• English
    • Türkçe
  • Türkçe 
    • English
    • Türkçe
  • Giriş
Öğe Göster 
  •   E-arşiv Ana Sayfası
  • Akademik Arşiv / Institutional Repository
  • Mühendislik Fakültesi / Faculty of Engineering
  • Elektrik - Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
  • Öğe Göster
  •   E-arşiv Ana Sayfası
  • Akademik Arşiv / Institutional Repository
  • Mühendislik Fakültesi / Faculty of Engineering
  • Elektrik - Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
  • Öğe Göster
JavaScript is disabled for your browser. Some features of this site may not work without it.

Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey

Thumbnail
Tarih
2019
Yazar
Hamamreh, Jehad M.
Furqan, Haji M.
Arslan, HÜseyin
Üst veri
Tüm öğe kaydını göster
Özet
Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and ex pandable framework for classifying the existing PLS tech niques against wireless passive eavesdropping. In this flexi ble framework, the security techniques that we comprehen sively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio (SINR)-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is as sociated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerg ing communication systems such as visible light communication (VLC), body area network (BAN), power line communication (PLC), Internet of things (IoT), smart grid, mm-Wave, cognitive radio (CR), vehicular ad-hoc network (VANET), unmanned aerial vehicle (UAV), ultra-wideband (UWB), device-to-device (D2D), radio-frequency identification (RFID), index modulation (IM) and 5G non-orthogonal multiple access (NOMA) based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.
Bağlantı
http://hdl.handle.net/20.500.12566/888
Koleksiyonlar
  • Elektrik - Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
  • Scopus İndeksli Yayınlar Koleksiyonu
  • WOS İndeksli Yayınlar Koleksiyonu

DSpace software copyright © 2002-2016  DuraSpace
İletişim | Geri Bildirim
Theme by 
Atmire NV
 

 




sherpa/romeo


Göz at

Tüm E-arşivBölümler & KoleksiyonlarTarihe GöreYazara GöreBaşlığa GöreKonuya GöreTüre GöreABU Yazarına GöreWOSScopusPubMedTRDizinErişimBu KoleksiyonTarihe GöreYazara GöreBaşlığa GöreKonuya GöreTüre GöreABU Yazarına GöreWOSScopusPubMedTRDizinErişim

Hesabım

GirişKayıt

DSpace software copyright © 2002-2016  DuraSpace
İletişim | Geri Bildirim
Theme by 
Atmire NV
 

 


|| Kütüphane || Antalya Bilim Üniversitesi || OAI-PMH ||

Antalya Bilim Üniversitesi Kütüphane ve Dokümantasyon Müdürlüğü, Antalya, Turkey
İçerikte herhangi bir hata görürseniz, lütfen bildiriniz: acikerisim@antalya.edu.tr

E-arşiv@AntalyaBilim:


DSpace 6.4-SNAPSHOT

Gemini Bilgi Teknolojileri A.Ş tarafından destek verilmektedir.