簡易檢索 / 詳目顯示

研究生: 曾俊霖
Tseng, Chun-Lin
論文名稱: 在感知無線電中以通道為基礎偵測模仿主要使用者之攻擊
Channel-Based Detection of Primary User Emulation Attacker in Cognitive Radios
指導教授: 卿文龍
Chin, Wen-Long
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 68
中文關鍵詞: 感知無線電正交分頻多工實體層的認證跨層級的認證序列概率比試驗
外文關鍵詞: cognitive radio, OFDM, physical-layer authentication, cross-layer authentication, sequential probability ratio test, SPRT
相關次數: 點閱:93下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文探討的主題是感知無線電(cognitive radio, CR)如何在惡意的環境中辨識出攻擊者的存在。感知無線電被認為是解決當前頻譜使用效率不佳的重要技術,但隨著此技術的成熟發展,進而衍伸出許多值得探討的安全問題,其中較為人所研究的攻擊為模仿主要使用者攻擊(primary user emulation attacks, PUEA),這裡提出使用無線通道的特性對模仿主要使用者攻擊做辨識。

    在無線環境下,不同接收端與傳送端之間的通道統計特性都是獨一無二的,因此可以將此特性當成是一種簽證指紋( ngerprint),利用感知無線電的頻譜偵測能力,便能透過無線通道的獨特性辨識出主要使用者與模仿主要使用者之身份,藉由此方法進而透過底層直接進行認證而提高偵測效率。這種在實體層的認證(physical-layer authentication)機制,相較於一般傳統網路協定,即資訊必需要透過不同層級的通報到達上層後才能對傳訊端做身分辨識(identi cation),實體層的認證更能縮短認證的時間,並藉由感知無線電的智慧型學習功能,進一步達成跨層級的認證(cross-layer authentication)目的。

    經由上述所提出的實體層的認證機制雖然可以快速分辨訊號發射端身分,但單一節點的偵測可能會受到許多因素而影響偵測結果,這裡提出序列概率比試驗(sequential probability ratio test, SPRT)的合作式偵測,並且與常見的合作式偵測,奈曼-皮爾生(Neyman-Pearson)固定樣本大小試驗( fixed sample size test, FSST)方法做比較,可以發現在給定相同的誤警率(probability of false alarm)下,要 達到相同的偵測機率(probability of detection),SPRT所需要的樣本數會比FSST還要 少,這意味著SPRT可以用更快的偵測速度來達到與FSST相同的效能,提升合作式感知無線電中實體層認證的效率。

    The topic of this paper is to identify the attacker's presence in cognitive radio (CR), which is considered as an important technology to solve the current ine cient use of
    spectrum. Recently, with the maturity of the development of CR, many security issues are discovered. The most important one is primary user emulation attack (PUEA). In this work, we propose a method by using the characteristics of wireless channels to identify the PUEA.

    In the wireless environment, the statistical property of the wireless channel between the receiver and transmitter is unique, therefore, we can use this feature as a ngerprint. By employing the capability of spectrum sensing in CR, we can identify the primary user from primary user emulation attacker via the uniqueness of wireless channel. By this method, we can directly authenticate on the physical layer and improve the detection e ciency. Compared with conventional authentication scheme based on the higher layer protocols, whose information must be passed to the upper layers, the proposed scheme using physical layer is more e cient in terms of the detection time. For the whole authentication scheme, we also devise an intelligent learning capability to achieve the cross-layer authentication.

    Although one can quickly identify the transmitter by the proposed physical layer
    authentication mechanism, but the detection result of a single node may be in
    uenced
    by many factors. Hence, we propose the cooperative detection by using the sequential
    probability ratio test (SPRT), and compare it with the Neyman-Pearson xed sample
    size test (FSST) method. We nd that, to achieve the same probability of detection
    and under the given false alarm rate, the required sample number of SPRT is less than
    that of FSST, which means that SPRT can achieve the same performance as the FSST,
    while being faster than FSST. Via the SPRT, the detection e ciency of physical layer authentication in CR can be further enhanced.

    書名頁. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i 中文摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i 英文摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii 誌謝. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv 目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v 表目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii 圖目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix 符號說明. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii 第一章、導論. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 基礎知識. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 無線頻譜使用狀況. . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 感知無線電. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.3 模仿主要使用者攻擊. . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 研究動機. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3 文獻探討. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 論文架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 第二章、系統架構. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.1 正交分頻多工訊號. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2 無線電指紋. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2.1 通道模型. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2.2 訊號模型. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.3 通道階能量估測. . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.3 模擬與討論. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.3.1 相關值的估測模擬. . . . . . . . . . . . . . . . . . . . . . . . . 19 2.3.2 通道階能量的估測模擬. . . . . . . . . . . . . . . . . . . . . . . 26 第三章、偵測模仿主要使用者攻擊. . . . . . . . . . . . . . . . . . . . . . . . . 29 3.1 主要使用者訊號偵測. . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.1.1 以通道為基礎的訊號辨識. . . . . . . . . . . . . . . . . . . . . 29 3.1.2 模擬與討論. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 3.2 跨層級的認證. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 第四章、合作式偵測. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.1 合作式偵測. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.2 決策方法. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 4.2.1 決策方法. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 4.2.2 固定樣本數試驗. . . . . . . . . . . . . . . . . . . . . . . . . . . 53 4.3 模擬與討論. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 4.4 階層式合作式偵測. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 第五章、結論與未來展望. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 參考文獻. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    [1] Federal Communications Commission, "Spectrum policy task force report." ET Docket No.02-135, 2002.
    [2] 林高洲,感知無線電之運用與發展",中華民國電子零件認證委員會," IECQ報導第五十二期,2008.
    [3] J. Mitola III, "Cognitive radio: An integrated agent architecture for software defi ned radio."PhD thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, May 2000.
    [4] Alexander M. Wyglinski, Maziar Nekovee, and Y. Thomas Hou, "Cognitive Radio Communications and Networks," Academic Press, 2009.
    [5] S. Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, pp. 201-220, Feb.2005.
    [6] W. Wang, "Denial of service attacks in cognitive radio networks," 2010 International Conference on Environmental Science and Information Application Technology (ESIAT) , vol. 2, pp. 530-533, Jul. 2010.
    [7] J. L. Burbank, "Security in cognitive radio networks: the required evolution in approaches to wireless network security," 3rd International Conference on Cognitive
    Radio Oriented Wireless Networks and Communications, 2008. (Crown COM 2008.) , pp. 1-7, May 2008.
    [8] T. C. Clancy, N. Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation," 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008. (Crown COM 2008.), pp. 1-8, May 2008.
    [9] R. Chen, J. M. Park, J. H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, Jan. 2008.
    [10] Federal Communication Commission, "Notice for Proposed Rulemaking (NPRM 03-322): Facilitating Opportunities for Flexible E cient, and Reliable Spectrum Use Employing Cognitive Radio Technologies," ET Docket, No.03-108, Dec.2003.
    [11] Z. Chen, T. Cooklev, C. Chen, P. R. Carlos, "Modeling primary user emulation attacks and defenses in cognitive radio networks," Performance Computing and Communications Conference (IPCCC), 2009 IEEE 28th International , pp. 208-
    215, Dec. 2009.
    [12] C. Zhao, L. Xie, X. Jiang, L. Huang, Y. Yao, "A PHY-layer authentication approach for transmitter identi cation in cognitive radio networks," 2010 International Conference on Communications and Mobile Computing (CMC) , vol.2, pp.
    154-158, Apr. 2010.
    [13] L. Huang, L. Xie, H. Yu, W. Wang, Y. Yao, "Anti-PUE Attack Based on Joint Position Veri cation in Cognitive Radio Networks," 2010 International Conference on Communications and Mobile Computing (CMC), vol.2, pp. 169-173, Apr. 2010.
    [14] S. Chaudhari, V. Koivunen, H.V. Poor, "Autocorrelation-Based Decentralized Sequential Detection of OFDM Signals in Cognitive Radios," IEEE Transactions on Signal Processing , vol.57, no.7, pp. 2690-2700, Jul. 2009.
    [15] Carlos Cordeiro et al., "IEEE 802.22:The rst worldwide standard based on Cognitive Radios," 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 328-337, Baltimore, MD, USA,8-11 Nov. 2005.
    [16] J. K. Tugnait and H. Kim, "A channel-based hypothesis testing approach to enhance user authentication in wireless networks," Proc: IEEE COMSNETS, pp. 1-9, 2010.
    [17] T. W. Anderson, "Introduction to Multivariate Statistical Analysis," New York: John Wiley and Sons, 1958.
    [18] M. P. Olivieri, G. Barnett, A. Lackpour, A. Davis, P. Ngo, "A scalable dynamic spectrum allocation system with interference mitigation for teams of spectrally agile software de ned radios," 2005 First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005.(DySPAN 2005.), pp. 170-179, Nov. 2005.
    [19] K. Challapali, S. Mangold, and Z. Zhong, "Spectrum agile radio: Detecting spectrum opportunities," in Proceedings of the Sixth Annual International Symposium
    on Advanced Radio Technologies, Mar. 2004.
    [20] "Guidelines for evaluation of radio transmission technologies for IMT-2000," Recommendation ITU-R M.1225, International Telecommunication Union, 1997.
    [21] A. Wald, "Sequential Test of Statistical Hypothesis," Annals Math. Statistics, vol. 16. No. 2, pp. 117-186, Jun. 1945.

    無法下載圖示 校內:2016-08-30公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE