-
A Hybrid Reactive Routing Protocol for Decentralized UAV Networks
Authors:
Shivam Garg,
Alexander Ihler,
Elizabeth Serena Bentley,
Sunil Kumar
Abstract:
Wireless networks consisting of low SWaP, FW-UAVs are used in many applications, such as monitoring, search and surveillance of inaccessible areas. A decentralized and autonomous approach ensures robustness to failures; the UAVs explore and sense within the area and forward their information, in a multihop manner, to nearby aerial gateway nodes. However, the unpredictable nature of the events, rel…
▽ More
Wireless networks consisting of low SWaP, FW-UAVs are used in many applications, such as monitoring, search and surveillance of inaccessible areas. A decentralized and autonomous approach ensures robustness to failures; the UAVs explore and sense within the area and forward their information, in a multihop manner, to nearby aerial gateway nodes. However, the unpredictable nature of the events, relatively high speed of UAVs, and dynamic UAV trajectories cause the network topology to change significantly over time, resulting in frequent route breaks. A holistic routing approach is needed to support multiple traffic flows in these networks to provide mobility- and congestion-aware, high-quality routes when needed, with low control and computational overheads, using the information collected in a distributed manner. Existing routing schemes do not address all the mentioned issues.
We present a hybrid reactive routing protocol for decentralized UAV networks. Our scheme searches routes on-demand, monitors a region around the selected route (the pipe), and proactively switches to an alternative route before the current route's quality degrades below a threshold. We empirically evaluate the impact of pipe width and node density on our ability to find alternate high-quality routes within the pipe and the overhead required to maintain the pipe. Compared to existing reactive routing schemes, our approach achieves higher throughput and reduces the number of route discoveries, overhead, and resulting flow interruptions at different traffic loads, node densities and speeds. Despite having limited network topology information, and low overhead and route computation complexity, our proposed scheme achieves superior throughput to proactive optimized link state routing scheme at different network and traffic settings. We also evaluate the relative performance of reactive and proactive routing schemes.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Digital Twin-Enabled Domain Adaptation for Zero-Touch UAV Networks: Survey and Challenges
Authors:
Maxwell McManus,
Yuqing Cui,
Josh,
Zhang,
Jiangqi Hu,
Sabarish Krishna Moorthy,
Zhangyu Guan,
Nicholas Mastronarde,
Elizabeth Serena Bentley,
Michael Medley
Abstract:
In existing wireless networks, the control programs have been designed manually and for certain predefined scenarios. This process is complicated and error-prone, and the resulting control programs are not resilient to disruptive changes. Data-driven control based on Artificial Intelligence and Machine Learning (AI/ML) has been envisioned as a key technique to automate the modeling, optimization a…
▽ More
In existing wireless networks, the control programs have been designed manually and for certain predefined scenarios. This process is complicated and error-prone, and the resulting control programs are not resilient to disruptive changes. Data-driven control based on Artificial Intelligence and Machine Learning (AI/ML) has been envisioned as a key technique to automate the modeling, optimization and control of complex wireless systems. However, existing AI/ML techniques rely on sufficient well-labeled data and may suffer from slow convergence and poor generalizability. In this article, focusing on digital twin-assisted wireless unmanned aerial vehicle (UAV) systems, we provide a survey of emerging techniques that can enable fast-converging data-driven control of wireless systems with enhanced generalization capability to new environments. These include SLAM-based sensing and network softwarization for digital twin construction, robust reinforcement learning and system identification for domain adaptation, and testing facility sharing and federation. The corresponding research opportunities are also discussed.
△ Less
Submitted 31 December, 2022;
originally announced January 2023.
-
AFLGuard: Byzantine-robust Asynchronous Federated Learning
Authors:
Minghong Fang,
Jia Liu,
Neil Zhenqiang Gong,
Elizabeth S. Bentley
Abstract:
Federated learning (FL) is an emerging machine learning paradigm, in which clients jointly learn a model with the help of a cloud server. A fundamental challenge of FL is that the clients are often heterogeneous, e.g., they have different computing powers, and thus the clients may send model updates to the server with substantially different delays. Asynchronous FL aims to address this challenge b…
▽ More
Federated learning (FL) is an emerging machine learning paradigm, in which clients jointly learn a model with the help of a cloud server. A fundamental challenge of FL is that the clients are often heterogeneous, e.g., they have different computing powers, and thus the clients may send model updates to the server with substantially different delays. Asynchronous FL aims to address this challenge by enabling the server to update the model once any client's model update reaches it without waiting for other clients' model updates. However, like synchronous FL, asynchronous FL is also vulnerable to poisoning attacks, in which malicious clients manipulate the model via poisoning their local data and/or model updates sent to the server. Byzantine-robust FL aims to defend against poisoning attacks. In particular, Byzantine-robust FL can learn an accurate model even if some clients are malicious and have Byzantine behaviors. However, most existing studies on Byzantine-robust FL focused on synchronous FL, leaving asynchronous FL largely unexplored. In this work, we bridge this gap by proposing AFLGuard, a Byzantine-robust asynchronous FL method. We show that, both theoretically and empirically, AFLGuard is robust against various existing and adaptive poisoning attacks (both untargeted and targeted). Moreover, AFLGuard outperforms existing Byzantine-robust asynchronous FL methods.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
DIAMOND: Taming Sample and Communication Complexities in Decentralized Bilevel Optimization
Authors:
Peiwen Qiu,
Yining Li,
Zhuqing Liu,
Prashant Khanduri,
Jia Liu,
Ness B. Shroff,
Elizabeth Serena Bentley,
Kurt Turck
Abstract:
Decentralized bilevel optimization has received increasing attention recently due to its foundational role in many emerging multi-agent learning paradigms (e.g., multi-agent meta-learning and multi-agent reinforcement learning) over peer-to-peer edge networks. However, to work with the limited computation and communication capabilities of edge networks, a major challenge in develo** decentralize…
▽ More
Decentralized bilevel optimization has received increasing attention recently due to its foundational role in many emerging multi-agent learning paradigms (e.g., multi-agent meta-learning and multi-agent reinforcement learning) over peer-to-peer edge networks. However, to work with the limited computation and communication capabilities of edge networks, a major challenge in develo** decentralized bilevel optimization techniques is to lower sample and communication complexities. This motivates us to develop a new decentralized bilevel optimization called DIAMOND (decentralized single-timescale stochastic approximation with momentum and gradient-tracking). The contributions of this paper are as follows: i) our DIAMOND algorithm adopts a single-loop structure rather than following the natural double-loop structure of bilevel optimization, which offers low computation and implementation complexity; ii) compared to existing approaches, the DIAMOND algorithm does not require any full gradient evaluations, which further reduces both sample and computational complexities; iii) through a careful integration of momentum information and gradient tracking techniques, we show that the DIAMOND algorithm enjoys $\mathcal{O}(ε^{-3/2})$ in sample and communication complexities for achieving an $ε$-stationary solution, both of which are independent of the dataset sizes and significantly outperform existing works. Extensive experiments also verify our theoretical findings.
△ Less
Submitted 19 January, 2023; v1 submitted 5 December, 2022;
originally announced December 2022.
-
LB-OPAR: Load Balanced Optimized Predictive and Adaptive Routing for Cooperative UAV Networks
Authors:
Mohammed Gharib,
Fatemeh Afghah,
Elizabeth Serena Bentley
Abstract:
Cooperative ad-hoc UAV networks have been turning into the primary solution set for situations where establishing a communication infrastructure is not feasible. Search-and-rescue after a disaster and intelligence, surveillance, and reconnaissance (ISR) are two examples where the UAV nodes need to send their collected data cooperatively into a central decision maker unit. Recently proposed SDN-bas…
▽ More
Cooperative ad-hoc UAV networks have been turning into the primary solution set for situations where establishing a communication infrastructure is not feasible. Search-and-rescue after a disaster and intelligence, surveillance, and reconnaissance (ISR) are two examples where the UAV nodes need to send their collected data cooperatively into a central decision maker unit. Recently proposed SDN-based solutions show incredible performance in managing different aspects of such networks. Alas, the routing problem for the highly dynamic UAV networks has not been addressed adequately. An optimal, reliable, and adaptive routing algorithm compatible with the SDN design and highly dynamic nature of such networks is required to improve the network performance. This paper proposes a load-balanced optimized predictive and adaptive routing (LB-OPAR), an SDN-based routing solution for cooperative UAV networks. LB-OPAR is the extension of our recently published routing algorithm (OPAR) that balances the network load and optimizes the network performance in terms of throughput, success rate, and flow completion time (FCT). We analytically model the routing problem in highly dynamic UAV network and propose a lightweight algorithmic solution to find the optimal solution with $O(|E|^2)$ time complexity where $|E|$ is the total number of network links. We exhaustively evaluate the proposed algorithm's performance using ns-3 network simulator. Results show that LB-OPAR outperforms the benchmark algorithms by $20\%$ in FCT, by $30\%$ in flow success rate on average, and up to $400\%$ in throughput.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
An Asynchronous Multi-Beam MAC Protocol for Multi-Hop Wireless Networks
Authors:
Shivam Garg,
Nandini Venkatraman,
Elizabeth Serena Bentley,
Sunil Kumar
Abstract:
A node equipped with a multi-beam antenna can achieve a throughput of up to m times as compared to a single-beam antenna, by simultaneously communicating on its m non-interfering beams. However, the existing multi-beam medium access control (MAC) schemes can achieve concurrent data communication only when the transmitter nodes are locally synchronized. Asynchronous packet arrival at a multi-beam r…
▽ More
A node equipped with a multi-beam antenna can achieve a throughput of up to m times as compared to a single-beam antenna, by simultaneously communicating on its m non-interfering beams. However, the existing multi-beam medium access control (MAC) schemes can achieve concurrent data communication only when the transmitter nodes are locally synchronized. Asynchronous packet arrival at a multi-beam receiver node would increase the node deafness and MAC layer capture problems, and thereby limit the data throughput. This paper presents an asynchronous multi-beam MAC protocol for multi-hop wireless networks, which makes the following enhancements to the existing multi-beam MAC schemes (i) A windowing mechanism to achieve concurrent communication when the packet arrival is asynchronous, (ii) A smart packet processing mechanism which reduces the node deafness, hidden terminals and MAC-layer capture problems, and (iii) A channel access mechanism which decreases resource wastage and node starvation. Our proposed protocol also works in heterogeneous networks that deploy the nodes equipped with single-beam as well as multi-beam antennas. Simulation results demonstrate a superior performance of our proposed protocol.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Toward Efficient Online Scheduling for Distributed Machine Learning Systems
Authors:
Menglu Yu,
Jia Liu,
Chuan Wu,
Bo Ji,
Elizabeth S. Bentley
Abstract:
Recent years have witnessed a rapid growth of distributed machine learning (ML) frameworks, which exploit the massive parallelism of computing clusters to expedite ML training. However, the proliferation of distributed ML frameworks also introduces many unique technical challenges in computing system design and optimization. In a networked computing cluster that supports a large number of training…
▽ More
Recent years have witnessed a rapid growth of distributed machine learning (ML) frameworks, which exploit the massive parallelism of computing clusters to expedite ML training. However, the proliferation of distributed ML frameworks also introduces many unique technical challenges in computing system design and optimization. In a networked computing cluster that supports a large number of training jobs, a key question is how to design efficient scheduling algorithms to allocate workers and parameter servers across different machines to minimize the overall training time. Toward this end, in this paper, we develop an online scheduling algorithm that jointly optimizes resource allocation and locality decisions. Our main contributions are three-fold: i) We develop a new analytical model that considers both resource allocation and locality; ii) Based on an equivalent reformulation and observations on the worker-parameter server locality configurations, we transform the problem into a mixed packing and covering integer program, which enables approximation algorithm design; iii) We propose a meticulously designed approximation algorithm based on randomized rounding and rigorously analyze its performance. Collectively, our results contribute to the state of the art of distributed ML system optimization and algorithm design.
△ Less
Submitted 12 May, 2022; v1 submitted 5 August, 2021;
originally announced August 2021.
-
Implementation of a Multi-Beam MAC Protocol for Multi-Hop Wireless Networks in Riverbed Modeler
Authors:
Shivam Garg,
Nandini Venkatraman,
Soroush Tamizi,
Hira Shah,
Elizabeth Bentley,
Sunil Kumar
Abstract:
Recent advances in antenna technology have made the design of multi-beam antennas (MBA) feasible. Compared to an omni-directional or a single beam directional antenna, an MBA equipped node can achieve a throughput of up to m times, by simultaneously communicating on its m non-interfering beams. As a result, a few multi-beam directional medium access control (MAC) schemes have been proposed in the…
▽ More
Recent advances in antenna technology have made the design of multi-beam antennas (MBA) feasible. Compared to an omni-directional or a single beam directional antenna, an MBA equipped node can achieve a throughput of up to m times, by simultaneously communicating on its m non-interfering beams. As a result, a few multi-beam directional medium access control (MAC) schemes have been proposed in the literature recently, which are implemented mostly on the in-house simulation setups in Matlab or C/C++. These implementations make many assumptions to simplify their design, without a thorough implementation of other network layers. However, the implementation of a multi-beam MAC scheme on the well-known discrete event network simulator platforms (such as the Riverbed Modeler, NS3, QualNet) is challenging as it requires extensive changes and additions to various source code modules. In fact, the network protocols in these simulator packages have been mainly designed for omni-directional communication, and very few implementations of directional MAC and other network protocols exist in the literature.
This paper presents a framework to implement a multi-beam directional MAC scheme in multi-hop wireless networks, by using the Wireless Suite of Riverbed Modeler. The detailed implementation procedures are described for multi-beam antenna module, multi-beam node model, concurrent packet transmission and reception, scheduling, collision avoidance, retransmission, and local node synchronization. These MAC modules and methodology can be very helpful to the researchers and developers for implementing the single-beam as well as multi-beam directional MAC and routing protocols in Riverbed Modeler.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
CFedAvg: Achieving Efficient Communication and Fast Convergence in Non-IID Federated Learning
Authors:
Haibo Yang,
Jia Liu,
Elizabeth S. Bentley
Abstract:
Federated learning (FL) is a prevailing distributed learning paradigm, where a large number of workers jointly learn a model without sharing their training data. However, high communication costs could arise in FL due to large-scale (deep) learning models and bandwidth-constrained connections. In this paper, we introduce a communication-efficient algorithmic framework called CFedAvg for FL with no…
▽ More
Federated learning (FL) is a prevailing distributed learning paradigm, where a large number of workers jointly learn a model without sharing their training data. However, high communication costs could arise in FL due to large-scale (deep) learning models and bandwidth-constrained connections. In this paper, we introduce a communication-efficient algorithmic framework called CFedAvg for FL with non-i.i.d. datasets, which works with general (biased or unbiased) SNR-constrained compressors. We analyze the convergence rate of CFedAvg for non-convex functions with constant and decaying learning rates. The CFedAvg algorithm can achieve an $\mathcal{O}(1 / \sqrt{mKT} + 1 / T)$ convergence rate with a constant learning rate, implying a linear speedup for convergence as the number of workers increases, where $K$ is the number of local steps, $T$ is the number of total communication rounds, and $m$ is the total worker number. This matches the convergence rate of distributed/federated learning without compression, thus achieving high communication efficiency while not sacrificing learning accuracy in FL. Furthermore, we extend CFedAvg to cases with heterogeneous local steps, which allows different workers to perform a different number of local steps to better adapt to their own circumstances. The interesting observation in general is that the noise/variance introduced by compressors does not affect the overall convergence rate order for non-i.i.d. FL. We verify the effectiveness of our CFedAvg algorithm on three datasets with two gradient compression schemes of different compression ratios.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
GT-STORM: Taming Sample, Communication, and Memory Complexities in Decentralized Non-Convex Learning
Authors:
Xin Zhang,
Jia Liu,
Zhengyuan Zhu,
Elizabeth S. Bentley
Abstract:
Decentralized nonconvex optimization has received increasing attention in recent years in machine learning due to its advantages in system robustness, data privacy, and implementation simplicity. However, three fundamental challenges in designing decentralized optimization algorithms are how to reduce their sample, communication, and memory complexities. In this paper, we propose a \underline{g}ra…
▽ More
Decentralized nonconvex optimization has received increasing attention in recent years in machine learning due to its advantages in system robustness, data privacy, and implementation simplicity. However, three fundamental challenges in designing decentralized optimization algorithms are how to reduce their sample, communication, and memory complexities. In this paper, we propose a \underline{g}radient-\underline{t}racking-based \underline{sto}chastic \underline{r}ecursive \underline{m}omentum (GT-STORM) algorithm for efficiently solving nonconvex optimization problems. We show that to reach an $ε^2$-stationary solution, the total number of sample evaluations of our algorithm is $\tilde{O}(m^{1/2}ε^{-3})$ and the number of communication rounds is $\tilde{O}(m^{-1/2}ε^{-3})$, which improve the $O(ε^{-4})$ costs of sample evaluations and communications for the existing decentralized stochastic gradient algorithms. We conduct extensive experiments with a variety of learning models, including non-convex logistical regression and convolutional neural networks, to verify our theoretical findings. Collectively, our results contribute to the state of the art of theories and algorithms for decentralized network optimization.
△ Less
Submitted 19 May, 2021; v1 submitted 3 May, 2021;
originally announced May 2021.
-
OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks
Authors:
Mohammed Gharib,
Fatemeh Afghah,
Elizabeth Bentley
Abstract:
Cooperative UAV networks are becoming increasingly popular in military and civilian applications. Alas, the typical ad-hoc routing protocols, which aim at finding the shortest path, lead to significant performance degradation because of the 3-dimension highly-dynamic nature of UAV networks and the uneven distribution of nodes across the network. This paper proposes OPAR, an optimized predictive an…
▽ More
Cooperative UAV networks are becoming increasingly popular in military and civilian applications. Alas, the typical ad-hoc routing protocols, which aim at finding the shortest path, lead to significant performance degradation because of the 3-dimension highly-dynamic nature of UAV networks and the uneven distribution of nodes across the network. This paper proposes OPAR, an optimized predictive and adaptive routing protocol, to face this challenging problem. We model the routing problem with linear programming (LP), where the goal is to maximize network performance, considering the path lifetime and path-length together. This model relies on a precise link lifetime prediction mechanism. We support the LP problem with a lightweight algorithm to find the optimized solution with a computation complexity of $O(|E|^2)$, where $|E|$ is the number of network links. We evaluate the OPAR performance and compare it with the well-known routing algorithms AODV, DSDV, and OLSR to cover a wide range of proactive and reactive protocols as well as distance vector and link-state techniques. We performed extensive simulations for different network densities and mobility patterns using the ns-3 simulator. Results show that OPAR prevents a high volume of routing traffic, increases the successful delivery by more than $30\%$, improves the throughput $25\%$ on average, and decreases the flow completion time by an average of $35\%$.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
Communication-Efficient Network-Distributed Optimization with Differential-Coded Compressors
Authors:
Xin Zhang,
Jia Liu,
Zhengyuan Zhu,
Elizabeth S. Bentley
Abstract:
Network-distributed optimization has attracted significant attention in recent years due to its ever-increasing applications. However, the classic decentralized gradient descent (DGD) algorithm is communication-inefficient for large-scale and high-dimensional network-distributed optimization problems. To address this challenge, many compressed DGD-based algorithms have been proposed. However, most…
▽ More
Network-distributed optimization has attracted significant attention in recent years due to its ever-increasing applications. However, the classic decentralized gradient descent (DGD) algorithm is communication-inefficient for large-scale and high-dimensional network-distributed optimization problems. To address this challenge, many compressed DGD-based algorithms have been proposed. However, most of the existing works have high complexity and assume compressors with bounded noise power. To overcome these limitations, in this paper, we propose a new differential-coded compressed DGD (DC-DGD) algorithm. The key features of DC-DGD include: i) DC-DGD works with general SNR-constrained compressors, relaxing the bounded noise power assumption; ii) The differential-coded design entails the same convergence rate as the original DGD algorithm; and iii) DC-DGD has the same low-complexity structure as the original DGD due to a {\em self-noise-reduction effect}. Moreover, the above features inspire us to develop a hybrid compression scheme that offers a systematic mechanism to minimize the communication cost. Finally, we conduct extensive experiments to verify the efficacy of the proposed DC-DGD and hybrid compressor.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Compressed Distributed Gradient Descent: Communication-Efficient Consensus over Networks
Authors:
Xin Zhang,
Jia Liu,
Zhengyuan Zhu,
Elizabeth S. Bentley
Abstract:
Network consensus optimization has received increasing attention in recent years and has found important applications in many scientific and engineering fields. To solve network consensus optimization problems, one of the most well-known approaches is the distributed gradient descent method (DGD). However, in networks with slow communication rates, DGD's performance is unsatisfactory for solving h…
▽ More
Network consensus optimization has received increasing attention in recent years and has found important applications in many scientific and engineering fields. To solve network consensus optimization problems, one of the most well-known approaches is the distributed gradient descent method (DGD). However, in networks with slow communication rates, DGD's performance is unsatisfactory for solving high-dimensional network consensus problems due to the communication bottleneck. This motivates us to design a communication-efficient DGD-type algorithm based on compressed information exchanges. Our contributions in this paper are three-fold: i) We develop a communication-efficient algorithm called amplified-differential compression DGD (ADC-DGD) and show that it converges under {\em any} unbiased compression operator; ii) We rigorously prove the convergence performances of ADC-DGD and show that they match with those of DGD without compression; iii) We reveal an interesting phase transition phenomenon in the convergence speed of ADC-DGD. Collectively, our findings advance the state-of-the-art of network consensus optimization theory.
△ Less
Submitted 8 September, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Identification of Wearable Devices with Bluetooth
Authors:
Hidayet Aksu,
A. Selcuk Uluagac,
Elizabeth S. Bentley
Abstract:
With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (1) unauthorized wearable devices with correct credentials accessing valuable systems and networks, (2) passive insiders or outsider wearable devices,…
▽ More
With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (1) unauthorized wearable devices with correct credentials accessing valuable systems and networks, (2) passive insiders or outsider wearable devices, or (3) information-leaking wearables devices. Fingerprinting via machine learning can provide necessary cyber threat intelligence to address all these cyber attacks. In this work, we introduce a wearable fingerprinting technique focusing on Bluetooth classic protocol, which is a common protocol used by the wearables and other IoT devices. Specifically, we propose a non-intrusive wearable device identification framework which utilizes 20 different Machine Learning (ML) algorithms in the training phase of the classification process and selects the best performing algorithm for the testing phase. Furthermore, we evaluate the performance of proposed wearable fingerprinting technique on real wearable devices, including various off-the-shelf smartwatches. Our evaluation demonstrates the feasibility of the proposed technique to provide reliable cyber threat intelligence. Specifically, our detailed accuracy results show on average 98.5%, 98.3% precision and recall for identifying wearables using the Bluetooth classic protocol.
△ Less
Submitted 27 September, 2018;
originally announced September 2018.
-
A Coalition Formation Approach to Coordinated Task Allocation in Heterogeneous UAV Networks
Authors:
Fatemeh Afghah,
Mohammad Zaeri-Amirani,
Abolfazl Razi,
Jacob Chakareski,
Elizabeth Bentley
Abstract:
The problem of adversary target detection and the subsequent task completion using a heterogeneous network of resource-constrained UAVs is considered. No prior knowledge about locations and required resources to identify these targets is available to the UAVs. In the proposed leader-follower coalition formation model, the UAV that first locates a target serves as the coalition leader and selects a…
▽ More
The problem of adversary target detection and the subsequent task completion using a heterogeneous network of resource-constrained UAVs is considered. No prior knowledge about locations and required resources to identify these targets is available to the UAVs. In the proposed leader-follower coalition formation model, the UAV that first locates a target serves as the coalition leader and selects a group of follower UAVs to complete the task associated with the identified target. The goal of the coalition formation is to complete the designated tasks with minimal resource utilization. Another role of coalition members is to make the ground station aware of the detected adversary target by forwarding its signal to the station via a distributed cooperative relaying scheme. We also propose a reputation-based mechanism for coalition formation to monitor the cooperative behavior of the UAVs over the course of time and exclude potentially untrustworthy UAVs. Simulation results show the efficiency of the proposed method in forming optimal coalitions compared to alternative methods.
△ Less
Submitted 1 November, 2017;
originally announced November 2017.