Abstract
This paper reviews various encryption strategies designed to enhance privacy in wireless communication, with a focus on leveraging physical layer security. Exploring techniques that utilize inherent wireless channel features for secure communication, the survey presents the strengths and challenges of each method. The aim is to provide a straightforward overview for researchers, practitioners, and decision-makers, about the evolving landscape of encryption methods in wireless channels for improved privacy. Furthermore, it discusses how these physical layer key generation techniques can be integrated with advanced technologies by providing a suggested model by combining the Machine learning and the Multi authority ciphertext-policy attribute-based encryption (CP-ABE) to ensure privacy in wireless channels.
References
- X. Liu, H. Zhai, Y. Shen, B. Lou, C. Jiang, T. Li, S. B. Hussain, and G. Shen, ‘‘A Practical Method to Achieve Perfect Secrecy: Encryption Wireless Communication on the Fly Using One Time Pad and Key Generation,’’ IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 13, no. 13, pp. 414–427, 2020.
- Y. T. Solano-Correa, F. Bovolo, L. Bruzzone, and D. Fernandez-Prieto, ‘‘OTP Encrypted Data Transmission: Random Shifting Intelligent Reflecting Surface,’’ IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 3, pp. 2150–2164, Mar. 2020.
- Y. J. E. Gbodjo, D. Ienco, and L. Leroux, ‘‘Creating a Perfectly Secure Data Transmission Channel Between Unmanned Aerial Vehicle and Ground Control Station Based on One-Time Pads: A Method,’’ IEEE Geoscience and Remote Sensing Letters, vol. 7, no. 2, pp. 307–311, Feb. 2020.
- S. D. Fabiyi, H. Vu, C. Tachtatzis, P. Murray, D. Harle, T. K. Dao, I. Andonovic, J. Ren, and S. Marshall, ‘‘Constructive or Destructive? Reconfigurable Intelligent Surface for Physical Layer Key Generation,’’ IEEE Access, vol. 8, pp. 22493–22505, 2020.
- Z. Li, G. Chen, and T. Zhang, ‘‘Highly Secured Hybrid Image Steganography with an Improved Key Generation and Exchange for One-Time-Pad Encryption Method,’’ IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 13, no. 13, pp. 847–858, 2020.
- Li, Jin, Qiong Huang, Xiaofeng Chen, Sherman SM Chow, Duncan S. Wong, and Dongqing Xie. "Multi-authority ciphertext-policy attribute-based encryption with accountability." In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 386-390. 2011.
- Muller, Sascha, Stefan Katzenbeisser, and Claudia Eckert. "On multi-authority ciphertext-policy attribute-based encryption." Bulletin of the Korean Mathematical Society 46, no. 4 (2009): 803-819.
- Ancy, P. R., and Addapalli VN Krishna. "Machine Learning Techniques for Resource-Constrained Devices in IoT Applications with CP-ABE Scheme." In Congress on Intelligent Systems, pp. 557-566. Singapore: Springer Nature Singapore, 2022.
- Zhou, Xianfei, Kai Xu, Naiyu Wang, Jianlin Jiao, Ning Dong, Meng Han, and Hao Xu. "A secure and privacy-preserving machine learning model sharing scheme for edge-enabled IoT." IEEE Access 9 (2021): 17256-17265.
- Kurniawan, Agus, and Marcel Kyas. "Securing machine learning engines in IoT applications with attribute-based encryption." In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 30-34. IEEE, 2019.
- Baba, K. Sai, A. Sandeep Kumar, and B. Tarakeswara Rao. "Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks." International Journal of Computer Applications 132, no. 17 (2015).
- Porwal, Shardha, and Sangeeta Mittal. "Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data." In 2017 Tenth international conference on contemporary computing (IC3), pp. 1-7. IEEE, 2017.
