博碩士論文 945303003 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:56 、訪客IP:3.139.97.233
姓名 周俊奇(Chun-Chi Chou)  查詢紙本館藏   畢業系所 通訊工程學系在職專班
論文名稱 低成本低耗能之車用防盜數位通訊系統
(Low Cost and Low Power Consumption Vehicle Anti-theft Digital Communication Systems)
相關論文
★ 利用手持式手機工具優化行動網路系統於特殊型活動環境★ 穿戴裝置動態軌跡曲線演算法設計
★ 石英諧振器之電極面設計對振盪頻率擾動之溫度相依性研究★ 股票開盤價漲跌預測
★ 感知無線電異質網路下以不完美頻譜偵測進行資源配置之探討★ 大數量且有限天線之多輸入多輸出系統效能分析
★ 具有元學習分類權重轉移網路生成遮罩於少樣本圖像分割技術★ 具有注意力機制之隱式表示於影像重建 三維人體模型
★ 使用對抗式圖形神經網路之物件偵測張榮★ 基於弱監督式學習可變形模型之三維人臉重建
★ 以非監督式表徵分離學習之邊緣運算裝置低延遲樂曲中人聲轉換架構★ 基於序列至序列模型之 FMCW雷達估計人體姿勢
★ 基於多層次注意力機制之單目相機語意場景補全技術★ 應用於3GPP WCDMA-FDD上傳鏈路系統的遞迴最小平方波束合成犛耙式接收機
★ 調適性遠時程瑞雷衰退通道預測演算法設計與性能比較★ 智慧型天線之複合式到達方位-時間延遲估測演算法及Geo-location應用
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在本論文中,我們將研究一個低成本、低耗能的車用防盜通訊系統-VACS (Vehicle Anti-theft Communication System),並加以實作及進行相關測試。VACS可以取代GSM通訊系統,讓車輛與外部週邊配件(如診斷器、遙控器)直接進行通訊,傳輸車輛狀態資訊及控制命令,而不需基地台等昂貴硬體建設介入傳輸,也因此不需負擔通訊月租費。
VACS係以IEEE Std 802.15.4TM – 2006 physical layer作為基礎,再加上自行研發的MAC layer及application layer,並儘量降低系統的複雜度,以節省開發時間和成本。
VACS利用duty periods來節省電源消耗。系統裝置在每一個固定時間區間內,只需視情況開啟transceiver一小段時間,其餘時間可關閉transceiver並進入low power mode。
VACS系統經實作驗證,有效傳輸距離可達135公尺以上。遙控器的待機時間長達40000小時,系統容量可供13333 users同時使用。成本方面,一套VACS硬體製造成本可控制在新台幣1000元以內。
摘要(英) In this thesis, we investigate a low cost and low power consumption communication system for vehicle anti-theft systems, “VACS (Vehicle Anti-theft Communication System)”. We also perform the hardware implementation and the related tests. VACS can replace the GSM system to communicate directly between the vehicle and its accessories (such as diagnostic device and remote control device), it can transmit vehicle status information and vehicle control command without the need of expensive infrastructures such as the base stations in GSM systems, and hence the users do not have to pay the monthly communication service fees.
VACS is a system based on IEEE Std 802.15.4TM–2006 physical layer, the upper layers are self-defined MAC layer and application layer. We try to lower the complexity of the system in order to reduce the time and the cost of the development.
VACS utilizes the duty periods to save power consumption. The devices turn on the transceivers only for a very short time in every fixed time interval, and turn off the transceivers to enter low power mode for the rest of the time.
According to the test results of the hardware implementation, the effective transmission range of VACS is more than 135 meters. The standby duration of remote control device is up to 40000hrs. The system capacity can support 13333 users simultaneously. The cost of a set of VACS can be controlled under NT1000 dollars.
關鍵字(中) ★ 低耗能
★ 低成本
★ 數位通訊
★ 車用防盜
關鍵字(英) ★ low power
★ low cost
★ digital communication
★ vehicle anti-theft
論文目次 中文摘要 i
英文摘要 ii
目錄 iii
圖目錄 ix
表目錄 xi
第一章 導論 1
1-1 背景與研究動機 1
1-2 現有車用防盜通訊系統 1
1-3 系統構想 2
1-4 EMCS(Engine Management and Communication System) 3
1-5 系統設計考量 5
1-5-1 Mobility 5
1-5-2 Low Power 5
1-5-3 Limit Range 5
1-5-4 Low Cost 5
1-5-5 Low Data Rate 5
1-5-6 Frequency of Operation 5
1-5-7 Self-Organizing 5
1-5-8 Capacity 6
1-5-9 Security 6
1-5-10 Coexistence and Jamming 6
1-6 適用的無線通訊技術 6
1-7 Protocol Layer 7
1-8 Topology 7
第二章 Physical Layer 9
2-1 RF Characteristics 9
2-1-1 Frequency Band 9
2-1-2 Channel Assignment 9
2-1-3 Transmit Power 9
2-1-4 Receiver Sensitivity 9
2-1-5 Receiver Max. Input Level 9
2-1-6 Transmit Power Spectral Density(PSD) 9
2-1-7 Receiver Jamming Resistance 10
2-1-8 CCA(Clear Channel Assessment) 10
2-1-9 aTurnaroundTime 10
2-2 Modulation and Spreading 11
2-3 PPDU Format 13
2-3-1 SHR(Synchronization Header) 13
2-3-2 PHR(PHY Header) 13
2-3-3 PHY Payload 13
第三章 MAC Layer 14
3-1 Basic Definitions 14
3-1-1 Roles 14
3-1-2 Address 14
3-1-3 Channel 14
3-1-4 aScanChannelRange 15
3-1-5 Channel Scan順序 15
3-2 PDT(Peer Device Table) 15
3-2-1 Master PDT 15
3-2-2 Slave PDT 15
3-3 Timing Structure 16
3-3-1 aAdvanceWindow 17
3-3-2 aListenCommandDuration 17
3-3-3 aListenBeaconDuration 17
3-4 Beacon 18
3-4-1 Primary Beacon 18
3-4-2 Secondary Beacon 18
3-5 MPDU Format 18
3-5-1 MHR(MAC Header) 19
3-5-2 MSDU(MAC Payload) 19
3-5-3 MFR(MAC Footer) 19
3-6 Frame Control Field(FCF) 20
3-6-1 Frame Type 20
3-6-2 Ack Request bit 20
3-6-3 Continue bit 20
3-6-4 Security bit 20
3-6-5 Pending bit 21
3-7 Beacon frame 21
3-7-1 Pending List 22
3-8 Command frame 22
3-8-1 Slave to Master command 23
3-8-2 Master to Slave command 24
3-9 Ack frame 24
3-10 Data frame 25
3-10-1 Slave to Master data 25
3-10-2 Master to Slave data 26
3-11 FCS(Frame Check Sequence) 26
3-11-1 Shift Register Implementation 27
3-12 Beacon Request command 28
3-12-1 General Beacon Request 28
3-12-2 Limited Beacon Request 28
3-13 Data Request command 28
3-14 Channel Change Request command 31
3-15 Channel Change Cancel command 31
3-16 Channel Change Notification command 32
3-17 Interframe Spacing 33
3-18 CSMA-CA 33
3-18-1 CSMA-CA Mode A 34
3-18-2 CSMA-CA Mode B 35
3-19 State Machine 36
3-19-1 Standby state 36
3-19-2 Opening state 37
3-19-3 Searching state 37
3-19-4 Service state 37
3-19-5 Beacon period 37
3-19-6 On-Duty period 37
3-19-7 Off-Duty period 37
3-19-8 Prepare period 38
3-20 Open Service 38
3-21 Select Beacon Timing 39
3-21-1 Select Beacon Timing Mode A 40
3-21-2 Select Beacon Timing Mode B 41
3-21-3 Select Beacon Timing Mode C 41
3-21-4 Select Beacon Timing Mode D 42
3-21-5 Select Beacon Timing Mode E 43
3-22 Service Search 43
3-22-1 Service Search Mode A 44
3-22-2 Service Search Mode B 44
3-22-3 Service Search Mode C 44
3-22-4 Service Search Mode D 44
3-23 Channel Search 44
3-24 Events 45
3-24-1 SYNC-LOSS 45
3-24-2 Hacker-Intrusion 46
3-24-3 Channel Conflict 46
3-25 Channel Change Request 47
3-26 Channel Change Cancel 48
3-27 Slave General Transmission 49
3-28 Slave Force Transmission 50
3-29 Change Channel 51
3-29-1 Change Channel Mode A(Priority = 1) 51
3-29-2 Change Channel Mode B(Priority = 2) 53
3-29-3 Change Channel Mode C(Priority = 3) 55
3-30 Search New Channel 57
第四章 Security 58
4-1 Security Requirement 58
4-2 Frame Counter 59
4-3 Authentication Tag(Auth. Tag) 59
4-4 CCM* 59
4-4-1 Block Cipher 59
4-4-2 CCM* Nonce 59
4-4-3 a data、m data及c data 60
4-5 Outgoing Frame Security 60
4-6 Incoming Frame Security 61
4-7 CCM* Transformation 62
4-8 Input Transformation 63
4-9 Authentication Transformation 63
4-10 Encryption Transformation 64
4-11 CCM* Inverse Transformation 64
4-12 Decryption Transformation 65
4-13 Authentication Checking 65
第五章 Application Layer 67
5-1 Roles 67
5-1-1 Controller 67
5-1-2 Remoter 67
5-2 State Machine 67
5-2-1 Idle state 67
5-2-2 Starting state 67
5-2-3 Synchronizing state 68
5-2-4 Working state 68
5-3 Start Service 69
5-4 EMS Polling 70
5-5 Synchronization 70
5-5-1 Synchronization Mode A 70
5-5-2 Synchronization Mode B 71
5-5-3 Synchronization Mode C 71
5-5-4 Synchronization Mode D 71
5-6 Beacon Payload Format 72
5-6-1 Beacon Payload Header 72
5-7 Data Payload Format 73
5-7-1 Data Payload Header 73
5-8 Vehicle Status Notification 74
5-9 Warning Notification 75
5-10 Vehicle Control Request 76
5-10-1 Vehicle Lock Request 78
5-10-2 Vehicle Unlock Request 79
5-10-3 Vehicle Alarm Request 79
5-10-4 Vehicle Mute Request 79
5-10-5 Vehicle Ignition Request 80
5-10-6 Vehicle Key-off Request 80
第六章 系統實作與測試 81
6-1 硬體電路設計 81
6-1-1 LEDs 86
6-1-2 Buttons 87
6-2 軟體設計 87
6-2-1 Software Architecture 88
6-2-2 MAC layer參數 90
6-3 系統測試 91
6-3-1 測試物品 91
6-3-2 測試環境 91
6-3-3 測試項目 91
6-3-4 測試結果 100
第七章 結論與未來方向 101
參考文獻 105
參考文獻 [1] Arizona Criminal Justice Commission, Arizona Auto Theft Study, May 2004.
[2] Z. Liu and G. He, “A vehicle anti-theft and alarm system based on computer vision,” in IEEE Int. Conf. on Vehicular Electronics and Safety, pp. 326-330, 2005.
[3] H. Song, S. Zhu and G. Cao, “SVATS: A Sensor-Network-Based Vehicle Anti-Theft System,” in Proc. of IEEE INFOCOM, pp. 171-175, Apr. 2008.
[4] K. S. Khangura, N. V. Middleton and M. M. Olliivier, “Vehicle anti-theft system uses radio frequency identification,” IEE Colloquium on Vehicle Security Systems, Oct. 1993.
[5] W. Ma, “Research and Realization of Autonomous GSM/GPS Vehicle Security Systems,” 元智大學電機工程研究所 碩士論文, 2002.
[6] L.-D. Yan, “The development and implement about the car's burglarproof system with remote monitor, combining GPS, RFID and Video,” 中興大學電機工程研究所 碩士論文, 2006.
[7] Y. Hori, Y. Sasaki, I. Miyamatsu and S. Yakura, “Development of Intrusion Detection Sensor for Vehicle Anti-theft Systems,” in Fujitsu Ten Tech. J., No.14, pp. 23-29, 2000.
[8] D. Walker, Engine Management: Optimising Carburettors, Fuel Injection and Ignition Systems, Haynes Manuals Inc; Har/Cdr edition, 2001.
[9] 李南海, 電子控制汽油噴射技術, 全華科技圖書股份有限公司, 1989.
[10] J. Schiller, Mobile Communications, 2nd ed., Addison-Wesley, 2003.
[11] T. S. Rappaport, Wireless Communications: Principles and Practice, 2nd ed., Prentice Hall PTR, 2002.
[12] J.-S. Lee, Y.-W. Su and C.-C. Shen, “A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi,” in IEEE IECON Industrial Electronics Society, pp. 46-51, 2007.
[13] E. Ferro and F. Potorti, “Bluetooth and Wi-Fi wireless protocols: a survey and a comparison,” in IEEE Wireless Communications, pp. 12-26, Feb. 2005.
[14] A. Anttonen and T. Rautio, “Performance and complexity analysis for adaptive sample rate converters in GSM/UMTS/HIPERLAN2 mobile transceiver,” in IEEE Int. Symposium on Circuits and Systems, vol. 4, pp. IV-489 - IV-492, May 2002.
[15] G. Lampropoulos, A. Kaloxylos, N. Passas and L. Merakos, “A Power Consumption Analysis of Tight-Coupled WLAN/UMTS Networks,” in IEEE Int. Symposium on PIMRC, pp. 1-5, Sep. 2007.
[16] ANSI/IEEE Std 802.11, 1999 Edition, (Reaff 2003), “Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.”
[17] IEEE Std 802.11a-1999, “Supplement to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: High-speed Physical Layer in the 5 GHz Band.”
[18] IEEE Std 802.11b-1999, “Supplement to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: High-speed Physical Layer Extension in the 2.4 GHz Band.”
[19] IEEE Std 802.11g-2003, “IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 4: Further Higher Data Rate Extension in the 2.4 GHz Band.”
[20] Bluetooth SIG, “Specification of the Bluetooth System – Core,” Core Specification V2.0 + EDR, Nov. 2004.
[21] IEEE Std 802.15.4-2006, “IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).”
[22] ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry - Key Agreement and Key Transport Using Elliptic Curve Cryptography.
[23] NIST Pub 800-38C, Recommendation for Block Cipher Modes of Operation - The CCM Mode for Authentication and Confidentiality, U.S. Department of Commerce/N.I.S.T., May 12, 2004.
[24] FIPS Pub 197, Advanced Encryption Standard (AES).
[25] Atmel, IEEE 802.15.4TM Radio Transceiver AT86RF230 Data Sheet, San Jose, CA, May 2007.
[26] Atmel, 8-bit Microcontroller ATmega1281 Data Sheet, San Jose, CA, Jan. 2007.
指導教授 陳永芳(Yung-Fang Chen) 審核日期 2008-7-18
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明