2021
DOI: 10.1109/jsyst.2020.3012758
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…Otherwise, ξ is a monotonically decreasing function of τ in this case and the corresponding optimal value of τ is τ * = +∞. Consequently, we obtain the overall optimal τ * given in (25) and the corresponding minimum detection error probability ξ * given in (26).…”
Section: Appendix a Proof Of Lemmamentioning
confidence: 95%
See 3 more Smart Citations
“…Otherwise, ξ is a monotonically decreasing function of τ in this case and the corresponding optimal value of τ is τ * = +∞. Consequently, we obtain the overall optimal τ * given in (25) and the corresponding minimum detection error probability ξ * given in (26).…”
Section: Appendix a Proof Of Lemmamentioning
confidence: 95%
“…and n r ∈ C is the AWGN at Receiver with zero mean and variance σ 2 r . Since the AN signal is known to Receiver, the self-interference caused by AN can be suppressed by interference cancellation techniques [26,27]. In this work, we assume that the self-interference cannot be perfectly cancelled and the residual self-interference is φP r , where φ is the selfinterference cancellation coefficient capturing the quality of cancellation.…”
Section: System Model a Considered Scenario And Adopted Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…To further enhance the eavesdropping ability of the monitor, an advanced spoofing technique was proposed in [8]- [10], in which a spoofing relay can forward constructive or destructive signals to the suspicious receiver when the monitor experiences a strong eavesdropping channel or suffers from a poor eavesdropping channel, respectively. Wireless information surveillance via proactive eavesdropping has also been investigated in numerous scenarios, such as relay-based suspicious links [11]- [14], relay-based monitoring links [15], [16], multiple suspicious communication links [17]- [20], and millimeter wave (mmWave) communication systems [21].…”
Section: Introductionmentioning
confidence: 99%