 Research
 Open access
 Published:
UAVassisted NOMA secure communications: joint transmit power and trajectory optimization
EURASIP Journal on Advances in Signal Processing volumeÂ 2023, ArticleÂ number:Â 97 (2023)
Abstract
With the inherent advantages of exceptional maneuverability, flexible deployment options and costeffectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in hightraffic or remote areas. Nevertheless, the openness of the airâ€“ground channel poses significant security challenges to UAVbased wireless systems. In this paper, a UAVassisted secure communication system model is established based on nonorthogonal multiple access (NOMA) from the perspective of physical layer security, aiming to conceal the transmission behavior between UAVs and legitimate users (LUs). Specifically, a mobile UAV assumes the role of an aerial base station, leveraging NOMA technique to transmit data to LUs while evading detection from mobile eavesdropper situated on the ground. To fortify the security performance of the system, a hovering UAV acts as a friendly jammer and transmits interference signals to mobile eavesdropper (referred to as Eve). The objective of this scheme is to maximize the minimum average secure rate of all LUs by meticulously optimizing the trajectory and power allocation of the mobile UAV, subject to secrecy performance constraints. The highly interdependent and nonconvex nature of this optimization problem renders direct solutions infeasible. Hence, this paper designs an efficient iterative algorithm that decouples the original problem into two subproblems, enabling an alternating optimization process for the trajectory and power allocation of the mobile UAV until the convergence of the objective function is achieved. Simulation results demonstrate that the proposed algorithm effectively improves the minimum average secure rate of all LUs compared with the benchmark scheme.
1 Introduction
With the exponential growth of Internet of Things (IoT) applications, it is estimated that the global number of IoT devices will reach a staggering 30 billion by 2030 [1,2,3,4]. However, in regions where ground communication infrastructure is absent or in emergency scenarios, IoT devices may face challenges in accessing reliable communication services [5,6,7]. Conversely, in geographically isolated areas, the deployment of unmanned aerial vehicles (UAVs) presents a compelling solution due to their exceptional maneuverability, adaptable deployment capabilities and costeffectiveness [8,9,10]. By capitalizing on these advantages, UAVs can swiftly establish emergency communication systems in areas deprived of ground infrastructure, ensuring steadfast channel connectivity with IoT devices [11,12,13,14]. This, in turn, guarantees uninterrupted and dependable transmission of information and seamless data collection for IoT devices, thereby significantly bolstering emergency communication capabilities in regions affected by disasters.
As a highly promising technology, UAVassisted communication showcases three typical application scenarios [15,16,17]. Firstly, UAVs can be deployed as airborne base stations, enabling pervasive wireless coverage within their designated service areas [18,19,20]. Zhang et al. [18] introduced a communication system model that leverages multiple UAV base stations, aiming to minimize the required number of UAVs while optimizing their threedimensional positions, user clustering and frequency band allocation to enhance coverage. Secondly, UAVs can function as aerial relays, establishing reliable wireless connections for remote users when direct communication is unfeasible [21, 22]. Ji et al. [22] delved into the security challenges of cacheenabled UAV relay networks featuring devicetodevice (D2D) communication, considering the presence of eavesdroppers (Eves). They formulated an optimization problem that jointly optimized cache layout and UAV flight trajectory within a limited flying cycle, with the objective of maximizing the minimum secrecy rate among receivers. Lastly, UAVs can serve as airborne access points, facilitating mobile data collection and information dissemination to cater to diverse user demands [23]. Zeng et al. [23] proposed an innovative UAVassisted wireless communication scheme utilizing cyclic multiaccess and optimized transmission time allocation based on UAV positions to achieve maximum minimum throughput. By capitalizing on these remarkable advantages, UAVs have become an indispensable and complementary component of existing communication systems.
Nevertheless, wireless systems, including UAV communication, have long grappled with the limited availability of spectrum resources [24]. In light of this challenge, researchers have been actively exploring efficient strategies to transmit information within the constraints of restricted frequency bands. In contrast to orthogonal multiple access (OMA), nonorthogonal multiple access (NOMA) [25,26,27,28] enables multiple users to share the same spectrum by superimposing their signals in the power domain. To mitigate interference caused by overlapping signals, successive interference cancelation (SIC) techniques are employed at the receiver level. NOMA exhibits superior spectrum efficiency, reduced latency and enhanced connectivity when compared with OMA. In a particular study [29], a UAV was employed to serve multiple ground users using NOMA. The research focused on optimizing the layout and power allocation of the UAV to maximize overall throughput. Zhao et al. [30] proposed a NOMAUAV system, where the UAV cooperates with a base station to provide services to ground users. By jointly optimizing the trajectory of the UAV and NOMA precoding techniques, the research aimed to maximize the transmission rate for ground users facilitated by the UAV. Furthermore, Wu et al. [31] introduced a UAVbased twouser broadcast channel, wherein the UAV independently transmitted information to two ground users. By considering constraints on the UAVâ€™s maximum speed and transmit power, a joint optimization approach was employed to determine the UAVâ€™s flight trajectory and power allocation. The objective was to effectively characterize the throughput of the broadcast channel within a given duration of UAV flight. Additionally, Nasir et al. [32] investigated the problem of maximizing the minimum transmission rate under various constraints, including total transmit power, total bandwidth, UAV altitude and antenna beamwidth. To address this optimization challenge, they employed a trajectory optimization algorithm to obtain an efficient UAVNOMA system with notable enhancements in transmission rates.
However, wireless systems, including UAV communication, are confronted with the pervasive risk of eavesdropping and malicious attacks, posing intricate challenges in delivering secure and dependable communication services for groundbased IoT devices [33,34,35]. In contrast to conventional encryption methods, recent research has extensively explored the realm of physical layer security (PLS), which capitalizes on the intrinsic characteristics of the wireless channel and employs (artificial) noise to accomplish secure information transmission [36, 37]. Yang et al. [38] and Jameel et al. [39] conducted investigations into the utilization of artificial noise (AN) emitted from ground terminals to deliberately degrade the eavesdropperâ€™s channel and curtail the capacity of the eavesdropping channel. This approach effectively enhances the systemâ€™s secrecy capacity. Zhang et al. [40] underscored the advantages conferred by UAVs, such as their flexible deployment and mobility, in augmenting the security performance of the system. By orchestrating the optimization of UAV deployment or flight trajectories alongside wireless communication resources, the channel capacity of UAVtoground communication can be amplified, thereby fortifying the secrecy capacity. Moreover, Gao et al. [41] delved into a UAVtoground communication system, where a UAV is tasked with transmitting confidential information to authorized users while contending with the presence of eavesdroppers and adhering to nofly zones. Through the joint optimization of the UAVâ€™s trajectory and transmission power, the research aimed to maximize the minimum secure rate experienced by users within the system. Additionally, Luo et al. [42] examined both the uplink and downlink scenarios in a UAV communication system, where confidential information is exchanged between a legitimate ground user and the UAV, while an active Eve seeks to intercept the information and introduces interference signals. To tackle this challenge, they proposed a resource allocation algorithm that maximizes the average secure rate within this configuration.
By the analysis of the aforementioned literature, two drawbacks can be identified in previous works on UAV physical layer secure communication. Firstly, existing research has not taken into account the impact of eavesdropper location uncertainty on secure communication. Secondly, most works have only considered a single ground LU, neglecting the interactive influence among multiple LUs. Therefore, a UAVassisted secure communication system is proposed based on NOMA to achieve secure data transmission for legitimate users in this paper. NOMA and PLS are employed to enhance the spectrum efficiency of the system and ensure wireless transmission security, respectively. The contributions of this paper are summarized as follows:

A UAVassisted secure communication system model based on NOMA is established. Addressing the scenario with multiple legitimate users, a UAV is strategically deployed as an aerial base station, leveraging NOMA technique to dynamically provide communication services through carefully planned periodic flight trajectories. Moreover, to safeguard the integrity of the system, a lowaltitude UAV is ingeniously employed as a friendly jammer, effectively disrupting potential eavesdroppers. Eve is presumed to be mobile on the ground, following specific trajectories or directions.

A coordinated design scheme for the trajectory and transmit power of a mobile UAV is proposed. In the IoT environment where mobile Eve exist, optimizing the transmit power of mobile UAV based on realtime tracking of the Eveâ€™s trajectory can improve the flexibility of resource allocation. Concurrently, by optimizing the UAV trajectory, network security is enhanced to a considerable extent. The objective of this scheme is to maximize the minimum average secure rate among all LUs by the joint optimization of the mobile UAVâ€™s trajectory and transmit power, while adhering to the constraints imposed by secrecy performance.

A highly efficient optimization algorithm to enhance the performance of the UAVassisted secure communication system is designed. To achieve this, an alternating iterative algorithm that optimizes both the trajectory and transmission power of the mobile UAV is proposed. Firstly, by fixing the UAV trajectory, relaxation variables is introduced to optimize power allocation. Then, with the power allocation fixed, we proceed to optimize the UAV trajectory and employ the CVX tool for trajectory calculation. Finally, by iteratively performing the aforementioned two steps, we achieve convergence of the optimization objective, thereby maximizing the minimum average secure rate of all LUs.
