{"title":"Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems","authors":"Mingzhu Zhang, Yu Chen, Xiaofeng Tao, I. Darwazeh","doi":"10.1109/ICT.2019.8798768","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 26th International Conference on Telecommunications (ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT.2019.8798768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes.