Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 1230387, 10 pages
http://dx.doi.org/10.1155/2016/1230387
Review Article

Information Security of PHY Layer in Wireless Networks

1Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai University, Shanghai 200444, China
2Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 201899, China
3Shanghai Internet of Things Co., Ltd., Shanghai 201899, China
4Shanghai Research Center for Wireless Communications, Shanghai 200335, China
5College of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, China

Received 2 December 2015; Accepted 16 February 2016

Academic Editor: Fei Yu

Copyright © 2016 Weidong Fang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Jiang, T. Li, and J. Ren, “Toward secure cognitive communications in wireless networks,” IEEE Wireless Communications, vol. 19, no. 4, pp. 82–88, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. F. Yu, C.-C. Chang, J. Shu, I. Ahmad, J. Zhang, and J. M. de Fuentes, “Recent advances in security and privacy for wireless sensor networks,” Journal of Sensors, vol. 2015, Article ID 169305, 2 pages, 2015. View at Publisher · View at Google Scholar
  3. W. Zhang, Y. Zhang, and T.-H. Kim, “Detecting bad information in mobile wireless networks based on the wireless application protocol,” Computing, vol. 96, no. 9, pp. 855–874, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Chen, M. He, W. Liang, and K. Chen, “Trust-aware and low energy consumption security topology protocol of wireless sensor network,” Journal of Sensors, vol. 2015, Article ID 716468, 10 pages, 2015. View at Publisher · View at Google Scholar
  6. F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, “Trust management system in wireless sensor networks: design considerations and research challenges,” Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107–130, 2015. View at Publisher · View at Google Scholar
  7. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: the road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Bassily, E. Ekrem, X. He et al., “Cooperative security at the physical layer: a summary of recent advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. H. M. Wang and X. G. Xia, “Enhancing wireless secrecy via cooperation: signal design and optimization,” IEEE Communications Magazine, vol. 53, no. 12, pp. 47–53, 2015. View at Publisher · View at Google Scholar
  10. A. Yener and S. Ulukus, “Wireless physical-layer security: lessons learned from information theory,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1814–1825, 2015. View at Publisher · View at Google Scholar
  11. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE Communications Surveys and Tutorials, vol. 11, no. 4, pp. 42–56, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66–74, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. W. Xu, W. Trapper, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), pp. 46–57, Chicago, Ill, USA, May 2005.
  14. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet
  15. I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  16. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet
  17. Y. Zou, J. Zhu, and B. Zheng, “Defending against eavesdropping attack leveraging multiple antennas in wireless networks,” in Proceedings of the 8th International ICST Conference on Communications and Networking in China (CHINACOM '13), pp. 699–703, Guilin, China, August 2013. View at Publisher · View at Google Scholar
  18. J. E. Barcelo-Llado, A. Morell, and G. Seco-Granados, “Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 839–850, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. P. H. Yang, Tactical communication network node immunity of the antenna based on OPNET [M.S. thesis], Xidian University, Xi'an, China, 2011.
  20. G. Noubir, “On connectivity in ad hoc networks under jamming using directional antennas and mobility,” in Wired/Wireless Internet Communications, pp. 186–200, Springer, Berlin, Germany, 2014. View at Google Scholar
  21. X. Lu, F. D. Wicker, D. Towsley, Z. Xiong, and P. Lio, “Detection probability estimation of directional antennas and omni-directional antennas,” Wireless Personal Communications, vol. 55, no. 1, pp. 51–63, 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. Y. Li, P. Michal, and L. Björn, “Fair flow rate optimization by effective placement of directional antennas in wireless mesh networks,” Performance Evaluation, vol. 87, pp. 92–106, 2015. View at Publisher · View at Google Scholar
