Energy Efficiency for Proactive Eavesdropping in Cooperative Cognitive Radio Networks

This paper investigates a distant proactive eavesdropping system in cooperative cognitive radio (CR) networks. Specifically, an amplify-and-forward (AF) full-duplex (FD) secondary transmitter assists to relay the received signal from suspicious users to legitimate monitor for wireless information surveillance. In return, the secondary transmitter is granted to share the spectrum belonging to the suspicious users for its own information transmission. To improve the eavesdropping, the transmitted secondary user’s signal can also be used as a jamming signal to moderate the data rate of the suspicious link. We consider two cases, i.e., non-negligible processing delay (NNPD) and negligible processing delay (NPD) at secondary transmitter. Our target is to maximize network energy efficiency (NEE) via jointly optimizing the AF relay matrix and precoding vector at the secondary transmitter, as well as the receiver combining vector at monitor, subject to the maximum power constraint at the secondary transmitter and minimum data rate requirement of the secondary user. We also guarantee that the achievable data rate of the eavesdropping link should be no less than that of the suspicious link for efficient surveillance. Due to the non-convexity of the formulated NEE maximization problem, we develop an efficient path-following algorithm and a robust alternating optimization (AO) method as solutions under perfect and imperfect channel state information (CSI) conditions, respectively. We also analyze the convergence and computational complexity of the proposed schemes. Numerical results are provided to validate the effectiveness of our proposed schemes.

[1]  H. Vincent Poor,et al.  Secure and Energy-Efficient Beamforming for Simultaneous Information and Energy Transfer , 2016, IEEE Transactions on Wireless Communications.

[2]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[3]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[4]  I. Stancu-Minasian Nonlinear Fractional Programming , 1997 .

[5]  Zahra Mobini,et al.  Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection , 2020, IEEE Transactions on Communications.

[6]  Rui Zhang,et al.  Jamming-Assisted Eavesdropping Over Parallel Fading Channels , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[8]  Jie Xu,et al.  Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.

[9]  Andreas Karlsson,et al.  Matrix Analysis for Statistics , 2007, Technometrics.

[10]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[11]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks , 2020, IEEE Transactions on Communications.

[12]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[13]  Hongbo Zhu,et al.  Spectrum Sharing Incentive for Legitimate Wireless Information Surveillance , 2021, IEEE Transactions on Vehicular Technology.

[14]  Zhi-Quan Luo,et al.  An iteratively weighted MMSE approach to distributed sum-utility maximization for a MIMO interfering broadcast channel , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Geoffrey Ye Li,et al.  Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems , 2018, IEEE Journal on Selected Areas in Communications.

[16]  Chengwen Xing,et al.  Energy Efficient Transmission in Multi-User MIMO Relay Channels With Perfect and Imperfect Channel State Information , 2017, IEEE Transactions on Wireless Communications.

[17]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.

[18]  Erik G. Larsson,et al.  The Sign-Definiteness Lemma and Its Applications to Robust Transceiver Optimization for Multiuser MIMO Systems , 2013, IEEE Transactions on Signal Processing.

[19]  Fuhui Zhou,et al.  Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT , 2016, IEEE Transactions on Wireless Communications.

[20]  H. Vincent Poor,et al.  Big Data Driven Wireless Communications: A Human-in-the-Loop Pushing Technique for 5G Systems , 2018, IEEE Wireless Communications.

[21]  Wei Zhao,et al.  Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.

[22]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[23]  Octavia A. Dobre,et al.  A New Design Paradigm for Secure Full-Duplex Multiuser Systems , 2018, IEEE Journal on Selected Areas in Communications.

[24]  Haijun Zhang,et al.  Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.

[25]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[26]  Inkyu Lee,et al.  Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.

[27]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[28]  Lajos Hanzo,et al.  Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach , 2013, IEEE Transactions on Communications.

[29]  Quanzhong Li,et al.  Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors , 2018, IEEE Signal Processing Letters.

[30]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.

[31]  Qi Li,et al.  Cooperative Relay-Assisted Proactive Eavesdropping for Wireless Information Surveillance Systems , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[32]  He Chen,et al.  Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.

[33]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.

[34]  Inkyu Lee,et al.  Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming , 2018, IEEE Transactions on Wireless Communications.

[35]  Pei Li,et al.  Proactive Eavesdropping via Jamming in Cognitive Radio Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).