Responsive image
博碩士論文 etd-0525118-113804 詳細資訊
Title page for etd-0525118-113804
論文名稱
Title
存在攻擊者之分散式偵測系統的物理層安全設計方法
Physical-Layer Security Design for Distributed Detection with Attackers
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
37
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2018-06-08
繳交日期
Date of Submission
2018-06-25
關鍵字
Keywords
無線感測網路、物理層安全、竊聽者、攻擊者、分散式偵測
wireless sensor networks, physical-layer security, eavedroppers, attackers, distributed detection
統計
Statistics
本論文已被瀏覽 5660 次,被下載 0
The thesis/dissertation has been browsed 5660 times, has been downloaded 0 times.
中文摘要
近期, 由於智慧家庭系統的崛起以及邊境戰事的需求, 加上感測器的低成本以及便利性, 無線感測
網路已經是不可或缺的系統, 但因為感測器暴露在開放的空間中, 大幅增加了被攻擊或故障的可能性,
由於感測器遍布在不同地區不可能立即逐一檢查並修復, 因此融合中心必須具備在感測器遭受攻擊時
仍可正確判斷資訊的能力。
本論文考慮存在攻擊者的無線感測網路系統, 為了降低系統錯誤率, 我們提出一種新的方法, 首先
利用似然比檢測分析各感測器的傳送訊號, 同時加總其他感測器的傳送值並判斷其欲傳送訊號, 接著
比較兩者傳送訊號是否相符, 如果相吻合, 則判定其感測器為合法感測器; 反之, 則為攻擊者, 最後, 融
合中心只考慮合法感測器的傳送訊號並利用多數決的方式作出最終決策。
Abstract
Recently, due to the rise of smart home systems, the need for border battles and also with
the low cost and convenience of sensors, the wireless sensing network becomes an indispensable
system. However, since the sensor is exposed in the open space, the possibility of being attacked
or malfunctioning is greatly increased. Furthermore, because sensors are less likely to be checked
and repaired individually across different regions, the fusion center must have the ability to
correctly judge information when the sensor has already been attacked.
This thesis basically considers an under-attack wireless sensor network system. To reduce
the system error rate, a new method is proposed. First, the likelihood ratio test is used to
analyze the transmission signals of each sensor. Meanwhile, the transmission signals of other
sensors are summed up and fusion center judges which signals were transmitted. The two
transmission signals are then compared to check whether if they are matched. If both signals
are identical, then determine the sensor as a legitimate sensor; otherwise, determine the sensor
as an attacker. Finally, the fusion center only considers the transmission signal of the legitimate
sensor and uses the majority decision to make the final decision.
目次 Table of Contents
目錄
摘要 i
Abstract ii

1 序論 1
1.1 介紹. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 文獻回顧. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
1.3 研究動機. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
1.4 研究方法及貢獻. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.5 論文架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

2 系統模型 7
2.1 存在攻擊者的無線感測網路系統模型. . . . . . . . . . . . . . . . . 7
2.2 感測器節點. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

3 融合中心系統分析 11
3.1 決策方法. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
3.2 真偽感測器之判定. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3 閥值分析. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1 最終閥值(Λ) 分析. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
3.3.2 感測器閥值(δ) 分析. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

4 模擬分析 16
4.1 模擬一. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
4.2 模擬二. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

5 結論 26
參考文獻 27
參考文獻 References
[1] M. P. Duriˇsi´c, Z. Tafa, G. Dimi´c, V. Milutinovi´c, “A survey of military applications of
wireless sensor networks,” Embedded Computing (MECO), 2012 Mediterranean Conference,
vol., no., pp.196-199, June 2012
[2] M. F. Othman, K. Shazali, “Wireless sensor network applications: A study in environment
monitoring system,” Procedia Engineering, pp.1204-1210, 2012
[3] N. Sghaier, A. Mellouk, B. Augustin, Y. Amirat, J. Marty, M. E. A. Khoussa, A. Abid,
R. Zitouni, “Wireless sensor networks for medical care services,” Proc. 7th International
Wireless Communications and Mobile Computing Conference (IWCMC), July 2011
[4] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Network Survey,” Computer Networks,
vol. 52, no. 12, pp. 2292 - 2330, 2008.
[5] H.N. Dai, Q. Wang, D. Li, and R.C.W. Wong, “On Eavesdropping Attacks in Wireless
Sensor Networks with Directional Antennas,” International Journal of Distributed Sensor
Networks, vol. 2013, 2013.
[6] T. Karygiannis and L. Owens, “Wireless network security,” NIST special publication, 2002
[7] A. Vempaty, L. Tong, and P. K. Varshney, “Distributed inference with Byzantine data,”
IEEE Signal Process. Mag., vol. 30, no.5, pp. 65-75, Sep. 2013.
[8] B. Kailkhura, S. Brahma and P. K. Varshney, “Data Falsification Attacks on Consensus-
Based Detection Systems,” IEEE Transactions on Signal and Information Processing over
Networks, vol. 3, no. 1, pp. 145-158, Mar. 2017.
[9] V. S. S. Nadendla, Y. S. Han, and P. K. Varshney, “Distributed Inference With M-Ary
Quantized Data in the Presence of Byzantine Attacks,” IEEE Transactions on Signal
Processing, vol. 62, no. 10, pp. 2681-2695, May 2014.
[10] I. Csiszar and J. Korner, Information Theory: Coding Theorems for Discrete Memoryless
Systems. Cambridge University Press, 2011.
[11] Z. Quan, S. Cui, and A. H. Sayed, “Optimal linear cooperation for spectrum sensing in
cognitive radio networks,” IEEE J. Sel. Topics Signal Process, vol. 2, no. 1, pp. 28-40, Feb.
2008.
[12] S. Barbarossa, S. Sardellitti, and P. Di Lorenzo, “Distributed Detection and Estimation in
Wireless Sensor Networks,” In Rama Chellappa and Sergios Theodoridis eds., Academic
Press Library in Signal Processing, Vol. 2, Communications and Radar Signal Processing,
pp. 329-408, 2014.
[13] E. Nurellari, D. McLernon and M. Ghogho, “Distributed Two-Step Quantized Fusion
Rules Via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks,”
IEEE Transactions on Signal and Information Processing over Networks, vol. 2, no. 3, pp.
321-335, Sept. 2016.
[14] E. Nurellari, S. Aldalahmeh, M. Ghogho and D. McLernon, “Quantized Fusion Rules for
Energy-Based Distributed Detection in Wireless Sensor Networks,” Proc. SSPD, Edinburgh,
Scotland, 8-9 Sept. 2014.
[15] H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, “Secure type-based multiple access,” IEEE
Trans. Inf. Forensics Security, vol. 6, no. 3, pp.763-774, Sep. 2011.
[16] L. Zhang, Q. Wu, G. Ding, S. Feng, and J. Wang, “Performance analysis of probabilistic
soft SSDF attack in cooperative spectrum sensing,” EURASIP J. Adv. Signal Process.,
vol. 2014, no. 1, pp. 81, May 2014.
[17] P. Kaligineedi, M. Khabbazian, and V. K. Bhargava, “Secure cooperative sensing techniques
for cognitive radio systems,” Proc. ICC, pp. 3406- 3410, Beijing, China, 19-23 May
2008.
[18] A. Vempaty, L. Tong, and P. Varshney, “Distributed Inference with Byzantine Data: State-of-
the-Art Review on Data Falsification Attacks,” Signal Processing Magazine, IEEE, vol.
30, no. 5, pp. 65-75, 2013.
[19] R. Chen, J. Park, K. Bian, “Robust distributed spectrum sensing in cognitive radio networks,”
Proc. INFOCOM, pp. 1876-1884, Apr. 2008.
[20] A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, “Collaborative spectrum sensing
in the presence of Byzantine attacks in cognitive radio networks,” IEEE Trans. Signal
Process., vol. 59, no. 2, pp. 774-786, Jan. 2011.
[21] H. Chen , X. Jin, and L. Xie, “Reputation-based Collaborative Spectrum Sensing Algorithm
in Cognitive Radio Networks,” proc. PIRMC, pp. 582-587, Tokyo, Japan, 13-16 Sep.
2009.
[22] E. Nurellari, D. McLernon and M. Ghogho, “A secure optimum distributed detection
scheme in under-attack wireless sensor networks,” IEEE Trans. on Signal and Information
Processing over Networks, vol. PP, no. 99, pp. 1-12, 2017.
[23] H. Urkowitz, “Energy detection of unknown deterministic signals,” Proc. IEEE, vol. 55,
pp. 523-531, Apr. 1967.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code