scholarly journals Proactive Eavesdropping Using UAV Systems with Full-Duplex Ground Terminals

Author(s):  
Zahra Mobini ◽  
Batu K. Chalise ◽  
Mohammadali Mohammadi ◽  
Himal A. Suraweera ◽  
Zhiguo Ding
2018 ◽  
Vol 17 (10) ◽  
pp. 6707-6719 ◽  
Author(s):  
Jihwan Moon ◽  
Hoon Lee ◽  
Changick Song ◽  
Sunho Lee ◽  
Inkyu Lee

2020 ◽  
Vol 68 (12) ◽  
pp. 7563-7577
Author(s):  
Farnaz Feizi ◽  
Mohammadali Mohammadi ◽  
Zahra Mobini ◽  
Chintha Tellambura

2019 ◽  
Vol 8 (4) ◽  
pp. 1090-1094 ◽  
Author(s):  
Lu Lv ◽  
Zhiguo Ding ◽  
Jian Chen ◽  
Naofal Al-Dhahir

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 196712-196726
Author(s):  
Rui Ma ◽  
Haowei Wu ◽  
Jinglan Ou ◽  
Qihao Peng ◽  
Yue Gao

Author(s):  
Wei Wu ◽  
Yujing Wang ◽  
Jianlin Mo ◽  
Jian Liu

AbstractIn this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial vehicle (UAV)-enabled cognitive radio network. Due to the channel estimation errors, we assume that the channel state information is not perfectly known. To ensure the successful eavesdropping, jamming signals are designed to disrupt the suspicious receivers and the primary receiver at the same time, which should have the good tradeoff between those two effects. We aimed to maximize the achievable eavesdropping rate under the transmitting power constraint at the legitimate monitor and the interference temperature constraint at the primary receiver, which was formulated as a non-convex problem with infinite constraints. We firstly transform the original problem into a simplified one with finite constraints. Then, an analytical solution in significant low-complexity is proposed by decomposing the simplified problem. Numerical results are finally presented to evaluate the performance of our proposed schemes in UAV-enabled wireless communication networking.


2019 ◽  
Vol E102.B (8) ◽  
pp. 1490-1502
Author(s):  
Takahiro OHTOMO ◽  
Hiroki YAMADA ◽  
Mamoru SAWAHASHI ◽  
Keisuke SAITO
Keyword(s):  

2011 ◽  
Vol E94-B (8) ◽  
pp. 2316-2327 ◽  
Author(s):  
Jong-Ho LEE ◽  
Oh-Soon SHIN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document