請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9114
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 葉丙成 | |
dc.contributor.author | Chih-Yao Wu | en |
dc.contributor.author | 吳之堯 | zh_TW |
dc.date.accessioned | 2021-05-20T20:09:45Z | - |
dc.date.available | 2016-08-17 | |
dc.date.available | 2021-05-20T20:09:45Z | - |
dc.date.copyright | 2011-08-17 | |
dc.date.issued | 2011 | |
dc.date.submitted | 2011-08-15 | |
dc.identifier.citation | [1] A. D. Wyner, “The wire-tap channel,” , vol. 54, no. 8, pp. 1355–1387, 1975.
[2] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” , vol. 7, pp. 2180–2189, Jun. 2008. [3] M. Kobayashi and M. Debbah, “On the secrecy capacity of frequency-selective fading channels : A practical Vandermonde precoding,” in , 2008. [4] S. Lakshmanan, C.-L. Tsao, R. Sivakumar, and K. Sundaresan, “Securing wireless data networks against eavesdropping using smart antennas,” in , 2008, pp. 19–27. [5] U. Maurer, “Secret key agreement by public discussion from common information,” , vol. 39, no. 3, pp. 733–742, May 1993. [6] R. Ahlswede and I. Csisz´ar, “Common randomness in information theory and cryptography, part I: Secret sharing,” , vol. 39, no. 4, pp. 1121–1132, 1993. [7] H. Koorapaty, A. A. Hassan, and S. Chennakeshu, “Secure information transmission for mobile radio,” , vol. 4, pp. 52–55, Feb. 2000. [8] J.-P. Cheng, Y.-H. Li, P.-C. Yeh, and C.-M. Cheng, “MIMO-OFDM PHY Integrated (MOPI) scheme for confidential wireless transmission,” in , 2010, pp. 1–6. [9] Y. Liang, H. V. Poor, and S. Shamai (Shitz), “Information theoretic security,” , vol. 5, pp. 355–580, Apr. 2009. [10] U. Maurer and S. Wolf, “Information-theoretic key agreement: From weak to strong secrecy for free,” in , 2000, vol. 1807, pp. 351–368. [11] C. Cachin and U. Maurer, “Linking information reconciliation and privacy amplification,” , vol. 10, pp. 97–110, 1997. [12] J. L. Carter and M. N. Wegman, “Universal classes of hash functions,” , vol. 18, no. 2, pp. 143 – 154, 1979. [13] C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, “Generalized privacy amplification,” , vol. 41, no. 6, pp. 1915 –1923, Nov. 1995. [14] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, “Cryptographic key agreement for mobile radio,” , vol. 6, pp. 207–212, 1996. [15] C. Ye, A. Reznik, and Y. Shah, “Extracting secrecy from jointly gaussian random variables,” in , July 2006, pp. 2593 –2597. [16] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless information- theoretic security,” , vol. 54, no. 6, pp. 2515–2534, June 2008. [17] C. Chen and M. Jensen, “Secrecy extraction from increased randomness in a time-variant mimo channel,” in , Dec. 2009, pp. 1 –6. [18] C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, “Information-theoretically secret key generation for fading wireless channels,” , vol. 5, no. 2, pp. 240 –254, June 2010. [19] C. Chen and M. Jensen, “Improved channel quantization for secret key establishment in wireless systems,” in , Sep. 2010, pp. 1 –4. [20] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,” in , Apr. 2008, pp. 3013 –3016. [21] R. Wilson, D. Tse, and R. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” , vol. 2, no. 3, pp. 364 –375, Sep. 2007. [22] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” , vol. 9, pp. 17–30, 2010. [23] C. Chen and M. Jensen, “Secret key establishment using temporally and spatially correlated wireless channel coefficients,” , vol. 10, no. 2, pp. 205 –215, Feb. 2011. [24] C. Ye, A. Reznik, G. Sternberg, and Y. Shah, “On the secrecy capabilities of itu channels,” in , Oct. 2007, pp. 2030–2034. [25] J. Wallace and R. Sharma, “Experimental investigation of mimo reciprocal channel key generation,” in , May. 2010, pp. 1–5. [26] S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in . ACM, 2009, pp. 321–332. [27] J. Wallace and R. Sharma, “Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis,” , vol. 5, no. 3, pp. 381 –392, Sep. 2010. [28] N. Dottling, D. Lazich, J. Muller-Quade, and A. de Almeida, “Vulnerabilities of wireless key exchange based on channel reciprocity,” in , ser. Lecture Notes in Computer Science, 2011, vol. 6513, pp. 206– 220. [29] M. Edman, A. Kiayias, and B. Yener, “On passive inference attacks against physical-layer key extraction?” in , ser. EUROSEC ’11. New York, NY, USA: ACM, 2011, pp. 8:1–8:6. [30] D. Tse and P. Viswanath, Fundamentals of wireless communication. Cambridge University Press, 2005. [31] D. Love, J. Heath, R.W., and T. Strohmer, “Grassmannian beamforming for multiple-input multiple-output wireless systems,” , vol. 49, no. 10, pp. 2735 – 2747, Oct. 2003. [32] V. Klema and A. Laub, “The singular value decomposition: Its computation and some applications,” , vol. 25, no. 2, pp. 164 – 176, Apr. 1980. [33] D. Love and R. Heath, “Limited feedback unitary precoding for spatial multiplexing systems,” , vol. 51, no. 8, pp. 2967 –2976, Aug. 2005. [34] D. Love and J. Heath, R.W., “Limited feedback precoding for spatial multiplexing systems,” in , vol. 4, Dec. 2003, pp. 1857 – 1861. [35] D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, and S. Parkvall, “LTE: the evolution of mobile broadband,” , vol. 47, no. 4, pp. 44 –51, Apr. 2009. [36] J. Choi, B. Mondal, and R. Heath, “Interpolation based unitary precoding for spatial multiplexing MIMO-OFDM with limited feedback,” , vol. 54, no. 12, pp. 4730 –4740, Dec. 2006. [37] Samsung, “MIMO for Long Term Evolution,” in R1-050889, 3GPPTSG RANWG1 ♯ 42, London, UK, Aug.-Sep. 2005. [38] P. G’acs and J. Korner, “Common information is far less than mutual information,” , vol. 2, no. 2, pp. 149–162, 1973. [39] D. Love and J. Heath, R.W., “Multimode precoding for mimo wireless systems,” , vol. 53, no. 10, pp. 3674–3687, Oct. 2005. [40] 3GPP TR 25.996 V9.0.0 , 3GPP RAN1 SP-46, 3rd Generation Partnership Project Std., 2009. [41] 3GPP TR 36.814 V9.0.0 , 3GPP RAN1 RP-47, 3rd Generation Partnership Project Std., 2010. [42] B. Clerckx, Y. Zhou, and S. Kim, “Practical codebook design for limited feedback spatial multiplexing,” in , May. 2008, pp. 3982 –3987. [43] A. Derneryd and G. Kristensson, “Signal correlation including antenna coupling,” , vol. 40, no. 3, pp. 157 – 159, Feb. 2004. [44] S. Krusevac, P. Rapajic, R. Kennedy, and P. Sadeghi, “Mutual coupling effect on thermal noise in multi-antenna wireless communication systems,” in , Feb. 2005, pp. 209 –214. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9114 | - |
dc.description.abstract | 無線通訊網路在我們日常生活中日益普遍,但由於無線通訊的廣播性質,非法使用者相當容易便可接收相同訊號並進行竊聽。因此無線通訊網路的私密性和安全性是一個相當重要的課題。近年來如何在實體層上進行安全機制設計吸引了相當多的研究者,其中的一種方法是利用無線通道來汲取秘密資訊。基於無線通道的雙向對稱性,合法使用者可因此擁有相關的隨機參數。在本篇論文中,我們提出兩種不一樣的機制利用無線通道來汲取秘密資訊。第一種提出的機制為P-MOPI,它能在多天線正交多頻分工系統下產生秘密金鑰並且不會犧牲多天線系統的效能。我們利用預編碼矩陣的編號當作一個有效的金鑰產生方法,同時我們旋轉通道量測信號以避免竊聽者得到任何有用的 金鑰資訊。P-MOPI 機制可以讓兩個通訊節點很輕易的產生大量相同的祕密位元作為金鑰使用,所以可以達成安全傳輸並同時擁有多天線系統的效能增益。本篇論文提出的第二個方法為INTERSECT 機制。我們利用秘密的交織器在多天線位元交錯調變碼系統下達成安全通訊,而秘密交織器可由無線通道頻率響應的大小次序來產生。我們使用電腦模擬來檢驗我們提出機制的可行性 ,模擬的結果顯示我們提出的機制擁有優秀的安全性並相當適合用在現行的無線通訊系統上。 | zh_TW |
dc.description.abstract | Wireless communication networks become increasingly pervasive in our daily life. But the broadcasting nature makes wireless communication networks vulnerable to eavesdropping. Any receivers receive the transmitted signals are able to analyze the signals. Thus, privacy and security take an important role in wireless communication networks. Recently, providing security on physical-layer draws lots of interests. Physical-layer security can be achieved by secrecy extraction from wireless channel. Based on channel reciprocity, the legitimate nodes share correlated randomness. In this thesis, we propose two different schemes that extract secrecy from wireless channel. The first one is called P-MOPI, proposed to generate secret keys without sacrifice of MIMO gain for MIMO-OFDM systems. The precoding matrix index (PMI) is utilized as an efficient key generation mechanism and the reference signals are rotated to prevent eavesdropper from learning any secret key information. The P-MOPI scheme easily allows two communicating parties to generate abundant identical secret bits. Both secure communication and the MIMO gain can be guaranteed by using the P-MOPI scheme. The second achievement is the INTERSECT scheme which uses the secret interleaver to ensure confidential transmission for BICM-OFDM system. The order of wireless channel is then utilized as a nature secret source for secret interleaver generation. Computer simulations are done to evaluate the feasibility of our proposed schemes. The results shows the proposed P-MOPI and INTERSECT scheme provides excellent security and are suitable for modern wireless communication systems. | en |
dc.description.provenance | Made available in DSpace on 2021-05-20T20:09:45Z (GMT). No. of bitstreams: 1 ntu-100-R98942032-1.pdf: 4217455 bytes, checksum: 3a1815b51a88697950427762567ca937 (MD5) Previous issue date: 2011 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2 Backgrounds and System Descriptions 9 2.1 Background Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.1.1 MIMO-systems with precoding . . . . . . . . . . . . . . . . . . 9 2.1.2 Secret key capacity of the MIMO-OFDM channel . . . . . . . . 10 2.2 System Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3 Basic P-MOPI Scheme 13 3.1 Basic P-MOPI Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2 Security Discussion and the Risk Concern of Basic P-MOPI Scheme . . 16 4 Enhanced P-MOPI Scheme 19 4.1 Idea Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2 Enhanced P-MOPI Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 23 4.3 Security Discussion for Enhanced P-MOPI Scheme . . . . . . . . . . . 26 5 C-MOPI Scheme 29 5.1 Idea Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 5.2 Limitations on C-MOPI . . . . . . . . . . . . . . . . . . . . . . . . . . 32 6 Interleaver-based Secure Transmission (INTERSECT) Scheme 33 6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6.2 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 6.2.1 Subcarrier Grouping . . . . . . . . . . . . . . . . . . . . . . . . 37 6.2.2 Ranking Calculation . . . . . . . . . . . . . . . . . . . . . . . . 37 6.2.3 Coefficients Mapper . . . . . . . . . . . . . . . . . . . . . . . . . 37 6.2.4 Power Adjustment . . . . . . . . . . . . . . . . . . . . . . . . . 38 6.2.5 Pattern Generation . . . . . . . . . . . . . . . . . . . . . . . . . 38 6.2.6 Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 6.3 Channel Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 7 Performance Evaluation 41 7.1 Simulation Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 7.2 Performance Evaluation on P-MOPI and C-MOPI Schemes . . . . . . . 42 7.2.1 Subband Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 7.2.2 Secret Key Distribution . . . . . . . . . . . . . . . . . . . . . . 43 7.2.3 Secret Key Error Rate and Secret Key Length . . . . . . . . . . 45 7.2.4 Nearby Eavesdropper’s Performance . . . . . . . . . . . . . . . . 48 7.2.5 Mobility Effect . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 7.3 Performance Evaluation on INTERSECT Scheme . . . . . . . . . . . . 53 8 Conclusions and Future Work 59 8.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 8.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Bibliography 61 | |
dc.language.iso | en | |
dc.title | 基於多天線正交多頻分工及位元交錯調變碼系統之實體層安全機制整合設計 | zh_TW |
dc.title | Integrated Physical Layer Security Design on MIMO-OFDM Systems and BICM-OFDM Systems | en |
dc.type | Thesis | |
dc.date.schoolyear | 99-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 蘇炫榮,魏宏宇,李佳翰 | |
dc.subject.keyword | 實體層安全機制,多天線正交多頻分工系統,位元交錯調變碼系統,秘密金鑰,密碼學,預編碼矩陣編號,秘密交織器,通道量測信號之旋轉, | zh_TW |
dc.subject.keyword | Physical-layer Security,MIMO-OFDM Systems,BICM Systems,Secret Key Generation,Cryptography,Precoding Matrix Index,Secret Interleaver,Rotated Reference Signals, | en |
dc.relation.page | 65 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2011-08-15 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-100-1.pdf | 4.12 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。