Responsive image
博碩士論文 etd-0723111-142812 詳細資訊
Title page for etd-0723111-142812
論文名稱
Title
在合作式通訊達到穩健多樣性結合之異常中繼檢測機制
Relay Misbehavior Detection for Robust Diversity Combining in Cooperative Communications
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
64
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2011-06-03
繳交日期
Date of Submission
2011-07-23
關鍵字
Keywords
合作式通訊、異常中繼、相關性、穩健性、貝式檢測
Cooperative communications, misbehaving relay, correlation, Bayesian detection, robustness
統計
Statistics
本論文已被瀏覽 5708 次,被下載 1349
The thesis/dissertation has been browsed 5708 times, has been downloaded 1349 times.
中文摘要
在合作式通訊(Cooperative communications) 系統之中,不同的使用者可以藉由分享彼此的天線,與中繼(relay) 或其它使用者共組虛擬的多重天線,達到與多重輸入多重輸出(MIMO) 相同效果的空間多樣性增益,以對抗通道衰弱的效應。然而,在以往研究的假設,多半都是基於所有使用者都會遵照中繼的策略來合作的前提下進行。很不幸地,在實務上這通常是一個極為理想的狀況,目前也尚未有一種機制可以保證所有的中繼都會遵守合作策略,而此異常行為將會導致系統效能遭受嚴重影響,因此,為解決此一現象,本論文將考慮在兩種網路模型: (i) 有直接傳輸(with direct path,WDP); (ii) 無直接傳輸(without direct path,WODP) 的解碼後傳送(decode-and-forward,DF) 協定之半異常(semi-misbehaving) 中繼網路,分別提出訊號相關性檢測(signal-correlation-detection) 機制。在合作式網路的目的端(destination) 使用此機制,以識別並排除異常中繼修改來源端(source) 傳送之訊號,然後接收正常中繼傳送之訊號,再執行訊號的多樣性組合(diversity combining) 。我們提出的訊號相關性檢測機制是藉由最小化異常檢測誤判機率(minimization of the probability of misbehavior misidentification) ,或者最大化廣義似然比檢測(maximum generalized likelihood detector) 作為準則,來進行最佳化設計。此外,本論文以位元錯誤率(bit error rates,BER) 作為效能指標,經由推導分析,以及電腦模擬驗證,我們所提出的異常中繼檢測機制確實能夠獲得最佳的穩健性效能(robust performance) ,進而對系統提供完整的保護功能。
Abstract
Cooperative communications is an emerging technique that has spatial diversity inherent in wireless multiuser communication systems without multiple antennas at each node. Most studies in the literature assume that users acting as the relays are normally operated and trustworthy, which, however, may not always be true in practice. This thesis considers the design of robust cooperative communication in physical layer for combating relay misbehaviors. This thesis considers both models in which the cooperative communications is with direct path (WDP) and without direct path (WODP). Two signal-correlation-detection rules for both WDP and WODP are proposed, respectively. Utilizing the proposed signal-correlation-detection mechanism, the destination identifies the misbehaving relays within the cooperative communication network and then excludes their transmitting messages when performing the diversity combining to infer the symbols of interest sent by the source. The proposed signal-correlation-detection rules are optimally designed in accordance with either the criterion of the minimization of the probability of misbehavior misidentification or the criterion of the maximum generalized likelihood detector. In addition, this thesis also provides the BER analysis of the cooperative communications employing the proposed misbehaving relay detectors. The simulation result demonstrates that the proposed schemes have excellent robust performance when the relay misbehavior is present in the cooperative communication networks.
目次 Table of Contents
論文審定書 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .I
誌謝 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II
摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .III
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IV
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .V
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . VII
Chapter 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . .1
Chapter 2 System Model . . . . . . . . . . . . . . . . . . . . . . . . .7
Chapter 3 Proposed Misbehaving Detection Technique . . . . . . . . . . 12
3.1 The WDP (with direct path) scenario . . . . . . . . . . . . . . . .12
3.2 The WODP (without direct path) scenario . . . . . . . . . . . . . .16
Chapter 4 BER Performance Analysis . . . . . . . . . . . . . . . . . . 20
4.1 The WDP scenario with signal-correlation-detection . . . . . . . . 21
4.2 The WODP scenario with mutual-correlation-decision . . . . . . . . 25
Chapter 5 Numerical and Simulation Results . . . . . . . . . . . . . . 27
Chapter 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 38
Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
簡歷 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
參考文獻 References
[1] T. M. Cover and A. Gamal, “Capacity theorems for the relay channel,” IEEE Transactions on Information Theory, vol. 25, no. 5, pp. 572–584, September 1979.
[2] E. Zimmerman, P. Herhold, and G. Fettweis, “On the performance of cooperative diversity protocols in practical wireless systems,” in IEEE 58th Vehicular Technology Conference (VTC’03), vol. 4, 6-9 October 2003, pp. 2212–2216.
[3] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Communications Magazine, vol. 42, no. 10, pp. 74–80, October 2004.
[4] R. Nabar, H.Bolcskei, and F. Kneubuhler, “Fading relay channels : Performance limits and space-time signal design,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1099–1109, August 2004.
[5] Y. W. Hong, W. J. Huang, F. H. Chiu, and C. C. J. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 47–57, May 2007.
[6] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.
[7] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity – Part I: System description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, November 2003.
[8] ——, “User cooperation diversity – Part II: Implementation aspects and performance analysis,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1939–1948, November 2003.
[9] J. N. Laneman and G. W. Wornell, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions on Information Theory, vol. 49, pp. 2415–2525, October 2003.
[10] M. Janani, A. Hedayat, T. E. Hunter, and A. Nosratinia, “Coded cooperation in wireless communications: Space-time transmission and iterative decoding,” IEEE Transactions on Signal Processing, vol. 52, no. 2, pp. 362–371, February 2004.
[11] G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity theorems for relay networks,” IEEE Transactions on Information Theory, vol. 51, no. 9, pp. 3037–3063, September 2005.
[12] D. Brennan, “Linear diversity combining techniques,” Proceedings of the IEEE, vol. 91, no. 2, pp. 331–356, February 2003.
[13] M. Hasna and M. S. Alouini, “End-to-end performance of transmission systems with relay over rayleigh-fading channels,” IEEE Transactions on Wireless Communications, vol. 2, no. 6, pp. 1126–1131, November 2003.
[14] P. A. Anghel and M. Kaveh, “Exact symbol error probability of a cooperative network in a rayleigh-fading environment,” IEEE Transactions on Wireless Communications, vol. 3, no. 6, pp. 1416–1421, September 2004.
[15] D. Chen and J. N. Laneman, “Modulation and demodulation for cooperative diversity in wireless systems,” IEEE Transactions on Wireless Communications, vol. 5, no. 7, pp. 1785–1794, July 2006.
[16] K. Vardhe, D. Reynolds, and B. D.Woerner, “Joint power allocation and relay selection for multiuser cooperative communication,” IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1255–1260, April 2010.
[17] S. Dehnie, H. T. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay : Performance analysis,” in IEEE Sarnoff Symposium, Princeton, New Jersey, April 30-May 2 2007, pp. 1–7.
[18] ——, “A stochastic model for misbehaving relays in cooperative diversity,” in IEEE Wireless Communications and Networking Conference (WCNC’08), Las Vegas, Nevada, March 31-April 3 2008, pp. 482–487.
[19] S. Dehnie and N. Memon, “Cooperative diversity with selfish users,” in 42nd Annual Conference on Information Sciences and Systems (CISS’08), Princeton, New Jersey, 19-21 March 2008, pp. 1184–1188.
[20] C. Long, T. Chen, and X. Guan, “Cooperative amplify and forward in the presence of multiple selfish relays: Performance analysis,” in Canadian Conference on Electrical and Computer Engineering (CCECE’08), Niagara Falls, ON, 4-7 May 2008, pp. 2045–2050.
[21] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in 6th annual international conference on Proceedings of ACM MobiCom (MobiCom’00), 2000, pp. 255–265.
[22] B. Sun, L. Osborne, Y. Xiao, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp. 56–63, October 2007.
[23] H. Yang, H. Luo, F. Ye, S. Lu, and U. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 38–47, February 2004.
[24] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” in IEEE Network, vol. 13, no. 6, November/December 1999, pp. 24–30.
[25] A. L. Toledo and X. Wang, “Robust detection of selfish misbehavior in wireless networks,”IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1124–1134, August 2007.
[26] H. Y. Wei and R. D. Gitlin, “Incentive mechanism design for selfish hybrid wireless relay networks,” in Mobile Networks and Applications, vol. 10, no. 6, Hingham, MA, December 2005, pp. 929–937.
[27] S. Vassilaras, D. Vogiatzis, and G. S. Yovanof, “Misbehavior detection in clustered ad-hoc networks with central control,” in International Conference on PInformation Technology: Coding and Computing (ITCC’05), vol. 2, April 2005, pp. 687–692.
[28] ——, “Security and cooperation in clustered mobile ad hoc networks with centralized supervision,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 329–342, February 2006.
[29] D. McCoy, D. Sicker, and D. Grunwald, “A mechanism for detecting and responding to misbehaving nodes in wireless networks,” in 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’07), San Diego, CA, 18-21 June 2007, pp. 48–54.
[30] S. Dehnie and N. Memon, “Cooperative diversity as a dynamic game with incomplete information,” in IEEE Conference on Military Communications (MILCOM’08), San Diego, CA, 16-19 November 2008, pp. 1–6.
[31] ——, “A dynamic game model for amplify-and-forward cooperative communications,” in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’09), Taipei, 19-24 April 2009, pp. 3485–3488.
[32] ——, “Detection of misbehavior in cooperative diversity,” in IEEE Conference on Military Communications (MILCOM’08), San Diego, CA, 16-19 November 2008, pp. 1–5.
[33] S. Dehnie and H. T. Sencar, “Detection of selfish partners by control packets in ARQ-based CSMA cooperative networks,” in IEEE 10th International Symposium on Spread Spectrum Techniques and Applications (ISSSTA’08), Bologna, Italy, 25-28 August 2008, pp. 205–210.
[34] ——, “Selfish misbehavior detection in CSMA cooperative networks with HARQ,” in IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB’09), Marrakech, 12-14 October 2009, pp. 55–60.
[35] ——, “Detection of selfish nodes in networks using coopMAC protocol with ARQ,” IEEE Transactions on Wireless Communications, vol. 9, no. 7, pp. 2328–2337, July 2010.
[36] Y. Mao and M. Wu, “Security issues in cooperative communications : Tracing adversarial relays,” in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’06), vol. 4, 14-19 May 2006, pp. IV–69–IV–72.
[37] ——, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[38] T. A. Khalaf and S. W. Kim, “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” in IEEE Military Communications Conference (MIL-COM’08), San Diego, CA, 16-19 November 2008, pp. 1–4.
[39] S. Dehnie, H. T. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in 41st Annual Conference on Information Sciences and Systems (CISS’07), Baltimore, Maryland, 14-16 March 2007, pp. 895–899.
[40] Y. Liu, Y. Wu, and J. Tang, “Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks,” in Sixth International Conference on Information Assurance and Security (IAS’10), Atlanta, GA, 23-25 August 2010, pp. 155–160.
[41] S. Kim, “Mitigation of forwarding misbehaviors in multiple access networks with network coding,” in IEEE Global Telecommunications Conference (GLOBECOM’10), Miami, FL, 6-10 December 2010, pp. 1–5.
[42] S. Kim, T. Khalaf, and S. Kim, “MAP detection of misbehaving relay in wireless multiple access relay networks,” IEEE Communications Letters, vol. 15, no. 3, pp. 1–3, March 2011.
[43] H. Stark and J. W. Woods, Probability and Random Processes with Applications to Signal Processing 3rd Edition. Englewood Cliffs, NJ: Prentice-Hall, 2002.
[44] H. L. V. Trees, Detection, Estimation and Modulation Theory, Part I. Hoboken, NJ:Wiley, 2001.
[45] S. M. Kay, Fundamentals of Statistical Signal Processing, Volume II, Detection Theory. Upper Saddle River, New Jersey: Prentice-Hall, 1998.
[46] Y.W. Hong, W. J. Huang, and C. C. J. Kuo, Cooperative Communications and Networking - Technologies and System Design 1st Edition. Springer, September 2010.
[47] I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products. San Diego, CA: Academic Press, 1994.
[48] J. G. Proakis, Digital Communications. McGraw-Hill, 2001.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內外都一年後公開 withheld
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code