簡易檢索 / 詳目顯示

研究生: 陳致佑
Chih-Yu Chen
論文名稱: 利用虛線特性測量時脈偏移之研究
A Study of Clock Skew Measurement Utilizing the Characteristics of Dotted Lines
指導教授: 鄧惟中
Wei-Chung Teng
口試委員: 項天瑞
Tien-Ruey Hsiang
金台齡
Tai-lin Chin
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 35
中文關鍵詞: 時脈偏移虛線線性回歸
外文關鍵詞: clock skew, dotted lines, linear regression
相關次數: 點閱:283下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 虛線(dotted line)現象是當一台設備透過網路量測上另一台設備的時脈偏移時,其中一種特殊的時間偏移量的分布圖形。當產生虛線現象時,根據傳統方法需要延長量測的時間才可以收集足夠的時間偏移量來取得較精準的時脈偏移。然而,一個不含離群值與封包遺失的完整虛線圖形因其展示穩定的斜率變化,卻可以使用簡單線性回歸求得高精度的時脈偏移。本研究提出利用虛線特性如虛線長度的規律變化以及每條虛線的固定斜率等來重新建構完整虛線的方法,並開發了對應的演算法。我們透過實驗在2500秒內蒐集5000個偏移量,並使用線性回歸來計算重新建構後的虛線,其結果可以將誤差值由1.79ppm大幅度降低至0.69ppm。


    The dotted-line phenomenon is a kind of special pattern in the scatter diagram of offsets when one device measures the clock skew of another device over network. Dotted lines, when happened, lengthen the period of time to collect enough offsets for precise skew measurement. However, a set of complete dotted lines enables highly accurate clock skew measurement by simple linear regression. In this research, an original method is developed to reconstruct and any collected dotted-line set utilizing the characteristics of dotted lines, which includes that the lengths of the dotted lines change in regular pattern and that the slope of each dotted line be of the same value. By eliminating outliers and by complementing package loss, the set of complete dotted lines shows stable slope that can be easily and precisely derived by simple linear programming method. An experiments of measuring clock skew by 5000 offsets collected in 2500 seconds show that the maximum difference reduces from 1.79ppm to 0.69 ppm when we measure the clock skew by using LRM under the complete shape of dotted line.

    摘要 III Abstract IV 誌謝 V 目錄 VI 圖目錄 VIII 表目錄 IX 第1章 緒論 1 1.1研究背景 1 1.2動機與目的 4 1.3論文架構 5 第2章 國內外相關研究 6 2.1 時脈偏移 6 2.2 時脈偏移之測量 7 2.2.1線性迴歸法 7 2.2.2 線性規劃法 7 2.2.3 霍氏測線法 8 2.3 虛線現象 9 2.3.1 虛線之構成 9 2.3.2 虛線的特性 11 2.3.3如何修復離群值 13 2.3.4如何將每條虛線分類 15 2.4可調式時間精度: 16 2.5身分認證及存取控制: 17 第3章 研究方法 18 3.1 系統架構與研究流程 18 3.2虛線現象之資料重新建構演算法 19 3.2.1虛線的偵測與編號 19 3.3重新建構虛線的方法 20 3.3.1重新放置離群點 21 3.3.2重新建構遺失的封包 23 3.3.3重新建構每條虛線的最大值 25 第4章 驗證實驗結果 27 4.1比對原始虛線與重新建構後虛線之特性 28 4.2驗證重新建構後的虛線對於時脈偏移量測的幫助 29 4.3比較在重新建構後之虛線和典型直線時脈偏移準確性 31 第5章 結論 33 參考文獻 34

    [1] Tadayoshi Kohno, Andre Broido, and Kc Claffy, “Remote Physical Device Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, 2005.
    [2] Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hsuan-Yu Huang, and Joseph M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” IEEE Global Communications Conference (GLOBECOM 2008), pp. 1-5, 2008.
    [3] 鄭理介(2013),《基於時脈偏移的可攜式裝置識別技術》,國立臺灣科技大學碩士論文。
    [4] 陳宗翰(2014),《針對高延遲抖動網路的時脈偏移測量方法》,國立臺灣科技大學碩士論文。
    [5] Komang Oka Saputra, Wei-Chung Teng, and Takaaki Nara, “Regular Pattern of Timestamps Between Machines with Built-in System Time,” IEEE Transactions on Instrumentation and Measurement, 2017, to appear in print.
    [6] Sue B. Moon, Paul Skell, and Don Towsley, “Estimation and Removal of Clock Skew from Network Delay Measurements,” IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings vol. 1, pp. 227-234, 1999.
    [7] 楊祐齊(2015),《一個改良的基於霍氏轉換時脈偏移測量方法》,國立臺灣科技大學碩士論文。
    [8] 周品言(2014),《藍芽通訊傳輸延遲之研究》,國立臺灣科技大學碩士論文。
    [9] 孫國仁(2016),《網路時鐘偏斜測量中虛線現象之研究》,國立臺灣科技大學碩士論文。
    [10] Steven J. Murdoch, “Hot or not: Revealing Hidden Services by Their Clock Skew,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 27-36, 2006.
    [11] Sebastian Zander and Steven J. Murdoch, “An Improved Clock-skew Measurement Technique for Revealing Hidden Services,” in Proceedings of the 17th conference on Security symposium, pp. 211-225, 2008.
    [12] Suman Jana and Sneha Kumar Kasera, “On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 104-115, 2008.
    [13] Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz “On the Reliability of Wireless Fingerprinting Using Clock Skews.” in Proceedings of the third ACM conference on Wireless network security (WiSec 2010), pp. 169-174, 2010
    [14] Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, and Yuh-Jye Lee, “Clock Skew Based Client Device Identification in Cloud Environments,” The 26th IEEE International Conference on Advanced Information Networking and Applications (IEEE AINA 2012) , pp. 526-533, 2012.
    [15] Peter E. Hart, “How the Hough Transform Was Invented,” IEEE Signal Processing Magazine, vol. 26, no. 6, pp. 18-22, 2009.
    [16] “Internet Encyclopedia of Philosophy.” 2010. Retrieved 9 April 2011. Available: http://www.iep.utm.edu/time
    [17] HSU, Chung-hsing; FENG, Wu-chun. A power-aware run-time system for high-performance computing. In: Proceedings of the 2005 ACM/IEEE conference on Supercomputing. IEEE Computer Society, 2005. p. 1.
    [18] “Timers, Timer Resolution, and Development of Efficient Code,” [Online].Available:http://download.microsoft.com/download/3/0/2/3027D574-C433-412A-A8B6-5E0A75D5B237/Timer-Resolution.docx
    [19] Council, Federal Financial Institutions Examination. “Authentication in an internet banking environment.” Financial Institution Letter, FIL-103-2005. Washington, DC: Federal Deposit Insurance Corp.(FDIC). Retrieved March 18 2005.

    QR CODE