Abstract

In an UAV- (unmanned aerial vehicle-) aided relaying system, the transmitted signal is exposed to free space in two transmission hops which may be overheard by eavesdroppers. Accordingly, physical layer security should be exploited to improve information security. This paper analyzes both (security and reliability) performance aspects of such a system where only one UAV among multiple UAVs, all capable of harvesting energy from radio frequency signals, is adopted. Towards this end, the tight approximated and exact closed-form expressions of the outage probability at the legitimate destination and the intercept probability at the eavesdropper are first derived. Then, Monte-Carlo simulations are conducted to verify the derived expressions. Based on these expressions, the protected zone of the selected UAV is also proposed through an exhaustive search. Finally, various results are provided to illustrate the impact of key operation parameters on the system performance and the efficacy of the UAV selection.

1. Introduction

Unmanned aerial vehicles (UAVs) have advantages of high mobility, low cost, and on-demand deployment and, thus, have found multiple important applications in recent years, especially in the telecommunications sector [1]. UAVs, which can transport and operate as mobile mini base stations in the air, are utilized for providing wireless services [2]. Unlike traditional relays that are fixed at specific locations, UAVs can change their positions in order to provide a large coverage region [3]. Moreover, using UAVs has recently emerged as an idea to respond to high localized traffic demands in next generation cellular networks [4].

Despite its promising benefits, UAV-enabled communications face many challenges. The big challenge is the broadcast nature of wireless communications, causing air-to-ground communications to expose to free space. Therefore, eavesdroppers can overhear the transmitted signals which are inside the coverage region of the aerial station, inducing unsecured transmission. To secure wireless communications, physical layer security has recently been exploited as an alternative-and-complementary solution [5]. Indeed, given advances in computation power and resources, eavesdroppers are able to regenerate secret keys to decode encrypted information, and, hence, security in multiple layers including the physical layer should be applied to better protect legitimate information. In addition, different from terrestrial channels where the locations of the base stations (BSs) are fixed on the two-dimensional (2D) ground plane, air-to-ground channels vary significantly with UAVs’ mobility. This causes difficulties in channel modelling (for example, the position of the UAV is represented by the three-dimensional (3D) Cartesian coordinate instead of the 2D coordinate for terrestrial BSs), performance analysis, system design optimization, etc. However, additional free dimensions of the UAV’s coordinate offer key opportunities in UAV-aided communications in finding optimum locations to deploy aerial stations which achieve reliable-and-secured channels. Moreover, the energy of UAVs available for powering onboard electronics is limited because of using batteries as a source of power. The solution to the energy limitation of UAVs is to equip UAVs with energy harvesters, which can scavenge energy in radio frequency (RF) signals to self-power their operations, eventually keeping reliable connection of UAV communications [6]. Furthermore, in the case of multiple UAVs, how to select an UAV as a relay for reliable communications to the legitimate receiver and secured transmission against eavesdroppers is another challenge. It is recalled that the UAV selection can reduce the burden of energy consumption and signal synchronization and considerably save transmission bandwidth as compared to using all UAVs as relays [7].

1.1. Related Works

Some initial works on secrecy performance analysis of UAV-based communications systems are listed as [814]. More specifically, [8] analyzed the secrecy outage probability (SOP) of a standard UAV-based communications system where a UAV plays a role as a legitimate aerial transmitter who communicates with the legitimate on-ground receiver in the presence of multiple eavesdroppers who are randomly located. In [9, 10], the system model in [8] was reconsidered without any performance analysis. Instead, [9] optimized the average secrecy rates of the UAV-to-ground and ground-to-UAV transmissions by jointly optimizing the transmit power of the legitimate user and the trajectory of the UAV, while [10] optimized the position of the UAV by maximizing the probability of nonzero secrecy capacity. Different from [810], the authors in [11] studied all aerial users. Moreover, [11] proposed an analytical framework on the average secrecy capacity and SOP, which takes into account random distribution of the wire-tapping UAVs and the legitimate UAV receiver. In [12], Han-Kobayashi signaling was applied to secure the standard UAV-based multiuser communications system where an UAV plays a role as a legitimate aerial transmitter who communicates with multiple legitimate on-ground receivers in the presence of an eavesdropper, and the users’ worst secrecy throughput was maximized by jointly optimizing bandwidth, the time-fraction, and power allocation. In [13], a swarm of UAVs cooperates with each other to eavesdrop information communicated between the on-ground legitimate source-destination pair, and eavesdropped information at different UAVs is combined using the maximum ratio combining (MRC) or the selection combining (SC) for better eavesdropping performance. The secrecy capacity was analyzed in an approximated form in [13]. In [14], a swarm of UAVs can be divided into two types: relay and jammer. As a relay, the selected UAV receives signals from the on-ground source station and forwards the processed signals to the on-ground destination station, while as jammers, UAVs transmit jamming signals to interfere the eavesdroppers. The selected UAV is the one that correctly decodes the source signal and has the lowest path loss to the destination. The SOP was analytically approximated in [14] without considering the energy harvesting at UAVs.

Some works also focused on constructing a swarm of UAVs to increase the probability of the end-to-end (E2E) connection [1517]. In [15], a swarm of slave UAVs transmits their information which is relayed by a master UAV to an on-ground receiver. The outage probability was analyzed in [15] for Nakagami- channels. In [16], multiple UAVs are exploited as (amplify-and-forward (AF) or decode-and-forward (DF)) relay in two (single multihop link or multiple dual-hop links) network topologies. The performance of the UAV-aided relaying system in [16] was also analyzed in terms of bit error rate and outage probability. Additionally, UAVs are optimally positioned with the maximum E2E signal-to-noise ratio (SNR). In [17], the distances from a swarm of UAVs as AF relays to the multiantenna source station and the destination station are optimized for the maximum channel capacity. It should be noted that both [16, 17] did not pay attention to the security problem in UAV-aided relaying systems when eavesdroppers are present.

1.2. Contributions

In contrast to existing literature, this paper analyzes both the secrecy performance in terms of the intercept probability (IP) and the connection reliability in terms of the outage probability (OP). A swarm of UAVs is also considered in this paper. However, different from [1317], this paper selects only one UAV for relaying the legitimate information from the on-ground source station to the on-ground destination station, and all UAVs under consideration are capable of harvesting energy from the source station’s signals. The energy harvesting (EH) capable UAV selection can mitigate the requirements of signal synchronization, transmission bandwidth, and power limitation of UAVs.

Here are the key contributions of our study: (i)Propose an UAV selection scheme to adopt only one UAV as a relay from a swarm of UAVs, all capable of harvesting energy from RF signals, for reliable-and-secured communications of the legitimate source-destination pair under the eavesdropping of the wire-tapper without a heavy burden of transmission bandwidth, power consumption, and signal synchronization(ii)Suggest the tight approximated and exact closed-form expressions (in the sequel, two terms (“approximated closed-form expression” and “exact closed-form expression”) are used frequently. The former refers to the expression which is represented in the explicit form (i.e., no integral is left) and derived from some approximated quantities. Meanwhile, the latter refers to the expression which is represented in the explicit form and derived from all exact quantities) of OP and IP for the EH UAV selection under consideration of different availability degrees of wire-tapped information, path-loss, and Rayleigh fading for air-to-ground communication links(iii)Find the protected zone of the selected UAV not only to provide reliable communications of the legitimate source-destination pair but also to secure these communications against the eavesdropper(iv)Provide various results to have insights into the impact of the main parameters of transmit power, time splitting factor, and the position of the selected UAV on the connection reliability and the secrecy performance of UAV-aided relaying systems

1.3. Paper Structure

The paper continues as follows. Section 2 presents the system model under investigation. Then, IP and OP are analyzed in detail in Section 3. Next, the protected zone of the selected UAV as a relay is outlined in Section 4. Subsequently, the Monte-Carlo simulation is conducted to verify the theoretical analysis in Section 5. This section also provides various results on the performance of the EH UAV selection with respect to key operation parameters. Finally, Section 6 summarizes and concludes our work.

