{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:10:09Z","timestamp":1772554209664,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T00:00:00Z","timestamp":1551744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010098","name":"Shanghai Association for Science and Technology","doi-asserted-by":"publisher","award":["18DZ1200500"],"award-info":[{"award-number":["18DZ1200500"]}],"id":[{"id":"10.13039\/100010098","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71171045"],"award-info":[{"award-number":["71171045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772130"],"award-info":[{"award-number":["61772130"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301118"],"award-info":[{"award-number":["61301118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003395","name":"Shanghai Municipal Education Commission","doi-asserted-by":"publisher","award":["14YZ130"],"award-info":[{"award-number":["14YZ130"]}],"id":[{"id":"10.13039\/501100003395","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International S&amp;T Cooperation Program of Shanghai Science and Technology Commission","award":["15220710600"],"award-info":[{"award-number":["15220710600"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and\/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV\u2019s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.<\/jats:p>","DOI":"10.3390\/s19051126","type":"journal-article","created":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T11:19:50Z","timestamp":1551784790000},"page":"1126","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels"],"prefix":"10.3390","volume":"19","author":[{"given":"Xiaoming","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai 201620, China"},{"name":"Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China"},{"name":"Shanghai Earthquake Administration, Shanghai 200062, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3012-8497","authenticated-orcid":false,"given":"Demin","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai 201620, China"},{"name":"Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China"}]},{"given":"Chang","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai 201620, China"},{"name":"Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China"}]},{"given":"Xiaolu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai 201620, China"},{"name":"Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China"}]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, UNSW Sydney, Sydney, NSW 2052, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-2392","authenticated-orcid":false,"given":"Kai","family":"Li","sequence":"additional","affiliation":[{"name":"CISTER Research Unit, 4200-135 Porto, Portugal"}]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[{"name":"CISTER Research Unit, 4200-135 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2019,3,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"76395","DOI":"10.1109\/ACCESS.2018.2880979","article-title":"Protecting secure communication under UAV smart attack with imperfect channel estimation","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A survey on wireless security: Technical challenges, recent advances and future trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TWC.2013.112513.130760","article-title":"Throughput maximization in wireless powered communication networks","volume":"13","author":"Ju","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"5370","DOI":"10.1109\/TSP.2014.2352604","article-title":"Energy beamforming with one-bit feedback","volume":"62","author":"Xu","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4798","DOI":"10.1109\/TSP.2014.2340817","article-title":"Multiuser MISO beamforming for simultaneous wireless information and power transfer","volume":"62","author":"Xu","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2475","DOI":"10.1109\/TSP.2016.2526965","article-title":"A general design framework for MIMO wireless energy transfer with limited feedback","volume":"64","author":"Xu","year":"2016","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tran, H., and Zepernick, H.J. (2016, January 27\u201329). Proactive attack: A strategy for legitimate eavesdropping. Proceedings of the IEEE International Conference on Communications and Electronics (ICCE), Ha Long, Vietnam.","DOI":"10.1109\/CCE.2016.7562679"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1109\/JSTSP.2016.2600519","article-title":"Wireless information surveillance via proactive eavesdropping with spoofing relay","volume":"10","author":"Zeng","year":"2016","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ayub, M.F., Ghawash, F., Shabbir, M.A., Kamran, M., and Butt, F.A. (2018, January 22\u201323). Next Generation Security and Surveillance System Using Autonomous Vehicles. Proceedings of the 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), Wuhan, China.","DOI":"10.1109\/UPINLBS.2018.8559744"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/MWC.2017.1600279","article-title":"Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm","volume":"24","author":"Xu","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1109\/TWC.2017.2666138","article-title":"Proactive eavesdropping via cognitive jamming in fading channels","volume":"16","author":"Xu","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1109\/TWC.2012.020712.111298","article-title":"Pilot contamination for active eavesdropping","volume":"11","author":"Zhou","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, X., Li, K., Kanhere, S.S., Li, D., Zhang, X., and Tovar, E. (2017, January 26\u201330). PELE: Power efficient legitimate eavesdropping via jamming in UAV communications. Proceedings of the Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986320"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lakshmanan, S., Tsao, C., Sivakumar, R., and Sundaresan, K. (2008, January 17\u201320). Securing wireless data networks against eavesdropping using smart antennas. Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.87"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-ofservice in wireless sensor networks: Attacks and defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Perv. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MWC.2007.4396947","article-title":"A survey of routing attacks in mobile ad hoc networks","volume":"14","author":"Kannhavong","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Meyer, U., and Wetzel, S. (2004, January 1). A man-in-themiddle attack on UMTS. Proceedings of the 3rd ACM Workshop Wireless Security, Philadelphia, PA, USA.","DOI":"10.1145\/1023646.1023662"},{"key":"ref_18","unstructured":"Ohigashi, T., and Morii, M. (2009, January 6\u20137). A practical message falsification attack on WPA. Proceedings of the Joint Workshop Inf. Security, Kaohsiung, Taiwan."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","article-title":"Physical layer security in wireless networks: A tutorial","volume":"18","author":"Shiu","year":"2011","journal-title":"IEEE Wirel. Commun."},{"key":"ref_20","unstructured":"Christof, P., Pelzl, J., and Preneel, B. (2009). Understanding Cryptography: A Textbook for Students and Practitioners, Springer Science & Business Media."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MSP.2004.54","article-title":"Quantum cryptography","volume":"2","author":"Elliott","year":"2004","journal-title":"IEEE Secur. Priv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9042","DOI":"10.1109\/TVT.2018.2849644","article-title":"Robust trajectory and transmit power design for secure UAV communications","volume":"67","author":"Cui","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Yeoh, P.L., Chen, H., Li, Y., Hardjawana, W., and Vucetic, B. (2017, January 13\u201315). Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer. Proceedings of the 11th IEEE Australia International Conference on Signal Processing and Communication Systems (ICSPCS), Surfers Paradise, QLD, Australia.","DOI":"10.1109\/ICSPCS.2017.8270455"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/LWC.2017.2680449","article-title":"Improving physical layer security using UAV-enabled mobile relaying","volume":"6","author":"Wang","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/LCOMM.2017.2763135","article-title":"Joint trajectory and power optimization for UAV relay networks","volume":"22","author":"Zhang","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_26","unstructured":"Mukherjee, A., and Swindlehurst, A.L. (November, January 31). Optimal strategies for countering dual-threat jamming\/eavesdropping-capable adversaries in mimo channels. Proceedings of the Military Communications Conference, San Jose, CA, USA."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Li, Y., Xiao, L., Dai, H., and Poor, H.V. (2017, January 21\u201325). Game theoretic study of protecting MIMO transmissions against smart attacks. Proceedings of the IEEE International Conference on Communications (ICC), Paris, France.","DOI":"10.1109\/ICC.2017.7996461"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/TSP.2012.2222386","article-title":"Jamming games in the MIMO wiretap channel with an active eavesdropper","volume":"61","author":"Mukherjee","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1109\/TIT.2006.872984","article-title":"Capacity and power allocation for fading MIMO channels with channel estimation error","volume":"52","author":"Yoo","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Edman, M., Kiayias, A., and Yener, B. (2011, January 10). On passive inference attacks against physical-layer key extraction?. Proceedings of the Fourth European Workshop on System Security, ACM, Salzburg, Austria.","DOI":"10.1145\/1972551.1972559"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIT.2006.872968","article-title":"An achievable region for the Gaussian wiretap channel with side information","volume":"52","author":"Mitrpant","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_32","unstructured":"Negi, R., and Goel, S. (2005, January 28). Secret communication using artificial noise. Proceedings of the IEEE International Conference on Vehicular Technology (VTC), Dallas, TX, USA."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4962","DOI":"10.1109\/TSP.2013.2269049","article-title":"Improving physical layer secrecy using fullduplex jamming receivers","volume":"61","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wu, Q., Mei, W., and Zhang, R. (arXiv, 2019). Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective, arXiv, preprint.","DOI":"10.1109\/MWC.001.1900050"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/LWC.2018.2865774","article-title":"UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel","volume":"8","author":"Li","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zhang, G., Wu, Q., Cui, M., and Zhang, R. (2019). Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun.","DOI":"10.1109\/TWC.2019.2892461"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1109\/TMC.2015.2467381","article-title":"Energy-efficient cooperative relaying for unmanned aerial vehicles","volume":"15","author":"Li","year":"2016","journal-title":"IEEE Trans. Mobile Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/0304-4165(94)90169-4","article-title":"The captive bubble method for the evaluation of pulmonary surfactant: Surface tension, area, and volume calculations","volume":"1200","author":"Schoel","year":"1994","journal-title":"Biochim. Biophys. Acta (BBA)-Gen. Subj."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Boyd, S., and Vandenberghe, L. (2004). Convex Optimization, Cambridge University Press.","DOI":"10.1017\/CBO9780511804441"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"6614","DOI":"10.1109\/TCOMM.2018.2865922","article-title":"Common throughput maximization in UAV-enabled OFDMA systems with delay consideration","volume":"66","author":"Wu","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2109","DOI":"10.1109\/TWC.2017.2789293","article-title":"Joint trajectory and communication design for multi-UAV enabled wireless networks","volume":"17","author":"Wu","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/5\/1126\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:36:31Z","timestamp":1760186191000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/5\/1126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,5]]},"references-count":42,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["s19051126"],"URL":"https:\/\/doi.org\/10.3390\/s19051126","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,5]]}}}