Physical layer security with its applications in 5G networks: A review

5G network is expected to support massive user connections and exponentially increasing wireless services, which makes network security unprecedentedly important. Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack, physical-layer security (PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users, and realize keyless secure transmission via signal design and signal processing techniques. PLS avoids the difficulties in the distribution and management of secret keys, and provides flexible security levels through adaptive transmission protocol design. Moreover, PLS techniques match the features of 5G networks well. Therefore, the application of PLS to 5G networks is a promising solution to address the security threats. This article presents a comprehensive review of the state-of-the-art PLS techniques, and discusses their applications in 5G networks. We first summarize the principle and advantages of PLS techniques, and point out the reasons why PLS is suitable for 5G networks. Then, we review the existing PLS methods in literature, and highlight several PLS solutions that are expected to be applied in 5G networks. Finally, we conclude this article and figure out some further research directions.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[3]  E. Tekin Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .

[4]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[5]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[6]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[8]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[9]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[10]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[11]  Qian Zhang,et al.  Cooperative communications based on rateless network coding in distributed MIMO systems [Coordinated and Distributed MIMO] , 2010, IEEE Wireless Communications.

[12]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[13]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Raef Bassily,et al.  Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.

[15]  Farshad Lahouti,et al.  Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.

[16]  Athina P. Petropulu,et al.  Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Iain B. Collings,et al.  Secrecy sum-rates with regularized channel inversion precoding under imperfect CSI at the transmitter , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[20]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[21]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[22]  Xiaofeng Tao,et al.  Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback , 2014, IEEE Communications Letters.

[23]  Yuan-Pei Lin,et al.  On Quantization for Masked Beamforming Secrecy Systems , 2015, IEEE Transactions on Wireless Communications.

[24]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[25]  Do-Hoon Kim,et al.  Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[26]  Li Sun,et al.  Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.

[27]  Xiangyun Zhou,et al.  A Versatile Secure Transmission Strategy in the Presence of Outdated CSI , 2016, IEEE Transactions on Vehicular Technology.

[28]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[29]  Qimei Cui,et al.  Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.

[30]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[31]  Zhi Chen,et al.  MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.

[32]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[33]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.