Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
106<br />
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP)<br />
A<br />
A<br />
x 1 + w<br />
w<br />
x 2 + x 3 x 2 + 2x 3<br />
B<br />
x 1 + w<br />
w<br />
C<br />
B<br />
x 2 + x 3 x 2 + 2x 3<br />
C<br />
F<br />
F<br />
x 1 + w<br />
x 1 + 2w<br />
w<br />
x 2 + x 3 2x 2 + 3x 3<br />
x 2 + 2x 3<br />
x 1 + 2w<br />
G<br />
x 1 + 2w<br />
G<br />
2x 2 + 3x 3 2x 2 + 3x 3<br />
D<br />
E<br />
D<br />
E<br />
(a)<br />
(b)<br />
Figure 7.4: Secure network coding in a butterfly network with (a) Shannon security <strong>and</strong><br />
(b) weak security<br />
7.6 Weakly Secure <strong>Network</strong> <strong>Coding</strong> in the Scalable<br />
Security Framework<br />
Bhattad <strong>and</strong> Narayanan explain the difference between Shannon security <strong>and</strong> weak security<br />
in their work on weakly secure network coding [35]. They state that the source<br />
information is Shannon secure if I(X; Y) = 0, where X = [x 1 , x 2 , ..., x r ] is the source<br />
information <strong>and</strong> Y is the set of messages to which an eavesdropper can listen. In the case<br />
of Shannon security, the eavesdropper has no information about the source at all. On the<br />
other h<strong>and</strong>, the source information is weakly secure if I(x i ; Y) = 0, 1 ≤ i ≤ r.<br />
The difference between two security concepts can be illustrated by secure network<br />
coding in Fig. 7.4. The goal of secure network coding is to make sure that an eavesdropper<br />
who has access to a limited number k of edges cannot decrypt the source information.<br />
Figures 7.4 (a) <strong>and</strong> (b) are an example of secure network coding with k = 1. According<br />
to the figures, the node F performs network coding by adding the symbol from the edge<br />
BF to that from CF , yielding a symbol in F G. In Fig. 7.4 (a), the source symbol x 1 is<br />
mixed with a r<strong>and</strong>om symbol w, whereas in Fig. 7.4 (b), two source symbols x 2 <strong>and</strong> x 3<br />
are mixed together. Observe that, for both figures 7.4 (a) <strong>and</strong> (b), the eavesdropper who<br />
has access only to a single edge cannot decrypt x 1 , x 2 , or x 3 .