A Survey on Multiple-Antenna Techniques for Physical Layer Security

被引:380
作者
Chen, Xiaoming [1 ]
Ng, Derrick Wing Kwan [2 ]
Gerstacker, Wolfgang H. [3 ]
Chen, Hsiao-Hwa [4 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310016, Zhejiang, Peoples R China
[2] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2033, Australia
[3] Univ Erlangen Nurnberg, Inst Digital Commun, D-91058 Erlangen, Germany
[4] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
基金
澳大利亚研究理事会;
关键词
Physical layer security; multiple-antenna technique; secrecy performance; beamforming design; SIMULTANEOUS WIRELESS INFORMATION; MISO WIRETAP CHANNELS; SECRECY RATE OPTIMIZATIONS; OPTIMAL POWER ALLOCATION; TO-DEVICE COMMUNICATION; COGNITIVE RADIO NETWORKS; ARTIFICIAL-NOISE; BROADCAST CHANNELS; INTERFERENCE ALIGNMENT; RELAY SELECTION;
D O I
10.1109/COMST.2016.2633387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.
引用
收藏
页码:1027 / 1053
页数:27
相关论文
共 267 条
[1]   Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks [J].
Al-Qahtani, Fawaz S. ;
Zhong, Caijun ;
Alnuweiri, Hussein M. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (05) :1756-1770
[2]   Secure Device-to-Device Communication in LTE-A [J].
Alam, Muhammad ;
Yang, Du ;
Rodriguez, Jonathan ;
Abd-Alhameed, Raed A. .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) :66-73
[3]   On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels [J].
Alves, Hirley ;
Brante, Glauber ;
Souza, Richard D. ;
da Costa, Daniel B. ;
Latva-aho, Matti .
IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (07) :867-870
[4]  
[Anonymous], IEEE T INF THEORY
[5]  
[Anonymous], 2015, PROC 82 VEH TECHNOL
[6]  
[Anonymous], J APPL MATH
[7]  
[Anonymous], IEEE SYST J IN PRESS
[8]  
[Anonymous], 2015, 2015 25 INT C FIELD
[9]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[10]   On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary [J].
Basciftci, Yuksel Ozan ;
Gungor, Onur ;
Koksal, Can Emre ;
Ozguner, Fusun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (03) :1325-1343