Swarm Uavs Communication: Arindam Majee, Rahul Saha, Snehasish Roy, Srilekha Mandal, Sayan
Swarm Uavs Communication: Arindam Majee, Rahul Saha, Snehasish Roy, Srilekha Mandal, Sayan
Swarm Uavs Communication: Arindam Majee, Rahul Saha, Snehasish Roy, Srilekha Mandal, Sayan
Swarm UAVs
Communication
1
2
INDEX
1. Problem Statement 5
2. Abstract 6
3. Introduction 7
4. Introduction to UAVs 7
5. Control of UAVs 10
6. Effect of Wind Gust on UAVs 11
7. Swarm behaviour in Nature 13
8. Swarm Intelligence 14
9. Swarm in UAVs 19
10. Swarm Architecture in UAV Networks 19
11. Communication in UAV Swarm 22
12. Existing Path Planning Techniques 23
13. Comparison of existing path planning techniques 26
14. Leader-Follower Strategy 29
15. Path Loss in Wireless Communication 32
16. Communication Under Noisy Channel 34
17. Link Budget Analysis 37
18. Communication Link Performance with Distance 41
19. Future Work 42
20. Conclusion 43
2
3
List of Figures
1 Quadcopter configuration 8
2 Wind DIrection 13
3 Star Network 20
7 Voronoi diagram 24
3
4
List of Tables
1 Types of UAVs 7
4
5
Problems identified:
d. Air traffic rescue operation in hilly areas where micro UAV in the swarm can move at a
closer height.
5
6
2. Abstract:
The advancement in cyber-physical systems has opened a new way in disaster
management and rescue operations. The usage of UAVs is very promising in this
context. UAVs, mainly quadcopters, are small in size and their payload capacity is
limited. A single UAV can’t traverse the whole area. Hence multiple UAVs or swarms of
UAVs come into the picture managing the entire payload in a modular and
equiproportional manner. In this work we have explored a vast topic related to UAVs.
Among the UAVs quadcopter is the main focus. We explored the types of quadcopters,
their flying strategy,their communication protocols, architecture and controlling
techniques, followed by the swarm behaviour in nature and UAVs. Swarm behaviour and
a few swarm optimization algorithms has been explored here. Swarm architecture and
communication in between swarm UAV networks also got a special attention in our work.
In disaster management the UAV swarm network must have to search a large area. And
for this proper path planning algorithm is required. We have discussed the existing path
planning algorithm, their advantages and disadvantages in great detail. Formation
maintenance of the swarm network is an important issue which has been explored
through leader-follower technique. The wireless path loss model has been modelled
using friis and ground ray reflection model. Using this path loss models we have
managed to create the link budget and simulate the variation of communication link
performance with the variation of distance.
6
7
3. Introduction:
An unmanned aerial vehicle (UAV) is an aircraft with no onboard pilots. The emergent
civilian, military, commercial, agricultural and scientific applications of Unmanned Aerial
Vehicles are abundant in this world. Recently UAVs are highly used in Search and
Rescue (SAR), 5G communication. UAVs can be used in various civil applications due to
their ease of deployment, low maintenance cost, high mobility, and ability to hover [1]. In
civil applications UAVs can be used in surveillance, agriculture (crop monitoring,
pesticide spraying, etc) [2], transportation [3], traffic monitoring [4], etc. In [5] the authors
have already surveyed the vast application fields of UAVs.
However, a single UAV faces a lot of issues like stability, survivability, reliability, etc [6]. A
group of UAVs can perform better than a single UAV. The group of UAVs is commonly
known as Swarm UAV. We will discuss swarm UAV in the upcoming sections.
We have classified the whole report into several sections. The first section describes
various types of UAVs (our focus is mainly on Quadrotors), how a UAV flies, the effect of
wind on the UAV and the mathematical model of its control.
SECTION-1
4. Introduction to UAVs:
In this section, we are going to provide a brief idea about the UAVs, types of UAVs,
how they fly and related topics.
a) Types of UAVs: There are various types of aerial drones. But the most common
four types are, Multi-rotor, Fixed-wing, Single rotor, and Fixed wing hybrid. The
advantages, disadvantages, and main features are listed below [7-9].
Features Multi-rotor Fixed Wing Single rotor Fixed-Wing
Hybrid
7
8
In our work, we will use quadrotors as they are flexible for VTOL, effective in
terms of cost, battery life and control. A quadcopter has 4 wings that are
connected to four rotors. Two rotors (each is in the other's corner) rotates in a
clockwise direction and another two in the anti-clockwise direction. A quadcopter
has 6 degrees of freedom among them 3 are transitional and 3 are rotational.
8
9
In normal condition, two-rotors rotate in a clockwise direction and the other two
rotors rotate in an anti-clockwise direction with the same speed. So, the torque
generated in clockwise and anti-clockwise directions balances each other. Now, if
the torque generated by these two pairs of rotors are different from each other
then the quadcopter will spin about the vertical axis. The rotating wings generate
air thrust which is proportional to the square of the angular velocity of the wings.
If the sum of the air thrust is equal to its weight then it will hover otherwise it will
move in the vertical direction. The forward or backward movement of the
quadcopter can be generated by generating forward or backward pitch with a
proper pitch angle. Similarly, the quadcopter can move in right or left by
generating a proper roll angle. The thrust produced by a motor Mi (for i=1, ..., 4)
is
9
10
2
𝐹𝑖 = 𝑘 · ω𝑖
This thrust is always in the vertical direction of the rotor. The torque generated by
the motor is opposed by an aerodynamic drag by the following equation,
𝐼𝑟𝑜𝑡 · ώ = τ − τ𝑑𝑟𝑎𝑔
The aerodynamic drag is defined by,
1 2
τ𝑑𝑟𝑎𝑔 = 2
· ρ𝑣
where p is the density of air, A is the area of the rotating face, and v is the
velocity concerning the air.
𝑚ẍ = 𝑢(𝑠𝑖𝑛 φ 𝑠𝑖𝑛 ψ + 𝑐𝑜𝑠 φ 𝑐𝑜𝑠 ψ 𝑠𝑖𝑛 θ)
𝑚ÿ = 𝑢(𝑐𝑜𝑠 φ 𝑠𝑖𝑛 θ 𝑠𝑖𝑛 ψ − 𝑐𝑜𝑠 ψ 𝑠𝑖𝑛 φ)
𝑚𝑧̈ = 𝑢 𝑐𝑜𝑠 θ 𝑐𝑜𝑠 φ − 𝑚𝑔
ψ̈ = τ̃ ψ
θ̈ = τ̃ θ
φ̈ = τ̃ φ
where x and y are coordinates in the horizontal plane, z is the vertical position.
The first derivative of these coordinates represent the velocity and the second
derivatives denote the acceleration towards the respective axes. And τ̃ ψ, τ̃ θ and
τ̃ φ
are the yawing moments, pitching moment and rolling moment, respectively,
which are related to the generalised torques, τθ and τφ. 𝑢 is the total thrust acting
on the quadcopter which mathematically can be represented,
4
𝑢 = ∑ 𝐹𝑖
𝑖=1
5. Control of UAVs: Control and path planning [18] are two crucial and most
important tasks during the flight of a UAV. In this section, we have discussed several
control approaches like PID/PD control [11, 14-15], Artificial Potential Field [19-20] etc.
A. PD Control: PD stands for proportional and derivative. Let's suppose there is a
UAV in hovering position and xdes(t) is its desired trajectory but its current
trajectory is x(t). So, here the error function is xdes(t)-x(t). Now, this is an
automatic control problem where the UAV trajectory is our plant. And, we have to
minimise the error function. It is better if it decreases exponentially. From
mathematics, we can say if we can find some positive value of kp and kd then the
error function will decrease exponentially.
10
11
Now, here kp and kd are two positive constants. For some value, if the function
satisfies the above equation. Here, kp is known as proportional constant whereas,
kd is known as the derivative constant. In some cases, we add an integral term to
satisfy the equation more conveniently. Then equation (10) becomes,
𝑑 𝑑
2 [𝑒(𝑡)] + 𝑘𝑝 · 𝑑𝑡
(𝑒(𝑡)) + 𝑘𝑑 · 𝑒(𝑡) + 𝑘𝑖 ∫ 𝑒(𝑡)'𝑑𝑡 = 0
𝑑𝑡
Here, ki is known as the integral constant. kp acts as a springy constant, if its
value is too high then the UAV will oscillate concerning its desired position where
kd acts as damping constant. A higher value of kd will increase the time taken by
the UAV for settling at its desired position.
2 𝐿𝑢 1
Φ𝑢(Ω) = σ𝑢· π · 2
1+(𝐿𝑢Ω)
11
12
2
2 𝐿𝑣 1+12(𝐿𝑣Ω)
Φ𝑣(Ω) = σ𝑣· π · 2 2
(1+4(𝐿𝑣Ω) )
2
2 𝐿𝑤 1+12(𝐿𝑤Ω)
Φ𝑤(Ω) = σ𝑤· π
· 2 2
(1+4(𝐿𝑤Ω) )
C. Wind Shear: The wind shear or wind gradient is the difference between the two
vectors of wind at two points distributed by the space between two points. For
example, in Figure 2 the vectors at each position represent the wind directions by
the directions of vectors. There are two different wind field, when a UAV flies from
the A to B or B to A, it experiences a wind shear. The main causes of wind shear
during the UAV flight are frontal, nocturnal, and micro-downburst. The difference
between the wind shear and turbulence is frequency. The wind shear is of low
frequency, and it changes every few seconds and it has a proper direction.
Sudden variation in average wind speed can produce wind shear.
12
13
When a UAV is flying in the air, the change of airspeed Va, ground speed Vg and
average wind speed Vw can be obtained as given in,
ΔVg = PΔVw,
ΔVa = (1 − P)ΔVw
Where, Va is the airspeed, the speed of UAV relative to the air. Vg is the ground
speed of the UAV which is the horizontal speed of the drone relative to the
earth’s surface. P is a coefficient. It depends upon the effective area and the
mass of the UAV, and the euclidean norm or L2 norm of P (‖P‖2 ) is less than 1.
This coefficient P denotes how much the ground speed of the UAV is susceptible
to be disturbed by the average wind. The turbulence is very random and it exerts
uneven forces on all parts of the UAV. the forces on the UAV due to the
turbulence are calculated from the air resistance equation:
2
𝐹𝐷 = ρ · 𝑣 · 𝐶𝐷 · 𝑆
where FD is the force of the airflow on the aircraft, ρ is the air density, v is the
airflow speed, S is the windward area, and CD is the airflow force coefficient
which depends on the Reynolds number Re of the airflow. The airflow speed can
be obtained from the Dryden model (DM) and the Von Karman model (VKM). The
control of UAV in wind gusts is a crucial and difficult task. There are several
methods for it. In [24] the authors had proposed a novel approach called “Reject
External Disturbance” where the UAV changes its forward flight to a turning state
with a minimum turning radius.
SECTION-2
7. Swarm Behaviour in Nature:
Swarm means honeybee. Swarming is applied to mainly the group behaviour of insects.
But in a general in a broad sense, a swarm is a large number of homogenous, simple
agents interacting locally among themselves and their environment with no central
control to allow a global interesting behaviour to emerge. Swarm Behaviour or swarming
is a collective behaviour exhibited by entities, such groups of insects [25-26], fish
13
14
[27-28], birds [29], primates [30-31], humans [32] and animals. In the past decades,
biologists and natural scientists have been studying the behaviours of social insects
because of the amazing efficiency of these natural swarm systems. The swarm
behaviour of various animals, insects are referred to with various terms such as, flocking
or murmuration can refer specifically to swarm behaviour of birds, shoaling or schooling
refers to swarm behaviour of fish. Similarly, herding for tetrapods such as sheep,
elephant, Pride for lion, Pack for the wolf. Basically from an abstract point of view, swam
behaviour is the collective motion of a large number of self-propelled entities. The main
function of swarming is considered to be a reduction in the risk of predation[33]. Such
social behaviour offers a better chance for survival due to communal efforts among the
swarm. The swarm behaviours can be modelled mathematically and computationally. In
[34] the authors have modelled the school of fishes and flocking of birds mathematically.
These models develop an integrative picture of the connection between traits at the
individual and group levels. In the late 80s for the first time, computer scientists
proposed the scientific insights of these natural swarm systems to the field of artificial
intelligence. In 1989, the expression "Swarm Intelligence" was first introduced by G. Beni
and J. Wang in the global optimization framework as a set of algorithms for controlling
robotic swarms [35]. In 1991, Ant Colony Optimization (ACO) [36] was introduced by M.
Dorigo and colleagues as a novel nature-inspired metaheuristic for the solution of hard
combinatorial optimization (CO) problems. In 1995, particle swarm optimization was
introduced by J.Kennedy et al. [37].
14
15
𝑡ℎ 𝑡ℎ
Here, 𝑣𝑖𝑑(𝑡) is the velocity of 𝑖 particle in the 𝑑 dimension and t denotes the
𝑡ℎ 𝑡ℎ
iteration number. 𝑥𝑖𝑑(𝑡) is the position of 𝑖 particle in the 𝑑 dimension. 𝑝𝑖𝑑(𝑡) is
𝑡ℎ 𝑡ℎ
the historical best position reached by 𝑖 particle in the 𝑑 dimension. 𝑝𝑔𝑑(𝑡) is
the global best position of the swarm. 𝑅1 and 𝑅2 are two n-dimensional vectors
and 𝑐1, 𝑐2are two constants named personal learning factor and social learning
factors respectively.
15
16
We have discussed the original PSO algorithms. Later researchers have worked
on it and improved the PSO algorithm to increase its performance and
robustness. In [47] authors had surveyed almost 350+ research works on
improvement PSO.
B. Wolf Pack Algorithm: Wolves have a clear social work division in their group or
pack. There is a lead wolf; some elite wolves act as scouts and some ferocious
wolves in a wolf pack. Now, we will discuss the coordination of wolves in a pack
during praying.
Firstly, the lead wolf is responsible for commanding the wolves and constantly
making decisions by evaluating the surrounding situation and perceiving
information from other wolves. Secondly, the lead wolf sends some elite wolves
to hunt around and look for prey in the probable scope. Those wolves are scouts.
They walk around and independently make decisions according to the
concentration of smell left by prey. Thirdly, once a scout wolf finds the trace of
prey, it will howl and report that to the lead wolf. Then the lead wolf will evaluate
this situation and decide whether to summon the ferocious wolves to round up
the prey or not. If they are summoned, the ferocious wolves will move fast
towards the direction of the scout wolf. Fourthly, after capturing the prey, the prey
is not distributed equitably, but in order from the strong to the weak. That is to say
that, the stronger the wolf is, the more food it will get.
In the WPA algorithm [48-51] there are a total of 3 artificial intelligent behaviours
and two rules. These are scouting behaviour, calling behaviour, besieging
behaviour and winner-take-all rule for generating lead wolf, and the
strong-survive renewing rule for the wolf pack. At first, the scouting behaviour
increases the possibility that WPA can fully traverse the solution space to find the
optimum solution for the given problem. Secondly, the winner-take-all rule
generates the lead wolf by comparing the function value of the lead wolf with the
best one of other wolves in each iteration. If the value of the lead wolf is not
better, it will be replaced and the best wolf becomes a lead wolf. The calling
behaviour makes the wolves move towards the lead wolf whose position is the
nearest to the capturing prey. As the step of wolves in calling behaviour is largest
among all three behaviours, so the winner-take-all rule and calling behaviour
make wolves arrive at the neighbourhood of the global optimum only after a few
iterations elapsed. Thirdly, with a small step, besieging behaviour makes WPA
algorithms have the ability to open up new comparably small solution space and
carefully search the global optima in that small solution area. Fourthly, with the
help of stronger-survive renewing rules for the wolf pack, the algorithm can get
several new wolves whose positions are near the best wolf, which allows us to
search the global optimum more efficiently. All the above make WPA possess
superior performance in accuracy and robustness. Now, let's discuss the WPA
algorithm briefly.
16
17
❖ Initialise the following parameters, the initial position of artificial wolf 𝑖 (Xi ),
the number of the wolves (𝑁), the maximum number of iterations (𝑘max),
the step coefficient (𝑆), the distance determinant coefficient (𝐿near), the
maximum number of repetitions in scouting behaviour (𝑇max), and the
population renewing proportional coefficient (𝛽).
❖ The wolf with the best function value is considered a lead wolf. In practical
computation, 𝑆num= 𝑀num = 𝑛 − 1, which means that wolves except for the
lead wolf act with different behaviour as different statuses. So, here,
except for the lead wolf, according to the scouting behaviour, the rest of
the 𝑛 − 1 wolf firstly act as the artificial scout wolves to take scouting
behaviour until 𝑌i > 𝑌lead or the maximum number of repetition 𝑇 max is
reached and then go to Step 3.
❖ Except for the lead wolf, the rest of the 𝑛 − 1 wolf secondly act as the
artificial ferocious wolves and gather towards the lead wolf according to
calling behaviour; 𝑌i is the smell concentration of prey perceived by wolf 𝑖;
if 𝑌i ≥ 𝑌lead, go to Step 2; otherwise, the wolf 𝑖 continues running until 𝐿(𝑖, 𝑙)
≤ 𝐿near; then go to Step 4.
❖ The position of artificial wolves who take besieging behaviour is updated
according to besieging behaviour.
❖ Update the position of the lead wolf under the winner-take-all generating
rule and update the wolf pack under the population renewing rule
according to (6).
❖ If the program reaches the precision requirement or the maximum number
of iterations, the position and function value of the lead wolf, the problem
optimal solution, will be output; otherwise, go to Step 2.
C. Grey Wolf Algorithm: Grey wolves belong to the Canidae family. They follow a
strict hierarchy of social dominance [52]. They live in a pack of 5-12 members on
average. They have a total of four categories of wolves in their pack. These are
alpha, beta, delta, and omega. The alpha is the best in terms of managing the
pack. Beta is the lower level of alpha, they are bound to report alpha. Delta is at
the lower level of beta and omegas are at the lowest level. All top 3 levels can
command these omegas. In the GWO algorithm [52-54] the best solution is
marked as the α; the second-best solutions are marked as the β, the third-best
solutions are marked as the δ, the rest of the solutions are marked as ω.
According to Muro et.al [55], the main phases of grey wolf hunting are as follows:
● Tracking, chasing and approaching the prey.
● Pursuing encircling, and harassing the prey until it stops moving.
● Attack towards the prey.
Encircling prey: The grey wolves have an intrinsic functionality of hunting around
the prey.
D = | C . XP(t) − X(t) | ------------------(3)
17
18
The distance between the prey and the wolf here is D. X Is the wolf’s vector of
position and XP implies beheads position vector at the iteration t. A and C are
random vectors that are determined in Eqs. (3) and (4).
A = 2a . r1 − a -------------------(5)
C = 2 . r2 ------------------(6)
The random vectors in the range of [0, 1] here are, r1 and r2. They make wolves
reach among the prey and the wolf at any point. Vector works to regulate the
GWO algorithm phenomenon and is used as a basis for A computations. The
vector aspect standards decline dynamically among 2 and 0 overtime.
Prey hunting: The grey wolves can feasibly circle it because they can track the
movement of the prey. The ( α ) wolf tends to lead nearly the entire process of
hunting. All grey wolves are chased by ( α ), ( β ), and ( δ ) wolves. They will also
keep updating their positions to the optimal position of the wolves ( α ), ( β ), and
( δ ). It is articulated in Eqs. (8)–(10) in statistical terms.
𝐷α = |𝐶1 · 𝑋α − 𝑋|, 𝐷β = |𝐶2 · 𝑋β − 𝑋|, 𝐷δ = |𝐶3 · 𝑋δ − 𝑋|----------(7)
𝑋1 = 𝑋α − 𝐴1 · 𝐷α, 𝑋2 = 𝑋β − 𝐴2 · 𝐷β, 𝑋3 = 𝑋δ − 𝐴3 · 𝐷δ −−−−−−− (8)
Eq. (7) can be used to measure the upgraded status of the grey wolf.
𝑋1+𝑋2+𝑋3
𝑋(𝑡 + 1) = 3
----------------(9)
Prey searching and attacking: Grey wolves will only attack the prey when they
are no longer moving.
18
19
● Return 𝑋α
SECTION-3
9. Swarm in UAVs:
We have already analysed in the introduction part the challenges faced by a single
drone. To overcome these challenges the most common and versatile solution is a group
or combination of UAVs or in terms of a swarm of UAVs. A swarm of UAVs is much more
helpful than some of the single UAVs. Lav Gupta et. al, have beautifully discussed in
their work [6], the benefits of swarm UAV networks over single drone networks. Some of
these benefits are enlisted in Table 1.
However, to get these benefits from swarm UAVs we have to tackle various issues like
changing the topology of the swarm dynamically, mobility, power constraints, collision
avoidance. In terms of communication needs, the UAVs should communicate with each
other with very low latency to keep minimal distance among them and avoid a collision.
As the number of UAVs increase the challenges also increase.
19
20
a. Star Network: Here each UAV can communicate with the ground station directly
but they have to be routed through the ground to communicate with each other.
As the ground station is the central node, the system isn't robust. This network is
relatively simpler. It is suitable when the number of UAVs and coverage is small.
But, the reliability of this network is very low. It suffers from the disadvantages of
high latency, single point of failure (SPOF). A centralised UAV network
architecture has shown in Figure 3.
B. decentralised UAV Network: The decentralised UAV networks can be classified into 3
major categories;
a. Single Group UAV Ad Hoc Network: Here one master UAV is connected with the
ground station and this master or backbone UAV serves as a gateway of the ad
hoc network. Its coverage area is larger than centralised architecture and also it
is more power-efficient. The intra-swarm communication can be done in various
architectures like rings, mesh, trees, or fully connected. The UAV Ad Hoc network
is more robust than the centralised configuration. It also has much more stability,
flexibility. But this network may suffer from scalability problems [56]. The
architecture is shown in Figure 4.
20
21
b. Multi-Group Ad-Hoc Network: Here UAVs within a group form a UAV ad hoc
network with its respective master UAV. Intra-group communications are
performed through the backbone UAV of each group whereas, communication
between two groups is performed through the ground station. Due to its
semi-centralized structure, it has some lack of robustness. The architecture is
shown in Figure 5.
c. Multi-layer Ad-hoc network: Here UAVs within a group form a UAV ad hoc
network and the backbone UAV of each group form another layer of the UAV
Ad-hoc network. Information exchange between two UAVs of a group is
performed through the backbone UAV of that group. In this architecture
information exchange between any two UAV groups does not need to be routed
through the ground station. So, this network is robust. The architecture is shown
in Figure 6.
21
22
Comparison between Routing and Flooding Techniques: In the routing technique, the
message propagates through fewer nodes which makes the system energy efficient.
However, this technique suffers from reliability and stability problems due to a single
point of failure (SPOF). A self-healing algorithm is highly required to ensure the
continuous flow of information from the source node to the destination. Determining the
routing path every time makes the communication strategy suffer from latency. Wherever
the flooding technique is free from these problems. The flooding technique has a much
better range than the routing technique. However, the main challenge with flooding
techniques is the synchronisation of information at each node. Using a synchronised
22
23
SECTION-4
In this section, we are going to focus on existing path planning techniques and
leader-follower strategies for the swarm of UAVs.
At first, the obstacles are modelled as geometrical shapes from the information given in
the environmental map. Like the buildings can be considered as cubes or polyhedrons,
electrical poles or towers can be considered as cylinders. Normally for offline path
planning, environmental modelling is done before the path planning. But, in online
planning UAVs or mobile robots do not model the whole environment, it just senses
obstacles and avoids those.
The second step of path planning is task modelling from the map modelled in the first
step. For task modelling, there are several well-known approaches. Some of them which
are comparable older are mainly graph-based where a graph is constructed between the
starting point and the destination point. Recently tree-based approaches are becoming
more popular for their fast convergence.
In the third step, we have to search a path from the source to the destination. There are
a lot of algorithms that exist for path search. Now, we will discuss a few of the existing
and popular strategies for path planning i.e. environmental modelling, task modelling and
path search.
23
24
In general, sampling-based methods are very useful for environmental modelling. There
are several methods for environmental modelling under sampling-based methods. These
are;
1. Cell Decomposition: In this approach, the workspace is divided into a collection of cells
so that the path can be calculated easily either between the same cell or an adjacent
cell. The shape of the cells can be simple rectangular or hexagonal or any other shape.
2. Voronoi Diagram: Voronoi diagram divides the surface into regions based on the
distance to the waypoints as shown in the below figure. The main difference between
cell decomposition and Voronoi diagram is that in cell decomposition all the cells are of
the same shape but in Voronoi diagram.
3. Waypoint Graph: Waypoint graph is widely used for pathfinding [6] in the field of robotics.
Each node in such a graph is called a waypoint. The waypoints are normally generated
at a distance from the edges of the obstacle.
4. Roadmaps: The roadmaps method consists of two phases (i) construction and (ii) query.
In the construction phase, the connectivity of the environment is computed by defining
the network curves in the 3-D environment. After the construction of roadmaps, source
and destination configuration points are solved in the query phase. The most commonly
used algorithms for roadmaps are RRT (Rapid exploring rapid tree), PRM (Probabilistic
Roadmap) etc. In some research work, researchers consider Voronoi diagram
approaches, A* algorithm also roadmaps.
5. Potential Field Method: Artificial Potential Field (APF) method is a very simple but
effective approach for UAV path planning. This was first proposed by Khatib [20]. In the
potential field method, an attractive force from the destination and repulsive force from
the source and obstacles are calculated. And then using the resultant force the trajectory
is generated.
24
25
9. Fuzzy-Logic Based Approach: Fuzzy logic deals with situations that are neither
completely true nor completely false. When pattern recognition problems arise in robotic
tasks with more robustness and a perfect solution cannot be predicted and used to
solve, it represents a partial solution. In this algorithm, the whole logic is divided into
simpler blocks composed of a set of fuzzy logic rule statements intended to achieve the
25
26
desired objective. The decision of motion is prepared only based on input parameters,
not on the real-time situation.
1. RRT:
a. Advantages:
i) Time complexity is low and hence it has the fast searching ability.
b. Disadvantages:
i) This works only for static obstacles.
ii) The modelling of the environment is not optimal.
2. PRM:
a. Advantages:
i) Appropriate for complex environments
b. Disadvantages:
i) This works for static obstacles.
ii) The solution is not optimal.
iii) PRM is based on the concept of random trees and hence the checking for
collision avoidance is expensive in terms of computation cost.
3. Voronoi Diagram:
a. Advantages:
i) The generated path is highly safe and has no chance of collision with the static
obstacles.
ii) Easy implementation is an advantage of this technique.
b. Disadvantages:
i) The modelling of the environment using the Voronoi diagram is incomplete.
ii) Voronoi diagram has a converging problem.
iii) It works only for static obstacles.
v) This is a 2D path planning and can't work in a 3D situation.
26
27
i) APF is more suitable for static obstacles rather than dynamic obstacles.
ii) APF easily gets trapped in local minima. Practically we can avoid these local
minima by considering an imaginary obstacle and then considering a repulsive
force that imaginary obstacle.
iii) It is a local search technique. So, we can't rely only on APF for larger
travelling distances.
iv) Theoretically it works only for static obstacles but practically it works fine for
dynamic obstacles also up to some extent.
5. Dynamic Programming:
a. Advantages:
i) Dynamic programming considers all possible solutions and then finds an
optimal solution.
ii) It breaks the large problem into subsets which makes the computation easier.
b. Limitations:
2
i) The time complexity of dynamic programming is 𝑂(𝑛 ). Hence, when the
number of nodes increases the time complexity increases.
ii) The space complexity of dynamic programming is 𝑂(𝑛). Hence, it requires
memory to save all the solutions.
6. Dijkstra’s Algorithm:
a. Advantages:
i) Dijkstra’s algorithm finds the shortest distance between the source node and
destination node.
ii) It uses a greedy strategy for path planning instead of dynamic programming.
Hence, the limitations of dynamic programming can be avoided up to some
extent.
iii) The time complexity of Dijkstra’s algorithm is O(ElogV), where V is the number
of nodes and E is the number of edges. Hence, here computational time is less
than dynamic programming.
b. Limitations:
i) Computational time is still high for a large number of nodes.
ii) Space complexity is O(V+E) where V is the number of nodes and E is the
number of edges that is still high.
7. Floyd-Warshall algorithm:
a. Advantages:
i) Floyd-Warshall algorithm finds the shortest path between all the available pairs
of nodes instead of just source and destination nodes.
ii) It performs better than Bellman-Ford and Dijkstra’s algorithm in practical
scenarios [73].
b. Limitations:
27
28
3
i) Time complexity is 𝑂(𝑉 ) which is high when the number of nodes is very high.
ii) It finds the shortest path between all algorithms. Hence it performs a lot of
unnecessary computations which are not required.
8. A* algorithm:
a. Advantages:
i) It can search in a huge area.
ii) It finds the shortest between two given pairs of nodes.
iii) It saves a significant amount of computation time
iv) Fast searchability.
v) On-line path searching is possible.
b. Limitations:
i) High time burden.
ii) It works only for static obstacles.
iii) The generated trajectory is not smooth.
9. D* search algorithm:
a. Advantages:
i) D* algorithm is the improved version of A* search algorithm.
ii) It works in a dynamic environment also.
b. Limitations:
i) It uses unrealistic distance in its graph which reduces its efficiency.
28
29
i) Training time is very high. Also, depending on the size of training data and
network complexity, the computational cost sometimes may be too high.
ii) Artificial neural networks require a lot of training data.
iii) The ANN is highly data-dependent. If we train the network with the data of one
type of environment, then it will not perform properly in a different type of
environment.
iv) As we know both input and output in supervised learning, hence the learning
is not real-time.
29
30
Drone formation studies have different approaches and objectives. The methodology
chosen here for drone formation control is known as Leader-Follower [76]. It consists of
an autonomous follower robot that plans its actions from the actions of a
leader robot. In a multi drone system each drone has a neighbour or reference point for
its movement, where the neighbour is called the leader and that particular drone which
follows the reference point is called the follower. There may be several leaders and
followers pairs which adds immense flexibility in case of complex arrangements or large
numbers of drones.
Obviously, the leader and follower will adhere certain control measures in order to
coordinate, the control has been broadly classified into two categories:
● Horizontal control: Controls the latitude and longitude.
● Vertical control: Controls the altitude
30
31
3. Formation Layer: It will receive commands from the Application layer and will
define which drone will follow which one and how it should follow it. Also helps in
transition from one formation to another. It is preferably embedded outside the
formation or under formation leader.
4. Application Layer: Defines what kind of formation will take place and also defines
the movement of the formation leader. Normally embedded outside the formation
or under formation leader.
As the movement layer contains the algorithm and parameters needed for goal position
and orientation, the leader-follower technique is divided into two methods based on
movement. Before this, one needs to know that there exists response time (time
between order received by the Formation Leader and each drone start moving) and time
of formation that plays a pivotal role in variation of time taken for each and every drone
in coordination.
1. Fixed Global Difference: The method in which the follower maintains a fixed
global position/distance from the leader. Considering an X, Y and Z coordinate
system, given the position of leader (XL; YL;ZL), the follower should reach the
target position (XL + Δx; YL + Δy;ZL + Δz) , where Δx, Δy, and Δz are constants
previously defined to indicate follower position relative to the leader.
2. Double Fixation: Approach in which the follower acts to have fixed the leader
position relative to the follower, that is, the follower seeks to ”see” and ”be seen”
by the leader in a predefined position. It defines a position (XD; YD;ZD) and
orientation (θD) that the follower must maintain in relation to the leader. Given
leader position and orientation PL = (XL; YL;ZL; θL) and the desired relative
31
32
position and orientation (XD; YD;ZD; θD), the followers should reach the target
position PO = (XO; YO;ZO; θO).
SECTION-5
Under this section we are going to discuss various kinds of channel modelling and the
performance of those channels i.e, path loss, bit error rate etc.
2
𝑃𝑡𝐺𝑡𝐺𝑟·λ
𝑃𝑟(𝑑𝐵) = 2
(4π𝑑)
32
33
On a log scale,
B. Two Ray Ground Reflection Model: UAVs generally fly at a height of 100m
during a search operation and communicate with each other through the LOS
method. When an isotropic antenna is used for message transmission, it radiates
into all directions including the ground. Some part of this signal gets reflected
from the ground and reaches another UAV and may create a constructive or
destructive pattern.[80-81]
2 2
𝑑𝑙𝑜𝑠 = 𝑑 + (ℎ𝑡 − ℎ𝑟)
2 2
𝑑𝑟𝑒𝑓 = 𝑑 + (ℎ𝑡 + ℎ𝑟)
At the receiving antenna, the signal will suffer a phase difference from the signal
of both paths. And this phase difference will be equal to,
2π(𝑑𝑟𝑒𝑓−𝑑𝑙𝑜𝑠)
ϕ= λ
33
34
Hence, the received power at the receiver antenna of the second UAV is,
2
λ 2 ⎡ 𝐺𝑐·𝐺𝑑 𝐺𝑐·𝐺𝑑 ⎤
𝑃𝑟 = 𝑃𝑡[ 4π ] 𝑅⎢| 𝑑𝑙𝑜𝑠
+𝑅· 𝑑𝑟𝑒𝑓
|⎥
⎣ ⎦
The simulation result for these two types of model is shown in the next page.
It is clear from the simulation result that due to the destructive pattern there is a
huge loss in the Two Ray ground reflection model. This loss depends on both the
height of the antenna of both UAVs and the distance between them. To avoid this
loss the radiation pattern of the transmitter antenna should not be isotropic
instead it should be directional and better if all UAVs flies in the same plane i.e.,
the network topology is a planner.
34
35
Noise) [82], Rayleigh Channel [84] and Rician Channel [85]. Basically, Rayleigh and
Rician channels cause multipath fading [83].
A. AWGN Channel: AWGN is a noise that affects the transmitted signal when it
passes through the channel. It contains a uniform continuous frequency spectrum
over a particular frequency band i.e., it has a flat power spectral density (that’s
why it is known as white). This noise is additive in nature and follows Gaussian
distribution with zero means. The Theoretical value of Bit Error Rate (BER) of
QPSK modulation [86] is,
𝐵𝐸𝑅 =
1
2 ( )
· 𝑒𝑟𝑓𝑐
𝐸𝑏
𝑁𝑜
35
36
The Theoretical and simulated plot of BER with the variation Eb/NO is given in
Figure 14.
Figure 14: BER vs Eb/No for QPSK modulation under AWGN channel
B. Rician Fading Channel: Rician fading occurs when there is a LOS as well as the
non-LOS path in between the transmitter and receiver, i.e. the received signal
comprises both the direct and reflected and scattered multipath waves. Though
the Rician Fading channel has a strong LOS signal, still due to the scattered
multipath waves, there will be a disturbance in its constellation diagram. The
constellation diagram of the Rician Fading Channel is shown in Figure 15. The
BER in the Rician fading channel is quite higher than the AWGN channel. In our
multi-UAV system, the communication link in between the UAVs i.e., the
communication link in between the master and slave UAVs and slave UAVs itself
can be modelled as the Rician Fading channel.
C. Rayleigh Fading Channel: Rayleigh Fading occurs when no LOS path exists in
between transmitter and receiver, but only has an indirect path than the resultant
signal received at the receiver will be the sum of all the reflected and scattered
waves. Due to the reflected and scattered waves, there will be high BER. The
36
37
Figure 15. Constellation diagram of QPSK Figure 16. Constellation diagram of QPSK
modulation under Rician fading channel modulation under Rayleigh fading channel
17. Link Budget Analysis: The data link communication is the crucial
part of the single link communication protocol. The drone hovers high and collects the
data and sends those to ground stations or base stations. The transmitting and receiving
antennas are used in these aspects. Also, along with that, the drone delivers real-time
flight data to the base station. Also, the base station controls the drone.
37
38
Here, we are using 2.4GHz frequency, so it’s definitely in the S band. Now, to
communicate with the UAV from the base station, the command-control and telemetry
are important factors to be considered. The command control mechanism is held by the
uplink and telemetry by downlink. In the uplink communication, the base station
transmits the signal and commands the UAV and that signal is caught by the receiver
part of the transceiver mounted on the UAV. The drone provides the telemetry data and
the picture or video to the base station through the downlink. So, a bidirectional antenna
can be used in this aspect. Due to location tracking, the GPS can be used on the UAV.
That information will be sent to the base station through the downlink which is the
reverse direction of the uplink.
Payload:
The plugins on the UAV that can serve different purposes and perform different tasks are
called the payload. The payload can be a camera in this case to provide the audio and
video information to the base station. The UAV telemetry and the payload data is
transferred to the ground station.
Types of Antennas:
A. Dipole Antenna: In this antenna, the λ/4 electrical length is maintained. To make it
mobile, the loading coil is attached at the base of the antenna. This is mainly
used in the HF range. It provides very little gain.
B. Yagi Beam Antenna: It is used in directional antennas and it is a reflective type
antenna.
C. Horn Antenna: It provides high gain and narrow beams. This is a type of aperture
antenna. The aperture size controls the radiation pattern.
D. Reflector Antenna: It uses a parabolic reflector and has the receiver or
transmitter mounted on the focal plane. It uses an L band signal and has a Low
noise Block.
E. Phased Array Antennas: It provides a large ground base tracking radar and used
to focus on each target in the fields, It can be used for GPS receivers.
Gain: 3dBi
38
39
VSWR: < 1.5: 1 (For mathematical purposes, 3/2 ratio can be taken)
Temperature: -40 to 85
Height: 1.7inches
(𝐺(𝑑𝐵𝑖)/10) 3/10
Gain (dB) = 10 = 10 = 2𝑑𝐵
Wavelength :
8
3*10
λ(2. 2𝐺𝐻𝑧) = 9 = 0. 136𝑚
2.2 * 10
8
3*10
λ(2. 6𝐺𝐻𝑧) = 9 = 0. 115𝑚
2.6 * 10
𝑇𝑒
Noise Figure =1 + 𝑇𝑜
39
40
𝑍𝑖−𝑍𝑜 50−𝑍𝑜
ρ = 𝑍𝑖+𝑍𝑜
⇒ 0. 2 = 50+𝑍𝑜
⇒ 𝑍𝑜 = 33. 33 Ω
LINK BUDGET
Tx Value
Tx Loss -0.1dB
Tx Power 16.989 dB
EIRP 18.789dB
Table 3: Equivalent isotropic radiated power calculation
Losses Value
Multipath -1dB
Rx Values
Rx Loss -0.1dB
40
41
EIRP 18.789dB
RSL -81.771dB
Threshold Rx -88dB
Table 7: Noise power calculation
= 6.229 dB
41
42
Rate (BER) with link distance. There is no such straightforward relation between BER
and link distance. But for each type of modulation technique, there is a relationship
between BER and energy per bit. For the BPSK modulation technique;
1 𝐸
𝐵𝐸𝑅 = 2
𝑒𝑟𝑓𝑐( 𝑁𝑏 )
𝑂
Here, Eb is the energy per bit and NO is the noise power. Energy per bit can be
calculated by dividing the signal power by data rate. And, the noise power is considered
as 90 dBm. From the energy per bit and noise power we have calculated the SNR.
42
43
43
44
help reduce the amount of communication required and improve the efficiency of
the communication system. Machine learning algorithms can analyse and predict
signal strengths, analyse and predict channel performance and reroute the
routing topology.
20. Future Work: The coverage area of the swarm of UAVs is quite large for
disaster management. And hence existing path planning algorithms are not suitable in
this case due to their huge computation cost and time complexity (O(n^2) in general).
Now, we are planning to focus on some vision based path planning algorithms.
Traditional leader-follower strategy for maintaining the swarm structure is good during
the take off or landing period. But for searching purposes it is not suitable. Because in
this approach, the follower drone follows the leader and hence they will execute their
search operation over the same region. So, maintaining the swarm structure is a big
issue. In large networks optimization is another issue which must be explored in great
detail. Efficient communication should be there in a UAV network. There is a high chance
of link failure of the network in adverse situations. So, self-healing networks are highly
desirable here.
21. Conclusion: In this work we mainly surveyed and explored a lot of topics
related to UAVs. We have found some highly promising areas for exploring in this
domain. With the help of MATLAB we have shown some simulation results, especially
the bit error rates during the communication between the drones. More advanced things
will come in future work. Application of MIMO communication is a highly promising area
for reducing the multipath fading in drone to drone communication.
References
[1] S. Hayat, E. Yanmaz, and R. Muzaffar, ‘‘Survey on unmanned aerial vehicle networks for civil
applications: A communications viewpoint,’’ IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp.
2624–2661, 4th Quart., 2016.
44
45
45
46
[20] Khatib, Oussama. "Real-time obstacle avoidance for manipulators and mobile robots." In
Autonomous robot vehicles, pp. 396-404. Springer, New York, NY, 1986.
[21] H. Schippers, H. van Tongeren, J. Verpoorte and G. Vos, Distortion of conformal antennas
on aircraft structures, Nationaal Lucht- en Ruimtevaartlaboratorium, National Aerospace
Laboratory NLR, NLR-TP-2001-055
[22] https://en.wikipedia.org/wiki/Dryden_Wind_Turbulence_Model
[23] https://en.wikipedia.org/wiki/Von_K%C3%A1rm%C3%A1n_wind_turbulence_model
[24] Bohang Wang , Zain Anwar Ali and Daobo Wang, Controller for UAV to Oppose Different
Kinds of Wind in the Environment, Journal of Control Science and Engineering, Volume 2020,
Article ID 5708970, 10 pages, https://doi.org/10.1155/2020/5708970, Hindawi Publication
[25] Dussutour, A., Fourcassié, V., Helbing, D. & Deneubourg, J. L. 2004 Optimal traffic
organisation in ants under crowded conditions. Nature 428, 70– 73. (doi:10.1038/nature02345)
[26] Jeanson, R., Kukuk, P. F. & Fewell, J. H. 2005 Emergence of division of labour in halictine
bees: contributions of social interactions and behavioural variance. Anim. Behav. 70,
1183–1193. (doi:10.1016/j.anbehav.2005.03.004)
[27] Couzin, I. D., Krause, J., Franks, N. R. & Levin, S. A. 2005 Effective leadership and
decision-making in animal groups on the move. Nature 433, 513–516.
(doi:10.1038/nature03236)
[28] Ward, A. J. W., Sumpter, D. J. T., Couzin, I. D., Hart, P. J. B. & Krause, J. 2008 Quorum
decision-making facilitates information transfer in fish schools. Proc. Natl Acad. Sci. USA 105,
6948–6953. (doi:10.1073/pnas.0710344105)
[29] Hildenbrandt, H., Carere, C. & Hemelrijk, C. K. 2010 Self-organized aerial displays of
thousands of starlings: a model. Behav. Ecol. 21, 1349 –1359. (doi:10.1093/beheco/arq149)
[30] Puga-Gonzalez, I., Hildenbrandt, H. & Hemelrijk, C. K. 2009 Emergent patterns of social
affiliation in primates, a model. PLoS Comput. Biol. 5, e1000630.
(doi:10.1371/journal.pcbi.1000630)
[31] Hemelrijk, C. K. & Puga-Gonzalez, I. 2012 An individual-oriented model on the emergence
of support in fights, its reciprocation, and exchange. PLoS ONE 7, e37271.
(doi:10.1371/journal.pone.0037271)
[32] Moussaid, M., Niriaska, P., Garnier, S., Helbing, D. & Theraulaz, G. 2010 The walking
behaviour of pedestrian social groups and its impact on crowd dynamics. PLoS ONE 5, e10047.
(doi:10.1371/journal.pone.0010047)
[33] Krause, J. & Ruxton, G. D. 2002 Living in groups. New York, NY: Oxford University Press
[34] Charlotte K. Hemelrijk and Hanno Hildenbrandt, "Schools of fish and flocks of birds: their
shape and internal structure by self-organization", Interface Focus (2012) 2, 726–737,
doi:10.1098/rsfs.2012.0025
[35] G. Beni and J. Wang, Swarm intelligence in cellular robotic systems. In NATO
Advanced Workshop on Robots and Biological Systems, Il Ciocco, Tuscany,
Italy, 1989.
[36] M. Dorigo, V. Maniezzo, and A. Colorni, Positive feedback as a search strategy,
Tech. Report 91-016, Dipartimento di Elettronica, Politecnico di Milano, Italy,
1991.
[37] J. Kennedy and R. C. Eberhart. Particle Swarm Optimization. In Proceedings of
46
47
47
48
48
49
[69] Basavanna. M, Dr. Shivakumar. M, 2019, An Overview of Path Planning and Obstacle
Avoidance Algorithms in Mobile Robots, INTERNATIONAL JOURNAL OF ENGINEERING
RESEARCH & TECHNOLOGY (IJERT) Volume 08, Issue 12 (December 2019),
[70] Sanjoy Kumar Debnath, Rosli Omar, Susama Bagchi, Elia Nadira Sabudin, Mohd Haris
Asyraf Shee Kandar, Khan Foysol, Tapan Kumar Chakraborty, "Different Cell Decomposition
Path Planning Methods for Unmanned Air Vehicles-A Review", Proceedings of the 11th National
Technical Seminar on Unmanned System Technology 2019, Springer Singapore, 99-111.
[71] Karur, K.; Sharma, N.; Dharmatti, C.; Siegel, J. A Survey of Path Planning Algorithms for
Mobile Robots. Vehicles 2021, 3, 448–468. https://doi.org/10.3390/vehicles3030027
[72] A. S. H. H. V. Injarapu and S. K. Gawre, "A survey of autonomous mobile robot path
planning approaches," 2017 International Conference on Recent Innovations in Signal
Processing and Embedded Systems (RISE), 2017, pp. 624-628, DOI:
10.1109/RISE.2017.8378228.
[73] Michael W. Otte, A Survey of Machine Learning Approaches to Robotic Path-Planning
[74] C. Li, J. Zhang and Y. Li, "Application of Artificial Neural Network Based on Q-learning for
Mobile Robot Path Planning," 2006 IEEE International Conference on Information Acquisition,
2006, pp. 978-982, DOI: 10.1109/ICIA.2006.305870.
[75] Yu J, Su Y and Liao Y (2020) The Path Planning of Mobile Robots by Neural Networks and
Hierarchical Reinforcement Learning. Front. Neuro Robot. 14:63. Doi:
10.3389/fnbot.2020.00063
[76] A. M. de Souza Neto and R. A. F. Romero, "A Decentralized Approach to Drone Formation
Based on Leader-Follower Technique," 2019 Latin American Robotics Symposium (LARS),
2019 Brazilian Symposium on Robotics (SBR) and 2019 Workshop on Robotics in Education
(WRE), 2019, pp. 358-362, doi: 10.1109/LARS-SBR-WRE48964.2019.00069.
[77] Seidel, Scott Y., and Theodore S. Rappaport. "914 MHz path loss prediction models for
indoor wireless communications in multifloored buildings." IEEE transactions on Antennas and
Propagation 40, no. 2 (1992): 207-217.
[78] https://en.wikipedia.org/wiki/Friis_transmission_equation
[79] https://www.gaussianwaves.com/2013/09/friss-free-space-propagation-model/
[80] https://en.wikipedia.org/wiki/Two-ray_ground-reflection_model
[81] https://www.gaussianwaves.com/2019/03/two-ray-ground-reflection-model/
[82] https://en.wikipedia.org/wiki/Additive_white_Gaussian_noise
[83] https://en.wikipedia.org/wiki/Fading
[84] https://en.wikipedia.org/wiki/Rayleigh_fading
[85] https://en.wikipedia.org/wiki/Rician_fading
[86] Babu, A. Sudhir, and Dr KV Sambasiva Rao. "Evaluation of BER for AWGN, Rayleigh and
Rician fading channels under various modulation schemes." International Journal of Computer
Applications 26, no. 9 (2011): 23-28.
49
50
50