Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
114 Chapter 8: Summary, Conclusion, <strong>and</strong> Future Works<br />
<strong>and</strong> Bob can then derive the overall channel gain h ar h rb from the signal they receive in<br />
the first <strong>and</strong> the third time slots. Since the channel information sent out by the relay is<br />
neither h ar nor h rb but a network-coded combination, which is h ar + h rb , the enemy will<br />
find it more difficult to derive h ar h rb .<br />
Investigation of Different <strong>Network</strong> <strong>Coding</strong> <strong>and</strong> Relaying Patterns<br />
When Alice <strong>and</strong> Bob are within each other’s transmission range, the efficiency of key<br />
generation can be enhanced as shown by our proposed scheme in Fig. 8.2(c). With an<br />
extension by one time slot, Alice <strong>and</strong> Bob can now generate a secret key from two paths,<br />
the direct one <strong>and</strong> the relayed one.<br />
Apart from the triangular shape in Fig. 8.2(c), it is interesting to investigate the<br />
graphs with other shapes, such as a quadrilateral or a polygon in general, <strong>and</strong> compare<br />
the key generation efficiency. Also, one might design a scheme to generate secret keys not<br />
only for Alice <strong>and</strong> Bob, but also for the relays. One may further ask such graph-theoretic<br />
questions as how the convexity of the shape, or the completeness of the graph, affect key<br />
generation. (A shape is convex if all the points along the straight line connecting any two<br />
points within it lie inside. A graph is complete if every pair of nodes is connected by an<br />
edge.)<br />
Generalizing the MA-AF Scheme<br />
When the distance between Alice <strong>and</strong> Bob is larger, we need more than one relay <strong>and</strong><br />
thus a generalized network coding scheme. The main question is whether a corresponding<br />
scheme can be derived by using Shimizu’s procedure as a building block, <strong>and</strong> how.<br />
Protocols for WPSG with <strong>Network</strong> <strong>Coding</strong><br />
If some local key is generated by the triangular geometry in Fig. 8.2(c), how can we make it<br />
compatible with the key generation schemes using different geometry <strong>and</strong> network coding<br />
patterns in other locations?