Performance of Covert Surveillance via Proactive Eavesdropping

被引:0
|
作者
Tu, Shumin [1 ]
Si, Jiangbo [2 ]
Cheng, Zihao [2 ]
Guan, Lei [2 ]
Wang, Chao [2 ]
机构
[1] 722 Res Inst, Wuhan 430079, Hubei, Peoples R China
[2] Xidian Univ, Integrated Serv Networks Lab, Xian 710071, Peoples R China
关键词
Channel uncertainty; Covert communication; Full-duplex; Legitimate surveillance; Proactive eavesdropping; COMMUNICATION; DESIGN; LIMITS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Surveillance performance is studied in this paper for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which degrades the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the eavesdropping non-outage probability under a covert constraint. Based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious and the jamming links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the suspicious link uncertainty enhances the surveillance performance, while the jamming link uncertainty can degrade the surveillance performance.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [31] Proactive Information Retrieval via Screen Surveillance
    Vuong, Tung
    Jacucci, Giulio
    Ruotsalo, Tuukka
    SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 1313 - 1316
  • [32] Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels
    Xu, Jie
    Duan, Lingjie
    Zhang, Rui
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) : 80 - 83
  • [33] Proactive Attack: A Strategy for Legitimate Eavesdropping
    Hung Tran
    Zepernick, Hans-Jurgen
    2016 IEEE SIXTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2016, : 457 - 461
  • [34] Proactive Eavesdropping in Massive MIMO-OFDM Systems via Deep Reinforcement Learning
    Chen, Jiale
    Tang, Lan
    Guo, Delin
    Bai, Yechao
    Yang, Lvxi
    Liang, Ying-Chang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (11) : 12315 - 12320
  • [35] Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection
    Feizi, Farnaz
    Mohammadi, Mohammadali
    Mobini, Zahra
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 641 - 646
  • [36] Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength
    Xu, Ding
    Zhu, Hongbo
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (11) : 7505 - 7519
  • [37] Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1267 - 1271
  • [38] Symposium on covert video surveillance - Covert video surveillance - A reply
    Southall, DP
    Samuels, MP
    JOURNAL OF MEDICAL ETHICS, 1996, 22 (01) : 32 - 32
  • [40] Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems
    Zhang, Cheng
    Miao, Xiaolong
    Huang, Yongming
    Yang, Luxi
    Tang, Lan
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (09) : 6078 - 6091