Next Article in Journal
Simultaneous Learning Knowledge Distillation for Image Restoration: Efficient Model Compression for Drones
Next Article in Special Issue
A Review of Physical Layer Security in Aerial–Terrestrial Integrated Internet of Things: Emerging Techniques, Potential Applications, and Future Trends
Previous Article in Journal
Online Resource Allocation and Trajectory Optimization of STAR–RIS–Assisted UAV–MEC System
Previous Article in Special Issue
Physical-Layer Security Enhancement for UAV Downlink Communication Using Joint Precoding and Artificial Noise Design in Generalized Spatial Directional Modulation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization

1
School of Computer Science and Technology, Tongji University, Shanghai 201804, China
2
School of Information Science and Electrical Engineering, Shandong Jiaotong University, Jinan 250357, China
3
Key Laboratory of Embedded System and Service Computing, School of Software Engineering, Tongji University, Shanghai 201804, China
4
Engineering Research Center of Key Software Technologies for Smart City Perception and Planning, Ministry of Education, Shanghai 200003, China
*
Author to whom correspondence should be addressed.
Drones 2025, 9(3), 208; https://doi.org/10.3390/drones9030208
Submission received: 16 February 2025 / Revised: 10 March 2025 / Accepted: 12 March 2025 / Published: 14 March 2025
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)

Abstract

:
With the wide application of unmanned aerial vehicles (UAVs) in the military and civilian fields, the physical layer security of UAV-assisted communication has attracted more and more attention in recent years. Reconfigurable intelligent surface (RIS) is a revolutionizing and promising technology that can improve spectrum efficiency through intelligent reconfiguration of the propagation environment. In this paper, we investigate the physical layer security of RIS and UAV-assisted communication systems. Specifically, we consider the scenario of multiple eavesdroppers wiretapping the communication between the base station and the legitimate user and propose a secure mechanism that deploys the RIS on a dynamic UAV for security assistance. In order to maximize the average secrecy rate of the system, we propose a joint optimization problem of joint UAV flight trajectory, RIS transmit phase shift, and base station transmit power. Since the proposed problem is non-convex, it is difficult to solve it directly, so we propose a joint optimization algorithm based on block coordinate descent and successive convex optimization techniques. Simulation results verify the effectiveness of our proposed design in improving the secrecy performance of the considered system.

