Luring the Enemy in Deep: Jamming-Assisted Legitimate Eavesdropping Over HARQ-Based Suspicious Communications
This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol, S uses at most <inline-formula&g...
Saved in:
Published in | IEEE transactions on vehicular technology Vol. 72; no. 4; pp. 1 - 7 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.04.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol, S uses at most <inline-formula><tex-math notation="LaTeX">L \ge 2</tex-math></inline-formula> transmission rounds (TRs) for delivering the same message to D. Under this setup, E deliberately jams D at each TR to decrease its signal receiving quality, so as to induce S to consume more TRs for transmitting its message. Then, as a reward, E at these TRs can overhear the suspicious message from S more clearly . Our purpose is to maximize E's eavesdropping success probability, by allocating its jamming power at these <inline-formula><tex-math notation="LaTeX">L</tex-math></inline-formula> TRs, subject to its power budget constraint. The problem is highly non-convex. To solve it, we first exploit the general successive convex approximation (SCA) approach to determine the iterative solution. Considering the large complexity of the SCA-based approach, we further develop an easy-to-implement Lagrange multiplier method to find the sub-optimal solution. Numerical results show that the proposed schemes increase the eavesdropping success probability as compared with several benchmarks. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0018-9545 1939-9359 |
DOI: | 10.1109/TVT.2022.3223364 |