Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology
被引:2
作者:
Shen, Yi
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R ChinaSoutheast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
Shen, Yi
[1
]
Pan, Zhiwen
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
Purple Mt Labs, Nanjing 211100, Jiangsu, Peoples R ChinaSoutheast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
Pan, Zhiwen
[2
,3
]
Liu, Nan
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R ChinaSoutheast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
Liu, Nan
[2
]
You, Xiaohu
论文数: 0引用数: 0
h-index: 0
机构:
Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
Purple Mt Labs, Nanjing 211100, Jiangsu, Peoples R ChinaSoutheast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
You, Xiaohu
[2
,3
]
机构:
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Purple Mt Labs, Nanjing 211100, Jiangsu, Peoples R China
We propose a legal Unmanned Aerial Vehicle (UAV) surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source, where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring. Three schemes are considered for a Multiple-Input Multiple-Output (MIMO) UAV: surveilling followed by jamming; jamming followed by surveilling; and two -stage surveilling. For each scheme, a closed-form expression of surveilling non-outage probability is derived, and surveilling performance under different system configurations is analyzed. Monte Carlo (MC) simulation validates derivation correctness.