388 research outputs found
A Survey on Cellular-connected UAVs: Design Challenges, Enabling 5G/B5G Innovations, and Experimental Advancements
As an emerging field of aerial robotics, Unmanned Aerial Vehicles (UAVs) have
gained significant research interest within the wireless networking research
community. As soon as national legislations allow UAVs to fly autonomously, we
will see swarms of UAV populating the sky of our smart cities to accomplish
different missions: parcel delivery, infrastructure monitoring, event filming,
surveillance, tracking, etc. The UAV ecosystem can benefit from existing 5G/B5G
cellular networks, which can be exploited in different ways to enhance UAV
communications. Because of the inherent characteristics of UAV pertaining to
flexible mobility in 3D space, autonomous operation and intelligent placement,
these smart devices cater to wide range of wireless applications and use cases.
This work aims at presenting an in-depth exploration of integration synergies
between 5G/B5G cellular systems and UAV technology, where the UAV is integrated
as a new aerial User Equipment (UE) to existing cellular networks. In this
integration, the UAVs perform the role of flying users within cellular
coverage, thus they are termed as cellular-connected UAVs (a.k.a. UAV-UE,
drone-UE, 5G-connected drone, or aerial user). The main focus of this work is
to present an extensive study of integration challenges along with key 5G/B5G
technological innovations and ongoing efforts in design prototyping and field
trials corroborating cellular-connected UAVs. This study highlights recent
progress updates with respect to 3GPP standardization and emphasizes
socio-economic concerns that must be accounted before successful adoption of
this promising technology. Various open problems paving the path to future
research opportunities are also discussed.Comment: 30 pages, 18 figures, 9 tables, 102 references, journal submissio
Mobile Cellular-Connected UAVs: Reinforcement Learning for Sky Limits
A cellular-connected unmanned aerial vehicle (UAV)faces several key
challenges concerning connectivity and energy efficiency. Through a
learning-based strategy, we propose a general novel multi-armed bandit (MAB)
algorithm to reduce disconnectivity time, handover rate, and energy consumption
of UAV by taking into account its time of task completion. By formulating the
problem as a function of UAV's velocity, we show how each of these performance
indicators (PIs) is improved by adopting a proper range of corresponding
learning parameter, e.g. 50% reduction in HO rate as compared to a blind
strategy. However, results reveal that the optimal combination of the learning
parameters depends critically on any specific application and the weights of
PIs on the final objective function.Comment: Accepted to present at IEEE Globecom202
Failure Analysis in Next-Generation Critical Cellular Communication Infrastructures
The advent of communication technologies marks a transformative phase in
critical infrastructure construction, where the meticulous analysis of failures
becomes paramount in achieving the fundamental objectives of continuity,
security, and availability. This survey enriches the discourse on failures,
failure analysis, and countermeasures in the context of the next-generation
critical communication infrastructures. Through an exhaustive examination of
existing literature, we discern and categorize prominent research orientations
with focuses on, namely resource depletion, security vulnerabilities, and
system availability concerns. We also analyze constructive countermeasures
tailored to address identified failure scenarios and their prevention.
Furthermore, the survey emphasizes the imperative for standardization in
addressing failures related to Artificial Intelligence (AI) within the ambit of
the sixth-generation (6G) networks, accounting for the forward-looking
perspective for the envisioned intelligence of 6G network architecture. By
identifying new challenges and delineating future research directions, this
survey can help guide stakeholders toward unexplored territories, fostering
innovation and resilience in critical communication infrastructure development
and failure prevention
A review of relay network on UAVS for enhanced connectivity
One of the best evolution in technology breakthroughs is the Unmanned Aerial Vehicle (UAV). This aerial system is able to perform the mission in an agile environment and can reach the hard areas to perform the tasks autonomously. UAVs can be used in post-disaster situations to estimate damages, to monitor and to respond to the victims. The Ground Control Station can also provide emergency messages and ad-hoc communication to the Mobile Users of the disaster-stricken community using this network. A wireless network can also extend its communication range using UAV as a relay. Major requirements from such networks are robustness, scalability, energy efficiency and reliability. In general, UAVs are easy to deploy, have Line of Sight options and are flexible in nature. However, their 3D mobility, energy constraints, and deployment environment introduce many challenges. This paper provides a discussion of basic UAV based multi-hop relay network architecture and analyses their benefits, applications, and tradeoffs. Key design considerations and challenges are investigated finding fundamental issues and potential research directions to exploit them. Finally, analytical tools and frameworks for performance optimizations are presented
Swarm of UAVs for Network Management in 6G: A Technical Review
Fifth-generation (5G) cellular networks have led to the implementation of
beyond 5G (B5G) networks, which are capable of incorporating autonomous
services to swarm of unmanned aerial vehicles (UAVs). They provide capacity
expansion strategies to address massive connectivity issues and guarantee
ultra-high throughput and low latency, especially in extreme or emergency
situations where network density, bandwidth, and traffic patterns fluctuate. On
the one hand, 6G technology integrates AI/ML, IoT, and blockchain to establish
ultra-reliable, intelligent, secure, and ubiquitous UAV networks. 6G networks,
on the other hand, rely on new enabling technologies such as air interface and
transmission technologies, as well as a unique network design, posing new
challenges for the swarm of UAVs. Keeping these challenges in mind, this
article focuses on the security and privacy, intelligence, and
energy-efficiency issues faced by swarms of UAVs operating in 6G mobile
networks. In this state-of-the-art review, we integrated blockchain and AI/ML
with UAV networks utilizing the 6G ecosystem. The key findings are then
presented, and potential research challenges are identified. We conclude the
review by shedding light on future research in this emerging field of research.Comment: 19,
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
The 5G networks have the capability to provide high compatibility for the new
applications, industries, and business models. These networks can tremendously
improve the quality of life by enabling various use cases that require high
data-rate, low latency, and continuous connectivity for applications pertaining
to eHealth, automatic vehicles, smart cities, smart grid, and the Internet of
Things (IoT). However, these applications need secure servicing as well as
resource policing for effective network formations. There have been a lot of
studies, which emphasized the security aspects of 5G networks while focusing
only on the adaptability features of these networks. However, there is a gap in
the literature which particularly needs to follow recent computing paradigms as
alternative mechanisms for the enhancement of security. To cover this, a
detailed description of the security for the 5G networks is presented in this
article along with the discussions on the evolution of osmotic and catalytic
computing-based security modules. The taxonomy on the basis of security
requirements is presented, which also includes the comparison of the existing
state-of-the-art solutions. This article also provides a security model,
"CATMOSIS", which idealizes the incorporation of security features on the basis
of catalytic and osmotic computing in the 5G networks. Finally, various
security challenges and open issues are discussed to emphasize the works to
follow in this direction of research.Comment: 34 pages, 7 tables, 7 figures, Published In 5G Enabled Secure
Wireless Networks, pp. 69-102. Springer, Cham, 201
- …