Abstract

Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G) due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: () untrusted relay attack model, () trusted relay with eavesdropper attack model, and () untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.

1. Introduction

As the next evolution of the mobile communication system, 5G (5th-generation mobile network) has become the hottest topic in the academia as well as industry. To meet the high rate requirement in a cost-efficient way, many techniques are designed to be employed into the 5G system, including heterogeneous network (HetNet), massive multiple inputs multiple outputs (Massive MIMO), Device-to-Device (D2D), and millimeter wave (mmWave) techniques.

Meanwhile, security issues have attracted much more attention compared to any other time in the past. Thus, research on 5G security would undoubtedly be of theoretical and practical interest. Besides focusing on the security strategy for the system level, it is also worth investigating security transmission in some basic channel model, especially relevant to the aforementioned key techniques for 5G. With such motivation, we consider the secure transmission in two-way relay channels, which are one of the most basic channel models in HetNet and D2D networks. In addition, the proposed scheme is designed for multiple antenna system. Although this scheme is not particularly designed for Massive MIMO, it can be easily transplanted into it.

The research on TWRC channel has continued for a long time; the early works on this type of channel model are concentrated on efficient transmission [18]. The results in these works show that MIMO TWRC channels can drastically improve the transmission performance. After that, some researchers began to think about the security of this type of channel model. Instead of following the upper layer encryption approach, the physical layer approach is believed to be a promising way which enjoys less system complexity compared with the traditional cryptography scheme.

Along with the pioneering study by Wyner [9], physical layer security problems were first introduced into MIMO case by Hero [10] utilizing space-time code at the transmitter to enhance information security and hiding capabilities. After that, the research of multiple antennas mainly focused on MISO (multiple input, single output) [11] or SIMO (single input, multiple output) [12] until Khisti et al. analyzed the MIMO wiretap channel secrecy capacity in [13], and they gave an upper bound for secrecy capacity under the situation that the transmitter knows the instantaneous channel state information (CSI) about the eavesdropper. After that, a lot of researchers aimed at giving a secrecy capacity bound by different approaches and different constraints [1416].

The physical layer security in cooperation relaying was first considered in [17]. Depending on the relay adversarial model, the security problems in cooperation relaying system are divided into two parts in [18]: () untrusted relay model and () trusted relay model.

For the untrusted relay model, the relay itself acts as an untrusted node which may attempt to illegitimately recover the information messages from the users. This is a common case in the HetNet network, since many potential unfriendly devices exist in the HetNet network and some of them are eager to wiretap to the messages by providing fake assistance. In [19], the authors give a joint source and relay secure beamforming design for the one-way MIMO untrusted relay model. Transmitting jamming signals by friendly jammers in [20] is a secure method for TWRC channels, but the selection of friendly jammers will be difficult to realize in practice. The authors in [21] give an approach to achieve secrecy capacity in MIMO two-way untrusted relay channels based on the signal alignment precoding. However, this scheme is power inefficient especially in bad channel condition. So, the optimization of signal alignment is critical in improving the secrecy capacity.

For the trusted relay model, the relay assists the legitimate users to achieve secure transmission. A lot of works have focused on the single antenna system. Securing the trusted relay model for MIMO systems was first introduced in [22], which uses artificial noise alignment to jam the eavesdropper. The authors in [23] present a physical layer network coding design with secure precoding for two-way MIMO trusted relay channels.

After reviewing these existing solutions in the literature, we feel that considerable improvements can be made in terms of transmission efficiency and security for MIMO TWRC channels. Two approaches have been introduced based on different performance requirements: information theoretical approach and physical layer encryption approach.

Motivated by [5], we use Direction Rotation Alignment as the key to our information theoretical approach. From the transmission efficiency aspects, Direction Rotation Alignment can overcome the power loss in signal alignment scheme. From the physical layer security aspects, the alignment of the two separated signals causes the received signal to be a signal sum in the view of the intended receivers, relay, and eavesdroppers. However, only the intended receivers can directly decode the information symbols from their communication partners with their self-information serving as the private key, while the relay or eavesdroppers can obtain partial information with the sum signal. Therefore, by finding the ideal transmission rate, the system can achieve information theoretical security.

On the other hand, encryption vector has been nested into precoding matrix in physical layer encryption approach. After physical layer encryption, the signal direction of each user will be distorted. So, these will certainly bring about enough confusion for the adversaries. With such encryption, the system can achieve computational security.

The main contribution and results of this paper are listed below:(i)A new information theoretical security approach is introduced with key technique Direction Rotation Alignment. This technique can eliminate the power loss caused by signal alignment. At the same time, this technique can conceal the user message to achieve information theoretical security.(ii)Following information theoretical approach, physical layer encryption approach is presented to achieve better transmission efficiency and security performance.(iii)We show that our proposed scheme is secure under three different adversary models: untrusted relay attack model, () trusted relay with eavesdropper attack model, and () untrusted relay with eavesdroppers attack model. To the best of our knowledge, our scheme is the first secure method in all these adversary models(iv)We analyze the secrecy capacities of the two approaches under each adversary model. With such analysis, ideal transmission rate could be found.

The paper is organized as follows. In Section 2, we introduce the system and adversarial models. Section 3 presents information theoretical approach as well as the capacity analysis under different adversarial models. And the physical layer encryption approach with its capacity analysis is discussed in Section 4. In Section 5, we demonstrate simulation results on our proposed scheme. Finally, we give conclusions and extensions in Section 5.

Notations. , , , and denote the trace, expectation, inverse or pseudoinverse, and determinant of matrix, respectively. And denotes the max .

2. System Model

In this section, we will introduce the system model for the proposed scheme which is previously defined in [24].

2.1. Transmission Model

(1) Channel Model. In this subsection, we will describe the TWRC channels system. This is depicted in Figure 1. communication pairs exchange their information with a relay. The users on the left side in Figure 1 are denoted as and the users on the right side are denoted as . Furthermore, we assume each user is equipped with antennas, and the relay is equipped with antennas.

Both the relay and the users work in half-duplex mode and there is no direct link between each pair. We assume that all the channels experience the flat fading and the channel coefficient between user and relay is which is an matrix. The channel coefficient between relay and user is with the size of . Since all channels experience flat fading, both and are kept constant in each round of information exchange.

Finally, we assume that the channel state information (CSI) is available for the users and relay. The channel state information could be obtained by the channel estimation for the MIMO channel. There are already a lot of relative works focusing on the channel estimation. In [25], the CSI has been estimated with partial channel information. In addition, the authors propose a semiblind estimation method in [26]. Particularly, in [27], the authors consider using fine time synchronization in the estimation which is the most suitable method for our proposed scheme.

The proposed transmission protocol consists of two time slots to accomplish one round of information exchange. In the first time slot, all users transmit their information to the relay simultaneously. Because the users act as a source node in the first time slot, this time slot is called uplink phase or multiple access (MAC) phase. Upon receiving the message, the relay broadcasts its signal in the second time slot with the name of downlink or broadcast (BC) phase. Now, we introduce the two phases separately.

(2) Uplink Phase. In the uplink (MAC) phase, the relay receives the converging signals from all the user nodes as follows:where is an column vector that represents the transmitted signal vector of user containing the information message ; represents the transmitted signal of user ; denotes the received signal vector by relay, which is an column vector; and is an zero mean circularly symmetric complex Gaussian noise vector at the relay node modelled by ~.

We denote the covariances of the channel inputs in user as . Then, we have the power constraint in uplink phase like

(3) Downlink Phase. In the downlink (BC) phase, the relay broadcasts its signal to all users, and each user recovers the information message from its communication partner.

The relay is set up as an Amplify-and-Forward (AF) model in the proposed scheme. Thus, the transmitted signal of the relay is just the same as the received signal .

Then, we consider the situation in user as a case. In , we have the observer aswhere is the zero mean circularly symmetric complex Gaussian noise vector at the user modelled by ~. The user then decodes the partner’s message with the help of its self-information and detection vector.

2.2. Adversary Model

In this subsection, we will discuss the system security model for MIMO TWRC channels. We divide the system security model into two cases: untrusted relay attack model and trusted relay with eavesdropper attack model.

(1) Untrusted Relay Adversary Model. With a pessimistic consideration, we assume the relay itself is an untrusted node. Under such assumption, the relay acts as an eavesdropper to wiretap message from the communication pairs illegitimately. In order to exchange information, each user regulates its transmission rate to guarantee the successful transmission and to resist the untrusted relay attack. In doing so, we could obtain the achievable secrecy channel capacity as follows:where and are the achievable maximum information rate from users and to their respective partners asAnd denotes the achievable information rate at the untrusted relay as

Note here that the achievable secrecy channel capacity above is a general result independent of the transmission scheme. One of our goals in this paper is to develop a novel scheme to achieve high capacity in an untrusted relay attack model scenario.

(2) Trusted Relay with Eavesdropper Adversary Model. In this subsection, we consider the situation where the communication pair exchange their information message via a trusted relay in the presence of the eavesdroppers. We assume there exists an eavesdropper in between users and . In addition, the eavesdropper has complete knowledge of the channel information and transmission protocol. Furthermore, let the channel coefficient between user and eavesdropper be and , respectively; then, the received signal by the eavesdropper iswhere is the noise at eavesdropper . And upon receiving , the eavesdropper tries to recover the information messages and .

The MIMO wiretap channel introduced by [15] can be considered as multiple and parallel single subwiretap channels; each subchannel contains the communication user pair and the potential eavesdroppers. In doing so, we obtain the achievable secrecy channel capacity for trusted relay with eavesdropper attack model aswhere and are the secrecy information rate between users and , respectively. They have identical analysis as (5):And is the information rate at the eavesdropper asThe secrecy channel capacity here is also a general result.

(3) Untrusted Relay with Eavesdropper Adversary Model. In the worst case, the relay itself is an unfriendly node; meanwhile, there exist a considerable number of eavesdroppers between each communication pair. We hold the same assumption as the above two subsections, and then we can obtain the achievable secrecy capacity in such scenario aswhere and are the secrecy information rate between users and , respectively, and they still have identical analysis as (5):And and are the information rate at the eavesdropper and untrusted relay, respectively, asWe will discuss the capacity analysis of our proposed scheme in the following section.

3. Achievable Secrecy Transmission Scheme with Information Theoretical Approach

In this section, we will present an achievable secrecy transmission scheme using the information theoretical approach for the all three adversary models.

3.1. The Transmission Scheme Based on Direction Rotation Alignment

This scheme is composed of two transmission phases and one relay operation phase. The details are shown below.

(1) Multiple Access Phase. The information symbols are modified by a precoding matrix prior to the transmission. The precoding matrix is used to construct equivalent parallel subchannels for different communication pairs. The scenario is identical on either user side or , so we only present the design for . The precoding matrix on user is denoted as . Then, the transmitted signal could be rewritten as .

We now move on to investigate the design of precoding matrix . Using the singular value decomposition (SVD), the channel matrix could be represented as follows:where and are unitary matrices and is a diagonal matrix with positive diagonal elements. So, we define in the following form:where is an unitary matrix called Direction Rotation matrix and denotes the pseudoinverse of . represents the allocated transmission power for user . In addition, we assume it is identical for all users in this work. is called channel allocation matrix to guarantee that multipair users communicate simultaneously. allocates the constructed equivalent parallel subchannels to corresponding users. The design and optimization of and will affect the transmission efficiency of the proposed scheme. Then, we will introduce the design of and , respectively.

Design of Direction Rotation Matrix. The authors in [5] have given an approximate design of the Direction Rotation matrix for one-pair TWRC channels. Along with their work, we extend their results into multipair TWRC channels.

Before designing R, we first define a new matrix asUsing eigendecomposition, could be represented aswhere is a unitary matrix and is a diagonal matrix whose nonzero elements are the eigenvalues of G arranged in the ascending order. Then, we choose as

Design of Channel Allocation Matrix. Before designing , we first define two varieties and . is the independent signal streams of the th communication pair, and is the sum independent signal streams of the 1st communication pair to the th pair as . In order to align the signals from the same communication pair to the same directions, we define . And is designed by collecting the to column vector from the unit matrix, so is in the size of . is shown as follows:

(2) Relay’s Operation. After the precoding operation, the users transmit their coded signal to the relay. Then, the received signal in relay is

For , we haveso the received signal could be rewritten as

As shown in (22), the signals from the same communication pairs have been aligned into the same directions.

Upon receiving , the relay generates its transmitting signal . In the Amplify-and-Forward (AF) agreements, the relationship between and is simply written as .

(3) Broadcast Phase. In the BC phase, each user receives the broadcast signal from the relay. By considering the received signal at user , we can obtain

Subtracting the self-interference and the cochannel interference from other communication pairs, the user could obtain the equivalent receiving signal as follows:

The interference cancellation will be accomplished by the detection vector . is dependent on . Consider the case where is simply the transpose of . Then, is designed such that . Consequently, the received signal will bewhere denotes the sum of noises in user .

From (25), we can clearly see that the user could recover the information symbols by the XOR operation with its self-information symbols . Exactly alike, the user could recover the information symbols from in the same way. Thus, one round of information exchange is completed.

3.2. The Achievable Secrecy Channel Capacity Analysis for Untrusted Relay Model

In this subsection, we discuss the achievable secrecy channel capacity of our proposed scheme for the untrusted relay model based on the analysis given in the previous section. From (4), we can see that the capacity is affected by and . We now discuss the impact of these components and obtain the achievable secrecy channel capacity .

After one round of transmission, the received equivalent information at user is shown in (25). The information rate from to iswhere .

Similarly, the information rate from to is

For the untrusted relay model, the adversary tries to recover the message symbols from all the users node. So, the achievable information rate is equal to the maximum sum rate of the uplink multiuser MAC channel:

From (26), (27), and (28), the achievable secrecy channel capacity for the untrusted relay model can be obtained with matrix operation [28] as follows:

3.3. The Achievable Secrecy Channel Capacity Analysis for Trusted Relay with Eavesdropper Model

In this subsection, we will discuss the achievable secrecy channel capacity of our proposed scheme for the trusted relay with eavesdropper model. Before discussing the capacity, we first consider the received signal by eavesdropper between the users and .

The received signal in general case is shown in (7), and for the proposed scheme we havewhere is noise at eavesdropper . Consequently, we have the achievable information rate as

Meanwhile, the information rates and are identical to the untrusted relay model; namely,

As a result, we obtain the achievable secrecy channel capacity as

3.4. The Secrecy Channel Capacity Analysis for Untrusted Relay with Eavesdropper Model

We will discuss the secrecy channel capacity for the worst case: the relay itself is an unfriendly node; meanwhile, there exist a considerable number of eavesdroppers between each communication pair. The situation under this case is just like a combination of the former two cases, and the general capacity analysis of this model is given by (11). So, we first give all the components based on the former two subsections and then give the achievable secrecy channel capacity.

The information rates and are given as

And the achievable information rate at the untrusted relay is given as

And the achievable information rate at eavesdropper is given as

With (34), (35), and (36), we obtain the achievable secrecy channel capacity as

Note here that has great probability equal to zero, and it is a common case independent of transmission scheme. So, immediately we have this question: how to optimize the proposed scheme to secrecy transmission even under the worst case. For this reason, we optimize the precoding nested physical layer encryption. The design details will be presented in the following section.

4. Secrecy Transmission Scheme with Physical Layer Encryption Approach

In the above section, we have discussed the secrecy transmission scheme based information theoretical analysis. However, the traditional information theoretical approach achieves secrecy by sacrificing the transmission efficiency. And all the schemes including our proposed information theoretical approach are not constantly valid for the worst case.

Under this motivation, we design an encryption vector nested into the precoding matrix to accomplish the message encryption in the physical layer. With this physical layer encryption, the system security will only depend on the security of the shared secret key rather than the mutual information in eavesdropper or untrusted relay. So, the channel could achieve full capacity instead of part of it. In this section, we will first present the physical layer encryption scheme in MIMO TWRC channels and then present the capacity analysis for physical layer encryption.

4.1. Physical Layer Encryption Scheme

In order to accomplish the encryption, we redesign the precoding matrix as and for users and . We consider the situation in as a case. Containing two function parts, can be artificially divided into two parts as follows:where is designed same as the above discussion and is designed for physical layer encryption. Note that the precoding matrix has been artificially separated into two matrices, that is, transmission matrix and security matrix; however, the precoding matrix will show the effect as a whole.

The encryption precoding matrix or is generated from a key stream where . The generation of and will depend on the security level of the system. For low security level, and will just be equal to as . For high level security, and will be different by dividing into two parts. Note here that the key stream must be preshared between users and before the transmission, and is produced by pseudorandom sequence generators (PRSG).

With and , each user could encrypt its information symbols bit by bit. And, in the next part, we will explore how the proposed encryption scheme promotes the security performance under both untrusted and trusted models.

4.2. Attack Analysis for Physical Layer Encryption Scheme

We first consider the untrusted relay model. Because the untrusted relay could be viewed as the most powerful eavesdropper, if the proposed scheme is secure under untrusted relay adversary model, it will certainly be secure under all adversary models.

We now begin to discuss the attack analysis under untrusted relay adversary model. With the new precoding matrix, the received signal in relay now will be

By comparison, we also consider the relay receiving signal for information theoretical approach as (22). Considering BPSK modulation as a case, we assume the untrusted relay could get the Direction Rotation matrix . Then, we obtain the data patterns for the two different approaches as shown in Tables 1 and 2.

With Table 2, we can see that the untrusted relay could directly recover some characteristic bit like all 1 or all 0. For this reason, the difficulty degree of message recovery for untrusted relay is significantly reduced. However, as in Table 1, the characteristics will be distorted by the encryption. For example, if , the relay could easily recover the transmitting message pair as and . However, if , the transmitting message pair could be all the four cases. So, with the physical layer encryption, the untrusted relay will have no better way rather than guessing each bit of the messages or the keys.

The attack analysis is identical for the eavesdropper, so we will have no specific explanation. With this analysis, we conclude that our proposed physical layer encryption scheme is secure under all three adversary models.

4.3. The Achievable Secrecy Channel Capacity Analysis for Physical Layer Encryption Scheme

In this subsection, we will investigate the achievable secrecy channel capacity for physical layer encryption scheme. The capacity is presented by the following theorem.

Theorem 1. With physical layer encryption, the achievable secrecy channel capacity for MIMO TWRC channels is given bywhere and are the secrecy information rate between users and .

The proof of Theorem 1 is given in the Appendix.

By comparing (40) with (29), (33), and (37), we can have the following result: because the log function is an increasing function, the proposed physical layer encryption scheme evidently increases the sum capacity of the system. However, due to the complexity of key preshare, there will be an apparent trade-off between transmission performance and key preshare complexity. Depending on different performance requirement, the user could choose physical layer encryption approach with better transmission performance or information theoretical approach with lower system complexity.

5. Simulation Results

In this section, we present three simulations for our proposed scheme using MATLAB. First, we show that our proposed scheme outperforms some of the well-known existing schemes in terms of transmission quality. In the second simulation, we, respectively, show that our proposed scheme has good security by comparing the bit error rate (BER) between the intended receiver and the untrusted relay and the BER between the receiver and the eavesdropper. In the last simulation, we show the capacity of our proposed scheme under the three different adversary models. We assume that four pairs of users communicate at the same time via a relay, and the users, relay, and eavesdroppers are all equipped with four antennas; that is, . Note that all of these results are obtained by averaging over 10,000 realizations.

5.1. Transmission Performance Evaluation between Different Schemes in MIMO TWRC Channels

To test the transmission performance of our proposed scheme, we first compare our scheme with some existing well-known schemes in MIMO TWRC channels like Zero-Forcing (ZF), Minimum Mean Square Error (MMSE), and Maximum Likelihood (ML). From the simulation results in Figure 2, we can clearly see that the proposed scheme can achieve a better BER performance especially under low SNR condition. This is because the proposed scheme can effectively avoid the power loss caused by the direction alignment.

5.2. Security Performance Evaluation of Information Theoretical Approach and Physical Layer Encryption Approach

We then test the security performance of our proposed scheme by comparing the BER of the intended receiver, the untrusted relay, and the eavesdropper. The BER comparison between the intended receiver and the untrusted relay is shown in Figure 3. We assume a stronger adversarial model where the relay can obtain all channel information including the Direction Rotation matrix . From Figure 3, we can see that the BER at the intended receiver will decrease with SNR by a large proportion; however, the BER at the untrusted relay will stay in the high magnitude constantly. Meanwhile, we can also see that the proposed physical layer encryption will reduce the correct decoding probability at the untrusted relay.

Similar to the untrusted relay adversary model, we compare the BER between the intended receiver and the eavesdropper. The results are shown in Figure 4. To test different adversarial levels, we classify four cases to simulate: information theoretical approach with known Direction Rotation matrix, information theoretical approach without known Direction Rotation matrix, physical layer encryption approach with known Direction Rotation matrix, and physical layer encryption without known Direction Rotation matrix. From Figure 4, we can see that the eavesdropper gives the strongest attack under the first case: information theoretical approach with known Direction Rotation matrix. And if the eavesdropper fails to get the Direction Rotation matrix, the eavesdropper will suffer a worse decoding error ratio which is shown as the second case. However, the security performance of information theoretical approach is not as good as the physical layer encryption approach. From the results of the third and fourth cases, we can see that the decoding error bit ratio of these two cases is almost the same which is identical to the error ratio of random guessing.

5.3. Secure Channel Capacity Analysis Evaluation under Different Adversary Models

In this subsection, we will give the secure channel capacity analysis under the three different adversary models. The results are shown in Figures 57.

We compare the secure capacities of information theoretical approach and physical layer encryption approach under untrusted relay adversary model in Figure 5. From the comparison result, we can see that, with the SNR increasing, the sum rates of the physical layer encryption approach are almost twice the sum rates of the information theoretical approach. And the simulation result is in accord with (29) and (40).

We then compare the secure capacities of information theoretical approach and physical layer encryption approach under trusted relay with eavesdroppers adversary model in Figure 6. We test one eavesdropper, two eavesdroppers, and four eavesdroppers cases. And from Figure 6 we can see that the capacity of information theoretical approach suffers a remarkable decline with the increasing of the eavesdroppers.

The secure capacities comparison between information theoretical approach and physical layer encryption approach under untrusted relay with eavesdroppers adversary model is shown in Figure 7. From Figure 7, we can see that the capacity of physical layer encryption approach shows no change with the increase of the eavesdroppers. However, the information theoretical approach can hardly resist the attack under such scenario, for the capacity has enormous probability equal to zero when there exist more than two eavesdroppers.

6. Conclusion

The security is one of the most important issues for 5G system architecture. Besides designing the security protocol from the view of system level, it is also desirable to consider the secure transmission for some basic transmission channel models, especially relevant to the key techniques for 5G.

In this paper, a novel transmission scheme has been introduced for MIMO TWRC channels, which is the basic channel model in HetNet and D2D networks. We consider three general attack models: untrusted relay adversarial model, trusted relay with eavesdropper adversarial model, and untrusted relay with eavesdropper adversarial model. Two different approaches, that is, information theoretical approach and physical layer encryption approach, have been proposed to achieve transmission efficiency as well as computational security. The key techniques of the proposed scheme lie in Direction Rotation Alignment and physical layer encryption. With alignment, signals from the same communication pair are aligned into the same signal direction. The direction rotation can avoid power loss in bad channel condition. And, with the physical layer encryption, the security of the system only depends on the security of the preshared key rather than the mutual information. Secrecy capacities of our proposed scheme are given for all the three models. Finally, simulation results show that our proposed scheme can achieve better performance in both transmission rate and security.

Comparing the two different approaches, we find that the physical layer encryption approach can get a better performance in transmission and security. However, such performance improvement is obtained by sacrificing the system complexity because the preshared key is needed. Thus, how to balance the trade-off between the system complexity and performance will be one of the future works. In addition, another future work lies in the modification of the proposed scheme fitting Massive MIMO which enjoys more implantation in 5G system.

Appendix

We consider the worst adversary model: untrusted relay with eavesdroppers model. If the physical layer encryption approach can achieve the proposed secrecy capacity like (40) in the worst case, it would certainly achieve the same capacity in the other two adversary models.

The achievable secrecy capacity under untrusted relay with eavesdroppers model has been shown in (11). By comparing (40) and (11), we can see that if we prove and , we can prove (40). And and are

We now start to prove . With (A.1), we havewhere (a) is from the basic theorem that , (b) is from the chain rule for mutual information, and (c) is from the fact that all the transmitting signals are independent.

With (A.3), we can see that if we could show that each mutual information part or is zero, the proposition will be permitted.

So, we move on to the proof of . We consider the BPSK modulation as a case. So, the transmitting signal in and will be 1 with probability and −1 with probability . And the key streams and will also be 1 with probability and −1 with probability .

We have shown the signal pattern for BPSK in Table 1. With Table 1, we can compute the probability distributions of as shown in Table 3.

And we can also compute the joint probability distributions of and as shown in Table 4.

So, we can get the conditional probability distribution between and as shown in Table 5.

With Tables 3, 4, and 5, we can compute and as

So, we can compute the mutual information as

Exactly alike, the mutual information analysis is identical for the eavesdroppers model. So, we can get the same result whereWith (11), (A.5), and (A.5), we can prove (40).

The analysis of other modulation models is identical to BPSK models, so we omit the details.

Competing Interests

The authors declare that they have no competing interests regarding the publication of this paper.