Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

被引:37
|
作者
Moon, Jihwan [1 ]
Lee, Sang Hyun [1 ]
Lee, Hoon [2 ]
Lee, Inkyu [1 ]
机构
[1] Korea Univ, Sch Elect Engn, Seoul 02841, South Korea
[2] Pukyong Natl Univ, Dept Informat & Commun Engn, Busan 48513, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; proactive eavesdropping; wireless surveillance; cooperative jamming; node selection; SECRECY CAPACITY; NETWORKS; RELAY; SURVEILLANCE; INFORMATION;
D O I
10.1109/TWC.2019.2918452
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.
引用
收藏
页码:3726 / 3738
页数:13
相关论文
共 50 条
  • [1] Proactive Eavesdropping via Pilot Contamination and Jamming
    Linqing Wan
    Guangchi Zhang
    Miao Cui
    Fan Lin
    Wireless Personal Communications, 2018, 99 : 1405 - 1421
  • [2] Proactive Eavesdropping via Pilot Contamination and Jamming
    Wan, Linqing
    Zhang, Guangchi
    Cui, Miao
    Lin, Fan
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (03) : 1405 - 1421
  • [3] Proactive Eavesdropping via Jamming in NOMA Network
    Tung Pham Huu
    Van Nhan Vo
    Hung Tran
    Truong Xuan Quach
    Viet Nguyen Dinh
    IEEE ACCESS, 2021, 9 : 168121 - 168133
  • [4] Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming
    Xu, Hongbin
    Sun, Li
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) : 10713 - 10727
  • [5] Proactive Eavesdropping via Jamming in Cognitive Radio Networks
    Li, Pei
    Zhang, Haiyang
    Wu, Wei
    Dai, Haibo
    Wang, Baoyun
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [6] Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
    Li, Kai
    Kanhere, Salil S.
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 477 - 482
  • [7] Proactive Eavesdropping via Cognitive Jamming in Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (05) : 2790 - 2806
  • [8] Proactive Eavesdropping via Cognitive Jamming in Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [9] Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 641 - 646
  • [10] Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,