Next Article in Journal
Air Pollution Monitoring via Wireless Sensor Networks: The Investigation and Correction of the Aging Behavior of Electrochemical Gaseous Pollutant Sensors
Next Article in Special Issue
A 5.9 GHz Channel Characterization at Railroad Crossings for Train-to-Infrastructure (T2I) Communications
Previous Article in Journal
Channel Allocation Algorithm Based on Swarm Intelligence for a Wireless Monitoring Network
Previous Article in Special Issue
PDDQN-HHVBF Routing Protocol Based on Empirical Priority DDQN to Improve HHVBF
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Motion Planning in UAV-Aided Data Collection with Dynamic Jamming

College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(8), 1841; https://doi.org/10.3390/electronics12081841
Submission received: 29 March 2023 / Revised: 5 April 2023 / Accepted: 6 April 2023 / Published: 13 April 2023

Abstract

:
Unmanned-aerial-vehicle (UAV)-aided data collection for Internet of Things applications has attracted increasing attention. This paper investigates motion planning for UAV collecting low-power ground sensor node (SN) data in a dynamic jamming environment. We targeted minimizing the flight energy consumption via optimization of the UAV trajectory while considering the indispensable constraints which cover the collection data demodulation threshold, obstacle avoidance, data collection volume, and motion principle. Firstly, we formulate the UAV-aided data collection problem as an energy consumption minimization problem. To solve this nonconvex optimization problem, we rewrite the original problem by introducing relaxation variables and constructing equivalence constraints to obtain a new relaxation convex problem, which can be solved iteratively using the successive convex approximation (SCA) method. However, SCA is susceptible to initial values, especially in dynamic environments where fixed initial values may lead to a wide range of results, making it difficult to obtain a truly optimal solution to the optimization problem. To solve the initial value problem in dynamic environments, we further propose a communication-flight-corridor(CFC)-based initial path generation method to improve the reliability and convergence speed of the SCA method by constructing reliable communication regions and resilient secure paths in real time. Finally, simulation results validate the performance of the proposed algorithm compared to the benchmark algorithms under different parameter configurations.

1. Introduction

1.1. Background

Recently, communication supported by unmanned aerial vehicles (UAVs) has become an attractive technology in the field of wireless sensor networks (WSNs) for highly efficient data collection [1,2,3]. Most sensor nodes (SNs) are battery powered and deployed in a specific geographical area to sense and transmit the sensed information. At times, it is impractical to let these devices transmit or relay their sensed data to the base station through a multi-hop relay because of the high consumption of transmission energy. In the worst-case scenario, they may be out of range of each other’s transmissions, particularly in the case of interference. As a result, it can be very challenging to gather sensing data from such SNs and process them in time to help humans more efficiently. Sensor nodes (SNs) are processed in a timely manner to assist humans better in making decisions and responding to monitoring scenarios [4].
In this paper, we investigate the issue of the motion planning for UAV collecting low-power ground sensor node (SN) data in a dynamic jamming environment based on the following observation. In the past work, UAV-aided data collection scenarios were usually limited to simple path planning, which did not fully consider the principle of motion. Moreover, most of the past works are static environments or consider one-time offline global planning, and there is little research on dynamic environments that require real-time processing. Therefore, the research in this paper will build on past research to fully consider the motion constraints of UAVs and real-time planning in dynamic environments. We use the mobility and flexibility of UAVs for SN data collection. When the UAV flies into the effective communication range of the SN (satisfying the demodulation threshold), it is activated to transmit data within the effective communication range. To achieve full autonomy in UAV data collection, we have taken several aspects into account in the design. Firstly, the motion planning plays an essential role in generating safe and smooth motions which consider motion primitives, flight energy consumption, and flight time during the data collection mission [5]. Secondly, to ensure that the data can be collected to meet the demodulation threshold, it is also necessary to consider the effective communication area [6].

1.2. Prior Work

We focus on past work from two fields: motion planning and data collection. To generate smooth and safe trajectories for UAVs online, the authors in [7,8] presented the extraction of free space in the configuration space and utilized a range of convex shapes to represent the free space. The motion planning problem is formulated as restricting motion trajectories to convex graphs through convex optimization, which can be solved directly with a dedicated toolbox. However, the size of the area in which the convex shapes are constructed directly affects the local optimality of the trajectory. The authors in [9] proposed a zoning method that can be combined with a multi-stage optimal control formulation to accommodate complex forms of unobstructed areas in unstructured environments due to the presence of multiple obstacles within the predicted range. This method can effectively increase the free space for UAV planning. Other authors have proposed methods that are simpler and faster to calculate, such as the geometry-based method in [10], which constructs convex polyhedra by means of ellipsoidal expansion.
Moreover, to constrain effectively the entire trajectory within the convex shape together with its derivatives in the feasible space under the hard constraint, the authors in [11] employed a piecewise Bézier curve on the basis of Bernoulli’s polynomial to express the flight trajectory of the UAV. However, the order of the Bézier curve increases with the increase of control points, and a higher order can easily result in an “ill-conditioned” trajectory. To solve the problem of pathological Bézier curves under higher-order polynomials, the authors in [12] introduced B-spline curves, which have the advantages of Bézier curves while still being applicable to higher-order polynomial curves.
Collecting data from ground-based distributed SNs is among the crucial technologies for WSNs. The typical objectives of trajectory optimization are to minimize the mission time of the UAV [13,14,15], minimize energy consumption during the flight [16,17,18], maximize the amount of collected data [19,20], and maximize the amount of served sensors [21]. In addition to the basic UAV motion constraint, the data volume constraint is essential in all published research studies of UAV data collection. It is usually a non-convex constraint. In some studies, the communication rate required to meet the demodulation requirements is further considered, which is also non-convex. To deal with these non-convex optimization problems, design equivalence problems or relaxation problems as well as the transformation of constraints into penalty terms into optimization objectives have commonly been used in research. The successive convex approximation (SCA) [21] and some heuristic algorithms (e.g., PSO [22] and GE [23]) are commonly used to solve the trajectory. However, neither the SCA nor the heuristic algorithm can obtain a globally optimal solution, and the resulting local solution is strongly influenced by the initial value.
Inspired by the problems in past work, we focus on path planning and trajectory optimization considering UAV motion constraints in a dynamic jamming environment, which can be combined as motion planning. In our study, we first analyze the communication link [18,24] between the UAV and the ground sensors and formulate the optimization problem of minimizing the energy consumption, which considers the collection data demodulation threshold, obstacle avoidance, data collection volume, and motion principle. Then, we relaxed this non-convex optimization problem by introducing relaxation variables and constructing equivalence constraints. Further, to solve the initial value problem of SCA during replanning in dynamic environments, we propose a communication-flight-corridor (CFC)-based initialized path generation method, which enables the SCA algorithm to converge to the optimal value quickly. Finally, the optimized path points were subjected to a B-spline curve.

1.3. Contributions and Organization

The goal of this study is the examination of UAV-aided data collection from deployed low-power ground SNs in dynamic jamming environments. The motion planning of the UAV is designed by considering the communication capability, motion primitives, and the low-power SNs when the sensors transmit data. The major contributions of this paper are as follows:
  • An optimization framework was developed to minimize the energy consumption of UAV data collection tasks with communication link quality while maintaining constraints such as the maximum UAV speed, obstacle avoidance, and minimum data requirements per SNs.
  • Based on the introduction of relaxation variables and the application of SCA, we rewrite the nonconvex constraints of the original problem and fit the discrete points through B-spline curves. To ensure that it is applicable to dynamic environments, we further devise a motion planning approach, which is dependent on reprogramming and updated in real time with a dynamic jamming environment.
  • We present a CFC-based path initialization method, which enables the initial path to meet the constraints on the communication rate and the amount of collected data. In addition, we present a safe flight path correction method based on a geometric method for fast obstacle avoidance, which ensures that the initial path is safe.
  • Simulation results validate the performance of the proposed algorithm under different parameter configurations and compare to the benchmark algorithms.
The remainder of this paper is structured as follows: In Section 2, we describe the investigated scenario and formulate the optimization problem through path discretization. Section 3 presents the designed non-convex solution for the problem. The simulation results in Section 4 validate the effectiveness of the presented algorithm. Lastly, the paper is summarized in Section 5.

2. Problem Statement and Formulation

In this study, a UAV is dispatched to collect data from a low-power SN on the ground. The data collection is performed with a time-division multiple-access protocol. Figure 1 shows the scenario: The UAV is flying at low altitude in a smart city. The wireless communication system comprises K SNs represented by the set K = { 1 , , K } , and the location of the SN k is represented by p k = x k , y k , 0 , k K . The transmitted power for each of the low-power SNs is fixed at P k . We consider the position of the SNs fixed and known for the trajectory design of the UAV. In practice, the position of the SNs can be obtained from the system database or identified with standard positioning techniques, such as with BeiDou systems or GPS [25]. In our scenario, the UAV arrives in the effective range of communication of the SN and activates the sensors for data transmission. It should be noted that the flight altitude of the UAV depends on the environment. Hence, it is simultaneously subject to air control by the local authorities. The complete flight altitude range is H H min , H max . The completion time of the data collection task is T, while the 3D trajectory of the UAV is denoted by p ( t ) = x ( t ) , y ( t ) , H ( t ) , with 0 t T . The completion time T is discretized into N sufficiently small and equal time slots with time discretization in which δ represents the length of the slot and T = N δ . We introduce N = { 1 , 2 , · · · , N } , in which δ is a variable. Consequently, the trajectory of the UAV in the 3D space in the n-th slot is expressed as follows: p [ n ] = x ( n ) , y ( n ) , H ( n ) , n = 1 , 2 , N + 1 . In addition, unlike in prior studies, there are M = { 1 , , M } no-fly zones that are blocked by obstacles or interference sources. These are represented by the set, and the location of the projected center of the no-fly zone m is p m = x m , y m , 0 , m M . For descriptive purposes, we refer to the no-fly zones as “obstacles” in what follows. Furthermore, there are J jammers in the environment, which are represented by the set J = { 1 , 2 , , J } , and the position of the j-th jammer is p j [ n ] = ( x j ( n ) , y j ( n ) , H j ( n ) ) ,   j J . We assume that the position of the jammers is dynamic at a fixed height, which can obtain the location technology according to the radiation source [26,27].

2.1. Channel Model

The communication channel of the UAV has a crucial influence on data collection. Thus, we present the channel model first. The distance between the UAV and jammer j in the n-th slot is as follows:
d j [ n ] = p [ n ] p j [ n ] , n N ,
The distance between the UAV and SN k in the n-th slot is as follows:
d k [ n ] = p [ n ] p k , n N , k K ,
We assume that the G2A channel comprises large- and small-scale fading. Small-scale fading is regarded as an identically distributed and independent Rician channel, and the Rice factor is A ; the channel coefficient h i [ n ] can be expressed as follows:
h i [ n ] = h ^ i · g i [ n ] ,
where h ^ i and g i [ n ] are the path-loss coefficients and small-scale fading, respectively. We can express the path-loss coefficient as follows:
g i [ n ] = μ 0 · d i [ n ] α ,
where μ 0 is the mean channel power gain over the reference distance d 0 = 1 m, and α is the path-loss exponent, which typically exceeds 2 for a Rician fading channel. Small-scale fading h ^ i consists of the LoS component h ¯ i , where h ¯ i = 1 , and a random NLoS component h ˜ i , where h ˜ i C N 0 , 1 . Small-scale fading h ^ i is determined as follows:
h ^ i = A A + 1 · h ¯ i + 1 A + 1 · h ˜ i ,
Assuming that each jammer is transmitting at a constant power P j , the instantaneous signal to interference plus noise ratio (SINR) of the SN k is as follows:
ξ k [ n ] = P k x k μ 0 d k [ n ] α j = 0 J 1 x j μ 0 d j [ n ] α + σ 2 ,
where x i = h ^ i 2 , which is a random variable that obeys a non-central χ 2 distribution. To simplify the optimization problem presented below, we further perform the homogeneous approximation of the SINR function, which considers the expected value of the SINR and yields the following result:
E ξ k [ n ] = P k · β k · d k [ n ] α j = 0 J 1 P j · β j · d j [ n ] α + σ 2 ,
where
β k = 0 x k · f x k · μ 0 · d x k ,
β j = 0 x 0 , x J 1 0 x j μ 0 j J 1 f ( x j ) d x 0 d x J 1 ,
f ( x ) = A + 1 P exp ( A ( A + 1 ) x P ) I 0 ( 2 A ( A + 1 ) x P ) ,
where P is the signal model parameter, which, in general, can be set to 1. Moreover, I 0 ( · ) is a Bessel function of order zero. β k and β j are constants in each independent simulation that can be generated according to the Rician channel model. When the time slot is sufficiently small or when the flight speed is low, we consider the position of the UAV a fixed point in each time slot. The expected information rate (bits/s) between the UAV and SN k in the n-th slot is represented as follows:
r k [ n ] = B K · log 2 ( 1 + P k · β k · d k [ n ] α j = 0 J 1 P j · β j · d j [ n ] α + σ 2 ) .
where B is the total channel bandwidth in Hz, and σ 2 represents the noise power spectral density.

2.2. Motion Primitives

The set s [ n ] S is a dynamical system composed of the 3-D position, acceleration, and velocity: s [ n ] = p [ n ] , v [ n ] , a [ n ] T . According to [28], the differential flatness of the UAV allows us to build control inputs from a 1-D time-parameterized polynomial trajectory that is independently specified on each axis. The discrete state over the entire task period can be P = p [ 1 ] , p [ 2 ] , , p [ N ] T , V = v [ 1 ] , v [ 2 ] , , v [ N ] T , and A = a [ 1 ] , a [ 2 ] , , a [ N ] T . The control variable input for the system is the jerk: J = j [ 0 ] , j [ 1 ] , , j [ N 1 ] T . According to the equation of motion, the following correlations can be acquired:
p [ n + 1 ] = p [ n ] + v [ n ] · δ + 1 2 · a [ n ] · δ 2 + 1 6 · j [ n ] · δ 3 , n = 0 , , N 1
v [ n + 1 ] = v [ n ] + a [ n ] · δ + 1 2 · j [ n ] · δ 2 , n = 0 , , N 1
a [ n + 1 ] = a [ n ] + j [ n ] · δ , n = 0 , , N 1
The matrix forms are as follows:
P = T p · J + B p ,
V = T v · J + B v ,
A = T a · J + B a ,
where
T p = 1 6 δ 3 0 0 0 7 6 δ 3 1 6 δ 3 0 0 0 3 N + 1 6 δ 3 3 N n + 1 · N n + 1 6 δ 3 1 6 δ 3 N × N ,
B p = p [ 0 ] + v [ 0 ] δ + 1 2 a [ 0 ] δ 2 p [ 0 ] + 2 v [ 0 ] δ + 2 2 2 a [ 0 ] δ 2 p [ 0 ] + N v [ 0 ] δ + N 2 2 a [ 0 ] δ 2 N × 1 ,
T v = 1 2 δ 2 0 0 0 3 2 δ 2 1 2 δ 2 0 0 0 ( N 1 2 ) δ 2 ( N n + 1 2 ) δ 2 1 2 δ 2 N × N ,
B v = v [ 0 ] + a [ 0 ] δ v [ 0 ] + 2 a [ 0 ] δ v [ 0 ] + N a [ 0 ] δ N × 1 ,
T a = δ 0 0 0 δ δ 0 0 0 δ δ δ δ N × N ,
B a = a [ 0 ] a [ 0 ] a [ 0 ] N × 1 .
in which p [ 0 ] is the initial position, v [ 0 ] is the initial velocity, and a [ 0 ] is the initial acceleration.

2.3. Problem Formulation

The optimization goal is to minimize the energy consumption and flight time of the UAVs when performed data collection missions. The optimization goal is to keep the flight time and energy consumption of the UAV minimal while collecting data. The energy consumption of a UAV typically comprises two major components: the propulsion energy and communication-related energy [18]. The latter consists of the energy utilized for communication circuits, signal radiation/reception, signal processing, and so on. For the purpose of this study, we consider the communication-related energy constant. To maintain the UAV at high altitude and to support its motion, propulsion energy is consumed. Typically, the propulsion energy depends on the flight speed, acceleration, jerk of the UAV, and so on. We take interest in the effort or smoothness of the trajectory, i.e., the square L 2 -norm of the control input j [ n ] , a [ n ] and v [ n ] , which represent the energy cost in a dynamic system. Hence, we express the energy optimization function as below:
f 1 ( J ) = ω 1 V T V + ω 2 A T A + ω 3 J T J = J T ω 1 T v T T v + ω 2 T a T T a + ω 3 I J + 2 ω 1 B v T T v + ω 2 B a T T a J + c o n s t a n t .
where f 1 ( J ) represents the smoothness and energy consumption of the UAV trajectory. I is the identity matrix; ω 1 , ω 2 , ω 3 are the weighting factors. The c o n s t a n t = ω 1 B v T B v + ω 2 B a T B a does not need to be considered in the optimization. Therefore, we formulate the optimization problem as follows:
P 0 : min J , N J T ω 1 T v T T v + ω 2 T a T T a + ω 3 I J + 2 · ω 1 B v T T v + ω 2 B a T B a J
st: P = T p J + B p (26a)
V = T v J + B v (26b)
A = T a J + B a (26c)
V max B v T v J V max B v (26d)
A max B a T a J A max B a (26e)
H min B p z T p J z H max B p z (26f)
p [ 0 ] = p 0 , v [ 0 ] = v 0 , a [ 0 ] = a 0 (26g)
p [ N ] = p N , v [ N ] = v N , a [ N ] = a N (26h)
n = 1 N ζ n k r k [ n ] δ Q t h k , k K (26i)
ζ n k = I max ( r k [ n ] r t h , 0 ) , n N (26j)
P obstacles (26k)
and
I ( x ) = 1 , x 0 0 , x 0
where (26a), (26b) and (26c) are the UAV motion primitives based on model prediction. (26d) and (26e) are the motion constraints of the UAV, which limit the range of the maximum velocity and maximum acceleration: and V max = v max · I N × 1 and A max = a max · I N × 1 . (26f) is the height constraint of the UAV, and (26g) and (26h) are the start and end state constraints. (26i) represents the collected data amount of the k-th sensor, where ζ n k is the effective collection indication, and Q t h k is the minimum collection requirement. (26j) is the minimum communication rate of the sensor given according to the actual communication system. Moreover, (26k) is the obstacle avoidance constraint, which is usually a non-convex constraint that limits the UAV motions to a safe area. The formulated problem P0 is difficult to solve directly for the following reasons: (i) The mission completion time of UAVs is closely related to the dimensions of other state variables, which make it difficult to determine the constraints; (ii) the constraints (26i) and (26k) are non-convex. To this end, we solve this problem through the introduction of slack variables and the use of SCA.

3. Global Replanning Based on CFC

3.1. General Framework

The major challenge in optimally solving (P0) is to optimize the variable N and non-convex constraints (26i) and (26k), which involve uncertainty of other optimization variables and indicator functions (26j) with respect to the UAV trajectory. Without affecting the optimality of (P0), the trajectory of the UAV can be considered to constitute only the connecting line segment [6]. This conclusion means that finding the optimal solution to (P0) is comparable to finding an ordered set of waypoints containing positions that represent the start and end points of each segment and to optimizing the instantaneous speed of the UAV on the trajectory linking these waypoints. To this end, as shown in Figure 2, the task time N and trajectory energy consumption are decoupled in the optimization objective. First, minimum time discrete path initialization based on a CFC is proposed under the condition that the minimum discrete-time slot is δ . Second, we use the SCA algorithm to optimize the global path according to the initialization path. Third, a B-spline method is used to smooth the trajectory in a minimum discrete-time slot, δ . After executing the trajectory of the time slot δ , the communication channel state and state information of the UAV itself (including the position, velocity, and acceleration) are re-estimated and updated. Finally, the operation starting from path initialization is repeated until the destination point is reached. We will present the path initialization, path optimization, and B-spline trajectory optimization in more detail.

3.2. Global Path Planning Based on SCA

For the nonconvex problem P 0 , we perform the following for the nonconvex constraints (26i), constraints (26j) and constraints (26k). We first introduce the auxiliary variables κ [ n ] for constraints (26i) and constraints (26j) in the following equivalent form: For the non-convex problem P0, we perform the following steps for the non-convex constraints (26j) and constraints (26j) and constraints (26k). First, we introduce the auxiliary variables κ [ n ] for the constraints (26i) and (26j) with the following equivalent form:
n = 1 N κ k [ n ] · r k [ n ] · δ Q t h , k K ,
κ k [ n ] · r k [ n ] κ k [ n ] · r t h , k K ,
κ k [ n ] 0 , 1 , k K .
Proof. 
Constraint (28) shows that κ k [ n ] can only be 1 when r k [ n ] r t h . Otherwise, it is zero. The minimum amount of data collected constantly must be higher than Q t h , and the constraint (28) is only valid when some κ k [ n ] equal to 1. Hence, the constraints (28) and (29) can make the UAV “pass through” the “surrounding” of each SN during its flight while remaining at a low velocity for a period of time based on the minimum amount of collected data.    □
However, constraints (28) and (29) are still non-convex. For r k [ n ] , the auxiliary variables S k [ n ] and I k [ n ] are introduced to obtain the following relation:
n = 1 N κ k [ n ] · r ˜ k [ n ] · δ Q t h ,
where r k [ n ] r ˜ k [ n ] = B · log 2 ( 1 + S k [ n ] 1 I k [ n ] ) . The auxiliary variables S k [ n ] and I k [ n ] must meet the following conditions:
S k [ n ] 1 β 0 p 0 d k [ n ] α , S k [ n ] > 0 ,
I k [ n ] j β j p j d j [ n ] α + σ 2 .
For constraint (32), we can rewrite the convex constraint as follows:
d k [ n ] α - β 0 p 0 S k [ n ] 0 , S k [ n ] > 0 .
However, constraint (33) is still non-convex. We perform a first-order Taylor expansion:
d j α [ n ] = ( p x p j x ) 2 + ( p y p j y ) 2 + ( p z p j z ) 2 α / 2 L j r [ n ] α / 2 α L j r [ n ] α / 2 1 ( p r p j ) T · ( p p r ) ,
where L j [ n ] = ( p x p j x ) 2 + ( p y p j y ) 2 + ( p z p j z ) 2 , and L j r [ n ] , p r are the initial values of the r-th iteration. This results in a new convex constraint (36), which is a relaxation of constraint (33):
I k [ n ] j β j p j L j r [ n ] α / 2 A j r [ n ] + σ 2 ,
where A j r [ n ] = α L j r [ n ] α / 2 1 ( p r p j ) T · ( p p r ) . For constraint (31), we further introduce an auxiliary variable ε [ n ] , that is less than the first-order Taylor expansion of r ˜ k [ n ] .
ε k [ n ] U k r [ n ] + V k r [ n ] ( S k [ n ] S k r [ n ] ) + W k r [ n ] ( I k [ n ] I k r [ n ] ) ,
where U k r [ n ] = B · log 2 ( 1 + 1 S k r [ n ] I k r [ n ] ) , V k r [ n ] = B · log 2 e S k r [ n ] + S k r [ n ] 2 I k r [ n ] , and W k r [ n ] = B · log 2 e I k r [ n ] + I k r [ n ] 2 S k r [ n ] . Therefore, a further relaxed form of the constraint (31) can be obtained
n = 1 N κ k [ n ] · ε k [ n ] · δ Q t h ,
Constraint (38) is still a non-convex constraint owing to the product of the indicator function variable κ k [ n ] and variable ε k [ n ] . Thus, we continue to relax the indicator function:
0 κ k [ n ] 1 ,
κ k [ n ] · κ k [ n ] 1 0 .
The convex constraints can be obtained via a Taylor expansion and κ k [ n ] · ε k [ n ] = ( κ k [ n ] + ε k [ n ] ) 2 ( κ k [ n ] ε k [ n ] ) 2 4 for constraints (29), (38) and (40)
H k r [ n ] 2 2 H k r [ n ] ( κ k [ n ] + ε k [ n ] ) + ( κ k [ n ] ε k [ n ] ) 2 4 κ k [ n ] · r t h ,
n = 1 N [ H k r [ n ] 2 2 H k r [ n ] · ( κ k [ n ] + ε k [ n ] ) + ( κ k [ n ] ε k [ n ] ) 2 ] · δ 4 Q t h ,
2 κ k r [ n ] · κ k [ n ] κ k [ n ] κ k r [ n ] 2 0 .
where H k r [ n ] = ( κ k r [ n ] + ε k r [ n ] ) . Thus, we obtain the new convex constraints (41), (42) and (43) of problem P1 after the equivalent transformation and relaxation of constraints (26i) and (26j). In the next step, we continue to deal with the non-convex constraint (26k) of problem P1. The obstacles in the environment are modeled as cylinders. The UAV must keep a certain safe distance to them during its flight. We set the safe distance as d s a f e . During the task, the UAV should ensure that the distance between the projection coordinates and the center coordinates of the bottom surface of the cylindrical obstacle exceeds the safe distance or that its flight height is much higher than that of the cylinder to ensure a safe flight. The respective safety constraint between the UAV and obstacle m is as follows:
p x y [ n ] p m d s a f e o r p z [ n ] h m + d s a f e .
This is an “or” constraint that is non-convex. In addition, p x y [ n ] represents the two-dimensional coordinates projected by the UAV onto the ground, and p z [ n ] is the flight height of the UAV. By introducing the variables 0 and 1, we can express the equivalent form of the constraint (44) as follows:
p x y [ n ] p m + λ x y , m [ n ] · C d s a f e ,
p z [ n ] + λ z , m [ n ] · C h m + d s a f e ,
λ x y , m [ n ] + λ z , m [ n ] 1 ,
λ x y , m [ n ] , λ z , m [ n ] 0 , 1 .
where C is a big positive constant and λ x y , m [ n ] , λ z , m [ n ] are is a binary number. We further relax these binary integer constraints
( p x y r [ n ] p m ) T · ( p x y [ n ] p x y r [ n ] ) A m r [ n ] d s a f e λ x y , m [ n ] · C A m r [ n ] .
where A m r [ n ] = p x y r [ n ] p m . By relaxing λ x y , m and λ z , m in constraint (48), the new constraints can be obtained as follows:
0 λ i , m [ n ] 1 , i x y , z ,
λ i , m [ n ] ( λ i , m [ n ] 1 ) 0 , i x y , z ,
The relaxation form of the non-convex constraint (51) can be obtained via a Taylor expansion
λ i , m r [ n ] 2 + 2 λ i , m r [ n ] λ i , m [ n ] λ i , m [ n ] 0 .
where λ i , m r [ n ] is the r-th iteration of λ i , m [ n ] . So far, we have dealt with all the non-convex constraints in P0 to obtain the new optimization problem as follows:
P 1 : min J , κ , λ , ε , I , S J T ω 1 T v T T v + ω 2 T a T T a + ω 3 I J + 2 · ω 1 B v T T v + ω 2 B a T B a J
st: P = T p J + B p (54a)
V = T v J + B v (54b)
A = T a J + B a (54c)
V max B v T v J V max B v (54d)
A max B a T a J A max B a (54e)
H min B p z T p J z H max B p z (54f)
p [ 0 ] = p 0 , v [ 0 ] = v 0 , a [ 0 ] = a 0 (54g)
p [ N ] = p N , v [ N ] = v N , a [ N ] = a N (54h)
H k r [ n ] 2 2 H k r [ n ] ( κ k [ n ] + ε k [ n ] ) + ( κ k [ n ] ε k [ n ] ) 2 4 κ k [ n ] · r t h (54i)
i = 1 N [ H k r [ n ] 2 2 H k r [ n ] · ( κ k [ n ] + ε k [ n ] ) + ( κ k [ n ] ε k [ n ] ) 2 ] · δ 4 Q t h (54j)
2 κ k r [ n ] · κ k [ n ] κ k [ n ] κ k r [ n ] 2 0 (54k)
( p x y r [ n ] p m ) T · ( p x y [ n ] p x y r [ n ] ) A m r [ n ] d s a f e λ x y , m [ n ] · C A m r [ n ] (54l)
p z [ n ] + λ z , m [ n ] · C h m + d s a f e (54m)
λ x y , m [ n ] + λ z , m [ n ] 1 (54n)
0 λ i , m [ n ] 1 , i x y , z (54o)
λ i , m r [ n ] 2 + 2 λ i , m r [ n ] λ i , m [ n ] λ i , m [ n ] 0 (54p)
Evidently, the problem is a convex optimization problem that can be addressed through the application of standard convex optimization technology or CVX (for instance, the interior-point method). However, some of the constraints in the previously presented optimization problem are sensitive to the initial value after relaxation. Although we have designed a continuous convex approximation method to solve the problem, the influence of the initial value is still not negligible. It will influence the convergence time of the algorithm and the optimal solution. To this end, we designed a CFC-based initialization method, which will be described in detail in the next section.

3.3. Minimum Time Path Initialization Based on CFC

In practice, the communication capability of SNs is limited by the power and environment. It is usually necessary to calculate the communication link under the constraints of the demodulator threshold, bit error rate, receiver sensitivity, and so on to determine the supported communication range. We propose flight path segmentation based on a CFC. Full-speed flight paths are generated according to the trapezoidal criterion [5]. To find the CFC, we define the effective communication area of the SN k free of interferers: I j , k = min { β 0 p j d k , j α , β 0 p j d max α } , where is the trajectory within the effective communication area of the SN, and is the maximum distance. To produce a convex CFC from the jammers and SN, the following procedures are performed:
  • Find the nearest jammer: calculate the distance between all the jammers and SN k, choose the nearest jammer j * , and let the jamming value of the other jammers be I j , k = min { β 0 p j d k , j α , β 0 p j d max α } , which is the investigated worst-case scenario we have in mind because the jamming value of interferer j would not surpass I j , k in the SN k communication region.
  • Find critical points: on the line segment between jammer j * and the central position of SN k, find a point P j * , k along the direction of the center of the SN communication circle that will meet the communication rate larger than R min .
  • Find CFC: pass through p j * , k and ensure that the perpendicular l k , j * is on a line between jammer j * and SN k.
The intersection of the half-space on the vertical l k , j * side of SN k and the communication range of SN k, is the CFC, which is a convex polyhedron. The detailed construction process is described in Algorithm  1. It divides the UAV path into two paths: the communication path and full-speed flight path. The UAV data are collected on the communication path, which is within the effective communication range.
Algorithm 1: Given the position of SN k and the position of jammer, find CF C k .
  1:
function Find_CFC( p k , p , p j )
  2:
Set the jammer set j a m m e r _ o p e n _ l i s t = { 1 , 2 , , J } and j a m m e r _ c l o s e _ l i s t = { } .
  3:
Search for jammer closest to the sensor node:
  4:
j * = arg min j J p k p j
  5:
Remove j * from the set:
  6:
j a m m e r _ o p e n _ l i s t j *
  7:
j a m m e r _ c l o s e _ l i s t j *
  8:
Set the energy of the remaining jammer:
  9:
I j , k = min { β 0 P j d k , j α , β 0 P j d max α }
10:
Get the line segment p k , p j * between the nearest jammer, and search for point p j * , k to make it meet:
   p j * , k = arg max p m , k [ p k , p j * ] p j , k p k
11:
   s . t . B · log 2 1 + β 0 p k p [ n ] w k α I k + σ 2 R min I k = j = 0 , j j * M I j , k + β 0 p k p j , k p k α
12:
if there is no p j * , k , it is determined that SN k cannot perform the data collection, stop algorithm.
13:
else continue
14:
Find the perpendicular of line segment p k , p j * through point p j * , k :
15:
a j * T w = b j *
16:
Search for jammer j belonging to C k , n ( p k ) and perpendicular to line segment p k , p j * through w m :
17:
a j T w = b j
18:
combine perpendiculars:
19:
A k a 0 T a 1 T , b k b 0 b 1
20:
Calculate the CFC:
21:
Ω k , n = C k , n ( p k ) A k · p b k , Ω j Ω k , n
22:
end
After acquiring the CFC, the initialization generates discrete points on the path according to the “trapezoidal principle” because we expect the UAV to be as slow as possible when approaching the SN during data collection. Thus, it needs enough time to complete the task. We conduct the analysis for the case of only one SN, as shown in Figure 3 (the green area is the CFC).
We first connect the starting point p 1 to sensor position point p 3 and terminal position point p 5 . The intersection points of the line segment and CFC are denoted as p 2 and p 4 . Furthermore, p 1 p 2 allocates the time and determines the position of discrete points according to the trapezoidal preparation. The UAV accelerates from the initial position to the maximum velocity, remains at the maximum velocity for a while and finally gradually slows down to zero velocity to reach the end point. The total flight time of this period is t 1 . In addition, the acceleration period is t 11 , the period of uniform movement is t 12 , and the period of deceleration is t 13 such that t 1 = t 11 + t 12 + t 13 , where t 11 = v max a max = t 13 , t 12 = d 1 v max v max a max , and d 1 is the distance of p 1 p 2 . Therefore, the number of discrete points on the p 1 p 2 segment can be obtained as follows:
N 11 = r o u n d ( v max a max · δ ) = N 13 ,
N 12 = r o u n d ( d 1 v max · δ v max a max · δ ) .
Consequently, the discrete points of segment p 1 p 2 can be expressed as follows:
p 1 ( n ) = p 1 ( 0 ) + 1 2 a max · ( n · δ ) 2 , n = 0 , , N 11 1 p 1 ( N 11 1 ) + v max · n · δ , n = 1 , , N 12 p 1 ( N 12 ) + v max · n · δ 1 2 a max · ( n · δ ) 2 , n = 1 , , N 13
p 2 p 3 and p 3 p 4 are located in the CFC and can meet the minimum communication rate. We suppose that the time Q t h r t h is necessary to collect data at the minimum rate r t h and the requested minimum quantity Q t h . This time period comprises two flight paths with the flight times t 2 and t 3 , respectively:
t 2 + t 3 = Q t h r t h ,
N 2 + N 3 = Q t h r t h · δ .
We let these two trajectories move at a constant speed. Thus, N 2 N 3 = d 2 d 3 , where d 2 and d 3 are the distances of p 2 p 3 and p 3 p 4 , respectively. We determine N 2 and N 3 as follows:
N 2 = Q t h r t h · δ · d 2 d 2 + d 3 ,
N 3 = Q t h r t h · δ · d 3 d 2 + d 3 ,
p 2 ( n ) = ( 1 n N 2 ) · p 2 ( 0 ) + n N 2 · p 2 ( N 2 1 ) ,   n = 1 , , N 2 ,
p 3 ( n ) = ( 1 n N 3 ) · p 3 ( 0 ) + n N 3 · p 3 ( N 3 1 ) ,   n = 1 , , N 3 .
where p 2 ( 0 ) = p 2 and p 3 ( 0 ) = p 3 . p 4 p 5 and p 1 p 2 can be processed in the same way. Therefore, we can obtain the initial waypoints of the global plan according to Algorithm 2.
Algorithm 2: For a given initial position p 0 , end position p N , and position of the jammer and SN, find the initial global discrete path.
  1:
function  I n i t i a l _ C F C _ p a t h ( p 0 , p N , p S N , p j a m m e r )
  2:
Compute the C F C of the S N with Algorithm 1:
  3:
 Find_CFC( p S N , p U A V , p j a m m e r )
  4:
Set the initial point to p 1 , the end point to p 5 , and the S N position to p 3 :
  5:
p 2 = p 1 p 3 C F C , p 4 = p 3 p 5 C F C
  6:
if UAV is not in CFC and Q c u r r e n t Q t h
  7:
 Calculate the discrete points of p 1 p 2 and p 4 p 5 according to Equation (57)
  8:
 Calculate the discrete points of p 2 p 3 and p 3 p 4 according to Equations (60) and (61)
  9:
elsif UAV is in CFC and Q c u r r e n t Q t h
10:
 Calculate the discrete points of p 4 p 5 according to Equation (57)
11:
 Calculate the discrete points of p 2 p 3 and p 3 p 4 according to Equations (60) and (61)
12:
else
13:
 Calculate the discrete points of p U A V p 5 according to Equation (57)
14:
Output the path discrete point:
15:
p i n i t C F C = { p 1 ( 0 ) p 2 ( 0 ) p 3 ( 0 ) p 4 ( 0 ) }
16:
end
It is worth noting that if the UAV enters the CFC during its flight, the discrete points of p 1 p 2 are not calculated. If the amount of collected data meets the requirements, the UAV p 3 p 4 and p 2 p 3 will no longer be calculated. However, the discrete points of the line segment from the position of the UAV to the destination will be calculated directly.
The initial path obtained by the Algorithm 2 does not consider the treatment of obstacles. Therefore, we continue to design a method based on expansion for the treatment of obstacles.
As shown in Figure 4, we first detect the initial path points generated based on the CFC. If these points are within the obstacle area, we move the direction of the vertical line to where these path points are located until a safe distance from the obstacle is found. This is accomplished through the following four steps: (1) Calculate the equation of the line for the neighboring points p i n i t C F C ( i 1 ) and p i n i t C F C ( i ) on p i n i t C F C ; (2) calculate the distance d v from the center of the obstacle to l p i n i t C F C ( i 1 ) p i n i t C F C ( i ) ; (3) determine if the distance d v is shorter than r s a f e . Calculate the vertical line l p i n i t C F C ( i ) p m going through the point p i n i t C F C ( i ) ; (4) search for a point p v on the vertical line l p i n i t C F C ( i ) p v which satisfies that the distance from the obstacle center p m to p i n i t C F C ( i 1 ) is greater than r s a f e . Use that point as the new p i n i t C F C ( i ) . The specific implementation steps are shown in Algorithm 3.
Algorithm 3: For a given initial CFC path p i n i t C F C , the position of obstacles p m , the safe distance r s a f e , and step factor λ to find the initial global obstacle avoidance discrete path.
  1:
function  I n i t i a l _ O A _ p a t h ( p i n i t C F C , p m , r s a f e , λ )
  2:
Loop for  i = 2 , 3 , · · ·
  3:
 Calculate the line going through points p i n i t C F C ( i 1 ) and p i n i t C F C ( i )
  4:
a = p i n i t C F C ( i ) p i n i t C F C ( i 1 )
  5:
Λ = 0 1 1 0
  6:
a T Λ p = a T Λ p i n i t C F C ( i )
  7:
Loop for m = 1 , 2 , · · ·
  8:
  if  a T Λ p m a T Λ p i n i t C F C ( i ) a r s a f e and p i n i t C F C ( i ) - p m r m
  9:
   Calculate the vertical line
10:
    a T p = a T p i n i t C F C ( i )
11:
    Take a point on the vertical line p v
12:
    Let a v = p v p i n i t C F C ( i 1 )
13:
   while  a v T Λ p m a v T Λ p v a v < r s a f e
14:
     p v = p v λ · p v p i n i t C F C ( i ) p v p i n i t C F C ( i )
15:
    and a v = p v p i n i t C F C ( i 1 )
16:
   endwhile
17:
   p i n i t C F C ( i ) = p v
18:
endif
19:
End Loop
20:
End Loop
21:
p i n i t O A = p i n i t C F C
22:
return p i n i t O A
23:
end

