Research Article

A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

Table 1

An overview of power allocation-based cooperative jamming schemes.

ReferencesAssumptionsMetricsContributions

[33]Perfect CSISCPropose a fast algorithm to obtain asymptotically optimal cooperative jamming.
[34]Perfect CSISCImprove the SC for a scenario with limited power and a fixed number of antennas.
[35]Perfect CSISCProve that the optimal power allocation depends on the global CSI and optimize SC subject to power constraints.
[36]Perfect CSISCStudy the secrecy performance of partial cooperative jamming for single and multiple data transmission scenarios.
[37]Perfect CSISCAnalyze the impact of the distance and the number of eavesdroppers on the secrecy performance for different transmission patterns.
[38]Unknown CSISCPropose a robust scheme in an unknown CSI scenario and demonstrate the similar secrecy performance between unknown and known CSI.
[39]Statistical CSISOPMinimize the SOP problem to obtain the optimal power allocation.
[40]Statistical CSISOPDerive closed-form and asymptotic expressions of the SOP for a dual-hop underlay uplink CRN operating under Nakagami- fading channels.
[24]Statistical CSIIPPropose a case study of physical layer security for a multiple relay scenario and evaluate the IP in Rayleigh fading environments.
[41]Perfect CSISEEPropose a beamforming scheme to maximize the SEE-based optimization problem in an underlay CRN cooperative jamming scenario.
[25]Perfect CSISEEConsider a joint source and relay power allocation scheme to maximize the system SEE.
[26]Perfect CSISGDemonstrate that a slightly reduced SC sharply decreases the received SNR of an eavesdropper.
[42]Unknown CSIWCSROptimize the flying trajectories and transmit power of unmanned aerial vehicles to improve the average WCSR of the system.