Proactive Eavesdropping Over OFDM-Based Bidirectional Suspicious Communication Channels

In this letter, proactive eavesdropping of an orthogonal frequency division multiplexing (OFDM)-based bidirectional point-to-point suspicious communication link is studied. The problem of joint successive interference cancelation (SIC) decoding ordering and jamming power allocation at the monitor for maximizing the weighted sum eavesdropping rate is formulated as mixed-integer nonlinear programming and then transformed to more tractable zero-one integer programming. A heuristic suboptimal algorithm and an optimal algorithm based on the branch-and-bound method are proposed. Simulation results show the advantageous of the proposed algorithms compared to the benchmarks, and also show that both algorithms are low-complex, and the suboptimal algorithm has further lower complexity and achieves almost the same performance as the optimal algorithm.

[1]  Inkyu Lee,et al.  Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.

[2]  Haijun Zhang,et al.  Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.

[3]  Yueming Cai,et al.  Proactive Eavesdropping via Jamming for Multichannel Decode-and-Forward Relay System , 2020, IEEE Communications Letters.

[4]  Rui Zhang,et al.  Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links , 2019, IEEE Transactions on Wireless Communications.

[5]  Yueming Cai,et al.  Legitimate Eavesdropping in Two-Way AF Relay Networks , 2020, IEEE Wireless Communications Letters.

[6]  Athanasios V. Vasilakos,et al.  Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions , 2016, Proceedings of the IEEE.

[7]  Ding Xu,et al.  Jamming-Assisted Legitimate Surveillance of Suspicious Interference Networks With Successive Interference Cancellation , 2020, IEEE Communications Letters.

[8]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[9]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[10]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.

[11]  Stephen P. Boyd,et al.  Branch and Bound Methods , 1987 .

[12]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.