6Physical Layer Security
Simone Soderi1,2, Lorenzo Mucchi3, Matti Hämäläinen1, Alessandro Piva3, and Jari Iinatti1
1 Centre for Wireless Communications, University of Oulu, Oulu, Finland
2 Alstom Ferroviaria SpA, Florence, Italy
3 Department of Information Engineering, University of Florence, Florence, Italy
6.1 Introduction
Along with the rapid deployment of wireless communication networks, wireless security has become a critical concern. Unfortunately, security risks are inherent in any wireless technology. Some of these risks are similar to those of wired networks, some are exacerbated by wireless connectivity and some other are completely new. The most significant source of risks in wireless networks is that the communications medium is open to intruders. Mobile and handheld wireless devices are resource constrained (e.g. battery life) and hence such devices have limited transmission power and may use weaker cryptographic mechanisms for saving power, thereby making them easy targets for powerful adversaries. Self‐configuring heterogeneous networks may use very different levels of security, the lower secured links being a potential breach for the whole system. A direct consequence of these risks is the loss of data confidentiality and integrity and the threat of denial of service (DoS) attacks to wireless communications. Unauthorized users may gain access to system and information, corrupt the data, consume network bandwidth, degrade network performance, launch attacks that ...
Get A Comprehensive Guide to 5G Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.