Cooperative Jamming for Eavesdropping Surveillance in Wireless Networks

被引:0
作者
Hong, Sunyan [1 ,2 ]
Shen, Shikai [1 ,2 ]
Yang, Bin [4 ]
He, Jun [2 ,3 ]
Deng, Fei [1 ,2 ]
Zhang, Yunfei [1 ,2 ]
Yang, Qinbiao [1 ,2 ]
机构
[1] Kunming Univ, Sch Informat Engn, Kunming 650214, Yunnan, Peoples R China
[2] Kunming Univ, Yunnan Collegiate Key Lab Data Governance & Intel, Kunming 650214, Yunnan, Peoples R China
[3] Kunming Univ, Off Sci & Technol, Kunming 650214, Yunnan, Peoples R China
[4] Chuzhou Univ, Sch Comp & Informat Engn, Chuzhou 239000, Peoples R China
来源
2022 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA | 2022年
基金
中国国家自然科学基金;
关键词
Legitimate surveillance; Proactive eavesdropping; Cooperative jamming; Maximum residual distance; PHYSICAL-LAYER SECURITY;
D O I
10.1109/NANA56854.2022.00018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.
引用
收藏
页码:58 / 61
页数:4
相关论文
共 12 条
[1]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[2]   Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty [J].
Cheng, Zihao ;
Si, Jiangbo ;
Li, Zan ;
Guan, Lei ;
Zhao, Yan ;
Wang, Danyang ;
Cheng, Julian ;
Al-Dhahir, Naofal .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (06) :4024-4037
[3]   Relay Selection for Secure Cooperative Networks with Jamming [J].
Krikidis, Ioannis ;
Thompson, John S. ;
McLaughlin, Steve .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) :5003-5011
[4]   On the Outage Probability of Device-to-Device-Communication-Enabled Multichannel Cellular Networks: An RSS-Threshold-Based Perspective [J].
Liu, Jiajia ;
Nishiyama, Hiroki ;
Kato, Nei ;
Guo, Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (01) :163-175
[5]   Proactive eavesdropping in UAV-aided mobile relay systems [J].
Lu, Haiquan ;
Dai, Haibo ;
Sun, Ping ;
Li, Pei ;
Wang, Baoyun .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
[6]   Proactive Eavesdropping via Cognitive Jamming in Fading Channels [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (05) :2790-2806
[7]   Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) :80-83
[8]   Physical Layer Security of TAS/MRC With Antenna Correlation [J].
Yang, Nan ;
Suraweera, Himal A. ;
Collings, Iain B. ;
Yuen, Chau .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :254-259
[9]   Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay [J].
Zeng, Yong ;
Zhang, Rui .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1449-1461
[10]  
Zhang MZ, 2019, 2019 26TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), P102, DOI [10.1109/ict.2019.8798768, 10.1109/ICT.2019.8798768]