The Basic concept of Physical Layer Security (PLS) is to the Transmission of Secured messages over a wireless channel without depending on higher-layer encryption in the presence of unwarranted eavesdroppers. PLS is a one simple option to complicated cryptography. To address the spectral efficiency (SE) loss caused by half-duplex, full-duplex (FD) has received a lot of attention When compared to HD, FD can almost double the SE. For upcoming 5G wireless networks, security is a major concern. As a result, study on Physical Layer security for multiuser networks is becoming increasingly important. Even so, two-hop FD Relay PLS Schemes had to be investigated.
REFERENCES
1.
S.
Atapattu
, Y.
Jing
, Y
He
, Nathan
Ross
, J.
Evans
“Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network with Relay Selection
” IEEE Transactions on Wireless Communications
,2.
D.
Tubailet
et al. “Artificial Noise based Physical Layer Security in Interference Alignment Multipair Two-Way Relaying Networks
”2169
–3536
(c) 2018
IEEE. Translations and Content mining
3.
Binh
Van Nguyen
, Hyoyoung
Jung
, and Kiseon
Kim
“Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond
” IEEE Communications Magazine.
0163-6804/18/2018 IEEE4.
Mohammed Ahmed
Salem
et al. “Secrecy Analysis on Half-Duplex Two-Way Relay Transmission Using Various Transmission Channels and Jamming Strategies
” 2018 7th International conference on Computer communication
978-1-5386-6992-1/18, 2018
.5.
Z.
Wei
, X.
Zhu
et al. “Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems
” , IEEE Access6.
F.
Zhu
, F.
Gao
, T.
Zhang
, K.
Sun
, and M.
Yao
, “Physical Layer Security for Full Duplex Communications with Self-Interference Mitigation
,” IEEE Trans. Wireless Commun.
, vol. 15
, no. 1
, Jan. 2016
, pp. 329
–340
.7.
M.
Obeed
and W.
Mesbah
, “An efficient physical layer security algorithm for two-way relay systems
,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Qater
, April 2016
.8.
H.
He
, P.
Ren
, Q.
Du
, and L.
Sun
, “Full-duplex for Half-duplex? Hybrid Relay Selection for Physical Layer Secrecy
,” IEEE VTC
, May 2016
.9.
A. E.
Shafie
, A.
Sultan
, and N.
Al-Dhahir
, “Physical Layer Security of a Buffer-Aided Full-Duplex Relaying System
,” IEEE Commun. Lett.
, vol. 20
, no. 9
, Sep. 2016
, pp. 1856
–1859
.10.
J. H.
Lee
, I.
Sohn
, Y.
Kim
, “Transmit Power Allocation for Physical Layer Security in Cooperative Multi-hop Full-duplex Relay Networks
,” Sensors
, vol. 16
, no. 10
, Oct. 2016
, pp. 1726
–1739
.11.
L.
Fan
, X.
Lei
, N.
Yang
, T. Q.
Duong
, and G. K.
Karagiannidis
, “Secure multiple amplify-and-forward relaying with co-channel interference
,” IEEE Journal of Selected Topics in Signal Processing
, vol. 10
, NO. 8
, pp 1494
–1505
, 2016
.12.
S.
Zhang
, L.
Fan
, M.
Peng
, and H. V.
Poor
, “Near-optimal modulo-and forward scheme for the untrusted relay channel
,” IEEE Transactions on Information Theory
, vol. 62
, NO. 5
, pp. 2545
–2556
, 2016
.13.
G.
Chen
, Y.
Gong
, P.
Xiao
, and J. A.
Chambers
, “Physical Layer Network Security in the Full-Duplex Relay System
,” IEEE Trans. Inf. Forensics Security
, vol. 10
, no. 3
, Mar. 2015
, pp. 574
–583
.14.
B. V.
Nguyen
and K.
Kim
, “Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-duplex Decodeand-Foward Relays
,” IEEE WIFS
, Nov. 2015
.15.
L.
Fan
, X.
Lei
, T. Q.
Duong
, M.
Elkashlan
, and G. K.
Karagiannidis
, “Secure multiuser communications in multiple amplify-and-forward relay networks
,” IEEE Transaction on Communication
, vol. 62
, NO. 9
, pp.3299
–3310
, 2014
.16.
J.
Mo
, M.
Tao
, Y.
Liu
, and R.
Wang
, “Secure beamforming for MIMO two-way communications with an untrusted relay
,” IEEE Transactions on Signal Processing
, vol. 62
, NO. 9
, pp. 2185
–2199
, 2014
.17.
Akhtar
, Auon
, Aydin
Behnad
, and Xianbin
Wang
. “On the secrecy rate achievability in dual-hop amplify- and-forward relay networks
.” Wireless Communications Letters, IEEE
3
, no. 5
(2014
): 493
–496
.18.
Mukherjee
, S. A. A. Fakoorian
, J.
Huang
, and A. L.
Swindlehurst
, “Principles of physical layer security in multiuser wireless networks: A survey
,” IEEE Commun. Surveys Tutorials
, vol. 16
, no. 3
, pp. 1550
–1573
, Third 2014
.19.
H.
Sakran
, M.
Shokair
, O.
Nasr
, S.
El-Rabaie
, and A.
El-Azm
, “Proposed relay selection scheme for physical layer security in cognitive radio networks
,” IET Communications
, vol. 6
, no. 16
, pp. 2676
–2687
, June 2012
.20.
X.
He
and A.
Yener
, “Cooperation with an untrusted relay: a secrecy perspective
,” Institute of Electrical and Electronics Engineers. Transaction on Information Theory
, vol. 56
, NO. 8
, pp. 3807
–3827
, 2010
.21.
Barros
, Joao
, and Miguel RD
Rodrigues
. “Secrecy capacity of wireless channels
.” in Information Theory, 2006 IEEE International Symposium on
, pp. 356
–360
. IEEE, 2006
.22.
Kashyap
, T.
Basar
, and R.
Srikant
, “Correlated jamming on MIMO Gaussian fading channels
,” IEEE Trans. Inform. Theory
, vol. 50
, no. 9
, pp. 2119
–2123
, Sep. 2004
.23.
Hasna
, Mazen O.
, and Mohamed-Slim
Alouini
. “Outage probability of multihop transmission over Nakagami fading channels
.” Communications Letters, IEEE
7
, no. 5
(2003
): 216
–218
.24.
Liang
, Yingbin
, Gerhard
Kramer
, H. Vincent
Poor
, and Shlomo
Shamai
. “Compound wiretap channels
.” EURASIP Journal on Wireless Communications and Networking
2009 (2009
)25.
Zhou
, Xiangyun
, and Matthew R.
McKay
. “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
.” Vehicular Technology, IEEE Transactions
on 59, no. 8
- (2010
): 3831
–3842
.26.
Pinto
, Pedro
C.
, Joo
Barros
, and Moe Z.
Win
. “Wireless physical-layer security: The case of colluding eavesdroppers
.” in Information Theory
, 2009. ISIT 2009. IEEE International Symposium on, pp. 2442
–2446
. IEEE, 2009
.27.
Zhang
, Junwei
, and Mustafa Cenk
Gursoy
. “Collaborative relay beamforming for secrecy
.” in Communications (ICC), 2010 IEEE International Conference on
, pp. 1
–5
. IEEE, 2010
.
This content is only available via PDF.
©2023 Authors. Published by AIP Publishing.
2023
Author(s)
You do not currently have access to this content.