Best Readings in Physical-Layer Security: Foundations, Intelligent Designs and Implementations

The premise of physical-layer security is to exploit the physical properties of the communication channel to enhance communication security through appropriate coding and signal processing. While the pioneering work on the fundamental limits of physical-layer security can be traced back to the 1970s, there has been a resurgence of interest in the topic over the last 10 – 15 years, motivated in large part by the enormous opportunities created by wireless communications. Researchers have brought in their expertise in multi-antenna signal processing, channel-aware adaptive coding and signaling, as well as networking design, to engineer asymmetries in channel quality between legitimate users and adversaries, which could in turn be exploited to guarantee secrecy at the physical layer. The location or device-specific properties of the wireless channels have been exploited to enable secret-key generation and authentication at the physical layer. Furthermore, by superimposing a carefully designed secret watermark signal onto the communication waveforms, physical layer authentication can be achieved without additional bandwidth or transmitter-receiver interaction.

In the era of integrated sensing, communication and pervasive computing, the intelligent designs and implementations of physical layer security schemes are helpful in achieving autonomous security service provisioning while meeting multiple concurrent objectives, including efficiency, robustness, and situation awareness. While much of the early research was essentially focused on analyzing fundamental performance and implementation limits of physical-layer security, it is only recently that viable pathways for designing intelligent physical-layer security technologies in next-generation networks have been identified. Nevertheless, significant challenges have already become apparent in moving towards intelligent designs of physical-layer security and their practical implementations in next generation networks. These challenges include complex varying environment due to network densification, stringent requirements in competing objectives, utilization of higher frequency bands, accurate physical layer modeling of adversaries, channel knowledge acquisition, as well as constraints from regulations and standardization in next generation networks.

Full acceptance of physical-layer security by the wider security research community will still require much effort, but physical-layer security has gained some recognition as a technology complementary to cryptography and certainly not as a replacement. More specifically, cryptography guarantees security regardless of the signal reception capability of adversary but under assumptions constraining the adversary’s computational power. On the other hand, the security achieved at the physical layer holds irrespective no matter how large the adversary’s computational power is but holds assuming constraints on the adversary’s capability in receiving and processing the communication signal. Since realistic adversaries may suffer from both finite computational power and limited received signal strength, it is natural to consider a cross-layer integrated approach to security taking advantage of both technologies. This is an exciting research direction with many open problems waiting to be discovered and solved.

In this Best Readings, we highlight overview articles, archival technical papers, as well as special issues on physical-layer security that are representative of physical-layer security today. While the list is far from exhaustive, the selected papers have been influential by identifying new problems, providing innovative and elegant solutions, pointing out important future directions, as well as reflecting on and rethinking the approaches undertaken to study physical-layer security.

Issued April 2018, Updated February 2023

Contributors

Xiangyun (Sean) Zhou
Associate Professor
The Australian National University
Canberra, Australia

Xianbin Wang
Professor and Canada Research Chair
Western University
London, Canada

Matthieu Bloch
Associate Professor
Georgia Institute of Technology
Atlanta, USA

He Fang
Professor
Soochow University
Soochow, China

Stefano Tomasin
Professor
University of Padova
Padova, Italy