LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Proactive Eavesdropping in Relaying Systems

Photo from academic.microsoft.com

This letter investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective… Click to show full abstract

This letter investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are proposed, where the legitimate monitor adaptively acts as an eavesdropper, a jammer, or a helper. In addition, the corresponding optimal jamming beamformer and jamming power are presented. Numerical results demonstrate that the proposed strategies attain better performance compared with intuitive benchmark schemes. Moreover, it is revealed that the position of the legitimate monitor plays an important role on the eavesdropping performance for the two strategies.

Keywords: relaying systems; legitimate monitor; eavesdropping relaying; performance; proactive eavesdropping

Journal Title: IEEE Signal Processing Letters
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.