Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP) 109<br />
With the summation ∑ 3<br />
i=1 Y i known by wiretapping, <strong>and</strong> K 1 ⊕ K 3 ⊕ K 5 known if<br />
K 1 , K 3 , <strong>and</strong> K 5 are vulnerable symbols, the enemy knows the summation ∑ 3<br />
i=1 X i. This<br />
means, by guessing two bits out of three bits X i , i = 1, 2, 3, correctly, the enemy knows<br />
all the three bits. The probability of guessing two bits correctly is 0.25, corresponding to<br />
the requirement p t2 = 0.25. We can see that there is no way to derive any three bits with<br />
more guessing success probability than 0.25. Therefore, the first condition is not met,<br />
meaning that our encryption will be considered scalably secure if the second condition is<br />
not met either.<br />
By checking every possible way for the enemy to derive all four plaintext bits X i ,<br />
i = 1, 2, 3, 4, we see that the maximum guessing success probability is 0.125.<br />
Since<br />
0.125 = p ti · ( 1<br />
|F| )χ i−c i<br />
= 0.25 · ( 1 2 )4−3 , the second condition is not met <strong>and</strong> our encryption<br />
is therefore scalably secure according to the requirement.<br />
One may observe that, by using the given scalable security requirement instead of the<br />
perfect secrecy requirement, we reduce the number of original symbols I K needed by 40%.<br />
7.8 Conclusion <strong>and</strong> Future Research<br />
We have proposed physical-<strong>layer</strong> key encoding for the WPSG cryptosystem with onetime<br />
pad encryptor. Four theorems indicate the required properties of the codes in order<br />
to achieve perfect secrecy of the secret data. After that, we discuss a scalable security<br />
framework specifying the degrees of security weakness that can be allowed in lower-priority<br />
data. Our framework applies to weakly secure network coding as well as our physical<strong>layer</strong><br />
key encoding in a WPSG cryptosystem <strong>and</strong>, indeed, any key encoding schemes for<br />
one-time pad cryptosystems having vulnerable key bits. We show that the number of<br />
original key bits needed can be significantly reduced if weak security is allowed.<br />
In future, we hope that some algorithms are developed such that, given any scalable<br />
security requirement, the code can be systematically designed.