Stones From Other Hills Can Polish the Jade: Exploiting Wireless-Powered Cooperative Jamming for Boosting Wireless Information Surveillance

Guojie Hu,Jiangbo Si,Zan Li,Yunlong Cai,Hang Hu,Naofal Al-Dhahir
DOI: https://doi.org/10.1109/tcomm.2022.3218778
IF: 6.166
2023-01-18
IEEE Transactions on Communications
Abstract:This paper studies information surveillance over wireless-powered suspicious multiuser communications, where multiple suspicious transmitters (STs) first harvest wireless energy from the suspicious power beacon (PB) in phase I and then communicate with the suspicious destination (SD) in phase II over mutually orthogonal channels, and there is a legitimate monitor (M) aiming to overhear the suspicious signals of the STs based on wireless-powered cooperative jamming. Specifically, the jammers first harvest energy from M in phase I and then interfere with the SD in phase II. Considering the fairness issue, M aims to maximize the minimum eavesdropping success probability of these suspicious signals, by jointly optimizing its transmit power in phase I and the jammers' power allocations in phase II. To solve the problem, first we strictly prove that M should exhaust its maximum power for the energy transfer, even the additional energy can be harvested by the STs to enhance their transmit power and rate. Then, the general successive convex approximation (SCA) technique and one low-complexity solution are respectively proposed to optimize the jammers' power allocations. Further, the closed-form jamming power allocations are derived in the high signal-to-noise ratio range to reveal some interesting insights. The joint deployments of M and the jammers are also investigated to enhance the eavesdropping performance. Simulation results show the effectiveness of our proposed schemes compared to competitive benchmarks.
telecommunications,engineering, electrical & electronic
What problem does this paper attempt to address?