Next Article in Journal
CRT-Based Clock Synchronization for Millimeter-Wave Communication with Asymmetric Propagation Delays
Next Article in Special Issue
Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks
Previous Article in Journal
Application of Gray Wolf Particle Filter Algorithm Based on Golden Section in Wireless Sensor Network Mobile Target Tracking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Optimization of User Scheduling, Flight Path and Power Allocation in a UAV Secure Communication System

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
School of Computer Science, Xi’an Shiyou University, Xi’an 710065, China
3
School of Electronics and Control Engineering, Chang’an University, Xi’an 710064, China
4
School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(13), 2443; https://doi.org/10.3390/electronics13132443
Submission received: 28 April 2024 / Revised: 29 May 2024 / Accepted: 11 June 2024 / Published: 21 June 2024
(This article belongs to the Special Issue 5G Technology for Internet of Things)

Abstract

:
In the future network, the data traffic increases rapidly and users’ communication service needs are diversified. The application of unmanned aerial vehicles (UAVs) in communication effectively relieves the pressure of ground communication equipment. However, the UAV-assisted communication also faces many challenges. Due to the broadcast and open characteristics of the UAV communication channel in the wireless network, it is easily subject to eavesdropping, so secure and efficient communication is hard to guarantee. In order to improve the security of the UAV communication system, this paper studies the secure communication system of a UAV as a base station to assist wireless network communication. In this system, the UAV, as an airborne mobile base station, transmits confidential information to multiple users on the ground, and there is an eavesdropper around the users. The optimization problem of joint user communication scheduling, UAV flight path, and power allocation is established to maximize the minimum secrecy rate of the system. Considering the constraints of user service quality, UAV flight path, and transmit power, the optimization problem is a nonconvex problem and the solution complexity is extremely high. Therefore, we propose an efficient iterative algorithm, jointly considering the block coordinate descent method and the successive convex approximation technique. Simulation results verify the correctness of the theoretical analysis, and further show that this scheme significantly improves the minimum secrecy rate of the system compared with other benchmark schemes.

1. Introduction

With advantages of low cost, high mobility, and rapid deployment, unmanned aerial vehicles (UAVs) have been widely utilized in the field of wireless communication, such as aerial base stations [1,2,3], wireless sensor networks [4,5,6], and aerial relay [7,8,9]. Although the line-of-sight (LoS) wireless link provides better communication quality in UAV communication, it also makes UAV transmission signals vulnerable to eavesdropping by illegal nodes on the ground, which will lead to the leakage of confidential information and the decline in communication quality. Therefore, determining how to ensure the security of information transmission in the UAV communication is a challenging task.
At present, UAV flight path design combined with physical layer security technology is deemed a promising solution. The authors of [10] studied a UAV-assisted relay wireless network with caching. Considering the presence of an eavesdropper (Eve), the maximum secrecy rate of the system was obtained by optimizing the UAV flight path. In [11], considering the security relay network with multiple Eves, the secrecy rate of the system was improved by jointly designing the transmission beamforming and artificial noise under the constraint of UAV transmit power. Based on [10,11], a jamming UAV was introduced to interfere with Eves in [12,13], and the secrecy rate of the system was improved by jointly optimizing the transmit power and flight paths of two UAVs. Furthermore, in [14], to counteract Eves, the authors proposed a scheme of combining UAV flight path optimization with transmit power control to maximize the average secrecy rate of the communication system. Nonorthogonal multiple access (NOMA), which is a promising technique, has also been introduced into the UAV security communication system. Thus, the authors proposed an NOMA-aided UAV communication scheme in [15], which used UAV together with the NOMA technique to generate artificial interference to ensure the system’s safety and improve the throughput of users. In [16], a UAV-enabled NOMA system was studied, and a joint power allocation and aerial jamming scheme was proposed to achieve reliable and secure communication in the presence of a malicious Eve. Due to the high transmit power for weak users in NOMA, a power allocation scheme for an NOMA-UAV network with circular flight path was proposed to maximize the sum rate of common users and ensure the safety of specific users in [17]. While improving the safe communication, the energy consumption of communication system should be reduced. In [18], a scenario of UAV-assisted joint sensing and communication system was considered, and the system safety and energy efficiency was maximized by optimizing the sensing and transmit time as well as the location of the UAV. The max–min optimization problem in secure communications has been studied. A cooperative UAV was introduced to send artificial noise to confuse malicious Eves in [19], and the worst-case secrecy rate of all time slots was maximized by jointly designing the 3D trajectory and time allocation of the UAV. In [20,21], the energy efficiency was maximized under the constraints of SOP (secrecy outage probability), phase shift, and transmission power while ensuring the worst-case security performance.
Although lots of works study the UAV relay security network, few works consider the UAV mobile base station security network. In [22], as an aerial platform, UAV communicated with ground users. The time to complete tasks was minimized by optimizing the flight path and communication resource allocation design of the UAV. In [23], the average transmit power consumed by users was minimized by dynamically optimizing user association and transmit power allocation in each time slot. In [24], the authors considered the coverage of UAV, heterogeneous QoS and backhaul link rate constraints, and optimized UAV flight path to maximize the total rate of ground users. They all only considered the situation that UAV was used as an air base station for communication, but ignored security issues. In addition, the system throughput was improved by optimizing the UAV flight path, but the communication quality of all ground users was not taken into account.
Different from the previous research, this paper considers the secure transmission scenario of a UAV as a mobile base station to assist wireless network communication, and studies how to comprehensively consider the wireless resource allocation and flight path optimization in the network to maximize the minimum secrecy rate of the system. The main contributions are summarized as follows:
A joint optimization scheme of user scheduling, UAV flight path, and transmit power control is proposed. In the proposed optimization scheme, firstly, the relationship between UAV position and air–ground communication channel is deeply analyzed, and a time-varying channel model is established. Then, the optimization problem of maximizing the minimum secrecy rate of the system is formulated.
Given that the objective function of the optimization problem is a multivariate nonconvex function, and the problem includes numerous nonconvex constraints, it presents significant challenges to solve directly. Therefore, the optimization problem is initially decomposed through a combination of variable substitution and the difference of convex method, resulting in several univariate optimization problems. Subsequently, each subproblem is tackled by alternating iteration, ultimately yielding the UAV flight path and resource allocation that achieve optimal performance.
The simulation results verify the effectiveness and feasibility of the proposed algorithm, and verify that the proposed scheme is superior to other benchmark schemes, which can effectively improve the minimum security rate of the system and ensure the quality of service of users.

