Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay

被引:139
作者
Zeng, Yong [1 ]
Zhang, Rui [1 ,2 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[2] Agcy Sci Technol & Res, Inst Infocomm Res, Singapore 138632, Singapore
关键词
Beamforming; jamming; power splitting; proactive eavesdropping; spoofing relay; wireless information surveillance; COOPERATION;
D O I
10.1109/JSTSP.2016.2600519
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless information surveillance, by which suspicious wireless communications are closely monitored by legitimate agencies, is an integral part of national security. To enhance the information surveillance capability, we propose in this paper a new proactive eavesdropping approach via a spoofing relay, where the legitimate monitor operates in a full-duplex manner with simultaneous eavesdropping and spoofing relaying to vary the source transmission rate in favor of the eavesdropping performance. To this end, a power splitting receiver is proposed, where the signal received at each antenna of the legitimate monitor is split into two parts for information eavesdropping and spoofing relaying, respectively. We formulate an optimization problem to maximize the achievable eavesdropping rate by jointly optimizing the power splitting ratios and relay precoding matrix at the multiantenna monitor. Depending on the suspicious and eavesdropping channel conditions, the optimal solution corresponds to three possible spoofing relay strategies, namely constructive relaying, jamming, and simultaneous jamming and destructive relaying. Numerical results show that the proposed technique significantly improves the eavesdropping rate of the legitimate monitor as compared to the existing passive eavesdropping and jamming-assisted eavesdropping schemes.
引用
收藏
页码:1449 / 1461
页数:13
相关论文
共 30 条
  • [1] [Anonymous], 2013, Matrix Analysis
  • [2] [Anonymous], 2005, Wireless Communications
  • [3] On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers
    Chorti, Arsenia
    Perlaza, Samir M.
    Han, Zhu
    Poor, H. Vincent
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1850 - 1863
  • [4] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [5] Cooperation With an Untrusted Relay: A Secrecy Perspective
    He, Xiang
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) : 3807 - 3827
  • [6] Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems [An overview of signal processing approaches]
    Hong, Y. -W. Peter
    Lan, Pang-Chang
    Kuo, C. -C. Jay
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) : 29 - 40
  • [7] Kang J. W., 2015, 2015 24 INT C COMPUT
  • [8] Kapetanovic D, 2014, 2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), P585, DOI 10.1109/PIMRC.2014.7136233
  • [9] Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks
    Kapetanovic, Dzevdan
    Zheng, Gan
    Rusek, Fredrik
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) : 21 - 27
  • [10] Kapetanovic D, 2013, 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), P13, DOI 10.1109/PIMRC.2013.6666096