Abstract

This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for unmanned aerial vehicle- (UAV-) to-ground wireless communication system, in which a fixed-wing UAV tries to transmit covert information to a terrestrial legitimate destination receiver with multiple terrestrial eavesdroppers. In particular, we intend to maximize the worst-case SEE of UAV by jointly optimizing UAV’s flight trajectory and transmit power over a finite flight period. However, the formulated problem is challenging to solve because of its large-scale nonconvexity. For efficiently solving this problem, we first decouple the above optimization problem into two subproblems and then propose an alternating iterative algorithm by adopting block coordinate descent method and Dinkelbach’s algorithm as well as successive convex approximation technique to seek a suboptimal solution. For the sake of performance comparison, two benchmark schemes, the secrecy rate maximization (SRM) scheme and constrained energy minimization (CEM) scheme are considered to obtain more useful insights. Finally, simulation results are executed to verify that our proposed SEE maximization (SEEM) algorithm is superior to two benchmark schemes for the UAV-ground communication system.

1. Introduction

According to Global Information, Inc. (GII) [1], by 2027, the UAV market will reach 21.8 billion and 13.2 million vehicles in terms of volume. Particularly, UAVs have been viewed as an appealing technique to aid ground communication due to their swift for deployment, low cost, flexible mobility, and adaptive altitude [2]. For example, there has been considerable work on UAVs operating as airborne communication platforms, such as stationary/mobile aerial cellular base stations (BSs)/access points (APs) [3, 4], mobile relays [5], mobile data collectors [6], mobile cooperative jammer [7], and mobile edge computing servers [8]. However, although UAVs usually have line-of-sight (LoS) links for air-to-ground communications to improve the received signal level, such LoS links become also more susceptible to interception by terrestrial eavesdroppers (Eves), thus leading to a new security threat. Physical layer security (PLS) has become an effective approach to enable secure wireless communication, where the rich physical layer features and resources of the wireless channel can be effectively exploited to enhance the security of the wireless link and achieve secure transmission.

Over the past few years, there are plenty of PLS schemes proposed to enable secure terrestrial wireless communication. Specifically, they can be classified in two main categories: first, schemes based on introducing multiple-level cooperative relay [9] or multiple-input multiple-output (MIMO) [10] to improve the legitimate channel capacity and second, noise forward- [11] or cooperative jamming-based [12, 13] schemes to significantly reduce the eavesdropping channel capacity. However, only fixed or quasistatic ground nodes are considered in the above existing PLS research, thus bringing the following two challenges. First, when the fixed distance between the source and destination node is far larger than that between the source and a potential eavesdropping node, the existing physical layer security transmission methods only provide the extremely limited security performance improvement for the wireless system. Second, PLS schemes based on transmit power control, beamforming, and/or cooperative jamming usually require precisely known channel state information (CSI) of eavesdropper. However, the terrestrial wireless channel is rather random, especially for the case in the presence of the passive eavesdroppers, which makes CSI estimation very difficult.

Thanks to the controllable mobility and LoS channel of UAV, the use of UAV is expected to solve the above challenges. On the one hand, UAVs as airborne communication platforms can move as close to (far away from) the destination (eavesdropper) as possible, thus improving (degrading) the channels from the UAV to destination (eavesdropper). On the other hand, the CSI between UAV and terrestrial nodes including eavesdroppers can be easily obtained due to the LoS link. Note that the location of eavesdropper is easy to obtain via UAV-based radar or camera [14].

1.1. Related Works

Recently, a number of studies have paid attention to improve the secrecy performance of UAV communication via applying PLS [7, 1519]. Specifically, the authors in [15] first investigated the issue of PLS for a downlink UAV communication system against the terrestrial eavesdropper, and a novel design paradigm is proposed to achieve maximum average secrecy rate via jointly designing the UAV transmit power and trajectory. In [7], the authors first presented to utilize a UAV-enabled mobile jammer to improve the system achievable secrecy rate, which provide new insights to UAV applications. The works [1618] further considered two UAVs to secure the communication system, where one UAV sends confidential information and the other acts as a friendly mobile jammer to send jamming signal to interfere ground eavesdropper to maximize secrecy rate. In addition, a more practical scenario for UAV-ground communication, where two UAVs perfectly know the information on the location of legitimate ground node while the ground eavesdropper’s location is not perfectly known, was investigated in [19]. The worst-case secrecy rate of the UAV communication network is maximized by jointly optimizing the UAVs’ trajectories and their communicating/jamming power allocations. However, the aforementioned works just addressed the SRM optimization problem via a proper UAV trajectory design without taking the power consumption into account.

In fact, for the UAV-ground communication system, such controllable mobility usually consumes more propulsion energy (far greater than the energy related to communication), which is mainly supplied by batteries. However, a UAV’s on-board energy is another major problem because of the size and weight limitations of UAV, which severely limits the sustainability and performance of UAV communication systems. Following the first work of Zeng and Zhang [20] on the analytical UAV propulsion energy consumption model, researchers have widely developed a few energy-efficient UAV communication schemes to strike an optimal balance between the system throughput and the energy consumption and further prolong the UAV endurance [2123]. Nevertheless, all these works have not considered the security issue for UAV communication, which motivates us to investigate how to jointly provide secrecy enhancement and save UAV’s energy.

Although there has been a little work on the study of energy efficiency (EE) of UAV secrecy communications, such as [24, 25], the authors in [24] investigated the secrecy energy efficiency (SEE) maximization of a UAV-aided dual-hop transmission system with a potential eavesdropper by jointly designing the UAV transmit power, flight trajectory, and communication scheduling. In [25], a full duplex UAV-aided secure communication scheme was proposed, in which the UAV collects the confidential messages from a source node on the ground and, at the same time, sends jamming signals to interfere eavesdropping. The system SEE is maximized via optimizing the UAV’s jamming power and flight trajectory, jointly with source transmit power allocation. However, [24, 25] focused on the SEE optimization for UAV-assisted relaying or data gathering with a single eavesdropper, respectively. To the best of our knowledge, there is no existing work to study the issue of maximizing the worst-case SEE for the UAV-ground communication system with multiple terrestrial eavesdroppers.

1.2. Contributions

Motivated by the above works, we jointly consider the UAV’s energy consumption and the system secrecy rate for a UAV-ground communication system with multiple ground eavesdroppers in this paper. Specifically, a fixed-wing UAV is exploited to transmit confidential information to terrestrial destination, and the worst-case SEE is maximized via optimizing UAV trajectory, flight velocity and acceleration, and transmit power.

Here are the main contributions of this paper: (i)To strike an optimal balance between the UAV’s energy consumption and the system secrecy rate, we propose a joint UAV trajectory design and power allocation scheme to maximize the system worst-case SEE(ii)The formulated SEE maximization problem is challenging to solve because of its large-scale nonconvexity. To handle this intractable issue, we present an iterative algorithm to find the high-quality local optimum via employing the block coordinate descent (BCD) method and Dinkelbach’s algorithm as well as successive convex approximation (SCA) technique(iii)To obtain more performance insights, the SEE for the secrecy rate maximization (SRM) scheme and constrained energy minimization (CEM) scheme are also considered for comparison. Numerical results manifest that our proposed scheme can lead to a significant improvement on system SEE over the benchmark schemes

2. System Model and Problem Formulation

2.1. System Model

We consider a secure UAV-ground wireless transmission system, as shown in Figure 1, where a fixed-wing UAV is deployed to secretly transmit information to a terrestrial destination (Bob) in the existence of terrestrial eavesdroppers (Eves). Considering a three-dimensional Cartesian coordinate system, we assume that the nodes Bob and Eves are in the fixed locations on the ground, denoted by and , , respectively. Note that this location information is perfectly known to UAV. Let represent the UAV trajectory projected coordinate on the ground at time instant , where in seconds (s) is the UAV’s serving period. Therefore, the corresponding velocity and acceleration of UAV at are, respectively, denoted by and .

We assume that the UAV aviates horizontally on a constant altitude meters (m) within a finite flight period from a start point to end point , which are both predetermind by the mission/task. For simplicity, we discretize the period into time slots, i.e., , where the equal-spaced time interval is chosen small enough such that during each time slot the UAV’s location can be roughly considered to be constant. Consequently, the horizontal trajectory of UAV over flight period can be approximately represented by -length sequence , . Following [21], the UAV satisfies the following mobility constraints:

where and are the UAV’s velocity and acceleration, respectively; and are the given initial and final velocity, respectively; and are the maximum and minimum speeds in each slot , respectively; and represents the maximum acceleration. Thus, the distance within slot from UAV to the Bob or Eve can be expressed as

Assuming that the UAV-ground channel is dominated by LoS links [26], and the Doppler effect due to UAV mobility can be completely compensated by the receiver simultaneously. Therefore, for each slot , the channel power gain from UAV to ground nodes is given by

where denotes the channel power gain at the reference distance  m.

In each time slot , let represent the transmit power of UAV, which is subjected to both average and peak power constraints, represented as and , respectively, i.e.,

Let in this paper to make constraints (4a) nontrivial. Hence, the maximum achievable rate between Bob and UAV in time slot in bits/second is given by [27].

where is the communication bandwidth, is the noise power at the receiver, and . Similarly, the achievable rate of Eve in bits/second at time slot is calculated as

With (5) and (6), the average worst-case secrecy rate from UAV to Bob, in the existence of Eves, over the period in bits/second is given by [28]

where .

During the secure communication period , the total energy consumption of UAV is mainly composed of the communication-related energy and the propulsion energy. The communication-related energy is ignored in our design since it is extremely small compared with the UAV’s propulsion energy [20]. Therefore, our work focuses on the propulsion energy in Joule consumed over period , which is upper bounded by according to [20]

where represents the gravitational acceleration, denotes the kinetic energy change of the UAV, represents the mass of the UAV, and and are two constant parameters determined by aerodynamics forces.

With (7) and (8), the worst-case secrecy energy efficiency (SEE) in bits/J of the UAV-ground communication system in the existence of multiple eavesdroppers is written by

2.2. Problem Formulation

For ease of exposition, let , , , and . For secure UAV communication, we aim to maximize the worst-case SEE in (9) via jointly optimizing the UAV transmit power and flight trajectory under the constraints of transmit power in (4) as well as UAV mobility in ((1)) within the service period . To this end, the system achievable SEE maximization problem can be recast to

where in (7) is omitted since the objective function in (10) must be nonnegative at the optimal solution; otherwise, without violating the transmit power constraints in (4), the value of (P1) is at least zero by setting . Although the problem (P1) is reformulated as a more tractable form, it is still nonconvex involving variables and difficult to solve optimally. Therefore, we put forward an efficient iterative algorithm to address the problem (P1) in the following section.

3. Proposed Solution

In this section, an effective alternating iterative algorithm is proposed to deal with (P1) via applying block coordinate descent method and Dinkelbach’s algorithm. Specifically, the problem (P1) is decomposed into two subproblems to separately optimize the UAV’s transmit power and the UAV’s trajectory . Two subproblems are alternatively optimized in an iterative manner till convergence.

3.1. Subproblem 1: Transmit Power Optimization

Given any feasible UAV’s trajectory , (P1) is simplified into the following form: where

Although problem (P2) is a nonconvex function of the UAV transmit power , its optimal solution can be obtained as shown in [28]. where

where should be a nonnegative parameter that ensures , which is easy to find via using the bisection search [29].

3.2. Subproblem 2: Trajectory Optimization

To make the optimization problem easier to handle, we first introduce the slack variable ; consequently, with given UAV transmit power , the original problem (P1) can be transformed to be

However, (P3) is still intractable due to its fractional objective function with a nonconcave numerator and nonconvex constraint in (15b). In this case, by introducing slack variables and , (P3) can be reformulated as

It can be verified that constraints (16c) and (16d) should hold with equalities at the optimal solution of problem (P3.1), since otherwise and can be always increased to improve the objective value. Thus, problems (P3.1) and (P3) are equivalent. Nevertheless, problem (P3.1) is still a nonconvex function due to the nonconvexity of constraints (16c) and (16d). Hence, to tackle the nonconvex constraints, the SCA technique is leveraged to seek an efficient suboptimal solution. Specifically, since the terms and are, respectively, convex with regard to and , their lower bound can be obtained via the first-order Taylor expansion at any given local point and in the th iteration as follows:

Similarly, to get to grips with the nonconvexity of the first-term in the numerator of the objective function in (16a), by using the first-order Taylor series approximation at any given over the th iteration, can be lower bounded by where

With (17)–(19), for any given local point and , we can obtain an approximate convex problem for (P3.1), i.e.,

Now, the numerator and denominator of the objective function of problem (P3.2) are concave and convex, respectively, and the feasible region of problem (P3.2) is also convex. Hence, the fractional maximization problem of (P3.2) can be efficiently solved by Dinkelbach’s algorithm [30]. Specifically, we define and , and let be the maximum SEE of problem (P3.2), which can be expressed as

According to [30], the optimal feasible solution of problem (P3.2) is achieved (i.e., the maximum value of SEE ) if and only if

Hence, the fractional objective function of problem (P3.2) is transformed into the following equivalent problem:

Now, (P3.3) is convex and can be solved effectively via classical tools, e.g., CVX [31]. Note that an iterative updating for is required to find the root of . Therefore, we can solve (P3.2) via optimizing the UAV’s trajectory in (P3.3) iteratively, where the details on the stages of problem (P3.2) solving by applying Dinkelbach’s algorithm are presented in Algorithm 1. It should be noted that leveraging Dinkelbach’s algorithm to solve (P3.2) can guarantee the global optimality.

Inputs:, , slack variables
Outputs:, optimal
1: Initialize the maximum tolerance , , and let .
2: repeat
3: Solve problem (P3.3) with a given
  , and obtain the optimal solution
  
4: ifthen
5:  Convergence=true.
6:  return
   , and
   .
7: else
8:  .
9:  
10:  Convergence=false.
11: end if
12:until Convergence=true.
3.3. Overall Algorithm

In a nutshell, an iterative algorithm for solving the original problem (P1) by leveraging the block coordinate descent method and Dinkelbach’s algorithm is proposed as summarized in Algorithm 2. Next, the convergence of the proposed Algorithm 2 is analyzed as follows. Since (P2) is optimally solved, we have , where holds because the Taylor expansions in (17)–(19) are tight at given , comes from the fact that the optimal solution of (P3.2) is attained optimally via Dinkelbach’s method, and is true since the maximal SEE of (P3.2) is a lower bound of that of (P3.1). Therefore, in each iteration of algorithm 2, the obtained is nondecreasing .

Input:
Output:,
1: Initialize, which should be feasible in
 (10). Let
2: repeat
3: With fixed UAV trajectory , obtain the
  optimal UAV’s transmit power using (14)
4: With fixed UAV transmit power , obtain
  the optimal solution using Algorithm 1
5: Update ,
  , ,
  , , ,
  , .
6: Update .
7: until converges to a prescribed threshold .
3.4. Competitive Schemes

In this subsection, to obtain more performance insights, we consider the following two benchmark schemes.

3.4.1. Secrecy Rate Maximization (SRM)

For this scheme, only the secrecy rate is maximized by jointly optimizing the UAV’s transmit power and UAV’s trajectory , where the corresponding optimization problem can be formulated as follows:

Although problem (P4) is challenging to solve optimally owing to its nonconvex nature, similar as [32], an alternating iteration algorithm can be leveraged to effectively solve this problem.

3.4.2. Constrained Energy Minimization (CEM)

For this scheme, the total UAV’s energy consumption minimization via optimizing the UAV trajectory is considered when the requirement communication performance is satisfied. Hence, we formulate the energy-minimization problem with secrecy rate constrained as

Although (P5) is also nonconvex, by introducing the slack variable , (P5) can be transformed into a series of convex subproblems by means of the SCA approach, which can be then iteratively solved using CVX. The details are omitted for simplicity.

4. Simulation Results

In this section, numerical results are presented to validate the performance of our proposed SEE maximization (SEEM) algorithm. In the simulation, the noise power spectrum density and the total communication bandwidth are  dBm/Hz and  MHz, respectively. The average transmit power budget of the UAV is set as  dBm and the peak transmit power limit is to . The reference SNR at distance  m is  dB. Bob’s location is fixed at , and the UAV’s start and end points are, respectively, set to and . There are  Eves, whose locations are set to and , respectively. Moreover, we set  s,  s,  m/s,  m/s,  m/s2, , , , and with denoting the direction from to .

Figure 2 shows the designed trajectories obtained from different schemes. The locations of Bob, , , and the start and end points of UAV, are separately marked with ○, +, ×, □ and ◊, respectively. From Figure 2, one can observe that all the trajectories by the proposed SEEM and two benchmarks schemes show significant difference. For the SRM scheme, UAV first flies along a relatively straight route with the maximum acceleration to arrive at the point in the bottom left of Bob and then hovers around as long as possible, finally moves towards with the maximum acceleration. The hovering point strikes a balance between improving the destination link and weakening the eavesdropper link, thus achieving the maximum secrecy rate. For the CEM scheme, different from the large “U”-shaped path in [20], due to the constraint of the imposed secrecy rate, the UAV follows a path with a large and smooth turning radius, like approximately a big “8”-shaped path. Note that the UAV hovers around longer on the top right of than on the bottom left of since is farther from Bob than . Such trajectory is less power consuming while meeting the communication performance requirements. Consequently, the proposed SEEM scheme, upon approaching point , yields a trajectory with an approximately small “8”-shaped in order to provide adequately secure communication channel but not consume excessive power.

Table 1 provides the detailed system performance comparison for three schemes. It is observed from Table 1 that the SRM scheme can obtain the largest average secrecy rate but with the highest power consumption. On the contrary, CEM scheme consumes the lowest possible energy but also achieves the smallest average secrecy rate. Thus, both benchmark schemes are energy inefficient as expected. Only the proposed SEEM scheme can obtain a good balance between the achievable average secrecy rate and power consumption, thus achieving a significantly higher SEE than two benchmark schemes.

Figure 3 shows the SEE of different schemes versus flight period . It is observed that for the SEEM scheme and the SRM scheme, the SEE increases with a larger flight period at first then tends to be stable, while for the CEM scheme, it initially decreases with before remaining the same stable SEE as for the SRM scheme. This is because when the UAV hovers around point with a small “8”-shaped path, the SEE gain is higher. Therefore, for the SEEM scheme as flight period increases, the hovering time of UAV around accounts for a larger proportion of the entire flight period until approaching 1; thus, the SEE increases until it stabilizes around 13.19 kbits/Joule. Nevertheless, for the SRM scheme, since the UAV is energy inefficiently hovering over point , the SEE gain is limited with . In particular, for the CEM scheme, when increases, the UAV will fly and hover at a larger radius to minimize the energy consumption, thus leading to the decrease of SEE until the stable value 5.14 kbits/Joule, the same SEE as for the SRM scheme. Obviously, for any flight period , our proposed scheme achieves the highest SEE, which validates the superiority of the SEEM scheme.

5. Conclusion

In this paper, we have scrutinized the energy-efficient UAV-ground secure transmission system. Specifically, we have purposed to maximize the worst-case SEE via the UAV’s trajectory design and power control. However, the SEE maximization problem is challenging to solve optimally because of its inherent nonconvexity. Therefore, an effective iterative algorithm is proposed by leveraging block coordinate descent method and Dinkelbach’s algorithm as well as the SCA technique to maximize the system SEE. Numerical results demonstrate that our proposed SEEM scheme achieves a significantly higher system SEE than the benchmark schemes.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

Acknowledgments

This work was partly supported by the Foundation for Distinguished Young Talents Training Programme of Jiangxi (No. 20171BCB23006), Key Research and Development Project of Jiangxi Province (No. 20202BBE53019), 03 Special Funds of Jiangxi Province (Nos. 20204ABC03A05 and 20204ABC03A37).