Legitimate eavesdropping with wireless powered proactive full-duplex eavesdroppers

Q Li - 2021 IEEE Wireless Communications and Networking …, 2021 - ieeexplore.ieee.org
In this paper, legitimate eavesdropping in a point-to-point suspicious communication
network with multiple wireless powered full-duplex legitimate eavesdroppers is investigated …

Power and location optimization of full-duplex relay for proactive eavesdropping networks

R Ma, H Wu, J Ou, Q Peng, Y Gao - IEEE Access, 2020 - ieeexplore.ieee.org
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay
and a legitimate monitor over the wireless-powered suspicious communication network …

Secure communication with a wireless powered full-duplex eavesdropper

Q Li, D Xu - 2019 IEEE 19th International Conference on …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer secure communication of a three node multicarrier
network with a legitimate transmitter, a legitimate receiver, and a wireless powered full …

Proactive eavesdropping via jamming for ergodic rate maximization over wireless-powered multichannel suspicious system

G Hu, Y Cai - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter studies the proactive eavesdropping with one half-duplex legitimate monitor (E)
over the wireless-powered multichannel suspicious system, where the suspicious transmitter …

Proactive eavesdropping with masked power beacon for energy-constrained suspicious communication

G Hu, Y Cai - IEEE Access, 2019 - ieeexplore.ieee.org
This paper studies the proactive eavesdropping for the potential energy-constrained
suspicious communication system with one full-duplex-enabled legitimate monitor …

Proactive eavesdropping via opportunistic energy transfer and jamming for wireless-powered suspicious communication

G Hu, J Si, Y Cai, N Al-Dhahir - IEEE Transactions on Green …, 2021 - ieeexplore.ieee.org
This paper investigates the information surveillance with a half-duplex legitimate monitor (E)
for wireless-powered suspicious communication in Internet of Things networks, which …

Jammer-assisted legitimate eavesdropping in wireless powered suspicious communication networks

D Xu, H Zhu, Q Li - IEEE Access, 2019 - ieeexplore.ieee.org
To enhance public safety, it is necessary to legitimately eavesdrop communication between
suspicious users, such as terrorists and criminals. In this paper, we investigate legitimate …

Secure Transmission in Multicarrier Power-Splitting Wireless Powered Communication Networks with Full-duplex Receivers

Q Li, D Xu - 2019 IEEE 19th International Conference on …, 2019 - ieeexplore.ieee.org
We consider a three-node multicarrier network consisting of a source node, a wireless
powered full-duplex destination node, and an eavesdropper. The destination node is …

Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications

Z Mobini, M Mohammadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Wireless energy harvesting, physical-layer security, and full-duplex wireless are important,
emerging fifth generation (5G) technologies. In this paper, we thus investigate a source …

Secrecy profits analysis of wireless-powered networks against randomly distributed eavesdroppers

S Wang, L Zhao, K Liang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
The network profit is an effective performance metric to improve the flexibility of network
deployment by the operators to adjust the network setting and data prices according to the …