首页> 外文学位 >Applications of estimation and detection theory in decentralized networks.
【24h】

Applications of estimation and detection theory in decentralized networks.

机译:估计和检测理论在分散网络中的应用。

获取原文
获取原文并翻译 | 示例

摘要

We explore three applications of decentralized networks in increasingly complex detection frameworks: unconstrained binary detection in computer networks, constrained binary detection in wireless sensor networks (WSNs), and M-ary detection in wireless body area networks (WBANs). In each of these applications, the goal is to investigate the interactions between the estimation and detection components, as well as any constrained resources.;In the first application, parametric models for anomaly detection in computer networks are developed, wherein only aggregate traffic statistics are analyzed in order to detect network anomalies. Both synthetic and real attacks are used to validate our methods, and we find that simulated attacks as low as 12% can be detected in live traffic in just a few seconds. The effect of the smart adversary, wherein attack packet-sizes are chosen to match a percentage of background traffic packet-sizes, is investigated; the proposed method is able to detect attacks with up to 71% matched traffic.;The optimal allocation of transmission power, for the estimation of a scalar parameter in a wireless sensor network, given an overall power budget constraint, is then considered. The simple star topology is first considered, after which the results are extended to the branch, tree and linear topologies, and finally these topologies' applicability to the generalized topology case is presented. The optimal allocation policies are a function of measurement and channel noises, and evolve from sensor selection, to waterfilling, and finally to channel equalization.;The third application is activity-detection via heterogeneous sensors in a wireless body-area network. In particular, the number of samples allocated to each sensor is optimized to minimize the probability of misclassification. Using experimental data from overweight adolescent subjects, it is found that allocating a greater proportion of samples to sensors which better discriminate between certain activity-levels can result in either a lower probability of error or energy-savings ranging from 18% to 22%, in comparison to equal allocation of samples. The current activity of the subject and the performance requirements do not significantly affect the optimal allocation, but employing personalized models results in improved energy-efficiency. Furthermore, an alternate vector optimization is derived which significantly reduces the computational complexity of the original combinatorial optimization.;Finally, future directions for the work described in this dissertation are presented.
机译:我们在越来越复杂的检测框架中探索了分散式网络的三种应用:计算机网络中的无约束二进制检测,无线传感器网络(WSN)中的约束二进制检测以及无线人体局域网(WBAN)中的Mary检测。在每个应用程序中,目标是调查估计和检测组件以及任何受约束的资源之间的相互作用。在第一个应用程序中,开发了用于计算机网络异常检测的参数模型,其中仅汇总了流量统计信息分析以检测网络异常。综合攻击和实际攻击都可以用来验证我们的方法,并且我们发现,仅需几秒钟,就可以在实时流量中检测到低至12%的模拟攻击。研究了智能对手的影响,其中选择攻击数据包大小以匹配后台流量数据包大小的百分比;该方法能够检测出匹配流量高达71%的攻击。在给定整体功率预算约束的情况下,考虑了用于估计无线传感器网络中标量参数的最佳传输功率分配。首先考虑简单的星形拓扑,然后将结果扩展到分支,树和线性拓扑,最后介绍这些拓扑在广义拓扑情况下的适用性。最佳分配策略是测量和信道噪声的函数,从传感器选择到注水,最后到信道均衡。第三,应用是通过无线体域网络中的异构传感器进行活动检测。特别是,优化分配给每个传感器的样本数量,以最大程度减少错误分类的可能性。使用来自超重青少年受试者的实验数据,发现将更大比例的样本分配给可以更好地区分某些活动水平的传感器可能会导致错误概率降低或节能,范围从18%到22%。比较样本的均等分配。该对象的当前活动和性能要求不会显着影响最佳分配,但是采用个性化模型可提高能源效率。此外,推导了一种可替代的向量优化方法,该方法极大地降低了原始组合优化方法的计算复杂度。最后,提出了本文所述工作的未来方向。

著录项

  • 作者

    Thatte, Gautam.;

  • 作者单位

    University of Southern California.;

  • 授予单位 University of Southern California.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 178 p.
  • 总页数 178
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号