11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

x<br />

LIST OF FIGURES<br />

5.11 Comparison of normalized cumulative histograms of the number of LTencoded<br />

symbols needed to be transmitted in a coded butterfly network<br />

with varying erasure probability at BD such that all original symbols are<br />

recovered in two cases, without using the proposed algorithm <strong>and</strong> with<br />

Algorithms 5.1 <strong>and</strong> 5.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74<br />

6.1 A secret-key cryptosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . 78<br />

6.2 A secret-key cryptosystem based on mutual CSI . . . . . . . . . . . . . . . 80<br />

6.3 A generic communication system model . . . . . . . . . . . . . . . . . . . . 80<br />

6.4 A simulation result showing the mutual information between the channel<br />

estimates of Alice <strong>and</strong> Bob, <strong>and</strong> between their channel envelope estimates . 82<br />

6.5 A communication system model with one relay . . . . . . . . . . . . . . . . 83<br />

6.6 A simulation result showing the mutual information between the channel<br />

estimates of Alice <strong>and</strong> Bob in two cases, direct communication <strong>and</strong> communication<br />

with one relay . . . . . . . . . . . . . . . . . . . . . . . . . . . 83<br />

6.7 A fork-rake network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85<br />

6.8 A two-relay fork-rake network with two enemies . . . . . . . . . . . . . . . 86<br />

6.9 A butterfly network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89<br />

6.10 The proposed pilot packet format for the RSF Protocol . . . . . . . . . . . 90<br />

7.1 A modified secret-key cryptosystem based on mutual CSI with physical-key<br />

encoding <strong>and</strong> decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93<br />

7.2 The model of an enemy cryptanalyst (a), <strong>and</strong> its equivalent (b) . . . . . . 100<br />

7.3 An illustration of combinatorial weak security limit . . . . . . . . . . . . . 104<br />

7.4 Secure network coding in a butterfly network with (a) Shannon security<br />

<strong>and</strong> (b) weak security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106<br />

8.1 Interrelationships among mentioned subjects . . . . . . . . . . . . . . . . . 112<br />

8.2 One-relay WPSG schemes, each arrow representing a transmitted signal:<br />

(a) amplify <strong>and</strong> forward, (b) MA-AF, (c) our proposed scheme . . . . . . . 113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!