簡易檢索 / 詳目顯示

研究生: 曾裕凱
Tseng, Yu-Kai
論文名稱: 合作式無線網路中惡意中繼點偵測之研究
Malicious Relay Detection in Cooperative Wireless Network
指導教授: 張志文
Chang, Chih-Wen
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 英文
論文頁數: 47
中文關鍵詞: 合作式通訊中繼點惡意行為干擾
外文關鍵詞: Cooperatvie system, relay selection, malicious behavior detection
相關次數: 點閱:80下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線通訊網路(Wireless Communication Network)是近代一個重要的通訊技術, 其中透過合作式通訊(Cooperative Communication) 的方法, 更是能有效改善一些無線傳輸的環境中與生俱來的缺點, 如通道衰減(Channel Fading)及多路徑干擾(Multi-Path Interference)等等。合作式通訊系統中透過中繼點(Relay Node) 的幫忙, 可以模擬達到如同MIMO(Multi-input Multi-output) 的多天線環境中之訊號多樣性(Diversity Order) 效果。然而在諸多的中繼點中, 可能存在因電路故障, 病毒入侵, 亦或是為達個人利益而發生的惡意行為(Malicious Behavior) 。在存在有惡意行為中繼點的無線網路環境中, 傳輸的效能及錯誤率會因此大打折扣, 因此在接收端就需要對應的偵測模型來改善此狀況。在本篇論文中, 我們改良了既有的軟式偵測(Soft-Detection) 方法, 進而提出硬式偵測(Hard-Detection) 決策方法。在最後的模擬結果上, 我們節省了軟決策系統帶來的硬體複雜度, 同時也改善了系統效能。

    Cooperative wireless network provides a new form of transmission which can achieve antenna diversity in MIMO system but with low complexity and cost. In a cooperative system, the cooperation between source and relay leads performance improvement become obvious. However, relay’s misbehavior can degrade the performance severely. There are many reasons could cause these misbehaviors. For instance, a relay node may stop forward the received message in order to saving his energy. In addition, a machine malfunction may also cause a malicious behavior. Therefore, a mechanism to
    detect the existence of misbehavior becomes necessary and important. In this paper, based on the conventional correlation-based (DB) method, we propose to apply the hard-decision values rather than the soft-decision ones for carrying out the misbehavior detection. Via simulation results, the proposed low complexity method using the hard-decision values is proved to improve the performance obtained by using CB.

    Chinese Abstract ... i English Abstract ... ii Acknowledgements ... iii Contents ... iv List of Tables ... vi List of Figures ... vii 1 Introduction ... 1 1.1 Overview ... 1 1.2 Thesis Outline ... 2 2 Background and Literature Survey ... 3 2.1 Background ... 3 2.1.1 Cooperative Communication ... 3 2.1.2 Relay Selection Technology ... 7 2.1.3 Malicious Behavior ... 8 2.2 Literature Survey ... 8 3 System Model and Malicious Detection Scheme 16 3.1 System Model ... 16 3.1.1 Cooperation Strategy and Channel Model ... 16 3.1.2 Misbehavior Definition 18 3.1.3 Problem Formulation ... 21 3.2 Malicious Detection Scheme ...21 3.2.1 Soft-Detection Scheme ... 21 3.2.2 Hard-Detection Scheme ... 25 4 Simulation Results and Discussion ... 29 4.1 Simulation Setup ... 29 4.2 Simulation Results ... 30 4.3 Discussions .. 41 5 Conclusions and Future Works ... 42 5.1 Conclusions ...42 5.2 Future Works ...43 Bibliography ... 44 Vita ... 47

    [1] A. Semdonaris, E. Erkip, and B. Aazhang, “User cooperation diversity part I, II,” IEEE Trans. Commun, vol. 51, no. 11, pp. 1927–1948, Nov. 2003.
    [2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
    [3] L. Hanzo, M. Munster, B. Choi, and T. Keller, “OFDM and MC-CDMA for broadband multi-user communications, WLANs and broadcasting,” IEEE Press/ Wiley, pp. 267–281, 2003.
    [4] R. Gangula and R. Bhattacharjee, “Performance of selection cooperation in the presence of a malicious relay,” Wireless Communication Systems (ISWCS), pp. 408–412, Sept. 2010.
    [5] H. S. S. Dehnie and N. Memon, “Cooperative diversity in the presence of a misbehaving relay : performance analysis,” May. 2007, pp. 1–7.
    [6] S. Dehnie, “Reliable cooperative communications: a signal processing approach,” Nov. 2011, pp. 85–90.
    [7] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” Vehicular Technology Conference (VTC Fall), pp. 1–5, 2011.
    [8] M. Yinian and M. Wu, “Tracing malicious relays in cooperative wireless communications,” Information Forensics and Security, IEEE Transactions, vol. 2, pp. 198–212, Jun. 2007.
    [9] E. Zimmerman, P. Herhold, and G. Fettweis, “On the performance of cooperative diversity protocols in practical wireless systems,” IEEE 58th Vehicular Technology Conference, vol. 4, pp. 2212–2216, Oct. 2003.
    [10] D. P. R. A. Bletsas, A. Khisti and A. Lippman, “A simple cooperative diversity method based on network path adaptive,” IEEE J. Sel. Areas Commun., vol. 24, pp. 659–672, 2006.
    [11] ——, “Cooperative communications with outage-optimal opportunistic relaying,” IEEE Trans. Wireless Commun., vol. 6, pp. 3450–3460, Sept. 2007.
    [12] E. Beres and R. Adve, “On selection cooperation in distributed networks,” Information Sciences and Systems 40th Annual Conference, pp. 1056–1061, 2006.
    [13] ——, “Outage probability of selection cooperation in the low to medium snr regime,” IEEE Commun. Lett, vol. 11, pp. 589–597, 2007.
    [14] D. L. Yu Wang and J. H. Lee, “Adaptive selection cooperation scheme using prediction-based decision in ad-hoc networks,” Vegucular Technology Conference (VTC), pp. 1–5, 2008.
    [15] Ha X. Nguyen, Ha H. Hguyen, and Tho Le-Ngoc, Diversity analysis of relay selection schemes for two-way wireless relay networks, Springer Science+Business Media, LLC., 2010.
    [16] S. Dehnie, S. H.T., and M. N, “Detecting malicious behavior in cooperative diversity,” Information Sciences and System (CISS), IEEE 41th Conference, pp. 895–899, 2007.
    [17] Z.-J. W. Li-Chung Lo and W.-J. Huang, “Noncoherent misbehavior detection in space-time coded cooperative networks,” Acoustics, Speech and Signal Processing
    (ICASSP), pp. 3061–3064, Mar. 2012.
    [18] W.W. Hong Song, Xiao Xiao and L. Yang, “Dennc : a wireless malicious detection approach based on network coding,” Trust, Security and Privacy in Cmputing and
    Communications (TrusCom), IEEE 10th International Conference, pp. 160–165,2011.
    [19] Heng Wang, Shizhong Yong, Jinzhao Lin, and Guoquan Li, “Selection cooperation with ARQ in delay-tolerant wireless networks,” Advanced Computer Theory and Engineering (ICACTE, 2010 3rd International Conference, pp. V3–485 – V3–489,Aug. 2010.

    下載圖示 校內:2016-08-30公開
    校外:2016-08-30公開
    QR CODE