Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks