11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP) 109<br />

With the summation ∑ 3<br />

i=1 Y i known by wiretapping, <strong>and</strong> K 1 ⊕ K 3 ⊕ K 5 known if<br />

K 1 , K 3 , <strong>and</strong> K 5 are vulnerable symbols, the enemy knows the summation ∑ 3<br />

i=1 X i. This<br />

means, by guessing two bits out of three bits X i , i = 1, 2, 3, correctly, the enemy knows<br />

all the three bits. The probability of guessing two bits correctly is 0.25, corresponding to<br />

the requirement p t2 = 0.25. We can see that there is no way to derive any three bits with<br />

more guessing success probability than 0.25. Therefore, the first condition is not met,<br />

meaning that our encryption will be considered scalably secure if the second condition is<br />

not met either.<br />

By checking every possible way for the enemy to derive all four plaintext bits X i ,<br />

i = 1, 2, 3, 4, we see that the maximum guessing success probability is 0.125.<br />

Since<br />

0.125 = p ti · ( 1<br />

|F| )χ i−c i<br />

= 0.25 · ( 1 2 )4−3 , the second condition is not met <strong>and</strong> our encryption<br />

is therefore scalably secure according to the requirement.<br />

One may observe that, by using the given scalable security requirement instead of the<br />

perfect secrecy requirement, we reduce the number of original symbols I K needed by 40%.<br />

7.8 Conclusion <strong>and</strong> Future Research<br />

We have proposed physical-<strong>layer</strong> key encoding for the WPSG cryptosystem with onetime<br />

pad encryptor. Four theorems indicate the required properties of the codes in order<br />

to achieve perfect secrecy of the secret data. After that, we discuss a scalable security<br />

framework specifying the degrees of security weakness that can be allowed in lower-priority<br />

data. Our framework applies to weakly secure network coding as well as our physical<strong>layer</strong><br />

key encoding in a WPSG cryptosystem <strong>and</strong>, indeed, any key encoding schemes for<br />

one-time pad cryptosystems having vulnerable key bits. We show that the number of<br />

original key bits needed can be significantly reduced if weak security is allowed.<br />

In future, we hope that some algorithms are developed such that, given any scalable<br />

security requirement, the code can be systematically designed.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!