I. Introduction
Unmanned aerial vehicles (UAVs) integrated with terrestrial communication networks (TCNs) serves as a key propellent to meet the increasing demands of the ubiquitous wireless coverage and improved network capacity [1]. Such a flexible and maneuverable wireless network architecture is greatly promising to support lots of important applications in the daily information exchange, disaster relief, military troop communication, etc [2]. However, it is notable that the UAV-aided TCN system is very vulnerable to identity-based spoofing attacks because of properties such as the natural openness of the transmission medium and highly dynamic changes of the network topology [3].