Next Article in Journal
Multistable Synaptic Plasticity Induces Memory Effects and Cohabitation of Chimera and Bump States in Leaky Integrate-and-Fire Networks
Next Article in Special Issue
Robust Smoothing Cardinalized Probability Hypothesis Density Filter-Based Underwater Multi-Target Direction-of-Arrival Tracking with Uncertain Measurement Noise
Previous Article in Journal
Real-Time Decoder Architecture for LDPC–CPM
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach

1
College of Communications Engineering, Army Engineering University of PLA, No. 2 Biaoying, Ruijin Road, Qinhuai District, Nanjing 210007, China
2
Institute of Microelectronics, Chinese Academy of Sciences, No. 3 Beitucheng West Road, Beijing 100029, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(3), 256; https://doi.org/10.3390/e27030256
Submission received: 25 January 2025 / Revised: 12 February 2025 / Accepted: 24 February 2025 / Published: 28 February 2025
(This article belongs to the Special Issue Space-Air-Ground-Sea Integrated Communication Networks)

Abstract

:
With the rapid development of unmanned aerial vehicle (UAV) manufacturing technology, large-scale UAV swarm ad hoc networks are becoming widely used in military and civilian spheres. UAV swarms equipped with ad hoc networks and satellite networks are being developed for 6G heterogeneous networks, especially in offshore and remote areas. A key operational aspect in large-scale UAV swarm networks is slot allocation for large capacity and a low probability of conflict. Traditional methods typically form coalitions among UAVs that are in close spatial proximity to reduce internal network interference, thereby achieving greater throughput. However, significant internal interference still persists. Given that UAV networks are required to transmit a substantial amount of safety-related control information, any packet loss due to internal interference can easily pose potential risks. In this paper, we propose a distributed time coalition formation game algorithm that ensures the absence of internal interference and collisions while sharing time slot resources, thereby enhancing the network’s throughput performance. Instead of forming a coalition from UAVs within a contiguous block area as used in prior studies, UAV nodes with no interference from each other form a coalition that can be called a time coalition. UAVs belonging to one coalition share their transmitting slots with each other, and thus, every UAV node achieves the whole transmitting slots of coalition members. They can transmit data packets simultaneously with no interference. In addition, a distributed coalition formation game-based TDMA (DCFG-TDMA) protocol based on the distributed time coalition formation algorithm is designed for UAV swarm ad hoc networks. Our simulation results verify that the proposed algorithm can significantly improve the UAV throughput compared with that of the conventional TDMA protocol.

1. Introduction

Sixth-generation (6G) wireless networks are expected to provide large-scale connectivity for millions of interconnected devices, providing different quality-of-service (QoS) requirements, ubiquitous coverage, high embedded artificial intelligence (AI), efficient energy utilization, and adaptive network security [1]. Advances in manufacturing technology have led to a reduction in the cost of individual unmanned aerial vehicles (UAVs) while enhancing their mobility, deployment efficiency, and flexibility [2,3]. UAVs should play an important role in the 6G ecosystem, as flight equipment is expected to occupy dense airspace for transportation, monitoring, network relay, and other tasks [4]. UAVs communicate with other UAVs and satellite stations, forming a space–air network, which can become a part of 6G heterogeneous networks. The deployment of large-scale UAVs integrated with highly reliable networks and advanced intelligent collaboration algorithms has become a prominent research focus in recent years. A UAV swarm composed of large-scale small and low-cost drones is expected to achieve higher and greater performance relative to independent drones through collaboration and information exchange.
In many applications, such as surveillance, reconnaissance, and search and rescue, UAV swarms need to constantly exchange data with each other and with rear command posts during the execution of tasks, to improve task performance, survivability, and scalability. Especially in intensive, dynamic, and time-critical tasks, the need for wide bandwidth, high capacity, high date rates, and low latency is increasing [5]. A distributed network structure is more suitable for large-scale UAV swarm networks. This is because the distributed network has better anti-destruction and self-healing capabilities, and does not stop working due to the destruction of a single node [6]. A heterogeneous network includes a UAV swarm ad hoc network, and the satellite network is a typical application method in offshore and remote areas. However, UAV swarms have many challenges when resource management is implemented in such networks. First, the UAV nodes of the swarm are densely distributed, and interference among the UAV swarm seriously affects the performance of the ad hoc network. Second, the network topology may change rapidly and dynamically due to the high mobility of the drones, resulting in frequent switching and mutual interference of the network connections. Third, in addition to mutual interference within the UAV swarm that may cause a complex electromagnetic environment, the existence of malicious interference also causes complications.
A UAV swarm requires the constant interaction of location and status information for swarm control algorithms such as path planning and collision avoidance. These algorithms require high frequency and accuracy of messages. Collision and packet loss may significantly reduce the coordination algorithm performance of UAV swarms. Thus, addressing the internal interference of UAVs in a dynamic-topology environment has become the core key problem of large-scale UAV swarm ad hoc networks.
UAVs are increasingly being used in communication networks, with typical applications such as IoT data acquisition and 6G flying base stations. In these applications, UAV path planning is an important topic. The communication supported by unmanned aerial vehicles (UAVs) has become a highly attractive technology in the field of wireless sensor networks (WSNs) for efficient data collection [7,8,9]. Collecting data from ground-distributed sensor network is one of the key technologies of WSNs. The typical goals of trajectory optimization are to minimize the task time of unmanned aerial vehicles [10,11], minimize energy consumption during flight [12,13], maximize the amount of data collected [14], and maximize the number of service sensors [15]. UAV-assisted 5G/6G networks can improve network efficiency and flexibility by providing seamless on-demand ultra-high-capacity connections for elastic traffic in these areas. This is crucial because trajectory planning determines the overall travel time, the services provided to the GU, and the energy consumed by the drone [16]. The optimization problem of drone trajectory planning is similar to the well-known Traveling Salesman Problem (TSP) [15,16,17] and Vehicle Routing Problem (VRP) [18].
A simple method that ensures collision-free transmission and guarantees communication latency between UAVs is to use the time division multiple access (TDMA) protocol. The fixed TDMA protocol can avoid conflicts, but the time slot cannot be flexibly scheduled, which is inefficient in large-scale UAV swarm networks. To solve this problem, some TDMA-based protocols for vehicle ad hoc networks have been proposed [19,20,21,22]. These protocols eliminated many collisions by dividing different driving direction nodes into different time slot sets. However, these protocols of slot partitioning in VANETs were not suited for UAV swarm networks, because the movement direction of UAVs was arbitrary. In [23], a collision-free MAC protocol, termed CF-MAC, was introduced. This protocol enabled UAVs equipped with half-duplex radios and omnidirectional antennas to swiftly access networks while employing a region-marking scheme that diminished the collision probability to nearly zero. In [24], a token-based protocol was proposed, which used full-duplex radios and multipacket reception capability to achieve a higher throughput and a lower delay. A concurrent transmission MAC protocol that works by combining millimeter, directional antenna and TDMA for UAV ad hoc networks was proposed to meet the requirements of UAV ad hoc networks in terms of bandwidth, data rate and delay [25]. These protocols compromised on either conflict or flexible scheduling, or needed the addition of full-duplex, directional antennas, millimeter waves, or even shared location information, and were not widely applied due to their complexity.
Game theory is a branch of applied mathematics that is a natural and powerful tool for analyzing the interactions between multiple decision-makers. It is mainly used to study competition or cooperative behavior in economics [26]. The resource management problem for large-scale UAV communication networks, from a game-theoretic perspective, was investigated in [6], and it was exactly aligned with the distributed and autonomous nature of such networks. A network-side self-organized coalition formation approach for intra-tier interference mitigation, primarily through neighborhood cooperation, was proposed in [27]; by forming disjoint coalitions, small-cell access points (SAPs) were able to mitigate the interference within a coalition and thus improved their achievable data rates. A distributed coalition formation algorithm for cooperation in ad hoc networks was proposed in [28], which used the joining and leaving rules for the choice of each node to assure that the newly formed coalitional structure could converge to a stable structure. The coalition formation game proposed in the above study could coordinate internal interference in the network by aggregating adjacent nodes to form an independent coalition, but they reduced only the degree of internal interference and could not avoid interference among nodes. To solve the challenges of resource management and routing protocols, a cross-layer optimization method was presented with a novel mean field game (MFG) in [29], which could select the optimal data transmission path through the management and allocation of frequency resources and power resources. The algorithm of forming coalitions required full channel status information and the results of each iteration, which was difficult to obtain in ad hoc networks. Ref. [27] obtained CSIs and iteration results through a central base station, while [28] did not explain where these were obtained. These methods typically form coalitions among UAVs that are in close spatial proximity to reduce internal network interference, thereby achieving greater throughput. However, significant internal interference still persists.
In our opinion, the UAV swarm network is a specific distributed communication system, and large amounts of distributed coordination signals and control data for drones must be transmitted in the network. The UAV swarm network must be a reliable and stable system for special applications such as rescuing, searching, attacking, etc. Packet loss, especially the collision loss of coordination signals, may cause networks to become unstable, which is especially important for distributed networks because the stability and reliability of distributed networks are inherently difficult. Hence, the premise of designing a stable and reliable UAV swarm ad hoc network is the absence of conflict and collision.
In this paper, a distributed slot allocation algorithm for UAV swarm ad hoc networks based on time coalition formation game is proposed. Instead of forming coalitions from UAVs within a contiguous block area as in prior studies, UAV nodes with no interference from each other form a coalition, which can be called a time coalition. UAVs belonging to one coalition can share their transmitting slots with each other, and thus, every UAV node in the coalition achieves the whole transmitting slots of the coalition members. They can transmit data packets simultaneously with no interference. By dividing the UAV nodes into different time coalitions, interference between UAV nodes can be avoided, and thus, the performance of network throughput and time delay is improved. The main contributions of our paper are summarized as follows:
(1)
We formulate the slot allocation problem of the UAV swarm ad hoc network based on the TDMA protocol as a coalition formation game among UAV nodes with different transmission time slots. Within the framework of the proposed game, UAV nodes with no interference from each other form a coalition, share their time slots, and transmit data packets simultaneously.
(2)
A simple distributed coalition formation algorithm based on the join-and-leave rule is proposed, through which each UAV node autonomously determines the most beneficial coalition to join. Subsequently, the whole network quickly converges to a final stable partition.
(3)
Based on the distributed time coalition formation algorithm, we design a TDMA MAC protocol (called DCFG-TDMA) for the UAV swarm ad hoc network. UAV nodes with a DCFG-TDMA protocol can achieve time slots adaptively with dynamically changing network topology.
The rest of the paper is arranged as follows. Section 2 provides a comprehensive review of the existing literature pertinent to the topic of this paper. In Section 3, we present the system model and problem formulation. In Section 4, we describe the proposed coalition formation game model and the distributed coalition formation algorithm. In Section 5, the TDMA protocol based on distributed formation game for UAV swarm ad hoc networks is proposed. The simulation configurations and numerical results are discussed in Section 6. Finally, our conclusions are drawn in Section 7. For convenience, the abbreviations used in this paper are listed in Table 1.

