Wireless Communications and Mobile Computing

Safeguarding 5G Networks through Physical Layer Security Technologies


Status
Published

Lead Editor

1Xi’an Jiaotong University, Xi’an, China

2Huawei France Research Center, Boulogne-Billancourt, France

3Okayama University, Okayama, Japan

4University of Michigan-Dearborn, Dearborn, USA


Safeguarding 5G Networks through Physical Layer Security Technologies

Description

5G wireless networks are expected to support massive user connections and exponentially increasing wireless services, which makes information security unprecedentedly important. As an emerging network security solution, physical layer security (PLS) takes advantage of the intrinsic characteristics of wireless channels, such as noise, interference, and fading, to degrade the received signal qualities at the malicious users, and achieves keyless secure transmission via signal design and signal processing approaches. Compared with the traditional cryptographic methods at upper layers of the protocol stack, PLS has the following technical advantages. First, PLS does not depend on encryption/decryption operations, thus avoiding the difficulty of distributing and managing secret keys in large-scale heterogeneous 5G networks. Second, by using PLS approaches, adaptive signal design and resource allocation can be implemented based on the varying channel conditions, thereby providing flexible security levels and realizing user-centric security guarantees. Third, PLS often requires relatively simple signal processing operations, which translates into minor additional overheads.

In the past few years, the research on PLS has generated a large body of literature, with the topics ranging from information-theoretical studies to practical scheme design. However, it is still challenging to develop innovative PLS solutions that well match the unique features of 5G networks. First, most of the existing PLS schemes only exploit the characteristics of wireless channels (i.e., link-level properties including noise, fading, and interference) but underappreciate the significance of characteristics of wireless networks (i.e., network-level properties such as feedback, cooperation, competition, and cognition among users) in security enhancement. Second, the PLS techniques developed so far mainly focus on the optimization of the secrecy rate or secrecy outage performance. Yet, 5G is expected to support various application scenarios and diverse wireless services. Different types of services have totally different quality-of-service (QoS) requirements, which implies that the PLS protocols should jointly consider various aspects of user demands, including reliability, delay, throughput, and secrecy as well. Third, the existing PLS solutions often unilaterally pursue the system performance optimization without taking into account the limitations in the available resources of practical devices. In 5G-enabled IoT communications, low-cost machine-type devices have very simple functionalities and very limited power, storage, and processing capabilities. Therefore, most of the existing PLS solutions cannot be directly applied in IoT applications.

The aim of this special issue is to provide a venue to publish innovative PLS solutions that address the aforementioned challenges faced by 5G security. Original research articles as well as review articles from both academia and industry are welcome.

Potential topics include but are not limited to the following:

  • Information-theoretic fundamentals for PLS
  • Advanced signal design and coding techniques for enhanced security
  • PHY authentication techniques in 5G
  • CSI-based key generation and PHY encryption algorithm design
  • Secure transmission techniques in massive MIMO and millimeter wave communications
  • Security threats and countermeasures in full-duplex communications
  • Privacy and security in D2D/M2M communications
  • Transmission secrecy in ultradense heterogeneous networks
  • Security provisioning for NOMA
  • PLS techniques in 5G-enabled IoT
  • PLS for 5G networks with energy harvesting and wireless power transfer
  • Cross-layer security approaches
  • Analysis of the tradeoffs among secrecy, capacity, delay, energy efficiency, and QoS
  • Novel PLS performance metrics
  • Random matrix approaches and other mathematical tools for PLS
  • Testbed development for the evaluation of PLS solutions

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 7503735
  • - Editorial

Safeguarding 5G Networks through Physical Layer Security Technologies

Li Sun | Kamel Tourki | ... | Lu Wei
  • Special Issue
  • - Volume 2018
  • - Article ID 1029175
  • - Research Article

Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework

Ahmed Salem | Xuening Liao | ... | Xiaohong Jiang
  • Special Issue
  • - Volume 2018
  • - Article ID 3178303
  • - Research Article

Adaptive OFDM-IM for Enhancing Physical Layer Security and Spectral Efficiency of Future Wireless Networks

Haji M. Furqan | Jehad M. Hamamreh | Huseyin Arslan
  • Special Issue
  • - Volume 2018
  • - Article ID 8407297
  • - Research Article

Precoding-Aided Spatial Modulation for the Wiretap Channel with Relay Selection and Cooperative Jamming

Zied Bouida | Athanasios Stavridis | ... | Mohamed Ibnkahla
  • Special Issue
  • - Volume 2018
  • - Article ID 4602146
  • - Research Article

On the Performance of the DNPS-Based Relay Networks under Masquerading Attack

Wenson Chang
  • Special Issue
  • - Volume 2018
  • - Article ID 2390834
  • - Research Article

Impact of Antenna Selection on Physical-Layer Security of NOMA Networks

Dan Deng | Chao Li | ... | Fasheng Zhou
  • Special Issue
  • - Volume 2018
  • - Article ID 9637610
  • - Research Article

Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks

Zhongwu Xiang | Weiwei Yang | ... | Meng Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 6869189
  • - Research Article

On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks

Liwei Tao | Weiwei Yang | ... | Dechuan Chen
  • Special Issue
  • - Volume 2018
  • - Article ID 2104162
  • - Research Article

Probabilistic Caching Placement in the Presence of Multiple Eavesdroppers

Fang Shi | Lisheng Fan | ... | Yanchen Liu
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.