{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T15:53:29Z","timestamp":1725292409900},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T00:00:00Z","timestamp":1540339200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11036-018-1157-1","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T07:18:35Z","timestamp":1540365515000},"page":"464-479","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Physical Layer Network Coding Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission Protocol"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5490-904X","authenticated-orcid":false,"given":"Quoc-Tuan","family":"Vien","sequence":"first","affiliation":[]},{"given":"Tuan Anh","family":"Le","sequence":"additional","affiliation":[]},{"given":"Huan X.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Tho","family":"Le-Ngoc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,24]]},"reference":[{"issue":"1","key":"1157_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1073\/pnas.1618130114","volume":"114","author":"HV Poor","year":"2017","unstructured":"Poor HV, Schaefer RF (2017) Wireless physical layer security. Proc Natl Acad Sci 114(1):19\u201326","journal-title":"Proc Natl Acad Sci"},{"issue":"5","key":"1157_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2013.2260875","volume":"30","author":"R Bassily","year":"2013","unstructured":"Bassily R, Ekrem E, He X, Tekin E, Xie J, Bloch M, Ulukus S, Yener A (2013) Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Process Mag 30(5):16\u201328","journal-title":"IEEE Signal Process Mag"},{"issue":"9","key":"1157_CR3","doi-asserted-by":"publisher","first-page":"3299","DOI":"10.1109\/TCOMM.2014.2345763","volume":"62","author":"L Fan","year":"2014","unstructured":"Fan L, Lei X, Duong TQ, Elkashlan M, Karagiannidis GK (2014) Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Trans Commun 62(9):3299\u20133310","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"1157_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2015.7355563","volume":"53","author":"LJ Rodriguez","year":"2015","unstructured":"Rodriguez LJ, Tran NH, Duong TQ, Le-Ngoc T, Elkashlan M, Shetty S (2015) Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Commun Mag 53(12):32\u201339","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"1157_CR5","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/JSTSP.2016.2607692","volume":"10","author":"L Fan","year":"2016","unstructured":"Fan L, Lei X, Yang N, Duong TQ, Karagiannidis GK (2016) Secure multiple amplify-and-forward relaying with cochannel interference,\u201d. IEEE J Sel Topics Signal Process 10(8):1494\u20131505","journal-title":"IEEE J Sel Topics Signal Process"},{"issue":"11","key":"1157_CR6","doi-asserted-by":"publisher","first-page":"7523","DOI":"10.1109\/TWC.2017.2749568","volume":"16","author":"AA Nasir","year":"2017","unstructured":"Nasir AA, Tuan HD, Duong TQ, Poor HV (2017) Secure and energy-efficient beamforming for simultaneous information and energy transfer. IEEE Trans Wireless Commun 16(11):7523\u2013 7537","journal-title":"IEEE Trans Wireless Commun"},{"issue":"11","key":"1157_CR7","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TCOMM.2003.818096","volume":"51","author":"A Sendonaris","year":"2003","unstructured":"Sendonaris A, Erkip E, Aazhang B (2003) User cooperation diversity - Part I. System description. IEEE Trans Commun 51(11):1927\u20131938","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"1157_CR8","doi-asserted-by":"publisher","first-page":"3062","DOI":"10.1109\/TIT.2004.838089","volume":"50","author":"J Laneman","year":"2004","unstructured":"Laneman J, Tse D, Wornell G (2004) Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans Inf Theory 50(12):3062\u20133080","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"1157_CR9","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"8","key":"1157_CR10","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"Wyner A (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355\u20131387","journal-title":"Bell Syst Tech J"},{"issue":"2","key":"1157_CR11","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","volume":"6","author":"J Vilela","year":"2011","unstructured":"Vilela J, Bloch M, Barros J, McLaughlin S (2011) Wireless secrecy regions with friendly jamming. IEEE Trans Inf Forensics Security 6(2):256\u2013266","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"10","key":"1157_CR12","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis I, Thompson J, Mclaughlin S (2009) Relay selection for secure cooperative networks with jamming. IEEE Trans Wireless Commun 8(10):5003\u20135011","journal-title":"IEEE Trans Wireless Commun"},{"issue":"4","key":"1157_CR13","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/TIFS.2013.2248730","volume":"8","author":"Y Liu","year":"2013","unstructured":"Liu Y, Li J, Petropulu AP (2013) Destination assisted cooperative jamming for wireless physical-layer security. IEEE Trans Inf Forensics Security 8(4):682\u2013694","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"6","key":"1157_CR14","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E Tekin","year":"2008","unstructured":"Tekin E, Yener A (2008) The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Trans Inf Theory 54(6):2735\u20132751","journal-title":"IEEE Trans Inf Theory"},{"issue":"12","key":"1157_CR15","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/TIT.2008.2006422","volume":"54","author":"E Tekin","year":"2008","unstructured":"Tekin E (2008) The Gaussian multiple access wire-tap channel. IEEE Trans Inf Theory 54(12):5747\u20135755","journal-title":"IEEE Trans Inf Theory"},{"key":"1157_CR16","doi-asserted-by":"crossref","unstructured":"Liu Y, Petropulu AP, Poor HV (2011) Joint decode-and-forward and jamming for wireless physical layer security with destination assistance. In: Proc ASILOMAR 2011. Pacific Grove, USA, pp 109\u2013113","DOI":"10.1109\/ACSSC.2011.6189965"},{"issue":"9","key":"1157_CR17","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.1109\/TIT.2008.928272","volume":"54","author":"L Lai","year":"2008","unstructured":"Lai L, El Gamal H (2008) The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans Inf Theory 54(9):4005\u20134019","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"1157_CR18","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TSP.2012.2235433","volume":"61","author":"R Bassily","year":"2013","unstructured":"Bassily R, Ulukus S (2013) Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Trans Signal Process 61(6):1544\u20131554","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"1157_CR19","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede R, Cai N, Li S-Y, Yeung R (2000) Network information flow. IEEE Trans Inf Theory 46(4):1204\u20131216","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"1157_CR20","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R Koetter","year":"2003","unstructured":"Koetter R, Medard M (2003) An algebraic approach to network coding. IEEE\/ACM Trans Netw 11 (5):782\u2013795","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1157_CR21","doi-asserted-by":"crossref","unstructured":"Zhang S, Liew SC, Lam PP (2006) Hot topic: Physical-layer network coding. In: Proc ACM MobiCom\u201906, Los Angeles, CA, USA, pp 358\u2013365","DOI":"10.1145\/1161089.1161129"},{"issue":"1","key":"1157_CR22","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TVT.2014.2321229","volume":"64","author":"Q-T Vien","year":"2015","unstructured":"Vien Q -T, Nguyen HX, Stewart BG, Choi J, Tu W (2015) On the energy-delay tradeoff and relay positioning of wireless butterfly networks. IEEE Trans Veh Technol 64(1):159\u2013172","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"1157_CR23","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TVT.2012.2224393","volume":"62","author":"Q-T Vien","year":"2013","unstructured":"Vien Q-T, Stewart BG, Tianfield H, Nguyen HX (2013) Cooperative retransmission for wireless regenerative multirelay networks. IEEE Trans Veh Technol 62(2):735\u2013747","journal-title":"IEEE Trans Veh Technol"},{"issue":"16","key":"1157_CR24","doi-asserted-by":"publisher","first-page":"2593","DOI":"10.1049\/iet-com.2011.0681","volume":"6","author":"Q-T Vien","year":"2012","unstructured":"Vien Q-T, Nguyen HX, Choi J, Stewart BG, Tianfield H (2012) Network coding-based block acknowledgement scheme for wireless regenerative relay networks. IET Commun 6(16):2593\u20132601","journal-title":"IET Commun"},{"issue":"643920","key":"1157_CR25","first-page":"10","volume":"2011","author":"Q-T Vien","year":"2011","unstructured":"Vien Q-T, Tran L-N, Hong E-K (2011) Network coding-based retransmission for relay aided multisource multicast networks. EURASIP J Wireless Commun Netw 2011(643920):10","journal-title":"EURASIP J Wireless Commun Netw"},{"issue":"1","key":"1157_CR26","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TIT.2012.2216936","volume":"59","author":"T Cui","year":"2013","unstructured":"Cui T, Ho T, Kliewer J (2013) On secure network coding with nonuniform or restricted wiretap sets. IEEE Trans Inf Theory 59(1):166\u2013176","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"1157_CR27","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TIT.2010.2090197","volume":"57","author":"N Cai","year":"2011","unstructured":"Cai N, Yeung R (2011) Secure network coding on a wiretap network. IEEE Trans Inf Theory 57(1):424\u2013435","journal-title":"IEEE Trans Inf Theory"},{"key":"1157_CR28","doi-asserted-by":"crossref","unstructured":"Gabry F, Thobaben R, Skoglund M (2011) Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel. In: Proc IEEE WCNC\u201911, Cancun, Mexico, pp 1328\u20131333","DOI":"10.1109\/WCNC.2011.5779323"},{"issue":"4","key":"1157_CR29","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/JCN.2012.6292242","volume":"14","author":"R Bassily","year":"2012","unstructured":"Bassily R, Ulukus S (2012) Secure communication in multiple relay networks through decode-and-forward strategies. J Commun and Netw 14(4):352\u2013363","journal-title":"J Commun and Netw"},{"key":"1157_CR30","unstructured":"Kim SW (2014) Modify-and-forward for securing cooperative relay communications. In: International zurich seminar on communications (IZS), Zurich, Switzerland, pp 136\u2013139"},{"key":"1157_CR31","unstructured":"Vien Q-T, Le TA, Nguyen HX, Phan H (2016) A secure network coding based modify-and-forward scheme for cooperative wireless relay networks. In: Proc IEEE VTC 2016-Spring, Nanjing, China, pp 1\u20135"},{"key":"1157_CR32","unstructured":"Vien Q-T, Le TA, Duong TQ (2017) Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol. In: Proc IEEE ICC, 2017, Paris, France, pp 1\u20136"},{"issue":"3","key":"1157_CR33","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TVT.2016.2571264","volume":"66","author":"J Zhang","year":"2017","unstructured":"Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114\u20132127","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"1157_CR34","doi-asserted-by":"publisher","first-page":"6913","DOI":"10.1109\/TWC.2016.2593445","volume":"15","author":"B He","year":"2016","unstructured":"He B, Zhou X, Swindlehurst AL (2016) On secrecy metrics for physical layer security over quasi-static fading channels. IEEE Trans Wireless Commun 15(10):6913\u20136924","journal-title":"IEEE Trans Wireless Commun"},{"issue":"11","key":"1157_CR35","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/TIFS.2014.2348915","volume":"9","author":"M Baldi","year":"2014","unstructured":"Baldi M, Chiaraluce F, Laurenti N, Tomasin S, Renna F (2014) Secrecy transmission on parallel channels: Theoretical limits and performance of practical codes. IEEE Trans Inf Forensics Security 9(11):1765\u20131779","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"1157_CR36","doi-asserted-by":"crossref","unstructured":"Barros J, Rodrigues M (2006) Secrecy capacity of wireless channels. In: Proc IEEE ISIT\u201906, Seattle, WA, USA, pp 356\u2013360","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"5","key":"1157_CR37","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIT.2016.2530080","volume":"62","author":"S Zhang","year":"2016","unstructured":"Zhang S, Fan L, Peng M, Poor HV (2016) Near-optimal modulo-and-forward scheme for the untrusted relay channel. IEEE Trans Inf Theory 62(5):2545\u20132556","journal-title":"IEEE Trans Inf Theory"},{"key":"1157_CR38","doi-asserted-by":"crossref","unstructured":"Smith G (2011) Quantifying information flow using min-entropy. In: Proc QEST, 2011 Aachen, Germany, pp 159\u2013167","DOI":"10.1109\/QEST.2011.31"},{"key":"1157_CR39","volume-title":"Digital communication over fading channels","author":"MK Simon","year":"2005","unstructured":"Simon MK, Alouini M-S (2005) Digital communication over fading channels, 2nd edn. Wiley, New York","edition":"2nd edn."},{"key":"1157_CR40","unstructured":"Gradshteyn IS, Ryzhik IM (2007) Table of integrals, series, and products, Academic Press, Cambridge"},{"key":"1157_CR41","volume-title":"Probability, random variables, and stochastic processes","author":"A Papoulis","year":"2002","unstructured":"Papoulis A (2002) Probability, random variables, and stochastic processes, 4th edn. Mc-Graw Hill, New York","edition":"4th edn."}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1157-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1157-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1157-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:14:07Z","timestamp":1571876047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1157-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,24]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1157"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1157-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,24]]},"assertion":[{"value":"24 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}