Optimization of Full-Duplex UAV Secure Communication with the Aid of RIS

.


Introduction
In recent years, owing to their characteristics of an adaptive altitude, flexibility, and mobility, unmanned aerial vehicles (UAVs) have been extensively applied in diverse areas [1][2][3].UAVs already show many advantages in terms of improving the performance of wireless communications in many application scenarios [4,5].Generally, UAVs can be used as airborne base stations (BSs) to improve the energy efficiency, dependability, capacity, and coverage of wireless networks.However, as the wireless channel is usually shared by many users, UAV-assisted wireless communications face very high eavesdropping risk [6,7].
Over the past decades, communication security mainly depended on the cryptographic encryption techniques deployed at higher protocol stack layers.However, these techniques cause high management costs and heavy computation [8].The advent of physical layer security (PLS) techniques has significantly enhanced this landscape.It effectively supplements the cryptographic techniques, as its ability does not rely on the computing capabilities of communication devices [9].As a result, a lot of research has been performed recently to guarantee the secure transmission of UAVs through combining the PLS techniques [10][11][12][13][14].In order to avoid eavesdropping, UAVs play multiple roles, such as airborne BSs, legitimate receivers, and relays.These roles are strategically supported by the implementation of the PLS techniques, including beamforming, power allocation, trajectory planning, and so on.Furthermore, UAVs can also serve as friendly jammers to collaboratively transmit jamming signals for interfering with the wiretap channels.This collaborative jamming approach can significantly enhance the security of UAV communication systems.Specifically, in [10], UAVs were used to send artificial interference to the eavesdropper to confuse its reception, which can significantly improve security performance in some cases.In [11], the UAV was used as a mobile BS to jointly optimize the UAV trajectory and power allocation to maximize the average secrecy rate.When the UAV eavesdroppers were dispersed at random in [13], a UAV jammer aided in increasing the secrecy rate.Two UAVs were taken into account in [12], where one UAV transmitted sensitive data to a ground node (GN), and the other one jammed communication by broadcasting noise.Although the security of the UAV communication can be improved with the help of PLS technology, these technologies are not sufficient to address all security issues.Due to the complexity and dynamic nature of UAV communication systems, it is imperative to investigate innovative and efficient technologies to guarantee the security of the UAV communication.
Noticeably, due to its energy-saving, low-cost, simple-to-deploy, and programmable features, RIS is recognized as a disruptive technology in the future 6G communications [15][16][17][18].RIS possesses the capability to passively reflect the incident signals and reconfigure the wireless propagation environment to reduce interference or improve the quality of desired signals [19].Additionally, RIS has the advantage of low cost and energy consumption, as it operates within a short distance and does not require radio frequency (RF) chains [20].Consequently, there have been numerous works using RIS in UAV networks to improve their security [14,[21][22][23].In particular, researchers in [21] jointly optimized the UAV trajectory, power control, and the RIS phase shifter to maximize the secrecy rate.Ref. [22] confirmed that the benefits of RIS in improving UAV communication security can be extended to multi-user scenarios.Furthermore, in [23], the authors considered a multiantenna UAV and further used RIS to ameliorate the propagation environment, where the secrecy rate was significantly increased.Moreover, due to the line-of-sight (LoS) characteristic of UAVs, aerial malicious UAV eavesdroppers are more likely to establish LoS links with ground BS as compared to ground eavesdroppers, who pose a greater threat in terms of communication security [24].To better address the threat issue of aerial eavesdropping, the authors in [14] introduced RIS into the system and demonstrated a significant enhancement for communication security.In the aforementioned work, it was shown that by optimizing the distribution and gain of the reflected signals, RIS can enhance the PLS of the UAV communication.In addition, RIS can also significantly reduce the transmit power consumption [25].Indeed, except for improving the energy efficiency and security, achieving high spectral efficiency is also a key challenge in UAV communications.Enabling UAVs to operate in FD mode may be a promising solution to address such a problem.
Generally, FD technology has been extensively adopted in wireless communication due to its capability of effectively improving spectral efficiency [26][27][28].Thus, the extension of FD capabilities to the UAVs emerges as a promising approach to enhance UAV communication security.Specifically, the optimization algorithm proposed in [26], which is used to handle the FD operation, resulted in significant improvement in energy efficiency and secrecy rate.The authors in [27] demonstrated that the FD technology can improve the security performance of wireless communications due to its capability to double the spectrum efficiency.In terms of secrecy performance, the authors in [28] showed that FD systems can outperform half-duplex systems.Note that, in FD mode, the residual self-interference (RSI) is a non-negligible factor that is referred to the interference that occurs when the transmitted signal leaks or reflects back into the receiver's own receiver chain.RSI has detrimental effects on the received signal quality and overall communication performance [29].
Despite lots of studies on secure UAV communications, there are still some limitations that have not been well considered: Although studies [14,[21][22][23] affirmed a notable enhancement in the security of UAV communication with the aid of RIS, the persistent threat of eavesdropping remains.To address this, additional measures can be implemented to actively diminish the eavesdroppers' capabilities of eavesdropping and further mitigate the risk of information leakage.(ii) Although studies [27,28] showed that the FD UAVs can enhance communication security, they did not consider the important impact of RSI.Investigating the integration of RIS in an FD UAV system is crucial to determine whether it can address or improve the issues caused by RSI.(iii) Although the authors in [26] discussed the impact of RSI, it is based on a simplified LoS channel model, which cannot accurately characterize actual environments.In practical urban areas, there may be deviations and losses in security performance that need to be considered.
Motivated by the aforementioned issues, we intend to focus on investigating an RISassisted FD UAV secure communication system in urban areas.To facilitate communication between each user and the UAV, the RIS is set up on the building's outside.The UAV operates in FD mode to simultaneously collect private information from the ground users and deliver jamming signals to prevent eavesdropping.Considering the fairness, the worst-case minimal average secrecy rate is maximized by jointly optimizing the user scheduling, user transmit power, UAV jamming power, RIS phase shift, and UAV trajectory.However, the expected secrecy rate function is quite complex, which makes the formulated problem nonconvex.Consequently, directly applying existing optimization techniques makes attaining a globally optimal solution difficult.To overcome these difficulties, we begin by deriving a lower bound for the secrecy rate function.Then, the alternating optimization (AO) method provides an efficient iterative algorithm.In particular, we segment the primary problem into five distinct blocks.However, it is important to note that these subproblems remain non-convex.To address this challenge, we introduce slack variables and leverage the successive convex approximation (SCA) and semi0definite relaxation (SDR) techniques to resolve them aptly.Note that our proposed system adopts distinct channel models for different communication links, ensuring a more realistic alignment between the communication effectiveness and actual communication scenarios.According to the simulation results, in contrast to other benchmark schemes, it is shown that our proposed algorithm can significantly improve the overall secrecy rate.Furthermore, compared to the no RIS scheme, the proposed scheme under the adverse influence of RSI has the higher capability to weaken the eavesdropper's ability to eavesdrop.
The paper is organized as follows: In Section 2, we present the problem formulation and system model.Section 3 outlines the methodology used to address the formulated problem.In Section 4, we present the numerical results and provide a comprehensive discussion.Finally, Section 5 concludes the paper.The key notations are outlined in Table 1.The random scattering component λ The carrier wavelength d The distance of antenna separation P G , P max G Ground user average and peak transmit power P U , P max U UAV's average and peak jamming power, The Rician factor of the G-R, R-E link ρ The path loss at the reference distance Exponential distribution with unit mean accounting σ 2  The additive white Gaussian noise power σ 2

