期刊文献+

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5

Wireless Physical Layer Security with Imperfect Channel State Information: A Survey
下载PDF
导出
摘要 Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed.
出处 《ZTE Communications》 2013年第3期11-19,共9页 中兴通讯技术(英文版)
关键词 physical layer security fading channels channel uncertainty imperfect channel state information physical layer security fading channels channel uncertainty imperfect channel state information
  • 相关文献

参考文献66

  • 1J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
  • 2M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless infor- mation-theoretic security," IEEE Trans. Inf.. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
  • 3C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
  • 4A. D. Wyner, "The wire-tap channel," Bell Syst. Tecb. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  • 5I. Csiszdr and J. Ktirner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
  • 6U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," IEEE Trans. In. Theo- ry, vol. 49, no. 4, pp. 822-831, Apr. 2003.
  • 7U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part Ⅱ: the simulatability condition," IEEE Trans. InT. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
  • 8T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over muhipath wireless channels," in Proe. IEEE ISIT, Seoul, Korea, June 2009, pp. 2296-2300.
  • 9L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. INT.. Forensics Security, vol. 7, no. 2, pp. 480-490. Aor. 2012.
  • 10L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-com- modity flow in networks," in Proc. IEEE 1TW, Lausanne, Switzerland, Sept. 2012, pp. 627-631.

同被引文献5

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部