11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

112 Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works<br />

WPSG<br />

2<br />

3 3<br />

One-Time-Pad<br />

Encryptor<br />

1<br />

2<br />

USP<br />

2<br />

Cryptography<br />

<strong>Coding</strong><br />

3<br />

3<br />

Slepian-Wolf<br />

<strong>Coding</strong><br />

1<br />

<strong>Physical</strong>-<strong>layer</strong><br />

Key Encoding<br />

2<br />

Secure<br />

<strong>Network</strong> <strong>Coding</strong><br />

<strong>Network</strong> <strong>Coding</strong><br />

LDPC Codes<br />

4 5<br />

UEP<br />

Cooperative<br />

Scheme<br />

5<br />

LT Codes<br />

Figure 8.1: Interrelationships among mentioned subjects<br />

8.2.1 <strong>Network</strong> <strong>Coding</strong> for WPSG<br />

Apart from our research project, there exists an important contribution on one-relay<br />

WPSG made by Shimizu et al.. They show that network coding helps make one-relay<br />

WPSG more secure [74]. Figure 8.2(b) gives an illustration of their scheme, which they call<br />

“multiple-access amplify-<strong>and</strong>-forward (MA-AF),” as compared with the normal amplify<strong>and</strong>-forward<br />

scheme in Fig. 8.2(a). For simplicity, we do not consider the effect of noise<br />

here <strong>and</strong> assume that the amplification factor at the relay is 1. The effects of these two<br />

factors are discussed in detail in [74].<br />

The normal amplify-<strong>and</strong>-forward scheme is the same as Protocol 1 in Section 2.2.10,<br />

which is the least secure. The relay, after receiving the pilot packet x multiplied by the<br />

channel gain from Alice in the first time slot, amplifies <strong>and</strong> forwards it to Bob in the<br />

second one. The process repeats itself in the third <strong>and</strong> fourth time slot with the roles of<br />

Alice <strong>and</strong> Bob interchanged.<br />

In the first time-slot of the MA-AF scheme, Alice receives xh ar whereas Bob receives<br />

xh rb , where h ar <strong>and</strong> h rb are Alice-relay <strong>and</strong> relay-Bob channel gains, respectively. In the<br />

second time slot, the signal from Alice <strong>and</strong> Bob adds together such that the relay receives<br />

x(h ar + h rb ). The relay then forwards this to Alice <strong>and</strong> Bob in the third time slot. Alice

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!