4.7 Article

Unsuspicious User Enabled Proactive Eavesdropping in Interference Networks Using Improper Gaussian Signaling

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Legitimate Surveillance of Suspicious Computation Offloading in Mobile Edge Computing Networks

Ding Xu et al.

Summary: This paper studies the legitimate surveillance of a suspicious MEC network, consisting of a suspicious edge server and multiple suspicious users, through optimizing the monitor mode and transmit power to maximize the success ratio of eavesdropped tasks. The proposed algorithm performs well, especially for the users with partial offloading, and it has low complexity.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping for Wireless Information Surveillance Under Suspicious Communication Quality-of-Service Constraint

Ding Xu et al.

Summary: This paper investigates a proactive eavesdropping scenario and proposes schemes to improve eavesdropping performance by optimizing the monitor's mode and transmit power, while satisfying SC QoS and transmit power constraints.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications

Guojie Hu et al.

Summary: This letter studies the proactive eavesdropping with one full-duplex monitor in unmanned aerial vehicle-enabled suspicious multiuser communications. The paper addresses the challenges brought by varying jamming power and proposes an optimal jamming power determination method based on the characteristic of eavesdropping rate.

IEEE WIRELESS COMMUNICATIONS LETTERS (2022)

Article Computer Science, Information Systems

Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks

Ding Xu et al.

Summary: This article investigates legitimate eavesdropping and secure communication in a multicarrier interference network, where a suspicious link coexists with an unsuspicious link, in the presence of a full-duplex monitor. The problem is to maximize the eavesdropping probability of the monitor by jointly allocating transmit powers of the monitor and the unsuspicious users while ensuring a low secrecy outage probability.

IEEE SYSTEMS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength

Ding Xu et al.

Summary: Short packet communications are crucial in the Internet of Things, but traditional methods are not suitable. This paper investigates proactive eavesdropping schemes for short packet communications and proposes suboptimal solutions to the problem.

IEEE TRANSACTIONS ON COMMUNICATIONS (2022)

Article Telecommunications

Energy Efficiency Maximization of Full-Duplex NOMA Systems With Improper Gaussian Signaling Under Imperfect Self-Interference Cancellation

Islam Abu Mahady et al.

Summary: This work focuses on maximizing the energy efficiency of a downlink cooperative full-duplex non-orthogonal multiple access (FD-NOMA) system with imperfect self-interference cancellation. By considering improper Gaussian signaling (IGS) and optimizing power allocation and circularity coefficients, the energy efficiency of the cooperative IGS-based FD-NOMA system is maximized while satisfying quality-of-service (QoS) requirements. The impact of IGS on bit error rate performance is also studied through the design of improper constellation diagrams.

IEEE COMMUNICATIONS LETTERS (2022)

Article Engineering, Electrical & Electronic

Improper Gaussian Signaling for Downlink NOMA Systems With Imperfect Successive Interference Cancellation

Hao Cheng et al.

Summary: This paper investigates the achievable rate improvement for the downlink non-orthogonal multiple access (NOMA) system using the improper Gaussian signaling (IGS) technique. The users' data rates are formulated in terms of the impropriety degree of the IGS, under the imperfect successive interference cancellation (SIC). Joint optimization of power and impropriety degree is performed to determine the best transmission strategy.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Engineering, Electrical & Electronic

Spectrum Sharing Incentive for Legitimate Wireless Information Surveillance

Ding Xu et al.

Summary: This paper investigates spectrum sharing incentives for legitimate wireless information surveillance at the physical layer by involving secondary users in eavesdropping and interfering with communications to enhance eavesdropping performance and receive spectrum sharing rewards. Optimization of the transmit power of the secondary transmitter and the SIC decoding order at the secondary receiver can maximize the secondary transmission rate and minimize the transmission outage probability.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Improper Gaussian Signaling for D2D Communication Coexisting MISO Cellular Networks

Huy T. Nguyen et al.

Summary: This article investigates the impact of non-orthogonal and orthogonal bandwidth sharing on the rates of cellular users and D2D communication in a system coexisting MISO cellular network and D2D communication. It addresses the problems of joint bandwidth allocation and signal beamforming to maximize the minimum Cus' rate, and presents computational solutions using low complexity path-following algorithms. Simulation results demonstrate the superiority of using IGS over PGS in different scenarios.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links

Haiyang Zhang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Signal Superposition in NOMA With Proper and Improper Gaussian Signaling

Ali Arshad Nasir et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection

Farnaz Feizi et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Telecommunications

Benefits of Improper Gaussian Signaling in Interweave Cognitive Radio With Full and Partial CSI

Wafa Hedhly et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2020)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks

Ding Xu

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Legitimate Surveillance via Jamming in Multichannel Relaying System

Guojie Hu et al.

IEEE SIGNAL PROCESSING LETTERS (2020)

Article Computer Science, Information Systems

A Journey From Improper Gaussian Signaling to Asymmetric Signaling

Sidrah Javed et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Engineering, Electrical & Electronic

Improper Gaussian Signaling for Multiple-Access Channels in Underlay Cognitive Radio

Christian Lameiro et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems

Haiquan Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Improper Gaussian Signaling for Broadcast Interference Networks

Ali Arshad Nasir et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Article Engineering, Electrical & Electronic

Robust Improper Signaling for Two-User SISO Interference Channels

Mohammad Soleymani et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

Jamming-Assisted Eavesdropping Over Parallel Fading Channels

Yitao Han et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems

Mohammad Mozaffari et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A Survey of Device-to-Device Communications: Research Issues and Challenges

Furqan Jameel et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Engineering, Electrical & Electronic

Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems

Yunlong Cai et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation

Haijun Zhang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Rate Region Boundary of the SISO Z-Interference Channel With Improper Signaling

Christian Lameiro et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Proactive Eavesdropping via Cognitive Jamming in Fading Channels

Jie Xu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

SURVEILLANCE AND INTERVENTION OF INFRASTRUCTURE-FREE MOBILE COMMUNICATIONS: A NEW WIRELESS SECURITY PARADIGM

Jie Xu et al.

IEEE WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels

Jie Xu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2016)

Review Physics, Multidisciplinary

A Survey on Interference Networks: Interference Alignment and Neutralization

Sang-Woon Jeon et al.

ENTROPY (2012)

Article Computer Science, Information Systems

Interference Alignment With Asymmetric Complex Signaling-Settling the Host-Madsen-Nosratinia Conjecture

Viveck R. Cadambe et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2010)

Article Engineering, Electrical & Electronic

Dual methods for nonconvex spectrum optimization of multicarrier systems

Wei Yu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2006)