Responsive image
博碩士論文 etd-0604113-125119 詳細資訊
Title page for etd-0604113-125119
論文名稱
Title
在放大後前送多中繼系統中預防惡意竊聽之預編碼器設計
Precoder Design for Amplify-and-Forward Cooperative Systems with Multiple Wiretapping Relays
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
53
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2013-06-28
繳交日期
Date of Submission
2013-07-05
關鍵字
Keywords
保密容量、實體層保密、預編碼器、合作式通訊
Optimization, Cooperative network, Physical layer secrecy, Precoder
統計
Statistics
本論文已被瀏覽 5686 次,被下載 1037
The thesis/dissertation has been browsed 5686 times, has been downloaded 1037 times.
中文摘要
對無線通訊系統而言,由於其向四面八方廣播的特性,如何對其傳送的資訊加以保密,是個很值得研究的問題,除了利用應用層的加密技術之外,在文獻中亦有實體層保密(physical layer secrecy)技術之相關探討,其重點在於如何利用實體層通道的傳輸特性,進一步讓竊聽者無法竊取重要資訊,讓合法的傳輸更加可靠。本文考慮一個放大後前送(amplify-and-forward, AF)的合作式傳輸網路,網路中資料源與目的端皆配備多根天線,且有多個具備單天線的中繼端(relay),中繼端扮演著資料源與目的端之間溝通的橋梁角色,然而在本文中,我們假設中繼端是不可靠的,可能會在未經許可的狀況下,竊取資料源的訊息。有鑑於此,在尋求不可靠的中繼端幫助傳送的同時,也要避免中繼端成功竊聽,因此在資料傳送訊號的同時,由目的端產生一個人工雜訊(artificial noise, AN),以期破壞中繼端對來源訊號的解碼,因為人工雜訊由目的端產生,所以其接收到中繼端傳送的訊號時,可自行消除人工雜訊的部分,不至於影響正常通訊。我們在資料源與目的端各佈置一個預編碼器(precoder),用來設計傳送端訊號與目的端人工雜訊的統計特性,在中繼端乘上預編碼係數後,傳送給目的端,為了要系統的具備保密的效能,欲藉由確保服務品質(quality of service, QoS)為系統考慮依據,將使用最佳化的方式來聯合設計傳送訊號與人工雜訊的統計特性,以及中繼端放大後前送的預編碼係數,達到需求品質下的最佳保密容量(secrecy capacity),透過模擬方式可以得知,使用人工雜訊干擾竊聽者,以及最佳化傳輸訊號與人工雜訊的統計特性,確實可以提升合作式系統中,對於不可靠中繼端的保密容量。
Abstract
Due to the broadcast nature of wireless medium, how to ensure the security of wireless transmission is worth investigating. In addition to the encryption techniques commonly adopted in the application-layer, physical-layer secrecy communications drawn significant research concern recently. Physical-layer secrecy communication is achieved by exploiting spatial property of the physical-layer channel, such that the eavesdroppers can’t decode source important information successfully, and the legitimate transmission becomes more reliable. This thesis considers an amplify-and-forward cooperative network, where the source and destination are equipped with multiple antennas, while multiple relays have single antenna. The relays act a bridge between the source and destination, but we assume that these relays are not reliable and may wiretap the information without authorization. As a result, while being assisted by those untrusted relays, we must avoid relays eavesdropping source information. In order to prevent relay from wiretapping information, the destination generates artificial noise(AN) simultaneously to interfere signal reception at relays, when the source transmits information. Since AN is generated by the destination, the destination can eliminate AN by itself after receiving signal forwarded from the relays to fully eliminate additional interference at the destination. We employ linear precoder at the source and destination to optimize the statistical properties of the transmission signal and artificial noise. On the other hand, the relays scale the received signal by a precoding coefficient before retransmission. Instead of maximizing the secrecy rate, we adopt quality of service(QoS)-based criterion to ensure secrecy transmission implicitly since the secrecy rate is non-convex. More specifically, the precoders at the source, relays and destination are jointly optimazed in terms of maximum SNR of the destination subject to the SINRs at all relays are constrained. Through computer simulation, it shows that secrecy rate is improved obviously through introducing artificial noise and joint optimization of precoders compare with the scheme without AN and the scheme using arbitrary precoders.
目次 Table of Contents
論文審定書i
致謝ii
摘要iii
Abstract iv
目錄vi
圖次vii
第一章 簡介1
第二章 文獻探討5
2.1 使用人工雜訊干擾的保密5
2.2 合作式系統中的保密8
2.3 以確保QoS為系統考慮依據的保密11
第三章 系統模型16
第四章 預編碼器之設計22
4.1 多中繼系統中的保密22
4.2 設計最佳化問題23
4.3 中繼端預編碼向量的最佳化25
4.4 Rx與Q的最佳化28
第五章 模擬結果31
第六章 結論43
參考文獻44
參考文獻 References
[1]J. Paulraj, D. A. Gore, R. U. Nabar, and H. Bölcskei, “An overview of MIMO communications—A key to gigabit wireless,” Proc. IEEE, vol. 92, no. 2, pp. 198–218, Feb. 2004.
[2]A. Nosratinia and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Commun. Mag., vol. 42, no. 10, pp. 74–80, Oct. 2004.
[3]A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity–Part I: System description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[4]——, “User cooperation diversity—Part II: Implementation aspects and performance analysis,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1939–1948, Nov. 2003.
[5]T. E. Hunter and A. Nosratinia, “Cooperation diversity through coding,” in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, July 2002, pp. 220.
[6]J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[7]S. Goel and R. Negi, “Guaranteeing secrecy using artifical noise,” IEEE Trans.
[8]R. Negi and S. Goel, “Secret communication using artificial noise,” in Proc. IEEE VTC, Sept. 2005, pp. 1906–1910.
[9]X. He and A. Yener, “Two-hop secure communication using an untrusted relay: A case for cooperative jamming,” in Proc. IEEE Globecom, New Orleans, USA, Dec. 2008.

[10]A. D. Wyner "The wire-tap channel", Bell Sys. Tech. J., vol. 54, pp.1355–1387 1975.
[11]A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010.
[12]A. Khisti and G. Wornell, “Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010.
[13]F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” in Proc. IEEE Int. Symp. Inf. Theory, pp. 524–528, Jul. 2008.
[14]Y.-L. Liang, Y. Wang, T. Chang, Y.-W. P. Hong, and C. Chi, “On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise ,” in Proc. IEEE ISIT, pp. 2351–2355, Seoul, 2009.
[15]陳信逢(2012),《在放大後前送多重輸入輸出合作式系統中針對惡意竊聽中繼端之預編碼器設計》。國立中山大學通訊所碩士論文,未出版,高雄市。
[16]W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202–1216, Mar. 2011.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code