{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:06Z","timestamp":1740174846870,"version":"3.37.3"},"reference-count":23,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G) due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mrow><mml:mn fontstyle=\"italic\">1<\/mml:mn><\/mml:mrow><\/mml:math>) untrusted relay attack model, (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:mrow><mml:mn fontstyle=\"italic\">2<\/mml:mn><\/mml:mrow><\/mml:math>) trusted relay with eavesdropper attack model, and (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><mml:mrow><mml:mn fontstyle=\"italic\">3<\/mml:mn><\/mml:mrow><\/mml:math>) untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.<\/jats:p>","DOI":"10.1155\/2017\/7843843","type":"journal-article","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T16:01:47Z","timestamp":1488470507000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6327-4995","authenticated-orcid":true,"given":"Qiao","family":"Liu","sequence":"first","affiliation":[{"name":"State Key Lab of ISN, Xidian University, Xi\u2019an, Shaanxi, China"},{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Lab of ISN, Xidian University, Xi\u2019an, Shaanxi, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Lab of ISN, Xidian University, Xi\u2019an, Shaanxi, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2069150"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2146710"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2165810"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.010213.120265"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2332971"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2376885"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2016.2528260"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2003.820010"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2010.2048445"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2010.2068852"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2158487"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2009.2018322"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2014.012314.00178"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2011.2172433"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2209692"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2307276"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.081012.110236"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2014.2325861"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2011.091411.101199"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/t-wc.2008.070852"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.012711.100040"},{"volume":"3","year":"2012","key":"29"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/7843843.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/7843843.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/7843843.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T16:01:48Z","timestamp":1488470508000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/7843843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":23,"alternative-id":["7843843","7843843"],"URL":"https:\/\/doi.org\/10.1155\/2017\/7843843","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}