Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

被引:489
|
作者
Liu, Yiliang [1 ]
Chen, Hsiao-Hwa [2 ]
Wang, Liangmin [3 ]
机构
[1] Harbin Inst Technol, Commun Res Ctr, Harbin 150001, Peoples R China
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[3] Jiangsu Univ, Dept Internet Things Engn, Zhenjiang 212000, Peoples R China
来源
关键词
Physical layer security; wiretap channel; key generation; authentication; multi-antenna systems; relay; MIMO WIRETAP CHANNELS; SECRET KEY GENERATION; SHARING COMMUNICATION-SYSTEMS; ARTIFICIAL-NOISE; MULTIPLE ANTENNAS; FADING CHANNELS; MASSIVE MIMO; RESPONSE AUTHENTICATION; CONFIDENTIAL MESSAGES; EAVESDROPPER CHANNEL;
D O I
10.1109/COMST.2016.2598968
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.
引用
收藏
页码:347 / 376
页数:30
相关论文
共 50 条
  • [41] Wireless Physical Layer Security
    Debbah, Merouane
    El-Gamal, Hesham
    Poor, H. Vincent
    Shamai , Shlomo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [42] WIRELESS PHYSICAL LAYER SECURITY
    Saad, Walid
    Zhou, Xiangyun
    Debbah, Merouane
    Poor, H. Vincent
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12)
  • [43] Wireless physical layer security
    Poor, H. Vincent
    Schaefer, Rafael F.
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2017, 114 (01) : 19 - 26
  • [44] Security and privacy for the next wireless generation
    Urien, Pascal
    Pujolle, Guy
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2008, 18 (02) : 129 - 145
  • [45] Next generation wireless networks
    Bell Labs Tech J, 2 (88-96):
  • [46] Wireless Sensor Networks in Next Generation Communication Infrastructure: Vision and Challenges
    Bin Qaisar, Saad
    Ali, Salman
    Felemban, Emad A.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 790 - +
  • [47] Experimental Study on Key Generation for Physical Layer Security in Wireless Communications
    Zhang, Junqing
    Woods, Roger
    Duong, Trung Q.
    Marshal, Alan
    Ding, Yuan
    Huang, Yi
    Xu, Qian
    IEEE ACCESS, 2016, 4 : 4464 - 4477
  • [48] 5th Generation Wireless Networks Security: Challenges and Solutions
    Bin Siddiq, Bashayer Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 157 - 162
  • [49] A Survey of Energy and Spectrum Harvesting Technologies and Protocols for Next Generation Wireless Networks
    Padhy, Ashish
    Joshi, Sandeep
    Bitragunta, Sainath
    Chamola, Vinay
    Sikdar, Biplab
    IEEE ACCESS, 2021, 9 : 1737 - 1769
  • [50] A Potential Architecture and Next Generation Technologies for 5G Wireless Networks
    Aydemir, Murat
    Cengiz, Korhan
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 277 - 280