A Decode-and-Forward Relay-Aided Proactive Eavesdropping Scheme for Wireless Surveillance

被引:0
作者
Wu, Haowei [1 ,2 ,3 ]
Yan, Lian [1 ]
Ma, Rui [1 ]
Ou, Jinglan [1 ,3 ]
Cui, Jingyue [1 ]
机构
[1] Chongqing Univ, Sch Microelect & Commun Engn, Chongqing, Peoples R China
[2] Chongqing Univ, Ctr Commun & Tracking Telemetry Command, Chongqing, Peoples R China
[3] Chongqing Key Lab Space Informat Network & Intell, Chongqing, Peoples R China
来源
2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC) | 2020年
关键词
Legitimate surveillance; proactive eavesdropping; cooperative relay; power allocation; location optimization;
D O I
10.1109/iccc49849.2020.9238890
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Legitimate wireless surveillance plays an important and preventive role in protecting public safety. To promote the eavesdropping performance of wireless surveillance systems, a proactive eavesdropping scheme with a decode-and-forward relay is proposed, where the relay intercepts suspicious information and interferes with the suspicious receiver simultaneously. The closed-form expressions are derived, including the decoding outage probability, eavesdropping outage probability, and average eavesdropping rate. To maximize the average eavesdropping rate, the transmit power and location deployment at the relay are optimized. Specifically, the closed-form result of approximate optimal transmit power for the relay is obtained, and the bisection-based algorithm is further proposed to verify its correctness. Simulation results validate that the proposed scheme achieves better eavesdropping performance than that without optimization.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 20 条
  • [1] Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks
    Hu, Dingkun
    Zhang, Qi
    Yang, Ping
    Qin, Jiayin
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) : 1714 - 1718
  • [2] Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
    Hu, Guojie
    Cai, Yueming
    [J]. IEEE ACCESS, 2019, 7 : 139035 - 139046
  • [3] Proactive Eavesdropping Via Jamming for Ergodic Rate Maximization Over Wireless-Powered Multichannel Suspicious System
    Hu, Guojie
    Cai, Yueming
    [J]. IEEE COMMUNICATIONS LETTERS, 2020, 24 (08) : 1830 - 1834
  • [4] Tran H, 2016, 2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), P457, DOI 10.1109/CCE.2016.7562679
  • [5] Proactive Eavesdropping in Relaying Systems
    Jiang, Xin
    Lin, Hai
    Zhong, Caijun
    Chen, Xiaoming
    Zhang, Zhaoyang
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (06) : 917 - 921
  • [6] Wireless Information Surveillance and Intervention Over Multiple Suspicious Links
    Li, Baogang
    Yao, Yuanbin
    Chen, He
    Li, Yonghui
    Huang, Shuqiang
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (08) : 1131 - 1135
  • [7] Li K, 2019, INT WIREL COMMUN, P477, DOI 10.1109/IWCMC.2019.8766696
  • [8] Li P., 2018, P IEEE GLOBECOM
  • [9] Li Q., P IEEE GLOBECOM
  • [10] Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection
    Moon, Jihwan
    Lee, Sang Hyun
    Lee, Hoon
    Lee, Inkyu
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (07) : 3726 - 3738