(3.238.118.78) 您好!臺灣時間:2021/04/15 22:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:劉豐瑜
研究生(外文):Feng-Yu Liu
論文名稱:結合網路編碼與同態運算進行資料交換
論文名稱(外文):Wireless D2D Homomorphic Data Exchange with Butterfly Network Coding
指導教授:劉維正
指導教授(外文):Wei-Cheng Liu
口試委員:王蒞君丁培毅黃國軒
口試委員(外文):Li-Chun WangPei-yih TingKuo-Hsuan Huang
口試日期:2014-07-04
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:中文
論文頁數:63
中文關鍵詞:同態加密資料交換網路編碼裝置對裝置
外文關鍵詞:homomorphic encryptiondata exchangenetwork codingdevice-to-device
相關次數:
  • 被引用被引用:0
  • 點閱點閱:216
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
本篇論文分成兩個部份,第一部份探討裝置對裝置(Device-to-Device, D2D)通訊的資料交換,並且利用互斥或運算(exclusive or, XOR)與同態加密(homomorphic encryption)以提升系統的傳輸效率且不失資料的安全性。
第二部份探討可靠的網路建構(Reliable Butterfly Network Construction, RBC),考量到傳播路徑損耗(propagation path loss)與遮蔽效應(shadowing effect)的室外環境,針對網路編碼(network coding)的中繼節點選擇(relay selection)進行改善。
從結果得知,我們可以利用適當的網路編碼以提升傳輸效率,並且透過同態加密保有資料的安全性,及透過建構可靠的網路在某些中繼節點無法作用時,能有其他備用的網路節點繼續進行通訊。
In this thesis, we adopt exclusive or (XOR) operation and homomorphic encryption on Device-to-Device (D2D) data transmission. By doing so, we can improve the transmission efficiency without decrypting the data from the cipher domain.
Reliable Butterfly Network Construction (RBC) is an important issue as well. We modify the system model by taking propagation path loss and shadowing effect into consideration and choose appropriate relays to build a butterfly mesh network.
According to the result, we use appropriate network coding to improve the transmission efficiency, use homomorphic encryption to maintain the security of data and use RBC to construct a reliable network. If the main network relays cannot work, in this way, we would have backup relays to continue the communication.

誌謝 i
摘要 ii
Abstract iii
目錄 4
第一章 緒論 6
1.1 研究動機 7
1.2 相關研究 8
1.3 論文架構 9
第二章 背景知識 10
2.1 無線裝置對裝置通訊 10
2.2 同態加密 10
2.3 全同態加密 12
2.4 網路編碼 13
2.5 RC4加密演算法 14
第三章 無線裝置對裝置同態資料交換 15
3.1 無線資料交換簡介 15
3.2 網路拓樸分析 19
3.3 再談同態加密演算法 34
3.3.1 Pascal Paillier加密演算法 34
3.3.2 Craig Gentry全同態加密演算法 35
3.3.3 選用合適的同態加密演算法進行資料交換 37
第四章 考量大尺度衰減的無線可靠蝴蝶網路建構 41
4.1 可靠蝴蝶網路建構簡介 41
4.2 考量大尺度衰減的RBC網路建構 43
4.2.1 系統架構假設 43
4.2.2 通道模型假設 44
4.2.3 以SINR為評比標準建構RBC 45
第五章 數值分析結果 46
5.1 RBC_SINR模擬參數說明 46
5.2 模擬結果 47
第六章 結論與未來展望 49
參考文獻 50
附錄 62

[1] E. Dahlman, S. Parkvall, and J. Sköld, 4G LTE/LTE-Advanced for mobile broadband. Amsterdam: Academin Press, 2011, pp. 11-13.
[2] M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions,” IEEE Commun. Mag., vol. 52, pp. 86-92, May 2014.
[3] Bluetooth SIG, Inc. (2014). “A look at the basics of Bluetooth technology,” Available: http://www.bluetooth.com/Pages/Basics.aspx
[4] NFC Forum. (2014). “NFC and contactless technologies,” Available: http://nfc-forum.org/what-is-nfc/about-the-technology/
[5] C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP, vol. 1, pp. 1–15, Jan. 2007.
[6] B. Hayes, “Alice and Bob in cipherspace,” AmSci, vol. 100, no. 5, pp. 1, Sep.–Oct., 2012.
[7] W.K.Ruwan Indika Prasanna, “Preserving privacy for community location-based mobile cloud applications using homomorphic encryption,” Master thesis, Dept. Comm. Eng., National Chiao Tung Univ., Hsinchu, Republic of China, 2011.
[8] C. TATA and M. Kadoch, “RBC: Reliable Butterfly network Construction algorithm for network coding in wireless mesh network,” in Proc. The 13th Int. Conf. on Applied Informatics and Communications (AIC’13), Valencia, Spain, Aug. 6-8, 2013, pp. 291.
[9] C. TATA and M. Kadoch, “Secure network coding based data splitting for public safety D2D communications over LTE heterogeneous networks, ” in Proc. The 8th Int. Conf. on Communications and Information Technology (CIT’14), Tenerife, Spain, Jan. 10-12, 2014, pp. 243.
[10] C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford Univ., Standford, CA, 2009.
[11] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, “XORs in the air: practical wireless network coding”, IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 497 -510, Jun. 2008.
[12] G. Paul and S. Maitra, RC4 Stream Cipher and Its Variants. Boca Raton: CRC Press, 2011.
[13] B. A. Forouzan and S. C. Fegan, Data Communications and Networking. New York: McGraw-Hill, 2007, pp. 8-13.
[14] P. Paillier, “Public-key cryptosystems based on composite degree residuosity
classes,” in Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1999, pp. 223-238.
[15] H.-K. Chen, “An Improvement of Gentry’s “Fully homomorphic encryption scheme by reducing the number of public keys,” Master thesis, National Chengchi Univ., Taipei, Republic of China, 2012.
[16] M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers,” in Proc. The 29th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’10), 2010, pp. 24-43.
[17] S.-H. Yang, L.-C. Wang, J.-H. Huang, and A.-H. Tsai, “Network-assisted device-decided channel selection and power control for multi-pair device-to-device (D2D) communications in heterogeneous networks,” in IEEE Wireless Communications and Networking Conf., Istanbul, Turkey, Apr. 6-9, 2014, pp. 1379-1384.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