| 研究生: |
黃建智 Huang, Chien-Chih |
|---|---|
| 論文名稱: |
中繼網路之通道統計特性惡意行為偵測方案 A Novel Misbehavior Detection for the Relay Network Using Channel Statistics |
| 指導教授: |
張志文
Chang, Wenson |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 英文 |
| 論文頁數: | 45 |
| 中文關鍵詞: | 實體層安全機制 、惡意行為偵測 、多樣性增益 、中繼點選擇機制 、機會性中繼 |
| 外文關鍵詞: | physical layer security, misbehavior detection, cooperative diversity, relay selection, opportunistic relaying |
| 相關次數: | 點閱:184 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在中繼網路中, 可靠的實體層安全機制是傳輸成功與否的關鍵, 兩個典型的議題分別是自私的中繼行為以及竄改傳輸訊息, 在文獻中已經有很多方案被提出來解決這些問題。事實上, 有一種非典型但具破壞性的惡意行為可以使得合作式通訊的多樣性增益消失, 在本篇論文中, 我們使用”偽裝”(masquerade) 象徵這樣的惡意行為, 帶有這種惡意行為的中繼點會假裝自己是通道狀況最好的中繼點同時剝奪其他中繼點合作的可能性。我們發現這種惡意行為的偵測機制尚未被開發出來, 因此在本篇論文中, 我們提出了”likelihoodmasquerade detection”(LMD)方案以復原分散式中繼網路中的多樣性增益,LMD的運作方式是去計算選中的中繼點合作與惡意的機率大小, 如果某個中繼點惡意機率比較大的次數超過系統設定的閥值, 系統就會判定此中繼點有惡意行為。在模擬結果的章節中, 我們將以”通道容量”以及”中斷機率”來展示使用了LMD 後的系統表現, 另外也會對於在LMD 上做功率控制進行討論。
In the relay network, trustworthy physical layer security is the key to its successful applications. Two typical issues of physical layer security are selfishness and garbling. In the literature, many schemes have been proposed to address these issues. In fact, a certain non-typical but severely harmful misbehavior can also thoroughly remove the cooperative diversity gain from the relay network. Here, we coin ”masquerade” to clearly indicate this kind of misbehavior. A masquerade relay is the malicious one who can always pretend to be the best and consequently deprive the others of the opportunities to cooperate. To the best of our knowledge, the masquerade misbehavior detection has not yet been investigated. Thus, in this paper, we propose a likelihood masquerade detection (LMD) scheme to recover the cooperative diversity gain in the distributed relay networks. In LMD, the probability of the selected relay to be a cooperative one (Pc) and that to be a masquerade one (Pm) are first calculated. Afterwards, the masquerade relay can be sentenced when Pm > Pc occurs more frequently than a predefined threshold. The simulation results prove the effectiveness of the proposed LMD scheme in terms of capacity and outage probability. The impact of the power control mechanism on the masquerade detection is also discussed.
[1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. part i. system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, Nov. 2003.
[2] J. Laneman, D. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Processing Magazine, vol. 24, no. 3, pp. 47–57, May 2007.
[4] H. Eghbali, S. Muhaidat, S. Hejazi, and Y.-W. Ding, “Relay selection strategies for single-carrier frequency-domain equalization multi-relay cooperative networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 2034–2045, May 2013.
[5] R. Joda and F. Lahouti, “Network code design for orthogonal two-hop network with broadcasting relay: A joint source-channel-network coding approach,” IEEE Transactions on Communications, vol. 60, no. 1, pp. 132–142, Jan. 2012.
[6] Q. Cao, H. Zhao, and Y.-D. Jing, “Power allocation and pricing in multiuser relay networks using stackelberg and bargaining games,” IEEE Transactions on Vehicular Technology, vol. 61, no. 7, pp. 3177–3190, Sept. 2012.
[7] R.-Q. Zhang, L.-Y. Song, Z. Han, and B.-L. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[8] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[9] S. Dehnie and N. Memon, “Detection of misbehavior in cooperative diversity,” in Military Communications Conference (MILCOM), Nov. 2008, pp. 1–5.
[10] H.-J. Zhu, X.-D. Lin, R.-X. Lu, and Y.-F. Fan, “Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4628–4639, Oct. 2009.
[11] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Vehicular Technology Conference (VTC Fall), Sept. 2011, pp. 1–5.
[12] Y.-M. Yi, L.-C. Lo, and W.-J. Huang, “On blind sequential detection of misbehaving relay,” in Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Dec. 2012, pp. 1–4.
[13] A. Bletsas, A. Khisti, D. Reed, and A. Lippman, “A simple cooperative diversity method based on network path selection,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 659–672, March 2006.
[14] R. Gangula and R. Bhattacharjee, “Performance of selection cooperation in the presence of a malicious relay,” in Wireless Communication Systems (ISWCS), Sept. 2010, pp. 408–412.
[15] E. Beres and R. Adve, “On selection cooperation in distributed networks,” in 40th Annual Conference on Information Sciences and System, March 2006, pp. 1056–1061.
[16] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[17] A. Turkmani, “Probability of error for m-branch macroscopic selection diversity,” Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, pp. 71–78, Feb. 1992.
[18] Y.-D. Jing and J. Hamid, “Single and multiple relay selection schemes and their achievable diversity orders,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1414–1423, March 2009.
[19] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Vehicular Technology Conference (VTC Fall), Sept. 2011, pp. 1–5.
[20] H.-T. Wu and C.-W. Chang, “A high capacity cell architecture based on alamouti coded relay strategy and frequency allocation scheme,” in Wireless Communications and Networking Conference (WCNC), April 2012, pp. 3074–3079.
[21] M.-H. Chen, S.-C. Lin, Y.-W. Hong, and X.-Y. Zhou, “On cooperative and malicious behaviors in multi-relay fading channels,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1126–1139, July 2013.
[22] Q.-Y. Zou, S.-F. Zheng, and A. Sayed, “Cooperative sensing via sequential detection,” IEEE Transactions on Signal Processing, vol. 58, no. 12, pp. 6266–6283, Dec. 2010.
[23] Y. Zhang and L. Lazos, “Countering selfish misbehavior in multi-channel mac protocols,” in INFOCOM, April 2013, pp. 2787–2795.
[24] Y.-N. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 2, pp. 198–212, June 2007.
[25] L.-C. Lo, Z.-J. Wang, and W.-J. Huang, “Noncoherent misbehavior detection in space-time coded cooperative networks,” in Acoustics, Speech and Signal Processing (ICASSP), March 2012, pp. 3061–3064.
[26] J. Zhang and J. Andrews, “Distributed antenna systems with randomness,” IEEE Transactions on Wireless Communications, vol. 7, no. 9, pp. 3636–3646, Sept. 2008.
校內:2017-09-10公開