Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming

被引:6
作者
Zhang, Haiyang [1 ]
Duan, Lingjie [1 ]
Zhang, Rui [2 ]
机构
[1] Singapore Univ Technol & Design, Engn Syst & Design Pillar, Singapore, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
关键词
SURVEILLANCE;
D O I
10.1109/ICC.2019.8761976
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor (e.g., the National Security Agency in the USA) attempts to eavesdrop more than one suspicious communication links simultaneously to maximally protect public security. To facilitate concurrent eavesdropping, our multi-antenna monitor employs a proactive eavesdropping via jamming approach, by purposely jamming suspicious receivers to lower the transmission rates of the target links. In particular, we are interested in characterizing the monitor's achievable eavesdropping signal-to-interference-plusnoise ratio (SINR) region of two suspicious links, by optimizing the legitimate monitor's transmit covariance matrix for jamming the two suspicious receivers. As the monitor cannot hear more than what suspicious links transmit, the achievable eavesdropping SINR region is essentially the intersection of the achievable region for the two suspicious links and that for the two eavesdropping links, and the former region can be purposely altered by the monitor's jamming transmit covariance matrix subject to its power budget. As both suspicious links' SINRs are affected by monitor's jamming covariance matrix, we first analyze the achievable region bounds for both suspicious links and then characterize the achievable eavesdropping SINK region. Finally, numerical results are provided to corroborate our analysis.
引用
收藏
页数:6
相关论文
共 37 条
  • [31] Proactive Monitoring via Jamming With Finite Blocklength Transmissions
    Yao, Junteng
    Zhang, Qi
    Qin, Jiayin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (01) : 1020 - 1025
  • [32] Legitimate Monitoring via Cooperative Relay and Proactive Jamming
    Zhu, Min
    Mo, Jianlin
    Xiong, Naixue
    Wang, Jin
    IEEE ACCESS, 2019, 7 : 40133 - 40143
  • [33] Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks
    Xu, Ding
    Zhu, Hongbo
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 954 - 965
  • [34] Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (04) : 5384 - 5389
  • [35] Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks
    Hu, Guojie
    Ouyang, Jian
    Cai, Yueming
    Cai, Yunlong
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3415 - 3426
  • [36] Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
    Lu, Xingbo
    Yang, Weiwei
    Cai, Yueming
    Guan, Xinrong
    IEEE ACCESS, 2019, 7 : 151295 - 151306
  • [37] Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors
    Huang, Shan
    Zhang, Qi
    Li, Quanzhong
    Qin, Jiayin
    IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (05) : 690 - 694