11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />

Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol 85<br />

Alice<br />

h a1 R 1<br />

h 1b<br />

R 2<br />

Bob<br />

1 2<br />

h a2<br />

h 2b<br />

h an<br />

R n<br />

h nb<br />

Figure 6.7: A fork-rake network<br />

secure protocols from insecure ones, let us consider a simplified fork-rake network in<br />

Fig. 6.7 as an example. Alice broadcasts a pilot packet x to all relays R 1 to R n within her<br />

transmission range. Each relay R i receives h ai x, where h ai is the channel gain between<br />

Alice <strong>and</strong> the relay <strong>and</strong> x is the pilot sequence. Using an amplify-<strong>and</strong>-forward scheme,<br />

each relay R i chooses whether to forward a i h ai x, where a i is the amplification gain to<br />

Bob, or not. Then, Bob receives ∑ i∈F a ih ai h ib x, where h ib is the channel gain between<br />

the relay R i <strong>and</strong> Bob, whereas F is the index set of relays that choose to forward the pilot<br />

packet. After that, assuming that the channel gain has not changed yet, Bob derives the<br />

key <strong>and</strong> broadcasts x back such that every relay receives h ib x. However, only the relay R i<br />

that has previously forwarded the packet to Bob will forward a i h ib x to Alice, who derives<br />

the same key from ∑ i∈F a ih ai h ib x [76].<br />

We assume that no enemy is allowed to be too close to Alice or Bob such that its<br />

channel parameters are uncorrelated to theirs. (If there are some correlations, the key<br />

encoding scheme discussed in the next chapter can be applied.) Now, we will show that<br />

the protocol security depends on the forwarding strategies of the relays. Three strategies<br />

are shown in an ascending security order [76].<br />

1. Only one route is taken, i.e., only one relay forwards the packet. This is insecure<br />

because an enemy only needs to be close enough to that relay R i to listen to a i h ai x sent<br />

to Bob <strong>and</strong> a i h ib x sent to Alice. If it knows a i , it can derive a i h ai h ib x as well as the key<br />

with ease.<br />

2. m routes are taken. This is insecure if there are k enemies <strong>and</strong> k ≥ m because each<br />

of m out of k enemies can do the same as the single enemy does in 1. After that, they<br />

meet <strong>and</strong> derive ∑ i∈F a ih ai h ib x. The enemy gang has an additional difficulty, however,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!