Wireless Physical Layer Security
Wireless Physical Layer Security
This contribution is part of the special series of Inaugural Articles by members of the National Academy of Sciences elected in 2011.
Contributed by H. Vincent Poor, November 2, 2016 (sent for review June 1, 2016; reviewed by Matthieu R. Bloch and Gregory W. Wornell)
Security in wireless networks has traditionally been considered able progress has been made in understanding the fundamental
to be an issue to be addressed separately from the physical radio ability of the physical layer to support secure communications
transmission aspects of wireless systems. However, with the emer- and in determining the consequent limits of this ability (3, 4). In
gence of new networking architectures that are not amenable to particular, it has been shown that the two principal properties
traditional methods of secure communication such as data encryp- of radio transmission—namely, diffusion and superposition—
tion, there has been an increase in interest in the potential of the can be exploited to provide data confidentiality through several
physical properties of the radio channel itself to provide commu- mechanisms that degrade the ability of potential eavesdroppers
nications security. Information theory provides a natural frame- to gain information about confidential messages. These mecha-
work for the study of this issue, and there has been considerable nisms include the exploitation of fading, interference, and path
recent research devoted to using this framework to develop a diversity (through the use of multiple antennas), all of which
greater understanding of the fundamental ability of the so-called also lead to potential techniques for implementation in practi-
physical layer to provide security in wireless networks. Moreover, cal wireless systems. Moreover, the random nature of wireless
this approach is also suggestive in many cases of coding tech- channels provides sources of common randomness that can be
ENGINEERING
niques that can approach fundamental limits in practice and of used to extract shared secret keys from the physical layer, thereby
techniques for other security tasks such as authentication. This allowing more traditional methods of data protection to be
paper provides an overview of these developments. applied.
This paper reviews these developments, beginning with a brief
information theory | wireless networks | security historical account of the use of information theory to char-
acterize secrecy more generally and then discussing the main
results for the principal channel models of interest in modern
W ireless communication is one of the most ubiquitous of
modern technologies. Cellular communication alone is
accessible to an estimated 5 billion people, and this is but one
wireless networks. General information theoretic concepts are
defined briefly as needed; these are explained in greater depth
of an array of wireless technologies that have emerged in recent in ref. 5.
decades. Wireless networks are increasingly used for a very
wide range of applications, including banking and other finan- Shannon’s Cipher System
cial transactions, social networking, and environmental monitor- Shannon was the first person who studied, in ref. 1, the prob-
ing, among many others. For this reason, the security of wireless lem of secure communication from an information theoretic per-
networks is of critical societal interest. Security has traditionally spective. He considered a noiseless cipher system as illustrated in
been implemented at the higher, logical layers of communica- Fig. 1. A transmitter (Alice) wishes to convey a message M to a
tion networks, rather than at the level of the physical transmis- legitimate receiver (Bob) while keeping it secret from an eaves-
sion medium. For data confidentiality, encryption is the primary dropper (Eve), who intercepts the transmission. Alice and Bob
method of ensuring secrecy, a method that works well in most share a common secret key K that is unknown to Eve. To estab-
current situations. However, in some emerging networking archi- lish the secrecy of the message, Alice uses this key to encrypt
tectures, issues of key management or computational complexity the message M into a codeword X , which is then transmitted.
make the use of data encryption difficult. Examples include ad
hoc networks, in which messages may pass through many inter-
Significance
mediate terminals on the way from source to destination, and
sensor or radio-frequency identification (RFID) networks such
as might arise in the envisioned Internet of Things, in which the Security is a very important issue in the design and use of
end devices are of very low complexity. For these and other rea- wireless networks. Traditional methods of providing security
sons, there has been considerable recent interest in developing in such networks are impractical for some emerging types of
methods for secure data transmission that are based on the phys- wireless networks due to the light computational abilities of
ical properties of the radio channel (the so-called wireless physi- some wireless devices [such as radio-frequency identification
cal layer). These results are based on information theoretic char- (RFID) tags, certain sensors, etc.] or to the very large scale
acterizations of secrecy, which date to some of Claude Shannon’s or loose organizational structure of some networks. Physical
early work on the mathematical theory of communication (1). layer security has the potential to address these concerns by
Whereas Shannon’s work focused on symmetric key encryption taking advantage of the fundamental ability of the physics
systems, perhaps a more relevant development in this area was of radio propagation to provide certain types of security. This
Aaron Wyner’s work on the wiretap channel, which introduced paper provides a review of recent research in this field.
the idea that secrecy can be imparted by the communication
channel itself without resorting to the use of shared secret keys Author contributions: H.V.P. and R.F.S. designed research, performed research, and wrote
the paper.
(2). Although not focusing on wireless networks per se, this work
nevertheless lays the mathematical groundwork for the study of Reviewers: M.R.B., Georgia Institute of Technology; and G.W.W., Massachusetts Institute
of Technology.
this issue on a much broader scale and particularly in the context
The authors declare no conflict of interest.
of wireless networks.
For the reasons noted above, wireless physical layer security Freely available online through the PNAS open access option.
P{M̂ 6=M } −→ 0.
n→∞
Note that a codeword of length n makes use of the channel n
times; i.e., X n = (X1 , ..., Xn ), where Xi is sent in the ith channel
use. Similarly, Y n = (Y1 , ..., Yn ) and Z n = (Z1 , ..., Zn ) describe
corresponding channel outputs at the legitimate receiver and
eavesdropper, respectively.
At the same time, the message must be kept secret from Eve.
An issue then is how to specify secrecy in this setting, which is
Fig. 1. Shannon’s cipher system. discussed next.
ENGINEERING
such that the Markov chain relationship V − X − (Y , Z ) is sat- main channel’s Shannon capacity and the eavesdropper chan-
isfied. (The prefixed V introduces artificial noise into the sys- nel’s Shannon capacity. From this it follows immediately that
tem and serves to make the eavesdropper channel noisier. This secure communication is possible if and only if Bob has a bet-
is known as channel prefixing.) Intuitively, the mutual informa- ter channel than Eve in the sense that the signal-to-noise ratio
tion term I (V ; Y ) represents the channel quality of the legit- of the main channel must be larger than that of the eaves-
imate link and describes the rate at which Alice can reliably dropper channel; i.e., |hB |2 /σB
2
> |hE |2 /σE2 . We return to this
transmit to Bob. Accordingly, the term I (V ; Z ) represents the point later.
channel quality of the eavesdropper link and the maximum trans-
mission rate is penalized exactly by this quantity. Another impor- Multiantenna Wiretap Channels. Systems with multiple transmit
tant observation is that to have a positive secrecy capacity, the and receive antennas, so-called multiple-input multiple-output
channel to Bob has to be “less noisy” than the channel to Eve; (MIMO) systems, can improve the performance of wireless
i.e., I (V ; Y ) > I (V ; Z ) for some V . This means Alice and Bob transmission significantly and hence form the basis of most mod-
must have an advantage over Eve at the physical layer itself. ern high-capacity wireless systems. Thus, the MIMO wiretap
The crucial idea for achieving the secrecy capacity is the channel is particularly of interest. Accordingly, Alice, Bob, and
following: Instead of using all of the available resources for Eve are assumed to have multiple transmit and receive antennas,
message transmission, a certain part of them are used for ran- respectively. Note that a multiantenna eavesdropper can also
domization by adding “dummy” messages unknown to Bob and be interpreted as multiple single-antenna eavesdroppers that
Eve. Specifically, for each confidential message Alice wants to cooperate.
transmit, there are multiple valid codewords and a stochastic When Alice transmits a vector-valued signal X i , the received
encoder chooses one of them uniformly at random. The key vector-valued signals Y B,i at Bob and Y E ,i at Eve can be
idea is now to choose the randomization rate for each confiden- expressed as
tial message roughly as I (V ; Z ), i.e., according to Eve’s channel
quality. Thus, Eve will be saturated with the useless information Y B,i = H B X i + N B,i and Y E ,i = H E X i + N E ,i ,
carried by the dummy variables, leaving no remaining resources where H B and H E are matrices containing multiplicative channel
for decoding the confidential message itself (19). Because the gains, and N B,i and N E ,i are independent (of each other and
channel quality to Bob supports reliable transmission roughly for different values of i) additive Gaussian noise vectors at Bob
at rate I (V ; Y ), the remaining rate available for secure trans- and Eve with zero means and identity covariance matrices. The
mission of the confidential message is I (V ; Y ) − I (V ; Z ) as transmission is subject to an average transmit power constraint
Bob usually has to decode both the confidential message and the tr (Q) ≤ P with Q = E[X i X T i ] being the covariance matrix of the
dummy variables to recover the correct message. transmitted signal.
The secrecy capacity of the MIMO Gaussian wiretap channel
Secure Communication over Wireless Channels
was established in refs. 21 and 22 and is given by
In this section, the information theoretic approaches to security
discussed above for discrete memoryless channels are extended 1
CS = max log det I + H B QH TB
to models for physical wireless channels. Wireless physical layer tr (Q)≤P 2
security is one of the key applications of these concepts, as a sig- 1
nal broadcast over a wireless medium is not only received by its − log det I + H E QH T E . [3]
2
intended receiver but also easily eavesdropped upon by nonle-
gitimate receivers. As we have noted above, the imperfection of Similarly to the scalar case, capacity is achieved by transmit-
the wireless medium will help establish security by exploiting the ting with full power P and by choosing Gaussian-distributed
noisy channel. input symbols. Although, in principle, the secrecy capacity of
the MIMO wiretap channel is given by the above relation, it
Gaussian Wiretap Channels. The Gaussian wiretap channel is remains to find the optimal transmit covariance matrix Q that
the most basic model for a wireless channel, having linear maximizes the rate in [3]. Analytically, this is a nontrivial task as
due to the nature of the wireless channel, but also due to practi-
cal limitations such as inaccurate channel state estimation or lim- The analysis reveals the characteristic structure of secure com-
ited feedback schemes, practical systems always have to deal with munication under channel uncertainty. The maximum transmis-
limited CSI. In particular, perfect eavesdropper CSI is question- sion rate is limited by the worst channel to Bob and by the
able unless the eavesdroppers are otherwise legitimate network best channel to Eve. This result confirms the intuition that for
participants, as malevolent eavesdroppers will not provide any guaranteeing reliable and secure communication, one has to
information about their channels or may even jam or otherwise be prepared for the worst channel conditions. This result fur-
influence the legitimate channel. A survey on secure communi- ther shows how the performance degrades because of channel
cation under channel uncertainty and adversarial attacks can be uncertainty.
found in ref. 25.
Fading Wiretap Channels. In the above discussion, the channel
A realistic model for the unpredictable nature of the wire-
has been considered to be fixed during the entire duration of
less channel and the imperfections of practical implementations
transmission. In particular, for the previously discussed Gaus-
is to assume that the actual realization of the channel gains is
sian wiretap channel, the multiplicative channel gains hB and hE
unknown to Alice and Bob but is known to lie in an uncer-
in [2] are constant. For wireless channels this is rarely the case
tainty set of possible channels. This is the concept of compound
because multipath propagation and interference usually result in
channels and it accordingly requires reliability and secrecy for
changing communication conditions, particularly for mobile net-
all possible channel realizations in this uncertainty set. Such a
works. This phenomenon is known as fading. In such an envi-
guaranteed performance criterion is particularly relevant for the
ronment, the input–output relations of the channels are typically
transmission of confidential information that must be kept secret
modeled as
regardless of the actual channel conditions.
The compound wiretap channel has been studied, for example, YB,i = hB,i Xi + NB,i and YE ,i = hE ,i Xi + NE ,i ,
in refs. 16, 26, and 27. In this scenario, the legitimate channel and
eavesdropper channel are not known, but belong to uncertainty where all hB,i , hE ,i , NB,i , and NE ,i are mutually independent.
sets HB and HE . Such channels can be studied abstractly, but Here, hB,i and hE ,i are fading coefficients that characterize the
there are also useful concrete versions of possible uncertainty communication conditions at channel useP i. The input signal is
sets. For example, due to limited channel estimation capability, subject to an average power constraint n1 ni=1 E[Xi2 ] ≤ P and
the true channel to Bob might be considered to be in a certain the noise processes, which are independent from channel use to
neighborhood of its estimated version. Accordingly, a reasonable 2
channel use, are Gaussian with zero means and variances σB and
uncertainty set is given by a (spherical) set σE2 respectively, as before.
HB = H B : H B = H 0 + ∆H, k∆Hk2 ≤
[4] For ergodic fading channels, the fading coefficients are inde-
pendent and identically distributed and are allowed to change
with k · k2 the spectral norm. Then, describes the maximum from channel use to channel use. Thus, Alice, Bob, and Eve
estimation error ∆H around the estimated channel H 0 . Another might experience a different fading state for each channel use.
uncertainty model is to assume that the received channel gain for Assuming that all terminals have perfect CSI about the current
the eavesdropper is limited; i.e., fading state, so-called instantaneous CSI, the ergodic secrecy
HE = H E : kH E k2 ≤ .
[5] capacity has been studied in ref. 28 and is given as
γ|hB |2 1 γ|hE |2
Here, kH E k2 corresponds to the largest channel gain, which is 1
CS = max EA log 1 + − log 1 +
thus assumed to not exceed . Such an uncertainty set models, for EA [γ]≤P 2 2
σB 2 σE2
ENGINEERING
it suffices to have P{|hB |2 /σB 2
> |hE |2 /σE2 } > 0 to have a posi- M1 is encoded in V according to the same principle as for the
tive secrecy capacity. Thus, interestingly, fading is actually bene- wiretap channel discussed above. Accordingly, the confidential
ficial for communicating confidential information. Even if Eve’s rate is limited by a similar difference of both channel qualities
channel is better than Bob’s on average, the ergodic secrecy but conditioned on U because the common message is known at
capacity is positive, because whenever Bob experiences a better both receivers.
channel than Eve instantaneously (which will happen infinitely In a similar way to that for the wiretap channel, the broad-
often), this fading realization can be exploited for secure cast channel with confidential messages has been subsequently
communication. extended into several directions as well, including MIMO Gaus-
sian channels (32), channels with partial CSI (33), and fading
Physical Layer Security in Wireless Networks channels (28).
There has been considerable effort in extending and generaliz-
ing concepts and results for the wiretap channel to more com- Multiple-Access Channel. The multiple-access channel is the coun-
plex multiuser scenarios as well. We briefly discuss the practically terpart to the broadcast channel: Multiple senders transmit
relevant models of the broadcast channel, multiple access chan- information to a single receiver. An example of where this occurs
nel, interference channel, and relay channel. These channels give is in the uplink phase of a cellular system in which several mobile
insight into the properties of more complex networks. users transmit data to a base station.
In a multiple-access channel with confidential messages two
Broadcast Channel. The broadcast channel describes the commu- senders Alice 1 and Alice 2 transmit confidential messages M1
nication scenario in which one sender transmits information to and M2 to a single receiver Bob. Each transmitter overhears the
several receivers. For example, this channel describes the down- transmission of the other one so that Alice 1 and Alice 2 must
link phase of a cellular communication system in which a base send their confidential messages such that they are decodable
station transmits data to several mobile users. by Bob but leak no information to the other transmitter. This
The broadcast channel with confidential messages models the situation is visualized in Fig. 4. Again, we have a region of secret
communication scenario in which one transmitter Alice trans- rates for the two users’ messages. Inner and outer bounds on this
mits a common message M0 to two receivers Bob 1 and Bob 2 region have been derived in ref. 34, although the secrecy capacity
and a confidential message M1 to one receiver, say Bob 1, which region itself remains unknown.
must be kept secret from the other one. Thus, Bob 2 is a legiti- A slightly different setting is given by the multiple-access wire-
mate receiver for the common message M0 and, at the same time, tap channel in which both transmitters are trustworthy but their
an eavesdropper for the confidential message M1 . This scenario communication must be secured from an external eavesdropper.
models situations, for example, in which some (basic) content is This situation has been studied, for example, in refs. 35 and 36.
multicast while other (premium) content is unicast. It was intro- Similar to the multiple-access channel with confidential messages
duced by Csiszár and Körner (18) and is depicted in Fig. 3. Here, the secrecy capacity region is unknown and only inner and outer
instead of a single secrecy capacity, we have a region of possi- bounds have been established so far.
ble reliable rates R0 for the common message and secrecy rates
Interference Channel. The interference channel describes the
communication scenario in which multiple transmitter–receiver
pairs interfere with each other. Each sender is interested only
in transmitting information to its designated receiver. However,
due to the open nature of the wireless medium, the transmitted
signals are received not only by the intended receivers but also
by the other users.
The interference channel with confidential messages considers
two transmitters Alice 1 and Alice 2 who wish to transmit their
Fig. 3. Broadcast channel with confidential messages. confidential messages M1 and M2 to their respective receivers
ENGINEERING
assume that the channel between Alice and Bob is reciprocal; of communication systems, it nevertheless means that robustness
i.e., hAB = hBA . Even if the channel is not perfectly recipro- to the model used is a factor that needs to be considered in prac-
cal, it suffices to obtain correlated versions that are useful for tice. We have discussed this issue in the context of channel state
the following secret-key generation process. Moreover, as Eve’s information, but it is in general an important issue for further
location is assumed to be different from Alice’s and Bob’s, the research.
transmitted signals experience different transmission conditions, Although we have focused here primarily on the fundamen-
resulting in channel observations hAE and hBE at Eve that are tal issue of secrecy capacity, practical issues such as code design
independent of hAB and hBA . (50), authentication (51), and medium access control (52) have
In a first phase, Alice and Bob send training signals that allow been considered in this context as well. Moreover, these basic
each terminal to estimate its channel h̃AB and h̃BA . If the train- ideas have been applied in other settings, such as optical com-
ing symbols are sent within the channel coherence time T , Alice munication (53, 54) and situations with adversarial attacks (25),
and Bob are able to obtain correlated versions of the common and in other application areas, such as biometric identification
channel gain. This allows both terminals to use the same pro- systems (55, 56) and smart electricity grids (57).
tocol: They can agree on a secret key by using the correlated ACKNOWLEDGMENTS. This work was supported in part by the US National
versions of the common channel gain and by using the pub- Science Foundation under Grants CMMI-1435778 and ECCS-1647198 and in
lic channel for exchanging information based on Slepian–Wolf part by the German Research Foundation under Grant WY 151/2-1.
1. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28: 14. Hayashi M (2006) General nonasymptotic and asymptotic formulas in channel resolv-
656–715. ability and identification capacity and their application to the wiretap channel. IEEE
2. Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54:1355–1387. Trans Inf Theory 52:1562–1575.
3. Liang Y, Poor HV, Shamai (Shitz) S (2009) Information theoretic security. 15. Hou J, Kramer G (2014) Effective secrecy: Reliability, confusion, and stealth. Proceed-
Foundation and Trends in Communications and Information Theory 5:355– ings of the IEEE International Symposium on Information Theory (IEEE, New York), pp
580. 601–605.
4. Bloch M, Barros J (2011) Physical-Layer Security: From Information Theory to Security 16. Bjelaković I, Boche H, Sommerfeld J (2013) Secrecy results for compound wiretap
Engineering (Cambridge Univ Press, Cambridge, UK). channels. Probl Inf Transm 49:73–98.
5. Cover TM, Thomas JA (2006) Elements of Information Theory (Wiley-Interscience, 17. Bellaire M, Tessaro S, Vardy A (2012) A cryptographic treatment of the wiretap chan-
Hoboken, NJ). nel. Proceedings of Advances in Cryptology (CRYPTO), eds Safavi-Naini R, Canetti R
6. Vernam GS (1926) Cipher printing telegraph systems for secret wire and radio tele- (Springer, Berlin), pp 1–31.
graphic communications. Trans Am Inst Electr Eng XLV:295–301. 18. Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans
7. Forney GD, Jr (2003) On the role of MMSE estimation in approaching the information- Inf Theory 24:339–348.
theoretic limits of linear Gaussian channels: Shannon meets Wiener. Proceedings of 19. Massey JL (1983) A simplified treatment of Wyner’s wire-tap channel. Proceedings
the 41st Allerton Conference on Communication, Control, and Computing (IEEE, Pis- of the 21st Allerton Conference on Communication, Control and Computing (IEEE,
cataway, NJ), pp 430–439. Piscataway, NJ), pp 268–276.
8. Maurer UM (1994) The strong secret key rate of discrete random triples. Communi- 20. Leung-Yan-Cheong SK, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans
cation and Cryptography – Two Sides of One Tapestry, eds Blahut RE, Costello DJ, Inf Theory 24:451–456.
Maurer U, Mittelholzer T (Springer, Boston), pp 271–285. 21. Khisti A, Wornell GW (2010) Secure transmission with multiple antennas I: The
9. Csiszár I (1996) Almost independence and secrecy capacity. Probl Peredachi Inf 32: MISOME wiretap channel/Part II: The MIMOME wiretap channel. IEEE Trans Inf Theory
48–57. 56:5515–5532.
10. Maurer U, Wolf S (2000) Information-theoretic key agreement: From weak to strong 22. Oggier F, Hassibi B (2011) The secrecy capacity of the MIMO wiretap channel. IEEE
secrecy for free. Proceedings of EUROCRYPT 2000 on Advances in Cryptography, Trans Inf Theory 57:4961–4972.
Lecture Notes in Computer Science, ed Preneel B (Springer, Berlin), Vol 1807, pp 23. Bustin R, Liu R, Poor HV, Shamai(Shitz) S (2009) An MMSE approach to the secrecy
351–368. capacity of the MIMO Gaussian wiretap channel. EURASIP J Wirel Commun Netw
11. Bloch MR, Laneman JN (2013) Strong secrecy from channel resolvability. IEEE Trans 2009:370970.
Inf Theory 59:8077–8098. 24. Loyka S, Charalambous CD (2013) Further results on optimal signaling over secure
12. Devetak I (2005) The private classical capacity and quantum capacity of a quantum MIMO channels. Proceedings of the IEEE International Symposium on Information
channel. IEEE Trans Inf Theory 51:44–55. Theory (IEEE, Piscataway, NJ), pp 2019–2023.
13. Han TS, Endo H, Sasaki M (2014) Reliability and secrecy functions of the wiretap chan- 25. Schaefer RF, Boche H, Poor HV (2015) Secure communication under channel uncer-
nel under cost constraint. IEEE Trans Inf Theory 60:6819–6843. tainty and adversarial attacks. Proc IEEE 103:1796–1813.