Physical-Layer Security Design for Distributed Detection with Attackers
碩士 === 國立中山大學 === 通訊工程研究所 === 106 === Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the wireless sensing network becomes an indispensable system. However, since the sensor is exposed in the open space, the possibil...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/7f6pne |
id |
ndltd-TW-106NSYS5650011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NSYS56500112019-11-21T05:32:59Z http://ndltd.ncl.edu.tw/handle/7f6pne Physical-Layer Security Design for Distributed Detection with Attackers 存在攻擊者之分散式偵測系統的物理層安全設計方法 Shih-Ming Tseng 曾士銘 碩士 國立中山大學 通訊工程研究所 106 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the wireless sensing network becomes an indispensable system. However, since the sensor is exposed in the open space, the possibility of being attacked or malfunctioning is greatly increased. Furthermore, because sensors are less likely to be checked and repaired individually across different regions, the fusion center must have the ability to correctly judge information when the sensor has already been attacked. This thesis basically considers an under-attack wireless sensor network system. To reduce the system error rate, a new method is proposed. First, the likelihood ratio test is used to analyze the transmission signals of each sensor. Meanwhile, the transmission signals of other sensors are summed up and fusion center judges which signals were transmitted. The two transmission signals are then compared to check whether if they are matched. If both signals are identical, then determine the sensor as a legitimate sensor; otherwise, determine the sensor as an attacker. Finally, the fusion center only considers the transmission signal of the legitimate sensor and uses the majority decision to make the final decision. Wang Tsang-Yi 王藏億 2018 學位論文 ; thesis 37 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 通訊工程研究所 === 106 === Recently, due to the rise of smart home systems, the need for border battles and also with
the low cost and convenience of sensors, the wireless sensing network becomes an indispensable
system. However, since the sensor is exposed in the open space, the possibility of being attacked
or malfunctioning is greatly increased. Furthermore, because sensors are less likely to be checked
and repaired individually across different regions, the fusion center must have the ability to
correctly judge information when the sensor has already been attacked.
This thesis basically considers an under-attack wireless sensor network system. To reduce
the system error rate, a new method is proposed. First, the likelihood ratio test is used to
analyze the transmission signals of each sensor. Meanwhile, the transmission signals of other
sensors are summed up and fusion center judges which signals were transmitted. The two
transmission signals are then compared to check whether if they are matched. If both signals
are identical, then determine the sensor as a legitimate sensor; otherwise, determine the sensor
as an attacker. Finally, the fusion center only considers the transmission signal of the legitimate
sensor and uses the majority decision to make the final decision.
|
author2 |
Wang Tsang-Yi |
author_facet |
Wang Tsang-Yi Shih-Ming Tseng 曾士銘 |
author |
Shih-Ming Tseng 曾士銘 |
spellingShingle |
Shih-Ming Tseng 曾士銘 Physical-Layer Security Design for Distributed Detection with Attackers |
author_sort |
Shih-Ming Tseng |
title |
Physical-Layer Security Design for Distributed Detection with Attackers |
title_short |
Physical-Layer Security Design for Distributed Detection with Attackers |
title_full |
Physical-Layer Security Design for Distributed Detection with Attackers |
title_fullStr |
Physical-Layer Security Design for Distributed Detection with Attackers |
title_full_unstemmed |
Physical-Layer Security Design for Distributed Detection with Attackers |
title_sort |
physical-layer security design for distributed detection with attackers |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/7f6pne |
work_keys_str_mv |
AT shihmingtseng physicallayersecuritydesignfordistributeddetectionwithattackers AT céngshìmíng physicallayersecuritydesignfordistributeddetectionwithattackers AT shihmingtseng cúnzàigōngjīzhězhīfēnsànshìzhēncèxìtǒngdewùlǐcéngānquánshèjìfāngfǎ AT céngshìmíng cúnzàigōngjīzhězhīfēnsànshìzhēncèxìtǒngdewùlǐcéngānquánshèjìfāngfǎ |
_version_ |
1719293890544009216 |