Responsive image
博碩士論文 etd-0902112-204130 詳細資訊
Title page for etd-0902112-204130
論文名稱
Title
在合作式網路中惡意中繼端之時序偵測
Sequential Detection of Misbehaving Relay in Cooperative Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
79
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2012-07-27
繳交日期
Date of Submission
2012-09-02
關鍵字
Keywords
追蹤符元、惡意行為、對數-概似比值檢測、時序檢測、多樣性、合作式通訊
misbehavior, tracing symbols, log-likelihood ratio test, sequential detection, cooperative communication, diversity
統計
Statistics
本論文已被瀏覽 5637 次,被下載 724
The thesis/dissertation has been browsed 5637 times, has been downloaded 724 times.
中文摘要
合作式通訊系統中,訊號源到目的端之間的傳輸藉由中繼端的幫助達到空間多樣性(spatial diversity),以便抵抗通道衰減。然而,若中繼端出現異常行為或惡意行為,而目的端若沒有察覺而直接使用中繼端傳輸過來的訊號,那麼系統的多樣性增益會大幅降低,導致合作系統性能下降。在本論文中,我們考慮一個中繼端解碼後再傳送(decode and forward, DF)之合作式網路,並且假設存在著一定機率,中繼端會惡意竄改傳輸訊號來破壞合作式系統。我們在論文中討論三種惡意行為的偵測方式,更明確地說,我們採用時序檢測(sequential test)的方式來偵測中繼端行為,若訊號源傳送追蹤符元(tracing symbols),目的端收到的訊號後,先取出追蹤符元,然後使用對數-概似比值檢測(log-likelihood ratio test)來對追蹤符元進行中繼端行為偵測;若訊號源不傳送追蹤符元,我們會先將目的端經由直接路徑接收資訊進行訊號偵測,然後利用偵測值和中繼端送來的訊號對中繼端行為進行偵測。透過模擬的結果,在一定的錯誤率範圍下,我們使用的方法在高訊雜比時可以有效地減低取樣數,換句話說,在高功率時,目的端不需接收大量的追蹤符元或傳輸訊號,就可以快速偵測出惡意的中繼行為,以降低惡意中繼端造成的傷害。
Abstract
To combat channel fading, cooperative communication achieves spatial diversity for the transmission between source and destination through the help of relay. However, if the relay behaves abnormally or maliciously and the destination is not aware, the diversity gain of the cooperative system will be significantly reduced, which degrades system performance. In our thesis, we consider an one-relay decode and forward cooperative network, and we assume that the relay may misbehave with a certain probability. If the relay is malicious, it will garble transmission signal, resulting in severe damage to cooperative system. In this work, we discuss three kinds of malicious behavior detection. More specifically, we adopt sequential detection to detect the behavior of relay. If tracing symbols are inserted among the source message, the destination detects malicious after extracting the received tracing symbols. We adopt log-likelihood ratio test to examine these tracing symbols, and then determine the behavior of relay. If the source does not transmit tracing symbols, the destination detects misbehavior according to the received data signal. Furthermore, we employ sequential detection to reduce detection time for a given probabilities of false alarm and miss detection. Through simulation results, for a certain target on probability of errors, our proposed methods can effectively reduce numbers of observations. On the other works, the destination can effectively detect misbehavior of relay, and eliminating the damage causes by malicious relay without requiring large numbers of observations.
目次 Table of Contents
論文審定書
致謝................................................................ i
中文摘要............................................................ii
英文摘要........................................................... iii
目錄............................................................... iv
圖次............................................................... vi
表次.............................................................. viii
第 一 章 簡介.......................................................1
第 二 章 相關背景...................................................5
2.1 單一中繼點採用接受訊號相關性之惡意行為偵測.................. 6
2.2 雙中繼點採用追蹤符元之惡意行為偵測........................... 10
2.3 簡單的序列傳感............................................... 15
第 三 章 系統模型..................................................18
3.1 訊號模型..................................................... 18
3.2 中繼端之行為模型............................................. 20
3.3 追蹤符元系統架構............................................. 22
第 四 章 中繼惡意行為的時序偵測....................................23
4.1利用追蹤符元的時序偵測........................................25
4.1.1 中繼端發生自私行為.......................................26
4.1.2 中繼端發生竄改行為........................................27
4.1.3 中繼端發生混合惡意行為....................................28
4.2無追蹤符元的時序檢測......................................... 31
4.2.1 中繼端發生自私行為........................................34
4.2.2 中繼端發生竄改行為........................................34
4.2.3 中繼端發生混合惡意行為....................................35
第 五 章 模擬結果..................................................41
第 六 章 結論與未來研究方向........................................58
參考文獻...........................................................59
附錄................................................................61
附錄 A.......................................................... 61
附錄 B.......................................................... 62
附錄 C.......................................................... 64
附錄 D.......................................................... 65
附錄 E.......................................................... 68
參考文獻 References
[1] Ha Duyen Trung, W. Benjapolakul, and K. Araki, “A study on the channel capacity of multiple-input multiple-output (MIMO) wireless system,” Wireless and Optical Communications Networks, WOCN ’07. IFIP Int. Conf. on 2007, pp. 1–6.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient Protocols and Outage Behavior,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.
[3] M. Janani, A. Hedayat, T. E. Hunter, and A. Nosratinia, “Coded cooperation in wireless communications: space-time transmission and iterative decoding,” IEEE Transactions on Signal Processing, vol. 52, no. 2, pp. 362–371, Fed. 2004.
[4] S. Dehnie, H. T. Sencar, and N. Memon, “Detecting malicious behavior in cooper- ative diversity,” in Conf. on Information Sciences and Systems, CISS 2007, Mar. 2007.
[5] S. Dehnie, H. T. Sencar, and N. Memon, “Cooperative diversity in the presence of a misbehaving relay: performance analysis,” submitted to IEEE Sarnoff Symposium 2007.
[6] Yinian Mao and Min Wu, “Security issues in cooperative communications: tracing adversarial relays,” in proc. IEEE Int. Conf. Acoustic, Speech, and Signal Processing, vol. 4, pp. 69–72, May. 2006.
[7] Yinian Mao and Min Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, pp. 198–212, Jun. 2007.
[8] Qiyue Zou, Songfeng Zheng, and Ali H. Sayed, “Cooperative sensing via sequen- tial Detection,” IEEE Transactions on Signal Processing, vol. 58, no. 12, Dec. 2010.
[9] Z. Quan, S. Cui, H. V. Poor, and A. H. Sayed, “Collaborative wideband sensing for cognitive radios,” IEEE Signal Process. Mag. Vol. 25, no. 6, pp. 60–73, Nov. 2008.
[10] Y. W. Peter Hong, Wan Jan Huang, and C. C. Jay Kuo, Cooperative Communications and Networking: Technologies and System Design, Springer 2010.
[11] P. A. Anghel, G. Leus, and M. Kaveh, “Distributed Space-Time Cooperative Systems with Regenerative Relays,” IEEE Transactions on Wireless Communications, vol. 5, no. 11, pp. 3130–3141, Nov. 2006.
[12] C. S. Patel and G. L. Stuber, “Channel Estimation for Amplify and Forward Relay Based Cooperation Diversity Systems,” IEEE Transactions on Wireless Communications, vol. 6, no. 6, pp.2348–2356, Jun. 2007.
[13] A. Nosratinia, T. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” Communications Magazine, IEEE, vol. 42, pp. 74–80, oct. 2004.
[14] Y. Jing and H. Jafarkhani, “Single and multiple relay selection schemes and their achievable diversity orders,” Wirelaee Communications, IEEE Transactions on, vol. 8, pp. 1414–1423, march 2009.
[15] Y. Jing and B. Hassibi, “Distributed space-time coding in wireless relay network,” Wireless Communications, IEEE Transactions on, vol. 5, pp. 3524–3536, December 2006.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code