sensors-22-03589
sensors-22-03589
Review
A Review of Fundamental Optimization Approaches and the
Role of AI Enabling Technologies in Physical Layer Security
Mulugeta Kassaw Tefera , Zengwang Jin and Shengbing Zhang *
School of Cyberspace Security, Northwestern Polytechnical University, 127 West Youyi Road, Xi’an 710072, China;
[email protected] (M.K.T.); [email protected] (Z.J.)
* Correspondence: [email protected]
Abstract: With the proliferation of 5G mobile networks within next-generation wireless communi-
cation, the design and optimization of 5G networks are progressing in the direction of improving
the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional
methods for the network optimization of PLS fail to adapt new features, technologies, and resource
management to diversified demand applications. To improve these methods, future 5G and beyond
5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS
design and optimization that are based on artificial intelligence (AI) and machine learning (ML)
have been corroborated to outperform traditional security technologies. This will allow future 5G
networks to be more intelligent and robust in order to significantly improve the performance of
system design over traditional security methods. With the objective of advancing future PLS research,
this review paper presents an elaborate discussion on the design and optimization approaches of
wireless PLS techniques. In particular, we focus on both signal processing and information-theoretic
security approaches to investigate the optimization techniques and system designs of PLS strate-
gies. The review begins with the fundamental concepts that are associated with PLS, including a
discussion on conventional cryptographic techniques and wiretap channel models. We then move
Citation: Tefera, M.K.; Jin, Z.; Zhang,
S. A Review of Fundamental
on to discuss the performance metrics and basic optimization schemes that are typically adopted in
Optimization Approaches and the PLS design strategies. The research directions for secure system designs and optimization problems
Role of AI Enabling Technologies in are then reviewed in terms of signal processing, resource allocation and node/antenna selection.
Physical Layer Security. Sensors 2022, Thereafter, the applications of AI and ML technologies in the optimization and design of PLS systems
22, 3589. https://doi.org/10.3390/ are discussed. In this context, the ML- and AI-based solutions that pertain to end-to-end physical
s22093589 layer joint optimization, secure resource allocation and signal processing methods are presented. We
Academic Editor: Subhas
finally conclude with discussions on future trends and technical challenges that are related to the
Mukhopadhyay topics of PLS system design and the benefits of AI technologies.
Received: 10 April 2022 Keywords: physical layer security; optimization approaches; information theory; signal processing
Accepted: 5 May 2022
techniques; resource allocation; AI techniques
Published: 9 May 2022
the massive number of new devices that are connected to the internet and the Internet
of Things (IoT) is expected to cause a serious risk to network security if not manipulated
properly [5]. Therefore, when considering all of these capabilities, it can be seen that there
is a need for robust security mechanisms across all segments of 5G and B5G networks.
Conventionally, high-layer cryptography-based techniques have been widely adopted
to deal with any discrepancies that are associated with information confidentiality, which in-
clude data authentication, secret key establishment and secret dissemination [6]. However,
with the advancement in the computing capacities of eavesdropping devices, the above-
mentioned techniques may not be sufficient or may even become unsuitable when an extra
secure channel is required for secret key generation [7]. Recently, physical layer security
(PLS) has emerged as a promising means of addressing the eavesdropping computational
capability of secure transmission problems [8–12]. Compared to complex cryptography
techniques, PLS does not depend on the computational capacity of the eavesdropping
devices and, therefore, it has the benefit of reducing computational costs and resource con-
sumption. From the perspective of information-theoretic fundamentals, it has been found
that PLS can achieve secure and reliable communication even when network intruders have
very strong computing capabilities [13]. This approach to information security is especially
effective since it does not rely on underlying computational capabilities, but rather on
the characteristics of the transmission media, such as noise, fading and interference, and
it provides security guarantees that are independent from the computing power of the
eavesdropper. In general, the PLS approach presents distinct advantages and is well suited
for distributed processing systems and dynamic network configurations. Therefore, the
PLS approach can be used as an alternative supplement for computationally demanding
high-layer technologies to further ensure data security.
Although the PLS can be precisely evaluated using popular performance metrics,
such as secrecy capacity, secrecy rate, secrecy throughput, etc., which are discussed in
detail in the literature, security performance is quantified by maximizing the performance
difference between legitimate channels and wiretap channels [14–17]. This is intuitive since
PLS aims to enhance the received signal quality at the intended receiver or reduce the
performance of the wiretap channel relative to the legitimate channel. In this circumstance,
there is a need to allocate transmission power based on the states of the legitimate and
eavesdropper channels in order to improve the PLS, as transmission power affects the
signal quality at the intended receiver and eavesdropper. However, the allocation of
power in PLS is a challenging task. It relies heavily on the prior information that the
transmitter has on the channel state information (CSI) of the intended receiver and the
eavesdropper. Most of the optimization functions in PLS are non-convex because of the
characteristics of the logarithmic subtraction in security performance metrics. For instance,
when the transmission power increases, the capacity and reliability of the main channel
improve [13]. On the other hand, the capacity of the eavesdropper channel may also
improve and the probability of eavesdropping increases. Therefore, there is no universal
approach to achieving a global optimization for non-convex power allocation. Several
research works have been conducted to formulate and solve these optimization problems
in order to obtain stronger security [18]. In [19], instead of maximizing the secrecy capacity
of the main channel, suboptimal power allocation was presented to minimize the SINR at
an unintended receiver. However, the minimization of the SINR at an unintended receiver
is not assessed by direct performance metrics and the security measure cannot ensure
a non-negative rate of transmission. Moreover, a joint subcarrier and power allocation
mechanism were proposed in [20] for maximizing the secrecy capacity of OFDMA-based
wireless networks. Nevertheless, the performance of secrecy gain can be enhanced by
limited power allocation. Consequently, it is hard to achieve global quality of service (QoS)
constraints for secure transmission systems.
The mainstream studies on PLS as a method for characterizing an achievable se-
curity performance against eavesdropping have been extensively investigated from the
fundamental viewpoints of information theory for different communication scenarios and
Sensors 2022, 22, 3589 3 of 36
channel types and under different assumptions on the knowledge of CSI. These studies
have inspired the development of many signal processing design techniques [21–24]. In this
context, a large number of research works have been conducted, which have contributed
insightful thoughts and opportunities to the understanding of practical security designs,
optimization techniques, technology status, etc. For example, in [25–27], key technolo-
gies, technical challenges, and countermeasures were reviewed from the fundamental
viewpoints of design strategies that involve physical-layer authentication, secret key gen-
eration, wiretap coding, and multi-antenna techniques, and relay cooperation. Moreover,
the authors in [28,29] presented an extensive investigation of multi-antenna techniques
in multi-user wireless networks using different assumptions on the availability of CSI.
Providing security for multi-antenna techniques is an effective and powerful approach in
PLS that can offer higher spatial degrees of freedom. The survey paper in [30] also provided
a comprehensive overview of secure transmission designs from the viewpoints of informa-
tion theory and optimization problems using security performance metrics. Furthermore, a
comprehensive overview of fundamental classification and applications of existing PLS
techniques was presented by [31]. On the other hand, the challenges that face PLS were
reviewed in [32]. It can be seen that the hurdles facing PLS are issued from different
assumptions regarding the characteristics of wireless channels and eavesdropper models.
Naturally, the concept of optimization techniques in PLS plays a pivotal role in practi-
cal security design and thus, has received considerable attention from the research com-
munity. In this review paper, due to the importance of secure transmission design in most
practical scenarios, we were motivated to conduct a systematic overview of this research
direction. It has to be noted that these studies have been extensively investigated and
have been published in many PLS research works. Nevertheless, we outline a summary
of some of the interesting studies in Table 1. In contrast to the aforementioned works, our
review paper provides a brief overview of recent results and technical challenges for the
system design and optimization techniques for 5G wireless networks. The main focus of
this review paper is the existing techniques and design strategies for PLS optimization,
optimization problems, and the solutions that are related to wireless PLS. Moreover, it
inclusively discusses the applications of several enabling and computing technologies that
could improve the corresponding research challenges. In order to address the limitations of
existing optimization challenges, ML and AI technologies need to be efficiently integrated
into 5G networks in order to produce better security and resource management. The use of
ML and AI technologies within the field of mobile communication infrastructure has made
significant progress in ensuring security, reliability, and resource allocations in a dynamic,
robust and trustworthy way [33–36].
The contributions of this review paper are as follows. First, we introduced funda-
mental principles and different channel models. In this context, we briefly reviewed the
common scenarios and limitations of different security methods to understand the basic
theories that are related to PLS. Second, the information-theoretic security metrics and
application scenarios in PLS were investigated to provide a brief insight into secure design
strategies. Third, the potential research directions and technical challenges in PLS from
the perspectives of security design and optimization approaches were widely discussed.
Finally, we reviewed the potential advantages of using ML and AI enabling technologies
to further improve conventional security technologies. In summary, this review paper
identifies optimization challenges in terms of secure resource allocation and signal pro-
cessing techniques and presents potential solutions through the introduction of AI- and
ML-based technologies.
The structure of this review paper is outlined as follows. The abbreviations that
are used throughout the paper are described in Table 2. Then, Section 2 introduces the
fundamental concepts of PLS; specifically, the general system model, adversary model
and different types of wiretap channel models. The performance metrics that are used in
PLS to evaluate the security design strategies are discussed in Section 3. In Section 4, the
research directions and technical challenges are investigated; specifically, the main issues
Sensors 2022, 22, 3589 4 of 36
and technical challenges of system design and optimization techniques, which are discussed
from the viewpoints of secure resource management and signal processing techniques.
Section 5 explains the paradigms of ML and AI within 5G networks and their applications
in physical layer design and optimization. In Section 6, we present notable future directions
and open challenges, followed by a conclusion in Section 7.
Table 2. Cont.
Note: In this paper, matrices are denoted by bold uppercase letters and vectors are denoted
by bold lowercase letters. The Euclidean norm, transpose, conjugate transpose, conjugate
transpose operation and mutual information are denoted by k. k, [.]T , [.] H , [.]† and I (.; .),
respectively. Without the loss of generality, x represents the set of optimization variables.
2. Fundamental Concepts
In this section, we provide insights into the general concepts and main preliminaries
that are associated with PHY security. First, we provide a brief overview of the basic system
model for PLS that is related to eavesdropping problems, as illustrated in Figure 1. Then,
we consider and discuss the hurdles of PLS from the perspective of the adversary model
that could prevent it from succeeding. The last part of this section presents several wiretap
channel models that adopt the common notations and scenarios that are considered in the
rest of the discussion.
Figure 1. 1.
Figure Generic
Genericsystem
systemmodel
model of
of an Alice–Bob–Evechannel.
an Alice–Bob–Eve channel.
AsAs illustratedin
illustrated inFigure
Figure 1,1, the
thetransmitted
transmittedmessage
message signal M is
signal Mencoded X with
into into
is encoded 𝑋 awith
length n and transmitted via a wireless medium. The signals that are
a length 𝑛 and transmitted via a wireless medium. The signals that are received by Eve received by Eve and
andBob areare
Bob designated by Rby
designated 𝑅 Rand
E and B , respectively. The entropy
𝑅 , respectively. function of
The entropy the transmitting
function of the trans-
signal is denoted by H ( M ), while the residual uncertainty of Eve’s observations is given
mitting signal is denoted by 𝐻(𝑀), while the residual uncertainty of Eve’s observations
by H ( M/R E ). Taking the environment and scenarios into consideration, the availability of
is given by 𝐻(𝑀⁄𝑅 ). Taking the environment and scenarios into consideration, the avail-
CSI at Alice, Bob and Eve varies from full or partial channel knowledge to zero information.
ability
The aofpriori
CSI at Alice, Bob
knowledge and
that Eve varies
is available fromregarding
to Alice full or partial channel
the channel knowledge
information to zero
of the
information. The a priori knowledge that is available to Alice regarding
legitimate and eavesdropper channels is crucial for the determination of the corresponding the channel infor-
mation of optimization
secrecy the legitimatescheme
and eavesdropper
and PLS design. channels is crucialinfor
Nevertheless, the determination
practical of the
scenarios, it is
corresponding
logical to assume secrecy optimization
that the Alice is aware scheme
of the and PLS information
statistical design. Nevertheless, in practical
of the eavesdropper
but not of
scenarios, itslogical
it is instantaneous
to assume realizations. Such is
that the Alice information
aware of the includes the type
statistical of channel
information of the
distribution, the average gain of the received signal, the spatial direction
eavesdropper but not of its instantaneous realizations. Such information includes the type and the line-of-
of sight (LOS)
channel component.the average gain of the received signal, the spatial direction and
distribution,
the2.2.
line-of-sight (LOS) component.
Wireless Adversary Models
Due to the inherent characteristics of wireless communication, such as broadcast
2.2. Wireless Adversary Models
nature, openness and the superposition of the transmission medium, wireless networks are
Due to the
extremely inherent
vulnerable tocharacteristics
security attacks.ofWithin
wireless
thecommunication,
field of security, ansuch as broadcast
adversary refers na-
ture,
to aopenness and the who
wireless attacker superposition of theortransmission
aims to disrupt medium,
prevent transmitted wireless
signals fromnetworks
reaching are
the intended
extremely receiver.toTherefore,
vulnerable it is important
security attacks. Withintothe
consider
field ofadversaries when
security, an designing
adversary refers
to aa secure strategy
wireless in order
attacker who to measure
aims the effectiveness
to disrupt or prevent of the proposed
transmitted security
signals from system.
reaching
theSecurity
intendedattacks on wireless
receiver. networks
Therefore, it is can be mainly
important to classified
considerinto two types:when
adversaries activedesigning
attacks a
and passive attacks [38]. The concept of passive or active attacks is typically
secure strategy in order to measure the effectiveness of the proposed security system. to do with Se-
whether the adversary is actively injecting into the communication system or is merely
curity attacks on wireless networks can be mainly classified into two types: active attacks
listening to the ongoing transmissions [39]. Due to the various types of adversaries and the
and passive attacks [38]. The concept of passive or active attacks is typically to do with
vast nature of attacks, there is a need to identify the assumptions, goals and capabilities
whether
on whichthethese
adversary
differentistypes
actively
of PLSinjecting into the
are designed andcommunication systemthat
the potential challenges or is merely
could
prevent PLS from succeeding.
A relevant set of goals is important for the modeling of a rigorous and strong adversary
model. Naturally, a stronger adversary, i.e., with prior knowledge or more resources, could
be able to attack the wireless network more successfully. With the adversary model, the
assumptions of the adversary include its environment and resources, such as competency,
knowledge, equipment, devices, etc. The adversary aims to compromise and obtain secret
data content from within the communication system. These sets of data can be the legitimate
transmission data or the property of the authorized user, e.g., energy consumption [40,41].
Due to their exposure to various types of attacks, communication channels are required
to have determined capacities that enable them to resist and alleviate wireless attacks.
Sensors 2022, 22, 3589 7 of 36
These capabilities provide the adversary with reliable interactions that are based on the
context of secure transmission systems. In fact, many of the PLS approaches assume that
Alice has no knowledge of the eavesdropper’s CSI as the adversary is passive (i.e., not
actively modifying the data, just silently reading and observing the communication system).
On the other hand, some studies have found that Alice is sometimes assumed to know
about the CSI of the eavesdropper [42–44]. Furthermore, active attacks have sometimes
been observed, such as the denial of service, replay and node malfunction attacks that
are employed against PHY security approaches. As a security community, we need to
adopt a strong adversary model in which the adversary is cleverer and more active. Under
the implications of an adversary being an active attack, intruders use more intrusive and
aggressive methods that aim to deteriorate the received signal quality for the intended user.
The essential characteristics of a secure transmission system include authentication,
availability, integrity, access control, and secret dissemination [38]. These can be established
through appropriately designed signal processing strategies and channel coding techniques.
The adversary model that is used in most PLS approaches is different from that used
by the traditional cryptography and security community. Therefore, for the purpose of
addressing the challenges that face PLS, it is important to bridge the gaps between the
various adversary models that are used by the different communities. In the current review
paper, the PLS mainly focuses on the premise that the eavesdropper is passive, i.e., it does
not communicate with the other nodes in order to conceal its presence.
Bob and Eve, respectively. Since the channels are discrete memoryless channels at the
transmitter, each element of H and G obey the complex Gaussian distribution with channel
gain coefficients of hij and gij between the ith source antenna and the jth intended receiver
and eavesdropper antennae. The noise vector of the received signal antennae is assumed
Sensors 2022, 22, x FOR PEER REVIEW 8 of 37
to be a complex Gaussian noise vector, with each element of nB and nE designed as an
independent and identically distributed (IID) complex noise vector with the variance of σH 2
Figure2.
Figure 2. A
A system
system model
model for
for aa MIMO
MIMOwiretap
wiretapchannel.
channel.
2.3.2. In
Broadcast Wiretap
this setup, Channels
the Alice, Bob and Eve are equipped with multi-antenna systems, which
are denoted by 𝑵 , 𝑵model,
In this channel 𝑎𝑛𝑑 𝑵Alice simultaneously
, respectively. transmitsthe
Furthermore, secret data
CSI of thecontent to mul-
main transmis-
tiple receivers
sion and in the presence
eavesdropper channels of are
onedenoted
or morebyunintended users, as shown
H and G, respectively. in Figure
The general rep-3.
The commonof
resentations scenario for broadcast
the signals channelsbyisBob
that are received a multi-user
and Eve, cellular network,
respectively, in which
are described
the legitimate
by the following transmitter
equations:communicates with multiple intended receivers while being
protected from eavesdroppers in the downlink. It is assumed that one source Alice is
equipped with N A antennae and the intended 𝑦 = 𝑯𝑥I users + 𝒏𝑩and J eavesdroppers have NBi and (1)
NEj antennae, respectively.
In such scenarios, the signals that𝑦 are = received
𝑮𝑥 + 𝒏𝑬 by other users may interfere with (2)
the desired signal due to the conditions under which each receiver obtains the mixed
signals 𝑥 is all
where from 𝑛 × 1Furthermore,
theusers. transmitted the signal with a covariance
susceptibility matrix of 𝑄
of eavesdroppers may = also 𝑥 ] for
𝐸[𝑥 increase
× ×
𝑄 0. 𝑯 ∈ ∁ and 𝑮 ∈ ∁ are the MIMO channel
due to the opportunity for more information leakages in the downlink. Indeed, secrecy matrices from Alice to Bob
and Eve, respectively. Since the channels are discrete memoryless
performance is not only affected by the eavesdropper and the mixed signals but also by channels at the trans-
the
mitter, each element of 𝑯 and 𝑮 obey the complex Gaussian distribution
signals that are received by the other users [48]. Hence, a broadcast channel can be defined with channel
gain
as coefficients
a mixed of ℎ andwhich
multi-channel, 𝑔 between the ithby
is described source
[49,50]antenna
as follows:and the jth intended receiver
and eavesdropper antennae. The noise vector of the received signal antennae is assumed
to be a complex Gaussian ynoise Bi = vector,
Hi x s + nwith
Bi , f each 1, 2, . . . ,ofI, 𝒏𝑩 and 𝒏𝑬 designed as(3)
or i =element an
independent and identically distributed (IID) complex noise vector with the variance of
𝜎 and 𝜎 , where ℎ ~∁𝑁(0, y Ej𝜎= )Gand f or j =𝜎 1,).2, . . . , J,
j xs +𝑔nEj~∁𝑁(0, (4)
× ×
whereItxassumed that 𝒏𝑩 ∈ ∁ and 𝒏𝑬for ∈ ∁the confidential
are zero-mean AWGNwith vectors at the le-
s is the n A× 1 transmitted
as at signal information a covariance
gitimate receiver, as well
H an eavesdropper,
matrix of Q X = E xs xs for Q X > 0. y Bi and y Ej are the signals with 𝒏 ~∁𝑁(0, 𝑰) ∼
𝑩 that are received by I)
CN(0, theandith
𝒏𝑬 ~∁𝑁(0, 𝑰), respectively. The maximum power of the transmitted signal from Alice is
intended user and jth eavesdropper, respectively. nBi and nEj are the complex noise vectors
assumed to be P, where 𝐸{‖𝑥 ‖ } ≤N 𝑃×for a total power P. Initiatively, Equations (1) and
at Bob and Eve, respectively. Hi ∈ { Bi NA and Gj ∈ { NEj × NA are the matrices for channels
(2) are used as a basic optimization tool in PLS. Hence, the typical MIMO wiretap channel
model has been widely considered in PLS to ensure secure data transmission.
H and G from Alice to the intended receiver i and unintended user j, respectively. Compared
from
to theeavesdroppers in the
traditional MIMO downlink.
channel It isthe
system, assumed
design that one source
techniques Alice is
for secure equipped with
transmission over
𝑵broadcast
antennae and the
channels areintended I users
somewhat and J eavesdroppers
complicated. the 𝑵
have
This is because 𝑎𝑛𝑑 𝑵 leakages
information antennae,
to
eavesdroppers and the inter-user interference need to be mitigated simultaneously.
respectively.
Figure
Figure3.3.AAsystem
systemmodel
modelfor
foraabroadcast
broadcastwiretap
wiretapchannel.
channel.
2.3.3.InMultiple-Access
such scenarios, theWiretap Channels
signals that are received by other users may interfere with the
desired signal due to channels
Multiple-access the conditions under important
are another which each receiver
form obtains the
of multi-user mixedinsignals
network which
moreall
from than oneFurthermore,
users. legitimate source sends information
the susceptibility to a common
of eavesdroppers maydestination userdue
also increase in the
to
Sensors 2022, 22, x FOR PEER REVIEW 10 of 37
presence
the of eavesdroppers
opportunity that try toleakages
for more information intercept
in and obtain the Indeed,
the downlink. transmitted signals,
secrecy perfor-as
illustrated
mance in only
is not Figure 4.
affected by the eavesdropper and the mixed signals but also by the
signals that are received by the other users [48]. Hence, a broadcast channel can be defined
as a mixed multi-channel, which is described by [49] and [50] as follows:
k
y𝑦B ==∑ Hk𝑯
xs k 𝑥+ nB+ 𝒏 (5)
(5)
𝑩
k =1
𝑦 = 𝑮 𝑥 + 𝒏𝑬 (6)
k
yE = ∑ Gk xs k + nE (6)
k =1
k
y Bk = Hk xs k + ∑ Hki xs ki + nBk (7)
i 6=k
k
yE = ∑ Gi xsi + nE (8)
i =1
where xsi is the N Ai × 1 encoded signal of Alice with an average power constraint or a
covariance matrix constraint. Hki ∈ { NB k × NA i and Gi ∈ { NE × NA i are the channel matrices
from Alice to the intended receiver and unintended user, respectively. nE and nBk are the
AWGN vectors at the eavesdropper and intended user, respectively. Furthermore, a typical
configuration for interference channels with an external eavesdropper and an interference
alignment was studied in [55]. It was shown that when an interference channel uses an
interference alignment with separate confidential messages to reduce interference, the
secrecy of the system can be improved. On the other hand, when an interference channel
uses an interference alignment with an external eavesdropper, it lacks knowledge about
the CSI of the eavesdropper and the secrecy of the system can be compromised. Therefore,
the authors concluded that an interference alignment with separately secure information
can provide more secure degrees of freedom than that with an unintended user.
𝑦 = 𝑯 𝑥 + 𝒏𝑹 (10)
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑬 (11)
where 𝑯 ∈ ∁ × , 𝑯 ∈ ∁ × and 𝑯 ∈ ∁ × are the matrices from Alice to the
Bob, the relay node and Eve, respectively. Obviously, 𝒏𝑩 , 𝒏𝑹 and 𝒏𝑬 denote the AWGN
vectors at Bob, the relay node and Eve, respectively. The relay node decodes the original
Figure 6. A system model for a wiretap relay channel in the first time slot.
Figure 6. A
message system
signal model
and for a wiretap
forwards relay channel in the first time slot.
it on to Bob.
It is assumed that Alice, Bob, the relay node and Eve are equipped each with
𝑵 , 𝑵 , 𝑵 𝑎𝑛𝑑 𝑵 antennae, respectively. In the first case, Alice sends the 𝑵 × 1 infor-
mation signal vector 𝑥 to the relay node. Then, the received signals at Bob, the relay node
and Eve, respectively, are given as [62]:
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑩 (9)
𝑦 = 𝑯 𝑥 + 𝒏𝑹 (10)
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑬 (11)
where 𝑯 ∈ ∁ × , 𝑯 ∈ ∁ × and 𝑯 ∈ ∁ × are the matrices from Alice to the
Bob, the relay node and Eve, respectively. Obviously, 𝒏𝑩 , 𝒏𝑹 and 𝒏𝑬 denote the AWGN
vectors at Bob, the relay node and Eve, respectively. The relay node decodes the original
message signal and forwards it on to Bob.
Figure 7.
Figure 7. A
A system
systemmodel
modelfor
fora awiretap
wiretaprelay channel
relay in the
channel second
in the timetime
second slot. slot.
Figure 7. A system model for a wiretap relay channel in the second time slot.
Sensors 2022, 22, 3589 12 of 36
where HRB ∈ { NB × NR and HRE ∈ { NE × NR are the matrices from the relay node to Bob
and Eve, respectively. Without loss of generality, we investigated the decode-and-forward
(DF) cooperative channel model. Another type of cooperative relaying protocol is the AF
channel scheme, which has a great impact on the capacity of physical layer secrecy. An
extensive investigation of such an AF scheme for secure relay communication is presented
in [63,64].
Rs = [ R B − R E ]+ (14)
Sensors 2022, 22, 3589 13 of 36
where the conjugate transpose [ x ]+ , max {0, x }. R B and R E are the data transmission
rates of the Bob and eavesdropper channels from the source Alice to the legitimate user
and intruder, respectively. Basically, the rate of transmission Rs can be improved using
signal processing techniques and optimization approaches, which have been proven to
be the lower bounds of security channel capacity [69]. In the actual design of secure
transmission systems, a non-zero rate of transmission can be achieved using some multi-
antenna techniques, such as secure precoding, beamforming, adaptive resource allocation,
etc. Such techniques attempt to intentionally degrade the wiretap channel while enhancing
the channel quality for the intended receiver.
On the other hand, the performance metrics that are sometimes referred to as the upper
bounds of secrecy rate were defined by [70,71], which play a central role in PLS in terms of
secrecy capacity. More accurately, they describe the maximum transmission rate at which
confidential messages can be securely delivered to the intended user while preventing the
eavesdropper from decoding any important information within the communication. The
secrecy capacity of a wireless transmission is an essential theoretical tool for assessing the
performance of practical PLS system designs. By examining a channel’s secrecy capacity
and related features, information-theoretic security can provide common ground and
guidance for the design of secure wireless transmission systems. To maximize performance
capacity, the qualities of both legitimate and wiretap channels play a significant role in
AWGN channels [72]. This can be realized by optimizing the optimal input probability
distribution P(X) of mutual information [73], which can be expressed as:
Cs = max( I ( X; Y ) − I ( X; Z )) (15)
p( X )
Cs = CB − CE (16)
where CB and CE are the secrecy capacities of the legitimate and wiretap channels, respectively.
In this case, it is possible to obtain a non-zero security capacity when the eavesdropper channel
is downgraded relative to the Bob channel. Specifically, the intended receiver and eavesdropper
channels are supposed to have variances of σB 2 and σE 2 , respectively.
It should also be noted that the secrecy capacity and secrecy rate that are discussed
above do not consider wireless fading channels. More precisely, it is assumed that Bob’s
channel is more substantial than the eavesdropper channel. However, in fading channel
environments, the channel gains for both legitimate and eavesdropper channels change
randomly over time while remaining constant in each time slot [70]. When considering the
features of fading channels, the average secrecy capacity must be assessed to improve the
resulting security. Consequently, the secrecy rate or secrecy capacity is a suitable metric
for these fading channel scenarios [66]. In order to assess the security within the actual
transceiver design, an achievable ergodic secrecy rate was proposed in [69] as a security
metric under the assumption of fading channels. When the transmitting power constraint
is P, the attainable secrecy rate can be defined as the maximum gap between the secrecy
rates of the main transmission and eavesdropper channels. When considering average
power, the secrecy rate of a secure transmission system is described as:
H P H P
RS = log2 1 + AB2 − log 1 + AE2 (17)
σB σE
Sensors 2022, 22, 3589 14 of 36
where σB 2 and σE 2 are the variance of noise vectors in the Bob and eavesdropping channels,
respectively. Therefore, the attainable rate of transmission is assumed to evaluate the secu-
rity performance of the designs for efficient transmission strategies under the consideration
of fading channels. However, the secrecy rate is different for different optimization and
signal design techniques. In order to evaluate better secrecy rate performances in multi-
antenna techniques, a novel approach to the optimization technique was discussed in [74].
Generally, the secrecy rate can be maximized through the allocation of power according to
the knowledge of the CSI of the transmitter. Therefore, when the combinations of CSI are
different at the source Alice, the attainable secrecy rate may be different.
In summary, the secrecy rate or secrecy capacity of an Alice–Bob–Eve channel is mainly
calculated using the difference between the capacities of the legitimate and eavesdropper
channels and the availability of the CSI of the transmitter. Although the secrecy rate and
secrecy capacity are well established and commonly used in information-theoretic security,
these metrics only reflect the achievable bounds of the random channel characteristics and
do not indicate the real security performance in practical design scenarios with various
service applications. In order to measure and improve the resulting secrecy in fading
channel environments, these metrics are extended to outage secrecy rate probability and
outage secrecy capacity [75].
More specifically, the outage secrecy incidents Cs < R0s in (18) indicate that the
rate of transmission cannot be executed by the main transmission channels and that the
secure communication would not be achieved. In this case, secure transmission would
only be achieved when the main transmission channel has a greater SNR than the wiretap
channel. On the other hand, the authors in [81] studied the SOPs and outage secrecy rates
of quasi-static flat fading channels. They showed that secure transmission can be ensured
even when the average SNR of the main transmission channel is less than the eavesdropper
channel. Furthermore, their results demonstrated that the instantaneous secrecy perfor-
mance of fading channel features would be greater than the secrecy performance of a
non-fading channel with the same average SNR. Basically, the instantaneous rate capacity
is different for the different realizations of fading channel scenarios. More precisely, the
average secrecy capacity is equal to the maximum instantaneous secrecy capacity for fading
channels. In order to maximize the secrecy performance of secure transmission strategies,
the transmission power is optimally allocated based on the statistical distribution of Bob’s
Sensors 2022, 22, 3589 15 of 36
Cs = CB − E[CE ] (20)
To be more specific, the Cs can be maximized through the allocation of power based
on the assumptions on the knowledge of CSI at the source node [82]. Therefore, the
Cs may be different when a source Alice has different knowledge about the CSI of the
legitimate channels. More generally, it has been shown that the CSI of a legitimate channel
is more important than the CSI of an Eve channel. An Alice can decide to send confidential
information when the condition of the legitimate channel is strong enough and when the
CSI is available at the transmitter. In this case, the CSI of the wiretap channel may not
be important for secrecy capacity. For example, when a source Alice only has the CSI of
the legitimate channel and not the CSI of the wiretap channel, the allocation of power can
be executed according to the information of the CSI of the legitimate channel. Thus, it
is possible to minimize the SOP by carefully modeling the achievable rate of the secrecy
capacity RS , the secrecy capacity of the legitimate channel R B and the conditions for secure
transmission [83].
In summary, the secrecy outage probability (SOP) is used in cases where the source
transmitter has very little information about the CSI of the intended receiver or the eaves-
dropper. The SOP is more applicable in conditions where the statistical CSI of a wiretap
channel is known to the source Alice. In general, the secrecy outage capacity/probability is
used to measure the reliability of secure transmission strategies.
Furthermore, the authors of [87] provided an alternative design for a secure precoding
scheme, which was based on the QoS and SINR metrics. This design contains an optimal
power allocation and standardization framework schemes, which also realize the trade-off
between minimizing SINR at the eavesdropper and maximizing SINR at the legitimate
receiver. Despite the existing knowledge-rich approaches, secure and reliable transmission
strategies are still a predominantly open problem within physical layer design and optimiza-
tion systems. In these cases, the appropriate metrics are commonly used during security
design to estimate the attainable performance of transmission systems. Specifically, the
secrecy metrics that are listed in Table 3 are mostly considered to be the design criteria and
optimization constraints that are necessary for efficient secure communication strategies.
multi-antenna scenarios, which may form virtual or massive MIMO networks. Resource
allocation, which is usually adopted within conventional communication systems, includes
the allocation of power and subcarriers. It mainly focuses on resource management systems
Sensors 2022, 22, x FOR PEER REVIEW 18 of 37
that utilize multi-faceted wireless resources, including power, time slots and frequency.
Cooperative nodes or secure antenna selection, such as jammer selection, relay node selec-
tion and user selection, which are widely used in multiple node scenarios, have been fully
explored
scenarios,ashave
promising methods
been fully to improve
explored the design
as promising methodsof to
PLS. Such techniques
improve attempt
the design of PLS.
to select
Such appropriate
techniques cooperative
attempt to select nodes or antennae
appropriate from nodes
cooperative a candidate set to from
or antennae enhance the
a can-
efficiency
didate setof
tosecure
enhancedesign strategies.
the efficiency of secure design strategies.
Figure 8. Secure transmission strategies to improve the security and robustness of physical layer
Figure 8. Secure transmission strategies to improve the security and robustness of physical
designs.
layer designs.
Despite the unparalleled advantages of the research approaches that are mentioned
Despite the unparalleled advantages of the research approaches that are mentioned
above, it is worth noting that some drawbacks do exist. To achieve a fine-grained security
above, it is worth noting that some drawbacks do exist. To achieve a fine-grained security
performance, only using a single research approach may be difficult or even insufficient
performance, only using a single research approach may be difficult or even insufficient for
for future wireless systems. Therefore, the joint use of some of the above techniques that
future wireless systems. Therefore, the joint use of some of the above techniques that is
is based on several enabling technologies would be more efficient for ensuring the security
based on several enabling technologies would be more efficient for ensuring the security of
of the whole transmission system [34]. Typical examples include joint user scheduling and
the whole transmission system [34]. Typical examples include joint user scheduling and re-
resource allocation and the trade-off between reliability, security performance, latency,
source allocation and the trade-off between reliability, security performance, latency, energy
energy consumption, etc. Furthermore, considering joint strategies, examples of the ap-
consumption, etc. Furthermore, considering joint strategies, examples of the application of
plication of AI and ML technologies in physical layer security design and optimization
AI and ML technologies in physical layer security design and optimization are discussed in
are discussed in detail in Section 5.
detail in Section 5.
4.1.Main
4.1. Main Technical
Technical Challenges
Challenges in
in System
System Design
Design
Keyless-based PLS
Keyless-based PLS techniques
techniques are are well
well established
established transmission
transmissionstrategies
strategiesthatthatcancan
enhance the performance variation between the main transmission channel
enhance the performance variation between the main transmission channel and wiretap and wiretap
channels. Unlike
channels. Unlikeconventional
conventional transmission
transmission methods,
methods,the optimization objectives,
the optimization the con-
objectives, the
conditions of constrained optimization problems and the performance parametersthat
ditions of constrained optimization problems and the performance parameters thatare
are
associated with SINR-based security techniques are based on the characteristics
associated with SINR-based security techniques are based on the characteristics of wireless of wire-
less channels
channels and information
and information theorytheory secrecy
secrecy metrics.
metrics. For secure
For secure physical
physical layerlayer
designdesign
andand opti-
optimization schemes, the selection of suitable performance metrics is crucial.
mization schemes, the selection of suitable performance metrics is crucial. As illustrated As illus-in
trated 9,
Figure inmulti-dimensional
Figure 9, multi-dimensional
security and security andmanagement
resource resource management strategiescontain
strategies typically typi-
cally contain secure resource allocation and signal processing methods for
secure resource allocation and signal processing methods for cooperative wireless networks. cooperative
wireless allocation
Resource networks. systems
Resourceareallocation
employed systems are employed
by the network by the
operator, network
which operator,
are shown in the
which are shown in the top position; simultaneously, the signal processing
top position; simultaneously, the signal processing schemes are operated by transmitters, schemes are
operated
which by transmitters,
are positioned on thewhich
bottom. areMultiple-antenna
positioned on thetechniques
bottom. Multiple-antenna
have been widelytech- used
niques have been widely used in wireless networks due to their spatial degrees
in wireless networks due to their spatial degrees of freedom, which are offered by multi- of free-
dom, which
service are offered
networks. by multi-service
Although networks. Although
secure multi-antenna techniques secure multi-antenna
are widely tech-
implemented
niques are widely implemented in various design approaches, they can also be mathemat-
ically modeled as optimization problems to find the most favorable transmission solu-
tions. This can be realized and optimized by using information-theoretic security metrics
to design secure beamforming and precoding, appropriate antenna or relay node selection
and resource allocation. Most of the problems in PLS are caused by non-convex optimiza-
Sensors 2022, 22, 3589 18 of 36
Beamforming
Relay/antenna
selection
Authorized Authorized
User User
Eavesdropper
Figure 9.
Figure 9. An
An illustration
illustration of
of multi-dimensional
multi-dimensional security
security and
and resource
resource management
management within
within aa multi-
multi-
service wireless network.
service wireless network.
Although many
Although many optimization
optimization methods
methods havehave been
been developed
developed to to cope
cope with
with the
the non-
non-
convexity of the the optimization
optimizationproblems
problemsininPLS PLSschemes,
schemes,there thereare still
are many
still many challenges
challenges to
solve within the existing schemes; specifically, the basic assumptions
to solve within the existing schemes; specifically, the basic assumptions that are related that are related to
system
to system design
design andandchannel
channelcoding
codingmodels.
models.Given
Giventhe thelimited
limitedresources
resourcesin in wireless
wireless net-
works, such
works, such as as energy
energy and bandwidth,
bandwidth, a common problemproblem that is associated with resource
management is the adequate exploitation of the resource constraints to attain the condi-
tions of thethe information-theoretic
information-theoretic security
security metrics.
metrics. In a transmission system with limited
resources, design
resources, designand andoptimization
optimizationschemes
schemesmustmust bebe considered
considered forfor
thethe resource
resource alloca-
allocation
tion
to thetovarious
the various consumers
consumers who who usedata
use the the data
overover the network
the network so assotoas to achieve
achieve a gooda good
per-
formance.
performance. Several existing
Several works
existing havehave
works discussed the fundamental
discussed the fundamental resource management
resource manage-
issues withinwithin
ment issues multi-dimensional wireless
multi-dimensional networks,
wireless such as
networks, power
such allocation,
as power subcarrier
allocation, sub-
allocation and joint
carrier allocation power
and jointand subcarrier
power allocation
and subcarrier [97–106].[97–106].
allocation The existing
The secure
existing resource
secure
allocation methods are
resource allocation generally
methods based on communication
are generally based on communicationnodes withnodesthree with
terminals
three(i.e.,
ter-
the Alice–Bob–Eve
minals model) and lack
(i.e., the Alice–Bob–Eve sufficient
model) investigation
and lack sufficient into multi-userinto
investigation scenarios and
multi-user
heterogeneous networks. On the
scenarios and heterogeneous other hand,
networks. On the existing
other hand, designtheand optimization
existing design and of signal
opti-
processing schemes are commonly based on the parallel fading channel
mization of signal processing schemes are commonly based on the parallel fading channel and AWGN, with
few
and investigations
AWGN, with few on massive MIMO on
investigations andmassive
millimeter
MIMO wave channels.
and millimeter Therefore, the PLS
wave channels.
is still a great
Therefore, thepotential
PLS is stillprospect
a great for 5G wireless
potential communication
prospect for 5G wireless systems to mitigatesys-
communication all
tems to mitigate all of these challenges. As discussed above, the complexity of networks
and channels can affect the corresponding optimization objectives, which results in addi-
tional non-convex optimization problems that are hard to address. The major challenge in
the existing signal processing methods is the computational cost of implementing optimal
Sensors 2022, 22, 3589 19 of 36
of these challenges. As discussed above, the complexity of networks and channels can
affect the corresponding optimization objectives, which results in additional non-convex
optimization problems that are hard to address. The major challenge in the existing signal
processing methods is the computational cost of implementing optimal secure precoding
and beamforming schemes in practice. When considering the challenges and problems
that are associated with system design, potential research directions and corresponding
enhancement schemes can be identified and evaluated by reaping the benefits of ML and
AI enabling technologies, which are discussed in detail in Section 6.
algorithms are attractive alternatives that attempt to maximize secrecy performance and, at
the same time, minimize interference to the secure transmission.
Table 4. Overview of ML and AI techniques for physical layer design and optimization.
AI and edge Investigation of the gap between Robust PHY layer key generation
Complexity of training models for
computing (EC) [34] PHY security and AI–EC. schemes and secure resource various PLS issues.
management frameworks.
Achievement of the optimal
Enabling of secured visible light Avoidance of the
Deep reinforcement learning [35] solution between secrecy rate quantization error.
communication (VLC).
and utility.
Integration of wireless power Achievement of the trade-off Limitations of optimal scheme for
Integrated AI [36] transfers and cooperative between security performance
and energy consumption. solving more complex problems.
jamming for secure transmission.
Iterative water-filling algorithm A comprehensive investigation of Bridging of the gap between AI Challenging integration of AI and
[147] MIMO eigenmode transmission. and 5G technologies. 5G networks.
Distributed AI federated learning A brief survey on multi-antenna Contribution of robust and
fine-grained security metrics. Security issues at the device level.
[148] techniques.
RF beamforming Promising results for Lack of investigation into
Feed-forward DL model [149] security issues.
codeword prediction. beamforming problems.
Adversarial attacks for Complexity of adversarial
Adversarial DL model [150] beamforming prediction. Consideration of security issues.
training approach.
In the next subsections, we discuss some ML- and AI-based applications in the design
and optimization of 5G networks, which cover three different problems within the physical
layer of wireless networks, including secure multi-antenna techniques, secure resource
management and the optimization of signal processing methods.
Figure10.
Figure 10.An
Anillustration
illustrationofofa aMIMO
MIMOchannel
channelautoencoder.
autoencoder.
Therefore,
Therefore,existing
existingoptimization
optimizationproblems
problemshave haveproved
provedthe
theadvantages
advantagesofofusing
usingAI,
AI,
specifically DNN-based schemes for end-to-end communication without the
specifically DNN-based schemes for end-to-end communication without the assumption assumption
ofofseveral
severalmodels
modelsininthe
theexisting
existingconventional
conventionaldesign
designconcepts.
concepts.Thanks
Thankstotothe
thepotential
potentialofof
autoencoders,
autoencoders,the complicated
the complicated issues thatthat
issues cannot be modeled
cannot by conventional
be modeled methods
by conventional can
methods
be
cansolved by training
be solved the scenarios
by training and then
the scenarios and optimizing the performance.
then optimizing the performance.
5.3.
5.3.Applications
ApplicationsofofAI
AIininSecure
SecureResource
ResourceAllocation
Allocation
Resource management is a crucial issue for 5G networks, including inter-cell resource
Resource management is a crucial issue for 5G networks, including inter-cell resource
block allocation, computing power and energy allocation, available spectrum and commu-
block allocation, computing power and energy allocation, available spectrum and com-
nication channels, massive MIMO user clustering and beamforming resource allocation in
munication channels, massive MIMO user clustering and beamforming resource alloca-
distributed network structures [163–165]. Secure resource allocation in B5G networks is a
tion in distributed network structures [164–166]. Secure resource allocation in B5G net-
more challenging and multi-objective performance optimization problem. The essential
works is a more challenging and multi-objective performance optimization problem. The
task of resource allocation in 5G networks is conducted to predict future service requests,
essential task of resource allocation in 5G networks is conducted to predict future service
mobility and the location of users. Since the emergence of new technologies and services
requests, mobility and the location of users. Since the emergence of new technologies and
in 5G that typically have limited power and restricted processing and are delay-sensitive,
services in 5G that typically have limited power and restricted processing and are delay-
it has become useful to match these multi-objective requirements with minimum valu-
sensitive, it has become useful to match these multi-objective requirements with mini-
able resource costs, such as power and energy. The existing secure resource management
mum valuable resource costs, such as power and energy. The existing secure resource
and utilization schemes that have been widely adopted in traditional design concepts are
management
based and utilization
on end-to-end performanceschemes that with
metrics, have less
beenfocus
widely
on adopted in traditional
multi-dimensional design
wireless
concepts are based on end-to-end performance metrics, with less
networks. This requires the help of AI and other intelligent computing technologiesfocus on multi-
to
overcome these gaps in the existing schemes. The application of AI and ML techniques has
great potential in these areas.
In this subsection, we consider typical multi-dimensional downlink resource alloca-
tion in a multi-cell, multi-user OFDMA-based scenario, as shown in Figure 11. In this
framework, since the OFDM resource block (RB) distribution to various users within the
same cell is orthogonal, the intra-cell interference signals are removed over wireless chan-
nels. The detection of OFDM symbols at the receiver usually depends on a receiver that
uses maximum throughput estimation for evaluation, but this method is very sensitive to
CSI errors and the accuracy of the model itself. The design of RB allocation for users is
mostly carried out using non-linear programming, which involves non-deterministic pol-
Sensors 2022, 22, 3589 ynomial (NP) optimization problems [154]. Nevertheless, the high complexity of this 24 ofop-
36
Figure11.
Figure 11.An
Anillustration
illustrationofofdownlink
downlinkresource
resourceallocation
allocationfor
foraamulti-service
multi-servicenetwork.
network.
TheQ-learning
The main strategies include:
algorithm was (1) the allocation
designed with theofgoal
freeofRBs to users inthe
maximizing theentire
samesystem
cell by
performance by avoiding
assigning higher allocation
SIRs to the users; of similar
(2) the RBs updates
interactive to neighboring cells thatRBs
of the allocated are located
for each
close
user, to boundaries.
based The main
on the Bellman motivation
equation [167],for
in applying Q-learning
order to improve the to RB allocation
system throughputin
downlink
performance;OFDM systems
(3) the was discussed
avoidance of allocatingin the
[153].
same According
RB that hasto been
[149],assigned
the Q-learning
to users
scheme can solve
in neighboring the NP
cells. combinatorial
Consequently, optimization
by employing theproblems
Q-learning that are hard to
algorithm, handlecan
a system in
the existing static partitioning of networks. Intuitively, the Q-learning algorithm
maximize its overall capacity by adjusting the RB allocation of each user. Additionally, allows
an
theagent to interactively
Q-learning approachlearn the optimal
promotes the fairallocation
allocation policy
of userbypower
sharing resources
since with
the involved
neighboring
users cannotcells.
acquire essential SIR from neighboring cells. Furthermore, a generalized
NashThe main strategies
equilibrium include:
framework was(1) the allocation
proposed of to
in [168] free RBs topower
provide users in the same cell
optimization for
by assigning higher SIRs to the users; (2) the interactive updates of the allocated RBs for
each user, based on the Bellman equation [166], in order to improve the system throughput
performance; (3) the avoidance of allocating the same RB that has been assigned to users
in neighboring cells. Consequently, by employing the Q-learning algorithm, a system can
maximize its overall capacity by adjusting the RB allocation of each user. Additionally,
the Q-learning approach promotes the fair allocation of user power since the involved
users cannot acquire essential SIR from neighboring cells. Furthermore, a generalized Nash
equilibrium framework was proposed in [167] to provide power optimization for users
from multi-cells that are allocated to the same RB. Moreover, to design efficient resource
allocation policies for 5G, the possible applications of AI were discussed in [168,169].
5G networks, such as secure precoding and beamforming, have been utilized to enhance
various performance requirements in secure transmission systems. By optimizing these
techniques, the appropriate performance metrics of PLS can be achieved while the desired
QoS can also be ensured at the same time [170–175]. However, due to the complexity of
the hardware and mathematical models in these performance metrics, the optimization
problems of existing signal processing schemes become more and more complicated for
future network environments [64,90,114–116], which means that: (1) it is hard to solve
these problems using numerical methods because they are too sophisticated and have
many imperfections in practical applications; (2) in order to obtain optimal design schemes,
the hurdles between various signal processing barriers need to be reduced using optimal
solutions; (3) the vastly increasing complexity of the systems and hardware installation
that are needed to mitigate computational cost requires robust and intelligent algorithms
to make system design more practical.
To cope with these challenges, the assistance of modern computing technologies has
been used as a performance metric. On the other hand, ML and AI techniques can benefit
from the optimization of traditional signal processing techniques. Some of the application
examples include secure physical layer modules [176,177], channel estimation and equal-
ization [178], obstacle detection and localization [179,180], modulation recognition [159]
and channel coding and estimation [181,182]. The advantages of employing AI and ML
technologies in 5G networks compared to traditional signal processing methods are two-
fold. First, AI and ML approaches are designed to achieve optimal end-to-end performance
metrics, while conventional schemes are performed by logically discrete blocks that are
separately optimized. Second, artificial neural networks (ANNs) are known to be highly
reliable and self-adaptive and have also been shown to have computationally universal
functions [183]. ANNs are used to learn inverse mapping from received interference signals
to the original signals without the need for explicit channel estimation and equalization.
The joint optimization of transmitters and receivers within specific channel environments
can produce non-ideal effects in the wireless channel and consequently, transmission
performance is enhanced. By applying ANNs in signal processing schemes, we can im-
prove optimal performance metrics as long as a reliable hardware implementation model
exists. In summary, ML- and AI-based algorithms are more efficient and powerful for
hardware implementation and have extensive applications that are not limited to signal
processing schemes.
of service-related and user-related elements in B5G networks, dynamic, robust and efficient
secure joint security techniques need to be developed [186].
were discussed in [203] to achieve a robust and highly reliable authentication for B5G
networks. In [204], a big data analytics technique was applied to facilitate the rapid growth
of B5G network data in specific scenarios. However, big data analytics can help to address
abnormal user detection applications.
7. Conclusions
Recently, PLS has attracted broad research interest in terms of the design of efficient
and secure transmission strategies for 5G wireless networks. This review paper provided
detailed discussions on the basic optimization schemes and system design of PLS, based
on both information-theoretic security and signal processing fundamentals. To understand
the advantages of PLS, we first provided a comparison between the traditional crypto-
graphic and PLS techniques. Then, we introduced different wiretap channel models and
their mathematical expressions in order to understand the common scenarios of practical
security design. From the information-theoretic security perspective, we reviewed pop-
ular performance evaluation metrics, including the rate of transmission metrics, secrecy
capacity, secrecy throughput, secrecy outage probability, secure resource allocation and
QoS-related metrics. Then, we reviewed optimization problems and security solutions
from the viewpoints of system design and signal processing methods, such as convex
optimization, secure beamforming, artificial noise (AN) and zero-forcing (ZF) precoding.
Regarding research directions, we discussed candidates for future research topics within
PLS, including resource allocation, signal processing techniques, secure node/antenna
selection and cooperative networks. Thereafter, AI and ML applications were reviewed to
solve different problems for optimization and security design. Specifically, we discussed
the paradigms of AI and ML in terms of some promising research directions, such as signal
processing design, end-to-end multi-antenna techniques and OFDM-based RB allocation
Sensors 2022, 22, 3589 29 of 36
applications. We also discussed other research directions and the open challenges that face
PLS in future wireless networks. In summary, our review incorporated different aspects
that are related to the optimization and design of PLS systems, including secure resource
allocation, channel estimation and the integration of AI into practical strategies to help
PLS. We believe that this paper can provide the research community with guidance for
advancing the considerations of future PLS research.
References
1. Wang, C.X.; Haider, F.; Gao, X.; You, X.H.; Yang, Y.; Yuan, D.; Aggoune, H.M.; Haas, H.; Fletcher, S.; Hepsaydir, E. Cellular
architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 2014, 52, 122–130. [CrossRef]
2. Rawat, S.; Chaturvedi, P. A QoS Aware RA Algorithm for OFDM Network. J. Eng. Educ. Transform. 2015, 2349–2473. [CrossRef]
3. Chou, S.F.; Pang, A.C.; Yu, Y.J. Energy-aware 3D unmanned aerial vehicle deployment for network throughput optimization.
IEEE Trans. Wirel. Commun. 2019, 19, 563–578. [CrossRef]
4. Hindumathi, V.; Reddy, K.R.L. A Proficient Fair Resource Allocation in the Channel of Multiuser Orthogonal Frequency Division
Multiplexing using a Novel Hybrid Bat-Krill Herd Optimization. Wirel. Pers. Commun. 2021, 120, 1449–1473. [CrossRef]
5. Zhou, L.; Wu, D.; Wei, X.; Dong, Z. Seeing Isn’t Believing: QoE Evaluation for Privacy-Aware Users. IEEE JSAC 2019, 37,
1656–1665. [CrossRef]
6. Zorgui, M. Wireless Physical Layer Security: On the Performance Limits of Secret-Key Agreement. Masters’s Thesis, King
Abdullah University of Science and Technology, Thuwal, Saudi Arabia, 2015.
7. Campagna, M.; Chen, L.; Dagdelen, O.; Ding, J.; Fernick, J.; Gisin, N.; Hayford, D.; Jennewein, T.; Lütkenhaus, N.; Mosca, M.;
et al. Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges; European Telecommunications
Standards Institute: Sophia Antipolis, France, 2015; Volume 8, pp. 1–64.
8. Shiu, Y.S.; Chang, S.Y.; Wu, H.C.; Huang, S.C.H.; Chen, H.H. Physical layer security in wireless networks: A tutorial. IEEE
Wireless Commun. 2011, 18, 66–74. [CrossRef]
9. Mukherjee, A. Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource
constraints. Proc. IEEE 2015, 103, 1747–1761. [CrossRef]
10. Liu, Y.; Chen, H.H.; Wang, L. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach based on Ordered
Eigenvalues of Wishart Matrices. IEEE Trans. Inf. Forensics Secur. 2016, 99, 1. [CrossRef]
11. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using
physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [CrossRef]
12. Wang, C.; Wang, H.M. Physical layer security in millimeter wave cellular networks. IEEE Trans. Wirel. Commun. 2016, 15,
5569–5585. [CrossRef]
13. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc.
IEEE 2016, 104, 1727–1765. [CrossRef]
14. Barros, J.; Rodrigues, M.R. Secrecy capacity of wireless channels. In Proceedings of the 2006 IEEE International Symposium on
Information Theory, Seattle, WA, USA, 9–16 July 2006; pp. 356–360.
15. Jeon, H.; Kim, N.; Choi, J.; Lee, H.; Ha, J. Bounds on secrecy capacity over correlated ergodic fading channels at high SNR. IEEE
Trans. Inf. Theory 2011, 57, 1975–1983. [CrossRef]
16. Saad, W.; Zhou, X.; Han, Z.; Poor, H.V. On the physical layer security of backscatter wireless systems. IEEE Trans. Wirel. Commun.
2014, 13, 3442–3451. [CrossRef]
17. Basciftci, Y.O.; Gungor, O.; Koksal, C.E.; Ozguner, F. On the secrecy capacity of block fading channels with a hybrid adversary.
IEEE Trans. Inf. Theory 2015, 61, 1325–1343. [CrossRef]
Sensors 2022, 22, 3589 30 of 36
18. Zhang, N.; Cheng, N.; Lu, N.; Zhang, X.; Mark, J.W.; Shen, X. Partner selection and incentive mechanism for physical layer
security. IEEE Trans. Wirel. Commun. 2015, 14, 4265–4276. [CrossRef]
19. Bashar, S.; Ding, Z. Optimum power allocation against information leakage in wireless network. In Proceedings of the GLOBE-
COM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–6.
20. Wang, X.; Tao, M.; Mo, J.; Xu, Y. Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless
networks. IEEE Trans. Inf. Forensics Secur. 2011, 6, 693–702. [CrossRef]
21. Du, Y.N.; Han, S.; Xu, S.; Li, C. Improving secrecy under high correlation via discriminatory channel estimation. In Proceedings
of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6.
22. Hong, Y.W.P.; Lan, P.C.; Kuo, C.C.J. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless
Systems; Springer: New York, NY, USA, 2014.
23. Liu, R.; Trappe, W. Securing Wireless Communications at the Physical Layer; Springer: New York, NY, USA, 2010.
24. Baldi, M.; Tomasin, S. (Eds.) Physical and Data-Link Security Techniques for Future Communication Systems; Springer International:
Cham, Switzerland, 2016.
25. Liu, Y.; Chen, H.H.; Wang, L. Physical layer security for next generation wireless networks: Theories, technologies, and challenges.
IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [CrossRef]
26. Sharma, R.K.; Rawat, D.B. Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE
Commun. Surv. Tutor. 2014, 17, 1023–1043. [CrossRef]
27. Sanenga, A.; Mapunda, G.A.; Jacob, T.M.L.; Marata, L.; Basutli, B.; Chuma, J.M. An overview of key technologies in physical layer
security. Entropy 2020, 22, 1261. [CrossRef]
28. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless
networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [CrossRef]
29. Chen, X.; Ng, D.W.; Gerstacker, W.H.; Chen, H.H. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE
Commun. Surv. Tutor. 2017, 19, 1027–1053. [CrossRef]
30. Wang, D.; Bai, B.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun.
Surv. Tutor. 2019, 21, 1878–1911. [CrossRef]
31. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and applications of physical layer security techniques for confidentiality:
A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1773–1828. [CrossRef]
32. Trappe, W. The challenges facing physical layer security. IEEE Commun. Mag. 2015, 53, 16–20. [CrossRef]
33. Mao, Q.; Hu, F.; Hao, Q. Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor.
2018, 20, 2595–2621. [CrossRef]
34. Zhao, L.; Zhang, X.; Chen, J.; Zhou, L. Physical layer security in the age of artificial intelligence and edge computing. IEEE Wirel.
Commun. 2020, 27, 174–180. [CrossRef]
35. Xiao, L.; Sheng, G.; Liu, S.; Dai, H.; Peng, M.; Song, J. Deep Reinforcement Learning-Enabled Secure Visible Light Communication
against Eavesdropping. IEEE Trans. Commun. 2019, 67, 6994–7005. [CrossRef]
36. Gui, L.; He, B.; Zhou, X.; Yu, C.; Shu, F.; Li, J. Learning-Based Wireless Powered Secure Transmission. IEEE Wirel. Commun. Lett.
