+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Physical-Layer Security for 6G. Edition No. 1

  • Book

  • 384 Pages
  • January 2025
  • John Wiley and Sons Ltd
  • ID: 5980928
Meet the wireless security challenges of the future with this key volume

The 6th generation of wireless communication technology - known as 6G - promises to bring both revolutionary advances and unique challenges. Secure communications will be harder than ever to achieve under the new integrated ground, air, and space networking paradigm, with increased connectivity creating the potential for increased vulnerability. Physical-layer security, which draws upon the physical properties of the channel or network to secure information, has emerged as a promising solution to these challenges.

Physical-Layer Security for 6G provides a working introduction to these technologies and their burgeoning wireless applications. With particular attention to heterogeneous and distributed network scenarios, this book offers both the information-theory fundamentals and the most recent developments in physical-layer security. It constitutes an essential resource for meeting the unique security challenges of 6G.

Physical-Layer Security for 6G readers will also find: - Analysis of physical-layer security in the quality of security framework (QoSec)- Detailed discussion of physical-layer security applications in visible light communication (VLC), intelligence reflecting surface (IRS), and more- Practical use cases and demonstrations

Physical-Layer Security for 6G is ideal for wireless research engineers as well as advanced graduate students in wireless technology.

Table of Contents

About the Editors xiii

List of Contributors xv

Preface xix

Part I Preliminaries 1

1 Foundations of Physical-Layer Security for 6G 3
Matthieu Bloch

1.1 Coding Mechanisms 4

1.1.1 Channel Coding 5

1.1.2 Soft Covering 6

1.1.3 Source Coding with Side Information 7

1.1.4 Privacy Amplification 8

1.2 Coding for Physical-Layer Security 8

1.2.1 Secure Communication 9

1.2.2 Secret-Key Generation 11

1.3 Engineering and Learning Channels 12

References 13

2 Coding Theory Advances in Physical-Layer Secrecy 19
Laura Luzzi

2.1 Introduction 19

2.2 Wiretap Coding Schemes Based on Coset Coding 20

2.2.1 LDPC Codes for Binary Erasure Wiretap Channels 21

2.2.2 Polar Codes for Binary Input Symmetric Channels 26

2.2.3 Lattice Codes for Gaussian and Fading Wiretap Channels 29

2.3 Wiretap Coding Schemes Based on Invertible Extractors 31

2.3.1 Secrecy Capacity-Achieving Codes for the Gaussian Channel 35

2.4 Finite-Length Results 35

References 38

Part II Physical-Layer Security in Emerging Scenarios 43

3 Beamforming Design for Secure IRS-Assisted Multiuser MISO Systems 45
Dongfang Xu, Derrick Wing Kwan Ng, and Robert Schober

3.1 Introduction 45

3.2 System Model 47

3.3 Resource Allocation Optimization Problem 49

3.3.1 Performance Metrics of Secure Communication 49

3.3.2 Problem Formulation 50

3.4 Solution of the Optimization Problem 50

3.4.1 Problem Reformulation 50

3.4.2 Successive Convex Approximation 52

3.4.3 Complex Circle Optimization 53

3.4.3.1 Tangent Space 54

3.4.3.2 Riemannian Gradient 54

3.5 Experimental Results 58

3.5.1 Average SSR Versus BS Power Budget 59

3.5.2 Average SSR Versus Number of Legitimate Users 60

3.6 Conclusion 61

3.7 Future Extension 61

References 63

4 Physical-Layer Security for Optical Wireless Communications 67
Shenjie Huang, Mohammad Dehghani Soltani, and Majid Safari

4.1 Introduction 67

4.2 PLS for SISO VLC 68

4.2.1 PLS Performance Metrics 68

4.2.2 SISO VLC Secrecy Analysis 69

4.3 PLS for MISO VLC 74

4.3.1 MISO VLC Secrecy Analysis 75

4.3.2 Secrecy Improvement in MISO VLC 77

4.4 PLS for Multiuser VLC 80

4.4.1 Precoding Designs 80

4.4.2 PLS for NOMA-Based VLC 84

4.5 PLS for VLC with Emerging Technologies 86

4.6 Open Challenges and Future Works 90

References 92

5 The Impact of Secrecy on Stable Throughput and Delay 99
Parthajit Mohapatra and Nikolaos Pappas

5.1 Introduction 99

5.1.1 Related Works 100

5.2 System Model 101

5.3 Stability Region for the General Case 103

5.3.1 First Dominant System 103

5.3.2 Second Dominant System 104

5.4 Stability Region Analysis: Receivers with Different Decoding Abilities 105

5.4.1 Receivers with Limited Decoding Abilities 106

5.4.1.1 When Only the Second Queue Is Non-empty 106

5.4.1.2 When Only the First Queue Is Non-empty 106

5.4.1.3 When Both the Queues Are Non-empty 107

5.4.2 Receiver 1 with Limited Decoding Ability and Receiver 2 Uses SD 109

5.5 Impact of Secrecy on Delay Performance 109

5.5.1 Delay Analysis for User with Confidential Data 109

5.6 Results and Discussion 110

5.6.1 Stability Region with Secrecy Constraint 111

5.6.2 Impact of Imperfect Self-interference Cancelation on the Stability Region 112

5.6.3 Impact of Secrecy on Delay 112

5.7 Conclusion 114

References 114

6 Physical-Layer Secrecy for Ultrareliable Low-Latency Communication 117
Parthajit Mohapatra and Nikolaos Pappas

6.1 Introduction 117

6.2 Background 118

6.2.1 Finite Block-Length Information Theory 118

6.2.1.1 Results for the AWGN Channel 119

6.2.1.2 Results for the AWGN Wiretap Channel 119

6.2.1.3 Stability Criteria of a Queue 119

6.2.1.4 Age of Information 119

6.2.2 Related Works 120

6.3 System Model 121

6.4 Impact of Secrecy on Stable Throughput 122

6.5 Impact of Secrecy on Latency 125

6.5.1 Delay Analysis 125

6.5.2 AAoI Analysis 126

6.6 Results and Discussion 126

6.7 Conclusion 130

References 130

Part III Integration of Physical-layer Security with 6g Communication 133

7 Security Challenges and Solutions for Rate-Splitting Multiple Access 135
Abdelhamid Salem and Christos Masouros

7.1 Introduction 135

7.2 Security Issues in RSMA 137

7.3 How Much of the Split Signal Should Be Revealed? 138

7.3.1 Ergodic Rates 140

7.3.2 Power Allocation Strategy for Secure RSMA Transmission 142

7.4 Secure Beamforming Design for RSMA Transmission 146

7.4.1 Optimization Framework 147

7.4.1.1 Perfect CSIT 147

7.4.1.2 Imperfect CSIT 148

7.5 Conclusion 150

References 151

8 End-to-End Autoencoder Communications with Optimized Interference Suppression 153
Kemal Davaslioglu, Tugba Erpek, and Yalin Sagduyu

8.1 Introduction 153

8.2 Related Work 156

8.3 System Model 157

8.4 Performance Evaluation of AEC Considering the Effects of Channel, Quantization, and Embedded Implementation 159

8.4.1 Comparison of Signal Constellations 160

8.4.2 Effects of EVM 163

8.4.3 Effects of Quantization 163

8.4.4 Practical Considerations for Embedded Devices 164

8.5 Data Augmentation to Train the AE Model Using GANs 166

8.5.1 BER Performance with GAN-Based Data Augmentation 168

8.6 Methods to Suppress the Effects of Interference 169

8.7 AE Communications with Interference Suppression for MIMO Systems 177

8.8 Conclusion 179

References 179

9 AI/ML-Aided Processing for Physical-Layer Security 185
Muralikrishnan Srinivasan, Sotiris Skaperas, Mahdi Shakiba Herfeh, and Arsenia Chorti

9.1 Introduction 185

9.1.1 Facilitating the Incorporation of PLS in 6G 186

9.2 Proposed Metrics for RF Fingerprinting and SKG 187

9.2.1 Total Variation Distance for Radio Frequency Fingerprinting 187

9.2.2 Cross Correlation for SKG 188

9.2.3 Statistical Independence Metric 189

9.2.4 Reciprocity and Mismatch Probability 190

9.3 Power Domain Preprocessing 190

9.3.1 Preprocessing Using PCA 192

9.3.2 Preprocessing Using AEs 195

9.4 Conclusions 198

References 198

10 Joint Secure Communication and Sensing in 6G Networks 203
Miroslav Mitev, Amitha Mayya, and Arsenia Chorti

10.1 Introduction 203

10.2 Related Work and Motivation 205

10.3 System Model 206

10.4 Secret Key Generation Protocol 207

10.4.1 Advantage Distillation 207

10.4.2 Information Reconciliation 208

10.4.3 Privacy Amplification 209

10.5 Measurement Setup 209

10.5.1 Scenarios 210

10.5.2 Implementation of the SKG Protocol 211

10.6 Results and Discussion 212

Acknowledgments 218

References 218

Part IV Applications 221

11 Physical-Layer Authentication for 6G Systems 223
Stefano Tomasin, He Fang, and Xianbin Wang

11.1 Authentication by Physical Parameters 223

11.1.1 PLA and 6G Systems 225

11.2 Challenge-Response PLA for 6G 226

11.3 Intelligent PLA Based on Machine Learning 229

11.3.1 Machine-Learning-Based PLA Approach 231

11.3.2 Performance Analysis 232

References 235

12 Securing the Future e-Health: Context-Aware Physical-Layer Security 239
Mehdi Letafati, Eduard Jorswieck, and Babak Khalaj

12.1 Introduction 239

12.1.1 PHYSEC in 6G 239

12.1.2 Introduction to PHYSEC Solutions 241

12.1.2.1 General Model and Problem Formulations 241

12.1.2.2 Key-less Versus Key-Based Techniques 243

12.1.2.3 Active and Passive Attacks 244

12.2 PHYSEC Key Generation 245

12.2.1 Learning-Aided PHYSEC for e-Health 246

12.2.1.1 Neural Network Implementation 248

12.2.1.2 Information-Theoretic Secrecy Analysis 250

12.2.2 Covert or Stealthy SKG 251

12.2.3 SKG in Multiuser Massive MIMO 252

12.2.4 Robust MiM Attack-Resistant SKG for Multi-carrier MIMO Systems 255

12.3 Key-less PHYSEC for Medical Image Transmission 258

12.3.1 Content- and Delay-Aware Design 259

12.3.1.1 Security Level Adjustment 261

12.3.1.2 Evaluations 262

12.4 Proof-of-Concept Study 263

12.5 Conclusions and Future Directions 266

References 267

13 The Role of Non-terrestrial Networks: Features and Physical-Layer Security Concerns 275
Marco Giordani, Francesco Ardizzon, Laura Crosara, Nicola Laurenti, and Michele Zorzi

13.1 Non-terrestrial Networks for 6G 275

13.1.1 Use Cases 277

13.1.1.1 Continuous and Ubiquitous Network Coverage 277

13.1.1.2 Support for the Internet of Things 277

13.1.1.3 Integration Between Communication and Computation 278

13.1.1.4 Energy-Efficient Service 278

13.1.2 Enabling Technologies 278

13.1.2.1 Novel Network Solutions 278

13.1.2.2 Novel Antenna Solutions 279

13.1.2.3 Novel Spectrum Solutions 279

13.1.3 Open Research Questions 279

13.1.3.1 Physical-Layer Procedures 279

13.1.3.2 Synchronization 280

13.1.3.3 Channel Estimation and Random Access 280

13.1.3.4 Mobility Management 280

13.1.3.5 Resource Saturation 281

13.1.3.6 Higher-Layer Protocol (Re)design 281

13.1.3.7 The Role of the Uplink 282

13.1.3.8 Security and Privacy 282

13.2 Physical-Layer Security in Non-terrestrial Networks 282

13.2.1 Physical-Layer Secrecy in NTNs 283

13.2.1.1 Two-Way Protocols 284

13.2.1.2 Geographical Constraints 284

13.2.1.3 Use of Relays and Friendly Jamming Helpers 285

13.2.2 Physical-Layer Authentication for NTNs 285

13.2.2.1 Device-Based PLA 287

13.2.2.2 Channel-Based PLA 288

13.2.2.3 Challenges and Future Works for PLA 289

13.2.3 Position Integrity for NTNs 290

13.2.3.1 System Model 291

13.2.3.2 Attack Model 293

13.2.3.3 Authentication Procedure 294

13.2.3.4 Performance Metrics 295

13.3 Conclusions 298

References 299

14 Quantum Hardware-Aware Security for 6G Networks 305
Matthias Frey, Igor Bjelaković, Janis Nötzel, Juliane Krämer, and Sławomir Stańczak

14.1 Introduction 305

14.2 Preliminaries 308

14.2.1 Quantum States and Observables 308

14.2.2 Quantum Channels 309

14.2.3 Bosonic Systems 311

14.2.4 Information Measures 312

14.3 Secret Communication 312

14.3.1 Semantic Security and Its Operational Significance 313

14.3.2 Other Security Measures Used in the Analysis of Secret Communication 315

14.3.3 Survey of Results 316

14.3.3.1 Finite-Dimensional Case 317

14.3.3.2 Infinite-Dimensional Case 318

14.4 Covert Communication 320

14.4.1 System Model 321

14.4.2 Survey of Results 323

14.5 Conclusion 325

Acknowledgments 326

References 326

15 Leveraging the Physical Layer to Achieve Practically Feasible Confidentiality and Authentication 331
Marco Baldi and Linda Senigagliesi

15.1 Introduction 331

15.2 System Model 332

15.3 Confidentiality at the Physical Layer in Practical Settings 335

15.3.1 Joining Physical-Layer Security with Cryptography 336

15.3.2 Dealing with Variable Channel Quality Through On-Off Transmissions 338

15.4 Authentication at the Physical Layer in Practical Settings 342

15.4.1 PLA Metrics 344

15.5 Numerical Experiments 345

15.5.1 Physical-Layer Confidentiality Examples 345

15.5.2 Physical-Layer Authentication Examples 347

15.6 Conclusion 351

References 351

Index 355

Authors

Parthajit Mohapatra Indian Institute of Technology, India. Nikolaos Pappas Linköping University, Sweden. Arsenia Chorti CY Cergy Paris Universite, France; Princeton University, USA; University of Essex, UK. Stefano Tomasin University of Padova, Italy.