
Research Article
Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers
@INPROCEEDINGS{10.1007/978-3-030-41117-6_17, author={Qun Li and Ding Xu}, title={Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers}, proceedings={Communications and Networking. 14th EAI International Conference, ChinaCom 2019, Shanghai, China, November 29 -- December 1, 2019, Proceedings, Part II}, proceedings_a={CHINACOM PART 2}, year={2020}, month={2}, keywords={Legitimate eavesdropping Wireless powered communication Successful eavesdropping probability Collusive eavesdroppers Non-collusiveeavesdroppers}, doi={10.1007/978-3-030-41117-6_17} }
- Qun Li
Ding Xu
Year: 2020
Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers
CHINACOM PART 2
Springer
DOI: 10.1007/978-3-030-41117-6_17
Abstract
This paper considers a suspicious communication network with multiple suspicious source-destination nodes and multiple wireless powered legitimate eavesdroppers, where the legitimate eavesdroppers are assumed to be collusive or non-collusive. A minimum harvested energy constraint is applied at each eavesdropper such that each eavesdropper must harvest a minimum required energy. The legitimate eavesdropping in such a scenario is investigated and our aim is to maximize the average successful eavesdropping probability by optimizing the power splitting ratio at each eavesdropper under the minimum harvested energy constraint. The optimal algorithm is proposed to solve the optimization problem for both collusive eavesdroppers and non-collusive eavesdroppers. Simulation results show that the proposed algorithm achieves the upper bound of the successful eavesdropping probability when the energy harvesting efficiency is large, the required minimum harvested energy is small, or the transmit power of the suspicious source node is high.