Next Article in Journal
UWB-Modulated Microwave Imaging for Human Brain Functional Monitoring
Next Article in Special Issue
A Left-Null-Space-Based Massive Access Method for Cell-Free Massive MIMO IoT Systems
Previous Article in Journal
A Novel Ranging and IMU-Based Method for Relative Positioning of Two-MAV Formation in GNSS-Denied Environments
Previous Article in Special Issue
A Miniaturized Full-Ground Dual-Band MIMO Spiral Button Wearable Antenna for 5G and Sub-6 GHz Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Capacity Enhancement in Active IRS-Assisted UAV Communication System

1
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Beijing Laboratory of Advanced Information Network, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(9), 4377; https://doi.org/10.3390/s23094377
Submission received: 9 March 2023 / Revised: 23 April 2023 / Accepted: 25 April 2023 / Published: 28 April 2023
(This article belongs to the Special Issue 6G Wireless Communication and Its Applications)

Abstract

:
As a new technology for reconstructing communication environments, intelligent reflecting surfaces (IRSs) can be applied to UAV communication systems. However, some challenges exist in IRS-assisted UAV communication system design, such as physical layer security issues, IRS design, and power consumption issues owing to the limitation of the hardware. Therefore, a secrecy capacity optimization scheme for an active IRS-assisted unmanned aerial vehicle (UAV) communication system is proposed to solve multi-user security issues. In particular, controllable power amplifiers are integrated into reflecting units to solve the problem of blocked links, and the UAV can dynamically select the served user according to the channel quality. In order to maximize the system average achievable secrecy capacity and ensure the power constraints of the UAV and active IRS, user scheduling, UAV trajectory, beamforming vector, and reflection matrix are jointly optimized, and the block coordinate descent (BCD) algorithm is applied to solve this non-convex problem. Simulation results show that the active IRS-assisted UAV communication scheme can significantly weaken the “multiplicative fading” effect and enhance the system secrecy capacity by 55.4% and 11.9% compared with the schemes with passive IRS and without optimal trajectory, respectively.

1. Introduction

In wireless communication systems, electromagnetic waves experience different kinds of unpredictable changes in propagating environments, which is difficult to explain and is always considered to be probabilistic. Due to obstacles in the propagation environment, especially in urban areas, the signals will not only be affected by free-space path loss but also be reflected, refracted and scattered, and so on, which will eventually result in significant effects on wireless communication performance. Thus, the controlled meta-surfaces technique is invented to programmatically control the behavior of wireless environments [1]. Meanwhile, it has been proved that programmable meta-surfaces can reshape the amplitude and phase of electromagnetic waves efficiently in real time thanks to the concept of intelligent reflecting surfaces (IRSs) [2]. However, traditional passive IRSs can only achieve negligible gains due to the “multiplicative fading” effect [3].
Unmanned aerial vehicles (UAVs) can effectively improve wireless networks’ throughput by making full use of the benefits of line-of-sight (LoS) link transmission and flight flexibility. Moreover, it is anticipated to be a key component of fifth-generation mobile networks to meet the requirement of special scenarios and ubiquitous access [4]. However, in complicated wireless propagation environments, especially in urban areas, the LoS links tend to experience severe deterioration due to the blockage of dense buildings and trees [5]. Fortunately, these challenges can be overcome by deploying IRS in the system since large-scale IRS reflecting elements can jointly beamform the signals in a desired direction by adjusting the IRSs parameters [6,7,8].
In addition, the channel response of the legitimate users and the eavesdropper is strongly correlated with the increasing number of access users, which brings a severe physical layer security problem. Saba et al. [9] investigated the secrecy rate in IRS-assisted multi-user multiple-input multiple-output (MIMO) systems and proposed two low-complexity iterative algorithms, namely two-tier and single-loop forms. Zhang et al. [10] studied the energy effectiveness of an active IRS-aided multiple-input single-output (MISO) secure system, assessed the system’s energy cost quantitatively, and developed a joint optimization strategy to reduce the energy cost while adhering to the secrecy rate limitation.
Integrating IRS technology into UAV-enabled communication systems can provide intelligent compensation for path loss, reduce interference and build energy-efficient, secure, and robust air-to-ground communications [11]. Saxena et al. [12] investigated the effects of jamming caused by a malicious UAV on the performance of a free-space optical communication system, where a legitimate UAV served as a relay and an IRS was designed to improve the quality of received signals and enlarge the coverage. The overall average bit error rate and outage probability with non-Gaussian additive noise were derived and analyzed. Han et al. [13] proposed a UAV-empowered IRS-backscatter communications network, where a passive IRS acts as the backscatter device and uses the received signals for backscatter communications to guarantee secure transmission. Tang et al. [14] presented an anti-eavesdropping communication scheme to exploit aerial active reflecting and jamming to enhance wireless security in the presence of channel uncertainties at the eavesdroppers. Specifically, a robust optimization approach was employed to tackle the reflecting and jamming designing problem, and the aerial deployment was obtained through deep reinforcement learning (DRL). To increase the secrecy capacity, Pang et al. [15] considered secure transmission issues in IRS-assisted UAV communications by joint optimization of UAV trajectory, beamforming vector, reflecting matrix, etc. However, this research work only took the single-user service case into account, but not for multiple users. In [16], a secure IRS-assisted UAV wireless communication system based on multiple users was proposed. The passive beamforming, ground user association, UAV flight trajectory, and transmit power were jointly optimized to maximize the minimum average secrecy rate of ground users. However, the deployment of passive IRS limited the system security performance improvement.
Additionally, investigations in [6,17] illustrated that UAV-mounted IRS can achieve superior performance and flexibility compared to traditional fixed IRS. A downlink multi-user MISO flying IRS system model was considered in [18]. Additionally, a DRL algorithm named FlyReflect was proposed to jointly optimize the flying trajectory and IRS phase-shift matrix. Truong et al. formulated an optimization problem to maximize the achievable system sum rate by jointly optimizing the flight trajectory and phase-shift matrix of the IRS, and a DRL method was applied to solve it. Nguyen et al. [19] proposed an approach of low complexity for extending network coverage in a massive MIMO communication network, where multiple UAV-mounted IRSs were deployed. Moreover, a DRL method is adopted to jointly optimize the power coefficients and the phase shifts of the multiple IRSs. However, attaching IRSs to the UAV will increase the energy consumption of the UAV. Considering a large reflecting surface, the vibration and wind resistance of the UAV cannot be neglected.
To overcome the “multiplicative fading” effect introduced by passive IRSs, the power amplifier can be integrated into its reflecting units to amplify the reflected signals [20]. Zhang et al. [21] analyzed the performance of active IRSs and demonstrated the effectiveness of active IRSs for the first time. However, the current fully connected architecture of the active IRS consumes additional power, since there are abundant integrated power amplifiers. In contrast to the fully connected architecture, Liu et al. [22] presented a sub-connected architecture in which several units share a single power amplifier and individually regulate their phase shift, considerably reducing the number of power amplifiers, and the new architecture can achieve improved energy efficiency. In [23], a low-complexity approximated joint precoding algorithm based on alternating optimization was proposed to optimize the beamforming and active reflector matrix, which further demonstrated the practicability of active intelligent reflection in secure transmission. However, the amplification of noise by its active IRS was neglected, which makes the optimal solution inconsistent with the actual solution. Nguyen et al. [24] considered a novel hybrid active/passive IRS-assisted UAV communications system. The hybrid IRS was equipped with a few active elements, which not only reflect but also amplify the incident signals for significant performance improvement. To maximize the minimum rate among users, the location, and power allocation of the UAV and the IRS reflecting/amplifying coefficients were jointly optimized. The application of hybrid IRS enables improved system performance without additional power consumption. For better comparison, the crucial parameters and optimization methods of reviewed works [13,14,15,16,23,24] are provided in Table 1.
In general, there has been a fair amount of study on IRS-assisted UAV secure communication systems, but rare studies have considered both active IRS adjustment and multi-user services at the same time. The authors of [14,24] only discuss the location of UAVs, without considering the impact of UAV trajectory on the communication environment. In addition, few works have considered both the use of active IRSs and relevant energy constraints. Therefore, an active IRS-assisted UAV multi-user communication system is established, where multiple users are deployed on the ground and time division multiple access (TDMA) is applied as an access scheme to the network. Specifically, in urban scenarios with dense buildings and trees, where the LoS links between the UAV and ground users are often blocked, we deploy active IRS on building surfaces to enhance system security. With the objective of maximizing the average secrecy capacity, which can be represented by the average secrecy rate, user scheduling, UAV trajectory, multi-antenna beamforming, and the amplitude and phase of IRS are jointly optimized. The main contributions of this paper are summarized as follows:
  • We present an IRS-assisted UAV multi-user communication system model, where the UAV can dynamically select the best user for service within each time slot according to its channel conditions. Considering the presence of passive eavesdroppers and the LoS link being blocked between the UAV and legitimate users, the user scheduling, UAV trajectory, beamforming vector, and the reflecting matrix of IRS are jointly optimized to maximize the average achievable secrecy capacity during the flight.
  • The formulated non-convex optimization problem is first divided into four sub-problems. However, the sub-problems are still challenging to solve due to fractional and non-convex objectives. Hence, successive convex approximation (SCA) technology is applied in this paper to transform the trajectory optimization sub-problem into a convex form. Furthermore, the sub-problems of beam design and IRS control are transformed into a convex problem by applying the Charnes–Cooper transformation (CCT) method and the majorization-minimization (MM) algorithm, respectively. In order to tackle the aforementioned sub-problems and obtain the sub-optimal solution, we finally introduce the block coordinate descent (BCD) approach.
  • Simulation results validate the effectiveness of the proposed scheme and show that the secrecy capacity increased compared with the schemes with passive IRS and without optimal trajectory, respectively. It is shown that the active IRS-aided UAV scheme is efficient in reducing the impact of the “multiplicative fading” effect in secure communication systems.

2. System Model

Figure 1 depicts a model of an active IRS-assisted UAV secure communication system. The UAV serves multiple users as a mobile base station, but a passive eavesdropper exists in the environment at the same time. In addition, we assume that the UAV can access the position of both legitimate users and eavesdroppers based on infrared detection. For clarity, the utilized notations are summarized in Table 2.

2.1. Channel Model

A three-dimensional Cartesian coordinate system is established, J ground legitimate users and a single passive eavesdropper are distributed in a stationary area. Let the horizontal coordinate of the j-th legitimate user B j and active IRS be w B j = [ x B j , y B j ] and w I = [ x I , y I ] , respectively. Based on infrared detection, the UAV can obtain the eavesdropper’s location w E = [ x E , y E ] . This paper adopts the access mode of TDMA and the full cycle time T is discretized into N equal time slots, i.e., T = N δ , where δ is the length of the unit time slot and multiple legitimate users will occupy different time slots. Since the time slot is small enough, the position of the UAV can be considered unchanged [25]. In addition, it is assumed that IRS has a fixed height H I and the UAV’s flight height is fixed at H U . The horizontal position of the UAV in the n-th time slot can be stated as q [ n ] = [ x u [ n ] ,   y u [ n ] ] T , n N = { 1 ,   ,   N } . Then, the following constraints need to be satisfied.
q [ n + 1 ] q [ n ] V m a x δ ,   1 n N 1 ,
q [ 1 ] = q I ,
q [ N ] = q F ,
where the constraints in (1) state that the maximum flight rate V max of the UAV restricts the maximum movement of the UAV in δ . The UAV flies with the predetermined initial position q I and final position q F . Moreover, the UAV’s vibration can be disregarded because of its small size.
The active IRS is equipped with a uniform plane array (UPA) of K reflecting elements, a controller intelligently changing the phase shift and amplification of each element, while the UAV is equipped with M antennas and both legitimate users and eavesdropper are equipped with a single omnidirectional antenna. Let the phase-shift matrix Θ [ n ] = d i a g { e j θ 1 [ n ] , , e j θ K [ n ] } , where θ k [ n ] [ 0 , 2 π )   ,   k K = { 1 , , K } . The enhanced signal by the active IRS can be expressed as:
y = P Θ x desired   signal   + P Θ v d y n a m i c   noise + n s s t a t i c   noise ,
where x is the transmitted signal and P = d i a g ( p 1 , , p K ) denotes the amplification factor matrix. Thanks to the integrated reflection-type amplifier, each element p k can be larger than one but not larger than η k . It can be seen from (4) that the reflector amplifies not only the useful signal x but also the noise v , it will bring new static noise n s . Considering that P Θ always appears in a coupled fashion, let ψ = P Θ = [ p 1 e j θ 1 , , p K e j θ K ] H , Ψ = d i a g ( ψ ) . Assuming the UAV serves only one user in a time slot, α j [ n ] = 1 indicates that B j is served in the n-th time slot, otherwise α j [ n ] = 0 , we can obtain the following constraints:
α j   [ n ] { 0 , 1 } , n , j ,
j = 1 J α j [ n ] 1 , n , 1 j J .
We assume that the channel quality predominantly depends on the UAV–IRS distance since the air-to-ground communication channels are mainly dominated by the LoS links [26]. Particularly, it is presumed that the receivers will properly compensate for the Doppler effect brought on by the UAV’s motion [27]. Unlike a uniform linear array (ULA) at the UAV, we utilize a UPA at the IRS in this paper. Additionally, the active IRS consists of N = N y × N z elements and UAV is equipped with M antennas. The total array response of the corresponding channel can be seen as the product of the array response of receivers and that of the transmitter [28]. Therefore, the channel modeling is characterized as the product channels [7].
H U I [ n ] = ρ 0 d U I 2 [ n ] p a t h   l o s s a N H ( θ AoA [ n ] , η AoA [ n ] ) a M ( γ AoD [ n ] ) a r r a y   r e s p o n s e
a N ( θ , η ) = [ 1 , , e j 2 π d 0 λ ( ( n 1 1 ) cos ( η ) sin ( θ ) + ( n 2 1 ) sin ( η ) ) , , e j 2 π d 0 λ ( ( N y 1 ) cos ( η ) sin ( θ ) + ( N z 1 ) sin ( η ) ) ]
a M ( γ ) = [ 1 , e j 2 π d λ sin γ , , e j 2 π d λ ( M 1 ) sin γ ] ,
where ρ 0 denotes the channel gain at the reference distance D 0 = 1 m , assuming the path loss exponent related to the U I link is 2, d U I [ n ] = q [ n ] w I 2 + ( H U H I ) 2 denotes the distance between the UAV and the active IRS in the n-th time slot, a N ( θ , η ) and a M ( γ ) are the array responses of IRS and transmitter of UAV, λ is the wavelength, d is the antenna separation, and d 0 is the separation of elements at the IRS. θ AoA [ n ] and η AoA [ n ] represent the azimuth and elevation angle of arrival (AoA) of the signal from the UAV to the IRS in the n-th time slot, respectively. Additionally, γ AoA [ n ] denotes the angle of departure (AoD) associated with the UAV in the n-th time slot.
In contrast to H U I [ n ] , the channel from IRS to the legitimate users and eavesdropper contains both the LoS component and the non-LoS (NLoS) component. Therefore, the Rician fading channel model [3,7,13] is adopted, the channel gain h I B j [ n ] can be expressed as
h I B j [ n ] = ρ 0 d I B j α [ n ] ( κ 1 + κ h I B j LoS + 1 κ + 1 h I B j NLoS [ n ] ) ,
where α is the path loss exponent corresponding to the I B j link, d I B j = w I w B j 2 + H I 2 denotes the distance between the active IRS and B j , and κ is the Rician factor. The LoS component can be calculated as h I B j LoS = a N H ( θ AoD , η AoD ) and the NLoS component h I B j NLoS [ n ] is the random scattering component independently modeled by a zero mean and a unit-variance circularly symmetric complex Gaussian (CSCG) random variable. h I E [ n ] can be modeled in the same way.
In actual implementations, copious obstructions in the complicated urban environment may hinder the LoS path of the UAV to the user, while the wireless channel is still replete with extensive scatters [29]. The channel coefficients of U B j / E link are given by
h U B j [ n ] = ρ 0 d U B j β [ n ] h ˜ [ n ] ,
h U E [ n ] = ρ 0 d U E β [ n ] h ˜ [ n ] ,
where β is the path loss exponent of U B j / E V E link, d U B j [ n ] = q [ n ] w B j 2 + H U 2 and d U E [ n ] = q [ n ] w E 2 + H U 2 denotes the distance from the UAV to the served user and passive eavesdropper, respectively. h ˜ [ n ] is modeled as a CSCG distribution with zero mean and unit variance.

2.2. Secrecy Capacity Model

The received signal of the legitimate user B j and the eavesdropper in the n-th time slot can be given as follows, respectively.
y B j [ n ] = ( h U B j [ n ] + h I B j H [ n ] Ψ [ n ] H U I [ n ] ) w [ n ] x [ n ] + h I B Ψ n I + n B j ,
y E [ n ] = ( h U E [ n ] + h I E H [ n ] Ψ [ n ] H U I [ n ] ) w [ n ] x [ n ] + h I E Ψ n I + n E ,
where x [ n ] is the transmitted signal; w [ n ] M × 1 denotes the beamforming vector at the UAV; n I ~ C N ( 0 , σ I 2 ) , n B ~ C N ( 0 , σ B 2 ) , and n E ~ C N ( 0 , σ E 2 ) , respectively, represent the noise introduced by IRS, user B j , and eavesdropper; σ I 2 , σ B 2 , and σ E 2 represent the noise power. The SINR of the legitimate user B j and the eavesdropper in the n-th time slot, respectively, are given as:
γ B j [ n ] = | ( h U B j [ n ] + h I B j H [ n ] Ψ [ n ] H U I [ n ] ) w [ n ] | 2 σ B 2 + h I B j H [ n ] Ψ [ n ] 2 σ I 2 ,
γ E [ n ] = | ( h U E j [ n ] + h I E H [ n ] Ψ [ n ] H U I [ n ] ) w [ n ] | 2 σ E 2 + h I E H [ n ] Ψ [ n ] 2 σ I 2 ,
The static noise n s introduced by the IRS in (4) is independent of Ψ and relatively small, and can be omitted. Hereto, the system’s average secrecy capacity during flight time can be described as
R sec = 1 N n = 1 N [ ( j = 1 J α j [ n ] R B j [ n ] ) R E [ n ] ] + ,
where R B j [ n ] = log 2 ( 1 + γ B j [ n ] ) , R E [ n ] = log 2 ( 1 + γ E [ n ] ) , [ x ] + = max ( x , 0 ) .

