首页 | 本学科首页   官方微博 | 高级检索  
     检索      

轨迹和干扰功率联合优化的无人机主动窃听算法
引用本文:周洁,王培臣,张孟杰,赵睿.轨迹和干扰功率联合优化的无人机主动窃听算法[J].华侨大学学报(自然科学版),2022,43(2):237-244.
作者姓名:周洁  王培臣  张孟杰  赵睿
作者单位:华侨大学 信息科学与工程学院, 福建 厦门 361021
基金项目:国家自然科学基金资助项目(61401165);;福建省自然科学基金资助项目(2019J01055);
摘    要:研究一种无人机(UAV)作为合法窃听器的无线通信窃听算法.首先,将一个合法窃听器(UAV(E))用于窃听可疑发射器(UAV(B))发送到地面可疑接收器的可疑信息.然后,利用可疑系统的特点,提出一种有效的主动干扰方案,从而最大限度地提高有效窃听速率;针对构造的原问题是一个优化变量耦合的混合非凸优化问题,应用更新速率辅助的块坐标下降和连续凸优化技术,在每次迭代中交替优化无人机轨迹和干扰功率.最后,针对非凸的无人机轨迹优化和干扰功率优化问题,分别利用连续凸优化算法将原非凸问题转化为近似的次优化问题,再使用凸优化方法进行求解.仿真结果表明:相较于其他基准算法,文中算法具有更高的有效窃听速率.

关 键 词:无人机  合法窃听器  无线通信  凸优化

Unmanned Aerial Vehicle Proactive Eavesdropping Algorithm Using Joint Optimization of Trajectory and Jamming Power
ZHOU Jie,WANG Peichen,ZHANG Mengjie,ZHAO Rui.Unmanned Aerial Vehicle Proactive Eavesdropping Algorithm Using Joint Optimization of Trajectory and Jamming Power[J].Journal of Huaqiao University(Natural Science),2022,43(2):237-244.
Authors:ZHOU Jie  WANG Peichen  ZHANG Mengjie  ZHAO Rui
Institution:College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China
Abstract:Research a wireless communication eavesdropping algorithm of unmanned aerial vehicle(UAV)as a legitimate eavesdropper. Firstly, a legitimate eavesdropper(UAV(E))attempts to eavesdrop the suspicious messages sent from the suspicious transmitter(UAV(B))to the suspicious receiver on the ground. Secondly, using the characteristics of the suspicious system, an effective proactive jamming scheme is proposed to maximize increase the effective eavesdropping rate. For the constructive original problem is a hybrid non-convex optimization problem with optimized variable coupling, the update rate-assisted block coordinate descent and successive convex optimization technology are applied to alternately optimize the UAV trajectory and jamming power in each iteration. Finally, for the problem of non-convex UAV trajectory optimization and jamming power optimization, the successive convex approximation algorithm is used to transform the original non-convex problem into an approximate sub-optimization problem, furthermore, use the convex optimization method to get the solution. The simulation results show that the proposed algorithm has a higher effective eavesdropping rate than other benchmark algorithms.
Keywords:unmanned aerial vehicle  legitimate eavesdropper  wireless communications  convex optimization
本文献已被 万方数据 等数据库收录!
点击此处可从《华侨大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《华侨大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号