期刊
IEEE SIGNAL PROCESSING LETTERS
卷 29, 期 -, 页码 1267-1271出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LSP.2022.3156402
关键词
Jamming; Eavesdropping; Throughput; Surveillance; Autonomous aerial vehicles; Wireless communication; Optimization; Information surveillance; jamming-assisted eavesdropping; UAV; eavesdropping throughput maximization
This study proposes two jamming-assisted eavesdropping strategies for suspicious relaying systems in UAV environments, aiming to maximize eavesdropping throughput. The research uses exhaustive search and tight approximation methods to achieve optimal solutions and implement sub-optimal solutions effectively.
We investigate proactive eavesdropping with one half-duplex legitimate monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious relaying systems, which consist of a suspicious transmitter (ST), a suspicious UAV-based relay (SU) and a suspicious destination (SD). Under this setup, we propose two jamming-assisted eavesdropping strategies, namely, Eavesdrop-Then-Jam (ETJ) and Jam-Then-Eavesdrop (JTE), to maximize the eavesdropping throughput of E. Specifically, for ETJ, E first eavesdrops the suspicious signal of the ST in the ST-SU phase and then jams the SD in the SU-SD phase; for JTE, E first jams the SU in the ST-SU phase and then eavesdrops the suspicious signal of the SU in the SU-SD phase. However, in both strategies, as the jamming power of E (independent variable) changes, the SU can also adaptively adjust its deployment (dependent variable) to maximize the benefit of the suspicious system. Facing this challenge, we can only employ the undesirable exhaustive search over both the independent and dependent variables to achieve the optimal solution. To decrease the complexity, we further derive a tight approximation of the Lambert function and then develop easy-to-implement algorithms to find the sub-optimal solutions. Numerical results demonstrate the effectiveness of our proposed strategies compared to conventional passive eavesdropping.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据