Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Jihwan-
dc.contributor.authorLee, Sang Hyun-
dc.contributor.authorLee, Hoon-
dc.contributor.authorLee, Inkyu-
dc.date.accessioned2021-09-01T13:26:33Z-
dc.date.available2021-09-01T13:26:33Z-
dc.date.created2021-06-19-
dc.date.issued2019-07-
dc.identifier.issn1536-1276-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/64627-
dc.description.abstractIn this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectSECRECY CAPACITY-
dc.subjectNETWORKS-
dc.subjectRELAY-
dc.subjectSURVEILLANCE-
dc.subjectINFORMATION-
dc.titleProactive Eavesdropping With Jamming and Eavesdropping Mode Selection-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sang Hyun-
dc.contributor.affiliatedAuthorLee, Inkyu-
dc.identifier.doi10.1109/TWC.2019.2918452-
dc.identifier.scopusid2-s2.0-85068869726-
dc.identifier.wosid000475339700028-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.18, no.7, pp.3726 - 3738-
dc.relation.isPartOfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS-
dc.citation.titleIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS-
dc.citation.volume18-
dc.citation.number7-
dc.citation.startPage3726-
dc.citation.endPage3738-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusSECRECY CAPACITY-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusRELAY-
dc.subject.keywordPlusSURVEILLANCE-
dc.subject.keywordPlusINFORMATION-
dc.subject.keywordAuthorcooperative jamming-
dc.subject.keywordAuthornode selection-
dc.subject.keywordAuthorPhysical layer security-
dc.subject.keywordAuthorproactive eavesdropping-
dc.subject.keywordAuthorwireless surveillance-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, In kyu photo

Lee, In kyu
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE