《1. Introduction》

1. Introduction

Modern unmanned aerial vehicles (UAVs) are defining a new paradigm for executing complex tasks, such as emergency aid [1], geological exploration [2], and border surveillance [3]. Compared with an individual UAV equipped with advanced facilities, a formation of multiple UAVs or a larger scale UAV swarm, is able to perform challenging tasks with better effect, faster convergence, and lower cost [4,5] when empowered by the flying ad hoc network (FANET) technology, which is based on inter-node networking and cooperation. A FANET does not require fixed terrestrial infrastructure, which makes it particularly attractive for a wide range of applications.

The routing protocol plays a pivotal role in a FANET. In general, the existing routing protocols proposed for mobile ad hoc networks (MANETs) and vehicular ad hoc networks (VANETs) [6] do not perform well in FANETs with high mobility and/or highly dynamic topology, although there are many apparent similarities between these networks [7]. To make FANETs more powerful, substantial research efforts have been devoted to routing protocols. For example, it was shown in Refs. [8,9] that the signaling overhead and route recalculation cost can be reduced by improving the multipoint relay (MPR) selection method of the optimized link state routing (OLSR) protocol [10]. By utilizing a classic packet-delivery technique based on greedy geographic forwarding [11], the packet-delivery ratio (PDR) and the end-to-end latency of the network are improved when using the ad hoc on-demand distance vector (AODV) [12] routing protocol. Despite these improvements, huge overhead is still required to carry out route discovery, which is prohibitive in large-scale networks. Thus, high-performance low-cost routing protocols are essential for FANETs. 

The performance of routing protocols in ad hoc networks varies with mobility models [13], and it is a desirable and significant task to combine mobility traces and protocols together for network design [14]. This is a main feature to consider when studying MANETs. In most mobility models, including indoor mobility models such as random-walk [15], random waypoint, and random direction, as well as outdoor mobility models such as GaussMarkov [16] and the probabilistic version of random-walk, the location and/or velocity of the nodes are assumed to be random variables.

However, for a mission-oriented FANET (MO-FANET) composed of high-value aerial nodes, such as UAVs and helicopters, a random mobility model diverges from reality. In fact, topology control is highly desirable in an MO-FANET, as it brings a variety of benefits. To elaborate further, an airborne trajectory planning (ATP) system can be deployed to control the mobility pattern of each aerial node in the formation through behavior-based, virtual-structure-based, or leader-follower-based methods [17], or by dynamically using an adaptive protocol [18], thereby ensuring that the tasks are completed as planned and avoiding potentially huge financial loss.

ATP is one of the essential function modules of an MO-FANET, since it is beneficial for improving operational efficiency and safety, and for realizing effective inter-node networking and cooperation in a mission. During a flight, the ATP system can adapt heuristic algorithms (e.g., simulated annealing) [19] to generate trajectories that meet the smoothness constraints of velocity and acceleration. This result can then be applied as the mobility model for simulating routing protocols in a more realistic scenario. Furthermore, formation control, which maintains the geometric pattern of the positions of all the UAVs (e.g., using local neighboring information [20]), can provide a stable topology on a timescale that is large enough to perform routing calculations. Thus, by properly exploiting formation control, the design of the routing protocol for an MO-FANET can be simplified.

More importantly, as a cyber–physical system, an MO-FANET is expected not only to deliver information flow in cyberspace, but also to perform certain maneuvering actions in physical space. Therefore, it is not the best strategy to simply use the routing protocols of traditional ad hoc networks in an MO-FANET.

Against the background described above, this paper makes the following novel contributions to the field.

We propose an innovative cyber–physical routing protocol incorporating interdisciplinary ingredients of trajectory dynamics (CPR-TD) as prior information to improve the overall performance of an MO-FANET. To the best of our knowledge, directly exploiting the native trajectory dynamics of multiple UAVs from the application layer as an input—in addition to considerations from the wireless communication perspective—has never before been reported for designing a routing protocol in the open literature. The significance of our effort is that it potentially opens up a new interdisciplinary research direction with the objective of making full use of information from each protocol layer to support the design of a highly efficient routing protocol.

We build up a mathematical model for characterizing a challenging scenario in which multiple UAVs fly collaboratively in different formations from one place to another in order to execute a certain task. This is an important scenario with broad applications in both civilian and defense industries. More specifically, we model the flying process of the MO-FANET as five phases, which are described by multiple coordinate frames and different sophisticated maneuver actions. In addition, the timescale difference of the physical-space trajectory dynamics and the cyberspace wireless medium-access mechanism is taken into account, which ensures that the topology of the MO-FANET is sufficiently predictable and stable for the operation of the routing protocol.

In comparison with other state-of-the-art protocols, the proposed CPR-TD protocol not only achieves the highest PDR performance, but also attains the highest overhead efficiency (OE) in the context of an MO-FANET. Moreover, in most of the considered cases, it exhibits a lower average end-to-end latency than the benchmarking protocols, as well as a reasonably low and stable network jitter. Our CPR-TD protocol can be implemented with the aid of the application-layer ATP system of individual UAVs. Therefore, it is more suitable for an MO-FANET than the traditional routing protocols used in FANETs.

The rest of this paper is organized as follows. In Section 2, we present the modeling of the flying process of an MO-FANET by considering trajectory dynamics that are described by multiple coordinate frames and sophisticated maneuver actions. In Section 3, we describe our CPR-TD protocol in detail. Extensive ns-3-based simulations that assume realistic network configurations, along with a detailed discussion, are presented in Section 4. Finally, we offer our conclusions in Section 5.

《2. Modeling of the flying process of an MO-FANET》

2. Modeling of the flying process of an MO-FANET

《2.1. Description of the application scenario》

2.1. Description of the application scenario

In an emergency or disaster rescue scenario, a terrestrial strategy is often inadequate to control the situation effectively, and a FANET-based strategy becomes indispensable to the execution of the mission. For example, in the recent Australian bushfires, Amazon rainforest fires, and California wildfires with a global impact, firefighting UAVs have played an important role; however, they are typically operated in an individual manner.

We consider a challenging scenario in which multiple UAVs fly collaboratively in different formations from one place to another in order to execute a certain task, as shown in Fig. 1, with four flight formations. In order to guarantee flight security and task execution efficiency, the individual ATP systems collaboratively find the optimal trajectory for each UAV by means of distributed optimization algorithms and maintain the formation of each UAV cluster. To this end, it is necessary for the UAVs to capture the motion information of other UAVs in real time and then perform trajectory calculations. During the flight, the formations may maneuver, such as by flying around, in response to obstacles or hazardous situations. Thus, the dynamic motion state of the MO-FANET can be classified into four states: ① flight formation aggregation; ② flying around; ③ rendezvous, which are followed by ④ a return to flight formation aggregation.

For a flight formation, it is worth noting that, according to the results of ATP, the state of motion can be predicted to some degree within a certain time period, which is dramatically different from the random mobility model often used in the open literature.

《Fig. 1》

Fig. 1. An application example of the flight formation in an MO-FANET.

《2.2. Trajectory generator》

2.2. Trajectory generator

For a clearer description of the flying process of the MO-FANET considered here, we adopt the trajectory generator of the strapdown inertial navigation system (SINS). This generator can reproduce the UAV trajectory as realistically as possible, and has been widely used in analyses and experiments on the strapdown inertial navigation algorithm and the integrated navigation algorithm in the area of flight control [21]. In this paper, we focus on acquiring the trajectory parameters of UAVs; hence, the specific force and inertial tensor will not be considered in our routing protocol design. The flowchart in Fig. 2 summarizes the method of trajectory parameter acquisition. To facilitate understanding, in what follows, we first introduce the definitions of related coordinate frames. We then describe typical maneuver actions and finally present our mobility model.

《Fig. 2》

Fig. 2. The method of trajectory parameter acquisition.

2.2.1. Definitions of coordinate frames

The related coordinate systems involved in this paper are shown in Fig. 3 and are briefly introduced below.

(1) Body-axis coordinate frame (b-frame): The y-axis points forward through the nose of the aircraft and is denoted as yb; the x-axis points to the right of the y-axis (facing the pilot’s direction of view), perpendicular to the y-axis, and is denoted as xb; and the z-axis points up through the bottom of the aircraft, perpendicular to the xy-plane, and satisfies the right-hand rule.

(2) Terrestrial coordinate frame (e-frame): The e-frame uses a triplet (latitude, longitude, and altitude) to denote the location of an object; for example, in Fig. 3, the e-frame defines β as the latitude, as the longitude, h as the altitude, Re as the equatorial radius of the earth, and L as the length from the aircraft to the point of intersection on the surface of the earth.

《Fig. 3》

Fig. 3. The coordinate frames. β: latitude; : longitude; h: altitude; Re: equatorial radius of the earth; L: the length from the aircraft to the point of intersection on the surface of the earth; xb, yb, zb: directions of body-axis coordinate frame; xt, yt, zt: directions of trajectory coordinate frame; xn, yn, zn: directions of navigation coordinate frame.

(3) Navigation coordinate frame (n-frame): The n-frame defines xn, yn, and zn as the three directions of east, north, and up, respectively.

(4) Trajectory coordinate frame (t-frame): The t-frame defines the horizontal right as xt and the direction of motion that is tangent to the trajectory as yt. Again, zt is defined according to the righthand rule.

The attitude angles of the UAVs, which reflect the flight conditions, are shown in Fig. 4, and their definitions are given below. ψ denotes the course angle, which is the angle between the geographic North Pole and the horizontal projection of the longitudinal axis of the aircraft body; θ denotes the pitch angle, which is the angle between the horizontal projection of the longitudinal axis of the aircraft body and this longitudinal axis itself; denotes the roll angle, which is the angle between the vertical axis and the vertical plane.

《Fig. 4》

Fig. 4. The attitude angles of an aircraft.

We assume that ψ, θ, and are linear functions of time t, which is typically realistic.

Through revolution and translational movement, we can convert coordinates between different coordinate frames [22]. To be specific,  where T represents the transpose operator; is the rotation array from the t-frame to the nframe and is given as follows: 

In addition, given the influence of the oblateness of the earth, the change of position in the e-frame can be obtained from the change of motion state in the t-frame by means of the following differential equations:

where ωb is the attitude angular velocity vector in the b-frame, is the velocity vector in the n-frame, is the acceleration vector in the n-frame, RN = Re(1– 2e + 3esin2β) is the radius of curvature in the prime vertical, and RM = Re(1 + esin2β) is the radius of the curvature in the meridian, with the constant e representing the oblateness of the earth. It should be noted that, in Eq. (2), is obtained by changing the acceleration from the t-frame to the nframe—that is, by translation of the coordinate axis using

where is the acceleration vector in the t-frame.

We then obtain the trajectory, velocity, and attitude of the aircraft by solving the above differential equations using the fourthorder Runge–Kutta method [23]. In fact, any other feasible integral Fig. 2. The method of trajectory parameter acquisition. method can also be used to attain the same results.

2.2.2. Description of typical maneuver actions

A change in the motion state of a UAV is caused by the attitude angular velocity in the b-frame and the acceleration in the t-frame. The typical maneuver actions are mathematically characterized as follows.

(1) Uniform rectilinear movement. In this state, neither the attitude angular velocity nor the acceleration is changed; thus, we have

(2) Uniform acceleration or deceleration. In this state, only the acceleration is changed, and the UAV continues to accelerate or decelerate forward with the acceleration Thus, we have

(3) Coordinated turn. The UAV turns by banking according to the practical conditions; hence, this state is divided into three phases: banking, turning, and the transition from turning to level flight. In the first phase, the UAV’s roll angle is changed from zero to with a constant angular velocity of in order to prepare for turning. Thus, we have

In the second phase, the UAV maintains a roll angle equal to and starts turning with a constant angular velocity of ; the centripetal force is provided by the lift generated by banking. Then, we have

where g is the acceleration of gravity.

In the third phase, the UAV levels off after turning and changes the roll angle with a constant angular velocity of . Thus, we have

(4) Climb or descend. This state can also be divided into three phases. In the first phase, the UAV performs a circular motion with radius r on the vertical plane and changes the pitch angle from zero to θ with a constant angular velocity of in order to prepare for climbing or descending. Then, we have

In the second phase, the UAV maintains the pitch angle and carries out a uniform rectilinear movement to climb or descend. Hence, we have

The third phase is the inverse process of the first phase, and the UAV levels off after climbing or descending. Thus, we have

2.2.3. Mobility model

To perform a more realistic study, we consider a scenario in which the UAVs can avoid obstacles during the flight through collaboration. As shown in Fig. 5, we assume that all the UAVs are initially split into four groups, which are represented by four different colors. For simplicity, the UAVs in each group are assumed to be relatively static and maintain a diamond shape by using the airborne formation control system during the whole flight process.

The formation or maneuver actions can be changed in light of the actual conditions. When obstacles are detected, the UAV groups first carry out separation and then recombination to avoid obstacles. For clarity, the trajectories of all the UAV groups are shown in Fig. 6, where each trajectory with a particular color corresponds to the group of the same color in Fig. 5.

《Fig. 5》

Fig. 5. The flight formation.

《Fig. 6》

Fig. 6. The trajectories of the four UAV groups.

《3. The proposed cyber–physical routing protocol exploiting the trajectory dynamics of an MO-FANET》

3. The proposed cyber–physical routing protocol exploiting the trajectory dynamics of an MO-FANET

In this section, we present the details of the proposed CPR-TD of the MO-FANET. Our protocol is the result of interdisciplinary study, where the output of the ATP system is invoked to facilitate the route selection.

《3.1. Packet header》

3.1. Packet header

Inspired by the Control packet in the dynamic source routing (DSR) protocol, the routing information in our protocol is stored in the packet header, which constitutes part of the Data packet and comprises the Control packet. The packet header is designed to inform other aerial nodes of the number of hops on the route, to uniquely index each packet, to identify the packet type, and to indicate the packet-delivery route, as shown in Fig. 7. We assume that the same ATP system is individually deployed on all the nodes of the MO-FANET, while both signaling and action synchronizations can be achieved between the distributed nodes. We also assume that the MO-FANET is in a steady state in each session, and that it can change to a different state in another session based on the periodical state broadcast from each aerial node involved. Then, in each session, the information source nodes individually calculate the route according to the output of the ATP system and the available communication resources, and store the number of hops in the ‘‘Hop” field and the address of the mth node on the route in the ‘‘Address [m]” field. In addition, whenever a packet is generated by a given source node, the packet is assigned an 8-bit sequence number, which, in conjunction with the ‘‘Address [0]” field (i.e., the address of the source node) and the ‘‘Address [n]” field (i.e., the address of the destination node), characterizes the one-to-one correspondence between the packet and the sourcedestination pair, and is stored in the ‘‘Seq” field. Furthermore, the ‘‘Type” field in the packet header stores the packet type, including the Data packet, the route reply (RREP) packet, and the route error (RRER) packet. It should be noted that the RREP and RRER packets are regarded as the Control packets. Finally, we reserve 8 bits for functions that are yet to be defined.

《Fig. 7》

Fig. 7. The packet header format.

《3.2. Route establishment》

3.2. Route establishment

Unlike the existing schemes, our protocol has no route request (RREQ) process for establishing a route from the source to the destination. As a result, the overhead is significantly reduced. In fact, the source node in our protocol exploits the information on the trajectory dynamics from certain applications to establish the route. From a cyberspace perspective, information on the mission and trajectory planning is shared among the UAVs of the MO-FANET. The routing protocol that operates on the network layer can obtain the location information of each node from the ATP system via the application layer, or from the physical layer signal-processing module (e.g., the global positioning system (GPS) module or the in-network distributed collaborative positioning module) in order to support the calculation of routes. From the perspective of physical space, our protocol can provide more reliable data delivery, which is required by the ATP system to control the trajectories of the UAVs. More specifically, we use the notification of the rejoining and separating time between all the aerial nodes to obtain the time list of rejoining and separating, and use the output of the formation configuration to obtain the adjacency matrix. A flowchart is given in Fig. 8 to clarify the route-establishing process in our packetdelivery scheme.

《Fig. 8》

Fig. 8. The flowchart of the route-establishing process in our packet-delivery scheme.

More specifically, when there is a message delivery requirement from the applications, the source node handles the packet as follows: ① According to the time list of rejoining and separating, the source determines whether a route exists that makes the message available to the destination at the current moment. ② If the destination is reachable, the source node calculates the shortest path by utilizing the Dijkstra algorithm based on the adjacency matrix and stores the result in the packet header. Then, the packet-delivery process can start immediately. ③ Otherwise, the source node estimates whether the message is available to the destination before the expiry time. ④ If the destination is reachable before the message expires, the source node calculates the shortest path by using the Dijkstra algorithm with the adjacency matrix as the input, stores the result in the packet header, and waits for the time to transmit. ⑤ Otherwise, the source node drops the packet proactively and does not attempt to transmit.

