Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay

被引:143
作者
Zeng, Yong [1 ]
Zhang, Rui [1 ,2 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[2] Agcy Sci Technol & Res, Inst Infocomm Res, Singapore 138632, Singapore
关键词
Beamforming; jamming; power splitting; proactive eavesdropping; spoofing relay; wireless information surveillance; COOPERATION;
D O I
10.1109/JSTSP.2016.2600519
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless information surveillance, by which suspicious wireless communications are closely monitored by legitimate agencies, is an integral part of national security. To enhance the information surveillance capability, we propose in this paper a new proactive eavesdropping approach via a spoofing relay, where the legitimate monitor operates in a full-duplex manner with simultaneous eavesdropping and spoofing relaying to vary the source transmission rate in favor of the eavesdropping performance. To this end, a power splitting receiver is proposed, where the signal received at each antenna of the legitimate monitor is split into two parts for information eavesdropping and spoofing relaying, respectively. We formulate an optimization problem to maximize the achievable eavesdropping rate by jointly optimizing the power splitting ratios and relay precoding matrix at the multiantenna monitor. Depending on the suspicious and eavesdropping channel conditions, the optimal solution corresponds to three possible spoofing relay strategies, namely constructive relaying, jamming, and simultaneous jamming and destructive relaying. Numerical results show that the proposed technique significantly improves the eavesdropping rate of the legitimate monitor as compared to the existing passive eavesdropping and jamming-assisted eavesdropping schemes.
引用
收藏
页码:1449 / 1461
页数:13
相关论文
共 30 条
[21]   WIRE-TAP CHANNEL [J].
WYNER, AD .
BELL SYSTEM TECHNICAL JOURNAL, 1975, 54 (08) :1355-1387
[22]   An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems [J].
Xiong, Qi ;
Liang, Ying-Chang ;
Li, Kwok Hung ;
Gong, Yi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) :932-940
[23]   Proactive Eavesdropping via Cognitive Jamming in Fading Channels [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
[24]   Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) :80-83
[25]   Secure communication with a relay helping the wire-tapper [J].
Yuksel, Melda ;
Erkip, Elza .
2007 IEEE INFORMATION THEORY WORKSHOP, VOLS 1 AND 2, 2007, :595-600
[26]   A Secure Communication Game With a Relay Helping the Eavesdropper [J].
Yuksel, Melda ;
Liu, Xi ;
Erkip, Elza .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :818-830
[27]  
Zeng Y, 2016, INT CONF ACOUST SPEE, P2159, DOI 10.1109/ICASSP.2016.7472059
[28]   MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer [J].
Zhang, Rui ;
Ho, Chin Keong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (05) :1989-2001
[29]   Pilot Contamination for Active Eavesdropping [J].
Zhou, Xiangyun ;
Maham, Behrouz ;
Hjorungnes, Are .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (03) :903-907
[30]   Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff [J].
Zhou, Xun ;
Zhang, Rui ;
Ho, Chin Keong .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (11) :4754-4767