Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP) 107<br />
Although the source symbols in both Fig. 7.4 (a) <strong>and</strong> (b) cannot be decrypted by<br />
wiretapping a single edge, the degrees of security in the two figures differ. If we check<br />
the definition of Shannon security <strong>and</strong> weak security, we find that secure network coding<br />
in Fig. 7.4 (a) is Shannon secure since I(X = [x 1 ]; Y) = 0, where Y is the information<br />
symbol at any single edge.<br />
However, that in Fig. 7.4 (b) is only weakly secure since,<br />
although I(x i ; Y) = 0, i = 2, 3, I(X = [x 2 , x 3 ]; Y) = log 2 |F|, where |F| is the field size<br />
of the symbols x 2 <strong>and</strong> x 3 . (In this case, x2 <strong>and</strong> x3 can take their values from the Galois<br />
field with the size of 5 or greater.)<br />
Secure network coding in Fig. 7.4 can be seen as a special case of the scalable security<br />
framework proposed in the previous section. We can see that, when the field size of x 1 ,<br />
x 2 , x 3 , <strong>and</strong> w is |F|, the guessing success probability p g of x 1 is 1<br />
|F| , <strong>and</strong> that of [x 2, x 3 ] is<br />
1<br />
as well. The degree of security in Fig. 7.4 (b) is weaker since, with the same p<br />
|F| g , two<br />
symbols are decrypted as compared with one symbol in Fig. 7.4 (a).<br />
The practical implication is that the high-priority symbols should be encrypted according<br />
to Fig. 7.4 (a), whereas the low-priority ones may consider the encryption in Fig. 7.4<br />
(b). For example, if we have an ordered scalable message M= [m 1 , m 2 , m 3 ] such that<br />
Π(M) = [1, 2, 2], the symbol m 1 should be encrypted according to Fig. 7.4 (a), whereas<br />
m 2 <strong>and</strong> m 3 may follow Fig. 7.4 (b), if the CWSL vector C= [1, 2] <strong>and</strong> the GSPT vector<br />
P t = [ 1 , 1 ] are specified by the application <strong>layer</strong>. (See Definition 7.4.)<br />
|F| |F|<br />
7.7 <strong>Physical</strong>-<strong>layer</strong> Key Encoding in the Scalable Security<br />
Framework<br />
Scalable security can be realized in physical-<strong>layer</strong> key encoding by reducing the number<br />
of 1-elements in (7.10) or (7.11) <strong>and</strong> shifting the groups of 1-elements to the left. This<br />
will save the number of original key symbols needed. We will give an example problem<br />
as follows.<br />
Problem 7.1. The application <strong>layer</strong> requires that at most three data bits in the second