Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers

  • Qun Li
  • Ding XuEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 313)


This paper considers a suspicious communication network with multiple suspicious source-destination nodes and multiple wireless powered legitimate eavesdroppers, where the legitimate eavesdroppers are assumed to be collusive or non-collusive. A minimum harvested energy constraint is applied at each eavesdropper such that each eavesdropper must harvest a minimum required energy. The legitimate eavesdropping in such a scenario is investigated and our aim is to maximize the average successful eavesdropping probability by optimizing the power splitting ratio at each eavesdropper under the minimum harvested energy constraint. The optimal algorithm is proposed to solve the optimization problem for both collusive eavesdroppers and non-collusive eavesdroppers. Simulation results show that the proposed algorithm achieves the upper bound of the successful eavesdropping probability when the energy harvesting efficiency is large, the required minimum harvested energy is small, or the transmit power of the suspicious source node is high.


Legitimate eavesdropping Wireless powered communication Successful eavesdropping probability Collusive eavesdroppers Non-collusiveeavesdroppers 


  1. 1.
    Xu, J., Duan, L., Zhang, R.: Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans. Wirel. Commun. 16(5), 2790–2806 (2017)CrossRefGoogle Scholar
  2. 2.
    Zhong, C., Jiang, X., Qu, F., Zhang, Z.: Multi-antenna wireless legitimate surveillance systems: design and performance analysis. IEEE Trans. Wirel. Commun. 16(7), 4585–4599 (2017)CrossRefGoogle Scholar
  3. 3.
    Hu, D., Zhang, Q., Yang, P., Qin, J.: Proactive monitoring via jamming in amplify-and-forward relay networks. IEEE Signal Process. Lett. 24(11), 1714–1718 (2017)CrossRefGoogle Scholar
  4. 4.
    Xu, J., Li, K., Duan, L., Zhang, R.: Proactive eavesdropping via jamming over HARQ-based communications. In: Proceedings of the IEEE Global Communications Conference, pp. 1–6 (2017)Google Scholar
  5. 5.
    Li, B., Yao, Y., Zhang, H., Lv, Y., Zhao, W.: Energy efficiency of proactive eavesdropping for multiple links wireless system. IEEE Access 6, 26081–26090 (2018)CrossRefGoogle Scholar
  6. 6.
    Xu, D., Li, Q.: Proactive eavesdropping through a third-party jammer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101(5), 878–882 (2018)CrossRefGoogle Scholar
  7. 7.
    Zeng, Y., Zhang, R.: Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J. Sel. Top. Sign. Process. 10(8), 1449–1461 (2016)CrossRefGoogle Scholar
  8. 8.
    Xu, D., Li, Q.: Resource allocation for secure communications in cooperative cognitive wireless powered communication networks. IEEE Syst. J. 13(3), 2431–2442 (2019)CrossRefGoogle Scholar
  9. 9.
    Zeng, Y., Clerckx, B., Zhang, R.: Communications and signals design for wireless power transmission. IEEE Trans. Commun. 65(5), 2264–2290 (2017)CrossRefGoogle Scholar
  10. 10.
    Xu, D., Zhu, H.: Secure transmission for SWIPT IoT systems with full-duplex IoT devices. IEEE IoT J. 6, 10915–10933 (2019) Google Scholar
  11. 11.
    Zhang, H., Huang, S., Jiang, C., Long, K., Leung, V.C., Poor, H.V.: Energy efficient user association and power allocation in millimeter-wave-based ultra dense networks with energy harvesting base stations. IEEE J. Sel. Areas Commun. 35(9), 1936–1947 (2017)CrossRefGoogle Scholar
  12. 12.
    Xu, D., Li, Q.: Legitimate surveillance with a wireless powered monitor in rayleigh fading channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101(1), 293–297 (2018)CrossRefGoogle Scholar
  13. 13.
    Xu, D.: Legitimate surveillance with battery-aided wireless powered full-duplex monitor. IEEE Syst. J. (Accepted for publication) Google Scholar
  14. 14.
    Xu, D., Zhu, H., Li, Q.: Jammer-assisted legitimate eavesdropping in wireless powered suspicious communication networks. IEEE Access 7, 20363–20380 (2019)CrossRefGoogle Scholar
  15. 15.
    Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRefGoogle Scholar
  16. 16.
    Yu, W., Lui, R.: Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 54(7), 1310–1322 (2006)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020

Authors and Affiliations

  1. 1.Nanjing University of Posts and TelecommunicationsNanjingChina

Personalised recommendations