3.4. Replanning

Based on the previously presented conclusions regarding the initialization path, we propose an SCA-based solution method for the convex optimization problem P1. The method approximates the optimal solution of the original problem P0 one by one through good initialization values and an iterative method based on Taylor expansions. The specific steps are shown in Algorithm 4. First, we initialize the state of the UAV and mission settings. Subsequently, we generate the communication corridor path and safe flight path for obstacle avoidance as the initial values to solve the optimization problem P1 according to the mission requirements. Good initial values enable the iteration-based SCA algorithm to converge quickly and obtain a local solution. However, in the actual mission environment, the disturbance sources and obstacles may change dynamically, and the path determined at one point in time is not applicable to the whole flight process. For this reason, we propose a planning algorithm based on replanning in which the UAV plans a new trajectory at a certain frequency. The specific process is shown in Algorithm 5.
Algorithm 4: SCA-based trajectory planning method for (P1)
  1:
Initialization:
  2:
 Set the number of iterations r = 0 .
  3:
 Set the initial state of the UAV, position, speed, acceleration, etc.
  4:
 Set the minimum required amounts of the communication bandwidth B and data Q t h . Calculate the maximum communication distance d k max and maximum communication rate r t h in accordance with the transmission system.
  5:
 Generate a CFC that satisfies the data collection conditions with Algorithm 1.
  6:
   Generate the initial CFC-based path with Algorithm 2.
  7:
  Generate an obstacle avoidance path based on the initial CFC path for a safe flight with Algorithm 3.
  8:
 Initialize p r [ n ] , κ k r [ n ] , ε k r [ n ] , λ i , m r [ n ] , etc. with the path p i n i t O A generated by Algorithm 3, for n = 1 , · · · , N .
  9:
Repeat
10:
 Solve the problem (P1) by CVX and acquire the optimal solutionsn p * [ n ] , κ k * [ n ] , ε k * [ n ] and λ i , m *
11:
 Update the optimization variables and slack variables at the r-th iteration following:
12:
   w r + 1 [ n ] = w * [ n ] ;
13:
   κ k r + 1 [ n ] = κ k * [ n ] ;
14:
   ε k r + 1 [ n ] = ε k * [ n ] ;
15:
   λ i , m r + 1 [ n ] = λ i , m * [ n ] ;
16:
 Update r = r + 1
17:
Until some termination conditions are met
Algorithm 5: Receding horizon planning.
1:
Initialization: Set the minimum communication bandwidth B and data amount Q t h . Calculate the minimum communication rate r t h and maximum communication distance d k max in accordance with the transmission system, maximum UAV speed v m a x , maximum acceleration a m a x , maximum flight height H m a x , start position p 0 , and end position. And let init state s U A V = [ p 0 , 0 , 0 ] .
2:
While:  p u a v p N ζ   do
3:
 Update the UAV states
4:
 Solving for global paths with Algorithm 5
5:
 Select a section of path points for B-spline smoothing
6:
End
To obtain a more suitable trajectory for the flight control module, we used B-splines to smooth the path in Algorithm 5. N Q path points were chosen as control points for the homogeneous B-spline curve according to the set replanning frequency, which is uniquely identified via its p b , N Q control points { Q 1 , Q 2 , , Q N Q } and a knot vector { t 1 , t 2 , , t M Q } , where M Q = N Q + p b . To simplify and improve the efficiency of the trajectory assessment, the B-spline employed in our approach is homogeneous, which implies that each knot has the same time interval δ between it and its predecessor. We normalize t as follows: s ( t ) = ( t t m ) ( t t m ) δ δ . The matrix representation can be used to assess the location [29]:
p [ s ( t ) ] = s ( t ) T M p b + 1 q m ,
s ( t ) = 1 s ( t ) s 2 ( t ) s p b ( t ) T ,
q m = Q m p b Q m p b + 1 Q m p b + 2 Q m T .
where M p b + 1 is a constant matrix determined by p b . In our implementation, p b is set as 3, and the third-order M p b + 1 matrix has the following form:
M 4 = 1 3 ! 1 4 0 0 3 0 3 0 3 6 3 0 1 3 3 1 .

3.5. Convergence and Complexity Analysis

Motion planning of a UAV in a data collection mission with dynamic jamming consists of five main parts: CFC construction, generation of the initial CFC path, generation of a safe path, SCA-based path optimization, and B-spline-based trajectory optimization. The convergence of the algorithm depends mainly on solving the P1 problem, which uses a method based on SCA. Section 2.1.2 in [30] presents an analysis of the convergence of SCA. We set x ¯ as the limit point of the iterative result produced via Algorithm 4, which met and slater condition holds at the point x ¯ . Subsequently, x ¯ becomes a KKT point of P1. First of all, problem P1 indicates that there exist 5 M N obstacle avoidance constraints of the UAV, 3 N speed constraints, 3 N initial position constraints, and 3 N end position constraints, 6 N equation of state constraints, and a 4 N K quality of communication link or the amount of collected data. Hence, the computational complexity is approximately O ( R ( 5 M N + 12 N + 4 N K ) ) , where R represents the number of iterations, M is the obstacle number, N is the number of time slots, and K is the SN number. In the construction process of the CFC, the goal is to acquire an effective communication area by applying geometric approaches. The complexity is only associated with the number of sensors and jammers. Thus, its complexity is O ( K J ) . In the generation of the CFC initial path and safe path, the calculation volume is also related to the number of obstacles and number of sensors. Thus, the assistance is also O ( 2 K M ) . Finally, the B-spline trajectory only computes a local number of control points. Because we can ignore the number of operations, the total complexity is O ( R ( 5 M N + 12 N + 4 N K ) + 2 K M + K J + N ) . It is worth mentioning that motion planning in this paper is divided into global path planning and local trajectory optimization.The replanning time of global path planning is 1Hz; that is, it is updated once every second.In the hardware environment mentioned in reference [12], when the main frequency is 3 GHz, for a sensor, when the number of obstacles is 5, the number of interference sources is 2, the number of discrete points is 100, and the calculation time of the algorithm is about 3 ms. Therefore, it can fully support 1 s update frequency of path planning.At the same time, the local trajectory optimization directly selects the path points and adopts the B-spline method for fitting, which takes almost no time and is consistent with the literature [27]. The planning time is about 0.8ms, which can support the update frequency of 1000 Hz.

4. Simulations and Discussion

In this section, we present the results of numerical simulations to compare the algorithm in this paper with the SCA algorithm forinitialization proposed in [6] and the traditional DWA algorithm for dynamic environments. We mainly consider two dynamic sources of interference and several obstacles in the environment. To facilitate the simulation, we simulate a data collection task for an SN. Table A1 lists some crucial parameters and their values. We made some changes to ensure that the SCA algorithm for AStar initialization from [6] is applicable to the scenario presented. In this paper, we divide the path into two segments: the paths between the origin and the SN and between the SN and the end point. The two paths are initialized separately with the A star algorithm. We further interpolate the A star initial path points in order to obtain initial conditions that can meet the required data volume. For the DWA algorithm, we design different cost functions depending on the stage of the task, as shown in Appendix A.
Figure 5 presents the motion plan for 200 kbit data collection in an environment without jamming and environments with static and dynamic jamming. In the jamming-free environment, the SN has the largest communication range, which covers the entire mission path of the UAV. In the static environment, the communication range of the SN is smaller and “pear-shaped”; the UAV can only collect data within this area. The communication range of the SN varies according to the motion of a jammer in a dynamic environment.
The red dashed line in Figure 6 represents the global path that is initialized via the CFC, the blue dashed line denotes the global path that is initialized via the AStar algorithm, and the green dashed line denotes the local path that is initialized through the DWA. The light green region is the SN’s effective communication range; in the absence of interference, it should be a circle in the 2D top view. The effective communication range of the SN becomes “pear-shaped” when suppressed by two sources of interference. The grey circle is the obstacle, and the 3D shape is a cylinder. Evidently, both the red dashed and blue dashed lines are at safe distances from the obstacle and pass through the SN. This is exactly what we want: a safe initial path to collect data.
Figure 7 illustrates the residual amount of data collected by the UAV during the mission. In the jamming-free environment, the CFC and AStar algorithms complete the mission in approximately 25 s, while the DWA algorithm needs 30 s. In the static jamming environment, the CFC and AStar algorithms complete the entire mission in approximately 40 s, whereas the DWA algorithm needs 45 s. In the jamming interference environment, the CFC and AStar algorithms require similar times to complete the task, while the DWA algorithm needs more time.
Figure 8 shows the normalized energy consumption of the UAV. We used the integral of the UAV acceleration to present the UAV energy consumption. According to the figure, the DWA algorithm consumes much more energy than the CFC and AStar algorithms for the three environments. The AStar algorithm consumes slightly less energy than the CFC algorithm in the jamming-free environment, whereas the CFC consumes slightly less energy than the AStar algorithm in the jamming environment. It is also worth noting that the complexity of the AStar algorithm is O ( N 2 log N ) , while the complexity of the CFC algorithm is only O ( K J + 2 K M + N ) . Therefore, collecting data with the CFC algorithm is much less expensive than with the AStar algorithm.
The UAV trajectories for the different required data volumes are shown in Figure 9. Accordingly, the UAV trajectories planned for a required data volume of 0 bits ignore the communication corridors and interference. With growing amount of required data, the UAV trajectory stays in the communication corridor for a longer period of time.
Figure 10 shows the variation in the amount of remaining data for different collection requirements. The larger the amount of required data, the longer the task takes to be completed, which is in line with the general rule. Figure 11 shows the variation in the in-flight energy consumption for different collection requirements. The lowest energy is consumed for zero collected data, and the highest energy is consumed for the collection of 1 Mbit.
Figure 12 displays the instantaneous communication rate of the UAV for different amounts of required data. The sky-blue dashed line indicates the communication threshold. Evidently, the greater the data demand exceeds the communication threshold area; for example, the red line in the figure is the instantaneous communication rate when the data collection volume is 0, which is basically less than the communication threshold. It does not need to consider the data collection task only needs to fly with the lowest energy consumption to focus. When the data collection volume is 1 Mbit (as shown by the green curve in the diagram), it will stay above the communication threshold as much as possible until the task has been completed.
Figure 13 and Figure 14 show the speed and flight altitude of the UAV during data collection for different required data volume, respectively. The UAV accelerates, decelerates, accelerates, and decelerates again, which is very much in line with the trapezoidal criterion we used during initialization. Therefore, the UAV should fly at full speed before entering the CFC, then decelerate appropriately to remain in the area long enough to collect the required amount of data in the CFC, and then fly at full speed to the end point. The flight altitude also increases and then decreases, which is very much in line with the dynamics of a low-energy flight.

5. Conclusions

In this study, the motion programming of UAVs collecting data in a dynamic jamming environment was examined. Our main optimization objective was to find a safe path that consumes a minimum amount of energy and results in the required amount of collected data. As the constructed optimization problem is non-convex, we introduced auxiliary and relaxation variables to relax the original problem and used the SCA algorithm to solve the new relaxation problem. To obtain a well-localized optimal solution with the SCA algorithm, we propose a fast initialization path method that is based on a CFC for processing. We constructed the CFC and solved for the initial path of the UAV with the UAV’s perceived interference intensity and the transmission capability of the SN. Finally, we compared the simulation results with those of the AStar and DWA algorithms. The results demonstrate that the algorithm presented in the current paper is feasible and performs reliably.

Author Contributions

Methodology, D.G.; Software, C.X.; Formal analysis, B.Z.; Investigation, W.M.; Writing—original draft, B.W.; Funding acquisition, H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Key simulation parameters.
Table A1. Key simulation parameters.
The NotationPhysical MeaningValue
P 0 SN transmission power500 mW
P j Jammer transmission power5000 mW
BTotal channel bandwidth10 kHz
v max Maximum UAV speed25 m/s
a max Maximum UAV acceleration5 m/s
H max Maximum UAV height200 m
H min Minimum UAV height10 m
σ 2 Noise power spectral density−169 dBm/Hz
α Path loss exponent2
r t h Minimum collection rate2.4 kbps
δ Minimum update period1 s
f c Communication carrier frequency2 GHz

References

  1. Ding, G.; Wu, Q.; Zhang, L.; Lin, Y.; Tsiftsis, T.A.; Yao, Y.-D. Anamateur drone surveillance system based on the cognitive internet of things. IEEE Commun. Mag. 2018, 56, 29–35. [Google Scholar] [CrossRef] [Green Version]
  2. Zhao, J.; Gao, F.; Wu, Q.; Jin, S.; Wu, Y.; Jia, W. Beam tracking for uav mounted satcom on-the-move with massive antenna array. IEEE J. Sel. Areas Commun. 2018, 36, 63–375. [Google Scholar] [CrossRef] [Green Version]
  3. Zeng, Y.; Wu, Q.; Zhang, R. Accessing from the sky: A tutorial on uav communications for 5g and beyond. Proc. IEEE 2019, 107, 2327–2375. [Google Scholar] [CrossRef] [Green Version]
  4. Liu, J.; Sheng, M.; Lyu, R.; Li, J. Performance analysis and optimization of uav integrated terrestrial cellular network. IEEE Internet Things J. 2019, 6, 1841–1855. [Google Scholar] [CrossRef]
  5. Wu, B.; Zhang, B.; Guo, D.; Wang, H.; Jiang, H. Anti-jamming trajectory design for uav-enabled wireless sensor networks using communication flight corridor. China Commun. Engl. Ed. 2022, 19, 16. [Google Scholar] [CrossRef]
  6. Wu, B.; Guo, D.; Zhang, B.; Zhang, X.; Wang, H.; Wang, H.; Jiang, H. Completion time minimization for uav enabled data collection with communication link constrained. IET Commun. 2022, 16, 1025–1040. [Google Scholar] [CrossRef]
  7. Chen, J.; Liu, T.; Shen, S. Online generation of collision-free trajectories for quadrotor flight in unknown cluttered environments. In Proceedings of the 2016 IEEE International Conference on Robotics and Automation (ICRA), Stockholm, Sweden, 16–21 May 2016; pp. 1476–1483. [Google Scholar]
  8. Gao, F.; Wu, W.; Lin, Y.; Shen, S. Online safe trajectory generation for quadrotors using fast marching method and bernstein basis polynomial. In Proceedings of the 2018 IEEE International Conference on Robotics and Automation (ICRA), Brisbane, Australia, 21–25 May 2018; pp. 344–351. [Google Scholar]
  9. Liu, J.; Jayakumar, P.; Stein, J.L.; Ersal, T. A nonlinear model predictive control formulation for obstacle avoidance in high-speed autonomous ground vehicles in unstructured environments. Veh. Syst. Dyn. Int. J. Veh. Mech. Mobil. 2018, 56, 853–882. [Google Scholar] [CrossRef]
  10. Liu, S.; Watterson, M.; Mohta, K.; Sun, K.; Bhattacharya, S.; Taylor, C.J.; Kumar, V. Planning dynamically feasible trajectories for quadrotors using safe flight corridors in 3-d complex environments. IEEE Robot. Autom. Lett. 2017, 2, 1688–1695. [Google Scholar] [CrossRef]
  11. Gao, F.; Wu, W.; Pan, J.; Zhou, B.; Shen, S. Optimal time allocation for quadrotor trajectory generation. In Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, Spain, 1–5 October 2018. [Google Scholar]
  12. Zhou, B.; Gao, F.; Wang, L.; Liu, C.; Shen, S. Robust and efficient quadrotor trajectory generation for fast autonomous flight. IEEE Robot. Autom. Lett. 2019, 4, 3529–3536. [Google Scholar] [CrossRef] [Green Version]
  13. Wang, H.; Wang, J.; Ding, G.; Chen, J.; Gao, F.; Han, Z. Completion time minimization with path planning for fixed-wing uav communications. IEEE Trans. Wirel. Commun. 2019, 18, 3485–3499. [Google Scholar] [CrossRef]
  14. Zhan, C.; Zeng, Y. Completion time minimization for multi-uavenabled data collection. IEEE Trans. Wirel. Commun. 2019, 18, 4859–4872. [Google Scholar] [CrossRef]
  15. Gu, J.; Wang, H.; Ding, G.; Xu, Y.; Xue, Z.; Zhou, H. Energyconstrained completion time minimization in uav-enabled internet of things. IEEE Internet Things J. 2020, 7, 5491–5503. [Google Scholar] [CrossRef]
  16. Kiet, T.A.; Tuan, C.X.; Hieu, H.P.; Le Quyen, N.T.; Phuong, D.H.; Hung, V.T. Power minimization for data collection in uav-assisted iot wireless sensor networks. In Proceedings of the 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Republic of Korea, 3–5 January 2022; pp. 1–3. [Google Scholar]
  17. Wang, Y.; Wen, X.; Hu, Z.; Lu, Z.; Miao, J.; Sun, C.; Qi, H. Multi-uav collaborative data collection for iot devices powered by battery. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Republic of Korea, 25–28 May 2020; pp. 1–6. [Google Scholar]
  18. Jiang, H.; Zhang, Z.; Gui, G. Three-dimensional non-stationary wideband geometry-based uav channel model for a2g communication environments. IEEE Access 2019, 7, 26116–26122. [Google Scholar] [CrossRef]
  19. Gao, Y.; Wu, Y.; Cui, Z.; Yang, W.; Hu, G.; Xu, S. Robust trajectory and communication design for angle-constrained multi-uav communications in the presence of jammers. China Commun. 2022, 19, 131–147. [Google Scholar] [CrossRef]
  20. Wang, H.; Chen, J.; Ding, G.; Sun, J. Trajectory planning in uav communication with jamming. In Proceedings of the 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, China, 18–20 October 2018; pp. 1–6. [Google Scholar]
  21. Samir, M.; Sharafeddine, S.; Assi, C.M.; Nguyen, T.M.; Ghrayeb, A. Uav trajectory planning for data collection from time-constrained iot devices. IEEE Trans. Wirel. Commun. 2020, 19, 34–46. [Google Scholar] [CrossRef]
  22. Nayeem, G.M.; Fan, M.; Akhter, Y. A time-varying adaptive inertia weight based modified pso algorithm for uav path planning. In Proceedings of the 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 5–7 January 2021; pp. 573–576. [Google Scholar]
  23. Dashkevich, A.; Rosokha, S.; Vorontsova, D. Simulation tool for the drone trajectory planning based on genetic algorithm approach. In Proceedings of the 2020 IEEE KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, 5–10 October 2020; pp. 387–390. [Google Scholar]
  24. Jiang, H.; Zhang, Z.; Wu, L.; Dang, J. Three-dimensional geometrybased uav-mimo channel modeling for a2g communication environments. IEEE Commun. Lett. 2018, 22, 1438–1441. [Google Scholar] [CrossRef]
  25. Isaacs, J.T.; Klein, D.J.; Hespanha, J.P. Algorithms for the traveling salesman problem with neighborhoods involving a dubins vehicle. In Proceedings of the 2011 American Control Conference, San Francisco, CA, USA, 29 June–1 July 2011; pp. 1704–1709. [Google Scholar]
  26. Chen, P.; Chen, Z.; Zheng, B.; Wang, X. Efficient doa estimation method for reconfigurable intelligent surfaces aided uav swarm. IEEE Trans. Signal Process. 2022, 70, 743–755. [Google Scholar] [CrossRef]
  27. Roy, R.; Kailath, T. Esprit-estimation of signal parameters via rotational invariance techniques. IEEE Trans. Acoust. Speech Signal Process. 1989, 37, 984–995. [Google Scholar] [CrossRef] [Green Version]
  28. Zhou, X.; Wang, Z.; Ye, H.; Xu, C.; Gao, F. Ego-planner: An esdffree gradient-based local planner for quadrotors. IEEE Robot. Autom. Lett. 2021, 6, 478–485. [Google Scholar] [CrossRef]
  29. Qin, K. General matrix representations for b-splines. In Proceedings of the Sixth Pacific Conference on Computer Graphics and Applications (Cat. No.98EX208), Singapore, 26–29 October 1998; pp. 37–43. [Google Scholar]
  30. Razaviyayn, M. Successive Convex Approximation: Analysis and Applications. Ph.D. Thesis, University of Minnesota, Minneapolis, MN, USA, 2014. [Google Scholar]
Figure 1. UAV-aided Data Collection with Dynamic Jamming.
Figure 1. UAV-aided Data Collection with Dynamic Jamming.
Electronics 12 01841 g001
Figure 2. Block diagram of presented autonomous system.
Figure 2. Block diagram of presented autonomous system.
Electronics 12 01841 g002
Figure 3. Path initialization based on CFC.
Figure 3. Path initialization based on CFC.
Electronics 12 01841 g003
Figure 4. CFC initial path correction for obstacle avoidance.
Figure 4. CFC initial path correction for obstacle avoidance.
Electronics 12 01841 g004
Figure 5. 200 kbit data collection with three algorithms for motion planning in environments without jamming and with static and dynamic jamming.
Figure 5. 200 kbit data collection with three algorithms for motion planning in environments without jamming and with static and dynamic jamming.
Electronics 12 01841 g005
Figure 6. Initial path.
Figure 6. Initial path.
Electronics 12 01841 g006
Figure 7. The residual amount of data collected for three algorithms in different environments.
Figure 7. The residual amount of data collected for three algorithms in different environments.
Electronics 12 01841 g007
Figure 8. Variation in flight energy consumption for three algorithms in different environments.
Figure 8. Variation in flight energy consumption for three algorithms in different environments.
Electronics 12 01841 g008
Figure 9. UAV paths for different data collection volumes: (a) 0 bits; (b) 100 kbits; (c) 500 kbits; (d) 1 Mbits.
Figure 9. UAV paths for different data collection volumes: (a) 0 bits; (b) 100 kbits; (c) 500 kbits; (d) 1 Mbits.
Electronics 12 01841 g009
Figure 10. Variation in the amount of data remaining for different data collection requirements.
Figure 10. Variation in the amount of data remaining for different data collection requirements.
Electronics 12 01841 g010
Figure 11. Normalized flight energy consumption.
Figure 11. Normalized flight energy consumption.
Electronics 12 01841 g011
Figure 12. Instantaneous communication rate.
Figure 12. Instantaneous communication rate.
Electronics 12 01841 g012
Figure 13. Instantaneous flight speed variation.
Figure 13. Instantaneous flight speed variation.
Electronics 12 01841 g013
Figure 14. Instantaneous flight height.
Figure 14. Instantaneous flight height.
Electronics 12 01841 g014
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, B.; Zhang, B.; Ma, W.; Xie, C.; Guo, D.; Jiang, H. Motion Planning in UAV-Aided Data Collection with Dynamic Jamming. Electronics 2023, 12, 1841. https://doi.org/10.3390/electronics12081841

AMA Style

Wu B, Zhang B, Ma W, Xie C, Guo D, Jiang H. Motion Planning in UAV-Aided Data Collection with Dynamic Jamming. Electronics. 2023; 12(8):1841. https://doi.org/10.3390/electronics12081841

Chicago/Turabian Style

Wu, Binbin, Bangning Zhang, Wenfeng Ma, Chen Xie, Daoxing Guo, and Hao Jiang. 2023. "Motion Planning in UAV-Aided Data Collection with Dynamic Jamming" Electronics 12, no. 8: 1841. https://doi.org/10.3390/electronics12081841

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop