論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available
論文名稱 Title |
具中繼點之感測網路分散式偵測的物理層安全設計 Physical-Layer Security Design for Distribution Detection In Sensor Networks with Relays |
||
系所名稱 Department |
|||
畢業學年期 Year, semester |
語文別 Language |
||
學位類別 Degree |
頁數 Number of pages |
37 |
|
研究生 Author |
|||
指導教授 Advisor |
|||
召集委員 Convenor |
|||
口試委員 Advisory Committee |
|||
口試日期 Date of Exam |
2017-06-13 |
繳交日期 Date of Submission |
2017-07-03 |
關鍵字 Keywords |
最佳化、無線感測網路、分散式偵測、保密、竊聽者 optimization, Wireless sensor networks, distributed detection, secrecy, Eavesdroppers |
||
統計 Statistics |
本論文已被瀏覽 5661 次,被下載 0 次 The thesis/dissertation has been browsed 5661 times, has been downloaded 0 times. |
中文摘要 |
近年來,感測網路引起了不少的關注,因為感測器的便利性,且體積和成本小,故被廣泛地運用。 由於無線感測網路大部分在開放空間傳輸資料,導致感測網路的安全保密極具重要。本篇論文主要考 慮一個使用中繼點的感測網路且存在竊聽者的系統,為了防止被竊聽者從感測節點與中繼節點的輸出 訊號進行竊聽,我們在感測器與中繼點的傳輸皆進行加密。特別是,我們使用位元翻轉機制來加密。 在我們考慮的系統中,竊聽者可以從兩節點端所竊聽到的訊息做融合。本篇論文考慮的最佳化問題即 是選擇最佳的位元翻轉加密方式,使得合法的融合中心可以有最小的錯誤檢測機率,並使得竊聽者的 錯誤檢測機率高過某一個設定的需求。 |
Abstract |
Wireless sensor networks have received a lot of attention in recent years. They are widely used because of the convenience, small volume and low cost of sensor nodes. Since most of the wireless sensor networks transmit data in open area, it results in critical concern of privacy and security when applying sensor networks. In order to prevent the existence of any eavesdropper from obtaining the output signal of either the sensor nodes or the relay nodes, the data transmission from both the sensor nodes and the relay nodes are encrypted in our system. Specifically, we employ the bit-flipping mechanism to encrypt the data transmission. Notably, in the thesis, we consider the eavesdroppers can combine the information eaves- dropped from both the sensor nodes and relay nodes. As a result, the optimization problem considered in this thesis is to choose the best bit-flip encryption method, such that the legitimate fusion center can achieve the smallest probability of detection error while the eavesdropper’s error detection probability is higher than a required value. |
目次 Table of Contents |
摘要 i Abstract ii 1 : 序論 1 1.1 : 介紹 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 : 文獻回顧 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . 2 1.3 : 研究動機 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 : 研究方法 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.5 : 論文架構 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 : 系統模型 5 2.1 : 系統模型 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . 5 2.2 : 加密機制 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3 : 系統效能分析 8 3.1 : 融合中心與竊聽者的效能分析 . . . . . . . . . . . . . . . . .. . . . . . 8 3.1.1 : 融合中心效能 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1.2 : 竊聽者效能分析 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 : 最佳化問題 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4 : 模擬結果和分析 18 4.1 : 融合中心的檢測錯誤比較 . . . . . . . . . . . . . . . . . . . . . . .. . . 19 4.2 : 竊聽者的檢測錯誤比較 . . . . . . . . . . . . . . . . . . . . . . .. . . . . 21 5 : 結論 25 參考文獻 26 |
參考文獻 References |
[1] C. Shen, C. Srisathapornphat, and C. Jaikaeo,”Sensor Information Networking Architec- ture and Applications,”IEEE Pers. Commun., Aug. 2001, pp. 52-59. [2] E. Shi and A. Perrig, ”Designing Secure Sensor Networks,”Wireless Commun. Mag., vol. 11, no. 6, Dec. 2004 pp. 38-43. [3] G. Hoblos, M. Staroswiecki, and A. Aitouche, ”Optimal Design of Fault Tolerant Sensor Networks,” IEEE Int’ l. Conf. Cont. Apps., Anchorage, AK, Sept. 2000, pp. 467-72. [4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cyirci, ”A Survey on Sensor Networks”, IEEE Communications Magazine, vol. 40, no. 8, Aug. 2002, pp.102-114. [5] Z. Li, T. J. Oechtering and K. Kittichokechai, ”Parallel distributed Bayesian detection with privacy constraints,” 2014 IEEE International Conference on Communications (ICC), pp.2178-2183, June 2014. [6] Z. Li, T. J. Oechtering and J. Jalden, ”Parallel distributed Neyman-Pearson detection with privacy constraints,” 2014 IEEE International Conference on Communications Workshops (ICC), pp. 765-770, June 2014. [7] Y. Wang, G. Attebury, and B. Ramamurthy, ”A survey of security issues in wireless sensor networks,” IEEE Commun. Surveys Tutorials,vol. 8, no. 2, pp. 2-23, 2006, 2nd Quarter. [8] H. Fouchal, J. Biesa, E. Romero, A.Araujo, and O. Nieto, ”A Security Scheme for Wireless Sensor Networks,”2016 IEEE Global Communications Conference(GLOBECOM), pp.1- 5,Dec. 2016. [9] L. Hu and D. Evans, ”Secure Aggregation for Wireless Networks,”Wksp. Security and Assurance in Ad Hoc Networks,2003. [10] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, ”Security in wireless sensor net- works,” Wireless Commun. Mobile Comput., vol. 8,no. 1, pp. 1-24, Jan. 2008. [11] B. Przydatek, D. Song, and A. Perrig, ”SIA: Secure Information Aggregation in Sensor Networks,” Proc. 1st Int’ l.Conf. Embedded Networked Sensor Systems, SenSys’ 03, New York: ACM Press, 2003, pp. 255-265. [12] Q. Zhang, P. Varshney, and R. Wesel, ”Optimal bi-level quantization of i.i.d. sensor ob- servations for binary hypothesis testing,” IEEE Trans. Inform. Theory, vol. 48, no. 7, pp. 2105-2111, Jul. 2002. [13] P. Varshney, Distributed Detection and Data Fusion. New York:Springer, 1997. [14] C.-C. Lee and J.-J. Chao, ”Optimum local decision space partitioning for distributed detection,” IEEE Trans. Aerospace Electronic Syst., vol. 25, no. 4, pp. 536-544, Jul. 1989. [15] V. S. S. Nadendla and P. K. Varshney, ”Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints,” IEEE Transactions on Signal Processing, vol. 64, no. 10, pp. 2636-2648, May 2016. [16] J. Guo, X. Li, U. Rogers, and H. Chen, ” Asymptotic perfect secrecy in distributed de- tection against a global eavesdropper,”2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3501-3505, March 2016. [17] R. Soosahabi and M. Naraghi-Pour, ”Scalable PHY-layer security for distributed detection in wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118- 1126, Aug. 2012. [18] S. Marano, V. Matta, and P.K. Willett, ”Distributed detection with censoring sensors under physical layer secrecy,” Signal Processing, IEEE Transactions on, vol. 57, no. 5, pp. 1976-1986, May 2009. [19] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013. |
電子全文 Fulltext |
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。 論文使用權限 Thesis access permission:自定論文開放時間 user define 開放時間 Available: 校內 Campus:永不公開 not available 校外 Off-campus:永不公開 not available 您的 IP(校外) 位址是 3.139.238.76 論文開放下載的時間是 校外不公開 Your IP address is 3.139.238.76 This thesis will be available to you on Indicate off-campus access is not available. |
紙本論文 Printed copies |
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。 開放時間 available 永不公開 not available |
QR Code |