Physical layer security schemes for MIMO systems: an overview

Physical layer security (PLS) has become an increasingly attractive topic since it promises current and future wireless systems both reliable and secure communication, without imposing any assumptions on the computational power of the eavesdroppers. PLS benefits from the randomness property of the wireless channel, which provides better immunity and prevents different attacks. On the other hand, the multiple-input multiple-output (MIMO) system has emerged as a key technology to support high data rates and improved energy and spectral efficiency, in addition to overcoming the effect of shadowing and fading. Recently, MIMO-based PLS has been addressed in the literature due to its wide adoption and its essential role in wireless communication systems. In this paper, we provide a comprehensive overview of various MIMO-based PLS techniques that target all kinds of security services namely, key generation and distribution, data confidentiality, authentication, and availability. With this overview, readers will have a better understanding of the MIMO-based PLS techniques present in the literature, their current limitations, and challenges.

[1]  V. A. Fadeev,et al.  Estimation of capabilities of cooperative CubeSat systems based on Alamouti transmission scheme , 2018, 2018Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO).

[2]  I-Tai Lu,et al.  Asynchronous Reception Effects on Distributed Massive MIMO-OFDM System , 2019, IEEE Transactions on Communications.

[3]  Hsiao-Hwa Chen,et al.  Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Takahiko Saba,et al.  An artificial fast fading generation scheme for physical layer security of MIMO-OFDM systems , 2015, 2015 9th International Conference on Signal Processing and Communication Systems (ICSPCS).

[5]  Marwan Krunz,et al.  Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.

[6]  Andreas F. Molisch,et al.  Hybrid Beamforming for Massive MIMO: A Survey , 2017, IEEE Communications Magazine.

[7]  Balasubramaniam Natarajan,et al.  Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Ming Li,et al.  Jamming Resilient Communication Using MIMO Interference Cancellation , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Elias Yaacoub,et al.  Achieving physical layer security with massive MIMO beamforming , 2017, 2017 11th European Conference on Antennas and Propagation (EUCAP).

[10]  Zhiguo Ding,et al.  Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.

[11]  Lin Bai,et al.  Space Time Block Coding aided physical layer security in Gaussian MIMO channels , 2017, 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[12]  Aiqun Hu,et al.  Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[13]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.

[14]  Peng Ning,et al.  No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[15]  Yasir Rahmatallah,et al.  Peak-To-Average Power Ratio Reduction in OFDM Systems: A Survey And Taxonomy , 2013, IEEE Communications Surveys & Tutorials.

[16]  Christian Waldschmidt,et al.  MIMO-OFDM Radar Using a Linear Frequency Modulated Carrier to Reduce Sampling Requirements , 2018, IEEE Transactions on Microwave Theory and Techniques.

[17]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[18]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[19]  Peter J. Winzer,et al.  A computationally efficient shift-register based information scrambling approach to physical layer security in MIMO-SDM systems , 2016, 2016 Optical Fiber Communications Conference and Exhibition (OFC).

[20]  Symeon Chatzinotas,et al.  Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Jinho Choi,et al.  Secret key transmission based on channel reciprocity for secure IoT , 2016, 2016 European Conference on Networks and Communications (EuCNC).

[23]  Lei Li,et al.  A Virtual MIMO based anti-jamming strategy for cognitive radio networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[24]  Naofal Al-Dhahir,et al.  Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.

[25]  Emad Alsusa,et al.  Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting , 2018, IEEE Transactions on Vehicular Technology.

[26]  Berna Özbek,et al.  Space-frequency grouping based key extraction for MIMO-OFDM systems , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).

[27]  Yajun Zhang,et al.  Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).

[28]  Derrick Wing Kwan Ng,et al.  Key technologies for 5G wireless systems , 2017 .

[29]  Peter J. Winzer,et al.  Enhanced physical layer security of MIMO-SDM systems through information scrambling , 2015, 2015 European Conference on Optical Communication (ECOC).

[30]  Victor C. M. Leung,et al.  Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.

[31]  Fei Wang,et al.  Security in Uplink MU-MIMO Networks: Poster Abstract , 2017, IoTDI.

[32]  Hüseyin Arslan,et al.  Secure Spatial Multiple Access Using Directional Modulation , 2018, IEEE Transactions on Wireless Communications.

[33]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[34]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[35]  Balasubramaniam Natarajan,et al.  Evaluating Node Reliability in Cooperative MIMO Networks , 2016, IEEE Transactions on Information Forensics and Security.

[36]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[37]  Emad Alsusa,et al.  Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems , 2017, IEEE Transactions on Vehicular Technology.

[38]  Christos Masouros,et al.  Constructive interference based secure precoding , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[39]  Emad Alsusa,et al.  Secret key exchange under physical layer security using MIMO private random precoding in FDD systems , 2016, 2016 IEEE International Conference on Communications (ICC).

[40]  Can Emre Koksal,et al.  Securing massive MIMO at the physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[41]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[42]  Amin Babiker,et al.  A Comparison between IEEE 802.11 n and ac Standards , 2015 .

[43]  Yun Zhang,et al.  Hybrid Massive MIMO for Secure Transmissions Against Stealthy Eavesdroppers , 2018, IEEE Communications Letters.

[44]  Zouhair Al-qudah,et al.  Singular Value Decomposition: Principles and Applications in Multiple Input Multiple Output Communication System , 2017 .

[45]  Waqar Mahmood,et al.  Novel schemes for interference-resilient OFDM wireless communication , 2017, Int. J. Commun. Syst..

[46]  Sundeep Rangan,et al.  Achieving Ultra-Low Latency in 5G Millimeter Wave Cellular Networks , 2016, IEEE Communications Magazine.

[47]  Emad Alsusa,et al.  Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing , 2017, IET Inf. Secur..

[48]  Pekka Kyosti,et al.  A Step Toward 5G in 2020: Low-cost OTA performance evaluation of massive MIMO base stations. , 2017, IEEE Antennas and Propagation Magazine.

[49]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[50]  Theodore S. Rappaport,et al.  Overview of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models , 2017, IEEE Transactions on Antennas and Propagation.

[51]  Takahiko Saba,et al.  A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[52]  Emad Alsusa,et al.  A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[53]  J.A.C. Bingham,et al.  Multicarrier modulation for data transmission: an idea whose time has come , 1990, IEEE Communications Magazine.

[54]  Jinho Choi Secret key transmission for OFDM based machine type communications , 2017, Journal of Communications and Networks.

[55]  R. M. A. P. Rajatheva,et al.  Physical layer security for relay assisted MIMO D2D communication , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[56]  Hong Wen,et al.  The performance of the MIMO physical layer security system with imperfect CSI , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[57]  Zhi Chen,et al.  Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[58]  Navrati Saxena,et al.  Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results , 2017, IEEE Communications Magazine.

[59]  Athanasios V. Vasilakos,et al.  Physical Layer Security Based on Interference Alignment in K-User MIMO Y Wiretap Channels , 2017, IEEE Access.

[60]  Junqing Zhang,et al.  Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[61]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[62]  Chengwen Xing,et al.  Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.

[63]  Zhi Xue,et al.  Security in MIMO wireless hybrid channel with artificial noise , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[64]  J. L. Massey,et al.  Cryptography ― a selective survey , 1986 .

[65]  Lin Zhang,et al.  High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[66]  Kenta Umebayashi,et al.  A study on secure pilot signal design for OFDM systems , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.

[67]  Fei Wang,et al.  Poster Abstract: Security in Uplink MU-MIMO Networks , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[68]  Weihua Zhuang,et al.  Channel-Based Authentication Game in MIMO Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[69]  Emad Alsusa,et al.  PHY-SEC: Secret key exchange and authentication via Random Spatial Modulation and phase shifting , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[70]  Ramjee Prasad,et al.  OFDM for Wireless Communications Systems , 2004 .

[71]  Shabnam Sodagari,et al.  Efficient jamming attacks on MIMO channels , 2012, 2012 IEEE International Conference on Communications (ICC).

[72]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[73]  Elias Yaacoub On secret key generation with massive MIMO antennas using time-frequency-space dimensions , 2016, 2016 IEEE Middle East Conference on Antennas and Propagation (MECAP).

[74]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[75]  Weihua Zhuang,et al.  Game Theoretic Study on Channel-Based Authentication in MIMO Systems , 2017, IEEE Transactions on Vehicular Technology.

[76]  Emil Björnson,et al.  Jamming-Resistant Receivers for the Massive MIMO Uplink , 2017, IEEE Transactions on Information Forensics and Security.

[77]  Haji M. Furqan,et al.  Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[78]  Hong Wen,et al.  Combining MIMO beamforming with security codes to achieve unconditional communication security , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[79]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[80]  Zhi Ding,et al.  Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation , 2016, IEEE Transactions on Information Forensics and Security.

[81]  Chung G. Kang,et al.  MIMO-OFDM Wireless Communications with MATLAB , 2010 .

[82]  Stefano Tomasin Comparison Between Asymmetric and Symmetric Channel-Based Authentication for MIMO Systems , 2017, WSA.

[83]  Theodore S. Rappaport,et al.  A novel millimeter-wave channel simulator and applications for 5G wireless communications , 2017, 2017 IEEE International Conference on Communications (ICC).

[84]  Mario E. Magaña,et al.  Post-quantum hybrid security mechanism for MIMO systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[85]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[86]  Peng Ning,et al.  MCR Decoding: A MIMO approach for defending against wireless jamming attacks , 2014, 2014 IEEE Conference on Communications and Network Security.

[87]  Joonhyuk Kang,et al.  Enhancing physical-layer security in MISO wiretap channel with pilot-assisted channel estimation: Beamforming design for pilot jamming , 2016, 2016 10th International Conference on Signal Processing and Communication Systems (ICSPCS).

[88]  Anke Schmeink,et al.  Comparison and evaluation between FBMC and OFDM systems , 2015, WSA.

[89]  Dongtang Ma,et al.  Secret key generation via random beamforming in stationary environment , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[90]  Guillermo Morales-Luna,et al.  Secret key agreement based on a communication through wireless MIMO fading channels , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).

[91]  Benoît Champagne,et al.  Non-linear transceiver design for secure communications with artificial noise-assisted MIMO relay , 2017, IET Commun..