“…In contrast, a joint cooperative beamforming and jamming scheme was studied in [14], where the nodes that successfully decode the information are selected as relays and the remaining nodes act as jammers. Moreover, relay/jammer selection has also been widely recognised for the sake of information security [15–26]. In [15–17], the authors analysed the secrecy performance of different relay selection schemes in a dual‐hop system [15, 16], and source cooperation aided jammer selection schemes in a spectrum sharing system [17].…”