202 research outputs found

    Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

    Full text link
    The conventional device authentication of wireless networks usually relies on a security server and centralized process, leading to long latency and risk of single-point of failure. While these challenges might be mitigated by collaborative authentication schemes, their performance remains limited by the rigidity of data collection and aggregated result. They also tend to ignore attacker localization in the collaborative authentication process. To overcome these challenges, a novel collaborative authentication scheme is proposed, where multiple edge devices act as cooperative peers to assist the service provider in distributively authenticating its users by estimating their received signal strength indicator (RSSI) and mobility trajectory (TRA). More explicitly, a distributed learning-based collaborative authentication algorithm is conceived, where the cooperative peers update their authentication models locally, thus the network congestion and response time remain low. Moreover, a situation-aware secure group update algorithm is proposed for autonomously refreshing the set of cooperative peers in the dynamic environment. We also develop an algorithm for localizing a malicious user by the cooperative peers once it is identified. The simulation results demonstrate that the proposed scheme is eminently suitable for both indoor and outdoor communication scenarios, and outperforms some existing benchmark schemes

    Collaborative Indoor Positioning Systems: A Systematic Review

    Get PDF
    Research and development in Collaborative Indoor Positioning Systems (CIPSs) is growing steadily due to their potential to improve on the performance of their non-collaborative counterparts. In contrast to the outdoors scenario, where Global Navigation Satellite System is widely adopted, in (collaborative) indoor positioning systems a large variety of technologies, techniques, and methods is being used. Moreover, the diversity of evaluation procedures and scenarios hinders a direct comparison. This paper presents a systematic review that gives a general view of the current CIPSs. A total of 84 works, published between 2006 and 2020, have been identified. These articles were analyzed and classified according to the described system’s architecture, infrastructure, technologies, techniques, methods, and evaluation. The results indicate a growing interest in collaborative positioning, and the trend tend to be towards the use of distributed architectures and infrastructure-less systems. Moreover, the most used technologies to determine the collaborative positioning between users are wireless communication technologies (Wi-Fi, Ultra-WideBand, and Bluetooth). The predominant collaborative positioning techniques are Received Signal Strength Indication, Fingerprinting, and Time of Arrival/Flight, and the collaborative methods are particle filters, Belief Propagation, Extended Kalman Filter, and Least Squares. Simulations are used as the main evaluation procedure. On the basis of the analysis and results, several promising future research avenues and gaps in research were identified

    D2D-based Cooperative Positioning Paradigm for Future Wireless Systems: A Survey

    Get PDF
    Emerging communication network applications require a location accuracy of less than 1m in more than 95% of the service area. For this purpose, 5G New Radio (NR) technology is designed to facilitate high-accuracy continuous localization. In 5G systems, the existence of high-density small cells and the possibility of the device-to-device (D2D) communication between mobile terminals paves the way for cooperative positioning applications. From the standardization perspective, D2D technology is already under consideration (5G NR Release 16) for ultra-dense networks enabling cooperative positioning and is expected to achieve the ubiquitous positioning of below one-meter accuracy, thereby fulfilling the 5G requirements. In this survey, the strengths and weaknesses of D2D as an enabling technology for cooperative cellular positioning are analyzed (including two D2D approaches to perform cooperative positioning); lessons learned and open issues are highlighted to serve as guidelines for future research

    Data-driven design of intelligent wireless networks: an overview and tutorial

    Get PDF
    Data science or "data-driven research" is a research approach that uses real-life data to gain insight about the behavior of systems. It enables the analysis of small, simple as well as large and more complex systems in order to assess whether they function according to the intended design and as seen in simulation. Data science approaches have been successfully applied to analyze networked interactions in several research areas such as large-scale social networks, advanced business and healthcare processes. Wireless networks can exhibit unpredictable interactions between algorithms from multiple protocol layers, interactions between multiple devices, and hardware specific influences. These interactions can lead to a difference between real-world functioning and design time functioning. Data science methods can help to detect the actual behavior and possibly help to correct it. Data science is increasingly used in wireless research. To support data-driven research in wireless networks, this paper illustrates the step-by-step methodology that has to be applied to extract knowledge from raw data traces. To this end, the paper (i) clarifies when, why and how to use data science in wireless network research; (ii) provides a generic framework for applying data science in wireless networks; (iii) gives an overview of existing research papers that utilized data science approaches in wireless networks; (iv) illustrates the overall knowledge discovery process through an extensive example in which device types are identified based on their traffic patterns; (v) provides the reader the necessary datasets and scripts to go through the tutorial steps themselves

    Location based services in wireless ad hoc networks

    Get PDF
    In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii

    INDOOR LOCATION TRACKING AND ORIENTATION ESTIMATION USING A PARTICLE FILTER, INS, AND RSSI

    Get PDF
    With the advent of wireless sensor technologies becoming more and more common-place in wearable devices and smartphones, indoor localization is becoming a heavily researched topic. One such application for this topic is in the medical field where wireless sensor devices that are capable of monitoring patient vitals and giving accurate location estimations allow for a less intrusive environment for nursing home patients. This project explores the usage of using received signal strength indication (RSSI) in conjunction with an inertial navigation system (INS) to provide location estimations without the use of GPS in a Particle Filter with a small development microcontroller and base station. The paper goes over the topics used in this thesis and the results

    Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles

    Get PDF
    Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly reduces the efforts for collecting WiFi fingerprints. Furthermore, since these NAVs explore a 3D space, the WiFi fingerprints of a 3D space can be obtained increasing the localization accuracy. The proposed system is implemented on a commercially available miniature open-source quadcopter platform by integrating a contemporary WiFi - fingerprint - based localization system. Experimental results demonstrate that the localization error is about 2m, which exhibits only about 20cm of accuracy degradation compared with the manual WiFi fingerprint survey methods

    AN ENERGY EFFICIENT CROSS-LAYER NETWORK OPERATION MODEL FOR MOBILE WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless sensor networks (WSNs) are modern technologies used to sense/control the environment whether indoors or outdoors. Sensor nodes are miniatures that can sense a specific event according to the end user(s) needs. The types of applications where such technology can be utilised and implemented are vast and range from households’ low end simple need applications to high end military based applications. WSNs are resource limited. Sensor nodes are expected to work on a limited source of power (e.g., batteries). The connectivity quality and reliability of the nodes is dependent on the quality of the hardware which the nodes are made of. Sensor nodes are envisioned to be either stationary or mobile. Mobility increases the issues of the quality of the operation of the network because it effects directly on the quality of the connections between the nodes
    • …
    corecore