Next Article in Journal
Impact of UAV-Derived RTK/PPK Products on Geometric Correction of VHR Satellite Imagery
Previous Article in Journal
Task Offloading and Data Compression Collaboration Optimization for UAV Swarm-Enabled Mobile Edge Computing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure and Energy-Efficient Configuration Strategies for UAV-RIS System with Uplink NOMA

School of Information and Navigation, Air Force Engineering University, Xi’an 710077, China
*
Author to whom correspondence should be addressed.
Drones 2025, 9(4), 289; https://doi.org/10.3390/drones9040289
Submission received: 22 February 2025 / Revised: 28 March 2025 / Accepted: 1 April 2025 / Published: 9 April 2025

Abstract

This paper investigated the configuration of the reflecting elements for uplink non-orthogonal multiple access (NOMA) unmanned aerial vehicle (UAV)–reconfigurable intelligent surface (RIS) systems. By analyzing the practical air-to-ground (A2G) channels and phase estimation errors, a closed-form expression for the range of reflecting elements has been formulated to enhance the reliability and security of the system. Considering the energy efficiency of the system, the number of reflecting elements is optimized, aiming to maximize the energy secrecy efficiency (ESE) index under the given constraints. The simulation results verified the correctness of the derivation, which offers theoretical guidance for configuring RISs in uplink NOMA UAV systems with heterogeneous service demands. The uplink NOMA UAV system outperforms traditional terrestrial systems. The results also show that when the number of eavesdroppers increases, the influence of the number of reflecting elements on the system’s ESE becomes more significant. This demonstrates the benefits of equipping UAVs with RISs for the security of multiple eavesdropping systems.

1. Introduction

The crucial role of unmanned aerial vehicles (UAVs) in future wireless networks is gaining recognition due to their autonomous nature, adaptability, and cost-effectiveness [1]. As aerial communication facilitators, UAVs can dynamically adjust their positions and communication links to meet changing demands, thereby improving the capacity and reliability of wireless networks [2,3]. UAVs enhance the flexibility and resilience of communication networks by supporting various applications, including mobile edge computing, data collection, and emergency communications [4,5,6].
The advancement of wireless communication and the growth of Internet of Things (IoT) devices have intensified the pressure on spectral resources. Non-orthogonal multiple access (NOMA) addresses this issue by allowing multiple users to simultaneously share the same spectrum through power domain multiplexing, thus improving the spectral efficiency [7,8,9]. NOMA efficiently supports numerous connections and provides equitable service to users with diverse channel conditions, aligning with 6G network requirements [10,11,12].
Incorporating NOMA into UAV communication shows promise in enhancing systems’ reliability [13]. In UAV communications, this technology enables simultaneous access for numerous users, effectively boosting the system’s overall capacity. The combination of NOMA technology and UAVs facilitates concurrent access for many users, meeting the high-capacity demands of future 6G networks [14,15]. Furthermore, integrating NOMA and UAVs not only improves the spectral efficiency and system capacity but also increases the network’s flexibility and reliability [16,17]. In [18], the researchers proposed a secure communication scheme for NOMA-based UAV mobile edge computing systems in the presence of a flying eavesdropper, utilizing successive convex approximation and block coordinate descent methods to address security concerns. The authors of [18] also suggested a dual-UAV-assisted IoT system using NOMA to enhance the IoT capacity and improve the UAVs’ energy efficiency. Similarly, ref. [19] proposes a dual-UAV-assisted IoT system using non-NOMA to achieve the same goals. This study formulated a non-convex optimization problem to maximize UAVs’ energy efficiency by jointly optimizing the communication scheduling, UAV transmission power, and motion parameters, solving it using an alternating iterative optimization algorithm. In [20], the researchers examined a multi-antenna UAV-assisted NOMA communication system where a multi-antenna base station communicated with indoor and outdoor users via a multi-antenna UAV. Their numerical and simulation results show that adjusting the UAV parameters and increasing the antenna numbers can significantly improve the system performance.
Despite these advancements, existing UAV-NOMA studies have mainly focused on downlink or edge computing scenarios, and the research on UAV-based uplink NOMA transmissions remains limited, particularly in systems with heterogeneous service requirements. UAV communication typically relies on line-of-sight (LoS) links, which are characterized by a high signal strength and low propagation loss. However, the inherent broadcast characteristics and LoS-dominated channels of UAV communications render these systems susceptible to security vulnerabilities [21]. In comparison to traditional terrestrial communication, UAV communication exhibits increased vulnerability to security threats, such as malicious eavesdropping and privacy leakages [22,23].
Furthermore, UAVs predominantly operate on battery power, which is limited in capacity. During flight and communication operations, UAVs consume substantial amounts of energy. In complex environments such as urban areas, buildings can obstruct LoS links, requiring UAVs to expend additional energy to maintain stable communication. The constraints of their limited energy capacity and inaccessibility for battery replacement significantly impact the operational longevity of UAVs [24]. Addressing security and energy limitations in a synergistic manner is imperative for the advancement and sustainability of UAV-based communication systems [25].
In light of these challenges, reconfigurable intelligent surfaces (RISs) are regarded as a revolutionary technology for forthcoming 6G wireless networks [26]. By integrating a large number of low-cost passive reflecting elements, RISs can intelligently reconfigure the wireless propagation environment, thereby significantly enhancing the performance of wireless communication networks. The utilization of a controlled propagation environment facilitated by RISs is anticipated to enhance the reliability of UAV communications [27]. With the assistance of UAVs, RISs can be deployed with greater flexibility at elevated locations, which will enable the easier establishment of LoS channel links. Moreover, incorporating a RIS can enhance the communication quality through phase adjustments to the reflection, thus mitigating the power consumption and equipment burden of UAV systems. RISs can be lightweight and seamlessly integrated into UAVs, thereby increasing the channel capacity [28,29,30]. Additionally, a RIS possesses the capability to reconfigure radio channels, enhancing the signal reception for authorized users while concurrently degrading the channels accessible to eavesdroppers [31,32]. Physical layer security (PLS) can complement or potentially supplant traditional cryptography by leveraging the randomness of wireless fading channels to secure UAV wireless communications from an information theoretic perspective [33]. Advancements in RISs are enabling a multitude of novel opportunities to enhance the security of UAV communications. Gu et al. developed an efficient algorithm based on an alternating optimization technique to jointly design a UAV’s trajectory, a RIS’s passive beamforming, and the transmit power [34]. Experimental validations by Li et al. [35] demonstrate the enhancements to the secrecy capacity of a terrestrial RIS made possible by the use of 3D beamforming optimization. The existing literature, such as [13,31], focuses on using NOMA technology to enhance UAV systems’ capacity or RISs to enhance PLS, respectively, but does not explore the potential for synergistic optimization of the two. For example, Gu et al. proposed a RIS-assisted UAV trajectory design, but their model was based on orthogonal multiple access (OMA) and did not take advantage of NOMA’s spectral efficiency [34]. Li et al. increased the secrecy capacity through 3D beamforming optimization but did not combine this with multi-user power domain multiplexing [35].
The current research on UAV-RIS systems predominantly concentrates on enhancing either their reliability [28,36] or security [31,37], yet the simultaneous achievement of both remains insufficiently explored. Furthermore, the number of RIS elements on UAVs is typically predetermined. While increasing the number of elements can enhance the reliability, it also facilitates the interception of signals by eavesdroppers. Additionally, a greater number of elements results in increased costs and heavier payloads for the UAVs, potentially diminishing their flight durations. Existing studies have attempted to balance security and energy efficiency in determining the number of RIS elements. However, no research has yet specifically addressed this issue for uplink NOMA UAV-RIS systems [38].
Motivated by the aforementioned challenges and issues, the range of reflecting elements possible within the constraints of both reliability and security is first determined for uplink NOMA UAV-RIS systems. Subsequently, the optimal number of reflecting elements is determined by optimizing the energy secrecy efficiency (ESE). The contributions of this paper can be summarized as follows:
  • A practical elevation-based A2G LoS link subject to Nakagami-m fading is established. This study specifically evaluates the effects of the phase estimation errors that arise from imperfect conditions such as UAV jitter, providing insights into how these errors influence the overall communication performance.
  • The range of reflecting elements for simultaneously reliable and secure transmissions from an uplink NOMA UAV-RIS system is derived. The derivation serves as a theoretical reference for configuring RISs in UAV systems with heterogeneous service requirements, ensuring that the system can achieve both reliability and security.
  • To address the energy efficiency of the system, we define and utilize the indexed ESE metric to characterize the overall performance of the system. This metric comprehensively characterizes the system’s performance by balancing energy consumption and security. Under the constraints of reliability and security, the number of reflecting elements is optimized to maximize the ESE.
  • Numerical results are presented to validate the accuracy of our theoretical analysis, revealing the impact of key system parameters on the system performance. These findings provide valuable guidance for the practical deployment and optimization of uplink NOMA UAV-RIS systems in future wireless communication networks.

