22,586 research outputs found

    Fade Depth Prediction Using Human Presence for Real Life WSN Deployment

    Get PDF
    Current problem in real life WSN deployment is determining fade depth in indoor propagation scenario for link power budget analysis using (fade margin parameter). Due to the fact that human presence impacts the performance of wireless networks, this paper proposes a statistical approach for shadow fading prediction using various real life parameters. Considered parameters within this paper include statistically mapped human presence and the number of people through time compared to the received signal strength. This paper proposes an empirical model fade depth prediction model derived from a comprehensive set of measured data in indoor propagation scenario. It is shown that the measured fade depth has high correlations with the number of people in non-line-of-sight condition, giving a solid foundation for the fade depth prediction model. In line-of-sight conditions this correlations is significantly lower. By using the proposed model in real life deployment scenarios of WSNs, the data loss and power consumption can be reduced by the means of intelligently planning and designing Wireless Sensor Network

    Deep Predictive Coding Neural Network for RF Anomaly Detection in Wireless Networks

    Full text link
    Intrusion detection has become one of the most critical tasks in a wireless network to prevent service outages that can take long to fix. The sheer variety of anomalous events necessitates adopting cognitive anomaly detection methods instead of the traditional signature-based detection techniques. This paper proposes an anomaly detection methodology for wireless systems that is based on monitoring and analyzing radio frequency (RF) spectrum activities. Our detection technique leverages an existing solution for the video prediction problem, and uses it on image sequences generated from monitoring the wireless spectrum. The deep predictive coding network is trained with images corresponding to the normal behavior of the system, and whenever there is an anomaly, its detection is triggered by the deviation between the actual and predicted behavior. For our analysis, we use the images generated from the time-frequency spectrograms and spectral correlation functions of the received RF signal. We test our technique on a dataset which contains anomalies such as jamming, chirping of transmitters, spectrum hijacking, and node failure, and evaluate its performance using standard classifier metrics: detection ratio, and false alarm rate. Simulation results demonstrate that the proposed methodology effectively detects many unforeseen anomalous events in real time. We discuss the applications, which encompass industrial IoT, autonomous vehicle control and mission-critical communications services.Comment: 7 pages, 7 figures, Communications Workshop ICC'1
    corecore