RSI
The average loop interference level Θ RIS diagonal phase shift matrix θ n The n-th reflecting element's phase shift The binary variable of indicating whether user i is served by the UAV ( •), ( •) Maximum value, Minimum value

System Model and Problem Formulation
In this paper, we focus on a UAV-enabled wireless communication system as depicted in Figure 1.The system consists of a group of ground users transmitting confidential information to a UAV.The UAV flies from the starting point to the terminal point at a fixed altitude for a specified duration of time T. At the same time, a ground eavesdropper (denoted by Eve) attempts to intercept the communication.To safeguard the data transmission, an RIS is deployed on the building's outside to reflect incident signals from each user and the UAV effectively.The RIS consists of N = N x × N z reflecting elements, with a uniform rectangular array (URA) of size N x × N z .The horizontal coordinate and height of the RIS elements are represented by s R = [x R , y R ] T and z R , respectively.The set of the ground users is represented as M, where |M| = M, and the i-th ground user's horizontal coordinate is represented as The ground Eve is positioned with a horizontal coordinate s E = [x E , y E ] T .We assume that the UAV operates in FD mode to simultaneously broadcast jamming signals to interfere with the Eve and receive sensitive information.The Eve and each ground user are equipped with receive and transmit antennas, respectively.As a result, in this system, all communication links are composed of direct and reflective links.

UAV Trajectory Model
As we know, UAV trajectory designing is one of the means to enhance the performance of UAV communication at the PLS.UAV trajectories can be designed through sensible path planning, enabling optimal communication and interference strategies within specific areas.In this system, the ground users are assumed to be served by the UAV, and the total duration T is partitioned into Ω equal time slots.Consequently, we have T = δ t Ω, where δ t represents each time slot's duration and needs to be set as the optimal value.During the flight duration, the UAV flies from the starting point to the terminal at a constant altitude specified as z U .The horizontal trajectory can be roughly described by a series of points denoted by t The UAV trajectory has to be subject to the following restrictions: where t 0 = [x 0 , y 0 ] T is the UAV starting horizontal coordinate and t F = [x F , y F ] T is the UAV final horizontal coordinate.Given a maximum UAV speed of V max in meter/second (m/s), within each time slot, the farthest horizontal distance that the UAV can fly is (2)

Direct Channel Model
The direct links are the link from the ground users to the UAV (G-U link), the link from the UAV to the Eve (U-E link), and the link from the ground users to the Eve (G-E link), respectively.Following [26], we assume that all channels follow the Rayleigh fading channel model, as the communication is easily blocked by the obstructions in an urban environment.
For the G-U link, the U-E link, and the G-E link, the channel gain can be denoted as where ρ is the reference distance D 0 's path loss for D 0 = 1 m; κ D is the corresponding path loss exponent; h1 , h2 and h3 ∼ CN (0, 1) represent the random scattering com- ponent; and dist G, the distances of the G-U link, the U-E link, and the G-E link.

Reflecting Channel Model
The reflecting links are the U-R link (from the UAV to the RIS), the R-U link (from the UAV to the ground users), the G-R link (from the ground users to the RIS), and the R-E link (from the RIS to the Eve).The LoS channel [30] is assumed to be used by the U-R and the R-U links.Therefore, g R,U [ω] ∈ C N×1 may be used to represent the channel model of the R-U link, which is given by where R represents the distance of the R-U link during the ω-th time slot, and g LOS R,U [ω] can be denoted as where represent the LoS component's azimuth and elevation angles within the ω-th time slot, λ is the carrier wavelength, and d is the distance of antenna separation.A similar process may be employed for constructing the channel model from the UAV to the RIS (U-R) link and can be denoted as Following [31], we assume that the link between the ground user and the RIS (G-R link) and the link between the RIS and the Eve (R-E link) are Rician fading channel models.Therefore, the channel model of the G-R link can be denoted as g G,R ∈ C N×1 , given by where κ R is the corresponding path loss exponent, represents the deterministic LoS component, and g NLOS G,R is the non-LoS (NLoS) component following a circularly symmetric complex Gaussian (CSCG) distribution with zero mean and unit variance.Specifically, g LOS G,R is dependent on the trajectory of the UAV, and is denoted by where , φ G,R and ϕ G,R denote the LoS component's azimuth and elevation angles, respectively.
A similar analysis process can be applied to the R-E link.The corresponding channel power gain can be represented as g R,E ∈ C N×1 and given by where dist R,E = z 2 R + ||s R − s E || 2 denotes the distance of the R-E link within the time slot ω, and R,E is the R-E link's Rician factor.The CSCG distribution with a zero mean and a unit variance is applicable for both NLoS components g NLOS R,E .Specifically, g LOS R,E is dependent on the trajectory of the UAV, and is denoted by where .

Secrecy Rate
In the ω-th time slot, the channel gain of the direct links and the reflecting links from the ground user and the Eve to the UAV through RIS can be denoted by where . . ,N} is the n-th reflecting element's phase shift and diag(x) is the diagonal matrix.
The residual self-interference (RSI) at the UAV, which is challenging to be completely eliminated in practical FD mode, has a great impact on the secure performance of communication.In this case, we define h J J as the channel gain caused by the RSI.It represents the incomplete loop interference cancellation from the UAV broadcasting antenna to its receiving antenna.Rayleigh fading is a typical model for the RSI channel h J J derived independently from CN (0, σ 2 RSI ), where the average loop interference with E[|h RSI .Let P G [ω] represent the transmit power for ground users, and P U [ω] denote the UAV jamming power within the ω-th time slot, respectively.The average and peak power restrictions are shown below: where P j ≤ P max j .Then, within the time slot ω, the constraints for the achievable rates of the UAV and the Eve in bits/second/Hertz (bps/Hz) are given by where follows an exponential distribution with unit mean accounting, σ 2 represents the power of additive white Gaussian noise at the respective receiver, and E 1 {•} and E 2 {•} denote the expectation operators with respect to |h J J | 2 and .With regard to the variables, log 2 1 With Jensen's inequality, we can show that (a) in ( 16) and (b) in (17) hold.At each time slot, there is only one scheduled user communicating with the UAV under time division multiple access (TDMA).The binary variable β i [ω] is introduced to indicate whether user i is served by the UAV within the ω-th time slot.If β i [ω] = 1, it implies that user i is served; otherwise, if β i [ω] = 0.These constraints can be formulated as given below: As a result, within each time slot, the achievable average secrecy rate is denoted by where [x] + = max(x, 0).By setting P G [ω] = 0, ∀ω, it should be noted that the operator [•] + may be omitted since the actual value of ( 20) is always non-negative.

Problem Formulation
In this study, by jointly optimizing the user scheduling ω=1 and the horizontal UAV trajectory T {t[ω]} Ω ω=1 over the flight time duration of T, we aim to maximize the worst-case achievable average secrecy rate of the UAV for each user.Consequently, the problem can be described as max (1) − (2), ( 15), ( 18), (19).
Although the constraints in (1), ( 2) and ( 15) are convex, solving problem (21) optimally is still challenging.The reasons are shown as follows.First of all, with respect to A, P G , P U , Θ and T , constraint (22) is not jointly convex.Second, due to the binary variable constraints (18) and (19), solving the mixed-integer optimization problem is difficult.As a result, to achieve a suboptimal solution for such an optimization problem, we present an efficient algorithm in Section 3.

Proposed Algorithm
In this section, we focus on solving the joint optimization problem mentioned above.However, due to the coupled optimization variables A, P G , P U , Θ and T in the objective function, solving problem ( 21) is quite challenging.We propose an efficient algorithm to deal with this issue.To be more precise, we decompose problem (21) into five subproblems.

Optimization of User Scheduling
The user scheduling problem can be optimized with the given ground user transmit power P G , the UAV jamming power P U , the RIS phase shift matrix Θ, and the UAV trajectory T .We relax (19) into continuous variables to make the problem tractable.The problem can be specified by max

(18).
As a result, problem (23) can be effectively addressed using CVX because it is a standard linear programming problem.We can find the optimal solution to problem (23) and subsequently obtain the integer solution using the rounding method.

Optimization of the User Transmit Power
The optimization subproblem of the ground user transmit power P G with given A, P U , Θ, and T , reduces to max , Based on previous work [32], the optimal solution can be obtained as follows: where Note that one-dimensional bisection search may be used to obtain η ≥ 0 in (29), which guarantees that the constraints in (15) are satisfied as long as P op i [ω] is attained.

Optimization of the UAV Jamming Power
The UAV jamming power P U Optimization Problem with given A, P G , Θ and T may be described as follows: max , , and . To avoid the non-convexity of the optimization issue, the SCA technique is used to approximately transform it to a convex optimization problem by following [33].Since log 2 (P U [ω]α 0 + 1) and log 2 (W ω P U [ω] + 1 + d ω ) are concave functions with respect to P U [ω], the first-order Taylor expansion's local upper bound is around a specific point P kk0 U [ω] as shown below: By replacing the local upper bounds in ( 32) and (33) using the terms log 2 (P U [ω]α 0 + 1) and log 2 (W ω P U [ω] + 1 + d ω ) in the objective function, problem (30) can be transformed to the following convex optimization problem (34): max (15).
Therefore, problem (34) can be effectively addressed using CVX.

Optimization of the Phase Shift Matrix Θ
Given A, P G , P U and T , with the aid of the slack variable τ = τ[ω] Ω ω=1 , the phase shift matrix Θ optimization problem is shown as below.Let Thus, the following equalities can hold, shown as follows: where Here, Here, the superscript * denotes the conjugate operator.The optimization of the phase shift matrix Θ is further reduced to max (41) ) is not concave with respect to τ[ω], finding the optimal solution for problem (39) is challenging.It is known that a convex function's first-order Taylor expansion is its global underestimator and a concave function's global overestimator, respectively.Accordingly, in order to resolve problem (39), we intend to use the SCA approach.The first-order Taylor expansions of log 2 (1 Hence, we modify problem (39) to max where the (e, f )-th element of E ω , denoted by [E ω ] e, f is denoted by Due to the fractional and non-concave constraint (46) in terms of w, as well as the non-convex quadratic equality constraint (47) for each ω, finding the optimal solution for problem (44) is challenging.In order to address such issues, we employ the SDR approach in this case.Let rank(Z) and tr(Z) denote the rank and the trace of a matrix Z, respectively.With W[ω] w[ω]w H [ω], the constraint of rank(W[ω]) = 1 needs to be dropped in order to re-express problem (44) in its relaxed form.In order to obtain an approximate solution to problem (44), an updated optimization problem is shown below: Using Charnes-Cooper transformation, setting ε and problem (49) can be further transformed to max tr (52).
With the assistance of the slack variable ξ = ξ[ω] Ω ω=1 , problem ( 53) is transformed into an equivalent form that is non-fractional, shown as follows: Therefore, optimization problem (58) can be effectively addressed using CVX.

Optimization of the UAV Trajectory T
Given A, P G , P U and Θ, the optimization problem of the UAV trajectory T can be expressed as max where In particular, since g R,E and g G,E are independent of the UAV trajectory, we set a constant A[ω] to replace it in (61).It is worth noting that g G,U [ω], g U,E [ω], and g R,U [ω] are impacted by the UAV trajectory from (3), ( 4), and (6).However, due to the complex and nonlinear nature of g R,U [ω] in (6), the optimization of the UAV trajectory becomes intractable.To address this issue, we approximate g R,U [ω] and g U,R [ω] in the j-th iteration using the UAV trajectory from the (j − 1)-th iteration.With this approximation, we can reformulate problem (61) as follows: max where Here, γ 0 , and g [ω] utilizing the (j − 1)-th iteration's UAV trajectory.Note that due to the objective function's non-concavity with regard to the UAV trajectory T , problem (63) is not convex.We further update problem (63) by introducing the slack variables b into the optimization problem, shown as follows: max (1), (2), We unroll (67)-(69) in order to make the subsequent derivations easier, shown below: We utilize the SCA technique to handle the non-convexity of the constraints (72)-( 74) and the non-concavity of log 2 (1 + And the first-order Taylor expansions of (b[ω]) Accordingly, problem (65) can be approximately transformed to max (1), (2).
Thus, the convex optimization problem (75) can be effectively addressed using CVX.

Algorithm Summary
Algorithm 1 provides a summary of the proposed algorithm, which decomposes the overall optimization problem into the five sub-problems.The maximum quantity of iterations is denoted by l max , and the convergence accuracy is controlled by parameter .As described in Section 2, by tackling the five subproblems iteratively, the solution to problem (21) can be obtained.The five subproblems' complexities determine the overall computational complexity.To solve these subproblems, the standard interior-point method is employed using CVX [34].Subproblem 4 and subproblem 5 have the highest computational complexities, denoted as O sub4 ( )) and O sub5 ((7N) 3.5 log( 1)), respectively.Therefore, the complexities of Algorithm 1 are mainly from subproblem 4 and subproblem 5.The objective function (21) in Algorithm 1 is confirmed by the subsequent numerical results.
In Figure 2, the UAV trajectory is shown in terms of the four schemes when T = 100 s and N = 200.The specific descriptions for the optimal trajectories under four scenarios are shown as follows:  (1) In the proposed JO/SPPRT scheme, the UAV flies midway among the users and the RIS, maximizing the performance gain.Then, it approaches Eve, sending jamming signals to enhance communication security by suppressing eavesdropping.(2) In the JO/NJ scheme, the UAV initially flies intermediately among the RIS and the users, maximizing the hovering time.Unlike the JO/SPPRT scheme, without jamming, the UAV focuses on flying away from the Eve to minimize eavesdropping.(3) In the JO/NR scheme, the UAV communicates sequentially with user 2, user 1, and user 3. Different from the JO/SPPRT scheme, without the assistance of the RIS, the JO/NR scheme has limited ability to suppress eavesdropping.Hence, the UAV approaches each user individually and moves away from the Eve to enhance the secrecy rate.(4) In the JO/NP scheme, without power control, the users cannot transmit information at high power, and the UAV cannot send jamming signals at high power when close to Eve.Hence, the UAV flies midway among the RIS and the users to improve the communication performance, and moves away from the Eve to reduce eavesdropping.
Figure 3 shows the max-min rate achieved under various schemes for varying T from 40 s to 160 s with N = 200.The JO/SPPRT scheme clearly outperforms other benchmarks.The JO/NJ scheme shows poor performance, as T increases because it cannot interfere with Eve.This shows the significant advantage of the UAV FD communication system.The JO/NP scheme outperforms the JO/NR scheme on the max-min rate, which shows that RIS can effectively suppress the eavesdropping.Obviously, the JO/SPPRT scheme outperforms the JO/NP scheme with respect to the secrecy rate, which demonstrates the effectiveness of the power optimization in boosting the overall secrecy rate.Figure 4 shows the achieved max-min rate with respect to T for N = 200, N = 400, and N = 600.For the same time slot, we can show that the higher the amount of the RIS reflecting elements N, the greater the secrecy rate improvement; for the same N value, the secrecy rate increases as T increases.Hence, increasing the number of elements can result in higher passive beamforming gain as observed in this figure.Figure 5 shows the achieved max-min rate under different LIL for various benchmark schemes when T = 100 s and N = 400.The JO/SPPRT scheme demonstrates the superiority over other schemes.As LIL increases, the secrecy rate of JO/SPPRT approaches JO/NJ, while JO/NR converges to a stable value.In the JO/SPPRT scheme, the UAV dynamically adjusts the power allocation to align with the jamming power of the JO/NJ scheme, leading to the convergence of their secrecy rates, particularly in the scenarios with high LIL values.In the JO/NR scheme, the absence of RIS significantly reduces the communication performance and eavesdropping offset, and as LIL increases, it leads to a substantial decrease in the UAV jamming power and the convergence to a stable secrecy rate.Therefore, in the JO/SPPRT scheme, the higher LIL of the UAV will seriously affect its ability to send jamming signals.In the JO/NP scheme, with a fixed UAV jamming power, increasing the LIL of the UAV leads to intensified interference to the UAV airframe and a significant drop in the secrecy rate.Figure 6 shows the jamming power with respect to T for various LIL when N = 400.In the JO/NR scheme, the jamming power shows three phases as follows.Firstly, during communication between the UAV and user 2, the jamming power requirement is minimal, as user 2 is farthest from Eve.Secondly, as the UAV communicates with user 3, since user 3 is closer to Eve, the jamming power needs to be set to a higher value.Lastly, the higher jamming power is required to counteract eavesdropping when the UAV communicates with user 1, which is closest to the Eve.We can see that the higher LIL results in the lower jamming power at each stage, and excessive LIL significantly hampers the effectiveness of UAV in jamming the Eve.Also, we can observe that the JO/SPPRT scheme maintains a low and steady jamming power throughout the stage, which is less affected by LIL.As such, we can show that compared to the JO/NR scheme, the JO/SPPRT scheme with the aid of RIS provides the best security performance with less jamming power.This also shows the fact that the JO/SPPRT scheme with RIS reduces the communication energy usage and reduces the effect of RSI on the secure communication of FD UAV.

Conclusions
In this paper, we investigated an RIS-assisted FD UAV secure communication system.We maximized the worst-case average secrecy rate by jointly optimizing several parameters, such as user scheduling, user transmit power, UAV jamming power, RIS phase shift, and UAV trajectory.Due to the non-convexity of the optimization problem and the presence of non-convex quadratic equality constraints in the subproblems, we proposed a novel algorithm, namely the JO/SPPRT scheme, to handle such an optimization problem and obtain a suboptimal solution.The numerical results confirmed the effectiveness of our proposed algorithm.Furthermore, we obtained the following conclusions: (1) The RISassisted FD UAV under RSI has the higher capability to interfere with eavesdropping, and results in further security enhancement as well as reducing the effect of RSI on FD UAV communication.(2) Unlike work that solely considered LoS channels, our research considered Rayleigh channels for direct links and Rician and LoS channels for reflected links, which can better match the actual environment condition in urban areas.Accordingly, this approach further enhances security performance and reduces biases and losses.(3) As compared to the scheme without RIS, our proposed scheme showed better security performance with lower jamming power.As such, our scheme is more energy saving.
Although this study addresses a scenario involving single eavesdropper, the proposed algorithm can be extended to the general case of multiple eavesdroppers.Additionally, this work could be further advanced using state-of-the-art reinforcement learning techniques for optimization.The algorithm proposed in this paper can serve as a benchmark to assess the performance and efficacy of such reinforcement learning algorithms.

Figure 3 .
Figure 3. Max-min rate versus T with various benchmarks.

Table 1 .
List of major notations.