4.6 Article

Proactive Eavesdropping via Jamming in NOMA Network

期刊

IEEE ACCESS
卷 9, 期 -, 页码 168121-168133

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3131906

关键词

Eavesdropping; NOMA; Jamming; Resource management; Base stations; Surveillance; Relays; Proactive eavesdropping; cooperative jamming; cooperative eavesdropping; wireless surveillance; physical layer security

向作者/读者索取更多资源

This study analyzes tracking suspicious communications using NOMA technology in a wireless surveillance system where eavesdropping is considered legal. It investigates power allocation policies for jamming signals of the legitimate monitor, deriving closed-form expressions for successful eavesdropping probability for the best and worst users to evaluate system performance. Monte Carlo simulations are used to verify analytical results.
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising technique in 5G network, and many investigations have addressed on the physical layer security to improve the security performance. In this paper, an alternative problem, where the eavesdropping process is considered as a legal activity, will be analyzed to track suspicious communications. More specifically, we study a wireless surveillance system in which the legitimate monitor is equipped with multi-antenna to overhear the messages between the suspicious receiver and the suspicious transmitter. Suspicious users are grouped into pairs and use the NOMA technique to transmit signals to a suspicious base station. Meanwhile, the legitimate monitor (LM) simultaneously transmits jamming signals, listens to suspicious links, decode-and-forward (DF) the eavesdropped information to the legitimate eavesdropper (LE). Based on the proposed mechanism, we investigate the power allocation policies for jamming signals of the legitimate monitor under deterministic and non-deterministic interference channel. Accordingly, we derive the closed-form expression of the successful eavesdropping probability for the best and the worst user to evaluate the system performance. Monte Carlo simulations are provided to verify our analytical results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据