Professional Documents
Culture Documents
8 (Journal) Beyond 5G For Digital Twins of UAVs
8 (Journal) Beyond 5G For Digital Twins of UAVs
Computer Networks
journal homepage: www.elsevier.com/locate/comnet
A R T I C L E I N F O A B S T R A C T
Keywords: The purpose is to explore the application effects and limitations of Unmanned Aerial Vehicle (UAV) in 5G/B5G
Unmanned aerial vehicle (Beyond 5G) mobile and wireless communication. Based on 5Gcommunication, the deep learning (DL) algorithm
B5G is introduced to construct the UAV Digital Twins (DTs) communication channel model based on DL. The Co
Deep learning
ordinated Multi-point Transmission (COMP) technology is adopted to study the interference suppression of
Coordinated multi-point transmission
Physical layer security
UAVs. The key algorithm in the physical layer security is employed to ensure information communication se
Digital twins curity. Finally, the model constructed is simulated and analyzed. The transmission error rates and transmission
estimation accuracy of several algorithms, including the proposed algorithm and ordinary Deep Neural Networks
(DNNs), are compared under different Signal-to-Noise Ratios (SNRs). Results find that the convergence speed and
convergence effect of the proposed algorithm has prominent advantages, presenting strong robustness; the
proposed algorithm’s estimation accuracy is about 150 times higher than the traditional algorithms. Further
analysis reveals that the proposed algorithm’s accuracy reaches 82.39%, which increases by at least 3.2% than
other classic machine algorithms. The indicators of Precision, Recall, and F1 are compared as well. Apparently,
the Precision, Recall, and F1 values of the proposed algorithm are the highest, while the transmission delay is the
smallest. Therefore, the constructed UAV DTs wireless communication channel model has strong robustness and
further reduces UAV limitations, providing a reference for improving UAV system performance in the later stage.
1. Introduction business needs. UAV networking and the combination of the Fifth-
Generation (5G) communication technology have become an inevi
As science and technology advances quickly, the Unmanned Aerial table trend of future development. 5G base stations support flexible 3D
Vehicle (UAV) has become increasingly accepted in various fields. UAV beamforming and large-scale antenna technologies, providing UAVs
applications in the military field include land security, air defense, with more 3D and comprehensive coverage and better transmission
border-coastal defense patrols, police security, anti-terrorism, and ar performance. Simultaneously, 5G networks’ ultra-low latency will pro
rests; those in the civil field include agriculture, forestry protection, pest vide strong support for UAV Command and Control (C&C) signaling.
control, traffic monitoring, electricity, environmental climate assess The next stage of the 5G can be referred to as “Beyond 5G (B5G).”
ment, and geological prospecting [1,2]. While UAVs are universally Furthermore, the 5G technology can be optimized from two aspects:
applied, operations in high-risk environments place higher re Ultra-Reliability Low Latency Communication (URLLC) and massive
quirements, such as collisions with civil aircraft and accidents that cause Machine type of Communication (mMTC). The air interface character
injuries after UAV operation errors. Hence, as communication technol istic supports 52.6~114.25GHz Millimeter-Wave (MMW) frequency
ogy develops rapidly, using Digital Twins (DT) to map the physical space band can be designed, thereby optimizing the 5G technology [3,4]. With
during UAV flight into the virtual space in real-time has become a hot the emergence of B5G communication technology, data flow and
topic. equipment will expand, and the number of mobile connections will keep
The UAV communication system has the characteristics of mobility, growing, even exceeding 100 billion. This result is inseparable from the
flexibility, and adaptability, making it widely employed in the wireless rapid development of artificial intelligence (AI) and deep learning (DL)
communication field. Challenges are posed to the existing communica algorithms [5]. The accelerated development of high-tech approaches,
tion networks to cope with UAV’s rapidly growing application fields and such as AI, the Internet of Things (IoT), and big data, has promoted the
* Corresponding author.
E-mail addresses: lvzhihan@gmail.com (Z. Lv), hlfeng@zafu.edu.cn (H. Feng).
https://doi.org/10.1016/j.comnet.2021.108366
Received 11 December 2020; Received in revised form 23 April 2021; Accepted 27 July 2021
Available online 29 July 2021
1389-1286/© 2021 Elsevier B.V. All rights reserved.
