PDF  PubReader

Wang , Guo , Chen , Yu , Wang , and Rao: Robust Secure UAV Relay-Assisted Cognitive Communications with Resource Allocation and Cooperative Jamming

Zhen Wang , Jichang Guo , Zhiqiong Chen , Lisu Yu , Yuhao Wang and Hong Rao

Robust Secure UAV Relay-Assisted Cognitive Communications with Resource Allocation and Cooperative Jamming

Abstract: This paper considers a novel scenario, where a physical layer security issue is studied in unmanned aerial vehicles (UAVs)-assisted cognitive relay system. A secondary unmanned aerial vehicle (SUAV) relay delivers information from multiple secondary Internet of things (IoT) devices to a secondary user (SU) under the spectrum sharing with primary users (PUs). In the processing of the information transmission of the SUAV relay, a secondary eavesdropper (SE) wiretaps the information transmitted by the UAV relay with imperfect location information. In order to confuse the SE, a friendly SUAV jammer is employed to transmit jamming signals to the SE. To prevent the SE wiretappinginformationasmuchaspossible,weaimtomaximize average worst-case secrecy rate of the secondary relay network by jointly optimizing robust trajectories and power of the SUAV relay and jammer under the power, trajectories, information causality and multiple interference temperature (IT) threshold constraints. Thus, we formulate the original problem which is a challenging non-convex problem. We propose an effective algorithmtosolvetheoriginalproblemandattainlocallyoptimal solution based on the successive convex approximation (SCA) technology and the alternate optimization method. Simulations are offered to demonstrate that our proposed resource allocation scheme can effectively improve the security performance of the SUAV relay network in comparison with other benchmark schemes.

Keywords: Physical layer security , resource allocation , robust trajectory , UAV cognitive relay , UAV jammer

I. INTRODUCTION

DUE to the advantages of rapid deployment, low-altitude flight, line-of-sight (LoS) communication link and wide coverage, unmanned aerial vehicle (UAV) plays an important role in various practical scenarios, such as post-disaster rescue, cargo transport and emergency communication [1], which have brought great commercial benefits. With the widespread application of 5G technology in recent years, the scientific and technological workers pay more and more attention to the field of wireless communication [2]. Unmanned aerial vehicles (UAVs) are widely used in wireless communication network with their many characteristics. For example, when a UAV communicates with multiple ground nodes, the UAV performs data collection [3]-[6], information transmission as a relay [7] and data edge computing [8], [9]. Therefore, in the wireless communication network, the application of UAV can not only improve the speed and quality of communication, but also effectively reduce the cost of communication facilities.

A. Related Work and Motivation

For the research and application of UAV in wireless communication network, we have investigated the relevant work in recent years. When there is long distance or towering obstacles between the signal transmitter and the signal receiver, the communication will be hindered and the communication quality will be seriously reduced. In these scenarios, we can let the UAV act as a relay to provide information transmission services, which can not only improve the communication quality, but also expand the communication distance. It is worth noting that there are two types of UAV relay, one type is static relay [10]-[13] and the other is dynamic relay [14]-[18]. The research aim of the static relay is to find the best hover point in the wireless communication network, so as to enhance the overall system performance. The authors of [10] maximized the system reliability by using a static UAV as a relay. In [11], by optimizing the static location of UAV, the authors successfully maximized the throughput of the UAV relay assisted wireless communication system. In addition, the authors of [12] constructed a channel model and a relay protocol to effectively maximize the signal-to-noise ratio (SNR) of the system by optimizing the locations of the relay UAVs. In reference [13], the position of a UAV relay was optimized with the power and SNR constraints to maximize the total communication data rate of the system.

In recent years, a UAV-enabled mobile relay has become a research hotspot, and has been widely concerned by scholars and experts [14]-[18]. In [14], the authors researched the problem of throughput maximization by constructing an UAV to act as a mobile relay. A rotary-wing UAV was used as a mobile relay in [15], the flight trajectory and the power distribution and the communication time of the UAV were optimized to minimize the energy consumption. The authors in [16] proposed a UAV-assisted relay network, the capacity of which was maximized. In [17], the authors considered a mobile relay network to minimize the outage probability. In addition, a UAV relay was applied to help communication in the cell edge [18]. Compared with UAV relays in fixed locations, mobile UAV relays can be more flexible to improve the quality of communication.

It is worth noting that a UAV is applied in the wireless cognitive network to improve the spectrum utilization. Thus, we make some surveys about the research of the cognitive UAV [19]-[24]. In cognitive UAV networks, the researchers proposed a spectrum sensing scheme [19], a power control algorithm [20] and a S-Procedure algorithm [21] to maximize the system throughput. By combining with the non-orthogonal multiple access (NOMA) technology [22] or the interference threshold limit [23] in the cognitive system, the system secrecy rate was maximized. In a UAV assisted cognitive system, the authors maximized the transmission rate of secondary users by optimizing the UAV's power and its path [24]. In addition to [20], the literatures [19]-[24] do not consider a UAV-assisted cognitive relay systems. Although the authors of [20] studied cognitive UAV relay in wireless communication system, they do not consider the system secrecy rate.

In the wireless communication systems, the information transmission security which is paid much attention is also research hotspot at present. Therefore, we have done a lot of investigations on secure UAVs [25]-[32]. In references [25], [26], the authors proposed an artificial noise (AN) method and the means of joint trajectory and power optimization to resist eavesdropping and improve system secrecy rate, respectively. In [27], [28], the authors maximize secrecy rate of the UAV relay with a UAV jammer and an active eavesdropper whose location is not fixed. An effective method was proposed to achieve the best security performance of the system with multiple randomly distributed eavesdroppers in [29]. The authors in [30] considered resource allocation for secure multi-UAV communication systems with multiple eavesdroppers. In [31], [32], the application of a friendly jamming UAV can maximize the system confidentiality in the presence of multiple eavesdroppers. However, the authors of [25]-[32] do not considered the system security of the UAV relay in cognitive networks.

B. Contributions and Organization

In this paper, we study a security issue of the cognitive system based on two secondary UAVs (SUAVs), which are the secondary UAV relay (SUAV R) and the secondary UAV jammer (SUVA J). In addition to the SUAVs, there are multiple primary users (PUs), multiple secondary internet of things devices (SIoTs), a secondary user (SU) as well as a secondary eavesdropper (SE) in the cognitive system, where we aim to maximize secrecy rate of the secondary relay network. For our works, the main contributions are summarized as follows:

Fig. 1.

The system model.
1.png

A novel design about the physical layer security of the secondary relay network is made. In the secondary network, the mission of the SUAV R is to transmit data from the SIoTs to the SU. Around the SU, there is a SE whose accurate location is not known wiretaps the information of the SUAV R. In order to prevent the SE wiretapping information, we introduce a friendly SUAV J to disturb the SE. In order to maximize the average worst-case secrecy rate of the secondary network, we formulate a primal problem, where the transmit power of each secondary Internet of things device (SIoT) and the SUAVs should be restrained to avoid the interference for the PUs based on IT constraints.

Since the proposed problem is a non-convex problem which is difficult to solve directly, an effective approach is proposed to solve it. Specifically, we divide the primal problem to three sub problems. Under the uncertain location of the SE, we can estimate the SE' location according to the offered range value of location estimation. By adopting alternating optimization and successive convex approximation (SCA) means, we optimize three sub problems alternately to attain the locally optimal solution of the primal problem through multiple iterations.

Simulation results show the effectiveness of the proposed algorithm by comparing other benchmark designs. That is to say, the average worst-case secrecy rate based on our proposed algorithm is best in comparison with that based on other different designed algorithms. Our proposed algorithm is also shown to converge quickly via the convergence simulation of the algorithm results.

The rest organization of the paper is arranged as follows. In Section II, a novel secure relay system model and an optimization problem are proposed in the cognitive network. In Section III, the scheme and algorithm of convex processing for the initial problem is proposed to maximize the average secrecy rate. In Section IV, our proposed algorithm is proved to be effective and fast convergent through the analysis of simulation results. In Section V, we conclude this paper.

II. SYSTEM MODEL AND PROBLEM FORMULATION

A. System Model

As shown in Fig. 1, we consider UAV relay-assisted cognitive communication systems, where the users of the secondary network and the primary network share the same spectrum resource considering interference control with each other. In the secondary network, the SIoT n and the SU are fixed at terrestrial locations [TeX:] $$w_{n}=\left(x_{n}, y_{n}\right), n \in \mathcal{N}=\{1,2, \cdots, N\}$$ and [TeX:] $$w_{s}=\left(x_{s}, y_{s}\right)$$ in horizontal coordinate, respectively. The positions of the the kth primary user (PU) which is stationed in ground is expressed as [TeX:] $$w_{\mathrm{P}, k}=\left(x_{P, k}, y_{P, k}\right), k \in \hat{\mathcal{K}}=\{1,2, \cdots, \mathrm{K}\}$$, where K represents the total number of the PUs in the primary network. The SIoTs cannot communicate directly with the SU on account of the transmission signals attenuation of long distance communication and the interference of the subsistent PUs between the SIoTs and the SU. So we deploy a SUAV R to delivery effectively information from the SIoTs to the SU in the secondary network under a tolerable level of the caused interference for the PUs. However, a ground SE conceals near the SU to steal the information of the SUAV R. Although the exact location of the SE is not known, its approximate location is known by SUAVs with maximum range estimation value . Let [TeX:] $$\hat{w}_{e} \text { and } w_{e}$$ denote the estimated location and the exact location of the SE, respectively. According to the location error model [33], there is [TeX:] $$w_{e} \in \Omega=\left\{\left\|\hat{w}_{e}-w_{e}\right\| \leq \pi\right\}, \text { where }\|\cdot\|$$ represents the Euclidean norm. So we add a SUAV J to disturb information interception of the SE in order to enhance the information secrecy rate of the secondary network.

We consider that the SUAVs accomplish mission with total flight time T, which is discretized into L - 1 time slots with equal duration [TeX:] $$\delta_{s}=T /(L-1)$$. Similarly, the trajectory of SUAVs is discretized as L discrete locations by optimizing to divide the trajectory into L - 1 line segments. Let [TeX:] $$\mathcal{L}=\{1,2, \cdots, L\}$$denote a set of time slots. The SUAV [TeX:] $$m, m \in\{R, J\}$$ , includes the SUAV R and SUAV J based on m. At any time slot [TeX:] $$l, l \in \mathcal{L}=\{1,2, \cdots, L\}, \mathbf{q}_{m}[l]=\left(x_{m}[l], y_{m}[l]\right) \in \mathbb{R}^{2 \times 1}$$ denotes the horizontal locations of the SUAV [TeX:] $$m, m \in\{R, J\}$$ in this paper, where [TeX:] $$\mathbb{R}^{2 \times 1}$$ is on behalf of the space of 2-dimensional real vector and the boldface letter represents vector. Each SUAV m with constant altitude [TeX:] $$H_{m}$$ flies from the set initial location [TeX:] $$\mathbf{q}_{m}[1]$$ to the final location [TeX:] $$\mathbf{q}_{m}[L]$$ at maximum displacement [TeX:] $$\hat{V}_{\max }=V_{\max } \delta_{s}$$ limit between two successive time slots, i.e., [TeX:] $$\left\|\mathbf{q}_{m}[l+1]-\mathbf{q}_{m}[l]\right\| \leq V_{\max }, l \in \mathcal{L}=\{1,2, \cdots, L-1\}$$, where Vmax denotes maximum flight speed of the SUAV m, [TeX:] $$m \in\{R, J\}$$

In the system model, we assume that the communication channel is dominated by LoS link [30] between the SUAV m and the SU or the SE. Due to the adopted free-space path loss model [30], the power gain of wireless channel between the SUAV R and the SIoT n at time slot [TeX:] $$l \in \mathcal{L}$$ is attained as