2. Related Works

Recently, numerous methods have been proposed to address the issue of internal interference among nodes in UAV networks. Broadly speaking, these can be categorized into the following types.

2.1. MAC Based on CSMA Mechanism

Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) stands as one of the foundational medium access control (MAC) protocols for ad hoc networks. Its CSMA-based variants have been widely adopted in unmanned aerial vehicle (UAV) networks due to their adaptability and efficiency. Nonetheless, as the network scales and the number of nodes increases, the likelihood of collisions escalates, posing significant challenges to maintaining optimal performance. In pursuit of maximizing network throughput, ref. [30] introduces an optimized distributed CSMA/CA strategy, enhanced by opportunistic Reconfigurable Intelligent Surface (RIS) assistance, grounded in statistical optimization principles. Addressing the issue of collision probability, ref. [31] proposes a Non-Orthogonal Multiple Access (NOMA)-based CSMA/CA (NCSMA) protocol. This innovative NCSMA protocol leverages Zadoff–Chu (ZC) sequences alongside a NOMA Power Coefficient Allocation (NPCA) frame to meticulously select NOMA nodes and allocate power levels, thereby circumventing packet collisions typically induced by random selection processes. The NCSMA protocol demonstrates a marked improvement in normalized saturation throughput and a significant reduction in average packet delay.
Despite these advancements, the integration of either RIS assistance or NOMA technology into existing UAV systems remains a complex endeavor, necessitating a substantial developmental timeline under current technological and operational constraints.

2.2. MAC Based on TDMA Mechanism

Building upon the foundational design of the ADHOC MAC protocol [19], Omar et al. introduced VeMAC [20], a TDMA-based MAC protocol tailored specifically for Vehicular Ad Hoc Networks (VANETs). Capitalizing on the characteristic stability of vehicles traveling on highways and the consistent network topology in the same direction, VeMAC ingeniously partitions time slots into three distinct segments. Two of these segments are allocated for vehicles moving in opposite directions, while the remaining segment is reserved for roadside units. Each node accesses a different set of slots based on its identity and direction, thereby significantly reducing the potential for collisions. In a similar vein, to address the stringent bandwidth, data rate, and delay requirements of UAV ad hoc networks, a concurrent transmission MAC protocol was proposed in [25], which integrates millimeter-wave technology, directional antennas, and TDMA. A unifying slot assignment protocol (USAP) was proposed to manage the TDMA slot and channel assignments for optimal operation in the face of changing topologies and traffic requirements [32]. Ref. [33] proposed a multi-agent DRL-enhanced USAP method to improve network utility in distributed implementation. Ref. [34] introduced a dual-cluster-head-based medium access control (DCHMAC) scheme for large-scale UAV networks, demonstrating significant throughput improvement. The inter-cluster communication and the one-hop communication uses a CSMA scheme. The nodes whose distances were beyond the one-hop range adopted TDMA.
These protocols have successfully mitigated numerous collisions by segregating nodes based on their driving directions into separate time slot sets. However, the slot-partitioning strategies effective in VANETs are not directly transferable to UAV swarm networks. The inherent arbitrariness of UAV movement directions means that even with the VeMAC method, UAV networks still face collision issues. Furthermore, while the approach outlined in [25] demonstrates superior performance, its practical application in UAV systems is hindered by the complexities associated with millimeter waves and directional antennas.

2.3. Method Based on Game Theory

The resource management challenges in large-scale UAV communication networks were explored from a game-theoretic perspective in [6], aligning perfectly with the distributed and autonomous nature of such networks. In [27], a network-side self-organized coalition formation approach was introduced to mitigate intra-tier interference primarily through neighborhood cooperation. By forming disjoint coalitions, small-cell access points (SAPs) were able to reduce interference within each coalition, thereby enhancing their achievable data rates. Similarly, ref. [28] proposed a distributed coalition formation algorithm for cooperation in ad hoc networks, utilizing joining and leaving rules to ensure that each node’s choice led to a stable coalitional structure.
While the coalition formation games proposed in these studies effectively coordinated internal interference by aggregating adjacent nodes into independent coalitions, they only managed to reduce the degree of internal interference rather than eliminating it entirely. From our perspective, given that UAV networks are tasked with transmitting a significant volume of safety-critical control information, any data loss due to internal interference could result in substantial and potentially catastrophic consequences. Therefore, the ultimate design goal for UAV swarm networks should be the establishment of a completely collision-free and highly reliable network.

2.4. Method Based on Reinforcement Learning

Reinforcement Learning (RL), as an effective method for time-varying dynamic systems, is gradually being applied to resource allocation in wireless networks. Ref. [35] studied the throughput and fairness issues in multi-channel centralized random access systems and proposed a distributed multi-channel access protocol based on multi-agent reinforcement learning (RL) to enhance throughput and fairness among active users. Addressing the high-concurrent-access problem in industrial wireless networks that meet strict real-time and reliable communication requirements, ref. [36] proposed a Deep Reinforcement Learning-based Dynamic Priority Multichannel Access (DRL-DPMCA) algorithm, which ensures the highest channel access probability and lowest queue delay for high-priority industrial equipment while minimizing access conflicts and achieving near 100% channel utilization. To tackle the problem of agents being unable to identify and explore useful information in sparse wireless environments, ref. [37] proposed a Cooperative Multi-Agent Exploration (CMAE) framework that projects the network state space into a low-dimensional space rather than learning strategies in a high-dimensional space, with nodes and BSs collaboratively exploring unexplored wireless network states to jointly learn channel access and signaling strategies, achieving good throughput performance and low collision rates.
However, the application of reinforcement learning algorithms in access control is still in the theoretical stage, and due to their issues pertaining to computational complexity, timeliness, and deployment, it is challenging to apply them to practical systems.

3. System Model and Problem Formulation

3.1. System Model

As shown in Figure 1, a UAV swarm ad hoc network formed of a large number of drones is considered, where S unmanned aerial vehicles (UAVs) are randomly distributed in the task area. Let N = 1 , 2 , , N represent the index set of the UAVs in the flying ad hoc network scenario as a drone formation. In the UAV ad hoc network, there is no center node and no cluster node, and every node has equal status. Each UAV is equipped with one omnidirectional antenna. All nodes work on the same frequency point, and TDMA mechanisms are adapted in the mac protocol of all UAVs for sharing the frequency point. Each node works in the time division duplex (TDD) mode, which transmits or receives packets at one slot only. There is one channel and there are N slots available for the multi-UAV network. The set of available time slots is denoted by T = 1 , 2 , , N .

3.1.1. Channel Model

In the UAV swarm ad hoc network, the main wireless communication links are air-to-air (A2A) links. For A2A communication, the free-space propagation model is often utilized, since A2A links are mainly dominated by line-of-sight (LOS) links [3]. Thus, the channel power gain depends mainly on the distance between UAVs for simplicity. The path loss between UAV-i and UAV-j can be expressed by (1):
L i j = η l o s 4 π f c 2 d i j 2
where η l o s represents the attenuation factors corresponding to the LOS link, while f is the carrier frequency and c denotes the speed of light.
Given the bandwidth B, the maximum transmission rate between UAVs i and j can be calculated by (2):
C i j = B log 2 1 + P t L i j σ 2 B
where B is the bandwidth of the network, P t is the transmit power of each UAV node, and  σ is the Gaussian noise distributed with zero mean. We assume that the gain of omnidirectional antennas is one.

3.1.2. Analysis of Communication and Interference

Suppose that all UAV nodes transmit data packets at a fixed rate R 0 . Then, UAV-j can correctly receive the packets from UAV-i if the maximum transmission rate between UAVs i and j is C i j R 0 :
C i j = B log 2 1 + p t L i j σ 2 B R 0
d i j c 4 π f σ p t B ( 2 R 0 / B 1 ) η l o s
Thus, the UAVs within the range d C of UAV-i can communicate correctly, where d C is given in (5).
d C = c 4 π f σ p t B 2 R 0 / B 1 η l o s
The power of the signal of UAV-i after transmitting a distance d is given in (6).
p r = p t η l o s 4 π f c 2 d 2
Then, a UAV node within the range d of UAV-i receives the interference power p r if it does not communicate with UAV-i. As an approximation, when the power of the interference signal is lower than the noise power, it has no effect on communication. Thus, the interference range d I of UAV-i is (7).
d I = c 4 π f σ p t η l o s B
As shown in Figure 2, UAV-2 is in the communication range of UAV-1, and UAV-3 is in the interference range of UAV-1. UAV-5 is in the communication range of UAV-4, but it is outside the interference range of UAV-1. Thus, UAV-4 and UAV-1 can simultaneously transmit signals to UAV-2 and UAV-5, respectively. UAV-3 and UAV-5 cannot transmit a signal when UAV-1 is transmitting a signal because this may affect the reception of UAV-6. In other words, when the distance between two UAVs is longer than d C + d I , they can transmit signals in the same time slot.

3.1.3. Network Topology

Consider the network topology which is shown in Figure 1. Sixteen UAV nodes form a flying ad hoc network. Here, the distance between two UAVs, i.e., i and j, is denoted by d i j . If the distance d i j is less than the communication threshold, they can communicate with each other. A collision occurs when the distance d i j is less than the collision threshold d C + d I .
Thus, the communication graph is defined as G C = V , E C , where V represents the UAV set, V = v 1 , v 2 , , v N , and  E C is the edge set, i.e.,  E C = v i , v j | v i , v j V . Similarly, the collision graph is defined as G I = V , E I , and  E I is the edge set, i.e., E I = v i , v j | d i j d C + d I , v i , v j V , v i v j .
Figure 1 illustrates the interference of three nodes (UAV-1, UAV-4, and UAV-16) in every communication slot. Slot 1 is the transmitting slot belonging to UAV-1. For higher slot utilization, if UAV-4 and UAV-16 also transmit signals in slot 1, UAV-4 will interfere with UAV-1 where UAV-16 will not, and UAV-16 does not interfere with UAV-4. Similarly, if UAV-1 and UAV-4 transmit signals in slot 4, interference occurs for d 1 , 4 d I .

3.2. Problem Formulation

The UAVs in the network adopt the Time-Division Multiple Access (TDMA) scheme to transmit packets. As shown in Figure 1, UAV-4 and UAV-2 have overlapping coverage areas, and similarly, UAV-15 and UAV-16 also have overlapping coverage areas. When UAV-4 and UAV-2 individually transmit packets at the same slot, UAV-4 causes interference with UAV-2. In contrast, when UAV-16 and UAV-1 transmit packets in the same slot, co-channel interference does not happen. Because UAV-16 is far from UAV-1, the signal of UAV-20 cannot interfere with the UAVs to which UAV-1 transmits.
Assume that we allocate K n slots for UAV-n, where 1 K n N . Consider T n to be the corresponding slots selected by UAV-n, where T n = t 1 , t 2 , , t K n , t i T , 1 i K n .
For an arbitrary individual UAV-n at an arbitrary time slot t, t T n , we denote R n t as the throughput at time slot t of UAV-n, where R n t is given in (8).
R n = 0 , i N , i n , d i n d C + d I , t T i R 0 , e l s e
R 0 is the fixed transmitting rate of each UAV, and  T i is the corresponding slots selected by UAV-i. We note that the time slot length is normalized to 1. For an arbitrary individual UAV-n, the total throughput can be calculated as
T h n = t T n R n t
Then, the throughput of the whole multi-UAV network is
T h = n = 1 N t T n R n t
An arbitrary individual UAV prefers to select more transmission time slots so that it can achieve higher throughput. But the higher number of transmission time slots will bring more collision at the same slot, which may cause a reduction in the throughput. From a multi-UAV network viewpoint, a higher number of selected time slots of each UAV yields more transmission opportunities. Thus, our aim is to maximize the aggregate throughput of the network, as 
P 1 : max n = 1 N t T n R n t
From a time slot viewpoint, we want more UAVs to transmit at the same slot, and we do not want them to interfere with each other. Denote N t as the set of UAVs which select time slot t to transmit. For an arbitrary individual time slot t, the throughput of the whole network is
R t = n N t R n t
Then, the throughput of the whole multi-UAV network can also be written as
T h = t = 1 N n N t R n t
Obviously, the large no-collision UAV set of time slot t induces high network throughput. The problem of maximizing the aggregate throughput of the network transforms to find a group of the largest no-collision UAV set at time slot t.
P 2 : max t = 1 N n N t R n t
s . t . i , j N t , d i j > d C + d I
P1 and P2 are equivalent. Problem 1 finds the maximum value of the sum of the throughput of all nodes, and problem 2 finds the maximum value of the sum of the rates on all time slots from the perspective of time slots.

4. The Coalition Formulation Game Model

As discussed in Section 2, the problem of P1 can be transformed to find a group of the largest no-collision UAV set at time slot t. We denote the no-collision UAV set as a UAV coalition. The UAV which joins the no-collision UAV set can achieve the transmitting time slot of the current time slot t. At each time slot, the UAVs have a strong incentive to cooperate and to form coalitions to improve their throughput.
Assume that in the TDMA multi-UAV network, each UAV-i has a fixed transmitting time slot i, i 1 , 2 , , N . When a UAV coalition is formed, the member in the coalition can transmit packets on the time slot of the whole coalition member, since they have no collision with each other. Considering that all the N UAVs are selfish and rational, we formulate their decision-making process as a coalition formation game, unlike the canonical coalition game.

4.1. Coalition Formation Basic Concepts

Definition 1.
A distributed coalition game G D with non-transferable utility (NTU) is defined by an ordered pair ( S , V ) , where S represents the finite set of players (i.e., UAVs), and  V is a partition function, V : S R S that maps, for every partition S and coalition Q K S , Q K Ø , to a closed convex subset of R | Q K | that contains the payoff vectors that players in a coalition Q K can achieve.
Here, we note that the empty set in S is 0, namely, v Ø = 0 . A coalition denoted by S K is defined as a nonempty subset of players over S = 1 , 2 , , N , where S K S . Each player i S can freely join only one coalition.
In the proposed game G D = ( S , V ) , all the N UAVs can autonomously organize according to the environment and choose their potential members with which to cooperate and to form coalitions. Subsequently, all the members in a coalition share their initial fixed time slot resources, that is, the UAVs in a coalition S K can achieve S K transmitting time slots.
Definition 2.
In the disjoint coalition game G D = ( S , V ) , a coalition structure denoted by π is defined as a set of π = S 1 , S 2 , , S M , where M is the number of coalitions, 1 M N , i = 1 M S i = S . Here, S i , S j π , i j such that S i S j = Ø .
The grand coalition is defined as a coalition containing all UAVs. In the network, 2 N 1 distinct nonempty coalitions and D N different coalitional structures for N players can be formed:
D N = j = 0 N 1 C N 1 j D j , N 1 1 , N = 0
Definition 3.
For a given partition π, we define the utility function of the coalitional structure π as v π = j = 1 M v S j , π , where v S j , π denotes the utility function of the coalition S j π . In such a case, the utility of coalition S j can be defined as v S j , π = i S j u i S j , π , where u i S j , π is the individual payoff of UAV-i in coalition S j π .
u i S j , π = t T S j R i ( t )
R i ( t ) is the throughput at time slot t of UAV-i, which is illustrated in (8), and  T S j is the available time slots of the coalition S j π . Since each UAV-i has a fixed transmitting time slot i, T S j = S j = j 1 , j 2 , , j S j . In this sense, the disjoint coalition can also be seen as the coalition of time slots.
Note that v π can also be described as the system payoff, which is calculated as the sum of the payoff of each coalition in π . This coalition game has a non-transferable utility (NTU), which means that the payoff of each UAV in a coalition S j cannot be arbitrarily allotted.
It is not hard to understand that the utility function satisfies the hyper-additive S i , S j π ; if  S i S j = Ø , then v S i S j v S i + v S j .
As an example, in Figure 1, we assume that the 16 UAVs in the multi-UAV network form a given partition: π = 1 , 2 , 3 , 16 , 4 , 8 , 13 , 5 , 6 , 7 , 9 , 10 , 11 , 12 , 14 , 15 . The payoff of UAV-1 is u 1 1 , π = R 0 , since there is only one player in the coalition and one slot to transmit. Then, the utility of the coalition 1 is v 1 , π = R 0 . In the coalition 3 , 16 , the two elements are so far away that they have no collision with each other. Thus, UAV-3 and UAV-16 can transmit packets in the two time slots 3 , 16 simultaneously, the payoff of UAV-3 or UAV-16 is u 3 3 , 16 , π = u 16 3 , 16 , π = 2 R 0 , and the utility of coalition 3 , 16 is v 3 , 16 , π = u 3 3 , 16 , π + u 16 3 , 16 , π = 4 R 0 . While in coalition 5 , 6 , 7 , the arbitrary element is in the communication range of another element, the time slots 5 , 6 , 7 cannot be shared to transmit packets simultaneously, and the payoff of an arbitrary UAV in the coalition is u i 5 , 6 , 7 , π = R 0 . Therefore, the utility of coalition 5 , 6 , 7 is v 5 , 6 , 7 , π = 3 R 0 . The utility of the remaining coalitions can be calculated in the same manner. Thus, the utility of the coalitional structure π can be calculated as v π = j = 1 8 v S j , π = 25 .
The solution to the time slot coalition game G D = ( S , V ) is to find a stable coalitional structure. Moreover, the newly stable coalitional structure should have the properties of external stability and internal stability.
In the coalition formation game, the action of each UAV is to form a coalition S i , where i is the index of the coalition. Given the current coalition structure, i.e., the state of the game, the UAV faces three options: (i) stay in the current coalition, (ii) join with any of the other coalitions, or (iii) leave the current coalition. Here, we define the join-and-leave rule.
Definition 4
(Join-and-leave rule). In the time slot coalition game G D = ( S , V ) given the coalitional structure π x , two coalitions S j , S k π x , j k and node i S k . If  π x i π y , node i can decide to leave coalition S k and join coalition S j , and  π x can evolve to π y : π y = π x S k , S j S k i S j i . That is, π x i π y is represented as π x i π y u i S j i , π y > u i S k , π x , v S j i , π y > v S j , π y and v π y > v π x . During time slot coalition formation, each UAV-i prefers to join another new coalition and leave its current coalition if its individual payoff, the new coalitional payoff, and the system payoff increase.
Definition 5
(The stable partition). For a given partition π = S 1 , S 2 , , S M , if  i S k , S j π , j k , u i S k , π u i S j i , π , v S k , π v S k i , π and v π v π , where π = π S k , S j S k i S j i , then π is a stable partition. In a stable partition, there does not exist a UAV that wants to leave the current coalition to join another one.

4.2. Distributed Coalition Formation Algorithm

Next, we propose a distributed time slot coalition formation algorithm based on the join-and-leave rule. The algorithm has three phases: discovery of near UAVs, adaptive coalition formation, and joint transmission. Algorithm 1 summarizes the distributed coalition formation algorithm.
Phase 1: Each UAV discovers neighboring UAVs in the range of d C + d I in order to share the time slots in the coalition for no collision transmission. The network discovery and information collection can be based on a fixed control time slot allocated to every UAV.
Phase 2: Following the discovery phase, adaptive coalition formation begins, and UAVs mutually intend to form a time slot coalition. Then, an iteration of sequential join-and-leave runs depending on the utility improvement. The adaptive coalition formation terminates until there is no any UAV obtaining utility improvement between two iterations.
Phase 3: Once a coalition structure is formed, the UAVs in a coalition start transmitting packets at the sharing time slots simultaneously.
Algorithm 1 Procedure of Distributed Time Slot Coalition Formation Algorithm
 1   Phase 1: Discovery of neighbors
 2   Phase 2: Adaptive coalition formation
 3     Initialization:  t = 0 and π t = S 1 t , , S M t
 4     Repeat
 5        (1) For each UAV-i calculates the u i S k t , π t , v S k t , π t
             and v π t , where i ϵ S k t ;
 6        (2) UAV-i randomly chooses a coalition S q t , i S q t to join,
             calculates u i S q t i , π t , v S q t i , π t
             and v π t , where π t denotes the coalition structure
             after UAV-i joining S q t ;
 7        (3) If  π t i π t , then:
             UAV-i decides to join the coalition S q t ;
              π t = π t S k t , S q t S k t i S q t i ;
              π t + 1 can be replaced to π t ;
 8           End if;
 9        (4) t = t + 1 ;
  10     Until Convergence to a stable coalition structure.
  11   Phase 3: The UAVs in a coalition start transmitting packets at the sharing
   time slots simultaneously.

4.3. Performance Analysis

Propriety 1.
The coalition formation process based on the join-and-leave rule converges to a final stable partition in a finite number of steps.
Proof. 
When the join-and-leave rule operates, it may transform the current coalition partition into another partition. Consequently, there exists a sequence of switch operations, i.e.,  π 0 π 1 π 2 . As the number of players, i.e., UAVs, is finite in our proposed game, the coalitions they can form are also finite, and the number of coalition structures is also finite. Therefore, from any π 0 , the sequence always terminates to a stable partition π after finite iterations. Furthermore, the joining and leaving of coalitions can happen only when it leads to utility improvement in the new coalition and coalition structure; no loop appears during the process, meaning that the number of steps is bounded. Since the coalition structure changes only when the utility is increased and there must be a maximum utility for the limited number of coalition structures, the coalition formation process must converge to a final stable partition in a finite number of steps. If π is not stable, there exists a UAV that can perform the join-and-leave operation. According to the Pareto order, an arbitrary UAV switches from the current coalition to another only when its utility increases without hurting the utilities of other coalition members in both the original and new coalition. Then, the arbitrary UAV does switch its coalition to pursue higher utility. Hence, π is not the final stable partition, which contradicts the previous argument. Consequently, the final state must be stable. Therefore, Propriety 1 is proven.  □
Propriety 2.
The complexity order of the proposed Algorithm 1 is  O N D N .
Proof. 
The complexity of Algorithm 1 lies in the complexity of the join-and-leave operations. For a given multi-UAV network, there are D N different coalition structures for N UAVs. In this algorithm, during each time step t, every UAV compares its current individual payoff with the corresponding payoff after it joins to a new coalition. Then, the total number of comparisons required to converge to a final stable partition is O N D N , as the maximum comparison number for every UAV is D N 1 . However, the complexity of the algorithm can be significantly reduced by leveraging the historical information set, preventing nodes from joining or leaving the same coalition more than once.  □

5. Designs of TDMA Protocol-Based Distributed Coalition Formation Games

At a given time, each UAV operates under only one state with a different function. As shown in Figure 3, a finite-state machine (FSM) is employed to precisely describe the principle and the operating process of our proposed scheme. In the distributed coalition formation (DCF) slot allocation scheme, the UAVs go through four different states: (1) network header; (2) quasi-network header; (3) member; (4) quasi-member.
In the first state, NH (network header), the UAV node is the organizer of the DCF game for the whole network, which starts the DCF game and confirms the coalition structure. The second state, quasi-network header, indicates that the UAV node is neither a network header nor a member. When a member node completely loses contact with the network header, it enters the QNH (quasi-network header) state. In the third state, the member state, the UAV node executes the join-and-leave rule and sends a request to the network header. In the last state, the quasi-member state, the UAV node tries to find the signal of the network header.

5.1. Network Configuration Protocol

The state transitions of the FSM depicted in Figure 3 are controlled by the Network Configuration Protocol. The state-transition conditions are described as follows:
(1)
Initiation: When a UAV node initially starts up, it enters the quasi-member state.
(2)
Discovering network header: When the quasi-member and quasi-network header UAV node receive the invite-to-join (ITJ) message from the network header again, they transform to the member state.
(3)
Losing contact with the network header temporally: When the member UAV node cannot receive the schedule assignment broadcast periodically from the network header over the limit time, the state of the UAV node changes from member to quasi-member.
(4)
Losing contact with network header completely: When the quasi-member UAV node cannot receive the schedule assignment ITJ message two consecutive times, the UAV node enters the quasi-network header state. The network header will delete this UAV node from the member list if it cannot receive packets from this UAV node three consecutive times.
(5)
Electing network header: When acting as a quasi-network header over a limited time, this UAV node elects itself as a network header and broadcasts the ITJ advertisement message periodically. The other quasi-network header UAV node joins its network and forwards the ITJ advertisement message when it receives the ITJ advertisement message.
(6)
Meeting another network header: When a network header receives another valid ITJ advertisement message, it enters the quasi-network header state and compares the node identification with another network header. The UAV network header with smaller identification then becomes a new network header.
(7)
Merging by another network: When a network header receives another valid ITJ advertisement message, the UAV network header with smaller identification merges another network. The UAV network header with larger identification joins the new network and changes to the member state.

5.2. Time Frame Structure

In the multi-UAV network, time is partitioned into regular time intervals with equal lengths of T F , which is called the repetition period. As shown in Figure 4, the repetition period consists of two kinds of time slots: (1) control slots and (2) data slots. The repetition interval is divided into 50 N equal-length slots. The length of each time slot that is assigned to each member, which is denoted by t s l o t , can be determined by t s l o t = T F / N .
There are 10 N control slots and 40 N data slots in the repetition interval T F . The control slot, which is denoted by C i , includes the ITJ/RTJ message, neighbor discovery message and distributed coalition formation message. In the data slot D i , the UAV nodes included in the same coalition can transmit data simultaneously. Obviously, in this design, control slots occupy effective data transmission time, which decreases the performance of network throughput. In Figure 4, there are 10 N control slots in one repetition interval, which consists of 50 N slots. The overhead of the control slots is 20%.

5.3. Neighbor Discovery Protocol

The neighbor discovery protocol is designed to obtain the neighbor list within a three-hop range. Every UAV node broadcasts a neighbor discovery message (NDM) to its one-hop neighbors in their pre-allocated control slots. The neighbor discovery message includes its neighbor list within a two-hop range. UAV nodes exchange their two-hop neighbor lists after sending and receiving NDMs. Then, the nodes which are included in the neighbor’s NDM can be increased to the neighbor list within a three-hop range. In the DCF slot allocation scheme, the join-and-leave rule is operated based on the neighbor list within a three-hop range. We make an approximation assumption that the three-hop range is longer than d C + d I , and the neighbors out of the three-hop range can share the same sending slot of the center UAV node.

5.4. Slot Allocation Protocol of DCF Game

In the slot allocation protocol, UAV nodes are divided into one network header and the members. They transmit data at pre-allocated slots after time synchronization. We assume that UAV nodes in the multi-UAV network undergo time synchronization via a GPS system. As shown in Figure 4, the control time slot C i k is pre-allocated to UAV-i, k = 1:10, and the data time slot D i k is pre-allocated to UAV-i, k = 1:40. Before the slot allocation protocol operates, the UAV nodes send control and data packets in their own pre-allocation slots. Each node in the network achieves its three-hop neighbors via the neighbor discovery protocol, which runs periodically at the control slots.
The network header is the organizer of the DCF game for the whole network, which starts the DCF game and confirms the coalition structure. The member UAV node operates the join-and-leave rule and sends a request-of-new-coalition (ROC) message to the network header. The network header collects all ROC messages of the whole member UAV nodes and decides the next coalition structure. All the messages are transmitted to the pre-allocated control slot. The detailed slot allocation process is described as follows:
(1)
The network header broadcasts the DCF message to the whole network in its control slot. The DCF message includes the current coalition structure π t = S 1 t , , S M t with a sequence number, which is confirmed by the network header.
(2)
Every member node forwards the DCF message to other nodes once in the form of a broadcast at the pre-allocated control slot after it receives and stores the coalition structure π t . All UAV nodes transmit data packets in the data slots based on the slot allocation scheme defined by the coalition structure in the next repetition interval.
(3)
An ROC message is generated after operating the join-and-leave rule based on the coalition structure of the DCF message broadcast by the network header. Then, the member node sends the ROC message to the network header in the form of a broadcast.
(4)
Other member nodes forward the ROC message once in the form of a broadcast to ensure that it can be received by the network header.
(5)
After every member node has sent ROC messages, the network header decides the new coalition message structure based on the arrival order of ROC messages. Arriving earlier means the node is closer to the network header and its pre-allocated slot is in the front.
(6)
The network header broadcasts the new DCF message, which includes the new coalition structure, to the whole network.
(7)
Step 1 to step 6 are repeated in the whole network running time. The data packets are transmitted to the data slots allocated by the coalition structure simultaneously without waiting for the Algorithm 2 to converge.
Algorithm 2 Procedure of DCFG-TDMA protocol
1UAV-i goes online;
2Wait for the broadcast signaling ITJ of the network header;
3If receive the ITJ broadcast signal from network header, then:
4    Join the network, enter in the member state, and get the current coalition partition;
5    Operate Algorithm 1, participate in the iterative process of DCFG-TDMA slot allocation;
6    Transmit data on the allocated time slot;
7Else:
8    Continue waiting and enter the associate member status;
9    If receving a ITJ in two repetition intervals, then:
10      Join the network, enter the member state;
11      Repeat 2–6;
12    Else, donot receive a ITJ in 3 repetition intervals, then:
13      Enter quasi-network header state;
14      Broadcast ITJ signal;
15      If receive RTJ from other UAV nodes,then:
16         Enter the network header state, broadcast ITJ signal periodically;
17         Run Algorithm 1, maintain the time slot allocation process of the network;
18      Else if receive a ITJ from other network header, then:
19         Compare the node id of itself and other network header;
20         If my id smaller than another ITJ node, then:
21           I am the network header, continue broadcasting ITJ signal;
22         Else:
23           Join another network, and become a member;
24           Repeat 2–6.

6. Numerical Results

In this paper, we use as an example a square area of 50 × 50 km 2 in the suburban environment, where S UAV nodes are uniformly distributed. The simulation parameters are shown in Table 2. All UAV nodes operate at a carrier frequency of 2.4 GHz with an available bandwidth of 20 MHz. The data rates of UAV nodes for control packets and data packets are R = 20 Mbps. In reference [38], the value of the attenuation factors η l o s is 1. Considering the difference in noise floor between suburban and urban environments, the variance of noise σ 2 is set to 5 × 10 19 W/Hz. The communication range can be calculated, and is 2225.4 m. Based on the above parameters, we simulate the static grid and dynamic topology cases using MATLAB R2018a.

6.1. Static Grid Topology Environment

We consider a static grid topology involving 100 UAV nodes. Figure 5 shows the 100-UAV-node grid topology, where the distance between two neighboring UAVs is 2 km.
Figure 6 shows the coalition structure once it has finally converged. In the end, the network is divided into 14 coalitions. The maximum number of coalition members is 10. Figure 7 gives the member number of each coalition. We find that the number of coalition members decreases with the coalition sequence, because the UAV nodes in the front join the coalition first. The UAV nodes in coalition 1 achieve 10 transmitting slots in a repetition interval.
The utilities of every UAV node are given in Figure 8. The average utility of DCFG-TDMA proposed in this paper is 7.9 slots. The max utility and the min utility of DCF-TDMA are 10 and 3 slots, respectively. Compared to that of the Traditional TDMA and USAP, the average utility is improved significantly. This is because, although the USAP algorithm is capable of reusing time slot resources, the distributed selection process still encounters numerous conflicts, making it impossible to achieve an optimal time slot allocation outcome.
The utilities of four UAV nodes (UAV-1, UAV-41, UAV-81, UAV-91) versus the iteration step are shown in Figure 9. UAV-1 and UAV-91 achieve the maximum utility at step 93, UAV-41 achieves the maximum utility at step 77, and UAV-81 achieve the max utility at step 100.
The convergence speed of the algorithm versus network size is given in Figure 10. The number of iterations is linearly related to the network size for the grid topology, which is a regular topology in which each UAV node achieves stable partitioning within one iteration.

6.2. Dynamic Topology Environment

In the dynamic topology environment, UAVs randomly select a direction and a speed (≤5 m/s) for their flight. The initial positions of all UAVs are different. The positions after flying for 1800 s are shown in Figure 11.
Figure 12 shows the utilities of five UAV nodes versus simulation time. With the proposed DCF-TDMA protocol, UAV nodes can achieve time slots adaptively with a rapid change in topology. For UAV-1, its utility arrives at the first high point, which is 9 at the 80th s. At the 480th s, UAV-1 achieves the minimal time slots, because the topology changes significantly such that the coalition formatted before cannot obtain any benefit. Therefore, the protocol automatically operates the join-and-leave mechanism. UAV-1 quickly achieves many correct transmission slots again in a few seconds. UAV-1 achieves 11 transmission slots between the 760th s and 1120th s. The maximum number of transmission slots for UAV-1 is 17. From the curve of UAV-1, we can see that the topology changes significantly at the 480th, 640th, 1160th, and 1480th s. Compared to those of UAV-1 and UAV-80, the transmission slot number of UAV-40 is much smoother.
The performance of network throughput in the dynamic topology environment is shown in Figure 13. Compared to traditional TDMA and USAP, the throughput of the proposed DCFG-TDMA protocol improves significantly.

7. Conclusions

In this paper, we study the internal interference problem in UAV swarm ad hoc networks, where the performance of UAVs is severely affected by interference. A distributed slot allocation algorithm for UAV swarm ad hoc networks based on the time coalition formation game is proposed. In this method, the UAV nodes with no interference with each other autonomously form a coalition to achieve the greatest benefit. UAV nodes in the same time coalition can share their time slots and transmit data packets simultaneously. In this context, the DCFG-TDMA protocol is designed for UAV swarm ad hoc networks with dynamically changing network topology to adaptively form time coalitions. Our simulation results verified that the proposed DCFG-TDMA can successfully allocate time slots in a UAV swarm ad hoc network and provide significant gains in terms of the average utility per UAV node and network.

Author Contributions

Methodology, D.G.; Software, L.S.; Formal Analysis, L.S.; Investigation, L.S.; Writing—Original Draft, L.S.; Funding Acquisition, L.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Letaief, K.B.; Shi, Y.; Lu, J.; Lu, J. Edge rrtificial intelligence for 6G: Vision, enabling technologies, and applications. IEEE J. Sel. Areas Commun. 2022, 40, 5–36. [Google Scholar] [CrossRef]
  2. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  3. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.-H.; Debbah, M. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. IEEE Commun. Surv. Tutorials 2019, 21, 2334–2360. [Google Scholar] [CrossRef]
  4. Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H. Swarm of UAVs for network management in 6G: A technical review. IEEE Trans. Netw. Serv. Manag. 2023, 20, 741–761. [Google Scholar] [CrossRef]
  5. Qi, F.; Zhu, X.; Mang, G.; Kadoch, M.; Li, W. UAV Network and IoT in the Sky for Future Smart Cities. IEEE Netw. 2019, 33, 96–101. [Google Scholar] [CrossRef]
  6. Chen, J.; Chen, P.; Wu, Q.; Xu, Y.; Qi, N.; Fang, T. A Game-theoretic Perspective on Resource Management for Large-scale UAV Communication Networks. China Commun. 2021, 18, 70–87. [Google Scholar] [CrossRef]
  7. Ding, G.; Wu, Q.; Zhang, L.; Lin, Y.; Tsiftsis, T.A.; Yao, Y.-D. An Amateur Drone Surveillance System Based on the Cognitive Internet of Things. IEEE Commun. Mag. 2018, 56, 29–35. [Google Scholar] [CrossRef]
  8. Zhao, J.; Gao, F.; Wu, Q.; Jin, S.; Wu, Y.; Jia, W. Beam Tracking for UAV Mounted SatCom on-the-Move with Massive Antenna Array. IEEE J. Sel. Areas Commun. 2018, 36, 363–375. [Google Scholar] [CrossRef]
  9. Zeng, Y.; Wu, Q.; Zhang, R. Accessing From the Sky: A Tutorial on UAV Communications for 5G and Beyond. Proc. IEEE 2019, 107, 2327–2375. [Google Scholar] [CrossRef]
  10. Wu, B.; Guo, D.; Zhang, B.; Zhang, X.; Wang, H.; Wang, H.; Jiang, H. Completion Time Minimization for UAV Enabled Data Collection with Communication Link Constrained. IET Commun. 2022, 16, 1025–1040. [Google Scholar] [CrossRef]
  11. Wang, H.; Wang, J.; Ding, G.; Chen, J.; Gao, F.; Han, Z. Completion Time Minimization with Path Planning for Fixed-wing UAV Communications. IEEE Trans. Wirel. Commun. 2019, 18, 3485–3499. [Google Scholar] [CrossRef]
  12. Wu, B.; Zhang, B.; Ma, W.; Xie, C.; Guo, D.; Jiang, H. Motion Planning in UAV-Aided Data Collection with Dynamic Jamming. Electronics 2023, 12, 1841. [Google Scholar] [CrossRef]
  13. Wu, B.; Zhang, B.; Guo, D.; Wang, H.; Jiang, H. Anti-jamming trajectory design for UAV-enabled wireless sensor networks using communication flight corridor. China Commun. 2022, 19, 37–52. [Google Scholar] [CrossRef]
  14. Gao, Y.; Wu, Y.; Cui, Z.; Yang, W.; Hu, G.; Xu, S. Robust Trajectory and Communication Design for Angle-constrained Multi-UAV Communications in the Presence of Jammers. China Commun. 2022, 19, 131–147. [Google Scholar] [CrossRef]
  15. Samir, M.; Sharafeddine, S.; Assi, C.M.; Nguyen, T.M.; Ghrayeb, A. UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices. IEEE Trans. Wirel. Commun. 2020, 19, 34–46. [Google Scholar] [CrossRef]
  16. Fei, B.L.Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar]
  17. Dorling, K.; Heinrichs, J.; Messier, G.G.; Magierowski, S. Vehicle Routing Problems for Drone Delivery. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 70–85. [Google Scholar] [CrossRef]
  18. Zhan, C.; Zeng, Y. Completion Time Minimization for Multi-UAV-Enabled Data Collection. IEEE Trans. Wirel. Commun. 2019, 18, 4859–4872. [Google Scholar] [CrossRef]
  19. Borgonovo, F.; Capone, A.; Cesana, M.; Fratta, L. ADHOC MAC: New MAC Architecture for Ad Hoc Networks Providing Efficient and Reliable Point-to-point and Broadcast Services. Wirel. Netw. 2004, 10, 359–366. [Google Scholar] [CrossRef]
  20. Omar, H.A.; Zhuang, W.; Li, L. VeMAC: A TDMA-based MAC protocol for reliable broadcast in VANETs. IEEE Trans. Mob. Comput. 2013, 12, 1724–1736. [Google Scholar] [CrossRef]
  21. Nguyen, V.; Dang, D.N.M.; Jang, S.; Hong, C.S. E-VeMAC: An Enhanced Vehicular MAC Protocol to Mitigate the Exposed Terminal Problem. In Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium (APNOMS 16), Hsinchu, Taiwan, 17–19 September 2014; pp. 1–4. [Google Scholar]
  22. Zou, R.; Liu, Z.; Zhang, L.; Kamil, M. A near collision free reservation based MAC protocol for VANETs. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 1538–1543. [Google Scholar]
  23. Jiang, A.; Mi, Z.; Dong, C.; Wang, H. CF-MAC: A Collision-free MAC Protocol for UAVs Ad-Hoc Networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  24. Chua, M.Y.-K.; Yu, F.R.; Li, J.; Zhou, Y.; Lamont, L. Medium Access Control for Unmanned Aerial Vehicle (UAV) Ad-Hoc Networks With Full-Duplex Radios and Multipacket Reception Capability. IEEE Trans. Veh. Technol. 2013, 62, 390–394. [Google Scholar] [CrossRef]
  25. Wang, H.; Jiang, B.; Zhao, H.; Zhang, J.; Zhou, L.; Ma, D. Joint Resource Allocation on Slot, Space and Power Towards Concurrent Transmissions in UAV Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2022, 21, 8698–8712. [Google Scholar] [CrossRef]
  26. Xu, Y.; Anpalagan, A.; Wu, Q.; Shen, L.; Gao, Z.; Wang, J. Decision-Theoretic Distributed Channel Selection for Opportunistic Spectrum Access: Strategies, Challenges and Solutions. IEEE Commun. Surv. Tutorials 2013, 15, 1689–1713. [Google Scholar] [CrossRef]
  27. Ahmed, M.; Peng, M.; Abana, M.; Yan, S.; Wang, C. Interference Coordination in Heterogeneous Small-Cell Networks: A Coalition Formation Game Approach. IEEE Syst. J. 2018, 12, 604–615. [Google Scholar] [CrossRef]
  28. Wang, B.; Wang, L.; Fu, G.; Liu, W.; Cui, J. A New Distributed Coalition Formation Algorithm for Cooperation in Ad Hoc Networks. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 446–450. [Google Scholar]
  29. Li, T.; Li, C.; Yang, C.; Shao, J.; Zhang, Y.; Pang, L. A Mean Field Game-theoretic Cross-layer Optimization for Multi-hop Swarm UAV Communications. J. Commun. Netw. 2021, 24, 68–82. [Google Scholar] [CrossRef]
  30. Zhang, Z.; Atapattu, S.; Wang, Y.; Renzo, M.D. Distributed MAC for RIS-Assisted Multiuser Networks: CSMA/CA Protocol Design and Statistical Optimization. IEEE Trans. Mob. Comput. 2025; early access. [Google Scholar]
  31. Peng, G.; Fang, D.; Fu, B.; Zhang, N. NCSMA: A NOMA-Based CSMA/CA Protocol for Ad Hoc Networks. In Proceedings of the 2024 IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 24), Valencia, Spain, 2–5 September 2024; pp. 1–6. [Google Scholar]
  32. Young, C.D. USAP multiple access: Dynamic resource allocation for mobile multihop multichannel wireless networking. In Proceedings of the IEEE Military Communications 1999, Atlantic City, NJ, USA, 31 October–3 November 1999; pp. 271–275. [Google Scholar]
  33. Zhang, S.; Ni, Z.; Kuang, L.; Jiang, C.; Zhao, X. Load-Aware Distributed Resource Allocation for MF-TDMA Ad Hoc Networks: A Multi-Agent DRL Approach. IEEE Trans. Netw. Sci. Eng. 2022, 9, 4426–4443. [Google Scholar] [CrossRef]
  34. Zhao, X.; Wei, Z.; Zou, Y.; Ma, H.; Cui, Y.; Feng, Z. A dual-cluster-head based medium access control for large-scale UAV ad-hoc networks. China Commun. 2024, 21, 123–136. [Google Scholar]
  35. Sohaib, M.; Jeong, J.; Jeon, S.-W. Dynamic Multichannel Access via Multi-agent Reinforcement Learning: Throughput and Fairness Guarantees. IEEE Trans. Wirel. Commun. 2022, 21, 3994–4008. [Google Scholar] [CrossRef]
  36. Liu, X.; Xu, C.; Yu, H.; Zeng, P. Deep Reinforcement Learning-Based Multichannel Access for Industrial Wireless Networks With Dynamic Multiuser Priority. IEEE Trans. Ind. Inform. 2022, 18, 7048–7058. [Google Scholar] [CrossRef]
  37. Naeem, F.; Adam, N.; Kaddoum, G.; Waqar, O. Learning MAC Protocols in HetNets: A Cooperative Multi-Agent Deep Reinforcement Learning Approach. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 21–24 April 2024; pp. 1–6. [Google Scholar]
  38. Li, X.; Yao, H.; Wang, J.; Xu, X.; Jiang, C.; Hanzo, L. A Near-Optimal UAV-Aided Radio Coverage Strategy for Dense Urban Areas. IEEE Trans. Veh. Technol. 2019, 68, 9098–9109. [Google Scholar] [CrossRef]
Figure 1. An illustration of the multi-UAV network, showing the interference of UAV communication slots.
Figure 1. An illustration of the multi-UAV network, showing the interference of UAV communication slots.
Entropy 27 00256 g001
Figure 2. An illustration of communication distance and interference distance.
Figure 2. An illustration of communication distance and interference distance.
Entropy 27 00256 g002
Figure 3. FSM of our proposed scheme.
Figure 3. FSM of our proposed scheme.
Entropy 27 00256 g003
Figure 4. Time frame structure.
Figure 4. Time frame structure.
Entropy 27 00256 g004
Figure 5. Grid topology involving 100 UAV nodes.
Figure 5. Grid topology involving 100 UAV nodes.
Entropy 27 00256 g005
Figure 6. The final coalition structure for the 100-UAV-node grid topology.
Figure 6. The final coalition structure for the 100-UAV-node grid topology.
Entropy 27 00256 g006
Figure 7. The number of members in each coalition.
Figure 7. The number of members in each coalition.
Entropy 27 00256 g007
Figure 8. The utilities of every UAV node.
Figure 8. The utilities of every UAV node.
Entropy 27 00256 g008
Figure 9. The utilities vs. iteration steps.
Figure 9. The utilities vs. iteration steps.
Entropy 27 00256 g009
Figure 10. Convergence speed vs. network size.
Figure 10. Convergence speed vs. network size.
Entropy 27 00256 g010
Figure 11. UAV positions after 1800 s.
Figure 11. UAV positions after 1800 s.
Entropy 27 00256 g011
Figure 12. The utilities of the 5 UAV nodes in a dynamic topology environment.
Figure 12. The utilities of the 5 UAV nodes in a dynamic topology environment.
Entropy 27 00256 g012
Figure 13. Network throughput in a dynamic topology environment.
Figure 13. Network throughput in a dynamic topology environment.
Entropy 27 00256 g013
Table 1. Key variables used in this paper.
Table 1. Key variables used in this paper.
VariablesExplanation
MThe number of coalitions
NThe number of UAVs and slots
N The index set of the UAVs
T The set of the available time slot
BThe bandwidth of a channel
R 0 The fixed data rate
P t The transmit power of each UAV
d C The communication range
d I The interference range
P r The received power of the signal
G C = V , E C The communication graph
G I = V , E I The collision graph
G D A distributed coalition game with non-transferable utility
S The finite set of players (i.e., UAVs)
V A partition function
S A partition of S
u i S j , π The individual payoff of UAV i in coalition S j π
v S j , π The utility function of the coalition S j π
v π The system payoff on π
T n The corresponding slots selected by UAV-n
T h The throughput of the whole multi-UAV network
Table 2. Simulation parameter settings.
Table 2. Simulation parameter settings.
ParameterValue
Carrier frequency f2.4 GHz
Bandwidth B20 MHz
Channel parameter η l o s 1
Variance of noise σ 2 5 × 10 19 W/Hz
UAV transmit power p t 0.5 W
Data rate R20 Mbps
Communication range d C 2225.4 m
Slot100 μs
Repetition interval500 ms
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Song, L.; Guo, D. Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach. Entropy 2025, 27, 256. https://doi.org/10.3390/e27030256

AMA Style

Song L, Guo D. Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach. Entropy. 2025; 27(3):256. https://doi.org/10.3390/e27030256

Chicago/Turabian Style

Song, Liubin, and Daoxing Guo. 2025. "Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach" Entropy 27, no. 3: 256. https://doi.org/10.3390/e27030256

APA Style

Song, L., & Guo, D. (2025). Slot Allocation Protocol for UAV Swarm Ad Hoc Networks: A Distributed Coalition Formation Game Approach. Entropy, 27(3), 256. https://doi.org/10.3390/e27030256

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop