Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks
Abstract
:1. Introduction
- Detailed channel models that accurately represent real-world propagation conditions are developed by 3GPP. These models are crucial for designing effective PLS algorithms. It defines modulation schemes, coding techniques, and other physical layer parameters that directly influence PLS in ISTNs. In addition, 3GPP addresses interference mitigation techniques, which are essential for PLS, as interference can degrade the performance of secure communication systems.
- Technical standards for mobile communication systems are set by 3GPP. These standards directly influence the design and implementation of physical layer technologies. By understanding 3GPP’s role in standardization, we can better appreciate the constraints and opportunities for PLS development within the context of ISTNs.
- Furthermore, 3GPP is at the forefront of technological advancements in mobile communications. Analyzing their role in technical development provides insights into emerging trends, challenges, and potential solutions that directly impact PLS research and development.
2. Background
- Confidentiality: PLS safeguards information from unauthorized access through various methods. It can establish a secure key exchange by leveraging channel characteristics as a shared secret. Moreover, sensitive data can be embedded subtly within the transmitted signal, rendering it imperceptible to eavesdroppers. Additionally, PLS complements traditional encryption by providing an extra layer of protection rooted in the physical layer’s properties.
- Authentication: PLS contributes to verifying the authenticity of communication participants. By utilizing unique channel characteristics, physical layer fingerprinting can authenticate the transmitter. This technology also aids in confirming the identity of devices through their distinct physical layer parameters. Furthermore, PLS enhances message integrity by detecting and mitigating tampering attempts at the physical layer.
- Integrity: To preserve data integrity, PLS incorporates error correction codes to rectify transmission errors. It also functions as an anomaly detection tool, identifying irregularities that may signal malicious activities. Additionally, PLS contributes to data origin authentication by incorporating physical layer information into the verification process.
- Latency requirement: For low-latency requirements, delays incurred by communication and computation overhead should be minimized.
- Massive IoT deployment will need the low complexity that can be provided by PLS, or a hybrid approach can be taken, where a cross-layer low-weight mechanism can ensure security.
- Post-quantum era: With the advent of quantum computing, encryption algorithms would be more vulnerable to cyberattacks.
- Edge intelligence: As satellites can serve as edge computing devices, AI edge intelligence based on PLS can play a larger role.
- Physical layer key generation: This utilizes the randomness inherent in wireless channels to establish a shared secret key between communicating devices, e.g., Alice and Bob.
- RF-fingerprinting-based authentication: This technique creates a unique fingerprint based on the RF characteristics of the device’s communication signal. Several factors, such as signal strength, fading patterns, and noise, can contribute to this fingerprint. The fingerprint is then compared to a pre-stored reference fingerprint for authentication.
- Localization-based authentication: This method relies on the physical location of a device to verify its identity. The location is determined by using techniques like GPS, WiFi fingerprinting, or cellular network positioning. If the reported location matches that expected for a legitimate device, authentication is successful. It should be noted that 6G aims for centimeter-level accuracy in positioning.
3. Existing Surveys
4. Review
- We classify PLS methods into four main categories: resource allocation, beamforming, cooperative communication, and physical characteristics. For each category, we provide a comprehensive review of state-of-the-art research conducted in recent years.
- In the area of resource allocation, we discuss various strategies designed to optimize the use of network resources while ensuring secure communication. These strategies often involve complex optimization techniques to efficiently manage the allocation of bandwidth, power, and other resources, aiming to maximize secrecy capacity and enhance overall network security.
- Beamforming is another crucial aspect of our review. We examine advanced beamforming techniques that focus signals in specific directions to improve signal quality and reduce the risk of eavesdropping. By leveraging optimization algorithms, these techniques enhance the secrecy capacity and energy efficiency of the network.
- Cooperative communication involves multiple network nodes working together to achieve secure communication. We highlight recent advancements in this field, including methods where nodes cooperate to create a more robust and secure communication environment. These methods often use optimization techniques to balance cooperation benefits with energy efficiency and security requirements.
- Finally, we explore physical characteristics that inherently enhance the security of ISTNs. This includes the exploitation of unique propagation properties of wireless signals, such as path loss, fading, and channel properties, to improve security. Techniques in this category often involve optimizing these physical properties to achieve better secrecy capacity and normalized secrecy capacity.
4.1. Performance Parameters
- Secrecy Capacity (): This metric measures the maximum rate at which confidential information can be transmitted reliably over a communication channel while keeping it secret from unauthorized users. It takes into account both the legitimate channel and the eavesdropper’s channel. It is defined as [49]
- Secrecy Outage Probability (): The secrecy outage probability represents the probability that the secrecy capacity falls below a certain threshold. It indicates the likelihood of failing to maintain secure communication due to channel conditions. This metric is expressed as [50]
- Secrecy Diversity Gain (): Secrecy diversity gain, also known as secrecy diversity order, measures the improvement in secrecy capacity achieved by employing multiple antennas or multiple transmit/receive paths. It quantifies the robustness of the system to eavesdropping attacks and is defined as [51]
- Secrecy Rate (): The secrecy rate represents the achievable rate of secure communication over a given channel. It considers the trade-off between the transmission rate and the level of secrecy [52]. The achievable secrecy rate is defined as
- Ergodic Secrecy Rate: This metric calculates the average secrecy rate over all possible channel realizations. It provides a more comprehensive view of the system’s security performance under varying channel conditions [53].
- Outage Secrecy Capacity: The outage secrecy capacity represents the maximum achievable secrecy capacity subject to a certain outage probability constraint. It accounts for the randomness in channel conditions and ensures a certain level of security even under adverse conditions [54]. It is defined as
- Mutual Information Secrecy: MIS quantifies the information-theoretic secrecy provided by the system. It measures the difference between the mutual information of the legitimate receiver and that of the eavesdropper. The metric is defined for a discrete memoryless-channel as follows [55]:
- Secure Energy Efficiency: This metric defines the secret bits transmitted per unit energy consumption and is defined as [56]
- Probability of Nonzero Secrecy Capacity (): This metric indicates the probability that the secrecy capacity is nonzero, meaning that secure communication is possible. It reflects the reliability of achieving secrecy in the system. The metric is defined as
- Equivocation Rate: The equivocation rate quantifies the uncertainty an eavesdropper has about the actual message sent by Alice to Bob after it has been transmitted through a physical channel.
