A Survey of Optimization Approaches for Wireless Physical Layer Security

被引:173
作者
Wang, Dong [1 ]
Bai, Bo [2 ]
Zhao, Wenbo [1 ]
Han, Zhu [3 ,4 ]
机构
[1] New Star Res Inst Appl Technol, Hefei 230031, Anhui, Peoples R China
[2] Huawei Technol Co Ltd, Labs 2012, Future Network Theory Lab, Hong Kong, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[4] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 02447, South Korea
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2019年 / 21卷 / 02期
基金
中国国家自然科学基金;
关键词
Physical layer security; optimization; resource allocation; beamforming; precoding; cooperative transmission; TRANSMIT ANTENNA SELECTION; MISO WIRETAP CHANNELS; EFFICIENT RESOURCE-ALLOCATION; SECRECY OUTAGE PROBABILITY; GAUSSIAN MULTIPLE-ACCESS; OPTIMAL POWER ALLOCATION; ARTIFICIAL NOISE DESIGN; AD HOC NETWORKS; ENERGY-EFFICIENCY; RELAY-SELECTION;
D O I
10.1109/COMST.2018.2883144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover common scenarios and systems. The topics on physical-layer security designs are then summarized from resource allocation, beam-forming/precoding, and antenna/node selection and cooperation. Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs. Thereafter, the state of the art of optimization approaches on each research topic of physical layer security is reviewed from four categories of optimization problems, such as secrecy rate maximization, secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization. Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges.
引用
收藏
页码:1878 / 1911
页数:34
相关论文
共 285 条
  • [1] Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary
    Abedi, Mohammad Reza
    Mokari, Nader
    Saeedi, Hamid
    Yanikomeroglu, Halim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (02) : 885 - 899
  • [2] New results on Hermitian matrix rank-one decomposition
    Ai, Wenbao
    Huang, Yongwei
    Zhang, Shuzhong
    [J]. MATHEMATICAL PROGRAMMING, 2011, 128 (1-2) : 253 - 283
  • [3] Akgun Berk, 2017, IEEE Transactions on Communications, V65, P956, DOI 10.1109/TCOMM.2016.2641949
  • [4] Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks
    Al-Qahtani, Fawaz S.
    Zhong, Caijun
    Alnuweiri, Hussein M.
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (05) : 1756 - 1770
  • [5] Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter
    Alves, Hirley
    Tome, Mauricio De Castro
    Nardelli, Pedro Henrique Juliano
    De Lima, Carlos H. M.
    Latva-Aho, Matti
    [J]. IEEE ACCESS, 2016, 4 : 4861 - 4873
  • [6] Performance of Transmit Antenna Selection Physical Layer Security Schemes
    Alves, Hirley
    Souza, Richard Demo
    Debbah, Merouane
    Bennis, Mehdi
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) : 372 - 375
  • [7] A new efficient algorithm based on DC programming and DCA for clustering
    An, Le Thi Hoai
    Belghiti, M. Tayeb
    Tao, Pham Dinh
    [J]. JOURNAL OF GLOBAL OPTIMIZATION, 2007, 37 (04) : 593 - 608
  • [8] [Anonymous], IEEE WIRELESS COMMUN
  • [9] [Anonymous], 2016, P IEEE INT C COMM IC
  • [10] [Anonymous], 2011, Physical-Layer Security:From Information Theory to Security Engineering, DOI DOI 10.1017/CBO9780511977985