Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.information theory | wireless networks | security W ireless communication is one of the most ubiquitous of modern technologies. Cellular communication alone is accessible to an estimated 5 billion people, and this is but one of an array of wireless technologies that have emerged in recent decades. Wireless networks are increasingly used for a very wide range of applications, including banking and other financial transactions, social networking, and environmental monitoring, among many others. For this reason, the security of wireless networks is of critical societal interest. Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the level of the physical transmission medium. For data confidentiality, encryption is the primary method of ensuring secrecy, a method that works well in most current situations. However, in some emerging networking architectures, issues of key management or computational complexity make the use of data encryption difficult. Examples include ad hoc networks, in which messages may pass through many intermediate terminals on the way from source to destination, and sensor or radio-frequency identification (RFID) networks such as might arise in the envisioned Internet of Things, in which the end devices are of very low complexity. For these and other reasons, there has been considerable recent interest in developing methods for secure data transmission that are based on the physical properties of the radio channel (the so-called wireless physical layer). These results are based on information theoretic characterizations of secrecy, which date to some of Claude Shannon's early work on the mathematical theory of communication (1). Whereas Shannon's work focused on symmetric key encryption systems, perhaps a more relevant development in this area was Aaron Wyner's work on the wiretap channel, which introduced the idea that secrecy can be imparted by the communication channel itself without resorting to the use of shared secret keys (2). A...