Next Article in Journal
What Can Local Transfer Entropy Tell Us about Phase-Amplitude Coupling in Electrophysiological Signals?
Previous Article in Journal
Time-Delay Characteristics of Complex Lü System and Its Application in Speech Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

An Overview of Key Technologies in Physical Layer Security

by
Abraham Sanenga
1,*,
Galefang Allycan Mapunda
1,
Tshepiso Merapelo Ludo Jacob
1,
Leatile Marata
2,
Bokamoso Basutli
1 and
Joseph Monamati Chuma
1
1
Electrical, Computer, and Telecommunications Engineering, Botswana International University of Science and Technology, Palapye, Botswana
2
Center for Wireless Communications, University of Oulu, 90570 Oulu, Finland
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(11), 1261; https://doi.org/10.3390/e22111261
Submission received: 18 August 2020 / Revised: 14 September 2020 / Accepted: 21 September 2020 / Published: 6 November 2020
(This article belongs to the Section Entropy Reviews)

Abstract

:
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the physical layer. We start by introducing the basic theories of PLS, including the wiretap channel, information-theoretic security, and a brief discussion of the cryptography security technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is provided. The main focus of our review is based on the existing key-less PLS optimization techniques, their limitations, and challenges. The paper also looks into the promising key research areas in addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in 5G and 6G technologies of wireless communication networks is provided.

1. Introduction

Wireless communication technology is a necessity for modern-day life because human beings depend on this technology for data transmission. In most cases, the said data contain confidential information such as banking transactions, military applications, and multimedia. The International telecommunication organization approximated that 53.6% of the world population, which amounts to about 4.1 billion people, were using the internet at the end of 2019 [1]. It is expected that this number will rise due to a rapid increase in active mobile subscribers as wireless networks continue to expand and new applications are developed. However, it is reported in [2] that an increasing number of mobile and wireless devices are affected by cyber-criminal activities. Cyber security ventures [2] predicted that cyber crime costs will increase to more than 6 trillion US dollars annually by 2021, from 3 trillion US dollars recorded in 2015. Therefore, it is highly important to improve wireless networks against cyber-criminal activities.
Conventionally, the upper layers of the open system interconnect model are utilized to handle any discrepancies related to the attributes of authenticity, confidentiality, and privacy of data transmission. These attributes are mostly dependent on cryptographic algorithms which include secret-key distribution, public-key, and symmetric encryption. All these techniques function independently from the physical layer [3]. Based on the assumption that the eavesdropper has limited computing power ability, the above-mentioned techniques are considered to be secure. Moreover, they rely on underlying computational complexity for their robustness. Recent advances in quantum computing pose a serious threat to the currently used cryptographic schemes with their unlimited computational capacity [4]. Therefore, it is evident that the conventional methods in secure wireless communication are becoming less reliable.
The open and superposition nature of wireless networks raises issues of confidentiality and security of the transmitted data when unintended users are present. Difficulties that prevent the transmitted signal from reaching the unintended users are a result of the broadcast nature. On the other hand, time variations and fluctuations in the wireless channel result in the arrival of multiple copies of the transmitted signal at the receiver. With that being said, security attacks in wireless networks may be categorized as active and passive attacks [5]. Passive attacks involve eavesdroppers who listen to the ongoing transmission silently and try to steal the transmitted information without interrupting legitimate transmission [6]. Under active attacks, the eavesdroppers use more aggressive and intrusive techniques that attempt to deteriorate the quality of the signal at the intended receiver. Common examples of these aggressive techniques are the denial of service, routing, and node malfunction attacks [5]. With exposure to so many attacks, wireless networks are required to have certain capabilities that will enable them to withstand and mitigate these attacks. The desired characteristics of a secure network include integrity, confidentiality and authentication, availability, and access control [5].

1.1. Related Works

In this section, we provide a brief overview of some of the related works on the review of key technologies in PLS. It should be noted that this paper focuses only on key-less PLS technologies. The survey paper in [7] provides a comprehensive overview of security in the physical layer from both an information-theoretic point of view and optimization using multi-antenna techniques; however, it does not describe applications of PLS techniques in modern wireless communication networks. To the best of our knowledge, the reviews found in [8,9] are the only ones that cover the application of conventional PLS techniques in 5G (and beyond) wireless communication systems. They give insight into some of the emerging technologies, including internet of things (IoT), multiple-input multiple-output (MIMO), energy harvesting, visible light communication (VLC), and UAV communication. However, there are a lot of papers available that focus on individual aspects of the technologies mentioned above.
VLC: Recently, the authors in [10] provided a comprehensive survey of VLC applications in PLS. The paper also discusses VLC channel models, different network configurations, and also presents some of the precoding strategies. In this paper, however, we demonstrate, with some simulation plots, a VLC practical scenario model with realistic system design parameters and show how the optical power decay in VLC is beneficial in PLS.
IRS: Another technology which has gained a lot of interest in PLS recently is intelligent reflecting surfaces, and there has been a lot of work published in this area. Some recent papers are [11,12,13]. The authors in [11] provide an overview of IRS technology, particularly its applications across the whole of wireless communication. They also outline the advantages IRS offers and some of the challenges in implementing IRS-aided systems. The optimization problems in the IRS-based PLS scheme are derived and solved in [12,14]. In this paper we specifically demonstrate the application of IRS in PLS and evaluate the performance of an IRS-based scheme using the achievable secrecy rate metric.
UAVs: There have been a couple of papers published in this area recently [15,16,17]. Current research is aimed at the integration of UAV communication networks with 5G technology (and beyond 5G) to safeguard the current and future wireless networks. We provide a brief overview and summary of some of the interesting works on the applications of UAVs in PLS.
Satellite communication: This is another area that has become a trend in recent PLS research, and a couple of interesting works have been published in [18,19,20,21]. Vasquez et al. [18] provided an overview of precoding techniques in multibeam satellite communication systems. Another study [19] proposed the inter-satellite communication of small satellite systems. A comprehensive overview of PLS in space information networks is given in [21]. They proposed the integration of satellite and IoT to form a satellite-based IoT and also discussed current technologies dedicated to PLS in land mobile satellite communication networks. Our letter intends to summarize some of the promising technologies that are discussed in the literature.

1.2. Overview of Cryptography and PLS

Cryptography is the method of transforming data into an unreadable format so that only the authorized recipient can understand and be able to decode it [22]. The main process of cryptography is shown in Figure 1. Encryption uses coding to transform plain text into an unreadable format, whereas decryption uses a decoding process to convert the unreadable text to a piece of readable information using some special keys. Cryptography can be divided into three main types: hash functions, public key cryptography, and secret key cryptography. The latter uses only one digital key to encrypt and decrypt data for both the sender and the receiver. Meanwhile, the first mentioned type utilizes a pair of public digital keys. In this case, one key is a public key used by the sender to encrypt the message, and the other key is a secret key used by the receiver to decrypt the information. Lastly, hash functions are a type of cryptography method that uses a hash value of a fixed length encrypted into the plain text. Hash functions use algorithms to generate a digital fingerprint to create one-way encryption [22].
In most cases, cryptography is the main technology utilized to address security issues for conventional and some modern-day electronic communication systems. From another perspective, some novel technologies, mainly quantum computing, are a threat to systems that are based on cryptography. Quantum computers have close to unbounded computing capabilities and can easily break encryption and decryption keys. The ability to guess the secret keys or perform a quick reverse calculation using a quantum computer enables breakage of such keys, and this gives unauthorized or disguised network users the ability to intercept ongoing data transmissions or access the data [4]. With that being said, it is worth noting that quantum computing is limited to some extent as it cannot break all kinds of cryptographic algorithms. This means that it is one of the technologies which jeopardizes some of existing systems based on cryptography. Furthermore, the processes involved in cryptography can impose delays which can be unwelcome in some applications, such as fifth-generation (5G) ultra-reliable low-latency communication (URLLC) [24]. Moreover, cryptographic methods are inefficient in terms of energy consumption as they require extra resources for performing computations. Therefore, this calls for the need to implement new measures with an effort to augment cryptography. One of the technologies directed towards augmenting cryptography is physical layer security (PLS) [6,7,25].
PLS is different from cryptography technology because it is based on the concept of information-theoretic security proposed by Wyner [26]. The concept of PLS describes communication between two authorized users in the presence of an unintended user by modeling a discrete memory-less wiretap channel [27]. Figure 2 shows the general case of the wiretap channel where two authorized users communicate over the main channel and are observed by an eavesdropper through a wiretap channel. Figure 3 illustrates the fundamental differences between cryptography and PLS [28].
In contrast to cryptography, PLS schemes can seamlessly prevent unintended users from intercepting data signals. PLS is able to facilitate security without any form of encryption in the upper layers. The facilitation of key-free encryption is made possible by the exploitation of some wireless channel characteristics through the application of suitable signaling and channel coding [29]. PLS techniques have proven capable of realizing verifiable security even when the network intruders have almost limitless computational resources. Despite the unparalleled benefits of PLS, it is worth noting that some shortfalls exist. It was shown in [30] that it is almost impossible to warrant maximal security with a probability of one since PLS relies mainly on the average information. In addition, most PLS schemes assume prior knowledge of the eavesdropper’s wiretap channel, which is not feasible in practical applications. Furthermore, it is also worth noting that it will be difficult to only use PLS in future wireless systems since it requires a high data rate to ensure security. PLS can be combined with other higher-layer security techniques to achieve security and robustness of wireless communication networks. Authors in [31], proposed cross-layer cooperation as a viable solution for the achievement of reliability and energy efficiency in wireless communication. Chen et al. in [32] also investigated a cross-layer optimization scheme using cooperative diversity for reliable data transfer in wireless sensor networks to achieve significant energy savings and prolong the network lifetime considerably. Having stated the aforementioned benefits of both technologies, investigations on the concurrent use of PLS and cryptography are worth looking into to provide elevated robustness of the communication network.

2. Background

2.1. Concept and Evolution of PLS

PLS dates back to the 1970s with a mathematical description of a wiretap channel [26]. Following the advancements in massive MIMO and integration of technologies such as IEEE 802.11n and long-term evolution (LTE), there has been major interest in PLS research over the last decade. The current research is focused towards exploiting MIMO spatial degrees of freedom in order to leverage security benefits [33]. A typical network in which PLS is employed comprises three nodes: a transmitter, a legitimate receiver, and an eavesdropper. With this setup, the transmitter under normal circumstances sends a confidential message to the receiver. The sent signal is protected from any form of interception by the eavesdropper [29]. The adopted general convention is that the transmitter is referred to as “Alice”, whilst the eavesdropper and the receiver are referred to as “Eve” and “Bob”, respectively. This model is illustrated in Figure 4.

2.2. Motivation of PLS

It was shown in Section 1 that the inception of technologies such as quantum computing poses a major threat in existing security techniques in wireless networks, which means that wireless communication is not completely secure. PLS offers an additional solution to exploit the secrecy possibilities that the wireless channel offers. The main motivations behind PLS are (1) to find an alternative means to supplement the existing security measures in wireless networks which are based on cryptography algorithms, (2) employment of the physical layer of the network to improve security through enhancements of security methods implemented at the upper layer of the protocol stack, and (3) to find and develop new security technologies compatible with recent developments of the 5G and 6G wireless networks as well as MIMO communication.

2.3. Information-Theoretic Security

This is the kind of security that purely defines the fundamental limits of PLS measures from an information theory point of view. It was proposed by Claude Shannon in 1949 [34]. Shannon defined the channel capacity as the maximum rate at which information can be transmitted over a communication channel with an arbitrarily low probability of error. For an additive white Gaussian noise (AWGN) channel, the channel capacity is given by
C = B l o g 2 ( 1 + SNR )
where B represents the channel’s bandwidth (fixed quantity) in Hertz (Hz), and  SNR is the signal-to-noise ratio. The  SNR is mathematically denoted by Equation (2). From Equation (1), it can be seen that the channel capacity is directly proportional to the power of the signal.
SNR = P σ 2 ,
where P denotes the power of the signal and σ 2 is the noise power.
The Shannon information content of an outcome, x i , is defined as
h ( x i ) = log 2 1 p ( x i ) = log 2 p ( x i )
where the probability of the random variable X is denoted by p ( x i ) . Figure 5 shows a graph of Shannon information content versus the different probabilities, and it illustrates that less probable or rare outcomes contain more information than common or highly probable outcomes. The entropy function H ( X ) is the average of the Shannon information content and is given by
H ( X ) = i = 1 M p ( x i ) log 2 1 p ( x i ) = i = 1 M p ( x i ) log 2 p ( x i )
where M is the total number of possible outcomes. The mutual information, I ( X ; Y ) , defines the amount of information X conveys about Y:
I ( X ; Y ) = H ( X ) H ( X Y )
Therefore, this implies the amount of information sent to Bob by Alice is given by Equation (6), whereas the same quantity between Alice and Eve is given by Equation (7).
I ( A ; B ) = H ( A ) H ( A B ) ,
I ( A ; E ) = H ( A ) H ( A E ) ,
where random variable A represents the bit sent by Alice. B denotes the bits received by Bob, and the outcome observed by Eve is denoted by E. In order to ensure that the communication channel is secure, it is significant to maximize the achievable mutual information by optimizing the input distribution p ( A ) such that [35]
C S = max p ( A ) I A ; B I A ; E
Therefore the difference between the capacities of Bob and Eve’s channels gives the secrecy rate of the PLS system model given in Figure 4 by
R s = C B C E
The notion of secrecy capacity plays a central role in PLS. It is a metric that defines the rate at which the transmitted signal reaches the legitimate receiver without any form of invasion from the eavesdropper. To define perfect secrecy, we consider Shannon’s wiretap channel model shown in Figure 6. In this model, Alice intends to transmit confidential information, A, to an authentic receiver, Bob, under a condition that an eavesdropper exists, Eve. A is encoded into X n , which represents the information vector of length n. The received information vectors for Bob and Eve are given by B n and E n , respectively. Consequently, the source information entropy together with the amount of uncertainty of the message received by Eve are given by H ( A ) and H ( A E n ) , respectively. Shannon showed that legitimate parties could achieve information-theoretically secure communication in a wireless communication environment by using the same random secret key, which is unknown to the eavesdropper. This is known as perfect secrecy, and it is given by Equation (10) in terms of the entropy. Transforming Equation (10) into Equation (11) shows that the eavesdropper is not able to receive any of the transmitted information content.
H ( A | E n ) = H ( A )
I ( A , E n ) = 0
The theorem also proves that perfect secrecy could be guaranteed if H ( K ) H ( A ) , where K is the random variable modeling the key. This means that the key should be equal to or longer than the confidential message [36]. However, perfect secrecy was proven to be impractical because the key management may be cumbersome for specific networks, such as ad hoc networks, which do not operate under fixed infrastructures [37].
To expand Shannon’s information-theoretic secrecy theorem, Wyner proposed the concept of weak secrecy. Weak secrecy is defined by the Wyner’s wiretap channel model shown in Figure 7. In this model, the encoder operates on blocks of k source bits A k = ( A 1 , A 2 , , A k ) and produces an encoded sequence X n = ( X 1 , X 2 , , X n ) of length n.
The transmission rate, which is the proportion of information sent in each codeword, is given by Equation (12). The equivocation rate, defined as a measure of confusion at the eavesdropper, is employed to investigate the weak secrecy of transmitted information. The said rate is given by Equation (13).
R = k / n ( b i t s / c h a n n e l ) ,
Δ = 1 k H ( A k | E n ) ,
where k is the total number of source bits in the code, and n is the code length. A scheme is considered to have weak secrecy in the event that
lim n 1 n I ( A , E n ) = 0
Unlike the Shannon perfect secrecy metric, this metric proved that it is possible to obtain secrecy in a practical scenario [38]. Figure 8 illustrates the relationship between the transmission rate and equivocation. It shows the region of achievable pairs as ( R , Δ ) [26]. The highest rate capable of achieving complete equivocation H s (i.e., confusion at the eavesdropper) is the secrecy capacity C s of the channel.
With Wyner’s model, the assumption is that the signal arriving at the receiver of the eavesdropper is degraded by some degree in comparison to that of the legitimate receiver [36]. However, it was proved in [39] that secret communication is possible regardless of the statistical channel state of the eavesdropper. It was further shown in [30] that weak secrecy was also insufficient in many cases to prove secrecy in communication. Another metric, referred to as strong secrecy, was defined by [40]. The metric states that a scheme is said to achieve strong secrecy if
lim n I ( A , Z n ) = 0
Subsequently, in [41], strong secrecy was proved to be inefficient for some applications. This is based on the assumption of random and uniformly distributed message symbols over the message alphabet at the input of the secrecy encoders. In practice, the limitation is caused by the unavailability of universal compression algorithms capable of providing messages that have the distribution mentioned above.

2.4. Performance Metrics in PLS

The secrecy metrics from information-theoretic security are well-established and have laid the foundation of secrecy coding in the physical layer. However, they are challenging to evaluate and measure, especially when the coded sequence has a finite block length [42]. Therefore, different metrics that are much easier to work with have been proposed. In this subsection, we discuss some of these metrics according to how they are used to evaluate performance in PLS.

2.4.1. Secrecy Rate

The rate of transmission that can reliably be supported on the legitimate channel of transmission but not decodable on the channel of the eavesdropper is termed secrecy rate. The secrecy rate of the Gaussian channel is calculated as the maximum difference between the attainable secrecy rates of Alice–Bob and Alice–Eve. Considering Figure 4, and using Equations (1) and (9), the secrecy rate of a typical PLS communication system is given by
R s = R B R E = log 2 1 + P T H B σ B 2 log 2 1 + P T H E σ E 2 ,
where R B and R E are the secrecy rates of Bob and Eve, respectively. The secrecy rate, R s , can be maximized using signal design and optimization techniques, which will be discussed in Section 3.

2.4.2. Secrecy Outage Probability (SOP)

SOP defines the probability at which a specific value of R s for a particular system is not obtainable. This metric is used in instances where Alice has very little channel state information (CSI) of Bob and Eve. In most of the applications, the SOP is put to use under the conditions where the eavesdropper’s statistical CSI is known to the transmitter. Additionally, the metric characterizes the reliability and the security of data transmission.

2.4.3. Quality of Service (QoS)-Related Metrics

Signal-to-interference-plus-noise ratio (SINR): This metric may be described as the quantitative relationship between the power of the received signal and power of the interference plus noise. The performance of a communication link is characterized by the QoS. SINR is directly related to the QoS, and this can aid with the design of secrecy algorithms. A minimum value of SINR for transmission from Alice to Bob and a maximum value of SINR for Eve means a good receiving performance in terms of security and reliability. This paves the way for a robust transmission capable of achieving the desired minimum and maximum error levels for Bob and Eve, respectively. Improvement of the SINR can facilitate the use of PLS techniques such as beamforming. A detailed discussion of beamforming is given in Section 3.
Bit error rate (BER): This metric is defined as the ratio of the number of information bits received in error to the total number of bits transmitted. Different modulation and coding techniques have varying BER performances at the same SINR level. For the establishment of a communication link, the BER of a system must be above the minimum required level. Therefore, PLS techniques utilize optimization methods to improve the security of a communication system by degrading the BER of illegitimate users. Thus, the BER can be employed to measure the QoS and the security of a communication system.

2.5. Channel State Information (CSI)

CSI defines the properties of a channel in a wireless communication link. CSI is used to describe the propagation of the transmitted signal in relation to the corresponding effects such as scattering, fading, and power decay with distance. Wang et al. in [29] show that the availability of CSI is one of the most important aspects to consider when choosing an appropriate secrecy performance metric in order to design optimal transmission strategies in PLS. CSI can be categorized into two classes, and they are referred to as perfect and imperfect CSI. The former involves the complete knowledge of the channel properties of a communication link. The latter is concerned with characterization of the statistical information only. Such information includes the average channel gain, the type of fading distribution, the line-of-sight (LOS) component, and the spatial correlation.
In practice, CSI is initially not available at the transmitter and receiver terminals; it is gathered through some channel estimation methods, such as those found in [43,44]. The two channel estimation mechanisms commonly employed to acquire CSI are the pilot-based channel training and channel state feedback. In pilot-based channel training, the transmitter distributes the total transmission time and energy such that some of the energy and time are allocated for the transmission of pilot symbols while the remaining portion is used for data transmission. In the channel state feedback method, the receiver is required to share its estimated channel knowledge with the transmitter prior to transmission. It is shown in [42] that the greatest level of security can be achieved if the transmitter has full knowledge of both the wireless channels to the intended user and the unintended user. This can be achieved by designing MIMO transmit precoders that minimize the information leaked to the eavesdropper’s channels or to accurately direct jamming signals towards the eavesdroppers. A detailed discussion on the use of CSI in PLS is given in Section 3.

2.6. Multiple-Input Multiple-Output (MIMO) Communication

MIMO is a very powerful technology in wireless communication systems. A MIMO network structure consists of many antennas at the transmitter as well as at the receiver. MIMO technology has been well-studied and developed for the past decade, mainly because of its capability to significantly enhance performance and widen the coverage range of wireless communication systems [45]. Some of its other important benefits that have been shown include, but are not limited to, its capability to provide higher data rates, improved reliability, and less noise and interference [46]. Even though MIMO technology was proposed many years back, it only came to reality in the practical world in 2018 [47]. In this review paper, we focus on the relevance and application of MIMO technology in PLS rather than its traditional capacity benefits in wireless communication networks. It was shown in [48] that MIMO systems are very robust against passive eavesdropping attacks since the secrecy capacity is directly proportional to the difference in capacities of the main and wiretap channels. Beamforming in massive MIMO was used in [49] to implement security in the physical layer. In [50], artificial noise generation was used to demonstrate the application of PLS in MIMO orthogonal frequency division multiplexing (OFDM) systems. A typical MIMO system is shown in Figure 9 wherein the transmitter, the intended receiver, and the eavesdropper are equipped with multiple antennas N A , N B , and  N E . This is referred to as MIMO multiple-antenna eavesdropper (MIMOME) [29], and in this case the secrecy capacity can be expressed as
C s = max K x 0 , t r ( K x P ) log 2 | I + H b K x H b H | log 2 | I + H e K x H e H |
where I is the identity matrix, K x is the covariance matrix of the transmit signal x, P is the maximum transmit power constraint, and  H b C N B × N A and H e C N E × N A are the MIMO complex Gaussian channel matrices of the legitimate and wiretap channel, respectively. The signals received by the legitimate receiver and passive eavesdropper are given by Equation (18):
y b = H b x a + n b , y e = H e x a + n e ,
where x a C N A × 1 is the transmit signal, and  n b C N B × 1 and n e C N E × 1 are zero-mean complex white Gaussian additive noise vectors. Equation (18) is used as a fundamental tool in optimization techniques in PLS and also to demonstrate the application of MIMO in Section 3.

3. Secure Multi-Antenna Techniques

Multi-antenna techniques have been widely considered in wireless communication because they offer higher spatial degrees of freedom, which can be utilized effectively in PLS to ensure secure data transmission. Such techniques either attempt to degrade the eavesdropper’s channel relative to the main transmission channel or enhance the quality of the received signal at the legitimate receiver. From the perspective of optimization, the four techniques which are representative of this area are (1) beamforming, (2) zero-forcing (ZF), (3) convex optimization, and (4) artificial noise (AN). In Figure 10, from [33], each technique is described in terms of the transmission’s orthogonality to Bob and Eve.

3.1. Convex Optimization

Convex optimization can be used in PLS with other secure-multi antenna techniques to find the most favorable transmit solutions that can effectively make the best out of the performance metrics of the wireless communication system. The objective function f ( x ) to be maximized or minimized may be considered to be the performance metric, for example, secrecy rate, SINR, and secrecy outage probability [7]. Several methods which are commonly used to solve optimization problems in PLS are widely available in the literature [51].
One convex optimization method involves the objective function having quadratic terms, and it is called quadratic programming. Quadratic programming is used in the design problems of nonlinear programming. Some of the common quadratic problems in PLS are power minimization, secure power allocation, and beamforming. Another method used in PLS is semi-definite programming (SDP). It is used to optimize a linear function of variables under linear equality constraints and a non-negativity constraint. Most problems in PLS are usually non-convex, and they must be converted into convex problems using SDP. In turn, an efficient algorithm that is easy to implement is developed in order to obtain optimal performance metrics. One other convex optimization method is the difference of convex functions (DC) programming. In DC programming, the objective function is a subtraction of two convex functions, for instance, secrecy rate maximization. Furthermore, mixed-integer programming is one of the methods utilized. This method is applicable to problems which have discrete and continuous variables. Not least of all, fractional programming is one more method which is directed towards optimization of a ratio of two nonlinear functions. A typical example of its application in PLS is the energy efficiency maximization. Even though convex optimization offers improved secrecy performance in the physical layer than the conventional precoding techniques such as beamforming or zero-forcing, it is more computationally expensive to implement.

3.2. Beamforming

Beamforming is a signal processing technique that is used to transmit signals effectively in intended directions to give a maximum signal difference between the receiver in the intended direction and the one in the unintended direction. Beamforming forms a beam in the direction of the desired recipient to maximize the signal-to-noise power ratio while suppressing the reception or transmission in the direction of the unintended user, Figure 11. This significantly improves the energy efficiency of the system because the energy is transmitted or focused in a particular direction rather than being spread out in a diffused fashion.
Beamforming can be used at both the transmitting and receiving ends to achieve spatial selectivity, i.e., transmit beamforming and receive beamforming. Transmit beamforming steers the transmitted signal towards the intended receiver by finding the best possible channel among all the transmit antennas.
Beamforming is one of the key techniques in PLS and has been widely studied in the literature [49,52,53,54,55,56,57]. A beamforming problem in PLS involves steering the transmitted signal towards the desired user while taking into account an interfering user trying to decode the transmitted information, Figure 11. To demonstrate the beamforming optimization problem in PLS we consider a MISO system shown in Figure 12 in which the transmitter uses transmit beamforming to communicate with K users.
We assume that the transmitter is equipped with N t transmit antennas, and the legitimate user and the eavesdropper each have a single receiving antenna. Therefore, the received signal at legitimate user i and their equivalent SINR are given by
y i = h i H x i + k = 1 k i K h i H x k + n i , SINR = | h i H w i | 2 | k = 1 k i K h i H w k | 2 + σ 2
Similarly, the signal received signal by the i t h eavesdropper and their equivalent SINR can be given by
z i = g i H x i + k = 1 k i K g i H x k + m i , SINR = | g i H w i | 2 | k = 1 k i K g i H w k | 2 + σ 2
where x i C N T × 1 is the transmitted signal symbol of the desired user i with corresponding beamforming vector w i C N T × 1 , h C N T × 1 and g C N T × 1 are the channel vectors of the desired user and eavesdropper respectively, and n i and m i are the corresponding AWG noise vectors for the i t h user and eavesdropper with zero mean and noise power σ 2 . The covariance matrix of the transmitted signal is given by R n = E { x i x i H } . The objective problem of a typical beamforming design scheme is to minimize the interference signal at the desired user so that they receive the transmitted signal with the desired QoS, which is usually described by the constraint of the SINR greater or equal to the given threshold amount of the i t h user, i.e., SINR ρ i . Therefore, the beamforming optimization problem can be written as follows:
min w i | k = 1 k i K h i H w k | 2 + σ 2 s . t . SINR ρ i | | w i | | 2 P T
The solution to the beamforming problem provides the optimal vector w i , which maximizes the SNR of the desired user. This results in focusing the beam in one direction, and the process is referred to as electronic steering. One beamforming vector is assigned to each legitimate user and is matched to their channel. The beamforming design problem in PLS has been well-investigated in many studies in the literature, which can be found in [51,58,59,60,61,62,63,64,64], with the aim of developing algorithms that minimize the interference and also maximize secrecy of transmission. We summarize some of the results from these studies here. One approach which was considered in [58] involves using semi-definite relaxation to obtain the optimal beamforming solution, which minimizes the transmission power subject to SINR constraints. In the paper, they showed that the quadratic optimization problems with non-convex and discontinuous constraints could be recast as SDP with additional constraints, which imposes that the solution matrices must be of rank one. Another study employing semi-definite relaxation was proposed in [59], wherein they used Taylor expansion to solve the optimization problem. The author’s study proved that their proposed algorithm outperformed both the signal-to-leakage-and-noise ratio (SLNR)-based algorithm and zero-forcing beamforming. The SLNR algorithm and zero-forcing were employed to minimize the power leaking to the channels of other users. Another novel approach of path-following algorithm was proposed in [60,61], which used a simple quadratic program to perform iterations for finding the optimal transmit beamformers. The QoS, which is given in terms of both the user’s secrecy throughput and the network secure energy efficiency, is optimized through the use of the obtained beamformers. The algorithm proposed in [60,61] offers a better performance when compared with the existing methods based on zero-forcing beamformers. Authors in [51,51] further studied the algorithm proposed by [60,61] using a different approach. The authors defined secrecy throughput in terms of outage probability. It was found that this approach offered a more practical beamforming design solution. Interference alignment (IA) was proposed by [65,66] as an excellent solution for interference management in multi-user wireless networks to significantly improve the sum-rate. The concept of the IA technique is that the transmitted signals are directed to concentrate the interference in the particular sub-spaces at the unintended receivers, thus opening up interference-free sub-spaces to transmit the desired signal to the intended user. Following the proposal, several research works in [64,67,68,69] have been conducted to develop IA algorithms for directing the interference in a manner that is detrimental to the illegitimate receiver while ensuring that the legitimate receiver is not severely affected. To enhance the desired signal gain and suppress the undesired interference and the noise signal, authors in [63] employed spatial degrees of freedom.

3.3. Artificial Noise (AN) Precoding

The notion of using artificial noise to enhance security in the physical layer was first proposed in [70]. They identified AN-based transmission as an effective technique that can be deployed in PLS to ensure secure communication in wireless networks. The technique involves deliberately degrading the quality of the channel of the eavesdropper by generating an interference signal, which is used to interrupt their eavesdropping capabilities. In the AN precoding scheme, the transmitter Alice divides the transmission power between transmitting the information to the intended recipient, Bob, and transmitting the noise signal towards the eavesdropper, Eve, is shown in Figure 13.
Generating AN depends on the transmitter’s knowledge of the eavesdroppers’ channel state information. In a case where the eavesdropper’s CSI is unknown, the isotropic AN is generated. The generated AN is designed such that it lies in the nullspace of the intended receiver and directed in the range space of the unintended receivers. This is done to cancel out its effect at the intended receiver such that only the eavesdropper’s channel is degraded [70]. Another form of AN generation is called spatially selective AN, which is applicable in the event that the transmitter knows the the eavesdropper’s CSI [71]. The AN generation technique’s major strength is that the provided secrecy scales well with the SNR since an increase in SNR at Eve will increase the received AN power along with the message power. The conventional AN scheme can be represented in general as follows:
x = w s a + v s j ,
where x is the signal transmitted by Alice. The source information is denoted by s a and s j denotes the AN jamming signal, which is chosen to be independent of the source information, i.e., s a s j . Beamforming vectors for the information and jamming signals are represented by w and v , respectively. Therefore, the signals received by Bob and Eve are given by Equations (23) and (24), respectively.
y B = h B H w s a + g B H v s j + n B
y E = h E H w s a + g E H v s j + n E
where h B H and g E H denote the channel responses of Alice–Bob and Alice–Eve, respectively. The independent, identically distributed complex Gaussian noise for Bob and Eve with zero mean and variance σ 2 are denoted by n B and n E , respectively. The corresponding secrecy rate is given by
R = log 2 1 + | h B H w | 2 | g B H v | 2 + σ 2 log 2 1 + | h E H v | 2 | g E H v | 2 + σ 2
A novel approach of the AN scheme that offers better secrecy rate performance, where the jamming signal is generated to be dependent on the information signal, was presented in [72]. The scheme significantly improved the signal strength at Bob and, at the same time, canceled the received signal at the eavesdropper. In the scheme the signal received by Bob and Eve can be shown by
y B = h B H w s a + g B H v s a + n B
y E = h E H w s a + g E H v s a + n E
Therefore, the secrecy rate is now given by
R = log 2 1 + | h B H w + g B H v | 2 σ 2 log 2 1 + | h E H v + g E H v | 2 σ 2
The optimization problem in the AN precoding scheme is to find an optimal power allocation method for the artificial noise, which ensures maximum secrecy of the legitimate transmission. A comprehensive summary of several methods proposed in the literature for solving the AN precoding optimization is presented below.
The classical AN injection schemes are investigated broadly in the literature, and their application in MIMO systems has been shown as promising to exploit in future wireless networks. In [73], the authors demonstrated an approach capable of guaranteeing secrecy without knowledge of the eavesdropper’s CSI. In [73], two schemes were proposed for AN generation in PLS. In the first scheme, they proposed a scheme which was based on MIMO technology, while the second scheme used a single transmitter antenna. For the latter scheme, amplifying relays were used to mimic the effects of multiple antennas. Moreover, in the second scheme the transmitter and the intended receiver both transmit independent AN signals to the helper nodes. The eavesdropper receives differently weighted versions of the AN signals from the transmitter and the receiver. The two transmission schemes proposed in the paper transmit both AN and information-bearing signals together. However, the paper does not necessarily find an optimal power allocation for the transmission of message signals and minimal power allocated to the AN.
To tackle the shortfall indicated in [73], researchers [74] proposed an AN-assisted secure MIMO-OFDM system to improve the security of the legitimate transmission and find an optimal power allocation scheme. AN precoding scheme is proposed where Alice divides her power between transmitting a message to Bob and transmitting AN into Bob’s nullspace. Assuming Bob and Eve’s channels are independently faded, Eve will see some of the AN in her range space. The authors determined the minimum power consumption that satisfies the legitimate transmission quality with the largest residual power in generating AN. They use convex optimization solvers to find the optimal solution to this problem. This technique’s major strength is that the provided secrecy scales well with SNR, since an increase in SNR at Eve will increase the received AN power along with the message power [23].
AN precoding was also used in [50] to implement security in the physical layer. AN was used as a transmit strategy over Bob’s null space with the intention of improving the secrecy of the Alice–Bob channel without affecting its quality. The authors examine three approaches of generating AN. Firstly, the minimum power was used for the information-bearing signal, and the rest of the transmit power was distributed to the AN. Secondly, the power was evenly distributed between the transmit signal and the AN signal in order to maximize ergodic secrecy capacity. Lastly, the AN power was progressively varied in order to understand its effects on the secrecy confidence level. Eve was modeled to use the minimum mean-square error (MMSE) as an optimal receiver structure to maximize the SNR. Eve’s capability to compromise the secrecy of the main link was defined as the SNR difference between the intended receiver and the eavesdropper. It was shown in [50] that when an eavesdropper uses zero-forcing to mitigate the interference introduced by the artificial noise transmission with a large number of receiving antennas and knows some of the main channel’s CSI, the secrecy of the system can be compromised.

3.4. Zero-Forcing (ZF) Precoding

Zero-forcing precoding, or null-steering, is a method of spatial signal processing in which multiple antennas at the transmitter can completely cancel out or null the multiple user interference signals in a wireless communication network. The ZF method is based on canceling out the interference at the intended receiver in multiple user communications. This can be done by using the eavesdropper’s CSI to transmit a message orthogonal to the eavesdropper, which is equivalent to steering a null in the direction of the eavesdropper, illustrated in Figure 10b.
The design problem of ZF precoding has been presented in [75]. The iterative algorithm presented in [75] was developed to obtain the optimal transmit and receive filters to cancel out the interference. The designed filters minimizes the mean-square error (MSE) between the legitimate parties whilst guaranteeing and maintaining a certain eavesdropper MSE level, subject to the power constraint. Nonetheless, the ZF precoding methods presented have been demonstrated to perform well or achieve the highest secrecy system capacity when full knowledge of CSI is available at the transmitter, which is a highly unlikely case. Therefore, with limited CSI at the transmitter, the performance of ZF precoding is very poor, which makes it less applicable.

3.5. Cooperative Jamming

Cooperative jamming is one of the techniques proposed to implement security in the physical layer to curb eavesdropping in wireless networks. A cooperative jamming network comprises the source that transmits its message to the intended receiver and a relay node that transmits a jamming signal to degrade the eavesdropper’s channel and improve the secrecy rate. Cooperative jamming was derived from the conventional technique for user cooperation known as cooperative relaying. However, cooperative relaying is distinctive from cooperative jamming because it improves the security by enhancing channel quality between the transmitter and legitimate receiver. Some of the examples of cooperative relaying are decode-and-forward (DF) and amplify-and-forward (AF) schemes. A system model of a typical cooperative jamming scheme is shown in Figure 14, which consists of the transmitter Alice, a single trusted relay, an intended receiver Bob, and and eavesdropper Eve. Bob transmits a message signal s using a transmit power P A , and the relay transmits a jamming signal z with a weighting vector w , simultaneously.
The signal received by Bob and Eve is given by Equations (29) and (30), respectively
y B = P A h A B s + w H h R B z + n B
y E = P A h A E s + w H h R E z + n E
where h A B is the Alice–Bob channel, h R B is the relay–Bob channel, h A B is the Alice–Bob channel, h A B is the Alice–Bob channel, h R E is the relay–Eve channel, h A E is the Alice–Eve channel, and n B and n E are the AWG noise with variance σ 2 at both Bob and Eve, respectively. The corresponding secrecy rate is given by
R = log 2 1 + P A | h A B | 2 | w H h R B | 2 + σ 2 log 2 1 + P A | h A E | 2 | w H h R E | 2 + σ 2
The problem of secrecy maximization has been extensively studied in the literature [76,77,78,79,80,81,82,83]. Authors in [76,77] investigated the problem of secrecy rate maximization of a secure wireless communication system in the presence of multiple eavesdroppers. Hu et al. in [79] studied cooperative jamming for PLS enhancement in IoT, specifically considering a downlink transmission problem to tackle multiple passive and non-colluding eavesdroppers. The current research in cooperative jamming is focused towards integrating cooperative jamming with the current technologies in 5G and 6G, which can be found in [80,81,82,83,84]. In [80], they used joint cooperative jamming and secure channel training solutions to safeguard a two-user power domain non-orthogonal multiple access (NOMA) system against eavesdropping attacks coming simultaneously from inside and outside of the network. Another interesting study in [81] uses cooperative jamming to implement security for industrial wireless networks with mobile users and eavesdroppers. In the paper they employed an edge computing device to intelligently select an optimal cooperative node.

3.6. Space-Time Coding (STC)

In 1998, Alamouti proposed a space-time block code (STBC) to achieve transmitter diversity [85]. Space-time coding is based on the Alamouti scheme. In the conventional transmit schemes, diversity techniques were applied at the receiver using algorithms such as the MRC. These techniques require knowledge of the channel between the transmitter and the receiver to derive the optimal beamforming weights. However, Alamouti showed that it is possible to transmit data using multiple antennas and perform separation at the receiver using a single receiving antenna, which gives the same diversity gains. To provide diversity using the Alamouti scheme, the time and space blocks are used to encode the information signal. The Alamouti space-time encoder takes a block of two modulated symbols to create an encoding matrix denoted by
C = s 1 s 2 * s 2 s 1 * ,
where s 1 and s 2 are the modulated symbols mapped to two transmit antennas in two transmit time slots [86]. The columns of C represent timeslots, and the rows represent different transmit antennas. Studies by [87,88] showed that STBC may be employed to provide secure communication for space-time systems while lowering the eavesdropper’s order of diversity. A technique depicted in Figure 15 to achieve a secure STBC without the need to estimate CSI at the transmitter was proposed in [87]. The proposed technique uses mutual received signal strength indicator measurements to generate a pseudo-random sequence used to secure communication. In this model, at each transmit antenna, random phase rotations θ 1 and θ 2 are applied to the symbols. Each phase shift is applied for one code duration. For a single codeword, the transmitter encodes source information s 1 and s 2 as
X = s 1 e j θ 1 s 2 * e j θ 2 s 2 e j θ 1 s 1 * e j θ 2
Therefore, Bob receives the signal given by
z = X h + n z = H + ( θ 1 , θ 2 ) s + n ˜ z 1 z 2 * = h 1 e j θ 1 h 2 * e j θ 2 h 2 e j θ 1 h 1 * e j θ 2 s 1 s 2 + n 1 n 2 *
Using the MRC algorithm, the source information can be estimated by
s ˜ = H + ( θ 1 , θ 2 ) z
Eve’s received signal is given by y, which can be also be decomposed to y ˜ as
y = X g + e y ˜ = G + ( θ 1 , θ 2 ) s + e ˜
where H + and G + are the pseudo-inverse of H and G , respectively. The transmitter manipulates the transmitted symbols by generating and applying the maximum number of phase rotations so that the eavesdropper is completely denied access to the source information. The strength of this technique is that improved security is achieved without the knowledge of the CSI, unlike in the preceding security schemes which assumes that the CSI is available. However, it was shown in [88] that the security of the transmitted signal is compromised if the eavesdropper can obtain one of the space angles and is in close proximity to Bob. To avoid this, the authors proposed a technique that was able to achieve zero diversity for the eavesdropper even under enhanced receive diversity. This was achieved through signal and space rotations.
In Figure 16a we demonstrate the BER performance of the beamforming and AN schemes. The figure illustrates that the eavesdropper’s channel has the worst bit error rate because it is corrupted by the AN signal; it is followed by a single-input single-output (SISO) system, which does not receive diversity from beamforming. Lastly, the 1 × 2 single-input multiple-output (SIMO) and 2 × 1 multiple-input single-output (MISO) systems receive the signal with better BER because of beamforming. The achievable secrecy rates of different precoding schemes are shown in Figure 16b. In particular, in a MIMO scheme, six transmit antennas, the intended receiver, and eavesdropper are each equipped with two receive antennas. In the figure we have the same MIMO configurations for no beamforming and use of beamforming. Lastly, we introduce an AN signal. The figure confirms that the use of AN indeed improved the secrecy rate of the communication network compared to beamforming only or no beamforming used.

4. Challenges and Promising PLS Solutions

4.1. Challenges and Limitations in PLS

The individual PLS techniques discussed above have their own different pros and cons. The major challenge is the ability to implement an optimal secure transmit precoding algorithm that can maximize the achievable secrecy rates without any counter cost. We outline some of the notable challenges in detail, and show how they are addressed, in the subsequent section.
One problem prevalent in PLS techniques, specifically beamforming, is the leakage of transmitted signals into the eavesdropper’s subspace. In beamforming, the transmitted signal is steered in the desired direction to the legitimate receiver. The transmit power is highly concentrated in the main lobe beam, but some of the power is lost in the minor side lobes. This leakage makes it possible for eavesdroppers who are in the vicinity to decode the transmitted signal since the finite number of transmit antennas could only provide a limited amount of spatial directivity [52]. It has also been shown that transmit beamforming focuses only on enhancing the quality of the main channel [89]. Beamforming does not take into consideration the possibility that the eavesdropper can have a favorable channel when compared to the main channel. Therefore, it can be concluded that even though the design of an optimal beamforming vector for the intended receiver is fairly easy, it is cumbersome and computationally expensive to come up with a perfect balance between getting rid of signal leakage and obtaining the optimal signal power.
It has been shown in Section 3.3 that AN precoding offers provable security in the physical layer. However, this comes at an additional cost of extra energy requirement. The approach relies on the generation of AN signals. A fraction of the power used for transmission of information signal power is used to generate the AN signal. This consumes the transmission power which could have been used to improve the channel capacity and receiver’s SNR. Therefore, there is a trade-off between capacity and secrecy rate capacity by means of the transmit power available. On the other hand, there is also a higher power consumption in both convex optimization and zero-forcing, owing to the computational requirements.
PLS precoding schemes make an assumption of the knowledge or availability of the unintended user’s CSI. This is the fundamental limitation of such PLS techniques. In practice it is very difficult for the transmitter to obtain the CSI of the eavesdropper. This is due to the fact that the eavesdropper does not naturally cooperate with the transmitter to send CSI feedback. Therefore, this assumption is entirely valid for theoretical systems. Most PLS secure precoding techniques assume that an eavesdropper has limited resources. To be more specific, the eavesdropper is commonly assumed to have a smaller number of antennas when compared to those of the intended receiver. Even though it has been proposed that secrecy against an eavesdropper with more antennas than the transmitter is possible in [90], such a solution requires additional power assumptions. Hence, secrecy against resourceful eavesdroppers remains a major challenge in PLS precoding.

4.2. Promising PLS Solutions

4.2.1. Simultaneous Wireless Information and Power Transfer (SWIPT)

The phenomenon of simultaneous wireless information and power transfer was derived from the idea that RF signals can carry energy that is used for transmitting the information [91]. SWIPT has been identified as a sustainable proposition for harvesting of energy from the radio frequency (RF) signals, which in turn is supplied to finite-powered wireless communication devices including wireless sensors and electronic gadgets [92,93]. As it can be seen in Figure 17, the transmitter transmits the information signal to the information receivers and also transfers the power to the energy receivers responsible for harvesting the energy [94]. However, it has been shown that in some cases the energy-harvesting receivers might have a better channel for receiving the information aimed at the information receivers, and they might jeopardize the security of the transmitted information. Additionally, efficient methods are also required for improving the efficiency of energy-harvesting receivers to enhance the amount of energy that can be harvested. In order to address these challenges, PLS has been employed on SWIPT in many different studies [92,93,94,95,96,97,98,99]. The authors of [94] investigated SWIPT for MISO secrecy channel and considered transmit beamforming for two cases, with AN and without AN, with the aim of maximizing the secrecy rate as well as the harvested energy. Boshkovska et al. in [93] proposed a robust resource allocation scheme jointly responsible for time allocation and power control, taking into consideration uncertainty regarding the CSI. In [100], the authors consider a secure beamforming design for SWIPT in heterogeneous cellular networks which are formed by a single macrocell consisting of multiple macrocell users and a single femtocell comprising a single information receiver and multiple eavesdroppers. They use semi-definite programming and proposed an iterative algorithm to maximize the secrecy rate at information receivers while guaranteeing the SINR requirement recorded at each macrocell user.

4.2.2. Machine Learning (ML)-Based Channel Estimation

The development of channel estimation techniques has been investigated in [101,102,103,104]. From these investigations it is evident that tackling imperfect CSI in PLS is one of the problems still open for research. The conventional channel estimation methods based on channel modeling have been proved to be insufficient for providing accurate and timely CSI. There has been a recent surge in research directed towards the feasibility of tackling some of the various communication problems using ML [101]. Most of the research is devoted towards developing efficient and reliable algorithms for channel estimation in communication networks. The performance of the existing channel estimation algorithms can be augmented through the use of ML to achieve close-to-optimal algorithms with reduced complexity on the implementation [47]. ML has emerged as an effective tool for channel estimation in wireless communication systems, especially under some imperfect environments.

4.2.3. Unmanned Aerial Vehicle (UAV)

Drones or UAV-based communication technology has been thoroughly studied and adopted by the 3GPP standard [105]. A study on UAV systems that highlighted and gave an overview of the latest advances and current state of research in the field of PLS was conducted [105]. UAV systems have been envisaged to form an integral part of future wireless communication applications due their dynamic, flexible, and flying nature. It was shown in [106] that, due to their ability to reach higher altitudes, they usually have dominant LOS channels with the ground nodes. This capability can be used to provide confidentiality to the legitimate receivers against the eavesdroppers. This can be done by deploying UAVs to launch more effective jamming signal attacks to terrestrial eavesdroppers, as shown in Figure 18. The conventional cooperative jamming schemes make an assumption that the locations of terrestrial jammers are fixed, which might compromise the secrecy of the system if the jammers are located far away from the eavesdroppers, and is also not practical as it makes an assumption of perfect CSI of the jammer to eavesdropper channel [107]. Authors in [107] deployed a UAV-based system as a jammer to improve the secrecy rate of a ground wiretap channel. Wu et al. [15] considered a scenario in which a UAV is equipped with an air-to-ground jammer and a ground communication network comprising a legitimate transmitter–receiver pair and an eavesdropper. They proposed an iterative algorithm to maximize the achievable average secrecy rate of a wireless communication system.

4.2.4. Intelligent Reflecting Surface (IRS)

Future wireless networks are expected to employ intelligent and software re-configurable functionalities to enable safe and secure communication [108]. Intelligent reflective surfaces have been identified as a solution to create a controllable wireless environment. According to [109], an IRS is a software-controlled artificial surface that can be programmed to alter its electromagnetic response. An IRS can change the attenuation and scattering of the incident electromagnetic wave so that it can propagate in the desired way towards the intended receiver by adjusting the reflecting coefficients. Authors in [110] discussed two methods of deploying IRS, namely (a) energy focusing and (b) energy nulling. Energy focusing employs a beamforming technique by using the IRS reflecting elements to adjust the phases of the signal coming from the transmitter, so that it is focused towards one intended user. Meanwhile, energy nulling uses the IRS to perform destructive reflection by adjusting the phases of the scattered signals to null out the signal at the unintended recipients [110]. One application of IRS is in holographic beamforming, as shown in [111]. Holographic beamforming is a dynamic beamforming technique that uses a software-defined antenna (SDA).
To demonstrate the application of IRS in PLS, we consider a communication setup of a MISO shown in Figure 19 from [14]. The system comprises a single transmitter, Alice, with N antennas; an intended receiver, Bob; and one eavesdropper, Eve. Both Bob and Eve have single receive antennas. The system is also made of an IRS which has L reflecting elements. The received signals at Bob and Even are given by
y B = h I B H Θ H A I x + h A B H x + n B
y E = h I E H Θ H A I x + h A E H x + n E
where h I B is the IRS–Bob channel, Θ = diag { [ e ( j ϕ 1 ) , , e ( j ϕ i ) , , e ( j ϕ L ) ] } is the diagonal with ϕ i denoting the phase shift of the i-th reflecting element of the IRS, H A I is the Alice–IRS channel, x is the transmitted signal with maximum transmit power, P, h A B H is the Alice–Bob channel, and n B is the AWGN noise at Bob with variance σ n , B 2 . Similarly, subscript { · } E denotes parameters with relevance to Eve.
The achievable secrecy rate is given by
R s = R b R e = log 2 1 + h I B H Θ H A I h A B H P H A I H Θ H h I B + h A B σ n , B 2 log 2 1 + h I E H Θ H A I h A E H P H A I H Θ H h I E + h A E σ n , E 2
The performance of the secrecy rate in Equation (39) is illustrated by the simulation shown in Figure 20. The secrecy rate is shown by varying the distance between Alice and Bob. Figure 20 clearly shows that the performance of a PLS scheme without an IRS yields a lower secrecy rate with an increasing distance between Bob and Alice. On the other hand, an improved secrecy rate can be achieved when IRS is introduced, as shown in the above-mentioned figure. However, it should be noted that optimization techniques may significantly and efficiently enhance the secrecy rate, as shown in [14].

4.2.5. Visible Light Communication (VLC)

VLC is one of the technologies which has emerged with the potential of providing omnipresent access to wireless broadband for indoor settings [10,112]. This is enabled by some of its unique characteristics, which include line-of-sight propagation, inability of light waves to penetrate opaque surface, technological advancements, and economical costs of lighting equipment such as solid-state light-emitting diodes (LEDs). The aforementioned characteristics are highly useful in PLS since VLC signals are confined inside the building’s walls, hence an inherently secure communication which prevents eavesdropping for outdoor eavesdroppers. VLC schemes are realized through the use of a number of LED arrays and photodetectors (PDs). The LED arrays serve a dual purpose of offering illumination and data transmission simultaneously while the PDs are used as receivers. The most common method of modulation in VLC is the intensity modulation and direct detection (IM/DD). Unlike in RF systems, the modulating signals in VLC systems must have real, non-negative values [113]. To show the concept of VLC, Figure 21 depicts the illumination and power distribution using various arrays made up of red-green-blue (RGB) LEDs.
Horizontal illuminance of a light fixture made up of an LED array of 50 × 50 RGB LED chips with a semi-angle of 60 ° is depicted in Figure 21a. Each LED chip has a Lambertian radiation pattern and total luminous intensity of 33.74 cd . As seen in Figure 21b, increasing the number of LED arrays leads to an increased intensity and luminescence at all points of the room. Consequently, this results in elevated optical power, as seen in Figure 21d. Optical power is crucial for data transmission because direct detection depends on the amount of power which impinges the PD. Due to incoherently distributed light intensity, the amount of optical power produced by the LED arrays decreases logarithmically with increasing distance.

