2017
DOI: 10.1109/mwc.2017.1600279
|View full text |Cite
|
Sign up to set email alerts
|

Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm

Abstract: Conventional wireless security assumes wireless communications are rightful and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging infrastructure-free mobile communication networks are likely to be illegally used (e.g., by criminals or terrorists) but difficult to be monitored, thus imposing new challenges on the public security. To tackle this issue, this article presents a paradigm shift of wireless security to the surveillance and intervention of infrastructure-free … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
72
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 137 publications
(72 citation statements)
references
References 17 publications
0
72
0
Order By: Relevance
“…• UAV-aided wireless surveillance and intervention: By exploiting its high mobility and LoS channel with the ground, UAV can act as a legitimate eavesdropper or jammer for realizing the surveillance of suspicious communications or intervention of malicious communications on the ground, respectively [15]. In contrast to the techniques proposed in this article to defend against UAV eavesdropping and jamming, the objective is reversed in this case to design efficient eavesdropping and jamming schemes for legitimate UAVs.…”
Section: Discussionmentioning
confidence: 99%
“…• UAV-aided wireless surveillance and intervention: By exploiting its high mobility and LoS channel with the ground, UAV can act as a legitimate eavesdropper or jammer for realizing the surveillance of suspicious communications or intervention of malicious communications on the ground, respectively [15]. In contrast to the techniques proposed in this article to defend against UAV eavesdropping and jamming, the objective is reversed in this case to design efficient eavesdropping and jamming schemes for legitimate UAVs.…”
Section: Discussionmentioning
confidence: 99%
“…Proof: See Appendix D. The reason why R II (n) decreases with n is because jamming more channels increases the chance that the ST chooses the jammed channels, and the ST will transmit at a lower rate to maintain target outage probability at the SR. A lower transmission rate R II (n) leads to a higher non-outage probability e −λ b σ 2 b (2 R II (n) −1)/P at the monitor, and thus the monitor can overhear more clearly. (16), non-outage probability in (17), and their product ϕ II (n) in (15). As n increases, it is observed that 1 − ρ(n) decreases and e −λ b σ 2 b (2 R II (n) −1)/P increases.…”
Section: Multiple Channelsmentioning
confidence: 97%
“…Next, we determine the non-outage probability e −λ b σ 2 b (2 R II (n) −1)/P at the monitor in (15), which is a function of R II (n). Similar to ρ(n), here R II (n) only depends on n. (17) Further, R II (n) monotonically decreases as n increases.…”
Section: Multiple Channelsmentioning
confidence: 99%
“…We first equivalently reformulate problem (8) as 4. The geometric explanation of optĝĝ to problem (15).…”
Section: B Optimal Solution To Problemmentioning
confidence: 99%