DOI QR코드

DOI QR Code

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil (Department of Information and Communications Engineering, Pukyong National University) ;
  • Hong, Jun-Pyo (Department of Information and Communications Engineering, Pukyong National University)
  • Received : 2017.01.06
  • Accepted : 2017.01.18
  • Published : 2017.03.31

Abstract

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Keywords

References

  1. C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  2. A. D. Wyner, "The wire-tap channel," Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, "On the resilience of wireless multiuser networks to passive and active eavesdroppers," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1850-1863, 2013. https://doi.org/10.1109/JSAC.2013.130917
  4. R. Negi and S. Goel, "Secret communication using artificial noise," in Proceedings of IEEE Vehicular Technology Conference (VTC), Dallas, TX, 2005.
  5. R. Negi and S. Goel, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
  6. X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010. https://doi.org/10.1109/TVT.2010.2059057
  7. X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2170-2181, 2012. https://doi.org/10.1109/TVT.2013.2238687
  8. S. Gerbracht, Ch. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 704-716, 2012. https://doi.org/10.1109/TIFS.2011.2181946
  9. G. Zheng, P. D. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems," IEEE Transactions on Wireless Communications, vol. 11, no. 2, pp. 852-863, 2012. https://doi.org/10.1109/TWC.2011.120911.111460
  10. N. Li, X. Tao, and J. Xu, "Artificial noise assisted communication in the multiuser downlink: optimal power allocation," IEEE Communications Letters, vol. 19, no. 2, pp. 295-298, 2015. https://doi.org/10.1109/LCOMM.2014.2385779
  11. N. Li, X. Tao, H. Wu, J. Xu, and Q. Cui, "Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: ergodic secrecy sum rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, 2016. https://doi.org/10.1109/TVT.2015.2493178
  12. I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Processing Letters, vol. 20, no. 2, pp. 141-144, 2013. https://doi.org/10.1109/LSP.2012.2234109
  13. H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Processing Letters, vol. 19, no. 6, pp. 372-375, 2012. https://doi.org/10.1109/LSP.2012.2195490
  14. B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: a survey," 2013 [Internet], Available: https://arxiv.org/pdf/1307.4146.pdf.
  15. I. Telatar, "Capacity of multi- antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585-595, 1999. https://doi.org/10.1002/ett.4460100604
  16. W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011. https://doi.org/10.1109/TSP.2010.2094610
  17. N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Communications Letters, vol. 17, no. 5, pp. 864-867, 2013. https://doi.org/10.1109/LCOMM.2013.040213.122696