4.7 Article

Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications

期刊

IEEE WIRELESS COMMUNICATIONS LETTERS
卷 11, 期 1, 页码 3-7

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LWC.2021.3109037

关键词

Jamming; Eavesdropping; Unmanned aerial vehicles; Resource management; Gain; Surveillance; Signal to noise ratio; Wireless information surveillance; UAV; jamming; eavesdropping rate; multiuser communication

资金

  1. Natural Science Foundations of China [62071480, 61971337]
  2. National Natural Science Foundation for Distinguished Young Scholar [61825104]

向作者/读者索取更多资源

This letter studies the proactive eavesdropping with one full-duplex monitor in unmanned aerial vehicle-enabled suspicious multiuser communications. The paper addresses the challenges brought by varying jamming power and proposes an optimal jamming power determination method based on the characteristic of eavesdropping rate.
This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to maximize its sum eavesdropping rate by overhearing the messages from the UAV and jamming the ground multiple suspicious users simultaneously (corresponding to DB), or vice versa (corresponding to UMA). However, as the jamming power of E varies, the suspicious UAV and users will adapt their deployment and power allocation patterns concurrently to maintain the benefits of the suspicious system, which will cause certain obstacles for E to grasp its accurate jamming effect. To tackle these challenges, we first fix the jamming behavior of E and accordingly figure out the adaptiveness of the suspicious system, armed with which we further exploit the step characteristic of the eavesdropping rate to determine the optimal (sub-optimal) jamming power of E, and the complexity involved only increases linearly with the number of suspicious users and thus avoiding the tedious exhaustive search. Simulations verify the effectiveness of the proposed schemes compared to conventional benchmarks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据