《3.3. Data transmission》

3.3. Data transmission

The source node generates the route, while the intermediate nodes only perform data forwarding and feedback. More specifically, when any node receives a Data packet, it judges whether the destination is itself or not. If this receiving node is indeed the destination, it feeds back an RREP packet to the source node, which confirms the successful delivery of the Data packet. Otherwise, this receiving node forwards the Data packet to the appropriate nexthop node, which is determined by the route information stored in the packet header. Assuming error-free transmission, we use an example to illustrate the process of sending the Data and RREP packets in Fig. 9, where each circle represents a node. Specifically, the source S sends out a Data packet with the route information stored in the packet header. Upon receiving the Data packet from the source S, the intermediate node M4 that is on the calculated route forwards the Data packet to the next intermediate node M5 on the route. Finally, when the destination D receives the Data packet, it feeds back an RREP packet by node relaying, according to the reverse route information stored in the packet header, to the source S.

《Fig. 9》

Fig. 9. The packet-delivery mechanism under the assumption of error-free transmission. S: source; M1–M5: intermediate nodes; D: destination.

《3.4. Route recovery》

3.4. Route recovery

To guarantee highly reliable delivery of the packets across the network, the source node must support retransmission mechanisms in the following two scenarios: next-hop failure and other-hop failure, as shown in Fig. 10. In Fig. 10(a), due to the failure of transmission from the source to the next-hop node, the source will not receive any feedback during the time period that is set for the current environment in advance. Hence, the source must recalculate a route that bypasses the next-hop node where the transmission failure occurred, and then send the Data packet again. In Fig. 10(b), although the next-hop node immediately adjacent to the source node successfully received the Data packet forwarded by the source, one of the other intermediate nodes (excluding the destination) may experience transmission failure. As a result, the source will never receive the RREP packet from the destination. Instead, the destination sends back the RRER packet to the source, thereby acknowledging that there is a transmission failure taking place on one of the links between the intermediate nodes. Then, the source recalculates a route that bypasses the particular intermediate node that experienced the transmission failure. However, if the transmission failure happens on the last hop to the destination, the destination node is not reachable. In this case, the retransmission mechanism will not be invoked.

《Fig. 10》

Fig. 10. The Data transmission mechanism. (a) Next-hop failure scenario; (b) other-hop failure scenario.

《4. Simulation results and discussions》

4. Simulation results and discussions

In this section, we present extensive performance evaluation results of our proposed CPR-TD protocol in the context of an MO-FANET. Our protocol is implemented on an ns-3 network simulator. For the sake of clarity, Table 1 summarizes the parameters used in our simulations.

《Table 1》

Table 1 Parameter setting.

UDP: user datagram protocol; PHY: physical layer; DSSS: direct sequence spread spectrum; MAC: medium access control; CSMA/CA: carrier sense multiple access/collision avoidance; CBR: constant bit rate.

《4.1. Trajectory configuration》

4.1. Trajectory configuration

In order to evaluate the performance of our protocol in the simulated network model, the dynamic trajectories of the MO-FANET during a given operation period are divided into five phases, as shown in Table 2. Each phase represents a distinct state of motion, as shown in Fig. 5 and explained below.

• In phase 1, all the UAVs fly in close formation and carry out a uniform rectilinear motion with a relatively stable topology.

• In phase 2, in order to avoid emerging obstacles, the single formation transitions to several sub-formations by maneuvering. In other words, the network shifts from cohesion to diversion. More specifically, each UAV group first establishes an obstacle-avoidance maneuvering strategy within their individual airborne control systems; the individual UAVs then start to climb, descend, and turn left/right, respectively. In this process, the UAVs in each group can still maintain communication with each other, but UAVs from different groups may gradually lose contact with each other.

• In phase 3, each group is out of the communication range of other groups, while the formation is well kept among the UAVs in each group. As a result, the packet can only be delivered inside each group.

• In phase 4, the sub-formations begin to rendezvous at the scheduled time and gradually become close to each other. Meanwhile, communications between the sub-formations are gradually reestablished.

• In phase 5, the sub-formations have completed the assembly from the communications perspective; they then adjust their motion to fly in formation again.

《4.2. Performance metrics》

4.2. Performance metrics

For the sake of performance evaluation, we consider two realistic and typical operating scenarios. In the first scenario, all the UAVs are in good condition and fly according to the schedule. In the second scenario, one of the UAVs within each group is assumed to function improperly. We define several performance metrics as follows:

(1) PDR. This is defined as the ratio of the total number of received packets, Nreceived, to the total number of packets sent from the source to the destination, Nsent; that is, we have

which reflects the transmission reliability of the network using a particular routing protocol.

(2) OE. This is defined as the ratio of the size of all the Data packets received (i.e., the payload, Npayload) to the size of all the Control packets sent (i.e., the overhead, Noverhead); that is, we have

where DPsize,i is the size of the ith Data packet; CPsize,j is the size of the jth Control packet; and OE characterizes how efficient the overhead is used in a routing protocol invoked by the network. The reception of more Data packets at the cost of less Control packets indicates that the routing protocol is working at higher efficiency.

(3) Average end-to-end latency. This is defined as the average time for delivering a packet across the network from a source to a destination; that is, we have

where Treceived and Tsent represent the time instant of receiving a packet at the destination and sending a packet from the source, respectively. is a key factor in determining whether the network meets the latency requirements of transmission.

(4) Network jitter. This is defined as the standard deviation of the end-to-end latency TE2E = TreceivedTsent; that is, we have

which characterizes the network stability.

《4.3. Results and discussion》

4.3. Results and discussion

By developing an ns-3-based network simulator with the parameters specified in Tables 1 and 2, the proposed CPR-TD protocol is comprehensively compared with five state-of-the-art routing protocols: the AODV, the destination-sequenced distance vector (DSDV), the DSR, the OLSR, and the greedy perimeter stateless routing (GPSR) protocols.

《Table 2》

Table 2 Trajectory configuration.

AODV is a topology-based on-demand routing protocol. Each node in AODV maintains a routing table by means of the control packets Hello, RREQ, RRER, and RREP [24]. The routing table contains one route entry for each known destination node in the network, and a route from the origin to the destination is discovered only when routes are needed. DSDV is a proactive routing protocol originating from the idea of the Bellman–Ford algorithm. Each node periodically sends its routing table to the neighbor nodes, recomputes the shortest distance, and updates the table [25]. In DSR, the RREP and RREQ packets are also used for route discovery, and the routes are stored in the packet header when transmission begins [26]. For a particular node, by declaring it as an MPR selector of each neighbor node, OLSR reduces the size of control packets [24]. In GPSR, the global route is assigned for each node according to the geographic positions of its neighbors and the transmission endpoints, using a greedy algorithm [27].

Four performance metrics—namely, the PDR, the OE, the average end-to-end latency, and the network jitter—are considered under different values of network size (i.e., the number of nodes is set to 4 × 9 = 36, 4 × 25 = 100, and 4 × 49 = 196, with ‘‘4” representing the number of sub-formations in the system), different phases of motion, and different node-failure conditions. The results of each routing protocol under consideration are obtained through 100 Monte Carlo simulation experiments; in each Monte Carlo experiment, a total of 990 Data packets are sent from randomly selected source nodes to randomly selected destination nodes during the 100 s simulation period. It is notable that the simulator does not work at the time instants of 0 s and 100 s due to the inherent mechanism of ns-3, and the packet-generating interval is 0.1 s. Thus, the first Data packet is set to be sent at the time instant of 1.0 s, and the last Data packet transmission is finished at the time instant of 99.9 s. 

In Fig. 11, we compare the PDR of different routing protocols under different values of network size. Meanwhile, we consider two node-failure conditions. Condition 1 represents a scenario in which all the nodes are working well, whereas in Condition 2, the central node in each group is assumed to misfunction. It can be seen that the proposed CPR-TD protocol achieves the highest PDR in comparison with the other benchmarking protocols, which is true even under the node failure of Condition 2. This is because the proposed CPR-TD conveniently benefits from the motion prediction obtained by exploiting the trajectory dynamics. Thus, it does not need the route search and maintenance process. As a result, there is a lower probability of medium-access conflict being incurred by the route-discovery operation.

《Fig. 11》

Fig. 11. PDR comparison of different routing protocols under different values of network size and different node-failure conditions.

Under both Condition 1 and Condition 2, the DSDV protocol exhibits the worst PDR among all the considered protocols. This is because DSDV is a proactive routing protocol, which requires every node in the network to send Control packets periodically, and thus has the highest probability of medium-access conflict, regardless of whether there is a data transmission request or not. In contrast, all the other protocols are relatively cautious in calling for the nodes in the network to maintain routing tables, thus incurring less overhead. In addition, the PDR performance of the AODV protocol degrades the most as the network size grows, while the DSR, OLSR, and GPSR protocols achieve somewhat similar PDR performance. Finally, we see that the impact of node failure is reduced with an increase in network size for all the protocols. This is a natural result, since the density of node failure becomes smaller when the network size becomes larger.

A PDR comparison of different routing protocols in different phases of the flying process and under different values of network size is shown in Fig. 12. Without loss of generality, we consider a scenario in which all the nodes function well. Different from the observations obtained from Figs. 12(a) and (b), it can be seen in Fig. 12(c) that the proposed CPR-TD achieves the best performance in all the five phases specified in Table 2, when the network size is sufficiently large. Although this advantage is degraded slightly when the network size is small, our CPR-TD protocol still outperforms the other benchmarking protocols in Phase 1, Phase 2, and Phase 5, as shown in Figs. 12(a) and (b), and only the AODV protocol exhibits marginally higher PDR than our CPR-TD in Phase 3 and Phase 4. Moreover, it can be seen that the PDR performance of all the protocols is degraded dramatically in Phase 2, Phase 3, and Phase 4 compared with that of Phase 1 and Phase 5. This is because the connectivity of the network is high in Phase 1 and Phase 5, while in Phase 2 and Phase 3, the nodes are in the process of transitioning from a single formation to several sub-formations by maneuvering, and in the state of well-separated multiple subformations, respectively. Consequently, the network connectivity is weak in Phase 2 and Phase 3. It is notable that AODV performs well in Phase 4, where the nodes are in the process of transitioning from being separated to rejoining a single formation. This is because AODV has a highly effective route-discovery mechanism to find opportunities to send messages. However, its superiority declines as the network size increases.

《Fig. 12》

Fig. 12. PDR comparison of different routing protocols in different phases of the flying process and under different values of network size. (a) number of nodes is 4 × 9; (b) number of nodes is 4 × 25; (c) number of nodes is 4 × 49.

Fig. 13 shows the OE versus network size performance of different routing protocols. Again, two node-failure conditions are considered, as in Fig. 11. It is clear that our CPR-TD protocol has the highest OE under both Condition 1 and Condition 2, which means that it delivers the largest amount of data per byte of overhead. In contrast, all the benchmarking protocols exhibit a significantly lower OE. This is because these protocols commonly invoke a route-discovery mechanism, which assumes that the random motion of the nodes cannot be predicted in an ordinary MANET. However, in the MO-FANET being considered here, the fact is that the UAVs must be under control. Thus, the motion characteristics of the nodes can be acquired by calculating the trajectory dynamics, and can then serve as a particular type of prior information for a tailored routing protocol. In addition, under the node failure in Condition 2, the overhead of our CPR-TD protocol increases moderately, which is consistent with our expectation that some overhead will be paid for route recovery under this condition. It is also notable that, among the benchmarking protocols, DSDV, OLSR, and GPSR have a higher OE than AODV and DSR. This finding points to the relative amount of overhead they incurred in their different route-discovery mechanisms. Finally, it is notable that, in theory, our CPR-TD protocol can also report the nodes’ information to the trajectory planning application in return, thus resulting in a cyber–physical close-loop design.

《Fig. 13》

Fig. 13. OE comparison of different routing protocols under different values of network size and different node-failure conditions.

The OE versus network size performance of the different routing protocols in different phases of the flying process is demonstrated in Fig. 14, under the assumption that all the nodes are functioning well. It can be seen that, in all five phases and all network size values considered, our CPR-TD protocol achieves the highest OE, while AODV exhibits the lowest OE. This observation is consistent with that obtained from Fig. 13. Again, this is because the routediscovery mechanism in AODV causes the largest overhead in each phase, while the opposite is true for our CPR-TD.

《Fig. 14》

Fig. 14. OE comparison of different routing protocols in different phases of the flying process and under different values of network size. (a) number of nodes is 4 × 9; (b) number of nodes is 4 × 25; (c) number of nodes is 4 × 49.

In Fig. 15, we compare the average end-to-end latency of different routing protocols under different values of network size and different node-failure conditions. In Condition 1, it can be seen that, although the latency of DSDV is reduced with an increase in network size, it remains the largest among those of all the routing protocols under consideration. This is because only DSDV requires all the nodes in the network to send Control packets periodically and, with an increase in network size, its PDR remains the worst (Fig. 11). When the network size is large, for DSDV, only the nodes that are close to each other are involved in the packet-delivery process, which results in decreased latency. Therefore, DSDV does not fit time-sensitive application scenarios. For the rest of the routing protocols, the latency generally becomes larger as the network size increases, although the extent of the latency increase is different for specific protocols. More specifically, AODV and DSR exhibit the second- and third-largest latency, respectively; OLSR exhibits the smallest latency when the network size is small, but its latency increases significantly when the network size becomes large; and GPSR and our CPR-TD show relatively stable latency performance with an increase in network size. Our CPR-TD has a reasonably moderate latency performance, because the source still needs to calculate the shortest path, which takes time, and the header of the packet needs to be extracted and processed during the message-forwarding process. Overall, our CPR-TD protocol performs well in large-scale networks. Finally, under Condition 2, it can be seen that the node failure has a marginal impact on the average end-to-end latency performance of the routing protocols, with the exception of DSDV.

《Fig. 15》

Fig. 15. A comparison of average end-to-end latency for different routing protocols under different values of network size and different node-failure conditions.

Assuming Condition 1 and different network sizes, Fig. 16 shows the average end-to-end latency performance of different routing protocols in different phases of the flying process. It can be seen that, under all three values of network size, DSDV exhibits dramatically larger average end-to-end latency than the other protocols in Phase 1. However, from Phase 2 to Phase 5, when the network size is sufficiently large (e.g., 4 × 25 and 4 × 49), AODV shows the largest latency. This is because DSDV proactively maintains routing tables in Phase 1 with high network connectivity, thereby causing more medium-access conflicts and more nodes to be involved in the transmission route, eventually resulting in a huge average end-to-end latency. But when the network connectivity is reduced (e.g., from Phase 2 to Phase 5), the route-discovery mechanism of AODV weighs most in terms of latency. Our CPR-TD protocol has a relatively large latency in Phase 4, since the source must wait for the time of rejoining to send out the Data packets, if they are available, to the destination before they expire. 

《Fig. 16》

Fig. 16. A comparison of average end-to-end latency for different routing protocols in different phases of the flying process and under different values of network size. (a) number of nodes is 4 × 9; (b) number of nodes is 4 × 25; (c) number of nodes is 4 × 49.

Finally, Fig. 17 demonstrates the network jitter performance of different routing protocols under different values of network size and different node-failure conditions. It can be seen that the network jitter of our CPR-TD, although not the lowest, remains competitive. In terms of this metric, the relative pros and cons of different protocols, as well as the corresponding reasons, are similar to those revealed for Fig. 15. Taking Figs. 11, 13, 15, and 17 into consideration, we can conclude that our CPR-TD achieves the most attractive performance tradeoff among the PDR, OE, average endto-end latency, and network jitter.

《Fig. 17》

Fig. 17. Comparison of network jitter.

《5. Conclusions》

5. Conclusions

In this paper, we proposed a CPR-TD protocol for an MO-FANET, which holds potential for diverse applications in both civilian and defense industries. A challenging scenario was considered in which multiple UAVs fly collaboratively in different formations from one place to another in order to execute a certain task. The flying process of the MO-FANET was modeled as five phases, which were described by multiple coordinate frames and sophisticated maneuver actions. Benefiting from the cross-disciplinary integration of wireless networks and trajectory dynamics, our CPR-TD protocol can be implemented with the aid of the individual ATP system and a cross-layer protocol stack. The performance of the proposed CPR-TD protocol was compared with that of five representative routing protocols used in FANETs. Extensive simulations based on ns-3 while assuming realistic network configurations demonstrated that our CPR-TD protocol not only achieved the highest PDR performance, but also attained the highest OE. Moreover, in most of the considered cases, it exhibited a lower average endto-end latency than the benchmarking protocols, as well as a reasonably low and stable network jitter.

In our future work, we intend to conduct the following in-depth research: ① Investigate how to access and use the information from other layers to serve the routing protocol, in order to improve the overall performance of the network; ② investigate how to utilize distributed algorithms to accelerate the computation and realize lower processing latency, in order to support real-time decision-making; and ③ apply the protocol in a real MO-FANET to test its performance and conduct further optimizations.

《Acknowledgments》

Acknowledgments

This work is financially supported by the Beijing Municipal Natural Science Foundation (L202012), the Open Research Project of the State Key Laboratory of Media Convergence and Communication, Communication University of China (SKLMCC2020KF008), and the Fundamental Research Funds for the Central Universities (2020RC05).

The authors would like to thank Professor Ping Zhang (Member of the Chinese Academy of Engineering, Beijing University of Posts and Telecommunications) and Professor Quan Yu (Member of the Chinese Academy of Engineering, Peng Cheng Laboratory) for their insightful comments and suggestions.

《Compliance with ethics guidelines》

Compliance with ethics guidelines

Die Hu, Shaoshi Yang, Min Gong, Zhiyong Feng, and Xuejun Zhu declare that they have no conflict of interest or financial conflicts to disclose.