CN112512037A - Unmanned aerial vehicle active eavesdropping method combining track and interference power optimization - Google Patents
Unmanned aerial vehicle active eavesdropping method combining track and interference power optimization Download PDFInfo
- Publication number
- CN112512037A CN112512037A CN202011388442.XA CN202011388442A CN112512037A CN 112512037 A CN112512037 A CN 112512037A CN 202011388442 A CN202011388442 A CN 202011388442A CN 112512037 A CN112512037 A CN 112512037A
- Authority
- CN
- China
- Prior art keywords
- eavesdropper
- lawful
- time slot
- legal
- transmitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005457 optimization Methods 0.000 title claims abstract description 34
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000006854 communication Effects 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 25
- 230000005540 biological transmission Effects 0.000 claims description 21
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000004422 calculation algorithm Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 239000000126 substance Substances 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0226—Traffic management, e.g. flow control or congestion control based on location or mobility
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/43—Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0231—Traffic management, e.g. flow control or congestion control based on communication conditions
- H04W28/0236—Traffic management, e.g. flow control or congestion control based on communication conditions radio quality, e.g. interference, losses or delay
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention provides an unmanned aerial vehicle active interception method combining track and interference power optimization, aiming at the influence of track change of an unmanned aerial vehicle on the effective interception rate of a system, an effective active interference scheme is adopted in a model, namely the unmanned aerial vehicle sends an interference signal while intercepting suspicious link information to interfere a suspicious receiver. In order to maximize the effective eavesdropping rate, the track and the sending interference power of the unmanned aerial vehicle are optimized by using the updating rate-assisted block coordinate descent and continuous convex optimization technology, and the effective eavesdropping rate is further improved.
Description
Technical Field
The invention relates to the technical field of communication monitoring, in particular to an active unmanned aerial vehicle eavesdropping method combining track and interference power optimization.
Background
In recent years, due to the characteristics of high mobility, low cost and the like of the unmanned aerial vehicle, the application requirements in the aspects of public safety, disaster management, monitoring, communication and the like are continuously increased. However, with the popularization of unmanned aerial vehicle communication systems, low-cost wireless services expand the range of activities of criminals or terrorists, and pose a serious threat to national security. To combat criminal or terrorist attacks, government agencies are increasingly required to legally monitor any suspect communication links and detect abnormal behavior in commercial wireless networks.
The trajectory optimization problem of drones is crucial in drone networks, mainly because the high mobility of drones, the inherent broadcast characteristics of wireless communication and the considered channels are controlled by Line of sight (LoS), and the change in the position of a drone can directly affect its reception rate.
In the research of the prior literature, the active monitor is regarded as a node fixed on the ground or an unmanned aerial vehicle with a fixed flight path, and the influence of the track change of the unmanned aerial vehicle as an active eavesdropper on the system eavesdropping rate is almost ignored.
Disclosure of Invention
The invention aims to solve the technical problem of providing an unmanned aerial vehicle active eavesdropping method and device for optimizing joint track and interference power, and the method and device can realize effective active interference by utilizing the characteristics of a suspicious system so as to improve the eavesdropping rate to the maximum extent.
In order to solve the technical problem, the embodiment of the present specification is implemented as follows:
an active unmanned aerial vehicle eavesdropping method combining trajectory and interference power optimization comprises the following steps:
step 30, calculating the optimal value of the sending power of the legal eavesdropper by using the initial track of the suspicious emitter, the flight track of the legal eavesdropper of the previous iteration, the user scheduling rule of the suspicious emitter and the initial value of the relaxation variable, and then calculating the sending power of the legal eavesdropper of the current iteration by using the first updating parameter, the optimal value of the sending power of the legal eavesdropper and the sending power of the legal eavesdropper of the previous iteration;
and step 50, calculating the current average reachable eavesdropping rate, returning to the step 20 if the difference value between the current average reachable eavesdropping rate and the last iterative average reachable eavesdropping rate is greater than or equal to the threshold value, and ending the step if the difference value between the current average reachable eavesdropping rate and the last iterative average reachable eavesdropping rate is less than the threshold value.
Further, in step 10, the active eavesdropping model of the unmanned aerial vehicle specifically includes: in a three-dimensional Cartesian coordinate, a suspicious transmitter sends suspicious information to M ground users, the ground users and the suspicious transmitter are respectively provided with an antenna, a legal eavesdropper is provided with two antennas and is respectively used for eavesdropping the information sent from the suspicious transmitter to the ground users and sending interference signals to interfere with the ground users, the legal eavesdropper and the suspicious transmitter are assumed to fly at a constant height, the suspicious transmitter adopts a time division multiple access transmission mode to serve the ground users, the served users are selected according to a nearest principle, the whole flight period of the legal eavesdropper is discretized and equally divided into N communication time slots, and in each time slot, the coordinate position of the legal eavesdropper is unchanged.
Further, in step 20, the first update parameter is calculated by using the updated iteration number and the second update parameter, and the formula is as follows:
γ=γ/(1+(k-1)×ζ)
wherein γ is a first update parameter, ζ is a second update parameter, and k is the number of iterations.
Further, in step 30, calculating an optimal value of the transmission power of the lawful eavesdropper by using the initial trajectory of the suspected transmitter, the flight trajectory of the lawful eavesdropper of the last iteration, the user scheduling rule of the suspected transmitter, and the initial value of the slack variable specifically includes:
where max is the function of the maximum, ηPowerFor the target value relaxation variable, XmFor introducing a relaxation variable xm[n]Set of (2), YmFor introducing a relaxation variable ym[n]S.t. as constraint, N is total number of communication time slots, xm[n]Is a relaxation variable of the nth slot, ym[n]Is a relaxation variable of the nth time slot, m represents the mth user, n represents the nth communication time slot, PB[n]At the n-thPower transmitted by a slotted suspect transmitter, PE[n]For the interference power transmitted by the lawful eavesdropper at the nth slot,for the channel model between the suspect transmitter at the nth time slot and the mth user,for the channel model between the lawful eavesdropper at the nth time slot and the mth user,for a given initial value of the slack variable, P, in the nth time slotE,maxTransmitting a peak of power, alpha, in the nth time slot for a lawful eavesdropperm[n]The parameters are scheduled for the users and,for receiving rate of mth terrestrial user in nth time slot, RE[n]Is the reception rate of the lawful eavesdropper at the nth time slot.
Further, in the step 30, calculating the transmission power of the lawful eavesdropper of the current iteration by using the first update parameter, the optimal value of the transmission power of the lawful eavesdropper and the transmission power of the lawful eavesdropper of the previous iteration, specifically:
where γ is a first update parameter, PEFor the legal eavesdropper to send the optimum value of power,transmitting power for the last iteration of the lawful eavesdropper.
Further, in step 40, the optimal value of the flight trajectory of the lawful eavesdropper is calculated by using the transmission power of the lawful eavesdropper, the initial trajectory of the suspect transmitter, the user scheduling rule of the suspect transmitter, and the initial value of the slack variable, and the formula is as follows:
qE[1]=qE[N]
where max is the function of the maximum, ηtrajFor the target value relaxation variable, XmFor introducing a relaxation variable xm[n]Set of (2), YmFor introducing a relaxation variable ym[n]S.t. as constraint, N is total number of communication time slots, xm[n]Is a relaxation variable of the nth slot, ym[n]Is a relaxation variable of the nth time slot, m represents the mth user, n represents the nth communication time slot, qE[n+1]For the position of the suspect transmitter in the (n + 1) th time slot, qE[n]For the position of lawful eavesdropper at nth time slot, L isMaximum flight distance of legal eavesdropper in each time slot, qE[l]For the position of the lawful eavesdropper in the first time slot, qE[N]For the position of the lawful eavesdropper in the last time slot, PB[n]Transmit power, P, for suspect transmitter in nth time slotE[n]The interference power transmitted in the nth slot for a lawful eavesdropper,for the channel model between the suspect transmitter at the nth time slot and the mth user,is the lower bound obtained after the successive convex optimization of the channel model between the lawful eavesdropper of the nth time slot and the Mth user,in order to introduce the relaxation variables of the process,a lower bound, a, obtained after successive convex optimization of the receiving rate of the legal eavesdropper at the nth time slotm[n]The parameters are scheduled for the user of the suspect transmitter,for receiving rate of mth terrestrial user in nth time slot, PE[n]For interference power transmitted by lawful eavesdropper in the nth time slot, λ0For the signal-to-noise ratio at the reference distance,for the relaxation variable, H is the fly height, ym[n]In order to introduce the relaxation variables of the process,given an initial value of a relaxation variable in the nth time slot, γ n]For introduced relaxation variables, dminThe minimum safe distance between the suspect transmitter and the lawful eavesdropper.
Further, in the step 40, calculating the flight trajectory of the lawful eavesdropper of the current iteration by using the first updated parameter, the optimal flight trajectory value of the lawful eavesdropper and the flight trajectory of the lawful eavesdropper of the previous iteration, specifically:
wherein γ is a first update parameter, QEFor the optimum value of the flight trajectory of the lawful eavesdropper,the flight trajectory of the legal eavesdropper of the last iteration is obtained.
Further, in step 50, the current average reachable interception rate is calculated according to the following formula:
qE[1]=qE[N]
where max is the function of the maximum, QEFor the optimum value of the flight path of a legal bug, PEIs a law of lawOptimum interference power of the eavesdropper, N being the total number of communication time slots, am[n]Scheduling parameters, R, for users of suspect transmittersEV[n]For effective eavesdropping rate, s.t. as constraint, qE[n+1]For the lawful eavesdropper location at the (n + 1) th time slot, qE[n]For the position of the lawful interception at the nth time slot, L is the maximum flight distance of the lawful interception at each time slot, qE[l]For the position of the lawful eavesdropper in the first time slot, qE[N]For the position of the lawful eavesdropper in the last slot, qE[n]For the position of the lawful eavesdropper in the nth slot, qB[n]For the position of the suspect transmitter in the nth time slot, dminFor minimum security distance between suspect transmitter and lawful eavesdropper, PE[n]Interference power, P, transmitted in the nth time slot for a lawful eavesdropperE,maxTransmitting a peak of interference power, R, for a lawful eavesdropper in the nth time slotEV[N]In order to be able to eavesdrop at a rate efficient,for receiving rate of mth terrestrial user in nth time slot, RE[n]Is the reception rate of the lawful eavesdropper at the nth time slot.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
aiming at the influence of the track change of the unmanned aerial vehicle on the effective interception rate of the system, an effective active interference scheme is adopted in the model, namely the unmanned aerial vehicle sends an interference signal while intercepting suspicious link information to interfere a suspicious receiver. In order to maximize the effective eavesdropping rate, the track and the sending interference power of the unmanned aerial vehicle are optimized by using the updating rate-assisted block coordinate descent and continuous convex optimization technology, and the effective eavesdropping rate is further improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a schematic flow chart of a method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an active eavesdropping communication system model of an unmanned aerial vehicle according to an embodiment of the invention;
FIG. 3 is a diagram illustrating an average receiving rate of UAV (E) according to an embodiment of the present invention;
fig. 4 shows flight trajectories of uav (b) and uav (e) for 160s according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of the variation of interference power with time for UAV (E) according to the present invention;
fig. 6 is a schematic diagram of the convergence of algorithm 1 according to the embodiment of the present invention.
Detailed Description
The present invention is intended to overcome the above disadvantages of the prior art, and to develop a wireless communication interception scheme of Unmanned Aerial Vehicle (UAV) as a legal eavesdropper (UAV) (e), in which a legal eavesdropper (UAV (e)) is used to intercept suspicious information sent by a suspicious transmitter (UAV (b)) to a ground suspicious receiver. By utilizing the characteristics of a suspicious system, an effective active interference scheme is provided so as to improve the eavesdropping rate to the maximum extent.
Referring to fig. 1, an embodiment of the present invention discloses an active unmanned aerial vehicle eavesdropping method based on joint trajectory and interference power optimization, including:
step 30, utilizing the initial trajectory of the suspect transmitterFlight path of last iteration legal eavesdropper(when the number of iterations k is 1, the flight trajectory of the lawful eavesdropper of the last iterationI.e. the initial trajectory of the lawful eavesdropper) Calculating the optimal value P of the transmission power of the legal eavesdropper according to the user scheduling rule A of the suspicious transmitter and the initial value of the relaxation variableEThen using the first update parameter gamma, the optimum value P of the transmission power of the lawful eavesdropperEAnd the transmission power of the lawful eavesdropper of the last iterationCalculation bookTransmit power of a sub-iterative lawful eavesdropper
Step 50, calculating the current average reachable eavesdropping rate, and if the difference value between the current average reachable eavesdropping rate and the last iterative average reachable eavesdropping rate is greater than or equal to a threshold valueReturning to step 20, if the difference between the current average reachable eavesdropping rate and the last iteration average reachable eavesdropping rate is less than the threshold valueAnd when so, ending the step.
In one possible implementation, where the model of the communication system is actively intercepted by the drone as shown in fig. 2, in a three-dimensional cartesian coordinate, uav (b) is a suspicious transmitting node that transmits suspicious information to M ground users Dm,The ground user and the UAV (B) are both provided with only one antenna; uav (e) is a lawful eavesdropper equipped with two antennas for eavesdropping on information sent from uav (b) to ground users and for sending interfering signals to interfere with ground users. Uav (e) and uav (b), both drones, are assumed to fly at a constant altitude H, which is the minimum at which a drone requires terrain avoidance, while helping to reduce its energy consumption when ascending or descending. Uav (b) uses Time Division Multiple Access (TDMA) transmission to serve users on the ground, that is, uav (b) serves only one user in each timeslot, and selects the served user according to the closest principle. To simplify the optimization problem and ensure that the receiving rate of the ground user is maximized, the flight trajectory of UAV (B) and the user scheduling rulesDetermining; the initial trajectory of the uav (e) is a circular flight trajectory with different flight radii set at the center of the geometric midpoint of the user.
Setting the whole flight cycle of the UAV to T, since the continuous time T means infinite speed constraints, which makes the trajectory design of the drone very difficult to handle, the present embodiment discretizes the whole communication process and equally divides it into N very small communication time slots, i.e. T ═ N δt. Due to the communication time slot delta compared with the flight speed of the unmanned aerial vehicletIs small, so it can be considered that at each time slot deltatAnd the coordinate position of the unmanned aerial vehicle is invariable. The position of the drone at each slot can be expressed using discretized slots as:defining M ground users DmThe coordinates on the three-dimensional Cartesian coordinates are respectively For the convenience of calculation, the time for takeoff and landing of the unmanned aerial vehicle is ignored. UAV (B) and UAV (E) have a maximum flight speed VmaxThen, the maximum flight distance of the drone in each time slot is L ═ δtVmax. In addition, the last slot of uav (b) and uav (e) will fly to the initial position.
According to the above assumptions, the flight trajectory of uav (b) is determined, and only the movement constraint of uav (e) is considered as:
qE[1]=qE[N]
to avoid collisions during flight for uav (b) and uav (e), the constraint of minimum safe distance is added:
wherein d isminRepresents the minimum safe distance between uav (b) and uav (e).
In the wireless communication system of drone-ground communication in this embodiment, assuming that the channels of UAV (b), UAV (e) and all ground nodes are line-of-sight (LoS), in the nth communication slot, the channel model of UAV and all ground nodes is:
the channel model between uav (b) and uav (e) is:
wherein, beta0Is defined as the distance d0Channel power gain at 1 m.
The transmit power constraint for uav (e) is as follows:
wherein, PE[n]Interference power, P, transmitted for UAV (E) in nth time slotE,maxUav (e) sends a peak in power.
In the nth slot, the receiving rate of uav (e) may be expressed as:
wherein, PB[n]For the transmit power at the nth time slot uav (b),represents the average receiving rate of uav (e).
In the nth time slot, the ground user DmThe reception rate of (d) can be expressed as:
Since UAV (E) operates in active eavesdropping mode whenUAV (E) can reliably decode messages from UAV (B) when the effective eavesdropping rate is equal toWhen in useThe lawful eavesdropper uav (e) cannot decode the information without error, when the effective eavesdropping rate is equal to 0. Thus, the effective eavesdropping rate of the legitimate eavesdropper uav (e) can be expressed as:
the value of the average reachable interception rate is maximized by jointly optimizing the trajectory and interference power of the uav (e) over all time slots.
The optimization problem for the average reachable eavesdropping rate can be expressed as:
qE[1]=qE[N]
can be broken down into two sub-problems: 1) optimizing interference power of UAV (E); 2) the trajectory of uav (e) is optimized and then the two sub-problems are solved alternately. The method comprises the following specific steps:
step one, optimizing interference power of UAV (unmanned aerial vehicle) (E)
Given the initial trajectory of UAV (B) and UAV (E), i.e. givenUser scheduling rule A of UAV (UAV), (B) and transmission power of UAV (B)The uav (e) transmit power is optimized. Introducing a relaxation variable etapower,Andand adopting Successive Convex optimization (SCA) technique to use first-order Taylor expansion at given initial valueTo pairApproximation, the objective function (P1) is transformed into a sub-problem solving the optimal transmit power:
the problem (P2) is a convex optimization problem that can be effectively solved by a convex optimization solver such as CVX.
Step two, optimizing the flight track of UAV (unmanned aerial vehicle) (E)
Initial transmit power given for UAV (B) and UAV (E)Flight trajectory of UAV (B)And user scheduling rules A for UAV (B), for UAV (E) flight trajectoryAnd (6) optimizing. Introducing relaxation variablesAnd ηtrajAnd adopting Successive Convex optimization (SCA) technique to use first-order Taylor expansion at given initial valueTo pairApproximation, the objective function (P1) is converted into a subproblem solving the optimal flight trajectory:
qE[1]=qE[N]
wherein the content of the first and second substances,and gamma n]Respectively obtained by the following equation under the given initial value to carry out successive convex optimization (SCA) approximation.
The problem (P3) is a convex optimization problem that can be effectively solved by a convex optimization solver such as CVX.
The specific algorithm steps are as follows:
and 3, assisting the coordinate descent of the block by using the updating rate, and obtaining the sending power of the UAV (E) and the flight track of the UAV (E) by using the updating rate in the steps 4 and 5 to realize rapid convergence.
The following embodiment of the present invention is further described in detail with reference to the simulation diagram, in order to show the performance advantages of the method of the embodiment of the present invention, compared with two optimization schemes:
in the first scheme, the flight track of a fixed UAV (E) is optimized in power;
and in the second scheme, the transmitting power of the UAV (E) is fixed for carrying out track optimization.
The required system parameter settings are as follows: suppose there are 4 users on the ground, the locations are (800), (-800, -800) and (800, -800), respectively, M is 4, Vmax=40m/s,H=50m,PB=16dBm,γ=0.5,ζ=0.08
Figure 3 shows uav (e) average receive rate versus duration of flight for the same duration of flight. By comparison, it can be observed that the algorithm provided by the embodiment of the invention is obviously superior to the two reference schemes of power optimization of the flight trajectory of the fixed uav (e) and trajectory optimization of the fixed transmission power, which proves the effectiveness of the joint optimization of the trajectory and the transmission power of the uav (e) in improving the eavesdropping rate. Especially, compared with the UAV (E) power optimization, the average receiving rate is obviously improved. This is because the fixed uav (e) flight trajectory limits its maneuverability potential, and when performing trajectory joint power optimization, the power optimization is superimposed on the pure trajectory optimization, so that uav (e) is more flexible, and therefore the average receiving rate of uav (e) is higher than that of the other two methods.
Fig. 4 shows a comparison graph of the flight trajectory of uav (e) and the initial trajectory of uav (e) and the trajectory of uav (b) implemented by the algorithm of the embodiment of the present invention, where the ground user is represented by a square. It can be observed that uav (b) makes individual visits over each user with a fixed flight trajectory, and uav (e) agrees with the flight trajectory of uav (b) after optimization, thereby enabling eavesdropping of the information sent by uav (b).
Fig. 5 shows the time variation trend of the uav (e) transmit interference power realized by the algorithm of the embodiment of the present invention. Fig. 4 in combination with fig. 3 shows that when T is 0s, T is 40s, T is 80s, T is 120s and T is 160s, the corresponding uav (b) and uav (e) fly to the respective user overhead position, where uav (e) is closer to the user, so uav (e) sends interference power down in order to maximize the effective eavesdropping rate.
Fig. 6 shows the convergence of the maximum effective interception rate of the system of the algorithm of the embodiment of the present invention when T is 160 s. As can be seen from the figure, the maximum eavesdropping rate of the proposed algorithm increases rapidly with increasing number of iterations, the algorithm converging after about 18 iterations.
The technical scheme that provides in this application embodiment has adopted an effectual initiative interference scheme to the influence of its track change of unmanned aerial vehicle to the effective rate of eavesdropping of system in the model, and unmanned aerial vehicle sends interfering signal when eavesdropping suspicious link information promptly, disturbs suspicious receiver. In order to maximize the effective eavesdropping rate, the track and the sending interference power of the unmanned aerial vehicle are optimized by using the updating rate-assisted block coordinate descent and continuous convex optimization technology, and the effective eavesdropping rate is further improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.
Claims (8)
1. An active unmanned aerial vehicle eavesdropping method combining track and interference power optimization is characterized by comprising the following steps:
step 10, respectively setting an initial track of a suspicious emitter, initial transmitting power of the suspicious emitter, an initial track of a legal eavesdropper, initial transmitting power of the legal eavesdropper, an initial value of a relaxation variable, a user scheduling rule of the suspicious emitter, a first updating parameter, a second updating parameter, an initial value of iteration times and a threshold value in an active eavesdropping model of the unmanned aerial vehicle;
step 20, updating the iteration times, and then calculating a first updating parameter by using the updated iteration times and a second updating parameter;
step 30, calculating the optimal value of the sending power of the legal eavesdropper by using the initial track of the suspicious emitter, the flight track of the legal eavesdropper of the previous iteration, the user scheduling rule of the suspicious emitter and the initial value of the relaxation variable, and then calculating the sending power of the legal eavesdropper of the current iteration by using the first updating parameter, the optimal value of the sending power of the legal eavesdropper and the sending power of the legal eavesdropper of the previous iteration;
step 40, calculating the optimal value of the flight trajectory of the legal eavesdropper by using the sending power of the legal eavesdropper, the initial trajectory of the suspicious emitter, the user scheduling rule of the suspicious emitter and the initial value of the relaxation variable, and then calculating the flight trajectory of the legal eavesdropper of the current iteration by using the first updating parameter, the optimal value of the flight trajectory of the legal eavesdropper and the flight trajectory of the legal eavesdropper of the previous iteration;
and step 50, calculating the current average reachable eavesdropping rate, returning to the step 20 if the difference value between the current average reachable eavesdropping rate and the last iterative average reachable eavesdropping rate is greater than or equal to the threshold value, and ending the step if the difference value between the current average reachable eavesdropping rate and the last iterative average reachable eavesdropping rate is less than the threshold value.
2. The method of claim 1, wherein: in the step 10, the active eavesdropping model of the unmanned aerial vehicle specifically includes: in a three-dimensional Cartesian coordinate, a suspicious transmitter sends suspicious information to M ground users, the ground users and the suspicious transmitter are respectively provided with an antenna, a legal eavesdropper is provided with two antennas and is respectively used for eavesdropping the information sent from the suspicious transmitter to the ground users and sending interference signals to interfere with the ground users, the legal eavesdropper and the suspicious transmitter are assumed to fly at a constant height, the suspicious transmitter adopts a time division multiple access transmission mode to serve the ground users, the served users are selected according to a nearest principle, the whole flight period of the legal eavesdropper is discretized and equally divided into N communication time slots, and in each time slot, the coordinate position of the legal eavesdropper is unchanged.
3. The method of claim 1, wherein: in step 20, the first update parameter is calculated by using the updated iteration number and the second update parameter, and the formula is as follows:
γ=γ/(1+(k-1)×ζ)
wherein γ is a first update parameter, ζ is a second update parameter, and k is the number of iterations.
4. The method of claim 1, wherein: in step 30, calculating an optimal value of the transmission power of the lawful eavesdropper by using the initial trajectory of the suspected transmitter, the flight trajectory of the lawful eavesdropper of the last iteration, the user scheduling rule of the suspected transmitter, and the initial value of the slack variable, specifically including:
where max is the function of the maximum, ηPowerFor the target value relaxation variable, XmFor introducing a relaxation variable xm[n]Set of (2), YmFor introducing a relaxation variable ym[n]S.t. as constraint, N is total number of communication time slots, xm[n]Is a relaxation variable of the nth slot, ym[n]Is a relaxation variable of the nth time slot, m represents the mth user, n represents the nth communication time slot, PB[n]Power, P, transmitted for the suspect transmitter in the nth time slotE[n]For the interference power transmitted by the lawful eavesdropper at the nth slot,for the channel model between the suspect transmitter at the nth time slot and the mth user,for lawful eavesdropping at nth time slot and Mth userThe channel model of the channel between the two,for a given initial value of the slack variable, P, in the nth time slotE,maxTransmitting a peak of power, alpha, in the nth time slot for a lawful eavesdropperm[n]The parameters are scheduled for the users and,for receiving rate of mth terrestrial user in nth time slot, RE[n]Is the reception rate of the lawful eavesdropper at the nth time slot.
5. The method of claim 1, wherein: in step 30, calculating the transmission power of the lawful eavesdropper of the current iteration by using the first update parameter, the optimal value of the transmission power of the lawful eavesdropper and the transmission power of the lawful eavesdropper of the previous iteration, specifically:
6. The method of claim 1, wherein: in step 40, the optimal value of the flight trajectory of the lawful eavesdropper is calculated by using the transmission power of the lawful eavesdropper, the initial trajectory of the suspect transmitter, the user scheduling rule of the suspect transmitter, and the initial value of the slack variable, and the formula is as follows:
qE[1]=qE[N]
where max is the function of the maximum, ηtrajFor the target value relaxation variable, XmFor introducing a relaxation variable xm[n]Set of (2), YmFor introducing a relaxation variable ym[n]S.t. as constraint, N is total number of communication time slots, xm[n]Is a relaxation variable of the nth slot, ym[n]Is a relaxation variable of the nth time slot, m represents the mth user, n represents the nth communication time slot, qE[n+1]For the position of the suspect transmitter in the (n + 1) th time slot, qE[n]For the position of the lawful interception at the nth time slot, L is the maximum flight distance of the lawful interception at each time slot, qE[l]For the position of the lawful eavesdropper in the first time slot, qE[N]For a lawful eavesdropper inPosition of last time slot, PB[n]Transmit power, P, for suspect transmitter in nth time slotE[n]The interference power transmitted in the nth slot for a lawful eavesdropper,for the channel model between the suspect transmitter at the nth time slot and the mth user,is the lower bound obtained after the successive convex optimization of the channel model between the lawful eavesdropper of the nth time slot and the Mth user,in order to introduce the relaxation variables of the process,a lower bound, a, obtained after successive convex optimization of the receiving rate of the legal eavesdropper at the nth time slotm[n]The parameters are scheduled for the user of the suspect transmitter,for receiving rate of mth terrestrial user in nth time slot, PE[n]For interference power transmitted by lawful eavesdropper in the nth time slot, λ0For the signal-to-noise ratio at the reference distance,for the relaxation variable, H is the fly height, ym[n]In order to introduce the relaxation variables of the process,given an initial value of a relaxation variable in the nth time slot, γ n]For introduced relaxation variables, dminThe minimum safe distance between the suspect transmitter and the lawful eavesdropper.
7. The method of claim 1, wherein: in step 40, calculating the flight trajectory of the lawful eavesdropper of the current iteration by using the first updated parameter, the optimal flight trajectory value of the lawful eavesdropper and the flight trajectory of the lawful eavesdropper of the previous iteration, specifically:
8. The method of claim 1, wherein: in step 50, the current average reachable interception rate is calculated according to the following formula:
qE[1]=qE[N]
where max is the function of the maximum, QEFor the optimum value of the flight path of a legal bug, PEFor the optimal interference power of a lawful eavesdropper, N is the total number of communication time slots, am[n]Scheduling parameters, R, for users of suspect transmittersEV[n]For effective eavesdropping rate, s.t. as constraint, qE[n+1]For the lawful eavesdropper location at the (n + 1) th time slot, qE[n]For the position of the lawful interception at the nth time slot, L is the maximum flight distance of the lawful interception at each time slot, qE[l]For the position of the lawful eavesdropper in the first time slot, qE[N]For the position of the lawful eavesdropper in the last slot, qE[n]For the position of the lawful eavesdropper in the nth slot, qB[n]For the position of the suspect transmitter in the nth time slot, dminFor minimum security distance between suspect transmitter and lawful eavesdropper, PE[n]Interference power, P, transmitted in the nth time slot for a lawful eavesdropperE,maxTransmitting a peak of interference power, R, for a lawful eavesdropper in the nth time slotEV[N]In order to be able to eavesdrop at a rate efficient,for receiving rate of mth terrestrial user in nth time slot, RE[n]Is the reception rate of the lawful eavesdropper at the nth time slot.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011388442.XA CN112512037B (en) | 2020-12-01 | 2020-12-01 | Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011388442.XA CN112512037B (en) | 2020-12-01 | 2020-12-01 | Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112512037A true CN112512037A (en) | 2021-03-16 |
CN112512037B CN112512037B (en) | 2023-12-15 |
Family
ID=74968505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011388442.XA Active CN112512037B (en) | 2020-12-01 | 2020-12-01 | Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112512037B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113490176A (en) * | 2021-06-01 | 2021-10-08 | 武汉理工大学 | Unmanned aerial vehicle communication anti-interference method based on three-dimensional track power optimization |
CN113489531A (en) * | 2021-08-13 | 2021-10-08 | 华侨大学 | Unmanned aerial vehicle cooperative communication method for joint optimization of power and three-dimensional trajectory |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110202203A1 (en) * | 2008-08-08 | 2011-08-18 | Saab Ab | Safe termination of uav |
CN109525985A (en) * | 2018-10-25 | 2019-03-26 | 华侨大学 | A kind of wireless energy acquisition full duplex active interception method |
CN109640257A (en) * | 2019-01-23 | 2019-04-16 | 中国人民解放军陆军工程大学 | A kind of IOT network security transmission method based on unmanned plane |
KR101999942B1 (en) * | 2019-04-09 | 2019-07-12 | 재단법인대구경북과학기술원 | Methods and devices for determining the position of the jammers |
CN110022557A (en) * | 2019-03-22 | 2019-07-16 | 西安交通大学 | A kind of physical layer active sniffing method towards non-orthogonal multiple access system |
CN110430576A (en) * | 2019-07-17 | 2019-11-08 | 大连理工大学 | The non-orthogonal multiple access safety in network of unmanned plane auxiliary is taken can communication means |
CN110677850A (en) * | 2019-10-08 | 2020-01-10 | 常熟理工学院 | Internet of vehicles anti-eavesdropping method based on intermittent cooperative interference |
CN110996254A (en) * | 2019-12-13 | 2020-04-10 | 山东大学 | Robust optimization method for power and interference unmanned aerial vehicle track in communication system |
CN111343712A (en) * | 2020-03-05 | 2020-06-26 | 中国科学院上海微系统与信息技术研究所 | Unmanned aerial vehicle-assisted cognitive wireless network communication safety control method |
-
2020
- 2020-12-01 CN CN202011388442.XA patent/CN112512037B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110202203A1 (en) * | 2008-08-08 | 2011-08-18 | Saab Ab | Safe termination of uav |
CN109525985A (en) * | 2018-10-25 | 2019-03-26 | 华侨大学 | A kind of wireless energy acquisition full duplex active interception method |
CN109640257A (en) * | 2019-01-23 | 2019-04-16 | 中国人民解放军陆军工程大学 | A kind of IOT network security transmission method based on unmanned plane |
CN110022557A (en) * | 2019-03-22 | 2019-07-16 | 西安交通大学 | A kind of physical layer active sniffing method towards non-orthogonal multiple access system |
KR101999942B1 (en) * | 2019-04-09 | 2019-07-12 | 재단법인대구경북과학기술원 | Methods and devices for determining the position of the jammers |
CN110430576A (en) * | 2019-07-17 | 2019-11-08 | 大连理工大学 | The non-orthogonal multiple access safety in network of unmanned plane auxiliary is taken can communication means |
CN110677850A (en) * | 2019-10-08 | 2020-01-10 | 常熟理工学院 | Internet of vehicles anti-eavesdropping method based on intermittent cooperative interference |
CN110996254A (en) * | 2019-12-13 | 2020-04-10 | 山东大学 | Robust optimization method for power and interference unmanned aerial vehicle track in communication system |
CN111343712A (en) * | 2020-03-05 | 2020-06-26 | 中国科学院上海微系统与信息技术研究所 | Unmanned aerial vehicle-assisted cognitive wireless network communication safety control method |
Non-Patent Citations (2)
Title |
---|
周洁: "基于博弈论的窃听信道安全性能研究", 《中国优秀硕士学位论文全文数据库》, no. 6 * |
陆海全等: "无人机辅助可疑中继系统下的主动窃听", 《南京邮电大学学报(自然科学版)》, no. 2 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113490176A (en) * | 2021-06-01 | 2021-10-08 | 武汉理工大学 | Unmanned aerial vehicle communication anti-interference method based on three-dimensional track power optimization |
CN113490176B (en) * | 2021-06-01 | 2022-05-13 | 武汉理工大学 | Unmanned aerial vehicle communication anti-interference method based on three-dimensional track power optimization |
CN113489531A (en) * | 2021-08-13 | 2021-10-08 | 华侨大学 | Unmanned aerial vehicle cooperative communication method for joint optimization of power and three-dimensional trajectory |
CN113489531B (en) * | 2021-08-13 | 2022-11-04 | 华侨大学 | Unmanned aerial vehicle cooperative communication method for joint optimization of power and three-dimensional trajectory |
Also Published As
Publication number | Publication date |
---|---|
CN112512037B (en) | 2023-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | Resource allocation and trajectory optimization for UAV-enabled multi-user covert communications | |
Zhou et al. | Joint optimization of a UAV's trajectory and transmit power for covert communications | |
Yao et al. | Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks | |
CN110430576B (en) | Safe energy-carrying communication method in non-orthogonal multiple access network assisted by unmanned aerial vehicle | |
CN109640257B (en) | IOT network secure transmission method based on unmanned aerial vehicle | |
Miao et al. | Cooperative jamming for secure UAV-enabled mobile relay system | |
Duo et al. | Joint trajectory and power optimization for securing UAV communications against active eavesdropping | |
CN112512037B (en) | Unmanned aerial vehicle active eavesdropping method based on joint track and interference power optimization | |
CN108092737A (en) | The relaying unmanned aerial vehicle flight path planing method of criterion is maximized based on secrecy capacity | |
Darsena et al. | Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack | |
Li et al. | Bloothair: A secure aerial relay system using bluetooth connected autonomous drones | |
Wen et al. | Securing UAV communication with mobile UAV eavesdroppers: Joint trajectory and communication design | |
Abdalla et al. | Securing mobile multiuser transmissions with UAVs in the presence of multiple eavesdroppers | |
Yang et al. | Covert communication for cellular and X2U-enabled UAV networks with active and passive wardens | |
CN113904743B (en) | Safe communication resource optimization design method for unmanned aerial vehicle relay system | |
Dai et al. | Reinforcement learning based power control for vanet broadcast against jamming | |
CN114070379A (en) | Unmanned aerial vehicle flight path optimization and resource allocation method based on safety energy efficiency fairness | |
Tao et al. | Resource allocation and trajectories design for UAV-assisted jamming cognitive UAV networks | |
Zhang et al. | Power allocation for proactive eavesdropping with spoofing relay in UAV systems | |
CN115189801B (en) | Artificial noise enhanced covert communication design method in unmanned aerial vehicle network | |
Bashir et al. | Opportunistic cooperative relaying protocol for UAV-assisted flying Adhoc network | |
CN115603854A (en) | Unmanned aerial vehicle cooperative interference covert communication method facing cognitive radio network | |
Grodi et al. | Performance evaluation of unmanned aerial vehicle ad hoc networks | |
CN115802494A (en) | Unmanned aerial vehicle covert communication system track optimization and communication resource allocation method and system | |
CN115529103A (en) | Covert communication system with cooperation of double unmanned aerial vehicles and method for maximizing average covert rate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |