Proactive Eavesdropping through a Third-Party Jammer

Ding XU  Qun LI  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E101-A   No.5   pp.878-882
Publication Date: 2018/05/01
Online ISSN: 1745-1337
DOI: 10.1587/transfun.E101.A.878
Type of Manuscript: LETTER
Category: Communication Theory and Signals
Keyword: 
proactive eavesdropping,  legitimate surveillance,  successful eavesdropping probability,  jamming,  

Full Text: PDF(344.2KB)
>>Buy this Article


Summary: 
This letter considers a legitimate proactive eavesdropping scenario, where a half-duplex legitimate monitor hires a third-party jammer for jamming the suspicious communication to improve the eavesdropping performance. The interaction between the third-party jammer and the monitor is modeled as a Stackelberg game, where the jammer moves first and sets the price for jamming the suspicious communication, and then the legitimate monitor moves subsequently and determines the requested transmit power of the jamming signals. We derive the optimal jamming price and the optimal jamming transmit power. It is shown that the proposed price-based proactive eavesdropping scheme is effective in improving the successful eavesdropping probability compared to the case without jamming. It is also shown that the proposed scheme outperforms the existing full-duplex scheme when the residual self-interference cannot be neglected.