Physical Layer Security in Wireless Cooperative Relay Networks: State of the Art and Beyond

被引:145
作者
Rodriguez, Leonardo Jimenez [1 ]
Tran, Nghi H. [2 ]
Duong, Trung Q. [3 ]
Le-Ngoc, Tho [4 ]
Elkashlan, Maged [5 ]
Shetty, Sachin [6 ]
机构
[1] McGill Univ, Montreal, PQ H3A 2T5, Canada
[2] Univ Akron, Dept Elect & Comp Engn, Akron, OH 44325 USA
[3] Queens Univ Belfast, Belfast BT7 1NN, Antrim, North Ireland
[4] McGill Univ, Dept Elect & Comp Engn, Montreal, PQ H3A 2T5, Canada
[5] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London, England
[6] Tennessee State Univ, Nashville, TN USA
关键词
AMPLIFY-AND-FORWARD; UNTRUSTED RELAY; CHANNEL;
D O I
10.1109/MCOM.2015.7355563
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying has also been considered in the context of PHY security, which is a new security paradigm to supplement traditional cryptographic schemes that usually handle security at the upper layers. In wireless PHY security, relay nodes can be used to exploit the physical layer properties of wireless channels in order to support a secured transmission from a source to a destination in the presence of one or more eavesdroppers. While some breakthroughs have been made in this emerging research area, to date, the problem of how to effectively adopt advanced relaying protocols to enhance PHY security is still far from being fully understood. In this article, we present a comprehensive summary of current state-of-the-art PHY security concepts in wireless relay networks. A case study is then provided to quantify the benefits of power allocation and relay location for enhanced security. We finally outline important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.
引用
收藏
页码:32 / +
页数:8
相关论文
共 15 条
[1]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7417, P294
[2]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[3]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[4]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[5]   End-to-End Secure Multi-Hop Communication with Untrusted Relays [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (01) :1-11
[6]   Cooperation With an Untrusted Relay: A Secrecy Perspective [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3807-3827
[7]   Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels [J].
Huang, Jing ;
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2536-2550
[8]   Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System [J].
Jeong, Cheol ;
Kim, Il-Min ;
Kim, Dong In .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (01) :310-325
[9]   Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security [J].
Liu, Yupeng ;
Li, Jiangyuan ;
Petropulu, Athina P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) :682-694
[10]   Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay [J].
Mo, Jianhua ;
Tao, Meixia ;
Liu, Yuan ;
Wang, Rui .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (09) :2185-2199