Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Jihwan-
dc.contributor.authorLee, Hoon-
dc.contributor.authorSong, Changick-
dc.contributor.authorKang, Seowoo-
dc.contributor.authorLee, Inkyu-
dc.date.accessioned2021-09-02T05:25:16Z-
dc.date.available2021-09-02T05:25:16Z-
dc.date.created2021-06-19-
dc.date.issued2018-10-
dc.identifier.issn1536-1276-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/72587-
dc.description.abstractIn this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer. Assuming an adaptive transmission policy at the suspicious users, the spoofing relays not only intercept but also forward the manipulated information to control the data rate of the suspicious users in collaboration with the jammer. We provide a technique which jointly optimizes the receive combining vector at the central monitor, the precoders at the relays, and the transmit covariance matrix at the jammer for maximizing the eavesdropping rate. To reveal some fundamental properties of the optimal operation, we first study a single-relay system. It is shown that when the central monitor experiences a poor eavesdropping channel link, the spoofing relay and the jammer should transmit destructive signals and jamming signals, respectively. In this case, the suspicious users are forced to decrease their data rate, while the intercepted information can be successfully decoded by the central monitor. On the other hand, when the eavesdropping channel condition is favorable, the spoofing relay forwards constructive signals to further increase the data rate at the suspicious users in a way that more information can be intercepted from the suspicious users. We then formulate a general eavesdropping rate maximization problem for multiple relays and present a semi-definite relaxation approach. A low-complexity design is also proposed based on our analysis for the single-relay system. Simulation results verify the efficiency of the proposed solutions compared to other baseline schemes in various practical setups.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectSECRECY CAPACITY-
dc.subjectWIRETAP CHANNEL-
dc.subjectFADING CHANNELS-
dc.subjectSYSTEMS-
dc.subjectSURVEILLANCE-
dc.subjectOPTIMIZATION-
dc.subjectNETWORKS-
dc.subjectDESIGN-
dc.titleRelay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Inkyu-
dc.identifier.doi10.1109/TWC.2018.2865305-
dc.identifier.scopusid2-s2.0-85052704209-
dc.identifier.wosid000447047200041-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.17, no.10, pp.6958 - 6971-
dc.relation.isPartOfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS-
dc.citation.titleIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS-
dc.citation.volume17-
dc.citation.number10-
dc.citation.startPage6958-
dc.citation.endPage6971-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusSECRECY CAPACITY-
dc.subject.keywordPlusWIRETAP CHANNEL-
dc.subject.keywordPlusFADING CHANNELS-
dc.subject.keywordPlusSYSTEMS-
dc.subject.keywordPlusSURVEILLANCE-
dc.subject.keywordPlusOPTIMIZATION-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusDESIGN-
dc.subject.keywordAuthorPhysical layer security-
dc.subject.keywordAuthorproactive eavesdropping-
dc.subject.keywordAuthorwireless surveillance-
dc.subject.keywordAuthorcooperative jamming-
dc.subject.keywordAuthorspoofing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > School of Electrical Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, In kyu photo

Lee, In kyu
공과대학 (전기전자공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE