Responsive image
博碩士論文 etd-0907110-232913 詳細資訊
Title page for etd-0907110-232913
論文名稱
Title
使用時空編碼的合作式網路中針對中繼點惡意行為之研究
The Study of Malicious Behavior in Space-Time Coded Cooperative Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
60
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2010-09-06
繳交日期
Date of Submission
2010-09-07
關鍵字
Keywords
合作式通訊、正交時空區塊編碼、追蹤符元
OSTBC, cooperative communication., tracing symbols
統計
Statistics
本論文已被瀏覽 5660 次,被下載 0
The thesis/dissertation has been browsed 5660 times, has been downloaded 0 times.
中文摘要
這篇論文主要在探討在合作式網路中,偵測中繼點之惡意行為的安全議題。網路中包含了一個來源端,兩個中繼點,及一個目的端,中繼點採用正交時空區塊編碼(Orthogonal Space Time Block Code, OSTBC)來實現空間多樣性(spatial diversity)。合作式通訊系統耗費兩個時槽將資料傳送到接收端,在第一個時槽中,來源端利用無線媒介廣播的特性將資料傳送到中繼點與目的端,並且在傳送信號中隨機插入多個追蹤符元(tracing symbol),這些追蹤符元的擺放位置極為隨機,只有來源端跟目的端預先得知,隨機擺放的目的是為了防止中繼點逃避惡意行為偵測,中繼點成功解碼訊號後,採用正交時空區塊編碼對傳送符元作預編碼,並在第二個時槽送出。在來源端與中繼點間的通道我們考慮兩種情況,第一種是假設通道為絕對理想的狀態,因此,中繼點永遠可以正確解碼來源訊號,第二種則是通道會因為衰變而使得中繼點無法成功解碼,無論是哪一種假設,中繼點都有一定的機率隨機發生惡意的行為。目的端接收訊號後,會將隨機擺放的追蹤符元擷取並進行訊號偵測,再估算其偵測值及實際值的相關性,依相關性來判斷各個中繼點是否有異常行為,再根據接收訊號的平均強度判斷異常的中繼點是否無法解碼或產生惡意行為,從電腦模擬結果中,我們驗證了論文中提出的方法可以有效降低由於惡意中繼點所造成的錯誤率。
Abstract
In our thesis, we investigate the detection of malicious behavior in cooperative networks. Our model contain one source, one destination and two relays where relays adopt Orthogonal Space Time Block Code (OSTBC) to achieve spatial diversity. Cooperative communication takes two phases to forward signal to the destination. During first phase, source broadcasts data symbols to relay and destination, and a few tracing symbols are inserted randomly in data symbols. The values and positions of tracing symbols are known at source and destination. The random placement of tracing symbols is to prevent relays evade the detection of malicious behavior. In second phase, relays adopt orthogonal space time block code to forward the received signals after decoding source message successfully. We consider two scenarios based on the decoding capability at relays. The first scenario assumes perfect source–relay links. So, relays can always decode symbols correctly. Second scenario considers decoding failures at relays. In both scenarios, relays have a certain probability to perform maliciously. After receiving symbols at destination, the destination extracts and detect the tracing symbols. The malicious behavior of relay is detected depending on the value of the correlation between detected and exact tracing symbols. Moreover, depending on the average received energy, we can distinguish whether relays behaves as in outage. Through computer simulation, we can verify that our proposed tracing algorithm and decoding strategy reduce bit error rate.
目次 Table of Contents
Abstract i
摘要 ii
目錄 iii
圖索引 iv
表索引 v
第一章 簡介 01
第二章 相關背景 04
第三章 系統模型 14
第四章 中繼點的行為偵測 17
4-1假設一:來源端與中繼點之間的通道為完美狀態 18
4-2假設二:來源端與中繼點之間為衰變通道 22
第五章 目的端解調偵測技術 27
5-1假設一:來源端與中繼點之間的通道為完美狀態 27
5-2假設二:來源端與中繼點之間為衰變通道 35
第六章 模擬結果和比較 38
第七章 結論與未來展望 46
參考文獻 47
參考文獻 References
[1] J.Laneman , D. Tse, and G. Wornell , “Cooperative diversity in wireless networks:efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, pp. 3062–3080, Dec. 2004.
[2] M. Janani, A. Hedayat, T.E. Hunter, and A. Nosratinia, “Coded cooperation in wireless communications: Space-time transmission and iterative decoding,” IEEE Transactions Signal Processing, vol. 52, pp. 362–371, Feb. 2004.
[3] Yinian Mao and Min Wu, ”SECURITY ISSUES IN COOPERATIVE COMMUNICATIONS:TRACING ADVERSARIAL RELAYS”, Department of ECE, University of Maryland, College Park, MD, USA
[4] Yinian Mao, Member, IEEE, and Min Wu, Senior Member, IEEE, Tracing Malicious Relays in Cooperative Wireless Communications, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007
[5] S. Dehnie, H. T. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in Conference on Information Sciences and Systems, CISS 2007,March 2007.
[6] Ha Duyen Trung; Benjapolakul, W.; Araki, K. “A Study on the Channel Capacity of Multiple-Input Multiple-Output (MIMO) Wireless System,” Wireless and Optical Communications Networks, WOCN '07. IFIP International Conference on 2007 , pp.1 – 6.
[7] M. Abdallah and H. C. Papadopoulos, “Beamforming algorithms for decoded-
and-forward relaying in wireless networks,” in Proc. on the Conference on Information Sciences and Systems (CISS), 2005.
[8] Y. Jing and H. Jafarkhani, “Network beamforming using relays with perfect channel information,” IEEE Transactions on Information Theory, vol. 55, pp. 2499 –2517, june 2009.
[9] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple cooperative diver-
sity method based on network path selection,” IEEE J. Select. Areas Commun.,
vol. 24, pp. 659–672, Mar. 2006.
[10] Y. Jing and H. Jafarkhani, “Single and multiple relay selection schemes and their achievable diversity orders,” IEEE Transactions on Wireless Communications, vol. 8, pp. 1414 –1423, march 2009.
[11] B. S. Mergen and A. Scaglione, “Randomized space-time coding for distributed cooperative communication,” in IEEE International Conference on Communications (ICCC), 2006.
[12] Y. Jing and B. Hassibi, “Distributed space-time coding in wireless relay networks,” IEEE Transactions on Wireless Communications, vol. 5, pp. 3524 –3536, december 2006. 53
[13] Tsang-Yi Wang, Member,, Li-Yuan Chang, Dyi-Rong Duh, and Jeng-Yang Wu, “Fault-Tolerant Decision Fusion via Collaborative Sensor Fault Detection in Wireless Sensor Networks,” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 2, FEBRUARY 2008
[14] Yinian Mao and Min Wu,“SECURITY ISSUES IN COOPERATIVE COMMUNICATIONS: TRACING ADVERSARIAL RELAYS,”
[15] Siavash M. Alamouti “A Simple Transmit Diversity Technique for Wireless Communications,” IEEE JOURNAL ON SELECT AREAS IN COMMUNICATIONS, VOL. 16, NO. 8, OCTOBER 1998
[16] S. Dehnie, H. T. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay : Performance analysis,” submitted to IEEE Sarnoff Symposium 2007.
[17] Pingyi Fan, Senior , Chen Zhi, Chen Wei, and Khaled Ben Letaief “Reliable Relay Assisted Wireless Multicast Using Network Coding,” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE 2009
[18] Tsang-Yi Wang, Li-Yuan Chang, “Dyi-Rong Duh, and Jeng-Yang WuFault-Tolerant Decision Fusion via Collaborative Sensor Fault Detection in Wireless Sensor Networks,” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 2, FEBRUARY 2008
[19] Yingbin Liang, Venugopal V. Veeravalli, and H. Vincent Poor, “ Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution,” IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
[20] J. N. Laneman and G. Wornel, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Trans.Inform. Theory, vol. 49, pp. 2415-2425, Oct. 2003.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.135.200.211
論文開放下載的時間是 校外不公開

Your IP address is 3.135.200.211
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code