Entropy: An Overview of Key Technologies in Physical Layer Security
Entropy: An Overview of Key Technologies in Physical Layer Security
Review
An Overview of Key Technologies in Physical
Layer Security
Abraham Sanenga 1, * , Galefang Allycan Mapunda 1 , Tshepiso Merapelo Ludo Jacob 1 ,
Leatile Marata 2 , Bokamoso Basutli 1 and Joseph Monamati Chuma 1
1 Electrical, Computer, and Telecommunications Engineering, Botswana International University of Science
and Technology, Palapye, Botswana; galefang.mapunda@studentmail.biust.ac.bw (G.A.M.);
tshepiso.jacob@studentmail.biust.ac.bw (T.M.L.J.); basutlib@biust.ac.bw (B.B.); chumaj@biust.ac.bw (J.M.C.)
2 Center for Wireless Communications, University of Oulu, 90570 Oulu, Finland; maratal@biust.ac.bw
* Correspondence: sa18100191@studentmail.biust.ac.bw
Received: 18 August 2020; Accepted: 21 September 2020; Published: 6 November 2020
Abstract: The open nature of radio propagation enables ubiquitous wireless communication.
This allows for seamless data transmission. However, unauthorized users may pose a threat to the
security of the data being transmitted to authorized users. This gives rise to network vulnerabilities
such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security
(PLS) has been identified as one of the promising security approaches to safeguard the transmission
from eavesdroppers in a wireless network. It is an alternative to the computationally demanding
and complex cryptographic algorithms and techniques. PLS has continually received exponential
research interest owing to the possibility of exploiting the characteristics of the wireless channel.
One of the main characteristics includes the random nature of the transmission channel. The aforesaid
nature makes it possible for confidential and authentic signal transmission between the sender and
the receiver in the physical layer. We start by introducing the basic theories of PLS, including the
wiretap channel, information-theoretic security, and a brief discussion of the cryptography security
technique. Furthermore, an overview of multiple-input multiple-output (MIMO) communication is
provided. The main focus of our review is based on the existing key-less PLS optimization techniques,
their limitations, and challenges. The paper also looks into the promising key research areas in
addressing these shortfalls. Lastly, a comprehensive overview of some of the recent PLS research in
5G and 6G technologies of wireless communication networks is provided.
1. Introduction
Wireless communication technology is a necessity for modern-day life because human beings
depend on this technology for data transmission. In most cases, the said data contain confidential
information such as banking transactions, military applications, and multimedia. The International
telecommunication organization approximated that 53.6% of the world population, which amounts to
about 4.1 billion people, were using the internet at the end of 2019 [1]. It is expected that this number
will rise due to a rapid increase in active mobile subscribers as wireless networks continue to expand
and new applications are developed. However, it is reported in [2] that an increasing number of mobile
and wireless devices are affected by cyber-criminal activities. Cyber security ventures [2] predicted
that cyber crime costs will increase to more than 6 trillion US dollars annually by 2021, from 3 trillion
US dollars recorded in 2015. Therefore, it is highly important to improve wireless networks against
cyber-criminal activities.
Conventionally, the upper layers of the open system interconnect model are utilized to handle any
discrepancies related to the attributes of authenticity, confidentiality, and privacy of data transmission.
These attributes are mostly dependent on cryptographic algorithms which include secret-key
distribution, public-key, and symmetric encryption. All these techniques function independently
from the physical layer [3]. Based on the assumption that the eavesdropper has limited computing
power ability, the above-mentioned techniques are considered to be secure. Moreover, they rely on
underlying computational complexity for their robustness. Recent advances in quantum computing
pose a serious threat to the currently used cryptographic schemes with their unlimited computational
capacity [4]. Therefore, it is evident that the conventional methods in secure wireless communication
are becoming less reliable.
The open and superposition nature of wireless networks raises issues of confidentiality and
security of the transmitted data when unintended users are present. Difficulties that prevent the
transmitted signal from reaching the unintended users are a result of the broadcast nature. On the
other hand, time variations and fluctuations in the wireless channel result in the arrival of multiple
copies of the transmitted signal at the receiver. With that being said, security attacks in wireless
networks may be categorized as active and passive attacks [5]. Passive attacks involve eavesdroppers
who listen to the ongoing transmission silently and try to steal the transmitted information without
interrupting legitimate transmission [6]. Under active attacks, the eavesdroppers use more aggressive
and intrusive techniques that attempt to deteriorate the quality of the signal at the intended receiver.
Common examples of these aggressive techniques are the denial of service, routing, and node
malfunction attacks [5]. With exposure to so many attacks, wireless networks are required to have
certain capabilities that will enable them to withstand and mitigate these attacks. The desired
characteristics of a secure network include integrity, confidentiality and authentication, availability,
and access control [5].
UAVs: There have been a couple of papers published in this area recently [15–17]. Current research
is aimed at the integration of UAV communication networks with 5G technology (and beyond 5G) to
safeguard the current and future wireless networks. We provide a brief overview and summary of
some of the interesting works on the applications of UAVs in PLS.
Satellite communication: This is another area that has become a trend in recent PLS research,
and a couple of interesting works have been published in [18–21]. Vasquez et al. [18] provided an
overview of precoding techniques in multibeam satellite communication systems. Another study [19]
proposed the inter-satellite communication of small satellite systems. A comprehensive overview of
PLS in space information networks is given in [21]. They proposed the integration of satellite and
IoT to form a satellite-based IoT and also discussed current technologies dedicated to PLS in land
mobile satellite communication networks. Our letter intends to summarize some of the promising
technologies that are discussed in the literature.
DES DES
Plane Cipher Plain
encryption dencryption
text text text
algorithm algorithm
Alice Bob
In most cases, cryptography is the main technology utilized to address security issues for
conventional and some modern-day electronic communication systems. From another perspective,
some novel technologies, mainly quantum computing, are a threat to systems that are based on
cryptography. Quantum computers have close to unbounded computing capabilities and can easily
break encryption and decryption keys. The ability to guess the secret keys or perform a quick reverse
calculation using a quantum computer enables breakage of such keys, and this gives unauthorized
or disguised network users the ability to intercept ongoing data transmissions or access the data [4].
With that being said, it is worth noting that quantum computing is limited to some extent as it
cannot break all kinds of cryptographic algorithms. This means that it is one of the technologies
which jeopardizes some of existing systems based on cryptography. Furthermore, the processes
involved in cryptography can impose delays which can be unwelcome in some applications, such as
fifth-generation (5G) ultra-reliable low-latency communication (URLLC) [24]. Moreover, cryptographic
methods are inefficient in terms of energy consumption as they require extra resources for performing
computations. Therefore, this calls for the need to implement new measures with an effort to augment
Entropy 2020, 22, 1261 4 of 34
cryptography. One of the technologies directed towards augmenting cryptography is physical layer
security (PLS) [6,7,25].
PLS is different from cryptography technology because it is based on the concept of
information-theoretic security proposed by Wyner [26]. The concept of PLS describes communication
between two authorized users in the presence of an unintended user by modeling a discrete
memory-less wiretap channel [27]. Figure 2 shows the general case of the wiretap channel where two
authorized users communicate over the main channel and are observed by an eavesdropper through a
wiretap channel. Figure 3 illustrates the fundamental differences between cryptography and PLS [28].
Main channel
Alice
Bob
Wiretap channel
Eve
Figure 3. The difference between cryptography and physical layer security approaches [28].
In contrast to cryptography, PLS schemes can seamlessly prevent unintended users from
intercepting data signals. PLS is able to facilitate security without any form of encryption in the
upper layers. The facilitation of key-free encryption is made possible by the exploitation of some
wireless channel characteristics through the application of suitable signaling and channel coding [29].
