Review Article
Information Security of PHY Layer in Wireless Networks
Table 1
Comparison of PHY layer’s security technique in wireless networks.
| Secure technique | Type | Technical characteristics | Ability to defend against eavesdropping attacks | Ability to defend against jamming attacks | Ability to defend against interference attacks | Complexity |
| Directional antenna | Spatial domain | Increased receive gain in particular direction of space | Low | Medium | Low | Low | Beamforming | Superimposed multiantenna signal | Medium | — | Low | High | Random antennas | Increased channel randomness | Higher | — | — | High | Artificial noise | Increased channel diversity | High | — | — | High |
| Random parameters | — | Increased signal randomness | Higher | — | — | High |
| FHSS | Frequency domain | Fast hopping of carrier frequency | Higher | High | — | Medium | DSSS | Increased bandwidth | — | Higher | Medium | Medium |
| Channel coding | Time domain | Powerful error correction capability | — | — | High | Low |
|
|