TY - JOUR
T1 - Wireless physical layer security
T2 - Part 1 [Guest Editorial]
AU - Saad, Walid
AU - Zhou, Xiangyun
AU - Debbah, Merouane
AU - Poor, H. Vincent
N1 - Publisher Copyright:
© 1979-2012 IEEE.
PY - 2015/6/1
Y1 - 2015/6/1
N2 - The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments, devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techniques can be challenging. Motivated by these considerations, substantial recent research has been investigating the use of the physical layer as a means to develop low-complexity and effective wireless security mechanisms. Such techniques are grouped under the umbrella of physical layer security. These techniques range from information-theoretic security, which exploits channel advantages to thwart eavesdropping, to physical layer fingerprinting techniques that exploit physical layer features for device identification. In this context, providing state-of-the-art tutorials on the various approaches to physical layer security is of considerable interest. This Feature Topic gathers together such tutorial-style and overview articles that provide an in-depth overview of the broad spectrum of security opportunities brought forward by physical layer security.
AB - The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments, devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techniques can be challenging. Motivated by these considerations, substantial recent research has been investigating the use of the physical layer as a means to develop low-complexity and effective wireless security mechanisms. Such techniques are grouped under the umbrella of physical layer security. These techniques range from information-theoretic security, which exploits channel advantages to thwart eavesdropping, to physical layer fingerprinting techniques that exploit physical layer features for device identification. In this context, providing state-of-the-art tutorials on the various approaches to physical layer security is of considerable interest. This Feature Topic gathers together such tutorial-style and overview articles that provide an in-depth overview of the broad spectrum of security opportunities brought forward by physical layer security.
UR - http://www.scopus.com/inward/record.url?scp=84933039185&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2015.7120010
DO - 10.1109/MCOM.2015.7120010
M3 - Review article
SN - 0163-6804
VL - 53
SP - 15
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 6
M1 - 7120010
ER -