Preprint
Article

This version is not peer-reviewed.

Intelligent Multi-Channel Protocol for Improved UAV Surveillance Efficiency

Submitted:

17 November 2024

Posted:

19 November 2024

You are already at the latest version

Abstract
In this work uses innovative multi-channel load-sensing techniques to deploy unmanned aerial vehicles (UAVs) for surveillance. The research aims to improve the quality of data transmission methods and improve the efficiency and reliability of surveillance systems by exploiting the mobility and adaptability of UAVs does the proposed protocol intelligently distribute network traffic across multiple channels, considering the load of each channel, While addressing challenges such as load balancing, this study investigates the effectiveness of the protocol by simulations or practical tests on The expected results have improved UAV-based surveillance systems, more flexible and efficient networks for applications such as security, emergency response and the environment alignment of monitoring -Offering infrastructures, which contribute to efficient and reliable monitoring solutions.
Keywords: 
;  ;  ;  

1. Introduction

Unmanned Aerial Motors (UAVs), also called drones, are remotely piloted planes that can carry out numerous responsibilities without human intervention. UAVs have been broadly used for surveillance programs in numerous domains, along with army, disaster management, and environmental monitoring. Surveillance is looking at and gathering statistics approximately a target or hobby, along with an enemy, a disaster area, or a natural world habitat Figure 1. UAVs can provide a decision, actual-time, and continual surveillance capability that could decorate the situational cognizance and choice-making of the customers  [1]. However, the communication challenges of UAV networks, such as limited bandwidth, dynamic topology, and high mobility, pose significant problems in ensuring reliable data transmission well within Limited bandwidth means UAVs must compete for scarce wireless resources to transmit and receive data. The dynamic topology means that UAVs must constantly update their routing information to cope with frequent changes in network connectivity  [1]. High mobility means that UAVs have to cope with large variations in link quality and interference from other nodes. These challenges can lead to increased network load, long end-to-end latency, low packet delivery ratio, and low throughput, which can degrade the performance and quality of the monitoring service  [2]. A proactive multipath load balancing approach for low-power wireless networks boosts lifetime by 30% and reduces delay 10%  [3]. Therefore, it’s far crucial to layout a powerful routing protocol for UAV network surveillance, which can stability the community load, reduce the end-to-cease put-off, and en-hance the packet delivery ratio. UAV-assisted D2D networks utilize Q-learning for optimal peer selection  [5]. A routing protocol is a set of policies and algorithms that decide how the UAVs ahead the facts packet to their locations.
A routing protocol can be classified into two categories: single route and multipath. An unmarried-route routing protocol selects only one course for each records waft, while a multipath routing protocol selects a couple of paths for every information float. A multi-path routing protocol can provide several benefits over a single-path routing protocol  [4,6], together with load balancing, fault tolerance, and bandwidth aggregation. In this record, we present an powerful load-conscious multipath routing protocol (ELAMR) for UAV community surveillance, which aims to stability the network load, lessen the cease-to-give up delay, and improve the packet delivery ratio. UAV-assisted D2D vehicular network op-timizes reliability via dynamic link selection  [1]. ELAMR makes use of a unique load estimation metric that considers both the queue duration and the variety of packets in transmission at every UAV node. ELAMR additionally employs a multipath creation set of rules that selects the paths with the minimum load and the maximum hyperlink fine. We compare the performance of ELAMR through large simulations and compare it with existing routing protocols. The results show that ELAMR outperforms the prevailing protocols in phrases of network load, end-to-stop postpone, packet shipping ratio, and throughput. ELAMR can be implemented for numerous UAV network surveillance eventualities and offers a reliable and efficient communication solution.
The main contributions of this paper are as follows: 1) The approach of strategically placing drones to cover the given area with zero blind spots ensures efficient data transmission. 2) Signal-to-noise ratio and channel capacity calculations help in assessing the quality of communication. 3) Our proposed project helps to monitor battery life at each stage of data transmission. 4) Our proposed methodology ensures reliable and efficient data transmission in a drone network, making it suitable for various applications.

2. Related Work

The Wireless sensor networks (WSNs) face the project of power green records transmission due to the confined battery existence of the sensor nodes. One way to conquer this mission is to use relay nodes that can forward the aggregated records from the sensor nodes to a valuable base station (BS). However, the relay nodes might also have a limited transmission variety and can be unable to establish dependable links with the BS or different relays  [3,7,14]. Moreover, the relay nodes may additionally devour more strength than the sensor nodes, decreasing the network lifetime. UAV relay chains and trees enhance surveillance communication range and quality  [8,9], UAV aided D2D network optimization  [10]. To address these issues, some researchers have proposed to apply a cellular device-to-device (D2D) communique as a relay mechanism for WSNs. D2D conversation allows the devices to talk at once with every other using mobile resources, without going through the BS. This can lessen the transmission distance, decorate the hyperlink fine, and improve the spectral performance  [11,12,13,14]. Furthermore, D2D verbal exchange can offer dual connectivity, which means that the devices can use both mobile and D2D links simultaneously, which could increase the reliability and robustness of the community  [15]. The research under review describes a cellular D2D-assisted relay communication strategy for wireless sensor networks (WSNs), in which data is forwarded to the base station (BS) by the cluster heads (CHs) of sensor nodes via D2D relays  [16,17]. The Maximum Weight Bipartite Matching method is used by the proposed strategy, DSPA (D2D Relay Node (DRN) Selection and uplink Power Allocation), to choose the best DRNs for each CH based on the channel gain and the residual energy of the DRNs  [18]. Next, taking into account the interference from other pairings as well as the DRNs’ energy usage, the strategy allows the uplink power for every CH-DRN pair. In comparison to alternative schemes, the authors demonstrate that their suggested method can increase the energy efficiency, hop gain, and network longevity of the WSNs  [19,20]. Other related works on D2D relay verbal exchange for WSNs encompass [Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks], wherein the authors use social relationships amongst devices to shape private accept as true with and to select dependable relays; [Energy-Efficient Power Allocation and Relay Selection Schemes for Relay Assisted D2D Communications in 5G Networks], where the authors suggest schemes for electricity allocation and relay choice, based totally at the sign-to-noise ratio (SNR) and the electricity harvesting functionality of the devices; and [Relay Selection-Based Energy Efficiency of Hybrid Device To-Device Enabled 5G Networks], wherein the authors introduce a hybrid relay community version that uses reactive and proactive relay choice strategies to enhance the electricity efficiency of the network  [20,21]. This review summarizes the main conclusions of a recent study on power regulation and cooperative UAV channel modeling for 5G IoT networks. In a 5G IoT scenario where numerous UAVs work together with cellular base stations, this study investigates the communication problem  [17,22]. It focuses on uplink channel modeling and the investigation of uplink transmission performance. The effects of multi UAV reflection and 3D distance on wireless signal propagation are considered in the channel model  [17]. The three-dimensional distance is used to determine the path loss, which is a more realistic representation of the actual path loss. The UAV’s uplink transmit power is modified using the power control factor to account for differences in propagation route losses in order to achieve precise power management. One of the tasks we have in mind is figuring out the optimal UAV grid topology with the shortest drone range for video monitoring over an unreachable area without cellular coverage. This study acquired zero blind spots during surveillance by utilising the concept of the subject of view (FOV) of the onboard camera  [7]. DCM-D2X architecture with GWO-WPT mobility model enhances drone communication network performance and robustness significantly  [22]. Additionally, a wireless community for the UAV grid was established. Each UAV had a Raspberry Pi installed, and the inter-UAV distance was fixed primarily on the basis of excellent quality of experience (QoE) and ideal packet loss for streaming videos. UAVs as flying base stations boost wireless capacity; energy optimisation techniques, including ML, prolong flight time and efficiency  [23]. AI-powered UAVs enhance connectivity, reduce latency and energy consumption through smart data processing and flocking control algorithms  [24]. It verified that the video streaming QoE is lower than allowable thresholds at 4. The goal of the work on an energy-efficient UAV surveillance scheme that makes use of the compressive sensing (CS) concept is to minimize the overall energy consumption of the UAV network while meeting the surveillance quality requirement. This is achieved by formulating the UAV surveillance problem as a joint optimization problem of UAV trajectory design and CS measurement matrix design. Through simulations, it proved the efficacy of their plan and used the alternate direction method of multipliers (ADMM) algorithm to solve the optimization problem.

3. Methdology

After carefully examining many active projects and previously proposed frameworks (as mentioned in Section 2) for efficient UAV network surveillance, we have created a system to improve the current methods used in this field. UAV network surveillance using effective load-aware multipath routing protocol is our proposed methodology.

3.1. Algorithm for Effective UAV-based Network Surveillance

In this scenario, the objective is to optimize the communication between a set of drones within a specified area. The process begins by defining the coverage area of the drones and obtaining the latitude and longitude coordinates from a map. These coordinates are then translated into a coordinate system for further analysis. Next, the task involves strategically placing drones to eliminate blind spots, ensuring comprehensive coverage. The anchor drone is positioned at the centroid, facilitating effective communication with other drones in the network. To enhance communication reliability, the log distance path loss is calculated using the given formula. This computation involves factors such as transmitted power, transmitter, and receiver gains, wavelength, and the path loss exponent for free space.

3.1.1. Log Distance Path-Loss

The log-distance path loss model is given by:
PLLD ( d ) = PLLD ( d 0 ) + 10 n log d d 0
Where:
PLLD ( d 0 ) = 10 log P t ( G t G r ) ( 4 d 0 ) 2 + 10 n log ( d )
and the parameters are defined as follows:
  • P t = Transmitted power = 10 0.4 W ,
  • G t = Transmitted gain = 10,
  • G r = Receiver gain = 10,
  • λ = Wavelength, where λ = c f (with c being the speed of light and f the frequency),
  • n = Path loss exponent for free space.
Following this, the uplink path loss is determined, considering the time delay and path loss gain. Subsequently, the Signal-to-noise Ratio (SNR) is calculated, incorporating the transmitted power, path loss gain, and the power of additive white Gaussian noise at the receiver.

3.1.2. Uplink Path Loss

The uplink path loss can be expressed as:
ζ = τ · d α
Where:
  • α = Path loss exponent,
  • τ = Channel coefficient of the wireless channel between the transmitter (TX) and receiver (RX).
The received power R x is given by:
R x = ( p · β ( d ) ) 1 2
Where:
  • β ( d ) = Large-scale path loss, which is defined as:
    β ( d ) = PLLD ( d ) [ dB ]
The Signal-to-Noise Ratio (SNR) can be expressed as:
SNR = P t ζ 1 g N
Where:
  • g = Rayleigh fading,
  • ζ 1 = Path loss gain,
  • N = Power of Additive White Gaussian Noise (AWGN) at the receiver = 1.4332 × 10 15 W .
The channel capacity, representing the maximum data rate that can be reliably transmitted, is then computed using the given bandwidth. This capacity is essential for determining the efficiency of data transmission within the network.

3.1.3. Channel Capacity

The channel capacity C is given by the following equation:
C = B log ( 1 + SNR )
Where:
  • B = Bandwidth of the channel = 360   kHz.
To optimize energy consumption, only a percentage of drones (e.g., 10%, 20%, or 30%) are activated at a time to transmit data to the anchor drone. This staggered activation helps in balancing the load and maximizing the lifespan of the drone batteries. Multiple possible communication paths are evaluated, and the most optimum path is selected based on the calculated parameters. Along with the channel capacity, the battery life of each UAV is calculated after each transmission. For this calculation, the initial battery life of each UAV is assumed between 80% to 100%. The drone configuration to be undertaken for the project is 11.1V and 2200mAH battery power. Then actual channel capacity including battery is determined as described in next section.

3.1.4. Actual Channel Capacity and Transmission Time

The actual channel capacity C actual is given by:
C actual = C max · Battery remaining Battery max
Where:
  • C max = Maximum channel capacity,
  • Battery remaining = Remaining battery capacity,
  • Battery max = Maximum battery capacity.
The transmission time Time transmission is calculated as:
Time transmission = Data transmission C remaining
Where:
  • Data transmission = Amount of data to be transmitted,
  • C remaining = Remaining channel capacity.
The maximum battery capacity Battery max is given by:
Battery max = ( 11.1 × 2200 × 3.6 ) J × Battery initial
Where:
  • 11.1 = Voltage of the battery (in Volts),
  • 2200 = Battery capacity (in mAh),
  • 3.6 = Conversion factor to Joules.
The remaining battery Battery remaining is calculated as:
Battery remaining = Battery prev 10 0.4 × Time transmission
Where:
  • Battery prev = Previous battery level.
Finally, according to the above calculations, the data is transmitted using the optimal path. Then battery life and channel capacity is updated accordingly after each transmission. This approach ensures efficient and reliable communication within the UAV network.

3.1.5. Algorithms

Algorithm 1 Function for All Paths
1:
functionFIND_ALL_PATHS_TH(drone_graph, start, end, threshold, path)
2:
    path.append(start)             ▹ Add start to path
3:
    if start = end then
4:
        return path
5:
    end if
6:
    if start not in drone_graph then
7:
        return []
8:
    end if
9:
    paths ← []
10:
    for node in drone_graph[start] do
11:
        if node not in path and length(path) < threshold then
12:
           paths += FIND_ALL_PATHS_TH(drone_graph, node, end, threshold, path.copy())
13:
        end if
14:
    end for
15:
    return paths
16:
end function
Algorithm 2 Main Algorithm
1:
trans_cap_of_first_drone ← 6000000
2:
for_one ← FIND_ALL_PATHS_TH(drone_graph, 4, 24, 5, [])
3:
cap ← {}
4:
for i in range(length(for_one)) do
5:
    row_wise ← {}
6:
    for j in range(length(for_one[i]) - 1) do
7:
        row_wise[for_one[i][j]] ← drone_graph[for_one[i][j]][for_one[i][j+1]]
8:
    end for
9:
    cap[i] ← row_wise
10:
end for
11:
path_one ← []
12:
remaining_data ← 6000000
13:
while remaining_data ≥ 0 do
14:
    sorted_min_cap ← {}
15:
    for key, value in cap do
16:
        sorted_min_cap[key] ← min(value.values())
17:
    end for
18:
    sorted_min_cap ← sorted(sorted_min_cap.items(), key = lambda item: item[1], reverse = True)
19:
    key, value ← next(iter(sorted_min_cap))
20:
    remaining_data ← remaining_data - value
21:
    path_one.append(for_one[key])
22:
    for k, min_capacity in cap[key].items() do
23:
        cap[key][k] ← cap[key][k] - min_capacity
24:
        drone_graph[key][k] ← drone_graph[key][k] - min_capacity
25:
    end for
26:
end while

4. Implementation and Simulation of UAV Network

Designing and implementing a surveillance system involves a methodical process, starting with identifying the surveillance area and obtaining geographic coordinates. Subsequently, determining the drone’s field of view ensures optimal positioning to eliminate blind spots. Activation of the anchor drone initiates communication coordination among all drones. Calculating transmission parameters like log distance path loss and signal-to-noise ratio aids in selecting the best data transmission paths. Activating necessary drones and assessing path capacity and battery levels ensure optimal performance. Once an optimal path is confirmed, data transmission occurs, followed by updating drone metrics post-transmission. However, a comprehensive surveillance system design encompasses various considerations, including drone types, operational environments, and mission-specific requirements, demanding nuanced planning beyond this outlined process. The flow chart in Figure 2, visually represents the real-time traffic management process. The simulation of the UAV-based surveillance using load aware multipath routing is implemented as follows:

4.0.1. Determining the Shape of the Surveillance Area from Google Maps and Plot it

To visualize a shape using Google longitude and latitude coordinates, the geographical points can be plotted on a map. They are transformed into a normalized coordinate system for a clear representation Figure 3.

4.0.2. Image Processing

A multi step approach is employed to perform image processing tasks, such as converting an image to grayscale, applying thresholding, and creating a binary matrix. The first step involves the conversion of the input image into grayscale. Grayscale images represent each pixel with a single intensity value, eliminating color information. Applying a filter matrix involves convolving the matrix with the grayscale. The filter matrix serves as a template that moves across the image. The covered area refers to the spatial extent over which the filter is applied.

4.0.3. Drone Deployment

Next, determine the centroid of the entire UAV’s system. This is achieved by calculating the centroid coordinates for each drone based on its spatial distribution within the shape. Once the drone centroids are identified, distances between them are computed, forming a distance matrix Figure 4 and Figure 5.

