 Research
 Open access
 Published:
Robust proactive eavesdropping in UAVenabled wireless communication networking
EURASIP Journal on Wireless Communications and Networking volume 2019, Article number: 285 (2019)
Abstract
In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a fullduplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial vehicle (UAV)enabled cognitive radio network. Due to the channel estimation errors, we assume that the channel state information is not perfectly known. To ensure the successful eavesdropping, jamming signals are designed to disrupt the suspicious receivers and the primary receiver at the same time, which should have the good tradeoff between those two effects. We aimed to maximize the achievable eavesdropping rate under the transmitting power constraint at the legitimate monitor and the interference temperature constraint at the primary receiver, which was formulated as a nonconvex problem with infinite constraints. We firstly transform the original problem into a simplified one with finite constraints. Then, an analytical solution in significant lowcomplexity is proposed by decomposing the simplified problem. Numerical results are finally presented to evaluate the performance of our proposed schemes in UAVenabled wireless communication networking.
1 Introduction
Unmanned aerial vehicles (UAVs) have attracted a large amount of attention over recent years[1–3]. Their applications, such as surveillance, aerospace imaging, and cargo transportation, are widely studied. Extensive researches are also devoted to the use of drones as different types of wireless communication platforms, such as aeronautical mobile base stations (BS) [4, 5], mobile relays [6], and flight cloud computing [7, 8].
In a UAVassisted network, UAVs are deployed to provide wireless connectivity to ground users[9]. In practice, UAVs can move freely in threedimensional space for better performance. Due to UAVs’ high mobility, the deployment of droneassisted communication systems is more flexible, which makes them particularly suitable for ondemand applications or accidents. Furthermore, the UAVground link is more likely to have a lineofsight (LoS) channel than the groundtoground link in the terrestrial system; thus, it can provide a higher link capacity. In addition, UAVassisted communication provides additional design freedom for performance improvements by dynamically optimizing the UAV position to best meet communication requirements [10].
However, an inevitable problem in UAVassisted network is the scarcity of wireless spectrum. Cognitive radio (CR), a promising technology to overcome spectrum overcrowding and scarcity, is considered a key technology to meet the critical requirements. UAVs may need to share the spectrum with existing wireless devices (e.g., cellular mobiles on the ground) for communications[11–13].
Wireless security has attracted a lot of researchers’ attention recently, while the extensive work were often proposed to secure wireless communications against eavesdropping as illegitimate attacks [14–16]. In the UAVassisted network, UAV wireless connection is an easy point of target when there is no strong protection against malicious hackers. Some effective means, such as encrypted channel and redundant coding, are widely used to enhance the security while safeguarding UAV from unauthorized access and disruption. However, criminals or terrorists may potentially use UAVenabled wireless communications to establish suspicious links for crimes and terrorism [17, 18]. Therefore, more and more demands were proposed for legitimate organizations, such as government agencies, e.g., to eavesdrop these suspicious links[19, 20]. We thus intend to address the issue about the proactive eavesdropping in UAVenabled wireless communication networking. It is worth noting that the flight trajectory and the placement of the UAV can be optimized for improving the communication performance, respectively. However, the mobility of UAVs is controlled by a suspicious user instead of the legitimate eavesdropper. In such a scenario, the proactive eavesdropper is a independent user, and the CSI between the eavesdropper and the suspicious transmitter can be estimated in a nearinstantaneous manner[21, 22]. By contrast, the CSI between the eavesdropper and the receivers (primary receiver and secondary receiver) cannot be extracted. Therefore, we can assume that we know the statistical information of the channel between the eavesdropper and the receivers[23, 24].
The average eavesdropping rate over Rayleigh fading channels, defined as the suspicious communication rate multiplied by the nonoutage probability, is maximized in [25]. Furthermore, it is considered to maximize the eavesdropping nonoutage probability and the relative eavesdropping rate by optimizing the jamming power allocation over different fading states in [26]. On the other hand, multiantenna wireless legitimate surveillance systems with nonignored loopchannel are presented in [27]. It is worth noting that the aforementioned works on wireless surveillance mainly focus on the threenode systems with the suspicious parts and the legitimate monitor. The proactive eavesdropping in the scenario of CR network has not been investigated hitherto. In this paper, the suspicious users are set as the secondary users in a CR network; meanwhile, a fullduplex legitimate monitor tries to decode the messages in the suspicious link. The main contributions are summarized as follows:
1. We propose an efficient jamming scheme for proactive eavesdropping in the new UAVenabled suspicious communication scenario with partial CSI between ST and SR, ST and PR, E and SR, and ST and E, which is shown in Fig. 1. The total interference power to PR caused by E and ST should be controlled below a threshold for all the possible channel realization within an uncertainty set.
