請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/51079
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 陳光禎(Kwang-Cheng Chen) | |
dc.contributor.author | Kuan-Yu Chen | en |
dc.contributor.author | 陳冠余 | zh_TW |
dc.date.accessioned | 2021-06-15T13:24:51Z | - |
dc.date.available | 2021-07-06 | |
dc.date.copyright | 2016-07-06 | |
dc.date.issued | 2016 | |
dc.date.submitted | 2016-06-08 | |
dc.identifier.citation | [1] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor networks: a survey on recent developments and potential synergies,” The Journal of Supercomputing, vol. 68, pp. 1–48, April 2014.
[2] M. F. Othman and K. Shazali, “Wireless sensor network applications: A study in environment monitoring system,” International Symposium on Robotics and Intelligent Sensors, vol. 41, pp. 1204–1210, July 2012. [3] Y. Liu, Y. He, M. Li, J. Wang, K. Liu, and X. Li, “Does wireless sensor network scale? a measurement study on greenorbs,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 10, pp. 1983–1993, 10 2013. [4] S. Sagiroglu and D. Sinanc, “Big data: A review,” Collaboration Technologies and Systems (CTS), , 2013 International Conference on, pp. 42–47, May 2013. [5] A. B. Zaslavsky, C. Perera, and D. Georgakopoulos, “Sensing as a service and big data,” CoRR, vol. abs/1301.0159, 2013. [6] A. Cichocki, D. P. Mandic, A. H. Phan, C. F. Caiafa, G. Zhou, Q. Zhao, and L. D. Lathauwer, “Tensor decompositions for signal processing applications: From two-way to multiway component analysis,” IEEE Signal Processing Magazine, vol. 32, pp. 145–163, March 2015. [7] A. Tajer, V. V. Veeravalli, and H. V. Poor, “Outlying sequence detection in large data sets: A data-driven approach,” IEEE Signal Processing Magazine, vol. 31, pp. 44–56, Sept. 2014. [8] S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, “Online outlier detection in sensor data using nonparametric models,” 2006. [9] V. Katiyar, N. Chand, and S. Soni, “Clustering algorithms for heterogeneous wireless sensor network: A survey,” International Journal of Applied Enginnering Research, Dindigul, vol. 1, no. 2, 2010. [10] H. V. Poor and O. Hadjiliadis, Quickest Detection. Cambridge University Press, 2009. [11] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes: Theory and Application. Prentice-Hall, Inc., 1993. [12] E. S. Page, “Continuous inspection schemes,” Biometrika, vol. 41, pp. 100–115, 1954. [13] G. Lorden, “Procedures for reacting to a change in distributions,” Ann. Math. Statist., vol. 42, pp. 1897–1908, 1971. [14] Y. L. Lai, “Information bounds and quick detection of parameter changes in stochastic systems,” IEEE Trans. Inform. Theory, vol. 44, pp. 2917–2929, Nov. 1998. [15] H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. Springer-Verlag New York, Inc., 1994. [16] A. N. Shiryaev, “On optimum methods in quickest detection problems,” Theory Prob. Appl., vol. 8, pp. 22–46, 1963. [17] K. Y. Chen and K. C. Chen, “Quantization for distributed estimation,” Internet of Things (iThings), 2014 IEEE International Conference on, pp. 223–227, Sept 2014. [18] D. Slepian and J. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471–480, Jul. 1973. [19] J. Garcia-Frias, “Compression of correlated binary sources using turbo codes,” Communications Letters, IEEE, vol. 5, no. 10, pp. 417–419, Oct. 2001. [20] A. Aaron and B. Girod, “Compression with side information using turbo codes,” Data Compression Conference, pp. 252–261, 2002. [21] A. Wyner and J. Ziv, “The rate-distortion function for source coding with side information at the decoder,” IEEE Trans. Inf. Theory, vol. 22, no. 1, pp. 1–10, Jan 1976. [22] T. Berger, Z. Zhang, and H. Viswanathan, “The ceo problem,” IEEE Trans. Inf. Theory, vol. 42, no. 3, pp. 887–902, May 1996. [23] V. Prabhakaran, D. Tse, and K. Ramachandran, “Rate region of the quadratic gaussian ceo problem,” Information Theory, ISIT 2004. Proceedings. International Symposium on, p. 119, 2004. [24] W. Kester, “The data conversion handbook,” Newnes, 2005. [25] J. Gubner, “Distributed estimation and quantization,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1456–1459, Jul 1993. [26] S. Lloyd, “Least squares quantization in pcm,” IEEE Trans. Inf. Theory, vol. 28, no. 2, pp. 129–137, Mar 1982. [27] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd ed. Wiley-Interscience, 2000. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/51079 | - |
