Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

SPECIAL SECTION ON NETWORK RESOURCE MANAGEMENT IN FLYING AD HOC NETWORKS:

CHALLENGES, POTENTIALS, FUTURE APPLICATIONS, AND WAYFORWARD

Received April 2, 2019, accepted April 23, 2019, date of publication May 8, 2019, date of current version May 20, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2915561

The Broadcast Storm Problem in FANETs and the


Dynamic Neighborhood-Based Algorithm
as a Countermeasure
RAYNER M. PIRES 1 , ALEX SANDRO ROSCHILDT PINTO2 , AND
KALINKA REGINA LUCAS JAQUIE CASTELO BRANCO 1
1 Institute of Mathematics and Computer Science, São Carlos 13566-590, Brazil
2 Department of Informatics and Statistics, Federal University of Santa Catarina, Florianópolis 88040-900, Brazil
Corresponding author: Rayner M. Pires (raynermp@gmail.com)
This work was supported in part by the Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - Brasil (CAPES) under Grant 001
and in part by the Army Research Office under Grant W911NF-18-1-0012.

ABSTRACT Flying ad hoc networks (FANETs) are a new paradigm that can overcome mission constraints
of single unmanned aerial vehicles (UAVs). FANETs are composed of several UAVs that cooperate to
accomplish some critical mission (i.e., hazardous area monitoring). In order to maintain UAVs coordination,
all UAVs must continuously retransmit or relay messages through the wireless channel to assure that every
UAV knows the FANET condition. However, when this message exchange is done arbitrarily, it may cause the
broadcast storm problem, leading the wireless medium to an inoperable state. Despite some efforts reported
in the literature for providing general broadcast storm problem mitigation techniques, the challenge of aggre-
gating new information/knowledge to receivers, instead of just spreading the information in the network,
has received less attention. In this paper, we not only prove that broadcast storm problem causes network
contention as the number of UAVs increases but also propose the innovative dynamic neighborhood-based
algorithm for the broadcast storm problem (DNA-BSP), which was developed and validated based on the
outdoor experiments and computer simulations. It can mitigate the broadcast storm problem, which is a real
challenge in FANETs, reducing message redundancy in more than 98%, and making message delivery more
than 95% faster than in flooding scenario, outperforming classical broadcast storm mitigation techniques
when applied in FANETs. Our detailed results can also guide future researches and provide useful insights
for engineers planning and optimizing mission-critical mobile ad hoc network with the support of UAVs.

INDEX TERMS Broadcast mitigation techniques, data dissemination protocols, FANETs, flooding, UAV
communication, wireless ad hoc communication.

I. INTRODUCTION processing of geographically distributed data, interconnec-


Communication between a single civilian small-scale tion of unconnected partitions, and many other mission
unmanned aerial vehicle (UAV) and its base station have types [1]–[6].
been done in infrastructure mode. Such communication may The alternative for communication in a multi-UAV system
limit the aircraft’s distancing due to interruption of the com- is to establish an ad hoc network between aircraft. In this
munication link, thereby limiting the coverage area of the way, nodes communicate with each other, and the group’s
mission. In many applications, a swarm of UAVs can provide connection with the base station can be made through only
significant advantages such as in search and rescue missions, one of the group members (or momentarily by some of them),
target detection, delivering medical supplies to otherwise which acts as the gateway in the network.
inaccessible regions, crowd monitoring, cooperative envi- This network kind is referenced in the literature by dif-
ronment monitoring, border patrol missions, gathering and ferent names, such as UAV network, aeronautical ad hoc
network, airborne communication networks, UAS MANET,
The associate editor coordinating the review of this manuscript and UAANETs, and finally flying ad hoc networks, which is the
approving it for publication was Onur Alparslan. most common terminology and adopted in this paper.
2169-3536 2019 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 7, 2019 Personal use is also permitted, but republication/redistribution requires IEEE permission. 59737
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

The main approach to solve the broadcast storm problem


in MANETs is focused on how to reduce the amount of
redundant retransmissions. This can be achieved by prevent-
ing a subset of the network nodes from doing the retrans-
mission. There are several works in the literature that use
different techniques of redundancy control in broadcast com-
munications, as presented in the review of Reina et al. [10].
All works using the mitigation approach can be classified
into one of the general categories suggested in [8]: counter-
based, probability-based, distance-based, location-based, and
cluster-based techniques.
The simplest methods count the number of copies received
FIGURE 1. A FANET network representation. The feasibility of
from a message and use a threshold to decide whether this
communication between all aircraft and a base station (or all base message should be retransmitted or discarded. Rather than
stations) enables a multi-UAV system to expand its capability of mission a counter, probability-based methods use a pre-established
accomplishment.
probability value as the threshold for deciding on retransmis-
sion. They are a modification of the flooding method and
Flying Ad hoc Network (FANET) is depicted in Fig. 1. It is when the threshold is equal 100% both are assumed to be
a subtype of Vehicular Ad hoc Network (VANET) and Mobile equal.
Ad hoc Network (MANET). This reclassification is due to The methods based on distance and location evaluate the
differences that arise in the aerial environment and restric- additional area that a retransmission can reach. In order to
tions that are imposed by this dynamic scenario, like: high decide on the retransmission of a message, a transmitter
mobility, terrain changes, channel conditions, node failure, calculates the distance to a receiver and compares with the
or dynamic mission demands [7]. threshold, which is predefined in order that the transmissions
The degree of nodes mobility in FANETs is much higher increase the range of the messages. The distance analysis is
than in VANETs or MANETs. Because of this, the network done with GPS (Global Positioning System) support or by the
topology also changes more frequently. In addition to an ad signal strength of neighboring nodes [9].
hoc connection to each other, UAVs may need to establish a A cluster consists of a set of nodes where only one of
connection to a GCS (Ground Control Station), as in missions them functions as gateway – the one responsible for for-
where data is collected and sent to a server on the ground, warding the messages of the entire group. Clustering-based
or when the GCS is responsible to manage the mission methods do not allow other members of the group, except
accomplishment, for example. Other prominent differences the gateway, to relay messages. Then, the transmitter uses
that can be enumerated are the movements’ speed, altitude some of the other methods to decide which messages are
differences, network density, distance between nodes, and retransmitted or are discarded. Some of the characteristics
three-dimensional movement pattern [7]. These character- of the clustering-based methods include the reduction of
istics may require – and usually, require – different data the single hop range, the hops number growth, the end-
exchange strategies for each node. to-end delay aggravation and the decrease of the network
contention [11].
A. RELATED WORK Tseng et al. [8] proposed several methods to reduce redun-
Tseng et al. [8] investigate the flooding approach using dant retransmissions and to differentiate the retransmission
theoretical modelling and simulation evaluation. Numerical time to alleviate the BSP problem. In the counter-based
results show that a single retransmission is capable to increase method proposed by them, the node cancels the retransmis-
up to 41% the coverage area of a message, but the redundancy sion and discards the packet if it receives multiple copies of
is increased by an average of 61% for each additional cover- the same message. Upon receiving a broadcast message for
age area. In that work, the authors conclude that the flooding the first time, instead of immediately retransmit it, the node
retransmission can greatly degrade the network performance begins to wait for a random period of assessment. If a node
and recommended that solutions using flooding should be receives multiple copies of that message during the wait
used with caution because the range expansion is due to high time and the number of copies received exceeds a thresh-
costs in terms of bandwidth and power consumption. old, the retransmission is canceled. The main idea of this
The flooding offers the advantage of increasing the range algorithm is to minimize the excessive retransmissions of
of the messages in dense networks when compared with messages in areas where there is signal overlap, which is one
other dissemination mechanisms that use broadcast [8], [9]. of the causes of message duplication.
However, in denser networks, it generates excessive mes- Tseng et al. [12] proposed an adaptive system to solve the
sage duplication, packet collision and network contention. problem of the counter threshold value. The counter threshold
Those consequences are known as the Broadcast Storm can be described as the maximum number of copies of a
Problem (BSP). message allowed to be received before its retransmission.

