• DocumentCode
    1495733
  • Title

    Physical layer security in wireless networks: a tutorial

  • Author

    Shiu, Yi-sheng ; Chang, Shih Yu ; Wu, Hsiao-Chun ; Huang, Scott C -H ; Chen, Hsiao-Hwa

  • Author_Institution
    Nat. Tsing Hua Univ., Hsinchu, Taiwan
  • Volume
    18
  • Issue
    2
  • fYear
    2011
  • fDate
    4/1/2011 12:00:00 AM
  • Firstpage
    66
  • Lastpage
    74
  • Abstract
    Wireless networking plays an extremely important role in civil and military applications. However, security of information transfer via wireless networks remains a challenging issue. It is critical to ensure that confidential data are accessible only to the intended users rather than intruders. Jamming and eavesdropping are two primary attacks at the physical layer of a wireless network. This article offers a tutorial on several prevalent methods to enhance security at the physical layer in wireless networks. We classify these methods based on their characteristic features into five categories, each of which is discussed in terms of two metrics. First, we compare their secret channel capacities, and then we show their computational complexities in exhaustive key search. Finally, we illustrate their security requirements via some examples with respect to these two metrics.
  • Keywords
    computational complexity; military communication; radio networks; telecommunication security; civil applications; computational complexity; military applications; physical layer security; wireless networks; Information processing; Military communication; Security of data;
  • fLanguage
    English
  • Journal_Title
    Wireless Communications, IEEE
  • Publisher
    ieee
  • ISSN
    1536-1284
  • Type

    jour

  • DOI
    10.1109/MWC.2011.5751298
  • Filename
    5751298