Professional Documents
Culture Documents
rapidly across many civil application domains including real- discuss practical ways to overcome challenges that have the
time monitoring, providing wireless coverage, remote sensing, potential to contribute to multiple application domains.
search and rescue, delivery of goods, security and surveillance, The authors in [1] present the characteristics and require-
precision agriculture, and civil infrastructure inspection. Smart ments of UAV networks for envisioned civil applications over
UAVs are the next big revolution in UAV technology promis- the period 2000–2015 from a communications and networking
ing to provide new opportunities in different applications, viewpoint. They survey the quality of service requirements,
especially in civil infrastructure in terms of reduced risks and network-relevant mission parameters, data requirements, and
lower cost. Civil infrastructure is expected to dominate the the minimum data to be transmitted over the network for civil
more that $45 Billion market value of UAV usage. In this applications. They also discuss general networking related re-
survey, we present UAV civil applications and their challenges. quirements, such as connectivity, adaptability, safety, privacy,
We also discuss current research trends and provide future security, and scalability. Finally, they present experimental
insights for potential UAV uses. Furthermore, we present the results from many projects and investigate the suitability of
key challenges for UAV civil applications, including: charging existing communications technologies to support reliable aerial
challenges, collision avoidance and swarming challenges, and networks.
networking and security related challenges. Based on our In [2], the authors attempt to focus on research in the areas
review of the recent literature, we discuss open research chal- of routing, seamless handover and energy efficiency. First, they
lenges and draw high-level insights on how these challenges distinguish between infrastructure and ad-hoc UAV networks,
might be approached. application areas in which UAVs act as servers or as clients,
Index Terms—UAVs, Wireless Coverage, Real-Time Monitor- star or mesh UAV networks and whether the deployment is
ing, Remote Sensing, Search and Rescue, Delivery of goods, Secu- hardened against delays and disruptions. Then, they focus on
rity and Surveillance, Precision Agriculture, Civil Infrastructure the main issues of routing, seamless handover and energy
Inspection. efficiency in UAV networks. The authors in [7] survey Flying
Ad-Hoc Networks (FANETs) which are ad-hoc networks con-
I. I NTRODUCTION necting the UAVs. They first clarify the differences between
FANETs, Mobile Ad-hoc Networks (MANETs) and Vehicle
UAVs can be used in many civil applications due to their Ad-Hoc Networks (VANETs). Then, they introduce the main
ease of deployment, low maintenance cost, high-mobility and FANET design challenges and discuss open research issues.
ability to hover [1]. Such vehicles are being utilized for real- In [8], the authors provide an overview of UAV-aided wireless
time monitoring of road traffic, providing wireless coverage, communications by introducing the basic networking architec-
remote sensing, search and rescue operations, delivery of ture and main channel characteristics. They also highlight the
goods, security and surveillance, precision agriculture, and key design considerations as well as the new opportunities to
civil infrastructure inspection. The recent research literature be explored.
on UAVs focuses on vertical applications without considering The authors of [9] present an overview of legacy and emerg-
ing public safety communications technologies along with the
Hazim Shakhatreh, Zuochao Dou, and Abdallah Khreishah are with the
Department of Electrical and Computer Engineering, New Jersey Institute of spectrum allocation for public safety usage across all the fre-
Technology. (e-mail: {hms35,zd36,abdallah}@njit.edu) quency bands in the United States. They conclude that the ap-
Ahmad Sawalmeh and Noor Shamsiah Othman are with the Department plication of UAVs in support of public safety communications
of Electronics and Communication Engineering, Universiti Tenaga Nasional.
(e-mail: {PE20656@utn.edu.my,Shamsiah@uniten.edu.my}) is shrouded by privacy concerns and lack of comprehensive
Ala Al-Fuqaha is with the Department of Computer Science, West- policies, regulations, and governance for UAVs. In [10], the
ern Michigan University, Kalamazoo, MI, 49008, USA. (e-mail: (ala.al- authors survey the applications implemented using cooperative
fuqaha@wmich.edu)
Eyad Almaita is with the Department of Power and Mechatronics Engi- swarms of UAVs that operate as distributed processing system.
neering, Tafila Technical University. (e-mail: (e.maita@ttu.edu.jo) They classify the distributed processing applications into the
Issa Khalil is with Qatar Computing Research Institute (QCRI), HBKU, following categories: 1) general purpose distributed processing
Doha, Qatar. (e-mail: ikhalil@hbku.edu.qa)
Mohsen Guizani is with the University of Idaho, Moscow, ID, 83844, USA. applications, 2) object detection, 3) tracking, 4) surveillance,
(e-mail: mguizani@uidaho.edu) 5) data collection, 6) path planning, 7) navigation, 8) collision
2
TABLE II: COMPARISON OF RELATED WORK ON UAV SURVEYS IN TERMS OF NEW TECHNOLOGY TRENDS
Reference Collision mmWave Free space Cloud Machine NFV SDN Image
avoidance optical computing learning processing
[1] X X
[2] X X
[3] X X
[4] X X X
[5] X
[6]
This work X X X X X X X X
avoidance, 9) coordination, 10) environmental monitoring. various channel characterization efforts. They also review
However, this survey does not consider the challenges facing the contemporary perspective of UAV channel modeling ap-
UAVs in these applications and the potential role of new proaches and outline some future research challenges in this
technologies in UAV uses. The authors of [3] provide a domain.
comprehensive survey on UAVs, highlighting their potential UAVs are projected to be a prominent deliverer of civil ser-
use in the delivery of Internet of Things (IoT) services from vices in many areas including farming, transportation, surveil-
the sky. They describe their envisioned UAV-based architecture lance, and disaster management. In this paper, we review
and present the relevant key challenges and requirements. several UAV civil applications and identify their challenges.
We also discuss the research trends for UAV uses and future
In [4], the authors provide a comprehensive study on the insights. The reason to undertake this survey is the lack of
use of UAVs in wireless networks. They investigate two main a survey focusing on these issues. Tables I and II delineate
use cases of UAVs; namely, aerial base stations and cellular- the closely related surveys on UAV civil applications and
connected users. For each use case of UAVs, they present demonstrate the novelty of our survey relative to existing
key challenges, applications, and fundamental open problems. surveys. Specifically, the contributions of this survey can be
Moreover, they describe mathematical tools and techniques delineated as:
needed for meeting UAV challenges as well as analyzing
UAV-enabled wireless networks. The authors of [5] provide • Present the global UAV payload market value. The pay-
a comprehensive survey on available Air-to-Ground channel load covers all equipment which are carried by UAVs
measurement campaigns, large and small scale fading channel such as cameras, sensors, radars, LIDARs, communica-
models, their limitations, and future research directions for tions equipment, weaponry, and others. We also present
UAV communications scenarios. In [6], the authors provide the market value of UAV uses.
a survey on the measurement campaigns launched for UAV • Provide a classification of UAVs based on UAV en-
channel modeling using low altitude platforms and discuss durance, maximum altitude, weight, payload, range, fuel
3
type, operational complexity, coverage range and appli- Europe [16]. The payload covers all equipment which are
cations. carried by UAVs such as cameras, sensors, radars, LIDARs,
• Present UAV civil applications and challenges facing communications equipment, weaponry, and others [17]. Radars
UAVs in each application domain. We also discuss the and communications equipment segment is expected to dom-
research trends for UAV uses and future insights. The inate the global UAV payload market with a market share of
UAV civil applications covered in this survey include: close to 80%, followed by cameras and sensors segment with
real-time monitoring of road traffic, providing wireless around over 11% share and weaponry segment with almost
coverage, remote sensing, search and rescue, delivery of 9% share [16] as shown in Figure 4.
goods, security and surveillance, precision agriculture, Business Intelligence expects sales of UAVs to reach $12
and civil infrastructure inspection. billion in 2021, which is up by a compound annual growth rate
• Discuss the key challenges of UAVs across different ap- of 7.6% from $8.5 billion in 2016 [18]. This future growth
plication domains, such as charging challenges, collision is expected to occur across three main sectors: 1) Consumer
avoidance and swarming challenges, and networking and UAV shipments which are projected to reach 29 million in
security challenges. 2021; 2) Enterprise UAV shipments which are projected to
Our survey is beneficial for future research on UAV uses, as reach 805, 000 in 2021; 3) Government UAVs for combat and
it comprehensively serves as a resource for UAV applications, surveillance. According to Bard Center for the Study of UAVs,
challenges, research trends and future insights, as shown in U.S. Department of Defense allocated a budget of $4.457
Figure 1. For instance, UAVs can be utilized for providing billion for UAVs in 2017 [19].
wireless coverage to remote areas such as Facebooks Aquila All these statistics show the economic importance of UAVs
UAV [11]. In this aplication, UAVs need to return periodically and their applications in the near future for equipment man-
to a charging station for recharging, due to their limited battery ufacturers, investors and business service providers. Smart
capacity. To overcome this challenge, solar panels installed UAVs will provide a unique opportunity for UAV manufac-
on UAVs harvest the received solar energy and convert it turers to utilize new technological trends to overcome current
to electrical energy for long endurance flights [12]. We can challenges of UAV applications. To spread UAV services glob-
envisage Laser power-beaming as a future technology to ally, a complete legal framework and institutions regulating the
provide supplemental energy at night when solar energy is commercial use of UAVs are needed [20].
not available or is minimal at high latitudes during winter.
This would enable such UAVs to fly day and night for weeks III. UAV C LASSIFICATION
or possibly months without landing [13]. Unmanned vehicles can be classified into five different types
The rest of the survey is organized as follows. We start according to their operation. These five types are unmanned
with an overview of the global UAV market value and UAV ground vehicles, unmanned aerial vehicles, unmanned surface
classification in Part I of this survey (Sections II and III). In vehicles (operating on the surface of water), unmanned under-
Part II (Sections IV-XI), we present UAV civil applications water vehicles, and unmanned spacecrafts. Unmanned vehicles
and the challenges facing UAVs in each application domain, can be either remote guided or autonomous vehicles [21].
and we also discuss the research trends and future insights There has been many research studies on unmanned vehicles
for UAV uses. In Part III (Sections XII and XIII), we discuss that reported progress towards autonomic systems that do not
the key challenges of UAV civil applications and conclude require human interactions. In line with the concept of auton-
this study. Finally, a list of the acronyms used in the survey omy with respect to humans and societies, technical systems
is presented in Section XIV. To facilitate reading, Figure 2 that claim to be autonomous must be able to make decisions
provides a detailed structure of the survey. and react to events without direct interventions by humans
[22]. Therefore, some fundamental elements are common to
PART I: MARKET OPPORTUNITY AND UAV all autonomous vehicles. These elements include: ability of
C LASSIFICATION sensing and perceiving the environment, ability of analyzing,
communicating, planning and decision making using on-board
II. MARKET OPPORTUNITY computers, as well as acting which requires vehicle control
UAVs offer a great market opportunity for equipment manu- algorithms.
facturers, investors and business service providers. According UAV features may vary depending on the application in
to the PwC report [14], the addressable market value of order for them to fit their specific task. Therefore, any classi-
UAV uses is over $127 billion as shown in Figure 3. Civil fication of UAVs needs to take into consideration their various
infrastructure is expected to dominate the addressable market features as they are widely used for a variety of civilian
value of UAV uses, with market value of $45 billion. A report operations [23]. The use of UAVs as an aerial base station in
released by the Association for Unmanned Vehicle Systems communications networks, can be categorized based on their
International, expects more than 100, 000 new jobs in un- operating platform, which can be a Low Altitude Platform
manned aircrafts by 2025 [15]. To know how to operate a UAV (LAP) [24]–[26] or High Altitude Platform (HAP) [27]–[29].
and meet job requirements, a person should attend training LAP is a quasi-stationary aerial communications platform
programs at universities or specialized institutes. Global UAV that operates at an altitude of less than 10 km. Three main
payload market value is expected to reach $3 billion by 2027 types of UAVs that fall under this category are vertical take-
dominated by North America, followed by Asia-Pacific and off and landing (VTOL) vehicles, aircrafts, and balloons.
4
LAP HAP
Endurance long endurance - 15-30 hours JP-fuel Long endurance Few hours Few hours From 1 day
- >7 days Solar Up to 100 days To few days
Max. Altitude Up to 25 km 15-20 km 17-23 km Up to 4 km Up to 5 km Up to 1.5 km
Payload (kg) Hundreds of kg’s Up to 1700 kg Tens of kg’s Few kg’s Few kg’s Tens of kg’s
Flight Range Hundreds of km’s From 1500 to Up to Tens of km’s Less than 200 km Tethered Balloon
25000 km 17 million km
Deployment time Need Runway Need Runway custom-built Easy to deploy Easy to launched Easy to deploy
Auto launchers by catapult 10-30 minutes
Fuel type Helium Balloon JP-8 jet fuel Helium Balloon Batteries Fuel injection Helium
Solar panels Solar panels Solar panels engine
Operational Complex Complex Complex Simple Medium Simple
complexity
Coverage area Hundreds of km’s Hundreds of km’s Thousands of km’s Tens of km’s Hundreds of km’s Several tens
of km’s
UAV Weight Few hundreds Few thousands Tens of kg’s Few of kg’s Tens of kg’s Tens of kg’s
of kg’s of kg’s
Public safety Considered safe Considered safe Need global regulations Need safety regulations Safe Safe
Applications Testing environmental GIS Imaging Internet Delivery Internet Delivery Agriculture Aerial
effects application base station
Examples HiSentinel80 [38] Global Hawk [39] Project Loon LIDAR [32] EMT Luna Desert Star
Balloon (Google) [37] X-2000 [40] 34cm Helikite [30]
Fig. 7: Use of Multi-UAV Systems in SAR Operations, Locate GPS Coordinates for the Missing Persons.
Fig. 10: Block Diagram of SAR System Using UAVs with Machine Learning Technology.
D. Research Trends and Future Insights 3) Future Insights: Based on the reviewed current literature
focusing on SAR scenarios using UAVs, we believe there is a
1) Image Processing: SAR operations using UAVs can need for more research on the following:
employ image processing techniques to quickly and accurately
find targeted objects. Image processing methods can be used in • Data fusion and decision fusion algorithms that integrate
autonomous single and multi-UAV systems to locate potential the output of multiple sensors. For example, GPS can be
targets in support of SAR operations. Moreover, location integrated with Forward looking infrared (FLIR) sensors
information can be augmented to aerial images of target and thermal sensors to realize more accurate detection
objects [51]. UAVs can be integrated with target detection solution [52].
technologies including thermal and vision cameras. Thermal • While traditional machine learning techniques have
cameras (e.g., IR cameras) can detect the heat profile to locate demonstrated their success on UAVs, deep learning tech-
missing persons. Two stage template based methods can be niques are currently off limits because of the limitations
used with such cameras [52]. Vision cameras can also help on the on-board processing capabilities and power re-
in the detection process of objects and persons [53], [54]. sources on UAVs. Therefore, there is a need to design
Methods that utilize a combination of thermal and vision and implement on-board, low power, and efficient deep
cameras have been reported in the literature as in [52]. learning solutions in support of SAR operations using
In SAR operations, image processing can be done either at UAVs [58].
the GCS, post target identification, or at the UAV itself, using • Design and implementation of power-efficient distributed
on-board processors with real-time image processing capabil- algorithms for the real-time processing of UAV swarm
ities. In [55], the authors implemented a target identification captured videos, images, and sensing data [57].
method using on-board processors, and the GCS. This method • New lighter materials, efficient batteries and energy har-
utilizes image processing techniques to identify the targeted vesting solutions can contribute to the potential use of
objects and their coarse location coordinates. Using terrestrial UAVs in long duration missions [50].
networks, the UAV sends the images and their GPS locations • Algorithms that support UAV autonomy and swarm co-
to the GCS. Another possible approach requires the UAV to ordination are needed. These algorithms include: flight
capture and save high resolution videos for later analysis at route determination, path planning, collision avoidance
the GCS. and swarm coordination [59], [60].
2) Machine Learning: Machine learning techniques can be • In Multi-UAV systems, there are many coordination and
applied on images captured by UAVs to help in SAR opera- communications challenges that need to be overcome.
tions [56], [57]. In [57], the authors propose machine learning These challenges include QoS communications between
techniques applied to images captured by UAVs equipped the swarm of UAVs over multi-hop communications links
with vision cameras. In their study, pre-trained Convolutional and with the GCS [43].
Neural Network (CNN) with trained linear Support Vector • More accurate localization and mapping systems and
Machine (SVM) is used to determine the exact image/video algorithms are required in support of SAR operations.
frame at which a lost person is potentially detected. Figure 10. Nowadays, GPS is used in UAVs to locate the coordinates
illustrates a block diagram of a SAR system utilizing UAVs UAVs and target objects but GPS is known to have
in conjunction with machine learning technology [57]. coverage and accuracy issues. Therefore, new algorithms
SAR operations employing machine learning technology are needed for data fusion of the data received from
face many challenges. UAVs are battery powered so there is multiple sensors to achieve more precise localization and
significant limitation on their on-board processing capability. mapping without coverage disruptions.
Protection against adversarial attacks on the employed ma- • The use of UAVs as aerial base stations is still nascent.
chine learning techniques pose another important challenge Therefore, more research is needed to study the use
Reliable and real-time communications with the GCS given of such systems to provide communications coverage
QoS and energy constraints is another challenge [57]. when the public communications network is disrupted or
9
operating above its maximum capacity [24]. position and orientation of each image. The algorithm then
applies aerial triangulation process in which the algorithm
V. R EMOTE S ENSING reestablishes the true positions and orientations of the images
from an aerial mission. During this process, the algorithm
UAVs can be used to collect data from ground sensors
generates a large number of automated tie points for con-
and deliver the collected data to ground base stations [61].
jugate points identified across multiple images. A bundle-
UAVs equipped with sensors can also be used as aerial
block adjustment then uses these automated tie points to
sensor network for environmental monitoring and disaster
optimize the photo positions and orientations by generating
management [62]. Numerous datasets originating from UAVs
a high number of redundant observations, which are used to
remote sensing have been acquired to support the research
derive an efficient solution through a rigorous least-squares
teams, serving a broad range of applications: crop monitoring,
adjustment. To provide an independent check on the accuracy
yield estimates, drought monitoring, water quality monitoring,
of the adjustment, the algorithm includes a number of check
tree species, disease detection, etc [63]. In this section, we
points. Then, the oriented images are used to create a digital
present UAV remote sensing systems, challenges during aerial
surface model, which provides a detailed representation of the
sensing using UAVs, research trends and future insights.
terrain surface, including the elevations of raised objects, such
as trees and buildings. The digital surface model generates
A. Remote Sensing Systems a dense point cloud by matching features across multiple
There are two primary types of remote sensing systems: ac- image pairs [66]. At this stage, a digital terrain model can
tive and passive remote sensing systems [64]. In active remote be generated, which is referred to as a bare-earth model. A
sensing system, the sensors are responsible for providing the digital terrain model is a more useful product than a surface
source of energy required to detect the objects. The sensor model, because the high frequency noise associated with
transmits radiation toward the object to be investigated, then vegetation cover is removed. After the algorithm generates a
the sensor detects and measures the radiation that is reflected digital terrain model, orthorectification process can then be
from the object. Most active remote systems used in remote performed to remove the distortion in the original images.
sensing applications operate in the microwave portion of the After orthorectification process, the algorithm combines the
electromagnetic spectrum and hence it makes them able to individual images into a mosaic, to provide a seamless image
propagate through the atmosphere under most conditions [64]. of the mission area at the desired resolution [67]. Figure 13
The active remote sensing systems include laser altimeter, summarizes the image processing steps for remotely sensed
LiDAR, radar, ranging instrument, scatterometer and sounder. imagery.
In passive remote sensing system, the sensor detects natural
radiation that is emitted or reflected by the object as shown C. Flight Planning
in Figure 11. The majority of passive sensors operate in the
visible, infrared, thermal infrared, and microwave portions of Although each UAV mission is unique in nature, the same
the electromagnetic spectrum [64]. The passive remote sens- steps and processes are normally followed. Typically, a UAV
ing systems include accelerometer, hyperspectral radiometer, mission starts with flight planning [65]. This step depends on
imaging radiometer, radiometer, sounder, spectrometer and specific flight-planning algorithm and uses a background map
spectroradiometer. In Figure 12, we show the classifications or satellite image as a reference to define the flight area. Extra
of UAV aerial sensing systems. In Table IV, we make a data is then included, for example, the desired flying altitude,
comparison among the UAV remote sensing systems based on the focal length and orientation of the camera, and the desired
the operating frequency and applications. The common active flight path. The flight-planning algorithm will then find an
sensors in remote sensing are LiDAR and radar. A LiDAR efficient way to obtain overlapping stereo imagery covering
sensor directs a laser beam onto the surface of the earth and the area of interest. During the flight-planning process, the
determines the distance to the object by recording the time algorithm can adjust various parameters until the operator is
between transmitted and backscattered light pulses. A radar satisfied with the flight plan. As part of the mission planning
sensor produces a two-dimensional image of the surface by process, the camera shutter speed settings must satisfy the
recording the range and magnitude of the energy reflected different lighting conditions. If exposure time is too short,
from all objects. The common passive sensor in remote the imagery might be too dark to discriminate among all
sensing is spectrometer. A spectrometer sensor is designed to key features of interest, but if it is too long, the imagery
detect, measure, and analyze the spectral content of incident will be blurred or will be bright. Next, the generated flight
electromagnetic radiation. plan is uploaded to the UAV autopilot. The autopilot uses the
instructions contained in the flight plan to find climb rates
and positional adjustments that enable the UAV to follow the
B. Image Processing and Analysis planned path as closely as possible. The autopilot reads the
The image processing steps for a typical UAV mission are adjustments from the global navigation and satellite system
described in details by the authors in [65] and [66]. The and the initial measurement unit several times per second
process flow is the same for most remotely sensed imagery throughout the flight. After the flight completion, the autopilot
processing algorithms. First, the algorithm utilizes the log file download a log file, this file contains information about the
from the UAV autopilot to provide initial estimates for the recorded UAV 3D placements throughout the flight, as well
10
as information about when the camera was triggered. The in the Arctic [69]. The authors in [70] modify and test the
information in log file is used to provide initial estimates Aerosonde UAV in extreme weather conditions, at very low
for image centre positions and camera orientations, which are temperatures (less than −20 ◦ C) to ensure a safe flight in the
then used as inputs to recover the exact positions of surface Arctic. The aim of the work was to modify and integrate
points [67]. sensors on-board an Aerosonde UAV to improve the UAVs
capability for its mission under extreme weather conditions
D. Challenges such as in the Arctic. The steps to customize the UAV for the
extreme weather conditions were: 1) The avionics were iso-
1) Hostile Natural Environment: UAVs can be utilized to lated; 2) A fuel-injection engine was used to avoid carburetor
study the atmospheric composition, air quality and climate icing; 3) A servo-system was adopted to force ice breaking
parameters, because of their ability to access hazardous en- over the leading edge of the air-foil. In Barrow, Alaska, the
vironments, such as thunderstorms, hurricanes and volcanic modified UAVs successfully demonstrated their capabilities
plumes [68]. The researchers used UAVs for conducting en- to collect data for 48 hours along a 30 km2 rectangular
vironmental sampling and ocean surface temperature studies
11
Hyperspectral radiometer
and radial wind profiles from the outer perimeter into the eye
Laser altimeter
of the typhoon at the 700 hPa layer. The UAV also took a
Imaging radiometer
Scatterometer
Spectroradiometer
vertical sounding in the eye of the typhoon and measured the
Accelerometer
Sounder
Spectrometer
LiDAR
Radiometer
Radar
Sounder
tions imposed by the current generation of lightweight digital
cameras are outstanding issues that need to be addressed.
Fig. 12: Classification of UAV Aerial Sensing Systems. The current UAV digital cameras are designed for the general
market and are not optimized for remote sensing applications.
The current commercial instruments tend to be too bulky to
be used with current lightweight UAVs, and for those that
do exist, there is still a question of calibration process with
conventional sensors. Spectral drawbacks include the fact that
spectral response curves from cameras are usually poorly
calibrated, which makes it difficult to convert brightness values
UAV Image processing
to radiance. However, even cameras designed specifically for
UAVs may not meet the required scientific benchmarks [67].
Another drawback is that the detectors of camera may also
The algorithm utilizes the log file from the become saturated when there are high contrasts, for example
UAV autopilot to provide initial estimates for when an image covers both a dark forest and a snow covered
the position and orientation of each image. field. Another drawback is that many cameras are prone to
vignette, where the centres of images appear brighter than the
edges. This is because rays of light in the centres of the image
Apply aerial triangulation process in have to pass through a less optical thickness of the camera
which the algorithm reestablishes the true lens, and are thus low attenuated than rays at the edges of the
positions and orientations of the images. image. There are a number of techniques that can be taken into
account to improve the quality of image: 1) micro-four-thirds
cameras with fixed interchangeable lenses can be used instead
A bundle-block adjustment uses automated tie points of having a retractable lens, which allows for much improved
to optimize the photo positions and orientations by calibrations and image quality; 2) a simple step that can make
generating a high number of redundant observations.
a big difference in the processing stage is to remove images
that are blurred, under or overexposed, or saturated [67].
3) Illumination Issues: The shadows on a sunny day are
Generate a digital surface model clear and well defined. These weather conditions can cause
and a digital terrain model. critical problems for the automated image matching algorithms
used in both triangulation process and digital elevation model
generation [67]. When clouds move rapidly, shaded areas can
vary between images obtained during the same mission, there-
Orthorectify the images in which fore the aerial triangulation process will fail for some images,
we remove the distortions. and also will result in errors for automatically generated digital
elevation models. Furthermore, the automated color balancing
algorithms used in the creation of image mosaics may be
Combine the individual images into a affected by the patterns of light and shade across images.
mosaic to provide a seamless image of This can cause mosaics with poor visual quality. Another
the mission area at the desired resolution. generally observed illumination effect is the presence of image
hotspots, where a bright points appear in the image. Hotspots
Fig. 13: Image Processing for a UAV Remote Sensing Image
occur at the antisolar point due to the effects of bidirectional
reflectance, which is dependent on the relative placement of
the image sensor and the sun [67].
12
• UAV remote sensing can be as a powerful technique for the distance between trees, buildings and power lines. Fur-
field-based phenotyping with the advantages of high effi- thermore, TIR camera was employed for bad conductivity
ciency, low cost and suitability for complex environments. detection in the power lines. UAVs can also be used to monitor
The adoption of multi-sensors coupled with advanced the facilities and infrastructure, including gas, oil and water
data analysis techniques for retrieving crop phenotypic pipelines. In [84], the authors proposed the deployment of
traits have attracted great attention in recent years [81]. small-UAV (sUAV) equipped with a gas controller unit to
• It is expected that with the advancement of UAVs with detect air and gas content. The system provided a remote
larger payload, longer flight time, low-cost sensors, im- sensing to detect gas leaks in oil and gas pipelines.
proved image processing algorithms for Big data, and Table V summarizes some of the construction and infras-
effective UAV regulations, there is potential for wider ap- tructure inspection applications using UAVs. More specifically,
plications of the UAV-based field crop phenotyping [81]. this table presents several types of UAV used in construction
• UAV remote sensing for field-based crop phenotyping and infrastructure inspection applications, as well as the type
provides data at high resolutions, which is needed for of sensors deployed for each application and the correspond-
accurate crop parameter estimations. The derivation of ing UAV specifications in terms of payload, altitude and
crop phenotypic traits based on the spectral reflection endurance.
information using UAV as the platform has shown good
accuracy under certain conditions. However, it showed
a low accuracy in the research on the non-destructive B. The Deployment of UAVs for Construction & Infrastructure
acquisition of complex traits that were indirectly related Inspection Applications
to the spectral information [81]; In this section, we present several specific example of
• Image processing of UAV imagery faces a number of the deployment of UAV for construction and infrastructure
challenges, such as variable scales, high amounts of inspection. Figure 15 illustrates the classification of these
overlap, variable image orientations, and high amounts deployments.
of relief displacement arising from the low flying alti-
• Oil/gas and wind turbine inspection: In 2016, it was
tudes relative to the variation in topographic relief [67].
reported that Pacific Gas and Electric Company (PG&E)
Researchers need to find efficient ways to overcome these
performed drone tests to inspect its electric and gas ser-
challenges in future studies.
vices for better safety and reliability with the authoriza-
tion from Federal Aviation Administration (FAA) [95].
VI. C ONSTRUCTION & I NFRASTRUCTURE I NSPECTION The inspections focused on hard-to-reach areas to detect
As already mentioned in the market opportunity section II, methane leaks across its 70,000-square-mile service area.
the net market value of the deployment of UAV in support of In the future, PG&E plans to extend the drone tests for
construction and infrastructure inspection applications is about storm and disaster response.
45% of the total UAV market. So there is a growing interest Cyberhawk is one of world’s premier oil and gas com-
in UAV uses in large construction projects monitoring [82] pany that uses UAV for inspection [96]. Furthermore, it
and power lines, gas pipelines and GSM towers infrastructure has completed more than 5,000 structural inspections,
inspection [83], [84]. In this section, we first present a liter- including: 1) oil and gas; 2) wind turbine; and 3) live
ature review. Then, we show the uses of UAVs in support of flare. UAV inspection conducted by Cyberhawk provides
infrastructure inspection. Finally, we present the challenges, a bunch of photos, as well as conducts close visual and
research trends and future insights. thermal inspections of the inspected assets.
Industrial SkyWorks [97] uses drones for building inspec-
A. Literature Review tions and oil/gas inspections in North America. Further-
more, a powerful machine learning algorithm, BlueVu,
In construction and infrastructure inspection applications,
has been developed to efficiently handle the captured data.
UAVs can be used for real-time monitoring construction
To sum up, it provides the following solutions:
project sites [85]. So, the project managers can monitor the
construction site using UAVs with better visibility about the – Asset inspections and data acquisition;
project progress without any need to access the site [82]. – Advanced data processing with 2D and 3D images;
Moreover, UAVs can also be utilized for high voltage – Detailed reports of the inspected asset (i.e., annota-
inspection of the power transmission lines. In [86]–[89], the tions, inspector comments, and recommendations).
authors used the UAVs to perform an autonomous navigation • Critical land building inspection (e.g., cell tower): AT&T
for the power lines inspection. The UAVs was deployed to owns about 65,000 cell towers that need to be inspected,
detect, inspect and diagnose the defects of the power line repaired or installed. The video analytic team at AT&T
infrastructure. Labs has collaborated with other forces (e.g., Intel,
In [90], the authors designed and implemented a fully Qualcomm, etc.) to develop faster, better, more efficient,
automated UAV-based system for the real-time power line and fully automated cell tower inspection using UAVs
inspection. More specifically, multiple images and data from [98]. One of the approaches is to employ deep learning
UAVs were processed to identify the locations of trees and algorithm on high definition (HD) videos to detect defects
buildings near to the power lines, as well as to calculate and anomalies in real time.
14
TABLE V: SUMMARY OF UAV SPECIFICATIONS, APPLICATIONS AND TECHNOLOGY USED IN CONSTRUCTION AND INFRASTRUCTURE INSPECTION
AR.Drone French Use UAVs to enhance the No / 50 m / 12 min. On-board HD camera, [85]
Company Parrot. safety on on construction Wi-Fi connection.
sites by providing a
real-time visual view for
these sites.
A Multi Rotor UAV. Use UAVs with image 100 g / LAP / 20 min. Color imaging sensors. [91]
processing methods for
crack detection and
assessment of surface
degradation.
MikroKopter L4-ME Use UAVs for vertical Up to 500 g / Up to 247 Laser scanner. [93]
Quadcopter [92]. inspection for high rise m / 13-20 min. [92]
infrastructures such as
street lights, GSM towers
or high rise buildings.
Quadrotor Helicopter, UAV. Inspection of the high Less than 1 kg/ LAP/ Less Color and TIR cameras, [87]
voltage of power than 1 hour. GPS, IMU.
transmission lines.
Fixed Wing Aircraft, UAV. Sketchy inspection, Less than 3 kg/ Up to 500 HD ultra-wide angle video [83]
identifying the defects of m/ Up to 50 min (50 km). camera.
the power transmission
lines.
Quadrotor, UAV. Use cooperative UAVs Less than 6 kg/ Up to 200 TIR cameras, GPS. [83]
platform for inspection and m/ Up to 25 min (10 km).
diagnose of the power lines
infrastructure.
Quadrotor (VTOL), sUAV. provide a remote sensing NA/ LAP/ 30-50 min. Gas controller unit, GPS. [84], [94]
to detect gas leaks in gas
pipelines.
Oil/gas and wind Critical land building Infrastructure internal Extreme condition
turbine inspection inspection (e.g., cell tower) inspection (e.g., pipe) inspection
Fig. 15: The Deployment of UAVs for Construction and Infrastructure Inspection.
image processing techniques. The employment of image algorithms for multi-UAV cooperation are required, in
processing techniques allows for monitoring and assessing order to achieve faster and more efficient inspections.
the construction projects, as well as performing inspection • The researchers should also focus on the improvement of
of the infrastructure such as surveying construction sites, the autonomy and safety for UAVs to maneuver in the
work progress monitoring, inspection of bridges, irrigation congested and indoor environment with no or weak GPS
structures monitoring, detection of construction damage and signals [102].
surfaces degradation. [91], [103].
In [91], presented an integrated data acquisition and image VII. P RECISION AGRICULTURE
processing platform mounted on UAV. It was proposed to be UAVs can be utilized in precision agriculture (PA) for
used for the inspection of infrastructures and real time struc- crop management and monitoring [105], [106], weed detection
tural health monitoring (SHM). In the proposed framework, a [107], irrigation scheduling [108], disease detection [109],
real time image and data will be sent to the GCS. Then the pesticide spraying [105] and gathering data from ground
images and data will be processed using image processing sensors (moisture, soil properties, etc.,) [110]. The deployment
unit in the GCS, to facilitate the diagnosis and inspection of UAVs in PA is a cost-effective and time saving technology
process. The authors proposed to combine HSV thresholding which can help for improving crop yields, farms productivity
and hat transform for cracks detection on the concrete surfaces. and profitability in farming systems. Moreover, UAVs facilitate
Figure 17 presents the crack detection algorithm block diagram agricultural management, weed monitoring, and pest damage,
proposed in [91]. thereby they help to meet these challenges quickly [111].
In [87], the authors proposed for the deployment of UAV In this section, we first present a literature review of
with a vision-based system that consists of a color camera, TIR UAVs in PA. Then, we show the deployment of UAV in PA.
camera and a transmitter to send the captured images to the Moreover, we present the challenges, as well as research trends
GCS. Then these images will be processed in the GCS, to be future insights.
16
TABLE VII: SUMMARY OF UAV SPECIFICATIONS, APPLICATIONS AND TECHNOLOGY USED IN PRECISION AGRICULTURE
Yamaha Aero Robot ”R-50. Monitoring Agriculture, 20 kg / LAP / 1 hour. Azimuth and Differential [106]
spraying UAV systems. Global Positioning System
(DGPS) sensor system.
Yanmar KG-135, YH300 Pesticide spraying over 22.7 kg / 1500m / 5 hours. Spray system with GPS [105]
and AYH3. crop fields. sensor system.
RC model fixed-wing Imaging small sorghum Less than 1kg / LAP / less Image sensor digital [105], [112]
airframe. fields to assess the than 1 hour. camera.
attributes of a grain crop.
Vector-P UAV. Crop management (e.g. Less than 1kg Digital color-infrared [113]
winter wheat) for /105m-210m/1-6 hours camera with a
site-specific agriculture, a deepening on the payload. red-light-blocking filter.
correlation is investigated
between leaf area index
and the green normalized
difference vegetation index
(GNDVI).
Fixed-wing UAV. Detect the variability in Lightweight camera/ 90m / Thermal camera , Thermal [114]
crop response to irrigation Less than 1 hour. Infrared (TIR) imaging
(e.g. cotton). sensor.
Multi-rotor micro UAV. Agricultural management, Less than 1kg / 100 m / Multi-band imaging sensor, [109]
disease detection for citrus 10-20 min. 6-channel multispectral
(citrus greening, camera.
Huanglongbing (HLB)).
Vario XLC helicopter. Weed management, reduce 7 kg / LAP / 30 min. Advanced vision sensors [107]
the amount of herbicides for 3D and multispectral
using aerial images for imaging.
crop.
VIPtero UAV. Crop management, they 1 Kg / 150 m / 10 min. Tetracam ADC-lite camera, [111]
used UAV to acquire high GPS.
resolution multi-spectral
images for vineyard
management.
Fieldcopter UAV. Water assessment. UAVs Less than 1 Kg / LAP /NA. Multispectral and thermal [117]
was used for acquiring cameras on-board UAV.
high resolution images and
to assess vineyard water
status, which can help for
irrigation processes.
Multi-rotor hexacopter Cultivations analysis, Up to 2.5 kg Kg / LAP Tetracam camera on-board [118]
ESAFLY A2500-WH processing multi spectral /12-20 min. UAV.
data of the surveyed sites
to create tri-band
ortho-images used to
extract some Vegetation
Indices (VI).
C. Challenges growing season, when plants are small and sparse, tem-
There are several challenges in the deployment of UAVs in perature measurements can be influenced by reflectance
PA: from the soil surface [119].
• In the event of adverse weather, such as extreme wind,
• Thermal cameras have poor resolution and they are ex-
rain and storms, there is a big challenge of UAVs de-
pensive. The price ranges from $2000-$50,000 depending
ployment in PA applications. In these conditions, UAVs
on the quality and functionality, and the majority of
may fail in their missions. Therefore, small UAVs cannot
thermal cameras have resolution of 640 pixels by 480
operate in extreme weather conditions and even cannot
pixels [119].
take readings during these conditions.
• Thermal aerial images can be affected by many factors,
• One of the key challenges is the ability of lightweight
such as the moisture in the atmosphere, shooting distance,
UAVs to carry a high-weight payload, which will limit
and other sources of emitted and reflected thermal radi-
the ability of UAVs to carry an integrated system that
ation. Therefore, calibration of aerial sensors is critical
includes multiple sensors, high-resolution and thermal
to extract scientifically reliable surface temperatures of
cameras [134].
objects [119].
• UAVs have short battery life time, usually less than 1
• Temperature readings through aerial sensors can be af-
hour. Therefore, the power limitations of UAVs is one of
fected by crop growth stages. At the beginning of the
18
in-field analytic capabilities, which can give farmers transfer operation, and sends confirmation of completion of
instant insights in the field, without the need for cellular the operation to an originator of the order [155]. If the
connectivity and cloud connection [146]. identifier of a package docking device at the delivery point
• More precision agricultural researches are required to- does not match the device identifier in the transaction packet,
wards designing and implementing special types of cam- the UAV communication components transmit a request over
eras and sensors on- board UAVs, which have the ability a short-range network such as bluetooth or Wi-Fi. The request
of remote crop monitoring and detection of soil and other may contain the device identifier, or network address of
agricultural characteristics in real time scenarios [111]. the package docking device. Under the assumption that the
• UAVs can be used for obtaining high-resolution images package docking device has not moved outside of the range of
for plants to study plant diseases and traits using image UAV communication, the package docking device having the
processing techniques [147]. network address transmits a signal containing the address of a
new location. The package docking device may then transmit
VIII. D ELIVERY OF G OODS updated GPS coordinates to the UAV. The UAV is re-routed to
UAVs can be used to transport food, packages and other the new address based on the updated GPS location [155]. In
goods [148]–[151] as shown in Figure 20. In health-care Figure 22, we present the flowchart of UAV delivery system.
field, ambulance drones can deliver medicines, immunizations,
and blood samples, into and out of unreachable places. They
can rapidly transport medical instruments in the crucial few B. Challenges
minutes after cardiac arrests. They can also include live 1) Legislation: In the United States, the FAA regulation
video streaming services allowing paramedics to remotely blocked all attempts at commercial use of UAVs, such as
observe and instruct on-scene individuals on how to use the the Tacocopter company for food delivery [156]. As of 2015,
medical instruments [152]. In July 2015, the Federal Aviation delivering of packages with UAVs in the United States is not
Administration (FAA) approved the first delivery of medical allowed [157]. Under current rules, companies are permitted to
supplies using UAVs at Wise, Virginia [153]. With the rapid operate commercial UAVs in the United States, but only under
demise of snail mail and the massive growth of e-Commerce, certain conditions. Their UAVs must be flown within a pilots
postal companies have been forced to find new methods to line of sight and those pilots must get licenses. Commercial
expand beyond their traditional mail delivery business models. operators also are restricted to fly their UAVs during daylight
Different postal companies have undertaken various UAV trials hours. Their UAVs are limited in size, altitude and speed, and
to test the feasibility and profitability of UAV delivery ser- UAVs are generally not allowed to fly over people or to operate
vices [154]. In this section, we present the UAV-based goods beyond visual line of sight [158].
delivery system and its challenges as shown in Figure 21. 2) Liability Insurance: Some UAVs can weigh up to 25 kg
and travel at speeds approaching 45 m/s. A number of media
A. UAV-Based Goods Delivery System reports describes severe lacerations, eye loss, and soft tissue
In UAV-based goods delivery system, a UAV is capable of injuries caused by UAV accidents. In addition to the risk of
traveling between a pick up location and a delivery location. injuries or property damage from a UAV crash, ubiquitous
The UAV is equipped with control processor and GPS module. UAV uses also create other types of accidents, such as au-
It receives a transaction packet for the delivery operation that tomobile accidents due to distraction from low-flying UAVs,
contains the GPS coordinates and the identifier of a package injuries caused by dropped cargo, liability for damaged goods,
docking device associated with the order. Upon arrival of a or accidents resulting from a UAV’s interference with aircraft.
UAV at the delivery location, the control processor checks if Liability for UAV use, however, is not limited to personal
the identifier of a package docking device matches the device injury or property damage claims, UAVs present an enormous
identifier in the transaction packet, performs the package threat to individual privacy [159].
20
Fig. 23: Amazon Airspace Model for the Safe Integration of UAV Systems.
model aeronautics airfields, altitude and equipage restrictions 2) While a few UAVs can already travel without a UAV oper-
in these locations will be established in advance by aviation ators directing their routes, this technology is still emerging.
authorities [163]. Over the next few years, system-failure responses, adaptive
routing, and handoffs between user and UAV controllers
should be improved [167].
C. Research Trends and Future Insights 3) Future Insights: Some of the future possible directions
1) Machine Learning: With machine learning, UAVs can for this application are:
fly autonomously without knowing the objects they may • The energy density of lithium-ion batteries is improving
encounter which is important for large-scale UAV delivery by 5%-8% per year, and their lifetime is expected to
missions. Qualcomms tech shows more advanced computing double by 2025. These improvements will make commer-
that can actually understand what the UAV encountered in cial UAVs able to hover for more than an hour without
mid-air and creates a flight route. They show how the UAV recharging, enabling UAVs to deliver more goods [167].
processing and decision-making technology is nimble enough • Detect-and-avoid systems which help UAVs to avoid
to allow UAVs to operate in unpredictable settings without collisions and obstacles, are still in development, with
using any GPS. All of the UAV computational tasks, like the strong solutions expected to emerge by 2025 [167].
machine learning and flight control, happens on 12 grams • UAVs currently travel below the height of commer-
processor without any off-board computing [164]. Some of cial aircraft due to the collision potential. The methods
challenges are : 1) We need to put a lot of effort to find that can track UAVs and communicate with air-traffic-
efficient methods to do unsupervised learning, where collect- control systems for typical aircraft are not expected to
ing large amounts of unlabeled data is nowadays becoming be available before 2027, making high-altitude missions
economically less expensive [58]; 2) Real-world problems impossible until that time [167].
with high number of states can turn the problem intractable • To make UAV delivery practical, automation research is
with current techniques, severely limiting the development of required to address UAVs design. UAVs design covers
real applications. An efficient method for coping with these creating aerial vehicles that are practical, can be used
types of problems remains as an unsolved challenge [58]. in a wide range of conditions, and whose capability
2) Navigation System: Researchers are developing navi- rivals that of commercial airliners; this is a significant
gation systems that do not utilize GPS signals. This could undertaking that will need many experiments, ingenuity
enable UAVs to fly autonomously over places where GPS and contributions from experts in diverse areas [168].
signals are unavailable or unreliable. Whether delivering goods • More research is needed to address localization and
to remote places or handling emergency tasks in hazardous navigation. The localization and navigation problems may
conditions, this type of capability could significantly expand seem like simple problems due to the many GPS systems
UAVs’ usefulness [165]. Researchers from GPU maker Nvidia that already exist, but to make drone delivery practical in
are currently working on a navigation system that utilizes different operating conditions, the integration of low cost
visual recognition and computer learning to make sure UAVs sensors and localization systems is required [168].
don’t get lost. The team believes that the system has already • More research is needed to address UAVs coordination.
managed the most stable GPS-free flight to date [166]. Some Thousands of UAV operators in the air, utilizing the
of challenges are: 1) The design of computing devices with same resources such as charging stations and operating
low-power consumption, particularly GPUs, is a challenge and frequency, will need robust coordination which can be
active working field for embedded hardware developers [58]; studied by simulation [168].
22
IX. R EAL -T IME M ONITORING OF ROAD T RAFFIC A framework is presented in [170] to support real-time and
Automation of the overall transportation system cannot accurate collection of traffic flow parameters, including speed,
be automated through vehicles only [169]. In fact, other density, and volume, in two travel directions simultaneously.
components of the end-to-end transportation system, such as The proposed framework consists of the following four fea-
tasks of field support teams, traffic police, road surveyors, and tures: (1) A framework for estimating multi-directional traffic
rescue teams, also need to be automated. Smart and reliable flow parameters from aerial videos (2) A method combining
UAVs can help in the automation of these components. the KanadeLucasTomasi (KLT) tracker, k-means clustering,
UAVs have been considered as a novel traffic monitoring and connected graphs for vehicle detection and counting (3)
technology to collect information about traffic conditions on Identifying traffic streams and extracting traffic information
roads. Compared to the traditional monitoring devices such in a real-time manner (4) The system works in daytime and
as loop detectors, surveillance video cameras and microwave nighttime settings, and is not sensitive to UAV movements
sensors, UAVs are cost-effective, and can monitor large con- (i.e., regular movement, vibration, drifting, changes in speed,
tinuous road segments or focus on a specific road segment and hovering). A challenge that this framework faces is that
[170]. Data generated by sensor technologies are somewhat their algorithm sometimes recognizes trucks, buses, and other
aggregated in nature and hence do not support an effective large/heavy vehicles as multiple passenger cars.
record of individual vehicle tracks in the traffic stream. This A real-time framework for the detection and tracking of a
restricts the application of these data in individual driving be- specific road segment using low and mid-altitude UAV video
havior analysis as well as calibrating and validating simulation feeds was presented in [176]. This framework can be used
models [171]. for autonomous navigation, inspection, traffic surveillance and
Moreover, disasters may damage computing, communica- monitoring. For road detection, they utilize the GraphCut
tions infrastructure or power systems. Such failures can result algorithm abecause of its efficient and powerful segmentation
in a complete lack of the ability to control and collect data performance in 2-D color images. For road tracking, they
about the transportation network [172]. develop a tracking technique based on homography alignment
to adjust one image plane to another when the moving camera
takes images of a planar scene.
A. Literature Review In [172], the authors develop a processing procedure for
UAVs are getting accepted as a method to hasten the gath- fast vehicle detection, which consists of three stages; pre-
ering of geographic surveillance data [173]. As autonomous classification with a boosted classifier, blob detection, and final
and connected vehicles become popular, many new services classification using SVM.
and applications of UAVs will be enabled [169]. In [177], the authors propose to integrate collected video
Recognition of moving vehicles using UAVs is still a chal- data from UAVs with traffic simulation models to enhance real-
lenging problem. Moving vehicle detection methods depend time traffic monitoring and control. This can be performed by
on the accuracy of image registration methods, since the transforming collected video data into useful traffic measures
background in the UAV surveillance platform changes fre- to generate essential statistical profiles of traffic patterns,
quently. Accurate image registration methods require extensive including traffic parameters such as mean-speed, density,
computing power, which affecta the real-time capability of volume, turning ratio, etc. However, a main issue with this
these methods [174]. In [174], Qu et al. studied the problem approach is the limitation of flying time for UAVs which could
of moving vehicle detection using UAV cameras. In their hover to obtain data for a few hours a day.
proposed approach, they used convolutional neural networks The work in [178] addresses the security issues of road
to identify vehicles more accurately and in real-time. The traffic monitoring systems using UAVs. In this work, the role
proposed approach consists of three steps to detect moving of a UAV in a road traffic management system is analyzed
vehicles: First, adjacent frames are matched. Then, frame pix- and various situational security issues that occur in traffic
els are classified as background or candidate targets. Finally, management are mitigated. In their proposed approach, the
a deep convolutional neural network is trained over candidate UAV’s intelligent systems analyze real-time traffic as well
targets to classify them into vehicles or background. They as security issues and provide the appropriate mitigation
achieved detection accuracy of around 90% when evaluating commands to the traffic management control center for re-
their method using the CATEC UAV dataset. routing. Instead of image processing, the authors used sensor
In [175], the authors introduce a vehicle detection and networks and graph theory for representing the road network.
tracking system based on imagery data collected by a UAV. They also devised different situational security scenarios to
This system uses consecutive frames to generate the vehicle’s assess the road traffic management.For example, a car without
dynamic information, such as positions and velocities over an RFID tag that enters a defense area or government building
time. Four major modules have been developed in this study: area is considered a potential security risk.
image registration, image feature extraction, vehicle shape Based on a research study by Kansas Department of
detecting, and vehicle tracking. Some unique features have Transportation (KDOT) [179], the use of UAVs for KDOT’s
been introduced into this system to customize the vehicle operations could lead to improved safety, efficiency, as well as
and traffic flow and use them together in multiple contiguous reduced costs. The study also recommends the use of UAVs in
images to increase the system’s accuracy of detecting and a range of applications including bridge inspection, radio tower
tracking vehicles. inspection, surveying, road mapping, high-mast light tower
23
a user-selected reference frame. For the detection step, the UAVs may also be employed for a wide range of transportation
boosting technique is used to improve the training phase which operations and planning applications such as following [187]:
employs Multi-scale Block Local Binary Patterns (MB-LBP). • Incident response.
Finally for tracking, the system uses a set of Bootstrap particle • Monitor freeway conditions.
filters, one per vehicle. • Coordination among a network of traffic signals.
An improved vehicle detection method based on Faster R- • Traveler information.
CNNs is proposed in [183]. The overall vehicle detection • Emergency vehicle guidance.
method is illustrated in Figure 24. For training, the method • Measurement of typical roadway usage.
crops the original large-scale images into segments and aug- • Monitor parking lot utilization.
ments the number of image segments with four angles (i.e., • Estimate Origin-Destination (OD) flows.
0, 90, 180, and 270). Then, all the training image blocks that Figures 25, 26, and 27 illustrate different applications use-
constitute the HRPN input are processed to produce candidate cases of UAVs in smart cities.
region boxes, scores and corresponding hyper features. Finally,
the results of the HRPN are used to train a cascade of boosted
classifiers, and a final classifier is obtained. For testing, a large- C. Legislation
scale testing image is cropped into image blocks. Then, HRPN The Federal Aviation Administration (FAA) approves the
takes these image blocks as input and generates potential out- civil use of UAVs [188]. They can be utilized for public use
puts as well as hyper feature maps. The final classifier checks provided that the UAVs are flown at a certain altitude. For
these boxes using hyper features. Finally, all the detection maintaining the safety of manned aircrafts and the public, the
results of segments are gathered to integrate the original image. FAA in the United States has developed rules to regulate the
The authors tested their method on UAV images successfully. use of small UAVs [189]. For example, the FAA requires
24
speed. Finding the optimal altitude change in support of lacks details/examples on each aspect discussed (i.e., only high
ITS applications is a research challenge [169]. level summaries are included). Also, other important aspects
• Battery technology that allow UAVs to achieve long op- are missing, for example, the robustness benefits (e.g., human
erational times beyond half an hour is another challenge. error tolerance) of using the UAVs compared to manned
Several UAVs can fly together and form a swarm, by aircraft.
which they could overcome their individual limitations in The authors in [197] present a multi-UAV coordination
terms of energy efficiency through optimal coordination system in the framework of the AWARE project (distributed
algorithms [169]. Another alternative is for UAVs to decision-making architecture suitable for multi-UAV coordi-
use recharge stations. UAVs can be recharged while on nation). Generally speaking, a set of tasks are generated and
the ground, or their depleted batteries can be replaced allocated to perform a given mission in an efficient manner
to minimize interruptions to their service. To this end, according to planning strategies. These tasks are sub-goals that
deployment of UAVs, recharge stations, and ground RSUs are necessary for achieving the overall goal of the system, and
jointly becomes an interesting but complicated optimiza- that can be achieved independent of other sub-goals. The key
tion problem [169]. issues include:
• The detection of multiple vehicles at the same time • Task allocation: determines the place (i.e., in which UAV
is another challenge. In [195], Zhang et al. developed node) that each task should be executed to optimize
several computer-vision based algorithms and applied the performance and to ensure appropriate co-operation
them to extract the background image from a video among different UAVs.
sequence, identify vehicles, detect and remove shadows, • Operative perception: generates and maintains a consis-
and compute pixel-based vehicle lengths for classifica- tent view of all operating UAVs (e.g., number of sensors
tion. equipped).
• Truly autonomous operations of UAV swarms are a big
In addition, several types of field experiments are conducted,
challenge, since they need to recognize other UAVs,
including: (1) Multi-UAV cooperative area surveillance; (2)
humans and obstacles to avoid collisions. Therefore, the
Wireless sensor deployment; (3) Fire threat confirmation and
development of swarm intelligence algorithms that fuse
extinguishing; (4) Load transportation and deployment with
data from diverse sources including location sensors,
single and multiple UAVs; and (5) People tracking. To sum up,
weather sensors, accelerometers, gyoscopes, RADARs,
this paper presents details of the proposed algorithm and shows
LIDARs, etc. are needed.
the results of several real filed experiments. However, it lacks
detailed analysis or formal proof of the proposed approach to
X. S URVEILLANCE A PPLICATIONS OF UAV S demonstrate its correctness and effectiveness.
In this section, we first present a detailed literature review of In [198], the authors perform analysis for UAVs deploy-
surveillance applications of UAVs. Then, based on the review, ments within war-zones (i.e., Afghanistan, Iraq, and Pakistan),
we summarize the advantages, disadvantages and important border-zones and urban areas in the USA. The analysis high-
concerns of UAV uses in surveillance. Also, we discuss several lights the benefits of UAVs in such scenarios which include:
takeaway lessons for researchers and practitioners in the area, • Safety: Drones insulates operators and allies from direct
which we believe will help guide the development of effective harm and subjects targets to ’precise’ attack.
UAV surveillance applications. • Robustness: Drones reduce human errors (e.g., moral
ambiguity) from political, cultural, and geographical con-
A. Literature review texts.
The report in [196] discusses the advantages and disadvan- Most importantly, the analysis uncovers a major limitation
tages of employing UAVs along US borders for surveillance in UAV surveillance practices. The usage of drones for
and introduces several important issues for the Congress. The surveillance has difficulties in exact target identification and
advantages include: (1) The usage of UAVs for border surveil- control in risk societies. Potential blurred identities include:
lance improves the coverage along the remote border sections (1) insurgent and civilian; (2) criminal and undocumented
of the U.S.; and (2) The UAVs provide a much wider coverage migrant; and (3) remotely located pilot and front-line soldier.
than current approaches for border surveillance (e.g., border To sum up, this paper puts more focus on safety and robustness
agents on patrol, stationary surveillance equipment, etc.). On benefits of using UAVs in battle fields and urban areas. Also,
the other hand, the disadvantages include: (1) The high acci- it presents the limitation of exact target identification and
dent rates of UAVs (e.g., inclement weather conditions); and control. However, it overlooks the coverage benefits and the
(2) The significant operating costs of a UAV, which are often deployment/implementation limitations of using UAV systems
more than double compared to the costs of a manned aircraft. for surveillance.
The report also highlights other issues of UAVs that should In [199], the authors show the impact of UAV-based surveil-
be considered by the Congress including: UAV effectiveness, lance in civil applications on privacy and civil liberties. First,
lack of information, coordination with USBP agents, safety it states that current regulatory mechanisms (e.g., the US
concerns, and implementation details. This report provides Fourth amendment, EU legislation and judicial decisions,
a clear view of the advantages, disadvantages and important and UK legislation) do not adequately address privacy and
concerns for the border surveillance using UAVs. However, it civil liberties concerns. This is mainly because UAVs are
27
complex, multi-modal surveillance systems that integrate a local processing of video data on board UAVs. The results
range of technologies and capabilities. Second, the inadequacy demonstrate the efficiency of the MEC-based offloading ap-
of current legislation mechanisms results in disproportionate proach in energy consumption, processing time of recognition,
impacts on civil liberties for already marginalized popula- and in promptly detecting suspicious persons. To sum up, this
tion. In conclusion, multi-layered regulatory mechanisms that paper successfully demonstrates the benefits of using a single
combine legislative protections with a bottom-up process of UAV system with IoT devices for crowd surveillance with
privacy and ethical assessment offer the most comprehensive the introduced video data processing offloading technique.
way to adequately address the complexity and heterogeneity of However, further analysis of the coordination of multiple
unmanned aircraft systems and their intended deployments. To UAVs is missing.
sum up, this paper focuses on the law enforcement of privacy In [202], the authors present the use of small UAVs
and civil liberty aspects of using UAVs for surveillance. for specific surveillance scenarios, such as assessment after
However, the regulation recommendation provided is high a disaster. This type of surveillance applications utilizes a
level and lacks sufficient details and convincing analysis. system that integrates a wide range of technologies involv-
In [200], the authors introduce a cooperative perimeter ing: communication, control, sensing, image processing and
surveillance problem and offer a decentralized solution that networking. This article is a product technical report and
accounts for perimeter growth (expanding or contracting) and the corresponding manufacturer successfully applied multiple
insertion/deletion of team members. The cooperative perimeter practical techniques in a real UAV surveillance product.
surveillance problem is defined to gather information about Table XI summarizes the eight papers we have reviewed
the state of the perimeter and transmit that data back to a including their research focus and category.
central base station with as little delay and at the highest
rate possible. The proposed solution is presented in Algorithm B. Discussion
1. The proposed scheme is described comprehensively and State-of-the-art Research: Table XII summarizes the ad-
a simple formal proof is provided. However, there is no vantages, disadvantages and important concerns for the UAV
related works or comparative evaluations provided to justify surveillance applications based on our literature review. We
the effectiveness of the proposed scheme. classify the UAV surveillance research works into six cate-
gories based on their focus and content:
Algorithm 1 Proposed Algorithm in [200].
• Multi-UAV cooperation: this line of research focuses on
If There is an agreement with the neighbor: Then,
developing new orchestration algorithms or architectures
(1) Calculate shared border position ;
in the presence of multiple UAVs.
(2) Travel with neighbor to shared border ;
• Homeland/military security concerns: this line of research
(3) Set direction to monitor own segment;
provides analysis and suggestions for the authorities with
If Reached perimeter endpoint: Then
the considerations for Homeland/military security.
Reverse direction.
• Algorithm improvement: this line of research develops
ENDIF
new algorithms for more efficient post-processing of the
ENDIF
data (e.g., videos or photos captured by the UAVs).
• New use case: this line of research integrates UAV system
The authors of [201] present the results of using a UAV in
two field tests, the 2009 European Land Robot Trials (ELROB- into new application scenarios for potential extra benefits.
• Product introduction: this line of research describes ma-
2009) and the 2010 Response Robot Evaluation Exercises
(RREE-2010), to investigate different realistic response sce- ture techniques leveraged by a real UAV surveillance
narios. They transplant an improved photo mapping algorithm product.
which is a variant of the Fourier Mellin Invariant (FMI)
transform for image representation and processing. They used C. Research Trends and Future Insights
FMI with the following two modifications: 1) Research Trends: Based on the reviewed literature and
• A logarithmic representation of the spectral magnitude of our analysis, we identify that the use of research trends
the FMI descriptor is used; (e.g., machine learning algorithms, nano-sensors [204], short-
• A filter on the frequency where the shift is supposed to range communications technologies, etc.) could bring further
appear is applied. benefits in the area of UAV surveillance applications:
To sum up, this report mainly discusses two field tests with • There are several preferred features of UAV surveillance
a description of a transplanted improved photo mapping algo- applications, especially for some military or homeland
rithm. However, the proof/analysis of the improved algorithm security use cases: (1) small size: this feature not only
is missing. reduces the physical attack surface of the UAV but also
In [203], the authors discuss a potential application of UAVs achieves more secrete UAV patrolling. (2) high resolu-
in delivering IoT services. A high-level overview is presented tion photos: this feature helps the data post processing
and a use case is introduced to demonstrate how UAVs can algorithms to draw more accurate conclusions or obtain
be used for crowd surveillance based on face recognition. more insight findings; (3) low energy consumption: this
They also study the offloading of video data processing to feature allows the UAV to operate for a longer time of
an MEC (Mobile Edge Computing) node compared to the period such that to achieve more complex tasks.
28
UAV links
Command and UAV status Sense and avoid Direct ground UAV-base station UAV-UAV
control from report from information mobile-UAV and UAV-gateway wireless backhaul
GCS to UAVs UAVs to GCS among UAVs communication wireless backhaul
Fig. 29: Applications of UAV Links.
Fig. 32: Coverage Zone By a Low Altitude UAV. Fig. 33: Providing Wireless Coverage for Indoor Users.
connections exist with a high probability, while the path loss report the value of the path loss as a function of the depression
increases. angle and the terrestrial coverage beneath the UAV as shown
2) Outdoor-to-Indoor Path Loss Model: The Air-to-Ground in Figure 34. The path loss is given as follows:
path loss model presented in [24] is not appropriate when
L(d, θ) = Lter (d) + η(θ) + Xuav (θ) = 10αlog(d)+
we consider wireless coverage for indoor users, because this
θ − θo (6)
model assumes that all users are outdoor and located at 2D A(θ − θo )exp(− ) + ηo + N (0, aθ + σo )
points. In [216], the authors adopt the Outdoor-Indoor path B
loss model, certified by the International Telecommunication where Lter (d) is the mean terrestrial path-loss at a given
Union (ITU) [217] to provide wireless coverage for indoor terrestrial distance d from the cellular base station, η(θ) is
users using UAV as shown in Figure 33. The path loss is the excess aerial path-loss, Xuav (θ) is a Gaussian random
given as follows: variable with an angle-dependent standard deviation σuav (θ)
representing the shadowing component, θ is depression angle
L = LF + LB + LI = (wlog10 dout + wlog10 f + g1 )
(5) between the UAV and the cellular base station, α is the path-
+(g2 + g3 (1 − cosθi )2 ) + (g4 din ) loss exponent. Also, A, B, θo and ηo are fitting parameters.
where LF is the free space path loss, LB is the building 4) Air-to-Ground Path Loss for High Altitude Platforms:
penetration loss, and LI is the indoor loss. Also, dout is the The authors in [219] present an empirical propagation pre-
distance between the UAV and indoor user, θi is the incident diction model for mobile communications from high altitude
angle, and din is the indoor distance of the user inside the platforms in built-up areas, where the frequency band is 2–6
building. In this model, we also have w = 20, g1 =32.4, g2 =14, GHz. The probability of LOS paths between the UAV and a
g3 =15, g4 =0.5 and f is the carrier frequency. The authors ground user and the additional shadowing path loss for NLOS
of [216] describe the tradeoff in the above model when the paths are presented as a function of the elevation angle (θ).
horizontal distance between the UAV and a user changes. The path loss model is defined for four different types of built-
When this horizontal distance increases, the free space path up area (Suburban area, Urban area, Dense urban area and
loss (i.e.,LF ) increases as dout increases, while the building Urban high-rise area). The path loss is given as follows:
penetration loss (i.e., LB ) decreases as the incident angle (i.e.,
θi ) decreases. L = P (LOS) × LLOS + P (N LOS) × LN LOS (7)
3) Cellular-to-UAV Path Loss Model: In [218], the authors a−b
model the statistical behavior of the path loss from a cellular P (LOS) = a − (8)
1 + ( θ−c
d )
e
base station towards a flying UAV. They present the path
loss model based on extensive field experiments that involve LLOS (dB) = 20log(dkm ) + 20log(fGHz ) + 92.4 + ζLOS
collecting both terrestrial and aerial coverage samples. They (9)
32
hubs such that the sum-rate of the overall system is maxi- the cycles with limited energy algorithm, that minimizes
mized depending on a number of factors including maximum the number of UAVs required for a continuous coverage.
backhaul data rate of the link between the core network The authors in [233] study the problem of minimizing the
and mother-UAV-hub, maximum bandwidth of each UAV-hub number of UAVs required to provide wireless coverage to
available for small-cell base stations, maximum number of indoor users and prove that this problem is NP-complete. Due
links that every UAV-hub can support and minimum signal- to the intractability of the problem, they use clustering to
to-interference-plus-noise ratio. They present an efficient and minimize the number of UAVs required to cover the indoor
distributed solution of the designed problem, which performs users. They assume that each cluster will be covered by only
a greedy search to maximize the sum rate of the overall one UAV and apply the particle swarm optimization to find
network. In [230], the authors propose an efficient framework the UAV 3D location and UAV transmit power needed to
for optimizing the performance of UAV-based wireless systems cover each cluster. In [234], the authors study the problem
in terms of the average number of bits transmitted to users of deploying minimum number of UAVs to maintain the
and UAVs’s hovering duration. They investigate two scenarios: connectivity of ground MANETs under the condition that
UAV communication under hover time constraints and UAV some UAVs have already been deployed in the field. They
communication under load constraints. In the first scenario, formulate this problem as a minimum steiner tree problem
given the maximum possible hover time of each UAV, the total with existing mobile steiner points under edge length bound
data service under user fairness considerations is maximized. constraints and prove that the problem is NP-Complete. They
They utilize the framework of optimal transport theory and propose an existing UAVs aware polynomial time approximate
prove that the cell partitioning problem is equivalent to a algorithm to solve the problem that uses a maximum match
convex optimization problem. Then, they propose a gradient- heuristic to compute new positions for existing UAVs. The
based algorithm for optimally partitioning the geographical authors in [235] aim to minimize the number of UAVs required
area based on the users’s distribution, hover times, and lo- to provide wireless coverage for a group of distributed ground
cations of the UAVs. In the second scenario, given the load terminals, ensuring that each ground terminal is within the
requirement of each user at a given location, they minimize the communication range of at least one UAV. They propose a
average hover time needed for completely serving the ground polynomial-time algorithm with successive UAV placement,
users by exploiting the optimal transport theory. where the UAVs are placed sequentially starting from the area
perimeter of the uncovered ground terminals along a spiral
3) Deployment Strategies for Minimizing the Number of path towards the center, until all ground terminals are covered.
UAVs Required to Perform Task: The authors in [231] propose
a method to find the placements of UAVs in an area with
different user densities using the particle swarm optimization. 4) Deployment Strategies to Collect Data Using UAVs: The
The goal is to find the minimum number of UAVs and their 3D authors in [236] propose an efficient framework for deploying
placements so that all the users are served. In [232], the authors and moving UAVs to collect data from ground Internet of
study the problem of minimizing the number of UAVs required Things devices. They minimize the total transmit power of the
for a continuous coverage of a given area, given the recharging devices by properly clustering the devices where each cluster
requirement. They prove that this problem is NP-complete. being served by one UAV. The optimal trajectories of the
Due to its intractability, they study partitioning the coverage UAVs are determined by exploiting the framework of optimal
graph into cycles that start at the charging station. Based transport theory. In [237], the authors present a UAV enabled
on this analysis, they then develop an efficient algorithm, data collection system, where a UAV is dispatched to collect a
34
Classification of Deploy-
ment strategies for UAVs
E. Interference Mitigation
Fig. 36: Interference Mitigation Techniques and Challenges. One of the techniques to mitigate interference is the coor-
dinated multipoint technique [241]. In downlink coordinated
multipoint technique, the transmission aerial base stations co-
given amount of data from ground terminals at fixed location. operate in scheduling and transmission in order to strength the
They aim to find the optimal ground terminal transmit power received signal and mitigate inter-cell interference [241]. On
and UAV trajectory that achieve different Pareto optimal en- the other hand, the physical uplink shared channel (PUSCH) is
ergy trade-offs between the ground terminal and the UAV. The received at aerial base stations in uplink coordinated multipoint
authors in [238] study the problem of trajectory planning for technique. The scheduling decision is based on the coordina-
wireless sensor network data collecting deployed in remote ar- tion among UAVs [242]. The new challenge here is that UAVs
eas with a cooperative system of UAVs. The missions are given receive interfering signals from more ground terminals in the
by a set of ground points which define wireless sensor network downlink and their uplink transmitted signals are visible to
gathering zones and each UAV should pass through them to more ground terminals due to the high probability of line of
gather the data while avoiding passing over forbidden areas sight links. Therefore, the coordinated multipoint techniques
and collisions between UAVs. The proposed UAV trajectory must be applied across a larger set of cells to mitigate
planners are based on Genetics Algorithm, Rapidly-exploring the interference and hence the coordination complexity will
Random Trees and Optimal Rapidly-exploring Random Trees. increase [243].
The authors in [239] design a basic framework for aerial We can also mitigate interference by utilizing receiver tech-
data collection, which includes the following five components: niques such as interference rejection combining and network-
deployment of networks, nodes positioning, anchor points assisted interference cancellation and suppression. Compared
searching, fast path planning for UAV, and data collection from to smart phones, we can equip UAVs with more anten-
network. They identify the key challenges in each component nas, which can be used to mitigate interference from more
and propose efficient solutions. They propose a Fast Path ground base stations. With MIMO antennas, UAVs can use
Planning with Rules algorithm based on grid division, to beamforming to enables directional signal transmission or
increase the efficiency of path planning, while guaranteeing the reception to achieve spatial selectivity which is also an efficient
length of the path to be relatively short. In [240], the authors interference mitigation technique [243].
jointly optimize the sensor nodes wake-up schedule and UAVs Another interference mitigation technique is to partition ra-
trajectory to minimize the maximum energy consumption of dio resources so that ground traffic and aerial traffic are served
all sensor nodes, while ensuring that the required amount with orthogonal radio resources. This simple technique may
of data is collected reliably from each sensor node. They not be efficient since the reserved radio resources for aerial
formulate a mixed-integer non-convex optimization problem traffic may be not fully utilized. Therefore, UAV operators
and apply the successive convex optimization technique, an need to provide more information about the trajectories and 3D
35
TABLE XV: COMPARISON AMONG RESEARCH PAPERS RELATED TO UAV DEPLOYMENT STRATEGIES BASED ON OBJECTIVE FUNCTIONS
Reference Number of UAVs Type of environment Type of antenna Operating frequency Objective function Deployment strategy
[220] Multiple UAVs Outdoor Omni-directional 2 GHz Minimizing the transmit power Optimal transport theory
of UAVs
[215] Single UAV Outdoor Directional 2 GHz Minimizing the transmit power Closed-form expression
of UAV for the UAV placement
[216] Single UAV Indoor Omni-directional 2 GHz Minimizing the transmit power Gradient descent
of UAV algorithm
[221] Single UAV Indoor Omni-directional 2 GHz Minimizing the transmit power Particle swarm
of UAV optimization
[222] Single UAV Outdoor-Indoor Omni-directional 2 GHz Minimizing the transmit power Particle swarm
of UAV optimization, K-means
with ternary search
algorithms
[223] Single UAV Outdoor Directional 2 GHz Minimizing the transmit power Optimal 3D placement
of UAV algorithm
[224] Single UAV Outdoor Directional 2 GHz Minimizing the transmit power Disk covering problem
of UAV
[209] Single UAV Outdoor Directional 2.5 GHz Maximizing the wireless coverage Bisection search
of UAV algorithm
[225] Multiple UAVs Outdoor Directional 2 GHz Maximizing the wireless coverage Circle packing
of UAVs theory
[226] Single UAV Outdoor Directional 2 GHz Maximizing the wireless coverage branch and
of UAV bound algorithm
[227] Single UAV Outdoor Directional 2 GHz Maximizing the wireless coverage exhaustive search
of UAV algorithm
[228] Multiple UAVs Indoor Directional 2 GHz Maximizing the wireless coverage efficient algorithm
of UAVs
[229] Multiple UAVs Outdoor Directional 2 GHz Maximizing the wireless coverage branch and
of UAVs bound algorithm
[230] Multiple UAVs Outdoor Directional 2 GHz Maximizing the wireless coverage Optimal transport
of UAVs theory, Gradient
algorithm
[231] Multiple UAVs Outdoor Directional 2 GHz Minimizing the number Particle swarm
of UAVs optimization
[232] Multiple UAVs Outdoor Directional 2 GHz Minimizing the number The cycles with limited
of UAVs energy algorithm
[233] Multiple UAVs Indoor Omni-directional 2 GHz Minimizing the number Particle swarm
of UAVs optimization, K-means
algorithms
[234] Multiple UAVs Outdoor Directional 2 GHz Minimizing the number polynomial time
of UAVs approximate algorithm
[235] Multiple UAVs Outdoor Directional 2 GHz Minimizing the number Spiral UAVs
of UAVs placement algorithm
[236] Multiple UAVs Outdoor Directional 2 GHz Collecting data using Optimal transport
UAVs theory
[237] Single UAV Outdoor Directional 2 GHz Collecting data using Two practical
UAV UAV trajectories:
circular and
straight flights
[238] Multiple UAVs Outdoor Directional 2 GHz Collecting data using Genetics
UAVs algorithm
[239] Multiple UAVs Outdoor directional 2 GHz Collecting data using efficient algorithm
UAVs for path planning
[240] Single UAV Outdoor Directional 2 GHz Collecting data using efficient iterative
UAVs algorithm
36
placements of UAVs to construct more dynamic radio resource also be utilized in fault/intrusion detections and for the users
management [243]. behavior-classification. The family of reinforcement learning
A powerful interference mitigation technique is the power algorithms utilizes dynamic iterative learning and decision-
control technique in which an optimized setting of power making process. They can be used for estimating the mobile
control parameters can be applied to reduce the interference users decision making under unknown scenarios, such as
generated by UAVs. This technique can minimize interference, channel access under unknown channel availability conditions
increase spectral efficiency, and benefit UAVs as well as in spectrum sharing, base station association under the un-
ground terminals [243]. known energy status of the base stations in energy harvesting
Dedicated cells for the UAVs is another option to mitigate networks, and distributed resource allocation under unknown
interference, where the directional antennas are pointed to- resource quality conditions in femto/small-cell networks [259].
wards the sky instead of down-tilted. These dedicated cells 3) Network Functions Virtualization: Network functions
will be a practical solution especially in UAV hotspots where virtualization (NFV) reduces the need of deploying specific
frequent and dense UAV takeoffs and landings occur [243]. network devices for the integration of UAVs [256], [257]. NFV
In Figure 36, we summarize the interference mitigation tech- allows a programmable network structure by virtualizing the
niques and challenges. network functions on storage devices, servers, and switches,
which is practical for UAVs requiring seamless integration
to the existing network. Moreover, virtualization of UAVs
F. Research Trends and Future Insights as shared resources among cellular virtual network operators
1) Cloud and Big Data: A cloud for UAVs contains data can decrease OPEX for each party [260]. Here, the SDN can
storage and high-performance computing, combined with big be useful for the complicated control and interconnection of
data analysis tools [256]. It can provide an economic and virtual network functions (VNFs) [256], [257].
efficient use of centralized resources for decision making and 4) Software Defined Networking: For mobile networks, a
network-wide monitoring [256]–[258]. If UAVs are utilized centralized SDN controller can make a more efficient allo-
by a traditional cellular network operator (CNO), the cloud is cation of radio resources, which is particularly important to
just the data center of the CNO (similar to a private cloud), exploit UAVs [256], [257]. For instance, SDN-based load
where the CNO can choose to share its knowledge with some balancing can be useful for multi-tier UAV networks, such
other CNOs or utilize it for its own business uses. On the that the load of each aerial base station and terrestrial base
other hand, if the UAVs are utilized by an infrastructure station is optimized precisely. A SDN controller can also
provider, the infrastructure provider can utilize the cloud to update routing such that part of traffic from the UAVs is carried
gather information from mobile virtual network operators and through the network without any network congestions [256]–
service providers. Under such scenario, it is important to [258]. For further exploitation of the new degree of freedom
guarantee security, privacy, and latency. To better exploit the provided by the mobility of UAVs, the 3D placements of UAVs
benefit of the cloud, we can use a programmable network can be adjusted to optimize paging and polling, and location
allowing dynamic updates based on big data processing, for management parameters can be updated dynamically via the
which network functions virtualization and software defined unified protocols of SDN [256].
networking can be research trends [256]. 5) Millimeter-Wave: Millimeter-wave (mmWave) technol-
2) Machine Learning: Next-generation aerial base stations ogy can be utilized to provide high data rate wireless com-
are expected to learn the diverse characteristics of users behav- munications for UAV networks [261]. The main difference
ior, in order to autonomously find the optimal system settings. between utilizing mmWave in UAV aerial networks and uti-
These intelligent UAVs have to use sophisticated learning and lizing mmWave in terrestrial cellular networks is that a UAV
decision-making, one promising solution is to utilize machine aerial base station may move around. Hence, the challenges of
learning. Machine learning algorithms can be simply classi- mmWave in terrestrial cellular networks apply to the mmWave
fied as supervised, unsupervised and reinforcement learning UAV cellular network as well, including rapid channel varia-
as shown in Table XVI. The family of supervised learning tion, blockage, range and directional communications, multi-
algorithms utilizes known models and labels to enable the esti- user access, and others [261], [262]. Compared to mmWave
mation of unknown parameters. They can be used for spectrum communications for static stations, the time constraint for
sensing and white space detection in cognitive radio, massive beamforming training is more critical due to UAV mobility.
MIMO channel estimation and data detection, as well as for For fast beamforming training and tracking in mmWave UAV
adaptive filtering in signal processing for 5G communications. cellular networks, the hierarchical beamforming codebook is
They can also be utilized in higher-layer applications, such as able to create highly directional beam patterns, and achieves
estimating the mobile users locations and behaviors, which can excellent beam detection performance [261]. Although the
help the UAV operators to enhance the quality of their services. UAV wireless channels have high Doppler frequencies due to
The family of unsupervised learning algorithms utilizes the the continuous movements of UAVs with different velocities,
input data itself in a heuristic manner. They can be used for the major multipath components are only affected by slow
heterogeneous base station clustering in wireless networks, variations due to high gain directional transmissions. In beam
for access point association in ubiquitous WiFi networks, for division multiple access (BDMA), multiple users with different
cell clustering in cooperative ultra-dense small-cell networks, beams may access the channel at the same time due to the
and for load-balancing in heterogeneous networks. They can highly directional transmissions of mmWave [261]–[263]. This
37
technique improves the capacity significantly, due to the large coverage problems by utilizing UAVs.
bandwidth of mmWave technology and the use of BDMA in • The majority of literature does not consider the limited
the spatial domain. The blockage problem can be mitigated energy capacity of UAV as a constraint when they study
by utilizing intelligent cruising algorithms that enable UAVs the wireless coverage of UAVs, where the energy con-
to fly out of a blockage zone and enhance the probability of sumption during data transmission and reception is much
line of sight links [261]. smaller than the energy consumption during the UAV
6) Free Space Optical: Free space optical (FSO) technol- hovering. It only constitutes 10%-20% of the UAV energy
ogy can be used to provide wireless connectivity to remote capacity [2].
places by utilizing UAVs, where physical access to 3G or • Some path loss models are based on simulations soft-
4G network is either minimal or never present [76]. It can wares such as Air-to-Ground path loss for low altitude
be involved in the integration of ground and aerial networks platforms and Air-to-Ground path loss for high altitude
with the help of UAVs by providing last mile wireless cover- platforms, therefore it is necessary to do real experiments
age to sensitive areas (e.g., battlefields, disaster relief, etc.) to model the statistical behavior of the path loss.
where high bandwidth and accessibility are required. For • To the best of our knowledge, no studies present the path
instance, Facebook will provide wireless connectivity via FSO loss models for uplink scenario and mmWave bands.
links to remote areas by utilizing solar-powered high altitude • There are challenges facing the new technologies such
UAVs [76], [264], [265]. For areas where deployment of UAVs as mmwave. The challenges facing UAV-mmWave tech-
is impractical or uneconomical, geostationary earth orbit and nology are fast beamforming training and tracking re-
low earth orbit satellites can be utilized to provide wireless quirement, rapid channel variation, directional and range
connectivity to the ground users using the FSO links. The communications, blockage and multi-user access [261].
main challenge facing UAV-free space optics technology is • We need more studies about the topology of UAV wire-
the high blockage probability of the vertical FSO link due less networks where this topology remains fluid during: a)
to weather conditions. The authors in [214] propose some Changing the number of UAVs; b) Changing the number
methods to tackle this problem. The first method is to use an of channels; c) The relative placements of the UAVs
adaptive algorithm that controls the transmit power according altering [2].
to weather conditions and it may also adjust other system • There is a need to study UAV routing protocols where
parameters such as incident angle of the FSO transceiver it is difficult to construct a simple implementation for
to compensate the link degradation, e.g., under bad weather proactive or reactive schemes [2].
conditions, high power vertical FSO beams should be used • There is a need for a seamless mechanism to transfer the
while low power beams could be used under good weather users during the handoff process between UAVs, when
conditions. The second method is to use a system optimization out of service UAVs are replaced by active ones [2].
algorithm that can optimize the UAV placement, e.g., hovering • Further research is required to determine which technol-
below clouds over negligible turbulence geographical area. ogy is right for UAV applications, where the common
7) Future Insights: Some of the future possible directions technologies utilized in UAV applications are the IEEE
for this research are: 802.11 due to wide availability in current wireless devices
• The majority of literature focuses on providing the wire- and their appropriateness for small-scale UAVs [1].
less coverage for outdoor ground users, although 90% • D2D communications is an efficient technique to improve
of the time people are indoor and 80% of the mobile the capacity in ground communications systems [269].
Internet access traffic also happens indoors [266]–[268]. An important problem for future research is the joint
Therefore, it is important to study the indoor wireless optimization of the UAV path planning, coding, node
38
clustering, as well as D2D file sharing [8]. algorithms. The use of UAVs in long time and enduring
• Utilizing UAVs in public safety communications needs missions makes UAV battery swapping solutions necessary to
further research, where topology formation, cooperation accomplish these missions. An autonomous battery swapping
between UAVs in a multi-UAV network, energy con- system for UAVs is first introduced in [272]. The battery
straints, and mobility model are the challenges that are swapping consists of landing platform, battery charger, battery
facing UAVs in public safety communications [9]. storage compartment, and micro-controller. Similar concept to
• In UAVs-based IoT services, it is difficult to control and this autonomous battery swapping system was adopted and im-
manage a high number of UAVs. The reason is that proved by different researchers in [273]–[276]. The hot swap
each UAV may host more than one IoT device, such as term is adopted to refer to the continuous powering for the
different types of cameras and aerial sensors. Moreover, UAV during battery swapping. Figure 37 shows an illustration
conflict of interest between different devices likely to of hot swapping systems. First, the UAV is connected to an
happen many times, e.g., taking two videos from two external power supply during the swapping process. This will
different angles from one fixed placement. For future prevent data loss during swapping as it usually happens in
research, we need to propose efficient algorithms to solve cold swapping. Second, the drained battery is removed and
the conflict of interest among Internet of things devices stored in multi-battery compartment and charging station to
on-board [3]. be recharged. Third, a charged battery is installed in the UAV,
• For future research, it is important to propose efficient and finally, the external power supply is disconnected. Another
techniques that manage and control the power consump- important aspect of the improvements presented in [273]–
tion of Internet of things devices on-board [3]. [276] is the several designs for the landing platform, which
• The security is one of the most critical issues to think is an important part of the swapping system because it can
about in UAVs-based Internet of things services, methods compensate the error in the UAV positioning on the landing
to avoid the aerial jammer on the communications are point. Table XVII shows the classification of autonomous
needed [3]. battery swapping systems. It can be seen from this table
that the swapping time for most of these systems is around
PART III: K EY C HALLENGES AND C ONCLUSION one minute. This is a short period comparing to the battery
charging average time, which is between 45-60 minutes.
XII. K EY C HALLENGES
A. Charging Challenges
UAV missions necessitate an effective energy management
for battery-powered UAVs. Reliable, continuous, and smart
management can help UAVs to achieve their missions and
prevent loss and damage. The UAV’s battery capacity is
a key factor for enabling persistent missions. But as the
battery capacity increases, its weight increases, which cause
the UAV to consume more energy for a given mission. The
main directions in the literature to mitigate the limitations
in UAV’s batteries are: (1) UAV battery management, (2)
Wireless charging for UAVs, (3) Solar powered UAVs, and
(4) Machine learning and communications techniques.
1) Battery Management: Battery management research in
UAVs includes planning, scheduling, and replacement of bat-
tery so UAVs can accomplish their flight missions. This has
been studied in the literature from different perspectives. Saha
et al. in [270] build a model to predict the end of battery Fig. 37: Illustration of Battery Hot Swapping System.
charge for UAVs based on particle filter algorithm. They utilize
a discharge curve for UAV Li-Po battery to tune the particle 2) Wireless Charging For UAV: Simic et. Al in [277]
filter. They have shown that the depletion of the battery is study the feasibility of recharging the UAV from power lines
not only related to the initial Start of Charge (SOC) but while inspecting these power lines. Experimental tests show
also, load profile and battery health conditions can be crucial the possibility of energy harvesting from power lines. The
factors. Park et al. in [271] investigate the battery assignment authors design a circular antenna to harvest the required
and scheduling for UAVs used in delivery business. Their energy from power lines. Wang et al. in [278] propose an
objective is to minimize the deterioration in battery health. automatic charging system for the UAV. The system uses
After splitting the problem into two parts; one for battery charging stations allocated along the path of UAV mission.
assignment and the other for battery scheduling. Heuristic Each charging station consists of wireless charging pad, solar
algorithm and integer linear programming are used to solve panel, battery, and power converter. All these components
the assignment and scheduling problems, respectively. The are mounted on a pole. The UAV employs GPS module
idle time between two successive charging cycles and the and wireless network module to navigate to the autonomous
depth of the discharge are the main factors that control these charging station. When the power level in the UAV’s battery
39
Ref # /Year UAV Type Battery Type Positioning System Swapping time Hot vs Cold Swapping
[272]/2010 Quadrotor Li-Po V-Shape Basket 2 min. Cold swap
[273]/2011 Quadrotor Li-Po Sloped landing pad 11.83 sec. Hot swaps
[274]/2012 Quadrotor Li-Po Dynamic forced positioning (Arm Actuation) 47-60 sec. Cold swap
[276]/2015 Quadrotor Li-Po Sloped landing pad 60-70 sec. Hot swaps
[275]/2015 Quadrotor Li-Po Rack with landing guide 60 sec. Hot swaps
drops to a predefined level. The UAV will communicate with and metrological data [291], [292]. On the other hand, Hybrid
the central control room, which will direct the UAV to the models include: (i) UAVs with hybrid power sources such as
closest charging station. The GPS module will help the UAV solar, battery, and fuel cells [293] and (ii) UAVs with a hybrid
to navigate to the assigned station. Different wireless power propulsion system that can be transformed from fixed wing to
transfer technologies were used in literature to implement the quadcopter UAV [294], [295].
automatic charging stations. In [279]–[281], the authors utilize 4) Machine Learning and Communications Techniques:
the magnetic resonance coupling technology to implement Communication equipment and their status (transmit, receive,
an automatic drone charging station. Dunbar et al. in [282] sleep, or idle) can affect drone flight time. Utilizing the state-
use RF Far field Wireless Power Transfer (WPT) to recharge of-the-art machine learning techniques can result in smarter
micro UAV after landing. A flexible rectenna was mounted energy management. These technologies and their role in UAV
on the body of the UAV to receive RF signals from power persistent missions are covered in the literature under the
transmitter. Mostafa et al. in [283] develop a WPT charging following themes:
system based on the capacitive coupling technology. One of • Energy efficient UAV networks: This area covers maxi-
the major challenges that face the deployment of autonomous mizing energy efficiency in the network layer, data link
wireless charging stations is the precise landing of the UAV layer, physical layer, and cross-layer protocols in a bid
on the charging pad. The imprecise landing will lead to to help UAVs to perform long missions. Gupta et al. in
imperfect alignment between the power transmitter and the [296] list and compare several algorithms used in each
power receiver, which means less efficiency and long charging layer.
time. Table XVIII shows precise methodologies adopted in • Energy-based UAV fleet management: This includes mod-
the literature. In [278], the authors use GPS to land the UAV ifying the mobility model of UAV fleet to incorporate
on the charging pad. In [284], the authors corporate the GPS energy as decision criterion as in [297] to determine the
system with camera and image processing system to detect next move of each UAV inside a fleet.
the charging station. The authors in [280] allow for imprecise • Machine learning: This area covers research that utilizes
landing on wide frame landing pad. Then a wireless charging machine learning techniques for path planning and op-
transmitting coil is stationed perfectly in the bottom of the timization applications, taking into consideration energy
UAV by using a stepper motor and two laser distance sensors. limitations. Zhang et al. in [298] use deep reinforcement
learning to determine the fastest path to a charging
TABLE XVIII: CLASSIFICATION OF PRECISE LANDING METHODOLOGIES station. While Choi et al. in [299] use a density-based
Ref # /Year Precise Landing Methodology spatial clustering algorithm to build a two-layer obstacle
[278]/2016 GPS system collision avoidance system.
[280]/2017 Landing frame with moving transmitting coil
[284]/2017 GPS system and vision-based target detection Several challenges still exist in the area of battery recharging
and need to be appropriately addressed, including:
3) Solar Powered UAVs: For long endurance and high • Advancements in wireless charging techniques such as
altitude flights, solar-powered UAVs (SUAVs) can be a great magnetic resonant coupling and inductive coupling tech-
choice. These UAVs use solar power as a primary source for niques are popular and suitable to be used because both
propulsion and battery as a secondary source to be used during of them have acceptable efficiency for small to mid-
night and sun absence conditions. The literature in flight range distances. The advancements in this technology are
endurance and persistent missions for SUAVs can be classified expected to have a positive impact on the use of UAVs.
into two main directions: path planning and optimization and • Development of battery technologies will allow UAVs
hybrid Models. Path planning and optimization includes: (i) to extend flight ranges. While Lithium-Ion batteries still
gravitational potential energy planning. This scheme optimizes dominant, PEM Fuel cells can be more convenient in
the path of the UAV over three stages, ascending and battery UAVs because of their higher power density.
charging stage during the day using solar power, descending • Motion planning of UAVs is an extremely important
stage during the night using gravitational potential energy, and factor since it affects the wireless charging efficiency and
level flight stage using battery [285]–[287], (ii) optimal path the average power delivered .
planing while tracking ground object [288], [289], (iii) optimal • The vast majority of the research, concerning UAV power
path planning based on UAV kinematics and its energy loss management, focuses on multi-rotor UAVs. Other types
model [290], and (iv) optimal path planning utilizing wind of UAVs, such as fixed-wing UAVs, need more attention
40
in future research. as a weighted graph [59]. The grid with graph search
• Artificial intelligence, especially deep learning, can pro- algorithm are used to find collision free trajectory towards
mote more advances in the field of UAV power manage- the desired target.
ment. Many research frontiers still need to be explored in • Potential Field Approach is proposed by [303] to be used
this field such as; Deep reinforcement learning in the path as a collision avoidance method for ground robots. It has
planning and battery scheduling, convolutional neural net- also been utilized for collision avoidance among UAVs
works in identifying charge stations and precise landing and obstacles. This method uses the repulsive force fields
in a charging station, and recurrent neural networks in which cause the UAV to be repelled by obstacles. The
developing discharge models and precisely predicting the potential function is divided into attracting force field
end of the charge. which pulls the UAV towards the goal, and repulsive force
• Image processing techniques and smart sensors can also field which is assigned with the obstacle [302].
play an important role in identifying charging stations • Vision-based obstacle detection approaches utilize images
and facilitating precise positioning of UAVs on them. from small cameras mounted on UAVs to tackle collision
challenges. Advances in integrated circuits technology
have enabled the design of small and low power sensors
B. Collision Avoidance and Swarming Challenges
and cameras. Combined with advances in computer vision
One of the challenges facing UAVs is collision avoidance. methods, such camera can be used in effective obstacle
UAV can collide with obstacles, which can either be moving detection and collision avoidance [304]. Moreover, this
or stationary objects in either indoor or outdoor environment. approach can be used efficiently for collision avoidance
During UAV flights, it is important to avoid accidents with in the indoor environment. Such cameras provide real-
these obstacles. Therefore, the development of UAV collision time information about walls and obstacles in this envi-
avoidance techniques has gained research interest [60], [300]. ronment. Many researchers utilized this method to avoid
In this section, we first present the major categories of colli- a collision and to provide fully autonomous UAV flights
sion avoidance methods. Then, the challenges associated with [310]–[313]. The researchers in [311] use a monocu-
UAVs collision avoidance are presented. Moreover, we provide lar camera with forward facing to generate collision-
research trends and some future insights. free trajectory. In this method, all computations were
1) Collision Avoidance Approaches: Many collision avoid- performed off-board the UAV. To solve the off-board
ance approaches have been proposed in order to avoid potential image processing problem, the authors in [314] proposed
collisions by UAVs. The authors in [60] presented major a collision avoidance system for UAVs with visual-based
categories of collision avoidance methods. These methods can detection. The image processing operation was performed
be summarized as geometric approaches [301], path planning using two cameras and a small on-board computation
approaches [59], potential field approaches [302], [303], and unit.
vision-based approaches [304]. Several collision avoidance
techniques can be utilized for an indoor environment such 2) Challenges: There are several challenges in the area of
as vision based methods (using cameras and optical sensors), collision avoidance approaches and need to be appropriately
on-board sensors based methods (using IR, ultrasonic, laser addressed, including:
scanner, etc.) and vision based combined with sensor based • The geometric approach utilizes the information such
methods [305]. The collision avoidance approaches are dis- as location and velocity, which can be obtained us-
cussed in the following: ing Automatic Dependent Surveillance Broadcast (ADS-
• Geometric Approach is a method that utilizes the geo- B) sensing method. Thus, it is not applicable to non-
metric analysis to avoid the collision. In [301], the geo- aircraft obstacles. Furthermore, input data from ADS-B
metric approach was utilized to ensure that the predefined is sensitive to noise which hinders the exact calculation
minimum separation distance was not violated. This was requirement of this approach. Moreover, ADS-B requires
done by computing the distance between two UAVs and cooperation from another aircraft, which can be an in-
the time required for the collision to occur. Moreover, it truder, which is referred to as cooperative sensing.
was used for path planning to avoid UAV collisions with • In non-cooperative sensing, the geometric approach re-
obstacles. Several different approaches utilize this method quires UAVs to sense and extract information about the
to avoid collision such as Point of Closest Approach environment and obstacles such as position, speed and
[301], Collision Cone Approach [302], [306], and Dubins size of the obstacles. One of the possible solutions is
Paths Approach [307], [308]. to combine with a vision-based approach that uses a
• Path Planning Approach, which is also referred to as passive device to detect obstacles. However, this approach
the optimized trajectory approach [309], is a grid based requires significant data processing and only can be used
method that utilizes the path re-planning algorithm with when the objects are close enough. Therefore, hardware
graph search algorithm to find a collision free trajectory limitation for on-board processing should be taken into
during the flight. It uses geometric techniques to find an consideration.
efficient and collision free trajectory, so it shares some • The diverse robotic control problem that allows UAV
similarities with the geometric approach. This method to perform complex maneuvers without collision can be
divides the map into a grid and represents the grid solved using the standard control theory. However, each
41
solution is limited to a specific case and not able to adapt collisions in all directions [318].
to changes in the environments. This limitation can be • UAV control algorithms can be developed for autonomous
overcome by learning from experience. This approach can hovering without collision, and to ensure the completion
be achieved using deep learning technique. More specif- of their mission successfully.
ically, deep learning allows inferring complex behaviors • Standardization rules and regulations for UAVs are highly
from raw observation data. However, this approach has needed around the world to regulate their operations, to
issues with samples efficiency. For real time application, reduce the likelihood of collision among UAVs, and to
deep learning requires the usage of on-board GPUs. In guarantee safe hovering [320], [321].
[58], a review of deep learning methods and applications • Under the deep learning techniques with Model Pre-
for UAVs were presented. dictive Controllers (MPC), further work can be done
• In the context of multi-UAV systems, the collision avoid- on developing methods to generate guiding samples for
ance among UAVs is a very complicated task, a technique more superior obstacle avoidance. The main concern in
known as formation control can be used for obstacle the deploying deep learning models is the processing
avoidance. More specifically, cooperative formation con- requirement. Therefore, hardware limitation for on-board
trol algorithms were developed as a collision-avoidance processing should be taken into consideration.
strategy for the multiple UAVs [315], [316]. A recent • More studies are required to improve indoor and out-
advancement in this area employs Model Predictive Con- door collision avoidance algorithms in order to compute
trollers (MPC) in order to reduce computation time for smoother collision free paths, and to evaluate optimized
the optimization of UAV’s trajectory. trajectory in terms of aspects such as energy consumption
• The limited available power and payload of UAVs are [314].
challenging issues, which restrict on-board sensors re- • On-board processing is required for many UAV opera-
quirements such as sensor weight, size and required tions, such as dynamic sense and avoid algorithms, path
power. These sensors such as IR, Ultrasonic, laser scan- re-planning algorithms and image processing. Design
ner, LADAR and RADAR are typically heavy and large on-board powerful processor devices with low power
for sUAV [317]. consumption is an active area for future researches [58].
• The high speed of UAVs is another challenge. With speed
ranges between 35 and 70 Km/h, obstacle avoidance
C. Networking Challenges
approach must be executed quickly to avoid the collision
[317]. Fluid topology and rapid changes of links among UAVs are
• The use of UAVs in an indoor environment is a challeng- the main characteristics of multi-UAV networks or FANET
ing task and it needs higher requirements than outdoor [2]. A UAV in FANET is a node flying in the sky with 3D
environment. It is very difficult to use GPS for avoiding mobility and speed between 30 to 460 km/h. This high speed
collisions in an indoor environment, usually indoor is a causes a rapid change in the link quality between a UAV
GPS denied environment. Moreover, RF signals cannot be and other nodes, which introduces different design challenges
used in this environment, RF signals could be reflected, to the communications protocols. Therefore, FANET needs
and degraded by the indoor obstacles and walls. new communication protocols to fulfill the communication
• Vision-based collision avoidance methods using cameras requirements of Multi-UAV systems [322].
suffer from heavy computational operations for image 1) FANET Challenges:
processing. Moreover, these cameras and optical sensors • One of the challenging issues in FANET is to provide
are light sensitive (need sufficient lighting to work prop- wireless communications for UAVs, (wireless commu-
erly), so steam and smoke could cause the collision avoid- nications between UAV-GCS, UAV-satellite, and UAV-
ance system to fail. Therefore, sensor based collision UAV). More specifically, coordination, cooperation, rout-
avoidance methods can be used to tackle these problems ing and communication protocols for the UAVs are chal-
[318], [319]. lenging tasks due to the frequent connections interruption,
• Some of the vision based collision avoidance approaches fluid network topology, and limited energy resources of
use a monocular camera with forward facing to generate UAVs. Therefore, FANET requires some special hardware
collision free trajectory. In this method, all computations and a new networking model to address these challenges
are performed off-board, with 30 frames per second [3], [323].
which are sent in real time over Wi-Fi network to perform • The UAV power constraints limit the computation, com-
image processing at a remote base station. This makes munication, and endurance capabilities of UAVs. Energy-
UAV sensing and avoiding obstacles a challenging task aware deployment of UAVs with Low power and Lossy
[311] Networks (LLT) approach can be efficiently used to
handle this challenge [8], [324].
3) Future Insights: Based on the reviewed literature of
• FANET is a challenging environment for resources man-
collision avoidance challenges, we suggest these possible
agement in view of the special characteristics of this
future directions:
network. The challenge is the complexity of network
• UAVs could be integrated with vision sensors, laser range management, such as the configuration difficulties of the
finder sensors, IR, and/or ultrasound sensors to avoid hardware components of this network [325]. Software-
42
Defined Networking (SDN) and Network Function Vir- The research in [256], proposed drone-cell management
tualization (NFV) are useful approaches to tackle this framework (DMF) using UAVs act as aerial base stations with
challenge [326]. a multi-tier drone-cell network to complement the terrestrial
• Setting up an ad-hoc network among nodes of UAVs is a cellular network based on NFV and SDN paradigms. In [341],
challenging task for FANET, due to the high node mobil- the authors proposed a video monitoring platform as a service
ity, large distance between nodes, fluid network topology, (VMPaaS) using swarm of UAVs that form a FANET in
link delays and high channel error rates. Therefore, rural areas. This platform utilizes the recent NFV and SDN
transmitted data across these channels could be lost or paradigms.
delayed. Here the loss is usually caused by disconnections Due to the complexity of the interconnections and controls
and rapid changes in links among UAVs. Delay-Tolerant in NFV, SDN can be consolidated with NFV as a useful
Networking (DTN) architecture was introduced to be approach to address this challenge.
used in FANET to address this challenge [327], [328]. c) Software-Defined Networking (SDN): SDN is a promis-
2) UAV New Networking Trends: ing network architecture, which provides a separation between
a) Delay-Tolerant Networking (DTN): The DTN architec- control plane and data plane. It can also provide a centralized
ture was designed to handle challenges facing the dynamic network programmability with global view to control network.
environments as in FANET. [329]. In FANET, DTN approach Benefiting from the centralized controller in SDN, the original
based on store-carry-forward model can be utilized to tackle network switches could be replaced by uniform SDN switches
the long delay for packets delivery. In this model, a UAV can [342]. Therefore, the deployment and management of new
store, carry and forward messages from source to destination applications and services become much easier. Moreover, the
with long term data storage and forwarding functions in order network management, programmability and reconfiguration
to compensate intermittent connectivity of links [330], [331]. can be greatly simplified [343].
DTN can be used with a set of protocols operating at FANET can utilize SDN to address its environment’s chal-
MAC, transport and application layers to provide reliable lenges and performance issues, such as dynamic and rapid
data transport functions, such as Bundle Protocol (BP) [332], topology changes, link intermittent between nodes; when UAV
Licklider Transmission Protocol (LTP) [333] and Consultative goes out of service due to coverage problems or for battery
Committee for Space Data Systems (CCSD) File Delivery recharging. SDN also can help to address the complexity of
Protocol (CFDP) [334]. These protocols use store, carry and network management [2].
forward model, so UAV node keeps a copy for each sent OpenFlow is one of the most common SDN protocols,
packet until it receives acknowledgment from the next node used to implement SDN architecture and it separates the
to confirm that the packet has been received successfully. network control and data planes functionalities. OpenFlow
BP and LTP are protocols developed to cope with FANET switch consists of flow Table, OpenFlow Protocol and a
challenges and solve the performance problems for FANET. Secure Channel [344]. UAVs in FANETs can carry OpenFlow
The BP, forms a store, carry and forward overlay networks, to Switches. The SDN control plane could be centralized (one
handle message transmissions, receptions and re-transmissions centralized SDN controller), decentralized (the SDN controller
using a convergence layer protocol (CLP) services [332], [335] is distributed over all UAV nodes), or hybrid in which the
with the underlying transport protocols such as TCP-based processing control of the forwarded packets can be performed
[336], UDP-based [337] or LTP-based [333]. The CFDP was locally on each UAV node and control traffic also exists
designed for file transfer from source to destination based on between the centralized SDN controller and all other SDN
store, carry and forward approach for DTN paradigm. It can elements [2].
be run over either reliable or unreliable service mode using The controller collects network statistics from OpenFlow
transport layer protocols (TCP or UDP) [338]. switches, and it also needs to know the latest topology of
A routing strategy that combines DTN routing protocols in the UAVs network. Therefore, it is important to maintain
the sky and the existing Ad-hoc On-demand Distance Vector the connectivity of the SDN controller with the UAV nodes.
(AODV) on the ground for FANETs was proposed in [331]. The centralized SDN controller has a global view of the
In this work, they implement a DTN routing protocol on network. OpenFlow switches contain software flow tables and
the top of traditional and unmodified AODV. They also use protocols to provide a communication between network and
UAV to store, carry and forward the messages from source to control planes, then the controller determines the path and tells
destination. network elements where to forward the packets [344].
b) Network Function Virtualization (VFV): NFV is a new Figure 38 shows separation of control and data planes in
networking architecture concept for network softwarization SDN platform with OpenFlow interface.
and it is used to enable the networking infrastructure to be vir- d) Low power and Lossy Networks (LLT): In FANETs, UAV
tualized. More specifically, an important change in the network nodes are typically characterized by limited resources, such as
functions provisioning approach has been introduced using battery, memory and computational resources. LLN composed
NFV, by leveraging existing IT virtualization technologies, of many embedded devices such as UAVs with limited power,
therefore, network devices, hardware and underlying functions and it can be considered as a promising approach to be used
can be replaced with virtual appliances. NFV can provide in FANET to handle power challenge in UAVs [324], [345].
programming capabilities in FANETs and reduces the network The Internet Engineering Task Force (IETF) has defined
management complexity challenge [339], [340]. routing protocol for LLN known as routing for low-power and
43
D. Security Challenges
Figure 39 illustrates the general architecture of UAV sys-
tems [351], which includes: (1) UAV units; (2) GCSs; (3)
Fig. 38: Control and Data Planes in SDN Platform. satellite (if necessary); and (4) communications links. Various
components of the UAV systems provide a large attack surface
for malicious intruders which brings huge cyber security
lossy network (RPL) [324], this protocol can utilize different
challenges to the UAV systems. In this section, to present a
low power communication technologies, such as low power
comprehensive view of the cyber security challenges of UAV
WiFi, IEEE 802.15.4 [346], which is a standard for low-power
systems, we first summarize the attack vectors of general UAV
and low rate wireless communications and can be used for
systems. Then, based on the attack vectors and the potential ca-
UAV-UAV communications in FANET [347]. The IPv6 over
pabilities of attackers, we classify the cyber attacks/challenges
Low Power Wireless Personal Area Networks (6LoWPAN)
against UAV systems into different categories. More impor-
defines a set of protocols that can be used to integrate
tantly, we present a comprehensive literature review of the
nodes with IPv6 datagrams over constrained networks such
state-of-the-art countermeasures for these security challenges.
as FANET [348].
Finally, based on the reviewed literature, we summarize the
3) Future Insights: Based on the reviewed literature of the
security challenges and provide high level insights on how to
networking challenges and new networking trends of FANET,
approach them.
we suggest these future insights:
1) Attack Vectors in UAV Systems: Based on the architec-
• SDN services can be developed to support FANET func-
ture illustrated in Figure 39, we identify four attack vectors:
tions, such as surveillance, safety and security services.
• Further studies are needed to study the SDN deployment
• Communications links: various attacks could be applied
in FANET with high reliability, reachability and fast to the communications links between different entities
mobility of UAV nodes [349] of UAV systems, such as eavesdropping and session
• More research is needed to develope specific security
hijacking.
protocols for FANETs based on the SDN paradigm. • UAVs themselves: direct attacks on UAVs can cause
• More studies are needed to replace the conventional net-
serious damage to the system. Examples of such attacks
work devices by fully decoupled SDN switching devices, are signal spoofing and identity hacking.
in which the control plane is completely decoupled from • GCSs: attacks on GCSs are more fatal than others because
data plane and the routing protocols can be executed on- they issue commands to actual devices and collect all the
board from SDN switching devices [349]. data from the UAVs they control. Such attacks normally
• For NFV, more research is needed on optimal virtual
involve malwares, viruses and/or key loggers.
network topology, customized end-to-end protocols and • Humans: indirect attacks on human operators can force
dynamic network embedding [343]. wrong/malicious operating commands to be issued to the
• New routing protocols need to be tailored to FANETs
system. This type of attacks is usually enabled with social
to conserve energy, satisfy bandwidth requirement, and engineering techniques.
ensure the quality of service [323]. 2) Taxonomy of Cyber Security Attacks/Challenges Against
• Most of the existing MANET routing protocols partially UAV Systems: Based on the attack vectors and capabilities
fail to provide reliable communications among UAVs. So, of attackers, as well as the work in [351], we classify the
there is a need to design and implement new routing possible attacks against UAV systems into different categories.
protocols and networking models for FANETs [7]. Figure 40 presents a graph that summarizes the proposed
• FANETs share the same wireless communications bands attack taxonomy. This attack model defines three general cyber
with other applications such as satellite communications security challenges for the UAV systems, namely, confidential-
and GSM networks. This leads to frequency conges- ity challenges, integrity challenges, and availability challenges.
tion problems. Therefore, there is a need to standardize Confidentiality refers to protecting information from being
FANET communication bands to mitigate this problem accessed by unauthorized parties. In other words, only the
[2]. people who are authorized to do so can gain access to
• FANETs lack security support. Each UAV in FANET is data. Attackers could compromise the confidentiality of UAV
required to exchange messages and routing information systems by various approaches (e.g., malware, hijacking, social
through wireless links. Therefore, FANETs are vulnerable engineering, etc.) utilizing different attack vector.
44
Security works module: forming different UAV networks; (3) UAV model
library: providing different host functions (e.g., attack
hosts or UAV hosts); (4) Graphical user interface; (5) Re-
A: Specific attacks B: Security framework C: General security sult analysis module; and (6) UAV Module browser. The
development discussion proposed test bed is helpful in analyzing existing attacks
against UAV systems by adjusting different parameters.
However, the proposed attack library only contains two
B-1: Monitoring B-2: Simulation B-3: Anomaly types of attacks for now (i.e., jamming attacks and DoS
systems test beds detection frameworks attacks). Therefore, UAVSim must be enriched with other
Fig. 41: Summary of the Literature of the State-of-the-Art Attacks/Challenges and types of attacks to improve its applicability and usability.
Countermeasures in UAV systems.
The authors in [356] present R2U2, a novel frame-
work for run-time monitoring of security threats and
system behaviors for Unmanned Aerial Systems (UAS).
scheme based on flight patterns fingerprint via statistical Specifically, they extend previous R2U2 from only mon-
measurement of flight data. Firstly, a baseline flight itoring of hardware components to both hardware and
profile is generated. Then, simulated hijacking scenarios software configuration monitoring to achieve security
are compared to the baseline profile to determine the threats diagnostic. Also, the extended version of R2U2
detection result. The proposed scheme is able to detect provides detection of attack patterns (i.e., ill-formatted
all direct hijacking scenarios (i.e., assume a fully compro- and illegal commands, dangerous commands, nonsensical
mised UAV and the flight plan has been altered to some or repeated navigation commands and transients in GPS
random places.). However, temporary control instability signals) rather than component failures. In addition, the
(e.g., short time decreasing of amplitude) caused by the FPGA implementation ensures independent monitoring
attacker cannot be detected. and achieves software re-configurable feature. The ex-
• Challenge of specific attack - Authentication/key manage- tended version of R2U2 is more advanced than the
ment targeted attacks: The authors in [365] first propose a original prototype in terms of attack pattern recognition
communication architecture to integrate LTE technology and secure & independent monitoring. However, the inde-
into integrated CNPC (Control and Non-Payload Com- pendent monitoring system introduces a new security hole
munication) networks. Then, they define several security (i.e., the monitoring system itself) without introducing
requirements of the proposed architecture. Also, they appropriate security mechanism to mitigate it.
modify the authentication, the key agreement and the In the work of [357], the authors present a UAV monitor-
handover key management protocols to make them suit- ing system that captures flight data to perform real-time
able to the integrated architecture. The proposed modified abnormal behavior detection. If an abnormal behavior is
protocol is proved to outperform the LTE counterpart detected, the system will raise an alert. The proposed
protocols via a comparative analysis. In addition, it monitoring system includes the following features:
introduces almost the same amount of communications
overhead. – A specification language for UAV in-flight behavior
• Challenge of security framework development: In [353], modeling;
the authors introduce UAVSim, a simulation testbed for – An algorithm to covert a given flight plan into a
Unmanned Aerial Vehicle Networks cyber security analy- behavioral flight profile;
sis. The proposed test bed can be used to perform various – A decision algorithm to determine if an actual UAV
experiments by adjusting different parameters of the flight behavior is normal or not based on the behav-
networks, hosts and attacks. The UAVSim consists of five ioral flight profile;
modules: (1) Attack library: generating various attacks – A visualization system for the operator to monitor
(i.e., jamming attacks and DoS attacks); (2) UAV network multiple UAVs.
47
The proposed monitoring system can detect abnormal ysis of a UAV system as described in Figure 39. A cyber
behaviors based on the in flight data. However, attacks security threat model is proposed and analyzed to show
which do not alter in-flight data are not detectable (e.g., existing or possible attacks against UAV systems. This
attacks that only collect flight data). model helps designers and users of UAV systems across
The authors of [359] propose and implement a cyber different aspects, including: (1) understanding threat pro-
security system to protect UAVs from several dangerous files of different UAV systems; (2) addressing various sys-
attacks, such as attacks that target data integrity and tem vulnerabilities; (3) identifying high priority threats;
network availability. The detection of data integrity at- and (4) selecting appropriate mitigation techniques. In
tacks uses Mahalanobis distance method to recognize the addition, a risk evaluation mechanism (i.e., a standard risk
malicious UAV that forwards erroneous data to the base evaluation grid included in the ETSI threat assessment
station. For the availability attacks (i.e., wormhole attack methodology ) is used to assess the risk of different
in this paper), the detection process is summarized as threats in UAV systems. Even though this paper provides
follows: a comprehensive profile of existing or potential attacks
– The UAV relays a packet when it becomes within for UAV systems, the proposed attacks are general/high
the range of the base station. The packet includes: level threats that did not take into consideration hardware
(1) node’s type (source, relay or destination); and (2) and software differences among different UAV systems.
its next (and previous) hops. The survey paper of [189] reviews various aspects of
– The base station collects the forwarded packets from drones (UAVs) in future smart cities, relating to cyber se-
the UAVs, verifies whether the relay node forwards curity, privacy, and public safety. In addition, it also pro-
a packet or not and computes the Message Dropping vides representative results on cyber attacks using UAVs.
Rate (MDR). The studied cyber attacks include de-authentication attack
– The base station will raise an alert if the MDR is and GPS spoofing attack. However, no countermeasures
higher than a false MDR assigned to a normal UAV. are discussed.
The authors in [366] introduce an implementation of
The proposed detection scheme for data integrity attacks
an encrypted Radio Control (RC) link that can be used
and network availability attacks is proved to achieve high
with a number of popular RC transmitters. The proposed
detection accuracy via simulations. The attack model
design uses Galois Embedded Crypto library together
assumes that every UAV node has the detection module
with openLRSng open-source radio project. The key
and the node which is determined as malicious node
exchange algorithm is described below:
would lose the ability to invoke the detection module.
However, there is no co-operation detection algorithm – T X first generates the ephemeral key Ke and , then
provided and only single node detection procedure is encrypts Ke using permanent key Kp and IVrand .
introduced. The encrypted result is mT1 X and sent to RX.
In the work of [363], the authors present an improved – RX decrypts mT1 X with Kp to obtain Ke , then
0 0
mechanism for UAV security testing. The proposed ap- generate Ke and encrypts Ke with Ke and IV0 = 0.
proach uses a behavioral model, an attack model, and The encrypted result is mRX 2 and sent to T X.
a mitigation model to build a security test suite. The – T X decrypts mRX 2 with K e and IV0 = 0 to verify
proposed security testing goes as follows: that RX has a copy of Ke . Then T X sends ACK
0
message encrypted with Ke and IV0 to RX as a
– Model system behavior: associates behavior criteria
confirmation (denoted as mT3 X ).
(BC) with a behavioral model (BM) and build a
– RX receives mT3 X it to verify that T X has a copy
behavioral test (BT). 0
of Ke . Key exchange is then successful.
– Attack type definition: defines attack types (A) with
attack criteria (AC) and determine attack applicabil- The proposed scheme achieves secure communication
ity matrix (AM). link for open source UAV systems. However, the sym-
– Determine security test requirements: determines at metric key is assumed to be generated in a third-party
which point during the operation of a behavioral test trusted computer and hard-coded in the source code,
an attack will occur. which degrades the security guarantees and limits the
– Test generation: a required mitigation process is feasibility of the scheme.
injected. 4) Summarizing of Cyber Security Challenges for UAV
This work provides a systematic approach to identify vul- Systems: Based on the reviewed literature, we summarize
nerabilities in UAV systems and provides corresponding four key findings of the cyber security challenges on UAV
mitigation. However, the proposed mitigation methods are applications:
limited to state roll back or re-executing. In other words, • DoS attacks and hijacking attacks (i.e., for signal spoof-
other prevention or detection methods (e.g., encryption or ing) are the most prevailing threats in the UAV systems:
anomaly detection) cannot be included in the proposed Various DoS attacks have been found and proved to cause
scheme. serious availability issues in UAV systems. In addition,
• Challenges of security analysis works: In the work of signal spoofing via hijacking attacks is able to severely
[351], the authors perform an overall security threat anal- damage the behaviors of certain UAV systems.
48
Possible solution: (1) Strong authentication (e.g., trust Civil infrastructure is expected to dominate the addressable
platform module, Kerberos, etc.); (2) Signal distortion market value of UAV that is forecast to reach $45 Billion in the
detection; and (3) Direction-of-arrival sensing (i.e., trans- next few years. In construction and infrastructure inspection
mitter antenna direction detection). applications, UAVs can be used to monitor real-time construc-
• Existing countermeasure algorithms are limited to single tion project sites. They can also be utilized in power line and
UAV systems: most of the existing schemes are designed gas pipeline inspections. Using UAVs in civil infrastructure
only for single UAV systems. A few of them discuss applications can reduce work-injuries, high inspection costs
multiple UAV scenarios without providing any concrete and time involved with conventional inspection methods.
solutions. In agriculture, UAVs can be efficiently used in irrigation
Possible solution: develop co-operation countermeasure scheduling, plant disease detection, soil texture mapping,
algorithms for multiple UAVs. For example, modify and residue cover and tillage mapping, field tile mapping, crop
adopt existing distributed security frameworks (e.g., Ker- maturity mapping and crop yield mapping. The next generation
beros) to multiple UAVs systems; (2) of UAV sensors can provide on-board image processing and
• Most of the current security analysis of UAV systems in-field analytic capabilities, which can give farmers instant
overlook the hardware/software differences (e.g., different insights in the field, without the need for cellular connectivity
hardware platform, different communication protocols, and cloud connection.
etc.) among various UAV systems: On one hand, some With the rapid demise of snail mail and the massive growth
of the attacks only exist in specific hardware or soft- of e-Commerce, postal companies have been forced to find
ware configuration. On the other hand, most of the new methods to expand beyond their traditional mail delivery
proposed countermeasures are well studied solutions in business models. Different postal companies have undertaken
other communication systems and there could be many various UAV trials to test the feasibility and profitability of
deployment difficulties when applying them on different UAV delivery services. To make UAV delivery practical, more
UAV systems. research is required on UAVs design. UAVs design should
Possible solution: design unified/standard deployment in- cover creating aerial vehicles that can be used in a wide range
terface or language for the diverse UAV systems. of conditions and whose capability rivals that of commercial
• Current UAV simulation test beds are still far from airliners.
mature: Existing emulators for UAV security analysis UAVs have been considered as a novel traffic monitoring
are limited to few attack scenarios and specific hard- technology to collect information about real-time road traffic
ware/software configurations. conditions. Compared to the traditional monitoring devices,
Possible solution: leveraging powerful simulation tools UAVs are cost-effective and can monitor large continuous road
(e.g., Labview) or design customized simulation environ- segments or focus on a specific road segment. However, UAVs
ments. have slower speeds compared to vehicles driving on highways.
A possible solution might entail changing the regulations to
allow UAVs to fly at higher altitudes. Such regulations would
XIII. C ONCLUSION
allow UAVs to benefit from high views to compensate the
The use of UAVs has become ubiquitous in many civil limitation in their speed.
applications. From rush hour delivery services to scanning One potential benefit of UAVs is the capability to fill the
inaccessible areas, UAVs are proving to be critical in situa- gaps in current border surveillance by improving coverage
tions where humans are unable to reach or cannot perform along remote sections of borders. Multi-UAV cooperation
dangerous/risky tasks in a timely and efficient manner. In this brings more benefits than single UAV surveillance, such as
survey, we review UAV civil applications and their challenges. wider surveillance scope, higher error tolerance, and faster
We also discuss current research trends and provide future task completion time. However, multi-UAV surveillance re-
insights for potential UAV uses. quires more advanced data collection, sharing, and processing
In SAR operations, UAVs can provide timely disaster warn- algorithms. To develop more efficient and accurate multi-UAV
ings and assist in speeding up rescue and recovery operations. cooperation algorithms, advanced machine learning algorithms
They can also carry medical supplies to areas that are classified could be utilized to achieve better performance and faster
as inaccessible. Moreover, they can quickly provide coverage response.
of a large area without ever risking the security or safety of the The use of UAVs is rapidly growing in a wide range of
personnel involved. Using UAVs in SAR operations reduces wireless networking applications. UAVs can be used to provide
costs and human lives. wireless coverage during emergency cases where each UAV
In remote sensing, UAVs equipped with sensors can be used serves as an aerial wireless base station when the cellular
as an aerial sensor network for environmental monitoring and network goes down. They can also be used to supplement
disaster management. They can provide numerous datasets to the ground base station in order to provide better coverage
support research teams, serving a broad range of applications and higher data rates. Utilizing UAVs in wireless networks
such as drought monitoring, water quality monitoring, tree needs further research, where topology formation, cooperation
species, disease detection, etc. In risk management, insurance between UAVs in a multi-UAV network, energy constraints,
companies can utilize UAVs to generate NDVI maps in order and mobility model are challenges facing UAVs in wireless
to have an overview of the hail damage to crops, for instance. networks.
49
Throughout the survey, we discuss the new technology PVI . . . . . . . . . . Perpendicular Vegetation Index.
RC . . . . . . . . . . . Radio Control.
trends in UAV applications such as mmWave, SDN, NFV, RPL . . . . . . . . . . Routing for low-power and Lossy network.
cloud computing and image processing. We thoroughly iden- RSU . . . . . . . . . . Roadside Unit.
SAC . . . . . . . . . . Special Airworthiness Certificate.
tify the key challenges for UAV civil applications such SAR . . . . . . . . . . Search and Rescue.
as charging challenges, collision avoidance and swarming SAVI . . . . . . . . . . Soil Adjusted Vegetation Index.
SDN . . . . . . . . . . Software-Defined Networking.
challenges, and networking and security related challenges. SHM . . . . . . . . . . Structural Health Monitoring.
In conclusion, a complete legal framework and institutions SOC . . . . . . . . . . Start of Charge.
SUAVs . . . . . . . . . Solar-Powered UAVs.
regulating the civil uses of UAVs are needed to spread UAV sUAV . . . . . . . . . . Small Unmanned Aerial Vehicle.
services globally. We hope that the key research challenges SVM . . . . . . . . . . Support Vector Machine.
TIR . . . . . . . . . . Thermal Infrared.
and opportunities described in this survey will help pave the UAS . . . . . . . . . . Unmanned Aircraft Systems.
way for researchers to improve UAV civil applications in the UAV . . . . . . . . . . Unmanned Aerial Vehicle.
VANETs . . . . . . . . Vehicular Ad-hoc Networks.
future. NFV . . . . . . . . . . Network Function Virtualization.
VIs . . . . . . . . . . . Vegetation Indices.
VMPaaS . . . . . . . . Video Monitoring Platform as a Service.
XIV. ACRONYMS VTOL . . . . . . . . . Vertical Take-Off and Landing.
The acronyms and abbreviations used throughout the survey WPT . . . . . . . . . . Wireless Power Transfer.
and their definitions are listed bellow: WSN . . . . . . . . . . Wireless Sensor Networks.
6LoWPAN . . . . . . . IPv6 over Low Power Wireless Personal Area Net-
works. R EFERENCES
AC . . . . . . . . . . . Attack Criteria.
AODV . . . . . . . . . Ad-hoc On-demand Distance Vector. [1] S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on Unmanned Aerial
ATG . . . . . . . . . . Air-to-Ground. Vehicle Networks for Civil Applications: A Communications View-
BC . . . . . . . . . . . Behavior Criteria.
point,” IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp.
BDMA . . . . . . . . . Beam Division Multiple Access.
2624–2661, 2016.
BM . . . . . . . . . . . Behavioral Model.
BP . . . . . . . . . . . Bundle Protocol. [2] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in UAV
BT . . . . . . . . . . . Behavioral Test. communication networks,” IEEE Communications Surveys & Tutorials,
CC . . . . . . . . . . . Capacitive Coupling. vol. 18, no. 2, pp. 1123–1152, 2016.
CCSD . . . . . . . . . Consultative Committee for Space Data Systems. [3] N. H. Motlagh, T. Taleb, and O. Arouk, “Low-altitude unmanned aerial
CFDP . . . . . . . . . CCSD File Delivery Protocol. vehicles-based internet of things services: Comprehensive survey and
CLP . . . . . . . . . . Convergence Layer Protocol. future perspectives,” IEEE Internet of Things Journal, vol. 3, no. 6, pp.
CNN . . . . . . . . . . Convolutional Neural Network. 899–922, 2016.
CNO . . . . . . . . . . Cellular Network Operator. [4] M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, “A
CNPC . . . . . . . . . Control and Non-Payload Communication. tutorial on UAVs for wireless networks: Applications, challenges, and
CoA . . . . . . . . . . Certificate of Authorization. open problems,” arXiv preprint arXiv:1803.00680, 2018.
DDoS . . . . . . . . . . Distributed Deny of Service. [5] W. Khawaja, I. Guvenc, D. Matolak, U.-C. Fiebig, and N. Schnecken-
DMF . . . . . . . . . . Drone-cell management frame-work. berger, “A survey of Air-to-Ground Propagation Channel Modeling for
DoS . . . . . . . . . . Deny of Service. Unmanned Aerial Vehicles,” arXiv preprint arXiv:1801.01656, 2018.
DTN . . . . . . . . . . Disruption Tolerant Networking.
[6] A. A. Khuwaja, Y. Chen, N. Zhao, M.-S. Alouini, and P. Dobbins, “A
EVI . . . . . . . . . . Enhanced Vegetation Index.
FAA . . . . . . . . . . Federal Aviation Administration.
survey of channel modeling for UAV communications,” arXiv preprint
FANETs . . . . . . . . Flying Ad-Hoc Networks. arXiv:1801.07359, 2018.
FLIR . . . . . . . . . . Forward Looking Infrared. [7] I. Bekmezci, O. K. Sahingoz, and Ş. Temel, “Flying Ad-Hoc Networks
FMI . . . . . . . . . . Fourier Mellin Invariant. (FANETs): A Survey,” Ad Hoc Networks, vol. 11, no. 3, pp. 1254–1270,
FSO . . . . . . . . . . Free Space Optical. 2013.
GCS . . . . . . . . . . Ground Control Station. [8] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
GIS . . . . . . . . . . Geographic Information System. unmanned aerial vehicles: opportunities and challenges,” IEEE Com-
GPS . . . . . . . . . . Global Position System. munications Magazine, vol. 54, no. 5, pp. 36–42, 2016.
GNDVI . . . . . . . . . Green Normalized Difference Vegetation index. [9] A. Kumbhar, F. Koohifar, I. Güvenç, and B. Mueller, “A survey on
GVI . . . . . . . . . . Green Vegetation Index. legacy and emerging technologies for public safety communications,”
HAP . . . . . . . . . . High Altitude Platform. IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 97–124,
IETF . . . . . . . . . . Internet Engineering Task Force. 2017.
IMU . . . . . . . . . . Inertial Sensor. [10] G. Chmaj and H. Selvaraj, “Distributed processing applications for
IoT . . . . . . . . . . . Internet of Things. UAV/Drones: a survey,” in Progress in Systems Engineering. Springer,
IR . . . . . . . . . . . Infra Red. 2015, pp. 449–454.
ITU . . . . . . . . . . International Telecommunication Union.
KDOT . . . . . . . . . Kansas Department of Transportation.
[11] M. Zuckerberg, “Connecting the world from the sky,” 2014.
LAP . . . . . . . . . . Low Altitude Platform. [12] Y. Sun, D. W. K. Ng, D. Xu, L. Dai, and R. Schober, “Resource
LLT . . . . . . . . . . Low power and Lossy Networks. allocation for solar powered UAV communication systems,” arXiv
LOS . . . . . . . . . . Line of Sight. preprint arXiv:1801.07188, 2018.
LRF . . . . . . . . . . Laser Range Finder. [13] N. A. F. Sheet, “Beamed laser power for UAVs,” NASA–
LTP . . . . . . . . . . Licklider Transmission Protocol. 2014. http://www. nasa. gov/centers/armstrong/news/FactSheets/FS-
MAC . . . . . . . . . . Medium Access Control. 087-DFRC. html.
MANETs . . . . . . . . Mobile Ad-hoc Networks. [14] PwC, “Global market for commercial applications of drone technology
MB-LBP . . . . . . . . Multi-scale Block Local Binary Patterns. valued at over 127bn,” (Accessed on February 2018). [Online].
MDR . . . . . . . . . . Message Dropping Rate. Available: https://press.pwc.com/
MEC . . . . . . . . . . Mobile Edge Computing. [15] T. Kelly, “The booming demand for commercial drone pilots,” (Ac-
MitM . . . . . . . . . . Man-in-the-Middle attacks. cessed on February 2018). [Online]. Available: https://www.theatlantic.
mmWave . . . . . . . . Millimeter-Wave. com/technology/archive/2017/01/drone-pilot-school/515022/
MPC . . . . . . . . . . Model Predictive Controller. [16] S. D. Intelligence, “The global UAV payload market 2017-
MRC . . . . . . . . . . Magnetic Resonance Coupling.
2027,” (Accessed on February 2018). [Online]. Available: https:
NDVI . . . . . . . . . . Normalized difference vegetation index.
NLOS . . . . . . . . . Non-Line of Sight.
//www.researchandmarkets.com/research/nfpsbm/the global uav
OBIA . . . . . . . . . . Object-Based Image Analysis. [17] grand view research, “UAV payload market analysis by equipment,”
OD . . . . . . . . . . . Origin-Destination. (Accessed on February 2018). [Online]. Available: https://www.
PA . . . . . . . . . . . Precision Agriculture. grandviewresearch.com/industry-analysis/uav-payload-market
PBR . . . . . . . . . . Performance-Based Regulations. [18] D. Joshi, “Commercial unmanned aerial vehicle (UAV) market analysis
PCA . . . . . . . . . . Point of closest Approach. industry trends, companies and what you should know,” (Accessed on
PG&E . . . . . . . . . Pacific Gas and Electric Company. February 2018). [Online]. Available: http://www.businessinsider.com/
PUSCH . . . . . . . . . Physical Uplink Shared Channel. commercial-uav-market-analysis-2017-8
50
[19] D. Gettinger, Drone spending in the fiscal year 2017 defense budget. [42] P. Doherty and P. Rudol, “A UAV search and rescue scenario with
Center for the Study of the Drone at Bard College, 2016. human body detection and geolocalization,” in Australian Conference
[20] PwC, “Clarity from above, PwC global report on the commercial appli- on Artificial Intelligence, vol. 4830. Springer, 2007, pp. 1–13.
cations of drone technology,” (Accessed on February 2018). [Online]. [43] J. Scherer, S. Yahyanejad, S. Hayat, E. Yanmaz, T. Andre, A. Khan,
Available: https://www.pwc.pl/pl/pdf/clarity-from-above-pwc.pdf V. Vukadinovic, C. Bettstetter, H. Hellwagner, and B. Rinner, “An
[21] Wikipedia, “Uncrewed-vehicle Wikipedia, the free encyclopedia,” autonomous multi-UAV system for search and rescue,” in Proceedings
2018, [Accessed 22-2-2018]. [Online]. Available: https://en.wikipedia. of the First Workshop on Micro Aerial Vehicle Networks, Systems, and
org/wiki/Uncrewed-vehicle Applications for Civilian Use. ACM, 2015, pp. 33–38.
[22] Y. B. Sebbane, Smart Autonomous Aircraft: Flight Control and Plan- [44] M. A. Ruiz Estrada, “How unmanned aerial vehicles–UAVs–(or
ning for UAV. CRC Press, 2015. Drones) can help in case of natural disasters response and humanitarian
[23] A. Korchenko and O. Illyash, “The generalized classification of relief aid?” 2017.
unmanned air vehicles,” in IEEE 2nd International Conference on [45] T. Alcedo, “Alcedo,” 2018, [Accessed 28-02-2018]. [Online].
Actual Problems of Unmanned Air Vehicles Developments Proceedings Available: http://www.alcedo.ethz.ch/
(APUAVD),, 2013, pp. 28–34. [46] J. Joern, “Examining the use of unmanned aerial systems and thermal
infrared imaging for search and rescue efforts beneath snowpack,”
[24] A. Al-Hourani, S. Kandeepan, and A. Jamalipour, “Modeling air-to-
2015.
ground path loss for low altitude platforms in urban environments,”
in Global Communications Conference (GLOBECOM),. IEEE, 2014, [47] D. Jo and Y. Kwon, “Development of rescue material transport UAV
pp. 2898–2904. (unmanned aerial vehicle),” World Journal of Engineering and Tech-
nology, vol. 5, no. 04, p. 720, 2017.
[25] A. Valcarce, T. Rasheed, K. Gomez, S. Kandeepan, L. Reynaud, [48] M. L. Smith, “Regulating law enforcement’s use of drones: The need
R. Hermenier, A. Munari, M. Mohorcic, M. Smolnikar, and I. Bucaille, for state legislation,” Harv. J. on Legis., vol. 52, p. 423, 2015.
“Airborne base stations for emergency and temporary events,” in
[49] B. R. Jordan, “A birds-eye view of geology: The use of micro
International Conference on Personal Satellite Services. Springer,
drones/UAVs in geologic fieldwork and education,” GSA Today, vol. 25,
2013, pp. 13–25.
no. 7, pp. 50–52, 2015.
[26] L. Reynaud and T. Rasheed, “Deployable aerial communication net- [50] B. Vergouw, H. Nagel, G. Bondt, and B. Custers, “Drone technology:
works: challenges for futuristic applications,” in Proceedings of the 9th Types, payloads, applications, frequency spectrum issues and future
ACM symposium on Performance evaluation of wireless ad hoc, sensor, developments,” in The Future of Drone Use. Springer, 2016, pp.
and ubiquitous networks. ACM, 2012, pp. 9–16. 21–45.
[27] T. Tozer and D. Grace, “High-altitude platforms for wireless communi- [51] D. C. Macke Jr, Systems and image database resources for UAV
cations,” Electronics & Communication Engineering Journal, vol. 13, search and rescue applications. Missouri University of Science and
no. 3, pp. 127–137, 2001. Technology, 2013.
[28] J. Thornton, D. Grace, C. Spillard, T. Konefal, and T. Tozer, “Broad- [52] P. Rudol and P. Doherty, “Human body detection and geolocalization
band communications from a high-altitude platform: the european he- for UAV search and rescue missions using color and thermal imagery,”
linet programme,” Electronics & Communication Engineering Journal, in IEEE Aerospace Conference,. IEEE, 2008, pp. 1–8.
vol. 13, no. 3, pp. 138–144, 2001. [53] J.-J. Hernandez-Lopez, A.-L. Quintanilla-Olvera, J.-L. López-Ramı́rez,
[29] S. Karapantazis and F. Pavlidou, “Broadband communications via F.-J. Rangel-Butanda, M.-A. Ibarra-Manzano, and D.-L. Almanza-
high-altitude platforms: A survey,” IEEE Communications Surveys & Ojeda, “Detecting objects using color and depth segmentation with
Tutorials, vol. 7, no. 1, pp. 2–31, 2005. kinect sensor,” Procedia Technology, vol. 3, pp. 196–204, 2012.
[30] S. Chandrasekharan, K. Gomez, A. Al-Hourani, S. Kandeepan, [54] K. Mikolajczyk, C. Schmid, and A. Zisserman, “Human detection
T. Rasheed, L. Goratti, L. Reynaud, D. Grace, I. Bucaille, T. Wirth based on a probabilistic assembly of robust part detectors,” Computer
et al., “Designing and implementing future aerial communication Vision-ECCV 2004, pp. 69–82, 2004.
networks,” IEEE Communications Magazine, vol. 54, no. 5, pp. 26–34, [55] J. Sun, B. Li, Y. Jiang, and C.-y. Wen, “A camera-based target detection
2016. and positioning UAV system for search and rescue (sar) purposes,”
[31] I. Bucaille, S. Hethuin, T. Rasheed, A. Munari, R. Hermenier, and Sensors, vol. 16, no. 11, p. 1778, 2016.
S. Allsopp, “Rapidly deployable network for tactical applications: [56] A. Giusti, J. Guzzi, D. C. Cireşan, F.-L. He, J. P. Rodrı́guez, F. Fontana,
Aerial base station with opportunistic links for unattended and tem- M. Faessler, C. Forster, J. Schmidhuber, G. Di Caro et al., “A machine
porary events absolute example,” in Military Communications Confer- learning approach to visual perception of forest trails for mobile
ence, MILCOM. IEEE, 2013, pp. 1116–1120. robots,” IEEE Robotics and Automation Letters, vol. 1, no. 2, pp. 661–
[32] AIRBORNEDRONES, “Sentinel+ drone,” 2018, [Accessed 26-Feb- 667, 2016.
2018]. [Online]. Available: http://www.airbornedrones.co/ [57] M. B. Bejiga, A. Zeggada, A. Nouffidj, and F. Melgani, “A convo-
[33] D. W. Matolak and R. Sun, “Initial results for air-ground channel lutional neural network approach for assisting avalanche search and
measurements & modeling for unmanned aircraft systems: Over-sea,” rescue operations with UAV imagery,” Remote Sensing, vol. 9, no. 2,
in IEEE Aerospace Conference,, 2014, pp. 1–15. p. 100, 2017.
[34] R. Sun and D. W. Matolak, “Air–ground channel characterization for [58] A. Carrio, C. Sampedro, A. Rodriguez-Ramos, and P. Campoy, “A
unmanned aircraft systems part ii: Hilly and mountainous settings,” review of deep learning methods and applications for unmanned aerial
IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 1913– vehicles,” Journal of Sensors, vol. 2017, 2017.
1925, 2017. [59] A. Alexopoulos, A. Kandil, P. Orzechowski, and E. Badreddin, “A
[35] D. W. Matolak and R. Sun, “Air-ground channel characterization comparative study of collision avoidance techniques for unmanned
for unmanned aircraft systemspart iii: The suburban and near-urban aerial vehicles,” in International Conference on Systems, Man, and
environments,” IEEE Transactions on Vehicular Technology, 2017. Cybernetics (SMC). IEEE, 2013, pp. 1969–1974.
[60] H. Pham, S. A. Smolka, S. D. Stoller, D. Phan, and J. Yang, “A
[36] D. Grace, J. Thornton, G. White, C. Spillard, D. Pearce, M. Mohor- survey on unmanned aerial vehicle collision avoidance systems,” arXiv
cic, T. Javornik, E. Falletti, J. Delgado-Penin, and E. Bertran, “The preprint arXiv:1508.07723, 2015.
european helinet broadband communications application–an update
[61] E. Tuyishimire, A. Bagula, S. Rekhis, and N. Boudriga, “Cooperative
on progress,” in Japanese Stratospheric Platforms Systems Workshop
data muling from ground sensors to base stations using UAVs,” in
(Invited Paper), 2003.
Computers and Communications (ISCC), 2017 IEEE Symposium on.
[37] S. Katikala, “Google project loon,” InSight: Rivier Academic Journal, IEEE, 2017, pp. 35–41.
vol. 10, no. 2, pp. 1–6, 2014. [62] M. Quaritsch, K. Kruggl, D. Wischounig-Strucl, S. Bhattacharya,
[38] S. Smith, M. Fortenberry, M. Lee, and R. Judy, “Hisentinel80: flight M. Shah, and B. Rinner, “Networked UAVs as aerial sensor network
of a high altitude airship,” in Proceedings of the 11th AIAA Aviation for disaster management applications,” e & i Elektrotechnik und Infor-
Technology, Integration, and Operations (ATIO) Conference, 2011. mationstechnik, vol. 127, no. 3, pp. 56–63, 2010.
[39] S. G. Gupta, M. M. Ghonge, and P. Jawandhiya, “Review of unmanned [63] vito, “Datasets and products for a broad range of applications,” (Ac-
aircraft system (UAS),” International journal of advanced research in cessed on December 2017). [Online]. Available: https://remotesensing.
computer engineering & technology (IJARCET), vol. 2, no. 4, pp. pp– vito.be/data-products-services/using-remote-sensing-drones
1646, 2013. [64] NASA, “Remote sensors,” (Accessed on December 2017). [Online].
[40] EMT, “Luna x-2000 uav system,” 2018, [Accessed 26-2- Available: https://earthdata.nasa.gov/user-resources/remote-sensors
2018]. [Online]. Available: http://www.emt-penzberg.de/en/produkte/ [65] C. H. Hugenholtz, K. Whitehead, O. W. Brown, T. E. Barchyn, B. J.
drohnensystem/luna.html Moorman, A. LeClair, K. Riddell, and T. Hamilton, “Geomorphological
[41] M. Silvagni, A. Tonoli, E. Zenerino, and M. Chiaberge, “Multipurpose mapping with a small unmanned aircraft system (sUAS): Feature
UAV for search and rescue operations in mountain avalanche events,” detection and accuracy assessment of a photogrammetrically-derived
Geomatics, Natural Hazards and Risk, vol. 8, no. 1, pp. 18–33, 2017. digital terrain model,” Geomorphology, vol. 194, pp. 16–24, 2013.
51
[66] K. Whitehead, B. Moorman, and C. Hugenholtz, “Low-cost, on- [89] Z. Li, Y. Liu, R. Walker, R. Hayward, and J. Zhang, “Towards automatic
demand aerial photogrammetry for glaciological measurement.” power line detection for a UAV surveillance system using pulse coupled
Cryosphere Discussions, vol. 7, no. 3, 2013. neural filter and an improved hough transform,” Machine Vision and
[67] K. Whitehead and C. H. Hugenholtz, “Remote sensing of the environ- Applications, vol. 21, no. 5, pp. 677–686, 2010.
ment with small unmanned aircraft systems (uass), part 1: a review [90] J. I. Larrauri, G. Sorrosal, and M. González, “Automatic system for
of progress and challenges,” Journal of Unmanned Vehicle Systems, overhead power line inspection using an unmanned aerial vehiclerelifo
vol. 2, no. 3, pp. 69–85, 2014. project,” in International Conference on Unmanned Aircraft Systems
[68] R. Austin, Unmanned aircraft systems: UAVS design, development and (ICUAS),. IEEE, 2013, pp. 244–252.
deployment. John Wiley & Sons, 2011, vol. 54. [91] S. Sankarasrinivasan, E. Balasubramanian, K. Karthik, U. Chan-
[69] T. F. Villa, F. Gonzalez, B. Miljievic, Z. D. Ristovski, and L. Morawska, drasekar, and R. Gupta, “Health monitoring of civil structures with
“An overview of small unmanned aerial vehicles for air quality integrated UAV and image processing system,” Procedia Computer
measurements: Present applications and future prospectives,” Sensors, Science, vol. 54, pp. 508–515, 2015.
vol. 16, no. 7, p. 1072, 2016. [92] MikroKopter, “Mikrokopter-l4-me quadcopter,” Feb. 2018, (Accessed
[70] J. Curry, J. Maslanik, G. Holland, and J. Pinto, “Applications of on February 2018). [Online]. Available: http://www.mikrokopter.de/
aerosondes in the arctic,” Bulletin of the American Meteorological en/home
Society, vol. 85, no. 12, pp. 1855–1861, 2004. [93] I. Sa and P. Corke, “Vertical infrastructure inspection using a quad-
[71] A. McGonigle, A. Aiuppa, G. Giudice, G. Tamburello, A. Hodson, copter and shared autonomy control,” in Field and Service Robotics.
and S. Gurrieri, “Unmanned aerial vehicle measurements of volcanic Springer, 2014, pp. 219–232.
carbon dioxide fluxes,” Geophysical research letters, vol. 35, no. 6, [94] T. R. Bretschneider and K. Shetti, “UAV-based gas pipeline leak
2008. detection,” in Proc. of ARCS, 2015.
[72] G. Saggiani, F. Persiani, A. Ceruti, P. Tortora, E. Troiani, F. Giuletti, [95] PG&E, “Testing safety drones to inspect electric and gas
S. Amici, M. Buongiorno, G. Distefano, G. Bentini et al., “A UAV infrastructure,” 2016, (Accessed February 22, 2018). [Online].
system for observing volcanoes and natural hazards,” in AGU Fall Available: https://www.pge.com/
Meeting Abstracts, 2007. [96] Cyberhawk. (2008) Aerial Inspection and Survey Using UAVs.
[73] P.-H. Lin and C.-S. Lee, “The eyewall-penetration reconnaissance (accessed February 25, 2018). [Online]. Available: https://www.
observation of typhoon longwang (2005) with unmanned aerial vehicle, thecyberhawk.com
aerosonde,” Journal of Atmospheric and Oceanic Technology, vol. 25, [97] INDUSTRIAL SKYWORKS, “Drone Inspections Services,” (Ac-
no. 1, pp. 15–25, 2008. cessed February 22, 2018). [Online]. Available: https:
[74] Python Tips, “Introduction to machine learning and its //industrialskyworks.com/drone-inspections-services
usage in remote sensing,” (Accessed on December [98] M. Gilbert. (2017) Drones & AI: The next phase of automation.
2017). [Online]. Available: https://pythontips.com/2017/11/11/ (Accessed February 22, 2018). [Online]. Available: http://about.att.
introduction-to-machine-learning-and-its-usage-in-remote-sensing/ com/innovationblog/drones automation
[75] GisCloud, “Combining remote sensing and cloud technology is the [99] Honeywell. (2017) Honeywell launches UAV industrial inspection
future of farming,” (Accessed on Feb. 2018). [Online]. Available: service, teams with intel on innovative offering. (accessed February
https://www.giscloud.com/blog/agriculture-risk-management-use-case/ 22, 2018). [Online]. Available: https://www.honeywell.com/newsroom/
[76] H. Kaushal and G. Kaddoum, “Optical communication in space: pressreleases/2017/09/
Challenges and mitigation techniques,” IEEE Communications Surveys [100] M. I. Ltd. (1994) Maverick Industrial UAV Inspection.
& Tutorials, vol. 19, no. 1, pp. 57–96, 2017. (accessed February 25, 2018). [Online]. Available: http:
[77] M. Madden, T. Jordan, D. Cotten, N. OHare, A. Pasqua, and //www.maverickinspection.com/services/industrial-drone-inspection/
S. Bernardes, “The future of unmanned aerial systems (UAS) for [101] Bluestream. Alongside UAV inspection services. (accessed February
monitoring natural and cultural resources,” in Photogrammetric Week, 25, 2018). [Online]. Available: http://www.bluestreamoffshore.com/
vol. 15, pp. 369–384. site/services/uav-inspection.html
[78] W. Immerzeel, P. Kraaijenbrink, J. Shea, A. Shrestha, F. Pellicciotti, [102] Q. F. Dupont, D. K. Chua, A. Tashrif, and E. L. Abbott, “Potential
M. Bierkens, and S. De Jong, “High-resolution monitoring of hi- applications of UAV along the construction’s value chain,” Procedia
malayan glacier dynamics using unmanned aerial vehicles,” Remote Engineering, vol. 182, pp. 165–173, 2017.
Sensing of Environment, vol. 150, pp. 93–103, 2014. [103] Y. Ham, K. K. Han, J. J. Lin, and M. Golparvar-Fard, “Visual mon-
[79] A. Bhardwaj, L. Sam, F. J. Martı́n-Torres, R. Kumar et al., “UAVs as itoring of civil infrastructure systems via camera-equipped unmanned
remote sensing platform in glaciology: Present applications and future aerial vehicles (UAVs): a review of related works,” Visualization in
prospects,” Remote Sensing of Environment, vol. 175, pp. 196–204, Engineering, vol. 4, no. 1, p. 1, 2016.
2016. [104] A. Pagnano, M. Höpf, and R. Teti, “A roadmap for automated power
[80] L. Sam, A. Bhardwaj, S. Singh, and R. Kumar, “Remote sensing flow line inspection. maintenance and repair,” Procedia CIRP, vol. 12, pp.
velocity of debris-covered glaciers using landsat 8 data,” Progress in 234–239, 2013.
Physical Geography, vol. 40, no. 2, pp. 305–321, 2016. [105] Y. Huang, S. J. Thomson, W. C. Hoffmann, Y. Lan, and B. K. Fritz,
[81] G. Yang, J. Liu, C. Zhao, Z. Li, Y. Huang, H. Yu, B. Xu, X. Yang, “Development and prospect of unmanned aerial vehicle technologies
D. Zhu, X. Zhang et al., “Unmanned aerial vehicle remote sensing for agricultural production management,” International Journal of
for field-based crop phenotyping: Current status and perspectives,” Agricultural and Biological Engineering, vol. 6, no. 3, pp. 1–10, 2013.
Frontiers in plant science, vol. 8, p. 1111, 2017. [106] N. Muchiri and S. Kimathi, “A review of applications and potential
[82] P. Liu, A. Y. Chen, Y.-N. Huang, J.-Y. Han, J.-S. Lai, S.-C. Kang, applications of UAV,” in Proceedings of Sustainable Research and
T. Wu, M. Wen, and M. Tsai, “A review of rotorcraft unmanned aerial Innovation Conference, 2016, pp. 280–283.
vehicle (UAV) developments and applications in civil engineering,” [107] W. Kazmi, M. Bisgaard, F. J. Garcia-Ruiz, K. D. Hansen, and
Smart Struct. Syst, vol. 13, no. 6, pp. 1065–1094, 2014. A. la Cour-Harbo, “Adaptive surveying and early treatment of crops
[83] C. Deng, S. Wang, Z. Huang, Z. Tan, and J. Liu, “Unmanned aerial with a team of autonomous vehicles.” in ECMR, 2011, pp. 253–258.
vehicles for power line inspection: A cooperative way in platforms and [108] V. Gonzalez-Dugo, P. Zarco-Tejada, E. Nicolás, P. Nortes, J. Alarcón,
communications,” J. Commun, vol. 9, no. 9, pp. 687–692, 2014. D. Intrigliolo, and E. Fereres, “Using high resolution UAV thermal
[84] F. Mohamadi, “Vertical takeoff and landing (VTOL) small unmanned imagery to assess the variability in the water status of five fruit tree
aerial system for monitoring oil and gas pipelines,” Nov. 4 2014, uS species within a commercial orchard,” Precision Agriculture, vol. 14,
Patent 8,880,241. no. 6, pp. 660–678, 2013.
[85] M. Gheisari, J. Irizarry, and B. N. Walker, “UAS4SAFETY: The poten- [109] F. Garcia-Ruiz, S. Sankaran, J. M. Maja, W. S. Lee, J. Rasmussen,
tial of unmanned aerial systems for construction safety applications,” and R. Ehsani, “Comparison of two aerial imaging platforms for
in Construction Research Congress 2014: Construction in a Global identification of huanglongbing-infected citrus trees,” Computers and
Network, 2014, pp. 1801–1810. Electronics in Agriculture, vol. 91, pp. 106–115, 2013.
[86] D. Jones, “Power line inspection-a UAV concept,” in The IEE Forum [110] P. Mathur, R. H. Nielsen, N. R. Prasad, and R. Prasad, “Data collection
on Autonomous Systems. (Ref. No. 2005/11271). IET, 2005, pp. 8–pp. using miniature aerial vehicles in wireless sensor networks,” IET
[87] L. F. Luque-Vega, B. Castillo-Toledo, A. Loukianov, and L. E. Wireless Sensor Systems, vol. 6, no. 1, pp. 17–25, 2016.
Gonzalez-Jimenez, “Power line inspection via an unmanned aerial [111] J. Primicerio, S. F. Di Gennaro, E. Fiorillo, L. Genesio, E. Lugato,
system based on the quadrotor helicopter,” in 17th Mediterranean A. Matese, and F. P. Vaccari, “A flexible unmanned aerial vehicle for
Electrotechnical Conference (MELECON),. IEEE, 2014, pp. 393–397. precision agriculture,” Precision Agriculture, vol. 13, no. 4, pp. 517–
[88] C. Sampedro, C. Martinez, A. Chauhan, and P. Campoy, “A supervised 523, 2012.
approach to electric tower detection and classification for power line [112] T. Jensen, A. Apan, F. R. Young, L. C. Zeller, and K. Cleminson,
inspection,” in International Joint Conference on Neural Networks “Assessing grain crop attributes using digital imagery acquired from a
(IJCNN),. IEEE, 2014, pp. 1970–1977. low-altitude remote controlled aircraft,” in Proceedings of the 2003
52
Spatial Sciences Institute Conference: Spatial Knowledge Without [134] K. Anderson and K. J. Gaston, “Lightweight unmanned aerial vehi-
Boundaries (SSC2003). Spatial Sciences Institute, 2003. cles will revolutionize spatial ecology,” Frontiers in Ecology and the
[113] E. R. Hunt, W. D. Hively, S. J. Fujikawa, D. S. Linden, C. S. Daughtry, Environment, vol. 11, no. 3, pp. 138–146, 2013.
and G. W. McCarty, “Acquisition of nir-green-blue digital photographs [135] hummingbirdtech, “Advanced crop analytics and artificial intelligence
from unmanned aircraft for crop monitoring,” Remote Sensing, vol. 2, for farmers,” (Accessed on February 2018). [Online]. Available:
no. 1, pp. 290–305, 2010. https://hummingbirdtech.com/
[114] D. Sullivan, J. Fulton, J. Shaw, and G. Bland, “Evaluating the sensitivity [136] A. Bannari, D. Morin, F. Bonn, and A. Huete, “A review of vegetation
of an unmanned thermal infrared aerial system to detect water stress indices,” Remote sensing reviews, vol. 13, no. 1-2, pp. 95–120, 1995.
in a cotton canopy,” Transactions of the ASABE, vol. 50, no. 6, pp. [137] E. P. Glenn, A. R. Huete, P. L. Nagler, and S. G. Nelson, “Relationship
1963–1969, 2007. between remotely-sensed vegetation indices, canopy attributes and
[115] N. B. Akesson and W. E. Yates, The use of aircraft in agriculture. plant physiological processes: what vegetation indices can and cannot
Food & Agriculture Org., 1974, no. 94. tell us about the landscape,” Sensors, vol. 8, no. 4, pp. 2136–2160,
[116] B. C. Reed, J. F. Brown, D. VanderZee, T. R. Loveland, J. W. Merchant, 2008.
and D. O. Ohlen, “Measuring phenological variability from satellite [138] J. Rouse Jr, R. Haas, J. Schell, and D. Deering, “Monitoring vegetation
imagery,” Journal of vegetation science, vol. 5, no. 5, pp. 703–714, systems in the great plains with erts,” 1974.
1994. [139] A. A. Gitelson, Y. J. Kaufman, and M. N. Merzlyak, “Use of a
[117] J. Baluja, M. P. Diago, P. Balda, R. Zorer, F. Meggio, F. Morales, green channel in remote sensing of global vegetation from eos-modis,”
and J. Tardaguila, “Assessment of vineyard water status variability by Remote sensing of Environment, vol. 58, no. 3, pp. 289–298, 1996.
thermal and multispectral imagery using an unmanned aerial vehicle [140] A. R. Huete, “A soil-adjusted vegetation index (savi),” Remote sensing
(UAV),” Irrigation Science, vol. 30, no. 6, pp. 511–522, 2012. of environment, vol. 25, no. 3, pp. 295–309, 1988.
[118] S. Candiago, F. Remondino, M. De Giglio, M. Dubbini, and M. Gattelli, [141] A. S. Laliberte, J. E. Herrick, A. Rango, and C. Winters, “Acquisition,
“Evaluating multispectral images and vegetation indices for precision orthorectification, and object-based classification of unmanned aerial
farming applications from UAV images,” Remote Sensing, vol. 7, no. 4, vehicle (uav) imagery for rangeland monitoring,” Photogrammetric
pp. 4026–4047, 2015. Engineering & Remote Sensing, vol. 76, no. 6, pp. 661–672, 2010.
[119] S. Khanal, J. Fulton, and S. Shearer, “An overview of current and po- [142] A. S. Laliberte, C. Winters, and A. Rango, “A procedure for or-
tential applications of thermal remote sensing in precision agriculture,” thorectification of sub-decimeter resolution imagery obtained with an
Computers and Electronics in Agriculture, vol. 139, pp. 22–32, 2017. unmanned aerial vehicle (UAV),” in Proc. ASPRS Annual Conf, 2008,
[120] F. M. Rhoads and C. D. Yonts, “Irrigation scheduling for corn: why pp. 08–047.
and how,” National Corn Handbook, 2000. [143] A. Definiens, “Definiens developer 7 user guide,” Document version,
[121] L. Hassan-Esfahani, A. Torres-Rua, A. Jensen, and M. McKee, “As- vol. 7, no. 5.968, 2007.
sessment of surface soil moisture using high-resolution multi-spectral [144] C. Zhang and J. M. Kovacs, “The application of small unmanned aerial
imagery and artificial neural networks,” Remote Sensing, vol. 7, no. 3, systems for precision agriculture: a review,” Precision agriculture,
pp. 2627–2646, 2015. vol. 13, no. 6, pp. 693–712, 2012.
[122] D. Pimentel, R. Zuniga, and D. Morrison, “Update on the environ- [145] SLANTRANGE, “The slantrange 3p multispectral sensor,” (Accessed
mental and economic costs associated with alien-invasive species in on February 2018). [Online]. Available: http://www.slantrange.com/
the united states,” Ecological economics, vol. 52, no. 3, pp. 273–288, 3p-slantview-available/
2005. [146] L. Burwood-Taylor, “The next generation of drone
[123] R. Calderón, J. A. Navas-Cortés, C. Lucena, and P. J. Zarco-Tejada, technologies for agriculture,” (Accessed on Febru-
“High-resolution airborne hyperspectral and thermal imagery for early ary 2018). [Online]. Available: https://agfundernews.com/
detection of verticillium wilt of olive using fluorescence, temperature the-next-generation-of-drone-technologies-for-agriculture.html
and narrow-band spectral indices,” Remote Sensing of Environment, [147] J. K. Patil and R. Kumar, “Advances in image processing for detection
vol. 139, pp. 231–245, 2013. of plant diseases,” Journal of Advanced Bioinformatics Applications
[124] W. De-Cai, G.-L. ZHANG, P. Xian-Zhang, Z. Yu-Guo, Z. Ming-Song, and Research, vol. 2, no. 2, pp. 135–141, 2011.
and W. Gai-Fen, “Mapping soil texture of a plain area using fuzzy- [148] G. N. Fandetti, “Method of drone delivery using aircraft,” 2015, uS
c-means clustering method based on land surface diurnal temperature Patent App. 14/817,356.
difference,” Pedosphere, vol. 22, no. 3, pp. 394–403, 2012. [149] PwC, “Besides blockchain, whats missing from IoT?” (Accessed
[125] D.-C. Wang, G.-L. Zhang, M.-S. Zhao, X.-Z. Pan, Y.-G. Zhao, D.-C. on December 2017). [Online]. Available: http://usblogs.pwc.com/
Li, and B. Macmillan, “Retrieval and mapping of soil texture based emerging-technology/
on land surface diurnal temperature range data from modis,” PloS one, [150] RedStagfulfillment, “The Future of Distribution,” (Accessed on
vol. 10, no. 6, p. e0129977, 2015. December 2017). [Online]. Available: https://redstagfulfillment.com/
[126] U. D. of Interior, “Mapping crop residue and tillage intensity on the-future-of-distribution/
chesapeake bay farmland,” (Accessed on February 2018). [Online]. [151] RedStagFULFILLMENT, “The future of distribution Part II: Product
Available: https://eros.usgs.gov/doi-remote-sensing-activities/2015/ distribution in emerging markets,” (Accessed on December 2017).
mapping-crop-residue-and-tillage-intensity-chesapeake-bay-farmland [Online]. Available: https://redstagfulfillment.com
[127] D. Sullivan, J. Shaw, P. Mask, D. Rickman, E. Guertal, J. Luvall, and [152] Wikipedia, “Delivery drone,” (Accessed on December 2017). [Online].
J. Wersinger, “Evaluation of multispectral data for rapid assessment of Available: https://en.wikipedia.org/wiki/Delivery drone
wheat straw residue cover,” Soil Science Society of America Journal, [153] C. T. Howell III, F. Jones, T. Thorson, R. Grube, C. Mellanson,
vol. 68, no. 6, pp. 2007–2013, 2004. L. Joyce, J. Coggin, and J. Kennedy, “The first government sanctioned
[128] D. Hofstrand, “Economics of tile drainage,” Ag Decision Maker delivery of medical supplies by remotely controlled unmanned aerial
Newsletter, vol. 14, no. 9, p. 3, 2015. system,” 2016.
[129] H. Steve and E. Kevin, “Mapping tile drainage systems,” (Accessed [154] UnmannedCargo, “Drones going postal a summary of
on February 2018). [Online]. Available: https://fyi.uwex.edu/drainage/ postal service delivery drone trials,” (Accessed on De-
files/2016/01/1603-Hoffman-System-for-Mapping-Tile.pdf cember 2017). [Online]. Available: http://unmannedcargo.org/
[130] T. Jensen, A. Apan, and L. Zeller, “Crop maturity mapping using a drones-going-postal-summary-postal-service-delivery-drone-trials/
low-cost low-altitude remote sensing system,” in Proceedings of the [155] G. Hoareau, J. J. Liebenberg, J. G. Musial, and T. R. Whitman,
2009 Surveying and Spatial Sciences Institute Biennial International “Package transport by unmanned aerial vehicles,” Aug. 15 2017, uS
Conference (SSC 2009). Surveying and Spatial Sciences Institute, Patent 9,731,821.
2009, pp. 1231–1243. [156] J. Gilbert, “Tacocopter aims to deliver tacos using unmanned drone
[131] K. C. Swain, S. J. Thomson, and H. P. Jayasuriya, “Adoption of an helicopters,” The Huffington Post, 2012.
unmanned helicopter for low-altitude remote sensing to estimate yield [157] mashable, “Faa clarifies that amazon drones are illegal,” (Accessed
and total biomass of a rice crop,” Transactions of the ASABE, vol. 53, on December 2017). [Online]. Available: http://mashable.com/2014/
no. 1, pp. 21–27, 2010. 06/24/faa-amazon-drones-2/
[132] J. Geipel, J. Link, and W. Claupein, “Combined spectral and spatial [158] recode, “A new trump policy could let amazon and google
modeling of corn yield based on aerial images and crop surface models test more drones in u.s. cities,” (Accessed on December 2017).
acquired with an unmanned aircraft system,” Remote Sensing, vol. 6, [Online]. Available: https://www.recode.net/2017/10/25/16542940/
no. 11, pp. 10 335–10 355, 2014. amazon-google-drones-us-government-trump
[133] S. Sankaran, L. R. Khot, C. Z. Espinoza, S. Jarolmasjed, V. R. Sathu- [159] Law, “Game of drones: Liability and insurance coverage issues
valli, G. J. Vandemark, P. N. Miklas, A. H. Carter, M. O. Pumphrey, coming,” (Accessed on December 2017). [Online]. Available:
N. R. Knowles et al., “Low-altitude, high-resolution aerial imaging https://www.law.com/ctlawtribune/almID/1202775117054
systems for row and field crop phenotyping: A review,” European [160] K. M. Fornace, C. J. Drakeley, T. William, F. Espino, and J. Cox,
Journal of Agronomy, vol. 70, pp. 112–123, 2015. “Mapping infectious disease landscapes: unmanned aerial vehicles and
53
epidemiology,” Trends in parasitology, vol. 30, no. 11, pp. 514–519, [183] T. Tang, S. Zhou, Z. Deng, H. Zou, and L. Lei, “Vehicle detection in
2014. aerial images based on region convolutional neural networks and hard
[161] Unmanned-Aerial, “The importance of advanced weather negative example mining,” Sensors, vol. 17, no. 2, p. 336, 2017.
data for commercial drone operations,” (Accessed on [184] H. Zhou, H. Kong, L. Wei, D. Creighton, and S. Nahavandi, “Effi-
December 2017). [Online]. Available: https://unmanned-aerial.com/ cient road detection and tracking for unmanned aerial vehicle,” IEEE
importance-advanced-weather-data-commercial-drone-operations Transactions on Intelligent Transportation Systems, vol. 16, no. 1, pp.
[162] BUSINESSINSIDER, “Amazon takes critical step to- 297–309, Feb 2015.
ward drone delivery,” (Accessed on December [185] H. Oh, S. Kim, H.-S. Shin, A. Tsourdos, and B. A. White, “Behaviour
2017). [Online]. Available: http://www.businessinsider.com/ recognition of ground vehicle using airborne monitoring of unmanned
amazon-takes-critical-step-toward-drone-delivery-2017-5 aerial vehicles,” International Journal of Systems Science, vol. 45,
[163] A. P. Air, “Revising the airspace model for the safe integration of small no. 12, pp. 2499–2514, 2014.
unmanned aircraft systems,” Amazon Prime Air, 2015. [186] C. Sutheerakul, N. Kronprasert, M. Kaewmoracharoen, and P. Pichaya-
[164] A. Glaser. Qualcomms latest technology allows drones to pan, “Application of unmanned aerial vehicles to pedestrian traffic
learn about their environment as they fly. (accessed February 25, monitoring and management for shopping streets,” Transportation
2018). [Online]. Available: https://www.recode.net/2017/1/7/14195076/ Research Procedia, vol. 25, pp. 1717–1734, 2017.
qualcomm-drones-machine-learning-flight-control-ces-2017-snapdragon [187] A. Puri, “A survey of unmanned aerial vehicles (UAV) for traffic
[165] B. Stark, “What drones may come: The future of unmanned flight surveillance,” Department of computer science and engineering, Uni-
approaches,” (Accessed on December 2017). [Online]. Available: versity of South Florida, pp. 1–29, 2005.
https://theconversation.com/ [188] F. A. Administration, https://www.faa.gov/, 2016.
[166] P. Ridden, “Nvidia’s autonomous drone keeps on track without [189] E. Vattapparamban, İ. Güvenç, A. İ. Yurekli, K. Akkaya, and
gps,” (Accessed on December 2017). [Online]. Available: https: S. Uluağaç, “Drones for smart cities: Issues in cybersecurity, privacy,
//newatlas.com/nvidia-camera-based-learning-navigation/50036/ and public safety,” in International Wireless Communications and
[167] mckinsey, “Commercial drones are here: The future of unmanned Mobile Computing Conference (IWCMC),. IEEE, 2016, pp. 216–221.
aerial systems,” (Accessed on December 2017). [Online]. Available: [190] H. Nakamura and Y. Kajikawa, “Regulation and innovation: How
https://www.mckinsey.com/industries/ should small unmanned aerial vehicles be regulated?” Technological
[168] R. D’Andrea, “Guest editorial can drones deliver?” IEEE Transactions Forecasting and Social Change, 2017.
on Automation Science and Engineering, vol. 11, no. 3, pp. 647–648, [191] NCLS, http://www.ncsl.org/research/transportation/
2014. current-unmanned-aircraft-state-law-landscape.aspx, 2016.
[169] H. Menouar, I. Guvenc, K. Akkaya, A. S. Uluagac, A. Kadri, and [192] ”FAA”, https://www.federalregister.gov, 2016.
A. Tuncer, “UAV-enabled intelligent transportation systems for the [193] NCLS, “Taking Off State Unmanned Aircraft Systems Policies.”
smart city: Applications and challenges,” IEEE Communications Mag- [194] F. Mohammed, A. Idries, N. Mohamed, J. Al-Jaroodi, and I. Jawhar,
azine, vol. 55, no. 3, pp. 22–28, 2017. “UAVs for smart cities: Opportunities and challenges,” in International
[170] R. Ke, Z. Li, S. Kim, J. Ash, Z. Cui, and Y. Wang, “Real-time Conference on Unmanned Aircraft Systems (ICUAS), May 2014, pp.
bidirectional traffic flow parameter estimation from aerial videos,” 267–273.
IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 4, [195] G. Zhang, R. Avery, and Y. Wang, “Video-based vehicle detection
pp. 890–901, April 2017. and classification system for real-time traffic data collection using
[171] G. Guido, V. Gallelli, D. Rogano, and A. Vitale, “Evaluating the accu- uncalibrated video cameras,” Transportation Research Record: Journal
racy of vehicle tracking data obtained from unmanned aerial vehicles,” of the Transportation Research Board, no. 1993, pp. 138–147, 2007.
International journal of transportation science and technology, vol. 5, [196] C. C. Haddal and J. Gertler, “Homeland security: Unmanned aerial ve-
no. 3, pp. 136–151, 2016. hicles and border surveillance.” LIBRARY OF CONGRESS WASH-
[172] J. Leitloff, D. Rosenbaum, F. Kurz, O. Meynberg, and P. Reinartz, INGTON DC CONGRESSIONAL RESEARCH SERVICE, 2010.
“An operational system for estimating road traffic information from [197] I. Maza, F. Caballero, J. Capitán, J. R. Martı́nez-de Dios, and A. Ollero,
aerial images,” Remote Sensing, vol. 6, no. 11, p. 1131511341, Nov “Experimental results in multi-UAV coordination for disaster manage-
2014. [Online]. Available: http://dx.doi.org/10.3390/rs61111315 ment and civil security applications,” Journal of intelligent & robotic
[173] kaust, “Flood Detection System Employs UAVs Sensing systems, vol. 61, no. 1, pp. 563–585, 2011.
Technology,” https://innovation.kaust.edu.sa/technologies/ [198] T. Wall and T. Monahan, “Surveillance and violence from afar: The
flood-detection-system-employs-uavs-sensing-technology/, 2016. politics of drones and liminal security-scapes,” Theoretical Criminol-
[174] Y. Qu, L. Jiang, and X. Guo, “Moving vehicle detection with convo- ogy, vol. 15, no. 3, pp. 239–254, 2011.
lutional networks in UAV videos,” in 2nd International Conference on [199] R. L. Finn and D. Wright, “Unmanned aircraft systems: Surveillance,
Control, Automation and Robotics (ICCAR), April 2016, pp. 225–229. ethics and privacy in civil applications,” Computer Law & Security
[175] L. Wang, F. Chen, and H. Yin, “Detecting and tracking vehicles Review, vol. 28, no. 2, pp. 184–194, 2012.
in traffic by unmanned aerial vehicles,” Automation in construction, [200] D. Kingston, R. W. Beard, and R. S. Holt, “Decentralized perimeter
vol. 72, pp. 294–308, 2016. surveillance using a team of UAVs,” IEEE Transactions on Robotics,
[176] H. Zhou, H. Kong, L. Wei, D. Creighton, and S. Nahavandi, “Effi- vol. 24, no. 6, pp. 1394–1404, 2008.
cient road detection and tracking for unmanned aerial vehicle,” IEEE [201] A. Birk, B. Wiggerich, H. Bülow, M. Pfingsthorn, and S. Schwertfeger,
Transactions on Intelligent Transportation Systems, vol. 16, no. 1, pp. “Safety, security, and rescue missions with an unmanned aerial vehicle
297–309, Feb 2015. (UAV),” Journal of Intelligent & Robotic Systems, vol. 64, no. 1, pp.
[177] A. Puri, K. Valavanis, and M. Kontitsis, “Statistical profile genera- 57–76, 2011.
tion for traffic monitoring using real-time UAV based video data,” [202] A. Wada, T. Yamashita, M. Maruyama, T. Arai, H. Adachi, and
in Mediterranean Conference on Control & Automation, (MED’07). H. Tsuji, “A surveillance system using small unmanned aerial vehicle
IEEE, 2007, pp. 1–6. (UAV) related technologies,” NEC Technical Journal, vol. 8, no. 1, pp.
[178] R. Reshma, T. Ramesh, and P. Sathishkumar, “Security situational 68–72, 2015.
aware intelligent road traffic monitoring using UAVs,” in International [203] N. H. Motlagh, M. Bagaa, and T. Taleb, “UAV-based iot platform: A
Conference on VLSI Systems, Architectures, Technology and Applica- crowd surveillance use case,” IEEE Communications Magazine, vol. 55,
tions (VLSI-SATA), Jan 2016, pp. 1–6. no. 2, pp. 128–134, 2017.
[179] P. A. R. Melissa McGuire, Malgorzata Rys, “A Study of How [204] H. Chen, N. Xi, B. Song, L. Chen, J. Zhao, K. W. C. Lai, and R. Yang,
Unmanned Aircraft Systems Can Support the Kansas Department “Infrared camera using a single nano-photodetector,” IEEE Sensors
of Transportations Efforts to Improve Efficiency, Safety, and Cost Journal, vol. 13, no. 3, pp. 949–958, 2013.
Reduction,” Kansas State University Transportation Center, Tech. Rep., [205] C. Jiang and J. Song, “An ultrahigh-resolution digital image sensor with
08 2016. pixel size of 50 nm by vertical nanorod arrays,” Advanced Materials,
[180] Y. M. Chen, L. Dong, and J.-S. Oh, “Real-time video relay for vol. 27, no. 30, pp. 4454–4460, 2015.
UAV traffic surveillance systems through available communication [206] S. C. Folea and G. Mois, “A low-power wireless sensor for online
networks,” in IEEE Wireless Communications and Networking Con- ambient monitoring,” IEEE Sensors Journal, vol. 15, no. 2, pp. 742–
ference, (WCNC). IEEE, 2007, pp. 2608–2612. 749, 2015.
[181] K. Ro, J.-S. Oh, and L. Dong, “Lessons learned: Application of small [207] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” nature, vol. 521,
UAV for urban highway traffic monitoring,” in 45th AIAA aerospace no. 7553, p. 436, 2015.
sciences meeting and exhibit, 2007, pp. 2007–596. [208] P. Bupe, R. Haddad, and F. Rios-Gutierrez, “Relief and emergency
[182] J. Apeltauer, A. Babinec, D. Herman, and T. Apeltauer, “Automatic communication network based on an autonomous decentralized UAV
vehicle trajectory extraction for traffic analysis from aerial video data,” clustering network,” in SoutheastCon 2015. IEEE, 2015, pp. 1–8.
The International Archives of Photogrammetry, Remote Sensing and [209] R. I. Bor-Yaliniz, A. El-Keyi, and H. Yanikomeroglu, “Efficient 3-
Spatial Information Sciences, vol. 40, no. 3, p. 9, 2015. d placement of an aerial base station in next generation cellular
54
networks,” in International Conference on Communications (ICC),. [232] H. Shakhatreh, A. Khreishah, J. Chakareski, H. B. Salameh, and
IEEE, 2016, pp. 1–5. I. Khalil, “On the continuous coverage problem for a swarm of UAVs,”
[210] I. Jawhar, N. Mohamed, J. Al-Jaroodi, D. P. Agrawal, and S. Zhang, in Sarnoff Symposium, 2016 IEEE 37th. IEEE, 2016, pp. 130–135.
“Communication and networking of uav-based systems: Classification [233] H. Shakhatreh, A. Khreishah, and I. Khalil, “The indoor mobile
and associated architectures,” Journal of Network and Computer Ap- coverage problem using UAVs,” arXiv preprint arXiv:1705.09771,
plications, 2017. 2017.
[211] J. Zhao, F. Gao, Q. Wu, S. Jin, Y. Wu, and W. Jia, “Beam tracking for [234] M. Zhu, Z. Cai, D. Zhao, J. Wang, and M. Xu, “Using multiple un-
UAV mounted satcom on-the-move with massive antenna array,” arXiv manned aerial vehicles to maintain connectivity of MANETs,” in 23rd
preprint arXiv:1709.07989, 2017. International Conference on Computer Communication and Networks
[212] D. W. Matolak, “Unmanned aerial vehicles: Communications chal- (ICCCN),. IEEE, 2014, pp. 1–7.
lenges and future aerial networking,” in International Conference on [235] J. Lyu, Y. Zeng, R. Zhang, and T. J. Lim, “Placement optimization of
Computing, Networking and Communications (ICNC). IEEE, 2015, UAV-mounted mobile base stations,” IEEE Communications Letters,
pp. 567–572. vol. 21, no. 3, pp. 604–607, 2017.
[213] T. S. Rappaport, R. W. Heath Jr, R. C. Daniels, and J. N. Murdock, [236] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Mobile internet
Millimeter wave wireless communications. Pearson Education, 2014. of things: Can UAVs provide an energy-efficient mobile architecture?”
[214] M. Alzenad, M. Z. Shakir, H. Yanikomeroglu, and M.-S. Alouini, in Global Communications Conference (GLOBECOM). IEEE, 2016,
“Fso-based vertical backhaul/fronthaul framework for 5g+ wireless pp. 1–6.
networks,” arXiv preprint arXiv:1607.01472, 2016. [237] D. Yang, Q. Wu, Y. Zeng, and R. Zhang, “Energy trade-off in
[215] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Drone small ground-to-uav communication via trajectory design,” arXiv preprint
cells in the clouds: Design, deployment and performance analysis,” in arXiv:1709.02975, 2017.
Global Communications Conference (GLOBECOM),. IEEE, 2015, pp. [238] D. Alejo, J. A. Cobano, G. Heredia, J. R. Martı́nez-de Dios, and
1–6. A. Ollero, “Efficient trajectory planning for WSN data collection with
[216] H. Shakhatreh, A. Khreishah, and B. Ji, “Providing wireless coverage multiple UAVs,” in Cooperative Robots and Sensor Networks 2015.
to high-rise buildings using UAVs,” in International Conference on Springer, 2015, pp. 53–75.
Communications (ICC) (accepted). IEEE, 2017. [239] C. Wang, F. Ma, J. Yan, D. De, and S. K. Das, “Efficient aerial
[217] M. Series, “Guidelines for evaluation of radio interface technologies data collection with UAV in large-scale wireless sensor networks,”
for imt-advanced,” Report ITU, no. 2135-1, 2009. International Journal of Distributed Sensor Networks, vol. 11, no. 11,
p. 286080, 2015.
[218] A. Al-Hourani and K. Gomez, “Modeling Cellular-to-UAV Path-Loss
for Suburban Environments,” IEEE Wireless Communications Letters, [240] C. Zhan, Y. Zeng, and R. Zhang, “Energy-efficient data collec-
2017. tion in UAV enabled wireless sensor network,” arXiv preprint
arXiv:1708.00221, 2017.
[219] J. Holis and P. Pechac, “Elevation dependent shadowing model for
[241] H.-L. Määttänen, K. Hämäläinen, J. Venäläinen, K. Schober,
mobile communications via high altitude platforms in built-up areas,”
M. Enescu, and M. Valkama, “System-level performance of lte-
IEEE Transactions on Antennas and Propagation, vol. 56, no. 4, pp.
advanced with joint transmission and dynamic point selection
1078–1084, 2008.
schemes,” EURASIP Journal on Advances in Signal Processing, vol.
[220] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Optimal transport 2012, no. 1, p. 247, 2012.
theory for power-efficient deployment of unmanned aerial vehicles,” in [242] M. Sawahashi, Y. Kishiyama, A. Morimoto, D. Nishikawa, and
International Conference on Communications (ICC),. IEEE, 2016, M. Tanno, “Coordinated multipoint transmission/reception techniques
pp. 1–6. for lte-advanced [coordinated and distributed mimo],” IEEE Wireless
[221] H. Shakhatreh, A. Khreishah, A. Alsarhan, I. Khalil, A. Sawalmeh, Communications, vol. 17, no. 3, 2010.
and N. S. Othman, “Efficient 3d placement of a UAV using particle [243] X. Lin, V. Yajnanarayana, S. D. Muruganathan, S. Gao, H. Asplund, H.-
swarm optimization,” in 8th International Conference on Information L. Maattanen, S. Euler, Y.-P. E. Wang et al., “The sky is not the limit:
and Communication Systems (ICICS),. IEEE, 2017, pp. 258–263. Lte for unmanned aerial vehicles,” arXiv preprint arXiv:1707.07534,
[222] A. Sawalmeh, N. S. Othman, H. Shakhatreh, and A. Khreishah, “Pro- 2017.
viding wireless coverage in massively crowded events using UAVs,” in [244] B. K. Donohoo, C. Ohlsen, S. Pasricha, Y. Xiang, and C. Anderson,
13th Malaysia International Conference on Communications (MICC). “Context-aware energy enhancements for smart mobile devices,” IEEE
IEEE, 2017, pp. 175–180. Transactions on Mobile Computing, vol. 13, no. 8, pp. 1720–1732,
[223] M. Alzenad, A. El-Keyi, F. Lagum, and H. Yanikomeroglu, “3d 2014.
placement of an unmanned aerial vehicle base station (UAV-BS) for [245] V.-s. Feng and S. Y. Chang, “Determination of wireless networks
energy-efficient maximal coverage,” IEEE Wireless Communications parameters through parallel hierarchical support vector machines,”
Letters, 2017. IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3,
[224] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Unmanned pp. 505–512, 2012.
aerial vehicle with underlaid device-to-device communications: Perfor- [246] C.-K. Wen, S. Jin, K.-K. Wong, J.-C. Chen, and P. Ting, “Channel es-
mance and tradeoffs,” IEEE Transactions on Wireless Communications, timation for massive mimo using gaussian-mixture bayesian learning,”
vol. 15, no. 6, pp. 3949–3963, 2016. IEEE Transactions on Wireless Communications, vol. 14, no. 3, pp.
[225] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Efficient de- 1356–1368, 2015.
ployment of multiple unmanned aerial vehicles for optimal wireless [247] K. W. Choi and E. Hossain, “Estimation of primary user parameters in
coverage,” IEEE Communications Letters, vol. 20, no. 8, pp. 1647– cognitive radio systems via hidden markov model,” IEEE transactions
1650, 2016. on signal processing, vol. 61, no. 3, pp. 782–795, 2013.
[226] E. Kalantari, M. Z. Shakir, H. Yanikomeroglu, and A. Yongacoglu, [248] A. Assra, J. Yang, and B. Champagne, “An em approach for cooperative
“Backhaul-aware robust 3d drone placement in 5g+ wireless networks,” spectrum sensing in multiantenna cr networks,” IEEE Transactions on
arXiv preprint arXiv:1702.08395, 2017. Vehicular Technology, vol. 65, no. 3, pp. 1229–1243, 2016.
[227] M. Alzenad, A. El-Keyi, and H. Yanikomeroglu, “3d placement of [249] C.-K. Yu, K.-C. Chen, and S.-M. Cheng, “Cognitive radio network
an unmanned aerial vehicle base station for maximum coverage of tomography,” IEEE Transactions on Vehicular Technology, vol. 59,
users with different qos requirements,” IEEE Wireless Communications no. 4, pp. 1980–1997, 2010.
Letters, 2017. [250] M. Xia, Y. Owada, M. Inoue, and H. Harai, “Optical and wireless
[228] H. Shakhatreh, A. Khreishah, N. S. Othman, and A. Sawalmeh, hybrid access networks: Design and optimization,” Journal of Optical
“Maximizing indoor wireless coverage using uavs equipped with Communications and Networking, vol. 4, no. 10, pp. 749–759, 2012.
directional antennas,” in 13th Malaysia International Conference on [251] H. Nguyen, G. Zheng, R. Zheng, and Z. Han, “Binary inference for pri-
Communications (MICC). IEEE, 2017, pp. 175–180. mary user separation in cognitive radio networks,” IEEE Transactions
[229] S. A. W. Shah, T. Khattab, M. Z. Shakir, and M. O. Hasna, “A on Wireless Communications, vol. 12, no. 4, pp. 1532–1542, 2013.
distributed approach for networked flying platform association with [252] A. Aprem, C. R. Murthy, and N. B. Mehta, “Transmit power control
small cells in 5g+ networks,” arXiv preprint arXiv:1705.03304, 2017. policies for energy harvesting sensors with retransmissions,” IEEE
[230] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Wireless com- Journal of Selected Topics in Signal Processing, vol. 7, no. 5, pp.
munication using unmanned aerial vehicles (UAVs): Optimal transport 895–906, 2013.
theory for hover time optimization,” arXiv preprint arXiv:1704.04813, [253] G. Alnwaimi, S. Vahid, and K. Moessner, “Dynamic heterogeneous
2017. learning games for opportunistic access in lte-based macro/femtocell
[231] E. Kalantari, H. Yanikomeroglu, and A. Yongacoglu, “On the number deployments,” IEEE Transactions on Wireless Communications,
and 3d placement of drone base stations in wireless cellular networks,” vol. 14, no. 4, pp. 2294–2308, 2015.
in 84th Vehicular Technology Conference (VTC-Fall),. IEEE, 2016, [254] O. Onireti, A. Zoha, J. Moysen, A. Imran, L. Giupponi, M. A. Imran,
pp. 1–6. and A. Abu-Dayya, “A cell outage management framework for dense
55
heterogeneous networks,” IEEE Transactions on Vehicular Technology, [278] C. Wang and Z. Ma, “Design of wireless power transfer device
vol. 65, no. 4, pp. 2097–2113, 2016. for UAV,” IEEE International Conference on Mechatronics and
[255] S. Maghsudi and S. Stańczak, “Channel selection for network-assisted Automation, pp. 2449–2454, 2016. [Online]. Available: http://
d2d communication via no-regret bandit learning with calibrated fore- ieeexplore.ieee.org/document/7558950/
casting,” IEEE Transactions on Wireless Communications, vol. 14, [279] A. B. Junaid, Y. Lee, and Y. Kim, “Design and implementation
no. 3, pp. 1309–1322, 2015. of autonomous wireless charging station for rotary-wing UAVs,”
[256] I. Bor-Yaliniz and H. Yanikomeroglu, “The new frontier in ran het- Aerospace Science and Technology, vol. 54, pp. 253–266, 2016.
erogeneity: Multi-tier drone-cells,” IEEE Communications Magazine, [Online]. Available: http://dx.doi.org/10.1016/j.ast.2016.04.023
vol. 54, no. 11, pp. 48–55, 2016. [280] C. H. Choi, H. J. Jang, S. G. Lim, H. C. Lim, S. H. Cho, and
[257] A. Bradai, K. Singh, T. Ahmed, and T. Rasheed, “Cellular software I. Gaponov, “Automatic wireless drone charging station creating essen-
defined networking: a framework,” IEEE communications magazine, tial environment for continuous drone operation,” International Con-
vol. 53, no. 6, pp. 36–43, 2015. ference on Control, Automation and Information Sciences, (ICCAIS),
[258] X. Zhou, Z. Zhao, R. Li, Y. Zhou, T. Chen, Z. Niu, and H. Zhang, pp. 132–136, 2017.
“Toward 5g: when explosive bursts meet soft cloud,” IEEE Network, [281] S. Aldhaher, P. D. Mitcheson, J. M. Arteaga, G. Kkelis, and D. C.
vol. 28, no. 6, pp. 12–17, 2014. Yates, “Light-Weight Wireless Power Transfer for Mid-Air Charging
[259] C. Jiang, H. Zhang, Y. Ren, Z. Han, K.-C. Chen, and L. Hanzo, of Drones,” 11th European Conference on Antennas and Propagation
“Machine learning paradigms for next-generation wireless networks,” (Eucap), pp. 336–340, 2017.
IEEE Wireless Communications, vol. 24, no. 2, pp. 98–105, 2017. [282] S. Dunbar, F. Wenzl, C. Hack, R. Hafeza, H. Esfeer, F. Defay,
[260] C. Liang and F. R. Yu, “Wireless virtualization for next generation S. Prothin, D. Bajon, and Z. Popovic, “Wireless Far - Field Charging
mobile cellular networks,” IEEE wireless communications, vol. 22, of a Micro - UAV,” pp. 7–10, 2015.
no. 1, pp. 61–69, 2015. [283] T. M. Mostafa, A. Muharam, and R. Hattori, “Wireless battery charging
[261] Z. Xiao, P. Xia, and X.-G. Xia, “Enabling UAV cellular with millimeter- system for drones via capacitive power transfer,” 2017 IEEE PELS
wave communication: Potentials and approaches,” IEEE Communica- Workshop on Emerging Technologies: Wireless Power Transfer, WoW
tions Magazine, vol. 54, no. 5, pp. 66–73, 2016. 2017, 2017.
[262] S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter-wave cellular [284] A. B. Junaid, A. Konoiko, Y. Zweiri, M. N. Sahinkaya, and L. Senevi-
wireless networks: Potentials and challenges,” Proceedings of the IEEE, ratne, “Autonomous wireless self-charging for multi-rotor unmanned
vol. 102, no. 3, pp. 366–385, 2014. aerial vehicles,” Energies, vol. 10, no. 6, pp. 1–14, 2017.
[263] C. Sun, X. Gao, S. Jin, M. Matthaiou, Z. Ding, and C. Xiao, “Beam [285] S. Hosseini and M. Mesbahi, “Energy-Aware Aerial Surveillance for a
division multiple access transmission for massive mimo communi- Long-Endurance Solar-Powered Unmanned Aerial Vehicles,” Journal
cations,” IEEE Transactions on Communications, vol. 63, no. 6, pp. of Guidance, Control, and Dynamics, vol. 39, no. 9, pp. 1–14, 2016.
2170–2184, 2015. [Online]. Available: http://dx.doi.org/10.2514/1.G001737{%}5Cnhttp:
[264] D. Cohen, “Facebooks connectivity lab: Drones, planes, satellites, //arc.aiaa.org/doi/abs/10.2514/1.G001737?journalCode=jgcd
lasers to further internet.org mission of bringing connectivity to the [286] J.-S. Lee and K.-H. Yu, “Optimal Path Planning of Solar-Powered
whole world,” (Accessed on December 2017). [Online]. Available: UAV Using Gravitational Potential Energy,” IEEE Transactions on
https://http://www.adweek.com/digital/connectivity-lab/ Aerospace and Electronic Systems, vol. 53, no. 3, pp. 1442–1451, 2017.
[265] Mobileeurope, “Facebook targets free space optical tech to [Online]. Available: http://ieeexplore.ieee.org/document/7859311/
connect the unconnected,” (Accessed on December 2017). [287] X. Z. Gao, Z. X. Hou, Z. Guo, J. X. Liu, and X. Q. Chen, “Energy
[Online]. Available: https://www.mobileeurope.co.uk/press-wire/ management strategy for solar-powered high-altitude long-endurance
facebook-targets-free-space-optical-tech-to-connect-the-unconnected aircraft,” Energy Conversion and Management, vol. 70, pp. 20–30,
[266] Ericsson, “Ericsson report optimizing the indoor experience, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.enconman.2013.
http://www.ericsson.com/res/docs/2013/real-performance-indoors.pdf,” 01.007
2013.
[288] Y. Huang, H. Wang, and P. Yao, “Energy-optimal path planning for
[267] Alcatel, “In-building wireless: One size does not fit all,
Solar-powered UAV with tracking moving ground target,” Aerospace
http://www.alcatel-lucent.com/solutions/in-building/in-building-
Science and Technology, vol. 53, pp. 241–251, 2016. [Online].
infographic.”
Available: http://dx.doi.org/10.1016/j.ast.2016.03.024
[268] Cisco, “Cisco service provider Wi-Fi: A platform
for business innovation and revenue generation, [289] S. C. Spangelo and E. G. Gilbert, “Power Optimization of Solar-
http://www.cisco.com/c/en/us/solutions/collateral/service- Powered Aircraft with Specified Closed Ground Tracks,” Journal
provider/service-provider-wi-fi/solution overview c22 642482.html.” of Aircraft, vol. 50, no. 1, pp. 232–238, 2013. [Online]. Available:
http://arc.aiaa.org/doi/abs/10.2514/1.C031757
[269] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device
communication in cellular networks,” IEEE Communications Surveys [290] A. T. Klesh and P. T. Kabamba, “Energy-optimal path planning for
& Tutorials, vol. 16, no. 4, pp. 1801–1819, 2014. Solar-powered aircraft in level flight,” AIAA Guidance, Navigation, and
[270] B. Saha, E. Koshimoto, C. C. Quach, E. F. Hogge, T. H. Strom, B. L. Control Conference,, vol. 3, no. August, pp. 2966–2982, 2007.
Hill, S. L. Vazquez, and K. Goebel, “Battery health management system [291] A. Chakrabarty and J. W. Langelaan, “Energy-Based Long-Range Path
for electric UAVs,” IEEE Aerospace Conference, pp. 1–9, 2011. Planning for Soaring-Capable Unmanned Aerial Vehicles,” Journal of
[271] S. Park, L. Zhang, and S. Chakraborty, “Battery assignment and Guidance, Control, and Dynamics, vol. 34, no. 4, pp. 1002–1015,
scheduling for drone delivery businesses,” Proceedings of the Inter- 2011. [Online]. Available: http://arc.aiaa.org/doi/10.2514/1.52738
national Symposium on Low Power Electronics and Design, 2017. [292] P. Oettershagen, J. Förster, L. Wirth, J. Ambühl, and R. Siegwart,
[272] K. A. Swieringa, C. B. Hanson, J. R. Richardson, J. D. White, Z. Hasan, “Meteorology-Aware Multi-Goal Path Planning for Large-Scale
E. Qian, and A. Girard, “Autonomous battery swapping system for Inspection Missions with Long-Endurance Solar-Powered Aircraft,”
small-scale helicopters,” Proceedings - IEEE International Conference 2017. [Online]. Available: http://arxiv.org/abs/1711.10328
on Robotics and Automation, pp. 3335–3340, 2010. [293] B. Lee, S. Kwon, P. Park, and K. Kim, “Active power management
[273] B. Michini, T. Toksoz, J. Redding, M. Michini, J. How, M. Vavrina, and system for an unmanned aerial vehicle powered by solar cells, a fuel
J. Vian, “Automated Battery Swap and Recharge to Enable Persistent cell, and batteries,” IEEE Transactions on Aerospace and Electronic
UAV Missions,” Infotech@Aerospace 2011, no. March, pp. 1–10, 2011. Systems, vol. 50, no. 4, pp. 3167–3177, 2014.
[Online]. Available: http://arc.aiaa.org/doi/abs/10.2514/6.2011-1405 [294] R. D’Sa, D. Jenson, T. Henderson, J. Kilian, B. Schulz, M. Calvert,
[274] K. A. Suzuki, P. Kemper Filho, and J. R. Morrison, “Automatic T. Heller, and N. Papanikolopoulos, “SUAV:Q - An improved design
battery replacement system for UAVs: Analysis and design,” Journal for a transformable solar-powered UAV,” IEEE International Confer-
of Intelligent and Robotic Systems: Theory and Applications, vol. 65, ence on Intelligent Robots and Systems, vol. 2016-November, pp. 1609–
no. 1-4, pp. 563–586, 2012. 1615, 2016.
[275] D. Lee, J. Zhou, and W. T. Lin, “Autonomous battery swapping sys- [295] R. D’Sa, T. Henderson, D. Jenson, M. Calvert, T. Heller, B. Schulz,
tem for quadcopter,” International Conference on Unmanned Aircraft J. Kilian, and N. Papanikolopoulos, “Design and experiments for a
Systems, (ICUAS), pp. 118–124, 2015. transformable solar-UAV,” Proceedings - IEEE International Confer-
[276] N. K. Ure, G. Chowdhary, T. Toksoz, J. P. How, M. A. Vavrina, and ence on Robotics and Automation, pp. 3917–3923, 2017.
J. Vian, “An automated battery management system to enable persistent [296] L. Gupta, R. Jain, and G. Vaszkun, “Survey of Important Issues in
missions with multiple aerial vehicles,” IEEE/ASME Transactions on UAV Communication Networks,” IEEE Communications Surveys and
Mechatronics, vol. 20, no. 1, pp. 275–286, 2015. Tutorials, vol. 18, no. 2, pp. 1123–1152, 2016.
[277] M. Simic, C. Bil, and V. Vojisavljevic, “Investigation in wireless [297] M. A. Messous, S. M. Senouci, and H. Sedjelmaci, “Network con-
power transmission for UAV charging,” Procedia Computer Science, nectivity and area coverage for UAV fleet mobility model with energy
vol. 60, no. 1, pp. 1846–1855, 2015. [Online]. Available: http: constraint,” IEEE Wireless Communications and Networking Confer-
//dx.doi.org/10.1016/j.procs.2015.08.295 ence, WCNC, vol. 2016-September, no. Wcnc, 2016.
56
[298] B. Zhang, C. H. Liu, J. Tang, Z. Xu, J. Ma, and W. Wang, “Learning- [320] R. Clarke and L. B. Moses, “The regulation of civilian drones’ impacts
based Energy-Efficient Data Collection by Unmanned Vehicles on public safety,” Computer Law & Security Review, vol. 30, no. 3,
in Smart Cities,” IEEE Transactions on Industrial Informatics, pp. 263–285, 2014.
vol. 3203, no. c, pp. 1–1, 2017. [Online]. Available: http: [321] K. Archick, R. F. Grimmett, and S. Kan, “European union’s arms
//ieeexplore.ieee.org/document/8207610/ embargo on china: Implications and options for us policy. crs report
[299] Y. Choi, H. Jimenez, and D. N. Mavris, “Two-layer obstacle to congress.” LIBRARY OF CONGRESS WASHINGTON DC
collision avoidance with machine learning for more energy- CONGRESSIONAL RESEARCH SERVICE, 2005.
efficient unmanned aircraft trajectories,” Robotics and Autonomous [322] M. H. Tareque, M. S. Hossain, and M. Atiquzzaman, “On the routing in
Systems, vol. 98, pp. 158–173, 2017. [Online]. Available: http: flying ad hoc networks,” in Federated Conference on Computer Science
//dx.doi.org/10.1016/j.robot.2017.09.004 and Information Systems (FedCSIS). IEEE, 2015, pp. 1–9.
[300] A. R. Lacher, D. R. Maroney, A. D. Zeitlin et al., “Unmanned aircraft [323] O. K. Sahingoz, “Networking models in flying ad-hoc networks
collision avoidance–technology assessment and evaluation methods,” in (FANETs): Concepts and challenges,” Journal of Intelligent & Robotic
FAA EUROCONTROL ATM R&D Symposium, Barcelona, Spain, 2007. Systems, vol. 74, no. 1-2, p. 513, 2014.
[301] J.-W. Park, H.-D. Oh, and M.-J. Tahk, “UAV collision avoidance based [324] T. Winter, “RPL: IPv6 routing protocol for low-power and lossy
on geometric approach,” in SICE Annual Conference,. IEEE, 2008, networks,” 2012.
pp. 2122–2126. [325] R. Kirichek, A. Vladyko, M. Zakharov, and A. Koucheryavy, “Model
[302] A. Mujumdar and R. Padhi, “Nonlinear geometric and differential networks for internet of things and SDN,” in 18th International
geometric guidance of UAVs for reactive collision avoidance,” INDIAN Conference on Advanced Communication Technology (CACT),. IEEE,
INST OF SCIENCE BANGALORE (INDIA), Tech. Rep., 2009. 2016, pp. 76–79.
[303] O. Khatib, “Real-time obstacle avoidance for manipulators and mobile [326] K. J. White, E. Denney, M. D. Knudson, A. K. Mamerides, and D. P.
robots,” The international journal of robotics research, vol. 5, no. 1, Pezaros, “A programmable SDN+ NFV-based architecture for uav
pp. 90–98, 1986. telemetry monitoring,” in Consumer Communications & Networking
[304] J. B. Saunders, Obstacle avoidance, visual automatic target tracking, Conference (CCNC), 2017 14th IEEE Annual, 2017, pp. 522–527.
and task allocation for small unmanned air vehicles. Brigham Young [327] S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst,
University, 2009. K. Scott, and H. Weiss, “Delay-tolerant networking: an approach
[305] C. Luo, S. I. McClean, G. Parr, L. Teacy, and R. De Nardi, “UAV to interplanetary internet,” IEEE Communications Magazine, vol. 41,
position estimation and collision avoidance using the extended kalman no. 6, pp. 128–136, 2003.
filter,” IEEE Transactions on Vehicular Technology, vol. 62, no. 6, pp. [328] J. Loo, J. L. Mauri, and J. H. Ortiz, Mobile ad hoc networks: current
2749–2762, 2013. status and future trends. CRC Press, 2016.
[306] A. Chakravarthy and D. Ghose, “Obstacle avoidance in a dynamic en- [329] F. Warthman et al., “Delay-and disruption-tolerant networks (DTNs),”
vironment: A collision cone approach,” IEEE Transactions on Systems, A Tutorial. V.. 0, Interplanetary Internet Special Interest Group, 2012.
Man, and Cybernetics-Part A: Systems and Humans, vol. 28, no. 5, pp. [330] K. Fall, K. L. Scott, S. C. Burleigh, L. Torgerson, A. J. Hooke,
562–574, 1998. H. S. Weiss, R. C. Durst, and V. Cerf, “Delay-tolerant networking
[307] L. E. Dubins, “On curves of minimal length with a constraint on architecture,” 2007.
average curvature, and with prescribed initial and terminal positions [331] M. Le, J.-S. Park, and M. Gerla, “UAV assisted disruption tolerant
and tangents,” American Journal of mathematics, vol. 79, no. 3, pp. routing,” in Military Communications Conference. MILCOM 2006.
497–516, 1957. IEEE, 2006, pp. 1–5.
[308] M. Shanmugavel, A. Tsourdos, B. White, and R. Żbikowski, “Co- [332] K. L. Scott and S. Burleigh, “Bundle protocol specification,” 2007.
operative path planning of multiple UAVs using dubins paths with
clothoid arcs,” Control Engineering Practice, vol. 18, no. 9, pp. 1084– [333] S. Burleigh, M. Ramadas, and S. Farrell, “Licklider transmission
1092, 2010. protocol-motivation,” Tech. Rep., 2008.
[309] M. Jun and R. DAndrea, “Path planning for unmanned aerial vehicles [334] S. P. Protocol, “Recommendation for space data system standards,”
in uncertain and adversarial environments,” in Cooperative control: CCSDS 133.0-B-1. Blue Book, Tech. Rep., 2003.
models, applications and algorithms. Springer, 2003, pp. 95–110. [335] Z. Yang, R. Wang, Q. Yu, X. Sun, M. De Sanctis, Q. Zhang, J. Hu, and
[310] K. Schmid, T. Tomic, F. Ruess, H. Hirschmüller, and M. Suppa, “Stereo K. Zhao, “Analytical characterization of licklider transmission protocol
vision based indoor/outdoor navigation for flying robots,” in IEEE/RSJ (LTP) in cislunar communications,” IEEE Transactions on Aerospace
International Conference on Intelligent Robots and Systems (IROS),. and Electronic Systems, vol. 50, no. 3, pp. 2019–2031, 2014.
IEEE, 2013, pp. 3955–3962. [336] M. Demmer, J. Ott, and S. Perreault, “Delay-tolerant networking tcp
[311] H. Alvarez, L. M. Paz, J. Sturm, and D. Cremers, “Collision avoidance convergence-layer protocol,” Tech. Rep., 2014.
for quadrotors with a monocular camera,” in Experimental Robotics. [337] H. Kruse and S. Ostermann, “UDP convergence layers for the DTN
Springer, 2016, pp. 195–209. bundle and LTP protocols,” IETF Draft, 2008.
[312] K. Schmid, P. Lutz, T. Tomić, E. Mair, and H. Hirschmüller, “Au- [338] R. Wang, T. Taleb, A. Jamalipour, and B. Sun, “Protocols for reliable
tonomous vision-based micro air vehicle for indoor and outdoor data transport in space internet,” IEEE Communications Surveys &
navigation,” Journal of Field Robotics, vol. 31, no. 4, pp. 537–570, Tutorials, vol. 11, no. 2, 2009.
2014. [339] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, “Network function
[313] Y. M. Mustafah, A. W. Azman, and F. Akbar, “Indoor UAV positioning virtualization: Challenges and opportunities for innovations,” IEEE
using stereo vision sensor,” Procedia Engineering, vol. 41, pp. 575– Communications Magazine, vol. 53, no. 2, pp. 90–97, 2015.
579, 2012. [340] R. Jain and S. Paul, “Network virtualization and software defined
[314] S. Roelofsen, D. Gillet, and A. Martinoli, “Reciprocal collision avoid- networking for cloud computing: a survey,” IEEE Communications
ance for quadrotors using on-board visual detection,” in IEEE/RSJ Magazine, vol. 51, no. 11, pp. 24–31, 2013.
International Conference on Intelligent Robots and Systems (IROS),. [341] C. Rametta and G. Schembra, “Designing a softwarized network
IEEE, 2015, pp. 4810–4817. deployed on a fleet of drones for rural zone monitoring,” Future
[315] Y. Kuriki and T. Namerikawa, “Consensus-based cooperative formation Internet, vol. 9, no. 1, p. 8, 2017.
control with collision avoidance for a multi-UAV system,” in American [342] D. Zhao, M. Zhu, and M. Xu, “Leveraging SDN and openflow to
Control Conference, June 2014, pp. 2077–2082. mitigate interference in enterprise WLAN.” JNW, vol. 9, no. 6, pp.
[316] Y. Kuriki and T. Namerikawa, “Formation control with collision avoid- 1526–1533, 2014.
ance for a multi-UAV system using decentralized mpc and consensus- [343] N. Zhang, S. Zhang, P. Yang, O. Alhussein, W. Zhuang, and X. S.
based control,” in European Control Conference (ECC), July 2015, pp. Shen, “Software defined space-air-ground integrated vehicular net-
3079–3084. works: Challenges and solutions,” IEEE Communications Magazine,
[317] S. Griffiths, J. Saunders, A. Curtis, B. Barber, T. McLain, and R. Beard, vol. 55, no. 7, pp. 101–109, 2017.
“Obstacle and terrain avoidance for miniature aerial vehicles,” in [344] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
Advances in Unmanned Aerial Vehicles. Springer, 2007, pp. 213– J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation
244. in campus networks,” ACM SIGCOMM Computer Communication
[318] K. Chee and Z. Zhong, “Control, navigation and collision avoidance Review, vol. 38, no. 2, pp. 69–74, 2008.
for an unmanned aerial vehicle,” Sensors and Actuators A: Physical, [345] T. Rault, A. Bouabdallah, and Y. Challal, “Multi-hop wireless charg-
vol. 190, pp. 66–76, 2013. ing optimization in low-power networks,” in Global Communications
[319] N. Gageik, T. Müller, and S. Montenegro, “Obstacle detection and Conference (GLOBECOM),. IEEE, 2013, pp. 462–467.
collision avoidance using ultrasonic distance sensors for an autonomous [346] M. C. Domingo, “An overview of the internet of things for people with
quadrocopter,” University of Würzburg, Aerospace Information Tech- disabilities,” Journal of Network and Computer Applications, vol. 35,
nology (Germany) Würzburg September, 2012. no. 2, pp. 584–596, 2012.
57
[347] W. Zafar and B. M. Khan, “A reliable, delay bounded and less Hazim Shakhatreh is a Ph.D. student at the ECE
complex communication protocol for multicluster FANETs,” Digital department of New Jersey Institute of Technology.
Communications and Networks, vol. 3, no. 1, pp. 30–38, 2017. He received the B.S. degree and M.S. degree in
[348] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” wireless communications engineering from Yarmouk
Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010. University, Jordan, in 2008 and 2012, respectively.
[349] W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, “A survey His research interests include wireless communi-
on software-defined networking,” IEEE Communications Surveys & cations and emerging technologies with focus on
Tutorials, vol. 17, no. 1, pp. 27–51, 2015. Unmanned Aerial Vehicle (UAV) networks.
[350] W. D. Ivancic, D. E. Stewart, D. V. Sullivan, and P. E. Finch, “An
evaluation of protocols for UAV science applications,” 2012.
[351] A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam, “Cyber
security threat analysis and modeling of an unmanned aerial vehicle
system,” in IEEE Conference on Technologies for Homeland Security
(HST),. IEEE, 2012, pp. 585–590.
[352] S. M. Giray, “Anatomy of unmanned aerial vehicle hijacking with
signal spoofing,” in 6th International Conference on Recent Advances
in Space Technologies (RAST),. IEEE, 2013, pp. 795–800.
[353] A. Y. Javaid, W. Sun, and M. Alam, “UAVSim: A simulation testbed for
unmanned aerial vehicle network cyber security analysis,” in Globecom Ahmad H. Sawalmeh is a PhD student at the
Workshops (GC Wkshps), 2013 IEEE. IEEE, 2013, pp. 1432–1436. Engineering College of Universiti Tenaga Nasional
[354] J. Goppert, A. Shull, N. Sathyamoorthy, W. Liu, I. Hwang, and (UNITEN), Malaysia. He received his M.S. degree
H. Aldridge, “Software/hardware-in-the-loop analysis of cyberattacks in Computer Engineering from Jordan University of
on unmanned aerial systems,” Journal of Aerospace Information Sys- Science and Technology in 2005. He also received
tems, 2014. his B.S. degree from Jordan University of Science
[355] J.-A. Maxa, M. S. B. Mahmoud, and N. Larrieu, “Secure routing and Technology in 2003. He worked as a lecturer
protocol design for UAV ad hoc networks,” in IEEE/AIAA 34th Digital in the Computer Department at the Technical Vo-
Avionics Systems Conference (DASC),. IEEE, 2015, pp. 4A5–1. cational Training Corporation (TVTC), Kingdom of
[356] J. Schumann, P. Moosbrugger, and K. Y. Rozier, “R2u2: monitoring and Saudi Arabia from 2006 2016. His research interests
diagnosis of security threats for unmanned aerial systems,” in Runtime include wireless communications, UAVs networks
Verification. Springer, 2015, pp. 233–249. and Flying Ad-Hoc Networks (FANETs).
[357] Z. Birnbaum, A. Dolgikh, V. Skormin, E. O’Brien, D. Muller, and
C. Stracquodaine, “Unmanned aerial vehicle security using behavioral
profiling,” in International Conference on Unmanned Aircraft Systems
(ICUAS),. IEEE, 2015, pp. 1310–1319.
[358] F. A. G. Muzzi, P. R. de Mello Cardoso, D. F. Pigatto, and K. R. L.
J. C. Branco, “Using botnets to provide security for safety critical
embedded systems-a case study focused on UAVs,” in Journal of
Physics: Conference Series, vol. 633, no. 1. IOP Publishing, 2015, p.
Ala Al-Fuqaha (S’00-M’04-SM’09) received his
012053.
M.S. and Ph.D. degrees in Electrical and Com-
[359] H. Sedjelmaci, S. M. Senouci, and M.-A. Messous, “How to detect
puter Engineering from the University of Missouri-
cyber-attacks in unmanned aerial vehicles network?” in Global Com-
Columbia and the University of Missouri-Kansas
munications Conference (GLOBECOM),. IEEE, 2016, pp. 1–6.
City, in 1999 and 2004, respectively. Currently, he
[360] D. Davidson, H. Wu, R. Jellinek, V. Singh, and T. Ristenpart, “Con-
is Professor and director of NEST Research Lab
trolling UAVs with sensor input spoofing attacks.” in WOOT, 2016.
at the Computer Science Department of Western
[361] M. A. Fischler and R. C. Bolles, “Random sample consensus: a
Michigan University. His research interests include
paradigm for model fitting with applications to image analysis and
Wireless Vehicular Networks (VANETs), coopera-
automated cartography,” Communications of the ACM, vol. 24, no. 6,
tion and spectrum access etiquettes in cognitive
pp. 381–395, 1981.
radio networks, smart services in support of the
[362] J. McNeely, M. Hatfield, A. Hasan, and N. Jahan, “Detection of UAV
Internet of Things, management and planning of software defined networks
hijacking and malfunctions via variations in flight data statistics,” in
(SDN) and performance analysis and evaluation of high-speed computer and
International Carnahan Conference on Security Technology (ICCST),.
telecommunications networks. In 2014, he was the recipient of the outstanding
IEEE, 2016, pp. 1–8.
researcher award at the college of Engineering and Applied Sciences of
[363] S. Hagerman, A. Andrews, and S. Oakes, “Security testing of an
Western Michigan University. He is currently serving on the editorial board
unmanned aerial vehicle (UAV),” in Cybersecurity Symposium (CY-
for John Wileys Security and Communication Networks Journal, John Wileys
BERSEC), 2016. IEEE, 2016, pp. 26–31.
Wireless Communications and Mobile Computing Journal, EAI Transactions
[364] N. M. Rodday, R. d. O. Schmidt, and A. Pras, “Exploring security
on Industrial Networks and Intelligent Systems, and International Journal of
vulnerabilities of unmanned aerial vehicles,” in Network Operations
Computing and Digital Systems. He is a senior member of the IEEE and
and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, 2016,
has served as Technical Program Committee member and reviewer of many
pp. 993–994.
international conferences and journals.
[365] G. Wang, B.-S. Lee, and J. Y. Ahn, “Authentication and key man-
agement in an lte-based unmanned aerial system control and non-
payload communication network,” in International Conference on
Future Internet of Things and Cloud Workshops (FiCloudW),. IEEE,
2016, pp. 355–360.
[366] M. Podhradsky, C. Coopmans, and N. Hoffer, “Improving communi-
cation security of open source UAVs: Encrypting radio control link,”
in International Conference on Unmanned Aircraft Systems (ICUAS),.
IEEE, 2017, pp. 1153–1159. Zuochao Dou received his B.S. degree in Electron-
ics in 2009 at Beijing University of Technology.
From 2009 to 2011, he studied at University of
Southern Denmark, concentrating on embedded con-
trol systems for his M.S degree. Then, he received
his second M.S. degree at University of Rochester
in 2013 majoring in communications and signal pro-
cessing. He is currently working towards his Ph.D.
degree in the area of cloud computing security and
network security with the guidance of Dr. Abdallah
Khreishah and Dr. Issa Khalil.
58
Eyad Almaita received the B.Sc. from the Al-Balqa Mohsen Guizani (S’85, M’89, SM’99, F’09) re-
Applied University, Jordan in 2000, M.Sc. from Al- ceived his B.S. (with distinction) and M.S. degrees
Yarmouk University, Jordan in 2006, Ph.D. from in electrical engineering, and M.S. and Ph.D. degrees
Western Michigan University, USA in 2012. He is in computer engineering from Syracuse University,
now serving as associate professor at Mechatronics New York, in 1984, 1986, 1987, and 1990, respec-
and power engineering dept. in Tafila Technical Uni- tively. He is currently a professor and ECE Depart-
versity, Jordan. His research interests include energy ment Chair at the University of Idaho. Previously,
efficient systems, smart systems, power quality, and he served as the associate vice president of Graduate
artificial intelligence. Studies and Research, Qatar University, chair of the
Computer Science Department, Western Michigan
University, and chair of the Computer Science De-
partment, University of West Florida. He also served in academic positions
at the University of Missouri-Kansas City, University of Colorado-Boulder,
Syracuse University, and Kuwait University. His research interests include
wireless communications and mobile computing, computer networks, mobile
cloud computing, security, and smart grid. He currently serves on the Editorial
Boards of several international technical journals, and is the Founder and
Issa Khalil received PhD degree in Computer En- Editor-in-Chief of Wireless Communications and Mobile Computing (Wiley).
gineering from Purdue University, USA in 2007. He is the author of nine books and more than 400 publications in refereed
Immediately thereafter he joined the College of journals and conferences. He has guest edited a number of special issues
Information Technology (CIT) of the United Arab in IEEE journals and magazines. He has also served as a member, Chair,
Emirates University (UAEU) where he served as and the General Chair of a number of international conferences. He was
an associate professor and department head of the selected as the Best Teaching Assistant for two consecutive years at Syracuse
Information Security Department. In 2013, Khalil University. He was Chair of the IEEE Communications Society Wireless
joined the Cyber Security Group in the Qatar Com- Technical Committee and TAOS Technical Committee. He served as an IEEE
puting Research Institute (QCRI), a member of Qatar Computer Society Distinguished Speaker from 2003 to 2005.
Foundation, as a Senior Scientist, and a Principal
Scientist since 2016. Khalils research interests span
the areas of wireless and wireline network security and privacy. He is
especially interested in security data analytics, network security, and private
data sharing. His novel technique to discover malicious domains following
the guilt-by-association social principle attracts the attention of local media
and stakeholders, and received the best paper award in CODASPY 2018.
Dr. Khalil served as organizer, technical program committee member and
reviewer for many international conferences and journals. He is a senior
member of IEEE and member of ACM and delivers invited talks and keynotes
in many local and international forums. In June 2011, Khalil was granted the
CIT outstanding professor award for outstanding performance in research,
teaching, and service.