Information Security of PHY Layer in Wireless Networks
Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2016-01-01
|
Series: | Journal of Sensors |
Online Access: | http://dx.doi.org/10.1155/2016/1230387 |
id |
doaj-4fc96b1574d54feb87c974f56c5333ac |
---|---|
record_format |
Article |
spelling |
doaj-4fc96b1574d54feb87c974f56c5333ac2020-11-24T22:29:38ZengHindawi LimitedJournal of Sensors1687-725X1687-72682016-01-01201610.1155/2016/12303871230387Information Security of PHY Layer in Wireless NetworksWeidong Fang0Fengrong Li1Yanzan Sun2Lianhai Shan3Shanji Chen4Chao Chen5Meiju Li6Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai University, Shanghai 200444, ChinaKey Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 201899, ChinaKey Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai University, Shanghai 200444, ChinaShanghai Internet of Things Co., Ltd., Shanghai 201899, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaCollege of Physics and Electronic Information Engineering, Qinghai University for Nationalities, Xining, Qinghai 810000, ChinaSince the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.http://dx.doi.org/10.1155/2016/1230387 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Weidong Fang Fengrong Li Yanzan Sun Lianhai Shan Shanji Chen Chao Chen Meiju Li |
spellingShingle |
Weidong Fang Fengrong Li Yanzan Sun Lianhai Shan Shanji Chen Chao Chen Meiju Li Information Security of PHY Layer in Wireless Networks Journal of Sensors |
author_facet |
Weidong Fang Fengrong Li Yanzan Sun Lianhai Shan Shanji Chen Chao Chen Meiju Li |
author_sort |
Weidong Fang |
title |
Information Security of PHY Layer in Wireless Networks |
title_short |
Information Security of PHY Layer in Wireless Networks |
title_full |
Information Security of PHY Layer in Wireless Networks |
title_fullStr |
Information Security of PHY Layer in Wireless Networks |
title_full_unstemmed |
Information Security of PHY Layer in Wireless Networks |
title_sort |
information security of phy layer in wireless networks |
publisher |
Hindawi Limited |
series |
Journal of Sensors |
issn |
1687-725X 1687-7268 |
publishDate |
2016-01-01 |
description |
Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area. |
url |
http://dx.doi.org/10.1155/2016/1230387 |
work_keys_str_mv |
AT weidongfang informationsecurityofphylayerinwirelessnetworks AT fengrongli informationsecurityofphylayerinwirelessnetworks AT yanzansun informationsecurityofphylayerinwirelessnetworks AT lianhaishan informationsecurityofphylayerinwirelessnetworks AT shanjichen informationsecurityofphylayerinwirelessnetworks AT chaochen informationsecurityofphylayerinwirelessnetworks AT meijuli informationsecurityofphylayerinwirelessnetworks |
_version_ |
1725743750686179328 |