簡易檢索 / 詳目顯示

研究生: 陳宗翰
Tsung-Han Chen
論文名稱: 針對高延遲抖動網路的時脈偏移測量方法
A Clock Skew Measuring Method for Networks with Large Delay Jitters
指導教授: 鄧惟中
Wei-Chung Teng
口試委員: 邱舉明
Ge-Ming Chiu
李漢銘
Hahn-Ming Lee
鄭欣明
Shin-Ming Cheng
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 中文
論文頁數: 43
中文關鍵詞: 時脈偏移抖動霍氏轉換法
外文關鍵詞: clock skew, jitters, Hough transform
相關次數: 點閱:192下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 兩裝置之間時脈(clock rate)的微小差異稱為時脈偏移,由於各裝置的時脈偏移不同,因此適合用於裝置識別技術。但是本研究觀察到無線網路等環境下所蒐集的時戳數據,會因為高延遲抖動而產生出低於數據主群體的離群值。若使用蒐集最小延遲值或線性規劃法的方式來測量這類數據的時脈偏移,則會因為這些離群值的干擾而得到不安定的測量結果。
    因此本研究提出基於霍氏轉換法的方式,建立數據的主群體篩選機制及其參數設定,並發展出三階段的測線機制來將裝置所傳送的時戳數據篩出主要特徵,最後才使用線性規劃法進行測量。如此可避免高延遲抖動產生的離群值影響時脈偏移量測的準確度。
    若透過本論文之方法與直接使用蒐集最小延遲值及線性規劃法等傳統方法量測下進行比較,在僅使用300個時戳的情況下時脈偏移值誤差間隔可減少2ppm以上,而若以數據整體與各分段時脈偏移值之差值平均於最佳情況下也可減少2ppm以上,因此本研究發展的方法能更穩定地估量裝置的特徵。


    The difference between two devices’ ticking frequencies is called clock skew, which is considered useful as a physical characteristic for device identification. In this study, it is observed that timestamps collected under high delay jitter communication channels, when mapped to a two-dimensional graph, would have some outliers below the line-shaped mass of samples. This kind of data is different from classic ones, and the clock skews when measured by traditional methods, e.g. quick piecewise minimum or linear programming, tend to be unstable due to the interference from these lower outliers.
    In this research, we developed a method based on Hough Transform method to precisely identify the slope of the line-shaped mass of samples. The proposed method includes a data filtering mechanism with parameter settings suggestions and a three-step line-fitting process to filter out all outliers. The remaining samples are then used to measure the clock skew by linear programming. In this way, we may prevent lower outliers from interfering the precision of measurement.
    We compared our method with three classical ones on high delay jitter samples collected from 7 devices. The experimental results show that the maximal differences between clock skews derived from 300 timestamps for 8 times of all devices by our method is at least 2ppm smaller than other methods. Also the maximal differences between short-term measurements and long-term measurement by our method are 2ppm smaller. We can thus conclude that the proposed method contributes more precise and stable measurement comparing to other approaches.

    摘要 i Abstract ii 誌謝 iii 目錄 iv 圖目錄 v 表目錄 vi 第1章 緒論 1 1.1研究背景 1 1.2研究動機與目的 2 1.3論文架構 3 第2章 背景知識與相關研究 4 2.1運用時脈偏移之裝置識別技術 4 2.2估測時脈偏移 4 2.2.1定義及測量方法 4 2.2.2離群值(Outlier) 5 2.2.3線性規劃法(Linear Programming Method, LPM) 6 2.3霍氏轉換法(Hough Transform, HT) 7 第3章 研究方法 10 3.1方法描述 10 3.1.1基於霍氏轉換法的主群體篩選機制 10 3.1.2參數設定 12 3.1.3三階段測線機制 14 3.2方法流程 17 3.2.1主群體篩選機制流程 17 3.2.2三階段測線機制流程 18 第4章 實驗結果與分析 19 4.1實驗環境 19 4.2實驗設計 19 4.3實驗結果與比較 20 4.3.1 使用本研究方法之數據篩選結果分析 20 4.3.2 對照各演算法在數據分段下所得之時脈偏移值比較 28 4.3.3 對照各演算法在以數據整體與各分段時脈偏移值之差值比較 31 第5章 結論與未來研究方向 34 5.1結論 34 5.2未來研究方向 34 參考文獻 35

    [1] Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, and Yuh-Jye Lee, “Clock Skew Based Client Device Identification in Cloud Environments,” The 26th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA 2012) , pp. 526-533, 2012.
    [2] 鄭理介(2013)。《基於時脈偏移的可攜式裝置識別技術》。國立臺灣科技大學碩士論文,未出版,臺北市。
    [3] Makoto Aoki, Eiji Oki, and Roberto Rojas-Cessa, “Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew,” ETRI journal, vol. 32, no. 6, pp. 854-862, 2010.
    [4] Vern Paxson, “On Calibrating Measurements of Packet Transit Times,” ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (SIGMETRICS 1998/PERFORMANCE 1998), vol. 26, no. 1, pp. 11-21, 1998.
    [5] Sue B. Moon, Paul Skell, and Don Towsley, “Estimation and Removal of Clock Skew from Network Delay Measurements,” IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings vol. 1, pp. 1-25, 1999.
    [6] Tadayoshi Kohno, Andre Broido, and Kc Claffy, “Remote Physical Device Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, 2005.
    [7] Steven J. Murdoch, “Hot or not: Revealing Hidden Services by Their Clock Skew,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27-36, 2006.
    [8] Roger Dingledine, Nick Mathewson, and Paul Syverson. “Tor: The Second-Generation Onion Router,” in Proceedings of the 13th conference on USENIX Security Symposium, vol. 13, pp. 21-21, 2004.
    [9] Sebastian Zander and Steven J. Murdoch, “An Improved Clock-skew Measurement Technique for Revealing Hidden Services,” in Proceedings of the 17th conference on Security symposium, pp. 211-225, 2008.
    [10] Suman Jana and Sneha Kumar Kasera, “On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 104-115, 2008.
    [11] Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz “On the Reliability of Wireless Fingerprinting Using Clock Skews.” in Proceedings of the third ACM conference on Wireless network security (WiSec 2010), pp. 169-174, 2010
    [12] Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hsuan-Yu Huang, and Joseph M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” IEEE Global Communications Conference (GLOBECOM 2008), pp. 1-5, 2008.
    [13] Ding-Jie Huang and Wei-Chung Teng, “A defense against clock skew replication attacks in wireless sensor networks,” Journal of Network and Computer Applications, Elsevier, vol. 39, pp. 26-37, 2013.
    [14] Xiaowei Mei, Donggang Liu, Kun Sun, and Dingbang Xu, “On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties,” IEEE 27th International Symposium on Parallel & Distributed Processing (IPDPS 2013), pp. 1112-1121, 2013.
    [15] Marius Cristea and Bogdan Groza, “Fingerprinting Smartphones Remotely via ICMP Timestamps,” IEEE Communications Letters, vol. 17, no. 6, pp. 1081-1083, 2013.
    [16] Md. Borhan Uddin and Claude Castelluccia, “Toward Clock Skew Based Wireless Sensor Node Services,” in The 5th Annual ICST Wireless Internet Conference, pp. 1-9, 2010.
    [17] Paul V. C. Hough, “Method and Means for Recognizing Complex Patterns,” U.S. Patent 3,069,654, 1962.
    [18] Richard O. Duda and Peter E. Hart, “Use of the Hough Transformation to Detect Lines and Curves in Pictures,” Communications of the ACM, vol. 15, no. 1, pp. 11-15, 1972.
    [19] Peter E. Hart, “How the Hough Transform Was Invented,” IEEE Signal Processing Magazine, vol. 26, no. 6,pp. 18-22, 2009.
    [20] 鍾國亮(2012)。《影像處理與電腦視覺》。臺北市:臺灣東華書局股份有限公司。
    [21] Swati Sharma, Alefiya Hussain, and Huzur Saran, “Experience with Heterogenous Clock-skew Based Device Fingerprinting,” in Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), pp. 9-18, 2012.

    QR CODE