Skip to main content

UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization

Abstract

With the inherent advantages of exceptional maneuverability, flexible deployment options and cost-effectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in high-traffic or remote areas. Nevertheless, the openness of the air–ground channel poses significant security challenges to UAV-based wireless systems. In this paper, a UAV-assisted secure communication system model is established based on non-orthogonal multiple access (NOMA) from the perspective of physical layer security, aiming to conceal the transmission behavior between UAVs and legitimate users (LUs). Specifically, a mobile UAV assumes the role of an aerial base station, leveraging NOMA technique to transmit data to LUs while evading detection from mobile eavesdropper situated on the ground. To fortify the security performance of the system, a hovering UAV acts as a friendly jammer and transmits interference signals to mobile eavesdropper (referred to as Eve). The objective of this scheme is to maximize the minimum average secure rate of all LUs by meticulously optimizing the trajectory and power allocation of the mobile UAV, subject to secrecy performance constraints. The highly interdependent and non-convex nature of this optimization problem renders direct solutions infeasible. Hence, this paper designs an efficient iterative algorithm that decouples the original problem into two subproblems, enabling an alternating optimization process for the trajectory and power allocation of the mobile UAV until the convergence of the objective function is achieved. Simulation results demonstrate that the proposed algorithm effectively improves the minimum average secure rate of all LUs compared with the benchmark scheme.

1 Introduction

With the exponential growth of Internet of Things (IoT) applications, it is estimated that the global number of IoT devices will reach a staggering 30 billion by 2030 [1,2,3,4]. However, in regions where ground communication infrastructure is absent or in emergency scenarios, IoT devices may face challenges in accessing reliable communication services [5,6,7]. Conversely, in geographically isolated areas, the deployment of unmanned aerial vehicles (UAVs) presents a compelling solution due to their exceptional maneuverability, adaptable deployment capabilities and cost-effectiveness [8,9,10]. By capitalizing on these advantages, UAVs can swiftly establish emergency communication systems in areas deprived of ground infrastructure, ensuring steadfast channel connectivity with IoT devices [11,12,13,14]. This, in turn, guarantees uninterrupted and dependable transmission of information and seamless data collection for IoT devices, thereby significantly bolstering emergency communication capabilities in regions affected by disasters.

As a highly promising technology, UAV-assisted communication showcases three typical application scenarios [15,16,17]. Firstly, UAVs can be deployed as airborne base stations, enabling pervasive wireless coverage within their designated service areas [18,19,20]. Zhang et al. [18] introduced a communication system model that leverages multiple UAV base stations, aiming to minimize the required number of UAVs while optimizing their three-dimensional positions, user clustering and frequency band allocation to enhance coverage. Secondly, UAVs can function as aerial relays, establishing reliable wireless connections for remote users when direct communication is unfeasible [21, 22]. Ji et al. [22] delved into the security challenges of cache-enabled UAV relay networks featuring device-to-device (D2D) communication, considering the presence of eavesdroppers (Eves). They formulated an optimization problem that jointly optimized cache layout and UAV flight trajectory within a limited flying cycle, with the objective of maximizing the minimum secrecy rate among receivers. Lastly, UAVs can serve as airborne access points, facilitating mobile data collection and information dissemination to cater to diverse user demands [23]. Zeng et al. [23] proposed an innovative UAV-assisted wireless communication scheme utilizing cyclic multi-access and optimized transmission time allocation based on UAV positions to achieve maximum minimum throughput. By capitalizing on these remarkable advantages, UAVs have become an indispensable and complementary component of existing communication systems.

Nevertheless, wireless systems, including UAV communication, have long grappled with the limited availability of spectrum resources [24]. In light of this challenge, researchers have been actively exploring efficient strategies to transmit information within the constraints of restricted frequency bands. In contrast to orthogonal multiple access (OMA), non-orthogonal multiple access (NOMA) [25,26,27,28] enables multiple users to share the same spectrum by superimposing their signals in the power domain. To mitigate interference caused by overlapping signals, successive interference cancelation (SIC) techniques are employed at the receiver level. NOMA exhibits superior spectrum efficiency, reduced latency and enhanced connectivity when compared with OMA. In a particular study [29], a UAV was employed to serve multiple ground users using NOMA. The research focused on optimizing the layout and power allocation of the UAV to maximize overall throughput. Zhao et al. [30] proposed a NOMA-UAV system, where the UAV cooperates with a base station to provide services to ground users. By jointly optimizing the trajectory of the UAV and NOMA precoding techniques, the research aimed to maximize the transmission rate for ground users facilitated by the UAV. Furthermore, Wu et al. [31] introduced a UAV-based two-user broadcast channel, wherein the UAV independently transmitted information to two ground users. By considering constraints on the UAV’s maximum speed and transmit power, a joint optimization approach was employed to determine the UAV’s flight trajectory and power allocation. The objective was to effectively characterize the throughput of the broadcast channel within a given duration of UAV flight. Additionally, Nasir et al. [32] investigated the problem of maximizing the minimum transmission rate under various constraints, including total transmit power, total bandwidth, UAV altitude and antenna beamwidth. To address this optimization challenge, they employed a trajectory optimization algorithm to obtain an efficient UAV-NOMA system with notable enhancements in transmission rates.

However, wireless systems, including UAV communication, are confronted with the pervasive risk of eavesdropping and malicious attacks, posing intricate challenges in delivering secure and dependable communication services for ground-based IoT devices [33,34,35]. In contrast to conventional encryption methods, recent research has extensively explored the realm of physical layer security (PLS), which capitalizes on the intrinsic characteristics of the wireless channel and employs (artificial) noise to accomplish secure information transmission [36, 37]. Yang et al. [38] and Jameel et al. [39] conducted investigations into the utilization of artificial noise (AN) emitted from ground terminals to deliberately degrade the eavesdropper’s channel and curtail the capacity of the eavesdropping channel. This approach effectively enhances the system’s secrecy capacity. Zhang et al. [40] underscored the advantages conferred by UAVs, such as their flexible deployment and mobility, in augmenting the security performance of the system. By orchestrating the optimization of UAV deployment or flight trajectories alongside wireless communication resources, the channel capacity of UAV-to-ground communication can be amplified, thereby fortifying the secrecy capacity. Moreover, Gao et al. [41] delved into a UAV-to-ground communication system, where a UAV is tasked with transmitting confidential information to authorized users while contending with the presence of eavesdroppers and adhering to no-fly zones. Through the joint optimization of the UAV’s trajectory and transmission power, the research aimed to maximize the minimum secure rate experienced by users within the system. Additionally, Luo et al. [42] examined both the uplink and downlink scenarios in a UAV communication system, where confidential information is exchanged between a legitimate ground user and the UAV, while an active Eve seeks to intercept the information and introduces interference signals. To tackle this challenge, they proposed a resource allocation algorithm that maximizes the average secure rate within this configuration.

By the analysis of the aforementioned literature, two drawbacks can be identified in previous works on UAV physical layer secure communication. Firstly, existing research has not taken into account the impact of eavesdropper location uncertainty on secure communication. Secondly, most works have only considered a single ground LU, neglecting the interactive influence among multiple LUs. Therefore, a UAV-assisted secure communication system is proposed based on NOMA to achieve secure data transmission for legitimate users in this paper. NOMA and PLS are employed to enhance the spectrum efficiency of the system and ensure wireless transmission security, respectively. The contributions of this paper are summarized as follows:

  • A UAV-assisted secure communication system model based on NOMA is established. Addressing the scenario with multiple legitimate users, a UAV is strategically deployed as an aerial base station, leveraging NOMA technique to dynamically provide communication services through carefully planned periodic flight trajectories. Moreover, to safeguard the integrity of the system, a low-altitude UAV is ingeniously employed as a friendly jammer, effectively disrupting potential eavesdroppers. Eve is presumed to be mobile on the ground, following specific trajectories or directions.

  • A coordinated design scheme for the trajectory and transmit power of a mobile UAV is proposed. In the IoT environment where mobile Eve exist, optimizing the transmit power of mobile UAV based on real-time tracking of the Eve’s trajectory can improve the flexibility of resource allocation. Concurrently, by optimizing the UAV trajectory, network security is enhanced to a considerable extent. The objective of this scheme is to maximize the minimum average secure rate among all LUs by the joint optimization of the mobile UAV’s trajectory and transmit power, while adhering to the constraints imposed by secrecy performance.

  • A highly efficient optimization algorithm to enhance the performance of the UAV-assisted secure communication system is designed. To achieve this, an alternating iterative algorithm that optimizes both the trajectory and transmission power of the mobile UAV is proposed. Firstly, by fixing the UAV trajectory, relaxation variables is introduced to optimize power allocation. Then, with the power allocation fixed, we proceed to optimize the UAV trajectory and employ the CVX tool for trajectory calculation. Finally, by iteratively performing the aforementioned two steps, we achieve convergence of the optimization objective, thereby maximizing the minimum average secure rate of all LUs.

The content and organization of this paper are outlined as follows. In Sect. 2, the system model of the UAV-assisted secure communication system based on NOMA is introduced, along with the formulation of the corresponding optimization problem. Section 3 provides a comprehensive mathematical formulation of the optimization problem and presents a highly efficient iterative algorithm specifically designed for its solution. The simulation results are presented in Sect. 4, followed by the concluding remarks in Sect. 5.

2 System model and problem formulation

Considering the UAV-assisted secure communication network model based on NOMA depicted in Fig. 1, the network comprises two layers: a low-altitude layer consisting of a mobile UAV and a hovering friendly jammer, and a ground layer comprising K legitimate users and a mobile Eve. The set of LUs is denoted as \({\mathcal {K}}=\left\{ 1,2,\cdots ,K\right\}\). In this model, the mobile UAV and hovering friendly jammer (Jammer) are assumed to be at heights \(H_\text{U}\) and \(H_\text{J}\), respectively. The legitimate users are randomly distributed on the ground, while the mobile eavesdropper moves on the ground in a specified direction. The positions of LUs \(k\in {\mathcal {K}}\) and the hovering friendly jammer in the three-dimensional Cartesian coordinate system are represented by coordinate vectors \({{\textbf{w}}_k=\left( x_k,y_k\right) }^\text{T}\) and \({{\textbf{q}}_\text{J}=\left( x_\text{J},y_\text{J}\right) }^\text{T}\), respectively.

Fig. 1
figure 1

System model

For the sake of analysis, the mission cycle T is discretized into N equal time slots, where each slot has a duration of \(\delta = T/N\). The horizontal position coordinates of the mobile Eve and the mobile UAV can be represented as \({{\textbf{W}}_\text{E}} = {\left( {{x_\text{E}}\left[ n \right] ,{y_\text{E}}\left[ n \right] } \right) ^\text{T}},n \in {{\mathcal {N}}} = \left\{ {1,2, \cdot \cdot \cdot ,N} \right\}\) and \({{\textbf{q}}_\text{U}} = {\left( {{x_\text{U}}\left[ n \right] ,{y_\text{U}}\left[ n \right] } \right) ^\text{T}},n \in {{\mathcal {N}}} = \left\{ {1,2, \cdot \cdot \cdot ,N} \right\}\), respectively. When the mobile UAV operates in a periodic manner, its endpoint position \({\textbf{q}}_\text{U}\left[ N\right]\) coincides with its starting point position \({\textbf{q}}_\text{U}\left[ 1\right]\). It is assumed that the UAV maintains a constant speed throughout each time slot, and the maximum speed of the UAV is denoted as \(V_\text{max}\). Hence, the mobility constraint of the UAV can be formulated as follows:

$$\begin{aligned}{}[{{\textbf{q}}_\text{U}}[1]= & {} {{\textbf{q}}_\text{U}}[N] \end{aligned}$$
(1)
$$\begin{aligned}{} & {} ||{{\textbf{q}}_\text{U}}\left[ {n + 1} \right] - {{\textbf{q}}_\text{U}}\left[ n \right] |{|^2} \le {\left( {\frac{{{V_{\max }}T}}{N}} \right) ^2},n = 1,2,...,N - 1 \end{aligned}$$
(2)
$$\begin{aligned}{} & {} ||{{\textbf{q}}_\text{U}}\left[ n \right] - {{\textbf{q}}_\text{J} }|{|^2} \ge d_{\min }^2,\forall n \end{aligned}$$
(3)

where \(d_\text{min}\) denotes the minimum permissible distance ensuring safety between the mobile UAV and the hovering friendly jammer.

Throughout the mission cycle, the transmit power of the friendly jammer remains constant at \(P_\text{J}\), while in the nth time slot, the mobile UAV’s transmit power is represented as \(P_\text{U} \left[ n\right]\). Both entities adhere to the following constraints

$$\begin{aligned}{} & {} 0 \le {P_\text{U}}\left[ n \right] \le {P_{\max }},\forall n \end{aligned}$$
(4)
$$\begin{aligned}{} & {} {P_\text{J}} \ge 0 \end{aligned}$$
(5)

where \(P_\text{max}\) denotes the maximum transmit power of the mobile UAV in the nth time slot.

