scispace - formally typeset
Search or ask a question
Journal Article

Low Latency Routing Algorithm for Unmanned Aerial Vehicles Ad-Hoc Networks

TL;DR: A new routing protocol for Unmanned Aerial Vehicles (UAVs) that equipped with directional antenna that is based on the well known protocol called Optimized Link State Routing Protocol (OLSR) and developed a heuristic that allows DOLSR protocol to minimize the number of the multipoint relays.
Abstract: In this paper, we proposed a new routing protocol for Unmanned Aerial Vehicles (UAVs) that equipped with directional antenna. We named this protocol Directional Optimized Link State Routing Protocol (DOLSR). This protocol is based on the well known protocol that is called Optimized Link State Routing Protocol (OLSR). We focused in our protocol on the multipoint relay (MPR) concept which is the most important feature of this protocol. We developed a heuristic that allows DOLSR protocol to minimize the number of the multipoint relays. With this new protocol the number of overhead packets will be reduced and the End-to-End delay of the network will also be minimized. We showed through simulation that our protocol outperformed Optimized Link State Routing Protocol, Dynamic Source Routing (DSR) protocol and Ad- Hoc On demand Distance Vector (AODV) routing protocol in reducing the End-to-End delay and enhancing the overall throughput. Our evaluation of the previous protocols was based on the OPNET network simulation tool.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI
31 Oct 2016
TL;DR: Dynamic path planning algorithms have been proposed for micro-jet, a small sized fixed wing UAV for data collection and dissemination in a post disaster situation and give proximate results compare to simulation in terms of flight duration and battery level consumption.
Abstract: Small sized unmanned aerial vehicles (UAV) play major roles in variety of applications for aerial explorations and surveillance, transport, videography/photography and other areas. However, some other real life applications of UAV have also been studied. One of them is as a 'Disaster Response' component. In a post disaster situation, the UAVs can be used for search and rescue, damage assessment, rapid response and other emergency operations. However, in a disaster response situation it is very challenging to predict whether the climatic conditions are suitable to fly the UAV. Also it is necessary for an efficient dynamic path planning technique for effective damage assessment. In this paper, such dynamic path planning algorithms have been proposed for micro-jet, a small sized fixed wing UAV for data collection and dissemination in a post disaster situation. The proposed algorithms have been implemented on paparazziUAV simulator considering different environment simulators (wind speed, wind direction etc.) and calibration parameters of UAV like battery level, flight duration etc. The results have been obtained and compared with baseline algorithm used in paparazziUAV simulator for navigation. It has been observed that, the proposed navigation techniques work well in terms of different calibration parameters (flight duration, battery level) and can be effective not only for shelter point detection but also to reserve battery level, flight time for micro-jet in a post disaster scenario. The proposed techniques take approximately 20% less time and consume approximately 19% less battery power than baseline navigation technique. From analysis of produced results, it has been observed that the proposed work can be helpful for estimating the feasibility of flying UAV in a disaster response situation. Finally, the proposed path planning techniques have been carried out during field test using a micro-jet. It has been observed that, our proposed dynamic path planning algorithms give proximate results compare to simulation in terms of flight duration and battery level consumption.

6 citations


Cites background from "Low Latency Routing Algorithm for U..."

  • ...In [8], Alshabtat, Abdel Ilah, et al have introduced a new routing protocol for UAVs named as Directional optimized link state routing protocol....

    [...]

19 May 2015
TL;DR: A validation model of a secure routing ad hoc protocol for UAANET based on the well known AODV algorithm is proposed and the MDD (Model Driven Development) approach is used and provides a formal specification capabilities to ensure reusability, modularity, and conformance of the A ODV implementation.
Abstract: UAANET (UAV Ad Hoc Network) is a wireless network that is able to organize itself without a pre-existing infrastructure. It consists of forming an ad hoc network with multiple UAVs and the Ground Control Station (GCS). In order to route data packets between nodes, a routing protocol is required. This routing protocol must not only satisfy the UAANET network requirements but also the validation requirements with a formal method to verify the routing protocol conformance. This will eventually contribute to the certification of the UAANET communication network (e.g to be compatible with the specification document DO 178C). In this paper, we propose a validation model of a secure routing ad hoc protocol for UAANET based on the well known AODV algorithm. The MDD (Model Driven Development) approach is used and provides a formal specification capabilities to ensure reusability, modularity, and conformance of the AODV implementation.

5 citations


Cites methods from "Low Latency Routing Algorithm for U..."

  • ...As UAANET proactive routing protocols we can cite DOLSR [1] or Predictive-OLSR [17]....

    [...]

Journal ArticleDOI
TL;DR: The results show that the function of the AODV routing protocol with this metric becomes effective in high mobility environments and the expected transmission account metric with a new algorithm for reliability is presented.
Abstract: As a result of technological advances in robotic systems, electronic sensors, and communication techniques, the production of unmanned aerial vehicle (UAV) systems has become possible. Their easy installation and flexibility led these UAV systems to be used widely in both military and civilian applications. Note that the capability of one UAV is however limited. Nowadays, a multi-UAV system is of special interest due to the ability of its associate UAV members either to coordinate simultaneous coverage of large areas or to cooperate to achieve common goals/targets. This kind of cooperation/coordination requires a reliable communication network with a proper network model to ensure the exchange of both control and data packets among UAVs. Such network models should provide all-time connectivity to avoid dangerous failures or unintended consequences. Thus, the multi-UAV system relies on communication to operate. Flying ad hoc network (FANET) is moreover considered as a sophisticated type of wireless ad hoc network among UAVs which solved the communication problems into other network models. Along with the FANET’s unique features, challenges and open issues are also discussed especially in the routing protocols approach. We will try to present the expected transmission account metric with a new algorithm for reliability. In addition to this new algorithm mechanism, the metric takes into account the relative speed between UAVs, and thus the increase of the fluctuations in links between UAVs has been detected. Accordingly, the results show that the function of the AODV routing protocol with this metric becomes effective in high mobility environments.

4 citations


Cites background from "Low Latency Routing Algorithm for U..."

  • ...Another extension to the (OLSR) protocol is a directional optimization link state routing protocol (DOLSR) [39]....

    [...]

  • ...Moreover, the simulation shows that the performance of DOLSR is better than both OLSR and AODV in terms of end-toend delay....

    [...]

Posted Content
TL;DR: This letter proposes Energy-aware RElay Positioning (EREP), an algorithm for positioning the FCR taking into account its energy consumption, and obtained results show significant gains in the F CR lifetime.
Abstract: The ability to move and hover has made rotary-wing Unmanned Aerial Vehicles (UAVs) excellent platforms to act as Flying Communications Relays (FCR). Yet, state of the art works have been focused on optimizing the FCRs positioning from the network performance point of view only, neglecting the UAVs energy consumption. The problem is the limited amount of time that these UAVs can remain in the air, as they usually depend on batteries that can be drained quickly. In this article we propose Energy-aware RElay Positioning (EREP), an algorithm for positioning the FCR taking into account its energy consumption. Building upon the conclusion that hovering is not the most power-efficient state, EREP defines the trajectory and speed that minimize the FCR UAV energy consumption, without compromising the Quality of Service offered by the flying network. The EREP algorithm is evaluated using simulations. The obtained results show significant gains in the FCR endurance.

4 citations

Dissertation
28 Jun 2017
TL;DR: L’authentification des messages est donc un des objectifs a atteindre pour garantir la securite du systeme Unmanned Aerial System (UAS) final, c’est pourquoi nous proposons dans cette these une architecture de communication fiable and securisee pour les flottes des drones.
Abstract: Grâce aux progres de miniaturisation des systemes embarques, les mini-drones qu’on appelle en anglais Small Unmanned Aerial Vehicle (UAVs) sont apparus et permettent de realiser des applications civiles a moindres couts. Pour ameliorer leurs performances sur des missions complexes (par exemple, pour contourner un obstacle), il est possible de deployer une flotte de drones cooperatifs afin de partager les tâches entre les drones. Ce type d’operation exige un niveau eleve de cooperation entre les drones et la station de controle. La communication entre les drones de la flotte est donc un enjeu important dans la realisation des operations d’une flotte de drones. Parmi les differentes architectures de communication qui existent, le reseau ad hoc s’avere etre une solution efficace et prometteuse pour l’operation d’une flotte de drones. Un reseau ad hoc de drones ou UAV Ad hoc Network (UAANET) est un systeme autonome constitue d’une flotte de mini-drones et d’une ou plusieurs station(s) sol. Ce reseau peut etre considere comme une sous-categorie d’un reseau ad hoc mobile (MANET) avec des caracteristiques specifiques (vitesse importante des noeuds, modele de mobilite specifique, etc.) qui peuvent engendrer des baisses de performance du protocole de routage utilise. Par ailleurs, la nature partagee du support de transmission et l’absence d’une infrastructure fixe pour verifier l’authenticite des noeuds et des messages posent un probleme de securite des communications. Compte tenu du caractere critique des donnees de charge utile echangees (en effet, un attaquant peut capturer un drone et l’utiliser a des fins malveillantes), il est important que les messages echanges soient authentifies et qu’ils n’ont pas ete modifies ou retardes par un attaquant. L’authentification des messages est donc un des objectifs a atteindre pour garantir la securite du systeme Unmanned Aerial System (UAS) final. Diverses solutions de securite ont ete concues pour les reseaux sans fil, puis ont ensuite ete adaptees aux reseaux MANET. Ces solutions peuvent s’etendre a des applications pour les reseaux UAANET, c’est pourquoi nous proposons dans cette these une architecture de communication fiable et securisee pour les flottes des drones. Dans ce travail, nous avons etudie en premier lieu l’application d’un reseau ad hoc mobile pour les flottes de drones. Nous examinons en particulier le comportement des protocoles de routage ad hoc existants dans un environnement UAANET. Ces solutions sont ainsi evaluees pour permettre d’identifier le protocole adequat pour l’echange des donnees. Cela nous amene dans un deuxieme temps, a proposer un protocole de routage intitule Secure UAV Ad hoc routing Protocol (SUAP) qui garantit l’authentification des messages et detecte l’attaque wormhole. Cette attaque peut etre definie comme un scenario dans lequel un attaquant enregistre les paquets en un point, et les rejoue a un autre point distant. L’attaque wormhole est particulierement dangereuse lorsqu’un protocole de routage reactif (qui utilise le nombre de sauts comme metrique d’une route) est utilise. Pour contrer cette attaque, le protocole SUAP permet d’une part d’assurer des services de livraison de donnes (une video de telesurveillance) entre un drone distant et une station sol. D’autre part, le protocole SUAP possede egalement des partitions de securisation qui se basent sur une signature et une fonction de hachage pour assurer l’authentification et l’integrite des messages. En ce qui concerne l’attaque wormhole, une technique qui consiste a correler le nombre de sauts et la distance relative entre deux noeuds voisins est utilisee. Ce mecanisme permet de deduire la presence ou non d’un tunnel wormhole dans le reseau. En outre, cette architecture de communication est concue avec une methodologie de prototypage rapide avec l’utilisation d’une methode orientee modele pour tenir compte du besoin de validation du systeme UAS final. La validation est necessaire pour certifier le fonctionnement de la flotte dans le cas ou elle est utilisee pour l’echange des flux de commande. Cette methode de conception est realisee avec l’outil Mathworks Simulink & Stateflow qui possede un generateur automatique de codes et des outils de verification formelle de conception. Notre solution est ensuite evaluee a l’aide de deux moyens. D’une part, par simulation et emulation avec un outil hybride simulant un sous-ensemble de l’environnement UAANET (utilisation des modeles de mobilite reels et execution sur un environnement Linux). Et d’autre part en environnement reel par une implementation sur des cartes ARM integrees aux drones DT18. Plusieurs tests ont ete realises pour valider les resultats obtenus par simulation et emulation. Les resultats obtenus ont montre que le protocole SUAP assure les proprietes de securite d’authentification et d’integrite et protege contre l’attaque wormhole. Il permet egalement l’echange des donnees temps reel avec une qualite de service acceptable.

4 citations

References
More filters
01 Jul 2003
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

11,490 citations

Book
01 Jan 2008
TL;DR: In this article, the authors present a series of technical papers about ad hoc networks from a variety of laboratories and experts, and explain the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract: Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.

2,022 citations

Book
01 May 2004

1,064 citations

Proceedings ArticleDOI
26 Mar 2000
TL;DR: This paper attempts to design new MAC protocols suitable for ad hoc networks based on directional antennas, such as the IEEE 802.11 standard, which do not benefit when using directional antennas because they have been designed for omnidirectional antennas.
Abstract: Using directional antennas can be beneficial for wireless ad hoc networks consisting of a collection of wireless hosts. To best utilize directional antennas, a suitable medium access control (MAC) protocol must be designed. Current MAC protocols, such as the IEEE 802.11 standard, do not benefit when using directional antennas, because these protocols have been designed for omnidirectional antennas. In this paper, we attempt to design new MAC protocols suitable for ad hoc networks based on directional antennas.

788 citations


"Low Latency Routing Algorithm for U..." refers background in this paper

  • ...Thus we assume that such a network implements a directional medium access control protocol [10], [11], [12], [13], [14] that is capable of adapting any constraints imposed by the UAV....

    [...]

Journal ArticleDOI
TL;DR: The article compares the scalability properties and operational features of the protocols and discusses challenges in future routing protocol designs.
Abstract: The growing interest in mobile ad hoc network techniques has resulted in many routing protocol proposals. Scalability issues in ad hoc networks are attracting increasing attention these days. We survey the routing protocols that address scalability. The routing protocols included in the survey fall into three categories: flat routing protocols; hierarchical routing approaches; GPS augmented geographical routing schemes. The article compares the scalability properties and operational features of the protocols and discusses challenges in future routing protocol designs.

779 citations