11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

vi<br />

CONTENTS<br />

5.4 Degree Distribution Distortion <strong>and</strong> Receiver Performance Deterioration in<br />

Binary Erasure Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />

5.5 The First Solution: Wise Assignment of <strong>Network</strong> Codes . . . . . . . . . . . 65<br />

5.6 The Cooperative Solution Performed by the Source <strong>and</strong> the Relay . . . . . 69<br />

5.7 Results, Conclusions, <strong>and</strong> Future Works . . . . . . . . . . . . . . . . . . . 72<br />

III<br />

<strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG)<br />

<strong>and</strong> <strong>Network</strong> <strong>Coding</strong> Techniques for Security Enhancement 75<br />

6 <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />

Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />

77<br />

6.1 Cryptosystem of <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) . 78<br />

6.2 Information-Theoretic Limits of the Key Generation . . . . . . . . . . . . . 79<br />

6.3 Possible Key Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br />

6.4 Investigation of the Key Generation Rate . . . . . . . . . . . . . . . . . . . 84<br />

6.5 Security Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br />

6.5.1 Protocol Evaluation in a Scenario of a Two-Relay Fork-Rake <strong>Network</strong><br />

with Two Enemies . . . . . . . . . . . . . . . . . . . . . . . . 86<br />

6.5.2 RSF Protocol in Arbitrary <strong>Network</strong>s . . . . . . . . . . . . . . . . . 88<br />

7 <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP) 91<br />

7.1 Introduction to <strong>Physical</strong>-<strong>layer</strong> Key Encoding for a One-Time-Pad Encryptor 92<br />

7.2 Perfect Secrecy in <strong>Physical</strong>-Layer Key Encoding for a One-Time-Pad Encryptor<br />

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />

7.3 The Equivalent Number of Vulnerable Bits for the Design of <strong>Physical</strong>-Layer<br />

Key Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99<br />

7.4 Literature Review of Scalability in Practical Security Domain . . . . . . . 102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!