- Open Access
Designing UAV-aided emergency networks for large-scale disaster scenarios
© The Author(s) 2018
- Received: 22 November 2017
- Accepted: 22 March 2018
- Published: 13 April 2018
Today’s wireless communication networks are very reliable. However, in case of a disaster, these networks can be overwhelmed by a tremendous amount of requests which they can not cope with. We propose a deployment tool for UAV (unmanned aerial vehicle)-aided emergency networks for such disaster scenarios. By using UAVs, femtocell base stations will be brought to and hovered at their assigned location. We applied this deployment tool on a realistic disaster scenario in the city center of Ghent, Belgium. The results are very promising although a large amount of drones (> 1000 type 1 or > 370 type 2 drones) is required to provide full coverage for 1 h. Halving the user coverage results in 1.8 to 2 times less drones. More effectively is to increase the drone’s fly height. A 10-m higher fly height can result in a reduction up to 13%. However, above 100 m, the influence is not significant any more. Decreasing the user’s service level has no significant influence on the number of required drones for the considered scenario. Furthermore, a prediction model for the number of required drones based on the intervention duration and the user coverage is proposed.
- Deployment tool
- Emergency network
- Unmanned aerial base stations
Nowadays, we have a tremendous trust in our wireless telecommunication networks. Through our mobile phones, we can contact almost the whole world. Our trust is even so high, that in case of an emergency, one of the first things we do is to pick up our mobile phones. However, when a major disaster affects hundreds of people, the wireless access network can quickly become saturated. A few years ago, in August 2011, the annual Pukkelpop music festival in Belgium, one of Europe’s largest outdoor festival, got hit by a severe storm. Some of the stages collapsed, trees were uprooted, and tents were flattened only in a few minutes, unfortunately causing some deaths and many injuries. The news quickly reached the national media causing an enormous surge of connectivity as people tried to connect each other about their safety and whereabouts. The wireless network in the direct area of the festival went completely down, resulting in even more panic. Since the penetration of the smartphone was not that high, yet at the moment of time, only data communication through the social media was possible, but calling and sending standard texts were no longer possible. Almost 5 years later, in March 2016, Brussels got hit by a terror attack. In Brussels, the network went completely down. Even the emergency services’ network was no longer available, and they had to coordinate their actions through WhatsApp. Also, in big parts of the country, phone calls were no longer possible. The examples mentioned above are of course disasters that happened on a rather large scale, but even on a smaller scale, like for example during a traffic jam on the high way, the network can become locally saturated by people letting others know they will be running late. Due to the emergence of various UAV (unmanned aerial vehicle) types, differing in cost, robustness, behavior, carrying performance, etc., the question was raised whether or not these UAVs could address this problem and provide a temporary solution. Small base stations can be mounted on this UAVs, so-called unmanned aerial base stations (UABSs), in order to rapidly deploy an emergency ad hoc network .
The goal of this paper is to investigate the feasibility and performance of a UAV-aided emergency network in case of a large-scale disaster. To this end, we propose a deployment tool for a UAV-aided emergency network to provide user coverage in case of a large-scale disaster scenario. LTE (Long-Term Evolution) femtocell base stations will be mounted on UAVs or drones and brought to its assigned location. The novelty of our approach is the design of such a network while accounting for the drones’ specifications (such as the battery life time, the fly time), the user requirements, and a 3D model of the considered environment. To the best of the authors’ knowledge, such a deployment tool has not been proposed before. Besides the novel deployment tool, other contributions of this study are (i) evaluating the performance of a UAV-aided network in a realistic large-scale disaster scenario and (ii) providing prediction tools for future UAV-aided emergency networks for different scales of disaster.
The outline of this paper is as follows. Section 2 discusses the related work on UAV-aided networks. Section 3 describes the methodology, the considered scenario, and the algorithm behind the deployment tool. In Section 4, various results obtained by simulations with the deployment tool are discussed for a realistic large-scale disaster scenario in the city center of Ghent, Belgium. If applicable, a prediction model or guidelines for UAV-aided emergency networks are proposed based on the found results. Finally, Section 5 summarizes our conclusions.
With the emergence of UAVs and their broad range of applications, many studies already address the possibility to provide wireless connectivity through UABSs [2–4], although not necessarily for a disaster scenario. The approaches for the optimal positioning of these UABSs can largely be divided into two groups . On the one hand, the measurement-based approaches use the experienced RSSI (received signal strength indication) or signal-to-noise ratio (SNR) . On the other hand, the model-based approaches determine the most optimal location based on a known model of the target environment . Our tool can be identified as a model-based approach. Although many of the model-based approaches have very promising results, they often use the UABSs as a communication relay node, rather than providing directly service to the end user [5–7]. A disaster scenario, like ours, is addressed by [1, 8–10]. However,  offers a message communication system service through UABSs for electrical vehicles instead of providing service to the end user. Their network does not have to address the same throughput as our emergency network. The approach of  is similar as ours, but it does not account for 3D information (such as buildings) in the environment. Furthermore, it is based on the behavior of winged UAVs which have to follow a certain trajectory instead of a helicopter drone which hover over a certain location. The BAHN (broadband and UAV-assisted heterogeneous network) of  consists of various UAV types such as gliders, quadcopters, and balloons and focuses on the improvement of throughput coverage, but it does not allow to determine the most optimal locations of these UAVs. The same reason applies to the study of . Ktari et al.  address the resilience of a PSN (public safety network). However, a PSN provides only communication for public services related to the police, firefighter, and medical assistance. Lambert et al.  investigate the network’s performance offered to the user when only a limited part of the network infrastructure is available, but it does not consider the possibility of using drones to provide service to the uncovered users. The approaches proposed in [13–15] are similar to ours. However, [13, 14] both focus only one UABS that follows a certain path to provide service to non-covered or unsatisfied users (not necessarily an emergency situation). Mozaffari et al.  consider a multi-UABS network but solve the problem in a theoretical way, while our approach considers a realistic environment and scenario.
When deploying a UABS network next to a terrestrial network, the interference impact between the ground and UABS network should be considered as been done in [4, 16, 17]. Furthermore, the management of the UABS network itself is also an important issue as discussed in [18–20]. However, this is beyond the scope of this study.
3.1 Deployment tool for UAV-aided network
3.1.1 Generating user traffic
A key input parameter for our tool is of course realistic user traffic. This user traffic consists of the number of active users in the considered area, their locations, and their bit rate requirement. In order to obtain such a traffic file (Fig. 1, Step 1f), information has to be provided to the tool. First, we need a shapefile defining and describing the environment of the disaster area (Step 1a). The shapefile format gives us information about the location of the buildings, their height, their shape, etc. in the area. This information is required for the path loss calculations as we will explain below. Note that the shapefile format only contains data about the buildings not about the vegetation in the considered area. Second, the time the disaster happened, along with the time period we have to maintain the emergency network, has to be provided (Step 1b). Based on those two inputs, the area and the time stamp, the user distribution allows us to determine the number of active users, and thus the number of users to serve, in the disaster area (Step 1c). These users are then divided over the whole area by using the location distribution (Step 1d). In addition to the location, a bit rate requirement will be assigned to each user (Step 1e). The different distributions (Steps 1c, 1d, and 1e) here considered can be found in Section 3.5.
3.1.2 Creating a list of possible base station locations
Once we know the user traffic for which the network will be developed (Step 1f), we have to define the possible locations for the base stations. This list is based on the user locations, since we assume that a drone can be placed above each user (Step 2a). The advantage of such a strategy is that there are no potential base station locations situated in those parts of the disaster area where no activity is taking place. Note that a user is unable to connect to the base station positioned above him- or herself. However, he or she will be able to reconnect through a base station stationed above a neighbor. An important issue we have to account for when creating this list is whether or not a user is indoors (Step 2b). We assume that the drone flies 4 m above the outdoor user (Step 2c) and 4 m above the building in which the indoor user is present (Step 2d). In the latter case, only those locations resulting in a lower fly height than the maximum allowable one will be considered as feasible (Step 2e). When all user locations are analyzed (Step 2f), we can proceed with the design of the actual network. Note that the user locations are only used to provide an initial set of locations to the algorithm. In case the user locations are unknown, one can generate such a list by using a uniform distribution over the target area.
3.1.3 Designing the network
In the third part of the algorithm, we connect each user (Step 3a) to a femtocell base station mounted on a drone. To this end, the list of possible base station locations composed in the previous part is used. As introducing an extra drone comes with a significant additional cost, we optimize the network towards the number of required drones. In this regard, we first try to serve the user by an already chosen drone base station (location) (Step 3b). If this is not possible, we add a new base station (location) to the network (Step 3c). In both cases (Steps 3b and 3c), the user is connected by the base station from which he or she experiences the lowest path loss (and lower than the maximum allowable path loss) and that can still offer the bit rate demanded by this user. For the path loss calculations, we distinguish between LoS (line-of-sight) and nLoS (non-line-of-sight) communication. Since we have all 3D information available about the buildings in the environment (see part 1 of the algorithm), we can easily determine if there is an obstruction between the user and the base station.
3.1.4 Provisioning the network by drones
Once all users are reconnected through one of the base stations mounted on a drone (Step 3e), we take into account the number of available drones during the last stage of our algorithm. The previous step (Step 3) provides us a list of the selected base station locations for the network. This list is now ordered according to the number of users that is served by the base station (Step 4a). In this way, we want to ensure that the locations serving the highest number of users are provisioned first. Next, we calculate for each location (Step 3b) how many drones are needed to provision this location during the predefined period. The number of required drones depends on the drone’s flight time to and from the facility and its assigned location and the power usage of both the drone and the femtocell base station mounted on this drone (Step 3c). If the required number of drones is still available at the facility (Step 3d), the location and the users connected to the base station at this location are marked as covered (Step 3e), and the status of the facility is updated. Otherwise, the users will unfortunately remain uncovered (Step 3f). Note that when a user moves during a call via a UABS, a hand over procedure has to be triggered like it is currently the case in the terrestrial network.
3.1.5 Complexity of the algorithm
As mentioned above, Step 1 of the algorithm (Fig. 1) consists of generating the user traffic, meaning that a location and bit rate have to be assigned to each user. This results in a complexity of O(n) with n the number of the user active in the area for the considered time stamp. Step 2 creates the initial list of possible UABS locations. As discussed in Section 3.1.2, a UABS can be located above each user. We also need to calculate the fly height of the UABS (Steps 2d and 2e). If a user is indoor, we have to iterate over the buildings in the environment until the correct building is found. This results in a worst case complexity of O(nk) with k the number of buildings in the environments and assuming that all users are indoor which is in reality of course not the case. In Step 3, the network is designed by assigning each user to a UABS. Worst case scenario, we have to iterate over all possible UABSs to find the most appropriate UABS for a single user. Furthermore, we have to determine whether a user is LoS or nLoS of a certain UABS. This results in a worst case complexity of O(nmk) with m the number of possible UABS locations. Improving the complexity can easily be done by adding some extra code to the package dealing with the shapefile format, since we have only used an on-the-shelf package.
3.2 Drone types
Technical specifications of the considered types of drones
Average carrier speed
Average carrier power usage
Carrier battery voltage
4 m to hmax
Maximum fly height hmax
3.3 Femtocell base station
Link budget parameters for the LTE femtocell base station
Maximum input power antenna
Antenna gain base station
Antenna gain mobile station
Soft handover gain
Feeder loss base station
Receiver signal-to-noise ratio (SNR)
1/3 QPSK = − 1.5 dB
1/2 QPSK = 3 dB
2/3 QPSK = 10.5 dB
1/2 16-QAM = 14 dB
2/3 16-QAM = 19 dB
1/2 64-QAM = 23 dB
2/3 64-QAM = 29.4 dB
Number of used subcarriers
Total number of subcarriers
Noise figure mobile station
Implementation loss mobile station
0 dB (1 ×1 SISO)
Height mobile station
3.4 Mathematical models
3.4.1 Coverage of the UABS
with PT the wireless transmit power (in dBm), GT and GR are the transmit and receive antenna gains (in dBi), LT and LR losses occurring at the transmit and receive side (in dB), and PR is the receiver sensitivity (in dBm). Table 2 contains all the losses and gains we account for in the link budget. The shadowing margin is determined such that 90% of the locations on the edge of the cell are covered .
with Nserved the users served by the network (UAV network and/or existing infrastructure if still available) and Nactive the number of users active in the considered area.
3.4.2 Operational time of the UABS
with PCmp, PCFPGA, PCtrans, and PCamp the power consumption of, respectively, the microprocessor, the FPGA, the transmitter, and the power amplifier (in W). PT is the transmit power (in W), and η is the efficiency of the power amplifier.
with Cbat the capacity of the UAV’s battery (in V).
Summary of the considered disaster scenario (unless mentioned otherwise)
Number of users to reconnect
Bit rate demand
1 Mbps (data) and 64 kbps (voice)
Heart of the disaster area (optimized)
Fixed infrastructure available
Due to the randomness of the users in the area, the results presented in this study are the 50 th (p50) and 95 th (p95) percentile determined over 40 independent simulations .
Note that the management of the drones, i.e., the interaction with the aircraft, the autonomous flight towards their assigned locations, the physical security of the drones, etc., is beyond the scope of this study. Note also that there will be a delay in service in the first moments in the aftermath of the disaster until the first load of drones is in place. However, this is out of the scope of this study since this delay is highly dependent on the scenario (i.e., the disaster type, location, and environment).
4.1 Number of required drones versus intervention duration
To cover all users, 186 femtocell base stations (and thus 186 base station locations) are required. Note that the most optimal locations are determined based on the specifications of the femtocell base stations as assumed in Section 3.3. To provision these 186 locations with drones (and thus femtocell base stations) for the whole intervention duration of 1 h, 1024 type 1 drones are needed. This means five to six drones are required per location. The average battery life time of a type 1 drone is approximately 874 s based on the power consumption of the femtocell base station and the drone itself. Furthermore, on average, the drone reaches its assigned location after 73.5 s. One type 1 drone can thus provide coverage for approximately 727 s (= 874 s − 2 · 73.5 s), which confirms that five type 1 drones are required to cover one location for 1 h. Analogously, 372 type 2 drones are needed to cover the 168 base station locations for 1 h. A type 2 drone has a battery life time of approximately 2636 s (Section 3.2). Although it has a longer battery life time, it flies slightly slower resulting in a travel time of approximately 93.5 s on average. The type 2 drone can thus provide coverage for 2449 s, which means that we need two drones per location for a 1-h intervention. Considering the same intervention duration, we obtained that about three times more type 1 than type 2 drones are needed. The main reason for this higher number is of course the three times larger battery life time. The effect of the slightly slower fly speed of the type 2 drone on the number of required drones is not significant as can be concluded from the results discussed above.
As one might expect and shown in Fig. 3, the relation between the number of drones and the intervention duration is linear. The longer the intervention duration, the more drones are needed per location due to the limited battery life of time of the drone. Quadrupling the intervention duration results in 3.7 times and 3.1 times more type 1 and type 2 drones, respectively. As mentioned above, a type 1 drone can provide service for 727 s at one location (= 874 s of battery time − 147 s travel time). Increasing the intervention duration by 3 h requires thus 15 additional drones per location (= 10800 s/727 s). Similarly, for the type 2 drone, seven extra drones (= 10800 s / 2449 s) are needed per location for the 3 h more intervention time.
For both equations, an R2 of 0.996 is obtained, meaning that we can predict the number of required drones correctly in 99.6% of the cases in the considered environment.
Based on the simulation results and the obtained prediction equations, we conclude that a high number of drones is needed if full user coverage is required in the considered city center. When using type 1 drones, more than 1000 drones are required for an intervention of only 1 h. When using approximately the same amount of type 2 drone, we can provide around 4 h of coverage for the same area. This high number of required drones is of course a major drawback of such an emergency network as it implies a significant investment cost. In the next sections, we investigate which actions can be taken to reduce this number of drones and thus the cost of such an emergency network.
4.2 Number of required drones versus user coverage or when the fixed infrastructure is only partly down
Figure 4 shows that the number of required drones is linearly related to the required percentage of user coverage. The more users have to be reconnected, the more base stations (and thus also base station locations) we have to use, resulting in a higher amount of drones to provision all these locations for the whole intervention period. Doubling the number of users results in 1.8 to 2 times more drones (depending on the considered intervention duration and type of drone). Let us assume a 1-h intervention. When a 20% user coverage is required, the network consists of 43 different base station locations. As 5 to 6 type 1 and 2 type 2 drones are needed to cover a certain location during 1 h (see Section 4.1), this results in a total of 237 type 1 and 86 type 2 drones. When 40% of the users need to be served, 82 base station locations are obtained, resulting in a total of 453 type 1 and 166 type 2 drones. The fact that about two times more base station locations are required to cover twice the number of users is due to the limited coverage of a single femtocell base station.
If one considers a small event in the city center of Ghent with 10,000 attendees, Eqs. (9) and (10) predict that 253,420 type 1 and 78,237 type 2 drones are required for a 1-h intervention. Even when using the more advanced type 2 drone, this is still a huge amount of drones. Unfortunately, the amount of users to cover and the intervention duration is not something one can completely control. Therefore, in the next sections, we will investigate if we can take some actions on the network level to limit the number of drones.
Note that the models proposed above can also be used the other way around. Let us assume that we have 500 drones available. When using type 1 drones, we can cover 120 users for 1 h or 57 users for 4 h based on Eq. (9). Considering type 2 drones, the user coverage increases up to 159 users for 1 h and 100 users for 4 h (Eq. (10)). A drone with a higher fly time is clearly the most appropriate to use for emergency ad hoc networks.
4.3 Number of required drones versus the drone’s fly height
Until now, the drone’s fly height was limited to 35 m (Section 3.1) maximum and 4 m minimum. When flying above an outdoor user, a fly height of 4 m was assumed. For an indoor user, a fly height equal to the building height + 4 m was considered. In this section, the drone will fly at a predefined height independent on the fact of the user is indoors or outdoors. However, note however that when the user is indoor and the building is higher than the predefined fly height, this location can not be added as a possible location to develop the network.
Increasing the drone’s fly height has the highest influence when considering type 1 drones to provide full user coverage for 8 h, while the lowest leverage is obtained when using type 2 drones to provide 50% user coverage for 4 h (13.1 versus 7.8% type 1 and type 2 drones for increasing the fly height from 15 to 25 m, respectively). In the latter case, less users have to be covered for the same area. In fact, the distance between two users will be too high to be covered by one single femtocell base station, even after increasing the coverage range by using a higher fly height.
Since the relationship between the number of required drones versus the drone’s fly height is a saturated function rather than a linear one, we do not provide prediction models for this relationship. We recommend to use the highest possible fly height, preferably around 100 m.
4.4 Number of required drones versus provided service level
Finally, we investigate if the service level, i.e., the bit rate, offered to the user influences the number of required drones. This means that in practice, the user will only be able, for example, to make a phone call or sending a text message. For this study, we selected three different scenarios, each with a different bit rate: 12 kbps (text message), 64 kbps (voice call), and 1 Mbps (data call). The bit rate distribution discussed in Section 3 will thus be replaced by one of these bit rates. Each user active in the area will be served with the same bit rate.
As mentioned above, we have access to an unlimited amount of drones. This means that the algorithm will just introduce a new femtocell base station in the network whenever the coverage or the capacity of the already added femtocell base stations is saturated. To verify our conclusion, we studied the user coverage when only 1000 drones are available. For an intervention duration of 8 h, a user coverage of approximately 13 and 33.5% was obtained for the type 1 and type 2 drone, respectively, independent of the provided service level. In none of the performed simulations, the capacity of a single femtocell base station is the limiting factor. Therefore, in the future, we should focus on beam-forming techniques in order to increase the coverage range of the drone mounted femtocell base station and to reduce the interference between these base stations.
Today’s wireless telecommunication networks are very reliable. However, in case of a natural disaster or a malevolent attack, these networks can be overwhelmed by a tremendous amount of requests which they can not cope with. We propose a deployment tool for UAV (unmanned aerial vehicle)-aided emergency networks for such disaster scenarios. This emergency network will consist of many femtocell base stations which are brought to their assigned locations by UAVs or drones. This deployment tool is applied on a realistic large-scale disaster scenario in the city center of Ghent, Belgium. The results are very promising; however, still a large amount of drones (> 1000 type 1 or > 370 type 2 drones) is required to provide service for only a small intervention duration of 1 h. The number of required drones scales linearly with the intervention duration. One solution to reduce the number of drones is to provide coverage to a limited set of users in case a certain part of the fixed infrastructure is still available or when the operators open their WiFi networks if available. The number of required drones scales also linearly with the number of users to cover. Another solution to reduce the number of drones is to increase their fly height. By increasing the fly height by 10 m, up to 13% less drones are required to provide full user coverage. However, this effect is not unlimited. From a fly height of 100 m on, the number of required drones does not decrease anymore. We also investigated if reducing the service level provided to the user reduces the amount of drones. In this case, the user would be limited to texting or voice calling only. However, for the considered scenario, changing the service level has no significant influence on the number of drones.
Future work includes a thorough study of the back-hauling possibilities for such an emergency network, beam-forming techniques to improve the coverage range, cost calculations, other types of UAVs, and serving users when the base station (and thus UAV) is moving. In future research, where existing terrestrial infrastructure is still available, the influence of the inter-cell interference from the ground should be investigated. Accounting for this interference can be done by adding an extra parameter to the link budget proposed in this study.
Margot Deruyck is a Post-doctoral fellow of the FWO-V (Research Foundation - Flanders, Belgium).
Availability of data and materials
The data will not be shared due to confidentiality matters.
JW was responsible for implementing the deployment tool in Java under the supervision of the other authors. MD has processed the data and written the manuscript. WJ and LM have provided general advice and feedback on the manuscript. All authors read and approved the final manuscript.
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- A Merwaday, I Guvenc, in IEEE Wireless Communications and Networking Conference Workshops (WCNCW). UAV assisted heterogeneous networks for public safety communications, (2015), pp. 329–334.Google Scholar
- M Asadpour, B Van den Bergh, D Giustiniano, Hummel KA, Pollin S, Plattner B, Micro aerial vehicle networks: an experimental analysis of challenges and opportunities. IEEE Commun. Mag. 52(17), 141–149 (2014).View ArticleGoogle Scholar
- MM Azari, F Rosas, K-C Chen, S Pollin, in IEEE Global Communications Conference (Globecom). Optimal UAV positioning for terrestrial-aerial communication in presence of fading, (2016).Google Scholar
- B Van der Bergh, A Chiumento, S Pollin, LTE in the sky: trading off propagation benefits with interference costs for aerial nodes. IEEE Commun. Mag. 54(5), 44–50 (2016).View ArticleGoogle Scholar
- P Ladosz, H Oh, W-H Chen, in IEEE International Conference on Unmanned Aircraft Systems (ICUAS). Optimal positioning of communication relay unmanned aerial vehicles in urban environments, (2016), pp. 1140–1147.Google Scholar
- D Orfanus, EP de Freitas, F Eliassen, Self-organization as a supporting paradigm for military UAV relay networks. IEEE Commun. Lett. 20(4), 804–807 (2016).View ArticleGoogle Scholar
- V Sharma, M Bennis, R Kumar, UAV-assisted heterogeneous netowrks for capacity enhancements. IEEE Commun. Lett. 20(6), 1207–1210 (2016).View ArticleGoogle Scholar
- K Mase, H Okada, in IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIRMC). Message communication system using unmanned aerial vehicles under large-scale disaster environments, (2015), pp. 2171–2176.Google Scholar
- M Mozaffari, W Saad, M Bennis, M Debbah, Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage. IEEE Commun. Lett. 20(8), 1647–1650 (2016).View ArticleGoogle Scholar
- K Gomez, A Hourani, L Goratti, R Riggio, S Kandeepan, I Bucaille, in European Conference on Networks and Communications (EuCNC). Capacity evaluation of aerial LTE base-stations for public safety communications, (2015), pp. 133–138.Google Scholar
- S Ktari, S Secci, D Lavaux, in IEEE 12th International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob). Bayesian network modeling for public safety network reliability analysis, (2016). https://doi.org/10.1109/WiMOB.2016.7763174.Google Scholar
- S Lambert, M Deruyck, W Van Heddeghem, B Lannoo, W Joseph, D Colle, M Pickavet, P Demeester, Post-peak ICT: graceful degradation for communication networks in an energy constrained future. IEEE Commun. Mag. 53(11), 166–174 (2015).View ArticleGoogle Scholar
- M Deruyck, A Marri, S Mignardi, L Martens, W Joseph, R Verdone, in 28th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Performance evaluation of the dynamic trajectory design of an unmanned aerial base station in a single frequency network, (2017).Google Scholar
- Mozaffari M, Saad W, Bennis M, Debbah M, Unmanned aerial vehicle with underlaid device-to-device communications: performance and tradeoffs. IEEE Trans. Wirel. Commun. 15(6), 3949–3963 (2016).View ArticleGoogle Scholar
- M Mozaffari, W Saad, M Bennis, M Debbah, Wireless communication using unmanned aerial vehicles (UAVs): optimal transport theory for hover time optimization. IEEE Trans. Wirel. Commun. 16(12), 8052–8066 (2017).View ArticleGoogle Scholar
- MM Azari, Y Murillo, O Amin, F Rosas, M-S Alouini, S Polin, in 28th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Coverage maximization for a poisson field of drone cells, (2017).Google Scholar
- M Mozaffari, W Saad, M Bennis, M Debbah, in IEEE Global Communications Conference (GLOBECOM). Drone small cells in the clouds: design, deployment and performance analysis, (2015), pp. 1–6.Google Scholar
- Y Zeng, R Zhang, TJ Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun. Mag. 54(5), 36–42 (2016).View ArticleGoogle Scholar
- S Chandrasekharan, K Gomez, A Al-Hourani, S Kandeepan, T Rasheed, L Goratti, L Reynaud, D Grace, I Bucaille, T Wirth, S Allsopp, Designing and implementing future aerial communication networks. IEEE Commun. Mag. 54(5), 26–34 (2016).View ArticleGoogle Scholar
- EW Frew, TX Brown, Airborne communication networks for small unmanned aircraft systems. Proc. IEEE. 96(12), 2008–2027 (2008).View ArticleGoogle Scholar
- T Reed, J Geis, S Dietrich, in 5th USENIX Conference on Offensive Technologies (WOOT). SkyNET: a 3G-enabled mobile attack drone and stealth botmaster approach attack framework, (2011), p. 4.Google Scholar
- J Valente, D Sanz, A Barrientos, J Del Cerro, A Ribeiro, C Rossi, An air-ground wireless sensor network for crop monitoring. Sensors. 11(12), 6088–6108 (2011).View ArticleGoogle Scholar
- HT Kung, C-K Lin, T-H Lin, SJ Tarsa, D Vlah, in GLOBECOM Workshops. Measuring diversity on a low-altitude UAV in a ground-to-air wireless 802.11 mesh network, (2010), pp. 1799–1804.Google Scholar
- W Joseph, S Aerts, M Vandenbossche, A Thielens, L Martens, Drone based measurement system for radiofrequency exposure assessment. Bioelectromagnetics. 37(3), 195–199 (2016).View ArticleGoogle Scholar
- Microdrones MD4-1000: Robust and powerful UAV (2016). https://www.microdrones.com/en/mdaircraft/md4-1000/. Accessed 20 Jun 2016.Google Scholar
- M Deruyck, D De Vulder, W Joseph, L Martens, Modelling the power consumption in femtocell networks. IEEE Wirel. Commun. Netw. Conf, 30–35 (2012).Google Scholar
- M Bennis, M Simsek, A Czylwik, W Saad, S Valentin, M Debbah, When cellular meets WiFi in small cell networks. IEEE Commun. Mag. 51(6), 44–50 (2013).View ArticleGoogle Scholar
- COST Telecommunications, COST Action 231: digital mobile radio towards future generation systems (European Commission, Belgium, 1999).Google Scholar
- E Tanghe, W Joseph, L Verloock, L Martens, H Capoen, K Van Herwegen, W Vantomme, The industrial indoor channel: large-scale and temporal fading at 900, 2400, and 5200 MHz. IEEE Trans. Wirel. Commun. 7(7), 2740–2751 (2008).View ArticleGoogle Scholar
- E Tanghe, W Joseph, L Verloock, L Martens, H Capoen, K Van Herwegen, T Buysschaert, Statistical validation of WLAN range calculated with propagation models for industrial environments by chipset-level received signal strength measurements. IET Sci. Meas. Technol. 3(3), 244–255 (2009).View ArticleGoogle Scholar
- M Deruyck, W Joseph, E Tanghe, L Martens, Reducing the power consumption in LTE-advanced wireless access networks by a capacity based deployment tool. Radio Sci. 49(9), 777–787 (2014).View ArticleGoogle Scholar