Issue
Security and Safety
Volume 3, 2024
Security and Safety in Physical Layer Systems
Article Number E2024001
Number of page(s) 3
Section Information Network
DOI https://doi.org/10.1051/sands/2024001
Published online 31 January 2024

This special topic mainly focuses on the progress of physical-layer security (PLS) technologies and their potential applications for the future beyond fifth-generation (B5G) and sixth-generation (6G) networks. The tremendous growth in connectivity and the ubiquity of wireless communications have resulted in an unprecedented awareness of the importance of security and privacy. Achieving secure and trusted communications is vital for future intelligent connected applications, especially life-critical vehicle-to-everything (V2X) applications. However, the heterogeneous, dynamic and decentralized architecture of these networks leads to difficulties for cryptographic key management and distribution. By exploiting the physical characteristics of devices, wireless channels and noise, PLS offers reliable solutions against eavesdropper attacks as complementary approaches to cryptographic techniques.

This special topic includes 8 papers, covering three main research directions of PLS, i.e., authentication, confidentiality, and malicious node detection. The strength of features and properties of the PHY layer are well studied for different security purposes. These papers are written by experts and scholars in relevant fields around the world and indicate the authors’ insights into the topics of physical layer security model, mechanism and applications in B5G and 6G networks, along with the inherent advantages of some cutting-edge technologies. The detail information is provided as follows:

In the survey “Radio frequency fingerprint identification for internet of things: a survey [1]”, the authors introduced related definitions of RFFI and details of each stage in the identification process, namely signal preprocessing, RFF feature extraction, further processing, and RFFI. Furthermore, a novel framework is established from the perspective of closed set and open set problems, and the related state-of-the-art methodologies are investigated, including approaches based on traditional machine learning, deep learning, and generative models. Additionally, they highlighted the challenges faced by RFFI and pointed out that the universal RFF and the application of interpretable neural networks are promising subsequent research directions in this field.

In the survey “Securing NextG networks with physical-layer key generation: a survey [2]” the authors introduced the advantages of (PKG) techniques compared to traditional upper-layer based encryption schemes, its principles, and relevant research advancements. In some highly regarded emerging technologies and network scenarios, such as massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground networks, and quantum communication, the author analyzed the role of PKG, the challenges it faces, and the future research directions.

In “Exploration of transferable deep learning-aided radio frequency fingerprint identification systems [3]”, two transferable RFFI protocols are proposed leveraging the concept of transfer learning. Most deep learning-based RFFI systems require the collection of a great number of labelled signals for training, which is time-consuming and not ideal. Moreover, the long time required to train a neural network from scratch is also a challenge. The proposed protocols aim to address the aforementioned issues. The experimental results show that both the proposed RFFI protocols can achieve classification accuracy higher than 90% when transferred to a new IoT network, and require no more than five signals per device under test (DUT).

In the paper “Topology-based Multi-jammer Localization in Wireless Networks [4]”, the authors built a wide range of defense strategies to alleviate jamming attacks in wireless communication networks by focusing on the identification and exploitation of the jammers’ position. In the study, a framework that can partition network topology into clusters and can estimate the positions of multiple jammers even when their jamming areas are overlapping was developed. The experiments on a multi-hop network setup using MicaZ sensor nodes performed real-time collection of network topology changes under jamming and results demonstrated the proposed approach can localize multiple attackers efficiently.

In the paper “Covert communication in relay and RIS networks [5]”, the authors proposed a hybrid relay-reflecting intelligent surface (HR-RIS)-assisted strategy to enhance the performance of covert communications. Covert communication aims to prevent the warden from detecting the presence of communications. Different from conventional methods, the proposed HR-RIS is composed of active components and passive components, which means that it simultaneously possesses the functions of both a relay and a RIS. By jointly designing the transmit power at Alice and relay/reflection coefficients of the HR-RIS subject to the covertness and other constraints, the covert rate at Bob is maximized. The numerical results demonstrated that the proposed scheme significantly outperforms the conventional IRS/RIS-aided covert communication schemes in terms of covert rate by using a small number of active elements.

In the paper “The technology of radio frequency fingerprint identification based on deep learning for 5G application [6]”, the authors constructed a comprehensive link-level simulation platform tailored for 5G scenarios to expedite the integration of RFFI within 5G networks. The platform emulates various device impairments. A plausibility analysis was executed, Then, the impact of transmitter impairments, deep neural networks (DNNs), and channel effects on RFF performance was assessed. The result shows that under a signal-to-noise ratio (SNR) of 15 dB, the deep learning approach can accurately classify 100 User Equipment (UEs) with a accuracy rate of 91%.

In the paper “Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers [7]”, the authors studied an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. In frequency band-division-duplex (FDD) scheme, the bandwidth is divided into two portions which are used for transmitting information and receiving information, respectively. In time-fraction (TF) scheme, a fraction of a time slot is used for the downlink and the remaining for the uplink. By optimizing the UAV three-dimensional (3D) trajectory and resource allocation for each scheme, the worst-case throughput is maximized.

In the paper “A physical layer secret key consistency enhancement scheme using constellation decision information [8]”, the authors pointed out that existing schemes in secret key generation based on wireless channel (WC-SKG) only use pilot symbols for channel estimation, which may result in low secret key generation rate (SKGR) and incomplete utilization of received signal power. A consistency enhancement algorithm based on constellation decision information (CEA-CDI) was proposed to address the issue. By making soft decisions on the received data symbols, the influence of the channel is preserved for each symbol. The simulation results demonstrate that compared to the initial channel estimation, the proposed algorithm enhance performance by approximately 16 dB.

There are yet some open directions and challenges in this field, e.g., physical-layer key generation in static or poor scattering environments, radio frequency fingerprint identification in fast-moving environment and smart malicious nodes launching various attacks. The future research directions include but not limited to AI/ML-empowered PLS solutions, cross-layer security, energy-efficient PLS optimization, content-aware PLS design, integration with PHY layer’ s cutting-edge technologies such as RIS, NOMA, JCAS, BS communications, VLC, and THz communications, etc. Through this special topic, we hope to foster an exchange of research results, experiences, and products in the physical layer security domain from both theoretical and practical perspectives. Finally, we thank all the authors, editors and referees for their contributions and support to this special topic.

References

  1. Xie L, Peng L and Zhang J et al. Radio frequency fingerprint identification for Internet of Things: A survey. Secur Saf 2024; 3: 2023022. https://doi.org/10.1051/sands/2023022 [Google Scholar]
  2. Xiao Q, Zhao J and Feng S et al. Securing NextG networks with physical-layer key generation: A survey. Secur Saf 2024; 3: 2023021. https://doi.org/10.1051/sands/2023021 [Google Scholar]
  3. Shen G and Zhang J. Exploration of transferable deep learning-aided radio frequency fingerprint identification systems. Secur Saf 2024; 3: 2023019. https://doi.org/10.1051/sands/2023019 [Google Scholar]
  4. Liu H, Chen Y and Xu W et al. Topology-based multi-jammer localization in wireless networks. Secur Saf 2024; 3: 2023025. https://doi.org/10.1051/sands/2023025 [Google Scholar]
  5. Hu J, Shi X and Chen Y et al. Covert communication in relay and RIS networks. Secur Saf 2023; 2: 2023015. https://doi.org/10.1051/sands/2023015 [Google Scholar]
  6. Lin Y, Wang H and Zha H. The technology of radio frequency fingerprint identification based on deep learning for 5G application. Secur Saf 2024; 3: 2023026. https://doi.org/10.1051/sands/2023026 [Google Scholar]
  7. Huang Z, Liu S and Sheng Z et al. Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers. Secur Saf 2024; 3: 2023031. https://doi.org/10.1051/sands/2023031 [Google Scholar]
  8. Deng Z, Jin L and Hu X et al. A physical layer secret key consistency enhancement scheme using constellation decision information. Secur Saf 2024; 3: 2023033. https://doi.org/10.1051/sands/2023033 [Google Scholar]

© The Author(s) 2024. Published by EDP Sciences and China Science Publishing & Media Ltd.

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.