TY - JOUR
T1 - Proactive eavesdropping with full-duplex relay and cooperative jamming
AU - Moon, Jihwan
AU - Lee, Hoon
AU - Song, Changick
AU - Lee, Sunho
AU - Lee, Inkyu
N1 - Funding Information:
Manuscript received January 24, 2018; revised April 16, 2018 and July 27, 2018; accepted July 27, 2018. Date of publication August 13, 2018; date of current version October 9, 2018. This work was supported by the National Research Foundation through the Ministry of Science, ICT, and Future Planning (MSIP), Korean Government, under Grant 2017R1A2B3012316. The work of C. Song was supported by the Institute for Information and Communications Technology Promotion through the Korean Government (MSIP) (Cross layer design of cryptography and physical layer security for IoT networks), under Grant 2016-0-00500. This paper was presented at the IEEE International Conference on Communications, Kansas City, MO, USA, May 2018 [1]. The associate editor coordinating the review of this paper and approving it for publication was D. Niyato. (Corresponding author: Inkyu Lee.) J. Moon and I. Lee are with the School of Electrical Engineering, Korea University, Seoul 02841, South Korea (e-mail: anschino@korea.ac.kr; inkyu@korea.ac.kr).
Publisher Copyright:
© 2002-2012 IEEE.
PY - 2018/10
Y1 - 2018/10
N2 - In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the eavesdropped information to the central monitor. At the same time, the jammer broadcasts jamming signals to maintain the data rate of the suspicious users below the channel capacity of the central monitor so that the eavesdropped information can be successfully decoded by the central monitor. In this system, we jointly design the receive combining vector at the central monitor, the relay precoders at the eavesdropping relays and the transmit covariance matrix at the jammer to maximize the eavesdropping rate. First, we examine the case of a single eavesdropping relay equipped with a single antenna and provide some useful insights. Also, an effective two-layer optimization method is proposed to obtain the globally optimal solution. Then, we study a general case of multiple eavesdropping relays with multiple antennas, and solve a semi-definite relaxation problem. Numerical results verify the efficiency of our proposed solutions for both single and multiple relay cases and show considerable performance gains over conventional schemes.
AB - In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the eavesdropped information to the central monitor. At the same time, the jammer broadcasts jamming signals to maintain the data rate of the suspicious users below the channel capacity of the central monitor so that the eavesdropped information can be successfully decoded by the central monitor. In this system, we jointly design the receive combining vector at the central monitor, the relay precoders at the eavesdropping relays and the transmit covariance matrix at the jammer to maximize the eavesdropping rate. First, we examine the case of a single eavesdropping relay equipped with a single antenna and provide some useful insights. Also, an effective two-layer optimization method is proposed to obtain the globally optimal solution. Then, we study a general case of multiple eavesdropping relays with multiple antennas, and solve a semi-definite relaxation problem. Numerical results verify the efficiency of our proposed solutions for both single and multiple relay cases and show considerable performance gains over conventional schemes.
KW - Physical layer security
KW - cooperative jamming
KW - proactive eavesdropping
KW - wireless surveillance
UR - http://www.scopus.com/inward/record.url?scp=85051745907&partnerID=8YFLogxK
U2 - 10.1109/TWC.2018.2863287
DO - 10.1109/TWC.2018.2863287
M3 - Article
AN - SCOPUS:85051745907
SN - 1536-1276
VL - 17
SP - 6707
EP - 6719
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 10
M1 - 8434238
ER -