收稿日期: 2021-08-09
网络出版日期: 2022-02-21
基金资助
民用航天“十三五”预研项目(D010201);重庆市科技人才专项(cstc2019yszx-jcyjX0006)
Legitimate Eavesdropping Scheme for Suspicious Relay Communication Networks
Received date: 2021-08-09
Online published: 2022-02-21
Supported by
the Advanced Research Project of Civil Aerospace Technologies in 13th Five-Year Plan(D010201);the Special Foundation for Chongqing Science and Technology Talent(cstc2019yszx-jcyjX0006)
为了提高面向可疑中继网络的合法窃听性能,增强合法监测中心对通信网络的监管能力,针对由单根天线的可疑节点和多根天线的合法监听者组成的合法监听模型,提出了先窃听后干扰窃听(EJS)、两时隙持续窃听(CES)和先干扰后窃听(JES)3种窃听方案,推导了相应的可疑中断概率、窃听非中断概率和平均窃听速率的闭式表达式。特别地,在EJS和JES方案中,求解了最大化平均窃听速率的优化问题,给出了合法监听者采用单天线发射干扰信号的发射信噪比(SNR)的近似最优解表达式。结合前述3种方案的优势,在合法监听者与可疑节点之间的链路部分可用和全部可用的场景下,设计了基于最大化窃听非中断概率的最优窃听模式选择方案(OEMS),通过比较上述3种方案的窃听非中断概率,选择最高窃听非中断概率值对应的方案作为窃听手段,从而实现最佳的监听性能。仿真结果表明,在合法监听者更靠近可疑中继时,与EJS方案相比,CES和JES方案在低信噪比区域分别具有更高的窃听非中断概率和窃听速率,而且所提的OEMS能达到最优的窃听性能,同时具有更好的场景适应性。在同等条件下,与采用单天线的监听者相比,采用双天线的监听者具有如下优势:为实现持续监听,其干扰信号发射功率可降低15 dB左右;EJS和JES方案的平均窃听速率在低SNR区域最高可提升0.8 bits/(s·Hz)左右。因此,增加合法监听者的天线数量不仅能节省总的发射功耗,还可增强其监听能力。
吴皓威, 黄风娇, 闫莲, 等 . 面向可疑中继通信网络的合法窃听方案[J]. 华南理工大学学报(自然科学版), 2022 , 50(10) : 70 -79 . DOI: 10.12141/j.issn.1000-565X.210506
In order to improve the legal eavesdropping performance against the suspicious relay networks and enhance the monitoring ability of the legal monitoring center in communication networks, the study proposed an eavesdropping-then-jamming scheme (EJS), a two-slot continuous eavesdropping scheme (CES) and a jamming-then-eavesdropping scheme (JES) for a legal interception model consisting of suspicious nodes with a single antenna and legitimate listeners with multiple antennas, and derived the closed-form expressions, including the outage probabi-lity of suspicious communications, the non-outage probability of eavesdropping and the average eavesdropping rate of each scheme. In particular, for EJS and JES schemes, the optimization problem of maximizing the average eavesdropping rate was solved, and the approximate optimal solution expression of the transmitting signal-to-noise ratio (SNR) of the legitimate monitor with a single antenna was given. By integrating the advantages of the previous three schemes, the optimal-eavesdropping-mode selection scheme (OEMS) based on maximizing the non-outage probabi-lity of eavesdropping was designed in the scenario where part or all of the links between the legitimate surveillance and the suspicious nodes are available. Specifically, by comparing the non-outage probability of eavesdropping of the above three schemes, the scheme corresponding to the highest value was selected as the eavesdropping means. Simulation results show that when the legitimate monitor is closer to the suspicious relay, compared with the EJS, CES has higher non-outage probability of eavesdropping and JES has higher eavesdropping rate in low SNR areas. The proposed OEMS can achieve the optimal secrecy performance and has better adaptability for more scenes. Compared to the legitimate monitor with single antenna, the legitimate monitor with double antennas has more advantages as following: in order to achieve continuous monitoring, the transmitting power of interference signal can be reduced by about 15 dB; and the average eavesdropping rate of EJS scheme and JES scheme can be increased about 0.8 bits/(s·Hz) in low SNR region. Therefore, increasing the antenna number of legitimate monitor can not only save the power cost, but also enhance the monitoring ability.
| 1 | ZOU Y, ZHU J, WANG X,et al .A survey on wireless security:Technical challenges,recent advances,and future trends[J].Proceedings of the IEEE,2016,104(9):1727-1765. |
| 2 | XU J, DUAN L, ZHANG R .Surveillance and intervention of infrastructure-free mobile communications:A new wireless security paradigm[J].IEEE Wireless Communications,2017,24(4):152-159. |
| 3 | ZENG Y, ZHANG R .Wireless information surveillance via proactive eavesdropping with spoofing relay[J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1449-1461. |
| 4 | WYNER A D,The wire-tap channel[J].The Bell System Technical Journal,1975,54(8):1355-1387. |
| 5 | HU G, CAI Y .Proactive eavesdropping with masked power beacon for energy-constrained suspicious communication[J].IEEE Access,2019,7:139035-139046. |
| 6 | XU J, DUAN L, ZHANG R .Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels[J].IEEE Wireless Communications Letters,2016,5(1):80-83. |
| 7 | XU J, DUAN L, ZHANG R .Proactive eavesdropping via cognitive jamming in fading channels[J].IEEE Transactions on Wireless Communications,2017,16(5):2790-2806. |
| 8 | HAN Y, DUAN L, ZHANG R .Jamming-assisted eavesdropping over parallel fading channels[J].IEEE Transactions on Information Forensics and Security,2019,14(9):2486-2499. |
| 9 | ZHANG Y, JIANG X, ZHONG C,et al .Performance of proactive eavesdropping in dual-hop relaying systems[C]∥ Proceedings of IEEE Globecom Workshops.Singapore:IEEE,2017:1-6. |
| 10 | MA G, XU J, DUAN L,et al .Wireless surveillance of two-hop communications[C]∥ Proceedings of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).Sapporo:IEEE,2017:1-5. |
| 11 | HU G, CAI Y, OUYANG J .Proactive eavesdropping via jamming for multichannel decode-and-forward relay system[J].IEEE Communications Letters,2020,24(3):491-495. |
| 12 | HU G, OUYANG J, CAI Y,et al .Proactive eavesdropping in two-way amplify-and-forward relay networks[J].IEEE Systems Journal,2021,15(3):1-12. |
| 13 | HU D, ZHANG Q, YANG P,et al .Proactive monitoring via jamming in amplify-and-forward relay networks[J].IEEE Signal Processing Letters,2017,24(11):1714-1718. |
| 14 | YU B, YANG L, CHENG X,et al .Power and location optimization for full-duplex decode-and-forward relaying[J].IEEE Transactions on Communications,2015,63(12):4743-4753. |
| 15 | BANKEY V, UPADHYAY P K .Physical layer security of hybrid satellite terrestrial relay networks with multiple colluding eavesdroppers over non-identically distributed Nakagami-m fading channels[J].The Institution of Engineering and Technology Communications,2019,13(14):2115-2123. |
| 16 | YAN S, WANG X, LI Z,et al .Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks[J].China Communications,2019,16(12):154-164. |
| 17 | AN K, LIN M, LIANG T,et al .Secure transmission in multi-antenna hybrid satellite-terrestrial relay networks in the presence of eavesdropper[C]∥ Proceedings of 2015 International Conference on Wireless Communications & Signal Processing (WCSP).Nanjing:IEEE,2015:1-5. |
| 18 | GHORAISHI M, JIANG W, XIAO P .Subband approach for wideband self-interference cancellation in full-duplex transceiver[C]∥ Proceedings of 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).Dubrovnik:IEEE,2015:1139-1143. |
| 19 | LIANG D, XIAO P, CHEN G .Digital self-interference cancellation for full-duplex MIMO systems[C]∥ Proceedings of 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).Dubrovnik:IEEE,2015:403-407. |
| 20 | KOLODZIEJ K E, PERRY B T, HERD J S .In-band full-duplex technology:Techniques and systems survey[J].IEEE Transactions on Microwave Theory and Techniques,2019,67(7):3025-3041. |
| 21 | ABRAMOWITZ M, STEGUN I A .Handbook of mathematical functions with formulas,graphs,and mathematical tables[M].9th ed.New York,:Dover,1972. |
| 22 | SENARATNE D, TELLAMBURA C .Unified exact performance analysis of two-hop amplify-and-forward relaying in Nakagami fading[J].IEEE Transactions on Vehicular Technology,2010,59(3):1529-1534. |
| 23 | HUANG Q, LIN M, ZHU W,et al .Performance analysis of integrated satellite-terrestrial multiantenna relay networks with multiuser scheduling[J].IEEE Transactions on Aerospace and Electronic Systems,2020,56(4):2718-2731. |
| 24 | GRADSHTEYN I S, RYZHIK I M .Table of integrals,series,and products[M].7th ed.San Diego,CA:Academic,2007. |
| 25 | CORLESS R M, GONNET G H, HARE D E G,et al .On the Lambert W function[J].Advances in Computational Mathematics,1996(5):329-359. |
/
| 〈 |
|
〉 |