Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks

被引:0
作者
Yoon, Young-Jun [1 ,2 ]
Cho, Wanjei [1 ,2 ]
Lee, Seongwook [3 ]
Lee, Jong-Ho [4 ]
Song, Jiho [5 ]
Kim, Seong-Cheol [1 ,2 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 08826, South Korea
[2] Seoul Natl Univ, INMC, Seoul 08826, South Korea
[3] Chung Ang Univ, Coll ICT Engn, Sch Elect & Elect Engn, Seoul 06974, South Korea
[4] Soongsil Univ, Sch Elect Engn, Seoul 06978, South Korea
[5] Hanyang Univ, Dept Elect & Elect Engn, ERICA, Ansan 15588, South Korea
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Adaptive; full-duplex; infrastructure-free; jamming; power allocation; proactive eavesdropping; relay networks; LEGITIMATE SURVEILLANCE; INFORMATION; DESIGN;
D O I
10.1109/ACCESS.2023.3282222
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of advanced communication technologies such as infrastructure-free communication networks, the need for proactive eavesdropping which can constantly monitor and intervene in the communication network is growing. In response to those demands, we study proactive eavesdropping in the general infrastructure-free communication scenario where the legitimate eavesdropper has to monitor a suspicious communication link without the aid of other nodes. Particularly, to enhance proactive eavesdropping performances, we propose the adaptive full-duplex jamming-helping method in which the legitimate eavesdropper selects the best operating mode adaptively depending on the channel conditions unlike conventional studies where the behavior of the monitor node was predetermined. Moreover, we design the optimal power scheme for the proposed method to maximize the eavesdropping rate while minimizing total power consumption of the legitimate eavesdropper simultaneously. In the process, we classify the channel conditions into several mutual exclusive cases to simplify the optimization problem, and present the optimal solution in closed form for each case. Finally, it is verified through simulation results that the proposed method is superior in terms of both the eavesdropping rate and the outage probability than other benchmark methods.
引用
收藏
页码:68682 / 68698
页数:17
相关论文
共 30 条
  • [1] Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems
    Cai, Yunlong
    Zhao, Cunzhuo
    Shi, Qingjiang
    Li, Geoffrey Ye
    Champagne, Benoit
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) : 1410 - 1425
  • [2] European Commission and Directorate -General for the Information Society and Media, 1990, COST 207 DIGITAL LAN
  • [3] Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference
    Fan, Lisheng
    Lei, Xianfu
    Yang, Nan
    Duong, Trung Q.
    Karagiannidis, George K.
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) : 1494 - 1505
  • [4] Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    Tellambura, Chintha
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (12) : 7563 - 7577
  • [5] Energy Efficiency for Proactive Eavesdropping in Cooperative Cognitive Radio Networks
    Ge, Yao
    Ching, P. C.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 13443 - 13457
  • [6] Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks
    Hu, Dingkun
    Zhang, Qi
    Yang, Ping
    Qin, Jiayin
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) : 1714 - 1718
  • [7] Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1267 - 1271
  • [8] Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications
    Hu, Guojie
    Zhu, Fengchao
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 667 - 671
  • [9] Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Zhu, Fengchao
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (01) : 3 - 7
  • [10] Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks
    Hu, Guojie
    Ouyang, Jian
    Cai, Yueming
    Cai, Yunlong
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3415 - 3426