Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

被引:21
作者
Li, Baogang [1 ]
Yao, Yuanbin [1 ]
Zhang, Haijun [2 ]
Lv, Yabo [1 ]
Zhao, Wei [1 ]
机构
[1] North China Elect Power Univ, Dept Elect & Commun Engn, Baoding 071003, Peoples R China
[2] Univ Sci & Technol Beijing, Beijing Engn & Technol Res Ctr Convergence Networ, Beijing 100083, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Legitimate surveillance; eavesdropping energy efficiency; proactive eavesdropping; MINLP; eavesdropping ratio; SURVEILLANCE;
D O I
10.1109/ACCESS.2018.2837059
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general objective is to maximize EEE while all the suspicious links are eavesdropped, which can be accomplished through either jamming or assisting each suspicious link at a suspicious receiver under the consideration of many practical limitations, such as transmission strategy of a suspicious transmitter, power budget of legitimate monitor (LM), and eavesdropping ratio of a whole system. The formulated problem leads to a challenging mixed-integer nonlinear programming (MINLP) problem. To solve this problem, we propose a novel eavesdropping scheme by the special characteristic of eavesdropping, and the complex MINLP problem can be transformed to a concave optimization problem by a series of transformations, which can be solved by the Lagrange multiplier method. Considering the infeasibility of our proposed eavesdropping scheme when the power of LM is insufficient to eavesdrop all the suspicious links, we propose a heuristic algorithm to obtain a tradeoff between EEE and eavesdropping ratio. Numerical results show that our proposed eavesdropping schemes outperform the proactive jamming scheme and the average-power eavesdropping scheme.
引用
收藏
页码:26081 / 26090
页数:10
相关论文
共 16 条
[1]   Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer [J].
Bi, Ying ;
Chen, He .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1538-1550
[2]   Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels [J].
Cai, Hui ;
Zhang, Qi ;
Li, Quanzhong ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2021-2024
[3]   A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things [J].
Han, Guangjie ;
Zhou, Lina ;
Wang, Hao ;
Zhang, Wenbo ;
Chan, Sammy .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :689-697
[4]   A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities [J].
Han, Guangjie ;
Liu, Li ;
Zhang, Wenbo ;
Chan, Sammy .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :92-98
[5]  
Tran H, 2016, 2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), P457, DOI 10.1109/CCE.2016.7562679
[6]   Proactive Eavesdropping in Relaying Systems [J].
Jiang, Xin ;
Lin, Hai ;
Zhong, Caijun ;
Chen, Xiaoming ;
Zhang, Zhaoyang .
IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (06) :917-921
[7]  
Ma G., 2017, WIRELESS SURVEILLANC
[8]   Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer [J].
Moon, Jihwan ;
Lee, Hoon ;
Song, Changick ;
Lee, Inkyu .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (02) :764-774
[9]   Artificial Noise Assisted Secure Transmission Under Training and Feedback [J].
Wang, Hui-Ming ;
Wang, Chao ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (23) :6285-6298
[10]   SURVEILLANCE AND INTERVENTION OF INFRASTRUCTURE-FREE MOBILE COMMUNICATIONS: A NEW WIRELESS SECURITY PARADIGM [J].
Xu, Jie ;
Duan, Lingjie ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (04) :152-159