期刊
IEEE SYSTEMS JOURNAL
卷 15, 期 3, 页码 3415-3426出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.3012758
关键词
Eavesdropping; Jamming; Relays; Surveillance; Receivers; Biomedical monitoring; Amplify-and-forward (AF); assisting; beam-forming; jamming; proactive eavesdropping; two-way relay
类别
资金
- Natural Science Foundations of China [61771487, 61371122, 61471393, 61831004, 61971376, 61801234]
- Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars [LR19F010002]
This article discusses a proactive eavesdropping scenario involving two suspicious nodes and one suspicious relay exchanging information, supervised in two phases. Two proactive eavesdropping strategies are designed and analyzed, with simulation results indicating the effectiveness of certain strategies.
This article considers a proactive eavesdropping scenario, where two suspicious nodes exchange their information via one suspicious relay in two phases, the process of which is under the supervision of one legitimate monitor. Specifically, these two suspicious nodes broadcast their suspicious data in phase 1 and the relay forwards the amplified version of its received signal in phase 2, according to which two proactive eavesdropping strategies, i.e., passive eavesdropping first and jamming first, are designed. Using the former strategy, the monitor proceeds eavesdropping with a minimum-mean-squar-error (MMSE) receiver in phase 1 and implements eavesdropping or simultaneous assisting and jamming in phase 2. Using the latter strategy, the monitor implements jamming in phase 1 and performs eavesdropping in phase 2. For these strategies, we provide the detailed analysis and formulate the corresponding optimization problems of sum eavesdropping rate maximization subject to finite transmit power of the monitor, each of which is then solved by carefully designing the power allocation scheme or the assisting/jamming beamformer at the legitimate monitor. In addition, for the passive eavesdropping first strategy, we also consider a more advanced MMSE with a successive interference cancellation (SIC) receiver and concurrently exploit the time-sharing (TS) technique to further improve the eavesdropping rate. Finally, simulation results indicate that the passive eavesdropping first strategy is more preferable compared to the jamming first strategy, and the SIC and TS are preferable for promoting the more effective eavesdropping.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据