The University of Southampton
University of Southampton Institutional Repository

A survey on wireless security: technical challenges, recent advances, and future trends

A survey on wireless security: technical challenges, recent advances, and future trends
A survey on wireless security: technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.
0018-9219
1727-1765
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhu, Jia
97efce51-67f8-43c6-ab8e-8224182c3a8b
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zou, Yulong
0359c94b-b989-448a-8164-da4047c4823f
Zhu, Jia
97efce51-67f8-43c6-ab8e-8224182c3a8b
Wang, Xianbin
f0db6867-9a5c-4ac4-9403-609f1d146cd4
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1

Zou, Yulong, Zhu, Jia, Wang, Xianbin and Hanzo, Lajos (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104 (9), 1727-1765. (doi:10.1109/JPROC.2016.2558521).

Record type: Article

Abstract

Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

Text
07467419.pdf - Version of Record
Available under License Creative Commons Attribution.
Download (5MB)
Text
commented-jproc-hanzo-2558521-proof11.pdf - Other
Restricted to Repository staff only
Request a copy

More information

Accepted/In Press date: 21 April 2016
e-pub ahead of print date: 10 May 2016
Published date: September 2016

Identifiers

Local EPrints ID: 396322
URI: http://eprints.soton.ac.uk/id/eprint/396322
ISSN: 0018-9219
PURE UUID: 651a286e-17eb-48b3-ac3c-ff9e0dd6d57d
ORCID for Lajos Hanzo: ORCID iD orcid.org/0000-0002-2636-5214

Catalogue record

Date deposited: 08 Jun 2016 09:11
Last modified: 18 Mar 2024 02:35

Export record

Altmetrics

Contributors

Author: Yulong Zou
Author: Jia Zhu
Author: Xianbin Wang
Author: Lajos Hanzo ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×