A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

被引:602
作者
Wu, Yongpeng [1 ]
Khisti, Ashish [2 ]
Xiao, Chengshan [3 ]
Caire, Giuseppe [4 ]
Wong, Kai-Kit [5 ]
Gao, Xiqi [6 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[2] Univ Toronto, Signal Multimedia & Secur Lab, Toronto, ON M4P, Canada
[3] Lehigh Univ, Dept Elect & Comp Engn, Bethlehem, PA 18015 USA
[4] Tech Univ Berlin, Inst Telecommun Syst, D-10587 Berlin, Germany
[5] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[6] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
关键词
5G; physical layer security; massive MMO; mmWave; heterogeneous network; NOMA; full duplex; GAUSSIAN WIRETAP CHANNEL; SECRET KEY AGREEMENT; MULTIPLE-ACCESS; LATTICE CODES; POLAR CODES; LDPC CODES; COMMUNICATION; TRANSMISSION; PERFORMANCE; DESIGN;
D O I
10.1109/JSAC.2018.2825560
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution toward 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.
引用
收藏
页码:679 / 695
页数:17
相关论文
共 134 条
[1]   Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary [J].
Abedi, Mohammad Reza ;
Mokari, Nader ;
Saeedi, Hamid ;
Yanikomeroglu, Halim .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (02) :885-899
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]   Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks [J].
Akgun B. ;
Koyluoglu O.O. ;
Krunz M. .
IEEE Transactions on Communications, 2017, 65 (02) :956-968
[4]  
Ali S, 2013, CONF REC ASILOMAR C, P2089, DOI 10.1109/ACSSC.2013.6810675
[5]   Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages [J].
Andersson, Mattias ;
Schaefer, Rafael F. ;
Oechtering, Tobias J. ;
Skoglund, Mikael .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1901-1908
[6]   Nested Polar Codes for Wiretap and Relay Channels [J].
Andersson, Mattias ;
Rathi, Vishwambhar ;
Thobaben, Ragnar ;
Kliewer, Jorg ;
Skoglund, Mikael .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) :752-754
[7]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[8]  
[Anonymous], 2011, P 9 INT C MOB SYST A
[9]  
[Anonymous], 2016, PHYS LAYER SECURITY
[10]  
[Anonymous], 2015, White Paper