Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors

被引:17
作者
Huang, Shan [1 ]
Zhang, Qi [1 ]
Li, Quanzhong [2 ,3 ]
Qin, Jiayin [1 ,4 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Guangdong Prov Key Lab Big Data Anal & Proc, Guangzhou 510006, Guangdong, Peoples R China
[4] Sun Yat Sen Univ, Xinhua Coll, Guangzhou 510520, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Deterministically bounded model; full-duplex; jamming; proactive monitoring; TRAINING DESIGN; RELAY NETWORKS; SURVEILLANCE; PERFORMANCE; SYSTEMS;
D O I
10.1109/LSP.2018.2815553
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Considering that a legitimate full-duplex monitor aims to intercept the suspicious wireless transmission, we study the robust jamming design problem where imperfect channel state information is assumed. We model channel estimation errors as deterministically bounded and define the successful monitoring event as that the signal-to-interference-plus-noise ratio (SINR) at the legitimate monitor is higher than the SINR at the suspicious receiver. To increase the worst-case probability of successful monitoring, we propose a robust proactive monitoring via jamming scheme. From simulation results, our proposed robust scheme is superior to the nonrobust one.
引用
收藏
页码:690 / 694
页数:5
相关论文
共 17 条
[1]  
Boyd L., 2004, CONVEX OPTIMIZATION
[2]   Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications [J].
Feng, Renhai ;
Li, Quanzhong ;
Zhang, Qi ;
Qin, Jiayin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (01) :408-+
[3]   On channel estimation and optimal training design for amplify and forward relay networks [J].
Gao, Feifei ;
Cui, Tao ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (05) :1907-1916
[4]   Optimal Channel Estimation and Training Design for Two-Way Relay Networks [J].
Gao, Feifei ;
Zhang, Rui ;
Liang, Ying-Chang .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2009, 57 (10) :3024-3033
[5]   Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks [J].
Hu, Dingkun ;
Zhang, Qi ;
Yang, Ping ;
Qin, Jiayin .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) :1714-1718
[6]   Proactive Eavesdropping in Relaying Systems [J].
Jiang, Xin ;
Lin, Hai ;
Zhong, Caijun ;
Chen, Xiaoming ;
Zhang, Zhaoyang .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (06) :917-921
[7]   MIMO Secret Communications Against an Active Eavesdropper [J].
Li, Lingxiang ;
Petropulu, Athina P. ;
Chen, Zhi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2387-2401
[8]   A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance [J].
Li, Lingxiang ;
Chen, Zhi ;
Zhang, Duo ;
Fang, Jun .
IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (01) :107-111
[9]  
Li Q., 2016, IEEE T VEH TECHNOL, V63, P2462
[10]   Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks [J].
Li, Quanzhong ;
Zhang, Qi ;
Qin, Jiayin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (11) :9006-9019