Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

24.04.2019

Cooperative Communication in Physical Layer Security: Technologies and Challenges

verfasst von: Sonika Pahuja, Poonam Jindal

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cooperative communication utilizes node cooperation for enhancing the diversity gains during secure communication against eavesdropping and jamming which are the common threats to information security in wireless networks. This paper aims to provide the most recent survey on cooperative technologies to ensure a confidential link between legitimate nodes. First, an overview of cooperative relaying, jamming and hybrid methods used in cooperative communication has been presented. Further for each method, different techniques are categorized based on system model comparison, distinctly elaborating their performance and applications. Finally, future research directions are envisioned at the end of the paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence propogation of security attacks in cyber-physical systems. Future Generation Computer Systems, 67, 57–71.CrossRef Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence propogation of security attacks in cyber-physical systems. Future Generation Computer Systems, 67, 57–71.CrossRef
3.
Zurück zum Zitat Shiu, et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.CrossRef Shiu, et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.CrossRef
4.
Zurück zum Zitat Unprecedented cyberattack hits 200,000 in at least 150 countries, and the threat is escalating (2017), CNBC. Unprecedented cyberattack hits 200,000 in at least 150 countries, and the threat is escalating (2017), CNBC.
6.
Zurück zum Zitat Liu, K. J. R., Sadek, A. K., Su, W. F., & Kwasinski, A. (2009). Cooperative communications and networking. Cambridge: Cambridge University Press.MATH Liu, K. J. R., Sadek, A. K., Su, W. F., & Kwasinski, A. (2009). Cooperative communications and networking. Cambridge: Cambridge University Press.MATH
7.
Zurück zum Zitat Wang, H.-M., & Xia, X.-G. (2015). Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Communications Magazine, 53(12), 47–53.CrossRef Wang, H.-M., & Xia, X.-G. (2015). Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Communications Magazine, 53(12), 47–53.CrossRef
8.
Zurück zum Zitat Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative wireless communications and physical layer security: State-of-the-art. Journal of Cyber Security and Mobility, 1, 227–249. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative wireless communications and physical layer security: State-of-the-art. Journal of Cyber Security and Mobility, 1, 227–249.
9.
Zurück zum Zitat Rodríguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Elkashlan, M., & Shetty, S. (2015). Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Communications Magazine, 53(12), 32–39.CrossRef Rodríguez, L. J., Tran, N. H., Duong, T. Q., Le-Ngoc, T., Elkashlan, M., & Shetty, S. (2015). Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Communications Magazine, 53(12), 32–39.CrossRef
10.
Zurück zum Zitat Bassily, R., et al. (2013). Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Processing Magazine, 30(5), 16–28.CrossRef Bassily, R., et al. (2013). Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Processing Magazine, 30(5), 16–28.CrossRef
11.
Zurück zum Zitat Mukherjee, S. A. A., Fakoorian, J. H., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef Mukherjee, S. A. A., Fakoorian, J. H., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef
12.
Zurück zum Zitat Aylin Yener and Sennur Ulukus. (2015). Wireless physical-layer security: Lessons learned from information theory. Proceedings of the IEEE, 103(10), 1814–1825.CrossRef Aylin Yener and Sennur Ulukus. (2015). Wireless physical-layer security: Lessons learned from information theory. Proceedings of the IEEE, 103(10), 1814–1825.CrossRef
14.
Zurück zum Zitat Katiyar, H., Rastogi, A., & Aggarwal, R. (2011). Cooperative communication: A review. IETE Technical Review, 28(5), 409–417.CrossRef Katiyar, H., Rastogi, A., & Aggarwal, R. (2011). Cooperative communication: A review. IETE Technical Review, 28(5), 409–417.CrossRef
16.
Zurück zum Zitat Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20.CrossRef Trappe, W. (2015). The challenges facing physical layer security. IEEE Communications Magazine, 53(6), 16–20.CrossRef
17.
Zurück zum Zitat Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef
18.
Zurück zum Zitat Hancke, G., Mitrokotsa, A., Safavi-Naini, R., & Sauveron, D. (2016). Special issue on recent advances in physical-layer security. Computer Networks, 109(1), 1–3.CrossRef Hancke, G., Mitrokotsa, A., Safavi-Naini, R., & Sauveron, D. (2016). Special issue on recent advances in physical-layer security. Computer Networks, 109(1), 1–3.CrossRef
20.
Zurück zum Zitat Renyong, W., Wenru, W., & Renfa, L. (2017). Multiple relay selection based on game theory in cooperative cognitive radio networks. Chinese Journal of Electronics, 26(3), 624–633.CrossRef Renyong, W., Wenru, W., & Renfa, L. (2017). Multiple relay selection based on game theory in cooperative cognitive radio networks. Chinese Journal of Electronics, 26(3), 624–633.CrossRef
21.
Zurück zum Zitat Nguyen, M.-N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef Nguyen, M.-N., et al. (2017). Secure cooperative half-duplex cognitive radio networks with K-th best relay selection. IEEE Access, 5, 6678–6687.CrossRef
22.
Zurück zum Zitat Fang, H., Li, X., & Choo, K.-K. R. (2017). Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Applied Mathematics and Computation, 296, 153–167.MathSciNetMATHCrossRef Fang, H., Li, X., & Choo, K.-K. R. (2017). Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Applied Mathematics and Computation, 296, 153–167.MathSciNetMATHCrossRef
24.
Zurück zum Zitat Nair, A. K., Asmi, S., & Gopakumar, A. (2016). Analysis of physical layer security via co-operative communication in internet of things. Procedia Technology, 24, 896–903.CrossRef Nair, A. K., Asmi, S., & Gopakumar, A. (2016). Analysis of physical layer security via co-operative communication in internet of things. Procedia Technology, 24, 896–903.CrossRef
25.
Zurück zum Zitat Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative jamming for physical layer security in wireless sensor networks. In IEEE WPMC 15th international symposium. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012). Cooperative jamming for physical layer security in wireless sensor networks. In IEEE WPMC 15th international symposium.
26.
Zurück zum Zitat Nicholas Laneman, J., Tse, David N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12), 3062–3080.MathSciNetMATHCrossRef Nicholas Laneman, J., Tse, David N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12), 3062–3080.MathSciNetMATHCrossRef
27.
Zurück zum Zitat Louie, R. H. Y., Li, Y., & Vucetic, B. (2010). Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Transactions on Wireless Communications, 9(2), 764–777.CrossRef Louie, R. H. Y., Li, Y., & Vucetic, B. (2010). Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Transactions on Wireless Communications, 9(2), 764–777.CrossRef
28.
Zurück zum Zitat Liu, C., Yang, N., Yuan, J., & Malaney, R. (2015). Location-based secure transmission for wiretap channels. IEEE Journal on Selected Areas in Communicaton, 33(7), 1458–1470.CrossRef Liu, C., Yang, N., Yuan, J., & Malaney, R. (2015). Location-based secure transmission for wiretap channels. IEEE Journal on Selected Areas in Communicaton, 33(7), 1458–1470.CrossRef
29.
Zurück zum Zitat Wang, L., Cai, Y., Zou, Y., Yang, W., & Hanzo, L. (2016). Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Transactions on Vehicular Technology, 65(8), 6259–6274.CrossRef Wang, L., Cai, Y., Zou, Y., Yang, W., & Hanzo, L. (2016). Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Transactions on Vehicular Technology, 65(8), 6259–6274.CrossRef
30.
Zurück zum Zitat Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3(3), 289–292.CrossRef Wang, L., Elkashlan, M., Huang, J., Tran, N. H., & Duong, T. Q. (2014). Secure transmission with optimal power allocation in untrusted relay networks. IEEE Wireless Communications Letters, 3(3), 289–292.CrossRef
31.
Zurück zum Zitat Zheng, T.-X., Wang, H.-M., Liu, F., & Lee, M. H. (2015). Outage constrained secrecy throughput maximization for df relay networks. IEEE Transactions on Communications, 63(5), 1741–1755.CrossRef Zheng, T.-X., Wang, H.-M., Liu, F., & Lee, M. H. (2015). Outage constrained secrecy throughput maximization for df relay networks. IEEE Transactions on Communications, 63(5), 1741–1755.CrossRef
32.
Zurück zum Zitat Parsaeefard, S., & Le-Ngoc, T. (2015). Improving wireless secrecy rate via full-duplex relay-assisted protocols. IEEE Transactions on Information Forensics and Security, 10(10), 2095–2107.CrossRef Parsaeefard, S., & Le-Ngoc, T. (2015). Improving wireless secrecy rate via full-duplex relay-assisted protocols. IEEE Transactions on Information Forensics and Security, 10(10), 2095–2107.CrossRef
34.
Zurück zum Zitat Li, C., Wang, Y., Dong, F., & Yang, D. (2009). Performance analysis for coded cooperation protocol in fixed relay system. In IEEE youth conference on information, computing and telecommunication (pp. 182–185). Li, C., Wang, Y., Dong, F., & Yang, D. (2009). Performance analysis for coded cooperation protocol in fixed relay system. In IEEE youth conference on information, computing and telecommunication (pp. 182–185).
35.
Zurück zum Zitat Lai, L., & El Gamal, H. (2008). The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetMATHCrossRef Lai, L., & El Gamal, H. (2008). The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetMATHCrossRef
36.
Zurück zum Zitat Khafagy, M., Ismail, A., Alouini, M.-S., & A¨ıssa, S. (2013). On the outage performance of full-duplex selective decode-and-forward relaying. IEEE Communications Letters, 17(6), 1180–1183.CrossRef Khafagy, M., Ismail, A., Alouini, M.-S., & A¨ıssa, S. (2013). On the outage performance of full-duplex selective decode-and-forward relaying. IEEE Communications Letters, 17(6), 1180–1183.CrossRef
37.
Zurück zum Zitat Vahidian, S., Hatamnia, S., & Champagne, B. (2018). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Transactions on Information Forensics and Security. arXiv:1807.11621v1[cs.NI],1-13. Vahidian, S., Hatamnia, S., & Champagne, B. (2018). On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper. IEEE Transactions on Information Forensics and Security. arXiv:​1807.​11621v1[cs.​NI],1-13.
39.
Zurück zum Zitat Xiao, H., & Ouyang, S. (2015). Power allocation for a hybrid decode–amplify–forward cooperative communication system with two source-destination pairs under outage probability constraint. IEEE Systems Journal, 9(3), 797–804.CrossRef Xiao, H., & Ouyang, S. (2015). Power allocation for a hybrid decode–amplify–forward cooperative communication system with two source-destination pairs under outage probability constraint. IEEE Systems Journal, 9(3), 797–804.CrossRef
40.
Zurück zum Zitat Ding, Z., Chin, W. H., & Leung, K. K. (2008). Distributed beamforming and power allocation for cooperative networks. IEEE Transactions on Wireless Communications, 7(5), 1817–1822.CrossRef Ding, Z., Chin, W. H., & Leung, K. K. (2008). Distributed beamforming and power allocation for cooperative networks. IEEE Transactions on Wireless Communications, 7(5), 1817–1822.CrossRef
41.
Zurück zum Zitat Chin, W. H., & Sivagami, A. (2008). Transmit beamforming in cooperative networks. In IEEE vehicular technology conference (pp. 1365–1368). Chin, W. H., & Sivagami, A. (2008). Transmit beamforming in cooperative networks. In IEEE vehicular technology conference (pp. 1365–1368).
42.
Zurück zum Zitat Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in Rician wiretap channels. IEEE Transactions on Wireless Communications, 15(4), 2780–2791.CrossRef Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in Rician wiretap channels. IEEE Transactions on Wireless Communications, 15(4), 2780–2791.CrossRef
43.
Zurück zum Zitat Mo, J., Tao, M., Liu, Y., & Wang, R. (2014). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62(9), 2185–2199.MathSciNetMATHCrossRef Mo, J., Tao, M., Liu, Y., & Wang, R. (2014). Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Transactions on Signal Processing, 62(9), 2185–2199.MathSciNetMATHCrossRef
45.
46.
Zurück zum Zitat Thuy, T. T., Tuan, N. N., An, L. T. H., Gély, A. (2016). DC programming and DCA for enhancing physical layer security via relay beamforming strategies. Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science, 9622, 640–650. Thuy, T. T., Tuan, N. N., An, L. T. H., Gély, A. (2016). DC programming and DCA for enhancing physical layer security via relay beamforming strategies. Intelligent Information and Database Systems. ACIIDS 2016. Lecture Notes in Computer Science, 9622, 640–650.
47.
Zurück zum Zitat Vahidian, S., Aïssa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef Vahidian, S., Aïssa, S., & Hatamnia, S. (2015). Relay selection for security-constrained cooperative communication in the presence of eavesdropper’s overhearing and interference. IEEE Wireless Communications Letters, 4(6), 577–580.CrossRef
48.
Zurück zum Zitat Esmaeili, M., & Mohammadi, A. (2018). A reliable relay selection scheme for SSK modulation in cooperative communication systems. Wireless Networks, 24(6), 1927–1937.CrossRef Esmaeili, M., & Mohammadi, A. (2018). A reliable relay selection scheme for SSK modulation in cooperative communication systems. Wireless Networks, 24(6), 1927–1937.CrossRef
49.
Zurück zum Zitat Ke, G., Qiang, G., Li, F., & Huagang, X. (2017). Relay selection in cooperative communication systems over continuous time-varying fading channel. Chinese Journal of Aeronautics, 30(1), 391–398.CrossRef Ke, G., Qiang, G., Li, F., & Huagang, X. (2017). Relay selection in cooperative communication systems over continuous time-varying fading channel. Chinese Journal of Aeronautics, 30(1), 391–398.CrossRef
50.
Zurück zum Zitat Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2015). Relay and Jammer Selection scheme for improving physical layer security in two way cooperative networks. Computer and Security, 50, 47–59.CrossRef Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2015). Relay and Jammer Selection scheme for improving physical layer security in two way cooperative networks. Computer and Security, 50, 47–59.CrossRef
51.
Zurück zum Zitat Kundu, C., Telex, M. N. N., & Dobre, O. A. (2016). Relay selection to improve secrecy in cooperative threshold decode-and-forward relaying. In IEEE global communication conference (GLOBECOM). Kundu, C., Telex, M. N. N., & Dobre, O. A. (2016). Relay selection to improve secrecy in cooperative threshold decode-and-forward relaying. In IEEE global communication conference (GLOBECOM).
52.
Zurück zum Zitat Liang, X., Chen, M., Balasingham, I., & Leung, V. C. M. (2013). Cooperative communications with relay selection for wireless networks: Design issues and applications. Wireless Communications and Mobile Computing, 13(8), 745–759.CrossRef Liang, X., Chen, M., Balasingham, I., & Leung, V. C. M. (2013). Cooperative communications with relay selection for wireless networks: Design issues and applications. Wireless Communications and Mobile Computing, 13(8), 745–759.CrossRef
53.
Zurück zum Zitat Cumanan, K., et al. (2017). Physical layer security jamming: theoretical limits and practical designs in wireless networks. IEEE Journals and Magazines, 5, 3603–3611. Cumanan, K., et al. (2017). Physical layer security jamming: theoretical limits and practical designs in wireless networks. IEEE Journals and Magazines, 5, 3603–3611.
54.
Zurück zum Zitat Yang, J., Kim, I.-M., & Kim, D. I. (2014). Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Transactions on Communications, 62(9), 3285–3298.CrossRef Yang, J., Kim, I.-M., & Kim, D. I. (2014). Joint design of optimal cooperative jamming and power allocation for linear precoding. IEEE Transactions on Communications, 62(9), 3285–3298.CrossRef
55.
Zurück zum Zitat Tourki, K., & Hasna, M. O. (2016). A collaboration incentive exploiting the primary-secondary systems cross interference for PHY security enhancement. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1346–1358.CrossRef Tourki, K., & Hasna, M. O. (2016). A collaboration incentive exploiting the primary-secondary systems cross interference for PHY security enhancement. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1346–1358.CrossRef
56.
Zurück zum Zitat Mu, P., Hu, X., Wang, B., & Li, Z. (2015). Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint. IEEE Communications Letters, 19(12), 2174–2177.CrossRef Mu, P., Hu, X., Wang, B., & Li, Z. (2015). Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint. IEEE Communications Letters, 19(12), 2174–2177.CrossRef
57.
Zurück zum Zitat Tran, T. T., Thi, H. A. L., & Dinh, T. P. (2017). DC programming and DCA for enhancing physical layer security via cooperative jamming. Computers & Operations Research, 87, 235–244.MathSciNetMATHCrossRef Tran, T. T., Thi, H. A. L., & Dinh, T. P. (2017). DC programming and DCA for enhancing physical layer security via cooperative jamming. Computers & Operations Research, 87, 235–244.MathSciNetMATHCrossRef
58.
Zurück zum Zitat Yang, J., Salari, S., Kim, I.-M., Kim, D. I., Kim, S., & Lim, K. (2016). Asymptotically optimal cooperative jamming for physical layer security. Journal of Communications and Networks, 18(1), 84–94.CrossRef Yang, J., Salari, S., Kim, I.-M., Kim, D. I., Kim, S., & Lim, K. (2016). Asymptotically optimal cooperative jamming for physical layer security. Journal of Communications and Networks, 18(1), 84–94.CrossRef
59.
Zurück zum Zitat Kolokotronics, N., Fytrakis, K., Katsiotis, A., & Kalouptsidis, N. (2015). A cooperative jamming protocol for physical layer security in wireless networks. In IEEE ICASSP (pp. 5803–5807). Kolokotronics, N., Fytrakis, K., Katsiotis, A., & Kalouptsidis, N. (2015). A cooperative jamming protocol for physical layer security in wireless networks. In IEEE ICASSP (pp. 5803–5807).
60.
Zurück zum Zitat Lv, L., Chen, J., Yang, L., & Kuo, Y. (2017). Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Journals, 11(3), 393–399. Lv, L., Chen, J., Yang, L., & Kuo, Y. (2017). Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Journals, 11(3), 393–399.
61.
Zurück zum Zitat Tang, L., Chen, H., & Li, Q. (2015). Social tie based cooperative jamming for physical layer security. IEEE Communications Letters, 19(10), 1790–1793.CrossRef Tang, L., Chen, H., & Li, Q. (2015). Social tie based cooperative jamming for physical layer security. IEEE Communications Letters, 19(10), 1790–1793.CrossRef
62.
Zurück zum Zitat Chu, Z., Cumanan, K., Ding, Z., Johnston, M., & Le Goff, S. Y. (2015). Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Transactions on Vehicular Technology, 64(5), 1833–1847.CrossRef Chu, Z., Cumanan, K., Ding, Z., Johnston, M., & Le Goff, S. Y. (2015). Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Transactions on Vehicular Technology, 64(5), 1833–1847.CrossRef
63.
Zurück zum Zitat Liu, J., Liu, Z., Zeng, Y., & Ma, J. (2016). Cooperative jammer placement for physical layer security enhancement. IEEE Networks, 30(6), 56–61.CrossRef Liu, J., Liu, Z., Zeng, Y., & Ma, J. (2016). Cooperative jammer placement for physical layer security enhancement. IEEE Networks, 30(6), 56–61.CrossRef
64.
Zurück zum Zitat Lee, J. H., & Choi, W. (2014). Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and Jammer Scaling Law. IEEE Transactions on Signal Processing, 62(4), 828–839.MathSciNetMATHCrossRef Lee, J. H., & Choi, W. (2014). Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and Jammer Scaling Law. IEEE Transactions on Signal Processing, 62(4), 828–839.MathSciNetMATHCrossRef
65.
Zurück zum Zitat Wang, C., Wang, H.-M., Xia, X.-G., & Liu, C. (2015). Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Transactions on Wireless Communications, 14(5), 2596–2612.CrossRef Wang, C., Wang, H.-M., Xia, X.-G., & Liu, C. (2015). Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Transactions on Wireless Communications, 14(5), 2596–2612.CrossRef
66.
Zurück zum Zitat Deng, H., Wang, H.-M., Guo, W., & Wang, W. (2015). Secrecy transmission with a helper: To relay or to jam. IEEE Transactions on Information Forensics and Security, 10(2), 293–307.CrossRef Deng, H., Wang, H.-M., Guo, W., & Wang, W. (2015). Secrecy transmission with a helper: To relay or to jam. IEEE Transactions on Information Forensics and Security, 10(2), 293–307.CrossRef
67.
Zurück zum Zitat Wang, C., Wang, H.-M., & Xia, X.-G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14(2), 589–605.MathSciNetCrossRef Wang, C., Wang, H.-M., & Xia, X.-G. (2015). Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Transactions on Wireless Communications, 14(2), 589–605.MathSciNetCrossRef
68.
Zurück zum Zitat Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2017). Adaptive secure transmission for physical layer security in coopertive wireless networks. IEEE Communications Letters, 21(3), 524–527.CrossRef Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2017). Adaptive secure transmission for physical layer security in coopertive wireless networks. IEEE Communications Letters, 21(3), 524–527.CrossRef
69.
Zurück zum Zitat Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2016). Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access, 4, 5607–5623.CrossRef Lin, H., Wen, H., Bin, W., Tang, J., & Pan, F. (2016). Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access, 4, 5607–5623.CrossRef
70.
Zurück zum Zitat Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757–789.CrossRef Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless networks with RF energy harvesting: A contemporary survey. IEEE Communications Surveys & Tutorials, 17(2), 757–789.CrossRef
Metadaten
Titel
Cooperative Communication in Physical Layer Security: Technologies and Challenges
verfasst von
Sonika Pahuja
Poonam Jindal
Publikationsdatum
24.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06430-x

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt