Legitimate Monitoring via Cooperative Relay and Proactive Jamming
With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8665986/ |
id |
doaj-547990f0a38c478db11e600a14a3255a |
---|---|
record_format |
Article |
spelling |
doaj-547990f0a38c478db11e600a14a3255a2021-04-05T16:58:46ZengIEEEIEEE Access2169-35362019-01-017401334014310.1109/ACCESS.2019.29044078665986Legitimate Monitoring via Cooperative Relay and Proactive JammingMin Zhu0https://orcid.org/0000-0003-0601-5476Jianlin Mo1Naixue Xiong2Jin Wang3College of Information Science and Technology, Zhejiang Shuren University, Hangzhou, ChinaDepartment of Electronic Information and Automation, College of ABA Teachers University, Wenchuan, ChinaDepartment of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK, USASchool of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, ChinaWith the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals sent by two monitors are respectively designed. One monitor is used as the cooperative relay, which is mainly used to improve the overall information transmission rate. The other monitor, which simultaneously receiving suspicious information and sending jamming signals, is used to ensure the successful eavesdropping process. Our purpose is to obtain the maximum eavesdropping rate by jointly design the transmit beamforming of two monitors. Two cases that the channel state information (CSI) is perfectly and imperfectly known by the monitors are considered. For the perfect CSI, several cases corresponding to the different conditions about the CSI from the suspicious transmitter to two monitors are discussed. In each case, a closed-form solution of the appropriate sending strategy is obtained, in which the physical meaning is also proposed. Then, for the imperfect CSI case, by employing the S-procedure method, we reformulate the robust beamforming design problem and solve it optimally. Finally, in the simulation results, the comparison between the cooperative monitoring scheme and the single monitoring scheme demonstrates that the proposed scheme is better in terms of eavesdropping rate.https://ieeexplore.ieee.org/document/8665986/Cooperative monitoringrelayjammingrobust beamforming |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Min Zhu Jianlin Mo Naixue Xiong Jin Wang |
spellingShingle |
Min Zhu Jianlin Mo Naixue Xiong Jin Wang Legitimate Monitoring via Cooperative Relay and Proactive Jamming IEEE Access Cooperative monitoring relay jamming robust beamforming |
author_facet |
Min Zhu Jianlin Mo Naixue Xiong Jin Wang |
author_sort |
Min Zhu |
title |
Legitimate Monitoring via Cooperative Relay and Proactive Jamming |
title_short |
Legitimate Monitoring via Cooperative Relay and Proactive Jamming |
title_full |
Legitimate Monitoring via Cooperative Relay and Proactive Jamming |
title_fullStr |
Legitimate Monitoring via Cooperative Relay and Proactive Jamming |
title_full_unstemmed |
Legitimate Monitoring via Cooperative Relay and Proactive Jamming |
title_sort |
legitimate monitoring via cooperative relay and proactive jamming |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals sent by two monitors are respectively designed. One monitor is used as the cooperative relay, which is mainly used to improve the overall information transmission rate. The other monitor, which simultaneously receiving suspicious information and sending jamming signals, is used to ensure the successful eavesdropping process. Our purpose is to obtain the maximum eavesdropping rate by jointly design the transmit beamforming of two monitors. Two cases that the channel state information (CSI) is perfectly and imperfectly known by the monitors are considered. For the perfect CSI, several cases corresponding to the different conditions about the CSI from the suspicious transmitter to two monitors are discussed. In each case, a closed-form solution of the appropriate sending strategy is obtained, in which the physical meaning is also proposed. Then, for the imperfect CSI case, by employing the S-procedure method, we reformulate the robust beamforming design problem and solve it optimally. Finally, in the simulation results, the comparison between the cooperative monitoring scheme and the single monitoring scheme demonstrates that the proposed scheme is better in terms of eavesdropping rate. |
topic |
Cooperative monitoring relay jamming robust beamforming |
url |
https://ieeexplore.ieee.org/document/8665986/ |
work_keys_str_mv |
AT minzhu legitimatemonitoringviacooperativerelayandproactivejamming AT jianlinmo legitimatemonitoringviacooperativerelayandproactivejamming AT naixuexiong legitimatemonitoringviacooperativerelayandproactivejamming AT jinwang legitimatemonitoringviacooperativerelayandproactivejamming |
_version_ |
1721540472328945664 |