Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

被引:536
作者
Liu, Yiliang [1 ]
Chen, Hsiao-Hwa [2 ]
Wang, Liangmin [3 ]
机构
[1] Harbin Inst Technol, Commun Res Ctr, Harbin 150001, Peoples R China
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[3] Jiangsu Univ, Dept Internet Things Engn, Zhenjiang 212000, Peoples R China
关键词
Physical layer security; wiretap channel; key generation; authentication; multi-antenna systems; relay; MIMO WIRETAP CHANNELS; SECRET KEY GENERATION; SHARING COMMUNICATION-SYSTEMS; ARTIFICIAL-NOISE; MULTIPLE ANTENNAS; FADING CHANNELS; MASSIVE MIMO; RESPONSE AUTHENTICATION; CONFIDENTIAL MESSAGES; EAVESDROPPER CHANNEL;
D O I
10.1109/COMST.2016.2598968
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.
引用
收藏
页码:347 / 376
页数:30
相关论文
共 223 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]   Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints [J].
Ali, Syed Taha ;
Sivaraman, Vijay ;
Ostry, Diethelm ;
Tsudik, Gene ;
Jha, Sanjay .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) :2193-2204
[3]   Silent Antenna Hopping Transmission Technique for Secure Millimeter-Wave Wireless Communication [J].
Alotaibi, Nafel N. ;
Hamdi, Khairi Ashour .
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
[4]   Switched Phased-Array Transmission Architecture for Secure Millimeter-Wave Wireless Communication [J].
Alotaibi, Nafel N. ;
Hamdi, Khairi Ashour .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (03) :1303-1312
[5]   On the Trade-Off Between Security and Energy Efficiency in Cooperative Spectrum Sensing for Cognitive Radio [J].
Althunibat, Saud ;
Sucasas, Victor ;
Marques, Hugo ;
Rodriguez, Jonathan ;
Tafazolli, Rahim ;
Granelli, Fabrizio .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (08) :1564-1567
[6]   A New Decomposition Method for Multiuser DC-Programming and Its Applications [J].
Alvarado, Alberth ;
Scutari, Gesualdo ;
Pang, Jong-Shi .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (11) :2984-2998
[7]  
Anand N, 2012, IEEE INFOCOM SER, P720, DOI 10.1109/INFCOM.2012.6195817
[8]  
Ankarali ZE, 2014, 2014 EAI 4TH INTERNATIONAL CONFERENCE ON WIRELESS MOBILE COMMUNICATION AND HEALTHCARE (MOBIHEALTH), P246, DOI 10.1109/MOBIHEALTH.2014.7015957
[9]  
[Anonymous], 2014, NEW J SCI, DOI DOI 10.1155/2014/756240
[10]  
[Anonymous], 1994, Fast Software Encryption, DOI DOI 10.1007/3-540-58108-1_24