Cargando…

An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels

Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels,...

Descripción completa

Detalles Bibliográficos
Autores principales: Kong, Long, Ai, Yun, Lei, Lei, Kaddoum, Georges, Chatzinotas, Symeon, Ottersten, Björn
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8642773/
https://www.ncbi.nlm.nih.gov/pubmed/34899875
http://dx.doi.org/10.1186/s13638-021-02065-4
_version_ 1784609739607375872
author Kong, Long
Ai, Yun
Lei, Lei
Kaddoum, Georges
Chatzinotas, Symeon
Ottersten, Björn
author_facet Kong, Long
Ai, Yun
Lei, Lei
Kaddoum, Georges
Chatzinotas, Symeon
Ottersten, Björn
author_sort Kong, Long
collection PubMed
description Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.
format Online
Article
Text
id pubmed-8642773
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-86427732021-12-06 An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels Kong, Long Ai, Yun Lei, Lei Kaddoum, Georges Chatzinotas, Symeon Ottersten, Björn EURASIP J Wirel Commun Netw Review Physical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed. Springer International Publishing 2021-12-04 2021 /pmc/articles/PMC8642773/ /pubmed/34899875 http://dx.doi.org/10.1186/s13638-021-02065-4 Text en © The Author(s) 2021 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Review
Kong, Long
Ai, Yun
Lei, Lei
Kaddoum, Georges
Chatzinotas, Symeon
Ottersten, Björn
An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title_full An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title_fullStr An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title_full_unstemmed An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title_short An overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
title_sort overview of generic tools for information-theoretic secrecy performance analysis over wiretap fading channels
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8642773/
https://www.ncbi.nlm.nih.gov/pubmed/34899875
http://dx.doi.org/10.1186/s13638-021-02065-4
work_keys_str_mv AT konglong anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT aiyun anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT leilei anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT kaddoumgeorges anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT chatzinotassymeon anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT otterstenbjorn anoverviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT konglong overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT aiyun overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT leilei overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT kaddoumgeorges overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT chatzinotassymeon overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels
AT otterstenbjorn overviewofgenerictoolsforinformationtheoreticsecrecyperformanceanalysisoverwiretapfadingchannels