Proactive Eavesdropping via Pilot Contamination and Jamming

被引:6
|
作者
Wan, Linqing [1 ,2 ]
Zhang, Guangchi [1 ]
Cui, Miao [1 ]
Lin, Fan [3 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
[2] SIPO, Patent Examinat Cooperat Ctr, Patent Off, Guangzhou, Guangdong, Peoples R China
[3] Guangzhou GCI Sci & Technol Co Ltd, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Legitimate surveillance; Proactive eavesdropping; Pilot contamination; Jamming; Eavesdropping rate; PHYSICAL LAYER SECURITY; CHANNELS;
D O I
10.1007/s11277-017-5213-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter on channel estimation by sending the same pilot signal as the suspicious receiver, and lets it leak information in the direction of the legitimate eavesdropper during its transmission. However, this technique may fail when an anti-pilot-contamination mechanism called "energy ratio detector (ERD)" is applied at the suspicious receiver. To deal with the case that the suspicious receiver is a smart device using ERD, in this paper, we study using pilot contamination along with jamming to improve the legitimate eavesdropping performance. We first derive a closed-form expression for the probability of pilot contamination being detected by the suspicious receiver, and use it to obtain a closed-form expression for the eavesdropping rate. Using this theoretical analysis result, we propose an algorithm to maximize the eavesdropping rate by jointly optimizing the pilot contamination power and jamming power via two-dimensional search. Simulation results show that the proposed eavesdropping rate maximization algorithm can significantly improve eavesdropping rate, as compared to other benchmark schemes.
引用
收藏
页码:1405 / 1421
页数:17
相关论文
共 50 条
  • [31] Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach
    Xu, Hongbin
    Sun, Li
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] Joint Optimization of Trajectory and Jamming Power for Multiple UAV-Aided Proactive Eavesdropping
    Guo, Delin
    Tang, Lan
    Zhang, Xinggan
    Liang, Ying-Chang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 5770 - 5785
  • [33] Eavesdropping via Pilot Relay Attack
    Tian, Jiejiao
    Liang, Ying-Chang
    Kang, Xin
    Yang, Gang
    2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2017, : 1117 - 1122
  • [34] Proactive Eavesdropping in Relay Systems via Trajectory and Power Optimization
    Dan, Qian
    Lei, Hongjiang
    Park, Ki-Hong
    Lei, Weijia
    Pan, Gaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33744 - 33757
  • [35] Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty
    Cheng, Zihao
    Si, Jiangbo
    Li, Zan
    Guan, Lei
    Zhao, Yan
    Wang, Danyang
    Cheng, Julian
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (06) : 4024 - 4037
  • [36] Proactive Eavesdropping of Jamming-Assisted Suspicious Communications in Fading Channels: A Stackelberg Game Approach
    Xu, Ding
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (05) : 2913 - 2928
  • [37] Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay
    Zeng, Yong
    Zhang, Rui
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) : 1449 - 1461
  • [38] Proactive Monitoring via Jamming in Fluid Antenna Systems
    Yao, Junteng
    Wu, Tuo
    Lai, Xiazhi
    Jin, Ming
    Pan, Cunhua
    Elkashlan, Maged
    Wong, Kai-Kit
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (07) : 1698 - 1702
  • [39] PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
    Wang, Xiaoming
    Li, Kai
    Kanhere, Salil S.
    Li, Demin
    Zhang, Xiaolu
    Tovar, Eduardo
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 402 - 408
  • [40] Legitimate Monitoring via Cooperative Relay and Proactive Jamming
    Zhu, Min
    Mo, Jianlin
    Xiong, Naixue
    Wang, Jin
    IEEE ACCESS, 2019, 7 : 40133 - 40143