Abstract-Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks. However, jamming can be used in a cooperative manner to enable a secure communication link between the legitimate transmitter and the intended receiver. This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security. This survey outlines first the underlying concept and challenges with respect to security in wireless network design followed by a comprehensive literature review and analysis of jamming techniques with their applications in this field. For each jamming protocol, the paper categorizes different techniques within the existing literature by elaborating on their application, and corresponding performances.Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory.
This paper proposes a new security cooperative protocol, for dual phase amplify-and-forward large wireless sensor networks. In such a network, a portion of the K relays can be potential eavesdroppers. The source agrees to share with the destination a given channel state information (CSI) of a sourcetrusted relay-destination link to encode the message. Then, in the first hop, the source will use this CSI to map the right message to a certain sector while transmitting fake messages to the other sectors using sectoral transmission thanks to analog beamforming. In the second hop, the relays retransmit their received signals to the destination, using the distributed beamforming technique. We derived the secrecy outage probability and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also showed that the aggressive behavior of the cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually.Index Terms-Physical layer security, secrecy outage probability, amplify and forward, secrecy capacity.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.