mdh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Proactive attack: A strategy for legitimate eavesdropping
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Blekinge Institute of Technology, Karlskrona, Sweden.
2016 (English)In: 2016 IEEE 6th International Conference on Communications and Electronics, IEEE ICCE 2016, 2016, 457-461 p.Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we study a novel approach to eavesdrop the messages of suspicious users for a surveillance purpose. In particular, we consider a scenario in which the legitimate monitor can act as a jamming source and a decode-And-forward relay station that can force the suspicious users to reveal their exchanged messages. Accordingly, the power allocation policies for the jamming signal of the legitimate monitor subject to deterministic and non-deterministic interference channels are considered. On this basis, we derive a closed-form expression for the successful eavesdropping probability to evaluate the system performance. More importantly, our results reveal that the successful eavesdropping probability of the non-deterministic interference channel from the legitimate monitor to the suspicious receiver outperforms the one of the deterministic interference channel. 

Place, publisher, year, edition, pages
2016. 457-461 p.
Keyword [en]
Cognitive Radio Networks, Performance Analysis, Physical Layer Security, Power Allocation, Secrecy Capacity, Spectrum Underlay Networks, Cognitive radio, Communication channels (information theory), Jamming, Network layers, Security systems, Cognitive radio network, Power allocations, Underlay networks, Signal interference
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:mdh:diva-33403DOI: 10.1109/CCE.2016.7562679ISI: 000389228000075Scopus ID: 2-s2.0-84988859921ISBN: 9781509019311 (print)OAI: oai:DiVA.org:mdh-33403DiVA: diva2:1034745
Conference
6th IEEE International Conference on Communications and Electronics, IEEE ICCE 2016, 27 July 2016 through 29 July 2016
Available from: 2016-10-13 Created: 2016-10-13 Last updated: 2016-12-29Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Tran, Hung
By organisation
Embedded Systems
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 123 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf