Physical Layer Security: A Paradigm Shift in Data Confidentiality
Physical layer security (PLS) draws on information theory to characterize the fundamental ability of the wireless physical layer to ensure data confidentiality. In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect to an eavesdropper by using appropriate encoding schemes that exploit the noise and fading effects of wireless communication channels. Today, after more than 15 years of research in the area, PLS has the potential to provide novel security solutions that can be integrated into future generations of mobile communication systems. This chapter presents a tutorial on advances in this area. The treatment begins with a review of the fundamental PLS concepts and their corresponding historical background. Subsequently it reviews some of the most significant advances in coding theory and system design that offer a concrete platform for the realization of the promise of this approach in data confidentiality.
KeywordsOrthogonal Frequency Division Multiplex Orthogonal Frequency Division Multiplex System Interference Alignment Relay Channel Massive MIMO
The financial support from the Academy of Finland (grants #276031, #282938, #283262) and Magnus Ehrnrooth Foundation is gratefully acknowledged. Part of this work was carried out under the European Science Foundation’s COST Action IC1104. This work was also supported by the U.S. National Science Foundation Grant CMMI-1435778.
- 3.Bennett CH, Brassard G, Crépeau C, Maurer UM (1995) Generalized privacy amplification. IEEE Trans Inf Theory 50(2):394–400Google Scholar
- 4.Chorti A, Perlaza SM, Han Z, Poor V (2013) On the resilience of wireless multiuser networks to passive and active eavesdroppers. IEEE J Sel Areas Commun 31(9):1850–1863Google Scholar
- 5.Chorti A, Papadaki KP, Poor HV (2015) Optimal power allocation in block fading channels with confidential messages. IEEE Trans Wirel Commun (to appear)Google Scholar
- 7.Dean T, Goldsmith A (2013) Physical-layer cryptography through massive MIMO. arXiv:1310.1861 [cs.IT], submitted to IEEE Transactions on Information Theory
- 11.Katz J, Lindell Y (2007) Introduction to modern cryptography. CRC Press Inc., Boca RatonGoogle Scholar
- 23.Maurer UM, Renner R, Wolf S (2007) Unbreakable keys from random noise, Security with Noisy Data. Springer, New York, pp 21–44Google Scholar
- 25.Oggier F, Solé P, Belfiore J-C (2011) Lattice codes for the wiretap Gaussian channel: construction and analysis. arXiv:1103.4086v3 [cs.IT]
- 26.Oohama Y (2001) Coding for relay channels with confidential messages. In: Proceedings of the information theory workshop (ITW) (Cairns, Australia), pp 87–89Google Scholar
- 27.Oohama Y (2007) Capacity theorems for relay channels with confidential messages. In: IEEE International Symposium on Information Theory—ISIT 2007 (Nice, France), pp 926–930Google Scholar
- 28.Ozarow L, Wyner A (1985) Wire-tap channel II. Advances in Cryptology, Lecture Notes in Computer Science vol. 209. Springer, New York, pp 33–50Google Scholar
- 29.Renna F, Laurenti N, Poor HV (2012) Physical layer secrecy for OFDM transmissions over fading channels. IEEE Trans Inf Forensics Secur 7(4):1354–1367Google Scholar
- 30.Renna F, Laurenti N, Tomasin S, Baldi M, Maturo N, Bianchi M, Chiaraluce F, Bloch M (2013) Low-power secret-key agreement over OFDM, CoRR abs/1302.4767Google Scholar