4.6 Article

Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI

期刊

IEEE SIGNAL PROCESSING LETTERS
卷 29, 期 -, 页码 1267-1271

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LSP.2022.3156402

关键词

Jamming; Eavesdropping; Throughput; Surveillance; Autonomous aerial vehicles; Wireless communication; Optimization; Information surveillance; jamming-assisted eavesdropping; UAV; eavesdropping throughput maximization

向作者/读者索取更多资源

This study proposes two jamming-assisted eavesdropping strategies for suspicious relaying systems in UAV environments, aiming to maximize eavesdropping throughput. The research uses exhaustive search and tight approximation methods to achieve optimal solutions and implement sub-optimal solutions effectively.
We investigate proactive eavesdropping with one half-duplex legitimate monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious relaying systems, which consist of a suspicious transmitter (ST), a suspicious UAV-based relay (SU) and a suspicious destination (SD). Under this setup, we propose two jamming-assisted eavesdropping strategies, namely, Eavesdrop-Then-Jam (ETJ) and Jam-Then-Eavesdrop (JTE), to maximize the eavesdropping throughput of E. Specifically, for ETJ, E first eavesdrops the suspicious signal of the ST in the ST-SU phase and then jams the SD in the SU-SD phase; for JTE, E first jams the SU in the ST-SU phase and then eavesdrops the suspicious signal of the SU in the SU-SD phase. However, in both strategies, as the jamming power of E (independent variable) changes, the SU can also adaptively adjust its deployment (dependent variable) to maximize the benefit of the suspicious system. Facing this challenge, we can only employ the undesirable exhaustive search over both the independent and dependent variables to achieve the optimal solution. To decrease the complexity, we further derive a tight approximation of the Lambert function and then develop easy-to-implement algorithms to find the sub-optimal solutions. Numerical results demonstrate the effectiveness of our proposed strategies compared to conventional passive eavesdropping.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据