請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62201完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 蘇炫榮(Hsuan-Jung Su) | |
| dc.contributor.author | Yi-Chi Shao | en |
| dc.contributor.author | 邵貽琦 | zh_TW |
| dc.date.accessioned | 2021-06-16T13:33:29Z | - |
| dc.date.available | 2015-07-26 | |
| dc.date.copyright | 2013-07-26 | |
| dc.date.issued | 2013 | |
| dc.date.submitted | 2013-07-18 | |
| dc.identifier.citation | [1] T. Cover and A. El Gamal, “Capacity theorems for the relay channel,” IEEE Transactions on Information Theory, vol. 25, no. 5, pp. 572–584, Sep. 1979.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062–3080, 2004. [3] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. Part I. System description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, 2003. [4] B. Nazer and M. Gastpar, “Reliable physical layer network coding,” Proceed-ings of the IEEE, vol. 99, no. 3, pp. 438–460, 2011. [5] R. Zhang, Y. C. Liang, C. C. Chai, and S. Cui, “Optimal beamforming for two-way multi-antenna relay channel with analogue network coding,” IEEE J.Select. Areas Commun., vol. 27, no. 5, pp. 699 – 712, 2009. [6] T. Cover and J. Thomas, Elements of information theory. NewYork:Wiley,1991. [7] T. Wang and G. B. Giannakis, “Mutual information jammer-relay games,”Information Forensics and Security, IEEE Transactions on, vol. 3, no. 2, pp.290–303, 2008. [8] A. Kashyap, T. Basar, and R. Srikant, “Correlated Jamming on MIMO Gaussian Fading Channels,” IEEE Trans. Inform. Theory, vol. 50, pp. 2119–2123, 2004. [9] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005. [10] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two way relay communications with untrusted relay and friendly jammers,” to appear, IEEE Transactions on Vehicular Communication. [11] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” vol. 7, no. 1, pp. 310–320, 2012. [12] J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, “Secure beamforming for mimo two-way transmission with an untrusted relay,” in to appear, IEEE Wireless Communications and Networking Conference (WCNC), 2013. [13] M. N. Khormuji and M. Skoglund, “On instantaneous relaying,” Information Theory, IEEE Transactions on, vol. 56, no. 7, pp. 3378–3394, 2010. [14] M. J. Osborne and A. Rubinstein, A course in game theory. The MIT press, 1994. [15] E. Jorswieck and H. Boche, Majorization and Matrix Monotone Functions in Wireless Communications. Now Publishers Inc, 2007, vol. 3. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/62201 | - |
| dc.description.abstract | 在合作式無線網路中,雙向中繼站通道是很基本的構建單元,兩個信源在此通道中透過中繼站交換訊息。先前的文獻探討中,大多假設終端彼此間在中繼站網路中是完全合作的。在本篇論文中,我們考慮的雙向中繼通道包含一個惡意中繼站及一個合作中繼站,而此合作中繼站採用的傳送方式是著名的類比網路編碼。我們的目標是透過相互資訊賽局去了解這些中繼站的最佳策略。在我們所定義的賽局中,參與者是合作式中繼站和惡意中繼站,效用函數定義為可達到的碼率。透過尋找賽局的納許均衡可以得知合作中繼站及惡意中繼站的最佳傳輸策略。因為我們允許中繼站在同一個碼字中的不同符號去調整傳送策略,所以我們提出的賽局比前人的研究更一般化。在這個更新更一般化的賽局中,我們保證了單純策略均衡的存在,而這個單純策略均衡建議合作式中繼站即使是在固定通道下也要去調整不同符號的模擬網路編碼放大係數。然而因為效用函數是非凸函數,要推導出明確的單純策略均衡是非常困難的。為了克服這個困難,我們將效用函數線性化。此外,前人研究中所探討的單向中繼通道是我們論文的一個特殊情況,我們的研究結果顯示前人所提出的惡意攻擊方式不是最佳的。 | zh_TW |
| dc.description.abstract | The two-way relay channel is a fundamental building block of the cooperative wireless networks, where two sources want to exchange messages via relays. Most works in the literature on the relay networks assume that all terminals are fully
cooperative. In this thesis, we consider a two-way relay channel that contains a malicious relay, and a cooperative relay which adopts the celebrated analog network coding (ANC). We aim to understand the optimal strategies of these two relays via mutual information games. The cooperative and malicious relays are two players in our game and the achievable sum rates are adopted as the utilities. The optimal transmission strategies of both types of relays are derived by identifying the Nash equilibrium (NE) of the proposed game. By allowing relays to change transmission actions symbol by symbol in a codeword length, the proposed game generalizes the mutual information games in previous works. With this new game formulation, the pure strategy NE exists where the cooperative relay is suggested to vary the amplifying coefficients of the ANC symbol by symbol even for a fixed channel. However, owing to the non-convex nature of our utilities, it is still hard to explicitly derive the pure strategy NE. To overcome this problem, the utilities are linearized. Furthermore, the special cases of our results also show that the malicious attacks proposed by previous works for the one-way relay channel may not be optimal. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-16T13:33:29Z (GMT). No. of bitstreams: 1 ntu-102-R00942059-1.pdf: 758017 bytes, checksum: e3c3a407142469b83e88714d5851b97d (MD5) Previous issue date: 2013 | en |
| dc.description.tableofcontents | Abstract i
List of Figures v Chapters: 1. Introduction 1 1.1 Notations 4 2. System Model 5 3. Extended Mutual Information Game 8 4. Optimal Behaviors of the Relays from the Pure Strategy Nash Equilibrium without power allocation 11 4.1 Characteristic of the pure strategy Nash Equilibrium 11 4.2 Explicit pure strategy Nash equilibrium 15 5. Optimal Behaviors of the Relays from the Pure Strategy Nash Equilibrium with power allocation 25 5.1 Explicit pure strategy Nash equilibrium 25 6. Simulation results 32 6.1 Simulation without power allocation on the relays 32 6.2 Simulation with power allocation on the relays 34 7. Conclusion 41 Bibliography 42 | |
| dc.language.iso | en | |
| dc.subject | 相互資訊賽局 | zh_TW |
| dc.subject | 雙向中繼通道 | zh_TW |
| dc.subject | 非凸性 | zh_TW |
| dc.subject | 合作式無線網路 | zh_TW |
| dc.subject | 納許均衡 | zh_TW |
| dc.subject | 類比網路編碼 | zh_TW |
| dc.subject | mutual information games | en |
| dc.subject | Nash equilibrium | en |
| dc.subject | non-convex | en |
| dc.subject | cooperative wireless networks | en |
| dc.subject | Analog network coding | en |
| dc.subject | Two-way relay channel | en |
| dc.title | 可變性類比網路編碼雙向中繼通道之惡意行為探討 | zh_TW |
| dc.title | On Malicious Behavior in Two-Way Relay Channel with
Variable Analog Network Coding | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 101-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 林士駿,王奕翔,林婉怡 | |
| dc.subject.keyword | 雙向中繼通道,合作式無線網路,類比網路編碼,相互資訊賽局,納許均衡,非凸性, | zh_TW |
| dc.subject.keyword | Two-way relay channel,cooperative wireless networks,Analog network coding,mutual information games,Nash equilibrium,non-convex, | en |
| dc.relation.page | 43 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2013-07-19 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
| 顯示於系所單位: | 電信工程學研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-102-1.pdf 未授權公開取用 | 740.25 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
