Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang
{"title":"Cooperative Jamming for Eavesdropping Surveillance in Wireless Networks","authors":"Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang","doi":"10.1109/NaNA56854.2022.00018","DOIUrl":null,"url":null,"abstract":"This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.