Proactive Eavesdropping via Pilot Contamination and Jamming

被引:6
|
作者
Wan, Linqing [1 ,2 ]
Zhang, Guangchi [1 ]
Cui, Miao [1 ]
Lin, Fan [3 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou, Guangdong, Peoples R China
[2] SIPO, Patent Examinat Cooperat Ctr, Patent Off, Guangzhou, Guangdong, Peoples R China
[3] Guangzhou GCI Sci & Technol Co Ltd, Guangzhou, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Legitimate surveillance; Proactive eavesdropping; Pilot contamination; Jamming; Eavesdropping rate; PHYSICAL LAYER SECURITY; CHANNELS;
D O I
10.1007/s11277-017-5213-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter on channel estimation by sending the same pilot signal as the suspicious receiver, and lets it leak information in the direction of the legitimate eavesdropper during its transmission. However, this technique may fail when an anti-pilot-contamination mechanism called "energy ratio detector (ERD)" is applied at the suspicious receiver. To deal with the case that the suspicious receiver is a smart device using ERD, in this paper, we study using pilot contamination along with jamming to improve the legitimate eavesdropping performance. We first derive a closed-form expression for the probability of pilot contamination being detected by the suspicious receiver, and use it to obtain a closed-form expression for the eavesdropping rate. Using this theoretical analysis result, we propose an algorithm to maximize the eavesdropping rate by jointly optimizing the pilot contamination power and jamming power via two-dimensional search. Simulation results show that the proposed eavesdropping rate maximization algorithm can significantly improve eavesdropping rate, as compared to other benchmark schemes.
引用
收藏
页码:1405 / 1421
页数:17
相关论文
共 50 条
  • [41] Proactive Monitoring via Jamming With Finite Blocklength Transmissions
    Yao, Junteng
    Zhang, Qi
    Qin, Jiayin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (01) : 1020 - 1025
  • [42] On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
    Hu, Yingdong
    Gao, Ruifeng
    Li, Ye
    Zhang, Shibing
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (04)
  • [43] On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
    Yingdong Hu
    Ruifeng Gao
    Ye Li
    Shibing Zhang
    Science China Information Sciences, 2019, 62
  • [44] Proactive Eavesdropping in UAV Systems Via Trajectory Planning and Power Optimization
    Huang, Mengya
    Chen, Yu
    Tao, Xiaofeng
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [45] On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
    Yingdong HU
    Ruifeng GAO
    Ye LI
    Shibing ZHANG
    Science China(Information Sciences), 2019, 62 (04) : 157 - 166
  • [46] Proactive Eavesdropping in Relaying Systems
    Jiang, Xin
    Lin, Hai
    Zhong, Caijun
    Chen, Xiaoming
    Zhang, Zhaoyang
    IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (06) : 917 - 921
  • [47] Secure Multicast Communications via RIS Against Eavesdropping and Jamming With Imperfect CSI
    Lin, Shengbin
    Xu, Yitao
    Wang, Haichao
    Gu, Jiangchun
    Liu, Jiteng
    Ding, Guoru
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16805 - 16810
  • [48] Borrowing Arrows With Thatched Boats: Exploiting the Reactive Primary Communications for Boosting Jamming-Assisted Proactive Eavesdropping
    Hu, Guojie
    Si, Jiangbo
    Li, Zan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (09) : 5035 - 5052
  • [49] Higher Secrecy Capacity by Successive Pilot Contamination and Jamming Cancellation
    Ahmed, Awais
    Zia, Muhammad
    Bhatti, Naeem
    Mahmood, Hasan
    Han, Huy-Dung
    IEEE ACCESS, 2022, 10 : 132040 - 132048
  • [50] Network Codes Resilient to Jamming and Eavesdropping
    Yao, Hongyi
    Silva, Danilo
    Jaggi, Sidharth
    Langberg, Michael
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2014, 22 (06) : 1978 - 1987