Robust proactive eavesdropping in UAV-enabled wireless communication networking

被引:3
作者
Wu, Wei [1 ]
Wang, Yujing [2 ]
Mo, Jianlin [3 ]
Liu, Jian [4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing 210003, Jiangsu, Peoples R China
[2] Deans Off ABA, Wenchuan 623002, Sichuan, Peoples R China
[3] Elect Informat & Automat Coll ABA, Wenchuan 623002, Sichuan, Peoples R China
[4] Nanjing Univ Finances & Econ, Coll Informat Engn, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicles; Robust; Cognitive radio; Proactive eavesdropping; Beamforming; RATE MAXIMIZATION; SURVEILLANCE; PERFORMANCE; DESIGN;
D O I
10.1186/s13638-019-1599-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial vehicle (UAV)-enabled cognitive radio network. Due to the channel estimation errors, we assume that the channel state information is not perfectly known. To ensure the successful eavesdropping, jamming signals are designed to disrupt the suspicious receivers and the primary receiver at the same time, which should have the good tradeoff between those two effects. We aimed to maximize the achievable eavesdropping rate under the transmitting power constraint at the legitimate monitor and the interference temperature constraint at the primary receiver, which was formulated as a non-convex problem with infinite constraints. We firstly transform the original problem into a simplified one with finite constraints. Then, an analytical solution in significant low-complexity is proposed by decomposing the simplified problem. Numerical results are finally presented to evaluate the performance of our proposed schemes in UAV-enabled wireless communication networking.
引用
收藏
页数:11
相关论文
共 33 条
[1]  
[Anonymous], 2018, 2018 IEEE GLOB COMM, DOI DOI 10.1109/GL0C0M.2018.8647517
[2]   Graph K-means Based on Leader Identification, Dynamic Game, and Opinion Dynamics [J].
Bu, Zhan ;
Li, Hui-Jia ;
Zhang, Chengcui ;
Cao, Jie ;
Li, Aihua ;
Shi, Yong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (07) :1348-1361
[3]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[4]   Detecting Prosumer-Community Groups in Smart Grids From the Multiagent Perspective [J].
Cao, Jie ;
Bu, Zhan ;
Wang, Yuyao ;
Yang, Huan ;
Jiang, Jiuchuan ;
Li, Hui-Jia .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08) :1652-1664
[5]   Motif-based functional backbone extraction of complex networks [J].
Cao, Jie ;
Ding, Cuiling ;
Shi, Benyun .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2019, 526
[6]  
Hong X., 2019, IEEE ACCESS, V7, P8
[7]   An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems [J].
1600, Institute of Electrical and Electronics Engineers Inc., United States (52) :94-101
[8]   Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links [J].
Li, Baogang ;
Yao, Yuanbin ;
Zhang, Haijun ;
Lv, Yabo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (01) :420-430
[9]   Spectral-Efficient Cellular Communications With Coexistent One- and Two-Hop Transmissions [J].
Li, Chunguo ;
Liu, Peng ;
Zou, Chao ;
Sun, Fan ;
Cioffi, John M. ;
Yang, Luxi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) :6765-6772
[10]   Multiuser Overhearing for Cooperative Two-Way Multiantenna Relays [J].
Li, Chunguo ;
Yang, Hyun Jong ;
Sun, Fan ;
Cioffi, John M. ;
Yang, Luxi .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (05) :3796-3802