Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
The rapid development of wireless communications has put forward higher requirements for the design of security architectures for future communications. The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception, eavesdropping and...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024210/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537098617716736 |
---|---|
author | LU Xinjin SHI Yuxin LEI Jing YANG Zhifei YANG Xiaojun |
author_facet | LU Xinjin SHI Yuxin LEI Jing YANG Zhifei YANG Xiaojun |
author_sort | LU Xinjin |
collection | DOAJ |
description | The rapid development of wireless communications has put forward higher requirements for the design of security architectures for future communications. The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception, eavesdropping and interference. Wireless endogenous security utilizes the intrinsic characteristics of the wireless channel and communication-related technologies to complement existing security mechanisms and improve transmission security. According to the development trend of wireless security, the key technologies of endogenous security in the physical layer of wireless communication were discussed. Research overviews of wireless key generation technology, wireless authentication technology, and wireless encrypted transmission technology were given. The wireless communication physical layer endogenous security advantages, i.e., uniqueness, compatibility, heterogeneity, and reproducibility, were analyzed. Explore how to realize the de-redundancy of the physical layer architecture and the reuse of physical layer functions. Future work on key technologies for endogenous security in the physical layer of wireless communications is outlined. |
format | Article |
id | doaj-art-8046637075034fab8857622632d80b21 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8046637075034fab8857622632d80b212025-01-14T08:46:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-10-0145879679872198Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challengesLU XinjinSHI YuxinLEI JingYANG ZhifeiYANG XiaojunThe rapid development of wireless communications has put forward higher requirements for the design of security architectures for future communications. The broadcast and openness of wireless systems make information transmission vulnerable to security threats such as interception, eavesdropping and interference. Wireless endogenous security utilizes the intrinsic characteristics of the wireless channel and communication-related technologies to complement existing security mechanisms and improve transmission security. According to the development trend of wireless security, the key technologies of endogenous security in the physical layer of wireless communication were discussed. Research overviews of wireless key generation technology, wireless authentication technology, and wireless encrypted transmission technology were given. The wireless communication physical layer endogenous security advantages, i.e., uniqueness, compatibility, heterogeneity, and reproducibility, were analyzed. Explore how to realize the de-redundancy of the physical layer architecture and the reuse of physical layer functions. Future work on key technologies for endogenous security in the physical layer of wireless communications is outlined.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024210/wireless physical layer securitywireless endogenous propertieswireless key generationwireless authenticationwireless encrypted transmission |
spellingShingle | LU Xinjin SHI Yuxin LEI Jing YANG Zhifei YANG Xiaojun Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges Tongxin xuebao wireless physical layer security wireless endogenous properties wireless key generation wireless authentication wireless encrypted transmission |
title | Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges |
title_full | Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges |
title_fullStr | Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges |
title_full_unstemmed | Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges |
title_short | Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges |
title_sort | endogenous security in the physical layer of wireless communications key technologies advantages and future challenges |
topic | wireless physical layer security wireless endogenous properties wireless key generation wireless authentication wireless encrypted transmission |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024210/ |
work_keys_str_mv | AT luxinjin endogenoussecurityinthephysicallayerofwirelesscommunicationskeytechnologiesadvantagesandfuturechallenges AT shiyuxin endogenoussecurityinthephysicallayerofwirelesscommunicationskeytechnologiesadvantagesandfuturechallenges AT leijing endogenoussecurityinthephysicallayerofwirelesscommunicationskeytechnologiesadvantagesandfuturechallenges AT yangzhifei endogenoussecurityinthephysicallayerofwirelesscommunicationskeytechnologiesadvantagesandfuturechallenges AT yangxiaojun endogenoussecurityinthephysicallayerofwirelesscommunicationskeytechnologiesadvantagesandfuturechallenges |