507 research outputs found
Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function
Integrated sensing and communication (ISAC) has recently been considered as a
promising approach to save spectrum resources and reduce hardware cost.
Meanwhile, as information security becomes increasingly more critical issue,
government agencies urgently need to legitimately monitor suspicious
communications via proactive eavesdropping. Thus, in this paper, we investigate
a wireless legitimate surveillance system with radar function. We seek to
jointly optimize the receive and transmit beamforming vectors to maximize the
eavesdropping success probability which is transformed into the difference of
signal-to-interference-plus-noise ratios (SINRs) subject to the performance
requirements of radar and surveillance. The formulated problem is challenging
to solve. By employing the Rayleigh quotient and fully exploiting the structure
of the problem, we apply the divide-and-conquer principle to divide the
formulated problem into two subproblems for two different cases. For the first
case, we aim at minimizing the total transmit power, and for the second case we
focus on maximizing the jamming power. For both subproblems, with the aid of
orthogonal decomposition, we obtain the optimal solution of the receive and
transmit beamforming vectors in closed-form. Performance analysis and
discussion of some insightful results are also carried out. Finally, extensive
simulation results demonstrate the effectiveness of our proposed algorithm in
terms of eavesdropping success probability
- …