Results 11 to 20 of about 4,330 (158)

Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities [PDF]

open access: yesSensors
Integrated sensing and communication (ISAC) has attracted extensive attention as a key technology to improve spectrum utilization and system performance for future wireless sensor networks.
Tingyue Xue   +5 more
doaj   +3 more sources

Proactive Eavesdropping via Jamming over HARQ-Based Communications

open access: yesGLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017
This paper studies the wireless surveillance of a hybrid automatic repeat request (HARQ) based suspicious communication link over Rayleigh fading channels.
Duan, Lingjie   +3 more
core   +2 more sources

Soft actor-critic algorithm and improved GNN model in secure access control of disaggregated optical networks [PDF]

open access: yesScientific Reports
To address the challenges of coordinated defense amid dynamic topology evolution and multidimensional security threats in decomposed optical networks, this study introduces the Graph-Entangled Security Actor-Critic (GESAC) model.
Zhenqian Zhao, Yuhe Wang
doaj   +2 more sources

Robust proactive eavesdropping in UAV-enabled wireless communication networking [PDF]

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial ...
Wei Wu   +3 more
doaj   +2 more sources

Proactive Eavesdropping in Relaying Systems [PDF]

open access: yesIEEE Signal Processing Letters, 2017
This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are proposed, where the legitimate monitor adaptively acts as an eavesdropper, a jammer or a helper ...
Jiang, Xin   +4 more
openaire   +2 more sources

Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty [PDF]

open access: yesIEEE Transactions on Communications, 2021
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user’s link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN.
Zihao Cheng   +7 more
openaire   +1 more source

Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2020
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor attempts to eavesdrop two suspicious communication links simultaneously. To facilitate concurrent eavesdropping, our multi-antenna legitimate monitor employs a proactive eavesdropping via jamming approach, by selectively jamming suspicious receivers to ...
Haiyang Zhang, Lingjie Duan, Rui Zhang
openaire   +2 more sources

Proactive eavesdropping via cognitive jamming in fading channels [PDF]

open access: yes2016 IEEE International Conference on Communications (ICC), 2016
To enhance the national security, there is a growing need for government agencies to legitimately monitor suspicious communication links for preventing intended crimes and terror attacks. In this paper, we propose a new wireless information surveillance paradigm by investigating a scenario where a legitimate monitor aims to intercept a suspicious ...
Jie Xu, Lingjie Duan, Rui Zhang
openaire   +2 more sources

IRS Backscatter‐Assisted Security Transmission against Proactive Eavesdropping

open access: yesWireless Communications and Mobile Computing, 2022
In this paper, we consider the IRS backscatter‐assisted physical layer security, aimed at countering smart eavesdroppers capable of sending jamming signals. Specifically, the eavesdropper increases the eavesdropping rate by sending jamming signals and is able to adjust the transmission strategy according to the received beamforming.
openaire   +1 more source

Proactive attack: A strategy for legitimate eavesdropping

open access: yes2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), 2016
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor can act as a jamming source and a decode-and-forward relay station that can force the suspicious users to reveal their exchanged messages.
Tran, Hung, Zepernick, Hans-Jurgen
openaire   +3 more sources

Home - About - Disclaimer - Privacy