Skip to main content

Jamming-Assisted Proactive Eavesdropping in Decode-And-Forward Relaying Systems

  • Conference paper
  • First Online:
Advances in Wireless Communications and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 191))

Abstract

With the increasing threat of lawbreakers to public security, proactive eavesdropping and supervision begin to play an important role in the commercial and military fields. This paper proposes a proactive monitoring scheme for jamming first and then eavesdropping for suspicious communication in decode-and-forward (DF) relay network. After the suspicious user is jammed, in order to maintain a constant outage probability, it is forced to change the transmission rate of the suspicious users. By converting the relationship between the suspicious transmission rate and the jamming power, the expression of optimal suspicious communication rate that maximizes the average eavesdropping rate under certain limiting conditions is obtained; in that way, the expression of optimal jamming power is obtained. Comparing this optimal jamming scheme with passive eavesdropping and proactive eavesdropping under constant jamming power, both of the results of expression and simulation show that the average eavesdropping rate under this optimal scheme significantly outperforms the other two schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xu, J., Duan, L., Zhang, R.: Proactive eavesdropping via jamming for rate maximization over rayleigh fading channels. IEEE Wireless Commun. Lett. 5(1), 80–83 (2016)

    Article  Google Scholar 

  2. Ahmed, M., Tho, L.: Self-interference cancellation limits in full-duplex communication systems. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE Press, Washington, USA (2016)

    Google Scholar 

  3. Zhong, C., Jiang, X., Qu, F., Zhang, Z.: Multi-antenna wireless legitimate surveillance systems: design and performance analysis. IEEE Trans. Wireless Commun. 16(7), 4585–4599 (2017)

    Article  Google Scholar 

  4. Xu, J., Duan, L., Zhang, R.: Fundamental rate limits of physical layer spoofing. IEEE Wireless Commun. Lett. 6(2), 154–157 (2017)

    Article  Google Scholar 

  5. Jihwan, M., Hoon, L., Changick, S.: Relay-assisted proactive eavesdropping with cooperative jamming and spoofing. IEEE Trans. Wireless Commun. 17(10), 6958–6971 (2018)

    Article  Google Scholar 

  6. Zhang, Y., Jiang, X., Zhong, C., Zhang, Z.: Performance of proactive eavesdropping in dual-hop relaying systems. In: 2017 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. IEEE Press, Singapore (2017)

    Google Scholar 

  7. Ma, G., Xu, J., Duan, L., Zhang, R.: Wireless surveillance of two-hop communications. In: 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp. 1–5. IEEE Press, Sapporo, Japan (2017)

    Google Scholar 

  8. Hu, D., Zhang, Q., Yang, P., Qin, J.: Proactive monitoring via jamming in amplify-and-forward relay networks. IEEE Signal Process. Lett. 24(11), 1714–1718 (2017)

    Article  Google Scholar 

  9. Chen, Y., Huang, H., Lau, V.K.N.: Cooperative spectrum access for cognitive radio network employing rateless code. In: ICC Workshops-2008 IEEE International Conference on Communications Workshops (ICCW), pp. 326-331. IEEE Press, Beijing, China (2008)

    Google Scholar 

  10. Corless, R.M., Gonnet, G.H., Hare, D.E.G., Jeffrey, D.J., Knuth, D.E.: On the Lambert W function. Adv. Comput. Math. 5(4), 329–359 (1996)

    Google Scholar 

Download references

Acknowledgement

This paper was funded in part by the Natural Science Foundation of Fujian Province (2018J01096) and the Subsidized Project for Cultivating Postgraduates’ Innovative Ability in Scientific Research of Huaqiao University (18014082023).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yucheng He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, Y., He, Y., Zhang, L., Yang, J., Zhou, L. (2021). Jamming-Assisted Proactive Eavesdropping in Decode-And-Forward Relaying Systems. In: Kountchev, R., Mahanti, A., Chong, S., Patnaik, S., Favorskaya, M. (eds) Advances in Wireless Communications and Applications. Smart Innovation, Systems and Technologies, vol 191. Springer, Singapore. https://doi.org/10.1007/978-981-15-5879-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5879-5_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5878-8

  • Online ISBN: 978-981-15-5879-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics