Performance of Covert Surveillance via Proactive Eavesdropping

被引:0
|
作者
Tu, Shumin [1 ]
Si, Jiangbo [2 ]
Cheng, Zihao [2 ]
Guan, Lei [2 ]
Wang, Chao [2 ]
机构
[1] 722 Res Inst, Wuhan 430079, Hubei, Peoples R China
[2] Xidian Univ, Integrated Serv Networks Lab, Xian 710071, Peoples R China
关键词
Channel uncertainty; Covert communication; Full-duplex; Legitimate surveillance; Proactive eavesdropping; COMMUNICATION; DESIGN; LIMITS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Surveillance performance is studied in this paper for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which degrades the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the eavesdropping non-outage probability under a covert constraint. Based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious and the jamming links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the suspicious link uncertainty enhances the surveillance performance, while the jamming link uncertainty can degrade the surveillance performance.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [41] Covert and Secure Communications in NOMA Networks With Internal Eavesdropping
    Li, Qiang
    Xu, Dongyang
    Navaie, Keivan
    Ding, Zhiguo
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (12) : 2178 - 2182
  • [42] Proactive Eavesdropping via Opportunistic Energy Transfer and Jamming for Wireless-Powered Suspicious Communication
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02): : 1055 - 1068
  • [43] Proactive Eavesdropping via Jamming Over Multiple Suspicious Links With Wireless-Powered Monitor
    Hu, Guojie
    Si, Jiangbo
    Cai, Yunlong
    Al-Dhahir, Naofal
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 354 - 358
  • [44] Cooperative Double-IRS Aided Proactive Eavesdropping
    Cao, Yang
    Duan, Lingjie
    Jin, Minglu
    Zhao, Nan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 6228 - 6240
  • [45] Proactive eavesdropping of wireless powered suspicious interference networks
    Ding Xu
    Hongbo Zhu
    Science China Information Sciences, 2021, 64
  • [47] COVERT SURVEILLANCE IN MUNCHAUSENS-SYNDROME BY PROXY - COVERT SURVEILLANCE SAVES LIVES
    不详
    BRITISH MEDICAL JOURNAL, 1994, 308 (6936): : 1101 - 1101
  • [48] Air-ground integrated assisted proactive eavesdropping
    Wang, Xianming
    Zhang, Heng
    Ren, Yan
    Xu, Feiran
    Gong, Chenglong
    INTERNET TECHNOLOGY LETTERS, 2024,
  • [49] Safeguarding RFID Wireless Communication Against Proactive Eavesdropping
    Zhao, Bing-Qing
    Wang, Hui-Ming
    Liu, Peng
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12) : 11587 - 11600
  • [50] Safeguarding Backscatter RFID Communication against Proactive Eavesdropping
    Zhao, Bing-Qing
    Wang, Hui-Ming
    Jiang, Jia-Cheng
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,