Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general objective is to maximize EEE while all the suspicious links are eavesdropped, which can be accomplished through either jamming or assisting each suspicious link at a suspicious receiver under the consideration of many practical limitations, such as transmission strategy of a suspicious transmitter, power budget of legitimate monitor (LM), and eavesdropping ratio of a whole system. The formulated problem leads to a challenging mixed-integer nonlinear programming (MINLP) problem. To solve this problem, we propose a novel eavesdropping scheme by the special characteristic of eavesdropping, and the complex MINLP problem can be transformed to a concave optimization problem by a series of transformations, which can be solved by the Lagrange multiplier method. Considering the infeasibility of our proposed eavesdropping scheme when the power of LM is insufficient to eavesdrop all the suspicious links, we propose a heuristic algorithm to obtain a tradeoff between EEE and eavesdropping ratio. Numerical results show that our proposed eavesdropping schemes outperform the proactive jamming scheme and the average-power eavesdropping scheme.

[1]  Guangjie Han,et al.  A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities , 2018, IEEE Communications Magazine.

[2]  Qi Zhang,et al.  Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.

[3]  Hao Wang,et al.  A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things , 2017, Future Gener. Comput. Syst..

[4]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[5]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[6]  He Chen,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[7]  Caijun Zhong,et al.  Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.

[8]  Inkyu Lee,et al.  Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.

[9]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[10]  Jie Xu,et al.  Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.

[11]  Hans-Jurgen Zepernick,et al.  Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).

[12]  Jie Xu,et al.  Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.

[13]  Jie Xu,et al.  Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.

[14]  Caijun Zhong,et al.  Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.

[15]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.