Secure Wirelessly Powered Networks at the Physical Layer: Challenges, Countermeasures, and Road Ahead

被引:18
作者
Lu, Xiao [1 ,2 ]
Nguyen Cong Luong [3 ]
Dinh Thai Hoang [4 ]
Niyato, Dusit [5 ]
Xiao, Yong [6 ,7 ]
Wang, Ping [1 ]
机构
[1] York Univ, Dept Elect Engn & Comp Sci, Toronto, ON M3J 1P3, Canada
[2] Ericsson, Mississauga, ON, Canada
[3] Phenikaa Univ, Fac Comp Sci, Hanoi 12116, Vietnam
[4] Univ Technol Sydney, Fac Engn & Informat Technol, Ultimo, NSW 2007, Australia
[5] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[6] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
[7] Peng Cheng Lab, Shenzhen 518066, Peoples R China
基金
新加坡国家研究基金会; 加拿大自然科学与工程研究理事会; 中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Jamming; Backscatter; Communication system security; Wireless communication; Security; Eavesdropping; Wireless sensor networks; Artificial noise (AN); beamforming; denial-of-service (DoS); detection-of-covert; eavesdropping; information-theoretical security; jamming; physical-layer (PHY) security; JAMMING ATTACKS; INFORMATION; COMMUNICATION; OPTIMIZATION; SWIPT; PERFORMANCE; SYSTEMS; DESIGN; GAME;
D O I
10.1109/JPROC.2021.3126616
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Harvesting wireless power to energize miniature devices has been envisioned as a promising solution to sustain future-generation energy-sensitive networks, e.g., Internet-of-Things systems. However, due to the limited computing and communication capabilities, wirelessly powered networks (WPNs) may be incapable of employing complex security practices, e.g., encryption, which may incur considerable computation and communication overheads. This challenge makes securing energy harvesting communications an arduous task and, thus, limits the use of WPNs in many high-security applications. In this context, security at the physical layer (PHY) that exploits the intrinsic properties of the wireless medium to achieve secure communication has emerged as an alternative paradigm. This article first introduces the fundamental principles of primary PHY attacks, covering jamming, eavesdropping, and detection of covert, and then presents an overview of the prevalent countermeasures to secure both active and passive communications in WPNs. Furthermore, a number of open research issues are identified to inspire possible future research.
引用
收藏
页码:193 / 209
页数:17
相关论文
共 106 条
[1]  
Acharya M., 2005, P OPNETWORK WASH DC
[2]   Optimal Downlink Transmission for Cell-Free SWIPT Massive MIMO Systems With Active Eavesdropping [J].
Alageli, Mahmoud ;
Ikhlef, Aissa ;
Alsifiany, Fahad ;
Abdullah, Mohammed A. M. ;
Chen, Gaojie ;
Chambers, Jonathon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1983-1998
[3]   Optimization for Maximizing Sum Secrecy Rate in MU-MISO SWIPT Systems [J].
Alageli, Mahmoud ;
Ikhlef, Aissa ;
Chambers, Jonathon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (01) :537-553
[4]   Beamforming in Wireless Energy Harvesting Communications Systems: A Survey [J].
Alsaba, Yamen ;
Kamal, Sharul ;
Rahim, Abdul ;
Leow, Chee Yen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02) :1329-1360
[5]  
[Anonymous], 2004, Ad Hoc Wireless Networks: Architectures and Protocols
[6]   Survey on cognitive anti-jamming communications [J].
Aref, Mohamed A. ;
Jayaweera, Sudharman K. ;
Yepez, Esteban .
IET COMMUNICATIONS, 2020, 14 (18) :3110-3127
[7]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[8]   Secure Hybrid A/D Beamforming for Hardware-Efficient Large-Scale Multiple-Antenna SWIPT Systems [J].
Cai, Yunlong ;
Cui, Fangyu ;
Shi, Qingjiang ;
Wu, Yongpeng ;
Champagne, Benoit ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) :6141-6156
[9]   Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs [J].
Clerckx, Bruno ;
Zhang, Rui ;
Schober, Robert ;
Ng, Derrick Wing Kwan ;
Kim, Dong In ;
Poor, H. Vincent .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (01) :4-33
[10]   Wirelessly Powered Backscatter Communications: Waveform Design and SNR-Energy Tradeoff [J].
Clerckx, Bruno ;
Zawawi, Zati Bayani ;
Huang, Kaibin .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (10) :2234-2237