Secrecy Energy Efﬁciency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems

: Unmanned aerial vehicle (UAV)-assisted simultaneous wireless information and power transfer (SWIPT) systems have recently gained signiﬁcant attraction in internet-of-things (IoT) applications that have limited or no infrastructure. Speciﬁcally, the free mobility of UAVs in three-dimensional (3D) space allows us good-quality channel links, thereby enhancing the communication environment and improving performance in terms of achievable rates, latency, and energy efﬁciency. Meanwhile, IoT devices can extend their battery life by harvesting the energy following the SWIPT protocol, which leads to an increase in the overall system lifespan. In this paper, we propose a secure UAV-assisted SWIPT system designed to optimize the secrecy energy efﬁciency (SEE) of a ground network, wherein a base station (BS) transmits conﬁdential messages to an energy-constrained device in the presence of a passive eavesdropper. Here, we employ a UAV acting as a helper node to improve the SEE of the system and to aid in the energy harvesting (EH) of the battery-limited ground device following the SWIPT protocol. To this end, we formulate the SEE maximization problem by jointly optimizing the transmit powers of the BS and UAV, the power-splitting ratio for EH operations, and the UAV’s ﬂight path. The solution is obtained via a proposed algorithm that leverages successive convex approximation (SCA) and Dinkelbach’s method. Through simulations, we corroborate the feasibility and effectiveness of the proposed algorithm compared to conventional partial optimization approaches.


Introduction
Unmanned aerial vehicles (UAVs) have recently garnered attention for internet-ofthings (IoT) networks due to their high mobility, affordable installation costs, and flexibility in deployment.These advantages of UAVs are particularly pronounced in environments with limited or no infrastructure, such as rural areas, disaster and emergency response scenarios, military services, advanced radio technology, etc. [1][2][3].However, the constrained energy capacity and limited coverage range of energy-restricted UAVs introduce new challenges in the design of wireless communication systems.Consequently, recent research efforts in UAV-assisted wireless networks have pivoted towards addressing energy efficiency and energy-aware deployment issues.
For energy-constrained devices, radio frequency wireless power transfer (WPT) technology emerges as an effective and attractive solution.In UAV-assisted IoT networks, the advantages of WPT are further highlighted as devices harvest energy from radio signals, thereby recharging battery-limited devices, i.e., IoT devices and UAVs, and extending the overall system lifespan.To actualize UAV-assisted WPT in IoT environments, several architectures have been explored, such as wireless powered communication networks (WPCN) and simultaneous wireless information and power transfer (SWIPT).In subsequent sections, we delve into the related works concerning UAV-assisted networks and WPT in greater detail [4][5][6][7][8][9][10][11][12][13][14][15][16][17].As UAVs possess the ability to fly freely within their operational capabilities, they are well suited for enhancing physical-layer secrecy [4].In studies such as [5][6][7][8][9][10][11], UAV-assisted network systems have been explored, wherein the UAV serves as a relay to facilitate communication between wireless devices.For instance, UAVs can operate as helper nodes, moving away from potential eavesdroppers (Eves or Es) while orbiting the intended user to transmit confidential information.Conversely, as jammers, UAVs can hover near Eves to cause interference while maintaining a distance from the intended user to avoid disrupting the signal.For this reason, the UAVs have been actively explored [5][6][7][8] to improve physicallayer security.Compared to the prior research in the field of physical-layer security, the study in [5] represents the first instance where enhancements in the secrecy rate have been achieved via jointly optimizing power control and trajectory under the assumption that the location of the Eve is perfectly known.In contrast, the influence of imprecise information about multiple Eves' locations on the UAV's trajectory and transmit power design is examined in [6].The authors in [7] propose the full-duplex secrecy communication scheme for the UAV to achieve the maximum secrecy energy efficiency (SEE) of the UAV.Furthermore, ref. [8] describes a UAV-enabled data collection system where an intelligent reflecting surface (IRS) aids communication between a cluster of IoT devices and a UAV, despite the presence of a malicious jammer.
Regarding IoT systems with battery-limited devices, several studies [9][10][11] focus on the energy consumption or energy efficiency of IoT devices with UAV support.The authors in [9] propose the joint optimization problem of resource allocation and UAV's path planning with the aim of minimizing the end devices' energy consumption for the mobile edge computing system via a UAV-mounted cloudlet.In [10], the minimization of energy consumption is addressed in the rotary-wing UAV-assisted communication system.The design of maximizing the energy efficiency (EE) through the UAV's trajectory optimization is studied in [11].Nevertheless, considering that UAVs are also constrained by their battery life, which limits their available operation time, their finite energy budget must be considered in the system design [4][5][6][7][8][9][10][11].

Wireless Power Transfer (WPT)
The concept of UAV-enabled WPT was introduced in [12,13], wherein UAVs act as mobile energy transmitters to recharge low-power devices on the ground.By leveraging their free mobility, UAVs can strategically position themselves to minimize the distance to targeted ground users, thereby enhancing the efficiency of both wireless information transfer (WIT) and WPT.The work in [14] addresses the throughput maximization problem in a UAV-based WPCN by jointly optimizing the UAV's trajectory and the allocation of transmission resources for both uplink WIT and downlink WPT.Moreover, the integration of UAV-assisted communication with SWIPT is proposed in [15] to facilitate IoT networks during emergency situations.In [16], the researchers investigate the maximization of the secrecy rate in a UAV-enabled communication network that conducts SWIPT in a millimeterwave (mmWave) communication environment suitable for IoT applications.The paper [17] discusses the novel design challenges and strategies for UAV-assisted wireless energy transfer in anticipation of the forthcoming 6G era, which will be characterized by the internet of everything.Prior works such as [14][15][16][17] focus on user throughput or secrecy rates in UAV-assisted SWIPT systems, taking into account the UAV's constrained energy but not from an EE perspective.

Our Contributions
Motivated by the limitations of previous works [4][5][6][7][8][9][10][11][12][13][14][15][16][17] in terms of secrecy and EE, we investigate the SEE for secure UAV-assisted SWIPT systems.SEE is defined as the ratio between the achievable secrecy rate of the desired link and the UAV's energy consumption.In our setup, a base station (referred to as Alice or A) communicates confidentially with an energy-constrained IoT device (referred to as Bob or B) on the ground, with the assistance of a UAV and in the presence of a passive Eve.To maximize the SEE of the system, we formulate an optimization problem and develop a corresponding algorithmic solution.The main contributions of this paper are summarized as follows: • We formulate the SEE maximization problem, jointly optimizing Alice's transmit power, the UAV's transmit power, Bob's power splitting ratio for energy harvesting (EH), and the UAV's trajectory, considering the functional capability constraints of network devices, such as maximum speed, average power, and peak power.

•
To solve the formulated problem, we propose an efficient iterative algorithm based on successive convex approximation (SCA) [18] and Dinkelbach's method [19], which converges to a local minimum of the original non-convex problem.

•
Through simulations, we demonstrate the superior performance of proposed algorithm compared to conventional partial optimization methods.To the best of our knowledge, this is the first study to focus on the SEE of UAV-assisted communication systems with EH in an energy-constrained environment.
The remainder of this paper is organized as follows: Section 2 describes the system model and performance metrics.Section 3 details the formulation of the SEE maximization problem and the development of the algorithm for finding local optimal solutions.Numerical results and concluding remarks are presented in Sections 4 and 5, respectively.

System Model and Performance Metric
We consider a secure UAV-assisted SWIPT system, as shown in Figure 1.Alice transmits the confidential information to Bob with the aid of a rotary-wing UAV, while a passive Eve attempts to wiretap it.Without loss of generality, a three-dimensional Cartesian coordinate system is adopted, whose coordinates are measured in meters.We assume that Alice, Bob, and Eve are located at the position {L L L i = (x i , y i , 0), for i ∈ {A, B, E}, in the xy-plane, e.g., on the ground, while the UAV flies along a trajectory L L L U (t) = (x U (t), y U (t), H) with the fixed altitude of H, for the given flying period 0 ≤ t ≤ T. Due to the horizontally constant altitude H for the UAV, we focus on the projection of the UAV's trajectory onto the xy-plane.Additionally, for the aerospace regulations and the operational capability, the initial and final positions and the maximum velocity of the UAV are predetermined as L L L U I = (x U I , y U I , H), L L L U F = (x U F , y U F , H) and v max , respectively.The UAV is assumed to operate in a time division duplex (TDD) manner.Alice transmits the confidential messages to the UAV, and then the UAV forwards the decoded messages to Bob with the attempt to improve the secrecy rate while supporting the EH operation of Bob.Here, by following the SWIPT protocol design in [16], the received signal power at Bob is split into two types of power streams such as one portion w of the power for data communication and the remaining portion (1 − w) of the power for EH with satisfying 0 ≤ w ≤ 1.
We consider that the mission time T is discretized into N time slots with a sufficiently small time t s = T/N in seconds (s) [7,9].Accordingly, the UAV's position L L L U (t) can be discretized as In addition, the distance d s = v max t s denotes the maximum distance of horizontally traveling within each time slot with the maximum speed v max in m/s.The distance of d s is chosen to be sufficiently small compared to H so that the air-to-ground channels of the UAV are assumed to be time-invariant within each slot.We define as the location of the UAV for all time slot n, which satisfies the mobility constraints as follows: Following [7,9,16], the air-to-ground channels between the UAV and ground nodes, i.e., Alice, Bob, and Eve, are assumed to be dominated by line-of-sight (LOS) links.At the n-th slot, the channel gain between the UAV and ground nodes is given by where is the Euclidean distance between node i and j, α denotes the pathloss exponent of the channels, and ρ 0 denotes the gain of a channel with the reference distance d 0 = 1m.The ground channels from Alice to Bob and Eve are assumed to be Rayleigh channels.Hence, the channel coefficients from Alice to Bob and Eve in slot n are given by g Aj ζ j for j ∈ {B, E}, where α denotes the pathloss exponent and ζ j is an exponentially distributed random variable with unit mean accounting for the small-scale Rayleigh fading.Since t s is assumed to be much smaller than the coherence time of the ground channels, the channels are supposed to be stationary and ergodic within each time slot.
We define P A [n] and P U [n] as the transmit powers of Alice and UAV at time slot n, respectively, which, in real applications, need to satisfy the average and peak power constraints as [5]: where for j ∈ {A, U}.Also, it is noted that the communication energy consumption is much smaller than the propulsion energy, which allows us to omit the communication energy consumption in the following SEE calculation [7,11].Based on [10], the UAV's propulsion energy consumption E P [n] at time slot n, consisting of blade profile, induced power, and parasite power in Joules (J), can be modeled as where the horizontal UAV's flying speed is given by v tip with U tip being the tip speed of the UAV's rotor blade; ) 2 /(2v 2 0 ); P 0 , P i and v 0 represent the blade profile power, the induced power, and the mean rotor-induced speed when the UAV is hovering, re-spectively; and d 0 , ρ, s, and A denote the fuselage drag ratio, the air density, the rotor solidity, and the rotor disc area, respectively.Note that ( 5) is practically valid for the straight and level flight of the rotary-wing UAV, which is satisfied in each time slot n due to the approximated piecewise-linear trajectory over time slots.
Under the assumption that the Eve adopts the maximal ratio combining (MRC) scheme to intercept the confidential information, the secrecy rate R S [n] between Alice and Bob can be expressed as [20] R where [x] + max(x, 0); with B representing a signal-tonoise ratio (SNR) of Alice to Bob, Alice to UAV, and UAV to Bob, respectively; E representing the SNR of Alice to Eve and UAV to Eve, respectively, and σ 2 B , σ 2 U , and σ 2 E are the noise power at Bob, UAV, and Eve, respectively.The goal of this paper is to maximize the SEE of the UAV-assisted SWIPT systems under the transmit power constraints of Alice and UAV, the EH constraint of Bob, and the flying constraints for UAV.In wireless communications, SEE is a pivotal metric that quantifies how much confidential data a system can relay per energy unit used, capturing both its energy efficiency and secure transmission proficiency [7].To this end, we define the SEE in bits/J that concerns the technical ratio between the secrecy rate R S [n] in (6) and the UAV's flying energy consumption in (5) as SEE(P P P A , with Alice's transmit power P P P A {P A [n]} N n=1 , the UAV's power , where B denotes the system bandwidth.In (9), it is noted that the flying energy consumption of UAV dominates the other energy consumption, e.g., communication, computing, etc. [10].

Secrecy Energy Efficiency Maximization
In this paper, we aim to maximize the SEE in (9) for the secure UAV-assisted SWIPT communication systems over N time slots by jointly optimizing Alice's transmit power, the UAV's transmit power, the UAV's trajectory, and Bob's power splitting ratio for EH operation.To this end, we formulate the optimization problem as max P P P A ,P P P U ,w,L L L U SEE(P P P A , P P P U , w, L L L U ), (1), ( 2) and ( 4), (12) where (11) represents the EH constraint with η being energy conversion efficiency and ϕ being power threshold of Bob.The problem (10) is not convex since the objective function ( 10) is jointly concave with respect to the optimization variables.To resolve the problem (10), we develop an efficient iterative Algorithm 1 to obtain a high-quality local optimal solution of problem (10).In particular, in each iteration of the proposed Algorithm 1, we divide the original problem (10) into three subproblems; that is, (1) one optimizes P P P A and P P P U with fixed w and L L L U ; (2) another optimizes w with fixed P P P A , P P P U , and L L L U ; and (3) the other optimizes L L L U with fixed P P P A , P P P U , and w.In the following, we detail the procedure to find the solution of each subproblem per iteration of Algorithm 1.

Algorithm 1: SEE Maximization Algorithm
1 Initialization: Input P P P 0 A , P P P 0 U , w 0 , and L L L 0 U .Let k = 0. Repeat (Dinkelbach's method) [19]: Set the Numerator and Denominator of (40) as Ξ(x, y) and Υ(x, y); Solve linear program D(x i , y i ).Denote the solution as x i and y i ; Step 2 to replace i with i + 1; (4) and ( 11), where we assume that the flying energy consumption of E P only depends on the velocity v, and we define Since the problem (13) with the constraints ( 14) and ( 15) involving difference of convex (DC) program is still non-convex, we employ the SCA method [18] that prescribes the iterative solution of non-convex problems by replacing the non-convex objective function and constraints with the suitable convex approximations.By denoting as the set of transmit powers of Alice and the UAV at the k-th iteration and applying the first-order Taylor expansion [21], we can obtain the respective global upper bounds for the minus portion of the right-hand sides of ( 14) and (15) as log 2 (1+a Then, the problem (13) can be written as max (4) and ( 11), where ).The problem ( 18) is convex, and accordingly can be solved by the CVX solver [22].Since the upper bounds in (17) suggests that any feasible solution P P P k A and P P P k U of ( 10) is also feasible for (18), the optimal value obtained by solving (18) serves as the lower bound for that of the problem (10).

Optimization of Power Splitting Ratio
The problem of optimizing the power splitting ratio w with the fixed P P P A , P P P U , and L L L U can be written by the definition of where The problem ( 22) is convex, and accordingly can be solved by the CVX solver [22].

Optimization of UAV's Trajectory
In this subsection, given P P P A , P P P U , and w, we optimize L L L U by introducing slack variables m m m = {m[n]} N n=1 , q q q = {q[n]} N n=1 , and Consequently, the problem (10) can be represented as max (1) and ( 2), ( 29) To address the non-convexity of (25) due to the DC function depending on L L L U , we apply the SCA method [18] as in Section 3.1.By introducing slack variable C C C = {C[n]} N n=1 for (25), we can rewrite the problem (25) as max L L L U ,C C C,m m m,q q q,u u u (1), ( 2), ( 26), ( 27), and ( 28). ( 33) By applying the first-order Taylor expansion [21], the first term in (31) with m m m k = {m k [n]} N n=1 at the k-th iteration can be lower-bounded as Similarly, the first log-term in constraint (32) with q q q k = {q k [n]} N n=1 and the second logterms in constraint ( 31) and (32) with u u u k = {u k [n]} N n=1 in the k-th iteration can be lowerbounded as and respectively.Next, we deal with the non-convexity of the helper UAV's flying energy consumption of E P [n] in (25).The terms for blade profile power and parasite power are convex, while the term for induced power is non-convex.To tackle with this issue, we also introduce the equivalent formulas of E P [n] with the slack variable e e e = {e[n]} N n=1 as [10]: with satisfying e . By applying the first-order Taylor expansion [21], the right-hand side of (38) at any given points e e e k = {e k in the l-th iteration has the following lower bound: where . With (30)-(39), we can rewrite (25) as max L L L U ,C C C,m m m,q q q,u u u,e e e (1), ( 2), ( 26), ( 27) and ( 28).
Since ( 40) is a fractional problem with the objective function consisting of a linear numerator and convex denominator along with the convex constraints (41)-( 43), it can be optimally and efficiently solved by fractional programming techniques, such as the Dinkelbach method [19], which converts the original nonlinear fractional problem into a sequence of non-fractional problems to be solved by introducing an auxiliary variable until convergence.

Convergence and Complexity Analysis
The original problem (10) can be addressed by solving three subproblems alternatively, i.e., (18), (22), and (40).To sum up, we propose the efficient iterative alternating Algorithm 1 to obtain a high-quality local optimal solution of problem (10).In each iteration of the proposed Algorithm 1, three distinct subproblems are optimized as follows: • One optimizes the transmit power of Alice P P P A and transmit power of the UAV P P P U with the fixed power splitting ratio w and the UAV's trajectory L L L U ; • Another optimizes the power splitting ratio w with fixed transmit power for Alice P P P A , transmit power for the UAV P P P U , and the UAV's trajectory L L L U ; • The other optimizes the UAV's trajectory L L L U with fixed transmit power for Alice P P P A , transmit power for the UAV P P P U , and power splitting ratio w.
For formulating three subproblems ( 18), (22), and (40), the bounds in ( 17), ( 34)-(36), and (39) are adopted, by which we can obtain the optimal SEE value of the original problem (10).This approach based on those bounds ensures the convergence of the proposed Algorithm 1 as explained in [5].Specifically, the proposed Algorithm 1 provides the local optimal solution of the problem (10) since the optimal solutions of three subproblems (18), (22), and (40) at each step are updated iteratively and alternatively to maximize the SEE with the inequality relationships of the bounds.The convergence of the proposed algorithm is verified numerically, as shown in Figure 2 as well.The proposed algorithm guarantees the convergence within about 15 iterations, where the larger mission time T tends to achieve the smaller SEE due to the increase of flying energy consumption compared to the secrecy rate improvement.
For analyzing the computational complexity of the proposed Algorithm 1, we derive the computational complexity of the step to obtain the solution of the subproblems as mentioned above.For each iteration, the optimization (18) of the transmit powers can be solved with the convex solver, whose computational complexity can be calculated as O(N 3.5 ).
In the case of optimizing Bob's power splitting ratio w in (22), the computational complexity remains a constant, that is, O(1).When focusing on the optimization of the UAV trajectory as defined in (40), Algorithm 1 runs for the iterations of Q 1 × Q 2 , where the SCA algorithm's loop repeats Q 1 times, while the loop for Dinkelbach's algorithm repeats Q 2 times.Since there are the total of 6N variables in (40), the computational complexity for solving the subproblem (40) to attain the optimal UAV trajectory can be expressed as O(Q 1 Q 2 N 3.5 ).Therefore, the total complexity of solving the original problem (10)

Numerical Results
In this section, we evaluate the performance of the proposed Algorithm 1 via numerical experiments.For reference, we consider the following schemes.

1.
Optimal power and EH with linear UAV trajectory design (OptP&EH/LT) [23]: P P P A , P P P U , and w are designed optimally by using the proposed Algorithm 1, while the linear UAV's trajectory is set by the following criterion: • Insufficient mission time case (T < (d BU I + BU F )/v max ): UAV flies from the initial spot to final spot with the constant velocity.• Sufficient mission time case (T ≥ (d BU I + BU F )/v max ): UAV flies to Bob, and then turns to the final destination straightly with the constant velocity.

2.
Optimal UAV trajectory and EH with the equal power allocation (OptT&EH/EP) [11]: L L L U and w are optimized by using the proposed Algorithm 1 with fixed P A [n] = P Optimal power and UAV trajectory without EH (OptP&T/NEH, Upperbound) [24]: P P P A , P P P U , and L L L U are optimized by using the proposed Algorithm 1 without the EH operation at Bob.
The proposed algorithm, as referred to in Algorithm 1, consistently outperforms benchmark schemes in various scenarios.Remarkably, the performance of the proposed algorithm approaches the upper bounds established by the OptP&T/NEH case, a testament to its effectiveness.Figures 3 and 4 illustrate the SEE as a function of mission duration T and the optimal trajectory of the UAV determined by the proposed algorithm, respectively.These figures assume the scenario where Eve is positioned opposite Bob, resulting in less exposure.The SEE values achieved by all schemes display a concavity with respect to T, attributable to the power consumption's linear rate of increase surpassing the logarithmic rate of increase of the secrecy rate, as depicted in (9).Notably, the proposed algorithm performs better than all reference schemes except its upper bound of OptP&T/NEH case, with which it is nearly on par.Furthermore, in the case of the insufficient mission time, e.g., T = 140 to 180 s, the UAV cannot afford to detour around Bob to maximize the SEE as demonstrated in the OptP&EH/LT and OptEH/EP&LT scenarios.Conversely, as the mission time T extends, trajectory optimization (i.e., OptT&EH/EP) proves more effective than power optimization (i.e., OptP&EH/LT) in enhancing SEE for the scenario under consideration.Figure 4 shows the UAV hastening towards Bob and lingering within the allocated flight duration for optimal SEE before proceeding to the final destination.This behavior illustrates the relationship between mission time and SEE attainment: with limited time, the UAV's path is more direct, while additional time allows for more complex maneuvers to maximize SEE, highlighting the necessity of allowing adequate mission times for tasks demanding higher security levels in communication.
The coordinates of ground nodes are set as L L L A = (0, 0, 0), L L L U I = (−100, 0, 20), L L L U F = (300, 0, 20), and L L L B = (100, 200, 0).For Eve's location, we consider L L L E = (100, −200, 0) for the case when Eve is located at the opposite site of Bob, while L L L B = (100, 200, 0), L L L E = (200, 100, 0) for the case when Eve is located near Bob.We follow the UAV's system parameter setting of [10] and consider the remaining parameters as H = 20 m, v max = 3 m/s, , and = 10 −4 .Figures 5 and 6 present the SEE as a function of mission time T and the optimal UAV trajectory obtained by the proposed algorithm, respectively, when Eve is in close proximity to Bob, potentially compromising Bob's channel state information.As in Figure 3, the proposed algorithm is superior to the benchmark curves and comparable with the OptP&T/NEH case.Compared to Figure 3, due to the closer proximity of Eve, there is the possibility of the zero-valued SEE for the case with no power optimization, i.e., OptEH/EP&LT and OptT&EH/EP, when the given mission time is insufficient.The zero-valued SEE in scenarios without power optimization accentuates the gravity of power adjustments.While trajectory optimization is pivotal, without suitable power allocations, the UAV's communication can be rendered futile.With sufficient mission time, the UAV strategizes to maximize SEE by maneuvering away from Eve and towards Bob, as shown in Figure 6.
The juxtaposition between Figures 3 and 4 and Figure 5 and 6 elucidates the significance of Eve's location.When Eve is situated at the opposite side of Bob, the primary focus is on minimizing exposure.However, when Eve is in closer proximity to Bob, the strategy shifts towards a more aggressive approach, with the UAV flying closer to Bob while opposing Eve to ensure secure communication.This various nature underpins the necessity of the proposed optimal algorithms that can adjust not just based on the mission time but also based on potential threats.
We summarize the execution times in seconds (s) of benchmark schemes with the proposed algorithm as in Table 1.As in Table 1, although the proposed algorithm can achieve the best performance in terms of SEE, it is observed to take only 30∼40% of the worst execution time of benchmark scheme, i.e, OptP&EH/LT under 140∼180 s.For the sufficient mission time, since the UAV's trajectory optimization spends time to detour from the route to avoid the Eve, the proposed algorithm and benchmark scheme with the UAV's trajectory optimization take sufficient time, which is the trade-off to have the performance gain for SEE.The simulations were conducted on a machine equipped with an Intel Core i7-12700K CPU at 3.61 GHz, 32 GB of RAM, and a 1TB SSD.For the implementation of the proposed algorithm, we employed MATLAB R2022a.

Concluding Remarks
In this work, we propose a secure UAV-assisted SWIPT communication system with the primary objective of maximizing the SEE.To achieve this, we address the joint SEE

13 4 .
Set SEE k+1 (P P P k+1 A , P P P k+1 U , w k+1 , L L L k+1 U ), k ← k + 1; 14 until (convergence criterion is satisfied)3.1.Optimization of Transmit PowersHere, we optimize the transmit powers of Alice and the UAV with the fixed w and L L L U .By adopting the slack variable S S S = {S[n]} N n=1 for(10), the SEE problem (10) can be reformulated as max P P P A ,P P P U ,S S
the equal power and the linear UAV trajectory (OptEH/EP&LT): w is obtained by the proposed Algorithm 1 with P A [n] = P avg A , P U [n] = P avg U , and the linear UAV trajectory design.4.

Figure 3 .
Figure 3. SEE of the UAV when Eve is located at the opposite site of Bob.

Figure 4 .Figure 5 .
Figure 4. Optima l trajectory of the UAV when Eve is located at the opposite site of Bob.

Figure 6 .
Figure 6.Optimal trajectory of the UAV when Eve is located near Bob.

Table 1 .
Execution times of benchmark schemes with the proposed algorithm.