In the proposed network, the mobile UAV functions as a high-altitude base station, delivering services to LUs. The impact of terrain, obstacles and shadowing can be disregarded. Consequently, the communication channels between the mobile UAV and friendly jammer in the low-altitude layer, involving LUs and the mobile Eve on the ground, can be predominantly characterized as line-of-sight (LoS) links. Thus, during the nth time slot, the channel gain between the mobile UAV and a LUs conforms to the free-space path loss model and can be expressed as

$$\begin{aligned} {h_{k,\text{U}}}\left[ n \right] = \frac{{{\beta _0}}}{{d_{k,\text{U}}^2\left[ n \right] }},\forall k \end{aligned}$$
(6)

where \(\beta _0\) represents the channel power gain at a reference distance of \(d_0=1\,{\mathrm{m}}\). \(d_{k,\text{U}}[n]\) stands for the distance between the kth LU and the mobile UAV during the nth time slot, and it can be expressed as

$$\begin{aligned} {d_{k,\text{U}}}\left[ n \right] = {\sqrt{H_\text{U}^2 + {{\left\| {{ {\textbf{q}}_\text{U}}\left[ n \right] - {{{\textbf {W}}}_k}} \right\| }^2}},\forall k} \end{aligned}$$
(7)

Similarly, the channel gain \({h_{\text{U},\text{E}}}[n]\) between the mobile UAV and Eve during the nth time slot can be expressed as follows:

$$\begin{aligned} {h_{\text{U},\text{E}}}\left[ n \right] = \frac{{{\beta _0}}}{{d_{\text{U},\text{E}}^2\left[ n \right] }},\forall n \end{aligned}$$
(8)

where \(d_{\text{U},\text{E}}\left[ n\right]\) denotes the distance between the mobile UAV and Eve during the nth time slot, and it can be formulated as

$$\begin{aligned} {d_{\text{U},\text{E}}}\left[ n \right] = \sqrt{H_\text{U}^2 + {{\left\| {{{\textbf{q}}_\text{U}}\left[ n \right] - {{{\textbf {W}}}_\text{E}}\left[ n \right] } \right\| }^2}},\forall n \end{aligned}$$
(9)

During the nth time slot, the channel gain \({h_{\text{J},\text{E}}}[n]\) between the friendly jammer and the mobile Eve can be expressed as follows:

$$\begin{aligned} {h_{\text{J},\text{E}}}\left[ n \right] = \frac{{{\beta _0}}}{{d_{\text{J},\text{E}}^2\left[ n \right] }},\forall n \end{aligned}$$
(10)

where \(d_{\text{J},\text{E}}\left[ n\right]\) denotes the spatial separation between the friendly jammer and the mobile Eve during the nth time slot and can be mathematically expressed as

$$\begin{aligned} {d_{\text{J},\text{E}}}\left[ n \right] = \sqrt{H_\text{J} ^2 + {{\left\| {{{\textbf{q}}_\text{J} } - {{{\textbf {W}}}_ \text{E}}\left[ n \right] } \right\| }^2}},\forall n \end{aligned}$$
(11)

Based on the system model, the achievable rate from the mobile UAV to LUs in the nth time slot can be defined as follows:

$$\begin{aligned} {R_k}\left[ n \right] = \sum \nolimits _{k = 1}^K {{{\log }_2}(1 + \frac{{{P_\text{U}}\left[ n \right] {h_{k,\text{U}}}\left[ n \right] }}{{\sum \nolimits _{{\widetilde{k}} = k + 1}^K {{P_{\widetilde{k}}}\left[ n \right] {h_{{\widetilde{k}},\text{U}}}\left[ n \right] + {N_0}} }})},\forall k,n \end{aligned}$$
(12)

where \(\sum _{\widetilde{k}=k+1}^{K}{P_{\widetilde{k}}\left[ n\right] h_{\widetilde{k},\text{U}}\left[ n\right] }\) denotes the interference caused by the (k+1)th to the Kth legitimate users when the mobile UAV communicates with the kth legitimate user. The term \({N_0}\) represents the power spectral density of the additive white Gaussian noise (AWGN).

In the nth time slot, the intercepted achievable rate by the mobile Eve from the mobile UAV can be expressed as

$$\begin{aligned} {R_\text{E}}\left[ n \right] = {\log _2}\left(1 + \frac{{{P_\text{U}}\left[ n \right] {h_{\text{U},\text{E} }}\left[ n \right] }}{{{N_0} + {P_\text{J}}h{}_{\text{E},\text{J}}\left[ n \right] }}\right),\forall n \end{aligned}$$
(13)

Hence, the average secure rate of LUs k across all time slots can be formulated as

$$\begin{aligned} {R_\text{sk}} = \frac{1}{N}\sum \limits _{n = 1}^N {({R_k}\left[ n \right] - \max ({R_\text{E} }\left[ n \right] ))},\forall k,n \end{aligned}$$
(14)

where \(\max ({R_\text{E}}\left[ n \right] )\) represents the maximum achievable rate at which the mobile eavesdropper can intercept the moving UAV across all time slots.

Define the variables \({{\mathcal {P}}} = \left\{ {{P_\text{U}}\left[ n \right] ,\forall n} \right\}\) and \(Q = \left\{ {{{\textbf{q}}_\text{U}}\left[ n \right] ,\forall n} \right\}\) as follows. The objective of this paper is to maximize the minimum average secure rate of all LUs by simultaneously optimizing the trajectory \({\mathcal {Q}}\) and power allocation \({\mathcal {P}}\) of the mobile UAV, subject to the constraint of secrecy performance. In addition, a relaxation variable \(\varphi = \min {R_\text{sk}}\) is introduced. Consequently, the optimization problem can be formulated as follows:

$$\begin{aligned}&\mathop {\max }\limits _{\varphi ,{{{\mathcal {P}}}},Q} \varphi \end{aligned}$$
(15a)
$$\begin{aligned}&{\mathrm {s.t.} {R_\text{sk}} \ge \varphi ,\forall k} \end{aligned}$$
(15b)
$$\begin{aligned}&{||{ {\textbf{q}}_\text{U}}\left[ {n + 1} \right] - { {\textbf{q}}_\text{U}}\left[ n \right] |{|^2} \le {\left( {\frac{{{V_{\max }}T}}{N}} \right) ^2},n = 1,2,...,N - 1} \end{aligned}$$
(15c)
$$\begin{aligned}&{||{ {\textbf{q}}_\text{U}}\left[ n \right] - { {\textbf{q}}_\text{J} }|{|^2} \ge d_{\min }^2,\forall n} \end{aligned}$$
(15d)
$$\begin{aligned}&{{ {\textbf{q}}_\text{U}}[1] = { {\textbf{q}}_\text{U}}[N]} \end{aligned}$$
(15e)
$$\begin{aligned}&{0 \le {P_\text{U}}\left[ n \right] \le {P_{\max }},\forall n} \end{aligned}$$
(15f)
$$\begin{aligned}&{{P_\text{J} } \ge 0} \end{aligned}$$
(15g)

Clearly, due to the intricate interdependence among the variables, solving Eq. (15) directly poses a significant challenge. This is mainly attributed to the fact that (15b) constitutes a complex non-convex fractional expression entailing the coupling of optimization variables. As a result, problem (15) constitutes a non-convex optimization problem that presents difficulties in direct solution.

3 Proposed solution

In this section, we address the challenging non-convex optimization problem (15) by decomposing it into two subproblems, specifically focusing on the trajectory \({\mathcal {Q}}\) and power allocation \({\mathcal {P}}\) of the mobile UAV. To handle the non-convexity, we utilize the relaxation variable method and employ the successive convex approximation (SCA) technique to transform the respective non-convex subproblems into convex ones. By alternating iterations, we iteratively solve these convex subproblems and aim to achieve convergence of the optimization objective.

3.1 Transmit power optimization

Given the predetermined trajectory of the mobile UAV, denoted as \({\mathcal {Q}}\), the optimization problem concerning power allocation, denoted as \({\mathcal {P}}\), can be described as follows:

$$\begin{aligned} \max _{\varphi ,{\mathcal {P}}} \quad&\varphi \end{aligned}$$
(16a)
$$\begin{aligned} \mathrm {s.t.} \quad&{\frac{1}{N}\sum _{n=1}^N \left( \sum _{k=1}^K \log _2\left( 1 + \frac{P_\text{U}[n]h_{k,\text{U}}[n]}{\sum _{{\widetilde{k}}=k+1}^K P_{{\widetilde{k}}}[n]h_{{\widetilde{k}},\text{U}}[n] + N_0}\right) \right) } \nonumber \\&{- \max (R_\text{E}[n]) \ge \varphi , \forall k, n} \end{aligned}$$
(16b)
$$\begin{aligned}&0 \le P_\text{U}[n] \le P_{\max }, \forall n \end{aligned}$$
(16c)
$$\begin{aligned}&P_\text{J} \ge 0 \end{aligned}$$
(16d)

Due to the non-convex nature of constraint (16b), the optimization problem (16) becomes a challenging non-convex problem to solve directly. To obtain an effective approximation solution for this problem, successive convex approximation is employed. By leveraging Lemma 1, the non-convex constraint (16b) is transformed into a convex constraint.

Lemma 1

The non-convex constraint (16b) in Eq. (16) can be reformulated as a convex constraint utilizing the following transformation

$$\begin{aligned}{} & {} \frac{1}{N}\sum \limits _{n = 1}^N {\left(\sum \nolimits _{k = 1}^K {{{\log }_2}\left(1 + \frac{{{P_ \text{U}}\left[ n \right] {h_{k, \text{U}}}\left[ n \right] }}{{\sum \nolimits _{{\widetilde{k}} = k + 1}^K {{P_{{\widetilde{k}}}}\left[ n \right] {h_{{\widetilde{k}}, \text{U}}}\left[ n \right] + {N_0}} }}\right)} - \gamma \right)} \ge \varphi \end{aligned}$$
(17)
$$\begin{aligned}{} & {} A_ \text{U}^l\left[ n \right] + B_\text{U} ^l\left[ n \right] ({P_ \text{U}}\left[ n \right] - P_ \text{U}^l\left[ n \right] ) \le \gamma \end{aligned}$$
(18)

where

$$\begin{aligned}{} & {} A_ \text{U}^l\left[ n \right] = {\log _2}\left(1 + \frac{{P_ \text{U}^l\left[ n \right] {h_{\text{U},\text{E}}}\left[ n \right] }}{{{N_0} + {P_\text{J}}h{}_{\text{E},\text{J}}\left[ n \right] }}\right) \end{aligned}$$
(19)
$$\begin{aligned}{} & {} B_\text{U} ^l\left[ n \right] = \frac{{{{\log }_2}({\text{e}}){h_{\text{U},\text{E}}}\left[ n \right] }}{{{N_0} + {P_\text{J} }h{}_{\text{E},\text{J}}\left[ n \right] + P_\text{U}^l\left[ n \right] {h_{\text{U},\text{E}}}\left[ n \right] }} \end{aligned}$$
(20)

Proof

Firstly, by introducing a relaxation variable \(\gamma = \max ({\log _2}(1 + \frac{{{P_\text{U} }\left[ n \right] {h_{\text{U},\text{E}}}\left[ n \right] }}{{{N_0} + {P_\text{J} }h{}_{\text{E},\text{J}}\left[ n \right] }}))\), the transformed formulation of the equation can be obtained as follows:

$$\begin{aligned} {R_\text{E} }\left[ n \right] = {\log _2}\left(1 + \frac{{{P_\text{U} }\left[ n \right] {h_{\text{U},\text{E}}}\left[ n \right] }}{{{N_0} + {P_\text{J}}h{}_{\text{E},\text{J}}\left[ n \right] }}\right) \le \gamma \end{aligned}$$
(21)

It is evident that Eq. (21) with respect to \(P_ \text{U} \left[ n\right]\) is non-convex. To address this, a Taylor series expansion can be employed to derive an upper bound for \(R_ \text{E} \left[ n\right]\) In each iteration, an approximate value \(R_ \text{E} ^l\left[ n\right]\) is substituted for \(R_ \text{E} \left[ n\right]\), thereby transforming the constraint (21) into a convex constraint. In the lth iteration, the first-order Taylor series expansion of \(R_ \text{E} \left[ n\right]\) can be expressed as follows:

$$\begin{aligned} {R_ \text{E} }\left[ n \right] \le A_\text{U}^l\left[ n \right] + B_\text{U}^l\left[ n \right] ({P_\text{U}}\left[ n \right] - P_\text{U}^l) \buildrel \Delta \over = R_\text{E}^l\left[ n \right] \end{aligned}$$
(22)

where \(A_\text{U}^l\left[ n\right]\) and \(B_\text{U}^l\left[ n\right]\) are defined according to Eqs. (19) and (20), respectively. With this, the proof is concluded. \(\square\)

Hence, (16) can be reconfigured as

$$\begin{aligned}&\mathop {\max }\limits _{\varphi ,{{\mathcal {P}}}} \varphi \end{aligned}$$
(23a)
$$\begin{aligned} \quad&{\mathrm {s.t.}\left( {17} \right) - \left( {20} \right) ,\left( {{\text{16c}}} \right) ,\left( {{\text{16d}}} \right) } \end{aligned}$$
(23b)

3.2 UAV trajectory optimization

The optimization problem statement pertaining to the trajectory \({\mathcal {Q}}\) of the mobile UAV, leveraging the power allocation \(P_\text{U}\left[ n\right]\) derived via optimization, is described as follows:

$$\begin{aligned}&\max _{\varphi ,Q} \quad&\varphi \end{aligned}$$
(24a)
$$\begin{aligned} \mathrm {s.t.} \quad&{\frac{1}{N}\sum _{n=1}^N \left( \sum _{k=1}^K \log _2\left( 1 + \frac{P_\text{U}[n]h_{k,\text{U}}[n]}{\sum _{{\widetilde{k}}=k+1}^K P_{{\widetilde{k}}}[n]h_{{\widetilde{k}},\text{U}}[n] + N_0}\right) \right) } \nonumber \\&{- \max \left( R_\text{E}[n] \right) \ge \varphi , \forall k, n} \end{aligned}$$
(24b)
$$\begin{aligned}&\left\| {\textbf{q}}_\text{U}[n + 1] - {\textbf{q}}_\text{U}[n] \right\| ^2 \le \left( \frac{V_{\max }T}{N} \right) ^2, \quad n = 1,2,...,N - 1 \end{aligned}$$
(24c)
$$\begin{aligned}&\left\| {\textbf{q}}_\text{U}[n] - {\textbf{q}}_\text{J} \right\| ^2 \ge d_{\min }^2, \quad \forall n \end{aligned}$$
(24d)
$$\begin{aligned}&{\textbf{q}}_\text{U}[1] = {\textbf{q}}_\text{U}[N] \end{aligned}$$
(24e)

Lemma 2

The non-convex constraint (24b) present in optimization problem (24) can be effectively converted into a convex constraint

$$\begin{aligned}{} & {} \frac{1}{N}\sum \limits _{n = 1}^N {\left(\sum \nolimits _{k = 1}^K {R_\text{U}^l\left[ n \right] } - \lambda \right)} \ge \varphi ,\forall k,n \end{aligned}$$
(25)
$$\begin{aligned}{} & {} {\log _2}(1 + \frac{{{P_\text{U}}\left[ n \right] {\beta _0}}}{{\left( {{N_0} + {P_\text{J} }h{}_{\text{E},\text{J}}\left[ n \right] } \right) \left( {H_\text{U}^2 + {{\left\| {{{\textbf{q}}_\text{U}}\left[ n \right] - {{{\textbf { W}}}_\text{E}}\left[ n \right] } \right\| }^2}} \right) }}) \le \lambda \end{aligned}$$
(26)
$$\begin{aligned}{} & {} R_\text{U}^l\left[ n \right] = C_\text{U}^l\left[ n \right] + D_\text{U}^l\left[ n \right] (\left( {||{{\textbf{q}}_\text{U}}\left[ n \right] - {{\textbf{W}}_k}|{|^2} - ||{\textbf{q}}_\text{U}^l\left[ n \right] - {{\textbf{W}}_k}|{|^2}} \right) ) \end{aligned}$$
(27)
$$\begin{aligned}{} & {} C_\text{U}^l\left[ n \right] = {\log _2}\left( {1 + \frac{{{b_{k,\text{U}}}\left[ n \right] }}{{H_\text{U}^2 + ||{\textbf{q}}_\text{U}^l\left[ n \right] - {{\textbf{W}}_k}|{|^2}}}} \right) \end{aligned}$$
(28)
$$\begin{aligned}{} & {} D_\text{U}^l\left[ n \right] = \frac{{ - {{\log }_2}({\text{e}}){b_{k,\text{U}}}\left[ n \right] }}{{{{\left( {H_\text{U}^2 + {{\left\| {q_\text{U}^l\left[ n \right] - {{\textbf{W}}_k}} \right\| }^2}} \right) }^2} + {b_{k,\text{U}}}\left[ n \right] \left( {H_\text{U}^2 + {{\left\| {{\textbf{q}}_\text{U}^l\left[ n \right] - {{\textbf{W}}_k}} \right\| }^2}} \right) }} \end{aligned}$$
(29)
$$\begin{aligned}{} & {} {b_{k,\text{U}}}\left[ n \right] = \frac{{{P_\text{U}}\left[ n \right] {\beta _0}}}{{\sum \nolimits _{{\widetilde{k}} = k + 1}^K {{P_{{\widetilde{k}}}}\left[ n \right] {h_{\widetilde{k},\text{U}}}\left[ n \right] + {N_0}} }} \end{aligned}$$
(30)

Proof

Initially, introduce a slack variable, thereby facilitating the acquisition of an alternative formulation for the equation

$$\begin{aligned} {R_ \text{E}}\left[ n \right] = {\log _2}(1 + \frac{{{P_\text{U}}\left[ n \right] {\beta _0}}}{{\left( {{N_0} + {P_\text{J}}h{}_{\text{E},\text{J}}\left[ n \right] } \right) \left( {H_\text{U}^2 + {{\left\| {{q_\text{U}}\left[ n \right] - {{{\textbf { W}}}_ \text{E}}\left[ n \right] } \right\| }^2}} \right) }}) \le \lambda \end{aligned}$$
(31)

Note that constraint (31) exhibits convexity, whereas constraint (24b) persists as non-convex. Let us proceed with defining

$$\begin{aligned} {b_{k, \text{U}}}\left[ n \right] = \frac{{{P_ \text{U}}\left[ n \right] {\beta _0}}}{{\sum \nolimits _{{\widetilde{k}} = k + 1}^K {{P_{{\widetilde{k}}}}\left[ n \right] {h_{{\widetilde{k}}, \text{U}}}\left[ n \right] + {N_0}} }} \end{aligned}$$
(32)

Furthermore, (24b) can be further simplified as follows:

$$\begin{aligned} \frac{1}{N}\sum \limits _{n = 1}^N {(\sum \nolimits _{k = 1}^K {{{\log }_2}\left( {1 + \frac{{{b_{k, \text{U}}}\left[ n \right] }}{{H_ \text{U}^2 + {{\left\| {{{\textbf{q}}_ \text{U}}\left[ n \right] - {{\textbf{W}} _k}} \right\| }^2}}}} \right) } - \lambda )} \ge \varphi ,\forall k,n \end{aligned}$$
(33)

Evidently, by employing a first-order Taylor series expansion, a lower bound can be derived for the convexity of \({\log _2}\left( {1 + \frac{{{b_{k, \text{U}}}\left[ n \right] }}{{H_ \text{U}^2 + {{\left\| {{{\textbf{q}}_ \text{U}}\left[ n \right] - {{\textbf{W}} _k}} \right\| }^2}}}} \right)\) in terms of

\({\left\| {{{\textbf{q}}_ \text{U}}\left[ n \right] - {{\textbf{W}} _k}} \right\| ^2}\).

Consequently, the expansion results in the following expression

$$\begin{aligned} \begin{array}{l} {\log _2}\left( {1 + \frac{{{b_{k, \text{U}}}\left[ n \right] }}{{H_ \text{U}^2 + {{\left\| {{q_ \text{U}}\left[ n \right] - {{\textbf{W}}_k}} \right\| }^2}}}} \right) \\ \ge C_\text{U}^l\left[ n \right] + D_\text{U}^l\left[ n \right] (\left( {||{{\textbf{q}}_\text{U}}\left[ n \right] - {{\textbf{W}}_k}|{|^2} - ||{\textbf{q}}_\text{U}^l\left[ n \right] - {{\textbf{W}}_k}|{|^2}} \right) ) = R_\text{U}^l\left[ n \right] \end{array} \end{aligned}$$
(34)

where \(C_\text{U}^l\left[ n \right]\) and \(D_\text{U}^l\left[ n \right]\) are given by (28) and (29), respectively.

The proof is complete. \(\square\)

Observe that the non-convex constraint (24b) undergoes a transformation into a convex constraint (25), it follows that for any given lth iteration of the mobile UAV trajectory \({\textbf{q}}_\text{U}^l\left[ n \right]\), the optimization problem (24) can be reasonably substituted with the optimization problem (35) during the subsequent (l+1)th iteration, i.e.,

$$\begin{aligned}&\mathop {\max }\limits _{\varphi ,Q} \varphi \end{aligned}$$
(35a)
$$\begin{aligned} \quad&{\mathrm {s.t.}\left( {25} \right) - \left( {30} \right) ,\left( {{\text{24c}}} \right) ,\left( {{\text{24d}}} \right) ,\left( {{\text{24e}}} \right) } \end{aligned}$$
(35b)

3.3 Proposed algorithm

In order to address the original optimization problem (15) with minimal complexity, a highly efficient alternating iterative algorithm is introduced aimed at obtaining an approximate optimal solution in this section. Drawing insights from the discussions in Sects. 3.1 and 3.2, Eq. (15) is decomposed into two non-convex subproblems: optimizing, respectively, the power allocation and trajectoriy of mobile UAV. Subsequently, by an iterative process that alternates between solving these two subproblems, an approximate optimal solution for Eq. (15) is derived. The proposed iterative algorithm is depicted in Algorithm 1.

figure a

The overall time complexity of the proposed algorithm is \({\mathcal {O}}(L\times N\times K)\), where L, N and K represent the number of iterations, the total number of time slots and the number of LUs, respectively. The specific values of these variables will influence the runtime of the program code.

4 Numerical results and discussions

In this section, we begin by configuring the simulation parameters, followed by presenting the simulation results to substantiate the efficacy of the proposed algorithm. A sophisticated communication network is considered comprising a single mobile UAV, a friendly jammer, K LUs and a mobile Eve. The LUs are distributed randomly within a \(1000\times 1000\,\mathrm {m^2}\). The mobile UAV operates at an altitude of \(H_\text{U}=100\,\text{m}\), with a flight period of T = 100 s. Meanwhile, the friendly jammer remains stationary at an elevation of \(H_\text{J}\) = 100 m, actively transmitting interference signals to impede the mobile Eve. To accommodate the time division multiple access scheme, the network is divided into N = 50 time slots, with each slot spanning \(\delta =2\) s. The maximum speed achievable by the UAV is \(V_\text{max}=40\,\mathrm {m/s}\). Considerations for noise power spectral density and channel power gain are given as \(N_0=-110\,\mathrm {dBm/Hz}\) and \(\beta _0=-20\,\text{dB}\), respectively. Within each time slot, the mobile UAV has a designated transmit power budget denoted as \({P_{{\text{max}}}} = 0.3\,{\text{W}}\) while the friendly jammer possesses a separate transmit power allocation identified as \({P_\text{J} } = 0.4\,{\text{W}}\).

To streamline the process, the initial movement trajectory is formulated as a circular path [20]. More precisely, the geometric center of all LUs abscissae \({L_d} = \sum \nolimits _{k = 1}^K {{{\textbf { W}}_k}/K} = {\left[ {{L_x},{L_y}} \right] ^\text{T} }\) is first computed and assigned as the central point of the initial trajectory. Subsequently, half the distance between and the farthest LU is regarded as \({r_d} = \max \left\| {{{\textbf { W}}_k} - {L_d}} \right\| /2,\forall k\), which is duly selected as the radius. Consequently, the mobile UAV’s position in time slot n can be determined as follows:

$$\begin{aligned} q_\text{U}^{(0)}\left[ n \right] = {\left[ {{L_x} + {r_d}\sin \frac{{2\pi (n - 1)}}{{N - 1}},{L_y} + {r_d}\cos \frac{{2\pi (n - 1)}}{{N - 1}}} \right] ^T} \end{aligned}$$
(36)

Figure 2 illustrates the trajectory optimization of the mobile UAV in response to variations in the central position of the moving Eve. Two representative locations of the Eve’s central point were selected to validate the efficacy of the proposed algorithm. As anticipated, the mobile UAV dynamically adjusts its trajectory to approach LUs with utmost proximity while maintaining a safe distance from the Eve. This strategic maneuver ensures the preservation of superior channel conditions, thereby augmenting the minimum average secure rate for LUs. Upon examining Fig. 2a and b, it becomes apparent that due to security constraints, the mobile UAV is unable to reach the LUs in closer proximity to the Eve. Instead, it prioritizes serving other LUs in order to achieve the optimization objective. In practice, the mobile UAV tends to allocate resources to LUs with more favorable channel conditions, thus optimizing the minimum average secure rate.

Fig. 2
figure 2

UAV trajectory at different center positions of mobile Eve

Figure 3 shows the speed profiles of distinct mobile eavesdroppers at different centroids. Notably, Fig. 3a illustrates that mobile UAV exhibit accelerated flight speeds during time slots 4–7, 13–16, 21–23 and 32–36. By juxtaposing Fig. 2a, it becomes apparent that UAV swiftly navigate toward subsequent lawful targets, aiming to accomplish confidential transmission tasks promptly within the mission cycle. Conversely, during time slots 2, 9, 18–19 and 25–26, the mobile UAV maintain reduced speed as they require a prolonged hover above designated LUs, facilitating the transmission of additional information. Figure 3b mirrors the speed variations observed in Fig. 3a.

Fig. 3
figure 3

UAV speed at different center positions of mobile Eve

Figure 4 illustrates the transmit power of UAV at different locations of mobile Eve’s centers. Figure 4a shows that the mobile UAV exhibits reduced transmit power during time slots 29–37. By examining Figs. 2a and 3a in conjunction, it becomes apparent that the mobile UAV’s proximity to the mobile Eve prompts a decrease in transmit power, ensuring secure information dissemination. During time slots 0–15, the transmit power of the mobile UAV gradually escalates as it moves farther away from the mobile Eve. With the relaxation of confidentiality constraints, UAV can amplify its transmit power to enhance the minimum average security rate for all LUs. The variation pattern of transmit power depicted in Fig. 4b closely resembles that observed in Fig. 4a.

Fig. 4
figure 4

UAV transmit power at different center positions of mobile Eve

Figure 5 illustrates the trajectories of UAV across varying maximum flight speed, with the center of the mobile Eve situated at point \({\left[ {{\text{610,330}}} \right] ^{\text{T}}}\). At lower speeds \({V_{{\text{max}}}} = 20\,{{\text{m/s}}}\), the mobility of UAV falls short of efficiently reaching all LUs, limiting their ability to provide optimal service. However, as the speed escalates, the drones exhibit enhanced efficacy in reaching the LUs while maintaining a safe distance from the mobile Eve. Consequently, its trajectory progressively stabilize over time.

Fig. 5
figure 5

Trajectories of UAV at different maximum flight speeds

Figure 6 depicts the average secure rate attained by each LU when considering both the initial scheme and the proposed optimization scheme, with the mobile Eve positioned at point \({\left[ {{\text{610,330}}} \right] ^{\text{T}}}\). The graphical representation reveals that the average secure rate for each LU is notably meager with respect to the initial scheme. Nonetheless, following the application of joint optimization techniques, a substantial enhancement in the average secure rate of every LU becomes evident. This notable enhancement can be attributed to the efficacy of optimizing the trajectory and power allocation of UAV. By meticulous optimization of the UAV’s trajectory and transmit power, it becomes possible to concurrently bolster communication quality while minimizing the Eve’s capacity to intercept sensitive information. Consequently, each LU gains access to a heightened average secure rate, resulting in the overall fortification of system security and performance.

Fig. 6
figure 6

Average secure rate of each LU

Figure 7 shows the dynamic evolution of the minimum average secure rate among all LUs as a function of iteration count. Evidently, with an increasing number of iterations, the minimum average secure rate for each LU demonstrates a corresponding improvement, denoting the algorithm’s effectiveness in enhancing system security performance. Remarkably, at the 10th iteration, the minimum average secure rate reaches its pinnacle and maintains stability throughout subsequent iterations. This achievement serves as further validation for the algorithm’s convergence and efficacy. These findings offer invaluable insights into the algorithm’s performance and stability, providing valuable guidance for system design and optimization endeavors.

Fig. 7
figure 7

Relationship between the minimum average secure rate and the number of iterations

5 Conclusions

In addressing the challenge of ensuring reliable information exchange in scenarios involving multiple LUs, a UAV-assisted secure communication system model based on NOMA is proposed in this paper. Distinguishing itself from existing models, our proposed framework leverages NOMA to facilitate data transmission from the mobile UAV to LUs while simultaneously employing cooperative interference from the UAV to transmit jamming signals, effectively safeguarding LU’s information security against potential eavesdroppers. To optimize the system, a joint optimization scheme that strategically plans the trajectory and power allocation of the mobile UAV is introduced, aiming to maximize the minimum average secure rate for all LUs.To tackle the inherent complexity, the original problem is intelligently decomposed into two non-convex subproblems, employing advanced techniques such as relaxed methods and SCA to optimize both the trajectory and transmit power of the mobile UAV. By an iterative solution process for these subproblems, we successfully attain a solution that meets predefined thresholds.

Simulation results substantiate the following conclusions. Firstly, compared with the baseline scheme, the proposed joint optimization scheme exhibits significant enhancements in the security of LU’s information transmission. Secondly, the proposed algorithm demonstrates remarkable adaptability in adjusting the trajectory of the mobile UAV based on the position of the mobile Eve, showcasing the excellent convergence property.

Availability of data and materials

Parts of the models, data and codes that support the study are available from the corresponding author upon reasonable request.

References

  1. A.M. El-Shorbagy, 5g technology and the future of architecture. Procedia Comput. Sci. 182, 121–131 (2021)

    Article  Google Scholar 

  2. X. Ma, Z. Na, B. Lin, L. Liu, Energy efficiency optimization of uav-assisted wireless powered systems for dependable data collections in internet of things. IEEE Trans. Reliab. 72(2), 472–482 (2023)

    Article  Google Scholar 

  3. S. Tang, L. Chen, K. He, J. Xia, L. Fan, A. Nallanathan, Computational intelligence and deep learning for next-generation edge-enabled industrial iot. IEEE Trans. Netw. Sci. Eng. 10, 1–13 (2022)

    Google Scholar 

  4. L. Chen, X. Lei, Relay-assisted federated edge learning: Performance analysis and system optimization. IEEE Trans. Commun. 71(6), 3387–3401 (2023)

    Article  Google Scholar 

  5. Y. Guo, R. Zhao, S. Lai, L. Fan, X. Lei, G.K. Karagiannidis, Distributed machine learning for multiuser mobile edge computing systems. IEEE J. Sel. Top. Signal Process. 16(3), 460–473 (2022)

    Article  Google Scholar 

  6. L. Chen, L. Fan, X. Lei, T.Q. Duong, A. Nallanathan, G.K. Karagiannidis, Relay-assisted federated edge learning: performance analysis and system optimization. IEEE Trans. Commun. 71(6), 3387–3401 (2023)

    Article  Google Scholar 

  7. S. Zheng, C. Shen, X. Chen, Design and analysis of uplink and downlink communications for federated learning. IEEE J. Sel. Areas Commun. 39(7), 2150–2167 (2021)

    Article  Google Scholar 

  8. X. Lin, V. Yajnanarayana, S.D. Muruganathan, S. Gao, H. Asplund, H.-L. Maattanen, M. Bergstrom, Y.-P. Sebastian Euler, E. Wang, The sky is not the limit: Lte for unmanned aerial vehicles. IEEE Commun. Mag. 56(4), 204–210 (2018)

    Article  Google Scholar 

  9. X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi, J. Chen, Anti-drone system with multiple surveillance technologies: Architecture, implementation, and challenges. IEEE Commun. Mag. 56(4), 68–74 (2018)

    Article  Google Scholar 

  10. W. Zhou, X. Lei, Priority-aware resource scheduling for uav-mounted mobile edge computing networks. IEEE Trans. Vehic. Tech. 72(99), 1–6 (2023)

    Google Scholar 

  11. Z. Na, J. Wang, C. Liu, M. Guan, Z. Gao, Join trajectory optimization and communication design for uav-enabled ofdm networks. Ad hoc Netw. 98, 102031.1-102031.10 (2020)

    Article  Google Scholar 

  12. Z. Fang, J. Wang, C. Jiang, Q. Zhang, Y. Ren, Aoi-inspired collaborative information collection for auv-assisted internet of underwater things. IEEE Internet Things J. 8(19), 14559–14571 (2021)

    Article  Google Scholar 

  13. H. Su, Yu. Bin, C. Qian, Y. Xiao, Q. Xiong, C. Sun, Y. Gao, Nonorthogonal interleave-grid multiple access scheme for industrial internet of things in 5g network. IEEE Trans. Industr. Inf. 14(12), 5436–5446 (2018)

    Article  Google Scholar 

  14. X. Liu, Z. Liu, B. Lai, B. Peng, T.S. Durrani, Fair energy-efficient resource optimization for multi-uav enabled internet of things. IEEE Trans. Veh. Technol. 72(3), 3962–3972 (2023)

    Article  Google Scholar 

  15. Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun. Mag. 54(5), 36–42 (2016)

    Article  Google Scholar 

  16. B. Li, Z. Na, R. Liu, B. Lin, Energy consumption minimization of rotary-wing uavs for data distribution. IEEE Commun. Lett. 27(7), 1819–1823 (2023)

    Article  Google Scholar 

  17. X. Liu, B. Lai, B. Lin, V.C.M. Leung, Joint communication and trajectory optimization for multi-uav enabled mobile internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(9), 15354–15366 (2022)

    Article  Google Scholar 

  18. C. Zhang, L. Zhang, L. Zhu, T. Zhang, Z. Xiao, X.-G. Xia, 3d deployment of multiple uav-mounted base stations for uav communications. IEEE Trans. Commun. 69(4), 2473–2488 (2021)

    Article  Google Scholar 

  19. Z. Na, Y. Liu, J. Shi, C. Liu, Z. Gao, Uav-supported clustered noma for 6g-enabled internet of things: trajectory planning and resource allocation. IEEE Internet Things J. 8(20), 15041–15048 (2021)

    Article  Google Scholar 

  20. J. Wang, Z. Na, X. Liu, Collaborative design of multi-uav trajectory and resource scheduling for 6g-enabled internet of things. IEEE Internet Things J. 8(20), 15096–15106 (2021)

    Article  Google Scholar 

  21. B. Yu, X. Guan, Y. Cai, Joint blocklength and power optimization for half duplex unmanned aerial vehicle relay system with short packet communications. In 2020 International Conference on Wireless Communications and Signal Processing (WCSP), pp. 981–986, 2020

  22. J. Ji, K. Zhu, D. Niyato, R. Wang, Joint cache and trajectory optimization for secure uav-relaying with underlaid d2d communications. In ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp. 1–6, 2020

  23. J. Lyu, Y. Zeng, R. Zhang, Cyclical multiple access in uav-aided communications: a throughput-delay tradeoff. IEEE Wirel. Commun. Lett. 5(6), 600–603 (2016)

    Article  Google Scholar 

  24. Z. Na, B. Li, X. Liu, J. Wang, M. Zhang, Y. Liu, B. Mao, Uav-based wide-area internet of things: an integrated deployment architecture. IEEE Netw. 35(5), 122–128 (2021)

    Article  Google Scholar 

  25. A. Maatouk, E. Çalışkan, M. Koca, M. Assaad, G. Gui, H. Sari, Frequency-domain noma with two sets of orthogonal signal waveforms. IEEE Commun. Lett. 22(5), 906–909 (2018)

    Article  Google Scholar 

  26. Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, L. Hanzo, Nonorthogonal multiple access for 5g and beyond. Proc. IEEE 105(12), 2347–2381 (2017)

    Article  Google Scholar 

  27. G. Gui, H. Sari, E. Biglieri, A new definition of fairness for non-orthogonal multiple access. IEEE Commun. Lett. 23(7), 1267–1271 (2019)

    Article  Google Scholar 

  28. X. Liu, H. Ding, H. Su, Uplink resource allocation for noma-based hybrid spectrum access in 6g-enabled cognitive internet of things. IEEE Internet Things J. 8(20), 15049–15058 (2021)

    Article  Google Scholar 

  29. X. Liu, J. Wang, N. Zhao, Y. Chen, S. Zhang, Z. Ding, F. Richard Yu, Placement and power allocation for noma-uav networks. IEEE Wirel. Commun. Lett. 8(3), 965–968 (2019)

    Article  Google Scholar 

  30. N. Zhao, X. Pang, Z. Li, Y. Chen, F. Li, Z. Ding, M.-S. Alouini, Joint trajectory and precoding optimization for uav-assisted noma networks. IEEE Trans. Commun. 67(5), 3723–3735 (2019)

    Article  Google Scholar 

  31. W. Qingqing, X. Jie, R. Zhang, Capacity characterization of uav-enabled two-user broadcast channel. IEEE J. Sel. Areas Commun. 36(9), 1955–1971 (2018)

    Article  Google Scholar 

  32. A.A. Nasir, H.D. Tuan, T.Q. Duong, H. Vincent Poor, Uav-enabled communication using noma. IEEE Trans. Commun. 67(7), 5126–5138 (2019)

    Article  Google Scholar 

  33. Y. Zou, J. Zhu, X. Wang, L. Hanzo, A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)

    Article  Google Scholar 

  34. J. Xia, L. Fan, X. Wei, X. Lei, X. Chen, G.K. Karagiannidis, A. Nallanathan, Secure cache-aided multi-relay networks in the presence of multiple eavesdroppers. IEEE Trans. Commun. 67(11), 7672–7685 (2019)

    Article  Google Scholar 

  35. N.L. Khoa, Performance analysis of secure communications over dual correlated rician fading channels. IEEE Trans. Commun. 66(12), 6659–6673 (2018)

    Article  Google Scholar 

  36. Y. Liu, H.-H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347–376 (2017)

    Article  Google Scholar 

  37. Z. Na, C. Ji, B. Lin, N. Zhang, Joint optimization of trajectory and resource allocation in secure uav relaying communications for internet of things. IEEE Internet Things J. 9(17), 16284–16296 (2022)

    Article  Google Scholar 

  38. N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. Di Renzo, Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)

    Article  Google Scholar 

  39. F. Jameel, S. Wyne, G. Kaddoum, T.Q. Duong, A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 21(3), 2734–2771 (2019)

    Article  Google Scholar 

  40. G. Zhang, W. Qingqing, M. Cui, R. Zhang, Securing uav communications via joint trajectory and power control. IEEE Trans. Wireless Commun. 18(2), 1376–1389 (2019)

    Article  Google Scholar 

  41. Y. Gao, H. Tang, B. Li, X. Yuan, Joint trajectory and power design for uav-enabled secure communications with no-fly zone constraints. IEEE Access 7, 44459–44470 (2019)

    Article  Google Scholar 

  42. B. Duo, J. Luo, Y. Li, H. Hao, Z. Wang, Joint trajectory and power optimization for securing uav communications against active eavesdropping. China Commun. 18(1), 88–99 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

We appreciate the editors and reviewers who processed and reviewed our manuscript to provide the detailed professional comments on the technical contributions, logical structure and content presentation of this paper.

Funding

This work was supported by the National Natural Science Foundation of China under grant No. 61931019.

Author information

Authors and Affiliations

Authors

Contributions

RH was involved in conceptualization, data curation, validation and writing—original draft preparation. YW was responsible for methodology, software, visualization and writing—original draft preparation. YZ contributed to funding acquisition, resources, supervision and writing—reviewing and editing.

Corresponding author

Correspondence to Yang Zhang.

Ethics declarations

Ethics approval and consent to participate

Not applicable.

Consent for publication

All authors approved the final manuscript and the submission to this journal.

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, R., Wang, Y. & Zhang, Y. UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization. EURASIP J. Adv. Signal Process. 2023, 97 (2023). https://doi.org/10.1186/s13634-023-01056-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-023-01056-5

Keywords