Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

6402 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO.

10, OCTOBER 2021

Robust Secure UAV Communications With the Aid


of Reconfigurable Intelligent Surfaces
Sixian Li , Bin Duo , Member, IEEE, Marco Di Renzo , Fellow, IEEE, Meixia Tao , Fellow, IEEE,
and Xiaojun Yuan , Senior Member, IEEE

Abstract— This paper investigates a novel unmanned aerial Index Terms— UAV secure communication, reconfigurable
vehicles (UAVs) secure communication system with the assistance intelligent surface, robust trajectory design, robust passive beam-
of reconfigurable intelligent surfaces (RISs), where a UAV and a forming, robust power control.
ground user communicate with each other, while an eavesdropper
tends to wiretap their information. Due to the limited capacity
I. I NTRODUCTION
of UAVs, an RIS is applied to further improve the quality of the
secure communication. The time division multiple access (TDMA)
protocol is applied for the communications between the UAV and
the ground user, namely, the downlink (DL) and the uplink (UL)
W ITH the rapid growth of the number of network
devices, it is expected that the overall mobile data
traffic will reach astonishingly up to 77 exabytes per month
communications. In particular, the channel state information
(CSI) of the eavesdropping channels is assumed to be imperfect. by 2022 [1], which undoubtedly poses a tremendous chal-
We aim to maximize the average worst-case secrecy rate by lenge for current mobile communication networks. To meet
the robust joint design of the UAV’s trajectory, RIS’s passive these explosive demands, innovative wireless transmission
beamforming, and transmit power of the legitimate transmitters. technologies have been investigated in the past few years, such
However, it is challenging to solve the joint UL/DL optimization as unmanned aerial vehicles (UAVs) [2]–[4], reconfigurable
problem due to its non-convexity. Therefore, we develop an
efficient algorithm based on the alternating optimization (AO) intelligent surfaces (RISs) [5]–[9] and so on. Due to UAVs’
technique. Specifically, the formulated problem is divided into high mobility, they can be flexibly deployed to enhance the
three sub-problems, and the successive convex approximation communication quality, while conventional terrestrial base
(SCA), S-Procedure, and semidefinite relaxation (SDR) are stations (BSs) only serve the ground users in a fixed area.
applied to tackle these non-convex sub-problems. Numerical In addition, UAVs usually fly at a high altitude compared with
results demonstrate that the proposed algorithm can considerably
improve the average secrecy rate compared with the benchmark the terrestrial infrastructure, which makes the transmission
algorithms, and also confirm the robustness of the proposed links between the UAV and the ground devices line-of-sight
algorithm. (LoS) dominated [10]. Thanks to these advantages, UAVs
are expected to play a key role in beyond fifth generation
Manuscript received August 19, 2020; revised December 1, 2020 and (B5G) and sixth generation (6G) networks [11], [12]. In the
March 19, 2021; accepted April 3, 2021. Date of publication April 26, 2021; majority of research on UAV communications, secrecy is one
date of current version October 11, 2021. This work was supported in part of the key research aeras, in which authors focus on enhancing
by the General Program of National Natural Science Foundation of China
under Grant 62071090 and in part by the Sichuan Science and Technology the secure communication quality via the joint optimization
Program under Grant 2021YFH0014. The work of Marco Di Renzo was of the UAV trajectory and communication resource alloca-
supported in part by the European Commission through the H2020 ARIADNE tion. For instance, the authors of [4] considered a simpli-
project under Grant 871464 and in part by the H2020 RISE-6G project under
Grant 101017011. The associate editor coordinating the review of this article fied secure UAV communication system and maximized the
and approving it for publication was C. Masouros. (Corresponding author: average secrecy rate of the system via joint trajectory and
Xiaojun Yuan.) power control design. The authors of [13] used a UAV as
Sixian Li and Xiaojun Yuan are with the National Laboratory of
Science and Technology on Communications, Center for Intelligent Net- a jammer to transmit interfering signals to an eavesdropper,
working and Communications, University of Electronic Science and Tech- so as to improve the secrecy rate performance. A novel
nology of China, Chengdu 611731, China (e-mail: sxli@std.uestc.edu.cn; UAV-enabled secure communication system with cooperative
xjyuan@uestc.edu.cn).
Bin Duo is with the National Laboratory of Science and Technology on jamming has been studied in [14]–[17], where one UAV acts
Communications, Center for Intelligent Networking and Communications, as the legitimate transmitter and sends confidential data to
University of Electronic Science and Technology of China, Chengdu 611731, the users, while another UAV acts as the jammer that delivers
China, and also with the College of Information Science and Technol-
ogy, Chengdu University of Technology, Chengdu 610059, China (e-mail: artificial noise (AN) to the eavesdroppers to weaken the quality
duobin@cdut.edu.cn). of the eavesdropping channels. In particular, in [15]–[17],
Marco Di Renzo is with Université Paris-Saclay, CNRS, CentraleSupélec, the scenario with multiple users and eavesdroppers was inves-
Laboratoire des Signaux et Systèmes, 91192 Gif-sur-Yvette, France (e-mail:
marco.di-renzo@universite-paris-saclay.fr). tigated, where the authors aimed at maximizing the minimum
Meixia Tao is with the Department of Electronic Engineering, Shanghai secrecy rate among the legitimate users by jointly optimizing
Jiao Tong University, Shanghai 200240, China (e-mail: mxtao@sjtu.edu.cn). the UAV trajectory and corresponding communication resource
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TWC.2021.3073746. allocation. In addition, the robust trajectory and transmit power
Digital Object Identifier 10.1109/TWC.2021.3073746 design were studied in [18], and the S-Procedure method
1536-1276 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6403

was used to efficiently solve the location uncertainty of the an RIS was placed on the UAV to assist the users whose LoS
eavesdropper. path is blocked. Then, an efficient algorithm based on the
Benefiting from improving the propagation environment reinforcement learning technique was proposed to solve the
and enhancing the signal strength, RISs have been widely DL transmission capacity maximization problem. Similarly,
investigated as the technology enabler for realizing smart in [32], a UAV equipped with an RIS was leveraged to
radio environments in the near future [19]–[22]. In general, achieve uplink secure communications. Based on the rein-
an RIS is comprised of energy-efficient and cost-effective forcement learning method, the authors of [33] proposed a
reconfigurable passive elements. Each element of the RIS deep Q-network (DQN)-based algorithm to design the UAV’s
can induce a phase shift on the incident signal by using a trajectory and RIS’s passive beamforming to maximize the
smart controller. Hence, with the aid of an RIS, the signals weighted fairness and data rate among all users. Additionally,
from different communication links can be added coher- the authors of [34] accounted for multiple RISs and a multi-
ently at the desired receiver to enhance the received signal antenna UAV, and maximized the received power by jointly
energy or can be added destructively at undesired receivers to optimizing passive beamforming, active beamforming, and the
avoid the information leakage [23]. This is also called passive UAV’s trajectory. The authors of [35] studied a UAV-assisted
beamforming. Due to the peculiar property of modifying the RIS symbiotic radio system, where the UAV helped multiple
wireless propagation environment, RIS-assisted secure com- RISs for their own information transmission. Based on statis-
munication systems have attracted much attention [24]–[28]. tical CSI, the problems of maximizing the minimum average
In [24], the authors investigated a simplified RIS-aided secure rate and the weight sum rate over all RISs were solved,
communication system, where the BS delivered confidential respectively, by the joint design of the UAV trajectory, RISs’
data to the user, while the eavesdropper intended to intercept passive beamforming, and RISs’ scheduling.
the legitimate information. The RIS was utilized to enhance It is observed that among the current works on RIS-aided
the quality of the legitimate links and weaken that of the UAV communications, there exists very limited research on
wiretap links. By applying semidefinite relaxation (SDR) and the design of secure communication systems. Furthermore,
Gaussian randomization methods, the authors maximized the in the existing RIS-aided UAV secure communication systems,
achievable secrecy rate via jointly optimizing passive beam- it is assumed that the perfect CSI of the eavesdropping
forming and transmit beamforming with AN. Since the SDR channels is known. This assumption may not be easy to be
methods may not provide a rank-one solution, the majorization met in practice since the eavesdroppers always avoid being
minimization (MM) technique [25] and manifold optimization detected by the legitimate transmitters, so as to intercept the
theory [26] were used to obtain a rank-one solution. Robust legitimate information transmission successfully. Motivated by
and secure RIS-assisted communication systems have been this, in this paper, we investigate a novel RIS-aided UAV
studied in [27], [28]. In [27], by capitalizing on the robust secure communication system as shown in Fig. 1, where the
joint design of active beamforming and passive beamforming, UAV flies over a given flight period to serve the ground user,
the worst case of achievable secrecy rate was maximized for and the ground user also uploads some messages to the UAV,
the colluding and non-colluding eavesdropping scenarios. The while a potential eavesdropper intends to wiretap their commu-
authors of [28] considered a secure wireless system comprised nications. However, in complex urban environment, the quality
of multiple ground users, eavesdroppers, and RISs. It was of the secure information transmission may be poor. Thus,
assumed that the channel state information (CSI) of the eaves- an RIS is leveraged to enhance the communication quality
dropping channels was not perfectly known at the BS. Hence, of the legitimate links and weaken that of the eavesdropping
a joint and robust design of the beamforming (including links. Specifically, the entire flight duration is divided into
active beamforming at the BS and passive beamforming at the time slots. We assume that the time division multiple access
RISs) and the AN covariance matrix was proposed to maxi- (TDMA) protocol is applied. As a result, we divide each time
mize the system sum-rate under a given information leakage slot into two parts, i.e., one for the downlink (DL) transmis-
threshold. sion and the other for the uplink (UL) transmission,1 where
From the above discussion, UAVs can provide LoS domi- the UAV and the ground user are the legitimate transmitter
nant transmission links with the ground users, thanks to their (receiver) and receiver (transmitter), respectively. Since the
high mobility, while RISs can achieve passive beamform- eavesdropper always avoids to be detected as possible as
ing by adjusting their reflecting elements smartly. Recently, it can, accurate estimates of the CSI of the eavesdropping
the design of RIS-assisted UAV communication systems has links are usually not available. Hence, we assume imperfect
attracted increasing attention [29]–[35]. In [29], an RIS was CSI acquisition of the eavesdropping channels2 and use a
utilized to assist the UAV relay system, and the simulation deterministic model [39] to describe the CSI uncertainty.
results demonstrated that deploying RISs could significantly
1 In our paper, we assume that before the UAV starts moving, the ground
improved the coverage and reliability of UAV communication
systems. In [30], a UAV was used as the mobile BS to user has achieved the uplink timing synchronization and has been allocated
the corresponding radio resources by using random access (RA) schemes [36]
serve the ground user with the assistance of an RIS. The generally used in the long term evolution (LTE) and LTE advanced (LTE-A).
authors aimed at maximizing the average achievable rate by 2 Although a passive eavesdropper always stays silent, it may send signals

the joint optimization of the UAV trajectory and RIS’s passive to its dedicated wireless system. In this case, the signal leakage from the
eavesdropper to the legitimate transmitter can be used for channel estimation
beamforming, and derived a closed-form solution of the RIS’s [28]. Furthermore, it is demonstrated that the eavesdropper’s location can be
phase-shift matrix for any given UAV trajectory. In [31], practically detected via a UAV-mounted camera or radar [37], [38].