4.0.4. Path Planning

To optimize communication in a drone network, the first step involves computing pathloss and signal-to-noise ratios (SNR) for each drone pair. Pathloss quantifies the attenuation of the signal as it travels through the environment Figure 6, while SNR provides a measure of the signal quality relative to background noise. Using these metrics, a drone graph is constructed, wherein nodes represent drones and edges signify communication links. The SNR values on the edges determine the strength of potential connections.

5. Result

The outcomes showed that ELAMR changed into capable of correctly balance the network load via distributing the records transmission responsibilities many of the drones based on their channel capacity and battery degree. This ended in a significant discount in quit-to-quit put off and an improvement in the packet transport ratio, thereby enhancing the general performance and satisfactory of the surveillance provider. Furthermore, the multipath construction algorithm hired via ELAMR changed into successful in figuring out the most excellent paths for data transmission. By selecting paths with minimum load and maximum hyperlink quality, the algorithm ensured that the surveillance facts become transmitted in the most green way possible. As per the image shown above, when 10% of the UAV are activated, 4 UAV gets activated Figure 7. The 4 UAV activated are UAV no. 4, 12, 29 and 40. The possible combination of these UAV are determined using the above-mentioned methodology. The path determination is done with the help of channel capacity of each data transmission link. We want to transmit the 600MB data to the path 4-8-15-23-24 and the initial capacity of the path was 3.5-3.5-3.4-3.5 Mbps respectively and initial battery level was 100% of each drone. So, to transmit 600 MB data it takes 172-172-176172 seconds. After completion of this transmission drone battery level goes to 31%-31%-32%-31%. Now, the current channel capacity is 1.085-1.085-1.088-1.085 Mbps. The same methodology is followed for another drone. The mentioned above depicts the factors undertaken and observed during transmission of the surveillance data. The factors to observed are size of the data transmitted, Path through which it gets transmitted, Channel capacity and battery life before data transmission, transmission time taken, channel capacity and remaining battery life after transmission Table 1.
These factors help to improve the network functionality and manage the network. The factors can be calculated with the help of above-mentioned methodology. These factors also assist when the network will be drained and how much time is required of each size of transmission data.

6. Conclusions

The approach of strategically placing drones to cover the given area with zero blind spots ensures efficient data transmission. The use of an anchor drone at the centroid helps in optimizing the network. Log Distance Path Loss and Uplink Path Loss calculations provide insights into the signal propagation characteristics. Signal-to-Noise Ratio and channel capacity calculations help in assessing the quality of communication. Activating drones in segments optimizes resource usage. Considering and choosing the most optimum path for data transmission enhances overall system efficiency. It helps to monitor battery life at each stage of data transmission. This methodology ensures reliable and efficient data transmission in a drone network, making it suitable for various applications.

