2018
DOI: 10.1109/twc.2018.2863287
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
44
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(44 citation statements)
references
References 31 publications
0
44
0
Order By: Relevance
“…For ease of exposition, the cycling period T, T = πL/v, is then discretized into N equally spaced time slots, i.e., T = Nδ t . Furthermore, the perfect channel state information (CSI) of all links are assumed to be available at E for characterizing the fundamental performance limit of proactive eavesdropping [13,18,22]. Particularly, since wireless channels between ground nodes and the UAV are dominated by LoS links in this paper, the legitimate monitor can perfectly obtain the channel gains of UAV-ground links by detecting the locations of corresponding nodes.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…For ease of exposition, the cycling period T, T = πL/v, is then discretized into N equally spaced time slots, i.e., T = Nδ t . Furthermore, the perfect channel state information (CSI) of all links are assumed to be available at E for characterizing the fundamental performance limit of proactive eavesdropping [13,18,22]. Particularly, since wireless channels between ground nodes and the UAV are dominated by LoS links in this paper, the legitimate monitor can perfectly obtain the channel gains of UAV-ground links by detecting the locations of corresponding nodes.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…Additionally, adaptive rate transmission is considered at the suspicious source according to the effective channel condition at the suspicious receiver. Thus, the suspicious transmitter adaptively adjusts its transmitting rate to a level decodable by the suspicious receiver [18,22]. Two protocols of the relay are discussed in the following subsections.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…To degrade the channel performance at the PE against its eavesdropping, the LT adds AN signals to the transmit signals. We adopt the "key" distribution method for generating and removing AN in the frequency domain with practical complexity, as shown in Figure 2 (see, e.g., [28,29,[36][37][38] and the references therein for the similar setting). By leveraging the independence and short-term reciprocity of the wireless channels, the LT sends the corresponding keys with the secret method (see [39] for more details) at each time.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…In addition, [8] proposed a spoofing relay approach to enhance the information surveillance capability. Recently, the proactive eavesdropping approach has been investigated under various system setups, including relay systems [9]- [12], multi-antenna systems [13]- [14], cognitive radio systems [15], UAV-enabled wireless networks [16]- [17], and parallel monitor's jamming signals, whereas the latter region is fixed when the linear minimum mean square error (MMSE) receiver is employed at the legitimate monitor.…”
Section: Introductionmentioning
confidence: 99%