59738 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

A low threshold can greatly reduce the number of transmitting this network, such as network flow, for example. Another
nodes. However, the range of the messages is greatly reduced limitation of this work and of [13] as well, is that nodes move
in sparse networks. On the other hand, a high threshold can only in two dimensions. This may be a limitation of the used
guarantee greater range, but at the cost of a large number platforms, but a realistic FANET simulation environment
of transmitting nodes. To solve that problem, the authors should consider the mobility of UAVs in three dimensions
introduced an adaptive function for the counter threshold that as well as the physical characteristics of three-dimensional
takes into account the number of neighboring nodes. In their wave propagation, rather than models that define propagation
method, the threshold value varies based on the number of unrealistically in two dimensions.
neighboring nodes to the source node. This function provided The paper presented by Han et al. [15] does not focus on
better results than in the previous work, but to calculate UAVs. However, it presents a scenario where the formation
the dynamic number of neighbors, they have used the peri- control of a group of mobile wireless robots is done in a
odic exchange of HELLO messages, from the ad hoc routing distributed way inside a MANET and by the analysis of
protocol. the radio signal of the neighbors immediately adjacent. In
The use of HELLO messages is a technique known this algorithm, robots broadcast HELLO messages at regular
today for overloading the ad hoc network, precisely because intervals of 2 seconds (sending rate of 0.5 Hz), containing the
these messages are commonly distributed using the flooding current position of the robot and the direction to where it is
method. Alternatively, the work [12] could have determined moving. This information is captured by adjacent neighbors
the relative location of the neighboring nodes using GPS (single hop neighbors).
coordinates, calculating incoming message delays or measur- The algorithm was tested in a simulation environment with
ing the received signal strength (RSS) for example. the QualNet tool. The authors conducted the simulation to
Gerla and Yi [13] have investigated the communication evaluate the performance of the proposed algorithm against
between groups of autonomous vehicles. Since then there two metrics: average delivery rate and average delivery time
has been motivations to group autonomous vehicles to carry of the messages to the recipient. The higher was the group’s
out complex or hazardous civilian missions, such as emer- speed, the lower was the average delivery rate. This can be
gency situations, natural disasters, interconnection of isolated explained by packet loss due to the fixed broadcast periodicity
regions or monitoring of crowds, for example. In this work, of the HELLO messages.
they adopt a scenario where there are islands of geograph- In order to achieve good delivery results in large groups,
ically separated sensors, whose data must be collected by it was necessary to deal with network constraints, which
groups of UAVs. Each group heads to an island and collects resulted in a slower displacement and an increased delivery
the information cooperatively. These groups need an effi- time. It is evident, then, the influence of the network qual-
cient backbone link to send sensed data to a ground station, ity of service on the performance of a mission accomplish-
to exchange data between groups, to navigation, and, more ment. This is another work investigating the application of
broadly, to perform the complex mission autonomously. The a communication network between robots without support
authors defined that the communication between all UAVs of an infrastructure. However, it also does not simulate the
would be made in an ad hoc and hierarchical way. In this diversity of movements in a free environment such as the sky,
communication, the cluster heads communicate through mul- where the movement of flying robots is influenced by wind
ticast. As soon as data arrives at the representative node, gusts, differences in altitude between nodes, kinetic restric-
it is responsible for disseminating this data within the group, tions for performing maneuvers or for changing speeds, for
adopting any efficient broadcast technique. So, this work is example.
focused on a solution for mission-oriented data exchange. For Wisitpongphan et al. [16] focused efforts on the creation of
the feasibility of communication between groups, it offers as three techniques for controlling BSP in VANETs networks,
a solution a multicast routing protocol. It does not evaluate using the probability and counter approach. They proposed
the quality of the communication between UAVs of the same the weighted p-persistence, slotted 1-persistence, and slotted
group nor offer solutions to problems that occur in dissemi- p-persistence algorithms, which give vehicles more distant
nation via broadcast. from the broadcast source a higher relay priority. To deter-
The work presented in [14] examines the UAVs’ flight mine the distance from the sender of the message, vehicles
formation from the network point of view, considering the need to determine their position using GPS or RSS. The three
relevant communication problems in a group of UAVs with proposed algorithms were used to mitigate the retransmis-
coordinated behavior. The objective of this work was to sions that were already reduced because the authors used
investigate the network constraints to maintain a formation in this work the dissemination protocol called GrooveNet,
with more than two aircraft, where the placement corrections which is designed to disseminate messages within a limited
are performed with the exchange of information about the region specified in the message header. The results of the
location of the other nodes. They used the NS2 network simu- simulations showed that the proposed algorithms were able
lator to perform the computational simulations. Although the to reduce packet loss by up to 70% and maintained the end-
metrics adopted are valuable, this work still does not consider to-end delay in acceptable levels for the VANETs (vehicular
others also important to guarantee a quality of service in networks). However, the work scenario is very specific to

VOLUME 7, 2019 59739


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

VANETs, such as the routing algorithm and the dissemination in the retransmission of the nodes in this intermittently con-
method, and makes it unlikely to be adapted for FANETs. nected network.
Mohammed et al. [17] propose the Efficient Counter-Based The works [20] and [21] have used shelf components to
Scheme (ECS) method for the control of broadcasts, which is establish communication networks for UAVs and to make
a combination of the simple counter method and the retrans- performance and quality assessments of those networks.
mit probability method. This combination allows the node However, these works still limited the number of nodes
to make the retransmission decision based on two statistical involved or the continuous movement of the aircraft. After
thresholds. In this algorithm, the nodes also wait a random all, not all nodes of a FANET are able to hover in the air, as is
evaluation period and count the copies received in that period. the case with fixed-wing UAVs, for example. This forces new
In Mohammed et al. [18], the same authors adjust the ECS experiments to be performed and new results observed.
method by proposing a new probability value and performed The papers [23]–[26] are focused in mitigation problem but
simulations determined that P = 50% is a better value the work scenario is also very specific to VANETs, such as the
compared with the previous one P = 65%, which avoided routing algorithm and the dissemination method, and makes
further retransmissions and resulted in a relatively end-to-end it unlikely to be adapted for FANETs, so they not present
delay without degrading the reachability. solutions that can be used in the scope of this paper.
In both works, [17] and [18], the authors realized that Summarizing, papers in this area seek solutions for the
the approaches used were not comprehensive and the results control and broadcast storm mitigation, [8], [12], [13], [15],
found were limited to the application scenario. Therefore, [16], [20], [21]. This summarization is presented in Figure 2.
in [19] they continued the work and made one more change Other papers test the use of alternative types of data links
in ECS, when they abandoned the idea of a fixed probability [27]–[34], develop or improve routing algorithms for ad hoc
of retransmission and proposed a function that calculates the networks [35]–[49], and even look for integrating different
probability based on the average number of neighbors. In this aerial platforms to provide broader signal coverage [33], [50].
last work, however, the average size of the neighborhood is These other solutions are not detailed because they are out of
fixed. the scope of this paper.
The simulation results revealed that using a neighborhood-
dependent probability threshold achieved mitigation rates B. PROBLEM INVESTIGATION
about 20% higher than in the meter-only, dense network The constant nodes movement in three dimensions is one of
method, and the end-to-end delay was about 26% lower the most distinct characteristics of FANETs, which causes
without sacrificing range in medium to dense networks. new problems related to communication. Because of the high
The work [20], [21] was focused on investigating meth- mobility and variations in the distance among nodes, fluc-
ods to improve the quality of the communication network tuations in communication links often occur. The formation
between UAVs. of new links, the breaking of existing ones, or the variation
In [20] the authors emphasize the applicability of the IEEE of link quality – a typical aspect of intermittently connected
802.11 standard for mobility environments in the 3D plane, networks – directly affects the FANET link layer [51]. That,
although other works have only evaluated it with nodes mov- in turn, affects the network layer, often invalidating IP routes.
ing in two dimensions. They propose a rearrangement of the The repetitive search for paths in the network after each
antennas of the nodes so that the signal coverage is made packet delivery becomes exhaustive and can lead to the
equally in the three dimensions. broadcast storm problem (BSP). So, this type of search is
Multiple antennas are coupled on a small quadricopter and also not ideal for maintaining a routing table in this kind of
also on the ground communication station and the receivers intermittent network.
use the Simple Combination Selection technique to choose Factors such as the increasing interest on multi-UAV
the antenna with the strongest signal. In the paper is still eval- applications; the growing volume of data being transported
uated the communication between two UAVs in the air where between aircraft and their base stations; the high number of
the relative orientation of an airplane changed constantly with manned airplanes that compete for airspace; and the pro-
respect to the other. gressive entry of unmanned aircraft into the dispute for this
They showed that the signal attenuation model called space have demanded a distinct network architecture and with
Rayleigh fading is not appropriate for a scenario of UAVs, so, capabilities such as those enabled by FANETs.
based on the results of [22], they used the Nakagami fading UAV radio signals are omnidirectionally propagated, thus
to calculate the signal density function. the same region may be covered by signals from sev-
The multi-hop capabilities were evaluated in [21]. In this eral nodes, which causes problems such as redundant –
work, the authors extend the analysis to a multi-sender and therefore unnecessary – rebroadcasting, wireless medium
multi-hop network configuration. This configuration repre- contention and packet collisions [8]. The Request-to-
sents the scenario of a FANET, where UAVs are flying in for- Send/Clear-to-Send (RTS/CTS) dialog is not applicable due
mation or cooperation and are intermittently connected to the to the congestion problem that it induces in MANETs [52].
ground station. The performance evaluation was focused on The adoption of broadcasting to spread information over
the provision of coverage with high flow and with impartiality dynamic networks such as general MANETs is an ideal

59740 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 2. Works related to retransmission control in ad hoc mobile networks, since 2002.

solution, but using flooding as a method is a problem. The omnidirectional antennas, being this work the first to present
difference between the two concepts is that flooding aims to the numbers for this problem.
reach out all nodes in the network, and the purpose of broad-
casting is to deliver a message to all reachable nodes in the C. CONTRIBUTIONS
network only once, which would avoid packet redundancy in It is of paramount importance that results of computer simu-
the network and its resultant problems. However, nowadays, lation are reliable, then we did not use models that could lead
that is still a major challenge in wireless ad hoc networks to unrealistic results. So, our first contribution to the state of
where nodes need intermediate relays to communicate. the art is the elaboration of a realistic simulation environment,
As UAVs become operationally more efficient and safe, based on outdoor experimentation.
battery life expands, and regulatory constraints reduce, new We also made a discussion about mobility models and
business models will begin to develop, thus pulling demand then further improved FANET simulations adding parameters
forces that are presently latent. As a result, the US Fed- more appropriate to UAVs than others commonly found in the
eral Aviation Administration (FAA) foresees a scenario with literature, which are applied to generic MANET nodes.
commercial UAS’ cumulative annual growth rates of up Another significant contribution of this work is the pio-
to 46% [53]. One of the main concerns in this airspace sharing neering experimentation of broadcast communication in
is that the network traffic of FANET must be distributed in FANETs using cooperative relaying without retransmission
such a way that it does not disturb commercial flights or the control. In this paper we show the resultant network con-
communication among the nodes that fly at high altitudes in tention and go into details about the broadcast storm problem
a network. in FANETs comprised of more than three UAVs.
In the context of broadcast communication in wireless ad We discuss the necessity and the benefits of retransmission
hoc networks, many research in reliable data dissemination control in critical environments, and as our last contribution
protocols have been carried out for MANETs and VANETs to this research field, we present our approach for mitigating
and could also be derived for FANETs. Due to continual devi- broadcast retransmission that autonomously adapts broadcast
ations in the network density, these protocols must achieve a communication in FANETs, considering the dynamic varia-
high degree of resilience, being able to deal with frequent link tions in neighborhood size. Results of comparison with three
breakage and re-establishment. In sparse networks, protocols well-known broadcast mitigation algorithms in MANETs
incorporate store-carry-forward mechanisms to take advan- show that our algorithm is much more appropriate for the ad
tage of the mobility of vehicles in search of high reachability hoc network of flying nodes than the other existing ones.
rates. In dense networks, suppression techniques are designed
to prevent the BSP but have not achieved optimal solutions for II. EXPERIMENTS IN REAL SCENARIO
multi-directional dissemination [54]. In order to build a realistic simulation environment, we have
This paper aims to present the challenges of spreading carried out in a previous work [55] outdoor experiments with
information in FANETs using broadcast as strategy. To the prototypes to discover the network behavior in real environ-
best of our knowledge, we did not find any literature occur- ment. We tested a prototype quadrotor flight formation, which
rence of BSP results in realistic FANET simulation with runs a pre-programmed mission autonomously, exchanging

VOLUME 7, 2019 59741


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

TABLE 1. Design of field experiments [55]. C is the counter threshold


value, P is the probability of retransmission, A is the area of network
coverage, and R is the range of board’s signal.

