Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks

In this correspondence, legitimate surveillance of a downlink suspicious non-orthogonal multiple access (NOMA) network with multiple groups of suspicious users (SUs), in the presence of a full-duplex monitor equipped with a successive interference cancellation (SIC) decoder, is investigated. Proactive eavesdropping is adopted, i.e., the monitor simultaneously eavesdrops the suspicious communications, and sends jamming signals. The problem of maximizing the number of successfully eavesdropped SUs by jointly optimizing the jamming power allocation and the decoding order at the monitor is investigated considering both imperfect full-duplex self-interference cancellation, and imperfect SIC. By exploring the particular problem structure, a heuristic iterative algorithm is proposed, where the optimal decoding at the monitor is proved to be equal to that at the SUs. Extensive simulations confirm that the proposed algorithm achieves performance very close to the optimal one but with significantly lower complexity, and outperforms various benchmark algorithms.

[1]  Pinyi Ren,et al.  Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis , 2019, IEEE Transactions on Information Forensics and Security.

[2]  Ding Xu,et al.  Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor , 2020, IEEE Systems Journal.

[3]  Yuanwei Liu,et al.  Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers , 2017, IEEE Access.

[4]  Rui Zhang,et al.  Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links , 2019, IEEE Transactions on Wireless Communications.

[5]  Ding Xu,et al.  Jamming-Assisted Legitimate Surveillance of Suspicious Interference Networks With Successive Interference Cancellation , 2020, IEEE Communications Letters.

[6]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.

[7]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[8]  H. Vincent Poor,et al.  Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios , 2018, IEEE Transactions on Information Forensics and Security.

[9]  3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (e-utra); Further Advancements for E-utra Physical Layer Aspects (release 9) , 2022 .

[10]  Chong Li,et al.  Dynamic Resource Allocation for Transmit Power Minimization in OFDM-Based NOMA Systems , 2016, IEEE Communications Letters.

[11]  He Chen,et al.  Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.

[12]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[13]  Baoyun Wang,et al.  Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems , 2019, IEEE Transactions on Vehicular Technology.

[14]  Kun Lu,et al.  A Survey of Non-Orthogonal Multiple Access for 5G , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[15]  Robert W. Heath,et al.  Performance analysis of maximum ratio combining with imperfect channel estimation in the presence of cochannel interferences , 2009, IEEE Transactions on Wireless Communications.

[16]  H. Vincent Poor,et al.  Non-Orthogonal Multiple Access: Common Myths and Critical Questions , 2018, IEEE Wireless Communications.

[17]  Haijun Zhang,et al.  Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.

[18]  Victor C. M. Leung,et al.  Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks , 2018, IEEE Wireless Communications.

[19]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.