Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications

被引:3
|
作者
Hu, Guojie [1 ]
Zhu, Fengchao [1 ]
Si, Jiangbo [2 ]
Cai, Yunlong [3 ]
Al-Dhahir, Naofal [4 ]
机构
[1] Rocket Force Univ Engn, Coll Commun Engn, Xian 710025, Peoples R China
[2] Xidian Univ, Integrated Serv Networks Lab, Xian 710100, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Peoples R China
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Dallas, TX 75080 USA
关键词
Jamming; Eavesdropping; Optimized production technology; Channel estimation; Training; Resource management; Surveillance; Channel training; eavesdropping success probability; jamming; proactive eavesdropping; CHANNEL ESTIMATION; SELF-INTERFERENCE; SURVEILLANCE; DESIGN;
D O I
10.1109/LSP.2022.3150244
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored the suspicious channel training phase and just considered the jamming power optimization of E in the suspicious data transmission phase to facilitate eavesdropping, this letter advances the research by comprehensively investigating the jamming power allocation of E in both phases, with the purpose of maximizing its eavesdropping success probability. Under this setup, we first derive an exact expression of the objective and reveal the existence of a fundamental trade-off in deciding the jamming power allocation, for which a simple one-dimensional search is employed to find the optimal solution. To simplify the analysis, we further derive a tight approximation of the objective and then develop a very fast alternating optimization algorithm to find the sub-optimal jamming power allocation. Moreover, we extend our analysis to the case where the channel state information is available at the suspicious transmitter via channel feedback. Simulation results demonstrate the effectiveness of our proposed scheme compared to competitive benchmarks.
引用
收藏
页码:667 / 671
页数:5
相关论文
共 50 条
  • [1] Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Zhu, Fengchao
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (01) : 3 - 7
  • [2] Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength
    Xu, Ding
    Zhu, Hongbo
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (11) : 7505 - 7519
  • [3] Proactive Eavesdropping via Jamming for Power-Limited UAV Communications
    Zhang, Mingzhu
    Yi, Hongju
    Chen, Yu
    Tao, Xiaofeng
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [4] Proactive Eavesdropping of Jamming-Assisted Suspicious Communications in Fading Channels: A Stackelberg Game Approach
    Xu, Ding
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (05) : 2913 - 2928
  • [5] Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [6] Proactive Eavesdropping via Jamming over HARQ-Based Communications
    Xu, Jie
    Li, Kai
    Duan, Lingjie
    Zhang, Rui
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [7] Maxmin Fairness for UAV-Enabled Proactive Eavesdropping With Jamming Over Distributed Transmit Beamforming-Based Suspicious Communications
    Hu, Guojie
    Li, Zan
    Si, Jiangbo
    Xu, Kui
    Xu, Donghui
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (03) : 1595 - 1614
  • [8] Jamming Energy Allocation in Training-Based Multiple Access Systems
    Pezeshki, Hamed
    Zhou, Xiangyun
    Maham, Behrouz
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (06) : 1140 - 1143
  • [9] Jamming-Assisted Proactive Eavesdropping over Two Suspicious Communication Links
    Engineering Systems and Design Pillar, Singapore University of Technology and Design, Singapore, Singapore
    不详
    518040, China
    不详
    IEEE Trans. Wireless Commun., 2020, 7 (4817-4830):
  • [10] Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) : 4817 - 4830