2. System Model

Consider an UAV-aided relaying system as depicted in Figure 1(a), where an on-ground source station communicates with an on-ground destination station . Assuming that direct communication between and is blocked due to some reasons such as long distance, deep fading, and strong shadowing. Therefore, this communication needs the aid of the best UAV, namely, , which is selected from available UAVs operating as energy harvesting AF relays. Let the UAV be , where . Then, the best UAV is defined as the one whose SNR from the source signal is larger than that of any other UAV with for the most successfully decoding of the source signal. An eavesdropper tries to wire-tap information transmitted by and .

2.1. Channels

Assuming that all the channels are independent, flat, and Rayleigh-distributed and remain unchanged during each transmission but independently vary from one transmission to another. The channel coefficient of the communication link is denoted as , where and . Then, the probability density function (PDF) and the cumulative distribution function (CDF) of the channel gain of the communication link are correspondingly expressed as where and are the mean of the random variable , also known as the fading power of the link; is the expectation operator.

Accounting for the path loss [16], the fading power of the communication link can be modelled as , where , is the path loss exponent, is the distance of the communication link, is the carrier frequency [Hz], and [m/s] is the speed of light.

2.2. Signals

Given the fact that the energy of UAVs available for powering onboard electronics is limited because of using batteries as a source of power, UAVs should be self-powered by scavenging energy from RF signals of the source station and use harvested energy to amplify-and-forward their received signals to the destination station. As seen in Figure 1(b), the total time for the end-to-end transmission of a message is divided into three phases. During the first phase of with being the time splitting factor, UAVs scavenge energy from RF signals of the source station. The energy which the UAV , , harvests in this phase is , where denotes the transmit power of the source station, is the energy conversion efficiency, and is the channel coefficient of the communication link. In the second phase of , the source station transmits its signal to UAVs. At the end of this phase, the best UAV is selected according to the criterion as mentioned at the beginning of this section. The best UAV operates as an AF relay which amplifies the source signal and transmits the amplified signal to the destination station in the third phase of .

In the second phase, the received signal at the selected UAV can be expressed as , where is the signal transmitted by with the transmit power , is the channel coefficient of the communication link, and denotes the noise at . Without loss of generality, the noise at the receiver , where and , is assumed to be additive white Gaussian noises (AWGN) with zero mean and variance , i.e., and . Then, the instantaneous SNR of the link is where stands for the normalized SNR.

In the third phase, the best UAV consumes its harvested energy to forward the amplified source signal to the destination station with the following transmit power: where is defined as the time-switching coefficient.

The amplified source signal , which is transmitted from to , is expressed as , where the amplification coefficient is computed such that the transmit power of is in (4), i.e.,

Therefore, the received signal at the destination station is expressed as , where is the channel coefficient of the communication link, and denotes the noise at . Then, the end-to-end SNR of the communication link can be expressed as

Substituting (5) into (6) and after some simplifications, one obtains

Since the transmit power is much greater than the noise power , . As such, (7) can be approximated tightly as

Substituting in (4) into (8), one obtains

2.3. Availability Degree of Eavesdropped Information

The eavesdropper can receive signals in either one phase (second phase) or two phases (second and third phases). Depending on the availability degree of eavesdropped information, the corresponding scenarios are considered.

2.3.1. Scenario 1: Receives Signals Only from in the Second Phase

Due to some reason, may not receive signals from the best UAV . This is Scenario 1. In this scenario, the received signal at from is given by , where is the channel coefficient of the communication link, and denotes the noise at . Then, the SNR at is the SNR of the link as which is similar to (3).

2.3.2. Scenario 2: Receives Signals from in the Second Phase and in the Third Phase

This scenario allows to combine both signals from and for higher intercept probability. It is recalled that the received signal at over the communication link is given by , which results in the SNR of . Therefore, two signals ( and ) are available at in Scenario 2. Based on these two signals, can combine them by two methods depending on implementation complexity. Given affordable implementation complexity, can perform selection combining (SC) in [18] to select the received signal with the higher SNR. Therefore, the SC method offers the instantaneous SNR at as

For higher implementation complexity (it is obvious that the MRC technique is more complicated but better than the SC one), can perform maximum ratio combining (MRC) in [18] to sum the SNRs of both ( and ) communication links, resulting in the instantaneous SNR at as

Just remind that the SNR of link is of the same form as the SNR of link in (9). Therefore, is approximated tightly as

3. Performance Analysis

To numerically evaluate the performance of the energy harvesting UAV selection, the tight approximated and exact closed-form expressions of the outage probability and the intercept probability are derived in the following.

It is recalled that among UAVs, only the best UAV is selected according to the partial selection principle which offers the highest SNR over all the source-UAV communication links. Therefore, the index of the best UAV can be denoted as . Then, the SNR at is equivalently represented as . For ease of presentation (the case that all the UAVs are heterogeneously located is straightforwardly extended. Indeed, Appendix D outlines how to derive the tight approximated closed-form expressions of the outage probability and the intercept probability for this case. However, it is noted that the final expressions will be untidy, and, hence, they are not really convenient for computer programming and result illustrations. Accordingly, this paper presents only the case of homogeneous locations of UAVs. Interested readers can follow Appendix D to obtain the analysis for the case of heterogeneous locations of UAVs, for their own purposes), all the UAVs are assumed to be homogeneously located, resulting in which is the fading power of the -UAV communication link. By denoting , one obtains its statistics in the following lemma.

Lemma 1. The CDF and PDF ofare correspondingly given bywhere and is the binomial coefficients.

Proof. Please see Appendix A.

Based on information theory, the end-to-end SNR of the communication link, , should be greater than a threshold to keep a reliable end-to-end connection (the channel capacity that can achieve is . Therefore, successfully recovers the source information if its channel capacity is greater than the required spectral efficiency . This is equivalent to greater than ). The probability that is not greater than that threshold is known as the outage probability, i.e., . Using in (9), one can rewrite in a compact form as where and .

Lemma 2. The tight approximated closed-form expression (this expression is approximated because it is derived from the approximatedin (9). Nonetheless, the approximation in (9) is tight, and, hence, (17) matches simulation results as shown in Section5) of the outage probability of the energy harvesting UAV selection is given bywhere and is the modified Bessel function of the second kind and the first order.

Proof. Please see AppendixB.

Also based on information theory, the eavesdropper successfully decodes the source information from its received signals (or intercepts the source information) if its SNR is larger than a threshold (the channel capacity that can achieve is . Therefore, successfully recovers the source information if its channel capacity is greater than the required spectral efficiency . This is equivalent to greater than . The probability that such an event happens is defined as the intercept probability: . It is noted that can take the value in (10) or (11) or (12), depending on the availability degree of the eavesdropped information at .

The following derives the IP expressions for every values that can take.

3.1. Scenario 1: Receives Signals Only from in the Second Phase

In this scenario, is given in (10). Therefore, the IP is expressed as . Using the CDF of in (2), one obtains the intercept probability of the energy harvesting UAV selection in the exact closed form (the expression in (18) is exact because it is derived from the exact in (10)) as

3.2. Scenario 2: Receives Signals from in the Second Phase and in the Third Phase

In this scenario, the eavesdropper can combine both signals ( and ) received from in the second phase and in the third phase by the SC technique or the MRC technique. The IP for the SC technique is given by , while that for the MRC technique is .

Lemma 3. The tight approximated closed-form representation (the expression in (19) is approximated because it is derived from the approximated in (13). Nonetheless, the approximation in (13) is tight, and, hence, (19) matches simulation results as shown in Section 5) of the intercept probability for the SC technique is given by

Proof. Since all the links are independent, the IP for the SC technique can be rewritten as

The first term in (20), , is the CDF of evaluated at . Using (2), this term is straightforwardly computed as . Meanwhile, the second term in (20), , is the CDF of evaluated at . Because is the SNR of the communication link, it has the same form as the SNR of the communication link, in (9). Therefore, by substituting with in (17), one obtains the tight approximated closed-form expression of . Plugging these results into (20), one reduces (20) to (19). This completes the proof.

Lemma 4. The tight approximated closed-form representation of the intercept probability for the MRC technique is given bywhere with is Lah numbers, is the Gamma function, and is the lower incomplete Gamma function,

Proof. Please see Appendix C.

4. Protected Zone of UAVs

The “protected zone” is defined as a zone in which the secrecy of the legitimate transmitter is enhanced by decreasing the capacity of the wire-tapped channel while the reliability of the desired end-to-end connection is maintained at an acceptable level. Different from terrestrial communications where the locations of the relays may be fixed (relays may be base stations in mobile communications), in the context of UAV-aided communications, in this paper, the UAVs which play roles as relays are moving. Therefore, an optimization problem should be formulated to find optimal locations to deploy UAVs for reliable and secured legitimate communications.

For ease of presentation, it is assumed that the source station , the destination station , and the eavesdropper are fixed on the 2D ground plane, while only UAVs are above the ground plane with the height of as shown in Figure 2. This means that the 3D coordinate of with can be denoted as , while that of the UAV is . Then, the distance of the air-to-ground (or ground-to-air) communication link is in which .

Now, the protected zone is specifically defined in the context of UAV-aided communications as the region of the best UAV, , over which the outage probability of is less than a threshold to guarantee the reliability of the communication link, while the intercept probability of is also smaller than a certain level to secure that link. Therefore, the optimization problem to find the protected zone can be formulated as subject to where and are, respectively, the intercept probability of and the outage probability of when the best UAV is in the protected zone. In other words, the protected zone is a set of the locations, , of the best UAV such that (25) and (26) are satisfied.

Due to the complexity of the expressions for and as shown in the previous section, it is hard to reach the exact closed-form solution for the protected zone . However, thanks to the tight approximated and exact closed-form expressions of and , an exhaustive search can be performed to numerically and quickly find in the above optimization problem. The next section will present some useful results from this exhaustive search.

5. Illustrative Results

In this section, Monte-Carlo simulations are conducted to obtain simulation results in order to prove the validity of the proposed theoretical expressions in (17), (18), (19), and (21) as well as to have insights into the secrecy and the reliability of the energy harvesting UAV selection. First, the end-to-end connection reliability is analyzed by investigating the outage probability. Then, the secrecy performance of the UAV-aided relaying system is examined in terms of the intercept probability. Some simulation parameters fixed throughout this section are the carrier frequency MHz and the path-loss exponent (corresponding to free-space path loss).

Figure 3 illustrates the outage probability of the legitimate channel from through to with respect to the normalized SNR when the distances of the (, ) links are m and m, respectively; the time splitting factor is ; the energy conversion efficiency is ; the required spectral efficiency is bps/Hz. This figure shows the coincidence between the analysis and the simulation, validating the proposed expression in (17). Additionally, the reliability of the communication link is improved with increasing the normalized SNR as expected. Moreover, the efficiency of the UAV selection is proven, which is based on the observation in Figure 3 that the more number of UAVs is, the lower outage probability is achievable.

Figure 4 represents the impact of the time for energy scavenging on the outage probability of for the same parameters as Figure 3 except dB. This figure validates the proposed expression in (17) due to the coincidence between the analysis and the simulation. Additionally, the OP decreases with increasing the time for energy harvesting (i.e., increasing ). This is because the UAVs harvest more energy to keep the reliable connection to when increases. However, the more time for energy harvesting, the less time for message transmission, causing lower channel capacity in the third phase which eventually increases the OP. Therefore, when the time splitting factor is greater than a certain value (e.g., for in Figure 4), the OP increases with increasing . As such, should be optimized to achieve reliable communication. Furthermore, the transmission reliability is improved with deploying more UAVs, showing the efficiency of the UAV selection.

Besides the time splitting factor, the energy conversion efficiency is another important factor, which affects the amount of the harvested energy, eventually impacting the system performance. Figure 5 demonstrates the OP versus both and for the same parameters as Figure 4 except . Results show that conditioned on , the higher , the smaller the OP. This is reasonable because increasing helps UAVs harvest more energy, and, hence, UAVs transmit signals with higher power for lower OP. For ease of observing the effect of both and on the OP, we find the region on the plane in which the OP is less than a certain level for acceptable connection reliability. Figure 5 demonstrates this region in which the OP is lower than . It is seen that in order to achieve an acceptable connection reliability (e.g., ), the efficiency of the energy harvester must be greater than a certain value (e.g., ) and the time fraction required for scavenging energy must fall in a certain range (e.g., ). This result can be interpreted by combining the result of the OP versus in Figure 4 and the fact that increasing reduces the OP.

To illustrate the secrecy performance of the UAV selection, the intercept probability is investigated for different availability degrees of eavesdropped information at the eavesdropper. Figure 6 demonstrates the IP with respect to the normalized SNR for the same parameters as Figure 3 except bps/Hz and the distances of the (, ) links of m and m, respectively. It is recalled that without the eavesdropped information in the third phase, the IP is in (18) independent of the number of UAVs , while with that information in the third phase, the IP is in (19) for the SC technique and in (21) for the MRC technique. Both and depend on the number of UAVs . It is seen that the simulation coincides with the analysis, confirming the exactness of the proposed IP expressions. In addition, information transmission is less secured when the number of UAVs increases, showing the negative side of the UAV selection where only information of the communication link is employed to select the UAV as the relay without paying attention to . Moreover, the availability degree of eavesdropped information obviously benefits in stealing legitimate information. More specifically, is always smaller than and , as expected. Furthermore, it is well-known that the MRC technique has better performance than the SC one. This explains the results in Figure 6 that is significantly greater than . In other words, the eavesdropper is the most effective in intercepting the transmission of with the MRC technique. Additionally, the intercept performance of is improved with increasing the normalized SNR.

Figure 7 illustrates how to find the protected zone of UAVs where , , dB, , , bps/Hz, and the coordinates of terminals as shown in Figure 2. Figure 7(a) shows the IP with respect to the positions of the best UAV (the projected coordinate of on the 2D ground plane is denoted by (, ) in Figure 7) when the SC technique is employed at . From this figure and by the exhaustive search, the positions of such that the IP is less than 0.8 (i.e., (26) holds) can be found and shown in Figure 7(b). Similarly, Figure 7(c) shows the OP with respect to the positions of the best UAV , and by the exhaustive search, the positions of such that the OP is less than 0.5 (i.e., (25) holds) can be found and shown in Figure 7(d). By intersecting both regions of in Figures 7(b) and 7(d), the protected zone can be found straightforwardly. In this illustration, the intersection (i.e., the protected zone) is also the region of in Figure 7(d). This protected zone is to guarantee the reliable connection to while preventing from eavesdropping. As such, the protected zone in Figure 7(d) is reasonable because it is close to for reliable signal reception but far from for higher security.

6. Conclusions

This paper investigated an UAV-aided relaying system under the eavesdropping of the wire-tapper where only one UAV among multiple UAVs, all with capability of harvesting energy from RF signals, is selected as a relay. The system performance was analyzed in terms of the outage probability of the destination station and the intercept probability of the eavesdropper through the proposed tight approximated and exact closed-form expressions. Different availability degrees of eavesdropped information at the eavesdropper were also considered to evaluate various information security levels that the system may encounter. The analysis was verified by the Monte-Carlo simulation. Multiple results showed the efficiency of the UAV selection in keeping reliable connection over long distance. By taking advantage of UAVs’ high mobility, this paper also determined the protected zone of the selected UAV to maintain the security and the reliability at an acceptable level. Furthermore, the results demonstrated that the time splitting factor for the energy harvesting process can be optimized to achieve the best performance.

Appendix

A. Proof of Lemma 1

The PDF of is defined as

Since all the communication links are independent, (A.1) is rewritten as

Inserting the CDF of given in (2) into (A.2) with a notice that due to the homogeneous distribution of UAVs, one obtains

Using the binomial expansion , one reduces (A.3) to (14), completing one part of the proof.

Taking the derivative of (14) with respect to , one obtains the PDF of which is exactly the same as (15), completing the rest of the proof.

B. Proof of Lemma 2

The detailed derivation of the tight approximated closed-form expression of the outage probability in (17) is as follows. First, we rewrite (16) as

Equation (B.1) can be simplified by considering two cases subject to as

As such, the unconditional outage probability is expressed as

Plugging in (2) into the above equation and after some simplifications, one can further simplify (B.3) as

It is noted that , , due to the homogeneous distribution of UAVs. Therefore, is used in (B.4).

Now, plugging in (15) into (B.4), one obtains

By changing variable , (B.5) becomes

Using in ([19], eq. (3.324.1)) to compute the last integral in (B.6), one can represent (B.6) in the tight approximated closed form as (17). This completes the proof.

C. Proof of Lemma 3

The IP for the MRC technique can be rewritten as

Using (1), one obtains in (C.1). Meanwhile, by following the proof of Lemma 3, one also obtains by changing to in (17). Inserting all the results into (C.1) and after some simplifications, we have

The term in (C.2) is easily expressed in the exact closed form as

By changing the variable in the term in (C.2), one obtains

Using series representation for the modified Bessel function of the second kind in ([20], eq. (1.3)) to express as one can rewrite (C.4) in the series form as where is given in (23).

By changing the variable , one can rewrite the term in (C.6) as where

Inserting (C.7) into (C.6) and then plugging (C.6) and (C.3) into (C.2), the intercept probability in (C.2) for the MRC technique matches (21). Therefore, the last step to complete the proof is to prove that (C.8) can be expressed in the exact closed form as (22). This step proceeds as follows. First, (C.8) is rewritten in a compact form as where

Using ([19], eq. (3.351.1)), is expressed in exact closed form as

Then changing the variable , one rewrites as

Applying the binomial expansion to , (C.12) is further simplified as

Changing the variable , one rewrites the last integral in (C.13) as

Applying in ([19], eq. (3.381.1)), each integral in (C.14) can be expressed in the exact closed form. This leads to

Plugging (C.15) into (C.13), one obtains the exact closed form of as

Inserting (C.11) and (C.16) into (C.9), in (C.9) is exactly the same as (22). This completes the proof.

D. Outlines of Derivations for Heterogeneous Locations of UAVs

This appendix outlines how to derive the IP and OP expressions for the case that UAVs are located heterogeneously.

The key derivation to obtain the tight approximated closed-form expression of the outage probability in (17) is to solve the integral in (B.4). Apparently, this integral is solved in the exact closed form if the PDF of is expressed as a linear combination of the exponential functions of the variable as in (15). Therefore, what we need to obtain the tight approximated closed-form expression of the outage probability for the case that UAVs are located heterogeneously is to prove that the PDF of is expressed as a linear combination of the exponential functions of the variable . Towards this end, we rewrite (A.2) as

It is recalled from ([21], eq. (86)) that where is the cardinality of and with denoting the element in the set .

Using (D.2) to expand (D.1) as

Taking the derivative of (D.3) with respect to , one obtains the PDF of as

It is obvious that the PDF of in (D.4) is a linear combination of the exponential functions of the variable . Therefore, the tight approximated closed-form expression of the outage probability for the case that UAVs are located heterogeneously can be derived straightforwardly.

Similarly, the key derivation to obtain the tight approximated closed-form expressions of the intercept probability in (19) and (21) is to achieve the CDF of , , in order to derive (20) and (C.1). Because in (13) has the same form as in (9) and the CDF of , , is obtained for the case that UAVs are located heterogeneously, is derived from by substituting with . Therefore, given for the case that UAVs are located heterogeneously, one obtains straightforwardly the tight approximated closed-form expressions of and for this case.

Data Availability

The authors declare that all data used to support the findings of this study are included within the article

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This research is funded by Vietnam National University HoChiMinh City (VNU-HCM) under grant number B2021-20-01. We would like to thank Ho Chi Minh City University of Technology (HCMUT), VNU-HCM for the support of time and facilities for this study.