TY - JOUR
T1 - Proactive eavesdropping with jamming and eavesdropping mode selection
AU - Moon, Jihwan
AU - Lee, Sang Hyun
AU - Lee, Hoon
AU - Lee, Inkyu
N1 - Funding Information:
Manuscript received October 8, 2018; revised March 11, 2019 and May 13, 2019; accepted May 16, 2019. Date of publication May 30, 2019; date of current version July 10, 2019. This work was supported by the National Research Foundation through the Ministry of Science, Information and Communications Technology (ICT), Future Planning (MSIP), and Korean Government, under Grant 2017R1A2B3012316. The work of S. H. Lee was supported by Institute of Information and Communications Technology Planning and Evaluation (IITP) through the Korea Government (Ministry of Science and ICT)—High Accurate Positioning Enabled MIMO Transmission and Network Technologies for Next 5G-V2X Services under Grant 2016-0-00208. The associate editor coordinating the review of this paper and approving it for publication was A. Banchs. (Corresponding author: Inkyu Lee.) J. Moon, S. H. Lee, and I. Lee are with the School of Electrical Engineering, Korea University, Seoul 02841, South Korea (e-mail: anschino@korea.ac.kr; sanghyunlee@korea.ac.kr; inkyu@korea.ac.kr).
Funding Information:
This work was supported by the National Research Foundation through the Ministry of Science, Information and Communications Technology (ICT), Future Planning (MSIP), and Korean Government, under Grant 2017R1A2B3012316.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.
AB - In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.
KW - Physical layer security
KW - cooperative jamming
KW - node selection
KW - proactive eavesdropping
KW - wireless surveillance
UR - http://www.scopus.com/inward/record.url?scp=85068869726&partnerID=8YFLogxK
U2 - 10.1109/TWC.2019.2918452
DO - 10.1109/TWC.2019.2918452
M3 - Article
AN - SCOPUS:85068869726
SN - 1536-1276
VL - 18
SP - 3726
EP - 3738
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 7
M1 - 8726325
ER -