Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty

A wireless legitimate surveillance system is studied for a proactive eavesdropping scheme, where a full- duplex legitimate monitor eavesdrops a suspicious link by injecting artificial noise (AN) towards the suspicious receiver. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, it stops transmission. Hence, to improve the surveillance performance, AN should be transmitted covertly with low detection probability by the suspicious receiver. To achieve this goal, an optimal problem is first formulated to maximize the eavesdropping rate under covert constraint. Then, according to the derived detection error probability, the optimal detection threshold is determined under Rayleigh fading channels. A novel scheme is proposed to solve the optimization problem under both perfect and imperfect channel state informations (CSIs). Finally, simulation is performed to verify the analyses. It is shown that the imperfect CSI of the suspicious link can benefit the surveillance performance.

[1]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[2]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Ashutosh Sabharwal,et al.  Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes , 2013, IEEE Transactions on Wireless Communications.

[4]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[5]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[6]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[8]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[9]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[10]  Jie Xu,et al.  Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[11]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[12]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.

[13]  Jianfeng Ma,et al.  On Covert Communication with Interference Uncertainty , 2018, 2018 IEEE International Conference on Communications (ICC).

[14]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[15]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[16]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[17]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[18]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.