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6404 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

II. S YSTEM M ODEL AND P ROBLEM F ORMULATION


A. System Model
As shown in Fig. 1, we consider a UAV-enabled commu-
nication system where a rotary-wing UAV and a ground user
communicate with each other, while an eavesdropper attempts
to intercept their legitimate communications. Due to the lim-
ited capacity of the UAV, the performance of such secure
communication may be low. Thus, we use a building-mounted
RIS to assist the secure data transmission. It is assumed that
control and non-payload communications (CNPC) links3 are
constructed between the UAV, the RIS and the ground user
for the transmission of the control signals. Without loss of
generality, we assume that all communication nodes are placed
in the three dimensional (3D) Cartesian coordinate system. The
Fig. 1. A RIS-assisted UAV secure communication system.
ground user’s and the eavesdropper’s horizontal coordinates
are denoted by wG = [xG , yG ]T and wE = [xE , yE ]T ,
Under these assumptions, a robust joint design of the UAV’s respectively. The UAV is assumed to fly at a constant altitude
trajectory, RIS’s passive beamforming, and the transmit power denoted by zU for a given flight period denoted by T. For
control of the legitimate transmitter is formulated as a non- tractability, T is discretized into N time slots, namely, T =
convex joint UL/DL optimization problem for maximizing the N δt , where δt is the time slot length. Therefore, the UAV’s
average worst-case secrecy rate. The considered problem is time-varying horizontal trajectory is denoted as the sequence
difficult to solve due to its non-convexity. We first address its q[n] = [x[n], y[n]]T , n ∈ N  {1, · · · , N }, which should
non-smooth objective function and transform the formulated meet the following mobility constraints:
problem into an equivalent problem based on the results in [4]. ||q[n + 1] − q[n]||2 ≤ D2 , n = 1, · · · , N − 1, (1a)
For the reformulated problem, however the corresponding opti-
||q[N ] − qF ||2 ≤ D2 , q[1] = q0 , (1b)
mization variables are coupled, which leads to a non-convex
optimization problem. To tackle this difficulty, we propose an where q0 and qF are the predetermined initial and final
efficient algorithm based on the alternating optimization (AO) horizontal locations of the UAV, respectively, D = vmax δt
technique. More precisely, the reformulated problem is divided is the maximum horizontal distance that the UAV can fly in
into three sub-problems: 1) transmit power control design δt , and vmax is the maximum speed of the UAV. We assume
for a given UAV trajectory and passive beamforming design; that the UAV, the ground user, and the eavesdropper are
2) passive beamforming design for a given UAV trajectory equipped with a single-antenna. The RIS is equipped with
and transmit power control design; 3) UAV trajectory design M = Mx × Mz reflecting elements, forming an Mx × Mz
for a given passive beamforming and transmit power control uniform rectangular array (URA), and a controller that can
design. For sub-problem 1, we compute the optimal transmit intelligently adjust the phase shift of each element. The RIS
power control design according to the special structure of is located in the x-z plane, and its altitude and horizon-
the objective function. Then, for sub-problem 2, we utilize tal coordinates are denoted by zR and wR = [xR , yR ]T ,
the S-Procedure and successive convex approximation (SCA) respectively. Diag (x) denote a diagonal matrix in which each
techniques to handle the CSI uncertainty and the non-concave diagonal element is the corresponding element in x. The
objective function, respectively. Finally, it is challenging to diagonal phase-shift matrix
 for the RIS in the time slot n is
account for the CSI uncertainty and the small-scale fading denoted by Θ[n] = diag ejθ1 [n] , ejθ2 [n] , · · · , ejθM [n] , where
component of the channel between the UAV and RIS. To cope θi [n] ∈ [0, 2π) , i ∈ M  {1, · · · , M }, is the phase shift of
with these challenges, we use the UAV trajectory of the the ith reflecting element within a single time slot.
previous iteration to estimate the current small-scale fading To ensure the mutual communication between the UAV and
component of the channel between the UAV and RIS and the the ground user, we assume that the TDMA protocol is applied
worst-case setup of the eavesdropping links. Then, the SCA for them. Specifically, we utilize a weighted factor w ∈ [0, 1]
method is applied to solve the optimization sub-problem to divide a single flight time slot into two parts: wδt for the
efficiently. Simulation results demonstrate that our proposed DL transmission in which the UAV serves the ground user,
algorithm can significantly increase the average secrecy rate, and (1 − w) δt for the UL transmission in which the ground
as compared to benchmark algorithms. user uploads data that the UAV intends to harvest. The details
The remainder of this paper is organized as follows. are specified as follows.
In Section II, we present the system model and problem
3 CNPC links [40] with stringent latency and security requirements are
formulation. In Section III, we propose efficient algorithms
established in the UAV system for supporting safety-critical functions, such
based on the AO technique to solve the formulated joint as real-time control, collision and crash avoidance, and so on. From [41],
UL/DL optimization problem. Simulation results are illustrated it is known that the CNPC technique has been widely recognized, and the
in Section IV. Finally, we conclude the paper in Section V. corresponding development and standardization have been launched.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6405

1) DL Transmission: In this case, the UAV and the ground via the RIS (U-R-E link), which can be expressed as
node serve as the legitimate transmitter and receiver, respec-
tively. Let p[n] denote the transmit power of the UAV in time LURG [n] = ρ (dUR [n]dRG )−α , (5)
slot n. In practice, p[n] is usually subject to both average and −α
peak limits over time, denoted by P̄ and Ppeak , respectively. LURE [n] = ρ (dUR [n]dRE ) , (6)
Thus, the transmit power constraints are expressed as
where
1 
N
dRG = 2 + ||w − w ||2 ,
zR
p[n] ≤ P̄ , (2a) R G
N n=1
dRE = 2 + ||w − w ||2 ,
zR R E
0 ≤ p[n] ≤ Ppeak , ∀n. (2b)
ρ is the path loss at the reference distance D0 = 1 m, and α
We assume the Rician fading channel model for all com- is the path loss exponent for the U-R-G and the U-R-E links.
munication links. Hence, the small-scale fading component of For the direct links, namely, the U-G and the U-E links,
the link from the UAV to the RIS (U-R link) in the nth time the corresponding distance-dependent path loss models are
slot, denoted by hUR [n] ∈ CM×1 , can be expressed as given by
  −κ
hUR [n] =
βUR LoS
h [n] +
1
hNLoS , (3) LUG [n] = ρ (zU2 + ||q[n] − wG ||2 ) 2
, (7)
1 + βUR UR 1 + βUR UR −κ
LUE [n] = ρ (zU2 + ||q[n] − wE ||2 ) 2
, (8)
where βUR is the Rician factor of the U-R link, hLoS
UR [n] where κ is the path loss exponent for the U-G and the U-E
is the deterministic LoS component, and hNLoS
UR is the non- links.
LoS (NLoS) component which is modeled by the circularly With the above channel models, the received signal-to-noise
symmetric complex Gaussian (CSCG) distribution with zero ratios (SNRs) of the ground user and the eavesdropper in the
mean and unit variance. In particular, hLoS
UR [n] depends on nth time slot can be respectively expressed as
the UAV trajectory at time slot n, and it can be expressed
2
as [42], [43]
RG Θd [n]hUR [n]
p[n] LUG [n]hUG + LURG [n]hH
γUG [n] = ,
hLoS
UR [n] = ay [n] ⊗ ax [n], (4) σ2
(9)
2
where
RE Θd [n]hUR [n]
p[n] LUE [n]hUE + LURE [n]hH
 γUE [n] = ,

ax [n] = 1, e−j λ d cos φUR [n] sin ϕUR [n] , . . . , σ2
(10)

T
e−j λ (Mx −1)d cos φUR [n] sin ϕUR [n] , jθ1d [n] jθ2d [n] d
[n]
 where Θd [n] = diag e ,e ,··· ,e is thejθM

ay [n] = 1, e−j λ d sin φUR [n] sin ϕUR [n] , . . . , phase-shift matrix of the DL transmission in the time slot
T n and σ 2 is the noise variance. Thus, the achievable rates

e−j λ (Mz −1)d sin φUR [n] sin ϕUR [n] , in bits/second/Hertz (bps/Hz) at the ground user and the
eavesdropper in time slot n are respectively given by
zU − zR
sin φUR [n] sin ϕUR [n] = ,
dUR [n] RUG [n] = log2 (1 + γUG [n]), (11a)
xR − x[n] RUE [n] = log2 (1 + γUE [n]). (11b)
cos φUR [n] sin ϕUR [n] = ,
dUR [n]
2) UL Transmission: In this case, the ground user and
dUR [n] = )2
(zU − zR + ||q[n] − wR ||2
denotes the dis- the UAV serve as the legitimate transmitter and receiver,
tance between the UAV and the RIS in the nth time slot, respectively. Denote by g[n] the transmit power of the ground
φUR [n] and ϕUR [n] represent the azimuth and elevation angles user in time slot n. Similarly, g[n] is constrained by an average
of the LoS component in time slot n, respectively, d is the power limit Ḡ and a peak power limit Gpeak , i.e.,
antenna separation, and λ is the carrier wavelength. The
1 
N
small-scale fading components of the links from the RIS g[n] ≤ Ḡ, (12a)
to the ground user (R-G link), the RIS to the eavesdropper N n=1
(R-E link), the UAV to the ground user (U-G link), and the 0 ≤ g[n] ≤ Gpeak , ∀n. (12b)
UAV to the eavesdropper (U-E link) can be generated with
1×M
a similar procedure, and they are denoted as hH RG ∈ C , Since the ground user and the eavesdropper are both on the
1×M
hHRE ∈ C , h UG ∈ C, and h UE ∈ C, respectively. We use ground, we assume that the eavesdropping channel between
the distance-dependent path loss model in [44], [45] for the the ground user and the eavesdropper (G-E link) is modeled
reflected links, i.e., the links from the UAV to the ground user as a Rayleigh fading channel. Thus, the small-scale fading
via the RIS (U-R-G link) and the UAV to the eavesdropper component of the G-E link, denoted by hGE , is assumed to

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6406 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

be a zero-mean and unit-variance CSCG random variable. The where


distance-dependent path loss of the G-E link is given by  
LURE [n]hUR [n]
HE1 [n] = diag ,
− 2ς LUE [n]
LGE = ρ (||wG − wE ||2 ) , (13)  
LGRE hGR
HE2 = diag ,
where ς is the path loss exponent related to the G-E link. LGE
Similar to the DL transmission, the other channels in the  H  H
UL transmission are assumed to be Rician distributed, and hE1 = hH , h , h = h H
, h , and v d [n] =
RE UE E2 RE GE
thus, we omit their specific structures for brevity. The small-  d T
(vid [n] = ejθi [n] , ∀n, i). The
d
scale fading components of the links from the RIS to the v1 [n], v2d [n], · · · , vM
d
[n], 1
UAV, the ground user to the RIS, and the ground user to structure of v [n] is similar to v [n]. In particular, the links
u d

the UAV are denoted as hH 1×M related to the eavesdropper are hE1 and hE2 . Then, we utilize
RU [n] ∈ C , hGR ∈ CM×1 ,
hGU ∈ C, respectively. We still use LUG [n] and LURG [n] to a deterministic model to characterize the CSI uncertainty. Let
express the distance-dependent path loss models of the user- x denote the Euclidean norm of the complex-valued vector
RIS-UAV (G-R-U) link and user-UAV (G-U) link, respectively. x. The uncertainties of the eavesdropping channels in the DL
Therefore, the received SNRs of the UAV and the eavesdropper and UL transmissions are respectively modeled as4
in the nth time slot can be respectively written as
hE1 [n] = h̄E1 + ΔhE1 [n],
2  
g[n] LUG [n]hGU + LURG [n]hH
RU [n]Θu [n]hGR
Ω1  ΔhE1 [n] ∈ CM+1×1 : ΔhE1 [n] ≤ 1 , ∀n ,
γGU [n] = , (19a)
σ2
(14) hE2 [n] = h̄E2 + ΔhE2 [n],
2  
g[n] LGE hGE + LGRE hH
RE Θu [n]hGR
Ω2  ΔhE2 [n] ∈ CM+1×1 : ΔhE2 [n] ≤ 2 , ∀n ,
γGE [n] = , (19b)
σ2
(15)  H  H
H H
where h̄E1 = h̄RE , h̄UE and h̄E2 = h̄RE , h̄GE are
where
the estimated CSI, and ΔhE1 [n] and ΔhE2 [n] represent the
2 + ||w − w ||2 ) (z 2 + ||w − w ||2 )] −α
2 estimated errors for h̄E1 and h̄E2 , respectively. The continu-
LGRE = ρ [(zR R G R R E
ous sets Ω1 and Ω2 contain all possible CSI uncertainties with
is the large-scale fading component of the user- norms bounded by the uncertainty radii 1 and 2 , respectively.
RIS-eavesdropper
 u (G-R-E) link,  and Θu [n] =
diag ejθ1 [n] , ejθ2 [n] , · · · , ejθM [n] is the phase-shift matrix
u u

C. Problem Formulation
of the uplink transmission in the time slot n. Hence,
the achievable rates in bps/Hz from the ground user to the Based on (11) and (16), the worst-case secrecy rates in time
UAV and the eavesdropper in time slot n are respectively slot n in the DL and UL transmissions can be respectively
given by expressed as
 +
RGU [n] = log2 (1 + γGU [n]), (16a) Rsec [n] = RUG [n] −
down
max RUE [n] , (20a)
RGE [n] = log2 (1 + γGE [n]). (16b) ΔhE1 [n]∈Ω1
 +
Rsec [n] = RGU [n] −
up
max RGE [n] , (20b)
ΔhE2 [n]∈Ω2
B. CSI Assumption
In general, the legitimate transmitter is able to periodically where [x]+  max(x, 0). Hence, the average worst-case
update and refine the CSI of the legitimate receiver based secrecy rate of the joint UL/DL RIS-assisted UAV secure
on uplink pilots. In addition, some channel estimation tech- communication system is given by
niques [46]–[48] have been proposed for CSI acquisition in
1  
N
the presence of RISs recently. Based on these considerations,
we assume that the CSI of the legitimate links is perfectly Rsec = down
wRsec [n] + (1 − w) Rsec
up
[n] . (21)
N n=1
available in a central controller. However, the eavesdropper
usually avoids being detected and tracked by the legitimate Our objective is to maximize Rsec by jointly optimizing the
transmitter in order to intercept the legitimate communications. UAV’s trajectory Q  {q[n], n ∈ N }, the phase-shift matrices
Hence, the estimated CSI of the eavesdropping channels are Φd  {Θd [n], n ∈ N } and Φu  {Θu [n], n ∈ N } of the
usually not accurate at the central controller. For this reason, RIS, the UAV’s transmit power p  {p[n], n ∈ N }, and
we first rewrite γUE [n] and γGE [n] as the transmit power g  {g[n], n ∈ N } of the ground user.
p[n] H 2
γUE [n] = h H E1 [n]v d
[n] , (17) 4 Since the UAV’s location is time-varying, the worst-case setup of the
σ2 E1
eavesdropping channels is also time-varying along with the UAV’s location.
g[n] 2 Thus, we add time slot index n to change ΔhE1 to ΔhE1 [n]. Similarly,
γGE [n] = 2 hH E2 HE2 v [n] ,
u
(18) we change ΔhE2 to ΔhE2 [n], hE1 to hE1 [n], and hE2 to hE2 [n].
σ

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6407

Therefore, the problem can be formulated as A. Solution to Sub-Problem 1


For any given Q, Φd , and Φu , we have
max Rsec (22a)
Q,Φd ,Φu
p,g hHG1HG1[n]v [n] = LUG [n]hUG +LURG [n]hRG Θd [n]hUR [n],
d H

s.t. 0 ≤ θid [n] < 2π, ∀n, i, (22b) hH u


G2[n]HG2[n]v [n]= LUG [n]hGU
0≤ θiu [n] < 2π, ∀n, i, (22c) + LURG [n]hH
RU [n]Θu [n]hGR ,
(1), (2), (12).
where
 
It is observed that the constraints of problem (22) are all LURG [n]hUR [n]
HG1 [n] = diag ,
convex. However, it is still difficult to solve problem (22) since LUG [n]
 
the objective function of problem (22) is highly non-concave LURG [n]hGR
with respect to Q, Φd , Φu , p, and g. In the next section, HG2 [n] = diag ,
LUG [n]
we develop an efficient algorithm to solve problem (22).  H  H
hG1 = hH RG , hUG , and hG2 [n] = hHRU [n], hGU . Then,
III. P ROPOSED S OLUTION FOR J OINT sub-problem 1 can be expressed as
UL/DL O PTIMIZATION 1   power 
N
max wRdown [n] + (1 − w) Rup
power
[n] (24)
In this section, we focus on solving the joint UL/DL opti- p,g N n=1
mization problem (22). Based on Lemma 1 in [4], it is known s.t. (2), (12),
that the transmit power control design can guarantee RUG [n]−
max RUE [n] ≥ 0 and RGU [n] − max RGE [n] ≥ 0, where
ΔhE1 ∈Ω1 ΔhE2 ∈Ω2
power
since the optimal transmit power of the UAV and the ground Rdown [n]
 
user in time slot n, denoted as pop [n] and g op [n], respectively, p[n] H 2
are zero once the quality of the eavesdropping channels is = log2 1 + 2 hG1 HG1 [n]v [n] d
σ
better than that of the legitimate channels in time slot n.  
p[n] H 2
Therefore, we reformulate problem (22) as − log2 1 + max h [n]H E1 [n]v d
[n]
ΔhE1 [n]∈Ω1 σ 2
E1

1  
N
and
max down
wR̃sec [n] + (1 − w) R̃sec
up
[n] (23)
Q,Φd ,Φu
p,g
N n=1 power
Rup [n]
 
s.t. (1), (2), (12), (22b), (22c), g[n] H 2
= log2 1 + 2 hG2 [n]HG2 [n]v [n] u
σ
where  
2
  g[n] H
− log2 1 + max hE2 [n]HE2 v [n]
u
.
down
R̃sec [n] = RUG [n] − max RUE [n] ΔhE2 [n]∈Ω2 σ 2
ΔhE1 [n]∈Ω1
Infinitely many possible CSI uncertainties in Ω1 and Ω2
and make problem (24) intractable. However, the special struc-
  ture of hH E1 [n]HE1 [n]v [n] and hE2 [n]HE2 v [n] can be
d H u
up
R̃sec [n] = RGU [n] − max RGE [n] . utilized to address this problem. Let arg (x) denote the phase
ΔhE2 [n]∈Ω2
angle vector of x, in which each element is the phase angle of
As a result, the non-smoothness of problem (22) is addressed, the corresponding element in x. We first have the following
and there exists no performance loss in this step. However, inequality:
problem (23) is still difficult to solve due to the coupled H
optimization variables Q, Φd , Φu , p, and g in the objective E1 [n]HE1 [n]v [n] ≤ h̄E1 HE1 [n]v [n]
hH d d

function. To cope with this difficulty, we propose an efficient


algorithm based on the AO method. Specifically, we divide + ΔhH d
E1 [n]HE1 [n]v [n] ,

problem (23) into three sub-problems: where the equality holds if and only if
1) The optimization of the transmit power p and g under H
the given UAV trajectory Q and phase-shift matrices Φd arg h̄E1 HE1 [n]v d [n] = arg ΔhH d
E1 [n]HE1 [n]v [n] .

and Φu (referred to as sub-problem 1); 2


2
2) The optimization of the phase-shift matrices Φd and Φu Thus, max p[n] hH d
E1 [n]HE1 [n]v [n] /σ can be
ΔhE1 [n]∈Ω1
under the given UAV trajectory Q and transmit power p transformed into
and g (referred to as sub-problem 2); 2
3) The optimization of the UAV trajectory Q under the given max ΔhH d
E1 [n]HE1 [n]v [n] (25a)
ΔhE1 [n]
phase-shift matrices Φd and Φu and transmit power p
s.t. ΔhE1 [n] ≤ 1 , (25b)
and g (referred to as sub-problem 3). H
The details are presented in the next three subsections, and arg h̄E1 HE1 [n]v d [n] = arg ΔhH d
E1 [n]HE1 [n]v [n] .
subsequently the overall algorithm is summarized. (25c)

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6408 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

To facilitate the subsequent derivations, ΔhE1 [n] can be where


expressed as
 power
R̃down [n] = log2 (1 + p[n]a1 [n]) − log2 (1 + p[n]b1 [n]) ,
ΔhE1 [n] = |ΔhE1,1 [n]| ejτ1 [n] , |ΔhE1,2 [n]| ejτ2 [n] , · · · , power
R̃up [n] = log2 (1 + g[n]a1 [n]) − log2 (1 + g[n]b2 [n]) ,

2
|ΔhE1,M+1 [n]| ejτM +1 [n] , (26) hH
G1 HG1 [n]v [n]
d
a1 [n] = ,
where |ΔhE1,k [n]| and τk [n] are the magnitude and phase σ2
angle of the kth element of ΔhE1 [n] in time slot n, respec- 2
H
(hop
E1 [n]) HE1 [n]v [n]
d
tively, and k ∈ K = {1, · · · , M +1}. Let c[n] = HE1 [n]v d [n]. b1 [n] = ,
Similarly, c[n] can be expressed as σ2
  2
c[n] = |c1 [n]|ejψ1 [n] , |c2 [n]|ejψ2 [n] , · · · , |cM+1 [n]|ejψM +1 [n] , hH u
G2 [n]HG2 [n]v [n]
a2 [n] = ,
(27) σ2
2
H
(hop
E2 [n]) HE2 v [n]
u
where |ck [n]| and ψk [n] are the magnitude and phase angle
b2 [n] =
of the kth element of c[n] in time slot n, respectively. Hence, σ2
ΔhH d
E1 [n]HE1 [n]v [n] can be given by hop op op op
E1 [n] = h̄E1 + ΔhE1 [n], and hE2 [n] = h̄E2 + ΔhE2 [n].
ΔhH d
E1 [n]HE1 [n]v [n] Similar to sub-problem 1 in [4], the optimal solution of (33)
= ΔhH is given by
E1 [n]c[n]

= |ΔhE1,1 [n]||c1 [n]|ej(ψ1 [n]−τ1 [n]) + · · · +
min [p̃[n]] , Ppeak , a1 [n] > b1 [n]
+ |ΔhE1,M+1 [n]||cM+1 [n]|ej(ψM +1 [n]−τM +1 [n]) . (28) pop [n] = , (34a)
0, a1 [n] ≤ b1 [n]

It is known that the maximum of ΔhH d
E1 [n]HE1 [n]v [n] +
min [g̃[n]] , Gpeak , a2 [n] > b2 [n]
op
can be obtained when all the items in the last step of (28) g [n] = , (34b)
can be coherently added. Hence, we have ψ1 [n] − τ1 [n] = 0, a2 [n] ≤ b2 [n]
ψ2 [n] − τ2 [n] = · · · = ψM+1 [n] − τM+1 [n]. Then, based on where
the constraints in (25c), it is not difficult to show that the  2  
optimal τk [n], denoted as τkop [n], is given by 1 1 1 1 1
p̃[n] = − + −
H
τkop [n] = ψk [n] − arg h̄E1 HE1 [n]v d [n] . (29) 2b1 [n] 2a1 [n] 1 ln 2 b1 [n] a1 [n]
1 1
As such, problem (25) can be transformed into − − , (35a)
2b [n] 2a1 [n]
2
 1 2  
max mT1 [n]m2 [n] (30a) 1 1 1 1 1
m1 [n] g̃[n] = − + −
s.t. m1 [n] ≤ 1 , (30b) 2b2 [n] 2a2 [n] 2 ln 2 b2 [n] a2 [n]
1 1
where − − . (35b)
2b2 [n] 2a2 [n]
T
m1 [n] = [|ΔhE1,1 [n]|, |ΔhE1,2 [n]|, · · · , |ΔhE1,M+1 [n]|] Note that 1 ≥ 0 and 2 ≥ 0 in (35) can be obtained via
and a one-dimensional bisection search, which guarantees that the
constraints in (2a) and (12a) are fulfilled when pop [n] and
m2 [n] = [|c1 [n]|, |c2 [n]|, · · · , |cM+1 [n]|] . g op [n] are attained, respectively.
It is not difficult to show that the optimal m1 [n], denoted as
mop1 [n] is given by B. Solution to Sub-Problem 2
1
mop1 [n] = m2 [n]. (31) For any given p, g, and Q, with the aid of the slack variables
m2 [n]
ξ1 = {ξ1 [n]}N
n=1 and ξ2 = {ξ2 [n]}n=1 , sub-problem 2 can
N
Therefore, the optimal ΔhE1 [n], denoted as Δhop E1 [n], is be expressed as
 op op op

jτ1 [n] jτ2 [n] jτM +1 [n]
Δhop · · · mop
1  
E1 [n] = diag e , e , , e 1 [n]. N
phi
(32) max wRdown [n] + (1 − w) Rup
phi
[n] (36a)
vd [n],vu [n], N n=1
ξ1 [n],ξ2 [n]
Δhop
E2 [n] can also be obtained by using the above solution. p[n] H 2
With Δhop op
E1 [n] and ΔhE2 [n], problem (24) can be rewritten
s.t. max hE1 [n]HE1 [n]v d [n] ≤ ξ1 [n], ∀n,
ΔhE1 [n]∈Ω1 σ2
as
(36b)
1  
N
g[n] H 2
power
max wR̃down [n] + (1 − w) R̃up
power
[n] (33) max hE2 [n]HE2 v u [n] ≤ ξ2 [n], ∀n, (36c)
p,g N n=1 ΔhE2 [n]∈Ω2 σ 2

s.t. (2), (12), |vid [n]|, |viu [n]| = 1, ∀n, i, (36d)

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6409

where to relax the constraints. We have


  2
2
phi p[n] G1 HG1 [n]v [n]
hH d
= hH
G1 HG1 [n]V [n]HG1 [n]hG1
d H
Rdown [n] = log2 1 + 2 hH H
G1 G1 [n]v d
[n]
σ
− log2 (1 + ξ1 [n]) = Tr V d [n]A1 [n]
2
and hH
G2 [n]HG2 [n]v [n] = hG2 [n]HG2 [n]V [n]HG2 [n]hG2 [n]
u H u H

  = Tr (V u [n]A2 [n]) ,
g[n] H 2
phi
Rup [n] = log2 1 + 2 hG2 [n]HG2 [n]v [n]
u
σ where
− log2 (1 + ξ2 [n]) . A1 [n] = HH
G1 [n]hG1 hG1 HG1 [n],
H

It is difficult to solve problem (36), since the constraints in A2 [n] = HH H


G2 [n]hG2 [n]hG2 [n]HG2 [n],
(36b) and (36c) involve infinitely many inequality constraints. and Tr (X) denotes the trace of X. Thus, problem (36) can
To overcome this difficulty, we first substitute (19a) and (19b) be reformulated as
into (36b) and (36c), respectively, and obtain
1  
N
phi
2 max wR̃down [n] + (1 − w) R̃up
phi
[n]
ΔhH E1 [n]ΔhE1 [n] − 1 ≤ 0, ∀n (37a) V d [n],V u [n],ξ1 [n], N
ξ2 [n],η1 [n],η2 [n] n=1
2
ΔhE2 [n]ΔhE2 [n] − 2 ≤ 0, ∀n
H
(37b) (45a)
p[n] H s.t. η1 [n], η2 [n] ≥ 0, ∀n,
h [n]HE1 [n]V [n]HE1 [n]hE1 [n] − ξ1 [n] ≤ 0, ∀n,
d H (45b)
σ 2 E1
(37c) V d [n], V u [n] 0, ∀n, (45c)
g[n] H V dr,r [n], V ur,r [n] = 1, r = 1, · · · , M + 1, ∀n, (45d)
h [n]HE2 V [n]HE2 hE2 [n] − ξ2 [n] ≤ 0, ∀n, (37d)
u H
σ 2 E2 (40),
H H where
where V d [n] = v d [n]v d [n] and V u [n] = v u [n]v u [n] . The  
ranks of V d [n] and V u [n] are one. Then, we transform the phi p[n]
R̃down [n] = log2 1 + 2 Tr V [n]A1 [n]
d
constraints in (36b) and (36c) into linear matrix inequalities σ
(LMIs) by using the following lemma. − log2 (1 + ξ1 [n]) ,
Lemma 1 (S-Procedure [39]): Let a function fm (x), m ∈  
phi g[n] u
{1, 2}, x ∈ CN ×1 , be defined as R̃up [n] = log2 1 + 2 Tr (V [n]A2 [n])
σ
fm (x) = xH Bm x + 2Re{bH − log2 (1 + ξ2 [n]) ,
m x} + bm , (38)
and V dr,r [n] and V ur,r [n] denote the (r, r)th element of V d [n]
where Bm ∈ HN , bm ∈ CN ×1 , and bm ∈ R1×1 . Then, and V u [n], respectively. It is still difficult to obtain the
the implication f1 (x) ≤ 0 ⇒ f2 (x) ≤ 0 hold if and only optimal solution of problem (45), since − log2 (1 + ξ1 [n]) and
if there exists a δ ≥ 0 such that − log2 (1 + ξ2 [n]) are not concave with respect to ξ1 [n] and
    ξ1 [n], respectively. Nevertheless, it is known that the first-
B1 b1 B2 b 2
δ − 0, (39) order Taylor expansion of a concave function is its global
b1 b1
H
b 2 b2
H
over-estimator and that of a convex function is its global under-
provided that there exists a point x̂ such that fm (x̂) < 0. estimator. Therefore, we apply the SCA method to solve prob-
Using Lemma 1, the following implications can be obtained: lem (45). The first-order Taylor expansions of log2 (1 + ξ1 [n])
(37a) ⇒ (37c) and (37b) ⇒ (37d) holds if and only if there and log2 (1 + ξ2 [n]) at the given points ξ1,0 = {ξ1,0 [n]}N n=1
exist η1 [n] ≥ 0 and η2 [n] ≥ 0 such that and ξ2,0 = {ξ2,0 [n]}N n=1 can be respectively expressed as
log2 (1 + ξ1 [n]) ≤ log2 (1 + ξ1,0 [n])
U 1 [n] − U 2 [n] 0, (40a) 1
U 3 [n] − U 4 [n] 0, (40b) + (ξ1 [n] − ξ1,0 [n]) ,
ln 2 (1 + ξ1,0 [n])
(46)
where
  log2 (1 + ξ2 [n]) ≤ log2 (1 + ξ2,0 [n])
η1 [n]IM+1 0 1
U 1 [n] = , (41) + (ξ2 [n] − ξ2,0 [n]) .
0 −η1 [n]21 + ξ1 [n] ln 2 (1 + ξ2,0 [n])
 
η2 [n]IM+1 0 (47)
U 3 [n] = , (42)
0 −η2 [n]22 + ξ2 [n]
Then, problem (45) can be approximated as
IM+1 denotes the (M + 1) × (M + 1) identity matrix, and 1  
N
phi
U 2 [n] and U 4 [n] are given in (43) and (44), shown at the max wR̂down [n] + (1 − w) R̂up
phi
[n]
V d [n],V u [n],ξ1 [n], N n=1
bottom of the next page, respectively. Since the unit-modulus ξ2 [n],η1 [n],η2 [n]

constraints in (36d) are non-convex, we apply the SDR method s.t. (40), (45b), (45c), (45d), (48)

