Responsive image
博碩士論文 etd-0611116-193816 詳細資訊
Title page for etd-0611116-193816
論文名稱
Title
具竊聽者隨機場訊號重建之安全區域設計
Secure Area Design for Signal Reconstruction in a Random Field in the Presence of Eavesdroppers
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
41
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2016-06-20
繳交日期
Date of Submission
2016-07-24
關鍵字
Keywords
竊聽者、估測、重建、隨機場、無線感測網路
Wireless sensor networks, random field, reconstruction, Eavesdropper, estimate
統計
Statistics
本論文已被瀏覽 5668 次,被下載 17
The thesis/dissertation has been browsed 5668 times, has been downloaded 17 times.
中文摘要
無線感測網路已被應用在許多方面, 像是戰地偵查和智慧家庭系統。由於無線感測網路中的感測器通常佈署於開放空間, 所以面臨許多安全上的疑慮, 例如竊聽、數據偽造, 阻斷式服務攻擊。因此在隨機場重建中, 如何佈建感測節點且同時滿足一定的安全等級以達到更好的效能, 是一個重要的議題。本論文探討如何設計一個使竊聽者無法接收感測器傳送值的安全區域, 更具體地, 設計出最佳安全區域的準則, 能夠讓融合中心與竊聽者在隨機場重建中有最大估測均方差差值。論文中也探討最佳安全區域與感測器數量、安全區域大小和改變隨機場的信號特徵間相互的關係。
Abstract
Wireless sensor networks (WSNs) have been deployed for many applications, such as battlefield monitoring and smart home systems. Since the sensor nodes in a WSN are usually deployed in open areas, we then face several security concerns, e.g., eavesdropping, forgery of sensor data, and denial-of-service attacks. As a result, how to deploy sensor nodes to achieve a better performance of random field reconstruction and, in the mean while, satisfy a certain security level is a critical problem. This thesis then considers the problem of designing a secure region where the eavesdroppers cannot listen the data sent from sensor nodes. Specifically, we design the optimal secure region in accordance with the criterion that the fusion center and eavesdropper have the largest difference in the mean square error of the field reconstruction. In
the thesis, we also investigate the relation of the resulted optimal secure region and the number of sensors, the size of the secure region, and the various signal characteristics of the random field.
目次 Table of Contents
摘要i
Abstract ii
1 序論1
1.1 研究動機1
1.2 高斯隨機場重建問題2
1.3 文獻回顧: 防止竊聽的技術2
1.4 研究方法3
1.5 論文架構3
2 系統模型4
2.1 融合中心的系統4
2.2 竊聽者的系統6
3 最佳安全區域設計9
3.1 演算法設計以搜尋最佳的安全區域9
4 模擬範例12
4.1 範例一12
4.1.1 安全區域的設置12
4.1.2 結果和分析16
4.2 範例二24
4.3 範例三25
4.3.1 探討感測器數量的效應25
4.4 模擬結果27
5 結論29
參考文獻29
參考文獻 References
[1] Y. Yang, and R. S. Blum, “Sensor Placement in Gaussian Random Field Via Discrete Simulation Optimization, ”IEEE Signal Processing Letters, vol. 15, 2008.
[2] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing, ”Proc. Int’l Conf. Distributed Computing Systems (ICDCS’ 05), June 2005.
[3] L. Eschenaur and V. Gligor, “A key-management scheme for distributed sensor networks, ”Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 41-47.
[4] M. Bohge and W. Trappe, “An authentication framework for hierarchical ad hoc sensor networks, ”Proc. of the 2003 ACM Workshop on Wireless Security, 2003, pp. 79-87.
[5] R. Soosahabi et al., “Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks, ”IEEE Trans. Info. Forensics and Security, vol. 9, no. 3, Mar. 2014, pp. 375-85.
[6] M. Shao, Y. Yang, S. Zhu, “G. Cao, Towards statistically strong source anonymity for sensor networks, ”Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1298-1306.
[7] Y. Xi, L. Schwiebert, W.S. Shi, “Preserving source location privacy in monitoring-based wireless sensor networks, ”Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), April 2006.
[8] M. Gruteser and D. Grunwald, “Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking, ”Proceedings of the nternational Conference on Mobile Systems, Applications, and Services (MobiSys), 2003.
[9] Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, “Entrapping Adversaries for Source Protection in Sensor Networks, “Proc. Int,l Conf. World of Wireless, Mobile, Multimedia Networking(WoWMoM’ 06), June 2006
[10] Jon R. Ward and M. Younis, “On the Effect of Imperfect Range Estimates on Base Station Anonymity in Wireless Sensor Networks , ”2013 IEEE Military Communications Conference, Nov. 2013.
[11] J. Deng, R. Han, S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks, ”First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), September 2005, pp. 113-126.
[12] J. Deng, R. Han, S. Mishra, “Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, ”Pervasive and Mobile Computing J., Special Issue on Security in Wireless Mobile Computing Systems, vol. 2, pp. 159-186, Apr. 2006.
[13] Y. Jian, S.G. Chen, Z. Zhang, L. Zhang, “Protecting receiver-location privacy in wireless sensor networks, ”Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1955-1963.
[14] C. Ko, J. Lee, and M. Queyranne, “An exact algorithm for maximum entropy sampling, ”Oper. Res., vol. 43, pp. 684-691, Jul.-Aug. 1995.
[15] C. Guestrin, A. Krause, and A. P. Singh, “Near-optimal sensor placements in Gaussian processes, “Proc. Int. Conf. Machine Learning, Bonn, Germany, Aug. 2005, pp. 265-272.
[16] S. Seo, M. Wallat, T. Graepel, and K. Obermayer, “Gaussian process regression: active data selection and test point rejection, ”Proc. Int. Joint Conf. Neural Networks, pp. 241-246, July 2000.
[17] A. A. Prudius, “Adaptive random search methods for simulation optimization, ”Ph.D. dissertation, Georgia Inst. Technol., Atlanta, 2007.
[18] M.F. Othman, K. Shazali “Wireless sensor network applications: A study in environment monitoring system ”Procedia Engineering, pp. 1204-1210, 2012
[19] M. P. Durisic, Z. Tafa, G. Dimic, and V. Milutinovic, “A survey of military applications of wireless sensor networks, ”Proc. MECO, pp. 196-199, June 2012
[20] N. Sghaier, A. Mellouk, B. Augustin, Y. Amirat, J. Marty, M. EL A. Khoussa, A. Abid, R. Zitouni, “Wireless Sensor Networks for medical care services, ” Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International. IEEE, pp. 571-576, JUL 2011.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code