Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 7<br />
<strong>Physical</strong>-<strong>layer</strong> Key Encoding for<br />
<strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal<br />
Security Protection (USP)<br />
The previous chapter concerns mainly the process of secret key generation. It does not tell<br />
how the encryptor uses the key. In this chapter, we discuss the one-time-pad encryptor<br />
as well as a technique called “physical-<strong>layer</strong> key encoding” used to enhance security when<br />
that kind of encryptor is used.<br />
An information-theoretic analysis of physical-<strong>layer</strong> key generation given in the previous<br />
chapter states that there are vulnerable key symbols that might be estimated by<br />
eavesdroppers. To protect those key symbols, we introduce physical-<strong>layer</strong> key encoding<br />
in Section 7.1. After that, in Section 7.2, we provide necessary <strong>and</strong> sufficient conditions<br />
on the code in order to achieve perfect secrecy as a function of the number of vulnerable<br />
bits <strong>and</strong> derive the asymptotic code rate accordingly. This perfect secrecy is guaranteed<br />
even when the eavesdropper knows the code. When the number of vulnerable symbols is<br />
unknown but the ratio between the number of vulnerable key symbols <strong>and</strong> the total number<br />
of generated key symbols is given instead, we suggest an equivalent design parameter<br />
91