Proactive Eavesdropping via Pilot Contamination and Jamming

被引:6
|
作者
Wan, Linqing [1 ,2 ]
Zhang, Guangchi [1 ]
Cui, Miao [1 ]
Lin, Fan [3 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
[2] SIPO, Patent Examinat Cooperat Ctr, Patent Off, Guangzhou, Guangdong, Peoples R China
[3] Guangzhou GCI Sci & Technol Co Ltd, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Legitimate surveillance; Proactive eavesdropping; Pilot contamination; Jamming; Eavesdropping rate; PHYSICAL LAYER SECURITY; CHANNELS;
D O I
10.1007/s11277-017-5213-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter on channel estimation by sending the same pilot signal as the suspicious receiver, and lets it leak information in the direction of the legitimate eavesdropper during its transmission. However, this technique may fail when an anti-pilot-contamination mechanism called "energy ratio detector (ERD)" is applied at the suspicious receiver. To deal with the case that the suspicious receiver is a smart device using ERD, in this paper, we study using pilot contamination along with jamming to improve the legitimate eavesdropping performance. We first derive a closed-form expression for the probability of pilot contamination being detected by the suspicious receiver, and use it to obtain a closed-form expression for the eavesdropping rate. Using this theoretical analysis result, we propose an algorithm to maximize the eavesdropping rate by jointly optimizing the pilot contamination power and jamming power via two-dimensional search. Simulation results show that the proposed eavesdropping rate maximization algorithm can significantly improve eavesdropping rate, as compared to other benchmark schemes.
引用
收藏
页码:1405 / 1421
页数:17
相关论文
共 50 条
  • [21] Proactive Eavesdropping via Jamming Over Multiple Suspicious Links With Wireless-Powered Monitor
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 354 - 358
  • [22] Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing
    Moon, Jihwan
    Lee, Hoon
    Song, Changick
    Kang, Seowoo
    Lee, Inkyu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (10) : 6958 - 6971
  • [23] Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming
    Moon, Jihwan
    Lee, Hoon
    Song, Changick
    Lee, Sunho
    Lee, Inkyu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (10) : 6707 - 6719
  • [24] Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems
    Lu, Xingbo
    Yang, Weiwei
    Cai, Yueming
    Guan, Xinrong
    IEEE ACCESS, 2019, 7 : 151295 - 151306
  • [25] Proactive Eavesdropping Via Jamming for Ergodic Rate Maximization Over Wireless-Powered Multichannel Suspicious System
    Hu, Guojie
    Cai, Yueming
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (08) : 1830 - 1834
  • [26] Performance of Covert Surveillance via Proactive Eavesdropping
    Tu, Shumin
    Si, Jiangbo
    Cheng, Zihao
    Guan, Lei
    Wang, Chao
    2020 12TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2020, : 1 - 6
  • [27] Jamming-Assisted Proactive Eavesdropping over Two Suspicious Communication Links
    Engineering Systems and Design Pillar, Singapore University of Technology and Design, Singapore, Singapore
    不详
    518040, China
    不详
    IEEE Trans. Wireless Commun., 2020, 7 (4817-4830):
  • [28] Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) : 4817 - 4830
  • [29] Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications
    Hu, Guojie
    Zhu, Fengchao
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 667 - 671
  • [30] Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    Tellambura, Chintha
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (12) : 7563 - 7577