Physical-Layer Security Design for Distributed Detection with Attackers

碩士 === 國立中山大學 === 通訊工程研究所 === 106 === Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the wireless sensing network becomes an indispensable system. However, since the sensor is exposed in the open space, the possibil...

Full description

Bibliographic Details
Main Authors: Shih-Ming Tseng, 曾士銘
Other Authors: Wang Tsang-Yi
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/7f6pne
id ndltd-TW-106NSYS5650011
record_format oai_dc
spelling ndltd-TW-106NSYS56500112019-11-21T05:32:59Z http://ndltd.ncl.edu.tw/handle/7f6pne Physical-Layer Security Design for Distributed Detection with Attackers 存在攻擊者之分散式偵測系統的物理層安全設計方法 Shih-Ming Tseng 曾士銘 碩士 國立中山大學 通訊工程研究所 106 Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the wireless sensing network becomes an indispensable system. However, since the sensor is exposed in the open space, the possibility of being attacked or malfunctioning is greatly increased. Furthermore, because sensors are less likely to be checked and repaired individually across different regions, the fusion center must have the ability to correctly judge information when the sensor has already been attacked. This thesis basically considers an under-attack wireless sensor network system. To reduce the system error rate, a new method is proposed. First, the likelihood ratio test is used to analyze the transmission signals of each sensor. Meanwhile, the transmission signals of other sensors are summed up and fusion center judges which signals were transmitted. The two transmission signals are then compared to check whether if they are matched. If both signals are identical, then determine the sensor as a legitimate sensor; otherwise, determine the sensor as an attacker. Finally, the fusion center only considers the transmission signal of the legitimate sensor and uses the majority decision to make the final decision. Wang Tsang-Yi 王藏億 2018 學位論文 ; thesis 37 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 通訊工程研究所 === 106 === Recently, due to the rise of smart home systems, the need for border battles and also with the low cost and convenience of sensors, the wireless sensing network becomes an indispensable system. However, since the sensor is exposed in the open space, the possibility of being attacked or malfunctioning is greatly increased. Furthermore, because sensors are less likely to be checked and repaired individually across different regions, the fusion center must have the ability to correctly judge information when the sensor has already been attacked. This thesis basically considers an under-attack wireless sensor network system. To reduce the system error rate, a new method is proposed. First, the likelihood ratio test is used to analyze the transmission signals of each sensor. Meanwhile, the transmission signals of other sensors are summed up and fusion center judges which signals were transmitted. The two transmission signals are then compared to check whether if they are matched. If both signals are identical, then determine the sensor as a legitimate sensor; otherwise, determine the sensor as an attacker. Finally, the fusion center only considers the transmission signal of the legitimate sensor and uses the majority decision to make the final decision.
author2 Wang Tsang-Yi
author_facet Wang Tsang-Yi
Shih-Ming Tseng
曾士銘
author Shih-Ming Tseng
曾士銘
spellingShingle Shih-Ming Tseng
曾士銘
Physical-Layer Security Design for Distributed Detection with Attackers
author_sort Shih-Ming Tseng
title Physical-Layer Security Design for Distributed Detection with Attackers
title_short Physical-Layer Security Design for Distributed Detection with Attackers
title_full Physical-Layer Security Design for Distributed Detection with Attackers
title_fullStr Physical-Layer Security Design for Distributed Detection with Attackers
title_full_unstemmed Physical-Layer Security Design for Distributed Detection with Attackers
title_sort physical-layer security design for distributed detection with attackers
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/7f6pne
work_keys_str_mv AT shihmingtseng physicallayersecuritydesignfordistributeddetectionwithattackers
AT céngshìmíng physicallayersecuritydesignfordistributeddetectionwithattackers
AT shihmingtseng cúnzàigōngjīzhězhīfēnsànshìzhēncèxìtǒngdewùlǐcéngānquánshèjìfāngfǎ
AT céngshìmíng cúnzàigōngjīzhězhīfēnsànshìzhēncèxìtǒngdewùlǐcéngānquánshèjìfāngfǎ
_version_ 1719293890544009216