Z. Lv et al. Computer Networks 197 (2021) 108366
2
Z. Lv et al. Computer Networks 197 (2021) 108366
data link and assists various elements such as the mission load and Regarding UAV delay, different application scenarios and different
personnel. The current UAV communication schemes often depend on service capabilities also have different levels of requirements for the
simple point-to-point communication on the unlicensed frequency band end-to-end delay and network-side delay indicators. Data return only
(ISM, 2.4GHz). Its data rate is low, unreliable, unsafe, susceptible to involves uplink, while the end-to-end delay includes encoding delay,
interference, hard to legally monitor and manage, and can only operate wireless network-side delay, external network transmission delay,
within a minimal range [15,16]. If the number of UAVs and their ap server processing delay, decoding delay, and display delay. As science
plications will further expand in the next few years, the development of and technology advances quickly, UAV has higher requirements on the
new UAV communication schemes will be extremely urgent. The typical delay indicator in the application process at all levels, putting forward
application areas of UAV are shown in Fig. 1. higher requirements for future network construction capabilities.
Today, as UAV’s application scope becomes increasingly extensive, The UAV application puts forward higher dimensional requirements
its limitations in emerging fields are becoming evident, rising many for communication network coverage. For example, agricultural pro
problems. First, UAV has strong air interference is. Compared with tection only needs to be operated at 10m; electric power/base station
ground UAV users, UAV receives interference from users not only in exploration needs to be operated at 50-100m; farmland information
neighboring cells but also in cells that are far away due to its flying mapping needs to be operated at 200-300m. In contrast, high-altitude
height. Second, the coverage of mobile cellular networks is weak. Many inspections such as oil pipelines require a coverage requirement of
weak network coverage and cavities exist in the air coverage provided 300-3000m. As a result, with the gradual increase of UAV services, the
by the ground mobile network. The current field test data shows that coverage height will be extended from a fixed height of fewer than 120m
when the UAV flight altitude exceeds 120m, the probability of loss of to a larger height, which poses greater challenges to the traditional low-
connection increases, and many airspaces are in a no-signal state. altitude mobile communication network.
Finally, UAV data communication ability is reduced. The coverage Regarding UAV’s positioning system, with the diversification of
provided by the current ground mobile communication network is not UAV’s business, its positioning requirements have gradually increased.
enough to support UAV’s requirements for high speed, low latency, and Ordinary regulatory services only need to maintain positioning accuracy
mobility. Most UAVs cannot interconnect with communication devices within 50m. In contrast, agricultural surveying and mapping and auto
[17,18]. Many challenges exist while solving these problems, such as matic charging need to achieve high-precision positioning of 0.1m. As
improvements in UAV speed, delay, coverage, and positioning UAV’s application areas increase, UAV positioning accuracy will need to
performance. transition from tens of meters to sub-meter level.
Therefore, when the UAV performance indicator is improved, there
3.1.2. UAV Performance indicator analysis are more requirements for the WCN’s performance.
Many challenges exist while solving these problems, such as im
provements in UAV speed, delay, coverage, and positioning perfor 3.2. Application of communication technology in UAV and analysis of
mance. The performance indicators of UAVs are shown in Fig. 2. physical layer security
Regarding the UAV rate, different application scenarios and different
business capabilities have different requirements for rate indicators. In 2020, the 5G mobile communication has become a global research
When the uplink 200kbps can meet the demand for control signaling and development hot spot. Mobile communication technology and in
transmission, the data transmission rate should also be improved dustry will enter the 5G stage, meeting people’s needs for high service
continuously with the perpetual evolution of information rendering throughput, high connection density, high mobile speed, high reli
methods. At this stage, a UAV single terminal usually meets the needs of ability, and low latency. The spectrum efficiency, energy efficiency, and
720P and 1080P video transmission. Nevertheless, future UAVs need to cost-efficiency of the communication network have been greatly
meet higher-definition video transmissions, such as 4K and 8K. Simul improved, and the development space of the mobile communication
taneously, with the gradual popularization of UAV services, the demand industry has been significantly expanded [19]. However, as the UAV
for multiple concurrent transmissions may gradually become prominent, application field is becoming increasingly extensive today, its applica
posing higher challenges to the network’s uplink transmission rate tion limitations in emerging fields are becoming prominent, facing many
under new service requirements. challenges. Accordingly, analyses from the perspectives of the UAV
3
Z. Lv et al. Computer Networks 197 (2021) 108366
communication channel model, physical layer security technology, in encryption method. The traditional security technology uses the upper
formation theory, and confidentiality capacity are vital. layer encryption technology, and the physical layer security technology
can be treated as a supplement to the traditional security technology by
3.2.1. UAV Channel model analysis studying the physical layer’s characteristics. It is based on information
Although there have been many mature and complete research re theory and uses the wireless channel’s physical characteristics as the
sults on air-to-ground channels in the aviation field in recent years, system improves security performance. Because it makes full use of the
UAV’s communication channel is still in the research stage in actual channel’s interference noise and multi-path characteristics, the physical
measurement and channel modeling. There is a big difference between layer of security technology is not affected by the complexity of the
the communication channel of the aircraft and the UAV communication eavesdropper’s eavesdropping algorithm. It can make the eavesdrop
channel. The ground terminal of the former is usually located in an open per’s information acquisition rate approach zero.
area with a high antenna tower. Simultaneously, the air-to-ground The security probability means that every communication link is
channel of the UAV is more complicated due to the different flight exposed to all malicious Eve. In this case, only the performance indicator
environment of the UAV. Two common basic communication links of the most malicious Eve needs to be considered because it has the
include Control and Non-payload Communication (CNPC) link and data strongest Signal to Interference plus Noise Ratio (SINR) [21]. Therefore,
link. These two links are based on the universal networking structure of a typical heterogeneous cellular network link’s security probability can
UAV communication networks, as shown in Fig. 3 [20]. be expressed as:
Compared with the CNPC link, the data link has lower requirements { }
for latency and security. The data link is mostly used to support PSec (Tε ) = P maxSINRE (z) < Tε (1)
communication services between UAVs and ground terminals (a few are
z∈Φc
used for communication transmission between UAVs). Hence, most of In (1), PSec indicates the probability of system security, SINRE rep
the communication channels are air-to-ground channels. Ground ter resents the SINR value received by Eve, and Tε refers to the security
minals are divided into ground base stations, mobile terminals, gateway threshold. The security capacity is the maximum secure transmission
nodes, and wireless sensors in different application scenarios. The rate available between the sender and the legal receiver, commonly
channel capacity of these data links varies greatly according to different referred to as the maximum-security rate or security capacity [22]. In
application scenarios. For example, UAV has only a few kbps for wireless the eavesdropping channel, for the case of only one sender, one desti
sensors, while the channel capacity from UAV to gateway nodes can nation, and multiple Eves, the security capabilities available to the
reach tens of Gbps. At the same time, the data link does not need to run system can be expressed as follows:
in a particular frequency spectrum. Conversely, data link can run in a { }
specific frequency band that has been occupied by other applications CS = max 0, RD − max RjE , j = 1, 2, ..., K (2)
and reallocate dedicated frequency bands to enhance system perfor
1≤j≤K
mance. UAV to UAV channels are mainly line-of-sight channels. In (2), CS indicates the security capacity of the system, RD denotes the
Although UAV may have multi-path fading due to reflections from information rate obtained at the destination node, RjE represents the
mountains, ground, and buildings during flight, this multi-path fading is information rate obtained at the j-th eavesdropping node, and K refers to
limited and can be basically ignored compared with UAV-to-ground or the total number of Eve nodes in the system. Besides, the probability of
terrestrial channels. security interruption refers to the probability when the SINR of the
received signal in the system is less than a given target information se
3.2.2. Analysis of UAV physical layer security curity rate (the secure transmission cannot be performed); that is, within
Because wireless communication is exposed to the air and has the range of this target information, communication interruption will
broadcasting characteristics, UAV communication is vulnerable to ma occur, which can be expressed as:
licious attacks or eavesdropping. To avoid eavesdropping attacks on the
system and ensure system communication, the general system adopts an POut = P{CS ≤ RS } (3)
4
Z. Lv et al. Computer Networks 197 (2021) 108366
5
Z. Lv et al. Computer Networks 197 (2021) 108366
Table. 1 In (10), the network input is the received symbol Y, the network
RoemNet meta-learning algorithm flowchart. output is the corresponding symbol estimated by the network X, ̂ the
1 Input: Ti : channel task set of network training; N2: training slice number of corresponding true label is X, hϕi refers to the neural network parameter.
single channel task; α1 α2 : Super parameter step size of network training;
If N1 represents the number of channels with different parameters dur
2 Output: hϕ : the trained meta learning network with good initialization
ing training, there will be N1 different tasks. Assuming that all tasks obey
parameter ϕ randomly initializes the parameter Hϕ of network ϕ;
the same distribution p(T), these tasks will be defined as a set: {Tl, T2, ...,
3 while the network is not convergent
4 for i=1,2, …,N1 do Ti, ..., TN1}. The number of slices is defined for each channel in the set;
5 2 N2 training slices of K1 DFT output Yand corresponding X are sampled to form that is, the actual number of channel data for training is N2. For the j-th
data pairs; training slice data pair of the Ti-th task, there is the following equation:
6 The 2 N2 training slices were divided into B1 and B2; ( )
7 for j=1, 2,…, N2 do ϕji = ϕi − ∇ϕj L hϕi (11)
i
8 ∇ϕj L(hϕi ) is obtained by B1 and Eq. (12);
9
i
j In (11), ϕi refers to the neural network parameters after the i-th
The adaptive network parameter ϕi is obtained based on Eq. (11);
update, the loss function’s gradient equation for the j-th training slice of
10 end
11 According to α2 B2 and Eq. (13), the network parameter ϕi is further updated the second term is:
12 end ( ) K1 ( )
( ) ∂L hϕi 1 ∑
13 The network parameter hϕ is updated according to α1 and Eq. (13); (12)
m m m
∇ϕj L hϕi = j =− X − hϕj Y Y j
14 end
i ∂ϕi K1 m=1 i
15 return
In (12), K1 refers to the actual number of training symbol pairs, and
K1 should be ≥ the OFDM subcarrier number. After traversing N1 sub
tasks and their corresponding N2 slices, the final network parameters are
Table 2
updated by the following equation:
System settings and simulation parameters.
∑ ( )
Software Operating system Linux 64bit ϕ = Φ − α∇ϕ L hϕ (13)
Python version Python 3.6.1
Simulation platform Matlab In (13), α refers to the hyperparameter of the network’s step length,
Development platform PyCharm and Φ refers to the initial weight vector.
Open-source software package TensorFlow Furthermore, the effectiveness of the algorithm is analyzed. For a
Hardcore CPU Intel Core i7-7700@4.
given task set Ti, the training sample B1 is used for optimization training,
2GHz 8 cores
Internal memory Kingston ddr4 2400MHz and the initial loss value obtained is calculated using the test sample B2.
16G Therefore, the objective function of RoemNet is:
GPU Nvidia GeForce 1060 8G [ ( )]
Parameters SNR during training 5:5:30 dB minimizeETi LTi ,B2 UTi ,B1 (ϕ) (14)
Doppler shift interval during training [0,50] Hz
Multi-path number interval during [1,16] In (14), UTi ,B1 refers to the network weights updated based on
training training samples, whose essential function is to add a gradient vector
Maximum path delay interval during [0.2,8.0) μs sequence g to the initial weight vector ϕ. Through meta-training and
training
meta-testing, the expected value of the loss function of the task set is
Number of channels with different 100
parameters for training reduced as much as possible. Then, the optimization direction of the
Number of data slices per channel 100 parameters on the new task can be expressed as:
Number of subcarriers 64 ( )
∂LTi ,B2 UTi ,B1 (ϕ) ( )
Number of pilot frequencies 100
gRoemNet = ̃
= U ′Ti ,B1 L′Ti ,B2 ϕ (15)
∂ϕ
estimation, and the transmission sequence is restored. In (15), ϕ̃ = UT ,B (ϕ), while U′ (ϕ) is the Jacobian matrix of
i 1 Ti ,B1
During the offline network training, first, pre-training is performed, UTi ,B1 (ϕ). For UTi ,B1 (ϕ), assuming there is a k-order gradient update
the training data are collected, and task sets are generated. The data for calculation operation, then:
each training is a random channel extracted from the channel dataset,
and the channel data for each parameter is used as a subtask. Meta- UTi ,B1 (ϕ) = ϕ + g1 + g2 + ⋯ + gk (16)
learning pre-training is performed to get the initial meta-network. In Stochastic Gradient Descent (SGD) further expands and derives
the present study, a model-independent meta-learning algorithm MAML gRoemNet . Generally, the gradient equation of SGD can be expanded by
[23] is adopted, and the initial weights of the meta-network obtained Taylor expansion, as follows:
will be adaptable to different sub-tasks. Next, the meta-network com ( )
bines the received pilot sequence of the real channel to perform online gSGD = L′ (ϕ) = L′ (ϕ0 ) + L′′(ϕ − ϕ0 ) + O ‖ ϕ − ϕ0 ‖2
fine-tuning; after several gradient descent steps, a meta update is per ∑
k− 1
( )
formed to obtain an adaptive network for the current changing channel, = g0 − αH0 g0i + O α2 (17)
which is a small sample learning of K-Shot Adjust. Finally, the learning
i=1
results are verified by simulation tests. If the bit error rate and estima In (17), g0 = L′ (ϕ0 ) refers to the gradient of the starting point of the
tion accuracy meet the requirements, the model can be put into the weight, H0 = L′′(ϕ0 ) refers to the second step of the starting point, g0i
online fine-tuning deployment. If the design requirements are not met, refers to the gradient value calculated in the SGD process, and i ∈ [1, k]
the training will be retrained until convergence. The flow of RoemNet refers to different batches. Further calculating the gradient of RoemNet
meta-learning algorithm is shown in Table 1. can obtain the following equation:
In the system design, the received symbols try to recover the origi
∂LUk (ϕ)
nally transmitted symbols as much as possible. This is a fitting problem, gRoemNet = = U ′k (ϕk )⋯U ′k− 1 (ϕk− 1 )L′k (ϕk ) (18)
∂ϕ0
so the Mean Square Error (MSE) is selected as the loss function:
( ) ∑ In (18), Uk (ϕ) refers to the operation of updating the parameter
(j) 2
(10) vector in a single step.
(j)
L hϕi = (j) (j)
X Y ∼T
‖ hϕj Y i − X i ‖ α1 α2 B2 ϕi Hϕ ϕji
i i 2
6
Z. Lv et al. Computer Networks 197 (2021) 108366
Fig. 6. Comparison of transmission bit error rates under different SNRs and fine-tuning performance of different deep learning strategies (a. Using different esti
mation methods; b. Using different length pilots; c. Comparison of fine-tuning performances of different deep learning strategies).
3.3.2. UAV DTs COMP-based interference suppression Then the data flow after detection can be expressed as follows:
Due to the high LOS channel probability caused by the UAV’s flight q
∑
altitude, strong interference will be generated to neighboring cells and ⌢
st = GSH + G H (j) S(j) + Gn (24)
seriously affect the quality of ground user services. Therefore, COMP j=1
In (22), H(j) S(j) refers to the interference from the j-th interfering base according to the above channel model and simulated and generated in
station cluster. The Combined Short Intelligence Test (MMSE) is used to MATLAB software. First, random channel parameters are generated;
detect the collaborative base station cluster to eliminate inter-user then, several random data to be sent are generated converted into
interference. The MMSE equalization matrix used can be expressed as: 16QAM symbol format as the transmitted symbol label. According to the
( )− 1 H data format, the first K2 symbols are used as the pilot of the OFDM frame.
G = H H H + σ 2 IpNT H (23) The obtained dataset is divided into training and testing sets according
to the ratio of 4:1.
7
Z. Lv et al. Computer Networks 197 (2021) 108366
Fig. 7. The estimation accuracy of different estimation methods (a. different SNRs; b. different bit quantizers; c. different length pilots; d. different pilot pollution
coefficients; e. different antenna numbers).
The UAV communication channel model’s transmission prediction system settings and simulation parameters are shown in Table 2.
performance is analyzed from the perspectives of accuracy, precision,
recall, F1, and error; the proposed model is compared with some other 4. Results and discussion
state-of-art algorithms, including Decision Tree (DT) [24], Naive Bayes
(NB) [25], Multilayer Perceptron (MLP) [26], Deep Neural Networks 4.1. Transmission error rate of each algorithm under different SNRs
(DNN) [27], and Long Short Term Memory (LSTM) Recurrent Neural
Network (RNN) [28]. As for the channel estimation method, the pro The transmission error rate of each algorithm is compared under
posed algorithm is compared with the Least-Squares (LS) channel esti different SNR, as shown in Fig. 6.
mation method [29], the Linear Minimum Mean Square Error (LMMSE) According to Fig. 6a, among the four channel estimation schemes,
channel estimation [30], and the ordinary DNN network. LS channel under the condition of low SNR, the traditional LMMSE channel esti
estimation is a low-complexity algorithm. Without using any channel mation performs the best, and the scheme of learning network (DNN and
statistics, it is also the input data of the neural network. A comparison of RoemNet) cannot achieve the desired effect. However, as the SNR in
the two obtains the improvement of estimation accuracy brought by the creases, the relationship between the data and the label becomes
neural network. LMMSE channel estimation refers to the linear mathe increasingly apparent. At about 25dB, the performance of RoemNet
matical modeling of the low-precision ADC quantization function surpasses the traditional LMMSE channel estimation. This result shows
through Bussgang decomposition before channel estimation. It has a that DL schemes have good development potential. Fig. 6b shows that
fairly high estimation accuracy and a fairly competitive algorithm when the number of pilot frequencies is 8 or 98, the RoemNet algorithm
complexity. In the accuracy estimation and analysis of the channel, a can reduce the bit error rate to 10-3. This result reflects the robustness of
1-bit quantizer and an ideal quantizer are used in the estimation process the DL scheme for estimating the number of pilot frequencies required.
