Next Article in Journal
A Method of Multiple Dynamic Objects Identification and Localization Based on Laser and RFID
Previous Article in Journal
Investigation of Radiation Effects on FD-SOI Hall Sensors by TCAD Simulations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Gateway Selection in Millimeter Wave UAV Wireless Networks Using Multi-Player Multi-Armed Bandit

by
Ehab Mahmoud Mohamed
1,2,*,
Sherief Hashima
3,4,
Abdallah Aldosary
5,
Kohei Hatano
3,6 and
Mahmoud Ahmed Abdelghany
1,7
1
Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Wadi Addwasir 11991, Saudi Arabia
2
Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan 81542, Egypt
3
Computational Learning Theory Team, RIKEN-Advanced Intelligent Project, Fukuoka 819-0395, Japan
4
Engineering and Scientific Equipment’s Department, Egyptian Atomic Energy Authority, Cairo, Inshas 13759, Egypt
5
Department of Computer Science, Prince Sattam bin Abdulaziz University, As Sulayyil 11991, Saudi Arabia
6
Faculty of Arts and Science, Kyushu University, Fukuoka 819-0395, Japan
7
Electrical Engineering Department, Faculty of Engineering, Minia University, Minia 61519, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(14), 3947; https://doi.org/10.3390/s20143947
Submission received: 2 June 2020 / Revised: 6 July 2020 / Accepted: 14 July 2020 / Published: 16 July 2020
(This article belongs to the Section Communications)

Abstract

:
Recently, unmanned aerial vehicle (UAV)-based communications gained a lot of attention due to their numerous applications, especially in rescue services in post-disaster areas where the terrestrial network is wholly malfunctioned. Multiple access/gateway UAVs are distributed to fully cover the post-disaster area as flying base stations to provide communication coverage, collect valuable information, disseminate essential instructions, etc. The access UAVs after gathering/broadcasting the necessary information should select and fly towards one of the surrounding gateways for relaying their information. In this paper, the gateway UAV selection problem is addressed. The main aim is to maximize the long-term average data rates of the UAVs relays while minimizing the flights’ battery cost, where millimeter wave links, i.e., using 30~300 GHz band, employing antenna beamforming, are used for backhauling. A tool of machine learning (ML) is exploited to address the problem as a budget-constrained multi-player multi-armed bandit (MAB) problem. In this setup, access UAVs act as the players, and the arms are the gateway UAVs, while the rewards are the average data rates of the constructed relays constrained by the battery cost of the access UAV flights. In this decentralized setting, where information is neither prior available nor exchanged among UAVs, a selfish and concurrent multi-player MAB strategy is suggested. Towards this end, three battery-aware MAB (BA-MAB) algorithms, namely upper confidence bound (UCB), Thompson sampling (TS), and the exponential weight algorithm for exploration and exploitation (EXP3), are proposed to realize gateways selection efficiently. The proposed BA-MAB-based gateway UAV selection algorithms show superior performance over approaches based on near and random selections in terms of total system rate and energy efficiency.

1. Introduction

The use of unmanned aerial vehicles (UAVs), commonly known as drones, gained a lot of consideration in recent years from both academia and industry [1,2]. UAVs are heavily used for military and commercial applications. Leveraging UAVs for future applications looks promising solutions. This is due to their unique properties like flying ability, usability, survivability, functionality, and maneuverability [1,2]. Parts of these applications are data collections, delivery services, environmental monitoring, rescue operations, disaster management, aerial photography, traffic and control monitoring, and wireless communications [1,2]. In this paper, we will focus on the wireless communication applications of the UAVs, particularly for a post-disaster area coverage scenario. Mainly, UAVs can be cost-effective flying aerial base stations (BSs) that can provide coverage to the users in remote and post-disaster areas [3]. They can also be used as on-demand airborne relays connecting a remote user and a cellular BS separated by significant obstacles [4]. For wireless sensor networks (WSNs), UAVs can be utilized to disseminate/collect control and data information from ground-deployed wireless sensors [5,6]. For mobile ad-hoc networks (MANETs), such as vehicular ad-hoc networks (VANETs), UAVs can assist the management and control of VANETs and extend their scalability and coverage [7]. Cache-enabled UAVs can significantly enhance network cashing functionality empowered by the ability of UAVs to track users’ mobility and predict their content requests [8]. Wireless backhaul can be backed up using cost-effective flying UAVs when the wired backhaul link is damaged or needs maintenance. For future fifth-generation (5G) and beyond 5G (B5G) wireless networks, UAVs can play a significate role in enabling and boosting their performance [9]. UAVs can be parts of 5G/B5G heterogeneous networks through distributing on-demand UAV BSs to cover hotspot areas or highly populated events [9]. Moreover, UAVs can highly densify the 5G/B5G networks through the deployment of multiple UAV base stations.
On the other side, the use of millimeter wave (mmWave), i.e., 30~300 GHz, communications gained a lot of attention due to their large swath of available spectrum, enabling multi-gigabit per second (Gbps) connectivity [10,11,12]. However, mmWave is susceptible to harsh propagation losses due to its high operating frequency in addition to the influence of path blockage [10]. This can be overwhelmed by using directional communication through antenna beamforming, thanks to the high number of packed antenna elements [11]. Accordingly, mmWave coverage is limited to be within a few meters around the mmWave transmitter, which mandates the use of relaying to extend its coverage range [13]. Integrating millimeter wave (mmWave) band, 30~300 GHz, communications with UAV BSs can sustain 5G/B5G requirements due to the large available bandwidth [14,15]. Moreover, UAVs can address many of mmWave challenges, such as the construction of autonomous mmWave relays [16].
In this paper, a post-disaster area where the terrestrial network is completely malfunctioned or destroyed was considered to help the surviving people inside it. In this catastrophic situation, several UAVs were distributed to cover this post-disaster area for rescue services adequately. MmWave was employed for the communication links among the UAVs to provide ultra-high-speed Gbps backhaul connections to support critical rescue services such as taking high-resolution videos/photos to the catastrophic area. This was to help in conducting principal analysis and precisely finding out the locations of the victims. The low data rates’ frequency bands may not support these crucial functionalities. Due to the short transmission range of the mmWave signal, some of the UAVs were to operate as access UAVs, providing data connections to the victims/rescue workers, collecting essential information about the post-disaster area such as photographs, and disseminating critical instructions to the victims/rescue workers. Whereas, the other UAVs were to act as gateways relaying information to/from the access UAVs from/to the nearest survival cellular networks, respectively.
In this paper, access UAVs were to select and then fly towards the gateway UAVs, maximizing their achievable data rates while considering the battery cost of their flights. Although the access UAVs could directly fly towards the standing cellular networks, the use of gateway UAVs relaxed the budget of access UAV flights; mmWave in particular was characterized by small coverage. This highly contributes to saving access UAVs’ energy for more rescue operations. The challenge of this gateway UAV selection problem, which is firstly introduced in this paper to the best of our knowledge, comes from its adversarial setting. This is because an access UAV has no prior experience with the data rate gained from connecting with a specific gateway UAV unless it flies and connects with it.
Additionally, this available data rate is influenced by the other access UAV selections due to mutual interference and the time-sharing schedule. In these fully decentralized settings, no prior information is either available or exchanged among UAVs. Despite its realism, this problem is unique and utterly different from the existing UAV gateway/relay selection problems [17,18,19,20,21,22], where UAVs can easily exchange information among them through the fully connected UAV network. Data rates among UAVs can also be anticipated beforehand via prior channel measurements and estimations. Yet, the considered UAV gateway selection problem aims to not only maximize the achievable data rates of the access UAVs, but to also minimize the battery cost of their flights towards the selected gateways.
In this paper, a tool of machine learning (ML), specifically online learning, was used to address this optimization problem efficiently [23,24,25]. The motivation behind using online learning comes from its ability to deal with both complex and dynamic environments effectively [26], without any prior information, where an agent learns to enhance its future actions based only on its past actions/observations. Towards this end, the gateway UAV selection problem is formulated as a budget-constrained multi-player multi-armed bandit (MAB) problem [27,28,29]. MAB is a particular type of online learning, where an agent wants to maximize its long-term rewards (minimize regrets) via utilizing its previous best arm selection or investigating new choices, known as the exploitation–exploration tradeoff [27,28,29]. Since MAB techniques work online without any prior knowledge about the environment other than the player’s observations while playing, they are considered as the most appropriate solutions for this deemed problem. From the MAB perspective, an access UAV will act as the player aiming to maximize its long-term average data rate, i.e., reward, constrained by its limited budget of battery capacity. On the other side, the gateway UAVs will act as the arms of the bandit. Due to the fully decentralized setting, access UAVs will interact selfishly and concurrently with the environment and select their appropriate gateway UAVs then fly towards them for establishing the mmWave communication links. Only based on their previous successive observed rewards, access UAVs try to compromise the exploitation–exploration tradeoff, i.e., either exploiting their best-selected gateway UAVs so-far or exploring new ones. In this paper, three MAB algorithms, namely upper confidence bound (UCB) [29], Thompson sampling (TS) [30], and the exponential weight algorithm for exploration and exploitation (EXP3) [31], are modified to address such gateway UAV selection problem. Despite the adversarial setting of the problem and the selfish behavior of the access UAVs, the modified MAB algorithms learn to play actions that enhance the overall system performance, as demonstrated in [24,30] and further discussed in this paper. To the best of our knowledge, it is the first time that gateway UAV selection in a fully decentralized mmWave UAV network is formulated as a budget-constrained multi-player MAB problem and efficiently addressed using modified BA-MAB algorithms. The main contributions of this paper can be summarized as follows:
  • The problem of gateway UAV selection in post-disaster area coverage is formulated as an optimization problem aiming to maximize the achievable data rates of the access-gateway-cellular relays subject to the limited remaining battery capacity of the access UAVs. This is done in a fully decentralized setting, where no information is either pre-available or exchanged among UAVs;
  • A budget-constrained multi-player MAB model is formulated and introduced. In this model, the access UAVs act as the agents, the gateway UAVs act as the arms of the bandit, and the rewards are the long-term achievable data rates constrained by the limited budget of the battery capacity of the access UAVs;
  • Three BA-MAB algorithms, i.e., BA-UCB, BA-TS, and BA-EXP3, are proposed to be exploited by each access UAV to selfishly interact with the environment and select the proper gateway UAVs in this adversarial setting. All access UAVs will select their associated gateway UAVs concurrently, and the MAB algorithms implemented in the access UAVs will learn from their previous observations to proactively enhance the overall performance;
  • Extensive numerical analysis is conducted to measure the performance of the proposed MAB-based algorithms under different scenarios and compare their performances with two benchmark approaches based on near and random gateway UAV selections.
The rest of this paper is organized as follows; Section 2 summarizes the related work. Section 3 discusses the UAV system model, including the use of the mmWave link model and previews the gateway UAV optimization problem. In Section 4, the proposed BA-MAB algorithms will be explained, followed by numerical analysis in Section 5. Finally, Section 6 delivers the concluding remarks.

