Next Article in Journal
Thermodynamics of Observations
Previous Article in Journal
Digital Economy and Green Development: Mechanisms of Action, Spillover Effects and Transmission Mechanisms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation

1
The College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
2
The 63rd Research Institute, National University of Defense Technology, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(9), 967; https://doi.org/10.3390/e27090967
Submission received: 25 July 2025 / Revised: 15 September 2025 / Accepted: 16 September 2025 / Published: 17 September 2025
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

Unmanned aerial vehicle (UAV)-assisted integrated sensing and communication (ISAC) systems have developed rapidly in the sixth generation (6G) era. However, factors such as the mobility of ground users and malicious jamming pose significant challenges to systems’ performance and reliability. Against this backdrop, this paper designs a multi-UAV-assisted ISAC system model under malicious jamming environments. Under the constraint of sensing accuracy, the total communication rate of the system is maximized through joint optimization of user association, UAV trajectory, and transmit power. The problem is then decomposed into three subproblems, which are solved using the improved auction algorithm (IAA), dream optimization algorithm (DOA), and rapidly-exploring random trees-based optimizer algorithm (RRTOA). The global optimal solution is approached through the alternating optimization-based predictive scheduling algorithm (AOPSA). Meanwhile, this paper also introduces a long short-term memory (LSTM) network to predict users’ dynamic positions, addressing the impact of user mobility and enhancing the system’s real-time performance. Simulation results show that compared with the baseline scheme, the proposed algorithm achieves a 188% improvement in communication rate, which verifies its effectiveness and superiority.

1. Introduction

With the deep integration of wireless communication technology and intelligent sensing, integrated sensing and communication (ISAC) has become one of the core technologies for sixth generation (6G) communication systems [1,2]. By sharing resources such as spectrum and hardware, ISAC can achieve collaborative optimization of communication and sensing, significantly improving spectrum efficiency and system performance [3]. In recent years, unmanned aerial vehicles (UAVs) have demonstrated extensive potential in ISAC systems due to their flexible deployment, wide coverage, and line-of-sight (LoS) communication links [4]. Integrating ISAC modules onto UAVs can not only enhance resource utilization but also provide communication and sensing services for ground users simultaneously [5,6].
In a UAV-assisted ISAC system, UAV trajectory design, user scheduling, and resource allocation are crucial factors affecting system performance. Currently, numerous studies focus on utilizing a single UAV to provide ISAC services for users [7,8,9,10,11,12]. For instance, Liu et al. [7] proposed a joint optimization problem of user scheduling, transmit power, and UAV trajectory, aiming to maximize energy efficiency and minimize radar mutual information (MI) under the premise of satisfying user sensing fairness. Deng et al. [8] studied the UAV-assisted integrated periodic sensing and communication (IPSAC) mechanism. Under the premise of satisfying sensing frequency and beam pattern gain requirement, the authors jointly optimized UAV trajectory, user association, target sensing selection, and transmit beamforming to maximize system communication rate. Zhou et al. [9] proposed a joint optimization problem of UAV CPU frequency, UAV radar sensing power, user transmit power, and UAV trajectory, aiming to minimize the total energy consumption of the UAV and users. Liu et al. [10] jointly optimized UAV trajectory, task scheduling, and power allocation. Under the constraint of communication rate, they maximized the radar estimation rate. Zhu et al. [11] proposed a reconfigurable intelligent surface (RIS)-assisted ISAC system operating in the millimeter-wave band, which configures the radio propagation environment by altering the phase of radio signals to enhance communication transmission rates. Zhu et al. [12] investigated a simultaneous transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-assisted ISAC dual secure communication system. By jointly designing the base station’s transmit beamforming and receive filter, along with the STAR-RIS’s transmission and reflection coefficients, the system maximizes the long-term average secrecy rate of users while ensuring the echo signal-to-noise ratio threshold and user rate constraints.
However, constrained by size and power, a single UAV has limited service capability and coverage range, making it difficult to handle scenarios where the geographical locations of communication users or targets are widely distributed. This has driven in-depth research on multi-UAV-assisted ISAC systems [13,14,15,16]. For example, Zhang et al. [13] investigated the resource allocation problem in multi-UAV-assisted ISAC systems. By jointly optimizing the UAV trajectory, user association, and beamforming design, the sum of weighted bit rates of all ground users was maximized while ensuring the sensing signal gain of targets. Qin et al. [14] proposed a joint optimization problem of user association, UAV trajectory planning, and power allocation, aiming to maximize the minimum weighted spectral efficiency among UAVs. Then, the authors introduced centralized and distributed schemes for solving the optimization problem. Wang et al. [15] considered a scenario where multiple UAVs collaboratively detect targets and transmit the collected data to a central UAV. Regarding the communication and sensing scheduling problem, the authors formulated it into two optimization problems, with the objectives of maximizing the average utility function (MAUF) and minimizing the completion time (MCT), respectively. Liu et al. [16] introduced radar MI to measure the sensing performance of ISAC from the perspective of information entropy. To achieve fair communication, the authors maximized the minimum communication rate of each Internet of Things (IoT) node through joint optimization of node scheduling, transmit power, and the three-dimensional (3D) trajectory of UAVs.
Although the aforementioned studies have made significant progress in UAV-assisted ISAC systems, most of them assume that users are in a stationary state and do not fully consider the impact of user mobility on system performance. In fact, some work has begun to focus on ISAC systems in dynamic scenarios. For example, Al-habob et al. [17] investigated a downlink multi-user ISAC system with multiple mobile eavesdropping UAVs, aiming to maximize user secrecy rates and ensure sensing quality by designing predictive beamforming schemes. However, this work did not consider user mobility and employed only a single base station to provide ISAC services. Pan et al. [18] explored a multi-UAV cooperative ISAC dynamic system, which maximizes the positioning accuracy of moving targets while ensuring communication service quality by jointly optimizing trajectories, base station association, spectrum, and power resources. Nevertheless, these studies still do not address the realistic threat of malicious jamming.
As an active attacker, malicious jamming aims to weaken and disrupt the normal communication activities of communication parties through various means (e.g., signal interference, electromagnetic attacks, etc.), thereby degrading communication performance. Jammers use advanced electronic jamming equipment to emit noise signals that are similar to or within the same frequency band as the communication signals, severely reducing the signal-to-noise ratio at the receiver and leading to degraded or even interrupted communication quality. In ISAC systems, malicious jamming not only disrupts communication links but also indirectly affects sensing accuracy and exacerbates power allocation conflicts.
Currently, limited work has focused on UAV-assisted ISAC systems in malicious jamming environments. Liu et al. [19] studied a UAV-enabled ISAC system under malicious jamming attacks, which maximizes the minimum transmission rate of users by optimizing transmit beamforming while meeting sensing constraints. However, this work only considered a simple scenario with a single fixed UAV deployment, lacking an analysis of multi-UAV dynamic trajectory optimization and user mobility. Mei et al. [20] explored the minimization of age of information (AoI) in scenarios with malicious jamming UAVs, reducing AoI by jointly designing the trajectories and power of legitimate UAVs, but similarly without considering multi-UAV cooperation and user mobility. Therefore, under multiple constraints such as mobility, sensing requirements, communication guarantees, and malicious jamming, achieving efficient, robust, and dynamic trajectory planning and resource allocation for UAVs has become a critical problem that urgently needs to be addressed.
Unlike existing studies, the innovation of this paper lies in being the first to thoroughly investigate the joint optimization of user association, UAV trajectory design, and power allocation in multi-UAV-assisted ISAC systems under the complex scenario of coexisting dynamic users and malicious jamming attacks. This paper designs a multi-UAV-assisted ISAC system in a malicious jamming environment, where multiple UAVs provide downlink communication services while sensing environmental information around ground users and dynamically optimizing their trajectories to mitigate the impact of malicious jamming. Additionally, we introduce a long short-term memory (LSTM) network to predict user positions, thereby addressing the challenges posed by mobility. The main contributions of this paper are summarized as follows:
  • A joint optimization problem is built to jointly optimize user association, UAV trajectory, and transmit power, aiming to maximize the total communication rate of all users under the constraint of sensing accuracy. Due to the non-convexity of the problem, an effective alternating optimization-based predictive scheduling algorithm (AOPSA) is put forward to solve it.
  • We decompose the optimization problem into three subproblems, which are solved using the improved auction algorithm (IAA), dream optimization algorithm (DOA), and rapidly-exploring random trees-based optimizer algorithm (RRTOA).
  • An LSTM network is introduced to capture the temporal characteristics of user positions, and it is combined with AOPSA to enhance the system’s real-time performance and optimization efficiency.
  • A series of simulations are conducted to evaluate the performance of AOPSA. Simulation results demonstrate that LSTM can effectively predict user positions. Moreover, AOPSA outperforms four benchmarks with diverse parameter settings.
The remainder of this paper is organized as follows. Section 2 describes the multi-UAV-assisted ISAC system model under malicious jamming environments. In Section 3, we propose the joint optimization problem of user association, UAV trajectory, and UAV transmit power. Section 4 provides a detailed introduction to the proposed optimization algorithms. Section 5 presents the simulation results of the proposed algorithms and discusses these results. Finally, Section 6 concludes the paper.

