1. Introduction
In wireless communication systems, electromagnetic waves experience different kinds of unpredictable changes in propagating environments, which is difficult to explain and is always considered to be probabilistic. Due to obstacles in the propagation environment, especially in urban areas, the signals will not only be affected by free-space path loss but also be reflected, refracted and scattered, and so on, which will eventually result in significant effects on wireless communication performance. Thus, the controlled meta-surfaces technique is invented to programmatically control the behavior of wireless environments [
1]. Meanwhile, it has been proved that programmable meta-surfaces can reshape the amplitude and phase of electromagnetic waves efficiently in real time thanks to the concept of intelligent reflecting surfaces (IRSs) [
2]. However, traditional passive IRSs can only achieve negligible gains due to the “multiplicative fading” effect [
3].
Unmanned aerial vehicles (UAVs) can effectively improve wireless networks’ throughput by making full use of the benefits of line-of-sight (LoS) link transmission and flight flexibility. Moreover, it is anticipated to be a key component of fifth-generation mobile networks to meet the requirement of special scenarios and ubiquitous access [
4]. However, in complicated wireless propagation environments, especially in urban areas, the LoS links tend to experience severe deterioration due to the blockage of dense buildings and trees [
5]. Fortunately, these challenges can be overcome by deploying IRS in the system since large-scale IRS reflecting elements can jointly beamform the signals in a desired direction by adjusting the IRSs parameters [
6,
7,
8].
In addition, the channel response of the legitimate users and the eavesdropper is strongly correlated with the increasing number of access users, which brings a severe physical layer security problem. Saba et al. [
9] investigated the secrecy rate in IRS-assisted multi-user multiple-input multiple-output (MIMO) systems and proposed two low-complexity iterative algorithms, namely two-tier and single-loop forms. Zhang et al. [
10] studied the energy effectiveness of an active IRS-aided multiple-input single-output (MISO) secure system, assessed the system’s energy cost quantitatively, and developed a joint optimization strategy to reduce the energy cost while adhering to the secrecy rate limitation.
Integrating IRS technology into UAV-enabled communication systems can provide intelligent compensation for path loss, reduce interference and build energy-efficient, secure, and robust air-to-ground communications [
11]. Saxena et al. [
12] investigated the effects of jamming caused by a malicious UAV on the performance of a free-space optical communication system, where a legitimate UAV served as a relay and an IRS was designed to improve the quality of received signals and enlarge the coverage. The overall average bit error rate and outage probability with non-Gaussian additive noise were derived and analyzed. Han et al. [
13] proposed a UAV-empowered IRS-backscatter communications network, where a passive IRS acts as the backscatter device and uses the received signals for backscatter communications to guarantee secure transmission. Tang et al. [
14] presented an anti-eavesdropping communication scheme to exploit aerial active reflecting and jamming to enhance wireless security in the presence of channel uncertainties at the eavesdroppers. Specifically, a robust optimization approach was employed to tackle the reflecting and jamming designing problem, and the aerial deployment was obtained through deep reinforcement learning (DRL). To increase the secrecy capacity, Pang et al. [
15] considered secure transmission issues in IRS-assisted UAV communications by joint optimization of UAV trajectory, beamforming vector, reflecting matrix, etc. However, this research work only took the single-user service case into account, but not for multiple users. In [
16], a secure IRS-assisted UAV wireless communication system based on multiple users was proposed. The passive beamforming, ground user association, UAV flight trajectory, and transmit power were jointly optimized to maximize the minimum average secrecy rate of ground users. However, the deployment of passive IRS limited the system security performance improvement.
Additionally, investigations in [
6,
17] illustrated that UAV-mounted IRS can achieve superior performance and flexibility compared to traditional fixed IRS. A downlink multi-user MISO flying IRS system model was considered in [
18]. Additionally, a DRL algorithm named FlyReflect was proposed to jointly optimize the flying trajectory and IRS phase-shift matrix. Truong et al. formulated an optimization problem to maximize the achievable system sum rate by jointly optimizing the flight trajectory and phase-shift matrix of the IRS, and a DRL method was applied to solve it. Nguyen et al. [
19] proposed an approach of low complexity for extending network coverage in a massive MIMO communication network, where multiple UAV-mounted IRSs were deployed. Moreover, a DRL method is adopted to jointly optimize the power coefficients and the phase shifts of the multiple IRSs. However, attaching IRSs to the UAV will increase the energy consumption of the UAV. Considering a large reflecting surface, the vibration and wind resistance of the UAV cannot be neglected.
To overcome the “multiplicative fading” effect introduced by passive IRSs, the power amplifier can be integrated into its reflecting units to amplify the reflected signals [
20]. Zhang et al. [
21] analyzed the performance of active IRSs and demonstrated the effectiveness of active IRSs for the first time. However, the current fully connected architecture of the active IRS consumes additional power, since there are abundant integrated power amplifiers. In contrast to the fully connected architecture, Liu et al. [
22] presented a sub-connected architecture in which several units share a single power amplifier and individually regulate their phase shift, considerably reducing the number of power amplifiers, and the new architecture can achieve improved energy efficiency. In [
23], a low-complexity approximated joint precoding algorithm based on alternating optimization was proposed to optimize the beamforming and active reflector matrix, which further demonstrated the practicability of active intelligent reflection in secure transmission. However, the amplification of noise by its active IRS was neglected, which makes the optimal solution inconsistent with the actual solution. Nguyen et al. [
24] considered a novel hybrid active/passive IRS-assisted UAV communications system. The hybrid IRS was equipped with a few active elements, which not only reflect but also amplify the incident signals for significant performance improvement. To maximize the minimum rate among users, the location, and power allocation of the UAV and the IRS reflecting/amplifying coefficients were jointly optimized. The application of hybrid IRS enables improved system performance without additional power consumption. For better comparison, the crucial parameters and optimization methods of reviewed works [
13,
14,
15,
16,
23,
24] are provided in
Table 1.
In general, there has been a fair amount of study on IRS-assisted UAV secure communication systems, but rare studies have considered both active IRS adjustment and multi-user services at the same time. The authors of [
14,
24] only discuss the location of UAVs, without considering the impact of UAV trajectory on the communication environment. In addition, few works have considered both the use of active IRSs and relevant energy constraints. Therefore, an active IRS-assisted UAV multi-user communication system is established, where multiple users are deployed on the ground and time division multiple access (TDMA) is applied as an access scheme to the network. Specifically, in urban scenarios with dense buildings and trees, where the LoS links between the UAV and ground users are often blocked, we deploy active IRS on building surfaces to enhance system security. With the objective of maximizing the average secrecy capacity, which can be represented by the average secrecy rate, user scheduling, UAV trajectory, multi-antenna beamforming, and the amplitude and phase of IRS are jointly optimized. The main contributions of this paper are summarized as follows:
We present an IRS-assisted UAV multi-user communication system model, where the UAV can dynamically select the best user for service within each time slot according to its channel conditions. Considering the presence of passive eavesdroppers and the LoS link being blocked between the UAV and legitimate users, the user scheduling, UAV trajectory, beamforming vector, and the reflecting matrix of IRS are jointly optimized to maximize the average achievable secrecy capacity during the flight.
The formulated non-convex optimization problem is first divided into four sub-problems. However, the sub-problems are still challenging to solve due to fractional and non-convex objectives. Hence, successive convex approximation (SCA) technology is applied in this paper to transform the trajectory optimization sub-problem into a convex form. Furthermore, the sub-problems of beam design and IRS control are transformed into a convex problem by applying the Charnes–Cooper transformation (CCT) method and the majorization-minimization (MM) algorithm, respectively. In order to tackle the aforementioned sub-problems and obtain the sub-optimal solution, we finally introduce the block coordinate descent (BCD) approach.
Simulation results validate the effectiveness of the proposed scheme and show that the secrecy capacity increased compared with the schemes with passive IRS and without optimal trajectory, respectively. It is shown that the active IRS-aided UAV scheme is efficient in reducing the impact of the “multiplicative fading” effect in secure communication systems.
3. Joint Optimization Algorithm
Note that if the value of
is negative in the
n-th time slot, we can control the transmit beamforming vector
, resulting in
. Thus, by modifying the beamforming vector, we can ensure that the secrecy capacity is never negative. In this case, it is possible to omit the operator
without affecting the result. Even so, the objective function of the original problem is non-convex and contains non-convex constraints, making it challenging to solve. Considering the coupling relationship among variables, the BCD algorithm is applied to decompose the original problem into four sub-problems: user scheduling, trajectory optimization, beamforming design, and active IRS control. For the first sub-problem, we choose the best user by comparing the overall channel conditions. The locally optimal trajectory solution can be obtained in the second sub-problem. In the beamforming design problem, the variables about beamforming always exist in quadratic terms. We first converted the problem by the semidefinite relaxation (SDR) algorithm and solved the fractional programming problem after transformation by CCT. Similarly, in the IRS designing problem, the SDR algorithm is applied first and the MM algorithm is used to relax the transformed non-convex objective function. The flow chart of the joint optimization algorithm is shown in
Figure 2.
3.1. User Scheduling Optimization
For the given UAV trajectory
, beamforming vector
, and reflecting matrix
, the transmission rate of eavesdroppers is settled. Thus, the average secrecy capacity is dependent entirely on the downlink rate of legitimate users. The problem (
P1) can be rewritten by
By finding
and setting the corresponding scheduling
, the rest
, then the optimal scheduling can be expressed as
3.2. Trajectory Optimization
With given user scheduling
, beamforming vector
, and reflecting matrix
, the trajectory optimization sub-problem can be formulated as
Based on Jensen’s inequality,
can be formulated by
Considering that , , and are fixed, let , , , .
Then, the simplified transmission rate of them can be expressed as
However, it is difficult to deal with (27) and (28) optimally due to their non-convexity. We introduce slack variables
,
, and
,
. Provided that
is always negative, which is hard to solve, we introduce slack variables
,
, the constraints can be expressed as
Then,
can be reformulated as follows:
The original sub-problem can be written as
which is still non-convex as
is still concave with respect to
and
. The SCA technique is applied to relax the aforementioned issues to its global lower-bound. The first-order Taylor expansion of (32) can be used to approximate it at the supplied local points
and
can be given by
Moreover, the constraints (33b) and (33c) are convex with respect to
and
, and the right parts in (30) and (31) are convex with respect to
, and can also be relaxed to its lower-bound by the first-order Taylor expansion, which can be given by
Bringing them to (33b), (33c), (30), and (31), respectively, the problem
can be approximated as
Thus far, is a standard convex problem that can be solved with the CVX tool.
3.3. Beamforming Optimization
Given user scheduling
, UAV trajectory
, and reflecting matrix
, the beamforming design sub-problem can be expressed as
Since the cascaded channel of the problem is extremely complex and the fixed power consumption in the constraint is known, the fixed parts can be given by (44)–(49):
Since the log formula is monotonous, the solution of the original problem will not be changed by omitting it, then the original sub-problem can be expressed as
is testing due to the non-convex objective function. Inspired by the SDR technique, let
,
, the original sub-problem can be transferred to a relaxed one:
which is a standard fractional programming problem. By applying the CCT method [
30], the above problem can be converted to
where
,
,
, and
,
can be properly optimized via the CVX tool. However,
may not be satisfied, so the original
cannot be recovered. Specifically, the rank-1 constraint can be equivalently expressed as
, where
is the largest eigenvalue of
,
represents the eigenvector corresponding to the largest eigenvalue of
. By constructing the penalty function, the objective function of this sub-problem is converted as follows:
When
is large enough, we have
, then the rank-1 constraint can be satisfied. However,
is still concave, and
is not differentiable. We can apply the sub-gradient of
as
, where
is the eigenvector corresponding to the largest eigenvalue of
. Therefore, given a feasible solution
for
in the
r-th iteration, we get the improved expression as
Problem can be properly optimized through the CVX solver. Given , , and , the log function in can be omitted because of its monotonicity. In objective functions and constraints, the variable always appears in quadratic form. Adopting the SDR algorithm, the problem is transformed by constructing and the CCT method is used to solve the fractional programming problem . It is worth noting that the rank-one constraint is introduced into SDR, so the penalty is constructed to recover the original variable as much as possible. The logic of the penalty-based recovery rank-1 algorithm is shown in Algorithm 1. By iteratively solving problem optimally, we can monotonically tighten the upper bound of (53). Penalty is updated to guarantee the rank-one constraint.
Algorithm 1 Beamforming Design Algorithm for Problem (P4). |
(1): Initialization: maximum threshold penalty feasible point , , and number of iterations . |
(2): Calculate . If , then the algorithm converges, go to step (5), else go to step (3). |
(3): Optimize and in , with given . |
(4): Calculate . If , set go to step (3), else set ,
and go to step (2). |
(5): update as the optimal solution of . |
3.4. Active IRS Optimization
For given user scheduling
, UAV trajectory
, and beamforming vector
, the sub-problem of optimizing
can be expressed as
Provided that
always appears in quadratic form, the SDR method is applied again as same as in
. Let
, and the original problem can be rewritten as follows:
where
Due to the objective function’s non-convexity, we can relax the problem and use the MM algorithm to iteratively optimize the relaxed one. The penalty-based strategy is used once more to recover the rank-1 solution throughout each iteration. At feasible point
,
can be approximated by its first-order Taylor expansion:
Here,
is a surrogate function, after dropping the constant term, the beamforming design problem can be recast into a convex form as
can be directly optimized using the CVX solver, then the rank-1 solution is recovered by adding the penalty
. After getting optimal
, the initial reflecting matrix can be rewritten as
. The phase coefficient and amplification coefficient can be expressed as follows:
Algorithm 2 demonstrates the algorithm’s rationale. The SDR algorithm is adopted to convert the original sub-problem into an SDP format. Applying the MM algorithm, a surrogate function is constructed to replace the objective function in . By iteratively solving problem optimally, the convergence of promised. In each iteration, the penalty-based method is applied to recover the rank-1 solution.
Algorithm 2 Active IRS Control Algorithm for Problem (P5). |
(1): Initialization: maximum threshold , feasible point , Calculate given and number of iterations . |
(2): Optimize in , with given . |
(3): Calculate . If , the penalty-based method is applied to recover the rank-1 solution. |
(4): Calculate given the rank-1 solution . |
(5): Calculate . If , then the algorithm converges, go to step (6), else set , and go to step (2). |
(6): Update as the optimal solution of . |
3.5. Overall Algorithm Description
The overall algorithm for solving the issue is outlined in Algorithm 3, where the BCD algorithm is applied, in accordance with the results gained in the previous four sub-problems. The original problem’s sub-optimal solution is found by solving the sub-problems in turn.
is an approximate solution to the sub-problem obtained from the decomposition of the original problem, and the convergence analysis of the BCD method cannot be applied directly. The convergence of Algorithms 1 and 2 are proved in
Appendix A and
Appendix B, respectively.
Algorithm 3 Joint Optimization Algorithm for Maximizing Average Secrecy Capacity. |
(1): Initialization: maximum threshold , feasible point and iteration . |
(2): Obtain with given by solving . |
(3): Obtain with given by solving . |
(4): Obtain with given by solving . |
(5): Obtain with given by solving . |
(6): With Given , update set . |
(7): Calculate the increment of the target value , if , the algorithm converges, go to step (8), else go to step (2). |
(8): Output . |
Denote
as the objective function of
, then consider that
is the solution of
,
is the solution of
,
is the solution of
, and
is the solution of
. According to the above convergence analysis, we get the following inference:
The target value of problem is non-decreasing after each iteration of Algorithm 3. Since the target value of problem is bounded by a finite value, Algorithm 3 must converge to a stable point.
The computational complexity of solving
is expressed as
, the computational complexity of using the SCA algorithm for
is
[
31], and the computational complexity of solving semidefinite programming problems for
and
is expressed as
and
[
32], respectively. Thus, the complexity of the overall algorithm is
, where
indicates the total number of iterations [
33].
4. Analysis of Simulation Results
This section presents numerical findings to demonstrate the effectiveness of the suggested joint optimization scheme based on an active IRS-aided UAV system in improving the system’s average secrecy capacity. In this section, we present simulation results to show the performance of the proposed secure transmission scheme. Specifically, we assume that the ground area is
, where the fixed height of the UAV is
with a maximum speed
, the starting position is at the origin, and the flight endpoint of the UAV is
. We consider a scenario where a
antenna UAV and a
element active IRS are employed to cooperatively serve the
legitimate users, whose positions are
and
, respectively. The active IRS adopts a fully connected architecture, which means there are
amplifiers. The antenna arrays of the UAV and the active IRS are assumed to be a uniform linear array and UPA, respectively, where the antenna spacings are both
,
is the frequency of the carrier wave. The position of the single passive eavesdropper is
. There are also fixed active IRSs located at
with a height of
. The UAV flies at a constant power
, the hardware static power of the active IRS, which corresponds to the phase shift and amplifier are
, the maximum power budget at UAV and active IRS are
,
is the time slot. Moreover,
and
,
,
, are the power of AWGN, the path loss exponent, the Rician factor, and the reference channel gain, respectively. The default simulation parameters are shown in
Table 3 unless otherwise specified.
4.1. Performance Simulation Results
Figure 3 illustrates the distribution of four legitimate users, the eavesdropper as well as the active IRS, and plots the optimal trajectory of the UAV under different flight time conditions. Due to the “multiplicative fading” effect introduced by IRS, the UAV can balance the cascaded channel conditions by flying around the IRS and legitimate users and away from eavesdroppers, providing a safer quality of communication for legitimate users. Four situations are represented as four actual scenarios: for the original strategy, the UAV can only fly in an approximately straight path; when
, the UAV will try to fly to the best location to serve each legitimate user; when
, the UAV can reach each optimal location and stay appropriately; when
, the UAV will stay in the optimal location longer, providing a safer and better quality of service to legitimate users.
Figure 4 shows the time allocation and scheduling of four users in each time slot. In order to maximize the average secrecy capacity, the UAV should select appropriate users to transmit signals. It is shown that at the beginning, user-1 can obtain a higher secrecy rate and be selected. Until the 16th slot, user-2 can have a more secure communication environment due to the changes in UAV position, beamforming, and reflection parameters of the IRS, so user-2 becomes the served user. Once a user is selected for service, the UAV will send signals to that the user to obtain the maximum average secrecy capacity. In a multi-user scenario where time is sufficient, the UAV will first select the service user
and fly to the optimal location. Taking the flight constraints into account, the UAV will stay for an appropriate amount of time and fly to the next optimal position, simultaneously sending a signal to
as so on until it reaches the destination.
4.2. Performance Comparison of Different Optimization Algorithms
Figure 5 shows a comparison between the suggested scheme and the other two benchmarks in terms of the average secrecy capacity with respect to various values of
in
, which is equivalent to the transmitting power. We considered a scenario where a
antenna UAV and a
element active IRS are employed cooperatively. In addition, it is worth noting that for the active scheme
is used for transmitting antennas and the same power
for reflecting signals, while for the passive schemes
is used for transmitting signals. It is shown that the rate of all schemes will increase with the increase in
to varying degrees. For example, at
, the active IRS achieves an improvement of
and
compared to the case with passive IRS and without IRS, respectively. By jointly optimizing user scheduling, UAV trajectory, beamforming, and the reflecting matrix, the proposed joint optimization strategy can outperform the benchmark schemes in terms of average secrecy capacity, proving that it is an efficient way to enhance security performance.
Figure 6 shows the curve of the performance of the average security capacity with different settings of the number of IRS reflector units
and the number of antennas of UAV
. The transmit power
. As can be seen from the figure, our scheme can achieve acceptable performance in the above three settings. By comparing the curve of the
and
schemes, we can find that the average secrecy capacity will increase significantly with the increase in
, since more reflecting units can better align the signal to the served user. By comparing the curve of the
and
schemes, it is verified that the beamforming capability was also improved to some extent by increasing
, with a further improvement in secure communication performance.
The convergence of the proposed joint optimization algorithm (Algorithm 3) and the benchmark algorithm is depicted in
Figure 7. The average secrecy capacity scheme under consideration is
higher than the benchmark without optimal trajectory. Additionally, the method converges after roughly
rounds.
.
5. Conclusions
This paper established a model for an active IRS-assisted UAV communication system where the UAV can dynamically select a user for service in each time slot based on its channel conditions. To maximize the average achievable secrecy capacity for the whole flight, the user scheduling, UAV trajectory, transmitting beamforming, and reflecting matrix are jointly optimized. However, the established problem was challenging to solve because of the objective non-convex function and tightly coupled variables. Therefore, an algorithm based on BCD is adopted to solve it. Initially, we decoupled the original issue into four sub-problems, and then the SCA technique, CCT method, and MM algorithm were applied to convert the original sub-problems into convex forms. Furthermore, we solved the above four sub-problems alternately based on the BCD algorithm and finally obtained the equivalent solution of the original problem. Numerical results show that the active IRS-assisted UAV communication scheme can efficiently weaken the effect of the “multiplicative fading” and significantly improved the secrecy capacity. In future research, we will consider the issues of IRS discrete designing and new advanced multi-access techniques for next-generation networks, such as NOMA and RSMA. Moreover, the DRL algorithm can be applied to solve the related optimization problems.