[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Proactive eavesdropping in UAV-aided mobile relay systems

Abstract

This paper studies a new wireless surveillance scenario, where a legitimate monitor attempts to eavesdrop on the dubious messages forwarded by an unmanned aerial vehicle (UAV)-aided suspicious relay. Specifically, we consider two relaying protocols commonly used by the UAV-aided relay, namely, amplify-and-forward (AF) and decode-and-forward (DF). For each relaying protocol, we maximize the average effective eavesdropping rate by optimizing the legitimate monitor’s jamming power allocation, subject to the average power constraint. The optimal jamming power allocation solutions are derived in closed-form for each of the two protocols, respectively. Numerical results show that the proposed proactive eavesdropping approach can noticeably improve the eavesdropping rate compared to the reference schemes.

1 Introduction

Unmanned aerial vehicles (UAVs) have been widely used in wireless communications recently (e.g., communication relay, information dissemination, and data collection) due to the controllable mobility and ever-decreasing manufacturing cost [1–6]. On one hand, the integration of UAVs into wireless communications provides new opportunities, such as the on-demand deployment and high flexibility. On the other hand, it also renders the safety problem more emergent. Thus, the secure transmission in UAV-aided communications has received significant research interest [7–10]. However, the UAVs may also be misused by malicious users to jeopardize public safety [11]. To tackle this issue, wireless surveillance, in which authorized agencies eavesdrop on the communications of suspicious users such as criminals and terrorists legitimately, has been introduced [11–19]. In the field of wireless surveillance, passive eavesdropping [12] and proactive eavesdropping [13] are two fundamental strategies. To be specific, the proactive eavesdropping via jamming method has been studied in [20] and [21] to maximize the eavesdropping rate. In [22], the authors propose a proactive eavesdropping with spoofing relay method, which further enhances the eavesdropping capability. Besides the point-to-point suspicious communications, the suspicious relay communication scenarios are investigated in [23–25], where different strategies of the legitimate monitor are proposed. Subsequently, the authors in [26, 27] consider the proactive eavesdropping over multiple suspicious communication links, and the eavesdropping energy efficiency (EEE) is maximized. Meanwhile, Han et al. [28] considers the jamming-assisted eavesdropping over parallel fading channels and proposes the optimal jamming design to maximize the the eavesdropping success probability.

Notably, the suspicious relays in aforementioned literature are all located on the ground, whereas the UAV-aided relay may be dispatched by the suspicious users to assist their communications due to terrain obstacles. Enlightened by this, we attempt to study a new surveillance scenario, where the full-duplex legitimate monitor under perfect self-interference cancelation (SIC) [20, 21] tries to overhear the suspicious information forwarded by a UAV-aided suspicious relay. Moreover, two alternative relaying protocols, i.e., AF and DF [29–32], are available for the suspicious relay. Specifically, the AF scheme has lower implementation complexity and smaller processing delay than DF, while DF scheme attains a higher suspicious rate than AF. Thus, the suspicious relay may select a superior scheme in the practical situation. In this context, the legitimate monitor carefully designs the optimal jamming strategies according to these two protocols. The main contributions of this paper are summarized as follows:

To the best of the authors’ knowledge, this paper is the first attempt in the existing literature to study the proactive eavesdropping in the UAV-aided suspicious relay system. According to the UAV-aided relay’s trajectory under both the AF and DF relaying protocols, two optimization problems are then respectively formulated to maximize the average effective eavesdropping rate by optimizing the jamming power allocation solutions. The formulated optimization problems are both non-convex and thus are difficult to be solved optimally.

We derive the optimal jamming power allocation solutions in closed-form for both the original non-convex problems, respectively. Specifically, we first verify that the two optimization problems satisfy the time-sharing property, thus guaranteeing a zero duality gap. Then the Lagrange dual method is used to attain the optimal solutions.

2 Method

This paper considers a new wireless surveillance scenario, where a legitimate monitor attempts to eavesdrop on the dubious messages forwarded by an unmanned aerial vehicle (UAV)-aided suspicious relay.

In order to maximize the average effective eavesdropping rate, two optimization problems are formulated according to the UAV-aided relay’s relaying protocols (i.e., AF and DF). Due to the fact that these two optimization problems are non-convex, they cannot be directly solved with standard convex optimization techniques. In particular, we first verify that the two optimization problems satisfy the time-sharing property, thus guaranteeing a zero duality gap. Based on this result, the Lagrange dual method is used to attain the optimal solutions. Then, numerical results are provided to verify the performance of the proposed proactive eavesdropping approach.

The rest of this paper is organized as follows. Section 3 introduces the system model and formulates two optimization problems under the AF and DF relaying protocols of the suspicious UAV-aided relay. In Section 4, we derive the optimal solutions to these two optimization problems. Section 5 shows numerical results that justify the performance of the proposed proactive eavesdropping approach. Finally, we conclude this paper in Section 6.

3 System model and problem formulation

As illustrated in Fig. 1, we consider a new legitimate surveillance system, where a full-duplex legitimate monitor E aims to eavesdrop on the malicious communications forwarded by a UAV-enabled suspicious relay with two relaying protocols. Assuming that there is no direct link from the suspicious transmitter S to the suspicious receiver D and the legitimate monitor E due to the severe blockage. The UAV-aided suspicious relay R is thus deployed to assist their communication, which operates in frequency division duplex (FDD) manner with the equal bandwidth for receiving and transmitting. Without loss of generality, S, D, and E are located at (0,0,0),(L,0,0), and (xE,yE,0) in a Cartesian coordinate system, respectively. As an initial study, the relay is supposed to follow the energy-efficient circular trajectory of radius L/2 that is centered at (L/2,0,H), and the speed v and altitude H are constant. Note that with the circular trajectory, the UAV can fly with smooth turning angles. For ease of exposition, the cycling period T, T=Ï€L/v, is then discretized into N equally spaced time slots, i.e., T=Nδt. Furthermore, the perfect channel state information (CSI) of all links are assumed to be available at E for characterizing the fundamental performance limit of proactive eavesdropping [13, 18, 22]. Particularly, since wireless channels between ground nodes and the UAV are dominated by LoS links in this paper, the legitimate monitor can perfectly obtain the channel gains of UAV-ground links by detecting the locations of corresponding nodes. In addition, it is practical that the suspicious transmitter is not aware of the existence of the legitimate monitor, and it only has knowledge of the CSI of the suspicious channelFootnote 1.

Fig. 1
figure 1

System model of proactive eavesdropping in a UAV-aided suspicious relay system

In general, the communication links from the UAV to ground users are dominated by LoS links. Thus, the channel power gain gij[n] in the nth time slot can be given by

$$ {g_{ij}}[\!n] = {\beta_{0}}d_{ij}^{- 2}[\!n],\ {\mathrm{ }}ij \in \{ SR,RD,RE\},\ n \in {\mathrm{{\mathcal{N}}}}, $$
(1)

where β0 represents the channel power at the reference distance d0=1 m, dij[ n] is the distance between ij, and \({\mathrm {{\mathcal {N}}}} = \left \{ {1, \cdots,N} \right \}\). The suspicious transmitter and relay are considered to adopt the constant transmission power pS and pR, which are subjected to the average power constraint. Under this setup, E employs a jamming power Q[ n] to interfere with D in time slot n. It is worth mentioning that the jamming signal is in the transmitting band of the relay to effectively perform proactive eavesdropping, and the reception of R will be free from the jamming in FDD mode. Additionally, adaptive rate transmission is considered at the suspicious source according to the effective channel condition at the suspicious receiver. Thus, the suspicious transmitter adaptively adjusts its transmitting rate to a level decodable by the suspicious receiver [18, 22]. Two protocols of the relay are discussed in the following subsections.

3.1 AF relaying

For AF relaying, it has lower implementation complexity and smaller processing delay [22]. The suspicious relay amplifies the received signal in the nth time slot by the factor \( \eta [n] = \sqrt {\frac {{{p_{R}}}}{{{p_{S}}{g_{SR}}[n] + {\sigma ^{2}}}}}\). Consequently, the received signal-to-interference-plus-noise ratio (SINR) at D and SNR at E are respectively given by

$$ {\gamma_{D}}(Q[\!n]) = \frac{{{\eta^{2}}[\!n]{p_{S}}{g_{RD}}[\!n]{g_{SR}}[\!n]}}{{{\eta^{2}}[\!n]{g_{RD}}[\!n]{\sigma^{2}} + Q[\!n]{{\left| {{h_{ED}}} \right|}^{2}} + {\sigma^{2}}}}, $$
(2)
$$ {\gamma_{E}}[\!n] = \frac{{{\eta^{2}}[\!n]{p_{S}}{g_{RE}}[\!n]{g_{SR}}[\!n]}}{{{\eta^{2}}[\!n]{g_{RE}}[\!n]{\sigma^{2}} + {\sigma^{2}}}}, $$
(3)

where the Rayleigh fading channel hED denotes the link from the legitimate monitor to the suspicious receiver, and σ2 is the power of the additive white Gaussian noise (AWGN). Furthermore, the indicator function I1[n], denoting the event of successful eavesdropping at the legitimate monitor, is defined. If γE[n]≥γD(Q[n]),I1[n]=1; otherwise, I1[n]=0 [13, 21]. Hence, the main objective of the legitimate monitor is to maximize the average eavesdropping rate by optimizing the jamming power allocation \(Q[n],{\mathrm { }}n \in {\mathrm {{\mathcal {N}}}}\), the problem can be formulated as (dropping the constant term 1/N in the objective function)

$$\begin{array}{*{20}l} {\mathrm{(P1)}}\mathop {\max}\limits_{\{ Q[n]\}_{n = 1}^{N}}\ \ \ & \sum\limits_{n = 1}^{N} {{I_1}[\!n]{{\log }_2}\left({1 + {\gamma _D}(Q[\!n])} \right)} \end{array} $$
(4)
$$\begin{array}{*{20}l} {\mathrm{s.t.}}\ \ \ & {\mathrm{}}Q[\!n] \ge 0,\ \ n = 1, \cdots,N, \end{array} $$
(4a)
$$\begin{array}{*{20}l} & \sum\limits_{n = 1}^{N} {Q[\!n]} \le N\bar Q, \end{array} $$
(4b)

where \(\bar Q\) is the maximum average jamming power at E.

3.2 DF relaying

In this subsection, the UAV-aided suspicious relay R operates in DF mode, and one slot processing delay at R is considered. Therefore, the maximum data rates at R, D, and E in bits/second/hertz (bps/Hz) are respectively given as

$$ {R_{R}}[\!n] = {\log_{2}}\left(1 + \frac{{p_{S}}{g_{SR}}[\!n]}{\sigma^{2}} \right),\ {\mathrm{ }}n = 1, \cdots,N - 1, $$
(5)
$$ \begin{aligned} {R_{D}}(Q[\!n]) = {\log_{2}}\left({1 + \frac{{{p_{R}}{g_{RD}}[\!n]}}{{Q[\!n]{{\left| {{h_{ED}}} \right|}^{2}} + {\sigma^{2}}}}} \right), \ n = 2, \cdots,N, \end{aligned} $$
(6)
$$ {R_{E}}[\!n] = {\log_{2}}\left({1 + \frac{{{p_{R}}{g_{RE}}[\!n]}}{{{\sigma^{2}}}}} \right), \ n = 2, \cdots,N. $$
(7)

It is observed that the suspicious transmitter should not transmit in time slot N. Referring to [23], the end-to-end suspicious rate in time slot n is given as min(RR[ n−1],RD(Q[ n])),n=2,⋯,N. Provided that RE[ n]≥ min(RR[ n−1],RD(Q[ n])), the indicator function I2[ n] is set as I2[ n]=1; otherwise, I2[ n]=0. Therefore, the main objective of the legitimate monitor E is also to maximize the average eavesdropping rate by dynamically optimizing the jamming power Q[ n],n=2,⋯,N. This optimization problem can be formulated as (dropping the constant term 1/N in the objective function)

$$\begin{array}{*{20}l} {\mathrm{(P2) }}\mathop {\max }\limits_{{\mathrm{\{ }}Q[\!n]{\mathrm{\} }}_{n = 2}^{N}}\ \ \ & {\mathrm{ }}\sum\limits_{n = 2}^{N} {{I_{2}}[\!n]\min \left({{R_{R}}[\!n - 1],{R_{D}}(Q[\!n])} \right)} \end{array} $$
(8)
$$\begin{array}{*{20}l} {\mathrm{ s}}{\mathrm{.t}}{\mathrm{. }}\ \ \ & Q[\!n] \ge 0,\ {\mathrm{ }}n = 2, \cdots,N,{\mathrm{ }} \end{array} $$
(8a)
$$\begin{array}{*{20}l} &{\mathrm{ }}\sum\limits_{n = 2}^{N} {Q[\!n]} \le {N}\bar Q, \end{array} $$
(8b)

4 Optimal solution

In this section, the optimal solutions to problems (P1) and (P2) are derived, respectively.

4.1 Optimal solution to problem (P1)

In this subsection, we will solve problem (P1) and then obtain the optimal jamming power allocation solution to maximize the average effective eavesdropping rate. To this end, we provide the following lemma, which shows that problem (P1) satisfies the time-sharing property.

Lemma 1

Denote {Qa[ n]} and {Qb[ n]} as the optimal solutions to problem (P1) under power constraints \({\bar Q^{a}}\) and \({\bar Q^{b}}\), respectively. Given any 0≤θ≤1, there always exists a feasible solution {Qc[ n]} satisfying that

$$ \setlength\abovedisplayskip{1pt} \sum\limits_{n = {\mathrm{1}}}^{N} {{S^{c}}[\!n]} \ge \theta \sum\limits_{n = {\mathrm{1}}}^{N} {{S^{a}}[\!n]} + \left({1 - \theta} \right)\sum\limits_{n = 1}^{N} {{S^{b}}[\!n]}, $$
(9)
$$ \setlength\belowdisplayskip{1pt} \sum\limits_{n = 1}^{N} {{Q^{c}}[\!n]} \le \theta N{\bar Q^{a}} + \left({1 - \theta} \right)N{\bar Q^{b}}, $$
(10)

where \({S^{k}}[\!n] = I_{1}^{k}[\!n]{\log _{2}}\left ({{\mathrm {1 + }}{\gamma _{D}}({Q^{k}}[\!n])} \right),k \in \{ a,b,c\}\), and \(\{ I_{1}^{k}[\!n]\}, \{ {\gamma _{D}}({Q^{k}}[\!n])\}\) represent the corresponding indicator function and SINR at D under jamming power {Qk[ n]}, respectively.

Proof

We follow a similar approach as in [33] to prove Lemma 1. For any n=1,⋯,N, suppose that time slot n happens over a certain amount of time. By configuring jamming power Qc[ n] to be Qa[ n] for a θ percentage of the time in slot n, and Qb[ n] for the remaining 1−θ percentage of the time in slot n, i.e., Qc[ n]=θQa[ n]+(1−θ)Qb[ n]. Then the overall Sc[ n] is the linear combination θSa[ n]+(1−θ)Sb[ n]. Based on this, we combine all N time slots, and it follows that \({\sum \nolimits }_{n = 1}^{N} {{S^{c}}[\!n]} = \theta {\sum \nolimits }_{n = 1}^{N} {{S^{a}}[\!n]} + \left ({1 - \theta } \right){\sum \nolimits }_{n = 1}^{N} {{S^{b}}[\!n]}, {\sum \nolimits }_{n = 1}^{N} {{Q^{c}}[\!n]} = \theta {\sum \nolimits }_{n = 1}^{N} {{Q^{a}}[\!n]} + \left ({1 - \theta } \right){\sum \nolimits }_{n = 1}^{N} {{Q^{b}}[\!n]} \le \theta N{\bar Q^{a}} + \left ({1 - \theta } \right)N{\bar Q^{b}}\). □

Consequently, problem (P1) satisfies the time-sharing conditions proposed in [33], and a zero duality gap holds. Thus, the Lagrange dual method is used to obtain the optimal solution.

Theorem 1

The optimal solution to (P1) is

$$ {Q^{*}}[n] = \left\{ \begin{aligned} &\hat Q[\!n],\ \ {\mathrm{ if }}\ \ \hat Q[\!n] \in \Psi,\\ &\ {\mathrm{ 0}},\ \ \ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right. $$
(11)

where \(\Psi = \left \{ {\left. {\hat Q[\!n]} \right |0 < \hat Q[\!n] < \frac {{{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{\eta ^{2}}[n]{p_{S}}{g_{RE}}[n]{g_{SR}}[n]}}{{{\eta ^{2}}[n]{g_{RE}}[n]{\sigma ^{2}} + {\sigma ^{2}}}}} \right)}}{{{\lambda ^{*}}}}{\mathrm { }}} \right \}{\mathrm { }}\), and λ∗ is the optimal dual variable. Here, \(\hat Q[\!n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right)\) derives from γE[ n]=γD(Q[ n]).

Proof

Using the Lagrange dual method, Theorem 1 can be verified. The partial Lagrangian of problem (P1) is first given by

$$ \begin{aligned} &{L_{1}}\left({\left\{ {Q[\!n]} \right\},\lambda} \right)\\ &= \sum\limits_{n = 1}^{N} {{I_{1}}[\!n]{{\log }_{2}}\left({{\mathrm{1 + }}{\gamma_{D}}(Q[\!n])} \right)} \,-\, \lambda \left({\sum\limits_{n = 1}^{N} {Q[\!n]} - N\bar Q} \right)\\ &= \sum\limits_{n = 1}^{N} {\left({{I_{1}}[\!n]{{\log }_{2}}\left({{\mathrm{1 + }}{\gamma_{D}}(Q[\!n])} \right) - \lambda Q[\!n]} \right)} + \lambda N\bar Q, \end{aligned} $$
(12)

where λ≥0 is the dual variable associated with (4b). The dual function of problem (P1) is expressed as

$$ {g_{1}}\left(\lambda \right) = \mathop {\max }\limits_{\{Q[\!n] \ge 0\}} {\mathrm{ }}{L_{1}}\left({\left\{ {Q[\!n]} \right\},\lambda} \right). $$
(13)

The dual problem of (P1), denoted as (D1), is thus defined as \(\mathop {\min }\limits _{\lambda \ge 0} {\mathrm { }}{g_{1}}\left (\lambda \right)\). To garner the optimal solution to (P1), its dual problem (D1) can be solved equivalently. Without loss of optimality, problem (13) can be converted into multiple subproblems. For any n=1,⋯,N,

$$ \mathop {\max }\limits_{Q[n] \ge 0} {\mathrm{ }}{I_{1}}[\!n]{\log_{2}}\left({{\mathrm{1 + }}{{\gamma_{D}}(Q[\!n])}} \right) - \lambda Q[\!n]. $$
(14)

â–¡

Consequently, the subproblem (14) is considered. To ensure the successful eavesdropping, we have γE[ n]≥γD(Q[ n]), namely, \(Q[\!n] \ge \hat Q[\!n]\), where \(\hat Q[\!n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right)\). Problem (14) can be solved by discussing two cases.

