Sunteți pe pagina 1din 14

COMMUNICATIONS THEORIES

Physical Layer Security with Its Applications in 5G


Networks: A Review
Li Sun1,2,*, Qinghe Du1,3
1
Department of Information and Communications Engineering, Xi’an Jiaotong University, Xi’an 710049, China
2
The State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
3
National Simulation Education Center for Communications and Information Systems, Xi’an 710049, China
* The corresponding author, email: lisun@mail.xjtu.edu.cn

Abstract: 5G network is expected to support PLS solutions that are expected to be applied
massive user connections and exponentially in 5G networks. Finally, we conclude this arti-
increasing wireless services, which makes cle and figure out some further research direc-
network security unprecedentedly important. tions.
Unlike traditional security-guaranteeing tech- Keywords: 5G; physical layer security; an-
niques which rely heavily on cryptographic ti-eavesdropping signal design; statistical se-
approaches at upper layers of the protocol curity guarantee; fountain coding
stack, physical-layer security (PLS) solutions
fully take advantages of the characteristics of I. INTRODUCTION
wireless channels to degrade the received sig-
nal qualities at the malicious users, and realize With the continuous growth of the demands
keyless secure transmission via signal design for ubiquitous information exchange, the in-
and signal processing techniques. PLS avoids creasing popularity of smart devices, the rapid
the difficulties in the distribution and man- development of mobile Internet, and the deep
agement of secret keys, and provides flexible integration of information technology into in-
security levels through adaptive transmission dustrial applications, 5G network is expected
protocol design. Moreover, PLS techniques to support massive user connections and expo-
match the features of 5G networks well. nentially increasing wireless services, which
Therefore, the application of PLS to 5G net- makes the information security issue unprece-
works is a promising solution to address the dentedly important.
security threats. This article presents a com- Current network transmission security
prehensive review of the state-of-the-art PLS technologies rely heavily on the cryptographic
techniques, and discusses their applications in approaches at the upper layer of the protocol
5G networks. We first summarize the principle stack, which is not suitable for future 5G net-
and advantages of PLS techniques, and point works. The main reasons are threefold. First,
out the reasons why PLS is suitable for 5G 5G is a large-scale heterogeneous network
Editor: Jianwei Zhao
networks. Then, we review the existing PLS (HetNet) with multiple levels and weak- Received: Aug. 6, 2017
methods in literature, and highlight several ly-structured architectures, which makes it Revised: Sep. 4, 2017

China Communications • December 2017 1


extremely difficult to distribute and manage and signal processing approaches. Compared
This article presents a the secret keys. Second, 5G network is ex- with the cryptographic methods, PLS has the
comprehensive review pected to support differentiated scenarios and following technical advantages. First, PLS
of the state-of-the- diverse wireless services. Different types of does not depend on encryption/decryption op-
ar t PLS techniques,
services have totally different security require- erations, thus avoiding the difficulty of distri-
and discusses their
applications in 5G net-
ments. For example, online payment calls for bution and management of secret keys in Het-
works. a much higher security level than the ordinary Nets. Second, by using PLS approaches, adap-
web browsing service does. However, encryp- tive signal design and resource allocation can
tion-based methods can only provide “binary” be implemented based on the varying channel
security levels. That is, information is fully conditions, thereby providing flexible security
protected if the secret key can be securely ex- levels. Third, PLS often requires relatively
changed and fully intercepted otherwise. Thus, simple signal processing operations, which
service-oriented and user-centric security translates into minor additional overheads. The
guarantee cannot be achieved. Third, 5G needs comparisons between PLS and cryptographic
to support Internet-of-Things (IoT) applica- techniques are illustrated in figure 1.
tions featured by machine-type communica- In addition to the aforementioned technical
tions (MTC), where the massive MTC devices advantages, PLS techniques match the fea-
are short of power, storage, and computing ca- tures of 5G networks well. The employment
pabilities, and complicated encryption/decryp- of massive MIMO in 5G greatly enriches the
tion algorithms or protocols cannot be applied. spatial resolution of wireless channels, and
Unlike the conventional upper-layer secu- offers additional spatial resources to combat
rity methods, physical layer security (PLS) eavesdropping. The adoption of high-frequen-
takes advantages of the intrinsic characteristics cy communications in 5G brings in abundant
of wireless channels, such as noise, interfer- spectra and provides favorable conditions for
ence, and fading, to degrade the received sig- wideband secure transmissions. Moreover,
nal qualities at the malicious users, and realize the application of multi-cell cooperation tech-
keyless secure transmission via signal design niques makes it possible to implement the

Features of 5G Networks Challenges for Network Cryptographic Physical Layer Security


Security Approaches Approaches
Heterogeneous Networks

Large Scale, Multi- Difficult to Distribute and Rely heavily on The achieved security
Levels, Weakly- Manage Secret Keys encryption algorithms to does not rely on encryption
realize security and decryption
Structured

Hard to overcome Evolution


Diversified Services

Web Browsing, Personalized Security The security levels Can realize flexible
File Sharing, Service and Differentiated provided are only configu-rations of
Online Payment, Security Levels binary security levels
WeChat, ...
Not easy to satisfy Evolution
Massive Low-Power Devices

Limited Power, Hard to Employ Need to complete


Complicated Security encryption/decryption Only need to perform
Storage, and Protocol and Encryption operations with high simple signal processing,
Processing Algorithms complexity with little overhead
Capabilities
Cannot be solved

Fig. 1 The comparison between PLS and cryptographic techniques

2 China Communications • December 2017


cooperative secrecy ideas. Therefore, PLS is word X should be independent of the messages
a promising security provisioning solution for M. In practice, this can be satisfied by using
5G networks. a one-time pad approach, for which each se-
This article presents a comprehensive cret-key bit is XORed with each message bit
review of PLS and its applications in 5G net- to produce the transmitted codeword X.
works. Sect. II briefly describes the principle Although the one-time pad scheme can
of PLS by referring the main results in infor- achieve perfect secrecy, the requirement is
mation-theoretical security. Sect. III summa- disappointing that one secret-key bit is needed
rizes the recent advances in PLS research. In for one message bit. This result stems from
Sect. IV, we point out the major drawbacks the absence of noise at the physical layer in
in current PLS studies, and identify the chal- the model. Unlike Shannon’s work, Wyner
lenges for PLS protocol design toward 5G proposed a degraded wiretap channel model
networks. Sect. V highlights some promising (DWTC) in [2]. The DWTC models a system
PLS solutions that might be suitable for 5G in which a sender (Alice) tries to communicate
networks. Finally, Sect. VI concludes this ar- with a legitimate receiver (Bob) over a noisy
ticle and figures out several further research channel, while an eavesdropper (Eve) observes
directions. a degraded version of the signal obtained by
the legitimate receiver. Alice encodes its confi-
II. PRINCIPLES OF PHYSICAL LAYER dential message M into an n-length codeword
SECURITY Xn with rate R, while Bob and Eve try to ex-
tract the source information by decoding their
The key idea of PLS is to exploit the intrinsic received codewords Yn and Zn, respectively.
characteristics of wireless channels, such as Rate R, defined as the secrecy rate, is said to
noise, fading, and interference, to secure the be achievable if
communications. The research in this area can
n →∞
(
lim Pr Mˆ ≠ M = ) 0 (2)
be traced back to Shannon’s pioneering work
and
on secret communications [1], where the con-
lim I ( M ; Z n ) = 0 (3)
cept of perfect secrecy was established. In [1], n →∞

Shannon considered a system model where the hold. In (2) and (3), M̂ denotes the estimate
source-destination pair communicates over a of M at Bob, and I ( M ; Z n ) represents the
noiseless channel, and an eavesdropper over- mutual information between M and Zn. These
hears the signals sent over the channel. This two conditions, termed as reliability condition
system is said to be in perfect secrecy if the and security condition respectively, guarantee
following condition is satisfied: that the decoding error probability at the legit-
H ( M | X ) = H ( M ) (1) imate receiver can be arbitrarily small while
where H(M) and H(M|X) are the entropy of the no source information can be obtained by the
message M and the conditional entropy of M eavesdropper, as long as the codeword length
conditioned on eavesdropper’s observation X, tends to infinity. The maximum of the achiev-
respectively. Intuitively, (1) implies that eaves- able secrecy rate is defined as secrecy capaci-
dropper’s uncertainty about the message does ty, which characterizes the rate limit for secure
not decrease after intercepting the transmitted transmission in noisy channels. For DWTC,
codeword, or equivalently, the information the secrecy capacity can be expressed as
leakage is zero. Perfect secrecy guarantees = CsDWTC max ( I ( X ; Y ) − I ( X ; Z ) )
pX
that eavesdropper’s optimal attack is to guess  (4)
≥ max I ( X ; Y ) − max I ( X ; Z )
the message M at random and there is no algo- pX pX

rithm that can extract any information about M where pX is the probabilistic distribution of the
from X. To achieve perfect secrecy, the code- encoder input at Alice. (4) indicates that, the

China Communications • December 2017 3


secrecy capacity is at least as large as the dif- matrix, respectively. In this manner, the artifi-
ference between the legitimate channel capac- cial noise only deteriorates the eavesdropper
ity and the eavesdropper’s channel capacity. but has little detrimental impact on the legiti-
The inequality in (4) can be strict for Gaussian mate receiver.
wiretap channel, yielding the secrecy capacity Ref. [3] is the seminal work in AN injec-
formula for Gaussian wiretap channel to be tion scheme design. Afterwards, this method
CsGWTC = log (1 + SNR B ) − log (1 + SNR E ) 
+
has been applied to various scenarios, taking
into account the practical limitations of re-
 (5)
al-world systems. [4] discussed the optimal
where [ x ] = max ( x, 0 ) , and SNRB and SNRE
+
power allocation between the artificial noise
are the received SNRs at Bob and Eve, respec- and the useful signal, where both colluding
tively. and non-colluding cases were considered. [5]
The secrecy capacity expression for Gauss- compared performances of the AN injection
ian wiretap channel implies that, secure com- method and the artificial fast fading method
munication is possible if and only if the legiti- under different antenna configurations at the
mate receiver has a better channel quality than eavesdropper, and proposed an improved hy-
the eavesdropper does. Physical layer security brid scheme. [6] combined the AN injection
techniques harness the intrinsic randomness approach with opportunistic relay selection,
at the physical layer to create the “physical and analyzed the security-reliability tradeoff
advantage”, i.e., the required better quality, of of the system. Common to the works [4]-[6]
the legitimate link compared to the eavesdrop- is that they all assumed perfect channel state
ping link. The intrinsic randomness, mainly information (CSI) is available at the transmit-
includes noise, multipath fading, and interfer- ter, which is hard to satisfy in practice. To ad-
ence, is a resource that abounds in the wireless dress this issue, [7] investigated the AN-aided
medium. In the next section, we will review beamforming design with limited feedback,
the major physical-layer security approaches where the coding rate and the power ratio of
proposed in literature to show how to exploit AN can be adjusted according to the channel
these types of “randomness” for enhanced se- feedback. [8] studied the AN-aided secure
curity. transmission in multiuser systems, and point-
ed out that from the secrecy perspective, it is
more advantageous to increase the AN power
III. REVIEW OF MAJOR PHYSICAL-
than to increase the information-bearing signal
LAYER SECURITY APPROACHES
power when the CSI error is large.

3.1 Artificial noise injection 3.2 Anti-eavesdropping signal


design
Based on secrecy capacity theory, a positive
secrecy rate can be achieved if the legitimate Unlike the AN injection approach, the an-
user has a certain form of physical advantage ti-eavesdropping signal design technique
in terms of the channel quality compared to attempts to align multiple users’ signals at the
the malicious users. Artificial noise (AN) eavesdropper such that the decoding difficul-
injection is an effective means to realize this ty is significantly increased and information
purpose. The principle of this approach is to security can thus be guaranteed [9]. In [10],
simultaneously send the information-bearing the authors borrowed the idea of interference
signal and the AN using a multi-antenna trans- alignment (IA) to develop a signal alignment
mitter. The AN and the information-bearing method for Gaussian MAC wiretap channel.
signal are injected into the null-space and the By using the proposed approach, the trans-
column space of the legitimate user’s channel mitted signals from multiple users align in a
low-dimensional subspace of the signal space.

4 China Communications • December 2017


Since all the signals align in the same direc- MIMOME channel, and a numerical method
tion, it is difficult for the eavesdropper to dis- was developed as well to solve for the optimal
tinguish each user’s signal. [11] proposed an precoder. [16] proposed a channel-inversion
ergodic secrecy alignment strategy (ESA) for precoding method that can maximize the sum
fading MAC wiretap channel. The key idea of secrecy rate under imperfect CSI. In [17], the
ESA is to repeat data transmission within two joint information beamforming and jamming
slots such that an orthogonal MAC channel beamforming was devised to guarantee both
is created for legitimate users, while a scalar transmit security and receive security for a
MAC channel is observed by the eavesdrop- full-duplex base station.
per. All of the works [14]-[17] only exploit the
While the aforementioned works [10] and spatial beamforming or precoding to combat
[11] focused on anti-eavesdropping signal eavesdropping. By combining secure beam-
design for MAC channels, there are also some forming and AN injection, the system secrecy
papers dedicating to the secrecy-enhancing performance can be further enhanced. [18]
signal design in cooperative relay channels. proposed a transmit beamforming solution that
[12] designed the precoder matrix for two- is robust to the channel estimation errors. The
way relay channel, by using which the two proposed method first allocates power to the
sources’ signals align in the same subspace at useful signal component to satisfy the target
the untrusted relay. In [13], we devised a con- SINR of the desired user, and then uses the
stellation rotation aided secure transmission remaining power to send the artificial noise
scheme for two-way untrusted relay systems. to worsen the detection performance of the
By rotating the signal constellations with an eavesdropper. [19] discussed the impact of
appropriate angle, every complex constellation channel quantization on the secure beamform-
point can be represented by it real component. ing design. The authors pointed out that the
Then, each terminal user transmits the infor- quantization for the beamforming vector and
mation-bearing signal and the artificial noise that for the AN vector should be performed
in two orthogonal dimensions of the signal separately to lower the interference to the
space. As a result, the artificial noise and the legitimate receiver. To be more specific, the
useful signal from different users align to the beamforming vector should be chosen such
same direction at the untrusted relay, which that the beamforming gain can be maximized;
significantly degrades the SINR at the relay while the objective of the AN vector design
and prevents information leakage. Meanwhile, is to minimize the information leakage. [20]
the received signal and AN lie in orthogonal studied the secure transmission capability for
dimensions at the terminal users, and hence multiuser systems with curious users, where
the signal detection at the legitimate users will limited feedback is assumed. The major con-
not be affected. clusions of [20] are twofold. First, in high
SNR regime, if the CSI is quantized to a fixed
3.3 Secure beamforming/precoding
number of bits, the system secrecy rate will
Secure bemforming/precoding belongs to spa- not increase with the transmit power, and may
tial-domain anti-eavesdropping techniques. even decrease when the transmit power ex-
This approach optimizes the spatial distribu- ceeds a certain threshold. Second, in order to
tion properties of the transmit signals in order guarantee that the loss in secrecy rate is below
to enlarge the difference between the legit- a certain given value compared to the perfect
imate user’s channel quality and the eaves- CSI case, the number of CSI quantization
dropper’s channel quality. [14] presented the bits should be an increasing function of the
beamforming vector design that can maximize transmit power and the number of transmit
the secrecy rate of MISOME channel. In [15], antennas. While the aforementioned papers
a linear precoding strategy was proposed for [14]-[20] are merely concerned about the se-

China Communications • December 2017 5


curity aspect of the system, [21] considered help to the source-destination pair, are untrust-
simultaneous transfer of secret message and ed, from which the source information has to
energy using zero-forcing based precoding be kept secret. The PLS protocol design for
techniques, and demonstrated the trade-off untrusted relaying systems is a hot research
between the achievable secrecy rate and the topic recently. Yener et al. indicated that a
transferred energy. positive secrecy rate can be achieved if co-
operative jamming technique is applied [26].
3.4 Cooperation based secure
[27] proposed a cooperation-mode switching
transmission techniques
scheme and analyzed the achievable secrecy
Wireless network is essentially a multi-user outage probability. [28] combined the relay as-
system, for which the network security perfor- signment and link adaptation, resulting in both
mance can be greatly enhanced by enlisting secure and spectrally-efficient transmissions.
the cooperation among nodes. Cooperation [29] developed an opportunistic relay selection
based secure transmission techniques can be protocol for untrusted relaying systems, and
generally divided into three categories, name- analyzed the scaling law of the secrecy rate.
ly cooperative jamming, relay selection, and The main drawback of the scheme in [29] is
cooperative secrecy enhancement. that only the broadcast phase of the two-phase
Cooperative jamming (CJ) utilizes multiple cooperative transmission can be secured. To
relay nodes to generate artificial noises in a address this issue, [30] further developed a
distributed manner to realize information se- cooperative mechanism based on alternate
curity, which is essentially a distributed beam- jamming and relay selection.
forming technique. [22] designed CJ schemes In both CJ and RS, the relay node acts only
for both amplify-and-forward (AF) and de- as a helper, which offers secrecy-embedded
code-and-forward (DF) systems. In the pro- relaying services to legitimate transceivers. In
posed schemes, all relay nodes independently contrast, in the cooperative secrecy enhance-
send the weighted artificial noises to degrade ment (CSE) schemes, several users cooperate
the received signal quality at the eavesdropper, with each other to harvest a mutual benefit.
while the source transmits its message simul- In [31], the authors proved that two users that
taneously. [23] investigated a nulling based CJ do not trust with each other can enlarge the
strategy, and devised the optimal structure of achievable secrecy rate region by negotiating
the artificial noise signal under global CSI. the signal power and AN power. [32] was con-
Relay selection (RS) techniques enhance cerned about a device-to-device (D2D) com-
transmission secrecy via the selection of relay munications scenario, for which the authors
nodes and (or) friendly jammers. [24] pro- proposed to utilize the signal generated by the
posed to select two relay nodes to perform D2D device as interference to degrade the re-
message forwarding and artificial-noise injec- ception performance of the eavesdropper over-
tion, respectively, and adaptively switch the hearing the cellular user’s transmission. As a
cooperation modes to minimize the secrecy reward, D2D users can obtain the opportunity
outage probability. [25] developed a joint to reuse the cellular spectrum, thereby improv-
relay-jammer selection policy to maximize ing its transmission performance. Recently,
the achievable secrecy rate, and presented a [33] devised a cooperative privacy preserv-
low-complexity power allocation strategy. ing scheme for the downlink transmission in
Common to [24] and [25] is that both of them multiuser relay systems. The key idea of this
assume the relay nodes are trustworthy, and scheme is to exploit the cooperation among
the eavesdroppers are external nodes in ad- untrusted users to improve their secrecy rates
dition to the legitimate entities. However, in simultaneously.
some scenarios, the relay nodes, while operat-
ing with the designated protocol and offering

6 China Communications • December 2017


3.5 Power control and resource users. In table 1, we summarize the aforemen-
allocation tioned PLS approaches, and compare them in
terms of the anti-eavesdropping mechanism,
Security-oriented power control and resource
required CSI at transmitter, the incurred addi-
allocation techniques adjust the transmitter
tional overhead, and implementation complex-
parameters based on the instantaneous CSI
ity.
such that the received SNR at the legitimate
user can be improved or kept as a constant,
while that at the eavesdropper varies randomly
IV. DRAWBACKS OF THE EXISTING PLS
over time. In this manner, the difference in
TECHNIQUES AND CHALLENGES FOR 5G
channel qualities between the legitimate link
TRANSMISSION SECURITY
and eavesdropping link can be enlarged. [34]
From the above discussions we can find that,
proved that power control based on water fill-
the research on PLS has generated a large
ing can achieve the secrecy capacity in wire-
body of literature, with the topics ranging from
tap channels. [35] applied the on-off policy to
information-theoretical studies to practical
realize power control, which maximizes the
scheme design. However, it is still challenging
system throughput subject the secrecy outage
to develop innovative PLS transmission the-
constraint. In [36], the secure transmission
ory and methods that well match the unique
issue for OFDMA downlink was investigated,
features of 5G networks. The majority of the
for which it was revealed that, to guarantee the
existing PLS solutions have the following
user’s data confidentiality, the allocated power
drawbacks that prohibit their applications to
does not only depend the channel gain of the
5G networks.
served user, but also relies on the maximum
First, most of the existing PLS schemes
of the channel gains among all other users. In
realize security via the exploitation of noise,
practical systems, perfect CSI of the legitimate
fading, and interference. In other words, they
channel is not available at the transmitter side
due to feedback delay or channel estimation
Table I Summary of the major physical layer security approaches in literature
error. To address this issue, [37] exploited use-
Anti-Eavesdrop- Required CSI Additional Implementation
ful knowledge contained in outdated CSI to PLS Approach
ping Mechanism at Transmitter Overhead Complexity
decide whether to transmit or not. [38] further CSI feedback,
developed a versatile strategy to increase the Exploitation of
AN injection Instantaneous additional Moderate
noise
secrecy throughput of on-off secure transmis- power
sion in the case that only stale CSI is avail- Anti-eaves-
Exploitation of
able. dropping signal
interference
Instantaneous CSI exchange High
Summary: It is conventionally recognized design

that noise, fading, and interference are detri- Secure beam- Multi-anten-
Exploitation of
forming/pre- Instantaneous na structure, Moderate
mental factors for reliable communications fading and noise
coding CSI feedback
that should be suppressed. However, from
Additional
the security point of view, these factors are Cooperative Exploitation of
Not necessary power, dedi- Moderate
actually the beneficial resources that should jamming noise
cated helper
be exploited, as state above. For example, Additional
Exploitation of
the anti-eavesdropping signal design can be Relay selection Not necessary power, dedi- Moderate
fading
viewed as an interference exploitation method cated helper
for enhanced secrecy, where the inter-user in- Cooperative Exploitation of Instanta-
Data and (or)
terference is utilized to confuse the eavesdrop- secrecy en- interference and neous/Not High
CSI exchange
hancement noise necessary
per. The cooperation based techniques, on the
Power control
other hand, exploit both noise and fading to Exploitation of
and resource Instantaneous CSI feedback Moderate
create the physical advantage of the legitimate allocation
fading

China Communications • December 2017 7


only take advantages of the characteristics In summary, the unique features of 5G
of wireless channels (i.e., link-level proper- networks, 5G services, and 5G devices pose
ties) but under-appreciate the significance significant challenges to PLS protocol design.
of characteristics of wireless networks (i.e., In the next section, we highlight several newly
network-level properties) in security enhance- developed PLS solutions that address the 5G
ment. 5G is a multi-level multi-user system, transmission security issue.
for which the network behavior does not only
depend on the properties of the individual V. PROMISING PHYSICAL-LAYER
links, but also highly relates to the interaction SECURITY SOLUTIONS TOWARD 5G
among users and sub-networks. To be more NETWORKS
specific, feedback, cooperation, competition,
and cognition exist widely in the future 5G ITU has identified three typical application
networks [39]. Yet, it is still unclear how to scenarios for 5G, namely Enhanced Mobile
translate these mechanisms into an anti-eaves- Broadband, Ultra-Reliable and Low-Latency
dropping resource, and the research on the im- Communications, and Massive Machine Type
pact of these network-level features upon PLS Communications. In the following, we would
protocol design has just started [40]. like to introduce three PLS solutions that are
Second, the PLS techniques developed so dedicated to these scenarios, respectively.
far mainly focus on the optimization of the
5.1 Constellation-rotation based
secrecy rate or secrecy outage performance of
signal design for enhanced secrecy
the system. However, 5G is expected to sup-
in D2D communications
port various application scenarios and diverse
wireless services. Different types of services As a promising paradigm to support the prox-
have totally different quality-of-service (QoS) imity-aware services such as media sharing,
requirements, which implies that the PLS pro- online gaming, and social networking, D2D
tocols should jointly consider various aspects communications has been recognized as a can-
of user demands, including reliability, delay, didate solution for enhanced mobile broadband
throughput, and secrecy as well. It is impossi- applications. There are two major transmission
ble to provide a comprehensive QoS guarantee modes for D2D communications: 1) Underlay
for users by simply optimizing the secrecy rate mode where the transmit power of D2D termi-
or secrecy outage performance. nals are constrained to cause minimal interfer-
Third, the existing PLS solutions often uni- ence to cellular links; 2) Overlay mode where
laterally pursue the system performance opti- D2D terminals act as relays to assist the cel-
mization without taking into account the lim- lular communications in exchange for trans-
itations in the available resources of practical mission opportunities. The overlay mode, also
devices. In particular, additional power is con- known as the cooperative D2D transmission
sumed to implement the AN injection method; mode, seems to be more appealing because
multi-antenna configuration is required at the it’s a win-win policy that motivates the opera-
transmitter for secure beamforming/precoding tors to be willing to accept the deployment of
schemes; dedicated nodes have to be deployed D2D. A typical cooperative D2D system mod-
in the networks to send jamming signals for el is shown in figure 2. For this system, each
CJ approach. 5G network will support IoT ap- cooperative period is composed of two phases.
plications featured by MTC communications, During the 1st phase, D2, BS, and CU transmit
for which the devices have very simple func- their signals to D1, respectively. During the
tionalities and very limited power, storage, 2nd phase, D1 transmits the received signals to-
and processing capabilities. Therefore, most of gether with its own information-bearing signal
the existing PLS solutions cannot be directly to all the other terminals.
applied in IoT communications. There are two technical challenges for the

8 China Communications • December 2017


cooperative D2D communications. First, every
terminal has to detect its desired signal while
being interfered with by the signals intended
for other nodes, which incurs an evitable error
floor and deteriorates the detection perfor- D2D user:D2 Cellular user: CU
mance. Second, every node can access the data
D2D user: D1
transmitted from any other node, which yields
information leakage among users and violates 1st phase
users’ secrecy requirements. Cellular base station:BS
station 2nd phase
To killing these two birds with one stone,
we developed a constellation-rotation aided
scheme to realize both interference avoidance
and secrecy protection [41]. Our key idea is to
rotate the signal constellations. As is exhibited Fig. 2 Cooperative D2D system model
in figure 3, the constellations employed at all
terminals are first rotated by an appropriate
angle such that a one-to-one mapping is estab-
lished between the rotated constellation point
and its real or imaginary part. Then, every
transmitter projects the rotated constellation
onto the real or imaginary axis, and transmits
the resulting one-dimensional signal. During
the 1st phase, BS and CU deliver their informa-
tion using the real component, while D2 sends
its information with the imaginary component.
Similarly, during the 2nd phase, D1 uses the Fig. 3 The illustration of constellation rotation
real and imaginary part of the complex signal
as two orthogonal channels to broadcast its re-
5.2 Fine-grained security level
ceived signal and its own information-bearing
characterization and statistical
signal, respectively. With the proposed design,
security guarantee for delay-
the signal detection for intended messages
sensitive services
at all terminals are free of interference, thus
perfectly eliminating the error floor in sym- In ultra-reliable and low-latency communica-
bol error rate. Meanwhile, the non-intended tion scenarios such as vehicular networking
messages are aligned in the same direction at and industrial automation systems, services are
each node, thereby increasing the difficulty of typically delay sensitive, which makes the tra-
decoding these messages and preventing infor- ditional PLS methodology (targeted at secrecy
mation leakage. Moreover, by optimizing the capacity maximization or secrecy outage min-
value of the constellation rotation angle, an er- imization) inefficient. First, the secrecy outage
ror floor can be created for the detection of the probability (SOP) dictates the probability with
non-intended messages, and the transmission which the achievable secrecy rate is lower
secrecy is further improved. Readers that are than the target transmission rate. To satisfy a
interested in this method can find more details predefined SOP requirement, the transmission
in [41]. rate of the legitimate user has to be kept at
a very low level, resulting in an intolerable
delay. Second, secrecy capacity (SC) gives
the maximum rate below which the legitimate
receiver can successfully decode, while the

China Communications • December 2017 9


eavesdropper cannot obtain any information which is a time-varying process. The departure
from the received signal. From the practical process (i.e., the dropping process) charac-
perspective, however, it is not always neces- terizes the expiration of the data. In practical
sary to guarantee this “perfect” security. If systems, the timeout threshold is typically set
Eve does not accumulate the sufficient amount as a constant for all effective data of a ser-
of data within the delay bound, it cannot ex- vice. Therefore, we can assume the departure
tract useful information, and essential security process of effective data to be constant-rate
threat is not really caused. This motivates us process. Eve’s eavesdropped data which is still
to establish a statistical model towards fine- effective corresponds to the data staying in
grained security level characterization, and the queue. Based on the above model, security
design adaptive resource allocation schemes requirement can be described by the queue-
to realize statistical security guarantee for de- length bound Qth. If queue length is beyond
lay-sensitive services [42]. the bound, the eavesdropper has accumulated
Our proposed model is depicted in figure sufficient amount of data to decipher users’
4, where Alice attempts to send data to Bob, information, and vice versa. Then, the security
and Eve tries to capture Alice’s information level of legitimate users can be characterized
from its observation. The accumulation and by the violation probability of the security
expiration of the eavesdropped data at Eve, requirement. Based on the service nature we
which reflects the delay-sensitive characteris- require to satisfy Pr {Q > Qth } ≤ δ , i.e., the
tics of the transmissions, can be described by probability with which Eve’s queue length
the queuing model depicted in the right-lower exceeds the secure threshold Qth needs to be
corner of figure 4. The arrival process of the smaller than or equal to a small d . As long as
queue is the amount of eavesdropped data, this condition is satisfied, we claim that the
user’s security is assured. Because this model
characterizes security levels based on the sta-
hab zb Bob tistical features, we term it as statistical securi-
PHY High Pro
r tocol
ro ty model.
Decode Layers
rrs
Alice Having built the above model, we can
PHY Eve
AMC hae ze
MAC Queue
design the framework for statistical security
Expire
PHY Data based resource allocation and QoS guarantee,
Decode Arrival
Dro
r p
ro which is shown in figure 5. In this figure, se-
Decipher curity QoS is characterized by the aforemen-
Fine-grained Security Level: Pr{
r Qe>Qth} < δ
r{ Accumulated Data
tioned statistical security metric, delay QoS is
described by delay-bound violation probabil-
Fig. 4 Model for fine-grained security level ity, sustainable traffic load is characterized by

Delay QoS: Alice Channel CSI


Wireless Reliability
t :
ty
Pr{
r Da>Dth} < ε
r{ Bob
Joint PHY contro
r ller
ro channel BER/Drop
r rate
rop
Data
Adaptive
Pre
r -
re
rate AMC
dropp
Overheard Ev e
Sustainable traffififc Wireless Data
Expire
load: channel
Effe
f ct
fe c ive capacity
Statistical security
t level:
ty
Pr{r Qe>Qth} < δ
r{

Fig. 5 Framework for statistical security based resource allocation and QoS guarantee

10 China Communications • December 2017


effective capacity, and reliability requirement eavesdropper does. In other words, the source
is described by bit error rate (BER) and drop information is not leaked as long as the des-
rate. This framework enables the decoupling tination obtains the required N packets first,
of diverse QoS functions, whose optimization even though some packets may be obtained by
is conducted by a joint PHY controller includ- the eavesdropper.
ing data pre-drop, adaptive rate control, adap- With the above ideas in mind, we devel-
tive modulation, and coding. oped a series of FC-aided anti-eavesdropping
The above design provides a new archi- strategies. In [44], an adaptive power alloca-
tecture for secure transmission toward 5G. tion policy was developed based on truncated
On one hand, it can effectively describe fine- channel inversion. By using this approach, the
grained QoS requirements of terminal users; received SNR at the legitimate receiver can be
on the other hand, it comprehensively inte- kept as a constant, while that at the eavesdrop-
grates diversified requirements on security, per varies randomly with time. As a result, the
delay, sustainable traffic load, and reliability, equivalent channel condition of the eavesdrop-
and provides a unified framework for flexible ping link is severely degraded, which makes it
tradeoff. extremely difficult for the eavesdropper to ac-
cumulate the required number of FC packets.
5.3 Fountain Coding Aided Security
The scheme in [44] requires the availability of
Enhancement for IoT Applications
the instantaneous CSI at the transmitter, which
In IoT applications, the low-power ma- is hard to satisfy in practical IoT applications.
chine-type devices often have very stringent To combat this barrier, [45] investigated the
constraints on communication resources and construction of fountain code for enhanced se-
processing capabilities. Thus, PLS schemes crecy. A set called decoding set is maintained
toward IoT applications should provide the at the transmitter, which contains all source
anti-eavesdropping capacity while keeping a packets that have already been decoded by
very low implementation complexity. Moti- the receiver. Upon the completion of each slot
vated by this, we proposed a security enhance- transmission, the legitimate receiver feedbacks
ment framework based on fountain coding, a single bit to notify the transmitter about the
which will be elaborated on in detail in what decoding status of the current FC packet (suc-
follows: cess or failure). With this feedback informa-
Fountain code (FC) was first proposed tion, the transmitter updates the decoding set,
to realize reliable communications without and constructs the new FC packet by XORing
retransmission [43]. In FC-aided data trans- all source packets in the decoding set with an
missions, the source file is first divided into K un-decoded source packet chosen randomly.
packets. Then, a potentially infinite number As long as the current transmission does not
of FC packets are generated, each of which fail, the legitimate receiver can recover a new
is the XOR of distinct source packets chosen source packet from the received FC packet.
randomly. The transmitter sprays these cod- However, for the eavesdropper, no source
ed packets at the destination continuously. packets can be recovered once any packet in
Once the receiver has correctly received N the decoding set is not successfully decoded.
packets, where N is slightly larger than K, the Consequently, information leakage is avoided
source file can be recovered and the trans- according to the principle of FC-based trans-
mission terminates. This characteristic of FC missions.
can be exploited to realize wireless security. The FC-aided secure transmission technique
Specifically, by using FCs, the transmission can also be extended to cooperative relaying
link between legitimate transceivers can be systems where the eavesdropper attempts to
secured if the legitimate receiver successfully extract the source information during both the
accumulates the N coded packets before the broadcast phase and the relaying phase. For

China Communications • December 2017 11


this scenario, a cooperative jamming method 3) Physical layer security approaches for
can be integrated into the FC-aided transmis- combating active attacks. Current studies on
sion framework. Interested readers can refer to PLS are primarily concerned about how to
[46] for more information. combat eavesdropping attacks of the malicious
users. Yet, in future 5G networks, there also
VI. CONCLUSIONS AND FUTURE WORKS exist many forms of active attacks in addition
to eavesdropping, such as jamming attack or
This article presented a comprehensive review pilot spoofing attack. It would be a non-trivial
of the PLS technique with its applications in work to develop PLS solutions to combat ac-
future 5G networks. We fist briefly introduced tive attacks. Some preliminary results on this
the security requirements of 5G, based on subject can be found in [47], [48], and refer-
which we analyzed the advantages of PLS ences therein.
technique and its suitability to 5G systems.
Then, we gave a detailed description of the ACKNOWLEDGEMENT
principles of PLS and the state-of-the-art PLS
techniques. Afterwards, the main drawbacks of This work was supported in part by the Nation-
the existing PLS solutions were discussed and al Natural Science Foundation of China under
the challenges faced by 5G transmission se- Grants No. 61671369 and 61431011, the Na-
curity were pointed out. Finally, we identified tional Science and Technology Major Project
several promising PLS solutions towards the of China under Grant No. 2016ZX03001012-
diverse application scenarios of 5G networks. 004, the Open Research Fund of the State Key
Although the fundamental research of Laboratory of Integrated Services Networks,
physical layer security has generated fruitful Xidian University, under Grant No. ISN18-02,
outcomes, it is still challenging to design PLS and the Fundamental Research Funds for the
schemes to satisfy the 5G security require- Central Universities of China.
ments. Some interesting topics that are worthy
References
of further investigations are listed as follows:
[1] SHANNON C E. Communication theory of se-
1) Cross-layer security techniques. The crecy systems [J]. Bell System Technical Journal,
existing PLS strategies realize transmission 1949, 28(4): 656-715.
secrecy by exploiting the characteristics of [2] WYNER A D. Wire-tap channel [J]. Bell System
Technical Journal, 1975, 54(8): 1355-1387.
wireless channels at the physical layer; on
[3] GOEL S, NEGI R. Guaranteeing secrecy using
the other hand, the cryptographic approaches artificial noise [J]. IEEE Transactions on Wireless
use encryption/decryption operations at upper Communications, 2008, 7(6): 2180-2189.
layers to secure communications. By combin- [4] ZHOU Xiangyun, MCKAY M R. Secure transmis-
sion with artificial noise over fading channels:
ing these two and introducing the cross-layer
achievable rate and power allocation [J]. IEEE
optimization techniques, the system secrecy Transactions on Vehicular Technology, 2010,
performance can be further enhanced. 59(8): 3831-3842.
2) Content-aware physical-layer security [5] WANG Huiming, ZHENG Tongxing, XIA Xiang-
gen. Secure MISO wiretap channels with mul-
scheme design. The PLS approaches devel-
tiantenna passive eavesdropper: artificial noise
oped so far only focus on the security of the vs. artificial fast fading [J]. IEEE Transactions on
“signals”, while ignoring the diverse charac- Wireless Communications, 2015, 14(1): 94-106.
teristics of data content carried by the signals. [6] DING Xiaojin, SONG Tiecheng, ZOU Yulong, et
al. Security-reliability tradeoff analysis of arti-
Thus, it is difficult to realize the optimized
ficial noise aided two-way opportunistic relay
configuration of the anti-eavesdropping re- selection [J]. IEEE Transactions on Vehicular
sources. In 5G networks, multimedia services Technology, 2017, 66(5): 3930-3941.
will be the dominant service type. Therefore, [7] ZHANG Xi, MCKAY M R, ZHOU Xiangyun, et
al. Artificial-noise-aided secure multi-antenna
it is interesting to develop content-aware PLS
transmission with limited feedback [J]. IEEE
solutions to realize unequal secrecy protection.

12 China Communications • December 2017


Transactions on Wireless Communications, [20] LI Na, TAO Xiaofeng, XU Jin. Ergodic secrecy
2015, 14(5): 2742-2754. sum-rate for downlink multiuser MIMO systems
[8] LI Na, TAO Xiaofeng, WU Huici, et al. Large-sys- with limited CSI feedback [J]. IEEE Communica-
tem analysis of artificial-noise-assisted com- tions Letters, 2014, 18(6): 969-972.
munication in the multiuser downlink: ergodic [21] ZHU Fengchao, GAO Feifei, YAO Minli. Ze-
secrecy sum rate and optimal power allocation ro-forcing beamforming for physical layer
[J]. IEEE Transactions on Vehicular Technology, security of energy harvesting wireless commu-
2016, 65(9): 7036-7050. nications [J]. EURASIP Journal on Wireless Com-
[9] ZHAO Nan, YU F R, LI Ming, et al. Physical layer munications and Networking, 2015, 2015(58):
security issues in interference-alignment-based 1-9.
wireless networks [J]. IEEE Communications [22] DONG Lun, HAN Zhu, PETROPULU A P, et al.
Magazine, 2016, 54(8): 162-168. Improving wireless physical layer security via
[10] TEKIN E, YENER A. Secrecy sum-rates for the cooperative relays [J]. IEEE Transactions on Sig-
multiple-access wire-tap channel with ergodic nal Processing, 2010, 58(3): 1875-1888.
block fading [C]// Proceedings of the 45th An- [23] LUO Shuangyu, LI Jiangyuan, PETROPULU A P.
nual Allerton Conference on Communications, Uncoordinated cooperative jamming for secret
Control, and Computing: Sep. 26-28, 2007, Al- communications [J]. IEEE Transactions on Infor-
lerton House, Illinois, USA: 856-863. mation Forensics and Security, 2013, 8(7): 1081-
[11] BASSILY R, ULUKUS S. Ergodic secret alignment 1090.
[J]. IEEE Transactions on Information Theory, [24] KRIKIDIS I, THOMPSON J S, MCLAUGHLIN S.
2012, 58(3): 1594-1611. Relay selection for secure cooperative networks
[12] MO Jianhua, TAO Meixia, LIU Yuan, et al. Secure with jamming [J]. IEEE Transactions on Wireless
beamforming for MIMO two-way communica- Communications, 2009, 8(10): 5003-5011.
tions with an untrusted relay [J]. IEEE Transac- [25] GUO Haiyan, YANG Zhen, ZHANG Linghua, et
tions on Signal Processing, 2014, 62(9): 2185- al. Power-constrained secrecy rate maximization
2199. for joint relay and jammer selection assisted
[13] XU Hongbin, SUN Li, REN Pinyi, et al. Securing wireless networks [J]. IEEE Transactions on Com-
two-way cooperative systems with an untrusted munications, 2017, 65(5): 2180-2193.
relay: a constellation-rotation aided approach [26] HE Xiang, YENER A. Cooperation with an un-
[J]. IEEE Communications Letters, 2015, 19(12): trusted relay: a secrecy perspective [J]. IEEE
2270-2273. Transactions on Information Theory, 2010,
[14] KHISTI A, WORNELL G. Secure transmission 56(8): 3807-3827.
with multiple antennas – I: The MISOME wiretap [27] JU M, HWANG K S. Opportunistic transmission
channels [J]. IEEE Transactions on Information of nonregenerative network with untrusted re-
Theory, 2010, 56(7): 3088-3104. lay [J]. IEEE Transactions on Vehicular Technolo-
[15] KHISTI A, WORNELL G. Secure transmission with gy, 2015, 64(6): 2703-2709.
multiple antennas – II: The MIMOME wiretap [28] KHODAKARAMI H, LAHOUTI F. Link adaptation
channels [J]. IEEE Transactions on Information with untrusted relay assignment: design and
Theory, 2010, 56(11): 5515-5532. performance analysis [J]. IEEE Transactions on
[16] GERACI G, COUILLET R, YUAN Jinhong, et al. Communications, 2013, 61(12): 4874-4883.
Secrecy sum-rates with regularized channel [29] SUN Li, ZHANG Taiyi, LI Yubo, et al. Perfor-
inversion precoding under imperfect CSI at the mance study of two-hop amplify-and-forward
transmitter [C] // Proceedings of the IEEE Inter- systems with untrustworthy relay nodes [J]. IEEE
national Conference on Acoustics, Speech, and Transactions on Vehicular Technology, 2012,
Signal Processing (ICASSP): May 26-31, 2013, 61(8): 3801-3807.
Vancouver, Canada: 1-4. [30] SUN Li, REN Pinyi, DU Qinghe, et al. Secu-
[17] ZHU Fengchao, GAO Feifei, YAO Minli, et al. rity-aware relaying scheme for cooperative
Joint information- and jamming-beamforming networks with untrusted relay nodes [J]. IEEE
for physical layer security with full duplex base Communications Letters, 2015, 19(3): 463-466.
station [J]. IEEE Transactions on Signal Process- [31] ZHU Jingge, MO Jianhua, TAO Meixia. Coop-
ing, 2014, 62(24): 6391-6401. erative secret communication with artificial
[18] MUKHERJEE A, SWINDLEHURST A L. Robust noise in symmetric interference channel [J]. IEEE
beamfoming for security in MIMO wiretap Communications Letters, 2010, 14(4): 885-887.
channels with imperfect CSI [J]. IEEE Transac- [32] MA Chuan, LIU Jiaqi, TIAN Xiaohua, et al. In-
tions on Signal Processing, 2011, 59(1): 351- terference exploitation in D2D-enabled cellular
361. networks: a secrecy perspective [J]. IEEE Trans-
[19] LIN C H, TSAI S H, LIN Y P. On quantization for actions on Communications, 2015, 63(1): 292-
masked beamforming secrecy systems [J]. IEEE 242.
Transactions on Wireless Communications, [33] XU Hongbin, SUN Li, REN Pinyi, et al. Cooper-
2015, 14(10): 5616-5628. ative privacy preserving scheme for downlink

China Communications • December 2017 13


transmission in multiuser relay networks [J]. tar: 1-6.
IEEE Transactions on Information Forensics and [46] SUN Li, REN Pinyi, DU Qinghe, et al. Foun-
Security, 2017, 12(4): 825-839. tain-coding aided strategy for secure cooper-
[34] GOPALA P K, LAI Lifeng, GAMAL H E. On the se- ative transmission in industrial wireless sensor
crecy capacity of fading channels [J]. IEEE Trans- networks [J]. IEEE Transactions on Industrial
actions on Information Theory, 2008, 54(10): Informatics, 2016, 12(1): 291-300.
4687-4698. [47] TANG Xiao, REN Pinyi, WANG Yichen, et al.
[35] HE Biao, ZHOU Xiangyun. Secure on-off trans- Combating full-duplex active eavesdropper: a
mission design with channel estimation errors hierarchical game perspective [J]. IEEE Transac-
[J]. IEEE Transactions on Information Forensics tions on Communications, 2017, 65(3): 1379-
and Security, 2013, 8(12): 1923-1936. 1395.
[36] WANG Xiaowei, TAO Meixia, MO Jianhua, et [48] LI Lingxiang, PETROPULU A P, A. CHEN Zhi.
al. Power and subcarrier allocation for physi- MIMO secret communications against an active
cal-layer security in OFDMA-based broadband eavesdropper [J]. IEEE Transactions on Informa-
wireless networks [J]. IEEE Transactions on Infor- tion Forensics and Security, 2017, 12(10): 2387-
mation Forensics and Security, 2011, 6(3): 693- 2401.
702.
[37] HU Jianwei, YANG Weiwei, YANG Nan, et al. Biographies
On-off-based secure transmission design with Li Sun, received the B.S. and
outdated channel state information [J]. IEEE Ph.D. degrees in Information
Transactions on Vehicular Technology, 2016, and Communications Engi-
65(8): 6075-6088. neering from Xi’an Jiaotong
[38] HU Jianwei, YANG Nan, ZHOU Xiangyun, et al. University, China, in 2006 and
A versatile secure transmission strategy in the 2011, respectively. Since Jan.
presence of outdated CSI [J]. IEEE Transactions 2012, he has been with the De-
on Vehicular Technology, 2016, 65(12): 10084- partment of Information and
10090. Communications Engineering, Xi’an Jiaotong Uni-
[39] LI Xiangming, JIANG Tao, CUI Shuguang, et al. versity, where he is currently an Associate Professor.
Cooperative communications based on rateless His research interests include wireless physical-layer
network coding in distributed MIMO systems security, cooperative relaying networks, and M2M/
[J]. IEEE Wireless Communications, 2010, 17(3): D2D communications. Currently he is serving as an
60-67. Editor of the KSII Transactions on Internet and Infor-
[40] TANG Xiao, REN Pinyi, HAN Zhu. Distribut- mation Systems, and the Leading Guest Editor of the
ed power optimization for security-aware Wireless Communications and Mobile Computing,
multi-channel full-duplex communications: a Special Issue on “Safeguarding 5G Networks through
variational inequality framework [J]. IEEE Trans- Physical Layer Security Technologies”.
actions on Communications, 2017, 65(9): 4065-
4079 Qinghe Du, received his B.S.
[41] SUN Li, DU Qinghe, REN Pinyi, et al. Two birds and M.S. degrees both from
with one stone: towards secure and interfer- Xi’an Jiaotong University, Chi-
ence-free D2D transmissions via constellation na, and his Ph.D. degree from
rotation [J]. IEEE Transactions on Vehicular Tech- Texas A&M University, USA.
nology, 2016, 65(10): 8767-8774. He is currently an Associate
[42] DU Qinghe, SUN Li, REN Pinyi, et al. Statistical Professor of Information and
security model and power adaptation over Communications Engineering
wireless fading channels [C] // Proceedings of Department, Xi’an Jiaotong University, China. His re-
the International Conference on Wireless Com- search interests include wireless communications and
munications & Signal Processing (WCSP): Oct. networking with emphasis on statistical QoS provi-
15-17, 2015, Nanjing, China: 1-6. sioning, secure wireless transmissions, 5G networks,
[43] MACKAY D. Fountain codes. IEE Proceedings: D2D/M2M networks, cognitive radio networks, mo-
Communications, 2005, 152(6): 1062-1068. bile multicast, etc. He served as an Associate Editor
[44] NIU Hao, IWAI M, SEZAKI, K, et al. Exploiting of IEEE Communications Letters.
fountain codes for secure wireless delivery [J].
IEEE Communications Letters, 2014, 18(5): 777-
780.
[45] LI Wanyu, DU Qinghe, SUN Li, et al. Security
enhanced via dynamic fountain code design
for wireless delivery [C] // Proceedings of the
IEEE Wireless Communications and Networking
Conference (WCNC): Apr. 3-6, 2016, Doha, Qa-

14 China Communications • December 2017

S-ar putea să vă placă și