Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />
Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol 87<br />
to Bob in the second time slot will do that to Alice in the fourth one.<br />
5. Enemies E 1 <strong>and</strong> E 2 are located near enough to R 1 <strong>and</strong> R 2 , respectively, so that, if<br />
both relays forward x,<br />
5.1 in the second time slot, E 1 hears a 1 h a1 x from R 1 plus the interference a 2 h a2 h R2,E1 x<br />
from R 2 , where h R2,E1 is the channel gain between R 2 <strong>and</strong> E 1 .<br />
5.2 In the same manner, E 2 hears a 2 h a2 x from R 2 plus the interference a 1 h a1 h R1,E2 x<br />
from R 1 , where h R1,E2 is the channel gain between R 1 <strong>and</strong> E 2 .<br />
5.3 In the fourth time slot, E 1 hears a 1 h 1b x from R 1 plus the interference a 2 h 2b h R2,E1 x<br />
from R 2 .<br />
R 1 .<br />
5.4 At the same time, E 2 hears a 2 h 2b x from R 2 plus the interference a 1 h 1b h R1,E2 x from<br />
These assumptions are realistic <strong>and</strong> will hold except in an unlikely situation where<br />
either the relays or the eavesdroppers are only few wavelengths away from the transmitter<br />
or the receiver. Now, we would like to evaluate the security of each strategy.<br />
Strategy 1 of Section 6.5 is totally unsafe since, when only one route is taken, there is<br />
no interference from another route according to 5.1-5.4, therefore, the enemy E i closest<br />
to the chosen route receives clear signal a i h ai x <strong>and</strong> a i h ib x <strong>and</strong> can derive ∑ i∈F a ih ai h ib x<br />
as well as the whole key.<br />
Strategy 2 is more secure since there is some interference according to 5.1-5.4. Even<br />
when both enemies help each other, it is not easy to derive ∑ i∈F a ih ai h ib x if the interference<br />
is strong <strong>and</strong> they do not know a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 . (Of course, if they do know<br />
a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 , they simply have to solve a system of two linear equations.) An<br />
interference cancellation scheme can be applied, but they still have some disadvantages<br />
as compared with Alice <strong>and</strong> Bob. They may recover some, but not the whole key.<br />
Strategy 3 with the forwarding probability of, let us say 0.5, is even more secure<br />
since it is now impossible for each enemy to know whether it receives the desired signal<br />
plus interference or merely the interference, especially if the interference is strong <strong>and</strong><br />
the enemies do not know a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 . With some rational guesses, they may