Next Article in Journal
Research on Aerodynamic Characteristics of Trans-Media Vehicles Entering and Exiting the Water in Still Water and Wave Environments
Next Article in Special Issue
Service Function Chain Scheduling in Heterogeneous Multi-UAV Edge Computing
Previous Article in Journal
Acknowledgment to the Reviewers of Drones in 2022
Previous Article in Special Issue
Consensus Control of Large-Scale UAV Swarm Based on Multi-Layer Graph
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Trajectory Planning, Time and Power Allocation to Maximize Throughput in UAV Network

1
School of Information Engineering, Wuhan University of Technology, Wuhan 430070, China
2
Air Force Early Warning Academy, Wuhan 430019, China
3
Integrated Computing and Chip Security Sichuan Collaborative Innovation Center, Chengdu University of Information Technology, Chengdu 610059, China
4
School of Navigation, Wuhan University of Technology, Wuhan 430070, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(2), 68; https://doi.org/10.3390/drones7020068
Submission received: 28 December 2022 / Revised: 14 January 2023 / Accepted: 16 January 2023 / Published: 18 January 2023
(This article belongs to the Special Issue Multi-UAV Networks)

Abstract

:
Due to the advantages of strong mobility, flexible deployment, and low cost, unmanned aerial vehicles (UAVs) are widely used in various industries. As a flying relay, UAVs can establish line-of-sight (LOS) links for different scenarios, effectively improving communication quality. In this paper, considering the limited energy budget of UAVs and the existence of multiple jammers, we introduce a simultaneous wireless information and power transfer (SWIPT) technology and study the problems of joint-trajectory planning, time, and power allocation to increase communication performance. Specifically, the network includes multiple UAVs, source nodes (SNs), destination nodes (DNs), and jammers. We assume that the UAVs need to communicate with DNs, the SNs use the SWIPT technology to transmit wireless energy and information to UAVs, and the jammers can interfere with the channel from UAVs to DNs. In this network, our target was to maximize the throughput of DNs by optimizing the UAV’s trajectory, time, and power allocation under the constraints of jammers and the actual motion of UAVs (including UAV energy budget, maximum speed, and anti-collision constraints). Since the formulated problem was non-convex and difficult to solve directly, we first decomposed the original problem into three subproblems. We then solved the subproblems by applying a successive convex optimization technology and a slack variables method. Finally, an efficient joint optimization algorithm was proposed to obtain a sub-optimal solution by using a block coordinate descent method. Simulation results indicated that the proposed algorithm has better performance than the four baseline schemes.

1. Introduction

In recent years, due to high mobility, flexible deployment, and low cost, UAVs have been widely used in many scenarios, such as intelligent transportation systems [1,2,3], disaster relief, military activities, emergency communications, and so on [4,5,6]. In particular, with the development of 5G technology, non-terrestrial networks have become the next hot spot [7]. For example, [8] studied the extreme performance of a cognitive uplink fixed satellite service and a fixed terrestrial service in the Ka-band 27.5–29.5 GHz frequency range. Ref. [9] studied the physical layer security problem of a satellite network.
Compared with traditional communication methods, most of the wireless communication channels in UAV networks are dominated by line-of-sight (LOS) links [10], which can reduce the obstruction of mountains and buildings so as to obtain better data transmission effects. For example, for natural disasters scenes and ground network communication failures, Ref. [11] used UAVs to provide support for ground base stations and proposed an adaptive UAV deployment scheme to solve the communication network coverage problem. Ref. [12] proposed a task-driven routing strategy for emergency UAVs network to enhance rescue efficiency. Aiming at the post-disaster areas where infrastructure has been destroyed, Ref. [13] proposed an efficient data transmission scheme based on a particle swarm algorithm to ensure communication quality. Ref. [14] studied a UAV deployment strategy for disaster-affected areas to maximize the number of communication-coverage nodes.
Despite the widespread adoption of UAV-assisted communication technologies, there are still some challenges in UAV networks. First, due to the openness of a UAV network interface and the broadcast nature of electromagnetic waves, a UAV network is susceptible to radio interference. For instance, the existence of malicious jammers could reduce the communication quality between the nodes in a UAV network. Second, the battery capacity of the UAV is limited, which greatly shortens total mission time [15,16,17].
In view of the problem that a UAV network is susceptible to radio interference, the high mobility of UAVs could be used to improve a system’s performance through the reasonable optimization of network resources [18,19,20,21]. Whereas, in a UAV network, the resources are limited, coupled with each other, and the established problems are usually non-convex and difficult to solve. Therefore, it is necessary to design a feasible optimization algorithm to obtain a solution to the original problem. Based on this, a successive convex approximation (SCA) [22] can be used as an effective method to solve the original non-convex problem.
To address the problem that the battery capacity of the UAV is limited, traditional energy harvesting mechanisms represented by solar and wind energy have been extensively studied [23,24]. For example, Ref. [23] studied the energy efficiency problem in solar-powered UAV systems by optimizing the speed, acceleration, heading angle, and transmission power of a UAV. Ref. [24] proposed an energy harvesting model based on hybrid solar and wind power for a UAV system and obtained a solution to the signal-to-noise ratio (SNR) outage minimization problem. Unfortunately, due to the limitations of hardware technology, the traditional energy harvesting scheme will significantly increase the take-off weight and lead to the degradation of the system’s performance. Based on that, radio frequency (RF)-based SWIPT technology combined with UAV network resource allocation optimization could provide an effective solution [25].
To be specific, SWIPT is a technology that integrates wireless power transfer (WPT) and wireless information transfer (WIT). The power and information could be transferred at the same time, as an RF signal carries both power and information [26]. Typically, time switching (TS) and power splitting (PS) protocols are two common methods to implement SWIPT [27]. The former depends on time-slot allocation, where part of the time slot is used for energy transmission, and the other is used for information transmission and processing. The latter depends on power allocation, where part of the power is used for information transmission and processing, and the other is used for energy harvesting (EH).

1.1. Related Work

For UAV-assisted communication networks, due to the broadcast characteristics of electromagnetic waves, the UAV network is vulnerable to malicious interference. Generally speaking, an attack on the jammers on a UAV communication channel usually focuses on the physical layer and is completed by transmitting high-power interference signals. Therefore, many optimization schemes have been proposed to improve the system’s performance.
Based on the high mobility of UAVs, Refs. [28,29,30,31] studied the UAV communication system in jamming environments from the perspective of trajectory planning. In [28], the authors studied a dual-UAV communication system with malicious interference and minimized the flight time by optimizing the UAV trajectory with steering angle constraints under the premise of meeting the information transmission requirements. In the scenario with a dynamic jammer, Ref. [29] proposed an offline algorithm based on deep reinforcement learning to optimize the trajectory and minimize the mission completion time. To ensure the reliability of the communication link, Ref. [30] maximized the average SINR by planning a trajectory for UAVs under energy constraints. In [31], the authors studied a UAV communication network with multiple jammers and optimized the UAV’s trajectory by using the Dinklebach method and a non-convex optimization method to maximize the energy efficiency of the system.
However, the research on UAV network channel optimization in the above-mentioned interference environment mainly focused on trajectory planning in the space domain. Considering more degrees of freedom for a UAV network, Refs. [32,33,34] studied the multi-domain optimization problem based on trajectory planning. In [32], the authors mitigated the influence of jammers by jointly optimizing the UAV trajectory and signal transmission power and maximizing the average-secrecy rate of an uplink and a downlink. For the probabilistic LOS channel system, Ref. [33] studied a single UAV-assisted dual-user anti-jamming network and maximized the system throughput by optimizing the UAV’s three-dimensional position and the ground nodes’ signal transmission power, wherein the UAV provides communication services for two users. In the scenario where jammers have imperfect locations, considering the different requirements for service quality, Ref. [34] maximized the minimum throughput, the average throughput, and the minimum throughput with delay constraints on all nodes by optimizing the UAV trajectory, the task scheduling, and the ground nodes’ signal transmission power, based on a successive convex approximation method and a block coordinate descent method. In addition, for the application scenarios of drones in package delivery, Ref. [35] maximized delivery and sensing utility under energy constraints by jointly optimizing the route selection, sensing time, and delivery weight allocation.
Moreover, on account of the fact that an RF signal carries both power and information, many resource allocation schemes were proposed to make the best of finite energy based on RF energy harvesting technology.
Aiming at the vulnerability of the UAV network, some existing works optimized UAV channel quality in terms of security [25,36,37,38]. In [36], the authors proposed a scheme based on power division and time switching to improve the security rate in a single UAV relay system with eavesdroppers. To analyze the security of the physical layer, Ref. [37] considered three attack scenarios: (1) a free-space optical eavesdropping attack, (2) a radio frequency attack, and (3) both a free-space optical and a radio frequency attack. The authors further studied the effects of SWIPT parameters and power amplifier efficiency on the security of the system. In [25], the authors investigated two cooperative UAV-assisted SWIPT networks. Specifically, they aimed to maximize the average-secrecy rate by jointly optimizing the trajectory and power of the UAVs, as well as the PS ratio. In the scenario where multiple eavesdroppers have imperfect locations, Ref. [38] improved the security of the network by jointly optimizing the UAV’s position, noise power, PS, and TS ratios.
In addition, outage probability (OP) describes the probability of link failure and is often used to evaluate the performance of SWIPT communication systems. In [39], the authors obtained the closed-form expressions of outage probability and the bit-error rate in a UAV-relay-assisted decode and forward (DF) network based on TS and PS protocols and analyzed the transmission rate and delay limitation state. Moreover, a fast convergence algorithm based on bandwidth and time allocation was proposed by [40] to optimize the outage probability. In [41], the authors derived closed expressions of OP and throughput over Nakagami-m fading channels in a DF two-way relay system. They also analyzed the effects of the PS factor, threshold, fading severity, and parameters on the network’s performance, wherein the two source nodes could communicate with each other with the help of a relay. Also exploiting SWIPT, Ref. [42] proposed a novel UAV-relay-assisted amplifiers and forwards (AF) network and derived connection- and secrecy-outage probabilities based on a PS scheme.
Furthermore, considering the energy-constrained system, some existing works studied the energy efficiency (EE) of networks. In [43], the energy efficiency was maximized by optimizing the UAV position. However, the authors did not use the detailed energy consumption expression of the rotary-wing UAV, but simply adopted the constant power. Ref. [44] investigated a UAV-assisted non-orthogonal multiple access (NOMA) networks, where the Dinkelbach method and successive convex optimization techniques were used to maximize the energy efficiency of the system by designing a UAV’s location, beam pattern, power, and time schedule. For a multi-user distributed antenna system, Ref. [45] maximized the energy efficiency by jointly-optimizing energy allocation and a PS ratio based on the Lagrangian method. Ref. [46] explored SWIPT techniques for device-to-device (D2D) communications based on a nonlinear energy system, optimized power, and the PS ratio maximizing energy efficiency.
Meanwhile, as a promising technology, intelligent reflecting surface (IRS)-aided SWIPT in UAV networks has drawn much attention recently [47,48]. In [47], the authors studied a UAV network supported by IRS and SWIPT and proposed an alternating optimization (AO) algorithm to minimize all users’ energy consumption. Moreover, the authors in [48] investigated a UAV network equipped with IRS-aided SWIPT and developed an efficient iterative algorithm based on successive convex approximation, block coordinate descent, and time division multiple access (TDMA) protocols, to maximize the average-transmission rate. Aiming at the security problem in an aerial intelligent reflecting surface (AIRS) network, Ref. [49] proposed an AO algorithm based on the Riemannian manifold optimization method, the SCA technique, and the element-wise BCD method to jointly design the AIRS’s deployment and phase shift, so as to maximize the system’s secrecy rate.
In addition to the joint UAV trajectory planning and resource allocation optimization methods mentioned above, some existing works proposed new optimization methods to support a UAV communication network [50,51,52]. For example, considering the trajectory planning problem of multi-UAV assisted networks in a post-disaster scenario, Ref. [50] studied two heuristic algorithms to effectively utilize the UAVs’ energy, to improve the communication coverage performance. In the RIS-based UAV-assisted IoT communication scenario, Ref. [51] proposed a multi-UAV path planning/transmission scheduling algorithm based on model predictive control (MPC) to improve system performance and reduce the total energy consumption of UAVs. For the UAV-assisted mobile edge computing (MEC) network communication scenario, Ref. [52] proposed a multi-agent deep reinforcement learning-based UAV trajectory control algorithm to jointly optimize the geographical fairness among all the user equipment, the fairness of every user-equipment load and the users’ energy.

1.2. Motivation

In spite of the fact that the related works above have made great progress, there are still several problems needing to be resolved. To be specific, most existing studies did not consider the existence of multiple jammers, even though jammers have a significant impact on the legitimate communication of the system. In addition, most of the existing works considered a single UAV or a single ground node. That is because a multi-UAV system needs to meet a series of requirements, such as an anti-collision constraint and mission planning. These will increase the design difficulty and further increase the complexity of the algorithm. Furthermore, most existing works based on a SWIPT network focused on optimizing power or trajectory instead of multi-domains, including time, power, and trajectory. Most importantly, due to the development of onboard batteries, the flight time of UAVs is limited. The energy constraint problem greatly restricts further applications of UAVs. Therefore, how to improve the communication quality of a UAV network has always been a difficult and hot issue.
Inspired by the discussion above, we study a multi-UAV-assisted multi-user network system. Specifically, where the SN can send information and energy to the power-limited UAV, and the UAV uses the collected energy to communicate with the DN. It should be noted that there are multiple jammers in the network blocking legitimate communication. Different from the existing network, we introduce multiple UAVs based on SWIPT technology and fully consider the existence of jammers and the energy consumption of UAVs. In addition, due to the complexity of the network, solving this joint optimization problem was a considerable challenge. Thus, we introduced multiple slack variables and used the SCA method to make the original problem satisfy the disciplined convex program (DCP) rules so that the reformulated problem could be solved based on the solver CVX.

1.3. Contributions

For the sake of solving the problems given above, a multi-domain optimization algorithm based on the PS protocol that combines trajectory planning, time allocation, and power splitting is proposed by us. We aim to maximize the throughput by considering all constraints. The main contributions of this paper are as follows:
  • We investigate a multi-UAV-assisted multi-user relay network in which the SNs use SWIPT technology to transmit wireless energy and information to UAVs. The UAVs use the collected energy to transmit information to the DNs, with the jammers interfering with legitimate channel communications.
  • Our goal was to jointly optimize UAV trajectories, time allocation, and power-splitting factors, to mitigate interference and maximize the system throughput. Given that the original problem is non-convex and difficult to solve directly, we decomposed the original problem into three subproblems based on successive convex approximation, block coordinate descent, and a slack variables method presenting an efficient joint optimization algorithm to obtain a suboptimal solution.
  • Simulation results indicate that the proposed scheme had better performance than the four benchmark schemes. In addition, we discuss the impact of the number of jammers and energy budgets on system performance and illustrate the effectiveness of joint trajectory planning, time, and power allocation to mitigate interference.
The rest part of the paper is organized as follows. In Section 2, the system model is introduced. In Section 3, we propose a joint optimization algorithm to solve the original problem. In Section 4, we provide simulation results and some necessary discussions. Finally, Section 5 concludes this paper.

2. System Model

Considering a multi-UAV enabled wireless communication network as shown in Figure 1, which includes K 1 quadcopter UAVs, K 2 source nodes (SNs) and destination nodes (DNs), and multiple jammers. Since each pair of ground nodes (SN and DN) is equipped with a fixed UAV to provide communication services for them, then K 1 = K 2 = K . In this system, we assume that the UAVs need to communicate with DNs, and the SNs use SWIPT technology to transmit wireless energy and information to UAVs. Specifically, K SNs stored information and energy. First, all SNs simultaneously send information and energy to the UAV relays, and then, the UAV relays use the collected energy to forward the information to the DNs in DF mode. It is assumed that the SNs, the UAVs, and the DNs are each equipped with a single antenna, the jammers are equipped with K antennas, and the jammers’ antennas are aimed at the signal transmission direction of the UAVs [53]. Thus, The jammers which are far away from SNs and closer to UAVs interfere with the channel from UAVs to DNs.
In order to describe the model in mathematical terms, we introduce a 3D Cartesian coordinate system. Suppose the locations of SN k and DN k are w S k = ( x S k , y S k , 0 ) and w D k = ( x D k , y D k , 0 ) respectively, k K = { 1 , 2 , . . . , K } . The system contains multiple jammers, denoted as j J = { 1 , 2 , . . . , J } , and the location of the j-th jammer is w j = ( x j , y j , 0 ) . At the same time, we discretize the UAVs mission period T into N time slots with equal length δ , i.e.,  δ = T N . Therefore, the position of UAV k flying at a height Z in any time slot n N = { 1 , 2 , . . . , N } is denoted as q k [ n ] = ( x k [ n ] , y k [ n ] ) . Moreover, we assume that the maximum flight speed of the UAV k is V max . Thus, we have the following:
q k [ n ] q k [ n 1 ] V max δ , k , n = 2 , . . . , N .
which means that the UAV’s speed between two adjacent time slots cannot exceed the maximum speed, where represents the Euclidean norm. In addition, the distance between any two UAVs needs to be greater than a minimum safe distance of D min to avoid collision and ensure safety. Thus,
q k [ n ] q l [ n ] 2 D min 2 , k , l , k l .
Generally speaking, most of the wireless communication channels in UAV networks are dominated by line-of-sight (LOS) links. Thus, following the free-space path loss model, we can get the channel-power gain between SN k and UAV k as follows:
h S k U k 2 = β s u q k [ n ] w S k 2 κ [ n ] , n .
where β s u represents SN to UAV channel gain at the reference distance 1 m; κ [ n ] is a small-scale fading with unit mean that is modeled by Rayleigh fading, i.e.,  E [ | κ [ n ] | 2 ] = 1 . Similarly, following the free-space path loss model, the channel-power gains from the jammer j to UAV k, and from UAV k to DN k are:
h j U k 2 = β J u q k [ n ] w j 2 , n .
h U k D k 2 = β u d q k [ n ] w D k 2 , n .
where β J u and β u d represent jammer j to UAV k and UAV k to DN k channel gain at the reference distance of 1 m, respectively.

2.1. Energy and Information Transmission Model

Inspired by [39], we use the PS protocol to describe the transmission process between the nodes of the network. Specifically, the PS protocol is divided into two steps, as shown in Figure 2, where τ is the time-allocation factor, α is the power-splitting factor, and P k is the transmit power from SN k to UAV. We first divide each time slot into τ δ and ( 1 τ ) δ . During the first τ δ process, the SN sends a signal to the UAV. According to the PS protocol, the 1 α portion of the signal power is used by the UAV to receive and decode a specific signal from the SN, and the remaining portion is used for energy harvesting. Note that the energy collected by UAV from the SN is temporarily stored in the supercapacitor [54]. During the second ( 1 τ ) δ process, the UAV uses the energy collected in the previous stage to transmit the decoded data to the DN. It should be noted that due to the limitation of energy harvesting efficiency and signal fading, we consider the harvested energy to be only used for signal processing and transmission. The energy consumed by the motor is determined by its own battery capacity, which we will discuss later.
Based on the above analysis, the UAV-received signal used for information processing during a time slot can be expressed as follows:
y k I N = ( 1 α ) P k h S k U k x + n s u .
where x denotes a signal sent by SN, and  n s u is additive white Gaussian noise (AWGN) with mean 0 and variance σ s u 2 , i.e.,  n s u C N ( 0 , σ s u 2 ) . Therefore, the signal-to-noise ratio (SNR) of the received signal is as follows:
S N R k I N = ( 1 α ) P k h S k U k 2 σ s u 2 .
Thus, the achievable rate from SN to UAV is as follows:
R S U k = τ log 2 1 + S N R I N k , k .
It should be noted that in the actual network, the SNR needs to be greater than a threshold γ t h 1 ; otherwise, the information transmission will be interrupted. Thus, we have the following:
S N R I N k γ t h 1 , k , n .
According to the PS protocol, the energy harvesting time during each time slot is τ δ . Therefore, the energy collected by the UAV in a slot can be expressed as follows:
E k E H = η α P k h S k U k 2 τ δ .
where η is energy collection efficiency. It should be noted that the collected energy cannot exceed the maximum capacity of the supercapacitor. Thus, we have the following:
E k E H E k c a p
where E k c a p is the maximum capacity of the supercapacitor. Thus, the UAV’s transmission power during the ( 1 τ ) δ can be expressed as follows:
P U k = E k E H ( 1 τ ) δ = η α P k h S k U k 2 τ ( 1 τ ) .
Due to the existence of the jammers, the received signal-to-interference-plus-noise-ratio (SINR) at the DN needs to be greater than a threshold γ t h 2 to ensure that the signal transmission will not be interrupted. Thus, we have the following:
S I N R D k = P U k [ n ] h U k D k 2 [ n ] j = 1 J P j h j U k 2 [ n ] + σ u d 2 γ t h 2 , n , k .
where σ u d 2 is the noise power, and P j is the interference power. Thus, the achievable rate from the UAV to the DN is as follows:
R U D k = 1 τ log 2 1 + S I N R D , k .
In addition, the information-causality constraints of the system can be written as
t = 1 n ( τ ) log 2 ( 1 + S N R I N k ) t = 1 n ( 1 τ ) log 2 ( 1 + S I N R D ) , n = 1 , . . . , N , k .

2.2. Energy Consumption Model

Compared to energy consumption related to information transmission and signal decoding, UAVs need to consume more energy to maintain level flight. According to existing achievements in [17], the propulsion power of a rotary-wing UAV in 2D horizontal flight could be modeled as
P u a v ( v ) = P B 1 + 3 v 2 v t i p 2 b l a d e p r o f i l e + P I 1 + v 4 4 v 0 4 v 2 2 v 0 4 1 2 i n d u c e d + 1 2 d 0 ρ s A 0 v 3 p a r a s i t e
where v means the UAV’s speed, P B and P I are the blade profile and induced powers, respectively, when the UAV is hovering. v t i p represents the tip speed of the rotor blade, and v 0 is the mean rotor-induced velocity. In addition, d 0 is the fuselage drag ratio, ρ is the air density, s is rotor solidity, and A 0 is the rotor disc area. Therefore, we can get the sum of the energy consumption of the UAV in a mission period T by
E U A V ( v ) = 0 T P I 1 + v 4 4 v 0 4 v 2 2 v 0 4 1 2 d t + 0 T P B 1 + 3 v 2 v t i p 2 + 1 2 d 0 ρ s A 0 v 3 d t
From the definition of time slot δ , we define the UAV’s speed as v = q k [ n ] q k [ n 1 ] q k [ n ] q k [ n 1 ] δ δ . Thus, we can rewrite E U A V as
E U A V ( Δ q ) = n = 2 N P I δ 4 + Δ q 4 4 v 0 4 Δ q 2 2 v 0 4 1 2 + n = 2 N P B δ + 3 Δ q 2 δ v t i p 2 + 1 2 d 0 ρ s A 0 Δ q 3 δ 2
where Δ q = q k [ n ] q k [ n 1 ] . In summary, we get the energy consumption expression of the rotary-wing UAV.

2.3. Problem Formulation

In this paper, our purpose is to maximize the throughput of UAV to the DN by optimizing the trajectory q [ n ] , time-allocation factor τ , and power-splitting factor α . Thus, the throughput of the DN k over N time slots can be expressed as follows:
R D k = n = 1 N ( 1 τ ) log 2 ( 1 + S I N R D ) .
Let μ denote the the minimum throughput of DNs, i.e.,  μ = min k K R D k , and define Q = { q k [ n ] , k , n } , τ = { τ k [ n ] , k , n } , α = { α k [ n ] , k , n } , E t h as the UAV’s energy budget, and q s t a r t and q e n d as the start and endpoints of the UAV. The joint trajectory planning, time, and power allocation optimization problem can be formulated as
P 1 : max { Q , τ , α , μ } μ
s . t . ( 1 ) , ( 2 ) , ( 9 ) , ( 11 ) , ( 13 ) , ( 15 )
E U A V ( Δ q ) E t h , k
μ R D k , k
0 τ 1
0 α 1
q k [ 1 ] = q s t a r t
q k [ N ] = q e n d
Note that problem P1 is difficult to solve directly since (2), (11), (13), (15), (20c), and (20d) are non-convex. In the next section, we propose an efficient iterative algorithm to obtain a feasible solution to original problem.

3. Joint Optimization

Since P1 is a non-convex problem, it is difficult to solve directly. In this section, we divide P1 into three subproblems and obtain suboptimal solutions by applying a successive convex approximation and a slack variables method. Then, we develop an overall iterative algorithm based on the block coordinate descent technique to get a locally optimal solution. The specific flow chart is shown in Figure 3.

3.1. Optimization of Trajectory

For any fixed power-splitting and time-allocation factors { α , τ } , the trajectory optimization problem can be expressed as follows:
P 2 : max { Q , μ } μ
s . t . ( 1 ) , ( 2 ) , ( 9 ) , ( 11 ) , ( 13 ) , ( 15 ) , ( 20 c ) , ( 20 d ) , ( 20 g ) , ( 20 h )
Note that the problem P2 is intractable due to the non-convexity of (2), (11), (13), (15), (20c), and (20d). To tackle this issue, we first introduce slack variables { A [ n ] , B [ n ] , C [ n ] } .
Theorem 1. 
By introducing slack variables, problem P3 could be equivalently written as
P 3 : max { q [ n ] , μ , A [ n ] , , D [ n ] } μ
s . t . ( 1 ) , ( 2 ) , ( 9 ) , ( 11 ) , ( 15 ) , ( 20 c ) , ( 20 g ) , ( 20 h )
μ n = 2 N 1 τ k [ n ] log 2 1 + 1 A k [ n ] B k [ n ] C k [ n ]
A k [ n ] η α P k β s u τ k [ n ] 1 τ k [ n ] 1 q k [ n ] w S k 2 , k , n
B k [ n ] β u d 1 q k [ n ] w D k 2 , k , n
C k [ n ] j = 1 J P j β J u q k [ n ] w j 2 + σ u d 2 , k , n
1 A k [ n ] B k [ n ] C k [ n ] γ t h 2 , k , n
Proof. 
The theorem can be proved by the method of contradiction. Specifically, if (22d)–(22f) are strict equality constraints, problem P3 is equal to P2. Otherwise, by adjusting the slack variables, the value of the objective can always be further optimized.    □
However, P3 is still difficult to solve because (15), (20c), and (22f) are non-convex constraints, and the left-hand-side (LHS) of (2) and (22g), the right-hand-side (RHS) of (22c) is convex. Consider that any convex function is globally lower-bounded by its first-order Taylor expansion at any point [55]. Therefore, taking Taylor expansion approximately as lower bound, we can obtain the following:
log 2 1 + 1 A [ n ] B [ n ] C [ n ] log 2 1 + 1 A i B i C i A [ n ] A i A i 1 + A i B i C ln 2 B [ n ] B i B i 1 + A i B i C i ln 2 C [ n ] C i C i 1 + A i B i C i ln 2
where ( A i , B i , C i ) is a given local point in the i-th iteration.
Ignoring the terms that are independent of the slack variables A [ n ] , B [ n ] , C [ n ] , we replace the RHS of (22c) with S [ n ] :
S [ n ] = A [ n ] / A i + B [ n ] / B i + C [ n ] / C i ( 1 + A i B i C i ) ln 2
μ n = 2 N ( 1 τ k [ n ] ) S [ n ]
Similar to Theorem 1, by introducing slack variables D [ n ] , (22f) could be equivalently written as follows:
C k [ n ] j = 1 J P j β J u D k , j ( n ) 1 + σ u d 2 , k , n
0 D k , j ( n ) q k [ n ] w j 2 , k , n , j
However, we notice that the RHS of (26b) is convex with respect to trajectory Q , thus, (26b) is still a non-convex constraint. Relying on the first-order Taylor expansion, we have the lower bound as
q k [ n ] w j 2 q k i [ n ] w j 2 + 2 ( q k i [ n ] w j ) T × ( q k [ n ] q k i [ n ] ) = E k , j [ n ] , k , n , j
Thus, we reformulate (26b) as
0 D k , j ( n ) E k , j ( n ) , k , n , j
For the non-convex constraint (22g). Since the LHS of (22g) is convex, we apply the first-order Taylor expansion to get the lower bound at the i-th iteration point
1 A [ n ] B [ n ] C [ n ] 1 A i B i C i ( A [ n ] A i ) ( A i ) 2 B i C i ( B [ n ] B i ) A i ( B i ) 2 C i ( C [ n ] C i ) A i B i ( C i ) 2 γ t h 2
For the LHS of (2), we can obtain the lower bound according to the first-order Taylor expansion as
q k [ n ] q l [ n ] 2 q k i [ n ] q l i [ n ] 2 + 2 ( q k i [ n ] q l i [ n ] ) T × ( q k [ n ] q l [ n ] )
Therefore, the non-convex constraint (2) can be rewritten as a convex constraint:
q k i [ n ] q l i [ n ] 2 + 2 ( q k i [ n ] q l i [ n ] ) T × ( q k [ n ] q l [ n ] ) D min 2 , k , l , k l .
For the information-causality constraint (15), by introducing slack variables { F , G , H , I } , we have the following:
t = 1 n ( τ ) log 2 1 + η α P k τ 1 τ F k [ t ] G k [ t ] H k [ t ]
t = 1 n ( 1 τ ) log 2 1 + ( 1 α ) P k σ 2 I k [ t ] , n = 1 , . . . , N , k .
F k [ n ] j = 1 J P j h j U k 2 [ n ] + σ u d 2 , n = 1 , . . . , N .
G k [ n ] β s u 1 q k [ n ] w S k 2 , n = 1 , . . . , N .
H k [ n ] β u d 1 q k [ n ] w D k 2 , n = 1 , . . . , N .
I k [ n ] β s u 1 q k [ n ] w S k 2 , n = 1 , . . . , N .
Since the RHS of (32a) is convex with respect to I , relying on the first-order Taylor expansion, we have the following:
log 2 1 + ( 1 α ) P k σ 2 I k log 2 1 + ( 1 α ) P k σ 2 I k i ( 1 α ) P k ( I k I k i ) σ 2 ( I k i ) 2 + ( 1 α ) P k I k i ln 2 = L
Thus, (32a) can be written as
t = 1 n ( τ ) log 2 1 + η α P k τ 1 τ F k [ t ] G k [ t ] H k [ t ] t = 1 n ( 1 τ ) L k [ t ] , n = 1 , . . . , N , k .
For the non-convex constraint (32b), by introducing slack variables M , we have:
F k [ n ] j = 1 J P j M k , j [ n ] + σ u d 2 , k , n .
1 M k , j [ n ] β J u 1 q k [ n ] w j 2 , k , n , j .
Since the LHS of (35b) is convex, we have the following:
1 M k , j [ n ] 1 M k , j i [ n ] M k , j [ n ] M k , j [ n ] M k , j i [ n ] 2 β J u 1 q k [ n ] w j 2
Similar to (27), for the non-convex constraints (32c) and (32d), we have:
β s u 1 q k i [ n ] w S k 2 + 2 β s u 1 ( q k i [ n ] w S k ) T × ( q k [ n ] q k i [ n ] ) G k [ n ] , k , n .
β u d 1 q k i [ n ] w D k 2 + 2 β u d 1 ( q k i [ n ] w D k ) T × ( q k [ n ] q k i [ n ] ) H k [ n ] , k , n .
Similarly, for the non-convex constraint (11), we have the following:
η α P k β s u τ δ E k c a p q k i [ n ] w S k 2 + 2 ( q k i [ n ] w S k ) T × ( q k [ n ] q k i [ n ] ) , k , n .
Since the energy constraint expression (20c) is very complex and difficult to solve directly, in order to facilitate the analysis, we introduce a slack variable O as follows:
O k [ n ] δ 4 + Δ q k 4 4 v 0 4 Δ q k 2 2 v 0 4 1 2
We can further obtain:
O k 2 [ n ] + Δ q k 2 v 0 2 δ 4 O k 2 [ n ] , n = 2 , . . . , N , k .
Therefore, the energy consumption of the UAV k can be equivalently expressed as follows:
E t h E k ( Δ q k , O k [ n ] ) = n = 2 N P B ( δ + 3 Δ q 2 δ v t i p 2 ) + 1 2 d 0 ρ s A 0 Δ q 3 δ 2 + n = 2 N P I O k [ n ] E U A V ( Δ q k ) , k
Finally, for non-convex constraint (40), we have the following:
O k 2 [ n ] + Δ q k 2 v 0 2 O k i [ n ] 2 + Δ q k i 2 v 0 2 + 2 O k i [ n ] ( O k [ n ] O k i [ n ] ) + 2 Δ q k i v 0 2 ( Δ q k Δ q k i ) δ 4 O k 2 [ n ] , k .
As a result, the lower bound problem of P3 can be approximated as
P 4 : max { Q , A , . . . , O , μ } μ
s . t . ( 1 ) , ( 9 ) , ( 20 g ) , ( 20 h ) , ( 22 d ) , ( 22 e ) , ( 25 ) , ( 26 a ) , ( 28 ) , ( 29 ) , ( 31 ) , ( 32 e ) , ( 34 ) , ( 35 a ) , ( 36 ) , ( 37 a ) , ( 37 b ) , ( 38 ) , ( 41 ) , ( 42 )
Obviously, P4 is a convex optimization problem that could be solved efficiently by some classical optimization techniques, such as the interior point method. In addition, it is worth noting that the optimal objective value obtained from P4 usually serves as a lower bound of P3.

3.2. Optimization of Power Splitting Factor

For any fixed UAV trajectory and time-allocation factor { Q , τ } , the power-splitting factor optimization problem can be expressed as follows:
P 5 : max { α , μ } μ
s . t . ( 9 ) , ( 11 ) , ( 13 ) , ( 15 ) , ( 20 d ) , ( 20 f )
It should be noted that problem P5 is not a standard convex optimization problem because the LHS and the RHS of (15) are concave. Thus, consider that any concave function is globally upper-bounded by its first-order Taylor expansion. Therefore, we can obtain the following:
log 2 1 + α P log 2 1 + α i P + ( α α i ) P 1 + α i P ln 2
where
P = η P k h S k U k 2 τ h U k D k 2 1 τ j = 1 J P j h j U k 2 + σ u d 2
Thus, the lower bound problem of P5 can be approximated as
P 6 : max { α , μ } μ
s . t . ( 9 ) , ( 11 ) , ( 13 ) , ( 20 d ) , ( 20 f )
t = 1 n ( 1 τ ) log 2 1 + α k i [ t ] P [ t ] + ( α k [ t ] α k i [ t ] ) P [ t ] 1 + α k i [ t ] P [ t ] ln 2 t = 1 n ( τ ) log 2 ( 1 + S N R I N k ) , n = 1 , . . . , N , k .
P6 is also a convex optimization problem that can be solved like P4. Additionally, the optimal objective value obtained from P6 usually serves as a lower bound of P5.

3.3. Optimization of Time-Allocation Factor

For any given power-splitting factor and trajectory { α , Q } , we consider the subproblem of optimizing the time-allocation factor as follows:
P 7 : max { τ , μ } μ
s . t . ( 11 ) , ( 13 ) , ( 15 ) , ( 20 d ) , ( 20 e )
Further, we can transform the problem P7 into P8:
P 8 : max { τ , μ } μ
s . t . ( 11 ) , ( 13 ) , ( 15 ) , ( 20 e )
μ n = 1 N ( 1 τ k [ n ] ) log 2 1 + τ k [ n ] 1 τ k [ n ] R k [ n ] , k
where
R k [ n ] = α k [ n ] η P k h S k U k 2 [ n ] h U k D k 2 [ n ] J = 1 J P j h j U k 2 [ n ] + σ u d 2
Since (15) and (49c) are non-convex, P8 is difficult to solve directly. To this end, we introduce slack variables to solve this problem.
Theorem 2. 
By introducing slack variables { U , V , W , X } , problem P8 could be equivalently written as follows:
P 9 : max { τ , μ , U , . . . , X } μ
s . t . ( 11 ) , ( 13 ) , ( 20 e )
μ n = 1 N U k [ n ] V k [ n ] , k
0 U k [ n ] 1 τ k [ n ] , k , n
0 V k [ n ] log 2 1 + τ k [ n ] 1 τ k [ n ] R k [ n ] , k , n
W k [ n ] 1 τ k [ n ] , k , n
X k [ n ] log 2 1 + τ k [ n ] 1 τ k [ n ] R k [ n ] , k , n
t = 1 n W k [ t ] X k [ t ] t = 1 n ( τ ) log 2 ( 1 + S N R I N k ) , n = 1 , . . . , N , k .
Proof. 
According to (51d) and (51e), we have the following:
n = 1 N U k [ n ] V k [ n ] n = 1 N ( 1 τ k [ n ] ) log 2 1 + τ k [ n ] 1 τ k [ n ] R k [ n ]
According to (51f) and (51g), we have the following:
t = 1 n 1 τ k [ t ] log 2 1 + τ k [ t ] 1 τ k [ t ] R k [ t ] t = 1 n W k [ t ] X k [ t ]
Therefore, we prove the theorem by the method of contradiction. Specifically, if (52) and (53) are strict equality constraints, combined with (51c) and (51h), we can know that P9 is equal to P8. Otherwise, by adjusting the slack variables, the value of the objective function can always be further optimized.    □
However, P9 is still a non-convex optimization problem that is difficult to solve directly. Considering that (51c) has a product of functions (PF) structure, we can rewrite (51c) as a function with the difference of convex (DC) structure, that is,
UV = 1 2 ( U + V ) 2 1 2 ( U 2 + V 2 )
Since the first term in the RHS of (54) is convex, we can obtain a lower bound for (54) by using first-order Taylor expansion, that is
1 2 ( U + V ) 2 1 2 ( U 2 + V 2 ) ( U i + V i ) ( U + V ) 1 2 ( U i + V i ) 2 1 2 ( U 2 + V 2 ) = Y
Thus, (51c) can be rewritten as
μ n = 2 N Y
For the non-convex constraint (51e), by introducing slack variables Z , we have:
0 V k [ n ] log 2 ( 1 + Z k [ n ] R k [ n ] )
0 Z k [ n ] τ k [ n ] 1 τ k [ n ]
Furthermore, the RHS of the (57b) is convex on the domain ( τ [ 0 , 1 ] ) . Thus, we have the following:
τ k [ n ] 1 τ k [ n ] 1 1 τ k i [ n ] 1 + τ k [ n ] τ k i [ n ] ( 1 τ k i [ n ] ) 2 = Γ
Thus, (57b) can be rewritten as
0 Z Γ
Similar to the procedure of handling (51e), for the non-convex constraint (51g), by introducing the slack variable Λ , we have
X k [ n ] log 2 1 + R k [ n ] Λ k [ n ]
0 Λ k [ n ] 1 τ k [ n ] τ k [ n ]
For the (60b), we have
1 τ k [ n ] τ k [ n ] 1 τ k i [ n ] τ k [ n ] τ k i [ n ] τ k i [ n ] 2 1 Λ k [ n ] 0
According to (55), for the (51h), we have
t = 1 n WX t = 1 n 1 2 W + X 2 t = 1 n ( τ ) log 2 ( 1 + S N R I N k ) , n = 1 , . . . , N , k .
As a result, the lower bound problem of P9 can be rewritten as
P 10 : max { τ , μ , U , . . . , Λ } μ
s . t . ( 11 ) , ( 13 ) , ( 20 e ) , ( 51 d ) , ( 51 f ) , ( 56 ) , ( 57 a ) , ( 59 ) , ( 60 a ) , ( 61 ) , ( 62 )
P10 is also a convex optimization problem that can be solved like P6. In addition, the optimal objective value obtained from P10 usually serves as a lower bound of P9.

3.4. Algorithmic Architecture

According to the above analysis, we obtain the suboptimal solution of the original problem P1 based on the block coordinate descent (BCD) method. As shown in Algorithm 1, the algorithm alternately optimizes Q , α , and τ until convergence. Note that the initial point is the Taylor expansion point within the feasible region. Then, the convergence is proved as follows:
Algorithm 1 Overall algorithm
1:
Initialize i = 1 . Set initial feasible point { Q i , α i , τ i } and other slack variables.
2:
Do
3:
    Solve problem P4 with given { Q i , α i , A i , . . . , O i } to obtain the optimal solution { Q i + 1 , A i + 1 , . . . , O i + 1 } ,
4:
    Solve problem P6 with given { α i , Q i + 1 , τ i } to obtain the optimal solution { α i + 1 } ,
5:
    Solve problem P10 with given { α i + 1 , Q i + 1 , . . . , Λ i } to obtain the optimal solution { τ i + 1 , . . . , Λ i + 1 } .
6:
    Update  i = i + 1 .
7:
Until the objective value converges.
8:
Output α * α i , Q * Q i , τ * τ i .
We define μ ( Q i , α i , τ i ) , μ 1 ( Q i , α i , τ i ) , μ 2 ( Q i , α i , τ i ) , and μ 3 ( Q i , α i , τ i ) as the objective values of problem P1, P4, P6 and P10 based on Q i , α i , and τ i over i-th iteration. Thus, we have
μ ( Q i , α i , τ i ) ( a ) μ 1 ( Q i + 1 , α i , τ i ) ( b ) μ 2 ( Q i + 1 , α i + 1 , τ i ) ( c ) μ 3 ( Q i + 1 , α i + 1 , τ i + 1 ) ( d ) μ ( Q i + 1 , α i + 1 , τ i + 1 )
where (a) holds because in Algorithm 1, problem P4 is solved to obtain the optimal solution Q i + 1 with given α i and τ i at step 3; (b) holds because problem P6 is solved to obtain the optimal solution α i + 1 with given Q i + 1 and τ i at step 4; (c) holds because problem P10 is solved to obtain the optimal solution τ i + 1 with given Q i + 1 and α i + 1 at step 5; (d) holds because the optimal objective values of P4, P6 and P10 are upper bounded by original problem P1, then the convergence can be guaranteed.
Finally, we briefly analyze the overall complexity of the algorithm. According to Algorithm 1, the complexity of the algorithm is mainly dominated by steps 3, 4, and 5, and the number of optimization variables increases with the multiples of K, J, and N. Hence, the total computational complexity is O ( ( K J N ) 3.5 log 1 ε ) , where K is the number of UAVs, J is the number of jammers, N is the number of time slots, and ε is the convergence accuracy. In addition, it should be noted that the proposed scheme is an offline algorithm, which requires path planning and resource allocation through a specific ground station (such as QGroundControl in LINUX) before the mission is executed and does not need to run on UAVs.

4. Simulation Results

In this section, simulation results and some detailed discussions are provided. We first present the simulation settings and then analyze the effect of different energy budgets and the number of jammers on the experimental results. Finally, we compare the proposed algorithm with four baseline schemes to further illustrate the superiority of the joint trajectory planning, time, and power allocation scheme.

4.1. Simulation Settings

In the simulation, we considered a communication system with four UAV nodes, i.e., k = 4 . In addition, it was assumed that the initial and end positions of the UAV 1–4 were ( 200 , 50 ) , ( 200 , 70 ) , ( 200 , 90 ) , ( 200 , 110 ) , and ( 50 , 50 ) , ( 50 , 70 ) , ( 50 , 90 ) , ( 50 , 110 ) , respectively. The rest of the parameter settings are shown in Table 1.

4.2. Effect of Energy Budgets

Figure 4 shows the 2D trajectories of four UAVs with different energy budgets. We plotted the trajectories for E t h = 10,000 J, E t h = 15,000 J, and E t h = 20,000 J. It can be seen from Figure 4 that from four initial points, UAVs 1 4 needed to approach the SNs according to the arc trajectory away from the jammers to ensure that more energy was collected to maximize the throughput of the DNs, and then fly back to the endpoints we set. For a different since the initial point was far from the source node, and in order to satisfy the minimum distance constraint between UAVs, it needed to fly a greater distance. Since UAV 4 was closest to the jammers, in order to ensure the communication quality, UAV 4 needed to be far away from the jammers under the constraint of the minimum safe distance and closer to the corresponding source node so as to collect more energy to communicate with the DN. Note that the UAVs cannot be infinitely close to the SNs, because while being closer to the SNs could guarantee enough energy to be collected, it would make the UAVs far away from the DNs, which would lead to the deterioration of the throughput. In addition, we noticed that the flying distance of the UAV increased with the energy budget, because a sufficient energy budget would ensure that the UAV was farther away from the jammers when planning a more reasonable path to maximize the throughput of the DN.
Figure 5 demonstrates the speed of four UAVs with different energy budgets. We observed that the UAVs’ speed could be divided into two stages. In the first stage, the UAVs moved at high speed, and the speed decreased with time, but in the second stage, the UAVs accelerated to the endpoints. This is because in the first stage, the jammers were closer to the UAVs, and the UAVs needed to move away from the jammers at high speed to ensure communication quality. As the UAVs kept getting closer to the optimal positions, the speed needed to be reduced to collect more energy. However, due to the limited time, and energy budgets, the UAVs could not fly at low speed for a long time; thus, the UAVs needed to accelerate to the endpoints in the second stage. In addition, we can see that UAV 1 flew the fastest, while UAV 3 was the slowest. This is because UAV 1 was the farthest from its corresponding SN, and it needed to fly farther to collect more energy, while UAV 3 was the closest to its corresponding SN, so the budget was sufficient to allow it to collect the required energy with a lower speed. Finally, we observed that for the first 30 time slots and the last 10 time slots of the total mission, the UAVs’ speed increased with energy budgets. That was because larger energy budgets could keep the UAVs away from the jammers and back to the endpoints at higher speed. These were as expected.
Figure 6 and Figure 7 illustrate the variation of the power-splitting factor α and the time-allocation factor τ . It can be seen that α increased with time, and τ first increased and then decreased with time. This is because the UAVs moved away from the jammers and approached optimal points over time, at which point the SNs needed to consume less energy to ensure the SNR threshold constraint. As for τ , in the process of approaching the optimal points, τ first increased to ensure that enough energy was collected. When returning to the endpoints, in order to ensure the communication quality of the DNs, τ decreased to improve the throughput of the DNs.
Figure 8 presents the achievable throughput over every time slot. It is shown that the throughput increased first and then decreased. This was because the UAVs were initially far away from the jammers and closer to the optimal points, thereby collecting enough energy to increase the throughput. When returning to the endpoints, the throughput dropped as the UAVs moved away from the optimal points and closer to the jammers. Moreover, we noticed that the larger the UAV’s energy budget, the greater the achievable throughput, which was in line with expectations.
Furthermore, we increased the number of UAVs from 4 to 6, then 8 to further illustrate the performance of the proposed scheme. We set the initial and end positions of UAV 5–8 as (200, 240), (200, 260), (200, 280), and (200, 300); and (50, 240), (50, 260), (50, 280), and (50, 300), respectively. The achievable system throughput versus time is shown in Figure 9. It can be seen from Figure 9 that the throughput of the system increased with the number of UAVs. Given the energy budget, when K = 8 , the throughput of the system was at the maximum; when K = 2 , the throughput of the system was at the minimum. Moreover, it can be seen that given the number of UAVs, the throughput of the system increased with the energy budget. This was as expected.

4.3. Effect of Jammers

Figure 10 shows the 2D trajectories of four UAVs with differing numbers of jammers. We plotted the trajectories for J = 2 , J = 3 , and J = 4 . The basic trajectories of the four UAVs were consistent with those from Figure 4, and we will not repeat them here. It is worth noting that the flight distance of the UAVs increased with the number of jammers. Specifically, the more the number of jammers, the more obvious the interference effect, so the UAVs needed to be farther away from the jammers to ensure the channel throughput.
Figure 11 displays the achievable throughput with different numbers of jammers. As can be seen from the figure, UAV 2 had the highest throughput. This is because UAV 2 was closer to the corresponding SN than UAV 1 and farther away from the jammers than UAV 3 and UAV 4. Finally, we observed that the throughput of all four UAVs decreased with the number of jammers. This was in line with our expectations and showed the significance of our study.
Further, we increased the number of UAVs from 4 to 6, then 8 to further illustrate the impact of jammers on system performance. The achievable system throughput versus jammers is shown in Figure 12. As can be seen from Figure 12, the system throughput increased with the number of UAVs. Given the same number of jammers, when K = 8 , the system throughput was at the maximum; when K = 2 , the system throughput was at the minimum. Additionally, it can be seen that given the same number of UAVs, the throughput of the system decreased with the jammers. This was as expected.

4.4. Performance Comparison

In order to further illustrate the superiority of the proposed algorithm, in this subsection, we will compare our scheme with four baseline schemes:
  • Scheme 1: Our proposed joint trajectory planning, time, and power allocation scheme.
  • Scheme 2: Optimizing the power-splitting factor α and UAV’s trajectory Q under the fixed time-allocation factor τ .
  • Scheme 3: Optimizing the time-allocation factor τ and UAV’s trajectory Q under the fixed power-splitting factor α .
  • Scheme 4: Optimizing the UAV’s trajectory Q under the fixed time-allocation factor τ and power-splitting factor α .
  • Scheme 5: Optimizing the power-splitting factor α and time-allocation factor τ under circular trajectory.
We evaluated the average throughput of the two UAVs, as shown in Figure 13. For dynamic schemes 1–5, the throughput of the system first increased over time and then decreased as the UAVs moved away from the optimal positions and returned to the endpoints. Also, we noticed that scheme 5 had the worst performance since the circular trajectory had been set in advance. Moreover, at the best time slot, the average throughput of the proposed scheme 1 was two times higher than schemes 2 and 3.
Figure 14 shows the average throughput with different energy budgets. It can be seen from Figure 14 that the average throughput of schemes 1–4 increased with the energy budget. For scheme 5, since the flight trajectory had been set in advance, increasing the energy budget did not bring about an improvement in average throughput. In addition, we observed that the proposed scheme 1 had the best performance, and the average throughput was increased by 40 % , 50 % , 150 % , and 550 % compared with schemes 2–5, respectively.
Figure 15 shows the average throughput of the system with differing number of jammers. Consistent with our expectations, the average throughput of all schemes decreased as the number of jammers increased. However, in comparison, the proposed scheme 1 had the best performance. Even in the extreme case with 6 jammers, the throughput of scheme 1 was still improved by 26 % , 33 % , 160 % , and 500 % compared with schemes 2–5.

5. Conclusions

This paper investigated joint trajectory planning, time, and power resource allocation to maximize the throughput in UAV networks. Considering the limited energy budget of UAVs and the existence of multiple jammers, we introduced SWIPT technology to improve channel quality. Our goal was to maximize the throughput of the DNs. Since the original problem is non-convex, taking into account the actual flight constraints of the UAVs, we proposed an efficient joint optimization algorithm based on successive convex approximations, a block coordinate descent, and the slack variables method to obtain a suboptimal solution. Simulation results corroborated that the proposed scheme can significantly improve the channel throughput and illustrated the effectiveness of joint trajectory planning, time, and power allocation in mitigating interference. Finally, we compared the proposed scheme with four benchmark schemes to highlight the superiority of our study. In future work, we will consider the UAVs scenario with mobile nodes, more complex channel models, and/or scheduling schemes such as multi-UAV coordination and multi-point access.

Author Contributions

Conceptualisation, K.W.; methodology, J.X.; formal analysis, P.L.; investigation, H.C.; writing—original draft preparation, J.X.; writing—review and editing, K.W.; validation, X.L.; supervision, K.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 62172313, in part by the Natural Science Foundation of Hunan Province under Grant 2021JJ20054, in part by the National Key Research and Development Program of China under Grant 2021YFB3901503, in part by the National Natural Science Foundation of China under Grant 62001336, and in part by the open research fund of Integrated Computing and Chip Security Sichuan Collaborative Innovation Center of Chengdu University of Information Technology under Grant CXPAQ202204.

Data Availability Statement

Not Applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Notations

The following notations are used in this manuscript:
NotationDefinition
w S k Location of the SN
w D k Location of the DN
w j Locations of the jammer
ZHeight of the UAV
q k Locations of the UAV
TTotal task time
NNumber of time slots
δ Duration of each time slot
V max The maximum speed of the UAV
D min The minimum safe distance
h S k U k The channel-power gain between the SN and the UAV
h j U k The channel-power gain between a jammer and a UAV
h U k D k The channel-power gain between a UAV and the DN
P k The transmit power of the SN
n s u Additive white Gaussian noise
α Power-splitting factor
τ Time-allocation factor
η Energy collection efficiency
P B The blade profile power
P I The induced power
v t i p The tip speed of the rotor blade
v 0 The mean rotor induced velocity
d 0 The fuselage drag ratio
ρ The air density
sThe rotor solidity
A 0 The rotor disc area

References

  1. Xiang, C.; Li, Y.; Zhou, Y.; He, S.; Qu, Y.; Li, Z.; Gong, L.; Chen, C. A Comparative Approach to Resurrecting the Market of MOD Vehicular Crowdsensing. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications, London, UK, 2–5 May 2022; pp. 1479–1488. [Google Scholar]
  2. Xiang, C.; Zhang, Z.; Qu, Y.; Lu, D.; Fan, X.; Yang, P.; Wu, F. Edge computing-empowered large-scale traffic data recovery leveraging low-rank theory. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2205–2218. [Google Scholar] [CrossRef]
  3. Ma, B.; Ren, Z.; Cheng, W. Traffic Routing-Based Computation Offloading in Cybertwin-Driven Internet of Vehicles for V2X Applications. IEEE Trans. Veh. Technol. 2021, 71, 4551–4560. [Google Scholar] [CrossRef]
  4. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-assisted emergency networks in disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  5. Jiang, X.; Sheng, M.; Zhao, N.; Xing, C.; Lu, W.; Wang, X. Green UAV communications for 6G: A survey. Chin. J. Aeronaut. 2022, 35, 19–34. [Google Scholar] [CrossRef]
  6. Tran, D.H.; Vu, T.X.; Chatzinotas, S.; ShahbazPanahi, S.; Ottersten, B. Coarse trajectory design for energy minimization in UAV-enabled. IEEE Trans. Veh. Technol. 2020, 69, 9483–9496. [Google Scholar] [CrossRef]
  7. Miao, J.; Wang, P. Power Control for Multi-UAV Location-aware Wireless Powered Communication Networks. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC), Xiamen, China, 28–30 July 2020; pp. 225–230. [Google Scholar]
  8. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-band. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 2604–2611. [Google Scholar] [CrossRef]
  9. An, K.; Lin, M.; Ouyang, J.; Zhu, W.-P. Secure Transmission in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  10. Zeng, Y.; Zhang, R. Energy-Efficient UAV Communication with Trajectory Optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar] [CrossRef] [Green Version]
  11. Lin, N.; Liu, Y.; Zhao, L.; Wu, D.O.; Wang, Y. An Adaptive UAV Deployment Scheme for Emergency Networking. IEEE Trans. Wirel. Commun. 2022, 21, 2383–2398. [Google Scholar] [CrossRef]
  12. Ma, B.; Ren, Z.; Cheng, W. Credibility Computation Offloading Based Task-Driven Routing Strategy for Emergency UAVs Network. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Rio de Janeiro, Brazil, 4–8 December 2021; pp. 1–6. [Google Scholar]
  13. Fu, Y.; Li, D.; Tang, Q.; Zhou, S. Joint Speed and Bandwidth Optimized Strategy of UAV-Assisted Data Collection in Post-Disaster Areas. In Proceedings of the 2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet), Pafos, Cyprus, 1–3 June 2022; pp. 39–42. [Google Scholar]
  14. Peer, M.; Bohara, V.A.; Srivastava, A. Multi-UAV Placement Strategy for Disaster-Resilient Communication Network. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Virtual, 18 November–16 December 2020; pp. 1–7. [Google Scholar]
  15. Kim, Y.H.; Chowdhury, I.A.; Song, I. Design and Analysis of UAV-Assisted Relaying with Simultaneous Wireless Information and Power Transfer. IEEE Access 2020, 8, 27874–27886. [Google Scholar] [CrossRef]
  16. Zhan, C.; Hu, H.; Wang, Z.; Fan, R.; Niyato, D. Unmanned Aircraft System Aided Adaptive Video Streaming: A Joint Optimization Approach. IEEE Transactions on Multimedia 2020, 22, 795–807. [Google Scholar] [CrossRef]
  17. Sun, Z.; Yang, D.; Xiao, L.; Cuthbert, L.; Wu, F.; Zhu, Y. Joint Energy and Trajectory Optimization for UAV-Enabled Relaying Network with Multi-Pair Users. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 939–954. [Google Scholar] [CrossRef]
  18. Gao, Y.; Wu, Y.; Cui, Z.; Yang, W.; Hu, G.; Xu, S. Robust trajectory and communication design for angle-constrained multi-UAV communications in the presence of jammers. China Commun. 2022, 19, 131–147. [Google Scholar] [CrossRef]
  19. Feng, Z.; Ren, G.; Chen, J.; Zhang, X.; Luo, Y.; Wang, M.; Xu, Y. Power control in relay-assisted anti-jamming systems: A Bayesian three-layer Stackelberg game approach. IEEE Access 2019, 7, 14623–14636. [Google Scholar] [CrossRef]
  20. Xu, Y.; Ren, G.; Chen, J.; Zhang, X.; Jia, L.; Feng, Z.; Xu, Y. Joint Power and Trajectory Optimization in UAV Anti-Jamming Communication Networks. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–5. [Google Scholar]
  21. Wu, Y.; Yang, W.; Guan, X.; Wu, Q. UAV-Enabled Relay Communication Under Malicious Jamming: Joint Trajectory and Transmit Power Optimization. IEEE Trans. Veh. Technol. 2021, 70, 8275–8279. [Google Scholar] [CrossRef]
  22. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based Secure Energy Efficient Beamforming in Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2022. [CrossRef]
  23. Song, X.; Chang, Z.; Guo, X.; Wu, P.; Hämäläinen, T. Energy Efficient Optimization for Solar-Powered UAV Communications System. In Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
  24. Sekander, S.; Tabassum, H.; Hossain, E. Statistical Performance Modeling of Solar and Wind-Powered UAV Communications. IEEE Trans. Mob. Comput. 2021, 20, 2686–2700. [Google Scholar] [CrossRef]
  25. Mamaghani, M.T.; Hong, Y. Improving PHY-Security of UAV-Enabled Transmission with Wireless Energy Harvesting: Robust Trajectory Design and Communications Resource Allocation. IEEE Trans. Veh. Technol. 2020, 69, 8586–8600. [Google Scholar] [CrossRef]
  26. Lu, W.; Fang, S.; Gong, Y.; Qian, L.; Liu, X.; Hua, J. Resource Allocation for OFDM Relaying Wireless Power Transfer Based Energy-Constrained UAV Communication Network. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  27. Ramzan, M.R.; Naeem, M.; Altaf, M.; Ejaz, W. Multi-Criterion Resource Management in Energy Harvested Cooperative UAV-enabled IoT Networks. IEEE Internet Things J. 2021, 9, 2944–2959. [Google Scholar] [CrossRef]
  28. Wu, Y.; Yang, W.; Guan, X. UAV-UAV Communication Under Malicious Jamming: Trajectory Optimization with Turning Angle Constraint. In Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 21–23 October 2020; pp. 26–31. [Google Scholar]
  29. Wang, X.; Gursoy, M.C.; Erpek, T.; Sagduyu, Y.E. Jamming-Resilient Path Planning for Multiple UAVs via Deep Reinforcement Learning. In Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
  30. Zhou, L.; Zhao, X.; Guan, X.; Song, E.; Zeng, X.; Shi, Q. Robust trajectory planning for UAV communication systems in the presence of jammers. Chin. J. Aeronaut. 2022, 35, 265–274. [Google Scholar] [CrossRef]
  31. Wu, Y.; Yang, W.; Guan, X.; Wu, Q. Energy-Efficient Trajectory Design for UAV-Enabled Communication Under Malicious Jamming. IEEE Wirel. Commun. Lett. 2021, 10, 206–210. [Google Scholar] [CrossRef]
  32. Duo, B.; Luo, J.; Li, Y.; Hu, H.; Wang, Z. Joint trajectory and power optimization for securing UAV communications against active eavesdropping. China Commun. 2021, 18, 88–99. [Google Scholar] [CrossRef]
  33. Li, X.; Xu, J. Positioning Optimization for Sum-Rate Maximization in UAV-Enabled Interference Channel. IEEE Signal Process. Lett. 2019, 26, 1466–1470. [Google Scholar] [CrossRef]
  34. Wu, Y.; Fan, W.; Yang, W.; Sun, X.; Guan, X. Robust Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks in the Presence of Jammers. IEEE Access 2020, 8, 2893–2905. [Google Scholar] [CrossRef]
  35. Xiang, C.; Zhou, Y.; Dai, H.; Qu, Y.; He, S.; Chen, C.; Yang, P. Reusing delivery drones for urban crowdsensing. IEEE Trans. Mob. Comput. 2021. [Google Scholar] [CrossRef]
  36. Li, J.; Tian, Y.; Zhang, Y. Destination-Based Cooperative Jamming in Security UAV Relay System with SWIPT. In Proceedings of the 2021 13th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 4–7 June 2021; pp. 160–167. [Google Scholar]
  37. Singh, R.; Rawat, M.; Jaiswal, A. On the Physical Layer Security of Mixed FSO-RF SWIPT System with Non-Ideal Power Amplifier. IEEE Photonics J. 2021, 13, 1–17. [Google Scholar] [CrossRef]
  38. Wang, W.; Li, X.; Zhang, M.; Cumanan, K.; Ng, D.W.K.; Zhang, G.; Tang, J.; Dobre, O.A. Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Trans. Commun. 2020, 68, 4476–4489. [Google Scholar] [CrossRef]
  39. Ji, B.; Li, Y.; Zhou, B.; Li, C.; Song, K.; Wen, H. Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced with Energy Harvesting. IEEE Access 2019, 7, 38738–38747. [Google Scholar] [CrossRef]
  40. Park, J.C.; Kang, K.-M.; Choi, J. Low-Complexity Algorithm for Outage Optimal Resource Allocation in Energy Harvesting-Based UAV Identification Networks. IEEE Commun. Lett. 2021, 25, 3639–3643. [Google Scholar] [CrossRef]
  41. Kumar, D.; Singya, P.K.; Bhatia, V. Performance Analysis of SWIPT Enabled Decode-and-Forward based Cooperative Network. In Proceedings of the 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), Indore, India, 23–24 April 2022; pp. 476–481. [Google Scholar]
  42. Hu, T.; Ma, F.; Shang, Y.; Cheng, Y. Physical Layer Security of Untrusted UAV-enabled Relaying NOMA Network Using SWIPT and the Cooperative Jamming. In Proceedings of the 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Virtual, 27 September–28 October 2021; pp. 1–6. [Google Scholar]
  43. Najmeddin, S.; Bayat, A.; Aïssa, S.; Tahar, S. Energy-Efficient Resource Allocation for UAV-Enabled Wireless Powered Communications. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–6. [Google Scholar]
  44. Su, Z.; Tang, J.; Feng, W.; Chen, Z.; Fu, Y.; Wong, K.-K. Energy Efficiency Optimization for D2D communications in UAV-assisted Networks with SWIPT. In Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 7–11 December 2021; pp. 1–7. [Google Scholar]
  45. Yang, Y.; Xiao, K. Energy Efficiency Optimization of Multi-user Distributed Antenna Systems with SWIPT Technique. In Proceedings of the 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Beijing, China, 14–16 May 2021; pp. 118–122. [Google Scholar]
  46. Yang, H.; Ye, Y.; Chu, X.; Dong, M. Resource and Power Allocation in SWIPT-Enabled Device-to-Device Communications Based on a Nonlinear Energy Harvesting Model. IEEE Internet Things J. 2020, 7, 10813–10825. [Google Scholar] [CrossRef]
  47. Zargari, S.; Hakimi, A.; Tellambura, C.; Herath, S. User Scheduling and Trajectory Optimization for Energy-Efficient IRS-UAV Networks with SWIPT. IEEE Trans. Veh. Technol. 2022. [CrossRef]
  48. Liu, Y.; Han, F.; Zhao, S. Flexible and Reliable Multiuser SWIPT IoT Network Enhanced by UAV-Mounted Intelligent Reflecting Surface. IEEE Trans. Reliab. 2022, 71, 1092–1103. [Google Scholar] [CrossRef]
  49. Niu, H.; Chu, Z.; Zhu, Z.; Zhou, F. Aerial intelligent reflecting surface for secure wireless networks: Secrecy capacity and optimal trajectory strategy. Intell. Converg. Netw. 2020, 3, 119–133. [Google Scholar] [CrossRef]
  50. Lin, Y.; Wang, T.; Wang, S. Trajectory Planning for Multi-UAV Assisted Wireless Networks in Post-Disaster Scenario. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  51. Savkin, A.V.; Huang, C.; Ni, W. Joint Multi-UAV Path Planning and LoS Communication for Mobile Edge Computing in IoT Networks with RISs. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  52. Wang, L.; Wang, K.; Pan, C.; Xu, W.; Aslam, N.; Hanzo, L. Multi-Agent Deep Reinforcement Learning-Based Trajectory Planning for Multi-UAV Assisted Mobile Edge Computing. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 73–84. [Google Scholar] [CrossRef]
  53. Li, S.; He, C.; Liu, M.; Wan, Y.; Gu, Y.; Xie, J.; Fu, S.; Lu, K. Design and implementation of aerial communication using directional antennas: Learning control in unknown communication environments. IET Control. Theory Appl. 2019, 13, 2906–2916. [Google Scholar] [CrossRef]
  54. Jayakody, D.N.K.; Perera, T.D.P.; Nathan, M.C.; Hasna, M. Self-energized Full-Duplex UAV-assisted Cooperative Communication Systems. In Proceedings of the 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, 3–6 June 2019; pp. 1–6. [Google Scholar]
  55. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
Figure 1. UAV communication network.
Figure 1. UAV communication network.
Drones 07 00068 g001
Figure 2. PS protocol.
Figure 2. PS protocol.
Drones 07 00068 g002
Figure 3. The flow chart of solution to problem P1.
Figure 3. The flow chart of solution to problem P1.
Drones 07 00068 g003
Figure 4. Optimal trajectories in different energy budgets.
Figure 4. Optimal trajectories in different energy budgets.
Drones 07 00068 g004
Figure 5. UAV’s speed for different energy budgets.
Figure 5. UAV’s speed for different energy budgets.
Drones 07 00068 g005
Figure 6. Power splitting factor in each time slot.
Figure 6. Power splitting factor in each time slot.
Drones 07 00068 g006
Figure 7. Time allocation factor in each time slot.
Figure 7. Time allocation factor in each time slot.
Drones 07 00068 g007
Figure 8. Achievable throughput over every time slot.
Figure 8. Achievable throughput over every time slot.
Drones 07 00068 g008
Figure 9. Achievable throughput over every time slot.
Figure 9. Achievable throughput over every time slot.
Drones 07 00068 g009
Figure 10. Optimal trajectories with different number of jammers.
Figure 10. Optimal trajectories with different number of jammers.
Drones 07 00068 g010
Figure 11. Achievable throughput with differing numbers of jammers.
Figure 11. Achievable throughput with differing numbers of jammers.
Drones 07 00068 g011
Figure 12. Achievable throughput with differing numbers of jammers.
Figure 12. Achievable throughput with differing numbers of jammers.
Drones 07 00068 g012
Figure 13. Average throughput in different schemes.
Figure 13. Average throughput in different schemes.
Drones 07 00068 g013
Figure 14. Average throughput with different energy budgets.
Figure 14. Average throughput with different energy budgets.
Drones 07 00068 g014
Figure 15. Average throughput with differing numbers of jammers.
Figure 15. Average throughput with differing numbers of jammers.
Drones 07 00068 g015
Table 1. Simulation Parameters Setting.
Table 1. Simulation Parameters Setting.
ParameterNotationValue
time slotsN50
minimum safe distance D min 10 m
BandwidthB10 MHz
SN to UAV channel gain β s u 30 dB
Jammer to UAV channel gain β J u 60 dB
transmit power of SN P k 30 W
transmit power of jammer P j 5 W
energy collection efficiency η 0.8
additive white Gaussian noise σ 2 169 dBm
UAV maximum speed V max 10 m/s
the blade profile power P B 79.86 W
the induced power P I 88.63 W
the tip speed of the rotor blade v t i p 120 m/s
the mean rotor induced velocity v 0 4.03 m/s
the fuselage drag ratio d 0 0.6
the air density ρ 1.225 kg/m3
the rotor soliditys 0.05
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, K.; Xu, J.; Li, X.; Liu, P.; Cao, H.; Liu, K. Joint Trajectory Planning, Time and Power Allocation to Maximize Throughput in UAV Network. Drones 2023, 7, 68. https://doi.org/10.3390/drones7020068

AMA Style

Wang K, Xu J, Li X, Liu P, Cao H, Liu K. Joint Trajectory Planning, Time and Power Allocation to Maximize Throughput in UAV Network. Drones. 2023; 7(2):68. https://doi.org/10.3390/drones7020068

Chicago/Turabian Style

Wang, Kehao, Jiangwei Xu, Xiaobai Li, Pei Liu, Hui Cao, and Kezhong Liu. 2023. "Joint Trajectory Planning, Time and Power Allocation to Maximize Throughput in UAV Network" Drones 7, no. 2: 68. https://doi.org/10.3390/drones7020068

APA Style

Wang, K., Xu, J., Li, X., Liu, P., Cao, H., & Liu, K. (2023). Joint Trajectory Planning, Time and Power Allocation to Maximize Throughput in UAV Network. Drones, 7(2), 68. https://doi.org/10.3390/drones7020068

Article Metrics

Back to TopTop