Next Article in Journal
An On-Film AMC Antenna Insert-Molded in Earbuds with Enhancement in In-Ear and In Situ Received-Signal Sensing
Next Article in Special Issue
Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection
Previous Article in Journal
Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning
Previous Article in Special Issue
NC-OFDM Satellite Communication Based on Compressed Spectrum Sensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Capacity Maximization of UAV-Enabled Relaying Systems with 3D Trajectory Design and Resource Allocation

School of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(12), 4519; https://doi.org/10.3390/s22124519
Submission received: 26 May 2022 / Revised: 11 June 2022 / Accepted: 13 June 2022 / Published: 15 June 2022
(This article belongs to the Special Issue Integration of Satellite-Aerial-Terrestrial Networks)

Abstract

:
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibility, on-demand deployment and the freedom in trajectory design. The communication channel quality can be effectively improved by using UAV to build a line-of-sight communication link between the transmitter and the receiver. Furthermore, there is increasing demand for communication security improvement, as the openness of a wireless channel brings serious threat. This paper formulates a secrecy capacity optimization problem of a UAV-enabled relay communication system in the presence of malicious eavesdroppers, in which the secrecy capacity is maximized by jointly optimizing the UAV relay’s location, power allocation, and bandwidth allocation under the communication quality and information causality constraints. A successive convex approximation–alternative iterative optimization (SCA-AIO) algorithm is proposed to solve this highly coupled nonconvex problem. Simulation results demonstrate the superiority of the proposed secrecy transmission strategy with optimal trajectory design and resource allocation compared with the benchmark schemes and reveal the impacts of communication resources on system performance.

1. Introduction

1.1. Background and Related Works

Compared with the traditional terrestrial communication, the unmanned aerial vehicle (UAV) is regarded as an important component in emergency communication, mobile internet, and Internet of Things (IoT) due to its rapid response, strong flexibility and low cost [1,2]. In recent years, UAVs have been used in many communication scenarios such as aerial base station (BS) [3], mobile relay [4], flying cellular user [5], communication blind compensation [6], and airborne edge-cloud computing [7]. As one of the main applications of a UAV communication system, the UAV relay technology can effectively solve the wireless traffic congestion as well as the dynamic and unbalanced distribution of mobile devices [8,9,10].
The flexibility to build a line-of-sight (LoS) link is one of the main advantages of UAV-enabled communication [11]. However, the LoS channel is also vulnerable to be eavesdropping by malicious users [12,13,14] due to the channel characteristics of opening and broadcasting. Meanwhile, wireless channels have the characteristics of opening and broadcasting. Therefore, the security of UAV-enabled communication systems needs to be taken seriously, which was not considered in [3,4,5,6,7,8,9,10]. Due to the limited resources and strong flexibility of the UAV, the traditional transmission method could not be directly used in the UAV-enabled communication. As an important supplement of encryption technologies, physical-layer security (PLS) realizes the secrecy transmission by increasing the channel capacity of legitimate users and reducing the channel capacity of eavesdropping users [15,16,17,18,19,20,21].
Trajectory design and resource allocation have been typical technique optimization ways to enhance security for UAV-enabled communication systems. A joint bandwidth allocation and UAV two-dimensional (2D) trajectory design with fixed altitude was proposed in [15] to maximize the secrecy rate of a frequency division duplex (FDD)-based UAV relay system. Ref. [16] optimized the trajectory and transmit power allocation of a UAV BS to maximize the average worst-case secrecy rate. To enchance the security of the UAV-enabled relay system, the authors in [17] proposed a deep reinforcement learning algorithm to optimize the 2D trajectory and power allocation of the UAV. A dual UAV-assisted communication system was considered in [18], where the two UAVs are used as a base station and friendly jammer, respectively, and then, the average secrecy rate was maximized by optimizing the trajectories and power allocation of the two UAVs.
On the other hand, artificial noise (AN) and beamforming are popular techniques that can further guarantee security of the UAV-enabled communication. Ref. [19] proposed a secrecy two-phase transmission protocol via AN-assisted UAV communications and enhanced the average secrecy rate by jointly optimizing the UAV’s trajectory, transmission power, and AN power. Ref. [20] considered a UAV swarm-enabled communication system, in which the PLS of the system is improved by beamforming and bandwidth allocation in the presence of an eavesdropper. The authors in [21] studied a UAV swarm-enabled communication network, where several rotary-UAVs act as mobile relays to serve a legitimate UAV user in the presence of an eavesdropper UAV. Then, the power allocation coefficient, beamforming on UAV relays, and trajectory of the legitimate UAV are jointly optimizated to maximize the secrecy rate.

1.2. Motivation and Contributions

As mentioned above, the existing UAV trajectory optimization methods generally focus on 2D optimization under fixed flight altitude, which can not take full advantage of UAV’s maneuverability. Furthermore, most studies of PLS in UAV-enabled communication rely on static ground users without considering the existence of mobile users in many scenarios. There is still a lack of research contribution on the effect of mobile ground users on the UAV communication systems, and the corresponding secrecy capacity optimization scheme has not been studied yet. Meanwhile, mobile ground users may bring more challenges in practice, such as how to maintain reliable LoS communication and satisfy the quality of service (QoS) requirements of mobile users.
Based on the above description and discussion, this paper mainly investigates the 3D trajectory optimization and resource allocation to improve the secrecy performance of the UAV-enabled relaying system, where the reliability of LoS communication and QoS of mobile ground users are considered. In particular, a rotary UAV is used as a relay to assist the communication from the BS to multiple mobile users which are monitored by a malicious user; then, the power allocation, bandwidth allocation, and trajectory of the UAV are jointly optimized to maximize the secrecy channel capacity. To handle the nonconvex optimization problem, the SCA-AIO algorithm is utilized. The contributions of this article can be summarized as follows:
  • A UAV-enabled relaying communication system in the presence of an eavesdropper is proposed in this paper. To enhance the secrecy capacity of this system, we formulate a problem by jointly optimizing the UAV’s 3D trajectory and resource allocation under the constraints on information-causality, LoS communication reliability, and QoS requirements of mobile users.
  • For the highly coupled nonconvex problem, we develop an efficient algorithm to solve it. Specifically, we decompose the optimization problem into three subproblems and transform each nonconvex subproblem into a solvable convex optimization problem by the SCA algorithm. Among them, for the power and bandwidth allocation problems, we transform all the constraints into second-order cone (SOC) constraints and linear matrix inequality (LMI) constraints by introducing auxiliary variables to improve the solution efficiency. Meanwhile, we propose a joint optimization algorithm based on the AIO algorithm framework and analyze the convergence and complexity of the algorithm.
  • The following fruitful insights are obtained: (1) Numerical results show that the proposed scheme has better performance in terms of the secrecy capacity compared with the traditional optimization schemes. (2) Based on the theoretical analysis and simulation results, the path panning of the UAV relay-adjusted coordinate according to the position of the mobile users is analyzed qualitatively. (3) According to in-depth simulations, we provide the impacts of different parameter configurations on the performance of a UAV-enabled relaying system.

1.3. Organization

The rest of this paper is organized as follows. Section 2 presents the system model and states the problem formulation. In Section 3, we propose a joint optimization algorithm to solve the secrecy capacity maximization problem and analyze the complexity as well as the convergence of the proposed algorithm. Simulation results are provided in Section 4. Finally, conclusions are drawn in Section 5.

2. System Model and Problem Formulation

As shown in Figure 1, we consider a UAV communication system in which multiple mobile users need to receive information from the BS, while an eavesdropper EVE is located around mobile users and attempts to intercept the downlink signal between UAV and mobile users. There is no direct communication link between BS and the users due to obstacle occlusion. Therefore, we establish a two-hop wireless relaying transmission link by using a UAV relay. Without loss of generality, a three-dimensional (3D) Cartesian coordinate system is considered. Suppose that a set of Ω = { 1 , 2 , 3 , , N } mobile users are randomly distributed on the ground, and the UAV, which is denoted as R, can adjust its 3D position. Then, the coordinates of BS, UAV, and the nth mobile user are q B S = ( 0 , 0 , 0 ) , q R = x R , y R , z R , and q n = x n , y n , 0 , respectively. The rough location of EVE can be detected by an optical camera or synthetic aperture radar (SAR) [22]. In practice, the eavesdroppers always try to hide their existence, and the location detection may suffer from errors [23]. Therefore, we assume that the error between the measured value and the actual coordinates is r m k .
According to [17], the probability of LoS communication between the UAV R and the ground communication node m is
P LoS R ,   m = 1 1 + φ exp ξ θ R , m φ , m { BS , Ω }
where φ and ξ are constants depending on the environment type, while d m , R = q m q R and θ m , R = 180 π sin 1 z R d m , R are the distance and elevation angle between the UAV and node m, respectively.
To ensure the reliability of the LoS communication between UAV and the BS/mobile users, the probability of LoS needs to meet P LoS ε LoS  [24], where the ε LoS is a constant close to 1. To facilitate the analysis, this constraint can be rewritten as follows
sin φ + 1 ξ ln φ ε LoS 1 ε LoS · d m , R z R
To guarantee the security of information transmission, we consider the worst case, i.e., it is a LoS link between the UAV and EVE. The Doppler effect is assumed to be perfectly compensated [25]. Then, the channel gain between the UAV and BS, EVE, and the nth mobile user can be expressed as the following free-space path loss model [26],
h X , R = β 0 d X , R 2
where X { BS , EVE , Ω } , and β 0 denotes the channel power gain at the reference distance d = 1 m, which depends on the carrier frequency, antenna gain, etc., and d X , R is the distance between X and R. Considering the worst case, the minimum distance between the UAV R and the EVE is d E V E , R = x R S 2 + y R D 2 r m k 2 + z R 2 .
We assume that the downlink between UAV and mobile users adopts frequency division multiple access (FDMA), and the UAV adopts the decode-and-forward (DF) relaying method. The UAV transmits information to mobile users with bandwidth allocation B = B n , R , n Ω and power allocation P = P n , R , n Ω . Considering the limited spectrum resources, the maximum bandwidth for this downlink is denoted as B max , and the maximum transmitting power of the UAV is P max . The channel capacity between the UAV and the nth mobile user is
C n = B n , R r n , R
where r n , R = log 2 1 + P n , R δ n d n , R 2 , δ n = β 0 n 0 B n , R , and n 0 is the noise power spectrum density.
Similarly, the channel capacity between the UAV and the EVE as well as the BS can be expressed as follows, respectively
C E V E = n Ω B n , R log 2 1 + P n , R δ n d E V E , R 2
C B S , R = W log 2 1 + P B S δ B S , R d B S , R 2
where W is the bandwidth between the R and BS, δ B S , R = β 0 σ B S , R 2 , and σ B S , R 2 = n 0 W is the noise power at the UAV.
According to [12], the security capacity is defined as the difference between the legitimate channel capacity and the eavesdropping channel capacity, i.e.,
C sec = n Ω C n C E V E
In this paper, we aim to maximize C sec by jointly optimizing the UAV’s 3D trajectory, bandwidth, and power allocation with the constraints on information causality [27], LoS communication reliability, and the QoS requirement of mobile users. We formulate the problem of interest as follows
( P 1 ) max q , P , B C sec
s . t . n Ω C n C B S , R
C E V E < C B S , R
sin φ + 1 ξ ln φ ε LoS 1 ε LoS · d n , R z R , n Ω
sin φ + 1 ξ ln φ ε LoS 1 ε LoS · d B S , R z R
n Ω B n , R B max , n Ω
n Ω P n , R P max , n Ω
P n , R δ n d n , R 2 λ min , n Ω
where (8b) and (8c) are information causality constraints in the relaying system, i.e., UAV R can only forward the data that has already been received from BS during the relaying process [27]; (8d) and (8e) guarantee the reliability of the LoS communication; and (8h) guarantees the QoS requirement of mobile users. In addition, (8f) and (8g) limit the maximum available bandwidth and maximum transmission power.

3. Problem Formulation

Note that the above problem contains nonconvex constraints and nonconvex objective functions, and the UAV location, power allocation, and bandwidth allocation are coupled with each other. To solve this problem, we propose an efficient iterative optimization algorithm, i.e., P1 is decomposed into three subproblems to optimize the UAV’s position, power allocation, and bandwidth allocation, respectively.

3.1. 3D Trajectory Optimization

In this section, the trajectory of the UAV is optimized with fixed power and bandwidth allocations. The slack variables ϑ n , ϑ E V E , ϑ ( n Ω ) are introduced, and the subproblem can be formulated as
( P 1 . 1 ) max C sec q , ϑ n , , ϑ E V E = n Ω B n , R log 2 1 + P n , R δ n ϑ n log 2 1 + P n , R δ n ϑ E V E
s . t . n Ω B n , R log 2 1 + P n , R δ n ϑ n C B S , R
n Ω B n , R log 2 1 + P n , R δ n ϑ E V E C B S , R
ϑ n x R x n 2 + y R y n 2 + z R 2 , n Ω
ϑ E V E S x R 2 + D y R 2 + z R 2 + r m k 2 2 r m k ϑ
ϑ S x R , D y R
( 8 d ) , ( 8 e ) , ( 8 h )
It can be seen that P1.1 is equivalent to the trajectory optimization subproblem of P1 when the constraints (9d)–(9f) are satisfied with equality. For any n Ω , if (9d) or (9e) is strictly unequal, C sec will increase as ϑ n decreases or ϑ E V E increases. Therefore, the optimal solution of P1.1 is necessarily obtained when (9d)–(9f) are satisfied with equality, i.e., the optimal solution to P1 can be obtained by equivalently solving the P1.1 when power and bandwidth allocation are fixed. However, it is still nonconvex programming due to the nonconvex constraints (9b), (9c) and (9e). To solve this problem, the UAV’s location will be updated iteratively based on the SCA algorithm [28].
Define the coordinate of the UAV in the mth iteration of the SCA algorithm as q ( m ) = x R ( m ) , y R ( m ) , z R ( m ) , the communication rates between BS-R/n-R are R B S , R ( m ) / R n , R ( m ) , respectively. Let q ( m ) q ( m 1 ) = α R ( m ) , β R ( m ) , ε R ( m ) . According to [28], we can estimate the lower bounds R B S , R ( m ) , l b / R n , R ( m ) , l b / d E V E , R ( m ) , l b of R B S , R ( m ) / R n , R ( m ) / d E V E , R ( m ) by a first-order Taylor expansion, i.e.,
R B S , R ( m ) , l b = R B S , R ( m 1 ) a B S , R ( m 1 ) α ( m ) 2 + β ( m ) 2 + ε ( m ) 2 b B S , R ( m 1 ) α ( m ) c B S , R ( m 1 ) β ( m ) e B S , R ( m 1 ) ε ( m )
R n , R ( m ) , l b = R n , R ( m 1 ) a n , R ( m 1 ) ϑ n ( m ) ϑ n ( m 1 )
d E V E , R ( m ) , l b = d E V E , R ( m 1 ) + 2 x R ( m 1 ) S α ( m ) + 2 y R ( m 1 ) D β ( m ) + 2 z R ( m 1 ) ε ( m ) 2 r m k ϑ ( m ) ϑ ( m 1 )
where a B S , R ( m ) = P B S δ B S , R ln 2 d R , B S ( m ) 2 P B S δ B S , R + d R , B S ( m ) 2 , b B S , R ( m ) = 2 x R ( m ) a R , B S ( m ) , c B S , R ( m ) = 2 y R ( m ) a R , B S ( m ) , e B S , R ( m ) = 2 h R ( m ) a R , B S ( m ) , a n , R ( m ) = P n , R δ n ln 2 P n , R δ n + ϑ n .
Based on the above analysis, the SCA algorithm solves P1.1 at the mth iteration by transforming it as follows:
( P 1 . 1 . 1 )     max q ( m ) , ϑ n ( m ) , ϑ E V E ( m ) C sec = n L B n , R R n , R ( m ) , l b log 2 1 + P n , R δ n ϑ E V E ( m )
s . t . n Ω B n , R log 2 1 + P n , R δ n ϑ n ( m ) W R B S , R ( m ) , l b
n Ω B n , R log 2 1 + P n , R δ n ϑ E V E ( m ) W R B S , R ( m ) , l b
ϑ n ( m ) x n x R ( m ) , y n y R ( m ) , z R ( m ) 2 , n Ω
ϑ E V E ( m ) d E V E , R ( m ) , l b
( 8 d ) , ( 8 e ) , ( 8 h ) , ( 9 f )
P1.1.1 is a convex optimization problem, which can be solved by CVX. After obtaining the optimal solution q opt of P1.1.1, it will be used as the input for the next iteration. Finally, the optimization result q opt of the UAV trajectory can be obtained by several iterations. In summary, let X ( 0 ) = q ( 0 ) = x R ( 0 ) , y R ( 0 ) , z R ( 0 ) , X ( m 1 ) = q ( m 1 ) , X opt = q m opt , OP X = P 1.1 . 1 ; then, the subproblem of trajectory optimization can be solved by Algorithm 1.
Algorithm 1 SCA algorithm
1:
Initialize the location matrix X ( 0 ) , m = 1 , define maximum iteration M, tolerance of accuracy E , objective function values C sec ( 0 )
2:
Find the optimal solution X ( m ) to problem OP X by CVX, and calculate C sec ( m )
3:
If C sec ( m ) C sec ( m 1 ) ξ or m M
 
   Update m opt = m
4:
Output X opt = X m o p t
5:
Else
 
   Let m m + 1 , repeat 2

3.2. Power Allocation Optimization

In this subsection, we focus on the subproblem to find the optimal power allocation, while the UAV’s trajectory and bandwidth are fixed. Obviously, the function R E V E n = log 2 1 + P n , R δ n d E V E , R 2 is concave, so the optimization problem cannot be solved directly. Similar to P1.1.1, we use the SCA algorithm to solve it. Specifically, in the mth iteration, the upper bound R E V E n ( m ) , u b of R E V E n ( m ) can be estimated by the first-order Taylor expansion as follows
R E V E n ( m ) R E V E n ( m ) , u b = R E V E n ( m 1 ) + δ n / d E V E , R 2 1 + P n , R ( m 1 ) γ n / d E V E , R 2 P n , R ( m ) P n , R ( m 1 )
The optimization problem can be rewritten as
( P 1 . 2 ) max P , r n , ϑ E V E n C sec = n Ω B n , R ( m ) r n , R ( m ) R E V E n ( m ) , u b
s . t . n Ω r n ( m ) W R B S , R
n Ω B n , R R E V E n ( m ) , u b W R B S , R
( 8 g ) , ( 8 h )
P1.2 is then reduced to a convex programming problem and can be solved by CVX. Since the objective function and constraints contain the log ( · ) function, CVX processing requires a large number of approximation iterations [29]. In order to solve this problem, we introduce two sets of auxiliary variables ρ n , χ n , n Ω , and transform the constraints into LMI constraints or SOC constraints. Then, the optimization problem is expressed as
( P 1 . 2 . 1 )     max P , ρ n , χ n C sec = n Ω B n , R ( m ) ρ n ( m ) R E V E n ( m ) , u b
s . t . n Ω ρ n ( m ) W R B S , R
n Ω B n , R R E V E n ( m ) , u b W R B S , R
ρ n ( m ) r n l b , ( m ) , n Ω
1 χ n ( m ) P n , R ( m ) δ n d n , R 2 , n Ω
( 8 g ) , ( 8 h )
where r n l b , ( m ) is the lower bound obtained by performing a Taylor expansion on log 2 1 + 1 χ n ( m ) at χ n ( m 1 ) , i.e.,
r n l b , ( m ) = log 2 1 + 1 χ n ( m 1 ) 1 ln 2 1 χ n ( m 1 ) 1 + χ n ( m 1 ) χ n ( m ) χ n ( m 1 )
For the constraint (14e), it can be transformed into an SOC constraint by simple transformation, i.e.,
P n , R ( m ) , χ n ( m ) , d n , R 2 / δ n P n , R ( m ) + χ n ( m )
P1.2.1 is a simple second-order cone programming (SOCP) problem, which can also be solved by CVX effectively. In summary, let X ( 0 ) = P ( 0 ) , X ( m 1 ) = P ( m 1 ) , X opt = P m opt , OP X = P 1.2 . 1 ; then, the subproblem of power allocation optimization can be solved by Algorithm 1.

3.3. Bandwidth Allocation Optimization

This section investigates the optimization of bandwidth allocation with a fixed location of UAV and power allocation.
Similar to Section 3.2, in the iterative process using the SCA algorithm, we introduce auxiliary variables t n , μ n , n Ω to transform the constraints into LMI or SOC constraints. Then, the optimization problem is expressed as follows
( P 1 . 3 )     max B , t n , μ n C sec = n Ω t n ( m ) n Ω C E V E n ( m ) , u b
s . t . n Ω t n ( m ) W R B S , R
n Ω C E V E n ( m ) , u b W R B S , R
t n ( m ) μ n ( m ) τ n , R ( m ) , l b , n Ω
μ n ( m ) B n , R ( m ) , n Ω
( 8 f ) , ( 8 h )
where C E V E n ( m ) , u b is the upper bound obtained by the first-order Taylor expansion of C E V E n ( m ) = log 2 1 + P n , R β 0 n 0 B n , R ( m ) d E V E , R 2 at B n , R ( m 1 ) , and τ n , R ( m ) , l b is the lower bound obtained by the first-order Taylor expansion of τ n , R ( m ) = log 2 1 + P n , R β 0 n 0 B n , R ( m ) d n , R 2 at B n , R ( m 1 ) . C E V E n ( m ) , u b and τ n , R ( m ) , l b are approximated by the following convex quadratic functions:
C E V E n ( m ) , u b = C E V E n ( m 1 ) + log 2 1 + l n B n , R ( m 1 ) l n ln 2 τ n + B n , R ( m 1 ) B n , R ( m ) B n , R ( m 1 ) C E V E n ( m ) , l E V E n = P n , R β 0 n 0 d E V E , R 2
τ n , R ( m ) , l b = log 2 1 + l n B n , R ( m 1 ) 1 ln 2 l n B n , R ( m 1 ) τ n + B n , R ( m 1 ) B n , R ( m ) B n , R ( m 1 ) r n , R ( m ) , l n = P n , R β 0 n 0 d n , R 2
P1.3 is a simple SOCP problem, which can also be solved by CVX. In summary, let X ( m 1 ) = B ( m 1 ) , X opt = B m op , OP X = P 1.3 ; then, the subproblem of bandwidth optimization can be solved by Algorithm 1.

3.4. Joint Optimization Algorithm

Combining the analysis of the three subproblems, a joint optimization algorithm for secrecy capacity is proposed, which uses Alternating Iterative Optimization until the objective function converges.
  • Algorithm Complexity Analysis
(1) P1.1.1 mainly involves n 1 = N + 5 variables, i.e., α R ( m ) , β R ( m ) , ε R ( m ) , ϑ n , ϑ , ϑ E V E n Ω ;
(2) According to the definitions of LMI constraints and SOC constraints, (8d), (8e), (8h), and (11d) are the SOC constraints of dimension 4 with a total number of 3 N + 1 , and (11e) is an LMI constraint of dimension 5.
(3) Constraint (11b) can be simply expressed in the following form
a α R ( m ) + b 2 a , a β R ( m ) + c 2 a , a ε R ( m ) + e 2 a R n Ω B n , R log 2 1 + P n , R β 0 ϑ n ( m ) n 0 B n , R / W + b 2 4 a + c 2 4 a + e 2 4 a
Thus, (11b) is an SOC constraint of dimension 4. Similarly, (11c) is also an SOC constraint of dimension 4. Combining (2) and (3), it is known that P2.1 has a total of 3 N + 3 SOC constraints of dimension 4. In summary, we can see that Algorithm 1 contains one LMI constraint of dimension 5, 3 N + 3 SOC constraints of dimension 4, and one SOC constraint of dimension 3; thus, the complexity of the algorithm can be expressed as O 1 = n 1 6 N + 13 25 n 1 + 48 N + 182 + n 1 2 .
Similarly, the complexity of subproblems 2 and 3 are O 2 = n 2 7 N [ 3 N 3 + 3 N 2 n 2 + 2 n 2 N + 6 N + n 2 2 ] , n 2 = 3 N , O 3 = n 3 7 N 3 N 3 + 3 n 3 N 2 + 6 N n 3 + 10 N + n 3 2 , and n 3 = 3 N , respectively. In summary, the complexity of the joint optimization algorithm is o = K max O 1 + O 2 + O 3 .
  • Proof of convergence
Combined with [24], it can be seen that each subproblem obtains a lower bound on the original optimization problem, and the objective function is monotonically non-decreasing during the alternating iterations, i.e.
C sec q ( k ) , P ( k ) , B ( k ) C sec q ( k + 1 ) , P ( k ) , B ( k ) C sec q ( k + 1 ) , P ( k + 1 ) , B ( k ) C sec q ( k + 1 ) , P ( k + 1 ) , B ( k + l )
Thus, P1 can be obtained by Algorithm 2 with finite iterations to obtain a convergent solution.
Algorithm 2 Joint optimization of coordinate and resource allocation algorithm
1:
Initialize q ( 0 ) = x R ( 0 ) , y R ( 0 ) , z R ( 0 ) , P ( 0 ) , B ( 0 ) , C sec ( 0 ) , k = 0 , define maximum iteration K max , tolerance of accuracy ε
2:
while k K max & ( Δ > ε )
3:
Let P = P ( k ) , B = B ( k ) , solve problem (1) with Algorithm 1, find optimal coordinate q * = x R * , y R * , z R *
4:
Let q ( k + l ) = q * , B = B * , solve problem (2) with Algorithm 1, find optimal power allocation P *
5:
Let q ( k + l ) = q * , P ( k + 1 ) = P * , solve problem (3) with Algorithm 1, find optimal bandwidth allocation B *
6:
Update C sec ( k + 1 ) , Δ = C sec k + 1 C sec k / C sec k , let k = k + 1
7:
End while
8:
Output q ( k ) , P ( k ) , B ( k )

4. Simulation Results

In this section, we assume that the mobile users are randomly distributed in a circle area with the radius of 500 m, and d B S , c e n represents the distance between the center of the circle and the BS. Other simulation parameters are given in Table 1.
Figure 2 provides the secrecy capacity versus the number of iterations under different parameters, which can show the convergence characteristics of the proposed joint optimization algorithm. It can be seen that when the number of iterations is larger than 15, the secrecy capacity tends to be stable. Therefore, the proposed optimization algorithm has good convergence under different conditions. In addition, it can be seen that the number of iterations required for the convergence of the algorithm is mainly influenced by the convergence accuracy and the number of ground users. The number of iterations of the algorithm decreases with the value of ε . The number of iterations required for the algorithm to converge also increases with the number of ground users due to more variables being involved.
Considering the mobility of ground users, Figure 3a shows the trajectory of the UAV relay versus the network mobility to clearly describe the relationship between the UAV’s position and mobile users. Figure 3a shows that the center of the mobile user group makes a circular motion, and the number and coordinates of mobile users are randomly generated after each location update. From Figure 3a, the UAV’s height increases gradually with the distance between the mobile users and the BS. The reason is that the flight altitude of the UAV needs to be increased to raise the elevation angle between mobile users and UAV with the increasing communication distance so as to ensure the probability of LoS communication.
Figure 3b shows the projection of the UAV trajectory on the horizontal plane. For ease of elaboration, the projection of the UAV in horizontal plane is denoted as Q U A V , and the corresponding center of mobile users is denoted as Q c e n . It can be seen that Q U A V is always on the right side of Q c e n , which is influenced by the information causality constraint and the eavesdropper’s position. The offset between Q U A V and Q c e n is more pronounced when the ground user is far from the BS and close to the EVE.
To illustrate the effectiveness of the proposed designs, the proposed joint trajectory and communication resource optimization scheme is compared with other three benchmark schemes proposed in [15,24,30].
Scheme 1—The UAV is deployed at the center of mobile users. The height of UAV relay, bandwidth and power allocation are designed to maximize the secrecy communication capacity of this system [30].
Scheme 2—The transmission power and bandwidth are evenly allocated following the principle of fairness [24], and the 3D location of the UAV is optimized.
Scheme 3—With fixed altitude of the UAV relay [15], the 2D trajectory, power and bandwidth allocation are optimized, and the probability of LoS is considered in the simulation process.
From Figure 4, it can be seen that the secrecy capacity obtained by all schemes is decreasing with the distance between the BS and the center of mobile users increasing. This can be easily understood: as the communication distance increases, the signal experiences more fading, and the legitimate channel capacity will decrease. In addition, as the UAV moves far away from the BS, the distance between the UAV and the EVE decreases, causing an increase in eavesdropping channel capacity; then, the secrecy capacity decreases. In scheme 1, the UAV is always located in the mobile users’ center, and the downlink channel quality in the UAV-enabled relay system is better than other schemes at this time. However, this scheme ignores the impact on EVE and BS, resulting in the limitation of legitimate channel capacity by information causality constraint and the increasement of eavesdropping channel capacity. Scheme 2 shows that the power and bandwidth are evenly allocated based on the principle of fairness. For users with relatively poor channel quality, the allocation of the same communication resources cannot achieve the optimal overall performance. In scheme 3, UAV trajectory is optimized at a fixed altitude, which is difficult to ensure the reliability of LoS communication, so the system performance will be worse than the proposed algorithm.
Figure 5 shows the secrecy capacity C sec versus B max for different maximum available powers P max . It can be seen that at a certain value of P max , C sec firstly increases with B max and then remains constant. This is due to the fact that the relay communication process is limited by the information causality constraint; i.e., the maximum secrecy capacity of the system is constrained by the channel capacity between the BS and the UAV. In other words, increasing power and bandwidth cannot consistently improve the communication performance of the relay system.
Figure 6 shows the secrecy capacity of each mobile user under different schemes. For each mobile user, the algorithm proposed in the paper also has better performance than existing schemes. The reason is that the reliability of LoS communication is considered in the proposed optimization scheme, and we make full use of the location information to achieve dynamic multi-domain optimization. It can be seen that the proposed algorithm is more adaptable to the scenario of multiple mobile users.

5. Conclusions

In this paper, we investigate the secrecy capacity optimization problem when the UAV relay serves multiple mobile ground users in the presence of a malicious user eavesdropping on the ground. A joint optimization algorithm for trajectory design and resource allocation is proposed based on the proposed SCA-AIO algorithm. The secrecy capacity of the relay system is improved by jointly optimizing the UAV’s trajectory, power allocation, and bandwidth allocation while ensuring the reliability of LoS communication links, QoS requirements of users, and the information causality constraint. At the end of the paper, the effectiveness of the proposed optimization algorithm is demonstrated by numerical results. In addition, this paper reveals the impacts of different parameters on the system performance and the UAV trajectory trend of UAV relay with mobile ground users. In the text, to ensure the reliability of LoS communication, the UAV’s altitude changes drastically. Considering the limited energy of the UAV, the proposed optimization algorithm will affect the endurance of the UAV relay. In practical applications, it may be necessary to sacrifice some throughput performance to extend the endurance of the UAV. Futhermore, an energy efficiency (EE) maximization UAV trajectory design based on fly–hover will be the next step in our research to compromise the energy consumption and throughput in a UAV-enabled communication system.

Author Contributions

Q.A. researched the literature, built the model, derived the formulas, and carried out the simulations. She also finished the whole manuscript. Y.P. and H.H. (Hang Hu) revised the manuscript. H.H. (Huizhu Han) assisted with the integrity of the entire study. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 61901509).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Ranjha, A.; Georges, K. Quasi-Optimization of Distance and Blocklength in URLLC Aided Multi-Hop UAV Relay Links. IEEE Wirel. Commun. Lett. 2020, 9, 306–310. [Google Scholar] [CrossRef]
  2. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile unmanned aerial vehicles (UAVs) for energy-efficient Internet of Things communications. IEEE Trans. Wirel. Commun. 2017, 5, 1101–1112. [Google Scholar] [CrossRef]
  3. Vidit, S.; Joakim, J. Optimal UAV Base Station Trajectories Using Flow-Level Models for Reinforcement Learning. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 1101–1112. [Google Scholar]
  4. Qi, N.; Wang, M.; Wang, W. Energy Efficient Full-Duplex UAV Relaying Networks Under Load-Carry-and-Delivery Scheme. IEEE Access 2020, 8, 74349–74358. [Google Scholar] [CrossRef]
  5. Sharma, V.; Bennis, M.; Kumar, R. UAV-assisted heterogeneous networks for capacity enhancement. IEEE Commun. Lett. 2019, 20, 1207–1210. [Google Scholar] [CrossRef] [Green Version]
  6. Xue, Z.; Wang, J.; Ding, G.; Zhou, H.; Wu, Q. Maximization of data dissemination in UAV-supported internet of things. IIEEE Wirel. Commun. Lett. 2019, 8, 209–212. [Google Scholar] [CrossRef]
  7. Baichuan, L.; Weikun, Z.; Wuhui, C.; Huawei, H.; Song, G. Online Computation Offloading and Traffic Routing for UAV Swarms in Edge-Cloud Computing. IEEE Trans. Veh. Technol. 2020, 69, 8777–8791. [Google Scholar]
  8. Zhang, J.; Zeng, Y.; Zhang, R. Spectrum and energy efficiency maximization in UAV-enabled mobile relaying. In Proceedings of the IEEE International Conference on Communications (ICC), Pairs, France, 21–25 May 2017. [Google Scholar]
  9. Shakil, A.; Mostafa, Z.C.; Yeong, M.J. Energy-Efficient UAV Relaying Communications to Serve Ground Nodes. IEEE Commun. Lett. 2020, 24, 849–852. [Google Scholar]
  10. Zhang, S.; Zhang, H.; He, Q. Joint trajectory and power optimization for UAV relay networks. IEEE Commun. Lett. 2020, 22, 161–164. [Google Scholar] [CrossRef]
  11. Chen, Y.; Zhang, Z. UAV-aided secure transmission in MISOME wiretap channels with imperfect CSI. IEEE Access 2019, 7, 98107–98121. [Google Scholar] [CrossRef]
  12. Jia, Y.; Chao, Z.; Hong, L.; Gao, F.P.; Zhi, G.D. Secure UAV-to-UAV Systems With Spatially Random UAVs. IEEE Wirel. Commun. Lett. 2019, 8, 564–567. [Google Scholar]
  13. Liu, Y.; Chen, H. Artificial noisy MIMO systems under correlated scattering rayleigh fading—A physical layer security approach. IEEE Syst. J. 2020, 14, 2121–2132. [Google Scholar] [CrossRef] [Green Version]
  14. Pan, G.; Ye, J.; Ding, Z. On secure VLC systems with spatially random terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
  15. Sun, X.; Shen, C. Joint resource allocation and trajectory design for UAV-aided wireless physical layer security. In Proceedings of the 2018 IEEE Globecom Workshops, Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar]
  16. Cui, M.; Zhang, G.; Wu, Q. Robust trajectory and transmit power design for secure UAV communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef] [Green Version]
  17. Challita, U.; Saad, W. Interference management for cellular-connected UAVs: A deep reinforcement learning approach. IEEE Trans. Wirel. Commun. 2019, 18, 2125–2140. [Google Scholar] [CrossRef] [Green Version]
  18. Wang, X.; Feng, W. UAV swarm-enabled aerial CoMP: A physical layer security perspective. IEEE Access 2019, 7, 120901–120916. [Google Scholar] [CrossRef]
  19. Li, A.; Zhang, W.J.; Dou, S.T. UAV-Enabled Secure Data Dissemination via Artificial Noise: Joint Trajectory and Communication Optimization. IEEE Access 2020, 8, 102348–102356. [Google Scholar] [CrossRef]
  20. Dong, R.Z.; Wang, B.H.; Cao, K.R. Security Enhancement of UAV Swarm Enabled Relaying Systems with Joint Beamforming and Resource Allocation. China Commun. 2020, 18, 71–87. [Google Scholar] [CrossRef]
  21. Dong, R.Z.; Wang, B.H.; Cao, K.R.; Cheng, T.H. Securing Transmission for UAV Swarm-Enabled Communication Network. IEEE Syst. J. 2021, in press. [CrossRef]
  22. Zhang, G.C.; Wu, Q.Q.; Cui, M. Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 2019, 18, 1376–1389. [Google Scholar] [CrossRef] [Green Version]
  23. Li, Y.P.; Zhang, R.Q.; Zhang, J.H.; Gao, S.J.; Yang, L.Q. Cooperative Jamming for Secure UAV Communications with Partial Eavesdropper Information. IEEE Access 2019, 7, 94593–94603. [Google Scholar] [CrossRef]
  24. Zhen, X.; Qi, H.W.; Zhi, Y.F.; Cai, J.Z. Sum Rate Maximization in UAV-Enabled Mobile Relay Networks. In Proceedings of the International Conference on Wireless Communications and Signal Processing, Hangzhou, China, 18–20 October 2018. [Google Scholar]
  25. Yong, Z.; Rui, Z. Energy-Efficient UAV Communication with Trajectory Optimization. IEEE Trans. Wirel. Commun. 2017, 16, 3747–3760. [Google Scholar]
  26. Zeng, Y.; Zhang, R. Energy Minimization for Wireless Communication with Rotary-Wing UAV. IEEE Trans. Wirel. Commun. 2019, 18, 2329–2345. [Google Scholar] [CrossRef] [Green Version]
  27. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput maximization for UAV-enabled mobile relaying systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  28. Boyd, S.; Boyd, S.P. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  29. Grant, M.; Boyd, S.; Ye, Y. CVX: Matlab Software for Disciplined Convex Programming, Version 2.2. Available online: http://cvxr.com/cvx (accessed on 20 January 2020).
  30. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Mobile Internet of Things: Can UAVs provide an energy-efficient mobile architecture? In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016. [Google Scholar]
Figure 1. UAV-enabled relaying system model.
Figure 1. UAV-enabled relaying system model.
Sensors 22 04519 g001
Figure 2. Secrecy communication capacity vs. iterations. (a) N = 5, ε = 10 4 . (b) N = 10, B max = 10 MHz.
Figure 2. Secrecy communication capacity vs. iterations. (a) N = 5, ε = 10 4 . (b) N = 10, B max = 10 MHz.
Sensors 22 04519 g002
Figure 3. The trajectory of UAV relay versus the network mobility. (a) The 3D trajectory of UAV relay. (b) Plane projection of UAV trajectory.
Figure 3. The trajectory of UAV relay versus the network mobility. (a) The 3D trajectory of UAV relay. (b) Plane projection of UAV trajectory.
Sensors 22 04519 g003
Figure 4. System performance comparisons with distance between the BS and the center of mobile users.
Figure 4. System performance comparisons with distance between the BS and the center of mobile users.
Sensors 22 04519 g004
Figure 5. Secrecy communication capacity v.s B max with different values of P max .
Figure 5. Secrecy communication capacity v.s B max with different values of P max .
Sensors 22 04519 g005
Figure 6. Secrecy capacity of each mobile user under different schemes ( d B S , c e n = 2000 m ).
Figure 6. Secrecy capacity of each mobile user under different schemes ( d B S , c e n = 2000 m ).
Sensors 22 04519 g006
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValueParameterValue
W10 MHz P B S max 30 dbm
λ min 1 db n 0 −169 dbm/Hz
β 0 −22 dbm N 5
P max 10 dbm q EVE (6000, 0, 0)
ε LoS 0.95 ψ 11.95
d B S . c e n 2500 m
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

An, Q.; Pan, Y.; Han, H.; Hu, H. Secrecy Capacity Maximization of UAV-Enabled Relaying Systems with 3D Trajectory Design and Resource Allocation. Sensors 2022, 22, 4519. https://doi.org/10.3390/s22124519

AMA Style

An Q, Pan Y, Han H, Hu H. Secrecy Capacity Maximization of UAV-Enabled Relaying Systems with 3D Trajectory Design and Resource Allocation. Sensors. 2022; 22(12):4519. https://doi.org/10.3390/s22124519

Chicago/Turabian Style

An, Qi, Yu Pan, Huizhu Han, and Hang Hu. 2022. "Secrecy Capacity Maximization of UAV-Enabled Relaying Systems with 3D Trajectory Design and Resource Allocation" Sensors 22, no. 12: 4519. https://doi.org/10.3390/s22124519

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop