Results 111 to 120 of about 4,330 (158)
Some of the next articles are maybe not open access.
Performance of Covert Surveillance via Proactive Eavesdropping
2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020Surveillance performance is studied in this paper for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN.
Shumin Tu +4 more
openaire +1 more source
Proactive Eavesdropping via Pilot Contamination and Jamming
Wireless Personal Communications, 2017Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot contamination is one effective technique in proactive eavesdropping, which spoofs the suspicious transmitter ...
Linqing Wan +3 more
openaire +1 more source
Proactive Eavesdropping in Underlaid D2D Communication Networks
2019 IEEE 14th Malaysia International Conference on Communication (MICC), 2019This paper considers the legitimate proactive eavesdropping in the underlaid device-to-device (D2D) communications networks. In such network, a dedicated node working in the full-duplex mode monitors a pair of suspicious D2D users, and transmits its own information to the base station at the same time.
Yingdong Hu +6 more
openaire +1 more source
Wireless Surveillance via Proactive Eavesdropping and Rotated Jamming
IEEE Transactions on Vehicular Technology, 2019In this paper, we consider a wireless surveillance system, where two single-antenna legitimate devices work cooperatively to monitor a suspicious link between a source (S) and a destination (D). A rotated-jamming based proactive eavesdropping scheme is proposed.
Hongbin Xu, Li Sun
openaire +1 more source
Air‐ground integrated assisted proactive eavesdropping
Internet Technology LettersAbstractBenefiting from the rapid development of unmanned aerial vehicle (UAV) technology, UAVs have also received extensive attention in the field of communication. In this letter, we investigate an air‐ground proactive eavesdropping system in which a legitimate ground eavesdropper can actively eavesdrop on suspected ground communication links with ...
Xianming Wang +4 more
openaire +1 more source
UAVs-Assisted Proactive Eavesdropping in AF Multi-Relay System
IEEE Communications Letters, 2020This letter studies the Unmanned Aerial Vehicles (UAVs)-assisted proactive eavesdropping in the suspicious amplify-and-forward multi-relay system, where the suspicious transmitter based on opportunistic relaying protocol selects one best suspicious relay to communicate with the suspicious destination.
Guojie Hu, Yueming Cai
openaire +1 more source
Proactive Eavesdropping via Jamming in Cognitive Radio Networks
2018 IEEE Global Communications Conference (GLOBECOM), 2018This paper considers a proactive eavesdropping problem, in which a full-duplex legitimate monitor aims to eavesdrop on a suspicious communication link between the secondary pairs in a cognitive radio (CR) network via jamming. For such a scenario, the jamming signals would not only disrupt the suspicious receivers, but also influences the interference ...
Pei Li +4 more
openaire +1 more source
Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems
IEEE Transactions on Vehicular Technology, 2019This paper considers a new wireless information surveillance scenario, where a legitimate monitor tries to eavesdrop on the suspicious messages sent by an unmanned aerial vehicle aided suspicious transmitter. By using the characteristic of the suspicious system, we propose an effective proactive jamming scheme to maximize the achievable eavesdropping ...
Haiquan Lu +4 more
openaire +1 more source
Deep Learning-Based Proactive Eavesdropping for Wireless Surveillance
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019In this work, we investigate a proactive eavesdropping system where a central monitor covertly wiretaps the communications between a pair of suspicious users via multiple intermediate nodes. For successful eavesdropping, it is required that the eavesdropping channel capacity is higher than the data rate of the suspicious users so that the central ...
Jihwan Moon +4 more
openaire +1 more source
Proactive Eavesdropping Over OFDM-Based Bidirectional Suspicious Communication Channels
IEEE Wireless Communications Letters, 2021In this letter, proactive eavesdropping of an orthogonal frequency division multiplexing (OFDM)-based bidirectional point-to-point suspicious communication link is studied. The problem of joint successive interference cancelation (SIC) decoding ordering and jamming power allocation at the monitor for maximizing the weighted sum eavesdropping rate is ...
openaire +1 more source

