Basit öğe kaydını göster

dc.contributor.authorHamamreh, Jehad M.
dc.contributor.authorFurqan, Haji M.
dc.contributor.authorArslan, Hüseyin
dc.date.accessioned10.07.201910:49:13
dc.date.accessioned2019-07-10T19:49:46Z
dc.date.available10.07.201910:49:13
dc.date.available2019-07-10T19:49:46Z
dc.date.issued2019en_US
dc.identifier.citationHamamreh, J. M., Furqan, H. M. ve Arslan, H. (2019). Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys and Tutorials, 21(2), 1773-1828. https://dx.doi.org/10.1109/COMST.2018.2878035en_US
dc.identifier.issn1553-877X
dc.identifier.urihttps://dx.doi.org/10.1109/COMST.2018.2878035
dc.identifier.urihttps://hdl.handle.net/20.500.12511/1754
dc.descriptionWOS: 000470838000028en_US
dc.description.abstractPhysical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc.in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories arc divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.en_US
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TUBITAK) [114E244]en_US
dc.description.sponsorshipThis work was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 114E244. (Corresponding author: Jehad M. Hamamreh.)en_US
dc.language.isoengen_US
dc.publisherIEEE-Inst Electrical Electronics Engineers Incen_US
dc.rightsinfo:eu-repo/semantics/embargoedAccessen_US
dc.subjectPhysical Layer Securityen_US
dc.subjectCross-Layer Securityen_US
dc.subjectEavesdroppingen_US
dc.subjectChannel Secrecy Codesen_US
dc.subjectAdaptationen_US
dc.subjectInterfering Signalsen_US
dc.subjectArtificial Noiseen_US
dc.subjectJammingen_US
dc.subjectSecret Keysen_US
dc.subjectSignal Domains: Timeen_US
dc.subjectFrequency and Spaceen_US
dc.subjectVLCen_US
dc.subjectBANen_US
dc.subjectPLCen_US
dc.subjectLoTen_US
dc.subjectSmart Griden_US
dc.subjectMm-Waveen_US
dc.subjectCognitive Radioen_US
dc.subjectVehicularen_US
dc.subjectUAVen_US
dc.subjectUWBen_US
dc.subjectD2Den_US
dc.subjectRFIDen_US
dc.subjectIndex Modulationen_US
dc.subjectSpatial Modulationen_US
dc.subject5G Systemsen_US
dc.subjectOFDMen_US
dc.subjectMIMOen_US
dc.subjectRelayen_US
dc.subjectNOMAen_US
dc.subjectFull-Duplexen_US
dc.subjectTDDen_US
dc.titleClassifications and applications of physical layer security techniques for confidentiality: A comprehensive surveyen_US
dc.typearticleen_US
dc.relation.ispartofIEEE Communications Surveys and Tutorialsen_US
dc.departmentİstanbul Medipol Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Elektrik ve Elektronik Mühendisliği Bölümüen_US
dc.authorid0000-0002-7094-8521en_US
dc.authorid0000-0001-9474-7372en_US
dc.identifier.volume21en_US
dc.identifier.issue2en_US
dc.identifier.startpage1773en_US
dc.identifier.endpage1828en_US
dc.relation.ecinfo:eu-repo/grantAgreement/TUBITAK/SOBAG/114E244en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1109/COMST.2018.2878035en_US
dc.identifier.wosqualityQ1en_US
dc.identifier.scopusqualityQ1en_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster