Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Performance of Multi-Antenna Proactive Eavesdropping in 5G Uplink Systems

Published: 01 September 2023 Publication History

Abstract

This paper studies the performance of multi-antenna proactive eavesdropping in 5G uplink systems with spatially correlated Rayleigh fadings, where the base station (BS) serves an illegal user and a multi-antenna legitimate monitor eavesdrops the suspicious link with the help of jamming attack. Based on a practical assumption of channel state information (CSI) in 5G uplink, i.e., imperfect instantaneous CSI of the suspicious link at the BS and that of eavesdropping link at the monitor, and only jamming channel statistics at the monitor, we first give a statistical jamming beamforming design. Then, semi-closed form expressions of eavesdropping non-outage probability and relative average eavesdropping rate are, respectively, derived for delay-sensitive and delay-tolerant scenarios. Via reasonable approximations and asymptotic analysis, we gain many insights on the effect of key system parameters, e.g., location-dependent channel path loss and angular spread, jamming energy and the number of antennas. Further, we provide the optimal energy allocation between pilot and data jamming and the optimal antenna allocation between jamming and eavesdropping under total energy constraint and total antenna number, respectively, which are both explicit functions of system parameters. Finally, simulation results validate our analytical results.

References

[1]
Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.
[2]
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962–4974, Oct. 2013.
[3]
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[4]
A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
[5]
J. Xu, L. Duan, and R. Zhang, “Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm,” IEEE Wireless Commun., vol. 24, no. 4, pp. 152–159, Aug. 2017.
[6]
H. Lu, H. Zhang, H. Dai, W. Wu, and B. Wang, “Proactive eavesdropping in UAV-aided suspicious communication systems,” IEEE Trans. Veh. Technol., vol. 68, no. 2, pp. 1993–1997, Feb. 2019.
[7]
P. Li, H. Zhang, W. Wu, H. Dai, and B. Wang, “Proactive eavesdropping via jamming in cognitive radio networks,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6.
[8]
J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via cognitive jamming in fading channels,” IEEE Trans. Wireless Commun., vol. 16, no. 5, pp. 2790–2806, May 2017.
[9]
J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels,” IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 80–83, Feb. 2016.
[10]
Y. Zeng and R. Zhang, “Wireless information surveillance via proactive eavesdropping with spoofing relay,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1449–1461, Dec. 2016.
[11]
J. Moon, H. Lee, C. Song, S. Kang, and I. Lee, “Relay-assisted proactive eavesdropping with cooperative jamming and spoofing,” IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6958–6971, Oct. 2018.
[12]
C. Zhang, Y. Huang, Y. Jing, S. Jin, and L. Yang, “Sum-rate analysis for massive MIMO downlink with joint statistical beamforming and user scheduling,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2181–2194, Apr. 2017.
[13]
H. Cai, Q. Zhang, Q. Li, and J. Qin, “Proactive monitoring via jamming for rate maximization over MIMO Rayleigh fading channels,” IEEE Commun. Lett., vol. 21, no. 9, pp. 2021–2024, Sep. 2017.
[14]
C. Zhong, X. Jiang, F. Qu, and Z. Zhang, “Multi-antenna wireless legitimate surveillance systems: Design and performance analysis,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4585–4599, Jul. 2017.
[15]
Y. Cai, C. Zhao, Q. Shi, G. Y. Li, and B. Champagne, “Joint beamforming and jamming design for mmWave information surveillance systems,” IEEE J. Sel. Areas Commun., vol. 36, no. 7, pp. 1410–1425, Jul. 2018.
[16]
H. Zhang, L. Duan, and R. Zhang, “Jamming-assisted proactive eavesdropping over two suspicious communication links,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4817–4830, Jul. 2020.
[17]
F. Feizi, M. Mohammadi, Z. Mobini, and C. Tellambura, “Proactive eavesdropping via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7563–7577, Dec. 2020.
[18]
J. Moon, S. H. Lee, H. Lee, and I. Lee, “Proactive eavesdropping with jamming and eavesdropping mode selection,” IEEE Trans. Wireless Commun., vol. 18, no. 7, pp. 3726–3738, Jul. 2019.
[19]
S. Huang, Q. Zhang, Q. Li, and J. Qin, “Robust proactive monitoring via jamming with deterministically bounded channel errors,” IEEE Signal Process. Lett., vol. 25, no. 5, pp. 690–694, May 2018.
[20]
X. Lu, W. Yang, Y. Cai, and X. Guan, “Proactive eavesdropping via covert pilot spoofing attack in multi-antenna systems,” IEEE Access, vol. 7, pp. 151295–151306, 2019.
[21]
L. Wan, G. Zhang, M. Cui, and F. Lin, “Proactive eavesdropping via pilot contamination and jamming,” Wireless Pers. Commun., vol. 99, no. 3, pp. 1405–1421, Apr. 2018.
[22]
X. Zhou, B. Maham, and A. Hjorungnes, “Pilot contamination for active eavesdropping,” IEEE Trans. Wireless Commun., vol. 11, no. 3, pp. 903–907, Mar. 2012.
[23]
A. Sabharwal, P. Schniter, D. Guo, D. W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and opportunities,” IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1637–1652, Sep. 2014.
[24]
C. Zhang, Y. Jing, Y. Huang, and L. Yang, “Interleaved training and training-based transmission design for hybrid massive antenna downlink,” IEEE J. Sel. Topics Signal Process., vol. 12, no. 3, pp. 541–556, Jun. 2018.
[25]
J. Brady, N. Behdad, and A. M. Sayeed, “Beamspace MIMO for millimeter-wave communications: System architecture, modeling, analysis, and measurements,” IEEE Trans. Antennas Propag., vol. 61, no. 7, pp. 3814–3827, Jul. 2013.
[26]
M. Biguesh and A. B. Gershman, “Training-based MIMO channel estimation: A study of estimator tradeoffs and optimal training signals,” IEEE Trans. Signal Process., vol. 54, no. 3, pp. 884–893, Mar. 2006.
[27]
M. Sadek, A. Tarighat, and A. H. Sayed, “A leakage-based precoding scheme for downlink multi-user MIMO channels,” IEEE Trans. Wireless Commun., vol. 6, no. 5, pp. 1711–1721, May 2007.
[28]
S. Atapattu, C. Tellambura, and H. Jiang, “A mixture gamma distribution to model the SNR of wireless channels,” IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 4193–4203, Dec. 2011.
[29]
S. Atapattu, R. Fan, P. Dharmawansa, G. Wang, J. Evans, and T. A. Tsiftsis, “Reconfigurable intelligent surface assisted two-way communications: Performance analysis and optimization,” IEEE Trans. Commun., vol. 68, no. 10, pp. 6552–6567, Oct. 2020.
[30]
A. V. Lazo and P. Rathie, “On the entropy of continuous probability distributions (corresp.),” IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 120–122, Jan. 1978.
[31]
S. Lu and Z. Wang, “Training optimization and performance of single cell uplink system with massive-antennas base station,” IEEE Trans. Commun., vol. 67, no. 2, pp. 1570–1585, Feb. 2019.
[32]
R. Muharar, “Optimal power allocation and training duration for uplink multiuser massive MIMO systems with MMSE receivers,” IEEE Access, vol. 8, pp. 23378–23390, 2020.
[33]
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications  Volume 22, Issue 9
Sept. 2023
699 pages

Publisher

IEEE Press

Publication History

Published: 01 September 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media