Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System

In this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenari...

Full description

Bibliographic Details
Main Authors: Shen Yi, Pan Zhiwen, Liu Nan, You Xiaohu
Format: Article
Language:English
Published: MDPI AG 2020-02-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/3/407
id doaj-c7d0d7c27f4140a9a9cb7173d31874f4
record_format Article
spelling doaj-c7d0d7c27f4140a9a9cb7173d31874f42020-11-25T01:40:49ZengMDPI AGElectronics2079-92922020-02-019340710.3390/electronics9030407electronics9030407Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance SystemShen Yi0Pan Zhiwen1Liu Nan2You Xiaohu3School of Cyber Science and Engineering, Southeast University, Jiangsu 210096, ChinaSchool of Cyber Science and Engineering, Southeast University, Jiangsu 210096, ChinaNational Mobile Communications Research Laboratory, Southeast University, Jiangsu 210096, ChinaNational Mobile Communications Research Laboratory, Southeast University, Jiangsu 210096, ChinaIn this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenarios for the UAV, single-input single-output (SISO) and multiple-input multiple-output (MIMO), are studied. Three low-complexity linear beamforming schemes, transmit zero-forcing (TZF)/maximum ratio combing (MRC), maximum ratio transmission (MRT)/receive zero-forcing (RZF), and maximum ratio transmission (MRT)/maximum ratio combing (MRC) are considered for MIMO UAV. The surveilling non-outage probability is derived and analyzed, and optimal jamming power is obtained. Simulation and numerical results are used to validate the derivation.https://www.mdpi.com/2079-9292/9/3/407proactive surveillinguav legitimate surveillancefull-duplex
collection DOAJ
language English
format Article
sources DOAJ
author Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
spellingShingle Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
Electronics
proactive surveilling
uav legitimate surveillance
full-duplex
author_facet Shen Yi
Pan Zhiwen
Liu Nan
You Xiaohu
author_sort Shen Yi
title Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
title_short Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
title_full Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
title_fullStr Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
title_full_unstemmed Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
title_sort joint design and performance analysis of a full-duplex uav legitimate surveillance system
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2020-02-01
description In this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenarios for the UAV, single-input single-output (SISO) and multiple-input multiple-output (MIMO), are studied. Three low-complexity linear beamforming schemes, transmit zero-forcing (TZF)/maximum ratio combing (MRC), maximum ratio transmission (MRT)/receive zero-forcing (RZF), and maximum ratio transmission (MRT)/maximum ratio combing (MRC) are considered for MIMO UAV. The surveilling non-outage probability is derived and analyzed, and optimal jamming power is obtained. Simulation and numerical results are used to validate the derivation.
topic proactive surveilling
uav legitimate surveillance
full-duplex
url https://www.mdpi.com/2079-9292/9/3/407
work_keys_str_mv AT shenyi jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem
AT panzhiwen jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem
AT liunan jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem
AT youxiaohu jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem
_version_ 1725043357178134528