  23. O. Bazan and M. Jaseemuddin, “A survey on MAC protocols for wireless adhoc networks with beamforming antennas,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 216–239, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. C. Walsh, D. Hakkarinen, and T. Camp, “Distributed decode and forward beamforming,” in Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN '12), pp. 436–444, IEEE, Clearwater, Fla, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. F. Zhu, F. Gao, M. Yao, and H. Zou, “Joint information- and jamming-beamforming for physical layer security with full duplex base station,” IEEE Transactions on Signal Processing, vol. 62, no. 24, pp. 6391–6401, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. X. Chen, C. Zhong, C. Yuen, and H. Chen, “Multi-antenna relay aided wireless physical layer security,” IEEE Communications Magazine, vol. 53, no. 12, pp. 40–46, 2015. View at Publisher · View at Google Scholar
  27. Z. Liu, C. Chen, L. Bai, H. Xiang, and J. Choi, “Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers,” in Proceedings of the IEEE International Conference on Communications (ICC '14), pp. 4698–4703, Sydney, Australia, June 2014.
  28. X. Li, J. Hwu, and E. P. Ratazzi, “Using antenna array redundancy and channel diversity for secure wireless transmissions,” Journal of Communications, vol. 2, no. 3, pp. 24–32, 2007. View at Google Scholar · View at Scopus
  29. G. Y. Zhao, “Secure transmission in PHY layer of wireless communications based on random antenna array,” China CIO News, vol. 5, p. 96, 2013. View at Google Scholar
  30. Y. Hong, S. Im, and J. Ha, “Secure antenna subset modulation with coordinate interleaved orthogonal designs,” in Proceedings of the 5th International Conference on Information and Communication Technology Convergence (ICTC '14), pp. 97–98, Busan, South Korea, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. N. Valliappan, A. Lozano, and R. W. Heath Jr., “Antenna subset modulation for secure millimeter-wave wireless communication,” IEEE Transactions on Communications, vol. 61, no. 8, pp. 3231–3245, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, “PHY layer security based on protected zone and artificial noise,” IEEE Signal Processing Letters, vol. 20, no. 5, pp. 487–490, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. S. H. Chae, W. Choi, J. H. Lee, and T. Q. S. Quek, “Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 10, pp. 1617–1628, 2014. View at Publisher · View at Google Scholar · View at Scopus
  35. W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach,” IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202–1216, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  36. P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, “On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728–1740, 2013. View at Publisher · View at Google Scholar · View at Scopus
  37. D. Deng, Z.-L. Yang, and M. Zhao, “PHY security enhancement in analog network coding based on artificial noise,” in Proceedings of the 6th International Conference on Wireless Communications and Signal Processing (WCSP '14), pp. 1–6, Hefei, China, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. O. Cepheli and G. K. Kurt, “Efficient PHY layer security in MIMO-OFDM: spatiotemporal selective artificial noise,” in Proceedings of the IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '13), pp. 1–6, Madrid, Spain, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  39. W. Xu, “Jamming attack defense,” in Encyclopedia of Cryptography and Security, pp. 655–661, Springer, New York, NY, USA, 2011. View at Publisher · View at Google Scholar
  40. M. Olama, S. Smith, T. Kuruganti, and X. Ma, “Performance study of hybrid DS/FFH spread-spectrum systems in the presence of frequency-selective fading and multiple-access interference,” in Proceedings of the IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR '12), pp. 1–5, San Diego, Calif, USA, May 2012. View at Publisher · View at Google Scholar
  41. M. M. Olama, X. Ma, T. P. Kuruganti, S. F. Smith, and S. M. Djouadi, “Hybrid DS/FFH spread-spectrum: a robust, secure transmission technique for communication in harsh environments,” in Proceedings of the IEEE Military Communications Conference (MILCOM '11), pp. 2136–2141, IEEE, Baltimore, Md, USA, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  42. M. Darnell and H. M. Yung, “Security considerations in frequency hopping radio systems,” in Proceedings of the IEE Colloquium on Security and Cryptography Applications to Radio Systems, pp. 11/1–11/3, London, UK, 1994.
  43. A. Leukhin, O. Moreno, and A. Tirkel, “Secure CDMA and frequency hop sequences,” in Proceedings of the 10th International Symposium on Wireless Communication Systems (ISWCS '13), pp. 1–5, VDE, Ilmenau, Germany, August 2013.
  44. F. Meucci, S. A. Wardana, and N. R. Prasad, “Secure physical layer using dynamic permutations in cognitive OFDMA systems,” in Proceedings of the IEEE 69th Vehicular Technology Conference (VTC '09), pp. 1–5, Barcelona, Spain, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. P. P. Pan and D. M. Zhang, “Research on anti-hopping communication system,” Neijiang Technology, vol. 6, pp. 103–115, 2014. View at Google Scholar
  46. L. Hao, T. Li, and Q. Ling, “A highly efficient secure communication interface: collision-free frequency hopping (CFFH),” in Proceedings of the IEEE Workshop on Signal Processing Applications for Public Security and Forensics (SAFE '07), vol. 4, pp. 1–4, Washington, DC, USA, April 2007.
  47. M. Putzke and C. Wietfeld, “Self-organizing fractional frequency reuse for femtocells using adaptive frequency hopping,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '13), pp. 434–439, IEEE, Shanghai, China, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  48. M. K. Hanawal, M. J. Abdel-Rahman, and M. Krunz, “Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems,” in Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '14), pp. 247–254, Hammamet, Tunisia, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  49. C.-F. Shih, A. E. Xhafa, and J. Zhou, “Practical frequency hopping sequence design for interference avoidance in 802.15.4e TSCH networks,” in Proceedings of the IEEE International Conference on Communications (ICC '15), pp. 6494–6499, IEEE, London, UK, June 2015. View at Publisher · View at Google Scholar
  50. E.-K. Lee, M. Gerla, and S. Y. Oh, “Physical layer security in wireless smart grid,” IEEE Communications Magazine, vol. 50, no. 8, pp. 46–52, 2012. View at Publisher · View at Google Scholar · View at Scopus
  51. Y. Chen, G. Li, S. Li, and Y. Cheng, “A new anti-jam receiver for MFSK/FFH system with multitone jamming,” in Proceedings of the 11th IEEE Singapore International Conference on Communication Systems (ICCS '08), pp. 451–455, Guangzhou, China, November 2008. View at Publisher · View at Google Scholar
  52. Q. Yang and S. C. Liew, “Asynchronous convolutional-coded physical-layer network coding,” IEEE Transactions on Wireless Communications, vol. 14, no. 3, pp. 1380–1395, 2015. View at Publisher · View at Google Scholar
  53. F. Rosas, G. Brante, R. D. Souza, and C. Oberli, “Optimizing the code rate for achieving energy-efficient wireless communications,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '14), pp. 775–780, Istanbul, Turkey, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  54. M. F. Brejza, L. Li, R. G. Maunder, B. M. Al-Hashimi, C. Berrou, and L. Hanzo, “20 years of turbo coding and energy-aware design guidelines for energy-constrained wireless applications,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 8–28, 2016. View at Publisher · View at Google Scholar
  55. A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, “Applications of LDPC codes to the wiretap channel,” IEEE Transactions on Information Theory, vol. 53, no. 8, pp. 2933–2945, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  56. D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, “LDPC codes for physical layer security,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09), pp. 1–6, IEEE, Honolulu, Hawaii, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  57. D. N. K. Jayakody and M. Flanagan, “A soft decode-compress-forward relaying scheme for cooperative wireless networks,” IEEE Transactions on Vehicular Technology, 2015. View at Publisher · View at Google Scholar
  58. B.-J. Kwak, N.-O. Song, B. Park, D. Klinc, and S. W. McLaughlin, “Physical layer security with yarg code,” in Proceedings of the 1st International Conference on Emerging Network Intelligence, pp. 43–48, Sliema, Malta, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  59. F. Gray, “Pulse code communication,” U. S. Patent, 2,632,058, 1953.
  60. M. Baldi, M. Bianchi, and F. Chiaraluce, “Non-systematic codes for physical layer security,” in Proceedings of the IEEE Information Theory Workshop (ITW '10), pp. 1–5, Dublin, Ireland, August-September 2010. View at Publisher · View at Google Scholar
  61. M. H. Taieb and J.-Y. Chouinard, “Enhancing secrecy of the Gaussian wiretap channel using rate compatible LDPC codes with error amplification,” in Proceedings of the14th Canadian Workshop on Information Theory (CWIT '15), pp. 41–45, St. John's, Canada, July 2015. View at Publisher · View at Google Scholar
  62. Z. Yang, Y. Fan, and A. Wang, “Artificial noise and LDPC code aided physical layer security enhancement,” in Proceedings of the International Conference on Information and Communications Technologies (ICT '14), pp. 1–6, Nanjing, China, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  63. M. Baldi, G. Ricciutelli, N. Maturo, and F. Chiaraluce, “Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel,” in Proceedings of the IEEE International Conference on Communications Workshops (ICC '15), pp. 435–440, IEEE, London, UK, June 2015. View at Publisher · View at Google Scholar
  64. Y. Zhang, A. Liu, C. Gong, G. Yang, and S. Yang, “Polar-LDPC concatenated coding for the AWGN wiretap channel,” IEEE Communications Letters, vol. 18, no. 10, pp. 1683–1686, 2014. View at Publisher · View at Google Scholar · View at Scopus