2.3. Power Consumption Model

Assuming the UAV flies at a constant power P f l y , and the total power consumption of UAV in the n-th time slot is expressed as follows:
P U A V [ n ] = ξ w [ n ] 2 + P f l y ,
where ξ is the reciprocal of the energy conversion coefficient at the transmitter of the UAV. The maximum transmitting power of the UAV at any time slot during the flight cycle shall not exceed the upper limit of the transmitting power of the antenna P U .
P U A V [ n ] P U , n ,
The active IRS amplifies not only useful signals but also useless ones, thus the total energy consumption of the active IRS in the n-th time slot is expressed as
P I R S [ n ] = ζ ( Ψ [ n ] H U I [ n ] w [ n ] 2 + Ψ [ n ] 2 σ I 2 ) + N P i r s + L P a m p ,
where ζ is the reciprocal of the energy conversion coefficient at the transmitter of the active IRS. P i r s and P a m p constitute the hardware static power of the active IRS, which corresponds to the phase shift and amplifier, respectively. The fully connected architecture is adopted in the active IRS, i.e., L = K . Specifically, P I R S [ n ] must not exceed the upper limit of the active IRS P A , i.e.,
P I R S [ n ] P A , n .

2.4. Problem Description

We aim to maximize the average secrecy capacity for legitimate users by jointly designing the user scheduling S = { α j [ n ] , n = 1 , , N , j = 1 , 2 J } , the UAV trajectory Q = { q [ n ] , n = 1 , , N } , the reflecting matrix of the active IRS Ψ = { Ψ [ n ] , n = 1 , , N } , and the active beamforming vector W = { w [ n ] , n = 1 , N } . We also consider the mobility constraints, the power constraints of the active IRS and UAV, and the maximum magnification limit of amplifiers.
The optimization problem (P1) is formulated as
( P 1 ) : m a x S , Q , W , Ψ R s e c = 1 N n = 1 N [ ( j = 1 J α j [ n ] R B j [ n ] ) R E [ n ] ] +
α j [ n ] { 0 , 1 } , n , j ,
j = 1 J α j [ n ] 1 , n , 1 j J ,
P U A V [ n ] P U , n ,
P I R S [ n ] P A , n ,
| Ψ [ k , k ] | η k , n , k ,
q [ 1 ] = q I ,
q [ N ] = q F ,
q [ n + 1 ] q [ n ]   V m a x δ ,   1 n N 1 ,
where η k denotes the maximum magnification at the k-th reflecting element. The optimization problem ( P 1 ) is a non-convex problem and there is a tight coupling among the optimization variables W , Ψ , and Q . In addition, the power constraint and maximum amplification of the IRS should be considered while optimizing the phase factor and amplification factor of the IRS. The channel of the auxiliary communication system of the active IRS is the sum of a direct link and cascade channel, and the active IRS will introduce extra noise. Moreover, the objective function is the difference between the two rates and makes the objective function difficult to solve.

3. Joint Optimization Algorithm

Note that if the value of R sec is negative in the n-th time slot, we can control the transmit beamforming vector w [ n ] = 0 , resulting in R sec = 0 . Thus, by modifying the beamforming vector, we can ensure that the secrecy capacity is never negative. In this case, it is possible to omit the operator [   ·   ] + without affecting the result. Even so, the objective function of the original problem is non-convex and contains non-convex constraints, making it challenging to solve. Considering the coupling relationship among variables, the BCD algorithm is applied to decompose the original problem into four sub-problems: user scheduling, trajectory optimization, beamforming design, and active IRS control. For the first sub-problem, we choose the best user by comparing the overall channel conditions. The locally optimal trajectory solution can be obtained in the second sub-problem. In the beamforming design problem, the variables about beamforming always exist in quadratic terms. We first converted the problem by the semidefinite relaxation (SDR) algorithm and solved the fractional programming problem after transformation by CCT. Similarly, in the IRS designing problem, the SDR algorithm is applied first and the MM algorithm is used to relax the transformed non-convex objective function. The flow chart of the joint optimization algorithm is shown in Figure 2.

3.1. User Scheduling Optimization

For the given UAV trajectory Q , beamforming vector W , and reflecting matrix Ψ , the transmission rate of eavesdroppers is settled. Thus, the average secrecy capacity is dependent entirely on the downlink rate of legitimate users. The problem (P1) can be rewritten by
( P 2 ) : m a x S R s e c = 1 N n = 1 N j = 1 J α j [ n ] R B j [ n ]
( 22 b ) ,   ( 22 c ) .
By finding max ( R B c [ n ] ) and setting the corresponding scheduling α c [ n ] = 1 , the rest α j [ n ] = 0 , j c , then the optimal scheduling can be expressed as
{ α c [ n ] = 1 α c [ n ] R B c [ n ] = max ( α j [ n ] R B j ) j J α j [ n ] = 0 j c .

3.2. Trajectory Optimization

With given user scheduling S , beamforming vector W , and reflecting matrix Ψ , the trajectory optimization sub-problem can be formulated as
( P 3 ) : m a x Q R s e c = 1 N n = 1 N { ( j = 1 J α j [ n ] R B j [ n ] ) R E [ n ] }
( 1 ) , ( 2 ) ,   ( 3 ) ,   ( 21 )
Based on Jensen’s inequality, R E [ n ] can be formulated by
R E [ n ] = E [ l o g 2 ( 1 + ε E [ n ] | ( h U E [ n ] + h I E H [ n ] Ψ [ n ] H U I [ n ] ) | 2 ) ]
l o g 2 ( 1 + ε E [ n ] E [ | ( h U E [ n ] + h I E H [ n ] Ψ [ n ] H U I [ n ] ) | 2 ] ) =
l o g 2 ( 1 + ε E [ n ] ( h U E [ n ] 2 + | h I E H [ n ] Ψ [ n ] H U I [ n ] | 2 ) ) = R ^ E [ n ] .
Considering that W , S , and Ψ are fixed, let A 1 = ρ 0 | h ˜ [ n ] | ,   A 2 [ n ] = ρ 0 | h I B j [ n ] Ψ [ n ] H ˜ U I [ n ] | , A 3 [ n ] = ρ 0 | h I E [ n ] Ψ [ n ] H ˜ U I [ n ] | , H ˜ U I [ n ] = a N H ( θ AoA [ n ] , η AoA [ n ] ) a M ( γ AoD [ n ] ) , ε B j [ n ] = | w [ n ] | 2 h I B j H [ n ] Ψ [ n ] 2 σ I 2 + σ B 2 , ε E [ n ] = w [ n ] 2 h I B j H [ n ] Ψ [ n ] 2 σ I 2 + σ E 2 ,   n .
Then, the simplified transmission rate of them can be expressed as
R B j [ n ] = l o g 2 ( 1 + ε B j [ n ] ( A 1 2 d U B j β [ n ] + A 2 2 [ n ] d U I 2 [ n ] + 2 A 1 A 2 [ n ] d U B j β 2 d U I [ n ] ) ) ,
R ^ E [ n ] = l o g 2 ( 1 + ε E [ n ] ( A 1 2 d U E β [ n ] + A 3 2 [ n ] d U I 2 [ n ] ) ) .
However, it is difficult to deal with (27) and (28) optimally due to their non-convexity. We introduce slack variables ν [ n ] = d U B j [ n ] , ν = { ν [ n ] , n } , and ω [ n ] = d U I [ n ] , ω = { ω [ n ] , n } . Provided that R ^ E [ n ] is always negative, which is hard to solve, we introduce slack variables ζ [ n ] ,   μ t [ n ] ( t = 1 ,   2 ) , the constraints can be expressed as
ζ [ n ] l o g 2 ( 1 + A 1 2 ε E [ n ] e μ 1 [ n ] + A 3 2 [ n ] ε E [ n ] e μ 2 [ n ] ) ,   ζ = { ζ [ n ] , n } ,
e μ 1 [ n ] q [ n ] w E 2 + H U 2 ,   μ 1 = { μ 1 [ n ] , n } ,
e μ 2 [ n ] q [ n ] w I 2 + ( H U H I ) 2 ,   μ 2 = { μ 2 [ n ] , n } .
Then, R B j [ n ] can be reformulated as follows:
R B j [ n ] = l o g 2 ( 1 + ε B j [ n ] ( A 1 2 ν β [ n ] + A 2 2 [ n ] ω 2 [ n ] + 2 A 1 A 2 [ n ] ν β 2 [ n ] ω [ n ] ) ) .
The original sub-problem can be written as
( P 3.1 ) : m a x Q , μ 1 , μ 2 , ν , ω , ζ 1 N n = 1 N ( j = 1 J α j [ n ] R B j [ n ] ζ [ n ] )
d U B j [ n ] ν [ n ] , n ,
d U I [ n ] ω [ n ] , n ,
( 29 ) ,   ( 30 ) , ( 31 ) ,
which is still non-convex as R B j [ n ] is still concave with respect to { ν k [ n ] , n } and { ω k [ n ] , n } . The SCA technique is applied to relax the aforementioned issues to its global lower-bound. The first-order Taylor expansion of (32) can be used to approximate it at the supplied local points { ν k [ n ] , n } and { ω k [ n ] , n } can be given by
R B j * [ n ] R B j l b [ n ] = l o g 2 G 1 [ n ] + G 2 [ n ] G 1 [ n ] ln 2 ( ν [ n ] ν k [ n ] )   + G 3 [ n ] G 1 [ n ] ln 2 ( ω [ n ] ω k [ n ] ) ,
G 1 [ n ] = 1 + ε B j [ n ] ( A 1 2 ν k β [ n ] + A 2 2 [ n ] ω k 2 [ n ] + 2 A 1 A 2 [ n ] ν k β 2 [ n ] ω k [ n ] ) ,
G 2 [ n ] = ε B j [ n ] ( A 1 2 ν k β + 1 [ n ] + A 1 A 2 [ n ] ν k β 2 + 1 [ n ] ω k [ n ] ) ,
G 3 [ n ] = ε B j [ n ] ( A 2 2 [ n ] ω k 3 [ n ] + A 1 A 2 [ n ] ν k β 2 [ n ] ω k 2 [ n ] ) .
Moreover, the constraints (33b) and (33c) are convex with respect to { ν k [ n ] , n } and { ω k [ n ] , n } , and the right parts in (30) and (31) are convex with respect to q [ n ] , and can also be relaxed to its lower-bound by the first-order Taylor expansion, which can be given by
v 2 [ n ] 2 ν k [ n ] ν [ n ] ν k 2 [ n ] , n ,
ω 2 [ n ] 2 ω k [ n ] ω [ n ] ω k 2 [ n ] , n
u 1 * [ n ] q k [ n ] w E 2 + H U 2 + 2 ( q k [ n ] w E ) T ( q [ n ] q k [ n ] ) , n ,
u 2 * [ n ] q k [ n ] w I 2 + H U 2 + 2 ( q k [ n ] w I ) T ( q [ n ] q k [ n ] ) , n .
Bringing them to (33b), (33c), (30), and (31), respectively, the problem ( P 3.1 ) can be approximated as
( P 3.2 ) : m a x Q , μ 1 , μ 2 , ν , ω , ζ 1 N n = 1 N ( j = 1 J α j [ n ] R B j * [ n ] ζ [ n ] )
d U B j 2 [ n ] + ν k 2 [ n ] 2 ν k [ n ] ν [ n ] 0 ,   n ,
d U I 2 [ n ] + ω k 2 [ n ] 2 ω k [ n ] ω [ n ] 0 ,   n ,
e μ 1 [ n ] u 1 * [ n ] ,   n ,
e μ 2 [ n ] u 2 * [ n ] ,   n ,
( 1 ) , ( 2 ) ,   ( 3 ) ,   ( 21 ) , ( 29 ) .
Thus far, ( P 3.2 ) is a standard convex problem that can be solved with the CVX tool.

3.3. Beamforming Optimization

Given user scheduling S , UAV trajectory Q , and reflecting matrix Ψ , the beamforming design sub-problem can be expressed as
( P 4 ) : m a x W R s e c = 1 N n = 1 N ( j = 1 J α j [ n ] R B j [ n ] R E [ n ] )
( 19 ) , ( 21 ) .
Since the cascaded channel of the problem is extremely complex and the fixed power consumption in the constraint is known, the fixed parts can be given by (44)–(49):
P ˜ U [ n ] = 1 ξ ( P U [ n ] P f l y ) , n ,
P ˜ A [ n ] = 1 ζ ( P A [ n ] N P i r s L P a m p ) Ψ [ n ] 2 σ I 2 , n ,
h ˜ B [ n ] = h B [ n ] σ B 2 + h I B j H [ n ] Ψ [ n ] 2 σ I 2 , n ,
h ˜ E [ n ] = h E [ n ] σ E 2 + h I E H [ n ] Ψ [ n ] 2 σ I 2 , n ,
h B [ n ] = h U B j [ n ] + h I B j H [ n ] Ψ [ n ] H U I [ n ] , n ,
h E [ n ] = h U E [ n ] + h I E H [ n ] Ψ [ n ] H U I [ n ] , n .
Since the log formula is monotonous, the solution of the original problem will not be changed by omitting it, then the original sub-problem can be expressed as
( P 4.1 ) : m a x W 1 N n = 1 N ( ( 1 + | h ˜ B [ n ] w [ n ] | 2 ) ( 1 + | h ˜ E [ n ] w [ n ] | 2 ) 1 )
w [ n ] 2 P ˜ U [ n ] , n ,
Ψ [ n ] H U R [ n ] w [ n ] 2 P ˜ A [ n ] , n .
( P 4.1 ) is testing due to the non-convex objective function. Inspired by the SDR technique, let Y [ n ] = w [ n ] w H [ n ] , Y = { Y [ n ] , n } , the original sub-problem can be transferred to a relaxed one:
( P 4.2 ) : m a x Y 1 N n = 1 N ( ( 1 + h ˜ B [ n ] Y [ n ] h ˜ B H [ n ] ) ( 1 + h ˜ E [ n ] Y [ n ] h ˜ E H [ n ] ) 1 )
Y [ n ] 0 , n ,
t r ( Y [ n ] ) P ˜ U [ n ] , n ,
t r ( Ψ [ n ] H U I [ n ] Y [ n ] H U I H [ n ] Ψ [ n ] H ) P ˜ A [ n ] , n ,
which is a standard fractional programming problem. By applying the CCT method [30], the above problem can be converted to
( P 4.3 ) : m a x Y ˜ , t     1 N n = 1 N ( t [ n ] + h ˜ B [ n ] Y ˜ [ n ] h ˜ B H [ n ] )
t r ( Y ˜ [ n ] ) t [ n ] P ˜ U [ n ] , n ,
t r ( Ψ [ n ] H U I [ n ] Y ˜ [ n ] H U I H [ n ] Ψ [ n ] H ) t [ n ] P ˜ A [ n ] , n ,
h ˜ E [ n ] Y ˜ [ n ] h ˜ E H [ n ] + t [ n ] = 1 , n ,
t [ n ] 0 , n ,
Y ˜ [ n ] 0 , n ,
where Y ˜ [ n ] = t [ n ] Y [ n ] , Y ˜ = { Y ˜ [ n ] , n } , t [ n ] = 1 / ( 1 + h ˜ E [ n ] Y h ˜ E H [ n ] ) , and t = { t [ n ] , n } , ( P 4.3 ) can be properly optimized via the CVX tool. However, r a n k ( Y [ n ] ) = 1 may not be satisfied, so the original w [ n ] cannot be recovered. Specifically, the rank-1 constraint can be equivalently expressed as t r ( Y ˜ [ n ] ) λ m a x ( Y ˜ [ n ] ) 0 , where λ max ( X ) is the largest eigenvalue of X , t r ( X ) represents the eigenvector corresponding to the largest eigenvalue of X . By constructing the penalty function, the objective function of this sub-problem is converted as follows:
1 N n = 1 N ( ( t [ n ] + h ˜ B [ n ] Y ˜ [ n ] h ˜ B H [ n ] ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ) λ m a x ( Y ˜ [ n ] ) ) ) .
When Λ w [ n ] is large enough, we have t r ( Y ˜ [ n ] ) λ m a x ( Y ˜ [ n ] ) 0 , then the rank-1 constraint can be satisfied. However, ( 53 ) is still concave, and λ m a x ( Y ˜ [ n ] ) is not differentiable. We can apply the sub-gradient of λ m a x ( Y ˜ [ n ] ) as u m a x ( Y ˜ [ n ] ( r ) ) H u m a x ( Y ˜ [ n ] ( r ) ) , where u m a x ( X ) is the eigenvector corresponding to the largest eigenvalue of X . Therefore, given a feasible solution Y ˜ [ n ] ( r ) for ( P 4.3 ) in the r-th iteration, we get the improved expression as
( P 4.4 ) : m i n Y ˜ , t   1 N n = 1 N ( ( t [ n ] + h ˜ B [ n ] Y ˜ [ n ] h ˜ B H [ n ] ) ) + 1 N n = 1 N ( Λ w [ n ] ( t r ( Y ˜ [ n ] ) u m a x ( Y ˜ [ n ] ( r ) ) H Y ˜ [ n ] u m a x ( Y ˜ [ n ] ( r ) ) ) )
( 52 b ) ,   ( 52 c ) , ( 52 d ) , ( 52 e ) , ( 52 f ) .
Problem ( P 4.4 ) can be properly optimized through the CVX solver. Given S , Q , and Ψ , the log function in ( P 4 ) can be omitted because of its monotonicity. In objective functions and constraints, the variable W always appears in quadratic form. Adopting the SDR algorithm, the problem is transformed by constructing Y [ n ] = w [ n ] w H [ n ] and the CCT method is used to solve the fractional programming problem ( P 4.2 ) . It is worth noting that the rank-one constraint is introduced into SDR, so the penalty Λ w is constructed to recover the original variable as much as possible. The logic of the penalty-based recovery rank-1 algorithm is shown in Algorithm 1. By iteratively solving problem ( P 4.4 ) optimally, we can monotonically tighten the upper bound of (53). Penalty Λ w is updated to guarantee the rank-one constraint.
Algorithm 1 Beamforming Design Algorithm for Problem (P4).
(1): Initialization: maximum threshold ϵ 1 ,   ϵ 2 > 0 penalty Λ w = 10 feasible point Y ˜ [ n ] ( 0 ) , t ( 0 ) , and number of iterations r   =   0 .
(2): Calculate | t r ( Y ˜ [ n ] ( r ) ) λ m a x ( Y ˜ [ n ] ( r ) ) | . If | t r ( Y ˜ [ n ] ( r ) ) λ m a x ( Y ˜ [ n ] ( r ) ) | < ϵ 1 , then the algorithm converges, go to step (5), else go to step (3).
(3): Optimize Y ˜ [ n ] ( r + 1 ) and t ( r + 1 ) in ( P 4.4 ) , with given u m a x ( Y ˜ [ n ] ( r ) ) .
(4): Calculate | Y ˜ [ n ] ( r + 1 ) Y ˜ [ n ] ( r ) | . If | Y ˜ [ n ] ( r + 1 ) Y ˜ [ n ] ( r ) | < ϵ 2 , set Λ w = Λ w + 10 go to step (3), else set Y ˜ [ n ] ( r ) = Y ˜ [ n ] ( r + 1 ) , r = r + 1 and go to step (2).
(5): update Y [ n ] ( r ) = Y ˜ [ n ] ( r ) / t ( r ) as the optimal solution of ( P 4 ) .

3.4. Active IRS Optimization

For given user scheduling S , UAV trajectory Q , and beamforming vector W , the sub-problem of optimizing Ψ can be expressed as
( P 5 ) : m a x Ψ R s e c = 1 N n = 1 N ( j = 1 J α j [ n ] R B j [ n ] R E [ n ] )
P I R S [ n ] P A , n ,
| Ψ [ k , k ] | η k , n , k ,
Provided that ψ [ n ] always appears in quadratic form, the SDR method is applied again as same as in ( P 4.2 ) . Let V [ n ] = [ ψ [ n ] 1 ] [ ψ [ n ] H 1 ] , and the original problem can be rewritten as follows:
( P 5.1 ) : m a x V   C ( V ) = 1 N n = 1 N ( C - B j [ n ] C - E [ n ] )
t r ( H U [ n ] V [ n ] ) P ˜ A [ n ] , n ,
V [ k , k ] η k 2 , n , k ,
V [ K + 1 , K + 1 ] = 1 , n ,
V [ n ] 0 , n ,
where
C - j [ n ] = log 2 ( t r ( H U j [ n ] V [ n ] ) ) log 2 ( t r ( H I j [ n ] V [ n ] ) ) ,
τ j = σ j 2 + h U j [ n ] w [ n ] w H [ n ] h U j H [ n ] ,
H U [ n ] = [ d i a g ( H U I [ n ] w [ n ] ) d i a g ( H U I [ n ] w [ n ] ) H + σ I 2 I 0 K × 1 0 1 × K 0 ] ,
H U j [ n ] = [ H j [ n ] w [ n ] w H [ n ] H j H [ n ] + H ¯ j [ n ] H j [ n ] w [ n ] w H [ n ] h U j H [ n ] h U j [ n ] w [ n ] w H [ n ] H j H [ n ] τ j ] ,
H I j = [ H ¯ j [ n ] 0 n × 1 0 1 × n σ j 2 ] ,
H j [ n ] = d i a g ( h I j [ n ] ) H U I [ n ] ,
H ¯ j [ n ] = σ I 2 d i a g ( h I j [ n ] ) d i a g ( h I j [ n ] ) H , j { B j , E } .
Due to the objective function’s non-convexity, we can relax the problem and use the MM algorithm to iteratively optimize the relaxed one. The penalty-based strategy is used once more to recover the rank-1 solution throughout each iteration. At feasible point V ˜ , C ( V ) can be approximated by its first-order Taylor expansion:
C ( V ) log 2 ( t r ( H U B j [ n ] V [ n ] ) ) + log 2 ( t r ( H I E [ n ] V [ n ] ) ) log 2 ( t r ( H I B j [ n ] V ˜ [ n ] ) ) log 2 ( t r ( H U E [ n ] V ˜ [ n ] ) ) log 2 ( t r ( H I B j [ n ] V ˜ [ n ] ) ) + 1 l n 2 t r ( H I B j [ n ] t r ( H I B j [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] )
ln ( t r ( H U E [ n ] V ˜ [ n ] ) ) + 1 ln 2 t r ( H U E [ n ] t r ( H U E [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] ) = C ˜ ( V ; V ˜ ) .
Here, C ˜ ( V ; V ˜ ) is a surrogate function, after dropping the constant term, the beamforming design problem can be recast into a convex form as
( P 5.2 ) : m a x   V 1 N n = 1 N ( log 2 ( t r ( H U B j [ n ] V [ n ] ) ) + log 2 ( t r ( H I E [ n ] V [ n ] ) ) ) 1 N n = 1 N ( 1 l n 2 t r ( ( H I B j [ n ] t r ( H I B j [ n ] V ˜ [ n ] ) + H U E [ n ] t r ( H U E [ n ] V ˜ [ n ] ) ) V [ n ] ) ) ,
( 56 b ) ,   ( 56 c ) , ( 56 d ) , ( 56 e ) .
( P 5.2 ) can be directly optimized using the CVX solver, then the rank-1 solution is recovered by adding the penalty Λ Ψ [ n ] = t r ( V [ n ] ) u m a x ( V [ n ] ( r ) ) H V [ n ] u m a x ( V [ n ] ( r ) ) . After getting optimal V , the initial reflecting matrix can be rewritten as ψ [ n ] = d i a g ( ( u m a x ( V [ n ] ) λ max ( V [ n ] ) ) [ 1 : K ] ) . The phase coefficient and amplification coefficient can be expressed as follows:
Θ [ n ] = d i a g ( exp ( j   a r g ( ψ * [ n ] ) ) ) , n ,
p [ n ] = d i a g ( exp ( j   a r g ( ψ * [ n ] ) ) ) ψ * [ n ] , n .
Algorithm 2 demonstrates the algorithm’s rationale. The SDR algorithm is adopted to convert the original sub-problem into an SDP format. Applying the MM algorithm, a surrogate function is constructed to replace the objective function in ( P 5.1 ) . By iteratively solving problem ( P 5.2 ) optimally, the convergence of C ( V ) promised. In each iteration, the penalty-based method is applied to recover the rank-1 solution.
Algorithm 2 Active IRS Control Algorithm for Problem (P5).
(1): Initialization: maximum threshold ϵ 3 > 0 , feasible point V ˜ , Calculate C ( V ) ( r ) given V ˜ and number of iterations r   =   0 .
(2): Optimize V in ( P 5.2 ) , with given V ˜ .
(3): Calculate r a n k ( V ) . If r a n k ( V ) > 1 , the penalty-based method is applied to recover the rank-1 solution.
(4): Calculate C ( V ) ( r + 1 ) given the rank-1 solution V .
(5): Calculate | C ( V ) ( r + 1 ) C ( V ) ( r ) | . If | C ( V ) ( r + 1 ) C ( V ) ( r ) | < ϵ 3 , then the algorithm converges, go to step (6), else set r   =   r   + 1 , V ˜ = V and go to step (2).
(6): Update ψ [ n ] = d i a g ( ( u m a x ( V [ n ] ) λ max ( V [ n ] ) ) [ 1 : K ] ) as the optimal solution of ( P 5 ) .

3.5. Overall Algorithm Description

The overall algorithm for solving the issue ( P 1 ) is outlined in Algorithm 3, where the BCD algorithm is applied, in accordance with the results gained in the previous four sub-problems. The original problem’s sub-optimal solution is found by solving the sub-problems in turn.
( P 4.4 ) is an approximate solution to the sub-problem obtained from the decomposition of the original problem, and the convergence analysis of the BCD method cannot be applied directly. The convergence of Algorithms 1 and 2 are proved in Appendix A and Appendix B, respectively.
Algorithm 3 Joint Optimization Algorithm for Maximizing Average Secrecy Capacity.
(1): Initialization: maximum threshold ϵ 4 > 0 , feasible point Q ( 0 ) ,   W ( 0 ) ,   Ψ ( 0 ) and iteration r   =   1 .
(2): Obtain S ( r ) with given Q ( r 1 ) ,   W ( r 1 ) ,   Ψ ( r 1 ) by solving ( P 2 ) .
(3): Obtain Q ( r ) with given S ( r 1 ) ,   W ( r 1 ) ,   Ψ ( r 1 ) by solving ( P 3.2 ) .
(4): Obtain W ( r ) with given S ( r 1 ) ,   Q ( r ) ,   Ψ ( r 1 ) by solving ( P 4.4 ) .
(5): Obtain Ψ ( r ) with given S ( r 1 ) ,   Q ( r ) ,   W ( r ) by solving ( P 5.2 ) .
(6): With Given S ( r ) ,   Q ( r ) ,   W ( r )   and   Ψ ( r ) , update R sec ( r ) set r   =   r   +   1 .
(7): Calculate the increment of the target value Δ = R sec ( r ) R sec ( r 1 ) , if Δ < ϵ 4 , the algorithm converges, go to step (8), else go to step (2).
(8): Output S * ,   Q * ,   W * ,   Ψ *   and   R sec * .
Denote g ( S , Q , W , Ψ ) as the objective function of ( P 1 ) , then consider that S ( r ) is the solution of ( P 2 ) , Q ( r ) is the solution of ( P 3.2 ) , W ( r ) is the solution of ( P 4.4 ) , and Ψ ( r ) is the solution of ( P 5.2 ) . According to the above convergence analysis, we get the following inference:
g ( S ( r ) , Q ( r ) , W ( r ) , Ψ ( r ) ) g ( S ( r + 1 ) , Q ( r + 1 ) , W ( r + 1 ) , Ψ ( r + 1 ) ) .
The target value of problem ( P 1 ) is non-decreasing after each iteration of Algorithm 3. Since the target value of problem ( P 1 ) is bounded by a finite value, Algorithm 3 must converge to a stable point.
The computational complexity of solving ( P 2 ) is expressed as O ( N ( J + 1 ) ) , the computational complexity of using the SCA algorithm for ( P 3 ) is O ( ( 10 N ) 3.5 ) [31], and the computational complexity of solving semidefinite programming problems for ( P 4 ) and ( P 5 ) is expressed as O ( N M 3 ) and O ( N ( K + 1 ) 3 ) [32], respectively. Thus, the complexity of the overall algorithm is O ( R i t e ( N ( J + 1 ) + ( 10 N ) 3.5 + N M 3 + N ( K + 1 ) 3 ) ) , where R i t e indicates the total number of iterations [33].

4. Analysis of Simulation Results

This section presents numerical findings to demonstrate the effectiveness of the suggested joint optimization scheme based on an active IRS-aided UAV system in improving the system’s average secrecy capacity. In this section, we present simulation results to show the performance of the proposed secure transmission scheme. Specifically, we assume that the ground area is 500 × 500   m , where the fixed height of the UAV is 50   m with a maximum speed V max = 15   m / s , the starting position is at the origin, and the flight endpoint of the UAV is ( 500 , 500 ) T   m . We consider a scenario where a M = 4 antenna UAV and a K = 16 element active IRS are employed to cooperatively serve the J = 4 legitimate users, whose positions are ( 50 , 200 ) T   m ,   ( 250 , 100 ) T   m ,   ( 400 , 100 ) T   m , and ( 450 , 400 ) T   m , respectively. The active IRS adopts a fully connected architecture, which means there are L = 16 amplifiers. The antenna arrays of the UAV and the active IRS are assumed to be a uniform linear array and UPA, respectively, where the antenna spacings are both λ / 2 , λ is the frequency of the carrier wave. The position of the single passive eavesdropper is ( 500 , 200 ) T   m . There are also fixed active IRSs located at ( 350 , 150 ) T   m with a height of 10   m . The UAV flies at a constant power P f l y = 29.7   dBm , the hardware static power of the active IRS, which corresponds to the phase shift and amplifier are P i r s = P a m p = 10   dBm , the maximum power budget at UAV and active IRS are P U = P A = 30   dBm , δ = 1   s is the time slot. Moreover, σ I 2 ,   σ B 2 ,   σ E 2 = 110   dBm and α = 2.2 ,   β = 2.5 , κ = 3 , ρ 0 = 30   dBm , are the power of AWGN, the path loss exponent, the Rician factor, and the reference channel gain, respectively. The default simulation parameters are shown in Table 3 unless otherwise specified.

4.1. Performance Simulation Results

Figure 3 illustrates the distribution of four legitimate users, the eavesdropper as well as the active IRS, and plots the optimal trajectory of the UAV under different flight time conditions. Due to the “multiplicative fading” effect introduced by IRS, the UAV can balance the cascaded channel conditions by flying around the IRS and legitimate users and away from eavesdroppers, providing a safer quality of communication for legitimate users. Four situations are represented as four actual scenarios: for the original strategy, the UAV can only fly in an approximately straight path; when T = 60   s , the UAV will try to fly to the best location to serve each legitimate user; when T = 80   s , the UAV can reach each optimal location and stay appropriately; when T = 100   s , the UAV will stay in the optimal location longer, providing a safer and better quality of service to legitimate users.
Figure 4 shows the time allocation and scheduling of four users in each time slot. In order to maximize the average secrecy capacity, the UAV should select appropriate users to transmit signals. It is shown that at the beginning, user-1 can obtain a higher secrecy rate and be selected. Until the 16th slot, user-2 can have a more secure communication environment due to the changes in UAV position, beamforming, and reflection parameters of the IRS, so user-2 becomes the served user. Once a user is selected for service, the UAV will send signals to that the user to obtain the maximum average secrecy capacity. In a multi-user scenario where time is sufficient, the UAV will first select the service user B j ( k ) and fly to the optimal location. Taking the flight constraints into account, the UAV will stay for an appropriate amount of time and fly to the next optimal position, simultaneously sending a signal to B j ( c + 1 ) as so on until it reaches the destination.

4.2. Performance Comparison of Different Optimization Algorithms

Figure 5 shows a comparison between the suggested scheme and the other two benchmarks in terms of the average secrecy capacity with respect to various values of P ˜ U in ( 44 ) , which is equivalent to the transmitting power. We considered a scenario where a M = 4 antenna UAV and a K = 16 element active IRS are employed cooperatively. In addition, it is worth noting that for the active scheme P ˜ U is used for transmitting antennas and the same power P ˜ U for reflecting signals, while for the passive schemes 2 P ˜ U is used for transmitting signals. It is shown that the rate of all schemes will increase with the increase in P ˜ U to varying degrees. For example, at P ˜ U = 18   dBm , the active IRS achieves an improvement of 55.4 % and 61.7 % compared to the case with passive IRS and without IRS, respectively. By jointly optimizing user scheduling, UAV trajectory, beamforming, and the reflecting matrix, the proposed joint optimization strategy can outperform the benchmark schemes in terms of average secrecy capacity, proving that it is an efficient way to enhance security performance.
Figure 6 shows the curve of the performance of the average security capacity with different settings of the number of IRS reflector units K and the number of antennas of UAV M . The transmit power P ˜ U = 18   dBm . As can be seen from the figure, our scheme can achieve acceptable performance in the above three settings. By comparing the curve of the ( K = 16 ,   M = 4 ) and ( K = 9 ,   M = 4 ) schemes, we can find that the average secrecy capacity will increase significantly with the increase in K , since more reflecting units can better align the signal to the served user. By comparing the curve of the ( K = 9 ,     M = 6 ) and ( K = 9 ,     M = 4 ) schemes, it is verified that the beamforming capability was also improved to some extent by increasing M , with a further improvement in secure communication performance.
The convergence of the proposed joint optimization algorithm (Algorithm 3) and the benchmark algorithm is depicted in Figure 7. The average secrecy capacity scheme under consideration is 11.9 % higher than the benchmark without optimal trajectory. Additionally, the method converges after roughly 30 rounds.
.

5. Conclusions

This paper established a model for an active IRS-assisted UAV communication system where the UAV can dynamically select a user for service in each time slot based on its channel conditions. To maximize the average achievable secrecy capacity for the whole flight, the user scheduling, UAV trajectory, transmitting beamforming, and reflecting matrix are jointly optimized. However, the established problem was challenging to solve because of the objective non-convex function and tightly coupled variables. Therefore, an algorithm based on BCD is adopted to solve it. Initially, we decoupled the original issue into four sub-problems, and then the SCA technique, CCT method, and MM algorithm were applied to convert the original sub-problems into convex forms. Furthermore, we solved the above four sub-problems alternately based on the BCD algorithm and finally obtained the equivalent solution of the original problem. Numerical results show that the active IRS-assisted UAV communication scheme can efficiently weaken the effect of the “multiplicative fading” and significantly improved the secrecy capacity. In future research, we will consider the issues of IRS discrete designing and new advanced multi-access techniques for next-generation networks, such as NOMA and RSMA. Moreover, the DRL algorithm can be applied to solve the related optimization problems.

Author Contributions

Conceptualization, J.M., T.L. and S.B.; methodology, T.L. and S.B.; software, T.L. and Y.Z.; validation, T.L. and S.Y.; formal analysis, T.L.; investigation, S.B. and S.Y.; resources, Y.Z. and S.Y.; data curation, T.L. and Y.Z.; writing—original draft preparation, T.L.; writing—review and editing, J.M.; visualization, T.L. and Y.Z.; supervision, J.M.; project administration, J.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Beijing Municipality under grant L192034.

Data Availability Statement

The data presented in this study are available in Table 3.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IRSintelligent reflecting surface
UAVunmanned aerial vehicles
BCDblock coordinate descent
LoSline of sight
NLoSnon-line of sight
MISOmultiple input single output
MIMO multiple input multiple output
SCAsuccessive convex approximation
SDRsemidefinite relaxation
CCTCharnes–Cooper transformation
MMmajorization-minimization
ULAuniform linear array
UPAuniform plane array
AoAangle of arrival
AoDangle of departure

Appendix A

The equivalent form of the problem (P4.4) is expressed as
m i n Y ˜ , t     1 N n = 1 N ( ( t [ n ] + h ˜ B [ n ] Y ˜ [ n ] h ˜ B H [ n ] ) ) + 1 N n = 1 N ( Λ w [ n ] ( t r ( Y ˜ [ n ] p [ n ] λ m a x ( Y ˜ [ n ] ( r ) ) ) ) )
1 N n = 1 N ( Λ w [ n ] ( u m a x ( Y ˜ [ n ] ( r ) ) H ( Y ˜ [ n ] Y ˜ [ n ] ( r ) ) u m a x ( Y ˜ [ n ] ( r ) ) ) ) ) .
Denote f ( t , Y ˜ ) as the objective function of ( P 4.4 ) and ( t [ n ] ( r ) , Y ˜ [ n ] ( r ) ) is a feasible solution to the aforementioned problem with a given Λ w [ n ] . ( t [ n ] ( r + 1 ) , Y ˜ [ n ] ( r + 1 ) ) represents the optimal solution of (64), and one obtains that
( t [ n ] ( r + 1 ) + h ˜ B [ n ] Y ˜ [ n ] ( r + 1 ) h ˜ B H [ n ] ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ( r + 1 ) ) λ m a x ( Y ˜ [ n ] ( r ) ) u m a x ( Y ˜ [ n ] ( r ) ) H ( Y ˜ [ n ] ( r + 1 ) Y ˜ [ n ] ( r ) ) u m a x ( Y ˜ [ n ] ( r ) ) )
( t [ n ] ( r ) + h ˜ B [ n ] Y ˜ [ n ] ( r ) h ˜ B H [ n ] ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ( r ) ) λ m a x ( Y ˜ [ n ] ( r ) ) ) .
Moreover, the sub-gradient of λ ( Y ˜ [ n ] ( r ) ) satisfies
λ ( Y ˜ [ n ] ( r ) ) = u m a x ( Y ˜ [ n ] ( r ) ) u m a x ( Y ˜ [ n ] ( r ) ) H ,
Y 0 ,   λ m a x ( Y ) λ m a x ( X ) u m a x ( Y ˜ [ n ] ( r ) ) H ( Y X ) u m a x ( Y ˜ [ n ] ( r ) ) .
Thus, we obtain the following
f ( t [ n ] ( r + 1 ) , Y ˜ [ n ] ( r + 1 ) ) = ( t [ n ] ( r + 1 ) + h ˜ B [ n ] Y ˜ [ n ] ( r + 1 ) h ˜ B H [ n ] ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ( r + 1 ) ) λ m a x ( Y ˜ [ n ] ( r + 1 ) ) λ m a x ( Y ˜ [ n ] ( r ) ) + λ m a x ( Y ˜ [ n ] ( r ) ) ) ( t [ n ] ( r + 1 ) + h ˜ B [ n ] Y ˜ [ n ] ( r + 1 ) h ˜ B H [ n ] ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ( r + 1 ) ) λ m a x ( Y ˜ [ n ] ( r ) ) ) Λ w [ n ] ( u m a x ( Y ˜ [ n ] ( r ) ) H ( Y ˜ [ n ] ( r + 1 ) Y ˜ [ n ] ( r ) ) u m a x ( Y ˜ [ n ] ( r ) ) ) ( t [ n ] ( r ) + h ˜ B [ n ] Y ˜ ( r ) [ n ] h ˜ B H ) + Λ w [ n ] ( t r ( Y ˜ [ n ] ( r ) ) λ m a x ( Y ˜ [ n ] ( r ) ) )
= f ( t [ n ] ( r ) , Y ˜ [ n ] ( r ) ) .
For a given Λ w [ n ] , f ( t [ n ] ( r ) , Y ˜ [ n ] ( r ) ) f ( t [ n ] ( r + 1 ) , Y ˜ [ n ] ( r + 1 ) ) holds. Therefore, f ( t [ n ] ( r ) , Y ˜ [ n ] ( r ) ) is non-increasing, which guarantees the convergence of Algorithm 1.

Appendix B

For any concave function, we have f ( x ) f ( x ˜ ) + ( f ( x ˜ ) ) T ( x x ˜ ) . t r ( H I B j [ n ] V [ n ] ) and t r ( H U E [ n ] V [ n ] ) are linear functions, log 2 ( t r ( H I B j [ n ] V [ n ] ) ) and log 2 ( t r ( H U E [ n ] V [ n ] ) ) are concave functions, then the first-order Taylor expansion of log 2 ( t r ( H I B j [ n ] V [ n ] ) ) and log 2 ( t r ( H U E [ n ] V [ n ] ) ) with a given feasible V ˜ can be expressed as
log 2 ( t r ( H I B j [ n ] V [ n ] ) ) log 2 ( t r ( H I B j [ n ] V ˜ [ n ] ) ) + 1 l n 2 t r ( H I B j [ n ] t r ( H I B j [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] ) ,
log 2 ( t r ( H U E [ n ] V [ n ] ) ) log 2 ( t r ( H U E [ n ] V ˜ [ n ] ) ) + 1 l n 2 t r ( H U E [ n ] t r ( H U E [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] ) .
Bringing them to C ( V ) , then we have
C ( V ) = log 2 ( t r ( H U B j [ n ] V [ n ] ) ) + log 2 ( t r ( H I E [ n ] V [ n ] ) ) log 2 ( t r ( H U E [ n ] V [ n ] ) ) log 2 ( t r ( H I B j [ n ] V [ n ] ) ) log 2 ( t r ( H U B j [ n ] V [ n ] ) ) + log 2 ( t r ( H I E [ n ] V [ n ] ) ) log 2 ( t r ( H I B j [ n ] V ˜ [ n ] ) ) log 2 ( t r ( H U E [ n ] V ˜ [ n ] ) ) log 2 ( t r ( H I B j [ n ] V ˜ [ n ] ) ) + 1 l n 2 t r ( H I B j [ n ] t r ( H I B j [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] ) log 2 ( t r ( H U E [ n ] V ˜ [ n ] ) ) + 1 ln 2 t r ( H U E [ n ] t r ( H U E [ n ] V ˜ [ n ] ) ) ( V [ n ] V ˜ [ n ] )
= C ˜ ( V ; V ˜ ) ,
where C ˜ ( V ; V ˜ ) is a surrogate function since four key conditions hold [34]: ① C ( V ) C ˜ ( V ; V ˜ ) ; ② C ( V ˜ ) = C ˜ ( V ; V ˜ ) ; ③ C ˜ ( V ; V ˜ ) | V = V ˜ = C ( V ) | V = V ˜ ; ④ C ˜ ( V ; V ˜ ) and are continuous in V and V ˜ . According to the key property of the MM algorithm, the convergence of Algorithm 2 is guaranteed.

References

  1. Liaskos, C.; Nie, S.; Tsioliaridou, A.; Pitsillides, A.; Ioannidis, S.; Akyildiz, I. A new wireless communication paradigm through software-controlled metasurfaces. IEEE Commun. Mag. 2018, 56, 162–169. [Google Scholar] [CrossRef]
  2. Tang, W.; Li, X.; Dai, J.Y.; Jin, S.; Zeng, Y.; Cheng, Q.; Cui, T.J. Wireless communications with programmable metasurface: Transceiver design and experimental results. China Communications 2019, 16, 46–61. [Google Scholar] [CrossRef]
  3. Liu, Z.; Zhao, S.; Wu, Q.; Yang, Y.; Guan, X. Joint trajectory design and resource allocation for IRS-assisted UAV communications with wireless energy harvesting. IEEE Commun. Lett. 2022, 26, 404–408. [Google Scholar] [CrossRef]
  4. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  5. Fang, S.; Chen, G.; Li, Y. Joint optimization for secure intelligent reflecting surface assisted UAV networks. IEEE Wirel. Commun. Lett. 2021, 10, 276–280. [Google Scholar] [CrossRef]
  6. Liu, X.; Yu, Y.; Li, F.; Durrani, T.S. Throughput Maximization for RIS-UAV Relaying Communications. IEEE Trans. Intell. Transp. Syst. 2022, 23, 19569–19574. [Google Scholar] [CrossRef]
  7. Li, S.; Duo, B.; Yuan, X.; Liang, Y.C.; Renzo, M.D. Reconfigurable intelligent surface assisted UAV communication: Joint trajectory design and passive beamforming. IEEE Wirel. Commun. Lett. 2020, 9, 716–720. [Google Scholar] [CrossRef]
  8. Lian, Z.; Su, Y.; Wang, Y.; Ji, P.; Jin, B.; Zhang, Z.; Xie, Z. A novel geometry-based 3-D wideband channel model and capacity analysis for IRS-Assisted UAV communication systems. IEEE Trans. Wirel. Commun. 2023. [Google Scholar] [CrossRef]
  9. Asaad, S.; Wu, Y.; Bereyhi, A.; Muller, R.R.; Schaefer, R.F.; Poor, H.V. Secure active and passive beamforming in IRS-aided MIMO systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1300–1315. [Google Scholar] [CrossRef]
  10. Lv, W.; Bai, J.; Yan, Q.; Wang, H. RIS-assisted green secure communications: Active RIS or passive RIS? IEEE Wirel. Commun. Lett. 2022, 12, 237–241. [Google Scholar] [CrossRef]
  11. Ge, Y.; Fan, J.; Li, G.Y.; Wang, L.-C. Intelligent reflecting surface-enhanced UAV communications: Advances, challenges, and prospects. IEEE Wirel. Commun. 2023. [Google Scholar] [CrossRef]
  12. Saxena, P.; Chung, Y.H. Analysis of jamming effects in IRS Assisted UAV dual-hop FSO communication systems. IEEE Trans. Veh. Technol. 2023. [Google Scholar] [CrossRef]
  13. Han, S.; Wang, J.; Xiao, L.; Li, C. Broadcast Secrecy Rate Maximization in UAV-Empowered IRS backscatter communications. IEEE Wirel. Commun. 2023. [Google Scholar] [CrossRef]
  14. Tang, X.; He, H.; Dong, L.; Li, L.; Du, Q.; Han, Z. Robust secrecy via aerial reflection and jamming: Joint optimization of deployment and transmission. IEEE Internet Things J. 2023. [Google Scholar] [CrossRef]
  15. Pang, X.; Zhao, N.; Tang, J.; Wu, C.; Niyato, D.; Wong, K.-K. IRS-Assisted Secure UAV transmission via joint trajectory and beamforming design. IEEE Trans. Commun. 2022, 70, 1140–1152. [Google Scholar] [CrossRef]
  16. Liu, X.; Xie, C.; Xie, W.; Zhu, P.; Yang, Z. Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT. J. Supercomput. 2022, 78, 5957–5973. [Google Scholar] [CrossRef]
  17. Nguyen, T.-H.; Park, H.; Park, L. Recent Studies on Deep Reinforcement Learning in RIS-UAV Communication Networks. In Proceedings of the 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia, 1 October 2023; pp. 378–381. [Google Scholar]
  18. Truong, T.P.; Tuong, V.D.; Dao, N.-N.; Cho, S. FlyReflect: Joint Flying IRS Trajectory and Phase Shift Design Using Deep Reinforcement Learning. IEEE Internet Things J. 2023, 10, 4605–4620. [Google Scholar] [CrossRef]
  19. Nguyen, M.-H.T.; Garcia-Palacios, E.; Do-Duy, T.; Dobre, O.A.; Duong, T.Q. UAV-Aided Aerial Reconfigurable Intelligent Surface Communications With Massive MIMO System. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1828–1838. [Google Scholar] [CrossRef]
  20. Long, R.; Liang, Y.; Pei, Y.; Larsson, E.G. Active Reconfigurable Intelligent Surface Aided Wireless Communications. IEEE Trans. Commun. 2021, 20, 4962–4975. [Google Scholar] [CrossRef]
  21. Zhang, Z.; Dai, L.; Chen, X.; Liu, C.; Yang, F.; Schober, R.; Poor, H.V. Active RIS vs. Passive RIS: Which Will Prevail in 6G? IEEE Trans. Commun. 2023, 71, 1707–1725. [Google Scholar]
  22. Liu, K.; Zhang, Z.; Dai, L.; Xu, S.; Yang, F. Active reconfigurable intelligent surface: Fully-connected or sub-connected. IEEE Commun. Lett. 2022, 26, 167–171. [Google Scholar] [CrossRef]
  23. Wang, Y.; Peng, J. Physical-Layer Secure Wireless Transmission via Active Reconfigurable Intelligent Surfaces. In Proceedings of the 2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS), Shenyang, China, 29–31 July 2022; pp. 285–289. [Google Scholar]
  24. Nguyen, N.T.; Nguyen, V.-D.; Wu, Q.; Tölli, A.; Chatzinotas, S.; Juntti, M. Hybrid Active-Passive Reconfigurable Intelligent Surface-Assisted UAV Communications. In Proceedings of the GLOBECOM 2022–2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 3126–3131. [Google Scholar]
  25. Zhou, Y.; Zhou, F.; Zhou, H.; Ng, D.W.K.; Hu, R.Q. Robust trajectory and transmit power optimization for secure UAV-enabled cognitive radio networks. IEEE Trans. Commun. 2020, 68, 4022–4034. [Google Scholar] [CrossRef]
  26. Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.-L.; Bergstrom, M.; Euler, S.; Wang, Y.-P.E. The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef]
  27. Wu, Q.; Zhang, R. Common throughput maximization in UAV-enabled OFDMA systems with delay consideration. IEEE Trans. Commun. 2018, 66, 6614–6627. [Google Scholar] [CrossRef]
  28. Wang, P.; Fang, J.; Dai, L.; Li, H. Joint Transceiver and Large Intelligent Surface Design for Massive MIMO mmWave Systems. IEEE Trans. Wirel. Commun. 2021, 20, 1052–1064. [Google Scholar] [CrossRef]
  29. Al-Hourani; Kandeepan, S.; Jamalipour, A. Modeling air-to-ground path loss for low altitude platforms in urban environments. In Proceedings of the IEEE Global Communication Conference, Austin, TX, USA, 8–12 December 2014; pp. 2898–2904. [Google Scholar]
  30. Chen, J.; Lai, H.; Schaible, S. Complex Fractional Programming and the Charnes-Cooper Transformation. J. Optim. Theory Appl. 2005, 126, 203–213. [Google Scholar] [CrossRef]
  31. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  32. Luo, Z.; Ma, W.C.; So, A.M.; Ye, Y.; Zhang, S. Semidefinite Relaxation of Quadratic Optimization Problems. IEEE Signal Process. Mag. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  33. Bazaraa, M.S.; Sherali, H.D.; Shetty, C.M. Nonlinear programming: Theory and algorithms. Technometrics 1994, 49, 105. [Google Scholar]
  34. Sun, Y.; Babu, P.; Palomar, D.P. Majorization-minimization algorithms in signal processing, communications, and machine learning. IEEE Trans. Signal Process. 2017, 65, 794–816. [Google Scholar] [CrossRef]
Figure 1. The model of the active IRS-assisted UAV secure communication system.
Figure 1. The model of the active IRS-assisted UAV secure communication system.
Sensors 23 04377 g001
Figure 2. The flow chart of the joint optimization algorithm.
Figure 2. The flow chart of the joint optimization algorithm.
Sensors 23 04377 g002
Figure 3. UAV trajectoies at different cycle times.
Figure 3. UAV trajectoies at different cycle times.
Sensors 23 04377 g003
Figure 4. User scheduling in each time slot.
Figure 4. User scheduling in each time slot.
Sensors 23 04377 g004
Figure 5. Average secrecy capacity of different schemes with respect to P ˜ U .
Figure 5. Average secrecy capacity of different schemes with respect to P ˜ U .
Sensors 23 04377 g005
Figure 6. Convergence of Algorithm 3 under different settings of K and M.
Figure 6. Convergence of Algorithm 3 under different settings of K and M.
Sensors 23 04377 g006
Figure 7. Convergence of different schemes.
Figure 7. Convergence of different schemes.
Sensors 23 04377 g007
Table 1. Summary of references [13,14,15,16,23,24].
Table 1. Summary of references [13,14,15,16,23,24].
ReferenceDensity, Type, and Mobility of UAV TransmitterCommunication ScenarioType of IRSObjectiveOptimization Methods
[13]Single UAV/Base Staion/MobileAmbient Backscatter Communication and /Unmodulated Backscatter Communication/Multiple users/Multiple EvesPassive IRSMaximizing the average secrecy rateBCD + SDR + Q-learning
[14]Single UAV/Relay/FixedUAV-Mounted IRS and Jammer/Fixed IRS/Single User/Multiple EvesPassive IRSMaximizing the minimum secrecy rateBCD + SCA + SDR + DDPG
[15]Single UAV/Base Staion/MobileFixed IRS/Single User/Single EvePassive IRSMaximizing the average secrecy rateBCD + SCA
[16]Single UAV/Base Staion/MobileFixed IRS/Multiple Users/Multiple EvesPassive IRSMaximizing the minimum average secrecy rateBCD + SCA
[23]N/AFixed IRS/Single User/Single EveActive IRSMaximizing the secrecy rateLCAJP
[24]Multiple UAVs/Base Station/FixedMultiple Fixed IRSs/Multiple UsersHybrid IRSMaximizing the minimum transmission rateBCD + SCA
Table 2. Summary of symbols.
Table 2. Summary of symbols.
SymbolDescription
  J number of ground legitimate users
M number of UAV antennas
K number of the elements of active IRS
N UAV flight duration
H U altitude of UAV
H I altitude of active IRS
  q horizontal coordinate of UAV
w B j coordinate of legitimate users
w E coordinate of eavesdropper
w I horizontal coordinate of active IRS
V max maximum flight speed of UAV
δ time slot
ρ 0 channel power gain
α ,   β path loss exponent
σ I 2 , σ B 2 , σ E 2 noise power
P f l y dissipated power consumed at UAV
P i r s static power of active IRS corresponding to phase-shift circuit
P a m p static power of active IRS corresponding to amplifier circuit
P U maximum power of UAV
P A maximum power of the active IRS
ζ reciprocal of energy conversion coefficient at the transmitter of UAV
ξ reciprocal of energy conversion coefficient at the active IRS
d antenna separation at UAV
d 0 separation of elements at IRS
Table 3. Simulation parameters.
Table 3. Simulation parameters.
SymbolValueSymbolValue
  J 4 V max 15   m / s
M 4 δ 1 s
K 16 ρ 0 30   dBm
L 16 α ,   β 2.2 ,   2.5
N 50 σ I 2 , σ B 2 , σ E 2 110   dBm
H U 50   m P f l y 29.7   dBm
H I 10   m P i r s 20   dBm
  q 0 ( 0 ,   0 ) T   m P a m p 20   dBm
q F ( 500 ,   500 ) T   m P U 30   dBm
w B j ( 50 , 200 ) T   m ,   ( 250 , 100 ) T   m ,   ( 400 , 100 ) T   m ,   ( 450 , 400 ) T   m
w E ( 500 ,   200 ) T   m P A 18   dBm
w I ( 350 ,   150 ) T   m ζ ,   ξ 1.1
κ 3 d ,   d 0 λ / 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Miao, J.; Li, T.; Bai, S.; Yan, S.; Zhao, Y. Secrecy Capacity Enhancement in Active IRS-Assisted UAV Communication System. Sensors 2023, 23, 4377. https://doi.org/10.3390/s23094377

AMA Style

Miao J, Li T, Bai S, Yan S, Zhao Y. Secrecy Capacity Enhancement in Active IRS-Assisted UAV Communication System. Sensors. 2023; 23(9):4377. https://doi.org/10.3390/s23094377

Chicago/Turabian Style

Miao, Jiansong, Tongjie Li, Shanling Bai, Shi Yan, and Yan Zhao. 2023. "Secrecy Capacity Enhancement in Active IRS-Assisted UAV Communication System" Sensors 23, no. 9: 4377. https://doi.org/10.3390/s23094377

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop