A survey on OFDM physical layer security

Abstract Physical Layer Security (PLS) is an emerging paradigm employed to enhance wireless network security without relying on higher-layer encryption techniques. PLS enables legitimate users to exchange confidential messages over a wireless medium in the presence of adversaries, by utilizing the main properties and characteristics of the wireless channel. Traditionally, security in wireless networks has been addressed separately from the physical layer due to its uncontrollable random nature. However, with the massive advances in computational capabilities, classical security techniques are becoming less secure and the need for new schemes is becoming more crucial. As a result, more and more research is directed towards studying, understanding and exploiting the highly random nature of wireless networks. This paper provides a comprehensive survey on various OFDM-based PLS techniques that target popular security services namely, key generation and distribution, data confidentiality, authentication, integrity and availability. With this survey, readers can have a better understanding of the PLS techniques present in the literature, their current limitations, challenges and countermeasures, in addition to future research directions in this area.

[1]  Richard D. Gitlin,et al.  Secure key management for 5G physical layer security , 2017, 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON).

[2]  Xiuwen Liu,et al.  TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[3]  Junqing Zhang,et al.  Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.

[4]  Yahya M. Al-Moliki,et al.  Robust Key Generation From Optical OFDM Signal in Indoor VLC Networks , 2016, IEEE Photonics Technology Letters.

[5]  J.A.C. Bingham,et al.  Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.

[6]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[7]  Takahiko Saba,et al.  Energy Efficient Artificial Fast Fading for MISO-OFDM Systems , 2014, GLOBECOM 2014.

[8]  Teng Wang,et al.  Security-Coded OFDM System Based on Multiorder Fractional Fourier Transform , 2016, IEEE Communications Letters.

[9]  Byung-Jae Kwak,et al.  LDPC for Physical Layer Security , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[10]  Kapil R. Dandekar,et al.  Secure and robust symmetric key generation using physical layer techniques under various wireless environments , 2016, 2016 IEEE Radio and Wireless Symposium (RWS).

[11]  Fan Li,et al.  PAPR reduction based on chaos combined with SLM technique in optical OFDM IM/DD system , 2015 .

[12]  Haji M. Furqan,et al.  Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Hanif D. Sherali,et al.  Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Qi Zhang,et al.  Theory and Performance Analyses in Secure CO-OFDM Transmission System Based on Two-Dimensional Permutation , 2013, Journal of Lightwave Technology.

[17]  Zhen Yang,et al.  Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.

[18]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[19]  Xianbin Wang,et al.  Secure Transmission in OFDM Systems by Using Time Domain Scrambling , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[20]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[21]  Jinho Choi,et al.  Secure Index and Data Symbol Modulation for OFDM-IM , 2017, IEEE Access.

[22]  Peng Ning,et al.  No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[23]  Yih-Chun Hu,et al.  Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[24]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[25]  Taesoo Kwon,et al.  Design and implementation of a simulator based on a cross-layer protocol between MAC and PHY layers in a WiBro Compatible.IEEE 802.16e OFDMA system , 2005, IEEE Commun. Mag..

[26]  Hüseyin Arslan,et al.  Achieving secure communication through pilot manipulation , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[27]  Onur Günlü,et al.  Reliable secret-key binding for physical unclonable functions with transform coding , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[28]  Saeedeh Parsaeefard,et al.  Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.

[29]  Xianbin Wang,et al.  Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.

[30]  Wei Zhang,et al.  Hybrid time-frequency domain chaotic interleaving for physical-layer security enhancement in OFDM-PON systems , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[31]  Jian Shen,et al.  An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..

[32]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[33]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[34]  Vijay K. Bhargava,et al.  Physical layer security for massive MIMO systems impaired by phase noise , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[35]  Guang Gong,et al.  A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[36]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[37]  Sixto Ortiz The Wireless Industry Begins to Embrace Femtocells , 2008, Computer.

[38]  Marco Baldi,et al.  Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.

