Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming

被引:6
|
作者
Zhang, Haiyang [1 ]
Duan, Lingjie [1 ]
Zhang, Rui [2 ]
机构
[1] Singapore Univ Technol & Design, Engn Syst & Design Pillar, Singapore, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
关键词
SURVEILLANCE;
D O I
10.1109/ICC.2019.8761976
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor (e.g., the National Security Agency in the USA) attempts to eavesdrop more than one suspicious communication links simultaneously to maximally protect public security. To facilitate concurrent eavesdropping, our multi-antenna monitor employs a proactive eavesdropping via jamming approach, by purposely jamming suspicious receivers to lower the transmission rates of the target links. In particular, we are interested in characterizing the monitor's achievable eavesdropping signal-to-interference-plusnoise ratio (SINR) region of two suspicious links, by optimizing the legitimate monitor's transmit covariance matrix for jamming the two suspicious receivers. As the monitor cannot hear more than what suspicious links transmit, the achievable eavesdropping SINR region is essentially the intersection of the achievable region for the two suspicious links and that for the two eavesdropping links, and the former region can be purposely altered by the monitor's jamming transmit covariance matrix subject to its power budget. As both suspicious links' SINRs are affected by monitor's jamming covariance matrix, we first analyze the achievable region bounds for both suspicious links and then characterize the achievable eavesdropping SINK region. Finally, numerical results are provided to corroborate our analysis.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection
    Moon, Jihwan
    Lee, Sang Hyun
    Lee, Hoon
    Lee, Inkyu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (07) : 3726 - 3738
  • [22] Cooperative proactive eavesdropping over two-hop suspicious communication based on reinforcement learning
    Yang Y.
    Li B.
    Zhang S.
    Zhao W.
    Jiao L.
    Journal of Communications and Information Networks, 2021, 6 (02) : 166 - 174
  • [23] Proactive Eavesdropping of Jamming-Assisted Suspicious Communications in Fading Channels: A Stackelberg Game Approach
    Xu, Ding
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (05) : 2913 - 2928
  • [24] Proactive Eavesdropping Over OFDM-Based Bidirectional Suspicious Communication Channels
    Xu, Ding
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (06) : 1178 - 1182
  • [25] Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
    Hu, Guojie
    Cai, Yueming
    IEEE ACCESS, 2019, 7 : 139035 - 139046
  • [26] Proactive Eavesdropping via Jamming for Power-Limited UAV Communications
    Zhang, Mingzhu
    Yi, Hongju
    Chen, Yu
    Tao, Xiaofeng
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [27] Proactive Eavesdropping via Jamming over HARQ-Based Communications
    Xu, Jie
    Li, Kai
    Duan, Lingjie
    Zhang, Rui
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [28] Proactive Eavesdropping via Jamming for Multichannel Decode-and-Forward Relay System
    Hu, Guojie
    Cai, Yueming
    Ouyang, Jian
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (03) : 491 - 495
  • [29] Wireless Physical-Layer Surveillance via Proactive Eavesdropping and Alternate Jamming
    Sun, Li
    Zhang, Yong
    Swindlehurst, A. Lee
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [30] Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) : 80 - 83