期刊
IEEE ACCESS
卷 9, 期 -, 页码 168121-168133出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3131906
关键词
Eavesdropping; NOMA; Jamming; Resource management; Base stations; Surveillance; Relays; Proactive eavesdropping; cooperative jamming; cooperative eavesdropping; wireless surveillance; physical layer security
This study analyzes tracking suspicious communications using NOMA technology in a wireless surveillance system where eavesdropping is considered legal. It investigates power allocation policies for jamming signals of the legitimate monitor, deriving closed-form expressions for successful eavesdropping probability for the best and worst users to evaluate system performance. Monte Carlo simulations are used to verify analytical results.
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising technique in 5G network, and many investigations have addressed on the physical layer security to improve the security performance. In this paper, an alternative problem, where the eavesdropping process is considered as a legal activity, will be analyzed to track suspicious communications. More specifically, we study a wireless surveillance system in which the legitimate monitor is equipped with multi-antenna to overhear the messages between the suspicious receiver and the suspicious transmitter. Suspicious users are grouped into pairs and use the NOMA technique to transmit signals to a suspicious base station. Meanwhile, the legitimate monitor (LM) simultaneously transmits jamming signals, listens to suspicious links, decode-and-forward (DF) the eavesdropped information to the legitimate eavesdropper (LE). Based on the proposed mechanism, we investigate the power allocation policies for jamming signals of the legitimate monitor under deterministic and non-deterministic interference channel. Accordingly, we derive the closed-form expression of the successful eavesdropping probability for the best and the worst user to evaluate the system performance. Monte Carlo simulations are provided to verify our analytical results.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据