TY - CHAP
T1 - Physical layer security
T2 - A paradigm shift in data confidentiality
AU - Chorti, Arsenia
AU - Hollanti, Camilla
AU - Belfiore, Jean Claude
AU - Poor, Harold Vincent
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016
Y1 - 2016
N2 - Physical layer security (PLS) draws on information theory to characterize the fundamental ability of the wireless physical layer to ensure data confidentiality. In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect to an eavesdropper by using appropriate encoding schemes that exploit the noise and fading effects ofwireless communication channels. Today, after more than 15 years of research in the area, PLS has the potential to provide novel security solutions that can be integrated into future generations of mobile communication systems. This chapter presents a tutorial on advances in this area. The treatment begins with a review of the fundamental PLS concepts and their corresponding historical background. Subsequently it reviews some of the most significant advances in coding theory and system design that offer a concrete platform for the realization of the promise of this approach in data confidentiality.
AB - Physical layer security (PLS) draws on information theory to characterize the fundamental ability of the wireless physical layer to ensure data confidentiality. In the PLS framework it has been established that it is possible to simultaneously achieve reliability in transmitting messages to an intended destination and perfect secrecy of those messages with respect to an eavesdropper by using appropriate encoding schemes that exploit the noise and fading effects ofwireless communication channels. Today, after more than 15 years of research in the area, PLS has the potential to provide novel security solutions that can be integrated into future generations of mobile communication systems. This chapter presents a tutorial on advances in this area. The treatment begins with a review of the fundamental PLS concepts and their corresponding historical background. Subsequently it reviews some of the most significant advances in coding theory and system design that offer a concrete platform for the realization of the promise of this approach in data confidentiality.
UR - http://www.scopus.com/inward/record.url?scp=84942475103&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84942475103&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-23609-4_1
DO - 10.1007/978-3-319-23609-4_1
M3 - Chapter
AN - SCOPUS:84942475103
T3 - Lecture Notes in Electrical Engineering
BT - Lecture Notes in Electrical Engineering
PB - Springer Verlag
ER -