Responsive image
博碩士論文 etd-0613116-003217 詳細資訊
Title page for etd-0613116-003217
論文名稱
Title
存在竊聽者之合作式通訊系統使用編碼理論的分散式接收技術
Distributed Reception Technique using Coding Theory for Cooperative Communication Systems in the Presence of Eavesdroppers
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
47
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2016-06-20
繳交日期
Date of Submission
2016-07-13
關鍵字
Keywords
竊聽者、保密、分散式推理網路、分散式接收系統、分散式分集編碼技術
confidentiality, distributed inference network, eavesdroppers, secrecy, distributed reception system, coded decentralized diversity
統計
Statistics
本論文已被瀏覽 5638 次,被下載 24
The thesis/dissertation has been browsed 5638 times, has been downloaded 24 times.
中文摘要
近年來, 合作式通訊網路引起了不少的關注, 因為合作式通訊網路增加了通訊系統的可靠性, 並且達到比較好的錯誤率表現。本篇論文主要考慮一個存在竊聽者的合作式通訊系統, 融合中心基於從中繼節點傳送來的資訊, 處理後再做出全局決策 (global decision) , 以判斷從發射端傳送來的符號位元。然而, 竊聽者也能夠竊聽到由中繼點傳給融合中心的消息, 並量化原始觀測值來推斷其結果。
  本篇論文採用一個存在竊聽者之合作式通訊系統, 使用編碼理論的分散式接收技術。更仔細來說, 我們使用 Exhaustive Search 的方法來搜尋最佳的碼簿, 符合以竊聽者與融合中心的錯誤率之比例當作準則來最小化。我們的模擬結果, 顯示了根據我們提出的準則所獲得之最佳碼簿, 確實達到更好的系統性能。此外, 可以從執行的模擬結果觀察出用於存在竊聽者系統下之最好的碼簿結構。
Abstract
Cooperative communication networks have attracted extensive attention recently, because it increases the reliability of communication systems and archives a better error rate performance. This thesis mainly considers a cooperative communication system in the presence of eavesdroppers. Based on the local summary statistics transmitted by relay nodes, the fusion center makes a global decision in favor of one of symbols sent from the source. However, the eavesdropper can also eavesdrop the information which is sent from a node to the fusion center and quantizes those raw observations to infer the information.
This thesis adopts a distributed reception technique using coding theory for cooperative communication systems in the presence of eavesdroppers. Specifically, an “Exhaustive Search” method is utilized to search the best codebook in accordance with the criterion of the minimization of the error probability ratio of the fusion center and eavesdropper. The results obtained by our simulation show that the best codebook obtained according our proposed criterion does achieve a better system performance. In addition, the best structure of the codebook used for the system in the presence of eavesdroppers can be observed from the conducted simulation results.
目次 Table of Contents
目錄
論文審定書                              i
誌謝                                  ii
摘要                                 iii
Abstract                               iv

1 序論                                1
 1.1 介紹..............................1
 1.2 分散式接收之使用編碼的技術...................2
 1.3 存在竊聽者的通訊網路......................2
 1.4 研究方法............................3
 1.5 論文架構............................4

2 系統模型                              5
 2.1 系統模型............................5
 2.2 中繼端量化訊號並傳送到融合中心解碼...............8

3 碼字集矩陣的設計                           10
 3.1 無竊聽者時的碼字編碼方法....................10
 3.2 存在竊聽者時的碼字編碼方法...................13

4 模擬結果和分析                           18
 4.1 碼字集矩陣錯誤率比較......................19
 4.2 系統出現竊聽者通道.......................21
 4.3 不同多個中繼點之碼字集矩陣...................23
 4.4 最佳碼字集矩陣之分析......................26

5 結論                                34

參考文獻                              35


                 圖目錄
2.1.1 QPSK 星座點 ...........................6
2.1.2 系統模型圖 ............................7
2.2.1 碼字集矩陣編碼 ..........................8
3.1.1 N = 5 , = 6 (dB) , 無竊聽者時之碼字集矩陣的錯誤率..........11
3.1.2 N = 6 , = 6 (dB) , 無竊聽者時之碼字集矩陣的錯誤率..........12
3.2.1 N = 5 , = 0 (dB) , 存在竊聽者時之碼字集矩陣的錯誤率.........13
3.2.2 N = 6 , = 0 (dB) , 存在竊聽者時之碼字集矩陣的錯誤率.........14
3.2.3 N = 6 , = 6 (dB) , 融合中心與竊聽端的錯誤率之比例 Re .......15
3.2.4 N = 6 , = −10 (dB) , 融合中心與竊聽端的錯誤率之比例 Re .......16
3.2.5 N = 6 , = 20 (dB) , 融合中心與竊聽端的錯誤率之比例 Re .......17
4.1.1 不同中繼點數系統錯誤率的比較 ...................19
4.1.2 文獻[8][9] 與搜索碼字集矩陣的錯誤率比較 ..............20
4.2.1 6-Node , = 0 (dB). ........................21
4.2.2 6-Node , = 5 (dB) .........................22
4.3.1 N=5 , = 0 (dB) 搜尋的碼字編碼比較 .................23
4.3.2 N=6 , = 0 (dB) 搜尋的碼字編碼比較 .................24
4.3.3 N=6 , = 0 (dB) 不同訊雜比環境之搜尋的最佳碼字編碼比較 .......25
4.4.1 QPSK 星座點與碼字解碼示意圖...................28


                 表目錄
4.4.1 Fusion Center: 前半段經傳送通道後判斷的機率 ............29
4.4.2 Eavesdropper: 後半段經竊聽通道後判斷的機率 ............29
4.4.3 N = 6 , 碼字集矩陣(A) 星座點錯誤率與漢明距離............30
4.4.4 N = 6 , 碼字集矩陣(C) 星座點錯誤率與漢明距離............30
4.4.5 N = 5 , 搜索的最佳碼字集矩陣(iii) 星座點錯誤率與漢明距離.......31
4.4.6 N = 6 , 搜索的最佳碼字集矩陣(D) 星座點錯誤率與漢明距離.......31
4.4.7 N = 6 , 只傳送Q1 , 原碼字集矩陣與相對兩列對調之矩陣 ........32
4.4.8 N = 6 , 只傳送Q1 , 相鄰兩列對調之矩陣 ...............32
4.4.9 N = 5 , 只傳送Q1 , 原碼字集矩陣與列對調後之矩陣 ..........33
4.4.10 N = 6 , 只傳送一種訊號之不同漢明距離分配表現...........33
參考文獻 References
[1] R. Viswanathan and P. K. Varshney, “Distributed detection with multiple sensors: Part I-fundamentals,” Proceedings of the IEEE, vol. 85, pp. 54–63, January 1997.

[2] R. S. Blum, “Distributed detection for diversity reception of fading signals in noise,” IEEE Transactions on Information Theory, vol. 45, pp. 158–164, January 1999.

[3] A. D’Costa and A. M. Sayeed, “Data versus decision fusion in sensornetworks,” Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, April 2003.

[4] D. R. Brown III, U. Madhow, M. Ni, M. Rebholz, and P. Bidigare, “Distributed reception with hard decision exchanges,” IEEE Transactions on Wireless Communications, vol. 13, no. 6, pp. 3406–3418, June 2014.

[5] E. Biglieri, J. Proakis, and S. Shamai, “Fading channels: Informationtheoretic and communications aspects,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2619– 2692, October 1998.

[6] C. Yao, P.-N. Chen, T.-Y. Wang, Y. S. Han, and P. K. Varshney,“Performance analysis and code design for minimum Hamming distance fusion in wireless sensor networks,” IEEE Transactions on Information Theory, vol. 53, no. 5, pp. 1716–1734, May 2007.

[7] T.-Y. Wang, Y. S. Han, B. Chen, and P. K. Varshney, “A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 5, no. 7, pp. 1695–1705, July 2006.

[8] T.-Y. Wang, Y. S. Han, P. K. Varshney, and P.-N. Chen, “Distributed fault-tolerant classification in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 724–734, April 2005.

[9] J. Choi, D. J. Love, and P. Bidigare, “Coded Distributed Diversity: A Novel Distributed Reception Technique for Wireless Communication Systems,” IEEE Transactions on Signal Processing,vol. 63, no. 5, pp.1310–1321, March 2015

[10] R. Ahlswede, N. Cai, S.-Y. Li, and R. Yeung, “Network information flow,”IEEE Transactions
on Information Theory, vol. 46, no. 4, pp. 1204–1216, July 2000.

[11] N. Cai and R. Yeung, “Secure Network Coding on aWiretap Network,” IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 424–435, January 2011.

[12] N. Abuzainab and A. Ephremides, “Secure Distributed Information Exchange,” IEEE Transactions on Information Theory, vol. 60, no. 2, pp. 1126–1135, February 2014.

[13] A. Mills, B. Smith, T. C. Clancy, E. Soljanin and S. Vishwanath, “On secure communication over wireless erasure networks,” 2008 IEEE International Symposium on Information Theory, pp. 161–165, July 2008.

[14] V. S. S. Nadendla, H. Chen and P. K. Varshney, “Secure distributed detection in the presence of eavesdroppers,” 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, pp. 1126–1135, November 2010.

[15] Z. Li, T. J. Oechtering and K. Kittichokechai, “Parallel distributed Bayesian detection with privacy constraints,” 2014 IEEE International Conference on Communications (ICC), pp. 2178–2183, June 2014.

[16] Z. Li, T. J. Oechtering and J. Jalden, “Parallel distributed Neyman-Pearson detection with privacy constraints,” 2014 IEEE International Conference on Communications Workshops (ICC), pp. 765–770, June 2014.

[17] V. S. S. Nadendla and P. K. Varshney, “Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints,” IEEE Transactions on Signal Processing, vol. 64, no. 10, pp. 2636–2648, May 2016.

[18] R. Soosahabi, M. Naraghi-Pour, D. Perkins and M. A. Bayoumi, “Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 375–385, March 2014.

[19] H. Jeon, D. Hwang, J. Choi, H. Lee and J. Ha, “Secure Type-Based Multiple Access” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 763–774, September 2011.

[20] H. Jeon, J. Choi, S. McLaughlin and J. Ha, “Channel aware encryption and decision fusion
for wireless sensor networks” IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 619–625, April 2011.

[21] B. Kailkhura, V. S. S. Nadendla and P. K. Varshney, “Distributed inference in the presence of eavesdroppers: a survey” IEEE Communications Magazine, vol. 53, no. 6, pp. 40–46, June 2015.

[22] R. M. Roth, Introduction to Coding Theory. Cambridge University Press, New York 2006.

[23] J. H. Griesmer, “A bound for error-correcting codes,” IBM Journal of Research and Development , vol. 4, pp. 532–542, November 1960.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code