Skip to main content
Top
Published in: Wireless Personal Communications 2/2019

24-04-2019

Cooperative Communication in Physical Layer Security: Technologies and Challenges

Authors: Sonika Pahuja, Poonam Jindal

Published in: Wireless Personal Communications | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cooperative communication utilizes node cooperation for enhancing the diversity gains during secure communication against eavesdropping and jamming which are the common threats to information security in wireless networks. This paper aims to provide the most recent survey on cooperative technologies to ensure a confidential link between legitimate nodes. First, an overview of cooperative relaying, jamming and hybrid methods used in cooperative communication has been presented. Further for each method, different techniques are categorized based on system model comparison, distinctly elaborating their performance and applications. Finally, future research directions are envisioned at the end of the paper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence propogation of security attacks in cyber-physical systems. Future Generation Computer Systems, 67, 57–71.CrossRef Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence propogation of security attacks in cyber-physical systems. Future Generation Computer Systems, 67, 57–71.CrossRef
3.
go back to reference Shiu, et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.CrossRef Shiu, et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.CrossRef
4.
go back to reference Unprecedented cyberattack hits 200,000 in at least 150 countries, and the threat is escalating (2017), CNBC. Unprecedented cyberattack hits 200,000 in at least 150 countries, and the threat is escalating (2017), CNBC.
6.
go back to reference Liu, K. J. R., Sadek, A. K., Su, W. F., & Kwasinski, A. (2009). Cooperative communications and networking. Cambridge: Cambridge University Press.MATH Liu, K. J. R., Sadek, A. K., Su, W. F., & Kwasinski, A. (2009). Cooperative communications and networking. Cambridge: Cambridge University Press.MATH
7.
go back to reference Wang, H.-M., & Xia, X.-G. (2015). Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Communications Magazine, 53(12), 47–53.CrossRef Wang, H.-M., & Xia, X.-G. (2015). Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Communications Magazine, 53(12), 47–53.CrossRef
8.
go back to reference Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative wireless communications and physical layer security: State-of-the-art. Journal of Cyber Security and Mobility, 1, 227–249. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative wireless communications and physical layer security: State-of-the-art. Journal of Cyber Security and Mobility, 1, 227–249.
9.
go back to reference Rodríguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Elkashlan, M., & Shetty, S. (2015). Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Communications Magazine, 53(12), 32–39.CrossRef Rodríguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Elkashlan, M., & Shetty, S. (2015). Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Communications Magazine, 53(12), 32–39.CrossRef
10.
go back to reference Bassily, R., et al. (2013). Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Processing Magazine, 30(5), 16–28.CrossRef Bassily, R., et al. (2013). Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Processing Magazine, 30(5), 16–28.CrossRef
11.
go back to reference Mukherjee, S. A. A., Fakoorian, J. H., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef Mukherjee, S. A. A., Fakoorian, J. H., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef
12.
go back to reference Aylin Yener and Sennur Ulukus. (2015). Wireless physical-layer security: Lessons learned from information theory. Proceedings of the IEEE, 103(10), 1814–1825.CrossRef Aylin Yener and Sennur Ulukus. (2015). Wireless physical-layer security: Lessons learned from information theory. Proceedings of the IEEE, 103(10), 1814–1825.CrossRef
14.
go back to reference Katiyar, H., Rastogi, A., & Aggarwal, R. (2011). Cooperative communication: A review. IETE Technical Review, 28(5), 409–417.CrossRef Katiyar, H., Rastogi, A., & Aggarwal, R. (2011). Cooperative communication: A review. IETE Technical Review, 28(5), 409–417.CrossRef
16.
go back to reference Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20.CrossRef Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20.CrossRef
17.
go back to reference Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef
18.
go back to reference Hancke, G., Mitrokotsa, A., Safavi-Naini, R., & Sauveron, D. (2016). Special issue on recent advances in physical-layer security. Computer Networks, 109(1), 1–3.CrossRef Hancke, G., Mitrokotsa, A., Safavi-Naini, R., & Sauveron, D. (2016). Special issue on recent advances in physical-layer security. Computer Networks, 109(1), 1–3.CrossRef
20.
go back to reference Renyong, W., Wenru, W., & Renfa, L. (2017). Multiple relay selection based on game theory in cooperative cognitive radio networks. Chinese Journal of Electronics, 26(3), 624–633.CrossRef Renyong, W., Wenru, W., & Renfa, L. (2017). Multiple relay selection based on game theory in cooperative cognitive radio networks. Chinese Journal of Electronics, 26(3), 624–633.CrossRef
21.
go back to reference Nguyen, M.-N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef Nguyen, M.-N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef
22.
go back to reference Fang, H., Li, X., & Choo, K.-K. R. (2017). Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Applied Mathematics and Computation, 296, 153–167.MathSciNetMATHCrossRef Fang, H., Li, X., & Choo, K.-K. R. (2017). Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Applied Mathematics and Computation, 296, 153–167.MathSciNetMATHCrossRef
24.
go back to reference Nair, A. K., Asmi, S., & Gopakumar, A. (2016). Analysis of physical layer security via co-operative communication in internet of things. Procedia Technology, 24, 896–903.CrossRef Nair, A. K., Asmi, S., & Gopakumar, A. (2016). Analysis of physical layer security via co-operative communication in internet of things. Procedia Technology, 24, 896–903.CrossRef
25.
go back to reference Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative jamming for physical layer security in wireless sensor networks. In IEEE WPMC 15th international symposium. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative jamming for physical layer security in wireless sensor networks. In IEEE WPMC 15th international symposium.
26.
go back to reference Nicholas Laneman, J., Tse, David N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12), 3062–3080.MathSciNetMATHCrossRef Nicholas Laneman, J., Tse, David N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12), 3062–3080.MathSciNetMATHCrossRef
27.
go back to reference Louie, R. H. Y., Li, Y., & Vucetic, B. (2010). Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Transactions on Wireless Communications, 9(2), 764–777.CrossRef Louie, R. H. Y., Li, Y., & Vucetic, B. (2010). Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Transactions on Wireless Communications, 9(2), 764–777.CrossRef
28.
go back to reference Liu, C., Yang, N., Yuan, J., & Malaney, R. (2015). Location-based secure transmission for wiretap channels. IEEE Journal on Selected Areas in Communicaton, 33(7), 1458–1470.CrossRef Liu, C., Yang, N., Yuan, J., & Malaney, R. (2015). Location-based secure transmission for wiretap channels. IEEE Journal on Selected Areas in Communicaton, 33(7), 1458–1470.CrossRef
29.
go back to reference Wang, L., Cai, Y., Zou, Y., Yang, W., & Hanzo, L. (2016). Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Transactions on Vehicular Technology, 65(8), 6259–6274.CrossRef Wang, L., Cai, Y., Zou, Y., Yang, W., & Hanzo, L. (2016). Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Transactions on Vehicular Technology, 65(8), 6259–6274.CrossRef
30.
go back to reference Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3(3), 289–292.CrossRef Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3(3), 289–292.CrossRef
31.
go back to reference Zheng, T.-X., Wang, H.-M., Liu, F., & Lee, M. H. (2015). Outage constrained secrecy throughput maximization for df relay networks. IEEE Transactions on Communications, 63(5), 1741–1755.CrossRef Zheng, T.-X., Wang, H.-M., Liu, F., & Lee, M. H. (2015). Outage constrained secrecy throughput maximization for df relay networks. IEEE Transactions on Communications, 63(5), 1741–1755.CrossRef
32.
go back to reference Parsaeefard, S., & Le-Ngoc, T. (2015). Improving wireless secrecy rate via full-duplex relay-assisted protocols. IEEE Transactions on Information Forensics and Security, 10(10), 2095–2107.CrossRef Parsaeefard, S., & Le-Ngoc, T. (2015). Improving wireless secrecy rate via full-duplex relay-assisted protocols. IEEE Transactions on Information Forensics and Security, 10(10), 2095–2107.CrossRef
34.
go back to reference Li, C., Wang, Y., Dong, F., & Yang, D. (2009). Performance analysis for coded cooperation protocol in fixed relay system. In IEEE youth conference on information, computing and telecommunication (pp. 182–185). Li, C., Wang, Y., Dong, F., & Yang, D. (2009). Performance analysis for coded cooperation protocol in fixed relay system. In IEEE youth conference on information, computing and telecommunication (pp. 182–185).
35.
go back to reference Lai, L., & El Gamal, H. (2008). The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetMATHCrossRef Lai, L., & El Gamal, H. (2008). The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetMATHCrossRef
36.
go back to reference Khafagy, M., Ismail, A., Alouini, M.-S., & A¨ıssa, S. (2013). On the outage performance of full-duplex selective decode-and-forward relaying. IEEE Communications Letters, 17(6), 1180–1183.CrossRef Khafagy, M., Ismail, A., Alouini, M.-S., & A¨ıssa, S. (2013). On the outage performance of full-duplex selective decode-and-forward relaying. IEEE Communications Letters, 17(6), 1180–1183.CrossRef
37.
go back to reference Vahidian, S., Hatamnia, S., & Champagne, B. (2018). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Transactions on Information Forensics and Security. arXiv:1807.11621v1[cs.NI],1-13. Vahidian, S., Hatamnia, S., & Champagne, B. (2018). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Transactions on Information Forensics and Security. arXiv:​1807.​11621v1[cs.​NI],1-13.
39.
go back to reference Xiao, H., & Ouyang, S. (2015). Power allocation for a hybrid decode–amplify–forward cooperative communication system with two source-destination pairs under outage probability constraint. IEEE Systems Journal, 9(3), 797–804.CrossRef Xiao, H., & Ouyang, S. (2015). Power allocation for a hybrid decode–amplify–forward cooperative communication system with two source-destination pairs under outage probability constraint. IEEE Systems Journal, 9(3), 797–804.CrossRef
40.
go back to reference Ding, Z., Chin, W. H., & Leung, K. K. (2008). Distributed beamforming and power allocation for cooperative networks. IEEE Transactions on Wireless Communications, 7(5), 1817–1822.CrossRef Ding, Z., Chin, W. H., & Leung, K. K. (2008). Distributed beamforming and power allocation for cooperative networks. IEEE Transactions on Wireless Communications, 7(5), 1817–1822.CrossRef
41.
go back to reference Chin, W. H., & Sivagami, A. (2008). Transmit beamforming in cooperative networks. In IEEE vehicular technology conference (pp. 1365–1368). Chin, W. H., & Sivagami, A. (2008). Transmit beamforming in cooperative networks. In IEEE vehicular technology conference (pp. 1365–1368).
42.
go back to reference Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in Rician wiretap channels. IEEE Transactions on Wireless Communications, 15(4), 2780–2791.CrossRef Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in Rician wiretap channels. IEEE Transactions on Wireless Communications, 15(4), 2780–2791.CrossRef
43.
go back to reference Mo, J., Tao, M., Liu, Y., & Wang, R. (2014). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62(9), 2185–2199.MathSciNetMATHCrossRef Mo, J., Tao, M., Liu, Y., & Wang, R. (2014). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62(9), 2185–2199.MathSciNetMATHCrossRef
45.
46.
go back to reference Thuy, T. T., Tuan, N. N., An, L. T. H., Gély, A. (2016). DC programming and DCA for enhancing physical layer security via relay beamforming strategies. Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science, 9622, 640–650. Thuy, T. T., Tuan, N. N., An, L. T. H., Gély, A. (2016). DC programming and DCA for enhancing physical layer security via relay beamforming strategies. Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science, 9622, 640–650.
47.
go back to reference Vahidian, S., Aïssa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef Vahidian, S., Aïssa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef
48.
go back to reference Esmaeili, M., & Mohammadi, A. (2018). A reliable relay selection scheme for SSK modulation in cooperative communication systems. Wireless Networks, 24(6), 1927–1937.CrossRef Esmaeili, M., & Mohammadi, A. (2018). A reliable relay selection scheme for SSK modulation in cooperative communication systems. Wireless Networks, 24(6), 1927–1937.CrossRef
49.
go back to reference Ke, G., Qiang, G., Li, F., & Huagang, X. (2017). Relay selection in cooperative communication systems over continuous time-varying fading channel. Chinese Journal of Aeronautics, 30(1), 391–398.CrossRef Ke, G., Qiang, G., Li, F., & Huagang, X. (2017). Relay selection in cooperative communication systems over continuous time-varying fading channel. Chinese Journal of Aeronautics, 30(1), 391–398.CrossRef
50.
go back to reference Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2015). Relay and Jammer Selection scheme for improving physical layer security in two way cooperative networks. Computer and Security, 50, 47–59.CrossRef Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2015). Relay and Jammer Selection scheme for improving physical layer security in two way cooperative networks. Computer and Security, 50, 47–59.CrossRef
51.
go back to reference Kundu, C., Telex, M. N. N., & Dobre, O. A. (2016). Relay selection to improve secrecy in cooperative threshold decode-and-forward relaying. In IEEE global communication conference (GLOBECOM). Kundu, C., Telex, M. N. N., & Dobre, O. A. (2016). Relay selection to improve secrecy in cooperative threshold decode-and-forward relaying. In IEEE global communication conference (GLOBECOM).
52.
go back to reference Liang, X., Chen, M., Balasingham, I., & Leung, V. C. M. (2013). Cooperative communications with relay selection for wireless networks: Design issues and applications. Wireless Communications and Mobile Computing, 13(8), 745–759.CrossRef Liang, X., Chen, M., Balasingham, I., & Leung, V. C. M. (2013). Cooperative communications with relay selection for wireless networks: Design issues and applications. Wireless Communications and Mobile Computing, 13(8), 745–759.CrossRef
53.
go back to reference Cumanan, K., et al. (2017). Physical layer security jamming: theoretical limits and practical designs in wireless networks. IEEE Journals and Magazines, 5, 3603–3611. Cumanan, K., et al. (2017). Physical layer security jamming: theoretical limits and practical designs in wireless networks. IEEE Journals and Magazines, 5, 3603–3611.
54.
go back to reference Yang, J., Kim, I.-M., & Kim, D. I. (2014). Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Transactions on Communications, 62(9), 3285–3298.CrossRef Yang, J., Kim, I.-M., & Kim, D. I. (2014). Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Transactions on Communications, 62(9), 3285–3298.CrossRef
55.
go back to reference Tourki, K., & Hasna, M. O. (2016). A collaboration incentive exploiting the primary-secondary systems cross interference for PHY security enhancement. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1346–1358.CrossRef Tourki, K., & Hasna, M. O. (2016). A collaboration incentive exploiting the primary-secondary systems cross interference for PHY security enhancement. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1346–1358.CrossRef
56.
go back to reference Mu, P., Hu, X., Wang, B., & Li, Z. (2015). Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint. IEEE Communications Letters, 19(12), 2174–2177.CrossRef Mu, P., Hu, X., Wang, B., & Li, Z. (2015). Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint. IEEE Communications Letters, 19(12), 2174–2177.CrossRef
57.
go back to reference Tran, T. T., Thi, H. A. L., & Dinh, T. P. (2017). DC programming and DCA for enhancing physical layer security via cooperative jamming. Computers & Operations Research, 87, 235–244.MathSciNetMATHCrossRef Tran, T. T., Thi, H. A. L., & Dinh, T. P. (2017). DC programming and DCA for enhancing physical layer security via cooperative jamming. Computers & Operations Research, 87, 235–244.MathSciNetMATHCrossRef
58.
go back to reference Yang, J., Salari, S., Kim, I.-M., Kim, D. I., Kim, S., & Lim, K. (2016). Asymptotically optimal cooperative jamming for physical layer security. Journal of Communications and Networks, 18(1), 84–94.CrossRef Yang, J., Salari, S., Kim, I.-M., Kim, D. I., Kim, S., & Lim, K. (2016). Asymptotically optimal cooperative jamming for physical layer security. Journal of Communications and Networks, 18(1), 84–94.CrossRef
59.
go back to reference Kolokotronics, N., Fytrakis, K., Katsiotis, A., & Kalouptsidis, N. (2015). A cooperative jamming protocol for physical layer security in wireless networks. In IEEE ICASSP (pp. 5803–5807). Kolokotronics, N., Fytrakis, K., Katsiotis, A., & Kalouptsidis, N. (2015). A cooperative jamming protocol for physical layer security in wireless networks. In IEEE ICASSP (pp. 5803–5807).
60.
go back to reference Lv, L., Chen, J., Yang, L., & Kuo, Y. (2017). Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Journals, 11(3), 393–399. Lv, L., Chen, J., Yang, L., & Kuo, Y. (2017). Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Journals, 11(3), 393–399.
61.
go back to reference Tang, L., Chen, H., & Li, Q. (2015). Social tie based cooperative jamming for physical layer security. IEEE Communications Letters, 19(10), 1790–1793.CrossRef Tang, L., Chen, H., & Li, Q. (2015). Social tie based cooperative jamming for physical layer security. IEEE Communications Letters, 19(10), 1790–1793.CrossRef
62.
go back to reference Chu, Z., Cumanan, K., Ding, Z., Johnston, M., & Le Goff, S. Y. (2015). Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Transactions on Vehicular Technology, 64(5), 1833–1847.CrossRef Chu, Z., Cumanan, K., Ding, Z., Johnston, M., & Le Goff, S. Y. (2015). Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Transactions on Vehicular Technology, 64(5), 1833–1847.CrossRef
63.
go back to reference Liu, J., Liu, Z., Zeng, Y., & Ma, J. (2016). Cooperative jammer placement for physical layer security enhancement. IEEE Networks, 30(6), 56–61.CrossRef Liu, J., Liu, Z., Zeng, Y., & Ma, J. (2016). Cooperative jammer placement for physical layer security enhancement. IEEE Networks, 30(6), 56–61.CrossRef
64.
go back to reference Lee, J. H., & Choi, W. (2014). Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and Jammer Scaling Law. IEEE Transactions on Signal Processing, 62(4), 828–839.MathSciNetMATHCrossRef Lee, J. H., & Choi, W. (2014). Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and Jammer Scaling Law. IEEE Transactions on Signal Processing, 62(4), 828–839.MathSciNetMATHCrossRef
65.
go back to reference Wang, C., Wang, H.-M., Xia, X.-G., & Liu, C. (2015). Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Transactions on Wireless Communications, 14(5), 2596–2612.CrossRef Wang, C., Wang, H.-M., Xia, X.-G., & Liu, C. (2015). Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Transactions on Wireless Communications, 14(5), 2596–2612.CrossRef
66.
go back to reference Deng, H., Wang, H.-M., Guo, W., & Wang, W. (2015). Secrecy transmission with a helper: To relay or to jam. IEEE Transactions on Information Forensics and Security, 10(2), 293–307.CrossRef Deng, H., Wang, H.-M., Guo, W., & Wang, W. (2015). Secrecy transmission with a helper: To relay or to jam. IEEE Transactions on Information Forensics and Security, 10(2), 293–307.CrossRef
67.
go back to reference Wang, C., Wang, H.-M., & Xia, X.-G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14(2), 589–605.MathSciNetCrossRef Wang, C., Wang, H.-M., & Xia, X.-G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14(2), 589–605.MathSciNetCrossRef
68.
go back to reference Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2017). Adaptive secure transmission for physical layer security in coopertive wireless networks. IEEE Communications Letters, 21(3), 524–527.CrossRef Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2017). Adaptive secure transmission for physical layer security in coopertive wireless networks. IEEE Communications Letters, 21(3), 524–527.CrossRef
69.
go back to reference Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2016). Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access, 4, 5607–5623.CrossRef Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2016). Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access, 4, 5607–5623.CrossRef
70.
go back to reference Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757–789.CrossRef Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757–789.CrossRef
Metadata
Title
Cooperative Communication in Physical Layer Security: Technologies and Challenges
Authors
Sonika Pahuja
Poonam Jindal
Publication date
24-04-2019
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06430-x

Other articles of this Issue 2/2019

Wireless Personal Communications 2/2019 Go to the issue