11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP) 107<br />

Although the source symbols in both Fig. 7.4 (a) <strong>and</strong> (b) cannot be decrypted by<br />

wiretapping a single edge, the degrees of security in the two figures differ. If we check<br />

the definition of Shannon security <strong>and</strong> weak security, we find that secure network coding<br />

in Fig. 7.4 (a) is Shannon secure since I(X = [x 1 ]; Y) = 0, where Y is the information<br />

symbol at any single edge.<br />

However, that in Fig. 7.4 (b) is only weakly secure since,<br />

although I(x i ; Y) = 0, i = 2, 3, I(X = [x 2 , x 3 ]; Y) = log 2 |F|, where |F| is the field size<br />

of the symbols x 2 <strong>and</strong> x 3 . (In this case, x2 <strong>and</strong> x3 can take their values from the Galois<br />

field with the size of 5 or greater.)<br />

Secure network coding in Fig. 7.4 can be seen as a special case of the scalable security<br />

framework proposed in the previous section. We can see that, when the field size of x 1 ,<br />

x 2 , x 3 , <strong>and</strong> w is |F|, the guessing success probability p g of x 1 is 1<br />

|F| , <strong>and</strong> that of [x 2, x 3 ] is<br />

1<br />

as well. The degree of security in Fig. 7.4 (b) is weaker since, with the same p<br />

|F| g , two<br />

symbols are decrypted as compared with one symbol in Fig. 7.4 (a).<br />

The practical implication is that the high-priority symbols should be encrypted according<br />

to Fig. 7.4 (a), whereas the low-priority ones may consider the encryption in Fig. 7.4<br />

(b). For example, if we have an ordered scalable message M= [m 1 , m 2 , m 3 ] such that<br />

Π(M) = [1, 2, 2], the symbol m 1 should be encrypted according to Fig. 7.4 (a), whereas<br />

m 2 <strong>and</strong> m 3 may follow Fig. 7.4 (b), if the CWSL vector C= [1, 2] <strong>and</strong> the GSPT vector<br />

P t = [ 1 , 1 ] are specified by the application <strong>layer</strong>. (See Definition 7.4.)<br />

|F| |F|<br />

7.7 <strong>Physical</strong>-<strong>layer</strong> Key Encoding in the Scalable Security<br />

Framework<br />

Scalable security can be realized in physical-<strong>layer</strong> key encoding by reducing the number<br />

of 1-elements in (7.10) or (7.11) <strong>and</strong> shifting the groups of 1-elements to the left. This<br />

will save the number of original key symbols needed. We will give an example problem<br />

as follows.<br />

Problem 7.1. The application <strong>layer</strong> requires that at most three data bits in the second

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!