Performance of Covert Surveillance via Proactive Eavesdropping

被引:0
作者
Tu, Shumin [1 ]
Si, Jiangbo [2 ]
Cheng, Zihao [2 ]
Guan, Lei [2 ]
Wang, Chao [2 ]
机构
[1] 722 Res Inst, Wuhan 430079, Hubei, Peoples R China
[2] Xidian Univ, Integrated Serv Networks Lab, Xian 710071, Peoples R China
来源
2020 12TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP) | 2020年
关键词
Channel uncertainty; Covert communication; Full-duplex; Legitimate surveillance; Proactive eavesdropping; COMMUNICATION; DESIGN; LIMITS;
D O I
10.1109/wcsp49889.2020.9299707
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Surveillance performance is studied in this paper for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which degrades the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the eavesdropping non-outage probability under a covert constraint. Based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious and the jamming links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the suspicious link uncertainty enhances the surveillance performance, while the jamming link uncertainty can degrade the surveillance performance.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [41] Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 641 - 646
  • [42] Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks
    Wang, Hui-Ming
    Zhang, Yan
    Zhang, Xu
    Li, Zhetao
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 389 - 401
  • [43] Robust proactive eavesdropping in UAV-enabled wireless communication networking
    Wu, Wei
    Wang, Yujing
    Mo, Jianlin
    Liu, Jian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [44] Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks
    Xu, Ding
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13958 - 13963
  • [45] Proactive Eavesdropping Over OFDM-Based Bidirectional Suspicious Communication Channels
    Xu, Ding
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (06) : 1178 - 1182
  • [46] Cooperative Double-IRS Aided Proactive Eavesdropping
    Cao, Yang
    Duan, Lingjie
    Jin, Minglu
    Zhao, Nan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 6228 - 6240
  • [47] Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) : 4817 - 4830
  • [48] Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels
    Xu, Ding
    Zhu, Hongbo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1111 - 1126
  • [49] Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks
    Hu, Guojie
    Ouyang, Jian
    Cai, Yueming
    Cai, Yunlong
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3415 - 3426
  • [50] Safeguarding Backscatter RFID Communication against Proactive Eavesdropping
    Zhao, Bing-Qing
    Wang, Hui-Ming
    Jiang, Jia-Cheng
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,