Telecommunications Science ›› 2011, Vol. 27 ›› Issue (9): 60-65.doi: 10.3969/j.issn.1000-0801.2011.9.015
• research and development • Previous Articles Next Articles
Hang Long1,Guangxiang Yuan2,Jing Wang1,Yuanan LIU1
Online:
2011-09-15
Published:
2017-06-22
Hang Long,Guangxiang Yuan,Jing Wang,Yuanan LIU. Physical Layer Security:Survey and Future[J]. Telecommunications Science, 2011, 27(9): 60-65.
"
威胁种类 | 描述 |
信息泄露 | 信息被泄露或透露给某个非授权的实体 |
完整性破坏 | 数据被非授权地进行增删、修改或破坏而受到损失 |
拒绝服务 | 对信息或其他资源的合法访问被无条件地阻止 |
非授权访问 | 某一资源被某个非授权的人使用,或被授权的人以非授权的方式使用 |
窃听 | 用各种可能的合法或非法的手段窃取系统中的信息资源和敏感信息 |
业务流分析 | 通过对系统进行长期监听,利用统计分析方法对诸如通信频度、通信的信息流向、通信总量的变化等参数进行研究,从中发现有价值的信息和规律 |
假冒 | 通过欺骗通信系统(或用户)达到非法用户冒充成为合法用户,或者特权小的用户冒充成为特权大的用户的目的 |
旁路控制 | 攻击者利用系统的安全缺陷或安全性上的脆弱之处获得非授权的权利或特权 |
特洛伊木马 | 软件中含有一个觉察不出的有害的程序段,当它被执行时,会破坏用户的安全 |
病毒 | 在计算机系统运行过程中能够实现传染和侵害功能的程序 |
重放 | 出于非法目的,将所截获的某次合法的通信数据进行拷贝,而重新发送 |
媒体废弃 | 信息被从废弃的磁碟或打印过的存储介质中获得 |
[1] | 张泽忠 . 通信网的信息安全. 电信科学, 1997, 13 (12): 6~9 |
[2] | 王文彬 . 无线网络安全的相关技术研究与改进. 山东大学硕士学位论文, 2007 |
[3] | 朱建明 . 无线网络安全方法与技术研究. 西安电子科技大学博士学位论文, 2004 |
[4] | Cyrus P , Seth F . Maximum wireless security. Indianapolis: Sams Publishing, 2002 |
[5] | 胡爱群 . 无线通信网络的安全问题及对策. 电信科学, 2003, 19 (12): 42~45 |
[6] | Claude B , Alain G , Punya T . Near Shannon limit error-correcting coding and decoding:Turbo-codes.In: Proc IEEE ICC 1993 |
[7] | Telatar I E . Capacity of multi-antenna Gaussian channels. Europ Trans Telecommun 1999, 10 (6): 585~595 |
[8] | Paulraj A , Papadias C . Space-time processing for wireless communications. IEEE Signal Processing Magazine 1997, 14 (6): 49~83 |
[9] | Sendonaris A , Erkip E , Aazhang B . User cooperation diversity part I:system description and part II:implementation aspects and performance analysis.. IEEE Trans Commun 2003, 51 (11): 1927~1948 |
[10] | Laneman J N , Tse D N C , Wornell G W . Cooperative diversity in wireless networks:efficient protocols and outage behavior. IEEE Trans Inf Theory, 2004, 50 (12): 3062~3080 |
[11] | 龙航, 郑侃, 王方向 等. 协同系统中预编码技术的发展. 电信科学, 2009, 25 (6): 39~44 |
[12] | 王方向, 郑侃, 龙航 等. 多用户预编码技术在中继系统中的应用. 电信科学, 2010, 26 (5): 60~65 |
[13] | 池丽梅 . 计算机通信网络的安全性. 现代电信科技, 1998 (11): 9~11 |
[14] | 孔祥浩 . 关于3G通信网络安全问题的探讨. 电脑与电信, 2010 (1): 34~35 |
[15] | Shannon C . Communication theory of secrecy systems. Bell Syst Tech J, 1949, 28 (4): 656~715 |
[16] | Wyner A D . The wire-tap channel. Bell Syst Tech J, 1975, 54 (8): 1355~1387 |
[17] | Csiszar I , Korner J . Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 1978, 24 (3): 339~348 |
[18] | Leung-Yan-Cheong S , Hellman M . The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 1978, 24 (4): 451~456 |
[19] | Ersen Ekrem , Sennur Ulukus . Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP Journal on Wireless Communications and Networking, 2009 |
[20] | Yingbin Liang , Poor H V , Shamai S . Secure communication over fading channels. IEEE Transactions on Information Theory, 2008, 54 (6): 2470~2492 |
[21] | Khisti A , Tchamkerten A , Wornell G W . Secure broadcasting over fading channels. IEEE Transactions on Information Theory, 2008, 54 (6): 2453~2469 |
[22] | Tan F Wong , Matthieu B , John M S . Secret sharing over fast-fading MIMO wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009 |
[23] | Yingbin Liang , Gerhard K , Poor H V et al. Compound wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009 |
[24] | Tie Liu , Shamai S . A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, 2009, 55 (6): 2547~2553 |
[25] | Lifeng Lai , Hesham E G . The relay-eavesdropper channel:cooperation for secrecy. IEEE Transactions on Information Theory, 2008, 54 (9): 4005~4019 |
[26] | Aggarwal V , Sankar L , Calderbank A R , et al. Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP Journal on Wireless Communications and Networking, 2009 |
[27] | Xiang He , Aylin Yener . Two-hop secure communication using an untrusted relay. EURASIP Journal on Wireless Communications and Networking, 2009 |
[28] | Zhu Han , Ninoslav Marina , Mérouane Debbah , et al. Physical layer security game:interaction between source,eavesdropper and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009 |
[29] | Kashyap A , Basar T , Srikant R . Correlated jamming on MIMO Gaussian fading channels. IEEE Transactions on Information Theory, 2004, 50 (9): 2119~2123 |
[30] | 袁红林, 胡爱群 . 射频指纹的产生机理与惟一性. 东南大学学报(自然科学版), 2009 39 (2): 230~233 |
[31] | 周斌, 邵震洪, 邹菊红 . 卫星通信抗干扰系统中的射频指纹特征识别技术. 电子信息对抗技术, 2010 25 (2): 5~7 |
[32] | Ellis K J , Serinken N . Characteristics of radio transmitter fingerprints. Radio Science, 2001, 36 (4): 585~597 |
[33] | Sayeed A , Perrig A . Secure wireless communications:secret keys through multipath.In: Proc IEEE ICASSP 2008 |
[34] | Koorapaty H , Hassan A A , Chennakeshi S . Secure information transmission for mobile radio. IEEE Commun Letts, 2000, 4 (2): 52~55 |
[35] | Wilson R , Tse D , Scholtz R . Channel identification:secret sharing using reciprocity in UWB channels. IEEE Trans on Information Forensics and Security, 2007, 2 (3): 364~375 |
[36] | Gill R Tsouri , Dov Wulich . Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations. EURASIP Journal on Wireless Communications and Networking, 2009, |
[37] | Hassan A A , Stark W E , Hershey J E , et al. Cryptographic key agreement for mobile radio. Digital Signal Processing, 1996, 6 (4): 207~212 |
[38] | Zhou L , Haas Z . Securing ad hoc networks. IEEE Network Magazine, 1999, 13 (6): 24~30 |
[39] | Chan H , Perrig A , Song D . Random key predistribution schemes for wireless sensor networks.In: Proc IEEE Symp Security Privacy 2003 |
[40] | Thangaraj A , Dihidar S , Calderbank A R , et al. Applications of LDPC codes to the wiretap channels. IEEE Transactions on Information Theory, 2007, 53 (8): 2933~2945 |
[41] | Liu R , Poor V , Spasojevi P . Nested codes for secure transmission.In:Proc IEEE PIMRC 2008, Cannes,France, 2008 |
[42] | Yanbing Zhang , Huaiyu Dai . A real orthogonal space-time coded UWB scheme for wireless secure communications. EURASIP Journal on Wireless Communications and Networking, 2009 |
[43] | Kobayashi M , Debbah M , Shamai S . Secured communication over frequency-selective fading channels:a practical Vandermonde precoding. EURASIP Journal on Wireless Communications and Networking, 2009 |
[1] | Jiawei HU, Xiaoqian LIU, Xinke TANG, Yuhan DONG. Trajectory planning of UUV-assisted UWOC systems based on DQN [J]. Telecommunications Science, 2023, 39(5): 42-47. |
[2] | Qingfeng DING, Song WANG. Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario [J]. Telecommunications Science, 2023, 39(4): 31-42. |
[3] | Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU. Design method of energy efficiency optimization in PLC-RF wireless transmission networks [J]. Telecommunications Science, 2023, 39(4): 111-119. |
[4] | Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU. Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI [J]. Telecommunications Science, 2023, 39(3): 89-99. |
[5] | Mingrui XU, Yucai YAO, Xiaorong ZHU. A Fisco-Bcos platform based accurate performance analysis model of blockchain system [J]. Telecommunications Science, 2023, 39(1): 79-91. |
[6] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security of NOMA-D2D cooperative wireless system [J]. Telecommunications Science, 2022, 38(9): 83-94. |
[7] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers [J]. Telecommunications Science, 2022, 38(3): 133-142. |
[8] | Yasheng DAI, Bolin MA, Guangxue YUE. Estimation of wireless channel fading model in maritime communication for complex meteorological environment [J]. Telecommunications Science, 2022, 38(3): 158-171. |
[9] | Panpan LI, Zhengxia XIE, Guangxue YUE, Xin LIU. Research progress and trends of deep learning based wireless communication receiving method [J]. Telecommunications Science, 2022, 38(2): 1-17. |
[10] | Jianfeng CHEN, Miao CUI, Guangchi ZHANG, Qingqing WU, Hui ZENG. Secure communication optimization for double-IRS assisted SWIPT system [J]. Telecommunications Science, 2022, 38(1): 47-60. |
[11] | Ying CHENG, Guangqiu LI, Jingjie SHEN, Liang WEI. Physical layer security performance of MF relay selection systems [J]. Telecommunications Science, 2021, 37(9): 95-104. |
[12] | Sai XU, Shuai HAN, Weixiao MENG. A secure transmission method based on cooperative jamming for correlated main and wiretap channels [J]. Telecommunications Science, 2021, 37(6): 105-114. |
[13] | Nannan LI, Yu HAN, Ning GAO, Shi JIN. Joint amplitude and phase partition based physical layer key generation method [J]. Telecommunications Science, 2021, 37(5): 100-112. |
[14] | Fuchao YAN,Yiliang LIU,Shuai HAN,Weixiao MENG. A survey of physical layer security in space-air-ground communication and networks [J]. Telecommunications Science, 2020, 36(9): 1-13. |
[15] | Hui QIAN,Guangqiu LI,Yifan DING. Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers [J]. Telecommunications Science, 2020, 36(5): 65-72. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|