- Normalized Secrecy Capacity (): This parameter takes into account the relative strength of Eve’s signal compared to Bob’s signal and is defined as follows [57]:
- Physical Layer Authentication Rate: While secrecy focuses on keeping information confidential, authentication ensures the legitimacy of the communicating parties. This metric assesses the effectiveness of PLS techniques in verifying the identity of the intended receiver, taking into account true positives (TP), true negatives (TN), false positives (FP), and false negatives (FN). It is defined as [58]
4.2. Resource Allocation
- Dynamic Resource Allocation: ISTNs are inherently heterogeneous, with terrestrial links offering high bandwidth and satellite links providing wider coverage. By dynamically allocating resources based on the type of data and security requirements, network operators can prioritize security for sensitive information [60]. For instance, critical data can be routed through terrestrial links with stronger encryption, while less sensitive data can utilize satellite links with lighter security measures.
- Energy-Efficient Resource Allocation: Resource allocation strategies can be designed to prioritize energy-efficient components of the network. For example, by offloading traffic to terrestrial links when possible and utilizing satellites only when necessary, network operators can reduce the reliance on power-hungry satellite communication [62].
- Resource Sharing and Power Control: The efficient sharing of resources between terrestrial and satellite networks can lead to significant power savings. Additionally, power control techniques can be employed to adjust transmission power based on traffic demands and channel conditions, further reducing energy consumption [63].
- Dynamic Resource Allocation: Implementing dynamic resource allocation requires sophisticated algorithms and real-time monitoring of network conditions. Frequent resource reallocation might introduce additional latency, especially for time-sensitive applications.
- Cognitive Radio Techniques: Developing and deploying cognitive radio systems can be technically challenging and expensive. Ensuring that cognitive radios do not interfere with other licensed users is a critical consideration.
- Energy-Efficient Resource Allocation: Prioritizing energy efficiency might sometimes lead to lower network performance, especially in areas with limited terrestrial infrastructure. Determining the optimal balance between energy efficiency and performance requires careful consideration of economic factors.
- Resource Sharing and Power Control: Coordinating resource sharing and power control between terrestrial and satellite networks can be complex. Ensuring that shared resources do not interfere with each other is a critical challenge.
4.3. Beamforming
- Reduced Signal Leakage: By directing signals toward intended receivers, beamforming minimizes the signal power broadcast in unintended directions. This makes it more challenging for potential eavesdroppers to intercept data, even if they are not actively trying to jam the communication [78].
- Improved SNR: Beamforming concentrates the transmitted signal toward the receiver, leading to a stronger signal and a better SNR. This can make it more difficult for attackers to inject noise or manipulate the signal to compromise data integrity [79].
4.4. Cooperative Communication
- Uncertainty in Channel Characteristics: The diverse nature of terrestrial and satellite links within ISTNs can lead to significant variations in channel characteristics like fading and noise. This makes it challenging to exploit these variations for optimal security using traditional PLS techniques [90].
- Limited Range of Terrestrial Networks: Terrestrial base stations may not always have a direct line of sight to users, especially in remote areas. This can weaken the signal strength and limit the effectiveness of PLS [91].
- Relaying: Nodes (relays) strategically positioned within the network can receive signals from the source and retransmit them toward the destination. This can help overcome signal weaknesses from long distances or obstructions in terrestrial links, improving the overall channel quality and strengthening PLS mechanisms. Relay nodes can extend the reach of terrestrial networks, enabling secure communication even in remote areas where relying solely on terrestrial links might be challenging for PLS [93,94,95]. Such a scenario is depicted in Figure 5.
- Joint Signal Processing: Network elements can collaborate to jointly process and analyze the received signals. By combining information from multiple sources, they can gain a more accurate understanding of the channel characteristics and exploit them more effectively for security purposes. Relaying and joint processing techniques can enhance signal strength and mitigate channel fading, leading to a more reliable and secure communication channel [94,96].
- Diversity Techniques: Cooperative communication allows for the creation of spatial diversity by utilizing multiple transmission paths. This makes it harder for attackers to exploit specific channel weaknesses and enhances the overall security of the communication link.
4.5. Physical Characteristics
- Fast Fading: Terrestrial links experience rapid changes in signal strength and phase due to multipath propagation. This inherent randomness can be utilized for PLS by embedding secret information into the fading patterns. An eavesdropper without knowledge of these patterns would struggle to decipher the transmitted data [103,104].
- Slow Fading: Slower fading, often observed in satellite links due to longer propagation delays, can be used for key generation. By exploiting the time-varying nature of the fading channel, a shared secret key can be established between legitimate communicators without explicitly exchanging any information [105].
- Background Noise: The inherent noise present in all communication channels can be leveraged for security purposes. By adding carefully designed noise to the transmitted signal, it becomes difficult for eavesdroppers to distinguish the actual data from the background noise, enhancing the secrecy of the communication [106].
- Forward and Reverse Links: Terrestrial and satellite links often exhibit different channel characteristics in the forward (source to destination) and reverse (destination to source) directions. This asymmetry can be exploited to create a “secrecy code” embedded in the channel itself. Legitimate communicators with knowledge of this code can successfully decode the message, while eavesdroppers without this knowledge would be unable to do so.
- Terrestrial vs. Satellite Links: The inherent differences between terrestrial and satellite links can be a valuable asset for PLS. By strategically exploiting the unique fading and noise characteristics of each type of link, communication networks can create a more complex and unpredictable environment for potential attackers.
5. Future Directions
5.1. Resource Allocation
5.2. Beamforming
5.3. Cooperative Communication
5.4. Physical Characteristics
5.5. Emerging Techniques
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
3GPP | 3rd Generation Partnership Project |
AR | Authentication rate |
CSI | Channel state information |
eMTC | enhanced Machine-type Communication |
FAR | False alarm rate |
GEO | Geosynchronous orbit |
ISTN | Integrated satellite–terrestrial network |
IoT | Internet of Things |
LEO | Low Earth Orbit |
LTE | Long-Term Evolution |
mMTC | Massive Machine-Type Communication |
MEO | Medium Earth Orbit |
MIMO | Multiple-Input and Multiple-Output |
MIS | Mutual Information Secrecy |
MDR | Missed detection rate |
NR | New Radio |
NTN | Non-terrestrial networks |
NB-IoT | Narrow-Band Internet of Things |
PLS | Physical layer security |
PLKG | Physical layer key generation |
RAN | Radio Access Network |
RAT | Radio Access Technology |
RF | Radio Frequency |
STN | Satellite–terrestrial network |
TN | Terrestrial network |
UAV | Unmanned Aerial Vehicle |
UE | User equipment |
XR | Extended Reality |
References
- Attaran, M. The impact of 5G on the evolution of intelligent automation and industry digitization. J. Ambient Intell. Humaniz. Comput. 2023, 14, 5977–5993. [Google Scholar] [CrossRef] [PubMed]
- Sufyan, A.; Khan, K.B.; Khashan, O.A.; Mir, T.; Mir, U. From 5G to beyond 5G: A comprehensive survey of Wireless network evolution, challenges, and promising technologies. Electronics 2023, 12, 2200. [Google Scholar] [CrossRef]
- Nemati, M.; Al Homssi, B.; Krishnan, S.; Park, J.; Loke, S.W.; Choi, J. Non-terrestrial networks with UAVs: A projection on flying ad-hoc networks. Drones 2022, 6, 334. [Google Scholar] [CrossRef]
- 3GPP. About Us. Available online: https://www.3gpp.org/about-us (accessed on 6 November 2024).
- El Jaafari, M.; Chuberre, N.; Anjuere, S.; Combelles, L. Introduction to the 3GPP-defined NTN standard: A comprehensive view on the 3GPP work on NTN. Int. J. Satell. Commun. Netw. 2023, 41, 220–238. [Google Scholar] [CrossRef]
- Saad, M.M.; Tariq, M.A.; Khan, M.T.R.; Kim, D. Non-Terrestrial Networks: An Overview of 3GPP Release 17 & 18. IEEE Internet Things Mag. 2024, 7, 20–26. [Google Scholar] [CrossRef]
- Holma, H.; Toskala, A.; Nakamura, T. 5G Technology: 3GPP New Radio; John Wiley & Sons: Hoboken, NJ, USA, 2020. [Google Scholar]
- Guidolin, F.; Nekovee, M.; Badia, L.; Zorzi, M. A study on the coexistence of fixed satellite service and cellular networks in a mmWave scenario. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 2444–2449. [Google Scholar]
- Cho, Y.; Kim, H.K.; Nekovee, M.; Jo, H.S. Coexistence of 5G with satellite services in the millimeter-wave band. IEEE Access 2020, 8, 163618–163636. [Google Scholar] [CrossRef]
- Goto, D.; Shibayama, H.; Yamashita, F.; Yamazato, T. LEO-MIMO satellite systems for high capacity transmission. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
- Heo, J.; Sung, S.; Lee, H.; Hwang, I.; Hong, D. MIMO satellite communication systems: A survey from the PHY layer perspective. IEEE Commun. Surv. Tutor. 2023, 25, 1543–1570. [Google Scholar] [CrossRef]
- National Instruments. 3GPP Release 15 Overview 3rd Generation Partnership Project (3GPP) Members Meet Regularly to Collaborate and Create Cellular Communications Standards. IEEE Spectrum. Available online: https://spectrum.ieee.org/3gpp-release-15-overview (accessed on 6 November 2024).
- 3GPP. Enhanced LTE Support for Aerial Vehicles. Technical Report (TR) 36.777, 3rd Generation Partnership Project (3GPP) 2018. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3231 (accessed on 6 November 2024).
- Muruganathan, S.D.; Lin, X.; Määttänen, H.L.; Sedin, J.; Zou, Z.; Hapsari, W.A.; Yasukawa, S. An Overview of 3GPP Release-15 Study on Enhanced LTE Support for Connected Drones. IEEE Commun. Stand. Mag. 2021, 5, 140–146. [Google Scholar] [CrossRef]
- Le, T.K.; Salim, U.; Kaltenberger, F. An Overview of Physical Layer Design for Ultra-Reliable Low-Latency Communications in 3GPP Releases 15, 16, and 17. IEEE Access 2021, 9, 433–444. [Google Scholar] [CrossRef]
- 3GPP TR 23.725 V16.2.0 (2019–06). Study on Enhancement of Ultra-Reliable Low-Latency Communication (URLLC) Support in the 5G Core Network (5GC) (Release 16). 3GPP 2019. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3453 (accessed on 6 November 2024).
- Baek, S.; Kim, D.; Tesanovic, M.; Agiwal, A. 3GPP New Radio Release 16: Evolution of 5G for Industrial Internet of Things. IEEE Commun. Mag. 2021, 59, 41–47. [Google Scholar] [CrossRef]
- Nwakanma, C.I.; Anantha, A.P.; Islam, F.B.; Lee, J.M.; Kim, D.S. 3GPP Release-16 for Industrial Internet of Things and Mission Critical Communications. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 21–23 October 2020; pp. 403–406. [Google Scholar] [CrossRef]
- Peisa, J.; Persson, P.; Parkvall, S.; Dahlman, E.; Grøvlen, A.; Hoymann, C.; Gerstenberger, D. 5G evolution: 3GPP Releases 16 & 17 Overview. Ericsson Technol. Rev. 2020, 2020, 2–13. [Google Scholar] [CrossRef]
- Harounabadi, M.; Soleymani, D.M.; Bhadauria, S.; Leyh, M.; Roth-Mandutz, E. V2X in 3GPP Standardization: NR Sidelink in Release-16 and Beyond. IEEE Commun. Stand. Mag. 2021, 5, 12–21. [Google Scholar] [CrossRef]
- Euler, S.; Fu, X.; Hellsten, S.; Kefeder, C.; Liberg, O.; Medeiros, E.; Nordell, E.; Singh, D.; Synnergren, P.; Trojer, E.; et al. Using 3GPP technology for satellite communication: Most Satellite Communication Today is Based on Proprietary Solutions, but That May Soon Change. Non-Terrestrial Networks Became Part of the 3rd Generation Partnership Project Standard in Release 17, Establishing a Strong Foundation for Direct Communication Between Satellites, Smartphones and Other Types of Mass-Market User Equipment. Ericsson Technol. Rev. 2023, 2023, 2–12. [Google Scholar]
- Kumar, R.; Arnon, S. DNN beamforming for LEO satellite communication at sub-THz bands. Electronics 2022, 11, 3937. [Google Scholar] [CrossRef]
- Masini, G.; Reininger, P.; El Jaafari, M.; Vesely, A.; Chuberre, N.; Baudry, B.; Houssin, J.M. 5G meets satellite: Non-terrestrial network architecture and 3GPP. Int. J. Satell. Commun. Netw. 2023, 41, 249–261. [Google Scholar] [CrossRef]
- Mei, C.; Liu, J.; Li, J.; Zhang, L.; Shao, M. 5G network slices embedding with sharable virtual network functions. J. Commun. Netw. 2020, 22, 415–427. [Google Scholar] [CrossRef]
- Dao, N.N.; Tu, N.H.; Hoang, T.D.; Nguyen, T.H.; Nguyen, L.V.; Lee, K.; Park, L.; Na, W.; Cho, S. A review on new technologies in 3GPP standards for 5G access and beyond. Comput. Netw. 2024, 245, 110370. [Google Scholar] [CrossRef]
- Lin, X. The Bridge Toward 6G: 5G-Advanced Evolution in 3GPP Release 19. arXiv 2023, arXiv:2312.15174. [Google Scholar]
- Owen, G. 3GPP’s Release 19 Continues 5G Advanced Standardization, Sets the Stage for 6G. Counterpoint. Available online: https://www.counterpointresearch.com/insights/3gpps-release-19-continues-5g-advanced-standardization-sets-the-stage-for-6g/ (accessed on 6 November 2024).
- Montojo, J. What’s Next in 5G Advanced? Qualcomm. Available online: https://www.qualcomm.com/news/onq/2023/12/whats-next-in-5g-advanced (accessed on 6 November 2024).
- Pozdnyakov, A. iPhone 14 Will Have Satellite Connectivity. How Exactly It Will Work. Universe Today. Available online: https://www.universetoday.com/157474/iphone-14-will-have-satellite-connectivity-how-exactly-it-will-work/ (accessed on 6 November 2024).
- Samsung. Samsung SOS–Smart Phone Emergency Message Guide. Available online: https://www.samsung.com/nz/support/mobile-devices/samsung-sos-smart-phone-emergency-message-guide/ (accessed on 6 November 2024).
- 3GPP. New 6G Logo Approved. Available online: https://www.3gpp.org/news-events/3gpp-news/6g-logo-approved (accessed on 6 November 2024).
- Giordani, M.; Zorzi, M. Satellite communication at millimeter waves: A key enabler of the 6G era. In Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 17–20 February 2020; pp. 383–388. [Google Scholar]
- Dang, S.; Amin, O.; Shihada, B.; Alouini, M.S. What should 6G be? Nat. Electron. 2020, 3, 20–29. [Google Scholar] [CrossRef]
- Qi, C.; Wang, J.; Lyu, L.; Tan, L.; Zhang, J.; Li, G.Y. Key issues in wireless transmission for NTN-assisted Internet of Things. IEEE Internet Things Mag. 2024, 7, 40–46. [Google Scholar] [CrossRef]
- Fratty, R.; Saar, Y.; Kumar, R.; Arnon, S. Random routing algorithm for enhancing the cybersecurity of LEO satellite networks. Electronics 2023, 12, 518. [Google Scholar] [CrossRef]
- Scalise, P.; Boeding, M.; Hempel, M.; Sharif, H.; Delloiacovo, J.; Reed, J. A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. Future Internet 2024, 16, 67. [Google Scholar] [CrossRef]
- Manulis, M.; Bridges, C.P.; Harrison, R.; Sekar, V.; Davis, A. Cyber security in new space: Analysis of threats, key enabling technologies and challenges. Int. J. Inf. Secur. 2021, 20, 287–311. [Google Scholar] [CrossRef]
- Yadav, P.; Kumar, S.; Kumar, R. A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges. Trans. Emerg. Telecommun. Technol. 2021, 32, e4270. [Google Scholar] [CrossRef]
- Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1773–1828. [Google Scholar] [CrossRef]
- Mitev, M.; Chorti, A.; Poor, H.V.; Fettweis, G.P. What physical layer security can do for 6G security. IEEE Open J. Veh. Technol. 2023, 4, 375–388. [Google Scholar] [CrossRef]
- Han, S.; Li, J.; Meng, W.; Guizani, M.; Sun, S. Challenges of physical layer security in a satellite-terrestrial network. IEEE Netw. 2022, 36, 98–104. [Google Scholar] [CrossRef]
- Singh, R.; Ahmad, I.; Huusko, J. The Role of Physical Layer Security in Satellite-Based Networks. In Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Gothenburg, Sweden, 6–9 June 2023; pp. 36–41. [Google Scholar] [CrossRef]
- Guo, H.; Li, J.; Liu, J.; Tian, N.; Kato, N. A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G. IEEE Commun. Surv. Tutor. 2022, 24, 53–87. [Google Scholar] [CrossRef]
- Ahmad, I.; Suomalainen, J.; Porambage, P.; Gurtov, A.; Huusko, J.; Höyhtyä, M. Security of satellite-terrestrial communications: Challenges and potential solutions. IEEE Access 2022, 10, 96038–96052. [Google Scholar] [CrossRef]
- Li, B.; Fei, Z.; Zhou, C.; Zhang, Y. Physical-layer security in space information networks: A survey. IEEE Internet Things J. 2019, 7, 33–52. [Google Scholar] [CrossRef]
- Wang, P.; Zhang, J.; Zhang, X.; Yan, Z.; Evans, B.G.; Wang, W. Convergence of satellite and terrestrial networks: A comprehensive survey. IEEE Access 2019, 8, 5550–5588. [Google Scholar] [CrossRef]
- Sun, Y.; Peng, M.; Zhang, S.; Lin, G.; Zhang, P. Integrated Satellite-Terrestrial Networks: Architectures, Key Techniques, and Experimental Progress. IEEE Netw. 2022, 36, 191–198. [Google Scholar] [CrossRef]
- Gu, Y.; Xu, T.; Feng, K.; Ouyang, Y.; Du, W.; Tian, X.; Lei, T. ISAC towards 6G Satellite–Terrestrial Communications: Principles, Status, and Prospects. Electronics 2024, 13, 1369. [Google Scholar] [CrossRef]
- Gopala, P.K.; Lai, L.; El Gamal, H. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
- Jameel, F.; Wyne, S.; Krikidis, I. Secrecy Outage for Wireless Sensor Networks. IEEE Commun. Lett. 2017, 21, 1565–1568. [Google Scholar] [CrossRef]
- Chae, S.H.; Lee, H. Secrecy outage probability and diversity order of Alamouti STBC over time-selective fading channels. ICT Express 2023, 9, 714–721. [Google Scholar] [CrossRef]
- Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.Y.; Leung, K.K. Secrecy Rate Optimizations for a MIMO Secrecy Channel with a Multiple-Antenna Eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
- Li, J.; Petropulu, A.P. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels. IEEE Trans. Wirel. Commun. 2011, 10, 1176–1187. [Google Scholar] [CrossRef]
- Gungor, O.; Tan, J.; Koksal, C.E.; El-Gamal, H.; Shroff, N.B. Secrecy Outage Capacity of Fading Channels. IEEE Trans. Inf. Theory 2013, 59, 5379–5397. [Google Scholar] [CrossRef]
- Sarkar, M.Z.I.; Ratnarajah, T. On the Secrecy Mutual Information of Nakagami-m Fading SIMO Channel. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Zhao, W.; Han, Z. A survey of optimization approaches for wireless physical layer security. IEEE Commun. Surv. Tutor. 2018, 21, 1878–1911. [Google Scholar] [CrossRef]
- Ma, J.; Shrestha, R.; Adelberg, J.; Yeh, C.Y.; Hossain, Z.; Knightly, E.; Jornet, J.M.; Mittleman, D.M. Security and eavesdropping in terahertz wireless links. Nature 2018, 563, 89–93. [Google Scholar] [CrossRef] [PubMed]
- Abdrabou, M.; Gulliver, T.A. Adaptive physical layer authentication using machine learning with antenna diversity. IEEE Trans. Commun. 2022, 70, 6604–6614. [Google Scholar] [CrossRef]
- Xu, K.; Zhang, H.; Long, K.; Wang, J.; Sun, L. DRL based joint affective services computing and resource allocation in ISTN. ACM Trans. Multimed. Comput. Commun. Appl. 2022, 18, 1–19. [Google Scholar] [CrossRef]
- Peng, Y.; Dong, T.; Gu, R.; Guo, Q.; Yin, J.; Liu, Z.; Zhang, T.; Ji, Y. A review of dynamic resource allocation in integrated satellite and terrestrial networks. In Proceedings of the 2018 International Conference on Networking and Network Applications (NaNA), Xi’an, China, 12–15 October 2018; pp. 127–132. [Google Scholar]
- Liang, Y.C.; Tan, J.; Jia, H.; Zhang, J.; Zhao, L. Realizing intelligent spectrum management for integrated satellite and terrestrial networks. J. Commun. Inf. Netw. 2021, 6, 32–43. [Google Scholar] [CrossRef]
- Ji, Z.; Wu, S.; Jiang, C.; Hu, D.; Wang, W. Energy-Efficient Data Offloading for Multi-Cell Satellite-Terrestrial Networks. IEEE Commun. Lett. 2020, 24, 2265–2269. [Google Scholar] [CrossRef]
- Jia, M.; Zhang, X.; Gu, X.; Liu, X.; Guo, Q. Joint UE Location Energy-Efficient Resource Management in Integrated Satellite and Terrestrial Networks. J. Commun. Inf. Netw. 2018, 3, 61–66. [Google Scholar] [CrossRef]
- Del Portillo, I.; Cameron, B.G.; Crawley, E.F. A technical comparison of three low earth orbit satellite constellation systems to provide global broadband. Acta Astronaut. 2019, 159, 123–135. [Google Scholar] [CrossRef]
- ITU. ITU Recommendation: Attenuation by Atmospheric Gases and Related Effects; ITU: Geneva, Switzerland, 2019; pp. 676–712. [Google Scholar]
- ITU. ITU Recommendation: Reference Standard Atmospheres; ITU: Geneva, Switzerland, 2017; pp. 835–836. [Google Scholar]
- Jia, M.; Zhang, X.; Sun, J.; Gu, X.; Guo, Q. Intelligent resource management for satellite and terrestrial spectrum shared networking toward B5G. IEEE Wirel. Commun. 2020, 27, 54–61. [Google Scholar] [CrossRef]
- Wang, P.; Ni, Z.; Jiang, C.; Kuang, L.; Feng, W. Dual-beam dual-frequency secure transmission for downlink satellite communication systems. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Li, J.; Han, S.; Tai, X.; Gao, C.; Zhang, Q. Physical layer security enhancement for satellite communication among similar channels: Relay selection and power allocation. IEEE Syst. J. 2019, 14, 433–444. [Google Scholar] [CrossRef]
- Lu, W.; An, K.; Yan, X.; Liang, T. Power-efficient secure beamforming in cognitive satellite-terrestrial networks. In Proceedings of the 2019 27th European Signal Processing Conference (EUSIPCO), A Coruna, Spain, 2–6 September 2019; pp. 1–5. [Google Scholar]
- Zhang, Y.; Ye, J.; Pan, G.; Alouini, M.S. Secrecy outage analysis for satellite-terrestrial downlink transmissions. IEEE Wirel. Commun. Lett. 2020, 9, 1643–1647. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Next-Generation Security for LEO Satellite Communication: Sub-THz Frequency Paradigm. In Proceedings of the 2023 IEEE 5th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), Hamburg, Germany, 7–8 October 2023; pp. 442–447. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Enhancing cybersecurity of satellites at sub-thz bands. In Proceedings of the International Symposium on Cyber Security, Cryptology, and Machine Learning, Be’er Sheva, Israel, 30 June–1 July 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 356–365. [Google Scholar]
- Palacios, J.; González-Prelcic, N.; Mosquera, C.; Shimizu, T.; Wang, C.H. A hybrid beamforming design for massive MIMO LEO satellite communications. Front. Space Technol. 2021, 2, 696464. [Google Scholar] [CrossRef]
- Chen, Z.; Li, H.; Cui, G.; Rangaswamy, M. Adaptive transmit and receive beamforming for interference mitigation. IEEE Signal Process. Lett. 2014, 21, 235–239. [Google Scholar] [CrossRef]
- Lu, W.; Liang, T.; An, K.; Yang, H. Secure beamforming and artificial noise algorithms in cognitive satellite-terrestrial networks with multiple eavesdroppers. IEEE Access 2018, 6, 65760–65771. [Google Scholar] [CrossRef]
- Dong, H.; Hua, C.; Liu, L.; Xu, W.; Guo, S. Optimization-Driven DRL-Based Joint Beamformer Design for IRS-Aided ITSN Against Smart Jamming Attacks. IEEE Trans. Wirel. Commun. 2023, 23, 667–682. [Google Scholar] [CrossRef]
- Ng, D.W.K.; Lo, E.S.; Schober, R. Robust Beamforming for Secure Communication in Systems with Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2014, 13, 4599–4615. [Google Scholar] [CrossRef]
- Vithanage, C.M.; Wang, Y.; Coon, J.P. Transmit beamforming methods for improved received signal-to-noise ratio in equivalent isotropic radiated power-constrained systems. IET Commun. 2009, 3, 38–47. [Google Scholar] [CrossRef]
- Van Torre, P.; Scarpello, M.L.; Vallozzi, L.; Rogier, H.; Moeneclaey, M.; Vande Ginste, D.; Verhaevert, J. Indoor Off-Body Wireless Communication: Static Beamforming versus Space-Time Coding. Int. J. Antennas Propag. 2012, 2012, 413683. [Google Scholar] [CrossRef]
- Li, W.; Huang, X.; Leung, H. Performance evaluation of digital beamforming strategies for satellite communications. IEEE Trans. Aerosp. Electron. Syst. 2004, 40, 12–26. [Google Scholar] [CrossRef]
- Kim, D.; Park, J.; Lee, N. Coverage analysis of dynamic coordinated beamforming for LEO satellite downlink networks. IEEE Trans. Wirel. Commun. 2024, 23, 12239–12255. [Google Scholar] [CrossRef]
- Wang, Z.; Yin, Z.; Wang, X.; Cheng, N.; Song, Y.; Luan, T.H. CNN-Based Synergetic Beamforming for Symbiotic Secure Transmissions in Integrated Satellite-Terrestrial Network. In Proceedings of the 2023 IEEE 23rd International Conference on Communication Technology (ICCT), Wuxi, China, 20–22 October 2023; pp. 1106–1111. [Google Scholar]
- Zhao, B.; Lin, M.; Xiao, S.; Ouyang, J.; Al-Dhahir, N. IRS empowered robust secure transmission for integrated satellite-terrestrial networks. IEEE Wirel. Commun. Lett. 2022, 12, 336–340. [Google Scholar] [CrossRef]
- Lin, M.; Lin, Z.; Zhu, W.P.; Wang, J.B. Joint beamforming for secure communication in cognitive satellite terrestrial networks. IEEE J. Sel. Areas Commun. 2018, 36, 1017–1029. [Google Scholar] [CrossRef]
- Bankey, V.; Upadhyay, P.K. Physical layer security of multiuser multirelay hybrid satellite-terrestrial relay networks. IEEE Trans. Veh. Technol. 2019, 68, 2488–2501. [Google Scholar] [CrossRef]
- Cui, G.; Zhu, Q.; Xu, L.; Wang, W. Secure beamforming and jamming for multibeam satellite systems with correlated wiretap channels. IEEE Trans. Veh. Technol. 2020, 69, 12348–12353. [Google Scholar] [CrossRef]
- Duong, T.Q.; Nguyen, L.D.; Bui, T.T.; Pham, K.D.; Karagiannidis, G.K. Machine Learning-Aided Real-Time Optimized Multibeam for 6G Integrated Satellite-Terrestrial Networks: Global Coverage for Mobile Services. IEEE Netw. 2023, 37, 86–93. [Google Scholar] [CrossRef]
- Zhang, M.; Yang, X.; Bu, Z. Beam-Hopping-Based Resource Allocation in Integrated Satellite-Terrestrial Networks. Sensors 2024, 24, 4699. [Google Scholar] [CrossRef]
- Su, B.; Ni, Q.; Yu, W. Robust transmit beamforming for SWIPT-enabled cooperative NOMA with channel uncertainties. IEEE Trans. Commun. 2019, 67, 4381–4392. [Google Scholar] [CrossRef]
- Saluja, D.; Singh, R.; Choi, K.; Kumar, S. Design and Analysis of Aerial-Terrestrial Network: A Joint Solution for Coverage and Rate. IEEE Access 2021, 9, 81855–81870. [Google Scholar] [CrossRef]
- Dong, L.; Han, Z.; Petropulu, A.; Poor, H. Improving Wireless Physical Layer Security via Cooperating Relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
- Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 2018, 21, 2734–2771. [Google Scholar] [CrossRef]
- Van Nguyen, B.; Jung, H.; Kim, K. Physical layer security schemes for full-duplex cooperative systems: State of the art and beyond. IEEE Commun. Mag. 2018, 56, 131–137. [Google Scholar] [CrossRef]
- Hoang, T.M.; Duong, T.Q.; Suraweera, H.A.; Tellambura, C.; Poor, H.V. Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 2015, 63, 5039–5051. [Google Scholar] [CrossRef]
- Wang, H.M.; Luo, M.; Xia, X.G.; Yin, Q. Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI. IEEE Signal Process. Lett. 2012, 20, 39–42. [Google Scholar] [CrossRef]
- Zhao, F.; Xu, W.; Xiang, W. Integrated Satellite-Terrestrial Networks with Coordinated C-NOMA and Relay Transmission. IEEE Syst. J. 2022, 16, 5270–5280. [Google Scholar] [CrossRef]
- Shi, Y.; Liu, J.; Wang, J.; Xun, Y. Jamming-aided secure communication in ultra-dense LEO integrated satellite-terrestrial networks. China Commun. 2023, 20, 43–56. [Google Scholar] [CrossRef]
- Du, J.; Jiang, C.; Zhang, H.; Wang, X.; Ren, Y.; Debbah, M. Secure satellite-terrestrial transmission over incumbent terrestrial networks via cooperative beamforming. IEEE J. Sel. Areas Commun. 2018, 36, 1367–1382. [Google Scholar] [CrossRef]
- Nguyen, T.N.; Tran, D.H.; Van Chien, T.; Phan, V.D.; Voznak, M.; Chatzinotas, S. Security and reliability analysis of satellite-terrestrial multirelay networks with imperfect CSI. IEEE Syst. J. 2022, 17, 2824–2835. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Enhancing Satellite Link Security Against Drone Eavesdropping Through Cooperative Communication. Int. J. Satell. Commun. Netw. 2024. [Google Scholar] [CrossRef]
- Xiao, Y.; Liu, J.; Shen, Y.; Jiang, X.; Shiratori, N. Secure communication in non-geostationary orbit satellite systems: A physical layer security perspective. IEEE Access 2018, 7, 3371–3382. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Improving physical layer security of ground stations against geo satellite spoofing attacks. In Proceedings of the International Symposium on Cyber Security, Cryptology, and Machine Learning, Be’er Sheva, Israel, 29–30 June 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 458–470. [Google Scholar]
- Kumar, R.; Arnon, S. Authentication Method for Spoofing Protection in Communication and Navigation Satellites: Utilizing Atmospheric Signature. IEEE Commun. Lett. 2024, 28, 128–132. [Google Scholar] [CrossRef]
- Li, Z.; Han, S.; Xiao, L.; Peng, M. Cooperative Non-Orthogonal Broadcast and Unicast Transmission for Integrated Satellite–Terrestrial Network. IEEE Trans. Broadcast. 2023, 70, 1052–1064. [Google Scholar] [CrossRef]
- Oligeri, G.; Sciancalepore, S.; Raponi, S.; Pietro, R.D. PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. IEEE Trans. Inf. Forensics Secur. 2023, 18, 274–289. [Google Scholar] [CrossRef]
- Abdrabou, M.; Gulliver, T.A. Authentication for satellite communication systems using physical characteristics. IEEE Open J. Veh. Technol. 2022, 4, 48–60. [Google Scholar] [CrossRef]
- Kumar, R.; Arnon, S. Leveraging Atmospheric Effects with LSTM for Ensuring Cybersecurity of Satellite Links 2022. Available online: https://www.techrxiv.org/doi/full/10.36227/techrxiv.21300423.v1 (accessed on 6 November 2024).
- Kumar, R.; Arnon, S. Experimental modeling of short-term effects of rain on satellite link using machine learning. IEEE Trans. Instrum. Meas. 2023, 72, 5503812. [Google Scholar] [CrossRef]
- Zhao, J.; Li, S.; Xu, X.; Yan, H.; Zhang, Z. Adaptive resource allocation of secured access to intelligent surface enhanced satellite–terrestrial networks with two directional traffics. AEU-Int. J. Electron. Commun. 2023, 170, 154746. [Google Scholar] [CrossRef]
- Ecker, S.; Liu, B.; Handsteiner, J.; Fink, M.; Rauch, D.; Steinlechner, F.; Scheidl, T.; Zeilinger, A.; Ursin, R. Strategies for achieving high key rates in satellite-based QKD. Npj Quantum Inf. 2021, 7, 5. [Google Scholar] [CrossRef]
- Mondin, M.; Daneshgaran, F.; Di Stasio, F.; Arnon, S.; Kupferman, J.; Genovese, M.; Degiovanni, I.; Piacentini, F.; Traina, P.; Meda, A.; et al. Analysis, Design and Implementation of an End-to-End QKD Link. In Proceedings of the Advanced Technologies for Security Applications: Proceedings of the NATO Science for Peace and Security ‘Cluster Workshop on Advanced Technologies’, Leuven, Belgium, 17–18 September 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 55–64. [Google Scholar]
- Daneshgaran, F.; Di Stasio, F.; Mondin, M.; Arnon, S.; Kupferman, J. System parameter optimization for minimization of sign error probability in free space optical CV-QKD. In Proceedings of the Quantum Communications and Quantum Imaging XVII, San Diego, CA, USA, 11–15 August 2019; Volume 11134, pp. 96–101. [Google Scholar]
- Dirks, B.; Ferrario, I.; Le Pera, A.; Finocchiaro, D.V.; Desmons, M.; de Lange, D.; de Man, H.; Meskers, A.J.; Morits, J.; Neumann, N.M.; et al. GEOQKD: Quantum key distribution from a geostationary satellite. In Proceedings of the International Conference on Space Optics—ICSO 2020, Online, 30 March–2 April 2021; Volume 11852, pp. 222–236. [Google Scholar]
- Dequal, D.; Trigo Vidarte, L.; Roman Rodriguez, V.; Vallone, G.; Villoresi, P.; Leverrier, A.; Diamanti, E. Feasibility of satellite-to-ground continuous-variable quantum key distribution. Npj Quantum Inf. 2021, 7, 3. [Google Scholar] [CrossRef]
- Islam, T.; Sidhu, J.S.; Higgins, B.L.; Brougham, T.; Vergoossen, T.; Oi, D.K.; Jennewein, T.; Ling, A. Finite-resource performance of small-satellite-based quantum-key-distribution missions. PRX Quantum 2024, 5, 030101. [Google Scholar] [CrossRef]
- Li, Z.; Wang, S.; Han, S.; Meng, W.; Li, C. Joint design of beam hopping and multiple access based on cognitive radio for integrated satellite-terrestrial network. IEEE Netw. 2023, 37, 36–43. [Google Scholar] [CrossRef]
- Khoshafa, M.H.; Ngatched, T.M.; Ahmed, M.H. RIS-aided physical layer security improvement in underlay cognitive radio networks. IEEE Syst. J. 2023, 17, 6437–6448. [Google Scholar] [CrossRef]
- Stojanović, N.M.; Todorović, B.M.; Ristić, V.B.; Stojanović, I.V. Direct sequence spread spectrum: History, principles and modern applications. Vojnoteh. Glas. Tech. Cour. 2024, 72, 790–813. [Google Scholar] [CrossRef]
- Todorović, B.M.; Stojanović, N.M.; Velikić, G.S. Is Direct Sequence Spread Spectrum Modulation Promising for AI-Based Design of 6G Networks? IEEE Consum. Electron. Mag. 2024, 13, 7–10. [Google Scholar] [CrossRef]
- Radoš, K.; Brkić, M.; Begušić, D. Recent Advances on Jamming and Spoofing Detection in GNSS. Sensors 2024, 24, 4210. [Google Scholar] [CrossRef]
- Bose, S.C. GPS spoofing detection by neural network machine learning. IEEE Aerosp. Electron. Syst. Mag. 2021, 37, 18–31. [Google Scholar] [CrossRef]
- Kang, M.; Park, S.; Lee, Y. A Survey on Satellite Communication System Security. Sensors 2024, 24, 2897. [Google Scholar] [CrossRef] [PubMed]
- Wu, Z.; Liang, C.; Zhang, Y. Blockchain-based authentication of GNSS civil navigation message. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 4380–4392. [Google Scholar] [CrossRef]
- Li, H.; Shi, D.; Wang, W.; Liao, D.; Gadekallu, T.R.; Yu, K. Secure routing for LEO satellite network survivability. Comput. Netw. 2022, 211, 109011. [Google Scholar] [CrossRef]
- Kodheli, O.; Lagunas, E.; Maturo, N.; Sharma, S.K.; Shankar, B.; Montoya, J.F.M.; Duncan, J.C.M.; Spano, D.; Chatzinotas, S.; Kisseleff, S.; et al. Satellite communications in the new space era: A survey and future challenges. IEEE Commun. Surv. Tutor. 2020, 23, 70–109. [Google Scholar] [CrossRef]
- Zhang, H.; Song, W.; Liu, X.; Sheng, M.; Li, W.; Long, K.; Dobre, O.A. Intelligent Channel Prediction and Power Adaptation in LEO Constellation for 6G. IEEE Netw. 2023, 37, 110–117. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhou, J.; Chen, Z.; Wang, X. A DRL-Based Satellite Service Allocation Method in LEO Satellite Networks. Aerospace 2024, 11, 386. [Google Scholar] [CrossRef]
- Anderson, J.; Lo, S.; Walter, T. Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication. NAVIGATION J. Inst. Navig. 2024, 71, navi.655. [Google Scholar] [CrossRef]
- Zaidat, O.O.; Kasab, S.A.; Sheth, S.; Ortega-Gutierrez, S.; Rai, A.T.; Given, C.A.; Grandhi, R.; Mokin, M.; Katz, J.M.; Maud, A.; et al. TESLA trial: Rationale, protocol, and design. Stroke Vasc. Interv. Neurol. 2023, 3, e000787. [Google Scholar] [CrossRef]
Definition | Value |
---|---|
Transmitter antenna diameter | 3.5 m |
Receiver antenna diameter | 1 m |
Satellite altitude | 1000 km |
Atmospheric height | 100 km |
Antenna efficiency | 0.9 |
Frequency | 28.5 GHz |
Bandwidth | 2.1 GHz |
Receiver noise temperature | 500 K |
Reference | Optimization Variable | Constraint |
---|---|---|
[67] | Spectrum allocation | |
[68] | Secrecy capacity | Limited power and quality of service |
[69] | Secrecy outage probability | Total transmission power of satellite and relay |
[70] | Transmit power | Secrecy rate and communication rate |
[71] | Secrecy outage probability | Secrecy rate |
[72] | Power spectral density | |
[73] | Signal-to-noise ratio |
Reference | Optimization Variable | Constraints |
---|---|---|
[83] | Signal-to-noise ratio | Maximum transmit power and secrecy rate |
[84] | Achievable sum rate | Intercept probability and transmit power |
[85] | Total transmit power | QoS requirement and secrecy rate |
[86] | Secrecy outage probability | |
[87] | Power consumption | Secrecy outage probability |
[88] | Optimal multibeam design | Energy-efficient allocation |
[89] | Weighted sum of capacity and minimum capacity-to-demand ratio |
Reference | Optimization Variable | Constraint |
---|---|---|
[97] | Outage probability | |
[98] | Secrecy energy efficiency | Transmit power and secrecy rate |
[99] | Secrecy rate | Power and transmission quality |
[100] | Outage probability |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kumar, R.; Arnon, S. Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks. Electronics 2024, 13, 4414. https://doi.org/10.3390/electronics13224414
Kumar R, Arnon S. Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks. Electronics. 2024; 13(22):4414. https://doi.org/10.3390/electronics13224414
Chicago/Turabian StyleKumar, Rajnish, and Shlomi Arnon. 2024. "Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks" Electronics 13, no. 22: 4414. https://doi.org/10.3390/electronics13224414
APA StyleKumar, R., & Arnon, S. (2024). Review of Physical Layer Security in Integrated Satellite–Terrestrial Networks. Electronics, 13(22), 4414. https://doi.org/10.3390/electronics13224414