Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang
{"title":"无线网络窃听监控协同干扰研究","authors":"Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang","doi":"10.1109/NaNA56854.2022.00018","DOIUrl":null,"url":null,"abstract":"This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cooperative Jamming for Eavesdropping Surveillance in Wireless Networks\",\"authors\":\"Sunyan Hong, Shikai Shen, Bin Yang, Jun He, Fei Deng, Yunfei Zhang, Qinbiao Yang\",\"doi\":\"10.1109/NaNA56854.2022.00018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.\",\"PeriodicalId\":113743,\"journal\":{\"name\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA56854.2022.00018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA56854.2022.00018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cooperative Jamming for Eavesdropping Surveillance in Wireless Networks
This paper investigates the eavesdropping surveillance issue via cooperative jamming in a wireless network consisting of a suspicious transmitter, a suspicious receiver, a legal monitor and multiple potential jamming nodes. In such a network, the legal monitor attempts to intercept the suspicious message and also prevents the suspicious receiver from receiving the message with the help of jamming nodes. To this end, we propose two selection schemes of jamming nodes. One scheme is to randomly select some nodes from the potential jamming nodes, and another one is to select the jamming nodes which have less interference to the legal monitor and more interference to the suspicious receiver. Under each scheme, we maximize the eavesdropping rate by optimizing the transmit power of jamming nodes. Simulation results are presented to illustrate our findings.