Responsive image
博碩士論文 etd-0016117-151545 詳細資訊
Title page for etd-0016117-151545
論文名稱
Title
可信賴合作式網路設計
Design of reliable cooperative networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
53
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2017-01-16
繳交日期
Date of Submission
2017-01-16
關鍵字
Keywords
非同調失序行為檢測、合作式通訊、通道估測
Noncoherent misbehavior detection, Channel estimation, Cooperative communication
統計
Statistics
本論文已被瀏覽 5657 次,被下載 51
The thesis/dissertation has been browsed 5657 times, has been downloaded 51 times.
中文摘要
合作式通訊在過去十幾年間引起了廣大的興趣,經由與其他使用者的合作傳輸,使得整體系統性能得到空間分集的增益。目前已經有不同的合作式策略利用合作式網路的拓樸或是通道資訊來增加功率或頻譜效益。但這些策略大多數是建立在中繼端是完全合作的基本假設下發展的,然而如果中繼端本身由於自私或其他惡意行為而失常,則合作系統的效能可能因此嚴重降低。但現在關於中繼端行為檢測的相關研究,都是假設終端能獲得來自中繼端完美的通道狀態資訊進而判斷中繼端的行為是否正常,然而如果中繼端本身的行為已經不正常了,那終端經由通道估測獲得來自中繼端來的通道資訊其實是有很大問題的。因此在不需要完美通道資訊的中繼端失序行為檢測成為一個具有挑戰性和關鍵性的研究領域。在本篇論文中,我們先著手於單一中繼端系統,此中繼端傳送二維相移鍵控上任意的星座點訊號來擾亂接收端的傳輸。因此,靠著測量平均的接收功率以及觀察追蹤符元的相位分布,我們提出在不需要瞬時通道資訊的中繼端非同調失序檢測。再來,我們考慮多個中繼端系統,提出藉由觀察估測通道二階統計特性的中繼端非同調失序檢測。為了確保在真實世界中的應用場景,合作式網路必須有能力在不同的調變下檢測任意的失序行為,於是本篇論文最後提出藉由觀察估測通道的相關性來滿足特定系統的需求。
Abstract
Cooperative communication has attracted extensive interest over the past decade due to the ability it gives nodes to exploit additional spatial diversity gain though user cooperation. Various cooperative strategies have been proposed for enhancing the power or spectrum efficiency in networks with different topologies or availabilities of channel information. However, most of these strategies assume that the relays are fully cooperative. Thus, if a relay misbehaves due to selfish or adversarial reasons, the efficiency of the cooperative system may be severely degraded. Existing schemes for detecting misbehaving nodes assume perfect channel state information (CSI) at the destination. However, when the relays misbehave, the channel estimates could be doubted. Consequently, noncoherent misbehavior detection is a crucial research area in the cooperative communication field. This dissertation commences by considering the straightforward case of a single relay system in which the misbehaving relay simply garbles the retransmitted symbols randomly as one of the other quadrature phase-shift keying (QPSK) signal points. Thus, by measuring the average received energy, and observing the distribution of the phase rotations of the tracing symbols, misbehavior of the relay can be determined with no knowledge of the CSI. The dissertation next considers the case of a multi-relay system, and proposes a misbehavior detection scheme based on the secondorder statistics of the channel estimates for the relay-destination links. To ensure their practicality for real-world applications, cooperative networks must have the ability to detect arbitrary misbehavior patterns and different signal constellations. Consequently, the dissertation concludes by deriving a correlation-based detection statistic with which to characterize the detection performance given a specific misbehaving pattern and to customize the detector if needed to meet a specified system requirement.
目次 Table of Contents
Graduation Thesis Approval i
Chinese Abstract ii
Abstract iii
Contents iv
List of Figures vi
1 INTRODUCTION 1
2 NONCOHERENT MISBEHAVIOR DETECTION FOR SINGLE-RELAY
IN COOPERATIVE SYSTEMS 5
2.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Detection of Misbehaving Relay . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1 Detection of Silence at the Relay . . . . . . . . . . . . . . . . . . . 9
2.2.2 Statistical Properties of Received Tracing Symbols . . . . . . . . . 10
2.2.3 Noncoherence Detection of Misbehaving Relay . . . . . . . . . . . 11
2.3 Computer Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3 NONCOHERENT MISBEHAVIOR DETECTION FOR TWO-RELAY
IN SPACE-TIME CODED SYSTEMS 18
3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.2 Statistics of Channel Estimates . . . . . . . . . . . . . . . . . . . . . . . . 21
3.3 Misbehavior Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Computer Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4 A GENERAL NONCOHERENT MISBEHAVIOR DETECTION 30
4.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2 Noncoherent Misbehavior Detection and Asymptotic Analysis . . . . . . . 32
4.2.1 Proposed Tracing-Based Noncoherent Detection of Misbehaving
Relays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.2.2 Asymptotic Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.3 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5 CONCLUSION 41
Bibliography 42
參考文獻 References
[1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity—part I: system description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no.12, Dec. 2004.
[3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Proc. Mag., vol. 24, no. 3, pp. 47–57, May 2007.
[4] Federal Communications Commission, “The mobile broadband spectrum challenge: international comparisons,” FCC White Paper, Wireless Telecommunications Bureau, Office of Engineering and Technology. Washington, DC.: Federal Communications Commission, pp. 1–19, Feb. 2013.
[5] C. Liang and F. R. Yu, “Wireless network virtualization: a survey, some research issues and challenges,” IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 358–380, Mar. 2015.
[6] F. Granelli, A. A. Gebremariam, M. Usman, F. Cugini, V. Stamati, M. Alitska, and P. Chatzimisios, “Software defined and virtualized wireless access in future wireless networks: scenarios and standards,” IEEE Commun. Mag., vol. 53, no. 6, pp. 26–34, Jun. 2015.
[7] K.-C. Lee, S.-H. Wang, C.-P. Li, H.-H. Chang, and H.-J. Li, “Adaptive resource allocation algorithm based on cross-entropy method for OFDMA systems,” IEEE Trans. Broadcast., vol. 60, no. 3, pp. 524–531, Sep. 2014.
[8] G. Araniti, “A low-complexity resource allocation algorithm for multicast service delivery in OFDMA networks,” IEEE Trans. Broadcast., vol. 60, no. 2, pp. 358–369, Jun. 2014.
[9] J. Xu, S.-J. Lee, W.-S. Kang, and J.-S. Seo, “Adaptive resource allocation for MIMOOFDM based wireless multicast systems,” IEEE Trans. Broadcast., vol. 56, no. 1, pp. 98–102, Mar. 2010.
[10] A. Moubayed, A. Shami, and H. Lutfiyya, “Wireless resource virtualization with device-to-device communication underlaying LTE network,” IEEE Trans. Broadcast., vol. 61, no. 4, pp. 734–740, Dec. 2015.
[11] P. Phunchongharn, E. Hossain, and D. I. Kim, “Resource allocation for device-todevice communications underlaying LTE-advanced networks,” IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013.
[12] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Proc. IEEE Veh. Tech. Conf. (VTC Fall), Sep. 2011, pp. 1–5.
[13] W. Gong, X. Wang, M. Li, and Z. Huang, “Round-robin resource sharing algorithm for device-to-device communications underlying SFN System,” in Proc. IEEE Veh. Tech. Conf. (VTC Spring), May 2014, pp. 1–5.
[14] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. Multimedia Security, Sep. 2002, pp. 107–121.
[15] S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol,” in Proc. 3rd ACM Intl. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Jun. 2002, pp. 226–236.
[16] Y. Mao and M. Wu, “Security issues in cooperative communications: tracing adversarial relays,” in Proc. IEEE Intl. Conf. Acoust., Spee. and Sig. Proc. (ICASSP), May 2006, pp. 14–19.
[17] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Trans. Inform. Forensics and Security, vol. 2, no. 2, pp. 198–212, Jun. 2007.
[18] T. A. Khalaf and S. W. Kim; “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” in Proc. IEEE Military Communications Conference (MILCOM), Nov. 2008, pp. 1–4.
[19] H. Liang and C. Wei, “Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks,” ELSEVIER Ad Hoc Networks, vol. 14, pp. 95–105, Mar. 2014.
[20] T. A. Khalaf, S. W. Kim, and A. E. Abdel-Hakim, “Tradeoff between reliability and security in multiple access relay networks under falsified data injection attack,” IEEE Trans. Inform. Forensics and Security, vol. 9, no. 3, pp. 1126–1139, Mar. 2014.
[21] S. Dehnie, H. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay: performance analysis,” in in Proc. IEEE Sarnoff Symposium, Apr. 2007, pp. 1–7.
[22] S. Dehnie, H. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in Proc. Conf. Inform. Science and Systems (CISS), Mar. 2007, pp. 895–899.
[23] Y. Liu, Y. Wu, and J. Tang, “Two tier detection model for misbehavior of lowpower nodes in virtual MIMO based wireless networks,” in Proc. IEEE International Conference on Information Assurance and Security (IAS), Aug. 2010, pp. 155–160.
[24] W. Hou, X. Wang, and A. Refaey, “Misbehavior detection in amplify-and-forward cooperative OFDM systems.” in Proc. IEEE Intl. Conf. Commun. (ICC), Jun. 2013, pp. 5345–5349.
[25] R. Changiz, H. Halabian, F.-R. Yu, I. Lambadaris, H. Tang, and P. C. Mason, “Trust establishment in cooperative wireless networks,” in Proc. IEEE Military
Communications Conference (MILCOM), pp. 1074–1079, Nov. 2010.
[26] Z. Han and Y.-L. Sun, “Securing cooperative transmission in wireless communications,” in Proc. Fourth Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous), Aug. 2007, pp. 1–6.
[27] L. Militano, M. Condoluci, G. Araniti, A. Molinaro, A. Iera, and G.M. Muntean, “Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services,” IEEE Trans. Broadcast., vol. 61, no. 2, pp. 263–278, Jun. 2015.
[28] C. Ma, Y. Li, H. Yu, X. Gan, X. Wang, Y. Ren, and J. Xu, “Cooperative spectrum sharing in D2D-enabled cellular networks,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4394–4408, Aug. 2016.
[29] C. Ye, G. Ozcan, M. C. Gursoy, and S. Velipasalar, “Multimedia transmission over cognitive radio channels under sensing uncertainty,” IEEE Trans. Signal Processing, vol. 64, no. 3, pp. 726–741, Feb. 2016.
[30] Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 4945–4950, Oct. 2009.
[31] M. Chraiti, H. Hakim, W. Ajib, and H. Boujemaa, “Spectrum sharing techniques for broadcast cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5880–5888, Nov. 2013.
[32] L. Liang, F. Khanb, M. Pesaventoa, T. Ratnarajahc, and S. Prakriyad, “Sequential search based power allocation and beamforming design in overlay cognitive radio networks,” ELSEVIER Signal Processing, vol. 97, pp. 221–231, Apr. 2014.
[33] L. Li, and et.al., “Energy-efficient transmission for protection of incumbent users,” IEEE Trans. Broadcast., vol. 57, no. 3, pp. 718–720, Sep. 2011.
[34] J. Park and S. Lee, “MIMO beamforming for QoS enhancement via analog, digital and hybrid relaying,” IEEE Trans. Broadcast., vol. 56, no. 4, pp. 493–503, Dec. 2010.
[35] R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, and H. Tang, “Trust establishment in cooperative wireless relaying networks,” Wireless Commun. Mobile Comput., vol. 14, no. 15, pp. 1450–1470, Oct. 2014.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code