Loading [MathJax]/extensions/MathMenu.js
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey | IEEE Journals & Magazine | IEEE Xplore

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey


Abstract:

Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail man...Show More

Abstract:

Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and dis...
Published in: IEEE Communications Surveys & Tutorials ( Volume: 21, Issue: 2, Secondquarter 2019)
Page(s): 1773 - 1828
Date of Publication: 25 October 2018

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Wireless communication services are enormously increasing day by day as a consequence of the massive spread in wireless devices featured by high mobility and ease of use. Moreover, the surge in wireless data communication is primarily driven by the huge amount of beneficial applications customized for mobile users. Since wireless media is becoming the dominant access for most of the Internet-based services, serious security risks appear on the service-carrying wireless signals and waves because of their broadcast nature.

Select All
1.
C. E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
2.
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
3.
Y.-S. Shiu, S. Chang, H.-C. Wu, S. C.-H. Huang and H.-H. Chen, "Physical layer security in wireless networks: A tutorial", IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
4.
A. Mukherjee, S. A. A. Fakoorian, J. Huang and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey", IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart. 2014.
5.
Y. Liu, H.-H. Chen and L. Wang, "Physical layer security for next generation wireless networks: Theories technologies and challenges", IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347-376, 1st Quart. 2017.
6.
Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A survey on wireless security: Technical challenges recent advances and future trends", Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
7.
H. V. Poor and R. F. Schaefer, "Wireless physical layer security", Proc. Nat. Acad. Sci. USA, vol. 114, no. 1, pp. 19-26, 2017.
8.
M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, Cambridge, U.K.:Cambridge Univ. Press, Aug. 2008.
9.
R. Liu and W. Trappe, Securing Wireless Communications at the Physical Layer, New York, NY, USA:Springer, 2010.
10.
X. Zhou, L. Song and Y. Zhang, Physical Layer Security in Wireless Communications, Boca Raton, FL, USA:CRC Press, 2013.
11.
Y.-W. P. Hong, P.-C. Lan and C.-C. J. Kuo, Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems., New York, NY, USA:Springer, 2014.
12.
M. Baldi and S. Tomasin, Physical and Data-Link Security Techniques for Future Communication Systems, Cham, Switzerland:Springer Int., 2016.
13.
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security", IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
14.
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances", IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
15.
M. Bloch, M. Hayashi and A. Thangaraj, "Error-control coding for physical-layer secrecy", Proc. IEEE, vol. 103, no. 10, pp. 1725-1746, Oct. 2015.
16.
R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: A survey", IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 1023-1043, 2nd Quart. 2015.
17.
C. Shahriar et al., "PHY-layer resiliency in OFDM communications: A tutorial", IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292-314, 1st Quart. 2015.
18.
X. Chen, C. Zhong, C. Yuen and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security", IEEE Commun. Mag., vol. 53, no. 12, pp. 40-46, Dec. 2015.
19.
E. Jorswieck, S. Tomasin and A. Sezgin, "Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing", Proc. IEEE, vol. 103, no. 10, pp. 1702-1724, Oct. 2015.
20.
X. Chen, D. W. K. Ng, W. H. Gerstacker and H.-H. Chen, "A survey on multiple-antenna techniques for physical layer security", IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, 2nd Quart. 2017.
21.
A. Hyadi, Z. Rezki and M.-S. Alouini, "An overview of physical layer security in wireless communication systems with CSIT uncertainty", IEEE Access, vol. 4, pp. 6121-6132, 2016.
22.
J. Zhang, T. Q. Duong, A. Marshall and R. Woods, "Key generation from wireless channels: A review", IEEE Access, vol. 4, pp. 614-626, 2016.
23.
Z. E. Ankarali et al., "A comparative review on the wireless implantable medical devices privacy and security", Proc. 4th Int. Conf. Wireless Mobile Commun. Healthcare Transforming Healthcare Through Innov. Mobile Wireless Technol. (MOBIHEALTH), pp. 246-249, Nov. 2014.
24.
M. H. Yilmaz and H. Arslan, "A survey: Spoofing attacks in physical layer security", Proc. IEEE 40th Local Comput. Netw. Conf. Workshops (LCN Workshops), pp. 812-817, Oct. 2015.
25.
W.-C. Liao, T.-H. Chang, W.-K. Ma and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach", IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
26.
M. Li, S. Kundu, D. A. Pados and S. N. Batalama, "Waveform design for secure SISO transmissions and multicasting", IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1864-1874, Sep. 2013.
27.
H. Reboredo, J. Xavier and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel", IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
28.
A. Subramanian et al., "Strong and weak secrecy in wiretap channels", Proc. 6th Int. Symp. Turbo Codes Iterative Inf. Process, pp. 30-34, Sep. 2010.
29.
E. Güvenkaya, J. M. Hamamreh and H. Arslan, "On physical-layer concepts and metrics in secure signal transmission", Phys. Commun., vol. 25, pp. 14-25, Dec. 2017.
30.
M. Bloch, J. Barros, M. R. D. Rodrigues and S. W. McLaughlin, "Wireless information-theoretic security", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
Contact IEEE to Subscribe

References

References is not available for this document.