Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
104<br />
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP)<br />
c 4<br />
N 4 − c 4<br />
c 3 N 3 − c 3<br />
c 2 N 2 − c 2<br />
c 1 N 1 − c 1<br />
It is weakly secure if<br />
1<br />
|F| n<br />
Figure 7.3: An illustration of combinatorial weak security limit<br />
< p g < 1. This p g should be determined by the application <strong>layer</strong><br />
who has a better idea about how weak the data security in each priority class should be<br />
allowed to be.<br />
In our scalable security framework, the guessing success probability is not the only<br />
benchmark, since, for a given data priority i having N i data symbols, we are interested<br />
in making sure that only up to a limited number c i of symbols are weakly secure with a<br />
guessing success probability p g not exceeding a threshold p ti , whereas the other N i − c i<br />
symbols are perfectly secure. Therefore, we propose in Definition 7.4 another benchmark<br />
called the combinatorial weak security limit (CWSL) which provides the parameter c i for<br />
each priority class. Prior to that, the concepts of a priority class, a priority classification<br />
function, <strong>and</strong> an ordered scalable message are defined in Definitions 7.1-7.3, respectively.<br />
A combinatorial weak security limit c i for each priority class i is illustrated in Fig. 7.3.<br />
The smaller the i, the higher the priority <strong>and</strong> therefore the lower the proportion c i /N i of<br />
weakly secure symbols. Note that c i symbols do not need to stick together at the front of<br />
the data, but can be arbitrarily distributed.<br />
Definition 7.1 Given a scalable message M= [m 1 , m 2 , ..., m ω ], a set of symbols with<br />
priority class i, i > 0, is given by Q i = {q i1 , q i2 , ..., q iυi }, where each q ik , 1 ≤ k ≤ υ i , is a<br />
distinct element in M. Each member in Q i is less important than any member in Q i−1<br />
<strong>and</strong> may be useless without the recovery of some members in Q i−1 .<br />
Definition 7.2 π(m j ) is a priority classification function of a scalable symbol m j belonging<br />
to the scalable message M= [m 1 , m 2 , ..., m ω ] if <strong>and</strong> only if m j is of the priority class<br />
π(m j ) ∈ Z + , 1 ≤ j ≤ ω.