dc.contributor.author | Jameel, Furqan | |
dc.contributor.author | Wyne, Shurjeel | |
dc.contributor.author | Kaddoum, Georges | |
dc.contributor.author | Duong, Trung Q. | |
dc.date.accessioned | 2020-01-08T12:05:35Z | |
dc.date.available | 2020-01-08T12:05:35Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Jameel, F., Wyne, S., Kaddoum, G., & Duong, T. Q. (2019). A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. <i>IEEE Communications Surveys and Tutorials</i>, <i>21</i>(3), 2734-2771. <a href="https://doi.org/10.1109/COMST.2018.2865607" target="_blank">https://doi.org/10.1109/COMST.2018.2865607</a> | |
dc.identifier.other | CONVID_32974677 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67170 | |
dc.description.abstract | Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and schemes. Next, a review of recently proposed solutions for cooperative jamming techniques is provided with an emphasis on power allocation and beamforming techniques. Then, the latest developments in hybrid techniques, which use both cooperative relaying and jamming, are elaborated. Finally, several key challenges in the domain of cooperative security are presented along with an extensive discussion on the applications of cooperative security in key enablers for 5G communications, such as nonorthogonal multiple access, device-to-device communications, and massive multiple-input multiple-output systems. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartofseries | IEEE Communications Surveys and Tutorials | |
dc.rights | In Copyright | |
dc.subject.other | physical layer security (PLS) | |
dc.subject.other | 5G communications | |
dc.subject.other | relaying protocols | |
dc.subject.other | jamming techniques | |
dc.title | A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202001081097 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_dcae04bc | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 2734-2771 | |
dc.relation.issn | 2373-745X | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 21 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2018 IEEE | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | langattomat verkot | |
dc.subject.yso | 5G-tekniikka | |
dc.subject.yso | tietoturva | |
dc.subject.yso | langaton tiedonsiirto | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24221 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29372 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5445 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1109/COMST.2018.2865607 | |
jyx.fundinginformation | EU (H2020-MSCA-RISE-2015); | |
dc.type.okm | A2 | |