11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

114 Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works<br />

<strong>and</strong> Bob can then derive the overall channel gain h ar h rb from the signal they receive in<br />

the first <strong>and</strong> the third time slots. Since the channel information sent out by the relay is<br />

neither h ar nor h rb but a network-coded combination, which is h ar + h rb , the enemy will<br />

find it more difficult to derive h ar h rb .<br />

Investigation of Different <strong>Network</strong> <strong>Coding</strong> <strong>and</strong> Relaying Patterns<br />

When Alice <strong>and</strong> Bob are within each other’s transmission range, the efficiency of key<br />

generation can be enhanced as shown by our proposed scheme in Fig. 8.2(c). With an<br />

extension by one time slot, Alice <strong>and</strong> Bob can now generate a secret key from two paths,<br />

the direct one <strong>and</strong> the relayed one.<br />

Apart from the triangular shape in Fig. 8.2(c), it is interesting to investigate the<br />

graphs with other shapes, such as a quadrilateral or a polygon in general, <strong>and</strong> compare<br />

the key generation efficiency. Also, one might design a scheme to generate secret keys not<br />

only for Alice <strong>and</strong> Bob, but also for the relays. One may further ask such graph-theoretic<br />

questions as how the convexity of the shape, or the completeness of the graph, affect key<br />

generation. (A shape is convex if all the points along the straight line connecting any two<br />

points within it lie inside. A graph is complete if every pair of nodes is connected by an<br />

edge.)<br />

Generalizing the MA-AF Scheme<br />

When the distance between Alice <strong>and</strong> Bob is larger, we need more than one relay <strong>and</strong><br />

thus a generalized network coding scheme. The main question is whether a corresponding<br />

scheme can be derived by using Shimizu’s procedure as a building block, <strong>and</strong> how.<br />

Protocols for WPSG with <strong>Network</strong> <strong>Coding</strong><br />

If some local key is generated by the triangular geometry in Fig. 8.2(c), how can we make it<br />

compatible with the key generation schemes using different geometry <strong>and</strong> network coding<br />

patterns in other locations?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!