Wireless physical layer security: Part 1 [Guest Editorial]

Walid Saad, Xiangyun Zhou, Merouane Debbah, H. Vincent Poor

Research output: Contribution to journalReview articlepeer-review

1 Scopus citations

Abstract

The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments, devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techniques can be challenging. Motivated by these considerations, substantial recent research has been investigating the use of the physical layer as a means to develop low-complexity and effective wireless security mechanisms. Such techniques are grouped under the umbrella of physical layer security. These techniques range from information-theoretic security, which exploits channel advantages to thwart eavesdropping, to physical layer fingerprinting techniques that exploit physical layer features for device identification. In this context, providing state-of-the-art tutorials on the various approaches to physical layer security is of considerable interest. This Feature Topic gathers together such tutorial-style and overview articles that provide an in-depth overview of the broad spectrum of security opportunities brought forward by physical layer security.

Original languageEnglish (US)
Article number7120010
Pages (from-to)15
Number of pages1
JournalIEEE Communications Magazine
Volume53
Issue number6
DOIs
StatePublished - Jun 1 2015

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Wireless physical layer security: Part 1 [Guest Editorial]'. Together they form a unique fingerprint.

Cite this