Browse > Article
http://dx.doi.org/10.6109/jicce.2017.15.1.14

Survey on Physical Layer Security in Downlink Networks  

Abbas, Mohammed Adil (Department of Information and Communications Engineering, Pukyong National University)
Hong, Jun-Pyo (Department of Information and Communications Engineering, Pukyong National University)
Abstract
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.
Keywords
Artificial noise; Beamforming; Downlink network; Physical layer security; Secrecy; Wiretap channel;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.   DOI
2 A. D. Wyner, "The wire-tap channel," Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.   DOI
3 A. Chorti, S. M. Perlaza, Z. Han, and H. V. Poor, "On the resilience of wireless multiuser networks to passive and active eavesdroppers," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1850-1863, 2013.   DOI
4 R. Negi and S. Goel, "Secret communication using artificial noise," in Proceedings of IEEE Vehicular Technology Conference (VTC), Dallas, TX, 2005.
5 R. Negi and S. Goel, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.   DOI
6 X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, 2010.   DOI
7 X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2170-2181, 2012.   DOI
8 S. Gerbracht, Ch. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 704-716, 2012.   DOI
9 G. Zheng, P. D. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems," IEEE Transactions on Wireless Communications, vol. 11, no. 2, pp. 852-863, 2012.   DOI
10 N. Li, X. Tao, and J. Xu, "Artificial noise assisted communication in the multiuser downlink: optimal power allocation," IEEE Communications Letters, vol. 19, no. 2, pp. 295-298, 2015.   DOI
11 N. Li, X. Tao, H. Wu, J. Xu, and Q. Cui, "Large-system analysis of artificial-noise-assisted communication in the multiuser downlink: ergodic secrecy sum rate and optimal power allocation," IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 7036-7050, 2016.   DOI
12 I. Krikidis and B. Ottersten, "Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling," IEEE Signal Processing Letters, vol. 20, no. 2, pp. 141-144, 2013.   DOI
13 W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1202-1216, 2011.   DOI
14 H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Processing Letters, vol. 19, no. 6, pp. 372-375, 2012.   DOI
15 B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: a survey," 2013 [Internet], Available: https://arxiv.org/pdf/1307.4146.pdf.
16 I. Telatar, "Capacity of multi- antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585-595, 1999.   DOI
17 N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Communications Letters, vol. 17, no. 5, pp. 864-867, 2013.   DOI