A2 Review article, Literature review, Systematic review
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security (2019)


Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Communications Surveys and Tutorials, 21 (3), 2734-2771. DOI: 10.1109/COMST.2018.2865607


JYU authors or editors


Publication details

All authors or editors: Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q.

Journal or series: IEEE Communications Surveys and Tutorials

ISSN: 2373-745X

eISSN: 1553-877X

Publication year: 2019

Volume: 21

Issue number: 3

Pages range: 2734-2771

Publisher: IEEE

Publication country: United States

Publication language: English

DOI: http://doi.org/10.1109/COMST.2018.2865607

Open Access: Publication channel is not openly available

Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/67170


Abstract

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems.


Keywords: 5G technology; wireless networks; wireless data transmission; data security

Free keywords: physical layer security (PLS); 5G communications; relaying protocols; jamming techniques


Contributing organizations


Ministry reporting: Yes

Reporting Year: 2019

JUFO rating: 2


Last updated on 2020-18-08 at 13:11