A survey on wireless security: technical challenges, recent advances, and future trends
A survey on wireless security: technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.
1727-1765
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhu, Jia
97efce51-67f8-43c6-ab8e-8224182c3a8b
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
September 2016
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhu, Jia
97efce51-67f8-43c6-ab8e-8224182c3a8b
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zou, Yulong, Zhu, Jia, Wang, Xianbin and Hanzo, Lajos
(2016)
A survey on wireless security: technical challenges, recent advances, and future trends.
Proceedings of the IEEE, 104 (9), .
(doi:10.1109/JPROC.2016.2558521).
Abstract
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.
Text
07467419.pdf
- Version of Record
Text
commented-jproc-hanzo-2558521-proof11.pdf
- Other
Restricted to Repository staff only
Request a copy
More information
Accepted/In Press date: 21 April 2016
e-pub ahead of print date: 10 May 2016
Published date: September 2016
Identifiers
Local EPrints ID: 396322
URI: http://eprints.soton.ac.uk/id/eprint/396322
ISSN: 0018-9219
PURE UUID: 651a286e-17eb-48b3-ac3c-ff9e0dd6d57d
Catalogue record
Date deposited: 08 Jun 2016 09:11
Last modified: 18 Mar 2024 02:35
Export record
Altmetrics
Contributors
Author:
Yulong Zou
Author:
Jia Zhu
Author:
Xianbin Wang
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics