Intelligent Reflecting Surface Assisted Secure Transmission in UAV-MIMO Communication Systems

This paper studies the intelligent reflecting surface (IRS) assisted secure transmission in unmanned aerial vehicle (UAV) communication systems, where the UAV base station, the legitimate receiver, and the malicious eavesdropper in the system are all equipped with multiple antennas. By deploying an IRS on the facade of a building, the UAV base station can be assisted to realize the secure transmission in this multiple-input multiple-output (MIMO) system. In order to maximize the secrecy rate (SR), the transmit precoding (TPC) matrix, artificial noise (AN) matrix, IRS phase shift matrix, and UAV position are jointly optimized subject to the constraints of transmit power limit, unit modulus of IRS phase shift, and maximum moving distance of UAV. Since the problem is non-convex, an alternating optimization (AO) algorithm is proposed to solve it. Specifically, the TPC matrix and AN covariance matrix are derived by the Lagrange dual method. The alternating direction method of multipliers (ADMM), majorization-minimization (MM), and Riemannian manifold gradient (RCG) algorithms are presented, respectively, to solve the IRS phase shift matrix, and then the performance of the three algorithms is compared. Based on the proportional integral (PI) control theory, a secrecy rate gradient (SRG) algorithm is proposed to iteratively search for the UAV position by following the direction of the secrecy rate gradient. The theoretic analysis and simulation results show that our proposed AO algorithm has a good convergence performance and can increase the SR by 40.5% compared with the method without IRS assistance.


Introduction
Due to their low cost, high mobility, and easy deployment, unmanned aerial vehicles (UAVs) have been widely used in logistics transportation, earthquake relief, aerial search and rescue, etc.In addition, UAVs can act as air base stations, relays or user nodes, and play important roles in wireless communication.Compared with traditional terrestrial communication, on the one hand, UAVs can use more sophisticated three-dimensional (3D) beamforming technology to greatly improve channel capacity; on the other hand, UAVs have a high probability of forming line-of-sight (LoS) links with ground users with good channel quality.However, these characteristics of UAVs can also pose security challenges to wireless networks, as it is also easier for eavesdroppers to form LoS links with transmitters and perform passive eavesdropping or active attacks.Therefore, the security problem in UAV communication systems is a research content worthy of attention.However, traditional encryption techniques require high computational complexity and consume large amounts of energy, which are not suitable for energy-constrained UAV platforms.As a powerful supplement to the upper layer encryption techniques, the physical layer security (PLS) technology uses the physical layer characteristics of the channel itself to improve the secrecy performance.While ensuring the secure and reliable communication of the legitimate receiver, it tries to avoid the effective eavesdropping of eavesdroppers [1][2][3][4].PLS technology in UAV communication networks can achieve secure transmission with low energy consumption through the differentiated design of wireless channels.It does not require key management and distribution, and omits the encoding and decoding process, making it suitable for resource-constrained UAV communication platforms.Therefore, it has a high application prospect and research value.
The PLS of UAV communication networks has been widely investigated.Mamaghani and Hong considered the power allocation optimization problem between the confidential signal and the artificial noise (AN) signal transmitted by the UAV base station [5].Ji et al. regarded the cache-enabled UAV as a reliable relay and proposed an optimization problem of maximizing the minimum SR among users [6].For the case where the eavesdropper location obeys the Poisson point process, Sun et al. derived a closed expression for the lower bound on the average secrecy rate (ASR) and maximized it [7].When only the statistical illegitimate channel state information (CSI) was known, Bao et al. derived a closed expression for the secrecy outage probability (SOP) and the ergodic SR [8], and Yuan et al. optimized the UAV trajectory and beamforming vector [9].Dong et al. considered the coordinate multiple points technology to form a UAV swarm relay, by jointly optimizing the transmit power of the base station and UAV relay, power allocation coefficient and beamforming on UAV relays, and the trajectory to maximize the ASR [10].Ye et al. considered that the UAV base station serves the legitimate UAV users under the eavesdropping of illegal UAVs, and derived the closed expressions of SOP and average secrecy capacity [11].Wang et al. investigated the cooperation of high-altitude platform and UAVs to provide services for ground users, and jointly optimized channel allocation, users' power, and UAVs' three-dimensional (3D) position in the NOMA-enabled network to counter an eavesdropping UAV [12].

Related Work
Although the above PLS technologies have been studied in-depth, when the legal channel quality is further deteriorated or the energy consumption of the communication node is limited, the above techniques may not meet the needs of secure communication.Therefore, the emerging intelligent reflecting surface (IRS) technology is introduced into the design of the secure UAV communication system.By integrating a large number of low-cost passive reflection components and controlling each amplitude and phase to reflect the incident signal independently, IRS can achieve a passive 3D beamforming, which can modify the wireless propagation environment and bring a higher degree of design freedom to secure wireless communications [13,14].Wang et al. deployed an IRS on the UAV as a trusted relay to maximize the ASR by jointly optimizing the beamforming vector, IRS phase shift matrix, and UAV's trajectory [15].Sun et al. optimized the positions and beamforming of a UAV base station and IRS deployed on building walls to maximize the SR [16], and Pang et al. further optimized the trajectory of UAVs [17].In addition, Fang et al. optimized the transmission power of the base station [18].In contrast, Li et al. considered a time division multiple access communication system [19], and Li et al. extended this problem to a multi-user scenario [20].In addition to the convex optimization methods used in the above research, Guo et al. used the deep deterministic policy gradient (DDPG) framework and proposed a twin-DDPG deep reinforcement learning algorithm to solve the SR optimization problem [21].
Although the above works have carried out a certain degree of research on IRS-assisted UAV secure communication, they are all based on the multiple-input single-output (MISO) channel or single-input single-output (SISO) channel and do not involve the problems of UAV-assisted multiple-input multiple-output (MIMO) scenarios.In a MIMO system, multiple parallel data streams can be transmitted at the same time to increase channel capac-ity, and the spatial multiplexing gain and spatial diversity gain can be used to overcome the channel fading, which has obvious advantages compared with MISO and SISO systems.However, due to the difference of channel models, the optimization problems in MIMO system are much more complicated than that in MISO systems.Firstly, the beamforming vector optimization in MISO systems needs to be transformed into covariance matrix optimization in MIMO systems.Secondly, the expression of the achievable rate is in the form of the logarithm of scalars in MISO communication systems, while in MIMO communication systems, the achievable rate expression takes the form of the logarithm of matrices determinant.This means that the optimization objectives, constraints, and optimization techniques are different from those in MISO systems, which is more challenging to deal with.Especially in the optimization of deployment position of the UAV, the strong non-convexity of the optimization problem makes it difficult to apply similar algorithms such as the successive convex approximation (SCA) and the semi-definite programming (SDP) to MIMO scenarios, and therefore difficult to solve using traditional convex optimization methods.
Therefore, current works have conducted in-depth research on the PLS communication of UAV-MISO systems, but only a few of them involve MIMO scenarios: considering the impact of multi-antenna eavesdroppers on UAV communication, Maeng et al. proposed a new linear precoder design scheme for data and AN transmission and derived a closed expression for the ASR for cellular connected UAVs networks [22], but they did not address the optimal design of deployment position of the UAV.Yuan et al. studied the secure beamforming and UAV trajectory planning problems in MIMO transceiver and multi-antenna eavesdropper (MIMOME) scenarios [9], but this research used the exhaustive search method of discrete processing, which has a large amount of calculation and low accuracy and thus makes it easy to lose the optimal solution.Mamaghani et al. proposed a full-duplex UAV relay scheme based on AN to maximize the ASR, but the reinforcement learning method requires high hardware cost and is not suitable for environmental changes [23].However, the above research does not involve the booming IRS technology and does not fully exploit the secure communication capabilities of UAV-MIMO systems.

Main Contributions
As mentioned above, the current various research works mainly focus on the secure transmission of UAV-MISO systems.The related research on the PLS of UAV-MIMO communication is still in its infancy currently.In particular, there is still a research gap in the effect of IRS on the PLS of UAV-MIMO systems, and the corresponding design of the optimization algorithm is not reported in the literature yet, which motivates this work.In this paper, we jointly optimize the UAV position, transmit precoding (TPC) matrix and AN matrix, and IRS phase shift matrix to maximize the SR of an IRS assisted UAV-MIMOME communication system.The formulated problem is non-convex, and it is quite difficult to convert it into a convex problem for an approximate solution using common methods such as the successive convex approximation (SCA) or fractional programming.Therefore, we propose an alternating optimization (AO) algorithm to deal with this problem and obtain the suboptimal solution through multiple iterations.The main contributions of this paper are summarized as follows.
(1) Different from the above literatures which focused MISO communication [15][16][17][18][19][20][21], we utilize the IRS to enhance the security of the UAV-MIMOME wireless communication system.Specifically, the system is composed of a UAV base station, an IRS, a ground legal receiver, and a ground eavesdropper.Each node is equipped with multiple antennas.The SR of the UAV communication system is maximized by jointly optimizing the TPC matrix and AN matrix, the IRS phase shift matrix, and the UAV placement subjected to transmit power constraint, unit modulus constraint, and maximum moving distance constraint within each iteration interval.(2) Since the optimization problem is non-convex, an AO algorithm is designed to solve it.Specifically, using the weighted minimum mean square error (WMMSE) algorithm to convert the original problem into a tractable equivalent form.For the optimization of the TPC matrix and AN matrix, we introduce auxiliary matrices and solve their expressions by the Lagrange dual method.For the optimization of the IRS phase shift matrix, after the problem is transformed into a constrained quadratically constrained quadratic program (QCQP) problem, three methods of alternating direction method of multipliers (ADMM), majorization-minimization (MM), and Riemannian manifold gradient (RCG) are used to solve it.For the optimization of the UAV placement, existing research based on MISO channels [24,25] and traditional convex optimization methods for other parameters [26][27][28]-such as UAV coverage or outage probabilitycannot be directly applied to MIMO scenarios with more complex channel models.Therefore, we propose a secrecy rate gradient (SRG) method, which combines the change of the SR with the UAV's proportional integral (PI) control theory, so that the UAV moves towards the position with greater SR until it reaches the point with the maximum SR.
(3) The simulation results verify the advantages of the proposed algorithm compared with the benchmark schemes.It can be seen that the proposed AO algorithm can guide the UAV to move closer to the IRS, which proves that the IRS can effectively improve the security of the UAV communication system.In addition, increasing the transmission power and the number of antennas at legitimate nodes are beneficial to improve the secrecy performance.Moreover, the channel fading coefficients also play an important role in secure UAV-MIMO communications.
The rest parts of this paper are organized as follows.In Section 2, the system model and the optimization problem are formulated.In Section 3, we propose an AO algorithm to solve the optimization problem, which alternately solves the three sub-problems of the UAV position, TPC matrix, and AN matrix, and IRS phase shift matrix.In Section 4, we present the simulation results to verify the effectiveness of the proposed algorithms.We conclude this paper in Section 5.
C M×1 denotes the space of M-dimensional complex-valued column vector.

System Model and Problem Formulation 2.1. System Model
As shown in Figure 1, we consider a MIMOME air-to-ground communication system, where the UAV base station equipped with a linear array transmits the information to the ground legitimate user Bob.Simultaneously, a ground eavesdropper Eve tries to eavesdrop on confidential information.To get close to Bob and stay away from Eve, the UAV can actively move to find the best location for secure communication.All nodes are equipped with multiple antennas.The number of transmit antennas at the UAV is N T , and the numbers of receive antennas at the Bob and Eve are N B and N E , respectively.In order to enhance the secrecy capacity, an IRS is deployed on the facade of a building to assist the communication between the UAV and Bob, which reflects the transmit signal of the UAV to increase the legitimate channel gain and damage the wiretap channel.The IRS consists of M = M X × M Y reflecting elements.Define the IRS phase shift matrix as Θ = diag{θ 1 , . . ., θ m , . . ., θ M }, ∀m ∈ M, where θ m = e jϕ m , ϕ m ∈ [0, 2π].Assuming that the element spacing of each antenna array is half wavelength, namely, d = λ c /2.
Without loss of generality, we consider a 3D Cartesian coordinate communication system.The UAV's location is denoted as p A = [x A , y A , z A ] T , and the coordinates of Bob, IRS, and Eve are The channel gains between the UAV and ground receivers consist of LoS and non-LoS (NLoS) components.Therefore, we assume that the air-to-ground channel adopts the Rician fading channel model, and its channel gain depends on the Rician factor.In this paper, we assume that the transmitter can obtain the perfect CSI of all communication nodes, including the eavesdropper's CSI.This assumption is possible, for example, when eavesdroppers are also legitimate users of the network, but they are not supposed to receive certain information, and they should be considered passive eavesdroppers.In this case, these undesired users can feed back perfect CSI to the transmitter.Based on existing IRS-aided communication channel estimation methods [29], we can directly focus on the final optimization task [15][16][17][18].Therefore, this paper assumes that all CSI is available.The channel gain between the UAV and terrestrial nodes, denoted by Ai H , is given by where 0  is the reference channel gain at distance 1 m, ab d denotes the distance, ab k is the Rician factor between node a and b , ab c is the path loss exponent for a to b link.The channel gains between the UAV and ground receivers consist of LoS and non-LoS (NLoS) components.Therefore, we assume that the air-to-ground channel adopts the Rician fading channel model, and its channel gain depends on the Rician factor.In this paper, we assume that the transmitter can obtain the perfect CSI of all communication nodes, including the eavesdropper's CSI.This assumption is possible, for example, when eavesdroppers are also legitimate users of the network, but they are not supposed to receive certain information, and they should be considered passive eavesdroppers.In this case, these undesired users can feed back perfect CSI to the transmitter.Based on existing IRS-aided communication channel estimation methods [29], we can directly focus on the final optimization task [15][16][17][18].Therefore, this paper assumes that all CSI is available.The channel gain between the UAV and terrestrial nodes, denoted by H Ai , is given by where β 0 is the reference channel gain at distance 1 m, d ab denotes the distance, k ab is the Rician factor between node a and b, c ab is the path loss exponent for a to b link.H LoS Ai represents the deterministic LoS component, and H NLoS Ai represents the random scattering component.Let ϕ i and φ i denote the azimuth angle-of-arrival (AOA) and angle-of-departure (AOD), and let ϑ i and θ i denote the elevation AOA and AOD, respectively.The adjacent antenna distance on the transmitter and IRS array is d, then H LoS Ai can be expressed as where The random scattering component H NLoS Ai is the NLoS component, which is modeled by the circularly symmetric complex Gaussian (CSCG) distribution with zero mean and unit variance.
Similarly, we assume that the channel between the UAV and IRS contains LoS and NLoS components, so the Rician fading channel model is adopted, which can be expressed as where h

LoS(A) AR
and h

LoS(D) AR
are given by h h In addition, the channel gains between IRS and terrestrial nodes can be expressed as where H NLoS Ri follows CSCG distribution, and In order to achieve the secure transmission of confidential information, with the help of multiple antennas, the UAV focuses the confidential signal to Bob by generating a TPC matrix, while sending AN signal to Eve to damage its eavesdropping quality.The transmitted signal can be written as where V ∈ C N T ×N d represents the precoding matrix, N d ≤ min(N T , N B ) denotes the num- ber of data streams, s ∼ CN (0, I N d ) represents the transmitted signal, and z ∼ CN (0, Z) denotes the AN vector with zero mean and covariance matrix Z.Therefore, the received signals of the legitimate user and eavesdropper can be expressed as where

Quadcopter UAV Model
Define c (n) and u (n) as the state vector and input vector of the quadrotor UAV control system at a given iteration time n, respectively, and A and B respectively represent the influence of the state vector and the input vector on the derivative of each element in the state vector.The control system of quadcopter UAV is modeled as the following matrix differential equation, We take the square of the speed of the four rotors of the quadrotor UAV as the input vector u (n) , and the state vector contains four parts: the UAV position, the orientation, and the derivative of the two-namely where θ A , ϕ A and ψ A represent pitch angle, roll angle, and yaw angle, respectively.We adopt the linear model in [30] to express this UAV system as

Quadcopter UAV Model
Define c () n and u () n as the state vector and input vector of the quadrotor UAV con- trol system at a given iteration time n , respectively, and A and B respectively repre- sent the influence of the state vector and the input vector on the derivative of each element in the state vector.The control system of quadcopter UAV is modeled as the following matrix differential equation, We take the square of the speed of the four rotors of the quadrotor UAV as the input vector u () n , and the state vector contains four parts: the UAV position, the orientation, and the derivative of the two-namely, c p o p o ( , , , ) and yaw angle, respectively.We adopt the linear model in [30] to express this UAV system as 0 0 0 0 I 00 ss 00 0 0 0 0 0 00 u ss where g is the gravity constant and  is a specific full-rank matrix.We only consider the horizontal position change of UAV.When the input signal is selected as u ) , the system model in the horizontal direction can be expressed as where g is the gravity constant and  is a specific full-rank matrix.We only consider the horizontal position change of UAV.When the input signal is selected as u ) , the system model in the horizontal direction can be expressed as cc cc , , ,0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 : 0 0 0 0 1 where represent the X-axis direction and the Y-axis direction, and ,

Problem Formulation
Based on the above analysis and to facilitate the solution, we further define the AN , and set ( ) where g is the gravity constant and  is a specific full-ra the horizontal position change of UAV.When the in , the system model in the horizont as cc cc , , ,0 represent the X-axis direction and the Y-ax ,

Problem Formulation
Based on the above analysis and to facilitate the solutio , and set T , the system model in the horizontal direction can be expressed as where γ ∈ {1, 2} represent the X-axis direction and the Y-axis direction, and

Problem Formulation
Based on the above analysis and to facilitate the solution, we further define the AN ma- and the achievable rates of the legitimate user and eavesdropper can be expressed, respectively, as ) where and Then, the SR R sec is the difference between the two achievable rates.We aim to maximize the SR by jointly optimizing the precoding matrix V, AN matrix Z, IRS phase shift matrix Θ, and UAV position p A .Therefore, the SR maximization problem of the UAV communication system can be formulated as max where P max is the maximum transmit power.The first constraint is the transmit power limit, the second constraint is the phase shift matrix unit modulus constraint, and the last constraint is the UAV moving distance limit between iterations.

Proposed Solution for Joint Optimization
In this section, we propose an AO algorithm to solve the Equation (19).The problem is decomposed into three subproblems; the precoding matrix V and AN matrix Z, the IRS phase shift matrix Θ, and the UAV position p A are solved alternately.Since this optimization problem is non-convex and thus difficult to solve, we need to transform it into an easy-to-solve form.Following the work of Hong et al. on IRS aided secure MIMO communication [31], we convert the objective function of Equation ( 19) into the following form: The problem is still an intractable non-convex problem that requires further reformulation.As for f 1 , we transmit the SR maximation problem to another equivalent problem by introducing the weighted minimum mean square error (WMMSE) method [32].By introducing the linear decoding matrix Z 1 ∈ C N T ×d , the MSE matrix of f 1 is Introducing the slack variable X 1 ∈ C d×d , and using Lemma 4.1 in [33], f 1 can be reformulated as Then the optimal Z 1 and X 1 can be expressed as: Similarly, by introducing the linear decoding matrix Z 2 ∈ C N E ×N T and the slack variable X 2 ∈ C N T ×N T , we can get the MSE matrix of f 2 , and f 2 can be reformulated as Then the optimal Z 2 and X 2 can be expressed as As for f 3 , we need to introduce Lemma 1 in [34] for reformulation, Entropy 2022, 24, 1605 By introducing the slack variable Then the optimal X 3 can be expressed as Therefore, the optimization problem can be expressed as We can solve this problem by applying the AO method.Firstly, in the following subproblem (P2), fix the value of Θ, p A to optimize the linear decoding matrices Z 1 , Z 2 , slack variables X 1 , X 2 , TPC matrix V, and AN matrix V E .Secondly, in the following sub-problem (P3), fix the value of Z 1 , X 1 , Z 2 , X 2 , X 3 , V, V E , and p A to optimize the phase shift matrix Θ.And finally, in the following sub-problem (P4), given Z 1 , X 1 , Z 2 , X 2 , X 3 , V, V E , and Θ, the position of the UAV base station can be solved by the SRG method.

Optimizing
Simplifying Formula (32), the sub-optimization problem (P2) can be abbreviated as The sub-problem is a convex QCQP problem for V and V E , but the computational complexity is high if solved directly using CVX.Therefore, the Lagrange dual method is used to solve it.The Lagrangian function of (P2) is And its dual problem is By taking the first-order derivative, the optimal solutions of V and V E are obtained as where Further, the eigenvalue decomposition is performed, and the optimal solution are written as In addition, the optimal dual variable µ should satisfy Define the monotone non-increasing function f (µ) = Tr VV H + Tr V E V H E , we first check whether f (0) ≤ P max is satisfied when µ = 0, if this condition is met, then µ * = 0. Otherwise, the optimal value of the dual variable µ * can be obtained by the bisection search method.

Optimizing Phase Shift Matrix
In this part, by fixing the value of Z 1 , X 1 , Z 2 , X 2 , X 3 , V, V E , and p A , the sub-optimization problem (P3) can be abbreviated as Extracting Θ and Θ H in the trace operation, the objective function of (P3) can be formulated as where c t is a constant term, which can be ignored in optimization, and By the Equation (1.9.5) in [35], remove the trace operation in the third and fourth terms of (40), namely: where θ = [θ 1 , θ 2 , . . ., θ M ], similarly, the trace operation in the first and second terms of (40) can be removed as where θ * is the conjugate vector of θ and d is the vector composed of elements on the diagonal of D. Thus, the phase shift matrix optimization problem can be rewritten as where The right side of the equation is positive semi-definite matrices, so Ξ is also a positive semi-definite matrix.Then, the optimization problem simplifies to min For the form of the optimization problem in (53), we solve it using three low complexity methods: ADMM [36], MM [37], and RCG [38].

Alternating Direction Method of Multipliers
Introducing an auxiliary variable q for θ, then the optimization problem can be reformulated as max where ξ > 0 is the penalty parameter.Defining T and ρ I = [ρ I,1 , . . ., ρ I,1 ] T are Lagrange variables corresponding to the real and imaginary parts of q − θ = 0, respectively.Let ρ = ρ R + ρ I , then its Lagrange function can be written as Its dual function is Therefore, the iterative form of ADMM solution for the dual problem is For the iteration of q (n+1) , it is necessary to derive the objective function, and if the derivative is zero, the specific closed expression can be obtained as For the iteration of θ (n+1) , taking out the terms related to θ in L 2 , the optimization problem can be written as Since the constant term does not affect the solution of the optimization problem, we continue to add the constant term and express the objective function as If we want to obtain the maximum value of the objective function, θ (n+1) needs to satisfy Let θ = q (n) − ρ (n) /ξ, then the projection operation can be expressed as ∠θ According to Lemma 3 in [36], we choose ξ = ι∥Ξ∥ 2 , where ι ≥ 1 is the minimum integer which satisfies (ξ/2)I M − Ξ≻0.

Majorization-Minimization
The core idea of the MM algorithm is to design a series of approximate optimization functions to control the upper limit of the original function, and to converge to the optimal solution of the original objective by minimizing the sequence.
We use f1 (θ) to represent the upper bound of the objective function.According to Lemma 1 in [37], we reformulate the problem and rewritten as Since θ H θ = M, θ H λ max I M θ = Mλ max is constant, after removing the constant term, the sub-problem becomes Therefore, its optimal solution is given by where λ max is the maximum eigenvalue of Ξ.

Riemannian Conjugate Gradient
The RCG method has been widely used in IRS-assisted MISO and MU-MISO communications, so this problem can also be solved using the RCG method.The specific steps are as follows.

1.
Compute Riemannian Gradient: Based on the manifold space constrained by the IRS phase shift matrix, we first calculate the Riemann gradient as the orthogonal projection of the Euclidean gradient on the tangent space, where

2.
Search Direction: The conjugate search direction on the tangent space is where Z(•) is the vector transport function, and it can be expressed as where ζ 1 is the Polak-Ribière parameter [39].

3.
Retraction: Project the tangent vector back to the circular manifold, where ζ 2 denotes the Armijo backtracking line step size [39].

Optimizing UAV Placement
Aiming at the influence of UAV on the spectral efficiency of centralized radio access network, Roth et al. proposed a UAV location optimization method to maximize the data rate [40], but this method does not consider the influence of IRS and eavesdroppers.Based on this work, in this part, we propose a secure position searching method for IRS-assisted UAV-MIMO systems-namely the SRG method.The details are as follows.
Fixing other variables except p A , the sub-optimization problem of UAV placement (P4) can be expressed as The SRG method requires the derivative of the SR R sec with respect to the UAV coordinate, according to [41] where the derivative of H B with respect to p A,γ can be expressed as Similarly, the derivative of H E with respect to p A,γ can be expressed as In the previous research on position optimization and trajectory planning of UAV communication, it was often assumed that the influence of the phase part on the channel was negligible and focused on the influence of distance change on the channel.In this case, we also assume that the phase only has some random and subtle influence on the channel.Therefore, the influence of this part on the position change can be ignored.The derivative part in (73) can be expressed as ) We can obtain the gradient of SR as Next, the state of the UAV is adjusted and controlled by the secrecy rate gradient.When the UAV achieves the maximum SR at a certain point, the position of the UAV should remain unchanged; when the secrecy rate gradient is not zero, the UAV should move along the gradient direction.
In order to meet the above requirements, the static end value of .p A should match the derivative ∇R sec of constant SR.So, with the PI-controller, the input signal is designed as where k = (k 1 k 2 k 3 ) T is the controller gain, p is the prefilter coefficient, and the system feedback control flow based on the PI-controller is shown in Figure 2, where the ⊕ represents the superposition of signals, which are calculated by the process indicated by arrows.
Entropy 2022, 24, x FOR PEER REVIEW 16 of 24 where k is the controller gain, p is the prefilter coefficient, and the sys- tem feedback control flow based on the PI-controller is shown in Figure 2, where the  represents the superposition of signals, which are calculated by the process indicated by arrows.

Figure 2.
The feedback control process of UAV systems based on PI-controller.
In the control system, the controller matrices are determined by a linear quadratic regulator (LQR).Then, the parameters of the whole control system can be deduced as follows: Therefore, the state equation can be evaluated by ( ) By superimposing the results obtained in the (81) with the state vector of the previous The feedback control process of UAV systems based on PI-controller.
In the control system, the controller matrices are determined by a linear quadratic regulator (LQR).Then, the parameters of the whole control system can be deduced as follows: O(M 3 + T RCG M 2 ), respectively, where T ADMM , T MM , and T RCG represent the iteration number of three IRS shift optimization sub-algorithms.In step 3, the computational complexity C 4 of the SRG algorithm is O(T SRG N 2 T ), where T SRG represent the iteration number of the SRG algorithm.Therefore, the complexity of the whole problem can be presented by

Simulation Results
In this section, we show the simulation results to verify the effectiveness of Algorithm 1 and the advantage of the proposed secure transmission strategy.The parameter settings we used in the simulation are set as follows unless otherwise specified [31,40] The convergence accuracy χ = 10 −5 and the maximum number of iterations j max = 10 3 .The convergence performance of our proposed Algorithm 1 is described in Figure 3, where the ADMM, MM, and RCG algorithms are used to optimize the IRS phase shift matrix, respectively.It can be seen from Figure 3 that for the communication scenario in this paper, with the increase of the number of iterations, the SR gradually increases and converges at about 3.58 after 20~30 iterations, and the convergence speed and secrecy performance of the AO-ADMM algorithm has a little advantage over other two algorithms. .The convergence performance of our proposed Algorithm 1 is described in Figure 3, where the ADMM, MM, and RCG algorithms are used to optimize the IRS phase shift matrix, respectively.It can be seen from Figure 3 that for the communication scenario in this paper, with the increase of the number of iterations, the SR gradually increases and converges at about 3.58 after 20~30 iterations, and the convergence speed and secrecy performance of the AO-ADMM algorithm has a little advantage over other two algorithms.In each iteration of Algorithm 1, ADMM, MM, and RCG are used to solve the problem (P3), the phase shift matrix of IRS. Figure 4 shows the convergence performance of the three algorithms in the first iteration of our proposed AO algorithm.As can be seen from Figure 4, the convergence speed of the three algorithms is slightly different, but not by much.Based on the analysis in Section 3, the computational complexity of MM and RCG algorithms is similar, and the computational complexity of the ADMM algorithm is higher than the other two algorithms.Although the computational complexity of the AO-ADMM algorithm is higher, its convergence performance and SR are slightly better than the other two algorithms.Therefore, we use the AO-ADMM algorithm to compare the performance with other benchmark schemes in the following simulation experiments.In each iteration of Algorithm 1, ADMM, MM, and RCG are used to solve the problem (P3), the phase shift matrix of IRS. Figure 4 shows the convergence performance of the three algorithms in the first iteration of our proposed AO algorithm.As can be seen from Figure 4, the convergence speed of the three algorithms is slightly different, but not by much.Based on the analysis in Section 3, the computational complexity of MM and RCG algorithms is similar, and the computational complexity of the ADMM algorithm is higher than the other two algorithms.Although the computational complexity of the AO-ADMM algorithm is higher, its convergence performance and SR are slightly better than the other two algorithms.Therefore, we use the AO-ADMM algorithm to compare the performance with other benchmark schemes in the following simulation experiments.
In each iteration of Algorithm 1, ADMM, MM, and RCG are used to solve the problem (P3), the phase shift matrix of IRS. Figure 4 shows the convergence performance of the three algorithms in the first iteration of our proposed AO algorithm.As can be seen from Figure 4, the convergence speed of the three algorithms is slightly different, but not by much.Based on the analysis in Section 3, the computational complexity of MM and RCG algorithms is similar, and the computational complexity of the ADMM algorithm is higher than the other two algorithms.Although the computational complexity of the AO-ADMM algorithm is higher, its convergence performance and SR are slightly better than the other two algorithms.Therefore, we use the AO-ADMM algorithm to compare the performance with other benchmark schemes in the following simulation experiments.Figure 5 shows the UAV position change process of the AO algorithms based on three different phase shift matrix optimization methods.As a comparison, we also introduce an AO algorithm with a randomly generated IRS phase shift matrix.It can be seen from Figure 5 that for the case of randomly setting the IRS phase shift, the UAV will move towards the nearby position of the receiver and the eavesdropper.The UAV will not be completely close to Eve and Bob and will finally stop at the [−19.34,14.17] T .This is because although the phase shift matrix is not optimal in this case, the IRS can still play a positive role in improving the secrecy performance.For the case of adopting ADMM, MM, and RCG algorithms, the UAV will continue to turn to the nearby position where the IRS is located, and finally stopped at [−22.23, 2.95] T , [−18.81, 2.94] T , and [−21.79,2.04] T , respectively.This is because the optimized IRS can give a full play to its secrecy ability, and the UAV can obtain a higher SR in the direction close to the IRS, so the UAV will move closer to the IRS.That is to say, the proposed SRG position optimization algorithm and three IRS phase shift matrix optimization methods are important means to effectively improve the secrecy ability.
Entropy 2022, 24, x FOR PEER REVIEW 19 of 24 Figure 5 shows the UAV position change process of the AO algorithms based on three different phase shift matrix optimization methods.As a comparison, we also introduce an AO algorithm with a randomly generated IRS phase shift matrix.It can be seen from Figure 5 that for the case of randomly setting the IRS phase shift, the UAV will move towards the nearby position of the receiver and the eavesdropper.The UAV will not be completely close to Eve and Bob and will finally stop at the [ 19.34,14.17]T − .This is because although the phase shift matrix is not optimal in this case, the IRS can still play a positive role in improving the secrecy performance.For the case of adopting ADMM, MM, and RCG algorithms, the UAV will continue to turn to the nearby position where the IRS is located, and finally stopped at [ 22.23,2.95]T − , [ 18.81,2.94]T − , and [ 21.79,2.04]T − , respectively.This is because the optimized IRS can give a full play to its secrecy ability, and the UAV can obtain a higher SR in the direction close to the IRS, so the UAV will move closer to the IRS.That is to say, the proposed SRG position optimization algorithm and three IRS phase shift matrix optimization methods are important means to effectively improve the secrecy ability.Next, we consider different benchmark schemes to verify the advantages of our proposed method.The different schemes are shown as follows.
Scheme 1: the TPC matrix, AN matrix, phase shift matrix, and position are optimized via the proposed AO-ADMM algorithm.
Scheme 2: The same as Scheme 1 except that the phase shift matrix is set randomly.Scheme 3: The same as Scheme 1 except that the TPC matrix is set randomly.Next, we consider different benchmark schemes to verify the advantages of our proposed method.The different schemes are shown as follows.
Scheme 1: the TPC matrix, AN matrix, phase shift matrix, and position are optimized via the proposed AO-ADMM algorithm.
Scheme 2: The same as Scheme 1 except that the phase shift matrix is set randomly.Scheme 3: The same as Scheme 1 except that the TPC matrix is set randomly.Scheme 4: The same as Scheme 1 except that the AN matrix is set randomly.Scheme 5: The same as Scheme 1 except that the IRS phase shift matrix is optimized by the one-by-one (OBO) algorithm in paper [42].
It can be seen from Figure 6 that as the UAV base station transmission power increases, the achievable SR of all five schemes will increase.Moreover, scheme 1 using the ADMM algorithm is always better than scheme 5 using the OBO algorithm for IRS optimization.As can be seen from Figure 7, with the increase in the number of transmission antennas, the achievable SR of all five schemes also increases.In Figure 7, in the whole region, our proposed scheme 1 has the highest achievable rate.When the number of transmission array is small, compared with scheme 4 and scheme 2, scheme 3 has better confidentiality ability.In addition, when the number of array elements is large, the SR of scheme 4 and scheme 2 is better than that of scheme 3.This is because the number of transmit antennas has a great influence on the performance of TPC matrices.
The effect of the number of eavesdropper antenna on the secrecy performance is described in Figure 8.As the number of eavesdropper antennas increases, the SR of all schemes will decline, and our proposed optimization method is always better than several other schemes.As can be seen from Figure 7, with the increase in the number of transmission antennas, the achievable SR of all five schemes also increases.In Figure 7, in the whole region, our proposed scheme 1 has the highest achievable rate.When the number of transmission array is small, compared with scheme 4 and scheme 2, scheme 3 has better confidentiality ability.In addition, when the number of array elements is large, the SR of scheme 4 and scheme 2 is better than that of scheme 3.This is because the number of transmit antennas has a great influence on the performance of TPC matrices.As can be seen from Figure 7, with the increase in the number of transmission antennas, the achievable SR of all five schemes also increases.In Figure 7, in the whole region, our proposed scheme 1 has the highest achievable rate.When the number of transmission array is small, compared with scheme 4 and scheme 2, scheme 3 has better confidentiality ability.In addition, when the number of array elements is large, the SR of scheme 4 and scheme 2 is better than that of scheme 3.This is because the number of transmit antennas has a great influence on the performance of TPC matrices.
The effect of the number of eavesdropper antenna on the secrecy performance is described in Figure 8.As the number of eavesdropper antennas increases, the SR of all schemes will decline, and our proposed optimization method is always better than several other schemes.The effect of the number of eavesdropper antenna on the secrecy performance is described in Figure 8.As the number of eavesdropper antennas increases, the SR of all schemes will decline, and our proposed optimization method is always better than several other schemes.Figure 9 shows the impact of the IRS elements number on the secrecy performance of the UAV system.It is observed from Figure 9 that with the increase in the number of reflection elements, the SR of all schemes will increase.However, due to the lack of optimization of the phase shift matrix in scheme 2, the SR increases very slowly, which shows the importance of IRS in our proposed joint optimization algorithm.With the preset parameter settings, the SR of our proposed scheme 1 can be about 40.5% higher than that of scheme 2 without IRS.Compared with Scheme 5 using the OBO algorithm, the performance advantage of our proposed Scheme 1 becomes more obvious as the number of IRS elements increases.It proves the effectiveness of Algorithm 1 and the significance of IRS in secure UAV communication.  Figure 9 shows the impact of the IRS elements number on the secrecy performance of the UAV system.It is observed from Figure 9 that with the increase in the number of reflection elements, the SR of all schemes will increase.However, due to the lack of optimization of the phase shift matrix in scheme 2, the SR increases very slowly, which shows the importance of IRS in our proposed joint optimization algorithm.With the preset parameter settings, the SR of our proposed scheme 1 can be about 40.5% higher than that of scheme 2 without IRS.Compared with Scheme 5 using the OBO algorithm, the performance advantage of our proposed Scheme 1 becomes more obvious as the number of IRS elements increases.It proves the effectiveness of Algorithm 1 and the significance of IRS in secure UAV communication. Figure 9 shows the impact of the IRS elements number on the secrecy performance of the UAV system.It is observed from Figure 9 that with the increase in the number of reflection elements, the SR of all schemes will increase.However, due to the lack of optimization of the phase shift matrix in scheme 2, the SR increases very slowly, which shows the importance of IRS in our proposed joint optimization algorithm.With the preset parameter settings, the SR of our proposed scheme 1 can be about 40.5% higher than that of scheme 2 without IRS.Compared with Scheme 5 using the OBO algorithm, the performance advantage of our proposed Scheme 1 becomes more obvious as the number of IRS elements increases.It proves the effectiveness of Algorithm 1 and the significance of IRS in secure UAV communication.With the increase of c RB , the IRS's signal reflection strength at Bob gradually decreases, resulting in a decrease in the SR.With the increase of c RE , Eve will receive fewer signals from the IRS, which increases the SR.Therefore, when the quality of the reflected legal channel is good, the IRS can promote the secrecy performance of the communication system, but if the quality of the reflected eavesdropping channel is better than that of the reflected legal channel, the deployment of the IRS may be counterproductive.Our proposed scheme 1 is slightly better than scheme 5, and consistently perform better than the other three benchmark schemes.
Entropy 2022, 24, x FOR PEER REVIEW 22 of 24 signals from the IRS, which increases the SR.Therefore, when the quality of the reflected legal channel is good, the IRS can promote the secrecy performance of the communication system, but if the quality of the reflected eavesdropping channel is better than that of the reflected legal channel, the deployment of the IRS may be counterproductive.Our proposed scheme 1 is slightly better than scheme 5, and consistently perform better than the other three benchmark schemes.

Conclusions
In this paper, we investigated the secure communication of an IRS-assisted UAV-MIMOME wireless system.The TPC matrix, AN matrix, IRS phase shift matrix, and UAV position were jointly designed to maximize the achievable SR under the transmit power, the IRS phase shift unit modulus, and the maximum UAV moving distance constraints.Since the problem was non-convex, we proposed an AO algorithm to optimize these Entropy 2022, 24, x FOR PEER REVIEW 22 of 24 signals from the IRS, which increases the SR.Therefore, when the quality of the reflected legal channel is good, the IRS can promote the secrecy performance of the communication system, but if the quality of the reflected eavesdropping channel is better than that of the reflected legal channel, the deployment of the IRS may be counterproductive.Our proposed scheme 1 is slightly better than scheme 5, and consistently perform better than the other three benchmark schemes.

Conclusions
In this paper, we investigated the secure communication of an IRS-assisted UAV-MIMOME wireless system.The TPC matrix, AN matrix, IRS phase shift matrix, and UAV position were jointly designed to maximize the achievable SR under the transmit power, the IRS phase shift unit modulus, and the maximum UAV moving distance constraints.Since the problem was non-convex, we proposed an AO algorithm to optimize these

Conclusions
In this paper, we investigated the secure communication of an IRS-assisted UAV-MIMOME wireless system.The TPC matrix, AN matrix, IRS phase shift matrix, and UAV position were jointly designed to maximize the achievable SR under the transmit power, the IRS phase shift unit modulus, and the maximum UAV moving distance constraints.Since the problem was non-convex, we proposed an AO algorithm to optimize these variables alternately.The optimal TPC matrix and AN matrix were solved by the Lagrange dual method.The optimal IRS phase shift matrix was solved by three algorithms of ADMM, MM, and RCG.An SRG method was proposed to iteratively optimize the UAV position.Finally, simulations proved the effectiveness of our proposed algorithm and the important role of IRS in UAV-MIMO secure communication.Additionally, our work can be extended to more general multicast scenarios.In our future work, we will investigate the robust and secure design of IRS-assisted UAV MIMO networks considering imperfect eavesdropping CSI.

Figure 1 .
Figure 1.An IRS-assisted secure ground-to-air communication system.
full-rank matrix.We only consider the horizontal position change of UAV.When the input signal is selected as u(n) . The coordinates of initial UAV point p A 0 , IRS, Bob, and Eve are set as [−120, 1.5] T , [0, 0] T , [10, 15] T , and [−10, 15] T , respectively.The height of UAV is 60 m and the height of IRS is 25 m.The transmit power limit is P T = 15 dBm.The antennas number of UAV, Bob, Eve, and IRS are N T = 4, N B = 2, N E = 2, and M = 48, respectively.The number of data streams is set to N d = 2. Rician factor is set to k ab = 4. Path loss exponent c AR = 2.2; c RB and c RE are set to 2.5; c AB and c AE are set to 3.5; and the path loss at the reference distance 1 m is set to −30 dB.The Bob's noise power and the Eve's noise power are σ 2 B = −75 dBm and σ 2 E = −75 dBm.The maximum UAV moving distance between two iterations is set to δ = 0.6.The controller gain k = (0.5477 23.9683 6.9308) T .The prefilter coefficient p = 0.0175.The initial UAV states vectors are set to c γ,0 = (p 0 A,γ 0 0 0) T , ∀γ ∈ {1, 2}.

Figure 4 .
Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.

Figure 4 .
Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.Figure 4. Convergence performance comparison of the ADMM, MM, and RCG Algorithm.

Figure 5 .
Figure 5.The UAV position change process with different IRS optimization method.

Figure 5 .
Figure 5.The UAV position change process with different IRS optimization method.

Figure 7 .
Figure 7. Achievable SR versus the number of transmission antenna.

Figure 6 .
Figure 6.Achievable SR versus the transmission power.

Figure 7 .
Figure 7. Achievable SR versus the number of transmission antenna.Figure 7. Achievable SR versus the number of transmission antenna.

Figure 7 .
Figure 7. Achievable SR versus the number of transmission antenna.Figure 7. Achievable SR versus the number of transmission antenna.

Figure 9 .
Figure 9. Achievable SR versus the number of reflecting elements.Figures 10 and 11 show the effect of IRS-Bob and IRS-Eve channel path loss exponents on SR.With the increase of RB c , the IRS's signal reflection strength at Bob gradually de-

Figure 8 .
Figure 8. Achievable SR versus the number of eavesdropper antenna.

Figure 9 .Figure 9 .
Figure 9. Achievable SR versus the number of reflecting elements.Figures 10 and 11 show the effect of IRS-Bob and IRS-Eve channel path loss exponents on SR.With the increase of RB c , the IRS's signal reflection strength at Bob gradually de- creases, resulting in a decrease in the SR.With the increase of RE c , Eve will receive fewer

Figures 10 and 11
Figures 10 and 11  show the effect of IRS-Bob and IRS-Eve channel path loss exponents on SR.With the increase of c RB , the IRS's signal reflection strength at Bob gradually decreases, resulting in a decrease in the SR.With the increase of c RE , Eve will receive fewer signals from the IRS, which increases the SR.Therefore, when the quality of the reflected legal channel is good, the IRS can promote the secrecy performance of the communication system, but if the quality of the reflected eavesdropping channel is better than that of the reflected legal channel, the deployment of the IRS may be counterproductive.Our proposed scheme 1 is slightly better than scheme 5, and consistently perform better than the other three benchmark schemes.

Figure 10 .
Figure 10.Achievable SR versus the path loss exponent between IRS and receiver.

Figure 11 .
Figure 11.Achievable SR versus the path loss exponent between IRS and eavesdropper.

Figure 10 .
Figure 10.Achievable SR versus the path loss exponent between IRS and receiver.

Figure 10 .
Figure 10.Achievable SR versus the path loss exponent between IRS and receiver.

Figure 11 .
Figure 11.Achievable SR versus the path loss exponent between IRS and eavesdropper.

Figure 11 .
Figure 11.Achievable SR versus the path loss exponent between IRS and eavesdropper.
T, and p E = [x E , y E , z E ] T , respectively.