期刊
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
卷 16, 期 7, 页码 4585-4599出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2017.2700379
关键词
Proactive eavesdropping; wireless legitimate surveillance; power control; beamformer design; full-duplex
资金
- National Natural Science Foundation of China [61671406]
- Zhejiang Provincial Natural Science Foundation of China [LR15F010001]
- National Science and Technology Major Project of China [2017ZX03001002-003]
- Opening Project of Key Laboratory of Cognitive Radio and Information Processing through Ministry of Education (Guilin University of Electronic Technology) [CRKL160201]
- Research Funds for Department of Education of Zhejiang Province [Y201122658]
To improve national security, government agencies have long been committed to enforcing powerful surveillance measures on suspicious individuals or communications. In this paper, we consider a wireless legitimate surveillance system, where a full-duplex multi-antenna legitimate monitor aims to eavesdrop on a dubious communication link between a suspicious pair via proactive jamming. Assuming that the legitimate monitor can successfully overhear the suspicious information only when its achievable data rate is no smaller than that of the suspicious receiver, the key objective is to maximize the eavesdropping non-outage probability by joint design of the jamming power, receive and transmit beamformers at the legitimate monitor. Depending on the number of receive/transmit antennas implemented, i.e., single-input single-output, single-input multiple-output, multiple-input single-output, and multiple-input multiple-output (MIMO), four different scenarios are investigated. For each scenario, the optimal jamming power is derived in a closed form and efficient algorithms are obtained for the optimal transmit/receive beam-forming vectors. Moreover, low-complexity suboptimal beam-forming schemes are proposed for the MIMO case. Our analytical findings demonstrate that by exploiting multiple antennas at the legitimate monitor, the eavesdropping non-outage probability can be significantly improved compared with the single-antenna case. In addition, the proposed suboptimal transmit zero-forcing scheme yields similar performance as the optimal scheme.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据