Abstract
There is a growing need for government agencies to monitor suspicious communication links to prevent crimes and terror attacks. In this paper, we study a legitimate surveillance scenario where a legitimate monitor aims to intercept the suspicious communication between a transmitter and a receiver over fading channels. The legitimate monitor can eavesdrop (decode) the information of the suspicious link only when its achievable data rate is no smaller than that at the suspicious receiver. In practice, the legitimate eavesdropping is challenging, especially when the legitimate monitor is far from the suspicious transmitter. To overcome this issue, we propose a new approach, namely proactive eavesdropping via cognitive jamming, in which the legitimate monitor purposely jams the receiver and changes the suspicious communication (e.g., to a smaller data rate) in order to overhear easily. In particular, we consider delay-sensitive and delay-insensitive applications for the suspicious transmission, under which the legitimate monitor maximizes the eavesdropping non-outage probability and the relative eavesdropping rate, respectively, by optimizing its jamming power allocation over different fading states subject to an average power constraint. We present efficient algorithms for optimally solving the formulated problems. Numerical results show that thanks to the cognitive jamming, the proposed proactive eavesdropping scheme greatly outperforms the conventional passive eavesdropping without jamming.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.