11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />

Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol 87<br />

to Bob in the second time slot will do that to Alice in the fourth one.<br />

5. Enemies E 1 <strong>and</strong> E 2 are located near enough to R 1 <strong>and</strong> R 2 , respectively, so that, if<br />

both relays forward x,<br />

5.1 in the second time slot, E 1 hears a 1 h a1 x from R 1 plus the interference a 2 h a2 h R2,E1 x<br />

from R 2 , where h R2,E1 is the channel gain between R 2 <strong>and</strong> E 1 .<br />

5.2 In the same manner, E 2 hears a 2 h a2 x from R 2 plus the interference a 1 h a1 h R1,E2 x<br />

from R 1 , where h R1,E2 is the channel gain between R 1 <strong>and</strong> E 2 .<br />

5.3 In the fourth time slot, E 1 hears a 1 h 1b x from R 1 plus the interference a 2 h 2b h R2,E1 x<br />

from R 2 .<br />

R 1 .<br />

5.4 At the same time, E 2 hears a 2 h 2b x from R 2 plus the interference a 1 h 1b h R1,E2 x from<br />

These assumptions are realistic <strong>and</strong> will hold except in an unlikely situation where<br />

either the relays or the eavesdroppers are only few wavelengths away from the transmitter<br />

or the receiver. Now, we would like to evaluate the security of each strategy.<br />

Strategy 1 of Section 6.5 is totally unsafe since, when only one route is taken, there is<br />

no interference from another route according to 5.1-5.4, therefore, the enemy E i closest<br />

to the chosen route receives clear signal a i h ai x <strong>and</strong> a i h ib x <strong>and</strong> can derive ∑ i∈F a ih ai h ib x<br />

as well as the whole key.<br />

Strategy 2 is more secure since there is some interference according to 5.1-5.4. Even<br />

when both enemies help each other, it is not easy to derive ∑ i∈F a ih ai h ib x if the interference<br />

is strong <strong>and</strong> they do not know a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 . (Of course, if they do know<br />

a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 , they simply have to solve a system of two linear equations.) An<br />

interference cancellation scheme can be applied, but they still have some disadvantages<br />

as compared with Alice <strong>and</strong> Bob. They may recover some, but not the whole key.<br />

Strategy 3 with the forwarding probability of, let us say 0.5, is even more secure<br />

since it is now impossible for each enemy to know whether it receives the desired signal<br />

plus interference or merely the interference, especially if the interference is strong <strong>and</strong><br />

the enemies do not know a 1 h R1,E2 <strong>and</strong> a 2 h R2,E1 . With some rational guesses, they may

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!