Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring

In this paper, we investigate the optimization of the monitoring rate for a suspicious multicast communication network with a legitimate full-duplex (FD) monitor, where the FD monitor is proactive to jam suspicious receivers and eavesdrop from the suspicious transmitter simultaneously. To effectivel...

Full description

Bibliographic Details
Main Authors: Dongsheng Liu, Sai Zhao, Quanzhong Li, Jiayin Qin
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2020/7847623
id doaj-dacdf95f3cf340f1b1976780950577ff
record_format Article
spelling doaj-dacdf95f3cf340f1b1976780950577ff2021-07-02T14:16:09ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2020-01-01202010.1155/2020/78476237847623Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive MonitoringDongsheng Liu0Sai Zhao1Quanzhong Li2Jiayin Qin3School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, Guangdong, ChinaSchool of Mechanical and Electrical Engineering, Guangzhou University, Guangzhou 510006, Guangdong, ChinaSchool of Data and Computer Science, Sun Yat-sen University, Guangzhou 510006, Guangdong, ChinaSchool of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, Guangdong, ChinaIn this paper, we investigate the optimization of the monitoring rate for a suspicious multicast communication network with a legitimate full-duplex (FD) monitor, where the FD monitor is proactive to jam suspicious receivers and eavesdrop from the suspicious transmitter simultaneously. To effectively monitor the suspicious communication over multicast networks, we maximize the monitoring rate under the outage probability constraint of the suspicious multicast communication network and the jamming power constraint at the FD monitor. The formulated optimization problem is nonconvex, and its global optimal solution is hard to obtain. Thus, we propose a constrained concave convex procedure- (CCCP-) based iterative algorithm, which is able to achieve a local optimal solution. Simulation results demonstrate that the proposed proactive eavesdropping scheme with optimal jamming power outperforms the conventional passive eavesdropping scheme.http://dx.doi.org/10.1155/2020/7847623
collection DOAJ
language English
format Article
sources DOAJ
author Dongsheng Liu
Sai Zhao
Quanzhong Li
Jiayin Qin
spellingShingle Dongsheng Liu
Sai Zhao
Quanzhong Li
Jiayin Qin
Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
Mobile Information Systems
author_facet Dongsheng Liu
Sai Zhao
Quanzhong Li
Jiayin Qin
author_sort Dongsheng Liu
title Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
title_short Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
title_full Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
title_fullStr Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
title_full_unstemmed Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring
title_sort rate maximization for suspicious multicast communication networks with full-duplex proactive monitoring
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2020-01-01
description In this paper, we investigate the optimization of the monitoring rate for a suspicious multicast communication network with a legitimate full-duplex (FD) monitor, where the FD monitor is proactive to jam suspicious receivers and eavesdrop from the suspicious transmitter simultaneously. To effectively monitor the suspicious communication over multicast networks, we maximize the monitoring rate under the outage probability constraint of the suspicious multicast communication network and the jamming power constraint at the FD monitor. The formulated optimization problem is nonconvex, and its global optimal solution is hard to obtain. Thus, we propose a constrained concave convex procedure- (CCCP-) based iterative algorithm, which is able to achieve a local optimal solution. Simulation results demonstrate that the proposed proactive eavesdropping scheme with optimal jamming power outperforms the conventional passive eavesdropping scheme.
url http://dx.doi.org/10.1155/2020/7847623
work_keys_str_mv AT dongshengliu ratemaximizationforsuspiciousmulticastcommunicationnetworkswithfullduplexproactivemonitoring
AT saizhao ratemaximizationforsuspiciousmulticastcommunicationnetworkswithfullduplexproactivemonitoring
AT quanzhongli ratemaximizationforsuspiciousmulticastcommunicationnetworkswithfullduplexproactivemonitoring
AT jiayinqin ratemaximizationforsuspiciousmulticastcommunicationnetworkswithfullduplexproactivemonitoring
_version_ 1721328221933273088