Information Security of PHY Layer in Wireless Networks

被引:15
作者
Fang, Weidong [1 ,2 ]
Li, Fengrong [2 ]
Sun, Yanzan [1 ]
Shan, Lianhai [3 ,4 ]
Chen, Shanji [5 ]
Chen, Chao [5 ]
Li, Meiju [5 ]
机构
[1] Shanghai Univ, Key Lab Specialty Fiber Opt & Opt Access Net, Shanghai 200444, Peoples R China
[2] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Key Lab Wireless Sensor Network & Commun, Shanghai 201899, Peoples R China
[3] Shanghai Internet Things Co Ltd, Shanghai 201899, Peoples R China
[4] Shanghai Res Ctr Wireless Commun, Shanghai 200335, Peoples R China
[5] Qinghai Univ Nationalities, Coll Phys & Elect Informat Engn, Xining 810000, Qinghai, Peoples R China
基金
中国国家自然科学基金;
关键词
PHYSICAL-LAYER; ARTIFICIAL-NOISE; SECRECY; DESIGN;
D O I
10.1155/2016/1230387
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.
引用
收藏
页数:10
相关论文
共 64 条
[1]  
[Anonymous], 2013, IEEE 14 INT S WORLD
[2]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[3]  
[Anonymous], 2007, PROC WORK SHOP SIGNA
[4]  
[Anonymous], 2015, J SENSORS, DOI DOI 10.1155/2015/716468
[5]  
Baldi M, 2015, IEEE INT CONF COMM, P435, DOI 10.1109/ICCW.2015.7247218
[6]  
Baldock M R.J., 2010, Proceedings of the 2010 Australasian Road Safety Research, Policing and Education Conference, P1, DOI DOI 10.1145/1785455.1785464
[7]   Cooperative Security at the Physical Layer [A summary of recent advances] [J].
Bassily, Raef ;
Ekrem, Ersen ;
He, Xiang ;
Tekin, Ender ;
Xie, Jianwei ;
Bloch, Matthieu R. ;
Ulukus, Sennur ;
Yener, Aylin .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) :16-28
[8]   A Survey On MAC Protocols for Wireless Adhoc Networks with Beamforming Antennas [J].
Bazan, Osama ;
Jaseemuddin, Muhammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :216-239
[9]   20 Years of Turbo Coding and Energy-Aware Design Guidelines for Energy-Constrained Wireless Applications [J].
Brejza, Matthew F. ;
Li, Liang ;
Maunder, Robert G. ;
Al-Hashimi, Bashir M. ;
Berrou, Claude ;
Hanzo, Lajos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :8-28
[10]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628