{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:53:40Z","timestamp":1761648820389,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"],"award-info":[{"award-number":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"],"award-info":[{"award-number":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"],"award-info":[{"award-number":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Defense Science and Technology Innovation Special Zone of China","award":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"],"award-info":[{"award-number":["2017YFB0801903","61701538","61601514","61501516","61521003","2019M663994"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,20]]},"abstract":"<jats:p>Due to the channel estimation error, most of the physical layer secret key generation schemes need information reconciliation to correct error key bits, resulting in reduced efficiency. To solve the problem, this work proposes a novel secure communication scheme based on a equivalent interference channel. Different keys generated from imperfect channel state information are directly applied to signal scrambling and descrambling, which is equivalent to the process of a signal passing through an interference channel. Legitimate communication parties can reduce interference with the help of similar keys and channel coding without sending additional signals, while the eavesdropper channel is deteriorated due to the spatial decorrelation. For this kind of schemes, we first establish a discrete memoryless broadcast channel model to derive the expressions of bit error rate (BER), channel capacity, and security capacity for performance analysis. Simulation results verify the derivations that the proposed scheme achieves secure communication with a correlated eavesdropping channel and has a higher upper bound of transmission rate. Furthermore, we design a new metric to evaluate the efficiency and the result shows that the proposed scheme has superior performance on error reconciliation efficiency, despite its slight increase in BER.<\/jats:p>","DOI":"10.1155\/2020\/8840645","type":"journal-article","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T19:20:09Z","timestamp":1603308009000},"page":"1-15","source":"Crossref","is-referenced-by-count":8,"title":["A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4312-9889","authenticated-orcid":true,"given":"Xiaoyan","family":"Hu","sequence":"first","affiliation":[{"name":"PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6464-6263","authenticated-orcid":true,"given":"Liang","family":"Jin","sequence":"additional","affiliation":[{"name":"PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China"}]},{"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[{"name":"PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China"}]},{"given":"Keming","family":"Ma","sequence":"additional","affiliation":[{"name":"PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China"}]},{"given":"Changcheng","family":"Song","sequence":"additional","affiliation":[{"name":"Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China"}]},{"given":"Shuaifang","family":"Xiao","sequence":"additional","affiliation":[{"name":"PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Purple Mountain Laboratories: Networking, Communications and Security, Nanjing 211111, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2018.2825560"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1295"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3680851"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2649687"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9065856"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.973"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2018.2817607"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1178"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2706657"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2015.1219"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2521718"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2018.2825541"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2018.8647343"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3390\/e21070688"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2018.2814607"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.9.1.7583"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2893594"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1360\/n112013-00041"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2847659"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2017.2764388"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/glocomw.2018.8644401"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/iccsn49894.2020.9139070"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2018.2820693"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2935206"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2012.032012.110430"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2009.5199136"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2017.2740290"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2580673"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7869317"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1978.1055892"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2014.7417119"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2013.2278834"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2014.6879004"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2806423"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/vtcfall.2018.8690843"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2877201"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8840645.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8840645.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8840645.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T19:20:14Z","timestamp":1603308014000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8840645\/"}},"subtitle":[],"editor":[{"given":"Savio","family":"Sciancalepore","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":40,"alternative-id":["8840645","8840645"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8840645","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,20]]}}}