Proactive Eavesdropping in Underlaid D2D Communication Networks

This paper considers the legitimate proactive eavesdropping in the underlaid device-to-device (D2D) communications networks. In such network, a dedicated node working in the full-duplex mode monitors a pair of suspicious D2D users, and transmits its own information to the base station at the same time. We formulate a beamforming design problem for the monitoring node to maximize its transmitting rate while guaranteeing the success of surveillance. As the problem is non-convex, we first transform it into a semi-definite problem via semi-definite relaxation and obtain an optimal solution to the transformed problem. For low-complexity implementation, we propose another scheme based on zero-forcing and max-ratio-transmitting beamforming methods. For simulation results, we show that compared to the passive eavesdropping, the two proposed beamforming schemes can improve the achievable legitimate transmitting rate and guarantee the non-outage probability of surveillance.

[1]  YANG CAO,et al.  Cooperative device-to-device communications in cellular networks , 2015, IEEE Wireless Communications.

[2]  Pei Li,et al.  Proactive Eavesdropping via Jamming in Cognitive Radio Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[3]  Caijun Zhong,et al.  Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[4]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[5]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[6]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[7]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[8]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[10]  MohammadAli Mohammadi,et al.  Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection , 2018, 2018 9th International Symposium on Telecommunications (IST).

[11]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[12]  Jie Xu,et al.  Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[13]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[14]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[15]  William W. Hager,et al.  Updating the Inverse of a Matrix , 1989, SIAM Rev..

[16]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[17]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.