Next Article in Journal
Grid-Based Clustering Using Boundary Detection
Next Article in Special Issue
Joint Power and Time Allocation in Hybrid NoMA/OMA IoT Networks for Two-Way Communications
Previous Article in Journal
New Classification Method for Independent Data Sources Using Pawlak Conflict Model and Decision Trees
Previous Article in Special Issue
The Optimal Power Allocation for Sum Rate and Energy Efficiency of Full-Duplex Two-Way Communication Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems

1
School of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
2
School of Information Engineer, Xijing University, Xi’an 710123, China
3
School of Information and Communications, National University of Defense Technology, Wuhan 430035, China
4
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(11), 1605; https://doi.org/10.3390/e24111605
Submission received: 29 August 2022 / Revised: 23 October 2022 / Accepted: 1 November 2022 / Published: 4 November 2022

Abstract

:
This paper studies the intelligent reflecting surface (IRS) assisted secure transmission in unmanned aerial vehicle (UAV) communication systems, where the UAV base station, the legitimate receiver, and the malicious eavesdropper in the system are all equipped with multiple antennas. By deploying an IRS on the facade of a building, the UAV base station can be assisted to realize the secure transmission in this multiple-input multiple-output (MIMO) system. In order to maximize the secrecy rate (SR), the transmit precoding (TPC) matrix, artificial noise (AN) matrix, IRS phase shift matrix, and UAV position are jointly optimized subject to the constraints of transmit power limit, unit modulus of IRS phase shift, and maximum moving distance of UAV. Since the problem is non-convex, an alternating optimization (AO) algorithm is proposed to solve it. Specifically, the TPC matrix and AN covariance matrix are derived by the Lagrange dual method. The alternating direction method of multipliers (ADMM), majorization-minimization (MM), and Riemannian manifold gradient (RCG) algorithms are presented, respectively, to solve the IRS phase shift matrix, and then the performance of the three algorithms is compared. Based on the proportional integral (PI) control theory, a secrecy rate gradient (SRG) algorithm is proposed to iteratively search for the UAV position by following the direction of the secrecy rate gradient. The theoretic analysis and simulation results show that our proposed AO algorithm has a good convergence performance and can increase the SR by 40.5% compared with the method without IRS assistance.

1. Introduction

Due to their low cost, high mobility, and easy deployment, unmanned aerial vehicles (UAVs) have been widely used in logistics transportation, earthquake relief, aerial search and rescue, etc. In addition, UAVs can act as air base stations, relays or user nodes, and play important roles in wireless communication. Compared with traditional terrestrial communication, on the one hand, UAVs can use more sophisticated three-dimensional (3D) beamforming technology to greatly improve channel capacity; on the other hand, UAVs have a high probability of forming line-of-sight (LoS) links with ground users with good channel quality. However, these characteristics of UAVs can also pose security challenges to wireless networks, as it is also easier for eavesdroppers to form LoS links with transmitters and perform passive eavesdropping or active attacks. Therefore, the security problem in UAV communication systems is a research content worthy of attention. However, traditional encryption techniques require high computational complexity and consume large amounts of energy, which are not suitable for energy-constrained UAV platforms.
As a powerful supplement to the upper layer encryption techniques, the physical layer security (PLS) technology uses the physical layer characteristics of the channel itself to improve the secrecy performance. While ensuring the secure and reliable communication of the legitimate receiver, it tries to avoid the effective eavesdropping of eavesdroppers [1,2,3,4]. PLS technology in UAV communication networks can achieve secure transmission with low energy consumption through the differentiated design of wireless channels. It does not require key management and distribution, and omits the encoding and decoding process, making it suitable for resource-constrained UAV communication platforms. Therefore, it has a high application prospect and research value.
The PLS of UAV communication networks has been widely investigated. Mamaghani and Hong considered the power allocation optimization problem between the confidential signal and the artificial noise (AN) signal transmitted by the UAV base station [5]. Ji et al. regarded the cache-enabled UAV as a reliable relay and proposed an optimization problem of maximizing the minimum SR among users [6]. For the case where the eavesdropper location obeys the Poisson point process, Sun et al. derived a closed expression for the lower bound on the average secrecy rate (ASR) and maximized it [7]. When only the statistical illegitimate channel state information (CSI) was known, Bao et al. derived a closed expression for the secrecy outage probability (SOP) and the ergodic SR [8], and Yuan et al. optimized the UAV trajectory and beamforming vector [9]. Dong et al. considered the coordinate multiple points technology to form a UAV swarm relay, by jointly optimizing the transmit power of the base station and UAV relay, power allocation coefficient and beamforming on UAV relays, and the trajectory to maximize the ASR [10]. Ye et al. considered that the UAV base station serves the legitimate UAV users under the eavesdropping of illegal UAVs, and derived the closed expressions of SOP and average secrecy capacity [11]. Wang et al. investigated the cooperation of high-altitude platform and UAVs to provide services for ground users, and jointly optimized channel allocation, users’ power, and UAVs’ three-dimensional (3D) position in the NOMA-enabled network to counter an eavesdropping UAV [12].

1.1. Related Work

Although the above PLS technologies have been studied in-depth, when the legal channel quality is further deteriorated or the energy consumption of the communication node is limited, the above techniques may not meet the needs of secure communication. Therefore, the emerging intelligent reflecting surface (IRS) technology is introduced into the design of the secure UAV communication system. By integrating a large number of low-cost passive reflection components and controlling each amplitude and phase to reflect the incident signal independently, IRS can achieve a passive 3D beamforming, which can modify the wireless propagation environment and bring a higher degree of design freedom to secure wireless communications [13,14]. Wang et al. deployed an IRS on the UAV as a trusted relay to maximize the ASR by jointly optimizing the beamforming vector, IRS phase shift matrix, and UAV’s trajectory [15]. Sun et al. optimized the positions and beamforming of a UAV base station and IRS deployed on building walls to maximize the SR [16], and Pang et al. further optimized the trajectory of UAVs [17]. In addition, Fang et al. optimized the transmission power of the base station [18]. In contrast, Li et al. considered a time division multiple access communication system [19], and Li et al. extended this problem to a multi-user scenario [20]. In addition to the convex optimization methods used in the above research, Guo et al. used the deep deterministic policy gradient (DDPG) framework and proposed a twin-DDPG deep reinforcement learning algorithm to solve the SR optimization problem [21].
Although the above works have carried out a certain degree of research on IRS-assisted UAV secure communication, they are all based on the multiple-input single-output (MISO) channel or single-input single-output (SISO) channel and do not involve the problems of UAV-assisted multiple-input multiple-output (MIMO) scenarios. In a MIMO system, multiple parallel data streams can be transmitted at the same time to increase channel capacity, and the spatial multiplexing gain and spatial diversity gain can be used to overcome the channel fading, which has obvious advantages compared with MISO and SISO systems. However, due to the difference of channel models, the optimization problems in MIMO system are much more complicated than that in MISO systems. Firstly, the beamforming vector optimization in MISO systems needs to be transformed into covariance matrix optimization in MIMO systems. Secondly, the expression of the achievable rate is in the form of the logarithm of scalars in MISO communication systems, while in MIMO communication systems, the achievable rate expression takes the form of the logarithm of matrices determinant. This means that the optimization objectives, constraints, and optimization techniques are different from those in MISO systems, which is more challenging to deal with. Especially in the optimization of deployment position of the UAV, the strong non-convexity of the optimization problem makes it difficult to apply similar algorithms such as the successive convex approximation (SCA) and the semi-definite programming (SDP) to MIMO scenarios, and therefore difficult to solve using traditional convex optimization methods.
Therefore, current works have conducted in-depth research on the PLS communication of UAV-MISO systems, but only a few of them involve MIMO scenarios: considering the impact of multi-antenna eavesdroppers on UAV communication, Maeng et al. proposed a new linear precoder design scheme for data and AN transmission and derived a closed expression for the ASR for cellular connected UAVs networks [22], but they did not address the optimal design of deployment position of the UAV. Yuan et al. studied the secure beamforming and UAV trajectory planning problems in MIMO transceiver and multi-antenna eavesdropper (MIMOME) scenarios [9], but this research used the exhaustive search method of discrete processing, which has a large amount of calculation and low accuracy and thus makes it easy to lose the optimal solution. Mamaghani et al. proposed a full-duplex UAV relay scheme based on AN to maximize the ASR, but the reinforcement learning method requires high hardware cost and is not suitable for environmental changes [23]. However, the above research does not involve the booming IRS technology and does not fully exploit the secure communication capabilities of UAV-MIMO systems.

1.2. Main Contributions

As mentioned above, the current various research works mainly focus on the secure transmission of UAV-MISO systems. The related research on the PLS of UAV-MIMO communication is still in its infancy currently. In particular, there is still a research gap in the effect of IRS on the PLS of UAV-MIMO systems, and the corresponding design of the optimization algorithm is not reported in the literature yet, which motivates this work. In this paper, we jointly optimize the UAV position, transmit precoding (TPC) matrix and AN matrix, and IRS phase shift matrix to maximize the SR of an IRS assisted UAV-MIMOME communication system. The formulated problem is non-convex, and it is quite difficult to convert it into a convex problem for an approximate solution using common methods such as the successive convex approximation (SCA) or fractional programming. Therefore, we propose an alternating optimization (AO) algorithm to deal with this problem and obtain the suboptimal solution through multiple iterations. The main contributions of this paper are summarized as follows.
(1)
Different from the above literatures which focused MISO communication [15,16,17,18,19,20,21], we utilize the IRS to enhance the security of the UAV-MIMOME wireless communication system. Specifically, the system is composed of a UAV base station, an IRS, a ground legal receiver, and a ground eavesdropper. Each node is equipped with multiple antennas. The SR of the UAV communication system is maximized by jointly optimizing the TPC matrix and AN matrix, the IRS phase shift matrix, and the UAV placement subjected to transmit power constraint, unit modulus constraint, and maximum moving distance constraint within each iteration interval.
(2)
Since the optimization problem is non-convex, an AO algorithm is designed to solve it. Specifically, using the weighted minimum mean square error (WMMSE) algorithm to convert the original problem into a tractable equivalent form. For the optimization of the TPC matrix and AN matrix, we introduce auxiliary matrices and solve their expressions by the Lagrange dual method. For the optimization of the IRS phase shift matrix, after the problem is transformed into a constrained quadratically constrained quadratic program (QCQP) problem, three methods of alternating direction method of multipliers (ADMM), majorization-minimization (MM), and Riemannian manifold gradient (RCG) are used to solve it. For the optimization of the UAV placement, existing research based on MISO channels [24,25] and traditional convex optimization methods for other parameters [26,27,28]–such as UAV coverage or outage probability–cannot be directly applied to MIMO scenarios with more complex channel models. Therefore, we propose a secrecy rate gradient (SRG) method, which combines the change of the SR with the UAV’s proportional integral (PI) control theory, so that the UAV moves towards the position with greater SR until it reaches the point with the maximum SR.
(3)
The simulation results verify the advantages of the proposed algorithm compared with the benchmark schemes. It can be seen that the proposed AO algorithm can guide the UAV to move closer to the IRS, which proves that the IRS can effectively improve the security of the UAV communication system. In addition, increasing the transmission power and the number of antennas at legitimate nodes are beneficial to improve the secrecy performance. Moreover, the channel fading coefficients also play an important role in secure UAV-MIMO communications.
The rest parts of this paper are organized as follows. In Section 2, the system model and the optimization problem are formulated. In Section 3, we propose an AO algorithm to solve the optimization problem, which alternately solves the three sub-problems of the UAV position, TPC matrix, and AN matrix, and IRS phase shift matrix. In Section 4, we present the simulation results to verify the effectiveness of the proposed algorithms. We conclude this paper in Section 5.
Notations: In this paper, matrices and column vectors are denoted by bold uppercase letters and bold lowercase letters, T r ( ) and det ( ) represent trace and determinant. ( ) T , ( ) H , ( ) * , and ( ) denote the transpose, Hermitian, conjugate, and pseudo-inverse operators, respectively. M × 1 denotes the space of M -dimensional complex-valued column vector.

2. System Model and Problem Formulation

2.1. System Model

As shown in Figure 1, we consider a MIMOME air-to-ground communication system, where the UAV base station equipped with a linear array transmits the information to the ground legitimate user Bob. Simultaneously, a ground eavesdropper Eve tries to eavesdrop on confidential information. To get close to Bob and stay away from Eve, the UAV can actively move to find the best location for secure communication. All nodes are equipped with multiple antennas. The number of transmit antennas at the UAV is N T , and the numbers of receive antennas at the Bob and Eve are N B and N E , respectively. In order to enhance the secrecy capacity, an IRS is deployed on the facade of a building to assist the communication between the UAV and Bob, which reflects the transmit signal of the UAV to increase the legitimate channel gain and damage the wiretap channel. The IRS consists of M = M X × M Y reflecting elements. Define the IRS phase shift matrix as Θ = diag θ 1 , , θ m , , θ M , m M , where θ m = e j ϕ m , ϕ m [ 0 , 2 π ] . Assuming that the element spacing of each antenna array is half wavelength, namely, d = λ c / 2 .
Without loss of generality, we consider a 3D Cartesian coordinate communication system. The UAV’s location is denoted as p A = [ x A , y A , z A ] T , and the coordinates of Bob, IRS, and Eve are p B = [ x B , y B , z B ] T , p R = [ x R , y R , z R ] T , and p E = [ x E , y E , z E ] T , respectively.
The channel gains between the UAV and ground receivers consist of LoS and non-LoS (NLoS) components. Therefore, we assume that the air-to-ground channel adopts the Rician fading channel model, and its channel gain depends on the Rician factor. In this paper, we assume that the transmitter can obtain the perfect CSI of all communication nodes, including the eavesdropper’s CSI. This assumption is possible, for example, when eavesdroppers are also legitimate users of the network, but they are not supposed to receive certain information, and they should be considered passive eavesdroppers. In this case, these undesired users can feed back perfect CSI to the transmitter. Based on existing IRS-aided communication channel estimation methods [29], we can directly focus on the final optimization task [15,16,17,18]. Therefore, this paper assumes that all CSI is available. The channel gain between the UAV and terrestrial nodes, denoted by H A i , is given by
H A i T = β 0 d A i c A i H ˜ A i T = β 0 d A i c A i ( k A i k A i + 1 H A i L o S + 1 k A i + 1 H A i N L o S ) , i B , E ,
where β 0 is the reference channel gain at distance 1 m, d a b denotes the distance, k a b is the Rician factor between node a and b , c a b is the path loss exponent for a to b link. H A i LoS represents the deterministic LoS component, and H A i NLoS represents the random scattering component. Let ϕ i and φ i denote the azimuth angle-of-arrival (AOA) and angle-of-departure (AOD), and let ϑ i and θ i denote the elevation AOA and AOD, respectively. The adjacent antenna distance on the transmitter and IRS array is d , then H A i LoS can be expressed as
H A i LoS = h A i LoS ( A ) h A i LoS ( D ) ,
where
h A i LoS ( A ) = 1 , e j 2 π λ c d sin ϑ A i cos ϕ A i , , e j 2 π λ c ( N i 1 ) d sin ϑ A i cos ϕ A i T ,
h A i LoS ( D ) = 1 , e j 2 π λ c d sin θ A i cos φ A i , , e j 2 π λ c ( N T 1 ) d sin θ A i cos φ A i .
The random scattering component H A i NLoS is the NLoS component, which is modeled by the circularly symmetric complex Gaussian (CSCG) distribution with zero mean and unit variance.
Similarly, we assume that the channel between the UAV and IRS contains LoS and NLoS components, so the Rician fading channel model is adopted, which can be expressed as
H A R = β 0 d A R c A R H ˜ A R = β 0 d A R c A R h A R LoS ( A ) h A R LoS ( D ) ,
where h A R LoS ( A ) and h A R LoS ( D ) are given by
h A R LoS ( A ) = 1 , e j 2 π λ c d sin ϑ A R cos ϕ A R , , e j 2 π λ c d sin ϑ A R ( ( M X 1 ) cos ϕ A R ) , , e j 2 π λ c d sin ϑ A R ( ( M X 1 ) cos ϕ A R + ( M Y 1 ) sin ϕ A R ) T ,
h A R LoS ( D ) = 1 , e j 2 π λ c d sin θ A R cos φ A R , , e j 2 π λ c ( N T 1 ) d sin θ A R cos φ A R .
In addition, the channel gains between IRS and terrestrial nodes can be expressed as
H R i T = β 0 d R i c R i H ˜ R i T = β 0 d R i c R i ( k R i k R i + 1 h R i L o S ( A ) h R i L o S ( D ) + 1 k R i + 1 H R i N L o S ) , i B , E ,
where H R i NLoS follows CSCG distribution, and
h R i LoS ( A ) = 1 , e j 2 π λ c d sin θ R i cos φ R i , , e j 2 π λ c ( N i 1 ) d sin θ R i cos φ R i T ,
h R i LoS ( D ) = 1 , e j 2 π λ c d sin θ R i cos φ R i , , e j 2 π λ c d sin θ R i ( ( M X 1 ) cos φ R i ) , , e j 2 π λ c d sin θ R i ( ( M X 1 ) cos φ R i + ( M Y 1 ) sin φ R i ) .
In order to achieve the secure transmission of confidential information, with the help of multiple antennas, the UAV focuses the confidential signal to Bob by generating a TPC matrix, while sending AN signal to Eve to damage its eavesdropping quality. The transmitted signal can be written as
x = V s + z ,
where V N T × N d represents the precoding matrix, N d min N T , N B denotes the number of data streams, s C N ( 0 , I N d ) represents the transmitted signal, and z C N ( 0 , Z ) denotes the AN vector with zero mean and covariance matrix Z . Therefore, the received signals of the legitimate user and eavesdropper can be expressed as
y i = H R i H Θ H A R + H A i H x + n i , i { B , E } ,
where n i C N ( 0 , σ i 2 I N i ) , i { B , E } .

2.2. Quadcopter UAV Model

Define c ( n ) and u ( n ) as the state vector and input vector of the quadrotor UAV control system at a given iteration time n , respectively, and A and B respectively represent the influence of the state vector and the input vector on the derivative of each element in the state vector. The control system of quadcopter UAV is modeled as the following matrix differential equation,
Σ : c ˙ ( n ) = A c ( n ) + B u ( n ) c ˙ ( 0 ) = c 0 ,
We take the square of the speed of the four rotors of the quadrotor UAV as the input vector u ( n ) , and the state vector contains four parts: the UAV position, the orientation, and the derivative of the two–namely, c = ( p A T , o A T , p ˙ A T , o ˙ A T ) . The direction vector is expressed as o A = ( θ A , ϕ A , ψ A ) T , where θ A , ϕ A and ψ A represent pitch angle, roll angle, and yaw angle, respectively. We adopt the linear model in [30] to express this UAV system as
s ˙ ( n ) = 0 6 × 3 0 6 × 1 0 6 × 1 0 6 × 1 I 6 × 6 0 1 × 3 g 0 0 0 1 × 6 0 1 × 3 0 g 0 0 1 × 6 0 4 × 3 0 4 × 1 0 4 × 1 0 4 × 1 0 4 × 6 s ( n ) + ( 0 8 × 4 ϒ ) u ( n ) + ( 0 11 × 1 g ) s ( 0 ) = s 0 ,
where g is the gravity constant and ϒ is a specific full-rank matrix. We only consider the horizontal position change of UAV. When the input signal is selected as u ( n ) = ϒ 1 ( u 1 ( n )   u 2 ( n )   u z ( n )   0 ) T , the system model in the horizontal direction can be expressed as
Σ γ : c ˙ A , γ ( n ) = ( 0 1 0 0 0 0 g 0 0 0 0 1 0 0 0 0 ) c A , γ ( n ) + ( 0 0 0 1 ) u γ ( n ) c A , γ ( 0 ) = c A , γ , 0 ,
where γ 1 , 2 represent the X-axis direction and the Y-axis direction, and
c A , γ ( n ) = ( p A , γ ( n ) p ˙ A , γ ( n ) o A , γ ( n ) o ˙ A , γ ( n ) ) .

2.3. Problem Formulation

Based on the above analysis and to facilitate the solution, we further define the AN matrix Z = V E V E H , V E N T × N T , and set H B = σ B 1 H R B H Θ H A R + H A B H , and H E = σ E 1 H R E H Θ H A R + H A E H , the achievable rates of the legitimate user and eavesdropper can be expressed, respectively, as
R B = log 2 I N B + H B V V H H B H J B 1 ,
R E = log 2 I N E + H E V V H H E H J E 1 ,
where J B = H B V E V E H H B H + I N B , and J E = H E V E V E H H E H + I N E . Then, the SR R sec is the difference between the two achievable rates. We aim to maximize the SR by jointly optimizing the precoding matrix V , AN matrix Z , IRS phase shift matrix Θ , and UAV position p A . Therefore, the SR maximization problem of the UAV communication system can be formulated as
max V , V E , Θ , p A R sec = R B R E + s . t . Tr V V H + V E V E H P max θ m = 1 , m M p A ( n ) p A ( n 1 ) δ , n N ,
where P max is the maximum transmit power. The first constraint is the transmit power limit, the second constraint is the phase shift matrix unit modulus constraint, and the last constraint is the UAV moving distance limit between iterations.

3. Proposed Solution for Joint Optimization

In this section, we propose an AO algorithm to solve the Equation (19). The problem is decomposed into three subproblems; the precoding matrix V and AN matrix Z , the IRS phase shift matrix Θ , and the UAV position p A are solved alternately. Since this optimization problem is non-convex and thus difficult to solve, we need to transform it into an easy-to-solve form. Following the work of Hong et al. on IRS aided secure MIMO communication [31], we convert the objective function of Equation (19) into the following form:
R sec = log 2 I N B + H B V V H H B H J B 1 log 2 I N E + H E V V H H E H J E 1 = log 2 I N B + H B V V H H B H I N B + H B V E V E H H B H 1 f 1 + log I N E + H E V E V E H H E H f 2 log I N E + H E V V H + V E V E H H E H f 3   ·
The problem is still an intractable non-convex problem that requires further reformulation. As for f 1 , we transmit the SR maximation problem to another equivalent problem by introducing the weighted minimum mean square error (WMMSE) method [32]. By introducing the linear decoding matrix Z 1 N T × d , the MSE matrix of f 1 is
E 1 ( Z 1 , V , V E ) E s , z , n B ( s ^ s ) ( s ^ s ) H = I d Z 1 H H B V I d Z 1 H H B V H + Z 1 H I N B + H B V E V E H H B H Z 1 .
Introducing the slack variable X 1 d × d , and using Lemma 4.1 in [33], f 1 can be reformulated as
f 1 = max Z 1 , X 1 0 h 1 Z 1 , V , V E , X 1 = max Z 1 , X 1 0 log X 1 Tr X 1 E 1 ( Z 1 , V , V E ) + N d .
Then the optimal Z 1 and X 1 can be expressed as:
Z 1 = arg max Z 1 h 1 Z 1 , V , V E , X 1 = arg min Z B Tr X 1 E 1 ( Z 1 , V , V E ) = I N B + H B V E V E H H B H + H B V V H H B H 1 H B V ,
X 1 = arg max X 1 0 h 1 Z 1 , V , V E , X 1 = E 1 ( Z 1 , V , V E ) 1 = I N d Z 1 H H B V I N d Z 1 H H B V + Z 1 H I N B + H B V E V E H H B H Z 1 1 .
Similarly, by introducing the linear decoding matrix Z 2 N E × N T and the slack variable X 2 N T × N T , we can get the MSE matrix of f 2 , and f 2 can be reformulated as
E 2 ( Z 2 , V E ) I N T Z 2 H H E V E I N T Z 2 H H E V E H + Z 2 H Z 2 ,
f 2 = max Z 2 , X 2 0 h 2 Z 2 , V E , X 2 = max Z 2 , X 2 0 log X 2 Tr X 2 E 2 ( E 2 , V E ) + N T .
Then the optimal Z 2 and X 2 can be expressed as
Z 2 = arg max Z 2 h 2 Z 2 , V E , X 2 = I N E + H E V E V E H H E H 1 H E V E ,
X 2 = arg max X 2 0 h 2 Z 2 , V E , X 2 = E 2 ( Z 2 , V E ) 1 = I N T Z 2 H H E V E I N T Z 2 H H E V E H + Z 2 H Z 2 1 .
As for f 3 , we need to introduce Lemma 1 in [34] for reformulation,
f 3 = max X 3 0 h 2 V , V E , X 3 = max X 3 0 log X 3 Tr X 2 E 3 ( V , V E ) + N E .
By introducing the slack variable X 3 N E × N E , the MSE matrix of f 3 is
E 3 ( V , V E ) = I N E + H E V V H + V E V E H H E H ,
Then the optimal X 3 can be expressed as
X 3 = arg max X 3 0 h 3 V , V E , X 3 = E 3 ( V , V E ) 1 = I N E + H E V V H + V E V E H H E H 1 .  
Therefore, the optimization problem can be expressed as
( P 1 ) :   max Z 1 , X 1 0 , Z 2 , X 2 0 , X 3 0 R sec = h 1 Z 1 , V , V E , X 1 + h 2 Z 2 , V E , X 2 + h 3 V , V E , X 3 s . t .   Tr V V H + V E V E H P max θ m = 1 , m M p A ( n ) p A ( n 1 ) δ , n N .
We can solve this problem by applying the AO method. Firstly, in the following sub-problem (P2), fix the value of Θ , p A to optimize the linear decoding matrices Z 1 , Z 2 , slack variables X 1 , X 2 , TPC matrix V , and AN matrix V E . Secondly, in the following sub-problem (P3), fix the value of Z 1 , X 1 , Z 2 , X 2 , X 3 , V , V E , and p A to optimize the phase shift matrix Θ . And finally, in the following sub-problem (P4), given Z 1 , X 1 , Z 2 , X 2 , X 3 , V , V E , and Θ , the position of the UAV base station can be solved by the SRG method.

3.1. Optimizing Z 1 , X 1 , Z 2 , X 2 , X 3 , V , and V E

Simplifying Formula (32), the sub-optimization problem (P2) can be abbreviated as
( P 2 ) :   min V 0 , V E 0 Tr X 1 Z 1 H H B V V H H B H Z 1 + Tr X 1 Z 1 H H B V E V E H H B H Z 1 Tr X 1 Z 1 H H B V Tr X 1 V H H B H Z 1 Tr X 2 Z 2 H H E V E Tr X 2 V E H H E H Z 2 + Tr X 2 Z 2 H H E V E V E H H E H Z 2 + Tr X 3 H E V V H H E H + Tr X 3 H E V E V E H H E H s . t . Tr V V H + Tr V E V E H P T .
The sub-problem is a convex QCQP problem for V and V E , but the computational complexity is high if solved directly using CVX. Therefore, the Lagrange dual method is used to solve it. The Lagrangian function of (P2) is
L 1 V , V E , μ = Tr X 1 Z 1 H H B V V H H B H Z 1 + Tr X 1 Z 1 H H B V E V E H H B H Z 1 Tr X 1 Z 1 H H B V Tr X 1 V H H B H Z 1 Tr X 2 Z 2 H H E V E Tr X 2 V E H H E H Z 2 + Tr X 2 Z 2 H H E V E V E H H E H Z 2 + Tr X 3 H E V V H H E H + Tr X 3 H E V E V E H H E H + μ Tr V V H + Tr V E V E H p T .
And its dual problem is
max μ 0 min V 0 , V E 0 L 1 V , V E , μ .
By taking the first-order derivative, the optimal solutions of V and V E are obtained as
V * = μ I N T + H V H B H Z 1 X 1 H , V E * = μ I N T + H V E H E H Z 2 X 2 H .
where H V E = H B H Z 1 X 1 Z 1 H H B + H E H Z 2 X 2 Z 2 H H E + H E H X 3 H E and H V = H B H Z 1 X 1 Z 1 H H B + H E H X 3 H E .
Further, the eigenvalue decomposition is performed, and the optimal solution are written as
V * = Q μ I N T + Λ Q H H B H Z 1 X 1 H , V E * = Q E μ I N T + Λ E Q E H H E H Z 2 X 2 H .
In addition, the optimal dual variable μ should satisfy
μ Tr V * V * H + Tr V E * V * E H P T = 0 .
Define the monotone non-increasing function f μ =   Tr V V H + Tr V E V E H , we first check whether f 0 P max is satisfied when μ = 0 , if this condition is met, then μ * = 0 . Otherwise, the optimal value of the dual variable μ * can be obtained by the bisection search method.

3.2. Optimizing Phase Shift Matrix

In this part, by fixing the value of Z 1 , X 1 , Z 2 , X 2 , X 3 , V , V E , and p A , the sub-optimization problem (P3) can be abbreviated as
( P 3 ) : min V 0 , V E 0 Tr X 1 Z 1 H H B V V H H B H Z 1 + Tr X 1 Z 1 H H B V E V E H H B H Z 1 Tr X 1 Z 1 H H B V Tr X 1 V H B Z 1 Tr X 2 Z 2 H H E V E Tr X 2 V E H H E H Z 2 + Tr X 2 Z 2 H H E V E V E H H E H Z 2 + Tr X 3 H E V V H H E H + Tr X 3 H E V E V E H H E H s . t .   θ m = 1 , m M .
Extracting Θ and Θ H in the trace operation, the objective function of (P3) can be formulated as
Tr Θ H D H + Tr Θ D + Tr Θ F 2 Θ H G 2 + Tr Θ H F 1 Θ G 1 + c t ,
where c t is a constant term, which can be ignored in optimization, and
V S = V V H + V E V E H ,
C 1 = Z 1 X 1 Z 1 H ,
C 2 = Z 2 X 2 Z 2 H ,
D = H A R V S H A B C 1 H R B H + H A R V S H A E X 3 H R E H + H A R V E V E H H A E C 2 H R E H H A R V X 1 Z 1 H H R B H H A R V E X 2 Z 2 H H R E H ,
G 1 = H A R V V H H A R H ,
G 2 = H A R V E V E H H A R H ,
F 1 = H R B C 1 H R B H + H R E X 3 H R E H ,
F 2 = F 1 + H R E C 2 H R E H .
By the Equation (1.9.5) in [35], remove the trace operation in the third and fourth terms of (40), namely:
Tr Θ H F 1 Θ G 1 = θ H F 1 G 1 T θ ,
Tr Θ H F 2 Θ G 2 = θ H F 2 G 2 T θ ,
where θ = [ θ 1 , θ 2 , , θ M ] , similarly, the trace operation in the first and second terms of (40) can be removed as
Tr Θ H D H = d H θ * Θ Tr Θ D = θ T d ,
where θ * is the conjugate vector of θ and d is the vector composed of elements on the diagonal of D . Thus, the phase shift matrix optimization problem can be rewritten as
min ϕ f θ = θ H Ξ θ + θ T d + d H θ * s . t . θ m = 1 , m M ,
where Ξ = F 2 G 2 T + F 1 G 1 T . The right side of the equation is positive semi-definite matrices, so Ξ is also a positive semi-definite matrix. Then, the optimization problem simplifies to
min ϕ f θ = θ H Ξ θ + 2 θ H d * s . t . θ m = 1 , m M .
For the form of the optimization problem in (53), we solve it using three low complexity methods: ADMM [36], MM [37], and RCG [38].

3.2.1. Alternating Direction Method of Multipliers

Introducing an auxiliary variable q for θ , then the optimization problem can be reformulated as
max θ , q   f ^ 1 θ = θ H Ξ θ 2 θ H d * ξ 2 q θ 2 2   s . t . q = θ θ m = 1 , m M ,
where ξ > 0 is the penalty parameter. Defining g 2 θ m = 0 if θ m = 1 and g 2 θ m = , if θ m 1 , ρ R = [ ρ R , 1 , , ρ R , 1 ] T and ρ I = [ ρ I , 1 , , ρ I , 1 ] T are Lagrange variables corresponding to the real and imaginary parts of q θ = 0 , respectively. Let ρ = ρ R + ρ I , then its Lagrange function can be written as
L 2 q , θ , λ R , λ I = q H Ξ q m = 1 M g 1 θ m ξ 2 q θ 2 2 + 2 q H d * + ρ R + j ρ I H q θ .
Its dual function is
min ρ R , ρ I     G ρ R , ρ I = max q , θ L 2 q , θ , ρ R , ρ I .
Therefore, the iterative form of ADMM solution for the dual problem is
θ ( n + 1 ) = arg max θ L 2 q ( n ) , θ , ρ ¯ ( n ) ,
q ( n + 1 ) = arg max q L 2 q , θ ( n + 1 ) , ρ ¯ ( n ) ,
ρ ¯ ( n + 1 ) = ρ ¯ ( n ) ξ q ( n + 1 ) θ ( n + 1 ) .
For the iteration of q ( n + 1 ) , it is necessary to derive the objective function, and if the derivative is zero, the specific closed expression can be obtained as
q ( n + 1 ) = 2 Ξ + ξ I M 1 2 d * + ρ ¯ ( n ) + ξ θ ( n + 1 ) .
For the iteration of θ ( n + 1 ) , taking out the terms related to θ in L 2 , the optimization problem can be written as
max θ ξ 2 q ( n ) θ 2 2 + ρ R ( n ) + j ρ I ( n ) H q ( n ) θ m = 1 M g 1 θ m .
Since the constant term does not affect the solution of the optimization problem, we continue to add the constant term and express the objective function as
max θ ξ 2 q ( n ) 1 ξ ρ ¯ ( n ) θ 2 2 m = 1 M g 1 θ m .
If we want to obtain the maximum value of the objective function, θ ( n + 1 ) needs to satisfy
θ ( n + 1 ) = Pj ( q ( n ) 1 ξ ρ ¯ ( n ) ) .
Let θ ¯ = q ( n ) ρ ¯ ( n ) / ξ , then the projection operation can be expressed as
θ m ( n + 1 ) = θ ¯ m .
According to Lemma 3 in [36], we choose ξ = ι Ξ 2 , where ι 1 is the minimum integer which satisfies ( ξ / 2 ) I M Ξ 0 .

3.2.2. Majorization-Minimization

The core idea of the MM algorithm is to design a series of approximate optimization functions to control the upper limit of the original function, and to converge to the optimal solution of the original objective by minimizing the sequence.
We use f ^ 1 θ to represent the upper bound of the objective function. According to Lemma 1 in [37], we reformulate the problem and rewritten as
min f ^ 2 θ = g 2 θ + 2 θ H d * s . t . θ m = 1 , m M .
Since θ H θ = M , θ H λ max I M θ = M λ max is constant, after removing the constant term, the sub-problem becomes
min 2 θ H λ max I M Ξ θ ( n ) d * s . t . θ m = 1 , m M .
Therefore, its optimal solution is given by
θ ( n + 1 ) = exp j arg λ max I M Ξ θ ( n ) d * ,
where λ max is the maximum eigenvalue of Ξ .

3.2.3. Riemannian Conjugate Gradient

The RCG method has been widely used in IRS-assisted MISO and MU-MISO communications, so this problem can also be solved using the RCG method. The specific steps are as follows.
  • Compute Riemannian Gradient: Based on the manifold space constrained by the IRS phase shift matrix, we first calculate the Riemann gradient as the orthogonal projection of the Euclidean gradient on the tangent space,
    grad f θ ( n ) = f θ ( n ) f θ ( n ) θ ( n ) * θ ( n ) ,
    where f ^ θ ( n ) = 2 Ξ θ ( n ) + 2 d * .
  • Search Direction: The conjugate search direction on the tangent space is
    r ( n + 1 ) = grad f θ ( n ) + ζ 1 Ζ r ( n ) ,
    where Ζ ( ) is the vector transport function, and it can be expressed as
    Ζ r ( n ) = r ( n ) r ( n ) θ ( n ) * θ ( n ) ,
    where ζ 1 is the Polak-Ribière parameter [39].
  • Retraction: Project the tangent vector back to the circular manifold,
    θ ( n + 1 ) = Pj θ ( n ) + ζ 2 r ( n + 1 ) θ ( n ) + ζ 2 r ( n + 1 ) ,
    where ζ 2 denotes the Armijo backtracking line step size [39].

3.3. Optimizing UAV Placement

Aiming at the influence of UAV on the spectral efficiency of centralized radio access network, Roth et al. proposed a UAV location optimization method to maximize the data rate [40], but this method does not consider the influence of IRS and eavesdroppers. Based on this work, in this part, we propose a secure position searching method for IRS-assisted UAV-MIMO systems–namely the SRG method. The details are as follows.
Fixing other variables except p A , the sub-optimization problem of UAV placement (P4) can be expressed as
P 4 :   max p A R sec = log 2 I N B + H B V V H H B H J B 1 log 2 I N E + H E V V H H E H J E 1 s . t . p A ( n ) p A ( n 1 ) δ , n N .
The SRG method requires the derivative of the SR R sec with respect to the UAV coordinate, according to [41]
R sec p A , γ = 1 ln 2 Tr I N B + H B V V H H B H J B 1 1 H B V V H H B H J B 1 p A , γ 1 ln 2 Tr I N B + H E V V H H E H J E 1 1 H E V V H H E H J E 1 p A , γ ,
where the derivative of H B with respect to p A , γ can be expressed as
H B p A , γ = β 0 σ B p A , γ 1 d A R c A R / 2 H R B T Θ H ˜ A R + β 0 σ B p A , γ 1 d A B c A B / 2 H ˜ A B T = β 0 σ B · c A R 2 ( p R , γ p A , γ ) p R p A c A R / 2 + 2 H R B T Θ H ˜ A R + β 0 σ B p R p A c A R / 2 H R B T Θ H ˜ A R p A , γ + β 0 σ B · c A B 2 ( p B , γ p A , γ ) p B p A c A B / 2 + 2 H ˜ A B T + β 0 σ B p B p A c A B / 2 H ˜ A B T p A , γ .
Similarly, the derivative of H E with respect to p A , γ can be expressed as
H E p γ β 0 σ E p A , γ 1 d A R c A R / 2 H R E T Θ H ˜ A R + β 0 σ E p A , γ 1 d A E c A E / 2 H ˜ A E T = β 0 σ E c A R 2 ( p R , γ p A , γ ) p R p A c A R / 2 + 2 H R E T Θ H ˜ A R + β 0 σ E p R p A c A R / 2 H R E T Θ H ˜ A R p A , γ + β 0 σ E c A E 2 ( p E , γ p A , γ ) p E p A c A E / 2 + 2 H ˜ A E T + β 0 σ E p E p A c A E / 2 H ˜ A E T p A , γ .
In the previous research on position optimization and trajectory planning of UAV communication, it was often assumed that the influence of the phase part on the channel was negligible and focused on the influence of distance change on the channel. In this case, we also assume that the phase only has some random and subtle influence on the channel. Therefore, the influence of this part on the position change can be ignored. The derivative part in (73) can be expressed as
H B V V H H B H J B 1 p A , γ = H B V V H H B H J B 1 H B · H B p A , γ c A R 2 σ B ( p R , γ p A , γ ) p R p A 2 H R B T Θ H A R + c A B 2 σ B ( p B , γ p A , γ ) p B p A 2 H A B T V V H H B H J B 1 + H B V V H c A R 2 σ B ( p R , γ p A , γ ) p R p A 2 H R B T Θ H A R + c A B 2 σ B ( p B , γ p A , γ ) p B p A 2 H A B T H J B 1 ,
H E V V H H E H J E 1 p A , γ = H E V V H H I H J E 1 H E · H E p A , γ c A R 2 σ E ( p R , γ p A , γ ) p R p A 2 H R E T Θ H A R + c A E 2 σ E ( p E , γ p A , γ ) p E p A 2 H A E T V V H H E H J E 1 + H E V V H c A R 2 σ E ( p R , γ p A , γ ) p R p A 2 H R E T Θ H A R + c A E 2 σ E ( p E , γ p A , γ ) p E p A 2 H A E T H J E 1 .
We can obtain the gradient of SR as
( R sec ) γ = R sec p A , γ .
Next, the state of the UAV is adjusted and controlled by the secrecy rate gradient. When the UAV achieves the maximum SR at a certain point, the position of the UAV should remain unchanged; when the secrecy rate gradient is not zero, the UAV should move along the gradient direction.
In order to meet the above requirements, the static end value of p ˙ A should match the derivative R sec of constant SR. So, with the PI-controller, the input signal is designed as
u γ = p ( R sec ) γ k T p ˙ A , γ ( n ) o A , γ ( n ) o ˙ A , γ ( n ) , γ { 1 , 2 } ,
where k = ( k 1 k 2 k 3 ) T is the controller gain, p is the prefilter coefficient, and the system feedback control flow based on the PI-controller is shown in Figure 2, where the represents the superposition of signals, which are calculated by the process indicated by arrows.
In the control system, the controller matrices are determined by a linear quadratic regulator (LQR). Then, the parameters of the whole control system can be deduced as follows:
A = 0 1 0 0 0 0 1 0 0 0 0 1 0 k 1 k 2 k 3 , b = 0 0 0 p .
Therefore, the state equation can be evaluated by
c ˙ 1 c ˙ 2 = I 2 A c 1 c 2 + 1 0 0 0 1 0 b R sec .
By superimposing the results obtained in the (81) with the state vector of the previous moment, the optimized position of the UAV can be finally obtained.

3.4. Overall Algorithm and Complexity Discussion

With the proposed optimization method of the three sub-problems, the overall algorithm for solving the problem (P1) is summarized in Algorithm 1. Specifically, we iteratively solve three sub-problems–(P2), (P3), and (P4)–using the alternating optimization method. For these three blocks, we fix the other two blocks to optimize a certain block. The solution of other sub-problems obtained in this iteration are used as input to solve the next sub-problem. When the change of SR obtained by two consecutive iterations is less than the convergence accuracy χ or the number of iterations exceeds j max , the iterative solution can be stopped. The TPC matrix V 0 and AN matrix V E 0 are initialized as matrices whose internal elements are all 1 / N d and 1 / N T , respectively. And the phase shift matrix Q 0 is initialized to the identity matrix.
Algorithm 1 Iteration Algorithm for Optimizing Problem (P1)
Input: V 0 , V E 0 , Θ 0 , p A 0 , χ .
Output: the TPC matrix and AN matrix, the IRS phase shift matrices, the UAV position, and the SR.
Initialize: the iterative number j = 0 .
Repeat
 1: update { Z 1 j + 1 , X 1 j + 1 , Z 2 j + 1 , X 2 j + 1 , X 3 j + 1 } , and solve problem (P2) to obtain optimal { V j + 1 , V E j + 1 } for given { Θ j , p A j } .
 2: Solve problem (P3) to obtain the optimal { Θ j + 1 } for given { Z 1 j + 1 , X 1 j + 1 , Z 2 j + 1 , X 2 j + 1 , X 3 j + 1 , V j + 1 , V E j + 1 , p A j } . When choosing to use the ADMM algorithm, iteratively solve by Equations (57)–(59); when choosing to use the MM algorithm, iteratively solve by Equation (67); when choosing to use the RCG algorithm, iteratively solve by Equations (69)–(71) until the SR increment or the maximum iteration number is reached to end the loop of this sub-problem.
 3: Solve problem (P4) to obtain the { p A j + 1 } for given { Z 1 j + 1 , X 1 j + 1 , Z 2 j + 1 , X 2 j + 1 , X 3 j + 1 , V j + 1 , V E j + 1 , Θ j + 1 } . Using the SRG algorithm, iteratively solves Equation (81) until the SR increment or the maximum iteration number is reached to end the loop of this sub-problem.
4: Set j = j + 1 .
until   ( R sec , j R sec , j 1 ) / R sec , j χ or j > j max .
For the solution of the IRS phase shift matrix, the iterative process in the ADMM, MM, and RCG sub-algorithms can guarantee the monotonic descent of the sub-problem (P3). Similarly, for the solution of the UAV position, the iterative process in the SRG sub-algorithm also ensures the monotonic decline of the sub-problem (P4). For the solution process of the whole algorithm, the AO algorithm can guarantee the monotonic decrease of the objective function value in each iteration, and the existence of the transmit power constraint ensures the convergence of Algorithm 1.
The complexity of algorithm 1 is analyzed below. In step 1, the computational complexity of { H V , H V E } is O ( N T 3 ) + O ( 2 N T 2 N d ) + O ( 2 N T 2 N E ) , the complexity of binary search to find the optimal μ is O ( N T 2 N B ) + O ( 2 N T 3 ) , then the computational complexity C 2 of sub-problem (P2) is O ( max { 2 N T 3 , 2 N T 2 N E } ) . In step 2, the computational complexity C 3 of ADMM, MM, and RCG algorithm are O ( M 3 + T A D M M M 3 ) , O ( M 3 + T M M M 2 ) , and O ( M 3 + T R C G M 2 ) , respectively, where T A D M M , T M M , and T R C G represent the iteration number of three IRS shift optimization sub-algorithms. In step 3, the computational complexity C 4 of the SRG algorithm is O ( T S R G N T 2 ) , where T S R G represent the iteration number of the SRG algorithm. Therefore, the complexity of the whole problem can be presented by
C 1 = O ( max { C 2 , C 3 , C 4 } ) .

4. Simulation Results

In this section, we show the simulation results to verify the effectiveness of Algorithm 1 and the advantage of the proposed secure transmission strategy. The parameter settings we used in the simulation are set as follows unless otherwise specified [31,40]. The coordinates of initial UAV point p A 0 , IRS, Bob, and Eve are set as [ 120 , 1.5 ] T , [ 0 , 0 ] T , [ 10 , 15 ] T , and [ 10 , 15 ] T , respectively. The height of UAV is 60 m and the height of IRS is 25 m. The transmit power limit is P T = 15   dBm . The antennas number of UAV, Bob, Eve, and IRS are N T = 4 , N B = 2 , N E = 2 , and M = 48 , respectively. The number of data streams is set to N d = 2 . Rician factor is set to k a b = 4 . Path loss exponent c A R = 2.2 ; c R B and c R E are set to 2.5; c A B and c A E are set to 3.5; and the path loss at the reference distance 1 m is set to −30 dB. The Bob’s noise power and the Eve’s noise power are σ B 2 = 75   dBm and σ E 2 = 75   dBm . The maximum UAV moving distance between two iterations is set to δ = 0.6 . The controller gain k = ( 0.5477 23.9683 6.9308 ) T . The prefilter coefficient p = 0.0175 . The initial UAV states vectors are set to c γ , 0 = ( p A , γ 0 0 0 0 ) T , γ { 1 , 2 } . The convergence accuracy χ = 10 5 and the maximum number of iterations j max = 10 3 .
The convergence performance of our proposed Algorithm 1 is described in Figure 3, where the ADMM, MM, and RCG algorithms are used to optimize the IRS phase shift matrix, respectively. It can be seen from Figure 3 that for the communication scenario in this paper, with the increase of the number of iterations, the SR gradually increases and converges at about 3.58 after 20~30 iterations, and the convergence speed and secrecy performance of the AO-ADMM algorithm has a little advantage over other two algorithms.
In each iteration of Algorithm 1, ADMM, MM, and RCG are used to solve the problem (P3), the phase shift matrix of IRS. Figure 4 shows the convergence performance of the three algorithms in the first iteration of our proposed AO algorithm. As can be seen from Figure 4, the convergence speed of the three algorithms is slightly different, but not by much. Based on the analysis in Section 3, the computational complexity of MM and RCG algorithms is similar, and the computational complexity of the ADMM algorithm is higher than the other two algorithms. Although the computational complexity of the AO-ADMM algorithm is higher, its convergence performance and SR are slightly better than the other two algorithms. Therefore, we use the AO-ADMM algorithm to compare the performance with other benchmark schemes in the following simulation experiments.
Figure 5 shows the UAV position change process of the AO algorithms based on three different phase shift matrix optimization methods. As a comparison, we also introduce an AO algorithm with a randomly generated IRS phase shift matrix. It can be seen from Figure 5 that for the case of randomly setting the IRS phase shift, the UAV will move towards the nearby position of the receiver and the eavesdropper. The UAV will not be completely close to Eve and Bob and will finally stop at the [ 19.34 , 14.17 ] T . This is because although the phase shift matrix is not optimal in this case, the IRS can still play a positive role in improving the secrecy performance. For the case of adopting ADMM, MM, and RCG algorithms, the UAV will continue to turn to the nearby position where the IRS is located, and finally stopped at [ 22.23 , 2.95 ] T , [ 18.81 , 2.94 ] T , and [ 21.79 , 2.04 ] T , respectively. This is because the optimized IRS can give a full play to its secrecy ability, and the UAV can obtain a higher SR in the direction close to the IRS, so the UAV will move closer to the IRS. That is to say, the proposed SRG position optimization algorithm and three IRS phase shift matrix optimization methods are important means to effectively improve the secrecy ability.
Next, we consider different benchmark schemes to verify the advantages of our proposed method. The different schemes are shown as follows.
Scheme 1: the TPC matrix, AN matrix, phase shift matrix, and position are optimized via the proposed AO-ADMM algorithm.
Scheme 2: The same as Scheme 1 except that the phase shift matrix is set randomly.
Scheme 3: The same as Scheme 1 except that the TPC matrix is set randomly.
Scheme 4: The same as Scheme 1 except that the AN matrix is set randomly.
Scheme 5: The same as Scheme 1 except that the IRS phase shift matrix is optimized by the one-by-one (OBO) algorithm in paper [42].
It can be seen from Figure 6 that as the UAV base station transmission power increases, the achievable SR of all five schemes will increase. Moreover, scheme 1 using the ADMM algorithm is always better than scheme 5 using the OBO algorithm for IRS optimization.
As can be seen from Figure 7, with the increase in the number of transmission antennas, the achievable SR of all five schemes also increases. In Figure 7, in the whole region, our proposed scheme 1 has the highest achievable rate. When the number of transmission array is small, compared with scheme 4 and scheme 2, scheme 3 has better confidentiality ability. In addition, when the number of array elements is large, the SR of scheme 4 and scheme 2 is better than that of scheme 3. This is because the number of transmit antennas has a great influence on the performance of TPC matrices.
The effect of the number of eavesdropper antenna on the secrecy performance is described in Figure 8. As the number of eavesdropper antennas increases, the SR of all schemes will decline, and our proposed optimization method is always better than several other schemes.
Figure 9 shows the impact of the IRS elements number on the secrecy performance of the UAV system. It is observed from Figure 9 that with the increase in the number of reflection elements, the SR of all schemes will increase. However, due to the lack of optimization of the phase shift matrix in scheme 2, the SR increases very slowly, which shows the importance of IRS in our proposed joint optimization algorithm. With the preset parameter settings, the SR of our proposed scheme 1 can be about 40.5% higher than that of scheme 2 without IRS. Compared with Scheme 5 using the OBO algorithm, the performance advantage of our proposed Scheme 1 becomes more obvious as the number of IRS elements increases. It proves the effectiveness of Algorithm 1 and the significance of IRS in secure UAV communication.
Figure 10 and Figure 11 show the effect of IRS-Bob and IRS-Eve channel path loss exponents on SR. With the increase of c R B , the IRS’s signal reflection strength at Bob gradually decreases, resulting in a decrease in the SR. With the increase of c R E , Eve will receive fewer signals from the IRS, which increases the SR. Therefore, when the quality of the reflected legal channel is good, the IRS can promote the secrecy performance of the communication system, but if the quality of the reflected eavesdropping channel is better than that of the reflected legal channel, the deployment of the IRS may be counterproductive. Our proposed scheme 1 is slightly better than scheme 5, and consistently perform better than the other three benchmark schemes.

5. Conclusions

In this paper, we investigated the secure communication of an IRS-assisted UAV-MIMOME wireless system. The TPC matrix, AN matrix, IRS phase shift matrix, and UAV position were jointly designed to maximize the achievable SR under the transmit power, the IRS phase shift unit modulus, and the maximum UAV moving distance constraints. Since the problem was non-convex, we proposed an AO algorithm to optimize these variables alternately. The optimal TPC matrix and AN matrix were solved by the Lagrange dual method. The optimal IRS phase shift matrix was solved by three algorithms of ADMM, MM, and RCG. An SRG method was proposed to iteratively optimize the UAV position. Finally, simulations proved the effectiveness of our proposed algorithm and the important role of IRS in UAV-MIMO secure communication. Additionally, our work can be extended to more general multicast scenarios. In our future work, we will investigate the robust and secure design of IRS-assisted UAV MIMO networks considering imperfect eavesdropping CSI.

Author Contributions

Conceptualization, T.C. and B.W.; methodology, T.C.; software, T.C.; validation, B.W. and K.C.; formal analysis, T.C.; investigation, T.C.; writing—original draft preparation, T.C.; writing—review and editing, J.W. and R.D.; visualization, Z.W.; supervision, B.W.; funding acquisition, J.W. and K.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Natural Science Foundation of China (Grant Nos. 62101560, 61902426), China Postdoctoral Science Foundation (Grant No. 2021M692502), and the National University of Defense Technology Research Fund (Grant No. ZK21-44).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  2. Chen, X.; Ng, D.W.K.; Gerstacker, W.H.; Chen, H.-H. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE Commun. Surv. Tutor. 2017, 19, 1027–1053. [Google Scholar] [CrossRef]
  3. Wang, D.; Zhou, F.; Lin, W.; Ding, Z.; Al-Dhahir, N. Cooperative Hybrid Nonorthogonal Multiple Access-Based Mobile-Edge Computing in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1104–1117. [Google Scholar] [CrossRef]
  4. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 182303. [Google Scholar] [CrossRef]
  5. Mamaghani, M.T.; Hong, Y. Joint Trajectory and Power Allocation Design for Secure Artificial Noise Aided UAV Communications. IEEE Trans. Veh. Technol. 2021, 70, 2850–2855. [Google Scholar] [CrossRef]
  6. Ji, J.; Zhu, K.; Niyato, D.; Wang, R. Joint Trajectory Design and Resource Allocation for Secure Transmission in Cache-Enabled UAV-Relaying Networks with D2D Communications. IEEE Internet Things J. 2021, 8, 1557–1571. [Google Scholar] [CrossRef]
  7. Wei, D.; Xi, N.; Ma, J.; He, L. UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things. Remote Sens. 2021, 13, 4853. [Google Scholar] [CrossRef]
  8. He, Y.; Zhai, D.; Huang, F.; Wang, D.; Tang, X.; Zhang, R. Joint Task Offloading, Resource Allocation, and Security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs. Remote Sens. 2021, 13, 1547. [Google Scholar] [CrossRef]
  9. Sun, X.; Yang, W.; Cai, Y.; Xiang, Z.; Tang, X. Secure Transmissions in Millimeter Wave SWIPT UAV-Based Relay Networks. IEEE Wirel. Commun. Lett. 2019, 8, 785–788. [Google Scholar] [CrossRef]
  10. Bao, T.; Yang, H.-C.; Hasna, M.O. Secrecy Performance Analysis of UAV-Assisted Relaying Communication Systems. IEEE Trans. Veh. Technol. 2020, 69, 1122–1126. [Google Scholar] [CrossRef]
  11. Yuan, Q.; Hu, Y.; Wang, C.; Li, Y. Joint 3D Beamforming and Trajectory Design for UAV-Enabled Mobile Relaying System. IEEE Access 2019, 7, 26488–26496. [Google Scholar] [CrossRef]
  12. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  13. Dong, R.; Wang, B.; Cao, K.; Cheng, T. Securing Transmission for UAV Swarm-Enabled Communication Network. IEEE Syst. J. 2021, 1–12. [Google Scholar] [CrossRef]
  14. Ye, J.; Zhang, C.; Lei, H.; Pan, G.; Ding, Z. Secure UAV-to-UAV Systems With Spatially Random UAVs. IEEE Wirel. Commun. Lett. 2019, 8, 564–567. [Google Scholar] [CrossRef]
  15. Wang, D.; Zhao, Y.; He, Y.; Tang, X.; Li, L.; Zhang, R.; Zhai, D. Passive Beamforming and Trajectory Optimization for Reconfigurable Intelligent Surface-Assisted UAV Secure Communication. Remote Sens. 2021, 13, 4286. [Google Scholar] [CrossRef]
  16. Sun, G.; Tao, X.; Li, N.; Xu, J. Intelligent Reflecting Surface and UAV Assisted Secrecy Communication in Millimeter-Wave Networks. IEEE Trans. Veh. Technol. 2021, 70, 11949–11961. [Google Scholar] [CrossRef]
  17. Pang, X.; Zhao, N.; Tang, J.; Wu, C.; Niyato, D.; Wong, K.-K. IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design. IEEE Trans. Commun. 2021, 70, 1140–1152. [Google Scholar] [CrossRef]
  18. Fang, S.; Chen, G.; Li, Y. Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks. IEEE Wirel. Commun. Lett. 2021, 10, 276–280. [Google Scholar] [CrossRef]
  19. Li, S.; Duo, B.; Di Renzo, M.; Tao, M.; Yuan, X. Robust Secure UAV Communications with the Aid of Reconfigurable Intelligent Surfaces. IEEE Trans. Wirel. Commun. 2021, 20, 6402–6417. [Google Scholar] [CrossRef]
  20. Li, J.; Xu, S.; Liu, J.; Cao, Y.; Gao, W. Reconfigurable Intelligent Surface Enhanced Secure Aerial-Ground Communication. IEEE Trans. Commun. 2021, 69, 6185–6197. [Google Scholar] [CrossRef]
  21. Guo, X.; Chen, Y.; Wang, Y. Learning-Based Robust and Secure Transmission for Reconfigurable Intelligent Surface Aided Millimeter Wave UAV Communications. IEEE Wirel. Commun. Lett. 2021, 10, 1795–1799. [Google Scholar] [CrossRef]
  22. Maeng, S.J.; Yapıcı, Y.; Guvenc, I.; Bhuyan, A.; Dai, H. Precoder Design for Physical-Layer Security and Authentication in Massive MIMO UAV Communications. IEEE Trans. Veh. Technol. 2022, 71, 2949–2964. [Google Scholar] [CrossRef]
  23. Mamaghani, M.T.; Hong, Y. Intelligent Trajectory Design for Secure Full-Duplex MIMO-UAV Relaying Against Active Eavesdroppers: A Model-Free Reinforcement Learning Approach. IEEE Access 2021, 9, 4447–4465. [Google Scholar] [CrossRef]
  24. Liu, L.; Zhang, S.; Zhang, R. CoMP in the Sky: UAV Placement and Movement Optimization for Multi-User Communications. IEEE Trans. Commun. 2019, 67, 5645–5658. [Google Scholar] [CrossRef] [Green Version]
  25. Fan, R.; Cui, J.; Jin, S.; Yang, K.; An, J. Optimal Node Placement and Resource Allocation for UAV Relaying Network. IEEE Commun. Lett. 2018, 22, 808–811. [Google Scholar] [CrossRef]
  26. Lyu, J.; Zeng, Y.; Zhang, R.; Lim, T.J. Placement Optimization of UAV-Mounted Mobile Base Stations. IEEE Commun. Lett. 2017, 21, 604–607. [Google Scholar] [CrossRef] [Green Version]
  27. Chen, Y.; Feng, W.; Zheng, G. Optimum Placement of UAV as Relays. IEEE Commun. Lett. 2018, 22, 248–251. [Google Scholar] [CrossRef] [Green Version]
  28. Shakhatreh, H.; Khreishah, A.; Alsarhan, A.; Khalil, I.; Sawalmeh, A.; Othman, N.S. Efficient 3D Placement of a UAV Using Particle Swarm Optimization. In Proceedings of the 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 4–6 April 2017; pp. 258–263. [Google Scholar]
  29. Wang, Z.; Liu, L.; Cui, S. Channel Estimation for Intelligent Reflecting Surface Assisted Multiuser Communications: Framework, Algorithms, and Analysis. IEEE Trans. Wirel. Commun. 2020, 19, 6607–6620. [Google Scholar] [CrossRef]
  30. Wang, P.; Man, Z.; Cao, Z.; Zheng, J.; Zhao, Y. Dynamics Modelling and Linear Control of Quadcopter. In Proceedings of the 2016 International Conference on Advanced Mechatronic Systems (ICAMechS), Melbourne, Australia, 30 November–3 December 2016; pp. 498–503. [Google Scholar]
  31. Hong, S.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface. IEEE Trans. Commun. 2020, 68, 7851–7866. [Google Scholar] [CrossRef]
  32. Shi, Q.; Razaviyayn, M.; Luo, Z.-Q.; He, C. An Iteratively Weighted MMSE Approach to Distributed Sum-Utility Maximization for a MIMO Interfering Broadcast Channel. IEEE Trans. Signal Process. 2011, 59, 4331–4340. [Google Scholar] [CrossRef]
  33. Shi, Q.; Xu, W.; Wu, J.; Song, E.; Wang, Y. Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2015, 14, 2841–2853. [Google Scholar] [CrossRef] [Green Version]
  34. Li, Q.; Hong, M.; Wai, H.-T.; Liu, Y.-F.; Ma, W.-K.; Luo, Z.-Q. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization. IEEE J. Sel. Areas Commun. 2013, 31, 1714–1727. [Google Scholar] [CrossRef]
  35. Zhang, X.-D. Matrix Analysis and Applications; Cambridge University Press: Cambridge, UK, 2017; ISBN 978-1-10841-741-9. [Google Scholar]
  36. Guo, H.; Liang, Y.-C.; Chen, J.; Larsson, E.G. Weighted Sum-Rate Optimization for Intelligent Reflecting Surface Enhanced Wireless Networks. arXiv 2019, arXiv:1905.07920. [Google Scholar]
  37. Pan, C.; Ren, H.; Wang, K.; Xu, W.; Elkashlan, M.; Nallanathan, A.; Hanzo, L. Multicell MIMO Communications Relying on Intelligent Reflecting Surfaces. IEEE Trans. Wirel. Commun. 2020, 19, 5218–5233. [Google Scholar] [CrossRef]
  38. Guo, H.; Liang, Y.-C.; Chen, J.; Larsson, E.G. Weighted Sum-Rate Maximization for Reconfigurable Intelligent Surface Aided Wireless Networks. IEEE Trans. Wirel. Commun. 2020, 19, 3064–3076. [Google Scholar] [CrossRef] [Green Version]
  39. Absil, P.-A.; Mahony, R.; Sepulchre, R. Optimization Algorithms on Matrix Manifolds; Princeton University Press: Princeton, NJ, USA, 2009; ISBN 978-1-40083-024-4. [Google Scholar]
  40. Roth, S.; Kariminezhad, A.; Sezgin, A. Base-Stations Up in the Air: Multi-UAV Trajectory Control for Min-Rate Maximization in Uplink C-RAN. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  41. Petersen, K.B.; Pedersen, M.S. The Matrix Cookbook; Technical University of Denmark: Lyngby, Denmark, 2006. [Google Scholar]
  42. Dong, L.; Wang, H.-M. Enhancing Secure MIMO Transmission via Intelligent Reflecting Surface. IEEE Trans. Wirel. Commun. 2020, 19, 7543–7556. [Google Scholar] [CrossRef]
Figure 1. An IRS-assisted secure ground-to-air communication system.
Figure 1. An IRS-assisted secure ground-to-air communication system.
Entropy 24 01605 g001
Figure 2. The feedback control process of UAV systems based on PI-controller.
Figure 2. The feedback control process of UAV systems based on PI-controller.
Entropy 24 01605 g002
Figure 3. Convergence performance comparison with Algorithm 1.
Figure 3. Convergence performance comparison with Algorithm 1.
Entropy 24 01605 g003
Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.
Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.
Entropy 24 01605 g004
Figure 5. The UAV position change process with different IRS optimization method.
Figure 5. The UAV position change process with different IRS optimization method.
Entropy 24 01605 g005
Figure 6. Achievable SR versus the transmission power.
Figure 6. Achievable SR versus the transmission power.
Entropy 24 01605 g006
Figure 7. Achievable SR versus the number of transmission antenna.
Figure 7. Achievable SR versus the number of transmission antenna.
Entropy 24 01605 g007
Figure 8. Achievable SR versus the number of eavesdropper antenna.
Figure 8. Achievable SR versus the number of eavesdropper antenna.
Entropy 24 01605 g008
Figure 9. Achievable SR versus the number of reflecting elements.
Figure 9. Achievable SR versus the number of reflecting elements.
Entropy 24 01605 g009
Figure 10. Achievable SR versus the path loss exponent between IRS and receiver.
Figure 10. Achievable SR versus the path loss exponent between IRS and receiver.
Entropy 24 01605 g010
Figure 11. Achievable SR versus the path loss exponent between IRS and eavesdropper.
Figure 11. Achievable SR versus the path loss exponent between IRS and eavesdropper.
Entropy 24 01605 g011
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cheng, T.; Wang, B.; Wang, Z.; Cao, K.; Dong, R.; Weng, J. Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems. Entropy 2022, 24, 1605. https://doi.org/10.3390/e24111605

AMA Style

Cheng T, Wang B, Wang Z, Cao K, Dong R, Weng J. Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems. Entropy. 2022; 24(11):1605. https://doi.org/10.3390/e24111605

Chicago/Turabian Style

Cheng, Tianhao, Buhong Wang, Zhen Wang, Kunrui Cao, Runze Dong, and Jiang Weng. 2022. "Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems" Entropy 24, no. 11: 1605. https://doi.org/10.3390/e24111605

APA Style

Cheng, T., Wang, B., Wang, Z., Cao, K., Dong, R., & Weng, J. (2022). Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems. Entropy, 24(11), 1605. https://doi.org/10.3390/e24111605

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop