Secure network coding realizes the secrecy of the message when the message is transmitted via noiseless network and a part of edges or a part of intermediate nodes are eavesdropped. In this framework, if the channels of the network has noise, we apply the error correction to noisy channel before applying the secure network coding. In contrast, secure physical layer network coding is a method to securely transmit a message by a combination of coding operation on nodes when the network is given as a set of noisy channels. In this paper, we give several examples of network, in which, secure physical layer network coding has advantage over secure network coding.only secure computation-and-forward, which is a method to securely transmit the modulo sum of two input message when noisy multiple access channel is given [10], [11], [12], [13], [14], [15]. The motivation of these studies is the realization of secure two way-relay channel with untrusted relay. To seek the further possibility of secure physical layer network coding, we need to find more examples of concrete coding schemes of secure physical layer network coding.In fact, secure network code mainly focuses on the secrecy for the attack to channels. Some typical secure network codes cannot realize the secrecy when one of intermediate nodes is eavesdropped. In contrast, secure physical layer network coding is advantageous for attacks on intermediate nodes. In this paper, we give two examples of network, in which, secure physical layer network coding realizes a performance that cannot be realized by secure network coding. One is butterfly network [16] and the other is a network with three source nodes.The remaining parts of this paper are organized as follows. Section II reviews the results of secure computation-andforward, which is a typical example of secure physical layer network coding. Section III discusses secure communication over butterfly network by using secure physical layer network coding. Section IV addresses secure communication over a network with three source nodes by using secure physical layer network coding.
II. SECURE COMPUTATION-AND-FORWARDFirst, we review secure computation-and-forward. We consider secure computation-and-forward in a typical setting. Consider two senders V 1 , V 2 and one receiver R. Assume that