Next Article in Journal
Joint UAV Deployment and Task Offloading Scheme for Multi-UAV-Assisted Edge Computing
Next Article in Special Issue
Low-Complexity Three-Dimensional AOA-Cross Geometric Center Localization Methods via Multi-UAV Network
Previous Article in Journal
A Dual Aircraft Maneuver Formation Controller for MAV/UAV Based on the Hybrid Intelligent Agent
Previous Article in Special Issue
Digital Self-Interference Cancellation for Full-Duplex UAV Communication System over Time-Varying Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Collision Avoidance Strategy with D2D Communications for UAV Systems

Wireless System Laboratory, Wireless Network Research Center, National Institute of Information and Communications Technology (NICT), 3-4, Hikarino-Oka, Yokosuka 239-0847, Kanagawa, Japan
*
Author to whom correspondence should be addressed.
Drones 2023, 7(5), 283; https://doi.org/10.3390/drones7050283
Submission received: 31 March 2023 / Revised: 18 April 2023 / Accepted: 20 April 2023 / Published: 22 April 2023
(This article belongs to the Special Issue UAVs Communications for 6G)

Abstract

:
In recent years, safety operation issues related to the autonomous flight of unmanned aerial vehicles (UAVs) have become popular research and development topics worldwide. Among all UAV applications, multiple UAV-related applications are emerging due to the integration of UAVs into 6G networks, which is an important topic for next-generation wireless communication systems. For multiple UAV applications, flight safety among UAVs is the most significant issue. Therefore, collision avoidance for UAVs has become an emerging topic in UAV-related research. In the past, although many UAV collision avoidance methods have been proposed, there is still a probability of other problems, such as no possible avoidance route and unmanaged UAVs that are without centralized control, which both result in an unpredictable risk of collisions. In this study, we investigate the current existing methods and propose novel collision avoidance methods based on the elastic collision principle. To verify the performance of the proposed methods, we also conduct simulations in this paper to demonstrate their effectiveness. From the simulation results, it can be seen that the proposed methods can effectively perform collision avoidance for multiple UAVs. Specifically, using the proposed methods, all UAVs can reach their destination points within reasonable time resources without any collision, validating the effectiveness of the proposed methods.

1. Introduction

Unmanned aerial vehicles (UAVs), commonly known as drones, have gained widespread popularity in recent years due to their low cost and ability to perform a variety of tasks safely and efficiently. Applications for UAVs include logistics, surveillance, geographical measurement, and more. To enable autonomous UAV flight, a robust network for flight route control is essential, and many research groups around the world are devoted to this topic [1,2,3,4,5,6,7,8,9,10,11,12]. For example, in [1], a game theory-based method was proposed to address the channel assignment (CA) problem in UAV and device-to-device (D2D)-based networks. Meanwhile, Ref. [2] applied the non-orthogonal multiple access (NOMA) method to improve the sum rate performance for UAV communications. The probability of using UAVs for D2D communication and D2D communication’s performance were addressed in [3]. In [9], a dynamic route control method was proposed for UAV communications, which aimed to improve the throughput and delay performance. In [10], a trajectory and energy efficiency optimization method was provided for multi-user UAV air-to-ground networks. In [11], a self-adaptive UAV trajectory method for mobile computing was proposed. In [12], mobile edge computing was achieved through a UAV communication network. By leveraging UAV communications, researchers are exploring new methods to improve the performance and capabilities of autonomous UAV flight.
Flight route control is a crucial aspect of UAV research as it directly impacts flight safety. Therefore, many researchers have published related results in recent years [13,14,15]. For instance, in [13], the authors proposed an obstacle detection method to help avoid UAV collision incidents. In [14,15], the authors proposed delay prediction and traffic analysis methods for UAVs based on aviation big data. When multiple UAVs are working in a heavy traffic airspace, avoiding collisions becomes an important issue. The adoption of multiple UAVs has become increasingly popular in recent years, with many potential use cases in various industries, such as autonomous logistics, infrastructure inspection, emergency response and surveillance, and data collection for Internet of Things (IoT) applications.
The rapid development of highly mobile UAV groups may cause near-miss collisions between UAVs and aircraft. Without proper collision avoidance methods, there is a significant risk of UAV collision incidents when multiple UAVs are working in the same airspace. To address this issue, researchers have been exploring new collision avoidance methods for multi-UAV applications. These methods are essential for releasing the full potential of UAVs in various industries while maintaining flight safety.
There are two main categories of collision avoidance methods for UAVs: active and negative methods [16,17,18,19,20]. Active methods, also known as centralized methods, rely on a centralized control unit to manage flight routes and conditions in real-time, which helps the UAVs under management avoid collisions. However, if unmanaged UAVs appear in the vicinity, active methods are unable to avoid collisions as the centralized control network cannot identify them. Moreover, active methods require a constant cellular network connection, which limits their use in remote areas or during natural disasters.
In contrast, negative methods, also known as distributed methods, equip UAVs with flight control functions, enabling them to perform collision avoidance themselves. Negative methods do not require a centralized infrastructure on the ground, making them suitable for use even outside of cellular service areas. As a result, this study focused on investigating and proposing novel methods for improving the performance of negative-type collision avoidance methods. Negative methods offer several benefits over active methods, including independent operation, flexibility in deployment, and suitability for use in various environments. Improving the performance of negative methods can further enhance the safety and reliability of UAVs in numerous applications.
As mentioned above, the safe operation of multiple UAVs is crucial in various applications, and collision avoidance is a key factor in ensuring flight safety. In this paper, we propose a novel and effective method for performing collision avoidance for multiple UAVs using our designed D2D devices, which allow for UAV location information sharing through D2D communications [21,22,23]. Our method is a distributed-type collision avoidance approach based on the elastic collision principle, which utilizes D2D information sharing to prevent collisions between UAVs. Additionally, we introduce a variable weighting mechanism for each UAV to further improve the efficiency of our proposal. It should be noted that for D2D communications, the issue of security is an essential and emerging topic in recent years. However, many research groups have provided possible solutions, such as [24].
The rest of this paper is organized as follows. The system model and problem formation are provided in Section 2. The proposed method is described in Section 3. Simulations were conducted to verify our proposed method and are presented in Section 4. Finally, we provide the summary of our work in Section 5.

2. System Model

In this study, we consider a three-dimensional (3D) flight space in the real atmosphere where N D UAVs are randomly deployed. The N D UAVs deployed here are assumed to be all multi-rotor UAVs that can change their flying direction with acute angles. For convenience, we define a UAV set as D and write it as D : = { D 1 , , D n D , , D N D } , indexed with n D . The 3D coordinates of UAV n D in time t, p n D , t = ( x n D , t , y n D , t , z n D , t ) , are decided by the uniform distribution on the interval from X min to X max for the horizontal axis, Y min to Y max for the vertical axis, and Z min to Z max for the height axis, respectively. UAV n D flies to its specified destination d n D = ( x ^ n D , y ^ n D , z ^ n D ) with an initial velocity of v n D , 0 = ( v x , n D , 0 , v y , n D , 0 , v z , n D , 0 ) , and the speed | | v n D , 0 | | is assumed not to exceed the maximum speed V max , n D , which is limited by the physical conditions of the UAV n D . In actuality, v n D , 0 n D refers to the default navigation velocity, and the navigation velocity is invariant in our current system assumption for reducing system complexity. It should be noted that the maximum speed would affect the flying trajectories; we conducted simulations to evaluate its effect in Section 4.
We imagine a spherical alert area for each UAV and write the radius of the spherical space for UAV n D as
R n D = k n D v n D , 0 ,
where k n D is defined as a response time in seconds that it takes from receiving the signal to responding to an action. For instance, the parameter k n D = 2 means that it costs 2 s for UAV n D to make its speed change after receiving the signal. Each UAV is positioned in the center of its corresponding sphere during the entire flight process. We further configure a weight parameter m n D and an original arrive time t arr , n D for UAV n D to complete our avoidance method, which is proposed in the next section. An illustration of the considered UAV flight system is shown in Figure 1.
In the present study, time division duplex (TDD) wireless transmissions are employed for each UAV. On the transmit side, UAVs in D broadcast their information in a sequence based on the TDD principle with period T. The shared information of UAV n D at time t includes its position p n D , t , velocity v n D , t , alert radius R n D , weight m n D , and original arrive time t arr , n D and is mathematically expressed as
I n D , t = p n D , t , v n D , t , R n D , m n D , t arr , n D ,
where m n D is a weighting parameter that is used in the proposed collision avoidance methods and t arr , n D is the arrival time with which each UAV directly arrives at its destination based on the navigation velocity. The details about the parameters are described in the following sections.
On the receiver side, in general, the shared information transmitted by any UAV cannot arrive at the same time, and this arrived time is mainly dominated by the distance of the two different UAVs. For simplicity, here we assume a fixed mean delay τ n D for UAV n D to model the delay phenomenon of information sharing. An illustration of the TDD-based transmissions for the considered UAV flight systems is shown in Figure 2.
For the attenuation channels, considering that the UAVs are flying in an open atmospheric space that satisfies the conditions of the Fresnel zone [25], we introduce a path loss model to simulate signal transmissions among UAVs. Defining L n D , n D , t as the distance between UAV n D and UAV n D at time t, the received power in dB on UAV n D at time t can be calculated by [25]
ρ n D , t = P n D , t + G n D + G n D 20 log 10 4 π L n D , n D , t λ ,
where P n D , t is the transmit power of UAV n D at time t in dB. G n D and G n D are the antenna gains of UAV n D and UAV n D , respectively. λ is defined as the wavelength at operating frequency for all UAVs [26]. After the modulated signals pass through the channels and are received by the UAVs, demodulation of the shared information is performed. To better focus on the collision avoidance strategy, in the current study, we assume that the shared information is successfully obtained without any error if the received power ρ n D , t is greater than a received sensitivity ρ th ; otherwise, the shared information is discarded. Here, the value of received sensitivity ρ th is decided by the wireless systems that the UAV adopted. Every time a single UAV detects a change in its shared information represented by (2), the UAV starts to operate the collision avoidance function. In the following section, the proposed collision avoidance methods are introduced in detail.

3. Collision Avoidance Strategy

In this section, we study a collision avoidance strategy for the considered multi-UAV flight systems. To do so, we first provide some explanations about how UAVs arrive at their destinations in our systems and describe some potential security hazards. Thereafter, we propose two collision avoidance methods to solve the problems that we faced.
In common applications, multiple UAVs keep a steady velocity and independently fly alone toward their destinations following the system configurations. Basically, a UAV that is closer to its destination would be the first to complete its flight trip, and other UAVs arrive at their destinations in the order of travel distance if safety issues caused by collisions among UAVs are not considered. Based on this assumption, the original arrive time of UAV n D can actually be calculated by
t arr , n D = d n D p n D , 0 v n D , 0 ,
where p n D , 0 is the departure position and v n D , 0 is the initial velocity of UAV n D . In fact, however, frequent collisions are hard to ignore because of the increasing UAV density in flight space; therefore, it is unclear whether UAVs can reach their destinations. In the next subsection, we propose a distributed autonomous collision avoidance strategy to ensure that multiple UAVs reach their destinations without collisions.

3.1. Elastic Collision Principle-Aided Avoidance Strategy

The proposed avoidance method for the considered multi-UAV systems was inspired by the phenomenon of elastic collisions between spheres in the real physical world. The basic mechanics of the elastic collision can be described using the conservation of momentum principle. In an elastic collision, the total momentum of the system before the collision is equal to the total momentum of the system after the collision. In fact, elastic collisions play a role in many everyday physical processes. For example, when two objects collide and rebound from each other, this is an example of an elastic collision. In our UAV systems, a UAV with a spherical alert area can also be considered as a sphere object; thus, the collisions among UAVs can be modeled as an elastic collision process.
Benefitting from the embedded wireless communication systems and transport protocol, a UAV can collect and update flight data that are shared from other UAVs, such as position, velocity, and alert radius. Based on this information, the UAV can independently determine if it needs to make an action for avoiding and further calculate a velocity to avoid potential hazards if necessary. In our method, UAV n D decides that a collision caused by UAV n D occurs if condition
p n D , t p n D , t R n D + R n D
is true, where p n D , t and R n D are from the shared information I n D that is transmitted by UAV n D .
Once the above described collision is determined to occur by UAV n D , a velocity should be calculated to avoid potential hazards. According to the elastic collision principle [27], this velocity v ˙ n D , t can be obtained by
v ˙ n D , t = v n D , t v n D , t v n D , t , p n D , t p n D , t p n D , t p n D , t 2 p n D , t p n D , t ,
where v n D , t data are also from the shared information I n D . Note that because the maximum speed of the UAV is limited in practice, the result of (6) needs to be constrained. Finally, to avoid potential hazards, UAV n D changes velocity v n D , t to velocity v n D , t , where the latter is calculated by
v n D , t = v ˙ n D , t , v ˙ n D , t < V max , n D V max , n D v ˙ n D , t v ˙ n D , t , v ˙ n D , t V max , n D .
In fact, (6) is used to calculate velocity v ˙ n D , t for the case of a collision caused by another UAV. For the case of a collision caused by multiple UAVs, we need to consider each UAV that caused the collision and calculate the corresponding velocity change, then perform a vector synthesis over all of the velocities that we obtained. An elastic collision principle-aided method for calculating the velocity change for a multi-UAV-caused collision is summarized in Algorithm 1.
Algorithm 1: Elastic collision principle-aided avoidance method.
Drones 07 00283 i001
    After the calculation of velocity change v n D , t , UAV n D needs to keep this velocity during time duration ζ to avoid potential hazards. In the proposed avoidance method, if no other collision occurs during time ζ , the velocity of UAV n D is initialized by v n D , 0 , and UAV n D flies to its destination; otherwise, UAV n D performs the proposed collision avoidance method and resets time duration ζ . The whole flight with collision occurrence and avoidance is completed when UAV n D arrives at the destination or, in practice, flies a short distance δ from its destination. The decision condition of the end of the flight mission for UAV n D can be written as
p n D , t d n D δ .
A flowchart of UAV flights using the proposed collision avoidance method is shown in Figure 3 for a better understanding; note that this flowchart is independently performed by each UAV in the considered multi-UAV systems.

3.2. Advanced Elastic Collision Principle-Aided Avoidance Strategy

Obviously, the scenario of UAV flights without consideration of collisions can ensure an undoubted fairness in which the order that the UAV arrives at its destination is determined by the UAV’s arrival time. The arrival time is an initial parameter and is calculated by the departure position, arrival position, and velocity. This reasonable fairness can be easily guaranteed; however, there are collision hazards during the flight of UAVs because no avoidance strategy is introduced.
On the other hand, by employing our proposed avoidance method in Section 3.1, it is not difficult to ensure that the UAVs can complete their flight missions without collisions into each other. However, in this method, because the time, place, and object of collision occurrence are dynamically variable, and because one collision occurrence contributes to the production of another collision occurrence, the fairness, i.e., the arrival orders of the UAVs being the same as the original arrive time orders expressed in (4), cannot be generally ensured. We want to maintain the arrival order, but Algorithm 1 cannot achieve this.
Based on the above description, proposing an avoidance strategy that makes UAVs avoid collisions and arrive in order is necessary. Fortunately, considering the two facts that the mass in a physical elastic collision process also affects the velocity change and that the velocity of an object with a large mass is hardly changed by an object with a smaller mass, we introduce a weight parameter m n D for UAV n D D to control the arrive order of UAV. The core idea of this proposal is that a UAV with a smaller arrive time is assigned a larger weight and can thus hardly have its velocity changed.
Assume that UAV n D collided with a UAV collection C D ; the weight m n D for n D D c = C n D in the present study is set by
m n D = K q n D 1 ,
where K is a real number greater than zero and q n D is the order of UAV n D in collection D c . The numbers in collection D c are the numbers in D c arranged in descending order according to the arrive time t arr , n D and shared by I n D , t . We thereafter calculate the changed velocity v ˙ n D , t when a collision occurs between UAV n D and UAV n D by
v ˙ n D , t = v n D , t 2 m n D m n D + m n D v n D , t v n D , t , p n D , t p n D , t p n D , t p n D , t 2 p n D , t p n D , t .
Finally, in the same way as the proposed method in Section 3.1, we modify the velocity v ˙ n D , t by the maximum speed constraint expressed in (7). The advanced elastic collision principle-aided method for calculating the velocity change for a multi-UAV-caused collision is summarized in Algorithm 2. Similar to Section 3.1, the flowchart of UAV flights based on this method can be also found in Figure 3 for details.
Algorithm 2: Advance elastic collision principle-aided avoidance method.
Drones 07 00283 i002
It is worth noting that both methods proposed in this section used a maximum speed-limited elastic collision principle to calculate the velocity change when a collision occurred among UAVs. Obviously, if the maximum speed of each UAV is not limited, the elastic collision principle can work smoothly and theoretically ensures that UAVs are separated from each other after a collision. In reality, however, UAVs may not separate from each other as quickly as we thought because a speed constraint has been introduced. Simply speaking, the velocity calculated by (6) or (10) is necessary for avoiding a collision but is limited by (7). In the next section, we provide more evaluations on this speed constraint and summarize the key findings.

4. Computer Simulation

To verify the performance of the proposed collision avoidance methods, in this section, we conducted computer simulations using Matlab simulator and analyzed the simulation results. Here, we considered a special simulation scenario where all UAVs are flying towards the same destination at the center location, which is the worst case with the largest possibility of collision; we wanted to use this toughest case to validate the effectiveness of the proposed method. After each UAV arrives at its destination, it stops flying and lands on the ground. The two collision avoidance methods under evaluation are (a) the method using collision avoidance Algorithm 1 and (b) the method using collision avoidance Algorithm 2. The simulation parameters are listed in Table 1. It should be noted that in Table 1, the height axis range is set to be 0 to maximize the probability of collision for better evaluating our proposals. In the following paragraph, for the sake of simplicity, we denote method (a) as “ECP-AS” (elastic collision principle-aided avoidance strategy), and method (b) as “Advanced ECP-AS”, respectively. In Figure 4 and Figure 5, we simulate and show the flight traces of a multi-UAV system for method (a) using ECP-AS and method (b) using advanced ECP-AS as examples, setting N D = 3 for a better understanding.
Considering that Algorithm 2 is designed to maintain the characteristics of Algorithm 1 while also ensuring that the UAVs can arrive at their destination in their original order as much as possible, in Figure 6, we first show the cumulative distribution function (CDF) of the UAV arrival time for the above two methods, i.e., while using ECP-AS and advanced ECP-AS, using simulations with N D = 10 for three trials. Here, the arrival time means the elapsed time that each UAV flies from its starting position to the destination position. Aside from using the ECP-AS and advanced ECP-AS methods, the results of the case where all UAVs independently fly to the destination were also calculated and are shown in Figure 6, and it is marked as the “ideal case”. Based on the distribution shown in Figure 6, we found that, as we had anticipated, all UAVs using advanced ECP-AS reached their destinations in less time compared with ECP-AS. However, when compared with the ideal case, the UAVs spent more time. The main reason for this is that we introduced a weighting parameter m n D in Algorithm 2 to ensure that the UAV that should arrive at its destination first during each conflict does not change its flight direction. Instead, advanced ECP-AS introduces more time due to conflicts compared with the ideal case. Consequently, each UAV using advanced ECP-AS spends more time than the ideal case, but less time than those using ECP-AS.
Thereafter, we evaluated the avoidance effect caused by the proposed ECP-AS and advanced ECP-AS systems. To accomplish this, we need to define a parameter Δ n D , n D , t , which is named the intrusion distance of UAV n D to UAV n D at time t, and we calculate this distance using
Δ n D , n D , t = max R n D + R n D p n D , t p n D , t , 0 .
From (11), we can easily understand that the intrusion distance Δ n D , n D , t ranges from 0 to R n D + R n D , and UAV n D and UAV n D collide when Δ n D , n D , t = R n D + R n D for arbitrary time t; meanwhile, we can assume that risk of collision between two UAVs decreases with the decrease in Δ n D , n D , t .
In the considered multi-UAV flight systems, there are two potential parameters that may affect the above intrusion distance: one is period T for the TDD transmissions, and the other one is the mentioned maximum speed constraint V max , n D . The period T affects the frequency of information sharing, and a larger period T leads to a larger intrusion distance and a subsequently greater risk of collision between two UAVs because of serious delays occurring in information sharing processes. The introduced maximum speed constraint V max , n D breaks the completeness of the elastic collision principle and leads to an increase in the collision probability because two UAVs cannot separate in time after a collision has occurred. For simplicity, we define a parameter η n D to represent the ratio of the allowed maximum speed to the speed of the initial velocity of UAV n D , which is expressed as
η n D = V max , n D | | v n D , 0 | | .
In the following paragraph, we provide more evaluations to verify our explanation.
Figure 7 shows the CDF of the intrusion distance for T = 5 ms and T = 250 ms with a relatively loose maximum speed constraint of η n D = 10 n D D . Here, T = 250 ms means that the TDD transmission occurs four times every second, and T = 5 ms is the smallest realizable value for T considering the computational cost and complexity. From this figure, it can be seen that all intrusion distances in the overall observation time are less than the theoretical maximum R n D + R n D using both avoidance methods, which implies that the UAVs can reach their destinations safely without colliding with each other. Moreover, a higher frequency (i.e., smaller T) of information sharing can easily lead to smaller intrusion distance and better performance in the collision avoidance process, regardless of which avoidance method was adopted. The result confirmed our previous assumption about period T affecting the delay of information sharing. In addition, the curves also indicate that the advanced ECP-AS provides a better “0” intrusion distance (i.e., Δ n D , n D , t = 0 ) than the ECP-AS method, while this advantage decreases as T decreases.
To verify the effect caused by the maximum speed constraint, in Figure 8, we show the CDF of intrusion distance for η n D = 2 and η n D = 10 for all n D D with a better period condition of T = 5 ms . Similar to the effect caused by the period T, this figure indicates that all intrusion distances in the overall observation time are less than the theoretical maximum R n D + R n D using both avoidance methods, which further confirms that the UAVs completed their flight trips under the safest condition. Furthermore, a looser maximum speed constraint (i.e., larger η n D ) can also easily lead to a smaller intrusion distance and better performance in the collision avoidance process for both proposed avoidance strategies. The results support our opinion that the maximum speed constraint broke the completeness of the elastic collision principle used in the proposed avoidance strategies. In addition, the curves also indicate that the advanced ECP-AS method provides a better “0” intrusion distance than the ECP-AS method.

5. Conclusions

In this study, we investigated current collision avoidance methods and proposed novel collision avoidance methods, ECP-AS and advanced ECP-AS, for multi-UAV applications. Our proposed methods are based on the elastic collision principle and are designed as distributed-type methods to overcome problems caused by centralized-type methods. By conducting computer simulations, we found that our proposed methods can successfully avoid collisions within a reasonable arrival time. Moreover, our advanced ECP-AS method, which improves upon the ECP-AS method by using variable UAV weightings, outperformed the original ECP-AS method in term of arrival time and intrusion distance. This validates the effectiveness of our design ideas. Overall, our study contributes to the development of more efficient and effective collision avoidance methods for UAVs. In the future, we are planning to implement the collision avoidance methods in real UAV systems, which can help validate our proposals under practical situations. Moreover, our current work was performed without an optimization effort, and we plan to propose novel optimization methods to simultaneously suppress the energy consumption and avoid collision among UAVs in a future work.

Author Contributions

Conceptualization, L.S.; Methodology, L.S.; Software, L.S.; Validation, L.S.; Formal analysis, L.S.; Investigation, L.S.; Data curation, L.S.; Writing—original draft, L.S.; Writing—review & editing, L.S., H.-B.L., R.M., T.M. (Takashi Matsuda) and T.M. (Takeshi Matsumura); Visualization, L.S.; Supervision, T.M. (Takashi Matsuda); Project administration, L.S. and T.M. (Takeshi Matsumura); Funding acquisition, T.M. (Takeshi Matsumura). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tang, F.; Fadlullah, Z.M.; Kato, N.; Ono, F.; Miura, R. AC-POCA: Anticoordination game based partially overlapping channels assignment in combined UAV and D2D-based networks. IEEE Trans. Veh. Technol. 2018, 67, 1672–1683. [Google Scholar] [CrossRef]
  2. Liu, M.; Yang, J.; Gui, G. DSF-NOMA: UAV-assisted emergency communication technology in a heterogeneous Internet of Things. IEEE Internet Things J. 2019, 6, 5508–5519. [Google Scholar] [CrossRef]
  3. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs. IEEE Trans. Wirel. Commun. 2016, 15, 3949–3963. [Google Scholar] [CrossRef]
  4. Kawamoto, Y.; Nishiyama, H.; Kato, N.; Ono, F.; Miura, R. Toward future unmanned aerial vehicle networks: Architecture, resource allocation and field experiments. IEEE. Wireless Commun. 2018, 26, 94–99. [Google Scholar] [CrossRef]
  5. Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef]
  6. Shi, W.; Li, J.; Xu, W.; Zhou, H.; Zhang, N.; Zhang, S.; Shen, X. Multiple drone-cell deployment analyses and optimization in drone assisted radio access networks. IEEE Access 2018, 6, 12518–12529. [Google Scholar] [CrossRef]
  7. Wen, F.; Shi, J.; Gui, G.; Gacanin, H.; Dobre, O.A. 3-D positioning method method for anonymous UAV based on bistatic polarized radar. IEEE Internet Things J. 2023, 10, 815–827. [Google Scholar] [CrossRef]
  8. Chen, Y.; Zhu, L.; Yao, C.; Gui, G.; Yu, L. Global context-based threshold strategy for drone identification under the low SNR condition. IEEE Internet Things J. 2023, 10, 1332–1346. [Google Scholar] [CrossRef]
  9. Fadlullah, Z.M.; Takaishi, D.; Nishiyama, H.; Kato, N.; Miura, R. A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks. IEEE Netw. 2016, 30, 100–105. [Google Scholar] [CrossRef]
  10. Yao, Y.; Lv, K.; Huang, S.; Li, X.; Xiang, W. UAV trajectory and energy efficiency optimization in RIS-assisted multi-user air-to-ground communications networks. Drones 2023, 7, 272. [Google Scholar] [CrossRef]
  11. Subburaj, B.; Jayachandran, U.M.; Arumugham, V.; Amalraj, M.J.A.S. A self-adaptive trajectory optimization algorithm using fuzzy logic for mobile edge computing system assisted by unmanned aerial vehicle. Drones 2023, 7, 266. [Google Scholar] [CrossRef]
  12. Jeong, S.; Simeone, O.; Kang, J. Mobile edge computing via a UAV-mounted cloudlet: Optimization of bit allocation and path planning. IEEE Trans. Veh. Technol. 2018, 67, 2049–2063. [Google Scholar] [CrossRef]
  13. Gageik, N.; Benz, P.; Montenegro, S. Obstacle detection and collision avoidance for a UAV with complementary low-cost sensors. IEEE Access 2015, 3, 599–609. [Google Scholar] [CrossRef]
  14. Gui, G.; Liu, F.; Suu, J.; Yang, J.; Zhou, Z.; Zhao, D. Flight delay prediction based on aviation big data and machine learning. IEEE Trans. Veh. Technol. 2020, 69, 140–150. [Google Scholar] [CrossRef]
  15. Gui, G.; Liu, F.; Zhou, Z.; Wang, J.; Liu, F.; Sun, J. Machine learning aided air traffic flow analysis based on aviation big data. IEEE Trans. Veh. Technol. 2020, 69, 4817–4826. [Google Scholar] [CrossRef]
  16. Yasin, J.N.; Mohamed, S.A.S.; Haghbayan, M.-H.; Heikkonen, J.; Tenhunen, H.; Plosila, J. Unmanned aerial vehicles (UAVs): Collision avoidance systems and approaches. IEEE Access 2020, 8, 105139–105155. [Google Scholar] [CrossRef]
  17. Kim, C.Y.; Kim, Y.H.; Ra, W.-S. Modified 1D virtual force field approach to moving obstacle avoidance for autonomous ground vehicles. J. Electr. Eng. Technol. 2019, 14, 1367–1374. [Google Scholar] [CrossRef]
  18. Zeng, Y.; Hu, Y.; Liu, S.; Ye, J.; Han, Y.; Li, X.; Sun, N. RT3D: Real-time 3-D vehicle detection in LiDAR point cloud for autonomous driving. IEEE Robot. Autom. Lett. 2018, 3, 3434–3440. [Google Scholar] [CrossRef]
  19. Yan, C.; Wang, C.; Xiang, X.; Low, K.H.; Wang, X.; Xu, X.; Shen, L. Collision-avoiding flocking with multiple fixed-wing UAVs in obstacle-clustered environment: A task-specific curriculum-based MADRL approach. IEEE Trans. Neural Netw. Learn. Syst. 2023. early access. [Google Scholar] [CrossRef]
  20. Luo, L.; Wang, X.; Ma, J.; Ong, Y.-S. GrpAvoid: Multi-group collision-avoidance control and optimization for UAV swarm. IEEE Trans. Cybern. 2023, 53, 1776–1789. [Google Scholar] [CrossRef]
  21. Shan, L.; Miura, R.; Kagawa, T.; Ono, F.; Li, H.-B.; Kojima, F. Field tests on ‘Drone Mapper’ location information and remote ID sharing network in the 920MHz band for drones. In Proceedings of the IEEE WPMC, Chiang Rai, Thailand, 25–28 November 2018; pp. 1–6. [Google Scholar]
  22. Shan, L.; Miura, R.; Kagawa, T.; Ono, F.; Li, H.-B.; Kojima, F. Machine learning based field data analysis and modeling for drone communications. IEEE Access 2019, 7, 79127–79135. [Google Scholar] [CrossRef]
  23. Shan, L.; Li, H.-B.; Miura, R.; Kojima, F. Local information sharing system with wireless device-to-device communications. IEEE Access 2020, 8, 37453–37464. [Google Scholar] [CrossRef]
  24. Hasseb, K.; Rehman, A.; Saba, T.; Bahaj, S.A.; Lloret, J. Device-to-device (D2D) multi-criteria learning algorithm using secured sensors. Sensors 2022, 22, 2115. [Google Scholar] [CrossRef] [PubMed]
  25. Goldsmith, A. Wireless Communications; Stanford University: Stanford, CA, USA, 2004. [Google Scholar]
  26. Zhao, O.; Liao, W.-S.; Li, K.; Matsumura, T.; Kojima, F.; Harada, H. A lazy learning-based self-interference cancellation approach for in-band full-duplex wireless communication systems. Wirel. Commun. Mob. Comput. 2022, 2022, 1154325. [Google Scholar] [CrossRef]
  27. Raymond, D. 10.4.1 Elastic collisions. In A Radically Modern Approach to Introductory Physics; Fundamental Principles; New Mexico Tech Press: Socorro, NM, USA, 2016; Volume 1, ISBN 978-0-9830394-5-7. [Google Scholar]
Figure 1. An illustration of the considered UAV flight system with N D = 3 .
Figure 1. An illustration of the considered UAV flight system with N D = 3 .
Drones 07 00283 g001
Figure 2. An illustration of the TDD-based transmissions for the considered UAV flight systems with N D = 3 .
Figure 2. An illustration of the TDD-based transmissions for the considered UAV flight systems with N D = 3 .
Drones 07 00283 g002
Figure 3. A flowchart of UAV flights using the proposed collision avoidance method. The flowchart is independently performed by each UAV.
Figure 3. A flowchart of UAV flights using the proposed collision avoidance method. The flowchart is independently performed by each UAV.
Drones 07 00283 g003
Figure 4. Illustration of flight traces for the considered multi-UAV systems with N D = 3 using ECP-AS.
Figure 4. Illustration of flight traces for the considered multi-UAV systems with N D = 3 using ECP-AS.
Drones 07 00283 g004
Figure 5. Illustration of flight traces for the considered multi-UAV systems with N D = 3 using advanced ECP-AS.
Figure 5. Illustration of flight traces for the considered multi-UAV systems with N D = 3 using advanced ECP-AS.
Drones 07 00283 g005
Figure 6. The CDF of UAV arrival time for the proposed collision avoidance methods.
Figure 6. The CDF of UAV arrival time for the proposed collision avoidance methods.
Drones 07 00283 g006
Figure 7. The CDF of intrusion distance for different T with V max , n D = 100 m / s n D D .
Figure 7. The CDF of intrusion distance for different T with V max , n D = 100 m / s n D D .
Drones 07 00283 g007
Figure 8. The CDF of intrusion distance for different maximum speed constraint with T = 5 ms .
Figure 8. The CDF of intrusion distance for different maximum speed constraint with T = 5 ms .
Drones 07 00283 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Number of UAVs, N D 10
Horizontal axis range, [ X min , X max ] [ 150 , 150 ] in m
Vertical axis range, [ Y min , Y max ] [ 150 , 150 ] in m
Height axis range, [ Z min , Z max ] [ 0 , 0 ] in m
Destination, d n D (0,0,0) in m n D
Speed of initial velocity, | | v n D , 0 | | 10 m/s n D
Maximum speed, V max , n D 20 m/s, 100 m/s n D
Response time, k n D 3 s n D
Transmission delay, τ n D 0 s n D
Transmit power, P n D , t 23 dBm n D , t
Antenna gain, G n D 5 dBi n D
Operation wavelength, λ 3 × 10 8 / 920 × 10 6
Receive sensitivity, ρ th –120 dBm
Time duration for avoiding, ζ 2 s
Arrival condition parameter, δ 3 m
Weight parameter, K 10 3
Number of simulations3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shan, L.; Li, H.-B.; Miura, R.; Matsuda, T.; Matsumura, T. A Novel Collision Avoidance Strategy with D2D Communications for UAV Systems. Drones 2023, 7, 283. https://doi.org/10.3390/drones7050283

AMA Style

Shan L, Li H-B, Miura R, Matsuda T, Matsumura T. A Novel Collision Avoidance Strategy with D2D Communications for UAV Systems. Drones. 2023; 7(5):283. https://doi.org/10.3390/drones7050283

Chicago/Turabian Style

Shan, Lin, Huan-Bang Li, Ryu Miura, Takashi Matsuda, and Takeshi Matsumura. 2023. "A Novel Collision Avoidance Strategy with D2D Communications for UAV Systems" Drones 7, no. 5: 283. https://doi.org/10.3390/drones7050283

APA Style

Shan, L., Li, H. -B., Miura, R., Matsuda, T., & Matsumura, T. (2023). A Novel Collision Avoidance Strategy with D2D Communications for UAV Systems. Drones, 7(5), 283. https://doi.org/10.3390/drones7050283

Article Metrics

Back to TopTop