11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />

84<br />

Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />

6.4 Investigation of the Key Generation Rate<br />

In a direct communication, if the transmitter <strong>and</strong> the receiver have not moved, no new key<br />

can be generated since the channel is static. Therefore, the key generation rate depends<br />

heavily on the movements of transmitter <strong>and</strong> receiver. Assuming that channel parameters<br />

are sampled once every sampling time t s , the average key generation rate becomes<br />

where<br />

I k (it s ) = I<br />

(ĥa (it s ); ĥa ′(it s)<br />

R k = lim<br />

n→∞<br />

∑ n−1<br />

i=0 I k(it s )<br />

, (6.4)<br />

nt s<br />

∣ ĥa((i − 1)t s ), ĥa ′((i − 1)t s), ..., ĥa(0), ĥa ′(0) )<br />

. (6.5)<br />

The mutual information in (6.5) depends on how far the transmitter <strong>and</strong> the receiver<br />

can travel within t s . It is therefore related to the velocity <strong>and</strong> the mobility model if the<br />

value is to be obtained by simulation [76].<br />

Note that, when the key is generated according to the one-relay model in Fig. 6.5, the<br />

key generation rate is improved by the relay movement, which causes variation in channel<br />

parameters even when both transmitter <strong>and</strong> receiver are static. This compensates for the<br />

key loss due to the altered distribution shown in Fig. 6.6.<br />

6.5 Security Protocol<br />

<strong>Wireless</strong> communication between two nodes in a multi-path, multi-hop network does not<br />

require that the forward transmission path <strong>and</strong> the reverse one are the same. However, if<br />

our wireless physical-<strong>layer</strong> security scheme is used, they at least have to make sure that<br />

they use the same channels for secret-key generation. Some protocols are discussed in this<br />

section to achieve that purpose.<br />

In an arbitrary network having some routers between Alice <strong>and</strong> Bob, we need a secure<br />

protocol for the transmission of pilot symbols for the key generation. To differentiate

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!