4.6 Article

Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks

期刊

IEEE SYSTEMS JOURNAL
卷 15, 期 3, 页码 3415-3426

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.3012758

关键词

Eavesdropping; Jamming; Relays; Surveillance; Receivers; Biomedical monitoring; Amplify-and-forward (AF); assisting; beam-forming; jamming; proactive eavesdropping; two-way relay

资金

  1. Natural Science Foundations of China [61771487, 61371122, 61471393, 61831004, 61971376, 61801234]
  2. Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars [LR19F010002]

向作者/读者索取更多资源

This article discusses a proactive eavesdropping scenario involving two suspicious nodes and one suspicious relay exchanging information, supervised in two phases. Two proactive eavesdropping strategies are designed and analyzed, with simulation results indicating the effectiveness of certain strategies.
This article considers a proactive eavesdropping scenario, where two suspicious nodes exchange their information via one suspicious relay in two phases, the process of which is under the supervision of one legitimate monitor. Specifically, these two suspicious nodes broadcast their suspicious data in phase 1 and the relay forwards the amplified version of its received signal in phase 2, according to which two proactive eavesdropping strategies, i.e., passive eavesdropping first and jamming first, are designed. Using the former strategy, the monitor proceeds eavesdropping with a minimum-mean-squar-error (MMSE) receiver in phase 1 and implements eavesdropping or simultaneous assisting and jamming in phase 2. Using the latter strategy, the monitor implements jamming in phase 1 and performs eavesdropping in phase 2. For these strategies, we provide the detailed analysis and formulate the corresponding optimization problems of sum eavesdropping rate maximization subject to finite transmit power of the monitor, each of which is then solved by carefully designing the power allocation scheme or the assisting/jamming beamformer at the legitimate monitor. In addition, for the passive eavesdropping first strategy, we also consider a more advanced MMSE with a successive interference cancellation (SIC) receiver and concurrently exploit the time-sharing (TS) technique to further improve the eavesdropping rate. Finally, simulation results indicate that the passive eavesdropping first strategy is more preferable compared to the jamming first strategy, and the SIC and TS are preferable for promoting the more effective eavesdropping.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据