Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication

This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 7; pp. 139035 - 139046
Main Authors Hu, Guojie, Cai, Yueming
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each time block, the monitor first acts as the masked power beacon deliberately to proceed wireless energy transfer to the suspicious transmitter for its uplink data transmission, then adaptively executes jamming, passive eavesdropping or assisting strategy based on our provided exact channel condition with strict proofs. According to these adaptive strategies and considering the optimization of transmit power at the monitor, we aim to solve the problem of sum eavesdropping rates maximization over N (N ≥ 1 ) time blocks subject to limited power at the monitor, which is explained as a difficult mixed-inter nonlinear programming (MINLP) problem. Fortunately, it is shown that this MINLP problem can be divided into one jamming subproblem and one passive eavesdropping/assisting subproblem. To observe the achieve performance bound, we firstly exploit the exhaustive search based algorithm and block coordinate descent (BCD) based algorithm to solve these two subproblems, respectively. In addition, in order to decrease the time complexities, we further propose one jamming power efficiency sorting based heuristic algorithm and one signal-to-noise ratio (SNR) approximation based fast algorithm. Numerical results present the considerable gains brought from our proposed adaptive proactive eavesdropping strategy.
AbstractList This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each time block, the monitor first acts as the masked power beacon deliberately to proceed wireless energy transfer to the suspicious transmitter for its uplink data transmission, then adaptively executes jamming, passive eavesdropping or assisting strategy based on our provided exact channel condition with strict proofs. According to these adaptive strategies and considering the optimization of transmit power at the monitor, we aim to solve the problem of sum eavesdropping rates maximization over N (N ≥ 1 ) time blocks subject to limited power at the monitor, which is explained as a difficult mixed-inter nonlinear programming (MINLP) problem. Fortunately, it is shown that this MINLP problem can be divided into one jamming subproblem and one passive eavesdropping/assisting subproblem. To observe the achieve performance bound, we firstly exploit the exhaustive search based algorithm and block coordinate descent (BCD) based algorithm to solve these two subproblems, respectively. In addition, in order to decrease the time complexities, we further propose one jamming power efficiency sorting based heuristic algorithm and one signal-to-noise ratio (SNR) approximation based fast algorithm. Numerical results present the considerable gains brought from our proposed adaptive proactive eavesdropping strategy.
Author Hu, Guojie
Cai, Yueming
Author_xml – sequence: 1
  givenname: Guojie
  orcidid: 0000-0002-8139-6603
  surname: Hu
  fullname: Hu, Guojie
  organization: College of Communications Engineering, Army Engineering University of PLA, Nanjing, China
– sequence: 2
  givenname: Yueming
  surname: Cai
  fullname: Cai, Yueming
  email: caiym@vip.sina.com
  organization: College of Communications Engineering, Army Engineering University of PLA, Nanjing, China
BookMark eNqFUU1v1DAQtVCRKKW_oJdInLPYHieOjyVaSqVWrbQgjsZxxouXXTvYSVH_PdmmqhAX5jKj0fsYzXtLTkIMSMgFoyvGqPpw2bbrzWbFKVMrrgTUjL8ip5zVqoQK6pO_5jfkPOcdnauZV5U8Jd_vUzR29A9YrM0D5j7FYfBhW3zz44_i1uSf2Bf38Tem4iMaG0PhYirWAdP2sWxjyGMyPsyYzZQHb32cctHGw2EK3prRx_COvHZmn_H8uZ-Rr5_WX9rP5c3d1XV7eVNaQZuxhA6ckgyEdU0HyA0a1nHlpHA9WOUcIK0QeyGxNlBxSxmXzAJwZuueUzgj14tuH81OD8kfTHrU0Xj9tIhpq00avd2jhoZKZyRQilxY2RvomBW2qyl0zgg5a71ftIYUf02YR72LUwrz-ZqLqqqpgorNKFhQNsWcE7oXV0b1MRm9JKOPyejnZGaW-odl_fj0qeMn9__hXixcj4gvbk0jGlAK_gDy357P
CODEN IAECCG
CitedBy_id crossref_primary_10_1109_JSYST_2020_3012758
crossref_primary_10_1007_s11432_020_2992_3
Cites_doi 10.1109/LCOMM.2017.2715337
10.1109/LCOM.2007.348292
10.1109/TWC.2017.2700379
10.1109/MWC.2011.5999759
10.1109/LSP.2018.2815553
10.1109/MSP.2015.2481563
10.1109/TWC.2012.012412.110805
10.1017/CBO9780511804441
10.1109/TIFS.2019.2901821
10.1109/TCOMM.2011.112811.100349
10.1109/LCOMM.2019.2903809
10.1109/JPROC.2016.2558521
10.1109/JSTSP.2016.2600519
10.1109/LSP.2015.2500340
10.1109/MWC.2011.5751298
10.1109/LSP.2017.2696305
10.1109/JSAC.2018.2825718
10.1109/TWC.2015.2504526
10.1109/TWC.2015.2474378
10.1109/COMST.2018.2817685
10.1109/T-WC.2008.07091
10.1109/TWC.2017.2666138
10.1109/TVT.2018.2889397
10.1109/JSAC.2002.807348
10.1109/TWC.2017.2742954
10.1109/LSP.2018.2843285
10.1109/TIT.2012.2204389
10.1109/LSP.2017.2727045
10.1109/ACCESS.2019.2904407
10.1109/TVT.2017.2729561
10.1109/TWC.2018.2863287
10.1109/TVT.2019.2890999
10.1109/LWC.2015.2498610
10.1109/MCOM.2015.7081071
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2019.2943612
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 139046
ExternalDocumentID oai_doaj_org_article_3807fa7300e24c7da3b1c4cb603bfa47
10_1109_ACCESS_2019_2943612
8848399
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61771487; 61371122; 61471393
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-3b3f97134cf8b3e2aea1b29f74fd3c9ff3e05eed47e6a352c01271c3321c6d203
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Wed Aug 27 01:20:37 EDT 2025
Sun Jun 29 16:48:32 EDT 2025
Tue Jul 01 02:41:59 EDT 2025
Thu Apr 24 23:02:59 EDT 2025
Wed Aug 27 02:44:44 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-3b3f97134cf8b3e2aea1b29f74fd3c9ff3e05eed47e6a352c01271c3321c6d203
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8139-6603
OpenAccessLink https://doaj.org/article/3807fa7300e24c7da3b1c4cb603bfa47
PQID 2455609351
PQPubID 4845423
PageCount 12
ParticipantIDs crossref_citationtrail_10_1109_ACCESS_2019_2943612
ieee_primary_8848399
crossref_primary_10_1109_ACCESS_2019_2943612
doaj_primary_oai_doaj_org_article_3807fa7300e24c7da3b1c4cb603bfa47
proquest_journals_2455609351
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20190000
2019-00-00
20190101
2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 20190000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref15
ref14
ref31
ref30
ref33
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
bertsekas (ref32) 1999
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref15
  doi: 10.1109/LCOMM.2017.2715337
– ident: ref34
  doi: 10.1109/LCOM.2007.348292
– ident: ref11
  doi: 10.1109/TWC.2017.2700379
– ident: ref4
  doi: 10.1109/MWC.2011.5999759
– ident: ref21
  doi: 10.1109/LSP.2018.2815553
– ident: ref31
  doi: 10.1109/MSP.2015.2481563
– ident: ref29
  doi: 10.1109/TWC.2012.012412.110805
– ident: ref33
  doi: 10.1017/CBO9780511804441
– ident: ref13
  doi: 10.1109/TIFS.2019.2901821
– ident: ref28
  doi: 10.1109/TCOMM.2011.112811.100349
– ident: ref9
  doi: 10.1109/LCOMM.2019.2903809
– ident: ref3
  doi: 10.1109/JPROC.2016.2558521
– ident: ref22
  doi: 10.1109/JSTSP.2016.2600519
– ident: ref26
  doi: 10.1109/LSP.2015.2500340
– ident: ref1
  doi: 10.1109/MWC.2011.5751298
– ident: ref24
  doi: 10.1109/LSP.2017.2696305
– ident: ref19
  doi: 10.1109/JSAC.2018.2825718
– ident: ref7
  doi: 10.1109/TWC.2015.2504526
– ident: ref8
  doi: 10.1109/TWC.2015.2474378
– ident: ref25
  doi: 10.1109/COMST.2018.2817685
– ident: ref35
  doi: 10.1109/T-WC.2008.07091
– ident: ref16
  doi: 10.1109/TWC.2017.2666138
– ident: ref14
  doi: 10.1109/TVT.2018.2889397
– ident: ref30
  doi: 10.1109/JSAC.2002.807348
– ident: ref6
  doi: 10.1109/TWC.2017.2742954
– ident: ref23
  doi: 10.1109/LSP.2018.2843285
– year: 1999
  ident: ref32
  publication-title: Nonlinear Programming
– ident: ref27
  doi: 10.1109/TIT.2012.2204389
– ident: ref12
  doi: 10.1109/LSP.2017.2727045
– ident: ref20
  doi: 10.1109/ACCESS.2019.2904407
– ident: ref5
  doi: 10.1109/TVT.2017.2729561
– ident: ref17
  doi: 10.1109/TWC.2018.2863287
– ident: ref18
  doi: 10.1109/TVT.2019.2890999
– ident: ref10
  doi: 10.1109/LWC.2015.2498610
– ident: ref2
  doi: 10.1109/MCOM.2015.7081071
SSID ssj0000816957
Score 2.1457973
Snippet This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 139035
SubjectTerms Algorithms
assisting
Communications systems
Data transmission
Eavesdropping
Energy transfer
Energy-constrained system
Heuristic methods
Jamming
Mathematical analysis
Monitoring
Nonlinear programming
Optimization
passive eavesdropping
Potential energy
Power efficiency
Receivers
Resource management
Signal to noise ratio
Sorting algorithms
sum eavesdropping rates maximization
Transmitters
SummonAdditionalLinks – databaseName: IEEE Xplore
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PcGBV0EsFOQDx2ab-JX42K62qpCKKkFFb8ZPqFrtVt1sD_31eBxvRAEhblFsRxN99szYnvkG4AOXtUlNrKqjiBWXPlZJ58XK2OTb2mQQUxtGW3ySJ-f844W42IL9MRcmhJCDz8IUH_Ndvl-6NR6VHXQdT_ZcbcN22rgNuVrjeQoWkFCiLcRCTa0ODmez9A8YvaWmVHEmG_rA-GSO_lJU5Q9NnM3L8VM43Qg2RJVcTde9nbr73zgb_1fyZ_Ck-JnkcJgYz2ErLF7A41_YB3fh2xlmU6G6I3NzF1b-dolkDd_J18v-Bzk1q6vgyRlWUSNHqDgXJDm4ZJ6TBSss9JnLS6Q-n9erm0uHwbTkQb7JSzg_nn-ZnVSl4ELleN31FbMsKkwudbGzLFATTGOpii2PnjkVIwu1SEaVt0Ga5Lk5vLduHGO0cdLTmr2CncVyEV4Dod4i7YAUVAZuODfCqU611ivpBfP1BOgGCe0KGzlKfa3zrqRWeoBPI3y6wDeB_XHQzUDG8e_uRwjx2BWZtPOLBI0uC1Mj4X40yNofKHetN8w2jjsra2aj4e0EdhHO8SMFyQnsbSaMLqt-pSkXyYFUTDRv_j7qLTxCAYcjnD3Y6W_X4V1yanr7Ps_mnxap9VY
  priority: 102
  providerName: IEEE
Title Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
URI https://ieeexplore.ieee.org/document/8848399
https://www.proquest.com/docview/2455609351
https://doaj.org/article/3807fa7300e24c7da3b1c4cb603bfa47
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iSQ_iE9fHkoNHq2lebY667CKCIuiit5inirKKu_r7zaR12UXQi9cmbZPJdOZLOvMNQgdcEpOaWEGiiAWXPhbJ5sXC2IRtbXKIqQ2iLS7l2ZCf34m7mVJfEBPW0AM3gjsGQvRogFU9UO4qb5gtHXdWEmaj4TmPPPm8mc1UtsF1KZWoWpqhkqjjk14vzQhiudQRVZzJks65oszY35ZY-WGXs7MZrKKVFiXik2Z0a2ghjNbR8gx34Aa6v4JcKDBWuG8-w9i_vwLVwgO-fZo84gszfg4eX0ENNHwKZm-EEzzF_ZzqV0CZzlwcIvW5_hi_PTkIhcVz2SKbaDjo3_TOirZcQuE4qScFsywqSA11sbYsUBNMaamKFY-eORUjC0Qkl8irIE3CXQ7-OpeOMVo66SlhW2hx9DoK2whTb4E0QAoqAzecG-FUrSrrlfSCedJB9Fty2rVc4jDqF533FETpRtwaxK1bcXfQ4fSmt4ZK4_fup7Ak067Ag50vJO3QrXbov7SjgzZgQacPqWueEKHqoL3vBdbtNzvWlIsE_xQT5c5_vHoXLcF0muOaPbQ4ef8I-wnATGw362o35xp-ARC57PE
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5Remg59EVRt6WtDz2SJbEdJz7CatG2ZRFSQeXm-gmIahexWQ799fUk3ghoVfUWJXY00Teemdgz3wB84iLX8RHL8lCGjAsXsmjzQqZNjG1NdIjxGWZbHInJKf9yVp6twU5fC-O9b5PP_BAv27N8N7dL3CrbrWse_bl8BI-j3y-Lrlqr31HBFhKyrBK1UJHL3b3RKH4F5m_JIZWciYLecz8tS39qq_KHLW4dzMFzmK5E6_JKrobLxgztrwesjf8r-wt4liJNstepxktY87NXsHGHf3ATfhxjPRUaPDLWt37hbuZI13BOvl82F2SqF1fekWPso0b20XTOSAxxybgtF8yw1WfbYCKO-bZcXF9aTKcl9ypOXsPpwfhkNMlSy4XM8rxuMmZYkFheakNtmKfa68JQGSoeHLMyBObzMrpVXnmhY-xm8eS6sIzRwgpHc7YF67P5zL8BQp1B4gFRUuG55lyXVtayMk4KVzKXD4CukFA28ZGj1D9V-1-SS9XBpxA-leAbwE4_6bqj4_j38H2EuB-KXNrtjQiNSktTIeV-0Mjb7ym3ldPMFJZbI3JmgubVADYRzv4lCckBbK8URqV1v1A06qXAs-Xi7d9nfYQnk5PpoTr8fPT1HTxFYbsNnW1Yb26W_n0McRrzodXs3wQ--J8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Proactive+Eavesdropping+With+Masked+Power+Beacon+for+Energy-Constrained+Suspicious+Communication&rft.jtitle=IEEE+access&rft.au=Hu%2C+Guojie&rft.au=Cai%2C+Yueming&rft.date=2019&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=7&rft.spage=139035&rft.epage=139046&rft_id=info:doi/10.1109%2FACCESS.2019.2943612&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2019_2943612
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon