1 Introduction

Unmanned aerial vehicles (UAVs) have been widely used in wireless communications recently (e.g., communication relay, information dissemination, and data collection) due to the controllable mobility and ever-decreasing manufacturing cost [16]. On one hand, the integration of UAVs into wireless communications provides new opportunities, such as the on-demand deployment and high flexibility. On the other hand, it also renders the safety problem more emergent. Thus, the secure transmission in UAV-aided communications has received significant research interest [710]. However, the UAVs may also be misused by malicious users to jeopardize public safety [11]. To tackle this issue, wireless surveillance, in which authorized agencies eavesdrop on the communications of suspicious users such as criminals and terrorists legitimately, has been introduced [1119]. In the field of wireless surveillance, passive eavesdropping [12] and proactive eavesdropping [13] are two fundamental strategies. To be specific, the proactive eavesdropping via jamming method has been studied in [20] and [21] to maximize the eavesdropping rate. In [22], the authors propose a proactive eavesdropping with spoofing relay method, which further enhances the eavesdropping capability. Besides the point-to-point suspicious communications, the suspicious relay communication scenarios are investigated in [2325], where different strategies of the legitimate monitor are proposed. Subsequently, the authors in [26, 27] consider the proactive eavesdropping over multiple suspicious communication links, and the eavesdropping energy efficiency (EEE) is maximized. Meanwhile, Han et al. [28] considers the jamming-assisted eavesdropping over parallel fading channels and proposes the optimal jamming design to maximize the the eavesdropping success probability.

Notably, the suspicious relays in aforementioned literature are all located on the ground, whereas the UAV-aided relay may be dispatched by the suspicious users to assist their communications due to terrain obstacles. Enlightened by this, we attempt to study a new surveillance scenario, where the full-duplex legitimate monitor under perfect self-interference cancelation (SIC) [20, 21] tries to overhear the suspicious information forwarded by a UAV-aided suspicious relay. Moreover, two alternative relaying protocols, i.e., AF and DF [2932], are available for the suspicious relay. Specifically, the AF scheme has lower implementation complexity and smaller processing delay than DF, while DF scheme attains a higher suspicious rate than AF. Thus, the suspicious relay may select a superior scheme in the practical situation. In this context, the legitimate monitor carefully designs the optimal jamming strategies according to these two protocols. The main contributions of this paper are summarized as follows:

To the best of the authors’ knowledge, this paper is the first attempt in the existing literature to study the proactive eavesdropping in the UAV-aided suspicious relay system. According to the UAV-aided relay’s trajectory under both the AF and DF relaying protocols, two optimization problems are then respectively formulated to maximize the average effective eavesdropping rate by optimizing the jamming power allocation solutions. The formulated optimization problems are both non-convex and thus are difficult to be solved optimally.

We derive the optimal jamming power allocation solutions in closed-form for both the original non-convex problems, respectively. Specifically, we first verify that the two optimization problems satisfy the time-sharing property, thus guaranteeing a zero duality gap. Then the Lagrange dual method is used to attain the optimal solutions.

2 Method

This paper considers a new wireless surveillance scenario, where a legitimate monitor attempts to eavesdrop on the dubious messages forwarded by an unmanned aerial vehicle (UAV)-aided suspicious relay.

In order to maximize the average effective eavesdropping rate, two optimization problems are formulated according to the UAV-aided relay’s relaying protocols (i.e., AF and DF). Due to the fact that these two optimization problems are non-convex, they cannot be directly solved with standard convex optimization techniques. In particular, we first verify that the two optimization problems satisfy the time-sharing property, thus guaranteeing a zero duality gap. Based on this result, the Lagrange dual method is used to attain the optimal solutions. Then, numerical results are provided to verify the performance of the proposed proactive eavesdropping approach.

The rest of this paper is organized as follows. Section 3 introduces the system model and formulates two optimization problems under the AF and DF relaying protocols of the suspicious UAV-aided relay. In Section 4, we derive the optimal solutions to these two optimization problems. Section 5 shows numerical results that justify the performance of the proposed proactive eavesdropping approach. Finally, we conclude this paper in Section 6.

3 System model and problem formulation

As illustrated in Fig. 1, we consider a new legitimate surveillance system, where a full-duplex legitimate monitor E aims to eavesdrop on the malicious communications forwarded by a UAV-enabled suspicious relay with two relaying protocols. Assuming that there is no direct link from the suspicious transmitter S to the suspicious receiver D and the legitimate monitor E due to the severe blockage. The UAV-aided suspicious relay R is thus deployed to assist their communication, which operates in frequency division duplex (FDD) manner with the equal bandwidth for receiving and transmitting. Without loss of generality, S, D, and E are located at (0,0,0),(L,0,0), and (xE,yE,0) in a Cartesian coordinate system, respectively. As an initial study, the relay is supposed to follow the energy-efficient circular trajectory of radius L/2 that is centered at (L/2,0,H), and the speed v and altitude H are constant. Note that with the circular trajectory, the UAV can fly with smooth turning angles. For ease of exposition, the cycling period T, T=πL/v, is then discretized into N equally spaced time slots, i.e., T=Nδt. Furthermore, the perfect channel state information (CSI) of all links are assumed to be available at E for characterizing the fundamental performance limit of proactive eavesdropping [13, 18, 22]. Particularly, since wireless channels between ground nodes and the UAV are dominated by LoS links in this paper, the legitimate monitor can perfectly obtain the channel gains of UAV-ground links by detecting the locations of corresponding nodes. In addition, it is practical that the suspicious transmitter is not aware of the existence of the legitimate monitor, and it only has knowledge of the CSI of the suspicious channelFootnote 1.

Fig. 1
figure 1

System model of proactive eavesdropping in a UAV-aided suspicious relay system

In general, the communication links from the UAV to ground users are dominated by LoS links. Thus, the channel power gain gij[n] in the nth time slot can be given by

$$ {g_{ij}}[\!n] = {\beta_{0}}d_{ij}^{- 2}[\!n],\ {\mathrm{ }}ij \in \{ SR,RD,RE\},\ n \in {\mathrm{{\mathcal{N}}}}, $$
(1)

where β0 represents the channel power at the reference distance d0=1 m, dij[ n] is the distance between ij, and \({\mathrm {{\mathcal {N}}}} = \left \{ {1, \cdots,N} \right \}\). The suspicious transmitter and relay are considered to adopt the constant transmission power pS and pR, which are subjected to the average power constraint. Under this setup, E employs a jamming power Q[ n] to interfere with D in time slot n. It is worth mentioning that the jamming signal is in the transmitting band of the relay to effectively perform proactive eavesdropping, and the reception of R will be free from the jamming in FDD mode. Additionally, adaptive rate transmission is considered at the suspicious source according to the effective channel condition at the suspicious receiver. Thus, the suspicious transmitter adaptively adjusts its transmitting rate to a level decodable by the suspicious receiver [18, 22]. Two protocols of the relay are discussed in the following subsections.

3.1 AF relaying

For AF relaying, it has lower implementation complexity and smaller processing delay [22]. The suspicious relay amplifies the received signal in the nth time slot by the factor \( \eta [n] = \sqrt {\frac {{{p_{R}}}}{{{p_{S}}{g_{SR}}[n] + {\sigma ^{2}}}}}\). Consequently, the received signal-to-interference-plus-noise ratio (SINR) at D and SNR at E are respectively given by

$$ {\gamma_{D}}(Q[\!n]) = \frac{{{\eta^{2}}[\!n]{p_{S}}{g_{RD}}[\!n]{g_{SR}}[\!n]}}{{{\eta^{2}}[\!n]{g_{RD}}[\!n]{\sigma^{2}} + Q[\!n]{{\left| {{h_{ED}}} \right|}^{2}} + {\sigma^{2}}}}, $$
(2)
$$ {\gamma_{E}}[\!n] = \frac{{{\eta^{2}}[\!n]{p_{S}}{g_{RE}}[\!n]{g_{SR}}[\!n]}}{{{\eta^{2}}[\!n]{g_{RE}}[\!n]{\sigma^{2}} + {\sigma^{2}}}}, $$
(3)

where the Rayleigh fading channel hED denotes the link from the legitimate monitor to the suspicious receiver, and σ2 is the power of the additive white Gaussian noise (AWGN). Furthermore, the indicator function I1[n], denoting the event of successful eavesdropping at the legitimate monitor, is defined. If γE[n]≥γD(Q[n]),I1[n]=1; otherwise, I1[n]=0 [13, 21]. Hence, the main objective of the legitimate monitor is to maximize the average eavesdropping rate by optimizing the jamming power allocation \(Q[n],{\mathrm { }}n \in {\mathrm {{\mathcal {N}}}}\), the problem can be formulated as (dropping the constant term 1/N in the objective function)

$$\begin{array}{*{20}l} {\mathrm{(P1)}}\mathop {\max}\limits_{\{ Q[n]\}_{n = 1}^{N}}\ \ \ & \sum\limits_{n = 1}^{N} {{I_1}[\!n]{{\log }_2}\left({1 + {\gamma _D}(Q[\!n])} \right)} \end{array} $$
(4)
$$\begin{array}{*{20}l} {\mathrm{s.t.}}\ \ \ & {\mathrm{}}Q[\!n] \ge 0,\ \ n = 1, \cdots,N, \end{array} $$
(4a)
$$\begin{array}{*{20}l} & \sum\limits_{n = 1}^{N} {Q[\!n]} \le N\bar Q, \end{array} $$
(4b)

where \(\bar Q\) is the maximum average jamming power at E.

3.2 DF relaying

In this subsection, the UAV-aided suspicious relay R operates in DF mode, and one slot processing delay at R is considered. Therefore, the maximum data rates at R, D, and E in bits/second/hertz (bps/Hz) are respectively given as

$$ {R_{R}}[\!n] = {\log_{2}}\left(1 + \frac{{p_{S}}{g_{SR}}[\!n]}{\sigma^{2}} \right),\ {\mathrm{ }}n = 1, \cdots,N - 1, $$
(5)
$$ \begin{aligned} {R_{D}}(Q[\!n]) = {\log_{2}}\left({1 + \frac{{{p_{R}}{g_{RD}}[\!n]}}{{Q[\!n]{{\left| {{h_{ED}}} \right|}^{2}} + {\sigma^{2}}}}} \right), \ n = 2, \cdots,N, \end{aligned} $$
(6)
$$ {R_{E}}[\!n] = {\log_{2}}\left({1 + \frac{{{p_{R}}{g_{RE}}[\!n]}}{{{\sigma^{2}}}}} \right), \ n = 2, \cdots,N. $$
(7)

It is observed that the suspicious transmitter should not transmit in time slot N. Referring to [23], the end-to-end suspicious rate in time slot n is given as min(RR[ n−1],RD(Q[ n])),n=2,⋯,N. Provided that RE[ n]≥ min(RR[ n−1],RD(Q[ n])), the indicator function I2[ n] is set as I2[ n]=1; otherwise, I2[ n]=0. Therefore, the main objective of the legitimate monitor E is also to maximize the average eavesdropping rate by dynamically optimizing the jamming power Q[ n],n=2,⋯,N. This optimization problem can be formulated as (dropping the constant term 1/N in the objective function)

$$\begin{array}{*{20}l} {\mathrm{(P2) }}\mathop {\max }\limits_{{\mathrm{\{ }}Q[\!n]{\mathrm{\} }}_{n = 2}^{N}}\ \ \ & {\mathrm{ }}\sum\limits_{n = 2}^{N} {{I_{2}}[\!n]\min \left({{R_{R}}[\!n - 1],{R_{D}}(Q[\!n])} \right)} \end{array} $$
(8)
$$\begin{array}{*{20}l} {\mathrm{ s}}{\mathrm{.t}}{\mathrm{. }}\ \ \ & Q[\!n] \ge 0,\ {\mathrm{ }}n = 2, \cdots,N,{\mathrm{ }} \end{array} $$
(8a)
$$\begin{array}{*{20}l} &{\mathrm{ }}\sum\limits_{n = 2}^{N} {Q[\!n]} \le {N}\bar Q, \end{array} $$
(8b)

4 Optimal solution

In this section, the optimal solutions to problems (P1) and (P2) are derived, respectively.

4.1 Optimal solution to problem (P1)

In this subsection, we will solve problem (P1) and then obtain the optimal jamming power allocation solution to maximize the average effective eavesdropping rate. To this end, we provide the following lemma, which shows that problem (P1) satisfies the time-sharing property.

Lemma 1

Denote {Qa[ n]} and {Qb[ n]} as the optimal solutions to problem (P1) under power constraints \({\bar Q^{a}}\) and \({\bar Q^{b}}\), respectively. Given any 0≤θ≤1, there always exists a feasible solution {Qc[ n]} satisfying that

$$ \setlength\abovedisplayskip{1pt} \sum\limits_{n = {\mathrm{1}}}^{N} {{S^{c}}[\!n]} \ge \theta \sum\limits_{n = {\mathrm{1}}}^{N} {{S^{a}}[\!n]} + \left({1 - \theta} \right)\sum\limits_{n = 1}^{N} {{S^{b}}[\!n]}, $$
(9)
$$ \setlength\belowdisplayskip{1pt} \sum\limits_{n = 1}^{N} {{Q^{c}}[\!n]} \le \theta N{\bar Q^{a}} + \left({1 - \theta} \right)N{\bar Q^{b}}, $$
(10)

where \({S^{k}}[\!n] = I_{1}^{k}[\!n]{\log _{2}}\left ({{\mathrm {1 + }}{\gamma _{D}}({Q^{k}}[\!n])} \right),k \in \{ a,b,c\}\), and \(\{ I_{1}^{k}[\!n]\}, \{ {\gamma _{D}}({Q^{k}}[\!n])\}\) represent the corresponding indicator function and SINR at D under jamming power {Qk[ n]}, respectively.

Proof

We follow a similar approach as in [33] to prove Lemma 1. For any n=1,⋯,N, suppose that time slot n happens over a certain amount of time. By configuring jamming power Qc[ n] to be Qa[ n] for a θ percentage of the time in slot n, and Qb[ n] for the remaining 1−θ percentage of the time in slot n, i.e., Qc[ n]=θQa[ n]+(1−θ)Qb[ n]. Then the overall Sc[ n] is the linear combination θSa[ n]+(1−θ)Sb[ n]. Based on this, we combine all N time slots, and it follows that \({\sum \nolimits }_{n = 1}^{N} {{S^{c}}[\!n]} = \theta {\sum \nolimits }_{n = 1}^{N} {{S^{a}}[\!n]} + \left ({1 - \theta } \right){\sum \nolimits }_{n = 1}^{N} {{S^{b}}[\!n]}, {\sum \nolimits }_{n = 1}^{N} {{Q^{c}}[\!n]} = \theta {\sum \nolimits }_{n = 1}^{N} {{Q^{a}}[\!n]} + \left ({1 - \theta } \right){\sum \nolimits }_{n = 1}^{N} {{Q^{b}}[\!n]} \le \theta N{\bar Q^{a}} + \left ({1 - \theta } \right)N{\bar Q^{b}}\). □

Consequently, problem (P1) satisfies the time-sharing conditions proposed in [33], and a zero duality gap holds. Thus, the Lagrange dual method is used to obtain the optimal solution.

Theorem 1

The optimal solution to (P1) is

$$ {Q^{*}}[n] = \left\{ \begin{aligned} &\hat Q[\!n],\ \ {\mathrm{ if }}\ \ \hat Q[\!n] \in \Psi,\\ &\ {\mathrm{ 0}},\ \ \ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right. $$
(11)

where \(\Psi = \left \{ {\left. {\hat Q[\!n]} \right |0 < \hat Q[\!n] < \frac {{{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{\eta ^{2}}[n]{p_{S}}{g_{RE}}[n]{g_{SR}}[n]}}{{{\eta ^{2}}[n]{g_{RE}}[n]{\sigma ^{2}} + {\sigma ^{2}}}}} \right)}}{{{\lambda ^{*}}}}{\mathrm { }}} \right \}{\mathrm { }}\), and λ is the optimal dual variable. Here, \(\hat Q[\!n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right)\) derives from γE[ n]=γD(Q[ n]).

Proof

Using the Lagrange dual method, Theorem 1 can be verified. The partial Lagrangian of problem (P1) is first given by

$$ \begin{aligned} &{L_{1}}\left({\left\{ {Q[\!n]} \right\},\lambda} \right)\\ &= \sum\limits_{n = 1}^{N} {{I_{1}}[\!n]{{\log }_{2}}\left({{\mathrm{1 + }}{\gamma_{D}}(Q[\!n])} \right)} \,-\, \lambda \left({\sum\limits_{n = 1}^{N} {Q[\!n]} - N\bar Q} \right)\\ &= \sum\limits_{n = 1}^{N} {\left({{I_{1}}[\!n]{{\log }_{2}}\left({{\mathrm{1 + }}{\gamma_{D}}(Q[\!n])} \right) - \lambda Q[\!n]} \right)} + \lambda N\bar Q, \end{aligned} $$
(12)

where λ≥0 is the dual variable associated with (4b). The dual function of problem (P1) is expressed as

$$ {g_{1}}\left(\lambda \right) = \mathop {\max }\limits_{\{Q[\!n] \ge 0\}} {\mathrm{ }}{L_{1}}\left({\left\{ {Q[\!n]} \right\},\lambda} \right). $$
(13)

The dual problem of (P1), denoted as (D1), is thus defined as \(\mathop {\min }\limits _{\lambda \ge 0} {\mathrm { }}{g_{1}}\left (\lambda \right)\). To garner the optimal solution to (P1), its dual problem (D1) can be solved equivalently. Without loss of optimality, problem (13) can be converted into multiple subproblems. For any n=1,⋯,N,

$$ \mathop {\max }\limits_{Q[n] \ge 0} {\mathrm{ }}{I_{1}}[\!n]{\log_{2}}\left({{\mathrm{1 + }}{{\gamma_{D}}(Q[\!n])}} \right) - \lambda Q[\!n]. $$
(14)

Consequently, the subproblem (14) is considered. To ensure the successful eavesdropping, we have γE[ n]≥γD(Q[ n]), namely, \(Q[\!n] \ge \hat Q[\!n]\), where \(\hat Q[\!n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right)\). Problem (14) can be solved by discussing two cases.

Case 1When\(\hat Q[\!n] \le 0\), it means thatI1[ n]=1. In this case, problem (14) becomes\(\mathop {\max }\limits _{Q[\!n] \ge 0} {\log _{2}}\left ({{\mathrm {1+}}{\gamma _{D}}(Q[\!n])} \right) - \lambda Q[\!n]\). Due to the fact that this objective function decreases withQ[ n], the optimal jamming power isQλ[ n]=0.

Case 2When\(\hat Q[\!n] > 0\), two subcases are considered to solve problem (14).

Subcase 1

\(Q[\!n] \ge \hat Q[\!n]\), which leads to I1[ n]=1. Problem (14) is thus rewritten as \(\mathop {\max }\limits _{Q[\!n]\ge \hat Q[\!n]} {\text {log}}_{2}\left ({{\mathrm {1 + }}{\gamma _{D}}(Q[\!n])} \right) - \lambda Q[\!n]\). The optimal jamming power is \(Q[\!n] = \hat Q[\!n]\), and the corresponding optimal value is \({V_{1}}[\!n] = {\text {log}_{2}}\left (1 + \frac {\eta ^{2}[\!n] p_{S} g_{RE}[\!n]{g_{SR}}[\!n]}{\eta ^{2}[\!n]g_{RE}[\!n]\sigma ^{2} + \sigma ^{2}}\right) - \frac {\lambda }{{{{\left | {h_{ED}} \right |}^{2}}}}\left (\frac {{g_{RD}}[\!n]}{g_{RE}[n]}{\sigma ^{2}} - {\sigma ^{2}} \right)\).

Subcase 2

\(Q[\!n] < \hat Q[\!n]\), namely, I1[ n]=0. Problem (14) can be re-expressed as \(\mathop {max}\limits _{0\le Q[n] < \hat Q[n]} - \lambda Q[\!n]\). The optimal jamming power is Q[ n]=0, and the optimal value is 0.

Comparing the two subcases, if V1[ n]>0, then \({Q^{\lambda } }[\!n] = \hat Q[\!n]\); otherwise, Qλ[ n]=0.

In summary, the optimal jamming power to problem (14) is given by

$$ {Q^{\lambda} }[\!n] = \left\{ \begin{aligned} &\hat Q[\!n],\ {\mathrm{ if }}\ \ \hat Q[\!n] \in \Psi,\\ &{\mathrm{ 0}},\ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right. $$
(15)

where \(\Psi = \left \{ {\left. {\hat Q[\!n]} \right |0 < \hat Q[\!n] < \frac {{{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{\eta ^{2}}[n]{p_{S}}{g_{RE}}[n]{g_{SR}}[n]}}{{{\eta ^{2}}[n]{g_{RE}}[n]{\sigma ^{2}} + {\sigma ^{2}}}}} \right)}}{{{\lambda }}}{\mathrm { }}} \right \}{\mathrm { }}\).

Subsequently, the optimal dual variable λ is obtained by solving problem (D1). It can be seen that the subgradient of g1(λ) is \({s_{1}}(\lambda) = N\bar Q - {\sum \nolimits }_{n = 1}^{N} {Q^{\lambda } }[\!n]\), the binary search is then employed to attain λ. The proof of Theorem 1 is thus completed.

It can be observed that if the channel quality of E is superior to that of D in time slot n, which corresponds to \(\hat Q[\!n] \le 0\), passive eavesdropping at E is optimal. In addition, due to the average power constraint, the legitimate monitor E interferes with the suspicious receiver D only when the jamming power meets the condition, i.e., \(\hat Q[\!n] \in \Psi \).

4.2 Optimal solution to dual problem of (P2)

In this subsection, we turn our attention to problem (P2). Analogously, we can also prove that problem (P2) has the time-sharing property, and the detail is omitted for brevity.

Lemma 2

The time-sharing condition holds for problem (P2).

Next, we attain the optimal solution to problem (P2) via solving its dual problem.

Theorem 2

The optimal solution to (P2) is

$$ {Q^{*}[\!n] = \left\{ \begin{aligned} &\begin{aligned}\tilde Q[\!n],\ {\mathrm{ if }}\ {R_{E}}[\!n] < \min \left({{R_{R}}[\!n - 1],{R_{D}}[\!n]} \right) \ {\mathrm{ and }}\ \ \tilde Q[\!n] \in \Omega {\mathrm{ }} \end{aligned},\\ &\ {\mathrm{ 0}},\ \ \ \ \ \ {\mathrm{ otherwise}}, \end{aligned} \right.} $$
(16)

where \(\Omega = \left \{ {\tilde Q[\!n]\left | {{\mathrm {0}} < \tilde Q[\!n] < \frac {{\mathrm {1}}}{{{\lambda ^{*}}}}{{\log }_{2}}\left ({{\mathrm {1 + }}\frac {{{p_{R}}{g_{RE}}[n]}}{{{\sigma ^{2}}}}} \right){\mathrm { }}} \right.} \right \}{\mathrm { }}\), λ is the optimal dual variable, and \(\tilde Q[\!n] = \frac {{{\sigma ^{2}}}}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}} - 1} \right)\). Here, RD[ n]=log2(1+pRgRD[n]/σ2).

Proof

Analogous to the proof of Theorem 1, the Lagrange dual method is utilized, and a set of subproblems are considered. For any n=2,⋯,N,

$$ \mathop {\max }\limits_{Q[n] \ge 0} {\mathrm{ }}{I_{2}}[\!n]\min \left({{R_{R}}[n - 1],{R_{D}}(Q[\!n])} \right) - \lambda Q[\!n]. $$
(17)

Problem (17) can be solved by discussing two cases.

Case 1

When RE[n]≥ min(RR[n−1],RD[n]), the legitimate monitor can overhear the suspicious message with passive eavesdropping, and I2[n]=1. Thus, the optimal jamming power is Qλ[n]=0.

Case 2

On the other hand, when RE[n]< min(RR[n−1],RD[n]), it indicates that the jamming power \(\tilde Q[n] = \frac {1}{{{{\left | {{h_{ED}}} \right |}^{2}}}}\left ({\frac {{{g_{RD}}[n]}}{{{g_{RE}}[n]}}{\sigma ^{2}} - {\sigma ^{2}}} \right) > 0\) for the successful eavesdropping, where \(\tilde Q[n]\) derives from RD(Q[n])=RE[n]. Here, \(Q[n] < \tilde Q[n]\) and \(Q[n] \ge \tilde Q[n]\) are respectively considered. Similar to the proof of Theorem 1, the process is omitted for brevity.

Combining the two cases, the optimal solution to the dual problem of (P2) is given as (16) after obtaining the optimal dual variable. Theorem 2 thus follows.

Theorem 2 shows that the jamming strategy depends on the channel qualities from S to R as well as that from R to D and E. Provided that RE[n]≥ min(RR[n−1],RD[n]), no jamming performed at E in time slot n is optimal, and the effective eavesdropping rate is min(RR[n−1],RD[n]). On the other hand, subject to the average power constraint, E only implements the jamming according to the above condition. In this case, the jamming degrades the suspicious rate RD[n] to RE[n], and the effective eavesdropping rate is thus RE[n].

Furthermore, subject to both the average and peak power constraints at E, i.e., 0≤Q[n]≤Qpeak, n=1,⋯,N and \({\sum \nolimits }_{n = 1}^{N} {Q[n]} \le N\bar Q\) for AF relaying; 0≤Q[n]≤Qpeak, n=2,⋯,N and \({\sum \nolimits }_{n = 2}^{N} {Q[n]} \le N\bar Q\) for DF relaying, the new optimization problems are formulated. Analogously, by using the Lagrange dual method, the optimal solutions to dual problems can be obtained, which serve as the upper bounds of the new optimization problems.

However, when the peak power is sufficiently large, it can be proved that the upper bounds are tight. Specifically, denote {Qa[n]} and {Qb[n]} as the optimal solutions to problem (P1) under power constraints \(Q_{peak}^{a}, {\bar Q^{a}}\), and \(Q_{peak}^{b}, s{\bar Q^{b}}\), respectively. When the peak power is sufficiently large, it follows that 0≤Qc[n]≤θQpeaka+(1−θ)Qpeakb. Similar to Lemma 1, the time-sharing conditions also hold in this case, thus guaranteeing the strong duality.

5 Numerical results and discussions

In this section, numerical simulations are presented to evaluate the performance of our proposed jamming strategy. Similar to [34], in our simulations, the parameters are set as in Table 1.

Table 1 Simulation parameters

Figures 2 and 3 investigate the impact of the average jamming power on the average achievable eavesdropping rate for the suspicious relay’s two protocols, respectively. Two reference schemes are used for comparison, i.e., (1) passive eavesdropping and (2) proactive eavesdropping with constant jamming power \(\bar Q\). Here, the transmission power at suspicious nodes is set as pS=pR=15 dBm, and the position of E is (xE,yE,0)=(1500,1000,0) m. As expected, the proposed proactive eavesdropping approach outperforms the other two reference schemes under two protocols, and the average eavesdropping rate begins to plateau with the sufficiently large jamming power. It is observed that the performance of scheme 2 deteriorates. The reason is that the constant jamming power \(\bar Q\) exceeds the optimal jamming power, which meanwhile degrades the effective eavesdropping rate despite the successful eavesdropping.

Fig. 2
figure 2

Eavesdropping rate versus average jamming power \(\bar Q\) for AF relaying

Fig. 3
figure 3

Eavesdropping rate versus average jamming power \(\bar Q\) for DF relaying

Figures 4 and 5 show the maximum achievable eavesdropping rate versus the position of E in the form of a contour map. Intuitively, the higher eavesdropping rate is obtained around D owing to the similar channel condition between D and E, thus needing a smaller jamming power for the successful eavesdropping for AF relaying. For DF relaying, it is observed that in the middle region of the contour map, E obtains the maximum average eavesdropping rate. This is attributed to the fact E enjoys a relatively good channel conditions under a sufficiently small time slot δt. Furthermore, the achievable average eavesdropping rate declines with the increasing distance between E and the center. This is because the ever-increasing jamming power to guarantee the successful eavesdropping meanwhile degrades the effective eavesdropping rate.

Fig. 4
figure 4

The maximum achievable eavesdropping rate versus the position of E for AF relaying

Fig. 5
figure 5

The maximum achievable eavesdropping rate versus the position of E for DF relaying

6 Conclusion

This paper studied the wireless surveillance in a malicious UAV-enabled relay system, where both AF and DF relaying protocols were considered for the suspicious relay. In this context, we maximized the average effective eavesdropping rate by optimizing the legitimate monitor’s jamming power allocation. The optimal jamming power allocation solutions were then presented in closed-form for each of the two protocols, respectively. Numerical results showed the significant benefits were achieved by applying the approach of proactive eavesdropping compared to the reference schemes.