Articles with "eavesdropping" as a keyword



Photo by theblowup from unsplash

Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2837059

Abstract: In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general… read more here.

Keywords: system; problem; wireless; eavesdropping ... See more keywords
Photo from wikipedia

Cooperative Proactive Eavesdropping Based on Deep Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3084213

Abstract: There is illegitimate transmission of information between suspicious users, whereas single legitimate monitor (LM) has finite capacity to satisfy eavesdropping. This letter studies a cooperative proactive eavesdropping(CPE) scheme, where two LMs eavesdrop on multiple suspicious… read more here.

Keywords: eavesdropping; proactive eavesdropping; cooperative proactive; based deep ... See more keywords
Photo by pmpietsch from unsplash

Cooperative Double-IRS Aided Proactive Eavesdropping

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2022.3192892

Abstract: Proactive eavesdropping was used recently to efficiently intercept a suspicious wireless communication link, by jamming the suspicious destination node. However, While jamming helps weaken the suspicious link, it does not improve the eavesdropping channel from… read more here.

Keywords: aided proactive; irs aided; proactive eavesdropping; cooperative double ... See more keywords
Photo by hyneseyes from unsplash

Maxmin Fairness for UAV-Enabled Proactive Eavesdropping With Jamming Over Distributed Transmit Beamforming-Based Suspicious Communications

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2023.3237258

Abstract: Unmanned aerial vehicle (UAV) plays an important role in wireless communication systems, due to the additional degree of freedom realized from its flexible deployment. Driven by this advantage and considering the security issue, this paper… read more here.

Keywords: suspicious communications; distributed transmit; transmit beamforming; eavesdropping ... See more keywords
Photo by headwayio from unsplash

Unsuspicious User Enabled Proactive Eavesdropping in Interference Networks Using Improper Gaussian Signaling

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2023.3253688

Abstract: Proactive eavesdropping is an effective approach to improve the performance of wireless information surveillance, where suspicious users are legitimately eavesdropped by authorized monitors. For the situation when no monitor is available, we propose to authorize… read more here.

Keywords: communication; improper gaussian; interference; proactive eavesdropping ... See more keywords
Photo from wikipedia

Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2018.2880768

Abstract: This paper studies the wireless surveillance of multiple suspicious communication links. We propose a cooperative eavesdropping scheme, where a primary legitimate monitor and an assistant legitimate monitor cooperatively jam the suspicious links for an effective… read more here.

Keywords: cooperative eavesdropping; eavesdropping; communication links; multiple suspicious ... See more keywords
Photo by timothybuck from unsplash

Robust proactive eavesdropping in UAV-enabled wireless communication networking

Sign Up to like & get
recommendations!
Published in 2019 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-019-1599-6

Abstract: In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in… read more here.

Keywords: enabled wireless; uav enabled; proactive eavesdropping; wireless communication ... See more keywords