Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks

被引:4
作者
Ma, Rui [1 ]
Wu, Haowei [1 ,2 ,3 ]
Ou, Jinglan [1 ]
Peng, Qihao [1 ]
Gao, Yue [4 ]
机构
[1] Chongqing Univ, Sch Microelect & Commun Engn, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Ctr Commun & Tracking Telemetry Command, Chongqing 400044, Peoples R China
[3] Chongqing Key Lab Space Informat Network & Intell, Chongqing 400044, Peoples R China
[4] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Eavesdropping; Relays; Optimization; Jamming; Communication systems; Surveillance; Proactive eavesdropping; wireless power transfer; average eavesdropping rate; deep feedforward neural network; power optimization; RATE MAXIMIZATION; ALLOCATION; SURVEILLANCE; SYSTEMS;
D O I
10.1109/ACCESS.2020.3033881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon and then communicates with one suspect destination. Under this setup, a relay-aided proactive eavesdropping scheme is designed to improve the surveillance performance of the system. The closed-form expressions are derived under linear and nonlinear EH models, including the decoding outage probability for the suspicious link, the eavesdropping outage probability for the eavesdropping link, and the average eavesdropping rate (AER). Based on these obtained expressions, an optimization problem to maximize the AER is formulated by jointly optimizing the power and location of the relay. The existence of the optimal solution is carefully analyzed. Moreover, the separate optimization issues of the power and location are first established, and then a bisection-based searching algorithm is presented for the joint optimization problem with the linear EH model. Furthermore, to reduce the complexity of joint optimization, a low-complexity learning-based iteration algorithm is further proposed by employing the well-fitting characteristic of the deep feedforward neural network. Numerical results verify the effectiveness of the proposed algorithm, and show that the optimized FD relay-aided proactive eavesdropping scheme outperforms the reference schemes. Finally, the application scenarios of the proposed proactive eavesdropping scheme are discussed.
引用
收藏
页码:196712 / 196726
页数:15
相关论文
共 42 条
[1]   Sensitive and Nonlinear Far-Field RF Energy Harvesting in Wireless Communications [J].
Alevizos, Panos N. ;
Bletsas, Aggelos .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :3670-+
[2]  
[Anonymous], 2018, P IEEE GLOB COMM C G
[3]   Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems [J].
Boshkovska, Elena ;
Ng, Derrick Wing Kwan ;
Zlatanov, Nikola ;
Schober, Robert .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (12) :2082-2085
[4]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[5]   Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial [J].
Chen, Mingzhe ;
Challita, Ursula ;
Saad, Walid ;
Yin, Changchuan ;
Debbah, Merouane .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3039-3071
[6]   Wireless Energy Harvesting Using Signals From Multiple Fading Channels [J].
Chen, Yunfei ;
Zhao, Nan ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (11) :5027-5039
[7]   On the Lambert W function [J].
Corless, RM ;
Gonnet, GH ;
Hare, DEG ;
Jeffrey, DJ ;
Knuth, DE .
ADVANCES IN COMPUTATIONAL MATHEMATICS, 1996, 5 (04) :329-359
[8]  
Feizi F, 2018, 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P641, DOI 10.1109/ISTEL.2018.8661117
[9]   Epigenetic regulation of cancer progression by EZH2: from biological insights to therapeutic potential [J].
Gan, Lu ;
Yang, Yanan ;
Li, Qian ;
Feng, Yi ;
Liu, Tianshu ;
Guo, Weijian .
BIOMARKER RESEARCH, 2018, 6
[10]   Learning-Based Wireless Powered Secure Transmission [J].
He, Dongxuan ;
Liu, Chenxi ;
Wang, Hua ;
Quek, Tony Q. S. .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (02) :600-603