0% found this document useful (0 votes)
2 views

sensors-22-03589

Uploaded by

Florinda Lazo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

sensors-22-03589

Uploaded by

Florinda Lazo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

sensors

Review
A Review of Fundamental Optimization Approaches and the
Role of AI Enabling Technologies in Physical Layer Security
Mulugeta Kassaw Tefera , Zengwang Jin and Shengbing Zhang *

School of Cyberspace Security, Northwestern Polytechnical University, 127 West Youyi Road, Xi’an 710072, China;
[email protected] (M.K.T.); [email protected] (Z.J.)
* Correspondence: [email protected]

Abstract: With the proliferation of 5G mobile networks within next-generation wireless communi-
cation, the design and optimization of 5G networks are progressing in the direction of improving
the physical layer security (PLS) paradigm. This phenomenon is due to the fact that traditional
methods for the network optimization of PLS fail to adapt new features, technologies, and resource
management to diversified demand applications. To improve these methods, future 5G and beyond
5G (B5G) networks will need to rely on new enabling technologies. Therefore, approaches for PLS
design and optimization that are based on artificial intelligence (AI) and machine learning (ML)
have been corroborated to outperform traditional security technologies. This will allow future 5G
networks to be more intelligent and robust in order to significantly improve the performance of
system design over traditional security methods. With the objective of advancing future PLS research,
this review paper presents an elaborate discussion on the design and optimization approaches of
wireless PLS techniques. In particular, we focus on both signal processing and information-theoretic
security approaches to investigate the optimization techniques and system designs of PLS strate-
gies. The review begins with the fundamental concepts that are associated with PLS, including a
discussion on conventional cryptographic techniques and wiretap channel models. We then move
Citation: Tefera, M.K.; Jin, Z.; Zhang,
S. A Review of Fundamental
on to discuss the performance metrics and basic optimization schemes that are typically adopted in
Optimization Approaches and the PLS design strategies. The research directions for secure system designs and optimization problems
Role of AI Enabling Technologies in are then reviewed in terms of signal processing, resource allocation and node/antenna selection.
Physical Layer Security. Sensors 2022, Thereafter, the applications of AI and ML technologies in the optimization and design of PLS systems
22, 3589. https://doi.org/10.3390/ are discussed. In this context, the ML- and AI-based solutions that pertain to end-to-end physical
s22093589 layer joint optimization, secure resource allocation and signal processing methods are presented. We
Academic Editor: Subhas
finally conclude with discussions on future trends and technical challenges that are related to the
Mukhopadhyay topics of PLS system design and the benefits of AI technologies.

Received: 10 April 2022 Keywords: physical layer security; optimization approaches; information theory; signal processing
Accepted: 5 May 2022
techniques; resource allocation; AI techniques
Published: 9 May 2022

Publisher’s Note: MDPI stays neutral


with regard to jurisdictional claims in
published maps and institutional affil- 1. Introduction
iations.
Currently, 5G wireless networks are fully commercialized worldwide and B5G net-
works are in the process of development and are supposed to be deployed within the
next few years. With the fast adoption of 5G technology, the number of users who utilize
Copyright: © 2022 by the authors.
wireless mobile networks has increased exponentially over the last few years. It is expected
Licensee MDPI, Basel, Switzerland.
that this rapid growth will continue to increase enormously due to the deployment of more
This article is an open access article smart applications and new enabling technologies within the upcoming B5G networks.
distributed under the terms and Future wireless networks will not only provide much higher spectral efficiency/data rates
conditions of the Creative Commons and lower latency but will also provide new services and technologies that can be applied
Attribution (CC BY) license (https:// in various vertical industries [1]. The presence of ubiquitous connections and the growing
creativecommons.org/licenses/by/ number of devices that are connected to the internet are expected to cause a challenge for
4.0/). efficient and reliable resource management systems [2–4]. Moreover, the rapid growth of

Sensors 2022, 22, 3589. https://doi.org/10.3390/s22093589 https://www.mdpi.com/journal/sensors


Sensors 2022, 22, 3589 2 of 36

the massive number of new devices that are connected to the internet and the Internet
of Things (IoT) is expected to cause a serious risk to network security if not manipulated
properly [5]. Therefore, when considering all of these capabilities, it can be seen that there
is a need for robust security mechanisms across all segments of 5G and B5G networks.
Conventionally, high-layer cryptography-based techniques have been widely adopted
to deal with any discrepancies that are associated with information confidentiality, which in-
clude data authentication, secret key establishment and secret dissemination [6]. However,
with the advancement in the computing capacities of eavesdropping devices, the above-
mentioned techniques may not be sufficient or may even become unsuitable when an extra
secure channel is required for secret key generation [7]. Recently, physical layer security
(PLS) has emerged as a promising means of addressing the eavesdropping computational
capability of secure transmission problems [8–12]. Compared to complex cryptography
techniques, PLS does not depend on the computational capacity of the eavesdropping
devices and, therefore, it has the benefit of reducing computational costs and resource con-
sumption. From the perspective of information-theoretic fundamentals, it has been found
that PLS can achieve secure and reliable communication even when network intruders have
very strong computing capabilities [13]. This approach to information security is especially
effective since it does not rely on underlying computational capabilities, but rather on
the characteristics of the transmission media, such as noise, fading and interference, and
it provides security guarantees that are independent from the computing power of the
eavesdropper. In general, the PLS approach presents distinct advantages and is well suited
for distributed processing systems and dynamic network configurations. Therefore, the
PLS approach can be used as an alternative supplement for computationally demanding
high-layer technologies to further ensure data security.
Although the PLS can be precisely evaluated using popular performance metrics,
such as secrecy capacity, secrecy rate, secrecy throughput, etc., which are discussed in
detail in the literature, security performance is quantified by maximizing the performance
difference between legitimate channels and wiretap channels [14–17]. This is intuitive since
PLS aims to enhance the received signal quality at the intended receiver or reduce the
performance of the wiretap channel relative to the legitimate channel. In this circumstance,
there is a need to allocate transmission power based on the states of the legitimate and
eavesdropper channels in order to improve the PLS, as transmission power affects the
signal quality at the intended receiver and eavesdropper. However, the allocation of
power in PLS is a challenging task. It relies heavily on the prior information that the
transmitter has on the channel state information (CSI) of the intended receiver and the
eavesdropper. Most of the optimization functions in PLS are non-convex because of the
characteristics of the logarithmic subtraction in security performance metrics. For instance,
when the transmission power increases, the capacity and reliability of the main channel
improve [13]. On the other hand, the capacity of the eavesdropper channel may also
improve and the probability of eavesdropping increases. Therefore, there is no universal
approach to achieving a global optimization for non-convex power allocation. Several
research works have been conducted to formulate and solve these optimization problems
in order to obtain stronger security [18]. In [19], instead of maximizing the secrecy capacity
of the main channel, suboptimal power allocation was presented to minimize the SINR at
an unintended receiver. However, the minimization of the SINR at an unintended receiver
is not assessed by direct performance metrics and the security measure cannot ensure
a non-negative rate of transmission. Moreover, a joint subcarrier and power allocation
mechanism were proposed in [20] for maximizing the secrecy capacity of OFDMA-based
wireless networks. Nevertheless, the performance of secrecy gain can be enhanced by
limited power allocation. Consequently, it is hard to achieve global quality of service (QoS)
constraints for secure transmission systems.
The mainstream studies on PLS as a method for characterizing an achievable se-
curity performance against eavesdropping have been extensively investigated from the
fundamental viewpoints of information theory for different communication scenarios and
Sensors 2022, 22, 3589 3 of 36

channel types and under different assumptions on the knowledge of CSI. These studies
have inspired the development of many signal processing design techniques [21–24]. In this
context, a large number of research works have been conducted, which have contributed
insightful thoughts and opportunities to the understanding of practical security designs,
optimization techniques, technology status, etc. For example, in [25–27], key technolo-
gies, technical challenges, and countermeasures were reviewed from the fundamental
viewpoints of design strategies that involve physical-layer authentication, secret key gen-
eration, wiretap coding, and multi-antenna techniques, and relay cooperation. Moreover,
the authors in [28,29] presented an extensive investigation of multi-antenna techniques
in multi-user wireless networks using different assumptions on the availability of CSI.
Providing security for multi-antenna techniques is an effective and powerful approach in
PLS that can offer higher spatial degrees of freedom. The survey paper in [30] also provided
a comprehensive overview of secure transmission designs from the viewpoints of informa-
tion theory and optimization problems using security performance metrics. Furthermore, a
comprehensive overview of fundamental classification and applications of existing PLS
techniques was presented by [31]. On the other hand, the challenges that face PLS were
reviewed in [32]. It can be seen that the hurdles facing PLS are issued from different
assumptions regarding the characteristics of wireless channels and eavesdropper models.
Naturally, the concept of optimization techniques in PLS plays a pivotal role in practi-
cal security design and thus, has received considerable attention from the research com-
munity. In this review paper, due to the importance of secure transmission design in most
practical scenarios, we were motivated to conduct a systematic overview of this research
direction. It has to be noted that these studies have been extensively investigated and
have been published in many PLS research works. Nevertheless, we outline a summary
of some of the interesting studies in Table 1. In contrast to the aforementioned works, our
review paper provides a brief overview of recent results and technical challenges for the
system design and optimization techniques for 5G wireless networks. The main focus of
this review paper is the existing techniques and design strategies for PLS optimization,
optimization problems, and the solutions that are related to wireless PLS. Moreover, it
inclusively discusses the applications of several enabling and computing technologies that
could improve the corresponding research challenges. In order to address the limitations of
existing optimization challenges, ML and AI technologies need to be efficiently integrated
into 5G networks in order to produce better security and resource management. The use of
ML and AI technologies within the field of mobile communication infrastructure has made
significant progress in ensuring security, reliability, and resource allocations in a dynamic,
robust and trustworthy way [33–36].
The contributions of this review paper are as follows. First, we introduced funda-
mental principles and different channel models. In this context, we briefly reviewed the
common scenarios and limitations of different security methods to understand the basic
theories that are related to PLS. Second, the information-theoretic security metrics and
application scenarios in PLS were investigated to provide a brief insight into secure design
strategies. Third, the potential research directions and technical challenges in PLS from
the perspectives of security design and optimization approaches were widely discussed.
Finally, we reviewed the potential advantages of using ML and AI enabling technologies
to further improve conventional security technologies. In summary, this review paper
identifies optimization challenges in terms of secure resource allocation and signal pro-
cessing techniques and presents potential solutions through the introduction of AI- and
ML-based technologies.
The structure of this review paper is outlined as follows. The abbreviations that
are used throughout the paper are described in Table 2. Then, Section 2 introduces the
fundamental concepts of PLS; specifically, the general system model, adversary model
and different types of wiretap channel models. The performance metrics that are used in
PLS to evaluate the security design strategies are discussed in Section 3. In Section 4, the
research directions and technical challenges are investigated; specifically, the main issues
Sensors 2022, 22, 3589 4 of 36

and technical challenges of system design and optimization techniques, which are discussed
from the viewpoints of secure resource management and signal processing techniques.
Section 5 explains the paradigms of ML and AI within 5G networks and their applications
in physical layer design and optimization. In Section 6, we present notable future directions
and open challenges, followed by a conclusion in Section 7.

Table 1. Summary of related studies.

Existing Papers Research Issues Important Content


Summary of the security requirements and threats in wireless
Examine the security threats and networks considering the network protocols at various levels of
[12] corresponding defense methods in data layers. Additionally, a comprehensive review of
PHY security. state-of-the-art PHY security and existing security protocols for
13 various wireless networks.
Discussion of the key technologies, limitations, and solutions of
A comprehensive survey on the basic
PHY security from the perspective of security coding,
[25] theories and key technologies of
physical-layer authentication, secret key generation, and
PHY security.
multi-antenna techniques.
Security threats and the corresponding Technologies, security attacks, and defense mechanisms in PHY
[26]
countermeasure techniques. security using game-theoretic approaches.
Recent technologies, optimization techniques, and limitations of
Overview of the key technologies of
[27] PHY security from the perspective of information-theoretic
PHY security.
security and wiretap channels.
Survey of multi-antenna techniques in multi-user networks for
A comprehensive investigation of
[28] improving the security performance of PHY security, but not
multi-antenna techniques.
considering CSI accuracy.
Investigation on multi-antenna techniques in PHY security for
A brief survey on multi-antenna
[29] improving secrecy performance considering the accuracy
techniques.
of CSI.
A comprehensive overview of the Survey on security designs and optimization techniques from
[30] optimization and design strategies of the viewpoints of information theory and security metrics in
PHY security. wireless PHY security.
Classification of the existing PHY security techniques and brief
Comprehensive overview of all existing
[31] discussion of the big picture they can be easily understood and
PHY security techniques.
applied in different communication systems.
Challenges of PHY security in real-world Identification of the existing assumptions and opportunities for
[32]
systems. applying PHY security in practical applications.
A comprehensive investigation of AI Identification of the existing challenges in the design and
[34] and edge optimization of PLS and design of an enhancement scheme for
computing (EC) for PLS. PLS application.

Table 2. Abbreviations and their full form definitions.

Acronyms Full-Form Definition


5G Fifth-generation mobile networks
AI Artificial intelligence
AF Amplify-and-forward
ANN Artificial neural networks
AWGN Additive white Gaussian noise
B5G Beyond fifth-generation networks
BER Bit error rate
BLER Block error rate
CNN Convolutional neural network
CSI Channel state information
Sensors 2022, 22, 3589 5 of 36

Table 2. Cont.

Acronyms Full-Form Definition


DF decode-and-forward
DL Deep learning
DNN Deep neural networks
FDD Frequency division duplexing
IoT Internet of Things
ILDP Interactive learning design paradigm
LDPC Low-density parity-check
LOS Line of sight
MISO Multiple-input single-output
MIMO Multiple-input multiple-output
ML Machine learning
mmWave Millimeter wave
NOMA Non-orthogonal multiple access
NDP Non-deterministic polynomial
QoS Quality of service
PLS PHY security/Physical layer security
PER Packet error rate
OFDM Orthogonal frequency division multiplexing
SDP Semi-definite programming
SOP Secrecy outage probability
SIMO Single-input multiple-output
SISO Single-input single-output
SDP Semi-definite programming
SNR Signal-to-noise ratio
SIPNR Signal-to-interference-plus-noise ratio
ReLU Rectified linear units
ZF Zero forcing

Note: In this paper, matrices are denoted by bold uppercase letters and vectors are denoted
by bold lowercase letters. The Euclidean norm, transpose, conjugate transpose, conjugate
transpose operation and mutual information are denoted by k. k, [.]T , [.] H , [.]† and I (.; .),
respectively. Without the loss of generality, x represents the set of optimization variables.

2. Fundamental Concepts
In this section, we provide insights into the general concepts and main preliminaries
that are associated with PHY security. First, we provide a brief overview of the basic system
model for PLS that is related to eavesdropping problems, as illustrated in Figure 1. Then,
we consider and discuss the hurdles of PLS from the perspective of the adversary model
that could prevent it from succeeding. The last part of this section presents several wiretap
channel models that adopt the common notations and scenarios that are considered in the
rest of the discussion.

2.1. Generic System Model


The typical network is where problems with PLS arise, which consists of a transmitter,
a legitimate (intended) receiver and a malicious eavesdropper, represented by Alice, Bob
and Eve, respectively. Figure 1 shows the general Alice–Bob–Eve model of a PLS system,
in which the transmitter and receiver communicate through the legitimate channel and
the eavesdropper makes a limited set of observations through a wiretap channel [37]. In
this setup, the eavesdropper aims to decode or obtain sensitive information from historical
observations of received signals. In other words, the objective of Alice is to use a secure
transmission strategy that can send a confidential message to Bob while making sure
that the eavesdropper is kept ignorant and is not able to glean any useful information
from the transmitted signals. In order to achieve security in this case, PLS techniques are
appropriately designed by exploiting the channel characteristics, such as noise, dispersion,
fading, interference, etc., along with efficient secure transmission strategies, such that the
In this setup, the eavesdropper aims to decode or obtain sensitive information from his-
torical observations of received signals. In other words, the objective of Alice is to use a
secure transmission strategy that can send a confidential message to Bob while making
sure that the eavesdropper is kept ignorant and is not able to glean any useful information
Sensors 2022, 22, 3589 from the transmitted signals. In order to achieve security in this case, PLS techniques6 of 36 are
appropriately designed by exploiting the channel characteristics, such as noise, disper-
sion, fading, interference, etc., along with efficient secure transmission strategies, such
that the information
information being
being sent sent
from fromtosource
source to is
receiver receiver is kept confidential
kept confidential from both
from both active and ac-
tive and passive
passive eavesdroppers.
eavesdroppers.

Figure 1. 1.
Figure Generic
Genericsystem
systemmodel
model of
of an Alice–Bob–Evechannel.
an Alice–Bob–Eve channel.

AsAs illustratedin
illustrated inFigure
Figure 1,1, the
thetransmitted
transmittedmessage
message signal M is
signal Mencoded X with
into into
is encoded 𝑋 awith
length n and transmitted via a wireless medium. The signals that are
a length 𝑛 and transmitted via a wireless medium. The signals that are received by Eve received by Eve and
andBob areare
Bob designated by Rby
designated 𝑅 Rand
E and B , respectively. The entropy
𝑅 , respectively. function of
The entropy the transmitting
function of the trans-
signal is denoted by H ( M ), while the residual uncertainty of Eve’s observations is given
mitting signal is denoted by 𝐻(𝑀), while the residual uncertainty of Eve’s observations
by H ( M/R E ). Taking the environment and scenarios into consideration, the availability of
is given by 𝐻(𝑀⁄𝑅 ). Taking the environment and scenarios into consideration, the avail-
CSI at Alice, Bob and Eve varies from full or partial channel knowledge to zero information.
ability
The aofpriori
CSI at Alice, Bob
knowledge and
that Eve varies
is available fromregarding
to Alice full or partial channel
the channel knowledge
information to zero
of the
information. The a priori knowledge that is available to Alice regarding
legitimate and eavesdropper channels is crucial for the determination of the corresponding the channel infor-
mation of optimization
secrecy the legitimatescheme
and eavesdropper
and PLS design. channels is crucialinfor
Nevertheless, the determination
practical of the
scenarios, it is
corresponding
logical to assume secrecy optimization
that the Alice is aware scheme
of the and PLS information
statistical design. Nevertheless, in practical
of the eavesdropper
but not of
scenarios, itslogical
it is instantaneous
to assume realizations. Such is
that the Alice information
aware of the includes the type
statistical of channel
information of the
distribution, the average gain of the received signal, the spatial direction
eavesdropper but not of its instantaneous realizations. Such information includes the type and the line-of-
of sight (LOS)
channel component.the average gain of the received signal, the spatial direction and
distribution,
the2.2.
line-of-sight (LOS) component.
Wireless Adversary Models
Due to the inherent characteristics of wireless communication, such as broadcast
2.2. Wireless Adversary Models
nature, openness and the superposition of the transmission medium, wireless networks are
Due to the
extremely inherent
vulnerable tocharacteristics
security attacks.ofWithin
wireless
thecommunication,
field of security, ansuch as broadcast
adversary refers na-
ture,
to aopenness and the who
wireless attacker superposition of theortransmission
aims to disrupt medium,
prevent transmitted wireless
signals fromnetworks
reaching are
the intended
extremely receiver.toTherefore,
vulnerable it is important
security attacks. Withintothe
consider
field ofadversaries when
security, an designing
adversary refers
to aa secure strategy
wireless in order
attacker who to measure
aims the effectiveness
to disrupt or prevent of the proposed
transmitted security
signals from system.
reaching
theSecurity
intendedattacks on wireless
receiver. networks
Therefore, it is can be mainly
important to classified
considerinto two types:when
adversaries activedesigning
attacks a
and passive attacks [38]. The concept of passive or active attacks is typically
secure strategy in order to measure the effectiveness of the proposed security system. to do with Se-
whether the adversary is actively injecting into the communication system or is merely
curity attacks on wireless networks can be mainly classified into two types: active attacks
listening to the ongoing transmissions [39]. Due to the various types of adversaries and the
and passive attacks [38]. The concept of passive or active attacks is typically to do with
vast nature of attacks, there is a need to identify the assumptions, goals and capabilities
whether
on whichthethese
adversary
differentistypes
actively
of PLSinjecting into the
are designed andcommunication systemthat
the potential challenges or is merely
could
prevent PLS from succeeding.
A relevant set of goals is important for the modeling of a rigorous and strong adversary
model. Naturally, a stronger adversary, i.e., with prior knowledge or more resources, could
be able to attack the wireless network more successfully. With the adversary model, the
assumptions of the adversary include its environment and resources, such as competency,
knowledge, equipment, devices, etc. The adversary aims to compromise and obtain secret
data content from within the communication system. These sets of data can be the legitimate
transmission data or the property of the authorized user, e.g., energy consumption [40,41].
Due to their exposure to various types of attacks, communication channels are required
to have determined capacities that enable them to resist and alleviate wireless attacks.
Sensors 2022, 22, 3589 7 of 36

These capabilities provide the adversary with reliable interactions that are based on the
context of secure transmission systems. In fact, many of the PLS approaches assume that
Alice has no knowledge of the eavesdropper’s CSI as the adversary is passive (i.e., not
actively modifying the data, just silently reading and observing the communication system).
On the other hand, some studies have found that Alice is sometimes assumed to know
about the CSI of the eavesdropper [42–44]. Furthermore, active attacks have sometimes
been observed, such as the denial of service, replay and node malfunction attacks that
are employed against PHY security approaches. As a security community, we need to
adopt a strong adversary model in which the adversary is cleverer and more active. Under
the implications of an adversary being an active attack, intruders use more intrusive and
aggressive methods that aim to deteriorate the received signal quality for the intended user.
The essential characteristics of a secure transmission system include authentication,
availability, integrity, access control, and secret dissemination [38]. These can be established
through appropriately designed signal processing strategies and channel coding techniques.
The adversary model that is used in most PLS approaches is different from that used
by the traditional cryptography and security community. Therefore, for the purpose of
addressing the challenges that face PLS, it is important to bridge the gaps between the
various adversary models that are used by the different communities. In the current review
paper, the PLS mainly focuses on the premise that the eavesdropper is passive, i.e., it does
not communicate with the other nodes in order to conceal its presence.

2.3. Wiretap Channel Models


The secrecy problem of a physical layer system involves the transmission of infor-
mation signals through the legitimate channel without conveying the information via
the wiretap channel. The PLS achieves perfect secrecy by exploiting an advantage of a
legitimate transmission channel in the presence of an eavesdropper. Therefore, the wiretap
channel model is a significant representative design that examines the relationship between
the physical layer secrecy and channel capacity within a wireless transmission system. In
general, the wiretap channel model consists of MIMO channels, multiple-access channels,
multi-user broadcast channels and other channels, such as relay channels, interference
channels, etc. [39].

2.3.1. MIMO Wiretap Channels


A MIMO network structure consists of multiple transmit and receive antennae that
allow for simultaneous secure broadcasts with less inference and noise. Providing phys-
ical layer secrecy via adaptations to the multi-antenna technique is a typical and essen-
tial type of security method, which can be applied in practical wireless communication
systems [45–47].
In such multi-antenna scenarios, a typical MIMO wiretap channel model includes
SISO, SIMO and MISO channels. In this review paper, we consider the more general
setting that was studied in [39], in which the transmitter (Alice) wants to reveal the secret
information to the intended receiver (Bob) over the main channel while the eavesdropper
(Eve) acquires a noisy version of the transmitted signal via the wiretap channel, as shown
in Figure 2.
In this setup, the Alice, Bob and Eve are equipped with multi-antenna systems, which
are denoted by N A , NB and NE , respectively. Furthermore, the CSI of the main transmission
and eavesdropper channels are denoted by H and G, respectively. The general represen-
tations of the signals that are received by Bob and Eve, respectively, are described by the
following equations:
y B = Hxs + nB (1)
y E = Gxs + nE (2)
H
 
where xs is the n A × 1 transmitted signal with a covariance matrix of Q X = E xs xs for
Q X > 0. H ∈ { NB × NA and G ∈ { NE × NA are the MIMO channel matrices from Alice to
Sensors 2022, 22, 3589 8 of 36

Bob and Eve, respectively. Since the channels are discrete memoryless channels at the
transmitter, each element of H and G obey the complex Gaussian distribution with channel
gain coefficients of hij and gij between the ith source antenna and the jth intended receiver
and eavesdropper antennae. The noise vector of the received signal antennae is assumed
Sensors 2022, 22, x FOR PEER REVIEW 8 of 37
to be a complex Gaussian noise vector, with each element of nB and nE designed as an
independent and identically distributed (IID) complex noise vector with the variance of σH 2

and σG2 , where hij ∼ { N 0, σH 2 and gij ∼ { N 0, σG2 .



In such multi-antenna
It assumed that nB ∈ { scenarios,
N B × 1 and na typical
N ×MIMO
E ∈ { E
wiretap channel
1 are zero-mean AWGNmodel includes
vectors at the
SISO, SIMO and MISO channels. In this review paper, we consider the
legitimate receiver, as well as at an eavesdropper, with nB ∼ { N (0, I )∼CN(0,I) andmore general set-
ting that was studied in [39],
nE ∼ { N (0, I ), respectively. in which the transmitter (Alice) wants to reveal the secret
 The2 maximum power of the transmitted signal from Alice is
information
assumed to betoP,
the intended
where E xreceiver
s ≤(Bob)
P for over thepower
a total main P.
channel whileEquations
Initiatively, the eavesdropper
(1) and
(Eve)
(2) areacquires
used as aa basic
noisyoptimization
version of the transmitted
tool signalthe
in PLS. Hence, viatypical
the wiretap
MIMO channel,
wiretapaschannel
shown
in Figure
model has2.been widely considered in PLS to ensure secure data transmission.

Figure2.
Figure 2. A
A system
system model
model for
for aa MIMO
MIMOwiretap
wiretapchannel.
channel.

2.3.2. In
Broadcast Wiretap
this setup, Channels
the Alice, Bob and Eve are equipped with multi-antenna systems, which
are denoted by 𝑵 , 𝑵model,
In this channel 𝑎𝑛𝑑 𝑵Alice simultaneously
, respectively. transmitsthe
Furthermore, secret data
CSI of thecontent to mul-
main transmis-
tiple receivers
sion and in the presence
eavesdropper channels of are
onedenoted
or morebyunintended users, as shown
H and G, respectively. in Figure
The general rep-3.
The commonof
resentations scenario for broadcast
the signals channelsbyisBob
that are received a multi-user
and Eve, cellular network,
respectively, in which
are described
the legitimate
by the following transmitter
equations:communicates with multiple intended receivers while being
protected from eavesdroppers in the downlink. It is assumed that one source Alice is
equipped with N A antennae and the intended 𝑦 = 𝑯𝑥I users + 𝒏𝑩and J eavesdroppers have NBi and (1)
NEj antennae, respectively.
In such scenarios, the signals that𝑦 are = received
𝑮𝑥 + 𝒏𝑬 by other users may interfere with (2)
the desired signal due to the conditions under which each receiver obtains the mixed
signals 𝑥 is all
where from 𝑛 × 1Furthermore,
theusers. transmitted the signal with a covariance
susceptibility matrix of 𝑄
of eavesdroppers may = also 𝑥 ] for
𝐸[𝑥 increase
× ×
𝑄 0. 𝑯 ∈ ∁ and 𝑮 ∈ ∁ are the MIMO channel
due to the opportunity for more information leakages in the downlink. Indeed, secrecy matrices from Alice to Bob
and Eve, respectively. Since the channels are discrete memoryless
performance is not only affected by the eavesdropper and the mixed signals but also by channels at the trans-
the
mitter, each element of 𝑯 and 𝑮 obey the complex Gaussian distribution
signals that are received by the other users [48]. Hence, a broadcast channel can be defined with channel
gain
as coefficients
a mixed of ℎ andwhich
multi-channel, 𝑔 between the ithby
is described source
[49,50]antenna
as follows:and the jth intended receiver
and eavesdropper antennae. The noise vector of the received signal antennae is assumed
to be a complex Gaussian ynoise Bi = vector,
Hi x s + nwith
Bi , f each 1, 2, . . . ,ofI, 𝒏𝑩 and 𝒏𝑬 designed as(3)
or i =element an
independent and identically distributed (IID) complex noise vector with the variance of
𝜎 and 𝜎 , where ℎ ~∁𝑁(0, y Ej𝜎= )Gand f or j =𝜎 1,).2, . . . , J,
j xs +𝑔nEj~∁𝑁(0, (4)
× ×
whereItxassumed that 𝒏𝑩 ∈ ∁ and 𝒏𝑬for ∈ ∁the confidential
are zero-mean AWGNwith vectors at the le-
s is the n A× 1 transmitted
 as at signal information a covariance
gitimate receiver, as well
H an eavesdropper,
matrix of Q X = E xs xs for Q X > 0. y Bi and y Ej are the signals with 𝒏 ~∁𝑁(0, 𝑰) ∼
𝑩 that are received by I)
CN(0, theandith
𝒏𝑬 ~∁𝑁(0, 𝑰), respectively. The maximum power of the transmitted signal from Alice is
intended user and jth eavesdropper, respectively. nBi and nEj are the complex noise vectors
assumed to be P, where 𝐸{‖𝑥 ‖ } ≤N 𝑃×for a total power P. Initiatively, Equations (1) and
at Bob and Eve, respectively. Hi ∈ { Bi NA and Gj ∈ { NEj × NA are the matrices for channels
(2) are used as a basic optimization tool in PLS. Hence, the typical MIMO wiretap channel
model has been widely considered in PLS to ensure secure data transmission.

2.3.2. Broadcast Wiretap Channels


In this channel model, Alice simultaneously transmits secret data content to multiple
Sensors 2022, 22, 3589 9 of 36
Sensors 2022, 22, x FOR PEER REVIEW 9 of 37

H and G from Alice to the intended receiver i and unintended user j, respectively. Compared
from
to theeavesdroppers in the
traditional MIMO downlink.
channel It isthe
system, assumed
design that one source
techniques Alice is
for secure equipped with
transmission over
𝑵broadcast
antennae and the
channels areintended I users
somewhat and J eavesdroppers
complicated. the 𝑵
have
This is because 𝑎𝑛𝑑 𝑵 leakages
information antennae,
to
eavesdroppers and the inter-user interference need to be mitigated simultaneously.
respectively.

Figure
Figure3.3.AAsystem
systemmodel
modelfor
foraabroadcast
broadcastwiretap
wiretapchannel.
channel.

2.3.3.InMultiple-Access
such scenarios, theWiretap Channels
signals that are received by other users may interfere with the
desired signal due to channels
Multiple-access the conditions under important
are another which each receiver
form obtains the
of multi-user mixedinsignals
network which
moreall
from than oneFurthermore,
users. legitimate source sends information
the susceptibility to a common
of eavesdroppers maydestination userdue
also increase in the
to
Sensors 2022, 22, x FOR PEER REVIEW 10 of 37
presence
the of eavesdroppers
opportunity that try toleakages
for more information intercept
in and obtain the Indeed,
the downlink. transmitted signals,
secrecy perfor-as
illustrated
mance in only
is not Figure 4.
affected by the eavesdropper and the mixed signals but also by the
signals that are received by the other users [48]. Hence, a broadcast channel can be defined
as a mixed multi-channel, which is described by [49] and [50] as follows:

𝑦 = 𝑯𝒊 𝑥 + 𝒏𝑩𝒊 , 𝑓𝑜𝑟 𝑖 = 1,2, … , 𝐼, (3)


𝑦 = 𝑮𝒋 𝑥 + 𝒏𝑬𝒋 𝑓𝑜𝑟 𝑗 = 1,2, … , 𝐽, (4)
where 𝑥 is the 𝑛 × 1 transmitted signal for the confidential information with a covari-
ance matrix of 𝑄 = 𝐸[𝑥 𝑥 ] for 𝑄 0. 𝑦 and 𝑦 are the signals that are received
by the ith intended user and jth eavesdropper, respectively. 𝒏𝑩𝒊 and 𝒏𝑬𝒋 are the complex
noise vectors at Bob and Eve, respectively. 𝑯𝒊 ∈ ∁𝑵 × and 𝑮𝒋 ∈ ∁𝑵 × are the matri-
ces for channels H and G from Alice to the intended receiver i and unintended user j,
respectively. Compared to the traditional MIMO channel system, the design techniques
for secure transmission over broadcast channels are somewhat complicated. This is be-
cause the information leakages to eavesdroppers and the inter-user interference need to
be mitigated simultaneously.
Figure4.4.AAsystem
Figure systemmodel
modelfor
fora amultiple-access
multiple-accesschannel.
channel.
2.3.3. Multiple-Access Wiretap Channels
InInthis
thismodel,
model,the
Multiple-access thetransmitters
transmitters
channels arerequired
are
are another required totocooperate
important cooperate
form ininorder
ordertonetwork
of multi-user toguarantee
guarantee secure
secure
in which
transmission
transmission over
over the
the multi-access
multi-access channel.
channel. However,
However, due
due toto the
the geographic
geographic
more than one legitimate source sends information to a common destination user in the isolation,
isolation, the
the
transmitters
transmitters need
need toto cooperate
cooperate in
in aa distributive
distributive manner.
manner. ItIt is
is assumed
assumed
presence of eavesdroppers that try to intercept and obtain the transmitted signals, as il- that
that k k transmitters
transmitters
areequipped
are equipped
lustrated with4.N𝑵
with
in Figure antennaeand
Ak antennae andthat
thatone
oneintended
intendeduser userand andone
oneeavesdropper
eavesdropperhave have
N𝑵B and
𝑎𝑛𝑑 𝑵E antennae, respectively. Thus, the signals that are received by the intended user
N antennae, respectively. Thus, the signals that are received by the intended user
and
andan aneavesdropper,
eavesdropper,respectively,
respectively,are described
are described asas[51]:
[51]:

k
y𝑦B ==∑ Hk𝑯
xs k 𝑥+ nB+ 𝒏 (5)
(5)
𝑩
k =1

𝑦 = 𝑮 𝑥 + 𝒏𝑬 (6)

where 𝑥 is the 𝑛 × 1 transmitted signal with an average power constraint or a covar-


Sensors 2022, 22, 3589 10 of 36

k
yE = ∑ Gk xs k + nE (6)
k =1

where xs k is the n Ak × 1 transmitted signal with an average power constraint or a covariance


matrix constraint. Hk ∈ { NB × NA k and Gk ∈ { NE × NA k are the channel matrices from Alice to
the intended user and unintended user, respectively. nE and nB are the AWGN vectors at the
eavesdropper and intended receiver, respectively. In this survey, the secure multiple-access
scenario is investigated from the fundamental viewpoints of information-theoretic security.

2.3.4. Interference Wiretap Channels


An interference channel is one of the channel models that are used in PLS, in which
multiple legitimate parties (i.e., Alice and Bob) communicate with each other at the same
time and using the same channel [52], as illustrated in Figure 5. At the same time, the
communication between Alice and Bob is observed and decoded by an eavesdropper.
Since all of the legitimate users are in the broadcast domain of service, there is a high
probability of information leakage within this communication system. In order to avoid
leakages to intended users and to enhance the security performance of the system, several
multi-antenna techniques have been studied in the existing literature, such as interference
cancellation and mitigation techniques [53,54]. It is assumed that the channel model with
K transmitter and receiver pairs communicates with unintended users, where Alice k is
equipped with N Ak source antennae and the destination receiver and unintended user each
have receiving antennae of NBk and NE , respectively. Hence, the signals that are received
by the intended user and Eve, respectively, are given by [27]:

k
y Bk = Hk xs k + ∑ Hki xs ki + nBk (7)
i 6=k

k
yE = ∑ Gi xsi + nE (8)
i =1

where xsi is the N Ai × 1 encoded signal of Alice with an average power constraint or a
covariance matrix constraint. Hki ∈ { NB k × NA i and Gi ∈ { NE × NA i are the channel matrices
from Alice to the intended receiver and unintended user, respectively. nE and nBk are the
AWGN vectors at the eavesdropper and intended user, respectively. Furthermore, a typical
configuration for interference channels with an external eavesdropper and an interference
alignment was studied in [55]. It was shown that when an interference channel uses an
interference alignment with separate confidential messages to reduce interference, the
secrecy of the system can be improved. On the other hand, when an interference channel
uses an interference alignment with an external eavesdropper, it lacks knowledge about
the CSI of the eavesdropper and the secrecy of the system can be compromised. Therefore,
the authors concluded that an interference alignment with separately secure information
can provide more secure degrees of freedom than that with an unintended user.

2.3.5. Relay Wiretap Channels


Cooperative relaying is one of the multi-antenna techniques that have been presented
to improve the PLS by increasing the quality of channel capacity between the source node
and the destination receiver. In a secure relay network, the source and a relay node cooper-
ate to improve the system security while preventing eavesdroppers. The two commonly
adopted examples of relaying protocols are the AF (amplify-and-forward) [56–58] and
DF (decode-and-forward) [59–61] schemes. Examples of typical relaying networks are
shown in Figures 6 and 7, which consist of a source (Alice), an intended receiver (Bob), the
cooperative relay node and an eavesdropper (Eve). The relay node functions in a DF mode.
uses an interference alignment with separate confidential messages to reduce interference,
the secrecy of the system can be improved. On the other hand, when an interference chan-
nel uses an interference alignment with an external eavesdropper, it lacks knowledge
about the CSI of the eavesdropper and the secrecy of the system can be compromised.
Therefore, the authors concluded that an interference alignment with separately secure
Sensors 2022, 22, 3589 information can provide more secure degrees of freedom than that with an unintended 11 of 36
user.
Sensors 2022, 22, x FOR PEER REVIEW 12 of 37

Sensors 2022, 22, x FOR PEER REVIEW 12 of 37


Figure
Figure5.5.Secure
Securecommunication
communicationusing an interference
using channel
an interference model.
channel model.

2.3.5. Relay Wiretap Channels


Cooperative
Figure 6. A systemrelaying
model forisaone of the
wiretap multi-antenna
relay techniques
channel in the that have been presented
first time slot.
to improve the PLS by increasing the quality of channel capacity between the source node
and the
It destination
is assumedreceiver. In a Bob,
that Alice, secure relay
the network,
relay node and the source
Eve areandequipped
a relay node
eachcoop-
with
erate
𝑵 ,𝑵 to improve
, 𝑵 𝑎𝑛𝑑 the
𝑵 system security
antennae, while preventing
respectively. In the firsteavesdroppers.
case, Alice sends The two
the 𝑵 commonly
× 1 infor-
adopted examples
mation signal of relaying
vector 𝑥 to theprotocols areThen,
relay node. the AF (amplify-and-forward)
the received signals at Bob, [56–58] andnode
the relay DF
(decode-and-forward)
and Eve, respectively,[59–61]
are givenschemes.
as [62]:Examples of typical relaying networks are shown
in Figures 6 and 7, which consist of a source (Alice), an intended receiver (Bob), the coop-
erative relay node and an eavesdropper 𝑦 ( )(Eve).
= 𝑯The𝑥 relay
+ 𝒏node𝑩 functions in a DF mode. (9)

𝑦 = 𝑯 𝑥 + 𝒏𝑹 (10)
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑬 (11)
where 𝑯 ∈ ∁ × , 𝑯 ∈ ∁ × and 𝑯 ∈ ∁ × are the matrices from Alice to the
Bob, the relay node and Eve, respectively. Obviously, 𝒏𝑩 , 𝒏𝑹 and 𝒏𝑬 denote the AWGN
vectors at Bob, the relay node and Eve, respectively. The relay node decodes the original
Figure 6. A system model for a wiretap relay channel in the first time slot.
Figure 6. A
message system
signal model
and for a wiretap
forwards relay channel in the first time slot.
it on to Bob.
It is assumed that Alice, Bob, the relay node and Eve are equipped each with
𝑵 , 𝑵 , 𝑵 𝑎𝑛𝑑 𝑵 antennae, respectively. In the first case, Alice sends the 𝑵 × 1 infor-
mation signal vector 𝑥 to the relay node. Then, the received signals at Bob, the relay node
and Eve, respectively, are given as [62]:

𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑩 (9)
𝑦 = 𝑯 𝑥 + 𝒏𝑹 (10)
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑬 (11)
where 𝑯 ∈ ∁ × , 𝑯 ∈ ∁ × and 𝑯 ∈ ∁ × are the matrices from Alice to the
Bob, the relay node and Eve, respectively. Obviously, 𝒏𝑩 , 𝒏𝑹 and 𝒏𝑬 denote the AWGN
vectors at Bob, the relay node and Eve, respectively. The relay node decodes the original
message signal and forwards it on to Bob.
Figure 7.
Figure 7. A
A system
systemmodel
modelfor
fora awiretap
wiretaprelay channel
relay in the
channel second
in the timetime
second slot. slot.

ItInisthe second that


assumed case,Alice,
the relay
Bob,node transmits
the relay nodeaand
newEve
version of 𝑥 witheach
are equipped a weighting
with N A , NB ,
×
vector 𝑥 ∈ ∁ of the encoded signal. Hence, the signals that are received at Bob
NR and NE antennae, respectively. In the first case, Alice sends the N A × 1 information and
Eve are described as:
signal vector xs to the relay node. Then, the received signals at Bob, the relay node and Eve,
respectively, are given as [62]: 𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑩 (12)
y B(1) = H AB xs + nB (9)
𝑦 ( ) = 𝑯 𝑥 + 𝒏𝑬 (13)
yR = H AR xs + nR (10)
y E(1) = H AE xs + nE (11)

Figure 7. A system model for a wiretap relay channel in the second time slot.
Sensors 2022, 22, 3589 12 of 36

where H AB ∈ { NB × NA , H AR ∈ { NR × NA and H AE ∈ { NE × NA are the matrices from Alice to


the Bob, the relay node and Eve, respectively. Obviously, nB , nR and nE denote the AWGN
vectors at Bob, the relay node and Eve, respectively. The relay node decodes the original
message signal and forwards it on to Bob.
In the second case, the relay node transmits a new version of xs with a weighting
vector xr ∈ { NR ×1 of the encoded signal. Hence, the signals that are received at Bob and
Eve are described as:
y B(2) = HRB xr + nB (12)
y E(2) = HRE xr + nE (13)

where HRB ∈ { NB × NR and HRE ∈ { NE × NR are the matrices from the relay node to Bob
and Eve, respectively. Without loss of generality, we investigated the decode-and-forward
(DF) cooperative channel model. Another type of cooperative relaying protocol is the AF
channel scheme, which has a great impact on the capacity of physical layer secrecy. An
extensive investigation of such an AF scheme for secure relay communication is presented
in [63,64].

3. Performance Metrics and Application Scenarios in PLS


Physical layer secrecy ensures information confidentiality by enhancing the perfor-
mance difference between the main transmission and the wiretap channels. The selection of
appropriate metrics is essential for this approach to secure transmission design. One of the
critical steps that must be executed after the design of secure physical layer transmission
is the proper measurement of the level of security using the right metric. Therefore, it is
essential to select suitable performance metrics that can quantify the relevant aspects. The
performance evaluation must indicate the level of security that the wireless schemes or
techniques can provide. However, various challenges are commonly being brought up by
different performance requirements, especially when the sequence of channel coding has a
finite block length [65].
In this section, we present the basic secrecy metrics that are usually adopted in the
design of efficient secure transmission strategies. It needs to be noted that the performance
metrics that are used in the literature mainly focus on keyless PLS technologies, which
are termed SINR-based performance metrics. SINR-based metrics are used to measure the
achievable performance of a secure design under confidentiality constraints, namely the
metrics that are related to the secrecy capacity/rate, secrecy throughput, power/energy
consumption, secrecy outage probability (SOP) and quality of service (QoS). To be more
specific, security metrics, as mentioned above, are commonly taken as the design metrics
(criteria) for the design and optimization of PLS paradigms.

3.1. Secrecy Capacity Metrics


The goal of secrecy metrics is to quantify and evaluate the security performance of a
communication system or a user’s privacy under the consideration of a specific adversary.
The limits of PLS are characterized by the channel secrecy capacity or the more general
trade-off between the maximum transmission rate and the secrecy capacity equivocation
rate [66–68]. In PLS, the secrecy rate is described as the data that are transmitted via the
given transmission medium per second, which are available on Bob’s channel but are not
decoded on the eavesdropper channel. More precisely, to assess the security performance
of a system, the achievable secrecy rate and the Gaussian channel inputs have usually
been considered in pioneering works [69]. Therefore, the secrecy rate can be defined
as the performance difference between the capacities of the main transmission and the
wiretap channel. Considering the PLS system model in Figure 1, the achievable rate of a
transmission strategy is described as:

Rs = [ R B − R E ]+ (14)
Sensors 2022, 22, 3589 13 of 36

where the conjugate transpose [ x ]+ , max {0, x }. R B and R E are the data transmission
rates of the Bob and eavesdropper channels from the source Alice to the legitimate user
and intruder, respectively. Basically, the rate of transmission Rs can be improved using
signal processing techniques and optimization approaches, which have been proven to
be the lower bounds of security channel capacity [69]. In the actual design of secure
transmission systems, a non-zero rate of transmission can be achieved using some multi-
antenna techniques, such as secure precoding, beamforming, adaptive resource allocation,
etc. Such techniques attempt to intentionally degrade the wiretap channel while enhancing
the channel quality for the intended receiver.
On the other hand, the performance metrics that are sometimes referred to as the upper
bounds of secrecy rate were defined by [70,71], which play a central role in PLS in terms of
secrecy capacity. More accurately, they describe the maximum transmission rate at which
confidential messages can be securely delivered to the intended user while preventing the
eavesdropper from decoding any important information within the communication. The
secrecy capacity of a wireless transmission is an essential theoretical tool for assessing the
performance of practical PLS system designs. By examining a channel’s secrecy capacity
and related features, information-theoretic security can provide common ground and
guidance for the design of secure wireless transmission systems. To maximize performance
capacity, the qualities of both legitimate and wiretap channels play a significant role in
AWGN channels [72]. This can be realized by optimizing the optimal input probability
distribution P(X) of mutual information [73], which can be expressed as:

Cs = max( I ( X; Y ) − I ( X; Z )) (15)
p( X )

where I ( X; Y ) = H ( X ) − H ( X/Y ) and I ( X; Z ) = H ( X ) − H ( X/Z ). X represents the


channel inputs that are sent by source Alice and Y and Z are the channel outputs that are
received and observed by Bob and the eavesdropper, respectively. It should be noted that
wiretap channels are degraded; therefore, the corresponding signals of X, Y and Z form a
Markov chain in any distribution of p( X ) [67,70]. Based on [72], the secrecy capacity of an
AWGN channel is defined as the difference between the capacities of the main transmission
channel and the wiretap channel, which is mathematically given as:

Cs = CB − CE (16)

where CB and CE are the secrecy capacities of the legitimate and wiretap channels, respectively.
In this case, it is possible to obtain a non-zero security capacity when the eavesdropper channel
is downgraded relative to the Bob channel. Specifically, the intended receiver and eavesdropper
channels are supposed to have variances of σB 2 and σE 2 , respectively.
It should also be noted that the secrecy capacity and secrecy rate that are discussed
above do not consider wireless fading channels. More precisely, it is assumed that Bob’s
channel is more substantial than the eavesdropper channel. However, in fading channel
environments, the channel gains for both legitimate and eavesdropper channels change
randomly over time while remaining constant in each time slot [70]. When considering the
features of fading channels, the average secrecy capacity must be assessed to improve the
resulting security. Consequently, the secrecy rate or secrecy capacity is a suitable metric
for these fading channel scenarios [66]. In order to assess the security within the actual
transceiver design, an achievable ergodic secrecy rate was proposed in [69] as a security
metric under the assumption of fading channels. When the transmitting power constraint
is P, the attainable secrecy rate can be defined as the maximum gap between the secrecy
rates of the main transmission and eavesdropper channels. When considering average
power, the secrecy rate of a secure transmission system is described as:
   
H P H P
RS = log2 1 + AB2 − log 1 + AE2 (17)
σB σE
Sensors 2022, 22, 3589 14 of 36

where σB 2 and σE 2 are the variance of noise vectors in the Bob and eavesdropping channels,
respectively. Therefore, the attainable rate of transmission is assumed to evaluate the secu-
rity performance of the designs for efficient transmission strategies under the consideration
of fading channels. However, the secrecy rate is different for different optimization and
signal design techniques. In order to evaluate better secrecy rate performances in multi-
antenna techniques, a novel approach to the optimization technique was discussed in [74].
Generally, the secrecy rate can be maximized through the allocation of power according to
the knowledge of the CSI of the transmitter. Therefore, when the combinations of CSI are
different at the source Alice, the attainable secrecy rate may be different.
In summary, the secrecy rate or secrecy capacity of an Alice–Bob–Eve channel is mainly
calculated using the difference between the capacities of the legitimate and eavesdropper
channels and the availability of the CSI of the transmitter. Although the secrecy rate and
secrecy capacity are well established and commonly used in information-theoretic security,
these metrics only reflect the achievable bounds of the random channel characteristics and
do not indicate the real security performance in practical design scenarios with various
service applications. In order to measure and improve the resulting secrecy in fading
channel environments, these metrics are extended to outage secrecy rate probability and
outage secrecy capacity [75].

3.2. Secrecy Outage Probability (SOP)


A secure transmission system may be affected by imperfect CSI and wireless fading
channels. Therefore, an appropriate secrecy metric needs to be adopted from the perspec-
tive of system design and signal processing approaches, which is referred to as secrecy
outage probability (SOP). The SOP mainly focuses on the difference between the error
probability rates of the legitimate user and the eavesdropper in order to achieve a practical
security performance. More precisely, it describes the probability that a detailed evaluation
of the secrecy rate for a specific secure transmission system is not achievable. This met-
ric specifically investigates the information security and reliability of data transmission.
Despite the importance of the conventional rate outage probability in characterizing and
evaluating the achievable secrecy performance of fading channels, the SOP has three main
weaknesses [76]: (1) the SOP cannot provide any insights into the capability of an eaves-
dropper to correctly identify secret messages; (2) the SOP cannot investigate the amount of
sensitive data that have been revealed to unintended users when a secrecy outage event
occurs; (3) the SOP cannot be related to the requirements of the quality of service (QoS) for
different application scenarios. Analogous to the traditional rate outage probability, the
SOP is used to estimate the probability that the instantaneous secrecy capacity Cs is below
than the actual secrecy rate R0s [77–80]. The SOP of this definition is expressed as:
n o
Pout ( Rs ) = Pr Cs < R0s (18)

More specifically, the outage secrecy incidents Cs < R0s in (18) indicate that the


rate of transmission cannot be executed by the main transmission channels and that the
secure communication would not be achieved. In this case, secure transmission would
only be achieved when the main transmission channel has a greater SNR than the wiretap
channel. On the other hand, the authors in [81] studied the SOPs and outage secrecy rates
of quasi-static flat fading channels. They showed that secure transmission can be ensured
even when the average SNR of the main transmission channel is less than the eavesdropper
channel. Furthermore, their results demonstrated that the instantaneous secrecy perfor-
mance of fading channel features would be greater than the secrecy performance of a
non-fading channel with the same average SNR. Basically, the instantaneous rate capacity
is different for the different realizations of fading channel scenarios. More precisely, the
average secrecy capacity is equal to the maximum instantaneous secrecy capacity for fading
channels. In order to maximize the secrecy performance of secure transmission strategies,
the transmission power is optimally allocated based on the statistical distribution of Bob’s
Sensors 2022, 22, 3589 15 of 36

channel and the instantaneous realization of the eavesdropper channel. Mathematically,


this can be defined as:
max {CB − E[CE ]}; s.t. 0 ≤ ∅ ≤ 1 (19)
where ∅ represents the ratio of power distribution across the main transmission channel
and E[CE ] is the expected capacity of the eavesdropper channel. The average secrecy
capacity (Cs ) can be expressed as:

Cs = CB − E[CE ] (20)

To be more specific, the Cs can be maximized through the allocation of power based
on the assumptions on the knowledge of CSI at the source node [82]. Therefore, the
Cs may be different when a source Alice has different knowledge about the CSI of the
legitimate channels. More generally, it has been shown that the CSI of a legitimate channel
is more important than the CSI of an Eve channel. An Alice can decide to send confidential
information when the condition of the legitimate channel is strong enough and when the
CSI is available at the transmitter. In this case, the CSI of the wiretap channel may not
be important for secrecy capacity. For example, when a source Alice only has the CSI of
the legitimate channel and not the CSI of the wiretap channel, the allocation of power can
be executed according to the information of the CSI of the legitimate channel. Thus, it
is possible to minimize the SOP by carefully modeling the achievable rate of the secrecy
capacity RS , the secrecy capacity of the legitimate channel R B and the conditions for secure
transmission [83].
In summary, the secrecy outage probability (SOP) is used in cases where the source
transmitter has very little information about the CSI of the intended receiver or the eaves-
dropper. The SOP is more applicable in conditions where the statistical CSI of a wiretap
channel is known to the source Alice. In general, the secrecy outage capacity/probability is
used to measure the reliability of secure transmission strategies.

3.3. Quality of Service (QoS)-Related Metrics


Compared to existing wireless communication networks, 5G and B5G networks have
very high data rates and higher coverage rates with significantly improved QoS. One of
the main demerits of employing traditional secrecy outage probability-based metrics for
5G networks is that they are not directly linked to the QoS requirements for different
service applications. Without loss of generality, the QoS-related metrics that are used
in this survey include SINR-based, PER-based and BER-based metrics. The SINR-based
metrics are the most widely used metrics for describing the performance difference between
the capacities of Bob and Eve channels. The theoretical basis of the SINR-based metrics
can be characterized as the quantitative relationship between the noise powers of the
legitimate channel and the Eve channel [29,30]. Additionally, the performance of the main
transmission and wiretap channels is also described by the QoS. Thus, the SINR-based
metrics are instantly linked to the QoS and this can help with the optimization and modeling
of secure transmission strategies. A maximum SINR performance of communication from
the source Alice to Eve and a minimum SINR performance from Alice to Bob imply that
the system performance for receiving signals is good enough in terms of the reliability
and security aspects. This includes the method for efficient secure communication that is
capable of obtaining the required maximum and minimum error levels for Eve and Bob,
respectively. In order to enhance the capacity of a transmission link, it is important to adopt
PLS techniques, such as beamforming. An example of this definition is the packet error
rate (PER) [84] and bit error rate (BER) [85], which can be analogously related to secrecy
throughput [86] and, therefore, the SINR. For the foundation of a transmission channel, the
BER requirement must be greater than the minimum desired level. In general, the physical
layer techniques exploit optimization problems to enhance the security of a transmission
strategy by reducing the BER of eavesdroppers. As a result, the BER can be utilized to
estimate the performance of a secure transmission strategy, as well as the QoS requirements.
Sensors 2022, 22, 3589 16 of 36

Furthermore, the authors of [87] provided an alternative design for a secure precoding
scheme, which was based on the QoS and SINR metrics. This design contains an optimal
power allocation and standardization framework schemes, which also realize the trade-off
between minimizing SINR at the eavesdropper and maximizing SINR at the legitimate
receiver. Despite the existing knowledge-rich approaches, secure and reliable transmission
strategies are still a predominantly open problem within physical layer design and optimiza-
tion systems. In these cases, the appropriate metrics are commonly used during security
design to estimate the attainable performance of transmission systems. Specifically, the
secrecy metrics that are listed in Table 3 are mostly considered to be the design criteria and
optimization constraints that are necessary for efficient secure communication strategies.

Table 3. Summary of performance metrics for PHY security.

Metric Types Definition Optimization Problems


The maximum (upper bound)
Secrecy capacity
of the secrecy rate [72].
The transmission rate that can Transmission effectiveness of
be genuinely supported by the secure communication
Secrecy rate main transmission channel strategies.
but not decoded on the
eavesdropper channel [85].
The probability that the actual
or targeted transmission rate
Secrecy outage Reliability and security of
is greater than the
probability (SOP) communication systems.
instantaneous secrecy capacity
[86–88].
The performance
improvement of secure
transmission strategies, which QoS and security of
Quality of service (QoS)
includes the SINR-based, transmission systems.
PER-based and BER-based
metrics [27,31,89].
The minimum power
consumption that is needed to
Resource consumption costs
Power/energy consumption ensure secure QoS
for secrecy performance.
requirements for different
services [90–93].

4. Research Directions for System Designs and Optimization Concepts


Mainstream studies on PLS system design can be generally summarized by two main
approaches. The first is related to secrecy features, which particularly focuses on the
characterization of security capacity and eavesdropping or the more general trade-off
between attainable secrecy capacity and confidentiality equivocation based on the concepts
of information-theoretic fundamentals. The second approach is related to secure system
design, which mainly focuses on the design and optimization of secure transmission
strategies through the use of signal processing techniques [37,69,94,95].
Many conventional technologies in physical layer security, without the consideration
of secrecy communication, can be reconstructed for secure data transmission under the fun-
damental framework of PLS. To realize the basic optimization problems and performance
metrics of PLS, the main issues and research directions are expected to include three candi-
dates for secure design strategies, as illustrated in Figure 8. These research topics are signal
processing techniques, secure resource allocation and secure antenna selection/cooperative
nodes. Improvements in secret communication within PLS can be supported by these
research topics [30]. The signal processing techniques utilize secure precoding and beam-
forming to achieve the design of efficient secure communication strategies. The secure
precoding and beamforming designs fully utilize the characteristics of multi-node and
Sensors 2022, 22, 3589 17 of 36

multi-antenna scenarios, which may form virtual or massive MIMO networks. Resource
allocation, which is usually adopted within conventional communication systems, includes
the allocation of power and subcarriers. It mainly focuses on resource management systems
Sensors 2022, 22, x FOR PEER REVIEW 18 of 37
that utilize multi-faceted wireless resources, including power, time slots and frequency.
Cooperative nodes or secure antenna selection, such as jammer selection, relay node selec-
tion and user selection, which are widely used in multiple node scenarios, have been fully
explored
scenarios,ashave
promising methods
been fully to improve
explored the design
as promising methodsof to
PLS. Such techniques
improve attempt
the design of PLS.
to select
Such appropriate
techniques cooperative
attempt to select nodes or antennae
appropriate from nodes
cooperative a candidate set to from
or antennae enhance the
a can-
efficiency
didate setof
tosecure
enhancedesign strategies.
the efficiency of secure design strategies.

Figure 8. Secure transmission strategies to improve the security and robustness of physical layer
Figure 8. Secure transmission strategies to improve the security and robustness of physical
designs.
layer designs.
Despite the unparalleled advantages of the research approaches that are mentioned
Despite the unparalleled advantages of the research approaches that are mentioned
above, it is worth noting that some drawbacks do exist. To achieve a fine-grained security
above, it is worth noting that some drawbacks do exist. To achieve a fine-grained security
performance, only using a single research approach may be difficult or even insufficient
performance, only using a single research approach may be difficult or even insufficient for
for future wireless systems. Therefore, the joint use of some of the above techniques that
future wireless systems. Therefore, the joint use of some of the above techniques that is
is based on several enabling technologies would be more efficient for ensuring the security
based on several enabling technologies would be more efficient for ensuring the security of
of the whole transmission system [34]. Typical examples include joint user scheduling and
the whole transmission system [34]. Typical examples include joint user scheduling and re-
resource allocation and the trade-off between reliability, security performance, latency,
source allocation and the trade-off between reliability, security performance, latency, energy
energy consumption, etc. Furthermore, considering joint strategies, examples of the ap-
consumption, etc. Furthermore, considering joint strategies, examples of the application of
plication of AI and ML technologies in physical layer security design and optimization
AI and ML technologies in physical layer security design and optimization are discussed in
are discussed in detail in Section 5.
detail in Section 5.
4.1.Main
4.1. Main Technical
Technical Challenges
Challenges in
in System
System Design
Design
Keyless-based PLS
Keyless-based PLS techniques
techniques are are well
well established
established transmission
transmissionstrategies
strategiesthatthatcancan
enhance the performance variation between the main transmission channel
enhance the performance variation between the main transmission channel and wiretap and wiretap
channels. Unlike
channels. Unlikeconventional
conventional transmission
transmission methods,
methods,the optimization objectives,
the optimization the con-
objectives, the
conditions of constrained optimization problems and the performance parametersthat
ditions of constrained optimization problems and the performance parameters thatare
are
associated with SINR-based security techniques are based on the characteristics
associated with SINR-based security techniques are based on the characteristics of wireless of wire-
less channels
channels and information
and information theorytheory secrecy
secrecy metrics.
metrics. For secure
For secure physical
physical layerlayer
designdesign
andand opti-
optimization schemes, the selection of suitable performance metrics is crucial.
mization schemes, the selection of suitable performance metrics is crucial. As illustrated As illus-in
trated 9,
Figure inmulti-dimensional
Figure 9, multi-dimensional
security and security andmanagement
resource resource management strategiescontain
strategies typically typi-
cally contain secure resource allocation and signal processing methods for
secure resource allocation and signal processing methods for cooperative wireless networks. cooperative
wireless allocation
Resource networks. systems
Resourceareallocation
employed systems are employed
by the network by the
operator, network
which operator,
are shown in the
which are shown in the top position; simultaneously, the signal processing
top position; simultaneously, the signal processing schemes are operated by transmitters, schemes are
operated
which by transmitters,
are positioned on thewhich
bottom. areMultiple-antenna
positioned on thetechniques
bottom. Multiple-antenna
have been widelytech- used
niques have been widely used in wireless networks due to their spatial degrees
in wireless networks due to their spatial degrees of freedom, which are offered by multi- of free-
dom, which
service are offered
networks. by multi-service
Although networks. Although
secure multi-antenna techniques secure multi-antenna
are widely tech-
implemented
niques are widely implemented in various design approaches, they can also be mathemat-
ically modeled as optimization problems to find the most favorable transmission solu-
tions. This can be realized and optimized by using information-theoretic security metrics
to design secure beamforming and precoding, appropriate antenna or relay node selection
and resource allocation. Most of the problems in PLS are caused by non-convex optimiza-
Sensors 2022, 22, 3589 18 of 36

in various design approaches, they can also be mathematically modeled as optimization


problems
Sensors 2022, 22, x FOR PEER REVIEW
to find the most favorable transmission solutions. This can be realized and
19 of 37
optimized by using information-theoretic security metrics to design secure beamforming
and precoding, appropriate antenna or relay node selection and resource allocation. Most
of the problems in PLS are caused by non-convex optimization due to the characteristics
metrics.
of Many
quadratic researchers functions
programming have carried outperformance
in the extensive work on formulating
metrics. and solving
Many researchers have
these optimization issues in order to obtain the maximum level of security [96].
carried out extensive work on formulating and solving these optimization issues in orderBy con-
sidering the complexity of these non-convex constraint functions, several
to obtain the maximum level of security [96]. By considering the complexity of thesesignal pro-
cessing techniques and optimization methods have been developed to solve
non-convex constraint functions, several signal processing techniques and optimizationthe corre-
spondinghave
methods optimization problems.
been developed to solve the corresponding optimization problems.

Power and Energy Allocation Subcarrier Allocation Resource block system

Beamforming

Relay/antenna
selection
Authorized Authorized
User User

Eavesdropper

Figure 9.
Figure 9. An
An illustration
illustration of
of multi-dimensional
multi-dimensional security
security and
and resource
resource management
management within
within aa multi-
multi-
service wireless network.
service wireless network.

Although many
Although many optimization
optimization methods
methods havehave been
been developed
developed to to cope
cope with
with the
the non-
non-
convexity of the the optimization
optimizationproblems
problemsininPLS PLSschemes,
schemes,there thereare still
are many
still many challenges
challenges to
solve within the existing schemes; specifically, the basic assumptions
to solve within the existing schemes; specifically, the basic assumptions that are related that are related to
system
to system design
design andandchannel
channelcoding
codingmodels.
models.Given
Giventhe thelimited
limitedresources
resourcesin in wireless
wireless net-
works, such
works, such as as energy
energy and bandwidth,
bandwidth, a common problemproblem that is associated with resource
management is the adequate exploitation of the resource constraints to attain the condi-
tions of thethe information-theoretic
information-theoretic security
security metrics.
metrics. In a transmission system with limited
resources, design
resources, designand andoptimization
optimizationschemes
schemesmustmust bebe considered
considered forfor
thethe resource
resource alloca-
allocation
tion
to thetovarious
the various consumers
consumers who who usedata
use the the data
overover the network
the network so assotoas to achieve
achieve a gooda good
per-
formance.
performance. Several existing
Several works
existing havehave
works discussed the fundamental
discussed the fundamental resource management
resource manage-
issues withinwithin
ment issues multi-dimensional wireless
multi-dimensional networks,
wireless such as
networks, power
such allocation,
as power subcarrier
allocation, sub-
allocation and joint
carrier allocation power
and jointand subcarrier
power allocation
and subcarrier [97–106].[97–106].
allocation The existing
The secure
existing resource
secure
allocation methods are
resource allocation generally
methods based on communication
are generally based on communicationnodes withnodesthree with
terminals
three(i.e.,
ter-
the Alice–Bob–Eve
minals model) and lack
(i.e., the Alice–Bob–Eve sufficient
model) investigation
and lack sufficient into multi-userinto
investigation scenarios and
multi-user
heterogeneous networks. On the
scenarios and heterogeneous other hand,
networks. On the existing
other hand, designtheand optimization
existing design and of signal
opti-
processing schemes are commonly based on the parallel fading channel
mization of signal processing schemes are commonly based on the parallel fading channel and AWGN, with
few
and investigations
AWGN, with few on massive MIMO on
investigations andmassive
millimeter
MIMO wave channels.
and millimeter Therefore, the PLS
wave channels.
is still a great
Therefore, thepotential
PLS is stillprospect
a great for 5G wireless
potential communication
prospect for 5G wireless systems to mitigatesys-
communication all
tems to mitigate all of these challenges. As discussed above, the complexity of networks
and channels can affect the corresponding optimization objectives, which results in addi-
tional non-convex optimization problems that are hard to address. The major challenge in
the existing signal processing methods is the computational cost of implementing optimal
Sensors 2022, 22, 3589 19 of 36

of these challenges. As discussed above, the complexity of networks and channels can
affect the corresponding optimization objectives, which results in additional non-convex
optimization problems that are hard to address. The major challenge in the existing signal
processing methods is the computational cost of implementing optimal secure precoding
and beamforming schemes in practice. When considering the challenges and problems
that are associated with system design, potential research directions and corresponding
enhancement schemes can be identified and evaluated by reaping the benefits of ML and
AI enabling technologies, which are discussed in detail in Section 6.

4.2. Optimization in PHY Security: Current Status and Main Issues


The information-theoretic studies on the investigation and characterization of attain-
able rates of security performance for multi-dimensional secure wireless networks that are
presented in [31,81,107,108] have inspired the optimization and system design of many
signal processing techniques. From the fundamental viewpoints of optimization objectives,
four representative techniques have been adopted in this area: (1) convex optimization;
(2) secure beamforming; (3) artificial noise (AN); and (4) zero-forcing (ZF) precoding.

4.2.1. Convex Optimization Techniques


Convex optimization has been widely used in PLS because it can effectively evaluate
information-theoretic security metrics to find the most favorable transmission solutions.
In PLS, the optimization problem refers to the problem of determining the performance
metrics, such as power consumption, secrecy outage probability, secrecy capacity or secrecy
rate, etc., which were discussed in Section 3. In the existing studies on PLS, there are some
convex optimization techniques that are widely used to resolve optimization problems,
such as in [109]. As mentioned earlier, due to the properties of the logarithmic subtraction
functions in the performance metrics, most of the optimization issues in PLS are either
non-convex or quadratic programming functions. These non-convex optimizations are
adopted to solve problems that are related to non-linear constraints and objective functions.
Therefore, non-convex optimization problems can be used in the design of complex global
and optimal solutions. Some common examples of non-convex optimization problems
include secure power allocation, power minimization and beamforming. In order to
achieve optimal solutions, the original non-convex problems need to be converted into
convex problems using other functions, such as SDP. Semi-definite programming (SDP)
can be used to optimize a linear constraint function under non-negative and linear equality
constraints. In general, in order to solve the problems of non-convexity optimization in
PLS system design, many optimization methods have been discussed in the literature, such
as semi-definite relaxation (SDR), alternating search, dual decomposition, etc. [37,97,110].

4.2.2. Secure Beamforming Techniques


The basic idea of beamforming is to transmit signals effectively in the direction of
Bob and Eve, which aims to enhance the signal quality of the main transmission channel
and degrade the quality of wiretap channels. Beamforming is a typical signal processing
method that has been shown to be a promising means to achieve PLS [95,111–113]. The
optimization concern of secure beamforming-based designs is to reduce the interference
signal at the intended receiver so that the desired recipient can receive the desired QoS via
the transmitted signal. For secure beamforming, the optimization problems are neither con-
cave nor convex due to the characteristics of the logarithmic functions in the performance
metrics. Due to this, optimization problems are solved using basic numerical calculations in
many situations, for example, as in [63,90,114–116]. However, the complexity of the numeri-
cal methods is computationally prohibitive, which affects the design of secure beamforming
within practical applications. In order to reduce the complexity, some low-computational
algorithms have been explored in the literature, which facilitate practical application sce-
narios, such as in [117–122]. Therefore, due to their simple design schemes, the developed
Sensors 2022, 22, 3589 20 of 36

algorithms are attractive alternatives that attempt to maximize secrecy performance and, at
the same time, minimize interference to the secure transmission.

4.2.3. Artificial Noise (AN) Techniques


AN is an effective technique for multi-antenna systems and has been extensively
considered within PLS in order to enhance communication security even further. The
essence of the AN technique is to generate noise in the null space of the main transmission
channel; simultaneously, it is also designed within the range of the wiretap channel [85]. The
basic idea is to generate an AN signal that is based on the assumptions of the eavesdropper
so that the intended receiver is not affected. This technique aims to degrade the quality of
the unintended receiver’s channel by adding a noisy signal, which is used to interrupt their
attacking abilities [123–125]. On the other hand, it is designed to avoid interference leakage
for the intended user. In multi-antenna scenarios, it is possible to adjust the directions of the
transmit and AN signal jointly through spatial beamforming by exploiting the degrees of
freedom to optimize the performance metrics. In practice, performance of the AN technique
depends on the knowledge of the CSI of the eavesdropper at the transmitter. Naturally,
knowledge of the full CSI of both the wiretap and legitimate channels is important for
practical security design and optimization schemes to attain the optimal performance
of secure transmission. When the CSI of the Eve channel is known at the source Alice,
the maximum spatial degrees of freedom are applicable, i.e., the beamformer is perfectly
designed. However, according to practical scenarios, the CSI of the eavesdropper is usually
either imperfect or unknown. Several methods have been proposed in the literature to
deal with these assumptions, such as those that are presented in [126,127]. They provide
the optimal power allocation and secure beamforming scheme between AN and transmit
signals in order to maximize the achievable secrecy performance. The major strength of the
AN design is that the offered secrecy performance matches the SNR well because when the
SNR increases at the eavesdropper, the power of the noise signal increases, along with the
transmitting power.

4.2.4. Zero-Forcing (ZF) Precoding Techniques


Precoding is another signal processing method that is used to deliver signals to the null
space of wiretap channels. In ZF precoding schemes, the source Alice that uses multiple
transmit antennae is based on the cancelation of unwanted signals at the destination node
in multi-user or multi-stream data transmission [128]. Some authors provided an iterative
algorithm to control the interference signals that are leaked to unauthorized users. The
design of secure precoding that is based on ZF beamforming was discussed in [129] and
requires both the complete CSI of the main transmission and wiretap channels at the
transmitter and that the number of intended user antennae is greater than that of the
eavesdropper. To be more specific, the security performance of ZF precoding becomes very
poor when knowledge of the CSI of the eavesdropper at the transmitter is limited, which
makes it less applicable.
In summary, the concepts of optimization objectives, constrained conditions and corre-
sponding performance parameters were discussed based on four basic signal processing
techniques in order to easily understand design and optimization problems. Although
optimization problems that use convex optimization achieve better secrecy performance
than the conventional secure beamforming and zero-forcing precoding techniques, convex
optimization is more complex and expensive to apply to different services within practical
scenarios. To tackle these network complexity and computational costs, service providers
should develop solutions to ensure reliability and provide secure resource management to
their customers in a robust, intelligent and reliable way. In the next section, we discuss the
use of AI and ML technologies as key enablers for achieving the above-mentioned system
performance metrics.
Sensors 2022, 22, 3589 21 of 36

5. Paradigms of AI for Physical Layer Optimization and System Design


In the face of new service requirements and heterogeneous networks, it is challenging
to meet the existing physical layer design and optimization techniques through the use
of one method alone. In order to solve the more complex optimization problems in PLS,
many enabling technologies will be used in B5G communication networks. As powerful
tools and intelligent problem-solving algorithms, ML and AI can be widely applied in the
design and optimization of physical layer security paradigms. In this section, examples
of ML- and AI-based solutions in physical layer design and optimization are discussed,
including point-to-point multi-antenna techniques, secure resource allocation and signal
processing methods.

5.1. Overview of AI and ML Enabling Technologies


As powerful and intelligent tools, AI and ML can be widely applied in the opti-
mization and system design of 5G network infrastructures in order to solve complex
problems [130–132]. AI and ML approaches have been widely used to solve complex
problems within the upper layers of open system interconnection models, such as the
deployment of wireless communication and cognitive radio relay networks, which pro-
duce significant performance improvements compared to secure wireless communication
systems that were designed using conventional methods [133]. However, considering
the recent success of current trends and the challenges of future wireless communication
systems, such as high-speed connection demands in complex scenarios with unknown
channel models, AI and ML approaches have now also been considered in the physical layer
of wireless transmission strategies [134–137]. Recent advances in AI and ML techniques,
especially deep learning (DL), reinforcement learning and convolutional neural networks
(CNN), have provided novel concepts and potential opportunities to solve these complex
problems. Extensive research has been conducted on the application of ML- and AI-based
methods in 5G and B5G networks, for example, as presented in [138–143]. Examples of
typical applications in the physical and data link layers include the use of DL or reinforce-
ment learning algorithms to evaluate and predict channel quality, the use of orthogonal
frequency division multiplexing (OFDM) for symbol detection at the receiving end, channel
encoding and decoding and dynamic spectrum random access, among other functions.
In channel quality assessment, deep neural network (DNN) algorithms analyze limited
pilot signals to help massive MIMO systems infer complete and accurate knowledge of CSI.
Therefore, performance enhancement, quality of service and low computational costs can
be achieved by applying CNN, DNN and reinforcement learning algorithms in channel
encoding and decoding.
Furthermore, AI learning-based methods have been used to design universal frame-
works for various technical challenges for base stations, characteristics and applications,
which have contributed to the enhancement of 5G wireless networks. AI algorithms can be
implemented to address various problems in resource utilization, network traffic and user
demand. They can make it possible to smartly coordinate 5G base stations (BSs) and other
core 5G network elements, such as user plane functions [144–146]. ML and AI schemes can
help to further improve reliability, security performance, energy efficiency and network
latency by developing integrated scheduling and efficient allocation schemes. Considering
the potential of PLS in the system design and optimization of 5G networks, the challenges
and corresponding opportunities for intelligent AI and ML technologies to achieve a high
level of security at the physical layer, as well as cross-layer applications, deserve to attract
more attention from the research community. AI and ML algorithms are suitable for the
analysis of future 5G networks and the adaption of resource management and network
protocols for different applications. These algorithms have their own different pros and
cons. An overview of some of the notable techniques and focused issues that are associated
with AI and ML technologies are presented in Table 4.
Sensors 2022, 22, 3589 22 of 36

Table 4. Overview of ML and AI techniques for physical layer design and optimization.

ML- and AI-Based Techniques Focused Issues Advantages Limitations

AI and edge Investigation of the gap between Robust PHY layer key generation
Complexity of training models for
computing (EC) [34] PHY security and AI–EC. schemes and secure resource various PLS issues.
management frameworks.
Achievement of the optimal
Enabling of secured visible light Avoidance of the
Deep reinforcement learning [35] solution between secrecy rate quantization error.
communication (VLC).
and utility.
Integration of wireless power Achievement of the trade-off Limitations of optimal scheme for
Integrated AI [36] transfers and cooperative between security performance
and energy consumption. solving more complex problems.
jamming for secure transmission.
Iterative water-filling algorithm A comprehensive investigation of Bridging of the gap between AI Challenging integration of AI and
[147] MIMO eigenmode transmission. and 5G technologies. 5G networks.
Distributed AI federated learning A brief survey on multi-antenna Contribution of robust and
fine-grained security metrics. Security issues at the device level.
[148] techniques.
RF beamforming Promising results for Lack of investigation into
Feed-forward DL model [149] security issues.
codeword prediction. beamforming problems.
Adversarial attacks for Complexity of adversarial
Adversarial DL model [150] beamforming prediction. Consideration of security issues.
training approach.

In the next subsections, we discuss some ML- and AI-based applications in the design
and optimization of 5G networks, which cover three different problems within the physical
layer of wireless networks, including secure multi-antenna techniques, secure resource
management and the optimization of signal processing methods.

5.2. AI for End-to-End Multi-Antenna Techniques


In conventional physical layer modules, secure transmission design usually relies on
non-interactive random-coding arguments and mainly focuses on the establishment of the-
oretical achievements. In this case, it is possible to achieve a good security performance by
demonstrating the existence of PLS codes, such as low-density parity-check (LDPC) codes,
lattice codes and polar codes. However, the design of explicit security using these conven-
tional methods is less reliable in practical and realistic communication systems [151]. To be
more specific, the optimization problems of the physical layer of beyond 5G networks are
non-deterministic polynomial (NP) problems and are becoming more challenging as there
is a series of barriers between different signal processing blocks, such as non-orthogonal
multiple-access (NOMA) channel encoding and signal detection, the space–time processing
of multiple user MIMOs and channel decoding for polar or LDPC codes [152,153]. In such
scenarios, LDPC codes have a higher decoding complexity in large blocks or under poor
noise conditions, while polar codes require multiple iteration convergences to achieve
optimal performance.
In order to cope with the existing gaps, AI and ML techniques have been applied to
simplify and handle physical layer modules [154–157]. Specifically, deep neural network
(DNN) algorithms have been widely implemented in various signal processing function
blocks, such as MIMO detection [158], polar code decoders [139], modulation recogni-
tion [159], etc. AI can be mainly applied to CSI processing, receiver design and end-to-end
link design at the physical layer. For example, neural networks in deep learning have
been used to learn the compressed representations of high-dimensional CSI in wireless
communication, thereby reducing the CSI feedback overhead. For the physical layer mod-
ules, there have been many related AI-based works that have addressed the design and
optimization problems of end-to-end multi-antenna systems. In [160], DNN was employed
for a joint optimization scheme in end-to-end communication. In contrast to conventional
channel equalizer and channel decoder approaches that follow non-interactive schemes,
the DNN-based joint optimization consists of an adaptive learning (encoding) module and
an end-to-end communication module, which are interactive. This approach is very useful
for reducing the computational cost of training and online tasks.
for a joint optimization scheme in end-to-end communication. In contrast to conventional
channel equalizer and channel decoder approaches that follow non-interactive schemes,
Sensors 2022, 22, 3589 the DNN-based joint optimization consists of an adaptive learning (encoding) module 23 ofand
36
an end-to-end communication module, which are interactive. This approach is very useful
for reducing the computational cost of training and online tasks.
Furthermore,an
Furthermore, anANN-based
ANN-basedautoencoder
autoencoderwas wasproposed
proposedinin[161]
[162]totogenerate
generateend-to-
end-to-
end system optimization, which comprises a model-based solution
end system optimization, which comprises a model-based solution and adaptive learning and adaptive learning
modulesthat
modules thatcan
can obtain
obtain important
important information
informationininreal-time
real-timescenarios.
scenarios. This
Thisframework
framework has
established
has established applications
applications in multi-antenna
in multi-antenna MIMO MIMO channel systems,
channel which
systems, consist
which of three
consist of
functional
three blocks:
functional the transmitter,
blocks: the MIMO
the transmitter, channel
the MIMO generator
channel and theand
generator receiver, as illus-
the receiver,
astrated in Figure
illustrated 10. The10.
in Figure results showed
The results that thethat
showed learning modulemodule
the learning aims toaims
encode the data
to encode
the data inputs in an unsupervised fashion, which has the ability to redesign sets ofat
inputs in an unsupervised fashion, which has the ability to redesign sets of data inputs
the output
data inputs module. The functionality
at the output module. The of functionality
the autoencoder is obtained
of the by iteratively
autoencoder training
is obtained by
the transmitter
iteratively trainingandthe receiver modules
transmitter andwith blockmodules
receiver error ratewith(BLER),
blockwhich
error israte
represented
(BLER),
as fully
which connected DNNs.
is represented as fullyThe resultingDNNs.
connected systemThe hasresulting
advantages for guaranteeing
system has advantages energy
for
constraints. This
guaranteeing energyscheme was later
constraints. extended
This schemeby other
was laterresearchers
extended by to include multiple user
other researchers to
MIMOsmultiple
include [163] inuser
order to achieve
MIMOs [162]better
in orderenhanced
to achieveBER performances
better enhanced BER in theperformances
MIMO chan-
innels. This functionality
the MIMO channels. This is performed by is
functionality learning
performedfrombythe input data
learning fromand training
the input dataforand
dif-
training for different
ferent scenarios with scenarios
multiplewith multiple
antennae andantennae
variousand various
levels of CSIlevels of CSI knowledge.
knowledge.

Figure10.
Figure 10.An
Anillustration
illustrationofofa aMIMO
MIMOchannel
channelautoencoder.
autoencoder.

Therefore,
Therefore,existing
existingoptimization
optimizationproblems
problemshave haveproved
provedthe
theadvantages
advantagesofofusing
usingAI,
AI,
specifically DNN-based schemes for end-to-end communication without the
specifically DNN-based schemes for end-to-end communication without the assumption assumption
ofofseveral
severalmodels
modelsininthe
theexisting
existingconventional
conventionaldesign
designconcepts.
concepts.Thanks
Thankstotothe
thepotential
potentialofof
autoencoders,
autoencoders,the complicated
the complicated issues thatthat
issues cannot be modeled
cannot by conventional
be modeled methods
by conventional can
methods
be
cansolved by training
be solved the scenarios
by training and then
the scenarios and optimizing the performance.
then optimizing the performance.

5.3.
5.3.Applications
ApplicationsofofAI
AIininSecure
SecureResource
ResourceAllocation
Allocation
Resource management is a crucial issue for 5G networks, including inter-cell resource
Resource management is a crucial issue for 5G networks, including inter-cell resource
block allocation, computing power and energy allocation, available spectrum and commu-
block allocation, computing power and energy allocation, available spectrum and com-
nication channels, massive MIMO user clustering and beamforming resource allocation in
munication channels, massive MIMO user clustering and beamforming resource alloca-
distributed network structures [163–165]. Secure resource allocation in B5G networks is a
tion in distributed network structures [164–166]. Secure resource allocation in B5G net-
more challenging and multi-objective performance optimization problem. The essential
works is a more challenging and multi-objective performance optimization problem. The
task of resource allocation in 5G networks is conducted to predict future service requests,
essential task of resource allocation in 5G networks is conducted to predict future service
mobility and the location of users. Since the emergence of new technologies and services
requests, mobility and the location of users. Since the emergence of new technologies and
in 5G that typically have limited power and restricted processing and are delay-sensitive,
services in 5G that typically have limited power and restricted processing and are delay-
it has become useful to match these multi-objective requirements with minimum valu-
sensitive, it has become useful to match these multi-objective requirements with mini-
able resource costs, such as power and energy. The existing secure resource management
mum valuable resource costs, such as power and energy. The existing secure resource
and utilization schemes that have been widely adopted in traditional design concepts are
management
based and utilization
on end-to-end performanceschemes that with
metrics, have less
beenfocus
widely
on adopted in traditional
multi-dimensional design
wireless
concepts are based on end-to-end performance metrics, with less
networks. This requires the help of AI and other intelligent computing technologiesfocus on multi-
to
overcome these gaps in the existing schemes. The application of AI and ML techniques has
great potential in these areas.
In this subsection, we consider typical multi-dimensional downlink resource alloca-
tion in a multi-cell, multi-user OFDMA-based scenario, as shown in Figure 11. In this
framework, since the OFDM resource block (RB) distribution to various users within the
same cell is orthogonal, the intra-cell interference signals are removed over wireless chan-
nels. The detection of OFDM symbols at the receiver usually depends on a receiver that
uses maximum throughput estimation for evaluation, but this method is very sensitive to
CSI errors and the accuracy of the model itself. The design of RB allocation for users is
mostly carried out using non-linear programming, which involves non-deterministic pol-
Sensors 2022, 22, 3589 ynomial (NP) optimization problems [154]. Nevertheless, the high complexity of this 24 ofop-
36

timization method is prohibitively expensive; hence, it is hard to apply this method in


practical scenarios. Therefore, it is evident that the traditional method for reducing com-
same cell is cost
putational orthogonal, the intra-cell
is becoming interference
less reliable. signals
By applying AIare removed
to this over wireless
NP problem, chan-
resource al-
nels. The can
location detection of OFDM
be further symbols
improved at the receiver
compared usually
to existing depends
resource on a receiver
management that
schemes.
uses
Moremaximum throughput
specifically, reinforcement estimation
learning forapproaches
evaluation,(e.g.,
but this method is very
the Q-learning sensitive
algorithm) can
to CSItoerrors
help andresources
allocate the accuracy of the model itself. The design of RB allocation for users
efficiently.
is mostly
The carried out algorithm
Q-learning using non-linear programming,
was designed with thewhich
goal ofinvolves non-deterministic
maximizing the entire sys-
polynomial (NP) optimization problems [153]. Nevertheless, the high
tem performance by avoiding the allocation of similar RBs to neighboring cells that complexity of this
are
optimization
located close method is prohibitively
to boundaries. expensive; for
The main motivation hence, it is hard
applying to apply
Q-learning to this method
RB allocation
in
inpractical
downlinkscenarios.
OFDM systemsTherefore,wasitdiscussed
is evidentinthat theAccording
[154]. traditionaltomethod forQ-learning
[150], the reducing
computational
scheme can solve costthe
is becoming less reliable.
NP combinatorial By applying
optimization AI to this
problems thatNP
areproblem, resourcein
hard to handle
allocation can be further improved compared to existing resource management
the existing static partitioning of networks. Intuitively, the Q-learning algorithm allows schemes.
More specifically,
an agent reinforcement
to interactively learn learning
the optimal approaches
allocation(e.g., the Q-learning
policy by sharing algorithm) can
resources with
help to allocate
neighboring cells.resources efficiently.

Figure11.
Figure 11.An
Anillustration
illustrationofofdownlink
downlinkresource
resourceallocation
allocationfor
foraamulti-service
multi-servicenetwork.
network.

TheQ-learning
The main strategies include:
algorithm was (1) the allocation
designed with theofgoal
freeofRBs to users inthe
maximizing theentire
samesystem
cell by
performance by avoiding
assigning higher allocation
SIRs to the users; of similar
(2) the RBs updates
interactive to neighboring cells thatRBs
of the allocated are located
for each
close
user, to boundaries.
based The main
on the Bellman motivation
equation [167],for
in applying Q-learning
order to improve the to RB allocation
system throughputin
downlink
performance;OFDM systems
(3) the was discussed
avoidance of allocatingin the
[153].
same According
RB that hasto been
[149],assigned
the Q-learning
to users
scheme can solve
in neighboring the NP
cells. combinatorial
Consequently, optimization
by employing theproblems
Q-learning that are hard to
algorithm, handlecan
a system in
the existing static partitioning of networks. Intuitively, the Q-learning algorithm
maximize its overall capacity by adjusting the RB allocation of each user. Additionally, allows
an
theagent to interactively
Q-learning approachlearn the optimal
promotes the fairallocation
allocation policy
of userbypower
sharing resources
since with
the involved
neighboring
users cannotcells.
acquire essential SIR from neighboring cells. Furthermore, a generalized
NashThe main strategies
equilibrium include:
framework was(1) the allocation
proposed of to
in [168] free RBs topower
provide users in the same cell
optimization for
by assigning higher SIRs to the users; (2) the interactive updates of the allocated RBs for
each user, based on the Bellman equation [166], in order to improve the system throughput
performance; (3) the avoidance of allocating the same RB that has been assigned to users
in neighboring cells. Consequently, by employing the Q-learning algorithm, a system can
maximize its overall capacity by adjusting the RB allocation of each user. Additionally,
the Q-learning approach promotes the fair allocation of user power since the involved
users cannot acquire essential SIR from neighboring cells. Furthermore, a generalized Nash
equilibrium framework was proposed in [167] to provide power optimization for users
from multi-cells that are allocated to the same RB. Moreover, to design efficient resource
allocation policies for 5G, the possible applications of AI were discussed in [168,169].

5.4. AI for Signal Processing Design


One important study on PLS system design was issued to explore optimization tech-
niques and signal processing design fundamentals. The signal processing methods in
Sensors 2022, 22, 3589 25 of 36

5G networks, such as secure precoding and beamforming, have been utilized to enhance
various performance requirements in secure transmission systems. By optimizing these
techniques, the appropriate performance metrics of PLS can be achieved while the desired
QoS can also be ensured at the same time [170–175]. However, due to the complexity of
the hardware and mathematical models in these performance metrics, the optimization
problems of existing signal processing schemes become more and more complicated for
future network environments [64,90,114–116], which means that: (1) it is hard to solve
these problems using numerical methods because they are too sophisticated and have
many imperfections in practical applications; (2) in order to obtain optimal design schemes,
the hurdles between various signal processing barriers need to be reduced using optimal
solutions; (3) the vastly increasing complexity of the systems and hardware installation
that are needed to mitigate computational cost requires robust and intelligent algorithms
to make system design more practical.
To cope with these challenges, the assistance of modern computing technologies has
been used as a performance metric. On the other hand, ML and AI techniques can benefit
from the optimization of traditional signal processing techniques. Some of the application
examples include secure physical layer modules [176,177], channel estimation and equal-
ization [178], obstacle detection and localization [179,180], modulation recognition [159]
and channel coding and estimation [181,182]. The advantages of employing AI and ML
technologies in 5G networks compared to traditional signal processing methods are two-
fold. First, AI and ML approaches are designed to achieve optimal end-to-end performance
metrics, while conventional schemes are performed by logically discrete blocks that are
separately optimized. Second, artificial neural networks (ANNs) are known to be highly
reliable and self-adaptive and have also been shown to have computationally universal
functions [183]. ANNs are used to learn inverse mapping from received interference signals
to the original signals without the need for explicit channel estimation and equalization.
The joint optimization of transmitters and receivers within specific channel environments
can produce non-ideal effects in the wireless channel and consequently, transmission
performance is enhanced. By applying ANNs in signal processing schemes, we can im-
prove optimal performance metrics as long as a reliable hardware implementation model
exists. In summary, ML- and AI-based algorithms are more efficient and powerful for
hardware implementation and have extensive applications that are not limited to signal
processing schemes.

6. Discussions on Future Research Directions and Challenges


In the previous sections, it was shown that PLS has received significant research inter-
est within the fields of information-theoretic fundamentals and signal processing. However,
future wireless networks will become increasingly heterogeneous and will have new fea-
tures and more complex network environments. Even though the research community
has made great efforts in the existing works, many technical challenges still exist, namely
the basic assumptions regarding channel types, eavesdropper models, the availability of
CSI and application scenarios. Most of the existing assumptions that are used in PLS
may be insufficient or unreliable for future wireless communication in practical security
systems. Hence, there are still many technical challenges that need to be discussed in
order to facilitate the integration of PLS into practical design systems. In the following
section, we discuss some future directions and notable challenges, which are based on the
knowledge that has been gained from the existing literature. It should be noted that only a
few research directions are discussed in this section because the future work regarding PLS
is a pervasive field of study.

6.1. The Joint Optimization of Reliability, Security and Resource Allocation


An optimal global design for system security, reliability and secure resource allocation
is an important research idea that has not yet been well discussed in the literature. Newly
introduced features and technologies in the core 5G network make the design of secure
Sensors 2022, 22, 3589 26 of 36

transmission approaches necessary and challenging. To enhance the optimal adaptability of


user experience and network performance in wireless transmission systems, the reliability,
security and allocation of necessary resources should be considered jointly in secure system
design [12,184]. However, in many existing studies, except for some studies that have
investigated the trade-off between energy consumption and security performance, most
methods have been considered separately and individually to minimize the complexity of
security design [9]. Therefore, achieving a joint optimization between reliability, security
performance and resource consumption with low latency is a challenging problem. In this
case, when the three optimization factors interact with each other, the proposed security
mechanisms become potentially optimal and trustworthy. In order to achieve global opti-
mization performance, some researchers [34] proposed an AI-based integrated scheduling
system that can realize an optimal power allocation scheme and improve the security and
reliability of legitimate transmission. The proposed scheme was designed based on the
integration of AI and edge computing to reduce the computation latency within transmis-
sion channels. The proposed framework can be applied to the PLS paradigm to design
signal processing techniques and secure resource allocation schemes. However, the energy
dynamics within the storage capacities of smartphone devices and the distributed resource
management in edge cloud computing make this framework challenging to offload tasks
for users. Therefore, this area of research is still in its infancy and many issues need to be
investigated in future research.

6.2. The Joint Design of Classic Cryptographic and PHY Securities


Another promising and futuristic research topic, which has not yet been investigated
deeply in the literature, is the joint design of PLS and classic cryptographic techniques. The
upcoming B5G networks require high security to ensure the most secure service applica-
tions. High-layer cryptographic techniques, such as privacy-preserving, authentication and
encryption, will still be the main safeguarding mechanisms in data privacy and network
security for B5G. Such techniques are usually implemented at the higher layers of data
processing stacks. However, the advancements in wireless networks and the limitations
of energy consumption in the mobile devices, hardware and processing capability in B5G
networks require lower cost and more efficient data privacy and network security solutions.
Dynamic and robust security solutions, such as secure service-oriented and group-based
authentication systems [185,186], will be the major future directions for classic crypto-
graphic security and privacy. In addition to the upper layer cryptographic techniques,
the PLS is required to offer another layer for safeguarding data confidentiality in B5G
networks [186–188]. PLS is emerging as a promising technique for managing the high
costs of computational complexity and the resource consumption problems. Nowadays,
PLS techniques have been widely adopted to provide secure transmission in emerging
technologies, such as massive MIMO, advanced channel coding, terahertz (THz), millimeter
wave (mmWave), etc. However, employing only PLS techniques may not be sufficient to
ensure efficient and robust security in future 5G and 6G networks. PLS can be integrated
into classic cryptographic techniques to improve the requirements of future wireless com-
munication systems. Therefore, the basic issue is the joint utilization of the benefits of PLS
and classic cryptographic security techniques.
To this end, cross-layer security design approaches aim to integrate higher layer
security and PLS to provide secure strategies for each layer of data processing protocol.
This can be performed by utilizing the mechanisms and functionalities of the two layers
for security purposes. In order to achieve this challenging task, there are still many
issues that are expected to be solved in future research. For example, secure coding
techniques, network protocols, adaptive modulation, hybrid encryption algorithms and
other techniques can be adopted as joint mechanisms for security. However, the structures
of B5G networks are typically decentralized and transmission nodes are expanded with
different characteristics. This requires a joint security scheme to adopt the same variety of
nodes and heterogeneous architecture of B5G networks. In order to satisfy the requirements
Sensors 2022, 22, 3589 27 of 36

of service-related and user-related elements in B5G networks, dynamic, robust and efficient
secure joint security techniques need to be developed [186].

6.3. The Impacts of ML on Channel Estimation


Channel state information (CSI) has a significant impact on the design of secure
transmission strategies. However, the availability of CSI at the communication entities
differs from full knowledge or partial knowledge to zero information. The acquisition of the
CSI of an eavesdropper for the transmitter is not a simple task in actual security design. Due
to the hidden nature of eavesdroppers and CSI feedback, it is difficult to obtain the CSI of
wiretap channels at the transmitter. On the other hand, the CSI of legitimate channels can be
obtained through CSI feedback from the legitimate receiver in FDD systems. To obtain the
optimal performance of secure communication, correct channel estimation is indispensable
for guaranteeing the quality of service (QoS). Nevertheless, it is not easy to obtain perfect
CSI due to the limited feedback and estimation errors. In many situations, CSI can be
imperfect or even unknown. Therefore, the challenges that are raised by channel estimation
aspects are due to the difficulties in the perfect channel estimation of eavesdroppers and
the considerations of CSI feedback delay, node mobility and channel correlations.
Recently, there have been plenty of efforts to use ML and DL techniques in channel
estimation [189–192]. Based on these investigations, issues regarding the estimation of the
proper channel of an eavesdropper and the tackling of imperfect CSI in system design still
remain. It has been proven that the existing channel estimation schemes that are based
on channel modeling are insufficient for obtaining perfect and timely CSI. By introducing
ML techniques into channel estimations, the performances of existing channel estima-
tion techniques can be improved, with low complexity in the practical applications [193].
Furthermore, DL has been employed for channel estimation in mmWave massive MIMO
systems [194]. By applying intelligent denoising-based message passing techniques, the
system can learn channel structures from training datasets and estimate accurate channels.
In [195], an off-grid channel estimation algorithm was proposed for orthogonal time fre-
quency space (OTFS) systems. This algorithm can adopt the sparse Bayesian learning model
to accurately exploit channel sparsity. From the above discussions, the development of
generalized ML- and DL-based channel estimation schemes for different scenarios remains
a major challenge for future research. In order to design these generalized schemes, a
large number of training datasets need to be used by the DL and ML algorithms to learn
channel features.

6.4. The Influences of AI and ML on B5G Security and Privacy


The advent of new network features, technologies and services in B5G networks will
reveal potential security and privacy challenges. These challenges are not only from the per-
spective of the consumer but also from the viewpoints of vendors, network operators and
service providers in terms of developing perfect deployment of service scenarios. Service
providers should produce solutions to ensure the security, privacy and allocation of essen-
tial resources to their customers robustly and reliably in order to tackle these challenges.
Enabling technologies, such as AI and ML, are integrated into 5G and B5G networks and
are expected to meet the security and privacy requirements to a certain extent. However,
the adoption of AI and ML technologies in wireless networks will raise concerns about
privacy and security issues, such as those raised in [196–199]. In order to address these
problems in B5G networks, proactive privacy and security measures need to be developed.
Such techniques will employ novel AI technologies and algorithms and subsequently,
physical layer security may become one of the major areas of application for AI [200]. Due
to the increase in data rates in B5G networks, the processing performance of such network
elements will be further expanded, which will facilitate the strong combination of AI and
future communication security design [201]. An ML-based autoencoder was proposed
in [202] to reconstruct detection errors in order to discover irregular traffic data in future
networks. ML-based PLS techniques, especially those regarding device authentication,
Sensors 2022, 22, 3589 28 of 36

were discussed in [203] to achieve a robust and highly reliable authentication for B5G
networks. In [204], a big data analytics technique was applied to facilitate the rapid growth
of B5G network data in specific scenarios. However, big data analytics can help to address
abnormal user detection applications.

6.5. The Impacts of Adversarial Attack Models for Beamforming Systems


Adversarial attacks and adversary models are important issues that also need to be
considered in secure physical layer transmission. In the existing research, most secure
design strategies assume that adversarial attacks are passive. In this case, there is no coop-
eration or active exchange of information with other nodes within the system. However, in
practical security design, there can be active cooperation and communication in confidential
information exchanges [205]. Some strong adversaries may aim to estimate the environ-
ment in order to build up their advantages and threaten secure transmission [206,207].
Considering these observations, the design of secure strategies for PLS techniques face
great challenges. One of the major challenges of this direction, specifically in beamforming
systems, is information leakage into the subspace of eavesdroppers. The basic idea of
beamforming is to transmit signals in the direction of legitimate channels. When transmis-
sion power is allocated between intended and unintended directions, most of the power is
allocated to the main side lobes and a small portion of the power is allocated to the minor
lobe beam. Transmitting signals are then leaked through the eavesdropper channel [113].
According to [125], beamforming techniques attempt to enhance the quality of signals at
the main channel. In this case, the design of beamforming does not consider the possibility
of eavesdroppers when its channel gain is higher than that of the main channel. Therefore,
it is challenging to design a beamformer that is optimal for the legitimate user under the
favorable channel settings of an eavesdropper. It is computationally expensive to achieve a
perfect balance between optimal signal power and signal leakages. The challenges of the
existing channel training and narrow beam scanning in multi-antenna techniques can be
addressed through the use of ML and AI algorithms to achieve optimal solutions with less
complexity [149]. Unfortunately, there are also potential security concerns in the integration
of ML algorithms into future 5G technologies. A recent study on beamforming prediction
tackled the security problems of using ML algorithms [51]. It was shown that in order
to investigate beamforming prediction, adversarial attack strategies should be studied
according to the loss maximization-based attacks that are relative to AI models.

7. Conclusions
Recently, PLS has attracted broad research interest in terms of the design of efficient
and secure transmission strategies for 5G wireless networks. This review paper provided
detailed discussions on the basic optimization schemes and system design of PLS, based
on both information-theoretic security and signal processing fundamentals. To understand
the advantages of PLS, we first provided a comparison between the traditional crypto-
graphic and PLS techniques. Then, we introduced different wiretap channel models and
their mathematical expressions in order to understand the common scenarios of practical
security design. From the information-theoretic security perspective, we reviewed pop-
ular performance evaluation metrics, including the rate of transmission metrics, secrecy
capacity, secrecy throughput, secrecy outage probability, secure resource allocation and
QoS-related metrics. Then, we reviewed optimization problems and security solutions
from the viewpoints of system design and signal processing methods, such as convex
optimization, secure beamforming, artificial noise (AN) and zero-forcing (ZF) precoding.
Regarding research directions, we discussed candidates for future research topics within
PLS, including resource allocation, signal processing techniques, secure node/antenna
selection and cooperative networks. Thereafter, AI and ML applications were reviewed to
solve different problems for optimization and security design. Specifically, we discussed
the paradigms of AI and ML in terms of some promising research directions, such as signal
processing design, end-to-end multi-antenna techniques and OFDM-based RB allocation
Sensors 2022, 22, 3589 29 of 36

applications. We also discussed other research directions and the open challenges that face
PLS in future wireless networks. In summary, our review incorporated different aspects
that are related to the optimization and design of PLS systems, including secure resource
allocation, channel estimation and the integration of AI into practical strategies to help
PLS. We believe that this paper can provide the research community with guidance for
advancing the considerations of future PLS research.

Author Contributions: Conceptualization, methodology and writing—original draft preparation,


M.K.T.; writing—review and editing, Z.J.; validation and supervision, S.Z. All authors have read and
agreed to the published version of the manuscript.
Funding: This work was partly supported by the National Natural Science Foundation of China
(grant number 62003275) and the Fundamental Research Funds for the Central Universities of China
(grant number 31020190QD039).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: We would like to acknowledge the Northwestern Polytechnical University
(NWPU) and Yangtze River Delta Research Institute of NWPU for their research funding.
Conflicts of Interest: The authors declare no conflict of interest.

References
1. Wang, C.X.; Haider, F.; Gao, X.; You, X.H.; Yang, Y.; Yuan, D.; Aggoune, H.M.; Haas, H.; Fletcher, S.; Hepsaydir, E. Cellular
architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 2014, 52, 122–130. [CrossRef]
2. Rawat, S.; Chaturvedi, P. A QoS Aware RA Algorithm for OFDM Network. J. Eng. Educ. Transform. 2015, 2349–2473. [CrossRef]
3. Chou, S.F.; Pang, A.C.; Yu, Y.J. Energy-aware 3D unmanned aerial vehicle deployment for network throughput optimization.
IEEE Trans. Wirel. Commun. 2019, 19, 563–578. [CrossRef]
4. Hindumathi, V.; Reddy, K.R.L. A Proficient Fair Resource Allocation in the Channel of Multiuser Orthogonal Frequency Division
Multiplexing using a Novel Hybrid Bat-Krill Herd Optimization. Wirel. Pers. Commun. 2021, 120, 1449–1473. [CrossRef]
5. Zhou, L.; Wu, D.; Wei, X.; Dong, Z. Seeing Isn’t Believing: QoE Evaluation for Privacy-Aware Users. IEEE JSAC 2019, 37,
1656–1665. [CrossRef]
6. Zorgui, M. Wireless Physical Layer Security: On the Performance Limits of Secret-Key Agreement. Masters’s Thesis, King
Abdullah University of Science and Technology, Thuwal, Saudi Arabia, 2015.
7. Campagna, M.; Chen, L.; Dagdelen, O.; Ding, J.; Fernick, J.; Gisin, N.; Hayford, D.; Jennewein, T.; Lütkenhaus, N.; Mosca, M.;
et al. Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges; European Telecommunications
Standards Institute: Sophia Antipolis, France, 2015; Volume 8, pp. 1–64.
8. Shiu, Y.S.; Chang, S.Y.; Wu, H.C.; Huang, S.C.H.; Chen, H.H. Physical layer security in wireless networks: A tutorial. IEEE
Wireless Commun. 2011, 18, 66–74. [CrossRef]
9. Mukherjee, A. Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource
constraints. Proc. IEEE 2015, 103, 1747–1761. [CrossRef]
10. Liu, Y.; Chen, H.H.; Wang, L. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach based on Ordered
Eigenvalues of Wishart Matrices. IEEE Trans. Inf. Forensics Secur. 2016, 99, 1. [CrossRef]
11. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using
physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [CrossRef]
12. Wang, C.; Wang, H.M. Physical layer security in millimeter wave cellular networks. IEEE Trans. Wirel. Commun. 2016, 15,
5569–5585. [CrossRef]
13. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc.
IEEE 2016, 104, 1727–1765. [CrossRef]
14. Barros, J.; Rodrigues, M.R. Secrecy capacity of wireless channels. In Proceedings of the 2006 IEEE International Symposium on
Information Theory, Seattle, WA, USA, 9–16 July 2006; pp. 356–360.
15. Jeon, H.; Kim, N.; Choi, J.; Lee, H.; Ha, J. Bounds on secrecy capacity over correlated ergodic fading channels at high SNR. IEEE
Trans. Inf. Theory 2011, 57, 1975–1983. [CrossRef]
16. Saad, W.; Zhou, X.; Han, Z.; Poor, H.V. On the physical layer security of backscatter wireless systems. IEEE Trans. Wirel. Commun.
2014, 13, 3442–3451. [CrossRef]
17. Basciftci, Y.O.; Gungor, O.; Koksal, C.E.; Ozguner, F. On the secrecy capacity of block fading channels with a hybrid adversary.
IEEE Trans. Inf. Theory 2015, 61, 1325–1343. [CrossRef]
Sensors 2022, 22, 3589 30 of 36

18. Zhang, N.; Cheng, N.; Lu, N.; Zhang, X.; Mark, J.W.; Shen, X. Partner selection and incentive mechanism for physical layer
security. IEEE Trans. Wirel. Commun. 2015, 14, 4265–4276. [CrossRef]
19. Bashar, S.; Ding, Z. Optimum power allocation against information leakage in wireless network. In Proceedings of the GLOBE-
COM 2009—2009 IEEE Global Telecommunications Conference, Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–6.
20. Wang, X.; Tao, M.; Mo, J.; Xu, Y. Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless
networks. IEEE Trans. Inf. Forensics Secur. 2011, 6, 693–702. [CrossRef]
21. Du, Y.N.; Han, S.; Xu, S.; Li, C. Improving secrecy under high correlation via discriminatory channel estimation. In Proceedings
of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6.
22. Hong, Y.W.P.; Lan, P.C.; Kuo, C.C.J. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless
Systems; Springer: New York, NY, USA, 2014.
23. Liu, R.; Trappe, W. Securing Wireless Communications at the Physical Layer; Springer: New York, NY, USA, 2010.
24. Baldi, M.; Tomasin, S. (Eds.) Physical and Data-Link Security Techniques for Future Communication Systems; Springer International:
Cham, Switzerland, 2016.
25. Liu, Y.; Chen, H.H.; Wang, L. Physical layer security for next generation wireless networks: Theories, technologies, and challenges.
IEEE Commun. Surv. Tutor. 2017, 19, 347–376. [CrossRef]
26. Sharma, R.K.; Rawat, D.B. Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE
Commun. Surv. Tutor. 2014, 17, 1023–1043. [CrossRef]
27. Sanenga, A.; Mapunda, G.A.; Jacob, T.M.L.; Marata, L.; Basutli, B.; Chuma, J.M. An overview of key technologies in physical layer
security. Entropy 2020, 22, 1261. [CrossRef]
28. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless
networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [CrossRef]
29. Chen, X.; Ng, D.W.; Gerstacker, W.H.; Chen, H.H. A Survey on Multiple-Antenna Techniques for Physical Layer Security. IEEE
Commun. Surv. Tutor. 2017, 19, 1027–1053. [CrossRef]
30. Wang, D.; Bai, B.; Zhao, W.; Han, Z. A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun.
Surv. Tutor. 2019, 21, 1878–1911. [CrossRef]
31. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and applications of physical layer security techniques for confidentiality:
A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1773–1828. [CrossRef]
32. Trappe, W. The challenges facing physical layer security. IEEE Commun. Mag. 2015, 53, 16–20. [CrossRef]
33. Mao, Q.; Hu, F.; Hao, Q. Deep Learning for Intelligent Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor.
2018, 20, 2595–2621. [CrossRef]
34. Zhao, L.; Zhang, X.; Chen, J.; Zhou, L. Physical layer security in the age of artificial intelligence and edge computing. IEEE Wirel.
Commun. 2020, 27, 174–180. [CrossRef]
35. Xiao, L.; Sheng, G.; Liu, S.; Dai, H.; Peng, M.; Song, J. Deep Reinforcement Learning-Enabled Secure Visible Light Communication
against Eavesdropping. IEEE Trans. Commun. 2019, 67, 6994–7005. [CrossRef]
36. Gui, L.; He, B.; Zhou, X.; Yu, C.; Shu, F.; Li, J. Learning-Based Wireless Powered Secure Transmission. IEEE Wirel. Commun. Lett.
2019, 8, 600–603.
37. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [CrossRef]
38. Li, H.; Wang, X. Physical-Layer Security Enhancement in Wireless Communication Systems. Master’s Thesis, the University of
Western Ontario London, Ontario, Canada, 2013.
39. Zheng, G.; Choo, L.C.; Wong, K.K. Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans.
Signal Process. 2011, 59, 1317–1322. [CrossRef]
40. He, X.; Yener, A. On the Role of Feedback in Two-Way Secure Communication. In Proceedings of the 2008 42nd Asilomar
Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 26–29 October 2008; pp. 1093–1097.
41. He, X.; Yener, A. Providing Secrecy When the Eavesdropper Channel is Arbitrarily Varying: A Case for Multiple Antennas. In
Proceedings of the 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL,
USA, 29 September–1 October 2010; pp. 1228–1235.
42. Liao, W.C.; Chang, T.H.; Ma, W.K.; Chi, C.Y. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized
artificial-noise aided approach. IEEE Trans. Signal Process. 2011, 59, 1202–1216. [CrossRef]
43. Reboredo, H.; Xavier, J.; Rodrigues, M.R.D. Filter design with secrecy constraints: The MIMO Gaussian wiretap channel. IEEE
Trans. Signal Process. 2013, 61, 3799–3814. [CrossRef]
44. Li, M.; Kundu, S.; Pados, D.A.; Batalama, S.N. Waveform design for secure SISO transmissions and multicasting. IEEE J. Sel.
Areas Commun. 2013, 31, 1864–1874. [CrossRef]
45. Mohaisen, M.; Wang, Y.; Chang, K. Multiple Antenna Technologies. Available online: https://arxiv.org/ftp/arxiv/papers/0909
/0909.3342.pdf (accessed on 19 October 2021).
46. Björnson, E.; Sanguinetti, L.; Wymeersch, H.; Hoydis, J.; Marzetta, T.L. Massive MIMO is a reality—What is next? Five promising
research directions for antenna arrays. Digit. Signal Process. 2019, 94, 3–20. [CrossRef]
47. Kapetanovic, D.; Zheng, G.; Rusek, F. Physical layer security for massive MIMO: An overview on passive eavesdropping and
active attacks. IEEE Commun. Mag. 2015, 53, 21–27. [CrossRef]
Sensors 2022, 22, 3589 31 of 36

48. Liu, R.; Liu, T.; Poor, H.V.; Shamai, S. Multiple-input multiple-output Gaussian broadcast channels with common and confidential
messages. IEEE Trans. Inf. Theory 2010, 56, 5477–5487.
49. Liang, Y.; Poor, H.V.; Shamai, S. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [CrossRef]
50. Ekrem, E.; Ulukus, S. Secure broadcasting using multiple antennas. J. Commun. Netw. 2010, 12, 411–432. [CrossRef]
51. Lee, H.; Song, C.; Moon, J.; Lee, I. Precoder designs for MIMO Gaussian multiple access wiretap channels. IEEE Trans. Veh.
Technol. 2017, 66, 8563–8568. [CrossRef]
52. Fakoorian, S.A.A.; Swindlehurst, A.L. MIMO interference channel with confidential messages: Achievable secrecy rates and
precoder design. IEEE Trans. Inf. Forensics Secur. 2011, 6, 640–649. [CrossRef]
53. Ning, H.; Ling, C.; Leung, K.K. Feasibility condition for interference alignment with diversity. IEEE Trans. Inf. Theory 2011, 57,
2902–2912. [CrossRef]
54. Chen, X.; Yuen, C. Performance analysis and optimization for interference alignment over MIMO interference channels with
limited feedback. IEEE Trans. Signal Process. 2014, 62, 1785–1795. [CrossRef]
55. Koyluoglu, O.O.; El Gamal, H.; Lai, L.; Poor, H.V. Interference alignment for secrecy. IEEE Trans. Inf. Theory 2011, 57, 3323–3332.
[CrossRef]
56. Yang, S.; Belfiore, J.C. Towards the optimal amplify-and-forward cooperative diversity scheme. IEEE Trans. Inf. Theory 2007, 53,
3114–3126. [CrossRef]
57. Zhong, C.; Matthaiou, M.; Karagiannidis, G.K.; Huang, A.; Zhang, Z. Capacity bounds for AF dual-hop relaying in G fading
channel. IEEE Trans. Veh. Technol. 2012, 61, 1730–1740. [CrossRef]
58. Berger, S.; Kuhn, M.; Wittneben, A.; Unger, T.; Klein, A. Recent advances in amplify-and-forward two-hop relaying. IEEE Commun.
Mag. 2009, 47, 50–56. [CrossRef]
59. Wang, T.; Cano, A.; Giannakis, G.B.; Laneman, J.N. High performance cooperative demodulation with decode-and-forward
relays. IEEE Trans. Commun. 2007, 55, 1427–1438. [CrossRef]
60. Yi, Z.; Kim, I.M. Diversity order analysis of the decode-and forward cooperative networks with relay selection. IEEE Trans.
Wireless Commun. 2008, 7, 1792–1799.
61. Patel, C.S.; Stuber, G.L. Channel estimation for amplify and forward relay-based cooperation diversity systems. IEEE Trans. Wirel.
Commun. 2007, 6, 2348–2356. [CrossRef]
62. Huang, J.; Swindlehurst, A.L. Cooperative jamming for secure communications in MIMO relay networks. IEEE Trans. Signal
Process. 2011, 59, 4871–4884. [CrossRef]
63. Mo, J.; Tao, M.; Liu, Y.; Wang, R. Secure beamforming for MIMO two-way communications with an untrusted relay. IEEE Trans.
Signal Process. 2014, 62, 2185–2199. [CrossRef]
64. Li, Q.; Yang, Y.; Ma, W.K.; Lin, M.; Ge, J.; Lin, J. Robust cooperative beamforming and artificial noise design for physical-layer
secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 2015, 63, 206–220. [CrossRef]
65. Zhou, X.S.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2016; p. 295.
66. Liang, Y.; Poor, H.V.; Shamai, S. Secure communication over fading channels. IEEE Trans. Inf. Theory 2008, 54, 2470–2492.
[CrossRef]
67. Bloch, M.R.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering, 1st ed.; Cambridge University Press:
Cambridge, UK, 2011.
68. Bloch, M.R.; Laneman, J.N. Strong Secrecy from Channel Resolvability. IEEE Trans. Inf. Theory 2013, 59, 8077–8098. [CrossRef]
69. Wang, H.M.; Xia, X.-G. Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Commun. Mag. 2015,
53, 47–53. [CrossRef]
70. Zhou, X.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications, 1st ed.; CRC Press: Boca Raton, FL, USA, 2013.
[CrossRef]
71. Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans.
Veh. Technol. 2012, 61, 3693–3704. [CrossRef]
72. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wiretap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [CrossRef]
73. Wang, H.M.; Zheng, T.X. Physical Layer Security in Random Cellular Networks; Springer Briefs in Computer Science; Springer:
Singapore, 2016.
74. Ryland, K.S.; Clancy, T.C.; Buehrer, R.M.; Dietrich, C.B. Software-Defined Radio Implementation of Two Physical Layer Security
Techniques. Ph.D. Thesis, Virginia Tech, Blacksburg, VA, USA, 2018. Available online: https://vtechworks.lib.vt.edu/bitstream/
handle/10919/82055/Ryland_KS_T_2018.pdf?sequence=1&isAllowed=y (accessed on 9 April 2022).
75. Bloch, M.; Barros, J.; Rodrigues, M.R.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54,
2515–2534. [CrossRef]
76. Bassily, R.; Ekrem, E.; He, X.; Tekin, E.; Xie, J.; Bloch, M.R.; Ulukus, S.; Yener, A. Cooperative security at the physical layer:
A summary of recent advances. IEEE Signal Process. Mag. 2013, 30, 16–28. [CrossRef]
77. Park, K.H.; Wang, T.; Alouini, M.S. On the jamming power allocation for secure amplify-and-forward relaying via cooperative
jamming. IEEE J. Sel. Areas Commun. 2013, 31, 1741–1750. [CrossRef]
78. Bashar, S.; Ding, Z.; Li, G.Y. On secrecy of codebook-based transmission beamforming under receiver limited feedback. IEEE
Trans. Wireless Commun. 2011, 10, 1212–1223. [CrossRef]
Sensors 2022, 22, 3589 32 of 36

79. Xiong, J.; Wong, K.K.; Ma, D.; Wei, J. A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap
channels via masked beamforming. IEEE Commun. Lett. 2012, 16, 1496–1499. [CrossRef]
80. Gerbracht, S.; Scheunert, C.; Jorswieck, E.A. Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf.
Forensics Secur. 2012, 7, 704–716. [CrossRef]
81. Oggier, F.; Hassibi, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [CrossRef]
82. Gopala, P.K.; Lai, L.; El Gamal, H. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698.
[CrossRef]
83. Zhou, X.; McKay, M.R.; Maham, B.; Hjørungnes, A. Rethinking the secrecy outage formulation: A secure transmission design
perspective. IEEE Commun. Lett. 2011, 15, 302–304. [CrossRef]
84. Hamamreh, J.M.; Yusuf, M.; Baykas, T.; Arslan, H. Cross MAC/PHY layer security design using ARQ with MRC and adaptive
modulation. In Proceedings of the IEEE Wireless Communication Networks Conference (WCNC), Doha, Qatar, 3–6 April 2016;
pp. 1–7.
85. Liu, S.; Hong, Y.; Viterbo, E. Practical secrecy using artificial noise. IEEE Commun. Lett. 2013, 17, 1483–1486.
86. Morrison, K.; Goeckel, D. Secrecy rate pair constraints for secure throughput. In Proceedings of the 2014 IEEE Military
Communications Conference, Baltimore, MD, USA, 6–8 October 2014; pp. 479–484.
87. Geraci, G.; Egan, M.; Yuan, J.; Razi, A.; Collings, I.B. Secrecy sumrates for multi-user MIMO regularized channel inversion
precoding. IEEE Trans. Commun. 2012, 60, 3472–3482. [CrossRef]
88. He, B.; Zhou, X.; Swindlehurst, A.L. On secrecy metrics for physical layer security over quasi-static fading channels. IEEE Trans.
Wireless Commun. 2016, 15, 6913–6924. [CrossRef]
89. He, X.; Khisti, A.; Yener, A. MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom.
IEEE Trans. Inf. Theory 2013, 59, 4733–4745.
90. Liu, Z.; Chen, C.; Bai, L.; Xiang, H.; Choi, J. Secure beamforming via amplify-and-forward relays in wireless networks with
multiple eavesdroppers. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, NSW, Australia,
10–14 June 2014; pp. 4698–4703.
91. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V.L. Improving wireless physical layer security via cooperating relays. IEEE Trans.
Signal Process. 2010, 58, 1875–1888. [CrossRef]
92. Nomikos, N.; Nieto, A.; Makris, P.; Skoutas, D.N.; Vouyioukas, D.; Rizomiliotis, P.; Lopez, J.; Skianis, C. Relay selection for secure
5G green communications. Telecommun. Syst. 2015, 59, 169–187. [CrossRef]
93. Li, J.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process.
2011, 59, 4985–4997. [CrossRef]
94. Hong, Y.W.P.; Lan, P.C.; Kuo, C.C.J. Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal
processing approaches. IEEE Signal Process. Mag. 2013, 30, 29–40. [CrossRef]
95. Yener, A.; Ulukus, S. Wireless physical-layer security: Lessons learned from information theory. Proc. IEEE 2015, 103, 1814–1825.
[CrossRef]
96. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004.
97. Bai, B.; Chen, W.; Cao, Z. Outage optimal subcarrier allocation for downlink secure OFDMA systems. In Proceedings of the IEEE
Global Communications Conference (GLOBECOM) Workshops, Austin, TX, USA, 8–12 December 2014; pp. 1320–1325.
98. Jindal, A.; Bose, R. Resource allocation for secure multicarrier AF relay system under total power constraint. IEEE Commun. Lett.
2014, 19, 231–234. [CrossRef]
99. Chen, J.; Chen, X.; Gerstacker, W.H.; Ng, D.W.K. Resource allocation for a massive MIMO relay aided secure communication.
IEEE Trans. Inf. Forensics Secur. 2016, 11, 1700–1711. [CrossRef]
100. Ng, D.W.K.; Lo, E.S.; Schober, R. Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks.
IEEE Trans. Wirel. Commun. 2011, 10, 3528–3540. [CrossRef]
101. Huang, J.; Swindlehurst, A.L. Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal
Process. 2012, 60, 1696–1707. [CrossRef]
102. Jeong, C.; Kim, I.M. Optimal power allocation for secure multicarrier relay systems. IEEE Trans. Signal Process. 2011, 59, 5428–5442.
[CrossRef]
103. Tsai, S.H.; Poor, H.V. Power allocation for artificial-noise secure MIMO precoding systems. IEEE Trans. Signal Process. 2014, 62,
3479–3493. [CrossRef]
104. Wang, L.; Elkashlan, M.; Huang, J.; Tran, N.H.; Duong, T.Q. Secure transmission with optimal power allocation in untrusted relay
networks. IEEE Wireless Commun. Lett. 2014, 3, 289–292. [CrossRef]
105. Benfarah, A.; Tomasin, S.; Laurenti, N. Power allocation in multiuser parallel Gaussian broadcast channels with common and
confidential messages. IEEE Trans. Commun. 2016, 64, 2326–2339. [CrossRef]
106. Zheng, T.X.; Wang, H.M. Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers.
IEEE Trans. Veh. Technol. 2016, 65, 8812–8817. [CrossRef]
107. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Trans. Inf. Theory
2010, 56, 3088–3104. [CrossRef]
108. Khisti, A.; Wornell, G.W. Secure transmission with multiple antennas—Part II the MIMOME wiretap channel. IEEE Trans. Inf.
Theory 2010, 56, 5515–5532. [CrossRef]
Sensors 2022, 22, 3589 33 of 36

109. Sheng, Z.; Tuan, H.D.; Sheng, Z.; Tuan, H.D.; Duong, T.Q.; Vincent Poor, H. Beamforming Optimization for Physical Layer
Security in MISO Wireless Networks. IEEE Trans. Signal Process. 2018, 66, 3710–3723. [CrossRef]
110. Palomar, D.P.; Chiang, M. A tutorial on decomposition methods for network utility maximization. IEEE J. Sel. Areas Commun.
2006, 24, 1439–1451. [CrossRef]
111. Yaacoub, E.; Al-Husseini, M. Achieving physical layer security with massive MIMO beamforming. In Proceedings of the 2017
11th European Conference Antennas Propagation, EUCAP 2017, Paris, France, 19–24 March 2017; pp. 1753–1757.
112. Shafiee, S.; Liu, N.; Ulukus, S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE
Transactions on Information Theory 2009, 55, 4033–4039. [CrossRef]
113. Björnson, E.; Bengtsson, M.; Ottersten, B. Optimal multiuser transmit beamforming: A difficult problem with a simple solution
structure [lecture notes]. IEEE Signal Process. Mag. 2014, 31, 142–148. [CrossRef]
114. Jeong, C.; Kim, I.M.; Kim, D.I. Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO
untrusted relay system. IEEE Trans. Signal Process. 2012, 60, 310–325. [CrossRef]
115. Zhao, P.; Zhang, M.; Yu, H.; Luo, H.; Chen, W. Robust beamforming design for sum secrecy rate optimization in MU-MISO
networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1812–1823. [CrossRef]
116. Shi, Q.; Xu, W.; Wu, J.; Song, E.; Wang, Y. Secure beamforming for MIMO broadcasting with wireless information and power
transfer. IEEE Trans. Wirel. Commun. 2015, 14, 2841–2853. [CrossRef]
117. Wang, X.; Wang, K.; Zhang, X.D. Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol.
2013, 62, 2140–2155. [CrossRef]
118. Zheng, G.; Arapoglou, P.D.; Ottersten, B. Physical layer security in multibeam satellite systems. IEEE Trans. Wirel. Commun. 2012,
11, 852–863. [CrossRef]
119. Nghia, N.T.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. MIMO beamforming for secure and energy-efficient wireless communication.
IEEE Signal Process. Lett. 2017, 24, 236–239. [CrossRef]
120. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. Secure and energy-efficient beamforming for simultaneous information and
energy transfer. IEEE Trans. Wirel. Commun. 2017, 16, 7523–7537. [CrossRef]
121. Zhao, N.; Yu, F.R.; Sun, H. Adaptive energy-efficient power allocation in green interference-alignment-based wireless networks.
IEEE Trans. Veh. Technol. 2014, 64, 4268–4281. [CrossRef]
122. Pu, W.; Xiao, J.; Zhang, T.; Luo, Z.Q. Overcoming dof limitation in robust beamforming: A penalized inequality-constrained
approach. arXiv 2019, arXiv:1910.03365.
123. Li, Q.; Ma, W.K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization.
IEEE Trans. Signal Process. 2013, 61, 2704–2717. [CrossRef]
124. Lin, P.H.; Lai, S.H.; Lin, S.C.; Su, H.J. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap
channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [CrossRef]
125. Yang, N.; Yan, S.; Yuan, J.; Malaney, R.; Subramanian, R.; Land, I. Artificial noise: Transmission optimization in multi-input
single-output wiretap channels. IEEE Trans. Commun. 2015, 63, 1771–1783. [CrossRef]
126. Wang, B.; Mu, P.; Li, Z. Secrecy rate maximization with artificial noise-aided beamforming for MISO wiretap channels under
secrecy outage constraint. IEEE Commun. Lett. 2015, 19, 18–21. [CrossRef]
127. Tang, Y.; Xiong, J.; Ma, D.; Zhang, X. Robust artificial noise aided transmit design for MISO wiretap channels with channel
uncertainty. IEEE Commun. Lett. 2013, 17, 2096–2099. [CrossRef]
128. Reboredo, H.; Prabhu, V.; Rodrigues, M.R.; Xavier, J. Filter design with secrecy constraints: The multiple-input multiple-output
Gaussian wiretap channel with zero forcing receive filters. In Proceedings of the 2011 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP), Prague, Czech Republic, 22–27 May 2011; pp. 3440–3443.
129. Rezki, Z.; Alouini, M.S. On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint.
In Proceedings of the IEEE International Conference Communication Workshops (ICC Workshops), Kyoto, Japan, 5–9 June 2011;
pp. 1–5.
130. Ahmed, E.; Yaqoob, I.; Hashem, I.A.T.; Shuja, J.; Imran, M.; Guizani, N.; Bakhsh, S.T. Recent advances and challenges in mobile
big data. IEEE Commun. Mag. 2018, 56, 102–108. [CrossRef]
131. Cayamcela, M.E.M.; Lim, W. Artificial intelligence in 5G technology: A survey. In Proceedings of the 2018 International Conference
on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 October 2018; pp. 860–865.
132. Wang, T.; Wang, S.; Zhou, Z.H. Machine learning for 5G and beyond: From model-based to data-driven mobile wireless networks.
China Commun. 2019, 16, 165–175.
133. Challita, U.; Dong, L.; Saad, W. Proactive resource management for LTE in unlicensed spectrum: A deep learning perspective.
IEEE Trans. Wirel. Commun. 2018, 17, 4674–4689. [CrossRef]
134. Kilaru, S.; Harikishore, K.; Sravani, T.; Anvesh, C.L.; Balaji, T. Review and analysis of promising technologies with respect to Fifth
generation networks. In Proceedings of the 2014 First International Conference on Networks & Soft Computing (ICNSC2014),
Guntur, India, 19–20 August 2014; pp. 248–251.
135. Wang, C.X.; Wu, S.; Bai, L.; You, X.; Wang, J.; Chih-Lin, I. Recent advances and future challenges for massive MIMO channel
measurements and models. Sci. China Inf. Sci. 2016, 59, 021301. [CrossRef]
136. Zhang, J.; Tang, P.; Tian, L.; Hu, Z.; Wang, T.; Wang, H. 6–100 GHz research progress and challenges from a channel perspective
for fifth generation (5G) and future wireless communication. Sci. China Inf. Sci. 2017, 60, 080301. [CrossRef]
Sensors 2022, 22, 3589 34 of 36

137. Li, L.; Wang, D.; Niu, X.; Chai, Y.; Chen, L.; He, L.; Wu, X.; Zheng, F.; Cui, T.; You, X. mmWave communications for 5G:
Implementation challenges and advances. Sci. China Inf. Sci. 2018, 61, 021301. [CrossRef]
138. Zhang, C.; Xu, W. Neural networks: Efficient implementations and applications. In Proceedings of the 2017 IEEE 12th International
Conference on ASIC (ASICON), Guiyang, China, 25–28 October2017; pp. 1029–1032.
139. Xu, W.; Wu, Z.; Ueng, Y.L.; You, X.; Zhang, C. Improved polar decoder based on deep learning. In Proceedings of the 2017 IEEE
International Workshop on Signal Processing Systems (SiPS), Lorient, France, 3–5 October 2017; pp. 1–6.
140. Yang, C.; Xu, W.; Zhang, Z.; You, X.; Zhang, C. A channel-blind detection for SCMA based on image processing techniques. In
Proceedings of the 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy, 27–30 May 2018; pp. 1–5.
141. Xu, W.; Zhong, Z.; Be’ery, Y.; You, X.; Zhang, C. Joint neural network equalizer and decoder. In Proceedings of the 2018 15th
International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–5.
142. Xu, W.; Wang, Z.; You, X.; Zhang, C. Efficient fast convolution architectures for convolutional neural network. In Proceedings of
the 2017 IEEE 12th International Conference on ASIC (ASICON), Guiyang, China, 25–28 October 2017; pp. 904–907.
143. Xu, W.; You, X.; Zhang, C.; Be’ery, Y. Polar decoding on sparse graphs with deep learning. In Proceedings of the 2018 52nd
Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 28–31 October 2018; pp. 599–603.
144. Chih-Lin, I.; Sun, Q.; Liu, Z.; Zhang, S.; Han, S. The big-data-driven intelligent wireless network: Architecture, use cases, solutions,
and future trends. IEEE Veh. Technol. Mag. 2017, 12, 20–29.
145. Han, S.; Chih-Lin, I.; Li, G.; Wang, S.; Sun, Q. Big data enabled mobile network design for 5G and beyond. IEEE Commun. Mag.
2017, 55, 150–157. [CrossRef]
146. Li, R.; Zhao, Z.; Zhou, X.; Ding, G.; Chen, Y.; Wang, Z.; Zhang, H. Intelligent 5G: When cellular networks meet artificial intelligence.
IEEE Wirel. Commun. 2017, 24, 175–183. [CrossRef]
147. Gao, X.; Jiang, B.; Li, X.; Gershman, A.B.; McKay, M.R. Statistical eigenmode transmission over jointly correlated MIMO channels.
IEEE Trans. Inf. Theory 2009, 55, 3735–3750. [CrossRef]
148. McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-efficient learning of deep networks from
decentralized data. arXiv, 2016; e-prints.
149. Alkhateeb, A.; Alex, S.; Varkey, P.; Li, Y.; Qu, Q.; Tujkovic, D. Deep learning coordinated beamforming for highly-mobile
millimeter wave systems. IEEE Access 2018, 6, 37328–37348. [CrossRef]
150. Catak, E.; Catak, F.O.; Moldsvor, A. Adversarial machine learning security problems for 6G: MmWave beam prediction use-case.
In Proceedings of the 2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),
Bucharest, Romania, 24–28 May 2021; pp. 1–6.
151. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A survey of physical layer security techniques for 5G wireless networks
and challenges ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [CrossRef]
152. Qin, Z.; Ye, H.; Li, G.Y.; Juang, B.H.F. Deep learning in physical layer communications. IEEE Wirel. Commun. 2019, 26, 93–99.
[CrossRef]
153. You, X.; Zhang, C.; Tan, X.; Jin, S.; Wu, H. AI for 5G: Research directions and paradigms. Sci. China Inf. Sci. 2019, 62, 21301.
[CrossRef]
154. Samuel, N.; Diskin, T.; Wiesel, A. Deep MIMO detection. In Proceedings of the 2017 IEEE 18th International Workshop on Signal
Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–5.
155. Ye, H.; Li, G.Y.; Juang, B.H. Power of deep learning for channel estimation and signal detection in OFDM systems. IEEE Wirel.
Commun. Lett. 2018, 7, 114–117. [CrossRef]
156. Wang, Y.; Zhang, S.; Zhang, C.; Chen, X.; Xu, S. A low-complexity belief propagation based decoding scheme for polar codes
decodability detection and early stopping prediction. IEEE Access 2019, 7, 159808. [CrossRef]
157. Xu, J.; Zhu, P.; Li, J.; You, X. Deep learning-based pilot design for multi-user distributed massive MIMO systems. IEEE Wirel.
Commun. Lett. 2019, 8, 1016–1019. [CrossRef]
158. Liang, F.; Shen, C.; Wu, F. An iterative BP-CNN architecture for channel decoding. IEEE J. Sel. Top. Signal Process. 2018, 12,
144–159. [CrossRef]
159. Lv, X.Z.; Wei, P.; Xiao, X.C. Automatic identification of digital modulation signals using high order cumulants. Electron. Warf.
2004, 6, 1.
160. Wang, T.; Wen, C.K.; Wang, H.; Gao, F.; Jiang, T.; Jin, S. Deep learning for wireless physical layer: Opportunities and challenges.
China Commun. 2017, 14, 92–111. [CrossRef]
161. O’shea, T.; Hoydis, J. An introduction to deep learning for the physical layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575.
[CrossRef]
162. O’Shea, T.J.; Erpek, T.; Clancy, T.C. Deep learning-based MIMO communications. arXiv 2017, arXiv:1707.07980.
163. Tao, X.; Jiang, C.; Liu, J.; Xiao, A.; Qian, Y.; Lu, J. QoE Driven Resource Allocation in Next Generation Wireless Networks. IEEE
Wirel. Commun. 2019, 26, 78–85. [CrossRef]
164. Gesbert, D.; Hanly, S.; Huang, H.; Shitz, S.S.; Simeone, O.; Yu, W. Multi-cell MIMO cooperative networks: A new look at
interference. IEEE J. Sel. Areas Commun. 2010, 28, 1380–1408. [CrossRef]
165. Wang, D.; Zhang, Y.; Wei, H.; You, X.; Gao, X.; Wang, J. An overview of transmission theory and techniques of large-scale antenna
systems for 5G wireless communications. Sci. China Inf. Sci. 2016, 59, 081301. [CrossRef]
166. Kaelbling, L.P.; Littman, M.L.; Moore, A.W. Reinforcement learning: A survey. J. Artif. Intell. Res. 1996, 4, 237–285. [CrossRef]
Sensors 2022, 22, 3589 35 of 36

167. Wang, J.; Guan, W.; Huang, Y.; Schober, R.; You, X. Distributed optimization of hierarchical small cell networks: A GNEP
framework. IEEE J. Sel. Areas Commun. 2017, 35, 249–264. [CrossRef]
168. Bogale, T.E.; Wang, X.; Le, L.B. Machine intelligence techniques for next-generation context-aware wireless networks. arXiv 2018,
arXiv:1801.04223.
169. Li, R.; Zhao, Z.; Sun, Q.; Chih-Lin, I.; Yang, C.; Chen, X.; Zhao, M.; Zhang, H. Deep reinforcement learning for network slicing.
IEEE Access 2018, 6, 74429–74441. [CrossRef]
170. Long, H.; Xiang, W.; Zhang, Y.; Liu, Y.; Wang, W. Secrecy capacity enhancement with distributed precoding in multi-relay wiretap
systems. IEEE Trans. Inf. Forensics Secur. 2012, 8, 229–238. [CrossRef]
171. Fakoorian, S.A.A.; Swindlehurst, A.L. On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J.
Sel. Areas Commun. 2013, 31, 1701–1713. [CrossRef]
172. Lin, C.H.; Tsai, S.H.; Lin, Y.P. Secure transmission using MIMO precoding. IEEE Trans. Inf. Forensics Secur. 2014, 9, 801–813.
173. Hanif, M.F.; Tran, L.N.; Juntti, M.; Glisic, S. On linear precoding strategies for secrecy rate maximization in multiuser multiantenna
wireless networks. IEEE Trans. Signal Process. 2014, 62, 3536–3551. [CrossRef]
174. Zhang, H.; Huang, Y.; Li, S.; Yang, L. Energy-efficient precoder design for MIMO wiretap channels. IEEE Commun. Lett. 2014, 18,
1559–1562. [CrossRef]
175. Wu, F.; Zhang, R.; Yang, L.L.; Wang, W. Transmitter precoding-aided spatial modulation for secrecy communications. IEEE Trans.
Veh. Technol. 2015, 65, 467–471. [CrossRef]
176. Weinand, A.; Karrenbauer, M.; Sattiraju, R.; Schotten, H. Application of machine learning for channel-based message authenti-
cation in mission critical machine type communication. In Proceedings of the European Wireless 2017 23th European Wireless
Conference, Dresden, Germany, 17–19 May 2017; pp. 1–5.
177. Jing, S.; Yu, A.; Liang, X.; You, X.; Zhang, C. Uniform belief propagation processor for massive MIMO detection and GF (2 n)
LDPC decoding. In Proceedings of the 2017 IEEE 12th International Conference on ASIC (ASICON), Guiyang, China, 25–28
October 2017; pp. 961–964.
178. Wen, C.K.; Jin, S.; Wong, K.K.; Chen, J.C.; Ting, P. Channel estimation for massive MIMO using Gaussian-mixture Bayesian
learning. IEEE Trans. Wirel. Commun. 2014, 14, 1356–1368. [CrossRef]
179. Sattiraju, R.; Kochems, J.; Schotten, H.D. Machine learning based obstacle detection for Automatic Train Pairing. In
Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway,
31 May–2 June 2017; pp. 1–4.
180. Vieira, J.; Leitinger, E.; Sarajlic, M.; Li, X.; Tufvesson, F. Deep convolutional neural networks for massive MIMO fingerprint-based
positioning. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–6.
181. Ortuno, I.; Ortuno, M.; Delgado Penin, J.A. Error correcting neural networks for channels with Gaussian noise. In Proceedings
of the Proceedings 1992—IJCNN International Joint Conference on Neural Networks, Baltimore, MD, USA, 7–11 June 1992;
pp. 265–268.
182. Sattiraju, R.; Weinand, A.; Schotten, H.D. Performance analysis of deep learning based on recurrent neural networks for channel
coding. In Proceedings of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems
(ANTS), Indore, India, 16–19 December 2018; pp. 1–6.
183. Hornik, K.; Stinchcombe, M.; White, H. Multilayer feedforward networks are universal approximators. Neural Netw. 1989, 2,
359–366. [CrossRef]
184. Zhang, X.; Kunz, A.; Schröder, S. Overview of 5G security in 3GPP. In Proceedings of the IEEE Conference Standards Communi-
cation Networks (CSCN), Helsinki, Finland, 18–20 September 2017; pp. 181–186.
185. Ni, J.; Lin, X.; Shen, X.S. Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE
J. Sel. Areas Commun. 2018, 36, 644–657. [CrossRef]
186. Mahmood, N.H.; Alves, H.; López, O.A.; Shehab, M.; Osorio, D.P.M.; Latva-aho, M. Six key enablers for machine type communi-
cation in 6G. arXiv 2019, arXiv:1903.05406.
187. Yang, P.; Xiao, Y.; Xiao, M.; Li, S. 6G wireless communications: Vision and potential techniques. IEEE Netw. 2019, 33, 70–75.
[CrossRef]
188. Tariq, F.; Khandaker, M.R.; Wong, K.K.; Imran, M.A.; Bennis, M.; Debbah, M. A speculative study on 6G. IEEE Wirel. Commun.
2020, 27, 118–125. Available online: https://arxiv.org/pdf/1902.06700.pdf (accessed on 18 November 2021). [CrossRef]
189. Jiang, C.; Zhang, H.; Ren, Y.; Han, Z.; Chen, K.C.; Hanzo, L. Machine Learning Paradigms for Next-Generation Wireless Networks.
IEEE Wirel. Commun. 2017, 24, 98–105. [CrossRef]
190. Huang, H.; Guo, S.; Gui, G.; Yang, Z.; Zhang, J.; Sari, H.; Adachi, H. Deep Learning for Physical-Layer 5G Wireless Techniques:
Opportunities, Challenges and Solutions. IEEE Wirel. Commun. 2019, 27, 214–222. [CrossRef]
191. Soltani, M.; Pourahmadi, V.; Mirzaei, A.; Sheikhzadeh, H. Deep Learning-Based Channel Estimation. IEEE Commun. Lett. 2019,
23, 652–655. [CrossRef]
192. Mashhadi, B.; Gündüz, D. Deep Learning for Massive MIMO Channel State Acquisition and Feedback. J. Indian Inst. Sci. 2020,
100, 369–382. [CrossRef] [PubMed]
193. Hu, S.; Rusek, F.; Edfors, O. Beyond massive MIMO: The potential of data transmission with large intelligent surfaces. IEEE
Transactions on Signal Processing 2018, 66, 2746–2758. [CrossRef]
Sensors 2022, 22, 3589 36 of 36

194. He, H.; Wen, C.K.; Jin, S.; Li, G.Y. Deep learning-based channel estimation for beamspace mmWave massive MIMO systems. IEEE
Wirel. Commun. Lett. 2018, 7, 852–855. [CrossRef]
195. Wei, Z.; Yuan, W.; Li, S.; Yuan, J.; Ng, D.W.K. Off-grid Channel Estimation with Sparse Bayesian Learning for OTFS Systems.
arXiv 2021, arXiv:2101.05629. [CrossRef]
196. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv.
Tutor. 2019, 21, 3682–3722. [CrossRef]
197. Chen, K.C.; Zhang, T.; Gitlin, R.D.; Fettweis, G. Ultra-low latency mobile networking. IEEE Network 2018, 33, 181–187. [CrossRef]
198. Li, B.; Fei, Z.; Zhang, Y. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet Things J. 2018,
6, 2241–2263. [CrossRef]
199. Challita, U.; Ferdowsi, A.; Chen, M.; Saad, W. Machine learning for wireless connectivity and security of cellular-connected UAVs.
IEEE Wirel. Commun. 2019, 26, 28–35. [CrossRef]
200. Wang, X.; Li, X.; Leung, V.C. Artificial intelligence-based techniques for emerging heterogeneous network: State of the arts,
opportunities, and challenges. IEEE Access 2015, 3, 1379–1391. [CrossRef]
201. Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future intelligent and secure vehicular network toward 6G: Machine-learning approaches.
Proc. IEEE 2019, 108, 292–307. [CrossRef]
202. Alhajri, R.; Zagrouba, R.; Al-Haidari, F. Survey for anomaly detection of IoT botnets using machine learning auto-encoders. Int. J.
Appl. Eng. Res 2019, 14, 2417–2421.
203. Shakiba-Herfeh, M.; Chorti, A.; Poor, H.V. Physical layer security: Authentication, integrity, and confidentiality. In Physical Layer
Security; Springer: Cham, Switzerland, 2021; pp. 129–150.
204. Liang, Y.C.; Niyato, D.; Larsson, E.G.; Popovski, P. 6G mobile networks: Emerging technologies and applications. China Commun.
2020, 17, 4. [CrossRef]
205. Liang, Y.; Poor, H.V.; Ying, L. Secure communications over wireless broadcast networks: Stability and utility maximization. IEEE
Trans. Inf. Forensics Secur. 2011, 6, 682–692. [CrossRef]
206. Tang, X.; Ren, P.; Wang, Y.; Han, Z. Combating full-duplex active eavesdropper: A hierarchical game perspective. IEEE Trans.
Commun. 2016, 65, 1379–1395. [CrossRef]
207. Abedi, M.R.; Mokari, N.; Saeedi, H.; Yanikomeroglu, H. Robust resource allocation to enhance physical layer security in systems
with full-duplex receivers: Active adversary. IEEE Trans. Wirel. Commun. 2016, 16, 885–899. [CrossRef]

You might also like