The content and organization of this paper are outlined as follows. In Sect. 2, the system model of the UAVassisted secure communication system based on NOMA is introduced, along with the formulation of the corresponding optimization problem. Section 3 provides a comprehensive mathematical formulation of the optimization problem and presents a highly efficient iterative algorithm specifically designed for its solution. The simulation results are presented in Sect. 4, followed by the concluding remarks in Sect. 5.
2 System model and problem formulation
Considering the UAVassisted secure communication network model based on NOMA depicted in Fig.Â 1, the network comprises two layers: a lowaltitude layer consisting of a mobile UAV and a hovering friendly jammer, and a ground layer comprising K legitimate users and a mobile Eve. The set of LUs is denoted as \({\mathcal {K}}=\left\{ 1,2,\cdots ,K\right\}\). In this model, the mobile UAV and hovering friendly jammer (Jammer) are assumed to be at heights \(H_\text{U}\) and \(H_\text{J}\), respectively. The legitimate users are randomly distributed on the ground, while the mobile eavesdropper moves on the ground in a specified direction. The positions of LUs \(k\in {\mathcal {K}}\) and the hovering friendly jammer in the threedimensional Cartesian coordinate system are represented by coordinate vectors \({{\textbf{w}}_k=\left( x_k,y_k\right) }^\text{T}\) and \({{\textbf{q}}_\text{J}=\left( x_\text{J},y_\text{J}\right) }^\text{T}\), respectively.
For the sake of analysis, the mission cycle T is discretized into N equal time slots, where each slot has a duration of \(\delta = T/N\). The horizontal position coordinates of the mobile Eve and the mobile UAV can be represented as \({{\textbf{W}}_\text{E}} = {\left( {{x_\text{E}}\left[ n \right] ,{y_\text{E}}\left[ n \right] } \right) ^\text{T}},n \in {{\mathcal {N}}} = \left\{ {1,2, \cdot \cdot \cdot ,N} \right\}\) and \({{\textbf{q}}_\text{U}} = {\left( {{x_\text{U}}\left[ n \right] ,{y_\text{U}}\left[ n \right] } \right) ^\text{T}},n \in {{\mathcal {N}}} = \left\{ {1,2, \cdot \cdot \cdot ,N} \right\}\), respectively. When the mobile UAV operates in a periodic manner, its endpoint position \({\textbf{q}}_\text{U}\left[ N\right]\) coincides with its starting point position \({\textbf{q}}_\text{U}\left[ 1\right]\). It is assumed that the UAV maintains a constant speed throughout each time slot, and the maximum speed of the UAV is denoted as \(V_\text{max}\). Hence, the mobility constraint of the UAV can be formulated as follows:
where \(d_\text{min}\) denotes the minimum permissible distance ensuring safety between the mobile UAV and the hovering friendly jammer.
Throughout the mission cycle, the transmit power of the friendly jammer remains constant at \(P_\text{J}\), while in the nth time slot, the mobile UAVâ€™s transmit power is represented as \(P_\text{U} \left[ n\right]\). Both entities adhere to the following constraints
where \(P_\text{max}\) denotes the maximum transmit power of the mobile UAV in the nth time slot.
In the proposed network, the mobile UAV functions as a highaltitude base station, delivering services to LUs. The impact of terrain, obstacles and shadowing can be disregarded. Consequently, the communication channels between the mobile UAV and friendly jammer in the lowaltitude layer, involving LUs and the mobile Eve on the ground, can be predominantly characterized as lineofsight (LoS) links. Thus, during the nth time slot, the channel gain between the mobile UAV and a LUs conforms to the freespace path loss model and can be expressed as
where \(\beta _0\) represents the channel power gain at a reference distance of \(d_0=1\,{\mathrm{m}}\). \(d_{k,\text{U}}[n]\) stands for the distance between the kth LU and the mobile UAV during the nth time slot, and it can be expressed as
Similarly, the channel gain \({h_{\text{U},\text{E}}}[n]\) between the mobile UAV and Eve during the nth time slot can be expressed as follows:
where \(d_{\text{U},\text{E}}\left[ n\right]\) denotes the distance between the mobile UAV and Eve during the nth time slot, and it can be formulated as
During the nth time slot, the channel gain \({h_{\text{J},\text{E}}}[n]\) between the friendly jammer and the mobile Eve can be expressed as follows:
where \(d_{\text{J},\text{E}}\left[ n\right]\) denotes the spatial separation between the friendly jammer and the mobile Eve during the nth time slot and can be mathematically expressed as
Based on the system model, the achievable rate from the mobile UAV to LUs in the nth time slot can be defined as follows:
where \(\sum _{\widetilde{k}=k+1}^{K}{P_{\widetilde{k}}\left[ n\right] h_{\widetilde{k},\text{U}}\left[ n\right] }\) denotes the interference caused by the (k+1)th to the Kth legitimate users when the mobile UAV communicates with the kth legitimate user. The term \({N_0}\) represents the power spectral density of the additive white Gaussian noise (AWGN).
In the nth time slot, the intercepted achievable rate by the mobile Eve from the mobile UAV can be expressed as
Hence, the average secure rate of LUs k across all time slots can be formulated as
where \(\max ({R_\text{E}}\left[ n \right] )\) represents the maximum achievable rate at which the mobile eavesdropper can intercept the moving UAV across all time slots.
Define the variables \({{\mathcal {P}}} = \left\{ {{P_\text{U}}\left[ n \right] ,\forall n} \right\}\) and \(Q = \left\{ {{{\textbf{q}}_\text{U}}\left[ n \right] ,\forall n} \right\}\) as follows. The objective of this paper is to maximize the minimum average secure rate of all LUs by simultaneously optimizing the trajectory \({\mathcal {Q}}\) and power allocation \({\mathcal {P}}\) of the mobile UAV, subject to the constraint of secrecy performance. In addition, a relaxation variable \(\varphi = \min {R_\text{sk}}\) is introduced. Consequently, the optimization problem can be formulated as follows:
Clearly, due to the intricate interdependence among the variables, solving Eq. (15) directly poses a significant challenge. This is mainly attributed to the fact that (15b) constitutes a complex nonconvex fractional expression entailing the coupling of optimization variables. As a result, problem (15) constitutes a nonconvex optimization problem that presents difficulties in direct solution.
3 Proposed solution
In this section, we address the challenging nonconvex optimization problem (15) by decomposing it into two subproblems, specifically focusing on the trajectory \({\mathcal {Q}}\) and power allocation \({\mathcal {P}}\) of the mobile UAV. To handle the nonconvexity, we utilize the relaxation variable method and employ the successive convex approximation (SCA) technique to transform the respective nonconvex subproblems into convex ones. By alternating iterations, we iteratively solve these convex subproblems and aim to achieve convergence of the optimization objective.
3.1 Transmit power optimization
Given the predetermined trajectory of the mobile UAV, denoted as \({\mathcal {Q}}\), the optimization problem concerning power allocation, denoted as \({\mathcal {P}}\), can be described as follows:
Due to the nonconvex nature of constraint (16b), the optimization problem (16) becomes a challenging nonconvex problem to solve directly. To obtain an effective approximation solution for this problem, successive convex approximation is employed. By leveraging Lemma 1, the nonconvex constraint (16b) is transformed into a convex constraint.
Lemma 1
The nonconvex constraint (16b) in Eq. (16) can be reformulated as a convex constraint utilizing the following transformation
where
Proof
Firstly, by introducing a relaxation variable \(\gamma = \max ({\log _2}(1 + \frac{{{P_\text{U} }\left[ n \right] {h_{\text{U},\text{E}}}\left[ n \right] }}{{{N_0} + {P_\text{J} }h{}_{\text{E},\text{J}}\left[ n \right] }}))\), the transformed formulation of the equation can be obtained as follows:
It is evident that Eq. (21) with respect to \(P_ \text{U} \left[ n\right]\) is nonconvex. To address this, a Taylor series expansion can be employed to derive an upper bound for \(R_ \text{E} \left[ n\right]\) In each iteration, an approximate value \(R_ \text{E} ^l\left[ n\right]\) is substituted for \(R_ \text{E} \left[ n\right]\), thereby transforming the constraint (21) into a convex constraint. In the lth iteration, the firstorder Taylor series expansion of \(R_ \text{E} \left[ n\right]\) can be expressed as follows:
where \(A_\text{U}^l\left[ n\right]\) and \(B_\text{U}^l\left[ n\right]\) are defined according to Eqs. (19) and (20), respectively. With this, the proof is concluded. \(\square\)
Hence, (16) can be reconfigured as
3.2 UAV trajectory optimization
The optimization problem statement pertaining to the trajectory \({\mathcal {Q}}\) of the mobile UAV, leveraging the power allocation \(P_\text{U}\left[ n\right]\) derived via optimization, is described as follows:
Lemma 2
The nonconvex constraint (24b) present in optimization problem (24) can be effectively converted into a convex constraint
Proof
Initially, introduce a slack variable, thereby facilitating the acquisition of an alternative formulation for the equation
Note that constraint (31) exhibits convexity, whereas constraint (24b) persists as nonconvex. Let us proceed with defining
Furthermore, (24b) can be further simplified as follows:
Evidently, by employing a firstorder Taylor series expansion, a lower bound can be derived for the convexity of \({\log _2}\left( {1 + \frac{{{b_{k, \text{U}}}\left[ n \right] }}{{H_ \text{U}^2 + {{\left\ {{{\textbf{q}}_ \text{U}}\left[ n \right]  {{\textbf{W}} _k}} \right\ }^2}}}} \right)\) in terms of
\({\left\ {{{\textbf{q}}_ \text{U}}\left[ n \right]  {{\textbf{W}} _k}} \right\ ^2}\).
Consequently, the expansion results in the following expression
where \(C_\text{U}^l\left[ n \right]\) and \(D_\text{U}^l\left[ n \right]\) are given by (28) and (29), respectively.
The proof is complete. \(\square\)
Observe that the nonconvex constraint (24b) undergoes a transformation into a convex constraint (25), it follows that for any given lth iteration of the mobile UAV trajectory \({\textbf{q}}_\text{U}^l\left[ n \right]\), the optimization problem (24) can be reasonably substituted with the optimization problem (35) during the subsequent (l+1)th iteration, i.e.,
3.3 Proposed algorithm
In order to address the original optimization problem (15) with minimal complexity, a highly efficient alternating iterative algorithm is introduced aimed at obtaining an approximate optimal solution in this section. Drawing insights from the discussions in Sects. 3.1 and 3.2, Eq. (15) is decomposed into two nonconvex subproblems: optimizing, respectively, the power allocation and trajectoriy of mobile UAV. Subsequently, by an iterative process that alternates between solving these two subproblems, an approximate optimal solution for Eq. (15) is derived. The proposed iterative algorithm is depicted in Algorithm 1.
The overall time complexity of the proposed algorithm is \({\mathcal {O}}(L\times N\times K)\), where L, N and K represent the number of iterations, the total number of time slots and the number of LUs, respectively. The specific values of these variables will influence the runtime of the program code.
4 Numerical results and discussions
In this section, we begin by configuring the simulation parameters, followed by presenting the simulation results to substantiate the efficacy of the proposed algorithm. A sophisticated communication network is considered comprising a single mobile UAV, a friendly jammer, K LUs and a mobile Eve. The LUs are distributed randomly within a \(1000\times 1000\,\mathrm {m^2}\). The mobile UAV operates at an altitude of \(H_\text{U}=100\,\text{m}\), with a flight period of TÂ = 100Â s. Meanwhile, the friendly jammer remains stationary at an elevation of \(H_\text{J}\) = 100Â m, actively transmitting interference signals to impede the mobile Eve. To accommodate the time division multiple access scheme, the network is divided into NÂ = 50 time slots, with each slot spanning \(\delta =2\) s. The maximum speed achievable by the UAV is \(V_\text{max}=40\,\mathrm {m/s}\). Considerations for noise power spectral density and channel power gain are given as \(N_0=110\,\mathrm {dBm/Hz}\) and \(\beta _0=20\,\text{dB}\), respectively. Within each time slot, the mobile UAV has a designated transmit power budget denoted as \({P_{{\text{max}}}} = 0.3\,{\text{W}}\) while the friendly jammer possesses a separate transmit power allocation identified as \({P_\text{J} } = 0.4\,{\text{W}}\).
To streamline the process, the initial movement trajectory is formulated as a circular path [20]. More precisely, the geometric center of all LUs abscissae \({L_d} = \sum \nolimits _{k = 1}^K {{{\textbf { W}}_k}/K} = {\left[ {{L_x},{L_y}} \right] ^\text{T} }\) is first computed and assigned as the central point of the initial trajectory. Subsequently, half the distance between and the farthest LU is regarded as \({r_d} = \max \left\ {{{\textbf { W}}_k}  {L_d}} \right\ /2,\forall k\), which is duly selected as the radius. Consequently, the mobile UAVâ€™s position in time slot n can be determined as follows:
FigureÂ 2 illustrates the trajectory optimization of the mobile UAV in response to variations in the central position of the moving Eve. Two representative locations of the Eveâ€™s central point were selected to validate the efficacy of the proposed algorithm. As anticipated, the mobile UAV dynamically adjusts its trajectory to approach LUs with utmost proximity while maintaining a safe distance from the Eve. This strategic maneuver ensures the preservation of superior channel conditions, thereby augmenting the minimum average secure rate for LUs. Upon examining Fig.Â 2a and b, it becomes apparent that due to security constraints, the mobile UAV is unable to reach the LUs in closer proximity to the Eve. Instead, it prioritizes serving other LUs in order to achieve the optimization objective. In practice, the mobile UAV tends to allocate resources to LUs with more favorable channel conditions, thus optimizing the minimum average secure rate.
FigureÂ 3 shows the speed profiles of distinct mobile eavesdroppers at different centroids. Notably, Fig.Â 3a illustrates that mobile UAV exhibit accelerated flight speeds during time slots 4â€“7, 13â€“16, 21â€“23 and 32â€“36. By juxtaposing Fig.Â 2a, it becomes apparent that UAV swiftly navigate toward subsequent lawful targets, aiming to accomplish confidential transmission tasks promptly within the mission cycle. Conversely, during time slots 2, 9, 18â€“19 and 25â€“26, the mobile UAV maintain reduced speed as they require a prolonged hover above designated LUs, facilitating the transmission of additional information. FigureÂ 3b mirrors the speed variations observed in Fig.Â 3a.
FigureÂ 4 illustrates the transmit power of UAV at different locations of mobile Eveâ€™s centers. FigureÂ 4a shows that the mobile UAV exhibits reduced transmit power during time slots 29â€“37. By examining Figs.Â 2a and 3a in conjunction, it becomes apparent that the mobile UAVâ€™s proximity to the mobile Eve prompts a decrease in transmit power, ensuring secure information dissemination. During time slots 0â€“15, the transmit power of the mobile UAV gradually escalates as it moves farther away from the mobile Eve. With the relaxation of confidentiality constraints, UAV can amplify its transmit power to enhance the minimum average security rate for all LUs. The variation pattern of transmit power depicted in Fig.Â 4b closely resembles that observed in Fig.Â 4a.
FigureÂ 5 illustrates the trajectories of UAV across varying maximum flight speed, with the center of the mobile Eve situated at point \({\left[ {{\text{610,330}}} \right] ^{\text{T}}}\). At lower speeds \({V_{{\text{max}}}} = 20\,{{\text{m/s}}}\), the mobility of UAV falls short of efficiently reaching all LUs, limiting their ability to provide optimal service. However, as the speed escalates, the drones exhibit enhanced efficacy in reaching the LUs while maintaining a safe distance from the mobile Eve. Consequently, its trajectory progressively stabilize over time.
FigureÂ 6 depicts the average secure rate attained by each LU when considering both the initial scheme and the proposed optimization scheme, with the mobile Eve positioned at point \({\left[ {{\text{610,330}}} \right] ^{\text{T}}}\). The graphical representation reveals that the average secure rate for each LU is notably meager with respect to the initial scheme. Nonetheless, following the application of joint optimization techniques, a substantial enhancement in the average secure rate of every LU becomes evident. This notable enhancement can be attributed to the efficacy of optimizing the trajectory and power allocation of UAV. By meticulous optimization of the UAVâ€™s trajectory and transmit power, it becomes possible to concurrently bolster communication quality while minimizing the Eveâ€™s capacity to intercept sensitive information. Consequently, each LU gains access to a heightened average secure rate, resulting in the overall fortification of system security and performance.
FigureÂ 7 shows the dynamic evolution of the minimum average secure rate among all LUs as a function of iteration count. Evidently, with an increasing number of iterations, the minimum average secure rate for each LU demonstrates a corresponding improvement, denoting the algorithmâ€™s effectiveness in enhancing system security performance. Remarkably, at the 10th iteration, the minimum average secure rate reaches its pinnacle and maintains stability throughout subsequent iterations. This achievement serves as further validation for the algorithmâ€™s convergence and efficacy. These findings offer invaluable insights into the algorithmâ€™s performance and stability, providing valuable guidance for system design and optimization endeavors.
5 Conclusions
In addressing the challenge of ensuring reliable information exchange in scenarios involving multiple LUs, a UAVassisted secure communication system model based on NOMA is proposed in this paper. Distinguishing itself from existing models, our proposed framework leverages NOMA to facilitate data transmission from the mobile UAV to LUs while simultaneously employing cooperative interference from the UAV to transmit jamming signals, effectively safeguarding LUâ€™s information security against potential eavesdroppers. To optimize the system, a joint optimization scheme that strategically plans the trajectory and power allocation of the mobile UAV is introduced, aiming to maximize the minimum average secure rate for all LUs.To tackle the inherent complexity, the original problem is intelligently decomposed into two nonconvex subproblems, employing advanced techniques such as relaxed methods and SCA to optimize both the trajectory and transmit power of the mobile UAV. By an iterative solution process for these subproblems, we successfully attain a solution that meets predefined thresholds.
Simulation results substantiate the following conclusions. Firstly, compared with the baseline scheme, the proposed joint optimization scheme exhibits significant enhancements in the security of LUâ€™s information transmission. Secondly, the proposed algorithm demonstrates remarkable adaptability in adjusting the trajectory of the mobile UAV based on the position of the mobile Eve, showcasing the excellent convergence property.
Availability of data and materials
Parts of the models, data and codes that support the study are available from the corresponding author upon reasonable request.
References
A.M. ElShorbagy, 5g technology and the future of architecture. Procedia Comput. Sci. 182, 121â€“131 (2021)
X. Ma, Z. Na, B. Lin, L. Liu, Energy efficiency optimization of uavassisted wireless powered systems for dependable data collections in internet of things. IEEE Trans. Reliab. 72(2), 472â€“482 (2023)
S. Tang, L. Chen, K. He, J. Xia, L. Fan, A. Nallanathan, Computational intelligence and deep learning for nextgeneration edgeenabled industrial iot. IEEE Trans. Netw. Sci. Eng. 10, 1â€“13 (2022)
L. Chen, X. Lei, Relayassisted federated edge learning: Performance analysis and system optimization. IEEE Trans. Commun. 71(6), 3387â€“3401 (2023)
Y. Guo, R. Zhao, S. Lai, L. Fan, X. Lei, G.K. Karagiannidis, Distributed machine learning for multiuser mobile edge computing systems. IEEE J. Sel. Top. Signal Process. 16(3), 460â€“473 (2022)
L. Chen, L. Fan, X. Lei, T.Q. Duong, A. Nallanathan, G.K. Karagiannidis, Relayassisted federated edge learning: performance analysis and system optimization. IEEE Trans. Commun. 71(6), 3387â€“3401 (2023)
S. Zheng, C. Shen, X. Chen, Design and analysis of uplink and downlink communications for federated learning. IEEE J. Sel. Areas Commun. 39(7), 2150â€“2167 (2021)
X. Lin, V. Yajnanarayana, S.D. Muruganathan, S. Gao, H. Asplund, H.L. Maattanen, M. Bergstrom, Y.P. Sebastian Euler, E. Wang, The sky is not the limit: Lte for unmanned aerial vehicles. IEEE Commun. Mag. 56(4), 204â€“210 (2018)
X. Shi, C. Yang, W. Xie, C. Liang, Z. Shi, J. Chen, Antidrone system with multiple surveillance technologies: Architecture, implementation, and challenges. IEEE Commun. Mag. 56(4), 68â€“74 (2018)
W. Zhou, X. Lei, Priorityaware resource scheduling for uavmounted mobile edge computing networks. IEEE Trans. Vehic. Tech. 72(99), 1â€“6 (2023)
Z. Na, J. Wang, C. Liu, M. Guan, Z. Gao, Join trajectory optimization and communication design for uavenabled ofdm networks. Ad hoc Netw. 98, 102031.1102031.10 (2020)
Z. Fang, J. Wang, C. Jiang, Q. Zhang, Y. Ren, Aoiinspired collaborative information collection for auvassisted internet of underwater things. IEEE Internet Things J. 8(19), 14559â€“14571 (2021)
H. Su, Yu. Bin, C. Qian, Y. Xiao, Q. Xiong, C. Sun, Y. Gao, Nonorthogonal interleavegrid multiple access scheme for industrial internet of things in 5g network. IEEE Trans. Industr. Inf. 14(12), 5436â€“5446 (2018)
X. Liu, Z. Liu, B. Lai, B. Peng, T.S. Durrani, Fair energyefficient resource optimization for multiuav enabled internet of things. IEEE Trans. Veh. Technol. 72(3), 3962â€“3972 (2023)
Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun. Mag. 54(5), 36â€“42 (2016)
B. Li, Z. Na, R. Liu, B. Lin, Energy consumption minimization of rotarywing uavs for data distribution. IEEE Commun. Lett. 27(7), 1819â€“1823 (2023)
X. Liu, B. Lai, B. Lin, V.C.M. Leung, Joint communication and trajectory optimization for multiuav enabled mobile internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(9), 15354â€“15366 (2022)
C. Zhang, L. Zhang, L. Zhu, T. Zhang, Z. Xiao, X.G. Xia, 3d deployment of multiple uavmounted base stations for uav communications. IEEE Trans. Commun. 69(4), 2473â€“2488 (2021)
Z. Na, Y. Liu, J. Shi, C. Liu, Z. Gao, Uavsupported clustered noma for 6genabled internet of things: trajectory planning and resource allocation. IEEE Internet Things J. 8(20), 15041â€“15048 (2021)
J. Wang, Z. Na, X. Liu, Collaborative design of multiuav trajectory and resource scheduling for 6genabled internet of things. IEEE Internet Things J. 8(20), 15096â€“15106 (2021)
B. Yu, X. Guan, Y. Cai, Joint blocklength and power optimization for half duplex unmanned aerial vehicle relay system with short packet communications. In 2020 International Conference on Wireless Communications and Signal Processing (WCSP), pp. 981â€“986, 2020
J. Ji, K. Zhu, D. Niyato, R. Wang, Joint cache and trajectory optimization for secure uavrelaying with underlaid d2d communications. In ICC 2020  2020 IEEE International Conference on Communications (ICC), pp. 1â€“6, 2020
J. Lyu, Y. Zeng, R. Zhang, Cyclical multiple access in uavaided communications: a throughputdelay tradeoff. IEEE Wirel. Commun. Lett. 5(6), 600â€“603 (2016)
Z. Na, B. Li, X. Liu, J. Wang, M. Zhang, Y. Liu, B. Mao, Uavbased widearea internet of things: an integrated deployment architecture. IEEE Netw. 35(5), 122â€“128 (2021)
A. Maatouk, E. Ã‡alÄ±ÅŸkan, M. Koca, M. Assaad, G. Gui, H. Sari, Frequencydomain noma with two sets of orthogonal signal waveforms. IEEE Commun. Lett. 22(5), 906â€“909 (2018)
Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, L. Hanzo, Nonorthogonal multiple access for 5g and beyond. Proc. IEEE 105(12), 2347â€“2381 (2017)
G. Gui, H. Sari, E. Biglieri, A new definition of fairness for nonorthogonal multiple access. IEEE Commun. Lett. 23(7), 1267â€“1271 (2019)
X. Liu, H. Ding, H. Su, Uplink resource allocation for nomabased hybrid spectrum access in 6genabled cognitive internet of things. IEEE Internet Things J. 8(20), 15049â€“15058 (2021)
X. Liu, J. Wang, N. Zhao, Y. Chen, S. Zhang, Z. Ding, F. Richard Yu, Placement and power allocation for nomauav networks. IEEE Wirel. Commun. Lett. 8(3), 965â€“968 (2019)
N. Zhao, X. Pang, Z. Li, Y. Chen, F. Li, Z. Ding, M.S. Alouini, Joint trajectory and precoding optimization for uavassisted noma networks. IEEE Trans. Commun. 67(5), 3723â€“3735 (2019)
W. Qingqing, X. Jie, R. Zhang, Capacity characterization of uavenabled twouser broadcast channel. IEEE J. Sel. Areas Commun. 36(9), 1955â€“1971 (2018)
A.A. Nasir, H.D. Tuan, T.Q. Duong, H. Vincent Poor, Uavenabled communication using noma. IEEE Trans. Commun. 67(7), 5126â€“5138 (2019)
Y. Zou, J. Zhu, X. Wang, L. Hanzo, A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727â€“1765 (2016)
J. Xia, L. Fan, X. Wei, X. Lei, X. Chen, G.K. Karagiannidis, A. Nallanathan, Secure cacheaided multirelay networks in the presence of multiple eavesdroppers. IEEE Trans. Commun. 67(11), 7672â€“7685 (2019)
N.L. Khoa, Performance analysis of secure communications over dual correlated rician fading channels. IEEE Trans. Commun. 66(12), 6659â€“6673 (2018)
Y. Liu, H.H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347â€“376 (2017)
Z. Na, C. Ji, B. Lin, N. Zhang, Joint optimization of trajectory and resource allocation in secure uav relaying communications for internet of things. IEEE Internet Things J. 9(17), 16284â€“16296 (2022)
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. Di Renzo, Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20â€“27 (2015)
F. Jameel, S. Wyne, G. Kaddoum, T.Q. Duong, A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 21(3), 2734â€“2771 (2019)
G. Zhang, W. Qingqing, M. Cui, R. Zhang, Securing uav communications via joint trajectory and power control. IEEE Trans. Wireless Commun. 18(2), 1376â€“1389 (2019)
Y. Gao, H. Tang, B. Li, X. Yuan, Joint trajectory and power design for uavenabled secure communications with nofly zone constraints. IEEE Access 7, 44459â€“44470 (2019)
B. Duo, J. Luo, Y. Li, H. Hao, Z. Wang, Joint trajectory and power optimization for securing uav communications against active eavesdropping. China Commun. 18(1), 88â€“99 (2021)
Acknowledgements
We appreciate the editors and reviewers who processed and reviewed our manuscript to provide the detailed professional comments on the technical contributions, logical structure and content presentation of this paper.
Funding
This work was supported by the National Natural Science Foundation of China under grant No. 61931019.
Author information
Authors and Affiliations
Contributions
RH was involved in conceptualization, data curation, validation and writingâ€”original draft preparation. YW was responsible for methodology, software, visualization and writingâ€”original draft preparation. YZ contributed to funding acquisition, resources, supervision and writingâ€”reviewing and editing.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
All authors approved the final manuscript and the submission to this journal.
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Han, R., Wang, Y. & Zhang, Y. UAVassisted NOMA secure communications: joint transmit power and trajectory optimization. EURASIP J. Adv. Signal Process. 2023, 97 (2023). https://doi.org/10.1186/s13634023010565
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13634023010565