A2 Review article, Literature review, Systematic review
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security (2019)
Jameel, F., Wyne, S., Kaddoum, G., & Duong, T. Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Communications Surveys and Tutorials, 21(3), 2734-2771. https://doi.org/10.1109/COMST.2018.2865607
JYU authors or editors
Publication details
All authors or editors: Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q.
Journal or series: IEEE Communications Surveys and Tutorials
ISSN: 2373-745X
eISSN: 1553-877X
Publication year: 2019
Volume: 21
Issue number: 3
Pages range: 2734-2771
Publisher: IEEE
Publication country: United States
Publication language: English
DOI: https://doi.org/10.1109/COMST.2018.2865607
Publication open access: Not open
Publication channel open access:
Publication is parallel published (JYX): https://jyx.jyu.fi/handle/123456789/67170
Abstract
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems.
Keywords: 5G technology; wireless networks; wireless data transmission; data security
Free keywords: physical layer security (PLS); 5G communications; relaying protocols; jamming techniques
Contributing organizations
Ministry reporting: Yes
Reporting Year: 2019
JUFO rating: 2