An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
Abstract Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless c...
Guardado en:
Autores principales: | , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
SpringerOpen
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/649846dc968545d29f318a2eee25f3cb |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:649846dc968545d29f318a2eee25f3cb |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:649846dc968545d29f318a2eee25f3cb2021-12-05T12:06:35ZAn overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels10.1186/s13638-021-02065-41687-1499https://doaj.org/article/649846dc968545d29f318a2eee25f3cb2021-12-01T00:00:00Zhttps://doi.org/10.1186/s13638-021-02065-4https://doaj.org/toc/1687-1499Abstract Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.Long KongYun AiLei LeiGeorges KaddoumSymeon ChatzinotasBjörn OtterstenSpringerOpenarticlePhysical layer security (PLS)Channel state information (CSI)Mixture Gamma (MG)Mixture of Gaussian (MoG)Fox’s H-functionArtificial noise (AN)TelecommunicationTK5101-6720ElectronicsTK7800-8360ENEURASIP Journal on Wireless Communications and Networking, Vol 2021, Iss 1, Pp 1-21 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Physical layer security (PLS) Channel state information (CSI) Mixture Gamma (MG) Mixture of Gaussian (MoG) Fox’s H-function Artificial noise (AN) Telecommunication TK5101-6720 Electronics TK7800-8360 |
spellingShingle |
Physical layer security (PLS) Channel state information (CSI) Mixture Gamma (MG) Mixture of Gaussian (MoG) Fox’s H-function Artificial noise (AN) Telecommunication TK5101-6720 Electronics TK7800-8360 Long Kong Yun Ai Lei Lei Georges Kaddoum Symeon Chatzinotas Björn Ottersten An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
description |
Abstract Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed. |
format |
article |
author |
Long Kong Yun Ai Lei Lei Georges Kaddoum Symeon Chatzinotas Björn Ottersten |
author_facet |
Long Kong Yun Ai Lei Lei Georges Kaddoum Symeon Chatzinotas Björn Ottersten |
author_sort |
Long Kong |
title |
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
title_short |
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
title_full |
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
title_fullStr |
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
title_full_unstemmed |
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
title_sort |
overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels |
publisher |
SpringerOpen |
publishDate |
2021 |
url |
https://doaj.org/article/649846dc968545d29f318a2eee25f3cb |
work_keys_str_mv |
AT longkong anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT yunai anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT leilei anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT georgeskaddoum anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT symeonchatzinotas anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT bjornottersten anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT longkong overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT yunai overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT leilei overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT georgeskaddoum overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT symeonchatzinotas overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels AT bjornottersten overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels |
_version_ |
1718372258688270336 |