Next Article in Journal
Learning Template-Constraint Real-Time Siamese Tracker for Drone AI Devices via Concatenation
Next Article in Special Issue
Age of Information-Inspired Data Collection and Secure Upload Assisted by the Unmanned Aerial Vehicle and Reconfigurable Intelligent Surface in Maritime Wireless Sensor Networks
Previous Article in Journal
Research on Key Technology of Ship Re-Identification Based on the USV-UAV Collaboration
Previous Article in Special Issue
Drone-Based Environmental Emergency Response in the Brazilian Amazon
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS

1
College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu 610059, China
2
College of Electronic and Information Engineering, Southwest University, Chongqing 400715, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(9), 591; https://doi.org/10.3390/drones7090591
Submission received: 15 July 2023 / Revised: 8 September 2023 / Accepted: 18 September 2023 / Published: 20 September 2023
(This article belongs to the Special Issue UAV IoT Sensing and Networking)

Abstract

:
Recently, unmanned aerial vehicles (UAVs) have gained significant popularity and have been extensively utilized in wireless communications. Due to the susceptibility of wireless channels to eavesdropping, interference and other security attacks, UAV communication security faces serious challenges. Therefore, novel solutions need to be investigated for handling corresponding issues. Note that the UAV with full-duplex (FD) mode can actively improve spectral efficiency, and reconfigurable intelligent surface (RIS) can enable the intelligent control of signal reflection for improving transmission quality. Accordingly, the security of UAV communications may be considerably improved by combining the two techniques mentioned above. In this paper, we investigate the performance of secure communication in urban areas, assisted by a FD UAV and an RIS, where the UAV receives sensitive information from the ground users and sends jamming signals to the ground eavesdroppers. Particularly, we propose an approach to jointly optimize the user scheduling, user transmit power, UAV jamming power, RIS phase shift, and UAV trajectory for maximizing the worst-case secrecy rate. However, the non-convexity of the problem makes it difficult to solve. Combining alternating optimization (AO), slack variable techniques, successive convex approximation (SCA), and semi-definite relaxation (SDR), we propose an effective algorithm to obtain a suboptimal solution. According to the simulation results, in contrast to other benchmark schemes, we show that our proposed algorithm can significantly improve the overall secrecy rate.

1. Introduction

In recent years, owing to their characteristics of an adaptive altitude, flexibility, and mobility, unmanned aerial vehicles (UAVs) have been extensively applied in diverse areas [1,2,3]. UAVs already show many advantages in terms of improving the performance of wireless communications in many application scenarios [4,5]. Generally, UAVs can be used as airborne base stations (BSs) to improve the energy efficiency, dependability, capacity, and coverage of wireless networks. However, as the wireless channel is usually shared by many users, UAV-assisted wireless communications face very high eavesdropping risk [6,7].
Over the past decades, communication security mainly depended on the cryptographic encryption techniques deployed at higher protocol stack layers. However, these techniques cause high management costs and heavy computation [8]. The advent of physical layer security (PLS) techniques has significantly enhanced this landscape. It effectively supplements the cryptographic techniques, as its ability does not rely on the computing capabilities of communication devices [9]. As a result, a lot of research has been performed recently to guarantee the secure transmission of UAVs through combining the PLS techniques [10,11,12,13,14]. In order to avoid eavesdropping, UAVs play multiple roles, such as airborne BSs, legitimate receivers, and relays. These roles are strategically supported by the implementation of the PLS techniques, including beamforming, power allocation, trajectory planning, and so on. Furthermore, UAVs can also serve as friendly jammers to collaboratively transmit jamming signals for interfering with the wiretap channels. This collaborative jamming approach can significantly enhance the security of UAV communication systems. Specifically, in [10], UAVs were used to send artificial interference to the eavesdropper to confuse its reception, which can significantly improve security performance in some cases. In [11], the UAV was used as a mobile BS to jointly optimize the UAV trajectory and power allocation to maximize the average secrecy rate. When the UAV eavesdroppers were dispersed at random in [13], a UAV jammer aided in increasing the secrecy rate. Two UAVs were taken into account in [12], where one UAV transmitted sensitive data to a ground node (GN), and the other one jammed communication by broadcasting noise. Although the security of the UAV communication can be improved with the help of PLS technology, these technologies are not sufficient to address all security issues. Due to the complexity and dynamic nature of UAV communication systems, it is imperative to investigate innovative and efficient technologies to guarantee the security of the UAV communication.
Noticeably, due to its energy-saving, low-cost, simple-to-deploy, and programmable features, RIS is recognized as a disruptive technology in the future 6G communications [15,16,17,18]. RIS possesses the capability to passively reflect the incident signals and reconfigure the wireless propagation environment to reduce interference or improve the quality of desired signals [19]. Additionally, RIS has the advantage of low cost and energy consumption, as it operates within a short distance and does not require radio frequency (RF) chains [20]. Consequently, there have been numerous works using RIS in UAV networks to improve their security [14,21,22,23]. In particular, researchers in [21] jointly optimized the UAV trajectory, power control, and the RIS phase shifter to maximize the secrecy rate. Ref. [22] confirmed that the benefits of RIS in improving UAV communication security can be extended to multi-user scenarios. Furthermore, in [23], the authors considered a multi-antenna UAV and further used RIS to ameliorate the propagation environment, where the secrecy rate was significantly increased. Moreover, due to the line-of-sight (LoS) characteristic of UAVs, aerial malicious UAV eavesdroppers are more likely to establish LoS links with ground BS as compared to ground eavesdroppers, who pose a greater threat in terms of communication security [24]. To better address the threat issue of aerial eavesdropping, the authors in [14] introduced RIS into the system and demonstrated a significant enhancement for communication security. In the aforementioned work, it was shown that by optimizing the distribution and gain of the reflected signals, RIS can enhance the PLS of the UAV communication. In addition, RIS can also significantly reduce the transmit power consumption [25]. Indeed, except for improving the energy efficiency and security, achieving high spectral efficiency is also a key challenge in UAV communications. Enabling UAVs to operate in FD mode may be a promising solution to address such a problem.
Generally, FD technology has been extensively adopted in wireless communication due to its capability of effectively improving spectral efficiency [26,27,28]. Thus, the extension of FD capabilities to the UAVs emerges as a promising approach to enhance UAV communication security. Specifically, the optimization algorithm proposed in [26], which is used to handle the FD operation, resulted in significant improvement in energy efficiency and secrecy rate. The authors in [27] demonstrated that the FD technology can improve the security performance of wireless communications due to its capability to double the spectrum efficiency. In terms of secrecy performance, the authors in [28] showed that FD systems can outperform half-duplex systems. Note that, in FD mode, the residual self-interference (RSI) is a non-negligible factor that is referred to the interference that occurs when the transmitted signal leaks or reflects back into the receiver’s own receiver chain. RSI has detrimental effects on the received signal quality and overall communication performance [29].
Despite lots of studies on secure UAV communications, there are still some limitations that have not been well considered:
(i)
Although studies [14,21,22,23] affirmed a notable enhancement in the security of UAV communication with the aid of RIS, the persistent threat of eavesdropping remains. To address this, additional measures can be implemented to actively diminish the eavesdroppers’ capabilities of eavesdropping and further mitigate the risk of information leakage.
(ii)
Although studies [27,28] showed that the FD UAVs can enhance communication security, they did not consider the important impact of RSI. Investigating the integration of RIS in an FD UAV system is crucial to determine whether it can address or improve the issues caused by RSI.
(iii)
Although the authors in [26] discussed the impact of RSI, it is based on a simplified LoS channel model, which cannot accurately characterize actual environments. In practical urban areas, there may be deviations and losses in security performance that need to be considered.
Motivated by the aforementioned issues, we intend to focus on investigating an RIS-assisted FD UAV secure communication system in urban areas. To facilitate communication between each user and the UAV, the RIS is set up on the building’s outside. The UAV operates in FD mode to simultaneously collect private information from the ground users and deliver jamming signals to prevent eavesdropping. Considering the fairness, the worst-case minimal average secrecy rate is maximized by jointly optimizing the user scheduling, user transmit power, UAV jamming power, RIS phase shift, and UAV trajectory. However, the expected secrecy rate function is quite complex, which makes the formulated problem non-convex. Consequently, directly applying existing optimization techniques makes attaining a globally optimal solution difficult. To overcome these difficulties, we begin by deriving a lower bound for the secrecy rate function. Then, the alternating optimization (AO) method provides an efficient iterative algorithm. In particular, we segment the primary problem into five distinct blocks. However, it is important to note that these subproblems remain non-convex. To address this challenge, we introduce slack variables and leverage the successive convex approximation (SCA) and semi0definite relaxation (SDR) techniques to resolve them aptly. Note that our proposed system adopts distinct channel models for different communication links, ensuring a more realistic alignment between the communication effectiveness and actual communication scenarios. According to the simulation results, in contrast to other benchmark schemes, it is shown that our proposed algorithm can significantly improve the overall secrecy rate. Furthermore, compared to the no RIS scheme, the proposed scheme under the adverse influence of RSI has the higher capability to weaken the eavesdropper’s ability to eavesdrop.
The paper is organized as follows: In Section 2, we present the problem formulation and system model. Section 3 outlines the methodology used to address the formulated problem. In Section 4, we present the numerical results and provide a comprehensive discussion. Finally, Section 5 concludes the paper. The key notations are outlined in Table 1.

2. System Model and Problem Formulation

In this paper, we focus on a UAV-enabled wireless communication system as depicted in Figure 1. The system consists of a group of ground users transmitting confidential information to a UAV. The UAV flies from the starting point to the terminal point at a fixed altitude for a specified duration of time T. At the same time, a ground eavesdropper (denoted by Eve) attempts to intercept the communication. To safeguard the data transmission, an RIS is deployed on the building’s outside to reflect incident signals from each user and the UAV effectively. The RIS consists of N = N x × N z reflecting elements, with a uniform rectangular array (URA) of size N x × N z . The horizontal coordinate and height of the RIS elements are represented by s R = [ x R , y R ] T and z R , respectively. The set of the ground users is represented as M , where | M | = M , and the i-th ground user’s horizontal coordinate is represented as s G = [ x i , y i ] T R 2 × 1 , i M . The ground Eve is positioned with a horizontal coordinate s E = [ x E , y E ] T . We assume that the UAV operates in FD mode to simultaneously broadcast jamming signals to interfere with the Eve and receive sensitive information. The Eve and each ground user are equipped with receive and transmit antennas, respectively. As a result, in this system, all communication links are composed of direct and reflective links.

2.1. UAV Trajectory Model

As we know, UAV trajectory designing is one of the means to enhance the performance of UAV communication at the PLS. UAV trajectories can be designed through sensible path planning, enabling optimal communication and interference strategies within specific areas. In this system, the ground users are assumed to be served by the UAV, and the total duration T is partitioned into Ω equal time slots. Consequently, we have T = δ t Ω , where δ t represents each time slot’s duration and needs to be set as the optimal value. During the flight duration, the UAV flies from the starting point to the terminal at a constant altitude specified as z U . The horizontal trajectory can be roughly described by a series of points denoted by t = { t [ ω ] [ x [ ω ] , y [ ω ] ] T } , ω { 0 , , Ω } . The UAV trajectory has to be subject to the following restrictions:
t [ 0 ] = t 0 , t [ Ω ] = t F ,
where t 0 = [ x 0 , y 0 ] T is the UAV starting horizontal coordinate and t F = [ x F , y F ] T is the UAV final horizontal coordinate. Given a maximum UAV speed of V max in meter/second (m/s), within each time slot, the farthest horizontal distance that the UAV can fly is Ψ = V max δ t , which satisfies
| | t [ ω + 1 ] t [ ω ] | | 2 Ψ 2 , ω = 0 , , Ω 1 .

2.2. Direct Channel Model

The direct links are the link from the ground users to the UAV (G-U link), the link from the UAV to the Eve (U-E link), and the link from the ground users to the Eve (G-E link), respectively. Following [26], we assume that all channels follow the Rayleigh fading channel model, as the communication is easily blocked by the obstructions in an urban environment.
For the G-U link, the U-E link, and the G-E link, the channel gain can be denoted as g G , U [ ω ] C , g U , E [ ω ] C and g G , E C , respectively, given by
g G , U [ ω ] = ρ × d i s t G , U [ ω ] κ D h ˜ 1 ,
g U , E [ ω ] = ρ × d i s t U , E [ ω ] κ D h ˜ 2 ,
g G , E = ρ × d i s t G , E κ D h ˜ 3 ,
where ρ is the reference distance D 0 ’s path loss for D 0 = 1 m; κ D is the corresponding path loss exponent; h ˜ 1 , h ˜ 2 and h ˜ 3 CN ( 0 , 1 ) represent the random scattering component; and d i s t G , U [ ω ] = z U 2 + | | s G t [ ω ] | | 2 , d i s t U , E [ ω ] = z U 2 + | | t [ ω ] s E | | 2 ,   and   d i s t G , E = | | s G s E | | 2 denote the distances of the G-U link, the U-E link, and the G-E link.

2.3. Reflecting Channel Model

The reflecting links are the U-R link (from the UAV to the RIS), the R-U link (from the UAV to the ground users), the G-R link (from the ground users to the RIS), and the R-E link (from the RIS to the Eve). The LoS channel [30] is assumed to be used by the U-R and the R-U links. Therefore, g R , U [ ω ] C N × 1 may be used to represent the channel model of the R-U link, which is given by
g R , U [ ω ] = ρ × d i s t R , U κ L [ ω ] g R , U LOS [ ω ] ,
where κ L is the corresponding path loss exponent, d i s t R , U [ ω ] = | | s R t [ ω ] | | 2 + z R 2 represents the distance of the R-U link during the ω -th time slot, and g R , U LOS [ ω ] can be denoted as
g R , U LOS [ ω ] = ϖ y R , U [ ω ] ϖ x R , U [ ω ] ,
where
ϖ x R , U [ ω ] = 1 , e j 2 π λ d cos ϕ R , U [ ω ] sin φ R , U [ ω ] , , e j 2 π λ ( M x 1 ) d cos ϕ R , U [ ω ] sin φ R , U [ ω ] T , ϖ y R , U [ ω ] = 1 , e j 2 π λ d sin ϕ R , U [ ω ] sin φ R , U [ ω ] , , e j 2 π λ ( M z 1 ) d sin ϕ R , U [ ω ] sin φ R , U [ ω ] T ,
cos ϕ R , U [ ω ] sin φ R , U [ ω ] = x R x [ ω ] d i s t R , U [ ω ] , sin ϕ R , U [ ω ] sin φ R , U [ ω ] = z R d i s t R , U [ ω ] , ϕ R , U [ ω ] and φ R , U [ ω ] represent the LoS component’s azimuth and elevation angles within the ω -th time slot, λ is the carrier wavelength, and d is the distance of antenna separation. A similar process may be employed for constructing the channel model from the UAV to the RIS (U-R) link and can be denoted as g U , R [ ω ] C N × 1 .
Following [31], we assume that the link between the ground user and the RIS (G-R link) and the link between the RIS and the Eve (R-E link) are Rician fading channel models. Therefore, the channel model of the G-R link can be denoted as g G , R C N × 1 , given by
g G , R = ρ × d i s t G , R κ R 1 ϱ G , R + 1 g G , R NLOS + ϱ G , R ϱ G , R + 1 g G , R LOS ,
where κ R is the corresponding path loss exponent, d i s t G , R = z R 2 + | | s G s R | | 2 denotes the distance of the G-R link within the time slot ω , ϱ G , R is the G-R link’s Rician factor, g G , R LOS represents the deterministic LoS component, and g G , R NLOS is the non-LoS (NLoS) component following a circularly symmetric complex Gaussian (CSCG) distribution with zero mean and unit variance. Specifically, g G , R LOS is dependent on the trajectory of the UAV, and is denoted by
g G , R LOS = ϖ y G , R ϖ x G , R ,
where
ϖ x G , R = 1 , e j 2 π λ d cos ϕ G , R sin φ G , R , , e j 2 π λ ( M x 1 ) d cos ϕ G , R sin φ G , R T , ϖ y G , R = 1 , e j 2 π λ d sin ϕ G , R sin φ G , R , , e j 2 π λ ( M z 1 ) d sin ϕ G , R sin φ G , R T .
cos ϕ G , R sin φ G , R = x R x i d i s t G , R , sin ϕ G , R sin φ G , R = z R d i s t G , R , ϕ G , R and φ G , R denote the LoS component’s azimuth and elevation angles, respectively.
A similar analysis process can be applied to the R-E link. The corresponding channel power gain can be represented as g R , E C N × 1 and given by
g R , E = ρ × d i s t R , E κ R 1 ϱ R , E + 1 g R , E NLOS + ϱ R , E ϱ R , E + 1 g R , E LOS ,
where d i s t R , E = z R 2 + | | s R s E | | 2 denotes the distance of the R-E link within the time slot ω , and ϱ R , E is the R-E link’s Rician factor. The CSCG distribution with a zero mean and a unit variance is applicable for both NLoS components g R , E NLOS . Specifically, g R , E LOS is dependent on the trajectory of the UAV, and is denoted by
g R , E LOS = ϖ y R , E ϖ x R , E ,
where
ϖ x R , E = 1 , e j 2 π λ d cos ϕ R , E sin φ R , E , , e j 2 π λ ( M x 1 ) d cos ϕ R , E sin φ R , E T , ϖ y R , E = 1 , e j 2 π λ d sin ϕ R , E sin φ R , E , , e j 2 π λ ( M z 1 ) d sin ϕ R , E sin φ R , E T .
Here, cos ϕ R , E sin φ R , E = x R x E d i s t R , E and sin ϕ R , E sin φ R , E = z R d i s t R , E .

2.4. Secrecy Rate

In the ω -th time slot, the channel gain of the direct links and the reflecting links from the ground user and the Eve to the UAV through RIS can be denoted by
y U [ ω ] = g G , U [ ω ] + g R , U H [ ω ] Θ [ ω ] g G , R ,
y E 1 [ ω ] = g G , E + g R , E H Θ [ ω ] g G , R ,
y E 2 [ ω ] = g U , E [ ω ] + g R , E H Θ [ ω ] g U , R [ ω ] ,
where Θ [ ω ] = diag ( e j θ 1 [ ω ] , , e j θ N [ ω ] ) is the RIS diagonal phase shift matrix, θ n [ ω ] [ 0 , 2 π ) , n N = 1 , , N is the n-th reflecting element’s phase shift and diag ( x ) is the diagonal matrix.
The residual self-interference (RSI) at the UAV, which is challenging to be completely eliminated in practical FD mode, has a great impact on the secure performance of communication. In this case, we define h J J as the channel gain caused by the RSI. It represents the incomplete loop interference cancellation from the UAV broadcasting antenna to its receiving antenna. Rayleigh fading is a typical model for the RSI channel h J J derived independently from CN ( 0 , σ R S I 2 ) , where the average loop interference with E [ | h J J | 2 ] = σ R S I 2 is defined as σ R S I 2 .
Let P G [ ω ] represent the transmit power for ground users, and P U [ ω ] denote the UAV jamming power within the ω -th time slot, respectively. The average and peak power restrictions are shown below:
P j ¯ = 1 Ω ω = 1 Ω P j [ ω ] , 0 P j [ ω ] P j max , j G , U
where P j ¯ P j max . Then, within the time slot ω , the constraints for the achievable rates of the UAV and the Eve in bits/second/Hertz (bps/Hz) are given by
R U [ ω ] = E 1 log 2 1 + P G [ ω ] | y U [ ω ] | 2 σ 2 + P U [ ω ] | h J J | 2 ( a ) log 2 1 + P G [ ω ] | y U [ ω ] | 2 σ 2 + P U [ ω ] σ R S I 2 R ˇ U [ ω ] ,
R E [ ω ] = E 2 log 2 1 + P G [ ω ] | y E 1 [ ω ] | 2 σ 2 + P U [ ω ] | y E 2 [ ω ] | 2 𝘍 ( b ) log 2 1 + P G [ ω ] | y E 1 [ ω ] | 2 σ 2 + P U [ ω ] | y E 2 [ ω ] | 2 R ^ E [ ω ] ,
where 𝘍 follows an exponential distribution with unit mean accounting, σ 2 represents the power of additive white Gaussian noise at the respective receiver, and E 1 { · } and E 2 { · } denote the expectation operators with respect to | h J J | 2 and 𝘍 . With regard to the variables, log 2 1 + P G [ ω ] | y U [ ω ] | 2 σ 2 + P U [ ω ] | h J J | 2 and log 2 1 + P G [ ω ] | y E 1 [ ω ] | 2 σ 2 + P U [ ω ] | y E 2 [ ω ] | 2 𝘍 are convex (concave). With Jensen’s inequality, we can show that (a) in (16) and (b) in (17) hold.
At each time slot, there is only one scheduled user communicating with the UAV under time division multiple access (TDMA). The binary variable β i [ ω ] is introduced to indicate whether user i is served by the UAV within the ω -th time slot. If β i [ ω ] = 1 , it implies that user i is served; otherwise, if β i [ ω ] = 0 . These constraints can be formulated as given below:
i = 1 M β i [ ω ] 1 , ω ,
β i [ ω ] { 0 , 1 } , i , ω .
As a result, within each time slot, the achievable average secrecy rate is denoted by
R sec [ ω ] = 1 Ω ω = 1 Ω β i [ ω ] ( R ˇ U [ ω ] R ^ E [ ω ] ) + ,
where [ x ] + = max ( x , 0 ) . By setting P G [ ω ] = 0 , ω , it should be noted that the operator [ · ] + may be omitted since the actual value of (20) is always non-negative.

2.5. Problem Formulation

In this study, by jointly optimizing the user scheduling A = { β i [ ω ] , i } ω = 1 Ω , the user transmit power P G P G [ ω ] ω = 1 Ω , the UAV jamming power P U P U [ ω ] ω = 1 Ω , the RIS phase shift Θ Θ [ ω ] ω = 1 Ω and the horizontal UAV trajectory T t [ ω ] ω = 1 Ω over the flight time duration of T, we aim to maximize the worst-case achievable average secrecy rate of the UAV for each user. Consequently, the problem can be described as
max A , P G , P U , Θ , T , ζ ζ
s . t . R sec [ ω ] ζ , ( 1 ) ( 2 ) , ( 15 ) , ( 18 ) , ( 19 ) .
Although the constraints in (1), (2) and (15) are convex, solving problem (21) optimally is still challenging. The reasons are shown as follows. First of all, with respect to A , P G , P U , Θ and T , constraint (22) is not jointly convex. Second, due to the binary variable constraints (18) and (19), solving the mixed-integer optimization problem is difficult. As a result, to achieve a suboptimal solution for such an optimization problem, we present an efficient algorithm in Section 3.

3. Proposed Algorithm

In this section, we focus on solving the joint optimization problem mentioned above. However, due to the coupled optimization variables A , P G , P U , Θ and T in the objective function, solving problem (21) is quite challenging. We propose an efficient algorithm to deal with this issue. To be more precise, we decompose problem (21) into five subproblems.

3.1. Optimization of User Scheduling

The user scheduling problem can be optimized with the given ground user transmit power P G , the UAV jamming power P U , the RIS phase shift matrix Θ , and the UAV trajectory T . We relax (19) into continuous variables to make the problem tractable. The problem can be specified by
max A , ζ ζ
s . t . R s e c [ ω ] ζ ,
0 β i [ ω ] 1 , ( 18 ) .
As a result, problem (23) can be effectively addressed using CVX because it is a standard linear programming problem. We can find the optimal solution to problem (23) and subsequently obtain the integer solution using the rounding method.

3.2. Optimization of the User Transmit Power

The optimization subproblem of the ground user transmit power P G with given A , P U , Θ , and T , reduces to
max P G , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + χ i [ ω ] P G [ ω ] ) log 2 ( 1 + ψ i [ ω ] P G [ ω ] ) ] ζ , ( 15 ) ,
where χ i [ ω ] = | g G , U [ ω ] + g R , U H [ ω ] Θ [ ω ] g G , R | 2 σ 2 + P U [ ω ] σ R S I 2 , ψ i [ ω ] = | g G , E + g R , E H Θ [ ω ] g G , R | 2 σ 2 + P U [ ω ] | g U , E [ ω ] + g R , E H Θ [ ω ] g U , R [ ω ] | 2 . Based on previous work [32], the optimal solution can be obtained as follows:
P G o p [ ω ] = min [ P ˜ [ ω ] ] + , P G max χ i [ ω ] > ψ i [ ω ] 0 χ i [ ω ] ψ i [ ω ] ,
where
P ˜ [ ω ] = ( 1 2 ψ i [ ω ] 1 2 χ i [ ω ] ) 2 + 1 η ln 2 ( 1 ψ i [ ω ] 1 χ i [ ω ] ) 1 2 ψ i [ ω ] 1 2 χ i [ ω ] .
Note that one-dimensional bisection search may be used to obtain η 0 in (29), which guarantees that the constraints in (15) are satisfied as long as P i o p [ ω ] is attained.

3.3. Optimization of the UAV Jamming Power

The UAV jamming power P U Optimization Problem with given A , P G , Θ and T may be described as follows:
max P U , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( P U [ ω ] α 0 + 1 + F ω ) log 2 ( P U [ ω ] α 0 + 1 ) log 2 ( W ω P U [ ω ] + 1 + d ω ) + log 2 ( W ω P U [ ω ] + 1 ) ] ζ , ( 15 ) ,
where α 0 = σ R S I 2 σ 2 , d ω = P G [ ω ] | g G , E + g R , E H Θ [ ω ] g G , R | 2 σ 2 , F ω = P G [ ω ] | g G , U [ ω ] + g R , U H [ ω ] Θ [ ω ] g G , R | 2 σ 2 , and W ω = | g U , E [ ω ] + g R , E H Θ [ ω ] g U , R [ ω ] | 2 σ 2 . To avoid the non-convexity of the optimization issue, the SCA technique is used to approximately transform it to a convex optimization problem by following [33]. Since log 2 ( P U [ ω ] α 0 + 1 ) and log 2 ( W ω P U [ ω ] + 1 + d ω ) are concave functions with respect to P U [ ω ] , the first-order Taylor expansion’s local upper bound is around a specific point P U k k 0 [ ω ] as shown below:
log 2 ( P U [ ω ] α 0 + 1 ) log 2 ( P U k k 0 [ ω ] α 0 + 1 ) + α 0 ( P U [ ω ] P U k k 0 [ ω ] ) ln 2 ( P U k k 0 [ ω ] α 0 + 1 ) ,
log 2 ( P U [ ω ] W ω + 1 + d ω ) log 2 ( P U k k 0 [ ω ] W ω + 1 + d ω ) + W ω ( P U [ ω ] P U k k 0 [ ω ] ) ln 2 ( P U k k 0 [ ω ] W ω + 1 + d ω ) .
By replacing the local upper bounds in (32) and (33) using the terms log 2 ( P U [ ω ] α 0 + 1 ) and log 2 ( W ω P U [ ω ] + 1 + d ω ) in the objective function, problem (30) can be transformed to the following convex optimization problem (34):
max P U , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( P U [ ω ] α 0 + 1 + F ω ) + log 2 ( W ω P U [ ω ] + 1 ) log 2 ( P U [ ω ] α 0 + 1 ) log 2 ( W ω P U [ ω ] + 1 + d ω ) α 0 ( P U [ ω ] P U k k 0 [ ω ] ) ln 2 ( P U k k 0 [ ω ] α 0 + 1 ) W ω ( P U [ ω ] P U k k 0 [ ω ] ) ln 2 ( P U k k 0 [ ω ] W ω + 1 + d ω ) ] ζ , ( 15 ) .
Therefore, problem (34) can be effectively addressed using CVX.

3.4. Optimization of the Phase Shift Matrix Θ

Given A , P G , P U and T , with the aid of the slack variable τ = τ [ ω ] ω = 1 Ω , the phase shift matrix Θ optimization problem is shown as below. Let q [ ω ] = q 1 [ ω ] , q 2 [ ω ] , , q N [ ω ] T , q n [ ω ] = e j θ n [ ω ] , n N , ω , w [ ω ] = [ q T [ ω ] , 1 ] T , C G , U [ ω ] = P G [ ω ] | g G , U [ ω ] + g R , U H [ ω ] Θ [ ω ] g G , R | 2 σ 2 + P U [ ω ] σ R S I 2 , C G , E [ ω ] = P G [ ω ] | g G , E + g R , E H Θ [ ω ] g G , R | 2 , and C U , E [ ω ] = P U [ ω ] | g U , E [ ω ] + g R , E H Θ [ ω ] g U , R [ ω ] | 2 . Thus, the following equalities can hold, shown as follows:
C G , U [ ω ] = y W [ ω ] + w H [ ω ] Φ W [ ω ] w [ ω ] ,
C G , E [ ω ] = y I [ ω ] + w H [ ω ] Φ I [ ω ] w [ ω ] ,
C U , E [ ω ] = y U [ ω ] + w H [ ω ] Φ U [ ω ] w [ ω ] ,
where
y W [ ω ] = P G [ ω ] g G , U H [ ω ] g G , U [ ω ] σ 2 + P U [ ω ] σ R S I 2 , y I [ ω ] = P G [ ω ] g G , E H g G , E , y U [ ω ] = P U [ ω ] g U , E H [ ω ] g U , E [ ω ] , Φ W [ ω ] = P G [ ω ] σ 2 + P U [ ω ] σ R S I 2 g W 1 [ ω ] g W 2 [ ω ] g W 3 [ ω ] 0 , Φ U [ ω ] = P U [ ω ] g U 1 [ ω ] g U 2 [ ω ] g U 3 [ ω ] 0 , and Φ I [ ω ] = P G [ ω ] g I 1 [ ω ] g I 2 [ ω ] g I 3 [ ω ] 0 .
Here,
g W 1 [ ω ] = diag ( g R , U H [ ω ] * ) g G , R * g G , R T diag ( g R , U H [ ω ] ) , g W 2 [ ω ] = diag ( g R , U H [ ω ] * ) g G , R * g G , U T [ ω ] , g W 3 [ ω ] = g G , U * [ ω ] g G , R T diag ( g R , U H ) , g U 1 [ ω ] = diag ( g R , E H * ) g U , R * [ ω ] g U , R T [ ω ] diag ( g R , E H ) , g U 2 [ ω ] = diag ( g R , E H * ) g U , R * [ ω ] g U , E T [ ω ] , g U 3 [ ω ] = g U , E * [ ω ] g U , R T [ ω ] diag ( g R , E H ) , g I 1 [ ω ] = diag ( g R , E H * ) g G , R * g G , R T diag ( g R , E H ) , g I 2 [ ω ] = diag ( g R , E H * ) g G , R * g G , E T , g I 3 [ ω ] = g G , E * g G , R T diag ( g R , E H ) .
Here, the superscript ∗ denotes the conjugate operator. The optimization of the phase shift matrix Θ is further reduced to
max w , τ , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + w H [ ω ] Φ W [ ω ] w [ ω ] + y W [ ω ] ) log 2 ( 1 + τ [ ω ] ) ] ζ ,
w H [ ω ] Φ I [ ω ] w [ ω ] + y I [ ω ] w H [ ω ] Φ U [ ω ] w [ ω ] + y U [ ω ] + σ 2 τ [ ω ] ,
| q n [ ω ] | = 1 .
Since log 2 ( 1 + τ [ ω ] ) is not concave with respect to τ [ ω ] , finding the optimal solution for problem (39) is challenging. It is known that a convex function’s first-order Taylor expansion is its global underestimator and a concave function’s global overestimator, respectively. Accordingly, in order to resolve problem (39), we intend to use the SCA approach. The first-order Taylor expansions of log 2 ( 1 + τ [ ω ] ) at the specified point τ 0 = τ 0 [ ω ] ω = 1 Ω is denoted as follows:
log 2 ( 1 + τ [ ω ] ) log 2 ( 1 + τ 0 [ ω ] ) + ( τ [ ω ] τ 0 [ ω ] ) ln 2 ( 1 + τ 0 [ ω ] ) .
Hence, we modify problem (39) to
max w , τ , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + w H [ ω ] Φ W [ ω ] w [ ω ] + y W [ ω ] ) τ [ ω ] ln 2 ( 1 + τ 0 [ ω ] ) ] ζ ,
w H [ ω ] Φ I [ ω ] w [ ω ] + y I [ ω ] w H [ ω ] Φ U [ ω ] w [ ω ] + y U [ ω ] + σ 2 τ [ ω ] ,
w H [ ω ] E ω w [ ω ] = 1 ,
where the ( e , f ) -th element of E ω , denoted by [ E ω ] e , f is denoted by
[ E ω ] e , f = 1 e = f = n 0 otherwise .
Due to the fractional and non-concave constraint (46) in terms of w , as well as the non-convex quadratic equality constraint (47) for each ω , finding the optimal solution for problem (44) is challenging. In order to address such issues, we employ the SDR approach in this case. Let rank ( Z ) and tr ( Z ) denote the rank and the trace of a matrix Z, respectively. With W [ ω ] w [ ω ] w H [ ω ] , the constraint of rank( W [ ω ] ) = 1 needs to be dropped in order to re-express problem (44) in its relaxed form. In order to obtain an approximate solution to problem (44), an updated optimization problem is shown below:
max W 0 , τ 0 , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + tr ( Φ W [ ω ] W [ ω ] ) + y W [ ω ] ) τ [ ω ] ln 2 ( 1 + τ 0 [ ω ] ) ] ζ ,
tr ( Φ I [ ω ] W [ ω ] ) + y I [ ω ] tr ( Φ U [ ω ] W [ ω ] ) + y U [ ω ] + σ 2 τ [ ω ] ,
tr ( E n W [ ω ] ) = 1 .
Using Charnes–Cooper transformation, setting ε [ ω ] = 1 [ tr ( Φ U [ ω ] W [ ω ] ) + y U [ ω ] + σ 2 ] and Υ [ ω ] = ε [ ω ] W [ ω ] , and problem (49) can be further transformed to
max W 0 , ε 0 , Υ 0 , τ 0 , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + tr ( Φ W [ ω ] Υ [ ω ] ) ε [ ω ] + y W [ ω ] ) τ [ ω ] ln 2 ( 1 + τ 0 [ ω ] ) ] ζ ,
tr ( Φ I [ ω ] Υ [ ω ] ) + ε [ ω ] y I [ ω ] τ [ ω ] ,
tr ( Φ U [ ω ] Υ [ ω ] ) + ε [ ω ] ( y U [ ω ] + σ 2 ) = 1 ,
tr ( E n Υ [ ω ] ) = ε [ ω ] , ( 52 ) .
With the assistance of the slack variable ξ = ξ [ ω ] ω = 1 Ω , problem (53) is transformed into an equivalent form that is non-fractional, shown as follows:
max W 0 , ε 0 , Υ 0 , τ 0 , ζ ζ ,
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + ξ [ ω ] ) τ [ ω ] ln 2 ( 1 + τ 0 [ ω ] ) ] ζ
ξ [ ω ] tr ( Φ W [ ω ] Υ [ ω ] ) ε [ ω ] + y W [ ω ] , ( 52 ) , ( 55 ) ( 57 ) .
Therefore, optimization problem (58) can be effectively addressed using CVX.

3.5. Optimization of the UAV Trajectory T

Given A , P G , P U and Θ , the optimization problem of the UAV trajectory T can be expressed as
max T , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + P G [ ω ] σ 2 + P U [ ω ] σ R S I 2 | h G 1 H [ ω ] H G u [ ω ] | 2 ) log 2 ( 1 + P G [ ω ] A [ ω ] σ 2 + P U [ ω ] | h U H [ ω ] H U [ ω ] u [ ω ] | 2 ) ] ζ , ( 1 ) , ( 2 ) ,
where
H G = diag g G , R 1 , H U [ ω ] = diag g U , R [ ω ] 1 , h G 1 [ ω ] = [ g R , U H [ ω ] , g G , U [ ω ] ] H , h G 2 [ ω ] = [ g R , E H , g G , E ] H , h U [ ω ] = [ g R , E H , g U , E [ ω ] ] H , A [ ω ] = | h G 2 H [ ω ] H G u [ ω ] | 2 , and u [ ω ] = u 1 [ ω ] , u 2 [ ω ] , . . . , u N [ ω ] , 1 T u n [ ω ] = e j θ n [ ω ] , ω , n .
In particular, since g R , E and g G , E are independent of the UAV trajectory, we set a constant A [ ω ] to replace it in (61). It is worth noting that g G , U [ ω ] , g U , E [ ω ] , and g R , U [ ω ] are impacted by the UAV trajectory from (3), (4), and (6). However, due to the complex and nonlinear nature of g R , U [ ω ] in (6), the optimization of the UAV trajectory becomes intractable. To address this issue, we approximate g R , U [ ω ] and g U , R [ ω ] in the j-th iteration using the UAV trajectory from the ( j 1 ) -th iteration. With this approximation, we can reformulate problem (61) as follows:
max T , ζ ζ ,
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + γ 0 [ ω ] h b , v T [ ω ] H i , Q [ ω ] h b , v [ ω ] ) log 2 ( 1 + γ 2 [ ω ] 1 + γ 1 [ ω ] h c , v T [ ω ] H E , Q [ ω ] h c , v [ ω ] ) ] ζ , ( 1 ) , ( 2 ) ,
where
h b , v [ ω ] = ( d i s t G , U [ ω ] ) κ D , ( d i s t U , R [ ω ] ) κ L T , h c , v [ ω ] = ( d i s t U , E [ ω ] ) κ D , ( d i s t U , R [ ω ] ) κ L T , H i , Q [ ω ] = ρ h ˜ 1 , g G , R H Θ H [ ω ] g R , U LOS , ( j 1 ) [ ω ] H ρ h ˜ 1 , g G , R H Θ H [ ω ] g R , U LOS , ( j 1 ) [ ω ] , H E , Q [ ω ] = ρ h ˜ 2 , ( g U , R LOS , ( j 1 ) [ ω ] ) H Θ H [ ω ] g R , E H ρ h ˜ 2 , ( g U , R LOS , ( j 1 ) [ ω ] ) H Θ H [ ω ] g R , E .
Here, γ 0 [ ω ] = P G [ ω ] σ 2 + P U [ ω ] σ R S I 2 , γ 1 [ ω ] = P U [ ω ] σ 2 , γ 2 [ ω ] = P G [ ω ] A [ ω ] σ 2 , and g R , U ( j 1 ) [ ω ] and g U , R ( j 1 ) [ ω ] are the designed g U , R [ ω ] and g R , U [ ω ] utilizing the ( j 1 ) -th iteration’s UAV trajectory. Note that due to the objective function’s non-concavity with regard to the UAV trajectory T , problem (63) is not convex. We further update problem (63) by introducing the slack variables b = b [ ω ] ω = 1 Ω , v = v [ ω ] ω = 1 Ω , c = c [ ω ] ω = 1 Ω , f 0 = f 0 [ ω ] ω = 1 Ω and f 1 = f 1 [ ω ] ω = 1 Ω into the optimization problem, shown as follows:
max T , b , v , c , f 0 , f 1 , ζ ζ ,
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + ρ γ 0 [ ω ] f 0 [ ω ] ) log 2 ( 1 + γ 2 [ ω ] 1 + ρ γ 1 [ ω ] f 1 [ ω ] ) ] ζ ,
( d i s t G , U [ ω ] ) κ D b [ ω ] ,
( d i s t U , R [ ω ] ) κ L v [ ω ] ,
( d i s t U , E [ ω ] ) κ D c [ ω ] ,
h ˜ b , v T [ ω ] H i , Q [ ω ] h ˜ b , v [ ω ] f 0 [ ω ] ,
h ˜ c , v T [ ω ] H E , Q [ ω ] h ˜ c , v [ ω ] f 1 [ ω ] , ( 1 ) , ( 2 ) ,
where h ˜ c , v [ ω ] = c [ ω ] , v [ ω ] T and h ˜ b , v [ ω ] = b [ ω ] , v [ ω ] T . We unroll (67)–(69) in order to make the subsequent derivations easier, shown below:
x 2 [ ω ] + x i 2 + y 2 [ ω ] + y i 2 2 x [ ω ] x i 2 y [ ω ] y i + z U 2 ( b [ ω ] ) 4 κ D 0 ,
x 2 [ ω ] + x R 2 + y 2 [ ω ] + y R 2 2 x [ ω ] x R 2 y [ ω ] y R + ( z U z R ) 2 ( v [ ω ] ) 4 κ L 0 ,
x 2 [ ω ] + x E 2 + y 2 [ ω ] + y E 2 2 x [ ω ] x E 2 y [ ω ] y E + z U 2 ( c [ ω ] ) 4 κ D 0 .
We utilize the SCA technique to handle the non-convexity of the constraints (72)–(74) and the non-concavity of log 2 ( 1 + γ 2 [ ω ] 1 + ρ γ 1 [ ω ] f 1 [ ω ] ) respect to f 1 [ ω ] . And the first-order Taylor expansions of ( b [ ω ] ) 4 κ D , ( v [ ω ] ) 4 κ L , ( c [ ω ] ) 4 κ D , h ˜ b , v T [ ω ] H i , Q [ ω ] h ˜ b , v [ ω ] and h c , v T [ ω ] H E , Q [ ω ] h c , v [ ω ] at the given feasible points b 0 = b 0 [ ω ] ω = 1 Ω , v 0 = v 0 [ ω ] ω = 1 Ω , c 0 = c 0 [ ω ] ω = 1 Ω , H b v , 0 = h ˜ b v , 0 [ ω ] ω = 1 Ω and H c v , 0 = h ˜ c v , 0 [ ω ] ω = 1 Ω are given by
h ˜ b , v T [ ω ] H i , Q [ ω ] h ˜ b , v [ ω ] h ˜ b v , 0 T [ ω ] H i , Q [ ω ] h ˜ b v , 0 [ ω ] + 2 R h ˜ b v , 0 T [ ω ] H i , Q [ ω ] h ˜ b v , 0 [ ω ] , h ˜ c , v T [ ω ] H E , Q [ ω ] h ˜ c , v [ ω ] h ˜ c v , 0 T [ ω ] H E , Q [ ω ] h ˜ c v , 0 [ ω ] + 2 R h ˜ c v , 0 T [ ω ] H E , Q [ ω ] h ˜ c v , 0 [ ω ] , ( b [ ω ] ) 4 κ D ( b 0 [ ω ] ) 4 κ D 4 κ D ( b 0 [ ω ] ) 4 κ D 1 ( b [ ω ] b 0 [ ω ] ) , ( v [ ω ] ) 4 κ L ( v 0 [ ω ] ) 4 κ L 4 κ L ( v 0 [ ω ] ) 4 κ L 1 ( v [ ω ] v 0 [ ω ] ) , ( c [ ω ] ) 4 κ D ( c 0 [ ω ] ) 4 κ D 4 κ D ( c 0 [ ω ] ) 4 κ D 1 ( c [ ω ] c 0 [ ω ] ) .
Accordingly, problem (65) can be approximately transformed to
max T , b , v , c , f 0 , f 1 , ζ ζ
s . t . 1 Ω ω = 1 Ω β i [ ω ] [ log 2 ( 1 + ρ γ 0 [ ω ] f 0 [ ω ] ) log 2 ( 1 + γ 2 [ ω ] 1 + ρ γ 1 [ ω ] f 1 [ ω ] ) ] ζ ,
x 2 [ ω ] + x i 2 + y 2 [ ω ] + y i 2 2 x [ ω ] x i 2 y [ ω ] y i + z U 2 ( 1 + 4 κ D ) ( b 0 [ ω ] ) 4 κ D + 4 κ D ( b 0 [ ω ] ) 4 κ D 1 b [ ω ] 0 ,
x 2 [ ω ] + x R 2 + y 2 [ ω ] + y R 2 2 x [ ω ] x R 2 y [ ω ] y R + ( z U z R ) 2 ( 1 + 4 κ L ) ( v 0 [ ω ] ) 4 κ L + 4 κ L ( v 0 [ ω ] ) 4 κ L 1 v [ ω ] 0 ,
x 2 [ ω ] + x E 2 + y 2 [ ω ] + y E 2 2 x [ ω ] x E 2 y [ ω ] y E + z U 2 ( 1 + 4 κ D ) ( c 0 [ ω ] ) 4 κ D + 4 κ D ( c 0 [ ω ] ) 4 κ D 1 c [ ω ] 0 ,
f 0 [ ω ] + h ˜ b v , 0 T [ ω ] H i , Q [ ω ] h ˜ b v , 0 [ ω ] 2 R h ˜ b v , 0 T [ ω ] H i , Q [ ω ] h ˜ b v , 0 [ ω ] 0 ,
f 1 [ ω ] + h ˜ c v , 0 T [ ω ] H E , Q [ ω ] h ˜ c v , 0 [ ω ] 2 R h ˜ c v , 0 T [ ω ] H E , Q [ ω ] h ˜ c v , 0 [ ω ] 0 , ( 1 ) , ( 2 ) .
Thus, the convex optimization problem (75) can be effectively addressed using CVX.

3.6. Algorithm Summary

Algorithm 1 provides a summary of the proposed algorithm, which decomposes the overall optimization problem into the five sub-problems. The maximum quantity of iterations is denoted by l max , and the convergence accuracy is controlled by parameter ϵ . As described in Section 2, by tackling the five subproblems iteratively, the solution to problem (21) can be obtained. The five subproblems’ complexities determine the overall computational complexity. To solve these subproblems, the standard interior-point method is employed using CVX [34]. Subproblem 4 and subproblem 5 have the highest computational complexities, denoted as O sub 4 ( N + 1 log ( 1 ϵ ) ( M Ω ( N + 1 ) 3 + M 2 Ω 2 ( N + 1 ) 2 + M 2 Ω 2 ) ) and O sub 5 ( ( 7 N ) 3.5 log ( 1 ϵ ) ) , respectively. Therefore, the complexities of Algorithm 1 are mainly from subproblem 4 and subproblem 5. The objective function (21) in Algorithm 1 is confirmed by the subsequent numerical results.
Algorithm 1 Overall algorithm for problem (21).
  1:
Initialize P G 0 , P U 0 , Θ 0 , T 0 , iteration number l = 0 , tolerance ϵ and the maximum number of iterations l max .
  2:
repeat
  3:
   Set l = l + 1 .
  4:
   Obtain A l by solving problem (23) with given { P G l 1 , P U l 1 , Θ l 1 , T l 1 }.
  5:
   Obtain P G l by solving problem (26) with given { P U l 1 , Θ l 1 , T l 1 , A l }.
  6:
   Obtain P U l by solving problem (34) with given { Θ l 1 , T l 1 , A l , P G l }.
  7:
   Obtain Θ l by solving problem (58) with given { T l 1 , A l , P G l , P U l }.
  8:
   Obtain T l by solving problem (75) with given { A l , P G l , P U l , Θ l }.
  9:
   With given { A l , P G l , P U l , Θ l and T l }, obtain ζ l
10:
until  | ζ l ζ l 1 | ϵ or l l max .

4. Simulation Results

The proposed algorithm of jointly optimizing user scheduling, user transmit power, UAV jamming power, RIS phase shift and UAV trajectory, known as JO/SPPRT, can be verified in this section through some numerical simulation results. Unless otherwise specified, all parameters for simulations are shown in Table 2. The UAV initial feasible trajectory, called the baseline trajectory, follows a best-effort approach. It passes through the users along the direct path and proceeds directly to the destination point at its maximum speed within the UAV flying duration T . For the performance comparison, the following benchmarks are also considered in the simulation.
  • JO/NJ: Joint optimization without jamming, which jointly optimizes the user scheduling, the user transmit power, the phase shift of RIS, and the trajectory of UAV by setting P U [ ω ] = 0, ω .
  • JO/NR: Joint optimization without RIS, which jointly optimizes the user scheduling, the user transmit power, the UAV jamming power, and the UAV trajectory by setting the quantity of reflecting elements to be N = 0, ω .
  • JO/NP: Joint optimization without power control, which jointly optimizes the user scheduling, the phase shift of RIS, and the trajectory of the UAV by setting the powers of the UAV and the users as P U [ ω ] = P U ¯ and P G [ ω ] = P G ¯ , ω , respectively.
In Figure 2, the UAV trajectory is shown in terms of the four schemes when T = 100 s and N = 200 . The specific descriptions for the optimal trajectories under four scenarios are shown as follows:
(1)
In the proposed JO/SPPRT scheme, the UAV flies midway among the users and the RIS, maximizing the performance gain. Then, it approaches Eve, sending jamming signals to enhance communication security by suppressing eavesdropping.
(2)
In the JO/NJ scheme, the UAV initially flies intermediately among the RIS and the users, maximizing the hovering time. Unlike the JO/SPPRT scheme, without jamming, the UAV focuses on flying away from the Eve to minimize eavesdropping.
(3)
In the JO/NR scheme, the UAV communicates sequentially with user 2, user 1, and user 3. Different from the JO/SPPRT scheme, without the assistance of the RIS, the JO/NR scheme has limited ability to suppress eavesdropping. Hence, the UAV approaches each user individually and moves away from the Eve to enhance the secrecy rate.
(4)
In the JO/NP scheme, without power control, the users cannot transmit information at high power, and the UAV cannot send jamming signals at high power when close to Eve. Hence, the UAV flies midway among the RIS and the users to improve the communication performance, and moves away from the Eve to reduce eavesdropping.
Figure 3 shows the max-min rate achieved under various schemes for varying T from 40 s to 160 s with N = 200 . The JO/SPPRT scheme clearly outperforms other benchmarks. The JO/NJ scheme shows poor performance, as T increases because it cannot interfere with Eve. This shows the significant advantage of the UAV FD communication system. The JO/NP scheme outperforms the JO/NR scheme on the max-min rate, which shows that RIS can effectively suppress the eavesdropping. Obviously, the JO/SPPRT scheme outperforms the JO/NP scheme with respect to the secrecy rate, which demonstrates the effectiveness of the power optimization in boosting the overall secrecy rate.
Figure 4 shows the achieved max-min rate with respect to T for N = 200 , N = 400 , and N = 600 . For the same time slot, we can show that the higher the amount of the RIS reflecting elements N, the greater the secrecy rate improvement; for the same N value, the secrecy rate increases as T increases. Hence, increasing the number of elements can result in higher passive beamforming gain as observed in this figure.
Figure 5 shows the achieved max-min rate under different LIL for various benchmark schemes when T = 100 s and N = 400 . The JO/SPPRT scheme demonstrates the superiority over other schemes. As LIL increases, the secrecy rate of JO/SPPRT approaches JO/NJ, while JO/NR converges to a stable value. In the JO/SPPRT scheme, the UAV dynamically adjusts the power allocation to align with the jamming power of the JO/NJ scheme, leading to the convergence of their secrecy rates, particularly in the scenarios with high LIL values. In the JO/NR scheme, the absence of RIS significantly reduces the communication performance and eavesdropping offset, and as LIL increases, it leads to a substantial decrease in the UAV jamming power and the convergence to a stable secrecy rate. Therefore, in the JO/SPPRT scheme, the higher LIL of the UAV will seriously affect its ability to send jamming signals. In the JO/NP scheme, with a fixed UAV jamming power, increasing the LIL of the UAV leads to intensified interference to the UAV airframe and a significant drop in the secrecy rate.
Figure 6 shows the jamming power with respect to T for various LIL when N = 400 . In the JO/NR scheme, the jamming power shows three phases as follows. Firstly, during communication between the UAV and user 2, the jamming power requirement is minimal, as user 2 is farthest from Eve. Secondly, as the UAV communicates with user 3, since user 3 is closer to Eve, the jamming power needs to be set to a higher value. Lastly, the higher jamming power is required to counteract eavesdropping when the UAV communicates with user 1, which is closest to the Eve. We can see that the higher LIL results in the lower jamming power at each stage, and excessive LIL significantly hampers the effectiveness of UAV in jamming the Eve. Also, we can observe that the JO/SPPRT scheme maintains a low and steady jamming power throughout the stage, which is less affected by LIL. As such, we can show that compared to the JO/NR scheme, the JO/SPPRT scheme with the aid of RIS provides the best security performance with less jamming power. This also shows the fact that the JO/SPPRT scheme with RIS reduces the communication energy usage and reduces the effect of RSI on the secure communication of FD UAV.

5. Conclusions

In this paper, we investigated an RIS-assisted FD UAV secure communication system. We maximized the worst-case average secrecy rate by jointly optimizing several parameters, such as user scheduling, user transmit power, UAV jamming power, RIS phase shift, and UAV trajectory. Due to the non-convexity of the optimization problem and the presence of non-convex quadratic equality constraints in the subproblems, we proposed a novel algorithm, namely the JO/SPPRT scheme, to handle such an optimization problem and obtain a suboptimal solution. The numerical results confirmed the effectiveness of our proposed algorithm. Furthermore, we obtained the following conclusions: (1) The RIS-assisted FD UAV under RSI has the higher capability to interfere with eavesdropping, and results in further security enhancement as well as reducing the effect of RSI on FD UAV communication. (2) Unlike work that solely considered LoS channels, our research considered Rayleigh channels for direct links and Rician and LoS channels for reflected links, which can better match the actual environment condition in urban areas. Accordingly, this approach further enhances security performance and reduces biases and losses. (3) As compared to the scheme without RIS, our proposed scheme showed better security performance with lower jamming power. As such, our scheme is more energy saving.
Although this study addresses a scenario involving single eavesdropper, the proposed algorithm can be extended to the general case of multiple eavesdroppers. Additionally, this work could be further advanced using state-of-the-art reinforcement learning techniques for optimization. The algorithm proposed in this paper can serve as a benchmark to assess the performance and efficacy of such reinforcement learning algorithms.

Author Contributions

Conceptualization, methodology, and software, H.L. and B.D.; Validation, H.L.; Investigation, D.L., J.N., X.W. and Y.H.; Writing—original draft preparation H.L.; Writing—review and editing, B.D. and F.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (62172060), and the Sichuan Science and Technology Program under Grant (No. 2023YFH0092, No. 2022YFQ0017).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The code is available on request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shakhatreh, H.; Sawalmeh, A.H.; Al-Fuqaha, A.; Dou, Z.; Almaita, E.; Khalil, I.; Othman, N.S.; Khreishah, A.; Guizani, M. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 2019, 7, 48572–48634. [Google Scholar] [CrossRef]
  2. Menouar, H.; Guvenc, I.; Akkaya, K.; Uluagac, A.S.; Kadri, A.; Tuncer, A. UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges. IEEE Commun. Mag. 2017, 55, 22–28. [Google Scholar] [CrossRef]
  3. Kim, J.; Kim, S.; Ju, C.; Son, H.I. Unmanned Aerial Vehicles in Agriculture: A Review of Perspective of Platform, Control, and Applications. IEEE Access 2019, 7, 105100–105115. [Google Scholar] [CrossRef]
  4. Akyildiz, I.F.; Kak, A.; Nie, S. 6G and Beyond: The Future of Wireless Communications Systems. IEEE Access 2020, 8, 133995–134030. [Google Scholar] [CrossRef]
  5. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.H.; Debbah, M. A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Commun. Surv. Tutor. 2019, 21, 2334–2360. [Google Scholar] [CrossRef]
  6. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef]
  7. Cui, M.; Zhang, G.; Wu, Q.; Ng, D.W.K. Robust Trajectory and Transmit Power Design for Secure UAV Communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef]
  8. Wang, D.; Bai, B.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 1878–1911. [Google Scholar] [CrossRef]
  9. Deng, H.; Wang, H.M.; Guo, W.; Wang, W. Secrecy Transmission With a Helper: To Relay or to Jam. IEEE Trans. Inf. Forensics Secur. 2015, 10, 293–307. [Google Scholar] [CrossRef]
  10. Li, A.; Wu, Q.; Zhang, R. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE Wirel. Commun. Lett. 2019, 8, 181–184. [Google Scholar] [CrossRef]
  11. Mamaghani, M.T.; Hong, Y. Joint Trajectory and Power Allocation Design for Secure Artificial Noise Aided UAV Communications. IEEE Trans. Veh. Technol. 2021, 70, 2850–2855. [Google Scholar] [CrossRef]
  12. Zhong, C.; Yao, J.; Xu, J. Secure UAV Communication With Cooperative Jamming and Trajectory Control. IEEE Commun. Lett. 2019, 23, 286–289. [Google Scholar] [CrossRef]
  13. Tang, J.; Chen, G.; Coon, J.P. Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3026–3041. [Google Scholar] [CrossRef]
  14. Cheng, T.; Wang, B.; Cao, K.; Dong, R.; Diao, D. IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping. IEEE Syst. J. 2022, 17, 3670–3681. [Google Scholar] [CrossRef]
  15. Amri, M.M.; Tran, N.M.; Park, J.H.; Kim, D.I.; Choi, K.W. Demo: Demonstration of reconfigurable intelligent surface (RIS)-assisted simultaneous wireless information and power transfer (SWIPT). In Proceedings of the 2022 IEEE International Conference on Communications Workshops (ICC Workshops), Seoul, Republic of Korea, 16–20 May 2022; pp. 1–2. [Google Scholar] [CrossRef]
  16. Liu, Y.; Liu, X.; Mu, X.; Hou, T.; Xu, J.; Di Renzo, M.; Al-Dhahir, N. Reconfigurable Intelligent Surfaces: Principles and Opportunities. IEEE Commun. Surv. Tutor. 2021, 23, 1546–1577. [Google Scholar] [CrossRef]
  17. Liaskos, C.; Nie, S.; Tsioliaridou, A.; Pitsillides, A.; Ioannidis, S.; Akyildiz, I. A New Wireless Communication Paradigm through Software-Controlled Metasurfaces. IEEE Commun. Mag. 2018, 56, 162–169. [Google Scholar] [CrossRef]
  18. Shen, A.; Luo, J.; Ning, J.; Li, Y.; Wang, Z.; Duo, B. Safeguarding UAV Networks against Active Eavesdropping: An Elevation Angle-Distance Trade-Off for Secrecy Enhancement. Drones 2023, 7, 109. [Google Scholar] [CrossRef]
  19. Wu, Q.; Zhang, R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef]
  20. Wu, Q.; Zhang, S.; Zheng, B.; You, C.; Zhang, R. Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial. IEEE Trans. Commun. 2021, 69, 3313–3351. [Google Scholar] [CrossRef]
  21. Fang, S.; Chen, G.; Li, Y. Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks. IEEE Wirel. Commun. Lett. 2021, 10, 276–280. [Google Scholar] [CrossRef]
  22. Ye, Z.; Su, G.; Chen, B.; Dai, M.; Lin, X.; Wang, H. Secrecy rate optimization for secure communication in IRS-Aided UAV systems. In Proceedings of the 2022 31st Wireless and Optical Communications Conference (WOCC), Shenzhen, China, 20–24 May 2022; pp. 6–11. [Google Scholar] [CrossRef]
  23. Pang, X.; Zhao, N.; Tang, J.; Niyato, D.; Wong, K.K. Joint trajectory and beamforming optimization for secure UAV transmission aded by IRS. In Proceedings of the 2021 13th International Conference on Wireless Communications and Signal Processing (WCSP), Virtual Conference, 20–22 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  24. Wang, H.M.; Zhang, X.; Jiang, J.C. UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions. IEEE Wirel. Commun. 2019, 26, 32–39. [Google Scholar] [CrossRef]
  25. Li, Z.; Chen, W.; Wu, Q.; Wang, K.; Li, J. Joint Beamforming Design and Power Splitting Optimization in IRS-Assisted SWIPT NOMA Networks. IEEE Trans. Wirel. Commun. 2022, 21, 2019–2033. [Google Scholar] [CrossRef]
  26. Duo, B.; Wu, Q.; Yuan, X.; Zhang, R. Energy Efficiency Maximization for Full-Duplex UAV Secrecy Communication. IEEE Trans. Veh. Technol. 2020, 69, 4590–4595. [Google Scholar] [CrossRef]
  27. Liu, G.; Yu, F.R.; Ji, H.; Leung, V.C.M.; Li, X. In-Band Full-Duplex Relaying: A Survey, Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2015, 17, 500–524. [Google Scholar] [CrossRef]
  28. Nguyen, T.T.; Hoang, V.T.; Le, T.T.H.; Tran, X.N. Physical layer security for UAV-based full-duplex relay NOMA system. In Proceedings of the 2022 International Conference on Advanced Technologies for Communications (ATC), Hanoi, Vietnam, 20–22 October 2022; pp. 395–400. [Google Scholar] [CrossRef]
  29. Tian, K.; Duo, B.; Li, S.; Zuo, Y.; Yuan, X. Hybrid Uplink and Downlink Transmissions for Full-Duplex UAV Communication with RIS. IEEE Wirel. Commun. Lett. 2022, 11, 866–870. [Google Scholar] [CrossRef]
  30. Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.L.; Bergstrom, M.; Euler, S.; Wang, Y.P.E. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef]
  31. Wei, Z.; Cai, Y.; Sun, Z.; Ng, D.W.K.; Yuan, J.; Zhou, M.; Sun, L. Sum-Rate Maximization for IRS-Assisted UAV OFDMA Communication Systems. IEEE Trans. Wirel. Commun. 2021, 20, 2530–2550. [Google Scholar] [CrossRef]
  32. Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
  33. Li, S.; Duo, B.; Renzo, M.D.; Tao, M.; Yuan, X. Robust Secure UAV Communications with the Aid of Reconfigurable Intelligent Surfaces. IEEE Trans. Wirel. Commun. 2021, 20, 6402–6417. [Google Scholar] [CrossRef]
  34. Grant, S.B.M. CVX: Matlab Software for Disciplined Convex Programming, Version 2.2. 2020. Available online: http://cvxr.com/cvx (accessed on 20 September 2021).
Figure 1. RIS-aided full-duplex UAV secure communication.
Figure 1. RIS-aided full-duplex UAV secure communication.
Drones 07 00591 g001
Figure 2. UAV trajectories with various benchmarks.
Figure 2. UAV trajectories with various benchmarks.
Drones 07 00591 g002
Figure 3. Max-min rate versus T with various benchmarks.
Figure 3. Max-min rate versus T with various benchmarks.
Drones 07 00591 g003
Figure 4. Max-min rate versus LIL (dBm) with various benchmarks.
Figure 4. Max-min rate versus LIL (dBm) with various benchmarks.
Drones 07 00591 g004
Figure 5. Max-min rate versus LIL (dBm) with various benchmarks.
Figure 5. Max-min rate versus LIL (dBm) with various benchmarks.
Drones 07 00591 g005
Figure 6. Jamming power of UAV versus LIL (dBm).
Figure 6. Jamming power of UAV versus LIL (dBm).
Drones 07 00591 g006
Table 1. List of major notations.
Table 1. List of major notations.
NotationDescription
MThe number of ground users
NThe number of RIS reflecting elements
s G Horizontal location of ground users
s E Horizontal location of the Eve
s R Horizontal location of the RIS
z R RIS placement height
t 0 , t F UAV initial and final horizontal locations
z U UAV flight altitude
V max Maximum speed of UAV
Ψ Highest UAV horizontal flight distance within each time slot
T , Ω The length of flight period, the number of time slots
δ t Each time slot’s duration
h ˜ 1 , h ˜ 2 , h ˜ 3 The random scattering component
λ The carrier wavelength
dThe distance of antenna separation
P G ¯ , P G max Ground user average and peak transmit power
P U ¯ , P U max UAV’s average and peak jamming power
κ D , κ R , κ L Corresponding path loss exponent
ϱ G , R , ϱ R , E The Rician factor of the G-R, R-E link
ρ The path loss at the reference distance
𝘍 Exponential distribution with unit mean accounting
σ 2 The additive white Gaussian noise power
σ RSI 2 The average loop interference level
Θ RIS diagonal phase shift matrix
θ n The n-th reflecting element’s phase shift
β i The binary variable of indicating whether user i is served by the UAV
( · ^ ) , ( · ) ˇ Maximum value, Minimum value
Table 2. Simulation parameters.
Table 2. Simulation parameters.
NotationPhysical MeaningSimulation Parameters
s G Horizontal location of ground users [ 55 , 15 ] T , [ 0 , 55 ] T , [ 40 , 20 ] T m
s E Horizontal location of the Eve [ 150 , 70 ] T m
s R Horizontal location of the RIS [ 0 , 0 ] T m
z R RIS’s placement height80 m
t 0 , t F UAV initial and final horizontal locations [ 200 , 40 ] T m, [ 200 , 40 ] T m
z U UAV flight altitude100 m
V max Maximum speed of UAV30 m/s
δ t Each time slot’s duration1 s
N = N x × N z Quantity of RIS’s reflecting elements N x = 20 , N z = 10
P G ¯ , P G max Ground user average and peak transmit power 0.1 W, 0.4 W
P U ¯ , P U max UAV average and peak jamming power 0.1 W, 0.4 W
κ D , κ R , κ L Corresponding path loss exponent1.1, 2.2, 3.3
ϱ G , R , ϱ R , E The Rician factor of the G-R, R-E link3 dB
ρ The path loss 20 dB
σ 2 The additive white Gaussian noise power 40 dBm
σ RSI 2 The average loop interference level 50 dBm
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lai, H.; Li, D.; Xu, F.; Wang, X.; Ning, J.; Hu, Y.; Duo, B. Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS. Drones 2023, 7, 591. https://doi.org/10.3390/drones7090591

AMA Style

Lai H, Li D, Xu F, Wang X, Ning J, Hu Y, Duo B. Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS. Drones. 2023; 7(9):591. https://doi.org/10.3390/drones7090591

Chicago/Turabian Style

Lai, Huan, Dongfen Li, Fang Xu, Xiao Wang, Jin Ning, Yanmei Hu, and Bin Duo. 2023. "Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS" Drones 7, no. 9: 591. https://doi.org/10.3390/drones7090591

APA Style

Lai, H., Li, D., Xu, F., Wang, X., Ning, J., Hu, Y., & Duo, B. (2023). Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS. Drones, 7(9), 591. https://doi.org/10.3390/drones7090591

Article Metrics

Back to TopTop