11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

106<br />

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP)<br />

A<br />

A<br />

x 1 + w<br />

w<br />

x 2 + x 3 x 2 + 2x 3<br />

B<br />

x 1 + w<br />

w<br />

C<br />

B<br />

x 2 + x 3 x 2 + 2x 3<br />

C<br />

F<br />

F<br />

x 1 + w<br />

x 1 + 2w<br />

w<br />

x 2 + x 3 2x 2 + 3x 3<br />

x 2 + 2x 3<br />

x 1 + 2w<br />

G<br />

x 1 + 2w<br />

G<br />

2x 2 + 3x 3 2x 2 + 3x 3<br />

D<br />

E<br />

D<br />

E<br />

(a)<br />

(b)<br />

Figure 7.4: Secure network coding in a butterfly network with (a) Shannon security <strong>and</strong><br />

(b) weak security<br />

7.6 Weakly Secure <strong>Network</strong> <strong>Coding</strong> in the Scalable<br />

Security Framework<br />

Bhattad <strong>and</strong> Narayanan explain the difference between Shannon security <strong>and</strong> weak security<br />

in their work on weakly secure network coding [35]. They state that the source<br />

information is Shannon secure if I(X; Y) = 0, where X = [x 1 , x 2 , ..., x r ] is the source<br />

information <strong>and</strong> Y is the set of messages to which an eavesdropper can listen. In the case<br />

of Shannon security, the eavesdropper has no information about the source at all. On the<br />

other h<strong>and</strong>, the source information is weakly secure if I(x i ; Y) = 0, 1 ≤ i ≤ r.<br />

The difference between two security concepts can be illustrated by secure network<br />

coding in Fig. 7.4. The goal of secure network coding is to make sure that an eavesdropper<br />

who has access to a limited number k of edges cannot decrypt the source information.<br />

Figures 7.4 (a) <strong>and</strong> (b) are an example of secure network coding with k = 1. According<br />

to the figures, the node F performs network coding by adding the symbol from the edge<br />

BF to that from CF , yielding a symbol in F G. In Fig. 7.4 (a), the source symbol x 1 is<br />

mixed with a r<strong>and</strong>om symbol w, whereas in Fig. 7.4 (b), two source symbols x 2 <strong>and</strong> x 3<br />

are mixed together. Observe that, for both figures 7.4 (a) <strong>and</strong> (b), the eavesdropper who<br />

has access only to a single edge cannot decrypt x 1 , x 2 , or x 3 .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!