Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing

被引:51
作者
Moon, Jihwan [1 ]
Lee, Hoon [2 ]
Song, Changick [3 ]
Kang, Seowoo [1 ]
Lee, Inkyu [1 ]
机构
[1] Korea Univ, Sch Elect Engn, Seoul 02841, South Korea
[2] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
[3] Korea Natl Univ Transportat, Dept Elect Engn, Chungju 27469, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; proactive eavesdropping; wireless surveillance; cooperative jamming; spoofing; SECRECY CAPACITY; WIRETAP CHANNEL; FADING CHANNELS; SYSTEMS; SURVEILLANCE; OPTIMIZATION; NETWORKS; DESIGN;
D O I
10.1109/TWC.2018.2865305
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer. Assuming an adaptive transmission policy at the suspicious users, the spoofing relays not only intercept but also forward the manipulated information to control the data rate of the suspicious users in collaboration with the jammer. We provide a technique which jointly optimizes the receive combining vector at the central monitor, the precoders at the relays, and the transmit covariance matrix at the jammer for maximizing the eavesdropping rate. To reveal some fundamental properties of the optimal operation, we first study a single-relay system. It is shown that when the central monitor experiences a poor eavesdropping channel link, the spoofing relay and the jammer should transmit destructive signals and jamming signals, respectively. In this case, the suspicious users are forced to decrease their data rate, while the intercepted information can be successfully decoded by the central monitor. On the other hand, when the eavesdropping channel condition is favorable, the spoofing relay forwards constructive signals to further increase the data rate at the suspicious users in a way that more information can be intercepted from the suspicious users. We then formulate a general eavesdropping rate maximization problem for multiple relays and present a semi-definite relaxation approach. A low-complexity design is also proposed based on our analysis for the single-relay system. Simulation results verify the efficiency of the proposed solutions compared to other baseline schemes in various practical setups.
引用
收藏
页码:6958 / 6971
页数:14
相关论文
共 40 条
[1]   Next Generation 5G Wireless Networks: A Comprehensive Survey [J].
Agiwal, Mamta ;
Roy, Abhishek ;
Saxena, Navrati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1617-1655
[2]  
[Anonymous], 2017, PROC IEEE ELECT POWE, DOI DOI 10.1109/EPEC.2017.8286160
[3]  
[Anonymous], 2009, P AS PAC POW EN ENG
[4]  
[Anonymous], 2016, PROC 8 INT C WIRELES
[5]  
[Anonymous], 2017, 36101R15 TS 3GPP
[6]  
Choi Y, 2015, PROC INT CONF ADV, P84, DOI 10.1109/ATC.2015.7388423
[7]   The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel [J].
Ekrem, Ersen ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (04) :2083-2114
[8]   Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1494-1505
[9]  
Fazel M, 2004, P AMER CONTR CONF, P3273
[10]   Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks [J].
Hu, Dingkun ;
Zhang, Qi ;
Yang, Ping ;
Qin, Jiayin .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) :1714-1718