2. Literature Review

An efficient gateway-selection algorithm and management technique is required for flying multi-UAV systems for connection with the global network. In [17], the authors surveyed multi-UAV-based heterogeneous flying ad-hoc networks’ (FANET) structure and protocol architecture. Then, a mixture of distributed gateway-selection algorithms and cloud-based stability-control mechanisms were discussed, supplemented by a range of open challenges. The authors in [18] defined the stability of UAV networks, constructed a network partition model, and designed a distributed gateway selection algorithm with dynamic network partition while considering the practical features of UAV networks. Moreover, the number of gateways is managed according to the system requirements. In [19], an energy-efficient method for gateway selection of UAVs involved in relaying information to the heterogeneous cloud was proposed. The authors also make use of the queuing theory and Lyapunov optimization to solve the power-delay tradeoff. In [20], a UAV-enabled two-way relaying communication between two robot swarms in the absence of communication infrastructures in remote areas or post-disaster rescues was handled. UAV is employed as the relay to expand the communication range between two disconnected ground robot swarms due to its several advantages. In addition, the UAV’s trajectory and power allocation were jointly optimized to maximize the sum-rate of the up and downlinks, where the joint optimization problem is decoupled into two sub-problems to address the non-convexity. In [21], a new UAV node placement technique for multi-UAV relay communication was solved based on the non-linear constraint optimization problem. The authors in [22] introduced downlink non-orthogonal multiple access (NOMA) to a UAV-enabled mobile relaying system.
All of the above existing research works of UAVs gateway/relay selections considered that UAVs have full knowledge at the time of selection, and the network is fully connected, which is not the case of this paper. Wherein, no prior information is available for the access UAVs at the time of gateways selection, and the network is fully disconnected. Moreover, the present works did not consider the cost of access UAV flights towards their selected gateway UAVs, which will be addressed efficiently throughout this paper.
ML is a promising technology for efficient solutions to the severe UAV problems caused by their utilization of wireless communication. A full survey of all related research where ML methods have been applied on UAV-based communications to improve practical aspects like channel modeling, resource management, security, and positioning is provided in [32]. Moreover, a review of deep reinforcement learning (DRL) algorithms that address emergency applications in wireless communications such as mmWave, intelligent caching, and UAV scenarios are summarized in [25]. In [33], a distributed sense-and-send protocol was proposed to manage the UAVs for sensing and transmission. Moreover, the authors applied RL to solve main problems like trajectory control and resource management. A DRL-based channel and power allocation framework was suggested in [34] for the UAV-enabled IoT system. In this scheme, the UAV-BS can intelligently allocate uplink channels and the transmit power of IoT nodes for maximizing the energy performance of all IoT nodes. Another UAV control policy based on DRL called the deep deterministic policy gradient (UC-DDPG) was proposed in [35]. UC-DDPG addressed the combined problem of 3D mobility of multiple UAVs and energy recharging arrangements to ensure efficient energy and fair broad region coverage of each user with keeping on the service. The authors in [36] proposed two efficient path planning algorithms based on extended MAB to make a rotary-wing UAV act as a wireless BS in a post-disaster area with unknown user distribution. Their proposed algorithms outperform the helical path, which scans the whole post-disaster area by increasing radius circles.
Despite the existing applications of ML in UAV wireless networks, all related works did not consider the problem of gateway UAV selection in a fully decentralized mmWave UAV network using budget-constrained multi-player MAB techniques.

3. System Model

In this section, we will discuss the network architecture of the mmWave UAV wireless networks in addition to the utilized mmWave link model.

3.1. UAV Network Architecture

Figure 1 shows the considered mmWave UAV network architecture. In this model, there is a post-disaster area, e.g., flood or earthquake areas, in which the cellular macro-BS cellular system is malfunctioned or wholly destroyed. For rescue services, this area will be covered using a group of UAVs. Some of these UAVs will provide the access functionalities inside the catastrophic area, and others will work as gateways for relaying the collected information to the nearest functional cellular macro-BS. To avoid frequent network reconfiguration, the gateway UAVs should have the maximum energy among the other UAVs, while considering their flights to the closest points to the survival cellular macro-BS. Moreover, the network should have alternative gateway UAVs for network presence purposes. The efficient design of UAV network topology via deciding which UAVs should act as access and which should act as gateways considering UAV energy and mobility constraints is beyond the scope of this paper.
The access UAVs provide data connectivity to the victims for essential messaging, and collect valuable information about the post-disaster area using photography. They also collect crucial details about the victims, such as names, ages, genders, photos, locations, etc. Moreover, they disseminate essential instructions to the victims as well as the rescue workers inside the area. High-speed mmWave links are used to connect the access UAVs with the gateway UAVs, and the gateway UAVs with the cellular macro-BSs. The gateway UAVs are directly connected with their associated survival cellular macro-BS without relaying. In this paper, we focus on the backhaul relay links between access UAVs, gateway UAVs, and cellular macro-BSs. After collecting/disseminating the essential information, each access UAV should select and then fly towards one of the gateway UAVs to relay its data to/from the cellular macro-BS through it. It is assumed that the UAV network is not fully connected, i.e., no information can be exchanged among the UAVs unless they fly and connect together. In this paper, we do not consider the fully connected UAV network in order to highly decrease the number of deployed UAVs and relax the need to design an efficient multi-hop routing protocol overcoming the dynamics in the flying UAV network. Moreover, highly complicated route management and maintenance algorithms are needed in the case of a fully connected UAV network to adapt the network configuration when one of the relaying UAVs is out of service, malfunctioning, or needs to be recharged. The design of this fully connected UAV network using a cooperative MAB game, including the required routing protocol in addition to the route management and maintenance algorithms, will be left for our future investigations.
During the flight lifetime of the access UAVs, i.e., during one charging period of their battery, they should collect/deliver as much data as possible. This means that access UAVs should select gateways, maximizing their achievable data rates within the limited battery capacity of their flights. The gateway UAVs are assumed to be only hovering nearby their associated cellular macro-BSs without frequently flying back and forth from them. Thus, the gateway-cellular macro-BS re-association problem due to gateway mobility is relaxed in this paper.

3.2. MmWave Link Model

In air-to-air communications, the links are almost line-of-sight (LoS). Thus, we will follow the air-to-air mmWave channel model presented in [37] for UAV-to-UAV communication, where the received power at UAV j from UAV i is expressed as:
P r x , i j ( t ) = P t x , i G t x , i j ( θ t x , i j , θ 3 dB ) G r x , j i ( θ r x , j i , θ 3 dB ) ( λ 4 π ) 2 ( d i j ) α
where P t x , i is the transmit power of UAV i, λ = c f is the wavelength, d i j is the separation distance between UAV i and UAV j, and α is the path loss exponent. G t x , i j ( θ t x , i j , θ 3 dB ) and G r x , j i ( θ r x , j i , θ 3 dB ) refer to the transmitter (TX) and receiver (RX) mmWave beam-forming gains, respectively. θ t x , i j is the beam offset angle of the TX beam direction to the location of the RX, while θ r x , j i defines the beam offset angle of the RX beam direction to the location of the TX. θ 3 dB is the −3dB beam-width. Additionally, in [37], a flat-top antenna model is utilized, in which G ( θ , θ 3 dB ) can be expressed as:
G ( θ , θ 3 dB ) = { 2 π ( 2 π θ 3 dB ) ε θ 3 dB ,       if   | θ | θ 3 dB 2 ε                                           Otherwise
where ε is the sidelobe gain, 0 ε 1 . However, any other mmWave beam-forming strategy can be applied in the proposed scheme. Figure 2 shows the schematic diagram of the considered flat-top mmWave antenna model for both mmWave TX and RX. The angles of the TX/RX communication beams, i.e., θ t x , i j and θ r x , j i , are tuned by means of beam-forming training using steerable antenna arrays in both TX and RX UAVs.

3.3. Problem Formulation

In this section, we formulate the optimization problem of the decentralized gateway UAV selection. Suppose that there are N access UAVs and M gateway UAVs distributed in the post-disaster area, where 1 i N , and 1 j M . Each access UAV i should select one of the gateway UAVs, i.e., gateway UAV j, then fly towards it for relaying its collected information. This is done at every time t , 1 t T , where T indicates the total lifetime before the battery of the access UAV needs recharging. In this paper, the selected gateway UAVs should maximize the long-term average data rates of the access-gateway-cellular relays while satisfying the battery capacity constraint of the access UAVs during their flight periods. This maximization problem can be formulated as follows:
max I ( 1 ) , , I ( T ) 1 T t i , j I i j ( t ) Ψ i j ( t )
s.t.
(1)
j I i j ( t ) = 1 ,   1 j M ,
(2)
T B h t h + t = 1 T B f d f , i j ( t )   v f + P t x L D Ψ i j ( t ) Ξ C ,   1 i N
where Ψ i j ( t ) is the data rate of the relay link between access UAV i, gateway UAV j, and the cellular macro-BS j at time t . Let U = { I { 0 , 1 } N × M   | j I i j = 1 for   i = 1 , , N } . For each time t = 1 , , T , I ( t ) U is a matrix where I i j ( t ) refers to a linkage indicator function that is equal to 1 if the access UAV i is linked with gateway UAV j and 0, otherwise, where each access UAV i should select only one gateway UAV j at a time t as given in the first constraint of (3). The goal of the optimization problem in (3) is to maximize the long-term average total system rate by optimizing the selection of the linkage matrix I ( t ) . In the second constraint of (3), the simple UAV energy model introduced by the authors in [36] is utilized. However, more sophisticated UAV energy models like that presented in [38] can be adopted in (3) without affecting the generalization of (3). In the second constraint in (3), B h and   B f are the hovering and flying engine powers in Watts, respectively. t h describes the hovering time needed for an access UAV to gather essential information from its dedicated coverage section. d f , i j ( t ) is the minimum distance that should be flown by access UAV i to establish the mmWave communication link with the gateway UAV j chosen by access UAV i at time t , and v f reflects the flying speed of access UAV in m/sec. The term P t x L D Ψ i j ( t ) indicates the energy consumed due to data communication in Joule, where L D indicates the size of transmitted information data in bits, and Ξ C is the access UAV total battery capacity in Joule. Herein, we assume that all access UAVs have the same specifications of B h , B f , Ξ C , t h , and v f . In (3), we give high priority to the access UAVs’ battery consumptions when trying to select the gateway UAVs, maximizing the achievable data rate. This is because UAV battery consumption is one of the main concerns when designing an efficient UAV network due to its limited capacity, considering the high energy consumed during access UAV flights. However, we did not consider the constraint of the gateway UAV battery capacity due to two main reasons: (1) Typically, gateway UAVs have the highest remaining battery capacity among the UAVs; (2) in the network setting, gateway UAVs will not frequently fly like access UAVs. Instead, they hover beside their associated cellular macro-BS most of the time to provide relaying functionalities. It is stated in [36,38] that the power consumed in UAV hovering is much lower than that consumed during UAV flying.
Without loss of generality, we assume a half-duplex decode and forward (DF) relay strategy where time resources are equally divided between the access to gateway link and the gateway to cellular macro-BS linkage. Moreover, the uplink scenario is considered with round-robin time-sharing scheduling among access UAVs attached to the same gateway UAV. Thus, Ψ i j ( t ) in (3) can be expressed as:
Ψ i j ( t ) = 1 2 μ j ( t ) min ( r i j ( t ) , r j BS j ( t ) ) ,
where μ j ( t ) indicates the number of time-scheduled access UAVs connected with the same gateway UAV j at time t . r i j ( t ) is the achievable data rate of the mmWave link between access UAV i and gateway UAV j, and r j BS j ( t ) reflects the achievable data rate between gateway UAV j and its corresponding cellular macro-BS j. In this paper, we will focus on the value of r i j ( t ) as it mainly results from the interference inside the UAV wireless network coming from other access-gateway selections. r i j ( t ) can be expressed as:
r i j ( t ) = B W log 2 ( 1 + γ i j ( t ) ) ,
where B W is the allocated bandwidth, and γ i j ( t ) refers to the signal-to-interference plus noise–power ratio (SINR) of the linkage between access UAV i and gateway UAV j at time t . Based on (1) and considering the uplink scenario, γ i j ( t ) can be represented as:
γ i j ( t ) = P t x , i G t x , i j ( θ t x , i j , θ 3 dB ) G r x , j i ( θ r x , j i , θ 3 dB ) ( λ 4 π ) 2 ( d i j ) α k = 1 , k i ν ( t ) P t x , k G t x , k j ( θ t x , k j , θ 3 dB ) G r x , j k ( θ r x , j k , θ 3 dB ) ( λ 4 π ) 2 ( d k j ) α + N 0 ,
where N 0 is the noise power, and ν ( t ) is the number of access UAVs attached to the other gateway UAVs and scheduled within the same time slot assigned by gateway UAV j to access UAV i.
r j BS j ( t ) in (4) can be evaluated using (5), except that the SINR from gateway UAV j to its corresponding macro-BS j should be applied, i.e., γ j BS j ( t ) , which can be expressed as:
γ j BS j ( t ) = P t x , i G t x , j BS j ( θ t x , j BS j , θ 3 dB ) G r x , BS j j ( θ r x , BS j j , θ 3 dB ) ( λ 4 π ) 2 ( d j BS j ) α h = 1 , h j M ( t ) P t x , h G t x , h BS j ( θ t x , h BS j , θ 3 dB ) G r x , BS j h ( θ r x , BS j h , θ 3 dB ) ( λ 4 π ) 2 ( d h BS j ) α + N 0 ,
where M ( t ) is the number of gateway UAVs transmitting simultaneously at time t.
Although the problem in (3) can be considered as a binary linear programming (BLP) problem, the conventional solutions of combinatorial optimization, such as the highly complicated exhaustive search approach, the graph-based approach, the branch-and-bound approach, etc., are not feasible solutions to (3). This is because the objective values Ψ i j ( t ) , corresponding to a candidate linkage matrix I ( t ) , are not known beforehand unless access UAVs fly and connect with their corresponding gateway UAVs in I ( t ) . Thus, in the exhaustive search solution, for example, all M N I ( t ) access UAV flights and their corresponding linkage matrices Ψ i j ( t ) should be obtained before selecting the optimal I ( t ) configuration. This is infeasible considering the battery capacity constraint of the access UAVs along with the time-sensitive rescue service. This highly complex and dynamic problem motivates us to use online learning by means of the multi-player MAB approach to address it. In this approach, access UAVs time-by-time proactively learn from their previous gateway selections/data rate observations how to enhance their future gateway selections, maximizing their achievable data rates within their limited budget of battery capacity. This is done without any prior knowledge about Ψ i j ( t ) .

4. Proposed Battery-Aware MAB Algorithms

In this section, we will describe the general concept of MAB as an efficient online learning tool. Then, we will propose three battery-aware budget-constrained multi-player MAB-based algorithms, namely BA-UCB, BA-TS, and BA-EXP3, to address the gateway selection problem mentioned above.

4.1. General Single Player MAB Strategy

The MAB problem is a purely online ML, in which the player strives to gain the maximum reward from multiple arms of slot machines [27,39]. Precisely, the MAB problem aims to detect and select, through finite trials, the arm that maximizes the long-term reward. An assumption is made that the player has no prior information about the reward rates of any of the arms, motivating us to use it as an efficient solution for the gateway selection problem under consideration. In the beginning, the player assembles information on each slot machine (exploration) by trying as many arms as possible then estimating the arm that may have the highest expected reward. Then, the player plays with that arm (exploitation) as much as possible. If the estimation time is long enough, the player can precisely estimate the expected reward of each arm. Meanwhile, if the estimation time is short, the player cannot obtain many rewards, and the player may select the arm with a low reward, leading to unprecise reward results. Based on the rewards distribution, the MAB problem can be classified as stochastic or adversarial. In the first type, the rewards of the arms are assumed to be drawn from independent and identical distributions (i.i.d.), which are unknown for the player. However, in the second type, the rewards are chosen arbitrarily by the environment. Several MAB-based algorithms have been proposed to deal with the tradeoff of the exploration–exploitation such as UCB, TS, and EXP3. In its typical form, the MAB-based algorithm has K possible actions a { 1 , 2 , , K } to choose from, i.e., arms and T rounds. In each round t, the algorithm selects an arm a t { 1 , 2 , , K } and gathers a reward related to the arm, i.e., r a t . The algorithm attempts to learn which arm is the best, while not consuming too much exploration time.
Figure 3 summarizes the typical MAB protocol. In this protocol, at every time t , the utilized MAB algorithm, e.g., UCB, TS, EXP3, selects one of the available actions, i.e., arms, then observes the reward resulting from taking that action. This reward will be revealed to the MAB algorithm to enhance its action selection in the next round based on its previous observations up to (but excluding) time t and according to its policy. Typically, regret is used to measure the efficiency of MAB algorithms. It is defined as the loss of the accumulative reward resulting from non-optimal arms selection. Recently, budget-constrained MABs have brought much research attention, where playing an arm requires spending a cost while receiving a reward, and the player aims at maximizing the long-term reward under its limited budget [40]. In this scenario, the player plays for the materialized costs until the remaining budget is exhausted, at which point the algorithm terminates. In the considered problem, the limited budget is the battery capacity of the access UAV, where the access UAV will incorporate in the game until its battery needs for recharging.

4.2. Multi-Player MAB Strategy

Like the single-player MAB discussed above, in the multi-player MAB, each player chooses an action in successive trials to receive an unknown reward too [26,41,42,43]. If multiple players select the same arm, collisions happen. Based on the collision model, players may share the rewards as in our case where time-sharing scheduling is used, or no one receives the reward as in the case of cognitive radios [41,42,43]. Based on the information exchanged among the players, multi-player MAB can be categorized as centralized or decentralized. In the centralized setting, the game is played collectively among the players via exchanging full observation getting the game looks like a single-player MAB. However, in the case of a decentralized game, no data is transferred among the players, and each player selects his action only based on his own recorded observations. Different from centralized games, collisions are unavoidable in the case of the decentralized category. Thus, each player acts selfishly to learn collision patterns and tries to avoid them while interacting with the environment. In the considered problem, the access UAVs learn to prevent not only collisions but also interference coming from other access–gateway links. Despite this adversarial environment, the authors in [41] showed that the minimum regret of the decentralized multi-player MAB grows at the same rate as the centralized counterpart. The authors in [26] also showed that players in selfish multi-player MAB could learn how to play actions that enhance their rewards and overall system performance as well. Motivated by these reliable results, we adopted a selfish multi-player MAB to address the problem of gateway UAV selection in a fully decentralized setting. Moreover, the battery constraint of access UAV flights was added to the played game.

4.3. Proposed Battery-Aware Multi-Player MAB Algorithms

Herein, three BA-MAB algorithms are proposed to be played selfishly and concurrently by the access UAVs to select their corresponding gateway UAVs at every round of selection.

4.3.1. Proposed BA-UCB Algorithm

UCB is one of the famous MAB algorithms that performs tradeoffs of exploitation–exploration very effectively. It tries to increase the confidence of the selected action by decreasing its uncertainty. Algorithm 1 summarizes the proposed BA-UCB algorithm, which is implemented in each access UAV i for selfish gateway UAV selection. It is assumed that the access UAV i is aware of the flying distances from its current location towards its surrounding gateway UAVs, i.e., d f , i j ( t ) in (3). This information can be obtained using GPS sensors attached to the UAVs. At each time t , it is also assumed that each access UAV is aware by its remaining battery capacity Ξ r , i ( t ) . As an initialization of the algorithm, each UAV i will randomly select and fly towards one gateway UAV at once and observe the obtained payoffs Ψ i j ( t ) as given in (4). From t = M + 1 until t = T , access UAV i will select gateway UAV j, maximizing the following equation:
j * ( t ) = arg max 1 j M ( E ( Ψ i j ( t 1 ) ) + 2 ln ( t ) x i j ( t 1 ) ρ d f , i j ( t ) Ξ r , i ( t )   )
where E ( Ψ i j ( t 1 ) ) indicates the average data rate observed by connecting access UAV i with gateway UAV j up to (but excluding) time t . 2 ln ( t ) x i j ( t 1 ) is the exploration term, where x i j ( t 1 ) reflects the number of times gateway UAV j has been selected by access UAV i up to (but excluding) time t . The added term ρ d f , i j ( t )   Ξ r , i ( t )   implies the battery cost of access UAV i flight to reach gateway UAV j, where ρ > 0 is a factor for compromising between the achievable data rate and the battery cost. The ratio   d f , i j ( t )   Ξ r , i ( t )   indicates that more residual battery capacity is needed to reach far gateways with high separation distances d f , i j ( t )   . The policy proposed in (8) compromises between exploiting gateway UAVs having higher observed average data rates associated with minimum battery cost to fly towards it or exploring other low investigated ones. After selecting and flying towards gateway UAV j * at time t and obtaining its corresponding reward Ψ i j * ( t ) , its number of selections x i j * ( t ) , average achievable data rate E ( Ψ i j * ( t ) ) , and remaining battery capacity Ξ r , i ( t + 1 ) are updated, as given in steps 2, 3, and 4 in Algorithm 1.
Algorithm 1: BA-UCB gateway UAV selection.
Initialization: Randomly select each gateway UAV j, 1 j M at once and their corresponding Ψ i j ( t ) are observed, and set the number of selection times x i j ( t ) = 1 for 1 t M
For t = M + 1 : T
  • Draw a gateway UAV and obtain the reward:
    • j * ( t ) = arg max 1 j M ( E ( Ψ i j ( t 1 ) ) + 2 ln ( t ) x i j ( t 1 ) ρ d f , i j ( t )   Ξ r , i ( t )   )
    • Obtain Ψ i j * ( t )
  • x i j * ( t ) = x i j * ( t 1 ) + 1
  • E ( Ψ i j * ( t ) ) = 1 x i j * ( t ) h = 1 x i j * ( t ) Ψ i j * ( h )
  • Ξ r , i ( t + 1 ) = Ξ r , i ( t ) ( B h t h + B f d f , i j * ( t )   v f + P t x L D Ψ i j * ( t ) )
END For

4.3.2. Proposed BA-TS Algorithm

The policy of TS depends on a pure Bayesian strategy, in which the rewards are assumed to be drawn from a predefined probabilistic model. TS is known to have excellent empirical performance even better than that achieved by UCB. A prior distribution is assumed for the rewards based on initializing the parameters of the said model. Then, during the learning process, the TS policy keeps track of the rewards’ posterior distribution using the collected data and then randomly pulls the arm, matching the probability of being optimal. Specifically, at each time t , random samples are taken from the constructed posterior distributions of the rewards and then select the arm with the maximum sample value to play. Then, the posterior distribution of the selected arm is updated via updating its model parameters for the next round of arm selection. Algorithm 2 describes the proposed BA-TS implemented in each access UAV i, where Ψ i j ( t ) is assumed to be drawn from Gaussian distribution, i.e., N ( E ( Ψ i j ( t ) ) , σ i , j 2 ( t ) ) , where E ( Ψ i j ( t ) ) and σ i , j 2 ( t ) are the mean and variance of the distribution [25]. The assumption of Gaussian distribution is reasonable for the achievable data rate Ψ i j ( t ) because the received power has a normal distribution in nature due to the effect of additive white Gaussian noise (AWGN) and interferences. Following the methodology given in [26], E ( Ψ i j ( t ) ) and σ i , j 2 ( t ) are set to 1 x i j ( t ) h = 1 x i j ( t ) Ψ i j ( h ) and 1 x i j ( t ) + 1 , respectively, where x i j ( t ) is the number of times gateway UAV j has been selected until time t . A prior Gaussian distribution is assumed at the beginning of the proposed BA-TS algorithm by initializing the values of E ( Ψ i j ( t ) ) and σ i , j 2 ( t ) as given in Algorithm 2. Then at each time t , a sample ϕ i j ( t 1 ) is taken from each preconstructed posterior distribution of the data rate achieved from connecting access UAV i with gateway UAV j.
Then, the gateway UAV   j * , which maximizes the following equation will be selected by access UAV i:
j * ( t ) = arg   max 1 j M ( ϕ i j ( t 1 ) ρ d f , i j ( t )   Ξ r , i ( t )   ) ,  
where the battery cost term given in (8) is added to the maximization equation. Thus, the gateway UAV j * , which has higher previous value of ϕ i j ( t 1 ) and requires lower battery cost of access UAV flight, will be selected by access UAV i at time t. After selecting gateway UAV   j * , access UAV i will fly and connect with it. Then, its achievable data rate Ψ i j * ( t ) is observed and its corresponding number of selections is updated, as given in step 2 in Algorithm 2. Additionally, the parameters of the posterior Gaussian distribution corresponding to its reward distribution and remaining battery capacity are updated as well, as given in steps 3, 4, and 5 in Algorithm 2.
Algorithm 2: BA-TS gateway UAV selection.
Initialization: t = 0, E ( Ψ i j ( t ) ) = 0 , x i j ( t ) = 0 , σ i , j 2 ( t ) = 1
For t = 1 : T
Sample ϕ i j ( t 1 ) , 1 j M from normal distributions N ( E ( Ψ i j ( t 1 ) ) , σ i , j 2 ( t 1 ) )
  • Draw a gateway UAV and obtain the reward:
    • j * ( t ) = arg   max 1 j M ( ϕ i j ( t 1 ) ρ d f , i j ( t )   Ξ r , i ( t )   )
    • Obtain Ψ i j * ( t )
  • x i j * ( t ) = x i j * ( t 1 ) + 1
  • E ( Ψ i j * ( t ) ) = 1 x i j * ( t ) h = 1 x i j * ( t ) Ψ i j * ( h )
  • σ i , j * 2 ( t ) = 1 x i j * ( t ) + 1
  • Ξ r , i ( t + 1 ) = Ξ r , i ( t ) ( B h t h + B f d f , i j * ( t )   v f + P t x L D Ψ i j * ( t ) )
END For

4.3.3. Proposed BA-EXP3 Algorithm

EXP3 is a weighted MAB algorithm, where a weight is assigned to each arm, and the action is taken randomly with a probability proportional to the designated weights. Algorithm 3 gives the proposed battery-aware EXP3 gateway selection algorithm implemented in each access UAV i. In this algorithm, the weights are initialized to 1 for all available gateway UAVs then updated based on the weighted estimated rewards. The learning rate parameter of the algorithm, i.e., δ ( t ) , and the exploration parameter χ ( 0 , 1 ] are also initialized. In the proposed BA-EXP3, the battery cost factor ρ d f , i j ( t )   Ξ r , i ( t )   is added to the weights of the of gateway UAVs as follows:
w i j ( t ) = w i j ( t ) ρ d f , i j ( t )   Ξ r , i ( t )   ,
This means that the weights are updated based on both the estimated rewards and the battery cost function, as shown in Algorithm 3. Based on the weight factors, the probabilities of selecting gateway UAV j at time t , Π i j ( t ) , are evaluated. Then, the gateway UAV j * is drawn randomly based on these probabilities as follows:
j * ( t ) ~ Π i j ( t ) = ( Π i 1 ( t ) ,   Π i 2 ( t ) , ,   Π i M ( t ) )
Access UAV i will fly and connect with gateway UAV   j * . After observing the actual payoff, i.e., Ψ i j * ( t ) , its weighted reward estimated value Ψ ^ i j * ( t ) = Ψ i j * ( t ) Π i j * ( t ) is calculated. In EXP3, dividing the actual gain by the probability that the action was selected compensates the payoff of actions that are unlikely to be selected. Then, the weights of both the selected gateway UAV and the other gateways are updated following the same methodology presented by the authors in [26], as given in steps 6 and 7 in Algorithm 3. Finally, the remaining battery capacity of the selected gateway UAV j * is updated as given in step 8. In the proposed algorithm, a time-dependent learning rate of δ ( t ) = δ 0 t is utilized, as given in [26]. The use of a time-dependent learning rate comes from the fact that large values of δ result in a more confident update, while small values of δ lead to conservative behavior [26].
Algorithm 3: BA-EXP3 gateway UAV selection.
Initialization: t = 0 ,   δ ( t ) = δ 0 , w i j ( t + 1 ) = 1 for j , χ
For t = 1 : T
  • w i j ( t ) = w i j ( t ) ρ d f , i j ( t )   Ξ r , i ( t )  
  • Π i j ( t ) ( 1 χ ) w i j ( t ) j = 1 M w i j ( t ) + χ M
  • Draw a gateway UAV and obtain the reward:
    •   j * ( t ) ~ Π i j ( t ) = ( Π i 1 ( t ) ,   Π i 2 ( t ) , ,   Π i M ( t ) )
    • Obtain Ψ i j * ( t )
  • Ψ ^ i j * ( t ) = Ψ i j * ( t ) Π i j * ( t )
  • δ ( t ) = δ 0 t
  • w i j * ( t + 1 ) = ( w i j * ( t ) ) δ ( t ) δ ( t 1 ) exp ( δ ( t ) E ( Ψ i j * ( t ) ) )
  • w i j ( t + 1 ) = ( w i j ( t ) ) δ ( t ) δ ( t 1 ) , j j *  
  • Ξ r , i ( t + 1 ) = Ξ r , i ( t ) ( B h t h + B f d f , i j * ( t )   v f + P t x L D Ψ i j * ( t ) )
END For

5. Numerical Analysis

In this section, extensive numerical simulations are conducted to compare the performances of the proposed BA-UCB, BA-TS, and BA-EXP3 MAB algorithms for gateway UAV selection. Moreover, their performances are compared with two benchmark approaches based on near and random gateway selections. In the first approach, an access UAV always selects the nearest gateway UAV to it, while in the second one, a random gateway UAV is selected by the access UAV at every time. These two approaches are chosen as benchmarks because no prior information about the achievable data rates of the access–gateway–cellular links is required, making them practical solutions to the considered gateway selection problem. Other solutions based on exhaustive search, graph-based, branch-and-bound are impractical from the perspective of access UAV battery consumptions and gateway selection times. This is because, in these schemes, the achievable data rates of candidate access UAVs–gateway UAVs configurations should be known before choosing the optimal setting. However, these values are unknown unless access UAVs fly and connect with the gateway UAVs in a particular candidate configuration, making them unfeasible solutions.
A post-disaster area of dimension 750 × 750 m2 is assumed where access UAVs are uniformly distributed inside this area for rescue services. Gateway UAVs are uniformly distributed around this area in a circle of 1250 m diameter. Based on (1), the minimum distance for establishing a mmWave communication link between an access UAV and a gateway UAV is equal to:
d min = ( P t x G max 2 ( λ 4 π ) 2 P r x th ) 1 α ,
where G max = 2 π ( 2 π θ 3 dB ) ε θ 3 dB indicates the maximum antenna gain for a particular value of θ 3 dB . P r x th = 78 dBm is the threshold received power corresponding to modulation index 0 (MC0) of IEEE 802.11ad standard [44]. Thus, for example, when θ 3 dB is equal to 10°, 20°, 30°, 40°, 50° and 60°, d min becomes 357, 179, 120, 90, 72 and 60 m, respectively. At low values of θ 3 dB , long minimum distance,   d min , can be held due to the free space propagation. Thus, the minimum flying distance by access UAV i towards gateway UAV j at time t is equal to:
d f min , i j ( t ) = | d i j ( t ) d min | ,
where d i j ( t ) indicates the radial separation distance between access UAV i and gateway UAV j. Table 1 summarizes the simulation parameters used throughout numerical simulation unless otherwise stated. It is assumed that all access UAVs are fully charged at the beginning of the game with a total battery capacity of Ξ C given in Table 1.

5.1. Performance Metrics

We used the following metrics to assess the performances of the compared gateway selection schemes:
  • Average total system rate: It is defined as the average sum rate of all UAVs relays over the time horizon. This can be expressed mathematically as:
    R t = 1 T t i , j I i j ( t ) Ψ i j ( t ) ,
    where I i j ( t ) and Ψ i j ( t ) are defined in Section 5.
  • Average energy efficiency (bps/J) per access UAV: It is defined as the average data rate of the access UAV divided by its total energy consumption. Total energy consumption of an access UAV i at time t is the sum of energy consumptions of the data communications, hovering, and flying. Thus, the average energy efficiency of an access UAV can be expressed as:
    Γ = 1 T t 1 N i , j I i j ( t ) ( Ψ i j ( t ) Ξ i j , h ( t ) + Ξ i j , f ( t ) + Ξ i j , c ( t ) ) ,
    where Ξ i j , h ( t ) = B h t h , Ξ i j , f ( t ) = B f d f , i j ( t ) v f and Ξ i j , c ( t ) = P t x L D Ψ i j ( t ) represent the hovering, flying, and data communication energies consumed by access UAV i when linked with gateway UAV j at a time t .
  • Convergence rate of the proposed MAB algorithms: This measures the speed of convergence of the different proposed MAB algorithms despite the adversarial setting and the selfish behavior of the access UAVs. Towards this end, the system rate of the proposed MAB algorithms is evaluated against the time horizon.

5.2. Simulation Results

In the following section, the performances of the proposed BA-MAB-based gateway selection schemes are assessed under different system settings based on the performance metrics mentioned above.

5.2.1. Average Total System Rate

In this part of the simulation results, we give the average total system rate performances in Gbps against different values of gateway UAVs, access UAVs, and beam-widths.
Figure 4 shows the average system rate of the compared schemes against the number of access UAVs using 20 gateway UAVs and a beam-width of 60°. As shown in this figure, the BA-TS has the best performance due to its integrated Bayesian strategy based on constructing posterior distributions for the obtained data rates. On the other side, random gateway selection has the worst performance due to the randomness in the selected gateway UAV at each round. Consequently, access UAVs will experience random interference as well as a random number of time slots at each time t . The near gateway selection has better performance than random selection due to the fixed pattern of interference and the number of assigned time slots experienced by access UAVs at each time t . It is interesting to note that the average system rate of the MAB algorithms is increasing when using few numbers of access UAVs until reaching a certain point, then slightly decreasing as the number of access UAVs is increased. This comes from the low interference and time-sharing scheduling experienced by the small number of access UAVs. However, as the number of access UAVs is increased beyond the number of gateway UAVs, i.e., 20 UAVs, high interference, and low number of time slots are experienced by access UAVs. Although all MAB algorithms are highly affected by interference at a higher number of distributed access UAVs, BA-TS and BA-UCB still have the best average system rate performances. From Figure 4, BA-EXP3 shows poor performance compared to the other MAB schemes and tends to reach the performance of the near selection at a high number of access UAVs. This comes from the nearly equal weights assigned to the gateway UAVs by the BA-EXP3 algorithm at each time step, which produces a poor gateway UAV selection policy. However, the BA-EXP3 algorithm still performs better than near and random selections. Using 25 access UAVs, BA-TS, BA-UCB, and BA-EXP3 have 60% (81%), 59.5% (80.5%), and 19% (37%) enhancement in the average system rate over the near (random) gateway selection, respectively. Figure 5 shows the average system rate against increasing the number of gateway UAVs using 20 access UAVs and a beam-width of 60°. For all compared schemes, as the number of gateway UAVs is increased, the average system rate is increased due to the decrease in the interference experienced by the access UAVs. Moreover, as a low number of access UAVs are linked with the same gateway UAV, more time slots are assigned to them, contributing to increasing the total system rate as well. Yet, BA-TS and BA-UCB have the best performances over the other schemes. It is also interesting to note that at interfering environments that are too harsh and at a low number of assigned time slots, e.g., when the number of gateway UAVs is equal to 5, MAB-based algorithms still have some improvements over near and random selections. However, as the number of gateway UAVs reaches 40, about 88% (108%), 86% (105%), and 54% (70%) increases in average system rates are obtained using BA-TS, BA-UCB, and BA-EXP3 overusing near (random) selection, respectively.
Figure 6 shows the average system rate against the used beam-width using 20 gateway UAVs and 40 access UAVs. Generally, at lower values of beam-width, e.g., 10°, higher beam-forming gain and lower mutual interference occur, which highly increases the average system rate of all compared schemes. However, at higher values of beam-width, the beam-forming gain is decreased while the mutual interference is increased, resulting in a lower average system rate performance. From Figure 6, BA-TS has the best performance overall compared schemes, while random selection has the worst overall values of beam-widths due to the reasons mentioned above. At a beam-width of 10°, BA-TS, BA-UCB, and BA-EXP3 have 30% (34%), 25% (30%), and 8% (13%) increases in the average system rate over near (random) selection, respectively. However, at a beam-width of 60°, 43% (66%), 38% (61%), and 5% (23%) improvement is obtained. This emphasizes the superior performance of the proposed MAB algorithms, even in a high interfering environment.

5.2.2. Average Energy Efficiency

In this part of simulation results, we study the average energy efficiency in bps/mJ of the compared gateway selection schemes against different values of gateway UAVs, access UAVs, and beam-widths. Figure 7 shows the average energy efficiency against the number of access UAVs using 40 gateway UAVs and a beam-width of 60°. As given in Figure 7, the proposed MAB-based gateway selection algorithms have better energy efficiency performances than near and random selections at all tested access UAV values. This comes from the proposed design of the BA-MAB algorithms, where the battery cost of the access UAV flight is taken into consideration while selecting the gateway UAV, maximizing its achievable data rate. For a low number of access UAVs, the data rate per access UAV is highly increased due to the low mutual interference and high number of assigned time slots. This results in high energy efficiency of all compared schemes, where the proposed BA-MAB algorithms show superior performances. However, at a high number of access UAVs, the achievable data rate of the access UAV is decreased due to the increase in the mutual interference accompanied by the decrease in the number of assigned time slots. This results in high decrease in the average energy efficiency, as shown in Figure 7. Yet, the BA-MAB algorithms show better performances than the other schemes. Using 5 access UAVs, about 60% (70%), 50% (62%), and 32% (42%) improvements in average energy efficiency are obtained using the proposed BA-TS-, BA-UCB-, and BA-EXP3-based gateway selections over near (random) selection, respectively.
Figure 8 shows the average energy efficiency against the number of gateway UAVs using 20 access UAVs and a beam-width of 60°. Due to the low achievable data rate per access UAV when using a small number of gateway UAVs, e.g., 5, the average energy efficiencies of all compared schemes are highly decreased, as shown in Figure 8. However, as the number of gateway UAVs is increased, the average energy efficiencies of all compared schemes are increasingly empowered by the increase in the achievable data rate per access UAV. At 40 gateway UAVs, 117% (143%), 114% (140%), and 68% (88%) enhancement in average energy efficiency is obtained using the proposed BA-TS, BA-UCB, and BA-EXP3 overusing near (random) selection, respectively.
Figure 9 shows the average energy efficiency against the used beam-width using 20 gateway UAVs and 40 access UAVs. Influenced by the increase in the achievable data rate, the average energy efficiency of the access UAV is also increased at low values of beam-width, e.g., 10°. It is also decreased at high values of beam-width affected by the decrease in the achievable data rate, as previously explained. However, the proposed BA-MAB algorithms show better performances over the other compared schemes at all tested values of beam-width. At beam-width of 10°, about 33% (39%), 27% (33%), and 6% (11%) improvement in average energy efficiency is obtained using the proposed BA-TS, BA-UCB, and BA-EXP3 overusing near (random) selection, respectively. These values become 43% (50%), 37% (44%), and 2% (8%) at a beam-width of 60°. This confirms that the proposed BA-MAB algorithms show better performance even in high interfering environments.

5.2.3. Convergence Rate

Convergence is one of the primary metrics for MAB applications; the MAB algorithms should reach the sub-optimal solution using a few attempts. Thus, in this section, we study the convergence of the total system rate of the proposed BA-MAB algorithms in different settings. Figure 10, Figure 11 and Figure 12 show the convergence rate of the overall system rate using 20 gateway UAVs and a beam-width of 60° while changing the number of access UAVs by 20, 30, and 40, respectively. This emulates different interfering and time-sharing environments. In these figures, t indicates the rounds of gateway UAV selection not as an absolute value in seconds, as its absolute value will be different from round to round due to the different flight durations towards the selected gateway UAVs at each round of selection. From these figures, all proposed BA-MAB algorithms converged after a few trials; specifically, they start to converge after 400 rounds. These results demonstrate that the proposed BA-MAB algorithms can converge rapidly regardless of the adversarial setting of the problem and the selfish behaviors of the access UAVs. This means that access UAVs learn to play actions that enhance the overall system performance at every attempt.

6. Conclusions

In this paper, we considered the problem of gateway selection in a fully decentralized UAV wireless network. After formulating the optimization problem subject to its battery cost, we proposed a budget-constrained multi-player MAB algorithm to address the issue. Towards this end, three battery aware MAB (BA-MAB) algorithms were proposed, namely BA-TS, BA-UCB, and UA-EXP3. Due to the decentralized setting of the problem, selfish and concurrent multi-player BA-MAB algorithms were introduced, where each access UAV only relies on its previous observations when selecting the next gateway UAV. The proposed BA-MAB algorithms demonstrated superior performances over near and random gateway UAV selections in different environmental settings. Moreover, the MAB algorithms showed reasonable convergence rates. The obtained results open the door for applying ML techniques in general and MAB algorithms, especially for addressing several problems in UAV wireless networks.

Author Contributions

Methodology, investigation, validation, analysis, E.M.M.; software and writing—original draft preparation, E.M.M. and S.H.; writing—review and editing, A.A., K.H. and M.A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Deanship of Scientific Research at Prince Sattam Bin Abdulaziz University under the research project #2019/01/9927.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mkiramweni, M.E.; Yang, C.; Li, J.; Zhang, W. A survey of game theory in unmanned aerial vehicles communications. IEEE Commun. Surv. Tutor. 2019, 21, 3386–3413. [Google Scholar] [CrossRef]
  2. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.; Debbah, M. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. IEEE Commun. Surv. Tutor. 2019, 21, 2334–2360. [Google Scholar] [CrossRef] [Green Version]
  3. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Drone Small Cells in The Clouds: Design, Deployment and Performance Analysis. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  4. Zhan, P.; Yu, K.; Swindlehurst, A.L. Wireless relay communications with unmanned aerial vehicles: Performance and optimization. IEEE Trans. Aerosp. Electron. Syst. 2011, 47, 2068–2085. [Google Scholar] [CrossRef]
  5. Zhang, S.; Shi, S.; Gu, S.; Gu, X. Power control and trajectory planning based interference management for UAV-assisted wireless sensor networks. IEEE Access 2020, 8, 3453–3464. [Google Scholar] [CrossRef]
  6. Baek, J.; Han, S.I.; Han, Y. Energy-efficient UAV routing for wireless sensor networks. IEEE Trans. Veh. Technol. 2020, 69, 1741–1750. [Google Scholar] [CrossRef]
  7. Seliem, H.; Shahidi, R.; Ahmed, M.H.; Shehata, M.S. Drone based highway-VANET and DAS service. IEEE Access 2018, 6, 20125–20137. [Google Scholar] [CrossRef]
  8. Chai, S.; Lau, V.K.N. Online trajectory and radio resource optimization of cache-enabled UAV wireless networks with content and energy recharging. IEEE Trans. Signal. Process. 2020, 68, 1286–1299. [Google Scholar] [CrossRef]
  9. Sekander, S.; Tabassum, H.; Hossain, E. Multi-tier drone architecture for 5G/B5G cellular networks: Challenges, trends, and prospects. IEEE Commun. Mag. 2018, 56, 96–103. [Google Scholar] [CrossRef] [Green Version]
  10. Rappaport, T.S.; Sun, S.; Mayzus, R.; Zhao, H.; Azar, Y.; Wang, K.; Wong, G.N.; Schulz, J.K.; Samimi, M.; Gutierrez, F. Millimeter wave mobile communications for 5G cellular: It will work! IEEE Access 2013, 1, 335–349. [Google Scholar] [CrossRef]
  11. Abdelreheem, A.; Mohamed, E.M.; Esmaiel, H. Location-based millimeter wave multi-level beamforming using compressive sensing. IEEE Commun. Lett. 2018, 22, 185–188. [Google Scholar] [CrossRef]
  12. Mohamed, E.M.; Sakaguchi, K.; Sampei, S. Wi-Fi coordinated WiGig concurrent transmissions in random access scenarios. IEEE Trans. Veh. Tehnol. 2017, 66, 10357–10371. [Google Scholar] [CrossRef]
  13. Mohamed, E.M.; Elhalawany, B.M.; Khallaf, H.S.; Zareei, M.; Zeb, A.; Abdelghany, M.A. Relay probing for millimeter wave multi-hop D2D networks. IEEE Access 2020, 8, 30560–30574. [Google Scholar] [CrossRef]
  14. Zhang, L.; Zhao, H.; Hou, S.; Zhao, Z.; Xu, H.; Wu, X.; Wu, Q.; Zhang, R. A Survey on 5G Millimeter Wave Communications for UAV-Assisted Wireless Networks. IEEE Access 2019, 7, 117460–117504. [Google Scholar] [CrossRef]
  15. Liu, C.H.; Ho, K.H.; Wu, J.Y. MmWave UAV networks with multi-cell association: Performance limit and optimization. IEEE J. Sel. Areas Commun. 2019, 37, 2814–2831. [Google Scholar] [CrossRef]
  16. Kong, L.; Ye, L.; Wu, F.; Tao, M.; Chen, G.; Vasilakos, A.V. Autonomous relay for millimeter-wave wireless communications. IEEE J. Sel. Area. Commun. 2017, 35, 2127–2136. [Google Scholar] [CrossRef]
  17. Wang, J.; Jiang, C.; Han, Z.; Ren, Y.; Maunder, R.G.; Hanzo, L. Taking drones to the next level: Cooperative distributed unmanned-aerial-vehicular networks for small and mini drones. IEEE Veh. Technol. Mag. 2017, 12, 73–82. [Google Scholar] [CrossRef] [Green Version]
  18. Luo, F.; Jiang, C.; Du, J.; Yuan, J.; Ren, Y.; Yu, S.; Guizani, M. A distributed gateway selection algorithm for UAV networks. IEEE Trans. Emerg. Top. Comput. 2015, 3, 22–33. [Google Scholar] [CrossRef]
  19. Duan, R.; Wang, J.; Jiang, C.; Ren, Y.; Hanzo, L. The transmit-energy vs. computation-delay tradeoff in gateway-selection for heterogenous cloud aided multi-UAV systems. IEEE Trans. Commun. 2019, 67, 3026–3039. [Google Scholar] [CrossRef] [Green Version]
  20. Li, R.; Xiao, Y.; Yang, P.; Tang, W.; Wu, M.; Gao, Y. UAV-aided two-way relaying for wireless communications of intelligent robot swarms. IEEE Access 2020, 8, 56141–56150. [Google Scholar] [CrossRef]
  21. Hu, Y.; Zhang, F.; Tian, T.; Ma, D. Placement optimisation method for multi-UAV relay communication. IET Commun. 2020, 14, 1005–1015. [Google Scholar] [CrossRef]
  22. Wang, L.; Hu, B.; Chen, S.; Cui, J. UAV-enabled reliable mobile relaying based on downlink NOMA. IEEE Access 2020, 8, 25237–25248. [Google Scholar] [CrossRef]
  23. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.; Hanzo, L. Machine learning paradigms for next-generation wireless networks. IEEE Wirel. Commun. 2017, 24, 98–105. [Google Scholar] [CrossRef] [Green Version]
  24. Sun, Y.; Peng, M.; Zhou, Y.; Huang, Y.; Mao, S. Application of machine learning in wireless networks: Key techniques and open issues. IEEE Commun. Surv. Tutor. 2019, 21, 3072–3108. [Google Scholar] [CrossRef] [Green Version]
  25. Huang, Y.; Xu, C.; Zhang, C.; Hua, M.; Zhang, Z. An overview of intelligent wireless communications using deep reinforcement learning. J. Commun. Inform. 2019, 4, 15–29. [Google Scholar]
  26. Wilhemi, F.; Cano, C.; Neu, G.; Bellalta, B.; Jonsson, A.; Munoz, S.B. Collaborative spatial reuse in wireless networks via selfish multi-armed bandits. Ad Hoc Netw. 2019, 88, 129–141. [Google Scholar] [CrossRef] [Green Version]
  27. Auer, P.; Cesa-Bianchi, N.; Fischer, P. Finite-time analysis of the multi-armed bandit problem. Mach. Learn. 2002, 47, 235–256. [Google Scholar] [CrossRef]
  28. Audibert, J.-Y.; Munos, R.; Szepesvari, C. Exploration-exploitation tradeoff using variance estimates in multi-armed bandits. Theor. Comput. Sci. 2009, 410, 1876–1902. [Google Scholar] [CrossRef]
  29. Valencia, F.I.; Marcial-Romero, J.; Valdovinos, R. A comparison between UCB and UCB-Tuned as selection policies GGP. J. Intell. Fuzzy Sys. 2019, 36, 5073–5079. [Google Scholar] [CrossRef]
  30. Agrawal, S.; Goyal, N. Further optimal regret bounds for Thompson sampling. In Proceedings of the 6th International Conference on Artificial Intelligence and Statistics (AISTATS), Scottsdale, AZ, USA, 29 April–1 May 2013; pp. 99–107. [Google Scholar]
  31. Seldin, Y.; Szepesvari, C.; Auer, P.; Yadkori, Y.A. Evaluation and analysis of the performance of the EXP3 algorithm in stochastic environments. Eur. Workshop Reinf. Learn. 2012, 24, 103–116. [Google Scholar]
  32. Bithas, P.S.; Michailidis, E.T.; Nomikos, N.; Vouyioukas, D.; Kanatas, A.G. A survey on machine-learning techniques for UAV-based communications. Sensors 2019, 19, 5170. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Hu, J.; Zhang, H.; Song, L.; Han, Z.; Poor, H.V. Reinforcement learning for a cellular internet of UAVs: Protocol design, trajectory control, and resource management. IEEE Wirel. Commun. 2020, 27, 116–123. [Google Scholar] [CrossRef] [Green Version]
  34. Cao, Y.; Zhang, L.; Liang, Y. Deep Reinforcement Learning for Channel and Power Allocation in UAV-Enabled IoT Systems. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  35. Qi, H.; Hu, Z.; Huang, H.; Wen, X.; Lu, Z. Energy efficient 3-D UAV control for persistent communication service and fairness: A deep reinforcement learning approach. IEEE Access 2020, 8, 53172–53184. [Google Scholar] [CrossRef]
  36. Lin, Y.; Wang, T.; Wang, S. UAV-assisted emergency communications: An extended multi-armed bandit perspective. IEEE Commun. Lett. 2019, 23, 938–941. [Google Scholar] [CrossRef]
  37. Zhou, P.; Fang, X.; Fang, Y.; He, R.; Long, Y.; Huang, G. Beam management and self-healing for mmWave UAV mesh networks. IEEE Trans. Veh. Tehnol. 2019, 68, 1718–1732. [Google Scholar] [CrossRef]
  38. Zeng, Y.; Xu, J.; Zhang, R. Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans. Wirel. Commun. 2019, 18, 2329–2345. [Google Scholar] [CrossRef] [Green Version]
  39. Slivkins, A. Introduction to multi-armed bandits. Found. Trends Mach. Learn. 2019, 12, 1–286. [Google Scholar] [CrossRef] [Green Version]
  40. Zhou, D.P.; Tomlin, C.J. Budget-constrained multi-armed bandits with multiple plays. AAAI Conf. Artif. Intell. 2018, 32, 4572–4579. [Google Scholar]
  41. Liu, K.; Zhao, Q. Distributed learning in multi-armed bandit with multiple players. IEEE Trans. Signal. Process. 2010, 58, 5667–5681. [Google Scholar] [CrossRef] [Green Version]
  42. Besson, L.; Kaufmann, E. Multi-Player Bandits Revisited. Algorithmic Learning Theory. Available online: https://perso.crans.org/besson/articles/BK__ALT_2018/ (accessed on 6 July 2020).
  43. Kalathil, D.; Nayyar, N.; Jain, R. Decentralized learning for multi-player multi-armed bandits. IEEE Trans. Inf. Theory 2014, 60, 2331–2345. [Google Scholar] [CrossRef] [Green Version]
  44. IEEE 802.11ad Standard, Enhancements for Very High Throughput in the 60 GHz Band. Available online: https://standards.ieee.org/standard/802_11ad-2012.html (accessed on 6 July 2020).
Figure 1. Millimeter wave (mmWave) unmanned aerial vehicle (UAV) network architecture.
Figure 1. Millimeter wave (mmWave) unmanned aerial vehicle (UAV) network architecture.
Sensors 20 03947 g001
Figure 2. Schematic diagram of the mmWave flat-top antenna model.
Figure 2. Schematic diagram of the mmWave flat-top antenna model.
Sensors 20 03947 g002
Figure 3. General multi-player multi-armed bandit (MAB) protocol.
Figure 3. General multi-player multi-armed bandit (MAB) protocol.
Sensors 20 03947 g003
Figure 4. Average system rate against the number of access UAVs using gateway UAVs of 20 and a beam-width of 60°.
Figure 4. Average system rate against the number of access UAVs using gateway UAVs of 20 and a beam-width of 60°.
Sensors 20 03947 g004
Figure 5. Average system rate against the number of gateway UAVs using access UAVs of 20 and a beam-width of 60°.
Figure 5. Average system rate against the number of gateway UAVs using access UAVs of 20 and a beam-width of 60°.
Sensors 20 03947 g005
Figure 6. Average system rate against beam-width using access UAVs of 40 and gateway UAVs of 20.
Figure 6. Average system rate against beam-width using access UAVs of 40 and gateway UAVs of 20.
Sensors 20 03947 g006
Figure 7. Average energy efficiency against the number of access UAVs using gateway UAVs of 20 and a beam-width of 60°.
Figure 7. Average energy efficiency against the number of access UAVs using gateway UAVs of 20 and a beam-width of 60°.
Sensors 20 03947 g007
Figure 8. Average energy efficiency against the number of gateway UAVs using access UAVs of 20 and a beam-width of 60°.
Figure 8. Average energy efficiency against the number of gateway UAVs using access UAVs of 20 and a beam-width of 60°.
Sensors 20 03947 g008
Figure 9. Average energy efficiency against beam-width using access UAVs of 40 and gateway UAVs of 20.
Figure 9. Average energy efficiency against beam-width using access UAVs of 40 and gateway UAVs of 20.
Sensors 20 03947 g009
Figure 10. The convergence of system rate using access UAVs of 20, gateway UAVs of 20, and a beam-width of 60°.
Figure 10. The convergence of system rate using access UAVs of 20, gateway UAVs of 20, and a beam-width of 60°.
Sensors 20 03947 g010
Figure 11. The convergence of system rate using access UAVs of 30, gateway UAVs of 20, and a beam-width of 60°.
Figure 11. The convergence of system rate using access UAVs of 30, gateway UAVs of 20, and a beam-width of 60°.
Sensors 20 03947 g011
Figure 12. The convergence of system rate using access UAVs of 40, gateway UAVs of 20, and a beam-width of 60°.
Figure 12. The convergence of system rate using access UAVs of 40, gateway UAVs of 20, and a beam-width of 60°.
Sensors 20 03947 g012
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
P t x 0.01 Watt (10 dBm) [13]
B W 2.16 GHz [13]
f 60 GHz [13]
α 2 [37]
N 0 −120 dBm
ε 0.01 [37]
B h 4 Watt [36]
B f 2 Watt [36]
t h 120 s [36]
v f 40 Km/h [36]
Ξ C 400,000 Joule
ρ 1
δ 0 0.1 [26]
χ 0.02
L D 10 Gbps

Share and Cite

MDPI and ACS Style

Mohamed, E.M.; Hashima, S.; Aldosary, A.; Hatano, K.; Abdelghany, M.A. Gateway Selection in Millimeter Wave UAV Wireless Networks Using Multi-Player Multi-Armed Bandit. Sensors 2020, 20, 3947. https://doi.org/10.3390/s20143947

AMA Style

Mohamed EM, Hashima S, Aldosary A, Hatano K, Abdelghany MA. Gateway Selection in Millimeter Wave UAV Wireless Networks Using Multi-Player Multi-Armed Bandit. Sensors. 2020; 20(14):3947. https://doi.org/10.3390/s20143947

Chicago/Turabian Style

Mohamed, Ehab Mahmoud, Sherief Hashima, Abdallah Aldosary, Kohei Hatano, and Mahmoud Ahmed Abdelghany. 2020. "Gateway Selection in Millimeter Wave UAV Wireless Networks Using Multi-Player Multi-Armed Bandit" Sensors 20, no. 14: 3947. https://doi.org/10.3390/s20143947

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop