Next Article in Journal
Reinforcement Learning-Based Formation Pinning and Shape Transformation for Swarms
Next Article in Special Issue
Energy Minimization in Reconfigurable Intelligent Surface-Assisted Unmanned Aerial Vehicle-Enabled Wireless Powered Mobile Edge Computing Systems with Rate-Splitting Multiple Access
Previous Article in Journal
Vertidrome Airside Level of Service: Performance-Based Evaluation of Vertiport Airside Operations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems

1
School of Electrical Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon 34141, Republic of Korea
2
School of Electronics Engineering, Kyungpook National University, Daegu 14566, Republic of Korea
3
Department of Information and Communication Engineering, Myongji University, Yongin-si 17058, Republic of Korea
*
Author to whom correspondence should be addressed.
Drones 2023, 7(11), 672; https://doi.org/10.3390/drones7110672
Submission received: 22 September 2023 / Revised: 4 November 2023 / Accepted: 10 November 2023 / Published: 12 November 2023
(This article belongs to the Special Issue Advances in Green Communications and Networking for Drones)

Abstract

:
Unmanned aerial vehicle (UAV)-assisted simultaneous wireless information and power transfer (SWIPT) systems have recently gained significant attraction in internet-of-things (IoT) applications that have limited or no infrastructure. Specifically, the free mobility of UAVs in three-dimensional (3D) space allows us good-quality channel links, thereby enhancing the communication environment and improving performance in terms of achievable rates, latency, and energy efficiency. Meanwhile, IoT devices can extend their battery life by harvesting the energy following the SWIPT protocol, which leads to an increase in the overall system lifespan. In this paper, we propose a secure UAV-assisted SWIPT system designed to optimize the secrecy energy efficiency (SEE) of a ground network, wherein a base station (BS) transmits confidential messages to an energy-constrained device in the presence of a passive eavesdropper. Here, we employ a UAV acting as a helper node to improve the SEE of the system and to aid in the energy harvesting (EH) of the battery-limited ground device following the SWIPT protocol. To this end, we formulate the SEE maximization problem by jointly optimizing the transmit powers of the BS and UAV, the power-splitting ratio for EH operations, and the UAV’s flight path. The solution is obtained via a proposed algorithm that leverages successive convex approximation (SCA) and Dinkelbach’s method. Through simulations, we corroborate the feasibility and effectiveness of the proposed algorithm compared to conventional partial optimization approaches.

1. Introduction

Unmanned aerial vehicles (UAVs) have recently garnered attention for internet-of-things (IoT) networks due to their high mobility, affordable installation costs, and flexibility in deployment. These advantages of UAVs are particularly pronounced in environments with limited or no infrastructure, such as rural areas, disaster and emergency response scenarios, military services, advanced radio technology, etc. [1,2,3]. However, the constrained energy capacity and limited coverage range of energy-restricted UAVs introduce new challenges in the design of wireless communication systems. Consequently, recent research efforts in UAV-assisted wireless networks have pivoted towards addressing energy efficiency and energy-aware deployment issues.
For energy-constrained devices, radio frequency wireless power transfer (WPT) technology emerges as an effective and attractive solution. In UAV-assisted IoT networks, the advantages of WPT are further highlighted as devices harvest energy from radio signals, thereby recharging battery-limited devices, i.e., IoT devices and UAVs, and extending the overall system lifespan. To actualize UAV-assisted WPT in IoT environments, several architectures have been explored, such as wireless powered communication networks (WPCN) and simultaneous wireless information and power transfer (SWIPT). In subsequent sections, we delve into the related works concerning UAV-assisted networks and WPT in greater detail [4,5,6,7,8,9,10,11,12,13,14,15,16,17].

1.1. Related Work

1.1.1. UAV-Assisted Networks

As UAVs possess the ability to fly freely within their operational capabilities, they are well suited for enhancing physical-layer secrecy [4]. In studies such as [5,6,7,8,9,10,11], UAV-assisted network systems have been explored, wherein the UAV serves as a relay to facilitate communication between wireless devices. For instance, UAVs can operate as helper nodes, moving away from potential eavesdroppers (Eves or Es) while orbiting the intended user to transmit confidential information. Conversely, as jammers, UAVs can hover near Eves to cause interference while maintaining a distance from the intended user to avoid disrupting the signal. For this reason, the UAVs have been actively explored [5,6,7,8] to improve physical-layer security. Compared to the prior research in the field of physical-layer security, the study in [5] represents the first instance where enhancements in the secrecy rate have been achieved via jointly optimizing power control and trajectory under the assumption that the location of the Eve is perfectly known. In contrast, the influence of imprecise information about multiple Eves’ locations on the UAV’s trajectory and transmit power design is examined in [6]. The authors in [7] propose the full-duplex secrecy communication scheme for the UAV to achieve the maximum secrecy energy efficiency (SEE) of the UAV. Furthermore, ref. [8] describes a UAV-enabled data collection system where an intelligent reflecting surface (IRS) aids communication between a cluster of IoT devices and a UAV, despite the presence of a malicious jammer.
Regarding IoT systems with battery-limited devices, several studies [9,10,11] focus on the energy consumption or energy efficiency of IoT devices with UAV support. The authors in [9] propose the joint optimization problem of resource allocation and UAV’s path planning with the aim of minimizing the end devices’ energy consumption for the mobile edge computing system via a UAV-mounted cloudlet. In [10], the minimization of energy consumption is addressed in the rotary-wing UAV-assisted communication system. The design of maximizing the energy efficiency (EE) through the UAV’s trajectory optimization is studied in [11]. Nevertheless, considering that UAVs are also constrained by their battery life, which limits their available operation time, their finite energy budget must be considered in the system design [4,5,6,7,8,9,10,11].

1.1.2. Wireless Power Transfer (WPT)

The concept of UAV-enabled WPT was introduced in [12,13], wherein UAVs act as mobile energy transmitters to recharge low-power devices on the ground. By leveraging their free mobility, UAVs can strategically position themselves to minimize the distance to targeted ground users, thereby enhancing the efficiency of both wireless information transfer (WIT) and WPT. The work in [14] addresses the throughput maximization problem in a UAV-based WPCN by jointly optimizing the UAV’s trajectory and the allocation of transmission resources for both uplink WIT and downlink WPT. Moreover, the integration of UAV-assisted communication with SWIPT is proposed in [15] to facilitate IoT networks during emergency situations. In [16], the researchers investigate the maximization of the secrecy rate in a UAV-enabled communication network that conducts SWIPT in a millimeter-wave (mmWave) communication environment suitable for IoT applications. The paper [17] discusses the novel design challenges and strategies for UAV-assisted wireless energy transfer in anticipation of the forthcoming 6G era, which will be characterized by the internet of everything. Prior works such as [14,15,16,17] focus on user throughput or secrecy rates in UAV-assisted SWIPT systems, taking into account the UAV’s constrained energy but not from an EE perspective.

1.2. Our Contributions

Motivated by the limitations of previous works [4,5,6,7,8,9,10,11,12,13,14,15,16,17] in terms of secrecy and EE, we investigate the SEE for secure UAV-assisted SWIPT systems. SEE is defined as the ratio between the achievable secrecy rate of the desired link and the UAV’s energy consumption. In our setup, a base station (referred to as Alice or A) communicates confidentially with an energy-constrained IoT device (referred to as Bob or B) on the ground, with the assistance of a UAV and in the presence of a passive Eve. To maximize the SEE of the system, we formulate an optimization problem and develop a corresponding algorithmic solution. The main contributions of this paper are summarized as follows:
  • We formulate the SEE maximization problem, jointly optimizing Alice’s transmit power, the UAV’s transmit power, Bob’s power splitting ratio for energy harvesting (EH), and the UAV’s trajectory, considering the functional capability constraints of network devices, such as maximum speed, average power, and peak power.
  • To solve the formulated problem, we propose an efficient iterative algorithm based on successive convex approximation (SCA) [18] and Dinkelbach’s method [19], which converges to a local minimum of the original non-convex problem.
  • Through simulations, we demonstrate the superior performance of proposed algorithm compared to conventional partial optimization methods. To the best of our knowledge, this is the first study to focus on the SEE of UAV-assisted communication systems with EH in an energy-constrained environment.
The remainder of this paper is organized as follows: Section 2 describes the system model and performance metrics. Section 3 details the formulation of the SEE maximization problem and the development of the algorithm for finding local optimal solutions. Numerical results and concluding remarks are presented in Section 4 and Section 5, respectively.

2. System Model and Performance Metric

We consider a secure UAV-assisted SWIPT system, as shown in Figure 1. Alice transmits the confidential information to Bob with the aid of a rotary-wing UAV, while a passive Eve attempts to wiretap it. Without loss of generality, a three-dimensional Cartesian coordinate system is adopted, whose coordinates are measured in meters. We assume that Alice, Bob, and Eve are located at the position L i = ( x i , y i , 0 ) , for  i { A , B , E } , in the xy-plane, e.g., on the ground, while the UAV flies along a trajectory L U ( t ) = ( x U ( t ) , y U ( t ) , H ) with the fixed altitude of H, for the given flying period 0 t T . Due to the horizontally constant altitude H for the UAV, we focus on the projection of the UAV’s trajectory onto the xy-plane. Additionally, for the aerospace regulations and the operational capability, the initial and final positions and the maximum velocity of the UAV are predetermined as L U I = ( x U I , y U I , H ) , L U F = ( x U F , y U F , H ) and v max , respectively. The UAV is assumed to operate in a time division duplex (TDD) manner. Alice transmits the confidential messages to the UAV, and then the UAV forwards the decoded messages to Bob with the attempt to improve the secrecy rate while supporting the EH operation of Bob. Here, by following the SWIPT protocol design in [16], the received signal power at Bob is split into two types of power streams such as one portion w of the power for data communication and the remaining portion ( 1 w ) of the power for EH with satisfying 0 w 1 .
We consider that the mission time T is discretized into N time slots with a sufficiently small time t s = T / N in seconds (s) [7,9]. Accordingly, the UAV’s position L U ( t ) can be discretized as L U [ n ] = ( x U [ n ] , y U [ n ] , H ) , for  n N = { 1 , , N } . In addition, the distance d s = v max t s denotes the maximum distance of horizontally traveling within each time slot with the maximum speed v max in m/s. The distance of d s is chosen to be sufficiently small compared to H so that the air-to-ground channels of the UAV are assumed to be time-invariant within each slot. We define L U [ n ] = ( x U [ n ] , y U [ n ] , H ) as the location of the UAV for all time slot n, which satisfies the mobility constraints as follows:
L U [ n ] L U [ n 1 ] d s for n N ,
L U [ 0 ] = L U I and L U [ N ] = L U F .
Following [7,9,16], the air-to-ground channels between the UAV and ground nodes, i.e., Alice, Bob, and Eve, are assumed to be dominated by line-of-sight (LOS) links. At the n-th slot, the channel gain between the UAV and ground nodes is given by
h U j [ n ] = ρ 0 ( d U j [ n ] ) α = ρ 0 ( L U [ n ] L j 2 + H 2 ) α 2 for j { A , B , E } ,
where d i j [ n ] = ( L i [ n ] L j 2 + H 2 ) 1 / 2 is the Euclidean distance between node i and j, α denotes the pathloss exponent of the channels, and  ρ 0 denotes the gain of a channel with the reference distance d 0 = 1 m. The ground channels from Alice to Bob and Eve are assumed to be Rayleigh channels. Hence, the channel coefficients from Alice to Bob and Eve in slot n are given by g A j [ n ] = ρ 0 ( d A j [ n ] ) α ζ j for j { B , E } , where α denotes the pathloss exponent and ζ j is an exponentially distributed random variable with unit mean accounting for the small-scale Rayleigh fading. Since t s is assumed to be much smaller than the coherence time of the ground channels, the channels are supposed to be stationary and ergodic within each time slot.
We define P A [ n ] and P U [ n ] as the transmit powers of Alice and UAV at time slot n, respectively, which, in real applications, need to satisfy the average and peak power constraints as [5]:
1 N n = 1 N P j [ n ] P j avg , 0 P j [ n ] P j peak for n N ,
where P j avg P j peak for j { A , U } . Also, it is noted that the communication energy consumption is much smaller than the propulsion energy, which allows us to omit the communication energy consumption in the following SEE calculation [7,11]. Based on [10], the UAV’s propulsion energy consumption E P [ n ] at time slot n, consisting of blade profile, induced power, and parasite power in Joules (J), can be modeled as
E P [ n ] = t s ( P 0 ϕ [ n ] + P i ( ψ [ n ] ) 1 / 2 + 1 2 d 0 ρ s A ( v [ n ] ) 3 ) ,
where the horizontal UAV’s flying speed is given by v [ n ] = L U [ n ] L U [ n 1 ] / t s ; ϕ [ n ] = 1 + 3 ( v [ n ] ) 2 / U tip 2 with U tip being the tip speed of the UAV’s rotor blade; ψ [ n ] = ( 1 + ( v [ n ] ) 4 / ( 4 v 0 4 ) ) 1 / 2 ( v [ n ] ) 2 / ( 2 v 0 2 ) ; P 0 , P i and v 0 represent the blade profile power, the induced power, and the mean rotor-induced speed when the UAV is hovering, respectively; and d 0 , ρ , s, and A denote the fuselage drag ratio, the air density, the rotor solidity, and the rotor disc area, respectively. Note that (5) is practically valid for the straight and level flight of the rotary-wing UAV, which is satisfied in each time slot n due to the approximated piecewise-linear trajectory over time slots.
Under the assumption that the Eve adopts the maximal ratio combining (MRC) scheme to intercept the confidential information, the secrecy rate R S [ n ] between Alice and Bob can be expressed as [20]
R S [ n ] = [ R AB [ n ] R AE [ n ] ] + ,
where [ x ] + max ( x , 0 ) ;
R AB [ n ] = min ( log 2 ( 1 + γ AU [ n ] ) , log 2 ( 1 + γ AB [ n ] + γ UB [ n ] ) )
with γ AU [ n ] = γ AU ( P A [ n ] , L U [ n ] ) = h AU [ n ] P A [ n ] / σ U 2 , γ AB [ n ] = γ AB ( P A [ n ] , w ) = w g AB P A [ n ] / σ B 2 and γ UB [ n ] = γ UB ( P U [ n ] , w , L U [ n ] ) = w h UB [ n ] P U [ n ] / σ B 2 representing a signal-to-noise ratio (SNR) of Alice to Bob, Alice to UAV, and UAV to Bob, respectively;
R AE [ n ] = log 2 ( 1 + γ AE [ n ] + γ UE [ n ] )
with γ AE [ n ] = γ AE ( P A [ n ] ) = g AE P A [ n ] / σ E 2 and γ UE [ n ] = γ UE ( P U [ n ] , L U [ n ] ) = h UE [ n ] P U [ n ] / σ E 2 representing the SNR of Alice to Eve and UAV to Eve, respectively, and σ B 2 , σ U 2 , and σ E 2 are the noise power at Bob, UAV, and Eve, respectively.
The goal of this paper is to maximize the SEE of the UAV-assisted SWIPT systems under the transmit power constraints of Alice and UAV, the EH constraint of Bob, and the flying constraints for UAV. In wireless communications, SEE is a pivotal metric that quantifies how much confidential data a system can relay per energy unit used, capturing both its energy efficiency and secure transmission proficiency [7]. To this end, we define the SEE in bits/J that concerns the technical ratio between the secrecy rate R S [ n ] in (6) and the UAV’s flying energy consumption in (5) as
SEE ( P A , P U , w , L U ) = B n = 1 N R S [ n ] n = 1 N E P [ n ] ,
with Alice’s transmit power P A { P A [ n ] } n = 1 N , the UAV’s power P U { P U [ n ] } n = 1 N , power splitting ratio w, UAV’s trajectory L U { L U [ n ] } n = 1 N , where B denotes the system bandwidth. In (9), it is noted that the flying energy consumption of UAV dominates the other energy consumption, e.g., communication, computing, etc. [10].

3. Secrecy Energy Efficiency Maximization

In this paper, we aim to maximize the SEE in (9) for the secure UAV-assisted SWIPT communication systems over N time slots by jointly optimizing Alice’s transmit power, the UAV’s transmit power, the UAV’s trajectory, and Bob’s power splitting ratio for EH operation. To this end, we formulate the optimization problem as
max P A , P U , w , L U SEE ( P A , P U , w , L U ) ,
s . t . 1 N n = 1 N g AB P A [ n ] + h UB [ n ] P U [ n ] ( 1 w ) η φ ,
(1), (2) and (4),
where (11) represents the EH constraint with η being energy conversion efficiency and φ being power threshold of Bob. The problem (10) is not convex since the objective function (10) is jointly concave with respect to the optimization variables. To resolve the problem (10), we develop an efficient iterative Algorithm 1 to obtain a high-quality local optimal solution of problem (10). In particular, in each iteration of the proposed Algorithm 1, we divide the original problem (10) into three subproblems; that is, (1) one optimizes P A and P U with fixed w and L U ; (2) another optimizes w with fixed P A , P U , and L U ; and (3) the other optimizes L U with fixed P A , P U , and w. In the following, we detail the procedure to find the solution of each subproblem per iteration of Algorithm 1.
Algorithm 1: SEE Maximization Algorithm
 1
Initialization: Input P A 0 , P U 0 , w 0 , and  L U 0 . Let k = 0 .
 2
Repeat
 3
   1. With  w k and L U k , update P A k + 1 and P U k + 1 by (18);
 4
   2. With  P A k + 1 , P U k + 1 , and  L U k , update w k + 1 by (22);
 5
   3. With  P A k + 1 , P U k + 1 , and  w k + 1 , update L U k + 1 by (40);
 6
  Repeat (Dinkelbach’s method) [19]:
 7
    Set the Numerator and Denominator of (40) as Ξ ( x , y ) and Y ( x , y ) ;
 8
    Step1. Set λ 1 = Ξ ( x ˙ , y ˙ ) / Y ( x ˙ , y ˙ ) for arbitrary x ˙ X , y ˙ Y ;
 9
    Step2. Formulate D ( x i , y i ) = max { Ξ ( x , y ) λ i Y ( x , y ) | x X , y Y } .
 10
      Solve linear program D ( x i , y i ) . Denote the solution as x i and y i ;
 11
     Step3. If  D ( x i , y i ) < δ for δ ( k ) ( 0 , 1 ] , δ ( k ) 0 , and  k δ ( k ) = , stop;
 12
        Else Let λ i + 1 = Ξ ( x i , y i ) / Y ( x i , y i ) . Go to Step 2 to replace i with i + 1 ;
 13
   4. Set SEE k + 1 ( P A k + 1 , P U k + 1 , w k + 1 , L U k + 1 ) , k k + 1 ;
 14
until (convergence criterion is satisfied)

3.1. Optimization of Transmit Powers

Here, we optimize the transmit powers of Alice and the UAV with the fixed w and L U . By adopting the slack variable S = { S [ n ] } n = 1 N for (10), the SEE problem (10) can be reformulated as
max P A , P U , S n = 1 N S [ n ] ,
s . t . S [ n ] B 2 { log 2 ( 1 + a 1 P A [ n ] ) log 2 ( 1 + a 3 P A [ n ] + a 4 [ n ] P U [ n ] ) } for n N , S [ n ] B 2 { log 2 ( 1 + a 2 P A [ n ] + a 5 [ n ] P U [ n ] ) log 2 ( 1 + a 3 P A [ n ] + a 4 [ n ] P U [ n ] ) }
for n N ,
(4) and (11),
where we assume that the flying energy consumption of E P only depends on the velocity v, and we define a 1 = h AU [ n ] / σ U 2 , a 2 [ n ] = w g AB / σ B 2 , a 3 = g AE / σ E 2 , a 4 [ n ] = h UE [ n ] / σ E 2 , and a 5 [ n ] = w h UB [ n ] / σ B 2 . Since the problem (13) with the constraints (14) and (15) involving difference of convex (DC) program is still non-convex, we employ the SCA method [18] that prescribes the iterative solution of non-convex problems by replacing the non-convex objective function and constraints with the suitable convex approximations. By denoting P A k = { P A k [ n ] } n = 1 N and P U k = { P U k [ n ] } n = 1 N as the set of transmit powers of Alice and the UAV at the k-th iteration and applying the first-order Taylor expansion [21], we can obtain the respective global upper bounds for the minus portion of the right-hand sides of (14) and (15) as
log 2 ( 1 + a 3 P A [ n ] + a 4 [ n ] P U [ n ] ) log 2 ( 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) + a 3 ( P A [ n ] P A k [ n ] ) 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] + a 4 [ n ] ( P U [ n ] P U k [ n ] ) 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] .
Then, the problem (13) can be written as
max P A , P U , S n = 1 N S [ n ] ,
s . t . S [ n ] B 2 { log 2 ( 1 + a 1 P A [ n ] ) a 31 [ n ] P A [ n ] a 41 [ n ] P U [ n ] + a 6 [ n ] } for n N , S [ n ] B 2 { log 2 ( 1 + a 2 P A [ n ] + a 5 [ n ] P U [ n ] ) a 31 [ n ] P A [ n ] a 41 [ n ] P U [ n ] + a 6 [ n ] }
for n N ,
(4) and (11),
where a 31 [ n ] = a 3 / ( 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) , a 41 [ n ] = a 4 [ n ] / ( 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) , and a 6 [ n ] = { ( a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) / ( 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) } log 2 ( 1 + a 3 P A k [ n ] + a 4 [ n ] P U k [ n ] ) . The problem (18) is convex, and accordingly can be solved by the CVX solver [22]. Since the upper bounds in (17) suggests that any feasible solution P A k and P U k of (10) is also feasible for (18), the optimal value obtained by solving (18) serves as the lower bound for that of the problem (10).

3.2. Optimization of Power Splitting Ratio

The problem of optimizing the power splitting ratio w with the fixed P A , P U , and L U can be written by the definition of R AB [ n ] in (6) as
max w n = 1 N R A B w [ n ] ,
s.t. (11),
where
R A B w [ n ] = 1 2 log 2 { 1 + ( g A B P A [ n ] + h U B [ n ] P U [ n ] ) w σ B 2 } .
The problem (22) is convex, and accordingly can be solved by the CVX solver [22].

3.3. Optimization of UAV’s Trajectory

In this subsection, given P A , P U , and w, we optimize L U by introducing slack variables m = { m [ n ] } n = 1 N , q = { q [ n ] } n = 1 N , and u = { u [ n ] } n = 1 N , with satisfying m [ n ] H 2 + L U [ n ] L A [ n ] 2 , q [ n ] H 2 + L U [ n ] L B [ n ] 2 , and u [ n ] H 2 + L U [ n ] L E [ n ] 2 . Consequently, the problem (10) can be represented as
max L U , m , q , u [ B 2 n = 1 N [ min log 2 1 + b 1 [ n ] m [ n ] , log 2 1 + γ A B [ n ] + b 2 [ n ] q [ n ] log 2 1 + γ AE [ n ] + b 3 [ n ] u [ n ] ] ] × 1 n = 1 N E P [ n ] ,
s . t . m [ n ] H 2 + L U [ n ] L A [ n ] 2 for n N ,
q [ n ] H 2 + L U [ n ] L B [ n ] 2 for n N ,
u [ n ] H 2 + L U [ n ] L E [ n ] 2 for n N ,
(1) and (2),
where b 1 [ n ] = ρ 0 P A [ n ] / σ U 2 , b 2 [ n ] = w ρ 0 P U [ n ] / σ B 2 , and b 3 [ n ] = ρ 0 P U [ n ] / σ E 2 .
To address the non-convexity of (25) due to the DC function depending on L U , we apply the SCA method [18] as in Section 3.1. By introducing slack variable C = { C [ n ] } n = 1 N for (25), we can rewrite the problem (25) as
max L U , C , m , q , u n = 1 N C [ n ] n = 1 N E P [ n ]
s . t . C [ n ] 1 2 log 2 1 + b 1 [ n ] m [ n ] log 2 1 + γ AE [ n ] + b 3 [ n ] u [ n ] for n N ,
C [ n ] 1 2 log 2 1 + γ A B [ n ] + b 2 [ n ] q [ n ] log 2 1 + γ AE [ n ] + b 3 [ n ] u [ n ] for n N ,
(1), (2), (26), (27), and (28)
By applying the first-order Taylor expansion [21], the first term in (31) with m k = { m k [ n ] } n = 1 N at the k-th iteration can be lower-bounded as
log 2 1 + b 1 [ n ] m [ n ] log 2 1 + b 1 [ n ] m k [ n ] b 1 [ n ] ( m [ n ] m k [ n ] ) ln 2 ( ( m k [ n ] ) 2 + b 1 [ n ] m k [ n ] ) .
Similarly, the first log-term in constraint (32) with q k = { q k [ n ] } n = 1 N and the second log-terms in constraint (31) and (32) with u k = { u k [ n ] } n = 1 N in the k-th iteration can be lower-bounded as
log 2 1 + γ A B [ n ] + b 2 [ n ] q [ n ] log 2 1 + γ A B [ n ] + b 2 [ n ] q k [ n ] b 2 [ n ] ( q [ n ] q k [ n ] ) ln 2 ( ( 1 + γ A B [ n ] ) ( q k [ n ] ) 2 + b 2 [ n ] q k [ n ] )
and
log 2 1 + γ AE [ n ] + b 3 [ n ] u [ n ] log 2 1 + γ AE [ n ] + b 3 [ n ] u k [ n ] b 3 [ n ] ( u [ n ] u k [ n ] ) ln 2 ( 1 + γ AE [ n ] ) ( u k [ n ] ) 2 + b 3 [ n ] u k [ n ] ,
respectively. Next, we deal with the non-convexity of the helper UAV’s flying energy consumption of E P [ n ] in (25). The terms for blade profile power and parasite power are convex, while the term for induced power is non-convex. To tackle with this issue, we also introduce the equivalent formulas of E P [ n ] with the slack variable e = { e [ n ] } n = 1 N as [10]:
1 e 2 [ n ] e 2 [ n ] + v 2 [ n ] v 0 2
= e 2 [ n ] + L U [ n ] L U [ n 1 ] 2 v 0 2 t s 2 ,
with satisfying e [ n ] [ ( 1 + ( v [ n ] ) 4 / ( 4 v 0 4 ) ) 1 2 ( v [ n ] ) 2 / ( 2 v 0 2 ) ] 1 2 . By applying the first-order Taylor expansion [21], the right-hand side of (38) at any given points e k = { e k [ n ] } n = 1 N and L U k = { L U k [ n ] } n = 1 N in the l-th iteration has the following lower bound:
e 2 [ n ] + L U [ n ] L U [ n 1 ] 2 v 0 2 t s 2 ( e k [ n ] ) 2 + 2 e k [ n ] ( e [ n ] e k [ n ] ) ψ k [ n ] 2 v 0 2 t s 2 + 2 v 0 2 t s 2 ( ψ k [ n ] ) T ( L U [ n ] L U [ n 1 ] ) F k ( e [ n ] , L [ n ] , L [ n 1 ] ) ,
where ψ k [ n ] = L U k [ n ] L U k [ n 1 ] . With (30)–(39), we can rewrite (25) as
max L U , C , m , q , u , e n = 1 N C [ n ] n = 1 N [ P 0 ϕ [ n ] + P i e [ n ] + 1 2 d 0 ρ s A v 3 [ n ] ]
s . t . C [ n ] 1 2 { log 2 1 + b 1 [ n ] m k [ n ] b 1 [ n ] ( m [ n ] m k [ n ] ) ln 2 ( ( m k [ n ] ) 2 + b 1 [ n ] m k [ n ] ) log 2 1 + γ AE [ n ] + b 3 [ n ] u k [ n ] + b 3 [ n ] ( u [ n ] u k [ n ] ) ln 2 ( 1 + γ AE [ n ] ) ( u k [ n ] ) 2 + b 3 [ n ] u k [ n ] } for n N ,
C [ n ] 1 2 { log 2 1 + γ A B [ n ] + b 2 [ n ] q k [ n ] b 2 [ n ] ( q [ n ] q k [ n ] ) ln 2 ( ( 1 + γ A B [ n ] ) ( q k [ n ] ) 2 + b 2 [ n ] q k [ n ] ) log 2 1 + γ AE [ n ] + b 3 [ n ] u k [ n ] + b 3 [ n ] ( u [ n ] u k [ n ] ) ln 2 ( 1 + γ AE [ n ] ) ( u k [ n ] ) 2 + b 3 [ n ] u k [ n ] } for n N ,
1 e 2 [ n ] F k ( e [ n ] , L [ n ] , L [ n 1 ] ) for n N ,
e [ n ] 0 for n N ,
(1), (2), (26), (27), and (28)
Since (40) is a fractional problem with the objective function consisting of a linear numerator and convex denominator along with the convex constraints (41)–(43), it can be optimally and efficiently solved by fractional programming techniques, such as the Dinkelbach method [19], which converts the original nonlinear fractional problem into a sequence of non-fractional problems to be solved by introducing an auxiliary variable until convergence.

3.4. Convergence and Complexity Analysis

The original problem (10) can be addressed by solving three subproblems alternatively, i.e., (18), (22), and (40). To sum up, we propose the efficient iterative alternating Algorithm 1 to obtain a high-quality local optimal solution of problem (10). In each iteration of the proposed Algorithm 1, three distinct subproblems are optimized as follows:
  • One optimizes the transmit power of Alice P A and transmit power of the UAV P U with the fixed power splitting ratio w and the UAV’s trajectory L U ;
  • Another optimizes the power splitting ratio w with fixed transmit power for Alice P A , transmit power for the UAV P U , and the UAV’s trajectory L U ;
  • The other optimizes the UAV’s trajectory L U with fixed transmit power for Alice P A , transmit power for the UAV P U , and power splitting ratio w.
For formulating three subproblems (18), (22), and (40), the bounds in (17), (34)–(36), and (39) are adopted, by which we can obtain the optimal SEE value of the original problem (10). This approach based on those bounds ensures the convergence of the proposed Algorithm 1 as explained in [5]. Specifically, the proposed Algorithm 1 provides the local optimal solution of the problem (10) since the optimal solutions of three subproblems (18), (22), and (40) at each step are updated iteratively and alternatively to maximize the SEE with the inequality relationships of the bounds. The convergence of the proposed algorithm is verified numerically, as shown in Figure 2 as well. The proposed algorithm guarantees the convergence within about 15 iterations, where the larger mission time T tends to achieve the smaller SEE due to the increase of flying energy consumption compared to the secrecy rate improvement.
For analyzing the computational complexity of the proposed Algorithm 1, we derive the computational complexity of the step to obtain the solution of the subproblems as mentioned above. For each iteration, the optimization (18) of the transmit powers can be solved with the convex solver, whose computational complexity can be calculated as O ( N 3.5 ) . In the case of optimizing Bob’s power splitting ratio w in (22), the computational complexity remains a constant, that is, O ( 1 ) . When focusing on the optimization of the UAV trajectory as defined in (40), Algorithm 1 runs for the iterations of Q 1 × Q 2 , where the SCA algorithm’s loop repeats Q 1 times, while the loop for Dinkelbach’s algorithm repeats Q 2 times. Since there are the total of 6 N variables in (40), the computational complexity for solving the subproblem (40) to attain the optimal UAV trajectory can be expressed as O ( Q 1 Q 2 N 3.5 ) . Therefore, the total complexity of solving the original problem (10) is O ( Q 1 Q 2 N 3.5 ) .

4. Numerical Results

In this section, we evaluate the performance of the proposed Algorithm 1 via numerical experiments. For reference, we consider the following schemes.
1.
Optimal power and EH with linear UAV trajectory design (OptP&EH/LT) [23]: P A , P U , and w are designed optimally by using the proposed Algorithm 1, while the linear UAV’s trajectory is set by the following criterion:
  • Insufficient mission time case ( T < ( d B U I + B U F ) / v m a x ): UAV flies from the initial spot to final spot with the constant velocity.
  • Sufficient mission time case ( T ( d B U I + B U F ) / v m a x ): UAV flies to Bob, and then turns to the final destination straightly with the constant velocity.
2.
Optimal UAV trajectory and EH with the equal power allocation (OptT&EH/EP) [11]: L U and w are optimized by using the proposed Algorithm 1 with fixed P A [ n ] = P A avg and P U [ n ] = P U avg .
3.
Optimal EH with the equal power and the linear UAV trajectory (OptEH/EP&LT): w is obtained by the proposed Algorithm 1 with P A [ n ] = P A avg , P U [ n ] = P U avg , and the linear UAV trajectory design.
4.
Optimal power and UAV trajectory without EH (OptP&T/NEH, Upperbound) [24]: P A , P U , and L U are optimized by using the proposed Algorithm 1 without the EH operation at Bob.
The proposed algorithm, as referred to in Algorithm 1, consistently outperforms benchmark schemes in various scenarios. Remarkably, the performance of the proposed algorithm approaches the upper bounds established by the OptP&T/NEH case, a testament to its effectiveness. Figure 3 and Figure 4 illustrate the SEE as a function of mission duration T and the optimal trajectory of the UAV determined by the proposed algorithm, respectively. These figures assume the scenario where Eve is positioned opposite Bob, resulting in less exposure. The SEE values achieved by all schemes display a concavity with respect to T, attributable to the power consumption’s linear rate of increase surpassing the logarithmic rate of increase of the secrecy rate, as depicted in (9). Notably, the proposed algorithm performs better than all reference schemes except its upper bound of OptP&T/NEH case, with which it is nearly on par. Furthermore, in the case of the insufficient mission time, e.g., T = 140 to 180 s, the UAV cannot afford to detour around Bob to maximize the SEE as demonstrated in the OptP&EH/LT and OptEH/EP&LT scenarios. Conversely, as the mission time T extends, trajectory optimization (i.e., OptT&EH/EP) proves more effective than power optimization (i.e., OptP&EH/LT) in enhancing SEE for the scenario under consideration. Figure 4 shows the UAV hastening towards Bob and lingering within the allocated flight duration for optimal SEE before proceeding to the final destination. This behavior illustrates the relationship between mission time and SEE attainment: with limited time, the UAV’s path is more direct, while additional time allows for more complex maneuvers to maximize SEE, highlighting the necessity of allowing adequate mission times for tasks demanding higher security levels in communication.
The coordinates of ground nodes are set as L A = ( 0 , 0 , 0 ) , L U I = ( 100 , 0 , 20 ) , L U F = ( 300 , 0 , 20 ) , and L B = ( 100 , 200 , 0 ) . For Eve’s location, we consider L E = ( 100 , 200 , 0 ) for the case when Eve is located at the opposite site of Bob, while L B = ( 100 , 200 , 0 ) , L E = ( 200 , 100 , 0 ) for the case when Eve is located near Bob. We follow the UAV’s system parameter setting of [10] and consider the remaining parameters as H = 20 m, v max = 3 m/s, ρ 0 = 60 dB, P A avg = 30 dBm, P A peak = 36 dBm, P U avg = 20 dBm, P U peak = 26 dBm, B = 1 MHz, σ B 2 = σ U 2 = σ E 2 = 110 dBm, η = 0.7 , φ = 90 dBm, λ = 10 4 , and ϵ = 10 4 . Figure 5 and Figure 6 present the SEE as a function of mission time T and the optimal UAV trajectory obtained by the proposed algorithm, respectively, when Eve is in close proximity to Bob, potentially compromising Bob’s channel state information. As in Figure 3, the proposed algorithm is superior to the benchmark curves and comparable with the OptP&T/NEH case. Compared to Figure 3, due to the closer proximity of Eve, there is the possibility of the zero-valued SEE for the case with no power optimization, i.e., OptEH/EP&LT and OptT&EH/EP, when the given mission time is insufficient. The zero-valued SEE in scenarios without power optimization accentuates the gravity of power adjustments. While trajectory optimization is pivotal, without suitable power allocations, the UAV’s communication can be rendered futile. With sufficient mission time, the UAV strategizes to maximize SEE by maneuvering away from Eve and towards Bob, as shown in Figure 6.
The juxtaposition between Figure 3 and Figure 4 and Figure 5 and Figure 6 elucidates the significance of Eve’s location. When Eve is situated at the opposite side of Bob, the primary focus is on minimizing exposure. However, when Eve is in closer proximity to Bob, the strategy shifts towards a more aggressive approach, with the UAV flying closer to Bob while opposing Eve to ensure secure communication. This various nature underpins the necessity of the proposed optimal algorithms that can adjust not just based on the mission time but also based on potential threats.
We summarize the execution times in seconds (s) of benchmark schemes with the proposed algorithm as in Table 1. As in Table 1, although the proposed algorithm can achieve the best performance in terms of SEE, it is observed to take only 30∼40% of the worst execution time of benchmark scheme, i.e, OptP&EH/LT under 140∼180 s. For the sufficient mission time, since the UAV’s trajectory optimization spends time to detour from the route to avoid the Eve, the proposed algorithm and benchmark scheme with the UAV’s trajectory optimization take sufficient time, which is the trade-off to have the performance gain for SEE. The simulations were conducted on a machine equipped with an Intel Core i7-12700K CPU at 3.61 GHz, 32 GB of RAM, and a 1TB SSD. For the implementation of the proposed algorithm, we employed MATLAB R2022a.

5. Concluding Remarks

In this work, we propose a secure UAV-assisted SWIPT communication system with the primary objective of maximizing the SEE. To achieve this, we address the joint SEE maximization problem by simultaneously optimizing the transmit powers of Alice and the UAV, the power splitting ratio for EH operation at Bob, and the UAV’s flying trajectory, all within the functional capability constraints of network devices. To tackle this optimization challenge, we have developed an efficient iterative alternating algorithm that combines SCA and Dinkelbach’s method. The proposed algorithm, designed for UAV system environments, employs an offline-based optimization approach that ensures suitability and efficiency for mission planning and execution. This method significantly reduces computational complexities and enhances operational reliability, marking a significant advancement in the field of UAV communications. Performance validation through simulations confirms the superiority of our algorithm over conventional partial optimization schemes. Future work may consider scenarios involving multiple Bobs and UAVs supporting a variety of secure wireless communications. In conclusion, this research fills critical gaps in the existing literature on UAV-assisted systems. By introducing a novel approach, we believe our study establishes a new benchmark in the field. Our findings offer improved solutions and insights that can be crucial for future research, ensuring both energy efficiency and security in UAV-assisted communications.

Author Contributions

Conceptualization, D.H. and S.J.; methodology, D.H., S.J. and J.K.; project administration, J.K.; software, D.H. and J.K.; supervision, J.K.; validation, S.J., J.K. and J.K.; formal analysis, D.H., S.J. and J.K.; investigation, D.H.; resources, J.K.; data curation, D.H. and J.K.; writing—original draft preparation, D.H.; writing—review and editing, S.J., J.K. and J.K.; funding acquisition, J.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2020-0-01787) supervised by the IITP (Institute of Information & Communications Technology Planning & Evaluation). This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2023R1A2C2005507) and an NRF grant funded by the MSIT (No. 2021R1F1A1050734).

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Motlagh, N.H.; Taleb, T.; Arouk, O. Low-altitude unmanned aerial vehicles-based Internet of Things services: Comprehensive survey and future perspectives. IEEE Internet Things J. 2016, 3, 899–922. [Google Scholar] [CrossRef]
  2. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicle: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  3. Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H.; Żywiolek, J.; Ullah, I. Swarm of UAV for network management in 6G: A technical review. IEEE Trans. Netw. Serv. Manag. 2023, 20, 741–761. [Google Scholar] [CrossRef]
  4. Abro, G.E.M.; Zulkifli, S.A.B.M.; Masood, R.J.; Asirvadam, V.S.; Laouti, A. Comprehensive review of UAV detection, security, and communication advancements to prevent threats. Drones 2022, 6, 284. [Google Scholar] [CrossRef]
  5. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 2019, 18, 1376–1389. [Google Scholar] [CrossRef]
  6. Cui, M.; Zhang, G.; Wu, Q.; Ng, D.W.K. Robust trajectory and transmit power design for secure UAV communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef]
  7. Duo, B.; Wu, Q.; Yuan, X.; Zhang, R. Energy efficiency maximization for Full-Duplex UAV secrecy communication. IEEE Trans. Veh. Technol. 2020, 69, 4590–4595. [Google Scholar] [CrossRef]
  8. Ji, Z.; Tu, J.; Guan, X.; Yang, W.; Yang, W.; Wu, Q. Energy efficient design in IRS-Assisted UAV data collection system under malicious jamming. arXiv 2022, arXiv:2208.14751. [Google Scholar]
  9. Jeong, S.; Simeone, O.; Kang, J. Mobile edge computing via a UAV-Mounted cloudlet: Optimization of bit allocation and path planning. IEEE Trans. Veh. Technol. 2018, 67, 2049–2063. [Google Scholar] [CrossRef]
  10. Zeng, Y.; Xu, Y.; Zhang, R. Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans. Wirel. Commun. 2019, 18, 2329–2345. [Google Scholar] [CrossRef]
  11. Zeng, Y.; Zhang, R. Energy-Efficient UAVcommunication with trajectory optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar] [CrossRef]
  12. Xu, J.; Zeng, Y.; Zhang, R. UAV-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Trans. Wirel. Commun. 2018, 17, 5092–5106. [Google Scholar] [CrossRef]
  13. Xu, J.; Zeng, Y.; Zhang, R. UAV-enabled wireless power transfer: Trajectory design and energy region characterization. In Proceedings of the IEEE Globecom Workshop, Singapore, 4 December 2017. [Google Scholar]
  14. Xie, L.; Xu, J.; Zhang, R. Throughput maximization for UAV-enabled wireless powered communication networks. IEEE Internet Things J. 2019, 6, 1690–1703. [Google Scholar] [CrossRef]
  15. Feng, W.; Tang, J.; Yu, Y.; Song, J.; Zhao, N.; Chen, G.; Wong, K.-K.; Chambers, J. UAV-enabled SWIPT in IoT networks for emergency communications. IEEE Wirel. Commun. 2020, 27, 140–147. [Google Scholar] [CrossRef]
  16. Sun, X.; Yang, W.; Cai, Y.; Xiang, Z.; Tang, X. Secure transmissions in millimeter wave SWIPT UAV-Based relay networks. IEEE Wirel. Commun. Lett. 2019, 8, 785–788. [Google Scholar] [CrossRef]
  17. Che, Y.; Zhao, Z.; Luo, S.; Wu, K.; Duan, L.; Leung, V.C.M. UAV-Aided wireless energy transfer for sustaining Internet of Everything in 6G. Drones 2023, 7, 628. [Google Scholar] [CrossRef]
  18. Scutari, G.; Facchinei, F.; Lampariello, L.; Song, P. Parallel and distributed methods for nonconvex optimization part II:Applications. arXiv 2016, arXiv:1601.04059v1. [Google Scholar]
  19. You, F.; Castro, P.M.; Grossmann, I.E. Dinkelbach’s algorithm as an efficient method to solve a class of MINLP models for large-scale cyclic scheduling problems. Comput. Chem. Eng. 2009, 33, 1879–1889. [Google Scholar] [CrossRef]
  20. Mo, J.; Tao, M.; Liu, Y. Relay placement for physical layer security: A secure connection perspective. IEEE Commun. Lett. 2012, 16, 878–881. [Google Scholar]
  21. Gradshteyn, I.S.; Ryzhik, I.M.; Jeffrey, A. Table of Integrals, Series, and Products, 5th ed.; Academic Press: Brookline, MA, USA, 1994; pp. 49–50. [Google Scholar]
  22. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, Version 2.1, Mar. 2014. Available online: http://cvxr.com/cvx (accessed on 31 July 2023).
  23. Zhang, G.; Yan, H.; Zeng, Y.; Cui, M.; Liu, Y. Trajectory optimization and power allocation for multi-hop UAV relaying communication. IEEE Access 2018, 6, 48566–48576. [Google Scholar] [CrossRef]
  24. Li, A.; Wu, Q.; Zhang, R. UAV-Eased cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wirel. Commun. Lett. 2019, 8, 181–184. [Google Scholar] [CrossRef]
Figure 1. Illustration of the secure UAV-assisted SWIPT systems.
Figure 1. Illustration of the secure UAV-assisted SWIPT systems.
Drones 07 00672 g001
Figure 2. Convergence of the Algorithm 1.
Figure 2. Convergence of the Algorithm 1.
Drones 07 00672 g002
Figure 3. SEE of the UAV when Eve is located at the opposite site of Bob.
Figure 3. SEE of the UAV when Eve is located at the opposite site of Bob.
Drones 07 00672 g003
Figure 4. Optima l trajectory of the UAV when Eve is located at the opposite site of Bob.
Figure 4. Optima l trajectory of the UAV when Eve is located at the opposite site of Bob.
Drones 07 00672 g004
Figure 5. SEE of the UAV when Eve is located near Bob.
Figure 5. SEE of the UAV when Eve is located near Bob.
Drones 07 00672 g005
Figure 6. Optimal trajectory of the UAV when Eve is located near Bob.
Figure 6. Optimal trajectory of the UAV when Eve is located near Bob.
Drones 07 00672 g006
Table 1. Execution times of benchmark schemes with the proposed algorithm.
Table 1. Execution times of benchmark schemes with the proposed algorithm.
T(s)140150160180205290
Proposed Algorithm10.77.67.17.1952.02721.0
OptP&T/NEH [24]16.75.85.36.31047.82794.4
OptP&EH/LT [23]23.520.319.124.513.812.6
OptT&EH/EP [11]0.50.40.50.5814.99906.4
OptEH/EP&LT0.10.00.10.01.92.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ha, D.; Jeong, S.; Kang, J.; Kang, J. Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems. Drones 2023, 7, 672. https://doi.org/10.3390/drones7110672

AMA Style

Ha D, Jeong S, Kang J, Kang J. Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems. Drones. 2023; 7(11):672. https://doi.org/10.3390/drones7110672

Chicago/Turabian Style

Ha, Daehan, Seongah Jeong, Jinkyu Kang, and Joonhyuk Kang. 2023. "Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems" Drones 7, no. 11: 672. https://doi.org/10.3390/drones7110672

APA Style

Ha, D., Jeong, S., Kang, J., & Kang, J. (2023). Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems. Drones, 7(11), 672. https://doi.org/10.3390/drones7110672

Article Metrics

Back to TopTop