Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
112 Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works<br />
WPSG<br />
2<br />
3 3<br />
One-Time-Pad<br />
Encryptor<br />
1<br />
2<br />
USP<br />
2<br />
Cryptography<br />
<strong>Coding</strong><br />
3<br />
3<br />
Slepian-Wolf<br />
<strong>Coding</strong><br />
1<br />
<strong>Physical</strong>-<strong>layer</strong><br />
Key Encoding<br />
2<br />
Secure<br />
<strong>Network</strong> <strong>Coding</strong><br />
<strong>Network</strong> <strong>Coding</strong><br />
LDPC Codes<br />
4 5<br />
UEP<br />
Cooperative<br />
Scheme<br />
5<br />
LT Codes<br />
Figure 8.1: Interrelationships among mentioned subjects<br />
8.2.1 <strong>Network</strong> <strong>Coding</strong> for WPSG<br />
Apart from our research project, there exists an important contribution on one-relay<br />
WPSG made by Shimizu et al.. They show that network coding helps make one-relay<br />
WPSG more secure [74]. Figure 8.2(b) gives an illustration of their scheme, which they call<br />
“multiple-access amplify-<strong>and</strong>-forward (MA-AF),” as compared with the normal amplify<strong>and</strong>-forward<br />
scheme in Fig. 8.2(a). For simplicity, we do not consider the effect of noise<br />
here <strong>and</strong> assume that the amplification factor at the relay is 1. The effects of these two<br />
factors are discussed in detail in [74].<br />
The normal amplify-<strong>and</strong>-forward scheme is the same as Protocol 1 in Section 2.2.10,<br />
which is the least secure. The relay, after receiving the pilot packet x multiplied by the<br />
channel gain from Alice in the first time slot, amplifies <strong>and</strong> forwards it to Bob in the<br />
second one. The process repeats itself in the third <strong>and</strong> fourth time slot with the roles of<br />
Alice <strong>and</strong> Bob interchanged.<br />
In the first time-slot of the MA-AF scheme, Alice receives xh ar whereas Bob receives<br />
xh rb , where h ar <strong>and</strong> h rb are Alice-relay <strong>and</strong> relay-Bob channel gains, respectively. In the<br />
second time slot, the signal from Alice <strong>and</strong> Bob adds together such that the relay receives<br />
x(h ar + h rb ). The relay then forwards this to Alice <strong>and</strong> Bob in the third time slot. Alice