Legitimate Eavesdropping with Wireless Powered Proactive Full-duplex Eavesdroppers

In this paper, legitimate eavesdropping in a point-to-point suspicious communication network with multiple wireless powered full-duplex legitimate eavesdroppers is investigated. The eavesdroppers are assumed to adopt the power splitting technique to coordinate energy harvesting and information eavesdropping, and use the harvested energy to proactively jam the suspicious communication. For both collusive and non-collusive eavesdroppers, the successful eavesdropping probability is maximized by optimizing the power splitting ratio at each eavesdropper. Heuristic algorithms are proposed to solve the optimization problems. Simulation results are provided to confirm the effectiveness of the proposed algorithms. It is shown that the proposed algorithms outperform the reference algorithms without proactive jamming, especially for non-collusive eavesdroppers with a high energy harvesting efficiency, a high transmit power of the suspicious user, or a large number of eavesdroppers.

[1]  Hongbo Zhu,et al.  Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks , 2019, IEEE Access.

[2]  Qi Zhang,et al.  Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.

[3]  Ding Xu,et al.  Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor , 2020, IEEE Systems Journal.

[4]  Wei Zhao,et al.  Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.

[5]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.

[6]  Jie Xu,et al.  Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[7]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[8]  Victor C. M. Leung,et al.  Incomplete CSI Based Resource Optimization in SWIPT Enabled Heterogeneous Networks: A Non-Cooperative Game Theoretic Approach , 2018, IEEE Transactions on Wireless Communications.

[9]  Ding Xu,et al.  Legitimate Surveillance of Suspicious Multichannel DF Relay Networks With Monitor Mode Selection , 2021, IEEE Wireless Communications Letters.

[10]  Ding Xu,et al.  Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks , 2020, IEEE Transactions on Vehicular Technology.

[11]  Hongbo Zhu,et al.  Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks , 2020, IEEE Systems Journal.

[12]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[13]  Bruno Clerckx,et al.  Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.

[14]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[15]  Victor C. M. Leung,et al.  Collusive Eavesdropping in Interference Alignment Based Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[16]  Hongbo Zhu,et al.  Secure Transmission for SWIPT IoT Systems With Full-Duplex IoT Devices , 2019, IEEE Internet of Things Journal.

[17]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.