FIGURE 3. The embedded platform called Gumstix Overo R Fire, which is


a computer on module (COM) kit composed by a 720 MHz ARM
Cortex-A8 processor with Bluetooth, Wi-Fi and USB connections, used to
run the outdoor experiments. All four UAVs were emulated using these
boards.

data via broadcast. The network behavior was analyzed in The third algorithm is an enhancement of the second
terms of reachability and saved rebroadcasts. one and was proposed by Mohammed et al. [19]. The
Our test bed consisted of four prototyping boards placed authors affirm that fixed values for retransmission prob-
in three topologies, aiming to embrace different situations ability are not likely to be globally optimal because the
of flight formation in UAV swarms. The test bed represents performance depends also on other simulation parameters
a UAV swarm formation, like the leader-follower formation such as topology size, transmission range, number of neigh-
scheme, in which the speed is constant and flight movements bors, etc. Thus, the probability threshold (P) is calculated
are coordinated thus their relative Euclidean distance is also considering the number of neighbors (N ), the transmission
kept constant. radius of the NICs (r), and the network area (A). These
The prototype of UAV’s communication subsystem we values are set on the simulation configuration because they
have built (Gumstix board and a 12 V battery) and the require previous knowledge about the network topology
three network arrangements are shown in Fig. 3 and Fig. 4, and node’s radio capacity. The estimation of these values
respectively. might be possible, for example, by using information from
In that work, we have chosen three algorithms available in routing algorithms which is not under the scope of this
the literature to experiment with the prototype boards [8], [9]: paper.
(i) Simple counter-based, (ii) Fixed probability-based, and Eight experiments varying thresholds and retransmission
(iii) Dynamic probability-based. They are shown in Fig. 5. probability were run. They were modeled as described
The first algorithm is the simplest one and is the basis in Table 1. In all experiments, node START sent 1000 mes-
for the other three. It uses only one term to decide about sages, each one every 125 ms, emulating a mission in which
the retransmission, that is a reception counter – as sug- GCS sends eight messages per second to UAVs composing
gested by its name. If the duplication counter is less than a the FANET. Each message had its Time-To-Live field set to 8
threshold, then the message is rebroadcasted. We have used (the double number of nodes), because smaller values avoided
threshold = 2 and threshold = 3 in our simulations. some messages to be received, and higher values induced too
The second algorithm enhances the first one by adding much redundancy.
a second term to make the decision: a retransmission prob- Each algorithm was evaluated regarding the amount of
ability threshold. If a duplication counter and a random received messages at each node in the three topologies,
number are less than their respective thresholds, then the the percentage of information received by the nodes, and their
message is rebroadcasted. We experimented threshold = 2, capacity of broadcast mitigation.
threshold = 3, P = 50% and P = 65%. The results of these experiments are included in Section VI.
In the first and second algorithms, thresholds are prede- With them, we were able to parameterize the simulation
fined constant values originally suggested by Tseng et al. [8] environment so that it would lead to fair comparisons between
and experimented in [9], [17], [19], [56], and [55]. the results of empirical and simulated experiments.

59742 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 4. Scenarios assumed for the investigation of how information spreads in a FANET composed by one transmitter node (Start) and four relay
nodes arranged in three different network topologies: (a) Topology 1, with up to 80% of signals overlap; (b) Topology 2, with up to 60% of signals
overlap; and (c) Topology 3, with 100% of signals overlap.

FIGURE 5. Three algorithms available in the literature for broadcast storm mitigation. All of them use constant local parameters to decide whether a
message should be broadcast or dropped.

In the simulation framework we developed the network the physical environment, the network configurator, and the
module, which is compound by the radio medium module, network nodes. The radio medium module emulates the

VOLUME 7, 2019 59743


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

TABLE 2. System parameters. TABLE 3. Comparison of information received by each node in real and
simulated environments. Percentages of algorithm 1 are averages of
experiments #1 and #2. Percentages of algorithm 2 are averages of
experiments #3, #4, #5 and #6. Percentages of algorithm 3 are averages
of experiments #7 and #8.

wireless medium where radio waves propagate. We used the III. THE MOBILITY MODEL
Ieee80211DimensionalRadioMedium model, which Mobility models provide to nodes two basic abilities: (i) to
requires a physical environment and a path loss model. The move around the simulation playground, and (ii) to change
PhysicalEnvironment model set the temperature and the velocity during simulation time. As we have set three
the ground elevation. The IPv4NetworkConfigurator dimensions to the mobility model, UAVs are able to fly over
model was responsible to configure the node’s IPv4 address the simulation area.
and to set their routing tables. Five AdhocHost modules Some mobility models that are used in FANETs include
were used to model the nodes, which are wireless hosts with ([45], [57]–[59]): Mission Plan-based model, Semi-Random
ad hoc management scheme. Circular Movement, Random Waypoint Mobility, and
Those modules can be adjusted according to network Gauss-Markov Mobility. In Mission Plan-Based model,
requirements, and we have carried out many different sim- the flight plan is predefined, and the aircraft move along
ulation runs in search for the more appropriate parame- the planned path wherever they can reach mission space
ters. Mainly, we have varied the background noise between and the target location is accessible. In Semi-Random Cir-
−120 and −85 dBm and the radio transmission power cular Movement model, UAVs fly circular paths around an
between 5 and 50 mW. Six wave propagation models were area capturing information about an underlying region. The
simulated: (i) NakagamiFading, (ii) RicianFading, Gauss-Markov Mobility model is used in simulations of
(iii) RayleighFading, (iv) LogNormalShadowing, swarm behavior, where the movement of the UAVs are cor-
(v) TwoRayGroundReflection, and (vi) FreeSpace- related to each other, and in simulations where mobile nodes
PathLoss. have to be forced away from the edges of the playground
After analyzing the results of every model variations, area. We considered the swarm behavior in simulations
the parameters presented in Table 2 were chosen to represent with no relative mobility, which we present in more detail
the field environment in the simulations. in Section IV.
The real environment is a stochastic process; it is impos- The model we have adopted in simulations with mobility
sible to replicate the exact scenario of our field experiments, is the Random Waypoint Mobility, which is a widely used
with exact interferences from outdoor signals, obstacles such mobility model in simulation of mobile ad hoc networks
as buildings and trees, and the wave reflections from the ([45], [57], [58], [60]–[70]). We have chosen it due to the fact
ground and moving cars, for example. This kind of processes that UAVs in this model fly straight paths between random
are modeled and tested to operate like the real environment, waypoints, free and independently from other UAVs in the
but we can not use absolute values because, by nature, they same network area limits. In this mobility model, mobile
will always be different. However, the percentages of received nodes can stay at waypoints for a period (i.e., a pause time),
information – which represent the behavior of the evaluated but in our simulation, we did not use this characteristic
algorithms – are of great importance and were considered in because we would be limiting our analysis to hovering aircraft
our evaluation. The final results are shown in Table 3. only, which is not desired.
With these results, we moved to the next steps, adding Fig. 6 illustrates three-dimensional paths flown by four
mobility to nodes, varying the network density and checking UAVs during a simulation run, in a cuboid of sides
the impact of flooding in a FANET network. 1000 m × 2000 m × 80 m.

59744 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

TABLE 4. Simulation parameters.

FIGURE 6. Three dimensional trajectory of UAVs during simulations using distance among UAVs, and the variation of the network
the Random Waypoint Mobility model.
density, it is no longer possible to hold the FANET nodes
in those three static network topologies mentioned before
(Fig. 4). The results we present in the following sections
will, then, be split into simulations with four UAVs fixed into
three static topologies, and simulations with more than three
UAVs moving around the network area, where the topology
is dynamically changed (simply put as dynamic topology).

IV. FLOODING SIMULATION


We have simulated FANETs where GCS periodically broad-
casts messages, and all intermediate nodes immediately
retransmit them as soon as they were received. This is how
the simple flooding algorithm works.
In our simulations, an application running at the GCS sent
FIGURE 7. Variation of UAV’s speed during experiments, generated by the 1000 different messages at a rate of 8 messages per second.
uniform distribution function U (12 mps, 25 mps). The application has generated messages with 1024 bytes,
and UDP (User Datagram Protocol), IP (Internet Protocol)
and MAC (Medium Access Control) protocol encapsulations
One vital feature to UAVs is a collision avoidance sys- added up 64 bytes. At the end of stacking, packets were broad-
tem. Although it is desired that realistic mobility models for casted with the size of 1088 bytes. The application running at
FANETs consider this aspect, our framework did not include the relay nodes immediately retransmitted the messages as
this feature in any mobility model available, so we have not soon as they were received at the application layer.
simulated collision avoidance behavior. Our motivation in Our FANET used the IEEE 802.11g protocol, which has
this work is to analyze the communication among UAVs in a a 54 Mbps traffic capacity and 2346 Bytes maximum frame
FANET, thus we considered that a collision avoidance system size [73], [74]. Therefore, each frame was able to carry one
does not influence the FANET performance. message without fragmentation. We have chosen that Wi-Fi
UAVs’ speed also randomly changed during simulation and standard because it is widely available in civilian small-scale
the value was generated by a uniform distribution in the range drones.
[12 mps, 25 mps]. A representation of its variation in one Based on a realistic parameterization of the simulation
replication of a simulation is shown in Fig. 7. environment, we carried out two types of experimentation:
Velocity variation may speed up fuel consumption or bat- with and without mobility.
tery discharge in UAVs. Fuel and power consumption are The first flooding simulation we run had four UAVs. In the
stochastic processes that are out of this paper’s scope. Works second, we varied the number of UAVs, their speed, and their
in this topic suggest that UAVs’ battery still has the majority 3D position.
of its charge when the mission reaches the 125 seconds We carried out these flooding simulations to demonstrate
mark ( [71], [72]), even micro aerial vehicles, so we did not the occurrence of the broadcast storm problem and to show its
consider a finite power source in this work. Instead, we have impact on the network. Tables 2 and 4 summarize simulation
simulated a mission with 125 seconds of duration, thus we environments.
considered that FANET UAVs have sufficient battery power The application running at GCS generated 68 kilobits
to accomplish the mission. per second, which represents only 0.12% of the nominal
With the use of the Random Waypoint mobility model, network capacity. Because of the GCS’s irrelevant use of the
the variation of both the flight speed and the Euclidean network, we do not consider its impact in our analysis.

VOLUME 7, 2019 59745


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 8. The average number of messages received by each FANET’s node. These values are the arithmetic mean between each
simulation replication of the flooding algorithm. Transparent areas represent the number of frames that arrived with errors and were
discarded by the MAC protocol, thus, not being received by the application layer. (a) Simulations with four UAVs under three fixed and
one dynamic topology. (b) Simulations with more than three UAVs, under dynamic topology.

A. DATA REDUNDANCY TABLE 5. Average redundancy of application messages caused by


flooding.
The first analysis of flooding impact is about data redundancy
on the network.
GCS sent out 1000 individual messages to the network, and
in Fig. 8(a) we can see that the unrestrained retransmissions
have multiplied this number to an order of hundreds of thou-
sands.
The broadcast operation is intrinsic to FANETs and mobile
ad hoc networks due to broadcasting nature of radio transmis-
sion [75]–[77]. However, broadcast is not reliable because
no acknowledgment is made and can interfere with other
transmissions, as in the topologies given in Fig. 4, causing
(i) the exposed terminal problem and (ii) the hidden terminal
problem. Exposed terminal problem occurs when a node is
prevented from sending packets to other nodes because of a
nearby transmitter, either when the node detects the neigh-
bor’s transmission and backs off for a while, or when packets not present because they are only pertinent to unicasting
transmitted simultaneously by neighbors collide and cannot on infrastructured networks. The lack of these mechanisms
be successfully received. The hidden terminal problem occurs makes the FANET radio channel more susceptible to errors
when an intermediate node receives, at the same time, two when there are many broadcast communications in a short
incoming transmissions from two neighbors that are out of period of time, then all nodes had received some erroneous
range from each other. data even when they were static – under topologies 1 and 2.
In FANETs based on Wi-Fi technology, hosts are equipped Moreover, UAV’s movements cause fluctuation on radio
with CSMA/CA (Carrier Sense Multiple Access with Col- waves and instability to the data link. As a consequence,
lision Avoidance) transceivers, but there is no use of we can note in Fig. 8 that erroneous data reception was more
CSMA/CD (Carrier Sense Multiple Access with Collision severe under dynamic topologies than under static topologies.
Detection) [73], [74], [78] to detect the hidden node problem A different view of these data, shown in Table 5, reveal the
and packet collisions on the medium. Also, the RTS/CTS excessive percentage of redundant messages flowing through
dialogue and the acknowledgment of received frames are the network. It is proof of unwarranted use of the wireless

59746 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 9. The average number of messages broadcasted by each of the FANET’s node. These values are the arithmetic mean between
each simulation replication. Transparent areas represent the number of messages discarded at the MAC layer due to lack of space in the
output buffer. The sum of the transparent and colored areas is equal to the total number of messages sent by the application down into
the UDP/IP stack. It is also equal to the number of messages received correctly. (a) Simulations with four UAVs under three fixed and
one dynamic topology. (b) Simulations with more than three UAVs, under dynamic topology.

channel, reducing the useful bandwidth, overloading hosts’ the application layer are queued in the output buffer while
processor, and wasting energy – a resource which must be the CSMA/CA mechanism decides when is the right moment
saved to prolong flight time. to transmit them. When this memory area has no more free
At this point, it is possible to notice that the message space, new messages cannot be queued and are automatically
redundancy tends to increase as the FANET gets denser. It discarded.
happens because the network area is always the same, and the When CSMA/CA senses the idle medium, frames are
number of neighbors increases but their relative distance does broadcasted. When it detects that the medium is busy, new
not. Then, the number of overlapping signals also increases, transmissions are deferred in order to avoid packet collisions.
making many UAVs receive and retransmit the same mes- By postponing queued frames, the output buffer becomes
sages in parallel. full, and new messages coming from the application layer
It is possible to observe that the redundancy does not are discarded without actually being dispatched from the
increase at the same rate of node numbers, i.e., the redun- node. One can see the impact of the transmission contention
dancy does not double or triple as the number of UAVs in Figures 9(a) and 9(b), where we can note that the more
increases by 2 or 3. This behavior is related to the channel dis- signal overlaps are present, the greater is the dispute for the
pute and the amount of erroneous data received. In addition to channel and the lower is the average number of messages
connection instability – caused by UAVs’ three-dimensional retransmitted by each node.
movements –, the denser the FANET is, the harder is to
control medium access, and interferences eventually occur, B. INFORMATION REACHABILITY
increasing the number of frames received erroneously. That Each message sent by the GCS station had unique infor-
is why the number of frames received by each node does mation. Relay nodes replicate data when they rebroadcast
not increase at the same rate as the number of nodes in messages, and the information becomes redundant for nodes
FANET. This is a feature that only can be seen in a realistic that receive these data more than once. Therefore, nodes
experimentation and is a contribution of this paper. relaying a message may be spreading data, but, due to redun-
Every frame correctly received by the MAC layer was dancy, they are not necessarily aggregating new information
sent up to the protocol stack until arriving at the application or knowledge to receivers.
layer, where a message was decapsulated, registered in logs, For that reason, when a node A loses one message relayed
immediately encapsulated again in a new UDP packet, and by node B, it does not mean straightforwardly that some infor-
sent down to the protocol stack to be broadcast in the network. mation has been lost, since that message could be carrying
Fig. 10 illustrates these steps. Messages coming down from data redundant to A.

VOLUME 7, 2019 59747


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

in this scenario (61.8 seconds) would have prevented this


strategy from succeeding.
At the beginning of each mission, all UAVs were in GCS’
transmission range, increasing signal overlaps. They have
been able to successfully receive the very first messages sent
by GCS, which were vastly rebroadcasted.
The output buffer of MAC layer had been filled with
duplicates of the first messages and emptied on three sit-
uations: (i) as outgoing messages were discarded due to
lack of space, (ii) as queued frames were rebroadcasted,
or (iii) when message receive was interrupted by link
disruption.
When UAVs were closer and link disruption was undone,
the same data was kept on the loop between the nodes within
the signal area because of the immediate and indiscriminate
retransmissions, preventing the reception of new messages
[sent by GCS in a substantially lower rate]. This unfavorable
circumstance led 1000 messages generated by GCS to an
uneven probability of reception.
It is possible to observe in the charts of Fig. 12 that few
IDs were excessively received because they were on a retrans-
mission loop – which explains the results of redundancy –
and that many IDs were barely received or not received at
FIGURE 10. Flooding flowchart, illustrating how frames are received at all, producing low variability of information - which com-
MAC layers from PHY layer, goes up the protocol stack until it reaches the plements the explanations about the decreasing percentage of
Application layer. The Application layer, then, initiate the reverse path to
relay a message to the neighborhood.
information collected in simulations with flooding when the
FANET gets denser.
The main objective of an application that rely on broadcast
In order to analyze the reachability of the information gen- to spread messages is to reach all nodes in the network.
erated in a mission, this distinction between ‘‘data received’’ So far we have proved that flooding is not the ideal strat-
and ‘‘information received’’ must be clear. egy to achieve this purpose due to the following reasons:
Starting with the scenarios with only four relay nodes, (i) increased message redundancy, (ii) increased information
we can see in Fig. 11(a) (under topology 3) that UAVs loss, and (iii) delayed message delivery demonstrating the
received more information in the shortest time among all broadcast storm problem in FANETs and explain the demand
network arrangements, despite the greater redundancy shown for mitigation techniques.
in Fig. 8(a). That is explained firstly by the stability of the In the following section, we present the evaluation of mit-
communication link, and secondly by the greater chance for igation algorithms in FANET scenarios.
a message to be received when more copies of it are available
in the network. V. DYNAMIC NEIGHBORHOOD-BASED ALGORITHM FOR
When UAVs were moving, link oscillation (caused by the THE BROADCAST STORM PROBLEM
variation of velocity and the Euclidean distances between One approach to minimize redundancy, and thus contention
UAVs) caused data losses (shown in Fig. 8(b)) and kept and collision, is to constrain some UAVs from rebroad-
messages carrying redundant information on loop for long casting, diminishing the broadcast storm problem. Instead
periods. It resulted in a low percentage of received infor- of immediately rebroadcasting a message, a node stores it
mation and a high end-to-end delay to deliver information, in a ‘‘wait queue,’’ estimates redundancy and accumulates
as shown in Fig. 11(b). knowledge to support its decision to rebroadcast the mes-
The average delay on messages delivery in the best case sage or not. This restriction can be made using mitigation
scenario (4 UAVs in topology 3) was 5.6 seconds and – techniques that are classified in five groups: counter-
depending on the application – this time can be considered based, probability-based, distance-based, location-based, and
acceptable for receiving or replying a request from GCS. cluster-based [8].
However, knowing that the UAVs were flying at a maximum The algorithms evaluated in this work (Fig. 5) compute
speed of 25 mps, the average end-to-end delay in the sim- messages duplication within a predefined interval, or adopt
ulation with the denser FANET allowed UAVs to fly up to a predefined probability of retransmission, or decide based
140 meters away, from the time the message was sent until it on a predefined estimation of the neighborhood size.
was received. If the FANET application were using broadcast After analyzing the results of these algorithms, we real-
as part of the collision avoidance strategy, the average delay ized that other factors could be taken into account, such as

59748 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 11. The average percentage of information received by each node and the end-to-end delay (in seconds) of each message’s
delivery, under different network arrangements. (a) Simulations with four UAVs under three fixed and one dynamic topology.
(b) Simulations with more than three UAVs, under dynamic topology.

(i) continuous sense of surrounding signals, to estimate the Part I is written in Fig. 13 and takes into account the
number of neighboring UAVs and to compute the additional evaluation of received messages.
coverage achieved by a retransmission; (ii) enlargement of the When UAVs receive a message, the first task is to update
waiting period before the decision, to increase the counter’s their list of neighbors with the address of the message’s last
effectiveness and decrease the Time To Live (TTL) impact of hop (lines 2 and 3).
the message; (iii) store information about received or retrans- The second task is to verify if a transmission with the same
mitted messages rather than re-accepting a message after its ID has been done in the last hour (lines 5 and 6). If that
retransmission, and (iv) store information about neighbors data has been transmitted less than an hour ago, the received
who are duplicating retransmissions. The GCS station could message is discarded (line 9), because we consider this data
also improve message parameterization by modifying, for would not add new information either to the local UAV nor
example, the TTL field according to the number of nodes in to the neighbors, avoiding then to use the wireless medium
the network. for redundant transmission. After discarding the received
One way to keep the percentage of received information message, the algorithm returns and waits for new incoming
high is not mitigating many messages. Oppositely, the fewer messages. If that ID was transmitted more than one hour ago,
messages are mitigated, the more neighboring nodes increase it is then removed from the list of sent messages (line 7),
their counter, and as a consequence, more mitigation occurs the received message is not discarded and the next step is
later. executed.
This way, nodes nearest to GCS relay incoming mes- The third and last step when receiving a message is to
sages, intermediate nodes receive and drop part of them, check if there is already a message with the same ID in
and distant nodes are the ones who lose most of the the waiting queue (line 13). If so, the waiting message’s
information. counter is incremented, its TTL field is decremented, and
Therefore, we have developed a broadcast storm mitigation the received duplicate is discarded. Otherwise, that received
technique, which improves the Simple Counter-Based with a message is inserted into the queue, its counter is initialized
list of messages sent in the last hour and uses the dynamic with 1, its TTL field is not changed, and a retransmission
number of neighbors to decide which message to retransmit. timer is started.
We named it Dynamic Neighborhood-based Algorithm for the At the application layer, the mitigation algorithms decre-
Broadcast Storm Problem (DNA-BSP). For better compre- ments the TTL field when a copy of a waiting message is
hension, we present it in two parts. received, so the information’s lifetime spans as expected by

VOLUME 7, 2019 59749


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 12. These dot plots present messages received over time, in simulations with mobility, where the network density was varied. The X-axis
represents the simulation time, in seconds, and the Y-axis, the unique ID number of each message, which was an integer ranged from 0 to 1000. Each
point (m, t ) represents a message m received at a time t by one of the FANET’s UAV. (a) 4 UAVs. (b) 8 UAVs. (c) 12 UAVs. (d) 16 UAVs. (e) 20 UAVs.
(f) 40 UAVs. (g) 80 UAVs.

59750 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 14. Estimation1 of memory usage (in Bytes) to store the list of
sent messages in each UAV. In our simulation platform, the container
overhead used 48 Bytes, plus 8 Bytes for IDs, plus 8 Bytes for the
message’s transmission time.

FIGURE 13. Dynamic neighborhood-based algorithm, part I: Reception


and evaluation of broadcast messages.

GCS. When a message is sent by the application down to the


protocol stack, the IP protocol decrements the TTL field, and
if the final value is greater than zero, continues to send it down
to the MAC protocol. Otherwise, that IP packet is discarded
and the original message does not leave the node.
Considering the case where one UAV receives one copy of
every message sent in the last 3600 seconds, and all of them
are retransmitted, 28,800 (ID, time) tuples would be inserted
into the list of sent messages. In a 64-bit architecture, that list
would occupy approximately1 450 KBytes of memory space,
and this is an acceptable demand for resources of computers
embedded in civilian UAVs that are able to realize missions FIGURE 15. Dynamic neighborhood-based algorithm, part II: Decision on
with one hour of endurance. retransmission of waiting messages.

Our simulations have run for 125 seconds, and the used
memory was less than 340 KBytes. Our measurements can
In this first part of our algorithm, two conditions are
be seen in Fig. 14.
evaluated about received messages: (i) if they were already
received and retransmitted in the last mission hour, or (ii)
1 The data structure used to store message IDs and time of transmissions
if they are already present in the waiting queue. If any
in our implemented code is the std::map container, available in the C++
language. It uses the red-black tree, which in turn makes use of pointers and of the above conditions are satisfied, the received data is
other variables to keep nodes balanced. It is known that, in red-black tree discarded. Otherwise, that data is accepted and inserted into
implementations, leaf nodes are not relevant and usually do not contain any the retransmission queue. No messages are removed from this
data. Theses leaves need not to reside in computer memory, and are com-
monly identified by a null-pointer. In order to save memory and execution queue in Part I.
time, sometimes a pointer to a single sentinel node (instead of a null-pointer) When a message’s timer ends, this message is removed
performs the role of all leaf nodes; all references from internal nodes to leaf from the waiting queue, and the decision on retransmission
nodes then point to the sentinel node. For that reason, the real memory space
occupied by the list of sent messages may slightly vary, depending on how a or not is made in Part II (Fig. 15), taking into considera-
library implements that structure. tion if (i) the message’s duplication counter is less than the

VOLUME 7, 2019 59751


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 16. Simulation results of the four mitigation algorithms in a FANET with four nodes within the three static topologies. (a) The average
number of messages received by each of the four FANET’s node. These values are the arithmetic mean between each simulation replication.
There was no occurrence of erroneous frames. Less is better. (b) The average end-to-end delay (in seconds) of each message’s delivery, under
different network arrangements. Less is better. (c) The average number of messages broadcasted by each of the four FANET’s node. These
values are the arithmetic mean between each simulation replication. All messages sent by the application down into the UDP/IP stack were
transmitted successfully. Less is better. (d) The average percentage of information received by each node, under different network
arrangements. More is better.

threshold, and if (ii) the actual number of neighbors had In simulations with threshold = 2, a copy of a waiting
increased since the last timer has ended (line 26). message’s data must have been received only once, so that

59752 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

FIGURE 17. Simulation results of the four mitigation algorithms in FANETs with more than three nodes under a dynamic topology. The
output buffer was able to handle all messages, so all rebroadcasts were done successfully. In (a), (b), (c), and (d) less is better. In (e),
more is better.

VOLUME 7, 2019 59753


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

message retransmission is approved. With threshold = 3, that cases (Fig. 16(d)). It happens because information does not
data is allowed to be received twice while the message was in reach nodes farther from GCS due to intermediate mitigation.
the queue. By observing the results, we can see that the algo-
When all conditions are satisfied, the message is then rithms maintained the same behavior in simulations with and
retransmitted (line 27) and a tuple composed of the retrans- without mobility: the one which mitigates more messages
mission time and the message’s ID is inserted into the list of decreases redundancy and latency, but increases the loss of
sent messages (line 28). Otherwise, the waiting message is information.
dropped (line 30). In simulations with mobile UAVs, there was also a noto-
The last task of Part II is to update the number of UAV’s rious decline in the number of frames that arrived with
neighbors (line 32) and to erase the neighbors list (line 33), errors (Fig. 17(a)), the number of messages received correctly
so it is re-populated when new messages arrive. (Fig. 17(b)), and the delay on message delivery (Fig. 17(c))
Threshold values greater than 3 are not considered because, in comparison with results of the flooding algorithm
according to [8], they produce more redundancy in the net- (Figures 8(b) and 11(b), respectively).
work and do not provide additional coverage. We can view in Fig. 17(d) that as long as the FANET gets
denser, the mitigation algorithms tend to be more efficient,
VI. DNA-BSP SIMULATION RESULTS diminishing much of the transmissions, increasing the per-
Simulation Results with the four algorithms and four UAVs centage of information spread (Fig. 17(e)) and providing a
fixed in the three topologies are presented in Fig. 16. The faster delivery (Fig. 17(c)), such as less than half a second.
first noticeable fact is the drastic reduction of redundant data As DNA-BSP accumulates more knowledge than the others,
flowing through the network. its efficiency is higher than the others.
Whereas the number of received messages crossed the The broadcast storm mitigation algorithms use the store-
170,000-mark in the flood scenario (Fig. 8(a)), UAVs carry-forward technique to accumulate knowledge about data
received less than 4500 messages when transmissions were before deciding on retransmission, which is more appropriate
being restrained (Fig. 16(a)). The DNA-BSP algorithm has than the flooding for multi-hop mobile wireless networks
reduced 99.46% of received messages in topology 1, 99.71% with intermittent connectivity – like FANETs – and has led
in topology 2, and 98.73% in topology 3. to a decline in the number of redundant messages on the
The number of transmissions also decreased enormously. network.
UAVs transmitted more than 60,000 messages when they The interruption of the loops that occurred in the flood-
were flooding the network (Fig. 9(a)), but this number ing simulations allowed newer information to have a higher
dropped to less than 2500 when mitigation algorithms were chance of being retransmitted, thus increasing the percentage
running (Fig. 16(c)). The DNA-BSP algorithm was able to of information received by the nodes.
efficiently reduce 99.91% of transmitted messages under The FANET network is designed so that a mission can be
topology 1, 99.99% in topology 2, and 99.39% in topology 3. performed jointly by multiple UAVs, and taking up part of
It means were done almost no redundant retransmissions the capacity of the wireless medium with expendable data can
when DNA-BSP were running. weaken the mission accomplishment.
One can also note that, unlike with the flooding algo- Depending on the use of the broadcast technique, when
rithm, no incoming packets were rejected by the MAC layer information losses occur – due to excessive mitigation or
(Fig. 16(a)) and the output buffers had not discarded any transmission failures – the application may generate duplicate
message as well (Fig. 16(c)), showing that four static UAVs requests as an attempt to correct such loss. This rise in net-
moderately broadcasting did not generate enough traffic to work demand would then be a consequence of the inefficiency
distort CSMA/CA performance. of mitigation methods.
In addition to the reduction of data redundancy, packet In addition to characterizing the BSP problem and present-
collision, and network contention, another benefit is the ing the advantages of using mitigation algorithms, we have
lower data latency. The average end-to-end delay decreased shown that the more an algorithm decreases retransmissions,
from 8.3, 8.7, and 5.6 seconds (Fig. 11(a)) to 0.2, 0.37, and the higher is the loss of information at the application level.
0.16 seconds (Fig. 16(b)) in topologies 1, 2, and 3, respec-
tively. Therefore, messages are delivered up to 97.6% faster VII. CONCLUSION
when there is less redundancy in the network. In this paper, we focus on the broadcast storm problem that
The broadcast communication is often used to control occurs in flying ad hoc networks when information needs
flight formation, to avoid collision between UAVs, to manage to be widespread throughout the network. Our contributions
mission progress or to update IP routes within the network, are the following. First, we present the broadcast storm
and reducing the channel dispute is beneficial in the sense problem in a realistic scenario, showing all the numbers
that more bandwidth is available to the traffic of other types and the system behavior when it occurs. Second, we intro-
of data like imagery generated or data collected by the UAVs. duce DNA-BSP, a broadcast storm mitigation technique,
On the other hand, we can observe in simulations with which improves the Simple counter-based with a list of mes-
less redundancy, that nodes received less information in some sages sent in the last hour and uses the dynamic number of

59754 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

neighbors to decide which message to retransmit. Third, that improvements on DNA-BSP also consider mitigation
we compare the best-known literature mitigation algorithms techniques other than the probabilistic ones.
with our solution. We based our proposals in (i) real data,
collected on experiments in an outdoor environment to deter- ACKNOWLEDGMENT
mine the realistic parameterization and a reliable simulation The views and conclusions contained in this document are
environment; (ii) the best-known algorithms existent in the those of the authors and should not be interpreted as rep-
literature (Simple counter-based, Fixed probability-based, resenting the official policies, either expressed or implied,
and Dynamic probability-based); and (iii) wise decision, of the Army Research Office or the U.S. Government. The
since DNA-BSP accumulates knowledge about the past state U.S. Government is authorized to reproduce and distribute
of the information and the current state of the neighborhood reprints for Government purposes notwithstanding any copy-
to increase its efficiency, even with a higher number of UAVs. right notation herein.
As main conclusions, we can cite the performance behav-
iors that lead us to answer the most important question REFERENCES
of this work. That is, the question that studies the prob- [1] S. Hayat, E. Yanmaz, and R. Muzaffar, ‘‘Survey on unmanned aerial vehi-
lem of the broadcast storms in FANETs and an appropriate cle networks for civil applications: A communications viewpoint,’’ IEEE
Commun. Surveys Tuts., vol. 18, no. 4, pp. 2624–2661, 4th Quart., 2016.
countermeasure.
[2] A. Bujari, C. T. Calafate, J.-C. Cano, P. Manzoni, C. E. Palazzi, and
Firstly, our work presents real experiments and simulation D. Ronzani, ‘‘Flying ad-hoc network application scenarios and mobility
results of broadcast communication in FANETs operating models,’’ Int. J. Distrib. Sensor Netw., vol. 13, no. 10, pp. 1–17, Oct. 2017.
with omnidirectional antennas, using numbers to show the [3] M. A. Khan, A. Safi, I. M. Qureshi, and I. U. Khan, ‘‘Flying ad-hoc
networks (FANETs): A review of communication architectures, and rout-
consequences of the broadcast storm problem. ing protocols,’’ in Proc. 1st Int. Conf. Latest Trends Elect. Eng. Comput.
Our simulations also highlighted that this kind of commu- Technol. (INTELLECT), Karachi, Pakistan, Nov. 2017, pp. 1–9.
nication is really problematic in FANETs, and, although it [4] X. Ma, ‘‘Data collection of mobile sensor networks by drones,’’
Ph.D. dissertation, Universite de Toulouse, Inst. Nat. Polytechnique de
does not keep pace with the number of network nodes, data Toulouse, Toulouse, France, Nov. 2017.
redundancy does tend to increase as the FANET gets denser. [5] E. Yanmaz, M. Quaritsch, S. Yahyanejad, B. Rinner, H. Hellwagner, and
Using computer simulation, we have shown the negative C. Bettstetter, ‘‘Communication and coordination for drone networks,’’
in Ad Hoc Network (Lecture Notes of the Institute for Computer Sci-
impact of flooding scheme in dense FANETs, causing high ences, Social Informatics and Telecommunications Engineering), vol. 184,
rates of information loss, and high end-to-end delay, which is Y. Zhou and T. Kunz, Eds. Cham, Switzerland: Springer, Dec. 2017,
the aftermath of the network contention. pp. 79–91.
[6] H. Shakhatreh et al., (2018). ‘‘Unmanned aerial vehicles: A survey
Secondly, the demand for mitigation techniques was on civil applications and key research challenges.’’ [Online]. Available:
explained. The best-known mitigation algorithms in the lit- https://arxiv.org/abs/1805.00881
erature were evaluated and compared with each other. None [7] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, ‘‘Flying ad-hoc networks
(FANETs): A survey,’’ Ad Hoc Netw., vol. 11, no. 3, pp. 1254–1270,
of these algorithms are generic enough, specially when the May 2013.
number of nodes in the FANET increases. The reason is that [8] Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, ‘‘The broadcast storm
these algorithms do not have knowledge either about past problem in a mobile ad hoc network,’’ Wireless Netw., vol. 8, nos. 2–3,
pp. 153–167, Mar. 2002.
information nor the current state of the network topology.
[9] B. Williams and T. Camp, ‘‘Comparison of broadcasting techniques for
Then, we proposed the Dynamic Neighborhood-based mobile ad hoc networks,’’ in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc
(DNA-BSP), which we designed considering that, Netw. Comput., New York, NY, USA, Jun. 2002, pp. 194–205.
in FANETs, nodes are flying – moving freely in 3-dimensions [10] D. G. Reina, S. L. Toral, P. Johnson, and F. Barrero, ‘‘A survey on
probabilistic broadcast schemes for wireless ad hoc networks,’’ Ad Hoc
– and the neighborhood size continuously changes. This Netw., vol. 25, pp. 263–292, Feb. 2015.
algorithm aims to perform better mitigation when considering [11] A. Boukerche, Algorithms and Protocols for Wireless and Mobile Ad Hoc
the literature mitigation algorithms. Networks (Wiley Series on Parallel and Distributed Computing). Hoboken,
NJ, USA: Wiley, Nov. 2008.
Providing a high information delivery ratio while reducing [12] Y.-C. Tseng, S.-Y. Ni, and E.-Y. Shih, ‘‘Adaptive approaches to relieving
broadcast redundancy is still a major challenge in FANETs. broadcast storms in a wireless multihop mobile ad hoc network,’’ IEEE
However, simulation results concerning the percentage of Trans. Comput., vol. 52, no. 5, pp. 545–557, May 2003.
[13] M. Gerla and Y. Yi, ‘‘Team communications among autonomous sensor
information received by UAVs, the end-to-end delay, and swarms,’’ ACM SIGMOD Rec., vol. 33, no. 1, pp. 20–25, Mar. 2004.
the mitigation efficiency of the algorithm have shown that [14] F. N. Webber and R. E. Hiromoto, ‘‘Assessing the communication issues
our mechanism outperforms the compared ones, improv- involved in implemening high-level behaviors in unmanned aerial vehi-
cle,’’ in Proc. MILCOM, Oct. 2006, pp. 1–7.
ing real-time communication by reducing the delivery delay
[15] X. Han, L. F. Rossi, and C.-C. Shen, ‘‘Autonomous navigation of wireless
in 95% and reducing the wireless channel’s use by transmit- robot swarms with covert leaders,’’ in Proc. 1st Int. Conf. Robot Commun.
ting 98% fewer duplicates. Because DNA-BSP also accumu- Coordination (RoboComm), Piscataway, NJ, USA, Oct. 2007, Art. no. 27.
lates knowledge about the neighborhood, the efficiency of the [16] N. Wisitpongphan, O. K. Tonguz, J. S. Parikh, P. Mudalige, F. Bai, and
V. Sadekar, ‘‘Broadcast storm mitigation techniques in vehicular ad hoc
algorithm increases when the FANET gets more populated. networks,’’ IEEE Wireless Commun., vol. 14, no. 6, pp. 84–94, Dec. 2007.
The purpose of this paper was to elucidate the BSP problem [17] A. Mohammed, M. Ould-Khaoua, and L. Mackenzie, ‘‘An efficient
in FANETs and to present an efficient solution to it. We sug- counter-based broadcast scheme for mobile ad hoc networks,’’ in Formal
Methods and Stochastic Models for Performance Evaluation (Lecture
gest that future works investigate the QoS of the wireless Notes in Computer Science), vol. 4748, K. Wolter, Ed. Berlin, Germany:
channel in a FANET whose UAVs use the DNA-BSP, and Springer, 2007. pp. 275–283.

VOLUME 7, 2019 59755


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

[18] A. Mohammed, M. Ould-Khaoua, and L. Mackenzie, ‘‘Improvement to [39] R. Shirani, M. St-Hilaire, T. Kunz, Y. Zhou, J. Li, and L. Lamont, ‘‘On the
efficient counter-based broadcast scheme through random assessment delay of reactive-greedy-reactive routing in unmanned aeronautical ad-hoc
delay adaptation for MANETs,’’ in Proc. 2nd UKSIM Eur. Symp. Comput. networks,’’ Procedia Comput. Sci., vol. 10, pp. 535–542, Jan. 2012.
Modeling Simulation, Sep. 2008, pp. 536–541. [40] L. E. Quispe and L. M. Galan, ‘‘Behavior of Ad Hoc routing protocols,
[19] A. Mohammed, M. Ould-Khaoua, and L. Mackenzie, ‘‘An improved analyzed for emergency and rescue scenarios, on a real urban area,’’ Expert
rebroadcast probability function for an efficient counter-based broadcast Syst. Appl., vol. 41, no. 5, pp. 2565–2573, Apr. 2014.
scheme in MANETs,’’ in Proc. 25th Annu. UK Perform. Eng. Workshop [41] Y. Zheng, Y. Jiang, L. Dong, Y. Wang, Z. Li, and H. Zhang, ‘‘A mobility
(UKPEW), Jul. 2009, pp. 1–12. and load aware OLSR routing protocol for UAV mobile ad-hoc networks,’’
[20] E. Yanmaz, R. Kuschnig, and C. Bettstetter, ‘‘Achieving air-ground com- in Proc. Int. Conf. Inf. Commun. Technol. (ICTCT), May 2014.
munications in 802.11 networks with three-dimensional aerial mobility,’’ [42] S. Rosati, K. Krużelecki, G. Heitz, D. Floreano, and B. Rimoldi, ‘‘Dynamic
in Proc. IEEE INFOCOM, Apr. 2013, pp. 120–124. routing for flying ad hoc networks,’’ IEEE Trans. Veh. Technol., vol. 65,
[21] S. Hayat and E. Yanmaz, ‘‘Multi-hop aerial 802.11 network: An experi- no. 3, pp. 1690–1700, Mar. 2015.
mental performance analysis,’’ in Proc. Austrian Robot. Workshop, 2015, [43] K. Singh and A. K. Verma, ‘‘Experimental analysis of AODV, DSDV
pp. 20–21. and OLSR routing protocol for flying adhoc networks (FANETs),’’ in
[22] N. C. Beaulieu and C. Cheng, ‘‘Efficient Nakagami-m fading channel Proc. IEEE Int. Conf. Elect., Comput. Commun. Technol. (ICECCT),
Simulation,’’ IEEE Trans. Veh. Technol., vol. 54, no. 2, pp. 413–424, Coimbatore, India, Mar. 2015, pp. 1–4.
Mar. 2005. [44] M. H. Tareque, M. S. Hossain, and M. Atiquzzaman, ‘‘On the routing in
[23] R. Kumar and M. Dave, ‘‘A framework for handling local broadcast storm flying ad hoc networks,’’ in Proc. Federated Conf. Comput. Sci. Inf. Syst.
using probabilistic data aggregation in VANET,’’ Wireless Pers. Commun., (FedCSIS), Lodz, Poland, Sep. 2015, pp. 1–9.
vol. 72, no. 1, pp. 315–341, Feb. 2013. [45] M. B. Yassein and N. A. Damer, ‘‘Flying ad-hoc networks: Routing proto-
[24] R. I. Meneguette, G. Maia, E. R. M. Madeira, A. R. Pinto, cols, mobility models, issues,’’ Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 6,
A. A. F. Loureiro, and L. A. Villas, ‘‘A new solution to perform pp. 162–168, Jun. 2016.
data dissemination in vehicular networks,’’ in Proc. Brazilian Symp. [46] G. Gankhuyag, A. P. Shrestha, and S.-J. Yoo, ‘‘Robust and reliable pre-
Comput. Netw. Distrib. Syst., May 2014, pp. 443–450. dictive routing strategy for flying ad-hoc networks,’’ IEEE Access, vol. 5,
[25] Y. Mylonas, M. Lestas, A. Pitsillides, P. Ioannou, and V. Papadopoulou, pp. 643–654, 2017.
‘‘Speed adaptive probabilistic flooding for vehicular ad hoc networks,’’ [47] O. S. Oubbati, A. Lakas, F. Zhou, M. Güneş, and M. B. Yagoubi,
IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1973–1990, May 2015. ‘‘A survey on position-based routing protocols for flying ad hoc networks
[26] E. Feukeu and L. Snyman, ‘‘An improved dynamic broadcast storm mit- (FANETs),’’ Veh. Commun., vol. 10, pp. 29–56, Oct. 2017.
igation for VANETs,’’ Procedia Comput. Sci., vol. 130, pp. 180–187, [48] J. Jiang and G. Han, ‘‘Routing protocols for unmanned aerial vehicles,’’
Jan. 2018, IEEE Commun. Mag., vol. 56, no. 1, pp. 58–63, Jan. 2018.
[27] R. Chapman, D. Hamilton, D. Box, M. Kuhr, J. MacDonald, and [49] A. Nayyar, ‘‘Flying adhoc network (FANETs): Simulation based per-
S. Hamilton, ‘‘Simulation of army unmanned aerial vehicle communica- formance comparison of routing protocols: AODV, DSDV, DSR, OLSR,
tions,’’ in Proc. Winter Simulation Conf., S. G. Henderson, B. Biller, M.-H. AOMDV and HWMP,’’ in Proc. Int. Conf. Adv. Big Data, Comput. Data
Hsieh, J. Shortle, J. D. Tew, and R. R. Barton, Eds. Washington, DC, USA: Commun. Syst. (icABCD), Durban, South Africa, Aug. 2018, pp. 1–9.
Dec. 2007, pp. 1324–1327. [50] K. P. Valavanis and M. Kontitsis, ‘‘A historical perspective on unmanned
[28] C. Fuchs et al., ‘‘Broadband communications for aeronautical networks: aerial vehicles,’’ in Advances in Unmanned Aerial Vehicles (Intel-
The ATENAA outer optical link validation,’’ in Proc. 1st Eur. Air Space ligent Systems, Control and Automation: Science and Engineering),
Conf. (CEAS), Berlin, Germany, Sep. 2007, pp. 1–8. K. P. Valavanis, Ed. Dordrecht, Netherland: Springer, 2007, vol. 33, ch. 2,
[29] K. Karras, T. Kyritsis, M. Amirfeiz, and S. Baiotti, ‘‘Aeronautical mobile pp. 15–46.
ad hoc networks,’’ in Proc. 14th Eur. Wireless Conf., Prague, Czech Repub- [51] G. Khanna and S. K. Chaturvedi, ‘‘A comprehensive survey on multi-
lic, Jun. 2008, pp. 1–6. hop wireless networks: Milestones, changing trends and concomitant chal-
[30] H. Wenzhun, W. Yongsheng, and Y. Xiangyang, ‘‘Studies on novel anti- lenges,’’ Wireless Pers. Commun., vol. 101, no. 2, pp. 677–722, Jul. 2018.
jamming technique of unmanned aerial vehicle data link,’’ Chin. J. Aero- [52] S. Ray, J. B. Carruthers, and D. Starobinski, ‘‘RTS/CTS-induced conges-
naut., vol. 21, no. 2, pp. 141–148, Apr. 2008. tion in ad hoc wireless LANs,’’ in Proc. Wireless Commun. Netw. (WCNC),
[31] S. Temel and I. I. Bekmezc, ‘‘On the performance of flying ad hoc net- vol. 3, Mar. 2003, pp. 1516–1521.
works (FANETs) utilizing near space high altitude platforms (HAPs),’’ in [53] FAA Aerospace Forecast FY 2018–2038, Federal Aviation Admin.,
Proc. 6th Int. Conf. Recent Adv. Space Technol. (RAST), Istanbul, Turkey, Washington, DC, USA, 2018.
Jun. 2013, pp. 461–465. [54] R. S. Schwartz, H. Scholten, and P. Havinga, ‘‘A scalable data dissem-
[32] K. Hartmann and C. Steup, ‘‘The vulnerability of UAVs to cyber attacks— ination protocol for both highway and urban vehicular environments,’’
An approach to the risk assessment,’’ in Proc. 5th Int. Conf. Cyber Conflict EURASIP J. Wireless Commun. Netw., vol. 2013, no. 1, p. 257, Dec. 2013.
(CYCON). Tallinn, Estonia, Jun. 2013, pp. 1–23. [55] R. de Melo Pires, S. Z. Arnosti, A. S. R. Pinto, and K. R. L. J. C. Branco,
[33] S. Chandrasekharan et al., ‘‘Designing and implementing future aerial ‘‘Experimenting broadcast storm mitigation techniques in FANETs,’’ in
communication networks,’’ IEEE Commun. Mag., vol. 54, no. 5, pp. 26–34, Proc. 49th Hawaii Int. Conf. Syst. Sci. (HICSS), Jan. 2016, pp. 5868–5877.
May 2016. [56] A. Mohammed, M. Ould-Khaoua, L. Mackenzie, and J. Abdulai, ‘‘Improv-
[34] E. A. Marconato, J. A. Maxa, D. F. Pigatto, A. S. R. Pinto, N. Larrieu, and ing the performance of counter-based broadcast scheme for mobile ad hoc
K. R. L. J. C. Branco, ‘‘IEEE 802.11n vs. IEEE 802.15.4: A study on com- networks,’’ in Proc. IEEE Int. Conf. Signal Process. Commun. (ICSPC),
munication QoS to provide safe FANETs,’’ in Proc. 46th Annu. IEEE/IFIP Nov. 2007, pp. 1403–1406.
Int. Conf. Dependable Syst. Netw. Workshop (DSN-W), Toulouse, France, [57] T. Camp, J. Boleng, and V. Davies, ‘‘A survey of mobility models for ad
Jun. 2016, pp. 184–191. hoc network research,’’ Wireless Commun. Mobile Comput., vol. 2, no. 5,
[35] D. L. Gu, G. Pei, H. Ly, M. Gerla, and X. Hong, ‘‘Hierarchical routing pp. 483–502, Aug. 2002.
for Multi-Layer ad-hoc wireless networks with UAVs,’’ in Proc. MILCOM [58] F. Bai and A. Helmy, A Survey of Mobility Models in Wireless Adhoc
21st Century Mil. Commun. Architectures Technol. Inf. Superiority, Los Networks. New York, NY, USA: Academic, Jun. 2004, ch. 1, pp. 1–29.
Angeles, CA, USA, vol. 1, Oct. 2000, pp. 310–314. [59] S. Kang, M. Aldwairi, and K.-I. Kim, ‘‘A survey on network simulators
[36] M. T. Hyland, B. E. Mullins, R. O. Baldwin, and M. A. Temple, in three-dimensional wireless ad hoc and sensor networks,’’ Int. J. Distrib.
‘‘Simulation-based performance evaluation of mobile ad hoc routing pro- Sensor Netw., vol. 12, no. 9, pp. 1–10, Sep. 2016.
tocols in a swarm of unmanned aerial vehicles,’’ in 21st Int. Conf. Adv. [60] Y.-B. Ko and N. H. Vaidya, ‘‘Location-aided routing (LAR) in mobile ad
Inf. Netw. Appl. Workshops (AINAW), Niagara Falls, Ontario, Canada, hoc networks,’’ in Proc. 4th Annu. ACM/IEEE Int. Conf. Mobile Comput.
May 2007, pp. 249–256. Netw., New York, NY, USA, 1998, pp. 66–75.
[37] W. K. Lai, W.-K. Chung, J.-B. Tsai, and C.-S. Shieh, ‘‘Spray and hop: [61] C. Bettstetter, ‘‘Smooth is better than sharp: A random mobility model
Efficient utility-mobility routing for intermittently connected mobile net- for simulation of wireless networks,’’ in Proc. 4th ACM Int. Workshop
works,’’ in Proc. 4th Int. Conf. Commun. Netw. China, Aug. 2009, pp. 1–5. Modeling Anal. Simulation wireless mobile Syst., Jul. 2001, pp. 19–27.
[38] N. Shi and X. Luo, ‘‘A novel cluster-based location-aided routing protocol [62] C. Bettstetter, P. Santi, and G. Resta, ‘‘The node distribution of the random
for UAV fleet networks,’’ Int. J. Digit. Content Technol. Appl., vol. 6, waypoint mobility model for wireless ad hoc networks,’’ IEEE Trans.
no. 18, pp. 376–383, Oct. 2012. Mobile Comput., vol. 2, pp. 257–269, Jul./Sep. 2003.

59756 VOLUME 7, 2019


R. M. Pires et al.: Broadcast Storm Problem in FANETs and the Dynamic Neighborhood-Based Algorithm

[63] C. Bettstetter, ‘‘Topology properties of ad hoc networks with random RAYNER M. PIRES was born in Catalão, Brazil,
waypoint mobility,’’ ACM SIGMOBILE Mobile Comput. Commun. Rev., in 1987. He received the B.S. degree in com-
vol. 7, no. 3, pp. 50–52, Jul. 2003. puter science from the Federal University of
[64] F. Bai, N. Sadagopan, and A. Helmy, ‘‘IMPORTANT: A framework to Goiás (UFG), Brazil, in 2011, and the M.S. and
systematically analyze the impact of mobility on performance of rout- Ph.D. degrees in mathematics and computer sci-
ing protocols for Adhoc networks,’’ in Proc. IEEE INFOCOM 22th ence from the Institute of Mathematics and Com-
Annu. Joint Conf. IEEE Comput. Commun. Soc., vol. 2, Mar./Apr. 2003, puter Science (ICMC), Universidade de São Paulo
pp. 825–835.
(USP), Brazil, in 2014 and 2019, respectively.
[65] A. K. Saha and D. B. Johnson, ‘‘Modeling mobility for vehicular ad hoc
During his master’s period, he designed and
networks,’’ in Proc. 1st ACM Int. Workshop Veh. Ad Hoc Netw., New York,
NY, USA, Oct. 2004, pp. 91–92. validated a plug-and-play protocol for intercon-
[66] J. Ariyakhajorn, P. Wannawilai, and C. Sathitwiriyawong, ‘‘A comparative nection of UAVs and mission processors. In his Ph.D., he has carried out a
study of random waypoint and Gauss-Markov mobility models in the research on how to improve UAVs connection and communication during
performance evaluation of MANET,’’ in Proc. Int. Symp. Commun. Inf. a cooperation flight. He received a scholarship from FAPESP, the major
Technol., Oct. 2006, pp. 894–899. funding agency of São Paulo state. He has been publishing and participating
[67] P. Lassila, E. Hyytiä, and H. Koskinen, ‘‘Connectivity properties of random in a number of national and international conferences. His research interests
waypoint mobility model for ad hoc networks,’’ in Proc. IFIP Annu. Medit. include wireless networks, network simulation, and information security.
Ad Hoc Netw. Workshop, K. Al Agha, I. Lassous, and G. Pujolle, Eds. Dr. Rayner is also a member of the Association for Computing Machin-
Boston, MA, USA: Springer, 2006, pp. 159–168. ery (ACM) and the Brazilian Computing Society (SBC).
[68] D. Singh, A. K. Maurya, and A. K. Sarje, ‘‘Comparative performance anal-
ysis of LANMAR, LAR1, DYMO and ZRP routing protocols in MANET
using random waypoint mobility model,’’ in Proc. 3rd Int. Conf. Electron. ALEX SANDRO ROSCHILDT PINTO received
Comput. Technol., vol. 6, Apr. 2011, pp. 62–66. the master’s degree in computer science from the
[69] M. A. Khan, I. U. Khan, A. Safi, and I. M. Quershi, ‘‘Dynamic routing in
Federal University of Santa Catarina, in 2003 and
flying ad-hoc networks using topology-based routing protocols,’’ Drones,
the Ph.D. degree in electrical engineering from
vol. 2, no. 3, p. 27, Aug. 2018.
[70] A. C. Zucchi and R. M. Silveira, ‘‘Performance analysis of routing protocol the Federal University of Santa Catarina, in 2010.
for ad hoc UAV network,’’ in Proc. 10th Latin Amer. Netw. Conf. (LANC). He is currently an Adjunct Professor with the
São Paulo, Brazil, Oct. 2018, pp. 73–80. Department of Informatics and Statistics (INE),
[71] B. Saha, C. C. Quach, and K. Goebel, ‘‘Optimizing battery life for electric Federal University of Santa Catarina (UFSC).
UAVs using a Bayesian framework,’’ in Proc. IEEE Aerosp. Conf., Big Sky, He has published more than 50 international
MT, USA, Mar. 2012, pp. 1–7. papers (Journals, Conferences, and Book Chap-
[72] K. A. O. Suzuki, P. Kemper Filho, and J. R. Morrison, ‘‘Automatic battery ters) and also has achieved three IEEE awards. His research interests include
replacement system for UAVs: Analysis and design,’’ J. Intell. Robot. Syst., embedded systems, wireless sensor networks, and the Internet of Things.
vol. 65, no. 1, pp. 563–586, Jan. 2012.
[73] W. Stallings, Data and Computer Communications, 8th ed. Upper Saddle
River, NJ, USA: Prentice-Hall, 2006, ch. 17. KALINKA REGINA LUCAS JAQUIE CASTELO
[74] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down BRANCO received the M.Sc. degree and the Ph.D.
Approach, 6th ed. London, U.K.: Pearson, 2012, ch. 6. degree in computer science from the University of
[75] W. Lou and J. Wu, ‘‘Toward broadcast reliability in mobile ad hoc net-
São Paulo, in 1999 and 2004, respectively. She is
works with double coverage,’’ IEEE Trans. Mobile Comput., vol. 6, no. 2,
currently an Associate Professor with the Depart-
pp. 148–163, Feb. 2007.
[76] M. Murugesan and A. Krishnan, ‘‘Efficient forward node list algorithm for ment of Computer Systems, Institute of Mathemat-
broadcasting in asymmetric mobile ad hoc networks,’’ Int. J. Comput. Sci. ics and Computer Science (ICMC-USP).
and Eng., vol. 2, no. 4, pp. 1219–1222, 2010. She has experience in computer science, with
[77] R. R. Roy, Handbook of Mobile Ad Hoc Networks for Mobility Models. emphasis on unmanned aerial vehicles, com-
Boston, MA, USA: Springer, 2011. puter networks, security, embedded systems, and
[78] A. Kumar, D. Manjunath, and J. Kuri, Wireless Networking (The Morgan distributed computing.
Kaufmann Series in Networking). Amsterdam, The Netherlands: Elsevier, Dr. Kalinka is also a member of the Brazilian Computing Society (SBC).
2008, ch. 7.

VOLUME 7, 2019 59757

You might also like