Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AII Can't Write Code. But I Built a 100,000-Line Terminal IDE on My Phone.Dev.to AII Built a Free AI Tool That Turns One Blog Post Into 30 Pieces of ContentDev.to AILoop Neighborhood Markets Deploys AI Agents to Store AssociatesDev.to AIHow to Use Claude Code for Security Audits: The Script That Found a 23-Year-Old Linux BugDev.to AIAnthropic says Claude Code subscribers will need to pay extra for OpenClaw usageTechCrunch AIWhy Your Agent Works Great in Demos But Fails in ProductionDev.to AIЯ протестировал 8 бесплатных аналогов ChatGPT на русскомDev.to AINew Rowhammer attack can grant kernel-level control on Nvidia workstation GPUsTechSpotHow the JavaScript Event Loop Creates the Illusion of MultithreadingDev.to AIShowDev: I Built an AI-Powered "Viral Reel Idea Machine" (Custom PHP + Gemini AI) 🚀Dev.to AIGovernments Lock Down Biometric IDs — Investigators Get Left OutsideDev.to AIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessBig Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.Dev.to AII Can't Write Code. But I Built a 100,000-Line Terminal IDE on My Phone.Dev.to AII Built a Free AI Tool That Turns One Blog Post Into 30 Pieces of ContentDev.to AILoop Neighborhood Markets Deploys AI Agents to Store AssociatesDev.to AIHow to Use Claude Code for Security Audits: The Script That Found a 23-Year-Old Linux BugDev.to AIAnthropic says Claude Code subscribers will need to pay extra for OpenClaw usageTechCrunch AIWhy Your Agent Works Great in Demos But Fails in ProductionDev.to AIЯ протестировал 8 бесплатных аналогов ChatGPT на русскомDev.to AINew Rowhammer attack can grant kernel-level control on Nvidia workstation GPUsTechSpotHow the JavaScript Event Loop Creates the Illusion of MultithreadingDev.to AIShowDev: I Built an AI-Powered "Viral Reel Idea Machine" (Custom PHP + Gemini AI) 🚀Dev.to AIGovernments Lock Down Biometric IDs — Investigators Get Left OutsideDev.to AI
AI NEWS HUBbyEIGENVECTOREigenvector

Air-to-Air Channel Characterization for UAV Communications at 3.4 GHz

arXiv eess.SPby [Submitted on 2 Apr 2026]April 3, 20261 min read1 views
Source Quiz

arXiv:2604.01582v1 Announce Type: new Abstract: Uncrewed Aerial Vehicle (UAV) networks require accurate Air-to-Air (A2A) channel models, but most existing work focuses on Air-to-Ground links and leaves the sub-6 GHz A2A channel poorly characterized. We present preliminary 3.4 GHz A2A channel measurements collected with a lightweight, reconfigurable, open-source channel sounder built from USRP B210 software-defined radios and a high-precision GNSS-disciplined oscillator mounted on two UAVs. Measurements were conducted at the AERPAW Lake Wheeler testbed using a spherical flight trajectory around a second drone to capture channel behavior over varying altitudes, elevation angles, and relative headings. From these data, we analyze fundamental channel properties, extract channel impulse respons

View PDF HTML (experimental)

Abstract:Uncrewed Aerial Vehicle (UAV) networks require accurate Air-to-Air (A2A) channel models, but most existing work focuses on Air-to-Ground links and leaves the sub-6 GHz A2A channel poorly characterized. We present preliminary 3.4 GHz A2A channel measurements collected with a lightweight, reconfigurable, open-source channel sounder built from USRP B210 software-defined radios and a high-precision GNSS-disciplined oscillator mounted on two UAVs. Measurements were conducted at the AERPAW Lake Wheeler testbed using a spherical flight trajectory around a second drone to capture channel behavior over varying altitudes, elevation angles, and relative headings. From these data, we analyze fundamental channel properties, extract channel impulse responses, model fading behavior as a function of link geometry, and characterize fading statistics including RMS delay spread. The resulting dataset and analysis provide a more realistic basis for the design, emulation, and evaluation of physical-layer and MAC protocols for next-generation UAV communication networks.

Comments: Accepted for publication at Aeroconf 2026

Subjects:

Signal Processing (eess.SP); Networking and Internet Architecture (cs.NI)

Cite as: arXiv:2604.01582 [eess.SP]

(or arXiv:2604.01582v1 [eess.SP] for this version)

https://doi.org/10.48550/arXiv.2604.01582

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Anıl Gürses [view email] [v1] Thu, 2 Apr 2026 03:49:56 UTC (5,227 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

modelannounceopen-source

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Air-to-Air …modelannounceopen-sourcevaluationanalysisarxivarXiv eess.…

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 154 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!