Abstract

UAV wireless communication has been regarded as a promising technology in the fifth-generation (5G) networks. In this paper, we consider the security of the mmWave NOMA UAV-assisted relay system, where a ground source transmits messages to two types of authorized users assisted by a UAV relay in the presence of multiple eavesdroppers. A practical probabilistic line-of-sight (LoS) channel model with Nakagami- small-scale fading and three-dimensional (3D) antenna gain is established to describe the mmWave air-to-ground channel. In addition, to improve the security of the system, cooperative jamming and protected zone strategies are introduced. The analytical expressions of connection outage probability (COP), secrecy outage probability (SOP), and effective secrecy throughput (EST) under the NOMA scheme and cooperative jamming NOMA scheme are derived. Also, the asymptotic SOP and EST are analyzed to gain further insights. The theoretic analysis and simulation results show the effectiveness of the proposed schemes. As the transmitting power of the source and UAV relay increases, the SOP depends only on the location distribution and density of eavesdroppers and the ESTs under different schemes converge to the same floor.

1. Introduction

To support long-range connectivity, massive access, and explosive traffic growth in 5G networks, unmanned aerial vehicles (UAVs) have rekindled strong interest of both industry and academia in wireless connectivity owing to enhanced channel quality and flexible dynamic deployment [13]. In emergencies such as natural disasters or military activities, UAVs can be deployed as temporary base stations, mobile relays, and cooperative jammers. For example, the urgent deployment of Wing Loong UAV provided stable access to residents affected by the storm that disrupted communications. There has been numerous research on UAV wireless communication systems recently [425]. In order to improve the reliability of UAV communications, the trajectory and transmitting power of UAV relay were jointly optimized to minimize the connection outage probability (COP) in [4]. By considering the propulsion energy limitations of UAVs, the authors of [5] investigated the maximization of energy efficiency and transmission rate, where the UAV was deployed to support uplink communications. To further solve the problem, energy harvesting technology was applied in the UAV-assisted relay communication networks to enhance the flight endurance in [6].

Nevertheless, owing to the strong line-of-sight (LoS) components over air-to-ground (A2G) links, it is extremely arduous to investigate the security of UAV communication systems. Physical layer security technology can exploit the randomness of wireless fading channels to secure wireless communications from the perspective of information theory, which is a good complement to conventional cryptography technology [2628]. The authors of [7] employed UAVs as an aerial base station and cooperative jammer to defend against eavesdropping exploiting the controllable mobility. By designing neural networks, [8] proposed a dynamic beamforming technique to maximize the average secrecy rate in the UAV wireless communication system. Considering the scenario of full-duplex active eavesdropping, [9] maximized the secrecy rate of the system by optimizing the trajectory and transmitting power. Unlike [713] focused on the performance analysis of secure UAV communications. Reference [10] studied the secrecy performance of a UAV-assisted relay system. Ji et al. and coauthor proposed a novel UAV cognitive network to achieve higher-spectrum efficiency [11]. Artificial noise (AN) was used to improve the secrecy performance of the UAV system in [12]. The authors of [13] investigated the secrecy performance of UAV systems from the perspective of three-dimensional (3D) space.

Due to its widely available spectrum resources, integrating millimeter wave (mmWave) technique into UAV networks has been a potential solution to address the spectrum crunch [1418]. The 3D mmWave antenna gain from UAV to ground nodes is first proposed in [16]. The authors of [17] investigated the secrecy performance of mmWave communications assisted by multiple UAV-enabled relays and jammers. Furthermore, the on–off transmission strategy was designed in [18] to evaluate the performance under the effect of beam alignment error.

Meanwhile, with the explosive growth of traffic demand, nonorthogonal multiple access (NOMA) has been viewed as a promising candidate for 5G networks [2931]. It is noteworthy investigating the transmission scheme of UAV-assisted NOMA systems to obtain important insights on performance improvement [1921, 32]. A UAV-assisted NOMA network was proposed in [22] to achieve secure simultaneous wireless information and power transfer (SWIPT) transmission, while the inherent mobility of UAV was not considered. As a further advance, the authors of [23] proposed an aerial cooperative jamming strategy to secure terrestrial NOMA communications and optimized the position of the UAV. Moreover, the authors of [24] achieved secure transmission by jointly designing user scheduling, trajectory, and power allocation from the perspective of secure users. Pang et al. [25] considered the energy-constrained UAV mmWave NOMA network and maximized the energy efficiency. Introducing NOMA into UAV mmWave communication system can further improve system performance and satisfy the different communication needs of users. Despite such research progress, none of them considered the security topic of UAV-assisted relay mmWave NOMA system, and corresponding secrecy transmission scheme designing and the impact of key system parameters are not reported yet, which motivates this work.

In this work, we consider the physical layer security of a mmWave NOMA UAV-assisted relay system, where a UAV is deployed as a relay to enhance the communication quality of the system while another UAV is deployed as a friendly jammer to send AN for enhancing the security of the system. This is in stark contrast to the existing work which is without taking into account the security [33], OMA transmission mode [17, 34], and simplified LoS channel [35]. The contributions of the work are summarized as follows: We model a mmWave NOMA UAV-assisted relay network in the presence of randomly distributed eavesdroppers. Due to the blockage or long distance, a UAV relay is employed to decode-and-forward (DF) signals from the terrestrial source to NOMA users. Based on different service requirements, the authorized users are classified into high-security required users and common users. The distribution of users and eavesdroppers is modeled as homogeneous Poisson point processes (HPPPs). We take into account a practical probabilistic line-of-sight (LoS) and nonline-of-sight (NLoS) A2G channel model based on the elevation. Moreover, the 3D antenna gain model is established to characterize the mmWave transmission:In order to study the reliability and security of the system and reveal the effects of key parameters on the system, we derive the closed-form expressions of connection outage probability (COP), secrecy outage probability (SOP), and effective secrecy throughput (EST) under the NOMA scheme. To further improve the secrecy performance of the system, the cooperative aerial jamming scheme is proposed to degrade the quality of wiretapping. Based on the proposed scheme, the COP, SOP, and EST are obtained by utilizing Gauss–Chebyshev quadrature. Furthermore, the asymptotic SOP and EST are derived to gain valuable insights.The numerical results show that (1) the proposed NOMA scheme with cooperative jamming outperforms benchmark schemes. (2) Increasing the number of antennas equipped at each node can improve the security of the system due to the increased main lobe gain. The improvement is more obvious when the jamming power is relatively large. (3) The asymptotic SOP is independent of the transmitting power of the source and UAV relay, while it is influenced by the size of protected zone and the density of eavesdroppers. (4) With the increase of jamming power, the EST of cooperative jamming scheme converges to a performance floor, which is independent of the size of the protected zone.

The remainder of the paper is organized as follows: In Section 2, we describe the system and channel models. The COP, SOP, and EST of UAV-assisted mmWave relay system are investigated in Section 3. With cooperative jamming, the expressions are derived in Section 4. In Section 5, numerical results are presented to validate the theoretical analysis. Finally, the conclusions are provided in Section 6.

2. System Model

We consider a secure mmWave NOMA UAV-assisted communication system as illustrated in Figure 1, where a source sends the confidential message to two NOMA users ( and ) via a UAV-based relay in the presence of randomly distributed eavesdroppers . Since NOMA users use the same frequency and spread spectrum coding at the same time, the interference between users will be relatively strong. In general, it is impractical for all users to jointly perform NOMA due to high complexity and high decoding latency [36]. A promising alternative is to split the user into multiple orthogonal pairs and perform NOMA in each pair [37]. In our work, a NOMA pair is taken as an example. (Since NOMA users use the same frequency and spread spectrum coding at the same time, the interference between users will be relatively strong. In general, it is impractical for all users to jointly perform NOMA due to high-complexity and high-decoding latency [36]. A promising alternative is to split the user into multiple orthogonal pairs and perform NOMA in each pair [37]. In our work, a NOMA pair is taken as an example) The communication can be divided into two time slots. In the first slot, sends a superimposed signal to , and in the second slot, decodes the signal and sends it to the users on the ground. Due to the obstruction on the ground, the source and the users cannot communicate directly. Without loss of generality, one of the users is high-security required user and the other user is a common user with only rate requirements. This makes sense in many practical applications for the Internet of Things (IoT) era [24], such as the transmission of private information or military secrets may require a higher-security priority, while information such as weather forecasts has low or no security requirements. Eavesdroppers denoted by follow HPPPs with density . A sector protected zone method is introduced to enhance security. Particularly, we model the finite range around as the sector protected zone with radius and central angle considering the sector-protected zone in a sector beam. is randomly located in a circle with center and radius . is randomly located at the external sector ring spanning the radius from to . We denote as the additive white Gaussian noise (AWGN) at the receiver , .

