Responsive image
博碩士論文 etd-0111112-223850 詳細資訊
Title page for etd-0111112-223850
論文名稱
Title
合作式通訊之異常中繼點檢測使用已知及未知機率分布模型
Misbehaving relay detection for cooperative communications using a known or unknown distribution functions
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
44
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2011-12-21
繳交日期
Date of Submission
2012-01-11
關鍵字
Keywords
位元錯誤率、中繼點、異常、檢測、最大比例合成
relay, misbehaving, detection, maximal ratio combing(MRC), bit error rate(BER)
統計
Statistics
本論文已被瀏覽 5682 次,被下載 1567
The thesis/dissertation has been browsed 5682 times, has been downloaded 1567 times.
中文摘要
在合作式通訊系統當中接收端會將訊號通過中繼點(relay) 將資料傳送出去以達到空間多樣性增益(spatial diversity gains)。在中繼點傳送資料的方式以解碼後傳送(decode-and-forward, DF) 和放大後傳送(amplify-and-forward, AF) 為主要的傳送方式。然而中繼點並不會總是可以信賴的, 當他們發生異常(misbehaving) 時將會破壞空間多樣性增益造成系統效能低落。本文希望在已知或未知異常行為的機率分佈模型之放大後傳送合作式系統下, 找到一個有效的方法進行檢測並在接收端伴隨最大比例合成(maximal ratio combing, MRC) 以達到系統之最佳效能。此外我們會以位元錯誤率分析(bit error rate, BER) 去做效能分析, 證實我們所提出的方法能對系統發生異常行為進行保護。
Abstract
In the cooperative communications, the users relay each other’s signal and thus forming multiple transmission paths to the destination and therefore the system can achieve spatial diversity gain. Decode-and-forward and amplify-and-forward are the most popular relaying strategies in the literature due to their simplicity. However, in practice, cooperative users acting as relays may not always normally operated or trustworthy. When the relay misbehavior is present in
the cooperative networks, the communication performance may degrade dramatically and the users may be even better off without cooperation. Therefore, it is necessary for the destination to determine the misbehaving relays and to take appropriate actions to ensure that cooperative advantages are preserved. In this thesis, we focus on developing a misbehaving relay detection method to detect whether or not the system is in the presence of some misbehaving relays. After performing misbehaving relay detection, the destination removes the signals from the un-
reliable paths and then uses maximal ratio combing to achieve spatial diversity. The simulation results conducted by the thesis show that the proposed method is more robust as compared with those without employing misbehaving relay detection when the system is in the presence of some misbehaving relays.
目次 Table of Contents
1.序論 1
2.系統模型 4
2.1 放大式傳輸合作式系統模型 4
2.2 異常行為系統模型 5
3.中繼點異常行為偵測:已知機率模型 7
3.1 中央極限定理 7
3.2 貝氏檢測法則 7
3.3 能量檢測法 9
4.中繼點異常行為偵測:未知機率模型 12
4.1 Kolmogorov-Smirnov Test 12
4.2 One-Sample Kolmogorov-Smirnov Test 13
4.3 異常中繼點行為使用Kolmogorov-Smirnov Test 檢測 15
5.結果和分析 18
5.1 已知異常中繼點機率模型模擬 18
5.2 未知異常中繼點機率模型模擬 23
6.結論 28
7.附錄 31
7.1 附錄A 31
7.2 附錄B 35
參考文獻 References
[1] H. L. V. Trees, Detection Estimation and Modulation Theory Part I. Hoboken: NJ Wiley, 2001, vol. 1.
[2] A. Nosratinia, T. Hunter, and A. Hedayat, “Cooperative communication in wireless net-
works,” IEEE Commun. Mag., vol. 42, pp. 74–80, Oct 2004.
[3] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless
networks: Efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50,
no. 12, pp. 3062–3080, Dec 2004.
[4] A. Bletsas, H. Shin, and M. Z. Win, “Cooperative communications with outage-optimal
opportunistic relaying,” IEEE Trans. on Wireless Commun, vol. 6, no. 9, pp. 3450–3460,
Sep 2007.
[5] Y. W. Hong, W. J. Huang, F. H. Chiu, and C. C. J. Kuo, “Cooperative communications
in resource-constrained wireless networks,” IEEE Signal Processing Mag, vol. 24, no. 3,
pp. 47–57, May. 2007.
[6] T. M. Cover and A. Gamal, “Capacity theorems for the relay channel,” IEEE Transactions
on Information Theory, vol. 25, no. 5, pp. 572–584, Sep. 1979.
[7] M. Janani, A. Hedayat, T. Hunter, and A. Nosratinia, “Coded cooperation in wireless
communications: Space-time transmission and iterative decoding,” IEEE Trans. Signal
Processing, vol. 52, no. 2, pp. 362–372, Feb. 2004.
[8] G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity theorems for
relay networks,” IEEE Trans. Inform. Theory, vol. 51, no. 9, pp. 3037–3063, Sep. 2005.
[9] S. Dehnie, H. T. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay: Performance analysis,” in Proc. IEEE Sarnoff Symposium, May 2007.
[10] Y. W. P. Hong, W. J. Huang, and C. C. J. Kuo, Cooperative Communications and Net-
working - Technologies and System Design, Sep. 2010.
[11] S. Dehnie, H. T. Sencar, and N. Memon, “Detecting malicious behavior in cooperative
diversity,” in Proc. Conference on Information Sciences and Systems, Mar 2007.
[12] H. Z. Zhou, L., “Securing ad hoc networks,” IEEE Network, pp. 24–30, 1999.
[13] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,”
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 2,
no. 2, June 2007.
[14] Y. Liu, C. Zeng, H. Wang, and G. Wei, “Cooperative strategies and capacity theorems for
relay networks,” Advanced Computer Control (ICACC), 2010 2nd International Confer-
ence on, pp. 566–570, March. 2010.
[15] D. Panchenko, “Statistics for applications,” MIT OPENCOURSE, Sep. 2006.
[16] S. Dehnie and N. Memon, “Cooperative diversity with selfish users,” Information Sciences
and Systems, 2008. CISS 2008. 42nd Annual Conference on, pp. 1184 – 1188, March. 2008.
[17] W. CONVER, Partical Nonparametic Statistics. WILEY, 1999.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code