Show simple item record

dc.contributor.authorHamamreh, Jehad M.
dc.contributor.authorFurqan, Haji M.
dc.contributor.authorArslan, HÜseyin
dc.date.accessioned2021-09-29T06:12:57Z
dc.date.available2021-09-29T06:12:57Z
dc.date.issued2019
dc.identifier.citationJ. M. Hamamreh, H. M. Furqan and H. Arslan (2019). Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Communications Surveys and Tutorials, 21(2), 1773-1828.en_US
dc.identifier.issn1553-877X
dc.identifier.urihttp://hdl.handle.net/20.500.12566/888
dc.description.abstractPhysical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and ex pandable framework for classifying the existing PLS tech niques against wireless passive eavesdropping. In this flexi ble framework, the security techniques that we comprehen sively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio (SINR)-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is as sociated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerg ing communication systems such as visible light communication (VLC), body area network (BAN), power line communication (PLC), Internet of things (IoT), smart grid, mm-Wave, cognitive radio (CR), vehicular ad-hoc network (VANET), unmanned aerial vehicle (UAV), ultra-wideband (UWB), device-to-device (D2D), radio-frequency identification (RFID), index modulation (IM) and 5G non-orthogonal multiple access (NOMA) based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.en_US
dc.description.sponsorshipNo sponsoren_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectPhysical layer securityen_US
dc.subjectCross-layer securityen_US
dc.subjectEavesdroppingen_US
dc.subjectAdaptationen_US
dc.subjectInterfering signalsen_US
dc.subjectArtificial noiseen_US
dc.subjectJammingen_US
dc.subjectSecret keysen_US
dc.subjectSignal domainsen_US
dc.subjectTimeen_US
dc.subjectFrequency and spaceen_US
dc.subjectVLCen_US
dc.subjectBANen_US
dc.subjectPLCen_US
dc.subjectIoTen_US
dc.subjectSmart griden_US
dc.subjectmm-waveen_US
dc.subjectCognitive radioen_US
dc.subjectVehicularen_US
dc.subjectUAVen_US
dc.subjectUWBen_US
dc.subjectD2Den_US
dc.subjectRFIDen_US
dc.subjectIndex modulationen_US
dc.subjectSpatial modulationen_US
dc.subject5G systemsen_US
dc.subjectOFDMen_US
dc.subjectMIMOen_US
dc.subjectRelayen_US
dc.subjectNOMAen_US
dc.subjectFull-duplexen_US
dc.subjectTDDen_US
dc.subjectFiziksel katman güvenliğitr_TR
dc.subjectKatmanlar arası güvenliktr_TR
dc.subjectDinlemetr_TR
dc.subjectAdaptasyontr_TR
dc.subjectGirişim sinyalleritr_TR
dc.subjectYapay gürültütr_TR
dc.subjectSıkışmatr_TR
dc.subjectGizli anahtarlartr_TR
dc.subjectSinyal alanlarıtr_TR
dc.subjectZamantr_TR
dc.subjectFrekans ve uzaytr_TR
dc.subjectAkıllı ızgaratr_TR
dc.subjectmm-dalgatr_TR
dc.subjectBilişsel radyotr_TR
dc.subjectAraçtr_TR
dc.subjectİndeks modülasyonutr_TR
dc.subjectMekansal modülasyontr_TR
dc.subject5G sistemleritr_TR
dc.subjectRöletr_TR
dc.subjectTam dublekstr_TR
dc.titleClassifications and applications of physical layer security techniques for confidentiality: a comprehensive surveyen_US
dc.typeinfo:eu-repo/semantics/articleen_US
dc.relation.publicationcategoryInternational publicationen_US
dc.identifier.wosWOS:000470838000028
dc.identifier.scopus2-s2.0-85055713656
dc.identifier.volume21
dc.identifier.issue2
dc.identifier.startpage1773
dc.identifier.endpage1828
dc.contributor.orcid0000-0003-4435-5500 [Hamamreh, Jehad M.]
dc.contributor.abuauthorHamamreh, Jehad M.
dc.contributor.yokid291980 [Hamamreh, Jehad M.]
dc.contributor.ScopusAuthorID57191420512 [Hamamreh, Jehad M.]
dc.identifier.doi10.1109/COMST.2018.2878035


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record