Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moon, Jihwan | - |
dc.contributor.author | Lee, Sang Hyun | - |
dc.contributor.author | Lee, Hoon | - |
dc.contributor.author | Lee, Inkyu | - |
dc.date.accessioned | 2021-09-01T13:26:33Z | - |
dc.date.available | 2021-09-01T13:26:33Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019-07 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/64627 | - |
dc.description.abstract | In this paper, we study a legitimate proactive eavesdropping scenario where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For this system, it is necessary to ensure the eavesdropping channel capacity higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. To this end, the intermediate nodes operate in either eavesdropping or jamming modes. The eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to control the data rate of the suspicious users if necessary. We optimize the mode selection and transmit power of each intermediate node to achieve the maximum eavesdropping rate. Two different scenarios are investigated, in which the intermediate nodes communicate with the central monitor through wired links or wireless channels. For both configurations, globally optimal solutions are developed for joint mode selection and transmit power optimization problems. We also propose low-complexity methods which achieve near-optimal performance with reduced computational complexity. The numerical results validate the efficiency of our proposed algorithms. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | SECRECY CAPACITY | - |
dc.subject | NETWORKS | - |
dc.subject | RELAY | - |
dc.subject | SURVEILLANCE | - |
dc.subject | INFORMATION | - |
dc.title | Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Sang Hyun | - |
dc.contributor.affiliatedAuthor | Lee, Inkyu | - |
dc.identifier.doi | 10.1109/TWC.2019.2918452 | - |
dc.identifier.scopusid | 2-s2.0-85068869726 | - |
dc.identifier.wosid | 000475339700028 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.18, no.7, pp.3726 - 3738 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.title | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.volume | 18 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 3726 | - |
dc.citation.endPage | 3738 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | SECRECY CAPACITY | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordPlus | RELAY | - |
dc.subject.keywordPlus | SURVEILLANCE | - |
dc.subject.keywordPlus | INFORMATION | - |
dc.subject.keywordAuthor | cooperative jamming | - |
dc.subject.keywordAuthor | node selection | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | proactive eavesdropping | - |
dc.subject.keywordAuthor | wireless surveillance | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.