Wireless Physical Layer Security

  • PDF / 121,972 Bytes
  • 2 Pages / 600.05 x 792 pts Page_size
  • 15 Downloads / 188 Views

DOWNLOAD

REPORT


Editorial Wireless Physical Layer Security M´erouane Debbah,1 Hesham El-Gamal,2 H. Vincent Poor,3 and Shlomo Shamai (Shitz)4 1 Alcatel-Lucent

Chair on Flexible Radio, Sup´elec, 3 rue Joliot-Curie, 91192 Gif-sur-Yvette Cedex, France of Electrical & Computer Engineering, Ohio State University, 205 Dreese Labs, 2015 Neil Avenue, Columbus, OH 43210, USA 3 Department of Electrical Engineering, Princeton University, Engineering Quadrangle, Olden Street, Princeton, NJ 08544, USA 4 Department of Electrical Engineering, Technion, Technion City, Haifa 32000, Israel 2 Department

Correspondence should be addressed to M´erouane Debbah, [email protected] Received 31 December 2009; Accepted 31 December 2009

Copyright © 2009 M´erouane Debbah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical layer, and all widely used cryptographic protocols are designed and implemented assuming the physical layer has already been established and provides an error-free link. However, with the emergence of adhoc and decentralized networks, higher-layer techniques, such as encryption, are complex and difficult to implement. Therefore, there has been a considerable recent attention on studying the fundamental ability of the physical layer to provide secure wireless communications. This paradigm is called Wireless Physical Layer Security. Physical layer security is an emerging research area that explores the possibility of achieving perfect-secrecy data transmission among intended network nodes, while possibly malicious nodes that eavesdrop upon the transmission obtain zero information. The breakthrough concept behind wireless physical layer security is to exploit the characteristics of the wireless channel, such as fading or noise, to provide secrecy for wireless transmissions. While these characteristics have traditionally been seen as impairments, physical layer security takes advantage of these characteristics for improving the security and reliability of wireless communication systems and networks. Information theoretic security provides the theoretical basis behind wireless physical layer security. Historically,

information theoretic security, which builds on Shannon’s notion of perfect secrecy, was laid in the 1970s by Wyner and later by Csisz´ar and K¨orner, who proved seminal results showing that there exist channel codes guaranteeing both robustness to transmission errors and a prescribed degree of data confidentiality. In the 1970s and 1980s, the impact of these works was limited, partly because practical wiretap codes were not available, but mostly due to the fact that a strictly positive secrecy capacity in th