Physical Layer Security for Wireless Sensing and Communication

2: Communications, Signal Processing, and Networking Center, Medipol University, Turkey
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference.
Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed.
The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity.
- Book DOI: 10.1049/PBSE018E
- Chapter DOI: 10.1049/PBSE018E
- ISBN: 9781839535277
- e-ISBN: 9781839535284
- Page count: 386
- Format: PDF
-
Front Matter
- + Show details - Hide details
-
p.
(1)
-
1 Wireless communication networks and the need for security
- + Show details - Hide details
-
p.
1
–10
(10)
Wireless systems are becoming an increasingly important part of our daily lives. The proper operation of many crucial applications and use cases, including those in healthcare, finance, e-commerce, transportation, industrial automation, etc., depends on secure and reliable communication. Conventional cryptographic security mechanisms are widely used, but they are unable to scale with increasingly heterogeneous and decentralized networks. On the other hand, by utilizing the dynamic features of the wireless environment, physical layer security (PLS) offers a promising complementary solution to ensure the authenticity, confidentiality, integrity, and availability of legitimate communications. In this chapter, we first try to paint a picture of the next-generation networks before emphasizing the need for secure wireless transmission in future networks. Later, we highlight the limitations of cryptographic methods, and the ability of PLS to address them is provided. We conclude the chapter by briefly discussing a recently developed unified framework for PLS in future networks.
-
2 Information theoretic perspective of physical layer security
- + Show details - Hide details
-
p.
11
–29
(19)
Different perspectives have been formed on the security concept in communication technologies. As a result, academic researchers and experts in the field have developed many different approaches to data security. The dominant approach for data security has been cryptography for many years. However, recently physical layer security (PLS) research gathered enormous attention from the researchers. Even though mentioned approaches look quite different, they share the same fundamentals and philosophy. In this regard, this chapter first introduces readers to the history of security concepts in communication systems. Next, the information theory-based philosophy of secrecy is established. Finally, performance metrics that can be used to evaluate a security system are given to the readers. This chapter aims to explain the overall idea of PLS systems and form a handbook for researchers, engineers, and experts to consult in their research.
-
3 Physical layer security definition and domains
- + Show details - Hide details
-
p.
31
–51
(21)
Today's fast-paced world is becoming increasingly dependent on wireless communications. Whether it is for businesses or individuals, mobility, portability, and instant access (via the internet) to unlimited information are the mantras of our day. In the past few decades, wireless communication has grown exponentially, with a bright future ahead of it. It is anticipated that this technology will have a profound impact on our lives and allow us to accomplish things we had never imagined. A key element of the success of these technologies will be the ability to communicate securely and reliably. Although cryptographic security mechanisms are widely adopted, they cannot cope with increasingly decentralized and heterogeneous networks. As a complementary solution, physical layer security (PLS) exploits the dynamic features of wireless environments to ensure that legitimate transmissions are subject to CIAA requirements. A generalized PLS framework is provided in this chapter, which not only incorporates the existing work but also allows for the development of next generation PLS methods. To reflect this, PLS fabric is divided into observation and modification planes. Furthermore, different domains of PLS are discussed under these plane concepts, allowing a vision of future PLS mechanisms.
-
4 Wireless channel from physical layer security perspective
- + Show details - Hide details
-
p.
53
–75
(23)
One of the critical requirements of the future wireless networks is the provision of secure communication against wide range of attacks. Contrary to the conventional cryptography-based security, physical layer security (PLS), in the broadest sense, intends to exploit different features of the wireless channel to secure not only the information being communicated but the whole communication process from myriad types of attacks. Future generations of the wireless networks will be built on various new technologies such as massive multiple input multiple output (mMIMO), reconfigurable intelligent surfaces (RIS), and sensing, and are expected to accommodate some newly emerging use-cases that never existed in the legacy networks. Both, the new technologies and the use-cases are accompanied with some new and unique channel characteristics which can be leveraged by the channel-based PLS concept. This chapter explores these newly revealed channel features to highlight their potential advantages and challenges if exploited for PLS. Specifically, the chapter provides a ground work on the critical qualities that define the eligibility of a certain channel feature for the PLS application. Afterward, channel features unique to different scenarios (such as high mobility in vehicle-to-vehicle and high speed train communication) or technologies (such as mMIMO and communication at higher frequency bands) in 5G and beyond networks are discussed form the PLS perspective. The chapter also touches upon the evolving class of security attack that intend to disrupt the channel-based PLS concept by attacking the channel characteristics/features rather than the communication itself. The chapter is then concluded by summarizing some possible research directions for the channel-based PLS concept.
-
5 Physical layer authentication in wireless communication systems
- + Show details - Hide details
-
p.
77
–97
(21)
This chapter presents the physical-layer security mechanisms in the analog domain under the name of physical layer authentication (PLA). PLA has attracted extensive research interest in recent years for the new generation of communication networks since it provides information-theory security with low complexity. In this chapter, we discuss the PLA system process and its metrics. After that, the PLA techniques that are based on the hardware devices available in the transceiver are presented according to the radio-frequency (RF) components such as an oscillator, power amplifier, device clock, and modulator/demodulator. Furthermore, due to the use of multiple-input multiple-output (MIMO) technology in 5G networks and beyond, new PLA techniques are introduced based on the beam pattern and sparsity of the MIMO channel, which is discussed deeply in this chapter. Finally, we provide some research challenges in PLA systems and future discussion.
-
6 Context-aware physical layer security for future wireless networks
- + Show details - Hide details
-
p.
99
–115
(17)
The amount information currently generated and contained in wireless networks is paramount. Additionally, wireless sensing through integrated sensing and communication (ISAC) is being incorporated into the next-generation [B5G, WiFi 7] wireless communication standards, further increasing this information. Faster chips, various network topologies and higher data rates have permitted increased utilization of artificial intelligence (AI) techniques in wireless systems and thus enable accurate predictions of future network and radio environment related phenomenon. Therefore, a capable device can essentially be aware of the user, network, and radio environment activities. These developments have led to the cognitive or context-aware physical layer security (PLS) concept. With this, intelligent wireless devices can anticipate threats and take the necessary precautions dynamically. This chapter will go over radio environment monitoring (REMo), which is the process of collecting, processing and storing the aforementioned information. Then, the context-aware PLS framework will be introduced, with application examples.
-
7 Signal domain physical modification for PLS
- + Show details - Hide details
-
p.
117
–135
(19)
In wireless communication, the data is conveyed through transmission over a physical signal, occupying a bounded specific space-time-frequency block in hyperspace. The building block of this signal is a distinct waveform that conveys the data symbols. A successful reception or detection of a signal requires the receiver to know the exact location of the transmitted signal in space-time-frequency hyperspace. Moreover, a successful identification requires that the receiver knows the features of the transmitted signal in order to decode the data. The goal of physical layer security (PLS) is to ensure the successful detection and identification of the information at the legitimate receiver while preventing illegitimate receivers from doing that. Initially, this chapter presents an overview of the inherent security characteristics provided by different waveforms against detection and identification. Then, it investigates how securing the control channel signals can affect the secrecy capacity of the communication system. However, inherent security and securing the control signal cannot fulfill the security requirements of all wireless applications. Therefore, in order to provide the required level of security, PLS comes into play, where it includes designing different processes that affect the signal based on the parameters extracted from the observation plane to modify the transmissions to ensure secure communication as highlighted in Chapter 3 (Modification plan).
-
8 Physical modification plane: cross MAC/PHY scheduling and resource allocation
- + Show details - Hide details
-
p.
137
–156
(20)
This chapter discusses the strategies for providing physical layer security (PLS) using current scheduling and resource allocation (RA) algorithms. PLS could be a useful notion for resource management that focuses on security. Scheduling and RA have been used to accomplish a number of objectives, including improving spectrum efficiency (SE) and energy efficiency (EE), as well as increasing fairness. Information security can be efficiently achieved by carefully allocating the available resources based on the PLS concept. This chapter will review the scheduling and RA and their popular methods. Performance indicators and fundamental PLS optimization issues are then discussed. The secure RA and the prevalent PLS scheduling strategies are then covered. The importance of PLS-based scheduling in downlink transmission in wireless networks is demonstrated. Finally, the potential difficulties are discussed, and it is anticipated that the reader will understand PLS-based scheduling strategies and be motivated to use them in the future.
-
9 Physical layer security in distributed wireless networks
- + Show details - Hide details
-
p.
157
–174
(18)
According to the framework presented in Chapter 3, the network domain represents the various physical nodes present in the propagation environment and how their transmissions can be modified or adapted to enable physical layer security (PLS).. Specifically, these nodes may include relays, transmission points (TPs), and reconfigurable intelligent surfaces (RISs) in cooperative communication, coordinated multipoint (CoMP) and smart radio environment paradigms, respectively. All three of these are discussed as potential solutions against eavesdropping, jamming, and spoofing attacks.
-
10 Physical layer security for Internet of Things networks
- + Show details - Hide details
-
p.
175
–203
(29)
In this chapter, the physical layer security (PLS) is interrogated for Internet of things (IoT) networks. As a result of their nature, IoT networks consist of a massive number of devices. These devices are produced in compact sizes and powered with small batteries rather than a grid network. Thus, they are able to have high portability but have low computational capability. Because of these features of IoT devices, the conventional encryption/decryption-based cryptographic security methods used in the classical wireless devices fail to satisfy the security requirements of IoT networks. The main reason for this is that the requirements of these security methods are too demanding for the processing power of IoT devices and stringent to manage when these devices are deployed in a massive number. Therefore, in this chapter, the possible advantages of the PLS in IoT networks are explained. In this manner, the IoT architecture is explained and common attack types in IoT networks are reviewed. Then, the unique features of IoT networks from the PLS perspective are presented along with the possible challenges on the way. A literature review is conducted to propound the current PLS techniques used in IoT networks and the future directions are signified. As a result of this chapter, it is expected that PLS techniques in IoT networks are clarified to the reader and their future applications are encouraged.
-
11 Physical layer security for wireless sensing and joint radar and communications
- + Show details - Hide details
-
p.
205
–232
(28)
This chapter focuses on providing physical layer security (PLS) to the joint radar and communication (JRC) systems. The integration of sensing and communication via shared spectral, hardware, and signal processing framework provides energy and cost efficiency. However, the inclusion of information into radar probing signals makes the communication susceptible to eavesdropping from the potential radar targets thereby generating a tradeoff, where the JRC transmitter needs to direct sufficient power toward the target to illuminate it while simultaneously limiting useful signal power to prevent eavesdropping. In addition to that, critical sensing information gathered via various sensing techniques including radar systems must also be protected. Therefore, in this chapter, various attacks such as exploratory, manipulation and disruption attacks on wireless sensing are discussed along with the techniques to counter them. Moreover, certain algorithms and PLS techniques are described for the realization of secure joint radar and communication systems.
-
12 Physical layer security in non-terrestrial networks
- + Show details - Hide details
-
p.
233
–259
(27)
In this chapter, we have presented the secrecy performance of NTN systems from a physical layer aspect. First, RF eavesdropping on the ground for dual-hop HAPS-aided downlink SatCom was covered. After that, we presented the PLS for NTN systems by covering three distinct FSO eavesdropping scenarios; HAPS eavesdropping, UAV eavesdropping, and satellite eavesdropping. The obtained results showed that the signal fluctuations caused by atmospheric conditions have a direct impact on the secrecy performance.
To summarize, significant consideration must be given to channel modeling and the radio propagation environment in order to meet the anticipated quality of service and security requirements of wireless networks.
-
13 Security in physical layer of cognitive radio networks
- + Show details - Hide details
-
p.
261
–293
(33)
Fifth-generation (5G) networks and beyond are anticipated to support a vast number of connections and services. Due to the enormous amount of confidential data shared between devices in these networks, the risk of security vulnerabilities escalates proportionally. Cognitive radio networks (CRNs) are no exception since they are vulnerable to a variety of physical-layer threats; hence, a physical-layer approach is necessary to safeguard these networks. Consequently, physical-layer security (PLS) has recently been applied for examining and strengthening the security of wireless networks, including CRNs. In light of this, this chapter examines a brief overview of CRNs, as well as the main physical layer attacks and their respective primary countermeasures. In addition, the employment of energy harvesting (EH) techniques to improve CRNs security is discussed. The security threats on cognitive unmanned aerial vehicles (UAVs) and their primary defense mechanisms are presented. In addition, the consideration of cascaded fading channels and their effect on the security of CRNs are explored. Finally, this chapter includes conclusions and potential future directions.
-
14 Machine learning for physical layer security
- + Show details - Hide details
-
p.
295
–320
(26)
Due to the broadcast nature of the wireless medium, an illegitimate node can harm legitimate users with eavesdropping, jamming, and spoofing threats, as indicated in the previous chapters. These threats can be eliminated, detected, and prevented using physical layer security (PLS) approaches. However, providing PLS of the fifth generation and beyond (5GB) communication and sensing systems is challenging due to the requirements of these systems, such as heterogeneity, ultra density, and high mobility. This is especially the case when a large number of parameters are used simultaneously, and the problem or model itself is highly dimensional and complex. Machine learning (ML) and deep learning (DL) have recently emerged as potential tools for reducing the increasing complexity of wireless networks while simultaneously employing multiple parameters in multiple dimensions (improving the performance of wireless security systems). In this chapter, we first review the classic and recent ML and DL algorithms for PLS, the ongoing and anticipated issues, and the primary efforts made in this sector by leading industries and research entities. Then, we summarize the possible research direction for ML-based PLS.
-
15 Communications network security using quantum physics
- + Show details - Hide details
-
p.
321
–346
(26)
Applications of quantum technologies are rapidly progressing in communications systems implementations. In particular, quantum key distribution (QKD) and quantum random number generation have become key applications for cryptography and physical layer security. Unlike classical cryptography and network security, in QKD, security is ensured by the laws of physics and is, in principle, unbreachable by an interceptor. In particular, peculiar properties and postulates of quantum physics, such as superposition, entanglement, and quantum measurement uncertainty, are exploited to achieve system security. Quantum random number generator (QRNG) is also an important component in the implementation of QKD protocols. Likewise, in QRNG, true randomness (unpredictability using past data and uniformity of statistical distribution) is guaranteed by the laws of quantum physics. In this study, we review prominent aspects of QKD and QRNG, related standards, protocols, and hardware components. Moreover, a comprehensive review of the current QKD protocols and quantum random number generation methods is also presented.
-
Back Matter
- + Show details - Hide details
-
p.
(1)
Related content
