SARDO An Automated Search-And-Rescue Drone-Based S
SARDO An Automated Search-And-Rescue Drone-Based S
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
Abstract—Natural disasters affect millions of people every year. Finding missing persons in the shortest possible time is of crucial
importance to reduce the death toll. This task is especially challenging when victims are sparsely distributed in large and/or
difficult-to-reach areas and cellular networks are down.
In this paper we present SARDO, a drone-based search and rescue solution that leverages the high penetration rate of mobile phones
in the society to localize missing people. SARDO is an autonomous, all-in-one drone-based mobile network solution that does not
require infrastructure support or mobile phones modifications. It builds on novel concepts such as pseudo-trilateration combined with
machine-learning techniques to efficiently locate mobile phones in a given area. Our results, with a prototype implementation in a
field-trial [1], show that SARDO rapidly determines the location of mobile phones (∼ 3 min/UE) in a given area with an accuracy of few
tens of meters and at a low battery consumption cost (∼ 5%).
State-of-the-art localization solutions for disaster scenarios rely either on mobile infrastructure support or exploit onboard cameras for
human/computer vision, IR, thermal-based localization. To the best of our knowledge, SARDO is the first drone-based cellular
search-and-rescue solution able to accurately localize missing victims through mobile phones.
Index Terms—UAV-based cellular coverage, Search and Rescue Operations, Single-UAV localization, Pseudo-Trilateration,
Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM).
1 I NTRODUCTION e.g., smart phones and wearables, that can be detected by UAV
mobile networks.
When a natural disaster unexpectedly strikes, the most compelling Currently, the users Global Navigation Satellite System
challenge is to quickly establish a first contact with affected (GNSS)-based positions are not directly accessible by network
victims that might be trapped or hidden from rescue teams without providers as 3rd Generation Partnership Project (3GPP) standards
any possibility to communicate. It is estimated that in 2017, do not include any Application Programming Interface (API) for
335 natural disasters affected over 95.6 million people, killing this purpose. Specifically, the only way for a network provider
an additional 9, 697 and costing a total of 335 billion USD. to obtain such information would be a client application running
The deadliest event in 2017 was the landslide in Sierra Leone on each User Equipment (UE) thereby actively making its GNSS
in August, with 1102 reported dead or missing, followed by position available. Conversely, while building an emergency local-
Cyclone Okchi in December with 884 reported dead or missing ization system, we may not rely on any active users intervention or
in India. Notably, these two events are characterized by a high client application running on the UEs, but rather seek a standalone
number of missing people, representing over half of the total death design to cope with the unexpected events of a disaster. Moreover,
toll [2]. In addition to natural disasters, human-generated threats GNSS signals may be heavily attenuated by debris or rubble,
(e.g. fires, electrical outages, terrorism) might as well require ad- which would likely not completely block the cellular coverage
hoc solutions to improve first responders’ capabilities and further provided by a UAV hovering close enough to the victims UEs.
support their modus operandi within such critical situations. As additional attenuation may be introduced by tree foliage, metal
Unmanned Aerial Vehicles (UAVs) or Drones have recently or wooden objects, few centimeters of water, shadowing in urban
emerged as a cost-efficient alternative to address emergency canyons and so on, GNSS is unreliable for such a mission critical
scenarios for multiple reasons [3]. First, UAVs can be rapidly operation [4].
deployed in disaster areas providing on-demand mobile networks. In this paper, we present our Search-And-Rescue DrOne-
Second, UAVs may rapidly approach difficult-to-reach locations, based solution, SARDO, an all-in-one localization system that
such as mountains, deserts, or devastated areas and cover large supports first responders to quickly identify and localize victims
search areas with sparse victims distribution. Finally, given the in disaster areas even if the terrestrial communication network is
high penetration rate of mobile devices in our society, it can be down in the aftermath of a natural disaster. SARDO i) scans and
reasonably assumed that victims are equipped with smart devices, spots target users by means of an integrated International-Mobile-
Subscriber-Identity(IMSI)-catcher, ii) applies machine-learning
A. Albanese is with NEC Laboratories Europe and University Carlos III of principles on the distance measurements to perform our novel
Madrid, 28911 Leganés, Spain. pseudo-trilateration localization technique, iii) relies on a neural
V. Sciancalepore is with NEC Laboratories Europe, Heidelberg, Germany. network to predict future target positions, iv ) closes the feedback
X. Costa-Pérez is with NEC Laboratories Europe, i2CAT Foundation and
ICREA, Barcelona, Spain. loop with a control component that automatically adjusts the UAV
Emails: {antonio.albanese, vincenzo.sciancalepore, xavier.costa}@neclab.eu. trajectory for improving the localization accuracy. SARDO has
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
2
been implemented and tested in a field-trial scenario with com- ToF measurements User position
mercial off-the-shelf (COTS) components [1]. Our results prove process estimate
Disaster area Time-stamp
the feasibility of the solution and provide quantitative system coordinates User position
performance figures.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
3
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
4
Mobile anchor
(a) 2D localization problem with static (b) 2D localization problem with static (c) 2D localization problem with mo- (d) 2D localization problem with mo-
target and single solution target and double solution bile target and single solution bile target and double solution
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
5
0
but still linear, the optimization problem results in two distinct 210
optimal solutions. 180
25
row index
Distance [m]
Analogously, in 3-dimensional space the motion trajectory 150
50
affects the solution of Problem 1. In this case, when the anchor
direction is linear and the target position is static, there are infinite 120
m
75
optimal solutions that geometrically lie on the circumference 90
centered on the motion trajectory line, orthogonal to it and passing
0 25 50 75 100
100
through the target position, as depicted in Fig. 2(e). When the tar- m column index
get moves, all solutions lie on analogously defined circumferences
as depicted in Fig. 2(f). Fig. 3. Heatmap of matrix Γm of distance measurements in a single-
As a result, to avoid ambiguity in the solution of Problem 1, obstacle scenario.
based on Theorem 2 the anchor trajectory must change its direc- the UAV trajectory, we concatenate each Γm with a matrix Dm
tion within a finite time. Nevertheless, this may cause the mobile that contains the 3D coordinates of all UAV measurements spots,
anchor to get far away from the target reducing the receive signal- as depicted in the following. We name the above mentioned matrix
to-noise ratio and so the accuracy. Therefore, we rely on a close Φm and express it as follows
trajectory of the mobile anchor. For the sake of simplicity, we (1) (1)
model the anchor trajectory as circular. γ̂1 . . . γ̂L x1 y1 z1
(2) (2)
While considering shortest paths in our calculation may appear γ̂1 . . . γ̂L x2 y2 z2
reasonable, in this work we go one step beyond by proposing Φm = .. .. .. .. .. .
.. (9)
. . . . . .
in the next section an AI-based localization system that applies (N ) (N )
the pseudo-trilateration method, automatically learns the common γ̂1 ... γ̂L xN yN zN
| {z }
motion behaviors and calculates the positions with high accuracy.
| {z }
Γm Dm
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
6
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
7
UAV Smartphone
DJI Matrice Intel NUC SARDO
UAV Locations
UAV Trajectory User Trajectory
Relay
GPS module 2D CNN DJI SDK
②
① ③
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
8
UE UAV eNB UAV MME cause #10: Implicitly detached. In this way, the UAV
Listening to SIB 4,5,6,7
MME advertises that the UE is set to deregistered state forcing
the UE to perform a new Attach Procedure. The UE sends
an ATTACH_REQUEST message to the UAV MME containing
Set highest priority only temporary identity information, e.g., the Globally Unique
frequency Temporary Identifier (GUTI).
Once the Globally Unique Temporary Identifier (GUTI) is re-
Set different TAC
ceived, the UAV MME sends an IDENTITY_REQUEST message,
TAU_REQUEST notifying its inability to derive the UE IMSI from its temporary
TAU_REJECT (code 10) identity information. The UE responds with its real IMSI in the
next IDENTITY_RESPONSE message.
Deregistered State After having received the IMSI, being the UAV not able to
ATTACH_REQUEST (GUTI) authenticate the UE because of missing authentication information
IDENTITY_REQUEST
in the Home Subscriber Server (HSS), the Attachment Procedure
is dropped with an ATTACH_REJECT. Albeit the UE fails to
IDENTITY_RESPONSE (IMSI)
attach with the UAV, it exchanges many messages making use
Unable to of several physical layer channels. In particular, we focus our
authenticate UE analysis on the Physical Uplink Shared CHannel (PUSCH) on
ATTACH_REJECT
which the so-called DeModulation Reference Signal (DMRS) is
periodically transmitted. This Reference Signal allows the UAV
Fig. 8. IMSI-Catcher message sequence chart to successfully demodulate the PUSCH that, in the following, is
exploited to perform UE distance measurements. As a high-speed
RRC layer is responsible for radio resource configuration and data connection is never established between the UAV and the
mobility management of connected UEs. In addition, RRC serves UE, this approach may be readily extended to several UEs without
as transport protocol for Non-Access Stratum (NAS) signaling saturating SARDO computing capabilities.
messages between a UE and its Mobile Management Entity
(MME).
We introduce specific changes to the srsLTE software but keep 6.2 Tunable precision
our system in full compliance with 3GPP standard guidelines. The UAV stores its current GNSS position (e.g., GPS) infor-
We update the NAS signaling10 for the Tracking Area Update mation and the uplink Demodulation Reference Signal (DMRS)
(TAU) Procedure so that the UE reveals its International Mobile received from the UE11 . The Time of Flight (ToF) is calculated
Subscriber Identity (IMSI) while exchanging messages with the by exploiting the ideal autocorrelation property of the sequences
base station, i.e., our UAV cell. In this way, it is straightforward used for DMRS. Indeed, the DMRS uses Constant-Amplitude-
to identify the UE and start the localization process within a short Zero-Autocorrelation (CAZAC) sequences known as Zadoff-Chu
disruption time window. Such an identity-awareness feature opens (ZC) [24]. Theh ZC sequence of odd-length
i N can be written as
n(n+1)/2+ln
up new use cases, e.g. searching for specific missing people or xq (n) = exp −j2πq N , where n = 0, 1, . . . , N −1,
locating specific targets for public safety purposes. Thus, our ToF l ∈ N and q ∈ {1, . . . , N − 1} is called the ZC sequence root
measurements processing module is built as an IMSI-catcher [23]. index. For the sake of simplicity, in LTE, l is set to 0. Moreover, for
Hereafter, we detail the minimal steps of our approach. ZC sequences of any length N , the zero autocorrelation property
IMSI-catcher. The message sequence chart is depicted in holds, namely it yields the following
Fig. 8. The UAV listens to System Information Block (SIB)
N −1
messages transmitted by existing ground base stations in the X
Rxx (m) = xq (n) x∗q (n + m) = δ(m), (12)
disaster area. SIB Type 4, 5, 6 and 7 messages carry the parameters
n=0
of the Cell Reselection Procedure. Such procedure aims at moving
the UE to the best cell of the selected operator. In LTE, this is where Rxx (m) and δ(·) denote the discrete periodic autocorrela-
accomplished by letting the UE assess all the frequencies and tion function of xq (n) at lag m and the Dirac delta, respectively,
Radio Access Technologies (RATs) based on the priority list and (·)∗ denotes the complex conjugate operation.
specified in the above mentioned SIB messages and then rank them Inspired by [25], we consider the known and the received
according to the respective radio link quality. The TAU procedure DMRSs in the discrete-frequency domain, namely X(k) and
is triggered as soon as the UE selects a new Tracking Area Code Y (k), respectively. Using the cross-correlation property of the
(TAC) different from the one it is currently camping on. Therefore, Discrete Fourier Transform (DFT), we calculate the circular cross-
we setup our UAV on the highest-priority frequency. correlation of the two sequences as IDFT{X(k) Y ∗ (k)}, where
This deteriorates the received power of the serving eNB, thus IDFT{·} denotes the Inverse Discrete Fourier Transform. Thus, we
enabling the inter-frequency and inter-RAT Cell Search Procedure, look for the magnitude peak of the sequence as its position returns
which eventually leads to a Cell Reselection towards our UAV. the delay of the received DMRS. In other words, this returns the
Moreover, we set a different TAC with respect to the camping ToF of the uplink signal transmitted by the UE. Regardless of
one in order to trigger a TAU_REQUEST from the UE. To this the ideal autocorrelation property of the DMRS, this procedure
request, our UAV MME responds with a TAU_REJECT with is constrained by the sampling the frequency of the time-domain
signal. Indeed, the above mentioned cross-correlation is sampled
10. SARDO achieves the disclosure of the UE identity relying on a design
choice of the current LTE standard. However, next cellular network generations 11. We have amended the public source code of srsLTE [18] to implement
may natively provide such information. the IMSI-catcher procedure and the ToF calculations.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
9
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
10
Error [m]
3 m/s
y [m]
4 m/s 1.0
1 1
0.5
1 3 5 7 1 3 5 7 0 100 200 300
Time [UAV revolutions] Time [UAV revolutions] x[m]
Fig. 11. Average UAV radius over time for different Fig. 12. Average localization error over time for Fig. 13. UAV centers trajectory for two differ-
user speeds. different user speeds. ent user speeds.
enhanced localization process (as described in Section 4.2) and very few outliers around 50 m. Conversely, when rubble is in
the solution of Problem 1 when the user is moving following place we obviously observe an increased error due to scattering
the SLAW mobility model considering 100 waypoints, namely and attenuation phenomena whereas the curve behavior is still
points of interest. In particular, the optimization problem solution invariant to the number of considered waypoints. Note that the
exhibits worse performance in case of noisy channel conditions. standard deviation augments due to the worsening of the receive
The figure shows that the optimization problem seeks the shortest SNR. Counter-intuitively, the SI for both case-scenarios is close to
path between two subsequent distance measurements. However, 1: this proves the robustness of the 2D CNN estimate against the
the performance of the optimization problem strongly depends error, even in case of large error, such as the one observed with
on the initial condition, i.e., on the first position of the solution rubble.
vector. In Fig. 10, we benchmark our 2D CNN against the
optimal solution using a random initial condition as well as a true
7.3 SARDO stability performance
localization value (only for the first point of the solution vector).
In addition, we evaluate the optimization problem solution when Being SARDO a closed-loop system, we evaluate its performance
noisy or ideal channel conditions are considered. As shown, the over time considering multiple UAV revolutions. For this purpose,
2D CNN outperforms the optimization problem with noisy and we simulate several scenarios with different average user speeds.
ideal channel conditions by a factor of 2 and 6, respectively. Note that the time is indexed by performed UAV revolutions
and that, being the UAV speed constant, the revolution time is
7.2 Pseudo-trilateration validation proportional to the trajectory radius.
The localization error increases with the user speed, being
We show the robustness of the introduced 2D CNN against diverse
the UAV speed set to the maximum user speed that allows for a
channel fading settings and user trajectories, the latter being
reasonably accurate localization. Albeit a user speed bound equal
generated by differently-tuned SLAW model instances.
to 5 m/s is compatible with a disaster scenario, it is always possible
To generate multiple user trajectories in such a way that they
to increase the UAV speed—up to 19 m/s for our particular UAV
are not correlated with the training set used during the neural
model—and cope with higher user speeds. It is worth noting that
network training phase, we set different numbers of waypoints
the localization error and the trajectory radius do not have a strictly
considered in the SLAW model. Indeed, the number of waypoints
monotonic trend due to the feedback loop that might fail and
influences how fast the user is moving and the type of motion pat-
needs to recover from previous wrong decisions, as depicted in
tern, i.e., few waypoints lead to a quasi-linear trajectory whereas
Figs. 11,12. Finally, we show in Fig. 13 the variation of the center
a huge number of waypoints drives the user to change the motion
of the UAV trajectory for both static users and 4m/s user speed
directions quite often. We let this parameter range from 100 to
scenarios. While the static user scenario allows the UAV to move
1900, being the network trained on a dataset of trajectories with
and converge exactly on the user position, a nomadic user may
100 waypoints.
drive the UAV towards different locations but, still, reducing the
1e2 trajectory radius and increasing the localization accuracy.
1
2 No rubble Rubble
Error [m]
1
Hereafter, we test SARDO in a field-trial taking real measurements
No rubble Rubble
0100 700 1300 1900 0100 700 1300 1900
with the prototype described in Section 6 in a rural area.
Number of SLAW waypoints Number of SLAW waypoints 1 1e2
static 1 m/s 2 m/s
Error [m]
115
Fig. 14. 2D CNN Localization error Fig. 15. 2D CNN Similarity index 1 88 98 98
PDF
85 84
with different channel conditions. with different channel conditions. 60 70 72
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
11
1e2 2 1e2
Error [m]
Error = 82.6 m 3.46
3.01
Radius = 100 m
1
Time = 1 min
Error = 51.1 m 2
Radius = 50 m
0.16 0.09 0.08 0.05
0 30 50 100 150 0
Time = 2 min
1 3 5 7 0 0 30 50 100
Number of UAV revolutions UAV Altitude [m] UAV Altitude [m]
Fig. 18. Time evolution of SARDO Fig. 19. Localization of a single user Fig. 20. SARDO’s localization error Fig. 21. SARDO’s impact on UAV
localiz. error for different user with SARDO in a real scenario. and time for different UAV altitudes. battery life in a real scenario.
speeds.
the authors boil down the complexity of a 3D localization system
Dataset and Neural Network. First, we show in Fig. 16
by means of a vector rotation and mobile beacon node, respec-
the distribution of a dataset containing SARDO’s distance mea-
tively, whereas visible light communication is exploited in [36],
surements for a victim in two different locations. As it can be
[37]. Recently, sensor networks have been identified as the main
observed, the obtained values (depicted as bar plots) are distributed
application for more accurate localization systems. In [38], [39],
as Gaussian variables (solid lines) with different variance. In
the authors propose a novel mechanism based on the trilateration
particular, the higher the actual distance, the higher the variance of
solution to identify and localize moving objects exploiting coop-
the distribution. In Fig. 17, we showcase the 2D CNN performance
eration between different anchor nodes. The concept of pseudo-
on real measurements collected at different UAV altitudes and
triangulation is proposed in [40] as a walk-location algorithm.
user speed values. As expected, the localization error tends to
Lastly, [41] provides a survey on localization methods applied to
increase for larger speed values and higher altitudes. As in the
different mobile network generation deployments.
rubble scenario, we have trained the neural network on a dataset
AI-based localization. The usage of machine learning tech-
generated with a fixed UAV altitude equal to 100m but we get
niques to solve localization problems has been introduced in early
similar error values for different UAV altitudes.
works like [42], where the authors compare different families of
Localization error. Hereafter, we assess the performance
neural networks against the well-known Kalman filter or in [43],
of the full SARDO prototype. Fig. 18 shows the average error
to process fingerprinting data. More recently, CNNs have inspired
evolution over time for different user speeds. Notably, the error
several works addressing the problem of indoor localization. [44]
curve exhibits a decreasing slope that proves the convergence of
demonstrates a low-cost intrusion detection mechanism built on
our solution. When the user speed gets closer to the UAV speed
COTS hardware able to detect intruders up to 99% accuracy at
(set to 5 m/s) the convergence rate reduces as the UAV trajectory
2% additional energy cost. Along these lines, [45]–[47] tackle the
radius is kept constant (or increases), as explained in Section 5.
localization accuracy in harsh environments, showing that CNNs
In Fig. 19, we report an example of a full localization process
are able to mitigate NLoS effects and obtain sub-meter accuracy
for a moving victim. In particular, the missing person moves
with Ultra Wide Band (UWB) signals. Even though Channel State
along a polygonal chain with a speed of 1m/s while the initial
Information (CSI) and Angle-of-Arrival (AoA) measurements can
UAV trajectory radius is 100m. After the first UAV revolution, the
be leveraged to perform direct localization [10], CNNs have been
radius of the UAV trajectory is set to the minimum value (50m),
used to forecast channel information [48], which could be fed to
thereby significantly reducing the localization error (from 82.6m
any system based on the trilateration technique. Differently from
to 51.1m). In this experiment, SARDO is able to localize the
the above-mentioned literature that exploits several anchor nodes,
victim within 3 minutes.
SARDO makes use a single anchor and achieves time and spatial
Rescue operations. We focus on a static victim showing
diversity by moving the UAV along controlled trajectories.
SARDO’s applicability during emergency situations. In particular,
in Fig. 20 we outline the total time needed to localize the UAV Swarms. Lately, UAVs have been gaining interest
target (upon convergence) for different UAV altitudes and the among researchers thanks to their usage flexibility even though
corresponding average localization error. It is worth noting that efficient UAV deployment procedures involve several technical
at 100m, both metrics are minimized. Such an optimal altitude is challenges [49]. Indeed, UAV trajectories should take into ac-
obtained as a trade-off between the limited aperture illumination count the flight time, energy constraints, ground users’ Quality-
(due to the antenna radiation pattern effect at low altitudes) and the of-Service (QoS) and collision avoidance requiring an iterative
low received power (due to the stronger path loss at high altitudes). complex optimization problem resolution that provides, time by
This trend is confirmed by the cell radius model derived in [28]. time, the next UAV position [50]–[52]. While building an airborne
Battery cost. Fig. 21 shows the relative cost of our solution on network, [53] compares centralized and distributed approaches,
the UAV battery life. As expected, the battery impact of SARDO while [54] sets up a two-tier mesh network to provide connectivity
decreases as the drone altitude increases. In the optimal operation in emergency conditions. UAV swarms deployment is further
point reported in Fig. 20 (100m) the value is ∼ 5%, which is a exacerbated when additional degrees of freedom, such as altitude,
reasonable cost for the added localization functionality. speed and trajectory, are introduced in the optimization process, as
discussed in [29], [50], [55]. Conversely to the above-mentioned
works, which focus on building an emergency UAV-based net-
8 R ELATED W ORK work, [56] introduces a UAV-based system for accurate (2.5 m)
Localization systems. Geo-localization has been exhaustively localization and tracking in indoor scenarios (mostly buildings)
investigated providing reasonable results in the field of positioning based on unconstrained optimization and multi-hop ad-hoc UWB
systems. A mathematical formulation of the user position based connectivity.
on multiple distance measurements is provided in [34], where a Drone-based Commercial Localization Solutions. The cur-
closed-form stochastic position algorithm is described. In [35], rently available commercial solutions, summarized in Table 3,
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
12
TABLE 3 [6] I. Leontiadis et al., “From cells to streets: Estimating mobile paths with
Relevant cutting-edge positioning solutions cellular-side data,” in Proceedings of the 10th ACM International on
Conference on Emerging Networking Experiments and Technologies, ser.
#BSs or Infrastr. CoNEXT, 2014, pp. 121–132.
Method Accuracy
#Drones agnostic [7] Naraghi-Pour et al., “A novel algorithm for distributed localization in
LTE [57] E-CID 1 5 > 150 m wireless sensor networks,” ACM Trans. Sen. Netw., vol. 11, no. 1, pp.
OTDoA ≥3 5 50 − 200 m 1:1–1:25, Sep. 2014.
A-GNSS 1 5 < 10 m
AERYON Camera (visible, human visual [8] F. Izquierdo et al., “Performance evaluation of a TOA-based trilateration
1 X method to locate terminals in wlan,” in International Symposium on
Skyranger [58] IR, Thermal) perception
DELAIR Aerial Camera (visible, human visual Wireless Pervasive Computing, 2006.
1 X [9] M. Gutierrez-Roig et al., “Active and reactive behaviour in human
Intell. Platform [59] IR, Thermal) perception
SARDO Pseudo-Trilateration 1 4 ≤ 50 m mobility: the influence of attraction points on pedestrians,” Royal Society
Open Science, vol. 3, no. 7, Jul 2016.
either require an up-and-running mobile infrastructure or are [10] M. Comiter and H. T. Kung, “Localization Convolutional Neural Net-
equipped with IR or thermal cameras to perform image-based works Using Angle of Arrival Images,” in 2018 IEEE Global Communi-
cations Conference (GLOBECOM), 2018, pp. 1–7.
localization. Therefore, such solutions do not provide any useful [11] R. Austin, “Control and stability,” in Unmanned Aircraft Systems. John
synthetic localization error figure and rather rely on the operator Wiley & Sons, Ltd, 2010, ch. 10, pp. 155–167.
experience and skill set. Conversely, SARDO is a single-drone [12] K. Lee et al., “SLAW: A New Mobility Model for Human Walks,” in
cellular-based localization system able to localize users without IEEE INFOCOM 2009, Apr 2009, pp. 855–863.
[13] I. Sutskever, O. Vinyals, and Q. V. Le, “Sequence to Sequence Learning
relying on mobile infrastructure or users GNSS information. with Neural Networks,” in Proc. NIPS, Montreal, CA, 2014. [Online].
Available: http://arxiv.org/abs/1409.3215
[14] D. G. Manolakis and V. K. Ingle, Applied Digital Signal Processing:
9 C ONCLUSIONS Theory and Practice. Cambridge University Press, 2011.
[15] G. F. Franklin, J. D. Powell, and M. L. Workman, Digital Control of
Due to the flexible deployment possibilities and capabilities of Dynamic Systems, 2nd ed. Addison-Wesley, 1990.
modern drones, unmanned aerial vehicles (UAVs) are ideal can- [16] Mini-Circuits amplifiers. https://www.minicircuits.com/WebStore/
didates for novel localization systems when victims are sparsely Amplifiers.html.
[17] Gomez-Miguelez et al., “srsLTE: An Open-source Platform for LTE
distributed in large and/or difficult-to-reach areas. Evolution and Experimentation,” in Proceedings of the Tenth ACM
In this context, we presented here SARDO which, to the best of International Workshop on Wireless Network Testbeds, Experimental
our knowledge, is the first cellular-based drone search and rescue Evaluation, and Characterization, ser. WiNTECH ’16. ACM, 2016,
localization system. SARDO localizes missing people (assumed to pp. 25–32.
[18] srsLTE. https://www.softwareradiosystems.com/.
be close to their phones) with an accuracy of few tens of meters. [19] Intel NUC NUC7i7DNBE. https://ark.intel.com/content/www/us/en/ark/
It requires a few minutes per phone to locate them and achieves products/130394/intel-nuc-board-nuc7i7dnbe.html.
this at a low battery cost. [20] NI USRP B210. https://www.ettus.com/all-products/ub210-kit/.
The properties of the SARDO solution can be summarized as [21] DJI MATRICE 600 Pro. https://www.dji.com/de/matrice600.
[22] 3GPP, “Evolved Universal Terrestrial Radio Access (E-UTRA); User
follows: i) drone-based cellular localization solution for disaster Equipment (UE) procedures in idle mode,” 3rd Generation Partnership
scenarios where the mobile infrastructure is out of service and UE Project (3GPP), Technical Specification (TS) 36.304, 01 2019, version
GNSS information is not available, ii) support for localization of 15.2.0. [Online]. Available: https://portal.3gpp.org/desktopmodules/
multiple victims by running SARDO sequentially within a given Specifications/SpecificationDetails.aspx?specificationId=2432
[23] S. F. Mjølsnes and R. F. Olimid, “Easy 4G/LTE IMSI Catchers for Non-
area, iii) AI-driven improvement of the localization accuracy Programmers,” in Computer Network Security, J. Rak, J. Bay, I. Kotenko,
through a feedback control loop and iv ) automated localization L. Popyack, V. Skormin, and K. Szczypiorski, Eds. Cham: Springer
operations given a GNSS-defined search area. International Publishing, 2017, pp. 235–246.
SARDO has been implemented with COTS components and [24] S. Sesia et al., LTE, The UMTS Long Term Evolution: From Theory to
Practice. Wiley Publishing, 2009.
tested in a field-trial on a rural area [1]. Our results proved the [25] A. Chakraborty et al., “SkyRAN: A Self-organizing LTE RAN
feasibility of the solution and provided quantitative results on the in the Sky,” in Proceedings of the 14th International Conference
expected performance in practice. on Emerging Networking EXperiments and Technologies, ser.
CoNEXT ’18. ACM, 2018, pp. 280–292. [Online]. Available:
http://doi.acm.org/10.1145/3281411.3281437
[26] B. Galkin et al., “UAVs as Mobile Infrastructure: Addressing Battery
ACKNOWLEDGMENTS Lifetime,” IEEE Communications Magazine, pp. 2–7, 2019.
[27] “Navigating Regulatory Compliance for UAV Electronics Development,”
The research leading to these results has been supported by the Tech. Rep., 2014, NASA Tech Briefs.
H2020 5G-CARMEN Project (Grant Agreement No. 825012). [28] A. Al-Hourani et al., “Optimal LAP Altitude for Maximum Coverage,”
IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 569–572, Dec
2014.
R EFERENCES [29] R. I. Bor-Yaliniz, A. El-Keyi, and H. Yanikomeroglu, “Efficient 3-D
placement of an aerial base station in next generation cellular networks,”
[1] Anonymous online video of SARDO in action. https://www.youtube. in 2016 IEEE International Conference on Communications (ICC), May
com/watch?v=9v3NNghq3so. 2016, pp. 1–5.
[2] ReliefWeb, “Natural Disasters 2017,” Report from Centre for Research [30] A. DiCarlofelice et al., “Experimental Characterization of Electromag-
on the Epidemiology of Disasters, Sep 2018. netic Propagation Under Rubble of a Historic Town After Disaster,” IEEE
[3] K. Namuduri, “Flying cell towers to the rescue,” IEEE Spectrum, vol. 54, Transactions on Vehicular Technology, vol. 64, no. 6, pp. 2288–2296, Jun
no. 9, pp. 38–43, Sep 2017. 2015.
[4] K.-D. Park and J. Won, “The foliage effect on the height time series [31] R. Jain, et al., “A Quantitative Measure of Fairness and Discrimination
from permanent GPS stations,” Earth, Planets and Space, vol. 62, pp. for Resource Allocation in Shared Computer Systems,” Tech. Rep., 1984,
849–856, 2008. dEC Research Report TR-301.
[5] C. Specht et al., “Comparative analysis of positioning accuracy of [32] F. Chollet et al., “Keras,” https://keras.io, 2015.
GNSS receivers of Samsung Galaxy smartphones in marine dynamic [33] M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Hetero-
measurement,” Advances in Space Research, 2018. geneous Systems,” https://www.tensorflow.org/, 2015.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMC.2021.3051273, IEEE
Transactions on Mobile Computing
13
[34] S. Nardi and M. Pachter, “GPS estimation algorithm using stochastic Antonio Albanese (S’18) received the M.Sc. in
modeling,” in Proceedings of the 37th IEEE Conference on Decision and Telecommunications Engineering from Politec-
Control (Cat. No.98CH36171), vol. 4, Dec 1998, pp. 4498–4502 vol.4. nico di Milano in 2018. Currently, he is pursuing
[35] Junbo Wang et al., “Design of a 3D localization method for searching his Ph.D. in Telematic Engineering at Universi-
survivors after an earthquake based on WSN,” in 2011 3rd International dad Carlos III de Madrid while being appointed
Conference on Awareness Science and Technology (iCAST), Sep 2011, as Research Associate at NEC Laboratories Eu-
pp. 221–226. rope GmbH. His research field covers optimiza-
[36] S. Zhu and X. Zhang, “Enabling high-precision visible light localization tion, machine learning techniques, blockchain
in today’s buildings,” in Proceedings of the 15th Annual International and MEC topics with a particular interest in posi-
Conference on Mobile Systems, Applications, and Services, ser. MobiSys tioning and prototyping.
’17. ACM, 2017, pp. 96–108.
[37] L. Li et al., “Rainbowlight: Towards low cost ambient light positioning
with mobile phones,” in Proceedings of the 24th Annual International
Conference on Mobile Computing and Networking, ser. MobiCom ’18.
ACM, 2018, pp. 445–457.
[38] M. Balaji and S. A. Chaudhry, “A cooperative trilateration technique for
object localization,” in 2018 20th International Conference on Advanced
Communication Technology (ICACT), Feb 2018, pp. 758–763.
[39] Tang, S. and others, “Study of portable infrastructure-free cell phone
detector for disaster relief,” Natural Hazards 86, pp. 453–464, 2017.
[40] I. Kolingerová et al., “The Stochastic Walk Algorithms for Point Location
in Pseudo-triangulations,” Adv. Eng. Softw., vol. 42, no. 8, pp. 577–585,
Aug 2011.
[41] J. A. del Peral-Rosado et al., “Survey of Cellular Mobile Radio Localiza-
tion Methods: From 1G to 5G,” IEEE Communications Surveys Tutorials,
vol. 20, no. 2, pp. 1124–1148, 2018.
[42] A. Shareef et al., “Localization using neural networks in wireless sensor
networks,” in Proceedings of the 1st International Conference on MO- Vincenzo Sciancalepore (S’11–M’15–SM’19)
BILe Wireless MiddleWARE, Operating Systems, and Applications, ser. received his M.Sc. degree in Telecommunica-
MOBILWARE ’08, 2007, pp. 4:1–4:7. tions Engineering and Telematics Engineering in
[43] C. Laoudias et al., “Indoor Localization Using Neural Networks with 2011 and 2012, respectively, whereas in 2015,
Location Fingerprints,” in Artificial Neural Networks – ICANN 2009. he received a double Ph.D. degree. Currently,
Springer Berlin Heidelberg, Sep 2009, pp. 954–963. he is a senior researcher at NEC Laboratories
[44] F. Devoti et al., “PASID: Exploiting Indoor mmWave Deployments Europe in Heidelberg, focusing his activity on
for Passive Intrusion Detection,” in IEEE INFOCOM 2020 - IEEE network virtualization and network slicing chal-
Conference on Computer Communications, 2020, pp. 1479–1488. lenges. He is the Chair of the ComSoc Emerging
[45] T. Van Nguyen et al., “Machine Learning for Wideband Localization,” Technologies Initiative (ETI) on Reconfigurable
IEEE Journal on Selected Areas in Communications, vol. 33, no. 7, pp. Intelligent Surfaces (RIS) and an editor of IEEE
1357–1380, Jul 2015. Transactions on Wireless Communications.
[46] B. Tariq et al., “Neural Networks for Indoor Human Activity Reconstruc-
tions,” IEEE Sensors Journal, vol. PP, pp. 1–1, June 2020.
[47] K. Bregar and M. Mohorčič, “Improving Indoor Localization Using
Convolutional Neural Networks on Computationally Restricted Devices,”
IEEE Access, vol. 6, pp. 17 429–17 441, 2018.
[48] C. Luo et al., “Channel state information prediction for 5G wireless
communications: A deep learning approach,” IEEE Transactions on
Network Science and Engineering, 2018.
[49] K. G. Panda et al., “Design and Deployment of UAV-Aided Post-Disaster
Emergency Network,” IEEE Access, vol. 7, pp. 102 985–102 999, 2019.
[50] Y. Zeng et al., “Wireless communications with unmanned aerial vehicles:
opportunities and challenges,” IEEE Communications Magazine, vol. 54,
no. 5, pp. 36–42, May 2016.
[51] B. Li et al., “UAV Communications for 5G and Beyond: Recent Ad-
vances and Future Trends,” IEEE Internet of Things Journal, vol. 6,
no. 2, pp. 2241–2263, 2019.
[52] H. Shakhatreh et al., “Unmanned Aerial Vehicles (UAVs): A Survey on Xavier Costa-Pérez (M’06–SM’18) is ICREA
Civil Applications and Key Research Challenges,” IEEE Access, vol. 7, Research Professor, Scientific Director at the
pp. 48 572–48 634, 2019. i2Cat Research Center and Head of 5G Net-
[53] H. Zhao et al., “Deployment algorithms for UAV airborne networks works R&D at NEC Laboratories Europe. He has
toward on-demand coverage,” IEEE Journal on Selected Areas in Com- served on the Organizing Committees of sev-
munications, vol. 36, no. 9, pp. 2015–2031, Sep 2018. eral conferences, published papers of high im-
[54] L. Ferranti et al., “HIRO-NET: Self-Organized Robotic Mesh Network- pact and holds tenths of granted patents. Xavier
ing for Internet Sharing in Disaster Scenarios,” in 2019 IEEE 20th In- received his Ph.D. degree in Telecommunica-
ternational Symposium on ”A World of Wireless, Mobile and Multimedia tions from the Polytechnic University of Catalo-
Networks” (WoWMoM), 2019, pp. 1–9. nia (UPC) in Barcelona and was the recipient of
[55] X. Wang et al., “Real-Time Multi-Target Localization from Unmanned a national award for his Ph.D. thesis.
Aerial Vehicles,” MDPI Sensors, vol. 17, p. 33, 12 2016.
[56] A. Dhekne et al., “TrackIO: Tracking first responders inside-out,” in 16th
USENIX Symposium on Networked Systems Design and Implementation
(NSDI 19). USENIX Association, 2019, pp. 751–764.
[57] Y. Liu et al., “Prospective Positioning Architecture and Technologies in
5G Networks,” IEEE Network, vol. 31, no. 6, pp. 115–121, Nov 2017.
[58] AERYON Skyranger. https://www.aeryon.com/skyranger/.
[59] DELAIR Aerial Intelligence Platform. https://delair.aero/
aerial-data-solutions/.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/