11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />

86<br />

Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />

h aE1<br />

E 1<br />

R 1<br />

h E1b<br />

Alice<br />

h a1<br />

h 12<br />

1 2<br />

h a2<br />

h 2b<br />

Bob<br />

h 1b<br />

h E2b<br />

R 2<br />

h aE2<br />

E 2<br />

Figure 6.8: A two-relay fork-rake network with two enemies<br />

since interference among relays may make it necessary for the gang to solve a set of linear<br />

equations.<br />

3. l routes 0 ≤ l ≤ n are taken at r<strong>and</strong>om at each time slot. To do so, each relay<br />

chooses to forward the packet with a probability p. This is more secure than 2, especially<br />

if the total number of relays n ≫ k, since those k enemies do not know exactly where to<br />

listen, although there can possibly be some flukes, which can be managed by key encoding<br />

discussed in the next chapter.<br />

6.5.1 Protocol Evaluation in a Scenario of a Two-Relay Fork-<br />

Rake <strong>Network</strong> with Two Enemies<br />

As a practical example, consider a two-relay fork-rake network shown in Fig. 6.8 with two<br />

enemy cryptanalysts <strong>and</strong> the following assumptions:<br />

1. The two relays are located far enough from each other so that h a1 is uncorrelated<br />

to h a2 <strong>and</strong> h 1b is uncorrelated to h 2b .<br />

2. The two relays are close enough to each other so that each of them can hear the<br />

signal transmitted from the other.<br />

3. Enemies E 1 <strong>and</strong> E 2 are located far enough from R 1 <strong>and</strong> R 2 , respectively, such that<br />

h a1 , h a2 , h 1b , <strong>and</strong> h 2b are uncorrelated to h aE1 , h aE2 , h E1b , <strong>and</strong> h E2b , respectively.<br />

4. Alice transmits x in the first time slot to R 1 <strong>and</strong> R 2 . If R 1 or R 2 will forward the<br />

packet further to Bob, depending on its strategy, it will do so in the second time slot. Bob<br />

transmits x back in the third time slot. Finally, those relays who forwarded the packet

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!