簡易檢索 / 詳目顯示

研究生: 陳冠奇
Kuan-Chi Chen
論文名稱: 在合作式網路中有惡意中繼點存在的聯盟構成
Coalition Formation in Cooperative Network with Malicious Relays
指導教授: 林士駿
Shih-Chun Lin
口試委員: 張縱輝
Tsung-Hui Chang
鍾偉和
Wei-Ho Chung
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 中文
論文頁數: 33
中文關鍵詞: 合作式通訊惡意中繼點聯盟賽局理論模擬退火法
外文關鍵詞: cooperative communications, coalitional game theory, malicious relay, Simulated Annealing
相關次數: 點閱:215下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

在本論文中,我們解決合作式網路中有惡意中繼點 (malicious relay) 存在的安全性問題。惡意中繼點會把用戶之間共享的傳輸資訊在傳達到目的端之前把這些資訊作更換或銷毀以藉此干擾目的端。我們研究惡意中繼點聯盟(malicious coalition)的建構方式,並探討哪些潛在的惡意中繼點最終選擇加入惡意中繼聯盟當中。我們假設合作中繼點採用放大轉送 (amplify-and-forward, AF) 的中繼協定,惡意中繼點則是傳送高斯雜訊攻擊目的端。我們用聯盟賽局理論 (coalitional game theory)的概念和以模擬退火法(simulated annealing) 為基礎的演算法來建構惡意中繼聯盟。透過模擬驗證,我們提出的演算法比起隨機搜尋法能更有效率地找到最終惡意中繼聯盟。


In this thesis, we address the security issues of cooperative networks where malicious relays exist in the network. The malicious relays may utilize shared network information to intentionally jam the reception at the receivers or alter the messages that are to be forwarded. We study the formation of malicious coalition, and discuss when relays potentially to be malicious will eventually become malicious and join the malicious coalition. We assume that the cooperative relays adopt the celebrated amplify-and-forward (AF) protocols while the (eventually) malicious relays attack with pure Gaussian noises. The concept of coalitional game theory is adopted and simulated annealing algorithm for formation of malicious coalition is developed. Through simulation results, the proposed algorithms can find good malicious coalition structures effectively compared with the random search methods.

第一章 序論 1 1.1 引言 ....................................................... 1 1.2 研究動機 .................................................... 3 1.3 論文架構 .................................................... 4 第二章 相關知識介紹 5 2.1 合作式通訊 .................................................. 5 2.2 合作式通訊模型 ............................................... 6 2.3 賽局理論 .................................................... 8 2.3.1 聯盟獲利 ................................................. 10 2.3.2 報酬向量 ................................................. 11 2.4 模擬退火法概念介紹 ........................................... 12 第三章 系統模型 15 3.1 參數介紹 ................................................... 16 第四章 本論文研究所提出的演算法 18 4.1 中繼點的最佳策略選擇 ......................................... 18 4.2 聯盟效益與報酬向量 ........................................... 19 4.3 搜尋惡意中繼聯盟建構的演算法 ................................... 21 第五章 模擬結果 25 5.1 模擬參數設定 ................................................ 25 5.1 模擬結果 ................................................... 26 第六章 結論與未來展望 30 6.1 結論 ...................................................... 30 6.2 未來展望 ................................................... 30

[1] S. Farahmand, G. B. Giannakis, and X. Wang, “Max-min strategies for power-limited games in the presence of correlated jamming,” in 41st Annual Conference on Information Sciences and Systems (CISS), 2007, pp. 300–305.
[2] T. Wang and G. B. Giannakis, “Mutual information jammer relay games,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 290–303, 2008.
[3] A. Kashyap, T. Basar, and R. Srikant, “Correlated Jamming on MIMO Gaussian Fading Channels,” IEEE Trans. Inf. Theory, vol. 50, pp. 2119–2123, 2004.
[4] M.-H. Chen, S.-C. Lin, and Y.-W. Peter Hong, “A Game Theoretic Approach for the Cooperative Network with the Presence of Malicious Relays,” in Proceedings of IEEE Global Communications Conference (Globecom), 2011.
[5] S. Shafiee and S. Ulukus, “Mutual Information Games in Multiuser Channels With Correlated Jamming,” IEEE Trans. Inf. Theory, vol. 55, pp. 4598–4607, 2009.
[6] 洪樂文、王淑賢,合作式通訊系統之媒介存取與路由技術,NCP Newsletter,no. 3, sept. 2011.
[7] 王繻賢. "合作式通訊傳輸架構在上傳系統下之探討." 臺北科技大學電腦與通訊研究所學位論文 (2009): 1-53.
[8] 何欣怡. "供應鏈上下游廠商競合賽局." 成功大學交通管理科學系學位論文 (2007): 1-97.
[9] Sendonaris, E. Erkip, and B. Aazhang, “User Cooperation Diversity–Part I: System Description” and “User Cooperation Diversity–Part II: Implementation Aspects and Performance Analysis,” IEEE Transactions on Communications, vol. 51, no. 11, Nov. 2003.
[10] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: E_cient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, pp. 3062-3080, 2004.
[11] W. Saad, Z. Han, M. Debbah, A. Hjorungnes, and T. Basar, “Coalitional game theory for communication networks”, IEEE Signal Processing Magazine, vol 26, num 5, pp. 77-97, 2009
[12] D. Tse and P. Viswanath, “Fundamentals of Wireless Communication,” Cambridge University Press, 2005.
[13] Meng-Hsi Chen, Shih-Chun Lin, Y.-W. Peter Hong, Member, IEEE, and Xiangyun Zhou, Member, IEEE” On Cooperative and Malicious Behaviors in Multirelay Fading Channels,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 7, JULY 2013
[14] W. Saad, Z. Han, M. Debbah, and A. Hjorungnes, “A distributed coalition formation framework for fair user cooperation in wireless network,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4580–4593, Sep. 2009.
[15] H. Keinanen, “Simulated annealing for multi-agent coalition formation,” Agent and Multi-Agent Systems: Technologies and Applications, vol. 5559, pp. 30–39, 2009.
[16] 羅中育. "田口品質工程應用於模擬退火法參數組合之研究-以旅行推銷員問題 (TSP) 為例." (2000).
[17] Shih-En Wei, Hung-Yun Hsieh, and Hsuan-Jung Su,“Joint Optimization of Cluster Formation and Power Control for Interference-Limited Machine-to-Machine Communications,“IEEE Global Communications Conference (GLOBECOM), Dec. 2012
[18] Thau-Li Lo,The study on the parameter combination of Simulated Annealing using Taguchi Techniques for Quality Engineering — the case of Traveling Salesman Problem, 2001。
[19] 馮建凱. "模擬退火法求解護理人員排班問題-以台北某醫院心臟外科加護病房為例." 臺北科技大學電腦與通訊研究所學位論文 (2012).

無法下載圖示 全文公開日期 2019/07/30 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE