Responsive image
博碩士論文 etd-0526117-092109 詳細資訊
Title page for etd-0526117-092109
論文名稱
Title
具中繼點之感測網路分散式偵測的物理層安全設計
Physical-Layer Security Design for Distribution Detection In Sensor Networks with Relays
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
37
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2017-06-13
繳交日期
Date of Submission
2017-07-03
關鍵字
Keywords
最佳化、無線感測網路、分散式偵測、保密、竊聽者
optimization, Wireless sensor networks, distributed detection, secrecy, Eavesdroppers
統計
Statistics
本論文已被瀏覽 5661 次,被下載 0
The thesis/dissertation has been browsed 5661 times, has been downloaded 0 times.
中文摘要
近年來,感測網路引起了不少的關注,因為感測器的便利性,且體積和成本小,故被廣泛地運用。
由於無線感測網路大部分在開放空間傳輸資料,導致感測網路的安全保密極具重要。本篇論文主要考
慮一個使用中繼點的感測網路且存在竊聽者的系統,為了防止被竊聽者從感測節點與中繼節點的輸出
訊號進行竊聽,我們在感測器與中繼點的傳輸皆進行加密。特別是,我們使用位元翻轉機制來加密。
在我們考慮的系統中,竊聽者可以從兩節點端所竊聽到的訊息做融合。本篇論文考慮的最佳化問題即
是選擇最佳的位元翻轉加密方式,使得合法的融合中心可以有最小的錯誤檢測機率,並使得竊聽者的
錯誤檢測機率高過某一個設定的需求。
Abstract
Wireless sensor networks have received a lot of attention in recent years. They are widely
used because of the convenience, small volume and low cost of sensor nodes. Since most
of the wireless sensor networks transmit data in open area, it results in critical concern of
privacy and security when applying sensor networks. In order to prevent the existence of any
eavesdropper from obtaining the output signal of either the sensor nodes or the relay nodes,
the data transmission from both the sensor nodes and the relay nodes are encrypted in our
system. Specifically, we employ the bit-flipping mechanism to encrypt the data transmission.
Notably, in the thesis, we consider the eavesdroppers can combine the information eaves-
dropped from both the sensor nodes and relay nodes. As a result, the optimization problem
considered in this thesis is to choose the best bit-flip encryption method, such that the legitimate
fusion center can achieve the smallest probability of detection error while the eavesdropper’s
error detection probability is higher than a required value.
目次 Table of Contents
摘要 i

Abstract ii

1 : 序論 1

1.1 : 介紹 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 : 文獻回顧 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . 2

1.3 : 研究動機 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.4 : 研究方法 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.5 : 論文架構 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 : 系統模型 5

2.1 : 系統模型 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . 5

2.2 : 加密機制 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

3 : 系統效能分析 8

3.1 : 融合中心與竊聽者的效能分析 . . . . . . . . . . . . . . . . .. . . . . . 8

3.1.1 : 融合中心效能 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

3.1.2 : 竊聽者效能分析 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

3.2 : 最佳化問題 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

4 : 模擬結果和分析 18

4.1 : 融合中心的檢測錯誤比較 . . . . . . . . . . . . . . . . . . . . . . .. . . 19

4.2 : 竊聽者的檢測錯誤比較 . . . . . . . . . . . . . . . . . . . . . . .. . . . . 21

5 : 結論 25

參考文獻 26
參考文獻 References
[1] C. Shen, C. Srisathapornphat, and C. Jaikaeo,”Sensor Information Networking Architec-
ture and Applications,”IEEE Pers. Commun., Aug. 2001, pp. 52-59.

[2] E. Shi and A. Perrig, ”Designing Secure Sensor Networks,”Wireless Commun. Mag., vol.

11, no. 6, Dec. 2004 pp. 38-43.

[3] G. Hoblos, M. Staroswiecki, and A. Aitouche, ”Optimal Design of Fault Tolerant Sensor

Networks,” IEEE Int’ l. Conf. Cont. Apps., Anchorage, AK, Sept. 2000, pp. 467-72.

[4] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cyirci, ”A Survey on Sensor

Networks”, IEEE Communications Magazine, vol. 40, no. 8, Aug. 2002, pp.102-114.

[5] Z. Li, T. J. Oechtering and K. Kittichokechai, ”Parallel distributed Bayesian detection with

privacy constraints,” 2014 IEEE International Conference on Communications (ICC),

pp.2178-2183, June 2014.

[6] Z. Li, T. J. Oechtering and J. Jalden, ”Parallel distributed Neyman-Pearson detection with

privacy constraints,” 2014 IEEE International Conference on Communications Workshops

(ICC), pp. 765-770, June 2014.

[7] Y. Wang, G. Attebury, and B. Ramamurthy, ”A survey of security issues in wireless sensor

networks,” IEEE Commun. Surveys Tutorials,vol. 8, no. 2, pp. 2-23, 2006, 2nd Quarter.

[8] H. Fouchal, J. Biesa, E. Romero, A.Araujo, and O. Nieto, ”A Security Scheme for Wireless

Sensor Networks,”2016 IEEE Global Communications Conference(GLOBECOM), pp.1-

5,Dec. 2016.

[9] L. Hu and D. Evans, ”Secure Aggregation for Wireless Networks,”Wksp. Security and

Assurance in Ad Hoc Networks,2003.

[10] V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, ”Security in wireless sensor net-
works,” Wireless Commun. Mobile Comput., vol. 8,no. 1, pp. 1-24, Jan. 2008.

[11] B. Przydatek, D. Song, and A. Perrig, ”SIA: Secure Information Aggregation in Sensor

Networks,” Proc. 1st Int’ l.Conf. Embedded Networked Sensor Systems, SenSys’ 03, New

York: ACM Press, 2003, pp. 255-265.

[12] Q. Zhang, P. Varshney, and R. Wesel, ”Optimal bi-level quantization of i.i.d. sensor ob-
servations for binary hypothesis testing,” IEEE Trans. Inform. Theory, vol. 48, no. 7, pp.

2105-2111, Jul. 2002.

[13] P. Varshney, Distributed Detection and Data Fusion. New York:Springer, 1997.

[14] C.-C. Lee and J.-J. Chao, ”Optimum local decision space partitioning for distributed

detection,” IEEE Trans. Aerospace Electronic Syst., vol. 25, no. 4, pp. 536-544, Jul. 1989.

[15] V. S. S. Nadendla and P. K. Varshney, ”Design of Binary Quantizers for Distributed

Detection Under Secrecy Constraints,” IEEE Transactions on Signal Processing, vol. 64,

no. 10, pp. 2636-2648, May 2016.

[16] J. Guo, X. Li, U. Rogers, and H. Chen, ” Asymptotic perfect secrecy in distributed de-
tection against a global eavesdropper,”2016 IEEE International Conference on Acoustics,

Speech and Signal Processing (ICASSP), pp.3501-3505, March 2016.

[17] R. Soosahabi and M. Naraghi-Pour, ”Scalable PHY-layer security for distributed detection

in wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-

1126, Aug. 2012.

[18] S. Marano, V. Matta, and P.K. Willett, ”Distributed detection with censoring sensors

under physical layer secrecy,” Signal Processing, IEEE Transactions on, vol. 57, no. 5, pp.

1976-1986, May 2009.

[19] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications.

Boca Raton, FL, USA: CRC Press, 2013.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.139.238.76
論文開放下載的時間是 校外不公開

Your IP address is 3.139.238.76
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 永不公開 not available

QR Code