Abstract

Physical layer security (PLS), which is based on information-theoretic principles of message confidentiality, has attracted considerable attention in recent years. This paper provides a comprehensive survey of using channel feedback (CF) to enhance the quality of PLS of various communication models. To be specific, the survey starts from the secret key-based CF scheme and its variations for the wiretap channel (WTC) and other communication models. Then, for the WTC and its generalized models, an improved feedback scheme and its variations are respectively introduced, where the improved scheme combines the secret key-based CF scheme with the Wyner-Ziv scheme for source coding with side information. It has been shown that these improved schemes perform better than the original secret key-based schemes for several cases. Next, the Schalkwijk-Kailath (SK) feedback scheme and its variations are introduced, which are optimal for the Gaussian WTC and its variations. Finally, the already existing CF schemes are summarized and the future challenges of using CF to enhance PLS are discussed.

Highlights

  • Due to the broadcast nature of wireless communications, mobile devices are vulnerable to eavesdropping

  • 2.1 The wiretap channel with noiseless feedback The effect of channel feedback (CF) on the Physical layer security (PLS) in communication systems was first investigated in [15], where the WTC [11] was re-visited by considering the case that the legitimate receiver can send its received channel outputs back to the transmitter via a noiseless feedback channel, which is not known by the wiretapper

  • The secret key-based feedback scheme introduced has been widely used in various channel models, and we introduce the applications of the secret key-based feedback scheme in the subsection

Read more

Summary

Introduction

Due to the broadcast nature of wireless communications, mobile devices are vulnerable to eavesdropping. Note that the secrecy capacities characterized in [11] and [12] indicate that positive secrecy rate is achieved only if the legitimate receiver’s channel is less noisy than the wiretapper’s channel. In the remainder of this paper, random variables (RVs), their realizations and alphabets are denoted by uppercase letters, lowercase letters, and calligraphic letters, respectively. Random vectors and their realizations are written in a similar way.

The secret key-based feedback scheme and its applications
Applications of the secret key-based feedback scheme to other channel models
New result on the general WTC with noiseless feedback
The Schalkwijk-Kailath feedback scheme and its applications
Applications of the SK scheme to other channel models
Conclusions and future work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.