Professional Documents
Culture Documents
DOI: 10.1049/cmu2.12680
ORIGINAL RESEARCH
Shihao Liu1 Yangchao Huang1 Hang Hu1 Jiangbo Si2 Guobing Cheng1
Tao Huang1 Xiaoliang Hu1
1
Information and Navigation College, AF Engineer Abstract
University, Xi’an, China
The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC)
2
School of Telecommunications Engineering, Xidian is considered as a promising approach to tackle soaring computing requirements. The
University, Xi’an, China
broadcast nature of air-to-ground (A2G) links makes UAV communications vulnerable to
eavesdroppers, so secure UAV communications remain an open question. This paper pro-
Correspondence
Hang Hu, Information and Navigation College, AF poses a secure communication scheme for reconfigurable intelligent surface (RIS)-assisted
Engineer University, Fenghao Road No.1, Xi’an, UAV-MEC systems, in which the RIS assists the user in offloading data to the legitimate
China.
UAV, and the legitimate UAV provides computing services to the user. To fully expand
Email: xd_huhang@126.com
the security computing capacity of the system, the communication link is improved by
Funding information introducing RIS, and the jammer interferes with the eavesdropper. The secure computing
National Natural Science Foundation of China, capability of the system is maximized by optimizing communication resources and trajec-
Grant/Award Number: 61901509 tories. Since the proposed problem is non-convex, successive convex approximation (SCA)
technique and block coordinate descent (BCD) technique is combined to solve the prob-
lem. The simulation results show that the proposed scheme in this paper can effectively
improve the system secure computing bits compared with the benchmark scheme.
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is
properly cited.
© 2023 The Authors. IET Communications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
edge computing systems to improve the system’s security by adjust the communication channel to reduce the signal-to-noise
optimizing task offloading for ground users. Han et al. [12] (SNR) ratio at the eavesdropper [26]. In [27], Liu et al. studied
improved the secure computing capability of the system by opti- the RIS-assisted UAV downlink communication system. The
mizing the deployment of the UAV and task offloading. In [13], downlink throughput is maximized by optimizing the UAV
Tong et al. studied the impact of various eavesdroppers on the trajectory, RIS phase shift, and power allocation. In [28], Hua
security performance of the system and analyzed the optimal et al. studied the RIS-assisted UAV symbiotic communication
solution under different types of eavesdroppers. The condi- system. RIS was introduced to enhance the information trans-
tions of three offloading schemes are analyzed from the physical mission capability while RIS transmitted the information. In
point of view, that is, zero offloading, partial offloading, and [29], Pang et al. investigated RIS-assisted UAV secure com-
full offloading. In [14], Fatima et al. summarized various net- munication under the presence of ground eavesdroppers. The
work architectures for UAV-assisted MEC from the perspective average secrecy rate of the system is maximized by jointly opti-
of computational offloading and discussed the security of the mizing the UAV trajectory, beamforming, and RIS phase shift.
system. In [15], the UAV data is divided into locally computed In [30], Xu et al. maximized the minimum secure computing
data and offloaded data. The total energy consumption of the capacity by jointly optimizing UAV beamforming, RIS passive
system is minimized by optimizing the task offloading and com- beamforming, communication resources, and UAV trajectories.
munication resources under energy consumption and secrecy In [31], Li et al. investigated maximizing the minimum secrecy
rate constraints. In [16], an edge computing security system for rate by jointly designing the UAV trajectory, RIS passive beam-
UAV-assisted multiple ground users is investigated to minimize forming, and transmitted power under the condition that the
the energy consumption of the UAV by jointly optimizing the eavesdropped channel state information (CSI) is unknown.
computing task allocation, the transmitting power of ground The secure computing system for RIS-assisted UAV-MEC
devices and the UAV trajectory with the constraint of offloading has received much attention. However, the scenario of the
secrecy rate. eavesdropper movement has not been sufficiently investigated.
In UAV-assisted edge computing systems, security can be sig- To improve the communication security, AN is introduced to
nificantly improved by introducing artificial noise (AN) [17–22]. disrupt the eavesdropper or communication techniques such
In [17], Xu et al. divided the transmitted power of the UAV as beamforming are used to degrade the SNR at the eaves-
into two parts, that is, offloading power and AN, in order to dropper’s side [19, 29]. Based on the AN technique, RIS is
enhance the security performance of the system. With resource introduced to assist the secure computing system in order to
constraints, Xu et al. jointly optimized the UAV trajectory enhance the secure computing capability of the system. Since
and transmission power to maximize security capacity. In [18], most of the works assume that the eavesdropper is located
Xu et al. introduced a UAV for suppressing eavesdroppers to on the ground, the security of RIS-assisted UAV downlink is
enhance the security of the system. Unlike the case of [18] fully investigated. For example, in the literature [32], down-
where the eavesdropper information is known, the authors of link secure communication for a single ground eavesdropper
[19] maximize the minimum secure computational bits of the scenario is studied. In literature [33], a secure communication
system by optimizing the trajectory of the UAV and the trans- scenario for downlinks with multiple ground eavesdroppers is
mit power of the AN in unknown locations and the number studied.
of eavesdroppers. In [20], Lu et al. studied a dual UAV sys- Based on the above literature, in this paper, the flying
tem in which a legitimate UAV provides computing services eavesdropper scenario is investigated in practical situations.
and a jammer emits AN to disrupt the eavesdropping UAV We investigated the dual UAV secure communication scenario,
to improve system security. In contrast to [20], in [21], the where the UAV providing edge computing services to the user
authors studied the case where the eavesdropper’s information is denoted as a legitimate UAV, and the UAV wiretapping the
is unknown by optimizing the UAV’s trajectory, communication offloaded data of the user is denoted as an eavesdropping UAV.
resources and computational resources to maximize the min- The jammer in the system disturbs the eavesdropping UAV by
imum secure computing bits. In [22], Zhou et al. considered sending friendly AN. The introduction of RIS in communica-
the existence of multiple eavesdropping UAVs with unknown tion scenarios enhances the communication link of legitimate
information and improved the system security by introducing UAVs and also increases the interference of AN to eavesdrop-
full-duplex UAV to assist non-offloading users in interfering ping UAVs. In this paper, the secure computation bits of the
with the eavesdroppers. system are maximized by jointly optimizing the phase shift of
Although introducing AN can improve security perfor- the RIS, the time slot length, the transmit power, the local
mance, it does not cope well with mobile eavesdroppers due computation bits, and the trajectory of the legitimate UAV. It
to the limitations of fixed devices. RIS has gained a lot of is worth noting that, since the eavesdropping UAV is mobile,
attention because it enables to improve the signal transmission the legitimate UAV’s trajectory should be optimized under anti-
environment by changing the phase shift and/or amplitude collision conditions. The major contributions of this paper are
of the reflecting elements [23]. Literature [24] investigated the as follows.
mitigation of co-channel interference by using RIS in UAVs
operating in a cellular network. Literature [25] investigated RIS- ∙ A RIS-assisted secure communication system for uplink edge
assisted target sensing in cellular networks. RIS enhances the computing is constructed, where jammers are used to dis-
secrecy capability of the system because it is able to intelligently rupt eavesdroppers. The frame length, transmit power, local
LIU ET AL. 3
transmits a signal in time slot n, where 0 ≤ 𝜃km [n] < 2𝜋, ∀m, k, n.
The location of the RIS is wr = (xr , yr ) and the altitude is fixed
at Hr . The coordinates of the ground user m are denoted as
wm = (xm , ym ), ∀n. The coordinates of the GJ are denoted as
wJ = (xJ , yJ ). The position of the UAV_L at time slot n is
denoted as q[n] = (x[n], y[n]), ∀n, and the altitude of the UAV_L
is known as H . The position of the UAV_E at time slot n
is denoted as qe [n] = (xe [n], ye [n]), ∀n ,and the altitude of the
UAV_E is known as He . The mobility constraint for the UAV_L
is formulated as:
FIGURE 1 RIS-assisted UAV-MEC system.
2
‖q[n + 1] − q[n]‖ ≤ (ΔVmax )2 , n = 1, 2, … , N − 1, (1)
computational data allocation, legal UAV trajectory and RIS q[1] = qI , (2)
phase shift are optimized to maximize secure computing bits.
∙ The proposed non-convex problem is transformed into the
q[N ] = qF , (3)
following subproblems: frame length optimization, transmit
power optimization, local computational data allocation opti- where Vmax is the maximum flight speed of the UAV_L. To
mization, legitimate UAV trajectory optimization and RIS ensure that UAV_L and UAV_E do not collide, the constraint
phase shift optimization. Then the original nonconvex prob- on the distance between UAVs is expressed as
lem is solved iteratively using the BCD algorithm for the
suboptimal solution, where the nonconvex subproblem is 22
‖q[n] − qe [n]‖ ≥ dmin , ∀n, (4)
solved using the SCA technique.
∙ Simulation results demonstrate that the secure capability where dmin is the minimum secure distance between UAVs.
of our proposed scheme outperforms other benchmark
schemes.
2.2 Communication model
2 SYSTEM MODEL AND PROBLEM At time slot n, the channels from user m to the UAV_L, user
FORMULATION m to the RIS, RIS to the UAV_L, GJ to the RIS, user m to the
UAV_E, RIS to the UAV_E, and GJ to the UAV_E are repre-
2.1 System model sented as hmu [n] ∈ ℂ, hmr ∈ ℂK ×1 , hru ∈ ℂK ×1 , hJr [n] ∈ ℂK ×1 ,
hme [n] ∈ ℂ, hre ∈ ℂK ×1 and hJe [n] ∈ ℂ, respectively. Due to the
Figure 1 shows the RIS-assisted UAV-MEC secure comput- height of the UAV and RIS, the channel state of the UAV-RIS
ing system, where UAV_L is a legitimate UAV equipped with is assumed to be a link-of-sight (LoS) channel, then hru [n] and
an edge computing server to provide computing services to hre [n] can be expressed as follows, respectively [36].
ground users, UAV_E acts as a potential eavesdropper in the
system to wiretap the user’s offloading information, GJ is a hru [n] = 𝛽0 dru−1 [n]h̄ LoS
1∕2
ru [n], (5)
friendly jammer that interferes with UAV_E by emitting AN,
and RIS is used to improve the channel gain from the user to
hre [n] = 𝛽0 dre−1 [n]h̄ LoS
1∕2
the UAV_L. Ground users with limited energy and computa- re [n], (6)
tional resources, denoted by set = {1, 2 … M }, offload data
where 𝛽0 is the√ channel power gain at unit dis-
to UAV_L for computation utilizing a Time Division Multiple
2
Access (TDMA) strategy. The UAV_L provides computational tance; dru [n] = ‖q[n] − wr ‖ + (H − Hr )2 ,dre [n] =
√
services to the user from the initial point qI = (xI , yI )to the 2
final point qF = (xF , yF ) in a given period T . To simplify the ‖qe [n] − wr ‖ + (He − Hr )2 are the distances from UAV_L
problem, the period T is discretized into N time slots and the to RIS and UAV_E to RIS at time slot n, respectively; h̄ LoS
ru [n]
set of time slots is denoted as N = {1, 2 … N },where the time can be expressed as
duration of each time slot is Δ = T ∕N . We assume that a RIS [ ]T
2𝜋 2𝜋
consisting of a uniform linear array (ULA) of K elements is − j d 𝜂ru [n] − j (K −1)d 𝜂ru [n]
h̄ LoS
ru [n] = 1, e 𝜆 , … ., e 𝜆 , (7)
placed on the surface of the building, and the set of elements of
4 LIU ET AL.
and 𝜂ru [n] = (xr − xu [n])∕dru [n] denotes the cosine of the angle RIS; 𝜂Jr = (xJ − xr )∕dJr is the cosine of the AoA of signal from
of deviation of signal (AoD) from the IRS to the UAV_L; the jammer to the RIS. GJ sends friendly AN. For legitimate
h̄ LoS
re [n] can be expressed UAV, friendly AN can be canceled at the receiving side. Eaves-
dropping UAV is confused by friendly AN. When the mth user
[ ]T
2𝜋
− j d 𝜂re [n]
2𝜋
− j (K −1)d 𝜂re [n] communicates with UAV_L at the nth time slot, the signal-
h̄ LoS
re [n] = 1, e 𝜆 , … ., e 𝜆 , (8) to-noise ratio (SNR) and the signal-to-interference-noise ratio
(SINR) at UAV_L and UAV_E are expressed as
and 𝜂re [n] = (xr − xe [n])∕dre [n] denotes the cosine of the AoD
| |2
of signal from the RIS to the UAV_E; d denotes the element pm [n]|hmu [n] + (hmr [n])H 𝚯m [n]hru [n]|
separation of RIS; 𝜆 denotes the wavelength of the carrier wave. 𝛾m [n] = | | , (16)
We assume that the direct link from the ground user to 𝜎2
the UAV is blocked, thus the direct link channel models are | ( )H |2
formulated as follows, respectively [37]. pm [n]|hme [n] + hmr [n] 𝚯m [n]hre [n]|
𝛾m,e [n] = | | , (17)
√ | ( ) H |2
hme [n] = 𝛽0 (dme [n])−𝛼0 h̄ me [n], 𝜎2 + PJ |hJe [n] + hJr [n] 𝚯m [n]hre [n]|
(9) | |
√ where pm [n] is the transmit power of the mth user in time slot
hmu [n] = 𝛽0 (dmu [n])−𝛼0 h̄ mu [n], (10) n,and PJ is the power of the jammer to transmit AN. When user
m transmits a signal in time slot n, the communication rates
√
that can be achieved by UAV_L and UAV_E are expressed as,
hJe [n] = 𝛽0 (dJe [n])−𝛼0 h̄ Je [n], (11)
respectively
mth user with relation to the CPU architecture. Due to the 0 ≤ 𝜏m [n] ≤ 1, ∀m, n, (30m)
energy constraint of the user, the power constraint of the user
m is expressed as
N ⎛ ( )3 ⎞
1 ∑ ⎜ 𝜅m Cm lm [n]
loc
⎟ ≤ P̄m , ∀m, where {q[n]} is the trajectory of UAV_L; {lmloc [n]} is the local com-
+ 𝜏 [n]Δp [n] (27)
T n=1 ⎜ Δ2 m m
⎟ putational data allocation; {𝜃km [n]} is the phase shift of the RIS;
⎝ ⎠
{pm [n]} is the transmit power of the user; 𝜏m [n] is frame length
where P̄m denotes the maximum average power consumption of allocation. Constraint (30 b) denotes the speed constraint of
user m. Defining pm [n] as the transmit power of user m in time the UAV_L. The constraint (30 c) ensures a minimum distance
slot n, we have between the UAVs. Constraints (30 d) and (30 e) denote the ini-
tial point and final point fixation of the UAV_L. Constraint (30
0 < pm [n] ≤ Pmmax , (28) f) indicates the range of the phase shift of each element of the
RIS. Constraint (30 g) ensures that the local computational data
where Pmmax denotes the maximum transmit power of user m. allocation per user does not exceed the user’s computational
Then the secure computing bits of the system are defined as capacity. Constraint (30 h) ensures that the data offloaded by
the user does not exceed the computing capacity of the UAV_L.
∑
M ∑
N ∑
M ∑
N
Constraint (30 i) ensures that each user meets basic computa-
Rsec = Rmsec [n]Δ𝜏m [n]+ lmloc [n]. (29) tion requirement. The constraint (30 j) indicates that the user’s
m=1 n=1 m=1 n=1
energy consumption is limited. Constraint (30 k) indicates that
In this paper, we aim to improve the secure capability of the transmit power of the user is limited. Constraints (30 l) and
the system by maximizing the secure computing bits. Under (30 m) indicate that all users transmit data sequentially within
the constraint of limited energy and computational resources, a time slot. The problem is nonconvex due to the presence of
secure computing bits are maximized by optimizing the frame nonconvex objective function and nonconvex constraints.
length, user transmit power, RIS phase shift, and UAV_L
trajectory. Thus the problem can be formulated as
3 SOLUTIONS OF THE FORMULATED
(P1) ∶ max Rsec , (30a) PROBLEMS
{q[n],lmloc [n],𝜃km [n],pm [n],𝜏m [n]}
3.1 Optimizing {𝜽km [n]} with fixed 3.4 Optimizing {pm [n]} with fixed
m
∖{𝜽k [n]} ∖{pm [n]}
In designing the RIS phase shift, the maximum communica- Introducing the auxiliary variables s1,m [n] ,s2,m [n] when given
tion rate problem is replaced by the secure rate maximization {q[n], 𝜃km [n], lmloc [n], 𝜏m [n]} , the problem P1 is transformed as
problem to simplify the original problem [35].
There exists the triangle inequality |hmu [n] + hH mr [n] ∑
N ∑
M
( )
𝚯m [n]hru [n]| (P4) ∶ max B(s1,m [n] − s2,m [n])Δ𝜏m [n] + lmloc [n] ,
{}
(a) n=1 m=1
≤ |hmu [n]|+ |hH
mr [n]𝚯m [n]hru [n]|.
When (a) takes the equal (34a)
sign, the UAV_L can obtain the maximum SNR. This means
s. t.s1,m [n] ≤
that the maximum communication rate of the UAV_L can be
achieved when the direct link signal phase and the reflected ⎛ | ( )H |2 ⎞
signal phase are equal [38]. Then we have ⎜ p [n] |
m | muh [n] + h mr [n] 𝚯 m [n]h ru | ⎟
[n] |
log2 ⎜1 + | | ⎟, (34b)
( ) ⎜ 𝜎2 ⎟
𝜃k [n] = arg(hmu [n]) − arg hH ⎜ ⎟
mr,k [n] − arg(hru,k [n]), (31) ⎝ ⎠
∀m, n
Δ
where arg(x) = arccos(Re(x)∕‖x‖); hH
mr,k [n] and hru,k [n] are the s2,m [n] ≥
kth elements of the complex vector hHmr [n] and the complex
vector hru [n], respectively. ⎛ | |2 ⎞
⎜ pm [n]|hme [n] + (hmr [n])H 𝚯m [n]hre [n]| ⎟
log2 ⎜1 + | | ,
2⎟
(34c)
⎜ 𝜎 2 + P ||h [n] + (h [n])H 𝚯 [n]h [n]|| ⎟
3.2 Optimizing {𝝉m [n]} with fixed ∖{𝝉m [n]} ⎝ J | Je Jr m re | ⎠
∀m, n
Given {q[n], 𝜃km [n], lmloc [n], pm [n]} , the problem P1 can be
transformed as (30i ), 30(k), (34d)
( ) where = {s1,m [n], s2,m [n], ∖{pm [n]}}. The (⋅)+ operation is
∑
M ∑
N ∑
M ∑
N
(P2) ∶ max Rmsec [n]Δ𝜏m [n]+ lmloc [n] , ignored in this paper. Rmsec [n] is guaranteed to be larger than zero
{𝜏m [n]} due to the friendly AN power PJ > 0 and the (30 k) constraint.
m=1 n=1 m=1 n=1
(32a) Although the objective function is made convex by introducing
auxiliary variables, the constraints (34 b), (34 c) are nonconvex,
s. t. (30i ), (30 j ), (30l ), (30m). (32b) so the problem is still difficult to solve. Therefore SCA technol-
ogy was introduced to solve the problem. Applying a first-order
(l )
Since the objective function is affine and the constraint 32(b) Taylor expansion to s1,m [n] at pm [n], (34 b) can be transformed
is convex, P2 is a convex problem, which can be solved by the as (35), shown at the bottom of the next page.
CVX toolbox.
⎛ (l ) | |2 ⎞
⎜ pm [n]|hmu [n] + (hmr [n])H 𝚯m [n]hru [n]| ⎟
s1,m [n] ≤ log2 ⎜1 + | |
⎟
3.3 Optimizing {lmloc [n]} with fixed ⎜ 𝜎 2
⎟
∖{lmloc [n]} ⎝ ⎠
| |2 (l )
Given {q[n], 𝜃km [n], 𝜏m [n], pm [n]}, the problem P1 can be trans- |hmu [n] + (hmr [n])H 𝚯m [n]hru [n]| (pm [n] − pm [n])
+ | | ,
formed as ( (l ) | ( )H |2 )
ln 2 𝜎2 + pm [n]|hmu [n] + hmr [n] 𝚯m [n]hru [n]|
| |
( ) (35)
∑
M ∑
N ∑
M ∑
N
(l )
(P3) ∶ max Rmsec [n]Δ𝜏m [n]+ lmloc [n] , where pm [n] denotes the transmit power of the mth user in
{lmloc [n]} m=1 n=1 m=1 n=1 the l th iteration at the nth time slot. Similarly, applying a first-
(33a) (l )
order Taylor expansion for s2,m [n] at point pm [n], (34 c) can be
transformed as (36), shown at the bottom of the next page.
s. t. (30g), (30i ), (30 j ). (33b)
s2,m [n] ≥ log2
Since the objective function and constraints are affine, P3 is ( (l ) | |2 ( 2)
a convex problem, which is solved by the CVX toolbox. 1 + pm [n]|hme [n] + (hmr [n])H 𝚯m [n]hre [n]| ∕ 𝜎2 + PJ |HJr [n]|
| |
LIU ET AL. 7
( )
| |2 (l ) transmission rate RmL [n] can be expressed as [38]
|hme [n] + (hmr [n]) 𝚯m [n]hre [n]| pm [n] − pm [n]
H
1 | |
+
ln 2 ( | ( )H |2 )
𝜎2 + PJ ||HJr [n]|| + pm [n]|hme [n] + hmr [n] 𝚯m [n]hre [n]| | |2
2 (l )
| | ⎛ | Am [n] Bm [n]| ⎞
Rm [n] = log2 ⎜1 + 𝜇m [n]|| 𝛼 +
| ⎟
where HJr [n] = hJe [n] + (hJr [n])H 𝚯m [n]hre [n]. (36) ⎜ | (d [n]) 2 dru [n] || ⎟
⎝ | mu | ⎠
⎛ ⎛ A2 [n] Bm [n] 2Am [n]Bm [n]⎞⎞ (40)
2
≥ log2 ⎜1 + 𝜇m [n]⎜ ⎟⎟
m
Thus P4 can be reformulated as + +
⎜ ⎜ (vm [n])𝛼 (u[n])2 𝛼
⎟⎟
⎝ ⎝ u[n](vm [n]) 2 ⎠⎠
∑
N ∑
M = RmL [n]
(P4.1) ∶ max (B(s1,m [n] − s2,m [n])Δ𝜏m [n])
{}
n=1 m=1
pm [n] (l )
∑
N ∑
M where 𝜇m [n] = . {vm [n]} and {u (l ) [n]} are defined as the
𝜎2
+ ((lmloc [n])), (37a) values of the l th iteration of the variables {vm [n]} and {u[n]},
n=1 m=1 respectively. Applying the first-order Taylor expansion to RmL [n]
(l )
s. t.(30i ), 30(k), (35), (36). (37b) at (vm [n], u (l ) [n]), we have
(l )
Since the objective function and constraints of P4.1 are (l ) Ym [n] ( (l ) )
affine, the problem is convex, and CVX is used to solve RmL [n] ≥ log2 Xm [n] + (l )
vm [n] − vm [n]
the problem. Xm [n] ln 2
(l ) (41)
Zm [n] ( )
+ (l ) |u[n] − u (l ) [n]|
| |
Xm [n] ln 2
3.5 Optimizing {q[n]} with fixed ∖{q[n]}
where
Given {𝜃k [n], lmloc [n], 𝜏m [n], pm [n]} , introducing the variable
s1,m [n] ,the problem P1 can be transformed as (l )
Xm [n] = 1
∑
N ∑
M
( ) ⎛ 2 ( )2 ⎞
(P5) ∶ max (Bs1,m [n] − Rme [n])Δ𝜏m [n] + lmloc [n] , ⎜ (Am [n]) Bm [n] 2Am [n]Bm [n] ⎟ (42)
+𝜇m [n]⎜ 𝛼+ ( (l ) )2 + (
{} (
) (l ) ) 𝛼∕2 ⎟
n=1 m=1
⎜ (vm(l ) [n]) u [n] u (l ) [n] vm [n] ⎟
(38a) ⎝ ⎠
s. t.s1,m [n] ≤ ⎛ 2 ⎞
(l ) ⎜ 𝛼(Am [n]) 𝛼Am [n]Bm [n] ⎟
Ym [n] = −𝜇m [n]⎜ ( )𝛼+1 + ( ( ) ⎟
⎛ | |2 ⎞ ) (l ) ( 𝛼∕2+1 )
⎜ pm [n]|hmu [n] + (hmr [n])H 𝚯m [n]hru [n]| ⎟ ⎜ v (l ) [n] (l ) ⎟
log2 ⎜1 + | | , ∀m, n, ⎝ m u [n] vm [n] ⎠
⎟
⎜ 𝜎 2
⎟ (43)
⎝ ⎠
(38b) and
(30b), (30c ), (30d ), (30e), (30h), (30i ), (38c)
⎛ 2 ⎞
(l ) ⎜ 2(Bm ) 2Am [n]Bm [n] ⎟
where = {s1,m [n], s2,m [n], q[n]}. Although the objective func- Zm [n] = −𝜇m [n]⎜ + ( )𝛼∕2 ⎟ (44)
( (l ) )3 ( )
⎜ um 2 (l )
u (l ) [n] vm [n] ⎟
tion is made convex by introducing auxiliary variables, the ⎝ ⎠
constraint is highly nonconvex and problem P5 is still difficult
to solve. Therefore, we use the SCA technique for the con- The constraint on the variable vm [n] can be reformulated as
straint. With the RIS phase shift obeying Equation (31), we have
( )2
(l ) (l )
−(vm [n])2 ≤ vm [n] − 2vm [n]vm [n]
| | ( )2 (45)
| | | Am [n] Bm [n]|
|hmu [n] + (hmr [n])H 𝚯m [n]hru [n]| = || | (39) (l ) (l )
+ ⇒ −(dmu [n])2 ≤ vm [n] − 2vm [n]vm [n]
| | | 𝛼
dru [n] ||
| mu
(d [n]) 2 |
Similarly, the constraint on the variable u[n] is reformulated as
√ √ ∑K
where Am [n] = 𝛽0 |h̄ mu [n]| and Bm [n] = 𝛽0 |hmr,i [n]|. ( )2 ( )2
i=1 − u[n] ≤ u (l ) [n] − 2u[n]u (l ) [n]
Introducing the variables {vm [n]}, {u[n]} where the constrains ( )2 ( )2 (46)
vm [n] ≥ dmu [n], u[n] ≥ dru [n] are satisfied, the lower bound on the ⇒ − dru [n] ≤ u (l ) [n] − 2u[n]u (l ) [n]
8 LIU ET AL.
ALGORITHM 1 Communication Resource And Trajectory Joint and (48) must obey the following constraints:
Optimization (CRTJO) Algorithm
m,(l ) (l ) loc,(l ) (l )
( )
1: Initialization:Given {q(l ) [n], 𝜃k [n], 𝜏m [n], lm [n], pm [n]}, set l = 0 Fo 𝜃km,r [n], lmloc,r [n], 𝜏mr [n], prm [n], qr [n]
and iteration precision 𝜉 = 10−3 .
(31 ) ( )
2: Repeat ≤ Fo 𝜃km,r+1 [n], lmloc,r [n], 𝜏mr [n], prm [n], qr [n]
loc,(l ) (l ) (l )
Given {q(l ) [n], lm [n], 𝜏m [n], pm [n]}, obtain the RIS phase shift
(32 ) ( )
3:
m,(l +1)
{𝜃k [n]} via (31). ≤ Fo 𝜃km,r+1 [n], lmloc,r+1 [n], 𝜏mr [n], prm [n], qr [n]
m,(l +1)
.
loc,(l ) (l )
4: Given {q(l ) [n], 𝜃k [n], lm [n], pm [n]}, solve P2 to obtain the frame (33 ) ( ) (49)
(l +1) m,r+1 loc,r+1
length {𝜏m [n]}. ≤ Fo 𝜃k [n], lm [n], 𝜏m [n], pm [n], q [n]
r+1 r r
m,(l +1) (l +1)
(37 ) ( )
(l )
5: Given {q(l ) [n], 𝜃k [n], 𝜏m [n], pm [n]}, solve P3 to obtain the local
computational data allocation {lm
loc,(l +1)
[n]}. ≤ Fo 𝜃km,r+1 [n], lmloc,r+1 [n], 𝜏mr+1 [n], pr+1 r
m [n], q [n]
(48 ) ( )
m,(l +1) loc,(l +1) (l +1)
6: Given {q(l ) [n], 𝜃k [n], lm [n], 𝜏m [n]}, solve P4.1 to obtain the
user transmit power {pm [n]}.
(l +1) ≤ Fo 𝜃km,r+1 [n], lmloc,r+1 [n], 𝜏mr+1 [n], pr+1 m [n], q r+1 [n]
Wr [0,0] Δ 1s
He 100 m Vmax 15 m/s
H 100 m Qm 1 Mbit
dmin 1m Hr 20 m
B 1MHz d 𝜆∕2
max
Fuav 10 GHz 𝛼, 𝛼0 3.6,2
Fmmax 1GHz 𝛽GR 20 dB
PJ −10 dB 𝜎2 −115 dBm
𝛽0 −30 dB P̄m 1W
𝜅m 10−27 Cm 103 cycles/bit
FIGURE 4 Comparison of the secure computing bits of each user in slot FIGURE 6 The impact of Qm on the secure computing bits with different
n with different value of Qm . value of Pmax and K .
AUTHOR CONTRIBUTIONS
shihao liu: Conceptualization, methodology, software, writ-
ing - original draft. Yangchao Huang: Investigation, resources,
software, supervision. Hang Hu: Conceptualization, funding
acquisition, resources, writing - review and editing. Jiangbo
Si: Supervision, validation, visualization. Guobing Cheng: For-
mal analysis, supervision. Tao Huang: Resources, visualization.
Xiaoliang Hu: Validation, visualization.
ACKNOWLEDGEMENTS
This work is supported by the National Natural Science
Foundation of China under Grant 61901509.
FIGURE 7 The impact of T on the secure computing bits with different DATA AVAILABILITY STATEMENT
strategies. Research data are not shared.
ORCID
Shihao Liu https://orcid.org/0009-0006-9292-9846
Hang Hu https://orcid.org/0000-0002-5391-010X
REFERENCES
1. Shang, B, Poor, H.V, Liu, L.: Aerial reconfigurable intelligent surfaces
meet mobile edge computing. IEEE Wireless Commun. 29(6), 104–111
(2022)
2. Mao, Y, You, C, Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile
edge computing: The communication perspective. IEEE Commun. Surv.
Tut. 19(4), 2322–2358 (2017)
3. Zeng, Y., Zhang, R., Lim, T.J.: Throughput maximization for UAV-enabled
mobile relaying systems. IEEE Trans. Commun. 64(12), 4983–4996
(2016)
4. Johansen, T.A., Zolich, A., Hansen, T., Sørensen, A.J.: Unmanned aerial
vehicle as communication relay for autonomous underwater vehicle – Field
tests. In: 2014 IEEE Globecom Workshops (GC Wkshps), pp. 1469–1474.
IEEE, Piscataway (2014)
5. Sun, X., Ng, D.W.K., Ding, Z., Xu, Y., Zhong, Z.: Physical layer security in
FIGURE 8 The impact of Pmax on the secure computing bits with
UAV systems: Challenges and opportunities. IEEE Wirel. Commun. 26(5),
different strategies.
3147–3159 (2019)
6. Xu, J., Yao, J.: Exploiting physical-layer security for multiuser multicarrier
computation offloading. IEEE Wirel. Commun. Lett. 8(1), 9–12 (2019)
motivates us to introduce RIS to improve the security 7. Zhang, G., Wu, Q., Cui, M., Zhang, R.: Securing UAV communications via
performance when the user transmission power is limited. joint trajectory and power control. IEEE Trans. Wirel. Commun. 18(2),
1376–1389 (2019)
8. Wang, D., Bai, B., Zhang, G., Han, Z.: Optimal placement of low-altitude
aerial base station for securing communications. IEEE Trans. Commun.
5 CONCLUSIONS 8(3), 869–872 (2019)
9. Chen, X., Jiao, L., Li, W., Fu, X.: Efficient multi-user computation offload-
In this paper, we propose a secure communication strategy in ing for mobile-edge cloud computing. IEEE ACM Trans. Netw. 24(5),
the RIS-assisted UAV-MEC system, where UAV_L calculates 2795–2808 (2016)
the offloaded data and RIS improves the communication qual- 10. Wang, J.F., Xu, J., Wang, X., Cui, S.: Joint offloading and
computing optimization in wireless powered mobile-edge com-
ity of the uplink. The combination of jammer and RIS can
puting systems. IEEE Trans. Wirel. Commun. 17(3), 1784–1797
improve the system’s secure computing bits. Secure comput- (2018)
ing bits are maximized by optimizing the frame length, transmit 11. Mohammed, A., Nahom, H., Tewodros, A., Habtamu, Y., Hayelom, G.:
power, local computational data allocation, UAV_L trajectory, Deep reinforcement learning for computation offloading and resource
and RIS phase shift. The optimization problem is noncon- allocation in blockchain-based multi-UAV-enabled mobile edge comput-
ing. In: 17th International Computer Conference on Wavelet Active Media
vex, thus it is solved by combining the BCD algorithm and
Technology and Information Processing, pp. 295–299. IEEE, Piscataway
the SCA algorithm. The simulation results show that the pro- (2020)
posed scheme achieves better performance than the benchmark 12. Han, D., Shi, T.: Secrecy capacity maximization for a UAV-assisted MEC
schemes. system. China Commun. 17(10), 64–81 (2020)
12 LIU ET AL.
13. Bai, T., Wang, J., Ren, Y., Hanzo, L.: Energy-efficient computation offload- 28. Hua, M., Yang, L., Wu, Q., Pan, C., Li, C.: Swindlehurst, A.L.: UAV-assisted
ing for secure UAV-edge-computing systems. IEEE Trans. Veh. Technol. intelligent reflecting surface symbiotic radio system. IEEE Trans. Wirel.
68(6), 6074–6087 (2019) Commun. 20(9), 5769–5785 (2021)
14. Fatima, N., Saxena, P., Gupta, M.: Integration of multi access 29. Pang, X., Zhao, N., Tang, J., Wu, C., Niyato, D., Wong, K.-K.: IRS-assisted
edge computing with unmanned aerial vehicles: Current techniques, secure UAV transmission via joint trajectory and beamforming design.
open issues and research directions. Phys. Commun. 52, 101641 IEEE Trans. Commun. 70(2), 1140–1152 (2022)
(2022) 30. Xu, Y., Zhang, T., Liu, Y., Yang, D., Xiao, L., Tao, M.: Computation capac-
15. Gu, X., Zhang, G., Gu, J.: Offloading optimization for energy- ity enhancement by joint UAV and RIS design in IoT. IEEE Internet.
minimization secure UAV-edge-computing systems. In: 2021 IEEE Things. J. 9(20), 20590–20603 (2022)
Wireless Communications and Networking Conference (WCNC), pp. 1–6. 31. Li, S., Duo, B., Renzo, M.D., Tao, M., Yuan, X.: Robust secure UAV
IEEE, Piscataway (2021) communications with the aid of reconfigurable intelligent surfaces. IEEE
16. Li, Y., Fang, Y., Qiu, L.: Joint computation offloading and communication Trans. Wirel. Commun. 20(10), 6402–6417 (2021)
design for secure UAV-enabled MEC systems. In: 2021 IEEE Wireless 32. Xu, Y., Zhang, T., Liu, Y., Yang, D., Xiao, L., Tao, M.: Computation capac-
Communications and Networking Conference (WCNC), pp. 1–6. IEEE, ity enhancement by joint UAV and RIS design in IoT. IEEE Internet.
Piscataway (2021) Things. J. 9(20), 20590–20603 (2022)
17. Xu, K., Zhao, M.-M., Cai, Y., Hanzo, L.: Low-complexity joint power 33. Wei, W., Pang, X., Tang, J., Zhao, N., Wang, X., Nallanathan, A.: Secure
allocation and trajectory design for UAV-enabled secure communica- transmission design for aerial IRS assisted wireless networks. IEEE Trans.
tions with power splitting. IEEE Trans. Commun. 69(3), 1896–1911 Commun. 71(6), 3528–3540 (2023)
(2021) 34. Mukherjee, A., Swindlehurst, A.L.: Detecting passive eavesdroppers in
18. Xu, Y., Zhang, T., Yang, D., Liu, Y., Tao, M.: Joint resource and trajec- the MIMO wiretap channel. In: 2012 IEEE International Conference on
tory optimization for security in UAV-assisted MEC systems. IEEE Trans. Acoustics, Speech and Signal Processing (ICASSP), pp. 2809–2812. IEEE,
Commun. 69(1), 573–588 (2021) Piscataway (2012)
19. Chen, P., Luo, X., Deke, D., Sun, Y., Xie, J., Zhao, Y.: Secure task offloading 35. Fang, S., Chen, G., Li, Y.: Joint optimization for secure intelligent reflecting
for MEC-aided-UAV system. IEEE Trans. Intell. Veh. 1–14 (2022) surface assisted UAV networks. IEEE Wirel. Commun. Lett. 10(2), 276–
20. Lu, W., Ding, Y., Yuan, Y., Hu, S., Wu, Y.: Resource and trajectory optimiza- 280 (2021)
tion for secure communications in dual unmanned aerial vehicle mobile 36. Qin, X., Yu, W., Song, Z., Hou, T., Hao, Y., Sun, X.: Energy efficiency
edge computing systems. IEEE Trans. Industr. Inform. 18(4), 2704–2713 optimization for RIS-assisted UAV-enabled MEC systems. In: 2022 IEEE
(2022) Globecom Workshops (GC Wkshps), pp. 1164–1169. IEEE, Piscataway
21. Lu, W., Ding, Y., Gao, Y., Chen, Y., Zhao, N.: Secure NOMA-based UAV- (2022)
MEC network towards a flying eavesdropper. IEEE Trans. Commun. 37. Mei, H., Yang, K., Shen, J., Liu, Q.: Joint trajectory-task-cache optimiza-
70(5), 3364–3376 (2022) tion with phase-shift design of RIS-assisted UAV for MEC. IEEE Wirel.
22. Zhou, Y., Pan, C., Yeoh, P., Wang, K., Elkashlan, M.: Secure communi- Commun. Lett. 10(7), 1586–1590 (2021)
cations for UAV-enabled mobile edge computing systems. IEEE Trans. 38. Li, S., Duo, B., Yuan, X., Liang, Y.-C., Di Renzo, M.: Reconfigurable intel-
Commun. 68(1), 376–388 (2020) ligent surface assisted UAV communication: Joint trajectory design and
23. Liu, X., Yu, Y., Peng, B., Zhai, X.B., Zhu, Q.: RIS-UAV enabled worst-case passive beamforming. IEEE Wirel. Commun. Lett. 9(5), 716–720 (2020)
downlink secrecy rate maximization for mobile vehicles. IEEE Trans. Veh. 39. Wu, Q., Zeng, Y., Zhang, R.: Joint trajectory and communication design
Technol. 72(5), 6129–6141 (2022) for multi-UAV enabled wireless networks. IEEE Wirel. Commun. 17(3),
24. Pang, X., Mei, M., Zhao, N., Zhang, R.: Intelligent reflecting surface 2109–2121 (2018)
assisted interference mitigation for cellular-connected UAV. IEEE Wirel.
Commun. Lett. 11(8), 1708–1712 (2022)
25. Pang, X., Mei, M., Zhao, N., Zhang, R.: Cellular sensing via cooperative
intelligent reflecting surfaces. IEEE Trans. Veh. Technol. 1–6 (2023) How to cite this article: Liu, S., Huang, Y., Hu, H., Si,
26. Zhou, G., Pan, C., Ren, H., Wang. K., Peng, Z.: Secure wireless commu- J., Cheng, G., Huang, T., Hu, X.: Resource and trajectory
nication in RIS-aided MISO system with hardware impairments. IEEE optimization for secure communication in RIS assisted
Wirel. Commun. Lett. 10(6), 1309–1313 (2021)
UAV-MEC system. IET Commun. 1–12 (2023).
27. Liu, X., Yu, Y., Li, F., Durrani, T.S.: Throughput Maximization for RIS-
UAV Relaying Communications. IEEE Trans. Intell. Transp. Syst. 23(10), https://doi.org/10.1049/cmu2.12680
19569–19574 (2022)