2021
DOI: 10.1109/tcomm.2021.3067058
|View full text |Cite
|
Sign up to set email alerts
|

Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty

Abstract: Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance.Different from the existing work in the literature, the suspicious receiver in this paper is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which is harmful for the surveillance performance. Hence, to improve the surveillance perform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 46 publications
(57 reference statements)
0
9
0
Order By: Relevance
“…respectively. Then the effective information monitoring rate R m is given as [5][6][7][24][25][26][27]]…”
Section: Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…respectively. Then the effective information monitoring rate R m is given as [5][6][7][24][25][26][27]]…”
Section: Problem Formulationmentioning
confidence: 99%
“…Let Re$ R_{e}$ and Ru$ R_{u}$ denote the achievable data rate of the monitoring link from AP to the LR and the suspicious communication link from AP to the SIU, which can be expressed as Rebadbreak=log2()1+γe\begin{equation} {R_e} = {\log _2}{\left({1 + {\gamma _e}} \right)} \end{equation}and Rubadbreak=log2()1+γu,\begin{equation} {R_u} = {\log _2}{\left({1 + {\gamma _u}} \right)}, \end{equation}respectively. Then the effective information monitoring rate Rm$ R_{m}$ is given as [5–7, 24–27] Rmbadbreak={Ru,ifReRu,0,otherwise.\begin{equation} {R_m} = {\left\lbrace { \def\eqcellsep{&}\begin{array}{*{20}{c}}{R_u},\quad {\text{ if }}{R_e} \ge {R_u},\\[5pt] 0,\quad {\text{ otherwise}}{\rm {.}} \end{array} } \right.}…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the electromagnetic environment variations, there is noise uncertainty at Willie, which affects the covert rate significantly. When the bounded uncertainty model is applied, the PDF of the noise power at Willie is given by [25],…”
Section: System Modelmentioning
confidence: 99%
“…D. Xu et al considered a downlink suspicious NOMA network with multiple groups of suspicious users and proposed a heuristic iterative algorithm to maximize the number of successfully eavesdropped suspicious users [39]. In [40], under low detection probability condition at the suspicious receiver, the authors proposed an iterative search algorithm to maximize the surveillance performance.…”
Section: Introductionmentioning
confidence: 99%