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6410 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

where that hLoS


UR [n] is complex and non-linear with respect to the
  UAV trajectory variables, which makes the UAV trajectory
phi p[n]
R̂down [n] = log2 1 + 2 Tr V d [n]A1 [n] design intractable. To handle such difficulty, we use the UAV
σ
trajectory of the (j − 1)th iteration to obtain an approximate
ξ1 [n]
− hLoS
UR [n] in the jth iteration. Similarly, the LoS component of
ln 2 (1 + ξ1,0 [n]) hRU [n] in the jth iteration is also designed by using the UAV
and trajectory of the (j − 1)th iteration. Then, we can rewritten
  problem (49) as
g[n]
phi
R̂up [n] = log2 1 + 2 Tr (V u [n]A2 [n])
1 
N
σ
ξ2 [n] max (1−w) log2 1+ργ1[n]hTue [n]HGQ [n]hue [n]
Q N n=1
− .
ln 2 (1 + ξ2,0 [n]) traj 
+ wṘdown [n] (50)
It is observed that problem (48) is a convex optimization s.t. (1),
problem, and thus can be solved efficiently by using standard
solvers, such as the CVX. However, we emphasize that a rank- where
one solution may not be obtained. Hence, we use the Gaussian traj
Ṙdown [n] = log2 1 + ργ0 [n]hTue [n]HQG [n]hue [n]
randomization method [23] to recover v d [n] and v u [n] from
V d [n] and V u [n], respectively, which is similar to that in [23] − log2 1 + ργ0 [n]hTst [n]HQE [n]hst [n] , (51)
and thus omitted here for brevity.  T
hue [n] = (dUG [n])−κ , (dUR [n])−α , (52)
 T
C. Solution to Sub-Problem 3
hst [n] = (dUE [n])−κ , (dUR [n])−α , (53)
For any given Φd , Φu , p, and g, we can express sub-
problem 3 as HQG [n], HGQ [n], and HQE [n] are given in (54), (55), and
(56), respectively, shown at the bottom of the next page;
N   
1  g[n] H 2 (j−1)
γ0 [n] = p[n]/σ 2 , γ1 [n] = g[n]/σ 2 , and hUR [n] and
max (1−w) log2 1+ 2 hG2 [n]HG2 [n]v [n]
u
(j−1)
Q N n=1 σ hRU [n] are the designed hUR [n] and hRU [n], respectively,
 by using the UAV trajectory of the (j − 1)th iteration. Note
traj
+ wRdown [n] (49) that problem (50) is not a convex problem due to the non-
concave objective function with respect to the UAV trajectory
s.t. (1), N
Q. By introducing the slack variables u = {u[n]}n=1 , e =
N N N N
where {e[n]}n=1 , s = {s[n]}n=1 , t = {t[n]}n=1 , ζ = {ζ[n]}n=1 ,
  N N
rd = {rd [n]}n=1 , and ru = {ru [n]}n=1 , we transform
p[n] 2
traj
Rdown [n] = log2 1+ 2 hH H
G1 G1 [n]v d
[n] problem (50) into the following problem,
σ
 
1   traj 
2 N
p[n] H
− log2 1+ max h H
E1 E1 [n]v d
[n] . max wR̃down [n]+(1−w) log2 (1+ργ1[n]ru [n])
ΔhE1 ∈Ω1 σ 2 Q,u,e,s, N n=1
t,ζ,r ,ru
d

In particular, RGE [n] is not relevant to the UAV trajectory, (57a)


and so we omit it in problem (49). It is challenging to cope s.t. (dUG [n])−κ ≥ u[n], ∀n, (57b)
with the infinitely many ΔhE1 . However, we note that the
(dUR [n])−α ≥ e[n], ∀n, (57c)
worst case of the objective function is obtained when the UAV
trajectory is given, and the UAV trajectory can be optimized (dUE [n])−κ ≤ s[n], ∀n, (57d)
when the worst case of the wiretap channels, i.e., hop E1 [n], (dUR [n])−α ≤ t[n], ∀n, (57e)
is given. Hence, we utilize the UAV trajectory of the (j − 1)th T
ργ0 [n]h̃st [n]HQE [n]h̃st [n] ≤ ζ[n], ∀n, (57f)
iteration to calculate the worst case setup for the wiretap T
channels hopE1 [n] in the jth iteration, and this is obtained by h̃ue [n]HQG [n]h̃ue [n] ≥ rd [n], ∀n, (57g)
using a procedure similar to (32). Besides, from (4)-(8), it is T
h̃ue [n]HGQ [n]h̃ue [n] ≥ ru [n], ∀n, (57h)
worth noting that not only LUG [n], LUE [n], LURG [n], and
LURE [n] but also hLoS s[n] ≤ (zU − zE )−κ , t[n] ≤ (zU − zR )−α , ∀n,
UR [n] is relevant to the UAV trajectory.
However, from the structure of hLoS UR [n] in (4), it is observed (1), (57i)

 
p[n] HE1 [n]V d [n]HH E1 [n] HE1 [n]V d [n]HHE1 [n]h̄E1
U 2 [n] = 2 H H (43)
σ h̄E1 HE1 [n]V [n]HE1 [n] h̄E1 HE1 [n]V d [n]HH
d H
E1 [n]h̄E1
 
g[n] HE2 V u [n]HH HE2 V u [n]HH
E2 h̄E2
U 4 [n] = 2 H
E2
H (44)
σ h̄E2 HE2 V [n]HE2 h̄E2 HE2 V u [n]HH
u H
E2 h̄E2

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6411

traj
where R̃down [n] = log2 (1 + ργ0 [n]rd [n]) − log2 (1 + ζ[n]), Algorithm 1 Proposed Algorithm for Solving Problem (22)
T T
h̃ue [n] = [u[n], e[n]] , and h̃st [n] = [s[n], t[n]] . The 1: Initialization:
constraint (57i) gives the upper bounds of s[n] and t[n]. This is Set the initial feasible points Ξ0 =
because the maximums of (dUE [n])−κ and (dUR [n])−α (0)
{Q(0) , Φd , Φ(0) (0)
, g(0) , u0 , e0 , ξ 1,0 , ξ 2,0 , ζ 0 }.
u ,p Set
are given by (zU − zE )−κ and (zU − zR )−α when the iteration index j = 0 and Rsec .
(0)
UAV hovers above the eavesdropper and the RIS, respec- 2: repeat
tively. Hence, we have s[n] ≤ (zU − zE )−κ and t[n] ≤ 3: Set j ← j + 1;
(zU − zR )−α . In order to facilitate the subsequent deriva- 4: With given Q(j−1) , p(j−1) , g(j−1) , Φd
(j−1)
, Φ(j−1) , u0 ,
u
tions, we unfold (57b)-(57e) as follows, e0 , and ζ 0 , update Q(j) , u(j) , e(j) ,
x2 [n] + x2G + y 2 [n] + yG
2
− 2xG x[n] − 2yG y[n] and ζ (j) by solving problem (60);
(j)
−4 5: Set u0 = u(j) , e0 = e(j) , and ζ 0 = ζ ;
+ zU2 − (u[n]) κ ≤ 0, ∀n, (58a) 6: With given Q(j) , p(j−1) , g(j−1) , ξ 1,0 , and ξ 2,0 , update
x2 [n] + x2R + y 2 [n] + yR
2
− 2xR x[n] − 2yR y[n] (j)
Φd , Φ(j)
(j) (j)
4
u , ξ 1 , and ξ 2 by solving
−α
+ (zU − zR )2 − (e[n]) ≤ 0, ∀n, (58b) problem (48);
(j) (j)
4
−κ 2 7: Set ξ 1,0 = ξ 1 and ξ 2,0 = ξ 2 ;
(s[n]) − x [n] − x2E 2
− y [n] − 2
yE + 2xE x[n] (j) (j)
8: With given Q(j) , Φd , and Φu update p(j) and g(j) by
+ 2yE y[n] − zU2 ≤ 0, ∀n, (58c)
4
−α
using (34);
2
(t[n]) − x [n] − x2R 2
− y [n] − 2
yR + 2xR x[n] (j) (j)
9: With given Q(j) , Φd , Φu , p(j) , and g(j) , compute
2 (j)
+ 2yR y[n] − (zU − zR ) ≤ 0, ∀n. (58d) Rsec ;
(j) (j−1)
10: until: Rsec − Rsec ≤ c or j > jmax .
It is observed that the constraints (58a)-(58d) are non-convex
feasible regions, and − log2 (1 + ζ[n]) is non-concave with
respect to ζ[n]. We use the SCA technique to address the non-
convexity of these constraints. The first-order Taylor expan-
−4 −4
sions of −x2 [n], −y 2 [n], (u[n]) κ , (e[n]) α , log2 (1 + ζ[n]),
T T
h̃ue [n]HQG [n]h̃ue [n], and h̃ue [n]HGQ [n]h̃ue [n] at the given
N N
feasible points x0 = {x0 [n]}n=1 , y0 = {y0 [n]}n=1 , u0 =
N N N
{u0 [n]}n=1 , e0 = {e0 [n]}n=1 , ζ 0 = {ζ0 [n]}n=1 , and
 N
Hue,0 = h̃ue,0 [n] are given by
n=1
T
h̃ue [n]HQG [n]h̃ue [n]
T
 T 
≥ −h̃ue,0 [n]HQG [n]h̃ue,0 [n] +2 h̃ue,0 [n]HQG [n]h̃ue [n] ,
(59a)
T
h̃ue [n]HGQ [n]h̃ue [n]
T
 T  Fig. 2. Average worst-case secrecy rate versus iteration number.
≥ −h̃ue,0 [n]HGQ [n]h̃ue,0 [n] +2 h̃ue,0 [n]HGQ [n]h̃ue [n] ,
(59b)
− x2 [n] ≤ x20 [n] − 2x0 [n]x[n], (59f)
log2 (1 + ζ[n]) 2
− y [n] ≤ y02 [n] − 2y0 [n]y[n]. (59g)
1
≤ log2 (1 + ζ0 [n]) + (ζ[n] − ζ0 [n]) , (59c)
ln 2 (1 + ζ0 [n])
4
−κ −4 4 − 4 −1 Accordingly, problem (57) can be approximately trans-
(u[n]) ≥ (u0 [n]) κ − (u0 [n]) κ (u[n] − u0 [n]) , formed into
κ
(59d) 1   traj 
N
4
−α −α4 4 −α4
−1 max wR̂down [n]+(1−w)log2 (1+ργ1 [n]ru [n])
(e[n]) ≥ (e0 [n]) − (e0 [n]) (e[n] − e0 [n]) , Q,u,e,s, N
t,ζ,r ,ru
α d n=1
(59e) (60a)

 H  
(j−1) (j−1)
HQG [n] = hHUG , (dRG )−α (hUR [n])H ΘH d [n]hRG hHUG , (dRG )−α (hUR [n])H ΘH d [n]hRG (54)
 H  
HGQ [n] = hH , (d )−α hH ΘH [n]h(j−1) [n] h H
, (d )−α hH ΘH [n]h(j−1) [n] (55)
GU RG GR u RU GU RG GR u RU
 op  op H
hUE [n] hUE [n]
HQE [n] = H (j−1) H (j−1) (56)
(dRE )−α (hop
RE [n]) Θd [n]hUR [n] (dRE )−α (hopRE [n]) Θd [n]hUR [n]

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6412 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

Fig. 3. UAV trajectories by using different algorithms with T = 124 s, δa2 = 0.5, P̄ = Ḡ = 20 dBm, and w = 0.5.

s.t. x2 [n]+x2G +y 2 [n]+yG


2
−2xG x[n]−2yGy[n]+zU2 Problem (60) is a convex optimization problem, and thus the
 
4 −4 4 − 4−1 CVX solver can be used to obtain the solution.
− 1+ (u0 [n]) κ + (u0 [n]) κ u[n] ≤ 0, ∀n, (60b)
κ κ
  D. Overall Algorithm
4 4
x2 [n]+x2R +y 2 [n]+yR
2
−2xR x[n]− 1+ (e0 [n])− α With the proposed solutions to the three sub-problems,
α
4 4
−α −1
the overall algorithm for solving problem (22) is summarized
2
− 2yR y[n]+(zU −zR ) + (e0 [n]) e[n] ≤ 0, ∀n, in Algorithm 1, where c is used to control the accuracy
α
(60c) of convergence, and jmax denotes as the maximum number
4
−κ of iterations. Solving sub-problem 2 and sub-problem 3 by
(s[n]) +x20 [n]−2x0 [n]x[n]−x2E +y02 [n]−2y0 [n]y[n]
2
using the interior-point method dominates the complexity of
− yE +2xE x[n]+2yE y[n]−zU2 ≤ 0, ∀n, (60d) Algorithm 1. Based on the results in [28] and [49], the com-
4
−α
(t[n]) +x20 [n]−2x0 [n]x[n]−x2R +y02 [n]−2y0[n]y[n] putational complexities of solving sub-problem 2 and sub-
− yR 2
+2xR x[n]+2yRy[n]−(zU −zR )2 ≤ 0, ∀n, (60e) problem 3 are
T
√ 3
rd [n]+ h̃ue,0 [n]HQG [n]h̃ue,0 [n] Osub2 2 M + 1 log (1/c) 2N (M + 1)
 T 
− 2 h̃ue,0 [n]HQG [n]h̃ue [n] ≤ 0, ∀n, (60f) +4N 2 (M + 1)2 + 8N 3
T
ru [n]+ h̃ue,0 [n]HGQ [n]h̃ue,0 [n] 3.5
and Osub3 (8N ) log (1/c) , respectively. Hence,
 T 
− 2 h̃ue,0 [n]HGQ [n]h̃ue [n] ≤ 0, ∀n, (60g) the overall complexity of solving problem (22) is
Osub2 + Osub3 . Furthermore, as shown in Fig. 2, we observe
(1), (57f), (57i),
that the proposed algorithm can quickly converge.
where IV. S IMULATION R ESULTS
traj ζ[n] In this section, we present simulation results to verify the
R̂down [n] = log2 (1 + ργ0 [n]rd [n]) − .
ln 2 (1 + ζ0 [n]) validity of the proposed algorithm (denoted as JO) for the joint

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6413

Fig. 4. Upper figure: UAV speed (m/s) versus N for the JO algorithm; middle
figure: UAV speed (m/s) versus N for the JO/NR algorithm; lower figure: UAV Fig. 5. Average worst-case sccrecy rate performance by different algorithms
speed (m/s) versus N for JO/NPB algorithm. The system parameters are set versus T .
as T = 124 s, δa2 = 0.5, P̄ = Ḡ = 20 dBm, and w = 0.5.

UL/DL optimization. The following benchmark algorithms are


used for comparison:
• Robust design of the UAV trajectory and transmit power
without passive beamforming (denoted as JO/NPB).
• Robust design of the heuristic trajectory, transmit power,
and passive beamforming (denoted as JO/HT).
• Non-robust design of the UAV trajectory, passive beam-
forming, and transmit power (denoted as JO/NR).
Specifically, “heuristic trajectory” refers to a preset trajectory
where the UAV first flies directly to the ground user at the
maximum speed, then hovers above the user as long as Fig. 6. Average worst-case secrecy rate versus the maximum normalized
channel estimation error variance.
possible, and finally flies to the final location at its maximum
speed for the rest of the flight time. Also, for the considered
JO/NR algorithm, the estimated CSI of the eavesdropping the average worst-case secrecy rate increases by increasing the
channels is the exact CSI. Hence, it is a special case of our flight time T .
proposed algorithm that is obtained by setting 1 = 2 = 0. In Fig. 3, we illustrate the UAV trajectories for different
From the definitions of the uncertainty radii 1 and 2 algorithms by setting T = 124 s, δa2 = 0.5, P̄ = Ḡ = 20 dBm,
in [28], the maximum normalized estimation error of the and w = 0.5. Fig. 3(a), Fig. 3(b), and Fig. 3(c) show more
eavesdropping links is defined as δl = l /h̄El , where than 100 UAV trajectories5 by using the JO, JO/NPB and
l ∈ {1, 2}. Since the UAV usually flies higher than the RIS, JO/NR algorithms, respectively, when T is sufficiently large
the ground user and the eavesdropper in the DL transmission, (e.g., T = 124 s). In Fig. 4, we show the UAV speed during a
the Rician factors for the U-G and U-E links are set to period of T = 124 s for different algorithms.6 From Fig. 3 and
βUG = βUE = 10 dB, while the Rician factors for the R-G, Fig. 4, it is observed that, for all the algorithms, the UAV first
R-E, and U-R links are set to βUR = βRG = βRE = 3 dB. flies to a certain location at Vmax , then keeps static, and finally
The corresponding Rician factors in the UL transmission are flies to the final location at Vmax . However, as for the JO/NPB
similar to the DL transmission, i.e., βGU = 10 dB and βRU = algorithm, the UAV first flies directly to a certain location
βGR = βGE = 3 dB. The initial feasible solutions of our where the UAV is close to the ground user and away from the
proposed JO algorithm is given by the JO/HT algorithm. The eavesdropper as possible as it can, then hovers as long as pos-
remaining parameters are as follows: q0 = [−500, 20]T m, sible, and finally flies along a relatively direct path to the final
qF = [500, 20]T m, wG = [0, 120]T m, wE = [200, 150]T m, location in order to avoid being eavesdropped. By contrast, for
wR = [0, 0]T m, zU = 100 m, zR = 40 m, vmax = 30 m/s, the JO and JO/NR algorithms, the UAV tends to fly along an
δt = 0.4 s, M = Mx × My = 6 × 5, σ 2 = −80 dBm, arc path to a certain location between the ground user and the
d = λ2 , α = 2.2, κ = 3.3, ς = 3.4, ρ = −30 dB, c = 10−3 , RIS, then it hovers as long as possible, and finally reaches the
jmax = 40, Ppeak = 4P̄ , and Gpeak = 4Ḡ. In paticular, we final location. This is because the JO and JO/NR algorithms
assume that all wiretap channels have the same maximum
5 Since all channels are modeled by the Rician fading channel model,
normalized estimation error variance, namely, δ1 = δ2 = δa .
the optimized UAV trajectories in different random independent realizations
Fig. 2 plots the average worst-case secrecy rate of the of all channels are different. Hence, for different algorithms, we draw more
proposed algorithm versus the number of iterations under than 100 UAV trajectories to show the general trajectory trends of them.
different flight periods with w = 0.5, δa2 = 0.5 and
6 Unlike Fig. 3, for different algorithms, we only show the UAV speed versus
N for different algorithms under a certain random realization. This is because
P̄ = Ḡ = 20 dBm. It is observed that our proposed for each algorithm, the curves of the UAV speed remain almost the same under
algorithm can quickly converge after around 10 iterations, and different random realizations.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6414 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

Fig. 7. UAV trajectories of the JO algorithm by different w with T = 124 s, δa2 = 0.5, P̄ = Ḡ = 20 dBm.

balance the channel gains between the direct links (i.e., the U- and transmit power can still achieve a considerable gain,
G, U-E, G-U, and G-E links) and reflecting links (i.e., the U-R- as compared with the counterpart schemes.
G, U-R-E, G-R-U, and G-R-E links) in each time slot in order In Fig. 6, we investigate the average worst-case secrecy rates
to choose a trajectory, so as to achieve the best communication for different algorithms versus δa2 with w = 0.5, T = 124 s,
quality. Besides, since the JO algorithm takes the CSI uncer- and P̄ = Ḡ = 20 dBm. We observe that the average worst-
tainty into account, the UAV trajectories of the JO algorithm case secrecy rates of all the algorithms decrease as the CSI
under different channel realizations are more decentralized uncertainty of the wiretap channels increases. This is because
than those of the JO/NR algorithm under different channel large values of the CSI uncertainty of the wiretap channels
realizations. make it more difficult to achieve a robust design. However,
In Fig. 5, we show the average worst-case secrecy rates capitalizing on the proposed robust joint design, the JO
for different algorithms versus T with w = 0.5, δa2 = algorithm achieves a better secrecy rate performance than the
0.5, and P̄ = Ḡ = 20 dBm. At the hovering location, other benchmark algorithms. Furthermore, the secrecy rate
the trade-off between enhancing the quality of the legitimate performance of the JO algorithm exceeds that of the JO/NR
links and weakening the quality of the eavesdropping links algorithm, which demonstrates that our proposed algorithm
is achieved for the UAV. Therefore, the maximum secrecy is robust. In addition, it is observed that although the CSI
rate is achieved at the hovering location and the longer the estimation errors of the eavesdropping links are not taken into
UAV remains static at the hovering location, the larger the account, the average worst-case secrecy rate of the JO/NR
average worst-case secrecy rate is. This is the reason why algorithm still exceeds that of the other benchmark schemes.
the average worst-case secrecy rates of all the algorithms Once again, this demonstrates that the joint design of the UAV
increase with T . In particular, our proposed algorithm exceeds trajectory, passive beamforming, and transmit power achieves
all the benchmark schemes. This shows that, with the aid of a substantial gain. Besides, it is worth noting that the secrecy
the proposed robust joint design of the UAV trajectory, RIS’s rate performance of the JO/NPB algorithm is close to that of
passive beamforming, and transmit power control, the secrecy the JO/HT algorithm when δa2 is sufficiently large (e.g., δa2 =
rate performance can be effectively improved. Furthermore, 0.5). This is mainly because too large CSI uncertainty leads to
it is worth noting that the JO/NR algorithm outperforms the failure of RIS’s passive beamforming, even to the reverse
the other benchmark algorithms. This demonstrates that even effect. By contrast, large CSI uncertainty has a marginal effect
though the CSI uncertainty of the eavesdropping channels is on the trajectory or transmit power optimization, which is
not taken into account, which leads to inaccurate optimization, demonstrated by the smooth curve of the JO/NPB algorithm
the joint design of the UAV trajectory, passive beamforming, in Fig. 6.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6415

In Fig. 7, we show the UAV trajectories by different time our proposed single-user scheme can be directly applied,
slot division setups, w, with T = 124 s, δa2 = 0.5, and except that an effective user scheduling strategy should be
P̄ = Ḡ = 20 dBm. In particular, w = 0.1 means that we developed to schedule the data transmission of multiple users.
pay more attention to the UL communications, while w = 0.9 If a non-orthogonal multiple access protocol is considered,
means that we focus more on the DL communications. Since then our proposed scheme cannot be directly applied and
RGE [n] is independent of the UAV trajectory, in the UL an effective interference cancellation algorithm is required to
communications, the UAV trajectory is only designed for the suppress the interference between multiple users. However,
maximum of the achievable rate RGU [n]. Hence, for w = 0.1, a detailed discussion of this issue is beyond the scope of this
the UL communication is dominant, and the JO algorithm paper, and we leave this as future work.
almost achieves the trade-off between the channel gains of
the G-U link and G-R-U link to choose a trajectory, so as R EFERENCES
to achieve the best communication quality. When w increases, [1] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and
R. Zhang, “Wireless communications through reconfigurable intelligent
the DL communication becomes more and more dominant, it is surfaces,” IEEE Access, vol. 7, pp. 116753–116773, 2019.
more important for the JO algorithm to balance the channel [2] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in UAV
gains between the U-G link and U-R-G link and between communication networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 2,
pp. 1123–1152, 2nd Quart., 2016.
the U-E link and U-R-E link to design the UAV trajectory. [3] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with
Hence, the JO algorithm not only considers how to increase trajectory optimization,” IEEE Trans. Wireless Commun., vol. 16, no. 6,
the legitimate rates between the UAV and the ground user, pp. 3747–3760, Jun. 2017.
[4] G. Zhang, Q. Wu, M. Cui, and R. Zhang, “Securing UAV communi-
but also considers how to decrease the wiretap rate from the cations via joint trajectory and power control,” IEEE Trans. Wireless
UAV to the eavesdropper. This is also the reason why the Commun., vol. 18, no. 2, pp. 1376–1389, Feb. 2019.
[5] X. Qian, M. Di Renzo, J. Liu, A. Kammoun, and M.-S. Alouini,
first half paths, i.e., the paths from the initial location to “Beamforming through reconfigurable intelligent surfaces in single-user
the hovering location, when w = 0.9 are more decentralized MIMO systems: SNR distribution and scaling laws in the presence of
than those when w = 0.1. Besides, in the second half paths, channel fading and phase noise,” IEEE Wireless Commun. Lett., vol. 10,
no. 1, pp. 77–81, Jan. 2021.
i.e., the paths from the hovering location to the final location, [6] W. Yan, X. Yuan, and X. Kuai, “Passive beamforming and information
the UAV is closer to the eavesdropper than in the first half transfer via large intelligent surface,” IEEE Wireless Commun. Lett.,
paths. Thus, when w is sufficiently large (e.g., w = 0.9), vol. 9, no. 4, pp. 533–537, Apr. 2020.
[7] W. Yan, X. Yuan, Z.-Q. He, and X. Kuai, “Large intelligent surface
the UAV is inclined to fly along relatively direct paths to aided multiuser MIMO: Passive beamforming and information transfer,”
the final location, so as to avoid the information leakage and in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2020, pp. 1–7.
[8] A. Zappone, M. Di Renzo, F. Shams, X. Qian, and M. Debbah,
increase the secrecy rate. “Overhead-aware design of reconfigurable intelligent surfaces in
smart radio environments,” 2020, arXiv:2003.02538. [Online]. Avail-
V. C ONCLUSION able: http://arxiv.org/abs/2003.02538 and https://ieeexplore.ieee.org/
document/9200578
In this paper, as a supplement of the higher-layer encryption [9] G. Zhou, C. Pan, H. Ren, K. Wang, M. Di Renzo, and A. Nallanathan,
techniques, we studied a novel RIS-assisted UAV physical- “Robust beamforming design for intelligent reflecting surface aided
layer secure communication, aiming at integrating RIS and MISO communication systems,” IEEE Wireless Commun. Lett., vol. 9,
no. 10, pp. 1658–1662, Oct. 2020.
UAV technologies for improving the system secrecy rate. [10] D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Multiuser MISO UAV
In particular, a single flight time slot is allocated to the DL and communications in uncertain environments with no-fly zones: Robust
trajectory and resource allocation design,” IEEE Trans. Commun.,
UL transmissions between the UAV and the ground user, while vol. 68, no. 5, pp. 3153–3172, May 2020.
the legitimate channels are wiretapped by an eavesdropper. [11] Y. Zeng, Q. Wu, and R. Zhang, “Accessing from the sky: A tutorial on
Since the eavesdroppers always avoid being detected by the UAV communications for 5G and beyond,” Proc. IEEE, vol. 107, no. 12,
pp. 2327–2375, Dec. 2019.
legitimate transmitter, the acquisition of the CSI of the eaves- [12] L. Zhu, J. Zhang, Z. Xiao, X. Cao, X.-G. Xia, and R. Schober,
dropping channels is usually imperfect. Thus, we focused our “Millimeter-wave full-duplex UAV relay: Joint positioning, beamform-
attention on the joint and CSI-robust design of the UAV’s tra- ing, and power control,” IEEE J. Sel. Areas Commun., vol. 38, no. 9,
pp. 2057–2073, Sep. 2020.
jectory, RIS’s passive beamforming, and transmit power of the [13] A. Li, Q. Wu, and R. Zhang, “UAV-enabled cooperative jamming for
legitimate transmitter in order to maximize the average worst- improving secrecy of ground wiretap channel,” IEEE Wireless Commun.
Lett., vol. 8, no. 1, pp. 181–184, Feb. 2019.
case secrecy rate of the considered communication system. [14] C. Zhong, J. Yao, and J. Xu, “Secure UAV communication with coop-
Although the formulated problem is intractable due to its non- erative jamming and trajectory control,” IEEE Commun. Lett., vol. 23,
convexity, we proposed an efficient algorithm to approximately no. 2, pp. 286–289, Feb. 2019.
[15] H. Lee, S. Eom, J. Park, and I. Lee, “UAV-aided secure communications
solve it by applying the AO, SCA, S-Procedure, and SDR with cooperative jamming,” IEEE Trans. Veh. Technol., vol. 67, no. 10,
techniques. Simulation results demonstrated that the assistance pp. 9385–9392, Oct. 2018.
[16] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-enabled secure
of an RIS is beneficial to substantially improve the secrecy rate communications: Joint trajectory design and user scheduling,” IEEE J.
performance, and the joint design of UAV trajectory, RIS’s Sel. Areas Commun., vol. 36, no. 9, pp. 1972–1985, Sep. 2018.
passive beamforming, transmit power of the legitimates can [17] X. Zhou, Q. Wu, S. Yan, F. Shu, and J. Li, “UAV-enabled secure
communications: Joint trajectory and transmit power optimization,”
achieve a substantial gain. In addition, the robustness of our IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 4069–4073, Apr. 2019.
proposed algorithm was confirmed with respect to inaccurate [18] M. Cui, G. Zhang, Q. Wu, and D. W. K. Ng, “Robust trajectory and
estimates of the CSI of the wiretap channels. transmit power design for secure UAV communications,” IEEE Trans.
Veh. Technol., vol. 67, no. 9, pp. 9042–9046, Sep. 2018.
The findings of this paper can be used as a reference for the [19] M. Di Renzo et al., “Smart radio environments empowered
study of the multi-user scenario. We now briefly discuss the by reconfigurable intelligent surfaces: How it works, state of
research, and road ahead,” 2020, arXiv:2004.09352. [Online].
extension of our proposed scheme to the multi-user scenario. Available: http://arxiv.org/abs/2004.09352 and https://ieeexplore.ieee.
Clearly, if an orthogonal multiple access protocol is employed, org/document/9140329

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
6416 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 10, OCTOBER 2021

[20] M. Di Renzo et al., “Smart radio environments empowered by recon- [45] W. Yan, X. Yuan, Z.-Q. He, and X. Kuai, “Passive beamforming and
figurable AI meta-surfaces: An idea whose time has come,” EURASIP information transfer design for reconfigurable intelligent surfaces aided
J. Wireless Commun. Netw., vol. 2019, no. 1, p. 129, May 2019. multiuser MIMO systems,” IEEE J. Sel. Areas Commun., vol. 38, no. 8,
[21] C. Huang et al., “Holographic MIMO surfaces for 6G wireless networks: pp. 1793–1808, Aug. 2020.
Opportunities, challenges, and trends,” IEEE Wireless Commun., vol. 27, [46] Z.-Q. He and X. Yuan, “Cascaded channel estimation for large intelligent
no. 5, pp. 118–125, Oct. 2020. metasurface assisted massive MIMO,” IEEE Wireless Commun. Lett.,
[22] X. Yuan, Y.-J. A. Zhang, Y. Shi, W. Yan, and H. Liu, “Reconfigurable- vol. 9, no. 2, pp. 210–214, Feb. 2020.
intelligent-surface empowered wireless communications: Challenges and [47] D. Mishra and H. Johansson, “Channel estimation and low-complexity
opportunities,” IEEE Wireless Commun., early access, Feb. 22, 2021, doi: beamforming design for passive intelligent surface assisted MISO wire-
10.1109/MWC.001.2000256. less energy transfer,” in Proc. IEEE Int. Conf. Acoust., Speech Signal
[23] Q. Wu and R. Zhang, “Intelligent reflecting surface enhanced wireless Process. (ICASSP), May 2019, pp. 4659–4663.
network via joint active and passive beamforming,” IEEE Trans. Wireless [48] H. Liu, X. Yuan, and Y.-J.-A. Zhang, “Matrix-calibration-based cas-
Commun., vol. 18, no. 11, pp. 5394–5409, Nov. 2019. caded channel estimation for reconfigurable intelligent surface assisted
[24] X. Guan, Q. Wu, and R. Zhang, “Intelligent reflecting surface assisted multiuser MIMO,” IEEE J. Sel. Areas Commun., vol. 38, no. 11,
secrecy communication: Is artificial noise helpful or not?” IEEE Wireless pp. 2621–2636, Nov. 2020.
Commun. Lett., vol. 9, no. 6, pp. 778–782, Jun. 2020. [49] C. You and R. Zhang, “Hybrid offline-online design for UAV-enabled
[25] X. Yu, D. Xu, and R. Schober, “Enabling secure wireless communica- data harvesting in probabilistic LoS channels,” IEEE Trans. Wireless
tions via intelligent reflecting surfaces,” in Proc. IEEE Global Commun. Commun., vol. 19, no. 6, pp. 3753–3768, Jun. 2020.
Conf. (GLOBECOM), Dec. 2019, pp. 1–6.
[26] D. Xu, X. Yu, Y. Sun, D. W. K. Ng, and R. Schober, “Resource Sixian Li received the B.S. degree from the School
allocation for secure IRS-assisted multiuser MISO systems,” in Proc. of Communication and Information Engineering,
IEEE Globecom Workshops (GC Wkshps), Dec. 2019, pp. 1–6. Chongqing University of Posts and Telecommunica-
[27] X. Lu, W. Yang, X. Guan, Q. Wu, and Y. Cai, “Robust and secure tions, Chongqing, China, in 2018. He is currently
beamforming for intelligent reflecting surface aided mmWave MISO pursuing the M.S. degree in communication and
systems,” IEEE Wireless Commun. Lett., vol. 9, no. 12, pp. 2068–2072, information system with the University of Electronic
Dec. 2020. Science and Technology of China, Chengdu.
[28] X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, “Robust and secure
wireless communications via intelligent reflecting surfaces,” IEEE J. Sel.
Areas Commun., vol. 38, no. 11, pp. 2637–2652, Nov. 2020.
[29] L. Yang, F. Meng, J. Zhang, M. O. Hasna, and M. Di Renzo, “On the
performance of RIS-assisted dual-hop UAV communication systems,” Bin Duo (Member, IEEE) received the Ph.D. degree
IEEE Trans. Veh. Technol., vol. 69, no. 9, pp. 10385–10390, Sep. 2020. in information and communication engineering from
[30] S. Li, B. Duo, X. Yuan, Y.-C. Liang, and M. Di Renzo, “Reconfigurable the Harbin Institute of Technology, China, in 2014,
intelligent surface assisted UAV communication: Joint trajectory design and from the University of Sydney, Australia,
and passive beamforming,” IEEE Wireless Commun. Lett., vol. 9, no. 5, in 2016. He is currently an Associate Professor
pp. 716–720, May 2020. with the College of Information Science and Tech-
[31] Q. Zhang, W. Saad, and M. Bennis, “Reflections in the sky: Millimeter nology, Chengdu University of Technology, China.
wave communication with UAV-carried intelligent reflectors,” in Proc. His research interests include modern optimization
IEEE Global Commun. Conf. (GLOBECOM), Dec. 2019, pp. 1–6. theory, UAV communications, and physical-layer
[32] H. Long et al., “Reflections in the sky: Joint trajectory and pas-
security.
sive beamforming design for secure UAV networks with reconfig-
urable intelligent surface,” 2020, arXiv:2005.10559. [Online]. Available: Marco Di Renzo (Fellow, IEEE) received the
http://arxiv.org/abs/2005.10559 Laurea (cum laude) and Ph.D. degrees in electrical
[33] L. Wang, K. Wang, C. Pan, W. Xu, and N. Aslam, “Joint trajectory
engineering from the University of L’Aquila, Italy,
and passive beamforming design for intelligent reflecting surface-aided
in 2003 and 2007, respectively, and the Habilitation à
UAV communications: A deep reinforcement learning approach,” 2020,
Diriger des Recherches (Doctor of Science) degree
arXiv:2007.08380. [Online]. Available: http://arxiv.org/abs/2007.08380
[34] L. Ge, P. Dong, H. Zhang, J.-B. Wang, and X. You, “Joint beamforming from University Paris-Sud, France, in 2013. Since
and trajectory optimization for intelligent reflecting surfaces-assisted 2010, he has been with the French National Center
UAV communications,” IEEE Access, vol. 8, pp. 78702–78712, 2020. for Scientific Research (CNRS), where he is cur-
[35] M. Hua, L. Yang, Q. Wu, C. Pan, C. Li, and A. L. Swindlehurst, “UAV- rently a CNRS Research Director (CNRS Professor)
assisted intelligent reflecting surface symbiotic radio system,” 2020, with the Laboratory of Signals and Systems (L2S),
arXiv:2007.14029. [Online]. Available: http://arxiv.org/abs/2007.14029 Paris-Saclay University – CNRS and CentraleSup-
[36] M. B. Shahab, R. Abbas, M. Shirvanimoghaddam, and S. J. Johnson, elec, Paris, France. In Paris-Saclay University, he serves as the Coordinator of
“Grant-free non-orthogonal multiple access for IoT: A survey,” IEEE the Communications and Networks Research Area, Laboratory of Excellence
Commun. Surveys Tuts., vol. 22, no. 3, pp. 1805–1838, 3rd Quart., 2020. DigiCosme, and as a member of the Admission and Evaluation Committee of
[37] S. Minaeian, J. Liu, and Y.-J. Son, “Vision-based target detection and the Ph.D. School on Information and Communication Technologies. He is a
localization via a team of cooperative UAV and UGVs,” IEEE Trans. Fellow of the IET, in 2020. He has received several individual distinctions and
Syst., Man, Cybern., Syst., vol. 46, no. 7, pp. 1005–1016, Jul. 2016. research awards, which include the IEEE Communications Society Best Young
[38] S. Sohn, B. Lee, J. Kim, and C. Kee, “Vision-based real-time target Researcher Award for Europe, Middle East and Africa, the Royal Academy
localization for single-antenna GPS-guided UAV,” IEEE Trans. Aerosp. of Engineering Distinguished Visiting Fellowship, the IEEE Jack Neubauer
Electron. Syst., vol. 44, no. 4, pp. 1391–1401, Oct. 2008. Memorial Best System Paper Award, the IEEE Communications Society
[39] D. W. K. Ng, E. S. Lo, and R. Schober, “Robust beamforming for Young Professional in Academia Award, the SEE-IEEE Alain Glavieux
secure communication in systems with wireless information and power Award, and a 2019 IEEE ICC Best Paper Award. He was a recipient
transfer,” IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599–4615, of a Nokia Foundation Visiting Professorship for conducting research on
Aug. 2014. metamaterial-assisted wireless communications at Aalto University, Finland,
[40] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
unmanned aerial vehicles: Opportunities and challenges,” IEEE Com- in 2019. He serves as the Founding Chair of the Special Interest Group
on Reconfigurable Intelligent Surfaces of the Wireless Technical Committee
mun. Mag., vol. 54, no. 5, pp. 36–42, May 2016.
[41] G. Mun, H. W. Kim, and D. Kim, “Hardware suitable implementation for of the IEEE Communications Society. He currently serves as the Editor-in-
CNPC transmission,” in Proc. Int. Conf. Inf. Commun. Technol. Converg. Chief of the IEEE C OMMUNICATIONS L ETTERS . He served as an Editor
(ICTC), Oct. 2020, pp. 929–932. and the Associate Editor-in-Chief of the IEEE C OMMUNICATIONS L ETTERS ,
[42] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. and as an Editor of the IEEE T RANSACTIONS ON C OMMUNICATIONS and
Cambridge, U.K.: Cambridge Univ. Press, 2005. the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS . He is the
[43] L. Zhu, J. Zhang, Z. Xiao, X. Cao, D. O. Wu, and X.-G. Xia, “3-D Founding Lead Editor of the IEEE Communications Society Best Readings
beamforming for flexible coverage in millimeter-wave UAV commu- in Reconfigurable Intelligent Surfaces. He is a Highly Cited Researcher
nications,” IEEE Wireless Commun. Lett., vol. 8, no. 3, pp. 837–840, (Clarivate Analytics, 2019) and a World’s Top 2% Scientist from Stanford
Jun. 2019. University, in 2020. He is a Distinguished Speaker of the IEEE Vehicular
[44] M. Di Renzo et al., “Reconfigurable intelligent surfaces vs. relaying: Technology Society. From 2017 to 2020, he was a Distinguished Lecturer
Differences, similarities, and performance comparison,” IEEE Open J. of the IEEE Vehicular Technology Society and the IEEE Communications
Commun. Soc., vol. 1, pp. 798–807, 2020. Society.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.
LI et al.: ROBUST SECURE UAV COMMUNICATIONS WITH THE AID OF RECONFIGURABLE INTELLIGENT SURFACES 6417

Meixia Tao (Fellow, IEEE) received the B.S. degree Xiaojun Yuan (Senior Member, IEEE) received the
in electronic engineering from Fudan University, Ph.D. degree in electrical engineering from the City
Shanghai, China, in 1999, and the Ph.D. degree University of Hong Kong, Hong Kong, in 2008.
in electrical and electronic engineering from the From 2009 to 2011, he was a Research Fellow
Hong Kong University of Science and Technology, with the Department of Electronic Engineering, City
in 2003. University of Hong Kong. He was also a Visiting
She is currently a Professor with the Department Scholar with the Department of Electrical Engineer-
of Electronic Engineering, Shanghai Jiao Tong Uni- ing, The University of Hawaii at Manoa, in 2009 and
versity, China. Her current research interests include 2010. From 2011 to 2014, he was a Research Assis-
wireless caching, edge computing, physical layer tant Professor with the Institute of Network Cod-
multicasting, and resource allocation. She served as ing, The Chinese University of Hong Kong. From
a member of the Executive Editorial Committee of the IEEE T RANSACTIONS 2014 to 2017, he was an Assistant Professor with the School of Information
ON W IRELESS C OMMUNICATIONS during 2015–2019. She was a recipient Science and Technology, ShanghaiTech University. He is currently a Professor
of the 2019 IEEE Marconi Prize Paper Award, the 2013 IEEE Heinrich with the Center for Intelligent Networking and Communications, University
Hertz Award for Best Communications Letters, the IEEE/CIC International of Electronic Science and Technology of China, Chengdu, China. He has
Conference on Communications in China (ICCC) 2015 Best Paper Award, authored or coauthored more than 160 peer-reviewed research papers in the
and the International Conference on Wireless Communications and Signal leading international journals and conferences in the related areas. He has
Processing (WCSP) 2012 Best Paper Award. She received the 2009 IEEE served on a number of technical programs for international conferences. His
ComSoc Asia-Pacific Outstanding Young Researcher Award. She served as research interests include signal processing, machine learning, and wireless
Symposium Oversight Chair of IEEE ICC 2019, Symposium Co-Chair of communications, including but not limited to multi-antenna and cooperative
IEEE GLOBECOM 2018, the TPC chair of IEEE/CIC ICCC 2014, and communications, sparse and structured signal recovery, Bayesian approximate
Symposium Co-Chair of IEEE ICC 2015. She is serving as the Editor-at-Large inference, and network coding. He was a co-recipient of the Best Paper
of the IEEE Open Journal of the Communications Society. She was also on the Award of IEEE International Conference on Communications (ICC) 2014 and
Editorial Board of several other journals as Editor or Guest Editor, including the Best Journal Paper Award of IEEE Technical Committee on Green
the IEEE T RANSACTIONS ON C OMMUNICATIONS and the IEEE J OURNAL Communications and Computing (TCGCC) 2017. He has been an Editor of
ON S ELECTED A REAS IN C OMMUNICATIONS . the IEEE T RANSACTIONS ON C OMMUNICATIONS, since 2017, and the IEEE
T RANSACTIONS ON W IRELESS C OMMUNICATIONS, since 2018.

Authorized licensed use limited to: ULAKBIM UASL - Galatasaray Universitesi. Downloaded on February 28,2022 at 09:26:03 UTC from IEEE Xplore. Restrictions apply.

You might also like