期刊
IEEE WIRELESS COMMUNICATIONS LETTERS
卷 11, 期 1, 页码 3-7出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LWC.2021.3109037
关键词
Jamming; Eavesdropping; Unmanned aerial vehicles; Resource management; Gain; Surveillance; Signal to noise ratio; Wireless information surveillance; UAV; jamming; eavesdropping rate; multiuser communication
资金
- Natural Science Foundations of China [62071480, 61971337]
- National Natural Science Foundation for Distinguished Young Scholar [61825104]
This letter studies the proactive eavesdropping with one full-duplex monitor in unmanned aerial vehicle-enabled suspicious multiuser communications. The paper addresses the challenges brought by varying jamming power and proposes an optimal jamming power determination method based on the characteristic of eavesdropping rate.
This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to maximize its sum eavesdropping rate by overhearing the messages from the UAV and jamming the ground multiple suspicious users simultaneously (corresponding to DB), or vice versa (corresponding to UMA). However, as the jamming power of E varies, the suspicious UAV and users will adapt their deployment and power allocation patterns concurrently to maintain the benefits of the suspicious system, which will cause certain obstacles for E to grasp its accurate jamming effect. To tackle these challenges, we first fix the jamming behavior of E and accordingly figure out the adaptiveness of the suspicious system, armed with which we further exploit the step characteristic of the eavesdropping rate to determine the optimal (sub-optimal) jamming power of E, and the complexity involved only increases linearly with the number of suspicious users and thus avoiding the tedious exhaustive search. Simulations verify the effectiveness of the proposed schemes compared to conventional benchmarks.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据