Conferences related to Eavesdropping

Back to Top

2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)

This symposium pertains to the field of electromagnetic compatibility.


2020 IEEE Wireless Communications and Networking Conference (WCNC)

IEEE WCNC is the world premier wireless event that brings together industry professionals, academics, and individuals from government agencies and other institutions to exchange information and ideas on the advancement of wireless communications and networking technology. The conference will feature a comprehensive technical program offering numerous technical sessions with papers showcasing the latest technologies, applications and services. In addition, the conference program includes workshops, tutorials, keynote talks from industrial leaders and renowned academics, panel discussions, a large exhibition, business and industrial forums.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


More Conferences

Periodicals related to Eavesdropping

Back to Top

Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Eavesdropping

Back to Top

Xplore Articles related to Eavesdropping

Back to Top

Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

IEEE Access, 2018

In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general objective is to maximize EEE while all the suspicious links are eavesdropped, which can be accomplished through either jamming or assisting each suspicious link at ...


Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links

IEEE Transactions on Vehicular Technology, 2019

This paper studies the wireless surveillance of multiple suspicious communication links. We propose a cooperative eavesdropping scheme, where a primary legitimate monitor and an assistant legitimate monitor cooperatively jam the suspicious links for an effective proactive eavesdropping. The objective is to maximize the eavesdropping energy efficiency (EEE) of our proposed cooperative eavesdropping scheme, by optimizing jamming power allocation and the ...


Hybrid eavesdropping approach against energy-ratio-based detection

2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), 2017

There is a growing need for government agencies to prevent crimes and terror attacks by legitimately monitoring suspicious communication links. In this paper, two concepts named eavesdropping rate and eavesdropping outage probability are defined to evaluate the eavesdropping performance of legitimate monitor. Against the energy-ratio-based detection exploited by suspicious users, a hybrid eavesdropping approach is proposed. The hybrid eavesdropping approach ...


A Method for Selecting Jamming Nodes Considering SINR to Prevent Eavesdropping in Wireless Networks

2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), 2017

In wireless networks, transmitted data packets from a sender node are broadcasted in a specific area around the node. Therefore, not only receiver nodes but also eavesdropper nodes can receive data packets from sender nodes. In this paper, we propose a method for preventing eavesdropping in wireless networks. In the proposed method, some nodes neighboring sender nodes transmit jamming signals ...


Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks

IEEE Access, 2019

To enhance public safety, it is necessary to legitimately eavesdrop communication between suspicious users, such as terrorists and criminals. In this paper, we investigate legitimate eavesdropping in a wireless-powered suspicious communication network (WPSCN) with a wireless-powered suspicious transmitter and a suspicious receiver, who is legitimately eavesdropped by a legitimate monitor with the help from a wireless-powered friendly jammer. The “harvest-then-transmit” ...


More Xplore Articles

Educational Resources on Eavesdropping

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Eavesdropping"

IEEE-USA E-Books

  • Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System

    In this paper, we investigate the legitimate surveillance of wireless communication system, which includes multiple suspicious links. We propose a novel objective of eavesdropping energy efficiency (EEE) to value the performance of eavesdropping. Our general objective is to maximize EEE while all the suspicious links are eavesdropped, which can be accomplished through either jamming or assisting each suspicious link at a suspicious receiver under the consideration of many practical limitations, such as transmission strategy of a suspicious transmitter, power budget of legitimate monitor (LM), and eavesdropping ratio of a whole system. The formulated problem leads to a challenging mixed-integer nonlinear programming (MINLP) problem. To solve this problem, we propose a novel eavesdropping scheme by the special characteristic of eavesdropping, and the complex MINLP problem can be transformed to a concave optimization problem by a series of transformations, which can be solved by the Lagrange multiplier method. Considering the infeasibility of our proposed eavesdropping scheme when the power of LM is insufficient to eavesdrop all the suspicious links, we propose a heuristic algorithm to obtain a tradeoff between EEE and eavesdropping ratio. Numerical results show that our proposed eavesdropping schemes outperform the proactive jamming scheme and the average-power eavesdropping scheme.

  • Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links

    This paper studies the wireless surveillance of multiple suspicious communication links. We propose a cooperative eavesdropping scheme, where a primary legitimate monitor and an assistant legitimate monitor cooperatively jam the suspicious links for an effective proactive eavesdropping. The objective is to maximize the eavesdropping energy efficiency (EEE) of our proposed cooperative eavesdropping scheme, by optimizing jamming power allocation and the cooperative strategy of legitimate monitors subject to several constraints, i.e., energy transfer constraint and eavesdropping load balancing constraint. Furthermore, the formulated problem is a difficult mixed integer nonlinear programming problem and, therefore, is non-convex and combinational. To solve the problem efficiently, a threshold-based policy of optimal jamming power allocation is proposed. Therefore, the original optimization problem is decoupled into two sub-problems: the selection of optimal eavesdropper under the given jammer and the whole EEE maximization over the selection of optimal jammer. Numerical results show that our proposed cooperative eavesdropping achieves higher EEE and eavesdropping rate than non- cooperative proactive eavesdropping.

  • Hybrid eavesdropping approach against energy-ratio-based detection

    There is a growing need for government agencies to prevent crimes and terror attacks by legitimately monitoring suspicious communication links. In this paper, two concepts named eavesdropping rate and eavesdropping outage probability are defined to evaluate the eavesdropping performance of legitimate monitor. Against the energy-ratio-based detection exploited by suspicious users, a hybrid eavesdropping approach is proposed. The hybrid eavesdropping approach includes the passive eavesdropping and the active eavesdropping, and switches between them depending on the requirements of eavesdropping performance. Furthermore, two active eavesdropping schemes are given. One is to maximize the eavesdropping rate under pilot spoofing attack power constraint, the other is to minimize the pilot spoofing attack power of monitor by satisfying the eavesdropping rate requirements. The simulation results show that the proposed hybrid eavesdropping approach greatly outperforms conventional passive eavesdropping and pure pilot spoofing attack with constant power, since it increases eavesdropping rate and reduces eavesdropping outage probability significantly.

  • A Method for Selecting Jamming Nodes Considering SINR to Prevent Eavesdropping in Wireless Networks

    In wireless networks, transmitted data packets from a sender node are broadcasted in a specific area around the node. Therefore, not only receiver nodes but also eavesdropper nodes can receive data packets from sender nodes. In this paper, we propose a method for preventing eavesdropping in wireless networks. In the proposed method, some nodes neighboring sender nodes transmit jamming signals to reduce the area in which data packets from sender nodes can be received while still allowing receiver nodes to receive data packets. Jamming nodes are selected in a heuristic manner. Simulation evaluations using comparative methods confirm that performance of the proposed method exceeds that of an alternative method.

  • Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks

    To enhance public safety, it is necessary to legitimately eavesdrop communication between suspicious users, such as terrorists and criminals. In this paper, we investigate legitimate eavesdropping in a wireless-powered suspicious communication network (WPSCN) with a wireless-powered suspicious transmitter and a suspicious receiver, who is legitimately eavesdropped by a legitimate monitor with the help from a wireless-powered friendly jammer. The “harvest-then-transmit” protocol is adopted by the suspicious communication to coordinate wireless energy transfer and information transfer. Both the suspicious receiver and the legitimate monitor can act as power sources for the suspicious transmitter and the jammer. The legitimate monitor can control the suspicious communication rate by broadcasting power signals, while the jammer can harvest energy and then interfere with the suspicious communication in collaboration with the legitimate monitor. Four different metrics are adopted to evaluate the eavesdropping performance based on different application requirements, and they are the successful eavesdropping probability, the average eavesdropping rate, the relative eavesdropping rate, and the eavesdropping energy efficiency. For each performance metric, we derive the optimal transmit power of the monitor for energy transfer and the optimal jamming transmit power of the jammer to maximize the performance metric under the peak transmit power constraint at the monitor and the energy causality constraint at the jammer. Some important insights are derived from these optimal power control policies. The simulations are conducted to verify the proposed optimal power control for legitimate eavesdropping in the WPSCN. It is shown that the proposed optimal power control policies greatly outperform other benchmark schemes.

  • Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems

    This paper investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the eavesdropping non-outage probability, three different eavesdropping modes are proposed, where the legitimate monitor can adaptively perform eavesdropping or jamming. Optimal jamming power design and exact closed-formed expressions of the eavesdropping non-outage probability for each mode are presented. Numerical results reveal that the eavesdropping mode selection significantly improves the eavesdropping non-outage probability.

  • Eavesdropping activities in wireless networks: impact of channel randomness

    This paper presents a novel analytical model to investigate the eavesdropping attacks in wireless networks in the presence of channel randomness with emphasis on the shadow fading effect and Rayleigh fading effect. Our numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect, Rayleigh fading effect and the antenna models. In particular, we find that the shadow fading effect is beneficial to the eavesdropping probability while both the path loss effect and Rayleigh fading effect are detrimental. Besides, using directional antennas at eavesdroppers can also increase the eavesdropping probability. This study provides us with some useful insights that may help us to better protect the confidential communications.

  • Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing

    In this paper, we consider a legitimate proactive eavesdropping scenario where a distant central monitor covertly wiretaps the communication between a pair of suspicious users via several multi-antenna full-duplex spoofing relays and a multi-antenna cooperative jammer. Assuming an adaptive transmission policy at the suspicious users, the spoofing relays not only intercept but also forward the manipulated information to control the data rate of the suspicious users in collaboration with the jammer. We provide a technique which jointly optimizes the receive combining vector at the central monitor, the precoders at the relays, and the transmit covariance matrix at the jammer for maximizing the eavesdropping rate. To reveal some fundamental properties of the optimal operation, we first study a single-relay system. It is shown that when the central monitor experiences a poor eavesdropping channel link, the spoofing relay and the jammer should transmit destructive signals and jamming signals, respectively. In this case, the suspicious users are forced to decrease their data rate, while the intercepted information can be successfully decoded by the central monitor. On the other hand, when the eavesdropping channel condition is favorable, the spoofing relay forwards constructive signals to further increase the data rate at the suspicious users in a way that more information can be intercepted from the suspicious users. We then formulate a general eavesdropping rate maximization problem for multiple relays and present a semi-definite relaxation approach. A low-complexity design is also proposed based on our analysis for the single-relay system. Simulation results verify the efficiency of the proposed solutions compared to other baseline schemes in various practical setups.

  • The impact of mitigation of eavesdropping on wireless sensor networks lifetime

    Wireless sensor networks (WSNs) consist of tiny sensor nodes distributed over a specific geographical area. Eavesdropping can be considered as an attack against WSNs when an adversary node overhears the transmissions among the sensor nodes. Hence a WSN needs to minimize the risk of overhearing in order to operate safely. One of the most important performance metrics of WSNs is network lifetime. Decreasing the transmission power levels of the nodes in order to reduce the overhearing can negatively affect the network lifetime due to the suboptimal routing paths that are used. In this study, two optimization models are developed to jointly reduce eavesdropping and increase the network lifetime. The analysis of the relationship between eavesdropping and network lifetime is investigated by using the proposed optimization models. As a result of this study, it was observed that the minimum reduction of eavesdropping causes a significant decrement in network lifetime and when the overhearing limit is extended to a certain level, the network lifetime converges to the maximum.

  • Counter direction jamming method for eavesdropping prevention in Data Center Interconnects

    We present a protection scheme based on counter direction jamming method to prevent optical eavesdropping attempts in high spectral efficiency and short distance links compliant with Data Center Interconnect requirements.



Standards related to Eavesdropping

Back to Top

No standards are currently tagged "Eavesdropping"


Jobs related to Eavesdropping

Back to Top