solidot新版网站常见问题,请点击这里查看。
消息
本文已被查看267次
Wireless Surveillance of Two-Hop Communications. (arXiv:1704.07629v1 [cs.IT])
来源于:arXiv
Wireless surveillance is becoming increasingly important to protect the
public security by legitimately eavesdropping suspicious wireless
communications. This paper studies the wireless surveillance of a two-hop
suspicious communication link by a half-duplex legitimate monitor. By exploring
the suspicious link's two-hop nature, the monitor can adaptively choose among
the following three eavesdropping modes to improve the eavesdropping
performance: (I) \emph{passive eavesdropping} to intercept both hops to decode
the message collectively, (II) \emph{proactive eavesdropping} via {\emph{noise
jamming}} over the first hop, and (III) \emph{proactive eavesdropping} via
{\emph{hybrid jamming}} over the second hop. In both proactive eavesdropping
modes, the (noise/hybrid) jamming over one hop is for the purpose of reducing
the end-to-end communication rate of the suspicious link and accordingly making
the interception more easily over the other hop. Under this setup, we maximize
the eavesdropp 查看全文>>