Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems
Pages 6078 - 6091
Abstract
This paper studies the performance of multi-antenna proactive eavesdropping in 5G uplink systems with spatially correlated Rayleigh fadings, where the base station (BS) serves an illegal user and a multi-antenna legitimate monitor eavesdrops the suspicious link with the help of jamming attack. Based on a practical assumption of channel state information (CSI) in 5G uplink, i.e., imperfect instantaneous CSI of the suspicious link at the BS and that of eavesdropping link at the monitor, and only jamming channel statistics at the monitor, we first give a statistical jamming beamforming design. Then, semi-closed form expressions of eavesdropping non-outage probability and relative average eavesdropping rate are, respectively, derived for delay-sensitive and delay-tolerant scenarios. Via reasonable approximations and asymptotic analysis, we gain many insights on the effect of key system parameters, e.g., location-dependent channel path loss and angular spread, jamming energy and the number of antennas. Further, we provide the optimal energy allocation between pilot and data jamming and the optimal antenna allocation between jamming and eavesdropping under total energy constraint and total antenna number, respectively, which are both explicit functions of system parameters. Finally, simulation results validate our analytical results.
References
[1]
Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.
[2]
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962–4974, Oct. 2013.
[3]
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[4]
A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
[5]
J. Xu, L. Duan, and R. Zhang, “Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm,” IEEE Wireless Commun., vol. 24, no. 4, pp. 152–159, Aug. 2017.
[6]
H. Lu, H. Zhang, H. Dai, W. Wu, and B. Wang, “Proactive eavesdropping in UAV-aided suspicious communication systems,” IEEE Trans. Veh. Technol., vol. 68, no. 2, pp. 1993–1997, Feb. 2019.
[7]
P. Li, H. Zhang, W. Wu, H. Dai, and B. Wang, “Proactive eavesdropping via jamming in cognitive radio networks,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6.
[8]
J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via cognitive jamming in fading channels,” IEEE Trans. Wireless Commun., vol. 16, no. 5, pp. 2790–2806, May 2017.
[9]
J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels,” IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 80–83, Feb. 2016.
[10]
Y. Zeng and R. Zhang, “Wireless information surveillance via proactive eavesdropping with spoofing relay,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1449–1461, Dec. 2016.
[11]
J. Moon, H. Lee, C. Song, S. Kang, and I. Lee, “Relay-assisted proactive eavesdropping with cooperative jamming and spoofing,” IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6958–6971, Oct. 2018.
[12]
C. Zhang, Y. Huang, Y. Jing, S. Jin, and L. Yang, “Sum-rate analysis for massive MIMO downlink with joint statistical beamforming and user scheduling,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2181–2194, Apr. 2017.
[13]
H. Cai, Q. Zhang, Q. Li, and J. Qin, “Proactive monitoring via jamming for rate maximization over MIMO Rayleigh fading channels,” IEEE Commun. Lett., vol. 21, no. 9, pp. 2021–2024, Sep. 2017.
[14]
C. Zhong, X. Jiang, F. Qu, and Z. Zhang, “Multi-antenna wireless legitimate surveillance systems: Design and performance analysis,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4585–4599, Jul. 2017.
[15]
Y. Cai, C. Zhao, Q. Shi, G. Y. Li, and B. Champagne, “Joint beamforming and jamming design for mmWave information surveillance systems,” IEEE J. Sel. Areas Commun., vol. 36, no. 7, pp. 1410–1425, Jul. 2018.
[16]
H. Zhang, L. Duan, and R. Zhang, “Jamming-assisted proactive eavesdropping over two suspicious communication links,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4817–4830, Jul. 2020.
[17]
F. Feizi, M. Mohammadi, Z. Mobini, and C. Tellambura, “Proactive eavesdropping via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7563–7577, Dec. 2020.
[18]
J. Moon, S. H. Lee, H. Lee, and I. Lee, “Proactive eavesdropping with jamming and eavesdropping mode selection,” IEEE Trans. Wireless Commun., vol. 18, no. 7, pp. 3726–3738, Jul. 2019.
[19]
S. Huang, Q. Zhang, Q. Li, and J. Qin, “Robust proactive monitoring via jamming with deterministically bounded channel errors,” IEEE Signal Process. Lett., vol. 25, no. 5, pp. 690–694, May 2018.
[20]
X. Lu, W. Yang, Y. Cai, and X. Guan, “Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems,” IEEE Access, vol. 7, pp. 151295–151306, 2019.
[21]
L. Wan, G. Zhang, M. Cui, and F. Lin, “Proactive eavesdropping via pilot contamination and jamming,” Wireless Pers. Commun., vol. 99, no. 3, pp. 1405–1421, Apr. 2018.
[22]
X. Zhou, B. Maham, and A. Hjorungnes, “Pilot contamination for active eavesdropping,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 903–907, Mar. 2012.
[23]
A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and opportunities,” IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652, Sep. 2014.
[24]
C. Zhang, Y. Jing, Y. Huang, and L. Yang, “Interleaved training and training-based transmission design for hybrid massive antenna downlink,” IEEE J. Sel. Topics Signal Process., vol. 12, no. 3, pp. 541–556, Jun. 2018.
[25]
J. Brady, N. Behdad, and A. M. Sayeed, “Beamspace MIMO for millimeter-wave communications: System architecture, modeling, analysis, and measurements,” IEEE Trans. Antennas Propag., vol. 61, no. 7, pp. 3814–3827, Jul. 2013.
[26]
M. Biguesh and A. B. Gershman, “Training-based MIMO channel estimation: A study of estimator tradeoffs and optimal training signals,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 884–893, Mar. 2006.
[27]
M. Sadek, A. Tarighat, and A. H. Sayed, “A leakage-based precoding scheme for downlink multi-user MIMO channels,” IEEE Trans. Wireless Commun., vol. 6, no. 5, pp. 1711–1721, May 2007.
[28]
S. Atapattu, C. Tellambura, and H. Jiang, “A mixture gamma distribution to model the SNR of wireless channels,” IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 4193–4203, Dec. 2011.
[29]
S. Atapattu, R. Fan, P. Dharmawansa, G. Wang, J. Evans, and T. A. Tsiftsis, “Reconfigurable intelligent surface assisted two-way communications: Performance analysis and optimization,” IEEE Trans. Commun., vol. 68, no. 10, pp. 6552–6567, Oct. 2020.
[30]
A. V. Lazo and P. Rathie, “On the entropy of continuous probability distributions (corresp.),” IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 120–122, Jan. 1978.
[31]
S. Lu and Z. Wang, “Training optimization and performance of single cell uplink system with massive-antennas base station,” IEEE Trans. Commun., vol. 67, no. 2, pp. 1570–1585, Feb. 2019.
[32]
R. Muharar, “Optimal power allocation and training duration for uplink multiuser massive MIMO systems with MMSE receivers,” IEEE Access, vol. 8, pp. 23378–23390, 2020.
[33]
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.
Recommendations
Achievable sum-rate analysis of correlated two-antenna MIMO uplink channels
This paper analyzes the achievable sum-rate of correlated two-antenna multiple-input multiple-output (MIMO) uplink channels. Most of previous works have considered the case when a single user has multiple transmit antennas (i.e. multi-antenna single-...
Proactive Eavesdropping via Pilot Contamination and Jamming
Proactive eavesdropping is a new paradigm shift in wireless physical layer security from preventing conventional eavesdropping attacks to legitimate intercepting suspicious communications, which has attracted a lot of attention recently. Pilot ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
1536-1276 © 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.
Publisher
IEEE Press
Publication History
Published: 01 September 2023
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025