Proactive Eavesdropping via Jamming in Cognitive Radio Networks

This paper considers a proactive eavesdropping problem, in which a full-duplex legitimate monitor aims to eavesdrop on a suspicious communication link between the secondary pairs in a cognitive radio (CR) network via jamming. For such a scenario, the jamming signals would not only disrupt the suspicious receivers, but also influences the interference received at the primary receiver, which both destroy the transmitting rate in the suspicious link. Hence, the design of the beamforming should have good tradeoff between those two affects. We aim to maximize the eavesdropping rate by designing the jamming beamforming under the transmitting power (TP) constraint at the legitimate monitor and the interference temperature (IT) constraint at the primary receiver, which is a non- convex problem. Specifically, several cases are discussed to decompose the original problem and a closed-form solution is finally presented by solving two sub-problems. In particular, some analyses on the main parameters (the maximum power at the legitimate monitor and the interference temperature at the primary receiver) are undertaken to obtain their boundaries corresponding to different modes of the optimal vector, which influence the performance of the system. Numerical results are finally presented to demonstrate the performance of our proposed schemes outperforms the reference solutions.

[1]  Ying-Chang Liang,et al.  Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.

[2]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[3]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[4]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.

[5]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[6]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[7]  David James Love,et al.  Outage performance of multi-antenna multicasting for wireless networks , 2009, IEEE Transactions on Wireless Communications.

[8]  G.Neelima Usha Rani Jaggu MULTI-ANTENNA WIRELESS LEGITIMATE SURVEILLANCE SYSTEMS: DESIGN AND PERFORMANCE ANALYSIS , 2019 .

[9]  Walaa Hamouda,et al.  Resource Allocation for Underlay Cognitive Radio Networks: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[10]  K. J. Ray Liu,et al.  Advances in cognitive radio networks: A survey , 2011, IEEE Journal of Selected Topics in Signal Processing.

[11]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[12]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[13]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[14]  Nikos D. Sidiropoulos,et al.  Spectrum Sharing in Wireless Networks via QoS-Aware Secondary Multicast Beamforming , 2009, IEEE Transactions on Signal Processing.