Proactive attack: A strategy for legitimate eavesdropping | IEEE Conference Publication | IEEE Xplore