Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey
Abstract
Physical layer security (PLS) has emerged as a new
concept and powerful alternative that can complement and may
even replace encryption-based approaches, which entail many
hurdles and practical problems for future wireless systems.
The basic idea of PLS is to exploit the characteristics of the
wireless channel and its impairments including noise, fading,
interference, dispersion, diversity, etc. in order to ensure the
ability of the intended user to successfully perform data decoding
while preventing eavesdroppers from doing so. Thus, the main
design goal of PLS is to increase the performance difference
between the link of the legitimate receiver and that of the
eavesdropper by using well-designed transmission schemes.
In this survey, we propose a conceptual, generic, and ex pandable framework for classifying the existing PLS tech niques against wireless passive eavesdropping. In this flexi ble framework, the security techniques that we comprehen sively review in this treatise are divided into two primary
approaches: signal-to-interference-plus-noise ratio (SINR)-based
approach and complexity-based approach. The first approach is
classified into three major categories: first, secrecy channel codes based schemes; second, security techniques based on channel
adaptation; third, schemes based on injecting interfering artificial
(noise/jamming) signals along with the transmitted information
signals. The second approach (complexity-based), which is as sociated with the mechanisms of extracting secret sequences
from the shared channel, is classified into two main categories
based on which layer the secret sequence obtained by channel
quantization is applied on. The techniques belonging to each one
of these categories are divided and classified into three main
signal domains: time, frequency and space. For each one of
these domains, several examples are given and illustrated along
with the review of the state-of-the-art security advances in each
domain. Moreover, the advantages and disadvantages of each
approach alongside the lessons learned from existing research
works are stated and discussed.
The recent applications of PLS techniques to different emerg ing communication systems such as visible light communication
(VLC), body area network (BAN), power line communication
(PLC), Internet of things (IoT), smart grid, mm-Wave, cognitive
radio (CR), vehicular ad-hoc network (VANET), unmanned aerial
vehicle (UAV), ultra-wideband (UWB), device-to-device (D2D),
radio-frequency identification (RFID), index modulation (IM)
and 5G non-orthogonal multiple access (NOMA) based-systems,
are also reviewed and discussed. The paper is concluded with
recommendations and future research directions for designing
robust, efficient and strong security methods for current and
future wireless systems.