2. System Model

As shown in Figure 1, we consider a ground–aerial uplink NOMA communication system. Specifically, two users D 1 and D 2 upload information to the base station (S) via a UAV-mounted RIS in the presence of K non-colluding eavesdroppers, denoted as E 1 , E 2 , , E K . Specifically, we assume D 1 has been accorded a high-priority status with the highest quality-of-service requirements, while D 2 is a low-priority user. This makes sense in real-world communication application scenarios, where sensitive user data necessitate prioritized transmissions. However, non-critical key performance indicator data lack stringent real-time demands and can consequently be treated as a lower transmission priority. The RIS is composed of N reflecting elements, which are denoted as R 1 , R 2 , , R N . The horizontal distance between the ground node i and te UAV U is expressed as r U i ( i S , D 1 , D 2 , E k ) (Although it is extremely difficult for legitimate systems to directly estimate the CSI in real-world scenarios, it can be obtained in the following ways. Initially, in certain scenarios, the system may possess prior knowledge of the network topology or the eavesdropper’s location, which can facilitate an estimation of the channel information. Subsequently, during the transmission process, the system can make a channel estimation by transmitting pilot signals or employing alternative estimation techniques. Furthermore, the system can estimate the eavesdropper’s channel when it actively attacks by detecting the signals sent during active eavesdropping or an attack.).

2.1. The Channel Model

A probabilistic LoS channel model, predicated on the elevation angle, is widely utilized to characterize A2G channels [39]. The probability of a LoS channel from the UAV to the ground node i can be expressed as
P L U i = 1 1 + ϕ exp [ ω ( θ U i ϕ ) ] ,
where ϕ and ω are influenced by environmental factors. The elevation angle θ U i is a function of the UAV’s flight altitude H, which is given by
θ U i = 180 ° π arctan H r U i ,
The path loss exponent between U and i is represented as
Λ θ U i = a 1 P L U i + b 1 ,
where a 1 τ π 2 τ 0 , b 1 = τ 0 τ 1 P L U i τ 0 . τ π 2 and τ 0 are environment-dependent constants. Accordingly, the average A2G channel gain L U i can be written as
L U i = P L U i + 1 P L U i η d U i Λ θ U i ,
where η denotes the additional attenuation factor under NLoS conditions, and d U i = r U i 2 + H 2 represents the distance between U and i with the horizontal distance r U i .
In characterizing the small-scale fading within A2G channels, we employ the generalized Nakagami-m distribution. The channel vectors between the RIS and S, D 1 , D 2 , and E k are denoted as h R S = h R 1 S , h R 2 S , , h R N S C 1 × N , h D 1 R = h D 1 R 1 , h D 1 R 2 , , h D 1 R N T C N × 1 , h D 2 R = h D 2 R 1 , h D 2 R 2 , , h D 2 R N T C N × 1 , and h R E k = h R 1 E k , h R 2 E k , , h R 3 E k C 1 × N . Each entry of h R S , h D 1 R , h D 2 R , and h R E k is assumed to undergo independent and identically distributed (i.i.d.) Nakagami-m small-scale fading, i.e., h R n S Nakagami m U S , 1 , h D 1 R n Nakagami m U D 1 , 1 , h D 2 R n Nakagami m U D 2 , 1 , h R n E k Nakagami m U E k , 1 . The parameter m U i is a variable related to the elevation θ U i , which can be expressed as
m U i = K θ U i + 1 2 2 K θ U i + 1 ,
where K θ U i = a 2 exp b 2 θ U i denotes the Rician factor with a 2 = K 0 and b 2 = 2 π ln K π 2 K 0 being environment-dependent parameters.

