Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
vi<br />
CONTENTS<br />
5.4 Degree Distribution Distortion <strong>and</strong> Receiver Performance Deterioration in<br />
Binary Erasure Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />
5.5 The First Solution: Wise Assignment of <strong>Network</strong> Codes . . . . . . . . . . . 65<br />
5.6 The Cooperative Solution Performed by the Source <strong>and</strong> the Relay . . . . . 69<br />
5.7 Results, Conclusions, <strong>and</strong> Future Works . . . . . . . . . . . . . . . . . . . 72<br />
III<br />
<strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG)<br />
<strong>and</strong> <strong>Network</strong> <strong>Coding</strong> Techniques for Security Enhancement 75<br />
6 <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />
Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />
77<br />
6.1 Cryptosystem of <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) . 78<br />
6.2 Information-Theoretic Limits of the Key Generation . . . . . . . . . . . . . 79<br />
6.3 Possible Key Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br />
6.4 Investigation of the Key Generation Rate . . . . . . . . . . . . . . . . . . . 84<br />
6.5 Security Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br />
6.5.1 Protocol Evaluation in a Scenario of a Two-Relay Fork-Rake <strong>Network</strong><br />
with Two Enemies . . . . . . . . . . . . . . . . . . . . . . . . 86<br />
6.5.2 RSF Protocol in Arbitrary <strong>Network</strong>s . . . . . . . . . . . . . . . . . 88<br />
7 <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP) 91<br />
7.1 Introduction to <strong>Physical</strong>-<strong>layer</strong> Key Encoding for a One-Time-Pad Encryptor 92<br />
7.2 Perfect Secrecy in <strong>Physical</strong>-Layer Key Encoding for a One-Time-Pad Encryptor<br />
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />
7.3 The Equivalent Number of Vulnerable Bits for the Design of <strong>Physical</strong>-Layer<br />
Key Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99<br />
7.4 Literature Review of Scalability in Practical Security Domain . . . . . . . 102