An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

被引:71
作者
Hyadi, Amal [1 ]
Rezki, Zouheir [2 ]
Alouini, Mohamed-Slim [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Div Comp Elect & Math Sci & Engn, Thuwal 239556900, Saudi Arabia
[2] Univ Idaho, Elect & Comp Engn Dept, Moscow, ID 83844 USA
关键词
Physical layer security; fading channels; channel state information; estimation error; rate-limited feedback; outdated CSI; MIMO WIRETAP CHANNELS; SECRET MESSAGE CAPACITY; ARTIFICIAL-NOISE; BROADCAST CHANNELS; MULTIPLE-INPUT; OUTAGE PROBABILITY; STATE INFORMATION; FADING CHANNELS; TRANSMISSION; RELAY;
D O I
10.1109/ACCESS.2016.2612585
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.
引用
收藏
页码:6121 / 6132
页数:12
相关论文
共 130 条
[81]  
Negi R, 2005, IEEE VTS VEH TECHNOL, P1906
[82]   Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks [J].
Ng, Derrick Wing Kwan ;
Lo, Ernest S. ;
Schober, Robert .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (10) :3528-3540
[83]   The Secrecy Capacity of the MIMO Wiretap Channel [J].
Oggier, Frederique ;
Hassibi, Babak .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :524-528
[84]   The Secrecy Capacity of the MIMO Wiretap Channel [J].
Oggier, Frederique ;
Hassibi, Babak .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) :4961-4972
[85]  
Parada P, 2005, 2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, P2152
[86]   Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI [J].
Pei, Minyan ;
Wei, Jibo ;
Wong, Kai-Kit ;
Wang, Xin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) :544-549
[87]   Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information [J].
Pei, Yiyang ;
Liang, Ying-Chang ;
Teh, Kah Chan ;
Li, Kwok Hung .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (04) :1683-1693
[88]   Secure Communication over MISO Cognitive Radio Channels [J].
Pei, Yiyang ;
Liang, Ying-Chang ;
Zhang, Lan ;
Teh, Kah Chan ;
Li, Kwok Hung .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (04) :1494-1502
[89]   On Performance and Feedback Strategy of Secure Multiuser Communications With MMSE Channel Estimate [J].
Peng, Zhangjie ;
Xu, Wei ;
Zhu, Jun ;
Zhang, Hua ;
Zhao, Chunming .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) :1602-1616
[90]   Secure Communication in Stochastic Wireless Networks-Part II: Maximum Rate and Collusion [J].
Pinto, Pedro C. ;
Barros, Joao ;
Win, Moe Z. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :139-147