?url_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rft.title=Power+Allocation+for+Proactive+Eavesdropping+with+Spoofing+Relay+in+UAV+Systems&rft.creator=Zhang%2C+M&rft.creator=Chen%2C+Y&rft.creator=Tao%2C+X&rft.creator=Darwazeh%2C+I&rft.description=Unmanned+aerial+vehicles+(UAVs)+are+used+in+legitimate+surveillance+systems.+In+this+paper%2C+we+consider+a+wireless+monitor+system+that+consists+of+three+UAVs.+One+UAV+acts+as+a+legitimate+eavesdropper+that+adopts+1)+spoofing+relaying+and+2)+proactive+eavesdropping+via+jamming+techniques.+In+particular%2C+two+scenarios+are+considered+if+the+legitimate+eavesdropper+has+enough+power+for+successful+eavesdropping+throughout+flight+time.+If+the+legitimate+eavesdropper+has+enough+power%2C+the+formulated+problem+is+a+convex+optimization+problem%2C+which+can+be+solved+by+standard+convex+optimization+techniques.+If+not%2C+we+formulate+a+non-convex+optimization+problem+and+solve+it+by+an+iterative+algorithm.+Numerical+results+show+that+the+proposed+power+allocation+scheme+outperforms+the+passive+eavesdropping+and+equally+distributed+jamming+power+allocation+schemes.&rft.subject=autonomous+aerial+vehicles%2C+convex+programming%2C+iterative+methods%2C+jamming%2C+mobility+management+(mobile+radio)%2C+telecommunication+security&rft.publisher=IEEE&rft.date=2019-08-15&rft.type=Proceedings+paper&rft.language=eng&rft.source=+++++In%3A++Proceedings+of+the+2019+26th+International+Conference+on+Telecommunications+(ICT).++(pp.+pp.+102-107).++IEEE+(2019)+++++&rft.format=text&rft.identifier=https%3A%2F%2Fdiscovery.ucl.ac.uk%2Fid%2Feprint%2F10082924%2F10%2FDarwazeh_Power%2520Allocation%2520for%2520Proactive%2520Eavesdropping%2520with%2520Spoofing%2520Relay%2520in%2520UAV%2520Systems_AAM.pdf&rft.identifier=https%3A%2F%2Fdiscovery.ucl.ac.uk%2Fid%2Feprint%2F10082924%2F&rft.rights=open