scispace - formally typeset
Journal ArticleDOI

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

TLDR
A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Abstract
Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.

read more

Citations
More filters
Journal ArticleDOI

6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence

TL;DR: Five 6G core services are identified and two centricities and eight key performance indices are detailed to describe these services, then enabling technologies to fulfill the KPIs are discussed and possible solutions are proposed.
Journal ArticleDOI

Security for 5G and Beyond

TL;DR: This paper outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges.
Journal ArticleDOI

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities

TL;DR: A comprehensive survey of the PLS techniques in 5G IoT communication systems and their challenges and opportunities when coping with physical-layer threats, including massive multiple-input-multiple-output (MIMO), millimeter wave (mmWave) communications, nonorthogonal multiple access (NOMA), full-duplex technology, energy harvesting, visible light communication (VLC), and unmanned aerial vehicle (UAV) communications.
Journal ArticleDOI

Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions

TL;DR: The privacy issues for content dissemination in the current VSN architecture are analyzed and classified according to their features, and various privacy-preserving content dissemination schemes, attempting to resist distinct attacks, are discussed.
Journal ArticleDOI

Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications

TL;DR: This paper considers covert communications in the context of unmanned aerial vehicle (UAV) networks, aiming to hide a UAV for transmitting critical information out of an area that is monitored and where communication is not allowed, and develops a joint trajectory and transmit power optimization scheme.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

A survey of spectrum sensing algorithms for cognitive radio applications

TL;DR: In this paper, a survey of spectrum sensing methodologies for cognitive radio is presented and the cooperative sensing concept and its various forms are explained.
Journal ArticleDOI

Channel Coding Rate in the Finite Blocklength Regime

TL;DR: It is shown analytically that the maximal rate achievable with error probability ¿ isclosely approximated by C - ¿(V/n) Q-1(¿) where C is the capacity, V is a characteristic of the channel referred to as channel dispersion, and Q is the complementary Gaussian cumulative distribution function.
Related Papers (5)