Articles with "proactive eavesdropping" as a keyword



Photo by bradencollum from unsplash

Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3033881

Abstract: This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon… read more here.

Keywords: optimization; relay; proactive eavesdropping; power location ... See more keywords
Photo by jontyson from unsplash

Wireless Information Surveillance Over Multiple Time Slots

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2021.3122821

Abstract: Proactive eavesdropping via joint jamming and relaying has been proposed to improve the legitimate surveillance performance. However, how will it perform over multiple time slots compared to proactive eavesdropping via jamming remains unknown. To answer… read more here.

Keywords: eavesdropping via; proactive eavesdropping; time slots; multiple time ... See more keywords
Photo from academic.microsoft.com

Proactive Eavesdropping in Relaying Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2017.2696305

Abstract: This letter investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are… read more here.

Keywords: relaying systems; legitimate monitor; eavesdropping relaying; performance ... See more keywords
Photo by acfb5071 from unsplash

Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3150244

Abstract: This letter studies proactive eavesdropping with one legitimate monitor (E) in the classical single-hop suspicious communication. Specifically, unlike all previous works that ignored the suspicious channel training phase and just considered the jamming power optimization… read more here.

Keywords: power allocation; proactive eavesdropping; eavesdropping jamming; power ... See more keywords
Photo by osheen_ from unsplash

Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3156402

Abstract: We investigate proactive eavesdropping with one half-duplex legitimate monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious relaying systems, which consist of a suspicious transmitter (ST), a suspicious UAV-based relay (SU) and a suspicious destination (SD).… read more here.

Keywords: relaying systems; eavesdropping via; proactive eavesdropping; via jamming ... See more keywords
Photo from wikipedia

Cooperative Proactive Eavesdropping Based on Deep Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3084213

Abstract: There is illegitimate transmission of information between suspicious users, whereas single legitimate monitor (LM) has finite capacity to satisfy eavesdropping. This letter studies a cooperative proactive eavesdropping(CPE) scheme, where two LMs eavesdrop on multiple suspicious… read more here.

Keywords: eavesdropping; proactive eavesdropping; cooperative proactive; based deep ... See more keywords
Photo by poseidonx from unsplash

Proactive Eavesdropping via Jamming in UAV-Enabled Suspicious Multiuser Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3109037

Abstract: This letter studies the proactive eavesdropping with one full-duplex monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious multiuser communications, which include downlink broadcasting (DB) and uplink multiple access (UMA). Under this setup, E aims to… read more here.

Keywords: suspicious multiuser; proactive eavesdropping; multiuser communications; enabled suspicious ... See more keywords
Photo by pmpietsch from unsplash

Cooperative Double-IRS Aided Proactive Eavesdropping

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2022.3192892

Abstract: Proactive eavesdropping was used recently to efficiently intercept a suspicious wireless communication link, by jamming the suspicious destination node. However, While jamming helps weaken the suspicious link, it does not improve the eavesdropping channel from… read more here.

Keywords: aided proactive; irs aided; proactive eavesdropping; cooperative double ... See more keywords
Photo by headwayio from unsplash

Unsuspicious User Enabled Proactive Eavesdropping in Interference Networks Using Improper Gaussian Signaling

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2023.3253688

Abstract: Proactive eavesdropping is an effective approach to improve the performance of wireless information surveillance, where suspicious users are legitimately eavesdropped by authorized monitors. For the situation when no monitor is available, we propose to authorize… read more here.

Keywords: communication; improper gaussian; interference; proactive eavesdropping ... See more keywords
Photo by henrylim from unsplash

Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3236186

Abstract: Proactive eavesdropping is an effective approach to legitimately surveil the suspicious communications. Current studies all considered that physical layer security (PLS) techniques such as the wiretap coding are not applied by the suspicious users (SUs)… read more here.

Keywords: layer security; suspicious communications; physical layer; fading channels ... See more keywords
Photo from wikipedia

Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2020.3021953

Abstract: In this correspondence, legitimate surveillance of a downlink suspicious non-orthogonal multiple access (NOMA) network with multiple groups of suspicious users (SUs), in the presence of a full-duplex monitor equipped with a successive interference cancellation (SIC)… read more here.

Keywords: suspicious non; proactive eavesdropping; multiple access; non orthogonal ... See more keywords