Abstract

In this paper, we investigate the optimization of the monitoring rate for a suspicious multicast communication network with a legitimate full-duplex (FD) monitor, where the FD monitor is proactive to jam suspicious receivers and eavesdrop from the suspicious transmitter simultaneously. To effectively monitor the suspicious communication over multicast networks, we maximize the monitoring rate under the outage probability constraint of the suspicious multicast communication network and the jamming power constraint at the FD monitor. The formulated optimization problem is nonconvex, and its global optimal solution is hard to obtain. Thus, we propose a constrained concave convex procedure- (CCCP-) based iterative algorithm, which is able to achieve a local optimal solution. Simulation results demonstrate that the proposed proactive eavesdropping scheme with optimal jamming power outperforms the conventional passive eavesdropping scheme.

Highlights

  • With dramatical development in wireless communication technologies, wireless networks have been widely used owing to the advantages such as mobility and flexibility

  • The more the power employed by the suspicious transmitter and the more the suspicious receivers, the greater the maximum achievable average eavesdropping rate can be obtained by the legitimate monitor under proactive and passive monitoring strategies

  • We propose an effective legitimate monitoring scheme for suspicious multicast communication networks, where an FD monitor is proactive to jam suspicious receivers and eavesdrop from the suspicious transmitter simultaneously

Read more

Summary

Introduction

With dramatical development in wireless communication technologies, wireless networks have been widely used owing to the advantages such as mobility and flexibility. Physical layer security has recently received significantly considerable attention to enhance the quality of secure communication, and it has been recognized as a new design paradigm to provide information security in wireless networks. In this new design paradigm, the propagation characteristics of wireless channels are taken into consideration against conventional (i.e., passive) eavesdroppers and novel (i.e., proactive) eavesdroppers. Suspicious communications could be discovered and prevented through passive monitoring when the channel quality of legitimate monitoring agencies is better than that of the suspicious users In practice, this is not always possible, resulting in limited legitimate monitoring performance. In practice, this is not always possible, resulting in limited legitimate monitoring performance. erefore, legitimate agencies should employ advanced effective measures to proactively monitor these suspicious communications for various purposes in order to circumvent the performance limitations caused by the disadvantageous channels

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.