跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.83) 您好!臺灣時間:2024/12/09 15:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:羅立中
研究生(外文):Li-chung Lo
論文名稱:可信賴合作式網路設計
論文名稱(外文):Design of reliable cooperative networks
指導教授:黃婉甄黃婉甄引用關係
指導教授(外文):Wan-Jen Huang
學位類別:博士
校院名稱:國立中山大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:英文
論文頁數:53
中文關鍵詞:非同調失序行為檢測合作式通訊通道估測
外文關鍵詞:Noncoherent misbehavior detectionChannel estimationCooperative communication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:195
  • 評分評分:
  • 下載下載:5
  • 收藏至我的研究室書目清單書目收藏:0
合作式通訊在過去十幾年間引起了廣大的興趣,經由與其他使用者的合作傳輸,使得整體系統性能得到空間分集的增益。目前已經有不同的合作式策略利用合作式網路的拓樸或是通道資訊來增加功率或頻譜效益。但這些策略大多數是建立在中繼端是完全合作的基本假設下發展的,然而如果中繼端本身由於自私或其他惡意行為而失常,則合作系統的效能可能因此嚴重降低。但現在關於中繼端行為檢測的相關研究,都是假設終端能獲得來自中繼端完美的通道狀態資訊進而判斷中繼端的行為是否正常,然而如果中繼端本身的行為已經不正常了,那終端經由通道估測獲得來自中繼端來的通道資訊其實是有很大問題的。因此在不需要完美通道資訊的中繼端失序行為檢測成為一個具有挑戰性和關鍵性的研究領域。在本篇論文中,我們先著手於單一中繼端系統,此中繼端傳送二維相移鍵控上任意的星座點訊號來擾亂接收端的傳輸。因此,靠著測量平均的接收功率以及觀察追蹤符元的相位分布,我們提出在不需要瞬時通道資訊的中繼端非同調失序檢測。再來,我們考慮多個中繼端系統,提出藉由觀察估測通道二階統計特性的中繼端非同調失序檢測。為了確保在真實世界中的應用場景,合作式網路必須有能力在不同的調變下檢測任意的失序行為,於是本篇論文最後提出藉由觀察估測通道的相關性來滿足特定系統的需求。
Cooperative communication has attracted extensive interest over the past decade due to the ability it gives nodes to exploit additional spatial diversity gain though user cooperation. Various cooperative strategies have been proposed for enhancing the power or spectrum efficiency in networks with different topologies or availabilities of channel information. However, most of these strategies assume that the relays are fully cooperative. Thus, if a relay misbehaves due to selfish or adversarial reasons, the efficiency of the cooperative system may be severely degraded. Existing schemes for detecting misbehaving nodes assume perfect channel state information (CSI) at the destination. However, when the relays misbehave, the channel estimates could be doubted. Consequently, noncoherent misbehavior detection is a crucial research area in the cooperative communication field. This dissertation commences by considering the straightforward case of a single relay system in which the misbehaving relay simply garbles the retransmitted symbols randomly as one of the other quadrature phase-shift keying (QPSK) signal points. Thus, by measuring the average received energy, and observing the distribution of the phase rotations of the tracing symbols, misbehavior of the relay can be determined with no knowledge of the CSI. The dissertation next considers the case of a multi-relay system, and proposes a misbehavior detection scheme based on the secondorder statistics of the channel estimates for the relay-destination links. To ensure their practicality for real-world applications, cooperative networks must have the ability to detect arbitrary misbehavior patterns and different signal constellations. Consequently, the dissertation concludes by deriving a correlation-based detection statistic with which to characterize the detection performance given a specific misbehaving pattern and to customize the detector if needed to meet a specified system requirement.
Graduation Thesis Approval i
Chinese Abstract ii
Abstract iii
Contents iv
List of Figures vi
1 INTRODUCTION 1
2 NONCOHERENT MISBEHAVIOR DETECTION FOR SINGLE-RELAY
IN COOPERATIVE SYSTEMS 5
2.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Detection of Misbehaving Relay . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1 Detection of Silence at the Relay . . . . . . . . . . . . . . . . . . . 9
2.2.2 Statistical Properties of Received Tracing Symbols . . . . . . . . . 10
2.2.3 Noncoherence Detection of Misbehaving Relay . . . . . . . . . . . 11
2.3 Computer Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3 NONCOHERENT MISBEHAVIOR DETECTION FOR TWO-RELAY
IN SPACE-TIME CODED SYSTEMS 18
3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.2 Statistics of Channel Estimates . . . . . . . . . . . . . . . . . . . . . . . . 21
3.3 Misbehavior Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Computer Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4 A GENERAL NONCOHERENT MISBEHAVIOR DETECTION 30
4.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2 Noncoherent Misbehavior Detection and Asymptotic Analysis . . . . . . . 32
4.2.1 Proposed Tracing-Based Noncoherent Detection of Misbehaving
Relays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.2.2 Asymptotic Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.3 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5 CONCLUSION 41
Bibliography 42
[1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity—part I: system description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no.12, Dec. 2004.
[3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Proc. Mag., vol. 24, no. 3, pp. 47–57, May 2007.
[4] Federal Communications Commission, “The mobile broadband spectrum challenge: international comparisons,” FCC White Paper, Wireless Telecommunications Bureau, Office of Engineering and Technology. Washington, DC.: Federal Communications Commission, pp. 1–19, Feb. 2013.
[5] C. Liang and F. R. Yu, “Wireless network virtualization: a survey, some research issues and challenges,” IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 358–380, Mar. 2015.
[6] F. Granelli, A. A. Gebremariam, M. Usman, F. Cugini, V. Stamati, M. Alitska, and P. Chatzimisios, “Software defined and virtualized wireless access in future wireless networks: scenarios and standards,” IEEE Commun. Mag., vol. 53, no. 6, pp. 26–34, Jun. 2015.
[7] K.-C. Lee, S.-H. Wang, C.-P. Li, H.-H. Chang, and H.-J. Li, “Adaptive resource allocation algorithm based on cross-entropy method for OFDMA systems,” IEEE Trans. Broadcast., vol. 60, no. 3, pp. 524–531, Sep. 2014.
[8] G. Araniti, “A low-complexity resource allocation algorithm for multicast service delivery in OFDMA networks,” IEEE Trans. Broadcast., vol. 60, no. 2, pp. 358–369, Jun. 2014.
[9] J. Xu, S.-J. Lee, W.-S. Kang, and J.-S. Seo, “Adaptive resource allocation for MIMOOFDM based wireless multicast systems,” IEEE Trans. Broadcast., vol. 56, no. 1, pp. 98–102, Mar. 2010.
[10] A. Moubayed, A. Shami, and H. Lutfiyya, “Wireless resource virtualization with device-to-device communication underlaying LTE network,” IEEE Trans. Broadcast., vol. 61, no. 4, pp. 734–740, Dec. 2015.
[11] P. Phunchongharn, E. Hossain, and D. I. Kim, “Resource allocation for device-todevice communications underlaying LTE-advanced networks,” IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013.
[12] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Proc. IEEE Veh. Tech. Conf. (VTC Fall), Sep. 2011, pp. 1–5.
[13] W. Gong, X. Wang, M. Li, and Z. Huang, “Round-robin resource sharing algorithm for device-to-device communications underlying SFN System,” in Proc. IEEE Veh. Tech. Conf. (VTC Spring), May 2014, pp. 1–5.
[14] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. Multimedia Security, Sep. 2002, pp. 107–121.
[15] S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol,” in Proc. 3rd ACM Intl. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Jun. 2002, pp. 226–236.
[16] Y. Mao and M. Wu, “Security issues in cooperative communications: tracing adversarial relays,” in Proc. IEEE Intl. Conf. Acoust., Spee. and Sig. Proc. (ICASSP), May 2006, pp. 14–19.
[17] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Trans. Inform. Forensics and Security, vol. 2, no. 2, pp. 198–212, Jun. 2007.
[18] T. A. Khalaf and S. W. Kim; “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” in Proc. IEEE Military Communications Conference (MILCOM), Nov. 2008, pp. 1–4.
[19] H. Liang and C. Wei, “Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks,” ELSEVIER Ad Hoc Networks, vol. 14, pp. 95–105, Mar. 2014.
[20] T. A. Khalaf, S. W. Kim, and A. E. Abdel-Hakim, “Tradeoff between reliability and security in multiple access relay networks under falsified data injection attack,” IEEE Trans. Inform. Forensics and Security, vol. 9, no. 3, pp. 1126–1139, Mar. 2014.
[21] S. Dehnie, H. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay: performance analysis,” in in Proc. IEEE Sarnoff Symposium, Apr. 2007, pp. 1–7.
[22] S. Dehnie, H. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in Proc. Conf. Inform. Science and Systems (CISS), Mar. 2007, pp. 895–899.
[23] Y. Liu, Y. Wu, and J. Tang, “Two tier detection model for misbehavior of lowpower nodes in virtual MIMO based wireless networks,” in Proc. IEEE International Conference on Information Assurance and Security (IAS), Aug. 2010, pp. 155–160.
[24] W. Hou, X. Wang, and A. Refaey, “Misbehavior detection in amplify-and-forward cooperative OFDM systems.” in Proc. IEEE Intl. Conf. Commun. (ICC), Jun. 2013, pp. 5345–5349.
[25] R. Changiz, H. Halabian, F.-R. Yu, I. Lambadaris, H. Tang, and P. C. Mason, “Trust establishment in cooperative wireless networks,” in Proc. IEEE Military
Communications Conference (MILCOM), pp. 1074–1079, Nov. 2010.
[26] Z. Han and Y.-L. Sun, “Securing cooperative transmission in wireless communications,” in Proc. Fourth Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous), Aug. 2007, pp. 1–6.
[27] L. Militano, M. Condoluci, G. Araniti, A. Molinaro, A. Iera, and G.M. Muntean, “Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services,” IEEE Trans. Broadcast., vol. 61, no. 2, pp. 263–278, Jun. 2015.
[28] C. Ma, Y. Li, H. Yu, X. Gan, X. Wang, Y. Ren, and J. Xu, “Cooperative spectrum sharing in D2D-enabled cellular networks,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4394–4408, Aug. 2016.
[29] C. Ye, G. Ozcan, M. C. Gursoy, and S. Velipasalar, “Multimedia transmission over cognitive radio channels under sensing uncertainty,” IEEE Trans. Signal Processing, vol. 64, no. 3, pp. 726–741, Feb. 2016.
[30] Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 4945–4950, Oct. 2009.
[31] M. Chraiti, H. Hakim, W. Ajib, and H. Boujemaa, “Spectrum sharing techniques for broadcast cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5880–5888, Nov. 2013.
[32] L. Liang, F. Khanb, M. Pesaventoa, T. Ratnarajahc, and S. Prakriyad, “Sequential search based power allocation and beamforming design in overlay cognitive radio networks,” ELSEVIER Signal Processing, vol. 97, pp. 221–231, Apr. 2014.
[33] L. Li, and et.al., “Energy-efficient transmission for protection of incumbent users,” IEEE Trans. Broadcast., vol. 57, no. 3, pp. 718–720, Sep. 2011.
[34] J. Park and S. Lee, “MIMO beamforming for QoS enhancement via analog, digital and hybrid relaying,” IEEE Trans. Broadcast., vol. 56, no. 4, pp. 493–503, Dec. 2010.
[35] R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, and H. Tang, “Trust establishment in cooperative wireless relaying networks,” Wireless Commun. Mobile Comput., vol. 14, no. 15, pp. 1450–1470, Oct. 2014.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