2. System Model

We consider a multi-UAV-assisted ISAC system under malicious jamming environments as shown in Figure 1. The system model includes the following: a central UAV, denoted as UAV 0 ; M edge UAVs equipped with communication and sensing modules, denoted as UAV m M = { 1 , 2 , , M } ; K ground mobile users, denoted as UE k K = { 1 , 2 , , K } ; and a static malicious jammer. In this system, UAV 0 provides global management and control, edge UAVs perform ISAC service for the users by sensing the environmental information around the users and sending the sensing information back to the users [16]. The jammer operates in a fixed-frequency mode, continuously emitting jamming signals within the primary communication frequency band (e.g., the ISAC shared band) to disrupt the communication link between edge UAVs and users. Such jammers are typically stationary (e.g., ground-based fixed jamming stations) and transmit at a constant power, generating strong interference via high-gain antennas. Due to the distance-dependent attenuation characteristics of wireless signal propagation, the jamming intensity experienced by user nodes is negatively correlated with their distance from the jammer. Based on feedback regarding the jamming intensity received by ground users, the UAV can perform radar detection scans over suspected jammer locations to estimate its approximate position [21,22].
Assume UAV 0 hovers directly above the center of the area at a fixed altitude of H 0 . Edge UAVs fly at a fixed altitude H, with flying time T total divided into T time slots of length δ t = ( T total / T ) . δ t should be sufficiently small to ensure sensing and communication channel state information (CSI) remain nearly constant. We consider a 3D Cartesian coordinate system. At each time slot t T = { 1 , 2 , , T } , the coordinates of UAV m can be expressed as q m ( t ) = [ x m ( t ) , y m ( t ) , H ] T , the coordinates of UE k can be expressed as q k ( t ) = [ x k ( t ) , y k ( t ) , 0 ] T , and the jammer’s coordinates can be expressed as q J = [ x J , y J , 0 ] T . The motion constraints of UAV m can be expressed as
q m ( t + 1 ) q m ( t ) v max δ t , t
q m ( t ) q n ( t ) D min , t , m n
where · denotes the L 2 norm, v max is the maximum flying speed of edge UAVs, and D min represents the minimum collision avoidance distance between edge UAVs.
To prevent mutual interference between radar signals and communication signals, the UAVs employ the time-division multiplexing (TDM) technique for radar detection and communication [16]. As depicted in Figure 2, each time slot is divided into two subtime slots by the allocation weight parameter . One subtime slot is allocated for the sensing task, while the other subtime slot is designated for the communication task.
We consider the air-to-ground communication channel mainly experiences Nakagami-m fading. Therefore, the communication channel gain from UAV m to UE k at time slot t can be expressed as [16,23]
h m k com ( t ) = m k ( t ) G s G r λ 2 ( 4 π ) 2 d m k 2 ( t ) = m k ( t ) β com d m k 2 ( t )
where m k ( t ) represents the small-scale fading coefficient following the Nakagami-m distribution, G s denotes the antenna gain of the transmitter of UAV m , G r denotes the antenna gain of the receiver of UE k , d m k ( t ) = q m ( t ) q k ( t ) represents the distance between UAV m and UE k , λ is the signal wavelength, and β com = ( G s G r λ 2 ) / ( 4 π ) 2 . Considering the transmit and return links of the radar signal, the channel power gain of the radar detection link UAV m and UE k can be expressed as
h m k rad ( t ) = G s G e λ 2 σ ( 4 π ) 3 d m k 4 ( t ) = β rad d m k 4 ( t )
where G e denotes the antenna gain of the radar receiver of UAV m , σ represents the radar cross section (RCS) of the target, and β rad = ( G s G e λ 2 σ ) / ( 4 π ) 3 . Considering that the ground-to-ground communication channel mainly experiences Rayleigh fading, the jamming channel gain from the malicious jammer to UE k can be expressed as [24]
h J k jam ( t ) = G J G r λ 2 ( 4 π ) 2 d J k 2 ( t ) ψ = β jam d J k 2 ( t ) ψ
where G J denotes the antenna gain of the transmitter of the jammer, d J k ( t ) = q J q k ( t ) represents the distance between the jammer and UE k , ψ is a random variable following the exponential distribution with unit mean, and β jam = ( G J G r λ 2 ) / ( 4 π ) 2 .
In this work, the UAVs communicate with users via orthogonal frequency division multiple access (OFDMA). At time slot t, the signal-to-interference-plus-noise ratio (SINR) of the communication link between UAV m and UE k can be expressed as
γ m k com ( t ) = p m ( t ) h m k com ( t ) l = 1 , l m M p l ( t ) h l k com ( t ) + σ noise 2 + p J h J k jam ( t )
where p m ( t ) denotes the transmit power of UAV m and satisfies 0 p m ( t ) p max , and p max is the maximum transmit power of edge UAVs. σ noise 2 is the additive white Gaussian noise (AWGN) power, and p J represents the transmit power of the jammer. The SINR of the sensing link between UAV m and UE k can be expressed as
γ m k rad ( t ) = p m ( t ) h m k rad ( t ) l = 1 , l m M p l ( t ) h l k rad ( t ) + σ noise 2
To ensure the sensing accuracy of edge UAVs, the SINR of the sensing link needs to satisfy the constraint γ m k rad ( t ) γ t h rad  [25], where γ t h rad represents the minimum SINR for accurate radar sensing.
We introduce a binary integer variable α m k ( t ) to represent user association. If α m k ( t ) = 1 , it indicates that UAV m and UE k are associated at time slot t, otherwise α m k ( t ) = 0 . Assuming that each user can associate with at most one UAV at each time slot, it can be expressed as
α m k ( t ) = 1 , if UAV m and UE k are associated 0 , otherwise
m = 1 M α m k ( t ) 1 , k , t
At time slot t, the communication rate from UAV m to UE k can be expressed as
R m k com ( t ) = log 2 1 + γ m k com ( t )
Therefore, the total communication rate of UE k can be expressed as
R k com = t = 1 T m = 1 M α m k ( t ) ( 1 l ) R m k com ( t )
The total communication rate of all users can be expressed as
R sum com = k = 1 K R k com

