = 0 Pr A U ( V 2 U \ z U ) f z U ( z U ) d z U ,
where AP of VN with UAV assuming no other UAV in the given region can be expressed by A U ( V 2 U \ z U ) . The AP of the UAV is derived as:
Pr A U ( V 2 U \ z U ) = Pr z U α U G r , U > B z V α V G r , V = Pr z U α U G r , U B G r , V > z V α V = Pr z V > B z U α U G r , V G r , U 1 / α V .
We may construct the subsequent equation by replacing the CCDF for z V into (13) to obtain the resultant equation as:
Pr A U ( V 2 U \ z U ) = exp ( 2 π λ L 0 B z U α U G r , O / G r , U 1 / α V 1 e 2 μ V B z U α U G r , 0 / G r , U 1 / α V 2 y 2 d y ) exp 2 μ V B z U α U G r , 0 / G r , U 1 / α V 2 .
The A U equation may be obtained by replacing (14) and the PDF of z U in (12) as:
A U = 0 exp 2 π λ L 0 B z U α U G r , 0 / G r , U 1 / α V 1 e 2 μ V B z U α U G r , 0 / G r , U 1 / α V 2 y 2 d y exp 2 μ V B z U α U G r , 0 / G r , U 1 / α V 2 2 π μ U z U exp π μ U z U 2 d z U .

5. Interference Classification

This section examines the interference produced by UAVs, VNs, and non-clustered or clustered jammers. To investigate VN-UAV interference, the Laplace transform is used, which allows the system’s performance metrics such as OP and SE to be effectively calculated.

5.1. VN’s Interference

5.1.1. Interference of the VNs (From the Roads Avoiding Center of the Coordinate System)

The VNs’ interference can be expressed as L I z r ( s ) = E exp ( s I ) , where I = i I z r P t g i G t , i G r , i z r z i α r and s = z r z t α r τ / P t . The interference is given by:
L I z r ( s \ z r ) = E g , z i I z r exp s P t g i G t , i G r , i z r z i α r = 1 E z i I z r E g exp s P t g i G t , i G r , i z r z i α r = 2 E z i I z r 1 1 + s P r G t , i G r , i z r z i α r .
where (1) is obtained by assuming independent point process and (2) is derived as a result of exponentially distributed fading gain with unity mean power.
To account for the interference of the VNs resulting from just one road crossing a spherical shape, S ( 0 , z V ) , we compute two independent Laplace equations. They are represented by L I V ( s \ z ) (for VNs on roads that intersect the specified territory, such that y < z V ) and L I V ( s \ z ) (for VNs on roadways which are not traversing the area, i.e., y z V ). This variation is due to the various geographical arrangements of VNs along these roadways. VNs on crossing roadways have been placed on a line segment between z 2 y 2 , z V 2 y 2 and z V 2 y 2 , z 2 y 2 . VNs located on non-intersecting roadways, on the other hand, are discovered on a line segment between z 2 y 2 , 0 and 0 , z 2 y 2 . The interference associated with VNs is assessed using these various geographical configurations as L I V ( s \ z ) and L I V ( s \ z ) , respectively.
Assuming a is the distance that separates two VNs on a path (i.e., a line segment). The VNs’ interference without crossing a spherical form provided by S ( 0 , z V ) is obtained by assuming that each VN on a highway has a probability of m and assuming the specified path has a homogeneous distribution with PDF, f ( a ) = 1 / 2 z 2 y 2 . The receiving site signal interruption is therefore described as:
L I V ( s \ z ) = m 0 Pr { N V = m } z 2 y 2 z 2 y 2 f ( a ) / 1 + s P V G t G r y 2 + a 2 α V 2 m .
Utilizing PPP’s probability of uniformly distributed points and then plugging f ( a ) in (17), we obtain:
L I V ( s \ z ) = m 0 e 2 μ V z 2 y 2 2 μ V z 2 y 2 m m ! 2 z 2 y 2 m z 2 y 2 z 2 y 2 d a / 1 + s P V G t G r y 2 + a 2 α V 2 m .
Assuming m = 0 Y m m ! = e Y and a a = 2 a , the equation is given as:
L I V ( s \ z ) = e 2 μ V z 2 y 2 exp 2 μ V 0 z 2 y 2 d a / 1 + s P V G t G r y 2 + a 2 α V 2 .
Simple mathematical operations offer the formula for single road’s interference, y z V , which is represented as:
L I V ( s \ z ) = exp 2 μ V 0 z 2 y 2 1 1 1 + s P V G t G r y 2 + a 2 α V 2 d a .
Assuming α V > 1 , the closed-form solution is:
L I V ( s \ z ) = exp 2 μ π ( s P V G t G r ) α V csc π α V / α V .
In the same way, interference of the VNs with y < z V , might be determined and represented as:
L I V ( s \ z ) = exp 2 μ V z V 2 y 2 z 2 y 2 1 1 1 + s P V G t G r y 2 + a 2 α V 2 d a .
For α V = 3 , the closed-form solution with z > 0 is expressed by:
L I V s \ z = exp 2 μ V 3 s P V G t G r 1 / 3 log z + log z + ( s P V G t G r ) 1 / 3 + 1 2 / 3 log 1 + 1 2 / 3 z s P V G t G r 1 / 3 ( 1 ) 1 / 3 log 1 1 1 / 3 z s P V G t G r 1 / 3
The interference expression is obtained for each highway crossing S ( o , z V ) by establishing that the likelihood of roadways crossing S ( o , z V ) is a PPP with an average of 2 λ L μ V ( z z V ) . Furthermore, the mean value of highways in S ( o , z ) that do not intersect with S ( o , z V ) constitutes a PPP with average highways in the physical area of interest supplied as 2 λ L μ V z . Assume k 1 and k 2 represent the number of highways in the defined region, with k 1 taking the PDF, f ( b 1 ) = 1 / 2 z with y z , and k 2 taking the PDF, f ( b 2 ) = 1 / 2 ( z z V ) with y < z . The interference of highways other than the ones passing the site of the center of the coordinate system is characterized as:
L I V ( s \ z ) = k 1 0 exp 2 λ L μ V z ( 2 λ L μ V z ) k 1 k 1 ! z z L I V ( s \ z ) f ( b 1 ) d b 1 k 1 k 2 0 exp 2 λ L μ V ( z z V ) 2 λ L μ V ( z z V ) k 2 k 2 ! z V z L I V ( s \ z ) f ( b 2 ) d b 2 k 2 .
The equation may be simplified by putting f ( b 1 ) and f ( b 2 ) into (20) and using basic mathematical tools, and is given as:
L I V ( s \ z ) = exp 2 λ L μ V z k 1 0 2 λ L μ V 0 z L I V ( s \ z ) d b 1 k 1 k 1 ! exp 2 λ L μ V ( z z V ) k 2 0 2 λ L μ V z V z L I V ( s \ z ) d b 2 k 2 k 2 ! .
Following i = 0 Y i / i ! = e Y , (21) is expressed as:
L I V ( s \ z ) = exp 2 λ L μ V z exp 2 λ L μ V 0 z L I V ( s \ z ) d b 1 exp 2 λ L μ V ( z z V ) exp 2 λ L μ V z V z L I V ( s \ z ) d b 2 .
Lastly, the interference of the VNs across every highway, except the one passing via the center of the coordinate system, is provided by:
L I V ( s \ z ) = exp 2 λ L μ V 0 z 1 L I V ( s \ z ) d b 1 + z V z 1 L I V ( s \ z ) d b 2 .

5.1.2. Interference of the VNs (From the Roads Passing Origin)

The VNs’ interference from a road traversing the center of the coordinate system is accomplished by following the assumption y = 0 in (19) and being expressed as:
L I V o ( s \ z ) = exp 2 μ V z V z 1 1 1 + s P V G t G r b α V d b .
The closed-form with α V > 1 , z V 0 , and z > 0 is given as:
L I V o ( s \ z ) = exp 2 μ V G t G r z 2 F 1 1 , 1 + α V α V ; 2 1 α V ; G t G r z 1 + α V ,
where 2 F 1 ( , ; ; ) is the hyper-geometric function [43].

5.2. UAV’s Interference

UAV interference refers to the interfering signals from the adjacent UAVs during U2V communication. This form of interference is characterized by L I U ( s ) = E exp ( s I U ) , where I U indicates the UAVs’ interference. The UAV interference is given as [42]:
L I U ( s \ z ) = E exp ( s I U ) = 1 exp 2 π μ U z U z 1 E exp s P U g U G t G r b α U b d b = 2 exp 2 π μ U z U z 1 1 1 + s P U G t G r b α U b d b .
where (1) is obtained assuming polar coordinates and applying the probability-generating function of PPP and (2) is obtained by supposing g U to be exponentially distributed with the mean of unity.

5.3. Jammer’s Interference

The non-clustered/clustered jammers’ interference can be described in the context of the Laplace transform of interference, L I J ( s ) .

5.3.1. Non-Clustered Jamming

Jamming intrusion from jamming devices substantially disrupts the legal U-V2X transmission. For non-clustered jammers, jamming devices can be distributed according to the uniform distribution in the given region’s radius, z. Appendix B describes the interference of uniformly dispersed jammers. and is expressed as:
L I J N C ( τ ) = exp 2 π Δ λ J τ z 1 2 α r z α r ( α r 2 ) 2 F 1 1 , 1 2 α r ; 2 2 α r ; Δ τ z z 1 α r 2 π Δ λ J τ z 0 2 α r z α r ( α r 2 ) 2 F 1 1 , 1 2 α r ; 2 2 α r ; Δ τ z z 0 α r .

5.3.2. Clustered Jamming

When the number of jammers, J, are distributed around the cluster center with density, λ c , in a circular region of the radius, r J , according to an MCP, the jamming interference at the receiving node is derived in Appendix C and is expressed as: [14]
L I J C ( τ ) = exp 2 π λ c J α r r J 2 τ 2 / α r csc 2 π α r z 2 π λ c τ 2 / α r z 2 0 z 1 exp J 1 + ω α r / 2 d ω .

6. Performance Metrics

6.1. OP Performance

The OP is characterized as the probability that the recipient node’s instantaneous SIR is less than a pre-established threshold value, τ . The OP for a receiving node to be less than the coverage threshold is expressed as follows:
O t r = 0 Pr { SIR t r τ } f z t 2 r ( z t 2 r ) d z t 2 r
where the PDF distance corresponding to the gap that separates the sending and receiving nodes is given as f z t 2 r ( z t 2 r ) . The OP of the receiving node can also be determined by the chance to be in coverage and is given as:
O t r = 0 1 Pr { SIR t r > τ } f z t 2 r ( z t 2 r ) d z t 2 r = 0 1 C t r f z t 2 r ( z t 2 r ) d z t 2 r ,
where C t r indicates the coverage of the receiving node. Thus, V2V’s OP is stated as:
O V V = 0 1 C V V f z V 2 V ( z V 2 V ) d z V 2 V
The coverage of the V2V connection (i.e., C V V ) assumes that the VN is connected to the nearest VN and that no other VN resides in a spherical shape of the radius, z V , around it. Moreover, for the connection to be in an outage, the obtained SIR must be below the threshold value. The PDF distance of VN-VN is expressed as f z V 2 V ( z V 2 V ) . Furthermore, by introducing jamming into the system, the resulting expression for (31) is described below:
O J V V = 0 1 L I V ( s \ z V 2 V ) L I V o ( s \ z V 2 V ) L I J ( s \ z V 2 U ) f z V 2 V ( z V 2 V ) d z V 2 V .
The probability of outage for the V2V connection with uniformly distributed jammers is obtained in (33) by inserting (23), (24), (27), and (6) into (32) and assuming network settings as z V 2 V = z V , r = V , and s = τ P V 1 z V α V . Similarly, the probability of outage for the V2V connection with MCP-distributed jammers is obtained in (34) by inserting (23), (24), (28), and (6) into (32) and assuming network settings as z V 2 V = z V , r = V , and s = τ P V 1 z V α V . Note that (34) gives a reference graph for the OP of a LB on V2V curve and analyzes the OP if transmission between VNs and neighboring VNs occurs via just VNs (i.e., 100 % affiliation to VNs while ignoring UAVs):
O N C V V = 0 1 exp 2 λ L μ V 0 z 1 L I V d b 1 + z V z 1 L I V d b 2 exp 2 μ V 0 z 1 1 1 + τ z V α V G t G r b α V d b exp 2 π Δ λ J τ z 1 2 α V z V α V ( α V 2 ) 2 F 1 1 , 1 2 α V ; 2 2 α V ; Δ τ z V z 1 α V 2 π Δ λ J τ z 0 2 α V z V α V ( α V 2 ) 2 F 1 1 , 1 2 α V ; 2 2 α V ; Δ τ z V z 0 α V 2 exp 2 μ V z V + 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y μ V + 2 π λ L μ V 0 z V z V e 2 μ V z V 2 y 2 z V 2 y 2 d y d z V .
O C V V = 0 1 exp 2 λ L μ V 0 z 1 L I V d b 1 + z V z 1 L I V d b 2 exp 2 μ V 0 z 1 1 1 + τ z V α V G t G r b α V d b exp 2 π λ c J α V r J 2 τ 2 / α V csc 2 π α V z V 2 π λ c τ 2 / α V z V 2 0 z 1 exp J 1 + ω α V / 2 d ω 2 exp 2 μ V z V + 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y μ V + 2 π λ L μ V 0 z V z V e 2 μ V z V 2 y 2 z V 2 y 2 d y d z V .
In a setting wherein communication occurs through UAVs, the OP of the V2V link is provided by:
O V 2 V = A V O V V .
The V2U’s OP can be described as the probability that the SIR at the UAV is less than the pre-set threshold value. The V2U’s OP has been determined assuming the minimal transmission and reception distance of the VN and the UAV is z V 2 U . The OP of the V2U link is determined by:
O V U = 0 1 Pr { SIR V U > τ } f z V 2 U ( z V 2 U ) d z V 2 U = 0 1 C V U f z V 2 U ( z V 2 U ) d z V 2 U ,
where the coverage of the V2U link is given by C V U and the PDF distance of the VN to UAV link is given by f z V 2 U ( z V 2 U ) . The expression for the OP of the V2U link with jamming is given by:
O J V U = 0 1 L I V ( s \ z V 2 U ) L I V o ( s \ z V 2 U ) L I J ( s \ z V 2 U ) f z V 2 U ( z V 2 U ) d z V 2 U .
Plugging (23), (24), (28), and (6) in (37), considering network settings as z V 2 U = z U , r = U , and s = τ P V 1 z U α U , and assuming MCP-distributed jammers, the formula that accounts for the effectiveness of the V2U link is determined and presented in (39). In a similar way, plug (23), (24), (27), and (6) in (37), considering network settings as z V 2 U = z U , r = U , and s = τ P V 1 z U α U , and assuming uniformly distributed jammers, the formula that accounts for the effectiveness of the V2U link with uniformly distributed jammers is determined and presented in (38). It must be mentioned that (39) and (38) might be used when only UAVs are authorized to send information from sending VN to the recipient VN. Furthermore, (39) gives a reference graph for the OP of LB on V2U2V graph and analyzes the OP during the interaction between UAVs along with recipient VNs (i.e., 100 % affiliation of VNs to the UAVs):
O N C V U = 0 1 exp 2 λ L μ V 0 z 1 L I V d b 1 + z U z 1 L I V d b 2 exp 2 μ V 0 z 1 1 1 + τ z U α U G t G r b α U d b exp 2 π Δ λ J τ z 1 2 α U z U α U ( α U 2 ) 2 F 1 1 , 1 2 α U ; 2 2 α U ; Δ τ z U z 1 α U 2 π Δ λ J τ z 0 2 α U z U α U ( α U 2 ) 2 F 1 1 , 1 2 α U ; 2 2 α U ; Δ τ z U z 0 α U 2 exp 2 μ V z U + 2 π λ L 0 z U 1 e 2 μ V z U 2 y 2 d y μ V + 2 π λ L μ V 0 z U z U e 2 μ V z U 2 y 2 z U 2 y 2 d y d z U .
O C V U = 0 1 exp 2 λ L μ V 0 z 1 L I V d b 1 + z U z 1 L I V d b 2 exp 2 μ V 0 z 1 1 1 + τ z U α U G t G r b α U d b exp 2 π λ c J α U r J 2 τ 2 / α U csc 2 π α U z U 2 π λ c τ 2 / α U z U 2 0 z 1 exp J 1 + ω α U / 2 d ω 2 exp 2 μ V z U + 2 π λ L 0 z U 1 e 2 μ V z U 2 y 2 d y μ V + 2 π λ L μ V 0 z U z U e 2 μ V z U 2 y 2 z U 2 y 2 d y d z U .
The OP of the U2V connection is defined as the possibility of achieving an SIR lesser than the pre-set limit, τ . The OP for the U2V connection that corresponds to the closest distance, z U 2 V , between the sending UAV and the target VN is provided as:
O U V = 0 1 Pr { SIR U V > τ } f z U 2 V ( z U 2 V ) d z U 2 V = 0 1 C U V f z U 2 V ( z U 2 V ) d z U 2 V
The PDF between the transmitting UAV and the receiver’s VN at the center of the coordinate system is given by f z U 2 V ( z U 2 V ) and the coverage of the U2V connection is given by C U V . The OP of the U2V connection is expressed as:
O U V = 0 1 L I U ( s \ z U 2 V ) f z U 2 V ( z U 2 V ) d z U 2 V .
The U2V connection’s OP is obtained in (42) by plugging (7) and (26) in (41) and considering network settings as z U 2 V = z U and s = τ P U 1 z U α U :
O U V = 0 exp 2 π μ U z U z 1 1 1 + τ z U α U G t G r b α U b d b 2 π μ U exp π μ U z U 2 d z U .
The V2U2V connection is a hybrid link that supports both V2V and U2V transmissions. The OP of the V2U2V connection is stated as:
O V 2 U 2 V = A U O V U O U V .
The V2U2V’s analytical equation with uniformly distributed jammers is obtained by plugging (15), (38), and (42) in (43). Similarly, the V2U2V’s analytical equation with MCP-distributed jammers is obtained by plugging (15), (39), and (42) in (43). The V2V and V2U2V links are joined in the U-V2X connection. The OP of the U-V2X connection is as follows:
O U V 2 X = O V 2 V + O V 2 U 2 V = A V O V V + A U O V U O U V .
The final equation of the U-V2X connection with uniformly distributed jammers is produced by plugging (11), (33), (15), (38), and (42) in (44). Similarly, the final equation of the U-V2X connection with MCP-distributed jammers is produced by plugging (11), (34), (15), (39), and (42) in (44).

6.2. SE Performance

The communication channel’s capacity in terms of system bandwidth characterizes the SE. The SE of the V2V connection is stated as:
SE = 0 0 ln 1 + Pr { SIR t r } f z t 2 r ( z t 2 r ) d t d z t 2 r .
The SE of a typical VN in a V2V link with jamming is expressed as:
SE V 2 V = A V 0 0 Pr { SIR V V > e t 1 } f z V 2 V ( z V 2 V ) d t d z V 2 V = a A V 0 0 L I V ( s ¯ \ z V 2 V ) L I V o ( s ¯ \ z V 2 V ) L I J ( s ¯ \ z V 2 V ) f z V 2 V ( z V 2 V ) d t d z V 2 V ,
where (a) follows by assuming s ¯ = P V 1 e t 1 z V α V [44]. V2V’s SE with uniformly distributed jammers is given by plugging (23), (24), (6), and (27) in (46) and assuming z V 2 V = z V and s ¯ = P V 1 e t 1 z V α V . Similarly, V2V’s SE with MCP-distributed jammers is given by plugging (23), (24), (6), and (28) in (46) and assuming z V 2 V = z V and s ¯ = P V 1 e t 1 z V α V . In a similar fashion, V2U’s SE (i.e., SE V 2 U ) is computed. The U-V2X’s SE is obtained as SE = SE V 2 V + SE V 2 U 2 V , where SE V 2 U 2 V = A U SE V 2 U SE U 2 V . Additionally, the SE of a UAV to VN connection can be expressed by SE U 2 V . It should be noted that SE V 2 U indicates the reference curve (i.e., the graph of the SE of a LB V2U2V connection), which indicates a 100 % affiliation of the VNs with the UAVs (i.e., the pink color line). In a similar way, by eliminating the AP of VNs in (46), a reference curve (i.e., SE of LB V2V connection) is generated, where the VNs have a 100 % relationship with the neighboring VNs (i.e., black color line).

7. Results and Discussion

To make a fair comparison with the relevant research papers, the authors considered the network parameters defined in [9], which reflect a realistic real-world environment. Unless otherwise specified, the network settings used to generate the findings are shown in Table 1. V2V, UAV, U-V2X, LB V2U2V, and LB V2V are represented by the red, blue, green, pink, and black color lines. The dashed-dotted line indicates the link with clustered jamming. The dashed line with marker ‘□’, ‘o’, and ‘v’ represents the non-clustered jamming with standard deviation of 0 , 2 , and 4 , respectively. Moreover, the solid line with Marker ‘⟡’ represents the case with zero jammers and standard deviation of UAV set to 0 .
Note that the results are generated by randomly generating data according to PPP, PLP, and MCP in MATLAB. However, the data can be generated in a similar manner in other software, such as Mathematica. To verify our analysis, we performed simulations by considering realistic network parameters as defined in Table 1.
The simulation outcomes are generated after performing 50,000 successive Monte Carlo runs to back up the findings of the research. In this work, for the first Monte Carlo run, our framework considered that the VN computes its performance in terms of outage and SE in UL and is placed at an origin that receives data from another VN or UAV that is placed randomly in the geographical space. Then, the whole networks’ performance is investigated in a similar way by placing VNs and UAVs randomly in the geographical region for up to 50,000 Monte Carlo runs and the results are averaged over the total number of runs (i.e., 50,000). Specifically, our framework in its first Monte Carlo run assumes that the center of the coordinate system has been transformed to the recipient VN’s position for each independent trial. Then, the transmitting VN that is closest to a neighboring recipient VN is computed utilizing the distance defined by Euclidean geometry. The maximum average strength of the signal acquired from the transmitting VN at the receiving VN is then calculated. Furthermore, the greatest average strength of the signal acquired from the sender VN at the closest UAV is determined. If the acquired signal from the transmitting VN at the desired VN is greater than the acquired signal strength at the nearby UAV, the sending VN immediately connects with the recipient VN without setting up a connection with the nearest UAV. On the other hand, the sending VN communicates with the UAV for the vice versa case.
Then, assuming that no additional sending VNs (other than the one nearest to the transmitting VN)z are present within the spherical shape of the radius, z V , we compute the following interfering signals: (i) interference from the VNs at the UAV, (ii) interference from the VNs at the center of the coordinate system, and (iii) interference of the UAVs at the center of the coordinate system. It should be noted that the VN’s interference can be broadly classified into two distinct groups: (i) the ones on the same roadway as the recipient destination VN but outside the spherical shape of the radius, z V ; and (ii) those that are on all other roadways (other than the one traversed by the center of the coordinate system) but are located on the exterior of the spherical shape of the radius, z V . Furthermore, the jamming devices, J, are distributed in a circular disc of a certain radius, r J , through an MCP, such that the interruption from the jammers located in clusters can be included at the typical node using a distance-dependent PL model with PL exponent given as α J and transmitting power of the jamming devices given as P J .
After calculating the received instantaneous SIR while taking into account both direct connection via V2V and propagation via the closest UAV link, the destination VN’s OP and SE are evaluated. It should be noted that when the disruptions (i.e., interfering signals) from sites within the spherical shape of the radius, z V , are not eliminated, the outcomes of the results could be impacted significantly.
Figure 3 shows the OP of a typical VN with τ . It is observed that the probability that a typical VN is in an outage for the U-V2X connection (green color curve), V2U2V connection (blue color curve), and V2V connection (red color curve) increases by increasing the pre-defined SIR threshold value because the obtained SIR is less than the pre-defined τ . The OP (or conversely, the success probability of a typical node to be in coverage as a function of the SIR threshold, as shown in [9]) for the U-V2X connection is better than the V2V connection or V2U2V connection because the U-V2X connection is in outage when either V2V or V2U2V, or both, are in outage, and is obtained by O U V 2 X = 1 ( 1 O V 2 V ) ( 1 O V 2 U 2 V ) . For a fair comparison with the success probability (or conversely, the OP) results in [9], it is observed that the OP of the typical node for the U-V2X, V2V, and V2U2V connection with clustered and non-clustered jammers is at a higher outage value than the OP of the typical node for the U-V2X, V2V, and V2U2V connection without jammers, respectively. Moreover, the OP of the V2U2V connection is lower than the V2V because a lower path loss is obtained for the V2U2V connection (a similar trend and justification exist for the V2U2V and V2V connection curves in the remaining figures). It is also observed that a typical node in CJ U-V2X (green dashed line with square marker) is at a lower outage under clustered jammers in comparison to NCJ U-V2X (green dotted dashed line with square marker) in the presence of uniformly distributed jammers in the given region, because there is a higher probability that clustered jammers restricted to a particular region will reside at a larger distance-dependent path loss from the typical node as compared to non-clustered jammers. Thus, it is important to give higher preference to the jamming attacks of uniformly distributed jammers in comparison to the clustered jammers, as they will severely degrade the network’s performance. Moreover, the assumption that clustered jammers generally have a more significant negative impact on network performance compared to non-clustered jammers is not valid. Therefore, serious countermeasures and anti-jamming scenarios must be designed for jamming attacks, especially for non-clustered jamming.
Figure 4 shows the OP of a typical VN concerning P J . It is observed that the probability that a typical VN is in an outage for U-V2X connection, V2U2V connection, and V2V connection increases by increasing P J because when the jammer’s transmission power increases, it increases the jamming interference, which decreases the obtained SIR and results in increasing the OP. The U-V2X connection has a better OP compared to V2V and V2U2V connections, as it considers both the connections (i.e., V2V and V2U connection) to be in an outage. The clustered jammers can result in a lower outage for the CJ U-V2X curve compared to the NCJ U-V2X curve, due to larger path loss from the typical node. Thus, it is critical to prioritize countermeasures against uniformly distributed jammers, as they severely degrade network performance. The conventional assumption that the clustered jammers have a greater impact is inappropriate, requiring efficient anti-jamming scenarios for non-clustered jammers. Additionally, the LB on OP of V2U2V connection (pink color solid line) can be obtained by assuming that all the VNs transmit to the adjacent VNs using UAV connections. In addition to this, the LB on the OP of the V2V connection (black color solid line) can be obtained by assuming none of the VNs transmit to the adjacent VNs using a UAV connection.
Figure 5 shows the OP of a typical VN concerning the uniformly distributed jammers, J. It is observed that the probability that a typical VN is in an outage for U-V2X connection, V2U2V connection, and V2V connection increases by increasing the number of jammers (i.e., J), because when jammers’ values increase, it increases the jammers’ transmit power, which decreases the obtained SIR that results in increasing the OP. However, the OP of the U-V2X is lower than the V2V connection or V2U2V connection because the probability of a U-V2X connection is obtained when both the connections, i.e., V2V connection and V2U2V connection, are in an outage. Moreover, the lower bounds on the outage of V2U2V and V2V connections also increase with the increasing number of jammers because LB of V2U2V and LB of V2V are the functions of jammers. It is also noticed that by raising the antenna’s variation, U-V2X connection’s OP enhances because when antenna’s beam-width deviation increases, which decreases an antenna’s receiving gain, resulting in decreasing the signal strength and SIR of the signal. Consequently, when the signal strength decreases, the OP of the system increases.
Figure 6 shows the probability of the VN associating with neighboring VNs and UAVs in V2V and V2U connections, respectively, as a function of UAVs. It can be observed that whenever average UAVs in the network increase, the V2U connection’s AP increases because of the decrease in the path loss as compared with the AP of the V2V connection. Moreover, it is also observed that VN’s performance in V2U link degrades whenever fluctuations of the antenna increase in comparison with the V2V connection. This is due to the fact that whenever UAV fluctuations increase, it will decrease the antenna’s gain as well as the received signal strength.
Figure 7 shows the OP of the serving node by considering uniformly distributed jammers as a function of UAVs and fluctuating UAV antenna beam width. The probability that a typical VN in V2U2V connection is in outage improves whenever average UAVs increase in the considered space because the path loss between the VN and the UAV connection decreases, resulting in increasing the signal strength obtained as compared with the V2V connection. Furthermore, it is observed that at places with lesser vehicles, roads, and people, UAVs have a greater level of credibility in comparison with the VNs when it comes to setting up communication in intense jamming. It is also observed that the OP of the VN degrades for the U-V2X connection whenever UAV’s fluctuations increase in the given system. This is due to the fact that whenever variations in UAV increase, it reduces the gain, received power, and the received SIR (a similar argument may be made for the remaining curves of standard deviation). Moreover, the LB on the OP of the V2V connection remains constant while the LB on the OP of the V2U2V connection degrades whenever average UAVs increase in the system. This is because LB for V2V connection is not the function of UAVs, while the LB for V2U2V connection is the function of UAVs.
Figure 8 shows the OP of the typical VN with clustered and non-clustered jammers and without jammers as a function of VNs. It has been seen that raising the average VNs in the geographical region reduces the V2U2V connection’s OP because the path loss between the VN and the UAV connection degrades when compared to the V2V connection resulting in the decrease of the received power and SIR for the V2U2V connection. However, the OP of the U-V2X connection improves with increasing average VNs because the ratio of V2V and V2U2V connection to be in outage improves. Considering a balanced comparison with the success probability (or inversely, the OP as a function of VNs) outcomes in [9], it is evident that the OP for the typical node in U-V2X, V2V, and V2U2V connections, both with clustered and non-clustered jammers, surpasses the OP for the same connections without jammers. Moreover, it is also observed that the OP of the NCJ U-V2X connection is larger than the CJ U-V2X connection. This is because there is a higher probability that the non-clustered jammers can be located near the typical VN, thus, degrading the network’s OP and performance in comparison with the OP of the CJ U-V2X connection.
Figure 9 shows the SE of the VN as a function of P J by considering clustered and non-clustered jamming interference. It can be observed that the SE of U-V2X, V2U2V, and V2V connection decreases by increasing P J . This is because when the jammer’s transmission power increases, it increases the jamming interference which decreases the obtained SIR, resulting in decreasing the SE of the network. The U-V2X connection has a higher SE when compared with the V2V and V2U2V connections. This is because the U-V2X connection considers that both the connections (i.e., V2V and V2U2V) are in coverage. The SE of the non-clustered jammers is lower in the NCJ U-V2X connection compared with the clustered jammers in the CJ U-V2X connection because there is a larger probability that the uniformly distributed jammers are positioned in the vicinity of the typical VN disrupting the VN’s performance. Thus, prioritizing countermeasures against uniformly distributed jammers is very important, as they can degrade the network’s performance severely in comparison with the CJ U-V2X connection. Furthermore, the LB on SE of the V2U2V connection (pink color solid line) can be obtained by assuming that all the VNs transmit to the adjacent VNs using a UAV connection and are not in outage. Moreover, the LB for the SE of the V2V connection (black color solid line) can be obtained by assuming none of the VNs transmit to the adjacent VNs using a UAV connection and are not in outage.
Figure 10 shows the SE of a typical VN for the uniformly distributed jammers, J. It can be observed that the SE of the U-V2X, V2U2V, and V2V connection decreases by increasing the number of jammers (i.e., J), because when average jammers in the network increase, it increases the jamming signals that will decrease the obtained SIR that results in decreasing the SE. However, the SE of the U-V2X is better in performance than the V2V connection or V2U2V connection because the SE of the U-V2X connection is obtained by considering that both the connections, i.e., V2V and V2U2V, are in coverage. Moreover, the lower bounds on the SE of the V2U2V and V2V connections also decrease with the increasing number of jammers because LB of V2U2V and LB of V2V are the functions of a number of jammers. It is also observed that the SE of the U-V2X connection degrades whenever the UAV variations increase. This is due to the fact that whenever the deviation of the UAV beam width increases, it decreases the gain of the receiving antenna, resulting in decreasing the received power and SIR of the signal. Thus, when the received SIR decreases, it decreases the system’s SE.
Figure 11 shows the SE of the typical VN by considering uniformly distributed jammers and without jammers as a function of UAVs and fluctuating UAV antenna beam width. The SE of a typical VN in a V2U2V connection improves whenever average UAVs in the considered system increase because the path loss between the VN and the UAV connection decreases, resulting in increasing the signal strength and SIR as compared with the V2V connection. To ensure a fair comparison with the SE outcomes in [9], it is noted that the SE for typical node in U-V2X, V2V, and V2U2V connection without jammers is noticeably higher than the SE for the same connections with non-clustered jammers. It is also observed that the SE of the VN degrades for the U-V2X, V2U2V, and V2V connection whenever UAV variations in the system increase, because it reduces the receiver antenna gain, received power, and the signal strength, resulting in the decrease in SE of the typical node (a similar argument may be made for the remaining curves of standard deviation for SE). Moreover, the LB on the SE of the V2V connection remains constant while the LB on the SE of the V2U2V connection increases whenever average UAVs in the system increase. This is because LB for V2V connection is not the function of UAVs, while the LB for the V2U2V connection is the function of UAVs.
Figure 12 shows the SE of the typical VN with and without non-clustered jammers as a function of roads. It has been shown that raising the average roads in the system reduces the SE of the V2U2V connection because the path loss between the VN located around the road and the UAV connection degrades when compared to V2V connection, resulting in the decrease of the received power, SIR, and SE of the V2U2V connection. However, the SE of the NCJ U-V2X connection is higher than the V2U2V and V2V connections. Moreover, it is also observed that the SE of the NCJ U-V2X connection degrades whenever the variations of the UAV increase. This is due to the fact that whenever UAV variations increase in the system, the antenna gain and the SIR decreases. This results in the decrease in the SE of the VN in the network. Considering a fair comparison with the SE of the typical node (with the number of antennas set to 20 and the average roads set to 30 km/km 2 ) in [9], it is evident that the SE of the typical node in U-V2X connection without jammers surpasses the SE of the same connection with non-clustered jammers.

8. Conclusions

In this paper, we modeled non-clustered and clustered jamming in U-V2X communications by considering mm-Waves in the presence of fluctuating 3D antenna beam width. We considered the distribution of roads as PLP, the distribution of VNs as 1D PPP, and the distribution of UAVs as 3D PPP. The fluctuation of 3D antenna beam width is modeled using a normal distribution. The jammers are assumed to follow (i) non-clustered distribution and (ii) clustered distribution. The analytical expressions for the OP of the U-V2X, V2U2V, and V2V connections are analyzed in the presence of jammers and fluctuating antenna beam width. The U-V2X network’s performance is quantified in terms of OP and SE for multiple network settings, such as UAVs, VNs, roads, jammers, and jammers’ transmission power. The results revealed that the performance of the U-V2X communications considering mm-Waves is severely degraded in the presence of non-clustered jammers as compared with the clustered jammers. Moreover, the network’s performance is further compromised by fluctuations in the 3D beam width of the UAV antenna for the non-clustered jammers. Thus, modeling the fluctuations of 3D beam width of UAV antenna is necessary, especially in the presence of non-clustered jammers. Furthermore, system designers should use additional anti-jamming countermeasures in U-V2X communications that can target non-clustered jammers rather than clustered jammers.

Author Contributions

Conceptualization, M.A.; methodology, M.A.; formal analysis, M.A.; generation of simulation results and comparison, M.A.; validation, M.A. and W.K.; writing—review and editing, M.A. and W.K.; funding acquisition, W.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by standard development project funded by the Ministry of Science, ICT grant number RS-2023-0022831612982076870001.

Data Availability Statement

No data was used for the research described in the article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Derivation of (6)

The cumulative distributive function (CDF), F z V ( z V ) , of the distance to the VN, could be determined by assuming that the likelihood of the VNs located on roadways in a sphere of radius z V , (i.e., Pr { N ( S ( o , z V ) ) = 0 } ). Similarly, the probability of the VNs on a length of roadways from z V o and z V o crossing the center of the coordinate system is 0 (i.e., Pr { N z V o ( z V o , z V o ) = 0 } ). The CDF is expressed as [15]:
F z V ( z V ) = 1 Pr { z V > x } = 1 Pr { N ( S ( o , z V ) ) = 0 } Ξ a Pr { N z V o ( z V o , z V o ) = 0 } Ξ b ,
where the chance that VNs in a spherical region with the radius z V is zero is given by Ξ a , and the chance that the VN on a segment of the highway that spans from z V to the coordinate system’s center and then from coordinate’s center to z V is zero is given by Ξ b . Then, we compute the probability of a VN shown to be zero on each m-th highway. ( Pr { N V ( Road m ) = 0 } ). Ξ a is expressed as:
Ξ a = k = 0 Pr { N Roads ( S ( o , z V ) ) = k } × m = 1 k Pr { N V ( Road m ) = 0 } = k = 0 exp 2 π λ L z V 2 π λ L z V k k ! 1 z V z V e 2 μ V z V 2 y 2 2 z V d y k 2 ,
where the probability in 1 may be determined by considering that k roads that are spread out uniformly employing PPP with the mean nodes given as 2 π λ L z V and fall inside a spherical shape with radius z V , and the 2 probability can be obtained by considering that VNs across each of the m-th highways possess a uniform distribution with the length of 2 μ V z V 2 y 2 .
Ξ a = exp 2 π λ L z V k = 0 π λ L z V z V e 2 μ V z V 2 y 2 d y k k !
where (A3) is the result of simple mathematics. After further simplifications, we obtain:
Ξ a = exp 2 π λ L z V exp π λ L z V z V e 2 μ V z V 2 y 2 d y
where (A4) is produced by the assumption k = 0 Y k k ! = e Y . Furthermore, Ξ a is given as:
Ξ a = exp 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y
where (A5) is obtained via the following mathematical techniques. In a similar fashion, the second term in (A1), Ξ b = exp ( 2 μ V z V ) is obtained. The final expression is given by plugging Ξ a and Ξ b in (A1) and is expressed as:
F z V ( z V ) = 1 exp 2 π λ L 0 z V 1 e 2 μ V z V 2 y 2 d y exp ( 2 μ V z V ) .

Appendix B. Derivation of (27)

The interference of the uniformly distributed jammers at the receiving node can be determined by the Laplace transform of interference of the uniformly distributed jammers as [34]:
L I J N C ( τ ) = a E g , z exp τ z r z t α r P t j I J N C P J g j z r z j α r = b E z j I J N C E g exp τ z r z t α r P t P J g j z r z j α r = c E z j I J N C 1 1 + τ Δ D j z α r = d exp 2 π λ r z 0 z 1 D j d D j 1 + Δ D j τ 1 / α r z α r = e exp π λ r τ 2 / α r Δ z 2 z 0 τ 1 / α r z 2 z 1 τ 1 / α r z 2 d w 1 + w α r / 2 ,
where (a) follows by plugging s = z r z j α r P t in (16), (b) follows by the independent point-process assumption, (c) follows by exponentially distributed Rayleigh fading gains and considering D j = z r z j , z = z r z t , and Δ = P J P t , (d) follows by applying probability generating function (PGF) property to polar coordinates, i.e., z 0 and z 1 indicate the initial and final limits of the integration, respectively, and (e) follows by changing the variables, i.e., w = D i τ 1 / α r z 2 . The final equation in (27) is obtained by applying the limits to A7.

Appendix C. Derivation of (28)

The interference of the clustered jammers with MCP distribution is evaluated by following [11,45] and is derived as:
L I J C = ϰ a × ϰ b = exp { λ c 0 z ( 1 exp { J Υ ( t , y ) } ) d y } ϰ a × 0 z exp { J Υ ( t , y ) } f ( y ) d y ϰ b ,
where Υ ( t , y ) = 0 z g ( x y t ) g ( x y t ) + g ( t ) / τ f ( x ) d x and ϰ a is the PGF of MCP-distributed jammers. The PGF is simplified as:
ϰ a = exp λ c 0 z 1 exp λ c 0 z g ( x y t ) g ( x y t ) + g ( t ) / τ f ( x ) d x d y = a exp λ c 0 z 1 exp 0 z J g ( y ) f ( x ) d x g ( y ) + g ( t ) / τ d y = b exp 2 π λ c 0 z 1 exp J y α r y α r + t α r / τ y d y = c exp λ c π τ 2 / α r z 2 0 z 1 exp J 1 + ω α r / 2 d ω ,
where ( a ) is obtained via changing the variables in the system, ( b ) is obtained by simple mathematics, and ( c ) is obtained by assuming ω = τ 2 / α r t 2 y 2 . In addition to this, ϰ b follows by simple mathematics [45] as ϰ b = 0 z exp { J Υ ( t , y ) } f ( y ) d y = exp { J z 2 τ 2 / α r 2 π 2 α r csc ( 2 π / α r ) } , where J = λ c J ( π r J 2 ) 1 . Plug ϰ a and ϰ b in L I J C to obtain the final expression of MCP-distributed jammers.

References

  1. Traspadini, A.; Giordani, M.; Zorzi, M. UAV/HAP-assisted vehicular edge computing in 6G: Where and what to offload? In Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Grenoble, France, 7–10 June 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 178–183. [Google Scholar] [CrossRef]
  2. Mitsuhashi, T.; Kawamoto, Y.; Kato, N. Controlling UAV for maximizing the number of receiver vehicles in intelligent transportation systems. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar] [CrossRef]
  3. 3GPP TR36.885. Study on LTE-Based V2X Services (Release 14). In Technical Specification Group Services System; ETSI: Sophia Antipolis, France, 2016.
  4. Cao, Y.; Xu, S.; Liu, J.; Kato, N. Toward smart and secure V2X communication in 5G and beyond: A UAV-enabled aerial intelligent reflecting surface solution. IEEE Veh. Technol. Mag. 2022, 17, 66–73. [Google Scholar] [CrossRef]
  5. Dhawankar, P.; Agrawal, P.; Abderezzak, B.; Kaiwartya, O.; Busawon, K.; Raboacă, M.S. Design and numerical implementation of V2X control architecture for autonomous driving vehicles. Mathematics 2021, 9, 1696. [Google Scholar] [CrossRef]
  6. Ding, Y.; Huang, Y.; Tang, L.; Qin, X.; Jia, Z. Resource allocation in V2X communications based on multi-agent reinforcement learning with attention mechanism. Mathematics 2022, 10, 3415. [Google Scholar] [CrossRef]
  7. Lansky, J.; Rahmani, A.M.; Hosseinzadeh, M. Reinforcement Learning-Based Routing Protocols in Vehicular Ad Hoc Networks for Intelligent Transport System (ITS): A Survey. Mathematics 2022, 10, 4673. [Google Scholar] [CrossRef]
  8. Ma, R.; Yang, W.; Zhang, Y.; Liu, J.; Shi, H. Secure mmWave communication using UAV-enabled relay and cooperative jammer. IEEE Access 2019, 7, 119729–119741. [Google Scholar] [CrossRef]
  9. Arif, M.; Hasna, M.O. Analysis of fluctuations of antenna pattern in U-V2X communications. Phys. Commun. 2023, 58, 102066. [Google Scholar] [CrossRef]
  10. Afshang, M.; Dhillon, H.S. Poisson cluster process based analysis of HetNets with correlated user and base station locations. IEEE Trans. Wirel. Commun. 2018, 17, 2417–2431. [Google Scholar] [CrossRef]
  11. Ganti, R.K.; Haenggi, M. Interference and outage in clustered wireless Ad Hoc networks. IEEE Trans. Inf. Theory 2009, 55, 4067–4086. [Google Scholar] [CrossRef] [Green Version]
  12. Chun, Y.J.; Hasna, M.O.; Ghrayeb, A. Modeling heterogeneous cellular networks interference using poisson cluster processes. IEEE J. Sel. Areas Commun. 2015, 33, 2182–2195. [Google Scholar] [CrossRef]
  13. Chun, Y.J.; Hasna, M.O. Analysis of heterogeneous cellular networks interference with biased cell association using Poisson cluster processes. In Proceedings of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Republic of Korea, 22–24 October 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 319–324. [Google Scholar] [CrossRef]
  14. Arif, M.; Kim, W.; Qureshi, S. Interference Characterization in Cellular-Assisted Vehicular Communications With Jamming. IEEE Access 2022, 10, 42469–42480. [Google Scholar] [CrossRef]
  15. Sial, M.N.; Deng, Y.; Ahmed, J.; Nallanathan, A.; Dohler, M. Stochastic geometry modeling of cellular V2X communication over shared channels. IEEE Trans. Veh. Technol. 2019, 68, 11873–11887. [Google Scholar] [CrossRef] [Green Version]
  16. Dhillon, H.S.; Chetlur, V.V. Poisson Line Cox Process: Foundations and Applications to Vehicular Networks. Synth. Lect. Learn. Netw. Algorithms 2020, 1, 1–149. [Google Scholar] [CrossRef]
  17. Chetlur, V.V.; Dhillon, H.S. On the load distribution of vehicular users modeled by a Poisson line Cox process. IEEE Wirel. Commun. Lett. 2020, 9, 2121–2125. [Google Scholar] [CrossRef]
  18. Andrews, J.G.; Ganti, R.K.; Haenggi, M.; Jindal, N.; Weber, S. A primer on spatial modeling and analysis in wireless networks. IEEE Commun. Mag. 2010, 48, 156–163. [Google Scholar] [CrossRef]
  19. Andrews, J.G.; Gupta, A.K.; Dhillon, H.S. A primer on cellular network analysis using stochastic geometry. arXiv 2016, arXiv:1604.03183. [Google Scholar] [CrossRef]
  20. Osanaiye, O.; Alfa, A.S.; Hancke, G.P. A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 2018, 18, 1691. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  21. Del-Valle-Soto, C.; Mex-Perera, C.; Nolazco-Flores, J.A.; Rodríguez, A.; Rosas-Caro, J.C.; Martínez-Herrera, A.F. A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. Sensors 2021, 21, 1179. [Google Scholar] [CrossRef]
  22. Savva, M.; Ioannou, I.; Vassiliou, V. Fuzzy-logic based IDS for detecting jamming attacks in wireless mesh IoT networks. In Proceedings of the 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet), Pafos, Cyprus, 1–3 June 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 54–63. [Google Scholar] [CrossRef]
  23. Zhang, K.; Zhang, G.; Yu, X.; Hu, S.; Li, M. Clustering the sensor networks based on energy-aware affinity propagation. Comput. Netw. 2022, 207, 108853. [Google Scholar] [CrossRef]
  24. Zhou, Z.; Wei, Y. The Influence of Automatic Gain Control on Narrowband Frequency Domain GPS Anti-Jamming Receiver. In Proceedings of the 2021 IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China, 6–10 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 497–501. [Google Scholar] [CrossRef]
  25. Moussa, M.; Osman, A.; Tamazin, M.; Korenberg, M.J.; Noureldin, A. Direction of arrival estimation of GPS narrowband jammers using high-resolution techniques. Sensors 2019, 19, 5532. [Google Scholar] [CrossRef] [Green Version]
  26. Li, X.; Zhou, W.; Peng, J.; Shan, H. Joint beamwidth and resource optimization in ultra-dense MmWave D2D communications. Wirel. Netw. 2023, 29, 2093–2104. [Google Scholar] [CrossRef]
  27. Khan, M.Q.; Gaber, A.; Schulz, P.; Fettweis, G. Machine Learning for Millimeter Wave and Terahertz Beam Management: A Survey and Open Challenges. IEEE Access 2023, 11, 11880–11902. [Google Scholar] [CrossRef]
  28. Dong, Y.; He, C.; Wang, Z.; Zhang, L. Radio map assisted path planning for UAV anti-jamming communications. IEEE Signal Process. Lett. 2022, 29, 607–611. [Google Scholar] [CrossRef]
  29. Ma, N.; Xu, K.; Xia, X.; Wei, C.; Su, Q.; Shen, M.; Xie, W. Reinforcement learning-based dynamic anti-jamming power control in UAV networks: An effective jamming signal strength based approach. IEEE Commun. Lett. 2022, 26, 2355–2359. [Google Scholar] [CrossRef]
  30. Yu, J.; Gong, Y.; Fang, J.; Zhang, R.; An, J. Let Us Work Together: Cooperative Beamforming for UAV Anti-Jamming in Space-Air-Ground Networks. IEEE Internet Things J. 2022, 9, 15607–15617. [Google Scholar] [CrossRef]
  31. Wang, H.; Ding, G.; Chen, J.; Zou, Y.; Gao, F. UAV Anti-Jamming Communications with Power and Mobility Control. IEEE Trans. Wirel. Commun. 2022, 22, 4729–4744. [Google Scholar] [CrossRef]
  32. Rahmati, A.; Hosseinalipour, S.; Yapıcı, Y.; He, X.; Güvenç, I.; Dai, H.; Bhuyan, A. Dynamic interference management for UAV-assisted wireless networks. IEEE Trans. Wirel. Commun. 2021, 21, 2637–2653. [Google Scholar] [CrossRef]
  33. Amuru, S.; Dhillon, H.S.; Buehrer, R.M. An error probability analysis of jamming against wireless networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 23–27 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar] [CrossRef]
  34. Haroon, M.S.; Chae, S.H.; Jeon, S.W. Outage analysis for multi-radio heterogeneous networks in the presence of aerial jammers. ICT Express, 2023; in press. [Google Scholar] [CrossRef]
  35. Dabiri, M.T.; Hasna, M. Pointing Error Modeling of mmWave to THz High-Directional Antenna Arrays. IEEE Wirel. Commun. Lett. 2022, 11, 2435–2439. [Google Scholar] [CrossRef]
  36. Dabiri, M.T.; Hasna, M. 3D Uplink Channel Modeling of UAV-based mmWave Fronthaul Links for Future Small Cell Networks. IEEE Trans. Veh. Technol. 2022, 72, 1400–1413. [Google Scholar] [CrossRef]
  37. Dabiri, M.T.; Safi, H.; Parsaeefard, S.; Saad, W. Analytical channel models for millimeter wave UAV networks under hovering fluctuations. IEEE Trans. Wirel. Commun. 2020, 19, 2868–2883. [Google Scholar] [CrossRef] [Green Version]
  38. 3GPP TR 38.901 V14.1.1. Study on channel model for frequencies from 0.5 to 100 GHz (Release 17). In Technical Specification Group Services System; ETSI: Sophia Antipolis, France, 2017.
  39. Balanis, C.A. Antenna Theory: Analysis and Design; John Wiley & Sons: Hoboken, NJ, USA, 2015. [Google Scholar]
  40. Dabiri, M.T.; Rezaee, M.; Yazdanian, V.; Maham, B.; Saad, W.; Hong, C.S. 3D channel characterization and performance analysis of UAV-assisted millimeter wave links. IEEE Trans. Wirel. Commun. 2020, 20, 110–125. [Google Scholar] [CrossRef]
  41. Chiu, S.N.; Stoyan, D.; Kendall, W.S.; Mecke, J. Stochastic Geometry and Its Applications; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar] [CrossRef]
  42. Novlan, T.D.; Dhillon, H.S.; Andrews, J.G. Analytical modeling of uplink cellular networks. IEEE Trans. Wirel. Commun. 2013, 12, 2669–2679. [Google Scholar] [CrossRef] [Green Version]
  43. Olver, F.W.; Lozier, D.W.; Boisvert, R.F.; Clark, C.W. NIST Handbook of Mathematical Functions Hardback and CD-ROM; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  44. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef] [Green Version]
  45. Wang, Y.; Zhu, Q. Modeling and analysis of small cells based on clustered stochastic geometry. IEEE Commun. Lett. 2017, 21, 576–579. [Google Scholar] [CrossRef]
Figure 1. Non-clustered and clustered jammers in a U-V2X network.
Figure 1. Non-clustered and clustered jammers in a U-V2X network.
Mathematics 11 03434 g001
Figure 2. U-V2X system model with VNs, UAVs, and jammers.
Figure 2. U-V2X system model with VNs, UAVs, and jammers.
Mathematics 11 03434 g002
Figure 3. Outage probability of a typical VN as a function of τ with clustered and non-clustered jammers, and without jammers.
Figure 3. Outage probability of a typical VN as a function of τ with clustered and non-clustered jammers, and without jammers.
Mathematics 11 03434 g003
Figure 4. Outage probability of a typical VN as a function of P J with clustered and non-clustered jammers.
Figure 4. Outage probability of a typical VN as a function of P J with clustered and non-clustered jammers.
Mathematics 11 03434 g004
Figure 5. Outage probability of a typical VN as a function of non-clustered jammers with a fluctuating 3D beam width of the antenna.
Figure 5. Outage probability of a typical VN as a function of non-clustered jammers with a fluctuating 3D beam width of the antenna.
Mathematics 11 03434 g005
Figure 6. AP of a typical VN exploiting the UAV and the nearest VN against the number of UAVs, for a different number of UAV fluctuations.
Figure 6. AP of a typical VN exploiting the UAV and the nearest VN against the number of UAVs, for a different number of UAV fluctuations.
Mathematics 11 03434 g006
Figure 7. Outage probability of the typical VN considering uniformly distributed jammers as a function of UAVs and fluctuating 3D beam width of the antenna.
Figure 7. Outage probability of the typical VN considering uniformly distributed jammers as a function of UAVs and fluctuating 3D beam width of the antenna.
Mathematics 11 03434 g007
Figure 8. Outage probability of the typical node with clustered and non-clustered jammers and without jammers as a function of VNs.
Figure 8. Outage probability of the typical node with clustered and non-clustered jammers and without jammers as a function of VNs.
Mathematics 11 03434 g008
Figure 9. SE of the VN in the presence of clustered and non-clustered jammers as a function of P J .
Figure 9. SE of the VN in the presence of clustered and non-clustered jammers as a function of P J .
Mathematics 11 03434 g009
Figure 10. SE of a typical VN as a function of non-clustered jammers with fluctuating 3D beam width of the antenna.
Figure 10. SE of a typical VN as a function of non-clustered jammers with fluctuating 3D beam width of the antenna.
Mathematics 11 03434 g010
Figure 11. SE of the typical VN in the presence of non-clustered jammers and without jammers as a function of UAVs and fluctuating 3D beam width of the antenna.
Figure 11. SE of the typical VN in the presence of non-clustered jammers and without jammers as a function of UAVs and fluctuating 3D beam width of the antenna.
Mathematics 11 03434 g011
Figure 12. SE of the network with non-clustered jammers and without jammers as a function of roads and fluctuating antenna beam width.
Figure 12. SE of the network with non-clustered jammers and without jammers as a function of roads and fluctuating antenna beam width.
Mathematics 11 03434 g012
Table 1. Network parameters and numerical values.
Table 1. Network parameters and numerical values.
Network Parameter    Numerical Value    Network Parameter    Numerical Value
λ L 30 km/km 2 B 0.01
μ V 5/km 2 α V 3
μ U 10/km α U 3
h U 80 m N U 20
τ −5 dB N V 20
h b 30 m f c 95 GHz
P V 23 dBm B 3 GHz
P U 23 dBm λ c 2/km 2
P J 23 dBmJ2
r J 100 m σ , σ x , σ y 0
α J 3 λ J 4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Arif, M.; Kim, W. Analysis of U-V2X Communications with Non-Clustered and Clustered Jamming in the Presence of Fluctuating UAV Beam Width. Mathematics 2023, 11, 3434. https://doi.org/10.3390/math11153434

AMA Style

Arif M, Kim W. Analysis of U-V2X Communications with Non-Clustered and Clustered Jamming in the Presence of Fluctuating UAV Beam Width. Mathematics. 2023; 11(15):3434. https://doi.org/10.3390/math11153434

Chicago/Turabian Style

Arif, Mohammad, and Wooseong Kim. 2023. "Analysis of U-V2X Communications with Non-Clustered and Clustered Jamming in the Presence of Fluctuating UAV Beam Width" Mathematics 11, no. 15: 3434. https://doi.org/10.3390/math11153434

APA Style

Arif, M., & Kim, W. (2023). Analysis of U-V2X Communications with Non-Clustered and Clustered Jamming in the Presence of Fluctuating UAV Beam Width. Mathematics, 11(15), 3434. https://doi.org/10.3390/math11153434

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop