Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon and then communicates with one suspect destination. Under this setup, a relay-aided proactive eavesdropping scheme is designed to improve the surveillance performance of the system. The closed-form expressions are derived under linear and nonlinear EH models, including the decoding outage probability for the suspicious link, the eavesdropping outage probability for the eavesdropping link, and the average eavesdropping rate (AER). Based on these obtained expressions, an optimization problem to maximize the AER is formulated by jointly optimizing the power and location of the relay. The existence of the optimal solution is carefully analyzed. Moreover, the separate optimization issues of the power and location are first established, and then a bisection-based searching algorithm is presented for the joint optimization problem with the linear EH model. Furthermore, to reduce the complexity of joint optimization, a low-complexity learning-based iteration algorithm is further proposed by employing the well-fitting characteristic of the deep feedforward neural network. Numerical results verify the effectiveness of the proposed algorithm, and show that the optimized FD relay-aided proactive eavesdropping scheme outperforms the reference schemes. Finally, the application scenarios of the proposed proactive eavesdropping scheme are discussed. INDEX TERMS Proactive eavesdropping, wireless power transfer, average eavesdropping rate, deep feedforward neural network, power optimization.
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon and then communicates with one suspect destination. Under this setup, a relay-aided proactive eavesdropping scheme is designed to improve the surveillance performance of the system. The closed-form expressions are derived under linear and nonlinear EH models, including the decoding outage probability for the suspicious link, the eavesdropping outage probability for the eavesdropping link, and the average eavesdropping rate (AER). Based on these obtained expressions, an optimization problem to maximize the AER is formulated by jointly optimizing the power and location of the relay. The existence of the optimal solution is carefully analyzed. Moreover, the separate optimization issues of the power and location are first established, and then a bisection-based searching algorithm is presented for the joint optimization problem with the linear EH model. Furthermore, to reduce the complexity of joint optimization, a low-complexity learning-based iteration algorithm is further proposed by employing the well-fitting characteristic of the deep feedforward neural network. Numerical results verify the effectiveness of the proposed algorithm, and show that the optimized FD relay-aided proactive eavesdropping scheme outperforms the reference schemes. Finally, the application scenarios of the proposed proactive eavesdropping scheme are discussed. INDEX TERMS Proactive eavesdropping, wireless power transfer, average eavesdropping rate, deep feedforward neural network, power optimization.
The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth of data transmission in intelligent wireless sensor networks, energy spectrum detection has become a promising solution for resolving spectrum shortages. Primary user emulation attack (PUEA) has been identified as a significant attack vector in the cognitive radio (CR) domain's physical layer. In comparison, the CR is a promising method to increase spectrum efficiency by allowing unlicensed secondary users (SUs) to access licensed frequency bands without interfering with approved primary users (PUs). The study's primary findings are the methodology for preventing PUEA using authentication tags, which are unique sequences. This research blends SC‐FDMA with CR to protect CR networks from PUEA attacks, a Latin square (LS) matrix tag generation system is proposed to mitigate the PUEA effect. The technology is meant to provide effective authentication and protection against malicious users. In a secured environment, the LS tag technique is utilized to track and estimate the PU. For example, the BER of both techniques is virtually identical between 0 and 4 dB, while the BER performance of the suggested LS tag generation improves with increasing signal‐to‐noise ratio (SNR). As a result, the suggested LS tag generation is less susceptible to PUEA. To diminish the influence of PUEA in CR networks, an efficient enlightening approach for making the future Green Cognitive Radio Wireless networks structure is proposed. The simulation results also demonstrate the resilience of the proposed CR spectrum sensing techniques for energy‐efficient knowledge at varying degrees to reduce the adverse effects of environmental technologies.
With the increase in the number of communication devices, the requirement for higher bandwidth is essential. To achieve this goal, research and industrial communities have both suggested that future wireless systems will take advantage of the numerous emerging technologies. Utilization of Cognitive Radio (CR) for the next-generation Fifth Generation (5G) communication technology is the major advancement for getting a higher bandwidth in a cellular communication network. In this paper, we present a comprehensive study of CR from the perspectives of spectrum allocation schemes, impact and role of MAC layer in spectrum sensing and sharing, CR application in multi-hop wireless networks, and challenges associated with channel selection and packet routing in multi-hop heterogeneous CR networks. This paper also presents the analysis, in literature, of a range of intelligent routing protocols that are considered viable for packets routing in CR networks. The need to address the issue of spectrum depletion and the apparent underutilization of available scarce spectrum resources in existing wireless networks is the primary motivation behind this study. Considering the fact that CR technology can potentially maximize the utilization of bulk of the unused communication spectrum bands for the future 5G of wireless network and beyond.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.