Information Security of PHY Layer in Wireless Networks

Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Ming Zhao,et al.  PHY security enhancement in analog network coding based on artificial noise , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[3]  Richard Demo Souza,et al.  Optimizing the code rate for achieving energy-efficient wireless communications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[4]  Michal Pióro,et al.  Fair flow rate optimization by effective placement of directional antennas in wireless mesh networks , 2015, Perform. Evaluation.

[5]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[6]  Chin-Chen Chang,et al.  Recent Advances in Security and Privacy for Wireless Sensor Networks , 2015, J. Sensors.

[7]  Neeli Rashmi Prasad,et al.  Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[8]  Muhammad Jaseemuddin,et al.  A Survey On MAC Protocols for Wireless Adhoc Networks with Beamforming Antennas , 2012, IEEE Communications Surveys & Tutorials.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[11]  Li Hao,et al.  A Highly Efficient Secure Communication Interface: Collision-Free Frequency Hopping (CFFH) , 2007 .

[12]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[13]  Ananthram Swami,et al.  PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.

[14]  Marco Baldi,et al.  Non-systematic codes for physical layer security , 2010, 2010 IEEE Information Theory Workshop.

[15]  Mark F. Flanagan,et al.  A Soft Decode–Compress–Forward Relaying Scheme for Cooperative Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[16]  Tai-Hoon Kim,et al.  Detecting bad information in mobile wireless networks based on the wireless application protocol , 2013, Computing.

[17]  M. Darnell,et al.  Security considerations in frequency hopping radio systems , 1994 .

[18]  Christian Wietfeld,et al.  Self-organizing fractional frequency reuse for femtocells using adaptive frequency hopping , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[19]  Li Shaoqian,et al.  A new anti-jam receiver for MFSK/FFH system with multitone jamming , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[20]  Sanghun Im,et al.  Secure Antenna Subset Modulation with Coordinate Interleaved Orthogonal Designs , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[21]  Jean-Yves Chouinard,et al.  Enhancing secrecy of the Gaussian wiretap channel using rate compatible LDPC codes with error amplification , 2015, 2015 IEEE 14th Canadian Workshop on Information Theory (CWIT).

[22]  Mohammad Abdel-Rahman,et al.  Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems , 2014, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[23]  Oscar Moreno,et al.  Secure CDMA and Frequency Hop Sequences , 2013, ISWCS.

[24]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[25]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[26]  Xiao Ma,et al.  Performance study of hybrid DS/FFH spread-spectrum systems in the presence of frequency-selective fading and multiple-access interference , 2012, 2012 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).

[27]  Tongtong Li,et al.  Toward secure cognitive communications in wireless networks , 2012, IEEE Wireless Communications.

[28]  Aamir Saeed Malik,et al.  Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..

[29]  Xiao Ma,et al.  Hybrid DS/FFH spread-spectrum: A robust, secure transmission technique for communication in harsh environments , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[30]  Pietro Liò,et al.  Detection Probability Estimation of Directional Antennas and Omni-Directional Antennas , 2010, Wirel. Pers. Commun..

[31]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[32]  Kai Chen,et al.  Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.

[33]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[34]  Jianwei Zhou,et al.  Practical frequency hopping sequence design for interference avoidance in 802.15.4e TSCH networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[35]  Marco Baldi,et al.  Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[36]  Baoyu Zheng,et al.  Defending against eavesdropping attack leveraging multiple antennas in wireless networks , 2013, 2013 8th International Conference on Communications and Networking in China (CHINACOM).

[37]  Byung-Jae Kwak,et al.  Physical Layer Security with Yarg Code , 2009, 2009 First International Conference on Emerging Network Intelligence.

[38]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[39]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[40]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[41]  Xiaohua Li,et al.  Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..

[42]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[43]  Qing Yang,et al.  Asynchronous Convolutional-Coded Physical-Layer Network Coding , 2013, IEEE Transactions on Wireless Communications.

[44]  Tracy Camp,et al.  Distributed Decode and Forward Beamforming , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[45]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[46]  Byung-Jae Kwak,et al.  LDPC codes for physical layer security , 2009, GLOBECOM 2009.

[47]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[48]  Wenyuan Xu Jamming Attack Defense , 2011, Encyclopedia of Cryptography and Security.

[49]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[50]  Peng Wei-ming Research on Anti-jamming Synchronization Algorithm in the Frequency Hopping Communication System , 2011 .

[51]  Robert W. Heath,et al.  Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[52]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[53]  Jinho Choi,et al.  Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers , 2014, 2014 IEEE International Conference on Communications (ICC).

[54]  Robert G. Maunder,et al.  20 Years of Turbo Coding and Energy-Aware Design Guidelines for Energy-Constrained Wireless Applications , 2016, IEEE Communications Surveys & Tutorials.

[55]  Zhiliang Yang,et al.  Artificial noise and LDPC code aided physical layer security enhancement , 2014 .

[56]  Günes Karabulut-Kurt,et al.  Efficient PHY layer security in MIMO-OFDM: Spatiotemporal selective artificial noise , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[57]  Gonzalo Seco-Granados,et al.  Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[58]  Aijun Liu,et al.  Polar-LDPC Concatenated Coding for the AWGN Wiretap Channel , 2014, IEEE Communications Letters.

[59]  Guevara Noubir,et al.  On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.

[60]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[61]  Xin Wang,et al.  Physical layer security in wireless smart grid , 2015, Secur. Commun. Networks.