Case 1When\(\hat Q[\!n] \le 0\), it means thatI1[ n]=1. In this case, problem (14) becomes\(\mathop {\max }\limits _{Q[\!n] \ge 0} {\log _{2}}\left ({{\mathrm {1+}}{\gamma _{D}}(Q[\!n])} \right) - \lambda Q[\!n]\). Due to the fact that this objective function decreases withQ[ n], the optimal jamming power isQλ[ n]=0.

Case 2When\(\hat Q[\!n] > 0\), two subcases are considered to solve problem (14).

Subcase 1

\(Q[\!n] \ge \hat Q[\!n]\), which leads to I1[ n]=1. Problem (14) is thus rewritten as \(\mathop {\max }\limits _{Q[\!n]\ge \hat Q[\!n]} {\text {log}}_{2}\left ({{\mathrm {1 + }}{\gamma _{D}}(Q[\!n])} \right) - \lambda Q[\!n]\). The optimal jamming power is \(Q[\!n] = \hat Q[\!n]\), and the corresponding optimal value is \({V_{1}}[\!n] = {\text {log}_{2}}\left (1 + \frac {\eta ^{2}[\!n] p_{S} g_{RE}[\!n]{g_{SR}}[\!n]}{\eta ^{2}[\!n]g_{RE}[\!n]\sigma ^{2} + \sigma ^{2}}\right) - \frac {\lambda }{{{{\left | {h_{ED}} \right |}^{2}}}}\left (\frac {{g_{RD}}[\!n]}{g_{RE}[n]}{\sigma ^{2}} - {\sigma ^{2}} \right)\).

Subcase 2

\(Q[\!n] < \hat Q[\!n]\), namely, I1[ n]=0. Problem (14) can be re-expressed as \(\mathop {max}\limits _{0\le Q[n] < \hat Q[n]} - \lambda Q[\!n]\). The optimal jamming power is Q[ n]=0, and the optimal value is 0.

Comparing the two subcases, if V1[ n]>0, then \({Q^{\lambda } }[\!n] = \hat Q[\!n]\); otherwise, Qλ[ n]=0.

In summary, the optimal jamming power to problem (14) is given by

$$ {Q^{\lambda} }[\!n] = \left\{ \begin{aligned} &\hat Q[\!n],\ {\mathrm{ if }}\ \ \hat Q[\!n] \in \Psi,\\ &{\mathrm{ 0}},\ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right. $$
(15)

where \(\Psi = \left \{ {\left. {\hat Q[\!n]} \right |0 < \hat Q[\!n] < \frac {{{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{\eta ^{2}}[n]{p_{S}}{g_{RE}}[n]{g_{SR}}[n]}}{{{\eta ^{2}}[n]{g_{RE}}[n]{\sigma ^{2}} + {\sigma ^{2}}}}} \right)}}{{{\lambda }}}{\mathrm { }}} \right \}{\mathrm { }}\).

Subsequently, the optimal dual variable λ∗ is obtained by solving problem (D1). It can be seen that the subgradient of g1(λ) is \({s_{1}}(\lambda) = N\bar Q - {\sum \nolimits }_{n = 1}^{N} {Q^{\lambda } }[\!n]\), the binary search is then employed to attain λ∗. The proof of Theorem 1 is thus completed.

It can be observed that if the channel quality of E is superior to that of D in time slot n, which corresponds to \(\hat Q[\!n] \le 0\), passive eavesdropping at E is optimal. In addition, due to the average power constraint, the legitimate monitor E interferes with the suspicious receiver D only when the jamming power meets the condition, i.e., \(\hat Q[\!n] \in \Psi \).

4.2 Optimal solution to dual problem of (P2)

In this subsection, we turn our attention to problem (P2). Analogously, we can also prove that problem (P2) has the time-sharing property, and the detail is omitted for brevity.

Lemma 2

The time-sharing condition holds for problem (P2).

Next, we attain the optimal solution to problem (P2) via solving its dual problem.

Theorem 2

The optimal solution to (P2) is

$$ {Q^{*}[\!n] = \left\{ \begin{aligned} &\begin{aligned}\tilde Q[\!n],\ {\mathrm{ if }}\ {R_{E}}[\!n] < \min \left({{R_{R}}[\!n - 1],{R_{D}}[\!n]} \right) \ {\mathrm{ and }}\ \ \tilde Q[\!n] \in \Omega {\mathrm{ }} \end{aligned},\\ &\ {\mathrm{ 0}},\ \ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right.} $$
(16)

where \(\Omega = \left \{ {\tilde Q[\!n]\left | {{\mathrm {0}} < \tilde Q[\!n] < \frac {{\mathrm {1}}}{{{\lambda ^{*}}}}{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{p_{R}}{g_{RE}}[n]}}{{{\sigma ^{2}}}}} \right){\mathrm { }}} \right.} \right \}{\mathrm { }}\), λ∗ is the optimal dual variable, and \(\tilde Q[\!n] = \frac {{{\sigma ^{2}}}}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}} - 1} \right)\). Here, RD[ n]=log2(1+pRgRD[n]/σ2).

Proof

Analogous to the proof of Theorem 1, the Lagrange dual method is utilized, and a set of subproblems are considered. For any n=2,⋯,N,

$$ \mathop {\max }\limits_{Q[n] \ge 0} {\mathrm{ }}{I_{2}}[\!n]\min \left({{R_{R}}[n - 1],{R_{D}}(Q[\!n])} \right) - \lambda Q[\!n]. $$
(17)

â–¡

Problem (17) can be solved by discussing two cases.

Case 1

When RE[n]≥ min(RR[n−1],RD[n]), the legitimate monitor can overhear the suspicious message with passive eavesdropping, and I2[n]=1. Thus, the optimal jamming power is Qλ[n]=0.

Case 2

On the other hand, when RE[n]< min(RR[n−1],RD[n]), it indicates that the jamming power \(\tilde Q[n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right) > 0\) for the successful eavesdropping, where \(\tilde Q[n]\) derives from RD(Q[n])=RE[n]. Here, \(Q[n] < \tilde Q[n]\) and \(Q[n] \ge \tilde Q[n]\) are respectively considered. Similar to the proof of Theorem 1, the process is omitted for brevity.

Combining the two cases, the optimal solution to the dual problem of (P2) is given as (16) after obtaining the optimal dual variable. Theorem 2 thus follows.

Theorem 2 shows that the jamming strategy depends on the channel qualities from S to R as well as that from R to D and E. Provided that RE[n]≥ min(RR[n−1],RD[n]), no jamming performed at E in time slot n is optimal, and the effective eavesdropping rate is min(RR[n−1],RD[n]). On the other hand, subject to the average power constraint, E only implements the jamming according to the above condition. In this case, the jamming degrades the suspicious rate RD[n] to RE[n], and the effective eavesdropping rate is thus RE[n].

Furthermore, subject to both the average and peak power constraints at E, i.e., 0≤Q[n]≤Qpeak, n=1,⋯,N and \({\sum \nolimits }_{n = 1}^{N} {Q[n]} \le N\bar Q\) for AF relaying; 0≤Q[n]≤Qpeak, n=2,⋯,N and \({\sum \nolimits }_{n = 2}^{N} {Q[n]} \le N\bar Q\) for DF relaying, the new optimization problems are formulated. Analogously, by using the Lagrange dual method, the optimal solutions to dual problems can be obtained, which serve as the upper bounds of the new optimization problems.

However, when the peak power is sufficiently large, it can be proved that the upper bounds are tight. Specifically, denote {Qa[n]} and {Qb[n]} as the optimal solutions to problem (P1) under power constraints \(Q_{peak}^{a}, {\bar Q^{a}}\), and \(Q_{peak}^{b}, s{\bar Q^{b}}\), respectively. When the peak power is sufficiently large, it follows that 0≤Qc[n]≤θQpeaka+(1−θ)Qpeakb. Similar to Lemma 1, the time-sharing conditions also hold in this case, thus guaranteeing the strong duality.

5 Numerical results and discussions

In this section, numerical simulations are presented to evaluate the performance of our proposed jamming strategy. Similar to [34], in our simulations, the parameters are set as in Table 1.

Table 1 Simulation parameters

Figures 2 and 3 investigate the impact of the average jamming power on the average achievable eavesdropping rate for the suspicious relay’s two protocols, respectively. Two reference schemes are used for comparison, i.e., (1) passive eavesdropping and (2) proactive eavesdropping with constant jamming power \(\bar Q\). Here, the transmission power at suspicious nodes is set as pS=pR=15 dBm, and the position of E is (xE,yE,0)=(1500,1000,0) m. As expected, the proposed proactive eavesdropping approach outperforms the other two reference schemes under two protocols, and the average eavesdropping rate begins to plateau with the sufficiently large jamming power. It is observed that the performance of scheme 2 deteriorates. The reason is that the constant jamming power \(\bar Q\) exceeds the optimal jamming power, which meanwhile degrades the effective eavesdropping rate despite the successful eavesdropping.

Fig. 2
figure 2

Eavesdropping rate versus average jamming power \(\bar Q\) for AF relaying

Fig. 3
figure 3

Eavesdropping rate versus average jamming power \(\bar Q\) for DF relaying

Figures 4 and 5 show the maximum achievable eavesdropping rate versus the position of E in the form of a contour map. Intuitively, the higher eavesdropping rate is obtained around D owing to the similar channel condition between D and E, thus needing a smaller jamming power for the successful eavesdropping for AF relaying. For DF relaying, it is observed that in the middle region of the contour map, E obtains the maximum average eavesdropping rate. This is attributed to the fact E enjoys a relatively good channel conditions under a sufficiently small time slot δt. Furthermore, the achievable average eavesdropping rate declines with the increasing distance between E and the center. This is because the ever-increasing jamming power to guarantee the successful eavesdropping meanwhile degrades the effective eavesdropping rate.

Fig. 4
figure 4

The maximum achievable eavesdropping rate versus the position of E for AF relaying

Fig. 5
figure 5

The maximum achievable eavesdropping rate versus the position of E for DF relaying

6 Conclusion

This paper studied the wireless surveillance in a malicious UAV-enabled relay system, where both AF and DF relaying protocols were considered for the suspicious relay. In this context, we maximized the average effective eavesdropping rate by optimizing the legitimate monitor’s jamming power allocation. The optimal jamming power allocation solutions were then presented in closed-form for each of the two protocols, respectively. Numerical results showed the significant benefits were achieved by applying the approach of proactive eavesdropping compared to the reference schemes.

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Notes

  1. Therefore, the suspicious users do not employ the anti-eavesdropping methods (e.g., physical layer security).

Abbreviations

AF:

Amplify-and-forward

AWGN:

Additive white Gaussian noise

CSI:

Channel state information

DF:

Decode-and-forward

EEE:

Eavesdropping energy efficiency

FDD:

Frequency division duplex

LoS:

Line-of-sight

SIC:

Self-interference cancelation

SINR:

Signal-to-interference-plus-noise ratio

SNR:

Signal-to-noise ratio

UAV:

Unmanned aerial vehicle

References

  1. Y. Zeng, R. Zhang, T. J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun. Mag.54(5), 36–42 (2016).

    Article  Google Scholar 

  2. Y. Zeng, J. Xu, R. Zhang, Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans. Wirel. Commun.18(4), 2329–2345 (2019).

    Article  Google Scholar 

  3. J. Xu, Y. Zeng, R. Zhang, UAV-enabled wireless power transfer: trajectory design and energy optimization. IEEE Trans. Wirel. Commun.17(8), 5092–5106 (2018).

    Article  Google Scholar 

  4. Y. Zeng, X. Xu, R. Zhang, Trajectory design for completion time minimization in UAV-enabled multicasting. IEEE Trans. Wirel. Commun.17(4), 2233–2246 (2018).

    Article  Google Scholar 

  5. H. Dai, H. Zhang, M. Hua, C. Li, Y. Huang, B. Wang, How to deploy multiple UAVs for providing communication service in an unknown region?. IEEE Wirel. Commun. Lett.8(4), 1276–1279 (2019).

    Article  Google Scholar 

  6. H. Dai, H. Zhang, B. Wang, L. Yang, The multi-objective deployment optimization of UAV-mounted cache-enabled base stations. Physical Commun.34:, 114–120 (2019).

    Article  Google Scholar 

  7. N. Zhao, F. Cheng, F. R. Yu, J. Tang, Y. Chen, G. Gui, H. Sari, Caching UAV assisted secure transmission in hyper-dense networks based on interference alignment. IEEE Trans. Commun.66(5), 2281–2294 (2018).

    Article  Google Scholar 

  8. G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun.18(2), 1376–1389 (2019).

    Article  Google Scholar 

  9. M. Hua, Y. Wang, Q. Wu, H. Dai, Y. Huang, L. Yang, Robust trajectory and transmit power design for secure UAV communications. IEEE Trans. Veh. Technol.68(8), 7761–7775 (2019).

    Article  Google Scholar 

  10. M. Cui, G. Zhang, Q. Wu, D. W. K. Ng, Energy-efficient cooperative secure transmission in multi-UAV-enabled wireless networks. IEEE Trans. Veh. Technol.67(9), 9042–9046 (2018).

    Article  Google Scholar 

  11. H. Lu, H. Zhang, H. Dai, W. Wu, B. Wang, Proactive eavesdropping in UAV-Aided suspicious communication systems. IEEE Trans. Veh. Technol.68(2), 1993–1997 (2019).

    Article  Google Scholar 

  12. J. Xu, L. Duan, R. Zhang, Surveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm. IEEE Wirel. Commun.24(4), 152–159 (2017).

    Article  Google Scholar 

  13. C. Zhong, X. Jiang, F. Qu, Z. Zhang, Multi-antenna wireless legitimate surveillance systems: design and performance analysis. IEEE Trans. Wirel. Commun.16(7), 4585–4599 (2017).

    Article  Google Scholar 

  14. P. Li, H. Zhang, W. Wu, H. Dai, B. Wang, in 2018 IEEE Global Communications Conference (GLOBECOM). Proactive eavesdropping via jamming in cognitive radio networks (IEEE, 2018). https://doi.org/10.1109/glocom.2018.8647517.

  15. H. Zhang, L. Duan, R. Zhang, in ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Proactive eavesdropping of two suspicious communication links via jamming (IEEE, 2019). https://doi.org/10.1109/icc.2019.8761976.

  16. J. Moon, S. Lee, H. Lee, I. Lee, Proactive eavesdropping with jamming and eavesdropping mode selection. IEEE Trans. Wirel. Commun.18(7), 3726–3738 (2019).

    Article  Google Scholar 

  17. J. Moon, H. Lee, C. Song, S. Kang, I. Lee, Relay-assisted proactive eavesdropping with cooperative jamming and spoofing. IEEE Trans. Wirel. Commun.17(10), 6958–6971 (2018).

    Article  Google Scholar 

  18. J. Moon, H. Lee, C. Song, S. Lee, I. Lee, Proactive eavesdropping with full-duplex relay and cooperative jamming. IEEE Trans. Wirel. Commun.17(10), 6707–6719 (2018).

    Article  Google Scholar 

  19. S. Huang, Q. Zhang, Q. Li, J. Qin, Robust proactive monitoring via jamming with deterministically bounded channel errors. IEEE Sig. Process. Lett.25(5), 690–694 (2018).

    Article  Google Scholar 

  20. J. Xu, L. Duan, R. Zhang, Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels. IEEE Wirel. Commun. Lett.5(1), 80–83 (2016).

    Article  Google Scholar 

  21. J. Xu, L. Duan, R. Zhang, Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans. Wirel. Commun.16(5), 2790–2806 (2017).

    Article  Google Scholar 

  22. Zeng Y., R. Zhang, Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J. Sel. Topics Sig. Process.10(8), 1449–1461 (2016).

    Article  Google Scholar 

  23. G. Ma, J. Xu, L. Duan, R. Zhang, in 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Wireless surveillance of two-hop communications (IEEE, 2017). https://doi.org/10.1109/spawc.2017.8227700.

  24. X. Jiang, H. Lin, C. Zhong, X. Chen, Z. Zhang, Proactive eavesdropping in relaying systems. IEEE Sig. Process. Lett.24(6), 917–921 (2017).

    Article  Google Scholar 

  25. D. Hu, Q. Zhang, P. Yang, J. Qin, Proactive monitoring via jamming in amplify-and-forward relay networks. IEEE Sig. Process. Lett.24(11), 1714–1718 (2017).

    Article  Google Scholar 

  26. B. Li, Y. Yao, H. Zhang, Y. Lv, Energy efficiency of proactive cooperative eavesdropping over multiple suspicious communication links. IEEE Trans. Veh. Technol.68(1), 420–430 (2019).

    Article  Google Scholar 

  27. B. Li, Y. Yao, H. Zhang, Y. Lv, W. Zhao, Energy efficiency of proactive eavesdropping for multiple links wireless system. IEEE Access. 6:, 26081–26090 (2018).

    Article  Google Scholar 

  28. Y. Han, L. Duan, R. Zhang, Jamming-assisted eavesdropping over parallel fading channels. IEEE Trans. Inf. Forensic. Secur.14(9), 2486–2499 (2019).

    Article  Google Scholar 

  29. C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Multiuser overhearing for cooperative two-way multiantenna relays. IEEE Trans. Veh. Technol.65(5), 3796–3802 (2016).

    Article  Google Scholar 

  30. C. Li, S. Zhang, P. Liu, F. Sun, J. M. Cioffi, L. Yang, Overhearing protocol design exploiting inter-cell interference in cooperative green networks. IEEE Trans. Veh. Technol.65(1), 441–446 (2016).

    Article  Google Scholar 

  31. C. Li, P. Liu, C. Zou, F. Sun, J. M. Cioffi, L. Yang, Spectral-efficient cellular communications with coexistent one- and two-hop transmissions. IEEE Trans. Veh. Technol.65(8), 6765–6772 (2016).

    Article  Google Scholar 

  32. C. Li, F. Sun, J. M. Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circuits Syst. II, Exp. Briefs. 61(7), 531–535 (2014).

    Article  Google Scholar 

  33. W. Yu, R. Lui, Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun.54(7), 1310–1322 (2006).

    Article  Google Scholar 

  34. Y. Zeng, R. Zhang, T. J. Lim, Throughput maximization for UAV-enabled mobile relaying systems. IEEE Trans. Commun.64(12), 4983–4996 (2016).

    Article  Google Scholar 

Download references

Acknowledgements

Not applicable

Funding

This paper was supported in part by the National Natural Science Foundation of China under Grants 61971238 and 61372126, the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under 18KJB510026, and the Foundation of Nanjing University of Posts and Telecommunications under NY218124.

Author information

Authors and Affiliations

Authors

Contributions

HL is the main author of the current paper. HL contributed to the development of the ideas, design of the study, theory, result analysis, and article writing. HD contributed to the development of the ideas, design of the study, the theory and article writing. HL and PS conceived and designed the experiments. HL and PL performed the experiments. BW undertook revision works of the paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Haiquan Lu.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, H., Dai, H., Sun, P. et al. Proactive eavesdropping in UAV-aided mobile relay systems. J Wireless Com Network 2020, 48 (2020). https://doi.org/10.1186/s13638-020-1650-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-020-1650-7

Keywords