用户名: 密码: 验证码:
On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems
  • 作者:Yingdong ; HU ; Ruifeng ; GAO ; Ye ; LI ; Shibing ; ZHANG
  • 英文作者:Yingdong HU;Ruifeng GAO;Ye LI;Shibing ZHANG;School of Electronic and Information, Nantong University;
  • 英文关键词:physical layer security;;proactive eavesdropping;;anti-relay-selection jamming;;multi-relay;;beamforming
  • 中文刊名:JFXG
  • 英文刊名:中国科学:信息科学(英文版)
  • 机构:School of Electronic and Information, Nantong University;
  • 出版日期:2019-02-27 09:23
  • 出版单位:Science China(Information Sciences)
  • 年:2019
  • 期:v.62
  • 基金:supported by National Natural Science Foundation of China (Grant Nos. 61871241, 61771263, 61801248);; Nature Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 18KJB510036)
  • 语种:英文;
  • 页:JFXG201904016
  • 页数:10
  • CN:04
  • ISSN:11-5847/TP
  • 分类号:157-166
摘要
This paper considers a multi-relay legitimate surveillance system, where a suspicious link may transmit illegal information with the help of relays and a legitimate monitor aims at intercepting the information. We assume that the relay selection method is adopted by the suspicious link to improve the efficiency of the information transmission. We propose anti-relay-selection(ARS) jamming strategies for two different information transmission scenarios, namely the event-based information and content-based information. Beamforming vector of jamming is optimized and the iterative algorithms are used to improve the jamming efficiency. We demonstrate the effectiveness and the superiority of the ARS jamming strategies through numerical results and simulations.
        This paper considers a multi-relay legitimate surveillance system, where a suspicious link may transmit illegal information with the help of relays and a legitimate monitor aims at intercepting the information. We assume that the relay selection method is adopted by the suspicious link to improve the efficiency of the information transmission. We propose anti-relay-selection(ARS) jamming strategies for two different information transmission scenarios, namely the event-based information and content-based information. Beamforming vector of jamming is optimized and the iterative algorithms are used to improve the jamming efficiency. We demonstrate the effectiveness and the superiority of the ARS jamming strategies through numerical results and simulations.
引文
1 Andrews J G,Buzzi S,Choi W,et al.What will 5G be?IEEE J Sel Areas Commun,2014,32:1065-1082
    2 Zhang S B,Hu Y D,Zhang L,et al.Novel spectrum sensing and access in cognitive radio networks.Sci China Inf Sci,2018,61:089302
    3 Zou Y L,Zhu J,Wang X B,et al.A survey on wireless security:technical challenges,recent advances,and future trends.Proc IEEE,2016,104:1727-1765
    4 Yang N,Wang L F,Geraci G,et al.Safeguarding 5G wireless communication networks using physical layer security.IEEE Commun Mag,2015,53:20-27
    5 Zhou X Y,Zhang Y,Song L Y.Physical Layer Security in Wireless Communications.Boca Raton:CRC Press,2016
    6 Wang J B,Wu Y L,Yen N,et al.Big data analytics for emergency communication networks:a survey.IEEE Commun Surv Tut,2016,18:1758-1778
    7 Xu J,Duan L J,Zhang R.Surveillance and intervention of infrastructure-free mobile communications:a new wireless security paradigm.IEEE Wirel Commun,2017,24:152-159
    8 Xu J,Duan L J,Zhang R.Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels.IEEE Wirel Commun Lett,2016,5:80-83
    9 Zeng Y,Zhang R.Wireless information surveillance via proactive eavesdropping with spoofing relay.IEEE J Sel Top Signal Process,2016,10:1449-1461
    10 Xu J,Duan L J,Zhang R.Proactive eavesdropping via cognitive jamming in fading channels.IEEE Trans Wirel Commun,2017,16:2790-2806
    11 Zhong C J,Jiang X,Qu F Z,et al.Multi-antenna wireless legitimate surveillance systems:design and performance analysis.IEEE Trans Wirel Commun,2017,16:4585-4599
    12 Li B G,Yao Y B,Chen H,et al.Wireless information surveillance and intervention over multiple suspicious links.IEEE Signal Process Lett,2018,25:1131-1135
    13 Xing C W,Ma Y,Zhou Y Q,et al.Transceiver optimization for multi-hop communications with per-antenna power constraints.IEEE Trans Signal Process,2016,64:1519-1534
    14 Zhou Y Q,Liu H,Pan Z G,et al.Energy-efficient two-stage cooperative multicast:effect of user density.IEEE Trans Veh Technol,2016,65:7297-7307
    15 Jiang X,Lin H,Zhong C J,et al.Proactive eavesdropping in relaying systems.IEEE Signal Process Lett,2017,24:917-921
    16 Zhang Y X,Jiang X,Zhong C J,et al.Performance of proactive eavesdropping in dual-hop relaying systems.In:Proceedings of 2017 IEEE Globecom Workshops(GC Wkshps),Singapore,2017.1-6
    17 Hu D K,Zhang Q,Yang P,et al.Proactive monitoring via jamming in amplify-and-forward relay networks.IEEESignal Process Lett,2017,24:1714-1718
    18 Wang L,Cai Y M,Zou Y L,et al.Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays.IEEE Trans Veh Technol,2016,65:6259-6274
    19 Zhong B,Wu M G,Li T,et al.Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channels.Sci China Inf Sci,2016,59:062305
    20 Zhao R,Lin H X,He Y C,et al.Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection.Sci China Inf Sci,2017,60:069303
    21 Boyd S,Vandenberghe L.Convex Optimization.Cambridge:Cambridge University Press,2004
    22 Grant M,Boyd S,Ye Y.CVX:Matlab software for disciplined convex programming.2008.http://cvxr.com/cvx/
    23 Zhu H L,Wang J Z.Chunk-based resource allocation in OFDMA systems-part I:chunk allocation.IEEE Trans Commun,2009,57:2734-2744
    24 Zhu H L,Wang J Z.Chunk-based resource allocation in OFDMA systems-part II:joint chunk,power and bit allocation.IEEE Trans Commun,2012,60:499-509

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700