(3.232.129.123) 您好!臺灣時間:2021/02/26 20:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:江宗錡
研究生(外文):Tsung-Chi Chiang
論文名稱:存在竊聽者感測網路之分散式偵測使用通道選擇
論文名稱(外文):Distributed Detection with Channel Selection in Sensor Networks in the Presence of Eavesdroppers
指導教授:王藏億
指導教授(外文):Tsang-Yi Wang
學位類別:碩士
校院名稱:國立中山大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2018
畢業學年度:106
語文別:中文
論文頁數:32
中文關鍵詞:分散式偵測竊聽者無線感測網路通道選擇物理層安全
外文關鍵詞:Wireless Sensor NetworksEavesdropperDistributed DetectionPhysical-Layer SecurityChannel Selection
相關次數:
  • 被引用被引用:0
  • 點閱點閱:48
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來, 感測網路因很多個低成本、低功率和微型的感測器的組成而被廣泛地應用。無線感測網路
中的感測器需要處理重要且複雜的資訊, 經由無線通訊傳送給合法使用者, 因感測器大部分是在開放
空間傳輸訊息, 在傳送的過程中容易被竊聽者竊聽,由於現實中每個通道環境的狀況不同,因此融合中
心須具備有通道狀況選擇的能力來確保接收正確的資訊。
本篇論文主要考慮感測器至接收端的通道為雷利衰減通道,當感測器傳送訊息時, 融合中心會優先
選擇通道增益較佳的來接收, 並且利用似然比測試分析其接收的資訊使其錯誤率最小, 並使竊聽者的
錯誤率不低於某一設定需求。
In recent years, wireless sensor networks are widely used because they comprised a large
number of low-cost, low-power and miniature sensors. In wireless sensor networks, the sensors
need to deal with the important and complex information, moreover, they transmit across a
wireless communication network to legitimate users. Since most of the sensors transmit message
in open area, the eavesdroppers are easy to tap in the transfer process. Owing to each channel
environment is different in reality, the fusion center must have the ability of channel selection
to ensure that correct information is received.
In this thesis, the channels considered from sensors to receiver are Rayleigh Fading Channel.
When sensors transmit message, the FC will prioritize in choosing the better channel gain to
receive signals. Likelihood Ratio Test is then used to analyze the received data in FC and
achieve the smallest FC’s error probability while maintaining the eavesdropper’s error probability
not lower than a required value.
論文審定書 i
摘要 ii
Abstract iii
1 序論 1
1.1 介紹. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.2 文獻回顧. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 研究動機與方法. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
1.4 論文架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 系統模型與閥值判斷準則 4
2.1 系統模型. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 融合中心判斷準則. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 竊聽者判斷準則. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3 模擬結果和分析 11
3.1 模擬方法設計. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2 模擬結果. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
4 結論 22
參考文獻 23
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks,
vol. 52, no. 12, pp. 2292-2330, 2008.
[2] H.-N. Dai, Q. Wang, D. Li, and R. C.-W. Wong, “On eavesdropping attacks in wireless
sensor networks with directional antennas,” International Journal of Distributed Sensor
Networks, vol. 2013, 2013.
[3] I. Csisz´ar and J. K¨orner, Information Theory: Coding Theorems for Discrete Memoryless
Systems. Cambridge University Press, 2011.
[4] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor
networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second
Quarter 2006.
[5] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications
for IOT under eavesdropper collusion,” IEEE Transactions on Automation Science and
Engineering, vol. 13, no. 3, pp, 1281-1293, July 2016.
[6] M. Baldi, M. Bianchi, N. Maturo, and F. Chiaraluce, “A Physical Layer Secured Key
Distribution Technique for IEEE 802.11g Wireless Networks,” IEEE Wireless Communications
Letters, vol. 2, no. 2, pp. 183-186, April 2013.
[7] S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, Y. Shah, W. Trappe, and N.
Mandayam, “Exploiting The Physical Layer for Enhanced Security [Security and Privacy
in Emerging Wireless Networks],” IEEE Wireless Communications, vol. 17, no. 5, pp.
63-70, October 2010.
[8] H. Taha and E. Alsusa, “A MIMO Precoding Based Physical Layer Security Technique
for Key Exchange Encryption,” 2015 IEEE 81st Vehicular Technology Conference (VTC
Spring), pp. 1-5, May 2015.
[9] H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, “Secure type-based multiple access,” IEEE
Transactions on Information Forensics and Security, vol. 6, no. 3, pp.763-774, September
2011.
[10] T. C. Aysal and K. E. Barner, “Sensor data cryptography in wireless sensor networks,”
IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 273-289, June
2008.
[11] V. Nadendla, “Secure Distributed Detection inWireless Sensor Networks via Encryption of
Sensor Decision,” M.S. thesis, Louisiana State University and Agricultural and Mechanical
College, Baton Rouge, LA, USA, 2009.
[12] S. Marano, V. Matta, and P. K. Willett, “Distributed detection with censoring sensors
under physical layer secrecy,” IEEE Transactions on Signal Processing, vol. 57, no. 5, pp.
1976-1986, May 2009.
[13] B. Kailkhura, V. S. Siddhardh Nadendla, and P. K. Varshney, “Distributed Inference in
The Presence of Eavesdroppers: A Survey,” IEEE Communications Magazine, vol. 53, no.
6, pp. 40-46, June 2015.
[14] V. Nadendla, H. Chen, and P. K. Varshney, “Secure Distributed Detection in The Presence
of Eavesdroppers,” in Signals, Systems and Computers (ASILOMAR), 2010 Conference
Record of the Forty Fourth Asilomar Conference on, pp. 1437-1441, November 2010.
[15] J. Guo, X. Li, U. Roger, H. Chen, “Secrecy Design in Distributed Detection for Large
Sensor Networks,” 2016 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), March 20-25, 2016.
[16] Po-Ning Chen, Hong-BinWu, The Maximum-Likelihood Soft-Decision Sequential Decoding
Algorithms for Convolutional Codes, For the Degree of Master of Science, National Chiao
Tung University, Hsinchu, Taiwan 300, R.O.C., June 1999.
電子全文 電子全文(網際網路公開日期:20230625)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