Abstract
The October 2015 Special Issue of Proceedings of the IEEE highlights recent advances along with the remaining challenges in the field of physical layer security. The paper by Jorswieck and colleagues provide an overview of the signal processing techniques used in secrecy coding and secret-key agreement at the physical layer. The standard setup assumes known channel characteristics connecting the sender to the legitimate receiver and the eavesdropper. The paper by Muramatsu and colleagues. pursue the related question of protocol design to achieve secret-key agreement by exploiting correlated randomness in sequences observed by players in a game. Xie and Ulukus examine various extensions of channels with additive Gaussian noise interference, seeking secrecy capacities in configurations involving helpers and/or multiple taps, borrowing ideas from powerful interference alignment concepts. Venkitasubramaniam and colleagues examine information-theoretic security in the context of control theory and cyberY physical systems, whose applications span smart grids, networked transportation systems, and even smart and connected healthcare.
Original language | English (US) |
---|---|
Article number | 7270414 |
Pages (from-to) | 1698-1701 |
Number of pages | 4 |
Journal | Proceedings of the IEEE |
Volume | 103 |
Issue number | 10 |
DOIs | |
State | Published - 2015 |
Keywords
- Authentication
- Communication system security
- Cryptography
- Encoding
- Information technology
- Network security
- Physical layer
- Special issues and sections
- Wireless communication
ASJC Scopus subject areas
- General Computer Science
- Electrical and Electronic Engineering