Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2024

Open Access 01-12-2024 | Research

Optimizing spectrum efficiency in 6G multi-UAV networks through source correlation exploitation

Author: Mohammad Alnakhli

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2024

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the context of 6G and 5G communication networks, particularly in disaster-stricken areas with a surging demand for connectivity and the rapid evolution of the internet of everything (IoE), the imperative for augmenting spectrum efficiency in unmanned aerial vehicles (UAVs) communication-enabled wireless networks becomes ever more pronounced. This work embarks on the mission of significantly enhancing spectrum efficiency by capitalizing on redundancies, such as correlations inherent in data sources like co-located video sensors. While the intuitive potential of exploiting redundancies for spectrum efficiency enhancement is apparent, our approach is systematically structured. We introduce a linear programming framework designed to meticulously allocate bandwidth to individual links based on their respective demands, while judiciously adhering to spatial spectrum reuse constraints. Subsequently, we employ this linear program to empirically quantify the improvements in spectrum efficiency engendered by source correlations. Furthermore, we elucidate various strategies for harnessing these correlations to maximize spectrum efficiency gains, while navigating the trade-off terrain between computational complexity and precision. Our findings resoundingly underscore the trans-formative power of identifying the precise set of source correlations, resulting in spectrum efficiency enhancements of up to two orders of magnitude. In terms of network performance, the judicious exploitation of source correlations grants admission to nearly 100% of delay-intolerant traffic, alongside substantial reductions in mean delay for delay-tolerant traffic.”
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Abbreviations
UAVs
Unmanned aerial vehicles
IoE
Internet of everything
6G
Sixth generation
5G
Fifth generation
SNs
Sensor nodes
BSs
Base stations
QoS
Quality of service
IoT
Internet of things
MIS
Maximal independent sets
D2D
Device-to-device
ROI
Return on investment
DGC
Dynamic graph coloring
CRN
Cognitive radio network
SU
Secondary users
AIO
Alternative iterative optimization
CBBA
Consensus-based bundle algorithm
IoV
Internet of vehicles
MEC
Mobile edge computing

1 Introduction

Unmanned Aerial Vehicles (UAVs) have garnered significant attention within the realm of wireless communication [1]. In situations where natural disasters disrupt public communication networks or access to essential resources in urban areas becomes challenging, UAVs emerge as a reliable solution [2]. What sets this technology apart is its ability to establish wireless network systems without necessitating the construction of new ground-based infrastructure. This makes UAV-based wireless technology exceptionally agile, adaptable, and cost-effective. Equipped with sensor nodes (SNs) and communication platforms, UAVs are versatile tools that find applications in diverse domains, enabling the resolution of intricate scenarios. The inherent mobility and positioning flexibility of UAVs empowers them to transmit information with reduced path loss effects [3, 4]. Consequently, UAV-based communication has become a focal point of interest, continually drawing attention.
While the deployment of 5G networks has been ongoing since 2019, research into the forthcoming sixth generation (6G) of wireless communication has already commenced [5]. A primary objective of 5G is to establish ubiquitous and seamless wire-less connectivity. However, relying solely on terrestrial infrastructure cannot fully realize this goal. In areas that are inaccessible, such as deserts, oceans, or off-grid regions, deploying terrestrial base stations (BSs) poses considerable challenges [6]. As a remedy, UAVs are positioned to act as aerial base stations (BSs) in both 6G and 5G networks, guaranteeing high-quality services for a wide range of users and applications in response to the surging demand for wireless communication [79]. Nonetheless, despite their potential, UAVs face significant challenges related to spectrum resource limitations, exacerbated by the rapid growth of the Internet of Everything (IoE) and escalating data traffic within networks [10, 11]. UAVs have found applications in various domains, including military operations, military radios [12], fire control, aviation radar tracking, and surveillance [13], wilderness search and rescue, disaster relief efforts, and wildlife monitoring [14].
In UAV networks, the value of communication is particularly pronounced during cooperative obstacle avoidance scenarios. For instance, data collection and the transmission of video and images by UAVs inherently involve substantial amounts of extraneous data, including coding redundancy, spatial redundancy, and temporal redundancy [15]. Consequently, these devices engage in extensive computational processes, yielding decisions replete with inherent redundancies [16]. Moreover, these devices are often co-located and generate information with underlying correlations [17, 18].1 This intrinsic redundancy presents an opportunity for augmenting spectrum efficiency.2 Furthermore, our study initially explores the advantages of harnessing redundancy in terms of energy consumption. However, it’s important to clarify that, at this stage, our research is primarily focused on spectrum efficiency enhancement, with energy consumption being a potential avenue for future investigation. Additionally, it is worth noting that multi-UAV configurations have demonstrated remarkable potential for substantially enhancing spectrum efficiency and overall system performance. This is achieved through their capacity to facilitate coordinated resource allocation and foster collaborative communication [20].
As an illustrative example, consider a typical multi-UAVs emergency network in a disaster area, as shown in Fig. 1. Information from a public park (through UAVs as surveillance application [21]), hospital, street, and information from public transport stations are conveyed to public safety agencies like the police, fire engine, and ambulance. Typically, information is transmitted over links. Links A, B, C transmit information from the park and since they are all adjacent (share a common node), they use disjoint portions of the bandwidth. If each link requires a bandwidth, b to transmit information, then a total bandwidth of 3b is required to transmit all information carried by links, A, B and C.
However, since all three links transmit information about the park, they are bound to exhibit large correlations. Then, information relayed on links B and C can be estimated from that relayed on link A (using linear or non-linear regression techniques). Intuitively, one would imagine that the same information can be transmitted only on one of the links using a bandwidth of only b, thus enhancing spectrum efficiency by a factor of 3. This assumes that there is the Pearson correlation coefficient [22] between the information transmitted on different links is 1. In practice though, the Pearson correlation coefficient takes values between − 1 and 1 [22].
The core objective of this study is the augmentation of spectrum efficiency within UAV communication networks through the strategic exploitation of redundancies, particularly source correlations. These correlations, often prevalent in scenarios featuring co-located video sensors, serve as a vital resource that can be harnessed to optimize bandwidth allocation. In pursuit of this objective, this research delivers several pivotal contributions that revolutionize the landscape of spectrum efficiency optimization in UAV communication networks. At its core, it introduces an innovative linear programming framework meticulously designed to allocate bandwidth optimally. This allocation process takes into account the unique demands of each link while diligently adhering to spatial constraints, ensuring a fine balance between resource utilization and spectrum optimization.
Moreover, this study stands as a trailblazer in the art of leveraging source correlations to enhance spectrum efficiency. It introduces a diverse array of mechanisms, each offering distinct trade-offs between accuracy and computational complexity, allowing network operators to tailor their approach to meet specific requirements. In essence, this research empowers operators with the tools and strategies required to navigate the intricate spectrum landscape efficiently and effectively.
Crucially, the tangible results of this study underscore the transformative potential of these methodologies. Numerical simulations have unequivocally demonstrated substantial enhancements in spectrum efficiency, accompanied by tangible reductions in delay and notable improvements in blocking probability. In synthesis, this research epitomizes a pioneering endeavor that marries theoretical innovation with practical applicability, promising to usher in a new era of efficiency and performance in UAV communication networks.
The remaining sections of the paper are organized as follows. Section 2 provides an overview of related work in the field, setting the context. Section introduces the methodology, emphasizing our innovative linear programming framework. Section 4 presents the system models, while Sects. 5 and 6 delve into bandwidth allocation strategies and numerical results, respectively. Finally, Sect. 7 provides a concise conclusion and outlines potential directions for future research.
Spectrum efficiency is the main challenge faced by UAV-enabled wireless networks today. Spectrum efficiency with UAVs communication network systems has been studied in [2327]. Luo and Xiti [23] presented a spectrum sensing algorithm based on gated recurrent units (GRU) tailored for multi-UAV networks. When combined with collaborative spectrum sensing, it enhances system stability and operational longevity for multi-UAV scenarios. To make a full use of spectrum, the authors in [24] considered a 3D spectrum mapping based on Return On Investment (ROI)-driven UAV deployment in a smart city. The work in [25] delved into the growing use of UAV communication, highlighting its potential for enhancing wireless systems’ capacity and coverage. By introducing new mathematical expressions, it investigates the spectral efficiency and energy efficiency of cell-free massive multiple input multiple output (CF-mMIMO) technology in UAV communication, providing valuable insights for optimizing this emerging field. Maximizing the spectrum efficiency of UAV-enabled cognitive radio network (CRN) was the aim of the work in [26], where the UAVs were considered as secondary users (SU). The spectrum efficiency optimization issue was solved using the dichotomy and alternative iterative optimization (AIO) algorithm. Due to the decreasing of spectrum sensing as a result of the multi-path fading and shadowing effect, the authors in [27] proposed CRN and UAVs spectrum sensing optimization, for maximizing the throughput of the UAV with fixing interference throughput.
Bandwidth allocation for multi-UAV systems has been extensively studied, and several methods and approaches have been proposed in the literature. One such approach is the Consensus-Based Bundle Algorithm (CBBA), which assigns tasks to UAVs while ensuring that each task is assigned to no more than one UAV [20]. The CBBA algorithm has been further enhanced by duplicating cooperative tasks to improve task allocation [20]. Another approach involves utilizing multiagent reinforcement learning techniques to allocate bandwidth and control the trajectory of multiple UAVs serving as edge computing devices for the Internet of Vehicles (IoV) [28]. A hierarchical game framework has also been proposed to jointly solve the problems of access selection and bandwidth allocation for multi-UAV video streaming [29]. Joint optimization techniques have been developed for multi-UAV-aided Mobile Edge Computing (MEC) systems, which consider factors such as transmit power, bandwidth allocation, and UAV trajectories [30]. Lastly, resource allocation in vehicular networks with multi-UAV served edge computing has been investigated, where UAVs share limited bandwidth resources and are equipped with edge computing servers to serve the vehicles [31]. These approaches highlight the diverse range of methods that have been explored to address the challenges of bandwidth allocation in multi-UAV systems.
It appears that the provided information acknowledges a lack of detailed quantitative analysis and mechanisms to establish the improvement in spectrum efficiency when exploiting redundancies, specifically in the context of a multi-UAV network. Additionally, there is a lack of information regarding the demand of each link in this scenario. Without specific quantitative analysis or mechanisms, it becomes challenging to provide precise insights into the improvement in spectrum efficiency and overall network performance when exploiting source correlations.
Consequently, the study utilizes simulation to explore how exploiting source correlation impacts spectrum efficiency in 6G multi-UAV network. It compares bandwidth bandwidth allocation with and without redundancy exploitation, using metrics like spectrum efficiency and network performance. The controlled UAV mobility scenario isolates source correlation effects, establishing a foundation for future research on dynamic channel conditions. Virtual UAVs and simulation nodes represent participants, with statistical techniques analyzing the performance of proposed mechanisms. The findings are presented through graphs, offering insights into the effectiveness of the studied approaches.

3 Methods

3.1 Study design

This study employed a simulation-based experimental approach to investigate the impact of source correlation exploitation on spectrum efficiency in 6G multi-UAV networks. The study aimed to compare the spectrum efficiency achieved when redundancies in the source, such as co-located video sensors, are exploited. A linear program was formulated to allocate bandwidth optimally to the links based on their demands while satisfying spatial spectrum reuse constraints. Different mechanisms were identified to exploit correlations and maximize spectrum efficiency, considering a trade-off between accuracy and computational complexity.

3.2 Setting

The study was conducted in a simulated environment that accurately models the 6G multi-UAV network scenario. The simulation environment provided a controlled platform to evaluate the proposed techniques for enhancing spectrum efficiency through source correlation exploitation. Various network configurations and scenarios were simulated to assess the effectiveness of the mechanisms. UAV mobility is indeed a critical factor that affects wireless communication links, leading to variations in channel conditions. However, due to the complexity associated with modeling and compensating for these dynamic channel changes, I deliberately kept our analysis confined to a controlled scenario to isolate the effects of source correlations on spectrum efficiency. This allowed me to establish a foundation for future research endeavors where I can systematically delve into the complexities of UAV mobility, dynamic channel variations, and their interplay with source correlations.

3.3 Participants or materials

The participants in this study were virtual UAVs and associated communication platforms represented as simulation nodes. The simulation nodes emulated the behavior of real-world UAVs and their communication capabilities. Additionally, source data with inherent correlations, such as video and image information, were generated within the simulation to simulate the presence of redundancies.

3.4 Interventions and comparisons

The interventions in this study consisted of comparing the spectrum efficiency achieved through two different approaches:
  • Bandwidth allocation without redundancy exploitation: In this approach, bandwidth was allocated to each link independently, without considering redundancies or correlations in the transmitted information. The linear optimization model was used to allocate bandwidth optimally based on the link demands and spatial reuse constraints while ignoring the presence of correlations.
  • Bandwidth allocation with redundancy exploitation: In this approach, the proposed mechanisms were employed to exploit source correlations and enhance spectrum efficiency. The linear optimization model was extended to incorporate correlations and allocate bandwidth accordingly, considering the interdependence of the information transmitted on different links.

3.5 Analysis

The performance of the different approaches was evaluated based on the following metrics:
  • Spectrum efficiency: Spectrum efficiency was measured as the amount of information transmitted per unit of available bandwidth. It quantified the effectiveness of the bandwidth allocation strategies in utilizing the limited spectrum resources efficiently.
  • Network performance: The impact on network performance was assessed by evaluating call blocking and mean delay for delay-intolerant and delay-tolerant services, respectively. Call blocking referred to the percentage of delay-intolerant traffic that could not be admitted into the network, while mean delay measured the average delay experienced by delay-tolerant traffic.
The simulations were executed for multiple scenarios, varying the correlation levels and network configurations. The results were analyzed using statistical techniques such as descriptive statistics, hypothesis testing, and graphical representations to assess the significance of the improvements achieved through correlation exploitation. The findings were presented in the form of graphs, and comprehensive discussions to provide a clear understanding of the experimental outcomes.

4 Systems models

Consider a Multi-UAV network comprising D nodes, as depicted in Fig. 1. In this network, two nodes that communicate with each other directly by possibly transmitting at the highest power are termed “one-hop neighbors” and are said to share a link. The communication within this network occurs via links, thus bandwidth requests are made for links rather than individual nodes. Consequently, this multi-UAV network comprises N links, with the ith link having a bandwidth demand of di, where 1 ≤ i ≤ N. The entire network shares a total available bandwidth, denoted as B, and adheres to spatial reuse constraints. To efficiently allocate spectrum resources while satisfying the reuse constraints, we employ the concept of the Maximal Independent Set (MIS) within the link graph. An MIS is defined as a maximal subset of links that can share the same portion of bandwidth. In other words, it is a set of links that cannot be further expanded without violating the spatial reuse constraint. The problem of sharing bandwidth between links to satisfy these reuse criteria can be equivalently viewed as allocating disjoint portions of bandwidth to all MIS.
Let A represent the link-MIS incidence matrix with dimensions M × N, where M is the number of MIS and N is the number of links. Each element aij of this matrix is defined as follows:
$$a_{ij} = \left\{ {\begin{array}{*{20}l} 1 \hfill & {{\text{link}}\;i \in {\text{MIS}}\;j} \hfill \\ 0 \hfill & {{\text{otherwise}},} \hfill \\ \end{array} } \right.$$
(1)
For a given demand vector d = [d1, d2,...,dN]T (where di is the demand for bandwidth on link i, let Xj represent the amount of bandwidth allocated to MIS j. The corresponding optimization problem is formulated as follows:
$$\min \mathop \sum \limits_{j = 1}^{M} X_{j}$$
(2)
$${\text{subject}}\;{\text{to}}\;{ }\mathop \sum \limits_{j = 1}^{M} X_{j} a_{ij} \ge d_{i} , \;\;\forall i, j$$
(3)
$$\mathop \sum \limits_{j = 1}^{M} X_{j} \le B$$
(4)
The optimization problem described in the given formulation can be categorized as a linear programming (LP) problem. It used to make efficient decisions regarding the allocation of limited resources, in this case, bandwidth B, in a Multi-UAV network. Optimization involves finding the best possible solution to a problem among a set of feasible options while adhering to specific constraints and objectives.
In the context of the system models section, the optimization problem aims to allocate available bandwidth Xj to different MISj within the network. This allocation is carried out in a way that minimizes the total amount of allocated bandwidth while ensuring that the bandwidth demands di of individual links are met (as specified by Eq. 6). Additionally, the total allocated bandwidth cannot exceed the available bandwidth B, as indicated by Eq. 7. So, the optimization problem seeks to find the optimal distribution of bandwidth among the MISj while satisfying these constraints. The objective is to use the available spectrum resources most efficiently, reducing waste and improving the overall performance of the Multi-UAV network.
The goal of this work is to improve spectrum efficiency in communication for multi-UAVs in the context of 5G and 6G. The focus is on exploiting redundancies to enhance spectrum efficiency. To do that, we post the following research questions:
RQ1
What is an appropriate analytical formulation to determine the minimum bandwidth required to satisfy the demands on all the links satisfying spatial re-use constraints?
RQ2
How do we factor arbitrary source correlations into the formulation and show that exploiting source correlations always results in larger spectrum efficiency?
Section 5.1 address RQ1 and RQ2 is addressed in Sect. 5.2.

5 Bandwidth allocation and redundancy exploitation

Bandwidth Allocation and Redundancy Exploitation focuses on the allocation of bandwidth in the network and the exploitation of redundancies to enhance performance. To address these questions (RQ1 and RQ2), we provide a comprehensive analysis in tow main sections.
In Sect. 5.1, we present the bandwidth allocation scheme without exploiting redundancy. Here, we outline the approach for allocating bandwidth to individual links based on their respective demands, considering the spatial reuse constraints. We discuss the optimization problem formulation and provide insights into the methodology employed to achieve this objective. The objective is to efficiently allocate bandwidth while meeting the demands of each link.
In Sect. 5.2, we delve into the exploitation of redundancies. We explain how the untransmuted data can be estimated from the partially transmitted data, allowing for the use of lesser bandwidth. We discuss the concept of correlation between links and its role in improving spectrum efficiency. We present a framework for harnessing these redundancies and examine its impact on the system’s overall performance.

5.1 Bandwidth allocation without redundancy exploitation

Bandwidth allocation plays a crucial role in optimizing network performance and meeting the demands of different links. In this section, we focus on the problem of allocating bandwidth without exploiting redundancy. Our objective is to devise an effective approach or algorithm for distributing the available bandwidth among the links while satisfying the given demand constraints. To shed light on this problem, we introduce a theorem that characterizes the solution set to the linear program defined by the bandwidth allocation problem. This theorem provides valuable insights into the properties and implications of the optimal solutions, facilitating a deeper understanding of the feasibility and optimization aspects of bandwidth allocation without redundancy exploitation.
The following theorem enables characterize the solution set to the linear program. Theorems 1 and 2 provide a quantitative means to satisfy all demands on all the links by expending minimum bandwidth.
Theorem 1
Let \(\widetilde{B}\) be the solution to the linear program,
$$\tilde{B} = \min \mathop \sum \limits_{j = 1}^{M} X_{j}$$
(5)
$${\text{subject}}\;{\text{to}}\;\;{ }\mathop \sum \limits_{j = 1}^{M} X_{j} a_{ij} \ge d_{i} , \;\;\forall i, j$$
(6)
$$\mathop \sum \limits_{j = 1}^{M} X_{j} \le B$$
(7)
Then, \(\widetilde{B}\) is the minimum amount of bandwidth required to meet the demand, d while satisfying re-use constraints.
Proof
If \({X}_{j}\) amount of bandwidth is given to \(MI{S}_{j}\) then \(\sum_{j=1}^{M}{X}_{j}\) represents the total bandwidth expended because different MIS use disjoint portions of the bandwidth. Constraint (7) ensures that this is less than the available bandwidth in the system. \(\sum_{j=1}^{M}{X}_{j} {a}_{ij}\) provides the total bandwidth allocated to link i from the definition of \({a}_{ij}\) from Eq. (1) and Xj. Therefore, constraint (6) implies that the demand on all links are met.■
Thus, minimizing (5) subject to (6) and (7) ensures that all links meet their demands using minimum bandwidth.
Theorem 2
The allocated bandwidth \(\widetilde{B}\) is minimum when constraint (6) is met with equality. In other words,
$$\tilde{B} = \min \mathop \sum \limits_{j = 1}^{M} X_{j}$$
(8)
$${\text{subject}}\;{\text{to}}\;\mathop \sum \limits_{j = 1}^{M} X_{j} a_{ij} = d_{i} , \;\;\forall 1 \le i \le N$$
(9)
Proof
Follows from the property of linear programs (That solutions occur at extreme points [32]).■
It is observed that the formulation according to the Theorem 2 does not exploit any redundancy (linear or non-linear) in the data transmitted on multiple links. Before the redundancies can be formulated or exploited to enhance spectrum efficiency, it is essential to study the characteristics of the used bandwidth, under different demands on different links. The following Lemma provides a basis leading to Theorems 3 in this subsection and later, Theorem 5 in the next subsection to quantify the benefits of exploiting redundancies in the data.
Lemma 1
A demand vector, \(\user2{d } > 0\user2{ }\;({\text{i}}.{\text{e}}.,\; d_{i} \ge 0,\; 1 \le i \le N\;{\text{and}}\;\exists , i^{\prime } , \;1 \le i^{\prime } \le N,\; such\;that\;d_{{i^{\prime}}} > 0\)), results in an allocated bandwidth, B > 0.
Proof
Consider a demand vector, with \({d}_{{i}{\prime}}>0\). Then, the minimum bandwidth \(\widetilde{B}\) is obtained by minimizing the objective function in (8) subject to the constraints in (9). If \(\widetilde{B}=0\), then \({X}_{j}=0, \forall j\), \({\text{i}}.{\text{e}}\), violating constraint (9) for \(i = i^{\prime } .\) Therefore, \(B >\)\(0\).■
Lemma 1 actually suggests that if any one link has a non-zero (positive) demand then a positive bandwidth is needed to satisfy the demand. While it is intuitively obvious, we require a formal proof in order to obtain Theorem 3, which, in turn, is essential to establish the benefits of exploiting correlations.
Theorem 3
Let \({{\varvec{d}}}_{1}={\left[{d}_{11} {d}_{21} {d}_{31} \dots {d}_{N1}\right]}^{T}\) and \({{\varvec{d}}}_{12}={\left[{d}_{12} {d}_{22} {d}_{32} \dots {d}_{N2}\right]}^{T} b\)e two demand vectors so that \({d}_{1j} \ge {d}_{2j}\), \(\forall j(1 \le j \le N )\) (this is also denoted as \({\varvec{d}}1 \ge {\varvec{d}}2\)). Let \({B}_{1}\) and \({B}_{2}\) be the minimum amount of bandwidth required to meet the demand vectors, d1 and d2, respectively. Then \(B1 \ge B2.\)
Proof
Consider X(1) and X(2) be the amount of bandwidth allocated to MIS j in order to meet the demand vector, d1 and d2, respectively. From constraint (9),
$$\mathop \sum \limits_{j = 1}^{M} X_{j}^{\left( 1 \right)} { }a_{ij} = d_{i1} { },{ }\forall { }i$$
(10)
$$\mathop \sum \limits_{j = 1}^{M} X_{j}^{\left( 2 \right)} { }a_{ij} = d_{i2} ,\;\;\forall { }i$$
(11)
Therefore,
$$\mathop \sum \limits_{j = 1}^{M} (X_{j}^{\left( 1 \right)} - { }X_{j}^{\left( 2 \right)} )a_{ij} = d_{i1} { },\;\;\forall { }i$$
(12)
Let \(d_{i1} - d_{i2} \widetilde{{d_{i} }} \ge 0, \forall i\). Let \(X_{j}^{\left( 1 \right)} - X_{j}^{\left( 2 \right)} \widetilde{Xj}\). Now consider the optimization problem
$$\tilde{B} = \min \mathop \sum \limits_{j = 1}^{M} \widetilde{Xj}$$
(13)
$${\text{subject}}\;{\text{to}}\;{ }\mathop \sum \limits_{j = 1}^{M} \widetilde{Xj} a_{ij} = \widetilde{{d_{i} }},\;\;\forall i$$
(14)
The above problem is identical to the optimization problem in (8) subject to constraint (9), for a demand vector, \(\widetilde{{\varvec{d}} }\ge 0\) and according to Lemma 1, \(\widetilde{B}={\widetilde{B}}_{1}-{\widetilde{B}}_{2}\ge 0\), \({\text{i}}.{\text{e}}.\) \({{\widetilde{B}}_{1}\ge \widetilde{B}}_{2}.\)
Theorem 3 indicates that as demands increase, additional bandwidth is required, which is intuitively true. Theorem 3 (and it’s proof) provides an analytical evidence, which will be used to answer RQ2 posed earlier in this section. In the following subsection, we demonstrate formally, how Theorem 3 can be utilized to enhance the spectrum efficiency when source correlations are exploited. Theorem 3 indicates that as demands increase, additional bandwidth is required, which is intuitively true.
We now present the final result of this subsection, which represents the existence of a demand vector that achieves the saturation condition, i.e., utilizes the entire bandwidth, B available at the network.
Theorem 4
\(\exists {{\varvec{d}}}^{\boldsymbol{*}}\) such that the minimum bandwidth required to satisfy the demand vector, \({{\varvec{d}}}^{\boldsymbol{*}}\) is the total available bandwidth in the network, B.
Proof
Consider, N links, M MIS and a demand vector, d so that the bandwidth allocated is \(\widetilde{B}<B\). Therefore, \(\sum_{j=1}^{M}{X}_{j} {a}_{ij}={d}_{i}, \forall i\) and \(\sum_{j=1}^{M}{X}_{j}=\widetilde{B }<B.\) Then, \(\forall j , 1\le j\le M,\) let \({X}_{j}^{*}={X}_{j}+\frac{B- \widetilde{B}}{M}\) and if \({M}_{i}\) is the number of MIS that link \(i\) belongs to, then make \({d}_{i}^{*}={d}_{i}+\left(\frac{{M}_{i}}{M}\right)\left(B- \widetilde{B}\right).\) This results in \(\sum_{j=1}^{M }{ X}_{j}{a}_{ij}=\sum_{j=1}^{M }{ X}_{j}{a}_{ij}+\frac{B- \widetilde{B}}{M} \sum_{j=1}^{M}{a}_{ij}={d}_{i}+\left(\frac{{M}_{i}}{M}\right)\left(B- \widetilde{B}\right)={d}_{i}^{*}, \forall i .\) Thus satisfying constraints (9). In this case, \(\sum_{j=1}^{M}{X}_{j}^{*}= \sum_{j=1}^{M}{X}_{j}+\sum_{j=1}^{M}\left(B- \widetilde{B}\right)/M=\widetilde{B}+B- \widetilde{B}= B, {\text{i}}.{\text{e}}.,\exists {\mathbf{d}}_{\mathbf{i}}^{\mathbf{*}}={\left[{d}_{i}^{*}\right]}_{1\le i\le N}\), such that the total bandwidth required to satisfy the demand vector, d is B.■
Overall, these findings answer the first question RQ1 regarding the characterization and optimization of bandwidth allocation without redundancy exploitation. In the following subsection, we demonstrate formally, how Theorem 3 can be utilized to improve spectrum efficiency when data transmitted on different links exhibit mutual redundancy and answer the second question RQ2.

5.2 Redundancy exploitation for enhanced performance

Redundancy between the data transmitted on multiple links can be measured by evaluating the joint probability density function (pdf) of the data on different links. Since the number of such joint pdfs are exponentially large,3 we reduce the computational complexity by considering only linear dependences or the correlation coefficients of the data transmitted on multiple links.
Since information is transmitted on links and bandwidth demands are made on links, we define two links that carry correlated information as correlated sources or say that the corresponding links exhibit source correlation. For a network with \(N\)-links, let \({\rho }_{ij}\) be the correlation coefficient between the information on link i and link j (If links i and j are not adjacent, then \({\rho }_{ij}=0\)).4 Note that \({\rho }_{ij}={\rho }_{ji}, \forall i, j\) and \(-1 \le {\rho }_{ij} \le 1, \forall i, j\) [33]. Let \({\varvec{\rho}}\) be the correlation coefficient matrix given by:
$$\rho = \left( {\begin{array}{*{20}c} 1 & {\rho_{12} } & {\rho_{13} } & \cdots & {\rho_{1N} } \\ {\rho_{21} } & 1 & {\rho_{23} } & \cdots & {\rho_{2N} } \\ {\rho_{31} } & {\rho_{32} } & 1 & \cdots & {\rho_{3N} } \\ \vdots & \vdots & \vdots & \ddots & \vdots \\ {\rho_{N1} } & {\rho_{N2} } & {\rho_{N3} } & \cdots & 1 \\ \end{array} } \right)$$
(15)
The source (transmitting node) needs to transmit only partial data on a link. In other words, the part of the data not transmitted on a link \(i\) can be estimated (using linear regression [33]) using the data transmitted on all neighboring links to link \(i\). Thus, if the demand on link \(i,\) was \({d}_{i}\), then only \({d}_{i}(1 - \sum_{i\ne j}|{\rho }_{ij}|)\) amount of data need to be transmitted on link \(i\) and the rest can be estimated from the data transmitted on link \(j;i\ne j.\)
Remark 1
Since \({\rho }_{ij}=0\) if link \(i\) and \(j\) are not adjacent, we can use this for any \(i, j\) combination (not restricted only to neighboring links).
Remark 2
Since \(-1 \le {\rho }_{ij} \le 1, \forall i, j\) we use \(|{\rho }_{ij}|\).
Remark 3
It is impractical to estimate the data transmitted on all links. Therefore, some links need to transmit all the true data. Typically, the links expected to transmit large amount of data (i.e., link \(i\) with large \({d}_{i}\)) should transmit partial data. Thus, the modified demands on all the links are given by:
$$\widehat{{d_{i} }} = \left\{ {\begin{array}{*{20}l} {d_{i} \left( {1 - \mathop \sum \limits_{i \ne j} \left| {\rho_{ij} } \right|} \right),} \hfill & {\mathop \sum \limits_{i \ne j} \left| {\rho_{ij} } \right| \le 1} \hfill \\ {d_{i} ,} \hfill & {{\text{otherwise}}} \hfill \\ \end{array} ,} \right.$$
(16)
The following theorem shows that exploiting source correlations enhances spectrum efficiency, thus answering RQ2.
Theorem 5
Let \(\eta\) be the spectrum efficiency obtained when bandwidth is assigned to links to meet a demand \(\mathbf{d}\) without exploiting correlations. Let \(\eta\) be the spectrum efficiency when the bandwidth is allocated to meet the demand vector, \(\mathbf{d}\), after exploiting correlations. Then, \(\widetilde{\eta } \le \widehat{\eta }.\)
Proof
From (16),\(\widehat{{d}_{i}} \le {d}_{i}\), \(\forall i.\) Then \(\widehat{\mathbf{d}}{\left[\widehat{{d}_{i}}\right]}_{1\le i\le n}\le \mathbf{d}\). Let \(\widetilde{B}\) and \(\widehat{B}\) be the amount of bandwidth required to satisfy demands, \(\mathbf{d}\) and \(\widehat{\mathbf{d}}\), respectively. From theorem 3, \(\widehat{B}\le \widetilde{B}\). The spectrum efficiency without exploiting correlations is \(\widetilde{\eta }=\boldsymbol{ }\sum_{{\varvec{i}}=1}^{{\varvec{N}}}{d}_{i}/\widetilde{B}\) and that after exploiting correlations,5\(\widehat{\eta }=\boldsymbol{ }\sum_{{\varvec{i}}=1}^{{\varvec{N}}}{d}_{i}/\widehat{B}\). Since \(\widetilde{B}\ge \widehat{B}\), \(\widetilde{\eta } \le \widehat{\eta }\).■
Theorem 5 not only gives an analytical proof that exploiting source correlations enhances spectrum efficiency, but also provides a quantitative handle on the exact amount of enhancement. The following theorems provide a result that depicts one of the major benefits of exploiting source correlation. \(\exists {\mathbf{d}}^{*}\) such that the minimum bandwidth required to satisfy the demand vector, \({\mathbf{d}}^{*}\) is the total available bandwidth in the network, B.
Theorem 6
Certain demand vectors that cannot be satisfied when correlations are not exploited, may be met when correlations are exploited. Formally stated, if a demand vector, \(\widetilde{{\varvec{d}}}\) requires the entire bandwidth, B (such a demand vector exists from Theorem 5) when correlations are not exploited, then a demand vector \({{\varvec{d}}}^{\boldsymbol{*}}\boldsymbol{ }>\boldsymbol{ }\widetilde{{\varvec{d}}}\) may be admitted when correlations are exploited.
Proof
It is observed that since \(d^{*} > \tilde{d}\), it requires a bandwidth, \(B^{*} > B\) (from Theorem 5) and hence will not be admitted, if correlations are not exploited. Consider a demand vector, \(\hat{d}\), obtained from a demand vector \(d^{*} > \tilde{d}\), after exploiting correlations using (16). There could be tow cases for the amount of bandwidth, B, required to satisfy the demand vector, \(\hat{d}\). Case (1): \(\hat{B} \le B\), in which case, \(d^{*}\) can be admitted when correlations are exploited and Case (2) \(\hat{B} > B\), in which case, d cannot be admitted even after correlations are exploited.■
Thus, certain demand vectors, d which cannot be admitted when correlations are not exploited may be admitted when correlations are exploited if they fall under Case (1) above. The exact characterizations of such vectors are too complex and beyond the scope of this paper.
It is observed that the enhancement in spectrum efficiency follows from the fact that the un-transmitted data can be estimated from the partially transmitted data, by using lesser bandwidth. When there are more redundancies in the systems, more pairs, whose correlation are exploited, will be communicate. Consequently, there will be more improvement in Spectrum efficiency.

