Deep Learning-Based Proactive Eavesdropping for Wireless Surveillance

In this work, we investigate a proactive eavesdropping system where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For successful eavesdropping, it is required that the eavesdropping channel capacity is higher than the data rate of the suspicious users so that the central monitor can reliably decode the intercepted information. Hence, the intermediate nodes operate in two different modes, namely eavesdropping mode and jamming mode, to facilitate eavesdropping. Specifically, the eavesdropping nodes forward the intercepted data from the suspicious users to the central monitor, while the jamming nodes transmit jamming signals to proactively control the data rate of the suspicious users. We propose an efficient deep learning-based approach to identify the optimal mode selection for the intermediate nodes and the optimal transmit power for the jamming nodes. Numerical results confirm the significant performance gain of our proposed method both in terms of performance and time complexity over conventional schemes.

[1]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[2]  Inkyu Lee,et al.  Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.

[3]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[4]  Jie Xu,et al.  Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.

[5]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[6]  Jan Cernocký,et al.  Improved feature processing for deep neural networks , 2013, INTERSPEECH.

[7]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[8]  Inkyu Lee,et al.  Precoder Designs for MIMO Gaussian Multiple Access Wiretap Channels , 2017, IEEE Transactions on Vehicular Technology.

[9]  Inkyu Lee,et al.  Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.

[10]  Hans-Jurgen Zepernick,et al.  Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).

[11]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[12]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[13]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[14]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[15]  Wei Zhao,et al.  Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.

[16]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[17]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[18]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[19]  David G. Luenberger,et al.  Linear and nonlinear programming , 1984 .

[20]  Inkyu Lee,et al.  UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.

[21]  He Chen,et al.  Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.

[22]  Tara N. Sainath,et al.  Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[23]  Shlomo Shamai,et al.  Fronthaul Compression for Cloud Radio Access Networks: Signal processing advances inspired by network information theory , 2014, IEEE Signal Processing Magazine.

[24]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[25]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[26]  Inkyu Lee,et al.  Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming , 2018, IEEE Transactions on Wireless Communications.

[27]  Jie Xu,et al.  Wireless surveillance of two-hop communications : (Invited paper) , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[28]  Liang Liu,et al.  Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).