TY - JOUR
T1 - Safeguarding 5G wireless communication networks using physical layer security
AU - Yang, Nan
AU - Wang, Lifeng
AU - Geraci, Giovanni
AU - Elkashlan, Maged
AU - Yuan, Jinhong
AU - Di Renzo, Marco
N1 - Publisher Copyright:
© 1979-2012 IEEE.
PY - 2015/4/1
Y1 - 2015/4/1
N2 - The fifth generation (5G) network will serve as a key enabler in meeting the continuously increasing demands for future wireless applications, including an ultra-high data rate, an ultrawide radio coverage, an ultra-large number of devices, and an ultra-low latency. This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches. Specifically, we focus on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium and reaping the benefits offered by the disruptive technologies to 5G. Among various technologies, the three most promising ones are discussed: heterogenous networks, massive multiple-input multiple-output, and millimeter wave. On the basis of the key principles of each technology, we identify the rich opportunities and the outstanding challenges that security designers must tackle. Such an identification is expected to decisively advance the understanding of future physical layer security.
AB - The fifth generation (5G) network will serve as a key enabler in meeting the continuously increasing demands for future wireless applications, including an ultra-high data rate, an ultrawide radio coverage, an ultra-large number of devices, and an ultra-low latency. This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches. Specifically, we focus on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium and reaping the benefits offered by the disruptive technologies to 5G. Among various technologies, the three most promising ones are discussed: heterogenous networks, massive multiple-input multiple-output, and millimeter wave. On the basis of the key principles of each technology, we identify the rich opportunities and the outstanding challenges that security designers must tackle. Such an identification is expected to decisively advance the understanding of future physical layer security.
UR - http://www.scopus.com/inward/record.url?scp=84927712570&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2015.7081071
DO - 10.1109/MCOM.2015.7081071
M3 - Article
SN - 0163-6804
VL - 53
SP - 20
EP - 27
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 4
M1 - 7081071
ER -