跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.169) 您好!臺灣時間:2025/10/29 18:05
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:葉子鳴
研究生(外文):Yeh, Tzu-Ming
論文名稱:基於最大安全容量下合作式通訊系統的中繼站選擇
論文名稱(外文):Relay Selection in the Cooperative Communication System Based on the Maximum Security Capacity
指導教授:楊政穎楊政穎引用關係
口試日期:2019-01-22
學位類別:碩士
校院名稱:臺北市立大學
系所名稱:資訊科學系碩士在職專班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:46
中文關鍵詞:合作式通訊系統中繼站選擇最大安全容量放大後傳送編碼後傳送最大比例組合選擇性組合
外文關鍵詞:Cooperative CommunicationRelay SelectionMaximum Security CapacityAmplify and ForwardDecode and ForwardMaximum-Ratio combiningSelective combination
相關次數:
  • 被引用被引用:0
  • 點閱點閱:140
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:1
在現今的無線通訊發展過程中,因多媒體網路的興起,拉動了對於訊息傳播所需要的媒介,所創造出的無線頻寬需求隨著各式運用訊速拉升,合作式通訊利用空間多樣性改善無線通訊系統的效能;無線通訊系統合作式通訊架構之下,所有節點均可同時扮演著發端送節點、中繼節點以及接收端節點三個不同的角色;透過節點與節點之間相互的串接與轉發,使得傳輸資訊更為可靠、傳輸率更高,也因此簡化了硬體的複雜度與成本,進而降低整個基礎建置的需求達成低成本的網路建置,因此如何在最大的安全容量下利用合作式通訊系統進行傳輸成為了一個重要的議題。
在大多數無線傳輸過程之中,因各節點間均處在開放式的環境下進行空中傳播,所以大多數情況之下安全威脅多來自訊號欄截以及中繼站偽裝的資訊竊取,傳統上利用金鑰進行封包加解密的過程,需花費大量的運算資源,一般屬於上層處理,事實上,實體層即具安全的傳輸能力。
為了求得最大安全容量下的中繼站選擇,本論文使用了放大後傳送機制、編碼後傳送機制,並利用,最大比例組合及選擇性組合為接收端機制得到最大的吞吐量。而在最大安全容量的計算上,我們使用了暴力法以求得最佳的結果,以驗證演算法的有效性。
In the wireless communication development of nowadays, the need for information communicating medias is also elevated by prosperity of multi-media internet. The created wireless bandwidth demand is rapidly growing with various applications, and cooperative communication could support to improve wireless communication system efficiency through Spatial Diversity. In the wireless communication system based on the cooperative communication, all nodes can take different roles simultaneously as node for sending, node for relay, and receive destination. Through mutual association and forwarding among nodes, this could lead to a more reliable and efficient information transmission. With these facts, the hardware complexity and cost could be lowered and reduce demand for basic establishment to build a low-cost internet. Therefore, how to use cooperative communication system to transmit with maximum security capacity has become an important issue.
In most wireless transmission, each node proceeds broadcast in the air in open environment, and hence most security threats would come from signal interception and information eavesdropping by disguised relay. Traditionally, the process of packet encryption and decryption with key needs to cost massive calculation resource which is the process in high level of network. However, physical layer actually has the safely transmission ability.
To achieve relay selection with maximum secrecy capacity, this article applies AF mode and CF mode to compliment with MRC and SC as receive station mode to achieve maximum bandwidth capacity. On the maximum security capacity calculation, we apply method of exhaustion to achieve best result and to prove effectiveness of the algorithm.
摘要 I
Abstract III
目錄 V
圖目錄 VII
表目錄 IX
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究目的 2
第四節 研究問題 2
第五節 名詞釋義 3
1. 合作式通訊 3
2. 放大後轉發模式 3
3. 解碼後轉發模式 3
4. 壓縮後轉發模式 4
第二章 文獻探討 5
第一節 沈農的安全通訊系統理論 5
第二節 無線網路威脅 6
第三節 合作式通訊系統架構 9
1. 放大後轉發模式 10
2. 解碼後轉發模式 11
3. 壓縮後轉發模式 12
第四節 窮舉演算法 15
第三章 基於最大安全容量之中繼站選擇 19
第一節 簡介 19
第二節 竊密者偽裝為中繼站 19
第三節 最大安全容量選擇 20
第四章 模擬結果與討論 25
第一節 模擬範圍 25
第二節 使用AF MODE MRC最大安全容量分析 26
第三節 使用AF MODE SC最大安全容量分析 29
第四節 使用DF MODE MRC最大安全容量分析 32
第五節 使用DF MODE SC最大安全容量分析 35
第六節 綜合分析 39
第七節 實驗結論 40
第五章 結論 41
參考文獻 43
[1]. 林秉忠、陳彥銘, "無線網路安全白皮書", 台灣電腦網路危機處理暨協調中心 ( TWCERT / CC ) , 2003
[2]. 陳偉康, “淺談「窮舉法」,” 數學教育第三十六期, 2014
[3] Cisco Co., Systems Cisco. Cisco visual networking index: Forecast and methodology, 2017-2022, https://goo.gl/fT2pGW
[4] Ben-Jye Chang and Syuan-Hong Liou, “Adaptive cooperative communication for maximizing reliability and reward in ultra-dense small cells LTE-A toward 5G cellular networking,” Computer networks, Vol. 115, pp. 16-28, 2017
[5] Amrita Dubey and Anand Vardhan Bhalla, “An investigation of DAF protocol in wireless communication,” International research journal of engineering and technology, Vol. 04, pp. 1364-1368, 2017
[6] Fengyou Sun and Yuming Jiang, “A Statistical property of wireless channel capacity: theory and application,” ACM SIGMETRICS performance evaluation review, Vol. 45(2), 2017, https://goo.gl/WqEMgN
[7] E. C. van der Meulen, “Three-terminal communication channels, ” Advances in applied probability, Vol. 3(1), pp.120–154, 1971
[8] Thomas Cover and Abbas El Gamal, “Capacity theorems for the relay channel, ” IEEE transactions on information theory, Vol. 25(5), 1979
[9] Sendonaris, Elza Erkip, and Behnaam Aazhang, “User cooperation diversity part I: system description,” IEEE transactions on communications, Vol. 51(11), pp. 1927–1938, Nov. 2003
[10] Yao-Win Hong, Wan-Jen Huang, Fu-Hsuan Chiu, and C.-C. Jay Kuo, “Cooperative communications in resource-constrained wireless networks, ” IEEE signal processing magazine, Vol. 24(3), pp. 47–57, May 2007
[11] Nosratinia Aria, Todd E. Hunter, and Ahmadreza Hedayat, “Cooperative communication in wireless networks,” IEEE communications magazine, Vol. 42(10), pp. 74–80, Oct. 2004
[12] Chirag Patel and Gordon L. Stüber, “Channel estimation for amplify and forward relay based cooperation diversity systems,” IEEE transactions on wireless communications, Vol. 6(6), pp.2348-2356, 2007
[13] Gurpreet Singh, "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security," International journal of computer applications, Vol. 67(19), pp. 33-38, 2013
[14] Da Silva, Eduardo and Dluiz Carlos P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE wireless communications, Vol. 15(5), pp.46-52, 2008
[15] Yingbin Liang, H. Vincent Poor and Lei Ying, "Wireless broadcast networks: reliability, security, and stability," Proceedings of the 3rd workshop on information theory and applications, pp. 249-255, 2008
[16] Yin Wang and Guevara Noubir, "Distributed cooperation and diversity for hybrid wireless networks," IEEE transactions on mobile computing, Vol. 12(3), pp. 596-608, 2013
[17] Ioannis Krikidis, John S. Thompson and Steve McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE transactions on wireless communications, Vol. 8(10), pp. 5003-5011, 2009
[18] Vijay Garg, “Wireless communications & networking.,” Morgan Kaufmann, 2010
[19] Claude E. Shannon, "Communication theory of secrecy systems." Bell labs technical journal, Vol. 28(4), pp. 656-715, 1949
[20] Claude E. Shannon, “Communication in the presence of noise." Proceedings of the IRE, Vol. 37(1), pp. 10-21. 1949
[21] Elzbieta Beres and Raviraj Adve, "Selection cooperation in multi-source cooperative networks," IEEE transactions on wireless communications, Vol. 7(1), pp. 118-127, 2008
[22] Laneman , J. Nicholas and Gregory W. Wornell , “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE transactions on Information theory, Vol. 49(10), pp. 2415–2425, 2003
[23] Yang, Cheng-Ying, Yi-Shan Lin and Jyh-Horng Wen, "Greedy algorithm applied to relay selection for cooperative communication systems in amplify-and-forward mode," Journal of electronic science and technology, Vol. 12(1), pp. 49-53, 2014
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