UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems

Zhang, M; Chen, Y; Tao, X; Darwazeh, I; (2019) Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems. In: Proceedings of the 2019 26th International Conference on Telecommunications (ICT). (pp. pp. 102-107). IEEE Green open access

[thumbnail of Darwazeh_Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems_AAM.pdf]
Preview
Text
Darwazeh_Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems_AAM.pdf - Accepted Version

Download (150kB) | Preview

Abstract

Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes.

Type: Proceedings paper
Title: Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems
Event: The 26th International Conference on Telecommunications (ICT) 2019
Location: Hanoi, Vietnam
Dates: 8th-10th April 2019
ISBN-13: 978-1-7281-0273-3
Open access status: An open access version is available from UCL Discovery
DOI: 10.1109/ICT.2019.8798768
Publisher version: https://doi.org/10.1109/ICT.2019.8798768
Language: English
Additional information: This version is the author accepted manuscript. For information on re-use, please refer to the publisher’s terms and conditions.
Keywords: autonomous aerial vehicles, convex programming, iterative methods, jamming, mobility management (mobile radio), telecommunication security
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Electronic and Electrical Eng
URI: https://discovery.ucl.ac.uk/id/eprint/10082924
Downloads since deposit
151Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item