Preprint
Article

This version is not peer-reviewed.

Secure Communications for UAV Relay Networks: A MPC-Based Trajectory Tracking Approach

A peer-reviewed article of this preprint also exists.

Submitted:

21 February 2025

Posted:

24 February 2025

You are already at the latest version

Abstract
Unmanned aerial vehicles (UAVs) have emerged as a promising solution to enhance communication networks, especially in scenarios where traditional infrastructure is impractical or unavailable. However, the reliance on line-of-sight (LoS) channels in UAV-assisted relay networks introduces significant security vulnerabilities. This paper proposes a novel framework that jointly optimizes transmit power and UAV trajectory to achieve secure communications in such networks. To enhance system performance against environmental uncertainties, we employ a model predictive control (MPC)-based approach, which allows for real-time adaptive control of the UAV’s trajectory by considering future states and disturbances. This approach significantly improves the network’s resilience to dynamic environments and potential eavesdropping threats. Simulation results show that the proposed joint optimization of power allocation and trajectory design not only enhances communication security but also demonstrates the effectiveness of the MPC framework in real-time trajectory tracking, ensuring robust performance under varying environmental conditions.
Keywords: 
;  ;  ;  

1. Introduction

Unmanned aerial vehicles (UAVs) have garnered significant attention in recent years due to their potential to revolutionize various sectors, including communication, surveillance, and transportation [1,2,3,4,5]. Among the various applications, UAVs are increasingly being considered as relays in communication networks [6,7,8]. The ability of UAVs to operate at different altitudes and provide coverage over vast areas makes them ideal candidates for communication relays in situations where traditional infrastructure is impractical or unavailable [9]. In [10], an energy efficiency maximization algorithm for UAV relay with a circular trajectory is proposed, where the problem focuses on optimizing speed and load factor to balance power consumption and communication capacity. Zeng et al. [11] explore throughput maximization for UAV relays with a rectilinear trajectory, optimizing both power allocation and trajectory design to enhance performance under mobility constraints and information-causality conditions. While the concept of using UAV relays with a fixed location or on a fixed trajectory has been explored in several studies, there is a growing interest in mobile UAV relays, which provide enhanced flexibility and performance over their stationary counterparts [12]. A mobile UAV relay can follow dynamic paths and adjust its position to optimize communication performance, thereby improving coverage and reducing the likelihood of interference or signal blockage [13,14,15,16].
However, the line-of-sight (LoS) channel between UAVs and ground stations introduces significant security risks that must be addressed [13,17,18,19]. While UAV-based relay networks offer high throughput and low latency, their reliance on LoS paths can expose the system to various security vulnerabilities, including unauthorized interception of signals and cyber-attacks [20,21,22]. The security of UAV-assisted communication has been studied in [19,23,24,25], focusing on physical layer security (PLS) techniques. The authors in [23,24] optimized UAV relays by designing power allocation for secure communications. In [25], the authors improved secrecy rates by exploiting UAV mobility, while Wu et al. [19] proposed real-time UAV trajectory design in integrated sensing and communication (ISAC) systems, using an extended Kalman filtering (EKF)-based method for tracking to maximize secrecy rate.
Beyond the security challenges in UAV relay networks, the deployment of mobile UAVs also presents additional complexities, such as the need for accurate trajectory planning and control to ensure that communication links remain stable and reliable [26,27,28]. Current methods for mobile UAV relay systems often suffer from limitations in trajectory tracking accuracy and real-time adaptability, highlighting the need for more sophisticated control approaches [29,30,31,32]. Linear quadratic regulator (LQR)-based has been widely used for controlling UAVs in stationary applications, where it optimizes the control inputs based on a quadratic cost function. For example, an innovative method for adjusting the weighting matrices in linear quadratic LQR and LQR-proportional integral (PI) controllers significantly enhanced the robustness and tracking capabilities of quadrotor stabilization [33]. However, when considering dynamic scenarios, such as mobile UAV relays, the more advanced model predicted control (MPC) approach becomes critical. MPC allows for real-time optimization of the UAV’s trajectory, accounting for both the current state and future predictions, which is particularly important in environments with changing communication requirements or constraints [34,35]. While existing studies focus on either secure communication or trajectory control in UAV relay networks, their integration remains unexplored. To the best of our knowledge, this is the first work jointly optimizes security and trajectory tracking using MPC-based approach. This paper addresses this gap by proposing a framework that ensures both secure and efficient UAV relay operations. The main contributions of this work are summarized as follows:
  • We propose a novel framework that jointly optimizes the transmit power and UAV trajectory, aiming to enhance the security of UAV-assisted relay networks, which ensures a balance between efficient communication and robust security against potential eavesdropping. To address the resultant non-convex secrecy rate maximization problem, we first divide the original problem into two sub-problems that optimize the UAV transmit power and trajectory separately by leveraging the successive convex approximation (SCA) techniques.
  • We employ a MPC-based approach to adaptively control the UAV’s trajectory that improves secure communication. By considering future states and disturbances, the MPC method optimizes the control input termed velocity in each time slot, enabling the UAV to follow the trajectory efficiently while adapting to practical constraints and disturbances, enhancing the system’s resilience to dynamic environmental changes and security threats.
  • Extensive simulation results demonstrate the effectiveness of the proposed framework. The joint optimization of power allocation and trajectory design leads to significant improvements in communication security, while the MPC-based path tracking ensures robust performance, highlighting the superiority of our approach compared to traditional methods, particularly in dynamic and uncertain environments.
The remainder of this paper is structured as follows: Section 2 presents a detailed description of the proposed UAV relay network system, including both the secure communication model and the trajectory control model. Next, Section 3 formulates and solves the UAV power allocation and trajectory design problem, followed by the MPC-based trajectory tracking discussed in Section 4. Section 5 presents the simulation results. Finally, Section 6 offers the conclusion of the paper.
Notations: Bold lowercase and uppercase letters, such as a and A , represent vectors and matrices, respectively. R M denotes the M-dimensional real-valued column vectors. · T and · 1 denote the transposition and inverse operation, respectively. · indicates the 2 -norm of a matrix. N a , b is employed to represent a Gaussian distribution of mean a and variance b. Additionally, diag · represents a diagonal matrix, and I M refers to the M × M identity matrix.

