Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users

In this letter, legitimate surveillance of a pair of suspicious users (SUs) who shares the same spectrum with a pair of unsuspicious users (UUs), in the presence of a full-duplex monitor, is investigated. The monitor can proactively jam the suspicious communication for better eavesdropping performance. The problem of jamming transmit power optimization for maximizing the successful eavesdropping probability under the constraint that the quality of service (QoS) of the UUs is not affected, is investigated. After important properties of the problem are obtained, a high-complexity optimal algorithm and a low-complexity suboptimal algorithm are derived. The superiority of the proposed algorithms compared to the benchmark algorithm is verified by simulation results.

[1]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[2]  Inkyu Lee,et al.  Proactive Eavesdropping With Jamming and Eavesdropping Mode Selection , 2019, IEEE Transactions on Wireless Communications.

[3]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[4]  Hongbo Zhu,et al.  Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks , 2019, IEEE Access.

[5]  Ding Xu,et al.  Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor , 2020, IEEE Systems Journal.

[6]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[7]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.

[8]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[9]  Ding Xu,et al.  Jamming-Assisted Legitimate Surveillance of Suspicious Interference Networks With Successive Interference Cancellation , 2020, IEEE Communications Letters.

[10]  Ding Xu,et al.  Resource Allocation for Secure Communications in Cooperative Cognitive Wireless Powered Communication Networks , 2018, IEEE Systems Journal.

[11]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[12]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[13]  Haijun Zhang,et al.  Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.