Cargando…
An Overview of Key Technologies in Physical Layer Security
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eav...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7711494/ https://www.ncbi.nlm.nih.gov/pubmed/33287029 http://dx.doi.org/10.3390/e22111261 |
_version_ | 1783618159267282944 |
---|---|
author | Sanenga, Abraham Mapunda, Galefang Allycan Jacob, Tshepiso Merapelo Ludo Marata, Leatile Basutli, Bokamoso Chuma, Joseph Monamati |
author_facet | Sanenga, Abraham Mapunda, Galefang Allycan Jacob, Tshepiso Merapelo Ludo Marata, Leatile Basutli, Bokamoso Chuma, Joseph Monamati |
author_sort | Sanenga, Abraham |
collection | PubMed |
description | The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. |
format | Online Article Text |
id | pubmed-7711494 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-77114942021-02-24 An Overview of Key Technologies in Physical Layer Security Sanenga, Abraham Mapunda, Galefang Allycan Jacob, Tshepiso Merapelo Ludo Marata, Leatile Basutli, Bokamoso Chuma, Joseph Monamati Entropy (Basel) Review The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. MDPI 2020-11-06 /pmc/articles/PMC7711494/ /pubmed/33287029 http://dx.doi.org/10.3390/e22111261 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Sanenga, Abraham Mapunda, Galefang Allycan Jacob, Tshepiso Merapelo Ludo Marata, Leatile Basutli, Bokamoso Chuma, Joseph Monamati An Overview of Key Technologies in Physical Layer Security |
title | An Overview of Key Technologies in Physical Layer Security |
title_full | An Overview of Key Technologies in Physical Layer Security |
title_fullStr | An Overview of Key Technologies in Physical Layer Security |
title_full_unstemmed | An Overview of Key Technologies in Physical Layer Security |
title_short | An Overview of Key Technologies in Physical Layer Security |
title_sort | overview of key technologies in physical layer security |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7711494/ https://www.ncbi.nlm.nih.gov/pubmed/33287029 http://dx.doi.org/10.3390/e22111261 |
work_keys_str_mv | AT sanengaabraham anoverviewofkeytechnologiesinphysicallayersecurity AT mapundagalefangallycan anoverviewofkeytechnologiesinphysicallayersecurity AT jacobtshepisomerapeloludo anoverviewofkeytechnologiesinphysicallayersecurity AT marataleatile anoverviewofkeytechnologiesinphysicallayersecurity AT basutlibokamoso anoverviewofkeytechnologiesinphysicallayersecurity AT chumajosephmonamati anoverviewofkeytechnologiesinphysicallayersecurity AT sanengaabraham overviewofkeytechnologiesinphysicallayersecurity AT mapundagalefangallycan overviewofkeytechnologiesinphysicallayersecurity AT jacobtshepisomerapeloludo overviewofkeytechnologiesinphysicallayersecurity AT marataleatile overviewofkeytechnologiesinphysicallayersecurity AT basutlibokamoso overviewofkeytechnologiesinphysicallayersecurity AT chumajosephmonamati overviewofkeytechnologiesinphysicallayersecurity |