3. Problem Formulation

Our goal is to maximize the total communication rate of all users through the joint optimization of user association, UAV trajectory, and UAV transmit power. The variables of user association, UAV trajectory, and transmit power are defined as follows: α = { α m k ( t ) , m , k , t } , q = { q m ( t ) , m , t } , and p = { p m ( t ) , m , t } . The joint optimization problem can be formulated as follows
(13) P 0 : max α , q , p R sum com (13a) s . t . m = 1 M α m k ( t ) 1 , k , t (13b) α m k ( t ) { 0 , 1 } , m , k , t (13c) γ m k rad ( t ) γ t h rad , m , k , t (13d) 0 p m ( t ) p max , m , t (13e) x min x m ( t ) x max , m , t (13f) y min y m ( t ) y max , m , t (13g) q m ( t + 1 ) q m ( t ) v max δ t , t (13h) q m ( t ) q n ( t ) D min , t , m n (13i) p m ( t ) · δ t + κ · q m ( t + 1 ) q m ( t ) E max / T , m M , t T
where (13a) and (13b) are user association constraints, (13c) is the sensing accuracy constraint, (13d) is the UAV transmit power constraint, (13e) and (13f) are the UAV horizontal position constraints, (13g) and (13h) are the UAV motion trajectory constraints, and (13i) is the UAV energy consumption constraint, where κ is the flight energy consumption coefficient per unit distance and E max is the maximum battery capacity of the UAV.

4. Algorithm Design

It is evident that problem P 0 is a typical non-convex mixed integer nonlinear programming (MINLP) problem, which is challenging to solve directly. On one hand, the user association optimization variable α is a binary integer. On the other hand, even with fixed user association, the problem remains non-convex with respect to UAV trajectory q and transmit power p . Therefore, to solve problem P 0 , we decompose the original optimization problem into three subproblems: user association optimization, UAV trajectory optimization, and UAV transmit power optimization. Then, we solve these three subproblems through alternating iterations to obtain the solution of the original problem. Before introducing the algorithms, we first present the specific mechanism of LSTM for predicting user positions.

4.1. LSTM Predicting User Positions

Assuming ground users follow a random walk model and their current position information can be obtained through a global positioning system. The position information of K users over the past S time slots can be represented as
I history = q 1 ( t 1 ) q 2 ( t 1 ) q K ( t 1 ) q 1 ( t 2 ) q 2 ( t 2 ) q K ( t 2 ) q 1 ( t S ) q 2 ( t S ) q K ( t S )
Based on I history , we utilize LSTM to predict future user positions. The LSTM network is a type of time-recurrent neural network, suitable for processing and predicting sequential data or time series. Take Figure 3 as an example to introduce the composition and functions of the LSTM network unit.
The first part is generally referred to as the forget gate, which is used to determine whether the information from the past time step needs to be forgotten; the second part is called the input gate, through which new information is input into the network; the third part is called the output gate, which is used to pass the information to the next unit. As an excellent perceptron, the LSTM network can fully perceive the relevant features of the time series, such as the temporal correlation between the user’s position information and service changes within a certain period of time, thereby predicting the user’s position at the next moment. The dataset is generated by simulating the random walk trajectories of K users within the task area. In each time slot, users move according to a random direction with inertia. The initial direction of users is uniformly distributed within [ 0 , 2 π ] , with the turning angle per step constrained to ± π / 6 . Boundary reflection is implemented to ensure users remain within the task area.
Setting the time interval T s as the cycle for adjusting the optimization scheme, the flowchart of alternating optimization schemes based on user position prediction is shown in Figure 4.
In this figure, R max represents the objective function value obtained using the optimal optimization scheme for time slot t + T s , R ( t + T s ) represents the objective function value obtained, still using the optimal optimization scheme for time slot t, and θ is the adjustment threshold, for example 95%.
For the LSTM prediction model, the input size is I history . Let ξ denote the output size and h denote the number of units in the hidden layer of the network. According to the connection relationships between neurons, the computational complexity of LSTM can be expressed as O ( 4 h I history + 4 h 2 + 3 h + h ξ ) [26]. We train the LSTM prediction model offline, and then use the trained model for solving the optimization problem to ensure real-time performance.

4.2. Determine the Initial Positions of UAVs with Kmeans++

Based on the positions of all users at the initial time slot, we use the Kmeans++ algorithm [27] to determine the initial positions of the UAVs, as shown in Algorithm 1.
Algorithm 1 Kmeans++ Algorithm
Input: Users’ initial positions
Output: UAVs’ initial positions
1:
Randomly select a user as the first center c 1 ;
2:
Calculate the shortest distance d k from UE k to the selected center set C ;
3:
Select a new user as the next center with probability d k 2 / k = 1 K d k 2 ;
4:
Repeat steps 2–3 until C = { c 1 , c 2 , , c M } ;
5:
Assign each user to the nearest center, forming M clusters;
6:
Calculate the average position of users in each cluster as the new center;
7:
Repeat steps 5–6 until the cluster centers are stable.

4.3. User Association Optimization

For given q and p , the user association optimization subproblem can be formulated as
(15) P 1 : max α R sum com (15a) s . t . m = 1 M α m k ( t ) 1 , k , t (15b) α m k ( t ) { 0 , 1 } , m , k , t (15c) γ m k rad ( t ) γ t h rad , m , k , t
The traditional auction algorithm is difficult to adapt to many-to-many association requirements. Therefore, we propose an IAA based on the dynamic pricing mechanism to solve P 1 , maximizing user rates while ensuring sensing service quality. The process of solving P 1 with IAA is described as follows:
We define the price of UAV m as ψ m price , initialize the prices of all UAVs as [ ψ 1 price , ψ 2 price , , ψ M price ] T 0 , and the set of unassigned users U { 1 , 2 , , K } .
For each unassigned UE k U :
  • Select the set of valid UAVs that satisfy the sensing constraint
    M k = { m | γ m k rad ( t ) γ t h rad }
  • Calculate the net benefit for UAV m M k to UE k
    b m k = R m k com ( t ) ψ m price
  • Select the UAV with the maximum net benefit
    m * = arg max m M k b m k
  • Update the price of m * , with the update mechanism as follows
    b m k ( 2 ) = max m M k , m m * b m k
    Δ p m * = b m * k b m k ( 2 ) + ε basic · 1 + b m * k b m k ( 2 ) b m * k + ε 0
    where b m k ( 2 ) is the suboptimal net benefit, Δ p m * is the price increment, ε basic is the basic step size, and ε 0 prevents division by zero.
The detailed process of solving P 1 with IAA is shown in Algorithm 2. The computational complexity of IAA is mainly related to the number of UAVs and users. Therefore, the total computational complexity of IAA is O ( K M ) . This algorithm coordinates resource competition among multiple UAVs by introducing dynamic price adjustment increment Δ p m * , providing an effective solution paradigm for joint optimization problems in dynamic environments. Its distributed characteristics and low computational complexity make it particularly suitable for real-time resource scheduling scenarios in large-scale multi-UAV networks.
Algorithm 2 Improved Auction Algorithm (IAA)
Input:  γ m k rad ( t ) , R m k com ( t ) , γ t h rad , ε basic , q , p
Output:  α best
Initialize:  U { 1 , 2 , , K } , [ ψ 1 price , ψ 2 price , , ψ M price ] T 0
1:
while  U  do
2:
   Randomly select UE k U , filter M k based on Equation (16);
3:
   if  M k =  then
4:
     Update U = U { k } ;
5:
   else
6:
     Select UAV m * based on Equations (17) and (18);
7:
     Update α m k = 1 , U = U { k } ;
8:
     Update the price of UAV m * based on Equations (19) and (20);
9:
   end if
10:
end while
11:
return  α best .

4.4. UAV Trajectory Optimization

For given α and p , the UAV trajectory optimization subproblem can be formulated as
(21) P 2 : max q R sum com (21a) s . t . γ m k rad ( t ) γ t h rad , m , k , t (21b) x min x m ( t ) x max , m , t (21c) y min y m ( t ) y max , m , t (21d) q m ( t + 1 ) q m ( t ) v max δ t , t (21e) q m ( t ) q n ( t ) D min , t , m n (21f) p m ( t ) · δ t + κ · q m ( t + 1 ) q m ( t ) E max / T , m M , t T
We use the DOA [28] to solve P 2 . DOA is a novel meta-heuristic algorithm inspired by human dream behavior, which simulates the processes of memory retention, forgetting, and self-organization in dreams. By integrating memory, forgetting, and supplementary strategies, it effectively balances global exploration and local exploitation. The memory strategy serves as the foundation of the algorithm, resetting individuals to the previous optimal values within the group or population. This is followed by the forgetting supplement, which facilitates a gradual shift from exploration to exploitation. In the exploration stage, global optimization is enhanced through grouping, while in the exploitation stage, the entire population collaborates to improve local optimization. Reference [28] demonstrates that compared to algorithms such as particle swarm optimization (PSO) and successive convex approximation (SCA), DOA performs superiorly in terms of convergence, stability, and overall performance. The process of solving P 2 with DOA is described as follows.

4.4.1. Optimization Algorithm Assumptions

Based on the characteristics of human dreams and knowledge of optimization algorithms, we summarize the following four hypotheses:
The quality of dreams can be evaluated using fitness values.
The initiation of dreams is closely related to the foundation of existing memories.
Humans partially forget existing memories and supplement the forgotten parts with logically self-organized information.
Memory ability varies among individuals or groups and exhibits a certain degree of randomness.
These hypotheses help us better understand the principles of the algorithm. The workflow, exploration phase, and various strategies in the development phase of the algorithm are concrete embodiments of these four hypotheses.

4.4.2. Initialization

Based on the optimal UAV positions obtained from the last alternating optimization q last = [ x 1 last y 1 last , x 2 last y 2 last , , x M last y M last ] , initialize the population Q and ensure that each individual in Q satisfies constraints (21a)–(21f). Population Q can be expressed as
Q = q 1 q 2 q N 1 = x 1 , 1 y 1 , 1 x 2 , 1 y 2 , 1 x M , 1 y M , 1 x 1 , 2 y 1 , 2 x 2 , 2 y 2 , 2 x M , 2 y M , 2 x 1 , N 1 y 1 , N 1 x 2 , N 1 y 2 , N 1 x M , N 1 y M , N 1
where N 1 is the number of individuals and q i represents the ith individual in Q . Each individual represents the horizontal coordinates of all UAVs, i.e., ( x m , i , y m , i ) represents the horizontal coordinates of the mth UAV in the ith individual. The initialization population is formulated as follows
x m , i = x m last + r × ( x max x min )
y m , i = y m last + r × ( y max y min )
where r is a random number between 0 and 1.

4.4.3. Fitness Function

Transforming constraints (21a)–(21f) into penalty function terms, the fitness function can be expressed as
F fitness ( q i ) = R sum com ϖ 1 v V q Φ v
where Φ v is the constraint violation indicator function, ϖ 1 is the penalty coefficient, and V q is the set of constraints (21a)–(21f).

4.4.4. Exploration Phase ( 0 < u u d )

We divide the population into five groups based on the the difference in memory ability, the number of forgetting dimension f F for each group can be expressed as
f F = ϑ randi D dim 8 F , max 2 , D dim 3 F
where F = 1 , 2 , 3 , 4 , 5 represents the group number, ϑ randi ( a , b ) represents a random integer selected from a to b, and D dim = 2 M represents the number of dimensions.
Memory Strategy: Each iteration is regarded as a dream behavior. Before each iteration, individuals in each group reset their positions to the best individual from the previous iteration within the group. The update formula can be expressed as
q i u + 1 = q best F u
where q i u + 1 represents the ith individual at iteration u + 1 , and q best F u represents the best individual in group F at iteration u.
Forgetting and supplementary strategy: Individuals in each group randomly forget information in certain dimensions while dreaming. The forgetting and supplementary strategy follows the memory strategy, allowing individuals to forget and self-supplement position information in the forgotten dimensions. The update formula can be expressed as
x m , i u + 1 = x m , best F u + 1 2 x m last + r × ( x max x min ) × cos π × u + u max u d u max + 1
y m , i u + 1 = y m , best F u + 1 2 y m last + r × ( y max y min ) × cos π × u + u max u d u max + 1
where x m , i u + 1 and y m , i u + 1 represent the x and y coordinates of the mth UAV of the ith individual at iteration u + 1 , respectively. x m , best F u and y m , best F u represent the x and y coordinates of the mth UAV of the best individual in group F at iteration u, respectively. u max is the maximum number of iterations, u d is the maximum number of iterations in the exploration phase, and u d = 0.9 u max .

4.4.5. Exploitation Phase ( u d < u u max )

Memory strategy: This phase does not perform grouping. Before each dream, all individuals reset their positions to the best individual from the previous iteration in the entire population. The update formula can be expressed as
q i u + 1 = q best u
where q best u represents the best individual in the entire population at iteration u. The number of forgetting dimensions for all individuals in the population is the same, expressed as
f = ϑ randi 2 , max 2 , D dim 3
Forgetting and supplementary strategy: The position update formula can be expressed as
x m , i u + 1 = x m , best u + 1 2 x m last + r × ( x max x min ) × cos π × u u max + 1
y m , i u + 1 = y m , best u + 1 2 y m last + r × ( y max y min ) × cos π × u u max + 1
where x m , best u and y m , best u represent the x and y coordinates of the mth UAV of the best individual in the entire population at iteration u, respectively.
The detailed process of solving P 2 with DOA is shown in Algorithm 3. The computational complexity of DOA is mainly concentrated in the exploration phase and exploitation phase. The computational complexity of the exploration phase can be expressed as O ( u d × N 1 × D dim ) , and the computational complexity of the exploitation phase can be expressed as O ( ( u max u d ) × N 1 × D dim ) . Therefore, the total computational complexity of DOA is O ( u max × N 1 × D dim ) .
Algorithm 3 Dream Optimization Algorithm (DOA)
Input:  γ m k rad ( t ) , R m k com ( t ) , γ t h rad , N 1 , u max , α , p
Output:  q best , F fitness ( q best )
Initialize:  u 1 , Generate initial population Q based on Equations (22)–(24)
1:
while  0 < u u d   do
2:
   for   F = 1 : 5  do
3:
      Update q best F and F fitness ( q best F ) ;
4:
      Update f F based on Equation (26);
5:
      Update q i u + 1 based on Equation (27);
6:
      for each individual i F  do
7:
         Randomly select f F dimensions to forget;
8:
         for each forgotten dimension m do
9:
           Update x m , i u + 1 and y m , i u + 1 based on Equations (28) and (29);
10:
         Check and repair constraints (21a)–(21f) for x m , i u + 1 and y m , i u + 1 ;
11:
        end for
12:
     end for
13:
   end for
14:
   Update q best and F fitness ( q best ) based on Equation (25);
15:
   Update u = u + 1 ;
16:
end while
17:
while  u d < u u max   do
18:
   Update q i u + 1 based on Equation (30);
19:
   Update f based on Equation (31);
20:
   for each individual i do
21:
     Randomly select f dimensions to forget;
22:
     for each forgotten dimension m do
23:
        Update x m , i u + 1 and y m , i u + 1 based on Equations (32) and (33);
24:
        Check and repair constraints (21a)–(21f) for x m , i u + 1 and y m , i u + 1 ;
25:
     end for
26:
   end for
27:
   Update q best and F fitness ( q best ) based on Equation (25);
28:
   Update u = u + 1 ;
29:
end while
30:
return  q best and F fitness ( q best ) .

4.5. UAV Transmit Power Optimization

For given α and q , the UAV transmit power optimization subproblem can be expressed as
(34) P 3 : max p R sum com (34a) s . t . γ m k rad ( t ) γ t h rad , m , k , t (34b) 0 p m ( t ) p max , m , t (34c) p m ( t ) · δ t + κ · q m ( t + 1 ) q m ( t ) E max / T , m M , t T
We use RRTOA [29] to solve P 3 . RRTOA is a novel meta-heuristic algorithm inspired by the search mechanism of rapidly-exploring random trees in robot path planning. The rapidly-exploring random trees algorithm effectively explores the search space by incrementally expanding a tree structure, demonstrating strong adaptability to complex constraints and high-dimensional planning requirements. However, traditional rapidly-exploring random trees algorithms suffer from issues such as slow convergence rates and undesirable path quality. Particularly in regions near the goal, the tree expansion becomes sparse, leading to reduced computational efficiency. To address these limitations, RRTOA has been effectively improved. RRTOA utilizes the adaptive step size wandering strategy, absolute difference-based adaptive step size strategy, and boundary-based adaptive step size strategy, which can effectively search the solution space while guiding the population to find high-quality solutions. Reference [29] shows that compared to similar meta-heuristic algorithms, RRTOA achieves competitive results across various problems. The process of solving P 3 with RRTOA is described as follows.

4.5.1. Initialization

Based on the optimal UAV power allocation scheme from the last alternating optimization p last = [ p 1 last , p 2 last , , p M last ] , initialize population P and ensure individuals in the population satisfy constraints (34a)–(34c). Population P can be expressed as
P = p 1 p 2 p N 2 = p 1 , 1 p 2 , 1 p M , 1 p 1 , 2 p 2 , 2 p M , 2 p 1 , N 2 p 2 , N 2 p M , N 2
where N 2 is the number of individuals, each individual p j represents a UAV power allocation scheme. The initialization formula for the population is as follows
p m , j = p m last + r 1 × ( p max p min )
where p m , j represents the power of the mth UAV in the jth individual, and r 1 is a random number between 0 and 1.

4.5.2. Fitness Function

Transforming constraints (34a)–(34c) into penalty function terms, the fitness function is expressed as
F fitness ( p j ) = R sum com ϖ 2 v V p Φ v
where Φ v is the constraint violation indicator function, ϖ 2 is the penalty coefficient, and V p is the set of constraints (34a)–(34c).

4.5.3. Adaptive Step Size Wandering Strategy

To address the issue of low exploration efficiency caused by a fixed step size, RRTOA models the random sampling mechanism as an adaptive step size wandering strategy to enhance the algorithm’s search capability. The adaptive step size wandering strategy greatly improves the effectiveness of the global search by combining global random initialization methods, effectively preventing the algorithm from falling into local optima. We define monotonic functions A 1 and A 2 that vary with the iteration number u to control the dynamic adjustment of the step size, which can be expressed as
A 1 = ln ( u max u ) ln ( u max ) , A 2 = u / u max 3
where u max is the maximum number of iterations, and u is the current iteration number.
When r 1 < A 1 , the update formula is as follows
p m , j u + 1 = p m , j u + R 1
R 1 = r 1 A 1 2 × A 1 × ( p max p min ) λ ^
where p m , j u + 1 represents the power of the mth UAV in the jth individual at iteration u + 1 , p m , j u represents the power of the mth UAV in the jth individual at iteration u , R 1 is the adaptive step size of this strategy, and λ ^ = 10 is the step size penalty factor.

4.5.4. Absolute Difference-Based Adaptive Step Size Strategy

RRTOA introduces an absolute difference-based adaptive step size strategy. This strategy dynamically adjusts the step size by calculating the absolute difference between the current particle position and the current best position, achieving a dynamic balance between large-scale exploration and local fine-tuning of the search space. Consequently, it enhances the algorithm’s global optimization capability and efficiency.
When r 2 < ( A 2 / 10 ) , the update formula is as follows
p m , j u + 1 = p m , best u + R 2
R 2 = a 1 | p m , best u p m , j u |
where p m , best u represents the power of the mth UAV in the best individual at iteration u , R 2 is the adaptive step size of this strategy, r 2 is a random number between 0 and 1, and a 1 is the adaptive step size adjustment coefficient of this strategy, which can be expressed as
a 1 = 5 × ( r 2 A 2 / 20 ) × cos ( 2 π r 2 ) × e b
where e b is the random disturbance factor, with b = e cos ( π π / u ) .

4.5.5. Boundary-Based Adaptive Step Size Strategy

To achieve more precise optimization, a boundary-based adaptive step size strategy is introduced. The core of this strategy involves exploring with very small random steps, which enables RRTOA agents to conduct meticulous searches in the surrounding area. This not only ensures localized searching around the current best solution but also prevents convergence to local minima.
When r 3 < ( A 2 / 50 ) , the update formula is as follows
p m , j u + 1 = p m , best u + R 3
R 3 = ( p max p min ) × cos ( 10 π u / u max ) × a 2
where R 3 is the adaptive step size of this strategy, r 3 is a random number between 0 and 1, and a 2 is the adaptive step size adjustment coefficient of this strategy, which can be expressed as
a 2 = r 3 × ( r 3 A 2 / 100 ) × A 1 × ( 1 u / u max )
The detailed process of solving P 3 with RRTOA is shown in Algorithm 4. The computational complexity of RRTOA is mainly affected by population size, number of iterations, and problem dimension. Therefore, the total computational complexity of RRTOA is O ( u max × N 2 × M ) .
Algorithm 4 RRT-Based Optimizer Algorithm (RRTOA)
Input:  γ m k rad ( t ) , R m k com ( t ) , γ t h rad , N 2 , u max , α , q
Output:  p best , F fitness ( p best )
Initialize:  u 1 , generate initial population P based on Equations (35) and (36)
1:
  while  u u max   do
2:
     if   r 1 < A 1  then
3:
       Update p m , j u + 1 based on Equations (39) and (40);
4:
     end if
5:
     if   r 2 < ( A 2 / 10 )  then
6:
       Update p m , j u + 1 based on Equations (41)–(43);
7:
     end if
8:
     if   r 3 < ( A 2 / 50 )  then
9:
       Update p m , j u + 1 based on Equations (44)–(46);
10:
   end if
11:
   Update p best and F fitness ( p best ) based on Equation (37);
12:
   Update u = u + 1 ;
13:
end while
14:
return  p best and F fitness ( p best ) .

4.6. Alternating Optimization-Based Predictive Scheduling Algorithm

We define the relevant variables in AOPSA: μ ^ max is the maximum number of iterations, ε is the convergence threshold, and R sum com ( μ ^ ) represents the objective function value at iteration μ ^ . The detailed process of solving P 0 with AOPSA is shown in Algorithm 5. The computational complexity of AOPSA is O μ ^ max × u max × N 1 × D dim + u max × N 2 × M + K M .
Algorithm 5 Alternating Optimization-based Predictive Scheduling Algorithm (AOPSA)
Input:  M, K, μ ^ max , ε , γ m k rad ( t ) , R m k com ( t ) , γ t h rad , N 1 , N 2
Output:  α , q , p , R sum com
Initialize: UAV initial positions, p p max , α 0 , R sum com 0
1:
 for  μ ^ = 1 : μ ^ max  do
2:
    Optimize user association α using Algorithm 2;
3:
    Optimize UAV trajectory q using Algorithm 3;
4:
    Optimize UAV transmit power p using Algorithm 4;
5:
    Calculate R sum com ( μ ^ ) ;
6:
    if   | R sum com ( μ ^ ) R sum com | < ε  then
7:
      break;
8:
    else
9:
      Update R sum com R sum com ( μ ^ ) ;
10:
   end if
11:
end for
12:
return  α , q , p , R sum com .

5. Simulation Results

This section evaluates the performance of AOPSA through simulation. Regarding the frequency selection, we adopt the millimeter-wave frequency band (28 GHz). This frequency band has abundant spectrum resources and can meet the system’s requirements for high-speed data transmission and high-precision sensing. The initial positions of ground users are randomly distributed within a 2D area of 800 m × 800 m. The main simulation parameters are shown in Table 1, and the settings of the values mainly refer to [16,25].
To demonstrate the effectiveness of AOPSA, we compare AOPSA with three other schemes as well as the joint optimization scheme in [30]. The details are as follows:
Scheme 1: UAVs are uniformly distributed throughout the area and remain stationary at altitude H. Only user association optimization and UAV power optimization are performed.
Scheme 2: UAV power is fixed at p max . Only user association optimization and UAV trajectory optimization are performed.
Scheme 3: UAVs are uniformly distributed throughout the area and remain stationary at altitude H. UAV power is fixed at p max , and only user association optimization is performed.
Reference [30]: Adopt spectral clustering, coalition game, and SCA to sequentially solve the three subproblems of UAV position optimization, user association optimization, and transmit power optimization.
We compare and analyze the computational complexity of AOPSA and the reference [30] algorithm as shown in Table 2. The complexity analysis for AOPSA has been presented in Section 4 and will not be reiterated here. The reference [30] algorithm employs coalition game, spectral clustering, and SCA to sequentially solve three subproblems: user association optimization, UAV position optimization, and transmit power optimization. In the user association optimization subproblem, the coalition game requires traversing all possible user–UAV combinations in the worst case, resulting in exponential computational complexity O ( M K ) for solving subproblem P 1 . The UAV trajectory optimization subproblem involves three components: similarity matrix construction O ( K 2 ) , eigen decomposition O ( K 3 ) , and initial clustering O ( K M ) . For the power optimization subproblem, the computational complexity reaches O ( M 3.5 ) . This analysis reveals that AOPSA significantly reduces the computational complexity and is suited for large scale scenarios.
Figure 5 describes the comparison result of the LSTM-predicted values and actual values for a single user position. To more intuitively present the user position at each time slot, we further convert the user coordinates into the distance between the user and the jammer. As shown in Figure 5, the two curves of predicted values and actual values achieve good fitting (coefficient of determination R 2 = 0.92 ). This indicates that the LSTM model can effectively capture the temporal features of user position changes and achieve relatively accurate predictions.
Before comparing the performance of different schemes, we validate the convergence behavior of the AOPSA. As illustrated in Figure 6, we compare the total communication rate of AOPSA (per single time slot) with that of the algorithm in reference [30] as a function of iteration numbers. The results demonstrate that AOPSA rapidly increases the communication rate to 53 bps/Hz within the first four iterations and maintains stable performance thereafter. Compared to reference [30], our proposed algorithm achieves approximately 23.2% performance improvement, demonstrating favorable convergence behavior and effectiveness.
Figure 7 shows the comparison of total communication rate for five optimization schemes over the entire flight time. It can be observed that as the number of time slots increases, the total communication rates of all schemes show an upward trend. The best performance is achieved by AOPSA, which reaches approximately 3750 bps/Hz at 60th time slot. Reference [30] reaches 2650 bps/Hz, while baseline scheme 3 is only around 1300 bps/Hz. Compared with [30], AOPSA achieves a 41.5% performance improvement, and compared with baseline scheme 3, the performance improvement reaches up to 188%. This result fully demonstrates AOPSA’s effectiveness in solving the joint optimization problem of user association, UAV trajectory optimization, and power allocation.
Figure 8 compares the variation trend of the total communication rate for five optimization schemes under different numbers of users. It can be seen that with the increase in the number of users, the total communication rates of all schemes show an upward trend. AOPSA consistently maintains the best performance, demonstrating higher scalability. This indicates that AOPSA has stronger resource optimization and scheduling capabilities when dealing with multiple scenarios, and can effectively cope with challenges brought by changes in the number of users, providing a reliable performance guarantee for practical deployments.
Figure 9 illustrates the performance comparison between the AOPSA and the reference [30] algorithm in terms of the total communication rate over all time slots under different γ t h r a d . It can be observed that under the same γ t h r a d constraint, the total communication rate of AOPSA is significantly higher than that of the reference [30] algorithm. As the γ t h r a d value increases, the total communication rates of both algorithms exhibit a decreasing trend. This result indicates that a higher γ t h r a d value requires more resources to meet the sensing performance requirements, thereby leading to a degradation in communication performance. Nevertheless, AOPSA still demonstrates superior performance, achieving an effective balance between communication and sensing.
As shown in Figure 10, we compare the total communication rate of AOPSA under different prediction position noise conditions across time slots. It can be observed that the blue curve represents performance under ideal prediction conditions, with the communication rate increasing from approximately 1100 bps/Hz to 3300 bps/Hz while maintaining the highest transmission efficiency. In practical scenarios with prediction position noise, system performance decreases to varying degrees: the red curve (position noise ±5%) shows communication rates ranging from 1000 bps/Hz to 3000 bps/Hz; the yellow curve (position noise ±10%) exhibits the lowest performance, with rates increasing from 900 bps/Hz to 2600 bps/Hz. This demonstrates that position prediction accuracy significantly impacts system communication performance. As position noise increases, the deviation between system performance and ideal prediction gradually enlarges, further emphasizing the importance of adopting robust prediction algorithms in practical applications.
As shown in Figure 11, the total communication rate of the AOPSA and the algorithm in reference [30] is compared across all time slots under different p J values. The results demonstrate that as p J increases, the performance of both algorithms declines. Nevertheless, AOPSA consistently outperforms the reference [30] algorithm. This indicates that the jamming power p J directly affects the SINR of the communication link. Specifically, an increase in p J intensifies the jamming imposed by the jammer on the user, leading to a reduction in the communication SINR and a consequent significant decrease in the communication rate.
Figure 12 presents a comparison of the total communication rate between AOPSA and the algorithm in reference [30] across all time slots under different p max values. As shown in the figure, the performance of both algorithms improves as p max increases, with AOPSA consistently outperforming the reference [30] algorithm. This result indicates that a higher p max value expands the feasible region for optimizing the UAV transmit power, allowing the algorithm to more flexibly adjust the power allocation within the extended constraint, thereby achieving significant performance enhancement.

6. Conclusions

This paper focuses on the multi-UAV-assisted ISAC system under malicious jamming environments, studying the joint optimization problem of user association, UAV trajectory planning, and transmit power allocation. To address the impact of user mobility and enhance system real-time performance, this paper proposes a user position prediction model based on LSTM to achieve accurate prediction of user positions in future time slots. To reduce the impact of malicious jamming and maximize the total communication rate of users, this paper adopts IAA, DOA, and RRTOA to optimize user association, UAV trajectory, and UAV transmit power, respectively. On this basis, the AOPSA is proposed to achieve joint optimization of the three variables. Simulation results demonstrate that the proposed algorithms can significantly improve the system’s total communication rate under malicious jamming environments, providing reliable technical support for practical deployment.
However, this paper primarily focuses on the analysis and discussion of stationary jammers. In practical scenarios, jammers are often mobile and possess a certain level of intelligence, enabling them to dynamically adjust their jamming methods and positions based on the countermeasures adopted by the communication system. This significantly enhances jamming efficiency and concealment. Such dynamic and intelligent jamming behaviors pose more severe challenges to existing anti-jamming schemes. Therefore, in future work, we will further investigate the underlying mechanisms of dynamic intelligent jamming scenarios and, on this basis, develop corresponding intelligent anti-jamming and collaborative communication strategies to improve the robustness of the system in such dynamic and intelligent jamming environments.

Author Contributions

Conceptualization, J.W., X.W., and R.X.; methodology, J.W. and X.W.; software, L.P. and R.X.; validation, J.W.; formal analysis, J.W.; investigation, J.W.; resources, J.W.; data curation, J.W.; writing—original draft preparation, J.W.; writing—review and editing, J.W. and X.W.; visualization, J.W.; supervision, L.P. and R.X.; project administration, J.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UAVUnmanned aerial vehicle
ISACIntegrated sensing and communication
6GSixth generation
LoSLine-of-sight
MIMutual information
RISReconfigurable intelligent surface
IoTInternet of Things
3DThree-dimensional
AoIAge of information
CSIChannel state information
TDMTime-division multiplexing
RCSRadar cross section
OFDMAOrthogonal frequency division multiple access
SINRSignal-to-interference-plus-noise ratio
AWGNAdditive white Gaussian noise
MINLPMixed integer nonlinear programming
LSTMLong short-term memory
IAAImproved auction algorithm
PSOParticle swarm optimization
SCASuccessive convex approximation
DOADream optimization algorithm
RRTOARapidly-exploring random trees-based optimizer algorithm

References

  1. Wei, Z.; Qu, H.; Wang, Y.; Yuan, X.; Wu, H.; Du, Y. Integrated Sensing and Communication Signals Toward 5G-A and 6G: A Survey. IEEE Internet Things J. 2023, 10, 11068–11092. [Google Scholar] [CrossRef]
  2. Liu, F.; Cui, Y.; Masouros, C.; Xu, J.; Han, T.; Eldar, Y. Integrated Sensing and Communications: Toward Dual-Functional Wireless Networks for 6G and Beyond. IEEE J. Sel. Areas Commun. 2022, 40, 1728–1767. [Google Scholar] [CrossRef]
  3. Zhang, J.A.; Rahman, M.d.L.; Wu, K.; Huang, X.; Guo, Y.J.; Chen, S.; Yuan, J. Enabling Joint Communication and Radar Sensing in Mobile Networks—A Survey. IEEE Commun. Surv. Tutorials. 2022, 24, 306–345. [Google Scholar] [CrossRef]
  4. Meng, K.; Wu, Q.; Xu, J.; Chen, W.; Feng, Z.; Schober, R.; Swindlehurst, A.L. UAV-Enabled Integrated Sensing and Communication: Opportunities and Challenges. IEEE Wirel. Commun. 2024, 31, 97–104. [Google Scholar] [CrossRef]
  5. Mu, J.; Zhang, R.; Cui, Y.; Gao, N.; Jing, X. UAV Meets Integrated Sensing and Communication: Challenges and Future Directions. IEEE Commun. Mag. 2023, 61, 62–67. [Google Scholar] [CrossRef]
  6. Meng, K.; He, X.; Wu, Q.; Li, D. Multi-UAV Collaborative Sensing and Communication: Joint Task Allocation and Power Optimization. IEEE Trans. Wirel. Commun. 2023, 22, 4232–4246. [Google Scholar] [CrossRef]
  7. Liu, Y.; Liu, S.; Liu, X.; Liu, Z.; Durrani, T.S. Sensing Fairness-Based Energy Efficiency Optimization for UAV Enabled Integrated Sensing and Communication. IEEE Wirel. Commun. Lett. 2023, 12, 1702–1706. [Google Scholar] [CrossRef]
  8. Meng, K.; Wu, Q.; Ma, S.; Chen, W.; Wang, K.; Li, J. Throughput Maximization for UAV-Enabled Integrated Periodic Sensing and Communication. IEEE Trans. Wirel. Commun. 2023, 22, 671–687. [Google Scholar] [CrossRef]
  9. Zhou, Y.; Liu, X.; Zhai, X.; Zhu, Q.; Durrani, T.S. UAV-Enabled Integrated Sensing, Computing, and Communication for Internet of Things: Joint Resource Allocation and Trajectory Design. IEEE Internet Things J. 2024, 11, 12717–12727. [Google Scholar] [CrossRef]
  10. Liu, Z.; Liu, X.; Liu, Y.; Leung, V.C.M.; Durrani, T.S. UAV Assisted Integrated Sensing and Communications for Internet of Things: 3D Trajectory Optimization and Resource Allocation. IEEE Trans. Wirel. Commun. 2024, 23, 8654–8667. [Google Scholar] [CrossRef]
  11. Zhu, Z.; Li, Z.; Chu, Z.; Guan, Y.; Wu, Q.; Xiao, P.; Renzo, M.D.; Lee, I. Intelligent Reflecting Surface Assisted mmWave Integrated Sensing and Communication Systems. IEEE Internet Things J. 2024, 11, 29427–29437. [Google Scholar] [CrossRef]
  12. Zhu, Z.; Gong, M.; Sun, G.; Liu, P.; Mi, D. AI-enabled STAR-RIS aided MISO ISAC Secure Communications. Tsinghua Sci. Technol. 2025, 30, 998–1011. [Google Scholar] [CrossRef]
  13. Zhang, R.; Zhang, Y.; Tang, R.; Zhao, H.; Xiao, Q.; Wang, C. A Joint UAV Trajectory, User Association, and Beamforming Design Strategy for Multi-UAV-Assisted ISAC Systems. IEEE Internet Things J. 2024, 11, 29360–29374. [Google Scholar] [CrossRef]
  14. Qin, Y.; Zhang, Z.; Li, X.; Huangfu, W.; Zhang, H. Deep Reinforcement Learning Based Resource Allocation and Trajectory Planning in Integrated Sensing and Communications UAV Network. IEEE Trans. Wirel. Commun. 2023, 22, 8158–8169. [Google Scholar] [CrossRef]
  15. Wang, Q.; Chai, R.; Sun, R.; Pu, R.; Chen, Q. ISAC-Enabled Multi-UAV Cooperative Perception and Trajectory Optimization. IEEE Internet Things J. 2024, 11, 40982–40995. [Google Scholar] [CrossRef]
  16. Liu, X.; Liu, Y.; Liu, Z.; Durrani, T.S. Fair Integrated Sensing and Communication for Multi-UAV-Enabled Internet of Things: Joint 3-D Trajectory and Resource Optimization. IEEE Internet Things J. 2024, 11, 29546–29556. [Google Scholar] [CrossRef]
  17. Al-habob, A.A.; Dobre, O.A.; Jing, Y. Predictive Beamforming Approach for Secure Integrated Sensing and Communication with Multiple Aerial Eavesdroppers. IEEE Trans. Commun. 2025; early access. [Google Scholar] [CrossRef]
  18. Pan, Y.; Li, R.; Da, X.; Hu, H.; Zhang, M.; Zhai, D.; Cumanan, K.; Dobre, O.A. Cooperative Trajectory Planning and Resource Allocation for UAV-Enabled Integrated Sensing and Communication Systems. IEEE Trans. Veh. Technol. 2024, 73, 6502–6516. [Google Scholar] [CrossRef]
  19. Liu, Y.; Zhang, B.; Hu, J.; Guo, D. Beamforming Optimization for UAV-Enable ISAC Systems under Malicious Jamming Attack. In Proceedings of the 2024 IEEE 24th International Conference on Communication Technology (ICCT), Chengdu, China, 18–20 October 2024; pp. 1229–1233. [Google Scholar] [CrossRef]
  20. Mei, H.; Zhang, H.; Zhou, X.; Wang, J. AoI Minimization for Air–Ground Integrated Sensing and Communication Networks with Jamming Attack. IEEE Trans. Veh. Technol. 2025, 74, 12776–12790. [Google Scholar] [CrossRef]
  21. Jing, X.; Liu, F.; Masouros, C.; Zeng, Y. ISAC From the Sky: UAV Trajectory Design for Joint Communication and Target Localization. IEEE Trans. Wirel. Commun. 2024, 23, 12857–12872. [Google Scholar] [CrossRef]
  22. Gu, S.; Luo, C.; Luo, Y.; Ma, X. Jointly Optimize Throughput and Localization Accuracy: UAV Trajectory Design for Multiuser Integrated Communication and Sensing. IEEE Internet Things J. 2024, 11, 39497–39511. [Google Scholar] [CrossRef]
  23. Jiang, X.; Sheng, M.; Zhao, N.; Liu, J.; Niyato, D.; Yu, F.R. Outage Analysis of UAV-Aided Networks With Underlaid Ambient Backscatter Communications. IEEE Trans. Wirel. Commun. 2023, 22, 7492–7505. [Google Scholar] [CrossRef]
  24. Huang, Z.; Sheng, Z.; Nasir, A.A.; Yu, H. Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers. IEEE Syst. J. 2024, 18, 1257–1268. [Google Scholar] [CrossRef]
  25. Liu, Y.; Liu, X.; Liu, Z.; Yu, Y.; Jia, M.; Na, Z.; Durrani, T.S. Secure Rate Maximization for ISAC-UAV Assisted Communication Amidst Multiple Eavesdroppers. IEEE Trans. Veh. Technol. 2024, 73, 15843–15847. [Google Scholar] [CrossRef]
  26. Song, T.; Liu, C.; Wu, R.; Jin, Y.; Jiang, D. A Hierarchical Scheme for Remaining Useful Life Prediction With Long Short-Term Memory Networks. Neurocomputing 2022, 487, 22–33. [Google Scholar] [CrossRef]
  27. Mi, J.; Wen, X.; Sun, C.; Lu, Z.; Jing, W. Energy-efficient and Low Package Loss Clustering in UAV-assisted WSN using Kmeans++ and Fuzzy Logic. In Proceedings of the 2019 IEEE/CIC International Conference on Communications Workshops (ICCC Workshops), Changchun, China, 11–13 August 2019; pp. 210–215. [Google Scholar] [CrossRef]
  28. Lang, Y.; Gao, Y. Dream Optimization Algorithm (DOA): A Novel Metaheuristic Optimization Algorithm Inspired By Human Dreams and its Applications to Real-world Engineering Problems. Comput. Methods Appl. Mech. Eng. 2025, 436, 117718. [Google Scholar] [CrossRef]
  29. Lai, G.; Li, T.; Shi, B. RRT-Based Optimizer: A Novel Metaheuristic Algorithm Based on Rapidly-Exploring Random Trees Algorithm. IEEE Access. 2025, 13, 42744–42776. [Google Scholar] [CrossRef]
  30. Wang, X.; Fei, Z.; Zhang, J.A.; Huang, J.; Yuan, J. Constrained Utility Maximization in Dual-Functional Radar-Communication Multi-UAV Networks. IEEE Trans. Commun. 2021, 69, 2660–2672. [Google Scholar] [CrossRef]
Figure 1. Multi-UAV-assisted ISAC system model under malicious jamming environments.
Figure 1. Multi-UAV-assisted ISAC system model under malicious jamming environments.
Entropy 27 00967 g001
Figure 2. Time slot division.
Figure 2. Time slot division.
Entropy 27 00967 g002
Figure 3. LSTM predicted model.
Figure 3. LSTM predicted model.
Entropy 27 00967 g003
Figure 4. Flowchart of alternating optimization schemes based on user position prediction.
Figure 4. Flowchart of alternating optimization schemes based on user position prediction.
Entropy 27 00967 g004
Figure 5. Comparison of LSTM-predicted values and actual values for a single user position.
Figure 5. Comparison of LSTM-predicted values and actual values for a single user position.
Entropy 27 00967 g005
Figure 6. Convergence analysis [30].
Figure 6. Convergence analysis [30].
Entropy 27 00967 g006
Figure 7. Comparison of total communication rate for five schemes ( M = 5 , K = 20 ) [30].
Figure 7. Comparison of total communication rate for five schemes ( M = 5 , K = 20 ) [30].
Entropy 27 00967 g007
Figure 8. Comparison of total communication rate for five schemes under different numbers of users ( M = 5 ) [30].
Figure 8. Comparison of total communication rate for five schemes under different numbers of users ( M = 5 ) [30].
Entropy 27 00967 g008
Figure 9. Comparison of the total communication rate between AOPSA and reference [30] under different values of γ t h rad ( M = 5 , K = 20 ).
Figure 9. Comparison of the total communication rate between AOPSA and reference [30] under different values of γ t h rad ( M = 5 , K = 20 ).
Entropy 27 00967 g009
Figure 10. Comparison of total communication rate of AOPSA under different position noise ( M = 5 , K = 20 ).
Figure 10. Comparison of total communication rate of AOPSA under different position noise ( M = 5 , K = 20 ).
Entropy 27 00967 g010
Figure 11. Comparison of the total communication rate between AOPSA and reference [30] under different values of p J ( M = 5 , K = 20 ).
Figure 11. Comparison of the total communication rate between AOPSA and reference [30] under different values of p J ( M = 5 , K = 20 ).
Entropy 27 00967 g011
Figure 12. Comparison of the total communication rate between AOPSA and reference [30] under different values of p max ( M = 5 , K = 20 ).
Figure 12. Comparison of the total communication rate between AOPSA and reference [30] under different values of p max ( M = 5 , K = 20 ).
Entropy 27 00967 g012
Table 1. Main simulation parameters.
Table 1. Main simulation parameters.
ParameterSymbolValue
UAV transmit antenna gain G s 40 dBi
UAV receive antenna gain G e 30 dBi
Jammer transmit antenna gain G J 20 dBi
User receive antenna gain G r 5 dBi
Number of time slotsT60
Length of time slot δ t 0.5 s
RCS of target σ 1 m 2
UAV collision avoidance distance D min 30 m
UAV maximum speed v max 30 m/s
UAV flying altitudeH100 m
Noise power σ noise 2 −110 dBm
UAV maximum transmit power p max 35 dBm
Jammer transmit power p J 20 dBm
Minimum SINR for radar sensing γ t h rad −10 dB
Convergence threshold ε 0.001
Maximum number of iterations μ ^ max 15
Allocation weight parameter0.5
Table 2. Comparison of computational complexity.
Table 2. Comparison of computational complexity.
AOPSAReference [30]
Subproblem P 1 O ( K M ) O ( μ 1 × K × M K )
Subproblem P 2 O u max × N 1 × D dim O K 3 + K 2 + K M
Subproblem P 3 O u max × N 2 × M O μ 2 × M 3.5
Problem P 0 O ( μ ^ max ( u max × N 1 × D dim + u max × N 2 × M + K M ) ) O ( η max ( μ 1 × K × M K + K 3 + μ 2 × M 3.5 ) )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, J.; Xu, R.; Peng, L.; Wei, X. Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation. Entropy 2025, 27, 967. https://doi.org/10.3390/e27090967

AMA Style

Wang J, Xu R, Peng L, Wei X. Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation. Entropy. 2025; 27(9):967. https://doi.org/10.3390/e27090967

Chicago/Turabian Style

Wang, Jinwei, Renhui Xu, Laixian Peng, and Xianglin Wei. 2025. "Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation" Entropy 27, no. 9: 967. https://doi.org/10.3390/e27090967

APA Style

Wang, J., Xu, R., Peng, L., & Wei, X. (2025). Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation. Entropy, 27(9), 967. https://doi.org/10.3390/e27090967

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop