Documente Academic
Documente Profesional
Documente Cultură
Abstract: 5G network is expected to support PLS solutions that are expected to be applied
massive user connections and exponentially in 5G networks. Finally, we conclude this arti-
increasing wireless services, which makes cle and figure out some further research direc-
network security unprecedentedly important. tions.
Unlike traditional security-guaranteeing tech- Keywords: 5G; physical layer security; an-
niques which rely heavily on cryptographic ti-eavesdropping signal design; statistical se-
approaches at upper layers of the protocol curity guarantee; fountain coding
stack, physical-layer security (PLS) solutions
fully take advantages of the characteristics of I. INTRODUCTION
wireless channels to degrade the received sig-
nal qualities at the malicious users, and realize With the continuous growth of the demands
keyless secure transmission via signal design for ubiquitous information exchange, the in-
and signal processing techniques. PLS avoids creasing popularity of smart devices, the rapid
the difficulties in the distribution and man- development of mobile Internet, and the deep
agement of secret keys, and provides flexible integration of information technology into in-
security levels through adaptive transmission dustrial applications, 5G network is expected
protocol design. Moreover, PLS techniques to support massive user connections and expo-
match the features of 5G networks well. nentially increasing wireless services, which
Therefore, the application of PLS to 5G net- makes the information security issue unprece-
works is a promising solution to address the dentedly important.
security threats. This article presents a com- Current network transmission security
prehensive review of the state-of-the-art PLS technologies rely heavily on the cryptographic
techniques, and discusses their applications in approaches at the upper layer of the protocol
5G networks. We first summarize the principle stack, which is not suitable for future 5G net-
and advantages of PLS techniques, and point works. The main reasons are threefold. First,
out the reasons why PLS is suitable for 5G 5G is a large-scale heterogeneous network
Editor: Jianwei Zhao
networks. Then, we review the existing PLS (HetNet) with multiple levels and weak- Received: Aug. 6, 2017
methods in literature, and highlight several ly-structured architectures, which makes it Revised: Sep. 4, 2017
Large Scale, Multi- Difficult to Distribute and Rely heavily on The achieved security
Levels, Weakly- Manage Secret Keys encryption algorithms to does not rely on encryption
realize security and decryption
Structured
Web Browsing, Personalized Security The security levels Can realize flexible
File Sharing, Service and Differentiated provided are only configu-rations of
Online Payment, Security Levels binary security levels
WeChat, ...
Not easy to satisfy Evolution
Massive Low-Power Devices
Shannon considered a system model where the hold. In (2) and (3), M̂ denotes the estimate
source-destination pair communicates over a of M at Bob, and I ( M ; Z n ) represents the
noiseless channel, and an eavesdropper over- mutual information between M and Zn. These
hears the signals sent over the channel. This two conditions, termed as reliability condition
system is said to be in perfect secrecy if the and security condition respectively, guarantee
following condition is satisfied: that the decoding error probability at the legit-
H ( M | X ) = H ( M ) (1) imate receiver can be arbitrarily small while
where H(M) and H(M|X) are the entropy of the no source information can be obtained by the
message M and the conditional entropy of M eavesdropper, as long as the codeword length
conditioned on eavesdropper’s observation X, tends to infinity. The maximum of the achiev-
respectively. Intuitively, (1) implies that eaves- able secrecy rate is defined as secrecy capaci-
dropper’s uncertainty about the message does ty, which characterizes the rate limit for secure
not decrease after intercepting the transmitted transmission in noisy channels. For DWTC,
codeword, or equivalently, the information the secrecy capacity can be expressed as
leakage is zero. Perfect secrecy guarantees = CsDWTC max ( I ( X ; Y ) − I ( X ; Z ) )
pX
that eavesdropper’s optimal attack is to guess (4)
≥ max I ( X ; Y ) − max I ( X ; Z )
the message M at random and there is no algo- pX pX
rithm that can extract any information about M where pX is the probabilistic distribution of the
from X. To achieve perfect secrecy, the code- encoder input at Alice. (4) indicates that, the
that noise, fading, and interference are detri- Secure beam- Multi-anten-
Exploitation of
forming/pre- Instantaneous na structure, Moderate
mental factors for reliable communications fading and noise
coding CSI feedback
that should be suppressed. However, from
Additional
the security point of view, these factors are Cooperative Exploitation of
Not necessary power, dedi- Moderate
actually the beneficial resources that should jamming noise
cated helper
be exploited, as state above. For example, Additional
Exploitation of
the anti-eavesdropping signal design can be Relay selection Not necessary power, dedi- Moderate
fading
viewed as an interference exploitation method cated helper
for enhanced secrecy, where the inter-user in- Cooperative Exploitation of Instanta-
Data and (or)
terference is utilized to confuse the eavesdrop- secrecy en- interference and neous/Not High
CSI exchange
hancement noise necessary
per. The cooperation based techniques, on the
Power control
other hand, exploit both noise and fading to Exploitation of
and resource Instantaneous CSI feedback Moderate
create the physical advantage of the legitimate allocation
fading
Fig. 5 Framework for statistical security based resource allocation and QoS guarantee