Proactive Eavesdropping via Jamming in NOMA Network

被引:1
作者
Tung Pham Huu [1 ]
Van Nhan Vo [2 ,3 ]
Hung Tran [4 ]
Truong Xuan Quach [5 ]
Viet Nguyen Dinh [6 ]
机构
[1] Natl Univ Civil Engn, Fac Informat Technol, Hanoi 11616, Vietnam
[2] Duy Tan Univ, Fac Informat Technol, Da Nang 550000, Vietnam
[3] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[4] Phenikaa Univ, Fac Informat Technol, Hanoi 12116, Vietnam
[5] Thai Nguyen Univ Informat & Commun Technol, Fac Informat Technol, Thai Nguyen 24119, Vietnam
[6] VNU Univ Engn & Technol, Fac Informat Technol, Hanoi 11309, Vietnam
关键词
Eavesdropping; NOMA; Jamming; Resource management; Base stations; Surveillance; Relays; Proactive eavesdropping; cooperative jamming; cooperative eavesdropping; wireless surveillance; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; POWER ALLOCATION; SECURE NOMA; RELAY; DESIGN; SURVEILLANCE; CHANNEL; SYSTEMS;
D O I
10.1109/ACCESS.2021.3131906
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising technique in 5G network, and many investigations have addressed on the physical layer security to improve the security performance. In this paper, an alternative problem, where the eavesdropping process is considered as a legal activity, will be analyzed to track suspicious communications. More specifically, we study a wireless surveillance system in which the legitimate monitor is equipped with multi-antenna to overhear the messages between the suspicious receiver and the suspicious transmitter. Suspicious users are grouped into pairs and use the NOMA technique to transmit signals to a suspicious base station. Meanwhile, the legitimate monitor (LM) simultaneously transmits jamming signals, listens to suspicious links, decode-and-forward (DF) the eavesdropped information to the legitimate eavesdropper (LE). Based on the proposed mechanism, we investigate the power allocation policies for jamming signals of the legitimate monitor under deterministic and non-deterministic interference channel. Accordingly, we derive the closed-form expression of the successful eavesdropping probability for the best and the worst user to evaluate the system performance. Monte Carlo simulations are provided to verify our analytical results.
引用
收藏
页码:168121 / 168133
页数:13
相关论文
共 49 条
[1]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[2]   On the Security Enhancement of Uplink NOMA Systems With Jammer Selection [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (09) :5747-5763
[3]   Secure Transmission Designs for NOMA Systems Against Internal and External Eavesdropping [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Li, Tengyao ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2930-2943
[4]   Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Li, Tengyao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (02) :1942-1955
[5]   Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty [J].
Cheng, Zihao ;
Si, Jiangbo ;
Li, Zan ;
Guan, Lei ;
Zhao, Yan ;
Wang, Danyang ;
Cheng, Julian ;
Al-Dhahir, Naofal .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (06) :4024-4037
[6]  
Nguyen CY, 2019, PROC INT CONF ADV, P225, DOI [10.1109/ATC.2019.8924516, 10.1109/atc.2019.8924516]
[7]   A Survey of Non-Orthogonal Multiple Access for 5G [J].
Dai, Linglong ;
Wang, Bichai ;
Ding, Zhiguo ;
Wang, Zhaocheng ;
Chen, Sheng ;
Hanzo, Lajos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03) :2294-2323
[8]   Beamforming Design and Power Allocation for Secure Transmission With NOMA [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (05) :2639-2651
[9]   Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access [J].
Feng, Youhong ;
Yan, Shihao ;
Liu, Chenxi ;
Yang, Zhen ;
Yang, Nan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1670-1683
[10]   On the Design of Secure Non-Orthogonal Multiple Access Systems [J].
He, Biao ;
Liu, An ;
Yang, Nan ;
Lau, Vincent K. N. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (10) :2196-2206