Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications

This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol, S uses at most <inline-formula&g...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on vehicular technology Vol. 72; no. 4; pp. 1 - 7
Main Authors Hu, Guojie, Si, Jiangbo, Cai, Yunlong, Al-Dhahir, Naofal
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol, S uses at most <inline-formula><tex-math notation="LaTeX">L \ge 2</tex-math></inline-formula> transmission rounds (TRs) for delivering the same message to D. Under this setup, E deliberately jams D at each TR to decrease its signal receiving quality, so as to induce S to consume more TRs for transmitting its message. Then, as a reward, E at these TRs can overhear the suspicious message from S more clearly . Our purpose is to maximize E's eavesdropping success probability, by allocating its jamming power at these <inline-formula><tex-math notation="LaTeX">L</tex-math></inline-formula> TRs, subject to its power budget constraint. The problem is highly non-convex. To solve it, we first exploit the general successive convex approximation (SCA) approach to determine the iterative solution. Considering the large complexity of the SCA-based approach, we further develop an easy-to-implement Lagrange multiplier method to find the sub-optimal solution. Numerical results show that the proposed schemes increase the eavesdropping success probability as compared with several benchmarks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9545
1939-9359
DOI:10.1109/TVT.2022.3223364