Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities [PDF]
Integrated sensing and communication (ISAC) has attracted extensive attention as a key technology to improve spectrum utilization and system performance for future wireless sensor networks.
Tingyue Xue +5 more
doaj +3 more sources
Proactive Eavesdropping via Jamming over HARQ-Based Communications
This paper studies the wireless surveillance of a hybrid automatic repeat request (HARQ) based suspicious communication link over Rayleigh fading channels.
Duan, Lingjie +3 more
core +2 more sources
Soft actor-critic algorithm and improved GNN model in secure access control of disaggregated optical networks [PDF]
To address the challenges of coordinated defense amid dynamic topology evolution and multidimensional security threats in decomposed optical networks, this study introduces the Graph-Entangled Security Actor-Critic (GESAC) model.
Zhenqian Zhao, Yuhe Wang
doaj +2 more sources
Robust proactive eavesdropping in UAV-enabled wireless communication networking [PDF]
In this paper, we considered a robust beamforming design problem for a proactive eavesdropping via jamming, in which a full-duplex legitimate monitor tries to eavesdrop on a suspicious communication link between the secondary pairs in an unmanned aerial ...
Wei Wu +3 more
doaj +2 more sources
Proactive Eavesdropping in Relaying Systems [PDF]
This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are proposed, where the legitimate monitor adaptively acts as an eavesdropper, a jammer or a helper ...
Jiang, Xin +4 more
openaire +2 more sources
Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty [PDF]
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious user’s link with artificial noise (AN) assistance. Different from the existing works, the suspicious receiver is assumed to be capable of detecting the presence of AN.
Zihao Cheng +7 more
openaire +1 more source
Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links [PDF]
This paper studies a new and challenging wireless surveillance problem where a legitimate monitor attempts to eavesdrop two suspicious communication links simultaneously. To facilitate concurrent eavesdropping, our multi-antenna legitimate monitor employs a proactive eavesdropping via jamming approach, by selectively jamming suspicious receivers to ...
Haiyang Zhang, Lingjie Duan, Rui Zhang
openaire +2 more sources
Proactive eavesdropping via cognitive jamming in fading channels [PDF]
To enhance the national security, there is a growing need for government agencies to legitimately monitor suspicious communication links for preventing intended crimes and terror attacks. In this paper, we propose a new wireless information surveillance paradigm by investigating a scenario where a legitimate monitor aims to intercept a suspicious ...
Jie Xu, Lingjie Duan, Rui Zhang
openaire +2 more sources
IRS Backscatter‐Assisted Security Transmission against Proactive Eavesdropping
In this paper, we consider the IRS backscatter‐assisted physical layer security, aimed at countering smart eavesdroppers capable of sending jamming signals. Specifically, the eavesdropper increases the eavesdropping rate by sending jamming signals and is able to adjust the transmission strategy according to the received beamforming.
openaire +1 more source
Proactive attack: A strategy for legitimate eavesdropping
In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor can act as a jamming source and a decode-and-forward relay station that can force the suspicious users to reveal their exchanged messages.
Tran, Hung, Zepernick, Hans-Jurgen
openaire +3 more sources

