Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System
In this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenari...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-02-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/3/407 |
id |
doaj-c7d0d7c27f4140a9a9cb7173d31874f4 |
---|---|
record_format |
Article |
spelling |
doaj-c7d0d7c27f4140a9a9cb7173d31874f42020-11-25T01:40:49ZengMDPI AGElectronics2079-92922020-02-019340710.3390/electronics9030407electronics9030407Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance SystemShen Yi0Pan Zhiwen1Liu Nan2You Xiaohu3School of Cyber Science and Engineering, Southeast University, Jiangsu 210096, ChinaSchool of Cyber Science and Engineering, Southeast University, Jiangsu 210096, ChinaNational Mobile Communications Research Laboratory, Southeast University, Jiangsu 210096, ChinaNational Mobile Communications Research Laboratory, Southeast University, Jiangsu 210096, ChinaIn this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenarios for the UAV, single-input single-output (SISO) and multiple-input multiple-output (MIMO), are studied. Three low-complexity linear beamforming schemes, transmit zero-forcing (TZF)/maximum ratio combing (MRC), maximum ratio transmission (MRT)/receive zero-forcing (RZF), and maximum ratio transmission (MRT)/maximum ratio combing (MRC) are considered for MIMO UAV. The surveilling non-outage probability is derived and analyzed, and optimal jamming power is obtained. Simulation and numerical results are used to validate the derivation.https://www.mdpi.com/2079-9292/9/3/407proactive surveillinguav legitimate surveillancefull-duplex |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shen Yi Pan Zhiwen Liu Nan You Xiaohu |
spellingShingle |
Shen Yi Pan Zhiwen Liu Nan You Xiaohu Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System Electronics proactive surveilling uav legitimate surveillance full-duplex |
author_facet |
Shen Yi Pan Zhiwen Liu Nan You Xiaohu |
author_sort |
Shen Yi |
title |
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System |
title_short |
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System |
title_full |
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System |
title_fullStr |
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System |
title_full_unstemmed |
Joint Design and Performance Analysis of a Full-Duplex UAV Legitimate Surveillance System |
title_sort |
joint design and performance analysis of a full-duplex uav legitimate surveillance system |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2020-02-01 |
description |
In this paper, we propose a legitimate surveillance system, where a full-duplex unmanned aerial vehicle (UAV) legitimate monitor with simultaneous passive surveilling and active jamming is deployed to monitor a suspicious communication link between a dubious pair on the ground. Two different scenarios for the UAV, single-input single-output (SISO) and multiple-input multiple-output (MIMO), are studied. Three low-complexity linear beamforming schemes, transmit zero-forcing (TZF)/maximum ratio combing (MRC), maximum ratio transmission (MRT)/receive zero-forcing (RZF), and maximum ratio transmission (MRT)/maximum ratio combing (MRC) are considered for MIMO UAV. The surveilling non-outage probability is derived and analyzed, and optimal jamming power is obtained. Simulation and numerical results are used to validate the derivation. |
topic |
proactive surveilling uav legitimate surveillance full-duplex |
url |
https://www.mdpi.com/2079-9292/9/3/407 |
work_keys_str_mv |
AT shenyi jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem AT panzhiwen jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem AT liunan jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem AT youxiaohu jointdesignandperformanceanalysisofafullduplexuavlegitimatesurveillancesystem |
_version_ |
1725043357178134528 |