Proactive eavesdropping with jamming and eavesdropping mode selection

Jihwan Moon, Sang Hyun Lee, Hoon Lee, Inkyu Lee

Research output: Contribution to journalArticlepeer-review

40 Citations (Scopus)

Abstract

In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.

Original languageEnglish
Article number8726325
Pages (from-to)3726-3738
Number of pages13
JournalIEEE Transactions on Wireless Communications
Volume18
Issue number7
DOIs
Publication statusPublished - 2019 Jul

Bibliographical note

Funding Information:
Manuscript received October 8, 2018; revised March 11, 2019 and May 13, 2019; accepted May 16, 2019. Date of publication May 30, 2019; date of current version July 10, 2019. This work was supported by the National Research Foundation through the Ministry of Science, Information and Communications Technology (ICT), Future Planning (MSIP), and Korean Government, under Grant 2017R1A2B3012316. The work of S. H. Lee was supported by Institute of Information and Communications Technology Planning and Evaluation (IITP) through the Korea Government (Ministry of Science and ICT)—High Accurate Positioning Enabled MIMO Transmission and Network Technologies for Next 5G-V2X Services under Grant 2016-0-00208. The associate editor coordinating the review of this paper and approving it for publication was A. Banchs. (Corresponding author: Inkyu Lee.) J. Moon, S. H. Lee, and I. Lee are with the School of Electrical Engineering, Korea University, Seoul 02841, South Korea (e-mail: [email protected]; [email protected]; [email protected]).

Funding Information:
This work was supported by the National Research Foundation through the Ministry of Science, Information and Communications Technology (ICT), Future Planning (MSIP), and Korean Government, under Grant 2017R1A2B3012316.

Publisher Copyright:
© 2019 IEEE.

Keywords

  • Physical layer security
  • cooperative jamming
  • node selection
  • proactive eavesdropping
  • wireless surveillance

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Proactive eavesdropping with jamming and eavesdropping mode selection'. Together they form a unique fingerprint.

Cite this