Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty

被引:19
|
作者
Cheng, Zihao [1 ]
Si, Jiangbo [1 ,2 ]
Li, Zan [1 ]
Guan, Lei [1 ]
Zhao, Yan [1 ]
Wang, Danyang [1 ]
Cheng, Julian [3 ]
Al-Dhahir, Naofal [2 ]
机构
[1] Xidian Univ, Integrated Serv Networks Lab, Xian 710071, Peoples R China
[2] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[3] Univ British Columbia, Sch Engn, Kelowna, BC V1V 1V7, Canada
基金
中国国家自然科学基金;
关键词
Uncertainty; Surveillance; Eavesdropping; Receivers; Jamming; Wireless communication; Interference cancellation; Channel uncertainty; covert communication; full-duplex; legitimate surveillance; proactive eavesdropping; PHYSICAL-LAYER SECURITY; WIRELESS COMMUNICATIONS; COMMUNICATION; TRANSMISSION; DESIGN; LIMITS; RELAY;
D O I
10.1109/TCOMM.2021.3067058
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which can therefore degrade the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the surveillance performance under a covert constraint. Then, based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious-transmitter-to-suspicious-receiver and the monitor-to-suspicious-receiver links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the uncertainty in the suspicious user's link can enhance the surveillance performance, while the uncertainty in the monitor-to-suspicious-receiver link can degrade the surveillance performance.
引用
收藏
页码:4024 / 4037
页数:14
相关论文
共 50 条
  • [21] Covert Wireless Communications Under Quasi-Static Fading With Channel Uncertainty
    Shahzad, Khurram
    Zhou, Xiangyun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1104 - 1116
  • [22] Proactive Eavesdropping in Relay Systems via Trajectory and Power Optimization
    Dan, Qian
    Lei, Hongjiang
    Park, Ki-Hong
    Lei, Weijia
    Pan, Gaofeng
    IEEE Internet of Things Journal, 2024, 11 (20) : 33744 - 33757
  • [23] Proactive Eavesdropping of Two Suspicious Communication Links Via Jamming
    Zhang, Haiyang
    Duan, Lingjie
    Zhang, Rui
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [24] Cooperative Relay-Assisted Proactive Eavesdropping for Wireless Information Surveillance Systems
    Li, Qi
    Zhang, Haixia
    Qiao, Jingping
    Yuan, Dongfeng
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [25] Covert Communication With the Help of Relay and Channel Uncertainty
    Wang, Jianquan
    Tang, Wanbin
    Zhu, Qiangqiang
    Li, Xiaoping
    Rao, Hangmei
    Li, Shaoqian
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) : 317 - 320
  • [26] Proactive Eavesdropping Scheme for Wireless Surveillance Systems: A Rotated-Jamming Aided Approach
    Xu, Hongbin
    Sun, Li
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [27] A Decode-and-Forward Relay-Aided Proactive Eavesdropping Scheme for Wireless Surveillance
    Wu, Haowei
    Yan, Lian
    Ma, Rui
    Ou, Jinglan
    Cui, Jingyue
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 1104 - 1109
  • [28] Proactive Eavesdropping via Jamming for Power-Limited UAV Communications
    Zhang, Mingzhu
    Yi, Hongju
    Chen, Yu
    Tao, Xiaofeng
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [29] Proactive Eavesdropping in UAV Systems Via Trajectory Planning and Power Optimization
    Huang, Mengya
    Chen, Yu
    Tao, Xiaofeng
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [30] Proactive Eavesdropping via Jamming over HARQ-Based Communications
    Xu, Jie
    Li, Kai
    Duan, Lingjie
    Zhang, Rui
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,