進階搜尋


   電子論文尚未授權公開,紙本請查館藏目錄
(※如查詢不到或館藏狀況顯示「閉架不公開」,表示該本論文不在書庫,無法取用。)
系統識別號 U0026-0409201412105800
論文名稱(中文) 中繼網路之通道統計特性惡意行為偵測方案
論文名稱(英文) A Novel Misbehavior Detection for the Relay Network Using Channel Statistics
校院名稱 成功大學
系所名稱(中) 電腦與通信工程研究所
系所名稱(英) Institute of Computer & Communication
學年度 102
學期 2
出版年 103
研究生(中文) 黃建智
研究生(英文) Chien-Chih Huang
學號 q36014455
學位類別 碩士
語文別 英文
論文頁數 45頁
口試委員 指導教授-張志文
口試委員-卿文龍
口試委員-李彥文
口試委員-陳瓊璋
中文關鍵字 實體層安全機制  惡意行為偵測  多樣性增益  中繼點選擇機制  機會性中繼 
英文關鍵字 physical layer security  misbehavior detection  cooperative diversity  relay selection  opportunistic relaying 
學科別分類
中文摘要 在中繼網路中, 可靠的實體層安全機制是傳輸成功與否的關鍵, 兩個典型的議題分別是自私的中繼行為以及竄改傳輸訊息, 在文獻中已經有很多方案被提出來解決這些問題。事實上, 有一種非典型但具破壞性的惡意行為可以使得合作式通訊的多樣性增益消失, 在本篇論文中, 我們使用”偽裝”(masquerade) 象徵這樣的惡意行為, 帶有這種惡意行為的中繼點會假裝自己是通道狀況最好的中繼點同時剝奪其他中繼點合作的可能性。我們發現這種惡意行為的偵測機制尚未被開發出來, 因此在本篇論文中, 我們提出了”likelihoodmasquerade detection”(LMD)方案以復原分散式中繼網路中的多樣性增益,LMD的運作方式是去計算選中的中繼點合作與惡意的機率大小, 如果某個中繼點惡意機率比較大的次數超過系統設定的閥值, 系統就會判定此中繼點有惡意行為。在模擬結果的章節中, 我們將以”通道容量”以及”中斷機率”來展示使用了LMD 後的系統表現, 另外也會對於在LMD 上做功率控制進行討論。
英文摘要 In the relay network, trustworthy physical layer security is the key to its successful applications. Two typical issues of physical layer security are selfishness and garbling. In the literature, many schemes have been proposed to address these issues. In fact, a certain non-typical but severely harmful misbehavior can also thoroughly remove the cooperative diversity gain from the relay network. Here, we coin ”masquerade” to clearly indicate this kind of misbehavior. A masquerade relay is the malicious one who can always pretend to be the best and consequently deprive the others of the opportunities to cooperate. To the best of our knowledge, the masquerade misbehavior detection has not yet been investigated. Thus, in this paper, we propose a likelihood masquerade detection (LMD) scheme to recover the cooperative diversity gain in the distributed relay networks. In LMD, the probability of the selected relay to be a cooperative one (Pc) and that to be a masquerade one (Pm) are first calculated. Afterwards, the masquerade relay can be sentenced when Pm > Pc occurs more frequently than a predefined threshold. The simulation results prove the effectiveness of the proposed LMD scheme in terms of capacity and outage probability. The impact of the power control mechanism on the masquerade detection is also discussed.
論文目次 Chinese Abstract i
English Abstract ii
Acknowledgements iii
Contents iv
List of Figures vi
1 Introduction 1
1.1 Overview 1
1.2 Thesis Outline 2
2 Background and Literature Survey 3
2.1 Background for Cooperative Communication 3
2.2 Literature Survey 5
3 System Model 10
3.1 Channel Model and Cooperative Communication Strategy 10
3.1.1 Channel Model 10
3.1.2 Cooperative Communication Strategy 11
3.2 Misbehavior 14
3.2.1 Outage Probability 15
3.2.2 Diversity Analysis 18
4 Likelihood Masquerade Detection Scheme 19
4.1 Detection Process 19
4.2 Probability Analysis 24
4.2.1 Rayleigh Fading Channel 24
4.2.2 Rayleigh Fading Channel with Path Loss and Shadowing Effect 26
5 Simulation Results and Discussion 29
5.1 With OLPC 29
5.2 Without OLPC 34
5.3 Geographic Effect of Network Topology 38
6 Conclusion and Future Works 39
6.1 Conclusion 39
6.2 Future Works 40
Bibliography 41
Vita 45
參考文獻 [1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. part i. system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[2] J. Laneman, D. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 47–57, May 2007.
[4] H. Eghbali, S. Muhaidat, S. Hejazi, and Y.-W. Ding, “Relay selection strategies for single-carrier frequency-domain equalization multi-relay cooperative networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 2034–2045, May 2013.
[5] R. Joda and F. Lahouti, “Network code design for orthogonal two-hop network with broadcasting relay: A joint source-channel-network coding approach,” IEEE Transactions on Communications, vol. 60, no. 1, pp. 132–142, Jan. 2012.
[6] Q. Cao, H. Zhao, and Y.-D. Jing, “Power allocation and pricing in multiuser relay networks using stackelberg and bargaining games,” IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3177–3190, Sept. 2012.
[7] R.-Q. Zhang, L.-Y. Song, Z. Han, and B.-L. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[8] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[9] S. Dehnie and N. Memon, “Detection of misbehavior in cooperative diversity,” in Military Communications Conference (MILCOM), Nov. 2008, pp. 1–5.
[10] H.-J. Zhu, X.-D. Lin, R.-X. Lu, and Y.-F. Fan, “Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4628–4639, Oct. 2009.
[11] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Vehicular Technology Conference (VTC Fall), Sept. 2011, pp. 1–5.
[12] Y.-M. Yi, L.-C. Lo, and W.-J. Huang, “On blind sequential detection of misbehaving relay,” in Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Dec. 2012, pp. 1–4.
[13] A. Bletsas, A. Khisti, D. Reed, and A. Lippman, “A simple cooperative diversity method based on network path selection,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 659–672, March 2006.
[14] R. Gangula and R. Bhattacharjee, “Performance of selection cooperation in the presence of a malicious relay,” in Wireless Communication Systems (ISWCS), Sept. 2010, pp. 408–412.
[15] E. Beres and R. Adve, “On selection cooperation in distributed networks,” in 40th Annual Conference on Information Sciences and System, March 2006, pp. 1056–1061.
[16] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[17] A. Turkmani, “Probability of error for m-branch macroscopic selection diversity,” Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, pp. 71–78, Feb. 1992.
[18] Y.-D. Jing and J. Hamid, “Single and multiple relay selection schemes and their achievable diversity orders,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1414–1423, March 2009.
[19] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Vehicular Technology Conference (VTC Fall), Sept. 2011, pp. 1–5.
[20] H.-T. Wu and C.-W. Chang, “A high capacity cell architecture based on alamouti coded relay strategy and frequency allocation scheme,” in Wireless Communications and Networking Conference (WCNC), April 2012, pp. 3074–3079.
[21] M.-H. Chen, S.-C. Lin, Y.-W. Hong, and X.-Y. Zhou, “On cooperative and malicious behaviors in multi-relay fading channels,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1126–1139, July 2013.
[22] Q.-Y. Zou, S.-F. Zheng, and A. Sayed, “Cooperative sensing via sequential detection,” IEEE Transactions on Signal Processing, vol. 58, no. 12, pp. 6266–6283, Dec. 2010.
[23] Y. Zhang and L. Lazos, “Countering selfish misbehavior in multi-channel mac protocols,” in INFOCOM, April 2013, pp. 2787–2795.
[24] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[25] L.-C. Lo, Z.-J. Wang, and W.-J. Huang, “Noncoherent misbehavior detection in space-time coded cooperative networks,” in Acoustics, Speech and Signal Processing (ICASSP), March 2012, pp. 3061–3064.
[26] J. Zhang and J. Andrews, “Distributed antenna systems with randomness,” IEEE Transactions on Wireless Communications, vol. 7, no. 9, pp. 3636–3646, Sept. 2008.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2017-09-10起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw