2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB) 2015
DOI: 10.1109/icuwb.2015.7324413
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Cooperative Jamming Applied to Physical Layer Security

Abstract: Abstract-Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks. However, jamming can be used in a cooperative manner to enable a secure communication link between the legitimate transmitter and the intended receiver. This paper presents a comprehensive survey on different jamming methods used to enhance the physical layer security. This survey outlines first the underlyin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 46 publications
0
20
0
Order By: Relevance
“…One of the important metrics that evaluate the security performance in the physical layer is the secrecy rate, which is the difference between the channel capacity of the legitimate links and the channel capacity of the illegitimate ones [1]. Many techniques have been proposed to achieve a positive secrecy rate, such as cooperative jamming, multiantenna scenarios, beamforming, game theory, and power allocation schemes [2]. A wireless network could benefit from the new joining nodes, by using them as relays, or by treating them as potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…One of the important metrics that evaluate the security performance in the physical layer is the secrecy rate, which is the difference between the channel capacity of the legitimate links and the channel capacity of the illegitimate ones [1]. Many techniques have been proposed to achieve a positive secrecy rate, such as cooperative jamming, multiantenna scenarios, beamforming, game theory, and power allocation schemes [2]. A wireless network could benefit from the new joining nodes, by using them as relays, or by treating them as potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…In [41], the authors reviewed the secrecy performance from a PLS perspective of broadcast and multi-antenna systems, with an emphasis on the multiple-access channel (MAC), relay channels, physical-layer key generation and secure coding. The authors in [42] reviewed different jamming techniques, employed in the literature, that aim at improving the secrecy performance of RF networks. In [43], the authors provided a comprehensive review on various multiple-antenna techniques in PLS, with an emphasis on transmit beamforming designs for multiple-antenna nodes in point-to-point systems and heterogeneous networks.…”
Section: B Related Workmentioning
confidence: 99%
“…After reviewing several information-theoretic studies, the authors asserted that despite numerous idealized assumptions in the PLS literature, game-theoretic strategies and multi-antenna transmission techniques can potentially help realize the vision of unbreakable and keyless security in wireless links. A brief survey of recent literature for jamming techniques was presented in [37]. The authors provided a description of various jamming techniques and highlighted their associated advantages and disadvantages.…”
Section: A Related Surveysmentioning
confidence: 99%