Cargando…

An Overview of Key Technologies in Physical Layer Security

The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eav...

Descripción completa

Detalles Bibliográficos
Autores principales: Sanenga, Abraham, Mapunda, Galefang Allycan, Jacob, Tshepiso Merapelo Ludo, Marata, Leatile, Basutli, Bokamoso, Chuma, Joseph Monamati
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7711494/
https://www.ncbi.nlm.nih.gov/pubmed/33287029
http://dx.doi.org/10.3390/e22111261
_version_ 1783618159267282944
author Sanenga, Abraham
Mapunda, Galefang Allycan
Jacob, Tshepiso Merapelo Ludo
Marata, Leatile
Basutli, Bokamoso
Chuma, Joseph Monamati
author_facet Sanenga, Abraham
Mapunda, Galefang Allycan
Jacob, Tshepiso Merapelo Ludo
Marata, Leatile
Basutli, Bokamoso
Chuma, Joseph Monamati
author_sort Sanenga, Abraham
collection PubMed
description The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided.
format Online
Article
Text
id pubmed-7711494
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-77114942021-02-24 An Overview of Key Technologies in Physical Layer Security Sanenga, Abraham Mapunda, Galefang Allycan Jacob, Tshepiso Merapelo Ludo Marata, Leatile Basutli, Bokamoso Chuma, Joseph Monamati Entropy (Basel) Review The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided. MDPI 2020-11-06 /pmc/articles/PMC7711494/ /pubmed/33287029 http://dx.doi.org/10.3390/e22111261 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Sanenga, Abraham
Mapunda, Galefang Allycan
Jacob, Tshepiso Merapelo Ludo
Marata, Leatile
Basutli, Bokamoso
Chuma, Joseph Monamati
An Overview of Key Technologies in Physical Layer Security
title An Overview of Key Technologies in Physical Layer Security
title_full An Overview of Key Technologies in Physical Layer Security
title_fullStr An Overview of Key Technologies in Physical Layer Security
title_full_unstemmed An Overview of Key Technologies in Physical Layer Security
title_short An Overview of Key Technologies in Physical Layer Security
title_sort overview of key technologies in physical layer security
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7711494/
https://www.ncbi.nlm.nih.gov/pubmed/33287029
http://dx.doi.org/10.3390/e22111261
work_keys_str_mv AT sanengaabraham anoverviewofkeytechnologiesinphysicallayersecurity
AT mapundagalefangallycan anoverviewofkeytechnologiesinphysicallayersecurity
AT jacobtshepisomerapeloludo anoverviewofkeytechnologiesinphysicallayersecurity
AT marataleatile anoverviewofkeytechnologiesinphysicallayersecurity
AT basutlibokamoso anoverviewofkeytechnologiesinphysicallayersecurity
AT chumajosephmonamati anoverviewofkeytechnologiesinphysicallayersecurity
AT sanengaabraham overviewofkeytechnologiesinphysicallayersecurity
AT mapundagalefangallycan overviewofkeytechnologiesinphysicallayersecurity
AT jacobtshepisomerapeloludo overviewofkeytechnologiesinphysicallayersecurity
AT marataleatile overviewofkeytechnologiesinphysicallayersecurity
AT basutlibokamoso overviewofkeytechnologiesinphysicallayersecurity
AT chumajosephmonamati overviewofkeytechnologiesinphysicallayersecurity