7. Future Work

The integration of machine learning in drone technology is a significant advancement, allowing for continuous analysis of historical data, weather conditions, and user patterns to optimize drone paths. Real-time reconfiguration mechanisms are developed to respond to live traffic patterns and communication demands, ensuring efficient resource utilization. 5G technologies are explored for enhanced communication speed and reliability. The system is scalable for large coverage areas, involving multiple anchor drones and optimized communication strategies. Adaptive bandwidth allocation mechanisms are used to optimize performance under diverse conditions. Edge computing capabilities on drones are integrated to reduce latency and minimize reliance on centralized processing. Advanced algorithms for autonomous navigation and collision avoidance enhance safety measures, ensuring a robust and secure system. This comprehensive approach leverages historical data, scalability, and autonomy to create a resilient and efficient drone network.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jain, A.P.; Joshi, S. UAV-Enabled D2D Vehicular Communication Network: Link Selection and Outage Analysis. In Proceedings of the 2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring), Singapore, 24-27 June 2024; pp. 1–5. [Google Scholar] [CrossRef]
  2. Li, Y.; Bi, Y.; Wang, J.; Li, Z.; Zhang, H.; Zhang, P. Unmanned Aerial Vehicle Assisted Communication: Applications, Challenges, and Future Outlook. Cluster Computing 2024. [CrossRef]
  3. Moghadam, M.N.; Taheri, H.; Karrari, M. Multi-Class Multipath Routing Protocol for Low Power Wireless Networks with Heuristic Optimal Load Distribution. Wireless Personal Communications 2014, 82, 861–881. [Google Scholar] [CrossRef]
  4. Singhal, C.; De, S.; Gupta, H.M. User Heterogeneity and Priority Adaptive Multimedia Broadcast over Wireless. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10-14 June 2014; pp. 1699–1704. [Google Scholar] [CrossRef]
  5. Nadeem, A.; Ullah, A.; Choi, W. Social-Aware Peer Selection for Energy Efficient D2D Communications in UAV-Assisted Networks: A Q-Learning Approach. IEEE Wireless Communications Letters 2024, 13, 1468–1472. [Google Scholar] [CrossRef]
  6. Kim, N.M.; Jeong, N.E.; Bang, N.Y.-C.; Hwang, N.S.; Kim, N.B. Multipath Energy-Aware Routing Protocol in Wireless Sensor Networks. In Proceedings of the 2008 5th International Conference on Networked Sensing Systems, Kanazawa, 17-19 June 2008; pp. 127–130. [Google Scholar] [CrossRef]
  7. Kumar, N.; Ghosh, M.; Singhal, C. UAV Network for Surveillance of Inaccessible Regions with Zero Blind Spots. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 6–9 July 2020; pp. 1213–1218. [Google Scholar] [CrossRef]
  8. Olsson, P.-M.; Kvarnstrom, J.; Doherty, P.; Burdakov, O.; Holmberg, K. Generating UAV Communication Networks for Monitoring and Surveillance. In Proceedings of the 2010 11th International Conference on Control Automation Robotics & Vision, Singapore, 07-10 December 2010. [Google Scholar] [CrossRef]
  9. Kwan, R.; Leung, C.; Zhang, J. Resource Allocation in an LTE Cellular Communication System. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14-18 June 2009; pp. 1–5. [Google Scholar] [CrossRef]
  10. Pan, H.; Liu, Y.; Sun, G.; Wang, P.; Yuen, C. Resource Scheduling for UAVs-Aided D2D Networks: A Multi-Objective Optimization Approach. IEEE Transactions on Wireless Communications 2023. [CrossRef]
  11. Feng, D.; Lu, L.; Yuan-Wu, Y.; Li, G.Y.; Feng, G.; Li, S. Device-to-Device Communications Underlaying Cellular Networks. IEEE Transactions on Communications 2013, 61, 3541–3551. [Google Scholar] [CrossRef]
  12. Barik, P.K.; Chaurasiya, A.D.; Datta, R. DOCA: A UAV-Assisted Multi-Hop D2D Resource Allocation Scheme for 5G and beyond Using Machine Learning. Telecommunication Systems 2024. [CrossRef]
  13. Barik, P.K.; Singhal, C.; Datta, R. An Efficient Data Transmission Scheme through 5G D2D-Enabled Relays in Wireless Sensor Networks. Computer Communications 2021, 168, 102–113. [Google Scholar] [CrossRef]
