JOURNAL ARTICLE

Proactive Eavesdropping in Two-Way Amplify-and-Forward Relay Networks

Guojie HuJian OuyangYueming CaiYunlong Cai

Year: 2020 Journal:   IEEE Systems Journal Vol: 15 (3)Pages: 3415-3426   Publisher: Institute of Electrical and Electronics Engineers

Abstract

This article considers a proactive eavesdropping scenario, where two suspicious nodes exchange their information via one suspicious relay in two phases, the process of which is under the supervision of one legitimate monitor. Specifically, these two suspicious nodes broadcast their suspicious data in phase 1 and the relay forwards the amplified version of its received signal in phase 2, according to which two proactive eavesdropping strategies, i.e., "passive eavesdropping first" and "jamming first," are designed. Using the former strategy, the monitor proceeds eavesdropping with a minimum-mean-squar-error (MMSE) receiver in phase 1 and implements eavesdropping or simultaneous assisting and jamming in phase 2. Using the latter strategy, the monitor implements jamming in phase 1 and performs eavesdropping in phase 2. For these strategies, we provide the detailed analysis and formulate the corresponding optimization problems of sum eavesdropping rate maximization subject to finite transmit power of the monitor, each of which is then solved by carefully designing the power allocation scheme or the assisting/jamming beamformer at the legitimate monitor. In addition, for the "passive eavesdropping first" strategy, we also consider a more advanced MMSE with a successive interference cancellation (SIC) receiver and concurrently exploit the time-sharing (TS) technique to further improve the eavesdropping rate. Finally, simulation results indicate that the "passive eavesdropping first" strategy is more preferable compared to the "jamming first" strategy, and the SIC and TS are preferable for promoting the more effective eavesdropping.

Keywords:
Eavesdropping Jamming Computer science Relay Computer network Phase (matter) Interference (communication) Power (physics) Exploit Computer security Channel (broadcasting)

Metrics

13
Cited By
0.98
FWCI (Field Weighted Citation Impact)
37
Refs
0.77
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Full-Duplex Wireless Communications
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cooperative Communication and Network Coding
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Capacity Optimization of Two-way Amplify-and Forward Relay Networks

Mohammad Abu HanifMoon Ho LeeJu Yong Park

Journal:   Journal of the Institute of Electronics and Information Engineers Year: 2013 Vol: 50 (1)Pages: 27-33
JOURNAL ARTICLE

Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks

Quanzhong LiQi ZhangJiayin Qin

Journal:   IEEE Transactions on Vehicular Technology Year: 2016 Vol: 65 (11)Pages: 9006-9019
© 2026 ScienceGate Book Chapters — All rights reserved.