Cooperative proactive eavesdropping over two-hop suspicious communication based on reinforcement learning

被引:3
作者
Yang Y. [1 ,2 ]
Li B. [1 ,2 ]
Zhang S. [1 ,2 ]
Zhao W. [1 ,2 ]
Jiao L. [3 ,4 ]
机构
[1] Department of Electronic and Communication Engineering, North China Electric Power University, Baoding
[2] Hebei Key Laboratory of Power Internet of Things Technology, North China Electric Power University, Baoding
[3] The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang
[4] Science and Technology on Communication Networks Laboratory, Shijiazhuang
基金
中国国家自然科学基金;
关键词
Dynamic decision-making; Expected EEE; MADDPG; Two-hop; —legitimate surveillance;
D O I
10.23919/JCIN.2021.9475126
中图分类号
学科分类号
摘要
—Legitimate surveillance has attracted more and more concern, and effective proactive intervention can eavesdrop the illegitimate information. In this paper, we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors (LMs) based on multi-agent deep deterministic policy gradient (MADDPG) algorithm in two phases. In phase 1, the suspicious transmitter sends information to the suspicious assistant relay, and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2. Meanwhile, two LMs cooperatively emit jamming to suspicious relay and receiver during each phase. Particularly, each LM is considered to be an energy-limited device, and eavesdropping is a long-term process, so we adopt expected eavesdropping energy efficiency (EEE) over a period of time to evaluate eavesdropping performance. However, for two LMs, how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge. Therefore, MADDPG algorithm, as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making, is utilized to solve the issue of jamming power decision for each LM. In the simulation, the results show that our proposed cooperative jamming scheme can obtain higher expected EEE. © 2021, Posts and Telecom Press Co Ltd. All rights reserved.
引用
收藏
页码:166 / 174
页数:8
相关论文
共 27 条
  • [1] XU J, DUAN L J, ZHANG R., Surveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm, IEEE Wireless Communications, 24, 4, pp. 152-159, (2017)
  • [2] XU J, DUAN L J, ZHANG R., Proactive eavesdropping via cognitive jamming in fading channels, IEEE Transactions on Wireless Communications, 16, 5, pp. 2790-2806, (2017)
  • [3] HAN Y T, DUAN L J, ZHANG R., Jamming-assisted eavesdropping over parallel fading channels, IEEE Transactions on Information Forensics and Security, 14, 9, pp. 2486-2499, (2019)
  • [4] ZHANG H Y, DUAN L J, ZHANG R., Jamming-assisted proactive eavesdropping over two suspicious communication links, IEEE Transactions on Wireless Communications, 19, 7, pp. 4817-4830, (2020)
  • [5] LI B G, YAO Y B, ZHANG H J, Et al., Energy efficiency of proactive eavesdropping for multiple links wireless system, IEEE Access, 6, pp. 26081-26090, (2018)
  • [6] LI B G, YAO Y B, CHEN H, Et al., Wireless information surveillance and intervention over multiple suspicious links, IEEE Signal Processing Letters, 25, 8, pp. 1131-1135, (2018)
  • [7] ZHANG M Z, CHEN Y, TAO X F, Et al., Power allocation for proactive eavesdropping with spoofing relay in UAV systems, 2019 26th International Conference on Telecommunications, pp. 102-107, (2019)
  • [8] ZHANG Y X, JIANG X, ZHONG C, Et al., Performance of proactive eavesdropping in dual-hop relaying systems, 2017 IEEE Globecom Workshops, (2017)
  • [9] MA G G, XU J, DUAN L J, Et al., Wireless surveillance of two-hop communications, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications, (2017)
  • [10] HU D K, ZHANG Q, YANG P, Et al., Proactive monitoring via jamming in amplify-and-forward relay networks, IEEE Signal Processing Letters, 24, 11, pp. 1714-1718, (2017)