Next Article in Journal
Explainable AI Assisted IoMT Security in Future 6G Networks
Previous Article in Journal
Research on Advancing Radio Wave Source Localization Technology Through UAV Path Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers †

1
School of Software, Henan University, Kaifeng 475004, China
2
Henan International Joint Laboratory of Intelligent Network Theory and Key Technology, Kaifeng 475004, China
3
China Information Technology Designing and Consulting Institute Co., Ltd., Beijing 100048, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers, originally presented at 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
Future Internet 2025, 17(5), 225; https://doi.org/10.3390/fi17050225
Submission received: 16 April 2025 / Revised: 13 May 2025 / Accepted: 14 May 2025 / Published: 19 May 2025
(This article belongs to the Section Internet of Things)

Abstract

:
This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with multiple eavesdroppers, formulating the optimal UAV trajectory poses a non-convex and non-differentiable optimization challenge. The paper utilizes the successive convex approximation (SCA) method in conjunction with hypograph theory to address this challenge. First, a set of trajectory increment variables is introduced to replace the original UAV trajectory coordinates, thereby converting the original non-convex problem into a sequence of convex subproblems. Subsequently, hypograph theory is employed to convert these non-differentiable subproblems into standard convex forms, which can be solved using the CVX toolbox. Simulation results demonstrate the UAV’s trajectory fluctuations under different parameters, affirming that trajectory optimization significantly improves PLS performance in IoT systems.

1. Introduction

In recent years, the rapid advance of the Internet of Things (IoT) has led to ubiquitous connectivity among a vast number of smart devices, posing significant challenges to both the reliability and real-time performance of IoT communications. Unmanned aerial vehicles (UAVs), due to their flexible maneuverability and fast deployment capabilities, are progressively emerging as a pivotal enabler of IoT communication networks [1,2].
In IoT applications, UAVs may swiftly access target locations and establish solid line-of-sight (LoS) connections with ground terminals, significantly enhancing signal quality and data transmission efficacy. Furthermore, optimizing UAV trajectories enables IoT networks to attain superior energy efficiency and broader coverage. In [3,4], UAVs serve as airborne base stations, facilitating swift 3D deployment to ensure ubiquitous air-to-ground connection. In [5], UAV functions as a mobile relay, maintaining robust wireless connectivity for ground users in environments where line-of-sight (LoS) is hindered by physical obstructions such as buildings or trees. To address the resource allocation issue, Ref. [6] proposes enhancing the energy efficiency of beamforming in IoT systems by optimizing UAV trajectories. To address suboptimal channel state information (CSI), leveraging the inherent advantages of LoS connections established by UAVs is beneficial. In a reconfigurable intelligent surface (RIS)-assisted UAV communication environment, a three-dimensional geometric dynamic channel model and a deep-learning-based channel tracking method are developed, leading to a significant improvement in channel estimation precision [7]. The swift progression of IoT has led to UAVs becoming vital nodes for collecting, transferring, and relaying data, hence broadening their applications and enhancing their significance in interconnected systems. Nonetheless, UAVs encounter substantial communication security issues despite their considerable potential.
Specifically, UAV communication networks face several critical security challenges. Firstly, when a UAV functions as a lawful broadcaster, its air-to-ground LoS communication links, although advantageous for authorized receivers, simultaneously increase the risk of potential eavesdropping. Secondly, the elevated mobility of UAVs creates dynamic communication environments, allowing eavesdroppers to capitalize on channel fluctuations for malicious activities. Furthermore, the extensive utilization of UAVs in IoT communication services forces UAV networks to address not only traditional threats but also new risks stemming from device heterogeneity and network scalability, driven by the extensive interconnection of IoT devices and the continuous transmission of real-time data. The increased threat of eavesdropping exacerbates security weaknesses, highlighting the need for secure UAV network communications [8,9]. Existing research has provided numerous strategies to solve these challenges. For example, to address security risks in UAV networks, researchers have created a security protocol tailored for UAV-to-ground communication, exhibiting markedly improved security compared to conventional protocols [10]. Furthermore, to address the need for resource-efficient and lightweight solutions, a mutual authentication system utilizing physical unclonable functions (PUFs) has been implemented. This technique facilitates mutual authentication and user anonymity while maintaining comparatively low computing costs [11]. Additionally, to address the robustness deficiencies of existing lightweight encryption techniques, a lightweight symmetric encryption algorithm and key agreement mechanism based on SM4 have been presented, improving data transmission security [12]. Notwithstanding these developments, current lightweight encryption systems continue to demonstrate constraints regarding flexibility and authentication. Due to the inherent resource limitations of UAVs, proper resource usage is essential. Consequently, researchers have developed a blockchain-based distributed security solution specifically built for UAV computing networks. This system allows UAVs to independently manage authentication, attribute administration, and access control, while adaptively modifying access policies according to real-time network conditions, thereby enhancing both security and resource efficiency [13]. Although data encryption remains a pivotal focus in communication security research, its high cost, computational complexity, and reliance on stable channels make it challenging to ensure adequate security in resource-constrained and dynamic IoT environments. In contrast, as a supplementary approach to traditional encryption methods, physical layer security (PLS) techniques, founded upon information-theoretic security principles, provide significant advantages. With low computational overhead and no need for complex encryption or decryption operations, PLS is well-suited for resource-limited scenarios. By preventing eavesdroppers from extracting meaningful information while ensuring reliable communication, PLS has emerged as a critical approach for countering ground-based eavesdroppers and safeguarding UAV communication systems [14,15,16].
Investigating how to secure information transmission for UAVs in IoT environments is of critical importance. The introduction of PLS technology not only provides essential safeguards for data sharing in UAV networks, but also enhances communication reliability and security in the context of large-scale IoT device interconnectivity. In UAV secure communications, secrecy rate is recognized as the principal metric for assessing the effectiveness of physical layer security (PLS) systems. Secure UAV communication is deemed feasible when the received signal quality at the legitimate link exceeds that at all eavesdropping nodes [17]. Generally, studies on UAV-assisted secure communication can be categorized into two main directions: UAV-enabled secure communication [18,19] and UAV-aided secure cooperation [20,21]. Due to their ability to dynamically reposition in response to changing radio propagation environments, UAVs can establish highly efficient LoS communication links for legitimate users, making their deployment and trajectory optimization fundamental to PLS design. For instance, one study proposed a buffer-aided UAV secure communication system, where optimized UAV trajectories significantly improved the overall secrecy rate [22]. In UAV-assisted relay communication systems, the joint optimization of the base station’s transmit power and the UAV’s flight trajectory can significantly improve the secrecy rate of communications [23]. Short-packet communication and UAVs play pivotal roles in 5G and future wireless networks, particularly in scenarios with stringent latency requirements and security challenges. Accordingly, researchers have developed a secure SPC-IoT system leveraging UAVs as mobile decode-and-forward relays. By exploiting their agile 3D mobility, UAVs periodically receive and forward short packets from remote IoT devices in a two-hop manner, ensuring end-to-end secure and reliable transmission. This approach not only mitigates risks posed by ground-based eavesdroppers in uncertain locations, but also enhances the secrecy and reliability of SPC networks [24]. Multi-UAV cooperative PLS has also attracted significant attention. For example, a secure communication system assisted by two UAVs has been proposed to support the mobility of ground devices. By leveraging reinforcement learning to jointly optimize the UAVs’ trajectories and transmission rates, the system enables secure bidirectional communication [25]. Unlike conventional methods limited to unidirectional security with static devices, this work innovatively supports device mobility while ensuring mutual security between UAVs and ground nodes. PLS can be further strengthened by integrating interference injection and beamforming techniques. One study demonstrated that co-designing UAV jammer trajectories and transmit power can maximize the average achievable secrecy rate [26]. Energy efficiency is another critical consideration. A UAV-assisted amplify and forward relay network has been proposed, combining wireless energy harvesting with cooperative friendly jamming [27]. Here, a cluster of hovering UAVs not only relays information from ground sources to distant destinations, but also actively transmits jamming signals to eavesdroppers. Additionally, UAVs can form virtual antenna arrays to enable secure communication with ground terminals via beamforming, thereby improving secrecy rates [28]. In summary, PLS technology, when combined with UAVs’ flexible mobility and cost-effective deployment, offers robust support for securing large-scale IoT wireless networks. It also presents novel solutions to overcome the limitations of traditional encryption in resource-constrained environments.
However, research is still scarce for scenarios with multiple eavesdroppers in IoT systems, with insufficient exploration of effective countermeasures to address the security challenges presented by such multi-eavesdropper configurations. Most existing studies focus exclusively on single-eavesdropper scenarios, whereas real-world IoT deployments often involve multiple eavesdroppers distributed across different locations, significantly increasing the complexity of ensurting secure communication. Moreover, coordinated eavesdropping among multiple malicious nodes can substantially increase the risk of information leakage. To tackle these critical challenges, we expand upon our earlier work presented at the 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery [29]. In this paper, we introduce an innovative and efficient trajectory optimization algorithm tailored for multi-eavesdropper scenarios, aimed at strengthening UAV communication security within IoT networks. The main contributions of this study are summarized as follows:
  • A secure communication framework for IoT systems is introduced, incorporating UAVs alongside multiple eavesdropping entities. Through the optimization of UAV flight trajectories, we improve the worst-case secrecy rate, thereby augmenting physical layer security in environments with multiple eavesdropping nodes.
  • To mitigate the computational complexity of continuous trajectory optimization, we discretize the UAV trajectory into a limited collection of coordinate points and develop an optimization model based on these discrete coordinate variables.
  • To address the challenge of maximizing secrecy rates under the worst-case scenario, where the optimization problem is inherently non-convex and non-differentiable, we utilize SCA techniques and hypograph theory. By implementing a novel set of trajectory increment variables to replace the original UAV trajectory coordinates, we reformulate the initial non-convex problem into a set of convex subproblems. Moreover, by utilizing hypograph theory, we equivalently convert the non-differentiable subproblems into standard convex optimization formats, facilitating rapid resolution.
  • Simulation results indicate that under varied parameter conditions, the proposed method can efficiently evade multiple eavesdroppers with a low computational complexity while significantly improving the system’s physical layer security (PLS) performance. This validates the substantial impact of UAV trajectory optimization on improving PLS effectiveness.
The remainder of this article is organized as follows. Section 2 presents the system model and problem formulation. Section 3 introduces a novel and efficient trajectory optimization algorithm. Section 4 presents and analyzes the simulation results. Section 5 provides the conclusion. Finally, Section 6 discusses the future work.

2. System Model and Problem Formulation

This study investigates a secure UAV communication system within an Internet of Things environment, consisting of a communication destination and K potential eavesdroppers (Eves). The UAV initiates its mission at a designated starting point, transmits sensitive information to the communication destination during its flight, and ultimately reaches a specified endpoint. We assume that any of the K potential passive eavesdroppers may intercept the information intended for the communication destination. Therefore, UAV flight trajectories must be optimized to guarantee the security of UAV communication downlinks. Specifically, in this UAV-aided IoT communication system, the objective is to maximize the system’s achievable secrecy rate and ensure the security of the information received by the legitimate ground node.

2.1. System Model

Without loss of generality, the positions of all eavesdroppers, the communication destination, and the UAV are represented within a three-dimensional (3D) Cartesian coordinate system. As illustrated in Figure 1, in this UAV-aided IoT communication system, we assume that all K eavesdroppers (Eves) and the communication destination are located on the horizontal ground plane. Specifically, the set of eavesdroppers is defined as k K { 1 , , K } . The fixed horizontal positions of the k t h eavesdropper and the communication destination are denoted by W k = [ x k , y k ] T and W g = [ x g , y g ] T , respectively.
The UAV is assumed to maintain a constant flight altitude, denoted by H, throughout the entire flight duration T. The UAV’s instantaneous horizontal position at time t is denoted by U q [ t ] = [ x q ( t ) , y q ( t ) ] , where 0 t T . To simplify the trajectory design, the continuous flight time T is uniformly divided into N time slots of equal duration, each with a length of δ t = T / N . The number of time slots N is chosen to be sufficiently large so that the UAV’s position can be approximated as constant within each interval. Consequently, the UAV’s trajectory is discretized into N anchor points, each representing its horizontal position at the corresponding time slot. The resulting discrete trajectory is denoted as U q [ n ] = [ x q ( n ) , y q ( n ) ] T , where n N { 1 , 2 , , N } .
The UAV’s horizontal positions at the initial and final time instances of the total flight duration T are denoted by U q [ I ] = [ x q ( I ) , y q ( I ) , H ] T and U q [ F ] = [ x q ( F ) , y q ( F ) , H ] T , respectively. Accordingly, the Euclidean distance between the UAV and the communication destination at time slot n is given by
d u g ( n ) = U q [ n ] W g 2 + H 2 , n N ,
Here, · represents the Euclidean norm. Likewise, the Euclidean distance between the UAV and the k t h eavesdropper at time slot n is expressed as
d u k ( n ) = U q [ n ] W k 2 + H 2 , k K , n N .
When the UAV operates at a higher altitude in environments with minimal obstructions, the wireless channels between the UAV and both the communication destination and the eavesdroppers are predominantly LoS, and the widely adopted free-space path loss model is employed. Accordingly, the channel power gain between the UAV and the communication destination at time slot n can be expressed as
h u g ( n ) = ρ 0 d u g 2 ( n ) = ρ 0 U q [ n ] W g 2 + H 2 , n N ,
Likewise, the channel power gain between the UAV and the k t h eavesdropper at time slot n is expressed as
h u k ( n ) = ρ 0 d u k 2 ( n ) = ρ 0 U q [ n ] W k 2 + H 2 , k K , n N .
where ρ 0 denotes the reference channel power gain measured at a distance of 1 m.
Furthermore, let v max (m/s) denote the UAV’s maximum allowable speed during any time slot. Accordingly, the maximum permissible flight distance within a single time slot is expressed as L max = δ t v max . Moreover, to regulate velocity transitions between consecutive time slots, the UAV has a maximum allowable acceleration, denoted as a max . Therefore, the UAV’s mobility constraints can be formulated as follows:
U q [ n ] U q [ n 1 ] 2 L max 2 , n = 2 , , N ,
U q [ 1 ] U q [ I ] 2 L max 2 ,
U q [ F ] U q [ N ] 2 L max 2 ,
U q ( n + 1 ) 2 U q ( n ) + U q ( n 1 ) 2 a max δ t 2 , n = 2 , , N 1 .
Accordingly, the instantaneous data transmission rate between the UAV and the communication destination at time slot n is expressed as
R g ( n ) = log 2 1 + h u g ( n ) p σ 2 ,
where σ 2 denotes the noise power of the additive white Gaussian noise (AWGN) at the ground communication destination, and p denotes the UAV’s instantaneous transmit power.
Likewise, the instantaneous information leakage rate to the k t h eavesdropper at time slot n is given by
R k ( n ) = log 2 1 + h u k ( n ) p σ 2 .
Consequently, the achievable secrecy rate at the communication destination during the n t h time slot is defined as
R g sec ( n ) = R g ( n ) R k ( n ) + ,
where [ x ] + max { 0 , x } .

2.2. Problem Formulation

The study aims to enhance physical layer security in an IoT communication system with multiple eavesdroppers by optimizing the UAV’s flight trajectory. Considering the worst-case scenario in confidential transmission, our objective is to maximize the minimum security rate at the communication destination. Accordingly, the original optimization problem is formulated as follows:
P 0 : max { x q ( n ) , y q ( n ) } min k n = 1 N R g sec ( n ) s . t . ( 5 ) ( 8 ) .
It is noteworthy that, due to Equation (12), problem P 0 is an inherently non-convex optimization problem. Thus, directly solving this problem poses great computational challenges. To simplify this, the original problem will be transformed and reformulated in the following section, enabling an optimal solution to be derived using convex optimization techniques.

3. Trajectory Optimization

In this section, we introduce a new set of auxiliary variables to reformulate the original optimization problem. Subsequently, we derive the lower bounds for Equations (9) and (10). However, the reformulated problem remains non-differentiable and, thus, intractable using standard convex optimization methods. To overcome this problem, we apply hypograph theory to further transform the problem into a standard convex form, which can be solved easily.

3.1. Change of Variables

To overcome the non-convexity associated with direct UAV trajectory optimization, we reformulate the problem by discarding the direct treatment of the coordinate U q [ n ] as an independent variable. Instead, we iteratively refine the trajectory through incremental updates, representing each coordinate as a correction to the previous iteration’s position ( x q i 1 ( n ) , y q i 1 ( n ) ) . Consequently, in the n t h time slot, the updated trajectory coordinate in the i t h iteration are given by
x q i ( n ) = x q i 1 ( n ) + Δ x i 1 ( n ) ,
y q i ( n ) = y q i 1 ( n ) + Δ y i 1 ( n ) .
Let ( Δ x i ( n ) , Δ y i ( n ) ) denote the trajectory displacement increments at the n t h point during the i 1 t h iteration in the positive x and y directions. For notational clarity, we define x q 0 = x q i 1 ( n ) , y q 0 = y q i 1 ( n ) , and introduce auxiliary rate variables R ˜ g i ( n ) and R ˜ k i ( n ) . By applying a lower bound approximation of the legitimate receiver’s rate around ( x q 0 , y q 0 ) , the transmission rate is approximated as
R ˜ g i ( n ) R g i 1 ( n ) f g i 1 ( n ) Δ x i 1 ( n ) 2 + Δ y i 1 ( n ) 2 2 ( x q 0 x g ) f g i 1 ( n ) Δ x i 1 ( n ) 2 ( y q 0 y g ) f g i 1 ( n ) Δ y i 1 ( n ) ,
where
f g i 1 ( n ) = p ln 2 ρ 0 1 σ 2 d u g i 1 ( n ) 4 + p d u g i 1 ( n ) 2 0 .
Similarly, the concave lower bound approximation of the k t h eavesdropper’s rate can be formulated as follows:
R ˜ k i ( n ) R k i 1 ( n ) f k i 1 ( n ) Δ x i 1 ( n ) 2 + Δ y i 1 ( n ) 2 2 ( x q 0 x k ) f k i 1 ( n ) Δ x i 1 ( n ) 2 ( y q 0 y k ) f k i 1 ( n ) Δ y i 1 ( n ) ,
where
f k i 1 ( n ) = p ln 2 ρ 0 1 σ 2 d u k i 1 ( n ) 4 + p d u k i 1 ( n ) 2 0 .
Furthermore, the UAV’s mobility constraints are re-expressed as quadratic norm inequalities, as follows:
U q [ n ] + Q ( n ) U q [ n 1 ] Q ( n 1 ) 2 ( L m a x ) 2 , n = 2 , , N ,
U q [ 1 ] + Q ( 1 ) U q [ I ] 2 ( L m a x ) 2 ,
U q [ F ] Q ( N ) U q [ N ] 2 ( L m a x ) 2 ,
U q ( n + 1 ) + Q ( n + 1 ) 2 U q ( n ) 2 Q ( n ) + U q ( n 1 ) + Q ( n 1 ) 2 a max · δ t 2 , n = 2 , , N 1 .
where Q ( n ) = ( Δ x ( n ) , Δ y ( n ) ) . Accordingly, in the i th iteration, the lower bound of problem P 0 is reformulated as follows:
P 0 ( i ) : max { Δ x ( n ) , Δ y ( n ) } , { R g i ( n ) , R k i ( n ) } min k n = 1 N R g s e c ( n )
s . t . R g i ( n ) R ˜ g i ( n ) , n = 1 , , N ,
R k i ( n ) R ˜ k i ( n ) , k = 1 , , K , n = 1 , , N ,
s . t . ( 17 ) ( 20 ) .
The lower bounds R ˜ g i ( n ) and R ˜ k i ( n ) , derived in Equations (15a) and (16a) are concave quadratic functions of the trajectory increment variables ( Δ x , Δ y ) . Consequently, under the increment-variable framework, the reformulated problem P 0 ( i ) satisfies the convexity requirements. Once expressed in a differentiable form, it can be efficiently solved using standard convex optimization techniques. In the subsequent section, hypograph theory is employed to transform P 0 ( i ) into a standard convex optimization problem.

3.2. Hypograph

Defining f n = 1 N R g s e c , i ( n ) , the hypograph of Equation (21) is defined as
hypo f = { Δ x ( n ) , Δ y ( n ) , R g i ( n ) , R k i ( n ) } , R * | f R * .
We know that hypo f is a convex set, as n = 1 N R g s e c , i ( n ) is a linear function. Then, we can form the hypograph problem as follows:
P 1 ( i ) : max { ( Δ x ( n ) , Δ y ( n ) ) , R * ( n ) } , { R g i ( n ) , R k i ( n ) } R *
s . t . ( 17 ) ( 20 ) , ( 22 ) ( 23 )
The reformulated problem P 1 ( i ) constitutes a standard convex quadratic program, and can be efficiently solved using existing solvers such as CVX (version 2.2), a MATLAB (R2024a) toolbox specifically designed for convex optimization.

4. Simulation Results

The simulation results presented in this section demonstrate the effectiveness of UAV trajectory optimization in enhancing the secrecy rate of the UAV-aided IoT secure communication system. The simulation consists of two parts. First, we present several UAV trajectories under different v m a x and show how the UAV’s instantaneous speed changes over time. In the second part, we analyze the impact of UAV mobility constraints on the secrecy rate and validate the convergence of the secrecy rate.
In the simulation, the UAV’s transmit power is set to p = 20 dBm and the power spectral density of the AWGN is fixed at 174 dBm / Hz . The communication bandwidth is defined as 1 MHz . The UAV operates at a constant altitude of 100 m throughout a total flight duration of 100 s . Additionally, the UAV’s acceleration is assumed to be 2 m / s 2 . The horizontal coordinates of the three eavesdroppers are fixed at W 1 = [ 300 , 50 ] T , W 2 = [ 50 , 100 ] T , and W 3 = [ 20 , 250 ] T , respectively. The communication destination is fixed at W g = [ 200 , 200 ] T , and UAV’s initial and final horizontal positions are specified as U q [ I ] = [ 0 , 0 ] T and U q [ F ] = [ 400 , 0 ] T , respectively.

4.1. UAV Trajectories

Figure 2 illustrates the optimal UAV trajectories obtained under various speed constraints, with the objective of maximizing the secrecy rate. During the initial phase of flight, the UAV rapidly approaches the communication destination, as closer proximity enhances the secrecy rate. However, after passing the node, the UAV exhibits different trajectory behaviors depending on the speed constraints. To enhance secrecy performance, the UAV dynamically adjusts its trajectory to reduce its exposure to eavesdroppers while maintaining effective communication with the intended destination. Ultimately, within the constraints of the total mission duration, the UAV completes its transmission task and proceeds to the designated endpoint.
As shown in Figure 3, the UAV initially flies toward the communication destination at its maximum speed. Then, the speed decreases significantly, as proximity to the communication destination facilitates more secure transmission. Subsequently, the UAV undergoes two acceleration phases to reach positions favorable for secure communication, interspersed with brief periods of deceleration. After reaching the farthest location that still supports secure transmission, the UAV proceeds to the endpoint at a relatively high speed.

4.2. Secrecy Rate Versus Iteration Number and UAV Speed

As shown in Figure 4, the secrecy rate of the secure communication system converges rapidly as the number of iterations of P 1 ( i ) increases. The secrecy rate of the secure communication system converges rapidly, typically within about two to three iterations. In addition, the UAV’s maximum speed v m a x has an impact on the secure transmission performance. Specifically, a higher maximum UAV speed results in a greater achievable secrecy rate. This is because a higher UAV speed allows for increased trajectory design flexibility, thereby improving its capability to evade potential eavesdropping threats.
Finally, we observed whether the secrecy rate reaches a saturation point as the UAV’s speed increases. In Figure 5, we find that when the UAV speed increases to a relatively large value, the secrecy rate gradually stops increasing. Therefore, when the UAV speed is large, it is not necessary to keep increasing the speed of UAV to secure transmission.

5. Conclusions

In this paper, we investigate trajectory optimization to enhance physical layer security in a UAV-aided IoT communication system. We formulated the problem of optimizing the UAV’s trajectory to ensure secure transmission in the presence of multiple eavesdroppers. A novel set of trajectory increment variables was introduced to replace the discretized UAV trajectory coordinates, thereby transforming the original non-convex problem into a sequence of convex subproblems. These non-differentiable sub-problems were then equivalently converted into standard convex forms using hypograph theory. Finally, we solved these problems using the CVX toolbox. The simulation results show how the UAV adjusts its trajectory to approach the communication destination while avoiding eavesdroppers under different system parameters. The significant impact of trajectory optimization on enhancing physical layer security performance is clearly verified. Moreover, we found that the achievable secrecy rate converges rapidly, and a higher maximum UAV speed benefits the UAV-aided IoT secure communication system.

6. Future Work

This study focuses on addressing the theoretical problem of maximizing physical-layer security through UAV trajectory optimization in the presence of multiple eavesdroppers. The primary contribution of this work lies in the design of the optimization algorithm. In future work, we plan to extend the proposed algorithm to real-world scenarios, where we will consider the design of the UAV security system’s network architecture, the integration of hardware and software, and the deployment of the algorithm within this system.

Author Contributions

Supervision, L.S.; project administration, L.S. and G.W.; methodology, L.S. and X.H.; funding acquisition, L.S., G.W. and X.H.; Writing—original draft, L.S. and J.N.; writing—review and editing, J.N. and G.W.; visualization, J.N. and M.L.; validation, J.N.; software, L.S. and J.N.; data curation, M.L. and Q.Z.; formal analysis, G.W. and X.H.; conceptualization, X.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was financially supported by the National Natural Science Foundation of China (nos. 92467103 and 92367302), the Henan Provincial Department of Transportation (no.2023-3-2), the Henan Provincial Science and Technology Research Project (nos. 252102210176 and 252102210232), and the Foundation of Henan Educational Committee (nos. 25A510015 and 25A520008).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Author Qiankun Zhang was employed by China Information Technology Designing and Consulting Institute Co., Ltd., he declares no conflict of interest. The remaining authors declare that there are no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
UAVUnmanned Aerial Vehicle
LoSline-of-sight
BSbase stations
RISreconfigurable intelligent surface
CSIchannel state information
PLSphysical layer security
SCAsuccessive convex approximation

References

  1. Subrahmanyam, V.; Sagar, M.; Balram, G.; Ramana, J.V.; Tejaswi, S.; Mohammad, H.P. An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). In Proceedings of the 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT), Vellore, India, 3–4 May 2024; pp. 1–4. [Google Scholar]
  2. Gu, X.; Zhang, G. A Survey on UAV-Assisted Wireless Communications: Recent Advances and Future Trends. Comput. Commun. 2023, 208, 44–78. [Google Scholar] [CrossRef]
  3. Wen, X.; Ruan, Y.; Li, Y.; Xia, H.; Zhang, R.; Wang, C.; Liu, W.; Jiang, X. Improved Genetic Algorithm Based 3-D Deployment of UAVs. J. Commun. Netw. 2022, 24, 223–231. [Google Scholar] [CrossRef]
  4. Luo, X.; Xie, J.; Xiong, L.; Wang, Z.; Tian, C. 3-D Deployment of Multiple UAV-Mounted Mobile Base Stations for Full Coverage of IoT Ground Users with Different QoS Requirements. IEEE Commun. Lett. 2022, 26, 3009–3013. [Google Scholar] [CrossRef]
  5. Safwat, N.E.-D.; Hafez, I.M.; Newagy, F. 3D Placement of a New Tethered UAV to UAV Relay System for Coverage Maximization. Electronics 2022, 11, 385. [Google Scholar] [CrossRef]
  6. Tran, D.-H.; Chatzinotas, S.; Vu, T.X.; Ottersten, B. UAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1621–1637. [Google Scholar] [CrossRef]
  7. Yu, J.; Liu, X.; Gao, Y.; Zhang, C.; Zhang, W. Deep Learning for Channel Tracking in IRS-Assisted UAV Communication Systems. IEEE Trans. Wirel. Commun. 2022, 21, 7711–7722. [Google Scholar] [CrossRef]
  8. Mekdad, Y.; Aris, A.; Babun, L.; Fergougui, A.E.; Conti, M.; Lazzeretti, R.; Uluagac, A.S. A Survey on Security and Privacy Issues of UAVs. Comput. Netw. 2023, 224, 109626. [Google Scholar] [CrossRef]
  9. Khan, M.A.; Kumar, N.; Alsamhi, S.H.; Barb, G.; Zywiołek, J.; Ullah, I.; Noor, F.; Shah, J.A.; Almuhaideb, A.M. Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review. IEEE Trans. Netw. Serv. Manag. 2025, 22, 892–912. [Google Scholar] [CrossRef]
  10. Wang, D.; Cao, Y.; Lam, K.-Y.; Hu, Y.; Kaiwartya, O. Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication. IEEE Internet Things J. 2024, 11, 20457–20472. [Google Scholar] [CrossRef]
  11. Zhang, L.; Xu, J.; Obaidat, M.S.; Li, X.; Vijayakumar, P. A PUF-based Lightweight Authentication and Key Agreement Protocol for Smart UAV Networks. IET Commun. 2021, 16, 1142–1159. [Google Scholar] [CrossRef]
  12. Li, T.; Zhang, J.; Obaidat, M.S.; Lin, C.; Lin, Y.; Shen, Y.; Ma, J. Energy-Efficient and Secure Communication Toward UAV Networks. IEEE Internet Things J. 2022, 9, 10061–10076. [Google Scholar] [CrossRef]
  13. Wang, J.; Jiao, Z.; Chen, J.; Hou, X.; Yang, T.; Lan, D. Blockchain-Aided Secure Access Control for UAV Computing Networks. IEEE Trans. Netw. Sci. Eng. 2024, 11, 5267–5279. [Google Scholar] [CrossRef]
  14. Illi, E.; Qaraqe, M.; Althunibat, S.; Alhasanat, A.; Alsafasfeh, M.; De Ree, M.; Mantas, G.; Rodriguez, J.; Aman, W.; Al-Kuwari, S. Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Commun. Surv. Tutor. 2024, 26, 347–388. [Google Scholar] [CrossRef]
  15. Xu, F.; Ahmad, S.; Khan, M.N.; Ahmed, M.; Raza, S.; Khan, F.; Ma, Y.; Khan, W.U. Beyond Encryption: Exploring the Potential of Physical Layer Security in UAV Networks. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101717. [Google Scholar] [CrossRef]
  16. Khan, W.U.; Lagunas, E.; Ali, Z.; Javed, M.A.; Ahmed, M.; Chatzinotas, S.; Ottersten, B.; Popovski, P. Opportunities for Physical Layer Security in UAV Communication Enhanced with Intelligent Reflective Surfaces. IEEE Wirel. Commun. 2022, 29, 22–28. [Google Scholar] [CrossRef]
  17. Xu, Y.; Xie, H.; Li, D.; Hu, R.Q. Energy-Efficient Beamforming for Heterogeneous Industrial IoT Networks With Phase and Distortion Noises. IEEE Trans. Ind. Informat. 2022, 18, 7423–7434. [Google Scholar] [CrossRef]
  18. Na, Z.; Ji, C.; Lin, B.; Zhang, N. Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE Internet Things J. 2022, 9, 16284–16296. [Google Scholar] [CrossRef]
  19. Chen, Y.; Liu, G.; Zhang, Z.; He, L.; He, S. Improving Physical Layer Security for Multi-UAV Systems Against Hybrid Wireless Attacks. IEEE Trans. Veh. Technol. 2024, 73, 7034–7048. [Google Scholar] [CrossRef]
  20. Wang, Z.; Guo, J.; Chen, Z.; Yu, L.; Wang, Y.; Rao, H. Robust Secure UAV Relay-Assisted Cognitive Communications with Resource Allocation and Cooperative Jamming. J. Commun. Netw. 2022, 24, 139–153. [Google Scholar] [CrossRef]
  21. Liu, Z.; Zhu, B.; Xie, Y.; Ma, K.; Guan, X. UAV-Aided Secure Communication With Imperfect Eavesdropper Location: Robust Design for Jamming Power and Trajectory. IEEE Trans. Veh. Technol. 2024, 73, 7276–7286. [Google Scholar] [CrossRef]
  22. Lee, J.H.; Park, K.H.; Ko, Y.C.; Alouini, M.-S. Throughput Maximization of Mixed FSO/RF UAV-Aided Mobile Relaying with a Buffer. IEEE Trans. Wirel. Commun. 2021, 20, 683–694. [Google Scholar] [CrossRef]
  23. Nguyen, T.T.; Tran, M.H.; Tran, X.N. Joint Resource and Trajectory Optimization for Secure UAV-Based Two-Way Relay System. Digital Signal Process. Digit. Signal Process. 2024, 153, 104626. [Google Scholar] [CrossRef]
  24. Mamaghani, M.T.; Zhou, X.; Yang, N.; Swindlehurst, A.L. Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design. IEEE Trans. Wirel. Commun. 2023, 23, 7802–7815. [Google Scholar] [CrossRef]
  25. Kang, H.; Chang, X.; Mišic, V.B. Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization. IEEE Trans. Veh. Technol. 2022, 71, 10570–10583. [Google Scholar] [CrossRef]
  26. Lei, H.; Meng, D.; Ran, H.; Park, K.H.; Pan, G.; Alouini, M.S. Multi-UAV Trajectory Design for Fair and Secure Communication. IEEE Trans. Cognit. Commun. Netw. 2024. [Google Scholar] [CrossRef]
  27. DangNgoc, H.; Nguyen, D.N.; HoVan, K.; Hoang, D.T.; Dutkiewicz, E.; Pham, Q.V.; Hwang, W.J. Secure Swarm UAV-Assisted Communications with Cooperative Friendly Jamming. IEEE Internet Things J. 2022, 9, 25596–25611. [Google Scholar] [CrossRef]
  28. Li, J.; Sun, G.; Kang, H.; Wang, A.; Liang, S.; Liu, Y.; Zhang, Y. Multi-Objective Optimization Approaches for Physical Layer Secure Communications Based on Collaborative Beamforming in UAV Networks. IEEE/ACM Trans. Netw. 2023, 31, 1902–1917. [Google Scholar] [CrossRef]
  29. Zhang, H.; Shen, L.; Wang, N.; Mu, X. UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers. In Proceedings of the 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Suzhou, China, 14–16 October 2022; pp. 289–293. [Google Scholar]
Figure 1. UAV-aided secure communication model against eavesdropping in an IoT scenario.
Figure 1. UAV-aided secure communication model against eavesdropping in an IoT scenario.
Futureinternet 17 00225 g001
Figure 2. The UAV trajectory maximizes the secrecy rate.
Figure 2. The UAV trajectory maximizes the secrecy rate.
Futureinternet 17 00225 g002
Figure 3. The UAV’s instantaneous speed changes over time.
Figure 3. The UAV’s instantaneous speed changes over time.
Futureinternet 17 00225 g003
Figure 4. The minimum average secrecy rate versus the number of iterations.
Figure 4. The minimum average secrecy rate versus the number of iterations.
Futureinternet 17 00225 g004
Figure 5. The secrecy rate versus UAV maximum speed.
Figure 5. The secrecy rate versus UAV maximum speed.
Futureinternet 17 00225 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shen, L.; Nie, J.; Li, M.; Wang, G.; Zhang, Q.; He, X. Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers. Future Internet 2025, 17, 225. https://doi.org/10.3390/fi17050225

AMA Style

Shen L, Nie J, Li M, Wang G, Zhang Q, He X. Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers. Future Internet. 2025; 17(5):225. https://doi.org/10.3390/fi17050225

Chicago/Turabian Style

Shen, Lingfeng, Jiangtao Nie, Ming Li, Guanghui Wang, Qiankun Zhang, and Xin He. 2025. "Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers" Future Internet 17, no. 5: 225. https://doi.org/10.3390/fi17050225

APA Style

Shen, L., Nie, J., Li, M., Wang, G., Zhang, Q., & He, X. (2025). Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers. Future Internet, 17(5), 225. https://doi.org/10.3390/fi17050225

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop