Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links

This paper studies the wireless surveillance of multiple suspicious communication links. We propose a cooperative eavesdropping scheme, where a primary legitimate monitor and an assistant legitimate monitor cooperatively jam the suspicious links for an effective proactive eavesdropping. The objective is to maximize the eavesdropping energy efficiency (EEE) of our proposed cooperative eavesdropping scheme, by optimizing jamming power allocation and the cooperative strategy of legitimate monitors subject to several constraints, i.e., energy transfer constraint and eavesdropping load balancing constraint. Furthermore, the formulated problem is a difficult mixed integer nonlinear programming problem and, therefore, is non-convex and combinational. To solve the problem efficiently, a threshold-based policy of optimal jamming power allocation is proposed. Therefore, the original optimization problem is decoupled into two sub-problems: the selection of optimal eavesdropper under the given jammer and the whole EEE maximization over the selection of optimal jammer. Numerical results show that our proposed cooperative eavesdropping achieves higher EEE and eavesdropping rate than non-cooperative proactive eavesdropping.

[1]  John Thompson,et al.  Joint Optimization of Computation and Communication Power in Multi-User Massive MIMO Systems , 2018, IEEE Transactions on Wireless Communications.

[2]  Eduard A. Jorswieck,et al.  Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.

[3]  He Chen,et al.  Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.

[4]  Jie Xu,et al.  Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[5]  Lihua Li,et al.  UAV-Assisted Cooperative Communications with Time-Sharing SWIPT , 2018, 2018 IEEE International Conference on Communications (ICC).

[6]  Victor C. M. Leung,et al.  Downlink Energy Efficiency of Power Allocation and Wireless Backhaul Bandwidth Allocation in Heterogeneous Small Cell Networks , 2017, IEEE Transactions on Communications.

[7]  Hans-Jurgen Zepernick,et al.  Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).

[8]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[9]  Yue Li,et al.  Cooperative Device-to-Device Communication for Uplink Transmission in Cellular System , 2018, IEEE Transactions on Wireless Communications.

[10]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[11]  Wei Zhao,et al.  Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.

[12]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[13]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[14]  Cheng-Xiang Wang,et al.  Quadrature Space-Frequency Index Modulation for Energy-Efficient 5G Wireless Communication Systems , 2018, IEEE Transactions on Communications.

[15]  Jie Xu,et al.  Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.

[16]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[17]  Jie Xu,et al.  Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.

[18]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[19]  Caijun Zhong,et al.  Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[20]  Qiang Li,et al.  Multipath Cooperative Communications Networks for Augmented and Virtual Reality Transmission , 2017, IEEE Transactions on Multimedia.

[21]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[22]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.