Responsive image
博碩士論文 etd-0717112-152506 詳細資訊
Title page for etd-0717112-152506
論文名稱
Title
在缺乏異常中繼點行為模式下之合作式通訊系統的異常中繼點檢測
Misbehaving Relay Detection for Cooperative Communications without the Knowledge of Relay Misbehaviors
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
43
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2012-06-13
繳交日期
Date of Submission
2012-07-17
關鍵字
Keywords
合作式通訊系統、異常中繼點、檢測、最大比例合成、位元錯誤率
detection, misbehaving relay, maximal ratio combing(MRC), bit error rate(BER), Cooperative communications, Kolmogorov-Smirnov test
統計
Statistics
本論文已被瀏覽 5653 次,被下載 958
The thesis/dissertation has been browsed 5653 times, has been downloaded 958 times.
中文摘要
在合作式通訊系統(cooperative communications) 中, 為了對抗通道衰弱所造成的影響, 不同的中繼點(relay) 或使用者可以藉由分享彼此的天線共組虛擬的多重天線, 以達
到與多重輸入多重輸出(multi-input multi-output, MIMO) 相同效果的空間多樣性增益(spatial diversity gains) 。然而, 在過往的研究裡, 他們多半是假設所有使用者都會遵照中繼點採合作策略的前提下進行。很不幸地, 實際上這是一個極為理想的情況, 目前也尚未有一種機制可以確保所有的中繼點都會遵守合作策略, 而中繼點的異常行為將會
導致整體的系統效能遭到嚴重的影響。因此, 為了解決中繼點的異常行為, 本論文將提出Kolmogorov-Smirnov(K-S) 方法來針對有直接傳輸路徑(with direct path,WDP) 和無直接傳輸路徑(without direct path, WODP) 的解碼後傳送(decode-and-forward, DF)協定之半異常(semi-misbehaving) 中繼模型的檢測, 在合作式通訊系統的目的端(desti-nation)使用異常中繼點檢測機制來辨識, 並且排除異常中繼點任意修改訊號源端(source)的傳送訊號, 然後在目的端把正常中繼點傳送的訊號和訊號源端傳送的訊號作訊號的多樣性組合(diversity combining) 。此外, 本論文將以位元錯誤率(bit error rates, BER)作為系統效能的指標, 經由電腦模擬驗證, 本論文所提出的異常中繼點檢測機制能有效地改善整體的系統效能, 進而達到穩健的系統。
Abstract
In the cooperative communications, the users relay each other's signal and thus form multiple transmission paths to the destination and therefore the system can achieve spatial diversity gain.
Most studies in the literature assumed that cooperative users acting as the relays are normally operated and trustworthy. However, this may not always be true in practice. When the relay misbehaviors are present in the cooperative communications, the communication performance may degrade dramatically and the users may be even better off without cooperation. Therefore, it is necessary for the destination to determine the misbehaving relays and to take appropriate actions
to ensure that cooperative advantages are preserved.
This thesis considers both models in which the cooperative communications are with direct path (WDP) and without direct path (WODP).
Utilizing the proposed Kolmogorov-Smirnov test mechanism, the destination identifies the misbehaving relays within the cooperative
communications and then excludes their transmitting messages when performing the diversity combining to infer the symbols of interest sent by the source.
In addition, this thesis provides the bit error rate (BER) analysis of the cooperative communications
employing the proposed misbehaving relay detectors. The simulation results demonstrate that the proposed methods have robust performance when the relay misbehaviors are present in the cooperative communications.
目次 Table of Contents
摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
圖目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
表目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
1 序論 1
2 系統模型 5
3 檢測異常中繼點之方法 8
4 異常中繼點行為使用Kolmogorov-Smirnov 方法檢測 12
4.1 有直接傳輸模型之析. . . . . . . . . . . . . . . . . . . 12
4.2 無直接傳輸模型之分. . . . . . . . . . . . . . . . . . . 15
5 參數設定與模擬結果 18
5.1 模擬參數設定. . . . . . . . . . . . . . . . . . . . . . . . . .18
5.2 模擬結果. . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 21
6 結論 29
參考文獻 30
附錄 33
參考文獻 References
[1] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Communications Magazine, vol. 42, no. 10, pp.74–80, October 2004.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions
on Information Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.
[3] A. Bletsas, H. Shin, and M. Z.Win, “Cooperative communications with outage-optimal opportunistic relaying,” IEEE Transactions on Wireless Communica-
tions, vol. 6, no. 9, pp. 3450–3460, September 2007.
[4] Y. W. Hong, W. J. Huang, F. H. Chiu, and C. C. J. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 47–57, May 2007.
[5] T. M. Cover and A. Gamal, “Capacity theorems for the relay channel,” IEEE Transactions on Information Theory, vol. 25, no. 5, pp. 572–584, September
1979.
[6] M. Janani, A. Hedayat, T. Hunter, and A. Nosratinia, “Coded cooperation in wireless communications: Space-time transmission and iterative decoding,”
IEEE Transactions on Signal Processing, vol. 52, no. 2, pp. 362–372, February 2004.
[7] G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity theorems for relay networks,” IEEE Transactions on Information Theory, vol. 51, no. 9, pp. 3037–3063, September 2005.
[8] D. Brennan, “Linear diversity combining techniques,” Proceedings of the IEEE, vol. 91, no. 2, pp. 331–356, February 2003.
[9] M. Hasna and M. S. Alouini, “End-to-end performance of transmission systems with relay over rayleigh-fading channels,” IEEE Transactions on Wireless Communications, vol. 2, no. 6, pp. 1126–1131, November 2003.
[10] P. A. Anghel and M. Kaveh, “Exact symbol error probability of a cooperative network in a rayleigh-fading environment,” IEEE Transactions on Wireless
Communications, vol. 3, no. 6, pp. 1416–1421, September 2004.
[11] J. N. Laneman and G. W. Wornell, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions
on Information Theory, vol. 49, pp. 2415–2525, October 2003.
[12] V.Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes from orthogonal designs,” IEEE Transactions on Information Theory, vol. 45, pp.
1456–1467, July 1999.
[13] S. Dehnie, H. T. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay: Performance analysis,” in IEEE Sarnoff Symposium,
Princeton, New Jersey, April 30-May 2 2007, pp. 1–7.
[14] Y. W. P. Hong, W. J. Huang, and C. C. J. Kuo, Cooperative Communications and Networking - Technologies and System Design, September 2010.
[15] S. Dehnie, H. T. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in 41st Annual Conference on Information Sciences and Systems (CISS’07), Baltimore, Maryland, 14-16 March 2007, pp. 895–899.
[16] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, pp. 24–30,
1999.
[17] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2,no. 2, pp. 198–212, June 2007.
[18] D. Panchenko, Statistics for Applications, September 2006.
[19] W. J. Conver, Partical Nonparametic Statistics. John Wiley, 1999.
[20] H. Stark and J.W.Woods, Probability and Random Processes with Applications to Signal Processing 3rd Edition. Englewood Cliffs, NJ: Prentice-Hall, 2002.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code