File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이훈

Lee, Hoon
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

Author(s)
Moon, JihwanLee, Sang HyunLee, HoonLee, Inkyu
Issued Date
2019-07
DOI
10.1109/TWC.2019.2918452
URI
https://scholarworks.unist.ac.kr/handle/201301/65468
Fulltext
https://ieeexplore.ieee.org/document/8726325
Citation
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.18, no.7, pp.3726 - 3738
Abstract
In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
ISSN
1536-1276
Keyword (Author)
Physical layer securityproactive eavesdroppingwireless surveillancecooperative jammingnode selection
Keyword
SECRECY CAPACITYNETWORKSRELAYSURVEILLANCEINFORMATION

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.