2.1. Directional Beamforming

In order to compensate for the loss of mmWave, each node is equipped with multiple pint-sized antennas. 3D antenna gain model is established, where and represent the main-lobe gain and side-lobe gain. and are denoted as the beamwidth in azimuth and depression/elevation directions, respectively. The 3D beamforming’s horizontal projection shows the range of azimuth angle is . The worst-case scenario is considered as [16] that the range of depression/elevation angle is for the node , and for the UAV. Thus, the directional antenna gain and the corresponding probability in the system can be written as follows:

In the training phase, we consider perfect beam alignment for A2G legitimate communication links. In addition, lack of training information makes it difficult for eavesdroppers to align to aerial nodes. Specifically, the antenna gain between legitimate nodes can be given by , , . Since the transmitting beam of is aligned with , the gain of the terrestrial eavesdropping link can be obtained as , where . The gain of link can be formulated as follows:

2.2. Channel Model
2.2.1. Line-of-Sight (LoS) Probability

For the A2G link between and , we model it as a channel with a given LoS probability, which is determined by the environment and elevation angle [38]. The LoS probability is given bywhere denotes the horizontal distance between and . is the minimum flying height of without colliding with obstacles on the ground. and are constants associated with the environment. Then the NLoS probability of the A2G channel can be formulated as .

2.2.2. Path Loss

Similar to [39], the path loss for the A2G channel with distance under LoS and NLoS links can be expressed as follows:where and denotes the path loss factor. and depend on environment. For the ground-to-ground (G2G) channel, the path loss is calculated as .

2.2.3. Small-Scale Fading

We assume all communication links experience independent Nakagami- fading [11, 34], where different parameters represent LoS and NLoS links, respectively. To be specific, the small-scale fading between and satisfies for the LoS links and for the NLoS links, . Denoting Gamma random variable , the probability density function (PDF) and cumulative distribution function (CDF) are, respectively, denoted as follows:where .

3. Performance Analysis Without Jamming

In this section, we consider the reliability and security performance of the mmWave NOMA UAV-assisted relay system in terms of COP, SOP, and EST.

In the first time slot, transmits superimposed signal to , where denotes the transmitting power. denotes the power allocation factor for the user , and . Following the principle of downlink NOMA, first decodes , then removes from the signal, and decodes without interference. Hence, the signal-to-interference-plus-noise ratio (SINR) and signal-to-noise ratio (SNR) for and at can be, respectively, expressed as follows:

The worst-case scenario is considered where the eavesdropper owns the multiuser detection capacity to detect signals of users with high-security requirements [40]. Besides, we consider noncolluding eavesdroppers, which mean the instantaneous SNR for eavesdropping on the information of is determined by the most detrimental eavesdropper. Therefore, the SNR for eavesdroppers to decode from can be calculated as follows:

In the second time slot, works in DF mode to decode and reforward the signal. After receiving the signal from , decodes by interpreting as interference. The SINR at can be written as follows: where denotes the transmitting power of . The user utilizes successive interference cancellation (SIC) to decode the message before decoding its own message. The SINR at to decode can be written as follows:

After subtracting the signal , decodes its own message and the SNR can be expressed as follows:

In the second time slot, the SNR for eavesdropping from at the most detrimental eavesdropper is given by

3.1. COP of and for NOMA Scheme

The connection outage probability (COP) is defined as the probability that the system will be interrupted when the instantaneous transmission rate of the system is less than a given target rate. As such, we present the COP of in the following theorem.

Theorem 1. For the reliable communication of , -, and - links must satisfy the target rate simultaneously. The COP of can be derived as (15), where , , , , and denotes the number of Gauss–Chebyshev nodes.

Proof. According to the definition of COP, we havewhere . According to (5), can be given bywhere and . By applying the polar coordinates and the probability generating functional (PGFL) of PPP, can be derived as follows:where . It is difficult to obtain the closed-form expression of (15), so the Gaussian–Chebyshev quadrature is applied to yield a close approximation with , , , and . By substituting (14) and (15) into (13), the closed-form expression can be obtained as (12).
In the following, we investigate the reliable transmission of for the NOMA scheme.

Theorem 2. Since decodes first and then decodes its own information , , , and must be satisfied simultaneously for the reliable communications. The closed-form expression of COP can be derived as (19).

Proof. The COP of can be given bywhere , and . Similar to (17), can be obtained as follows:Since is randomly located in a circle of radius , can be obtained as follows: By exploiting the Gaussian–Chebyshev quadrature and substituting , , can be rewritten as follows: According to (18) and (20), the COP of can be derived as (16).

Remark 1. It can be observed from Theorems 1 and 2 that the COPs of and decrease with the increase of source transmitting power and . Besides, reducing the zone radius of external sector ring and can decrease the COPs of and , which implies a smaller user area or one closer to the UAV relay can improve the reliability of the system.

Proposition 1. The asymptotic COPs of and can be respectively expressed as follows: and

Proof. As the transmitting power and approach infinity, by exploiting for small , we haveIn (23), the term corresponding to is larger than the summation of other terms owing to the presence of and when and go to infinity. Hence, can be approximated as the term corresponding to . After some mathematical manipulation, can be rewritten as (21). Similarly, the expression of can be obtained as (22). The proof is completed.

3.2. SOP of for NOMA Scheme

Since is a high-security required user, we analyze the secrecy performance of in terms of SOP. According to Wyner’s wiretap code theory, the SOP is defined as the probability which the wiretap channel capacity is larger than the redundancy rate of wiretap code [26]. For the proposed protected zone method, we consider the case that the eavesdroppers are located inside the circle of radius (, ) with angle . Particularly, by denoting as the horizontal distance between and , the distance can be expressed as with and .

Lemma 1. Denoting as the target secrecy rate of , we define the function and in polar coordinates to describe the probability and . By considering channel as the NLoS link, while channel is composed of NLoS link and LoS link, and and can be expressed as follows: andwhere , and .
Based on Lemma 1, the SOP of is given in the following theorem:

Theorem 3. In light of the HPPPs distribution for , the SOP of under protected zone method is given bywhere and are given in (27) and (28

Proof. Following the PGFL of PPP, we can obtainStep (a) is computed by a two-layer Gauss–Chebyshev integration related to and , where and . Step (b) is calculated through the similar procedure of deriving with , , and . Substituting (5) into (24) and (25), equation and are expressed as (27) and (28), respectively. The proof is completed.

Remark 2. From Theorem 3, we can observe that the SOP of is influenced by the transmitting power and , the target codeword rate , the confidential codeword rate , the power allocation factor , and the distribution of eavesdroppers . To be specific, the SOP decreases with the reduction of eavesdroppers’ density and the increase of . The SOP increases with the enlargement of and , which means the enhancement of reliability leads to more information at the risk of eavesdropping.
To proceed forward, we derive the asymptotic expression of the SOP to gain more insights. When the transmitting power and are sufficiently large, the asymptotic SOP under the NOMA scheme is shown in the following:

Proposition 2. The asymptotic SOP under the NOMA scheme can be calculated as follows:

Proof. For sufficiently large , can be calculated as follows: where . When , by utilizing the approximation of for small , we haveIn (32), the term corresponding to is larger than the summation of other terms owing to the presence of when goes to infinity. Hence, can be approximated as the term corresponding to , and it can be rewritten as follows: Similarly, we can derive . After some calculations, the proof of is completed.

Remark 3. It can be observed from Proposition 2 that the asymptotic SOP is influenced by the density of eavesdroppers and the size of the protected zone when and are considerably large.

3.3. EST of for NOMA Scheme

The reliability and security of the system are investigated above. However, it is necessary to use a unified framework to integrate security and reliability considerations. To holistically characterize the performance of the system, we derive the effective secrecy throughput (EST) of the system, which is defined as the secrecy rate multiplied by the reliable-and-secure probability of .

Theorem 4. The EST of for NOMA scheme can be written as follows: where and are shown in (16) and (26), respectively.

Proof. Due to the independence of the channels, and are independent of each other. As a result, we can deriveThe proof is completed.

Remark 4. From Theorem 4, we can observe that the reliability is improved while the security is degraded with the increase of and . It means there exists a trade-off between reliability and security. By selecting the optimal transmitting power, the system’s reliability-security performance index can be maximized.
Next, we analyze the system performance for the OMA transmission scheme to make a fair comparison. By considering one of the OMA transmissions, that is, the TDMA scheme, the communication progress is evenly divided into four time slots. In the first time slot, sends signal to . decodes and forwards to at the next time slots. Similarly, sends signal to by relay in the next two time slots.
The COPs of and for OMA scheme can be expressed as follows: where and . The SOP of for OMA scheme can be expressed as follows:where .

4. Performance Analysis with Jamming

In this section, we propose a cooperative jamming strategy to improve the secrecy performance of the system. Specifically, a friendly aerial jammer is introduced to interfere with the eavesdroppers by sending AN. As illustrated in [41], the AN is designed by the pseudorandom sequence method, which is known to legitimate nodes but unknown to eavesdroppers. Therefore, the AN can be canceled at the legitimate nodes and only deteriorate the channel quality of the eavesdroppers. It is worth noting that the pseudorandom sequence can be realized by channel estimation-assisted physical layer key generation and agreement without presharing as in traditional cryptography [4244]. Without loss of generality, we assume the jammer UAV is hovering at the same altitude as the relay UAV. Under this method, the COP of and is the same as (12) and (16). In the following, we analyze the SOP and EST of the cooperative jamming strategy.

4.1. SOP of for NOMA Scheme with Cooperative Jamming

The SINR for eavesdroppers to decode from and can be calculated as follows:

Lemma 2. For the NOMA scheme with cooperative jamming, we set the polar function and to denote and . and are, respectively, written as (40) and (41).

Proof. By denoting , can be derived asUtilizing (6) and (7), can be further derived as (40) according to Eq. (3.381.4) in [45], where , and denotes the horizontal distance between and . Similarly, can be calculated as (41). Lemma 2 is proved.

Theorem 5. Similar to the above section, the SOP of under the proposed cooperative jamming scheme can be expressed as follows: where

Proof. Following similar steps as in the proof of Theorem 3, then Theorem 5 can be proved by exploiting a two-layer Gauss–Chebyshev quadrature equation.

Remark 5. As can be seen from Theorem 5, the SOP of under the proposed cooperative jamming scheme is affected by many factors, among which jamming power plays an important role. By designing AN, the noise will not affect the SNR of legitimate users and the SOP monotonically decreases with the increase of .

4.2. EST of for NOMA Scheme with Cooperative Jamming

Similar to the previous process of proving Theorem 4, the EST of under cooperative jamming scheme can be expressed as follows: where and are shown in (16) and (42). To gain more insights, we analyze the performance when is sufficiently large.

Proposition 3. The asymptotic EST achieved by the cooperative jamming scheme can be calculated as follows:

Proof. As goes to infinity, and approximately equals 1. Hence, the asymptotic EST under the cooperative jamming scheme can be rewritten as equation (45). The proof is completed.

Remark 6. As can be observed from Proposition 3, in the case of high SNR of , the EST of is mainly determined by COP and the influence of SOP on the system can be ignored. It is noted that the increase of power allocation factor improves the performance of the system in the high-SNR region. It can also be found that the asymptotic EST is independent of the jamming power, which means that the EST of the proposed cooperative jamming scheme converges to a floor with the increasing .

5. Simulation Results and Discussions

In this section, numerical results are presented to illustrate the reliable and secure performance of the mmWave NOMA UAV-assisted relay system. Without loss of generality, the parameters are set as shown in Table 1. We assume that all nodes are equipped with antennas. The transmitting power from the source and relay satisfies . The unit of transmission rate is BPCU. The simulation results are obtained through different Monte Carlo simulations.

In Figure 2, we investigate the reliability of versus under NOMA scheme for different parameters and . It can be observed that the theoretical analysis agrees well with the simulation, which verifies the correctness of the theoretical derivation. Furthermore, the COP of increases with the target transmission rate . It can also be found that the COP of decreases with the increase of and because more power assigned to results in higher reliability of . At the same time, more antennas deployed on UAVs can lead to greater main-lobe gain and thus improve the reliability, which encourages us to equip UAV with more antennas.

Figure 3 illustrates the COP of versus for different target transmission rate and user zone. The analytical curves precisely match the simulations and the correctness of the derivation can be verified. As shown in Figure 3, the COP increases with the increase of flight height , which demonstrates that longer distance leads to more path loss and impairs the reception quality of the signal. However, the higher LoS link probability caused by the increase of is relatively negligible. In addition, the OMA scheme outperforms the NOMA scheme when because the interference from the message of weakens the performance of . The NOMA scheme performs better when continues to increase. Furthermore, reducing COP can be achieved by decreasing the user zone. It is due to the fact that in the case of random distribution, there are closer users in a smaller user area, which reduces the path loss.

Figure 4 shows the effect of and on the reliability of under OMA and NOMA schemes. Observations can be drawn that the COP is reduced by increasing . In addition, the asymptotic COP is in good agreement with the simulated value, which verifies the correctness of the analysis. For the COP of , we note that the transmitting power demanded a small target rate is also small and vice versa. By comparing the COP under NOMA and OMA schemes, it is easy to find that the NOMA scheme outperforms the OMA scheme when is large. It is due to the fact that is difficult to achieve reliable transmission under the OMA scheme in half the time of the NOMA scheme. However, transmission in OMA mode is better for the system performance when is small, which encourages us to select the appropriate transmission mode according to different target transmission rates.

In Figure 5, we plot the SOP of as the function of under the NOMA scheme for different and the number of antennas . We can find that the secrecy performance can be improved by adopting the aerial cooperative jamming strategy. It can be explained that the channel quality of eavesdroppers can be deteriorated by jamming, while the channel quality of the legitimate user remains unchanged. Furthermore, it is obvious that the SOP of increases with the increase of . This is because the more the eavesdroppers distributed around and , the better the channel quality of the eavesdropper with the best eavesdropping SINR. It can also be seen that increasing the number of antennas can improve the security of the system, and it is more obvious when the jamming power increases. This is because increasing the number of antennas will suppress side-lobe gain and increase the main-lobe gain. It is noted that employing a large number of antennas is useful for the practical secure UAV system.

Figure 6 compares the EST of versus under three schemes. It can be observed that the EST of increases to a peak value with the increase of and then decreases to a stable value. There exists an optimal to maximize EST. It is because the reliability is dominant when is small, and the security is dominant when is large. Increasing reduces the probability of connection outage while making the signal more susceptible to eavesdropping, which is consistent with Figure 4. When is considerably large, the SO is a dominant factor affecting the EST because COP tends to zero in that case. Note that the NOMA scheme with cooperative jamming outperforms the other two schemes. This is because the reliability of the NOMA scheme is better than the OMA scheme and the cooperative jamming strategy improves the security of the system.

Figure 7 plots the EST of versus under three schemes. As shown in the figure, the EST of increases with the increase of under the NOMA scheme with cooperative jamming. It can be explained by the fact that increasing results in more interference on the channel of eavesdroppers, which deteriorates the quality of wiretapping. The smaller the location distribution of eavesdroppers, the higher the EST of is. When goes to infinity, the ESTs of with different protected zones converge to the same value, which verifies the result of Proposition 3. Note that, increasing the jamming power within a reasonable range is meaningful for the practical system design. Meanwhile, the EST of the system without cooperative jamming strategy does not change with . Obviously, the NOMA scheme outperforms the OMA scheme owing to the improvement of reliability under the NOMA scheme. As a result, it shows the superiority of the proposed NOMA scheme with cooperative jamming.

Figure 8 shows the EST of versus different and under the NOMA scheme with cooperative jamming. It is observed that the higher jamming power is beneficial to the EST of the system. When the transmitting power of increases, the EST of increases initially and decreases afterward. However, when is fairly large or fairly small, the EST remains constant after enlargement as increases. The figure also shows that there is an optimal point, which can minimize the consumption of resources and obtain good reliability and security performance. It provides the theoretical basis and reference for the practical design of the UAV mmWave NOMA system.

6. Conclusion

In this paper, we have studied the downlink mmWave NOMA UAV-assisted relay system in the presence of randomly distributed eavesdroppers and users with different levels of security requirements. The distribution of users and eavesdroppers was characterized as independent HPPPs. Two transmission schemes without or with cooperative jamming were proposed. Based on the two schemes, the COP, SOP, and EST expressions of the users were derived to measure the reliability and security. The simulation results show that the reliability and security performance of NOMA scheme with cooperative jamming outperforms other schemes. However, when the transmitting power of the source and UAV relay is large, SOP depends on the shape of the protected zone and the density of eavesdroppers. With the increase of jamming power, the EST of the cooperative jamming scheme converges to a performance floor, which is independent of the size of the protected zone. In the future, it is worth investigating the performance of the system by exploiting the mobility of UAVs.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China, under Grants 62101560 and 61671465, Natural Science Basic Research Program of Shaanxi, under Grant 2022JQ-619, open research fund of the State Key Laboratory of ISN, under Grant ISN23-04, and National University of Defense Technology Research Fund, under Grant ZK21-44.