2019, 8, 600–603.
37. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [CrossRef]
38. Li, H.; Wang, X. Physical-Layer Security Enhancement in Wireless Communication Systems. Master’s Thesis, the University of
Western Ontario London, Ontario, Canada, 2013.
39. Zheng, G.; Choo, L.C.; Wong, K.K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans.
Signal Process. 2011, 59, 1317–1322. [CrossRef]
40. He, X.; Yener, A. On the Role of Feedback in Two-Way Secure Communication. In Proceedings of the 2008 42nd Asilomar
Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 26–29 October 2008; pp. 1093–1097.
41. He, X.; Yener, A. Providing Secrecy When the Eavesdropper Channel is Arbitrarily Varying: A Case for Multiple Antennas. In
Proceedings of the 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL,
USA, 29 September–1 October 2010; pp. 1228–1235.
42. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized
artificial-noise aided approach. IEEE Trans. Signal Process. 2011, 59, 1202–1216. [CrossRef]
43. Reboredo, H.; Xavier, J.; Rodrigues, M.R.D. Filter design with secrecy constraints: The MIMO Gaussian wiretap channel. IEEE
Trans. Signal Process. 2013, 61, 3799–3814. [CrossRef]
44. Li, M.; Kundu, S.; Pados, D.A.; Batalama, S.N. Waveform design for secure SISO transmissions and multicasting. IEEE J. Sel.
Areas Commun. 2013, 31, 1864–1874. [CrossRef]
45. Mohaisen, M.; Wang, Y.; Chang, K. Multiple Antenna Technologies. Available online: https://arxiv.org/ftp/arxiv/papers/0909
/0909.3342.pdf (accessed on 19 October 2021).
46. Björnson, E.; Sanguinetti, L.; Wymeersch, H.; Hoydis, J.; Marzetta, T.L. Massive MIMO is a reality—What is next? Five promising
research directions for antenna arrays. Digit. Signal Process. 2019, 94, 3–20. [CrossRef]
47. Kapetanovic, D.; Zheng, G.; Rusek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and
active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [CrossRef]
Sensors 2022, 22, 3589 31 of 36
48. Liu, R.; Liu, T.; Poor, H.V.; Shamai, S. Multiple-input multiple-output Gaussian broadcast channels with common and confidential
messages. IEEE Trans. Inf. Theory 2010, 56, 5477–5487.
49. Liang, Y.; Poor, H.V.; Shamai, S. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [CrossRef]
50. Ekrem, E.; Ulukus, S. Secure broadcasting using multiple antennas. J. Commun. Netw. 2010, 12, 411–432. [CrossRef]
51. Lee, H.; Song, C.; Moon, J.; Lee, I. Precoder designs for MIMO Gaussian multiple access wiretap channels. IEEE Trans. Veh.
Technol. 2017, 66, 8563–8568. [CrossRef]
52. Fakoorian, S.A.A.; Swindlehurst, A.L. MIMO interference channel with confidential messages: Achievable secrecy rates and
precoder design. IEEE Trans. Inf. Forensics Secur. 2011, 6, 640–649. [CrossRef]
53. Ning, H.; Ling, C.; Leung, K.K. Feasibility condition for interference alignment with diversity. IEEE Trans. Inf. Theory 2011, 57,
2902–2912. [CrossRef]
54. Chen, X.; Yuen, C. Performance analysis and optimization for interference alignment over MIMO interference channels with
limited feedback. IEEE Trans. Signal Process. 2014, 62, 1785–1795. [CrossRef]
55. Koyluoglu, O.O.; El Gamal, H.; Lai, L.; Poor, H.V. Interference alignment for secrecy. IEEE Trans. Inf. Theory 2011, 57, 3323–3332.
[CrossRef]
56. Yang, S.; Belfiore, J.C. Towards the optimal amplify-and-forward cooperative diversity scheme. IEEE Trans. Inf. Theory 2007, 53,
3114–3126. [CrossRef]
57. Zhong, C.; Matthaiou, M.; Karagiannidis, G.K.; Huang, A.; Zhang, Z. Capacity bounds for AF dual-hop relaying in G fading
channel. IEEE Trans. Veh. Technol. 2012, 61, 1730–1740. [CrossRef]
58. Berger, S.; Kuhn, M.; Wittneben, A.; Unger, T.; Klein, A. Recent advances in amplify-and-forward two-hop relaying. IEEE Commun.
Mag. 2009, 47, 50–56. [CrossRef]
59. Wang, T.; Cano, A.; Giannakis, G.B.; Laneman, J.N. High performance cooperative demodulation with decode-and-forward
relays. IEEE Trans. Commun. 2007, 55, 1427–1438. [CrossRef]
60. Yi, Z.; Kim, I.M. Diversity order analysis of the decode-and forward cooperative networks with relay selection. IEEE Trans.
Wireless Commun. 2008, 7, 1792–1799.
61. Patel, C.S.; Stuber, G.L. Channel estimation for amplify and forward relay-based cooperation diversity systems. IEEE Trans. Wirel.
Commun. 2007, 6, 2348–2356. [CrossRef]
62. Huang, J.; Swindlehurst, A.L. Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal
Process. 2011, 59, 4871–4884. [CrossRef]
63. Mo, J.; Tao, M.; Liu, Y.; Wang, R. Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Trans.
Signal Process. 2014, 62, 2185–2199. [CrossRef]
64. Li, Q.; Yang, Y.; Ma, W.K.; Lin, M.; Ge, J.; Lin, J. Robust cooperative beamforming and artificial noise design for physical-layer
secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 2015, 63, 206–220. [CrossRef]
65. Zhou, X.S.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2016; p. 295.
66. Liang, Y.; Poor, H.V.; Shamai, S. Secure communication over fading channels. IEEE Trans. Inf. Theory 2008, 54, 2470–2492.
[CrossRef]
67. Bloch, M.R.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering, 1st ed.; Cambridge University Press:
Cambridge, UK, 2011.
68. Bloch, M.R.; Laneman, J.N. Strong Secrecy from Channel Resolvability. IEEE Trans. Inf. Theory 2013, 59, 8077–8098. [CrossRef]
69. Wang, H.M.; Xia, X.-G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015,
53, 47–53. [CrossRef]
70. Zhou, X.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications, 1st ed.; CRC Press: Boca Raton, FL, USA, 2013.
[CrossRef]
71. Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans.
Veh. Technol. 2012, 61, 3693–3704. [CrossRef]
72. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wiretap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [CrossRef]
73. Wang, H.M.; Zheng, T.X. Physical Layer Security in Random Cellular Networks; Springer Briefs in Computer Science; Springer:
Singapore, 2016.
74. Ryland, K.S.; Clancy, T.C.; Buehrer, R.M.; Dietrich, C.B. Software-Defined Radio Implementation of Two Physical Layer Security
Techniques. Ph.D. Thesis, Virginia Tech, Blacksburg, VA, USA, 2018. Available online: https://vtechworks.lib.vt.edu/bitstream/
handle/10919/82055/Ryland_KS_T_2018.pdf?sequence=1&isAllowed=y (accessed on 9 April 2022).
75. Bloch, M.; Barros, J.; Rodrigues, M.R.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54,
2515–2534. [CrossRef]
76. Bassily, R.; Ekrem, E.; He, X.; Tekin, E.; Xie, J.; Bloch, M.R.; Ulukus, S.; Yener, A. Cooperative security at the physical layer:
A summary of recent advances. IEEE Signal Process. Mag. 2013, 30, 16–28. [CrossRef]
77. Park, K.H.; Wang, T.; Alouini, M.S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative
jamming. IEEE J. Sel. Areas Commun. 2013, 31, 1741–1750. [CrossRef]
78. Bashar, S.; Ding, Z.; Li, G.Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE
Trans. Wireless Commun. 2011, 10, 1212–1223. [CrossRef]
Sensors 2022, 22, 3589 32 of 36
79. Xiong, J.; Wong, K.K.; Ma, D.; Wei, J. A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap
channels via masked beamforming. IEEE Commun. Lett. 2012, 16, 1496–1499. [CrossRef]
80. Gerbracht, S.; Scheunert, C.; Jorswieck, E.A. Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf.
Forensics Secur. 2012, 7, 704–716. [CrossRef]
81. Oggier, F.; Hassibi, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [CrossRef]
82. Gopala, P.K.; Lai, L.; El Gamal, H. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698.
[CrossRef]
83. Zhou, X.; McKay, M.R.; Maham, B.; Hjørungnes, A. Rethinking the secrecy outage formulation: A secure transmission design
perspective. IEEE Commun. Lett. 2011, 15, 302–304. [CrossRef]
84. Hamamreh, J.M.; Yusuf, M.; Baykas, T.; Arslan, H. Cross MAC/PHY layer security design using ARQ with MRC and adaptive
modulation. In Proceedings of the IEEE Wireless Communication Networks Conference (WCNC), Doha, Qatar, 3–6 April 2016;
pp. 1–7.
85. Liu, S.; Hong, Y.; Viterbo, E. Practical secrecy using artificial noise. IEEE Commun. Lett. 2013, 17, 1483–1486.
86. Morrison, K.; Goeckel, D. Secrecy rate pair constraints for secure throughput. In Proceedings of the 2014 IEEE Military
Communications Conference, Baltimore, MD, USA, 6–8 October 2014; pp. 479–484.
87. Geraci, G.; Egan, M.; Yuan, J.; Razi, A.; Collings, I.B. Secrecy sumrates for multi-user MIMO regularized channel inversion
precoding. IEEE Trans. Commun. 2012, 60, 3472–3482. [CrossRef]
88. He, B.; Zhou, X.; Swindlehurst, A.L. On secrecy metrics for physical layer security over quasi-static fading channels. IEEE Trans.
Wireless Commun. 2016, 15, 6913–6924. [CrossRef]
89. He, X.; Khisti, A.; Yener, A. MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom.
IEEE Trans. Inf. Theory 2013, 59, 4733–4745.
90. Liu, Z.; Chen, C.; Bai, L.; Xiang, H.; Choi, J. Secure beamforming via amplify-and-forward relays in wireless networks with
multiple eavesdroppers. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, NSW, Australia,
10–14 June 2014; pp. 4698–4703.
91. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V.L. Improving wireless physical layer security via cooperating relays. IEEE Trans.
Signal Process. 2010, 58, 1875–1888. [CrossRef]
92. Nomikos, N.; Nieto, A.; Makris, P.; Skoutas, D.N.; Vouyioukas, D.; Rizomiliotis, P.; Lopez, J.; Skianis, C. Relay selection for secure
5G green communications. Telecommun. Syst. 2015, 59, 169–187. [CrossRef]
93. Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process.
2011, 59, 4985–4997. [CrossRef]
94. Hong, Y.W.P.; Lan, P.C.; Kuo, C.C.J. Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal
processing approaches. IEEE Signal Process. Mag. 2013, 30, 29–40. [CrossRef]
95. Yener, A.; Ulukus, S. Wireless physical-layer security: Lessons learned from information theory. Proc. IEEE 2015, 103, 1814–1825.
[CrossRef]
96. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004.
97. Bai, B.; Chen, W.; Cao, Z. Outage optimal subcarrier allocation for downlink secure OFDMA systems. In Proceedings of the IEEE
Global Communications Conference (GLOBECOM) Workshops, Austin, TX, USA, 8–12 December 2014; pp. 1320–1325.
98. Jindal, A.; Bose, R. Resource allocation for secure multicarrier AF relay system under total power constraint. IEEE Commun. Lett.
2014, 19, 231–234. [CrossRef]
99. Chen, J.; Chen, X.; Gerstacker, W.H.; Ng, D.W.K. Resource allocation for a massive MIMO relay aided secure communication.
IEEE Trans. Inf. Forensics Secur. 2016, 11, 1700–1711. [CrossRef]
100. Ng, D.W.K.; Lo, E.S.; Schober, R. Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks.
IEEE Trans. Wirel. Commun. 2011, 10, 3528–3540. [CrossRef]
101. Huang, J.; Swindlehurst, A.L. Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal
Process. 2012, 60, 1696–1707. [CrossRef]
102. Jeong, C.; Kim, I.M. Optimal power allocation for secure multicarrier relay systems. IEEE Trans. Signal Process. 2011, 59, 5428–5442.
[CrossRef]
103. Tsai, S.H.; Poor, H.V. Power allocation for artificial-noise secure MIMO precoding systems. IEEE Trans. Signal Process. 2014, 62,
3479–3493. [CrossRef]
104. Wang, L.; Elkashlan, M.; Huang, J.; Tran, N.H.; Duong, T.Q. Secure transmission with optimal power allocation in untrusted relay
networks. IEEE Wireless Commun. Lett. 2014, 3, 289–292. [CrossRef]
105. Benfarah, A.; Tomasin, S.; Laurenti, N. Power allocation in multiuser parallel Gaussian broadcast channels with common and
confidential messages. IEEE Trans. Commun. 2016, 64, 2326–2339. [CrossRef]
106. Zheng, T.X.; Wang, H.M. Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers.
IEEE Trans. Veh. Technol. 2016, 65, 8812–8817. [CrossRef]
107. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory
2010, 56, 3088–3104. [CrossRef]
108. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas—Part II the MIMOME wiretap channel. IEEE Trans. Inf.
Theory 2010, 56, 5515–5532. [CrossRef]
Sensors 2022, 22, 3589 33 of 36
109. Sheng, Z.; Tuan, H.D.; Sheng, Z.; Tuan, H.D.; Duong, T.Q.; Vincent Poor, H. Beamforming Optimization for Physical Layer
Security in MISO Wireless Networks. IEEE Trans. Signal Process. 2018, 66, 3710–3723. [CrossRef]
110. Palomar, D.P.; Chiang, M. A tutorial on decomposition methods for network utility maximization. IEEE J. Sel. Areas Commun.
2006, 24, 1439–1451. [CrossRef]
111. Yaacoub, E.; Al-Husseini, M. Achieving physical layer security with massive MIMO beamforming. In Proceedings of the 2017
11th European Conference Antennas Propagation, EUCAP 2017, Paris, France, 19–24 March 2017; pp. 1753–1757.
112. Shafiee, S.; Liu, N.; Ulukus, S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE
Transactions on Information Theory 2009, 55, 4033–4039. [CrossRef]
113. Björnson, E.; Bengtsson, M.; Ottersten, B. Optimal multiuser transmit beamforming: A difficult problem with a simple solution
structure [lecture notes]. IEEE Signal Process. Mag. 2014, 31, 142–148. [CrossRef]
114. Jeong, C.; Kim, I.M.; Kim, D.I. Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO
untrusted relay system. IEEE Trans. Signal Process. 2012, 60, 310–325. [CrossRef]
115. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W. Robust beamforming design for sum secrecy rate optimization in MU-MISO
networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1812–1823. [CrossRef]
116. Shi, Q.; Xu, W.; Wu, J.; Song, E.; Wang, Y. Secure beamforming for MIMO broadcasting with wireless information and power
transfer. IEEE Trans. Wirel. Commun. 2015, 14, 2841–2853. [CrossRef]
117. Wang, X.; Wang, K.; Zhang, X.D. Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol.
2013, 62, 2140–2155. [CrossRef]
118. Zheng, G.; Arapoglou, P.D.; Ottersten, B. Physical layer security in multibeam satellite systems. IEEE Trans. Wirel. Commun. 2012,
11, 852–863. [CrossRef]
119. Nghia, N.T.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. MIMO beamforming for secure and energy-efficient wireless communication.
IEEE Signal Process. Lett. 2017, 24, 236–239. [CrossRef]
120. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secure and energy-efficient beamforming for simultaneous information and
energy transfer. IEEE Trans. Wirel. Commun. 2017, 16, 7523–7537. [CrossRef]
121. Zhao, N.; Yu, F.R.; Sun, H. Adaptive energy-efficient power allocation in green interference-alignment-based wireless networks.
IEEE Trans. Veh. Technol. 2014, 64, 4268–4281. [CrossRef]
122. Pu, W.; Xiao, J.; Zhang, T.; Luo, Z.Q. Overcoming dof limitation in robust beamforming: A penalized inequality-constrained
approach. arXiv 2019, arXiv:1910.03365.
123. Li, Q.; Ma, W.K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization.
IEEE Trans. Signal Process. 2013, 61, 2704–2717. [CrossRef]
124. Lin, P.H.; Lai, S.H.; Lin, S.C.; Su, H.J. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap
channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [CrossRef]
125. Yang, N.; Yan, S.; Yuan, J.; Malaney, R.; Subramanian, R.; Land, I. Artificial noise: Transmission optimization in multi-input
single-output wiretap channels. IEEE Trans. Commun. 2015, 63, 1771–1783. [CrossRef]
126. Wang, B.; Mu, P.; Li, Z. Secrecy rate maximization with artificial noise-aided beamforming for MISO wiretap channels under
secrecy outage constraint. IEEE Commun. Lett. 2015, 19, 18–21. [CrossRef]
127. Tang, Y.; Xiong, J.; Ma, D.; Zhang, X. Robust artificial noise aided transmit design for MISO wiretap channels with channel
uncertainty. IEEE Commun. Lett. 2013, 17, 2096–2099. [CrossRef]
128. Reboredo, H.; Prabhu, V.; Rodrigues, M.R.; Xavier, J. Filter design with secrecy constraints: The multiple-input multiple-output
Gaussian wiretap channel with zero forcing receive filters. In Proceedings of the 2011 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP), Prague, Czech Republic, 22–27 May 2011; pp. 3440–3443.
129. Rezki, Z.; Alouini, M.S. On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint.
In Proceedings of the IEEE International Conference Communication Workshops (ICC Workshops), Kyoto, Japan, 5–9 June 2011;
pp. 1–5.
130. Ahmed, E.; Yaqoob, I.; Hashem, I.A.T.; Shuja, J.; Imran, M.; Guizani, N.; Bakhsh, S.T. Recent advances and challenges in mobile
big data. IEEE Commun. Mag. 2018, 56, 102–108. [CrossRef]
131. Cayamcela, M.E.M.; Lim, W. Artificial intelligence in 5G technology: A survey. In Proceedings of the 2018 International Conference
on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 October 2018; pp. 860–865.
132. Wang, T.; Wang, S.; Zhou, Z.H. Machine learning for 5G and beyond: From model-based to data-driven mobile wireless networks.
China Commun. 2019, 16, 165–175.
133. Challita, U.; Dong, L.; Saad, W. Proactive resource management for LTE in unlicensed spectrum: A deep learning perspective.
IEEE Trans. Wirel. Commun. 2018, 17, 4674–4689. [CrossRef]
134. Kilaru, S.; Harikishore, K.; Sravani, T.; Anvesh, C.L.; Balaji, T. Review and analysis of promising technologies with respect to Fifth
generation networks. In Proceedings of the 2014 First International Conference on Networks & Soft Computing (ICNSC2014),
Guntur, India, 19–20 August 2014; pp. 248–251.
135. Wang, C.X.; Wu, S.; Bai, L.; You, X.; Wang, J.; Chih-Lin, I. Recent advances and future challenges for massive MIMO channel
measurements and models. Sci. China Inf. Sci. 2016, 59, 021301. [CrossRef]
136. Zhang, J.; Tang, P.; Tian, L.; Hu, Z.; Wang, T.; Wang, H. 6–100 GHz research progress and challenges from a channel perspective
for fifth generation (5G) and future wireless communication. Sci. China Inf. Sci. 2017, 60, 080301. [CrossRef]
Sensors 2022, 22, 3589 34 of 36
137. Li, L.; Wang, D.; Niu, X.; Chai, Y.; Chen, L.; He, L.; Wu, X.; Zheng, F.; Cui, T.; You, X. mmWave communications for 5G:
Implementation challenges and advances. Sci. China Inf. Sci. 2018, 61, 021301. [CrossRef]
138. Zhang, C.; Xu, W. Neural networks: Efficient implementations and applications. In Proceedings of the 2017 IEEE 12th International
Conference on ASIC (ASICON), Guiyang, China, 25–28 October2017; pp. 1029–1032.
139. Xu, W.; Wu, Z.; Ueng, Y.L.; You, X.; Zhang, C. Improved polar decoder based on deep learning. In Proceedings of the 2017 IEEE
International Workshop on Signal Processing Systems (SiPS), Lorient, France, 3–5 October 2017; pp. 1–6.
140. Yang, C.; Xu, W.; Zhang, Z.; You, X.; Zhang, C. A channel-blind detection for SCMA based on image processing techniques. In
Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 27–30 May 2018; pp. 1–5.
141. Xu, W.; Zhong, Z.; Be’ery, Y.; You, X.; Zhang, C. Joint neural network equalizer and decoder. In Proceedings of the 2018 15th
International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–5.
142. Xu, W.; Wang, Z.; You, X.; Zhang, C. Efficient fast convolution architectures for convolutional neural network. In Proceedings of
the 2017 IEEE 12th International Conference on ASIC (ASICON), Guiyang, China, 25–28 October 2017; pp. 904–907.
143. Xu, W.; You, X.; Zhang, C.; Be’ery, Y. Polar decoding on sparse graphs with deep learning. In Proceedings of the 2018 52nd
Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 28–31 October 2018; pp. 599–603.
144. Chih-Lin, I.; Sun, Q.; Liu, Z.; Zhang, S.; Han, S. The big-data-driven intelligent wireless network: Architecture, use cases, solutions,
and future trends. IEEE Veh. Technol. Mag. 2017, 12, 20–29.
145. Han, S.; Chih-Lin, I.; Li, G.; Wang, S.; Sun, Q. Big data enabled mobile network design for 5G and beyond. IEEE Commun. Mag.
2017, 55, 150–157. [CrossRef]
146. Li, R.; Zhao, Z.; Zhou, X.; Ding, G.; Chen, Y.; Wang, Z.; Zhang, H. Intelligent 5G: When cellular networks meet artificial intelligence.
IEEE Wirel. Commun. 2017, 24, 175–183. [CrossRef]
147. Gao, X.; Jiang, B.; Li, X.; Gershman, A.B.; McKay, M.R. Statistical eigenmode transmission over jointly correlated MIMO channels.
IEEE Trans. Inf. Theory 2009, 55, 3735–3750. [CrossRef]
148. McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-efficient learning of deep networks from
decentralized data. arXiv, 2016; e-prints.
149. Alkhateeb, A.; Alex, S.; Varkey, P.; Li, Y.; Qu, Q.; Tujkovic, D. Deep learning coordinated beamforming for highly-mobile
millimeter wave systems. IEEE Access 2018, 6, 37328–37348. [CrossRef]
150. Catak, E.; Catak, F.O.; Moldsvor, A. Adversarial machine learning security problems for 6G: MmWave beam prediction use-case.
In Proceedings of the 2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
Bucharest, Romania, 24–28 May 2021; pp. 1–6.
151. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks
and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [CrossRef]
152. Qin, Z.; Ye, H.; Li, G.Y.; Juang, B.H.F. Deep learning in physical layer communications. IEEE Wirel. Commun. 2019, 26, 93–99.
[CrossRef]
153. You, X.; Zhang, C.; Tan, X.; Jin, S.; Wu, H. AI for 5G: Research directions and paradigms. Sci. China Inf. Sci. 2019, 62, 21301.
[CrossRef]
154. Samuel, N.; Diskin, T.; Wiesel, A. Deep MIMO detection. In Proceedings of the 2017 IEEE 18th International Workshop on Signal
Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–5.
155. Ye, H.; Li, G.Y.; Juang, B.H. Power of deep learning for channel estimation and signal detection in OFDM systems. IEEE Wirel.
Commun. Lett. 2018, 7, 114–117. [CrossRef]
156. Wang, Y.; Zhang, S.; Zhang, C.; Chen, X.; Xu, S. A low-complexity belief propagation based decoding scheme for polar codes
decodability detection and early stopping prediction. IEEE Access 2019, 7, 159808. [CrossRef]
157. Xu, J.; Zhu, P.; Li, J.; You, X. Deep learning-based pilot design for multi-user distributed massive MIMO systems. IEEE Wirel.
Commun. Lett. 2019, 8, 1016–1019. [CrossRef]
158. Liang, F.; Shen, C.; Wu, F. An iterative BP-CNN architecture for channel decoding. IEEE J. Sel. Top. Signal Process. 2018, 12,
144–159. [CrossRef]
159. Lv, X.Z.; Wei, P.; Xiao, X.C. Automatic identification of digital modulation signals using high order cumulants. Electron. Warf.
2004, 6, 1.
160. Wang, T.; Wen, C.K.; Wang, H.; Gao, F.; Jiang, T.; Jin, S. Deep learning for wireless physical layer: Opportunities and challenges.
China Commun. 2017, 14, 92–111. [CrossRef]
161. O’shea, T.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575.
[CrossRef]
162. O’Shea, T.J.; Erpek, T.; Clancy, T.C. Deep learning-based MIMO communications. arXiv 2017, arXiv:1707.07980.
163. Tao, X.; Jiang, C.; Liu, J.; Xiao, A.; Qian, Y.; Lu, J. QoE Driven Resource Allocation in Next Generation Wireless Networks. IEEE
Wirel. Commun. 2019, 26, 78–85. [CrossRef]
164. Gesbert, D.; Hanly, S.; Huang, H.; Shitz, S.S.; Simeone, O.; Yu, W. Multi-cell MIMO cooperative networks: A new look at
interference. IEEE J. Sel. Areas Commun. 2010, 28, 1380–1408. [CrossRef]
165. Wang, D.; Zhang, Y.; Wei, H.; You, X.; Gao, X.; Wang, J. An overview of transmission theory and techniques of large-scale antenna
systems for 5G wireless communications. Sci. China Inf. Sci. 2016, 59, 081301. [CrossRef]
166. Kaelbling, L.P.; Littman, M.L.; Moore, A.W. Reinforcement learning: A survey. J. Artif. Intell. Res. 1996, 4, 237–285. [CrossRef]
Sensors 2022, 22, 3589 35 of 36
167. Wang, J.; Guan, W.; Huang, Y.; Schober, R.; You, X. Distributed optimization of hierarchical small cell networks: A GNEP
framework. IEEE J. Sel. Areas Commun. 2017, 35, 249–264. [CrossRef]
168. Bogale, T.E.; Wang, X.; Le, L.B. Machine intelligence techniques for next-generation context-aware wireless networks. arXiv 2018,
arXiv:1801.04223.
169. Li, R.; Zhao, Z.; Sun, Q.; Chih-Lin, I.; Yang, C.; Chen, X.; Zhao, M.; Zhang, H. Deep reinforcement learning for network slicing.
IEEE Access 2018, 6, 74429–74441. [CrossRef]
170. Long, H.; Xiang, W.; Zhang, Y.; Liu, Y.; Wang, W. Secrecy capacity enhancement with distributed precoding in multi-relay wiretap
systems. IEEE Trans. Inf. Forensics Secur. 2012, 8, 229–238. [CrossRef]
171. Fakoorian, S.A.A.; Swindlehurst, A.L. On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J.
Sel. Areas Commun. 2013, 31, 1701–1713. [CrossRef]
172. Lin, C.H.; Tsai, S.H.; Lin, Y.P. Secure transmission using MIMO precoding. IEEE Trans. Inf. Forensics Secur. 2014, 9, 801–813.
173. Hanif, M.F.; Tran, L.N.; Juntti, M.; Glisic, S. On linear precoding strategies for secrecy rate maximization in multiuser multiantenna
wireless networks. IEEE Trans. Signal Process. 2014, 62, 3536–3551. [CrossRef]
174. Zhang, H.; Huang, Y.; Li, S.; Yang, L. Energy-efficient precoder design for MIMO wiretap channels. IEEE Commun. Lett. 2014, 18,
1559–1562. [CrossRef]
175. Wu, F.; Zhang, R.; Yang, L.L.; Wang, W. Transmitter precoding-aided spatial modulation for secrecy communications. IEEE Trans.
Veh. Technol. 2015, 65, 467–471. [CrossRef]
176. Weinand, A.; Karrenbauer, M.; Sattiraju, R.; Schotten, H. Application of machine learning for channel-based message authenti-
cation in mission critical machine type communication. In Proceedings of the European Wireless 2017 23th European Wireless
Conference, Dresden, Germany, 17–19 May 2017; pp. 1–5.
177. Jing, S.; Yu, A.; Liang, X.; You, X.; Zhang, C. Uniform belief propagation processor for massive MIMO detection and GF (2 n)
LDPC decoding. In Proceedings of the 2017 IEEE 12th International Conference on ASIC (ASICON), Guiyang, China, 25–28
October 2017; pp. 961–964.
178. Wen, C.K.; Jin, S.; Wong, K.K.; Chen, J.C.; Ting, P. Channel estimation for massive MIMO using Gaussian-mixture Bayesian
learning. IEEE Trans. Wirel. Commun. 2014, 14, 1356–1368. [CrossRef]
179. Sattiraju, R.; Kochems, J.; Schotten, H.D. Machine learning based obstacle detection for Automatic Train Pairing. In
Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway,
31 May–2 June 2017; pp. 1–4.
180. Vieira, J.; Leitinger, E.; Sarajlic, M.; Li, X.; Tufvesson, F. Deep convolutional neural networks for massive MIMO fingerprint-based
positioning. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–6.
181. Ortuno, I.; Ortuno, M.; Delgado Penin, J.A. Error correcting neural networks for channels with Gaussian noise. In Proceedings
of the Proceedings 1992—IJCNN International Joint Conference on Neural Networks, Baltimore, MD, USA, 7–11 June 1992;
pp. 265–268.
182. Sattiraju, R.; Weinand, A.; Schotten, H.D. Performance analysis of deep learning based on recurrent neural networks for channel
coding. In Proceedings of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems
(ANTS), Indore, India, 16–19 December 2018; pp. 1–6.
183. Hornik, K.; Stinchcombe, M.; White, H. Multilayer feedforward networks are universal approximators. Neural Netw. 1989, 2,
359–366. [CrossRef]
184. Zhang, X.; Kunz, A.; Schröder, S. Overview of 5G security in 3GPP. In Proceedings of the IEEE Conference Standards Communi-
cation Networks (CSCN), Helsinki, Finland, 18–20 September 2017; pp. 181–186.
185. Ni, J.; Lin, X.; Shen, X.S. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE
J. Sel. Areas Commun. 2018, 36, 644–657. [CrossRef]
186. Mahmood, N.H.; Alves, H.; López, O.A.; Shehab, M.; Osorio, D.P.M.; Latva-aho, M. Six key enablers for machine type communi-
cation in 6G. arXiv 2019, arXiv:1903.05406.
187. Yang, P.; Xiao, Y.; Xiao, M.; Li, S. 6G wireless communications: Vision and potential techniques. IEEE Netw. 2019, 33, 70–75.
[CrossRef]
188. Tariq, F.; Khandaker, M.R.; Wong, K.K.; Imran, M.A.; Bennis, M.; Debbah, M. A speculative study on 6G. IEEE Wirel. Commun.
2020, 27, 118–125. Available online: https://arxiv.org/pdf/1902.06700.pdf (accessed on 18 November 2021). [CrossRef]
189. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine Learning Paradigms for Next-Generation Wireless Networks.
IEEE Wirel. Commun. 2017, 24, 98–105. [CrossRef]
190. Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, H. Deep Learning for Physical-Layer 5G Wireless Techniques:
Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2019, 27, 214–222. [CrossRef]
191. Soltani, M.; Pourahmadi, V.; Mirzaei, A.; Sheikhzadeh, H. Deep Learning-Based Channel Estimation. IEEE Commun. Lett. 2019,
23, 652–655. [CrossRef]
192. Mashhadi, B.; Gündüz, D. Deep Learning for Massive MIMO Channel State Acquisition and Feedback. J. Indian Inst. Sci. 2020,
100, 369–382. [CrossRef] [PubMed]
193. Hu, S.; Rusek, F.; Edfors, O. Beyond massive MIMO: The potential of data transmission with large intelligent surfaces. IEEE
Transactions on Signal Processing 2018, 66, 2746–2758. [CrossRef]
Sensors 2022, 22, 3589 36 of 36
194. He, H.; Wen, C.K.; Jin, S.; Li, G.Y. Deep learning-based channel estimation for beamspace mmWave massive MIMO systems. IEEE
Wirel. Commun. Lett. 2018, 7, 852–855. [CrossRef]
195. Wei, Z.; Yuan, W.; Li, S.; Yuan, J.; Ng, D.W.K. Off-grid Channel Estimation with Sparse Bayesian Learning for OTFS Systems.
arXiv 2021, arXiv:2101.05629. [CrossRef]
196. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv.
Tutor. 2019, 21, 3682–3722. [CrossRef]
197. Chen, K.C.; Zhang, T.; Gitlin, R.D.; Fettweis, G. Ultra-low latency mobile networking. IEEE Network 2018, 33, 181–187. [CrossRef]
198. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2018,
6, 2241–2263. [CrossRef]
199. Challita, U.; Ferdowsi, A.; Chen, M.; Saad, W. Machine learning for wireless connectivity and security of cellular-connected UAVs.
IEEE Wirel. Commun. 2019, 26, 28–35. [CrossRef]
200. Wang, X.; Li, X.; Leung, V.C. Artificial intelligence-based techniques for emerging heterogeneous network: State of the arts,
opportunities, and challenges. IEEE Access 2015, 3, 1379–1391. [CrossRef]
201. Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future intelligent and secure vehicular network toward 6G: Machine-learning approaches.
Proc. IEEE 2019, 108, 292–307. [CrossRef]
202. Alhajri, R.; Zagrouba, R.; Al-Haidari, F. Survey for anomaly detection of IoT botnets using machine learning auto-encoders. Int. J.
Appl. Eng. Res 2019, 14, 2417–2421.
203. Shakiba-Herfeh, M.; Chorti, A.; Poor, H.V. Physical layer security: Authentication, integrity, and confidentiality. In Physical Layer
Security; Springer: Cham, Switzerland, 2021; pp. 129–150.
204. Liang, Y.C.; Niyato, D.; Larsson, E.G.; Popovski, P. 6G mobile networks: Emerging technologies and applications. China Commun.
2020, 17, 4. [CrossRef]
205. Liang, Y.; Poor, H.V.; Ying, L. Secure communications over wireless broadcast networks: Stability and utility maximization. IEEE
Trans. Inf. Forensics Secur. 2011, 6, 682–692. [CrossRef]
206. Tang, X.; Ren, P.; Wang, Y.; Han, Z. Combating full-duplex active eavesdropper: A hierarchical game perspective. IEEE Trans.
Commun. 2016, 65, 1379–1395. [CrossRef]
207. Abedi, M.R.; Mokari, N.; Saeedi, H.; Yanikomeroglu, H. Robust resource allocation to enhance physical layer security in systems
with full-duplex receivers: Active adversary. IEEE Trans. Wirel. Commun. 2016, 16, 885–899. [CrossRef]