103,99 €
Meet the wireless security challenges of the future with this key volume
The 6th generation of wireless communication technology—known as 6G—promises to bring both revolutionary advances and unique challenges. Secure communications will be harder than ever to achieve under the new integrated ground, air, and space networking paradigm, with increased connectivity creating the potential for increased vulnerability. Physical-layer security, which draws upon the physical properties of the channel or network to secure information, has emerged as a promising solution to these challenges.
Physical-Layer Security for 6G provides a working introduction to these technologies and their burgeoning wireless applications. With particular attention to heterogeneous and distributed network scenarios, this book offers both the information-theory fundamentals and the most recent developments in physical-layer security. It constitutes an essential resource for meeting the unique security challenges of 6G.
Physical-Layer Security for 6G readers will also find:
Physical-Layer Security for 6G is ideal for wireless research engineers as well as advanced graduate students in wireless technology.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 569
Veröffentlichungsjahr: 2024
Cover
Table of Contents
Title Page
Copyright
About the Editors
List of Contributors
Preface
Part I: Preliminaries
1 Foundations of Physical-Layer Security for 6G*
1.1 Coding Mechanisms
1.2 Coding for Physical-Layer Security
1.3 Engineering and Learning Channels
References
Note
2 Coding Theory Advances in Physical-Layer Secrecy
2.1 Introduction
2.2 Wiretap Coding Schemes Based on Coset Coding
2.3 Wiretap Coding Schemes Based on Invertible Extractors
2.4 Finite-Length Results
References
Notes
Part II: Physical-Layer Security in Emerging Scenarios
3 Beamforming Design for Secure IRS-Assisted Multiuser MISO Systems
3.1 Introduction
3.2 System Model
3.3 Resource Allocation Optimization Problem
3.4 Solution of the Optimization Problem
3.5 Experimental Results
3.6 Conclusion
3.7 Future Extension
3.A Appendix – Proof of Theorem 3.1
References
Notes
4 Physical-Layer Security for Optical Wireless Communications
4.1 Introduction
4.2 PLS for SISO VLC
4.3 PLS for MISO VLC
4.4 PLS for Multiuser VLC
4.5 PLS for VLC with Emerging Technologies
4.6 Open Challenges and Future Works
References
5 The Impact of Secrecy on Stable Throughput and Delay
5.1 Introduction
5.2 System Model
5.3 Stability Region for the General Case
5.4 Stability Region Analysis: Receivers with Different Decoding Abilities
5.5 Impact of Secrecy on Delay Performance
5.6 Results and Discussion
5.7 Conclusion
References
6 Physical-Layer Secrecy for Ultrareliable Low-Latency Communication
6.1 Introduction
6.2 Background
6.3 System Model
6.4 Impact of Secrecy on Stable Throughput
6.5 Impact of Secrecy on Latency
6.6 Results and Discussion
6.7 Conclusion
References
Part III: Integration of Physical-Layer Security with 6G Communication
7 Security Challenges and Solutions for Rate-Splitting Multiple Access
7.1 Introduction
7.2 Security Issues in RSMA
7.3 How Much of the Split Signal Should Be Revealed?
7.4 Secure Beamforming Design for RSMA Transmission
7.5 Conclusion
References
Note
8 End-to-End Autoencoder Communications with Optimized Interference Suppression*
8.1 Introduction
8.2 Related Work
8.3 System Model
8.4 Performance Evaluation of AEC Considering the Effects of Channel, Quantization, and Embedded Implementation
8.5 Data Augmentation to Train the AE Model Using GANs
8.6 Methods to Suppress the Effects of Interference
8.7 AE Communications with Interference Suppression for MIMO Systems
8.8 Conclusion
References
Note
9 AI/ML-Aided Processing for Physical-Layer Security
9.1 Introduction
9.2 Proposed Metrics for RF Fingerprinting and SKG
9.3 Power Domain Preprocessing
9.4 Conclusions
References
10 Joint Secure Communication and Sensing in 6G Networks
10.1 Introduction
10.2 Related Work and Motivation
10.3 System Model
10.4 Secret Key Generation Protocol
10.5 Measurement Setup
10.6 Results and Discussion
Acknowledgments
References
Part IV: Applications
11 Physical-Layer Authentication for 6G Systems
11.1 Authentication by Physical Parameters
11.2 Challenge-Response PLA for 6G
11.3 Intelligent PLA Based on Machine Learning
References
12 Securing the Future e-Health: Context-Aware Physical-Layer Security
12.1 Introduction
12.2 PHYSEC Key Generation
12.3 Key-less PHYSEC for Medical Image Transmission
12.4 Proof-of-Concept Study
12.5 Conclusions and Future Directions
References
Notes
13 The Role of Non-terrestrial Networks: Features and Physical-Layer Security Concerns
13.1 Non-terrestrial Networks for 6G
13.2 Physical-Layer Security in Non-terrestrial Networks
13.3 Conclusions
References
Notes
14 Quantum Hardware-Aware Security for 6G Networks
14.1 Introduction
14.2 Preliminaries
14.3 Secret Communication
14.4 Covert Communication
14.5 Conclusion
Acknowledgments
References
Notes
15 Leveraging the Physical Layer to Achieve Practically Feasible Confidentiality and Authentication
15.1 Introduction
15.2 System Model
15.3 Confidentiality at the Physical Layer in Practical Settings
15.4 Authentication at the Physical Layer in Practical Settings
15.5 Numerical Experiments
15.6 Conclusion
References
Index
End User License Agreement
Chapter 3
Table 3.1 System parameters.
Chapter 8
Table 8.1 The architecture of the AE.
Table 8.2 Comparison of model size.
Table 8.3 Comparison of inference time.
Table 8.4 Comparison of BER for .
Table 8.5 Comparison of BER for .
Table 8.6 Comparison of BER for .
Table 8.7 The network sizes and the total number of parameters for the AEC’s...
Table 8.8 Architecture of the generator and discriminator networks of the co...
Table 8.9 Evaluation of BER as a function of .
Table 8.10 The size of the inputs and outputs for the encoder and decoder in...
Table 8.11 BER of a MIMO system taking interference into account.
Chapter 9
Table 9.1 The layer configuration and activation function for AE1.
Table 9.2 AE: key results for Quadriga.
Chapter 10
Table 10.1 SKG rates for different scenarios.
Chapter 15
Table 15.1 Communication parameters for
PLA
.
Chapter 1
Figure 1.1 Channel coding over a discrete memoryless channel.
Figure 1.2 Soft-covering over a discrete memoryless channel.
Figure 1.3 Source coding with side information for a discrete memoryless sou...
Figure 1.4 Privacy amplification from a discrete memoryless channel.
Figure 1.5 Secure communication over the wiretap channel.
Figure 1.6 Secret-key generation from source model.
Chapter 2
Figure 2.1 An illustration of the binning technique. Each message is mappe...
Figure 2.2 An example of factor graph for the binary linear code defined b...
Figure 2.3 The binary erasure wiretap channel .
Figure 2.4 Range of eavesdropper’s parameters such that the dual wiretap L...
Figure 2.5 The basic polarization technique for .
Figure 2.6 The channel polarization construction for .
Figure 2.7 Modular wiretap codes based on invertible extractors.
Figure 2.8 Comparison of the lower bound on secrecy rates of Reed–Muller and...
Chapter 3
Figure 3.1 Illustration of the considered IRS-enhanced wireless networks inv...
Figure 3.2 Illustration of the tangent space for a point at a unit circle ...
Figure 3.3 Illustration of the flow and the key optimization steps of the ov...
Figure 3.4 Illustration of the adopted simulation setup.
Figure 3.5 System SSR (bits/s/Hz) versus the BS maximum transmit power (dBm)...
Figure 3.6 SSR (bits/s/Hz) versus the number of users averaged over differen...
Chapter 4
Figure 4.1 The indoor SISO VLC wiretap system.
Figure 4.2 Limited dynamic range of a typical LED.
Figure 4.3 Secrecy capacity and different achievable secrecy rates.
Figure 4.4 The indoor MISO VLC wiretap system.
Figure 4.5 The SOP versus the number of active EDs for various ZF beamformin...
Figure 4.6 The average secrecy capacity and achievable secrecy rates versus ...
Figure 4.7 The indoor multiuser VLC wiretap system.
Figure 4.8 Secrecy rate of the MISO VLC beamforming system.
Figure 4.9 Configuration of the IRS: each reflecting element can direct the ...
Figure 4.10 The relationship between the secrecy rate and the quantity of IR...
Chapter 5
Figure 5.1 -User BC with secrecy constraint with having jamming ability....
Figure 5.2 The stability region for 2-user BC.
Figure 5.3 Impact of full-duplex ability of receiver on the stability regi...
Figure 5.4 The stability region for : , , , , , , , , , , and [...
Figure 5.5 Impact of degree of self-interference cancelation on the stabilit...
Figure 5.6 Impact of jamming power on average packet delay at the legitimate...
Figure 5.7 Impact of power of the interfering signal on average packet delay...
Chapter 6
Figure 6.1 Interplay between reliability, secrecy and latency.
Figure 6.2 Rayleigh fading wiretap channel with a trusted jammer and queue a...
Figure 6.3 Impact of power at the transmitter and jammer on the average serv...
Figure 6.4 Impact of arrival rate on latency (average delay and average AoI)...
Figure 6.5 Impact of power budget of jammer on latency (average delay and av...
Chapter 7
Figure 7.1 Overall architecture of RSMA scheme.
Figure 7.2 Internal eavesdropping attack in RSMA systems.
Figure 7.3 The proposed power-allocation scheme. (a) Secrecy rate versus a...
Figure 7.4 Ergodic secrecy rate and sum rate versus . (a) Ergodic secrecy r...
Figure 7.5 Ergodic sum rate versus ergodic secrecy rate.
Figure 7.6 WSR versus desired secrecy rate, , with , , and SNR = 20 dB.
Figure 7.7 Power allocation versus desired secrecy rate, , with , , and S...
Chapter 8
Figure 8.1 Interfaces of different system model components for the proposed ...
Figure 8.2 System model.
Figure 8.3 BER in an AWGN channel.
Figure 8.4 BER in an AWGN channel when considering channel impairments where...
Figure 8.5 BER of different number of bits for channel use of 1.
Figure 8.6 BER of different number of bits for channel use of 4.
Figure 8.7 Signal constellation comparison at dB SNR.
Figure 8.8 Signal constellation comparison at 30 dB SNR.
Figure 8.9 EVM results for different channel uses keeping the bits per symbo...
Figure 8.10 Comparison of the BER performance for channels, between FPM an...
Figure 8.11 System model of the conditional WGAN-GP.
Figure 8.12 BER with 100 real samples.
Figure 8.13 BER with 1000 real samples.
Figure 8.14 Error performance evaluation for channel use of 1.
Figure 8.15 Error performance evaluation for channel use of 2.
Figure 8.16 Error performance evaluation for channel use of 4.
Figure 8.17 Assessing the EVM versus BER for AEC without interference suppre...
Figure 8.18 Assessing the EVM versus BER for AEC that is trained with RS to ...
Figure 8.19 Visualization of jamming signal interfering with only one symbol...
Figure 8.20 Assessing the AE models trained on single-symbol interference fo...
Figure 8.21 The BER performance comparison between the AEC and conventional ...
Chapter 9
Figure 9.1 Positions of nodes in the synthetic Quadriga dataset.
Figure 9.2 TVD versus .
Figure 9.3 Separation of neighbors for the original signal and the princ...
Figure 9.4 Trade-off between CC and MP for SNR for the Quadriga dataset. D...
Figure 9.5 Trade-off between CC and MP for for the Quadriga dataset. (a) A...
Figure 9.6 Evolution of with for for the Quadriga dataset.
Chapter 10
Figure 10.1 Physical-layer-based SKG between Alice and Bob.
Figure 10.2 A filterbank comprising five filters. The transmit signal has a ...
Figure 10.3 Diagram depicting the measurement setup (made using floorplaner....
Figure 10.4 LoS measurement setup.
Figure 10.5 NLoS measurement setup.
Figure 10.6 Histograms of power measurements captured across various environ...
Figure 10.7 Bit mismatch probability at Bob and Eve after quantization. Diff...
Figure 10.8 Rate of unsuccessful reconciliation at Alice and Bob.
Figure 10.9 Rate of unsuccessful reconciliation at Eve.
Figure 10.10 Evaluation of the conditional min-entropy for different numbers...
Figure 10.11 Average SKG rate for different numbers of quantization regions,...
Chapter 11
Figure 11.1 Model of the RIS-assisted MIMO communication system.
Figure 11.2 Challenges of traditional authentication methods.
Figure 11.3 Intelligent PLA based on machine-learning algorithms.
Figure 11.4 Training accuracy of intelligent PLA based on the BPNN algorithm...
Figure 11.5 Authentication accuracy of intelligent PLA based on different ma...
Chapter 12
Figure 12.1 Learning-assisted PHYSEC key generation for wireless-powered coo...
Figure 12.2 Echo state network neural architecture.
Figure 12.3 Observation mismatches for learning-aided versus conventional PH...
Figure 12.4 Inference time for ESN versus fully-connected network.
Figure 12.5 Secret key rate comparison for different number of UTs.
Figure 12.6 Secret key rate comparison of the direct and TB-MALA schemes
Figure 12.7 Secure medical image transmission.
Figure 12.8 Required time for to complete recovering the entire file versu...
Figure 12.9 Recovered medical image at versus the recovered one at Eves....
Figure 12.10 Implemented testbed for group SKG.
Figure 12.11 Raw RSSI values obtained from the testbed.
Figure 12.12 Secrecy performance in terms of mutual information metric.
Figure 12.13 Achieved secret key rates for 50 runs of group-based PHY SKG al...
Chapter 13
Figure 13.1 The NTN scenario in which UAVs, HAPs, and satellites are deploye...
Figure 13.2 General model for a PLA scheme. Alice and Eve generate signals w...
Figure 13.3 General system model for the position integrity problem.
Figure 13.4 Missed detection probability versus the SNR on the legitimate ...
Figure 13.5 Performance of the optimal attack strategy, with LRT and GLRT de...
Chapter 14
Figure 14.1 Quantum wiretap channel models. (a)
classical/classical-quantum
Figure 14.2 The basic idea of covert communication is to prevent the attacke...
Chapter 15
Figure 15.1 General system model for confidentiality and authentication at t...
Figure 15.2 Number of transmission slots required to achieve bits of
PLS
t...
Figure 15.3 Average MD probability with different numbers of subcarriers , ...
Figure 15.4 Measure of authentication performance with different training se...
Cover
Table of Contents
Series Page
Title Page
Copyright
About the Editors
List of Contributors
Preface
Begin Reading
Index
End User License Agreement
i
iii
iv
xiii
xv
xvi
xvii
xviii
xix
xx
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
355
356
357
358
359
360
361
362
IEEE Press445 Hoes LanePiscataway, NJ 08854
IEEE Press Editorial BoardSarah Spurgeon, Editor-in-Chief
Moeness Amin
Jón Atli Benediktsson
Adam Drobot
James Duncan
Ekram Hossain
Brian Johnson
Hai Li
James Lyke
Joydeep Mitra
Desineni Subbaram Naidu
Tony Q. S. Quek
Behzad Razavi
Thomas Robertazzi
Diomidis Spinellis
Edited by
Parthajit Mohapatra
Department of Electrical Engineering, Indian Institute of Technology Tirupati, India
Nikolaos Pappas
Department of Computer and Information Science, Linköping University, Campus Valla, Sweden
Arsenia Chorti
Information, Communications and Imaging (ICI) Group of the ETIS Lab UMR8051, CY Cergy Paris Universite, Cergy, France
Stefano Tomasin
Department of Information Engineering, University of Padova, Padova, Italy
Copyright © 2024 by The Institute of Electrical and Electronics Engineers, Inc.
All rights reserved.Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.
Library of Congress Cataloging-in-Publication Data
Names: Mohapatra, Parthajit, editor. | Pappas, Nikolaos, 1982- editor. | Chorti, Arsenia, editor. | Tomasin, Stefano, editor.
Title: Physical-layer security for 6G / edited by Parthajit Mohapatra, Nikolaos Pappas, Arsenia Chorti, Stefano Tomasin.
Description: Hoboken, New Jersey : Wiley, [2024] | Includes index.
Identifiers: LCCN 2024034415 (print) | LCCN 2024034416 (ebook) | ISBN 9781394170913 (hardback) | ISBN 9781394170920 (adobe pdf) | ISBN 9781394170937 (epub)
Subjects: LCSH: 6G mobile communication systems--Security measures.
Classification: LCC TK5103.252 .P48 2024 (print) | LCC TK5103.252 (ebook) | DDC 621.3845/6--dc23/eng/20240819
LC record available at https://lccn.loc.gov/2024034415
LC ebook record available at https://lccn.loc.gov/2024034416
Cover Design: Wiley
Cover Image: © koiguo/Getty Images
Parthajit Mohapatra is an associate professor in the Department of Electrical Engineering, Indian Institute of Technology Tirupati, India. His primary research interests include wireless communication and current research focuses on physical-layer secrecy, short packet communication, and union of physical and network layers. Parthajit received the PhD degree from the Indian Institute of Science, Bangalore, in 2015.
Nikolaos Pappas is an associate professor and a docent in the Department of Computer and Information Science, Linköping University, Linköping, Sweden. His main research interests include the field of wireless communication networks with an emphasis on semantics-aware goal-oriented communications, age of information, energy harvesting networks, and network-level cooperation. Nikolaos received the PhD degree in computer science from the University of Crete, Greece, in 2012.
Arsenia Chorti is a professor (first class) at Ecole Nationale Supérieure de l’Electronique et de ses Applications, Cergy, Ile de France. Dr. Chorti received the Habilitation pour Diriger des Recherches in 2020.
Stefano Tomasin is a full professor in the Department of Information Engineering, University of Padova, Italy. Stefano received the PhD degree in telecommunications engineering from the University of Padova, Italy, in 2003.
Francesco Ardizzon
Department of Information Engineering
University of Padova
Padova
Italy
Marco Baldi
Department of Information Engineering
Università Politecnica delle Marche
Ancona
Italy
Igor Bjelaković
Technische Universität Berlin
Berlin
Germany
and
Fraunhofer Heinrich-Hertz-Institut
Berlin
Germany
Matthieu Bloch
School of Electrical and Computer Engineering
Georgia Institute of Technology
Atlanta, GA
USA
Arsenia Chorti
Wireless Connectivity Group
Barkhausen Institut
Dresden
Germany
and
ETIS UMR8051, CY University
ENSEA, CNRS
Cergy
France
Laura Crosara
Department of Information Engineering
University of Padova
Padova
Italy
Kemal Davaslioglu
Nexcepta
Gaithersburg, MD
USA
Tugba Erpek
Nexcepta
Gaithersburg, MD
USA
He Fang
School of Electronic and Information Engineering
Soochow University
Sochow
China
Matthias Frey
Department of Electrical and Electronic Engineering
The University of Melbourne
Parkville, Victoria
Australia
Marco Giordani
Department of Information Engineering
University of Padova
Padova
Italy
Shenjie Huang
School of Engineering
The University of Edinburgh
Edinburgh
UK
Eduard Jorswieck
Institute for Communications Technology
TU Braunschweig
Brunswick
Germany
Babak Khalaj
EE Department
Sharif University of Technology
Tehran
Iran
Juliane Krämer
Universität Regensburg
Regensburg, Bayern
Germany
Nicola Laurenti
Department of Information Engineering
University of Padova
Padova
Italy
Mehdi Letafati
EE Department
Sharif University of Technology
Tehran
Iran
Laura Luzzi
ETIS, UMR 8051, CY Cergy Paris Université
ENSEA, CNRS
Cergy-Pontoise
France
Christos Masouros
Department of Electronic and Electrical Engineering
University College London
London
UK
Amitha Mayya
Wireless Connectivity Group
Barkhausen Institut
Dresden
Germany
Miroslav Mitev
Wireless Connectivity Group
Barkhausen Institut
Dresden
Germany
Parthajit Mohapatra
Department of Electrical Engineering
Indian Institute of Technology Tirupati
Tirupati
India
Derrick Wing Kwan Ng
School of Electrical Engineering and Telecommunications
University of New South Wales
Sydney, New South Wales
Australia
Janis Nötzel
Emmy-Noether Group Theoretical Quantum Systems Design
Technische Universität München
München, Bayern
Germany
Nikolaos Pappas
Department of Computer and Information Science
Linköping University
Linköping
Sweden
Majid Safari
School of Engineering
The University of Edinburgh
Edinburgh
UK
Yalin Sagduyu
Nexcepta
Gaithersburg, MD
USA
Abdelhamid Salem
Department of Electronic and Electrical Engineering
University College London
London
UK
and
Department of Electronic and Electrical Engineering
University of Benghazi
Benghazi
Libya
Robert Schober
Institute for Digital Communications
Friedrich-Alexander-University Erlangen Nürnberg
Erlangen
Germany
Linda Senigagliesi
Department of Information Engineering
Università Politecnica delle Marche
Ancona
Italy
Mahdi Shakiba Herfeh
ETIS UMR8051, CY University
ENSEA, CNRS
Cergy
France
Sotiris Skaperas
ETIS UMR8051, CY University
ENSEA, CNRS
Cergy
France
Mohammad Dehghani Soltani
School of Engineering
The University of Edinburgh
Edinburgh
UK
Muralikrishnan Srinivasan
Department of Electronics Engineering
Indian Institute of Technology (BHU)
Varanasi
India
Sławomir Stańczak
Technische Universität Berlin
Berlin
Germany
and
Fraunhofer Heinrich-Hertz-Institut
Berlin
Germany
Stefano Tomasin
Department of Information Engineering
University of Padova
Padova
Italy
Xianbin Wang
Department of Electrical and Computer Engineering
Western University
London, Ontario
Canada
Dongfang Xu
Academy of Interdisciplinary Studies
The Hong Kong University of Science and Technology
Kowloon, Hong Kong
China
Michele Zorzi
Department of Information Engineering
University of Padova
Padova
Italy
6G is envisioned to provide hyperconnectivity between users and objects, with interconnected machines being the dominant users. The widespread adoption of wireless devices presents unique challenges for ensuring secure communications. To meet the requirements of various services such as Ultra-Reliable Low Latency Communication (URLLC) and massive Machine Type Communication (mMTC), it is required to redesign existing physical-layer-based techniques to take into account the quality of service requirements such as reliability, latency, and energy consumption. The book aims to provide a comprehensive background on the physical-layer security and advances in the context of 6G networks.
The initial part of the book offers an introduction to physical-layer secrecy and then discusses the coding theory advances in the context of 6G. It provides novel material on the role of physical-layer secrecy in emerging communication scenarios ranging from intelligent reflecting surfaces to non-terrestrial networks. Some of the key topics covered in the book are as follows:
Application of physical-layer security in emerging communication technologies such as visible light communication (VLC) and intelligent reflecting surfaces (IRS)
Impact of physical-layer secrecy on latency aspects of communication such as delay and age of information (AoI)
Physical-layer-based authentication
Joint secure communication and sensing
AI/ML-enabled physical-layer secrecy
Context-aware physical-layer secrecy
The book explores use cases and practical demonstrations to provide insights into how physical-layer security can address the unique challenges of 6G networks. The reader will obtain a view of physical-layer security as a technology ready to be considered for the upcoming 6th generation of cellular networks. The book will benefit a broad audience of engineers and scientists by helping them understand the functioning of a new type of security that will be included in future communication systems.
June 2024
Parthajit Mohapatra
Tirupati, India
Nikolaos Pappas
Linköping, Sweden
Arsenia Chorti
Cergy-Pontoise, France
Stefano Tomasin
Padova, Italy
Matthieu Bloch
School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA
Wireless connectivity has become a cornerstone of our modern societies, driving innovation and supporting an ever-growing range of services. With the increasingly sensitive nature of information transmitted over wireless networks, privacy and secrecy mechanisms have naturally become an integral part of new protocols and standards. While identified weaknesses of previous generation wireless protocols are typically addressed with the rollout of the next generation, challenges constantly emerge that must be proactively addressed. For instance, while 5G systems have addressed some of the security weaknesses identified in 4G systems, the attack surface of 5G networks has increased because of the heterogeneity of devices and the larger number of use cases [48], as exemplified by the growth of machine-to-machine communications [19]. Consequently, security has yet again already been identified as one of the main challenges that 6G networks must address [72].
Several security solutions have been considered to provide full-stack security, including lightweight cryptography for Internet of Things (IoT) devices [61], the use of post-quantum cryptography [3, 72], and physical-layer security (PLS) [11, 45], which has again re-emerged as a possible technology [32, 38, 49, 66, 74]. The key concept behind PLS is to exploit the random imperfections inherent to wireless channels and devices (noise, interference) to provide, e.g., secrecy or authentication, using physical-layer signal processing and coding algorithms [11, 56, 68]. While PLS may certainly not solve all 6G security challenges in isolation, its main benefits are (i) to provide a concrete framework in which security can be quantified, e.g., through the notion of secrecy capacity [68]; (ii) to treat security on par with other system-level metrics, such as power consumption, throughput, and latency, at the design stage; (iii) to reduce the attack surface at the physical layer by making eavesdropping extremely costly, if not ineffective; and (iv) to seamlessly integrate with security mechanisms in the upper layers of the protocol stack. In particular, ensuring confidentiality for ultralow-latency communications is a known challenge [1, 54] that PLS could help tackle [15, 58].
PLS was already discussed in the context of 5G networks [35, 66], and one should recognize that, with the exception of niche applications and use cases [73], PLS has not had much impact on deployed systems. This state of affairs can be attributed to a multitude of factors, both technological and conceptual, ranging from scientific challenges related to the foundation of PLS itself (e.g., how do we characterize and learn a passive eavesdropper’s channel?) to technological hurdles (e.g., how do we justify integrating new codes at the physical layer of a standard?). Nevertheless, 6G promises new unique features that may finally offer the opportunity to push PLS into widely deployed systems [16, 45]. In particular, the integration of sensing and communication, especially as it relates to enhancing the localization of devices, and the push toward higher frequencies in the mmWave region are offering new avenues to strengthen the case of PLS.
The objective of this chapter is twofold. First, we will review the seminal coding ideas behind PLS, which have been refined over the last two decades to provide a strong basis for discussing secrecy in a principled manner. Second, we will discuss how these principles may be used in the more specific context of 6G systems, with an eye toward engineering channels, developing dedicated hardware, and exploiting channel knowledge for security. Given the breadth of literature on the topic, this chapter does not do justice to many creative ideas, in particular those involving PLS in the context of networks of many devices for which the reader is referred to tutorial articles [46, 51, 66, 71]. The focus of the chapter is on point-to-point links, for they still capture the essence of the challenges that remain to address and the opportunities that have emerged and might represent the realistic use cases for which PLS could be deployed at scale.
The appeal of (PLS) can be largely attributed to the early work of Wyner [68], Csiszár and Körner [21], Ahlswede and Csiszár [2], and Maurer [43], that first established and analyzed the notion of secrecy capacity and secret-key capacity. We defer to Section 1.2 for exact definitions, suffice to say for now that these definitions are the counterparts of the traditional notion of channel capacity and that they quantify the maximum rate of information that can be transmitted or extracted reliably and confidentially over a channel that includes an eavesdropping adversary. While secrecy capacity and secret-key capacity therefore provide system-level metrics that can be optimized as a function of channel parameters to understand how much secrecy can be achieved in a network, the ability to operationalize them is fundamentally tied to the ability to design specific coding schemes to extract or encode information in signal. Said differently, in the same way that the notion of channel capacity is useful because good error-control codes exist, secrecy and secret-key capacity are useful because good secrecy codes exist. The objective of this section is to introduce four coding operations that shall enable PLS by providing operational meaning to what it means to enforce secrecy in Section 1.2.
The problem of channel coding is illustrated in Figure 1.1. The objective consists in transmitting a uniformly distributed messages over uses of a discrete memoryless channel with known transition probability by encoding the message into a coded sequence . The set of coded sequences is called the codebook while is called the blocklength of the code. Upon receiving the corrupted signal , the receiver attempts construct a correct estimate of using its knowledge of the channel and the code. The performance of channel coding may be measured in terms of the rate of transmission and the probability of decoding error .
The seminal result established by Shannon [55] is that, asymptotically, reliable communication is possible as long as the rate does not exceed a channel-dependent quantity called the channel capacity. We state this result more formally as follows.
Theorem 1.1 Given a discrete memoryless channel with known transition probability , a distribution and any , there exists a blocklength and an encoder/decoder pair such that and where is the mutual information between the random variables and with joint distribution . The quantity is called the channel capacity since no higher such constant can be found.
Specific instances of such codes can be designed using low-density parity-check codes [24, 33, 34] or polar codes [4].
Figure 1.1 Channel coding over a discrete memoryless channel.
The operation of channel coding can be interpreted as introducing structure in coded sequences that is resilient to the corruption of the noisy channel. A lesser known coding operation over channels consists in introducing structure in coded sequences that disappear when corrupted by noise. Formally, this coding operation called soft covering is illustrated in Figure 1.2. Consider a random variable with distribution transmitted over a discrete memoryless channel with known transition probability . The output of the channel is a new random variable with distribution obtained by taking the marginal of . Instead of transmitting the random variable , one can instead ask whether one can approximately simulate transmissions of the random variable using instead a uniformly distributed message encoded into sequences of length . The intuition is that -coded sequences might be sufficient to approximately cover all possible realizations of i.i.d. realizations of the random variable . The performance of soft covering may be measured in terms of the rate of transmission and the relative entropy , where is the distribution induced by the random choice of coded sequences while is the -fold product distribution of .
The fundamental result of soft covering, first identified by Wyner [67] but studied and refined later on by others [22, 26, 29, 30, 65], is that and are virtually indistinguishable as long as the rate does not fall below a quantity called the channel resolvability. We state this result more formally below.
Theorem 1.2 Given a discrete memoryless channel with known transition probability , a distribution , and any , there exists a blocklength and an encoder such that and , where is the mutual information between the random variables and with joint distribution . The quantity is called the channel resolvability since no lower such constant can be found.
The intuition behind Theorem 1.2 is that by exceeding the channel resolvability, the structure that exists within the coded sequences gets obfuscated by the channel noise and the distribution at the output of the channel resembles a product distribution. Note that Theorem 1.2 is not merely a consequence of Theorem 1.1 since Theorem 1.1 only ensures that reliable communication is impossible at rates above the channel capacity and some lingering structure could still be identified in the channel output. In contrast, Theorem 1.2 shows that some codes completely lose their structure at rates above the channel resolvability. The close resemblance in the expression of the channel resolvability and the channel capacity is slightly misleading and an artefact of the discrete memoryless nature of the channels considered here. In general, the channel resolvability exceeds the channel capacity for the same choice of input distribution [29].
Figure 1.2 Soft-covering over a discrete memoryless channel.
The usefulness of soft covering for security shall be developed in Section 1.2; for now, one can interpret soft covering as a coding mechanism that obfuscates the existence of coded information. Although the design of soft-covering codes has been much less investigated than channel codes, specific instances can be built using polar codes or a combination of channel codes and invertible extractors [12, 18, 31, 60].
The problem of source coding with side information is illustrated in Figure 1.3. Consider a discrete memoryless source with two components and with known joint distribution . The objective is to encode realizations of the source into a message to decode a reconstruction using both and the associated realizations as side information. The performance of source coding with side information may be measured in terms of the compression rate and the probability of reconstruction error .
The fundamental result of source coding with side information, discovered by Slepian and Wolf [59], is the following.
Theorem 1.3 Given a discrete memoryless source with known joint distribution and any , there exists a blocklength and an encoder/decoder pair such that and , where is conditional entropy of given . In addition, is the lowest such constant that can be found.
Figure 1.3 Source coding with side information for a discrete memoryless source.
Figure 1.4 Privacy amplification from a discrete memoryless channel.
Again, specific instances of codes for source coding with side information can be constructed using low-density parity-check codes and polar codes [5, 37, 42].
Privacy amplification plays a role dual to source coding with side information analogous to the role of soft covering with respect to channel coding. Instead of compressing a source while retaining enough dependence to enable reconstruction with side information, one can attempt to compress so much that all dependence against side information is lost. The operation of privacy amplification is illustrated in Figure 1.4. Consider a discrete memoryless source with two components and with known joint distribution . The objective is to encode realizations of the source into a message that is uniformly distributed and nearly independent of the associated sequence . The performance of privacy amplification can be measured in terms of the extraction rate and the relative entropy between the joint distribution induced by the code and the source, and the product distribution where is the uniform distribution on .
The fundamental results of privacy amplification, which can be found in several forms [2, 9] including the so-called left-over hash lemma, is as follows.
Theorem 1.4 Given a discrete memoryless source with known joint distribution and any , there exists a blocklength and an encoder such that and , where is conditional entropy of given . In addition, is the highest such constant that can be found.
Intuitively, Theorem 1.4 states that the maximum randomness that can be extracted from the output of a channel independently of the input is the entropy of the channel noise. The design of codes for privacy amplification is quite well understood, in particular is sufficed to use universal hash functions [14].
With the coding mechanisms of Section 1.1 at hand, designing codes for PLS follows almost naturally once the meaning of secrecy is given operational significance. We shall analyze the two canonical models of PLS: secure communication over the wiretap channel and secret-key generation from correlated observations of a source.
The wiretap channel model is illustrated in Figure 1.5. The model captures a situation in which a transmitter attempts to reliably convey a message to a legitimate receiver over discrete memoryless channel with known transition probability , while avoiding leaking information to an eavesdropper who obtains its observations through another discrete memoryless channel with known transition probability . These distributions may be the marginals of a transition probability . The legitimate receiver attempts to construct a correct estimate of while the eavesdropper attempts to infer information about from its observations . The performance of the coding scheme is measured in terms of the secret communication rate , the probability of decoding error , and the secret information leakage . For reasons we detail next, it is convenient to introduce an auxiliary random message to randomize the encoding of the message , and to allow the encoder to be stochastic. These additional assumptions do not trivialize the problem since the randomness introduced is local to the encoder and not shared with any other party.
The secrecy metric is called semantic secrecy, for a small value ensures that the eavesdropper cannot infer any information about any function of the message [7]. Other metrics, such as the strong secrecy and the weak secrecy , have found their use in the literature [20, 44] but have gathered skepticism in the cryptographic community. Fortunately, most results derived under weaker secrecy metrics have been shown to hold for semantic secrecy, and the coding techniques discussed next provide tools to directly analyze semantic secrecy.
The crucial idea to understand how the design of codes for secure communication is the following observation [20, 65]. For any distribution , it holds that
One interpretation of the upper bound (1.1) is that a sufficient condition to ensure semantic secrecy is to ensure that all messages induce the same target distribution . Intuitively, from the perspective of the eavesdropper, identifying the message is nearly impossible because all messages induce the same output distribution. This deceptively simple observation allows one to then make a conceptual connection with the mechanisms of Section 1.1. Specifically, the ability to control the output distribution is precisely the role of soft covering. Hence, one can construct a code for the wiretap channel by (i) associating a soft-covering code of rate to every message , inducing the same target distribution at the output of the eavesdropper’s channel ; (ii) ensuring that the union of soft-covering codes forms a channel code of rate for the main channel . This construction mandates the use of the auxiliary message alluded to earlier to randomize the encoding of every soft-covering code; hence, the encoding of every secrecy message is stochastic, associating a randomly chosen codeword within a codebook to every message.
Figure 1.5 Secure communication over the wiretap channel.
Assuming a given distribution , the rate must not exceed but can approach according to Theorem 1.1. Similarly, the rate much exceed but can approach according to Theorem 1.2. Consequently, the rate of secret messages must not exceed but can approach , which is essentially the secrecy capacity.
An additional subtlety is that the transmitter could artificially introduce noise before transmission, in the form of a discrete memoryless channel with transition probability so that the effective channel is the concatenation of and . This channel prefixing turns out to be required to achieve optimal secrecy rates [21, 63] and the secrecy capacity is given as follows.
Theorem 1.5 Given a discrete memoryless channel with known transition probability , a distribution , and any , there exists a blocklength and an encoder such that and , , where the random variables have joint distribution . The quantity is the largest such constant that can be found and is called the secrecy capacity.
This conceptual approach to constructing codes for secure communication over the wiretap channel leads to concrete code instance, see for instance [8, 12, 17, 40, 57, 62]. The constructions [6, 17, 57] particularly stand out for they suggest that the soft-covering codes can be created in a modular fashion by “hashing” a good channel code into subcodes and leveraging specific hash function that can be stochastically inverted.
One should note that the approach described above is not the approach that was historically followed to construct codes. Instead, earlier constructions used an astute observation by Wyner [68] to tie secrecy to reliability [12]. Despite many code constructions, e.g., [36, 50], this approach is fundamentally limited to weak secrecy [10]. Furthermore, the approach outlined here based on soft covering generalizes to adversarial channels [27, 47, 53] and allows one to ensure secrecy under much weaker assumptions regarding channel knowledge than our presentation suggests.
The source model for secret-key generation is illustrated in Figure 1.6. This model captures a scenario in which three parties observe the correlated signals , , , respectively, originating from a discrete memoryless source with distribution . The objective of the two parties observing and is to distill a secret key from their observations, treating as an eavesdropper. The distillation of the secret key is enabled by a public-authenticated channel of unlimited capacity over which the two parties can transmit messages collectively denoted . This assumption does not trivialize the problem because is known to the eavesdropper. In addition, the cost of authenticating a channel is negligible compared to the size of the distilled key [64]. The performance of the coding scheme is measured in terms of the secret key distillation rate , the probability of reconstruction error , and the secret information leakage . The encoding operations that define the messages can be generic, allowing for interactivity and randomization.
The design of secret-key generation codes follows an approach conceptually similar to that outlined in Section 1.2.1 for secure communication in an even more direct way. Specifically, secret keys may be distilled by exactly combining source coding with side information and privacy amplification so that (i) one associates a public index of rate to every sequence that enables the receiver observing to reconstruct ; (ii) one associates a secret key index of rate to every sequence that remains independent of the public index and independent of . The rate must exceed but can approach by Theorem 1.3. The sum rate must not exceed but can approach by Theorem 1.4. Consequently, the secret-key rate must not exceed but can approach , which is the essence of the secret-key capacity.
Figure 1.6 Secret-key generation from source model.
In general, the secret-key capacity is not known without placing additional restrictions on the source model. Nevertheless, upon remarking that the roles of and are interchangeable, the following result holds.
Theorem 1.6 Given a source model with joint distribution and any , there exists a secret-key generation code such that
and , . The secret key capacity is also known to be no greater .
This approach to generating secret keys has long been used in quantum key distribution [25] and is made much simpler than the construction of codes for the wiretap channel by the universal nature of privacy amplification [9] and the ability to ignore the exact structure of reconciliation [13] when applying privacy amplification.
Note that rewriting as suggests a connection between secure communication and secret-key generation. While this connection can be exploited [20, 52, 69], the instantiation of codes is more natural following the distinct coding mechanisms described earlier. In particular, the use of universal hash functions for privacy amplification offers some level of universality to the key generation process, such that minimal knowledge of the distribution is actually required to extract a key [9, 23].
The push toward the use of higher frequencies of the wireless spectrum is naturally offering opportunities for PLS and 6G. For instance, the need for narrow beams to overcome the path loss at mmWave is a natural way to make communications more directional and effectively create channels that are naturally “better” for an intended receiver than for an eavesdropper outside the beam [39, 70]. Perhaps more importantly, the push toward higher frequencies has sparkled more experimental interest for PLS, leading to the design of new RF-frontend circuits and measurements [28, 38, 41] that offer more concrete evidence of the potential and limits of PLS.
These exciting experimental works open up possibilities for PLS and can be broadly described as solutions to engineer channels that will enable PLS. Nevertheless, a complete integration with the coding mechanisms described in Sections 1.1 and 1.2 is still largely missing. More precisely, secrecy capacity and secret-key capacity are still often used to measure the “secrecy level” of a link but without deploying the coding schemes required to transform the metric into an actual operational guarantee for a transmission. The main impediment toward this integration is perhaps not the coding mechanisms themselves, as solutions exist as described earlier. Rather, the main hurdle is the need to learn the wireless environment as some degree of channel knowledge is required to properly tune the parameters of the coding scheme and provide security guarantees.
1
3GPP. Study on the security for 5G URLLC (Release 16). Technical Specification (TR) 33.825, 3rd Generation Partnership Project (3GPP), Mar 2019.
2
R. Ahlswede and I. Csiszár. Common randomness in information theory and cryptography. I. Secret sharing.
IEEE Transactions on Information Theory
, 39(4):1121–1132, Jul 1993. doi: 10.1109/18.243431.
3
G. Alagic et al. Status report on the second round of the NIST post-quantum cryptography standardization process. Technical Report NISTIR 8309,National Institute of Standards and Technology, Jul 2020.
4
E. Arikan. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels.
IEEE Transactions on Information Theory
, 55(7):3051–3073, 2009. doi: 10.1109/TIT.2009.2021379.
5
E. Arikan. Source polarization. In
Proceedings of IEEE International Symposium on Information Theory
, pages 899–903, Austin, TX, Jun 2010. doi: 10.1109/ISIT.2010.5513567.
6
M. Bellare and S. Tessaro. Polynomial-time, semantic-secure encryption achieving the secrecy capacity, Jan 2012.
7
M. Bellare, S. Tessaro, and A. Vardy. Semantic security for the wiretap channel. In R. Safavi-Naini and R. Canetti, editors,
Advances in Cryptology & CRYPTO 2012
, volume 7417 of
Lecture Notes in Computer Science
, pages 294–311. Springer-Verlag, Berlin Heidelberg, 2012. ISBN 978-3-642-32008-8. doi: 10.1007/978-3-642-32009-58. hard-copy.
8
M. Bellare, S. Tessaro, and A. Vardy. A cryptographic treatment of the wiretap channel, Jan 2012.
9
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer. Generalized privacy amplification.
IEEE Transactions on Information Theory
, 41(6):1915–1923, Nov 1995. doi: 10.1109/18.476316.
10
M. R. Bloch. Achieving secrecy: Capacity vs. resolvability. In
Proceedings of IEEE International Symposium on Information Theory
, pages 632–636, Saint Petersburg, Russia, Aug 2011. doi: 10.1109/ISIT.2011.6034207.
11
M. Bloch and J. Barros.
Physical-Layer Security: From Information Theory to Security Engineering
. Cambridge University Press, Oct 2011. doi: 10.1017/CBO9780511977985.
12
M. R. Bloch, M. Hayashi, and A. Thangaraj. Error-control coding for physical-layer secrecy.
Proceedings of IEEE
, 103(10):1725–1746, Oct 2015. ISSN 0018-9219. doi: 10.1109/JPROC.2015.2463678.
13
C. Cachin and U. M. Maurer. Linking information reconciliation and privacy amplification.
Journal of Cryptology
, 10(2):97–110, Mar 1997.
14
J. L. Carter and M. N. Wegman. Universal classes of hash functions.
Journal of Computer and System Sciences
, 18:143–154, 1979.
15
R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan. Physical layer security for ultra-reliable and low-latency communications.
IEEE Wireless Communications
, 26(5):6–11, Oct 2019. doi: 10.1109/mwc.001.1900051.
16
A. Chorti, A. N. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G. Fettweis, and H. V. Poor. Context-aware security for 6G wireless: The role of physical layer security.
IEEE Communications Standards Magazine
, 6(1):102–108, Mar 2022. doi: 10.1109/mcomstd.0001.2000082.
17
R. A. Chou. Explicit codes for the wiretap channel with uncertainty on the eavesdropper’s channel. In
Proceedings of IEEE International Symposium on Information Theory
, pages 476–481, Vail, CO, Jun 2018. doi: 10.1109/ISIT.2018.8437777.
18
R. A. Chou, M. R. Bloch, and J. Kliewer. Low-complexity channel resolvability codes for the symmetric multiple-access channel. In
Proceedings of IEEE Information Theory Workshop
, pages 466–470, Hobart, Tasmania, Nov 2014. doi: 10.1109/ITW.2014.6970875.
19
Cisco. Cisco Annual Internet Report (2018–2023) White Paper, Mar 2020.
20
I. Csiszár. Almost independence and secrecy capacity.
Problems of Information Transmission
, 32(1):40–47, Jan-Mar 1996.
21
I. Csiszár and J. Körner. Broadcast channels with confidential messages.
IEEE Transactions on Information Theory
, 24(3):339–348, May 1978.
22
P. Cuff. Distributed channel synthesis.
IEEE Transactions on Information Theory
, 59(11):7071–7096, 2013. doi: 10.1109/TIT.2013.2279330.
23
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data.
SIAM Journal of Computing
, 38(1):97–139, Mar 2008. ISSN 0097-5397. doi: 10.1137/060651380.
24
R. G. Gallager.
Low Density Parity Check Codes
. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, 1963.
25
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. Quantum cryptography.
Reviews of Modern Physics
, 74:145–195, Mar 2002. doi: 10.1103/RevModPhys.74.145.
26
Z. Goldfeld, P. Cuff, and H. Permuter. Semantic-security capacity for wiretap channels of type II.
IEEE Transactions on Information Theory
, 62(7):3863–3879, 2016. ISSN 0018-9448. doi: 10.1109/TIT.2016.2565483.
27
Z. Goldfeld, P. Cuff, and H. H. Permuter. Arbitrarily varying wiretap channels with type constrained states.
IEEE Transactions on Information Theory
, 62(12):7216–7244, Dec 2016. doi: 10.1109/TIT.2016.2619701.
28
J. Guo, L. Poli, M. A. Hannan, P. Rocca, S. Yang, and A. Massa. Time-modulated arrays for physical layer secure communications: Optimization-based synthesis and experimental assessment.
IEEE Transactions on Antennas and Propagation
, 66(12):6939–6949, Dec 2018. doi: 10.1109/tap.2018.2870381.
29
T. S. Han and S. Verdú. Approximation theory of output statistics.
IEEE Transactions on Information Theory
, 39(3):752–772, May 1993. ISSN 0018-9448. doi: 10.1109/18.256486.
30
M. Hayashi. General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channels.
IEEE Transactions on Information Theory
, 52(4):1562–1575, Apr 2006. doi: 10.1109/TIT.2006.871040.
31
M. Hayashi. Tight exponential analysis of universally composable privacy amplification and its applications.
IEEE Transactions on Information Theory
, 59(11):7728–7746, Nov 2013. ISSN 0018-9448. doi: 10.1109/TIT.2013.2278971.
32
L. Jiao, N. Wang, P. Wang, A. Alipour-Fanid, J. Tang, and K. Zeng. Physical layer key generation in 5G wireless networks.
IEEE Wireless Communications
, 26(5):48–54, Oct 2019. ISSN 1536-1284, 1558-0687. doi: 10.1109/MWC.001.1900061.
33
S. Kudekar, T. Richardson, and R. L. Urbanke. Spatially coupled ensembles universally achieve capacity under belief propagation.
IEEE Transactions on Information Theory
, 59(12):7761–7813, Dec 2013. doi: 10.1109/tit.2013.2280915.
34
M. Lentmaier, A. Sridharan, D. J. Costello, and K. Sh. Zigangirov. Iterative decoding threshold analysis for LDPC convolutional codes.
IEEE Transactions on Information Theory
, 56(10):5274–5289, Oct 2010. doi: 10.1109/TIT.2010.2059490.
35
G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, and A. Hu. Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities.
Entropy
, 21(5):497, May 2019. ISSN 1099-4300. doi: 10.3390/e21050497.
36
R. Liu, Y. Liang, H. V. Poor, and P. Spasojević. Secure nested codes for type ii wiretap channels. In
Proceedings of IEEE Information Theory Workshop
, pages 337–342, Lake Tahoe, CA, Sept 2007. doi: 10.1109/ITW.2007.4313097.
37
A. D. Liveris, Z. Xiong, and C. N. Georghiades. Compression of binary sources with side information at the decoder using LDPC codes.
IEEE Communications Letters
, 6(10):440–442, Oct 2002.
38
X. Lu, S. Venkatesh, B. Tang, and K. Sengupta. Space-time modulated 71-to-76ghz mm-wave transmitter array for physically secure directional wireless links. In
Proceedings of IEEE International Solid- State Circuits Conference
, pages 86–88, Feb 2020. doi: 10.1109/ISSCC19947.2020.9062929.
39
J. Ma et al. Security and eavesdropping in terahertz wireless links.
Nature
, 563(7729):89–93, Nov 2018. ISSN 1476-4687. doi: 10.1038/s41586-018-0609-x. URL
https://www.nature.com/articles/s41586-018-0609-x
.
40
H. Mahdavifar and A. Vardy. Achieving the secrecy capacity of wiretap channels using polar codes.
IEEE Transactions on Information Theory
, 57(10):6428–6443, 2011. doi: 10.1109/TIT.2011.2162275.
41
N. S. Mannem, T.-Y. Huang, E. Erfani, S. Li, and H. Wang. A mm-wave transmitter MIMO with constellation decomposition array (CDA) for keyless physically secured high-throughput links. In
2021 IEEE Radio Frequency Integrated Circuits Symposium (RFIC)
. IEEE, Jun 2021. doi: 10.1109/rfic51843.2021.9490442.
42
J. Martinez-Mateo, D. Elkouss, and V. Martin. Key reconciliation for high performance quantum key distribution.
Scientific Reports
, 3:1576, Apr 2013. doi: 10.1038/srep01576.
43
U. M. Maurer. Secret key agreement by public discussion from common information.
IEEE Transactions on Information Theory
, 39(3):733–742, May 1993. doi: 10.1109/18.256484.
44
U. M. Maurer and S. Wolf. Information-theoretic key agreement: From weak to strong secrecy for free. In
Advances in Cryptology - Eurocrypt 2000
,
page 351
. Lecture Notes in Computer Science, B. Preneel, 2000.
45
M. Mitev, A. Chorti, H. V. Poor, and G. P. Fettweis. What physical layer security can do for 6G security.
IEEE Open Journal of Vehicular Technology
, 4:375–388, 2023. doi: 10.1109/ojvt.2023.3245071.
46
A. Mukherjee. Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints.
Proceedings of the IEEE
, 103(10):1747–1761, Oct 2015. ISSN 1558-2256. doi: 10.1109/JPROC.2015.2466548.
47
M. Nafea and A. Yener. A new wiretap channel model and its strong secrecy capacity.
IEEE Transactions on Information Theory
, 64(3):2077–2092, Mar 2018. doi: 10.1109/TIT.2017.2786541.
48
NIS Cooperation Group. EU coordinated risk assessment of the cybersecurity of 5G networks. Technical report, European Commission, 2019.
49
P. Porambage, G. Gur, D. P. M. Osorio, M. Liyanage, A. Gurtov, and M. Ylianttila. The roadmap to 6G security and privacy.
IEEE Open Journal of the Communications Society
, 2:1094–1122, 2021. doi: 10.1109/ojcoms.2021.3078081.
50
V. Rathi, M. Andersson, R. Thobaben, J. Kliewer, and M. Skoglund. Performance analysis and design of two edge-type LDPC codes for the BEC wiretap channel.
IEEE Transactions on Information Theory
, 59(2):1048–1064, Feb 2013. ISSN 0018-9448. doi: 10.1109/TIT.2012.2219577.
51
P. A. Regalia, A. Khisti, Y. Liang, and S. Tomasin. Secure communications via physical-layer and information-theoretic techniques [scanning the issue].
Proceedings of the IEEE
, 103(10):1698–1701, Oct 2015. doi: 10.1109/jproc.2015.2473895
52
J. M. Renes and R. Renner. Noisy channel coding via privacy amplification and information reconciliation.
IEEE Transactions on Information Theory
, 57(11):7377–7385, 2011. doi: 10.1109/TIT.2011.2162226
53
R. F. Schaefer, H. Boche, and H. V. Poor. Secure communication under channel uncertainty and adversarial attacks.
Proceedings of the IEEE
, 103(10):1796–1813, Oct 2015. ISSN 0018-9219. doi: 10.1109/JPROC.2015.2459652
54
M. Shakiba-Herfeh, A. Chorti, and H. V. Poor. Physical layer security: Authentication, integrity, and confidentiality. In
Physical Layer Security
, pages 129–150. Springer International Publishing, 2021. doi: 10.1007/978-3-030-55366-1.
55
C. E. Shannon. A mathematical theory of communication.
The Bell System Technical Journal
, 27:379–423, 623–656, Jul, Oct 1948.
56
C. E. Shannon. Communication theory of secrecy systems.
The Bell System Technical Journal
, 28:656–715, 1948.
57
S. Sharifian, F. Lin, and R. Safavi-Naini. Hash-then-encode: A modular semantically secure wiretap code. In
Proceedings of the 2nd Workshop on Communication Security
, pages 49–63, Paris, France, Apr 2018. ISBN 978-3-319-59265-7
58
C. She, C. Sun, Z. Gu, Y. Li, C. Yang, H. V. Poor, and B. Vucetic. A tutorial on ultrareliable and low-latency communications in 6G: Integrating domain knowledge into deep learning.
Proceedings of the IEEE
, 109(3):204–246, Mar 2021. doi: 10.1109/jproc.2021.3053601
59
D. Slepian and J. K. Wolf. Noiseless coding of correlated information sources.
IEEE Transactions on Information Theory
, 19(4):471–480, Jul 1973.
60
R. Sultana and R. A. Chou. Explicit low-complexity codes for multiple access channel resolvability. In
Proceedings of 57th Annual Allerton Conference on Communication, Control, and Computing
, pages 116–123, Monticello, IL, Sept 2019.
61
M. S. Turan, K. McKay, Ç. Çalık, D. Chang, and L. Bassham. Status report on the first round of the NIST lightweight cryptography standardization process. Technical Report NISTIR 8268,National Institute of Standards and Technology, Oct 2019.
62
H. Tyagi and A. Vardy. Universal hashing for information-theoretic security.
Proceedings of the IEEE
, 103(10):1781–1795, Oct 2015. ISSN 0018-9219. doi: 10.1109/JPROC.2015.2462774
63
S. Watanabe and Y. Oohama. The optimal use of rate-limited randomness in broadcast channels with confidential messages.
IEEE Transactions on Information Theory
, 61(2):983–995, Feb 2015. ISSN 0018-9448. doi: 10.1109/TIT.2014.2382096
64
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality.
Journal of Computer Sciences and Systems
, 22:265–279, 1981.
65
A. Winter, A. C. A. Nascimento, and H. Imai. Commitment capacity of discrete memoryless channels. In
Proceedings of 9th IMA International Conference
, pages 33–51, Cirencester, UK, 2003.
66
Y. Wu, A. Khisti, C. Xiao, G. Caire, K. Wong, and X. Gao. A survey of physical layer security techniques for 5G wireless networks and challenges ahead.