File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이훈

Lee, Hoon
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 3738 -
dc.citation.number 7 -
dc.citation.startPage 3726 -
dc.citation.title IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS -
dc.citation.volume 18 -
dc.contributor.author Moon, Jihwan -
dc.contributor.author Lee, Sang Hyun -
dc.contributor.author Lee, Hoon -
dc.contributor.author Lee, Inkyu -
dc.date.accessioned 2023-12-21T18:55:19Z -
dc.date.available 2023-12-21T18:55:19Z -
dc.date.created 2023-09-06 -
dc.date.issued 2019-07 -
dc.description.abstract In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.18, no.7, pp.3726 - 3738 -
dc.identifier.doi 10.1109/TWC.2019.2918452 -
dc.identifier.issn 1536-1276 -
dc.identifier.scopusid 2-s2.0-85068869726 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/65468 -
dc.identifier.url https://ieeexplore.ieee.org/document/8726325 -
dc.identifier.wosid 000475339700028 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Engineering; Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Physical layer security -
dc.subject.keywordAuthor proactive eavesdropping -
dc.subject.keywordAuthor wireless surveillance -
dc.subject.keywordAuthor cooperative jamming -
dc.subject.keywordAuthor node selection -
dc.subject.keywordPlus SECRECY CAPACITY -
dc.subject.keywordPlus NETWORKS -
dc.subject.keywordPlus RELAY -
dc.subject.keywordPlus SURVEILLANCE -
dc.subject.keywordPlus INFORMATION -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.