Information Security of PHY Layer in Wireless Networks

Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a...

Full description

Bibliographic Details
Main Authors: Weidong Fang, Fengrong Li, Yanzan Sun, Lianhai Shan, Shanji Chen, Chao Chen, Meiju Li
Format: Article
Language:English
Published: Hindawi Limited 2016-01-01
Series:Journal of Sensors
Online Access:http://dx.doi.org/10.1155/2016/1230387
id doaj-4fc96b1574d54feb87c974f56c5333ac
record_format Article
spelling doaj-4fc96b1574d54feb87c974f56c5333ac2020-11-24T22:29:38ZengHindawi LimitedJournal of Sensors1687-725X1687-72682016-01-01201610.1155/2016/12303871230387Information Security of PHY Layer in Wireless NetworksWeidong Fang0Fengrong Li1Yanzan Sun2Lianhai Shan3Shanji Chen4Chao Chen5Meiju Li6Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai University, Shanghai 200444, ChinaKey Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 201899, ChinaKey Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai University, Shanghai 200444, ChinaShanghai Internet of Things Co., Ltd., Shanghai 201899, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaSince the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.http://dx.doi.org/10.1155/2016/1230387
collection DOAJ
language English
format Article
sources DOAJ
author Weidong Fang
Fengrong Li
Yanzan Sun
Lianhai Shan
Shanji Chen
Chao Chen
Meiju Li
spellingShingle Weidong Fang
Fengrong Li
Yanzan Sun
Lianhai Shan
Shanji Chen
Chao Chen
Meiju Li
Information Security of PHY Layer in Wireless Networks
Journal of Sensors
author_facet Weidong Fang
Fengrong Li
Yanzan Sun
Lianhai Shan
Shanji Chen
Chao Chen
Meiju Li
author_sort Weidong Fang
title Information Security of PHY Layer in Wireless Networks
title_short Information Security of PHY Layer in Wireless Networks
title_full Information Security of PHY Layer in Wireless Networks
title_fullStr Information Security of PHY Layer in Wireless Networks
title_full_unstemmed Information Security of PHY Layer in Wireless Networks
title_sort information security of phy layer in wireless networks
publisher Hindawi Limited
series Journal of Sensors
issn 1687-725X
1687-7268
publishDate 2016-01-01
description Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.
url http://dx.doi.org/10.1155/2016/1230387
work_keys_str_mv AT weidongfang informationsecurityofphylayerinwirelessnetworks
AT fengrongli informationsecurityofphylayerinwirelessnetworks
AT yanzansun informationsecurityofphylayerinwirelessnetworks
AT lianhaishan informationsecurityofphylayerinwirelessnetworks
AT shanjichen informationsecurityofphylayerinwirelessnetworks
AT chaochen informationsecurityofphylayerinwirelessnetworks
AT meijuli informationsecurityofphylayerinwirelessnetworks
_version_ 1725743750686179328