2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2017
DOI: 10.1109/iwcmc.2017.7986320
|View full text |Cite
|
Sign up to set email alerts
|

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

Abstract: We consider a wireless information surveillance in UAV network, where a legitimate unmanned aerial vehicle (UAV) proactively eavesdrops communication between two suspiciousUAVs. However, challenges arise due to lossy airborne channels and limited power of the UAV. In this paper, we study an emerging legitimate eavesdropping paradigm that the legitimateUAV improves the eavesdropping performance via jamming the suspicious communication. Moreover, a power efficient legitimate eavesdropping scheme, PELE, is propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…However, only a few research works consider this scenario. To the best of our knowledge, only [16] and [17] discussed the PLS transmission with UAV wiretappers.…”
Section: A Motivationmentioning
confidence: 99%
“…However, only a few research works consider this scenario. To the best of our knowledge, only [16] and [17] discussed the PLS transmission with UAV wiretappers.…”
Section: A Motivationmentioning
confidence: 99%
“…where P z i (t) is the transmit power of device i, and σ 2 0 is noise power at the UAV. In particular, for illustration convenience, we consider a special case of the Nakagami-m model in this paper where m = 1 [35,36,37]. Note that the proposed deep reinforcement learning approach is generic, and can work with other Nakagami fading channel model with any m values.…”
Section: System Modelmentioning
confidence: 99%
“…We have previously discussed the first approach to eavesdrop suspicious communication link by jamming UAV SR , as shown in Figure 2a [13], so this paper mainly focuses on the other three eavesdropping and jamming cases, as shown in Figure 2b–d. In practice, UAV’s trajectory period depends on the battery charge.…”
Section: Introductionmentioning
confidence: 99%