{"id":"https://openalex.org/W2884933216","doi":"https://doi.org/10.1109/access.2018.2858282","title":"The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks","display_name":"The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2884933216","doi":"https://doi.org/10.1109/access.2018.2858282","mag":"2884933216"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2858282","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2858282","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2858282","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101458577","display_name":"Yuanyuan Kong","orcid":"https://orcid.org/0000-0003-1816-8541"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuanyuan Kong","raw_affiliation_strings":["Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044630013","display_name":"Bin Lyu","orcid":"https://orcid.org/0000-0001-5077-2576"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Lyu","raw_affiliation_strings":["Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352743","display_name":"Feng Chen","orcid":"https://orcid.org/0000-0003-1434-9839"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Chen","raw_affiliation_strings":["Internet of Things Branch, China Telecom Corporation Ltd., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Internet of Things Branch, China Telecom Corporation Ltd., Nanjing, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047980942","display_name":"Zhen Yang","orcid":"https://orcid.org/0000-0002-4400-3823"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101458577"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.8453,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86924159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"40673","last_page":"40681"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8050748109817505},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.7480806112289429},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7025525569915771},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.629001796245575},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5861950516700745},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.500748872756958},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4951097071170807},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.49232447147369385},{"id":"https://openalex.org/keywords/pre-shared-key","display_name":"Pre-shared key","score":0.45509809255599976},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.42369532585144043},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.32101938128471375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2896603047847748},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2611185312271118},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19150391221046448},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16542330384254456},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12747079133987427},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.10629436373710632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8050748109817505},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.7480806112289429},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7025525569915771},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.629001796245575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5861950516700745},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.500748872756958},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4951097071170807},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.49232447147369385},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.45509809255599976},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.42369532585144043},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.32101938128471375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2896603047847748},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2611185312271118},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19150391221046448},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16542330384254456},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12747079133987427},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.10629436373710632},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2858282","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2858282","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7512f23fd72d42c7956b035469c43825","is_oa":true,"landing_page_url":"https://doaj.org/article/7512f23fd72d42c7956b035469c43825","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 40673-40681 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2858282","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2858282","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5517341317","display_name":null,"funder_award_id":"61671252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7108851533","display_name":null,"funder_award_id":"61772287","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1731774588","https://openalex.org/W1970076884","https://openalex.org/W1970334960","https://openalex.org/W2000172548","https://openalex.org/W2006947308","https://openalex.org/W2007562433","https://openalex.org/W2009292209","https://openalex.org/W2039788132","https://openalex.org/W2056327536","https://openalex.org/W2065313044","https://openalex.org/W2086006789","https://openalex.org/W2105831729","https://openalex.org/W2126477936","https://openalex.org/W2127697497","https://openalex.org/W2141954204","https://openalex.org/W2147727871","https://openalex.org/W2149808502","https://openalex.org/W2156927364","https://openalex.org/W2161081468","https://openalex.org/W2185302284","https://openalex.org/W2295120647","https://openalex.org/W2301663987","https://openalex.org/W2514263996","https://openalex.org/W2536143415","https://openalex.org/W2543379668","https://openalex.org/W2565932759","https://openalex.org/W2758267643","https://openalex.org/W2761420877","https://openalex.org/W2801393164","https://openalex.org/W2963616899","https://openalex.org/W6642662046","https://openalex.org/W6729166603"],"related_works":["https://openalex.org/W4320075926","https://openalex.org/W3167206921","https://openalex.org/W1919042217","https://openalex.org/W3080982036","https://openalex.org/W3205185567","https://openalex.org/W3209591750","https://openalex.org/W2995273700","https://openalex.org/W4401387566","https://openalex.org/W2903037621","https://openalex.org/W2189562814"],"abstract_inverted_index":{"Network":[0],"coding":[1,42,147],"is":[2,33,64,85,108,142],"one":[3],"of":[4,15,75],"the":[5,10,29,52,80,89,94,123,140,153,158,165],"key":[6,45,60,83,118,125,131,154],"technologies":[7],"to":[8,50,110,151],"improve":[9,122],"throughput,":[11],"efficiency,":[12],"and":[13,134,170],"reliability":[14],"two-way":[16],"relay":[17],"networks":[18],"(TWRNs).":[19],"However,":[20],"it":[21],"also":[22],"brings":[23],"some":[24],"new":[25],"security":[26,32,40,53,145],"problems":[27],"when":[28],"physical":[30],"layer":[31],"considered.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38],"present":[39],"network":[41,146],"schemes":[43,167],"with":[44,127,157],"generation":[46,61,155],"from":[47,79],"multipath":[48,76],"channels":[49],"enhance":[51],"performance":[54],"for":[55,88,115],"TWRN.":[56],"First,":[57],"a":[58],"joint":[59],"(JKG)":[62],"approach":[63,91],"proposed,":[65],"which":[66,120],"generates":[67],"secret":[68,101,124,130],"keys":[69],"based":[70],"on":[71],"channel":[72],"impulse":[73],"responses":[74],"channels.":[77],"Different":[78],"traditional":[81],"approaches,":[82],"exchange":[84],"not":[86],"necessary":[87],"JKG":[90],"such":[92],"that":[93,164],"eavesdroppers":[95],"cannot":[96],"obtain":[97],"any":[98],"information":[99],"about":[100],"keys.":[102],"Then,":[103],"an":[104,128],"adaptive":[105],"quantization":[106,116],"algorithm":[107],"proposed":[109,159,166],"adaptively":[111],"choose":[112],"different":[113],"parameters":[114],"in":[117],"generation,":[119],"can":[121,135],"rate":[126],"acceptable":[129],"disagreement":[132],"probability":[133],"still":[136],"work":[137],"even":[138],"if":[139],"SNR":[141],"low.":[143],"Finally,":[144],"systems":[148],"are":[149,168],"constructed":[150],"combine":[152],"approaches":[156],"algorithm.":[160],"Simulation":[161],"results":[162],"show":[163],"valid":[169],"secure":[171],"against":[172],"wiretap":[173],"attacks.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
