A Survey of Optimization Approaches for Wireless Physical Layer Security

被引:173
作者
Wang, Dong [1 ]
Bai, Bo [2 ]
Zhao, Wenbo [1 ]
Han, Zhu [3 ,4 ]
机构
[1] New Star Res Inst Appl Technol, Hefei 230031, Anhui, Peoples R China
[2] Huawei Technol Co Ltd, Labs 2012, Future Network Theory Lab, Hong Kong, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[4] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 02447, South Korea
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2019年 / 21卷 / 02期
基金
中国国家自然科学基金;
关键词
Physical layer security; optimization; resource allocation; beamforming; precoding; cooperative transmission; TRANSMIT ANTENNA SELECTION; MISO WIRETAP CHANNELS; EFFICIENT RESOURCE-ALLOCATION; SECRECY OUTAGE PROBABILITY; GAUSSIAN MULTIPLE-ACCESS; OPTIMAL POWER ALLOCATION; ARTIFICIAL NOISE DESIGN; AD HOC NETWORKS; ENERGY-EFFICIENCY; RELAY-SELECTION;
D O I
10.1109/COMST.2018.2883144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover common scenarios and systems. The topics on physical-layer security designs are then summarized from resource allocation, beam-forming/precoding, and antenna/node selection and cooperation. Based on the aforementioned schemes, the performance metrics and fundamental optimization problems are discussed, which are generally adopted in security designs. Thereafter, the state of the art of optimization approaches on each research topic of physical layer security is reviewed from four categories of optimization problems, such as secrecy rate maximization, secrecy outrage probability minimization, power consumption minimization, and secure energy efficiency maximization. Furthermore, the impacts of channel state information on optimization and design are discussed. Finally, the survey concludes with the observations on potential future directions and open challenges.
引用
收藏
页码:1878 / 1911
页数:34
相关论文
共 285 条
  • [21] A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments
    Bjoernson, Emil
    Matthaiou, Michail
    Debbah, Merouane
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (11) : 4512 - 4525
  • [22] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [23] Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit
    Boshkovska, Elena
    Derrick Wing Kwan Ng
    Dai, Linglong
    Schober, Robert
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (06) : 2642 - 2657
  • [24] Boyd Stephen P., 2014, Convex Optimization
  • [25] Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter
    Brante, Glauber
    Alves, Hirley
    Souza, Richard Demo
    Latva-aho, Matti
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (04) : 1330 - 1342
  • [26] Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
    Butt, M. Majid
    Jorswieck, Eduard A.
    Ottersten, Bjoern
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (08) : 4129 - 4141
  • [27] Application of the sequential parametric convex approximation method to the design of robust trusses
    Canelas, Alfredo
    Carrasco, Miguel
    Lopez, Julio
    [J]. JOURNAL OF GLOBAL OPTIMIZATION, 2017, 68 (01) : 169 - 187
  • [28] A Survey on Security Aspects for LTE and LTE-A Networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    Zhang, Yueyu
    Luo, Zhenxing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 283 - 302
  • [29] Frequency Partitioning Methods to Mitigate Cross-Tier Interference in Two-Tier Femtocell Networks
    Chen, Da
    Jiang, Tao
    Zhang, Zhijiang
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) : 1793 - 1805
  • [30] Toward Green and Secure Communications over Massive MIMO Relay Networks:Joint Source and Relay Power Allocation
    Chen, Jian
    Chen, Xiaoming
    Liu, Tao
    Lei, Lei
    [J]. IEEE ACCESS, 2017, 5 : 869 - 880