Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication
This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each...
Saved in:
Published in | IEEE access Vol. 7; pp. 139035 - 139046 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each time block, the monitor first acts as the masked power beacon deliberately to proceed wireless energy transfer to the suspicious transmitter for its uplink data transmission, then adaptively executes jamming, passive eavesdropping or assisting strategy based on our provided exact channel condition with strict proofs. According to these adaptive strategies and considering the optimization of transmit power at the monitor, we aim to solve the problem of sum eavesdropping rates maximization over N (N ≥ 1 ) time blocks subject to limited power at the monitor, which is explained as a difficult mixed-inter nonlinear programming (MINLP) problem. Fortunately, it is shown that this MINLP problem can be divided into one jamming subproblem and one passive eavesdropping/assisting subproblem. To observe the achieve performance bound, we firstly exploit the exhaustive search based algorithm and block coordinate descent (BCD) based algorithm to solve these two subproblems, respectively. In addition, in order to decrease the time complexities, we further propose one jamming power efficiency sorting based heuristic algorithm and one signal-to-noise ratio (SNR) approximation based fast algorithm. Numerical results present the considerable gains brought from our proposed adaptive proactive eavesdropping strategy. |
---|---|
AbstractList | This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate monitor. Specifically, for such a system, we consider the proactive eavesdropping over finite time blocks under the off-line framework. In each time block, the monitor first acts as the masked power beacon deliberately to proceed wireless energy transfer to the suspicious transmitter for its uplink data transmission, then adaptively executes jamming, passive eavesdropping or assisting strategy based on our provided exact channel condition with strict proofs. According to these adaptive strategies and considering the optimization of transmit power at the monitor, we aim to solve the problem of sum eavesdropping rates maximization over N (N ≥ 1 ) time blocks subject to limited power at the monitor, which is explained as a difficult mixed-inter nonlinear programming (MINLP) problem. Fortunately, it is shown that this MINLP problem can be divided into one jamming subproblem and one passive eavesdropping/assisting subproblem. To observe the achieve performance bound, we firstly exploit the exhaustive search based algorithm and block coordinate descent (BCD) based algorithm to solve these two subproblems, respectively. In addition, in order to decrease the time complexities, we further propose one jamming power efficiency sorting based heuristic algorithm and one signal-to-noise ratio (SNR) approximation based fast algorithm. Numerical results present the considerable gains brought from our proposed adaptive proactive eavesdropping strategy. |
Author | Hu, Guojie Cai, Yueming |
Author_xml | – sequence: 1 givenname: Guojie orcidid: 0000-0002-8139-6603 surname: Hu fullname: Hu, Guojie organization: College of Communications Engineering, Army Engineering University of PLA, Nanjing, China – sequence: 2 givenname: Yueming surname: Cai fullname: Cai, Yueming email: caiym@vip.sina.com organization: College of Communications Engineering, Army Engineering University of PLA, Nanjing, China |
BookMark | eNqFUU1v1DAQtVCRKKW_oJdInLPYHieOjyVaSqVWrbQgjsZxxouXXTvYSVH_PdmmqhAX5jKj0fsYzXtLTkIMSMgFoyvGqPpw2bbrzWbFKVMrrgTUjL8ip5zVqoQK6pO_5jfkPOcdnauZV5U8Jd_vUzR29A9YrM0D5j7FYfBhW3zz44_i1uSf2Bf38Tem4iMaG0PhYirWAdP2sWxjyGMyPsyYzZQHb32cctHGw2EK3prRx_COvHZmn_H8uZ-Rr5_WX9rP5c3d1XV7eVNaQZuxhA6ckgyEdU0HyA0a1nHlpHA9WOUcIK0QeyGxNlBxSxmXzAJwZuueUzgj14tuH81OD8kfTHrU0Xj9tIhpq00avd2jhoZKZyRQilxY2RvomBW2qyl0zgg5a71ftIYUf02YR72LUwrz-ZqLqqqpgorNKFhQNsWcE7oXV0b1MRm9JKOPyejnZGaW-odl_fj0qeMn9__hXixcj4gvbk0jGlAK_gDy357P |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1109_JSYST_2020_3012758 crossref_primary_10_1007_s11432_020_2992_3 |
Cites_doi | 10.1109/LCOMM.2017.2715337 10.1109/LCOM.2007.348292 10.1109/TWC.2017.2700379 10.1109/MWC.2011.5999759 10.1109/LSP.2018.2815553 10.1109/MSP.2015.2481563 10.1109/TWC.2012.012412.110805 10.1017/CBO9780511804441 10.1109/TIFS.2019.2901821 10.1109/TCOMM.2011.112811.100349 10.1109/LCOMM.2019.2903809 10.1109/JPROC.2016.2558521 10.1109/JSTSP.2016.2600519 10.1109/LSP.2015.2500340 10.1109/MWC.2011.5751298 10.1109/LSP.2017.2696305 10.1109/JSAC.2018.2825718 10.1109/TWC.2015.2504526 10.1109/TWC.2015.2474378 10.1109/COMST.2018.2817685 10.1109/T-WC.2008.07091 10.1109/TWC.2017.2666138 10.1109/TVT.2018.2889397 10.1109/JSAC.2002.807348 10.1109/TWC.2017.2742954 10.1109/LSP.2018.2843285 10.1109/TIT.2012.2204389 10.1109/LSP.2017.2727045 10.1109/ACCESS.2019.2904407 10.1109/TVT.2017.2729561 10.1109/TWC.2018.2863287 10.1109/TVT.2019.2890999 10.1109/LWC.2015.2498610 10.1109/MCOM.2015.7081071 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2019.2943612 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 139046 |
ExternalDocumentID | oai_doaj_org_article_3807fa7300e24c7da3b1c4cb603bfa47 10_1109_ACCESS_2019_2943612 8848399 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61771487; 61371122; 61471393 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-3b3f97134cf8b3e2aea1b29f74fd3c9ff3e05eed47e6a352c01271c3321c6d203 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:20:37 EDT 2025 Sun Jun 29 16:48:32 EDT 2025 Tue Jul 01 02:41:59 EDT 2025 Thu Apr 24 23:02:59 EDT 2025 Wed Aug 27 02:44:44 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-3b3f97134cf8b3e2aea1b29f74fd3c9ff3e05eed47e6a352c01271c3321c6d203 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8139-6603 |
OpenAccessLink | https://doaj.org/article/3807fa7300e24c7da3b1c4cb603bfa47 |
PQID | 2455609351 |
PQPubID | 4845423 |
PageCount | 12 |
ParticipantIDs | crossref_citationtrail_10_1109_ACCESS_2019_2943612 ieee_primary_8848399 crossref_primary_10_1109_ACCESS_2019_2943612 doaj_primary_oai_doaj_org_article_3807fa7300e24c7da3b1c4cb603bfa47 proquest_journals_2455609351 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20190000 2019-00-00 20190101 2019-01-01 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 20190000 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref15 ref14 ref31 ref30 ref33 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 bertsekas (ref32) 1999 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref15 doi: 10.1109/LCOMM.2017.2715337 – ident: ref34 doi: 10.1109/LCOM.2007.348292 – ident: ref11 doi: 10.1109/TWC.2017.2700379 – ident: ref4 doi: 10.1109/MWC.2011.5999759 – ident: ref21 doi: 10.1109/LSP.2018.2815553 – ident: ref31 doi: 10.1109/MSP.2015.2481563 – ident: ref29 doi: 10.1109/TWC.2012.012412.110805 – ident: ref33 doi: 10.1017/CBO9780511804441 – ident: ref13 doi: 10.1109/TIFS.2019.2901821 – ident: ref28 doi: 10.1109/TCOMM.2011.112811.100349 – ident: ref9 doi: 10.1109/LCOMM.2019.2903809 – ident: ref3 doi: 10.1109/JPROC.2016.2558521 – ident: ref22 doi: 10.1109/JSTSP.2016.2600519 – ident: ref26 doi: 10.1109/LSP.2015.2500340 – ident: ref1 doi: 10.1109/MWC.2011.5751298 – ident: ref24 doi: 10.1109/LSP.2017.2696305 – ident: ref19 doi: 10.1109/JSAC.2018.2825718 – ident: ref7 doi: 10.1109/TWC.2015.2504526 – ident: ref8 doi: 10.1109/TWC.2015.2474378 – ident: ref25 doi: 10.1109/COMST.2018.2817685 – ident: ref35 doi: 10.1109/T-WC.2008.07091 – ident: ref16 doi: 10.1109/TWC.2017.2666138 – ident: ref14 doi: 10.1109/TVT.2018.2889397 – ident: ref30 doi: 10.1109/JSAC.2002.807348 – ident: ref6 doi: 10.1109/TWC.2017.2742954 – ident: ref23 doi: 10.1109/LSP.2018.2843285 – year: 1999 ident: ref32 publication-title: Nonlinear Programming – ident: ref27 doi: 10.1109/TIT.2012.2204389 – ident: ref12 doi: 10.1109/LSP.2017.2727045 – ident: ref20 doi: 10.1109/ACCESS.2019.2904407 – ident: ref5 doi: 10.1109/TVT.2017.2729561 – ident: ref17 doi: 10.1109/TWC.2018.2863287 – ident: ref18 doi: 10.1109/TVT.2019.2890999 – ident: ref10 doi: 10.1109/LWC.2015.2498610 – ident: ref2 doi: 10.1109/MCOM.2015.7081071 |
SSID | ssj0000816957 |
Score | 2.1457973 |
Snippet | This paper studies the proactive eavesdropping for the potential energy-constrained suspicious communication system with one full-duplex-enabled legitimate... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 139035 |
SubjectTerms | Algorithms assisting Communications systems Data transmission Eavesdropping Energy transfer Energy-constrained system Heuristic methods Jamming Mathematical analysis Monitoring Nonlinear programming Optimization passive eavesdropping Potential energy Power efficiency Receivers Resource management Signal to noise ratio Sorting algorithms sum eavesdropping rates maximization Transmitters |
SummonAdditionalLinks | – databaseName: IEEE Xplore dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PcGBV0EsFOQDx2ab-JX42K62qpCKKkFFb8ZPqFrtVt1sD_31eBxvRAEhblFsRxN99szYnvkG4AOXtUlNrKqjiBWXPlZJ58XK2OTb2mQQUxtGW3ySJ-f844W42IL9MRcmhJCDz8IUH_Ndvl-6NR6VHXQdT_ZcbcN22rgNuVrjeQoWkFCiLcRCTa0ODmez9A8YvaWmVHEmG_rA-GSO_lJU5Q9NnM3L8VM43Qg2RJVcTde9nbr73zgb_1fyZ_Ck-JnkcJgYz2ErLF7A41_YB3fh2xlmU6G6I3NzF1b-dolkDd_J18v-Bzk1q6vgyRlWUSNHqDgXJDm4ZJ6TBSss9JnLS6Q-n9erm0uHwbTkQb7JSzg_nn-ZnVSl4ELleN31FbMsKkwudbGzLFATTGOpii2PnjkVIwu1SEaVt0Ga5Lk5vLduHGO0cdLTmr2CncVyEV4Dod4i7YAUVAZuODfCqU611ivpBfP1BOgGCe0KGzlKfa3zrqRWeoBPI3y6wDeB_XHQzUDG8e_uRwjx2BWZtPOLBI0uC1Mj4X40yNofKHetN8w2jjsra2aj4e0EdhHO8SMFyQnsbSaMLqt-pSkXyYFUTDRv_j7qLTxCAYcjnD3Y6W_X4V1yanr7Ps_mnxap9VY priority: 102 providerName: IEEE |
Title | Proactive Eavesdropping With Masked Power Beacon for Energy-Constrained Suspicious Communication |
URI | https://ieeexplore.ieee.org/document/8848399 https://www.proquest.com/docview/2455609351 https://doaj.org/article/3807fa7300e24c7da3b1c4cb603bfa47 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iSQ_iE9fHkoNHq2lebY667CKCIuiit5inirKKu_r7zaR12UXQi9cmbZPJdOZLOvMNQgdcEpOaWEGiiAWXPhbJ5sXC2IRtbXKIqQ2iLS7l2ZCf34m7mVJfEBPW0AM3gjsGQvRogFU9UO4qb5gtHXdWEmaj4TmPPPm8mc1UtsF1KZWoWpqhkqjjk14vzQhiudQRVZzJks65oszY35ZY-WGXs7MZrKKVFiXik2Z0a2ghjNbR8gx34Aa6v4JcKDBWuG8-w9i_vwLVwgO-fZo84gszfg4eX0ENNHwKZm-EEzzF_ZzqV0CZzlwcIvW5_hi_PTkIhcVz2SKbaDjo3_TOirZcQuE4qScFsywqSA11sbYsUBNMaamKFY-eORUjC0Qkl8irIE3CXQ7-OpeOMVo66SlhW2hx9DoK2whTb4E0QAoqAzecG-FUrSrrlfSCedJB9Fty2rVc4jDqF533FETpRtwaxK1bcXfQ4fSmt4ZK4_fup7Ak067Ag50vJO3QrXbov7SjgzZgQacPqWueEKHqoL3vBdbtNzvWlIsE_xQT5c5_vHoXLcF0muOaPbQ4ef8I-wnATGw362o35xp-ARC57PE |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5Remg59EVRt6WtDz2SJbEdJz7CatG2ZRFSQeXm-gmIahexWQ799fUk3ghoVfUWJXY00Teemdgz3wB84iLX8RHL8lCGjAsXsmjzQqZNjG1NdIjxGWZbHInJKf9yVp6twU5fC-O9b5PP_BAv27N8N7dL3CrbrWse_bl8BI-j3y-Lrlqr31HBFhKyrBK1UJHL3b3RKH4F5m_JIZWciYLecz8tS39qq_KHLW4dzMFzmK5E6_JKrobLxgztrwesjf8r-wt4liJNstepxktY87NXsHGHf3ATfhxjPRUaPDLWt37hbuZI13BOvl82F2SqF1fekWPso0b20XTOSAxxybgtF8yw1WfbYCKO-bZcXF9aTKcl9ypOXsPpwfhkNMlSy4XM8rxuMmZYkFheakNtmKfa68JQGSoeHLMyBObzMrpVXnmhY-xm8eS6sIzRwgpHc7YF67P5zL8BQp1B4gFRUuG55lyXVtayMk4KVzKXD4CukFA28ZGj1D9V-1-SS9XBpxA-leAbwE4_6bqj4_j38H2EuB-KXNrtjQiNSktTIeV-0Mjb7ym3ldPMFJZbI3JmgubVADYRzv4lCckBbK8URqV1v1A06qXAs-Xi7d9nfYQnk5PpoTr8fPT1HTxFYbsNnW1Yb26W_n0McRrzodXs3wQ--J8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Proactive+Eavesdropping+With+Masked+Power+Beacon+for+Energy-Constrained+Suspicious+Communication&rft.jtitle=IEEE+access&rft.au=Hu%2C+Guojie&rft.au=Cai%2C+Yueming&rft.date=2019&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=7&rft.spage=139035&rft.epage=139046&rft_id=info:doi/10.1109%2FACCESS.2019.2943612&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2019_2943612 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |