Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection

被引:32
作者
Feizi, Farnaz [1 ]
Mohammadi, Mohammadali [1 ]
Mobini, Zahra [1 ]
Tellambura, Chintha [2 ]
机构
[1] Shahrekord Univ, Fac Engn, Shahrekord 115, Iran
[2] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 2V4, Canada
关键词
Eavesdropping; Jamming; Antennas; Array signal processing; Surveillance; Wireless communication; Eavesdropping non-outage probability; proactive monitoring; full-duplex (FD); beamforming; antenna selection; LEGITIMATE SURVEILLANCE; RELAY; OPTIMIZATION; SECURITY; RANK;
D O I
10.1109/TCOMM.2020.3022349
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the application of full-duplex (FD) multi-antenna transceivers in proactive eavesdropping systems. To this end, we jointly optimize the transmit and receive beamformers at the legitimate FD monitor to maximize the eavesdropping non-outage probability of the system. The resulting non-convex problem is solved using two-layer decomposition technique. The inner layer problem is formulated as a semidefinite relaxation problem, and the outer problem is solved by one-dimensional line search. We further propose sub-optimum beamforming designs, where the beamformers are obtained using zero-forcing, and maximum ratio transmission. To archive a low-complexity implementation, we study the antenna selection problem as an alternative for performance optimization. Particularly, based on the system's eavesdropping non-outage probability, several antenna selection schemes are proposed to choose single transmit and single receive antenna at the FD monitor. For each scheme, we derive closed-form expressions of the eavesdropping non-outage probability. Our findings reveal that proposed antenna selection schemes can achieve the performance close to that of the proposed optimum/sub-optimum beamforming design, but with much lower implementation complexity.
引用
收藏
页码:7563 / 7577
页数:15
相关论文
共 42 条
  • [1] Performance of Transmit Antenna Selection Physical Layer Security Schemes
    Alves, Hirley
    Souza, Richard Demo
    Debbah, Merouane
    Bennis, Mehdi
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) : 372 - 375
  • [2] Bharadia D., 2014, P 11 USENIX S NETW S, P359
  • [3] Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels
    Cai, Hui
    Zhang, Qi
    Li, Quanzhong
    Qin, Jiayin
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) : 2021 - 2024
  • [4] Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems
    Cai, Yunlong
    Zhao, Cunzhuo
    Shi, Qingjiang
    Li, Geoffrey Ye
    Champagne, Benoit
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) : 1410 - 1425
  • [5] Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer
    Chu, Zheng
    Cumanan, Kanapathippillai
    Ding, Zhiguo
    Johnston, Martin
    Le Goff, Stephane Y.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) : 1833 - 1847
  • [6] Fractional QCQP With Applications in ML Steering Direction Estimation for Radar Detection
    De Maio, Antonio
    Huang, Yongwei
    Palomar, Daniel P.
    Zhang, Shuzhong
    Farina, Alfonso
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (01) : 172 - 185
  • [7] Feizi F, 2018, 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P641, DOI 10.1109/ISTEL.2018.8661117
  • [8] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189
  • [9] Horn R., 2013, MATRIX ANAL
  • [10] Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks
    Hu, Dingkun
    Zhang, Qi
    Yang, Ping
    Qin, Jiayin
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) : 1714 - 1718