scispace - formally typeset
Journal ArticleDOI

A Survey on Multiple-Antenna Techniques for Physical Layer Security

Reads0
Chats0
TLDR
A detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks is provided.
Abstract
As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless channels, including fading, noise, and interference. In order to enhance the received signal power at legitimate receivers and impair the received signal quality at eavesdroppers simultaneously, multiple-antenna techniques have been proposed for physical layer security to improve secrecy performance via exploiting spatial degrees of freedom. This paper provides a comprehensive survey on various multiple-antenna techniques in physical layer security, with an emphasis on transmit beamforming designs for multiple-antenna nodes. Specifically, we provide a detailed investigation on multiple-antenna techniques for guaranteeing secure communications in point-to-point systems, dual-hop relaying systems, multiuser systems, and heterogeneous networks. Finally, future research directions and challenges are identified.

read more

Citations
More filters
Journal ArticleDOI

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Journal ArticleDOI

Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces

TL;DR: In this article, the authors investigated the joint design of the beamformers and AN covariance matrix at the AP and the phase shifters at the RISs for maximization of the system sum-rate while limiting the maximum information leakage to the potential eavesdroppers.
Journal ArticleDOI

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Journal ArticleDOI

Massive Access for 5G and Beyond

TL;DR: In this article, a comprehensive survey of massive access design for B5G wireless networks is presented, from the perspectives of theory, protocols, techniques, coverage, energy, and security.
Journal ArticleDOI

Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT

TL;DR: In this paper, an artificial-noise-aided cooperative jamming scheme is proposed to improve the security of the primary network in a multiple-input single-output (MISO) NOMA CR network.
References
More filters
Journal ArticleDOI

Cognitive radio: brain-empowered wireless communications

TL;DR: Following the discussion of interference temperature as a new metric for the quantification and management of interference, the paper addresses three fundamental cognitive tasks: radio-scene analysis, channel-state estimation and predictive modeling, and the emergent behavior of cognitive radio.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Broadcast channels with confidential messages

TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI

A Survey of Dynamic Spectrum Access

TL;DR: An overview of challenges and recent developments in both technological and regulatory aspects of opportunistic spectrum access (OSA) is presented, and the three basic components of OSA are discussed.
Related Papers (5)