Performance of Covert Surveillance via Proactive Eavesdropping

Surveillance performance is studied in this paper for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which degrades the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability. Under these assumptions, an optimization problem is formulated to maximize the eavesdropping non-outage probability under a covert constraint. Based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem using an iterative search. Moreover, we investigate the impact of both the suspicious and the jamming links uncertainties on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the suspicious link uncertainty enhances the surveillance performance, while the jamming link uncertainty can degrade the surveillance performance.

[1]  Yueming Cai,et al.  Legitimate Eavesdropping in Two-Way AF Relay Networks , 2020, IEEE Wireless Communications Letters.

[2]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[3]  Sang Wu Kim,et al.  Covert Communication Under Channel Uncertainty and Noise Uncertainty , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[4]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[5]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[7]  Yueming Cai,et al.  Proactive Eavesdropping Via Jamming for Ergodic Rate Maximization Over Wireless-Powered Multichannel Suspicious System , 2020, IEEE Communications Letters.

[8]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[9]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[10]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[11]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[12]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[13]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[14]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.