{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:42:10Z","timestamp":1778611330906,"version":"3.51.4"},"reference-count":357,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"EU","award":["ATOM-690750"],"award-info":[{"award-number":["ATOM-690750"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2018.2865607","type":"journal-article","created":{"date-parts":[[2018,8,15]],"date-time":"2018-08-15T18:35:13Z","timestamp":1534358113000},"page":"2734-2771","source":"Crossref","is-referenced-by-count":240,"title":["A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0910-8803","authenticated-orcid":false,"given":"Furqan","family":"Jameel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9532-2288","authenticated-orcid":false,"given":"Shurjeel","family":"Wyne","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5025-6624","authenticated-orcid":false,"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4703-4836","authenticated-orcid":false,"given":"Trung Q.","family":"Duong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","first-page":"417","article-title":"Cooperative jamming for wireless physical layer security","author":"dong","year":"2009","journal-title":"Proc IEEE Workshop Stat Signal Process"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.081012.110236"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2623627"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2572960"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2477800"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037289"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638190"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0634"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2192606"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.081612.121344"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.100713.131673"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2391261"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2329273"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/452907"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2013.050613.130216"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2253771"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2791548"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2016.1218063"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.040214.140109"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2008.4578641"},{"key":"ref38","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref33","first-page":"1","article-title":"Wireless physical layer security with imperfect channel state information: A survey","volume":"3","author":"he","year":"2013","journal-title":"ZTE Commun"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523805"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.020"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324413"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2013.051513.130110"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2459592"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2377239"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2016.7536864"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.05.021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6633742"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2322076"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2436334"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2395414"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2365808"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-017-1006-0"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2553019"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2631465"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8747420"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2222386"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2017.04.017"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/INFOS.2014.7036690"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5221-0"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2660480"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2665465"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2616147"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766514"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2015.1032577"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1081-x"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2336092"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2013.0377"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2252898"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385779"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2369001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2553121"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631950"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2318731"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2634559"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7084371"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165946"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.090746"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2398734"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6272427"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130913"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2536801"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120016"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCom.2016.7980549"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1384-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2452893"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2710307"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2288318"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2607159"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2405063"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2656558"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2013.092813.130514"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2511808"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2500578"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.092810.091092"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2461211"},{"key":"ref298","doi-asserted-by":"crossref","first-page":"4766","DOI":"10.1109\/TWC.2014.2337308","article-title":"Secure transmission in multicell massive MIMO systems","volume":"13","author":"jun","year":"2014","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref154","first-page":"1","article-title":"IEEE 802.11p in fast fading scenarios: From traces to comparative studies of receive algorithms","author":"bloessl","year":"2016","journal-title":"Proc 1st ACM Int Workshop Smart Auton Connected Veh Syst Services"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2017.7918915"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.814480"},{"key":"ref291","first-page":"1831","article-title":"Secrecy wireless information and power transfer with MISO beamforming","author":"liu","year":"2013","journal-title":"Proc IEEE Glob Commun Conf"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481349"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2368695"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530058"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.110813.121671"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2610965"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2012.6292242"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.853304"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248669"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1351-1"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2421912"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SIGTELCOM.2017.7849806"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2686325"},{"key":"ref54","first-page":"421","article-title":"Relay-aided successive aligned interference cancellation for wireless x networks with full-duplex relays","volume":"66","author":"shin","year":"2017","journal-title":"IEEE Trans Veh Technol"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2570816"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2619672"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018202"},{"key":"ref167","first-page":"244","article-title":"Performance evaluation of multi-hop cooperative transmission protocol with hardware noises and presence of eavesdropper","author":"thien","year":"2017","journal-title":"Proc IEEE Int Conf Syst Sci Eng (ICSSE)"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2016.7725633"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2659724"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120209"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2016.7751587"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2680449"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2405793"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045106"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2833423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31174-6_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2626360"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2016.2645481"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2478029"},{"key":"ref46","first-page":"1609","article-title":"Amplify-forward and decode-forward: The impact of location and capacity contour","author":"yu","year":"2005","journal-title":"Proc IEEE Mil Commun Conf (MILCOM)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070209"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2690600"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0797"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883625"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.12.110670"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2009.5469979"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2828120"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2566298"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2530080"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0355"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.74"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050958"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2621041"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842357"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2671872"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2413784"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2014.2333694"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2490099"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736746"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925584"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511623"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842143"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7565037"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417393"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2578943"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.120412.101358"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600290"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2676087"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2345763"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166386"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2514094"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6882303"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8227980"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803149"},{"key":"ref64","first-page":"99","article-title":"Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference","author":"dang","year":"2015","journal-title":"Proc IEEE Wireless Commun Netw Conf (WCNC)"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.32"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108359"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2466548"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2599223"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2746007"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2716974"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2016.7536868"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555247"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2016.2618724"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557113"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952798"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2776944"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.3390\/info7030049"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4037-2"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1230387"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2992"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2293979"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2813-4"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3142"},{"key":"ref95","first-page":"97","article-title":"Physical layer security with uncoordinated helpers implementing cooperative jamming","author":"luo","year":"2012","journal-title":"Proc IEEE Sensor Array Multichannel Signal Process Workshop (SAM)"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090215"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2696537"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928272"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700015"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2695163"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947121"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.05.015"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.3079"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2440428"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555248"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2789223"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2362796"},{"key":"ref336","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TVT.2016.2555399","article-title":"Performance analysis of nonorthogonal multiple access for relaying networks over Nakagami-m fading channels","volume":"66","author":"jinjin","year":"2017","journal-title":"IEEE Trans Veh Technol"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2631482"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677504"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2472006"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-361"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824624"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0051"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2650987"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2433291"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510755"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2159598"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6190004"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654854"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2216952"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/305146"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2441064"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0836"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2172433"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2574709"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292188"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9580639"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2690521"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2379633"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.092813.131367"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2017.00068"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2343226"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0310"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2405903"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2611500"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2207438"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692652"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2013.6810558"},{"key":"ref200","first-page":"1","article-title":"Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: Blind cooperative jamming","author":"xie","year":"2013","journal-title":"Proc Annu Conf Inf Sci Syst (CISS)"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2227313"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324460"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412663"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2292094"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766087"},{"key":"ref201","doi-asserted-by":"crossref","first-page":"3359","DOI":"10.1109\/TIT.2014.2315801","article-title":"Secure degrees of freedom of one-hop wireless networks","volume":"60","author":"jianwei","year":"2014","journal-title":"IEEE Trans Inf Theory"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.041713.120865"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6189965"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2012.6319710"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2012.6511276"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2278835"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2012.6319712"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2261060"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2504526"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7179084"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.120412.112001"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682838"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880959"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/EUSIPCO.2016.7760433"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600119NM"},{"key":"ref219","doi-asserted-by":"crossref","first-page":"601","DOI":"10.13164\/re.2017.0601","article-title":"Distributed matching algorithms: Maximizing secrecy in the presence of untrusted relay","volume":"26","author":"bakhtiar","year":"2017","journal-title":"Radioengineering"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768568"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.037"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2639827"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2609934"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3998-5"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2657629"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2744660"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8010981"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2607783"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524448"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/WAMICON.2016.7483858"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.201"},{"key":"ref125","first-page":"754","article-title":"Convex analysis based beamforming of decode-and-forward cooperation for improving wireless physical layer security","author":"hui","year":"2012","journal-title":"Proc IEEE 14th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2403614"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654851"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564989"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2013.6810559"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2428211"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960158"},{"key":"ref131","first-page":"91","article-title":"Physical layer security for cooperative relaying in broadcast networks","author":"chen","year":"2011","journal-title":"Proc IEEE Mil Commun Conf (MILCOM)"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2669240"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611979"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2142305"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120215"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364148"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.817439"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.912136"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555246"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2209692"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/26.837052"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2418316"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2423290"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2387860"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2412939"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.1060"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881217"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2675402"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2572681"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037295"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876209"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.3390\/s17020377"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00116"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2233473"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2356482"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2011.5941100"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2684901"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2621719"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.810294"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161295"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162575"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2374356"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2390136"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2354635"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.082011.110538"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2292903"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2297835"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2185493"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2600658"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2327480"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2014.7000872"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2230657"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111216"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.070912.111293"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2772244"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504177"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2489610"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2651066"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2679063"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0621-5"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2617328"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-017-0981-5"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-017-0997-x"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385095"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2014.6941328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2565580"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2017.2723422"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881216"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2700438"},{"key":"ref16","first-page":"341","article-title":"Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers","volume":"13","author":"kuhestani","year":"2018","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.111611.110970"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2645227"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316155"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656462"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2578313"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.081011.101955"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2012.6489091"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364491"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2303942"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2197032"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.2009.5277456","article-title":"Catching resource-devouring worms in next-generation wireless relay systems: Two-way relay and full-duplex relay","volume":"47","author":"ju","year":"2009","journal-title":"IEEE Commun Mag"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2302013"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2269049"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2321152"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2345568"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/SAM.2014.6882390"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343301"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2247600"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2636288"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.022714131252"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768508"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8809933\/08437135.pdf?arnumber=8437135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:53:01Z","timestamp":1657745581000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8437135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":357,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2865607","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}