File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이훈

Lee, Hoon
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 6719 -
dc.citation.number 10 -
dc.citation.startPage 6707 -
dc.citation.title IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS -
dc.citation.volume 17 -
dc.contributor.author Moon, Jihwan -
dc.contributor.author Lee, Hoon -
dc.contributor.author Song, Changick -
dc.contributor.author Lee, Sunho -
dc.contributor.author Lee, Inkyu -
dc.date.accessioned 2023-12-21T20:07:49Z -
dc.date.available 2023-12-21T20:07:49Z -
dc.date.created 2023-09-06 -
dc.date.issued 2018-10 -
dc.description.abstract In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the eavesdropped information to the central monitor. At the same time, the jammer broadcasts jamming signals to maintain the data rate of the suspicious users below the channel capacity of the central monitor so that the eavesdropped information can be successfully decoded by the central monitor. In this system, we jointly design the receive combining vector at the central monitor, the relay precoders at the eavesdropping relays and the transmit covariance matrix at the jammer to maximize the eavesdropping rate. First, we examine the case of a single eavesdropping relay equipped with a single antenna and provide some useful insights. Also, an effective two-layer optimization method is proposed to obtain the globally optimal solution. Then, we study a general case of multiple eavesdropping relays with multiple antennas, and solve a semi-definite relaxation problem. Numerical results verify the efficiency of our proposed solutions for both single and multiple relay cases and show considerable performance gains over conventional schemes. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.17, no.10, pp.6707 - 6719 -
dc.identifier.doi 10.1109/TWC.2018.2863287 -
dc.identifier.issn 1536-1276 -
dc.identifier.scopusid 2-s2.0-85051745907 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/65475 -
dc.identifier.url https://ieeexplore.ieee.org/document/8434238 -
dc.identifier.wosid 000447047200024 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Engineering; Telecommunications -
dc.type.docType Article; Proceedings Paper -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Physical layer security -
dc.subject.keywordAuthor proactive eavesdropping -
dc.subject.keywordAuthor wireless surveillance -
dc.subject.keywordAuthor cooperative jamming -
dc.subject.keywordPlus MIMO -
dc.subject.keywordPlus SURVEILLANCE -
dc.subject.keywordPlus INFORMATION -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.