11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8<br />

Summary, Conclusion, <strong>and</strong> Future<br />

Works<br />

8.1 Summary <strong>and</strong> Conclusion<br />

<strong>Physical</strong> key encoding has been presented in Chapter 7 as a means to protect security in<br />

the presence of vulnerable key symbols. The encoded output key is shorter than the input,<br />

thus sacrificing some key length for the sake of security. The counterpart of physical key<br />

encoding is Slepian-Wolf coding, which adds some redundancy to the quantized key such<br />

that legitimate receivers are protected against key mismatch due to channel estimation<br />

error.<br />

The relationship between physical key encoding <strong>and</strong> Slepian-Wolf coding in WPSG is<br />

similar to source coding <strong>and</strong> channel coding in a communication system in such a way that<br />

the latter exp<strong>and</strong>s what the former contracts. It is proved that optimality can be achieved<br />

when the source coding <strong>and</strong> the channel coding in a communication perform their tasks<br />

separately. It is yet to be proved whether such optimality holds with the separation of<br />

physical key encoding <strong>and</strong> Slepian-Wolf coding in WPSG.<br />

Just as channel coding has an unequal-error-protection (UEP) capability, physical key<br />

encoding has an unequal-security-protection (USP) capability. The concept of USP or<br />

scalable security has been previously discussed [22, 27, 32, 72], but it is more precisely<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!