Results 121 to 130 of about 4,330 (158)
Some of the next articles are maybe not open access.

Legitimate Eavesdropping with Wireless Powered Proactive Full-duplex Eavesdroppers

2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021
In this paper, legitimate eavesdropping in a point-to-point suspicious communication network with multiple wireless powered full-duplex legitimate eavesdroppers is investigated. The eavesdroppers are assumed to adopt the power splitting technique to coordinate energy harvesting and information eavesdropping, and use the harvested energy to proactively ...
openaire   +1 more source

Proactive Eavesdropping Via Jamming for Power-Limited UAV Communications

2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019
Unmanned aerial vehicles (UAVs) have been used in legitimate surveillance systems to eavesdrop suspicious communications. In this paper, we consider an actual scenario that a UAV has limited power to eavesdrop suspicious communications of two UAVs. Based on this scenario, we formulate an optimization problem to maximize the effective eavesdropping rate
Mingzhu Zhang   +3 more
openaire   +1 more source

Cooperative Double-IRS Aided Proactive Eavesdropping

IEEE Transactions on Communications, 2022
Yang Cao   +3 more
openaire   +1 more source

Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems

2017 IEEE Globecom Workshops (GC Wkshps), 2017
This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the eavesdropping non-outage probability, three different eavesdropping modes are proposed, where the legitimate monitor can adaptively perform ...
Yuxiang Zhang   +3 more
openaire   +1 more source

Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing

IEEE Transactions on Wireless Communications, 2018
In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer.
Jihwan Moon   +4 more
openaire   +2 more sources

Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks

IEEE Transactions on Vehicular Technology, 2020
In this correspondence, legitimate surveillance of a downlink suspicious non-orthogonal multiple access (NOMA) network with multiple groups of suspicious users (SUs), in the presence of a full-duplex monitor equipped with a successive interference cancellation (SIC) decoder, is investigated.
openaire   +1 more source

Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs

2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019
This paper considers that a legitimate UAV tracks suspicious UAVs’ flight for preventing intended crimes and terror attacks. To enhance tracking accuracy, the legitimate UAV proactively eavesdrops suspicious UAVs’ communication via sending jamming signals.
Li, Kai   +4 more
openaire   +2 more sources

Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming

IEEE Transactions on Wireless Communications, 2018
In this paper, we consider a proactive eavesdropping scenario, where a central monitor tries to intercept the information exchanged between a pair of suspicious entities through amplify-and-forward full-duplex relays and a cooperative jammer. Specifically, the eavesdropping relays simultaneously listen to the suspicious transmitter and forward the ...
Jihwan Moon   +4 more
openaire   +2 more sources

Proactive Eavesdropping of Two Suspicious Communication Links via Jamming

ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor (e.g., the National Security Agency in the USA) attempts to eavesdrop more than one suspicious communication links simultaneously to maximally protect public security.
Haiyang Zhang, Lingjie Duan, Rui Zhang
openaire   +1 more source

Proactive eavesdropping of wireless powered suspicious interference networks

Science China Information Sciences, 2021
Ding Xu, Hongbo Zhu
openaire   +1 more source

Home - About - Disclaimer - Privacy