Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks

被引:4
作者
Ma, Rui [1 ]
Wu, Haowei [1 ,2 ,3 ]
Ou, Jinglan [1 ]
Peng, Qihao [1 ]
Gao, Yue [4 ]
机构
[1] Chongqing Univ, Sch Microelect & Commun Engn, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Ctr Commun & Tracking Telemetry Command, Chongqing 400044, Peoples R China
[3] Chongqing Key Lab Space Informat Network & Intell, Chongqing 400044, Peoples R China
[4] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Eavesdropping; Relays; Optimization; Jamming; Communication systems; Surveillance; Proactive eavesdropping; wireless power transfer; average eavesdropping rate; deep feedforward neural network; power optimization; RATE MAXIMIZATION; ALLOCATION; SURVEILLANCE; SYSTEMS;
D O I
10.1109/ACCESS.2020.3033881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon and then communicates with one suspect destination. Under this setup, a relay-aided proactive eavesdropping scheme is designed to improve the surveillance performance of the system. The closed-form expressions are derived under linear and nonlinear EH models, including the decoding outage probability for the suspicious link, the eavesdropping outage probability for the eavesdropping link, and the average eavesdropping rate (AER). Based on these obtained expressions, an optimization problem to maximize the AER is formulated by jointly optimizing the power and location of the relay. The existence of the optimal solution is carefully analyzed. Moreover, the separate optimization issues of the power and location are first established, and then a bisection-based searching algorithm is presented for the joint optimization problem with the linear EH model. Furthermore, to reduce the complexity of joint optimization, a low-complexity learning-based iteration algorithm is further proposed by employing the well-fitting characteristic of the deep feedforward neural network. Numerical results verify the effectiveness of the proposed algorithm, and show that the optimized FD relay-aided proactive eavesdropping scheme outperforms the reference schemes. Finally, the application scenarios of the proposed proactive eavesdropping scheme are discussed.
引用
收藏
页码:196712 / 196726
页数:15
相关论文
共 42 条
[11]   Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach [J].
He, Dongxuan ;
Liu, Chenxi ;
Quek, Tony Q. S. ;
Wang, Hua .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (04) :634-637
[12]   Applications of Self-Interference Cancellation in 5G and Beyond [J].
Hong, Steven ;
Brand, Joel ;
Choi, Jung Il ;
Jain, Mayank ;
Mehlman, Jeff ;
Katti, Sachin ;
Levis, Philip .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (02) :114-121
[13]   MULTILAYER FEEDFORWARD NETWORKS ARE UNIVERSAL APPROXIMATORS [J].
HORNIK, K ;
STINCHCOMBE, M ;
WHITE, H .
NEURAL NETWORKS, 1989, 2 (05) :359-366
[14]   Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks [J].
Hu, Dingkun ;
Zhang, Qi ;
Yang, Ping ;
Qin, Jiayin .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (11) :1714-1718
[15]   Proactive Eavesdropping Via Jamming for Ergodic Rate Maximization Over Wireless-Powered Multichannel Suspicious System [J].
Hu, Guojie ;
Cai, Yueming .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (08) :1830-1834
[16]   Proactive Eavesdropping via Jamming for Multichannel Decode-and-Forward Relay System [J].
Hu, Guojie ;
Cai, Yueming ;
Ouyang, Jian .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (03) :491-495
[17]  
Tran H, 2016, 2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), P457, DOI 10.1109/CCE.2016.7562679
[18]   Proactive Eavesdropping in Relaying Systems [J].
Jiang, Xin ;
Lin, Hai ;
Zhong, Caijun ;
Chen, Xiaoming ;
Zhang, Zhaoyang .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (06) :917-921
[19]   Secrecy Performance of Wirelessly Powered Wiretap Channels [J].
Jiang, Xin ;
Zhong, Caijun ;
Chen, Xiaoming ;
Duong, Trung Q. ;
Tsiftsis, Theodoros A. ;
Zhang, Zhaoyang .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (09) :3858-3871
[20]   Joint optimal power allocation and relay location for decode-and-forward multi-hop relaying over log-normal channel [J].
Kundu, Chinmoy ;
Bose, Ranjan .
IET COMMUNICATIONS, 2015, 9 (18) :2197-2207