Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />
84<br />
Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />
6.4 Investigation of the Key Generation Rate<br />
In a direct communication, if the transmitter <strong>and</strong> the receiver have not moved, no new key<br />
can be generated since the channel is static. Therefore, the key generation rate depends<br />
heavily on the movements of transmitter <strong>and</strong> receiver. Assuming that channel parameters<br />
are sampled once every sampling time t s , the average key generation rate becomes<br />
where<br />
I k (it s ) = I<br />
(ĥa (it s ); ĥa ′(it s)<br />
R k = lim<br />
n→∞<br />
∑ n−1<br />
i=0 I k(it s )<br />
, (6.4)<br />
nt s<br />
∣ ĥa((i − 1)t s ), ĥa ′((i − 1)t s), ..., ĥa(0), ĥa ′(0) )<br />
. (6.5)<br />
The mutual information in (6.5) depends on how far the transmitter <strong>and</strong> the receiver<br />
can travel within t s . It is therefore related to the velocity <strong>and</strong> the mobility model if the<br />
value is to be obtained by simulation [76].<br />
Note that, when the key is generated according to the one-relay model in Fig. 6.5, the<br />
key generation rate is improved by the relay movement, which causes variation in channel<br />
parameters even when both transmitter <strong>and</strong> receiver are static. This compensates for the<br />
key loss due to the altered distribution shown in Fig. 6.6.<br />
6.5 Security Protocol<br />
<strong>Wireless</strong> communication between two nodes in a multi-path, multi-hop network does not<br />
require that the forward transmission path <strong>and</strong> the reverse one are the same. However, if<br />
our wireless physical-<strong>layer</strong> security scheme is used, they at least have to make sure that<br />
they use the same channels for secret-key generation. Some protocols are discussed in this<br />
section to achieve that purpose.<br />
In an arbitrary network having some routers between Alice <strong>and</strong> Bob, we need a secure<br />
protocol for the transmission of pilot symbols for the key generation. To differentiate