Proactive Eavesdropping in Relaying Systems

被引:76
作者
Jiang, Xin [1 ]
Lin, Hai [2 ]
Zhong, Caijun [1 ]
Chen, Xiaoming [1 ]
Zhang, Zhaoyang [1 ]
机构
[1] Zhejiang Univ, Inst Informat & Commun Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Osaka Prefecture Univ, Dept Elect & Informat Syst, Osaka 5998531, Japan
基金
中国国家自然科学基金;
关键词
Beamformer design; decode-and-forward (DF) relay; legitimate surveillance; power allocation; proactive eaves-dropping;
D O I
10.1109/LSP.2017.2696305
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are proposed, where the legitimate monitor adaptively acts as an eavesdropper, a jammer, or a helper. In addition, the corresponding optimal jamming beamformer and jamming power are presented. Numerical results demonstrate that the proposed strategies attain better performance compared with intuitive benchmark schemes. Moreover, it is revealed that the position of the legitimate monitor plays an important role on the eavesdropping performance for the two strategies.
引用
收藏
页码:917 / 921
页数:5
相关论文
共 10 条
[1]  
[Anonymous], DATABASE, DOI DOI 10.3390/PHARMACEUTICS8010008
[2]  
Boyd S, 2004, CONVEX OPTIMIZATION
[3]   Relaying Protocols for Wireless Energy Harvesting and Information Processing [J].
Nasir, Ali A. ;
Zhou, Xiangyun ;
Durrani, Salman ;
Kennedy, Rodney A. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (07) :3622-3636
[4]   Trust Degree Based Beamforming for MISO Cooperative Communication System [J].
Ryu, Jong Yeol ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (11) :1957-1960
[5]   Transmit beamforming for physical-layer multicasting [J].
Sidiropoulos, Nicholas D. ;
Davidson, Timothy N. ;
Luo, Zhi-Quan .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (06) :2239-2251
[6]   Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks [J].
Wang, Dawei ;
Ren, Pinyi ;
Du, Qinghe ;
Wang, Yichen ;
Sun, Li .
IEEE ACCESS, 2017, 5 :3763-3776
[7]   Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) :80-83
[8]   Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay [J].
Zeng, Yong ;
Zhang, Rui .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1449-1461
[9]  
Zhong C., 2017, IEEE T WIRE IN PRESS
[10]   A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends [J].
Zou, Yulong ;
Zhu, Jia ;
Wang, Xianbin ;
Hanzo, Lajos .
PROCEEDINGS OF THE IEEE, 2016, 104 (09) :1727-1765