  14. Min, H.; Lee, J.; Park, S.; Hong, D. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks. IEEE Transactions on Wireless Communications 2011, 10, 3995–4000. [Google Scholar] [CrossRef]
  15. Zhao, J.; Chai, K.K.; Chen, Y.; Schormans, J.; Alonso-Zarate, J. Two-Level Game for Relay-Based Throughput Enhancement via D2D Communications in LTE Networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, 22-27 May 2016; pp. 1–6. [Google Scholar] [CrossRef]
  16. Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Communications Surveys & Tutorials 2015, 18, 1123–1152. [Google Scholar] [CrossRef]
  17. Fu, X.; Ding, T.; Peng, R.; Liu, C.; Cheriet, M. Joint UAV Channel Modeling and Power Control for 5G IoT Networks. EURASIP Journal on Wireless Communications and Networking 2021. [CrossRef]
  18. Dixit, A.; Singh, S.K. DCM-D2X: An Effective Communication Mobility Model for Decentralized Cooperative Multi-Layer Drone to Everything. IEEE Access 2024, 12, 37326–37348. [Google Scholar] [CrossRef]
  19. Begen, A.; Akgul, T.; Baugher, M. Watching Video over the Web: Part 1: Streaming Protocols. IEEE Internet Computing 2011, 15, 54–63. [Google Scholar] [CrossRef]
  20. Xiao, S.; Zhou, X.; Feng, D.; Yuan-Wu, Y.; Li, G.Y.; Guo, W. Energy-Efficient Mobile Association in Heterogeneous Networks With Device-to-Device Communications. IEEE Transactions on Wireless Communications 2016, 15, 5260–5271. [Google Scholar] [CrossRef]
  21. Dan, F.; Ma, Y.; Yin, W.; Yang, X.; Zhou, F.; Lu, S.; Ning, B. An Accuracy-Aware Energy-Efficient Multipath Routing Algorithm for WSNs. Sensors 2024, 24, 285. [Google Scholar] [CrossRef] [PubMed]
  22. Zhang, J.; Wang, T.; Wang, J.; Du, W.; Zheng, D.; Wang, S.; Li, Y. Multi-UAV Collaborative Surveillance Network Recovery Via Deep Reinforcement Learning. IEEE Internet of Things Journal 2024, 1. [Google Scholar] [CrossRef]
  23. Abubakar, A.; Ahmad, I.; Omeke, K.; Ozturk, M.; Ozturk, C.; Abdel-Salam, A.; Mollel, M.; Abbasi, Q.; Hussain, S.; Imran, M. A Survey on Energy Optimization Techniques in UAV-Based Cellular Networks: From Conventional to Machine Learning Approaches. Drones 2023, 7, 214. [Google Scholar] [CrossRef]
  24. Do, T.H.; Truong, L.H.; Nguyen, M.T.; Chien, C.-F.; Tran, H.T.; Hua, H.T.; Nguyen, C.V.; Nguyen, H.T.T.; Nguyen, N.T.T. Energy-Efficient Unmanned Aerial Vehicle (UAV) Surveillance Utilizing Artificial Intelligence (AI). Wireless Communications and Mobile Computing 2021, 2021, 1–11. [Google Scholar] [CrossRef]
Figure 1. UAV Surveillance System
Figure 1. UAV Surveillance System
Preprints 139881 g001
Figure 2. Flow chart of UAV-based network surveillance.
Figure 2. Flow chart of UAV-based network surveillance.
Preprints 139881 g002
Figure 3. Plotting reference area in the required dimension.
Figure 3. Plotting reference area in the required dimension.
Preprints 139881 g003
Figure 4. Determining the coverage area of drone.
Figure 4. Determining the coverage area of drone.
Preprints 139881 g004
Figure 5. Determining the position of drone to be placed and anchor drone position.
Figure 5. Determining the position of drone to be placed and anchor drone position.
Preprints 139881 g005
Figure 6. Calculating distance between adjacent nodes.
Figure 6. Calculating distance between adjacent nodes.
Preprints 139881 g006
Figure 7. Optimal path for the activated UAVs.
Figure 7. Optimal path for the activated UAVs.
Preprints 139881 g007
Table 1. Transmission Data Table.
Table 1. Transmission Data Table.
Data To be Transmitted (MB) Path Previous Capacity (Mbps) Transmission Time (s) Initial Battery Level (%) Remaining Battery Level (%) Current Capacity
600 4 → 8 → 15 → 23 → 24 3.5 → 3.5 → 3.5 → 3.5 172 → 172 → 176 → 172 100 → 100 → 100 → 100 31 → 31 → 32 → 31 1.085 → 1.085 → 1.088 → 1.085
600 12 → 18 → 25 → 24 3.4 → 3.4 → 3.3 → 3.3 176 → 176 → 180 100 → 100 → 100 32 → 32 → 34 1.088 → 1.088 → 1.122
330 29 → 30 → 31 → 24 3.5 → 3.5 → 3.3 → 3.3 172 → 172 → 180 100 → 100 → 100 31 → 31 → 34 1.085 → 1.085 → 1.122
300 40 → 33 → 24 3.4 → 3.4 176 → 176 100 → 100 32 → 32 1.088 → 1.088
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated