Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62201
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor蘇炫榮(Hsuan-Jung Su)
dc.contributor.authorYi-Chi Shaoen
dc.contributor.author邵貽琦zh_TW
dc.date.accessioned2021-06-16T13:33:29Z-
dc.date.available2015-07-26
dc.date.copyright2013-07-26
dc.date.issued2013
dc.date.submitted2013-07-18
dc.identifier.citation[1] T. Cover and A. El Gamal, “Capacity theorems for the relay channel,” IEEE Transactions on Information Theory, vol. 25, no. 5, pp. 572–584, Sep. 1979.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062–3080, 2004.
[3] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. Part I. System description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, 2003.
[4] B. Nazer and M. Gastpar, “Reliable physical layer network coding,” Proceed-ings of the IEEE, vol. 99, no. 3, pp. 438–460, 2011.
[5] R. Zhang, Y. C. Liang, C. C. Chai, and S. Cui, “Optimal beamforming for two-way multi-antenna relay channel with analogue network coding,” IEEE J.Select. Areas Commun., vol. 27, no. 5, pp. 699 – 712, 2009.
[6] T. Cover and J. Thomas, Elements of information theory. NewYork:Wiley,1991.
[7] T. Wang and G. B. Giannakis, “Mutual information jammer-relay games,”Information Forensics and Security, IEEE Transactions on, vol. 3, no. 2, pp.290–303, 2008.
[8] A. Kashyap, T. Basar, and R. Srikant, “Correlated Jamming on MIMO Gaussian Fading Channels,” IEEE Trans. Inform. Theory, vol. 50, pp. 2119–2123, 2004.
[9] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005.
[10] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two way relay communications with untrusted relay and friendly jammers,” to appear, IEEE Transactions on Vehicular Communication.
[11] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” vol. 7, no. 1, pp. 310–320, 2012.
[12] J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, “Secure beamforming for mimo two-way transmission with an untrusted relay,” in to appear, IEEE Wireless Communications and Networking Conference (WCNC), 2013.
[13] M. N. Khormuji and M. Skoglund, “On instantaneous relaying,” Information Theory, IEEE Transactions on, vol. 56, no. 7, pp. 3378–3394, 2010.
[14] M. J. Osborne and A. Rubinstein, A course in game theory. The MIT press, 1994.
[15] E. Jorswieck and H. Boche, Majorization and Matrix Monotone Functions in Wireless Communications. Now Publishers Inc, 2007, vol. 3.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62201-
dc.description.abstract在合作式無線網路中,雙向中繼站通道是很基本的構建單元,兩個信源在此通道中透過中繼站交換訊息。先前的文獻探討中,大多假設終端彼此間在中繼站網路中是完全合作的。在本篇論文中,我們考慮的雙向中繼通道包含一個惡意中繼站及一個合作中繼站,而此合作中繼站採用的傳送方式是著名的類比網路編碼。我們的目標是透過相互資訊賽局去了解這些中繼站的最佳策略。在我們所定義的賽局中,參與者是合作式中繼站和惡意中繼站,效用函數定義為可達到的碼率。透過尋找賽局的納許均衡可以得知合作中繼站及惡意中繼站的最佳傳輸策略。因為我們允許中繼站在同一個碼字中的不同符號去調整傳送策略,所以我們提出的賽局比前人的研究更一般化。在這個更新更一般化的賽局中,我們保證了單純策略均衡的存在,而這個單純策略均衡建議合作式中繼站即使是在固定通道下也要去調整不同符號的模擬網路編碼放大係數。然而因為效用函數是非凸函數,要推導出明確的單純策略均衡是非常困難的。為了克服這個困難,我們將效用函數線性化。此外,前人研究中所探討的單向中繼通道是我們論文的一個特殊情況,我們的研究結果顯示前人所提出的惡意攻擊方式不是最佳的。zh_TW
dc.description.abstractThe two-way relay channel is a fundamental building block of the cooperative wireless networks, where two sources want to exchange messages via relays. Most works in the literature on the relay networks assume that all terminals are fully
cooperative. In this thesis, we consider a two-way relay channel that contains a malicious relay, and a cooperative relay which adopts the celebrated analog network coding (ANC). We aim to understand the optimal strategies of these two relays via mutual information games. The cooperative and malicious relays are two players in our game and the achievable sum rates are adopted as the utilities. The optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium (NE) of the proposed game. By allowing relays to change transmission
actions symbol by symbol in a codeword length, the proposed game generalizes the mutual information games in previous works. With this new game formulation, the pure strategy NE exists where the cooperative relay is suggested to vary the
amplifying coefficients of the ANC symbol by symbol even for a fixed channel. However, owing to the non-convex nature of our utilities, it is still hard to explicitly derive the pure strategy NE. To overcome this problem, the utilities are linearized. Furthermore, the special cases of our results also show that the malicious attacks proposed by previous works for the one-way relay channel may not be optimal.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T13:33:29Z (GMT). No. of bitstreams: 1
ntu-102-R00942059-1.pdf: 758017 bytes, checksum: e3c3a407142469b83e88714d5851b97d (MD5)
Previous issue date: 2013
en
dc.description.tableofcontentsAbstract i
List of Figures v
Chapters:
1. Introduction 1
1.1 Notations 4
2. System Model 5
3. Extended Mutual Information Game 8
4. Optimal Behaviors of the Relays from the Pure Strategy Nash Equilibrium without power allocation 11
4.1 Characteristic of the pure strategy Nash Equilibrium 11
4.2 Explicit pure strategy Nash equilibrium 15
5. Optimal Behaviors of the Relays from the Pure Strategy Nash Equilibrium with power allocation 25
5.1 Explicit pure strategy Nash equilibrium 25
6. Simulation results 32
6.1 Simulation without power allocation on the relays 32
6.2 Simulation with power allocation on the relays 34
7. Conclusion 41
Bibliography 42
dc.language.isoen
dc.subject相互資訊賽局zh_TW
dc.subject雙向中繼通道zh_TW
dc.subject非凸性zh_TW
dc.subject合作式無線網路zh_TW
dc.subject納許均衡zh_TW
dc.subject類比網路編碼zh_TW
dc.subjectmutual information gamesen
dc.subjectNash equilibriumen
dc.subjectnon-convexen
dc.subjectcooperative wireless networksen
dc.subjectAnalog network codingen
dc.subjectTwo-way relay channelen
dc.title可變性類比網路編碼雙向中繼通道之惡意行為探討zh_TW
dc.titleOn Malicious Behavior in Two-Way Relay Channel with
Variable Analog Network Coding
en
dc.typeThesis
dc.date.schoolyear101-2
dc.description.degree碩士
dc.contributor.oralexamcommittee林士駿,王奕翔,林婉怡
dc.subject.keyword雙向中繼通道,合作式無線網路,類比網路編碼,相互資訊賽局,納許均衡,非凸性,zh_TW
dc.subject.keywordTwo-way relay channel,cooperative wireless networks,Analog network coding,mutual information games,Nash equilibrium,non-convex,en
dc.relation.page43
dc.rights.note有償授權
dc.date.accepted2013-07-19
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電信工程學研究所zh_TW
顯示於系所單位:電信工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-102-1.pdf
  未授權公開取用
740.25 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved