The Basic concept of Physical Layer Security (PLS) is to the Transmission of Secured messages over a wireless channel without depending on higher-layer encryption in the presence of unwarranted eavesdroppers. PLS is a one simple option to complicated cryptography. To address the spectral efficiency (SE) loss caused by half-duplex, full-duplex (FD) has received a lot of attention When compared to HD, FD can almost double the SE. For upcoming 5G wireless networks, security is a major concern. As a result, study on Physical Layer security for multiuser networks is becoming increasingly important. Even so, two-hop FD Relay PLS Schemes had to be investigated.

1.
S.
Atapattu
,
Y.
Jing
,
Y
He
,
Nathan
Ross
,
J.
Evans
Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network with Relay Selection
IEEE Transactions on Wireless Communications
,
2.
D.
Tubailet
et al. “
Artificial Noise based Physical Layer Security in Interference Alignment Multipair Two-Way Relaying Networks
2169
3536
(c)
2018
IEEE. Translations and Content mining
3.
Binh
Van Nguyen
,
Hyoyoung
Jung
, and
Kiseon
Kim
Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond
IEEE Communications Magazine.
0163-6804/18/2018 IEEE
4.
Mohammed Ahmed
Salem
et al. “
Secrecy Analysis on Half-Duplex Two-Way Relay Transmission Using Various Transmission Channels and Jamming Strategies
” 2018
7th International conference on Computer communication
978-1-5386-6992-1/18,
2018
.
5.
Z.
Wei
,
X.
Zhu
et al. “
Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems
, IEEE Access
6.
F.
Zhu
,
F.
Gao
,
T.
Zhang
,
K.
Sun
, and
M.
Yao
, “
Physical Layer Security for Full Duplex Communications with Self-Interference Mitigation
,”
IEEE Trans. Wireless Commun.
, vol.
15
, no.
1
, Jan.
2016
, pp.
329
340
.
7.
M.
Obeed
and
W.
Mesbah
, “
An efficient physical layer security algorithm for two-way relay systems
,” in
Proc. IEEE Wireless Communications and Networking Conference (WCNC), Qater
, April
2016
.
8.
H.
He
,
P.
Ren
,
Q.
Du
, and
L.
Sun
, “
Full-duplex for Half-duplex? Hybrid Relay Selection for Physical Layer Secrecy
,”
IEEE VTC
, May
2016
.
9.
A. E.
Shafie
,
A.
Sultan
, and
N.
Al-Dhahir
, “
Physical Layer Security of a Buffer-Aided Full-Duplex Relaying System
,”
IEEE Commun. Lett.
, vol.
20
, no.
9
, Sep.
2016
, pp.
1856
1859
.
10.
J. H.
Lee
,
I.
Sohn
,
Y.
Kim
, “
Transmit Power Allocation for Physical Layer Security in Cooperative Multi-hop Full-duplex Relay Networks
,”
Sensors
, vol.
16
, no.
10
, Oct.
2016
, pp.
1726
1739
.
11.
L.
Fan
,
X.
Lei
,
N.
Yang
,
T. Q.
Duong
, and
G. K.
Karagiannidis
, “
Secure multiple amplify-and-forward relaying with co-channel interference
,”
IEEE Journal of Selected Topics in Signal Processing
, vol.
10
, NO.
8
, pp
1494
1505
,
2016
.
12.
S.
Zhang
,
L.
Fan
,
M.
Peng
, and
H. V.
Poor
, “
Near-optimal modulo-and forward scheme for the untrusted relay channel
,”
IEEE Transactions on Information Theory
, vol.
62
, NO.
5
, pp.
2545
2556
,
2016
.
13.
G.
Chen
,
Y.
Gong
,
P.
Xiao
, and
J. A.
Chambers
, “
Physical Layer Network Security in the Full-Duplex Relay System
,”
IEEE Trans. Inf. Forensics Security
, vol.
10
, no.
3
, Mar.
2015
, pp.
574
583
.
14.
B. V.
Nguyen
and
K.
Kim
, “
Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-duplex Decodeand-Foward Relays
,”
IEEE WIFS
, Nov.
2015
.
15.
L.
Fan
,
X.
Lei
,
T. Q.
Duong
,
M.
Elkashlan
, and
G. K.
Karagiannidis
, “
Secure multiuser communications in multiple amplify-and-forward relay networks
,”
IEEE Transaction on Communication
, vol.
62
, NO.
9
, pp.
3299
3310
,
2014
.
16.
J.
Mo
,
M.
Tao
,
Y.
Liu
, and
R.
Wang
, “
Secure beamforming for MIMO two-way communications with an untrusted relay
,”
IEEE Transactions on Signal Processing
, vol.
62
, NO.
9
, pp.
2185
2199
,
2014
.
17.
Akhtar
,
Auon
,
Aydin
Behnad
, and
Xianbin
Wang
. “
On the secrecy rate achievability in dual-hop amplify- and-forward relay networks
.”
Wireless Communications Letters, IEEE
3
, no.
5
(
2014
):
493
496
.
18.
Mukherjee
,
S. A. A. Fakoorian
,
J.
Huang
, and
A. L.
Swindlehurst
, “
Principles of physical layer security in multiuser wireless networks: A survey
,”
IEEE Commun. Surveys Tutorials
, vol.
16
, no.
3
, pp.
1550
1573
, Third
2014
.
19.
H.
Sakran
,
M.
Shokair
,
O.
Nasr
,
S.
El-Rabaie
, and
A.
El-Azm
, “
Proposed relay selection scheme for physical layer security in cognitive radio networks
,”
IET Communications
, vol.
6
, no.
16
, pp.
2676
2687
, June
2012
.
20.
X.
He
and
A.
Yener
, “
Cooperation with an untrusted relay: a secrecy perspective
,”
Institute of Electrical and Electronics Engineers. Transaction on Information Theory
, vol.
56
, NO.
8
, pp.
3807
3827
,
2010
.
21.
Barros
,
Joao
, and
Miguel RD
Rodrigues
. “
Secrecy capacity of wireless channels
.” in
Information Theory, 2006 IEEE International Symposium on
, pp.
356
360
. IEEE,
2006
.
22.
Kashyap
,
T.
Basar
, and
R.
Srikant
, “
Correlated jamming on MIMO Gaussian fading channels
,”
IEEE Trans. Inform. Theory
, vol.
50
, no.
9
, pp.
2119
2123
, Sep.
2004
.
23.
Hasna
,
Mazen O.
, and
Mohamed-Slim
Alouini
. “
Outage probability of multihop transmission over Nakagami fading channels
.”
Communications Letters, IEEE
7
, no.
5
(
2003
):
216
218
.
24.
Liang
,
Yingbin
,
Gerhard
Kramer
,
H. Vincent
Poor
, and
Shlomo
Shamai
. “
Compound wiretap channels
.”
EURASIP Journal on Wireless Communications and Networking
2009 (
2009
)
25.
Zhou
,
Xiangyun
, and
Matthew R.
McKay
. “
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
.”
Vehicular Technology, IEEE Transactions
on 59, no.
8
- (
2010
):
3831
3842
.
26.
Pinto
,
Pedro
C.
,
Joo
Barros
, and
Moe Z.
Win
. “
Wireless physical-layer security: The case of colluding eavesdroppers
.” in
Information Theory
, 2009. ISIT 2009. IEEE International Symposium on, pp.
2442
2446
. IEEE,
2009
.
27.
Zhang
,
Junwei
, and
Mustafa Cenk
Gursoy
. “
Collaborative relay beamforming for secrecy
.” in
Communications (ICC), 2010 IEEE International Conference on
, pp.
1
5
. IEEE,
2010
.
This content is only available via PDF.
You do not currently have access to this content.