Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay

Wireless information surveillance, by which suspicious wireless communications are closely monitored by legitimate agencies, is an integral part of national security. To enhance the information surveillance capability, we propose in this paper a new proactive eavesdropping approach via a spoofing relay, where the legitimate monitor operates in a full-duplex manner with simultaneous eavesdropping and spoofing relaying to vary the source transmission rate in favor of the eavesdropping performance. To this end, a power splitting receiver is proposed, where the signal received at each antenna of the legitimate monitor is split into two parts for information eavesdropping and spoofing relaying, respectively. We formulate an optimization problem to maximize the achievable eavesdropping rate by jointly optimizing the power splitting ratios and relay precoding matrix at the multiantenna monitor. Depending on the suspicious and eavesdropping channel conditions, the optimal solution corresponds to three possible spoofing relay strategies, namely constructive relaying, jamming, and simultaneous jamming and destructive relaying. Numerical results show that the proposed technique significantly improves the eavesdropping rate of the legitimate monitor as compared to the existing passive eavesdropping and jamming-assisted eavesdropping schemes.

[1]  Rui Zhang,et al.  Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.

[2]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[3]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[4]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[5]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[6]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[7]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[10]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[11]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[12]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[13]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[14]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[15]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[16]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[17]  A. Lee Swindlehurst,et al.  A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[18]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[19]  Fredrik Rusek,et al.  Detection of active eavesdroppers in massive MIMO , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[20]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[22]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[23]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[24]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[25]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[26]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[27]  Qi Xiong,et al.  An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.

[28]  Jitendra K. Tugnait,et al.  Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.

[29]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[30]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[31]  Jae-Mo Kang,et al.  Detection of Pilot Contamination Attack for Multi-Antenna Based Secrecy Systems , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[32]  Rui Zhang,et al.  Active eavesdropping via spoofing relay attack , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.