中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/86786
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 81570/81570 (100%)
Visitors : 47030377      Online Users : 251
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/86786


    Title: 衛星地面網路中基於物理層安全的CSI保護方法;Physical Layer Security based CSI Protection in Satellite-terrestrial Networks
    Authors: 陳頎皓;Chen, Chi-Hao
    Contributors: 資訊工程學系
    Keywords: 衛星地面網路;通道狀態資訊;竊聽攻擊;Satellite-terrestrial Networks;Channel State Information;Eavesdropping Attack
    Date: 2021-08-31
    Issue Date: 2021-12-07 13:13:03 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 衛星廣大的廣播覆蓋特性使其容易受到竊聽攻擊。攻擊者可以透過攔截目標終端用戶(User Terminal (UT)) 的通道狀態資訊(Channel State Information (CSI)) 來發起嗅探攻擊(Sniffing Attack)。CSI在UT端的導頻符號(Pilot Symbol) 上做估計,然後回傳給衛星。在嗅探攻擊中,攻擊者通過攔截的CSI計算偽造的CSI,然後回傳給衛星以誤導衛星上的迫零預編碼(Zero-forcing Precoding)。現有的CSI 保護方法不適用於採用自適應調製與編碼(Adaptive Modulation and Coding (AMC)) 技術的衛星地面網絡。在本文中,我們提出了一種抵抗嗅探攻擊的方法,SSC,以抑制衛星地面網絡中的CSI洩漏。實驗結果表明,我們的方法在專用導頻(Dedicated Pilot)和公用導頻(Public Pilot) 場景下都能更有效地抵抗嗅探攻擊。;Satellite’s wide broadcasting coverage property make it vulnerable to eavesdropping attacks. Attacker can launch sniffing attack by intercepting the channel state information (CSI) of the target user terminal (UT). CSI is estimated on pilot symbol at UT side and then feedback to satellite. In sniffing attack, attacker calculates forged CSI by the intercepted CSI, then feedback to satellite to mislead zero-forcing precoding on satellite. Existing CSI protection schemes are not applicable to satellite-terrestrial network which adopting adaptive modulation and coding technique . In this thesis, we propose a sniffing attack resisting scheme, SSC, to suppress CSI leakage for satellite-terrestrial networks. Simulation results show that our method can more effectively resist the sniffing attack under both dedicated pilot and public pilot scenarios.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML146View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明