Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels

被引:7
作者
Xu, Ding [1 ]
Zhu, Hongbo [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Wireless Commun, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Eavesdropping; Monitoring; Jamming; Resource management; Encoding; Wireless communication; Communication system security; Proactive eavesdropping; physical layer security; wiretap coding; power allocation; relative eavesdropping rate; FULL-DUPLEX RELAY; LEGITIMATE SURVEILLANCE; POWER ALLOCATION; INTERFERENCE; TRANSMISSION; ASSIGNMENT; LINKS;
D O I
10.1109/TIFS.2023.3236186
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proactive eavesdropping is an effective approach to legitimately surveil the suspicious communications. Current studies all considered that physical layer security (PLS) techniques such as the wiretap coding are not applied by the suspicious users (SUs) to protect their communications. Contrary to that, we consider that the wiretap coding in PLS is adopted by the SUs to defend against the proactive eavesdropping from the legitimate monitor over fading channels. Under the fixed power allocation (FPA) and the water-filling power allocation (WFPA) at the SUs, the problem of jamming power allocation at the monitor to maximize the relative eavesdropping rate under the average transmit power constraint is investigated. The optimization problem is solved by two nested optimizations, where the bisection search method is used in the outer optimization, and the Lagrange duality method and the successive convex approximation method are used in the inner optimization. Simulation results confirm the effectiveness of the proposed algorithms compared to various baseline algorithms. It is shown that the proposed algorithm under the WFPA at the SUs outperforms the one under the FPA at the SUs, and the monitor achieves lower relative eavesdropping rate when the SUs adopt a stricter secure transmission scheme.
引用
收藏
页码:1111 / 1126
页数:16
相关论文
共 47 条
  • [1] [Anonymous], 2009, Convex Optimization
  • [2] [Anonymous], 2005, WIRELESS COMMUNICATI
  • [3] Source-Based Jamming for Physical-Layer Security on Untrusted Full-Duplex Relay
    Atapattu, Saman
    Ross, Nathan
    Jing, Yindi
    Preniaratne, Malin
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) : 842 - 846
  • [4] Full Duplex Radios
    Bharadia, Dinesh
    McMilin, Emily
    Katti, Sachin
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 375 - 386
  • [5] Cooperative Double-IRS Aided Proactive Eavesdropping
    Cao, Yang
    Duan, Lingjie
    Jin, Minglu
    Zhao, Nan
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 6228 - 6240
  • [6] Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty
    Cheng, Zihao
    Si, Jiangbo
    Li, Zan
    Guan, Lei
    Zhao, Yan
    Wang, Danyang
    Cheng, Julian
    Al-Dhahir, Naofal
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (06) : 4024 - 4037
  • [7] Joint Subchannel Assignment and Power Allocation for OFDMA Femtocell Networks
    Duy Trong Ngo
    Khakurel, Suman
    Tho Le-Ngoc
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (01) : 342 - 355
  • [8] On the secrecy capacity of fading channels
    Gopala, Praveen Kumar
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) : 4687 - 4698
  • [9] Jamming-Assisted Eavesdropping Over Parallel Fading Channels
    Han, Yitao
    Duan, Lingjie
    Zhang, Rui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2486 - 2499
  • [10] On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels
    He, Biao
    Zhou, Xiangyun
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (10) : 6913 - 6924