On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems

Abstract

This paper considers a multi-relay legitimate surveillance system, where a suspicious link may transmit illegal information with the help of relays and a legitimate monitor aims at intercepting the information. We assume that the relay selection method is adopted by the suspicious link to improve the efficiency of the information transmission. We propose anti-relay-selection (ARS) jamming strategies for two different information transmission scenarios, namely the event-based information and content-based information. Beamforming vector of jamming is optimized and the iterative algorithms are used to improve the jamming efficiency. We demonstrate the effectiveness and the superiority of the ARS jamming strategies through numerical results and simulations.

This is a preview of subscription content, access via your institution.

References

  1. 1

    Andrews J G, Buzzi S, Choi W, et al. What will 5G be? IEEE J Sel Areas Commun, 2014, 32: 1065–1082

    Article  Google Scholar 

  2. 2

    Zhang S B, Hu Y D, Zhang L, et al. Novel spectrum sensing and access in cognitive radio networks. Sci China Inf Sci, 2018, 61: 089302

    MathSciNet  Article  Google Scholar 

  3. 3

    Zou Y L, Zhu J, Wang X B, et al. A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE, 2016, 104: 1727–1765

    Article  Google Scholar 

  4. 4

    Yang N, Wang L F, Geraci G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20–27

    Article  Google Scholar 

  5. 5

    Zhou X Y, Zhang Y, Song L Y. Physical Layer Security in Wireless Communications. Boca Raton: CRC Press, 2016

    Google Scholar 

  6. 6

    Wang J B, Wu Y L, Yen N, et al. Big data analytics for emergency communication networks: a survey. IEEE Commun Surv Tut, 2016, 18: 1758–1778

    Article  Google Scholar 

  7. 7

    Xu J, Duan L J, Zhang R. Surveillance and intervention of infrastructure-free mobile communications: a new wireless security paradigm. IEEE Wirel Commun, 2017, 24: 152–159

    Article  Google Scholar 

  8. 8

    Xu J, Duan L J, Zhang R. Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels. IEEE Wirel Commun Lett, 2016, 5: 80–83

    Article  Google Scholar 

  9. 9

    Zeng Y, Zhang R. Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J Sel Top Signal Process, 2016, 10: 1449–1461

    Article  Google Scholar 

  10. 10

    Xu J, Duan L J, Zhang R. Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans Wirel Commun, 2017, 16: 2790–2806

    Article  Google Scholar 

  11. 11

    Zhong C J, Jiang X, Qu F Z, et al. Multi-antenna wireless legitimate surveillance systems: design and performance analysis. IEEE Trans Wirel Commun, 2017, 16: 4585–4599

    Article  Google Scholar 

  12. 12

    Li B G, Yao Y B, Chen H, et al. Wireless information surveillance and intervention over multiple suspicious links. IEEE Signal Process Lett, 2018, 25: 1131–1135

    Article  Google Scholar 

  13. 13

    Xing C W, Ma Y, Zhou Y Q, et al. Transceiver optimization for multi-hop communications with per-antenna power constraints. IEEE Trans Signal Process, 2016, 64: 1519–1534

    MathSciNet  Article  Google Scholar 

  14. 14

    Zhou Y Q, Liu H, Pan Z G, et al. Energy-efficient two-stage cooperative multicast: effect of user density. IEEE Trans Veh Technol, 2016, 65: 7297–7307

    Article  Google Scholar 

  15. 15

    Jiang X, Lin H, Zhong C J, et al. Proactive eavesdropping in relaying systems. IEEE Signal Process Lett, 2017, 24: 917–921

    Article  Google Scholar 

  16. 16

    Zhang Y X, Jiang X, Zhong C J, et al. Performance of proactive eavesdropping in dual-hop relaying systems. In: Proceedings of 2017 IEEE Globecom Workshops (GC Wkshps), Singapore, 2017. 1–6

    Google Scholar 

  17. 17

    Hu D K, Zhang Q, Yang P, et al. Proactive monitoring via jamming in amplify-and-forward relay networks. IEEE Signal Process Lett, 2017, 24: 1714–1718

    Article  Google Scholar 

  18. 18

    Wang L, Cai Y M, Zou Y L, et al. Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Trans Veh Technol, 2016, 65: 6259–6274

    Article  Google Scholar 

  19. 19

    Zhong B, Wu M G, Li T, et al. Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channels. Sci China Inf Sci, 2016, 59: 062305

    Article  Google Scholar 

  20. 20

    Zhao R, Lin H X, He Y C, et al. Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection. Sci China Inf Sci, 2017, 60: 069303

    Article  Google Scholar 

  21. 21

    Boyd S, Vandenberghe L. Convex Optimization. Cambridge: Cambridge University Press, 2004

    Google Scholar 

  22. 22

    Grant M, Boyd S, Ye Y. CVX: Matlab software for disciplined convex programming. 2008. http://cvxr.com/cvx/

    Google Scholar 

  23. 23

    Zhu H L, Wang J Z. Chunk-based resource allocation in OFDMA systems - part I: chunk allocation. IEEE Trans Commun, 2009, 57: 2734–2744

    Article  Google Scholar 

  24. 24

    Zhu H L, Wang J Z. Chunk-based resource allocation in OFDMA systems-part II: joint chunk, power and bit allocation. IEEE Trans Commun, 2012, 60: 499–509

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61871241, 61771263, 61801248) and Nature Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 18KJB510036).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Shibing Zhang.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Hu, Y., Gao, R., Li, Y. et al. On proactive eavesdropping using anti-relay-selection jamming in multi-relay communication systems. Sci. China Inf. Sci. 62, 42304 (2019). https://doi.org/10.1007/s11432-018-9660-0

Download citation

Keywords

  • physical layer security
  • proactive eavesdropping
  • anti-relay-selection jamming
  • multi-relay
  • beamforming