{"title":"基于物理层安全的6G通信值使能技术","authors":"Eduard Axel Jorswieck, Pin-Hsun Lin, C. Janda","doi":"10.1109/FNWF55208.2022.00102","DOIUrl":null,"url":null,"abstract":"Novel security primitives built on physical layer parameters gain interest for the design of the wireless 6G networks. Regarding key value indicators (KVI), the requirements for future 6G wireless networks are formulated. We select a subset of these KVIs, including safety, anonymity, scalability, sustainability, reliability, and resilience. First, the KVIs are defined. Next, we identify and review suitable physical layer security techniques, including selected results. They contain a coding theorem for arbitrarily varying wiretap channels with an informed jammer. Results on practical secret key generation are reviewed. Confidential stealth, and covert communications are included as well as certain differential privacy techniques. The zero-outage secrecy rate and ergodic secrecy rate maximization are briefly described, too. Finally, multi-mode fiber transmission, multiple-input multiple-output multiple-eavesdropper wiretap channels, and reconfigurable intelligent surfaces are listed. We argue that these results and physical layer security techniques enable the envisaged KVIs. Finally, open gaps for future research are motivated and discussed.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Security Based Enabling Technologies for 6G Communications Values\",\"authors\":\"Eduard Axel Jorswieck, Pin-Hsun Lin, C. Janda\",\"doi\":\"10.1109/FNWF55208.2022.00102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Novel security primitives built on physical layer parameters gain interest for the design of the wireless 6G networks. Regarding key value indicators (KVI), the requirements for future 6G wireless networks are formulated. We select a subset of these KVIs, including safety, anonymity, scalability, sustainability, reliability, and resilience. First, the KVIs are defined. Next, we identify and review suitable physical layer security techniques, including selected results. They contain a coding theorem for arbitrarily varying wiretap channels with an informed jammer. Results on practical secret key generation are reviewed. Confidential stealth, and covert communications are included as well as certain differential privacy techniques. The zero-outage secrecy rate and ergodic secrecy rate maximization are briefly described, too. Finally, multi-mode fiber transmission, multiple-input multiple-output multiple-eavesdropper wiretap channels, and reconfigurable intelligent surfaces are listed. We argue that these results and physical layer security techniques enable the envisaged KVIs. Finally, open gaps for future research are motivated and discussed.\",\"PeriodicalId\":300165,\"journal\":{\"name\":\"2022 IEEE Future Networks World Forum (FNWF)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Future Networks World Forum (FNWF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FNWF55208.2022.00102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Future Networks World Forum (FNWF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FNWF55208.2022.00102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical Layer Security Based Enabling Technologies for 6G Communications Values
Novel security primitives built on physical layer parameters gain interest for the design of the wireless 6G networks. Regarding key value indicators (KVI), the requirements for future 6G wireless networks are formulated. We select a subset of these KVIs, including safety, anonymity, scalability, sustainability, reliability, and resilience. First, the KVIs are defined. Next, we identify and review suitable physical layer security techniques, including selected results. They contain a coding theorem for arbitrarily varying wiretap channels with an informed jammer. Results on practical secret key generation are reviewed. Confidential stealth, and covert communications are included as well as certain differential privacy techniques. The zero-outage secrecy rate and ergodic secrecy rate maximization are briefly described, too. Finally, multi-mode fiber transmission, multiple-input multiple-output multiple-eavesdropper wiretap channels, and reconfigurable intelligent surfaces are listed. We argue that these results and physical layer security techniques enable the envisaged KVIs. Finally, open gaps for future research are motivated and discussed.