研究生: |
陳致佑 Chih-Yu Chen |
---|---|
論文名稱: |
利用虛線特性測量時脈偏移之研究 A Study of Clock Skew Measurement Utilizing the Characteristics of Dotted Lines |
指導教授: |
鄧惟中
Wei-Chung Teng |
口試委員: |
項天瑞
Tien-Ruey Hsiang 金台齡 Tai-lin Chin |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 中文 |
論文頁數: | 35 |
中文關鍵詞: | 時脈偏移 、虛線 、線性回歸 |
外文關鍵詞: | clock skew, dotted lines, linear regression |
相關次數: | 點閱:283 下載:2 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
虛線(dotted line)現象是當一台設備透過網路量測上另一台設備的時脈偏移時,其中一種特殊的時間偏移量的分布圖形。當產生虛線現象時,根據傳統方法需要延長量測的時間才可以收集足夠的時間偏移量來取得較精準的時脈偏移。然而,一個不含離群值與封包遺失的完整虛線圖形因其展示穩定的斜率變化,卻可以使用簡單線性回歸求得高精度的時脈偏移。本研究提出利用虛線特性如虛線長度的規律變化以及每條虛線的固定斜率等來重新建構完整虛線的方法,並開發了對應的演算法。我們透過實驗在2500秒內蒐集5000個偏移量,並使用線性回歸來計算重新建構後的虛線,其結果可以將誤差值由1.79ppm大幅度降低至0.69ppm。
The dotted-line phenomenon is a kind of special pattern in the scatter diagram of offsets when one device measures the clock skew of another device over network. Dotted lines, when happened, lengthen the period of time to collect enough offsets for precise skew measurement. However, a set of complete dotted lines enables highly accurate clock skew measurement by simple linear regression. In this research, an original method is developed to reconstruct and any collected dotted-line set utilizing the characteristics of dotted lines, which includes that the lengths of the dotted lines change in regular pattern and that the slope of each dotted line be of the same value. By eliminating outliers and by complementing package loss, the set of complete dotted lines shows stable slope that can be easily and precisely derived by simple linear programming method. An experiments of measuring clock skew by 5000 offsets collected in 2500 seconds show that the maximum difference reduces from 1.79ppm to 0.69 ppm when we measure the clock skew by using LRM under the complete shape of dotted line.
[1] Tadayoshi Kohno, Andre Broido, and Kc Claffy, “Remote Physical Device Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, 2005.
[2] Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hsuan-Yu Huang, and Joseph M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” IEEE Global Communications Conference (GLOBECOM 2008), pp. 1-5, 2008.
[3] 鄭理介(2013),《基於時脈偏移的可攜式裝置識別技術》,國立臺灣科技大學碩士論文。
[4] 陳宗翰(2014),《針對高延遲抖動網路的時脈偏移測量方法》,國立臺灣科技大學碩士論文。
[5] Komang Oka Saputra, Wei-Chung Teng, and Takaaki Nara, “Regular Pattern of Timestamps Between Machines with Built-in System Time,” IEEE Transactions on Instrumentation and Measurement, 2017, to appear in print.
[6] Sue B. Moon, Paul Skell, and Don Towsley, “Estimation and Removal of Clock Skew from Network Delay Measurements,” IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings vol. 1, pp. 227-234, 1999.
[7] 楊祐齊(2015),《一個改良的基於霍氏轉換時脈偏移測量方法》,國立臺灣科技大學碩士論文。
[8] 周品言(2014),《藍芽通訊傳輸延遲之研究》,國立臺灣科技大學碩士論文。
[9] 孫國仁(2016),《網路時鐘偏斜測量中虛線現象之研究》,國立臺灣科技大學碩士論文。
[10] Steven J. Murdoch, “Hot or not: Revealing Hidden Services by Their Clock Skew,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27-36, 2006.
[11] Sebastian Zander and Steven J. Murdoch, “An Improved Clock-skew Measurement Technique for Revealing Hidden Services,” in Proceedings of the 17th conference on Security symposium, pp. 211-225, 2008.
[12] Suman Jana and Sneha Kumar Kasera, “On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 104-115, 2008.
[13] Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz “On the Reliability of Wireless Fingerprinting Using Clock Skews.” in Proceedings of the third ACM conference on Wireless network security (WiSec 2010), pp. 169-174, 2010
[14] Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, and Yuh-Jye Lee, “Clock Skew Based Client Device Identification in Cloud Environments,” The 26th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA 2012) , pp. 526-533, 2012.
[15] Peter E. Hart, “How the Hough Transform Was Invented,” IEEE Signal Processing Magazine, vol. 26, no. 6, pp. 18-22, 2009.
[16] “Internet Encyclopedia of Philosophy.” 2010. Retrieved 9 April 2011. Available: http://www.iep.utm.edu/time
[17] HSU, Chung-hsing; FENG, Wu-chun. A power-aware run-time system for high-performance computing. In: Proceedings of the 2005 ACM/IEEE conference on Supercomputing. IEEE Computer Society, 2005. p. 1.
[18] “Timers, Timer Resolution, and Development of Efficient Code,” [Online].Available:http://download.microsoft.com/download/3/0/2/3027D574-C433-412A-A8B6-5E0A75D5B237/Timer-Resolution.docx
[19] Council, Federal Financial Institutions Examination. “Authentication in an internet banking environment.” Financial Institution Letter, FIL-103-2005. Washington, DC: Federal Deposit Insurance Corp.(FDIC). Retrieved March 18 2005.