| 研究生: |
江紘毅 Chiang, Hung-Yi |
|---|---|
| 論文名稱: |
使用無線通訊平台WARP實現基於MIMO-OFDM系統設計通道階功率計算電路並應用於偵測模仿主要使用者攻擊 Using WARP to Implement the MIMO-OFDM System and Realize the Channel Tap Power Calculation Circuit for Primary User Emulation Attacks Detection |
| 指導教授: |
卿文龍
Chin, Wen-Long |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2017 |
| 畢業學年度: | 105 |
| 語文別: | 中文 |
| 論文頁數: | 84 |
| 中文關鍵詞: | 感知無線電 、主要使用者 、模仿主要使用者攻擊 、通道階功率 、合作式偵測 |
| 外文關鍵詞: | Cognitive Radio, Primary User, Primary User Emulation Attacks, Channel-Tap Power, Fixed sample size test |
| 相關次數: | 點閱:139 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本篇論文所討論的議題,為使用感知無線電(cognitive radio, CR)之技術,去將頻譜資源的使用率做提升,人們對於頻譜資源的使用要求越來越高,感知無線電被提出為解決目前頻譜資源使用率欠缺分配的執行處理技術。而隨著感知無線電的技術發展快速,許多安全問題也衍生而出,而這些問題中,較多人研究的問題是模仿主要使用者攻擊(primary user emulation attacks, PUEA)這個議題,而本篇論文也就這個議題,提出使用無線通道各自獨有的通道統計量:通道階功率(channel-tap power)來做主要使用者的辨識。
在無線通訊中,兩個不同的訊號傳送者與訊號接收者之間訊號傳遞通道的通道特性統計量皆為唯一,可將各自的通道特性當作其認證指紋(fingerprint),故我們就利用感知無線電之特性去做頻譜感知偵測,並配合傳送之無線通道獨一無二的統計特性於實體層進行認證,使用此實體層認證(physical-layer authentication)機制去快速辨別出主要使用者(primary user, PU)與PUEA之身份。
而由曾俊霖提出之「在感知無線電中以通道特徵為基礎偵測模仿主要使用者攻擊」[1],使用通道階功率統計特性偵測並認證PUEA,並結合2015年林亞玄之「利用WARP OFDM系統之基於通道階功率的使用者辨識量測與效能評估」[2] 將電路與OFDM模組做整合且電路延伸為MIMO的多天線接收傳送以期提升效能,最後將電路整合至無線開放研究平台(Wireless Open-Access Research Platform, WARP)來完成運算電路之架構,接著進行多種實驗場景量測討論影響效率之變因,將兩根天線視為兩個不同使用者,搭配耐曼-皮爾森(Neyman-Pearson)固定樣本數試驗(fixed sample size test, FSST)合作式偵測降低單一節點偵測受許多因素影響的變因,提升感知無線電認證效率,並於論文最後應用於室內定位評估。
This paper is divided into six chapters. The first chapter introduces the basics of cognitive radio and primary user emulation attack (PUEA), the principles of multiple input multiple output and cooperative detection, and the research motivation, design flow, and so on. The second chapter introduces the channel model, system architecture, OFDM signal model, and channel-tap power calculation. Chapter 3 introduces the method to detect the primary user emulation attacks and cooperative detection. The fourth chapter introduces the hardware design of the calculation circuit. Chapter 5 measures and evaluates the field trial performance of different real environments. Chapter 6 gives the conclusions and the future chllenges.
Keywords: Cognitive Radio, Primary User (PU), Primary User Emulation Attacks (PUEA), Channel-Tap Power, Fixed sample size test.
[1] 2011年曾俊霖「在感知無線電中以通道特徵為基礎偵測模仿主要使用者攻擊」
[2] 2015年林亞玄「利用WARP OFDM系統之基於通道階功率的使用者辨識量測與效能評估」
[3] Federal Communications Commission,“Report of the Spectrum Efficiency Working Group,”ET Docket No.02-135, 2002.
[4] J. Mitola III,“Cognitive radio: An integrated agent architecture for software defined radio,”PhD thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, May 2000.
[5] S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications., vol. 23, pp. 201-220, Feb.2005.
[6] Hou Maosen,and Xie Xianzhong,“Security Countermeasures Envisaged for Cognitive Radios and Cellular Systems Joint Communication,”[Online]. Available: http://www.paper.edu.cn
[7] W. Wang,“Denial of service attacks in cognitive radio networks,”2010 International Conference on Environmental Science and Information Application Technology (ESIAT)., vol. 2, pp. 530-533, Jul.2010.
[8] P. W. Wolniansky, G. J. Foschini, G. D. Golden, and R. A. Valenzuela, “V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel,” International Symposium on Signals, Systems, and Electronics., pp. 295-300, Sep. 1998.
[9] V. Tarokh, N. Seshadri, and A. R. Calderbank, “Space-time codes for
high data rate wireless communication: Performance criteria and code construction,” IEEE Trans. Inform. Theory., vol. 44, Mar. 1998.
[10] S. M. Alamouti, “A simple transmit diversity scheme for wireless
communications,"IEEE J. Select. Areas Commun., vol. 16,
pp. 1451-1458, Oct. 1998.
[11] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space–time block
codes from orthogonal designs,"IEEE Trans. Inform. Theory., vol. 45, pp. 1456–1467, July 1999.
[12] Neyman, Jerzy;Pearson, Egon S.(1933). “On the Problem of the Most
Efficient Tests of Statistical Hypotheses,”
[13] J. L. Burbank, “Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security,"3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications , 2008. (CrownCom 2008)., pp. 1-7, May 2008.
[14] T. C. Clancy, and N. Goergen,“Security in Cognitive Radio Networks: Threats and Mitigation,”3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications , 2008. (CrownCom 2008)., pp. 1-8, May 2008.
[15] T. W. Anderson,“Introduction to Multivariate Statistical Analysis,”New York: John Wiley and Sons, 1958.
[16] T. Cui, and C. Tellambura, “Power Delay Pro_le and Noise Variance Estimation for OFDM,” IEEE Communications Letters., Vol. 10, No. 1, January 2006
[17] Patterson and Hennessy, Computer Organization and Design, 3rd Edition.
[18] “Rice University WARP project,”[Online]. Availavle: http://warpproject.org/trac/
[19] Evgeny Kupershtein, “Single-Site Emitter Localization via Mulipath Fingerprint,” IEEE Transations On Signal Processing., Vol. 61, No. 1, January1, 2013.
[20] C. L. Holloway, M. G. Cotton, and P McKenna, “A Model for Predicting the Power Delay Prole Characteristics Inside a Room,” IEEE Transactions On Vehicular Technology., Vol. 48, No. 4, July 1999
校內:2022-07-01公開