PLS techniques have proven capable of realizing verifiable security even when the network intruders
have almost limitless computational resources. Despite the unparalleled benefits of PLS, it is worth
noting that some shortfalls exist. It was shown in [30] that it is almost impossible to warrant maximal
security with a probability of one since PLS relies mainly on the average information. In addition,
most PLS schemes assume prior knowledge of the eavesdropper’s wiretap channel, which is not
feasible in practical applications. Furthermore, it is also worth noting that it will be difficult to only
use PLS in future wireless systems since it requires a high data rate to ensure security. PLS can be
combined with other higher-layer security techniques to achieve security and robustness of wireless
communication networks. Authors in [31], proposed cross-layer cooperation as a viable solution for
the achievement of reliability and energy efficiency in wireless communication. Chen et al. in [32] also
investigated a cross-layer optimization scheme using cooperative diversity for reliable data transfer
Entropy 2020, 22, 1261 5 of 34
in wireless sensor networks to achieve significant energy savings and prolong the network lifetime
considerably. Having stated the aforementioned benefits of both technologies, investigations on the
concurrent use of PLS and cryptography are worth looking into to provide elevated robustness of the
communication network.
2. Background
where B represents the channel’s bandwidth (fixed quantity) in Hertz (Hz), and SNR is the
signal-to-noise ratio. The SNR is mathematically denoted by Equation (2). From Equation (1), it can be
seen that the channel capacity is directly proportional to the power of the signal.
P
SNR = , (2)
σ2
where P denotes the power of the signal and σ2 is the noise power.
The Shannon information content of an outcome, xi , is defined as
1
h( xi ) = log2 = − log2 p( xi ) (3)
p ( xi )
where the probability of the random variable X is denoted by p( xi ). Figure 5 shows a graph of
Shannon information content versus the different probabilities, and it illustrates that less probable or
rare outcomes contain more information than common or highly probable outcomes. The entropy
function H( X ) is the average of the Shannon information content and is given by
M M
1
H (X) = ∑ p( xi ) log2
p ( xi )
= − ∑ p( xi ) log2 p( xi ) (4)
i =1 i =1
where M is the total number of possible outcomes. The mutual information, I ( X; Y ), defines the
amount of information X conveys about Y:
I ( X; Y ) = H ( X ) − H ( X | Y ) (5)
10
7
Shannon info. content (bits)
0
0 0.2 0.4 0.6 0.8 1
Probability p(x)
Therefore, this implies the amount of information sent to Bob by Alice is given by Equation (6),
whereas the same quantity between Alice and Eve is given by Equation (7).
I ( A; B) = H ( A) − H ( A | B), (6)
I ( A; E) = H ( A) − H ( A | E), (7)
where random variable A represents the bit sent by Alice. B denotes the bits received by Bob, and the
outcome observed by Eve is denoted by E. In order to ensure that the communication channel is secure,
Entropy 2020, 22, 1261 7 of 34
it is significant to maximize the achievable mutual information by optimizing the input distribution
p( A) such that [35]
CS = max ( I ( A; B) − I ( A; E)) (8)
p( A)
Therefore the difference between the capacities of Bob and Eve’s channels gives the secrecy rate of the
PLS system model given in Figure 4 by
R s = C B − CE (9)
The notion of secrecy capacity plays a central role in PLS. It is a metric that defines the rate at
which the transmitted signal reaches the legitimate receiver without any form of invasion from the
eavesdropper. To define perfect secrecy, we consider Shannon’s wiretap channel model shown in
Figure 6. In this model, Alice intends to transmit confidential information, A, to an authentic receiver,
Bob, under a condition that an eavesdropper exists, Eve. A is encoded into X n , which represents the
information vector of length n. The received information vectors for Bob and Eve are given by Bn and
En , respectively. Consequently, the source information entropy together with the amount of uncertainty
of the message received by Eve are given by H ( A) and H ( A| En ), respectively. Shannon showed
that legitimate parties could achieve information-theoretically secure communication in a wireless
communication environment by using the same random secret key, which is unknown to the
eavesdropper. This is known as perfect secrecy, and it is given by Equation (10) in terms of the
entropy. Transforming Equation (10) into Equation (11) shows that the eavesdropper is not able to
receive any of the transmitted information content.
H ( A| En ) = H ( A) (10)
I ( A, En ) = 0 (11)
The theorem also proves that perfect secrecy could be guaranteed if H (K ) ≥ H ( A), where K is
the random variable modeling the key. This means that the key should be equal to or longer than
the confidential message [36]. However, perfect secrecy was proven to be impractical because the
key management may be cumbersome for specific networks, such as ad hoc networks, which do not
operate under fixed infrastructures [37].
secret key K
A Xn
Alice Bob Bn
W Eve En
In this model, the encoder operates on blocks of k source bits Ak = ( A1 , A2 , . . . , Ak ) and produces an
encoded sequence X n = ( X 1 , X 2 , . . . , X n ) of length n.
^
Ak Xn Main Channel Yn Decoder Sk
Source Encoder
QM
Wiretap Channel
QW
En
The transmission rate, which is the proportion of information sent in each codeword, is given
by Equation (12). The equivocation rate, defined as a measure of confusion at the eavesdropper,
is employed to investigate the weak secrecy of transmitted information. The said rate is given by
Equation (13).
R = k/n (bits/channel ), (12)
1
∆= H ( A k | E n ), (13)
k
where k is the total number of source bits in the code, and n is the code length. A scheme is considered
to have weak secrecy in the event that
1
lim I ( A, En ) = 0 (14)
n→∞ n
Unlike the Shannon perfect secrecy metric, this metric proved that it is possible to obtain secrecy
in a practical scenario [38]. Figure 8 illustrates the relationship between the transmission rate and
equivocation. It shows the region of achievable pairs as ( R, ∆) [26]. The highest rate capable of
achieving complete equivocation Hs (i.e., confusion at the eavesdropper) is the secrecy capacity Cs of
the channel.
With Wyner’s model, the assumption is that the signal arriving at the receiver of the eavesdropper
is degraded by some degree in comparison to that of the legitimate receiver [36]. However, it was
proved in [39] that secret communication is possible regardless of the statistical channel state of the
eavesdropper. It was further shown in [30] that weak secrecy was also insufficient in many cases to
Entropy 2020, 22, 1261 9 of 34
prove secrecy in communication. Another metric, referred to as strong secrecy, was defined by [40].
The metric states that a scheme is said to achieve strong secrecy if
lim I ( A, Z n ) = 0 (15)
n→∞
Subsequently, in [41], strong secrecy was proved to be inefficient for some applications. This is
based on the assumption of random and uniformly distributed message symbols over the message
alphabet at the input of the secrecy encoders. In practice, the limitation is caused by the unavailability
of universal compression algorithms capable of providing messages that have the distribution
mentioned above.
where R B and R E are the secrecy rates of Bob and Eve, respectively. The secrecy rate, Rs , can be
maximized using signal design and optimization techniques, which will be discussed in Section 3.
BER performances at the same SINR level. For the establishment of a communication link, the BER of
a system must be above the minimum required level. Therefore, PLS techniques utilize optimization
methods to improve the security of a communication system by degrading the BER of illegitimate
users. Thus, the BER can be employed to measure the QoS and the security of a communication system.
log2 |I + Hb K x HbH |
Cs = max (17)
K x 0,tr (K x P) log2 | I + He K x HeH |
Entropy 2020, 22, 1261 11 of 34
where I is the identity matrix, K x is the covariance matrix of the transmit signal x, P is the maximum
transmit power constraint, and Hb ∈ C NB × NA and He ∈ C NE × NA are the MIMO complex Gaussian
channel matrices of the legitimate and wiretap channel, respectively. The signals received by the
legitimate receiver and passive eavesdropper are given by Equation (18):
yb = Hb x a + nb ,
(18)
ye = He x a + ne ,
Bob
Bob
Alice Alice
Eve
Eve
Alice
Alice
Eve
3.2. Beamforming
Beamforming is a signal processing technique that is used to transmit signals effectively in
intended directions to give a maximum signal difference between the receiver in the intended direction
and the one in the unintended direction. Beamforming forms a beam in the direction of the desired
recipient to maximize the signal-to-noise power ratio while suppressing the reception or transmission
in the direction of the unintended user, Figure 11. This significantly improves the energy efficiency
of the system because the energy is transmitted or focused in a particular direction rather than being
spread out in a diffused fashion.
Entropy 2020, 22, 1261 13 of 34
Beamforming can be used at both the transmitting and receiving ends to achieve spatial
selectivity, i.e., transmit beamforming and receive beamforming. Transmit beamforming steers the
transmitted signal towards the intended receiver by finding the best possible channel among all the
transmit antennas.
Beamforming is one of the key techniques in PLS and has been widely studied in the
literature [49,52–57]. A beamforming problem in PLS involves steering the transmitted signal towards
the desired user while taking into account an interfering user trying to decode the transmitted
information, Figure 11. To demonstrate the beamforming optimization problem in PLS we consider a
MISO system shown in Figure 12 in which the transmitter uses transmit beamforming to communicate
with K users.
Alice
Bob
Eve ... Eve
Bob
Figure 12. System model of multi-user and eavesdropper pairs with beamforming.
We assume that the transmitter is equipped with Nt transmit antennas, and the legitimate user
and the eavesdropper each have a single receiving antenna. Therefore, the received signal at legitimate
user i and their equivalent SINR are given by
K
yi = hiH xi + ∑ hiH xk + ni ,
k =1
k 6 =i
|hiH wi |2 (19)
SINR =
K
| ∑ hiH wk |2 + σ2
k =1
k 6 =i
Entropy 2020, 22, 1261 14 of 34
Similarly, the signal received signal by the ith eavesdropper and their equivalent SINR can be
given by
K
zi = giH xi + ∑ giH xk + mi ,
k =1
k 6 =i
|giH wi |2 (20)
SINR =
K
| ∑ giH wk |2 + σ2
k =1
k 6 =i
where xi ∈ C NT ×1 is the transmitted signal symbol of the desired user i with corresponding
beamforming vector wi ∈ C NT ×1 , h ∈ C NT ×1 and g ∈ C NT ×1 are the channel vectors of the desired
user and eavesdropper respectively, and ni and mi are the corresponding AWG noise vectors for the ith
user and eavesdropper with zero mean and noise power σ2 . The covariance matrix of the transmitted
signal is given by Rn = E{xi xiH }. The objective problem of a typical beamforming design scheme is to
minimize the interference signal at the desired user so that they receive the transmitted signal with
the desired QoS, which is usually described by the constraint of the SINR greater or equal to the given
threshold amount of the ith user, i.e., SINR ≥ ρi . Therefore, the beamforming optimization problem
can be written as follows:
K
min | ∑ hiH wk |2 + σ2
wi
k =1
k 6 =i (21)
s.t. SINR ≥ ρi
||wi ||2 ≤ PT
The solution to the beamforming problem provides the optimal vector wi , which maximizes the
SNR of the desired user. This results in focusing the beam in one direction, and the process is referred
to as electronic steering. One beamforming vector is assigned to each legitimate user and is matched to
their channel. The beamforming design problem in PLS has been well-investigated in many studies in
the literature, which can be found in [51,58–64], with the aim of developing algorithms that minimize
the interference and also maximize secrecy of transmission. We summarize some of the results from
these studies here. One approach which was considered in [58] involves using semi-definite relaxation
to obtain the optimal beamforming solution, which minimizes the transmission power subject to SINR
constraints. In the paper, they showed that the quadratic optimization problems with non-convex
and discontinuous constraints could be recast as SDP with additional constraints, which imposes that
the solution matrices must be of rank one. Another study employing semi-definite relaxation was
proposed in [59], wherein they used Taylor expansion to solve the optimization problem. The author’s
study proved that their proposed algorithm outperformed both the signal-to-leakage-and-noise ratio
(SLNR)-based algorithm and zero-forcing beamforming. The SLNR algorithm and zero-forcing were
employed to minimize the power leaking to the channels of other users. Another novel approach of
path-following algorithm was proposed in [60,61], which used a simple quadratic program to perform
iterations for finding the optimal transmit beamformers. The QoS, which is given in terms of both
the user’s secrecy throughput and the network secure energy efficiency, is optimized through the use
of the obtained beamformers. The algorithm proposed in [60,61] offers a better performance when
compared with the existing methods based on zero-forcing beamformers. Authors in [51,51] further
studied the algorithm proposed by [60,61] using a different approach. The authors defined secrecy
throughput in terms of outage probability. It was found that this approach offered a more practical
beamforming design solution. Interference alignment (IA) was proposed by [65,66] as an excellent
solution for interference management in multi-user wireless networks to significantly improve the
Entropy 2020, 22, 1261 15 of 34
sum-rate. The concept of the IA technique is that the transmitted signals are directed to concentrate the
interference in the particular sub-spaces at the unintended receivers, thus opening up interference-free
sub-spaces to transmit the desired signal to the intended user. Following the proposal, several research
works in [64,67–69] have been conducted to develop IA algorithms for directing the interference in a
manner that is detrimental to the illegitimate receiver while ensuring that the legitimate receiver is not
severely affected. To enhance the desired signal gain and suppress the undesired interference and the
noise signal, authors in [63] employed spatial degrees of freedom.
AN
Bob
Eve Alice
x = ws a + vs j , (22)
where x is the signal transmitted by Alice. The source information is denoted by s a and s j denotes
the AN jamming signal, which is chosen to be independent of the source information, i.e., s a 6= s j .
Beamforming vectors for the information and jamming signals are represented by w and v, respectively.
Therefore, the signals received by Bob and Eve are given by Equations (23) and (24), respectively.
y B = h BH ws a + g BH vs j + n B (23)
y E = h EH ws a + g EH vs j + n E (24)
Entropy 2020, 22, 1261 16 of 34
where h BH and g EH denote the channel responses of Alice–Bob and Alice–Eve, respectively.
The independent, identically distributed complex Gaussian noise for Bob and Eve with zero mean and
variance σ2 are denoted by n B and n E , respectively. The corresponding secrecy rate is given by
! !
| h H w |2 | h H v |2
R = log2 1 + H B2 − log2 1 + H E2 (25)
| g B v | + σ2 | g E v | + σ2
A novel approach of the AN scheme that offers better secrecy rate performance, where the
jamming signal is generated to be dependent on the information signal, was presented in [72].
The scheme significantly improved the signal strength at Bob and, at the same time, canceled the
received signal at the eavesdropper. In the scheme the signal received by Bob and Eve can be shown by
y B = h BH ws a + g BH vs a + n B (26)
y E = h EH ws a + g EH vs a + n E (27)
The optimization problem in the AN precoding scheme is to find an optimal power allocation
method for the artificial noise, which ensures maximum secrecy of the legitimate transmission.
A comprehensive summary of several methods proposed in the literature for solving the AN precoding
optimization is presented below.
The classical AN injection schemes are investigated broadly in the literature, and their application
in MIMO systems has been shown as promising to exploit in future wireless networks. In [73],
the authors demonstrated an approach capable of guaranteeing secrecy without knowledge of the
eavesdropper’s CSI. In [73], two schemes were proposed for AN generation in PLS. In the first scheme,
they proposed a scheme which was based on MIMO technology, while the second scheme used a single
transmitter antenna. For the latter scheme, amplifying relays were used to mimic the effects of multiple
antennas. Moreover, in the second scheme the transmitter and the intended receiver both transmit
independent AN signals to the helper nodes. The eavesdropper receives differently weighted versions
of the AN signals from the transmitter and the receiver. The two transmission schemes proposed in
the paper transmit both AN and information-bearing signals together. However, the paper does not
necessarily find an optimal power allocation for the transmission of message signals and minimal
power allocated to the AN.
To tackle the shortfall indicated in [73], researchers [74] proposed an AN-assisted secure
MIMO-OFDM system to improve the security of the legitimate transmission and find an optimal
power allocation scheme. AN precoding scheme is proposed where Alice divides her power between
transmitting a message to Bob and transmitting AN into Bob’s nullspace. Assuming Bob and Eve’s
channels are independently faded, Eve will see some of the AN in her range space. The authors
determined the minimum power consumption that satisfies the legitimate transmission quality with
the largest residual power in generating AN. They use convex optimization solvers to find the optimal
solution to this problem. This technique’s major strength is that the provided secrecy scales well with
SNR, since an increase in SNR at Eve will increase the received AN power along with the message
power [23].
AN precoding was also used in [50] to implement security in the physical layer. AN was used as
a transmit strategy over Bob’s null space with the intention of improving the secrecy of the Alice–Bob
channel without affecting its quality. The authors examine three approaches of generating AN. Firstly,
the minimum power was used for the information-bearing signal, and the rest of the transmit power
Entropy 2020, 22, 1261 17 of 34
was distributed to the AN. Secondly, the power was evenly distributed between the transmit signal and
the AN signal in order to maximize ergodic secrecy capacity. Lastly, the AN power was progressively
varied in order to understand its effects on the secrecy confidence level. Eve was modeled to use
the minimum mean-square error (MMSE) as an optimal receiver structure to maximize the SNR.
Eve’s capability to compromise the secrecy of the main link was defined as the SNR difference between
the intended receiver and the eavesdropper. It was shown in [50] that when an eavesdropper uses
zero-forcing to mitigate the interference introduced by the artificial noise transmission with a large
number of receiving antennas and knows some of the main channel’s CSI, the secrecy of the system
can be compromised.
PA h AB s + w H h RB z + n B
p
yB = (29)
√
yE = PAh AE s + w H h RE z + n E (30)
where h AB is the Alice–Bob channel, h RB is the relay–Bob channel, h AB is the Alice–Bob channel, h AB
is the Alice–Bob channel, h RE is the relay–Eve channel, h AE is the Alice–Eve channel, and n B and n E
Entropy 2020, 22, 1261 18 of 34
are the AWG noise with variance σ2 at both Bob and Eve, respectively. The corresponding secrecy rate
is given by
PA |h AB |2 PA |h AE |2
R = log2 1 + − log2 1 + (31)
|w H h RB |2 + σ2 |w H h RE |2 + σ2
The problem of secrecy maximization has been extensively studied in the literature [76–83].
Authors in [76,77] investigated the problem of secrecy rate maximization of a secure wireless
communication system in the presence of multiple eavesdroppers. Hu et al. in [79] studied cooperative
jamming for PLS enhancement in IoT, specifically considering a downlink transmission problem
to tackle multiple passive and non-colluding eavesdroppers. The current research in cooperative
jamming is focused towards integrating cooperative jamming with the current technologies in 5G
and 6G, which can be found in [80–84]. In [80], they used joint cooperative jamming and secure
channel training solutions to safeguard a two-user power domain non-orthogonal multiple access
(NOMA) system against eavesdropping attacks coming simultaneously from inside and outside of
the network. Another interesting study in [81] uses cooperative jamming to implement security for
industrial wireless networks with mobile users and eavesdroppers. In the paper they employed an
edge computing device to intelligently select an optimal cooperative node.
Bob
Alice Cooperative
jammer
Eve
where s1 and s2 are the modulated symbols mapped to two transmit antennas in two transmit time
slots [86]. The columns of C represent timeslots, and the rows represent different transmit antennas.
Studies by [87,88] showed that STBC may be employed to provide secure communication for space-time
systems while lowering the eavesdropper’s order of diversity. A technique depicted in Figure 15
to achieve a secure STBC without the need to estimate CSI at the transmitter was proposed in [87].
The proposed technique uses mutual received signal strength indicator measurements to generate
a pseudo-random sequence used to secure communication. In this model, at each transmit antenna,
Entropy 2020, 22, 1261 19 of 34
random phase rotations θ1 and θ2 are applied to the symbols. Each phase shift is applied for one code
duration. For a single codeword, the transmitter encodes source information s1 and s2 as
" #
s1 e jθ1 s2∗ e jθ2
X= (33)
−s2 e jθ1 s1∗ e jθ2
z = Xh + n
z = H+ (θ1 , θ2 )s + ñ
" # " #" # " # (34)
z1 h1 e jθ1 h2∗ e jθ2 s1 n1
= +
−z2∗ −h2 e jθ1 h1∗ e jθ2 s2 −n2∗
ALICE
BOB
ALAMOUTI
STBC
EVE
s̃ = H+ (θ1 , θ2 )z (35)
y = Xg + e
(36)
ỹ = G+ (θ1 , θ2 )s + ẽ
where H+ and G+ are the pseudo-inverse of H and G, respectively. The transmitter manipulates the
transmitted symbols by generating and applying the maximum number of phase rotations so that the
eavesdropper is completely denied access to the source information. The strength of this technique is
that improved security is achieved without the knowledge of the CSI, unlike in the preceding security
schemes which assumes that the CSI is available. However, it was shown in [88] that the security of
the transmitted signal is compromised if the eavesdropper can obtain one of the space angles and is
in close proximity to Bob. To avoid this, the authors proposed a technique that was able to achieve
zero diversity for the eavesdropper even under enhanced receive diversity. This was achieved through
signal and space rotations.
In Figure 16a we demonstrate the BER performance of the beamforming and AN schemes.
The figure illustrates that the eavesdropper’s channel has the worst bit error rate because it is corrupted
by the AN signal; it is followed by a single-input single-output (SISO) system, which does not
receive diversity from beamforming. Lastly, the 1 × 2 single-input multiple-output (SIMO) and
2 × 1 multiple-input single-output (MISO) systems receive the signal with better BER because of
beamforming. The achievable secrecy rates of different precoding schemes are shown in Figure 16b.
In particular, in a MIMO scheme, six transmit antennas, the intended receiver, and eavesdropper are
each equipped with two receive antennas. In the figure we have the same MIMO configurations for no
Entropy 2020, 22, 1261 20 of 34
beamforming and use of beamforming. Lastly, we introduce an AN signal. The figure confirms that the
use of AN indeed improved the secrecy rate of the communication network compared to beamforming
only or no beamforming used.
25
10 0
MIMO with Beamforming
MIMO with AN
MIMO without Beamforming
20
10 -1
10
10 -3
Figure 16. Bit error rate (BER) and secrecy rate performance metrics simulations for different
precoding schemes.
PLS precoding schemes make an assumption of the knowledge or availability of the unintended
user’s CSI. This is the fundamental limitation of such PLS techniques. In practice it is very difficult
for the transmitter to obtain the CSI of the eavesdropper. This is due to the fact that the eavesdropper
does not naturally cooperate with the transmitter to send CSI feedback. Therefore, this assumption
is entirely valid for theoretical systems. Most PLS secure precoding techniques assume that an
eavesdropper has limited resources. To be more specific, the eavesdropper is commonly assumed to
have a smaller number of antennas when compared to those of the intended receiver. Even though
it has been proposed that secrecy against an eavesdropper with more antennas than the transmitter
is possible in [90], such a solution requires additional power assumptions. Hence, secrecy against
resourceful eavesdroppers remains a major challenge in PLS precoding.
..
Transmitter
..
Information Receiver
Figure 17. A multiple-input multiple-output (MIMO) system for Simultaneous Wireless Information
and Power Transfer (SWIPT).
Entropy 2020, 22, 1261 22 of 34
Cooperative
Legitimate link
jammer
Wiretap link
Jamming signal
Alice
Bob
Eve
yE = h H H
IE ΘH AI x + h AE x + n E (38)
where h IB is the IRS–Bob channel, Θ = diag{[e( jφ1 ) , . . . , e( jφi ) , . . . , e( jφL ) ]} is the diagonal with φi
denoting the phase shift of the i-th reflecting element of the IRS, H AI is the Alice–IRS channel, x is
the transmitted signal with maximum transmit power, P, h H AB is the Alice–Bob channel, and n B is the
2
AWGN noise at Bob with variance σn,B . Similarly, subscript {·} E denotes parameters with relevance
to Eve.
Alice Bob
Eve
Rs = Rb − Re
!
h H ΘH AI h H
AB PH AI Θ h IB + h AB
H H
= log2 1 + IB 2
σn,B (39)
!
IE ΘH AI h AE PH AI Θ h IE
hH H H H + h AE
− log2 1 + 2
σn,E
The performance of the secrecy rate in Equation (39) is illustrated by the simulation shown in
Figure 20. The secrecy rate is shown by varying the distance between Alice and Bob. Figure 20 clearly
shows that the performance of a PLS scheme without an IRS yields a lower secrecy rate with an increasing
distance between Bob and Alice. On the other hand, an improved secrecy rate can be achieved when IRS
is introduced, as shown in the above-mentioned figure. However, it should be noted that optimization
techniques may significantly and efficiently enhance the secrecy rate, as shown in [14].
15 w IRS
w/o IRS
10
Secrecy in [bps/Hz]
10 20 30 40 50 60 70
Distance [m]
Figure 20. Secrecy rate vs distance.
luminous intensity of 33.74 cd. As seen in Figure 21b, increasing the number of LED arrays leads to an
increased intensity and luminescence at all points of the room. Consequently, this results in elevated
optical power, as seen in Figure 21d. Optical power is crucial for data transmission because direct
detection depends on the amount of power which impinges the PD. Due to incoherently distributed
light intensity, the amount of optical power produced by the LED arrays decreases logarithmically
with increasing distance.
440 640
2 2
400 560
360
480
1 1
2 120 2 80
80 0
2 1 0 1 2 2 1 0 1 2
Room length [m] Room length [m]
(a) Illumination with one LED Array (b) Illumination with two LED Arrays
800
30 One LED
2 Two LEDs
720 Four LEDs
640 32
1
Horizontal illuminance [lux]
560
Optical power [dB]
Room width [m]
34
0 480
36
400
1
320 38
2 240
40
160
2 1 0 1 2 0.0 0.5 1.0 1.5 2.0
Room length [m] Distance [m]
(c) Illumination with four LED Arrays (d) Optical power distribution
Suppose that the satellite transmits the signal si intended for the ith legitimate user with average
power E[|si |2 ] = 1. The transmitted signal has a weighted beamforming vector given by wi ∈ C N ×1 .
Therefore, the overall transmitted signal is given by
M
x= ∑ wi si (40)
i =1
Satellite
User
Eve
... ...
The signals received by the ith legitimate and ith eavesdropper are given by Equations (41)
and (42), respectively.
M
yuser−i = hiH wi si + ∑ hiH wm sm + ni (41)
m 6 =i
M
ye−i = giH wi si + ∑ giH wm sm + ne−i (42)
m 6 =i
where hi ∈ C N ×1 denotes the channel gain vector between the ith intended user and the satellite,
gi ∈ C N ×1 denotes the channel gain vector between the ith eavesdropper and the satellite, and ni
and ne−i are assumed to be zero-mean AWG noise of the ith intended user and the ith eavesdropper,
respectively. The achievable secrecy rate of the ith intended user is given by
! !
|hiH wi |2 |giH wi |2
Rs = log2 1+ M − log2 1+ M (43)
∑m6=i |hiH wm |2 + σi2 ∑m6=i |giH wm |2 + σe2−i
Entropy 2020, 22, 1261 27 of 34
The typical optimization problem of interest is to maximize the achievable secrecy rate and can be
written mathematically as follows:
min Rs
wi
M (44)
s.t. ∑ ||wi ||2 ≤ PT
m =1
where PT is the maximum transmit power of the satellite. The authors in [115] studied the problem
of minimizing the transmit power on a multi-beam satellite while fulfilling the minimum per user
secrecy rate. They further proposed an iterative algorithm to jointly optimize the transmission power
and the beamforming vector by completely eliminating the co-channel interference and perfectly
nulling out the received signal at the eavesdropper. Kalantari et al. in [116] also used PLS to
address the issue of confidentiality in bidirectional satellite communication based on network coding.
They designed the optimal beamforming weight vector which maximizes the sum secrecy rate by
using semi-definite programming.
5. Conclusions
We have provided a comprehensive review of PLS in wireless networks based on optimization
techniques. We have also shown that PLS is an auspicious technology for strengthening the
confidentiality and secrecy of information transmission in both existing and emerging wireless
networks, which can be used to augment conventional cryptographic methods. To emphasize the
benefits of PLS, we first compared conventional encryption using cryptography and PLS. This work
mainly focused on the provision of a comprehensive review of both the design and the optimization
of PLS schemes. We also discussed some of the main challenges facing PLS and outlined some of
the promising solutions to these problems and how they can benefit future wireless communication
networks. In short, we have shown that PLS is a very promising technology in ensuring safe and
secure wireless communication.
Author Contributions: Conceptualization, A.S. and B.B.; methodology, A.S.; software, A.S. and G.A.M.; validation,
A.S. and G.A.M.; writing—original draft preparation, A.S.; writing—review and editing, A.S., G.A.M., T.M.L.J. and
L.M.; supervision, B.B. and J.M.C. All authors have read and agreed to the published version of the manuscript.
Funding: This research was funded by Botswana International University of Science and Technology grant
number R00067 and S00081. The APC was funded by R00067 and S00081.
Acknowledgments: We would like to acknowledge the Botswana International University of Science and
Technology (BIUST) for research funding.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
Entropy 2020, 22, 1261 28 of 34
AN Artificial noise
AWGN Additive white Gaussian noise
BER Bit error rate
CSI Channel state information
IRS Intelligent reflecting surface
ITU International telecommunication Union
MIMO Multiple-input multiple-output
OFDM Orthogonal frequency division multiplexing
PLS Physical layer security
QoS Quality of service
SINR Signal-to-interference-plus-noise ratio
STBC Space-time block code
UAV Unmanned aerial vehicle
URLLC Ultra-reliable low latency communication
WIPT Wireless information and power transfer
ZF Zero-forcing
Entropy 2020, 22, 1261 29 of 34
References
1. International Telecommunication Union. Statistics. Available online: https://www.itu.int/en/ITU-D/
Statistics/Pages/stat/default.aspx (accessed on 13 November 2019).
2. Steve. 2019 Official Annual Cybercrime Report. Technical Report. Available online: https:
//www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-
Report.pdf (accessed on 13 November 2019).
3. Zorgui, M. Wireless Physical Layer Security: On the Performance Limits of Secret-Key Agreement.
Masters’s Thesis, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia, 2015.
4. Campagna, M.; Chen, A.L.; Dagdelen, Ö.; Darmstadt, T.U.; Ding, J.; Fernick, J.K.; Hayford, D.; Jennewein, T.;
Lütkenhaus, N.; Mosca, M.; et al. Quantum Safe Cryptography and Security An introduction, benefits,
enablers and challenges Quantum Safe Cryptography and Security Authors & contributors Quantum Safe
Cryptography and Security 2. Technical Report. 2015. Available online: https://www.etsi.org/images/
files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf (accessed on 12 November 2019).
5. Li, H.; Wang, X. Physical-Layer Security Enhancement in Wireless Communication Systems Part of the
Systems and Communications Commons Recommended Citation. Technical Report. 2013. Available online:
https://core.ac.uk/download/pdf/61640146.pdf (accessed on 13 November 2019).
6. Mukherjee, A.; Ali, S.; Fakoorian, A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security
in Multiuser Wireless Networks: A Survey; IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [1011.3754v3].
[CrossRef]
7. Wang, D.; Bai, B.; Member, S.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical
Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 1878–1911. [CrossRef]
8. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security
Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1773–1828.
[CrossRef]
9. Wang, N.; Wang, P.; Alipour-Fanid, A.; Jiao, L.; Zeng, K. Physical-Layer Security of 5G Wireless Networks
for IoT: Challenges and Opportunities. IEEE Internet Things J. 2019, 6, 8169–8181. [CrossRef]
10. Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Safari, M.; Assi, C.; Haas, H. Physical Layer
Security for Visible Light Communication Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 1. [CrossRef]
11. Wu, Q.; Zhang, R. Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided
Wireless Network. IEEE Commun. Mag. 2020, 58, 106–112. [CrossRef]
12. Guan, X.; Wu, Q.; Zhang, R. Intelligent Reflecting Surface Assisted Secrecy Communication: Is Artificial
Noise Helpful or Not? IEEE Wirel. Commun. Lett. 2020, 1. [CrossRef]
13. Abeywickrama, S.; Zhang, R.; Wu, Q.; Yuen, C.; Zhang, R.; Wu, Q.; Yuen, C. Intelligent Reflecting Surface:
Practical Phase Shift Model and Beamforming Optimization. In Proceedings of the ICC 2020—2020 IEEE
International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020.
14. Shen, H.; Xu, W.; Gong, S.; He, Z.; Zhao, C. Secrecy Rate Maximization for Intelligent Reflecting Surface
Assisted Multi-Antenna Communications. IEEE Commun. Lett. 2019, 23, 1488–1492. [CrossRef]
15. Wu, Q.; Mei, W.; Zhang, R. Safeguarding wireless network with UAVs: A physical layer security perspective.
IEEE Wirel. Commun. 2019, 26, 12–18. [CrossRef]
16. Li, B.; Fei, Z.; Zhang, Y.; Guizani, M. Secure UAV communication networks over 5G. IEEE Wirel. Commun.
2019, 26, 114–120. [CrossRef]
17. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends.
IEEE Internet Things J. 2019, 6, 2241–2263. [CrossRef]
18. Vázquez, M.Á.; Pérez-Neira, A.; Christopoulos, D.; Chatzinotas, S.; Ottersten, B.; Arapoglou, P.D.; Ginesi, A.;
Tarocco, G. Precoding in multibeam satellite communications: Present and future challenges. IEEE Wirel.
Commun. 2016, 23, 88–95. [CrossRef]
19. Radhakrishnan, R.; Edmonson, W.W.; Afghah, F.; Rodriguez-Osorio, R.M.; Pinto, F.; Burleigh, S.C.
Survey of Inter-Satellite Communication for Small Satellite Systems: Physical Layer to Network Layer
View. IEEE Commun. Surv. Tutor. 2016, 18, 2442–2473. [CrossRef]
20. Boero, L.; Bruschi, R.; Davoli, F.; Marchese, M.; Patrone, F. Satellite Networking Integration in the 5G
Ecosystem: Research Trends and Open Challenges. IEEE Netw. 2018, 32, 9–15. [CrossRef]
Entropy 2020, 22, 1261 30 of 34
21. Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical-Layer Security in Space Information Networks: A Survey.
IEEE Internet Things J. 2020, 7, 33–52. [CrossRef]
22. Gençoğlu, M.T. Importance of Cryptography in Information Security. IOSR J. Comput. Eng. 2019. 21, 65–68.
[CrossRef]
23. Shiu, Y.S.; Chang, S.Y.; Wu, H.C.; Huang, S.C.; Chen, H.H. Physical layer security in wireless networks:
A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [CrossRef]
24. Siddiqi.; Yu.; Joung. 5G Ultra-Reliable Low-Latency Communication Implementation Challenges and
Operational Issues with IoT Devices. Electronics 2019, 8, 981. [CrossRef]
25. Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and
Solutions. Entropy 2018, 20, 730. [CrossRef]
26. Wyner A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975. 54, 1355–1387. [CrossRef]
27. Li, J. A Critical Review of Physical Layer Security in Wireless Networking. Master’s Thesis,
University College London, London, UK, 2015.
28. Bassily, R.; Ekrem, E.; He, X.; Tekin, E.; Xie, J.; Bloch, M.R.; Ulukus, S.; Yener, A. Cooperative security at the
physical layer: A summary of recent advances. IEEE Signal Process. Mag. 2013, 30, 16–28. [CrossRef]
29. Wang, L. Physical Layer Security in Wireless Cooperative Networks; Wireless Networks; Springer International
Publishing: Cham, Switzerland, 2018. [CrossRef]
30. Bloch, M.; Barros, J. Physical-layer Security: From Information Theory to Security Engineering;
Cambridge University Press: Cambridge ,UK, 2011; p. 329.
31. Rohokale, V.M.; Prasad, N.R.; Prasad, R. Cooperative Wireless Communications and Physical Layer Security:
State-of-the-Art. J. Cyber Secur. Mobil. 2012. 1, 227–249.
32. Chen, Y.; Yang, Y.; Yi, W. A cross-layer strategy for cooperative diversity in wireless sensor networks.
J. Electron. 2012, 29, 33–38. [CrossRef]
33. Ryland, K.S.; Clancy, T.C.; Buehrer, R.M.; Dietrich, C.B. Software-Defined Radio Implementation of Two
Physical Layer Security Techniques. Technical Report. 2017. Available online: https://vtechworks.lib.vt.
edu/bitstream/handle/10919/82055/Ryland_KS_T_2018.pdf?sequence=1&isAllowed=y (accessed on 8
November 2019).
34. Shannon, C.E. Communication Theory of Secrecy Systems. Technical Report; 1949. Available online:
http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf (accessed on 14 November 2019).
35. Wang, H.M.; Zheng, T.X. Physical Layer Security in Random Cellular Networks; Springer Briefs in Computer
Science; Springer: Singapore, 2016. [CrossRef]
36. Hyadi, A.; Rezki, Z.; Alouini, M.S. An Overview of Physical Layer Security in Wireless Communication
Systems with CSIT Uncertainty. IEEE Access 2016, 4, 6121–6132. [CrossRef]
37. Wei, Y.; Zeng, K.; Mohapatra, P. Adaptive wireless channel probing for shared key generation. In Proceedings
of the IEEE INFOCOM, Shanghai, China, 30 Jule 2011; pp. 2165–2173. [CrossRef]
38. Harrison, W.K.; Sarmento, D.; Vilela, J.P.; Gomes, M. Analysis of Short Blocklength Codes for Secrecy.
Technical Report. Available online: https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/
s13638-018-1276-1 (accessed on 26 February 2020).
39. Csiszar, I.; Kijrner, J. Broadcast Channels with Confidential Messages. IEEE Trans. Inf. Theory 1978, 24,
339–348. [CrossRef]
40. Blahut, R.E.; Costello, D.J., Jr.; Maurer, U.; Mittelholzer, T. Communications and Cryptography: Two Sides of One
Tapestry; Symposium on Communications, C; Kluwer Academic Publishers: Dordrecht, The Netherlands,
1994; pp. 270–285.
41. Safavi-Naini, R.; Canetti, R. Advances in Cryptology—CRYPTO 2012. In Proceedings of the 32nd Annual
Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2012; Springer: Berlin, Germany, 2012; p. 888.
42. Zhou, X.S.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL,
USA, 2016; p. 295.
43. Lin, P.H.; Jorswieck, E. Multiuser Channels with Statistical CSI at the Transmitter: Fading Channel
Alignments and Stochastic Orders, an Overview. Entropy 2017, 19, 515. [CrossRef]
44. Migliore, M.; Pinchera, D.; Lucido, M.; Schettino, F.; Panariello, G. MIMO Channel-State Estimation in the
Presence of Partial Data and/or Intermittent Measurements. Electronics 2017, 6, 33. [CrossRef]
Entropy 2020, 22, 1261 31 of 34
45. What Are MIMO, MRC, Beamforming, STBC, and Spatial Multiplexing? WLAN Troubleshooting
Guide—Huawei. Available online: https://support.huawei.com/enterprise/en/doc/EDOC1000060368/
d9adbe5a/what-are-mimo-mrc-beamforming-stbc-and-spatial-multiplexing (accessed on 25 January 2020).
46. Mohaisen, M.; Wang, Y.; Chang, .K. Multiple Antenna Technologies. Technical Report. Available online:
https://arxiv.org/ftp/arxiv/papers/0909/0909.3342.pdf (accessed on 8 November 2019).
47. Björnson, E.; Sanguinetti, L.; Wymeersch, H.; Hoydis, J.; Marzetta, T.L. Massive MIMO is a Reality-What
is Next? Five Promising Research Directions for Antenna Arrays. Digit. Signal Process. 2019, 94, 3–20.
[CrossRef]
48. Kapetanovi, D.; Zheng, G.; Rusek, F. Physical Layer Security for Massive MIMO: An Overview on Passive
Eavesdropping and Active Attacks. IEEE Commun. Mag. 2015, 53, 21–27. [CrossRef]
49. Yaacoub, E.; Al-Husseini, M. Achieving physical layer security with massive MIMO beamforming.
In Proceedings of the 2017 11th European Conference Antennas Propagation, EUCAP 2017, Paris, France,
19–24 March 2017; pp. 1753–1757. [CrossRef]
50. Romero-Zurita, N.; Ghogho, M.; McLernon, D. Physical layer security of MIMO-OFDM systems by
beamforming and artificial noise generation. Phys. Commun. 2011, 4, 313–321. [CrossRef]
51. Sheng, Z.; Tuan, H.D.; Sheng, Z.; Tuan, H.D.; Duong, T.Q.; Vincent Poor, H. Beamforming Optimization
for Physical Layer Security in MISO Wireless Networks. IEEE Trans. Signal Process. 2018, 66, 3710–3723.
[CrossRef]
52. Björnson, E.; Bengtsson, M.; Ottersten, B. Optimal Multiuser Transmit Beamforming: A Difficult Problem
with a Simple Solution Structure. IEEE Signal Process. Mag. 2014, 31, 142–148.
53. SANKAR, K. Maximal Ratio Combining (MRC), 2008. Available online: http://www.dsplog.com/2008/09/
28/maximal-ratio-combining/ (accessed on 27 January 2020).
54. Mohammadkhani, R. Lecture 13: MIMO Transceivers Part II. Technical Report. 2017. Available
online: https://eng.uok.ac.ir/mohammadkhani/courses/Array_MIMO/L13-MIMO%20Tx-Rx-part%20II.
pdf (accessed on 29 January 2020).
55. Sidiropoulos, N.D.; Member, S.; Davidson, T.N.; Luo, Z.Q. Transmit Beamforming for Physical-Layer
Multicasting. IEEE Trans. SIGNAL Process. 2006, 54. [CrossRef]
56. Ghogho, M.; Swami, A. Physical-layer secrecy of MIMO communications in the presence of a poisson random
field of eavesdroppers. In Proceedings of the 2011 IEEE International Conference on Communications
Workshops (ICC), Kyoto, Japan, 5–9 June 2011. [CrossRef]
57. Khisti, A.; Wornell, G.W. Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel.
IEEE Trans. Inf. Theory 2010, 56, 5515–5532.
58. Huang, Y.; Palomar, D.P. Rank-constrained separable semidefinite programming with applications to optimal
beamforming. IEEE Trans. Signal Process. 2010, 58, 664–678. [CrossRef]
59. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W.; Member, S. Robust Beamforming Design for Sum Secrecy
Rate Optimization in MU-MISO Networks. IEEE Trans. Inf. FORENSICS Secur. 2015, 10. [CrossRef]
60. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V.; Tuan, H.D.; Poor, H.V. Secure and Energy-Efficient
Beamforming for Simultaneous Information and Energy Transfer. IEEE Trans. Wirel. Commun. 2017,
16, 7523–7537.
61. Nghia, N.T.; Tuan, H.D.; Nghia, N.T.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. MIMO Beamforming for Secure
and Energy-Efficient Wireless Communication. IEEE Signal Process. Lett. 2017, 24, 236–239. [CrossRef]
62. Park, J.; Sung, Y.; Kim, D.; Vincent Poor, H. Outage probability and outage-based robust beamforming
for MIMO interference channels with imperfect channel state information. IEEE Trans. Wirel. Commun.
2012, 11, 3561–3573. [CrossRef]
63. Pu, W.; Xiao, J.; Zhang, T.; Luo, Z.Q. Overcoming DoF Limitation in Robust Beamforming: A Penalized
Inequality-Constrained Approach. arXiv 2019, arXiv:1910.03365.
64. Zhao, N.; Yu, F.R.; Sun, H. Adaptive energy-efficient power allocation in green interference-alignment-based
wireless networks. IEEE Trans. Veh. Technol. 2015, 64, 4268–4281. [CrossRef]
65. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel.
IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [CrossRef]
66. Maddah-Ali, M.A.; Motahari, A.S.; Khandani, A.K. Communication over MIMO X channels: Interference
alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [CrossRef]
Entropy 2020, 22, 1261 32 of 34
67. Lee, J.H.; Chae, S.H.; Choi, W. Opportunistic jammer selection for secure degrees of freedom. In Proceedings
of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December
2012; pp. 4862–4867. [CrossRef]
68. Jing, X.; Mo, L.; Liu, H.; Zhang, C. Linear Space-Time Interference Alignment for K-User MIMO Interference
Channels. IEEE Access 2018, 6, 3085–3095. [CrossRef]
69. Rihan, M.; Huang, L.; Zhang, P. Joint interference alignment and power allocation for NOMA-based
multi-user MIMO systems. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 217. [CrossRef]
70. Negi, R.; Goel, S. Secret communication using artificial noise. In Proceedings of the VTC-2005-Fall, 2005 IEEE
62nd Vehicular Technology Conference, Dallas, TX, USA, 28 September 2005; Volume 3, pp. 1906–1910.
[CrossRef]
71. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. QoS-based transmit beamforming in the presence of
eavesdroppers: An optimized artificial-aoise-aided approach. IEEE Trans. Signal Process. 2011, 59, 1202–1216.
[CrossRef]
72. Zhang, H.; Duan, L. Going beyond Secrecy Rate via Information Jamming. In Proceedings of the 2018 IEEE
Global Communication Conference GLOBECOM 2018, Abu Dhabi, United Arab Emirates, 9–13 December
2018. [CrossRef]
73. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189.
[CrossRef]
74. Liu, W.; Li, M.; Tian, X.; Wang, Z.; Liu, Q. Transmit Filter and Artificial Noise Design for Secure MIMO-OFDM
Systems. arXiv 2017, arXiv:1704.08007.
75. Reboredo, H.; Prabhu, V.; Rodrigues, M.R.; Xavier, J. Filter design with secrecy constraints:
The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive filters.
In Proceedings of the ICASSP, IEEE International Conference Acoustics, Speech, and Signal Processing,
Prague, Czechia, 22–27 May 2011; pp. 3440–3443. [CrossRef]
76. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Cooperative jamming for wireless physical layer security.
In Proceedings of the 2009 IEEE/SP 15th Workshop on Statistical Signal Processing, Cardiff, UK, 31 August–3
September 2009; pp. 417–420. [CrossRef]
77. Cumanan, K.; Alexandropoulos, G.C.; Ding, Z.; Karagiannidis, G.K. Secure Communications with
Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis. IEEE Trans. Veh. Technol.
2017, 66, 7495–7505. [CrossRef]
78. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure Multiuser Communications in Wireless
Sensor Networks with TAS and Cooperative Jamming. Sensors 2016, 16, 1908. [CrossRef]
79. Hu, L.; Wen, H.; Wu, B.; Pan, F.; Liao, R.F.; Song, H.; Tang, J.; Wang, X. Cooperative Jamming for Physical
Layer Security Enhancement in Internet of Things. IEEE Internet Things J. 2018, 5, 219–228. [CrossRef]
80. Anjos, G.; Castanheira, D.; Silva, A.; Gameiro, A. Securing Non-Orthogonal Multiple Access Systems Against
Simultaneous Eavesdropping Attacks Coming from Inside and Outside of the Network. In Proceedings of
the 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), Istanbul, Turkey, 8–11 September 2019; Volume 2019. [CrossRef]
81. Zhang, T.; Wen, H.; Jie, T.; Song, H.; Xie, F. Cooperative Jamming Secure Scheme for IWNs Random Mobile
Users Aided by Edge Computing Intelligent Node Selection. IEEE Trans. Ind. Inform. 2020. [CrossRef]
82. Zhong, Y.; Zhou, F.; Wang, Y.; Deng, X.; Al-Dhahir, N. Cooperative Jamming-Aided Secure Wireless Powered
Communication Networks: A Game Theoretical Formulation. IEEE Commun. Lett. 2020, 24, 1081–1085.
[CrossRef]
83. Huo, Y.; Fan, X.; Ma, L.; Cheng, X.; Tian, Z.; Chen, D. Secure Communications in Tiered 5G Wireless
Networks with Cooperative Jamming. IEEE Trans. Wirel. Commun. 2019, 18, 3265–3280. [CrossRef]
84. Wang, Q.; Zhou, F.; Hu, R.Q.; Qian, Y. Energy-Efficient Beamforming and Cooperative Jamming in
IRS-Assisted MISO Networks. In Proceedings of the ICC 2020—2020 IEEE International Conference
on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [CrossRef]
85. Alamouti, S.M. A Simple Transmit Diversity Technique for Wireless Communications. IEEE J. Select. Areas
Commun. 1998, 16, 1451–1458. [CrossRef]
86. Sujatha, B. Space-Time Block Coding (STBC) for Wireless Networks. Int. J. Distrib. Parallel Syst. (IJDPS)
2012, 3. [CrossRef]
Entropy 2020, 22, 1261 33 of 34
87. Allen, T.; Cheng, J.; Al-Dhahir, N. Secure space-time block coding without transmitter CSI. IEEE Wirel.
Commun. Lett. 2014, 3, 573–576. [CrossRef]
88. Akuon, P.O.; Xu, H. Secure Signal and Space Alamouti Scheme. SAIEE Africa Res. J. 2018, 107, 237–244.
[CrossRef]
89. Yang, N.; Yan, S.; Yuan, J.; Malaney, R.; Subramanian, R.; Land, I.; Yan, S.; Yuan, J.; Malaney, R.
Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels. IEEE Trans.
Commun. 2015, 63, 1771–1783. [CrossRef]
90. Liu, S.; Hong, Y.; Viterbo, E. Practical Secrecy using Artificial Noise. IEEE Commun. Lett. 2013, 17, 1483–1486.
91. Zhang, R.; Ho, C.K. MIMO broadcasting for simultaneous wireless information and power transfer.
IEEE Trans. Wirel. Commun. 2013, 12, 1989–2001. [CrossRef]
92. Zhou, F.; Member, S.; Li, Z.; Member, S.; Cheng, J.; Li, Q.; Si, J.; Zhou, F.; Li, Z.; Si, J.; et al. Robust AN-Aided
Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT. IEEE Trans. Wirel.
Commun. 2016, 16, 2450–2464. [CrossRef]
93. Boshkovska, E.; Wing, D.; Ng, K.; Zlatanov, N.; Koelpin, A.; Schober, R. Robust Resource Allocation for
MIMO Wireless Powered Communication Networks Based on a Non-linear EH Model. IEEE Trans. Commun.
2017, 65, 1984–1999. [CrossRef]
94. Chu, Z.; Johnston, M.; Le Goff, S. Simultaneous Wireless Information Power Transfer for MISO Secrecy
Channel. IEEE Trans. Veh. Technol. 2015, 65, 6913–6925. [CrossRef]
95. Zhu, Z.; Chu, Z.; Wang, Z.; Lee, I. Outage Constrained Robust Beamforming for Secure Broadcasting Systems
with Energy Harvesting. IEEE Trans. Wirel. Commun. 2016, 15, 7610–7620. [CrossRef]
96. Khandaker, M.R.; Wong, K.K. Masked beamforming in the presence of energy-harvesting eavesdroppers.
IEEE Trans. Inf. Forensics Secur. 2015, 10, 40–54. [CrossRef]
97. Ng, D.W.K.; Schober, R. Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul
Capacity. IEEE Trans. Wirel. Commun. 2015, 14, 5082–5097. [CrossRef]
98. Kalamkar, S.S.; Banerjee, A. Secure Communication via a Wireless Energy Harvesting Untrusted Relay.
IEEE Trans. Veh. Technol. 2017, 66, 2199–2213. [CrossRef]
99. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secrecy Rate Beamforming for Multicell Networks with
Information and Energy Harvesting. IEEE Trans. Signal Process. 2017, 65, 677–689. [CrossRef]
100. Li, B.; Fei, Z.; Chu, Z.; Zhang, Y. Secure Transmission for Heterogeneous Cellular Networks with Wireless
Information and Power Transfer. IEEE Syst. J. 2018, 12, 3755–3766. [CrossRef]
101. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine Learning Paradigms for
Next-Generation Wireless Networks. IEEE Wirel. Commun. 2017, 24, 98–105. [CrossRef]
102. Soltani, M.; Pourahmadi, V.; Mirzaei, A.; Sheikhzadeh, H. Deep Learning-Based Channel Estimation.
IEEE Commun. Lett. 2019, 23, 652–655. [CrossRef]
103. Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, H. Deep Learning for Physical-Layer 5G
Wireless Techniques: Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2019, 27, 214–222.
[CrossRef]
104. Mashhadi, B.; Gündüz, D. Deep Learning for Massive MIMO Channel State Acquisition and Feedback.
J. Indian Inst. Sci. 2020, 100, 369–382. [CrossRef] [PubMed]
105. Hamamreh, J. Physical Layer Security Against Eavesdropping in The Internet of Drones (IoD) Based
Communication Systems. 2019. Available online: https://figshare.com/articles/Physical_Layer_Security_
Against_Eavesdropping_in_The_Internet_of_Drones_IoD_Based_Communication_Systems/8362385
(accessed on 3 March 2020). [CrossRef]
106. Wang, H.M.; Zhang, X.; Jiang, J.C. UAV-involved wireless physical-layer secure communications:
Overview and research directions. IEEE Wirel. Commun. 2019, 26, 32–39. [CrossRef]
107. Li, A.; Wu, Q.; Zhang, R. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap
Channel. IEEE Wirel. Commun. Lett. 2018, 8, 181–184. [CrossRef]
108. Huang, C.; Hu, S.; Alexandropoulos, G.C.; Member, S.; Zappone, A.; Yuen, C.; Zhang, R.; Di Renzo, M.;
Debbah, M. Holographic MIMO Surfaces for 6G Wireless Networks: Opportunities, Challenges, and Trends.
IEEE Wirel. Commun. 2019. [CrossRef]
109. Lu, X.; Hossain, E.; Shafique, T.; Feng, S.; Jiang, H.; Niyato, D. Intelligent Reflecting Surface (IRS)-Enabled
Covert Communications in Wireless Networks. arXiv 2019, arXiv:1911.00986.
Entropy 2020, 22, 1261 34 of 34
110. Zhang, J.; Björnson, E.; Member, S.; Matthaiou, M.; Wing Kwan Ng, D.; Yang, H.; Love, D.J.; Zhang, J.;
Björnson, E.; Matthaiou, M.; et al. Prospective Multiple Antenna Technologies for Beyond 5G. IEEE J. Select.
Areas Commun. 2020, 38, 1637–1660. [CrossRef]
111. Black, E.J.; Commware, P. Holographic Beam Forming and MIMO. Availabe online: https://
pivotalcommware.com/wp-content/uploads/2017/12/Holographic-Beamforming-WP-v.6C-FINAL.pdf
(accessed on 18 May 2020).
112. Pathak, P.H.; Feng, X.; Hu, P.; Mohapatra, P. Visible Light Communication, Networking, and Sensing:
A Survey, Potential and Challenges. IEEE Commun. Surv. Tutor. 2015, 17. [CrossRef]
113. Ghassemlooy, Z.; Popoola, W.; Rajbhandari, S. Optical Wireless Communications: System and Channel Modelling
with MATLAB
; R CRC Press: Boca Raton, FL, USA, 2017; pp. 1–514. [CrossRef]
114. Lu, W.; An, K.; Liang, T. Robust Beamforming Design for Sum Secrecy Rate Maximization in Multibeam
Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1568–1572. [CrossRef]
115. Lei, J.; Han, Z.; Vázquez-Castro, M.A.; Hjørungnes, A. Secure Satellite Communication Systems Design with
Individual Secrecy Rate Constraints. IEEE Trans. Inf. Forensics Secur. 2011, 6, 661–671. [CrossRef]
116. Kalantari, A.; Zheng, G.; Gao, Z.; Han, Z.; Ottersten, B. Secrecy analysis on network coding in bidirectional
multibeam satellite communications. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1862–1874. [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional
affiliations.
c 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).