Physical layer security in wireless networks: A tutorial

Yi Sheng Shiu, Shih Yu Chang, Hsiao Chun Wu, Scott C.H. Huang, Hsiao Hwa Chen

Research output: Contribution to journalArticle

466 Citations (Scopus)

Abstract

Wireless networking plays an extremely important role in civil and military applications. However, security of information transfer via wireless networks remains a challenging issue. It is critical to ensure that confidential data are accessible only to the intended users rather than intruders. Jamming and eavesdropping are two primary attacks at the physical layer of a wireless network. This article offers a tutorial on several prevalent methods to enhance security at the physical layer in wireless networks. We classify these methods based on their characteristic features into five categories, each of which is discussed in terms of two metrics. First, we compare their secret channel capacities, and then we show their computational complexities in exhaustive key search. Finally, we illustrate their security requirements via some examples with respect to these two metrics.

Original languageEnglish
Article number5751298
Pages (from-to)66-74
Number of pages9
JournalIEEE Wireless Communications
Volume18
Issue number2
DOIs
Publication statusPublished - 2011 Apr 1

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Physical layer security in wireless networks: A tutorial'. Together they form a unique fingerprint.

Cite this