2. System Model

As depicted in Figure 1, we consider a downlink communication scenario, where a base station (BS) is employed to serve a ground user (Bob) in the presence of an eavesdropper (Eve), with both out of the coverage of BS. Consequently, we assume that the transmission between the BS and UAV is in the absence of eavesdropping. A single-antenna UAV is utilized as an amplify-and-forward (AF) relay to assist the success of downlink transmission. For ease of exposition, we focus on a total duration of length T, which is further split into N time slots with the duration of each time slot Δ t . Notably, the value of Δ t should be small enough, enabling the UAV location within each time slot to approximately remain unchanged. During downlink transmission, the UAV dynamically adjusts its locations to provide stable and secure service to Bob. To this end, we denote the UAV’s horizontal location in time slot n as q n = [ x n , y n ] T with a constant flight altitude H, which depends on the territorial building’s height. In practice, the UAV is possibly influenced by environmental uncertainties, such as wind and weather impacts. To address these variations against secure communication design, in this section, we first introduce the UAV-enabled secure communication model, followed by presenting the trajectory control model.

2.1. Secure Communication Model

We consider that Bob and Eve are both on the ground with fixed locations, denoted by q b = [ x b , y b ] T and q e = [ x e , y e ] T , respectively. For simplicity, we assume that the BS is located at b 0 = [ 0 , 0 ] T . According to [36,37,38], we consider that the channels from UAV to Bob and Eve are both dominated by LoS links and the Doppler effect induced by UAV mobility can be well compensated. Consequently, the channel gain from the BS to UAV, the UAV to Bob and Eve can be respectively expressed as
h a u , n = ρ 0 d a u , n 2 = ρ 0 H 2 + | | q n b 0 | | 2 , n = 1 , , N ,
h u b , n = ρ 0 d u b , n 2 = ρ 0 H 2 + | | q n q b | | 2 , n = 1 , , N ,
h u e , n = ρ 0 d u e , n 2 = ρ 0 H 2 + | | q n q e | | 2 , n = 1 , , N ,
where d a u , n , d u b , n , and d u e , n are the corresponding distances in time slot n. The term ρ 0 represents the channel gain at a unit reference distance. Denote p 0 , n and p u , n as the transmit powers associated with the BS and UAV in time slot n, respectively. Then, the corresponding achieved rates from the BS to UAV, the UAV to Bob and Eve can be respectively given by
R a u , n = log 2 ( 1 + p 0 , n ρ 0 / σ 0 2 H 2 + | | q n b 0 | | 2 ) , n = 1 , , N ,
R u b , n = log 2 ( 1 + p u , n ρ 0 / σ 0 2 H 2 + | | q n q b | | 2 ) , n = 1 , , N ,
R u e , n = log 2 ( 1 + p u , n ρ 0 / σ 0 2 H 2 + | | q n q e | | 2 ) , n = 1 , , N ,
with σ 0 2 being the noise variance.

2.2. Trajectory Control Model

Once the optimal trajectory of the UAV is designed, the BS derives the corresponding control strategies, taking into account both the reference trajectory and the UAV’s real-time state, and subsequently sends the commands to the UAV for path tracking. In this work, we assume that the uplink feedforward channel and the downlink feedback channel between the BS and the UAV are both ideal, as our focus is solely on the design of control strategies. This implies that the UAV can perfectly receive the control input, while the BS can accurately estimate the UAV’s state. Specifically, we model the BS and the UAV as a liner control system, with the discrete-time system equations at time instant n formulated as [39,40,41]
q n + 1 = A q n + B v n ,
y n = C q n ,
where v n = v x , n , v y , n T R 2 denotes the control input, i.e, the UAV’s velocity over the time interval n t , n + 1 t , y n R 2 represents the UAV’s state estimation result at the BS, A , B , and C are fixed state evolution matrix, input matrix, and deterministic matrix, respectively, defined as
A = I 2 × 2 , B = t 0 0 t R 2 × 2 , C = I 2 × 2 .
Furthermore, in light of the UAV’s mechanical constraints, a new state-space model is introduced, where the increment in the UAV’s velocity, defined as v n = v n v n 1 , is chosen as the control input. Simultaneously, the state-space variable q n and the previous control input v n 1 are combined to form the new state q ^ n + 1 . Consequently, the discrete-time system equations are redefined as
q ^ n + 1 = A ^ q ^ n + B ^ v n ,
y ^ n = C ^ q ^ n ,
where
q ^ n = q n v n 1 R 4 A ^ = A B 0 2 × 2 I 2 × 2 R 4 × 4 , B ^ = B I 2 × 2 R 4 × 2 , C ^ = C 0 2 × 2 R 2 × 4 , y ^ n = y n .

3. UAV Power Allocation and Trajectory Design

To counteract malicious eavesdropping, in this section, we focus on the joint optimization of UAV power allocation and trajectory design to ensure secure communication in UAV-assisted relay networks.

3.1. Problem Formulation

The secrecy rate R ˜ n in time slot n is defined as the difference between the achievable rate at Bob and Eve, i.e., R ˜ n = R u b , n R u e , n . The goal is to maximize the cumulative secrecy rate over the entire communication duration T by jointly taking into account the UAV transmit power p u , n and UAV trajectory q n . We further denote P u = { p u , n , n = 1 N } and Q = { q n , n = 1 N } as the variable sets that collect the UAV transmit power, and trajectory variables across all time slots. Consequently, the secrecy rate maximization problem can be formulated as:
(13a) max { P u , Q } n = 1 N R ˜ n (13b) s . t . R u b , n R a u , n , n , (13c) | | q n + 1 q n | | V max Δ t , n , (13d) n = 1 N p u , n P max , u , p u , n 0 , n , (13e) q 1 = q I , q N = q F ,
where V max is the maximum velocity of the UAV and P max , u denotes the maximum transmit power budget corresponding to the UAV, respectively. q I and q F are the preset initial and final point. Constraint (13b) ensures that the achievable rate at Bob must not exceed the received rate at the UAV, while constraint (13c) denotes the UAV maximum travel distance within a single time slot. Moreover, constraint (13e) requires that the UAV return to its original at the end. Nevertheless, it is worth mentioning that problem (13) is non-convex, and consequently, it is challenging to deal with (13) by utilizing the traditional convex optimization methods. As a compromise, we propose a computationally efficient algorithm to obtain a locally optimal solution in what follows.

3.2. Efficient Solutions

In this subsection, we propose an AO-based algorithm to transform the original problem into a series of sub-problems and solve them iteratively to obtain an efficient solution. In particular, problem (13) can be decomposed into two subproblems, i.e., sub-problem 1: optimizing transmit powers with a fixed trajectory and sub-problem 2: optimizing the trajectory with other variables fixed. To begin with, we solve subproblem 1, which can be particularized as
(14a) max { P u } n = 1 N log 2 ( 1 + p u , n γ u b , n ) log 2 ( 1 + p u , n γ u e , n ) (14b) s . t . log 2 ( 1 + p u , n γ u b , n ) R a u , n , n , (14c) n = 1 N p u , n P max , u , p u , n 0 , n ,
where γ u b , n = h u b , n / σ 0 2 and γ u e , n = h u e , n / σ 0 2 . Although problem (14) is still non-convex, it can be iteratively solved by adopting the SCA technique. Specifically, the non-convex term in the objective function is log 2 ( 1 + p u , n γ u e , n ) . In the k-th iteration, we approximate this term by performing a first-order Taylor expansion around the current power allocation p u , n ( k ) , i.e.,
log 2 ( 1 + p u , n γ u e , n ) log 2 1 + p u , n ( k ) γ u e , n + γ u e , n ln 2 1 + p u , n ( k ) γ u e , n p u , n p u , n ( k ) R ^ u e , n .
Substitute (15) into the objective function, we arrive at the following convex approximation
R ˜ n n = 1 N log 2 ( 1 + p u , n γ u b , n ) R ^ u e , n .
Hence, in the k-th iteration, the following convex optimization problem is solved:
max { P u } n = 1 N R ˜ n s . t . p u , n ( 2 R a u , n 1 ) / γ u b , n , n , n = 1 N p u , n P max , u , p u , n 0 , n .
Problem (18) now is convex and thus can be efficiently addressed via standard solvers, e.g., CVX [42]. Subsequently, we optimize the UAV trajectory given the power variable P u , which is given by
(18a) max Q n = 1 N log 2 ( 1 + β u , n H 2 + | | q n q b | | 2 ) log 2 ( 1 + β u , n H 2 + | | q n q e | | 2 ) (18b) s . t . log 2 ( 1 + β u , n H 2 + | | q n q b | | 2 ) log 2 ( 1 + β 0 , n H 2 + | | q n b 0 | | 2 ) n , (18c) | | q n + 1 q n | | V max Δ t , n , (18d) q 1 = q I , q N = q F ,
with β u , n = p u , n ρ 0 / σ 0 2 and β 0 , n = p 0 , n ρ 0 / σ 0 2 . We first note that R u b , n has a convex lower-bound at the given point q n r by invoking the SCA method, such that we arrive
R u b , n l b log 2 1 + β u , n H 2 + q n r q b 2 β u , n ln 2 1 1 + β u , n H 2 + q n r q b 2 × q n q b 2 q n r q b 2 H 2 + q n r q b 2 2 .
Moreover, introducing an auxiliary variable θ n = | | q n q e | | 2 , we can transform the objective function into a convex form with an additional constraint
θ n q n r q e 2 + 2 q n r q e T q n q n r .
Similarly, one can employ SCA technique to convert constraint (18b) into
β u , n H 2 + q n b 0 2 β 0 , n q n r q b 2 + 2 q n r q b T q n q n r .
As a result, problem (18) can be approximated as
max Q , θ n n = 1 N R u b , n l b log 2 ( 1 + β u , n / ( H 2 + θ n ) ) s . t . ( 18 c ) , ( 18 d ) , ( 20 ) , ( 21 ) ,
which is a convex problem and can be solved by CVX [43]. In a nutshell, the original problem can be solved by iteratively dealing with problems (18) and (22). Since there exists a finite upper bound due to the power constraint, the proposed algorithm can be guaranteed to converge.

4. MPC-Based Trajectory Tracking

In this section, we employ a MPC-based approach to achieve precise trajectory tracking. The primary objective of MPC is to compute a sequence of control inputs within the prediction horizon, denoted as N 1 , thereby minimizing the deviation between the reference path optimized in Section 3 and the trajectory predicted by the MPC framework. Accordingly, the control cost function at time instant n is formulated as [44]
J n = i = 0 N 1 1 e n + i n T R 1 e n + i n + v n + i n T R 2 v n + i n + e n + N T R 3 e n + N
where e n = q ^ n q ^ n , ref represents the error between the true state and the reference optimal state, e n + i n indicates the predicted state deviation at time instant n + i , given e n n = e n , v n + i n denotes the control input at time n + i , predicted at time n, while R 1 R 4 × 4 and R 2 R 2 × 2 are positive definite weighting matrices for the states and inputs, respectively. In (23), the first term corresponds to the state cost, which penalizes deviations from the reference state q ^ n , ref . The second term represents the input cost, penalizing deviations from the steady-state input. Finally, the third term corresponds to the terminal cost, which compensates for the control cost and approximates the result for N 1 = , thereby enhancing control performance, where R 3 R 4 × 4 is the solution to the discrete Riccati function [45], given by
R 3 = R 1 + A ^ T R 3 A ^ A ^ T R 3 B ^ R 2 + B ^ T R 3 B ^ 1 B ^ T R 3 A ^ .
Given that perfect knowledge of the control state q ^ n and control input v n is available on the UAV and BS sides, the MPC-based trajectory tracking optimization problem is formulated as
(25a) min v n + i n i = 0 N 1 1 J n (25b) s . t . v n + i n v , i = 0 , , N 1 1 , (25c) ( 10 ) , ( 11 ) ,
where (25b) denotes the control input constraint, with v representing the velocity increment limit of the UAV. Notably, while the control inputs for the entire prediction horizon can be obtained by solving problem (25), only the control input corresponding to the current sampling interval, i.e., v n = v n 1 + v n , is applied and transmitted to the UAV. At each subsequent time step, this process is repeated with updated information and a rolling prediction horizon.
To address the formulated problem, we begin by expressing J n in a quadratic form. Using the control system equations (10) and (11), the predicted control states over the prediction horizon are computed as
q ^ n n = q ^ n , q ^ n + 1 n = A ^ q ^ n + B ^ v n n , q ^ n + 2 n = A ^ q ^ n + 1 n + B ^ v n + 1 n = A ^ 2 q ^ n + A ^ B ^ v n n + B ^ v n + 1 n , q ^ n + N 1 n = A ^ N 1 q ^ n + A ^ N 1 1 B ^ v n n + + B ^ v n + N 1 1 n ,
which can be expressed as the matrix form, i.e,
Q n = M q ^ n + F V n ,
where Q n and V n represent the new control state and input matrices, respectively, which are defined as
Q n = q ^ n n q ^ n + 1 n q ^ n + N 1 n R 4 N 1 + 4 , V n = v n n v n + 1 n v n + N 1 1 n R 2 N 1 ,
with
M = I 4 × 4 A ^ A ^ N 1 R 4 N 1 + 4 × 4 , F = 0 0 0 B ^ 0 0 A ^ B ^ B ^ 0 A ^ N 1 1 B ^ A ^ N 1 2 B ^ B ^ R 4 N 1 + 4 × 2 N 1 .
Let us denote the reference state matrix as
Q n , ref = q ^ k , ref q ^ n + 1 , ref q ^ n + N 1 , ref R 4 N 1 + 4 ,
which includes the reference position and velocity of the UAV over the prediction horizon. Consequently, the control cost is equivalently reformulated as
J n = Q n Q n , ref T R ¯ 1 Q n Q n , ref + V n T R ¯ 2 V n ,
where R ¯ 1 = diag R 1 , , R 1 , R 3 and R ¯ 2 = diag R 2 , , R 2 . Substituting (27) into (31) yields the reformulated control cost function
J n = V n T H V n + E V n + G ,
where
H = F T R ¯ 1 F + R ¯ 2 ,
E = 2 q ^ n T M T Q n , ref T R ¯ 1 F ,
G = q ^ n T M T R ¯ 1 M q ^ n 2 q ^ n T M T R ¯ 1 Q n , ref + Q n , ref T R ¯ 1 Q n , ref .
Therefore, problem (25) is equivalently transformed into
(36a) min V n J n (36b) s . t . V n V ,
where V constrains the control input matrix V n . Since the objective function J n is quadratic with positive definite weighting matrix H , problem (36) can be efficiently solved as a convex QP problem by employing standard techniques [42,43]. At every time slot, the MPC-based optimization problem is solved and the optimal control input is calculated as v n = V n 1 , where V n 1 corresponds to the first two elements of V n R 2 N 1 .

5. Simulation Results

In this section, we present the simulation results to verify the effectiveness of our proposed algorithm. Unless otherwise specified, the system parameters are set as follows: the maximum UAV speed is V max = 30 m/s, the channel gain at a unit reference distance is ρ 0 = 60 dB and the received noise at the receivers is set to σ 0 2 = 110 dBm. The locations corresponding to the BS, Bob, and Eve are set to b 0 = [ 100 , 300 ] T m, q b = [ 200 , 0 ] T m, and q e = [ 400 , 300 ] T m, respectively. Moreover, we set the initial point and the final point to q I = [ 500 , 0 ] T m and q F = [ 100 , 400 ] T m, respectively. As for the control part, the weighting matrices for the states and inputs, R 1 and R 2 , are both identity matrices.
Figure 2 illustrates the UAV’s trajectory under varying total durations, demonstrating how the UAV dynamically adjusts its path to optimize secure communication. As the total mission duration increases, the UAV’s trajectory becomes closer to Bob and the BS. This is because a longer flight time enables the UAV to better fly away from Eve. The trajectory for the T = 60 s demonstrates a steeper descent toward the final position, reflecting a more direct path to the goal. In contrast, the trajectory for the longer duration T = 100 s is more gradual, indicating that the UAV takes a longer path to the final position. This behavior is expected as the UAV has more time to adjust its trajectory, potentially avoiding eavesdropping. Moreover, the UAV tends to hover closer to Bob during critical communication periods for enhancing the system throughput.
Figure 3 depicts the average secrecy rate as a function of time duration for different transmit powers compared to the benchmark scheme straight flight approach, in which the UAV directly flies from the initial point to the destination. It is evident that for both proposed and straight flight trajectories, increasing the transmit power from 5 W to 10 W results in a higher average secrecy rate, highlighting the trade-off between power and security. Furthermore, the proposed design, which adapts the UAV’s trajectory based on the available time, outperforms the straight-flight approach in all cases, suggesting that adjusting the UAV’s flight path can significantly enhance communication security, especially when combined with higher transmit power. Additionally, the average secrecy rate tends to stabilize over longer durations. The reason is that the UAV, with long flight durations, is capable of flying to hover over Bob, providing considerable communication service.
Figure 4 illustrates the UAV’s trajectory tracking performance using MPC. At the start, a noticeable deviation from the reference path occurs as the UAV adjusts its velocity and position to align with the desired trajectory. Similarly, some tracking errors appear at the hovering position, likely due to the difficulty in maintaining precise stabilization. However, as the UAV progresses, the tracking accuracy improves significantly, closely following the reference path. This demonstrates the effectiveness of the MPC controller in continuously refining the UAV’s motion, enabling smooth and accurate trajectory tracking despite initial deviations. Figure 5 shows the cumulative distribution function (CDF) of the mean squared error (MSE) between the UAV’s actual trajectory and the reference trajectory under different prediction horizons. The MSE quantifies the tracking error, with lower values indicating better adherence to the reference path. As expected, the CDF curve shifts to the right as the prediction horizon decreases, with the N 1 = 20 case achieving the best tracking performance, showing a higher proportion of lower MSE values. This demonstrates that a larger prediction horizon allows the MPC controller to plan further ahead, leading to more accurate trajectory tracking. As the prediction horizon decreases, the controller has less foresight, which results in larger tracking errors. This highlights the importance of a sufficiently large prediction horizon for optimal trajectory tracking in dynamic environments.

6. Conslusions

In this paper, we have presented a novel framework for secure communications in UAV-assisted relay networks. Our approach jointly optimized the UAV’s transmit power and trajectory, addressing the security vulnerabilities posed by the reliance on LoS channels. By employing a MPC-based approach, we have demonstrated how the UAV’s trajectory can be adaptively controlled in real-time, improving the resilience of the system against dynamic environmental conditions and potential eavesdropping threats. We first formulated a non-convex secrecy rate maximization problem and proposed an efficient solution using SCA techniques. The MPC-based path tracking ensured that the UAV could follow the optimized trajectory efficiently, even under practical constraints and disturbances. Simulation results show that the proposed joint optimization framework significantly enhances communication security, providing robust performance under dynamic conditions.

Author Contributions

Conceptualization, S.L.; methodology, S.L. and L.Z.; resources, B.T. and Y.L.; writing-original draft preparation, S.L., L.Z. and S.C.; writing-review and editing, S.C. and H.X.; Supervision, H.X.; funding acquisition, H.X. All authors have read and agreed to the published version of the manuscript.

Funding

Not applicable.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Motlagh, N.H.; Bagaa, M.; Taleb, T. UAV-Based IoT Platform: A Crowd Surveillance Use Case. IEEE Commun. Mag. 2017, 55, 128–134. [Google Scholar] [CrossRef]
  2. Wu, J.; Yuan, W.; Bai, L. On the Interplay Between Sensing and Communications for UAV Trajectory Design. IEEE Internet of Things Journal 2023, 10, 20383–20395. [Google Scholar] [CrossRef]
  3. Liu, Y.; Shi, Y.; Zhang, X.; Wu, J.; Yang, S. Reinforcement Learning-Based Car-Following Control for Autonomous Vehicles with OTFS. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC); 2024; pp. 1–6. [Google Scholar] [CrossRef]
  4. Lu, S.; Liu, F.; Li, Y.; Zhang, K.; Huang, H.; Zou, J.; Li, X.; Dong, Y.; Dong, F.; Zhu, J.; et al. Integrated Sensing and Communications: Recent Advances and Ten Open Challenges. IEEE Internet of Things Journal 2024, 11, 19094–19120. [Google Scholar] [CrossRef]
  5. Li, B.; Yuan, W.; Liu, F.; Wu, N.; Jin, S. OTFS-Based ISAC: How Delay Doppler Channel Estimation Assists Environment Sensing? IEEE Wireless Communications Letters 2024, 13, 3563–3567. [Google Scholar] [CrossRef]
  6. De Freitas, E.P.; Heimfarth, T.; Netto, I.F.; Lino, C.E.; Pereira, C.E.; Ferreira, A.M.; Wagner, F.R.; Larsson, T. UAV relay network to support WSN connectivity. In Proceedings of the international congress on ultra modern telecommunications and control systems; IEEE, 2010; pp. 309–314. [Google Scholar] [CrossRef]
  7. Wu, J.; Yuan, W.; Wei, Z.; Zhang, K.; Liu, F.; Wing Kwan Ng, D. Low-Complexity Minimum BER Precoder Design for ISAC Systems: A Delay-Doppler Perspective. IEEE Transactions on Wireless Communications 2025, 24, 1526–1540. [Google Scholar] [CrossRef]
  8. Zhan, P.; Yu, K.; Swindlehurst, A.L. Wireless relay communications with unmanned aerial vehicles: Performance and optimization. IEEE Transactions on Aerospace and Electronic Systems 2011, 47, 2068–2085. [Google Scholar] [CrossRef]
  9. Li, B.; Zhao, S.; Miao, R.; Zhang, R. A survey on unmanned aerial vehicle relaying networks. IET communications 2021, 15, 1262–1272. [Google Scholar] [CrossRef]
  10. Choi, D.H.; Kim, S.H.; Sung, D.K. Energy-efficient maneuvering and communication of a single UAV-based relay. IEEE Transactions on Aerospace and Electronic Systems 2014, 50, 2320–2327. [Google Scholar] [CrossRef]
  11. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput Maximization for UAV-Enabled Mobile Relaying Systems. IEEE Transactions on Communications 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  12. Zhang, S.; Zhang, H.; He, Q.; Bian, K.; Song, L. Joint trajectory and power optimization for UAV relay networks. IEEE Communications Letters 2017, 22, 161–164. [Google Scholar] [CrossRef]
  13. Sun, G.; Li, N.; Tao, X.; Wu, H. Power allocation in UAV-enabled relaying systems for secure communications. IEEE Access 2019, 7, 119009–119017. [Google Scholar] [CrossRef]
  14. Zhang, X.; Huang, H.; Tan, L.; Yuan, W.; Liu, C. Enhanced Channel Estimation for OTFS-Assisted ISAC in Vehicular Networks: A Deep Learning Approach. In Proceedings of the 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt); 2023; pp. 703–707. [Google Scholar] [CrossRef]
  15. Zhang, X.; Yuan, W.; Liu, C.; Wu, J.; Ng, D.W.K. Predictive Beamforming for Vehicles With Complex Behaviors in ISAC Systems: A Deep Learning Approach. IEEE Journal of Selected Topics in Signal Processing 2024, 18, 828–841. [Google Scholar] [CrossRef]
  16. Yuan, W.; Wei, Z.; Li, S.; Yuan, J.; Ng, D.W.K. Integrated Sensing and Communication-Assisted Orthogonal Time Frequency Space Transmission for Vehicular Networks. IEEE Journal of Selected Topics in Signal Processing 2021, 15, 1515–1528. [Google Scholar] [CrossRef]
  17. Zhu, J.; Jin, H.; He, Y.; Fang, F.; Huang, W.; Zhang, Z. Joint Optimization of User Scheduling, Rate Allocation, and Beamforming for RSMA Finite Blocklength Transmission. IEEE Internet of Things Journal 2024, 11, 27904–27915. [Google Scholar] [CrossRef]
  18. Tan, L.; Yuan, W.; Zhang, X.; Zhang, K.; Li, Z.; Li, Y. DNN-Based Radar Target Detection With OTFS. IEEE Transactions on Vehicular Technology 2024, 73, 15786–15791. [Google Scholar] [CrossRef]
  19. Wu, J.; Yuan, W.; Hanzo, L. When UAVs Meet ISAC: Real-Time Trajectory Design for Secure Communications. IEEE Transactions on Vehicular Technology 2023, 72, 16766–16771. [Google Scholar] [CrossRef]
  20. He, D.; Chan, S.; Guizani, M. Communication security of unmanned aerial vehicles. IEEE Wireless Communications 2016, 24, 134–139. [Google Scholar] [CrossRef]
  21. Wu, J.; Yuan, W.; Bai, L. Multi-UAV Enabled Sensing: Cramér-Rao Bound Optimization. In Proceedings of the 2023 IEEE International Conference on Communications Workshops (ICC Workshops); 2023; pp. 925–930. [Google Scholar] [CrossRef]
  22. Rodday, N.M.; Schmidt, R.d.O.; Pras, A. Exploring security vulnerabilities of unmanned aerial vehicles. In Proceedings of the NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium; IEEE, 2016; pp. 993–994. [Google Scholar] [CrossRef]
  23. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying. IEEE Wireless Communications Letters 2017, 6, 310–313. [Google Scholar] [CrossRef]
  24. Wang, Q.; Chen, Z.; Li, H.; Li, S. Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System. IEEE Access 2018, 6, 62849–62855. [Google Scholar] [CrossRef]
  25. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV Communications via Trajectory Optimization. In Proceedings of the GLOBECOM 2017 - 2017 IEEE Global Communications Conference; 2017; pp. 1–6. [Google Scholar] [CrossRef]
  26. Ryan, A.; Zennaro, M.; Howell, A.; Sengupta, R.; Hedrick, J. An overview of emerging results in cooperative UAV control. In Proceedings of the 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601); 2004; Vol. 1, pp. 602–607. [Google Scholar] [CrossRef]
  27. Li, Z.; Yuan, W.; Li, B.; Wu, J.; You, C.; Meng, F. Reconfigurable-Intelligent-Surface-Aided OTFS: Transmission Scheme and Channel Estimation. IEEE Internet of Things Journal 2023, 10, 19518–19532. [Google Scholar] [CrossRef]
  28. Jin, H.; Wu, J.; Yuan, W.; Liu, F.; Yuanhao, C. Co-Design of Sensing, Communication, and Control for Low-Altitude Wireless Networks with Finite Blocklength Transmission. Submitted to IEEE Transactions on Mobile Computing 2025. [Google Scholar]
  29. Baek, H.; Lim, J. Design of future UAV-relay tactical data link for reliable UAV control and situational awareness. IEEE Communications Magazine 2018, 56, 144–150. [Google Scholar] [CrossRef]
  30. Zhang, X.; Yuan, W.; Liu, C.; Wu, J.; Li, Z. Deep Learning-Based Cramér-Rao Bound Optimization for Integrated Sensing and Communication in Vehicular Networks. In Proceedings of the 2023 IEEE 24th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); 2023; pp. 646–650. [Google Scholar] [CrossRef]
  31. Zhang, X.; Liu, C.; Yuan, W.; Zhang, J.A.; Ng, D.W.K. Sparse Prior-Guided Deep Learning for OTFS Channel Estimation. IEEE Transactions on Vehicular Technology 2024, 73, 19913–19918. [Google Scholar] [CrossRef]
  32. Yuan, W.; Yang, Z.; Chen, L.; Zhang, R.; Yao, Y.; Cui, Y.; Zhang, H.; Ng, D.W.K. Wireless Localization and Formation Control With Asynchronous Agents. IEEE Journal on Selected Areas in Communications 2024, 42, 2890–2904. [Google Scholar] [CrossRef]
  33. Sir Elkhatem, A.; Naci Engin, S. Robust LQR and LQR-PI control strategies based on adaptive weighting matrix selection for a UAV position and attitude tracking control. Alexandria Engineering Journal Aug. 2022, 61, 6275–6292. [Google Scholar] [CrossRef]
  34. Lu, S.; Liu, F.; Dong, F.; Xiong, Y.; Xu, J.; Liu, Y.F.; Jin, S. Random ISAC signals deserve dedicated precoding. IEEE Transactions on Signal Processing 2024. [Google Scholar] [CrossRef]
  35. Chao, Z.; Ming, L.; Shaolei, Z.; Wenguang, Z. Collision-free UAV formation flight control based on nonlinear MPC. In Proceedings of the 2011 international conference on electronics, communications and control (ICECC); IEEE, 2011; pp. 1951–1956. [Google Scholar] [CrossRef]
  36. Wu, J.; Yuan, W.; Cheng, Q.; Jin, H. Towards Dual-Functional LAWN: Control-Aware System Design for Aerodynamics-Aided UAV Formations. Submitted to IEEE IEEE Journal on Selected Areas in Communications 2025. [Google Scholar]
  37. Zhang, K.; Wu, J.; Dong, F.; Lu, S.; Li, X.; Yuan, W. Joint Design of Receiving Filters and Complementary set of Sequences for ISAC With Sidelobe Level Suppression. IEEE Journal of Selected Areas in Sensors 2024, 1, 211–223. [Google Scholar] [CrossRef]
  38. Wu, J.; Yuan, W.; Liu, F.; Cui, Y.; Meng, X.; Huang, H. UAV-Based Target Tracking: Integrating Sensing into Communication Signals. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops); 2022; pp. 309–313. [Google Scholar] [CrossRef]
  39. Amato, F.; Ariola, M. Finite-time control of discrete-time linear systems. IEEE Transactions on Automatic Control 2005, 50, 724–729. [Google Scholar] [CrossRef]
  40. Shi, Y.; Li, B.; Wei, X.; Huang, H. Experimental Implementation of an OTFS-Based ISAC System. In Proceedings of the 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops); 2024; pp. 587–592. [Google Scholar] [CrossRef]
  41. Zhang, K.; Yuan, W.; Fan, P.; Wang, X. Dual-Functional Waveform Design With Local Sidelobe Suppression via OTFS Signaling. IEEE Transactions on Vehicular Technology 2024, 73, 14044–14049. [Google Scholar] [CrossRef]
  42. Boyd, S. Convex optimization. Cambridge UP 2004. [Google Scholar]
  43. Nocedal, J.; Wright, S.J. Numerical optimization; Springer, 1999. [Google Scholar]
  44. Lindqvist, B.; Mansouri, S.S.; Agha-mohammadi, A.a.; Nikolakopoulos, G. Nonlinear MPC for Collision Avoidance and Control of UAVs With Dynamic Obstacles. IEEE Robotics and Automation Letters 2020, 5, 6001–6008. [Google Scholar] [CrossRef]
  45. Mayne, D. Model predictive control theory and design. Nob Hill Pub, Llc 1999. [Google Scholar]
Figure 1. The considered UAV-assisted secure relay network.
Figure 1. The considered UAV-assisted secure relay network.
Preprints 150176 g001
Figure 2. The optimized UAV trajectory under different total durations.
Figure 2. The optimized UAV trajectory under different total durations.
Preprints 150176 g002
Figure 3. Average secrecy rate versus time duration with different transmit powers.
Figure 3. Average secrecy rate versus time duration with different transmit powers.
Preprints 150176 g003
Figure 4. MPC-based tracking path under different total durations.
Figure 4. MPC-based tracking path under different total durations.
Preprints 150176 g004
Figure 5. CDF of MSE perfoemance with different prediction horizons with T = 60 s .
Figure 5. CDF of MSE perfoemance with different prediction horizons with T = 60 s .
Preprints 150176 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated