Ad Hoc Networks: Arnau Rovira-Sugranes Abolfazl Razi Fatemeh Afghah Jacob Chakareski
Ad Hoc Networks: Arnau Rovira-Sugranes Abolfazl Razi Fatemeh Afghah Jacob Chakareski
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
Survey paper
Keywords: Unmanned Aerial Vehicles (UAVs), as a recently emerging technology, enabled a new breed of unprecedented
UAV networks applications in different domains. This technology’s ongoing trend is departing from large remotely-controlled
Artificial Intelligence drones to networks of small autonomous drones to collectively complete intricate tasks time and cost-
Predictive networking
effectively. An important challenge is developing efficient sensing, communication, and control algorithms
Self-adaptive learning-based protocol
that can accommodate the requirements of highly dynamic UAV networks with heterogeneous mobility
levels. Recently, the use of Artificial Intelligence (AI) in learning-based networking has gained momentum to
harness the learning power of cognizant nodes to make more intelligent networking decisions by integrating
computational intelligence into UAV networks. An important example of this trend is developing learning-
powered routing protocols, where machine learning methods are used to model and predict topology evolution,
channel status, traffic mobility, and environmental factors for enhanced routing.
This paper reviews AI-enabled routing protocols designed primarily for aerial networks, including topology-
predictive and self-adaptive learning-based routing algorithms, with an emphasis on accommodating highly-
dynamic network topology. To this end, we justify the importance and adaptation of AI into UAV network
communications. We also address, with an AI emphasis, the closely related topics of mobility and networking
models for UAV networks, simulation tools and public datasets, and relations to UAV swarming, which serve
to choose the right algorithm for each scenario. We conclude by presenting future trends, and the remaining
challenges in AI-based UAV networking, for different aspects of routing, connectivity, topology control, security
and privacy, energy efficiency, and spectrum sharing.1
∗ Corresponding author.
E-mail address: ArnauRovira@nau.edu (A. Rovira-Sugranes).
1
This material is based upon the work supported by the National Science Foundation under Grant No. 2008784.
https://doi.org/10.1016/j.adhoc.2022.102790
Received 12 August 2021; Received in revised form 13 December 2021; Accepted 22 January 2022
Available online 19 February 2022
1570-8705/© 2022 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-
nc-nd/4.0/).
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
1.1. Motivation
2
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Table 1
Most recent survey papers for routing protocols in Wireless Sensor Networks.
Year Survey Content included Drawback Application domain
SDN-based routing, monitoring, cellular, satellite,
Does not include routing protocols beyond SDN-
[33] security, placement, evaluation tools and future SDN-based UAV networks
based methods.
challenges.
2020
UAV classification, application, mobility models, The review of predictive methods is not complete.
[34] routing protocols classification, challenges and open It also excludes self-adaptive learning-based routing UAV networks
issues. protocols.
UAV communication networks issues, characteris-
[29] tics, design, applications, routing protocols, quality Does not consider learning-based routing protocols. UAV networks
of service, and future open research areas.
Network architecture and design, routing protocols
[35] including performance analysis and QoS metrics, Routing classification only includes a few methods. UAV networks
and opening issues.
UAV-UGV coordination, data gathering, monitor- Only considers routing methods for UAV-assisted
[36] ing, cellular communications, disaster management, networks, excluding routing protocols for UAV-to- UAV-assisted networks
computing and UAV-assisted routing. UAV communications.
Only considers routing protocols for UAV-aided ve-
Routing protocols for UAV-aided vehicular ad hoc
[37] hicular networks, excluding routing for UAV-to-UAV UAV-aided vehicle networks
networks with open research issues and challenges.
communications.
UAV design, architecture, routing protocols, open AI-enabled routing protocols and their impact in
2019 [38] UAV networks
issues and research challenges. dynamic networks are missing.
Architecture, mobility models, routing techniques
Self-adaptive learning-based methods are not con-
[39] and protocols with a comparative study. Future UAV networks
sidered.
challenges are also included.
UAV routing schemes, including objectives, chal-
It only briefly mentions adaptive routing protocols,
[40] lenges, routing metrics, characteristics, and perfor- UAV networks
missing most of the AI-enabled routing protocols.
mance measures, along with open issues.
Routing protocols comparison and open research Does not include AI-enabled routing protocols,
2018 [41] UAV networks
issues. among others.
Most of the routing protocols are suitable for
Single-layer and cross-layer routing, challenges and
[42] vehicular networks, but not defined for UAV Vehicular ad-hoc networks
open research directions.
2017 Networks.
UAV architectures, projects, characteristics, applica-
Does not consider AI-enabled routing protocols and
[43] tions and routing protocols, with emphasis in UAV UAV networks
future trends.
security challenges.
Position-based routing protocols with a detailed
Includes position-based routing protocols only,
[44] description and comparative study. Also, mobility UAV networks
which is just one type of UAV routing.
models and UAV applications are described.
UAV technology, UAV networking, UAV swarm for-
mation, mobility models, UAV routing protocols,
Our survey tools and public datasets to simulate real UAV NA UAV networks
network environments, future trends and remaining
issues for UAV networking.
The rest of this paper is organized as presented in Fig. 1. In Sec- Here, we closely discuss the most notable papers from the last
tion 2, we investigate recently published survey papers to highlight the three years only, since newer papers usually tend to improve previous
new content and additional aspects covered by our paper. Next, we re- reviews and cover the most recent developments. In addition to recent
view the UAV technologies used in military, industrial and commercial studies, we also consider two fairly older papers for their remarkably
applications in Section 3. In Section 4, we emphasize the role of AI unique content. One paper is [45], which provides a thorough review of
methods in improving the performance of UAV networking. Section 5 routing protocols in inter-vehicle communication systems. This paper
presents commonly used networking protocols, and UAV swarm forma- covers broadcast-based routing, multicast, and geocast-based routing,
tion methods are presented in Section 6. In Section 7, commonly-used as well as unicast-based routing protocols, which is perhaps the most
UAV mobility models, and their impact on key networking character- complete review for routing protocols developed for vehicular net-
istics, including connectivity, channel models, network topology, and works. Another review is a seminal paper by Gupta et al. [23] published
routing efficiency, is investigated. Fundamentals of conventional and in 2015, which offers a broad outlook and comprehensive review of
AI-enabled routing protocols, along with their stability under dynamic important issues in UAV networks. Also, it reviews the concept of
conditions, are provided in Section 8. Tools, public datasets, and re- routing in networks subject to severe delays and disruptions, which is
mote experimentation infrastructures for testing routing protocols are unique among the published papers.
reviewed in Section 9. Future trends and remaining issues are discussed A survey paper by Awang et al. in 2017 [42] provides a review
in Section 10, followed by concluding remarks in Section 11. of routing protocols for vehicular ad hoc networks describing existing
single-layer and cross-layer routing algorithms. It offers a fluent review
2. Related work of routing protocol for VANETs along with a clear description of
the advantages and disadvantages of each method. However, most of
There are a few recent review papers that survey routing protocols the methods mentioned in this paper are designed for VANETs, and
for ground and aerial networks. Other related papers that review UAV not suitable for FANETs with substantially different constraints and
networks survey a broader set of aspects. Table 1 summarizes key topics requirements.
covered in these surveys, along with key topics missing in each paper. A review of routing protocols and security challenges in UAV net-
To our knowledge, no paper provides a comprehensive and up-to-date works is provided in [43]. This paper reviews different routing proto-
review of AI-based routing protocols for aerial networks, which is our cols developed for dynamic networks. Nevertheless, it does not include
central focus. an important and emerging trend of AI-enabled routing protocols.
3
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
4
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
5
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
(QoS) both from the technical and feasibility, and economic points of
view. Some efforts have been made to create a nationwide and high-
speed broadband wireless network for public safety communications.
For example, FirstNet offers a solution to deploy, operate, maintain, and
improve the first high-speed, nationwide wireless broadband network
dedicated to public safety that could apply to UAV networks in the
near future [83]. The potential broadband wireless technologies include
WiFi, 4G Long Term Evolution (LTE), 5G (with the 3rd Generation
Partnership Project (3GPP) standard on 5G communication for drones),
satellite communications, and dedicated public safety systems such
as TETRA and APCO25. Also, Long Range Wide Area Network (Lo-
RaWAN), which enables long-range communications at low powers,
when high throughput is not necessary [84–86].
The following is a review of the most commonly used protocols in
Fig. 4. Scenario showing the importance of predictive routing [80].
UAV networks, emphasizing their capability in handling the dynamicity
of the network topology.
5.1. Wi-Fi
Most commercial UAVs use Wi-Fi (IEEE 802.11 series) for their
communications, especially to a ground station (e.g., command and
control commands in the uplink and video streaming in the down-
link), as a low-cost, scalable, and affordable solution. Wi-Fi-based UAV
networks can also be used for wireless backhauling [87]. Also, inter-
drone communications can be powered by Wi-Fi provided that one
node is defined as the Access Point (AP) to implement a local WLAN.
This node may or may not provide access to the Internet. Apparently,
one drawback of Wi-Fi is handling mobility and hand-off between
the base stations, limiting the operation range of drones within direct
access to the AP to a few miles. Although the throughput of Wi-Fi
(theoretically between 54 Mbps for 802.11a to as high as 2.4 Gbps for
802.11ax [88]) is relatively lower than LTE and 5G, it is sufficient for
most applications, including real-time high-resolution video streaming.
Fig. 5. UAV Networking from different standpoints. In scenarios that long-range connectivity is required, Wi-Fi loses the
game to licensed wireless systems when such networks are available.
Some drones develop their proprietary communication protocol on
(represented by blue arrows) based on the original positions (blue top of Wi-Fi. For instance, the XFold spy x8 KDE U3 drone by Xfold
circles). In contrast, a predictive routing selects the path shown by red Rigs [89] comes with a Futaba Commercial 14-channel.
color (1-2-4-5), taking into account the predicted network topology
change (i.e., the position of the nodes when met by the data packets),
while the packet is waiting in the transmission buffer of node 2. 5.2. LTE
5. UAV networking protocols LTE systems offer airborne connectivity beyond the LoS communi-
cations for drones. They improve the throughput and network connec-
Different communication protocols can be used to transfer data tivity due to the hard and soft hand-over mechanism [90]. Recent years
among drones, to/from satellite and aerial control units through Air have witnessed a surge of activities in using terrestrial LTE networks to
to Air (A2 A) communications, and from Air to Ground (A2G) (Fig. 5). provide connectivity to UAVs. A collaborative project has been initiated
Ground-based stations include standalone control units, larger servers, by FAA and the National Aeronautics and Space Administration (NASA)
Internet gateways, and edge computers. As shown in Fig. 6, networking in the U.S. since January 2017 to build a system using LTE technology.
can be studied from different perspectives, especially from the commu- To better understand the potential of LTE for small UAVs, the 3GPP has
nication, computation, and scheduling requirements and constraints.
formed a study group to investigate enhanced LTE support for aerial
Most of the aerial monitoring platforms utilize ground-based or web-
vehicles since March 2017 [91]. The most notable drawback of using
based servers for bulk processing, where drones collect and offload
LTE and other cellular systems is the need to register drone transmitters
raw information into processing units. However, alternative methods
with a service provider, which increases the operation cost and restricts
such as on-the-fly processing using embedded light-weight GPUs/TPUs,
the operation of drones to areas covered by the service provider. This
Mobile Edge Computing (MEC), and fog computing for accelerated
and near real-time processing are gaining more momentum recent is why using cellular systems is not as popular as Wi-Fi for drones.
years [81,82]. Another key issue is that the LTE propagation plannings typically
In most cases, the operation area is vast, far beyond the Line of Sight aim to serve the ground users; hence, the propagation maps are not
(LoS) communication range of a single UAV, hence using networked optimized for aerial nodes. Therefore, LTE radio planning requires
UAV platforms is unavoidable to ensure connectivity. One of the key substantial revisions to serve UAV networks, especially when they
design questions is choosing the best wireless technology (e.g., WiFi, scale up to large networks at higher altitudes and with a high-varying
LTE bands) with enough capacity and an acceptable Quality of Service topology.
6
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
5.3. 5G protocols, most of which have not yet been commercialized. For in-
stance, the idea of spectrum sharing and spectrum leasing for drones is
Similar to LTE, 5G is also considered for drone communications proposed to extend the connectivity of drones for high-speed and tem-
when higher bitrates beyond 2.4 Gbps are required. It also enables the porary service when wireless coverage is accessible, which integrates
concept of Internet of Things (IoT) for drones, where a drone serves WiFi and Cellular access [101,102]. Also, beamforming can extend
as a thing [92]. UAV-assisted communications have several promising the communication range further and reduce the interference [103].
advantages such as facilitating on-demand deployment, high flexibility Indeed, UAVs provide a realistic scenario for distributed and coopera-
in network reconfiguration, and enabling long-range LoS communi- tive beamforming, since transmit antennas can be spatially separated
cation links. In some scenarios, drones serve as 5G radio stations among UAVs [104]. The authors of this paper have proposed AI-
(also called AP) to extend the coverage of 5G networks for ground enabled routing [105], compression [106], and task coordination [107]
users, especially for sensitive applications, such as public safety and protocols to minimize the unnecessary information exchange among
post-disaster management [93–95]. the UAVs and prolong their mission time.
The demand for higher throughput and bigger numbers of devices The concept of using UAV swarms is gaining more momentum in
never stops, and 6G is on the way to serve these requirements. 6G, recent years. The idea is to use a sheer number of drones, in most cases
the next generation for wireless communication, is expected to provide miniaturized and limited-capability drones, to collectively perform a
intelligent, secure, reliable, and limitless connectivity at rates 100 times complicated mission with no or minimal operator intervention. This
faster than 5G [96]. Similar to 5G, we expect that the UAV networks’ approach mitigates the drawbacks of using a single drone, such as lim-
diverse requirements such as low latency, reliability, and energy effi- ited allowable payload and limited sensing and actuation capabilities. A
ciency will be better served by 6G networks, and aerial nodes will be an general architecture for task order in swarm environments is presented
integral part of 6G networks. Also, network intelligence is envisioned in [108].
to be a key feature of 6G, which can assist in many connectivity-
related applications [97], for example, in a blockchain-based solution 6.1. Swarming advantages
for UAV communications [98]. Some of the challenges brought by the
futuristic concept of connected sky include high mobility, interference, The main advantages of using UAV swarms include shortening the
and connection to down-tilted antennas. It is expected that aerial nodes, task completion time, extending the coverage area, and reducing the
when integrated into terrestrial nodes, will be instrumental in covering operation cost. In the military domain, UAV swarms also increase the
such issues and enhancing the 6G user experience. tactical mission’s success rate by eliminating the reliance of the mission
on a single drone’s functionality, which can be subject to cyber-attacks
5.5. AI benefits in UAV networking and hijacking by an adversary. Using UAV swarms can also increase
the unpredictability of the mission and overwhelm the enemy’s defense
Artificial intelligence for UAV networking can help with the relia- system with a large number of potential targets in an interactive
bility, connectivity, and security of wireless communication by offering battleground. Further, UAV swarms are used to collectively find and
data-driven solutions for key challenges of interference management, fight enemy targets [109]. These ideas were behind the US navy’s LO-
mobility management, and handover, cyber–physical attacks, and au- CUST project to design UAV swarm attacks [13]. Also, swarm systems
thentication [99]. For instance, [100] uses AI to predict transmission can be equipped with anti-jamming systems to more efficiently block
success and failures, to anticipate and avoid networking issues. cyber attacks [110]. UAV swarms which incorporate an authentication
Among the aforementioned communication protocols, the most ap- protocol using Physical Unclonable Functions (PUFs) can authenticate
propriate one should be selected based on the application-specific multiple devices at once with high scalability while being resistant to
constraints and requirements. Several research efforts have been de- mobility, and multiple cyberattacks such as physical capture, cloning
voted to implementing new networking algorithms on top of these attacks, eavesdropping, and man-in-middle attacks [111,112].
7
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
The use of UAV swarms is not limited to military applications. a central controller’s function [114]. This architecture takes advantage
They enable search and rescue missions over big areas [113]. Some of the high mobility and networking efficiency of M2M communication
agriculture duties such as watering or identifying sick plants are time- in LTE, and 5G wireless systems [122–125].
consuming, and using UAV swarms with minimal operator intervention
would increase the efficiency of precision agriculture [114]. More
applications for UAV swarms can be found in [115]. 6.3. Artificial swarm intelligence
6.2.2. Ad-hoc structure-free architecture In this section, we investigate the impact of node mobility on data
This architecture allows direct communication between UAVs with transmissions. We first review popular UAV mobility models as well as
no need for APs or routers, and can utilize distributed decision making the techniques used to predict UAV mobility and network topology. We
(Fig. 7(b)). This method eliminates the sensitivity of the mission to the also review the challenges that mobility brings to connectivity control
GCS function and relaxes the constraints on the mission area. The cost
and optimal routing.
paid is the need for more capable UAVs for local decision making and
a routing protocol to accommodate dynamic network topology [120,
121]. 7.1. UAV mobility models
8
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
7.1.1. Random WayPoint (RWP) [131,132] 7.1.7. Distributed pheromone repel model [143]
This segment-wise model includes linear and independent motions This model uses a pheromone map to guide UAVs in reconnaissance
with constant speed and direction between a set of points called way- scenarios. Each UAV maintains its own pheromone map, and scans the
points. Also, UAVs decide on their next action based on some fixed area of the corresponding map. The UAVs share information every few
probabilities, and their motion does not depend on neighbor nodes. seconds to create a global pheromone map. UAVs turn right, left, or go
According to [133], RWP has two important variants, Random Walk straight with probabilities based on the pheromone smell. UAVs prefer
Model (RWM) and Random Direction Model (RDM) [134]. This model areas with a low pheromone smell, so new areas are scanned. This
can be used for both rotary and fixed-wing drones, and is the most model results in good scanning properties, but does not consider the
appropriate for missions with pre-path planning.
network connectivity between UAVs that serve different areas.
9
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
7.2.2. Model-based topology is known for a central node, which can share with network
In this approach, the smoothness of the motion paths is used to members. Therefore, the source node can execute a local algorithm to
predict the future locations of mobile objects, typically in an online find the optimal end-to-end path. In distributed algorithms, the nodes
fashion. These methods include piecewise segment methods [155], are not aware of the entire network topology, and they have partial
Hidden Markov Models (HMM) [149], Levy flight process [136–138], knowledge about their local subnetwork topology. In these methods,
Bayesian methods [156,157], Manifold learning [158], Kalman filter- either sequential methods are used to break down finding the optimal
ing [159,160], fuzzy zone-based method [156] and mixture Gaussian end-to-end path into piece-wise sub-problems; or methods like ‘‘hello
models [156]. Each method relies on a model that is appropriate for a messages’’ are used to discover the network topology.
different class of mobile objects, including pedestrians, indoor mobile
Routing algorithms can also be classified into deterministic and
users, vehicles, etc. Indeed, these methods rely on an underlying model,
probabilistic algorithms based on the optimization approach or equiv-
which is customized for a specific object with a different mobility
alently the resulting route’s randomness (Fig. 8, layer 2). Deterministic
model such as random walk [161], Random Waypoint (RWP) [162],
HMM [149], Gaussian Morkov Mobility Model (GMMM) [163], Brown- routing refers to a non-stochastic decision-making policy, where the
ian motion [164], Linear model via Durbin’s curve [165], and mixture resulting routes are fully and explicitly determined under given assump-
models [166]. Consequently, they are not applicable to a network of tions, network conditions, and decision rules. On the other hand, in
heterogeneous nodes and fail in balancing between the randomness and probabilistic algorithms, the resulting routes are probabilistic; hence
predictability of node’s mobility. the actual paths are selected in run-time by the nodes based on a set of
rules and probabilities.
7.3. Mobility-related networking challenges From a different standpoint, we can classify routing protocols into
static and dynamic routing protocols (Fig. 8, layer 3). In static routing
High mobility nodes, especially when not properly predicted, pose protocols, the route is established based on the initial network topology
critical challenges to the communication performance in terms of con- without considering the changes which occur during the transmission.
nectivity and routing optimality. Mobility of nodes translates to the These algorithms are appropriate for static networks and low-volume
network dynamicity that can disrupt the information exchange by transmissions. On the other hand, in dynamic routing protocols, the
losing connectivity and undermining the routing efficiency. In extreme resulting end-to-end path can change over time to accommodate node
cases, the network can breakdown into isolated islands. Different ap-
mobility. Therefore, they are more suitable for UAV networks and will
proaches can be taken to overcome the loss of connectivity in UAV
be discussed in more detail in this paper. Dynamic routing algorithms
networks. One main approach is topology control to avoid connectivity
have different variants based on how paths are determined in response
issues, which can be seen as jointly optimizing the networking and
to network topology changes. Main categories include proactive, re-
control aspects. For instance, the idea of the dynamic placement of new
nodes in locations to cover connectivity holes is introduced in [167]. active, hybrid, position-based, topology predictive, and self-adaptive
ML methods can assist with achieving this goal by modeling and learning-based routing methods.
predicting network topology, traffic mobility, spectrum availability, To investigate the performance of different routing protocols in
and channel states. An online learning procedure is used in [168] UAV networks, we first present the key characteristics of these routing
to adjust the UAVs to their radio transmission parameters, based on methods in Table 2. Next, we review different implementations of each
the perceived topology while revising their flight paths. The authors category and investigate their use for highly dynamic UAV networks.
of [169] propose a Chaotic Ant Colony Optimization approach (CA-
COC) to maximize the coverage area while preserving the connectivity.
Another method to improve network connectivity is ECORA [170]. This 8.1. Conventional routing protocols
method uses geographic protocols considering positioning prediction
and link expiration time by excluding links with approaching expiration In this section, we briefly review routing protocols that were mainly
time from the path selection algorithm. These methods usually aim introduced for low-speed ad hoc networks. These routing protocols
to enhance network connectivity by controlling the network topology. do not adapt to high mobility and abrupt changes we find in UAV
Recently, the idea of using predictive and self-adaptive learning-based networks. Therefore, most of them are not applicable for high-speed
routing protocols gained a lot of attention to use ML methods to UAV applications.
enhance networking efficiency. One approach is predicting network
topology changes and incorporating the predicted network topology
into the networking decisions [105,171]. These methods are more 8.1.1. Static routing protocols
appropriate for separating the networking layer from mission-based Static protocols are mainly designed for networks with static or
path-planning algorithms. Also, prediction-based positioning is more slow-varying topology, meaning that the optimal end-to-end path for
appropriate for scenarios that the nodes have limited connectivity any source–destination pair does not change over time. Static routing
or on-demand link establishments which are costly to share location algorithms consider the initial network topology when finding the
information, nodes which are prohibited from sharing their locations best path. Generally, in this approach, the global network topology
for privacy and security concerns, nodes which belong to different
is known to a central node (which can also be shared with network
and even adversary and competing networks, and nodes whose motion
members). Therefore, the optimal paths for all source–destination
trajectories are subject to constant changes due to using autonomous
nodes are calculated and programmed in terms of routing tables. In
on-the-fly control systems.
other words, each intermediate node receives a packet, passes the
8. Routing protocols for UAV networks packet to the next node determined by the routing tables based on
the destination address. These algorithms are suitable for structured
This section reviews routing protocols, emphasizing the role of ML networks, but some modified versions are proposed for UAV net-
methods to accommodate the requirements of UAV networks. works. Examples of such algorithms include shortest path algorithm
Routing protocols can be categorized in many different senses, as (Dijkstra’s and Bellman–Ford’s algorithms) [172], shortest-path-aided
shown in Fig. 8. Regardless of their reaction to topology changes, back-pressure [173], Multi-Level Hierarchical Routing (MLHR) [174],
routing algorithms can be divided into centralized and distributed algo- Load Carry and Deliver Routing (LCDR) [174], and Data-Centric Rout-
rithms (Fig. 8, layer 1). In centralized algorithms, the global network ing [174].
10
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Fig. 8. Routing classification based on different criteria and dynamic types of routing protocols.
Table 2
Types of routing.
Routing protocol Central/distributed Deterministic/Probabilistic Scalable Mobility Global info Discovery message AI aspect
Static Central Deterministic Yes Static Yes No No
Position-based Distributed Deterministic Yes Low speed No No No
Proactive Distributed Deterministic Bigger overhead Low speed Yes Hello message No
Reactive Distributed Deterministic Longer RREQ Low speed No RREQ & RREP No
Hybrid Distributed Deterministic Complexity Low speed No Hello message No
Hierarchical Distributed Deterministic Yes, into clusters Low speed Yes Hello message No
Probabilistic Distributed Probabilistic Adds complexity Low speed Yes No No
Topology predictive Distributed Deterministic Yes Dynamic No Depends Yes
Self-adaptive learning-based Distributed Deterministic Yes Dynamic No Depends Yes
11
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
8.1.5. Position-based routing protocols • Predictive Dijkstra’s [80,105]: This routing protocol assumes
Position-based routing protocols find the optimal route based on that the intermediate nodes’ locations when the packet is sup-
the location information. For example, the next node can be selected posed to meet them are predicted using ML methods. Then, it
based on its distance to the current node or to the destination. The incorporates this predictive information into the path selection
key disadvantage of these methods are their dependence on accurate criterion based on Dijkstra’s shortest path algorithm. Results show
positioning and tracking systems. Some important implementations of superior performance compared to the standard Dijkstra’s algo-
position-based routing algorithms proposed for UAV networks include: rithm, especially when higher velocities are applied. The achieved
Greedy Perimeter Stateless Routing (GPSR) [196], Greedy–Hull–Greedy performance gain is dependent upon the prediction accuracy. Two
(GHG) [197], Greedy–Random–Greedy (GRG) [198], greedy forward- important shortcomings of this method is its reliance to accurate
ing [199], Energy-Balanced Greedy forwarding Routing (EBGR) [200], trajectory prediction methods, and the need for global location
Greedy Distributed Spanning Tree Routing (GDSTR) [201], Cross-layer
information exchange.
Link quality and Geographical-aware beaconless Opportunistic routing
• Predictive greedy routing [32]: Distance-based greedy routing
(Xlingo) [202], Adaptive Forwarding Protocol (AFP) [203], Reactive-
algorithm solves the issues of [105] and relies solely on the UAVs’
Greedy-Reactive (RGR) [204], scoped flooding and delayed route re-
local observations of their surrounding subnetwork. Each node
quest RGR [205], beaconless opportunistic routing [206], Location-
estimates the location of its neighbors (e.g., using model-based
Oriented Directional MAC (LODMAC) [207], Extremely Opportunistic
Routing (ExOR) [208] and Location-Aided Routing (LAR) [209]. object motion trajectory prediction) and selects the next node
that makes maximum progress toward the destination node. This
8.1.6. Hierarchical routing protocols method adapts to highly dynamic network topology. Moreover, it
Hierarchical routing protocols consider nodes arranged hierarchi- has low complexity and low overhead with no need for an initial
cally, where the lower layers can form clusters. Each node typically route setup. Simulation results show considerable improvement,
holds information only about its neighbors stored in a table that is compared to centralized shortest path routing algorithms.
updated through hello packets. Each cluster head communicates with • Predictive Optimized Link State Routing (P-OLSR) [217,218]:
the rest of the cluster heads to select the best path. Cluster-Based Rout- This routing protocol is an advanced version of OLSR routing
ing Protocol (CBRP) [210], Enhanced Cluster head Gateway Switch protocol. This algorithm exploits GPS information and calculates
Routing (ECGSR) [211] and Fisheye State Routing (FSR) [212,213] are an Expected Transmission (ETX) count metric to estimate the
examples of recently-developed algorithms for UAV networks. quality of the link when finding the optimal path. Numerical
results show that the P-OLSR outperforms other algorithms such
8.1.7. Probabilistic routing protocols as OLSR and BABEL under dynamic network topology.
Probabilistic routing protocols find multiple routes from source to • Geographic Position Mobility Oriented Routing (GPMOR)
destination, which can be selected based on probabilistic mechanisms [219]: This routing protocol proposes an efficient and effective
to cope with network congestion and security. Some examples of these geographic-based routing protocol that uses the Gauss–Markov
algorithms used in UAV networks are random walk routing [214] and mobility model to predict the movement of UAVs to eliminate the
MIMO-based random walk routing [215].
impact of highly dynamic movements. This approach selects the
next hop according to the mobility relationship in addition to the
8.2. AI-enabled routing protocols
Euclidean distance to make more accurate decisions. Experiment
results show that this approach provides effective and accurate
In this section, we study the AI-enabled routing protocols, which
use the learning power of ML algorithms for optimal route path se- data forwarding solutions. Moreover, it decreases the impact of
lection based on a more accurate perception of the network topology, intermittent connectivity and achieves a better latency and packet
channel status, user behavior, traffic mobility, etc. These algorithms delay rate than other position-based routing protocols.
bridge the two networking and AI research areas to implement modern • Mobility Prediction Clustering Algorithm (MPCA) [220]: This
networking, especially for dynamic UAV networks. These algorithms routing algorithm is appropriate for clustered UAV networks. It
can be viewed as state of the art and are not included in most previous finds the highest node reliability to select the cluster head. Then,
survey papers. The following is a fairly comprehensive list of AI-based it predicts the network topology using the Trie data structure
algorithms. dictionary prediction and link expiration time mobility model.
Also, this approach ensures the stability of cluster formation.
8.2.1. Topology predictive routing protocols • Robust and Reliable Predictive (RARP) [221]: This routing
The main feature of topology-predictive routing protocols is using protocol combines omnidirectional and directional transmission
ML algorithms to predict the node’s motion trajectories (as an approx- schemes with dynamic angle adjustment. This method features a
imate of the network topology, if the communication range of nodes is hybrid use of unicasting and geocasting routing protocols using
known) and incorporate them into the path selection mechanism. the location and trajectory information. The intermediate node
Here, we review some of the proposed routing protocols that use locations are predicted using 3-D estimation; then, directional
mobility or trajectory prediction approaches to enhance the perfor- transmission is used toward the predicted location, enabling a
mance of routing algorithms for UAV networks. longer transmission range and tracking topology changes. The
authors show that their method reduces path re-establishment
• Learning-based Adaptive Position MAC protocol [216]: This
routing protocol proposes an adaptive hybrid communication pro- and service disruption time and achieves higher successful packet
tocol by integrating a novel Position-Prediction-based directional delivery rates.
MAC protocol (PPMAC) and a Self-learning Routing Protocol • Scoped Flooding and Mobility Prediction-based RGR (SFM-
based on Reinforcement Learning (RLSRP). The performance re- PRGR) [222]: This algorithm is a modified version of RGR. This
sults show that the proposed PPMAC overcomes the directional method associates with data packets mobility prediction informa-
deafness problem, which happens when the transmitter fails to tion, including velocity, direction, and timestamp, to compute the
communicate with the receiver due to having the receiver’s an- distance between the current node and its neighbors. Then, if the
tenna oriented in a different direction. Also, RLSRP provides next hop is out of range, the approach directly switches to GGF
an automatically evolving and more effective routing scheme, to save dropped data packets, making it a better approach for
appropriate for autonomous FANETs. dynamic networks.
12
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
13
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
• Credence-based Q-Routing (CrQ-Routing) and Probabilistic Q-network algorithm as a traffic balancing strategy. Then, the
Credence-based Q-Routing (PCrQ-Routing) [233]: These two protocol makes routing decisions based on the evaluation of each
methods dynamically capture the traffic congestion to improve wireless link. Results show an improving performance in terms of
the learning process to select less congested paths. Both methods packet delivery ratio and end-to-end delay.
adapt to the current network conditions much faster than the • Q-learning based Multi-objective optimization Routing pro-
conventional Q-Routing. tocol (QMR) [242]: This novel Q-learning-based multi-objective
• Full-echo Q-Routing [228]: Another technique proposed to ac- optimization routing protocol adaptively adjusts the learning pa-
celerate the learning speed of conventional Q-Routing is the rameters based on the dynamicity of the network. The authors
full-echo approach. In conventional Q-Routing, each node only proposed a new mechanism to explore some undiscovered poten-
updates the Q-values for its selection (the best neighbor). In tial optimal paths while exploiting the acquired knowledge by
contrast, in the full-echo routing, a node gets each neighbor’s re-estimating neighboring relationships to select the more reliable
estimate of the total time to the destination, which helps update next hop. Results show a higher packet arrival ratio, lower delay,
the Q-values accordingly for each of the neighbors. and energy consumption than the preceding Q-learning-based
• Full-echo Q-Routing with Adaptive Learning Rate [234]: A routing methods.
more recent work added adaptive learning rates to the full-echo • Q-Learning-based Fuzzy Logic for Multi-Objective Routing
Q-Routing to improve the exploration performance. Results show algorithm in Flying Ad Hoc Networks (QLFLMOR) [243]: This
that this technique reduces the oscillations of the full-echo Q- multi-objective Q-learning-based fuzzy logic algorithm facilitates
Routing for high load scenarios. the selection of the routing paths in terms of the per-link and over-
• Adaptive Q-Routing with Random Echo and Route Memory all path performances. The optimal routing path to the destination
(AQRERM) [235]: An extension of the previous work is AQRERM, is determined by each UAV using a fuzzy system with link-level
which improves the performance of the baseline method in terms and path-level parameters. The link-level parameters include the
of the overshoot and settling time of the learning process, as well transmission rate, energy state, and flight status between neigh-
as the learning stability. bor UAVs, while the path-level parameters include the hop count
• Poisson’s probability-based Q-Routing (PBQ-Routing) [236]: and successful packet delivery time. Simulation results show that
This approach uses forwarding probability and Poisson’s proba- the proposed method can maintain low hop count and energy
bility for decision making and controlling transmission energy for consumption and prolong the network lifetime.
intermittently connected networks. Results show that the delivery • Adaptive UAV-assisted Geographic Routing with Q-Learning
probability is almost twice bigger than for Q-Routing, and the (QAGR) [244]: This algorithm uses fuzzy-logic and Depth-First-
overhead ratio is reduced to half. Search (DFS) algorithms to calculate the global path routing.
• Delayed Q-Routing (DQ-Routing) [237]: This routing protocol As it is designed for UAV-Assisted networks, the vehicle on the
uses two sets of value functions to carry out random delayed ground maintains a fix-sized Q-table that converges with a well-
updates to reduce the overestimation of the value function and designed reward function and forwards the routing request to the
improve the rate of convergence. Experiments show that this optimal node by looking up the Q-table filtered according to the
method also improves the learning rate. global routing path. Results show a good performance in packet
• QoS-aware Q-Routing (Q2 -Routing) [238]: This method in- delivering and end-to-end delay.
cludes a variable learning rate based on how big are variations • Fully-Echoed Q-Routing with Simulated Annealing Inference
in Q-values and ensures the traffic Quality of Service (QoS). for Flying Adhoc Networks (FESAIQ-Routing) [227]: This rout-
Results show that this method outperforms the well-known ad- ing protocol is a full-echo Q-Routing with an adaptive learning
hoc routing algorithms in dynamic environments under QoS rate controlled by Simulated Annealing (SA) optimization, where
constraints. the temperature parameter captures the influence of the nodes’
• Q-Network Enhanced Geographic Ad-Hoc Routing Protocol mobility on the Q-value update rates. The soft variation of the
Based on GPSR (QNGPSR) [239]: This routing protocol uses Q- exploration rate not only optimizes the exploration rate, but also
network as an approximator to estimate the quality of different accommodates abrupt changes in the network dynamicity. Simu-
routing paths. Then, it makes forwarding decisions based on the lation results show better performance than previous state-of-art
estimated Q-values. Also, the neighbor topology information is in- Q-Routing algorithms.
troduced to estimate the environment and node states. QNGPSR is
trained off-line when the signal propagation model is determined. A summary of some of these routing protocols is presented in
Therefore, online-learning is not necessary, which reduces the Tables 3 and 4 with some characteristics for each routing protocol,
computational load. Results show a higher packet delivery ratio as well as some comparative results to provide an idea of how these
and a lower end-to-end delay compared to the original GPSR. routing protocols perform under certain circumstances.
• Adaptive and Reliable routing protocol with deep reinforce-
ment learning (ARdeep) [240]: This is a deep RL-based adaptive 9. Tools and public datasets
and reliable routing protocol that formulates routing decisions
with a Markov Decision Process model to characterize the net- In this section, we review tools and public datasets available for
work variations automatically. It considers link status, the packet simulating real UAV networking environments. We investigate their
error ratio, the expected connection time of the link, the re- features and capabilities, emphasizing their use for testing networking
maining energy of nodes, the distance between the node and solutions (e.g., routing protocols) for UAV networks under different
the destination when making routing decisions to precisely infer conditions.
the network environment and make more appropriate forwarding
decisions. Simulation results show that ARdeep outperforms the 9.1. Simulation tools
existing QGeo and conventional GPSR routing protocols.
• Traffic-aware Q-Network enhanced routing protocol based UAV simulation tools emulate virtual environments to model UAV
on GPSR (TQNGPSR) [241]: Traffic-aware Q-network enhanced flights in close-to-reality situations. It gives the convenience of evaluat-
geographic routing protocol based on Greedy Perimeter Stateless ing the performance of UAV networks in virtual environments at much
Routing (GPSR). This algorithm uses the congestion information lower costs and trouble before testing in real scenarios. The choice of
of neighbors and evaluates the quality of a wireless link by the the appropriate simulator depends on both the testing objective and
14
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Table 3
Performance comparison table for topology predictive routing protocols.
Algorithm Objective performance Results
Energy Delay Throughput Connectivity
Compared to DMAC, LODMAC, OLSR, GPMOR, RARP, IMAC+OLSR:
∙ Lowest network delay and longest path lifetime
PPMAC+RLSRP [216] ✓ ✓ ✓ ∙ Highest route setup success and data delivery ratio.
∙ Better successful throughout without retransmissions.
the list of features offered by each simulator. Some simulators incorpo- best simulators currently available. By combining AI components, these
rate the Motion of Capture (MOCAP), which allows simulating UAVs’ simulators allow researchers to simulate their algorithms in near-real
natural movements [257]. Another tool is MAVLink, a lightweight mes- environments, with the opportunity to develop better algorithms for
saging protocol for communicating with drones to test communication AI-based networking and control tasks.
protocols and algorithms. Software In The Loop (SITL) is a hardware-
free simulation environment that facilitates simulating real-time UAV
9.2. Experimental platforms
operations. It includes a c++ code to directly implement autopilot
operation on the user’s computer for testing [258].
The list of tools for simulating UAV networking is large and still Experimental platforms enable testing networking protocols in em-
growing. A comparative analysis of some popular simulation tools, ulated network setups. Most experimentation platforms can be exe-
including X-Plane [247], FlightGear [248] (compatible with MATLAB cuted on a standalone computer or High-Performance Computing (HPC)
Simulink), Gazebo [249], JMavSim [250], Microsoft AirSim [251], servers. However, larger experimentation platforms typically consist of
and UE4Sim [252], is presented in Table 5. The first four simulate custom-built hardware with a set of simulation and operation software
the UAV motions solely based on physics laws and do not support packages, programming environment, and web-based user interface to
MOCAP. On the other hand, Microsoft AirSim and UE4Sim support enable remote experimentation for the research community.
MOCAP by using Unreal Engine 4 (UE4), an open-source tool that The most commonly-used experimental platforms are Network Sim-
simulates UAV movement using physics along with a high-quality ulator (NS-3) [261], and OPNET [262]. NS-3 is an open-source, free,
trajectory creation engine. AirSim is considered a platform for both AI and discrete-event network simulator for Internet and networking sys-
research and training [259]. AirSim is empowered with deep learning, tems, enabling testing different layers of networking protocols, includ-
computer vision, and reinforcement learning features to generate and ing routing protocols in MAC and Network layers. OPNET is an open
utilize training datasets [260]. Also, UE4Sim simulator benefits from network simulator used to simulate the function and performance of
a built-in and robust DL-based approach for real-time autonomous different networking systems. It is known for its power and versatility to
driving that does not require manually collected training data. For create and simulate different network topologies. OPNET Technologies
this reason, Microsoft AirSim and UE4Sim are considered two of the considers requests for free access for academic use.
15
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Table 4
Performance comparison table for self-adaptive learning-based routing protocols.
Algorithm Objective performance Results
Energy Delay Throughput
In comparison to Q-Routing and Dual Q-Routing:
Adaptive Q-Routing Full-
✓ ∙ Smaller average delivery time.
echo [234]
Compared to Q-Routing:
∙ Much higher average reward of DQ-routing.
DQ-Routing [237] ✓
∙ More likely to choose best action.
Table 5
UAVs simulation tools.
Simulator Free access ROS Interface MOCAP MAVLink SITL Obstacles Usability
X-Plane [247] No No No Yes Yes Yes Medium
FlightGear [248] Yes No No Yes Yes Yes Medium
Gazebo [249] Yes Yes No Yes Yes Yes Easy
JMavSim [250] Yes Yes No Yes Yes No Easy
Microsoft AirSim [251] Yes No Yes Yes Yes Yes Medium
UE4Sim [252] Yes No Yes No No Yes Medium
Table 6
UAVs experimental platforms.
Experimental platform Interface Free access MAVLink Compatible pilot software
QGround-Control [253] Graphical Yes Yes PX4 Autopilot, ArduPilot
Mission Planner [254] Graphical Yes Yes PX4 Autopilot, Ardupilot
MAVProxy [255] Command Yes Yes Ardupilot
UGCS [256] Graphical Yes, but limited Yes DJI, Innoflight, Micropilot, Mikrokopter, Microdrones, Parrot
Some other simulators are developed specifically for UAV net- is tunable to account for a large range of communication fidelity and
works. For instance, ROS-NetSim [263] is a Robot Operating System complexity.
(ROS) package, which acts as an interface between robots (UAVs in Another UAV-specific simulator is UB-ANC University at Buffalo’s
this case) and network simulators. ROS-NetSim accurately replicates Airborne Networking and Communications Testbed (UB-ANC) [264],
Perception-Action-Communication (PAC) loops. Moreover, ROS-NetSim which is an open platform that facilitates rapid testing and repeatable
16
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Table 7
UAVs trajectory datasets.
Trajectory datasets Size/Length of flight Description
Large-scale, aggressive indoor flight dataset collected using a custom-built quadrotor
Blackbird [272] 10 h of flight data from 168 flights.
platform. Over 17 flight trajectories and 5 environments at velocities up to 7.0 m/s.
Trajectories, proxy meshes and images generated for path planning on real and
KAUST [273] 11.172 Gb including all material. synthetic scenes. It includes a benchmarking tool allowing new trajectories to output
camera images for reconstruction.
420k frames representing 79 min of Multi-purpose synthetic dataset for low altitude drone flights. Data corresponding to
Mid-Air [274] drone flight records extracted out of flight records of a flying quadcopter recorded in different climate conditions, including
more than 5 h of flight. a test set for benchmarking.
Over 27 flight sequences, with more Visual-inertial odometry dataset from a drone racing quadrotor with fast laps around a
UZH-FPV [275]
than 10 km of flight distance. racetrack trajectories, as well as free-form indoor and out trajectories around obstacles.
17
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
consumption by avoiding the transmission of hopeless packets that 10.4. Energy efficiency
will be lost during the transmission. However, the use of AI methods
can add to the computation complexity and CPU power use in power- UAVs are highly constrained in payload and battery lifetime. The
constrained UAVs. Therefore, the right choice of the routing protocol available energy should be optimally used for navigation, sensing, ac-
should be based on the application-specific requirements and design tuation, transmission, and data processing [290]. Therefore, developing
constraints. Then, as a future solution, we need to study if the effect energy-efficient networking to prolong mission time and extend cover-
of including AI techniques into our model is worth the complexity that age area is usually considered a top priority in UAV networks [291,
will be added, which could be affecting other important aspects such 292].
as the network lifetime and power consumption. A parallel research direction to solve energy issues of UAVs is
developing new battery technologies, such as hydrogen fuel cells [293],
and enhanced lithium-ion batteries [294]. Also, Radio Frequency (RF)
10.2. Connectivity transmission can be used for Wireless Power Transfer (WPT) [295],
which provides controllable and sustainable energy supply for UAVs
Maintaining connectivity for UAV networks remains an important [296,297]. Further research is required to improve the use of WPT
issue considering the limited communication range of commercial by reducing the distance between charging stations and UAVs, the
UAVs, which is typically limited to a few miles, while the coverage area random energy arrivals, and the scalable nature of UAVs [298,299].
in some applications like forest fire monitoring, disaster management, Another research direction is considering mmWave communications for
and wildlife monitoring can scale to hundreds of miles [286–288]. UAV networks, energy beamforming, and the optimized placement of
Connectivity loss can cause packet drop, frequent link re-establishment, wireless charging stations. Integration with 5G, and 6G wireless systems
shortened link lifetime, prolonged delays, and ultimately disrupt the are also research topics related to energy optimization. A few routing
mission and compromise the user QoE. Recent methods use ML meth- protocols consider energy as a routing criterion. Developing multi-
ods to predict network topology change ahead of time and avoid objective and constrained optimization methods for routing protocols
connectivity loss by learning-based routing [105,220,222,224]. An- to enhance routing efficiency, while maintaining maximal connectivity
other approach is including the link remaining time or path lifetime and minimizing energy consumption is an important future direction.
into the routing criteria [37]. Other methods try to identify and resolve Further research is required to develop energy-aware routing protocols.
Some recent works offer storing data and postponing calculations to the
the connectivity loss by methods such as placement of new UAVs and
future to reduce power consumption while flying [300].
link re-establishment mechanisms [219].
Another potential solution can be using energy-efficient ML and
One of the potential future trends would be integrating online
DL algorithms for networking, such as energy-efficient convolutional
path planning methods with networking algorithms to realize topology
neural networks [301]. However, new challenges come into place when
control with minimal connectivity issues. This approach is feasible in
we use the mentioned techniques. First, it is misbelieved that reducing
many real-world scenarios where the coverage area is defined, but there
the energy consumption of the algorithms does not necessarily lead
is a high degree of freedom in UAV’s motion paths (e.g., search and
to a reduction of the overall energy consumption. Second, in some
rescue scenarios, regular forest monitoring, etc.). Also, connectivity is
scenarios, measuring the energy consumption becomes redundant since
dependent on the interference caused by objects and environmental energy and time are correlated, and time is already measured. Third,
factors. Therefore, using more advanced AI methods to predict the it might be hard to measure the energy consumption, making it time
influence of network nodes, environment, and surrounding objects on consuming and impractical [302]. Despite a few scenarios where these
networking quality, can mitigate connectivity issues. In some appli- statements are true, we can find that reducing the energy consumption
cations with sparsely distributed nodes, intermittent connectivity is of the algorithms used will impact positively the overall energy con-
unavoidable. Also, connectivity can be caused by UAVs that ran out sumption and also, measuring energy consumption can offer a unique
of battery. Developing AI methods to predict and accommodate such overview, compared to time consumed. Last, there are some solutions
conditions is another potential research direction [34]. that can model the energy consumption of different algorithms [303],
as for example Alphabet’s DeepMind.
10.3. Routing
10.5. Spectrum management
18
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Table 8
Remaining issues and future directions.
Open issues Problems Future directions
∙ Use ML, RL and DL techniques for different aspects of networking,
∙ Current networking designs have not yet fully utilized the
including sensing, scheduling, routing, spectrum sharing, path planning,
power of AI-based solutions.
∙ AI integration and resource allocation.
∙ The use of AI methods can add to the computation
∙ Study if AI improves performance and does not impact negatively
complexity and CPU power use in power-constrained UAVs.
network lifetime and power consumption aspects.
∙ Use ML methods to predict network topology change ahead of time
and avoid connectivity loss by using learning-based routing.
∙ Link failures bring limited network lifetime.
∙ Consider techniques that enhance link lifetime by adding link remaining
∙ Communication links between UAVs are extremely vulnera-
time or path lifetime into routing criteria.
∙ Connectivity ble.
∙ Resolve the connectivity loss by methods such as placement of new
∙ Connectivity is dependent on the interference caused by
UAVs and link re-establishment mechanisms.
objects and environmental factors.
∙ Integrate online path planning methods with networking algorithms to
realize topology control with minimal connectivity issues.
∙ Design a routing protocol that considers intermittent connectivity into
∙ Most routing protocols consider a fully connected network, the routing selection process, as well as 3-dimensional space.
whereas in reality, link breakages happen. ∙ Design a topology-predictive routing to accommodate non-linear mo-
∙ Node mobility in routing protocols is mostly developed for tions.
∙ Routing and tested in 2D spaces, whereas UAVs move in 3D spaces. ∙ Develop vision-based target tracking methods for GPU-powered UAVs
∙ Non-linear motions are not considered in current routing to predict network topology.
protocols. ∙ Develop a light-weight AI-powered routing appropriate for miniaturized
∙ Miniaturized UAVs have limited battery lifetime. UAVs.
∙ Spectrum unavailability can cause the loss of command and ∙ Spectrum sharing and spectrum leasing techniques using advanced AI-
control of the aircraft. based solutions.
∙ Spectrum management
∙ Spectrum remains vulnerable to unintentional or intentional ∙ Optimal communications including sensitivity to interference and
interference. adaptive antenna steering can optimize data acquisition objectives.
10.6. Security and user privacy authentication and enabling the non-repudiation feature is recently pro-
posed as a potential future direction [313]. Jamming attacks can also
Developing secure and privacy-preserving networking methods is disrupt UAV missions, especially when they rely in GPS positioning.
another key challenge for UAV networks. UAVs are usually subject Using alternative localization methods [314], as well as, designing a
to different security attacks, including physical hijacking, jamming secure handover mechanism which is resistant to both passive and ac-
attacks, cyber-attacks, man-in-the-middle attack, intruding malicious tive attacks [315], can solve this issue. Also, machine learning methods
nodes, channel interception, and denial of service, especially when fly- can be used to detect and eliminate jamming, or provide an additional
ing over adversary territory [43]. Also, aerial monitoring systems may reference for positioning verification [316]. Another emerging research
exchange imagery with people’s private information, which requires trend is developing secure routing schemes that alleviate security issues
higher protection levels. while finding optimal paths [317].
A key challenge in structure-less UAV networks is that using con-
ventional PKI-based asymmetric security solutions is not feasible due 10.7. Operational regulations
to the lack of central authority to issue digital signatures. Therefore,
methods based on distributed certificate [309], key pre-distribution Another hindrance to the widespread use of drone technology is the
algorithms [310,311], and blockchain security [312] are under inves- lack of or ambiguity of sufficient regulations and standards for UAV
tigation. Also, the idea of using hardware-driven security keys for UAV operations, characteristics, safety requirements, secrecy and privacy
19
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
considerations, and allowed airspace. In the US, the FAA is responsible Acknowledgments
for developing certification standards and air traffic requirements for
drones. For instance, flying drones above class G airspace and in The work of Jacob Chakareski has been supported in part by the
autonomous modes require special permits from the FAA that can take NSF under awards CCF-1528030, ECCS-1711592, CNS-1836909, CNS-
a long time. Also, international coordination would help develop global 1821875, and CNS-1836909
regulations, noting that different territories follow different standards
and regulations. For instance, currently, there exist three different References
regions, including (i) region 1 that covers Europe, Africa, and parts
of the Middle East, (ii) region 2 that covers America, and (iii) region [1] E.N. Barmpounakis, E.I. Vlahogianni, J.C. Golias, Unmanned Aerial Aircraft
3 that covers Asia and the Pacific, which have different frequency Systems for transportation engineering: Current practice and future chal-
lenges, Int. J. Transp. Sci. Technol. 5 (3) (2016) 111–122, http://dx.doi.org/
bands for UAV operations. One more potential solution would be
10.1016/j.ijtst.2017.02.001, http://www.sciencedirect.com/science/article/pii/
using AI software for regulation compliance, which ensures increased S2046043016300533, Unmanned Aerial Vehicles and Remote Sensing.
safety of confidential information, risks mitigation and instant response [2] K. Kanistras, G. Martins, M.J. Rutherford, K.P. Valavanis, A survey of unmanned
to new regulatory requirements. This way, we could find AI-enabled aerial vehicles (UAVs) for traffic monitoring, in: 2013 International Conference
drones authorized for use in different regions, following the operational on Unmanned Aircraft Systems (ICUAS), 2013, pp. 221–234, http://dx.doi.org/
10.1109/ICUAS.2013.6564694.
regulations at each specific area.
[3] Z. Zaheer, A. Usmani, E. Khan, M.A. Qadeer, Aerial surveillance system using
UAV, in: 2016 Thirteenth International Conference on Wireless and Optical
10.8. Summary of challenges Communications Networks (WOCN), 2016, pp. 1–7, http://dx.doi.org/10.1109/
WOCN.2016.7759885.
We identified the need for (i) advanced AI methods to precisely [4] D. Bein, W. Bein, A. Karki, B.B. Madan, Optimizing border patrol operations
predict networking conditions and environmental factors, (ii) integra- using unmanned aerial vehicles, in: 2015 12th International Conference on
Information Technology - New Generations, 2015, pp. 479–484, http://dx.doi.
tive networking and topology control for extended connectivity, (iii)
org/10.1109/ITNG.2015.83.
vision-based tracking methods for GPU-powered UAVs, (iv) topology- [5] S. Waharte, N. Trigoni, Supporting Search and Rescue Operations with UAVs,
predictive routing to accommodate non-linear motions, (v) developing in: 2010 International Conference on Emerging Security Technologies, 2010,
light-weight AI-powered routing appropriate for miniaturized UAVs, pp. 142–147.
(vi) distributed structure-free extension of asymmetric security proto- [6] M. Erdelj, E. Natalizio, K.R. Chowdhury, I.F. Akyildiz, Help from the sky:
leveraging uavs for disaster management, IEEE Pervasive Comput. 16 (1) (2017)
cols based on key pre-distribution, hardware-driven keys, blockchain,
24–32.
and distributed certificate methods, (vii) ML methods to recognize and [7] M. Messous, S. Senouci, H. Sedjelmaci, Network connectivity and area coverage
combat jamming attacks, (viii) energy-efficient low-power and low- for UAV fleet mobility model with energy constraint, in: 2016 IEEE Wirel.
complexity networking, (ix) AI-based spectrum sharing and leasing Commun. and Networking Conference, 2016, pp. 1–6.
policies, security-aware mission planning, and (xi) universal regulation [8] J. Chakareski, S. Naqvi, N. Mastronarde, J. Xu, F. Afghah, A. Razi, An energy
efficient framework for uav-assisted millimeter wave 5g heterogeneous cellular
and guidelines for UAV operation, as top key issues that are worthy of
networks, IEEE Trans. Green Commun. Netw. 3 (1) (2019) 37–44, http://dx.
investigation by the research community. A more detailed summary of doi.org/10.1109/TGCN.2019.2892141.
the remaining challenges and future trends is included in Table 8. [9] M.R. Brust, B.M. Strimbu, A networked swarm model for UAV deployment
in the assessment of forest environments, in: 2015 IEEE Tenth International
11. Conclusion Conference on Intelligent Sensors, Sensor Networks and Information Processing
(ISSNIP), 2015, pp. 1–6, http://dx.doi.org/10.1109/ISSNIP.2015.7106967.
The dominant trend of UAV systems is departing from single-drone [10] J. Chakareski, Drone networks for virtual human teleportation, in: Proc. ACM
Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, Niagra
systems to networked autonomous drones to accomplish complicated Falls, NY, USA, 2017, pp. 21–26.
tasks at lower cost and time. The idea of using AI-based network- [11] J. Chakareski, Uav-iot for next generation virtual reality, IEEE Trans. Image
ing and control protocols to accommodate dynamic situations has Process. 28 (12) (2019) 5977–5990.
recently gained a lot of attention, thanks to the advances in AI and [12] M. Khan, J. Chakareski, S. Gupta, RF-FSO Dual-Path UAV Network for High
deep learning methods powered by fast and affordable computational Fidelity Multi-Viewpoint Scalable 360-degree Video Streaming, in: Proc. IEEE
Int’l Workshop on Multimedia Signal Processing, Tampere, Finland, 2020, pp.
platforms. Here, we focused on the most recent AI-based methods
1–6.
that aim to model and predict network topology to facilitate more [13] LOCUST: Autonomous, Swarming UAVs fly into the future, ONR, 2015,
efficient information flow for aerial networks. This important class of http://www.onr.navy.mil/Media-Center/Press-Releases/2015/LOCUST-low-
routing protocols is overlooked or not received the deserved emphasis cost-UAV-swarm-ONR.aspx.
in previous survey papers. [14] S. Siebert, J. Teizer, Mobile 3d mapping for surveying earthwork using an
unmanned aerial vehicle (uav), 2013.
In this paper, we reviewed AI-based routing protocols designed
[15] J. Plaza, Using drones to monitor volcano activity and save lives. Commercial
for UAV networks, highlighting the benefits and costs of each type, UAV News, 2018, https://www.commercialuavnews.com/public-safety/using-
along with available testing and implementation tools, relations to drones-to-monitor-volcano-activity-and-save-lives.
mobility models and networking protocols, and connection to UAV [16] Brain-controlled drones are here: What’s coming in the next five years?
swarming. These methods include the direct use of ML methods for ScienceDaily, 2017, https://www.sciencedaily.com/releases/2017/09/
170929230433.htm.
topology prediction, as well as learning-by-experience approaches. We
[17] Electrical And computer engineering, CASA adds drone detection to its early
also reported substantial improvements of the most recent methods in warning monitoring of severe weather | Electrical and Computer Engineering |
terms of connectivity control, successful packet delivery rate, transmis- UMass Amherst, 2018, https://ece.umass.edu/news/casa-adds-drone-detection-
sion delay, and throughput for AI-based routing protocols, compared its-early-warning-monitoring-severe-weather.
to conventional methods. We also provided our perspective on the [18] Y.A. Pederi, H.S. Cheporniuk, Unmanned Aerial Vehicles and new technological
methods of monitoring and crop protection in precision agriculture, in: 2015
future trends for AI-based networking, which mainly center around
IEEE International Conference Actual Problems of Unmanned Aerial Vehicles
developing method for more accurate environment perception, vision- Developments (APUAVD), 2015, pp. 298–301.
based tracking, light-weight DL algorithms appropriate for on-board [19] A. Cherubini, A. Papini, R. Vertechy, M. Fontana, Airborne wind energy
processing, AI-based spectrum sharing, and security-aware networking. systems: A review of the technologies, Renew. Sustain. Energy Rev. 51
(2015) 1461–1476, http://dx.doi.org/10.1016/j.rser.2015.07.053, http://www.
Declaration of competing interest sciencedirect.com/science/article/pii/S1364032115007005.
[20] A.A. Paranjape, S. Chung, K. Kim, D.H. Shim, Robotic herding of a flock of birds
using an unmanned aerial vehicle, IEEE Trans. Robot. 34 (4) (2018) 901–915,
The authors declare that they have no known competing finan- http://dx.doi.org/10.1109/TRO.2018.2853610.
cial interests or personal relationships that could have appeared to [21] Amazon Prime Air, Amazon, https://www.amazon.com/Amazon-Prime-Air/b?
influence the work reported in this paper. ie=UTF8&node=8037720011.
20
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[22] UPS Flight Forward™ Drone Delivery, UPS, https://www.ups.com/us/en/ [49] B. Knight, A guide to military drones, DW.COM, 2017, https://www.dw.com/
services/shipping-services/flight-forward-drones.page. en/a-guide-to-military-drones/a-39441185.
[23] L. Gupta, R. Jain, G. Vaszkun, Survey of important issues in UAV [50] A. Sharma, Everything you need to know about industrial grade drones,
communication networks, IEEE Commun. Surv. Tutor. 18 (2) (2016) 2020, https://jungleworks.com/everything-you-need-to-know-about-industrial-
1123–1152. grade-drones/.
[24] Unmanned Aerial Vehicle (UAV) Market. Market Research Firm, [51] Flyability, Commercial Drones: Industries that Use Drones, Deliverables, and
https://www.marketsandmarkets.com/Market-Reports/unmanned-aerial- Our List of the Top Models on the Market, Flyability, https://www.flyability.
vehicles-uav-market-662.html. com/commercial-drones.
[25] K.-I. Kim, K.-H. Kim, M. Imran, P. Khan, E. Tovar, F. Ali, UAV-Enabled [52] FAA, Recreational flyers & modeler community-based organizations, 2020,
healthcare architecture: Issues and challenges, Future Gener. Comput. Syst. https://www.faa.gov/uas/recreational_fliers/.
(2019) http://dx.doi.org/10.1016/j.future.2019.01.028. [53] R. Yin, W. Li, Z.-q. Wang, X.-x. Xu, The application of artificial intelligence
[26] M. Chen, H. Wang, S. Mehrotra, V.C.M. Leung, I. Humar, Intelligent networks technology in UAV, in: 2020 5th International Conference on Information
assisted by cognitive computing and machine learning, IEEE Netw. 33 (3) Science, Computer Technology and Transportation (ISCTT), 2020, pp. 238–241,
(2019) 6–8, http://dx.doi.org/10.1109/MNET.2019.8726065. http://dx.doi.org/10.1109/ISCTT51595.2020.00048.
[27] P. Bithas, E. Michailidis, N. Nomikos, D. Vouyioukas, A. Kanatas, A survey on [54] R. Hof, AI-On-A-Chip Soon will make phones, drones and more a lot
machine-learning techniques for UAV-Based communications, Sensors 19 (2019) smarter, Forbes Magazine, 2016, https://www.forbes.com/sites/roberthof/
http://dx.doi.org/10.3390/s19235170. 2016/05/07/ai-on-a-chip-soon-will-make-phones-drones-and-more-a-lot-
[28] B. .S, Study of ad hoc networks with reference to MANET, VANET, FANET, Int. smarter/?sh=75b2d2ba7eef.
J. of Adv. Res. Comput. Sci. Softw. Eng. 7 (2017) 390, http://dx.doi.org/10. [55] T. Hwang, Computational power and the social impact of artificial intelligence,
23956/ijarcsse/V7I7/0159. 2018, arXiv:1803.08971.
[29] H. Lashari, H.M. Ali, A. Laghari, Uav communication networks issues: A review, [56] C. Dilmegani, AI Chips in 2021: Guide to cost-efficient AI training & infer-
Arch. Comput. Methods Eng. (2020) http://dx.doi.org/10.1007/s11831-020- ence, AIMultiple, 2021, https://research.aimultiple.com/ai-chip/#what-are-its-
09418-0. components.
[30] T. Izydorczyk, G. Berardinelli, P. Mogensen, M.M. Ginard, J. Wigard, I.Z. [57] K. Freund, AI hardware: Harder than it looks, Forbes Magazine, 2019,
Kovács, Achieving high UAV uplink throughput by using beamforming on https://www.forbes.com/sites/moorinsights/2019/10/07/ai-hardware-harder-
board, IEEE Access 8 (2020) 82528–82538, http://dx.doi.org/10.1109/ACCESS. than-it-looks/?sh=23dc41e5471f.
2020.2991658. [58] Freund, Intel shows off its ai chips and chops, forbes, 2018, https:
[31] W. Yuan, C. Liu, F. Liu, S. Li, D.W.K. Ng, Learning-based predictive beamform- //www.forbes.com/sites/moorinsights/2018/06/01/intel-shows-off-its-ai-
ing for UAV communications with jittering, IEEE Wirel. Commun. Lett. 9 (11) chips-and-chops/?sh=272064ad6643.
(2020) 1970–1974, http://dx.doi.org/10.1109/LWC.2020.3009951. [59] I. Insider, Drone market outlook in 2021: industry growth trends,
[32] M. Khaledi, A. Rovira-Sugranes, F. Afghah, A. Razi, On greedy routing in
market stats and forecast, Business Insider, 2021, https://www.
dynamic UAV networks, in: IEEE International Conference on Sensing, Com-
businessinsider.com/drone-industry-analysis-market-trends-growth-forecasts#:
munication and Networking (SECON 2018), 2018, http://dx.doi.org/10.1109/
~:text=InsiderIntelligencedefinesenterprisedrones,annualgrowthrate(CAGR).
WiSEE.2017.8124890.
[60] L. Schroth, Drone manufacturer market shares: DJI leads the way, Drone In-
[33] O. Sami Oubbati, M. Atiquzzaman, T. Ahamed Ahanger, A. Ibrahim, Softwariza-
dustry Insights, 2021, https://droneii.com/drone-manufacturer-market-shares-
tion of UAV networks: A survey of applications and future trends, IEEE Access
dji-leads-the-way-in-the-us.
8 (2020) 98073–98125.
[61] PrecisionHawk, Geospatial Data Analytics for the Enterprise https://www.
[34] D. Shumeye Lakew, U. Sa’ad, N. Dao, W. Na, S. Cho, Routing in flying ad hoc
precisionhawk.com/.
networks: A comprehensive survey, IEEE Commun. Surv. Tutor. 22 (2) (2020)
[62] FortemTechnologies, DroneHunter: Net Gun Drone Capture: Products,
1071–1120.
Fortem Technologies, 2021, https://fortemtech.com/products/
[35] Q. Sang, H. Wu, L. Xing, P. Xie, Review and comparison of emerging routing
dronehunter/?gclid=Cj0KCQjwl9GCBhDvARIsAFunhskjqqROz4pMBmxT_
protocols in flying Ad Hoc networks, Symmetry 12 (2020) 971, http://dx.doi.
bxGxRK5KMyievKr4lH3kejZtH_gLS1qQt0X68kaAsEfEALw_wcB.
org/10.3390/sym12060971.
[63] UAVCoach, Top 100 drone companies to watch in 2020, UAV Coach, 2021,
[36] B. Alzahrani, O.S. Oubbati, A. Barnawi, M. Atiquzzaman, D. Alghazzawi, UAV
https://uavcoach.com/drone-companies/.
Assistance paradigm: State-of-the-art in applications and challenges, J. Netw.
[64] C.B. Insights, How drones will impact society: From fighting war to forecasting
Comput. Appl. (2020) http://dx.doi.org/10.1016/j.jnca.2020.102706.
weather, UAVs change everything, CB Insights Research, 2020, https://www.
[37] R.A. Nazib, S. Moh, Routing protocols for unmanned aerial vehicle-aided
cbinsights.com/research/drone-impact-society-uav/.
vehicular Ad Hoc networks: A survey, IEEE Access 8 (2020) 77535–77560.
[65] G.D. Maayan, How do ai-based drones work? Medium, Heartbeat, 2020, https:
[38] M.Y. Arafat, S. Moh, Routing protocols for unmanned aerial vehicle networks:
//heartbeat.fritz.ai/how-ai-based-drones-work-a94f20e62695.
A survey, IEEE Access 7 (2019) 99694–99720, http://dx.doi.org/10.1109/
ACCESS.2019.2930813. [66] M.-A. Lahmeri, M.A. Kishk, M.-S. Alouini, Artificial intelligence for UAV-enabled
[39] O.S. Oubbati, M. Atiquzzaman, P. Lorenz, M.H. Tareque, M.S. Hossain, Rout- wireless networks: A survey, IEEE Open J. Commun. Soc. 2 (2021) 1015–1040,
ing in flying Ad Hoc networks: Survey, constraints, and future challenge http://dx.doi.org/10.1109/OJCOMS.2021.3075201.
perspectives, IEEE Access 7 (2019) 81057–81105. [67] Q. Zhang, M. Mozaffari, W. Saad, M. Bennis, M. Debbah, Machine learning
[40] M. Khan, K.-L. Yau, R. Md. Noor, M. Imran, Routing schemes in FANETs: for predictive on-demand deployment of Uavs for wireless communications, in:
A survey, Sensors (Basel, Switzerland) 20 (2019) http://dx.doi.org/10.3390/ 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1–6,
s20010038. http://dx.doi.org/10.1109/GLOCOM.2018.8647209.
[41] J. Jiang, G. Han, Routing protocols for unmanned aerial vehicles, IEEE [68] J. Chen, U. Yatnalli, D. Gesbert, Learning radio maps for UAV-aided wireless
Commun. Mag. 56 (1) (2018) 58–63. networks: A segmented regression approach, in: 2017 IEEE International Con-
[42] A. Awang, K. Husain, N. Kamel, S. Aïssa, Routing in vehicular Ad-hoc networks: ference on Communications (ICC), 2017, pp. 1–6, http://dx.doi.org/10.1109/
A survey on single- and cross-layer design techniques, and perspectives, IEEE ICC.2017.7997333.
Access 5 (2017) 9497–9517. [69] J. Kim, C. Park, J. Ahn, Y. Ko, J. Park, J.C. Gallagher, Real-time UAV sound
[43] M. Jean aime, M.-S. Mahmoud, N. Larrieu, Survey on UAANET routing protocols detection and analysis system, in: 2017 IEEE Sensors Applications Symposium
and network security challenges, Ad-Hoc Sens. Wirel. Netw. 37 (2017). (SAS), 2017, pp. 1–5, http://dx.doi.org/10.1109/SAS.2017.7894058.
[44] O.S. Oubbati, A. Lakas, F. Zhou, M. Günes, M.B. Yagoubi, A survey on position- [70] Y. Zhang, J. Wen, G. Yang, Z. He, X. Luo, Air-to-air path loss prediction based
based routing protocols for flying Ad hoc networks (FANETs), Veh. Commun. on machine learning methods in urban environments, Wirel. Commun. Mob.
10 (2017) 29–56. Comput. 2018 (2018) 1–9, http://dx.doi.org/10.1155/2018/8489326.
[45] C. Suthaputchakun, Z. Sun, Routing protocol in intervehicle communication [71] W. Xia, S. Rangan, M. Mezzavillla, A. Lozano, G. Geraci, V. Semkin, G.
systems: A survey, IEEE Commun. Mag. 49 (2011) 150–156, http://dx.doi.org/ Loianno, Generative neural network channel modeling for millimeter-wave UAV
10.1109/MCOM.2011.6094020. communication, 2020, arXiv:2012.09133.
[46] J. Brown, Types of military drones: The best technology available today, My [72] M. Chen, W. Saad, C. Yin, Deep learning for 360◦ content transmission in
Drone Lab, 2020, https://www.mydronelab.com/blog/types-of-military-drones. UAV-enabled virtual reality, in: ICC 2019 - 2019 IEEE International Conference
html. on Communications (ICC), 2019, pp. 1–6, http://dx.doi.org/10.1109/ICC.2019.
[47] Milsource, 4 Military sensor technologies that drones are transporting to the 8761472.
commercial market, MilSource - Military Ethernet Switch and Router Prod- [73] S. Wang, J. Chen, Z. Zhang, G. Wang, Y. Tan, Y. Zheng, Construction of a virtual
ucts, 2019, https://militaryethernet.com/4-military-sensor-technologies-drones- reality platform for UAV deep learning, in: 2017 Chinese Automation Congress
transporting-commercial-market/. (CAC), 2017, pp. 3912–3916, http://dx.doi.org/10.1109/CAC.2017.8243463.
[48] J.R. Wilson, The future of artificial intelligence and quantum computing, [74] K. Mukadam, A. Sinh, R. Karani, Detection of landing areas for unmanned
Military & Aerospace Electronics, 2020, https://www.militaryaerospace.com/ aerial vehicles, in: 2016 International Conference on Computing Communication
computers/article/14182330/future-of-artificial-intelligence-and-quantum- Control and automation (ICCUBEA), 2016, pp. 1–5, http://dx.doi.org/10.1109/
computing. ICCUBEA.2016.7860044.
21
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[75] N. Imanberdiyev, C. Fu, E. Kayacan, I.-M. Chen, Autonomous navigation [101] A. Shamsoshoara, F. Afghah, A. Razi, S. Mousavi, J. Ashdown, K. Turk,
of UAV by using real-time model-based reinforcement learning, in: 2016 An autonomous spectrum management scheme for unmanned aerial vehicle
14th International Conference on Control, Automation, Robotics and Vision networks in disaster relief operations, IEEE Access 8 (2020) 58064–58079.
(ICARCV), 2016, pp. 1–6, http://dx.doi.org/10.1109/ICARCV.2016.7838739. [102] A. Shamsoshoara, M. Khaledi, F. Afghah, A. Razi, J. Ashdown, Distributed
[76] X. Liu, Y. Liu, Y. Chen, Reinforcement learning in multiple-UAV networks: cooperative spectrum sharing in UAV networks using multi-agent reinforcement
Deployment and movement design, 2019, arXiv:1904.05242. learning, in: 2019 16th IEEE Annual Consumer Communications & Networking
[77] G. Faraci, A. Raciti, S.A. Rizzo, G. Schembra, Green wireless power Conference (CCNC), IEEE, 2019, pp. 1–6.
transfer system for a drone fleet managed by reinforcement learning in [103] A. Jalali, L. Schiff, Beam forming and pointing in a network of unmanned aerial
smart industry, Appl. Energy 259 (2020) 114204, http://dx.doi.org/10. vehicles (UAVs) for broadband access, Google Patents, US Patent 9,712,228,
1016/j.apenergy.2019.114204, https://www.sciencedirect.com/science/article/ 2017.
pii/S0306261919318914. [104] A. Muralidharan, Y. Mostofi, Energy optimal distributed beamforming using
[78] N.I. Mowla, N.H. Tran, I. Doh, K. Chae, Federated learning-based cognitive unmanned vehicles, IEEE Trans. Control Netw. Syst. 5 (4) (2017) 1529–1540.
detection of jamming attack in flying Ad-Hoc network, IEEE Access 8 (2020) [105] A. Rovira-Sugranes, A. Razi, Predictive routing for dynamic UAV networks,
4338–4350, http://dx.doi.org/10.1109/ACCESS.2019.2962873. in: 2017 IEEE International Conference on Wireless for Space and Extreme
[79] Y. Liu, J. Nie, X. Li, S.H. Ahmed, W.Y.B. Lim, C. Miao, Federated learning in Environments (WiSEE), 2017, pp. 43–47, http://dx.doi.org/10.1109/WiSEE.
the sky: Aerial-Ground air quality sensing framework with UAV swarms, IEEE 2017.8124890.
Internet Things J. (2020) http://dx.doi.org/10.1109/JIOT.2020.3021006, 1–1. [106] A. Rovira-Sugranes, F. Afghah, A. Razi, Optimized compression policy for
[80] A. Razi, C. Wang, F. Almaraghi, Q. Huang, Y. Zhang, H. Lu, A. Rovira-Sugranes, flying Ad hoc networks, in: 2019 16th IEEE Annual Consumer Communications
Predictive routing for wireless networks: Robotics-based test and evaluation Networking Conference (CCNC), 2019, pp. 1–2, http://dx.doi.org/10.1109/
platform, in: 2018 IEEE 8th Annual Computing and Communication Workshop CCNC.2019.8651761.
and Conference (CCWC), 2018, pp. 993–999. [107] A. Rovira-Sugranes, A. Razi, Optimizing the age of information for blockchain
[81] W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: Vision and challenges, technology with applications to IoT sensors, IEEE Commun. Lett. 24 (1) (2020)
IEEE Internet Things J. 3 (5) (2016) 637–646, http://dx.doi.org/10.1109/JIOT. 183–187, http://dx.doi.org/10.1109/LCOMM.2019.2949557.
2016.2579198. [108] M.C. Jeffrey, S. Subramanian, C. Yan, J. Emer, D. Sanchez, A scalable archi-
[82] A.V. Dastjerdi, R. Buyya, Fog computing: Helping the internet of things realize tecture for ordered parallelism, in: 2015 48th Annual IEEE/ACM International
its potential, Computer 49 (8) (2016) 112–116, http://dx.doi.org/10.1109/MC. Symposium on Microarchitecture (MICRO), 2015, pp. 228–241, http://dx.doi.
2016.245. org/10.1145/2830772.2830777.
[83] G. Baldini, S. Karanasios, D. Allen, F. Vergari, Survey of wireless communication [109] Z. Xiaoning, Analysis of military application of UAV swarm technology, in:
technologies for public safety, IEEE Commun. Surv. Tutor. 16 (2) (2014) 2020 3rd International Conference on Unmanned Systems (ICUS), 2020, pp.
619–641, http://dx.doi.org/10.1109/SURV.2013.082713.00034. 1200–1204, http://dx.doi.org/10.1109/ICUS50048.2020.9274974.
[110] J. Peng, Z. Zhang, Q. Wu, B. Zhang, Anti-jamming communications in
[84] V. Sharma, I. You, G. Pau, M. Collotta, J. Deok Lim, J. Kim, LoRaWAN-Based
UAV swarms: A reinforcement learning approach, IEEE Access 7 (2019)
energy-efficient surveillance by drones for intelligent transportation systems,
180532–180543, http://dx.doi.org/10.1109/ACCESS.2019.2958328.
Energies 11 (2018) http://dx.doi.org/10.3390/en11030573.
[111] G. Bansal, B. Sikdar, S-MAPS: Scalable mutual authentication protocol for
[85] V. Delafontaine, F. Schiano, G. Cocco, A. Rusu, D. Floreano, Drone-aided
dynamic UAV swarms, IEEE Trans. Veh. Technol. 70 (11) (2021) 12088–12100,
localization in LoRa IoT networks, in: 2020 IEEE International Conference
http://dx.doi.org/10.1109/TVT.2021.3116163.
on Robotics and Automation (ICRA), 2020, pp. 286–292, http://dx.doi.org/10.
[112] Bansal and Sikdar, Location aware clustering: Scalable authentication protocol
1109/ICRA40945.2020.9196869.
for UAV swarms, IEEE Netw. Lett. 3 (4) (2021) 177–180, http://dx.doi.org/10.
[86] O. Saraereh, A. Alsaraira, I. Khan, P. Uthansakul, Performance evaluation of
1109/LNET.2021.3116073.
UAV-enabled LoRa networks for disaster management applications, Sensors 20
[113] L. Ruetten, P.A. Regis, D. Feil-Seifer, S. Sengupta, Area-optimized UAV swarm
(2020) 1–18, http://dx.doi.org/10.3390/s20082396.
network for search and rescue operations, in: 2020 10th Annual Computing
[87] S. Chandrasekharan, K. Gomez, A. Al-Hourani, S. Kandeepan, T. Rasheed, L.
and Communication Workshop and Conference (CCWC), 2020, pp. 0613–0618,
Goratti, L. Reynaud, D. Grace, I. Bucaille, T. Wirth, S. Allsopp, Designing and
http://dx.doi.org/10.1109/CCWC47524.2020.9031197.
implementing future aerial communication networks, IEEE Commun. Mag. 54
[114] M. Campion, P. Ranganathan, S. Faruque, A review and future directions of UAV
(5) (2016) 26–34, http://dx.doi.org/10.1109/MCOM.2016.7470932.
swarm communication architectures, in: 2018 IEEE International Conference on
[88] Different Wi-Fi protocols and data rates, Intel, https://www.intel.com/content/
Electro/Information Technology (EIT), 2018, pp. 0903–0908, http://dx.doi.org/
www/us/en/support/articles/000005725/network-and-io/wireless.html.
10.1109/EIT.2018.8500274.
[89] xFold SPY, xFoldRig, http://www.xfoldrig.com/xfold-spy/.
[115] A. Tahir, J. Böling, M.-H. Haghbayan, H.T. Toivonen, J. Plosila, Swarms
[90] X. Lin, V. Yajnanarayana, S.D. Muruganathan, S. Gao, H. Asplund, H. Maatta-
of unmanned aerial vehicles — A survey, J. Ind. Inf. Integr. 16
nen, M.B. A, S. Euler, Y.E. Wang, The sky is not the limit: LTE for unmanned
(2019) 100106, http://dx.doi.org/10.1016/j.jii.2019.100106, https://www.
aerial vehicles, CoRR, abs/1707.07534, 2017, arXiv:1707.07534.
sciencedirect.com/science/article/pii/S2452414X18300086.
[91] Y. Zeng, J. Lyu, R. Zhang, Cellular-connected UAV: Potentials, challenges and [116] X. Chen, J. Tang, S. Lao, Review of unmanned aerial vehicle swarm communica-
promising technologies, CoRR, abs/1804.02217, 2018, arXiv:1804.02217. tion architectures and routing protocols, Appl. Sci. 10 (10) (2020) http://dx.doi.
[92] T. Lagkas, V. Argyriou, S. Bibi, P. Sarigiannidis, UAV IoT Framework views org/10.3390/app10103661, https://www.mdpi.com/2076-3417/10/10/3661.
and challenges: towards protecting drones as ‘‘things’’, Sensors 18 (11) (2018) [117] I. Bekmezci, O.K. Sahingoz, S. Temel, Flying Ad-Hoc networks (FANETs):
4015. A survey, Ad Hoc Netw. 11 (3) (2013) 1254–1270, http://dx.doi.org/10.
[93] S. Sekander, H. Tabassum, E. Hossain, Multi-tier drone architecture for 5G/B5G 1016/j.adhoc.2012.12.004, http://www.sciencedirect.com/science/article/pii/
cellular networks: Challenges, trends, and prospects, IEEE Commun. Mag. 56 S1570870512002193.
(3) (2018) 96–103. [118] A. Sivakumar, C.-Y. Tan, UAV swarm coordination using cooperative control for
[94] S.A.R. Naqvi, S.A. Hassan, H. Pervaiz, Q. Ni, Drone-aided communication as a establishing a wireless communications backbone, in: 9th International Joint
key enabler for 5G and resilient public safety networks, IEEE Commun. Mag. Conference on Autonomous Agents and Multiagent Systems 2010, 2010, pp.
56 (1) (2018) 36–42. 1157–1164.
[95] M.Y. Selim, A.E. Kamal, Post-disaster 4G/5G network rehabilitation us- [119] D.F. Vránics, M. Palik, B. Zs, Electronic administration of unmanned aviation
ing drones: Solving battery and backhaul issues, in: 2018 IEEE Globecom with public key infrastructure PKI), Secur. Future 3 (4) (2019) 152–155.
Workshops (GC Wkshps), IEEE, 2018, pp. 1–6. [120] O.K. Sahingoz, Networking models in flying ad-hoc networks (fanets): concepts
[96] W. Saad, M. Bennis, M. Chen, A vision of 6G wireless systems: Applications, and challenges, J. Intell. Robot. Syst. 74 (1-2) (2013) 513–527, http://dx.doi.
trends, technologies, and open research problems, IEEE Netw. 34 (3) (2020) org/10.1007/s10846-013-9959-7.
134–142, http://dx.doi.org/10.1109/MNET.001.1900287. [121] Y. Zhou, J. Li, L. Lamont, C. Rabbath, Modeling of packet dropout for UAV
[97] M. Mozaffari, X. Lin, S. Hayes, Towards 6G with connected sky: UAVs and wireless communications, in: 2012 International Conference on Computing,
beyond, CoRR, abs/2103.01143, 2021, arXiv:2103.01143. Networking and Communications (ICNC), 2012, pp. 677–682, http://dx.doi.org/
[98] S. Aggarwal, N. Kumar, S. Tanwar, Blockchain-envisioned UAV communication 10.1109/ICCNC.2012.61675080.
using 6g networks: open issues, use cases, and future directions, IEEE Inter- [122] H. Shariatmadari, R. Ratasuk, S. Iraji, A. Laya, T. Taleb, R. Jäntti, A. Ghosh,
net Things J. 8 (7) (2021) 5416–5441, http://dx.doi.org/10.1109/JIOT.2020. Machine-type communications: current status and future perspectives toward
3020819. 5G systems, IEEE Commun. Mag. 53 (9) (2015) 10–17, http://dx.doi.org/10.
[99] U. Challita, A. Ferdowsi, M. Chen, W. Saad, Machine learning for wireless 1109/MCOM.2015.7263367.
connectivity and security of cellular-connected UAVs, IEEE Wirel. Commun. [123] F. Boccardi, R.W. Heath, A. Lozano, T.L. Marzetta, P. Popovski, Five disruptive
26 (1) (2019) 28–35, http://dx.doi.org/10.1109/MWC.2018.1800155. technology directions for 5G, IEEE Commun. Mag. 52 (2) (2014) 74–80, http:
[100] J. Park, Y. Kim, J. Seok, Prediction of information propagation in a drone //dx.doi.org/10.1109/MCOM.2014.6736746.
network by using machine learning, in: 2016 International Conference on [124] M. Agiwal, A. Roy, N. Saxena, Next generation 5G wireless networks: A
Information and Communication Technology Convergence (ICTC), 2016, pp. comprehensive survey, IEEE Commun. Surv. Tutor. 18 (3) (2016) 1617–1655,
147–149, http://dx.doi.org/10.1109/ICTC.2016.7763456. http://dx.doi.org/10.1109/COMST.2016.2532458.
22
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[125] P. Demestichas, A. Georgakopoulos, D. Karvounas, K. Tsagkaris, V. Stavroulaki, [151] S. Atev, O. Masoud, N. Papanikolopoulos, Learning traffic patterns at inter-
J. Lu, C. Xiong, J. Yao, 5G On the Horizon: Key challenges for the radio-access sections by spectral clustering of motion trajectories, in: Intelligent Robots
network, IEEE Veh. Technol. Mag. 8 (3) (2013) 47–53, http://dx.doi.org/10. and Systems, 2006 IEEE/RSJ International Conference on, IEEE, 2006, pp.
1109/MVT.2013.2269187. 4851–4856.
[126] G. Beni, J. Wang, Swarm intelligence in cellular robotic systems, in: P. Dario, [152] J.-G. Lee, J. Han, X. Li, A unifying framework of mining trajectory patterns
G. Sandini, P. Aebischer (Eds.), Robots and Biological Systems: Towards a New of various temporal tightness, IEEE Trans. Knowl. Data Eng. 27 (6) (2015)
Bionics?, Springer Berlin Heidelberg, Berlin, Heidelberg, 1993, pp. 703–712. 1478–1490.
[127] S. Awasthi, B. Balusamy, V. Porkodi, Artificial intelligence supervised swarm [153] C. Larsen, M. Zawodniok, S. Jagannathan, Route aware predictive congestion
uavs for reconnaissance, in: U. Batra, N.R. Roy, B. Panda (Eds.), Data Science control protocol for wireless sensor networks, in: Intelligent Control, 2007. ISIC
and Analytics, Springer Singapore, Singapore, 2020, pp. 375–388. 2007. IEEE 22nd International Symposium on, IEEE, 2007, pp. 13–18.
[128] J. Johnson, Artificial intelligence, drone swarming and escalation risks in future [154] H. Tan, Y. Wu, B. Shen, P.J. Jin, B. Ran, Short-term traffic prediction based
warfare, RUSI J. 165 (2) (2020) 26–36, http://dx.doi.org/10.1080/03071847. on dynamic tensor completion, IEEE Trans. Intell. Transp. Syst. 17 (8) (2016)
2020.1752026. 2123–2133.
[129] J. Kusyk, M.U. Uyar, K. Ma, J.J. Wu, W. Ruan, D.K. Guha, G. Bertoli, J. [155] P.P. Choi, M. Hebert, Learning and predicting moving object trajectory: a
Boksiner, AI Based flight control for autonomous UAV swarms, in: 2018 piecewise trajectory segment approach, Robotics Inst. (2006) 337.
International Conference on Computational Science and Computational Intel- [156] G. Aoude, J. Joseph, N. Roy, J. How, Mobile agent trajectory prediction using
ligence (CSCI), 2018, pp. 1155–1160, http://dx.doi.org/10.1109/CSCI46756. Bayesian nonparametric reachability trees, in: Infotech@ Aerospace 2011, 2011,
2018.00223. p. 1512.
[130] J. Kusyk, M.U. Uyar, K. Ma, E. Samoylov, R. Valdez, J. Plishka, S.E. Hoque, [157] A. Razi, Bayesian signal recovery under measurement matrix uncertainty:
G. Bertoli, J. Boksiner, Artificial intelligence and game theory controlled Performance analysis, IEEE Access 7 (2019) 102356–102365.
autonomous UAV swarms, Evol. Intell. (2020) 1–18. [158] G. Lee, R. Mallipeddi, M. Lee, Identification of moving vehicle trajectory
[131] T. Camp, J. Boleng, V. Davies, A survey of mobility models for ad hoc using manifold learning, in: International Conference on Neural Information
network research, Wireless communications and mobile computing 2 (5) (2002) Processing, Springer, 2012, pp. 188–195.
483–502. [159] M.S. Grewal, Kalman filtering, Springer, 2011.
[132] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A performance com- [160] A. Razi, Optimal measurement policy for linear measurement systems with
parison of multi-hop wireless ad hoc network routing protocols, in: Proceedings applications to UAV network topology prediction, IEEE Trans. Veh. Technol.
of the 4th annual ACM/IEEE international conference on Mobile computing and 69 (2) (2019) 1970–1981.
networking, ACM, 1998, pp. 85–97. [161] K. Lee, S. Hong, S.J. Kim, I. Rhee, S. Chong, Slaw: a new mobility model for
[133] W. Wang, X. Guan, B. Wang, Y. Wang, A novel mobility model based on human walks, in: INFOCOM 2009, IEEE, IEEE, 2009, pp. 855–863.
[162] Z.X. Ming, Z. Yue, Y. Fan, A. Vasilakos, Interference-based topology control
semi-random circular movement in mobile ad hoc networks, Inf. Sci. 180
algorithm for delay-constrained mobile ad hoc networks, in mobile computing,
(3) (2010) 399–413, http://dx.doi.org/10.1016/j.ins.2009.10.001, http://www.
IEEE Trans. 14 (4) (2015) 742–754.
sciencedirect.com/science/article/pii/S0020025509004265.
[163] T.-E. Lu, K.-T. Feng, et al., Predictive mobility and location-aware routing
[134] J. Yoon, M. Liu, B. Noble, Sound mobility models, in: Proceedings of the 9th
protocol in mobile ad hoc networks, in: GLOBECOM’05: IEEE Global Telecom-
annual international conference on Mobile computing and networking, ACM,
munications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, pp.
2003, pp. 205–216.
899–903.
[135] M.C. Gonzalez, C.A. Hidalgo, A.-L. Barabasi, Understanding individual human
[164] R. Groenevelt, E. Altman, P. Nain, Relaying in mobile ad hoc networks: the
mobility patterns, Nature 453 (7196) (2008) 779–782.
brownian motion mobility model, Wirel. Netw. 12 (5) (2006) 561–571.
[136] I. Rhee, M. Shin, S. Hong, K. Lee, S.J. Kim, S. Chong, On the levy-walk nature of
[165] M. Owen, R.W. Beard, T.W. McLain, Implementing dubins airplane paths on
human mobility, IEEE/ACM transactions on networking 19 (3) (2011) 630–643.
fixed-wing uavs, in: Handbook of Unmanned Aerial Vehicles, Springer, 2015,
[137] L. Cao, M. Grabchak, Smoothly truncated levy walks: toward a realistic
pp. 1677–1701.
mobility model, in: 2014 IEEE 33rd International Performance Computing and
[166] J. Wiest, M. Höffken, U. Kreßel, K. Dietmayer, Probabilistic trajectory prediction
Communications Conference (IPCCC), IEEE, 2014, pp. 1–8.
with gaussian mixture models, in: Intelligent Vehicles Symposium (IV), 2012
[138] A. Orsino, A. Ometov, G. Fodor, D. Moltchanov, L. Militano, S. Andreev, O.N.
IEEE, IEEE, 2012, pp. 141–146.
Yilmaz, T. Tirronen, J. Torsner, G. Araniti, et al., Effects of heterogeneous
[167] K. Chandrashekar, M.R. Dekhordi, J.S. Baras, Providing full connectivity in
mobility on d2d-and drone-assisted mission-critical mtc in 5g, IEEE Commun.
large ad-hoc networks by dynamic placement of aerial platforms, in: IEEE
Mag. 55 (2) (2017) 79–87.
MILCOM 2004. Military Communications Conference, 2004, 3, IEEE, 2004, pp.
[139] K. Kumari, B. Sah, S. Maakar, A survey: different mobility model for fanet,
1429–1436.
International Journal of Advanced Research in Computer Science and Software
[168] W.T.L. Teacy, J. Nie, S. McClean, G. Parr, Maintaining connectivity in UAV
Engineering 5 (6) (2015).
swarm sensing, in: 2010 IEEE Globecom Workshops, 2010, pp. 1771–1776,
[140] I. Bekmezci, M. Ermis, S. Kaplan, Connected multi UAV task planning for flying
http://dx.doi.org/10.1109/GLOCOMW.2010.5700246.
ad hoc networks, in: Communications and Networking (BlackSeaCom), 2014 [169] M. Rosalie, M.R. Brust, G. Danoy, S. Chaumette, P. Bouvry, Coverage Opti-
IEEE International Black Sea Conference on, IEEE, 2014, pp. 28–32. mization with Connectivity Preservation for UAV Swarms Applying Chaotic
[141] S.-J. Lee, M. Gerla, C.-C. Chiang, On-demand multicast routing protocol, in: Dynamics, in: 2017 IEEE International Conference on Autonomic Computing
Wireless Communications and Networking Conference, 1999. WCNC. 1999 (ICAC), 2017, pp. 113–118.
IEEE, 3, IEEE, 1999, pp. 1298–1302. [170] R. Costa, D. Rosario, E. Cerqueira, A. Santos, Enhanced connectivity for robust
[142] O. Bouachir, A. Abrassart, F. Garcia, N. Larrieu, A mobility model for UAV ad multimedia transmission in UAV networks, in: 2014 IFIP Wireless Days (WD),
hoc network, in: 2014 International Conference on Unmanned Aircraft Systems 2014, pp. 1–6.
(ICUAS), 2014, pp. 383–388, http://dx.doi.org/10.1109/ICUAS.2014.6842277. [171] S. Alsamhi, O. Ma, M.S. Ansari, Convergence of machine learning and robotics
[143] E. Kuiper, S. Nadjm-Tehrani, Mobility models for UAV group reconnaissance communication in collaborative assembly: mobility, connectivity and future
applications, in: Wireless and Mobile Communications, 2006. ICWMC’06. perspectives, J. Intell. Robot. Syst. (2019) 1–26.
International Conference on, IEEE, 2006, 33–33. [172] E.W. Dijkstra, A note on two problems in connexion with graphs, Numer. Math.
[144] E. Kieffer, G. Danoy, P. Bouvry, A. Nagih, Hybrid mobility model with 1 (1) (1959) 269–271, http://dx.doi.org/10.1007/BF01386390.
pheromones for UAV detection task, in: 2016 IEEE Symposium Series on [173] L. Ying, S. Shakkottai, A. Reddy, S. Liu, On combining shortest-path and back-
Computational Intelligence (SSCI), 2016, pp. 1–8, http://dx.doi.org/10.1109/ pressure routing over multihop wireless networks, IEEE/ACM Trans. Netw. 19
SSCI.2016.7850104. (3) (2011) 841–854, http://dx.doi.org/10.1109/TNET.2010.2094204.
[145] Vehicular mobility trace of the city of Cologne, Germany, Institute of Trans- [174] O.K. Sahingoz, Networking models in flying Ad-Hoc networks (FANETs):
portation Systems at the German Aerospace Center (ITS-DLR), 2016, http: Concepts and challenges, J. Intell. Robot. Syst. 74 (1) (2014) 513–527,
//kolntrace.project.citi-lab.fr/. 10.1007/s10846-013-9959-7.
[146] S. Uppoor, O. Trullols-Cruces, M. Fiore, J.M. Barcelo-Ordinas, Generation and [175] T.H. Clausen, P. Jacquet, Optimized link state routing protocol (OLSRP), in:
analysis of a large-scale urban vehicular mobility dataset, IEEE Trans. Mob. The Internet Engineering Task Force, MANET working Group, vol. 3626, 2003.
Comput. 13 (5) (2014) 1061–1075. [176] A. Alshabtat, L. Dong, J. Li, F. Yang, Low latency routing algorithm for
[147] B.A. Boghossian, S.A. Velastin, Image processing system for pedestrian moni- unmanned aerial vehicles Ad-hoc networks, in: Int. J. Elect. Comput. Eng., 6
toring using neural classification of normal motion patterns, Meas. Control 32 (2011) 48–54.
(9) (1999) 261–264. [177] S.Y. Dong, Optimization of OLSR routing protocol in UAV ad HOC network,
[148] O. Ossama, H.M.O. Mokhtar, M.E. El-Sharkawi, An extended k-means technique in: 2016 13th International Computer Conference on Wavelet Active Media
for clustering moving objects, Egypt. Inform. J. 12 (1) (2011) 45–51. Technology and Information Processing (ICCWAMTIP), 2016, pp. 90–94.
[149] M. Bennewitz, W. Burgard, G. Cielniak, S. Thrun, Learning motion patterns of [178] N. Coutinho, R. Matos, C. Marques, A. Reis, S. Sargento, J. Chakareski, A.
people for compliant robot motion, Int. J. Robot. Res. 24 (1) (2005) 31–48. Kassler, Dynamic dual-reinforcement-learning routing strategies for quality of
[150] J. Harri, F. Filali, C. Bonnet, Mobility models for vehicular ad hoc networks: a experience-aware wireless mesh networking, Elsevier Comput. Netw. 88 (2015)
survey and taxonomy, IEEE Commun. Surv. Tutor. 11 (4) (2009). 269–285.
23
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[179] C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector [204] R. Shirani, M. St-Hilaire, T. Kunz, Y. Zhou, J. Li, L. Lamont, Combined reactive-
routing (DSDV) for mobile computers, in: Proceedings of the Conference on geographic routing for unmanned aeronautical Ad-hoc networks, in: 2012
Communications Architectures, Protocols and Applications, in: SIGCOMM ’94, 8th International Wireless Communications and Mobile Computing Conference
ACM, New York, NY, USA, 1994, pp. 234–244, http://dx.doi.org/10.1145/ (IWCMC), 2012, pp. 820–826.
190314.190336. [205] Y. Li, M. St-Hilaire, T. Kunz, Enhancements to reduce the overhead of the
[180] J. Chroboczek, The babel routing protocol, IETF RFC 6126, 2011, https://tools. reactive-greedy-reactive routing protocol for unmanned aeronautical Ad-Hoc
ietf.org/html/rfc6126. networks, in: 2012 8th International Conference on Wireless Communications,
[181] M. Al-Ghazal, A. El-Sayed, H. Kelash, Routing optimlzation using genetic Networking and Mobile Computing, 2012, pp. 1–4.
algorithm in Ad Hoc networks, in: 2007 IEEE International Symposium on [206] D. Rosario, Z. Zhao, A. Santos, T. Braun, E. Cerqueira, A beaconless
Signal Processing and Information Technology, 2007, pp. 497–503. opportunistic routing based on a cross-layer approach for efficient video
[182] S.A.N. Shaha, V. Pai, U.K. Shenoy, Comparison of wireless routing protocols dissemination in mobile multimedia IoT applications, Comput. Commun. 45
over FTP traffic in mobile and non mobile nodes, in: 2017 International (2014) 21–31, http://dx.doi.org/10.1016/j.comcom.2014.04.002, http://www.
Conference on Intelligent Computing, Instrumentation and Control Technologies sciencedirect.com/science/article/pii/S0140366414001388.
(ICICICT), 2017, pp. 349–353. [207] S. Temel, I. Bekmezci, LODMAC: Location Oriented directional MAC pro-
[183] B. Bellur, R.G. Ogier, A reliable, efficient topology broadcast protocol for tocol for FANETs, Comput. Netw. 83 (2015) 76–84, http://dx.doi.org/10.
dynamic networks, in: INFOCOM ’99. Eighteenth Annual Joint Conference of 1016/j.comnet.2015.03.001, http://www.sciencedirect.com/science/article/pii/
the IEEE Computer and Communications Societies. Proceedings, vol. 1, IEEE, S138912861500081X.
1999, pp. 178–186 vol.1. [208] S. Biswas, R. Morris, ExOR: Opportunistic routing in multi-hop wireless
[184] A. Neumann, C. Aichele, M. Lindner, S. Wunderlich, Ietf better ap- networks[C], in: Proc. of the ACM SIGCOMM 2005, 2005, pp. 133–143.
proach to mobile Ad hoc networking (B.A.T.M.A.N.), IETF Internet Draft [209] Y. Ko, N.H. Vaidya, Location-aided routing (LAR) in mobile Ad Hoc net-
draft-wunderlich-openmesh-manet-routing-00, 2008, https://tools.ietf.org/html/ works, Wireless Netw. 6 (4) (2000) 307–321, http://dx.doi.org/10.1023/A:
draft-wunderlichopenmesh-manet-routing-00. 1019106118419.
[185] D. B. Johnson, D. Maltz, Dynamic source routing in ad hoc wireless networks, [210] J. Mingliang, L. Jinyang, T.Y. Chiang, Cluster based routing protocol(CBRP)
Mobile Comput. 353 (1999). functional specification, 1998, https://tools.ietf.org/id/draft-ietf-manet-cbrp-
[186] S. Murthy, J.J. Garcia-Luna-Aceves, An efficient routing protocol for wireless spec-00.txt.
networks, Mobile Netw. Appl. 1 (2) (1996) 183–197, http://dx.doi.org/10. [211] K. Devarajan, V. Padmathilagam, An enhanced cluster gateway switch routing
1007/BF01193336. protocol (ecgsr) for congestion control using aodv algorithm in manet, Int.
[187] Y. Wang, J. Liu, A backup multipath routing protocol for ad hoc networks J. Comput. Appl. Technol. 123 (3) (2015) 37–42, http://dx.doi.org/10.5120/
with dynamic topology, in: 2012 3rd International Conference on System ijca2015905277.
Science, Engineering Design and Manufacturing Informatization, vol. 1, 2012, [212] K. Obraczka, K. Viswanath, G. Tsudik, Flooding for reliable multicast in multi-
pp. 237–241. hop ad hoc networks, Wireless Netw. 7 (6) (2001) 627–634, http://dx.doi.org/
[188] P.M. Carthy, D. Grigoras, Multipath associativity based routing, in: Second 10.1023/A:1012323519059.
Annual Conference on Wireless On-demand Network Systems and Services,
[213] Y. Sasson, D. Cavin, A. Schiper, Probabilistic broadcast for flooding in wireless
2005, pp. 60–69, http://dx.doi.org/10.1109/WONS.2005.24.
mobile ad hoc networks, in: 2003 IEEE Wirel. Commun. and Networking, 2003.
[189] R. Dube, C.D. Rais, K.-Y. Wang, S.K. Tripathi, Signal stability-based adaptive WCNC 2003, vol. 2, 2003, pp. 1124–1130, vol.2.
routing (SSA) for ad hoc mobile networks, IEEE Pers. Commun. 4 (1) (1997)
[214] H. Tian, H. Shen, T. Matsuzawa, RandomWalk routing for wireless sensor net-
36–45.
works, in: Sixth International Conference on Parallel and Distributed Computing
[190] S.S. Naik, A.U. Bapat, Message priority based routing protocol in MANETs, in:
Applications and Technologies (PDCAT’05), 2005, pp. 196–200.
2015 International Conference on Pervasive Computing (ICPC), 2015, pp. 1–5.
[215] X. Li, X. Tao, N. Li, Energy-efficient cooperative MIMO-based random walk
[191] Y.-H. Wang, C.-F. Chao, Dynamic backup routes routing protocol for mo-
routing for wireless sensor networks, IEEE Commun. Lett. 20 (11) (2016)
bile ad hoc networks, Inf. Sci. 176 (2) (2006) 161–185, http://dx.doi.
2280–2283.
org/10.1016/j.ins.2004.09.016, http://www.sciencedirect.com/science/article/
[216] Z. Zheng, A.K. Sangaiah, T. Wang, Adaptive communication protocols in flying
pii/S0020025504003275.
Ad Hoc network, IEEE Commun. Mag. 56 (1) (2018) 136–142, http://dx.doi.
[192] D. Dimitrova, M. Brogle, T. Braun, G. Heijenk, N. Meratnia, Joint ERCIM
org/10.1109/MCOM.2017.1700323.
eMobility and MobiSense Workshop, University of Bern, 2012.
[217] S. Rosati, K. Kruzelecki, L. Traynard, B.R. Mobile, Speed-aware routing for UAV
[193] J. Hope Forsmann, R. Hiromoto, J. Svoboda, A time-slotted on-demand routing
ad-hoc networks, in: 2013 IEEE Globecom Workshops (GC Wkshps), 2013, pp.
protocol for mobile ad hoc unmanned vehicle systems - art. no. 65611P, 2007.
1367–1373.
[194] Z.J. Haas, M.R. Pearlman, P. Samar, The zone routing protocol (ZRP) for
[218] S. Rosati, K. Kruzelecki, G. Heitz, D. Floreano, B. Rimoldi, Dynamic routing for
ad hoc networks, IETF Internet Draft draft-ietf-manet-zonezrp-04, 2002, https:
flying Ad Hoc networks, IEEE Trans. Veh. Technol. 65 (3) (2016) 1690–1700,
//www.ietf.org/proceedings/55/I-D/draft-ietf-manet-zone-zrp-04.txt.
http://dx.doi.org/10.1109/TVT.2015.2414819.
[195] V. Park, S. Corson, Temporally-ordered routing algorithm (TORA), IETF Internet
[219] L. Lin, Q. Sun, J. Li, F. Yang, A novel geographic position mobility oriented
Draft draft-ietf-manet-tora-spec-04, 2001, http://www.ietf.org/proceedings/52/
routing strategy for UAVs, J. Comput. Inf. Syst. 8 (2012) 709–716.
I-D/draftietf-manet-tora-spec-04.txt.
[196] B. Karp, H.T. Kung, Gpsr: greedy perimeter stateless routing for wireless [220] C. Zang, S. Zang, Mobility prediction clustering algorithm for UAV networking,
networks, in: Proceedings of the 6th Annual International Conference on Mobile in: 2011 IEEE GLOBECOM Workshops (GC Wkshps), 2011, pp. 1158–1161,
Computing and Networking, in: MobiCom ’00, ACM, New York, NY, USA, 2000, http://dx.doi.org/10.1109/GLOCOMW.2011.6162360.
pp. 243–254, http://dx.doi.org/10.1145/345910.345953. [221] G. Gankhuyag, A.P. Shrestha, S. Yoo, Robust and reliable predictive routing
[197] C. Liu, J. Wu, Efficient geometric routing in three dimensional Ad Hoc networks, strategy for flying ad-hoc networks, IEEE Access 5 (2017) 643–654.
in: IEEE INFOCOM 2009, 2009, pp. 2751–2755. [222] Y. Li, M. St-Hilaire, T. Kunz, Improving routing in networks of uavs via scoped
[198] R. Flury, R. Wattenhofer, Randomized 3D geographic routing, in: IEEE flooding and mobility prediction, in: 2012 IFIP Wireless Days, 2012, pp. 1–6,
INFOCOM 2008 - The 27th Conference on Computer Communications, 2008. http://dx.doi.org/10.1109/WD.2012.6402827.
[199] Y. Li, S. Xie, Y. Yu, Analysis of greedy forwarding in vehicular Ad Hoc networks, [223] W. Jung, J. Yim, Y. Ko, QGeo: Q-Learning-Based Geographic Ad Hoc routing
in: 2011 International Conference on System science, Engineering design and protocol for unmanned robotic networks, IEEE Commun. Lett. 21 (10) (2017)
Manufacturing informatization, vol. 2, 2011, pp. 344–347. 2258–2261, http://dx.doi.org/10.1109/LCOMM.2017.2656879.
[200] S. Li, H. Gao, D. Wu, An energy-balanced routing protocol with greedy [224] B. Sliwa, C. Schüler, M. Patchou, C. Wietfeld, PARRoT: Predictive Ad-hoc
forwarding for WSNs in cropland, in: 2016 IEEE International Conference on Routing fueled by reinforcement learning and trajectory knowledge, 2020,
Electronic Information and Communication Technology (ICEICT), 2016, pp. 1–7. arXiv:2012.05490.
[201] J. Zhou, Y. Chen, B. Leong, P.S. Sundaramoorthy, Practical 3D geographic [225] C. He, S. Liu, S. Han, A fuzzy logic reinforcement learning-based routing
routing for wireless sensor networks, in: Proceedings of the 8th ACM Conference algorithm for flying Ad Hoc networks, in: 2020 International Conference on
on Embedded Networked Sensor Systems, in: SenSys ’10, ACM, New York, NY, Computing, Networking and Communications (ICNC), 2020, pp. 987–991, http:
USA, 2010, pp. 337–350, http://dx.doi.org/10.1145/1869983.1870016. //dx.doi.org/10.1109/ICNC47757.2020.9049705.
[202] D. Rosario, Z. Zhao, T. Braun, E. Cerqueira, A. Santos, I. Alyafawi, Opportunistic [226] R.S. Sutton, A.G. Barto, Reinforcement learning: An introduction, IEEE Trans.
routing for multi-flow video dissemination over flying Ad-Hoc networks, in: Neural Netw. 16 (1988) 285–286.
Proceeding of IEEE International Symposium on a World of Wireless, Mobile [227] A. Rovira-Sugranes, F. Afghah, J. Qu, A. Razi, Fully-echoed Q-routing with
and Multimedia Networks 2014, 2014, pp. 1–6, http://dx.doi.org/10.1109/ simulated annealing inference for flying Adhoc networks, IEEE Trans. Netw.
WoWMoM.2014.6918947. Sci. Eng. (2021) http://dx.doi.org/10.1109/TNSE.2021.3085514.
[203] W. Qingwen, L. Gang, L. Zhi, Q. Qian, An adaptive forwarding protocol for [228] J.A. Boyan, M.L. Littman, Packet routing in dynamically changing networks:
three dimensional flying Ad Hoc networks, in: 2015 IEEE 5th International a reinforcement learning approach, in: Int. Conf. on Neural Info. Processing
Conference on Electronics Information and Emergency Communication, 2015, Systems, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993, pp.
pp. 142–145, http://dx.doi.org/10.1109/ICEIEC.2015.7284506. 671–678.
24
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[229] S. Khodayari, M.J. Yazdanpanah, Network routing based on reinforcement [256] S.P.H. Engineering / UgCS, Leading drone control software, UgCS, https://www.
learning in dynamically changing networks, in: ICTAI’05, 2005, 5 pp.–366. ugcs.com/.
[230] S.P.M. Choi, D.-Y. Yeung, Predictive q-routing: a memory-based reinforce- [257] A.I. Hentati, L. Krichen, M. Fourati, L.C. Fourati, Simulation tools, environments
ment learning approach to adaptive traffic control, in: Conf. on Neural Info. and frameworks for UAV systems performance analysis, in: 2018 14th Interna-
Processing Systems, MIT Press, Cambridge, MA, USA, 1995, pp. 945–951. tional Wireless Communications Mobile Computing Conference (IWCMC), 2018,
[231] S. Kumar, R. Mukkulainen, Confidence based dual reinforcement q-routing: an pp. 1495–1500, http://dx.doi.org/10.1109/IWCMC.2018.8450505.
adaptive online network routing algorithm, in: IJCAI’99, Morgan Kaufmann [258] C. Coopmans, M. Podhradský, N.V. Hoffer, Software- and hardware-in-the-loop
Publishers Inc., San Francisco, CA, USA, 1999, pp. 758–763. verification of flight dynamics model and flight control simulation of a fixed-
[232] F. Tekiner, Z. Ghassemlooy, T.R. Srikanth, Comparison of the Q-routing and wing unmanned aerial vehicle, in: 2015 Workshop on Research, Education
shortest path routing algorithm, 2004. and Development of Unmanned Aerial Systems (RED-UAS), 2015, pp. 115–122,
[233] N. Gupta, M. Kumar, A. Sharma, M.S. Gaur, V. Laxmi, M. Daneshtalab, M. http://dx.doi.org/10.1109/RED-UAS.2015.7440998.
Ebrahimi, Improved route selection approaches using Q-learning framework for [259] Microsoft, Microsoft AirSim: Open source simulator based on unreal engine for
2D NoCs, in: Int. Workshop on Many-core Embedded Systems, ACM, New York, autonomous vehicles from microsoft AI and research, 2017, https://github.com/
NY, USA, 2015, pp. 33–40. Microsoft/AirSim.
[234] Y. Shilova, M. Kavalerov, I. Bezukladnikov, Full echo Q-routing with adap- [260] J. Antunes, AirSim: A Simulator to help AI research for use in drones,
tive learning rates: A reinforcement learning approach to network routing, commercial UAV news, 2017, https://www.commercialuavnews.com/public-
in: IEEE Conf. EIConRusNW, 2016, pp. 341–344, http://dx.doi.org/10.1109/ safety/airsim-simulator-help-artificial-intelligence-research-use-drones.
[261] NS-3 Tutorial, 2020, https://www.nsnam.org/docs/release/3.32/tutorial/html/
EIConRusNW.2016.7448188.
index.html.
[235] M. Kavalerov, Y. Shilova, Y. Likhacheva, Adaptive q-routing with random
[262] OPNET Network Simulator, Opnet Projects, 2020, https://opnetprojects.com/
echo and route memory, in: Proceedings of the 20th Conference of Open
opnet-network-simulator/.
Innovations Association FRUCT, FRUCT Oy, Helsinki, Finland, Finland, 2017,
[263] M. Calvo-Fullana, D. Mox, A. Pyattaev, J. Fink, V. Kumar, A. Ribeiro, ROS-
pp. 20:138–20:145.
NetSim: A Framework for the integration of robotic and network simulators,
[236] D. Sharma, D. Kukreja, P. Aggarwal, M. Kaur, A. Sachan, Poisson’s probability-
IEEE Robotics Autom. Lett. 6 (2) (2021) 1120–1127, http://dx.doi.org/10.1109/
based q-routing techniques for message forwarding in opportunistic networks,
LRA.2021.3056347.
Int. J. Commun. Syst. 31 (2018) http://dx.doi.org/10.1002/dac.3593.
[264] S.M. Najafabadi, N. Mastronarde, M.J. Medley, J.D. Matyjas, UB-ANC: An Open
[237] F. Wang, R. Feng, H. Chen, Dynamic routing algorithm with q-learning for platform testbed for software-defined airborne networking and communications,
internet of things with delayed estimator, IOP Conf. Ser. Earth Environ. Sci. CoRR, abs/1509.08346, 2015, arXiv:1509.08346.
234 (2019) 012048. [265] V. Marojevic, I. Guvenc, R. Dutta, M.L. Sichitiu, B.A. Floyd, Advanced wireless
[238] T. Hendriks, M. Camelo, S. Latré, Q2-routing : a qos-aware q-routing algorithm for unmanned aerial systems: 5G standardization, research challenges, and
for wireless ad hoc networks, in: 2018 14th International Conference on AERPAW architecture, IEEE Veh. Technol. Mag. 15 (2) (2020) 22–30, http:
Wireless and Mobile Computing, Networking and Communications (WiMob), //dx.doi.org/10.1109/MVT.2020.2979494.
2018, pp. 108–115, http://dx.doi.org/10.1109/WiMOB.2018.8589161. [266] M.L. Sichitiu, I. Guvenc, R. Dutta, V. Marojevic, B. Floyd, AERPAW Emulation
[239] N. Lyu, G. Song, B. Yang, Y. Cheng, QNGPSR: A Q-Network Enhanced geo- overview, in: Proceedings of the 14th International Workshop on Wireless Net-
graphic Ad-Hoc routing protocol based on GPSR, in: 2018 IEEE 88th Vehicular work Testbeds, Experimental Evaluation & Characterization, in: WiNTECH’20,
Technology Conference (VTC-Fall), 2018, pp. 1–6, http://dx.doi.org/10.1109/ Association for Computing Machinery, New York, NY, USA, 2020, pp. 1–8,
VTCFall.2018.8690651. http://dx.doi.org/10.1145/3411276.3412188.
[240] J. LIU, Q. WANG, C. HE, Y. XU, ARdeep: Adaptive And reliable routing [267] NC State named a hot spot for 5G innovation, NC State News, 2019, https:
protocol for mobile robotic networks with deep reinforcement learning, in: //news.ncsu.edu/2019/12/5g-wireless-network-aerpaw/.
2020 IEEE 45th Conference on Local Comput. Netw. (LCN), 2020, pp. 465–468, [268] J. Breen, A. Buffmire, J. Duerig, K. Dutt, E. Eide, M. Hibler, D. Johnson, S.K.
http://dx.doi.org/10.1109/LCN48667.2020.9314848. Kasera, E. Lewis, D. Maas, A. Orange, N. Patwari, D. Reading, R. Ricci, D.
[241] Y. Chen, N. Lyu, G. Song, et al., A traffic-aware Q-network enhanced routing Schurig, L.B. Stoller, J. Van der Merwe, K. Webb, G. Wong, POWDER: Platform
protocol based on GPSR for unmanned aerial vehicle ad-hoc networks, Front. For open wireless data-driven experimental research, in: Proceedings of the 14th
Inform. Technol. Electron. Eng. 21 (2020) 1308–1320, http://dx.doi.org/10. International Workshop on Wireless Network Testbeds, Experimental Evaluation
1631/FITEE.1900401. and Characterization (WiNTECH), 2020, http://dx.doi.org/10.1145/3411276.
[242] J. Liu, Q. Wang, C. He, K. Jaffrès-Runser, Y. Xu, Z. Li, Y. Xu, 3412204.
QMR:Q-learning Based multi-objective optimization routing protocol for fly- [269] P. Gawłowicz, A. Zubow, Ns-3 meets openai gym: the playground for ma-
ing Ad Hoc networks, Comput. Commun. 150 (2020) 304–316, http: chine learning in networking research, in: ACM International Conference
//dx.doi.org/10.1016/j.comcom.2019.11.011, https://www.sciencedirect.com/ on Modeling, Analysis and Simulation of Wireless and Mobile Systems
science/article/pii/S0140366419308278. (MSWiM), 2019, http://www.tkn.tu-berlin.de/fileadmin/fg112/Papers/2019/
[243] Q. Yang, S. Jang, S. Yoo, Q-Learning-Based Fuzzy logic for multi-objective gawlowicz19_mswim.pdf.
routing algorithm in flying Ad Hoc networks, Wireless Pers. Commun. 113 [270] H. Yin, P. Liu, L. Zhang, L. Cao, Y. Gao, X. Hei, X.-J. Hei, NS3-AI: Enable
(2020) 115–138, http://dx.doi.org/10.1007/s11277-020-07181-w. Applying artificial intelligence to network simulation in ns-3, 2020.
[244] S. Jiang, Z. Huang, Y. Ji, Adaptive UAV-assisted geographic routing with Q- [271] AERPAW Equipment, AERPAW, https://aerpaw.org/aerpaw-equipment/.
Learning in VANET, IEEE Commun. Lett. (2020) http://dx.doi.org/10.1109/ [272] A. Antonini, W. Guerra, V. Murali, T. Sayre-McCord, S. Karaman, The blackbird
LCOMM.2020.3048250, 1–1. dataset: A large-scale dataset for UAV perception in aggressive flight, 2018,
[245] J. Wu, M. Fang, X. Li, Reinforcement learning based mobility adaptive routing arXiv:1810.01987.
for vehicular Ad-Hoc networks, 101 (4) (2018) 2143–2171 http://dx.doi.org/ [273] N. Smith, N. Moehrle, M. Goesele, W. Heidrich, UAV Pathplanning dataset
10.1007/s11277-018-5809-z. & benchmark, KAUST research repository, 2018, http://dx.doi.org/10.25781/
[246] O. Oubbati, N. CHAIB, A. Lakas, S. Bitam, P. Lorenz, U2rv: uav-assisted KAUST-SUHGA, http://hdl.handle.net/10754/630159.
