11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7<br />

<strong>Physical</strong>-<strong>layer</strong> Key Encoding for<br />

<strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal<br />

Security Protection (USP)<br />

The previous chapter concerns mainly the process of secret key generation. It does not tell<br />

how the encryptor uses the key. In this chapter, we discuss the one-time-pad encryptor<br />

as well as a technique called “physical-<strong>layer</strong> key encoding” used to enhance security when<br />

that kind of encryptor is used.<br />

An information-theoretic analysis of physical-<strong>layer</strong> key generation given in the previous<br />

chapter states that there are vulnerable key symbols that might be estimated by<br />

eavesdroppers. To protect those key symbols, we introduce physical-<strong>layer</strong> key encoding<br />

in Section 7.1. After that, in Section 7.2, we provide necessary <strong>and</strong> sufficient conditions<br />

on the code in order to achieve perfect secrecy as a function of the number of vulnerable<br />

bits <strong>and</strong> derive the asymptotic code rate accordingly. This perfect secrecy is guaranteed<br />

even when the eavesdropper knows the code. When the number of vulnerable symbols is<br />

unknown but the ratio between the number of vulnerable key symbols <strong>and</strong> the total number<br />

of generated key symbols is given instead, we suggest an equivalent design parameter<br />

91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!