Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime

The Internet of Things (IoT) will feature pervasive sensing and control capabilities via the massive deployment of machine-type communication devices in order to greatly improve daily life. However, machine-type communications can be illegally used (e.g., by criminals or terrorists) which is difficult to monitor, and thus presents new security challenges. The information exchanged in machine-type communications is usually transmitted in short packets. Thus, this paper investigates a legitimate surveillance system via proactive eavesdropping at finite blocklength regime. Under the finite blocklength regime, we analyze the channel coding rate of the eavesdropping link and the suspicious link. We find that the legitimate monitor can still eavesdrop the information sent by the suspicious transmitter as the blocklength decreases, even when the eavesdropping is failed under the Shannon capacity regime. Moreover, we define a metric called the effective eavesdropping rate and study the monotonicity. From the analysis of monotonicity, the existence of a maximum effective eavesdropping rate for a moderate or even high signal-to-noise (SNR) is verified. Finally, numerical results are provided and discussed. In the simulation, we also find that the maximum effective eavesdropping rate slowly increases with the blocklength.

[1]  Caijun Zhong,et al.  Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[2]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[3]  James Gross,et al.  Blocklength-Limited Performance of Relaying Under Quasi-Static Rayleigh Channels , 2016, IEEE Transactions on Wireless Communications.

[4]  Haijun Zhang,et al.  Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.

[5]  H. Vincent Poor,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.

[6]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[7]  Yichen Wang,et al.  Achieving Full Secrecy Rate With Energy-Efficient Transmission Control , 2017, IEEE Transactions on Communications.

[8]  Aiwei Sun,et al.  Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper , 2017, Sensors.

[9]  Xing Tan,et al.  A full-duplex SWIPT relaying protocol based on discrete energy state , 2017, 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[10]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing with BPSK Signaling , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[11]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[12]  Petar Popovski,et al.  Towards Massive, Ultra-Reliable, and Low-Latency Wireless Communication with Short Packets , 2015 .

[13]  He Chen,et al.  Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.

[14]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[15]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[16]  Giuseppe Durisi,et al.  Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength , 2013, IEEE Transactions on Information Theory.

[17]  Jie Xu,et al.  Wireless surveillance of two-hop communications : (Invited paper) , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[18]  Jie Xu,et al.  Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.

[19]  Beongku An,et al.  Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.

[20]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[21]  Zhigang Jin,et al.  The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors , 2017, Sensors.

[22]  Jie Xu,et al.  Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.

[23]  Yueming Cai,et al.  Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks , 2018, Sensors.

[24]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[25]  Jie Xu,et al.  Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.

[26]  Nan Yang,et al.  Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming , 2016, Sensors.

[27]  Hans-Jurgen Zepernick,et al.  Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).

[28]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[29]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.