A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

Accepted to appear | Yulong Zou, Senior Member, IEEE, Jia Zhu, Xianbin Wang, Senior Member, IEEE, and Lajos Hanzo, Fellow, IEEE
This paper provides a comprehensive survey of wireless security, focusing on the technical challenges, recent advances, and future trends. It highlights the inherent vulnerabilities of wireless communications due to their broadcast nature, which makes them more susceptible to malicious attacks such as eavesdropping and jamming compared to wired networks. The paper outlines the security requirements of wireless networks, including authenticity, confidentiality, integrity, and availability, and discusses various security attacks at different protocol layers (application, transport, network, MAC, and physical layers). It reviews existing security protocols and algorithms used in standards like Bluetooth, Wi-Fi, WiMAX, and LTE, and explores emerging physical-layer security techniques, such as information-theoretic security, artificial noise-aided security, and beamforming. The paper also examines various jamming attacks and their countermeasures, and discusses the integration of physical-layer security with existing authentication and cryptography mechanisms. Finally, it identifies open challenges and future research directions in wireless security.This paper provides a comprehensive survey of wireless security, focusing on the technical challenges, recent advances, and future trends. It highlights the inherent vulnerabilities of wireless communications due to their broadcast nature, which makes them more susceptible to malicious attacks such as eavesdropping and jamming compared to wired networks. The paper outlines the security requirements of wireless networks, including authenticity, confidentiality, integrity, and availability, and discusses various security attacks at different protocol layers (application, transport, network, MAC, and physical layers). It reviews existing security protocols and algorithms used in standards like Bluetooth, Wi-Fi, WiMAX, and LTE, and explores emerging physical-layer security techniques, such as information-theoretic security, artificial noise-aided security, and beamforming. The paper also examines various jamming attacks and their countermeasures, and discusses the integration of physical-layer security with existing authentication and cryptography mechanisms. Finally, it identifies open challenges and future research directions in wireless security.
Reach us at info@study.space