Responsive image
博碩士論文 etd-0525118-115509 詳細資訊
Title page for etd-0525118-115509
論文名稱
Title
存在竊聽者感測網路之分散式偵測使用通道選擇
Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
32
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2018-06-08
繳交日期
Date of Submission
2018-06-25
關鍵字
Keywords
分散式偵測、竊聽者、無線感測網路、通道選擇、物理層安全
Wireless Sensor Networks, Eavesdropper, Distributed Detection, Physical-Layer Security, Channel Selection
統計
Statistics
本論文已被瀏覽 5641 次,被下載 0
The thesis/dissertation has been browsed 5641 times, has been downloaded 0 times.
中文摘要
近年來, 感測網路因很多個低成本、低功率和微型的感測器的組成而被廣泛地應用。無線感測網路
中的感測器需要處理重要且複雜的資訊, 經由無線通訊傳送給合法使用者, 因感測器大部分是在開放
空間傳輸訊息, 在傳送的過程中容易被竊聽者竊聽,由於現實中每個通道環境的狀況不同,因此融合中
心須具備有通道狀況選擇的能力來確保接收正確的資訊。
本篇論文主要考慮感測器至接收端的通道為雷利衰減通道,當感測器傳送訊息時, 融合中心會優先
選擇通道增益較佳的來接收, 並且利用似然比測試分析其接收的資訊使其錯誤率最小, 並使竊聽者的
錯誤率不低於某一設定需求。
Abstract
In recent years, wireless sensor networks are widely used because they comprised a large
number of low-cost, low-power and miniature sensors. In wireless sensor networks, the sensors
need to deal with the important and complex information, moreover, they transmit across a
wireless communication network to legitimate users. Since most of the sensors transmit message
in open area, the eavesdroppers are easy to tap in the transfer process. Owing to each channel
environment is different in reality, the fusion center must have the ability of channel selection
to ensure that correct information is received.
In this thesis, the channels considered from sensors to receiver are Rayleigh Fading Channel.
When sensors transmit message, the FC will prioritize in choosing the better channel gain to
receive signals. Likelihood Ratio Test is then used to analyze the received data in FC and
achieve the smallest FC’s error probability while maintaining the eavesdropper’s error probability
not lower than a required value.
目次 Table of Contents
論文審定書 i
摘要 ii
Abstract iii
1 序論 1
1.1 介紹. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.2 文獻回顧. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 研究動機與方法. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
1.4 論文架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 系統模型與閥值判斷準則 4
2.1 系統模型. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 融合中心判斷準則. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 竊聽者判斷準則. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3 模擬結果和分析 11
3.1 模擬方法設計. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 模擬結果. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
4 結論 22
參考文獻 23
參考文獻 References
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks,
vol. 52, no. 12, pp. 2292-2330, 2008.
[2] H.-N. Dai, Q. Wang, D. Li, and R. C.-W. Wong, “On eavesdropping attacks in wireless
sensor networks with directional antennas,” International Journal of Distributed Sensor
Networks, vol. 2013, 2013.
[3] I. Csisz´ar and J. K¨orner, Information Theory: Coding Theorems for Discrete Memoryless
Systems. Cambridge University Press, 2011.
[4] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor
networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second
Quarter 2006.
[5] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications
for IOT under eavesdropper collusion,” IEEE Transactions on Automation Science and
Engineering, vol. 13, no. 3, pp, 1281-1293, July 2016.
[6] M. Baldi, M. Bianchi, N. Maturo, and F. Chiaraluce, “A Physical Layer Secured Key
Distribution Technique for IEEE 802.11g Wireless Networks,” IEEE Wireless Communications
Letters, vol. 2, no. 2, pp. 183-186, April 2013.
[7] S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, Y. Shah, W. Trappe, and N.
Mandayam, “Exploiting The Physical Layer for Enhanced Security [Security and Privacy
in Emerging Wireless Networks],” IEEE Wireless Communications, vol. 17, no. 5, pp.
63-70, October 2010.
[8] H. Taha and E. Alsusa, “A MIMO Precoding Based Physical Layer Security Technique
for Key Exchange Encryption,” 2015 IEEE 81st Vehicular Technology Conference (VTC
Spring), pp. 1-5, May 2015.
[9] H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, “Secure type-based multiple access,” IEEE
Transactions on Information Forensics and Security, vol. 6, no. 3, pp.763-774, September
2011.
[10] T. C. Aysal and K. E. Barner, “Sensor data cryptography in wireless sensor networks,”
IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 273-289, June
2008.
[11] V. Nadendla, “Secure Distributed Detection inWireless Sensor Networks via Encryption of
Sensor Decision,” M.S. thesis, Louisiana State University and Agricultural and Mechanical
College, Baton Rouge, LA, USA, 2009.
[12] S. Marano, V. Matta, and P. K. Willett, “Distributed detection with censoring sensors
under physical layer secrecy,” IEEE Transactions on Signal Processing, vol. 57, no. 5, pp.
1976-1986, May 2009.
[13] B. Kailkhura, V. S. Siddhardh Nadendla, and P. K. Varshney, “Distributed Inference in
The Presence of Eavesdroppers: A Survey,” IEEE Communications Magazine, vol. 53, no.
6, pp. 40-46, June 2015.
[14] V. Nadendla, H. Chen, and P. K. Varshney, “Secure Distributed Detection in The Presence
of Eavesdroppers,” in Signals, Systems and Computers (ASILOMAR), 2010 Conference
Record of the Forty Fourth Asilomar Conference on, pp. 1437-1441, November 2010.
[15] J. Guo, X. Li, U. Roger, H. Chen, “Secrecy Design in Distributed Detection for Large
Sensor Networks,” 2016 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), March 20-25, 2016.
[16] Po-Ning Chen, Hong-BinWu, The Maximum-Likelihood Soft-Decision Sequential Decoding
Algorithms for Convolutional Codes, For the Degree of Master of Science, National Chiao
Tung University, Hsinchu, Taiwan 300, R.O.C., June 1999.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code