Proactive Eavesdropping via Cognitive Jamming in Fading Channels
- 17 March 2017
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Wireless Communications
- Vol. 16 (5), 2790-2806
- https://doi.org/10.1109/twc.2017.2666138
Abstract
To enhance the national security, there is a growing need for authorized parties to legitimately monitor suspicious communication links for preventing intended crimes and terror attacks. In this paper, we propose a new wireless information surveillance paradigm by investigating a scenario, where a legitimate monitor aims to intercept a suspicious wireless link over fading channels. The legitimate monitor can successfully eavesdrop (decode) the information of the suspicious link at each fading state only when its achievable data rate is no smaller than that at the suspicious receiver. We propose a new approach, namely, proactive eavesdropping via cognitive jamming, in which the legitimate monitor purposely jams the receiver in a full-duplex mode so as to change the suspicious communication (e.g., to a smaller data rate) for overhearing more efficiently. By assuming perfect self-interference cancelation (SIC) and global channel state information (CSI) at the legitimate monitor, we characterize the fundamental information-theoretic limits of proactive eavesdropping. We consider both delay-sensitive and delay-tolerant applications for the suspicious communication, under which the legitimate monitor maximizes the eavesdropping non-outage probability (for event-based monitoring) and the relative eavesdropping rate (for content analysis), respectively, by optimizing the jamming power allocation over different fading states subject to an average power constraint. Numerical results show that the proposed proactive eavesdropping via cognitive jamming approach greatly outperforms other benchmark schemes. Furthermore, by extending to a more practical scenario with residual SI and local CSI, we design an efficient online cognitive jamming scheme inspired by the optimal cognitive jamming with perfect SIC and global CSI.Keywords
Funding Information
- Singapore Ministry of Education Academic Research Fund Tier 2 (MOE2016-T2-1-173)
- SUTD-ZJU Joint Collaboration (SUTDZJU/ RES/03/2014)
- Seed Research Programme under Temasek Laboratories at SUTD (IGDS S16 03 04 1)
This publication has 35 references indexed in Scilit:
- Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacksIEEE Communications Magazine, 2015
- Disrupting MIMO Communications With Optimal Jamming Signal DesignIEEE Transactions on Wireless Communications, 2015
- An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna SystemsIEEE Transactions on Information Forensics and Security, 2015
- Cognitive Transmit Beamforming From Binary CSITIEEE Transactions on Wireless Communications, 2014
- Energy Beamforming With One-Bit FeedbackIEEE Transactions on Signal Processing, 2014
- In-Band Full-Duplex Wireless: Challenges and OpportunitiesIEEE Journal on Selected Areas in Communications, 2014
- Full duplex radiosPublished by Association for Computing Machinery (ACM) ,2013
- Correlated Jamming on MIMO Gaussian Fading ChannelsIEEE Transactions on Information Theory, 2004
- Capacity of fading channels with channel side informationIEEE Transactions on Information Theory, 1997
- The Wire-Tap ChannelBell System Technical Journal, 1975