Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 134 tok/s
Gemini 2.5 Pro 41 tok/s Pro
GPT-5 Medium 28 tok/s Pro
GPT-5 High 33 tok/s Pro
GPT-4o 70 tok/s Pro
Kimi K2 205 tok/s Pro
GPT OSS 120B 428 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Proactive Eavesdropping via Cognitive Jamming in Fading Channels (1512.02754v2)

Published 9 Dec 2015 in cs.IT and math.IT

Abstract: To enhance the national security, there is a growing need for government agencies to legitimately monitor suspicious communication links for preventing intended crimes and terror attacks. In this paper, we propose a new wireless information surveillance paradigm by investigating a scenario where a legitimate monitor aims to intercept a suspicious wireless communication link over fading channels. The legitimate monitor can successfully eavesdrop (decode) the information of the suspicious link at each fading state only when its achievable data rate is no smaller than that at the suspicious receiver. In practice, such legitimate eavesdropping is particularly challenging, since the legitimate monitor may be far away from the suspicious transmitter and cannot eavesdrop efficiently. To overcome this issue, we propose a new approach, namely proactive eavesdropping via cognitive jamming, in which the legitimate monitor purposely jams the receiver so as to change the suspicious communication (e.g., to a smaller data rate) for overhearing more efficiently. In particular, we consider delay-sensitive and delay-tolerant applications for the suspicious data communications, under which the legitimate monitor maximizes the eavesdropping non-outage probability for event-based monitoring and the relative eavesdropping rate for content analysis, respectively, by optimizing its jamming power allocation over different fading states subject to an average power constraint. Numerical results show that the proposed proactive eavesdropping via cognitive jamming approach greatly outperforms the conventional passive eavesdropping without jamming and the proactive eavesdropping with constant-power jamming.

Citations (131)

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube