{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:26:28Z","timestamp":1766067988324,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007847","name":"Natural Science Foundation of Jilin Province","doi-asserted-by":"publisher","award":["61941105"],"award-info":[{"award-number":["61941105"]}],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2019JM-532"],"award-info":[{"award-number":["2019JM-532"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11277-024-11294-x","type":"journal-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T13:05:20Z","timestamp":1719320720000},"page":"883-897","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9266-5215","authenticated-orcid":false,"given":"Jieling","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhiqian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mathini","family":"Sellathurai","sequence":"additional","affiliation":[]},{"given":"Ba-Zhong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yejun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,25]]},"reference":[{"key":"11294_CR1","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/OJVT.2022.3183218","volume":"3","author":"MSJ Solaija","year":"2022","unstructured":"Solaija, M. S. J., Salman, H., & Arslan, H. (2022). Towards a unified framework for physical layer security in 5G and beyond networks. IEEE Open Journal of Vehicular Technology, 3, 321\u2013343. https:\/\/doi.org\/10.1109\/OJVT.2022.3183218","journal-title":"IEEE Open Journal of Vehicular Technology"},{"issue":"1","key":"11294_CR2","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","volume":"26","author":"E Illi","year":"2023","unstructured":"Illi, E., et al. (2023). Physical layer security for authentication, confidentiality, and malicious node detection: A paradigm shift in securing IoT networks. IEEE Communications Surveys & Tutorials, 26(1), 347\u2013388. https:\/\/doi.org\/10.1109\/COMST.2023.3327327","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"9","key":"11294_CR3","doi-asserted-by":"publisher","first-page":"6164","DOI":"10.1109\/TCOMM.2022.3194981","volume":"70","author":"X Jiang","year":"2022","unstructured":"Jiang, X., Li, P., Zou, Y., Li, B., & Wang, R. (2022). Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors. IEEE Transactions on Communications, 70(9), 6164\u20136180. https:\/\/doi.org\/10.1109\/TCOMM.2022.3194981","journal-title":"IEEE Transactions on Communications"},{"key":"11294_CR4","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1109\/OJCOMS.2021.3105185","volume":"2","author":"AK Yerrapragada","year":"2021","unstructured":"Yerrapragada, A. K., Eisman, T., & Kelley, B. (2021). Physical layer security for beyond 5G: Ultra secure low latency communications. IEEE Open Journal of the Communications Society, 2, 2232\u20132242. https:\/\/doi.org\/10.1109\/OJCOMS.2021.3105185","journal-title":"IEEE Open Journal of the Communications Society"},{"key":"11294_CR5","doi-asserted-by":"publisher","first-page":"5482","DOI":"10.1109\/ACCESS.2021.3139456","volume":"10","author":"S Soderi","year":"2022","unstructured":"Soderi, S., & De Nicola, R. (2022). 6G networks physical layer security using RGB visible light communications. IEEE Access, 10, 5482\u20135496. https:\/\/doi.org\/10.1109\/ACCESS.2021.3139456","journal-title":"IEEE Access"},{"issue":"11","key":"11294_CR6","doi-asserted-by":"publisher","first-page":"9818","DOI":"10.1109\/TWC.2022.3179706","volume":"21","author":"T-X Zheng","year":"2022","unstructured":"Zheng, T.-X., et al. (2022). Physical-layer security of uplink mmWave transmissions in cellular V2X networks. IEEE Transactions on Wireless Communications, 21(11), 9818\u20139833. https:\/\/doi.org\/10.1109\/TWC.2022.3179706","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4\u20135","key":"11294_CR7","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1561\/0100000036","volume":"5","author":"Y Liang","year":"2009","unstructured":"Liang, Y., Poor, H. V., & Shamai, S. (2009). Information theoretic security. Foundations and Trends\u00ae Communications and Information Theory, 5(4\u20135), 355\u2013580.","journal-title":"Foundations and Trends\u00ae Communications and Information Theory"},{"issue":"2","key":"11294_CR8","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"D Wang","year":"2019","unstructured":"Wang, D., Bai, B., Zhao, W., & Han, Z. (2019). A survey of optimization approaches for wireless physical layer security. IEEE Communications Surveys & Tutorials, 21(2), 1878\u20131911. https:\/\/doi.org\/10.1109\/COMST.2018.2883144","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"11294_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/LCOMM.2018.2881182","volume":"23","author":"W Zhang","year":"2019","unstructured":"Zhang, W., Chen, J., Kuo, Y., & Zhou, Y. (2019). Artificial-noise-aided optimal beamforming in layered physical layer security. IEEE Communications Letters, 23(1), 72\u201375. https:\/\/doi.org\/10.1109\/LCOMM.2018.2881182","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"11294_CR10","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1109\/COMST.2020.2988615","volume":"22","author":"MA Arfaoui","year":"2020","unstructured":"Arfaoui, M. A., Soltani, M. D., Tavakkolnia, I., Ghrayeb, A., Safari, M., Assi, C. M., & Haas, H. (2020). Physical layer security for visible light communication systems: a survey. IEEE Communications Surveys & Tutorials, 22(3), 1887\u2013908. https:\/\/doi.org\/10.1109\/COMST.2020.2988615","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"11294_CR11","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/JSYST.2020.2967404","volume":"15","author":"H Jung","year":"2021","unstructured":"Jung, H., & Lee, I. H. (2021). Distributed null-steering beamformer design for physical layer security enhancement in Internet-of-Things networks. IEEE Systems Journal, 15(1), 277\u2013288. https:\/\/doi.org\/10.1109\/JSYST.2020.2967404","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"11294_CR12","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2020.3040884","volume":"16","author":"MG Schraml","year":"2021","unstructured":"Schraml, M. G., Schwarz, R. T., & Knopp, A. (2021). Multiuser MIMO concept for physical layer security in multibeam satellite systems. IEEE Transactions on Information Forensics and Security, 16(1), 1670\u20131680. https:\/\/doi.org\/10.1109\/TIFS.2020.3040884","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"11294_CR13","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1109\/TVT.2021.3057661","volume":"70","author":"C Gong","year":"2021","unstructured":"Gong, C., Yue, X., Zhang, Z., Wang, X., & Dai, X. (2021). Enhancing physical layer security with artificial noise in large-scale NOMA networks. IEEE Transactions on Vehicular Technology, 70(3), 2349\u201361. https:\/\/doi.org\/10.1109\/TVT.2021.3057661","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"11","key":"11294_CR14","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/LCOMM.2019.2936845","volume":"23","author":"C Li","year":"2019","unstructured":"Li, C., Liu, Y., Xu, Q., & Tang, Y. (2019). Self-interference cancellation with frequency offset and nonlinear distortion suppression for cooperative jamming communications. IEEE Communications Letters, 23(11), 2091\u20132094. https:\/\/doi.org\/10.1109\/LCOMM.2019.2936845","journal-title":"IEEE Communications Letters"},{"key":"11294_CR15","doi-asserted-by":"crossref","unstructured":"C. Li, W. Guo, X. Quan, Q. Xu, Y. Liu, Y. Shen, H. Zhao, and Y. Tang, \"Nonlinear distortion suppression of cooperative jamming system for secure wireless communication,\" in 2019 IEEE MTT-S International Microwave Symposium (IMS), pp. 952\u201355, 2019, 978\u20131\u20137281\u20131309\u20138\/19.","DOI":"10.1109\/MWSYM.2019.8700765"},{"key":"11294_CR16","doi-asserted-by":"crossref","unstructured":"C. Li, X. Xia, C. Shi, L. Du, J. Ma, Y. Liu, and Y. Tang, \"Cooperative jamming cancellation under nonlinearity and imperfect time-frequency alignments for physical-layer security,\" in 2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021, 978\u20131\u20137281\u20139441\u20137\/21.","DOI":"10.1109\/ICCWorkshops50388.2021.9473671"},{"issue":"1","key":"11294_CR17","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/TIFS.2018.2847452","volume":"14","author":"K Lee","year":"2019","unstructured":"Lee, K., Hong, J. P., Choi, H. H., & Quek, T. Q. S. (2019). Wireless-powered two-way relaying protocols for optimizing physical layer security. IEEE Transactions on Information Forensics and Security, 14(1), 162\u2013174. https:\/\/doi.org\/10.1109\/TIFS.2018.2847452","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"11294_CR18","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TVT.2017.2756877","volume":"67","author":"G Zhang","year":"2018","unstructured":"Zhang, G., Xu, J., Wu, Q., Cui, M., Li, X., & Lin, F. (2018). Wireless powered cooperative jamming for secure OFDM system. IEEE Transactions on Vehicular Technology, 67(2), 1331\u20131346. https:\/\/doi.org\/10.1109\/TVT.2017.2756877","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"10","key":"11294_CR19","doi-asserted-by":"publisher","first-page":"5587","DOI":"10.1007\/s11277-017-4429-3","volume":"96","author":"BH Belkacem","year":"2017","unstructured":"Belkacem, B. H., Ammari, O., & Bouallegue, M. L. (2017). Effect of power amplifier nonlinearity on the physical layer security of MIMO systems. Wireless Personal Communications, 96(10), 5587\u20135601. https:\/\/doi.org\/10.1007\/s11277-017-4429-3","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"11294_CR20","doi-asserted-by":"publisher","first-page":"e4016","DOI":"10.1002\/ett.4016","volume":"31","author":"M Saeed","year":"2020","unstructured":"Saeed, M., Moradikia, M., & Yeoh, P. (2020). Secure mm-Wave communications with imperfect hardware and uncertain eavesdropper location. Trans Emerg Telecommun Technol., 31(10), e4016. https:\/\/doi.org\/10.1002\/ett.4016","journal-title":"Trans Emerg Telecommun Technol."},{"key":"11294_CR21","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.phycom.2017.08.011","volume":"25","author":"E G\u00fcvenkaya","year":"2017","unstructured":"G\u00fcvenkaya, E., Hamamreh, J. M., & Arslan, H. (2017). On physical-layer concepts and metrics in secure signal transmission. Physical Communication, 25, 14\u201325. https:\/\/doi.org\/10.1016\/j.phycom.2017.08.011","journal-title":"Physical Communication"},{"issue":"2","key":"11294_CR22","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/TCOMM.2003.809289","volume":"51","author":"J Tellado","year":"2003","unstructured":"Tellado, J., Hoo, L. M. C., & Cioffi, J. M. (2003). Maximum-likelihood detection of nonlinearly distorted multicarrier symbols by iterative decoding. IEEE Transactions on Communications, 51(2), 218\u2013228. https:\/\/doi.org\/10.1109\/TCOMM.2003.809289","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"11294_CR23","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/TSP.2015.2477806","volume":"64","author":"Z Alina","year":"2016","unstructured":"Alina, Z., & Amrani, O. (2016). On digital post-distortion techniques. IEEE Transactions on Signal Processing, 64(3), 603\u2013614. https:\/\/doi.org\/10.1109\/TSP.2015.2477806","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"11294_CR24","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339\u2013348. https:\/\/doi.org\/10.1109\/TIT.1978.1055892","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"11294_CR25","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1049\/iet-com.2019.0916","volume":"14","author":"Y Guo","year":"2020","unstructured":"Guo, Y., & Zhang, L. (2020). Secure full duplex OFDM wireless communication based on phase relay between the legitimate nodes. IET Communications, 14(8), 1293\u20131300. https:\/\/doi.org\/10.1049\/iet-com.2019.0916","journal-title":"IET Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11294-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11294-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11294-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T20:47:22Z","timestamp":1719866842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11294-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["11294"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11294-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"8 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}