Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Published: 01 January 2017 Publication History

Abstract

Physical layer security (PHY-security) takes the advantages of channel randomness nature of transmission media to achieve communication confidentiality and authentication. Wiretap coding and signal processing technologies are expected to play vital roles in this new security mechanism. PHY-security has attracted a lot of attention due to its unique features and the fact that our daily life relies heavily on wireless communications for sensitive and private information transmissions. Compared to conventional cryptography that works to ensure all involved entities to load proper and authenticated cryptographic information, PHY-security technologies perform security functions without considering about how those security protocols are executed. In other words, it does not require to implement any extra security schemes or algorithms on other layers above the physical layer. This survey introduces the fundamental theories of PHY-security, covering confidentiality and authentication, and provides an overview on the state-of-the-art works on PHY-security technologies that can provide secure communications in wireless systems, along with the discussions on challenges and their proposed solutions. Furthermore, at the end of this paper, the open issues are identified as our future research directions.

Cited By

View all
  • (2024)Intelligent Reflecting Surface Assisted Secure Computation of Wireless Powered MEC SystemIEEE Transactions on Mobile Computing10.1109/TMC.2023.326979123:4(3048-3059)Online publication date: 1-Apr-2024
  • (2024)BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347332219(9452-9466)Online publication date: 1-Jan-2024
  • (2024)Pairwise Physical Layer Secret Key Generation for FDD SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346817019(9518-9533)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE Communications Surveys & Tutorials
        IEEE Communications Surveys & Tutorials  Volume 19, Issue 1
        Firstquarter 2017
        681 pages

        Publisher

        IEEE Press

        Publication History

        Published: 01 January 2017

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 23 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Intelligent Reflecting Surface Assisted Secure Computation of Wireless Powered MEC SystemIEEE Transactions on Mobile Computing10.1109/TMC.2023.326979123:4(3048-3059)Online publication date: 1-Apr-2024
        • (2024)BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347332219(9452-9466)Online publication date: 1-Jan-2024
        • (2024)Pairwise Physical Layer Secret Key Generation for FDD SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346817019(9518-9533)Online publication date: 1-Jan-2024
        • (2024)Cross-Layer AKA Protocol for Industrial Control Based on Channel State InformationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.344364719(8263-8274)Online publication date: 1-Jan-2024
        • (2024)Integrated Communications and Security: RIS-Assisted Simultaneous Transmission and Generation of Secret KeysIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343688519(7573-7587)Online publication date: 1-Jan-2024
        • (2024)Covert Routing in Heterogeneous NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341970319(7047-7059)Online publication date: 1-Jan-2024
        • (2024)When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road AheadIEEE Wireless Communications10.1109/MWC.013.220053831:3(355-361)Online publication date: 19-Mar-2024
        • (2024)Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.332732726:1(347-388)Online publication date: 1-Jan-2024
        • (2024)A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strengthVehicular Communications10.1016/j.vehcom.2024.10080949:COnline publication date: 1-Oct-2024
        • (2024)Energy-efficient trajectory design for secure SWIPT systems assisted by UAV-IRSVehicular Communications10.1016/j.vehcom.2023.10072545:COnline publication date: 1-Feb-2024
        • Show More Cited By

        View Options

        View options

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media