Author:
Dai Bin,Li Chong,Liang Yingbin,Poor H. Vincent,(Shitz) Shlomo Shamai
Abstract
AbstractPhysical layer security (PLS), which is based on information-theoretic principles of message confidentiality, has attracted considerable attention in recent years. This paper provides a comprehensive survey of using channel feedback (CF) to enhance the quality of PLS of various communication models. To be specific, the survey starts from the secret key-based CF scheme and its variations for the wiretap channel (WTC) and other communication models. Then, for the WTC and its generalized models, an improved feedback scheme and its variations are respectively introduced, where the improved scheme combines the secret key-based CF scheme with the Wyner-Ziv scheme for source coding with side information. It has been shown that these improved schemes perform better than the original secret key-based schemes for several cases. Next, the Schalkwijk-Kailath (SK) feedback scheme and its variations are introduced, which are optimal for the Gaussian WTC and its variations. Finally, the already existing CF schemes are summarized and the future challenges of using CF to enhance PLS are discussed.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference80 articles.
1. Y. Liang, H. Vincent Poor, S. Shamai (Shitz), Information Theoretic Security (Foundations and Trends in Communications and NOW Publishers, Hanover, 2009).
2. R. F. Schaefer, H. V. Poor, Wireless physical layer security. Proc. Nat. Acad. Sci. U.S.A.114(1), 19–26 (2017).
3. Y. Zou, J. Zhu, X. Wang, L. Hanzo, A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE. 104(9), 1727–1765 (2016).
4. Y. Liu, H. Chen, L. Wang, Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Commun. Surv. Tutor.19(1), 347–376 (2017).
5. X. Zhou, L. Song, Y. Zhang, Physical Layer Security in Wireless Communications (2016).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献