Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey

被引:30
作者
Sharma, Himanshu [1 ]
Kumar, Neeraj [1 ,2 ,3 ,4 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala, India
[2] Univ Petr & Energy Studies Dehradun, Sch Comp Sci, Dehra Dun, Uttarakhand, India
[3] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[4] King Abdulaziz Univ, Fac Comp & IT, Jeddah, Saudi Arabia
关键词
5G; 6G; Physical layer security; Deep learning; Deep reinforcement learning; Terrestrial communication; DISCRIMINATORY CHANNEL ESTIMATION; MASSIVE MIMO; MODULATION CLASSIFICATION; POWER ALLOCATION; WIRELESS NETWORKS; JAMMING ATTACKS; NOMA; OPTIMIZATION; ARCHITECTURE; DESIGN;
D O I
10.1016/j.phycom.2023.102002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The key principle of physical layer security (PLS) is to permit the secure transmission of confidential data using efficient signal-processing techniques. Also, deep learning (DL) has emerged as a viable option to address various security concerns and enhance the performance of conventional PLS techniques in wireless networks. DL is a strong data exploration technique which can be used to learn normal and abnormal behavior of 5G and beyond wireless networks in an insecure channel paradigm. Also, since DL techniques can successfully predict future new instances by learning from existing ones, they can successfully predict new attacks, which frequently involve mutations of earlier attacks. Thus, motivated by the benefits of DL and PLS, this survey provides a comprehensive review that overviews how DL-based PLS techniques can be employed for solving various security concerns in 5G and beyond networks. The survey begins with an overview of physical layer threats and security concerns in 5G and beyond networks. Then, we present a detailed analysis of various DL and deep reinforcement learning (DRL) techniques that are applicable to PLS applications. We present the specific use-cases of PLS design for each type of technique, including attack detection, physical layer authentication (PLA), and other PLS techniques. Then, we present an in-depth overview of the key areas of PLS where DL can be used to enhance the security of wireless networks, such as automatic modulation classification (AMC), secure beamforming, PLA, etc. Performance evaluation metrics for DL-based PLS design are subsequently covered. Finally, we provide insights to the readers about various challenges and future research trends in the design of DL-based PLS for terrestrial communications in 5G and beyond networks. (c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:28
相关论文
共 195 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   A Deep Autoencoder Trust Model for Mitigating Jamming Attack in IoT Assisted by Cognitive Radio [J].
Abdalzaher, Mohamed S. ;
Elwekeil, Mohamed ;
Wang, Taotao ;
Zhang, Shengli .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :3635-3645
[3]   k-Sparse Autoencoder-Based Automatic Modulation Classification With Low Complexity [J].
Afan Ali ;
Fan Yangyu .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (10) :2162-2165
[4]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[5]   Deep Learning Coordinated Beamforming for Highly-Mobile Millimeter Wave Systems [J].
Alkhateeb, Ahmed ;
Alex, Sam ;
Varkey, Paul ;
Li, Ying ;
Qu, Qi ;
Tujkovic, Djordje .
IEEE ACCESS, 2018, 6 :37328-37348
[6]  
[Anonymous], 2015, P INT WORKSH INF SEC
[7]  
[Anonymous], 2015, Recomm
[8]  
aplcan t., 2018, LECT NOTES COMPUT SC
[9]  
Aral RA, 2018, IEEE INT CONF BIG DA, P2058, DOI 10.1109/BigData.2018.8622212
[10]   Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels [J].
Arikan, Erdal .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (07) :3051-3073