Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks

被引:0
|
作者
Yoon, Young-Jun [1 ,2 ]
Cho, Wanjei [1 ,2 ]
Lee, Seongwook [3 ]
Lee, Jong-Ho [4 ]
Song, Jiho [5 ]
Kim, Seong-Cheol [1 ,2 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 08826, South Korea
[2] Seoul Natl Univ, INMC, Seoul 08826, South Korea
[3] Chung Ang Univ, Coll ICT Engn, Sch Elect & Elect Engn, Seoul 06974, South Korea
[4] Soongsil Univ, Sch Elect Engn, Seoul 06978, South Korea
[5] Hanyang Univ, Dept Elect & Elect Engn, ERICA, Ansan 15588, South Korea
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Adaptive; full-duplex; infrastructure-free; jamming; power allocation; proactive eavesdropping; relay networks; LEGITIMATE SURVEILLANCE; INFORMATION; DESIGN;
D O I
10.1109/ACCESS.2023.3282222
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of advanced communication technologies such as infrastructure-free communication networks, the need for proactive eavesdropping which can constantly monitor and intervene in the communication network is growing. In response to those demands, we study proactive eavesdropping in the general infrastructure-free communication scenario where the legitimate eavesdropper has to monitor a suspicious communication link without the aid of other nodes. Particularly, to enhance proactive eavesdropping performances, we propose the adaptive full-duplex jamming-helping method in which the legitimate eavesdropper selects the best operating mode adaptively depending on the channel conditions unlike conventional studies where the behavior of the monitor node was predetermined. Moreover, we design the optimal power scheme for the proposed method to maximize the eavesdropping rate while minimizing total power consumption of the legitimate eavesdropper simultaneously. In the process, we classify the channel conditions into several mutual exclusive cases to simplify the optimization problem, and present the optimal solution in closed form for each case. Finally, it is verified through simulation results that the proposed method is superior in terms of both the eavesdropping rate and the outage probability than other benchmark methods.
引用
收藏
页码:68682 / 68698
页数:17
相关论文
共 26 条