期刊
IEEE TRANSACTIONS ON COMMUNICATIONS
卷 69, 期 6, 页码 4024-4037出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2021.3067058
关键词
Uncertainty; Surveillance; Eavesdropping; Receivers; Jamming; Wireless communication; Interference cancellation; Channel uncertainty; covert communication; full-duplex; legitimate surveillance; proactive eavesdropping
资金
- Key project of National Natural Science Foundation of China [61631015, 61971337, 61901328, 61941118]
- National Natural Science Foundation for Distinguished Young Scholar [61825104]
- Key Laboratory Project of China Electronic Science and Technology Group [CLDL-20182410]
- Fundamental Research Funds for the Central Universities [XJS210109]
- Technology Innovation Plan [2019921815KYPT009JC011]
The study focuses on the surveillance performance of a wireless eavesdropping system, emphasizing the covert transmission of artificial noise to improve surveillance under a low detection probability. A novel scheme is proposed based on optimization problems and detection capabilities to address this issue.
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which can therefore degrade the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the surveillance performance under a covert constraint. Then, based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious-transmitter-to-suspicious-receiver and the monitor-to-suspicious-receiver links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the uncertainty in the suspicious user's link can enhance the surveillance performance, while the uncertainty in the monitor-to-suspicious-receiver link can degrade the surveillance performance.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据