scispace - formally typeset
Journal ArticleDOI

Physical layer security in wireless cooperative relay networks: state of the art and beyond

Reads0
Chats0
TLDR
This article presents a comprehensive summary of current state-of-theart PHY security concepts in wireless relay networks, and outlines important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.
Abstract
Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying has also been considered in the context of PHY security, which is a new security paradigm to supplement traditional cryptographic schemes that usually handle security at the upper layers. In wireless PHY security, relay nodes can be used to exploit the physical layer properties of wireless channels in order to support a secured transmission from a source to a destination in the presence of one or more eavesdroppers. While some breakthroughs have been made in this emerging research area, to date, the problem of how to effectively adopt advanced relaying protocols to enhance PHY security is still far from being fully understood. In this article, we present a comprehensive summary of current state-of-theart PHY security concepts in wireless relay networks. A case study is then provided to quantify the benefits of power allocation and relay location for enhanced security. We finally outline important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.

read more

Citations
More filters
Journal ArticleDOI

Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference

TL;DR: It is demonstrated that the all selection criteria achieve full secrecy diversity order N, while the proposed two criteria in this paper outperform the conventional max-min scheme.
Journal ArticleDOI

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things

TL;DR: A secrecy enhancing transmit design to minimize the secrecy outage probability (SOP) and the minimum secrecy rate on transmit designs is provided, subject to a minimum requirement on the secrecy rate.
Journal ArticleDOI

Physical Layer Security in UAV Systems: Challenges and Opportunities

TL;DR: In this paper, the authors examine the physical layer security issues in UAV systems and provide an overview on emerging techniques, such as trajectory design, resource allocation, and cooperative UAVs, to fight against both passive and active eavesdropping attacks.
Journal ArticleDOI

Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes

TL;DR: This paper explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations and proposes the transmit jamming strategy to improve the secrecy performance.
Journal ArticleDOI

A Survey of Optimization Approaches for Wireless Physical Layer Security

TL;DR: In this article, the authors present a comprehensive survey of the state-of-the-art optimization approaches on each research topic of physical layer security, such as secrecy rate maximization, secrecy outrage probability minimization, power consumption minimization and secure energy efficiency maximization.
References
More filters
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Guaranteeing Secrecy using Artificial Noise

TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Journal ArticleDOI

Improving Wireless Physical Layer Security via Cooperating Relays

TL;DR: Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.
Journal ArticleDOI

Cooperation With an Untrusted Relay: A Secrecy Perspective

TL;DR: It is shown, by means of the achievable secrecy rate based on compress-and-forward, that by asking the untrusted relay node to relay information, one can achieve a higher secrecy rate than just treating the relay as an eavesdropper.
Journal ArticleDOI

Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

TL;DR: This paper investigates joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with the constraints of physical-layer security and introduces a hybrid scheme to switch between jamming and nonjamming modes.
Related Papers (5)