38
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Proactive Eavesdropping via Cognitive Jamming in Fading Channels

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          To enhance the national security, there is a growing need for government agencies to legitimately monitor suspicious communication links for preventing intended crimes and terror attacks. In this paper, we propose a new wireless information surveillance paradigm by investigating a scenario where a legitimate monitor aims to intercept a suspicious wireless communication link over fading channels. The legitimate monitor can successfully eavesdrop (decode) the information of the suspicious link at each fading state only when its achievable data rate is no smaller than that at the suspicious receiver. In practice, such legitimate eavesdropping is particularly challenging, since the legitimate monitor may be far away from the suspicious transmitter and cannot eavesdrop efficiently. To overcome this issue, we propose a new approach, namely proactive eavesdropping via cognitive jamming, in which the legitimate monitor purposely jams the receiver so as to change the suspicious communication (e.g., to a smaller data rate) for overhearing more efficiently. In particular, we consider delay-sensitive and delay-tolerant applications for the suspicious data communications, under which the legitimate monitor maximizes the eavesdropping non-outage probability for event-based monitoring and the relative eavesdropping rate for content analysis, respectively, by optimizing its jamming power allocation over different fading states subject to an average power constraint. Numerical results show that the proposed proactive eavesdropping via cognitive jamming approach greatly outperforms the conventional passive eavesdropping without jamming and the proactive eavesdropping with constant-power jamming.

          Related collections

          Most cited references26

          • Record: found
          • Abstract: not found
          • Article: not found

          The Wire-Tap Channel

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Guaranteeing Secrecy using Artificial Noise

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Capacity of fading channels with channel side information

                Bookmark

                Author and article information

                Journal
                1512.02754

                Numerical methods,Information systems & theory
                Numerical methods, Information systems & theory

                Comments

                Comment on this article