ترغب بنشر مسار تعليمي؟ اضغط هنا

87 - Jiangbo Si , Zihao Cheng , Zan Li 2020
Secrecy transmission is investigated for a cooperative jamming scheme, where a multi-antenna jam-mer generates artificial noise (AN) to confuse eavesdroppers. Two kinds of eavesdroppers are considered: passive eavesdroppers who only overhear the legi timate information, and active eavesdroppers who not only overhear the legitimate information but also jam the legitimate signal. Existing works only treat the passive and active eavesdroppers separately. Different from the existing works, we investigate the achievable secrecy rate in presence of both active and passive eavesdroppers. For the considered system model, we assume that the instantaneous channel state information (CSI) of the active eavesdroppers is available at the jammer, while only partial CSI of the passive eavesdroppers is available at the jammer. A new zero-forcing beamforming scheme is proposed in the presence of both active and passive eavesdroppers. For both the perfect and imperfect CSI cases, the total transmission power allocation between the information and AN signals is optimized to maximize the achievable secrecy rate. Numerical results show that imperfect CSI between the jammer and the legitimate receiver will do more harm to the achievable secrecy rate than imperfect CSI between the jammer and the active eavesdropper.
98 - Zihao Cheng , Jiangbo Si , Zan Li 2020
Surveillance performance is studied for a wireless eavesdropping system, where a full-duplex legitimate monitor eavesdrops a suspicious link efficiently with the artificial noise (AN) assistance. Different from the existing work in the literature, th e suspicious receiver in this paper is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, the suspicious user will stop transmission, which is harmful for the surveillance performance. Hence, to improve the surveillance performance, AN should be transmitted covertly with a low detection probability by the suspicious receiver. Under these assumptions, an optimization problem is formulated to maximize the eavesdropping non-outage probability under a covert constraint. Based on the detection ability at the suspicious receiver, a novel scheme is proposed to solve the optimization problem by iterative search. Moreover, we investigate the impact of both the suspicious link uncertainty and the jamming link uncertainty on the covert surveillance performance. Simulations are performed to verify the analyses. We show that the suspicious link uncertainty benefits the surveillance performance, while the jamming link uncertainty can degrade the surveillance performance.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا