Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
102<br />
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP)<br />
we use Theorem 7.4 to derive I V ′ K + 1 as an equivalent of I V K + 1 from the probability p<br />
that the eavesdropper incorrectly estimates a key bit. For example, I V ′ K + 1 is at least 5<br />
when p is 0.25, yielding an asymptotic code rate of 3, as predicted by Theorem 7.3.<br />
The next section discusses scalable security, which will be related to the physical-<strong>layer</strong><br />
key encoding in the end.<br />
7.4 Literature Review of Scalability in Practical Security<br />
Domain<br />
Scalable security has been previously investigated in [22,27,32,72] using selective encryption<br />
schemes. The basic idea of the scheme is to encrypt only some important parts of the<br />
scalable data. These works consider several video coding st<strong>and</strong>ards, especially MPEG-I,<br />
from which scalable video data is used to evaluate their encryption scheme.<br />
MPEG encoding of a video sequence requires compression in two dimensions. In the<br />
time dimension, a combination of blocked-based motion compensation is applied to remove<br />
inter-frame temporal redundancy. In the space dimension, discrete cosine transform<br />
(DCT)-based compression is used to remove intra-frame spatial redundancy. After compression,<br />
frames are formed by several compressed blocks.<br />
Then, a number of frames<br />
are grouped together to form a r<strong>and</strong>om access unit, called a group of pictures (GOP),<br />
so that the video can be viewed either forward or backward. Each GOP has little or no<br />
dependence on other GOPs [27].<br />
A GOP consists of three types of frames, which are intracoded frames (I-frames),<br />
motion-estimated forward predicted frames (P-frames), <strong>and</strong> motion-estimated bidirectional<br />
predicted frames (B-frames). The encoder of the I-frame uses the same scheme as<br />
JPEG encoding of still frames. The I-frame is used as the motion-estimated reference<br />
for the P- <strong>and</strong> B- frames. The P-frame is encoded with reference to the most recently<br />
previous I- or P- frame, whereas the B-frame is encoded with reference to both the most<br />
recently previous as well as the most immediately succeeding I- or P- frame [27].