Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />
Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol 85<br />
Alice<br />
h a1 R 1<br />
h 1b<br />
R 2<br />
Bob<br />
1 2<br />
h a2<br />
h 2b<br />
h an<br />
R n<br />
h nb<br />
Figure 6.7: A fork-rake network<br />
secure protocols from insecure ones, let us consider a simplified fork-rake network in<br />
Fig. 6.7 as an example. Alice broadcasts a pilot packet x to all relays R 1 to R n within her<br />
transmission range. Each relay R i receives h ai x, where h ai is the channel gain between<br />
Alice <strong>and</strong> the relay <strong>and</strong> x is the pilot sequence. Using an amplify-<strong>and</strong>-forward scheme,<br />
each relay R i chooses whether to forward a i h ai x, where a i is the amplification gain to<br />
Bob, or not. Then, Bob receives ∑ i∈F a ih ai h ib x, where h ib is the channel gain between<br />
the relay R i <strong>and</strong> Bob, whereas F is the index set of relays that choose to forward the pilot<br />
packet. After that, assuming that the channel gain has not changed yet, Bob derives the<br />
key <strong>and</strong> broadcasts x back such that every relay receives h ib x. However, only the relay R i<br />
that has previously forwarded the packet to Bob will forward a i h ib x to Alice, who derives<br />
the same key from ∑ i∈F a ih ai h ib x [76].<br />
We assume that no enemy is allowed to be too close to Alice or Bob such that its<br />
channel parameters are uncorrelated to theirs. (If there are some correlations, the key<br />
encoding scheme discussed in the next chapter can be applied.) Now, we will show that<br />
the protocol security depends on the forwarding strategies of the relays. Three strategies<br />
are shown in an ascending security order [76].<br />
1. Only one route is taken, i.e., only one relay forwards the packet. This is insecure<br />
because an enemy only needs to be close enough to that relay R i to listen to a i h ai x sent<br />
to Bob <strong>and</strong> a i h ib x sent to Alice. If it knows a i , it can derive a i h ai h ib x as well as the key<br />
with ease.<br />
2. m routes are taken. This is insecure if there are k enemies <strong>and</strong> k ≥ m because each<br />
of m out of k enemies can do the same as the single enemy does in 1. After that, they<br />
meet <strong>and</strong> derive ∑ i∈F a ih ai h ib x. The enemy gang has an additional difficulty, however,