(that is, the number of ADC bits at the receiving end is infinite). The As shown in Fig. 6c, the convergence speed and convergence effect of the
8
Z. Lv et al. Computer Networks 197 (2021) 108366
Fig. 8. Prediction accuracy of different algorithms with the iterations (a. Accuracy; b. Precision; c. Recall; d. F1 value).
Fig. 9. Data transmission delay of each algorithm under different successful transmission probabilities (a. p=100%; b. p=90%).
meta-learning RoemNet scheme has undeniable advantages over ordi the original LS algorithm using a 1-bit ADC. Fig. 7b illustrates that the
nary DNNs. In actual tests, ordinary DNNs are prone to overfitting and accuracy of the ADC greatly affects the estimation performance. From an
has excellent loss performance during training. However, the perfor ideal quantizer (dashed line) to a 1-bit quantizer, LS’s performance has
mance in the test link is very different. This result reflects the advantages dropped by eight times, the performance of LMMSE has dropped by
of the proposed meta-learning scheme in generalizing neural networks. nearly 30%, and the performance of RoemNet has dropped by 20%.
Fig. 7c suggests that as the number of pilot frequencies increases from 10
4.2. Transmission estimation accuracy of each algorithm under different to 50, all methods’ MSE performance has improved. After 50, the MSE
SNRs performance of the three schemes has not changed much. Fig. 7d reveals
that in different pilot pollution coefficients, traditional methods (LS and
The proposed algorithm, LS, and LMMSE are compared respectively BLMMSE) cause significant performance degradation due to pilot
using a 1-bit quantizer and an ideal quantizer in the estimation process pollution. However, with the increase of pilot pollution coefficient,
(that is, the number of ADC bits at the receiving end is infinite), and the RoemNet can still maintain its MSE basically unchanged, and the per
estimation accuracy is shown in Fig. 7. formance degradation is only 1/3 of BLMMSE. As shown in Fig. 7e, when
According to Fig. 7a, as SNR increases, the three schemes all show a the number of antennas increases, the MSE of the two traditional
downward trend, and the RoemNet has the best performance in almost methods increases linearly because the size of the channel matrix to be
all SNR situations. When ADC is an ideal quantizer, the estimation ac estimated increases linearly. The performance degradation of using an
curacy of RoemNet is improved by about 150 times compared with the ideal quantizer is more serious than using a 1-bit quantizer. For Roem
original LS algorithm. When a 1-bit quantizer is utilized, the RoemNet Net, the change in the number of antennas only means that the size of
has, nevertheless, an 80-time performance improvement compared with the input “image” is different, which has little impact on the
9
Z. Lv et al. Computer Networks 197 (2021) 108366
performance of the DL network. Therefore, the enhanced DL network Declaration of Competing Interest
training can make the model robust.
None.
The constructed model is compared with classic ML algorithms. The This work was supported by the National Natural Science Foundation
performance of Accuracy, Precision, Recall, and F1 values are analyzed of China (No. 61902203) and the Key Research and Development Plan -
respectively, as shown in Fig. 8. The transmission delay of each neural Major Scientific and Technological Innovation Projects of ShanDong
network algorithm is analyzed under different successful transmission Province (2019JZZY020101).
probabilities (p=100% and p=90%), as shown in Fig. 9.
As shown in Fig. 8, the proposed model and some classic ML algo References
rithms are compared and analyzed from the perspectives of Accuracy,
Precision, Recall, and F1. The proposed algorithm’s accuracy can reach [1] W. Yuan, C. Liu, F. Liu, et al., Learning-based predictive beamforming for UAV
82.39%, which increases by at least 3.2% compared with other classic communications with jittering[J], IEEE Wirel. Commun. 9 (11) (2020) 1970–1974.
[2] C. Zhong, J. Yao, J. Xu, Secure UAV communication with cooperative jamming and
machine algorithms and is even 30% higher than the NB method. trajectory control[J], IEEE Commun. Lett. 23 (2) (2018) 286–289.
Meanwhile, the Precision, Recall, and F1 values of the proposed model [3] H. Wang, J. Wang, J. Chen, et al., Network-connected UAV communications:
are the highest, which increases by at least 5.1% compared with other potentials and challenges[J], China Commun. 15 (12) (2018) 111–121.
[4] S. Li, B. Duo, X. Yuan, et al., Reconfigurable intelligent surface assisted UAV
ML algorithms. A possible reason is that the proposed RoemNet algo communication: joint trajectory design and passive beamforming[J], IEEE Wirel.
rithm adds an online fine-tuning deployment stage when training data in Commun. Lett. 9 (5) (2020) 716–720.
the UAV communication channel modeling, making the results more [5] M. Bacco, A. Berton, A. Gotta, et al., IEEE 802.15. 4 air-ground UAV
communications in smart farming scenarios[J], IEEE Commun. Lett. 22 (9) (2018)
rigorous and accurate. Hence, compared with other classic ML algo
1910–1913.
rithms, the proposed UAV communication system model based on DL [6] H. Darvishi, D. Ciuonzo, E.R. Eide, P.S. Rossi, Sensor-fault detection, isolation and
improves accuracy. accommodation for digital twins via modular data-driven architecture, IEEE Sens.
According to Fig. 9, with the increase in the amount of transmitted J. 21 (4) (2020) 4827–4838.
[7] W. Fawaz, C. Abou-Rjeily, C. Assi, UAV-aided cooperation for FSO communication
data, the data transmission delay shows an increasing trend. Moreover, systems[J], IEEE Commun. Mag. 56 (1) (2018) 70–75.
the smaller the successful transmission probability, the greater the [8] J. Ye, C. Zhang, H. Lei, et al., Secure UAV-to-UAV systems with spatially random
transmission delay. Comparison suggests that the data transmission UAVs[J], IEEE Wirel. Commun. Lett. 8 (2) (2018) 564–567.
[9] C. Zhang, W. Zhang, W. Wang, et al., Research challenges and opportunities of UAV
delay of the algorithm model (RoemNet) is the lowest. The reason is that millimeter-wave communications[J], IEEE Wirel. Commun. 26 (1) (2019) 58–62.
RoemNet preprocesses and trains the collected data is preprocessed first [10] L. Yang, F. Meng, J. Zhang, et al., On the performance of RIS-assisted dual-hop
so that the transmitted data are further unified, and the time delay is UAV communication systems[J], IEEE Trans. Veh. Technol. 69 (9) (2020)
10385–10390.
small. Therefore, compared with different algorithms, the constructed [11] R. Li, Z. Zhao, X. Zhou, et al., Intelligent 5G: when cellular networks meet artificial
DL-based UAV communication channel model can provide better data intelligence[J], IEEE Wirel. Commun. 24 (5) (2017) 175–183.
transmission performance and minimal delay. [12] W. Feng, J. Wang, Y. Chen, et al., UAV-aided MIMO communications for 5G
Internet of Things[J], IEEE Internet of Things J. 6 (2) (2018) 1731–1740.
[13] B. Li, Z. Fei, Y. Zhang, et al., Secure UAV communication networks over 5G[J],
5. Conclusion IEEE Wirel. Commun. 26 (5) (2019) 114–120.
[14] M.Z. Chowdhury, M. Shahjalal, S. Ahmed, et al., 6G wireless communication
systems: applications, requirements, technologies, challenges, and research
To sum up, based on 5G communication, deep learning algorithms directions[J]. IEEE Open J. Commun. Soc. 1 (2020) 957–975.
are introduced to construct a UAV DTs communication channel model; [15] A.S. Abdalla, K. Powell, V. Marojevic, et al., UAV-assisted attack prevention,
moreover, the COMP technology is applied to study further and simulate detection, and recovery of 5G networks[J], IEEE Wirel. Commun. 27 (4) (2020)
40–47.
the interference suppression of UAV. Finally, results demonstrate that [16] Q. Wu, L. Liu, R. Zhang, Fundamental trade-offs in communication and trajectory
the constructed wireless communication channel model has strong design for UAV-enabled wireless network[J], IEEE Wirel. Commun. 26 (1) (2019)
robustness. The accuracy rate can reach 82.39%, which provides a 36–44.
[17] Y. Li, R. Zhang, J. Zhang, et al., Cooperative jamming for secure UAV
reference for improving UAV system performance in the future. How communications with partial eavesdropper information[J], IEEE Access 7 (2019)
ever, there are some weaknesses as well, such as that the UAV 94593–94603.
communication simulation experiment is performed under ideal condi [18] Y. Liu, Z. Qin, Y. Cai, et al., UAV communications based on non-orthogonal
multiple access[J], IEEE Wirel. Commun. 26 (1) (2019) 52–57.
tions. When adjusting the control beam of UAV communication infor
[19] X. Chen, X. Hu, Q. Zhu, et al., Channel modeling and performance analysis for UAV
mation, because there are many other parameters involved, there is no relay systems[J], China Commun. 15 (12) (2018) 89–97.
one-by-one analysis of other interfered parameters, and more factors [20] L. Wang, Y.L. Che, J. Long, et al., Multiple access mmWave design for UAV-aided
5G communications[J], IEEE Wirel. Commun. 26 (1) (2019) 64–71.
need to be considered in actual deployment. Therefore, the future 5G
[21] L. Yang, W. Zhang, Beam tracking and optimization for UAV communications[J],
network will be an ultra-dense and complicated heterogeneous network IEEE Trans. Wireless Commun. 18 (11) (2019) 5367–5379.
composed of various base stations and relay products under the high and [22] M. Liu, J. Yang, G. Gui, DSF-NOMA: UAV-assisted emergency communication
low-frequency hybrid networks. The transmission scheme and system technology in a heterogeneous Internet of Things[J], IEEE Internet of Things J. 6
(3) (2019) 5508–5519.
performance evaluation results under the homogeneous network are [23] S. Yang, J. Wang, Q. Lin, et al., Cost-efficient FPGA implementation of a
different. The applicability under the structure network needs to be biologically plausible dopamine neural network and its application[J],
investigated, and the interference suppression scheme and mobility Neurocomputing 314 (2018) 394–408.
[24] S. Yang, T. Gao, J. Wang, et al., Efficient spike-driven learning with dendritic
enhancement of UAV will be the focus of UAV research in the future. event-based processing[J], Front. Neurosci. 15 (2021) 97.
[25] Y. Wang, M. Liu, J. Yang, G. Gui, Data-driven deep learning for automatic
modulation recognition in cognitive radios[J], IEEE Trans. Veh. Technol. 68 (4)
Author statement
(2019) 4074–4077.
[26] S. Yang, J. Wang, X. Hao, et al., BiCoSS: toward large-scale cognition brain with
Zhihan Lv: Conceptualization, Methodology, Supervision multigranular neuromorphic architecture[J], IEEE Trans. Neural Netw. Learn. Syst.
(2021) 1–15.
Dongliang Chen: Software, Investigation, Writing- Original draft
[27] S. Yang, B. Deng, J. Wang, et al., Scalable digital neuromorphic architecture for
preparation large-scale biophysically meaningful neural network with multi-compartment
Hailing Feng: Supervision neurons[J], IEEE Trans. Neural Netw. Learn. Syst. 31 (1) (2019) 148–162.
Ranran Lou: Software, Investigation, Writing- Reviewing and Editing
Huihui Wang: Conceptualization
10
Z. Lv et al. Computer Networks 197 (2021) 108366
[28] S. Yang, B. Deng, J. Wang, et al., Design of hidden-property-based variable Dongliang Chen is currently pursuing the M.S degree with the
universe fuzzy control for movement disorders and its efficient reconfigurable College of Computer Science and Technology, Qingdao Uni
implementation[J], IEEE Trans. Fuzzy Syst. 27 (2) (2018) 304–318. versity, China. Dongliang Chen’s research direction include
[29] T.Z.H. Ernest, A.S. Madhukumar, R.P. Sirigina, et al., Hybrid-duplex Deep Learning, Computer Vision, Serious Game, Cyber Secu
communications for multi-UAV networks: an outage probability analysis[J], IEEE rity, Reinforcement Learning, Game Analysis. He has published
Commun. Lett. 23 (10) (2019) 1831–1835. 10 papers in IOTJ, FGCS, TOIT, SCS, IMAVIS journals.
[30] H. Wang, J. Wang, G. Ding, et al., Resource allocation for energy harvesting-
powered D2D communication underlaying UAV-assisted networks[J], IEEE Trans.
Green Commun. Netw. 2 (1) (2017) 14–24.
11