11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

104<br />

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP)<br />

c 4<br />

N 4 − c 4<br />

c 3 N 3 − c 3<br />

c 2 N 2 − c 2<br />

c 1 N 1 − c 1<br />

It is weakly secure if<br />

1<br />

|F| n<br />

Figure 7.3: An illustration of combinatorial weak security limit<br />

< p g < 1. This p g should be determined by the application <strong>layer</strong><br />

who has a better idea about how weak the data security in each priority class should be<br />

allowed to be.<br />

In our scalable security framework, the guessing success probability is not the only<br />

benchmark, since, for a given data priority i having N i data symbols, we are interested<br />

in making sure that only up to a limited number c i of symbols are weakly secure with a<br />

guessing success probability p g not exceeding a threshold p ti , whereas the other N i − c i<br />

symbols are perfectly secure. Therefore, we propose in Definition 7.4 another benchmark<br />

called the combinatorial weak security limit (CWSL) which provides the parameter c i for<br />

each priority class. Prior to that, the concepts of a priority class, a priority classification<br />

function, <strong>and</strong> an ordered scalable message are defined in Definitions 7.1-7.3, respectively.<br />

A combinatorial weak security limit c i for each priority class i is illustrated in Fig. 7.3.<br />

The smaller the i, the higher the priority <strong>and</strong> therefore the lower the proportion c i /N i of<br />

weakly secure symbols. Note that c i symbols do not need to stick together at the front of<br />

the data, but can be arbitrarily distributed.<br />

Definition 7.1 Given a scalable message M= [m 1 , m 2 , ..., m ω ], a set of symbols with<br />

priority class i, i > 0, is given by Q i = {q i1 , q i2 , ..., q iυi }, where each q ik , 1 ≤ k ≤ υ i , is a<br />

distinct element in M. Each member in Q i is less important than any member in Q i−1<br />

<strong>and</strong> may be useless without the recovery of some members in Q i−1 .<br />

Definition 7.2 π(m j ) is a priority classification function of a scalable symbol m j belonging<br />

to the scalable message M= [m 1 , m 2 , ..., m ω ] if <strong>and</strong> only if m j is of the priority class<br />

π(m j ) ∈ Z + , 1 ≤ j ≤ ω.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!