2. System Model and Problem Formulation

The system model is shown in Figure 1. In the system, the UAV, as an air base station, uses time division multiple access (TDMA) mode to provide services for K users on the ground in the presence of an eavesdropper (Eve). The set of the K users is denoted by K = Δ { 1 , 2 , , K } , and | K | = K .
Without loss of generality, assume that the positions of the k-th user and Eve are w k = x k , y k , h k T and w e = x e , y e , h e T , respectively, which can be ascertained by a Global Positioning System (GPS) device. Due to energy limitation, the UAV needs to fly between the initial and final positions to obtain energy supply. Here, we assume that the initial and final positions of the flight are predetermined as q I = x I , y I , H T and q F = x F , y F , H T , respectively, where some charging piles are deployed. The UAV flies at a fixed height H within the limited time T due to power constraint, and its position at time t is expressed as q b ( t ) = x [ t ] , y [ t ] , h [ t ] T , 0 t T . To simplify the following process, the preset flight period T is discretized into N equal-interval time slots, and the duration of a time slot is δ t . Herein, the slot δ t should be small enough to ensure that the distance between the UAV and the ground node is approximately constant in any time slot. On this condition, the path of the UAV can be represented by a discrete sequence q b ( n ) = x [ n ] , y [ n ] , h [ n ] T , n { 1 , 2 , , N } . The flight path of the UAV has the following mobility constraints:
q b [ 1 ] = q I ,
q b [ N ] = q F ,
q b [ n + 1 ] q b [ n ] 2 V 2 , n = 1 , 2 , N 1 ,
where V = v max δ t represents the maximum distance that the UAV can move in a time slot.
The measurement results in [25] show that the LoS channel model provides a good approximation for the actual air-to-ground wireless channel, so we assume that the channels from the UAV to users and from the UAV to the Eve are linked by LoS. Furthermore, the Doppler effect caused by the UAV mobility is assumed to be well compensated at the receivers [26]. Therefore, at the n-th time slot, the UAV–user k and UAV–Eve power gains follow the free space path loss model, which can be expressed as
h k n = β 0 d k 2 [ n ] = β 0 q b [ n ] w k 2 ,
and
h e n = β 0 d e 2 [ n ] = β 0 q b [ n ] w e 2 ,
where β 0 is the power gain with a reference distance d 0 = 1 m, and d k [ n ] and d e [ n ] represent distances from the UAV to the k-th user and from the UAV to the Eve at time slot n.
Considering that the UAV works in TDMA mode, at most, one user is arranged to communicate with the UAV in each time slot. A binary variable α k [ n ] indicates whether the k-th user is served at time slot n, and α k [ n ] = 1 indicates that the k-th user is served, otherwise α k [ n ] = 0 . According to the above scheduling scheme, it will yield the following constraints:
k = 1 K a k [ n ] 1 , n ;
a k [ n ] 0 , 1 , n , k .
Therefore, the achievable rates from the UAV to the k-th user and from the UAV to the Eve at time slot n are expressed as
R k [ n ] = α k [ n ] log 2 1 + p [ n ] · h k [ n ] σ 2 = α k [ n ] log 2 1 + p [ n ] · γ 0 q b [ n ] w k 2 ,
and
R e [ n ] = α k [ n ] log 2 1 + p [ n ] · h e [ n ] σ 2 = α k [ n ] log 2 1 + p [ n ] · γ 0 q b [ n ] w e 2 ,
where p [ n ] is the UAV transmit power at time slot n, γ 0 = β 0 σ 2 is the referenced signal-to-interference-plus-noise ratio, and σ 2 is the noise power at the receivers. In the practical communication system, the transmit power of the UAV needs to meet the constraints of both peak power and average power, namely,
0 p [ n ] P max , n = 1 , , N ,
n = 1 N p [ n ] N P ¯ , n = 1 , , N ,
where P max is the UAV’s maximum power and P ¯ is its average power.
To ensure the safety communication between the UAV and every ground user, our goal is to join the user scheduling A = { α k [ n ] , k , n } , UAV flight path Q = q b [ n ] , n , and transmit power P = p [ n ] , n for N time slots to maximize the minimum secrecy rate among all users. The optimization problem is elaborated as follows:
max A , Q , P min k K n = 1 N ( R k [ n ] R e [ n ] )
s . t . 0 a k [ n ] 1 , n , k , ( 1 ) , ( 2 ) , ( 3 ) , ( 6 ) , ( 10 ) , ( 11 ) .
To address the mixed-integer problem, binary variables are relaxed into continuous variables by introducing the inequality constraint. Note that in the optimization problem (12), many variables are coupled with each other, and the objective function is concave while nonconvex constraints are contained, so the problem is nonconvex, and it is usually difficult to solve optimally by traditional methods. In Section 3, an efficient algorithm is given to resolve problem (12).

3. Proposed Algorithm

In this section, for the multivariable nonconvex optimization problem, we combine variable substitution with the difference of convex function to decouple the optimization problem into several more easily handled subconvex optimization problems, and propose an efficient algorithm based on alternating optimization. Specifically, we firstly optimize A by fixing Q, P. Then, by keeping A, P, we optimize Q. Finally, we optimize P by fixing A, Q. The algorithm alternately optimizes the three subproblems until reaching convergence.

3.1. User Scheduling Optimization

For any given UAV flight path Q and transmit power P, we optimize user scheduling A by solving the following problem:
max A min k K n = 1 N ( R k [ n ] R e [ n ] ) s . t . ( 6 ) , ( 13 ) .
Note that problem (14) is not convex, as the objective function in (14) is not concave. To solve the problem, we firstly introduce the relaxation variable μ . Then, problem (14) can be transformed into
max A , μ μ
s . t . μ n = 1 N ( R k [ n ] R e [ n ] ) , k , ( 6 ) , ( 13 ) .
It is assumed that there is a time slot n ˜ { 1 , N } , where α k n ˜ makes constraint (16) satisfy strict inequality and it is an optimal solution to problem (15). Then, we can always reduce α k n without decreasing the objective value of (15), and find α ˜ k n ˜ , which satisfies α ˜ k n ˜ < α k n ˜ so that constraint (16) satisfies the equation. Therefore, problem (15) and problem (14) are equivalent. At this time, problem (15) is convex, which can be solved by the existing CVX toolbox or interior point method [27].

3.2. Flight Path Optimization

Next, we optimize the flight path with user scheduling and transmit power fixed. The optimization problem is described as follows:
max Q min k K n = 1 N ( R k [ n ] R e [ n ] ) s . t . ( 1 ) , ( 2 ) , ( 3 ) .
Problem (17) is also nonconvex. Firstly, the relaxation variable τ is introduced. Then, to facilitate calculation, we define that γ b [ n ] = Δ p [ n ] · γ 0 . Thus, problem (17) is reformulated as
max Q , τ τ
s . t . τ n = 1 N α k [ n ] ( log 2 ( 1 + γ b [ n ] q b [ n ] w k 2 ) log 2 ( 1 + γ b [ n ] q b [ n ] w e 2 ) ) , k , ( 1 ) , ( 2 ) , ( 3 ) .
Similar to problem (15), there always exists an optimal solution for (18) so that the inequality constraint (19) satisfies the equation. Therefore, problems (17) and (18) are equivalent. Note that the second term in the right-hand-side of (19) is nonconcave in relation to q b [ n ] . If the denominator inside the function is directly replaced by a relaxation variable, it will become the form of log 2 1 + x 1 , which does not follow the disciplined convex programming rules. To deal with this problem, slack variables S = Δ S [ 1 ] , S [ 2 ] , , S N are introduced and we further change problem (18) as
max Q , S , τ τ
s . t . τ n = 1 N α k [ n ] ( R ^ k [ n ] log 2 ( 1 + γ b [ n ] e S [ n ] ) ) ,
e S [ n ] q b [ n ] w e 2 , ( 1 ) , ( 2 ) , ( 3 ) .
It is obvious that R ^ k [ n ] = log 2 ( 1 + γ b [ n ] q b [ n ] w k 2 ) and the second term in the right-hand-side of (21) is concave in relation to S [ n ] . In addition, similar to problem (18), there always exists an optimal solution that satisfies constraint (22) with equality. Hence, problem (20) is equivalent to problem (18). However, problem (20) is still difficult to solve since R ^ k [ n ] in (21) is neither convex nor concave with respect to q b [ n ] , and the right-hand-side of (22) is nonconcave with respect to q b [ n ] .
Next, we solve problem (20) based on the successive convex approximation and this method continuously maximizes the objective value of (20) on its convex feasible region until the objective value converges. Specifically, considering the ( l + 1 ) -th iteration, herein, q b l [ n ] is the UAV path variable obtained from the l-th iteration. R ^ k [ n ] in (21) is convex with respect to q b [ n ] w k 2 . Depending on the property that the convex function’s first-order Taylor expansion at a given point is its global lower bound, we can obtain the lower bound R ^ k lb [ n ] with the first-order Taylor expansion at q b l [ n ] w k 2 . It is expressed as follows:
R ^ k [ n ] = log 2 ( 1 + γ b [ n ] q b [ n ] w k 2 ) R ^ k lb [ n ] ,
where
R ^ k lb [ n ] = Δ γ b [ n ] · log 2 e ( q b l [ n ] w k 2 ) · ( q b l [ n ] w k 2 + γ b [ n ] ) × ( q b [ n ] w k 2 q b l [ n ] w k 2 ) + log 2 1 + γ b [ n ] q b l [ n ] w k 2 .
Since q b [ n ] w e 2 in (22) is convex in relation to q b [ n ] , we can get its lower bound with the first-order Taylor expansion at q b l [ n ] :
q b [ n ] w e 2 q b l [ n ] w e 2 + 2 ( q b l [ n ] w e ) T × ( q b [ n ] q b l [ n ] ) .
After the above procedures, problem (20) can be replanned as
max Q , S , τ τ
s . t . τ n = 1 N α k [ n ] ( R ^ k lb [ n ] log 2 ( 1 + γ b [ n ] e S [ n ] ) ) ,
e S [ n ] q b l [ n ] w e 2 + 2 ( q b l [ n ] w e ) T × ( q b [ n ] q b l [ n ] ) , ( 1 ) , ( 2 ) , ( 3 ) .
Here, the objective function is linear, and constraints (1), (2), (3), (27), and (28) are all convex. Therefore, problem (26) is a convex optimization problem which can be solved through the interior point method or the existing CVX toolbox [27]. Note that constraints (27) and (28) imply constraints (21) and (22); thus, the solution obtained from problem (26) is also a feasible solution to problem (20). Hence, the objective value of problem (20) can be obtained by solving (26) in the ( l + 1 ) -th iteration, and must not be less than the corresponding objective value obtained in the l-th iteration.

3.3. Transmit Power Optimization

The transmit power is optimized by fixing the user scheduling and flight path. The optimization problem is written as
max P min k K n = 1 N ( R k [ n ] R e [ n ] ) s . t . ( 10 ) , ( 11 ) .
Problem (29) is also nonconvex. Firstly, we define the following variables as γ 1 [ n ] = γ 0 q b [ n ] w k , γ 2 [ n ] = γ 0 q b [ n ] w e , and then introduce the relaxation variable η . Problem (29) can be transformed into
max P , η η
s . t . η n = 1 N α k [ n ] ( log 2 ( 1 + p [ n ] γ 1 [ n ] ) R ^ e [ n ] ) , ( 10 ) , ( 11 ) ,
where R ^ e [ n ] = log 2 ( 1 + p [ n ] γ 2 [ n ] ) .
Similar to problem (15), there always exists an optimal solution for (30) so that the inequality constraint (31) satisfies the equation. Therefore, problems (29) and (30) are equivalent. However, solving problem (30) is also challenging, as constraint (31) is nonconvex.
Then, we can solve the problem (30) by applying the successive convex approximation method. Note that R ^ e [ n ] in (31) is neither convex nor concave with respect to p [ n ] . Hence, we can obtain the upper bound R ^ e ub [ n ] with the first-order Taylor expansion at p l [ n ] . It is expressed as follows,
R ^ e [ n ] = log 2 ( 1 + p [ n ] γ 2 [ n ] ) γ 2 [ n ] log 2 ( e ) ( 1 + p l [ n ] γ 2 [ n ] ) ( p [ n ] p l [ n ] ) + log 2 ( 1 + p l [ n ] γ 2 [ n ] ) = Δ R ^ e ub [ n ] .
By replacing the term R ^ e [ n ] with its upper bound R ^ e ub [ n ] , problem (30) is formulated as
max P , η η
s . t . η n = 1 N α k [ n ] ( log 2 ( 1 + p [ n ] γ 1 [ n ] ) R ^ e ub [ n ] ) , ( 10 ) , ( 11 ) .
Since the first term in the right-hand-side of (34) is concave in relation to p [ n ] while the second term in the right-hand-side of (34) is linear, problem (33) is a convex optimization problem which can be solved through the interior point method or the existing CVX toolbox [27]. Similar to Section 3.2, the objective value of problem (30) can be obtained by solving (33).

3.4. Overall Algorithm and Convergence

Based on the analysis of solving the above three subproblems, Algorithm 1 summarizes the proposed iterative optimization algorithm for solving problem (12), where ε is the introduced convergence threshold. If the difference between the solutions obtained by two successive iterations is less than this threshold, it can be considered that the solution obtained by Algorithm 1 meets the expected accuracy requirements.
Algorithm 1 Alternating iteration algorithm for problem (9).
1:
Initialization: Set the initial flight path and transmit power, let l = 0 and give accuracy tolerance ε .
2:
repeat:
3:
Solve the problem (15) with the given Q l , P l and obtain the optimal solution A l + 1 .
4:
Solve the problem (26) with A l + 1 , P l and obtain the optimal solution Q l + 1 .
5:
Solve the problem (33) with A l + 1 , Q l + 1 and obtain the optimal solution P l + 1 .
6:
Updata l = l + 1 .
7:
Until the objective value increases below the accuracy tolerance ε .
Next, we discuss the convergence of Algorithm 1. Firstly, define R Q lb , l ( A , Q , P ) = R Q l and R P lb , l ( A , Q , P ) = R P l , where R Q l and R P l are the objective values of problem (15) and problem (26) with respect to A, Q, and P. In step 3 of Algorithm 1, since the optimal solution of problem (15) is obtained for given Q l and P l , we have
R ( A l , Q l , P l ) R ( A l + 1 , Q l , P l ) ,
where R ( A , Q , P ) is the minimum secrecy rate of all users. Then, for given A l + 1 , Q l and P l in step 4 of Algorithm 1, we have
R ( A l + 1 , Q l , P l ) = ( a ) R Q lb , l ( A l + 1 , Q l , P l ) ( b ) R Q lb , l ( A l + 1 , Q l + 1 , P l ) ( c ) R ( A l + 1 , Q l + 1 , P l ) ,
where equation (a) holds because the first-order Taylor expansions in (23) and (25) strictly approximate the original function at a given local point, which means that problem (26) and problem (17) have the same objective value. The reason why inequality (b) holds is the same as that of (35). On the basis of given A l + 1 , Q l and P l , problem (26) is solved to obtain the optimal solution. Inequality (c) holds because the objective value of problem (26) is the lower bound of the objective value of its original problem (17). Thirdly, for given A l + 1 , Q l + 1 and P l in step 5 of Algorithm 1, we have
R ( A l + 1 , Q l + 1 , P l ) = ( a ) R P lb , l ( A l + 1 , Q l + 1 , P l ) ( b ) R P lb , l ( A l + 1 , Q l + 1 , P l + 1 ) ( c ) R ( A l + 1 , Q l + 1 , P l + 1 ) ,
and the reason why (37) holds is similar to (36). Based on (35)–(37), we can obtain
R ( A l , Q l , P l ) R ( A l + 1 , Q l + 1 , P l + 1 ) ,
which shows that the objective value of problem (12) does not decrease after each iteration of Algorithm 1. Since the upper bound of the objective value for problem (12) is a finite value, the convergence of Algorithm 1 can be guaranteed. Additionally, since each subproblem is a standard convex optimization problem, we analyze the algorithm complexity based on interior point method [28], and the computational complexity of Algorithm 1 is O [ K i t e ( 3 ( N ) 3.5 ) ] , where K i t e represents the number of iterations.

4. Numerical Results and Discussions

This section presents simulation results to demonstrate the performance of the proposed joint user scheduling, transmit power, and flight path optimization algorithm, which is denoted by “U-T-F-O”. To better verify its performance, it is compared with two benchmark schemes: user scheduling and flight path optimization with a fixed transmit power allocation (“U-F-O”) and joint user scheduling and transmit power optimization with a fixed flight path (“U-T-O”). In the “U-F-O” scheme, the UAV is assigned equal transmit power in each time slot, for example, p [ n ] = P ¯ . In the “U-F-O” scheme, the UAV flies along a straight line from the initial position to the final position.
In the simulation, suppose that there are three users distributed in a geographical area of 2 × 1.4 k m 2 . We set Eve’s coordinates as ( 400 , 800 , 0 ) T . The flight altitude is 50 m. We set the reference SNR γ 0 = 80 dB at the reference distance d 0 = 1 m. The duration of a time slot is δ t = 5 s . The maximum UAV flight speed is v max = 20 m / s . The accuracy tolerance in Algorithm 1 is set to ε = 10 3 . Furthermore, let p [ n ] = P ¯ and P max = 4 P ¯ .
Figure 2 shows the optimized flight paths obtained by the proposed algorithm for different flight time T when P ¯ = 10   dBm . With the increase in flight time, the optimized path will be closer to users to obtain better channel conditions to transmit information, but it will be as far away from the Eve as possible while being close to users. With the continuous increase of flight time, the UAV has more freedom to adjust its flight path, so that it can visit all users. If the flight time T is large enough, it will stay over the users for a certain period of time, because in its hovering position, the UAV can achieve the best balance between information leakage to the Eve and maximizing the achievable rate of users. In the case of flight time T = 180 s, the density of points on the flight path around each user is higher than that far away from the user. The reason is that when the UAV flies close to the user, it will slow down accordingly to obtain better communication conditions. In addition, with the increase in flight time, the flight path of the UAV becomes less smooth until it becomes a polyline passing through users on the ground, and the flight path of the UAV no longer changes with flight time.
Figure 3 shows the user scheduling when T = 150 s, P ¯ = 10 dBm . As can be seen from Figure 3, at any moment, when the UAV provides a communication connection to a user, the user communication scheduling value is 1, while other users are not served, and the user communication scheduling value is 0. The scheduling order of users is user 1, user 2, user 1, and user 3, that is, the UAV communicates with user 1, user 2, user 1, and user 3 successively during the whole flight time. The reason is that due to the existence of the potential Eve, the UAV will select the appropriate user to serve according to the current channel conditions during the flight from the initial position to the final position, so as to obtain better communication quality, which shows the effectiveness of the proposed algorithm. In addition, it can be observed that the whole flight cycle of the UAV can be roughly divided into several time periods. During the flight time of 0–15 s and 51–100 s, the UAV provides services for user 1; during the time period of 16–50 s, the UAV provides services for user 2; and during the period of 101–150 s, the UAV provides services for user 3. The communication time for user 2 is slightly less, which is because user 2 is closer to the Eve. This schedule makes the secrecy rate among all users have the optimal balance, which reflects the fairness of the algorithm and can take into account the communication quality of all users.
Figure 4 describes the trend of the UAV transmit power changing with flight time under the joint optimization scheme when T = 150 s, P ¯ = 10 dBm . At the beginning of the flight, the UAV transmit power has a decreasing trend, because the superiority of UAV-user 1 link’s channel quality over UAV-Eve link’s channel quality is diminishing. Then, when the UAV continues to provide services for each user according to the user’s scheduling order, the UAV transmit power first increases and then decreases, since in each period, the UAV first flies close to the user and then flies away from the user. When the UAV is approaching the user, the channel quality of the UAV-user link is superior to that of the UAV-Eve link. As this advantage is increasing, more power will be allocated. When the UAV flies away from the user, the advantage of the UAV-user link (that the channel quality is better than that of the UAV-Eve link) is decreasing, so the power allocated is less and less. In addition, the sum of UAV transmit power is different during the time of providing services for each user, since the distances of UAV-users and users-Eve are different.
In order to study the relationship between the max-min secrecy rate of users and the UAV flight time under different schemes, the simulation results of the three schemes are compared when P ¯ = 10 dBm . As can be seen from Figure 5, the max-min secrecy rates of different schemes increase with the increase of flight time, and the “U-T-F-O” scheme achieves the best safety communication performance, followed by the “U-F-O” scheme, and the “U-T-O” scheme is the worst. This is because in the “U-T-O” scheme, the flight path of the UAV is not optimized, which leads to the communication channel conditions of the UAV not being optimized, so the maximum-minimum secrecy rate of the “U-T-O” scheme is the lowest, and the variation range with flight time is not large. In contrast, the “U-F-O” scheme and the “U-T-F-O” scheme take advantage of the mobility of the UAV, which makes the channel quality of the UAV-user link better than that of UAV-Eve’s link, and fully considers the balance between communication rate and eavesdropping rate, so the max-min secrecy rate is higher. Comparing the “U-F-O” scheme with “U-T-F-O” scheme, the order of the UAV accessing users is the same, but the joint optimization scheme has better secure communication performance. The reason is that the “U-T-F-O” scheme not only optimizes the flight path of the UAV, but also optimizes the power allocation of the UAV. This scheme can control the power allocation according to the current communication channel conditions after the flight path optimization.

5. Conclusions

This paper studied the multi-user secure communication system assisted by the UAV base station, and proposed a joint optimization algorithm of flight path planning and resource allocation. Firstly, the system model of a UAV secure communication network was analyzed, and the achievable rate from the UAV to the user and eavesdropping rate from the UAV to the Eve were deduced. Secondly, a joint optimization problem of user scheduling, UAV flight path, and transmit power control, with the goal of maximizing the minimum secrecy rate of the system, was established. Facing the nonconvex objective optimization problem, it was decomposed by combining variable substitution with the difference of convex function. Several single-variable optimization problems were obtained, and then the three subproblems were solved alternately by the block coordinate descent method. Finally, numerical results verified the correctness of the theoretical analysis, and showed that the proposed scheme is superior to other schemes in improving the minimum secrecy rate of the system, and can effectively improve the security of the system.

Author Contributions

Conceptualization, R.Y.; Methodology, L.L.; Software, L.L.; Validation, L.L.; Writing—original draft, L.L.; Writing—review & editing, L.L., R.Y., Y.X., Y.F., X.Z., J.X., R.Z., S.Z. and X.L.; Project administration, R.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (No.61701407, 61871327 and 61801218), in part by Fundamental Research Founds for Central Universities (No.D5000210692), in part by Guangdong Basic and Applied Basic Research Foundation (No.2021A1515110 077), in part by Natural Science Foundation of Shaanxi Province (No.2023-JC-YB-599 and 2022JQ-637), and in part by Open Research Subject of State Key Laboratory of Intelligent Game (ZBKF-24-15).

Data Availability Statement

The data supporting the findings of this study are available within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, Z.; Zheng, J. Rate Meta Distribution of Downlink Base Station Cooperation for Cellular-Connected UAV Networks. IEEE Commun. Lett. 2022, 27, 756–760. [Google Scholar] [CrossRef]
  2. Li, X.; Yao, R.; Fan, Y.; Wang, P.; Xu, J. Secure Efficiency Map-Enabled UAV Trajectory Planning. IEEE Wirel. Commun. Lett. 2023, 12, 1324–1328. [Google Scholar] [CrossRef]
  3. Al-Ahmedi, S.A.; Shakir, M.Z.; Zaidi, S.A.R. Optimal 3D UAV Base Station Placement by Considering Autonomous Coverage Hole Detection, Wireless Backhaul and User Demand. J. Commun. Netw. 2020, 22, 467–475. [Google Scholar] [CrossRef]
  4. Wang, X.; Liu, X.; Cheng, C.T.; Deng, L.; Chen, X.; Xiao, F. A Joint User Scheduling and Trajectory Planning Data Collection Strategy for the UAV-Assisted WSN. IEEE Commun. Lett. 2021, 25, 2333–2337. [Google Scholar] [CrossRef]
  5. Chen, J.; Tang, J. UAV-Assisted Data Collection for Dynamic and Heterogeneous Wireless Sensor Networks. IEEE Wirel. Commun. Lett. 2022, 11, 1288–1292. [Google Scholar] [CrossRef]
  6. Ghdiri, O.; Jaafar, W.; Alfattani, S.; Abderrazak, J.B.; Yanikomeroglu, H. Offline and Online UAV-Enabled Data Collection in Time-Constrained IoT Networks. IEEE Trans. Green Commun. Netw. 2021, 5, 1918–1933. [Google Scholar] [CrossRef]
  7. Liu, T.; Cui, M.; Zhang, G.; Wu, Q.; Chu, X.; Zhang, J. 3D Trajectory and Transmit Power Optimization for UAV-Enabled Multi-Link Relaying Systems. IEEE Trans. Green Commun. Netw. 2021, 5, 392–405. [Google Scholar] [CrossRef]
  8. Dabiri, M.T.; Sadough, S.M.S. Optimal Placement of UAV-Assisted Free-Space Optical Communication Systems with DF Relaying. IEEE Commun. Lett. 2020, 24, 155–158. [Google Scholar] [CrossRef]
  9. Li, M.; Tao, X.; Wu, H.; Li, N. Joint Trajectory and Resource Optimization for Covert Communication in UAV-Enabled Relaying Systems. IEEE Trans. Veh. Technol. 2022, 72, 5518–5523. [Google Scholar] [CrossRef]
  10. Zhang, H.; Shen, L.; Wang, N.; Mu, X. UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers. In Proceedings of the 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Suzhou, China, 14–16 October 2022; pp. 289–293. [Google Scholar]
  11. Wang, S.; Li, L.; Ruby, R.; Ruan, X.; Zhang, J.; Zhang, Y. Secrecy-Energy-Efficiency Maximization for UAV-Enabled Two-Way Relay Systems. IEEE Trans. Veh. Technol. 2023, 72, 12900–12911. [Google Scholar] [CrossRef]
  12. Miao, J.; Zheng, Z. Cooperative Jamming for Secure UAV-Enabled Mobile Relay System. IEEE Access 2020, 8, 48943–48957. [Google Scholar] [CrossRef]
  13. Dang-Ngoc, H.; Nguyen, D.N.; Ho-Van, K.; Hoang, D.T.; Dutkiewicz, E.; Pham, Q.V.; Hwang, W.J. Secure Swarm UAV-Assisted Communications with Cooperative Friendly Jamming. IEEE Internet Things J. 2022, 9, 25596–25611. [Google Scholar] [CrossRef]
  14. Duo, B.; Luo, J.; Li, Y.; Hu, H.; Wang, Z. Joint Trajectory and Power Optimization for Securing UAV Communications Against Active Eavesdropping. China Commun. 2021, 18, 88–99. [Google Scholar] [CrossRef]
  15. Wang, W.; Tang, J.; Zhao, N.; Liu, X.; Zhang, X.Y.; Chen, Y.; Qian, Y. Joint Precoding Optimization for Secure SWIPT in UAV-Aided NOMA Networks. IEEE Trans. Commun. 2020, 68, 5028–5040. [Google Scholar] [CrossRef]
  16. Diao, D.; Wang, B.; Cao, K.; Dong, R.; Cheng, T. Enhancing Reliability and Security of UAV-Enabled NOMA Communications with Power Allocation and Aerial Jamming. IEEE Trans. Veh. Technol. 2022, 71, 8662–8674. [Google Scholar] [CrossRef]
  17. Chen, X.; Yang, Z.; Zhao, N.; Chen, Y.; Wang, J.; Ding, Z.; Yu, F.R. Secure Transmission via Power Allocation in NOMA-UAV Networks with Circular Trajectory. IEEE Trans. Veh. Technol. 2020, 69, 10033–10045. [Google Scholar] [CrossRef]
  18. Zhao, J.; Chen, M.; Yang, Z.; Cang, Y.; Tao, Z.; Lyu, Z.; Huang, C.; Zhang, Z. Secure Resource Allocation for UAV Assisted Joint Sensing and Comunication Networks. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 1856–1861. [Google Scholar]
  19. Wang, W.; Li, X.; Wang, R.; Cumanan, K.; Feng, W.; Ding, Z.; Dobre, O.A. Robust 3D-Trajectory and Time Switching Optimization for Dual-UAV-Enabled Secure Communications. IEEE J. Sel. Areas Commun. 2021, 39, 3334–3347. [Google Scholar] [CrossRef]
  20. Li, Z.; Wang, S.; Wen, M.; Wu, Y.-C. Secure Multicast Energy-Efficiency Maximization With Massive RISs and Uncertain CSI: First-Order Algorithms and Convergence Analysis. IEEE Trans. Wirel. Commun. 2022, 21, 6818–6833. [Google Scholar] [CrossRef]
  21. Li, Z.; Lin, Q.; Wen, Y.-C.W.M.; Ng, D.W.K.; Nallanathan, A. Enhancing Physical Layer Security With RIS Under Multi-Antenna Eavesdroppers and Spatially Correlated Channel Uncertainties. IEEE Trans. Commun. 2024, 72, 1532–1547. [Google Scholar] [CrossRef]
  22. Luo, X.; Xie, J.; Xiong, L.; Wang, Z.; Tian, C. 3-D Deployment of Multiple UAV-Mounted Mobile Base Stations for Full Coverage of IoT Ground Users with Different QoS Requirements. IEEE Commun. Lett. 2022, 26, 3009–3013. [Google Scholar] [CrossRef]
  23. Guan, X.; Huang, Y.; Dong, C.; Wu, Q. User Association and Power Allocation for UAV-Assisted Networks: A Distributed Reinforcement Learning Approach. China Commun. 2020, 17, 110–122. [Google Scholar] [CrossRef]
  24. Sazak, M.D.; Demirtas, A.M. UAV-BS Trajectory Optimization Under Coverage, Backhaul and QoS Constraints Using Q-Learning. In Proceedings of the 2022 International Balkan Conference on Communications and Networking (BalkanCom), Sarajevo, Bosnia and Herzegovina, 22–24 August 2022; pp. 157–161. [Google Scholar]
  25. Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.L.; Bergstrom, M.; Euler, S.; Wang, Y.P. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef]
  26. Mengali, U. Synchronization Techniques for Digital Receivers, 3rd ed.; University of Pisa: Pisa, Italy, 1997. [Google Scholar]
  27. Grant, M.; Boyd, S. CVX: Matlab Software for Disciplined Convex Programming, Version 2.1; CVX Research, Inc.: Austin, TX, USA, 2014. [Google Scholar]
  28. Nemirovski, A.S.; Todd, M.J. Interior-Point Methods for Optimization. Acta Numerica 2008, 17, 191–234. [Google Scholar] [CrossRef]
Figure 1. The UAV base station model.
Figure 1. The UAV base station model.
Electronics 13 02443 g001
Figure 2. The optimized paths for different UAV flight time.
Figure 2. The optimized paths for different UAV flight time.
Electronics 13 02443 g002
Figure 3. User scheduling when T = 150 s.
Figure 3. User scheduling when T = 150 s.
Electronics 13 02443 g003
Figure 4. UAV transmit power allocation under the joint optimization scheme.
Figure 4. UAV transmit power allocation under the joint optimization scheme.
Electronics 13 02443 g004
Figure 5. Max-min secrecy rate of users for different UAV flight time.
Figure 5. Max-min secrecy rate of users for different UAV flight time.
Electronics 13 02443 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, L.; Yao, R.; Xie, Y.; Fan, Y.; Zuo, X.; Xu, J.; Zhong, R.; Zheng, S.; Li, X. Joint Optimization of User Scheduling, Flight Path and Power Allocation in a UAV Secure Communication System. Electronics 2024, 13, 2443. https://doi.org/10.3390/electronics13132443

AMA Style

Liu L, Yao R, Xie Y, Fan Y, Zuo X, Xu J, Zhong R, Zheng S, Li X. Joint Optimization of User Scheduling, Flight Path and Power Allocation in a UAV Secure Communication System. Electronics. 2024; 13(13):2443. https://doi.org/10.3390/electronics13132443

Chicago/Turabian Style

Liu, Lipei, Rugui Yao, Yi Xie, Ye Fan, Xiaoya Zuo, Juan Xu, Ruikang Zhong, Shijie Zheng, and Xudong Li. 2024. "Joint Optimization of User Scheduling, Flight Path and Power Allocation in a UAV Secure Communication System" Electronics 13, no. 13: 2443. https://doi.org/10.3390/electronics13132443

APA Style

Liu, L., Yao, R., Xie, Y., Fan, Y., Zuo, X., Xu, J., Zhong, R., Zheng, S., & Li, X. (2024). Joint Optimization of User Scheduling, Flight Path and Power Allocation in a UAV Secure Communication System. Electronics, 13(13), 2443. https://doi.org/10.3390/electronics13132443

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop