Näytä suppeat kuvailutiedot

dc.contributor.authorJameel, Furqan
dc.contributor.authorWyne, Shurjeel
dc.contributor.authorKaddoum, Georges
dc.contributor.authorDuong, Trung Q.
dc.date.accessioned2020-01-08T12:05:35Z
dc.date.available2020-01-08T12:05:35Z
dc.date.issued2019
dc.identifier.citationJameel, F., Wyne, S., Kaddoum, G., & Duong, T. Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. <i>IEEE Communications Surveys and Tutorials</i>, <i>21</i>(3), 2734-2771. <a href="https://doi.org/10.1109/COMST.2018.2865607" target="_blank">https://doi.org/10.1109/COMST.2018.2865607</a>
dc.identifier.otherCONVID_32974677
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/67170
dc.description.abstractPhysical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Communications Surveys and Tutorials
dc.rightsIn Copyright
dc.subject.otherphysical layer security (PLS)
dc.subject.other5G communications
dc.subject.otherrelaying protocols
dc.subject.otherjamming techniques
dc.titleA Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202001081097
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_dcae04bc
dc.description.reviewstatuspeerReviewed
dc.format.pagerange2734-2771
dc.relation.issn2373-745X
dc.relation.numberinseries3
dc.relation.volume21
dc.type.versionacceptedVersion
dc.rights.copyright© 2018 IEEE
dc.rights.accesslevelopenAccessfi
dc.subject.ysolangattomat verkot
dc.subject.yso5G-tekniikka
dc.subject.ysotietoturva
dc.subject.ysolangaton tiedonsiirto
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p24221
jyx.subject.urihttp://www.yso.fi/onto/yso/p29372
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p5445
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1109/COMST.2018.2865607
jyx.fundinginformationEU (H2020-MSCA-RISE-2015);
dc.type.okmA2


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright