4.7 Article

Unsuspicious User Enabled Proactive Eavesdropping in Interference Networks Using Improper Gaussian Signaling

期刊

IEEE TRANSACTIONS ON COMMUNICATIONS
卷 71, 期 5, 页码 2891-2905

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2023.3253688

关键词

Eavesdropping; Jamming; Interference; Wireless communication; Quality of service; Surveillance; Fading channels; Wireless information surveillance; proactive eavesdropping; improper Gaussian signaling; interference networks; unsuspicious users

向作者/读者索取更多资源

This paper proposes proactive eavesdropping as a means to improve the performance of wireless information surveillance through authorized monitors. When no monitor is available, unsuspicious users are authorized to surveil suspicious users, ensuring their quality-of-service (QoS). The paper focuses on optimizing the transmit power and IGS circularity coefficient to maximize the average eavesdropping rate and shows that IGS outperforms proper Gaussian signaling in most cases.
Proactive eavesdropping is an effective approach to improve the performance of wireless information surveillance, where suspicious users are legitimately eavesdropped by authorized monitors. For the situation when no monitor is available, we propose to authorize unsuspicious users to surveil suspicious users provided that the quality-of-service (QoS) of unsuspicious users is guaranteed. This paper considers an interference network consisting of a suspicious-transmitter (STx)/suspicious-receiver (SRx) pair and an unsuspicious-transmitter (UTx)/unsuspicious-receiver (URx) pair. We assume that URx acts as a monitor to eavesdrop the suspicious communication, and UTx adopts improper Gaussian signaling (IGS) for flexibly managing the interference to SRx. The QoS of the unsuspicious communication is guaranteed by enforcing its outage performance to be higher than a desirable level. The problem of optimizing the transmit power and the IGS circularity coefficient of UTx to maximize the average eavesdropping rate is optimally solved by the Lagrange duality method. Theoretical results show that IGS is effective when the eavesdropping is successful and the unsuspicious communication is in non-outage status. Simulation results confirm that the proposed design works well even when no additional outage of the unsuspicious communication is allowed, and show that IGS can greatly outperform proper Gaussian signaling in most cases.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据