There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.endPage | 6719 | - |
dc.citation.number | 10 | - |
dc.citation.startPage | 6707 | - |
dc.citation.title | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.volume | 17 | - |
dc.contributor.author | Moon, Jihwan | - |
dc.contributor.author | Lee, Hoon | - |
dc.contributor.author | Song, Changick | - |
dc.contributor.author | Lee, Sunho | - |
dc.contributor.author | Lee, Inkyu | - |
dc.date.accessioned | 2023-12-21T20:07:49Z | - |
dc.date.available | 2023-12-21T20:07:49Z | - |
dc.date.created | 2023-09-06 | - |
dc.date.issued | 2018-10 | - |
dc.description.abstract | In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the eavesdropped information to the central monitor. At the same time, the jammer broadcasts jamming signals to maintain the data rate of the suspicious users below the channel capacity of the central monitor so that the eavesdropped information can be successfully decoded by the central monitor. In this system, we jointly design the receive combining vector at the central monitor, the relay precoders at the eavesdropping relays and the transmit covariance matrix at the jammer to maximize the eavesdropping rate. First, we examine the case of a single eavesdropping relay equipped with a single antenna and provide some useful insights. Also, an effective two-layer optimization method is proposed to obtain the globally optimal solution. Then, we study a general case of multiple eavesdropping relays with multiple antennas, and solve a semi-definite relaxation problem. Numerical results verify the efficiency of our proposed solutions for both single and multiple relay cases and show considerable performance gains over conventional schemes. | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.17, no.10, pp.6707 - 6719 | - |
dc.identifier.doi | 10.1109/TWC.2018.2863287 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.scopusid | 2-s2.0-85051745907 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/65475 | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/8434238 | - |
dc.identifier.wosid | 000447047200024 | - |
dc.language | 영어 | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming | - |
dc.type | Article | - |
dc.description.isOpenAccess | FALSE | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic; Telecommunications | - |
dc.relation.journalResearchArea | Engineering; Telecommunications | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | proactive eavesdropping | - |
dc.subject.keywordAuthor | wireless surveillance | - |
dc.subject.keywordAuthor | cooperative jamming | - |
dc.subject.keywordPlus | MIMO | - |
dc.subject.keywordPlus | SURVEILLANCE | - |
dc.subject.keywordPlus | INFORMATION | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.