1. Introduction

With the characteristics of small size, strong flexibility, and ease of deployment, unmanned aerial vehicles (UAVs) have been widely used in various fields such as cargo transport, environmental monitoring, infrastructure inspection and maintenance, and urban planning [1]. One of the most important applications, UAV-assisted communication has attracted significant attention. Compared to traditional ground-based communication, UAV-assisted communication offers several distinct advantages [2]. First, it can provide temporary and emergency communication services, offering network coverage in areas without fixed communication infrastructure. UAVs can be rapidly deployed to ensure uninterrupted critical communication. Second, UAV-assisted communication can enhance network coverage and capacity, dynamically adjusting flight positions and communication capabilities in the air to provide real-time, flexible coverage [3]. Additionally, UAV-assisted communication can improve mobile communication services in scenarios that require high-speed networks and large-scale device connections, ensuring high-speed data transmission. For example, a UAV is deployed to collect data from low-power ground nodes in a multi-obstacle environment [4]. The completion time can be minimized while satisfying the communication link requirements of each device and ensuring obstacle avoidance and data transmission. In addition, UAV-assisted communication can be easily extended to serve more complex wireless networks, such as the energy harvesting systems [5] and data collection tasks in maritime scenarios [6].
The advantages make UAV-assisted communication a promising technology for future wireless communication networks. UAVs operate at low altitudes, which allows them to establish line-of-sight (LoS) communication links with ground users and can significantly reduce path loss. However, due to the LoS characteristics of UAV-assisted communication, the signal is more easily wiretapped by eavesdroppers. Therefore, security issues in UAV-assisted communication have become increasingly important. The traditional methods guaranteeing the confidentiality of the communication system are mainly based on the cryptography in wireless OSI layers, such as HTTP and FTP in the application layer [7] and TCP and UDP in the transport layer [8]. Although these methods based on cryptography can meliorate communication confidentiality, they require high computational complexity and lead to longer delays. Different from the traditional encryption methods, physical layer security (PLS) can enhance eavesdropping resistance and improve communication privacy by leveraging the physical characteristics of the channel itself [9]. With the advantages of not depending on computational complexity and being capable of achieving perfect secrecy, physical layer security has been widely studied with various promising technologies. In the UAV-assisted communication system, the flight path of UAVs is usually not fixed, which leads to dynamic variations in the communication channel [1,10]. Physical layer security just utilizes the characteristics of the channel to provide flexible and dynamic security protection for UAV-assisted communication [11]. Therefore, leveraging physical layer security to improve the secure performance of the UAV-assisted communication system has attracted significant attention in recent years.
The secure challenge of UAV-assisted communication by applying physical layer security is studied considering both downlink and uplink communications with a potential eavesdropper on the ground [12]. The utilization of the mobile UAV reduces the possibility of information exposure to eavesdroppers. In Ref. [13], a secure communication system was considered, where the UAV plays the role of a mobile relay where no direct links exist between a source node and a legitimate node. The authors developed an iterative algorithm and demonstrate that mobile UAV relay is superior to static relay in terms of secrecy enhancement. The authors in [14] addressed physical layer security in a network of untrusted UAVs communicating in a full-duplex way and propose a source-based jamming scheme to enhance the secure performance of the system. In Ref. [15], the authors considered the PLS in a UAV-assisted backscatter scenario and propose the artificial noise (AN) injection design to weaken the eavesdropper link. An iterative algorithm is proposed to meliorate the secrecy performance considering the UAV’s location, the reflection coefficient, and the power allocation. In Ref. [16], the authors studied a UAV-assisted energy harvesting system where the UAV is employed as a cooperative jammer to improve the physical layer security and meliorate the secrecy rate.
Recently, reconfigurable intelligent surface (RIS), as an emerging technology, has received widespread attention and can provide a new solution for enhancing physical layer security [17]. RIS can flexibly adjust the configuration of the reflective surface and intelligently adjust the propagation path of electromagnetic waves, effectively enhancing the directionality of the signal and reducing the probability of illegal receivers (such as eavesdroppers) capturing the signal [18]. The incorporation of RIS into physical layer security presents a multitude of significant advantages. Specifically, the passive beamforming can be effectively implemented through the use of passive elements of RIS, thereby enabling the manipulation of signal propagation direction and leading to notable enhancements in system secrecy performance [19]. Moreover, RIS can obtain signal coverage where there is a barrier in the direct link [20], which implies the RIS can be deployed around legitimate users in the scenario that obstacles are blocking its channel link. Meanwhile, RIS can be readily deployed on existing infrastructures, while avoiding the additional deployment expenditure [21]. The authors in [22] studied the PLS of an RIS-aided multi-antenna system and maximize the secrecy rate constrained by the transmit power and the phase shift of the RIS. The authors in [23] further proposed a secure power-efficient design of the considered system. In Ref. [24], the authors investigated the cooperation of RIS and artificial noise (AN) to meliorate the PLS. Besides, the PLS of the Device-to-Device communication and relay system are considered to study the assistance of RIS in improving the secrecy performance [25,26]. In summary, the unique advantages of RIS significantly enhance physical layer security in wireless communications.
Although UAV-assisted secure communication systems have shown significant advantages in providing flexible communication coverage, UAVs still face challenges such as energy consumption, signal interference, and coverage limitations in high-density or complex environments [27]. RIS, with its low power consumption, environmental friendliness, and superior service quality, can be integrated to further enhance the PLS in UAV-assisted communication systems [28]. The PLS of the UAV communication system is investigated where an eavesdropper wiretap the secure communication between the UAV and the ground user [29]. Given the UAV’s limited capacity, RIS is considered to meliorate the secrecy performance. Taking the imperfect channel state information (CSI) into consideration, the secrecy rate is maximized by jointly optimizing the dynamic UAV trajectory, the phase shift of the static RIS, and the power consumption. The authors in [30] further considered a malicious active jammer in the scenario and a secure scheme is proposed to improve the secure performance of the uplink communication. In Ref. [31], the authors studied PLS of the scenario without a direct link between the UAV and the base station and static RIS is deployed to assist the secure communication. Their proposed secure design utilizes the cascaded channel, while the authors further investigated a quantizer to quantify the channel gain fluctuations associated with the channel characteristics. In the RIS-assisted multi-UAV secure system, the authors explored the secure performance of three modes that the RIS utilizes to enhance the information transmission, energy transfer, and the two functions simultaneously [32].
Based on the exploration of deploying the independent RIS in the UAV-assisted communication scenario, researchers further investigated the impact of directly integrating the RIS and the UAV together, which can combine the advantages of two techniques and meliorate the communication performance [33,34,35,36]. The authors in [33] presented a stochastic analysis of UAV-mounted RIS-assisted wireless systems under composite fading and spatially correlated shadowing, deriving closed-form expressions for the outage probability, ergodic capacity, and energy efficiency, and demonstrating superior performance over decode-and-forward relaying in composite fading environments. However, this study focuses on different channel conditions, without considering the security issue and leveraging the mobility of the UAV. Considering the vulnerabilities of integrating RIS and UAV, the authors in [34] proposed a secure framework based on deep machine learning to robustly address security issues and ensure reliable communication by countering malicious threats. The authors in [35] investigated the PLS issue of a secure communication system where the communication links are established by mounting RIS on UAV. Specifically, a deep Q-network is designed to attain reliable and secure transmission under imperfect CSI and behaviors of mixed attacks. By jointly designing the UAV-RIS location, the transmit beamforming of the base station, the passive beamforming of RIS, and artificial noise, the worst-case secrecy rate can be maximized. In [36], the authors further investigated leveraging the UAV equipped with RIS relaying source signals against eavesdropping, interference, and jamming attacks. The robust transmit beamforming design of the base station is improved to counter three security threats and a joint optimization algorithm is proposed to obtain the reflect phase shift of RIS. Although [34,35,36] considered integrating RIS and UAV to improve the security performance of communication systems and defend against security attacks, none of these studies took into account the simultaneous use of the UAV’s flexible mobility and the reconfigurable channel characteristics of the RIS to enhance the physical layer security performance of the system.
Inspired by the above discussions, in this paper, we investigate the integration of RIS and dynamic UAV to improve the secrecy performance of the communication system. Different from the current studies introducing static RIS in UAV-assisted secure communications, we consider mounting the RIS on the dynamic UAV to enhance the secure communication of the base station and the legitimate user by adjusting the phase shift of the RIS and fully exploiting the mobility of the UAV. In order to maximize the average achievable secrecy rate, we formulate a joint optimization problem of the phase shifter of the RIS, the dynamic UAV trajectory, and the transmit power of the base station, and propose an iterative algorithm for the optimization problem. Simulation results demonstrate the efficiency of our proposed secure design in meliorating the secrecy performance. The contributions of the innovation points and the work of the simulation part in this paper can be outlined as follows:
  • In this paper, we propose a flexible UAV-mounted reconfigurable intelligent surface secure design and attempt to investigate the assistance of the UAV-mounted reconfigurable intelligent surface in physical layer security. Specifically, we study a secure communication system consisting of a base station, a legitimate ground user, several passive eavesdroppers, and the dynamic UAV-mounted RIS. We jointly optimize the UAV trajectory, the RIS phase shifter, and transmit power, aiming to improve the average achievable secrecy rate in the multiple-eavesdroppers scenario.
  • In order to maximize the average achievable secrecy rate, we formulate a joint RIS phase shifter, UAV trajectories, and base station transmit power optimization problem. To tackle the non-convexity of the formulated problem, we propose an iterative algorithm based on block coordinate descent and successive convex optimization techniques. The algorithm enables us to find an efficient solution to the optimization problem.
  • To better present the superiority of our proposed secure design, we consider the conditions without the secure design, the proposed design in a static mode, and heuristic mode. Simulation results demonstrate that our proposed dynamic secure design outperforms other schemes in different channel and deployed height conditions in meliorating the secrecy rate. Besides, the numerical results also confirm the potential of using the proposed dynamic UAV-mounted RIS secure design to improve secrecy performance and save base station power.
The remaining parts of this paper are organized as follows. Section 2 presents the system model and the secure design. The formulated problem is discussed in Section 3 and the proposed optimization algorithm is discussed in Section 4. Section 5 depicts the numerical results. We conclude the paper in Section 6.

2. System Model and Secure Design

In this section, we consider a secure communication system where the base station communicates with the legitimate user wiretapped by the eavesdroppers around the legitimate user, which is a common scenario of practical application; for instance, in military operational contexts requiring UAV-enabled data acquisition or in urban deployment scenarios where the inherent complexity of built environments gives rise to multi-Eve eavesdropping scenarios. In order to improve the secrecy performance of the system, we propose a secure design that deploys the RIS on the dynamic UAV for the considered secure scenario.

2.1. System Model

The secure transmission system consists of a base station (Alice), a legitimate ground user (Bob), a UAV-mounted RIS, and K passive eavesdroppers (Eves). As shown in Figure 1, Alice, Bob, and Eves are all located on the ground. The base station communicates with the legitimate user wiretapped by the eavesdroppers around the legitimate user, which is a common scenario of practical application. Considering the complexity of practical deployment scenarios where base-station-to-user and base-station-to-Eves connections may potentially lack direct propagation paths due to physical obstructions or environmental factors, these particular links are modeled using Rayleigh fading channels.
We denote K = { 1 , 2 , , K } as the set of eavesdroppers that are arbitrarily distributed on the ground. The signals are transmitted from Alice to Bob straightly and through RIS to Bob reflectively, while K Eves intend to intercept. Moreover, Alice, Bob, and K Eves are all with a single omnidirectional antenna. The scenario adopts a three-dimensional (3D) Cartesian coordinate system. We denote c A = [ x A ,   y A ] T ,   c B = [ x B ,   y B ] T , and c E k = [ x E k ,   y E k ] T ,   k K denote the horizontal coordinates of Alice, Bob, and the kth Eve, respectively. Besides, Alice’s height is denoted as H A .
The channel coefficients of Alice–Bob link g A B and Alice–kth Eve g A E k , k K , can be, respectively, expressed as
g A B = g 0 d A B β h A B ,
g A E k = g 0 d A E k β h A E k ,
where g 0 represents the channel gain at D 0 = 1  m and d A B = | | c A c B | | 2 + H A 2 and d A E k = | | c A c E k | | 2 + H A 2 , k K , denote the distance from Alice to Bob and the kth Eve. β represents the path loss exponent of AB/AE links. Besides, h A B and h A E k denote the independent and random scattering components, modeled as circularly symmetric complex Gaussian (CSCG) random variables with zero mean and unit variance.

