Proactive Eavesdropping via Jamming for Multichannel Decode-and-Forward Relay System

This letter studies the proactive eavesdropping in a suspicious decode-and-forward relay system, where the suspicious communication is divided into transmitter-to-relay (ST-SR) phase and relay-to-destination (SR-SD) phase with partial channel selection over <inline-formula> <tex-math notation="LaTeX">$N \ge 2$ </tex-math></inline-formula> orthogonal channels, and the monitor (E) can only jam/overhear the E-SR/SR-E link over <inline-formula> <tex-math notation="LaTeX">$M \le N$ </tex-math></inline-formula> sub-channels for practicality. Under this framework, with strict proof we first theoretically present the impact of jamming power and number of jamming channels selected by E on its eavesdropping success probability (ESP), and then reveal a fundamental trade-off: given jamming power (number of jamming channels), jamming with more channels (power) reduces the suspicious rate for E to overhear more clearly, but degrades the preconditions for successful eavesdropping. Results verify our obtained conclusions and show that the proposed jamming-assisted eavesdropping scheme with simple search method achieves pretty good performance compared with some intuitive schemes.

[1]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[2]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Naixue Xiong,et al.  Legitimate Monitoring via Cooperative Relay and Proactive Jamming , 2019, IEEE Access.

[4]  W. Marsden I and J , 2012 .

[5]  Hyun-Ho Choi,et al.  Adaptive Jamming Power Control for Untrusted Relay Networks With Imperfect Channel Reciprocity , 2020, IEEE Systems Journal.

[6]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[7]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[8]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[9]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[10]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[11]  Caijun Zhong,et al.  Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[12]  Joseph Lipka,et al.  A Table of Integrals , 2010 .