Skip to main content
Top
Published in: Wireless Networks 3/2020

14-06-2019

Physical layer security schemes for MIMO systems: an overview

Authors: Reem Melki, Hassan N. Noura, Mohammad M. Mansour, Ali Chehab

Published in: Wireless Networks | Issue 3/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Physical layer security (PLS) has become an increasingly attractive topic since it promises current and future wireless systems both reliable and secure communication, without imposing any assumptions on the computational power of the eavesdroppers. PLS benefits from the randomness property of the wireless channel, which provides better immunity and prevents different attacks. On the other hand, the multiple-input multiple-output (MIMO) system has emerged as a key technology to support high data rates and improved energy and spectral efficiency, in addition to overcoming the effect of shadowing and fading. Recently, MIMO-based PLS has been addressed in the literature due to its wide adoption and its essential role in wireless communication systems. In this paper, we provide a comprehensive overview of various MIMO-based PLS techniques that target all kinds of security services namely, key generation and distribution, data confidentiality, authentication, and availability. With this overview, readers will have a better understanding of the MIMO-based PLS techniques present in the literature, their current limitations, and challenges.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Saxena, N., Roy, A., Sahu, B., & Kim, H. (2017). Efficient IoT gateway over 5G wireless: A new design with prototype and implementation results. IEEE Communications Magazine, 55(2), 97–105.CrossRef Saxena, N., Roy, A., Sahu, B., & Kim, H. (2017). Efficient IoT gateway over 5G wireless: A new design with prototype and implementation results. IEEE Communications Magazine, 55(2), 97–105.CrossRef
2.
go back to reference Ford, R., Zhang, M., Mezzavilla, M., Dutta, S., Rangan, S., & Zorzi, M. (2017). Achieving ultra-low latency in 5G millimeter wave cellular networks. IEEE Communications Magazine, 55(3), 196–203.CrossRef Ford, R., Zhang, M., Mezzavilla, M., Dutta, S., Rangan, S., & Zorzi, M. (2017). Achieving ultra-low latency in 5G millimeter wave cellular networks. IEEE Communications Magazine, 55(3), 196–203.CrossRef
3.
go back to reference Sun, S., MacCartney, G., & Rappaport, T. (2017). A novel millimeter-wave channel simulator and applications for 5G wireless communications. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–7). IEEE. Sun, S., MacCartney, G., & Rappaport, T. (2017). A novel millimeter-wave channel simulator and applications for 5G wireless communications. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–7). IEEE.
4.
go back to reference Rappaport, T., Xing, Y., et al. (2017). Overview of millimeter wave communications for fifth-generation (5G) wireless networks-with a focus on propagation models. arXiv preprint arXiv:1708.02557 Rappaport, T., Xing, Y., et al. (2017). Overview of millimeter wave communications for fifth-generation (5G) wireless networks-with a focus on propagation models. arXiv preprint arXiv:​1708.​02557
5.
go back to reference Wong, V., Schober, R., Ng, D., & Wang, L. (2017). Key technologies for 5G wireless systems. Cambridge: Cambridge University Press.CrossRef Wong, V., Schober, R., Ng, D., & Wang, L. (2017). Key technologies for 5G wireless systems. Cambridge: Cambridge University Press.CrossRef
6.
go back to reference Cho, Y., Kim, J., Yang, W., & Kang, C. (2010). MIMO-OFDM wireless communications with MATLAB. New York: Wiley.CrossRef Cho, Y., Kim, J., Yang, W., & Kang, C. (2010). MIMO-OFDM wireless communications with MATLAB. New York: Wiley.CrossRef
7.
go back to reference Fan, W., Carton, I., et al. (2017). A step toward 5G in 2020: Low-cost OTA performance evaluation of massive MIMO base stations. IEEE Antennas and Propagation Magazine, 59(1), 38–47.CrossRef Fan, W., Carton, I., et al. (2017). A step toward 5G in 2020: Low-cost OTA performance evaluation of massive MIMO base stations. IEEE Antennas and Propagation Magazine, 59(1), 38–47.CrossRef
8.
go back to reference Molisch, A., et al. (2017). Hybrid beamforming for massive MIMO: A survey. IEEE Communications Magazine, 55(9), 134–141.CrossRef Molisch, A., et al. (2017). Hybrid beamforming for massive MIMO: A survey. IEEE Communications Magazine, 55(9), 134–141.CrossRef
9.
go back to reference Umebayashi, K., et al. (2014). A study on secure pilot signal design for OFDM systems. In Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1–5). Umebayashi, K., et al. (2014). A study on secure pilot signal design for OFDM systems. In Asia-Pacific signal and information processing association annual summit and conference (APSIPA) (pp. 1–5).
10.
go back to reference Massey, J. (1986). Cryptography—a selective survey. Digital Communications, 85, 3–25. Massey, J. (1986). Cryptography—a selective survey. Digital Communications, 85, 3–25.
11.
13.
go back to reference Ahlswede, R., et al. (1993). Common randomness in information theory and cryptography. I. Secret sharing. IEEE Transactions on Information Theory, 39(4), 1121–1132.CrossRefMathSciNetMATH Ahlswede, R., et al. (1993). Common randomness in information theory and cryptography. I. Secret sharing. IEEE Transactions on Information Theory, 39(4), 1121–1132.CrossRefMathSciNetMATH
15.
go back to reference Bloch, M., & Barros, J. (2011). Physical-layer security. Cambridge: Cambridge University Press.CrossRefMATH Bloch, M., & Barros, J. (2011). Physical-layer security. Cambridge: Cambridge University Press.CrossRefMATH
16.
go back to reference Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef Mukherjee, A., et al. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.CrossRef
18.
go back to reference Gibalina, Z., et al. (2018). Estimation of capabilities of cooperative CubeSat systems based on Alamouti transmission scheme. In Systems of signal synchronization, generating and processing in telecommunications (SYNCHROINFO) (pp. 1–6). IEEE. Gibalina, Z., et al. (2018). Estimation of capabilities of cooperative CubeSat systems based on Alamouti transmission scheme. In Systems of signal synchronization, generating and processing in telecommunications (SYNCHROINFO) (pp. 1–6). IEEE.
19.
go back to reference Shehab, W., & Al-qudah, Z. (2017). Singular value decomposition: Principles and applications in multiple input multiple output communication system. International Journal of Computer Networks and Communications, 9(1), 13–21.CrossRef Shehab, W., & Al-qudah, Z. (2017). Singular value decomposition: Principles and applications in multiple input multiple output communication system. International Journal of Computer Networks and Communications, 9(1), 13–21.CrossRef
20.
go back to reference Abdelrahman, R.B.M., Mustafa, A.B.A., & Osman, A.A. (2015). A comparison between IEEE 802.11 n and ac standards. IOSR Journal of Computer Engineering (IOSR-JCE), 17(5), 30–34. Abdelrahman, R.B.M., Mustafa, A.B.A., & Osman, A.A. (2015). A comparison between IEEE 802.11 n and ac standards. IOSR Journal of Computer Engineering (IOSR-JCE), 17(5), 30–34.
22.
go back to reference Schindler, D., et al. (2018). MIMO–OFDM radar using a linear frequency modulated carrier to reduce sampling requirements. IEEE Transactions on Microwave Theory and Techniques, 66(7), 3511–3520.CrossRef Schindler, D., et al. (2018). MIMO–OFDM radar using a linear frequency modulated carrier to reduce sampling requirements. IEEE Transactions on Microwave Theory and Techniques, 66(7), 3511–3520.CrossRef
23.
go back to reference Rahmatallah, Y., & Mohan, S. (2013). Peak-to-average power ratio reduction in OFDM systems: A survey and taxonomy. IEEE Communications Surveys & Tutorials, 15(4), 1567–1592.CrossRef Rahmatallah, Y., & Mohan, S. (2013). Peak-to-average power ratio reduction in OFDM systems: A survey and taxonomy. IEEE Communications Surveys & Tutorials, 15(4), 1567–1592.CrossRef
24.
go back to reference Bingham, J. (1990). Multicarrier modulation for data transmission: An idea whose time has come. IEEE Communications Magazine, 28(5), 5–14.CrossRef Bingham, J. (1990). Multicarrier modulation for data transmission: An idea whose time has come. IEEE Communications Magazine, 28(5), 5–14.CrossRef
25.
go back to reference Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House. Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House.
28.
go back to reference He, Q., & Schmeink, A. (2015). Comparison and evaluation between FBMC and OFDM systems. In Proceedings of the international ITG workshop on smart antennas (WSA) (pp. 1–7). VDE. He, Q., & Schmeink, A. (2015). Comparison and evaluation between FBMC and OFDM systems. In Proceedings of the international ITG workshop on smart antennas (WSA) (pp. 1–7). VDE.
29.
go back to reference Roessler, A. (2016). 5G waveform candidates application note. Technical Report. 1MA271. Munich: Rohde & Schwarz. Roessler, A. (2016). 5G waveform candidates application note. Technical Report. 1MA271. Munich: Rohde & Schwarz.
30.
go back to reference Barker, E., et al. (2012). Recommendation for key management part 1: General (revision 3). NIST Special Publication, 800(57), 1–147. Barker, E., et al. (2012). Recommendation for key management part 1: General (revision 3). NIST Special Publication, 800(57), 1–147.
31.
go back to reference Zhang, J., et al. (2015). Verification of key generation from individual OFDM subcarrier’s channel response. In Proceedings of the IEEE global communication conference workshops (GC workshops) (pp. 1–6). Zhang, J., et al. (2015). Verification of key generation from individual OFDM subcarrier’s channel response. In Proceedings of the IEEE global communication conference workshops (GC workshops) (pp. 1–6).
32.
go back to reference Rahbari, H., & Krunz, M. (2017). Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Transactions on Wireless Communications, 16(6), 3775–3786.CrossRef Rahbari, H., & Krunz, M. (2017). Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Transactions on Wireless Communications, 16(6), 3775–3786.CrossRef
34.
go back to reference Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners. Berlin: Springer.MATH Paar, C., & Pelzl, J. (2009). Understanding cryptography: A textbook for students and practitioners. Berlin: Springer.MATH
35.
go back to reference Wankhede, S.B. (2019). Study of network-based DoS attacks. In Nanoelectronics, circuits and communication systems (Vol. 511, pp. 611–616). Singapore: Springer. Wankhede, S.B. (2019). Study of network-based DoS attacks. In Nanoelectronics, circuits and communication systems (Vol. 511, pp. 611–616). Singapore: Springer.
36.
go back to reference Wang, F., et al. (2017). Poster abstract: Security in uplink MU-MIMO networks. In V. Nath, JK Mandal (Eds.), IEEE/ACM second international conference on internet-of-things design and implementation (IoTDI) (pp. 351–352). Wang, F., et al. (2017). Poster abstract: Security in uplink MU-MIMO networks. In V. Nath, JK Mandal (Eds.), IEEE/ACM second international conference on internet-of-things design and implementation (IoTDI) (pp. 351–352).
37.
go back to reference Tomasin, S. (2017). Comparison between asymmetric and symmetric channel-based authentication for MIMO systems. In International ITG workshop on smart antennas (WSA) (pp. 1–5). Tomasin, S. (2017). Comparison between asymmetric and symmetric channel-based authentication for MIMO systems. In International ITG workshop on smart antennas (WSA) (pp. 1–5).
38.
go back to reference Xiao, L., et al. (2017). Game theoretic study on channel-based authentication in MIMO systems. IEEE Transactions on Vehicular Technology, 66(8), 7474–7484.CrossRef Xiao, L., et al. (2017). Game theoretic study on channel-based authentication in MIMO systems. IEEE Transactions on Vehicular Technology, 66(8), 7474–7484.CrossRef
39.
go back to reference Xiao, L., et al. (2016). Channel-based authentication game in MIMO systems. In Proceedings of the IEEE global communications conference (GLOBECOM) (pp. 1–6). Xiao, L., et al. (2016). Channel-based authentication game in MIMO systems. In Proceedings of the IEEE global communications conference (GLOBECOM) (pp. 1–6).
40.
go back to reference Topal, O., et al. (2017). Space-frequency grouping based key extraction for MIMO–OFDM systems. In International Symposium on wireless communication systems (ISWCS) (pp. 320–324). Topal, O., et al. (2017). Space-frequency grouping based key extraction for MIMO–OFDM systems. In International Symposium on wireless communication systems (ISWCS) (pp. 320–324).
41.
go back to reference Chen, K., & Natarajan, B. (2016). Evaluating node reliability in cooperative MIMO networks. IEEE Transactions on Information Forensics and Security, 11(7), 1453–1460.CrossRef Chen, K., & Natarajan, B. (2016). Evaluating node reliability in cooperative MIMO networks. IEEE Transactions on Information Forensics and Security, 11(7), 1453–1460.CrossRef
42.
go back to reference Cheng, L., et al. (2015). Secret key generation via random beamforming in stationary environment. In Proceedings of the international conference on wireless communications and signal processing (WCSP) (pp. 1–5). Cheng, L., et al. (2015). Secret key generation via random beamforming in stationary environment. In Proceedings of the international conference on wireless communications and signal processing (WCSP) (pp. 1–5).
43.
go back to reference Yakovlev, V., et al. (2016). Secret key agreement based on a communication through wireless MIMO fading channels. In Federated conference on computer science and information systems (FedCSIS) (pp. 823–830). Yakovlev, V., et al. (2016). Secret key agreement based on a communication through wireless MIMO fading channels. In Federated conference on computer science and information systems (FedCSIS) (pp. 823–830).
44.
go back to reference Qin, D., & Ding, Z. (2016). Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Transactions on Information Forensics and Security, 11(12), 2693–2705.CrossRef Qin, D., & Ding, Z. (2016). Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Transactions on Information Forensics and Security, 11(12), 2693–2705.CrossRef
45.
go back to reference Chen, K., et al. (2015). Secret key generation rate with power allocation in relay-based LTE-A networks. IEEE Transactions on Information Forensics and Security, 10(11), 2424–2434.CrossRef Chen, K., et al. (2015). Secret key generation rate with power allocation in relay-based LTE-A networks. IEEE Transactions on Information Forensics and Security, 10(11), 2424–2434.CrossRef
46.
go back to reference Taha, H., & Alsusa, E. (2017). Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing. IET Information Security, 11(1), 1–7.CrossRef Taha, H., & Alsusa, E. (2017). Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing. IET Information Security, 11(1), 1–7.CrossRef
47.
go back to reference Choi, J. (2017). Secret key transmission for OFDM based machine type communications. Journal of Communications and Networks, 19(4), 363–370.CrossRef Choi, J. (2017). Secret key transmission for OFDM based machine type communications. Journal of Communications and Networks, 19(4), 363–370.CrossRef
48.
go back to reference Choi, J., & Ha, J. (2016). Secret key transmission based on channel reciprocity for secure IoT. In European conference on networks and communications (EuCNC) (pp. 388–392). Choi, J., & Ha, J. (2016). Secret key transmission based on channel reciprocity for secure IoT. In European conference on networks and communications (EuCNC) (pp. 388–392).
49.
go back to reference Furqan, H., et al. (2016). Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In International Symposium on wireless communication systems (ISWCS) (pp. 597–602). Furqan, H., et al. (2016). Secret key generation using channel quantization with SVD for reciprocal MIMO channels. In International Symposium on wireless communication systems (ISWCS) (pp. 597–602).
50.
go back to reference Wang, Y., & Zhang, L. (2017). High security orthogonal factorized channel scrambling scheme with location information embedded for MIMO-based VLC system. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1–5). Wang, Y., & Zhang, L. (2017). High security orthogonal factorized channel scrambling scheme with location information embedded for MIMO-based VLC system. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1–5).
51.
go back to reference Taha, H., & Alsusa, E. (2016). Secret key exchange under physical layer security using MIMO private random precoding in FDD systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6). Taha, H., & Alsusa, E. (2016). Secret key exchange under physical layer security using MIMO private random precoding in FDD systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6).
52.
go back to reference Taha, H., & Alsusa, E. (2015). A MIMO precoding based physical layer security technique for key exchange encryption. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1–5). Taha, H., & Alsusa, E. (2015). A MIMO precoding based physical layer security technique for key exchange encryption. In IEEE Proceedings of the vehicular technology conference (VTC Spring) (pp. 1–5).
53.
go back to reference Taha, H., & Alsusa, E. (2017). Secret key exchange using private random precoding in MIMO FDD and TDD systems. IEEE Transactions on Vehicular Technology, 66(6), 4823–4833.CrossRef Taha, H., & Alsusa, E. (2017). Secret key exchange using private random precoding in MIMO FDD and TDD systems. IEEE Transactions on Vehicular Technology, 66(6), 4823–4833.CrossRef
54.
go back to reference Yaacoub, E. (2016). On secret key generation with massive MIMO antennas using time-frequency-space dimensions. In IEEE Middle East conference on antennas and propagation (MECAP) (pp. 1–4). Yaacoub, E. (2016). On secret key generation with massive MIMO antennas using time-frequency-space dimensions. In IEEE Middle East conference on antennas and propagation (MECAP) (pp. 1–4).
55.
go back to reference Taha, H., & Alsusa, E. (2017). Secret key exchange and authentication via randomized spatial modulation and phase shifting. IEEE Transactions on Vehicular Technology, 67(3), 2165–2177.CrossRef Taha, H., & Alsusa, E. (2017). Secret key exchange and authentication via randomized spatial modulation and phase shifting. IEEE Transactions on Vehicular Technology, 67(3), 2165–2177.CrossRef
56.
go back to reference Taha, H., & Alsusa, E. (2017). PHY-SEC: Secret key exchange and authentication via random spatial modulation and phase shifting. In IEEE proceedings of the international wireless communications and mobile computing conference (IWCMC) (pp. 1327–1332). Taha, H., & Alsusa, E. (2017). PHY-SEC: Secret key exchange and authentication via random spatial modulation and phase shifting. In IEEE proceedings of the international wireless communications and mobile computing conference (IWCMC) (pp. 1327–1332).
57.
go back to reference Chen, X., Ng, D., Gerstacker, W., & Chen, H. (2017). A survey on multiple-antenna techniques for physical layer security. IEEE Communications Surveys and Tutorials, 19(2), 1027–1053.CrossRef Chen, X., Ng, D., Gerstacker, W., & Chen, H. (2017). A survey on multiple-antenna techniques for physical layer security. IEEE Communications Surveys and Tutorials, 19(2), 1027–1053.CrossRef
58.
go back to reference Guan, K., et al. (2016). A computationally efficient shift-register based information scrambling approach to physical layer security in MIMO-SDM systems. In Optical fiber communications conference and exhibition (OFC) (pp. 1–3). Guan, K., et al. (2016). A computationally efficient shift-register based information scrambling approach to physical layer security in MIMO-SDM systems. In Optical fiber communications conference and exhibition (OFC) (pp. 1–3).
59.
go back to reference Guan, K., et al. (2015). Enhanced physical layer security of MIMO-SDM systems through information scrambling. In European conference on optical communication (ECOC) (pp. 1–3). Guan, K., et al. (2015). Enhanced physical layer security of MIMO-SDM systems through information scrambling. In European conference on optical communication (ECOC) (pp. 1–3).
60.
go back to reference Tanigawa, Y., et al. (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO–OFDM systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6). Tanigawa, Y., et al. (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO–OFDM systems. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6).
61.
go back to reference Ahmed, M., & Bai, L. (2017). Space time block coding aided physical layer security in Gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST) (pp. 805–808). Ahmed, M., & Bai, L. (2017). Space time block coding aided physical layer security in Gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST) (pp. 805–808).
62.
go back to reference Liu, Y., et al. (2017). Secrecy capacity analysis of artificial noisy MIMO channels—an approach based on ordered eigenvalues of Wishart matrices. IEEE Transactions on Information Forensics and Security, 12(3), 617–630.CrossRef Liu, Y., et al. (2017). Secrecy capacity analysis of artificial noisy MIMO channels—an approach based on ordered eigenvalues of Wishart matrices. IEEE Transactions on Information Forensics and Security, 12(3), 617–630.CrossRef
63.
go back to reference Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proceedings of the international conference communications China (ICCC), (pp. 2246–2250). Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proceedings of the international conference communications China (ICCC), (pp. 2246–2250).
64.
go back to reference Chen, X., et al. (2015). Security in MIMO wireless hybrid channel with artificial noise. In International conference on cyber security of smart cities, industrial control system and communications (SSIC) (pp. 1–4). Chen, X., et al. (2015). Security in MIMO wireless hybrid channel with artificial noise. In International conference on cyber security of smart cities, industrial control system and communications (SSIC) (pp. 1–4).
65.
go back to reference Shafie, A., et al. (2017). Hybrid spatio-temporal artificial noise design for secure MIMOME–OFDM systems. IEEE Transactions on Vehicular Technology, 66(5), 3871–3886. Shafie, A., et al. (2017). Hybrid spatio-temporal artificial noise design for secure MIMOME–OFDM systems. IEEE Transactions on Vehicular Technology, 66(5), 3871–3886.
66.
go back to reference Kozai, Y., & Saba, T. (2015). An artificial fast fading generation scheme for physical layer security of MIMO–OFDM systems. In International conference on signal processing and communication systems (ICSPCS) (pp. 1–5). Kozai, Y., & Saba, T. (2015). An artificial fast fading generation scheme for physical layer security of MIMO–OFDM systems. In International conference on signal processing and communication systems (ICSPCS) (pp. 1–5).
67.
go back to reference Li, X., et al. (2017). Hybrid massive MIMO for secure transmissions against stealthy eavesdroppers. IEEE Communications Letters, 21(1), 81–84.CrossRef Li, X., et al. (2017). Hybrid massive MIMO for secure transmissions against stealthy eavesdroppers. IEEE Communications Letters, 21(1), 81–84.CrossRef
68.
go back to reference Khandaker, M., et al. (2017). Constructive interference based secure precoding. In IEEE proceedings of the international Symposium on information theory (ISIT), (pp. 2875–2879). Khandaker, M., et al. (2017). Constructive interference based secure precoding. In IEEE proceedings of the international Symposium on information theory (ISIT), (pp. 2875–2879).
69.
go back to reference Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.CrossRef Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.CrossRef
70.
go back to reference El Shafie, A., et al. (2016). Enhancing the PHY-layer security of MIMO buffer-aided relay networks. IEEE Wireless Communications Letters, 5(4), 400–403.CrossRefMathSciNet El Shafie, A., et al. (2016). Enhancing the PHY-layer security of MIMO buffer-aided relay networks. IEEE Wireless Communications Letters, 5(4), 400–403.CrossRefMathSciNet
71.
go back to reference Zhang, L., et al. (2016). The performance of the MIMO physical layer security system with imperfect CSI. In IEEE conference on communications and network security (CNS) (pp. 346–347). Zhang, L., et al. (2016). The performance of the MIMO physical layer security system with imperfect CSI. In IEEE conference on communications and network security (CNS) (pp. 346–347).
72.
go back to reference Chen, B., et al. (2016). Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access, 4, 3016–3025.CrossRef Chen, B., et al. (2016). Original symbol phase rotated secure transmission against powerful massive MIMO eavesdropper. IEEE Access, 4, 3016–3025.CrossRef
73.
go back to reference Chen, B., et al. (2016). Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper. IEEE Access, 4, 5374–5384.CrossRef Chen, B., et al. (2016). Securing uplink transmission for lightweight single-antenna UEs in the presence of a massive MIMO eavesdropper. IEEE Access, 4, 5374–5384.CrossRef
74.
go back to reference Zhang, L., et al. (2017). Non-linear transceiver design for secure communications with artificial noise-assisted MIMO relay. IET Communications, 11(6), 930–935.CrossRef Zhang, L., et al. (2017). Non-linear transceiver design for secure communications with artificial noise-assisted MIMO relay. IET Communications, 11(6), 930–935.CrossRef
75.
go back to reference Yaacoub, E., & Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In European conference on antennas and propagation (EUCAP) (pp. 1753–1757). Yaacoub, E., & Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In European conference on antennas and propagation (EUCAP) (pp. 1753–1757).
76.
go back to reference Tang, J., et al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105–109). Tang, J., et al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105–109).
77.
go back to reference Tang, J., & Wen, H., et al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105–109). Tang, J., & Wen, H., et al. (2015). Combining MIMO beamforming with security codes to achieve unconditional communication security. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 105–109).
78.
go back to reference Wen, H., et al. (2014). Achieving secure communications over wiretap channels via security codes from resilient functions. IEEE Wireless Communications Letters, 3(3), 273–276.CrossRef Wen, H., et al. (2014). Achieving secure communications over wiretap channels via security codes from resilient functions. IEEE Wireless Communications Letters, 3(3), 273–276.CrossRef
79.
go back to reference Zhang, Y., et al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 1–6). Zhang, Y., et al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proceedings of the international conference on communications in China (ICCC) (pp. 1–6).
80.
go back to reference Jayasinghe, K., et al. (2015). Physical layer security for relay assisted MIMO D2D communication. In IEEE proceedings of the international conference on communications workshop (ICCW) (pp. 651–656). Jayasinghe, K., et al. (2015). Physical layer security for relay assisted MIMO D2D communication. In IEEE proceedings of the international conference on communications workshop (ICCW) (pp. 651–656).
81.
go back to reference Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.CrossRef Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.CrossRef
82.
go back to reference Gong, S., et al. (2017). Millimeter-wave secrecy beamforming designs for two-way amplify-and-forward MIMO relaying networks. IEEE Transactions on Vehicular Technology, 66(3), 2059–2071.CrossRef Gong, S., et al. (2017). Millimeter-wave secrecy beamforming designs for two-way amplify-and-forward MIMO relaying networks. IEEE Transactions on Vehicular Technology, 66(3), 2059–2071.CrossRef
83.
go back to reference Qassim, Y., et al. (2017). Post-quantum hybrid security mechanism for MIMO systems. In International conference on computing, networking and communications (ICNC) (pp. 684–689). Qassim, Y., et al. (2017). Post-quantum hybrid security mechanism for MIMO systems. In International conference on computing, networking and communications (ICNC) (pp. 684–689).
84.
go back to reference Lei, H., et al. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRefMathSciNet Lei, H., et al. (2017). On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection. IEEE Transactions on Green Communications and Networking, 1(2), 192–203.CrossRefMathSciNet
85.
go back to reference Kalantari, A., et al. (2016). Directional modulation via symbol-level precoding: A way to enhance security. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1478–1493.CrossRef Kalantari, A., et al. (2016). Directional modulation via symbol-level precoding: A way to enhance security. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1478–1493.CrossRef
86.
go back to reference Hafez, M., et al. (2017). Secure spatial multiple access using directional modulation. IEEE Transactions on Wireless Communications, 17, 563–573.CrossRef Hafez, M., et al. (2017). Secure spatial multiple access using directional modulation. IEEE Transactions on Wireless Communications, 17, 563–573.CrossRef
87.
go back to reference Li, Z., et al. (2015). Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 7609–7614). Li, Z., et al. (2015). Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 7609–7614).
88.
go back to reference Li, L., et al. (2016). Improving wireless physical layer security via exploiting co-channel interference. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1433–1448.CrossRef Li, L., et al. (2016). Improving wireless physical layer security via exploiting co-channel interference. IEEE Journal of Selected Topics in Signal Processing, 10(8), 1433–1448.CrossRef
89.
go back to reference Ahn, S., et al. (2016). Enhancing physical-layer security in MISO wiretap channel with pilot-assisted channel estimation: Beamforming design for pilot jamming. In IEEE proceedings of the international conference on signal processing and communication systems (ICSPCS) (pp. 1–5). Ahn, S., et al. (2016). Enhancing physical-layer security in MISO wiretap channel with pilot-assisted channel estimation: Beamforming design for pilot jamming. In IEEE proceedings of the international conference on signal processing and communication systems (ICSPCS) (pp. 1–5).
90.
go back to reference Yan, Q., et al. (2016). Jamming resilient communication using MIMO interference cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486–1499.CrossRef Yan, Q., et al. (2016). Jamming resilient communication using MIMO interference cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486–1499.CrossRef
92.
go back to reference Javed, I., et al. (2017). Novel schemes for interference-resilient OFDM wireless communication. International Journal of Communication Systems, 30(6), e3095.CrossRef Javed, I., et al. (2017). Novel schemes for interference-resilient OFDM wireless communication. International Journal of Communication Systems, 30(6), e3095.CrossRef
93.
go back to reference Basciftci, Y., et al. (2015). Securing massive MIMO at the physical layer. In IEEE conference on communications and network security (CNS) (pp. 272–280). Basciftci, Y., et al. (2015). Securing massive MIMO at the physical layer. In IEEE conference on communications and network security (CNS) (pp. 272–280).
94.
go back to reference Sodagari, S., & Clancy, T. (2012). Efficient jamming attacks on MIMO channels. In Proceedings of the IEEE international conference on communications (ICC) (pp. 852–856). IEEE. Sodagari, S., & Clancy, T. (2012). Efficient jamming attacks on MIMO channels. In Proceedings of the IEEE international conference on communications (ICC) (pp. 852–856). IEEE.
95.
go back to reference Do, T., et al. (2017). Jamming-resistant receivers for the massive MIMO uplink. IEEE Transactions on Information Forensics and Security, 13(1), 210–223.CrossRef Do, T., et al. (2017). Jamming-resistant receivers for the massive MIMO uplink. IEEE Transactions on Information Forensics and Security, 13(1), 210–223.CrossRef
96.
go back to reference Shen, W., et al. (2014). MCR decoding: A MIMO approach for defending against wireless jamming attacks. In IEEE Proceedings of the conference on communications and network security (CNS), (pp. 133–138). IEEE. Shen, W., et al. (2014). MCR decoding: A MIMO approach for defending against wireless jamming attacks. In IEEE Proceedings of the conference on communications and network security (CNS), (pp. 133–138). IEEE.
97.
go back to reference Shen, W., et al. (2015). No time to demodulate-fast physical layer verification of friendly jamming. In IEEE proceedings of the military communications conference (MILCOM) (pp. 653–658). IEEE. Shen, W., et al. (2015). No time to demodulate-fast physical layer verification of friendly jamming. In IEEE proceedings of the military communications conference (MILCOM) (pp. 653–658). IEEE.
98.
go back to reference Li, L., & Chigan, C. (2016). A virtual MIMO based anti-jamming strategy for cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6). IEEE. Li, L., & Chigan, C. (2016). A virtual MIMO based anti-jamming strategy for cognitive radio networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1–6). IEEE.
99.
go back to reference Chaturvedi, P., & Gupta, K. (2013). Detection and prevention of various types of jamming attacks in wireless networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 3(2), 2250–3501. Chaturvedi, P., & Gupta, K. (2013). Detection and prevention of various types of jamming attacks in wireless networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 3(2), 2250–3501.
Metadata
Title
Physical layer security schemes for MIMO systems: an overview
Authors
Reem Melki
Hassan N. Noura
Mohammad M. Mansour
Ali Chehab
Publication date
14-06-2019
Publisher
Springer US
Published in
Wireless Networks / Issue 3/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-02060-0

Other articles of this Issue 3/2020

Wireless Networks 3/2020 Go to the issue