2.2. The Phase Shift Design and SNR Distribution

To ensure reliability and security for high-priority users, the phase shifts in the RIS are adjusted to maximize the channel quality for D 1 . Therefore, the channel quality for D 1 is superior to that fpr D 2 . According to the uplink NOMA principle, S first decodes the signal of the stronger user D 1 from the received superimposed signals by treating the signal of the weaker user D 2 as noise. Subsequently, S employs successive interference cancellation (SIC) to mitigate the signal from D 1 , followed by decoding D 2 ’s signal. The received signal-to-noise ratio (SNR) for decoding the signals of D 1 and D 2 can be expressed as
γ D 1 = ρ s h R S Φ h D 1 R 2 L U S L U D 1 ρ s h R S Φ h D 2 R 2 L U S L U D 2 + 1 ,
γ D 2 = ρ s h R S Φ h D 2 R 2 L U S L U D 2 ,
where ρ s = P s / N 0 denotes the transmission SNR of the users, P s is the transmision power of the users, N 0 is the variance in the additive white Gaussian noise, and Φ = diag e j ϕ 1 , e j ϕ 2 , , e j ϕ N is the reflection-coefficient matrix of the RIS. ϕ n n = 1 N denotes the reflection coefficient matrix of the RIS. Ideally, the optimal phase shift ϕ n o p t is designed to maximize the SNR of the signal of D 1 , which can be expressed as
ϕ n o p t = ϕ R n S + ϕ D 1 R n ,
where ϕ R n S and ϕ D 1 R n are the phases of h R n S and h D 1 R n , respectively.
In alignment with prior studies [10,11,40], our analysis adopts a conservative security framework where eavesdroppers are assumed to possess the optimal multi-user detection techniques. This allows them to intercept and decode signals intended for either D 1 or D 2 by suppressing the interference from the other device. Under this adversarial assumption, the achievable SNRs for eavesdroppers to recover D 1 and D 2 ’s transmissions are, respectively, defined as
γ E k D 1 = ρ s h R E k Φ h D 1 R 2 L U D 1 L U E k ,
γ E k D 2 = ρ s h R E k Φ h D 2 R 2 L U D 2 L U E k .
In practical implementations, hardware imperfections (e.g., mechanical jitter) and environmental disturbances (e.g., airflow turbulence) constrain the ability to perfectly align reconfigurable surface elements with their theoretical phase states. This mismatch induces non-negligible deviations in the realized phase profile of the n-th reflecting unit.
ϕ n = ϕ n o p t + ϕ n e r r .
The phase estimation error ϕ n e r r typically follows a von Mises distribution with the mean 0 and the concentration parameter κ . The probability density function (PDF) and eigenfunction of ϕ n e r r are, respectively, given by
f ϕ n e r r x = e κ cos x 2 π I 0 κ ,
φ p = E e j p ϕ n e r r = I p κ I 0 κ ,
where I 0 · and I p · represent the zero-order and p-order modified Bessel function of the first kind, respectively. The concentration parameter κ reflects the impact of jitter and exhibits an inverse relationship with the phase estimation error [41]. As the UAV experiences substantial jitter due to the effects of airflow, the phase estimation error increases, resulting in a decrease in κ . Conversely, a higher κ indicates reduced variability in the phase errors, attributable to enhanced directional concentration. Notably, when κ = 0 , the phase error follows a uniform distribution.
Under phase estimation errors, the SNRs of D 1 and D 2 can be given by
γ D 1 = ρ s n = 1 N h R n S h D 1 R n e j ϕ n e r r 2 L U S L U D 1 ρ s n = 1 N h R n S h D 2 R n e j ϕ D 2 2 L U S L U D 2 + 1 ,
γ D 2 = ρ s n = 1 N h R n S h D 2 R n e j ϕ D 2 2 L U S L U D 2 ,
where ϕ D 2 = ϕ D 2 R n ϕ D 1 R n + ϕ n e r r .
The eavesdropping SNRs can, respectively, be expressed as
γ E k D 1 = ρ s n = 1 N h R n E k h D 1 R n e j ϕ E 1 2 L U D 1 L U E k ,
γ E k D 2 = ρ s n = 1 N h R n E k h D 2 R n e j ϕ E 2 2 L U D 2 L U E k ,
where ϕ E 1 = ϕ R n E k ϕ R n S + ϕ n e r r , ϕ E 2 = ϕ n e r r ϕ R n S + ϕ R n E k + ϕ D 1 R n + ϕ D 2 R n .

2.3. Statistical Characteristics of the Channels

To facilitate subsequent calculations, we present the following lemmas regarding the statistical properties of legitimate and eavesdropping channels, respectively.
Lemma 1.
By denoting H D 1 = n = 1 N h R n S h D 1 R n e j ϕ n e r r 2 and H D 2 = n = 1 N h R n S h D 2 R n e j ϕ D 2 2 , the distribution of H D 1 and H D 2 can be approximated as
H D 1 Γ m D 1 , Ω D 1 ,
H D 2 E X P N ,
where m D 1 = N 2 ξ 1 4 φ 1 2 1 + φ 2 2 ξ 1 4 φ 1 2 , Ω D 1 = N 2 ξ 1 4 φ 1 2 , ξ 1 = E h R n S E h D 1 R n , E h R n S = Γ ( m U S + 0.5 ) Γ ( m U S ) m U S , E h D 1 R n = Γ ( m U D 1 + 0.5 ) Γ ( m U D 1 ) m U D 1 , and φ 1 and φ 2 can be obtained in (13).
Proof. 
See Appendix A.    □

3. Analysis of the Configuration of Reflecting Elements and Their Optimization

This study establishes a framework for analysis of the reflecting elements in uplink NOMA systems, where the minimum number of elements N is analytically characterized to jointly satisfy reliability and secrecy constraints. Given D 1 ’s designation as a high-priority user, the feasible domain of N is determined through a rigorous analysis of its connection outage probability (COP) and secrecy outage probability (SOP). Subsequently, we formalize the outage performance metrics as follows: for any user D i ( i 1 , 2 ), the COP quantifies the likelihood of failed signal decoding at the legitimate receiver, while the SOP represents the probability of confidential information being intercepted by eavesdroppers.
P c o p 1 = Pr log 2 1 + γ D 1 < R 1 ,
where R 1 denotes the target transmission rate for D 1 . For an uplink NOMA transmission, S first decodes the signal of D 1 and then removes it by using SIC to decode the signal of D 2 . Hence, the COP for user D 2 can be derived as
P c o p 2 = 1 Pr log 2 1 + γ D 1 > R 1 , log 2 1 + γ D 2 > R 2 .
We consider a non-colluding scenario where eavesdroppers work independently without cooperation to decode legitimate users’ messages. In order to investigate the secrecy of transmissions from D i , wiretap code is utilized to describe the secrecy performance [42]. A secrecy outage occurs when the capacity of the wiretap channel exceeds the redundancy rate of the wiretap code. Consequently, the secrecy outage probability (SOP) for D i is given by
P s o p i = Pr log 2 1 + γ E D i > R i R s ,
where R s denotes the target secrecy rate, and R i R s is the redundancy rate against eavesdropping for D i .
To holistically characterize the performance of the system, we define and apply the energy secrecy efficiency (ESE) index to evaluate both the security and energy efficiency of the system, which is defined as the ratio of the effective secrecy throughput to the consumed power. The ESE of user D i ( i 1 , 2 ) can be expressed as
E S E i = R s 1 P c o p i 1 P s o p i N P R I S + P s + P c ,
where P R I S and P c represent the power consumption for the RIS’s phase shift control and the other node circuitry, respectively.
Our objective is to select the optimal number of reflecting elements that maximizes the system’s ESE while ensuring reliable and secure transmissions for user D 1 . Therefore, the problem can be formulated as
P 1 : max N E S E s u m ,
s . t . P c o p 1 < v c ,
P s o p 1 < v s ,
where E S E s u m = E S E 1 + E S E 2 , v c and v s denote the pre-set thresholds for P c o p and P s o p , respectively.
Given that D 1 is a high-priority user, the number of reflecting elements necessary to facilitate reliable and secure transmissions is calculated by constraining the COP and the SOP for D 1 to a preset threshold. In the following, the range of N, i.e., constraints (24b) and (24c), can be given in the following theorems.
Theorem 1.
To ensure reliability for D 1 , the number of reflecting elements should satisfy
N N c = ln v c χ 1 L U D 2 + ln v c χ 1 L U D 2 2 + 4 ξ 1 4 φ 1 2 L U D 1 χ 1 L U S ρ s 2 ξ 1 4 φ 1 2 L U D 1 ,
where χ 1 = 2 R 1 1 , v c denotes the preset threshold for the COP, and · represents the ceiling function.
Proof. 
See Appendix B.    □
Theorem 2.
To ensure security for D 1 , the number of reflecting elements should satisfy
N N s = χ e ln 1 1 v s K ρ s L U D 1 L U E k ,
where χ e = 2 R 1 R s 1 , v s denotes the preset threshold for the SOP, and · denotes the floor function.
Proof. 
See Appendix C.    □
E S E s u m = R s N P R I S + P s + P c 1 e 1 N ρ s L U S L U D 2 L U D 1 Ω D 1 χ 1 N L U D 2 m D 1 + 1 m D 1 + 1 1 e χ e ρ s L U D 1 L U E k N K 1 N n = 0 m D 1 1 e χ 1 m D 1 ρ s Ω D 1 L U S L U D 1 χ 1 m D 1 ρ s Ω D 1 L U S L U D 1 n × 1 n ! t = 0 n n t ρ s L U S L U D 2 t χ 1 L U D 2 m D 1 Ω D 1 L U D 1 + 1 N t 1 × γ m D 1 + 1 , χ 1 L U D 2 m D 1 Ω D 1 L U D 1 + 1 N χ 2 ρ s L U S L U D 2 1 1 e χ e ρ s L U D 2 L U E k N K
Theorem 3.
Based on the aforementioned analysis, the problem P1 can be further formulated as
P 2 : max N E S E s u m , s . t . N c N N s
where χ 2 = 2 R 2 1 , and E S E s u m is shown at the top of the next page. The feasible conditions for problem P2 require the preset thresholds to satisfy
v s 1 1 e χ e ρ s L U D 1 L U E k ln v c χ 1 L U D 2 + ln v c χ 1 L U D 2 2 + 4 ξ 1 4 φ 1 2 L U D 1 χ 1 L U S ρ s 2 ξ 1 4 φ 1 2 L U D 1 K .
Proof. 
See Appendix D.    □
As indicated in Problem P2, deriving a closed-form expression for the optimal N presents significant challenges. Consequently, we propose an iterative approach, leveraging the golden section search method, to identify the optimal N o p t . This methodology is encapsulated in Algorithm 1, which is detailed below.
Algorithm 1: Golden search iterative algorithm for N o p t
     Initialization: a 1 = N c , a 2 = N s , and the maximum tolerance ε = 10 4 ;
     Calculate N 1 = a 2 0.618 a 2 a 1 and N 2 = a 1 + 0.618 a 2 a 1 ;
     While  N 1 N 2 > ε  do;
      N = N c , calculate E S E s u m 1 using (27);
      N = N s , calculate E S E s u m 2 using (27) again;
     if  E S E s u m 1 E S E s u m 2  do;
      a 1 = N 1 , N 1 = N 2 , N 2 = a 1 + 0.618 a 2 a 1 ;
     else do
      a 2 = N 2 , N 2 = N 1 , N 1 = a 2 0.618 a 2 a 1 ;
     end if
     end while
     Obtain the optimal N o p t = a 1 + a 2 2 .

4. Simulation Results and Discussions

In this section, we evaluate the effect of key parameters on the system performance. The horizontal distance is set as r U S = 50 m, r U D 1 = 50 m, r U D 2 = 50 m, and r U E k = 50 m, respectively. Without the loss of generality, we set H = 50 m, P R I S = 10 dBm, P s = 10 dBm, N 0 = 60 dBm, R 2 = 2 , R 2 = 1.5 , v c = v s = 0.1 , and κ = 20 . According to [43], the environmental parameters are set as ϕ = 4.88 , w = 0.43 , τ 0 = 3.5 , τ π 2 = 2 , K 0 = 5 dB, K π 2 = 15 dB, and η = 0.2 .
As shown in Figure 2, Lemma 1 is verified via Monte Carlo simulations. The distribution of H D 1 and H D 2 closely matches the simulated values, thereby validating the correctness of the analysis. Additionally, Lemma 1 demonstrates that the distribution of H D 2 is independent of the channel qualities of h R S and h D 1 R and is solely dependent on the number of RIS elements. This indicates that the RIS possesses the capability to intelligently reconfigure the wireless propagation environment, thereby significantly enhancing the secrecy performance for wireless communication.
Figure 3 depicts the number of reflecting element boundaries N c under COP constraints v c . A random phase shift scheme, continuous phase shift scheme [36], and OMA scheme [38] are designed as benchmark schemes for comparison. The results depicted in the figure demonstrate a strong correlation between the theoretical analysis and the simulation data, thereby validating the accuracy of the theoretical analysis. The necessary range for the number of reflecting elements can be determined using Theorems 1. It is observed that the minimum number of N c decreases with an increment in v c . Additionally, a reduction in κ leads to a decrease in N c . When κ reaches 20, the system’s performance is nearly indistinguishable from that of an ideal continuous phase shift system, implying that the phase shift errors become insignificant when κ 20 . As evidenced by the results in Figure 3, in contrast to the OMA scheme, NOMA achieves a substantial reduction in the number of reflecting elements required while maintaining an equivalent, reliable performance. Compared with the randomly distributed phase shift, the designed phase shift can reduce the number of reflecting elements required. This underscores the efficiency of the passive beamforming enabled by the RIS in enhancing the system’s reliability.
Figure 4 characterizes the relationship between the number of reflecting elements required N s versus v s . As v s increases, the required N s increases. As the altitude of the UAV rises, N s also increases, indicating that the UAV should be equipped with more reflecting elements when it is deployed at higher altitudes. Compared with traditional terrestrial RIS schemes [44], the number of reflecting elements needed in terrestrial systems is usually much higher than that in UAV-based systems. This discrepancy arises because deploying UAVs at higher altitudes can improve the channel quality, despite the increased path loss. Additionally, the random distribution of the phases does not significantly affect N s . This is because the RIS can dynamically adjust the phase, and the phase of the signal received by the eavesdropper is inherently random. Consequently, the overall requirement for reflecting elements remains unaffected.
Figure 5 illustrates the relationship between the ESE and the number of reflecting elements N. The simulation results validate the correctness of the derivation. It can be observed from the figure that the range of reflecting elements that ensures the system’s reliability and security narrows as the user transmission power P s increases. This trend is primarily attributed to the fact that with a higher transmission power, fewer reflecting elements are required to maintain security. Specifically, a reduced number of reflecting elements helps mitigate the risk of eavesdropping by limiting the potential exposure of signals to unauthorized parties. The addition of N enhances the RIS’s beamforming gain and improves the channel quality for legitimate users, thereby facilitating the secrecy performance. The power consumption of the RIS increases linearly with N, resulting in an increase in the denominator. These results also indicate that an optimal number of reflecting elements N o p t exists that maximizes the ESE. The optimal ESE does not increase with an increment in P s . This is due to the fact that as P s increases, the system’s energy consumption also rises, which in turn diminishes the ESE. The numerical optimal number of elements and the maximum ESE obtained from the proposed iterative algorithm are consistent, confirming the correctness of the algorithm. When the number of eavesdroppers K is small, the number of reflecting elements has a minor impact on the system’s ESE, but as K increases, the impact on the ESE becomes more significant. This demonstrates the benefits of equipping UAVs with RISs for security in systems with multiple eavesdroppers.

5. Conclusions

This paper has investigated the optimal configuration of reflecting elements in uplink NOMA UAV-RIS systems, focusing on optimizing the ESE of the system under reliability and security constraints. By modeling practical A2G channels and incorporating phase estimation errors, we derived a closed-form expression for the range of reflecting elements. This derivation provides a clear guideline for configuring RISs in such systems, ensuring a reliable and secure performance under heterogeneous service demands. The uplink NOMA UAV-RIS system is superior to conventional terrestrial systems. The results also show that the range of reflecting elements to ensure the system’s reliability and security narrows as the user transmission power P s increases. Moreover, the optimal ESE does not increase with an increase in P s . The findings provide valuable guidance for the practical deployment and optimization of NOMA UAV-RIS systems in future wireless communication networks. This work assumes static, optimal UAV deployments, which may affect the systems’ adaptability. Future research will explore robust optimization in dynamic settings and architectures to boost scalability and resilience.

Author Contributions

Conceptualization, D.D. and R.G.; methodology, B.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grants 62301600 and 61902426, and in part by China Postdoctoral Science Foundation under Grant 2021M692502.

Data Availability Statement

The data, including the simulation data, can be provided by the authors on reasonable request.

Acknowledgments

We thank the editor and the reviewers for their valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

By denoting H D 1 as
H D 1 = n = 1 N h R n S h D 1 R n e j ϕ n e r r 2 = W n + j V n ,
we see that W n = n = 1 N h R n S h D 1 R n cos ϕ n e r r and V n = n = 1 N h R n S h D 1 R n sin ϕ n e r r . W n and V n can be approximated as independent RVs, where W n N μ w 1 , σ w 1 2 and V n N μ v 1 , σ v 1 2 [45]. The expectations of and variances in W n and V n can be formulated as follows:
μ w 1 = E W n = N E h R n S h D 1 R n cos ϕ n e r r = N ξ 1 2 φ 1 ,
μ v 1 = E V n = N E h R n S h D 1 R n sin ϕ n e r r = 0 ,
σ w 1 2 = V W n = N E h R n S h D 1 R n cos ϕ n e r r 2 N E 2 h R n S h D 1 R n cos ϕ n e r r = N 2 1 + φ 2 2 ξ 1 4 φ 1 2 ,
σ v 1 2 = V V n = N E h R n S h D 1 R n sin ϕ n e r r 2 N E 2 h R n S h D 1 R n sin ϕ n e r r = N 2 ( 1 φ 2 ) ,
The correlation coefficient of W n and V n can be expressed as
ρ = E h R n S h D 1 R n μ w 1 μ v 1 σ w 1 2 σ v 1 2 ,
where
E h R n S h D 1 R n = E t = 1 N n = 1 N h R n S h D 1 R n h R t S h D 1 R t sin ϕ t e r r cos ϕ n e r r = E n = 1 , n t N h R n S h D 1 R n h R t S h D 1 R t sin ϕ t e r r cos ϕ n e r r + E n = 1 N h R n S 2 h D 1 R n 2 sin ϕ n e r r cos ϕ n e r r .
Owing to E n = 1 , n t N sin ϕ t e r r cos ϕ n e r r = 0 and E n = 1 N sin ϕ n e r r cos ϕ n e r r = 0 , the correlation coefficient is calculated as ρ = 0 . Accordingly, W n and V n are independent. Based on [45], the PDF for H D 1 can be formulated as (18), where m D 1 = μ w 1 2 4 σ w 1 2 and Ω D 1 = μ w 1 2 . By substituting (A2) and (A4) into the above, the distribution of H D 1 is proven.
Given that phase shifts are designed in accordance with the D 1 -U-S channel, the phase shift for reflecting the signal of D 2 can be characterized as a random variable. Consequently, ϕ D 2 = ϕ D 2 R n ϕ D 1 R n + ϕ n e r r represents independent and identically distributed uniform random variables within the interval 0 , 2 π , as demonstrated in [46]. Furthermore, H D 2 I = n = 1 N h R n S h D 2 R n e j ϕ D 2 2 follows an exponential distribution with the parameter N. This analysis concludes the proof.

Appendix B

According to Lemma 1, the PDF for H D 1 can be calculated as
f H D 1 x = x m D 1 1 m D 1 m D 1 Γ m D 1 Ω D 1 m D 1 e m D 1 Ω D 1 x .
In light of this, the COP for D 1 can be derived as
P c o p 1 = Pr ρ s H D 1 L U S L U D 1 ρ s H D 2 L U S L U D 2 + 1 < 2 R 1 1 = 0 1 F H D 2 ρ s x L U S L U D 1 χ 1 χ 1 ρ s L U S L U D 2 f H D 1 x d x = e 1 N ρ s L U S L U D 2 m D 1 m D 1 Γ m D 1 Ω D 1 m D 1 0 e L U D 1 χ 1 N L U D 2 + m D 1 Ω D 1 x x m D 1 1 d x = ( a ) e 1 N ρ s L U S L U D 2 L U D 1 Ω D 1 χ 1 N L U D 2 m D 1 + 1 m D 1 ,
Step ( a ) is derived by employing Equation (3.381.4) from [47]. By limiting the COP of D 1 to a predetermined threshold, specifically P c o p 1 < v c , the range of N is determined as follows:
1 N ρ s L U S L U D 2 m D 1 ln 1 + L U D 1 Ω D 1 χ 1 N L U D 2 m D 1 < ln v c ( b ) 1 N ρ s L U S L U D 2 N L U D 1 ξ 1 4 φ 1 2 χ 1 L U D 2 < ln v c ,
where step ( b ) is derived by applying the inequality ln ( 1 + x ) < x to establish a lower bound for the left-hand side of Equation (A10). When we consider (A10) as an equation, the application of this inequality helps to simplify the expression and provides a useful approximation. This allows us to understand the behavior of the function better and make a further analysis more tractable.
L U D 1 ξ 1 4 φ 1 2 χ 1 L U D 2 N 2 + ln v c N 1 ρ s L U S L U D 2 = 0 ,
and we obtain two feasible solutions N c = ln v c χ 1 L U D 2 + ln v c χ 1 L U D 2 2 + 4 ξ 1 4 φ 1 2 L U D 1 χ 1 L U S ρ s 2 ξ 1 4 φ 1 2 L U D 1 and N c = ln v c χ 1 L U D 2 ln v c χ 1 L U D 2 2 + 4 ξ 1 4 φ 1 2 L U D 1 χ 1 L U S ρ s 2 ξ 1 4 φ 1 2 L U D 1 . f N = L U D 1 ξ 1 4 φ 1 2 χ 1 L U D 2 N 2 + ln v c N 1 ρ s L U S L U D 2 is monotonically increasing on the interval ln v c χ 1 L U D 2 2 L U D 1 ξ 1 4 φ 1 2 , . To satisfy inequality (A10), the range of N satisfies N N c 1 . The proof is completed.

Appendix C

According to (22), the SNR F γ E D 1 x can be derived as
F γ E D 1 x = Pr max k 1 : K ρ s h R E k Φ h D 1 R 2 L U D 1 L U E k < x = F h R E k Φ h D 1 R 2 x ρ s L U D 1 L U E k K = ( c ) 1 e x ρ s L U D 1 L U E k N K .
Given that the phase shifts are tailored based on the D 1 -U-S channel, the phase shift for eavesdropper E k can also be characterized as random. Following a similar derivation process to that in Lemma 1, n = 1 N h R n E k h D 1 R n e j ϕ E 1 2 obeys an exponential distribution with the parameter N. Step (c) is thus obtained. P s o p 1 can then be derived as
P s o p 1 = Pr γ E k D 1 > χ e = 1 1 e χ e ρ s L U D 1 L U E k N K .
By constraining P s o p 1 into threshold v s , the constraint (24c) can be rewritten as N χ e ln 1 1 v s K ρ s L U D 1 L U E k . The proof is completed.

Appendix D

To derive E S E 2 , it is necessary to calculate the COP and SOP expressions for D 2 . The COP for user D 2 can be derived as follows:
P c o p 2 = 1 Pr ρ s H D 1 L U S L U D 1 ρ s H D 2 L U S L U D 2 + 1 > χ 1 , ρ s H D 2 L U S L U D 2 > χ 2 Θ
Θ can be further expressed as
Θ = χ 2 ρ s L U S L U D 2 1 N e x N 1 F H D 1 χ 1 ρ s x L U S L U D 2 + 1 ρ s L U S L U D 1 d x = 1 N e χ 1 m D 1 ρ s Ω D 1 L U S L U D 1 χ 2 ρ s L U S L U D 2 e χ 1 L U D 2 m D 1 L U D 1 Ω D 1 + 1 N x × n = 0 m D 1 1 χ 1 m D 1 ρ s L U S L U D 1 Ω D 1 n n ! t = 0 n n t ρ s L U S L U D 2 x t d x .
By exploiting Equation [3.381.3] in [47], Θ can be further reformulated as
Θ = 1 N n = 0 m D 1 1 e χ 1 m D 1 ρ s Ω D 1 L U S L U D 1 χ 1 m D 1 ρ s Ω D 1 L U S L U D 1 n 1 n ! t = 0 n n t × ρ s L U S L U D 2 t χ 1 L U D 2 m D 1 Ω D 1 L U D 1 + 1 N t 1 × γ m D 1 + 1 , χ 1 L U D 2 m D 1 Ω D 1 L U D 1 + 1 N χ 2 ρ s L U S L U D 2 .
By substituting (A16) into (A14), the COP for D 2 can be obtained.
Similar to the derivation of (A12), n = 1 N h R n E k h D 2 R n e j ϕ E 1 2 also obeys an exponential distribution. Therefore, the SOP for D 2 can be derived as P s o p 2 = 1 1 e χ e ρ s L U D 2 L U E k N K . Subsequently, E S E s u m can be obtained by substituting the COP and SOP for D 1 and D 2 into (23).
To ensure that problem P2 has a viable solution, the condition N c < N s must be met. By substituting Equations (25) and (26) into the inequality N c < N s , we obtain a feasible solution for P2, as illustrated in Equation (29).

References

  1. Li, B.; Fei, Z.; Zhang, Y.; Guizani, M. Secure UAV Communication Networks over 5G. IEEE Wirel. Commun. 2019, 26, 114–120. [Google Scholar] [CrossRef]
  2. Mu, J.; Zhang, R.; Cui, Y.; Gao, N.; Jing, X. UAV Meets Integrated Sensing and Communication: Challenges and Future Directions. IEEE Commun. Mag. 2023, 61, 62–67. [Google Scholar] [CrossRef]
  3. Cheng, X.; Jiang, R.; Sang, H.; Li, G.; He, B. Joint Optimization of Multi-UAV Deployment and User Association via Deep Reinforcement Learning for Long-Term Communication Coverage. IEEE Trans. Instrum. Meas. 2024, 73, 5503613. [Google Scholar] [CrossRef]
  4. Li, B.; Fei, Z.; Zhang, Y. UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef]
  5. Fotouhi, A.; Qiang, H.; Ding, M.; Hassan, M.; Giordano, L.G.; Garcia-Rodriguez, A.; Yuan, J. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3417–3442. [Google Scholar] [CrossRef]
  6. Pan, Y.; Li, R.; Da, X.; Hu, H.; Zhang, M.; Zhai, D.; Cumanan, K.; Dobre, O.A. Cooperative Trajectory Planning and Resource Allocation for UAV-Enabled Integrated Sensing and Communication Systems. IEEE Trans. Veh. Technol. 2024, 73, 6502–6516. [Google Scholar] [CrossRef]
  7. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.S. A Survey of NOMA: Current Status and Open Research Challenges. IEEE Open J. Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef]
  8. Ghous, M.; Hassan, A.K.; Abbas, Z.H.; Abbas, G.; Hussien, A.; Baker, T. Cooperative Power-Domain NOMA Systems: An Overview. Sensors 2022, 22, 9652. [Google Scholar] [CrossRef]
  9. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K.S. Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 721–742. [Google Scholar] [CrossRef]
  10. Cao, K.; Wang, B.; Ding, H.; Lv, L.; Dong, R.; Cheng, T.; Gong, F. Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers. IEEE Trans. Inf. Forensics Secur. 2021, 16, 786–799. [Google Scholar] [CrossRef]
  11. Nimi, T.; Babu, A.V. Full-Duplex Cooperative NOMA Network with Multiple Eavesdroppers and Non-ideal System Imperfections: Analysis of Physical Layer Security and Validation Using Deep Learning. IEEE Trans. Veh. Technol. 2024, 73, 17192–17208. [Google Scholar] [CrossRef]
  12. Nguyen, A.N.; Nguyen, G.H.; Ngo, T.S.; Bui, N.A.; Le, P.C.; Hoang, M.D. Secrecy Offloading Performance Analysis for UAV Relay-assisted NOMA MEC System. In Proceedings of the 2024 28th International Computer Science and Engineering Conference (ICSEC), Khon Kaen, Thailand, 6–8 November 2024; pp. 1–6. [Google Scholar] [CrossRef]
  13. Yu, K.; Feng, Z.; Yu, J.; Chen, T.; Peng, J.; Li, D. Secure Ultra-Reliable and Low Latency Communication in UAV-Enabled NOMA Wireless Networks. IEEE Trans. Veh. Technol. 2024, 73, 14908–14922. [Google Scholar] [CrossRef]
  14. Yang, X.; Han, B.; Zhang, G.; Zheng, P.; Bai, J.; Qin, D. NOMA-Assisted Routing Algorithm Design for UAV Ad Hoc Relay Networks. IEEE Sens. J. 2023, 23, 3296–3312. [Google Scholar] [CrossRef]
  15. Li, X.; Zhang, M.; Chen, H.; Han, C.; Li, L.; Do, D.T.; Mumtaz, S.; Nallanathan, A. UAV-Enabled Multi-Pair Massive MIMO-NOMA Relay Systems With Low-Resolution ADCs/DACs. IEEE Trans. Veh. Technol. 2024, 73, 2171–2186. [Google Scholar] [CrossRef]
  16. Liu, R.; Guo, K.; An, K.; Zhou, F.; Wu, Y.; Huang, Y.; Zheng, G. Resource Allocation for NOMA-Enabled Cognitive Satellite–UAV–Terrestrial Networks with Imperfect CSI. IEEE Trans. Cogn. Commun. Netw. 2023, 9, 963–976. [Google Scholar] [CrossRef]
  17. Liu, Z.; Qi, J.; Shen, Y.; Ma, K.; Guan, X. Maximizing Energy Efficiency in UAV-Assisted NOMA–MEC Networks. IEEE Internet Things J. 2023, 10, 22208–22222. [Google Scholar] [CrossRef]
  18. Lu, W.; Ding, Y.; Gao, Y.; Chen, Y.; Zhao, N.; Ding, Z.; Nallanathan, A. Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper. IEEE Trans. Commun. 2022, 70, 3364–3376. [Google Scholar] [CrossRef]
  19. Liu, Z.; Liu, X.; Leung, V.C.M.; Durrani, T.S. Energy-Efficient Resource Allocation for Dual-NOMA-UAV Assisted Internet of Things. IEEE Trans. Veh. Technol. 2023, 72, 3532–3543. [Google Scholar] [CrossRef]
  20. Hoang, T.M.; Dung, L.T.; Nguyen, B.C.; Kim, T. Outage and Throughput Analysis of UAV-Assisted NOMA Relay Systems with Indoor and Outdoor Users. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 2633–2647. [Google Scholar] [CrossRef]
  21. Campion, M.; Ranganathan, P.; Faruque, S. UAV swarm communication and control architectures: A review. J. Unmanned Veh. Syst. 2019, 7, 93–106. [Google Scholar] [CrossRef]
  22. Zhou, Y.; Pan, C.; Yeoh, P.L.; Wang, K.; Elkashlan, M.; Vucetic, B.; Li, Y. Secure Communications for UAV-Enabled Mobile Edge Computing Systems. IEEE Trans. Commun. 2020, 68, 376–388. [Google Scholar] [CrossRef]
  23. Michailidis, E.T.; Maliatsos, K.; Skoutas, D.N.; Vouyioukas, D.; Skianis, C. Secure UAV-Aided Mobile Edge Computing for IoT: A Review. IEEE Access 2022, 10, 86353–86383. [Google Scholar] [CrossRef]
  24. Yang, Z.; Xu, W.; Shikh-Bahaei, M. Energy Efficient UAV Communication with Energy Harvesting. IEEE Trans. Veh. Technol. 2020, 69, 1913–1927. [Google Scholar] [CrossRef]
  25. Cai, Y.; Wei, Z.; Li, R.; Ng, D.W.K.; Yuan, J. Joint Trajectory and Resource Allocation Design for Energy-Efficient Secure UAV Communication Systems. IEEE Trans. Commun. 2020, 68, 4536–4553. [Google Scholar] [CrossRef]
  26. Khoshafa, M.H.; Maraqa, O.; Moualeu, J.M.; Aboagye, S.; Ngatched, T.M.N.; Ahmed, M.H.; Gadallah, Y.; Renzo, M.D. RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey. In IEEE Communications Surveys & Tutorials; IEEE: Piscataway, NJ, USA, 2024; p. 1. [Google Scholar] [CrossRef]
  27. Pan, C.; Zhou, G.; Zhi, K.; Hong, S.; Wu, T.; Pan, Y.; Ren, H.; Renzo, M.D.; Lee Swindlehurst, A.; Zhang, R.; et al. An Overview of Signal Processing Techniques for RIS/IRS-Aided Wireless Systems. IEEE J. Sel. Top. Signal Process. 2022, 16, 883–917. [Google Scholar] [CrossRef]
  28. Li, Y.; Zhang, H.; Long, K.; Nallanathan, A. Exploring Sum Rate Maximization in UAV-Based Multi-IRS Networks: IRS Association, UAV Altitude, and Phase Shift Design. IEEE Trans. Commun. 2022, 70, 7764–7774. [Google Scholar] [CrossRef]
  29. Yuan, J.; Chen, G.; Wen, M.; Wan, D.; Cumanan, K. Security-Reliability Tradeoff in UAV-Carried Active RIS-Assisted Cooperative Networks. IEEE Commun. Lett. 2024, 28, 437–441. [Google Scholar] [CrossRef]
  30. You, C.; Kang, Z.; Zeng, Y.; Zhang, R. Enabling Smart Reflection in Integrated Air-Ground Wireless Network: IRS Meets UAV. IEEE Wirel. Commun. 2021, 28, 138–144. [Google Scholar] [CrossRef]
  31. Wei, W.; Pang, X.; Tang, J.; Zhao, N.; Wang, X.; Nallanathan, A. Secure Transmission Design for Aerial IRS Assisted Wireless Networks. IEEE Trans. Commun. 2023, 71, 3528–3540. [Google Scholar] [CrossRef]
  32. Qiao, T.; Cao, Y.; Tang, J.; Zhao, N.; Wong, K.K. IRS-Aided Uplink Security Enhancement via Energy-Harvesting Jammer. IEEE Trans. Commun. 2022, 70, 8286–8297. [Google Scholar] [CrossRef]
  33. Wang, J.; Wang, X.; Gao, R.; Lei, C.; Feng, W.; Ge, N.; Jin, S.; Quek, T.Q.S. Physical layer security for UAV communications: A comprehensive survey. China Commun. 2022, 19, 77–115. [Google Scholar] [CrossRef]
  34. Gu, X.; Duan, W.; Zhang, G.; Wen, M.; Choi, J.; Ho, P.H. Aerial Reconfigurable Intelligent Surface-Assisted Terrestrial Communications. IEEE Internet Things Mag. 2024, 7, 54–60. [Google Scholar] [CrossRef]
  35. Li, S.; Duo, B.; Renzo, M.D.; Tao, M.; Yuan, X. Robust Secure UAV Communications with the Aid of Reconfigurable Intelligent Surfaces. IEEE Trans. Wirel. Commun. 2021, 20, 6402–6417. [Google Scholar] [CrossRef]
  36. Solanki, S.; Park, J.; Lee, I. On the Performance of IRS-Aided UAV Networks with NOMA. IEEE Trans. Veh. Technol. 2022, 71, 9038–9043. [Google Scholar] [CrossRef]
  37. Ye, R.; Peng, Y.; Al-Hazemi, F.; Boutaba, R. A Robust Cooperative Jamming Scheme for Secure UAV Communication via Intelligent Reflecting Surface. IEEE Trans. Commun. 2024, 72, 1005–1019. [Google Scholar] [CrossRef]
  38. Diao, D.; Wang, B.; Cao, K.; Zheng, B.; Dong, R.; Cheng, T.; Chen, J. Reflecting Elements Analysis for Secure and Energy-Efficient UAV-RIS System with Phase Errors. IEEE Wirel. Commun. Lett. 2024, 13, 293–297. [Google Scholar] [CrossRef]
  39. Bor-Yaliniz, R.I.; El-Keyi, A.; Yanikomeroglu, H. Efficient 3-D placement of an aerial base station in next generation cellular networks. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–5. [Google Scholar] [CrossRef]
  40. Zaghdoud, N.; Mnaouer, A.B.; Alouane, W.H.; Boujemaa, H.; Touati, F. Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1719–1725. [Google Scholar] [CrossRef]
  41. Al-Jarrah, M.; Al-Dweik, A.; Alsusa, E.; Iraqi, Y.; Alouini, M.S. On the Performance of IRS-Assisted Multi-Layer UAV Communications with Imperfect Phase Compensation. IEEE Trans. Commun. 2021, 69, 8551–8568. [Google Scholar] [CrossRef]
  42. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  43. Yadav, S.; Vats, A.; Aggarwal, M.; Ahuja, S. Performance Analysis and Altitude Optimization of UAV-Enabled Dual-Hop Mixed RF-UWOC System. IEEE Trans. Veh. Technol. 2021, 70, 12651–12661. [Google Scholar] [CrossRef]
  44. Liu, H.; Luo, J.; Wang, S.; Ding, H. Effective Secrecy Capacity for RIS-Assisted NOMA Communication Networks. IEEE Trans. Veh. Technol. 2025, 74, 1379–1384. [Google Scholar] [CrossRef]
  45. Badiu, M.A.; Coon, J.P. Communication Through a Large Reflecting Surface with Phase Errors. IEEE Wirel. Commun. Lett. 2020, 9, 184–188. [Google Scholar] [CrossRef]
  46. Vega Sánchez, J.D.; Ramírez-Espinosa, P.; López-Martínez, F.J. Physical Layer Security of Large Reflecting Surface Aided Communications with Phase Errors. IEEE Wirel. Commun. Lett. 2021, 10, 325–329. [Google Scholar] [CrossRef]
  47. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Drones 09 00289 g001
Figure 2. The PDFs of H D 1 and H D 2 , where m U S = 3.5 , m U D 1 = 2.5 , and m U D 2 = 1 .
Figure 2. The PDFs of H D 1 and H D 2 , where m U S = 3.5 , m U D 1 = 2.5 , and m U D 2 = 1 .
Drones 09 00289 g002
Figure 3. The number of reflecting element boundaries N c versus v c .
Figure 3. The number of reflecting element boundaries N c versus v c .
Drones 09 00289 g003
Figure 4. The number of reflecting element boundaries N s versus v s .
Figure 4. The number of reflecting element boundaries N s versus v s .
Drones 09 00289 g004
Figure 5. The ESE versus N for different K.
Figure 5. The ESE versus N for different K.
Drones 09 00289 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Diao, D.; Wang, B.; Guo, R. Secure and Energy-Efficient Configuration Strategies for UAV-RIS System with Uplink NOMA. Drones 2025, 9, 289. https://doi.org/10.3390/drones9040289

AMA Style

Diao D, Wang B, Guo R. Secure and Energy-Efficient Configuration Strategies for UAV-RIS System with Uplink NOMA. Drones. 2025; 9(4):289. https://doi.org/10.3390/drones9040289

Chicago/Turabian Style

Diao, Danyu, Buhong Wang, and Rongxiao Guo. 2025. "Secure and Energy-Efficient Configuration Strategies for UAV-RIS System with Uplink NOMA" Drones 9, no. 4: 289. https://doi.org/10.3390/drones9040289

APA Style

Diao, D., Wang, B., & Guo, R. (2025). Secure and Energy-Efficient Configuration Strategies for UAV-RIS System with Uplink NOMA. Drones, 9(4), 289. https://doi.org/10.3390/drones9040289

Article Metrics

Back to TopTop