2.2. Dynamic UAV-RIS Secure Design

In order to meliorate the secrecy performance of the system, we propose a UAV-mounted RIS-aided (UAV-RIS) secure design for the considered system. The UAV-RIS can construct additional channel links for the secure system from different locations. Specifically, the UAV flies at a fixed height H 0 from the predetermined SP c 0 to the TP c f within flight period T. We assume that the RIS and UAV has the same coordinate. Its horizontal coordinate at t, 0 t T , is denoted as q ( t ) = [ x ( t ) , y ( t ) ] T . According to the limit of the UAV flight speed in practice, the maximum speed of the UAV is represented as V max , which gives the flight constraints of the UAV as follows
q ( 0 ) = c 0 ,
d ( q ( t ) q ( t 1 ) ) d t V max ,
q ( T ) = c f .
For ease of description, we divide the flight period T into N equal time slots, i.e., T = N δ 0 , where δ 0 is small enough that the location change of the UAV can be regarded as constant. Besides, the set of the time slot is denoted as N = { 1 , , N } . Therefore, the UAV time-change horizontal coordinate can be given as q [ n ] = [ x [ n ] , y [ n ] ] T , n N = { 1 , , N } , and the flight constraints can be expressed as
q [ 1 ] c 0 V max δ 0 ,
q [ n + 1 ] q [ n ] V max δ 0 , n = 1 , , N 1 ,
q [ N ] = c f ,
where · denotes the Euclidean norm and V max δ 0 denotes the UAV maximum horizontal distance change during one time slot.
The UAV-mounted RIS utilizes a uniform linear array (ULA) with M passive elements, and the phase shifter matrix of the RIS is denoted by a diagonal matrix Θ [ n ] = diag { e j θ 1 [ n ] , , e j θ M [ n ] } C M × M , where θ m [ n ] [ 0 , 2 π ) , m = 1 , , M . Given the blockages of common communication scenarios, the channel fading of the Alice–Bob (AB) and Alice–Eves (AE) links are assumed following Rayleigh fading channel. The communication links between Alice–RIS–Bob (AIB)/Alice–RIS–Eve (AIE) exhibit dominant LoS A2G wireless channel characteristics, while the impact of the Doppler effect caused by the UAV’s mobility can be fully mitigated [37]. We assume that Alice and RIS perfectly possess the channel state information (CSI) of the AIB link and Alice knows the location of RIS, Bob, and Eves [38]. Moreover, we consider that all Eves are passive eavesdroppers, and obtaining small-scale fading between Alice and Eves is difficult, which is a worst-case scenario for consideration.
In the nth time slot, channel coefficients of LoS A2G channel Alice–UAV/RIS link g A [ n ] C M × 1 , UAV/RIS–Bob g B [ n ] C M × 1 , and UAV/RIS–kth Eve g E k [ n ] C M × 1 , k K , are as follows
g A [ n ] = g 0 d A α [ n ] [ 1 , , e j 2 π λ 0 ( M 1 ) d e ϕ A [ n ] ] T ,
g B [ n ] = g 0 d B α [ n ] [ 1 , , e j 2 π λ 0 ( M 1 ) d e ϕ B [ n ] ] T ,
g E k [ n ] = g 0 d E k α [ n ] [ 1 , , e j 2 π λ 0 ( M 1 ) d e ϕ E k [ n ] ] T ,
where d A [ n ] = | | q [ n ] c A | | 2 + ( H 0 H A ) 2 denotes the distance from the UAV to Alice and d B [ n ] = | | q [ n ] c B | | 2 + H 0 2 and d E k [ n ] = | | q [ n ] c E k | | 2 + H 0 2 , k K denote the distance from the UAV to Bob/kth Eve. Moreover, α 2 denotes the pathloss exponent between RIS and Alice/Bob/Eves. λ 0 and d e denote the carrier wavelength and element separation distance at the RIS, respectively. Besides, ϕ A [ n ] = x [ n ] x A d A [ n ] is the cosine of the AoA of the signal from Alice to RIS, ϕ B [ n ] = x B x [ n ] d B [ n ] and ϕ E k [ n ] = x E k x [ n ] d E k [ n ] are the cosine of the AoD of the signal from RIS to Bob and the kth Eve.
With Equations (1)–(7), the signals received at Bob y B [ n ] and the kth Eve y E k [ n ] are as follows
y B [ n ] = P [ n ] ( g A B + g B [ n ] H Θ [ n ] g A [ n ] ) s [ n ] + n B ,
y E k [ n ] = P [ n ] ( g A E k + g E k [ n ] H Θ [ n ] g A [ n ] ) s [ n ] + n E k ,
where P [ n ] and s [ n ] denote the transmit power and the transmit signal at Alice in the nth time slot and n B and n E k represent the additive white Gaussian noise (AWGN) with zero mean and variance σ 2 at Bob and the kth Eve. Besides, the transmit power constraints at Alice can be given as
n = 1 N P [ n ] N P ave ,
0 P [ n ] P p ,
where P ave and P p represent the average and peak transmit power. Equation (10a) indicates that the total transmit power during the transmission should be less than the budget and Equation (10b) indicates the peak power constraint.

3. Problem Formulation

In this paper, we aim to meliorate the average achievable secrecy rate of the considered multiple-eavesdroppers scenario. According to the channel coefficients and the coordinates, the transmission rate at the legitimate user Bob in the nth time slot can be expressed as
R B [ n ] = log 2 1 + P [ n ] σ 2 g 0 h A B d A B β / 2 + g 0 f B [ n ] d B α / 2 [ n ] d A α / 2 [ n ] 2 ,
where
f B [ n ] = m = 1 M e j [ 2 π λ 0 ( m 1 ) d e ( ϕ B [ n ] ϕ A [ n ] ) + θ m [ n ] ] .
Similarly, the transmission rates at the kth Eve in the nth time slot can be given as
R E k [ n ] = E log 2 1 + P [ n ] σ 2 g 0 h A E k d A E k β / 2 + g 0 f E k [ n ] d E k α / 2 [ n ] d A α / 2 [ n ] 2 ,
where E [ · ] denotes the expectation operator and
f E k = m = 1 M e j [ 2 π λ 0 ( m 1 ) d e ( ϕ E k [ n ] ϕ A [ n ] ) + θ m [ n ] ] .
Considering that the small-scale fading between Alice and Eves is difficult to obtain, we use Jensen’s inequality to get an upper bound of R E k [ n ] , expressed as R ^ E k [ n ]
R E k [ n ] log 2 1 + P [ n ] σ 2 E g 0 h A E k d A E k β / 2 + g 0 f E k [ n ] d E k α / 2 [ n ] d A α / 2 [ n ] 2 = log 2 1 + P [ n ] σ 2 g 0 d A E k β + g 0 2 f E k 2 [ n ] d E k α [ n ] d A α [ n ] R ^ E k [ n ] .
The objective of the paper is to maximize the average achievable secrecy rate during the N time slots constrained by the UAV mobility constraints in Equation (4) and power constraint in Equation (10), where there are three variables: UAV’s trajectory Q = { q [ n ] , n = 1 , 2 , , N } , the phase shifter of the RIS Φ = { Θ [ n ] , n = 1 , 2 , , N } , and transmit power at Alice P = { P [ n ] , n = 1 , 2 , , N } . Thus, the average secrecy rate maximization problem in the proposed UAV-mounted RIS-aided dynamic communication system can be formulated as
( P 1 ) : max Φ , Q , P 1 N n = 1 N R B [ n ] max k K R ^ E k [ n ] +
s . t . q [ 1 ] c 0 V max δ 0 ,
q [ n + 1 ] q [ n ] V max δ 0 , n = 1 , , N 1 ,
q [ N ] = c f ,
n = 1 N P [ n ] N P ave ,
0 P [ n ] P p ,
where 1 N n = 1 N R B [ n ] max k K R ^ E k [ n ] + is the average achievable secrecy rate, Equations (16a)–(16c) represent the mobility constraints of the UAV, and Equations (16d) and (16e) represent the average and peak transmit power of Alice. Due to the operator [ Y ] + = max { Y , 0 } , the objective function of (P1) is non-smooth. Moreover, the optimization problem (P1) is characterized by a non-convex objective function, which presents a considerable challenge for direct resolution. In order to overcome this difficulty, we propose an efficient algorithm that addresses the formulated problem by optimizing the RIS phase shifter Φ , the dynamic UAV trajectory Q , and transit power at Alice P in an iterative way.

4. Proposed Algorithm

As for the non-smooth problem of the formulated problem, the optimization of transmit power in (P1) can invariably result in a non-negative secrecy rate within each time slot according to Lemma 1 in [12], which allows [ ] + operator to be omitted. Thus, (P1) can be rewritten as
( P 2 ) : max Φ , Q , P 1 N n = 1 N R B [ n ] max k K R ^ E k [ n ] s . t . ( 16 a ) , ( 16 b ) , ( 16 c ) , ( 16 d ) , ( 16 e ) .
(P2) is a problem that involves multiple variables and is challenging to solve directly. Considering the non-convexity and intractability of the multi-variable problem, block coordinate descent (BCD) is utilized to tackle the above optimization problem in an iterative way. Specifically, the optimization is performed in one direction at a time [39]. When we optimize the specific variable, the others will be treated as constant. The details will be presented in the following.

4.1. Phase Shifter Optimization

With the given UAV trajectory Q and transmit power P , optimizing the phase shifter Φ of the RIS can improve the value of secrecy rate, which means the secure performance enhanced. Because the small scale fading of the AE links cannot be obtained, the optimized phase shifter maximizes Bob’s received rate. Considering that g 0 h A B d A B β / 2 and f B [ n ] = m = 1 M e j [ 2 π λ 0 ( m 1 ) d e ( ϕ B [ n ] ϕ A [ n ] ) + θ m [ n ] ] are complex values, | g 0 h A B d A B β / 2 + g 0 f B [ n ] d B α / 2 [ n ] d A α / 2 [ n ] | can be taken to the maximum when the phase of each element at the RIS is equal to the phase of h A B . The optimal phase shifter of the mth element in the nth time slot can be expressed as
θ m * [ n ] = 2 π λ 0 ( m 1 ) d e ( ϕ A [ n ] ϕ B [ n ] ) + a r g ( h A B ) .
With the optimal phase shifter, the terms of Equations (11) and (15) can be rewritten as
R B * [ n ] = log 2 1 + P [ n ] σ 2 g 0 | h A B | d A B β / 2 + g 0 M d B α / 2 [ n ] d A α / 2 [ n ] 2 ,
R E k * [ n ] = log 2 1 + P [ n ] σ 2 g 0 d A E k β + g 0 2 ( f E k * [ n ] ) 2 d E k α [ n ] d A α [ n ] ,
where
f E k * [ n ] = m = 1 M e j [ 2 π λ 0 ( m 1 ) d ( ϕ E k [ n ] ϕ B [ n ] ) + a r g ( h A B ) ] .
However, ϕ E k [ n ] and ϕ B [ n ] still depend on the coordinate of UAV, which is difficult to handle. To circumvent the intractability, the upper bound of achievable rate in the kth Eve, denoted as R E k [ n ] , is used, shown as follows:
R E k * [ n ] log 2 1 + P [ n ] σ 2 g 0 d A E k β + g 0 2 M 2 d E k α [ n ] d A α [ n ] R E k [ n ] .

4.2. Trajectory Optimization

Based on the optimized RIS phase shifter Φ and the given transmit power P , we further study the subproblem of optimizing the UAV trajectory and ( P 2 ), given as
( P 3 ) : max Q 1 N n = 1 N R B * [ n ] max k K R E k [ n ] s . t . ( 16 a ) , ( 16 b ) , ( 16 c ) .
Through the optimization of this subproblem, the UAV can optimize a better path to avoid multiple eavesdroppers or close to the legitimate user to achieve a larger channel rate difference between the legitimate channel and wiretap channel, which means the confidentiality of the system improved. However, ( P 3 ) remains a non-convex problem with respect to Q . First of all, for convenience of marking, we define
A = g 0 | h A B | 2 d A B β ,
B = 2 g 0 3 2 | h A B | M d A B β / 2 ,
C = g 0 2 M 2 ,
D k = g 0 d A E k β , k K .
Then, R B * [ n ] and R E k [ n ] can be expressed as
R B * [ n ] = log 2 1 + P [ n ] σ 2 A + B d B α 2 [ n ] d A α 2 [ n ] + C d B α [ n ] d A α [ n ] ,
R E k [ n ] = log 2 1 + P [ n ] σ 2 D k + C d E k α [ n ] d A α [ n ] .
Some variables, u [ n ] , v [ n ] , w [ n ] , z k [ n ] , τ k [ n ] , k K , are introduced to solve the non-convexity of ( P 3 ). Therefore, R B * [ n ] and R E k [ n ] , k K , can be, respectively, formulated as
R B [ n ] = log 2 1 + P [ n ] σ 2 A + B u 1 2 [ n ] v 1 2 [ n ] + C u [ n ] v [ n ] ,
and τ k [ n ] , k K . With new related constraints added, we can rewrite ( P 3 ) as
max Q , u [ n ] , v [ n ] , w [ n ] , z k [ n ] , τ k [ n ] 1 N n = 1 N R B [ n ] max k K τ k [ n ] ] s . t . ( 16 a ) , ( 16 b ) , ( 16 c ) ,
u 2 α [ n ] d B 2 [ n ] ,
v 2 α [ n ] d A 2 [ n ] ,
τ k [ n ] log 2 ( 1 + P [ n ] σ 2 ( D k + C e w [ n ] + z k [ n ] ) ) , k K ,
e 2 α w [ n ] d A 2 [ n ] ,
e 2 α z k [ n ] d E k 2 [ n ] , k K .
However, Equation (29) remains non-convex, which makes it difficult to solve. Note that R B [ n ] is jointly convex with respect to u [ n ] and v [ n ] , and the first-order Taylor approximation of a convex function is a global underestimator. Therefore, we consider achieving an approximate optimal solution based on the successive convex optimization technique. It successively maximizes a concave lower bound of the objective function of Equation (29) within a convex feasible region until it converges. Due to the fact that the algorithm works iteratively, for simplicity, we consider a specific step in the iteration, denoted as the lth iteration. u l [ n ] and v l [ n ] are expressed as the given points in the lth iteration. It is clear that R B [ n ] is jointly convex with respect to u [ n ] and v [ n ] . In accordance with the properties of the first-order Taylor expansion, it is a global underestimator. Thus, we apply the first-order Taylor expansion of R B [ n ] at the given points u l [ n ] and v l [ n ] as the lower-bound, expressed as R B lb [ n ]
R B [ n ] log 2 ( A l [ n ] ) + B l [ n ] A l [ n ] ln 2 ( u [ n ] u l [ n ] ) + C l [ n ] A l [ n ] ln 2 ( v [ n ] v l [ n ] ) R B lb [ n ] ,
where
A l [ n ] = 1 + P [ n ] σ 2 A + B ( u l [ n ] v l [ n ] ) 1 2 + C u l [ n ] v l [ n ] , B l [ n ] = P [ n ] σ 2 B 2 u l 3 2 [ n ] v l 1 2 [ n ] + C u l 2 [ n ] v l [ n ] , C l [ n ] = P [ n ] σ 2 B 2 u l 1 2 [ n ] v l 3 2 [ n ] + C u l [ n ] v l 2 [ n ] .
Similarly, because the right-hand terms in Equations (29e) and (29f) are convex concerning u [ n ] , v [ n ] , the successive convex optimization technique can be exploited to get the lower-bounds of d A 2 [ n ] and d E k 2 [ n ] in the lth iteration as
d A 2 [ n ] | | c l [ n ] c A | | 2 + ( H 0 H A ) 2 + 2 ( c l [ n ] c A ) T ( c [ n ] c l [ n ] ) ( d A lb [ n ] ) 2 , d E k 2 [ n ] | | c l [ n ] c E k | | 2 + H 0 2 + 2 ( c l [ n ] c E k ) T ( c [ n ] c l [ n ] ) ( d E k lb [ n ] ) 2 .
By replacing the terms d A 2 [ n ] and d E k 2 [ n ] in Equations (29e) and (29f) with their lower bounds, problem Equation (29) can be transformed into its approximate form
( P 4 ) : max Q , u [ n ] , v [ n ] , w [ n ] , z k [ n ] , τ k [ n ] 1 N n = 1 N R B lb [ n ] max k K τ k [ n ] s . t . ( 16 a ) , ( 16 b ) , ( 16 c ) , ( 29 b ) , ( 29 c ) , ( 29 d ) ,
e 2 α w [ n ] ( d A lb [ n ] ) 2 ,
e 2 α z k [ n ] ( d E k lb [ n ] ) 2 , k K ,
which is a convex problem and can be solved by CVX now.

4.3. Transmit Power Optimization

With the given UAV trajectory Q and RIS phase shifter Φ , this section studies the subproblem of transmit power optimization. The transmit power optimization problem can be expressed as
( P 5 ) : max P 1 N n = 1 N log 2 ( 1 + P [ n ] γ [ n ] ) log 2 ( 1 + P [ n ] ξ [ n ] ) s . t . ( 16 d ) , ( 16 e ) ,
where
γ [ n ] = 1 σ 2 ( A + B d B α 2 [ n ] d A α 2 [ n ] + C d B α [ n ] d A α [ n ] ) ) ,
ξ [ n ] = max k K 1 σ 2 ( D k + C d E k α [ n ] d A α [ n ] ) .
By optimizing P , the base station can reasonably distribute the power so that the average transmission rate difference between the two channels is maximized depending on the UAV’s different positions and RIS’s reflecting phases.
According to [40], the optimal solution of the transmit power optimization problem can be expressed as
P * [ n ] = min P 0 [ n ] + , P p γ [ n ] > ξ [ n ] , 0 γ [ n ] ξ [ n ] ,
where
P 0 [ n ] = 1 2 ξ [ n ] 1 2 γ [ n ] 2 + 1 ζ ln 2 1 ξ [ n ] 1 γ [ n ] 1 2 ξ [ n ] 1 2 γ [ n ] .
In Equation (36), ζ > 0 is a constant, which can make sure the constraints in Equation (10) are guaranteed when attaining the optimal solution. It can be obtained by the bisection search with 1 N N P * [ n ] = P ave . However, before conducting the bisection search, it is necessary to verify the validity of 1 N N P p < P ave . Otherwise, ζ can be zero, and 1 N N P * [ n ] = P ave cannot be met [12].

4.4. Overall Algorithm

Algorithm 1 summarizes the whole algorithm which can solve ( P 2). Specifically, we iteratively solve each subproblem of RIS phase shifter, UAV trajectory optimization, and transmit power at the base station to attain a suboptimal solution of ( P 2). Since the target value of ( P 2 ) after each iteration is monotonically finite and non-decreasing, Algorithm 1 guarantees convergence by ϵ , which controls the accuracy convergence. Moreover, the complexity of step 2 and step 4 are O ( N ite ( K N ) 3.5 ) and O ( N ite K N log ( K bis ) ) , respectively, where K bis and N ite denote the number of values for ζ in the process of bisection search and the iteration number. The overall complexity of Algorithm 1 is O N ite K N 3.5 .
The proposed algorithm first calculates the initial Φ ( 0 ) with the given trajectory Q ( 0 ) . Then, with the given transmit power P ( l 1 ) , the subproblem of the UAV trajectory can be optimized. It is reasonable to optimize the auxiliary position of the UAV in order to increase the disparity between the transmission rates of Bob and Eves. With the optimized UAV trajectory Q ( l ) , the optimal Φ ( l ) of the RIS can be obtained by Equation (17). After that, by rationally distributing the transmit power P ( l ) , the difference between the transmission rates of Bob and Eves can be further increased, which reveals that the secrecy performance can be enhanced. After being iteratively optimized, a suboptimal solution of the non-convex problem ( P 2) can be obtained within the tolerance.
Algorithm 1 Proposed Algorithm for Solving ( P 2 )
Initialize: Set tolerance ϵ . Set initial variables P ( 0 ) , Q ( 0 ) , u 0 , v 0 , w 0 , z k 0 , τ k 0 , and iteration number l = 0 . Use Equation (17) to get Φ ( 0 ) with Q ( 0 ) . Solve ( P 2) to get R ( 0 ) .
Repeat:
1. Set l = l + 1 .
2. Update Q ( l ) with given P ( l 1 ) through solving ( P 4 ).
3. With given Q ( l ) , obtain Φ ( l ) by using Equation (17).
4. Update P ( l ) through solving ( P 5 ) with given Q ( l ) .
5. Calculate R ( l ) with given Φ ( l ) , Q ( l ) , P ( l ) by solving ( P 2 ).
Until: R ( l ) R ( l 1 ) R ( l ) < ϵ .

5. Numerical Results

In this section, we present simulation results to illustrate the improvement in secrecy achieved by our proposed algorithm as compared to the scenario without a UAV-mounted RIS. The horizontal coordinates of Alice, Bob, and Eves are set as c A = [ 0 , 0 ] m, c B = [ 200 , 0 ] m, c E 1 = [ 300 , 300 ] m, c E 2 = [ 400 , 0 ] m, c E 3 = [ 0 , 350 ] m, c E 4 = [ 300 , 300 ] m. The UAV-mounted RIS flies from the starting point c 0 = [ 400 , 400 ] m to the terminal point c f = [ 400 , 400 ] m. It should be noted that motivated by the accelerated development of wireless communication technologies, we have empirically configured the maximum element number of the RIS to 1024. This parameterization ensures a comprehensive evaluation of the performance boundaries inherent to our proposed system under technologically progressive conditions. The remaining parameters are summarized in Table 1.

5.1. UAV Trajectories with Different RIS Elements

Figure 2 shows the UAV trajectories with different elements M = 64 , 256 , 1024 of the RIS. The trends of the UAV trajectories are consistent with the geographical location of Bob and Alice and are appropriately far away from the eavesdroppers, revealing the advantage of the UAV-mounted RIS dynamically choosing the best trajectory. To be specific, the UAV always flies to Bob’s location from the starting point c 0 , hovers for a while, then flies to Alice, and at the end, flies through Bob’s location to the terminal point c f . We can observe that the majority of the flight time is concentrated between Alice and Bob, where the RIS can achieve secrecy enhancements significantly. Moreover, with the number of elements M increasing, the UAV obviously changes its trajectories between the starting/terminal point and Bob in order to evade eavesdroppers. Precisely, when the element at the RIS is set as M = 1024 , UAV distinctly adjusts its trajectories far away from Eve 1. This is because when M increases, the assistance role of the UAV-mounted RIS is remarkably enhanced, and the proposed algorithm enables the UAV to avoid eavesdroppers further.

5.2. Convergence of the Proposed Algorithm

Figure 3 illustrates the convergence of our proposed algorithm. We consider M = 0 as the benchmark comparison, which means the considered system without the assistance of RIS. The curves of M = 64 , 256 , 1024 all converge gradually, and as the number of M increases, the convergence speed slows down and can also converge within a finite round. Moreover, we can observe the considerable improvement achieved by our proposed scheme. To be specific, when M = 64 , the average secrecy rate increases obviously compared to the benchmark, which reveals the assistance performance of UAV-mounted RIS in multiple-eavesdroppers scenarios. Besides, the performance gaps between M = 64 , 256 , and 1024 illustrate the great potential of our proposed secure assistance scheme when it needs to meet a rigorous requirement of average secrecy rate.

5.3. The Transmit Power P Throughout the Optimization Process

Figure 4 illustrates the change of the base station transmit power P throughout the optimization process. It is evident from the results that with an increasing number of RIS elements M, the transmit power exhibits distinct variations over time. Specifically, when M = 1024 , P has a remarkable decline in the first 25 s. In contrast, when M = 256 , the change is slight. While for M = 64 , the transmit power does not change obviously compared with P ave . This is because when there are fewer reflective elements at the RIS, the transmit power does not change significantly when far away from Bob. However, when there are more reflective elements, Alice needs to provide greater power to ensure the average transmission rate when far away from Bob. Then, three curves maintain the average transmit power to transmit signals for a long period near Bob and Alice. However, after 130 s, when M = 64 , the transmit power does not change distinctly; when M = 256 , P ave drops slightly; and when M = 1024 , P ave drops visibly. This is because the total power is limited during the total flight period.

5.4. Average Secrecy Rate with Different Average Transmit Power P ave

Figure 5 depicts the average secrecy rate obtained by our proposed UAV-mounted RIS-aided scheme with different average transmit power P ave . We have the following crucial observations. To begin with, as expected, the average secrecy rates of different M ascend with P ave increasing. Second, for the UAV-mounted RIS-aided multiple-eavesdroppers network, with P ave fixed, the average secrecy rate gradually increases as M increases from 0 to 64, 256, and 1024. Moreover, we can observe that the performance gap between M = 256 and M = 1024 at P ave = 10 mW is greater than the corresponding gap at P ave = 30 mW. However, the performance gap between M = 64 and benchmark at P ave = 30 mW is greater than P ave = 10 mW. This is reasonable because compared with the benchmark, when M is small, the increase of P ave can effectively enhance the secrecy performance. When M becomes sufficiently large, the number of M plays a dominant role in improving the secrecy rate than the change of P ave . Third, the two cases where P ave = 15 mW, M = 256 and P ave = 25 mW, M = 64 obtain nearly the same average secrecy rate, which illustrates that with the assistance of a UAV-mounted RIS, our algorithm can save the energy consumption of the base station for a specific requirement. Additionally, the benchmark can be interpreted as scenarios where the current RIS is excluded from the optimization framework. The proposed algorithm achieves superior performance compared to cases involving solely the optimization of transmit power and UAV trajectory. This further validates the effectiveness of the proposed algorithm.

5.5. Transmission Rate with Different Number of RIS Elements

Figure 6 illustrates the impact of varying RIS element numbers on the transmission rates of a legitimate user and multiple eavesdroppers under a fixed average transmit power (10 mW), with benchmark curves representing scenarios without RIS deployment. As the RIS element number increases, both the user’s and Eves’ transmission rates exhibit enhancement trends, though the user rate improvement significantly outweighs that of Eves. This asymmetric performance stems from the RIS’s prioritized constructive signal superposition at the intended user, while residual electromagnetic reflections inadvertently create minor parasitic enhancements for Eves. The observed behavior aligns with our aforementioned analysis, confirming that the RIS-aided system inherently strengthens legitimate communication more effectively than unintended leakage, thereby preserving a favorable security ability.

5.6. Comparisons of UAV-Mounted Mobile RIS and Static RIS

Figure 7 compares the average secrecy rate achieved by our proposed UAV-mounted mobile RIS assistance scheme and a static RIS assistance scheme at P ave = 10 mW. When the RIS is fixed, it indicates that the UAV trajectory is not optimized. The static RIS is deployed at the locations in a line between SP and TP at the same height H 0 , and the distance in Figure 7 represents the distance to SP in the line. The three curves M = 64 , 256 , and 1024 are the optimized value by our proposed algorithm when P ave = 10 mW in Figure 3. For the fixed RIS scheme, we can observe that when its location is close to the midpoint of the line, the value of the average secrecy rate increases significantly, although it also near Eve 2. This is because when RIS is positioned near the midpoint, the improvement in data rate at Bob is greater than the eavesdropping rate. Specifically, as expected, the average secrecy rate of the fixed RIS becomes greater with increasing of M. Under the same M, the average secrecy rate of our proposed scheme is greater than the static RIS. Moreover, it is evident that our proposed scheme outperforms the static RIS scheme with M = 1024 in terms of average secrecy rate when M = 64 is employed, which shows that our proposed scheme, fully exploiting the mobility of the UAV, can effectively improve the average secrecy rate.

5.7. The Influence of Pathloss Exponent and UAV Deployment Height

Figure 8 evaluates the influence of pathloss exponent α with different schemes for comparison. HEUR-TR is the heuristic trajectory scheme where the UAV-mounted RIS flies to a position above Bob, hovers long enough, and finally flies back to the destination with transmit power and phase shifts optimization during the process. Except for hovering, the UAV is always at maximum speed in HEUR-TR. TRIV-TR is the trivial trajectory scheme that optimizes the RIS phase shift and the transmit power with the UAV flying from the starting point and terminal point at a uniform speed in a straight line. PROP-TR is our proposed scheme. It can be observed that our proposed joint optimization always achieves a higher average secrecy rate than the heuristic trajectory scheme and the trivial trajectory scheme. With the increment of α , the average secrecy rates all decrease because of the descending property of AIB/AIEs links concerning α . The higher the value of α , the easier the channel is to be wiretapped on, leading to a decrease in secrecy performance. Moreover, compared with HEUR-TR and TRIV-TR schemes, our proposed algorithm jointly optimizing Φ , Q , and P can still achieve a better secrecy performance with the growing α .
Figure 9 analyzes the influence of the UAV deployment height H 0 with different schemes for comparison. It can be clearly observed that there is a decrease in the average secrecy rate as H 0 increases in all three scenarios, which aligns with the practical implications of the scenario. Compared with the trivial trajectory TRIV-TR from the starting point and terminal point that only optimizes the RIS phase shifter and transmit power, the secrecy rates of heuristic trajectory HEUR-TR and our proposed design PROP-TR are more stable because their trajectories would require more time around the legitimate user. From the comparison between Figure 8 and Figure 9, we can find that α has a greater impact on the system secrecy performance than H 0 .

6. Conclusions

In this paper, we investigated the assistance performance of a UAV-mounted dynamic RIS in secure communication with several eavesdroppers. Specifically, we considered the problem of maximizing the average secrecy rate by jointly optimizing the RIS phase shifter, the UAV trajectory, and the base station transmit power. To deal with the non-convexity of the problem, we proposed an iterative algorithm with a convergence guarantee based on the block coordinate descent and successive convex optimization techniques. Numerical results reveal that our proposed UAV-mounted RIS-aided scheme achieves a significant performance gain over the cases with a static RIS or without RIS for secrecy enhancement. Moreover, it also shows the inherent advantage of reducing energy consumption for a specific secrecy rate requirement. In the future, we will investigate the energy efficiency of the UAV-mounted RIS-aided scheme in the multiple-eavesdroppers scenario and the effectiveness of the proposed algorithm considering the mobility of the eavesdroppers. Besides, given the rapid evolutionary trajectory of artificial intelligence technologies, our forward-looking research framework proposes synthesizing the presented algorithm with deep learning architectures. This integration aims to systematically enhance the efficiency and adaptability of methods for handling complex challenges, further exploring the performance of the proposed secure design in practical scenarios.

Author Contributions

Conceptualization, M.C. and Y.L.; methodology, M.C.; software, M.C.; validation, M.C. and Y.L.; formal analysis, M.C.; investigation, M.C.; resources, S.Z.; data curation, S.Z.; writing—original draft preparation, M.C.; writing—review and editing, Y.L.; visualization, S.Z.; supervision, S.Z. and H.D.; project administration, S.Z. and H.D.; funding acquisition, S.Z and H.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China 2023YFC3806000 and 2023YFC3806002, in part by the National Natural Science Foundation of China under Grant 61936014 and 62371342, in part by Shanghai Municipal Science and Technology Major Project No. 2021SHZDZX0100, and in part by the Shanghai Science and Technology Innovation Action Plan Project 22511105300.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are unavailable due to privacy restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gupta, L.; Jain, R.; Vaszkun, G. Survey of Important Issues in UAV Communication Networks. IEEE Commun. Surv. Tutor. 2016, 18, 1123–1152. [Google Scholar] [CrossRef]
  2. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef]
  3. Yan, C.; Fu, L.; Zhang, J.; Wang, J. A Comprehensive Survey on UAV Communication Channel Modeling. IEEE Access 2019, 7, 107769–107792. [Google Scholar] [CrossRef]
  4. Wu, B.; Guo, D.; Zhang, B.; Zhang, X.; Wang, H.; Wang, H.; Jiang, H. Completion time minimization for UAV enabled data collection with communication link constrained. IET Commun. 2022, 16, 1025–1040. [Google Scholar] [CrossRef]
  5. Liu, Y.; Han, F.; Zhao, S. Flexible and Reliable Multiuser SWIPT IoT Network Enhanced by UAV-Mounted Intelligent Reflecting Surface. IEEE Trans. Reliab. 2022, 71, 1092–1103. [Google Scholar] [CrossRef]
  6. Liu, Y.; Zhao, S.; Han, F.; Chai, M.; Jiang, H.; Zhang, H. Data Collection for Target Localization in Ocean Monitoring Radar-Communication Networks. Remote Sens. 2023, 15, 5126. [Google Scholar] [CrossRef]
  7. Mao, B.; Liu, J.; Wu, Y.; Kato, N. Security and Privacy on 6G Network Edge: A Survey. IEEE Commun. Surv. Tutor. 2023, 25, 1095–1127. [Google Scholar] [CrossRef]
  8. Lee, S.B.; Ahn, G.S.; Campbell, A. Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA. IEEE Commun. Mag. 2001, 39, 156–165. [Google Scholar] [CrossRef]
  9. Liu, Y.; Chen, H.H.; Wang, L. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [Google Scholar] [CrossRef]
  10. Jiang, H.; Xiong, B.; Zhang, H.; Basar, E. Physics-Based 3D End-to-End Modeling for Double-RIS Assisted Non-Stationary UAV-to-Ground Communication Channels. IEEE Trans. Commun. 2023, 71, 4247–4261. [Google Scholar] [CrossRef]
  11. Wang, H.M.; Zhang, X.; Jiang, J.C. UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions. IEEE Wirel. Commun. 2019, 26, 32–39. [Google Scholar] [CrossRef]
  12. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV Communications via Joint Trajectory and Power Control. IEEE Trans. Wirel. Commun. 2019, 18, 1376–1389. [Google Scholar] [CrossRef]
  13. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
  14. Nuradha, T.; Hemachandra, K.T.; Samarasinghe, T.; Atapattu, S. Physical-Layer Security for Untrusted UAV-Assisted Full-Duplex Wireless Networks. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Big Island, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
  15. Rao, B.; Hu, J.; Al-Nahari, A.; Yang, K.; Jäntti, R. On the Physical Layer Security of UAV-Aided Backscatter Communications. IEEE Wirel. Commun. Lett. 2024, 13, 274–278. [Google Scholar] [CrossRef]
  16. Wang, J.; Wang, R.; Zheng, Z.; Lin, R.; Wu, L.; Shu, F. Physical Layer Security Enhancement in UAV-Assisted Cooperative Jamming for Cognitive Radio Networks: A MAPPO-LSTM Deep Reinforcement Learning Approach. IEEE Trans. Veh. Technol. 2025, 74, 4713–4727. [Google Scholar] [CrossRef]
  17. Tang, Z.; Hou, T.; Liu, Y.; Zhang, J.; Zhong, C. A Novel Design of RIS for Enhancing the Physical Layer Security for RIS-Aided NOMA Networks. IEEE Wirel. Commun. Lett. 2021, 10, 2398–2401. [Google Scholar] [CrossRef]
  18. Liu, Y.; Wang, R.; Han, Z. Passive Beamforming for Practical RIS-Assisted Communication Systems with Non-Ideal Hardware. IEEE Trans. Veh. Technol. 2024, 73, 17743–17748. [Google Scholar] [CrossRef]
  19. Tang, X.; Wang, D.; Zhang, R.; Chu, Z.; Han, Z. Jamming Mitigation via Aerial Reconfigurable Intelligent Surface: Passive Beamforming and Deployment Optimization. IEEE Trans. Veh. Technol. 2021, 70, 6232–6237. [Google Scholar] [CrossRef]
  20. Guo, H.; Liang, Y.C.; Xiao, S. Intelligent Reflecting Surface Configuration with Historical Channel Observations. IEEE Wirel. Commun. Lett. 2020, 9, 1821–1824. [Google Scholar] [CrossRef]
  21. Wu, Q.; Zhang, R. Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. IEEE Trans. Wirel. Commun. 2019, 18, 5394–5409. [Google Scholar] [CrossRef]
  22. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [Google Scholar] [CrossRef]
  23. Chu, Z.; Hao, W.; Xiao, P.; Shi, J. Intelligent Reflecting Surface Aided Multi-Antenna Secure Transmission. IEEE Wirel. Commun. Lett. 2020, 9, 108–112. [Google Scholar] [CrossRef]
  24. Arzykulov, S.; Celik, A.; Nauryzbayev, G.; Eltawil, A.M. Artificial Noise and RIS-Aided Physical Layer Security: Optimal RIS Partitioning and Power Control. IEEE Wirel. Commun. Lett. 2023, 12, 992–996. [Google Scholar] [CrossRef]
  25. Khoshafa, M.H.; Ngatched, T.M.N.; Ahmed, M.H. Reconfigurable Intelligent Surfaces-Aided Physical Layer Security Enhancement in D2D Underlay Communications. IEEE Commun. Lett. 2021, 25, 1443–1447. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Zhao, S.; Shen, Y.; Jiang, X.; Shiratori, N. Enhancing the Physical Layer Security of Two-Way Relay Systems with RIS and Beamforming. IEEE Trans. Inf. Forensics Secur. 2024, 19, 5696–5711. [Google Scholar] [CrossRef]
  27. Pogaku, A.C.; Do, D.T.; Lee, B.M.; Nguyen, N.D. UAV-Assisted RIS for Future Wireless Communications: A Survey on Optimization and Performance Analysis. IEEE Access 2022, 10, 16320–16336. [Google Scholar] [CrossRef]
  28. Liaskos, C.; Nie, S.; Tsioliaridou, A.; Pitsillides, A.; Ioannidis, S.; Akyildiz, I. A New Wireless Communication Paradigm through Software-Controlled Metasurfaces. IEEE Commun. Mag. 2018, 56, 162–169. [Google Scholar] [CrossRef]
  29. Li, S.; Duo, B.; Renzo, M.D.; Tao, M.; Yuan, X. Robust Secure UAV Communications with the Aid of Reconfigurable Intelligent Surfaces. IEEE Trans. Wirel. Commun. 2021, 20, 6402–6417. [Google Scholar] [CrossRef]
  30. Shang, Y.; Peng, Y.; Ye, R.; Lee, J. RIS-Assisted Secure UAV Communication Scheme Against Active Jamming and Passive Eavesdropping. IEEE Trans. Intell. Transp. Syst. 2024, 25, 16953–16963. [Google Scholar] [CrossRef]
  31. Qin, C.; Niu, M.; Zhang, P.; He, J. Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems. Drones 2024, 8, 358. [Google Scholar] [CrossRef]
  32. Diao, D.; Wang, B.; Cao, K.; Zheng, B.; Weng, J.; Chen, J. Secure RIS Deployment Strategies for Wireless-Powered Multi-UAV Communication. IEEE Internet Things J. 2024, 11, 18154–18166. [Google Scholar] [CrossRef]
  33. Bithas, P.S.; Ropokis, G.A.; Karagiannidis, G.K.; Nistazakis, H.E. UAV-Assisted Communications with RIS: A Shadowing-Based Stochastic Analysis. IEEE Trans. Veh. Technol. 2024, 73, 10000–10010. [Google Scholar] [CrossRef]
  34. Mughal, U.A.; Alkhrijah, Y.; Almadhor, A.; Yuen, C. Deep Learning for Secure UAV-Assisted RIS Communication Networks. IEEE Internet Things Mag. 2024, 7, 38–44. [Google Scholar] [CrossRef]
  35. Yang, H.; Liu, S.; Xiao, L.; Zhang, Y.; Xiong, Z.; Zhuang, W. Learning-Based Reliable and Secure Transmission for UAV-RIS-Assisted Communication Systems. IEEE Trans. Wirel. Commun. 2024, 23, 6954–6967. [Google Scholar] [CrossRef]
  36. Qian, P.; Zhang, Y.; Yan, X.; Chen, Y.; Sun, Y. A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT. Electronics 2023, 12, 2507. [Google Scholar] [CrossRef]
  37. Wu, Q.; Zeng, Y.; Zhang, R. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks. IEEE Trans. Wirel. Commun. 2018, 17, 2109–2121. [Google Scholar] [CrossRef]
  38. Fang, S.; Chen, G.; Li, Y. Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks. IEEE Wirel. Commun. Lett. 2021, 10, 276–280. [Google Scholar] [CrossRef]
  39. Hu, E.L.; Kwok, J.T. Scalable Nonparametric Low-Rank Kernel Learning Using Block Coordinate Descent. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 1927–1938. [Google Scholar] [CrossRef]
  40. Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
Figure 1. A UAV-mounted RIS-aided secure communication system.
Figure 1. A UAV-mounted RIS-aided secure communication system.
Drones 09 00208 g001
Figure 2. Trajectories of the UAV with different M of RIS when P ave = 10 mW.
Figure 2. Trajectories of the UAV with different M of RIS when P ave = 10 mW.
Drones 09 00208 g002
Figure 3. Average secrecy rate of the proposed algorithm when P ave = 10 mW.
Figure 3. Average secrecy rate of the proposed algorithm when P ave = 10 mW.
Drones 09 00208 g003
Figure 4. The transmit power of Alice during the flight at P ave = 10 mW.
Figure 4. The transmit power of Alice during the flight at P ave = 10 mW.
Drones 09 00208 g004
Figure 5. Average secrecy rate with different M of RIS versus P ave .
Figure 5. Average secrecy rate with different M of RIS versus P ave .
Drones 09 00208 g005
Figure 6. Transmission rate with different M of RIS.
Figure 6. Transmission rate with different M of RIS.
Drones 09 00208 g006
Figure 7. Average secrecy rate versus static RIS at different locations when P ave = 10 mW.
Figure 7. Average secrecy rate versus static RIS at different locations when P ave = 10 mW.
Drones 09 00208 g007
Figure 8. Average secrecy rate with different pathloss exponent α when M = 128.
Figure 8. Average secrecy rate with different pathloss exponent α when M = 128.
Drones 09 00208 g008
Figure 9. Average secrecy rate with different UAV deployment height H 0 when M = 128.
Figure 9. Average secrecy rate with different UAV deployment height H 0 when M = 128.
Drones 09 00208 g009
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValues
Height of the UAV H 0 40 m
Height of the Alice H A 20 m
Average transmit power P ave 10 mW
Peak transmit power P p 40 mW
Tolerance ϵ 10 4
Reference channel gain g 0 −20 dB
AWGN power σ 2 −80 dBm
Defaule UAV flight period T150 s
Element separation distance at the RIS d e λ 0 2
Pathloss exponent of RIS and Alice/Bob/Eves α 2.5
Path loss exponent of AB and AE β 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chai, M.; Liu, Y.; Zhao, S.; Deng, H. Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization. Drones 2025, 9, 208. https://doi.org/10.3390/drones9030208

AMA Style

Chai M, Liu Y, Zhao S, Deng H. Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization. Drones. 2025; 9(3):208. https://doi.org/10.3390/drones9030208

Chicago/Turabian Style

Chai, Mengqiu, Yuan Liu, Shengjie Zhao, and Hao Deng. 2025. "Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization" Drones 9, no. 3: 208. https://doi.org/10.3390/drones9030208

APA Style

Chai, M., Liu, Y., Zhao, S., & Deng, H. (2025). Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization. Drones, 9(3), 208. https://doi.org/10.3390/drones9030208

Article Metrics

Back to TopTop