Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty

被引:21
|
作者
Cheng, Zihao [1 ]
Si, Jiangbo [1 ,2 ]
Li, Zan [1 ]
Guan, Lei [1 ]
Zhao, Yan [1 ]
Wang, Danyang [1 ]
Cheng, Julian [3 ]
Al-Dhahir, Naofal [2 ]
机构
[1] Xidian Univ, Integrated Serv Networks Lab, Xian 710071, Peoples R China
[2] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[3] Univ British Columbia, Sch Engn, Kelowna, BC V1V 1V7, Canada
基金
中国国家自然科学基金;
关键词
Uncertainty; Surveillance; Eavesdropping; Receivers; Jamming; Wireless communication; Interference cancellation; Channel uncertainty; covert communication; full-duplex; legitimate surveillance; proactive eavesdropping; PHYSICAL-LAYER SECURITY; WIRELESS COMMUNICATIONS; COMMUNICATION; TRANSMISSION; DESIGN; LIMITS; RELAY;
D O I
10.1109/TCOMM.2021.3067058
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which can therefore degrade the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the surveillance performance under a covert constraint. Then, based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious-transmitter-to-suspicious-receiver and the monitor-to-suspicious-receiver links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the uncertainty in the suspicious user's link can enhance the surveillance performance, while the uncertainty in the monitor-to-suspicious-receiver link can degrade the surveillance performance.
引用
收藏
页码:4024 / 4037
页数:14
相关论文
共 50 条
  • [21] Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming
    Sun, Li
    Zhang, Yong
    Swindlehurst, A. Lee
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [22] Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks
    Wang, Hui-Ming
    Zhang, Yan
    Zhang, Xu
    Li, Zhetao
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 389 - 401
  • [23] Proactive Eavesdropping via Opportunistic Energy Transfer and Jamming for Wireless-Powered Suspicious Communication
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02): : 1055 - 1068
  • [24] Proactive Eavesdropping via Jamming Over Multiple Suspicious Links With Wireless-Powered Monitor
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 354 - 358
  • [25] Covert UAV Communication by Exploiting Imperfect Cancellation Under Channel Uncertainty
    Gao, Tian
    Chen, Zhao
    Yin, Liuguo
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04) : 1543 - 1552
  • [26] Proactive Eavesdropping via Jamming in Cognitive Radio Networks
    Li, Pei
    Zhang, Haiyang
    Wu, Wei
    Dai, Haibo
    Wang, Baoyun
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [27] Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
    Li, Kai
    Kanhere, Salil S.
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 477 - 482
  • [28] Proactive Eavesdropping via Cognitive Jamming in Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [29] Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) : 80 - 83
  • [30] Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Zhu, Fengchao
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (01) : 3 - 7