Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems

This paper considers a new wireless information surveillance scenario, where a legitimate monitor tries to eavesdrop on the suspicious messages sent by an unmanned aerial vehicle aided suspicious transmitter. By using the characteristic of the suspicious system, we propose an effective proactive jamming scheme to maximize the achievable eavesdropping rate. A successive convex approximation based iterative algorithm is first developed to solve the original non-convex optimization problem. Based on this result, the eavesdropping rate maximization problem is then solved by applying the one-dimensional search method. Moreover, we also study the special case of two suspicious receivers for gaining more useful insights on designing the optimal jamming transmission strategy. Numerical results show that the proposed proactive jamming approach can significantly enhance the achievable eavesdropping rate compared to the reference scheme.

[1]  Victor C. M. Leung,et al.  UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells , 2018, IEEE Transactions on Vehicular Technology.

[2]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[3]  F. Richard Yu,et al.  Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.

[4]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[5]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[6]  Jie Xu,et al.  Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.

[7]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.

[8]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[9]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[10]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[11]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.