Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art
DOI:
https://doi.org/10.13052/jcsm2245-1439.1235Keywords:
Multiple Input Multiple Output (MIMO), Cooperative Wireless Communication (CWC), Physical Layer Security (PLS)Abstract
One morning, we were waiting for our college bus. The Wipro industry bus was slowly passing nearby us looking for its employees. At the last moment, when the driver increased speed, one person stepped down from the auto rickshaw and shouted “stop the bus, stop the bus”. Voluntarily, whoever was present started shouting “stop, stop the bus”. The sound finally reached the bus driver who stopped the bus, and the employee could catch it in time. This analog from everyday realistic life simply depicts the spirit of cooperative wireless communication which utilizes the information overheard by neighbouring nodes to offer reliable communication between sender and receiver. Future converged wireless networks are expected to provide high data rate services with extension in coverage area. Also, the next generation networks should possess bandwidth efficiency, less power consumption ability with small sized mobile equipment. Multiple-input multiple-output (MIMO) system is the best technique for the provision of communication diversity wherein multiple antennas are installed at the sender and receiver. In today’s miniaturizing electronics era, the hardware implementation of MIMO in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication.
Downloads
References
P. Liu, Z. Tao, Z. Lin, E. Erkip, and S. Panwar. Cooperative wireless communications: A cross layer approach. IEEEWireless Communications, 13(4):84–92, August 2006.
H. Katiyar, A. Rastogi, and R. Agarwal. Cooperative communication: A review. IETE Tech. Review, 28:409–417, 2011.
E.C. van der Meulen. Three-terminal communication channels. Advances in Applied Probability, 3:120–154, 1971.
T.M. Cover and A.A.E. Gamal. Capacity theorems for the relay channel. IEEE Transactions on Information Theory, 25(5), 1979.
A. Sendonaris, E. Erkip, and B. Aazhang. Increasing uplink capacity via user cooperation diversity. In Proceedings of IEEE International Symposium on Information Theory (ISIT), August, p. 156, 1998.
Misha Dohler and Yonghui Li. Cooperative Communications: Hardware, Channel and PHY. John Wiley and Sons, 2010.
A. Saleh, A. Rustako, and R. Roman. Distributed antennas for indoor radio communications. IEEE Trans. Commun., 35(12):1245–1251, December 1987.
Xiaofeng Tao, Xiaodong Xu, and Qimei Cui. An overview of cooperative communications. IEEE Communications Magazine, 50(6):65–71, June 2012.
Li Qian, R.Q. Hu, Qian Yi, and Wu Geng. Cooperative wireless communications for wireless networks: Techniques and applications in LTE-advanced systems. IEEE Wireless Communications, 19(2):22–29, April 2012.
Hui Ming Wang and Xiang Gen Xia. Asynchronous cooperative communication systems: A survey on signal Designs. Science China Information Sciences, 54(8):1547–1561, August 2011.
Chen Yongrui, Yang Yang, and Yi Weidong. A cross layer strategy for cooperative diversity in wireless sensor networks. Journal of Electronics, China, 29(1/2), March 2012.
Vandana Rohoakale and Neeli Prasad. Receiver sensitivity in opportunistic cooperative Internet of Things (IoT). In Proceedings of Second International Conference on Ad Hoc Networks, Victoria, British Columbia, Canada, August 2010.
Pei Liu, Zhifeng Tao, Zinan Lin, Eiza Erkip, and Shivendra Panwa. Cooperative wireless communications: A cross-layer approach. IEEE Wireless Communications, August 2006.
Chao Chen, Baoyu Zheng, Xianjing Zhao, and Zhenya Yan. A novel weighted cooperative routing algorithm based on distributed relay selection. In Proceedings 2nd International Symposium on Wireless Pervasive Computing (ISWPC’07), 2007.
Lun Dong, Athina P. Petropulu, and H. Vincent Poor. Cross-layer cooperative beam forming for wireless networks. In Proceedings of Cooperative Communication for Improved Wireless Network Transmission-IGI Global, 2010.
K.J. Ray Liu, Ahmed K. Sadek, Weifeng Su, and Anders Kwasinski. Relay channels and protocols. In Cooperative Communication and Networking. Cambridge University Press, 2009.
S. Abdulhadi,M. Jaseemuddin, and A. Anpalagan. A survey of distributed relay selection schemes in cooperative wireless ad hoc networks. Wireless Personal Communications, 63:917–935, 2012.
Miguel Sepulcre, Jens Mittag, Paolo Santi, Hannes Hartenstein, and Javier Gozalvez. Cogestion and awareness control in cooperative vehicular systems. Proceedings of the IEEE, 99(7), July 2011.
Dejun Yang, Xi Fang, and Guoliang Xue. Game theory in cooperative communications. IEEE Wireless Communications, 44–49, April 2012.
C.S.R. Murthy and B.S. Manoj. Adhoc Wireless Networks Architecture and Protocols. Prentice Hall, Princeton, 2004.
Yingbin Liang, H. Vincent Poor, and Shlomo Shamai (Shitz). Information theoretic security. Foundations and Trends in Communications and Information Theory, 5(4–5):355–580, 2009.
Yi-Sheng Shiu, Shin Yu Chang, Hsiao-Chun Wu, Scott C.-H. Huang, and Hsiao-Hwa Chen. Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, April 2011.
Vandana Rohokale, Neeli Prasad, and Ramjee Prasad. Cooperative jamming for physical layer security in wireless sensor networks. In Proceedings of 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, September 24–27, 2012.
Yinian Mao and Min Wu. Tracing malicious relays in cooperative wireless communication. IEEE Transaction on Information Forensics and Security, 2(2):198–212, June 2007.
Ling Tang, Xiaowen Gong, Jianhui Wu, and Junshan Zhang. Secure wireless communication via cooperative relaying and jamming. IEEE GLOBECOM Workshop on Physical Layer Security, pp. 849–853, December 2011.
Lun Dong, Zhu Han, Athina P. Petropulu, and H. Vincent Poor. Secure wireless communication via cooperation. In Proceedings of Fourty Sixth IEEE Annual Allerton Conference, USA, September 2008.
Santosh Kulkarni and Prathima Agarwal. Safeguarding cooperation in Synergy MAC. In Proceedings of 42nd IEEE Southeastern Symposium on System Theory (SSST), USA, pp. 156–160, March 2010.
Jianhua Mo, Meixia Tao, and Yuan Liu. Relay placement for physical layer security: A secure connection perspective. IEEE Communication Letters, 16(6), June 2012.
Jiangyuan Li, Athina P. Petropulu, and Steven Weber. On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing, 59(10), October 2011.
Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter Mason, and Azzedine Boukerche. Joint authentication and quality of service provisioning in cooperative communication networks. Elsevier Journal of Computer Communications, 35:597–607, 2012.
Zhenzhen Gao, Yu-Han Yang, and K.J. Ray Liu. Anti-eavesdropping space-time network coding for cooperative communications. IEEE Transactions on Wireless Communications,10(11):3898–3908, November 2011.
Guan Quansheng, F.R. Yu, Jiang Shengming, and V.C.M. Leung. A joint design for topology and security in MANETs with cooperative communications. In Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6, June 2011.
Thomas M. Cover and Joy A. Thomas. Elements of Information Theory (second edition). Wiley-Interscience Publication, 2006.
Shu Lin and Daniel J. Costello. Error control coding: Fundamentals & Applications (second edition). Prentice Hall Series in Computer Applications in Electrical Engineering. Prentice Hall, 2010.
D.K. Sharma, A. Mishra, and Rajiv Saxena. Analog and digital modulation techniques: A review. TECHNIA International Journal of Computing Science and Communication Technologies, 3(1), July 2010.
Gottfried Ungerboeck. Trellis coded modulation with redundant signal sets Part I: Introduction. IEEE Communications Magazine, 25(2):5–11, February 1987.
I. Csiszar and J. Korner. Broadcast channels with confidential messages. IEEE Transactions on Information Theory, IT-24(3):339–348, May 1978.