Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming

被引:6
|
作者
Zhang, Haiyang [1 ]
Duan, Lingjie [1 ]
Zhang, Rui [2 ]
机构
[1] Singapore Univ Technol & Design, Engn Syst & Design Pillar, Singapore, Singapore
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
关键词
SURVEILLANCE;
D O I
10.1109/ICC.2019.8761976
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor (e.g., the National Security Agency in the USA) attempts to eavesdrop more than one suspicious communication links simultaneously to maximally protect public security. To facilitate concurrent eavesdropping, our multi-antenna monitor employs a proactive eavesdropping via jamming approach, by purposely jamming suspicious receivers to lower the transmission rates of the target links. In particular, we are interested in characterizing the monitor's achievable eavesdropping signal-to-interference-plusnoise ratio (SINR) region of two suspicious links, by optimizing the legitimate monitor's transmit covariance matrix for jamming the two suspicious receivers. As the monitor cannot hear more than what suspicious links transmit, the achievable eavesdropping SINR region is essentially the intersection of the achievable region for the two suspicious links and that for the two eavesdropping links, and the former region can be purposely altered by the monitor's jamming transmit covariance matrix subject to its power budget. As both suspicious links' SINRs are affected by monitor's jamming covariance matrix, we first analyze the achievable region bounds for both suspicious links and then characterize the achievable eavesdropping SINK region. Finally, numerical results are provided to corroborate our analysis.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Proactive eavesdropping of wireless powered suspicious interference networks
    Ding Xu
    Hongbo Zhu
    Science China Information Sciences, 2021, 64
  • [32] Proactive eavesdropping of wireless powered suspicious interference networks
    Xu, Ding
    Zhu, Hongbo
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (12)
  • [33] Proactive eavesdropping of wireless powered suspicious interference networks
    Ding XU
    Hongbo ZHU
    Science China(Information Sciences), 2021, 64 (12) : 260 - 261
  • [34] Proactive Eavesdropping for Wireless Information Surveillance Under Suspicious Communication Quality-of-Service Constraint
    Xu, Ding
    Zhu, Hongbo
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (07) : 5220 - 5234
  • [35] Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 641 - 646
  • [36] Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1267 - 1271
  • [37] Intelligent Reflecting Surface-Assisted Proactive Eavesdropping Over Suspicious Broadcasting Communication With Statistical CSI
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 4483 - 4488
  • [38] Maxmin Fairness for UAV-Enabled Proactive Eavesdropping With Jamming Over Distributed Transmit Beamforming-Based Suspicious Communications
    Hu, Guojie
    Li, Zan
    Si, Jiangbo
    Xu, Kui
    Xu, Donghui
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (03) : 1595 - 1614
  • [39] On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
    Hu, Yingdong
    Gao, Ruifeng
    Li, Ye
    Zhang, Shibing
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (04)
  • [40] Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing
    Moon, Jihwan
    Lee, Hoon
    Song, Changick
    Kang, Seowoo
    Lee, Inkyu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (10) : 6958 - 6971