[1]周洁,王培臣,张孟杰,等.轨迹和干扰功率联合优化的无人机主动窃听算法[J].华侨大学学报(自然科学版),2022,43(2):237-244.[doi:10.11830/ISSN.1000-5013.202012027]
 ZHOU Jie,WANG Peichen,ZHANG Mengjie,et al.Unmanned Aerial Vehicle Proactive Eavesdropping Algorithm Using Joint Optimization of Trajectory and Jamming Power[J].Journal of Huaqiao University(Natural Science),2022,43(2):237-244.[doi:10.11830/ISSN.1000-5013.202012027]
点击复制

轨迹和干扰功率联合优化的无人机主动窃听算法()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第43卷
期数:
2022年第2期
页码:
237-244
栏目:
出版日期:
2022-03-08

文章信息/Info

Title:
Unmanned Aerial Vehicle Proactive Eavesdropping Algorithm Using Joint Optimization of Trajectory and Jamming Power
文章编号:
1000-5013(2022)02-0237-08
作者:
周洁 王培臣 张孟杰 赵睿
华侨大学 信息科学与工程学院, 福建 厦门 361021
Author(s):
ZHOU Jie WANG Peichen ZHANG Mengjie ZHAO Rui
College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China
关键词:
无人机 合法窃听器 无线通信 凸优化
Keywords:
unmanned aerial vehicle legitimate eavesdropper wireless communications convex optimization
分类号:
TN918.91
DOI:
10.11830/ISSN.1000-5013.202012027
文献标志码:
A
摘要:
研究一种无人机(UAV)作为合法窃听器的无线通信窃听算法.首先,将一个合法窃听器(UAV(E))用于窃听可疑发射器(UAV(B))发送到地面可疑接收器的可疑信息.然后,利用可疑系统的特点,提出一种有效的主动干扰方案,从而最大限度地提高有效窃听速率;针对构造的原问题是一个优化变量耦合的混合非凸优化问题,应用更新速率辅助的块坐标下降和连续凸优化技术,在每次迭代中交替优化无人机轨迹和干扰功率.最后,针对非凸的无人机轨迹优化和干扰功率优化问题,分别利用连续凸优化算法将原非凸问题转化为近似的次优化问题,再使用凸优化方法进行求解.仿真结果表明:相较于其他基准算法,文中算法具有更高的有效窃听速率.
Abstract:
Research a wireless communication eavesdropping algorithm of unmanned aerial vehicle(UAV)as a legitimate eavesdropper. Firstly, a legitimate eavesdropper(UAV(E))attempts to eavesdrop the suspicious messages sent from the suspicious transmitter(UAV(B))to the suspicious receiver on the ground. Secondly, using the characteristics of the suspicious system, an effective proactive jamming scheme is proposed to maximize increase the effective eavesdropping rate. For the constructive original problem is a hybrid non-convex optimization problem with optimized variable coupling, the update rate-assisted block coordinate descent and successive convex optimization technology are applied to alternately optimize the UAV trajectory and jamming power in each iteration. Finally, for the problem of non-convex UAV trajectory optimization and jamming power optimization, the successive convex approximation algorithm is used to transform the original non-convex problem into an approximate sub-optimization problem, furthermore, use the convex optimization method to get the solution. The simulation results show that the proposed algorithm has a higher effective eavesdropping rate than other benchmark algorithms.

参考文献/References:

[1] ZENG Yong,ZHANG Rui.Cellular-connected UAV: Potential, challenges, and promising technologies[J].IEEE Wireless Communications,2019,26(1):120-127.DOI:10.1109/MWC.2018.1800023.
[2] ZENG Yong,ZHANG Rui.Throughput maximization for UAV-enabled mobile relaying systems[J].IEEE Transactions on Communications,2016,64(12):4983-4996.DOI:10.1109/TCOMM.2016.2611512.
[3] ZHANG Shuhang,ZHANG Hongliang,DI Boya.Joint trajectory and power optimization for UAV sensing over cellular networks[J].IEEE Communications Letters,2018,22(11):2382-2385.DOI:10.1109/LCOMM.2018.286 8075.
[4] FAN Wenlu,WU Yang,JU Shaohua,et al.Secure UAV communication with robust communication and trajectory design[C]//International Conference on Computer, Information and Telecommunication Systems(CITS).Beijing:IEEE Press,2019:28-31.DOI:10.1109/CITS.2019.8862090.
[5] LI Kai,KANHERE S S,NI Wei,et al.Proactive eavesdropping via lamming for trajectory tracking of UAVs[C]//15th International Wireless Communications & Mobile Computing Conference(IWCMC).Tangier:IEEE Pres-s,2019:24-28.DOI:10.1109/IWCMC.2019.8766696.
[6] ZHANG Mingzhu,YI Hongju,CHEN Yu,et al.Proactive eavesdropping via jamming for power-limited UAV communications[C]//IEEE International Conference on Communications Workshops(ICC Workshops).Shanghai:IEEE Press,2019:20-24.
[7] LU Haiquan,ZHANG Haiyang,DAI Haibo.Proactive eavesdropping in UAV-aided suspicious communication systems[J].IEEE Transactions on Vehicular Technology,2019,68(2):1993-1997.DOI:10.1109/TVT.2018.2889397.
[8] BOYD S L.Vandenberghe, convex optimization[M].Cambridge: Cambridge University Press,2004.
[9] ZHOU Xiaobo,WU Qingqing.UAV-enabled secure communications: Joint trajectory and transmit power optimization[J].IEEE Transactions on Vehicular Technology,2019,68(4):4069-4073.DOI:10.1109/TVT.2019.2900157.
[10] ZHANG Guangchi,WU Qingqing,CUI Miao.Securing UAV communications via joint trajectory and power control[J].IEEE Transactions on Wireless Communications,2019,18(2):1376-1389.DOI:10.1109/TWC.2019.2892 461.
[11] NNAMANI C O,KHANDAKER M R A,SELLATHURAI M.UAV-aided jamming for secure ground communication with unknown eavesdropper location[J].IEEE Access,2020,8:72881-72892.DOI:10.1109/ACCESS.2020.2986025.
[12] 潘雨龙.全双工无线通信系统中的自干扰消除方法研究[D].北京:北京邮电大学,2016.
[13] WU Qingqing,ZENG Yong,ZHANG Rui.Joint trajectory and communication design for multi-UAV enabled wireless networks[J].IEEE Transactions on Wireless Communications,2018,17(3):2109-2121.DOI:10.1109/TWC.2017.2789293.
[14] CUI Miao,ZHANG Guangchi,WU Qingqing.Robust trajectory and transmit power design for secure UAV communications[J].IEEE Transactions on Vehicular Technology,2018,67(9):9042-9046.DOI:10.1109/TVT.2018.2849644.
[15] MIAO Jiansong,ZHENG Ziyuan.Cooperative jamming for secure UAV-enabled mobile relay system[J].IEEE Access,2020,8:48943-48957.DOI:10.1109/ACCESS.2020.2980242.

相似文献/References:

[1]陶英杰,张维纬,马昕,等.面向无人机视频分析的车辆目标检测方法[J].华侨大学学报(自然科学版),2022,43(1):111.[doi:10.11830/ISSN.1000-5013.202011014]
 TAO Yingjie,ZHANG Weiwei,MA Xin,et al.Vehicle Target Detection Method for Unmanned Aerial Vehicle Video Analysis[J].Journal of Huaqiao University(Natural Science),2022,43(2):111.[doi:10.11830/ISSN.1000-5013.202011014]

备注/Memo

备注/Memo:
收稿日期: 2020-12-14
通信作者: 赵睿(1980-),教授,博士,主要从事无线通信信号处理、人工智能无线通信、物联网安全、5G/6G物理层通信关键技术的研究.E-mail:rzhao@hqu.edu.cn.
基金项目: 国家自然科学基金资助项目(61401165); 福建省自然科学基金资助项目(2019J01055); 华侨大学研究生科研创新基金资助项目(18014082041)http://www.hdxb.hqu.edu.cn
更新日期/Last Update: 2022-03-20