博碩士論文 108522078 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:64 、訪客IP:3.133.133.178
姓名 陳頎皓(Chi-Hao Chen)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 衛星地面網路中基於物理層安全的CSI保護方法
(Physical Layer Security based CSI Protection in Satellite-terrestrial Networks)
相關論文
★ 基於OP-TEE的可信應用程式軟體生態系統★ 在低軌道衛星無線通訊中的CSI預測方法
★ 為多流量低軌道衛星系統提出的動態換手策略★ 基於Trustzone的智慧型設備語音隱私保護系統
★ 一種減輕LEO衛星網路干擾的方案★ TruzGPS:基於TrustZone的位置隱私權保護系統
★ 衛星地面整合網路之隨機接入前導訊號設計與偵測★ SatPolicy: 基於Trustzone的衛星政策執行系統
★ TruzMalloc: 基於TrustZone 的隱私資料保 護系統★ 低軌道衛星地面整合網路之安全非正交多重存取傳輸
★ 低軌道衛星地面網路中的DRX機制設計★ 衛星地面整合網路之基於集合系統的前導訊號設計
★ 基於省電的低軌衛星網路路由演算法★ 衛星上可重組化計算之安全FPGA動態部分可重組架構
★ 衛星網路之基於空間多樣性的前導訊號設計★ TrustCS: 基於 Trusted Firmware-M 的安全 CubeSat 韌體更新機制
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 衛星廣大的廣播覆蓋特性使其容易受到竊聽攻擊。攻擊者可以透過攔截目標終端用戶(User Terminal (UT)) 的通道狀態資訊(Channel State Information (CSI)) 來發起嗅探攻擊(Sniffing Attack)。CSI在UT端的導頻符號(Pilot Symbol) 上做估計,然後回傳給衛星。在嗅探攻擊中,攻擊者通過攔截的CSI計算偽造的CSI,然後回傳給衛星以誤導衛星上的迫零預編碼(Zero-forcing Precoding)。現有的CSI 保護方法不適用於採用自適應調製與編碼(Adaptive Modulation and Coding (AMC)) 技術的衛星地面網絡。在本文中,我們提出了一種抵抗嗅探攻擊的方法,SSC,以抑制衛星地面網絡中的CSI洩漏。實驗結果表明,我們的方法在專用導頻(Dedicated Pilot)和公用導頻(Public Pilot) 場景下都能更有效地抵抗嗅探攻擊。
摘要(英) Satellite’s wide broadcasting coverage property make it vulnerable to eavesdropping attacks. Attacker can launch sniffing attack by intercepting the channel state information (CSI) of the target user terminal (UT). CSI is estimated on pilot symbol at UT side and then feedback to satellite. In sniffing attack, attacker calculates forged CSI by the intercepted CSI, then feedback to satellite to mislead zero-forcing precoding on satellite. Existing CSI protection schemes are not applicable to satellite-terrestrial network which adopting adaptive modulation and coding technique . In this thesis, we propose a sniffing attack resisting scheme, SSC, to suppress CSI leakage for satellite-terrestrial networks. Simulation results show that our method can more effectively resist the sniffing attack under both dedicated pilot and public pilot scenarios.
關鍵字(中) ★ 衛星地面網路
★ 通道狀態資訊
★ 竊聽攻擊
關鍵字(英) ★ Satellite-terrestrial Networks
★ Channel State Information
★ Eavesdropping Attack
論文目次 中文摘要i
Abstract ii
致謝iii
Contents iv
List of Figures vi
List of Tables viii
1 Introduction 1
2 Related Work 4
2.1 Satellite communication security research . . . . . . . . . . . . . . . . . 4
2.2 Enhance network security by CSI . . . . . . . . . . . . . . . . . . . . . . 5
2.3 CSI protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 System Model 7
3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Pilot-aid Channel Estimation . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.1 Dedicated pilot . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2.2 Public pilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 Threat Model 11
5 Countermeasure 13
5.1 Dedicated pilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.2 Public pilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6 Evaluation 23
6.1 Satellite Channel Model . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.1.1 Free space path loss . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.2 Beam gain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.1.3 Channel fading coefficient . . . . . . . . . . . . . . . . . . . . . 24
6.2 Impact on SINR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.3 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
6.3.1 Impact of mask . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
6.3.2 Symbol error rate . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7 Conclusion 36
Bibliography 37
A PROOF OF SCF IN PUBLIC PILOT SCENARIO 41
B CALCULATION OF β 44
參考文獻 [1] A. Abdi, W. Lau, M.-S. Alouini, and M. Kaveh, “A new simple model for land mobile
satellite channels: first- and second-order statistics,” IEEE Transactions on Wireless
Communications, vol. 2, no. 3, pp. 519–528, 2003.
[2] K. An, M. Lin, J. Ouyang, and W.-P. Zhu, “Secure transmission in cognitive satellite
terrestrial networks,” IEEE Journal on Selected Areas in Communications, vol. 34,
no. 11, pp. 3025–3037, 2016.
[3] M. n. Vázquez, A. Pérez-Neira, D. Christopoulos, S. Chatzinotas, B. Ottersten, P.-D.
Arapoglou, A. Ginesi, and G. Taricco, “Precoding in multibeam satellite communications:
Present and future challenges,” IEEE Wireless Communications, vol. 23,
no. 6, pp. 88–95, 2016.
[4] L. You, A. Liu, W. Wang, and X. Gao, “Outage constrained robust multigroup multicast
beamforming for multi-beam satellite communication systems,” IEEE Wireless
Communications Letters, vol. 8, no. 2, pp. 352–355, 2019.
[5] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of
massive mimo: Benefits and challenges,” IEEE Journal of Selected Topics in Signal
Processing, vol. 8, no. 5, pp. 742–758, 2014.
[6] L. You, X. Gao, X.-G. Xia, N. Ma, and Y. Peng, “Pilot reuse for massive mimo
transmission over spatially correlated rayleigh fading channels,” IEEE Transactions
on Wireless Communications, vol. 14, no. 6, pp. 3352–3366, 2015.
[7] A.-A. Lu, X. Gao, W. Zhong, C. Xiao, and X. Meng, “Robust transmission for massive
mimo downlink with imperfect csi,” IEEE Transactions on Communications,
vol. 67, no. 8, pp. 5362–5376, 2019.
[8] R. Miller and W. Trappe, “Subverting MIMO wireless systems by jamming the channel
estimation procedure,” ACM Conference on Wireless Network Security, pp. 19–
–24, 2010.
[9] G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa, “On the robustness of IEEE
802.11 rate adaptation algorithms against smart jamming,” ACM Conference on
Wireless Network Security, pp. 97––108, 2011.
[10] Y. Yang, Y. Chen, W. Wang, and G. Yang, “Securing channel state information in
multiuser MIMO with limited feedback,” IEEE Transactions on Wireless Communications,
vol. 19, no. 5, pp. 3091–3103, 2020.
[11] B. Li, Z. Fei, C. Zhou, and Y. Zhang, “Physical-layer security in space information
networks: A survey,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33–52, 2020.
[12] M. G. Schraml, R. T. Schwarz, and A. Knopp, “Multiuser MIMO concept for physical
layer security in multibeam satellite systems,” IEEE Transactions on Information
Forensics and Security, vol. 16, pp. 1670–1680, 2021.
[13] Z. Lin, M. Lin, J.-B. Wang, Y. Huang, and W.-P. Zhu, “Robust secure beamforming
for 5G cellular networks coexisting with satellite networks,” IEEE Journal on
Selected Areas in Communications, vol. 36, no. 4, pp. 932–945, 2018.
[14] J. Lei, Z. Han, M. n. Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication
systems design with individual secrecy rate constraints,” IEEE Transactions
on Information Forensics and Security, vol. 6, no. 3, pp. 661–671, 2011.
[15] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of
physical layer security in multiuser wireless networks: A survey,” IEEE Communications
Surveys Tutorials, vol. 16, no. 3, pp. 1550–1573, 2014.
[16] Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated
channel state information for TDD-OFDM systems over fading channels,” IEEE
Transactions on Wireless Communications, vol. 16, no. 8, pp. 5176–5186, 2017.
[17] C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam,
“Information-theoretically secret key generation for fading wireless channels,” IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 240–254,
2010.
[18] H. Liu, Y. Wang, J. Yang, and Y. Chen, “Fast and practical secret key extraction by
exploiting channel response,” IEEE INFOCOM, pp. 3048–3056, 2013.
[19] Z. Jiang, J. Zhao, X.-Y. Li, J. Han, and W. Xi, “Rejecting the attack: Source authentication
for Wi-Fi management frames using CSI information,” IEEE INFOCOM,
pp. 2544–2552, 2013.
[20] T.-Y. Liu, S.-C. Lin, and Y.-W. P. Hong, “On the role of artificial noise in training and
data transmission for secret communications,” IEEE Transactions on Information
Forensics and Security, vol. 12, no. 3, pp. 516–531, 2017.
[21] N. Yang, M. Elkashlan, T. Q. Duong, J. Yuan, and R. Malaney, “Optimal transmission
with artificial noise in MISOME wiretap channels,” IEEE Transactions on Vehicular
Technology, vol. 65, no. 4, pp. 2170–2181, 2016.
[22] Y.-C. Tung, S. Han, D. Chen, and K. G. Shin, “Vulnerability and protection of channel
state information in multiuser MIMO networks,” ACM SIGSAC Conference on
Computer and Communications Security, pp. 775––786, 2014.
[23] X. Zhang and E. W. Knightly, “CSIsnoop: Inferring channel state information in
multi-user MIMO WLANs,” IEEE/ACM Transactions on Networking, vol. 27, no. 1,
pp. 231–244, 2019.
[24] C. Zhang, Y. Jing, Y. Huang, and L. Yang, “Performance analysis for massive MIMO
downlink with low complexity approximate zero-forcing precoding,” IEEE Transactions
on Communications, vol. 66, no. 9, pp. 3848–3864, 2018.
[25] L. U. Khan, N. Khan, M. I. Khattak, and M. Shafi, “LS estimator: Performance analysis
for block-type and comb-type channel estimation in OFDM system,” International
Bhurban Conference on Applied Sciences Technology (IBCAST), pp. 420–424,
2014.
[26] Y. Liu and S. Sezginer, “Iterative compensated MMSE channel estimation in LTE
systems,” IEEE International Conference on Communications (ICC), pp. 4862–
4866, 2012.
[27] NR; Physical channels and modulation, 3GPP, Dec. 2020, TS 38.211 V16.4.0.
[28] Security architecture and procedures for 5G System, 3GPP, Mar. 2021, TS 33.501
V17.1.0.
[29] System Tool Kit 11, Analytical Graphics, Inc., 2019. [Online]. Available:
https://www.agi.com/products/stk
[30] Digital Video Broadcasting (DVB); Second Generation Framing Structure, Channel
Coding and Modulation Systems for Broadcasting, Interactive Services, News
Gathering and Other Broadband Satellite Applications; Part 1: DVB-S2, ETSI EN
302307-2, 2014.
[31] K. HIGUCHI and A. BENJEBBOUR, “Non-orthogonal multiple access (NOMA)
with successive interference cancellation for future radio access,” IEICE Transactions
on Communications, vol. E98.B, no. 3, pp. 403–414, 2015.
指導教授 張貴雲(Guey-Yun Chang) 審核日期 2021-8-31
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明