4.7 Article

Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty

Journal

IEEE TRANSACTIONS ON COMMUNICATIONS
Volume 69, Issue 6, Pages 4024-4037

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2021.3067058

Keywords

Uncertainty; Surveillance; Eavesdropping; Receivers; Jamming; Wireless communication; Interference cancellation; Channel uncertainty; covert communication; full-duplex; legitimate surveillance; proactive eavesdropping

Funding

  1. Key project of National Natural Science Foundation of China [61631015, 61971337, 61901328, 61941118]
  2. National Natural Science Foundation for Distinguished Young Scholar [61825104]
  3. Key Laboratory Project of China Electronic Science and Technology Group [CLDL-20182410]
  4. Fundamental Research Funds for the Central Universities [XJS210109]
  5. Technology Innovation Plan [2019921815KYPT009JC011]

Ask authors/readers for more resources

The study focuses on the surveillance performance of a wireless eavesdropping system, emphasizing the covert transmission of artificial noise to improve surveillance under a low detection probability. A novel scheme is proposed based on optimization problems and detection capabilities to address this issue.
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which can therefore degrade the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the surveillance performance under a covert constraint. Then, based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious-transmitter-to-suspicious-receiver and the monitor-to-suspicious-receiver links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the uncertainty in the suspicious user's link can enhance the surveillance performance, while the uncertainty in the monitor-to-suspicious-receiver link can degrade the surveillance performance.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available