6 Numerical results and discussion

For numerical computations, we consider a UAV network with 20 nodes with a bandwidth, of B = 50 MHz. Random geometric graphs are generated to obtain different typologies. We consider three demand scenarios-; (1) all nodes have uniform demand for bandwidth, (2) dense nodes (nodes with a large number of neighbors) have larger demands for bandwidth and (3) sparse nodes (nodes with fewer neighbors) have lesser demands for bandwidth. The three scenarios are achieved as follows. For scenario (1) (Uniform Traffic) we make traffic \(=1/D\), for all nodes. For scenario (2), we take traffic in a node \(d = \left( {{\text{degree}}\;{\text{of}}\;{\text{node}}\;d} \right)/\left( {{\text{sum}}\;{\text{of}}\;{\text{degreed}}\;{\text{of}}\;{\text{all}}\;{\text{nodes}}} \right).\) For scenario (3) we take traffic on node d = D-1-node degree(u) and normalize it so that the sum of the traffic of all nodes is one. The traffic on each link is computed assuming nodes communicate with all their neighbors with equal probability. To exploit correlations, we generate \({\rho }_{ij} \sim U (-1, 1)\) (uniformly distributed in (− 1, 1)) between links \(i\) and \(j\), make \({\rho }_{ii} = 1, \forall i.\) We perform 100,000 simulations on UBUNTU Linux.
Figure 2 presents the achieved spectrum efficiency without and with exploiting correlations. It is observed that exploiting correlations result in an improvement in spectrum efficiency by one to two orders of magnitude. As it is shown, uniform traffic and more traffic in sparse nodes provide better result compared to more traffic at dense nodes with the presents of redundancies. Generally, the spectrum efficiency with exploiting redundancies performs better result than the spectrum efficiency without exploiting redundancies.
While it is intuitive that exploiting source correlations will result in better spectrum efficiency, Fig. 2 provides a quantitative measure, which has not been described before in current literature. At this point, we pose another research question, RQ3: How does improvement in spectrum efficiency actually impact the network performance?
To answer RQ 3, we consider two types of traffic: delay intolerant traffic (that may suffer losses in the form of a fraction of traffic not being admitted into the system but cannot tolerate delay and therefore cannot be buffered) and delay tolerant traffic (that have to be admitted into the system but can tolerate delay and therefore can be buffered until bandwidth becomes available for transmission). The amount of bandwidth allocated to link \(i\), \(bi = 50 S\left( \eta \right)g_{i}\) and the number of channels allocated to link \(i, m_{i} = \frac{{b_{i} }}{10000}\) assuming each channel to support 10 kHz of traffic [34]. We then take the load to be 80% of \(m_{i}\) on link \(i\).
The figure shows the improvement of the achieved spectrum efficiency with the desired spectrum efficiency for three scenarios, uniform traffic, more traffic at dense nodes, and more traffic at sparse nodes. As it is shown, uniform traffic and more traffic in sparse nodes provide better results compared to more traffic at dense nodes with the presents of redundancies. The main reason for that is contributed to the high number of links on dense nodes winch incident on them. It is not only that but also when they generate more traffic, then more links that cannot reuse bandwidth inject more traffic into the network. This led to less reuse overall, and consequently lower achieved spectrum efficiency. Generally, the achieved spectrum efficiency with exploiting redundancies performs better results than the achieved spectrum efficiency without exploiting redundancies.
Figure 3 depicts the blocking probability (fraction of traffic blocked due to insufficient bandwidth availability) for delay intolerant traffic for the systems with and without exploiting correlations for the scenarios uniform traffic, more traffic at dense nodes, and more traffic at the sparse node. The system that exploits correlations results in lower call blocking probability because of larger resource availability or being able to support larger demands (according to Theorem 6). As the desired information efficiency (and hence, achieved spectrum efficiency) increases, the system that exploits correlations admits almost 100% of all incoming traffic, while the system that does not exploit correlations results in a significant portion of incoming traffic that is blocked (as large as 20% when dense nodes generate more traffic). The comparison of the blocking probabilities is performed using the Erlang-B blocking formula for an M/M/c/c system assuming Poisson arrival process for incoming traffic [35].
For delay tolerant traffic, we again assume the incoming traffic to follow a Poisson process and apply the mean delay expression for M/M/c Erlang-C delay formula [34] and compare the mean delay for the systems with and without exploiting correlations. As observed from Fig. 4, the mean delay reduces by 50% (for more traffic at dense nodes) to 66% (for uniform traffic) and as large as 88% for more traffic at dense nodes for low values of desired information efficiency. Generally, the blocking probability with exploiting redundancies performance beater then the scenarios without exploiting redundancies. It can be inferred from the curves that blocking probability reduces as desired spectrum efficiency increases. This change is more prominent in uniform traffic and more traffic at sparse node; showing a significant improvement in the blocking probability comparing to the systems without exploiting redundancies. This improvement is attributed to the different of demand for each link and the number of neighbors for each node.
In this study, we investigate the relationship between the variance in correlation and the improvement in spectrum efficiency, as well as the error in estimation. The correlation coefficient is assumed to follow a uniform distribution in the range of \((-{\rho }_{{\text{max}}} ,{\rho }_{{\text{max}}})\), where \({\rho }_{{\text{max}}}\) is the maximum correlation coefficient. Thus, yielding a variance of \(\frac{{\rho }_{{\text{max}}}^{2}}{0.33}\), since \({\rho }_{{\text{max}}}\le 1\) [33]. By varying the variance of correlation between 0 and 0.33, we examine how it impacts the spectrum efficiency and the error in estimation. We study the improvement in spectrum efficiency Fig. 5 and then the error in estimation in Fig. 6. As the variance in correlation increases as seen in Fig. 5, the correlation coefficients tend to be closer to 1. This means that there is a stronger correlation between the information transmitted on different links.
Consequently, the spectrum efficiency, which measures the amount of information transmitted per unit available bandwidth, increases with a larger correlation. The improvement in spectrum efficiency indicates that exploiting correlations leads to a more efficient utilization of the available spectrum resources. When the correlation between the transmitted information is high, redundant information can be estimated and reconstructed, allowing for more efficient transmission and reducing the need for additional bandwidth.
Furthermore, as the correlation increases in Fig. 6, the error in estimation decreases. This is because the higher correlation enables more accurate prediction and estimation of the untransmuted information based on the received information. The decrease in estimation error contributes to the overall improvement in spectrum efficiency. Overall, the study demonstrates the positive impact of exploiting correlations in enhancing spectrum efficiency. Higher correlation values lead to improved spectrum utilization and reduced estimation errors, highlighting the importance of considering correlation in optimizing wireless communication systems.
Figures 7, 8, 9, 10, 11, 12, 13, 14 and 15 are illustrated different techniques to compare and evaluate their effectiveness in relation to the proposed method” Exploited fullest correlation” and these techniques are the legends in the next figures. The legend, “Linear program” shows the basic spectrum allocation without exploiting redundancies (analysis in Sect. 5.1), “Principal.
Submatrix” and” Minimum Sum Sub-matrix”. where the Principal Sub-matrix approach involves identifying the principal sub-matrix of the correlation matrix. The principal sub-matrix represents the strongest correlations among the links. By exploiting the correlations within this sub-matrix, spectrum allocation can be optimized to achieve higher efficiency. Minimum Sum Sub-matrix approach focuses on finding the minimum sum sub-matrix of the correlation matrix. The minimum sum sub-matrix represents a subset of links with the lowest total correlation. By allocating spectrum resources to this sub-matrix, redundancies can be minimized, leading to improved spectrum efficiency. Also, we present the next figures with three different scenarios Uniform traffic, More Traffic at Dense Node and More Traffic at Sparse Node.
The spectrum efficiency performance when Uniform traffic (Fig. 7), Dense Node (Fig. 8) and Sparse Nodes (Fig. 9). From Figs. 7, 8 and 9, it is observed that Exploiting Fullest Correlations provides 90−100% improvement in spectrum efficiency over the basic spectrum allocation described in Sect. 5.1, while the principal sub-matrix method provides 30−50% improvement and Minimum Sum Sub-matrix method provides 10−20%.
We then proceed to measure the improvements in blocking probability for delay intolerant traffic and when using the spectrum efficiency enhancements, in Figs. 10, 11 and 12. It is observed from the figures that the scenarios with Fig. 10 uniform traffic and Fig. 11 more traffic at dense networks provide better results than Fig. 12 more traffic at sparse nodes. The scenario with Max achievement spectrum efficiency results in a lower call-blocking probability. It can be inferred from the curves that blocking probability reduces as desired spectrum efficiency increases. Also, the mechanisms explained in this section decrease the blocking probability to almost zero, thus motivating the spectrum efficiency enhancement using the principal sub-matrix and the exploiting fullest correlations. Since the performances of exploiting fullest correlations and the principal sub-matrix method are similar, it shows that the principal sub-matrix method provides the same blocking performance while being computationally more efficient.
The achieved spectrum efficiency improves as the variance in correlation increases as observed from Figs. 13, 14 and 15. Once again, we use the M/M/c/c model for the delay intolerant traffic and M/M/c model for delay tolerant traffic.
Our results clearly demonstrate that exploiting correlations among nodes in a UAV network leads to significant improvements in spectrum efficiency. The achieved spectrum efficiency gains range from one to two orders of magnitude when compared to traditional resource allocation methods that do not consider correlations. This finding aligns with previous studies highlighting the benefits of exploiting correlations in various wireless communication scenarios. By leveraging the correlations among nodes, we can better utilize the available spectrum resources, resulting in increased network capacity and improved overall performance.
Furthermore, our study reveals that the impact of correlation exploitation on spectrum efficiency varies depending on the demand scenario. Specifically, uniform traffic and more traffic at sparse nodes scenarios exhibit higher spectrum efficiency gains compared to the more traffic at dense nodes scenario. This suggests that the benefits of correlation exploitation are more pronounced when the traffic distribution is more evenly spread across the network or concentrated in sparsely populated areas. These findings provide valuable insights into the relationship between correlation exploitation and network traffic characteristics.
The observed improvement in spectrum efficiency through correlation exploitation has significant implications for the design and operation of UAV networks. By incorporating correlation-based resource allocation techniques, network operators can optimize the utilization of limited spectrum resources and improve the quality of service for UAV communication.
The findings of our study also highlight the importance of considering correlation as a fundamental factor in resource allocation strategies. While traditional resource allocation methods focus primarily on node characteristics and network topology, neglecting the correlation between nodes can lead to suboptimal resource allocation decisions. By explicitly accounting for correlations, network operators can achieve more efficient and effective resource allocation, leading to enhanced network performance and user experience.
Moreover, the reduction in blocking probability and mean delay observed in our study further emphasizes the positive impact of correlation exploitation on network performance. Lower blocking probability ensures a higher admission rate of traffic, reducing the likelihood of congestion and improving the overall reliability of the network. Similarly, the decrease in mean delay enhances the timeliness of data delivery, which is crucial for delay-tolerant applications in UAV networks.
While our study provides valuable insights into the benefits of correlation-based resource allocation in UAV networks, it is important to acknowledge its limitations. Firstly, our simulations were conducted on a specific network topology and demand scenarios. The obtained results may not fully capture the variations and complexities of real-world UAV networks. Further studies involving different network topologies, varying traffic patterns, and larger-scale deployments would provide a more comprehensive understanding of the implications of correlation exploitation.
Secondly, our study assumed a uniform distribution of correlation coefficients and did not consider dynamic changes in correlations over time. In practice, correlations may vary due to factors such as mobility, environmental conditions, and interference. Investigating the impact of time-varying correlations and developing adaptive resource allocation techniques that can effectively handle such dynamics would be a valuable direction for future research.
Lastly, our study focused on the spectrum efficiency aspect of correlation-based resource allocation. While spectrum efficiency is a crucial metric, it is essential to consider other performance indicators, such as energy efficiency, scalability, and robustness to varying network conditions. Future research should explore the multi-objective optimization of resource allocation strategies, considering these diverse performance aspects.
Based on the findings and limitations of our study, several avenues for future research and development can be identified. Investigating the impact of correlation exploitation on other performance metrics, such as energy efficiency, scalability, and robustness. Considering time-varying correlations and developing adaptive re-source allocation techniques that can handle dynamic correlation changes in UAV networks. Examining the effects of different network topologies and traffic patterns on correlation-based resource allocation to assess its generalizability and scalability. Exploring the application of correlation-based resource allocation techniques in other wireless communication systems beyond UAV networks, such as cellular networks and IoT deployments. Developing efficient algorithms and protocols for real-time correlation estimation and utilization in resource allocation decisions. By addressing these research directions, we can further advance the understanding and implementation of correlation-based resource allocation in UAV networks and other wireless communication systems, ultimately leading to more efficient and reliable network operations.

7 Conclusion

We presented a formal evaluation of the enhancements to spectrum efficiency and the improvement in network performance when the network exploits source correlations in multi-UAV communication systems. A linear formulation was presented and analytical proofs were produced to measure the improvement in spectrum efficiency. Numerical evaluations of the improvements in achieved spectrum efficiency as well as the performance of the network was provided when source correlations were exploited. About one to two orders of magnitude of improvement in the spectrum efficiency, about 50 − 88% reduction in the mean delay for delay tolerant traffic and close to 100% call admittance for delay intolerant traffic was achieved. We presented an exhaustive set of correlations exploitation and a principal sub-matrix based method for choosing the right sets of links whose correlations can be exploited, to further enhance the spectrum efficiency. It was observed that the principal sub-matrix method yielded almost zero blocking and 80% improvement in the mean delay while being computationally more efficient than the exhaustive set of correlations exploitation. The analysis for self-similar (non-Poisson) traffic and power control for energy efficiency are currently being investigated in the context of this research.

Acknowledgements

This study is supported via funding from prince Sattam bin Abdulaziz University project number (PSAU/2023/R1444).

Declarations

Competing interests

The author declares that they have no competing interests.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Footnotes
1
It is important to note that the information sources may exhibit non-linear dependencies in addition to correlations. However, this study focuses solely on the analysis of correlations. Later in our research, we demonstrate how this analysis can be extended to encompass non-linear dependencies as well.
 
2
Spectrum efficiency is quantified as the amount of information transmitted per unit of available bandwidth [19].
 
3
For N-links we have \(\left(\begin{array}{c}N\\ 1\end{array}\right)+ \left(\begin{array}{c}N\\ 2\end{array}\right)+ \left(\begin{array}{c}N\\ 3\end{array}\right) \cdots + \left(\begin{array}{c}N\\ N\end{array}\right)={2}^{N}-1\) combinations.
 
4
The exact measurements of \({\rho }_{ij} , \forall i, j\) is usually by numerically computing and updating the Pearson correlation coefficient [33]. The exact measurement mechanisms and protocol to update this information among nodes is beyond the scope of this paper.
 
5
Since the effective of data transmitted on link \(i\) is still \({d}_{i}\) after estimating the non-transmitted data on link \(i\) from the transmitted data on neighboring link to link \(i.\)
 
Literature
1.
go back to reference X. Jiang, M. Sheng, Z. Nan, X. Chengwen, L. Weidang, W. Xianbin, Green UAV communications for 6g: a survey. Chin. J. Aeronaut. 35(9), 19–34 (2022)CrossRef X. Jiang, M. Sheng, Z. Nan, X. Chengwen, L. Weidang, W. Xianbin, Green UAV communications for 6g: a survey. Chin. J. Aeronaut. 35(9), 19–34 (2022)CrossRef
2.
go back to reference S.B. Prathiba, G. Raja, S. Anbalagan, R. Narayanan, K.B. Venkata Karthik, Soschain: self optimizing streamchain for last-mile 6g UAV-truck networks, in Proceedings of the 1st Workshop on Artificial Intelligence and Blockchain Technologies for Smart Cities with 6G (2021). pp. 19–24 S.B. Prathiba, G. Raja, S. Anbalagan, R. Narayanan, K.B. Venkata Karthik, Soschain: self optimizing streamchain for last-mile 6g UAV-truck networks, in Proceedings of the 1st Workshop on Artificial Intelligence and Blockchain Technologies for Smart Cities with 6G (2021). pp. 19–24
3.
go back to reference R. Liu, K. Guo, K. An, F. Zhou, Y. Wu, Y. Huang, G. Zheng, Resource allocation for noma-enabled cognitive satellite-UAV-terrestrial networks with imperfect CSI. IEEE Trans. Cognit. Commun. Network. 2, 26 (2023) R. Liu, K. Guo, K. An, F. Zhou, Y. Wu, Y. Huang, G. Zheng, Resource allocation for noma-enabled cognitive satellite-UAV-terrestrial networks with imperfect CSI. IEEE Trans. Cognit. Commun. Network. 2, 26 (2023)
4.
go back to reference N. Moraitis, K. Psychogios, A.D. Panagopoulos, A survey of path loss prediction and channel models for unmanned aerial systems for system-level simulations. Sensors 23(10), 4775 (2023)CrossRef N. Moraitis, K. Psychogios, A.D. Panagopoulos, A survey of path loss prediction and channel models for unmanned aerial systems for system-level simulations. Sensors 23(10), 4775 (2023)CrossRef
5.
go back to reference T. Huang, W. Yang, J. Wu, J. Ma, X. Zhang, D. Zhang, A survey on green 6g network: architecture and technologies. IEEE Access 7, 175758–175768 (2019)CrossRef T. Huang, W. Yang, J. Wu, J. Ma, X. Zhang, D. Zhang, A survey on green 6g network: architecture and technologies. IEEE Access 7, 175758–175768 (2019)CrossRef
6.
go back to reference Y. Zeng, Q. Wu, R. Zhang, Accessing from the sky: a tutorial on uav communications for 5g and beyond. Proc. IEEE 107(12), 2327–2375 (2019)CrossRef Y. Zeng, Q. Wu, R. Zhang, Accessing from the sky: a tutorial on uav communications for 5g and beyond. Proc. IEEE 107(12), 2327–2375 (2019)CrossRef
7.
go back to reference J. Cui, Y. Liu, A. Nallanathan, Multi-agent reinforcement learning-based resource allocation for uav networks. IEEE Trans. Wirel. Commun. 19(2), 729–743 (2019)CrossRef J. Cui, Y. Liu, A. Nallanathan, Multi-agent reinforcement learning-based resource allocation for uav networks. IEEE Trans. Wirel. Commun. 19(2), 729–743 (2019)CrossRef
8.
go back to reference G. Geraci, A. Garcia-Rodriguez, M.M. Azari, A. Lozano, M. Mezzavilla, S. Chatzinotas, Y. Chen, S. Rangan, M. Di Renzo, What will the future of uav cellular communications be? A flight from 5g to 6g. IEEE Commun. Surv. Tutor. 24(3), 1304–1335 (2022)CrossRef G. Geraci, A. Garcia-Rodriguez, M.M. Azari, A. Lozano, M. Mezzavilla, S. Chatzinotas, Y. Chen, S. Rangan, M. Di Renzo, What will the future of uav cellular communications be? A flight from 5g to 6g. IEEE Commun. Surv. Tutor. 24(3), 1304–1335 (2022)CrossRef
9.
go back to reference K. Guo, R. Liu, M. Alazab, R.H. Jhaveri, X. Li, M. Zhu, Star-ris-empowered cognitive non-terrestrial vehicle network with noma. IEEE Trans. Intell. Veh. 4, 30 (2023) K. Guo, R. Liu, M. Alazab, R.H. Jhaveri, X. Li, M. Zhu, Star-ris-empowered cognitive non-terrestrial vehicle network with noma. IEEE Trans. Intell. Veh. 4, 30 (2023)
10.
go back to reference H. Hu, X. Da, Y. Huang, H. Zhang, L. Ni, Y. Pan, Se and ee optimization for cognitive uav network based on location information. IEEE Access 7, 162115–162126 (2019)CrossRef H. Hu, X. Da, Y. Huang, H. Zhang, L. Ni, Y. Pan, Se and ee optimization for cognitive uav network based on location information. IEEE Access 7, 162115–162126 (2019)CrossRef
11.
go back to reference S.K. Tayyaba, H.A. Khattak, A. Almogren, M.A. Shah, I.U. Din, I. Alkhalifa, M. Guizani, 5g vehicular network resource management for improving radio access through machine learning. IEEE Access 8, 6792–6800 (2020)CrossRef S.K. Tayyaba, H.A. Khattak, A. Almogren, M.A. Shah, I.U. Din, I. Alkhalifa, M. Guizani, 5g vehicular network resource management for improving radio access through machine learning. IEEE Access 8, 6792–6800 (2020)CrossRef
12.
go back to reference P. Tedeschi, F.A. Al Nuaimi, A.I. Awad, E. Natalizio, Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions. IEEE Trans. Ind. Inf. 30, 45 (2023) P. Tedeschi, F.A. Al Nuaimi, A.I. Awad, E. Natalizio, Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions. IEEE Trans. Ind. Inf. 30, 45 (2023)
13.
go back to reference M.A. Jasim, H. Shakhatreh, N. Siasi, A.H. Sawalmeh, A. Aldalbahi, A. Al-Fuqaha, A survey on spectrum management for unmanned aerial vehicles (UAVS). IEEE Access 10, 11443–11499 (2021)CrossRef M.A. Jasim, H. Shakhatreh, N. Siasi, A.H. Sawalmeh, A. Aldalbahi, A. Al-Fuqaha, A survey on spectrum management for unmanned aerial vehicles (UAVS). IEEE Access 10, 11443–11499 (2021)CrossRef
14.
go back to reference A. Shamsoshoara, M. Khaledi, F. Afghah, A. Razi, J. Ashdown, K. Turck, A solution for dynamic spectrum management in mission-critical uav networks. in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (IEEE, 2019), pp. 1–6 A. Shamsoshoara, M. Khaledi, F. Afghah, A. Razi, J. Ashdown, K. Turck, A solution for dynamic spectrum management in mission-critical uav networks. in 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (IEEE, 2019), pp. 1–6
15.
go back to reference Q. Hu, C. Wu, Y. Wu, N. Xiong, Uav image high fidelity compression algorithm based on generative adversarial networks under complex disaster conditions. IEEE Access 7, 91980–91991 (2019)CrossRef Q. Hu, C. Wu, Y. Wu, N. Xiong, Uav image high fidelity compression algorithm based on generative adversarial networks under complex disaster conditions. IEEE Access 7, 91980–91991 (2019)CrossRef
16.
go back to reference M. Peng, W. Meng, Cooperative obstacle avoidance for multiple uavs using spline vo method. Sensors 22(5), 1947 (2022)CrossRef M. Peng, W. Meng, Cooperative obstacle avoidance for multiple uavs using spline vo method. Sensors 22(5), 1947 (2022)CrossRef
17.
go back to reference P. Kolios, K. Papadaki, V. Friderikos, Energy efficient mobile video streaming using mobility. Comput. Netw. 94, 189–204 (2016)CrossRef P. Kolios, K. Papadaki, V. Friderikos, Energy efficient mobile video streaming using mobility. Comput. Netw. 94, 189–204 (2016)CrossRef
18.
go back to reference P.S. Diniz, W.A. Martins, M.V. Lima, Block Transceivers: OFDM and Beyond (Morgan & Claypool Publishers, New York, 2012)CrossRef P.S. Diniz, W.A. Martins, M.V. Lima, Block Transceivers: OFDM and Beyond (Morgan & Claypool Publishers, New York, 2012)CrossRef
19.
go back to reference M. Alnakhli, S. Anand, R. Chandramouli, Joint spectrum and energy efficiency in device to device communication enabled wireless networks. IEEE Trans. Cognit. Commun. Network. 3(2), 217–225 (2017)CrossRef M. Alnakhli, S. Anand, R. Chandramouli, Joint spectrum and energy efficiency in device to device communication enabled wireless networks. IEEE Trans. Cognit. Commun. Network. 3(2), 217–225 (2017)CrossRef
20.
go back to reference X. Fu, J. Pan, X. Gao, B. Li, J. Chen, K. Zhang, Task allocation method for multi-uav teams with limited communication bandwidth. in 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV) (IEEE, 2018), pp. 1874–1878 X. Fu, J. Pan, X. Gao, B. Li, J. Chen, K. Zhang, Task allocation method for multi-uav teams with limited communication bandwidth. in 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV) (IEEE, 2018), pp. 1874–1878
21.
go back to reference B. Shang, V. Marojevic, Y. Yi, A.S. Abdalla, L. Liu, Spectrum sharing for UAV communications: spatial spectrum sensing and open issues. IEEE Veh. Technol. Mag. 15(2), 104–112 (2020)CrossRef B. Shang, V. Marojevic, Y. Yi, A.S. Abdalla, L. Liu, Spectrum sharing for UAV communications: spatial spectrum sensing and open issues. IEEE Veh. Technol. Mag. 15(2), 104–112 (2020)CrossRef
22.
go back to reference S. Ross, A First Course in Probability (Pearson Inc., New Jersey, 2002) S. Ross, A First Course in Probability (Pearson Inc., New Jersey, 2002)
23.
go back to reference Z. Luo, X. Wang, A high-efficiency collaborative spectrum sensing with gated recurrent unit for multi-uav network. in 2021 31st International Telecommunication Networks and Applications Conference (ITNAC) (IEEE, 2021), pp. 180–187 Z. Luo, X. Wang, A high-efficiency collaborative spectrum sensing with gated recurrent unit for multi-uav network. in 2021 31st International Telecommunication Networks and Applications Conference (ITNAC) (IEEE, 2021), pp. 180–187
24.
go back to reference Q. Wu, F. Shen, Z. Wang, G. Ding, 3d spectrum mapping based on roi-driven UAV deployment. IEEE Netw. 34(5), 24–31 (2020)CrossRef Q. Wu, F. Shen, Z. Wang, G. Ding, 3d spectrum mapping based on roi-driven UAV deployment. IEEE Netw. 34(5), 24–31 (2020)CrossRef
25.
go back to reference A.L. Imoize, H.I. Obakhena, F.I. Anyasi, M.A. Adelabu, K. Kavitha, N. Faruk, Spectral efficiency bounds of cell-free massive mimo assisted uav cellular communication. in 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON) (IEEE, 2022), pp. 1–5 A.L. Imoize, H.I. Obakhena, F.I. Anyasi, M.A. Adelabu, K. Kavitha, N. Faruk, Spectral efficiency bounds of cell-free massive mimo assisted uav cellular communication. in 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON) (IEEE, 2022), pp. 1–5
26.
go back to reference H. Zhang, X. Da, H. Hu, L. Ni, Y. Pan, Spectrum efficiency optimization for uav-based cognitive radio network. Math. Probl. Eng. 2020, 1–11 (2020)MathSciNet H. Zhang, X. Da, H. Hu, L. Ni, Y. Pan, Spectrum efficiency optimization for uav-based cognitive radio network. Math. Probl. Eng. 2020, 1–11 (2020)MathSciNet
27.
go back to reference X. Liu, M. Guan, X. Zhang, H. Ding, Spectrum sensing optimization in an uav-based cognitive radio. IEEE Access 6, 44002–44009 (2018)CrossRef X. Liu, M. Guan, X. Zhang, H. Ding, Spectrum sensing optimization in an uav-based cognitive radio. IEEE Access 6, 44002–44009 (2018)CrossRef
28.
go back to reference J. Wang, X. Zhang, X. He, Y. Sun, Bandwidth allocation and trajectory control in UAV-assisted IOV edge computing using multiagent reinforcement learning. IEEE Trans. Reliab. 8, 24 (2022) J. Wang, X. Zhang, X. He, Y. Sun, Bandwidth allocation and trajectory control in UAV-assisted IOV edge computing using multiagent reinforcement learning. IEEE Trans. Reliab. 8, 24 (2022)
29.
go back to reference C. He, Z. Xie, C. Tian, A qoe-oriented uplink allocation for multi-uav video streaming. Sensors 19(15), 3394 (2019)CrossRef C. He, Z. Xie, C. Tian, A qoe-oriented uplink allocation for multi-uav video streaming. Sensors 19(15), 3394 (2019)CrossRef
30.
go back to reference E. Wu, Joint optimization of resource allocation and UAVS’ trajectories in multi-UAV-aided mec systems. J. Phys. Conf. Ser. 2224, 012122 (2022)CrossRef E. Wu, Joint optimization of resource allocation and UAVS’ trajectories in multi-UAV-aided mec systems. J. Phys. Conf. Ser. 2224, 012122 (2022)CrossRef
31.
go back to reference Y. Wang, Y. He, M. Dong, Resource allocation in vehicular networks with multi-uav served edge computing. in 2021 IEEE 29th International Conference on Network Protocols (ICNP) (IEEE, 2021). pp. 1–6 Y. Wang, Y. He, M. Dong, Resource allocation in vehicular networks with multi-uav served edge computing. in 2021 IEEE 29th International Conference on Network Protocols (ICNP) (IEEE, 2021). pp. 1–6
32.
go back to reference D.G. Luenberger, Y. Ye et al., Linear and Nonlinear Programming (Springer, New York, 1984) D.G. Luenberger, Y. Ye et al., Linear and Nonlinear Programming (Springer, New York, 1984)
33.
go back to reference I. Miller, M. Miller, John E. Freund’s Mathematical Statistics with Applications (Prentice Hall, Essex, 2012) I. Miller, M. Miller, John E. Freund’s Mathematical Statistics with Applications (Prentice Hall, Essex, 2012)
34.
go back to reference M. Agiwal, A. Roy, N. Saxena, Next generation 5g wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 18(3), 1617–1655 (2016)CrossRef M. Agiwal, A. Roy, N. Saxena, Next generation 5g wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutor. 18(3), 1617–1655 (2016)CrossRef
35.
go back to reference L. Kleinrock, Queuing Systems, Volume 1: Theory (Wiley, New York, 1975) L. Kleinrock, Queuing Systems, Volume 1: Theory (Wiley, New York, 1975)
Metadata
Title
Optimizing spectrum efficiency in 6G multi-UAV networks through source correlation exploitation
Author
Mohammad Alnakhli
Publication date
01-12-2024
Publisher
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-023-02332-6

Other articles of this Issue 1/2024

EURASIP Journal on Wireless Communications and Networking 1/2024 Go to the issue

Premium Partner