Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

Physical-layer security is emerging approach that can benefit conventional encryption methods. The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer. This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security. In addition, our work survey research about physical layer security over several enabling 5G technologies, such as massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, and full-duplex, including the key concepts of each of the aforementioned technologies. Finally, future research directions and technical challenges of physical layer security are identified.

[1]  Taufik Abrão,et al.  Game Theory Based Resource Allocation in Multi-Cell Massive MIMO OFDMA Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Yang Yang,et al.  Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Access.

[3]  Tapani Ristaniemi,et al.  Intercept Probability Analysis of Wireless Powered Relay System in kappa-mu Fading , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[4]  Jun Wu,et al.  Secure Transmission in Multi-Cell Multi-User Massive MIMO Systems With an Active Eavesdropper , 2019, IEEE Wireless Communications Letters.

[5]  Kai-Kit Wong,et al.  Full-Duplex Small-Cell Networks: A Physical-Layer Security Perspective , 2018, IEEE Transactions on Communications.

[6]  Muralikrishnan Srinivasan,et al.  Secrecy Capacity of $\kappa-\mu$ Shadowed Fading Channels , 2018, IEEE Communications Letters.

[7]  Fabrice Labeau,et al.  Multiple Antenna Physical Layer Security Against Passive Eavesdroppers: A Tutorial , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).

[8]  Xiang Cheng,et al.  Performance Analysis of Secure Communication in Massive MIMO with Imperfect Channel State Information , 2018, 2018 IEEE International Conference on Communications (ICC).

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  Shijie Wang,et al.  Physical Layer security in Two-tier Heterogeneous Cellular Networks over Nakagami Channel during Uplink Phase , 2018, 2018 13th APCA International Conference on Control and Soft Computing (CONTROLO).

[11]  Hai Lin,et al.  Robust Beamforming for Physical Layer Security in BDMA Massive MIMO , 2017, IEEE Journal on Selected Areas in Communications.

[12]  Dhanushka Kudathanthirige,et al.  Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks , 2019, IEEE Transactions on Information Forensics and Security.

[13]  H. Vincent Poor,et al.  Physical layer security in massive MIMO systems , 2017, 2017 51st Asilomar Conference on Signals, Systems, and Computers.

[14]  Mubashir Husain Rehmani,et al.  Network Coding in Cognitive Radio Networks: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  Yongming Huang,et al.  Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.

[17]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[18]  Georges Kaddoum,et al.  On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.

[19]  Xiaojiang Du,et al.  Millimeter-Wave Propagation Modeling and Measurements for 5G Mobile Networks , 2019, IEEE Wireless Communications.

[20]  Rafael F. Schaefer,et al.  Secure Communication in Spectrum-Sharing Massive MIMO Systems With Active Eavesdropping , 2018, IEEE Transactions on Cognitive Communications and Networking.

[21]  Xiangyun Zhou,et al.  On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[22]  Zhi Chen,et al.  MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.

[23]  George C. Alexandropoulos,et al.  Secrecy Outage Analysis Over Correlated Composite Nakagami- $m$ /Gamma Fading Channels , 2017, IEEE Communications Letters.

[24]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[25]  Tony Q. S. Quek,et al.  Enhanced intercell interference coordination challenges in heterogeneous networks , 2011, IEEE Wireless Communications.

[26]  Shi Jin,et al.  Data-Aided Secure Massive MIMO Transmission with Active Eavesdropping , 2018, 2018 IEEE International Conference on Communications (ICC).

[27]  Fredrik Tufvesson,et al.  5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice , 2017, IEEE Journal on Selected Areas in Communications.

[28]  Chao Yuan,et al.  Secure Transmission Against Pilot Contamination: A Cooperative Scheme with Multiple Antennas , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[29]  Dongwoo Kim,et al.  Optimal Power and Rate Allocation in Superposition Transmission With Successive Noise Signal Sharing Toward Zero Intercept Probability , 2018, IEEE Wireless Communications Letters.

[30]  Chao Gao,et al.  On Physical Layer Security Over Generalized Gamma Fading Channels , 2015, IEEE Communications Letters.

[31]  Wei Li,et al.  On the Secrecy Capacity of 5G MmWave Small Cell Networks , 2018, IEEE Wireless Communications.

[32]  Georges Kaddoum,et al.  On Physical Layer Security Over the Fisher-Snedecor ${\mathcal{F}}$ Wiretap Fading Channels , 2018, IEEE Access.

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Vincent W. S. Wong,et al.  Secure Video Streaming in Heterogeneous Small Cell Networks With Untrusted Cache Helpers , 2018, IEEE Transactions on Wireless Communications.

[35]  Mohsen Guizani,et al.  5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.

[36]  Huan Zhang,et al.  Performance Analysis of Physical Layer Security Over Generalized-$K$ Fading Channels Using a Mixture Gamma Distribution , 2016, IEEE Communications Letters.

[37]  Xu Yuan,et al.  Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks , 2018, IEEE Access.

[38]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[39]  Manav R. Bhatnagar,et al.  On Physical Layer Security of α-η-κ-μ Fading Channels , 2018, IEEE Commun. Lett..

[40]  Derrick Wing Kwan Ng,et al.  Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments , 2016, IEEE Transactions on Wireless Communications.

[41]  Jia Zhu,et al.  Energy-Aware Multiuser Scheduling for Physical-Layer Security in Energy-Harvesting Underlay Cognitive Radio Systems , 2018, IEEE Transactions on Vehicular Technology.

[42]  Victor C. M. Leung,et al.  Secure Beamforming in Full-Duplex SWIPT Systems with Loopback Self-Interference Cancellation , 2018, 2018 IEEE International Conference on Communications (ICC).

[43]  Hien Quoc Ngo,et al.  Secure Massive MIMO With the Artificial Noise-Aided Downlink Training , 2018, IEEE Journal on Selected Areas in Communications.

[44]  Khoa N. Le,et al.  Performance Analysis of Secure Communications Over Dual Correlated Rician Fading Channels , 2018, IEEE Transactions on Communications.

[45]  Holger Boche,et al.  Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.

[46]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[47]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[48]  Kwok Hung Li,et al.  Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.

[49]  Jihwan P. Choi,et al.  Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers , 2018, IEEE Access.

[50]  Su Hu,et al.  Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.

[51]  Xiqi Gao,et al.  Beam Domain Secure Transmission for Massive MIMO Communications , 2018, IEEE Transactions on Vehicular Technology.

[52]  Xianyu Zhang,et al.  Secure Performance Analysis for Multi-Pair AF Relaying Massive MIMO Systems in Ricean Channels , 2018, IEEE Access.

[53]  Theodore S. Rappaport,et al.  Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.

[54]  Xiangyun Zhou,et al.  Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver , 2018, IEEE Transactions on Information Forensics and Security.

[55]  Shijie Wang,et al.  Physical Layer Security in Two-tier Heterogeneous Cellular Networks over Nakagami Channel during Uplink Phase , 2018, 2018 10th International Conference on Communication Software and Networks (ICCSN).

[56]  Vijay K. Bhargava,et al.  Secure transmission in multi-cell massive MIMO systems , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[57]  Richard Demo Souza,et al.  Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints , 2017, IEEE Transactions on Wireless Communications.

[58]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[59]  Vincent W. S. Wong,et al.  Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks , 2017, IEEE Transactions on Wireless Communications.

[60]  Lyu Qing,et al.  Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing , 2018, IEEE Communications Letters.

[61]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[62]  Liang Jin,et al.  Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems , 2019, IEEE Access.

[63]  Marwan Krunz,et al.  Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[64]  Xiangyun Zhou,et al.  A New Metric for Measuring the Security of an Environment: The Secrecy Pressure , 2017, IEEE Transactions on Wireless Communications.

[65]  Xian Liu,et al.  Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel , 2013, IEEE Wireless Communications Letters.

[66]  Bo Ai,et al.  Physical Layer Security Over Fluctuating Two-Ray Fading Channels , 2018, IEEE Transactions on Vehicular Technology.

[67]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[68]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[69]  Jules M. Moualeu,et al.  Intercept Probability Analysis of Wireless Networks in the Presence of Eavesdropping Attack With Co-Channel Interference , 2018, IEEE Access.

[70]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[71]  Theodoros A. Tsiftsis,et al.  Wireless Security Employing Opportunistic Relays and an Adaptive Encoder Under Outdated CSI and Dual-Correlated Nakagami- $m$ Fading , 2019, IEEE Transactions on Communications.

[72]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[73]  Qinye Yin,et al.  Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.

[74]  Mingxuan Sun,et al.  Secure Transmission With Guaranteed User Satisfaction in Heterogeneous Networks: A Two-Level Stackelberg Game Approach , 2018, IEEE Transactions on Communications.

[75]  Xiaofeng Tao,et al.  Artificial-noise-aided secure communication with full-duplex active eavesdropper , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[76]  Kyoung-Jae Lee,et al.  Achievable Sum-Rate Analysis of Massive MIMO Full-Duplex Wireless Backhaul Links in Heterogeneous Cellular Networks , 2018, IEEE Access.

[77]  Miguel R. D. Rodrigues,et al.  On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[78]  Georges Kaddoum,et al.  Secrecy Analysis of Random MIMO Wireless Networks Over α-μ Fading Channels , 2018, IEEE Trans. Veh. Technol..

[79]  Robert W. Heath,et al.  Securing mmWave Vehicular Communication Links with Multiple Transmit Antennas , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[80]  Insoo Koo,et al.  A Novel Physical Layer Security Scheme in OFDM-Based Cognitive Radio Networks , 2018, IEEE Access.

[81]  Jia Zhu,et al.  Security-Reliability Tradeoff for Distributed Antenna Systems in Heterogeneous Cellular Networks , 2018, IEEE Transactions on Wireless Communications.