Legitimate Monitoring via Cooperative Relay and Proactive Jamming

With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for...

Full description

Bibliographic Details
Main Authors: Min Zhu, Jianlin Mo, Naixue Xiong, Jin Wang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8665986/
id doaj-547990f0a38c478db11e600a14a3255a
record_format Article
spelling doaj-547990f0a38c478db11e600a14a3255a2021-04-05T16:58:46ZengIEEEIEEE Access2169-35362019-01-017401334014310.1109/ACCESS.2019.29044078665986Legitimate Monitoring via Cooperative Relay and Proactive JammingMin Zhu0https://orcid.org/0000-0003-0601-5476Jianlin Mo1Naixue Xiong2Jin Wang3College of Information Science and Technology, Zhejiang Shuren University, Hangzhou, ChinaDepartment of Electronic Information and Automation, College of ABA Teachers University, Wenchuan, ChinaDepartment of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK, USASchool of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, ChinaWith the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals sent by two monitors are respectively designed. One monitor is used as the cooperative relay, which is mainly used to improve the overall information transmission rate. The other monitor, which simultaneously receiving suspicious information and sending jamming signals, is used to ensure the successful eavesdropping process. Our purpose is to obtain the maximum eavesdropping rate by jointly design the transmit beamforming of two monitors. Two cases that the channel state information (CSI) is perfectly and imperfectly known by the monitors are considered. For the perfect CSI, several cases corresponding to the different conditions about the CSI from the suspicious transmitter to two monitors are discussed. In each case, a closed-form solution of the appropriate sending strategy is obtained, in which the physical meaning is also proposed. Then, for the imperfect CSI case, by employing the S-procedure method, we reformulate the robust beamforming design problem and solve it optimally. Finally, in the simulation results, the comparison between the cooperative monitoring scheme and the single monitoring scheme demonstrates that the proposed scheme is better in terms of eavesdropping rate.https://ieeexplore.ieee.org/document/8665986/Cooperative monitoringrelayjammingrobust beamforming
collection DOAJ
language English
format Article
sources DOAJ
author Min Zhu
Jianlin Mo
Naixue Xiong
Jin Wang
spellingShingle Min Zhu
Jianlin Mo
Naixue Xiong
Jin Wang
Legitimate Monitoring via Cooperative Relay and Proactive Jamming
IEEE Access
Cooperative monitoring
relay
jamming
robust beamforming
author_facet Min Zhu
Jianlin Mo
Naixue Xiong
Jin Wang
author_sort Min Zhu
title Legitimate Monitoring via Cooperative Relay and Proactive Jamming
title_short Legitimate Monitoring via Cooperative Relay and Proactive Jamming
title_full Legitimate Monitoring via Cooperative Relay and Proactive Jamming
title_fullStr Legitimate Monitoring via Cooperative Relay and Proactive Jamming
title_full_unstemmed Legitimate Monitoring via Cooperative Relay and Proactive Jamming
title_sort legitimate monitoring via cooperative relay and proactive jamming
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals sent by two monitors are respectively designed. One monitor is used as the cooperative relay, which is mainly used to improve the overall information transmission rate. The other monitor, which simultaneously receiving suspicious information and sending jamming signals, is used to ensure the successful eavesdropping process. Our purpose is to obtain the maximum eavesdropping rate by jointly design the transmit beamforming of two monitors. Two cases that the channel state information (CSI) is perfectly and imperfectly known by the monitors are considered. For the perfect CSI, several cases corresponding to the different conditions about the CSI from the suspicious transmitter to two monitors are discussed. In each case, a closed-form solution of the appropriate sending strategy is obtained, in which the physical meaning is also proposed. Then, for the imperfect CSI case, by employing the S-procedure method, we reformulate the robust beamforming design problem and solve it optimally. Finally, in the simulation results, the comparison between the cooperative monitoring scheme and the single monitoring scheme demonstrates that the proposed scheme is better in terms of eavesdropping rate.
topic Cooperative monitoring
relay
jamming
robust beamforming
url https://ieeexplore.ieee.org/document/8665986/
work_keys_str_mv AT minzhu legitimatemonitoringviacooperativerelayandproactivejamming
AT jianlinmo legitimatemonitoringviacooperativerelayandproactivejamming
AT naixuexiong legitimatemonitoringviacooperativerelayandproactivejamming
AT jinwang legitimatemonitoringviacooperativerelayandproactivejamming
_version_ 1721540472328945664