A three-party hierarchical game for physical layer security aware wireless communications with dynamic trilateral coalitions

R Chen, C Yi, K Zhu, B Chen, J Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, a novel hierarchical game framework for physical layer security (PLS) aware
wireless communications with dynamic trilateral coalitions is studied. In the considered …

Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength

D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …

Intelligent reflecting surface-assisted proactive eavesdropping over suspicious broadcasting communication with statistical CSI

G Hu, J Si, Y Cai, N Al-Dhahir - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
This paper studies a novel wireless surveillance scenario, where a half-duplex legitimate
monitor (E), aided by an intelligent reflecting surface (IRS), aims to eavesdrop the frequency …

Cooperative double-IRS aided proactive eavesdropping

Y Cao, L Duan, M Jin, N Zhao - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Proactive eavesdropping was used recently to efficiently intercept a suspicious wireless
communication link, by jamming the suspicious destination node. However, While jamming …

Proactive eavesdropping via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection

F Feizi, M Mohammadi, Z Mobini… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper investigates the application of full-duplex (FD) multi-antenna transceivers in
proactive eavesdropping systems. To this end, we jointly optimize the transmit and receive …

Proactive eavesdropping with jamming and eavesdropping mode selection

J Moon, SH Lee, H Lee, I Lee - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
In this paper, we study a legitimate proactive eavesdropping scenario where a central
monitor covertly wiretaps the communications between a pair of suspicious users via …

Energy efficiency for proactive eavesdropping in cooperative cognitive radio networks

Y Ge, PC Ching - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
This article investigates a distant proactive eavesdropping system in cooperative cognitive
radio (CR) networks. Specifically, an amplify-and-forward (AF) full-duplex (FD) secondary …

Enhanced secrecy performance of multihop IoT networks with cooperative hybrid-duplex jamming

Z Abdullah, G Chen, MAM Abdullah… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As the number of connected devices is exponentially increasing, security in Internet of
Things (IoT) networks presents a major challenge. Accordingly, in this work we investigate …

A proactive eavesdropping game in MIMO systems based on multiagent deep reinforcement learning

D Guo, H Ding, L Tang, X Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper considers an adversarial scenario between a legitimate eavesdropper and a
suspicious communication pair. All three nodes are equipped with multiple antennas. The …

Legitimate surveillance of suspicious computation offloading in mobile edge computing networks

D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
In this paper, the legitimate surveillance of a suspicious mobile edge computing (MEC)
network consisting of a suspicious edge server (SES) and multiple suspicious users (SUs) …