2019
DOI: 10.1109/tifs.2019.2901821
|View full text |Cite
|
Sign up to set email alerts
|

Jamming-Assisted Eavesdropping Over Parallel Fading Channels

Abstract: Unlike passive eavesdropping, proactive eavesdropping is recently proposed to use jamming to moderate a suspicious link's communication rate for facilitating simultaneous eavesdropping. This paper advances the proactive eavesdropping research by considering a practical half-duplex mode for the legitimate monitor (e.g., a government agency) and dealing with the challenging case that the suspicious link opportunistically communicates over parallel fading channels. To increase eavesdropping success probability, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(10 citation statements)
references
References 26 publications
(52 reference statements)
0
9
0
Order By: Relevance
“…Wireless surveillance, suspicious communication, proactive eavesdropping, jamming, beamforming, interference cancellation. fading channels [18]. Specifically, in [9] and [10] the authors studied the wireless surveillance of a two-hop decode-and-forward (DF) relaying communication systems.…”
Section: Index Termsmentioning
confidence: 99%
“…Wireless surveillance, suspicious communication, proactive eavesdropping, jamming, beamforming, interference cancellation. fading channels [18]. Specifically, in [9] and [10] the authors studied the wireless surveillance of a two-hop decode-and-forward (DF) relaying communication systems.…”
Section: Index Termsmentioning
confidence: 99%
“…The authors in [26] designed proactive eavesdropping with cooperative jamming in a helpful FD relay-assisted network and extended their work with a spoofing method in [27]. In [28], the author proposed a jamming-assisted method for proactive eavesdropping in parallel fading channels and analyzed the tradeoff between the number of jammed channels and the eavesdropping probability. With respect to the underlay scenario, Li et al studied proactive eavesdropping in cognitive radio networks in [29], and Feizi et al proposed antenna selection methods for FD cellular networks in [30].…”
Section: Related Workmentioning
confidence: 99%
“…Also, by approximating Bessel function efficiently, [12] proposed a near-optimal jamming power selection scheme in the amplify-and-forward relay system. Recently, [13] considered a jamming-assisted proactive eavesdropping scheme over parallel fading channels, where the monitor injected its jamming power into a subset of channels to force the suspicious transmitter to reselect one best channel, based on this idea [13] derived the optimal number of jamming channels and proposed corresponding optimal jamming power allocation scheme. At the same time, [14] considered a proactive eavesdropping scheme in an unmanned aerial vehicle (UAV)-aided suspicious communication system, where the suspicious UAV intended to broadcast common information to various ground suspicious receivers.…”
Section: B Related Workmentioning
confidence: 99%
“…In fact, it is the involved structure of each term in the expression of R 3 that makes the optimization for P2 more complex. To simplify this structure, we first approximate the expression of each γ D,i , i ∈ 3 shown in (13). Note that…”
Section: Fast Algorithm For Solving P2mentioning
confidence: 99%