[274] M.l.F. Vandroogenbroeck, Marc, Mid-Air Dataset, https://midair.ulg.ac.be/.
reactive routing protocol for vanets, Int. J. Commun. Syst. PP (2019) 1–13,
[275] J. Delmerico, T. Cieslewski, H. Rebecq, M. Faessler, D. Scaramuzza, Are we
http://dx.doi.org/10.1002/dac.4104.
ready for autonomous drone racing? The UZH-FPV drone racing dataset, in:
[247] Plane 11 Flight Simulator: More Powerful. Made Usable. X, 2020, https://www.
IEEE Int. Conf. Robot. Autom. (ICRA), 2019.
x-plane.com/.
[276] X. Pan, P. Desbarats, S. Chaumette, A deep learning based framework for
[248] A. Perry, The FlightGear Flight Simulator, 2004.
UAV trajectory pattern recognition, in: 2019 Ninth International Conference
[249] Osrf, Why Gazebo?, gazebo, http://gazebosim.org/.
on Image Processing Theory, Tools and Applications (IPTA), 2019, pp. 1–6,
[250] jMAVSim Simulation PX4 v1.9.0 Developer Guide, https://dev.px4.io/v1.9.0/ http://dx.doi.org/10.1109/IPTA.2019.8936099.
en/simulation/jmavsim.html. [277] X. Liu, Y. Liu, Y. Chen, L. Hanzo, Trajectory design and power control for multi-
[251] S. Shah, D. Dey, C. Lovett, A. Kapoor, AirSim: High-Fidelity Visual and UAV assisted wireless networks: A machine learning approach, IEEE Trans.
physical simulation for autonomous vehicles, CoRR, abs/1705.05065, 2017, Veh. Technol. 68 (8) (2019) 7957–7969, http://dx.doi.org/10.1109/TVT.2019.
arXiv:1705.05065. 2920284.
[252] M. Müller, V. Casser, J. Lahoud, N. Smith, B. Ghanem, UE4Sim: A Photo- [278] H. Wang, J. Wang, J. Chen, Y. Gong, G. Ding, Network-connected UAV com-
realistic simulator for computer vision applications, CoRR, abs/1708.05869, munications: potentials and challenges, CoRR, abs/1806.04583, 2018, arXiv:
2017, arXiv:1708.05869. 1806.04583.
[253] Overview - QGroundControl user guide, https://docs.qgroundcontrol.com/ [279] M. Cooney, Drones still face major communications challenges getting onto
master/en/index.html. US airspace, Network World, 2013, https://www.networkworld.com/article/
[254] Mission planner ground control station - Mission Planner documentation, https: 2224063.
//ardupilot.org/planner/docs/mission-planner-ground-control-station.html. [280] M. Mozaffari, W. Saad, M. Bennis, Y. Nam, M. Debbah, A tutorial on uavs for
[255] A.-M. Andreescu, M. Dima, A. Istrate, C. Muresan, C. Visoiu, P. Parvu, wireless networks: applications, challenges, and open problems, IEEE Commun.
Autonomous system for image geo-tagging and target recognition, 2014. Surv. Tutor. (2019) http://dx.doi.org/10.1109/COMST.2019.2902862.
25
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
[281] A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L.G. Giordano, A. García-Rodríguez, [306] F. Delgado, J. Carvalho, T. Coelho, A.D. Santos, An optical fiber sensor and its
J. Yuan, Survey on UAV cellular communications: practical aspects, standardiza- application in UAVs for current measurements, Sensors 16 (11) (2016) 1800,
tion advancements, regulation, and security challenges, CoRR, abs/1809.01752, http://dx.doi.org/10.3390/s16111800.
2018, arXiv:1809.01752. [307] W. Griethe, M. Gregory, F. Heine, H. Kampfner, High speed laser
[282] H. Shakhatreh, A. Sawalmeh, A.I. Al-Fuqaha, Z. Dou, E. Almaita, I. Khalil, N.S. communications in UAV scenarios, 2011, http://dx.doi.org/10.1117/12.884274.
Othman, A. Khreishah, M. Guizani, Unmanned aerial vehicles: A survey on [308] B.O. Sadiq, A feasibility study of using light fidelity with multiple unmanned
civil applications and key research challenges, CoRR, abs/1805.00881, 2018, aerial vehicles for indoor collaborative and cooperative networking, CoRR,
arXiv:1805.00881. abs/1707.08627, 2017, arXiv:1707.08627.
[309] Jun Luo, J. Hubaux, P.T. Eugster, DICTATE: DIstributed CerTification Authority
[283] Y. Fu, S. Wang, C. Wang, X. Hong, S. McLaughlin, Artificial intelligence to
with probabilisTic frEshness for ad hoc networks, IEEE Trans. Dependable Secur.
manage network traffic of 5G wireless networks, IEEE Netw. 32 (6) (2018)
Comput. 2 (4) (2005) 311–323, http://dx.doi.org/10.1109/TDSC.2005.49.
58–64, http://dx.doi.org/10.1109/MNET.2018.1800115.
[310] L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor
[284] L. Xiao, X. Lu, D. Xu, Y. Tang, L. Wang, W. Zhuang, UAV Relay in VANETs
networks, in: Proceedings of the 9th ACM Conference on Computer and Com-
against smart jamming with reinforcement learning, IEEE Trans. Veh. Technol.
munications Security, in: CCS ’02, Association for Computing Machinery, New
67 (5) (2018) 4087–4097, http://dx.doi.org/10.1109/TVT.2018.2789466.
York, NY, USA, 2002, pp. 41–47, http://dx.doi.org/10.1145/586110.586117.
[285] P. Fraga-Lamas, L. Ramos, V.M. Mondéjar-Guerra, T. Fernández-Caramés, A [311] M. Gharib, E. Emamjomeh-Zadeh, A. Norouzi-Fard, A. Movaghar, A novel
review on IoT deep learning UAV systems for autonomous obstacle detection probabilistic key management algorithm for large-scale MANETs, in: 2013 27th
and collision avoidance, Remote Sens. 11 (2019) 2144, http://dx.doi.org/10. International Conference on Advanced Information Networking and Applica-
3390/rs11182144. tions Workshops, 2013, pp. 349–356, http://dx.doi.org/10.1109/WAINA.2013.
[286] S. Islam, Q. Huang, F. Afghah, P. Fule, A. Razi, Fire frontline monitoring 107.
by enabling uav-based virtual reality with adaptive imaging rate, in: 2019 [312] I.J. Jensen, D.F. Selvaraj, P. Ranganathan, Blockchain technology for net-
53rd Asilomar Conference on Signals, Systems, and Computers, IEEE, 2019, worked swarms of unmanned aerial vehicles (UAVs), in: 2019 IEEE 20th
pp. 368–372. International Symposium on‘‘ A World of Wireless, Mobile and Multimedia
[287] M. Erdelj, E. Natalizio, UAV-Assisted disaster management: Applications and Networks’’(WoWMoM), IEEE, 2019, pp. 1–7.
open issues, in: 2016 international conference on computing, networking and [313] T. Alladi, N. Naren, G. Bansal, V. Chamola, M. Guizani, SecAuthUAV: A Novel
communications (ICNC), IEEE, 2016, pp. 1–5. authentication scheme for UAV-base station scenario, IEEE Trans. Veh. Technol.
[288] L.F. Gonzalez, G.A. Montes, E. Puig, S. Johnson, K. Mengersen, K.J. Gaston, (2020).
Unmanned aerial vehicles (uavs) and artificial intelligence revolutionizing [314] A. Couturier, M. Akhloufi, A review on absolute visual localization for UAV,
wildlife monitoring and conservation, Sensors 16 (1) (2016) 97. Robot. Auton. Syst. 135 (2021) 103666, http://dx.doi.org/10.1016/j.robot.
[289] M.Y. Arafat, S. Moh, Location-aided delay tolerant routing protocol in UAV 2020.103666.
networks for post-disaster operation, IEEE Access 6 (2018) 59891–59906, http: [315] G. Bansal, V. Chamola, Lightweight authentication protocol for inter base
//dx.doi.org/10.1109/ACCESS.2018.2875739. station communication in heterogeneous networks, in: IEEE INFOCOM 2020
- IEEE Conference on Comput. Commun. Workshops (INFOCOM WKSHPS),
[290] B. Uragun, Energy efficiency for unmanned aerial vehicles, in: 2011 10th
2020, pp. 871–876, http://dx.doi.org/10.1109/INFOCOMWKSHPS50562.2020.
International Conference on Machine Learning and Applications and Workshops,
9162714.
vol. 2, 2011, pp. 316–320, http://dx.doi.org/10.1109/ICMLA.2011.159.
[316] T. Erpek, Y.E. Sagduyu, Y. Shi, Deep learning for launching and mitigating
[291] H. Peng, A. Razi, F. Afghah, J.D. Ashdown, A unified framework for joint
wireless jamming attacks, IEEE Trans. Cogn. Commun. Netw. 5 (1) (2019) 2–14,
mobility prediction and object profiling of drones in UAV networks, CoRR,
http://dx.doi.org/10.1109/TCCN.2018.2884910.
abs/1808.00058, 2018, arXiv:1808.00058. [317] L. Abusalah, A. Khokhar, M. Guizani, A survey of secure mobile Ad Hoc
[292] J. Chen, U. Mitra, D. Gesbert, Optimal UAV relay placement for single user routing protocols, IEEE Commun. Surv. Tutor. 10 (4) (2008) 78–93, http:
capacity maximization over terrain with obstacles, in: 2019 IEEE 20th Inter- //dx.doi.org/10.1109/SURV.2008.080407.
national Workshop on Signal Processing Advances in Wireless Communications
(SPAWC), 2019, pp. 1–5, http://dx.doi.org/10.1109/SPAWC.2019.8815496.
[293] Z. Pan, L. An, C. Wen, Recent advances in fuel cells based propulsion systems
Arnau Rovira-Sugranes received his Ph.D. in Informatics
for unmanned aerial vehicles, Appl. Energy 240 (2019) 473–485, http://dx.doi.
and Computing from the School of Informatics, Computing
org/10.1016/j.apenergy.2019.02.079.
and Cyber Systems (SICCS) in Northern Arizona University
[294] E.F. Costa, D.A. Souza, V.P. Pinto, M.S. Araújo, A. Peixoto, E.D.C. Júnior,
(NAU), Flagstaff, AZ, USA, in August 2021. Earlier, he
Prediction of lithium-ion battery capacity in uavs, 2019,
graduated with a Master of Science in Informatics in 2019
[295] Q. Wu, G. Zhang, D.W.K. Ng, W. Chen, R. Schober, Generalized wireless- from Northern Arizona University and a Bachelor’s degree in
powered communications: When to activate wireless power transfer?, IEEE Industrial Electronics and Automation Engineering in 2016,
Trans. Veh. Technol. 68 (8) (2019) 8243–8248, http://dx.doi.org/10.1109/TVT. from Rovira i Virgili University. After graduating, he worked
2019.2924051. in an automotive seating and electrical systems company
[296] A. Kurs, A. Karalis, R. Moffatt, J. Joannopoulos, P. Fisher, M. Soljacic, Wireless before starting his Ph.D. program.
power transfer via strongly coupled magnetic resonances, Science (New York, His research interests include machine learning and data
N.Y.) 317 (2007) 83–86, http://dx.doi.org/10.1126/science.1143254. mining, communication and routing protocols and graph
[297] M. Khonji, M. Alshehhi, C.-M. Tseng, C.-K. Chau, Autonomous inductive theory for flying ad-hoc wireless networks (FANETs), which
charging system for battery-operated electric drones, pp. 322–327, 2017, http: produced peer-reviewed publications on predictive based
//dx.doi.org/10.1145/3077839.3078462. solutions for Internet of Things. Also, he has served as
[298] M. Nguyen, L.D. Nguyen, T.Q. Duong, H.D. Tuan, Real-time optimal resource an IEEE conference/journal paper reviewer and symposium
allocation for embedded UAV communication systems, IEEE Wirel. Commun. moderator.
Letters 8 (1) (2019) 225–228, http://dx.doi.org/10.1109/LWC.2018.2867775.
[299] S. Bi, R. Zhang, Placement optimization of energy and information access points
in wireless powered communication networks, IEEE Trans. Wirel. Commun. 15 Abolfazl Razi is an assistant professor in the School of
(3) (2016) 2351–2364, http://dx.doi.org/10.1109/TWC.2015.2503334. Informatics, Computing and Cyber Systems at Northern
Arizona University (NAU). He received his B.S., M.S. and
[300] A.M.R. Tolba, Trust-based distributed authentication method for collision attack
Ph.D. degrees, all in Electrical Engineering, respectively
avoidance in VANETs, IEEE Access 6 (2018) 62747–62755, http://dx.doi.org/
from Sharif University (1994–1998), Tehran Polytechnic
10.1109/ACCESS.2018.2875906.
(1999–2001), and University of Maine (2009–2013). Prior
[301] T.-J. Yang, Y.-H. Chen, V. Sze, Designing energy-efficient convolutional neural
to joining NAU, he held two postdoctoral positions in
networks using energy-aware pruning, in: Proceedings of the IEEE Conference
the field of machine learning and predictive modeling at
on Computer Vision and Pattern Recognition, 2017, pp. 5687–5695.
Duke University (2013–2014), and Case Western Reserve
[302] T. Johann, M. Dick, S. Naumann, E. Kern, How to measure energy-efficiency
University (2014–2015). He is the recipient of several
of software: Metrics and measurement results, in: 2012 First International
competitive awards including the Best Research of MCI in
Workshop on Green and Sustainable Software (GREENS), IEEE, 2012, pp. 51–54.
2008, Best Graduate Research Assistant of the Year Award
[303] E. García Martín, Energy efficiency in machine learning: A position paper,
from the College of Engineering, University of Maine in
in: 30th Annual Workshop of the Swedish Artificial Intelligence Society SAIS,
2011, and the Best Paper Award from the IEEE/CANEUS
Karlskrona, vol. 137, Linköping University Electronic Press, 2017, pp. 68–72.
Fly By Wireless Workshop in 2011. His current research
[304] C. Zhang, W. Zhang, Spectrum sharing for drone networks, IEEE J. Sel.
interests include smart connected communities, biomedical
Areas Commun. 35 (1) (2017) 136–144, http://dx.doi.org/10.1109/JSAC.2016.
signal processing, wireless networking, Internet of things,
2633040.
and predictive modeling.
[305] J. Kakar, V. Marojevic, Waveform and spectrum management for unmanned
aerial systems beyond 2025, CoRR, abs/1708.01664, 2017, arXiv:1708.01664.
26
A. Rovira-Sugranes et al. Ad Hoc Networks 130 (2022) 102790
Fatemeh Afghah is an Associate Professor with the School Jacob Chakareski is an Associate Professor in the College
of Informatics, Computing, and Cyber Systems, Northern of Computing at the New Jersey Institute for Technology
Arizona University (NAU), Flagstaff, AZ, USA, where she (NJIT), where he holds the Panasonic Chair of Sustain-
is the Director of Wireless Networking and Information ability and directs the Laboratory for AI-Enabed Virtual
Processing (WiNIP) Laboratory. Prior to joining NAU, she and Augmented Reality Immersive Communications and
was an Assistant Professor with the Electrical and Computer Networked Systems. His research interests span next gen-
Engineering Department, North Carolina A&T State Univer- eration virtual and augmented reality systems, UAV IoT
sity, Greensboro, NC, USA, from 2013 to 2015. Her research sensing and networking, fast reinforcement learning, 5G
interests include wireless communication networks, decision wireless edge computing and caching, ubiquitous immersive
making in multi-agent systems, radio spectrum management, communication, and societal applications. He received the
and artificial intelligence in healthcare. Her research has Adobe Data Science Faculty Research Award in 2017 and
been continually supported by NSF , AFRL, AFOSR, and 2018, the Swiss NSF Career Award Ambizione (2009), the
ABOR. AFOSR Faculty Fellowship in 2016 and 2017, and Best
She is the recipient of several awards including the Paper Awards at ICC 2017 and MMSys 2021. He completed
Air Force Office of Scientific Research Young Investigator his Ph.D. degree at Rice and Stanford in Electrical and
Award in 2019, NSF CAREER Award in 2020, NAU’s Most Computer Engineering, held research appointments with
Promising New Scholar Award in 2020, and NSF CRII Award Microsoft, HP Labs, and EPFL, and served on the advisory
in 2017. She is the author/co-author of over 80 peer- board of Frame, Inc. His research has been supported by the
reviewed publications and served as the organized and the NSF, NIH, AFOSR, Adobe, Tencent Research, NVIDIA, and
TPC chair for several international IEEE workshops in the Microsoft. For further info, please visit www.jakov.org.
field of UAV communications, including IEEE INFOCOM
Workshop on Wireless Sensor, Robot, and UAV Networks
(WiSRAN’19) and IEEE WOWMOM Workshop on Wireless
Networking, Planning, and Computing for UAV Swarms
(SwarmNet’20).
27