The survey and analysis on Physical Layer Encryption techniques

Authors

  • Xingxin Yu Coventry University 2 Handy Road, 05-01 The Cathay, Singapore 229233

DOI:

https://doi.org/10.54097/42kdfv07

Keywords:

Physical Layer Key Generatio, Physical Layer Security, Machine Learning-Assisted Key Generation, Machine Learning-Enhanced Key Generation Scheme.

Abstract

Physical Layer Key Generation (PKG) has evolved as a promising technique to circumvent the problems faced by the classical symmetric key production schemes. It exploits channel reciprocity and spatial decorrelation provided by wireless medium. This paper systematically reviews the evolution of PKG technologies, discussing their working principles, performance metrics, and implementations under various scenarios such as slow-fading channels, low SNR, and multi-user environments. With recent advancements introduced—intelligent reflecting surfaces (RIS/STAR-RIS), optimization powered by AI/ML, and their integration with massive MIMO and terahertz communications—chaos, robustness, and scalability enhancements are investigated. Further exploration involves application domains from IoT and healthcare to Industry 4.0 and 6G networks, this focus shifting from proof of feasibility to full-fledged implementation. The concluded findings show that PKG is inclined to become a key security primitive for next-generation wireless systems to enjoin lightweight and efficient friendly key management schemes.

Downloads

Download data is not yet available.

References

[1] Petrov, V., Guerboukha, H., Shaikhanov, Z., Knightly, E. W., Mittleman, D. M., & Jornet, J. M. (2025). Physical Layer Security for Terahertz Communications in massive IOT. DIVA. https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1927849&dswid=851.

[2] Kumar, R., & Arnon, S. (2024). Review of physical layer security in Integrated Satellite–Terrestrial Networks. MDPI. https://www.mdpi.com/2079-9292/13/22/4414.

[3] Ma, Y., Chen, L., Lu, T., Song, Y., & Cao, K. (2024). Star-ris-assisted key generation method in quasi-static environment - EURASIP journal on Wireless Communications and networking. Springer Open. https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638 - 024 - 02388 - y.

[4] Chai, M., Liu, Y., Zhao, S., & Deng, H. (2025). Enhancing physical-layer security in UAV-assisted communications: A UAV-mounted reconfigurable intelligent surface scheme for secrecy rate optimization. MDPI. https://www.mdpi.com/2504 - 446X/9/3/208.

[5] Gao, N., Han, Y., Li, N., Jin, S., & Matthaiou, M. (2024). When physical layer key generation meets ris: Opportunities, challenges, and Road ahead | ieee journals & magazine | ieee xplore. IEEE Xplore. https://ieeexplore.ieee.org/document/10475842/.

[6] Liu, K., Li, M., Huang, K., Wan, Z., Li, Q., Sun, X., Xu, X., & Jin, L. (2024). Object‐based attention: Saliency detection using contrast via background prototypes - zhou - 2014 - electronics letters - wiley online library. The Institution of Engineering and Technology. https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/el.2014.0903.

[7] Torshizi, E. O., & Henkel, W. (2024). Pairwise physical layer secret key generation for FDD systems. IEEE Xplore. https://ieeexplore.ieee.org/document/10693595/.

[8] Gan, C., Wang, W., Hu, Y., Zhao, X., Dun, S., Xiao, Q., Wang, W., & Huang, H. (2025). Coupling secret sharing with decentralized server-aided encryption in encrypted deduplication. MDPI. https://www.mdpi.com/2076 - 3417/15/3/1245.

Downloads

Published

29-01-2026

Issue

Section

Articles

How to Cite

Yu, X. (2026). The survey and analysis on Physical Layer Encryption techniques. Academic Journal of Science and Technology, 19(2), 482-488. https://doi.org/10.54097/42kdfv07