An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

[1]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[2]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Matthew R. McKay,et al.  Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[5]  Xiangyun Zhou,et al.  Wireless Physical Layer Security with Imperfect Channel State Information: A Survey , 2013, ArXiv.

[6]  Yi Hong,et al.  Practical Secrecy using Artificial Noise , 2013, IEEE Communications Letters.

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[8]  Vijay K. Bhargava,et al.  Secrecy analysis of multi-cell massive MIMO systems with RCI precoding and artificial noise transmission , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[9]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[11]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[12]  Yi Hong,et al.  Guaranteeing Positive Secrecy Capacity for MIMOME Wiretap Channels With Finite-Rate Feedback Using Artificial Noise , 2015, IEEE Transactions on Wireless Communications.

[13]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[14]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[17]  Yueming Cai,et al.  A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.

[18]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[19]  Wei Xu,et al.  On Performance and Feedback Strategy of Secure Multiuser Communications With MMSE Channel Estimate , 2016, IEEE Transactions on Wireless Communications.

[20]  Joonhyuk Kang,et al.  Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).

[21]  Robert W. Heath,et al.  An overview of limited feedback in wireless communication systems , 2008, IEEE Journal on Selected Areas in Communications.

[22]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[23]  MinChul Ju,et al.  Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper , 2014, 2014 IEEE International Conference on Communications (ICC).

[24]  Shih-Chun Lin,et al.  On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT , 2012, IEEE Transactions on Information Forensics and Security.

[25]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[26]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[27]  Jyoti Verma,et al.  Trends in Telecommunications Technologies , 2018 .

[28]  J. Nicholas Laneman,et al.  Information-spectrum methods for information-theoretic security , 2009, 2009 Information Theory and Applications Workshop.

[29]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.

[30]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[31]  M. Lavanya,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .

[32]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[33]  Zhi Chen,et al.  Non-asymptotic analysis of secrecy capacity in massive MIMO system , 2015, 2015 IEEE International Conference on Communications (ICC).

[34]  Matthieu R. Bloch,et al.  Exploiting Partial Channel State Information for Secrecy over Wireless Channels , 2013, IEEE Journal on Selected Areas in Communications.

[35]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[36]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[37]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[38]  Amir Salman Avestimehr,et al.  Blind wiretap channel with delayed CSIT , 2014, 2014 IEEE International Symposium on Information Theory.

[39]  H. Vincent Poor,et al.  On the secure degrees of freedom in the K-user Gaussian interference channel , 2008, 2008 IEEE International Symposium on Information Theory.

[40]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[41]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[42]  Matti Latva-aho,et al.  Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.

[43]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[44]  Azzam Al-Nahari,et al.  Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers , 2016, IET Commun..

[45]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[46]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[47]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[48]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[49]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[50]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[51]  Pritam Mukherjee,et al.  Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere , 2015, IEEE Transactions on Wireless Communications.

[52]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[53]  Mustafa Cenk Gursoy,et al.  Relay beamforming strategies for physical-layer security , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[54]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[55]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[56]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[57]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.

[58]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[59]  Eduard A. Jorswieck,et al.  On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter , 2016, IEEE Transactions on Information Forensics and Security.

[60]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[61]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[62]  Sennur Ulukus,et al.  Secrecy capacity region of the Gaussian multi-receiver wiretap channel , 2009, 2009 IEEE International Symposium on Information Theory.

[63]  Hsiao-Hwa Chen,et al.  Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.

[64]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[65]  Vijay K. Bhargava,et al.  Secure transmission in multi-cell massive MIMO systems , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[66]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[67]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[68]  K. J. Ray Liu,et al.  An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.

[69]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[70]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[71]  Mohamed-Slim Alouini,et al.  On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[72]  Christos Bouras,et al.  Trends in Telecommunications Technologies , 2010 .

[73]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[74]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[75]  Shlomo Shamai,et al.  Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range , 2015, ISIT.

[76]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[77]  Mohamed-Slim Alouini,et al.  Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.

[78]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity Region of the Block-Fading BCC with Limited CSI Feedback , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[79]  Elza Erkip,et al.  Diversity-Multiplexing Tradeoff for the Multiple-Antenna Wire-tap Channel , 2011, IEEE Transactions on Wireless Communications.

[80]  Mohamed-Slim Alouini,et al.  On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[81]  Robert W. Heath,et al.  Grassmannian beamforming for multiple-input multiple-output wireless systems , 2003, IEEE Trans. Inf. Theory.

[82]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[83]  Shlomo Shamai,et al.  Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding , 2009, EURASIP J. Wirel. Commun. Netw..

[84]  Derrick Wing Kwan Ng,et al.  Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.

[85]  Hyuckjae Lee,et al.  Secrecy capacity over correlated ergodic fading channel , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[86]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[87]  Mohamed-Slim Alouini,et al.  On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information , 2014, 2014 IEEE Global Communications Conference.

[88]  Shlomo Shamai,et al.  Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.

[89]  Chong-Yung Chi,et al.  On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.

[90]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[91]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[92]  Raef Bassily,et al.  Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.

[93]  Holger Boche,et al.  Strong secrecy in arbitrarily varying wiretap channels , 2012, 2012 IEEE Information Theory Workshop.

[94]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[95]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[96]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[97]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.

[98]  Jin Xu,et al.  Capacity Bounds for Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.

[99]  Ashish Khisti,et al.  Secure Broadcasting with Multiuser Diversity , 2006 .

[100]  Shlomo Shamai,et al.  A Broadcast Approach for Fading Wiretap Channels , 2014, IEEE Transactions on Information Theory.

[101]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[102]  Xiaoming Chen,et al.  Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.

[103]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[104]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[105]  Mohamed-Slim Alouini,et al.  Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.

[106]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[107]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[108]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[109]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[110]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[111]  Yiyang Pei,et al.  Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.

[112]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[113]  Nuwan S. Ferdinand,et al.  Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.

[114]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[115]  Pritam Mukherjee,et al.  Fading wiretap channel with no CSI anywhere , 2013, 2013 IEEE International Symposium on Information Theory.

[116]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[117]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[118]  Mohamed-Slim Alouini,et al.  On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation , 2014, 2014 IEEE Global Communications Conference.

[119]  Mustafa Cenk Gursoy,et al.  Secure relay beamforming over cognitive radio channels , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[120]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[121]  Shlomo Shamai,et al.  Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT , 2013, IEEE Transactions on Information Forensics and Security.

[122]  Mohamed-Slim Alouini,et al.  Achievable Rates of Secure Transmission in Gaussian MISO Channel With Imperfect Main Channel Estimation , 2015, IEEE Transactions on Wireless Communications.

[123]  Yi Hong,et al.  Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.

[124]  Theodoros Tsiligkaridis,et al.  Secure MIMO Communications Under Quantized Channel Feedback in the Presence of Jamming , 2014, IEEE Transactions on Signal Processing.

[125]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[126]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[127]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.