(1)
[TeX:] $$h_{n, R}[l]=\frac{\beta_{0}}{d_{n, R}^{2}[l]}=\frac{\beta_{0}}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}}, n \in \tilde{\mathcal{N}},$$

where [TeX:] $$\beta_{0}$$ represents the power gain of channel at reference unit distance of 1 meter, and [TeX:] $$d_{n, R}[l]=\sqrt{\left\|\mathbf{q}_{R}[l]-w_{n}\right\|^{2}+H_{R}^{2}}$$ denotes the straight line distance between the SUAV R and the SIoT n. Similarly, the power gain of wireless channel during the information transmission from the SUAV m to the SU at any slot [TeX:] $$l, \forall l \in \mathcal{L}$$, is written as

(2)
[TeX:] $$h_{m, S}[l]=\frac{\beta_{0}}{d_{m, S}^{2}[l]}=\frac{\beta_{0}}{\left\|\mathbf{q}_{m}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{m}^{2}}, m \in\{R, J\},$$

where [TeX:] $$d_{m, S}[l]=\sqrt{\left\|\mathbf{q}_{m}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{m}^{2}}$$ denotes the straight line distance of data transfer from the SUAV m to the SU. Based on the distance [TeX:] $$d_{m, E}[l]=\sqrt{\left\|\mathbf{q}_{m}[l]-\boldsymbol{w}_{e}\right\|^{2}+H_{m}^{2}}$$from the SUAV m to the SE, the power gain of wireless channel between the SUAV m and the SE at any slot [TeX:] $$l, \forall l \in \mathcal{L}$$, is written similarly as

(3)
[TeX:] $$h_{m, E}[l]=\frac{\beta_{0}}{d_{m, E}^{2}[l]}=\frac{\beta_{0}}{\left\|\mathbf{q}_{m}[l]-\boldsymbol{w}_{e}\right\|^{2}+H_{m}^{2}}, m \in\{R, J\}.$$

In UAV-to-ground and UAV-to-UAV channels, we suppose that the Doppler effect generated by mobility of UAVs is ideally offset [34]. Thus, the power gain of the channel between the SUAV R and the SUAV J by adopting the free-space path loss model [30] at any slot [TeX:] $$l, \forall l \in \mathcal{L}$$, is attained as

(4)
[TeX:] $$h_{J, R}[l]=\frac{\beta_{0}}{d_{J, R}^{2}[l]}=\frac{\beta_{0}}{\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\left(H_{R}-H_{J}\right)^{2}},$$

where [TeX:] $$d_{J, R}[l]=\sqrt{\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\left(H_{R}-H_{J}\right)^{2}}$$denotes the straight-line distance between the SUAV R and the SUAV J. In the secondary network, we assume that the data trans-mission mechanism of SUAV R with the adequate data caches from the SIoTs to the SU is adopted the frequency division dual (FDD) mechanism of the full-duplex mode [35]. At time slot l, suppose that each SIoT transmits information to the SUAV R simultaneously by adopting the frequency division multiple access (FDMA) mechanism [36]. Although the frequency bands of information transmission of each SIoT and the SUAV R are different in the secondary network, these frequency bands of the secondary network are all within the spectrum range of the cognitive wireless network and are shared with the PUs of the primary network [36]. The interferences of the SUAV R and the SU come from the amicable SUAV J and the PUs. The transmission signal of the SUAV J is deemed as noise for the SUAV R, the SU and the SE [37]. We assume that the interference of the SUAV R, the SU and the SE from the PUs is circularly symmetric complex Gaussian which is the worst case interference model [38]. The interference model has been widely used in [38]. Thus, the signal transmission rate from the SIoT n to the SUAV R at slot[TeX:] $$\forall l \in \mathcal{L}$$ in bit/second/Hertz (bps/Hz) is written as

(5)
[TeX:] $$R_{n, R}[l]=\log _{2}\left(1+\frac{h_{n, R}[l] P_{n}[l]}{h_{J, R}[l] P_{J}[l]+\delta_{a}^{2}}\right), n \in \tilde{\mathcal{N}}$$

where [TeX:] $$P_{n}[l] \text { and } P_{J}[l]$$ represent transmission power of the SIoT n and the SUAV J, respectively. [TeX:] $$\delta_{a}^{2}$$ is on behalf of the total power of receiver noise and the primary network interference at the SUAV R and the SU [24], [38]. And [TeX:] $$h_{J, R}[l] P_{J}[l]$$ denotes the jamming power caused by the SUAV J [33]. Analogously, via the information delivery of the SUAV R from ground the SIoT n to the SU, the reception rate of the information transmitted by the SUAV R for the SU is expressed as

(6)
[TeX:] $$R_{R, S}[l]=\log _{2}\left(1+\frac{h_{R, S}[l] P_{R}[l]}{h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}}\right), \forall l,$$

where [TeX:] $$P_{R}[l]$$ represents transmission power of the SUAV R.Similarly, the rate of data wiretap for the SE is written as

(7)
[TeX:] $$R_{R, E}[l]=\log _{2}\left(1+\frac{h_{R, E}[l] P_{R}[l]}{h_{J, E}[l] P_{J}[l]+\delta_{a}^{2}}\right), \forall l.$$

In the relay network, the information transmission of SUAV R should comply with information causality, i.e., the total information bits received by the SU cannot exceed the total bits of information sent by all SIoTs over l time slots, [TeX:] $$l \in \mathcal{L}$$. On account of the information dispose demand of one time slot in the process of the SUAV R forwarding information, the SU do not receive information in the first time slot and the SIoT n do not send information in the last time slot, i.e., [TeX:] $$R_{R, S}[1]=0 \text { and } R_{n, R}[N]=0$$. Thus, the information causality of the secondary relay network is expressed as

(8)
[TeX:] $$\sum_{r=2}^{l} R_{R, S}[r] \leq \sum_{r=1}^{l-1} \sum_{n=1}^{N} R_{n, R}[r], l \in \tilde{\mathcal{L}}=\{2, \cdots, L\}.$$

However, the transmit power of each SIoT n and the SUAV [TeX:] $$m, m \in\{R, J\}$$ in the secondary network will generate interference to the all PUs' communication of the primary network. So the interference temperature (IT) method [39] is adopted to safeguard the communication quality of all PUs. We define [TeX:] $$\Gamma^{S} \text { and } \Gamma^{R J}$$ as the tolerant IT thresholds of every PU k for the SIoT n, for the SUAV R and the SUAV J, respectively. Within the tolerant IT thresholds [TeX:] $$\Gamma^{S} \text { and } \Gamma^{R J}$$ , the communication quality of all PUs will not be affected. Considered that the SIoT n and PU k are fixed on the surface of land, the channel model between the SIoT n and the PU k is supposed to abide by the independent Rayleigh fading model with the channel power gain [TeX:] $$\hat{h}_{n, k}=\beta_{0} d_{n, k}^{-\lambda} \xi$$ denote the path loss exponent and an exponentially distributed random variable with mean one, respectively [23], [40]. And [TeX:] $$d_{n}$$,k represents the distance between the SIoT n and the PU k, [TeX:] $$n \in \tilde{\mathcal{N}}, k \in \hat{\mathcal{K}}$$. According to Rayleigh fading model, the IT constrain of each SIoT based on average interference in order to protect the PU k is written as

(9)
[TeX:] $$\mathbb{E}_{\xi}\left[\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}} \xi\right] \leq \Gamma^{S}, n \in \tilde{\mathcal{N}}, k \in \hat{\mathcal{K}}$$

where [TeX:] $$\mathbb{E}_{\xi}[\cdot]$$denotes the mathematical expectation with random variable . Since the channel model between the SIoT n and the PU k is supposed to follow the independent Rayleigh fading model [23], [40], we can deal with the left item of formula (9) to acquire[TeX:] $$\mathbb{E}_{\xi}\left[\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}} \xi\right]=\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}} \mathbb{E}_{\xi}[\xi]$$, where [TeX:] $$\mathbb{E}_{\xi}[\xi]$$ is a constant term with value one. Thus, we can also acquire [TeX:] $$\mathbb{E}_{\xi}\left[\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}} \xi\right]=\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}}$$. Therefore, the formula (9) can be rewritten as

(10)
[TeX:] $$\frac{\beta_{0} P_{n}[l]}{\left(\left\|\boldsymbol{w}_{n}-\boldsymbol{w}_{P, k}\right\|\right)^{\lambda}} \leq \Gamma^{S}, n \in \tilde{\mathcal{N}}, k \in \hat{\mathcal{K}}.$$

Due to the SUAV R and SUAV J in the air, the channel between the SUAV m, [TeX:] $$m \in\{R, J\}$$ and all ground PUs is considered as the LoS channel. Based on the LoS channel model, the IT constrains which can protect all PUs from the interference of the SUAV R and SUAV J at any slot l are respectively given by

(11)
[TeX:] $$\frac{\beta_{0} P_{R}[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{R}^{2}} \leq \Gamma^{R J}, k \in \hat{\mathcal{K}},$$

(12)
[TeX:] $$\frac{\beta_{0} P_{J}[l]}{\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{J}^{2}} \leq \Gamma^{R J}, k \in \hat{\mathcal{K}}.$$

B. Problem Formulation

Since the exact location of the SE can't be fully known by SUAV m, [TeX:] $$m \in\{R, J\}$$, we more concern about the worst-case secrecy rate of the secondary relay network. Thus, the worst-case secrecy rate from the SUAV R to the SU in bps/Hz at l time slots is expressed as

(13)
[TeX:] $$R_{s e r}[l]=\left[R_{R, S}[l]-\max _{\boldsymbol{w}_{e} \in \Omega} R_{R, E}[l]\right]^{+}, \forall l ,$$

where [TeX:] $$[x]^{+}=\max (x, 0)$$. In the cognitive system, our goal is to maximize the average secrecy rate of the information transmission of the SUAV R by jointly optimizing the tra-jectories and transmit power of the SUAV R and the SUAV J based on the information causality constrain. We define [TeX:] $$\mathcal{P} \triangleq\left\{P_{n}[l], P_{R}[l], P_{J}[l]\right\} \text { and } \mathcal{Q} \triangleq\left\{\mathbf{q}_{R}[l], \mathbf{q}_{J}[l]\right\}$$ in order to simplify notation expression. The optimization problem is formulated as

(14a)
[TeX:] $$(\mathrm{P} 1): \max _{\mathcal{P}, \mathcal{Q}} \frac{1}{L} \sum_{l=1}^{L} R_{s e r}[l]$$

(14b)
[TeX:] $$\text { s.t. } \frac{1}{L} \sum_{l=1}^{L} P_{n}[l] \leq \bar{P}_{T}, 0 \leq P_{n}[l] \leq P_{T}^{\max }, n \in \tilde{\mathcal{N}},$$

(14c)
[TeX:] $$\frac{1}{L} \sum_{l=1}^{L} P_{R}[l] \leq \bar{P}_{R}, 0 \leq P_{R}[l] \leq P_{R}^{\max },$$

(14d)
[TeX:] $$\frac{1}{L} \sum_{l=1}^{L} P_{J}[l] \leq \bar{P}_{J}, 0 \leq P_{J}[l] \leq P_{J}^{\max },$$

(14e)
[TeX:] $$\left\|\mathbf{q}_{m}[l+1]-\mathbf{q}_{m}[l]\right\| \leq \hat{V}_{\max }, l \in \hat{\mathcal{L}}, m \in\{R, J\}$$

(14f)
[TeX:] $$\mathbf{q}_{R}[1]=\mathbf{q}_{R}^{i n i}, \mathbf{q}_{R}[L]=\mathbf{q}_{R}^{f i n},$$

(14g)
[TeX:] $$\mathbf{q}_{J}[1]=\mathbf{q}_{J}^{i n i}, \mathbf{q}_{J}[L]=\mathbf{q}_{J}^{f i n},$$

(14h)
[TeX:] $$\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\left(H_{R}-H_{J}\right)^{2} \geq d_{\min }^{2}$$

(14i)
[TeX:] $$(8),(10),(11), \text { and }(12) \text {, }$$

where the constraints (14b), (14c), and (14d) are on behalf of the average power limitation and the peak power limitation of the SIoT n, the SUAV R and the SUAV J, respectively. The [TeX:] $$\bar{P}_{T}, \bar{P}_{R} \text { and }\bar{P}_{J}$$ represent the average power of the SIoT n, the SUAV R and the SUAV J, respectively. In (14b)-(14d), the transmit power of the SIoT n, the SUAV R and the SUAV J at any time slot l cannot exceed the set peak power [TeX:] $$P_{T}^{\max }, P_{R}^{\max }$$ and [TeX:] $$P_{J}^{\max }$$, respectively. In (14f), [TeX:] $$\mathbf{q}_{R}^{i n i} \text { and } \mathbf{q}_{R}^{f i n}$$ denote the initial point and final point of the SUAV R, respectively. The constraint (14g) indicates that the SUAV J flies from the set initial location [TeX:] $$\mathbf{q}_{J}^{i n i}$$ to the set final location [TeX:] $$\mathbf{q}_{J}^{f i n}$$ . In (14h), the distance between the SUAV R and the SUAV J is greater than the minimum safe distance [TeX:] $$d_{\min }$$ in order to prevent colliding each other.

In problem (P1), we note that the objective function (14a) which includes a operator [TeX:] $$[\cdot]^{+} \text {and } \mathrm{a} \text { "max" }$$ operation is a non-concave function. Due to the coupling correlation of multiple optimization variables, the constraints (8), (11), and (12) are all non-convex. Therefore, the problem (P1) is a non-convex problem. In Section III, we will tackle the objective function and the non-convex constraint conditions in order to transform the non-convex problem (P1) into the convex problem. And we will obtain the locally optimal solution of the problem (P1) by putting forward an effective optimization algorithm.

III. PROPOSED SOLUTION TO PROBLEM

In this section, we first tackle the uncertain expression max [TeX:] $$\max _{\boldsymbol{w}_{e} \in \Omega} R_{R, E}[l]$$ to an explicit expression. Due to the location uncertainty of the SE, the SUAV R and the SUAV J only attain it’s the estimated location in the estimation range. According to the expression of the formula (7), we have

(15)
[TeX:] $$\max _{\boldsymbol{w}_{e} \in \Omega} R_{R, E}[l]=\log _{2}\left(1+\frac{\max _{\boldsymbol{w}_{e} \in \Omega} h_{R, E}[l] P_{R}[l]}{\min _{\boldsymbol{w}_{e} \in \Omega} h_{J, E}[l] P_{J}[l]+\delta_{a}^{2}}\right).$$

On the basis of the simple derivation and proof of the literatures [33], [41], the optimal channel power gain [TeX:] $$\hat{h}_{R, E}[l]$$ from the SUAV R to the SE is obtained at [TeX:] $$\boldsymbol{w}_{e}[l]=\hat{\boldsymbol{w}}_{e}+\frac{\mathbf{q}_{R}[l]-\hat{\boldsymbol{w}}_{e}}{\left\|\mathbf{q}_{R}[l]-\hat{\boldsymbol{w}}_{e}\right\|} \pi$$. The [TeX:] $$\hat{h}_{R, E}[l] \stackrel{\Delta}{=} \max _{\boldsymbol{w}_{e} \in \Omega} h_{R, E}[l]$$ is written as

(16)
[TeX:] $$\hat{h}_{R, E}[l]=\frac{\beta_{0}}{\left(\left\|\mathbf{q}_{R}[l]-\hat{\boldsymbol{w}}_{e}\right\|-\pi\right)^{2}+H_{R}^{2}}$$

Likewise, the power gain [TeX:] $$\hat{h}_{J, E}[l]$$ of the worst channel from the SUAV J to the SE is acquired at [TeX:] $$\boldsymbol{w}_{e}[l]=\hat{\boldsymbol{w}}_{e}-\frac{\mathbf{q}_{R}[l]-\hat{\boldsymbol{w}}_{e}}{\left\|\mathbf{q}_{R}[l]-\hat{\boldsymbol{w}}_{e}\right\|} \pi$$ [33], [41]. The [TeX:] $$\text { The } \hat{h}_{J, E}[l] \triangleq \min _{\boldsymbol{w}_{e} \in \Omega} h_{J, E}[l]$$ is ex-pressed as

(17)
[TeX:] $$\hat{h}_{J, E}[l]=\frac{\beta_{0}}{\left(\left\|\mathbf{q}_{J}[l]-\hat{\boldsymbol{w}}_{e}\right\|+\pi\right)^{2}+H_{J}^{2}}.$$

According to the formulas (15), (16), and (17), the upper bound rate [TeX:] $$\hat{R}_{R, E}[l]$$ of the achievable rate between the SUAV R and the SE is written as

(18)
[TeX:] $$\hat{R}_{R, E}[l]=\log _{2}\left(1+\frac{\hat{h}_{R, E}[l] P_{R}[l]}{\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}}\right)$$

Therefore, we can infer that [TeX:] $$\hat{R}_{R, E}[l]$$ is the upper bound of max [TeX:] $$\hat{R}_{R, E}[l]$$, i.e., max [TeX:] $$\max R_{R, E}[l] \leq \hat{R}_{R, E}[l]$$. In (13), we use [TeX:] $$\hat{R}_{R, E}[l]$$ instead of max [TeX:] $$\max _{\boldsymbol{w}_{e} \in \Omega} R_{R, E}[l]$$ to obtain the lower bound of secrecy rate, which is [TeX:] $$\hat{R}_{s e r}[l]=\left[R_{R, S}[l]-\hat{R}_{R, E}[l]\right]^{+}$$ time slot. Thus, we replace [TeX:] $$\sum_{l=1}^{L} R_{s e r}[l]$$ of the objective function (14a) with explicit function [TeX:] $$\sum_{l=1}^{L} \hat{R}_{\operatorname{ser}}[l]$$ to maximize the lower bound value of the cumulative secrecy rate in problem (P1). Since the transmit power optimization can always make the cumulative secrecy rate non-negative [33], the [TeX:] $$[\cdot]^{+}$$ is omitted in the objective function. Therefore, we approximate problem (P1) to obtain problem (P2), which is as follow

(19a)
[TeX:] $$(\mathrm{P} 2): \max _{\mathcal{P}, \mathcal{Q}} \frac{1}{L} \sum_{l=1}^{L}\left(R_{R, S}[l]-\hat{R}_{R, E}[l]\right)$$

(19b)
[TeX:] $$\text { s.t. }(14 b),(14 c),(14 d),(14 e),(14 f),(14 g),$$

(19c)
[TeX:] $$(8),(10),(11), \text { and }(12).$$

Nevertheless, the objective function of problem (P2) still is a non-concave function in addition to the non-convex constrains (8), (11) and (12). Thus, the problem (P2) is a non-convex problem and need to be disposed. The alternating optimization means is adopted to handle the non-convex problem (P2) in this paper. We will divide problem (P2) into three subproblems, which are the subproblem of only optimizing the trajectory [TeX:] $$\mathbf{q}_{R}[l]$$ of the SUAV R, the subproblem of only optimizing the trajectory [TeX:] $$\mathbf{q}_{J}[l]$$ of the SUAV J, and the subproblem of jointly optimizing the transmit power [TeX:] $$P_{n}[l],P_{R}[l] \text { and } P_{J}[l]$$, respectively.

A. Transmit Power Allocation

In this subproblem, we jointly optimizing the transmit power [TeX:] $$P_{n}[l]$$ of the SIoT n, the transmit power [TeX:] $$P_{R}[l]$$ of the SUAV R and the transmit power [TeX:] $$P_{J}[l] c$$ of the SUAV J under the given trajectories of the SUAV R and the SUAV J. Thus, the subproblem (P3) is formulated as follow

(20a)
[TeX:] $$(\mathrm{P} 3): \max _{\mathcal{P}} \frac{1}{L} \sum_{l=1}^{L}\left(R_{R, S}[l]-\hat{R}_{R, E}[l]\right)$$

(20b)
[TeX:] $$\text { s.t. }(14 b),(14 c),(14 d) \text {, }$$

(20c)
[TeX:] $$(8),(10),(11), \text { and }(12).$$

Due to the non-concave objective function in (P3), we first need to transform it to a concave function. The expansion form of the formula [TeX:] $$R_{R, S}[l]-\hat{R}_{R, E}[l]$$ is written as

(21)
[TeX:] $$\begin{aligned} R_{R, S} & {[l]-R_{R, E}[l] } \\ =& \log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}+h_{R, S}[l] P_{R}[l]\right) \\ &+\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}\right)-\log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}\right) \\ &-\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]\right) \end{aligned}$$

where the [TeX:] $$\log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}+h_{R, S}[l] P_{R}[l]\right)$$ and [TeX:] $$\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}\right)$$ are concave terms in regard to th evariables [TeX:] $$P_{J}[l] \quad \text { or } \quad P_{R}[l]$$. However the [TeX:] $$-\log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}\right)$$ and [TeX:] $$-\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]\right)$$ are convex terms in regard to the variables [TeX:] $$P_{J}[l] \text { or } P_{R}[l]$$ and need to be handled. The first order Taylor expansion method is applied to tackle the term [TeX:] $$-\log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}\right)$$ and get its lower bound function with the variable [TeX:] $$P_{J}[l]$$ as follws

(22)
[TeX:] $$-\log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}\right) \geq \\ -\log _{2}\left(h_{J, S}[l] P_{J}^{(i)}[l]+\delta_{a}^{2}\right)-\frac{h_{J, S}[l]\left(P_{J}[l]-P_{J}^{(i)}[l]\right)}{\ln 2\left(h_{J, S}[l] P_{J}^{(i)}[l]+\delta_{a}^{2}\right)},$$

where [TeX:] $$P_{J}^{(i)}[l]$$ represents the SUAV J power value of the ith iteration. For the dispose of term [TeX:] $$-\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]\right)$$, we introduce the nonnegative relaxation variable [TeX:] $$A[l]$$. Let [TeX:] $$\frac{1}{A[l]}=\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]$$. And the term [TeX:] $$-\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]\right)$$ is equivalent to [TeX:] $$\log _{2}(A[l])$$ which is a concave function. Therefore, the objective function is rewritten as

(23)
[TeX:] $$\begin{aligned} R_{R, S} & {[l]-\hat{R}_{R, E}[l] } \\ =& \log _{2}\left(h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}+h_{R, S}[l] P_{R}[l]\right) \\ &+\log _{2}\left(\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}\right)-\log _{2}\left(h_{J, S}[l] P_{J}^{(i)}[l]+\delta_{a}^{2}\right) \\ &-\frac{h_{J, S}[l]\left(P_{J}[l]-P_{J}^{(i)}[l]\right)}{\ln 2\left(h_{J, S}[l] P_{J}^{(i)}[l]+\delta_{a}^{2}\right)}+\log _{2}(A[l]) \\ \triangleq & \tilde{R}_{s e r}[l] . \end{aligned}$$

Based on the concave dispose of the objective function of problem (P3), the (P3) is reformulated as

(24a)
[TeX:] $$(\mathrm{P} 3.1): \max _{\left\{P_{n}[l], P_{R}[l], P_{J}[l], A[l]\right\}} \frac{1}{L} \sum_{l=1}^{L} \tilde{R}_{s e r}[l]$$

(24b)
[TeX:] $$\text { s.t. } \frac{1}{A[l]} \geq \hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]$$

(24c)
[TeX:] $$(14 b),(14 c),(14 d),$$

(24d)
[TeX:] $$(8),(10),(11), \text { and }(12).$$

By adding a new constraint (24b), we can deduce that the objective function of problem (P3.1) is lower bound of that of problem (P3). Since the constraints (24b) and (8) are non-convex, the problem (P3.1) is still non-convex problem. The left hand side of (24b) is a convex term. Thus, we perform the first order Taylor expansion for the item [TeX:] $$\frac{1}{A[l]}$$ as follows

(25)
[TeX:] $$\frac{1}{A[l]} \geq \frac{1}{A^{(i)}[l]}-\frac{A[l]-A^{(i)}[l]}{\left(A^{(i)}[l]\right)^{2}}=\frac{2 A^{(i)}[l]-A[l]}{\left(A^{(i)}[l]\right)^{2}}$$

where [TeX:] $$A^{(i)}[l]$$ is the obtained value at the ith iteration. The formula (8) is rewritten as

(26)
[TeX:] $$\begin{aligned} &\sum_{r=2}^{l} \log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r]\right) \\ &-\sum_{r=2}^{l} \log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}\right) \\ &\leq \sum_{r=1}^{l-1} \sum_{n=1}^{N} \log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}+h_{n, R}[r] P_{n}[r]\right) \\ &\quad-\sum_{r=1}^{l-1} \sum_{n=1}^{N} \log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}\right), l \in \tilde{\mathcal{L}} \end{aligned}$$

Due to the non-convexity of the term [TeX:] $$\log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r]\right)$$ in (26), we introduce the nonnegative relaxation variable [TeX:] $$B[r]$$]. We define [TeX:] $$\frac{1}{B[r]}=h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r]$$. The term [TeX:] $$\log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r]\right)$$ is equivalent to [TeX:] $$-\log _{2}(B[r])$$ which is a convex function. Meanwhile, in optimization problem (P3.1), we add new constraint condition, which is

(27)
[TeX:] $$\frac{1}{B[r]} \geq h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r], l \in \tilde{\mathcal{L}}.$$

With the new constraint (27), we can deduce that [TeX:] $$-\log _{2}(B[r])$$ is upper bound of [TeX:] $$\log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[r]\right)$$ based on the monotonicity of the log function. For the non-concavity of the left side term of the constraint (27), we utilize the first order Taylor expansion to get the lower bound of theterm [TeX:] $$\frac{1}{B[l]}$$ as follow

(28)
[TeX:] $$\frac{1}{B[l]} \geq \frac{1}{B^{(i)}[l]}-\frac{B[l]-B^{(i)}[l]}{\left(B^{(i)}[l]\right)^{2}}=\frac{2 B^{(i)}[l]-B[l]}{\left(B^{(i)}[l]\right)^{2}},$$

where [TeX:] $$B^{(i)}[l]$$ is the obtained value at the ith iteration. Since the right side term [TeX:] $$-\log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}\right)$$ of the constraint (26) is convex, the lower bound of the term [TeX:] $$-\log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}\right)$$ based on the first order Taylor expansion in regard to the variable [TeX:] $$P_{J}[r]$$ is written as

(29)
[TeX:] $$\begin{aligned} &-\log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}\right) \geq \\ &-\log _{2}\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right)-\frac{h_{J, R}[r]\left(P_{J}[r]-P_{J}^{(i)}[r]\right)}{\ln 2\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right)} \end{aligned}.$$

(29)
[TeX:] $$\begin{aligned} &-\log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}\right) \geq \\ &-\log _{2}\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right)-\frac{h_{J, R}[r]\left(P_{J}[r]-P_{J}^{(i)}[r]\right)}{\ln 2\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right)} \end{aligned}.$$

Based on the above convex processing of the constraint condition (26), it is rewritten as

(30)
[TeX:] $$\begin{aligned} &-\sum_{r=2}^{l} \log _{2}(B[r])-\sum_{r=2}^{l} \log _{2}\left(h_{J, S}[r] P_{J}[r]+\delta_{a}^{2}\right) \\ \leq & \sum_{r=1}^{l-1} \sum_{n=1}^{N} \log _{2}\left(h_{J, R}[r] P_{J}[r]+\delta_{a}^{2}+h_{n, R}[r] P_{n}[r]\right) \\ &-\sum_{r=1}^{l-1} N \log _{2}\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right) \\ &-\sum_{r=1}^{l-1} \frac{N h_{J, R}[r]\left(P_{J}[r]-P_{J}^{(i)}[r]\right)}{\ln 2\left(h_{J, R}[r] P_{J}^{(i)}[r]+\delta_{a}^{2}\right)}, \forall l \in \tilde{\mathcal{L}} \end{aligned}.$$

By the convex processing of the objective function, the constraint (8) as well as the new added constraints, we can acquire the convex approximate problem (P3.2) of the problem(P3). The problem (P3.2) is formulated as

(31a)
[TeX:] $$(\mathrm{P} 3.2):_{\left\{P_{n}[l], P_{R}[l], P_{J}[l], A[l], B[l]\right\}} \frac{1}{L} \sum_{l=1}^{L} \tilde{R}_{s e r}[l]$$

(31b)
[TeX:] $$\text { s.t. } \frac{2 A^{(i)}[l]-A[l]}{\left(A^{(i)}[l]\right)^{2}} \geq \hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l], \forall l \text {, }$$

(31c)
[TeX:] $$\frac{2 B^{(i)}[l]-B[l]}{\left(B^{(i)}[l]\right)^{2}} \geq h_{J, S}[r] P_{J}[l]+\delta_{a}^{2}+h_{R, S}[r] P_{R}[l], \forall l,$$

(31d)
[TeX:] $$(14 b),(14 c),(14 d)$$

(31e)
[TeX:] $$(10),(11),(12) \text {, and }(30).$$

It is noticed that problem (P3.2) is a convex problem by the convex dispose of the objective function and the constraint (26). Since the interior point method is an optimization algorithm based on the penalty function [42], we adopt it to solve problem (P3.2) to acquire the optimal solution, which can also meet problem (P3.1). Thus, problem (P3.2) is equivalent to problem (P3.1) for the SUAVs' power allocation. Based on the constraint (24b) and the lower bound approximate of the formula (22), we can deduce that the optimization value of problem (P3.1) is the lower bound of that of problem (P3). Therefore, the optimal feasible solution of problem (P3.2) is also the feasible solution of problem (P3).

B. Optimizing The UAV Jammer's Trajectory

In this subsection, we optimize the flight trajectory [TeX:] $$\mathbf{q}_{J}[l]$$ of the SUAV J under the given the SUAV R's trajectory [TeX:] $$\mathbf{q}_{R}[l]$$ and transmit power [TeX:] $$P_{R}[l]$$, the SUAV J's transmit power [TeX:] $$P_{J}[l]$$ and the transmit power [TeX:] $$P_{n}[l]$$ of the SIoT n. Thus, we are able to formulate the subproblem (P4), that is expressed as follows

(32a)
[TeX:] $$\begin{aligned} &(\mathrm{P} 4): \max _{\mathbf{q}_{J}[l]} \frac{1}{L} \sum_{l=1}^{L}\left[\log _{2}\left(1+\frac{h_{R, S}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{J}^{2}}+\delta_{a}^{2}}\right)\right. \\ &\left.-\log _{2}\left(1+\frac{\hat{h}_{R, E}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\left(\left\|\mathbf{q}_{J}[l]-\hat{w}_{e}\right\|+\pi\right)^{2}+H_{J}^{2}}+\delta_{a}^{2}}\right)\right] \\ &\text { s.t. } \sum_{r=2}^{l} \log _{2}\left(1+\frac{h_{R, S}[r] P_{R}[r]}{\frac{\beta_{0} P_{J}[r]}{\left\|\mathbf{q}_{J}[r]-\boldsymbol{w}_{s}\right\|^{2}+H_{J}^{2}}+\delta_{a}^{2}}\right) \end{aligned}$$

(32b)
[TeX:] $$l \in \tilde{\mathcal{L}},$$

(32c)
[TeX:] $$\left\|\mathbf{q}_{I}[l+1]-\mathbf{q}_{I}[l]\right\| \leq \hat{V}_{\max },$$

(32d)
[TeX:] $$(14 g),(14 h), \text { and }(12).$$

Since the objective function (32a) is a non-concave function and the constraints (32b) and (14h) are non-convex in problem (P4), the problem (P4) is a non-convex problem. The slack variables [TeX:] $$\omega[l], \quad \eta[l], \quad \mu[r], \quad \text { sand } \varphi[l]$$ are introduced to the objective function and the constraints of problem (P4) so as to do convex processing for them. Thus, problem (P4) is rewritten as

(33a)
[TeX:] $$\begin{gathered} (\mathbf{P} 4.1): \max _{\left\{\mathbf{q}_{J}[l], \omega[l], \eta[l], \mu[r], \varphi[l]\right\}} \frac{1}{L} \sum_{l=1}^{L}[\omega[l] \\ \left.-\log _{2}\left(1+\frac{\hat{h}_{R, E}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\eta[l]}+\delta_{a}^{2}}\right)\right] \end{gathered}$$

(33b)
[TeX:] $$\text { s.t. } \sum_{r=2}^{l} \omega[r] \leq \sum_{r=1}^{l-1} \sum_{n=1}^{N} \log _{2}\left(1+\frac{h_{n, R}[r] P_{n}[r]}{\frac{\beta_{0} P_{J}[r]}{\mu[r]}+\delta_{a}^{2}}\right), l \in \tilde{\mathcal{L}},$$

(33c)
[TeX:] $$\omega[l] \leq \log _{2}\left(1+\frac{h_{R, S}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\varphi[l]}+\delta_{a}^{2}}\right)$$

(33d)
[TeX:] $$\left(\left\|\mathbf{q}_{J}[l]-\hat{w}_{e}\right\|+\pi\right)^{2}+H_{J}^{2} \leq \eta[l]$$

(33e)
[TeX:] $$\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2} \geq \mu[l]$$

(33f)
[TeX:] $$\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{J}^{2} \geq \varphi[l]$$

(33g)
[TeX:] $$\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2} \geq d_{\min }^{2}$$

(33h)
[TeX:] $$\frac{\beta_{0} P_{J}[l]}{\Gamma^{R J}} \leq\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{J}^{2}$$

(33i)
[TeX:] $$(14 g)$$

where [TeX:] $$\Delta H=H_{R}-H_{J}$$, and the (33h) is the transformation form of (12) due to the positive [TeX:] $$\Gamma^{R J} \text { and }\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+ H_{J}^{2}.$$. In problem (P4.1), the new objective function (33a) and the added constraints (33c), (33d), and (33f) replace the objective function (32a) of problem (P4). From the inequalities (33c), (33d), and (33f), we can easily deduce that the objective function (33a) is the lower bound of (32a). By adding the constraint (33e), we can observe that the right hand side (RHS) term of (33b) is the lower bound of that of (32b). In constraint (33f), there exists always a feasible solution [TeX:] $$\mathbf{q}_{J}[l]$$ to meet the inequalities (33f) equal by decreasing variable [TeX:] $$\varphi[l]$$. Meanwhile, the feasible solution [TeX:] $$\mathbf{q}_{J}[l]$$ satisfies also the constraint (32b) of problem (P4). Thus, the constraint (33b) is equivalent to the constraint (32b) by adding new constraints (33c), (33e) and (33f). This indicates that the problem (P4.1) is an approximate problem of (P4). Although the constraints (33b), (33c), (33d) and (14g) are convex constraints in problem (P4.1), the objective function is non-concave in regard to variable [TeX:] $$\eta[l]$$ and other constraints are all non-convex. Therefore, problem (P4.1) is still a non-convex problem.

Because the term [TeX:] $$-\log _{2}\left(1+\frac{\hat{h}_{R, E}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\eta[l]}+\delta_{a}^{2}}\right)$$of the objective function (33a) is convex, it need to be tackled by the first order Taylor expansion and its expansion is as follow

(34)
[TeX:] $$\begin{array}{r} -\log _{2}\left(1+\frac{\hat{h}_{R, E}[l] P_{R}[l]}{\frac{\beta_{0} P_{J}[l]}{\eta[l]}+\delta_{a}^{2}}\right) \geq-Y^{(i)}[l] \\ -S^{(i)}[l]\left(\eta[l]-\eta^{(i)}[l]\right), l \in \mathcal{L} \end{array}$$

where [TeX:] $$Y^{(i)}[l]=\log _{2}\left(1+\frac{\hat{h}_{R, F}[l] P_{R}[l] \eta^{(i)}[l]}{\beta_{0} P_{J}[l]+\delta_{a}^{2} \eta^{(i)}[l]}\right)$$ and [TeX:] $$S^{(i)}[l]=\frac{\beta_{0} \hat{h}_{R, E}[l] P_{R}[l] P_{J}[l]}{\ln 2\left(\beta_{0} P_{J}[l]+\delta_{a}^{2} \eta^{(i)}[l]\right)\left(\beta_{0} P_{J}[l]+\left(\delta_{a}^{2}+\hat{h}_{R, E}[l] P_{R}[l]\right) \eta^{(i)}[l]\right)}$$. The left hand side (LHS) terms of the constraints (33e), (33f), and (33g) and the RHS term of (33h) are convex functions and they don't satisfy convex condition. Based on the first order Taylor expansion method, we can attain the lower bound of the LHS terms of (33e), (33f) and (33g) as well as the RHS term of (33h), and we have the inequalities as follows

(35)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{J}[l]-\mathbf{q}_{R}[l]\right\|^{2} \geq \\ &\left\|\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right), \end{aligned}$$

(36)
[TeX:] $$\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{s}\right\|^{2} \geq\\\left\|\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{s}\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right),$$

(37)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{J}[l]-\boldsymbol{w}_{P, k}\right\|^{2} \geq \\ &\left\|\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{P, k}\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right) . \end{aligned}$$

According to the inequalities (35), (36) and (37), the constraint conditions (33e), (33f), (33g) and (33h) are rewritten as

(38)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right) \\ &\quad+\Delta H^{2} \geq \mu[l], \end{aligned}$$

(39)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{s}\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right) \\ &\quad+H_{J}^{2} \geq \varphi[l], \end{aligned}$$

(40)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right\|^{2}+2\left(\mathbf{q}_{J}^{(i)}[l]-\mathbf{q}_{R}[l]\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right) \\ &\quad+\Delta H^{2} \geq d_{\min }^{2}, \end{aligned}$$

(41)
[TeX:] $$\begin{aligned} \frac{\beta_{0} P_{J}[l]}{\Gamma^{R J}} \leq &\left\|\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{P, k}\right\|^{2} \\ &+2\left(\mathbf{q}_{J}^{(i)}[l]-\boldsymbol{w}_{P, k}\right)^{T}\left(\mathbf{q}_{J}[l]-\mathbf{q}_{J}^{(i)}[l]\right)+H_{J}^{2} . \end{aligned}$$

Based on above convex dispose of the objective function and the constraints, problem (P4.1) is reformulated as

(42a)
[TeX:] $$\begin{gathered} (\mathrm{P} 4.2): \max _{\left\{\mathbf{q}_{J}[l], \omega[l], \eta[l], \mu[r], \varphi[l]\right\}} \frac{1}{L} \sum_{l=1}^{L}\left[\omega[l]-S^{(i)}[l] \eta[l]\right. \\ \left.-Y^{(i)}[l]+S^{(i)}[l] \eta^{(i)}[l]\right] \end{gathered}$$

(42b)
[TeX:] $$\text { s.t. }(33 b),(33 c),(33 d),(38),(39),(40),(41) \text {, and }(14 g) \text {. }$$

Through the convex dispose of the objective function and the constraints of (P4.1), the new problem (P4.2) is certified to be a convex optimization problem which is able to be solved by the convex optimization tool CVX. The optimal solution of (P4.2) which can satisfy the constraints of (P4.1) is the feasible solution of (P4.1). Since problem (P4.1) is equivalent to problem (P4), problem (P4.2) is also equivalent to problem (P4).

C. Optimizing The UAV Relay's Trajectory

In this subsection, we optimize the flight trajectory [TeX:] $$\mathbf{q}_{R}[l]$$ of the SUAV R with the fixed the SUAV J's trajectory [TeX:] $$\mathbf{q}_{J}[l]$$ and the transmit power [TeX:] $$P_{J}[l]$$, the SUAV R's transmit power [TeX:] $$P_{R}[l]$$ and the transmit power [TeX:] $$P_{n}[l]$$ of the SIoT n. So, we are able to formulate the subproblem (P5), which is written as

(43a)
[TeX:] $$\begin{gathered} (\mathrm{P} 5): \max _{\left\{\mathbf{q}_{R}[l]\right\}} \frac{1}{L} \sum_{l=1}^{L}\left[\log _{2}\left(1+\frac{g[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right)\right. \\ \left.-\log _{2}\left(1+\frac{f[l]}{\left(\left\|\mathbf{q}_{R}[l]-\hat{w}_{e}\right\|-\pi\right)^{2}+H_{R}^{2}}\right)\right] \end{gathered}$$

(43b)
[TeX:] $$\begin{aligned} \text { s.t. } & \sum_{r=2}^{l} \log _{2}\left(1+\frac{g[r]}{\left\|\mathbf{q}_{R}[r]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right) \\ \leq & \sum_{r=1}^{l-1} \sum_{n=1}^{N} \log _{2}\left(1+\frac{\beta_{0} P_{n}[r]}{\frac{\left\|\mathbf{q}_{R}[r]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}}{\beta_{0} P_{J}[r]}}\right), \end{aligned}$$

(43c)
[TeX:] $$\left\|\mathbf{q}_{R}[l+1]-\mathbf{q}_{R}[l]\right\| \leq \hat{V}_{\max },$$

(43d)
[TeX:] $$(11),(14 f) \text { and }(14 h),$$

where [TeX:] $$g[l]=\frac{\beta_{0} P_{R}[l]}{h_{J, S}[l] P_{J}[l]+\delta_{a}^{2}}$$ and [TeX:] $$f[l]=\frac{\beta_{0} P_{R}[l]}{\hat{h}_{J, E}[l] P_{J}[l]+\delta_{a}^{2}}$$. In problem (P5), the objective function (43a) is non-concave function and the constraints (43b) and (11) are non-convex in regard to [TeX:] $$\mathbf{q}_{R}[r]$$ . Therefore, problem (P5) is a non-convex problem. The slack variable [TeX:] $$\psi[l] \text { and } \phi[l]$$ are introduced to the objective function (43a). Consider concave or linear processing for the objective function, the slack variables are expressed as [TeX:] $$\psi[l]=\log _{2}\left(1+\frac{g[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right)$$ and [TeX:] $$\phi[l]=\left(\left\|\mathbf{q}_{R}[l]-\hat{w}_{e}\right\|-\pi\right)^{2}+H_{R}^{2}$$. We introduce slack variables [TeX:] $$C[r]$$ and [TeX:] $$\rho[r]$$ to define them as [TeX:] $$C[r]=\frac{\beta_{0} P_{J}[r]}{\left\|\mathbf{q}_{R}[r]-\mathbf{q}_{J}[r]\right\|^{2}+\Delta H^{2}}+\delta_{a}^{2}+\frac{\beta_{0} P_{n}[r]}{\left\|\mathbf{q}_{R}[r]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}}$$ and [TeX:] $$\rho[r]=\left\|\mathbf{q}_{R}[r]-\mathbf{q}_{J}[r]\right\|^{2}+\Delta H^{2}$$, respectively. And we have

(44)
[TeX:] $$\begin{aligned} &\log _{2}\left(1+\frac{\frac{\beta_{0} P_{n}[r]}{\left\|\mathbf{q}_{R}[r]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}}}{\frac{\beta_{0} P_{J}[r]}{\left\|\mathbf{q}_{R}[r]-\mathbf{q}_{J}[r]\right\|^{2}+\Delta H^{2}}+\delta_{a}^{2}}\right) \\ &=\log _{2} C[r]-\log _{2}\left(\frac{\beta_{0} P_{J}[r]}{\rho[r]}+\delta_{a}^{2}\right). \end{aligned}$$

By introducing multiple slack variables and new constraints, we can get new problems (P5.1), which is

(45a)
[TeX:] $$(\mathrm{P} 5.1): \max _{\left\{\mathbf{q}_{R}[l], \psi[l], \phi[l], C[l], \rho[l]\right\}} \frac{1}{L} \sum_{l=1}^{L}\left[\psi[l]-\log _{2}\left(1+\frac{f[l]}{\phi[l]}\right)\right]$$

(45b)
[TeX:] $$\text { s.t. } \sum_{r=2}^{l} \psi[r] \leq \sum_{r=1}^{l-1} \sum_{n=1}^{N}\left(\log _{2} C[r]-\log _{2}\left(\frac{\beta_{0} P_{J}[r]}{\rho[r]}+\delta_{a}^{2}\right)\right),$$

(45c)
[TeX:] $$\psi[l] \leq \log _{2}\left(1+\frac{g[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right),$$

(45d)
[TeX:] $$\phi[l] \leq\left(\left\|\mathbf{q}_{R}[l]-\hat{w}_{e}\right\|-\pi\right)^{2}+H_{R}^{2},$$

(45e)
[TeX:] $$\begin{aligned} C[l] \leq & \frac{\beta_{0} P_{J}[l]}{\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2}} \\ &+\delta_{a}^{2}+\frac{\beta_{0} P_{n}[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}}, \end{aligned}$$

(45f)
[TeX:] $$\rho[l] \leq\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2},$$

(45g)
[TeX:] $$(11),(14 f),(14 h), \text { and }(43 c).$$

By adding two new constraints (45c) and (45d) in problem (P5.1), it can deduce that the transformed objective function (45a) is the lower bound of (43a) of problem (P5). The added constraints (45e) and (45f) can indicate that the RHS of (45b) is lower bound of that of (43b). In constraint (45c), the exists always a feasible solution [TeX:] $$\psi[l]$$ meet simultaneously the constraints (45b), (45c) and (43b) by reducing variable [TeX:] $$\mathbf{q}_{R}[l]$$. Thus, the constraint (45b) is equivalent to (43b). The optimal solution of problem (P5.1) is also the feasible solution of problem (P5). This indicates that problem (P5.1) is an approximate problem of (P5). We can observe that the objective function is a concave function, and the constraints (45b), (14f) and (43c) are convex constraint conditions. But the constraints (45c), (45d), (45e), (45f), (11) and (14h) are non-convex conditions to need to be handled. Therefore, the problem (P5.1) is still a non-convex problem.

Since the RHS of the constraints (45c), (45d), (45e), (45f), and (14h) are convex functions, which do not satisfy convex condition. The first order Taylor expansion method is applied to tackle them. Thus, we have the inequalities as follows

(46)
[TeX:] $$\begin{aligned} \log _{2}(&\left.+\frac{g[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right) \geq X^{(i)}[l] \\ -Z^{(i)}[l]\left(\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}-\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}\right), \end{aligned}$$

(47)
[TeX:] $$\begin{aligned} \| \mathbf{q}_{R}[l] &-\hat{w}_{e}\left\|^{2} \geq\right\| \mathbf{q}_{R}^{(i)}[l]-\hat{w}_{e} \|^{2} \\ &+2\left(\mathbf{q}_{R}^{(i)}[l]-\hat{w}_{e}\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right), \end{aligned}$$

(48)
[TeX:] $$\begin{aligned} &\frac{\beta_{0} P_{J}[l]}{\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2}} \geq K^{(i)}[l] \\ &-M^{(i)}[l]\left(\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}-\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2}\right), \end{aligned}$$

(49)
[TeX:] $$\begin{gathered} \frac{\beta_{0} P_{n}[l]}{\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}} \geq \frac{2 \beta_{0} P_{n}[l]}{\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}} \\ -\frac{\beta_{0} P_{n}[l]\left(H_{R}^{2}+\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{n}\right\|^{2}\right)}{\left(\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}\right)^{2}}, \end{gathered}$$

(50)
[TeX:] $$\begin{aligned} &\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2} \geq\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2} \\ &\quad+2\left(\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right), \end{aligned}$$

where we define [TeX:] $$X^{(i)}[l]=\log _{2}\left(1+\frac{g[l]}{\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}}\right)$$, [TeX:] $$Z^{(i)}[l]=\frac{g[l]}{\ln 2\left(\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}\right)\left(\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}+H_{R}^{2}+g[l]\right)}$$, [TeX:] $$K^{(i)}[l] \quad=\quad \frac{\beta_{0} P_{J}[l]}{\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2}}$$ and [TeX:] $$M^{(i)}[l] \quad=\frac{\beta_{0} P_{J}[l]}{\left(\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta H^{2}\right)^{2}}$$. The constraint condition (11) is also the non-convex constraint. Due to the positive term [TeX:] $$\Gamma^{R J} \text { and }\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{R}^{2}$$R, we move the LHS term and the RHS term of (11) and attain new inequality as [TeX:] $$\frac{\beta_{0} P_{R}[l]}{\Gamma^{R J}} \leq\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{R}^{2}$$, the RHS term of which is tackled based on the first order Taylor expansion method as follow

(51)
[TeX:] $$\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{P, k}\right\|^{2} \geq\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{P, k}\right\|^{2}\\+2\left(\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{P, k}\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right) .$$

According to the above convex processing for the constraint conditions of problem (P5.1), we are able to attain new optimization problem (P5.2), which is formulated as

(52a)
[TeX:] $$(\mathrm{P} 5.2): \max _{\left\{\begin{array}{l} \mathbf{q}_{R}[l], \psi[l], \\ \phi[l], C[l], \rho[l] \end{array}\right\}} \frac{1}{L} \sum_{l=1}^{L}\left[\psi[l]-\log _{2}\left(1+\frac{f[l]}{\phi[l]}\right)\right]$$

(52b)
[TeX:] $$\text { s.t. } \sum_{r=2}^{l} \psi[r] \leq \sum_{r=1}^{l-1} \sum_{n=1}^{N}\left(\log _{2} C[r]-\log _{2}\left(\frac{\beta_{0} P_{J}[r]}{\rho[r]}+\delta_{a}^{2}\right)\right),$$

(52c)
[TeX:] $$\psi[l] \leq X^{(i)}[l]-Z^{(i)}[l]\left(\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{s}\right\|^{2}-\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{s}\right\|^{2}\right),$$

(52d)
[TeX:] $$\begin{aligned} \phi[l] \leq &\left\|\mathbf{q}_{R}^{(i)}[l]-\hat{w}_{e}\right\|^{2}-2 \pi\left\|\mathbf{q}_{R}[l]-\hat{w}_{e}\right\|+\pi^{2}+H_{R}^{2} \\ &+2\left(\mathbf{q}_{R}^{(i)}[l]-\hat{w}_{e}\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right) \end{aligned},$$

(52e)
[TeX:] $$\begin{aligned} C[l] & \leq K^{(i)}[l]+\delta_{a}^{2}+\frac{2 \beta_{0} P_{n}[l]}{\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}} \\ &-M^{(i)}[l]\left(\left\|\mathbf{q}_{R}[l]-\mathbf{q}_{J}[l]\right\|^{2}-\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2}\right) \\ &-\frac{\beta_{0} P_{n}[l]\left(H_{R}^{2}+\left\|\mathbf{q}_{R}[l]-\boldsymbol{w}_{n}\right\|^{2}\right)}{\left(\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{n}\right\|^{2}+H_{R}^{2}\right)^{2}}, \end{aligned}$$

(52f)
[TeX:] $$\rho[l] \leq \Upsilon^{(i)}[l]+2\left(\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right),$$

(52g)
[TeX:] $$\frac{\beta_{0} P_{R}[l]}{\Gamma^{R}} \leq \Psi_{k}^{(i)}[l]+2\left(\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{P, k}\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right)$$

(52h)
[TeX:] $$\Upsilon^{(i)}[l]+2\left(\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right)^{T}\left(\mathbf{q}_{R}[l]-\mathbf{q}_{R}^{(i)}[l]\right) \geq d_{\min }^{2},$$

(52i)
[TeX:] $$(14 f) \text { and }(43 c),$$

where we define [TeX:] $$\Upsilon^{(i)}[l]=\left\|\mathbf{q}_{R}^{(i)}[l]-\mathbf{q}_{J}[l]\right\|^{2}+\Delta I^{2}$$ and [TeX:] $$\Psi_{k}^{(i)}[l]=\left\|\mathbf{q}_{R}^{(i)}[l]-\boldsymbol{w}_{P, k}\right\|^{2}+H_{R}^{2}$$. Through the dispose of constraints, the problem (P5.2) is a convex problem, which is solved by the CVX toolbox. In the problem (P5.2), the lower bound of some constraint conditions is obtained by convex processing. Thus, the attained feasible solution of problem (P5.2) meets also all constraints of problem (P5.1). This indicates that the feasible solution of problem (P5.2) is also the feasible solution of problem (P5.1). In consequence, problem (P5.2) is equivalent to problem (P5.1). Due to problem (P5.1) is equivalent to problem (P5). Therefore, the feasible solution of problem (P5.2) can satisfy all constraints of problem (P5), and problem (P5.2) is also equivalent to problem (P5.1).

Based on the alternative optimization of problems (P3.2), (P4.2) and (P5.2), the efficient algorithm is designed and summarized as Algorithm 1 to attain the optimal solution.

TABLE I

THE ALTERNATING OPTIMIZATION ALGORITHM.

Algorithm 1
The alternating optimization for (P1).
pseudo1.png

Since the problems (P3.2), (P4.2) and (P5.2) are sub problems of the original problem (P1). Hence, the optimal solutions of (P3.2), (P4.2) and (P5.2) are the sub optimal solution of (P1). According to the algorithm complexity analysis of the literatures [43], [44], the total algorithm complexity is composed of the iteration number of SCA method, iteration complexity and the per-iteration computation cost. In Algorithm 1, the iteration number of SCA method is F. The iteration complexity and the per iteration computation cost are computed as [TeX:] $$O\left(\sqrt{N L} \cdot \ln \left(\theta^{-1}\right)\right) \text { and } O(N L)$$, respectively. Therefore, we can calculate the total complexity of the proposed Algorithm 1 which is written as [TeX:] $$O\left(F \ln \left(\theta^{-1},\right) N^{\frac{3}{2}} L^{\frac{3}{2}}\right)$$.

IV. SIMULATION RESULTS

In this section, numerical results are offered to evaluate the performance of the proposed Algorithm 1. In the cognitive system, we set the initial horizontal positions of the SUAV R and the SUAV J [TeX:] $$\mathbf{q}_{R}^{i n i}=(0,400 m) \text { and } \mathbf{q}_{J}^{i n i}=(0,-1000 m)$$, and their final locations in horizontal direction as [TeX:] $$\mathbf{q}_{R}^{f i n}=(3500 m, 400 m) \text { and } \mathbf{q}_{J}^{f i n}=(3500 m,-1000 m)$$, respectively. During the SUAVs' flight from the initial site to the final site, they all keep the fixed altitude [TeX:] $$H_{R}=H_{J}=30 m$$ to fly within the maximum limit speed [TeX:] $$V_{\max }=30 \mathrm{~m} / \mathrm{s}$$. In order to avoid collision for the SUAV R and the SUAV J each other, the minimum safety distance is set as [TeX:] $$d_{\min }=10 \mathrm{~m}$$. Suppose that there are three SIoTs, i.e., N = 3 and a SU in the secondary network, and they are marked with blue asterisks and blue hexagon in the simulation diagram, respectively. For the average transmit powers of the SIoTn, the SUAV R and the SUAV J, we set them as [TeX:] $$\bar{P}_{T}=20 \mathrm{dBm}, \bar{P}_{R}=20 \mathrm{dBm}$$

Fig. 2.

The optimized trajectories of the SUAVs based on different IT thresholds.
2.png

and [TeX:] $$\bar{P}_{J}=20 \mathrm{dBm}$$Meanwhile, the maximum transmit powers of the SIoTn, the SUAV R and the SUAV J are set as [TeX:] $$P_{T}^{\max }=26 \mathrm{dBm}, P_{R}^{\max }=26 \mathrm{dBm}, \text { and } P_{J}^{\max }=26 \mathrm{dBm}$$ , respectively. In the primary network, it is supposed that there are four the PUs, i.e., K = 4 PUs, and a SE, which are marked by using four black triangles and a red rhombus in the diagram, respectively. The reference power gain of channel is set as [TeX:] $$\beta_{0}=-30 \mathrm{~dB}$$ and the total interference power [TeX:] $$\delta_{a}^{2}$$ is set as [TeX:] $$\delta_{a}^{2}=-80$$ m [24]. For the constraint (10), the path loss exponent is set as = 3 [45]. Since the interference threshold [TeX:] $$\Gamma^{S}$$ caused by the transmit power of the SIoT n for the PUs has no big influence on the trajectories optimization of the SUAVs and the secrecy rate of the secondary relay network, the [TeX:] $$\Gamma^{S}$$ is set as the fixed value, i.e.,[TeX:] $$\Gamma^{S}=-91 \mathrm{dBm}$$.

Fig. 2 shows the optimized trajectories of the SUAV R and the UAV J based on the different IT threshold [TeX:] $$\Gamma^{R J}$$ with the total flight time 180 s and the maximum range estimation value = 20. In Fig. 2, the SUAV R first flies to the sky above the SIoTs from the initial point in order to receive rapidly information with the good links. When the SUAV R flies through the area of the PUs in Fig. 2, we can observe that the SUAV R keeps away from the PUs. That is because that the distance interval between the SUAV R and the PUs can protect the PUs of the primary network from the interference generated by the SUAV R. From the observation of Fig. 2, the SUAV R flies close to the SU in order to transmit more information to the SU within the limited flight time. In Fig. 2, we can observe that the optimized trajectories of the SUAV R and the SUAV J are different with the different IT thresholds [TeX:] $$\Gamma^{R J}$$. When we set the tolerant IT threshold as [TeX:] $$\Gamma^{R J}=-53 \mathrm{dBm}$$ , the optimized trajectories of the SUAV R and the SUAV J are closest to the PUs. When the [TeX:] $$\Gamma^{R J}$$ is set as [TeX:] $$\Gamma^{R J}=-68 \mathrm{dBm}$$ m, the SUAV R and the SUAV J are farthest to the PUs. This indicates that the PUs are more sensitive to the interferences from the SUAV R and the SUAV J when IT threshold value [TeX:] $$\Gamma^{R J}$$ is more smaller. About the optimized trajectory of the SUAV J in Fig. 2, it is observed

Fig. 3.

The SUAVs' optimization trajectories under different flight time.
3.png

that the SUAV J not only keeps away from the PUs, but also is far away from the SUAV R in the most time slots. That is because that the transmit power of the friendly SUAV J also cause interference for the SUAV R and the PUs. As shown in Fig. 2, when the SUAV J flies through the SE, the SUAV J will try to get close to the SE. That is because that the SUAV J can transmit a mass of the disturbed information to the SE in order to improve the secrecy rate of the secondary relay network.

Fig. 3 shows the optimized trajectories of the SUAV R and the SUAV J based on the different total flight time under the tolerant IT threshold [TeX:] $$\Gamma^{R J}=-63 \mathrm{dBm} \text { and } \pi=20$$. By viewing the SUAV R's optimization trajectory in Fig. 3, the SUAV R cannot fly close enough to the SU when the total flight time is set as 140 s, i.e., TFT = 140 s. That is because that the SUAV R does not have enough time to do more missions when the limited flight time is set as TFT = 140 s. When the total flight time is set as TFT = 220 s, we can observe from Fig. 3 that when the SUAV R hovers over the SIoTs and the SU for some time slots, especially over the SU. This indicates that the SUAV R can collect and transmit more information in the secondary network as the total flight time is sufficient. For the comparison of the SUAV J's optimization trajectory with three different flight time in Fig. 3, it is observed that the SUAV J is given more time, the SUAV J is more far away from the PUs and the SUAV R in order to decrease the interference for them. At the same time, we also observe that the SUAV J hovers over the SE for longer time under the sufficient flight time so as to be able to enhance the secrecy rate of the secondary network.

Fig. 4 shows the change of the optimized power for the SIoTs, the SUAV R and the SUAV J with the change of time T based on the IT threshold [TeX:] $$\Gamma^{R J}=-63 \mathrm{dBm}$$, the total flight time 180 s and = 20. In Fig. 4, it is observed that the power values of three SIoTs first increase rapidly to their peak value, and then decline slowly to zero value. That is because that the SUAV R flies close to the SIoTs and collects rapidly more information by increasing the transmit power of the SIoTs. When the SUAV R flies away the SIoTs, the SIoTs decline

Fig. 4.

Change of optimization power versus time T.
4.png

Fig. 5.

The average secrecy rates of the secondary relay network based on different IT thresholds and different total flight time.
5.png

their transmit power due to the power constraint and the IT threshold constraint. From Fig. 4, we can observe that the power value of the SUAV R increases slowly from zero to a maximum value and then decreases slowly to a certain value. However, the change curve of the power value for the SUAV J has an opposite trend in comparison with the change curve of the power for the SUAV R in Fig. 4. That indicates that the SUAV R only collects information and does not delivery information in the beginning period, in which the SUAV J transmits a mass of interference data to the SE by increasing transmit power under the IT threshold constraint. When the SUAV R delivery information to the SU by gradually enlarging the transmit power, the SUAV J will reduce its transmit power yet in order to decrease the interference for the SUAV R's communication.

Fig. 5 shows the the change of average secrecy rates of the secondary relay network based on different IT thresholds [TeX:] $$\Gamma^{R J}$$ and different total flight time under = 20. We can observe from Fig. 5 that the average secrecy rate of the secondary relay network increases with the increase of the interference

Fig. 6.

The average secrecy rates of the secondary relay network versus the total flight time T based on the different optimization schemes.
6.png

threshold value at same total flight time. We can also observe that the average secrecy rate of the secondary relay network increases as the total flight time increases under same the interference threshold value. By combining Figs. 2 and 3 to analyze the simulation result of Fig. 5, we can obtain that the SUAV R can collect and transmit more information to the SU by flying closer to the SIoTs and the SU to improve the average secrecy rate of the secondary relay network when the IT threshold [TeX:] $$\Gamma^{R J}$$ and the total flight time are set to a relatively large value. Likewise, the SUAV J can fly close to the SE and transmit more disturbed information to the SE under the larger IT threshold [TeX:] $$\Gamma^{R J}$$ value and more flight time so as to improve the average secrecy rate of the secondary relay network.

Fig. 6 shows the change of the average secrecy rates of the secondary relay network versus the total flight time T based on four optimization schemes under [TeX:] $$\Gamma^{R J}=-63 \mathrm{dBm}$$ and = 20. It is clearly observed that the average secrecy rates of the four optimization schemes all go up as the total flight time of the SUAVs increases. In Fig. 6, the symbols [TeX:] $$O_{-} \mathcal{Q}$$ and [TeX:] $$\mathrm{NO}_{-} \mathcal{Q}$$denote the optimization trajectories of the SUAVs and no optimization trajectories of the SUAVs, respectively. Likewise, the symbols [TeX:] $$O_{-} \mathcal{P}$$ and [TeX:] $$\mathrm{NO}_{-} \mathcal{P}$$ represent the optimization power of the SUAVs and no optimization power of the SUAVs, respectively. The first optimization scheme is denoted by [TeX:] $$O_{-} \mathcal{Q}$$ and [TeX:] $$O_{-} \mathcal{P}$$ in Fig. 6. The first optimization scheme which is our proposed optimization scheme of jointly optimizing the SUAVs' trajectories and power is an optimum optimization scheme by comparing with other three optimization schemes. Via the comparison of the first optimization scheme and the fourth optimization scheme which is no SUAV J scheme denoted by [TeX:] $$O_{-}\left\{\mathbf{q}_{R}\right\}$$ and [TeX:] $$O_{-}\left\{P_{n}, P_{R}\right\}$$ in Fig. 6, the average secrecy rate of the former is higher than that of the latter. This indicates that the SUAV J which is friendly added by disturbing the SE can help the secondary relay network to better improve the average secrecy rate of the system. By comparing the second optimization scheme denoted by [TeX:] $$O_{-} \mathcal{Q}$$ and [TeX:] $$\mathrm{NO}_{-} \mathcal{P}$$ with the third optimization scheme denoted by [TeX:] $$N O_{-} \mathcal{Q}$$ and [TeX:] $$O_{-} \mathcal{P}$$ in Fig. 6, we can obtain the conclusion

Fig. 7.

The average secrecy rates of the secondary relay network versus the range estimation value based on the different optimization schemes.
7.png

that the trajectory optimization strategy can better improve the average secrecy rate of the system than the power optimization strategy.

Fig. 7 shows the change of the average secrecy rates of the secondary relay network versus the range estimation value based on four optimization schemes under [TeX:] $$\Gamma^{R J}=-63 \mathrm{dBm}$$ and the total flight time 180 s. In Fig. 7, we can clearly observe that the average secrecy rates of the four optimization schemes all fall off as the range estimation value increases. This is because that the range estimation value is set as bigger value so as to make it harder to estimate the exact location of the SE and lead to the decline of the average secrecy rates. In Fig. 7, the first optimization scheme denoted by [TeX:] $$O_{-} \mathcal{Q}$$ and [TeX:] $$O_{-} \mathcal{P}$$ is the best scheme which is our proposed scheme in four schemes. Via the comparison of the first optimization scheme and the fourth optimization scheme which is no SUAV J scheme denoted by [TeX:] $$O_{-}\left\{\mathbf{q}_{R}\right\} \text { and } O_{-}\left\{P_{n}, P_{R}\right\}$$ in Fig. 7, it is proved again that the SUAV J can help to improve the average secrecy rate of the cognitive secondary system. By comparing the second optimization scheme denoted by [TeX:] $$O_{-} \mathcal{Q}$$ and [TeX:] $$\mathrm{NO}_{-} \mathcal{P}$$ with the third optimization scheme denoted by [TeX:] $$\mathrm{NO}_{-} \mathcal{Q} \text { and } \mathrm{O}_{-} \mathcal{P}$$ in Fig. 7, it is also proved again that the trajectory optimization strategy can better improve the average secrecy rate of the system than the power optimization strategy. Via the comparison of the first optimization scheme and the second optimization scheme, this shows that the increased power optimization can improve the secrecy rate than no power optimization under same trajectory optimization strategies. For the comparison of the first optimization scheme and the third optimization scheme, we can observe the advantage of trajectory optimization strategy in improvement of the secrecy rate. It can be observed that the increased trajectory optimization of the SUAV J can slightly improve the secrecy rate than the increased power optimization of the SUAV R and SIoT n by comparing the second optimization scheme with the fourth optimization scheme. For the third optimization scheme based on no optimization trajectories of the SUAV R and the

Fig. 8.

Convergence of Algorithm 1 with different tolerant IT thresholds.
8.png

SUAV J, it is the worse scheme than the fourth optimization scheme. This also reflects the importance and advantage of trajectory optimization in improvement of the secrecy rate.

Fig. 8 shows convergence of Algorithm 1 based on four tolerant IT thresholds under the total time 180 s and = 20. As shown in Fig. 8, we can observe that four curves can quickly rise to a convergence value. It indicates that Algorithm 1 can rapidly converge. For instance, the average secrecy rate based on the IT threshold [TeX:] $$\Gamma^{R J}=-68 \mathrm{dBm} \text { and } \Gamma^{R J}=-53 \mathrm{dBm}$$ converge to a constant value by five iterations and eleven iterations, respectively. From Fig. 8, it is also observed that the smaller the tolerant IT threshold is set, the faster Algorithm 1 converges. The fast convergence of Algorithm 1 also proves the effectiveness of our proposed algorithm.

V. CONCLUSION

In this paper, we studied a physical layer security issue in SUAVs-assisted cognitive relay system, where the SUAV R delivered information from the SIoTs to the SU under the spectrum sharing with the PUs. A friendly SUAV J is employed to confuse the SE to improve the security performance of the cognitive secondary system. In order to maximize the average worst-case secrecy rate, we jointly optimized robust trajectories and power of the SUAV R and the SUAV J, subject to the power, trajectories, information causality and IT threshold constraints. The original optimization problem which was a non-convex problem was divided into three sub-problems to attain locally optimal solution by using the SCA technology and the alternating optimization method. Simulations demonstrated that our proposed algorithm can effectively improve the average worst-case secrecy rate of the secondary UAV relay network in comparison with other benchmark schemes.

Biography

Zhen Wang

Zhen Wang received the B.S. degree from the School of Information Engineering, Nanchang University, Nanchang, China, in 2007. He is currently working toward his Ph.D. degrees at the School of Artificial Intelligence in Beijing University of Posts and Telecommunications (BUPT). He is also an Associate Professor with the School of Information Engineering, Nanchang University. His research interests include convex optimization, energy harvesting, UAV communications and networks, and wireless resource allocation.

Biography

Jichang Guo

Jichang Guo is a Master Candidate in School of Information Engineering at Nanchang University. He received the B.S. degree from Huangshan University, Huangshan, China, in 2020. His research interests include convex optimization, UAV communications.

Biography

Zhiqiong Chen

Zhiqiong Chen is a Master Candidate in School of Information Engineering at Nanchang University. He received the B.S. degree from Nanchang Hangkong University, Nanchang, China, in 2020. His research interests include convex optimization, UAV communications.

Biography

Lisu Yu

Lisu Yu received the Ph.D. degree at Key Lab- oratory of Information Coding and Transmission, Southwest Jiaotong University, Chengdu, China. He was a Visiting Scholar at University of Arkansas, Fayetteville, AR, USA and University of Houston, Houston, TX, USA from 2017 to 2019. He has served as the Student Activities Chair of IEEE Com- munication Society Chengdu Chapter and several international conferences technical program com- mittee (TPC) member, Section Chair and Special Track Chair. He is now serving as an Area Editor of the Elsevier Physical Communication, Editors of the Elsevier Computer Communications, PeerJ Computer Science, PLOS ONE, and Frontiers in Signal Processing for Communications, a Managing Guest Editor of Elsevier Internet of Things and Cyber-Physical Systems, and an Associate Area Editor of Journal of Electronics Information Technology and IEEE Communications Society Technical Committee on Green Communications and Computing (TCGCC) and Signal Processing and Computing for Communications (SPCC) Members. He is currently an Associate Professor in School of Information Engineering, Nanchang University, China. His main research interests in- clude advanced wireless communications, coded modulation, non-orthogonal multiple access (NOMA), fiber wireless communication, ultra-dense network (UDN), unmanned aerial vehicle (UAV), and visible light communication (VLC).

Biography

Yuhao Wang

Yuhao Wang received the Ph.D. degree from Wuhan University, Wuhan, China, in 2006. He was a Vis- iting Professor at Department of Electrical Com- munication Engineering, University of Calgary, Cal- gary, AB, Canada, in 2008, and also with China National Mobile Communication Research Labo- ratory, Southeast University, Nanjing, China, from 2010 to 2011. He is currently a Professor with the Cognition Sensor Network Laboratory, School of Information Engineering, Nanchang University (NCU), Nanchang, China. He is the Vice President of Shangrao Normal University, and also is the Deans of the Artificial Intelligence Industry Institute, NCU. Since 2016, he is an IET Fellow. His current research interests include wideband wireless communication and radar sensing fusion system, channel measurement and modeling, nonlinear signal processing, smart sensor, image and video processing, and machine learning.

Biography

Hong Rao

Hong Rao is currently a Professor with the Computer Center, Nanchang University. She has published more than 30 papers in academic journals and international conferences. Her major research interests include machine learning, data mining, and intelligent information processing. She hosts several national science and technology projects and Jiangxi technology projects.

References

  • 1 F. Nait-Abdesselam, A. Alsharoa, M. Y. Selim, D. Qiao, A. E. Kamal, "Towards enabling unmanned aerial vehicles as a service for heterogeneous applications," J. Commun. Netw.Jun, vol. 23, no. 3, pp. 212-221, 2021.doi:[[[10.23919/jcn.2021.000015]]]
  • 2 J. Pokorny et al., "Concept design and performance evaluation of UAVbased backhaul link with antenna steering," J. Commun. Networks, vol. 20, no. 5, pp. 473-483, Oct, 2018.custom:[[[-]]]
  • 3 Z. Wang, G. Zhang, Q. Wang, K. Wang, K. Yang, "Completion time minimization in wireless-powered UAV-assisted data collection system," IEEE Commun Lett.Jun, vol. 25, no. 6, pp. 1954-1958, 2021.custom:[[[-]]]
  • 4 H. Zhang, L. Song, Z. Han, H. V. Poor, "Cooperation techniques for a cellular internet of unmanned aerial vehicles," IEEE WirelessCommun. Lett., vol. 26, no. 5, pp. 167-173, Oct, 2019.doi:[[[10.1109/mwc.2019.1800591]]]
  • 5 Z. Wang, W. Xu, D. Yang, J. Lin, "Joint trajectory optimization and user scheduling for rotary-wing UAV-enabled wireless powered communication networks," IEEE Access, vol. 7, pp. 181369-181380, 2019.custom:[[[-]]]
  • 6 Z. Wang, M. Wen, S. Dang, L. Yu, Y. Wang, "Trajectory design and resource allocation for UAV energy minimization in a rotary-wing UAVenabled WPCN," Alexandria Eng. J., vol. 60, no. 1, pp. 1787-1796, Feb, 2021.custom:[[[-]]]
  • 7 Liu, S. -J. Yoo, K. S. Kwak, "Opportunistic relaying for low-altitude UAV swarm secure communications with multiple eavesdroppers," J. Commun. Networks, vol. 20, no. 5, pp. 496-508, Oct, 2018.custom:[[[-]]]
  • 8 Zhang, Y. Xu, J. Loo, D. Yang, L. Xiao, "Joint computation and communication design for UAV-assisted mobile edge computing in IoT," IEEE Trans. Ind. Inf., vol. 16, no. 8, pp. 5505-5516, Aug, 2020.custom:[[[-]]]
  • 9 H. Sun, F. Zhou, R. Q. Hu, "Joint offloading and computation energy efficiency maximization in a mobile edge computing system," IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 3052-3056, Mar, 2019.doi:[[[10.1109/tvt.2019.2893094]]]
  • 10 Y. Chen et al., "Optimum placement of UAV as relays," IEEE Commun. Lett., vol. 22, no. 2, pp. 248-251, 2018.custom:[[[-]]]
  • 11 F. Rongfei et al., "Optimal node placement and resource allocation for UAV relaying network," IEEE Commun. Lett., vol. 22, no. 4, pp. 808-811, 2018.custom:[[[-]]]
  • 12 Y. Chen et al., "Multiple UAVs as relays: Multi-hop single link versus multiple dual-hop links," IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6348-6359, 2018.custom:[[[-]]]
  • 13 L. Li et al., "UAV positioning and power control for two-way wireless relaying," IEEE Trans.WirelessCommun., vol. 19, no. 2, pp. 1008-1024, 2020.custom:[[[-]]]
  • 14 Y. Zeng, R. Zhang, T. J. Lim, "Throughput maximization for UAV-enabled mobile relaying systems," IEEE Trans. Commun., vol. 64, no. 12, pp. 4983-4996, Dec, 2016.custom:[[[-]]]
  • 15 Sun, D. Yang, L. Xiao, L. Cuthbert, F. Wu, Y. Zhu, "Joint energy and trajectory optimization for UAV-enabled relaying network with multi-pair users," IEEE Trans. Cognit. Commun. Netw.Sep, vol. 7, no. 3, pp. 939-954, 2021.custom:[[[-]]]
  • 16 X. Zhong, Y. Guo, N. Li, Y. Chen, "Joint optimization of relay deployment, channel allocation, and relay assignment for UAVs-aided D2D networks," IEEE /ACM Trans. Netw., vol. 28, no. 2, pp. 804-817, Apr, 2020.custom:[[[-]]]
  • 17 S. Zhang et al., "Joint trajectory and power optimization for UAV relay networks," IEEE Commun. Lett., vol. 22, no. 1, pp. 161-164, 2018.custom:[[[-]]]
  • 18 S. Zeng, H. Zhang, L. Song, "Trajectory optimization and resource allocation for multi-user OFDMA UAV relay networks," in Proc. IEEE GLOBECOM, 2019.custom:[[[-]]]
  • 19 X. Liang et al., "Throughput optimization for cognitive UAV networks: a three-dimensional-location-aware approach," IEEE Wireless Commun. Lett.Jul, vol. 9, no. 7, pp. 948-952, 2020.custom:[[[-]]]
  • 20 Z. Wang, F. Zhou, Y. Wang, Q. Wu, "Joint 3D trajectory and resource optimization for a UAV relay-assisted cognitive radio network," China Commun.Jun, vol. 18, no. 6, pp. 184-200, 2021.custom:[[[-]]]
  • 21 Y. Zhou, F. Zhou, H. Zhou, D. W. K. Ng, R. Q. Hu, "Robust trajectory and transmit power optimization for secure UAV-enabled cognitive radio networks," IEEE Trans. Commun.Jul, vol. 68, no. 7, pp. 4022-4034, 2020.custom:[[[-]]]
  • 22 N. Tang, H. Tang, B. Li, X. Yuan, "Cognitive NOMA for UAVenabled secure communications: joint 3D trajectory design and power allocation," IEEE Access, vol. 8, pp. 159965-159978, 2020.custom:[[[-]]]
  • 23 P. X. Nguyen, H. V. Nguyen, V. Nguyen, O. Shin, "UAV-enabled jamming noise for achieving secure communications in cognitive radio networks," in Proc. IEEE CCNC, 2019.custom:[[[-]]]
  • 24 Y. Huang et al., "Cognitive UAV communication via joint maneuver and power control," IEEE Trans. Commun., vol. 67, no. 11, pp. 7872-7888, 2019.custom:[[[-]]]
  • 25 Y. Chen, Z. Zhang, B. Li, "Secure transmission with a cooperative UAV-enabled jammer," in Proc. IEEE ICCC, 2019.custom:[[[-]]]
  • 26 B. Duo, J. Luo, Y. Li, H. Hu, Z. Wang, "Joint trajectory and power optimization for securing UAV communications against active eavesdropping," China Commun., vol. 18, no. 1, pp. 88-99, Jan, 2021.custom:[[[-]]]
  • 27 H. Zhang, X. He, H. Dai, "Secure UAV communication networks via friendly jamming and bandwidth allocation," in Proc. IEEE INFOCOM, 2020.custom:[[[-]]]
  • 28 A. Li, W. Zhang, "Mobile jammer-aided secure UAV communications via trajectory design and power control," China Commun., vol. 15, no. 8, pp. 141-151, Aug, 2018.custom:[[[-]]]
  • 29 R. Ma, W. Yang, Y. Zhang, J. Liu, H. Shi, "Secure mmwave communication using UAV-enabled relay and cooperative jammer," IEEE Access, vol. 7, pp. 119729-119741, 2019.custom:[[[-]]]
  • 30 R. Li et al., "Resource allocation for secure multi-UAV communication systems with multi-eavesdropper," IEEE Trans. Commun.Jul, vol. 68, no. 7, pp. 4490-4506, 2020.custom:[[[-]]]
  • 31 Y. Gao, H. Tang, B. Li, X. Yuan, "Securing energy-constrained UAV communications against both internal and external eavesdropping," IEEE Commun. Lett., vol. 25, no. 3, pp. 749-753, Mar, 2021.custom:[[[-]]]
  • 32 M. Kim, S. Kim, J. Lee, "Securing communications with friendly unmanned aerial vehicle jammers," IEEE Trans. Veh. Technol., vol. 70, no. 2, pp. 1972-1977, Feb, 2021.doi:[[[10.1109/TVT.2021.3052503]]]
  • 33 B. Zhong, J. Yao, J. Xu, "Secure UAV communication with cooperative jamming and trajectory control," IEEE Commun. Lett., vol. 23, no. 2, pp. 286-289, Feb, 2019.custom:[[[-]]]
  • 34 U. Mengali, A. N. D Andrea, Synchronization Techniques for Digital Receivers, New York, NY USA: Springer, 1997.doi:[[[10.1007/978-1-4899-1807-9]]]
  • 35 G. Xie, B. Wang, F. Gao, S. Jin, "Full-space spectrum-sharing strategy for TDD/FDD massive MIMO cognitive radio systems," in Proc. IEEE ICCS, 2016;doi:[[[10.1109/iccs.2016.7833598]]]
  • 36 S. Cherian, S. N. Shiras, "Spectrum sensing of SC-FDMA signals in cognitive radio networks," in Proc. IEEE NetACT, 2017;doi:[[[10.1109/netact.2017.8076734]]]
  • 37 Q. Wang, H.-N. Dai, H. Wang, G. Xu, A. K. Sangaiah, "UAVenabled friendly jamming scheme to secure industrial Internet of things," J. Commun. Networks, vol. 21, no. 5, pp. 481-490, Oct, 2019.custom:[[[-]]]
  • 38 H. Zhou et al., "Robust an-aided beamforming and power splitting design for secure miso cognitive radio with swipt," IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2450-2464, 2017.doi:[[[10.1109/TWC.2017.2665465]]]
  • 39 R. Zhang et al., "Dynamic resource allocation in cognitive radio networks," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 102-114, 2010.doi:[[[10.1109/MSP.2010.936022]]]
  • 40 A. Li et al., "UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel," IEEE Wireless Commun. Lett., vol. 8, no. 1, pp. 181-184, 2019.custom:[[[-]]]
  • 41 Y. Gao, H. Tang, B. Li, X. Yuan, "Robust trajectory and power control for cognitive UAV secrecy communication," IEEE Access, vol. 8, pp. 49338-49352, 2020.custom:[[[-]]]
  • 42 S. Boyd, L. Vandenberghe, Convex optimization, Cambridge U.K.: Cambridge Univ. Press, 2004.doi:[[[10.1002/9781118376270.ch6]]]
  • 43 K.-Y. Wang et al., "Outage constrained robust transmit optimization for multiuser miso downlinks: Tractable approximations by conic optimization," IEEE Trans. Signal Process., vol. 62, no. 21, pp. 5690-5705, 2014.doi:[[[10.1109/tsp.2014.2354312]]]
  • 44 Z. Nesterov, A. Nemirovskii, Interior-point polynomial algorithms in convex programming, SIAM, 1994.doi:[[[10.1137/1.9781611970791]]]
  • 45 G. Zhang et al., "Securing uav communications via joint trajectory and power control," IEEE Trans. Wireless Commun., vol. 18, no. 2, pp. 1376-1389, 2019.doi:[[[10.1109/twc.2019.2892461]]]