A2 Review article, Literature review, Systematic review
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security (2019)


Jameel, F., Wyne, S., Kaddoum, G., & Duong, T. Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Communications Surveys and Tutorials, 21(3), 2734-2771. https://doi.org/10.1109/COMST.2018.2865607


JYU authors or editors


Publication details

All authors or editorsJameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges; Duong, Trung Q.

Journal or seriesIEEE Communications Surveys and Tutorials

ISSN2373-745X

eISSN1553-877X

Publication year2019

Volume21

Issue number3

Pages range2734-2771

PublisherIEEE

Publication countryUnited States

Publication languageEnglish

DOIhttps://doi.org/10.1109/COMST.2018.2865607

Publication open accessNot open

Publication channel open access

Publication is parallel published (JYX)https://jyx.jyu.fi/handle/123456789/67170


Abstract

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems.


Keywords5G technologywireless networkswireless data transmissiondata security

Free keywordsphysical layer security (PLS); 5G communications; relaying protocols; jamming techniques


Contributing organizations


Ministry reportingYes

Reporting Year2019

JUFO rating2


Last updated on 2024-08-01 at 17:21