Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology

被引:0
|
作者
Yi Shen [1 ]
Zhiwen Pan [2 ,3 ]
Nan Liu [2 ]
Xiaohu You [2 ,3 ]
机构
[1] School of Cyber Science and Engineering, Southeast University
[2] National Mobile Communications Research Laboratory, Southeast University
[3] Purple Mountain
关键词
D O I
暂无
中图分类号
V279 [无人驾驶飞机]; TN929.5 [移动通信];
学科分类号
1111 ;
摘要
We propose a legal Unmanned Aerial Vehicle(UAV) surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source, where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring. Three schemes are considered for a Multiple-Input Multiple-Output(MIMO) UAV: surveilling followed by jamming; jamming followed by surveilling; and twostage surveilling. For each scheme, a closed-form expression of surveilling non-outage probability is derived,and surveilling performance under different system configurations is analyzed. Monte Carlo(MC) simulation validates derivation correctness.
引用
收藏
页码:853 / 863
页数:11
相关论文
共 50 条
  • [21] Aerial Surveillance System using UAV
    Zaheer, Zainab
    Usmani, Atiya
    Khan, Ekram
    Qadeer, Mohammed A.
    2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2016,
  • [22] A UAV vision system for airborne surveillance
    Kontitsis, M
    Valavanis, KP
    Tsourveloudis, N
    2004 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, VOLS 1- 5, PROCEEDINGS, 2004, : 77 - 83
  • [23] Legitimate Surveillance via Jamming in Multichannel Relaying System
    Hu, Guojie
    Cai, Yueming
    Zhang, Yu
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 1879 - 1883
  • [24] Towards suspicious behavior discovery in video surveillance system
    Li Yingjie
    Yin Yixin
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 539 - 541
  • [25] Beamformer Design and Performance Analysis of Multi-antenna Wireless Legitimate Surveillance Systems
    Jiang, Xin
    Yang, Sheng
    Zhong, Caijun
    Qu, Fengzhong
    Chen, Xiaoming
    Zhang, Zhaoyang
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [26] UAV-Assisted Maritime Legitimate Surveillance: Joint Trajectory Design and Power Allocation
    Wu, Lei
    Wang, Wei
    Ji, Zengshuan
    Yang, Yongjie
    Cumanan, Kanapathippillai
    Chen, Gaojie
    Ding, Zhiguo
    Dobre, Octavia A.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (10) : 13701 - 13705
  • [27] Performance Analysis of Airplane Health Surveillance System
    Rachana, N. B.
    Seema, S.
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 155 - 163
  • [28] A Covert Surveillance Strategy for a Solar-Powered UAV over Suspicious Mobile Target
    Zhang, Jian
    2022 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2022), 2022, : 8 - 12
  • [29] Surveillance System for Detection of Suspicious Human Activities at War Field
    Dhulekar, P. A.
    Gandhe, S. T.
    NachiketSawale
    Shinde, Vikas
    Khute, Sunil
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 357 - 360
  • [30] Security Performance Analysis of Full-Duplex UAV Assisted Relay System Based on SWIPT Technology
    Yang, Shenmenglu
    Ma, Hongyu
    APPLIED SCIENCES-BASEL, 2024, 14 (12):