2. We formulate an optimization problem to maximize the achievable eavesdropping rate by optimizing the jamming vector. First, the original problem with infinite constrains is transformed into a problem with finite constraints. Then, an analytical solution in closedform or significant lowcomplexity is presented.
3. Numerical results reveal that the uncertainty of the channels influences the eavesdropping rate and the eavesdropping probability to a large extent. Furthermore, it is also certificated that our proposed solution has the better performance over the traditional solutions.
The rest of this paper is organized as follows. Section 2 explains the main methods of this paper. Section 3 introduces the system model of robust legitimate eavesdropping in a CR network, and then formulates the eavesdropping beamforming design problem. Section 4 divides the original problem into three subproblems and proposes the optimal solution to the problems in a closedform. Section 5 provides the simulation results. Finally, Section 6 concludes the paper.
2 Methods
In a UAVbased wireless communication network, airtoground channel is an LoS channel that easily acquires channel knowledge. However, when a monitor attempts to monitor a terrestrial user, the channel between the monitor and the ground user is still affected by the complex environment on the ground. In this case, we assume that its statistical information is known and attempts to obtain a robust design. In such a scenario, we need to establish a robust optimization problem, which commits to get the best solution in the worst case.
The robust optimization problem involves infinite constraints. One common method to solve such problem is to use the Sprocedure lemma to convert the infinite constraints. The optimal solution is obtained by decomposing the optimal matrix, which should permit that its rank equals to 1. However, the drawback of this method is the high computational complexity. In this paper, we directly consider the worst case of the target and the boundary condition of the constrained space, then convert infinite constraints into finite constraints. Through the transformation of the triangle inequality, the semiclosed form solution of the original problem is finally obtained. The superiority of this approach lies in lower computational complexity and clear physical meaning.
3 System model and problem formulation
As shown in Fig. 1, we consider a suspicious wireless communication link from a secondary transmitter ST to a secondary receiver SR in a CR network, where a legitimate monitor E is intended to eavesdrop this link via jamming. ST and SR are both equipped with single antenna, and E is deployed with one antenna for eavesdropping (receiving) and N antennas for jamming (transmitting). When the primary user is inactive, it is clearly not the effect of the eavesdropping process. If the primary user is active, it is worth noting that the transmission information of the primary user in CR communication is useless for SR and E, so it can be treated as background noise. The scheme of the proactive eavesdropping would not be influenced by the primary user. The channels from ST to SR, from ST to E, from ST to PR, from E to SR, and from E to PR are denoted by h_{1},h_{2},h_{3},g_{1}, and g_{2}, respectively. It is worth noting that downlink communication channels where the UAV sends messages to the ground users are dominated by lineofsight (LoS) links, and the Doppler effect due to the UAV’s mobility is assumed to be perfectly compensated. Therefore, the channel power gain from the UAV to each ground user follows the freespace path loss model given by
where β_{0} denotes the channel power gain at the reference distance d_{0}=1 meter (m), and d_{k} denotes the distance between ST and each ground user.
The legitimate monitor can operate in a fullduplex mode to enable simultaneous eavesdropping and jamming. Furthermore, we assume that the receiving antenna and the transmitting antennas at E are isolated [28], so that the selfinterferences can be perfectly canceled at E. E obtains the perfect CSI on the channel h_{2} as a receiver. However, due to the channel estimation errors and the limited cooperation between ST, SR, and E, it is assumed that the legal monitor does not know the CSI on the channel h_{1},h_{3},g_{1}, and g_{2} perfectly. Instead, it is reasonable to assume that E has the knowledge which is bounded within the uncertain sets described by the following regions:
where \({\hat {\mathbf {g}}_{1}}\) and \({\hat {\mathbf {g}}_{2}}\) are the estimators of the channels at E; Δg_{1},Δg_{2} are the corresponding channel estimation errors. ε_{e1},ε_{e2} determine the quality of the CSI estimations.
We consider that ST transmits with the power P_{S}, which satisfies P_{S}≤P_{t}. Moreover, for any w satisfying ∥w∥^{2}≤P_{e} as the beamforming vector at E, the interference to PR due to the suspicious transmission and the jamming signals sent by E can be expressed as: \(\text {IT}={P_{S}}\{h_{3}}{\^{2}} + \{\mathbf {g}_{2}^{H}}{\mathbf {w}}{\}^{2}\).
To ensure reliable detection at SR, adaptive rate transmission is adopted at ST based on the channel perceived at SR. For any fixed w, the robust transmission rate at ST is formulated as:
where σ^{2} refers to the variance of the Gaussian noises. In this case, the transmitting power at ST is given by the following Lemma.
Lemma 1
For any fixed w, the robust transmitting power at ST is:
where \({\left (x \right)^{+}} {\overset {\Delta }{=}} \max \left ({x,0} \right)\), and Γ represents the maximum tolerable average interference at PR [29], which is called the interference temperature limit.
Proof
For any fixed w, it can be observed that the channel capacity of the suspicious link is limited by two constraints: one is the transmit power constraint at ST; the other is the interference temperature constraint at SR. The following problem is considered to obtain the maximum robust transmission rate of the suspicious link: □
For problem (5), at least one constraint is active since the objective function increases with the increase of P_{S}. The optimal solution to (5) can be expressed as (4). The proof is thus completed.
On the other hand, the capacity of the eavesdropping channel from ST to E is:
According to [30], the legitimate monitor can successfully eavesdrop the suspicious communication if and only if R_{E}(w)≥R_{S}(w), since in this case the legitimate monitor can decode the information sent by ST with arbitrary small error probability. As a result, the effective eavesdropping rate is given by R_{ev}(w)=R_{S}(w). On the other hand, if R_{E}(w)<R_{S}(w), it is impossible for E to decode the information from ST without any error. In this case, the eavesdropping rate is defined as R_{ev}(w)=0. In summary, the effective eavesdropping rate can be expressed as:
The objective of the legitimate monitor is to maximize the eavesdropping rate R_{ev}(w) by optimizing the beamforming vector w. This problem is thus formulated as the following:
4 Optimal solution
First, we propose that \({\mathbf {w}}= \sqrt {p} {\mathbf {v}}\), where p is the optimal transmit power satisfying p≤P_{e} and ∥v∥^{2}=1. Then, based on the definition in (7), the objective function can be replaced by R_{S}(v,p) with an additional constraint R_{E}(v,p)≥R_{S}(v,p). Meanwhile, by substituting (3) and (6) into (8), the original problem (8) can be expressed as
Note that the problem (9) is equivalent to the problem (8) due to the logarithmic transformation between rate and signaltointerferenceplusnoise ratio (SINR).
Remark 1
An important observation is that the constraint (9a) in the above problem remains invariant when \({{\hat {\mathbf {g}}}_{2}}\) undergoes any arbitrary rotation. Without loss of generality, we assume that \({{\hat {\mathbf {g}}}_{2}}\) and \({\hat {\mathbf {g}}_{1}}\) have the same phase, i.e., \(\text {Im}\left \{ {{\hat {\mathbf {g}}}_{2}^ H {{\hat {\mathbf {g}}}_{1}}} \right \} = 0\), then we define the angle between \({{\hat {\mathbf {g}}}_{2}}\) and \({\hat {\mathbf {g}}_{1}}\) as \(\alpha :\alpha = \arccos \left ({\frac {{{\hat {\mathbf {g}}}_{2}^ H {{\hat {\mathbf {g}}}_{1}}}}{{\\mathbf {g}_{2}^ H \\ {{\hat {\mathbf {g}}}_{1}}\}}} \right)\).
Since problem (9) is subject to an infinite number of constraints. The traditional method about S procedure [31] could be applied to transform the problem (9) into a semidefinite program. However, in this paper, we are going to transform the original problem into a problem with finite constraints to get analytical results. In the following section, we firstly study several important constraints about problem (9). Then, we will analyze for them.
By assuming that \(\mathbf {g}_{i1}= \arg \max \mathbf {g}_{i}^ H {\mathbf {v}}\mathbf {v}^ H {\mathbf {g}_{i}}, i \in \{1,2\}\), where g_{i}∈η_{ei}. We have \({\mathbf {g}_{i1}} = {\hat {\mathbf {g}}_{i}} + \sqrt {{\varepsilon _{ei}}} \rho {\mathbf {v}},\rho = \frac {{\hat {\mathbf {g}}_{i}^ H {\mathbf {v}}}}{{\\hat {\mathbf {g}}_{i}^ H {\mathbf {v}}\}}\). The proof can be obtained by the simplified version of Lemma 2 in [32]. Moreover, we assume \(\mathbf {g}_{i0}= \arg \min \mathbf {g}_{i}^ H {\mathbf {v}}\mathbf {v}^ H {\mathbf {g}_{i}}, {\mathbf {g}_{i0}} = {\hat {\mathbf {g}}_{i}}  \sqrt {{\varepsilon _{ei}}} \rho {\mathbf {v}},\rho = \frac {{\hat {\mathbf {g}}_{i}^ H {\mathbf {v}}}}{{\\hat {\mathbf {g}}_{i}^ H {\mathbf {v}}\}}\) is proposed.
Lemma 2
Problem (9) has the same optimal solution with the following problem:
Proof
First, we denote the objective function of problem (9) and (10) as f_{1} and f_{2}, respectively. It can be observed that g_{11}∈η_{e1}. So, it can be satisfied that f_{1}≤f_{2}. On the other hand, it can be proved by contradiction that f_{2}≤f_{1}. We assume that there exist another parameters g_{12}∈η_{e1} satisfying \({f_{2}}{\mathrm {>}} { \frac {{{P_{S}}\{h_{1}}{\^{2}}}}{{p\\mathbf {g}_{12}^ H {\mathbf {v}}{\^{2}} + {\sigma ^{2}}}}} \). It can be obtained that \(\\mathbf {g}_{12}^ H {\mathbf {v}}{\^{2}} \le \\mathbf {g}_{11}^ H {\mathbf {v}}{\^{2}}\), which contradicts our presumption, i.e., f_{1}=f_{2}. Similarly, for problem (9), only the constraints in problem (10) are active constraints. The proof is then completed. □
Moreover, the transmit power at ST can also be transformed into
Then, we will analyze for the constraints of problem (10). For (10c), the following lemma is proposed:
Lemma 3
If the optimal solution to problem (9) satisfies that p≠0, the constraint (10c) could rewrite as
Proof
Suppose {v_{0},p_{0}} is the optimal solution of problem (10) subject to (10a) and (10b) with p_{0}≠0 satisfying \({{\{h_{2}}{\^{2}}}}/{{{\sigma ^{2}}}}{\mathrm {>}}{{\{h_{1}}{\^{2}}}}/\left ({{p_{0}\{\mathbf {g}_{1}^{H}} {\mathbf {v}_{\mathrm {}0}}{\}^{2} + {\sigma ^{2}}}}\right)\). There is another p_{1}=cp_{0} (0<c<1 is a scalar) satisfying \({{\{h_{2}}{\^{2}}}}/{{{\sigma ^{2}}}}{\mathrm {=}}{{\{h_{1}}{\^{2}}}}/\left ({{p_{1}\{\mathbf {g}_{1}^{H}} {\mathbf {v}_{\mathrm {}0}}{\}^{2} + {\sigma ^{2}}}}\right)\). Then, it is easy to obtain that {v_{0},p_{1}} also satisfies (10a) and (10b). Therefore, from (10), {v_{0},p_{1}} is a better solution since p_{1}≤p_{0} and P_{S}(v,p) is an nondecreasing function with respect to p. This result contradicts our presumption. □
For (10a), two cases are discussed corresponding to the conditions that if (10a) is a equality or not. When the optimal {v^{∗},p^{∗}} causes that (10a) is not a equality, P_{S}(v,p)=P_{t} is obtained due to the fact that another picking of P_{S}(v,p) only supports for the equality of (10a). Then, subproblem 1 (SP1) is proposed
If {v_{1},p_{1}}, which is the optimal solution of problem (13), satisfies \({P_{t}}\{h_{3}}{\^{2}} + p_{1}\\mathbf {g}_{21}^ H {\mathbf {v}_{1}}{\^{2}} < \Gamma, \{\mathbf {v}_{1},p_{1}\}\) is the optimal solution for problem (9). Otherwise, constraint (10a) is a equality for the optimal solution of (9).
In the case when constraint (10a) is a equality, another two SPs are proposed
If the optimal solution of SP2, defined as {v_{2},p_{2}}, satisfies \(0\le {{\Gamma p_{2} \{\mathbf {g}_{21}^{H}}{\mathbf {v}}_{2}{\}^{2}}}\le P_{t}, \{\mathbf {v}_{2},p_{2}\}\) is the optimal solution for problem (9). Else if \( {{\Gamma p_{2} \{\mathbf {g}_{21}^{H}}{\mathbf {v}_{2}}{\}^{2}}}<0\), problem (9) is not feasible. Otherwise, i.e., \( {{\Gamma p_{2} \{\mathbf {g}_{21}^{H}}{\mathbf {v}}_{2}{\}^{2}}}> P_{t}\), the optimal solution of SP3, defined as {v_{3},p_{3}}, is the optimal solution for problem (9).
4.1 Optimal solution for SP1
Before we proceed to solve SP1, an important property is proposed as follows.
Remark 2
For i∈{1,2}, by applying the triangle inequality, the constraint can be transformed as follows
And
Then, for the optimal v^{∗}, it can be obtained that \({{\hat {\mathbf {g}}_{i}}},{\mathbf {v}^{*}}\) have the same phase, i.e., \({\text {Re}} \left \{{\hat {\mathbf {g}}_{i}^ H {\mathbf {v}^{*}}}\right \} \ge 0,{\text {Im}}\left \{{\hat {\mathbf {g}}_{i}^ H {\mathbf {v}^{*}}}\right \} = 0\). And it can be observed that \(\rho = 1, \\mathbf {g}_{i0}^ H {\mathbf {v}^{*}}\ = \hat {\mathbf {g}}_{i}^ H {\mathbf {v}^{*}}  \sqrt {\varepsilon _{ei}}, \\mathbf {g}_{i1}^ H {\mathbf {v}^{*}}\ = \hat {\mathbf {g}}_{i}^ H {\mathbf {v}^{*}} + \sqrt {\varepsilon _{ei}}\).
By using Remark 2, SP1 can be transformed into
Substitute (19b) into the objective function of (19) and the optimal solution to problem (19) can be obtained if the following function
is minimized, where \(\delta =\frac {{{({\{{h}_{1}}\})}^{2}}{\sigma ^{2}}}{{\{h_{2}}{\^{2}}}} {\sigma ^{2}}\) and δ>0.
It is easy to obtain that the optimal solution to SP1 is
if and only if p_{1}≤P_{e} is satisfied.
4.2 Optimal solution for sP2
By using Remark 2, SP2 can be transformed into
Substitute (19b) into the objective function of (22) and it can be observed that the optimal solution to problem (22) can be obtained if the following function
is maximized.
In the following lemma, the optimal beamforming vector v at (23) is proposed with an important property.
Lemma 4
The optimal vector v for (23) is of the form \(\alpha _{v} {\hat {\mathbf {g}}}_{\}  \beta _{v} {\hat {\mathbf {g}}}_{\bot }, \alpha _{v},\beta _{v} \in \mathbb {R}\), where \({\hat {\mathbf {g}}}_{\}={\hat {\mathbf {g}}}_{1}/\{\hat {\mathbf {g}}}_{1}\, {\hat {\mathbf {g}}}_{\bot }= \mathbf {g}_{\bot }/\\mathbf {g}_{\bot }\, \mathbf {g}_{\bot }={\hat {\mathbf {g}}}_{2}{\left ({{\hat {\mathbf {g}}}_{\}}^{H} {\hat {\mathbf {g}}}_{2}\right)}{\hat {\mathbf {g}}}_{\}\).
Proof
The proof of Lemma 4 could be divided into two parts. The first part is to prove that v is of the form \(\alpha _{v} {\hat {\mathbf {g}}}_{\}  \beta _{v} {\hat {\mathbf {g}}}_{\bot }, \alpha _{v},\beta _{v} \in \mathbb {C}\). The second part is to prove \(\alpha _{v},\beta _{v} \in \mathbb {R}\).
First, we assume that the vector \({\mathbf {v}_{x}}={\alpha _{v}}{\hat {\mathbf {g}}_{\}}  {\beta _{v}}\hat {\mathbf {g_{0}}}\) is the optimal vector at (23), where \({\hat {\mathbf {g_{0}}}^ H}{\hat {\mathbf {g}}_{\}} = 0, \\hat {\mathbf {g_{0}}}\ = 1\) and \(\hat {\mathbf {g}_{0}} \neq {\hat {\mathbf {g}}_{\bot }}\). There is another vector \({\mathbf {v}_{y}}={\alpha _{v}}{\hat {\mathbf {g}}_{\}}  {\beta _{v}}{\hat {\mathbf {g}}_{\bot }}\). It can be observed that f_{2}(v_{x})≤f_{2}(v_{y}) due to the fact that \({{\hat {\mathbf {g}}}_{1}^{H}}{\mathbf {v}_{x}}= {{\hat {\mathbf {g}}}_{1}^{H}}{\mathbf {v}_{y}} \) and \({{\hat {\mathbf {g}}}_{2}^{H}}{\mathbf {v}_{x}} \le {{\hat {\mathbf {g}}}_{2}^{H}}{\mathbf {v}_{y}}\), where the equal sign is active if and only if β_{1}=0.
We next prove that \(\alpha _{v},\beta _{v} \in \mathbb {R}\). By using Remark 2, it can be obtained that g_{⊥},g_{∥} and v have the same phase. i.e., \(\alpha _{v},\beta _{v} \in \mathbb {R}\) for \(\alpha _{v} {\hat {\mathbf {g}}}_{\}  \beta _{v} {\hat {\mathbf {g}}}_{\bot }\). □
From Lemma 4, we learn that the optimal vector v is shown to lie in a twodimensional (2D) space spanned by \({\hat {\mathbf {g}}}_{\}\) and \({\hat {\mathbf {g}}}_{\bot }\). So, it can be searched on the space as depicted in Fig. 2.
It can be obtained from Fig. 2 that
By substituting (24) into (23), we have
f_{2}(β) is a single variable optimization problem. To find the optimal β, we should firstly observe that the feasible region for the variable β is [0,π/2−α]. And \(p ={\delta }/{{{{({\{\hat {\mathbf {g}}}_{1}\ \cos {(\beta)}{\mathrm {}}\sqrt {{\varepsilon _{e1}}}})}^{2}}}}\le P_{e}\) should be satisfied. So, β is in the range of [0, min(π/2−α,β_{1})], where β_{1} satisfies \(\{\hat {\mathbf {g}}}_{1}\ \cos {(\beta _{1})}=\max {(\pi /2\alpha,\sqrt {{\delta }/P_{e}}+\sqrt {{\varepsilon _{e1}}})}\). However, the firstorder derivative of f_{2}(β) is too complex to get a closedform result. Then, the globally optimal solution of f_{2}(β) could be searched for in the feasible region.
By using Lemma 4, the optimal solution {v_{2},p_{2}} can be obtained with β_{2}, which is the optimal solution of f_{2}(β):
4.3 Optimal solution for SP3
For SP3, Lemma 4 is also applicable, and the following equations are proposed:
where \(\delta _{1}=\Gamma {P}{({\{{\hat h}_{3}}\ + \sqrt {{\varepsilon _{a3}}}})^{2}}\).
It is easy to obtain {β_{3},p_{3}} by solving the equations at (26) with the regular mathematical tools and the optimal vector v_{3} is proposed as follows
5 Simulation results and discussions
Simulation results are provided in this section, in which E is equipped with one antenna for receiving and (N=4) antennas for transmitting. Meanwhile, ST, SR, and PR each use a single antenna. It is assumed the channels are drawn that each element is generated by independent CSCG variable distributed as \({\mathrm {{\mathcal {C}}{\mathcal {N}}}}\left ({0,1} \right)\) for \({{\hat {\mathbf {g}}}_{1}}\) and \({{\hat {\mathbf {g}}}_{2}}\), respectively. The corresponding distance is assumed to be d_{1}=200m,d_{2}=d_{3}=500m. For simplicity, the uncertainties of all channels are assumed to be ε_{e1}=ε_{e2}=ε, where ε specifies the size of the uncertainty set.
Figure 3 illustrates robust eavesdropping rate versus the interference temperature limit at PR. P_{t}/σ^{2}=P_{e}/σ^{2}=10 dB while Γ/σ^{2} is in the range of [ −10 dB, 10 dB]. Note that ε=0 corresponds to the scenario when perfect knowledge of all the channels is known. When the constraint in Theorem 1 is not satisfied, {v_{i},p_{i}},i∈{2,3} may be the optimal solution. In this case, robust eavesdropping rate will increase with the increase of Γ until {v_{1},p_{1}} is a feasible solution. Moreover, it can be observed that robust eavesdropping rate is higher when ε is smaller, which can be explained that with more accurate CSI, E can better obtain the information about the suspicious link and achieve successful eavesdropping more effectively.
Figure 4 depicts the eavesdropping rate versus the maximum transmit power at E. The parameter P_{t}/σ^{2} is 10 dB while Γ/σ^{2} is 0 dB. P_{e}/σ^{2} increases from −5 dB to 10 dB. Similarly, higher robust eavesdropping rate can be observed with smaller ε. The curves are increasing with the increase of Γ until the upper bound is obtained.
Figure 5 illustrates the eavesdropping probability versus the interference temperature limit at PR, where the eavesdropping probability is denoted by the ratio of the successful eavesdropping to the sum eavesdropping, successful eavesdropping is defined as the cases that the eavesdropping rate can not be larger corresponding to the known conditions. P_{t}/σ^{2}=P_{e}/σ^{2}=10 dB while Γ/σ^{2} is in the range of [ −10 dB, 10 dB]. Note that ε=0 corresponds to the scenario when perfect knowledge of all the channels is known. In such a scene, the eavesdropping probability gets the best performance. Moreover, it can be observed that robust eavesdropping probability increases to 1 more quickly when ε is smaller, which can be explained that with more accurate CSI, E can better obtain the information about the suspicious link and achieve successful eavesdropping more effectively.
Figure 6 depicts the eavesdropping probability versus the maximum transmit power at E. The parameter P_{t}/σ^{2} is 10 dB while Γ/σ^{2} is 0 dB. P_{e}/σ^{2} increases from −5 dB to 10 dB. Similarly, higher eavesdropping probability is obtained with smaller ε. The curves are increasing with the increase of Γ until the upper bound is obtained.
Figure 7 depicts the eavesdropping rate versus the uncertainty of all channels. We compare our approach with the traditional solution in [33], which does not incorporate the robust cases. When ε=0, the CSI is completely known, and these two solutions have the same eavesdropping rate. With the increases of ε, our approach achieves better eavesdropping rate than the other one. The gap also becomes larger due to the uncertainty of the CSI.
The parameter P_{t}/σ^{2} is 10 dB while Γ/σ^{2} is 0 dB. P_{e}/σ^{2} increases from −5 dB to 10 dB. Similarly, higher robust eavesdropping rate can be observed with smaller ε. The curves are increasing with the increase of Γ until the upper bound is obtained.
6 Conclusion
This paper has investigated a new robust information surveillance problem under the UAVenabled CR network. A proactive eavesdropping scheme has been considered to monitor the suspicious transmission between the suspicious UAV transmitter and the ground receiver via jamming. The fullduplex legitimate monitor adaptively optimizes the transmission beamforming vector to maximize the eavesdropping rate, which is formulated as a nonconvex semiinfinite optimization problem. To solve it, we have transformed it into a problem with finite constraints, then the optimal solution in lowcomplexity were proposed. The numerical results show the superiority of our proposed schemes in UAVenabled wireless communication networking.
Availability of data and materials
Data sharing not applicable to this article as no data sets were generated or analyzed during the current study.
Abbreviations
 BS:

Base station
 CR:

Cognitive radio
 LoS:

Lineofsight
 UAV:

Unmanned aerial vehicle
References
C. Li, S. Zhang, P. Liu, F. Sun, J. M. Cioffi, L. Yang, Overhearing protocol design exploiting intercell interference in cooperative green networks. IEEE Trans. Veh. Technol.65(1), 441–446 (2016).
R. Q. Hu, Y. Qian, An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems. IEEE Commun. Mag.52(5), 94–101 (2014).
W. Wu, F. Zhou, P. Li, P. Deng, B. Wang, V. C. M. Leung, in 2019 IEEE International Conference on Communications (ICC). Energyefficient secure NOMAenabled mobile edge computing networks (Shanghai, 2019).
C Li, P Liu, C Zou, F Sun, J. M Cioffi, L Yang, Spectralefficient cellular communications with coexistent one and twohop transmissions. IEEE Trans. Veh. Technol.65(8), 6765–6772 (2016).
Y. Zeng, J. Lyu, R. Zhang, Cellularconnected UAV: potential, challenges, and promising technologies. IEEE Wirel. Commun.26(1), 120–127 (2019).
C. Li, F. Sun, J. M. Cioffi, L. Yang, Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst.61(7), 531–535 (2014).
W. Wu, X. Yin, P. Deng, T. Guo, B. Wang, Transceiver design for Downlink SWIPT NOMA Systems With Cooperative FullDuplex Relaying. IEEE Access. 7:, 33464–33472 (2019).
F. Zhou, Y. Wu, H. Sun, Z. Chu, in 2018 IEEE International Conference on Communications (ICC). UAVenabled mobile edge computing: offloading optimization and trajectory design (Kansas City, 2018). https://doi.org/10.1109/icc.2018.8422277.
C Li, H. J Yang, F Sun, J. M Cioffi, L Yang, Adaptive overhearing in twoway multiantenna relay channels. IEEE Sig. Process. Lett.23(1), 117–120 (2016).
X. Hong, P. Liu, F. Zhou, S. Guo, Z. Chu, Resource allocation for secure UAVassisted SWIPT systems. IEEE Access. 7:, 8–24257 (2019).
W. Wu, B. Wang, Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system. EURASIP J. Wirel. Commun. Netw.1(2015), 161 (2015).
F. Zhou, Y. Wu, R. Q. Hu, Y. Qian, Computation rate maximization in UAVenabled wireless powered mobileedge computing systems. IEEE J. Sel. Areas Commun.36(9), 1927–1941 (2018).
J. Cao, Z. Bu, Y. Wang, H. Yang, J. Jiang, H. Li, Detecting prosumercommunity group in smart grids from the multiagent perspective. IEEE Trans. Syst. Man Cybern.Syst.49(8), 1652–1664 (2019).
Y. Liu, H. H. Chen, L. Wang, Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor.19(1), 347–375 (2016).
S. Y. Park, D. J. Love, Outage performance of multiantenna multicasting for wireless networks. IEEE Trans. Wirel. Commun.8(4), 1996–2005 (2009).
H. Zhang, L. Duan, R. Zhang, in 2019 IEEE International Conference on Communications (ICC). Proactive Eavesdropping of Two Suspicious Communication Links via Jamming, (2019). https://doi.org/10.1109/icc.2019.8761976.
J. Xu, L. Duan, R. Zhang, Surveillance and intervention of infrastructurefree mobile communications: a new wireless security paradigm. IEEE Wirel. Commun.24(4), 152–159 (2017).
H. Zhang, L. Duan, in 2018 IEEE Global Communications Conference (GLOBECOM). Going beyond secrecy rate via information jamming, (2018). https://doi.org/10.1109/glocom.2018.8647745.
H. Lu, H. Zhang, H. Dai, W. Wu, B. Wang, Proactive eavesdropping in UAVaided suspicious communication systems. IEEE Trans. Veh. Technol.68(2), 1993–1997 (2019).
B. Li, Y. Yao, H. Zhang, Y. Lv, Energy efficiency of proactive cooperative eavesdropping over multiple suspicious communication links. IEEE Trans. Veh. Technol.68(1), 420–430 (2019).
Y. Zeng, X. Xu, R. Zhang, Trajectory design for completion time minimization in UAVenabled multicasting. IEEE Trans. Wirel. Commun.17(4), 2233–2246 (2018).
C. Li, H. J. Yang, F. Sun, J. M. Cioffi, L. Yang, Multiuser overhearing for cooperative twoway multiantenna relays. IEEE Trans. Veh. Technol.65(5), 3796–3802 (2016).
Z. Bu, HJ. Li, C. Zhang, J. Cao, A. Li, Y. Shi, Graph Kmeans based on leader identification, dynamic game,and opinion dynamics. IEEE Trans. Knowl. Data Eng. (Early Access). https://doi.org/10.1109/TKDE.2019.2903712.
J Cao, C Ding, B Shi, Motifbased functional backbone extraction of complex networks. Phys. A Stat. Mech. Appl.526:, 121123 (2019).
J Xu, L Duan, R Zhang, Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels. IEEE Wirel. Commun. Lett.5(1), 80–83 (2016).
J. Xu, L. Duan, R. Zhang, Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans. Wirel. Commun.16(5), 2790–2806 (2017).
C. Zhong, X. Jiang, F. Qu, Z. Zhang, Multiantenna wireless legitimate surveillance systems: design and performance analysis. Wcsp2017. 16(7), 4585–4599 (2017).
H. Cai, Q. Zhang, Z. Li, J. Qin, Proactive monitoring via jamming for rate maximization over MIMO Rayleigh fading channels. IEEE Wirel. Commun. Lett.21(9), 2021–2024 (2017).
R. Zhang, Y. C. Liang, Exploiting multiantennas for opportunistic spectrum sharing in cognitive radio networks. IEEE J. Sel. Top. Sig. Process.2(1), 88–102 (2008).
Y. Zeng, R. Zhang, Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J. Sel. Top. Sig. Process.10(8), 1449–1461 (2016).
Y. Pei, Y. Liang, L. Zhang, K. Teh, K. Li, Secure communication over MISO cognitive radio channels. IEEE Trans. Wirel. Commun.9(4), 1494–1502 (2010).
L. Zhang, Y. Liang, Y. Xin, Poor V.H., Robust cognitive beamforming with partial channel state information. IEEE Trans. Wirel. Commun.8(8), 4143–4153 (2009).
P. Li, H. Zhang, W. Wu, H. Dai, B. Wang, in 2018 IEEE Global Communications Conference (GLOBECOM). Proactive eavesdropping via jamming in cognitive radio networks, (2018). https://doi.org/10.1109/glocom.2018.8647517.
Acknowledgments
Not applicable.
Funding
This work was supported in part by the National Natural Science Foundation of China (61901231), the Natural Science Foundation of Jiangsu Province of China (BK20180757), the Project of Educational Commission of Jiangsu Province of China (18KJB510028), the Introducing Talent Research StartUp Fund of Nanjing University of Posts and Telecommunications (NY218100, NY219072), and the Aba Prefecture Applied Technology Research and Development Fund Project (19YYJSYJ0035).
Author information
Authors and Affiliations
Contributions
WW is the main author of the current paper. WW contributed to the development of the ideas, design of the study, theory, result analysis, and article writing. YW carried out the experimental work and the data collection and interpretation. JM finished the analysis and interpretation of data and drafted the manuscript. JL conceived and designed the experiments and undertook revision works of the paper. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Wu, W., Wang, Y., Mo, J. et al. Robust proactive eavesdropping in UAVenabled wireless communication networking. J Wireless Com Network 2019, 285 (2019). https://doi.org/10.1186/s1363801915996
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801915996