2. System Model and Performance Metric
We consider a secure UAV-assisted SWIPT system, as shown in
Figure 1. Alice transmits the confidential information to Bob with the aid of a rotary-wing UAV, while a passive Eve attempts to wiretap it. Without loss of generality, a three-dimensional Cartesian coordinate system is adopted, whose coordinates are measured in meters. We assume that Alice, Bob, and Eve are located at the position
, for
, in the xy-plane, e.g., on the ground, while the UAV flies along a trajectory
with the fixed altitude of
H, for the given flying period
. Due to the horizontally constant altitude
H for the UAV, we focus on the projection of the UAV’s trajectory onto the xy-plane. Additionally, for the aerospace regulations and the operational capability, the initial and final positions and the maximum velocity of the UAV are predetermined as
,
and
, respectively. The UAV is assumed to operate in a time division duplex (TDD) manner. Alice transmits the confidential messages to the UAV, and then the UAV forwards the decoded messages to Bob with the attempt to improve the secrecy rate while supporting the EH operation of Bob. Here, by following the SWIPT protocol design in [
16], the received signal power at Bob is split into two types of power streams such as one portion
w of the power for data communication and the remaining portion
of the power for EH with satisfying
.
We consider that the mission time
T is discretized into
N time slots with a sufficiently small time
in seconds (s) [
7,
9]. Accordingly, the UAV’s position
can be discretized as
, for
. In addition, the distance
denotes the maximum distance of horizontally traveling within each time slot with the maximum speed
in m/s. The distance of
is chosen to be sufficiently small compared to
H so that the air-to-ground channels of the UAV are assumed to be time-invariant within each slot. We define
as the location of the UAV for all time slot
n, which satisfies the mobility constraints as follows:
Following [
7,
9,
16], the air-to-ground channels between the UAV and ground nodes, i.e., Alice, Bob, and Eve, are assumed to be dominated by line-of-sight (LOS) links. At the
n-th slot, the channel gain between the UAV and ground nodes is given by
where
is the Euclidean distance between node
i and
j,
denotes the pathloss exponent of the channels, and
denotes the gain of a channel with the reference distance
m. The ground channels from Alice to Bob and Eve are assumed to be Rayleigh channels. Hence, the channel coefficients from Alice to Bob and Eve in slot
n are given by
for
, where
denotes the pathloss exponent and
is an exponentially distributed random variable with unit mean accounting for the small-scale Rayleigh fading. Since
is assumed to be much smaller than the coherence time of the ground channels, the channels are supposed to be stationary and ergodic within each time slot.
We define
and
as the transmit powers of Alice and UAV at time slot
n, respectively, which, in real applications, need to satisfy the average and peak power constraints as [
5]:
where
for
. Also, it is noted that the communication energy consumption is much smaller than the propulsion energy, which allows us to omit the communication energy consumption in the following SEE calculation [
7,
11]. Based on [
10], the UAV’s propulsion energy consumption
at time slot
n, consisting of blade profile, induced power, and parasite power in Joules (J), can be modeled as
where the horizontal UAV’s flying speed is given by
;
with
being the tip speed of the UAV’s rotor blade;
;
,
and
represent the blade profile power, the induced power, and the mean rotor-induced speed when the UAV is hovering, respectively; and
,
,
s, and
A denote the fuselage drag ratio, the air density, the rotor solidity, and the rotor disc area, respectively. Note that (
5) is practically valid for the straight and level flight of the rotary-wing UAV, which is satisfied in each time slot
n due to the approximated piecewise-linear trajectory over time slots.
Under the assumption that the Eve adopts the maximal ratio combining (MRC) scheme to intercept the confidential information, the secrecy rate
between Alice and Bob can be expressed as [
20]
where
;
with
,
and
representing a signal-to-noise ratio (SNR) of Alice to Bob, Alice to UAV, and UAV to Bob, respectively;
with
and
representing the SNR of Alice to Eve and UAV to Eve, respectively, and
,
, and
are the noise power at Bob, UAV, and Eve, respectively.
The goal of this paper is to maximize the SEE of the UAV-assisted SWIPT systems under the transmit power constraints of Alice and UAV, the EH constraint of Bob, and the flying constraints for UAV. In wireless communications, SEE is a pivotal metric that quantifies how much confidential data a system can relay per energy unit used, capturing both its energy efficiency and secure transmission proficiency [
7]. To this end, we define the SEE in bits/J that concerns the technical ratio between the secrecy rate
in (
6) and the UAV’s flying energy consumption in (
5) as
with Alice’s transmit power
, the UAV’s power
, power splitting ratio
w, UAV’s trajectory
, where
B denotes the system bandwidth. In (
9), it is noted that the flying energy consumption of UAV dominates the other energy consumption, e.g., communication, computing, etc. [
10].
3. Secrecy Energy Efficiency Maximization
In this paper, we aim to maximize the SEE in (
9) for the secure UAV-assisted SWIPT communication systems over
N time slots by jointly optimizing Alice’s transmit power, the UAV’s transmit power, the UAV’s trajectory, and Bob’s power splitting ratio for EH operation. To this end, we formulate the optimization problem as
where (
11) represents the EH constraint with
being energy conversion efficiency and
being power threshold of Bob. The problem (
10) is not convex since the objective function (
10) is jointly concave with respect to the optimization variables. To resolve the problem (
10), we develop an efficient iterative Algorithm 1 to obtain a high-quality local optimal solution of problem (
10). In particular, in each iteration of the proposed Algorithm 1, we divide the original problem (
10) into three subproblems; that is, (1) one optimizes
and
with fixed
w and
; (2) another optimizes
w with fixed
,
, and
; and (3) the other optimizes
with fixed
,
, and
w. In the following, we detail the procedure to find the solution of each subproblem per iteration of Algorithm 1.
Algorithm 1: SEE Maximization Algorithm |
- 1
Initialization: Input , , , and . Let . - 2
Repeat - 3
1. With and , update and by ( 18); - 4
2. With , , and , update by ( 22); - 5
3. With , , and , update by ( 40); - 6
Repeat (Dinkelbach’s method) [ 19]: - 7
Set the Numerator and Denominator of ( 40) as and ; - 8
Step1. Set for arbitrary , ; - 9
Step2. Formulate . - 10
Solve linear program . Denote the solution as and ; - 11
Step3. If for , , and , stop; - 12
Else Let . Go to Step 2 to replace i with ; - 13
4. Set , ; - 14
until (convergence criterion is satisfied)
|
3.1. Optimization of Transmit Powers
Here, we optimize the transmit powers of Alice and the UAV with the fixed
w and
. By adopting the slack variable
for (
10), the SEE problem (
10) can be reformulated as
where we assume that the flying energy consumption of
only depends on the velocity
v, and we define
,
,
,
, and
. Since the problem (
13) with the constraints (
14) and (
15) involving difference of convex (DC) program is still non-convex, we employ the SCA method [
18] that prescribes the iterative solution of non-convex problems by replacing the non-convex objective function and constraints with the suitable convex approximations. By denoting
and
as the set of transmit powers of Alice and the UAV at the
k-th iteration and applying the first-order Taylor expansion [
21], we can obtain the respective global upper bounds for the minus portion of the right-hand sides of (
14) and (
15) as
Then, the problem (
13) can be written as
where
,
, and
. The problem (
18) is convex, and accordingly can be solved by the CVX solver [
22]. Since the upper bounds in (
17) suggests that any feasible solution
and
of (
10) is also feasible for (
18), the optimal value obtained by solving (
18) serves as the lower bound for that of the problem (
10).
3.2. Optimization of Power Splitting Ratio
The problem of optimizing the power splitting ratio
w with the fixed
,
, and
can be written by the definition of
in (
6) as
where
The problem (
22) is convex, and accordingly can be solved by the CVX solver [
22].
3.3. Optimization of UAV’s Trajectory
In this subsection, given
,
, and
w, we optimize
by introducing slack variables
,
, and
, with satisfying
,
, and
. Consequently, the problem (
10) can be represented as
where
,
, and
.
To address the non-convexity of (
25) due to the DC function depending on
, we apply the SCA method [
18] as in
Section 3.1. By introducing slack variable
for (
25), we can rewrite the problem (
25) as
By applying the first-order Taylor expansion [
21], the first term in (
31) with
at the
k-th iteration can be lower-bounded as
Similarly, the first log-term in constraint (
32) with
and the second log-terms in constraint (
31) and (
32) with
in the
k-th iteration can be lower-bounded as
and
respectively. Next, we deal with the non-convexity of the helper UAV’s flying energy consumption of
in (
25). The terms for blade profile power and parasite power are convex, while the term for induced power is non-convex. To tackle with this issue, we also introduce the equivalent formulas of
with the slack variable
as [
10]:
with satisfying
. By applying the first-order Taylor expansion [
21], the right-hand side of (
38) at any given points
and
in the
l-th iteration has the following lower bound:
where
. With (
30)–(
39), we can rewrite (
25) as
Since (
40) is a fractional problem with the objective function consisting of a linear numerator and convex denominator along with the convex constraints (
41)–(
43), it can be optimally and efficiently solved by fractional programming techniques, such as the Dinkelbach method [
19], which converts the original nonlinear fractional problem into a sequence of non-fractional problems to be solved by introducing an auxiliary variable until convergence.
3.4. Convergence and Complexity Analysis
The original problem (
10) can be addressed by solving three subproblems alternatively, i.e., (
18), (
22), and (
40). To sum up, we propose the efficient iterative alternating Algorithm 1 to obtain a high-quality local optimal solution of problem (
10). In each iteration of the proposed Algorithm 1, three distinct subproblems are optimized as follows:
One optimizes the transmit power of Alice and transmit power of the UAV with the fixed power splitting ratio w and the UAV’s trajectory ;
Another optimizes the power splitting ratio w with fixed transmit power for Alice , transmit power for the UAV , and the UAV’s trajectory ;
The other optimizes the UAV’s trajectory with fixed transmit power for Alice , transmit power for the UAV , and power splitting ratio w.
For formulating three subproblems (
18), (
22), and (
40), the bounds in (
17), (
34)–(
36), and (
39) are adopted, by which we can obtain the optimal SEE value of the original problem (
10). This approach based on those bounds ensures the convergence of the proposed Algorithm 1 as explained in [
5]. Specifically, the proposed Algorithm 1 provides the local optimal solution of the problem (
10) since the optimal solutions of three subproblems (
18), (
22), and (
40) at each step are updated iteratively and alternatively to maximize the SEE with the inequality relationships of the bounds. The convergence of the proposed algorithm is verified numerically, as shown in
Figure 2 as well. The proposed algorithm guarantees the convergence within about 15 iterations, where the larger mission time
T tends to achieve the smaller SEE due to the increase of flying energy consumption compared to the secrecy rate improvement.
For analyzing the computational complexity of the proposed Algorithm 1, we derive the computational complexity of the step to obtain the solution of the subproblems as mentioned above. For each iteration, the optimization (
18) of the transmit powers can be solved with the convex solver, whose computational complexity can be calculated as
. In the case of optimizing Bob’s power splitting ratio
w in (
22), the computational complexity remains a constant, that is,
. When focusing on the optimization of the UAV trajectory as defined in (
40), Algorithm 1 runs for the iterations of
, where the SCA algorithm’s loop repeats
times, while the loop for Dinkelbach’s algorithm repeats
times. Since there are the total of
variables in (
40), the computational complexity for solving the subproblem (
40) to attain the optimal UAV trajectory can be expressed as
. Therefore, the total complexity of solving the original problem (
10) is
.
4. Numerical Results
In this section, we evaluate the performance of the proposed Algorithm 1 via numerical experiments. For reference, we consider the following schemes.
- 1.
Optimal power and EH with linear UAV trajectory design (OptP&EH/LT) [
23]:
,
, and
w are designed optimally by using the proposed Algorithm 1, while the linear UAV’s trajectory is set by the following criterion:
Insufficient mission time case (): UAV flies from the initial spot to final spot with the constant velocity.
Sufficient mission time case (): UAV flies to Bob, and then turns to the final destination straightly with the constant velocity.
- 2.
Optimal UAV trajectory and EH with the equal power allocation (OptT&EH/EP) [
11]:
and
w are optimized by using the proposed Algorithm 1 with fixed
and
.
- 3.
Optimal EH with the equal power and the linear UAV trajectory (OptEH/EP<): w is obtained by the proposed Algorithm 1 with , , and the linear UAV trajectory design.
- 4.
Optimal power and UAV trajectory without EH (OptP&T/NEH, Upperbound) [
24]:
,
, and
are optimized by using the proposed Algorithm 1 without the EH operation at Bob.
The proposed algorithm, as referred to in Algorithm 1, consistently outperforms benchmark schemes in various scenarios. Remarkably, the performance of the proposed algorithm approaches the upper bounds established by the OptP&T/NEH case, a testament to its effectiveness.
Figure 3 and
Figure 4 illustrate the SEE as a function of mission duration
T and the optimal trajectory of the UAV determined by the proposed algorithm, respectively. These figures assume the scenario where Eve is positioned opposite Bob, resulting in less exposure. The SEE values achieved by all schemes display a concavity with respect to
T, attributable to the power consumption’s linear rate of increase surpassing the logarithmic rate of increase of the secrecy rate, as depicted in (
9). Notably, the proposed algorithm performs better than all reference schemes except its upper bound of OptP&T/NEH case, with which it is nearly on par. Furthermore, in the case of the insufficient mission time, e.g.,
T = 140 to 180 s, the UAV cannot afford to detour around Bob to maximize the SEE as demonstrated in the OptP&EH/LT and OptEH/EP< scenarios. Conversely, as the mission time
T extends, trajectory optimization (i.e., OptT&EH/EP) proves more effective than power optimization (i.e., OptP&EH/LT) in enhancing SEE for the scenario under consideration.
Figure 4 shows the UAV hastening towards Bob and lingering within the allocated flight duration for optimal SEE before proceeding to the final destination. This behavior illustrates the relationship between mission time and SEE attainment: with limited time, the UAV’s path is more direct, while additional time allows for more complex maneuvers to maximize SEE, highlighting the necessity of allowing adequate mission times for tasks demanding higher security levels in communication.
The coordinates of ground nodes are set as
,
,
, and
. For Eve’s location, we consider
for the case when Eve is located at the opposite site of Bob, while
,
for the case when Eve is located near Bob. We follow the UAV’s system parameter setting of [
10] and consider the remaining parameters as
m,
m/s,
dB,
dBm,
dBm,
dBm,
26 dBm,
MHz,
dBm,
,
dBm,
, and
.
Figure 5 and
Figure 6 present the SEE as a function of mission time
T and the optimal UAV trajectory obtained by the proposed algorithm, respectively, when Eve is in close proximity to Bob, potentially compromising Bob’s channel state information. As in
Figure 3, the proposed algorithm is superior to the benchmark curves and comparable with the OptP&T/NEH case. Compared to
Figure 3, due to the closer proximity of Eve, there is the possibility of the zero-valued SEE for the case with no power optimization, i.e., OptEH/EP< and OptT&EH/EP, when the given mission time is insufficient. The zero-valued SEE in scenarios without power optimization accentuates the gravity of power adjustments. While trajectory optimization is pivotal, without suitable power allocations, the UAV’s communication can be rendered futile. With sufficient mission time, the UAV strategizes to maximize SEE by maneuvering away from Eve and towards Bob, as shown in
Figure 6.
The juxtaposition between
Figure 3 and
Figure 4 and
Figure 5 and
Figure 6 elucidates the significance of Eve’s location. When Eve is situated at the opposite side of Bob, the primary focus is on minimizing exposure. However, when Eve is in closer proximity to Bob, the strategy shifts towards a more aggressive approach, with the UAV flying closer to Bob while opposing Eve to ensure secure communication. This various nature underpins the necessity of the proposed optimal algorithms that can adjust not just based on the mission time but also based on potential threats.
We summarize the execution times in seconds (s) of benchmark schemes with the proposed algorithm as in
Table 1. As in
Table 1, although the proposed algorithm can achieve the best performance in terms of SEE, it is observed to take only 30∼40% of the worst execution time of benchmark scheme, i.e, OptP&EH/LT under 140∼180 s. For the sufficient mission time, since the UAV’s trajectory optimization spends time to detour from the route to avoid the Eve, the proposed algorithm and benchmark scheme with the UAV’s trajectory optimization take sufficient time, which is the trade-off to have the performance gain for SEE. The simulations were conducted on a machine equipped with an Intel Core i7-12700K CPU at 3.61 GHz, 32 GB of RAM, and a 1TB SSD. For the implementation of the proposed algorithm, we employed MATLAB R2022a.