Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 6: <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key Generation (WPSG) in Relay <strong>Network</strong>s:<br />
86<br />
Information Theoretic Limits, Key Extension, <strong>and</strong> Security Protocol<br />
h aE1<br />
E 1<br />
R 1<br />
h E1b<br />
Alice<br />
h a1<br />
h 12<br />
1 2<br />
h a2<br />
h 2b<br />
Bob<br />
h 1b<br />
h E2b<br />
R 2<br />
h aE2<br />
E 2<br />
Figure 6.8: A two-relay fork-rake network with two enemies<br />
since interference among relays may make it necessary for the gang to solve a set of linear<br />
equations.<br />
3. l routes 0 ≤ l ≤ n are taken at r<strong>and</strong>om at each time slot. To do so, each relay<br />
chooses to forward the packet with a probability p. This is more secure than 2, especially<br />
if the total number of relays n ≫ k, since those k enemies do not know exactly where to<br />
listen, although there can possibly be some flukes, which can be managed by key encoding<br />
discussed in the next chapter.<br />
6.5.1 Protocol Evaluation in a Scenario of a Two-Relay Fork-<br />
Rake <strong>Network</strong> with Two Enemies<br />
As a practical example, consider a two-relay fork-rake network shown in Fig. 6.8 with two<br />
enemy cryptanalysts <strong>and</strong> the following assumptions:<br />
1. The two relays are located far enough from each other so that h a1 is uncorrelated<br />
to h a2 <strong>and</strong> h 1b is uncorrelated to h 2b .<br />
2. The two relays are close enough to each other so that each of them can hear the<br />
signal transmitted from the other.<br />
3. Enemies E 1 <strong>and</strong> E 2 are located far enough from R 1 <strong>and</strong> R 2 , respectively, such that<br />
h a1 , h a2 , h 1b , <strong>and</strong> h 2b are uncorrelated to h aE1 , h aE2 , h E1b , <strong>and</strong> h E2b , respectively.<br />
4. Alice transmits x in the first time slot to R 1 <strong>and</strong> R 2 . If R 1 or R 2 will forward the<br />
packet further to Bob, depending on its strategy, it will do so in the second time slot. Bob<br />
transmits x back in the third time slot. Finally, those relays who forwarded the packet