dc.description.abstract | 無線感測器網路是近年來最有潛力技術的其中之一。它被應用在各
式各樣的領域中,如健康照護、軍事監察、環境監控等。除此之外, 安全防護也是無線感測器網路中一個重要的議題,尤其是將系統反應 時間納入考量的時候。在這篇論文中,我們的目的是在一個場域中, 利用為數眾多的感測器所傳遞的資料,盡可能地迅速偵測到入侵者。 藉由逐次機率比檢定的分析,累積和檢定即被用來達成這項任務。為 了使偵測更迅速,同時收集有用的資料,我們開發了一個方法,稱為 感測器分組。這種分組技術不僅能增強系統的效能,其本身就能形成 一個分組式的偵測演算法。 | zh_TW |
dc.description.abstract | Over the last decades, Wireless sensor Networks (WSN) is one of the most promising technique that is applied to various fields, such as health care, military surveillance, and environment monitoring. Besides, security is also an important issue in WSN, especially when the response time are taken into account. In this thesis, we are aim to detect the intrusion in a field as soon as possible, by collecting data from large number of sensors. The Cumulative Sum (CUSUM) Test is used to achieve this task, which comes from the aid of Sequential Probability Ratio Test (SPRT). To speed up the detection and collect useful data, we derive a methodology called Sensor Grouping. The grouping technique can not only be used to enhance the system, but it also forms a group-based detection algorithm. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T13:24:51Z (GMT). No. of bitstreams: 1 ntu-105-R01942121-1.pdf: 2171953 bytes, checksum: 657e8561cfd957ee76b7672a5a06f0c4 (MD5) Previous issue date: 2016 | en |
dc.description.tableofcontents | 1 Introduction..................................1
1.1 Background..................................1 1.2 Preliminary.................................2 1.2.1 Quickest Detection........................2 1.2.2 Cumulative Sum Test.......................4 2 Problem Formulation...........................8 2.1 Unusual Behavior in General Data Networks...8 2.2 Performance Measure........................10 2.3 Detection Procedure Overview...............11 3 Detection Algorithm..........................14 3.1 Modified CUSUM Test........................14 3.2 Simulation Scheme..........................18 3.3 Numerical Results..........................22 4 From Quantization to Grouping................27 4.1 Background.................................27 4.2 Hard Decision Methods......................30 4.2.1 Sum of Bits..............................31 4.2.2 Sigma-Δ Modulation Approach..............32 4.2.3 Source Coding Approach...................33 4.2.4 Quantization Region Allocation...........38 4.3 Performance Analysis.......................38 5 Grouping Algorithm...........................43 5.1 Grouping for Informative Statistic.........43 5.2 Simulation Scheme..........................46 5.3 Numerical Results..........................50 6 Conclusion and Future Works..................55 Bibliography...................................59 | |
dc.language.iso | en | |
dc.title | 入侵偵測系統之設計與分析:以感測器分組之方法 | zh_TW |
dc.title | Design and Analysis for Intrusion Detection Systems Based on Sensor Grouping | en |
dc.type | Thesis | |
dc.date.schoolyear | 104-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 李志?(Chih-Peng Li),陳曉華(Hsiao-Hwa Chen),蘇育德(Yu-Te Su),李育杰(Yuh-Jye Lee) | |
dc.subject.keyword | 無線感測器網路,最速偵測,逐次機率比檢定,累積和檢定,感測器分組, | zh_TW |
dc.subject.keyword | Wireless Sensor Networks (WSN),Quickest Detection,Sequential Probability Ratio Test (SPRT),Cumulative Sum (CUSUM),Sensor Grouping, | en |
dc.relation.page | 61 | |
dc.identifier.doi | 10.6342/NTU201600162 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2016-06-11 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-105-1.pdf 目前未授權公開取用 | 2.12 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。