Results 121 to 130 of about 4,330 (158)
Some of the next articles are maybe not open access.
Legitimate Eavesdropping with Wireless Powered Proactive Full-duplex Eavesdroppers
2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021In this paper, legitimate eavesdropping in a point-to-point suspicious communication network with multiple wireless powered full-duplex legitimate eavesdroppers is investigated. The eavesdroppers are assumed to adopt the power splitting technique to coordinate energy harvesting and information eavesdropping, and use the harvested energy to proactively ...
openaire +1 more source
Proactive Eavesdropping Via Jamming for Power-Limited UAV Communications
2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019Unmanned aerial vehicles (UAVs) have been used in legitimate surveillance systems to eavesdrop suspicious communications. In this paper, we consider an actual scenario that a UAV has limited power to eavesdrop suspicious communications of two UAVs. Based on this scenario, we formulate an optimization problem to maximize the effective eavesdropping rate
Mingzhu Zhang +3 more
openaire +1 more source
Cooperative Double-IRS Aided Proactive Eavesdropping
IEEE Transactions on Communications, 2022Yang Cao +3 more
openaire +1 more source
Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems
2017 IEEE Globecom Workshops (GC Wkshps), 2017This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the eavesdropping non-outage probability, three different eavesdropping modes are proposed, where the legitimate monitor can adaptively perform ...
Yuxiang Zhang +3 more
openaire +1 more source
Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing
IEEE Transactions on Wireless Communications, 2018In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer.
Jihwan Moon +4 more
openaire +2 more sources
Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks
IEEE Transactions on Vehicular Technology, 2020In this correspondence, legitimate surveillance of a downlink suspicious non-orthogonal multiple access (NOMA) network with multiple groups of suspicious users (SUs), in the presence of a full-duplex monitor equipped with a successive interference cancellation (SIC) decoder, is investigated.
openaire +1 more source
Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019This paper considers that a legitimate UAV tracks suspicious UAVs’ flight for preventing intended crimes and terror attacks. To enhance tracking accuracy, the legitimate UAV proactively eavesdrops suspicious UAVs’ communication via sending jamming signals.
Li, Kai +4 more
openaire +2 more sources
Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming
IEEE Transactions on Wireless Communications, 2018In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the ...
Jihwan Moon +4 more
openaire +2 more sources
Proactive Eavesdropping of Two Suspicious Communication Links via Jamming
ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019This paper studies a new and challenging wireless surveillance problem where a legitimate monitor (e.g., the National Security Agency in the USA) attempts to eavesdrop more than one suspicious communication links simultaneously to maximally protect public security.
Haiyang Zhang, Lingjie Duan, Rui Zhang
openaire +1 more source
Proactive eavesdropping of wireless powered suspicious interference networks
Science China Information Sciences, 2021Ding Xu, Hongbo Zhu
openaire +1 more source

