{"title":"A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels","authors":"Qiao Liu, G. Gong, Yong Wang, Hui Li","doi":"10.1109/GLOCOMW.2015.7414118","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a novel secure transmission scheme for multiple-input multiple- output (MIMO) Two-Way relay channels, where multi- pair communication partners exchange information securely with the help of relay. By utilizing the properties of transmission medium in physical layer, our scheme can achieve high transmission efficiency as well as information theoretic security. With the secrecy capacity analysis, we show that our scheme is a secure approach under two different adversarial models: 1) untrusted relay attack model; 2) trusted relay with eavesdropper attack model. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme can achieve a better performance than the existing schemes.","PeriodicalId":315934,"journal":{"name":"2015 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2015.7414118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In this paper, we propose a novel secure transmission scheme for multiple-input multiple- output (MIMO) Two-Way relay channels, where multi- pair communication partners exchange information securely with the help of relay. By utilizing the properties of transmission medium in physical layer, our scheme can achieve high transmission efficiency as well as information theoretic security. With the secrecy capacity analysis, we show that our scheme is a secure approach under two different adversarial models: 1) untrusted relay attack model; 2) trusted relay with eavesdropper attack model. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme can achieve a better performance than the existing schemes.