[39]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[40]  Daniele Trinchero,et al.  Channel secondary random process for robust secret key generation , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[41]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[42]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[43]  Haji M. Furqan,et al.  Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[44]  Xianbin Wang,et al.  Dynamic Subcarrier Coordinate Interleaving for Eavesdropping Prevention in OFDM Systems , 2014, IEEE Communications Letters.

[45]  Guang Gong,et al.  XOR Encryption Versus Phase Encryption, an In-Depth Analysis , 2015, IEEE Transactions on Electromagnetic Compatibility.

[46]  Dennis Goeckel,et al.  Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.

[47]  Junqing Zhang,et al.  Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[48]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[49]  Tobias J. Oechtering,et al.  A comparison of OFDM, QAM-FBMC, and OQAM-FBMC waveforms subject to phase noise , 2017, 2017 IEEE International Conference on Communications (ICC).

[50]  Hai Lin,et al.  Intrinsic Interference Based Physical Layer Encryption for OFDM/OQAM , 2017, IEEE Communications Letters.

[51]  Hüseyin Arslan,et al.  Cyclic feature suppression for physical layer security , 2017, Phys. Commun..

[52]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[53]  Marwan Krunz,et al.  Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.

[54]  Hüseyin Arslan,et al.  Controlled Inter-Carrier Interference for Physical Layer Security in OFDM Systems , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[55]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[56]  Nicola Laurenti,et al.  Energy-based anchor node selection for IoT physical layer authentication , 2016, 2016 IEEE International Conference on Communications (ICC).

[57]  Brian M. Sadler,et al.  Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.

[58]  J. L. Massey,et al.  Cryptography ― a selective survey , 1986 .

[59]  Yahya M. Al-Moliki,et al.  Physical-Layer Security Against Known/Chosen Plaintext Attacks for OFDM-Based VLC System , 2017, IEEE Communications Letters.

[60]  Mohamed-Slim Alouini,et al.  Secret Key Agreement: Fundamental Limits and Practical Challenges , 2017, IEEE Wireless Communications.

[61]  Kenta Umebayashi,et al.  A study on secure pilot signal design for OFDM systems , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.

[62]  Ming Li,et al.  Jamming Resilient Communication Using MIMO Interference Cancellation , 2016, IEEE Transactions on Information Forensics and Security.

[63]  Wei Zhang,et al.  Joint PAPR Reduction and Physical Layer Security Enhancement in OFDMA-PON , 2016, IEEE Photonics Technology Letters.

[64]  Hong Wen,et al.  A Novel Framework for Message Authentication in Vehicular Communication Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[65]  Hong Wen,et al.  Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[66]  Jehad M. Hamamreh,et al.  On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..

[67]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[68]  Xuemin Shen,et al.  Towards PHY-Aided Authentication via Weighted Fractional Fourier Transform , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[69]  Jehad M. Hamamreh,et al.  Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.

[70]  Maurice G. Bellanger,et al.  Specification and design of a prototype filter for filter bank based multicarrier transmission , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[71]  Xiaofu Wu,et al.  A channel coding approach for physical-layer authentication , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[72]  Aiqun Hu,et al.  Analysis of non-reciprocity factors in extracting secret key from wireless channels for practical indoor scenarios , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[73]  Qian Zhang,et al.  Privacy-Preserving Location Authentication in Wi-Fi Networks Using Fine-Grained Physical Layer Signatures , 2016, IEEE Transactions on Wireless Communications.

[74]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.

[75]  Ming Tang,et al.  Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques , 2014, Journal of Lightwave Technology.

[76]  Weisheng Hu,et al.  Secure OFDM Transmission Precoded by Chaotic Discrete Hartley Transform , 2018, IEEE Photonics Journal.

[77]  Behrouz Farhang-Boroujeny,et al.  OFDM Versus Filter Bank Multicarrier , 2011, IEEE Signal Processing Magazine.

[78]  Behrouz A. Forouzan TCP/IP Protocol Suite , 1999 .

[79]  Swades De,et al.  Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users , 2016, IEEE Transactions on Information Forensics and Security.

[80]  Mohsen Guizani,et al.  Comparative simulation for physical layer key generation methods , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[81]  Yuexing Peng,et al.  Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.

[82]  Kazuo Mori,et al.  Channel state based secure wireless communication , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[83]  Paulo Batista Lopes,et al.  A performance comparison between OFDM and FBMC in PLC applications , 2017, 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM).

[84]  Kostas Berberidis,et al.  Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.

[85]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[86]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[87]  Yichen Wang,et al.  Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems , 2018, IEEE Transactions on Information Forensics and Security.

[88]  Qiang Li,et al.  Frequency diverse array beamforming for physical-layer security with directionally-aligned legitimate user and eavesdropper , 2017, 2017 25th European Signal Processing Conference (EUSIPCO).

[89]  Yuh-Ren Tsai,et al.  Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.

[90]  Kai Zeng,et al.  Physical layer challenge-response authentication in wireless networks with relay , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[91]  Lei Peng,et al.  Threat on Physical Layer Security: Side Channel vs. Wiretap Channel , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.

[92]  Wen-Qin Wang,et al.  Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach , 2018, IEEE Transactions on Information Forensics and Security.

[93]  Ramjee Prasad,et al.  OFDM for Wireless Communications Systems , 2004 .

[94]  R. Chang Synthesis of band-limited orthogonal signals for multichannel data transmission , 1966 .

[95]  Takahiko Saba,et al.  Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[96]  Anke Schmeink,et al.  Comparison and evaluation between FBMC and OFDM systems , 2015, WSA.

[97]  Si Chen,et al.  ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.

[98]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[99]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[100]  Arun Subramanian,et al.  Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[101]  Feng Liu,et al.  A general time-domain artificial noise design for OFDM AF relay systems , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).

[102]  Emil Björnson,et al.  Jamming-Resistant Receivers for the Massive MIMO Uplink , 2017, IEEE Transactions on Information Forensics and Security.

[103]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[104]  Lei Chen,et al.  Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.

[105]  Mohsen Guizani,et al.  Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..

[106]  Jing Yang,et al.  A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[107]  Hüseyin Arslan,et al.  Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[108]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[109]  Li Zhao,et al.  Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.

[110]  Zahid Mahmood,et al.  Lightweight Two-Level Session Key Management for End User Authentication in Internet of Things , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[111]  Paulraj Ponniah Database Design and Development: An Essential Guide for IT Professionals , 2003 .

[112]  Mischa Schwartz,et al.  Mobile Wireless Communications: Access and scheduling techniques in cellular systems , 2004 .

[113]  Zhen Yang,et al.  Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.

[114]  Jianxi Yang,et al.  Physical layer authentication algorithm based on SVM , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[115]  Tao Jiang,et al.  A Survey of Emerging M2M Systems: Context, Task, and Objective , 2016, IEEE Internet of Things Journal.

[116]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[117]  Jehad M. Hamamreh,et al.  Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[118]  Qingqing Wu,et al.  Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.

[119]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[120]  B. Saltzberg,et al.  Performance of an Efficient Parallel Data Transmission System , 1967, IEEE Transactions on Communication Technology.

[121]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[122]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[123]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[124]  Nader Mokari,et al.  Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary , 2017, 2017 Iran Workshop on Communication and Information Theory (IWCIT).

[125]  Zhe Wang,et al.  Physical layer security OFDM communication using phased array antenna , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[126]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[127]  George K. Karagiannidis,et al.  How Much Does I/Q Imbalance Affect Secrecy Capacity? , 2016, IEEE Communications Letters.

[128]  Roman Marsalek,et al.  Experimental study of wireless transceiver authentication using carrier frequency offset monitoring , 2015, 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA).

[129]  Marco Baldi,et al.  Security gap assessment for the fast fading wiretap channel , 2013, ICT 2013.