pith. machine review for the scientific record. sign in

arxiv: 1704.05590 · v1 · submitted 2017-04-19 · 💻 cs.IT · math.IT

Recognition: unknown

Proactive Eavesdropping in Relaying Systems

Authors on Pith no claims yet
classification 💻 cs.IT math.IT
keywords legitimateeavesdroppingmonitorperformancestrategiesjammingproposedrelaying
0
0 comments X
read the original abstract

This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are proposed, where the legitimate monitor adaptively acts as an eavesdropper, a jammer or a helper. In addition, the corresponding optimal jamming beamformer and jamming power are presented. Numerical results demonstrate that the proposed strategies attain better performance compared with intuitive benchmark schemes. Moreover, it is revealed that the position of the legitimate monitor plays an important role on the eavesdropping performance for the two strategies.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.