TY - JOUR
T1 - Relay-Assisted proactive eavesdropping with cooperative jamming and spoofing
AU - Moon, Jihwan
AU - Lee, Hoon
AU - Song, Changick
AU - Kang, Seowoo
AU - Lee, Inkyu
N1 - Funding Information:
Manuscript received November 8, 2017; revised April 23, 2018; accepted August 3, 2018. Date of publication August 21, 2018; date of current version October 9, 2018. This work was supported by the National Research Foundation through the Ministry of Science, ICT and Future Planning (MSIP), South Korean Government, under Grant 2017R1A2B3012316. The work of C. Song was supported by the Institute for Information and Communications Technology Promotion through the MSIP, South Korean Government (Cross Layer Design of Cryptography and Physical Layer Security for IoT Networks) under Grant 2016-0-00500. The associate editor coordinating the review of this paper and approving it for publication was S. Jin. (Corresponding author: Inkyu Lee.) J. Moon, S. Kang, and I. Lee are with the School of Electrical Engineering, Korea University, Seoul 02841, South Korea (e-mail: anschino@korea.ac.kr; kangsw1215@korea.ac.kr; inkyu@korea.ac.kr).
Publisher Copyright:
© 2018 IEEE.
PY - 2018/10
Y1 - 2018/10
N2 - In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer. Assuming an adaptive transmission policy at the suspicious users, the spoofing relays not only intercept but also forward the manipulated information to control the data rate of the suspicious users in collaboration with the jammer. We provide a technique which jointly optimizes the receive combining vector at the central monitor, the precoders at the relays, and the transmit covariance matrix at the jammer for maximizing the eavesdropping rate. To reveal some fundamental properties of the optimal operation, we first study a single-relay system. It is shown that when the central monitor experiences a poor eavesdropping channel link, the spoofing relay and the jammer should transmit destructive signals and jamming signals, respectively. In this case, the suspicious users are forced to decrease their data rate, while the intercepted information can be successfully decoded by the central monitor. On the other hand, when the eavesdropping channel condition is favorable, the spoofing relay forwards constructive signals to further increase the data rate at the suspicious users in a way that more information can be intercepted from the suspicious users. We then formulate a general eavesdropping rate maximization problem for multiple relays and present a semi-definite relaxation approach. A low-complexity design is also proposed based on our analysis for the single-relay system. Simulation results verify the efficiency of the proposed solutions compared to other baseline schemes in various practical setups.
AB - In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer. Assuming an adaptive transmission policy at the suspicious users, the spoofing relays not only intercept but also forward the manipulated information to control the data rate of the suspicious users in collaboration with the jammer. We provide a technique which jointly optimizes the receive combining vector at the central monitor, the precoders at the relays, and the transmit covariance matrix at the jammer for maximizing the eavesdropping rate. To reveal some fundamental properties of the optimal operation, we first study a single-relay system. It is shown that when the central monitor experiences a poor eavesdropping channel link, the spoofing relay and the jammer should transmit destructive signals and jamming signals, respectively. In this case, the suspicious users are forced to decrease their data rate, while the intercepted information can be successfully decoded by the central monitor. On the other hand, when the eavesdropping channel condition is favorable, the spoofing relay forwards constructive signals to further increase the data rate at the suspicious users in a way that more information can be intercepted from the suspicious users. We then formulate a general eavesdropping rate maximization problem for multiple relays and present a semi-definite relaxation approach. A low-complexity design is also proposed based on our analysis for the single-relay system. Simulation results verify the efficiency of the proposed solutions compared to other baseline schemes in various practical setups.
KW - Physical layer security
KW - cooperative jamming
KW - proactive eavesdropping
KW - spoofing
KW - wireless surveillance
UR - http://www.scopus.com/inward/record.url?scp=85052704209&partnerID=8YFLogxK
U2 - 10.1109/TWC.2018.2865305
DO - 10.1109/TWC.2018.2865305
M3 - Article
AN - SCOPUS:85052704209
SN - 1536-1276
VL - 17
SP - 6958
EP - 6971
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 10
M1 - 8443394
ER -