Next Article in Journal
Development of Multimode Flight Transition Strategy for Tilt-Rotor VTOL UAVs
Next Article in Special Issue
Intelligent Resource Allocation Using an Artificial Ecosystem Optimizer with Deep Learning on UAV Networks
Previous Article in Journal
Comparison of Machine Learning Pixel-Based Classifiers for Detecting Archaeological Ceramics
Previous Article in Special Issue
LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hierarchical Matching Algorithm for Relay Selection in MEC-Aided Ultra-Dense UAV Networks

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710060, China
2
Research & Development Institute, Northwestern Polytechnical University in Shenzhen, Shenzhen 518057, China
3
Xian Aerospace & Computing Research Institution, Xi’an 710000, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(9), 579; https://doi.org/10.3390/drones7090579
Submission received: 29 August 2023 / Revised: 8 September 2023 / Accepted: 12 September 2023 / Published: 14 September 2023
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)

Abstract

:
With the rapid development of communication technology, unmanned aerial vehicle–mobile edge computing (UAV-MEC) networks have emerged with powerful capabilities. However, existing research studies have neglected the issues involving user grouping and relay selection structures under UAV cluster-assisted communication. Therefore, in this article, we present a comprehensive communication–computing resource allocation for UAV-MEC networks. In particular, ground users make stable user groups first, and then multiple UAVs act as relays in order to assist these user groups in simultaneously uploading their tasks to the terrestrial base station at the edge server. Moreover, in order to maximize the system’s overall throughput, a more flexible and hierarchical matching relay selection algorithm is proposed in terms of matching the ground user groups and corresponding UAVs. For vulnerable users, we also propose a weighted relay selection algorithm to maximize the system performance. Furthermore, simulation results show that the proposed relay selection algorithm achieves a significant gain in comparison with the other benchmarks, and the stability of the proposed algorithms could be verified.

1. Introduction

With the rapid development of communication technologies, the application scenarios of 6G networks often need to cope with massive access users and data volumes, which also bring about serious challenges in terms of network latency, quality of service (QoS), capacity, and other metrics. Traditional centralized cloud computing and fixed base station communication methods may suffer from high interaction latency and network congestion because they are far away from user terminals [1]. To address this problem, mobile edge computing (MEC) technology [2,3,4,5] sinks computing resources to wireless access networks closer to user terminals, and further extends it to non-user networks, such as Wi-Fi access. This effectively reduces the transmission delay and energy consumption and creates a service environment with high communication performance and transmission bandwidth. It could be used in vehicle networking, virtual reality, augmented reality, industrial control, autonomous driving, and other applications [6,7,8,9,10]. Unmanned aerial vehicles (UAVs) are highly autonomous and flexible, are able to transmit messages without signal occlusion and reduce fading caused by signal reflection, scattering, diffraction, and penetration. Therefore, UAVs have certain communication and computing capabilities and are often used as mission execution carriers, cellular network nodes, and transmission relays [11,12,13,14,15]. As a result, the UAV-MEC network was created. It combines the high autonomy and flexibility of UAVs with the benefits of MEC networks to provide users with flexible coverage, reliable communication connectivity, and powerful computing capabilities [16,17,18].
Most of the UAV-MEC research studies assume that a single UAV is applied to MEC networks [19,20,21]. However, in real scenarios, UAVs may need to face massive user access and data transmissions, where the energy and computational resources of a single UAV could not support efficient and continuous work. In contrast, UAV clusters cannot only reduce these problems, but also gain benefits through cluster collaborations, improving system scalability and performance. Therefore, it is important to consider how UAVs collaborate with each other. The authors of [22] proposed a decentralized deep reinforcement learning algorithm to enable UAV clusters to autonomously and distributedly learn dynamic coordination strategies by exploiting the deterministic state transfer property of the system, which effectively improves the system’s task computational rate. The authors of [23] jointly optimize the system’s computational resource allocation, power control, and user association to minimize the power of the system. In order to solve this non-convex optimization problem, the researchers proposed a centralized multi-intelligent body reinforcement learning algorithm and a semi-distributed federated reinforcement-learning algorithm, respectively, which effectively achieves the optimization of the system latency and power metrics. The authors of [24] modeled the optimization problem as a discrete Stackelberg game model with priorities to obtain network hierarchical characteristics. Also, they proved that the subgame at each priority level was an ordered potential game with the Nash equilibrium, and proposed a hierarchical learning algorithm that could achieve fast convergence of hierarchical grouping strategies for UAV clusters.
After summarizing and analyzing the existing research on UAV-MEC networks, we found the following limitations:
  • User grouping and relay selection: In the case of UAV clusters as relays to assist the communication, the ground users should cooperate in groups and select different UAVs for transmission, but there is very limited research on the integration of the user grouping as well as the relay selection strategies.
  • Resource management and power allocation: Existing research studies have been conducted on power allocation and resource management under specific grouping methods and relay selection structures, lacking a unified approach.
In this paper, we investigate the grouping method and relay selection structure problems in UAV cluster-assisted relay transmission. Specifically, we establish a communication model for UAV cluster-assisted ground users to offload computational tasks to the ground base station. Meanwhile, the system throughput is taken as the objective function under the constraints of communication delay and transmission power, and the problem is decoupled into two subproblems. More importantly, we propose a hierarchical matching relay selection algorithm and a weighted relay selection algorithm to maximize the throughput of the system, where simulation results demonstrate the effectiveness and superiority of the proposed algorithm.
The rest of the paper is organized as follows. The system model is elaborated on in Section 2. The proposed hierarchical matching relay selection algorithm and weighted relay selection algorithm are presented in Section 3. The simulation results are presented in Section 4. The conclusions and future work are presented in Section 5.

2. System Model

As shown in Figure 1, we consider a UAV cluster-assisted relay transmission model. The model has M ground users, N UAVs, and a ground base station with a deployed MEC server. The ground users and UAVs are assumed to be homogeneous, and both have the same constraint of transmission power, set as p m a x u and p m a x U , respectively. The computational ability of the MEC server is measured by the number of CPU cycles required by the MEC server to compute each bit of input data, set as f. The set of UAVs is defined as N = { 1 , 2 , , N } , and the set of ground users is defined as M = { 1 , 2 , , M } , where the number of ground users is much higher than the number of UAVs, M N . The ground users are randomly distributed in a specific range of the horizontal space, and the 3D coordinate positions could be expressed as x i u , y i u , 0 . The UAVs are randomly distributed in the three-dimensional space, and their coordinate positions could be expressed as x i U , y i U , h i U . Note that the UAVs need to keep a certain distance from each other to avoid mutual collision and interference. In addition, during the process of information transmission and relay forwarding, the UAVs maintain a hovering state with fixed three-dimensional coordinates to ensure the stability of the communication link.
In order to fully utilize the spectrum resources, M ground users will be divided into N groups with an unlimited number of ground users within each group. Assuming that the total system bandwidth is B, and the spectrum resources are equally divided into N orthogonal sub-channels, the bandwidth of the sub-channel assigned to the ith group is B i , expressed as
B i = B N .
Specifically, ground users within the same group use uplink non-orthogonal multiple access (NOMA) to cooperate in offloading, and ground users between different groups use frequency division multiple access (FDMA) to transmit in different frequency bands. At the same time, different UAVs will also use FDMA to transmit information to the base station.

2.1. System Transmission Model

As shown in Figure 1, there may be obstacles in the communication environment that impede the communication. Thus, there is a line-of-sight (LOS) channel primary path component along with a non-line-of-sight (NLOS) channel multipath component in the communication link. Therefore, the Rician fading channel [25,26] is employed in this paper.
Additionally, h i , j u denotes the channel gain between the ith UAV and the jth ground user. h i U denotes the channel gain between the ith UAV and the ground base station. Assuming that there are k ground users in the group assisted by the ith UAV, the received signal y i of the ith UAV could be expressed as
y i = j = 1 k p i , j u h i , j u x i , j + n 0 ,
note that n 0 is the additive Gaussian white noise (AWGN), satisfying a mean of 0 and a variance of N 0 . p i , j u is the transmission power of the jth ground user in the ith UAV-assisted group, which could not exceed the upper limit of the ground user transmission power p max u , which means
p i , j u p max u , i N , j M .
In the uplink NOMA mode, the decoding order at the receiving end is determined by the strength of each sub-signal. From Equation (2), the received strength is related to the signal power, so the decoding is done in descending order of the signal power. The inter-group interference of the jth ground user in the ith UAV-assisted group are computed as
I N O M A i , j = t = j + 1 N i p i , t u h i , t u 2 ,
where N i is the number of users in the ith UAV-assisted user group; therefore, the signal-to-noise ratio (SNR) of the jth ground user in the ith UAV-assisted user group is given by
γ i j = p i , j u h i , j u 2 I N O M A i , j + N 0 = p i , j u h i , j u 2 t = j + 1 N i p i , t u h i , t u 2 + N 0 .
According to the Shannon channel capacity, the information transmission rate r i , j u could be expressed as
r i , j u = B i l o g 2 1 + γ i j , = B N l o g 2 1 + p i , j u h i , j u 2 t = j + 1 N i p i , t u h i , t u 2 + N 0 ,
therefore, the throughput from a user group to its corresponding UAV could be expressed as
C S R i = j = 1 N i r i , j u .
More specifically, the decode-and-forward (DF) technique is used for UAVs to relay the received signal. In this strategy, the UAV receives the signal from the user group and performs the decode–recode–forward operation on the signal, reducing the transmission process interference. Then, the UAV uses FDMA to transmit the signal to the ground base station. Therefore, the ith UAV information transmission rate r i U could be expressed as
r i U = B N l o g 2 1 + p i U h i U 2 N 0 .
For the ith UAV, the transmission power could not exceed the constraint of the UAV transmission power p m a x U , which means
p i U p m a x U , i N ,
similar to Equation (7), the throughput from the ith UAV to the ground base station could be given by
C R D i = r i U .
Under the DF method, the system throughput is limited by the minimum of the throughput from the source node to the relay node and the throughput from the relay node to the destination node. Therefore, the system throughput of the transmission process for the ith UAV-assisted user group would be expressed as
C i = min C SR i , C RD i .
In this paper, the system throughput C is the sum of all user group throughputs, which could be expressed as
C = i = 1 N C i .

2.2. System Computation Model

In UAV-MEC networks, the computational task to be performed by the jth ground user could be defined as a binary group D j ( d j , T j ) , where d j denotes the amount of data for the computational task to be performed by the jth ground user, and T j denotes the maximum transmission delay tolerable for the computational task. These two parameters indicate that the computational task to be performed by the ground user is computationally intensive and time-sensitive. Assuming that the computational tasks are indivisible, they are transmitted to the ground base station by a UAV relay through a complete offloading method.
Note that time and energy consumption need to be considered during the offloading and transfer of computational tasks from the ground user to the MEC server. For the jth ground user in the NOMA group of the ith UAV-assisted relay, the computational task transmission time t i , j S R and the energy consumption E i , j S R from the source node to the relay node could be expressed as
t i , j S R = d i , j B i r i , j u = d i , j N B r i , j u ,
E i , j S R = p i , j u t i , j S R .
Equation (13) utilizes the relationship between the total system bandwidth B and the sub-channel bandwidth B i . From Equation (14), it could be seen that the energy consumption of the computational task is related to the ground user transmission power and the information transmission rate. Meanwhile, it could be seen from Equation (6) that the information transmission rate is also related to the ground user transmission power. Therefore, without loss of generality, this paper converts the transmission process energy constraint problem into a transmission power constraint problem.
Neglecting the UAV decoding–recoding time, for the ith UAV relay, the transmission time t i , j R D of the computational task of the auxiliary NOMA group from the relay node to the destination node is the sum of the transmission times of all users in the group, denoted as
t i , j R D = j = 1 N i d i , j B i r i U = N j = 1 N i d i , j B r i U .
For the jth ground user in the NOMA group of the ith UAV-assisted relay, the time of the computational task execution process at the MEC server t i , j c could be expressed as
t i , j c = F i , j d i , j f ,
where F i , j is the number of CPU cycles required by the jth ground user in the ith NOMA group to compute the task unit data volume. In this paper, ground users perform similar types of tasks, and without loss of generality, F i , j takes the same value for all ground users.
For the jth ground user in the NOMA group of the ith UAV-assisted relay, the energy consumption of the execution process of the computational task at the MEC server E i , j c could be expressed as
E i , j c = P M E C t i , j c ,
where P M E C is the computational power of the MEC server deployed at the ground base station. In this paper, the MEC server is deployed with high computational power and energy supply, and thus, without loss of generality, the energy consumption of the MEC server is negligible.
Therefore, for the jth ground user in the NOMA group of the ith UAV-assisted relay, the total task execution delay t i , j o could be expressed as
t i , j o = t i , j S R + t i , j R D + t i , j c .
Since the computational tasks are delay-sensitive, for all UAV computational tasks, the total delay could not exceed the maximum tolerable transmission delay T i , j , which means
t i , j o T i , j , i N , j M .

2.3. Problem Formulation

The system transmission and computation model show that ground users are required to perform computation-intensive and delay-sensitive tasks, which need to be transmitted by the UAV-assisted relay to the ground base station due to resource constraints. Therefore, our goal is to maximize the system throughput under the constraints of computational resources as well as transmission delay.
The system throughput of the proposed model is affected by various factors, including the ground user grouping situation, the UAV relay selection situation, and the power allocation of the ground users in the NOMA system. Among them, the two factors, ground user grouping and UAV relay selection, are correlated and together determine the actual communication grouping structure. Therefore, in this section, these two factors are unified as the relay selection structure. Thus, the system parameters include the relay selection structure and power allocation for ground users, where the system’s objective function could be expressed as
max A , P C s . t . C 1 : t i , j o T i , j , i N , j M , C 2 : p i , j u p max u , i N , j M , C 3 : p i U p max U , i N , C 4 : i = 1 N A i = M , i = 1 N A i = , i N ,
where parameter A is the set of relay selection structures and parameter P is the set of ground user power allocations. Constraint C1 indicates that the total delay of all ground users’ computing tasks could not exceed the maximum tolerable transmission delay of computing tasks. Constraint C2 indicates that the transmission power of all ground users could not exceed the upper limit of ground users’ transmission power. Constraint C3 indicates that the transmission power of all UAVs could not exceed the upper limit of the UAV transmission power constraint. In constraint C4, A i indicates the relay selection structure of the ith UAV relay and its auxiliary NOMA user group. That means the concatenation set of all relay selection structures includes all ground users, and the intersection set of all relay selection structures is the empty set, which ensures the ground user completeness of the computational task transmission. Notably, we restrict the minimum distance between UAVs so that they cannot overlap or collide.
The objective function established in this paper is a joint problem of two parameters, the relay selection structure and ground user power allocation. To simplify the treatment, Equation (20) is decoupled into two subproblems—relay selection and power allocation—expressed as
P 1 : max A i = 1 N j = 1 M u i , j min r i , j u , r i U , s . t . C 1 : i = 1 N A i = M , i = 1 N A i = , i N , C 2 : u i , j 0 , 1 .
P 2 : max P C , s . t . C 1 : t i , j o T i , j , i N , j M , C 2 : p i , j u p max u , i N , j M , C 3 : p i U p max U , i N .
where u i , j is a binary offloaded variable that could be traversed over all ground users that reflecting their cooperation with each UAV. More specifically, subproblem P2 is the power allocation problem in the fixed relay selection structure, and in this paper, we deal with it using a fractional transmit power allocation (FTPA) algorithm. Subproblem P1 is a relay selection structure problem in the context of determining the ground user power allocation. To illustrate the nature of the problem, the objective function could be split into the sum of the throughputs of each NOMA group. However, subproblem P1 is non-convex because of the presence of discrete binary variables u i , j , which is difficult to solve by traditional optimization methods. Therefore, this paper adopts the matching idea to solve the problem.

3. Relay Selection Algorithm

For the UAV-assisted relay transmission model developed in this paper, the bilateral matching participants consist of the set of ground users and the set of UAVs. The number of ground users is much more than the number of UAVs. Therefore, the bilateral matching problem in this paper is a many-to-one matching problem.

3.1. Hierarchical Matching Relay Selection

Ground users matched to the same UAV cooperate for information transmission with NOMA. However, after ground users and UAVs cooperate, the nature of the UAV set changes due to the case of intra-group interference. Specifically, the UAV that cooperates with the ground user changes its utility function value for other ground users. If the other ground users still follow the original preference relationship for the matching process, this does not reflect the actual situation of the system. As shown in Figure 2, a matching round is defined as the ground user set sends a cooperation request based on the preference relationship and the UAV set responds to the cooperation request based on the preference relationship. The process from the start of matching to the point where all participants have no intention to change the matching result is denoted as a matching round. After a matching round, UAVs that have cooperated with ground users exist, so the preference relationships of the participants need to be adapted. Specifically, the unmatched ground users are the match initiators, and the UAVs with these connected ground users are considered as match responders. Based on this, the preference relationship is updated and the next matching round begins until all ground users cooperate with the UAV. The proposed hierarchical matching relay selection algorithm is shown in Algorithm 1.
Algorithm 1: Hierarchical matching relay selection algorithm
Step 1: Initialization
(1)    Input parameters: ground users set M, UAVs set N, channel gain sets H.
(2)    Initializing preference relationship sequences.
Step 2: Hierarchical matching
(1)    While M ≠ ⌀:
(2)            While Prem ≠ ⌀:
(3)            Each unmatched ground user sends a match request to the highest-ranked
         UAV based on a preference relationship sequence;
(4)            If UAV was not matched with ground users:
(5)                    Match successfully;
(6)            Else:
(7)                    If the original matching user ranks higher:
(8)                             Refuse the new matching request;
(9)                    Else:
(10)                            Refuse the original matching request;
(11)                   Rejected users remove the selected UAV from the preference
         relationship sequence;
(12)                   End if;
(13)           End if;
(14)           Repeat (3);
(15)           End while;
(16)           Update the M, N, and preference relationship sequence set;
(17)           Repeat (2);
(18)   End while.
In the first round, the priority during initialization is determined by the transmission process throughput in descending order. Note that the throughput from the source node to the relay node should be calculated as the OMA method because all users have not cooperated. During the matching process, each ground user checks the matching status and does not perform an operation if a match has already been realized with a UAV. Instead, the sequence of preference relationships is checked and the UAV with the highest ranking in the sequence of preference relationships is selected to issue a match request. Meanwhile, each UAV first checks the matching status after receiving the matching request sent by the ground user. If a match has not yet been realized with the ground user, it chooses to accept the match request. Instead, the UAV needs to make a choice based on the preference relationship sequence. If the ground user sending the match request has a higher preference relationship ranking, the UAV will end the cooperative relationship with the original ground user and it realizes a new match. On the contrary, the UAV will maintain a cooperative relationship with the original ground user and reject the new match request. In both cases, the rejected ground users are required to remove the UAV from the sequence of preference relationships. When all the ground users’ matching requests are responded to by the UAVs, one matching round is over. Repeat the above steps until all unmatched ground users are no longer able to issue matching requests to the UAV, which means for all unmatched ground users, the preference relationship sequence is empty, represented by Premi = ⌀. In this case, the set of ground users and the set of UAVs form N binary matching pairs (i, j), where i and j are the index of UAVs and ground users, respectively. With the number of ground users far exceeding the number of UAVs, there are still ( M N ) ground users that have not achieved a match. After the second round of matching, if there are still unmatched ground users, then ( M 2 N ) of these users remain unmatched. The set of ground users and the set of UAVs then constitute N ternary matching pairs, denoted as (i, j, k). Subsequently, in the ith round, there are ( M ( i 1 ) N ) that remain unmatched. These users, in combination with the set of UAVs, form N i-element matching pairs with the set of UAVs, which serves as a target for matching with the remaining ground users.

3.2. Weighted Relay Selection

Algorithm 1 considers the high-priority ground user and the UAV as a whole at the end of each matching round and acts as a matching responder for the next round, ensuring the accuracy of the preference relationship. However, the algorithm ignores a possible situation where vulnerable users are disadvantaged in this algorithm. Assuming that the preference relationship sequence and the function values for ground user a and ground user b are represented as
P r e a = n 1 : x a n 2 : 0.9 x a n 3 : 0.6 x ,
P r e b = n 1 : 0.8 x b n 2 : 0.5 x b n 3 : 0.3 x ,
where P r e a and P r e b represent the preference relationships of users a and b, respectively, and ≻ means that the former has a higher utility value. In this case, a and b have identical preference relationship sequences but different utility function values. During the matching process, the vulnerable user b is rejected by UAV n 1 and is forced to choose to match with UAV n 2 . However, user a always obtains a high utility value when matching with any UAV; vulnerable user b obtains a lower utility value when matched with the remaining UAVs, except n 1 , and this situation leads to a lower total utility value of the system. Therefore, it is important to propose a new algorithm, which could compensate for vulnerable users.
The core idea of the improved algorithm is to weigh the value of the utility function of the vulnerable user to improve its chances of being selected by the UAVs. Specifically, in the improved algorithm, the preference relationship sequence should focus not only on the ranking order but also on the corresponding utility value. Thus, without loss of generality, the preference relationship sequence of any ground user m j is re-expressed as
n 1 : v 1 j m j n 2 : v 2 j m j m j n n : v n j ,
where v i j is the value of the utility function when the ground user m j is matched with the UAV n i . Based on this, three parameters are designed: the trigger threshold μ , the weighted ratio θ , and the weighted round N l i m . In a matching round, when the ground user is rejected by the UAV to which it sends a matching request, the following operation is performed:
(1)
Compare the utility values of the current UAV n c u r with a UAV that has the next highest preference ranking n n e x t . Calculate the percentage increase u r e a l in the utility of the ground user matching n c u r compared to matching n n e x t :
u r e a l = v c u r j v n e x t j v n e x t j
(2)
Compare u r e a l and μ . If u r e a l < μ , we consider that the rejected user is not a vulnerable user and continue the normal matching process; if u r e a l μ , consider the rejected user is a vulnerable user.
(3)
For vulnerable users, v c u r i is weighted and a matching request is resent to UAV n c u r with the weighted utility function value. If the matching request is accepted, the algorithm ends; if the matching request is rejected, step (1) is repeated with an upper limit of N l i m number of repetitions.
The proposed weighted relay selection algorithm for vulnerable users is shown in Algorithm 2.
Algorithm 2: Weighted relay selection algorithm
Step 1: Initialization
(1)    Input parameters: set of preference relationship sequences P r e m , the trigger
         threshold μ , the weighted ratio θ , and the weighted round N l i m .
Step 2: Weighted matching
(1)    While the ground user’s matching request was rejected ∩  N l i m 0 :
(2)            Calculate u r e a l ;
(3)            If u r e a l < μ :
(4)                    Stop;
(5)            Else:
(6)                     v = v ( 1 + θ ) , N l i m = N l i m 1 ;
(7)                    Send a matching request to the UAV again;
(8)            End if;
(9)    End while.

3.3. Algorithm Stability

In order to understand the stability of the matching results, the definition of an impeded stable matching pair is given as follows.
If there exists a matching pair ( i n v i t e r , r e s p o n d e r ) M × N , and the matching pair does not exist in the set R of matches that have already appeared, which means ( i n v i t e r , r e s p o n d e r ) R . However, for the participants of this matching pair, there exists a matching result ( i n v i t e r , r e s p o n d e r ) R , ( i n v i t e r , r e s p o n d e r ) R , which means i n v i t e r r e s p o n d e r i n v i t e r and r e s p o n d e r i n v i t e r r e s p o n d e r , which indicates that for the matching pair ( i n v i t e r , r e s p o n d e r ) , this matching result destroys the original matching result, so it is called an impeded stable matching pair.
The algorithm proposed in this paper is essentially a one-to-one matching of multiple rounds, so as long as the stability of the one-to-one matching is understood, the stability of the algorithm would be understood.
For the final matching results ( i n v i t e r f i n , r e s p o n d e r f i n ) , assuming that there is an impeded stable matching pair ( i n v i t e r , r e s p o n d e r ) , there are two possibilities: i n v i t e r f i n sent a match request to the r e s p o n d e r , or i n v i t e r f i n did not send a match request to the r e s p o n d e r . For the former, ( i n v i t e r , r e s p o n d e r ) does not exist, as the r e s p o n d e r would have received match requests from participants higher in their preference order. For the latter, (inviter, responder) also does not exist because either a match request sent to r e s p o n d e r was declined, or there is another participant ranked higher than r e s p o n d e r in i n v i t e r f i n ’s preference order.

4. Simulation Results and Analysis

This section verifies the performance simulation of the hierarchical matching relay selection algorithm and the weighted relay selection algorithm proposed in the above section. The simulation parameters are set as shown in Table 1.
The comparison algorithm we adopt is the classical relay selection strategy: max–SR [27], max–RD [28], and max–min [29]. The idea of the max–SR relay selection algorithm is to select the relay node with the largest instantaneous SNR between the S-R links, and the optimal relay under this algorithm could be expressed as
r e l a y * = argmax { h i , j u 2 } ,
similarly, the max–RD algorithm finds the relay node with the largest instantaneous SNR of the R-D link, which could be given by
r e l a y * = argmax { h i U 2 } ,
the core idea of the max–min algorithm is to consider the quality of both links simultaneously, which could be expressed as
r e l a y * = argmax { min { h i , j u 2 , h i U 2 } } ,
note that the max–RD and max–min algorithms require a channel state feedback mechanism.
Figure 3 presents the system throughput using our proposed hierarchical matching relay selection algorithm with the comparison algorithm for a different number of ground users when the number of UAVs is fixed. Note that we set the number of UAVs to 4, N = 4, and the number of ground users ranges from 4 to 24. The parameter settings are based on the numerical relationship, N M . This is because an increase in the number of users does not notably enhance the performance given the transmission power limitations of the UAVs The simulation results show that with the increase in ground users, the system throughput with the max–RD algorithm varies only in a small range and tends to be smooth. This is because in the max–RD algorithm, the relay selection depends only on the channel gain of the R-D link, so there will be a situation where all the ground users select the same relay UAV, and the system throughput is less affected by the change in the number of users. In the max–min and max–SR algorithms, the system throughput gradually increases as the number of users increases, due to the fact that ground users have more UAVs to choose from. It is worth noting that in our proposed algorithm, the system throughput gradually increases and it is significantly higher than the comparison algorithm, which indicates that our proposed algorithm has better user scale adaptability. This is due to the advantages of NOMA and the fact that we always utilized all the UAVs available as relay nodes.
Figure 4 presents the system throughput for different numbers of UAVs when the ground user numbers are fixed. Note that we set the number of ground users to 20, M = 20, and the number of UAVs to range from 2 to 7. The parameter settings are based on the numerical relationship between the two and the fact that more UAVs only have smaller performance gains with any algorithm under our tests. The simulation results show that as the available UAV numbers increase, the system throughput using the max–RD algorithm only changes within a small range and there is no upward trend. This is because in the case of the max–RD algorithm, the relay selection only depends on the channel gain between the UAVs and the destination node. Therefore, it may occur that ground users choose the same relay UAV, and the system throughput is less affected by changes in the number of UAVs. In the case of the max–min algorithm and max–SR algorithm, the communication links supporting simultaneous transmission increase as the UAV numbers increase. Therefore, the probability of UAVs with high channel gain increases, and ground users have more UAV choices, improving the system throughput. For the algorithm proposed in this paper, as the UAVs increase, the number of users in each NOMA group decreases, and user interference in the group decreases, which improves the system throughput. It could be seen that although increasing the number of UAVs increases the resource expenditure, it could significantly improve the system throughput.
Figure 5 presents the system throughput using our proposed hierarchical matching relay selection algorithm with the comparison algorithm for different user maximum transmission power scenarios, with the number of ground users M = 20 and the number of UAVs N = 4. The simulation results show that the system throughput with both the proposed algorithm and the comparison algorithm gradually increases as the maximum transmission power increases within a certain range. It is noteworthy that the system throughput is highest in the case of the proposed algorithm. This is due to the fact that when the maximum transmission power of the ground user increases, the SNR of the ground user’s transmission also increases and, therefore, the system throughput increases. Note that the system throughput in the case of the proposed algorithm shows a decreasing growth rate tendency as the transmission power of the ground user increases, while the growth rate of the comparison algorithm remains almost constant. This is due to the fact that the comparison algorithm uses the OMA method for transmission and there is no intra-group user interference. However, the proposed algorithm uses the NOMA method for transmission, and as the ground user transmission power increases, the intra-group user interference also increases, and when it reaches a point where its effect on the SNR is close to that of the transmission power on the SNR, the growth rate of the system throughput decreases. This indicates that the proposed algorithm is sensitive to transmission power.
Figure 6 presents the system throughput using the weighted relay selection algorithm for different algorithm parameters when the number of ground users is M = 50 and the number of UAVs is N = 7. The simulation results show that, within a certain parameter range, when the weighted ratio is fixed, the system throughput gradually increases as the trigger threshold decreases; when the trigger threshold is fixed, the system throughput gradually increases as the weighted ratio increases. Outside the parameter range, the system throughput remains stable and high. This is due to the fact that as the trigger threshold decreases and the weighted ratio increases, it makes the bias toward vulnerable users higher. Therefore, the vulnerable users are weighted to be re-matched in a way that improves the system throughput. After a certain range is reached, all possible vulnerable users have been involved in the proposed algorithm, so the system throughput remains stable at a higher value.
Figure 7 presents the variation of the algorithm’s runtime with the number of UAVs and the number of ground users for the weighted relay selection algorithm with the upper weighted round limit N lim = 5. The simulation results show that the algorithm running time rises gradually with the increase in the number of ground users and the growth rate increases gradually, which indicates that the ground users as the initiators of the matching have a greater impact on the algorithm running time. Note that the algorithm running time is less affected by the change in the number of UAVs. Based on this and Figure 4, we can consider that increasing the number of UAVs could significantly increase the system throughput while controlling the running time of the algorithm.

5. Conclusions and Future Work

In this paper, a typical model of UAV-assisted relay transmission is established, and the transmission and computation process of the model is analyzed. Also, this paper jointly controls the transmission power and relay selection structure to optimize the objective function of the system throughput for resource-limited and delay-sensitive communication conditions. More importantly, we propose a hierarchical matching relay selection algorithm and a weighted relay selection algorithm for vulnerable users based on the matching idea, where the simulation results verify the superiority of the proposed algorithm. It should be noted that the weighted relay selection algorithm has better performance compared to the hierarchical matching relay selection algorithm, but there will be more resource investments and higher latency, which need to be selected according to the actual situation. For the power allocation problem in this scenario, please refer to our subsequent work.

Author Contributions

W.L. Conceptualization, Funding acquisition, Project administration, Supervision. S.M. Investigation, Software, Writing—review & editing, Writing—original draft. S.Y. Software, Writing—original draft. B.Z. Investigation, Validation. A.G. Resources, Supervision. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported by the Shenzhen Science and Technology program under Grant JCYJ20210324121006017 and in part by National Nature Science Foundation of China under Grants 62101450 and in part by Key R&D Plan of Shaan Xi Province Grants 2023YBGY037.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Linthicum, D.S. Connecting Fog and Cloud Computing. IEEE Cloud Comput. 2017, 4, 18–20. [Google Scholar] [CrossRef]
  2. Taleb, T.; Samdanis, K.; Mada, B.; Flinck, H.; Dutta, S.; Sabella, D. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration. IEEE Commun. Surv. Tutor. 2017, 19, 1657–1681. [Google Scholar] [CrossRef]
  3. Raeisi-Varzaneh, M.; Dakkak, O.; Habbal, A.; Kim, B.S. Resource Scheduling in Edge Computing: Architecture, Taxonomy, Open Issues and Future Research Directions. IEEE Access 2023, 11, 25329–25350. [Google Scholar] [CrossRef]
  4. Li, B.; He, Q.; Cui, G.; Xia, X.; Chen, F.; Jin, H.; Yang, Y. READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment. IEEE Trans. Serv. Comput. 2022, 15, 1746–1759. [Google Scholar] [CrossRef]
  5. Wang, D.; He, T.; Lou, Y.; Pang, L.; He, Y.; Chen, H.H. Double-edge Computation Offloading for Secure Integrated Space-air-aqua Networks. IEEE Internet Things J. 2023, 10, 15581–15593. [Google Scholar] [CrossRef]
  6. Jiang, W.; Han, B.; Habibi, M.A.; Schotten, H.D. The Road Towards 6G: A Comprehensive Survey. IEEE Open J. Commun. Soc. 2021, 2, 334–366. [Google Scholar] [CrossRef]
  7. Cao, K.; Hu, S.; Shi, Y.; Colombo, A.W.; Karnouskos, S.; Li, X. A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2021, 17, 7806–7819. [Google Scholar] [CrossRef]
  8. Zhang, J.; Tao, D. Empowering Things with Intelligence: A Survey of the Progress, Challenges, and Opportunities in Artificial Intelligence of Things. IEEE Internet Things J. 2021, 8, 7789–7817. [Google Scholar] [CrossRef]
  9. Siriwardhana, Y.; Porambage, P.; Liyanage, M.; Ylianttila, M. A Survey on Mobile Augmented Reality with 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects. IEEE Commun. Surv. Tutor. 2021, 23, 1160–1192. [Google Scholar] [CrossRef]
  10. Wang, D.; Wu, M.; Wei, Z.; Yu, K.; Min, L.; Mumtaz, S. Uplink secrecy performance of RIS-based RF/FSO three-dimension heterogeneous networks. IEEE Trans. Wirel. Commun. 2023. [Google Scholar] [CrossRef]
  11. Wu, Q.; Xu, J.; Zeng, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R.; Swindlehurst, A.L. A Comprehensive Overview on 5G-and-Beyond Networks With UAVs: From Communications to Sensing and Intelligence. IEEE J. Sel. Areas Commun. 2021, 39, 2912–2945. [Google Scholar] [CrossRef]
  12. Liu, C.; Feng, W.; Chen, Y.; Wang, C.X.; Ge, N. Cell-Free Satellite-UAV Networks for 6G Wide-Area Internet of Things. IEEE J. Sel. Areas Commun. 2021, 39, 1116–1131. [Google Scholar] [CrossRef]
  13. Peng, H.; Shen, X. Multi-Agent Reinforcement Learning Based Resource Management in MEC- and UAV-Assisted Vehicular Networks. IEEE J. Sel. Areas Commun. 2021, 39, 131–141. [Google Scholar] [CrossRef]
  14. Jiang, F.; Wang, K.; Dong, L.; Pan, C.; Xu, W.; Yang, K. AI Driven Heterogeneous MEC System with UAV Assistance for Dynamic Environment: Challenges and Solutions. IEEE Netw. 2021, 35, 400–408. [Google Scholar] [CrossRef]
  15. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 182303. [Google Scholar] [CrossRef]
  16. Zhang, P.; Wang, C.; Jiang, C.; Benslimane, A. UAV-Assisted Multi-Access Edge Computing: Technologies and Challenges. IEEE Internet Things Mag. 2021, 4, 12–17. [Google Scholar] [CrossRef]
  17. Liu, Z.; Cao, Y.; Gao, P.; Hua, X.; Zhang, D.; Jiang, T. Multi-UAV network assisted intelligent edge computing: Challenges and opportunities. China Commun. 2022, 19, 258–278. [Google Scholar] [CrossRef]
  18. Tun, Y.K.; Park, Y.M.; Tran, N.H.; Saad, W.; Pandey, S.R.; Hong, C.S. Energy-Efficient Resource Management in UAV-Assisted Mobile Edge Computing. IEEE Commun. Lett. 2021, 25, 249–253. [Google Scholar] [CrossRef]
  19. Wang, D.; Tian, J.; Zhang, H.; Wu, D. Task Offloading and Trajectory Scheduling for UAV-Enabled MEC Networks: An Optimal Transport Theory Perspective. IEEE Wirel. Commun. Lett. 2022, 11, 150–154. [Google Scholar] [CrossRef]
  20. Liu, B.; Wan, Y.; Zhou, F.; Wu, Q.; Hu, R.Q. Resource Allocation and Trajectory Design for MISO UAV-Assisted MEC Networks. IEEE Trans. Veh. Technol. 2022, 71, 4933–4948. [Google Scholar] [CrossRef]
  21. Du, Y.; Yang, K.; Wang, K.; Zhang, G.; Zhao, Y.; Chen, D. Joint Resources and Workflow Scheduling in UAV-Enabled Wirelessly-Powered MEC for IoT Systems. IEEE Trans. Veh. Technol. 2019, 68, 10187–10200. [Google Scholar] [CrossRef]
  22. Ye, Y.; Wei, W.; Geng, D.; He, X. Dynamic Coordination in UAV Swarm Assisted MEC via Decentralized Deep Reinforcement Learning. In Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 21–23 October 2020; pp. 1064–1069. [Google Scholar] [CrossRef]
  23. Nie, Y.; Zhao, J.; Gao, F.; Yu, F.R. Semi-Distributed Resource Management in UAV-Aided MEC Systems: A Multi-Agent Federated Reinforcement Learning Approach. IEEE Trans. Veh. Technol. 2021, 70, 13162–13173. [Google Scholar] [CrossRef]
  24. Chen, J.; Wu, Q.; Xu, Y.; Qi, N.; Dong, C. A Multi-leader Multi-follower Stackelberg Game for Coalition-based UAV MEC Networks. IEEE Wirel. Commun. Lett. 2021, 10, 2350–2354. [Google Scholar] [CrossRef]
  25. Goddemeier, N.; Wietfeld, C. Investigation of Air-to-Air Channel Characteristics and a UAV Specific Extension to the Rice Model. In Proceedings of the 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015; pp. 1–5. [Google Scholar] [CrossRef]
  26. Zhou, Y.; Hutu, F.; Villemaud, G. Analysis of a Spatial Modulation System over Time-varying Rician Fading Channel with a CSI Detector. In Proceedings of the 2020 IEEE Radio and Wireless Symposium (RWS), San Antonio, TX, USA, 26–29 January 2020; pp. 217–220. [Google Scholar] [CrossRef]
  27. Lee, S.; Benevides da Costa, D.; Duong, T.Q. Outage probability of non-orthogonal multiple access schemes with partial relay selection. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
  28. Lee, S.; Da Costa, D.B.; Vien, Q.T.; Duong, T.Q.; de Sousa, R.T., Jr. Non-orthogonal multiple access schemes with partial relay selection. IET Commun. 2017, 11, 846–854. [Google Scholar] [CrossRef]
  29. Jing, Y.; Jafarkhani, H. Single and multiple relay selection schemes and their achievable diversity orders. IEEE Trans. Wirel. Commun. 2009, 8, 1414–1423. [Google Scholar] [CrossRef]
Figure 1. Transmission model of UAV-MEC networks.
Figure 1. Transmission model of UAV-MEC networks.
Drones 07 00579 g001
Figure 2. A matching round where different colors represent different groups.
Figure 2. A matching round where different colors represent different groups.
Drones 07 00579 g002
Figure 3. Variation of system throughput with the number of ground users for different relay selection algorithms.
Figure 3. Variation of system throughput with the number of ground users for different relay selection algorithms.
Drones 07 00579 g003
Figure 4. Variation of system throughput with the number of UAVs for different relay selection algorithms.
Figure 4. Variation of system throughput with the number of UAVs for different relay selection algorithms.
Drones 07 00579 g004
Figure 5. Variation of system throughput with maximum transmission power of terrestrial users for different relay selection algorithms.
Figure 5. Variation of system throughput with maximum transmission power of terrestrial users for different relay selection algorithms.
Drones 07 00579 g005
Figure 6. Performance of the weighted relay selection algorithm with different parameters.
Figure 6. Performance of the weighted relay selection algorithm with different parameters.
Drones 07 00579 g006
Figure 7. Variation in the algorithm running time with the number of matched participants.
Figure 7. Variation in the algorithm running time with the number of matched participants.
Drones 07 00579 g007
Table 1. Simulation parameter setting.
Table 1. Simulation parameter setting.
ParametersValue
Radius of the horizontal distribution range of UAVs800 m
Distance between UAVs200 m
Height distribution range of UAVs100–300 m
Radius of the horizontal distribution range of ground users600 m
Sizes of task data1–10 kbit
Maximum tolerable transmission delay for computing tasks10–100 ms
Path loss index0.8
Noise spectral density n 0 −90 dBm/Hz
Rice channel parameters2
Weighted round limit N l i m 5
Average number of tests1000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liang, W.; Ma, S.; Yang, S.; Zhang, B.; Gao, A. Hierarchical Matching Algorithm for Relay Selection in MEC-Aided Ultra-Dense UAV Networks. Drones 2023, 7, 579. https://doi.org/10.3390/drones7090579

AMA Style

Liang W, Ma S, Yang S, Zhang B, Gao A. Hierarchical Matching Algorithm for Relay Selection in MEC-Aided Ultra-Dense UAV Networks. Drones. 2023; 7(9):579. https://doi.org/10.3390/drones7090579

Chicago/Turabian Style

Liang, Wei, Shaobo Ma, Siyuan Yang, Boxuan Zhang, and Ang Gao. 2023. "Hierarchical Matching Algorithm for Relay Selection in MEC-Aided Ultra-Dense UAV Networks" Drones 7, no. 9: 579. https://doi.org/10.3390/drones7090579

Article Metrics

Back to TopTop