Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

被引:37
|
作者
Moon, Jihwan [1 ]
Lee, Sang Hyun [1 ]
Lee, Hoon [2 ]
Lee, Inkyu [1 ]
机构
[1] Korea Univ, Sch Elect Engn, Seoul 02841, South Korea
[2] Pukyong Natl Univ, Dept Informat & Commun Engn, Busan 48513, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; proactive eavesdropping; wireless surveillance; cooperative jamming; node selection; SECRECY CAPACITY; NETWORKS; RELAY; SURVEILLANCE; INFORMATION;
D O I
10.1109/TWC.2019.2918452
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.
引用
收藏
页码:3726 / 3738
页数:13
相关论文
共 50 条
  • [21] Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Zhu, Fengchao
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (01) : 3 - 7
  • [22] Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) : 4817 - 4830
  • [23] Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming
    Sun, Li
    Zhang, Yong
    Swindlehurst, A. Lee
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [24] Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) : 80 - 83
  • [25] Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications
    Hu, Guojie
    Zhu, Fengchao
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 667 - 671
  • [26] Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach
    Xu, Hongbin
    Sun, Li
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [27] Network Codes Resilient to Jamming and Eavesdropping
    Yao, Hongyi
    Silva, Danilo
    Jaggi, Sidharth
    Langberg, Michael
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2014, 22 (06) : 1978 - 1987
  • [28] Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength
    Xu, Ding
    Zhu, Hongbo
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (11) : 7505 - 7519
  • [29] Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1267 - 1271
  • [30] An eavesdropping and jamming dilemma with sophisticated players
    Garnaev, Andrey
    Trappe, Wade
    ICT EXPRESS, 2023, 9 (04): : 691 - 696