4.2.6. PLS in Satellite Communication

Satellite communication is being more incorporated into current terrestrial wireless communication networks mainly because of its features, which include wide-area coverage and high bandwidth. Some noteworthy applications of satellite communication include, but are not limited to, military operations, TV broadcast, and internet access. However, their broadcast nature and ability to provide wide coverage area make them more vulnerable to eavesdropping. Traditionally, security in satellite communication is implemented in the upper layers of the protocol stack by means of encryption. PLS has been identified as an alternative to augment the current cryptography security measures [21]. We demonstrate a PLS concept in satellite using a system model shown in Figure 22 and derive the optimization problem.
Suppose that the satellite transmits the signal s i intended for the ith legitimate user with average power E [ | s i | 2 ] = 1 . The transmitted signal has a weighted beamforming vector given by w i C N × 1 . Therefore, the overall transmitted signal is given by
x = i = 1 M w i s i
The signals received by the ith legitimate and ith eavesdropper are given by Equations (41) and (42), respectively.
y u s e r i = h i H w i s i + m i M h i H w m s m + n i
y e i = g i H w i s i + m i M g i H w m s m + n e i
where h i C N × 1 denotes the channel gain vector between the ith intended user and the satellite, g i C N × 1 denotes the channel gain vector between the ith eavesdropper and the satellite, and n i and n e i are assumed to be zero-mean AWG noise of the ith intended user and the ith eavesdropper, respectively. The achievable secrecy rate of the ith intended user is given by
R s = log 2 1 + | h i H w i | 2 m i M | h i H w m | 2 + σ i 2 log 2 1 + | g i H w i | 2 m i M | g i H w m | 2 + σ e i 2
The typical optimization problem of interest is to maximize the achievable secrecy rate and can be written mathematically as follows:
min w i R s s . t . m = 1 M | | w i | | 2 P T
where P T is the maximum transmit power of the satellite. The authors in [115] studied the problem of minimizing the transmit power on a multi-beam satellite while fulfilling the minimum per user secrecy rate. They further proposed an iterative algorithm to jointly optimize the transmission power and the beamforming vector by completely eliminating the co-channel interference and perfectly nulling out the received signal at the eavesdropper. Kalantari et al. in [116] also used PLS to address the issue of confidentiality in bidirectional satellite communication based on network coding. They designed the optimal beamforming weight vector which maximizes the sum secrecy rate by using semi-definite programming.

5. Conclusions

We have provided a comprehensive review of PLS in wireless networks based on optimization techniques. We have also shown that PLS is an auspicious technology for strengthening the confidentiality and secrecy of information transmission in both existing and emerging wireless networks, which can be used to augment conventional cryptographic methods. To emphasize the benefits of PLS, we first compared conventional encryption using cryptography and PLS. This work mainly focused on the provision of a comprehensive review of both the design and the optimization of PLS schemes. We also discussed some of the main challenges facing PLS and outlined some of the promising solutions to these problems and how they can benefit future wireless communication networks. In short, we have shown that PLS is a very promising technology in ensuring safe and secure wireless communication.

Author Contributions

Conceptualization, A.S. and B.B.; methodology, A.S.; software, A.S. and G.A.M.; validation, A.S. and G.A.M.; writing—original draft preparation, A.S.; writing—review and editing, A.S., G.A.M., T.M.L.J. and L.M.; supervision, B.B. and J.M.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Botswana International University of Science and Technology grant number R00067 and S00081. The APC was funded by R00067 and S00081.

Acknowledgments

We would like to acknowledge the Botswana International University of Science and Technology (BIUST) for research funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ANArtificial noise
AWGNAdditive white Gaussian noise
BERBit error rate
CSIChannel state information
IRSIntelligent reflecting surface
ITUInternational telecommunication Union
MIMOMultiple-input multiple-output
OFDMOrthogonal frequency division multiplexing
PLSPhysical layer security
QoSQuality of service
SINRSignal-to-interference-plus-noise ratio
STBCSpace-time block code
UAVUnmanned aerial vehicle
URLLCUltra-reliable low latency communication
WIPTWireless information and power transfer
ZFZero-forcing

References

  1. International Telecommunication Union. Statistics. Available online: https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx (accessed on 13 November 2019).
  2. Steve. 2019 Official Annual Cybercrime Report. Technical Report. Available online: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf (accessed on 13 November 2019).
  3. Zorgui, M. Wireless Physical Layer Security: On the Performance Limits of Secret-Key Agreement. Masters’s Thesis, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia, 2015. [Google Scholar]
  4. Campagna, M.; Chen, A.L.; Dagdelen, Ö.; Darmstadt, T.U.; Ding, J.; Fernick, J.K.; Hayford, D.; Jennewein, T.; Lütkenhaus, N.; Mosca, M.; et al. Quantum Safe Cryptography and Security an Introduction, Benefits, Enablers and Challenges Quantum Safe Cryptography and Security Authors & Contributors Quantum Safe Cryptography and Security 2. Technical Report. 2015. Available online: https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf (accessed on 12 November 2019).
  5. Li, H.; Wang, X. Physical-Layer Security Enhancement in Wireless Communication Systems Part of the Systems and Communications Commons Recommended Citation. Technical Report. 2013. Available online: https://core.ac.uk/download/pdf/61640146.pdf (accessed on 13 November 2019).
  6. Mukherjee, A.; Ali, S.; Fakoorian, A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  7. Wang, D.; Bai, B.; Member, S.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 1878–1911. [Google Scholar] [CrossRef] [Green Version]
  8. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
  9. Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities. IEEE Internet Things J. 2019, 6, 8169–8181. [Google Scholar] [CrossRef]
  10. Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Safari, M.; Assi, C.; Haas, H. Physical Layer Security for Visible Light Communication Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 1. [Google Scholar] [CrossRef] [Green Version]
  11. Wu, Q.; Zhang, R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network. IEEE Commun. Mag. 2020, 58, 106–112. [Google Scholar] [CrossRef] [Green Version]
  12. Guan, X.; Wu, Q.; Zhang, R. Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial Noise Helpful or Not? IEEE Wirel. Commun. Lett. 2020, 1. [Google Scholar] [CrossRef] [Green Version]
  13. Abeywickrama, S.; Zhang, R.; Wu, Q.; Yuen, C.; Zhang, R.; Wu, Q.; Yuen, C. Intelligent Reflecting Surface: Practical Phase Shift Model and Beamforming Optimization. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar]
  14. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [Google Scholar] [CrossRef] [Green Version]
  15. Wu, Q.; Mei, W.; Zhang, R. Safeguarding wireless network with UAVs: A physical layer security perspective. IEEE Wirel. Commun. 2019, 26, 12–18. [Google Scholar] [CrossRef] [Green Version]
  16. Li, B.; Fei, Z.; Zhang, Y.; Guizani, M. Secure UAV communication networks over 5G. IEEE Wirel. Commun. 2019, 26, 114–120. [Google Scholar] [CrossRef]
  17. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2019, 6, 2241–2263. [Google Scholar] [CrossRef] [Green Version]
  18. Vázquez, M.Á.; Pérez-Neira, A.; Christopoulos, D.; Chatzinotas, S.; Ottersten, B.; Arapoglou, P.D.; Ginesi, A.; Tarocco, G. Precoding in multibeam satellite communications: Present and future challenges. IEEE Wirel. Commun. 2016, 23, 88–95. [Google Scholar] [CrossRef] [Green Version]
  19. Radhakrishnan, R.; Edmonson, W.W.; Afghah, F.; Rodriguez-Osorio, R.M.; Pinto, F.; Burleigh, S.C. Survey of Inter-Satellite Communication for Small Satellite Systems: Physical Layer to Network Layer View. IEEE Commun. Surv. Tutor. 2016, 18, 2442–2473. [Google Scholar] [CrossRef] [Green Version]
  20. Boero, L.; Bruschi, R.; Davoli, F.; Marchese, M.; Patrone, F. Satellite Networking Integration in the 5G Ecosystem: Research Trends and Open Challenges. IEEE Netw. 2018, 32, 9–15. [Google Scholar] [CrossRef]
  21. Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical-Layer Security in Space Information Networks: A Survey. IEEE Internet Things J. 2020, 7, 33–52. [Google Scholar] [CrossRef]
  22. Gençoğlu, M.T. Importance of Cryptography in Information Security. IOSR J. Comput. Eng. 2019, 21, 65–68. [Google Scholar] [CrossRef]
  23. Shiu, Y.S.; Chang, S.Y.; Wu, H.C.; Huang, S.C.; Chen, H.H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  24. Siddiqi, M.A.; Yu, H.; Joung, J. 5G Ultra-Reliable Low-Latency Communication Implementation Challenges and Operational Issues with IoT Devices. Electronics 2019, 8, 981. [Google Scholar] [CrossRef] [Green Version]
  25. Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730. [Google Scholar] [CrossRef] [Green Version]
  26. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  27. Li, J. A Critical Review of Physical Layer Security in Wireless Networking. Master’s Thesis, University College London, London, UK, 2015. [Google Scholar]
  28. Bassily, R.; Ekrem, E.; He, X.; Tekin, E.; Xie, J.; Bloch, M.R.; Ulukus, S.; Yener, A. Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Process. Mag. 2013, 30, 16–28. [Google Scholar] [CrossRef]
  29. Wang, L. Physical Layer Security in Wireless Cooperative Networks; Wireless Networks; Springer International Publishing: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
  30. Bloch, M.; Barros, J. Physical-layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011; p. 329. [Google Scholar]
  31. Rohokale, V.M.; Prasad, N.R.; Prasad, R. Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art. J. Cyber Secur. Mobil. 2012, 1, 227–249. [Google Scholar]
  32. Chen, Y.; Yang, Y.; Yi, W. A cross-layer strategy for cooperative diversity in wireless sensor networks. J. Electron. 2012, 29, 33–38. [Google Scholar] [CrossRef]
  33. Ryland, K.S.; Clancy, T.C.; Buehrer, R.M.; Dietrich, C.B. Software-Defined Radio Implementation of Two Physical Layer Security Techniques. Technical Report. 2017. Available online: https://vtechworks.lib.vt.edu/bitstream/handle/10919/82055/Ryland_KS_T_2018.pdf?sequence=1&isAllowed=y (accessed on 8 November 2019).
  34. Shannon, C.E. Communication Theory of Secrecy Systems. Technical Report. 1949. Available online: http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf (accessed on 14 November 2019).
  35. Wang, H.M.; Zheng, T.X. Physical Layer Security in Random Cellular Networks; Springer Briefs in Computer Science; Springer: Singapore, 2016. [Google Scholar] [CrossRef]
  36. Hyadi, A.; Rezki, Z.; Alouini, M.S. An Overview of Physical Layer Security in Wireless Communication Systems with CSIT Uncertainty. IEEE Access 2016, 4, 6121–6132. [Google Scholar] [CrossRef] [Green Version]
  37. Wei, Y.; Zeng, K.; Mohapatra, P. Adaptive wireless channel probing for shared key generation. In Proceedings of the IEEE INFOCOM, Shanghai, China, 30 July 2011; pp. 2165–2173. [Google Scholar] [CrossRef]
  38. Harrison, W.K.; Sarmento, D.; Vilela, J.P.; Gomes, M. Analysis of Short Blocklength Codes for Secrecy. Technical Report. Available online: https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-018-1276-1 (accessed on 26 February 2020).
  39. Csiszar, I.; Kijrner, J. Broadcast Channels with Confidential Messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  40. Blahut, R.E.; Costello, D.J., Jr.; Maurer, U.; Mittelholzer, T. Communications and Cryptography: Two Sides of One Tapestry; Symposium on Communications, C; Kluwer Academic Publishers: Dordrecht, The Netherlands, 1994; pp. 270–285. [Google Scholar]
  41. Safavi-Naini, R.; Canetti, R. Advances in Cryptology—CRYPTO 2012. In Proceedings of the 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2012; Springer: Berlin, Germany, 2012; p. 888. [Google Scholar]
  42. Zhou, X.S.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2016; p. 295. [Google Scholar]
  43. Lin, P.H.; Jorswieck, E. Multiuser Channels with Statistical CSI at the Transmitter: Fading Channel Alignments and Stochastic Orders, an Overview. Entropy 2017, 19, 515. [Google Scholar] [CrossRef] [Green Version]
  44. Migliore, M.; Pinchera, D.; Lucido, M.; Schettino, F.; Panariello, G. MIMO Channel-State Estimation in the Presence of Partial Data and/or Intermittent Measurements. Electronics 2017, 6, 33. [Google Scholar] [CrossRef] [Green Version]
  45. What Are MIMO, MRC, Beamforming, STBC, and Spatial Multiplexing? WLAN Troubleshooting Guide—Huawei. Available online: https://support.huawei.com/enterprise/en/doc/EDOC1000060368/d9adbe5a/what-are-mimo-mrc-beamforming-stbc-and-spatial-multiplexing (accessed on 25 January 2020).
  46. Mohaisen, M.; Wang, Y.; Chang, K. Multiple Antenna Technologies. Technical Report. Available online: https://arxiv.org/ftp/arxiv/papers/0909/0909.3342.pdf (accessed on 8 November 2019).
  47. Björnson, E.; Sanguinetti, L.; Wymeersch, H.; Hoydis, J.; Marzetta, T.L. Massive MIMO is a Reality-What is Next? Five Promising Research Directions for Antenna Arrays. Digit. Signal Process. 2019, 94, 3–20. [Google Scholar] [CrossRef]
  48. Kapetanovi, D.; Zheng, G.; Rusek, F. Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks. IEEE Commun. Mag. 2015, 53, 21–27. [Google Scholar] [CrossRef] [Green Version]
  49. Yaacoub, E.; Al-Husseini, M. Achieving physical layer security with massive MIMO beamforming. In Proceedings of the 2017 11th European Conference Antennas Propagation, EUCAP 2017, Paris, France, 19–24 March 2017; pp. 1753–1757. [Google Scholar] [CrossRef]
  50. Romero-Zurita, N.; Ghogho, M.; McLernon, D. Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation. Phys. Commun. 2011, 4, 313–321. [Google Scholar] [CrossRef]
  51. Sheng, Z.; Tuan, H.D.; Sheng, Z.; Tuan, H.D.; Duong, T.Q.; Vincent Poor, H. Beamforming Optimization for Physical Layer Security in MISO Wireless Networks. IEEE Trans. Signal Process. 2018, 66, 3710–3723. [Google Scholar] [CrossRef] [Green Version]
  52. Björnson, E.; Bengtsson, M.; Ottersten, B. Optimal Multiuser Transmit Beamforming: A Difficult Problem with a Simple Solution Structure. IEEE Signal Process. Mag. 2014, 31, 142–148. [Google Scholar]
  53. SANKAR, K. Maximal Ratio Combining (MRC). 2008. Available online: http://www.dsplog.com/2008/09/28/maximal-ratio-combining/ (accessed on 27 January 2020).
  54. Mohammadkhani, R. Lecture 13: MIMO Transceivers Part II. Technical Report. 2017. Available online: https://eng.uok.ac.ir/mohammadkhani/courses/Array_MIMO/L13-MIMO%20Tx-Rx-part%20II.pdf (accessed on 29 January 2020).
  55. Sidiropoulos, N.D.; Member, S.; Davidson, T.N.; Luo, Z.Q. Transmit Beamforming for Physical-Layer Multicasting. IEEE Trans. SIGNAL Process. 2006, 54. [Google Scholar] [CrossRef]
  56. Ghogho, M.; Swami, A. Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers. In Proceedings of the 2011 IEEE International Conference on Communications Workshops (ICC), Kyoto, Japan, 5–9 June 2011. [Google Scholar] [CrossRef]
  57. Khisti, A.; Wornell, G.W. Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar]
  58. Huang, Y.; Palomar, D.P. Rank-constrained separable semidefinite programming with applications to optimal beamforming. IEEE Trans. Signal Process. 2010, 58, 664–678. [Google Scholar] [CrossRef]
  59. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W.; Member, S. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks. IEEE Trans. Inf. FORENSICS Secur. 2015, 10. [Google Scholar] [CrossRef] [Green Version]
  60. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V.; Tuan, H.D.; Poor, H.V. Secure and Energy-Efficient Beamforming for Simultaneous Information and Energy Transfer. IEEE Trans. Wirel. Commun. 2017, 16, 7523–7537. [Google Scholar]
  61. Nghia, N.T.; Tuan, H.D.; Nghia, N.T.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. MIMO Beamforming for Secure and Energy-Efficient Wireless Communication. IEEE Signal Process. Lett. 2017, 24, 236–239. [Google Scholar] [CrossRef] [Green Version]
  62. Park, J.; Sung, Y.; Kim, D.; Vincent Poor, H. Outage probability and outage-based robust beamforming for MIMO interference channels with imperfect channel state information. IEEE Trans. Wirel. Commun. 2012, 11, 3561–3573. [Google Scholar] [CrossRef] [Green Version]
  63. Pu, W.; Xiao, J.; Zhang, T.; Luo, Z.Q. Overcoming DoF Limitation in Robust Beamforming: A Penalized Inequality-Constrained Approach. arXiv 2019, arXiv:1910.03365. [Google Scholar]
  64. Zhao, N.; Yu, F.R.; Sun, H. Adaptive energy-efficient power allocation in green interference-alignment-based wireless networks. IEEE Trans. Veh. Technol. 2015, 64, 4268–4281. [Google Scholar] [CrossRef] [Green Version]
  65. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [Google Scholar] [CrossRef] [Green Version]
  66. Maddah-Ali, M.A.; Motahari, A.S.; Khandani, A.K. Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [Google Scholar] [CrossRef]
  67. Lee, J.H.; Chae, S.H.; Choi, W. Opportunistic jammer selection for secure degrees of freedom. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 4862–4867. [Google Scholar] [CrossRef]
  68. Jing, X.; Mo, L.; Liu, H.; Zhang, C. Linear Space-Time Interference Alignment for K-User MIMO Interference Channels. IEEE Access 2018, 6, 3085–3095. [Google Scholar] [CrossRef]
  69. Rihan, M.; Huang, L.; Zhang, P. Joint interference alignment and power allocation for NOMA-based multi-user MIMO systems. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 217. [Google Scholar] [CrossRef]
  70. Negi, R.; Goel, S. Secret communication using artificial noise. In Proceedings of the VTC-2005-Fall, 2005 IEEE 62nd Vehicular Technology Conference, Dallas, TX, USA, 28 September 2005; Volume 3, pp. 1906–1910. [Google Scholar] [CrossRef]
  71. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-aoise-aided approach. IEEE Trans. Signal Process. 2011, 59, 1202–1216. [Google Scholar] [CrossRef]
  72. Zhang, H.; Duan, L. Going beyond Secrecy Rate via Information Jamming. In Proceedings of the 2018 IEEE Global Communication Conference GLOBECOM 2018, Abu Dhabi, United Arab Emirates, 9–13 December 2018. [Google Scholar] [CrossRef]
  73. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  74. Liu, W.; Li, M.; Tian, X.; Wang, Z.; Liu, Q. Transmit Filter and Artificial Noise Design for Secure MIMO-OFDM Systems. arXiv 2017, arXiv:1704.08007. [Google Scholar]
  75. Reboredo, H.; Prabhu, V.; Rodrigues, M.R.; Xavier, J. Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive filters. In Proceedings of the ICASSP, IEEE International Conference Acoustics, Speech, and Signal Processing, Prague, Czechia, 22–27 May 2011; pp. 3440–3443. [Google Scholar] [CrossRef] [Green Version]
  76. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Cooperative jamming for wireless physical layer security. In Proceedings of the 2009 IEEE/SP 15th Workshop on Statistical Signal Processing, Cardiff, UK, 31 August–3 September 2009; pp. 417–420. [Google Scholar] [CrossRef] [Green Version]
  77. Cumanan, K.; Alexandropoulos, G.C.; Ding, Z.; Karagiannidis, G.K. Secure Communications with Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis. IEEE Trans. Veh. Technol. 2017, 66, 7495–7505. [Google Scholar] [CrossRef] [Green Version]
  78. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef] [Green Version]
  79. Hu, L.; Wen, H.; Wu, B.; Pan, F.; Liao, R.F.; Song, H.; Tang, J.; Wang, X. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 2018, 5, 219–228. [Google Scholar] [CrossRef]
  80. Anjos, G.; Castanheira, D.; Silva, A.; Gameiro, A. Securing Non-Orthogonal Multiple Access Systems Against Simultaneous Eavesdropping Attacks Coming from Inside and Outside of the Network. In Proceedings of the 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Istanbul, Turkey, 8–11 September 2019; Volume 2019. [Google Scholar] [CrossRef]
  81. Zhang, T.; Wen, H.; Jie, T.; Song, H.; Xie, F. Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection. IEEE Trans. Ind. Inform. 2020. [Google Scholar] [CrossRef]
  82. Zhong, Y.; Zhou, F.; Wang, Y.; Deng, X.; Al-Dhahir, N. Cooperative Jamming-Aided Secure Wireless Powered Communication Networks: A Game Theoretical Formulation. IEEE Commun. Lett. 2020, 24, 1081–1085. [Google Scholar] [CrossRef]
  83. Huo, Y.; Fan, X.; Ma, L.; Cheng, X.; Tian, Z.; Chen, D. Secure Communications in Tiered 5G Wireless Networks with Cooperative Jamming. IEEE Trans. Wirel. Commun. 2019, 18, 3265–3280. [Google Scholar] [CrossRef]
  84. Wang, Q.; Zhou, F.; Hu, R.Q.; Qian, Y. Energy-Efficient Beamforming and Cooperative Jamming in IRS-Assisted MISO Networks. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar] [CrossRef]
  85. Alamouti, S.M. A Simple Transmit Diversity Technique for Wireless Communications. IEEE J. Select. Areas Commun. 1998, 16, 1451–1458. [Google Scholar] [CrossRef]
  86. Sujatha, B. Space-Time Block Coding (STBC) for Wireless Networks. Int. J. Distrib. Parallel Syst. (IJDPS) 2012, 3. [Google Scholar] [CrossRef]
  87. Allen, T.; Cheng, J.; Al-Dhahir, N. Secure space-time block coding without transmitter CSI. IEEE Wirel. Commun. Lett. 2014, 3, 573–576. [Google Scholar] [CrossRef]
  88. Akuon, P.O.; Xu, H. Secure Signal and Space Alamouti Scheme. SAIEE Afr. Res. J. 2018, 107, 237–244. [Google Scholar] [CrossRef]
  89. Yang, N.; Yan, S.; Yuan, J.; Malaney, R.; Subramanian, R.; Land, I.; Yan, S.; Yuan, J.; Malaney, R. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels. IEEE Trans. Commun. 2015, 63, 1771–1783. [Google Scholar] [CrossRef]
  90. Liu, S.; Hong, Y.; Viterbo, E. Practical Secrecy using Artificial Noise. IEEE Commun. Lett. 2013, 17, 1483–1486. [Google Scholar]
  91. Zhang, R.; Ho, C.K. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [Google Scholar] [CrossRef] [Green Version]
  92. Zhou, F.; Member, S.; Li, Z.; Member, S.; Cheng, J.; Li, Q.; Si, J.; Zhou, F.; Li, Z.; Si, J.; et al. Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT. IEEE Trans. Wirel. Commun. 2016, 16, 2450–2464. [Google Scholar] [CrossRef] [Green Version]
  93. Boshkovska, E.; Wing, D.; Ng, K.; Zlatanov, N.; Koelpin, A.; Schober, R. Robust Resource Allocation for MIMO Wireless Powered Communication Networks Based on a Non-linear EH Model. IEEE Trans. Commun. 2017, 65, 1984–1999. [Google Scholar] [CrossRef] [Green Version]
  94. Chu, Z.; Johnston, M.; Le Goff, S. Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel. IEEE Trans. Veh. Technol. 2015, 65, 6913–6925. [Google Scholar] [CrossRef] [Green Version]
  95. Zhu, Z.; Chu, Z.; Wang, Z.; Lee, I. Outage Constrained Robust Beamforming for Secure Broadcasting Systems with Energy Harvesting. IEEE Trans. Wirel. Commun. 2016, 15, 7610–7620. [Google Scholar] [CrossRef]
  96. Khandaker, M.R.; Wong, K.K. Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2015, 10, 40–54. [Google Scholar] [CrossRef]
  97. Ng, D.W.K.; Schober, R. Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity. IEEE Trans. Wirel. Commun. 2015, 14, 5082–5097. [Google Scholar] [CrossRef] [Green Version]
  98. Kalamkar, S.S.; Banerjee, A. Secure Communication via a Wireless Energy Harvesting Untrusted Relay. IEEE Trans. Veh. Technol. 2017, 66, 2199–2213. [Google Scholar] [CrossRef] [Green Version]
  99. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secrecy Rate Beamforming for Multicell Networks with Information and Energy Harvesting. IEEE Trans. Signal Process. 2017, 65, 677–689. [Google Scholar] [CrossRef] [Green Version]
  100. Li, B.; Fei, Z.; Chu, Z.; Zhang, Y. Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer. IEEE Syst. J. 2018, 12, 3755–3766. [Google Scholar] [CrossRef]
  101. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine Learning Paradigms for Next-Generation Wireless Networks. IEEE Wirel. Commun. 2017, 24, 98–105. [Google Scholar] [CrossRef] [Green Version]
  102. Soltani, M.; Pourahmadi, V.; Mirzaei, A.; Sheikhzadeh, H. Deep Learning-Based Channel Estimation. IEEE Commun. Lett. 2019, 23, 652–655. [Google Scholar] [CrossRef] [Green Version]
  103. Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, H. Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2019, 27, 214–222. [Google Scholar] [CrossRef] [Green Version]
  104. Mashhadi, B.; Gündüz, D. Deep Learning for Massive MIMO Channel State Acquisition and Feedback. J. Indian Inst. Sci. 2020, 100, 369–382. [Google Scholar] [CrossRef] [PubMed]
  105. Hamamreh, J. Physical Layer Security Against Eavesdropping in The Internet of Drones (IoD) Based Communication Systems. 2019. Available online: https://figshare.com/articles/Physical_Layer_Security_Against_Eavesdropping_in_The_Internet_of_Drones_IoD_Based_Communication_Systems/8362385 (accessed on 3 March 2020). [CrossRef]
  106. Wang, H.M.; Zhang, X.; Jiang, J.C. UAV-involved wireless physical-layer secure communications: Overview and research directions. IEEE Wirel. Commun. 2019, 26, 32–39. [Google Scholar] [CrossRef] [Green Version]
  107. Li, A.; Wu, Q.; Zhang, R. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel. IEEE Wirel. Commun. Lett. 2018, 8, 181–184. [Google Scholar] [CrossRef] [Green Version]
  108. Huang, C.; Hu, S.; Alexandropoulos, G.C.; Member, S.; Zappone, A.; Yuen, C.; Zhang, R.; Di Renzo, M.; Debbah, M. Holographic MIMO Surfaces for 6G Wireless Networks: Opportunities, Challenges, and Trends. IEEE Wirel. Commun. 2019. [Google Scholar] [CrossRef]
  109. Lu, X.; Hossain, E.; Shafique, T.; Feng, S.; Jiang, H.; Niyato, D. Intelligent Reflecting Surface (IRS)-Enabled Covert Communications in Wireless Networks. arXiv 2019, arXiv:1911.00986. [Google Scholar]
  110. Zhang, J.; Björnson, E.; Member, S.; Matthaiou, M.; Wing Kwan Ng, D.; Yang, H.; Love, D.J.; Zhang, J.; Björnson, E.; Matthaiou, M.; et al. Prospective Multiple Antenna Technologies for Beyond 5G. IEEE J. Select. Areas Commun. 2020, 38, 1637–1660. [Google Scholar] [CrossRef]
  111. Black, E.J.; Commware, P. Holographic Beam Forming and MIMO. Available online: https://pivotalcommware.com/wp-content/uploads/2017/12/Holographic-Beamforming-WP-v.6C-FINAL.pdf (accessed on 18 May 2020).
  112. Pathak, P.H.; Feng, X.; Hu, P.; Mohapatra, P. Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges. IEEE Commun. Surv. Tutor. 2015, 17. [Google Scholar] [CrossRef]
  113. Ghassemlooy, Z.; Popoola, W.; Rajbhandari, S. Optical Wireless Communications: System and Channel Modelling with MATLAB®; CRC Press: Boca Raton, FL, USA, 2017; pp. 1–514. [Google Scholar] [CrossRef] [Green Version]
  114. Lu, W.; An, K.; Liang, T. Robust Beamforming Design for Sum Secrecy Rate Maximization in Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1568–1572. [Google Scholar] [CrossRef]
  115. Lei, J.; Han, Z.; Vázquez-Castro, M.A.; Hjørungnes, A. Secure Satellite Communication Systems Design with Individual Secrecy Rate Constraints. IEEE Trans. Inf. Forensics Secur. 2011, 6, 661–671. [Google Scholar] [CrossRef] [Green Version]
  116. Kalantari, A.; Zheng, G.; Gao, Z.; Han, Z.; Ottersten, B. Secrecy analysis on network coding in bidirectional multibeam satellite communications. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1862–1874. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The process of cryptography [23].
Figure 1. The process of cryptography [23].
Entropy 22 01261 g001
Figure 2. Wiretap channel.
Figure 2. Wiretap channel.
Entropy 22 01261 g002
Figure 3. The difference between cryptography and physical layer security approaches [28].
Figure 3. The difference between cryptography and physical layer security approaches [28].
Entropy 22 01261 g003
Figure 4. Physical layer security (PLS) system model.
Figure 4. Physical layer security (PLS) system model.
Entropy 22 01261 g004
Figure 5. Shannon information content.
Figure 5. Shannon information content.
Entropy 22 01261 g005
Figure 6. Shannon’s wiretap channel.
Figure 6. Shannon’s wiretap channel.
Entropy 22 01261 g006
Figure 7. Wyner’s wiretap channel.
Figure 7. Wyner’s wiretap channel.
Entropy 22 01261 g007
Figure 8. Wyner’s transmission rate vs equivocation rate.
Figure 8. Wyner’s transmission rate vs equivocation rate.
Entropy 22 01261 g008
Figure 9. MIMO wiretap channel model [29].
Figure 9. MIMO wiretap channel model [29].
Entropy 22 01261 g009
Figure 10. Secure multi-antenna techniques.
Figure 10. Secure multi-antenna techniques.
Entropy 22 01261 g010aEntropy 22 01261 g010b
Figure 11. Beamforming.
Figure 11. Beamforming.
Entropy 22 01261 g011
Figure 12. System model of multi-user and eavesdropper pairs with beamforming.
Figure 12. System model of multi-user and eavesdropper pairs with beamforming.
Entropy 22 01261 g012
Figure 13. Secrecy beamforming with artificial noise (AN).
Figure 13. Secrecy beamforming with artificial noise (AN).
Entropy 22 01261 g013
Figure 14. Secrecy with cooperative jamming.
Figure 14. Secrecy with cooperative jamming.
Entropy 22 01261 g014
Figure 15. System block diagram.
Figure 15. System block diagram.
Entropy 22 01261 g015
Figure 16. Bit error rate (BER) and secrecy rate performance metrics simulations for different precoding schemes.
Figure 16. Bit error rate (BER) and secrecy rate performance metrics simulations for different precoding schemes.
Entropy 22 01261 g016
Figure 17. A multiple-input multiple-output (MIMO) system for Simultaneous Wireless Information and Power Transfer (SWIPT).
Figure 17. A multiple-input multiple-output (MIMO) system for Simultaneous Wireless Information and Power Transfer (SWIPT).
Entropy 22 01261 g017
Figure 18. Cooperative jamming using unmanned aerial vehicle (UAV).
Figure 18. Cooperative jamming using unmanned aerial vehicle (UAV).
Entropy 22 01261 g018
Figure 19. Intelligent Reflecting Surface (IRS) system model [14].
Figure 19. Intelligent Reflecting Surface (IRS) system model [14].
Entropy 22 01261 g019
Figure 20. Secrecy rate vs distance.
Figure 20. Secrecy rate vs distance.
Entropy 22 01261 g020
Figure 21. Power and illumination distribution vs distance.
Figure 21. Power and illumination distribution vs distance.
Entropy 22 01261 g021
Figure 22. Multi-beam satellite communication network [114].
Figure 22. Multi-beam satellite communication network [114].
Entropy 22 01261 g022
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sanenga, A.; Mapunda, G.A.; Jacob, T.M.L.; Marata, L.; Basutli, B.; Chuma, J.M. An Overview of Key Technologies in Physical Layer Security. Entropy 2020, 22, 1261. https://doi.org/10.3390/e22111261

AMA Style

Sanenga A, Mapunda GA, Jacob TML, Marata L, Basutli B, Chuma JM. An Overview of Key Technologies in Physical Layer Security. Entropy. 2020; 22(11):1261. https://doi.org/10.3390/e22111261

Chicago/Turabian Style

Sanenga, Abraham, Galefang Allycan Mapunda, Tshepiso Merapelo Ludo Jacob, Leatile Marata, Bokamoso Basutli, and Joseph Monamati Chuma. 2020. "An Overview of Key Technologies in Physical Layer Security" Entropy 22, no. 11: 1261. https://doi.org/10.3390/e22111261

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop