Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2837059
Abstract: In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general…
read more here.
Keywords:
system;
problem;
wireless;
eavesdropping ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3084213
Abstract: There is illegitimate transmission of information between suspicious users, whereas single legitimate monitor (LM) has finite capacity to satisfy eavesdropping. This letter studies a cooperative proactive eavesdropping(CPE) scheme, where two LMs eavesdrop on multiple suspicious…
read more here.
Keywords:
eavesdropping;
proactive eavesdropping;
cooperative proactive;
based deep ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2022.3192892
Abstract: Proactive eavesdropping was used recently to efficiently intercept a suspicious wireless communication link, by jamming the suspicious destination node. However, While jamming helps weaken the suspicious link, it does not improve the eavesdropping channel from…
read more here.
Keywords:
aided proactive;
irs aided;
proactive eavesdropping;
cooperative double ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2023.3237258
Abstract: Unmanned aerial vehicle (UAV) plays an important role in wireless communication systems, due to the additional degree of freedom realized from its flexible deployment. Driven by this advantage and considering the security issue, this paper…
read more here.
Keywords:
suspicious communications;
distributed transmit;
transmit beamforming;
eavesdropping ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2023.3253688
Abstract: Proactive eavesdropping is an effective approach to improve the performance of wireless information surveillance, where suspicious users are legitimately eavesdropped by authorized monitors. For the situation when no monitor is available, we propose to authorize…
read more here.
Keywords:
communication;
improper gaussian;
interference;
proactive eavesdropping ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2018.2880768
Abstract: This paper studies the wireless surveillance of multiple suspicious communication links. We propose a cooperative eavesdropping scheme, where a primary legitimate monitor and an assistant legitimate monitor cooperatively jam the suspicious links for an effective…
read more here.
Keywords:
cooperative eavesdropping;
eavesdropping;
communication links;
multiple suspicious ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "EURASIP Journal on Wireless Communications and Networking"
DOI: 10.1186/s13638-019-1599-6
Abstract: In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in…
read more here.
Keywords:
enabled wireless;
uav enabled;
proactive eavesdropping;
wireless communication ... See more keywords