5,512 research outputs found
Performance Analysis and Design of Maximum Ratio Combining in Channel-Aware MIMO Decision Fusion
In this paper we present a theoretical performance analysis of the maximum
ratio combining (MRC) rule for channel-aware decision fusion over
multiple-input multiple-output (MIMO) channels for (conditionally) dependent
and independent local decisions. The system probabilities of false alarm and
detection conditioned on the channel realization are derived in closed form and
an approximated threshold choice is given. Furthermore, the channel-averaged
(CA) performances are evaluated in terms of the CA system probabilities of
false alarm and detection and the area under the receiver operating
characteristic (ROC) through the closed form of the conditional moment
generating function (MGF) of the MRC statistic, along with Gauss-Chebyshev (GC)
quadrature rules. Furthermore, we derive the deflection coefficients in closed
form, which are used for sensor threshold design. Finally, all the results are
confirmed through Monte Carlo simulations.Comment: To appear in IEEE Transactions on Wireless Communication
Rician MIMO Channel- and Jamming-Aware Decision Fusion
In this manuscript we study channel-aware decision fusion (DF) in a wireless
sensor network (WSN) where: (i) the sensors transmit their decisions
simultaneously for spectral efficiency purposes and the DF center (DFC) is
equipped with multiple antennas; (ii) each sensor-DFC channel is described via
a Rician model. As opposed to the existing literature, in order to account for
stringent energy constraints in the WSN, only statistical channel information
is assumed for the non-line-of sight (scattered) fading terms. For such a
scenario, sub-optimal fusion rules are developed in order to deal with the
exponential complexity of the likelihood ratio test (LRT) and impractical
(complete) system knowledge. Furthermore, the considered model is extended to
the case of (partially unknown) jamming-originated interference. Then the
obtained fusion rules are modified with the use of composite hypothesis testing
framework and generalized LRT. Coincidence and statistical equivalence among
them are also investigated under some relevant simplified scenarios. Numerical
results compare the proposed rules and highlight their jammingsuppression
capability.Comment: Accepted in IEEE Transactions on Signal Processing 201
Distributed Detection and Estimation in Wireless Sensor Networks
In this article we consider the problems of distributed detection and
estimation in wireless sensor networks. In the first part, we provide a general
framework aimed to show how an efficient design of a sensor network requires a
joint organization of in-network processing and communication. Then, we recall
the basic features of consensus algorithm, which is a basic tool to reach
globally optimal decisions through a distributed approach. The main part of the
paper starts addressing the distributed estimation problem. We show first an
entirely decentralized approach, where observations and estimations are
performed without the intervention of a fusion center. Then, we consider the
case where the estimation is performed at a fusion center, showing how to
allocate quantization bits and transmit powers in the links between the nodes
and the fusion center, in order to accommodate the requirement on the maximum
estimation variance, under a constraint on the global transmit power. We extend
the approach to the detection problem. Also in this case, we consider the
distributed approach, where every node can achieve a globally optimal decision,
and the case where the decision is taken at a central node. In the latter case,
we show how to allocate coding bits and transmit power in order to maximize the
detection probability, under constraints on the false alarm rate and the global
transmit power. Then, we generalize consensus algorithms illustrating a
distributed procedure that converges to the projection of the observation
vector onto a signal subspace. We then address the issue of energy consumption
in sensor networks, thus showing how to optimize the network topology in order
to minimize the energy necessary to achieve a global consensus. Finally, we
address the problem of matching the topology of the network to the graph
describing the statistical dependencies among the observed variables.Comment: 92 pages, 24 figures. To appear in E-Reference Signal Processing, R.
Chellapa and S. Theodoridis, Eds., Elsevier, 201
Decision Fusion in Space-Time Spreading aided Distributed MIMO WSNs
In this letter, we propose space-time spreading (STS) of local sensor
decisions before reporting them over a wireless multiple access channel (MAC),
in order to achieve flexible balance between diversity and multiplexing gain as
well as eliminate any chance of intrinsic interference inherent in MAC
scenarios. Spreading of the sensor decisions using dispersion vectors exploits
the benefits of multi-slot decision to improve low-complexity diversity gain
and opportunistic throughput. On the other hand, at the receive side of the
reporting channel, we formulate and compare optimum and sub-optimum fusion
rules for arriving at a reliable conclusion.Simulation results demonstrate gain
in performance with STS aided transmission from a minimum of 3 times to a
maximum of 6 times over performance without STS.Comment: 5 pages, 5 figure
Predictive intelligence to the edge through approximate collaborative context reasoning
We focus on Internet of Things (IoT) environments where a network of sensing and computing devices are responsible to locally process contextual data, reason and collaboratively infer the appearance of a specific phenomenon (event). Pushing processing and knowledge inference to the edge of the IoT network allows the complexity of the event reasoning process to be distributed into many manageable pieces and to be physically located at the source of the contextual information. This enables a huge amount of rich data streams to be processed in real time that would be prohibitively complex and costly to deliver on a traditional centralized Cloud system. We propose a lightweight, energy-efficient, distributed, adaptive, multiple-context perspective event reasoning model under uncertainty on each IoT device (sensor/actuator). Each device senses and processes context data and infers events based on different local context perspectives: (i) expert knowledge on event representation, (ii) outliers inference, and (iii) deviation from locally predicted context. Such novel approximate reasoning paradigm is achieved through a contextualized, collaborative belief-driven clustering process, where clusters of devices are formed according to their belief on the presence of events. Our distributed and federated intelligence model efficiently identifies any localized abnormality on the contextual data in light of event reasoning through aggregating local degrees of belief, updates, and adjusts its knowledge to contextual data outliers and novelty detection. We provide comprehensive experimental and comparison assessment of our model over real contextual data with other localized and centralized event detection models and show the benefits stemmed from its adoption by achieving up to three orders of magnitude less energy consumption and high quality of inference
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Decision Fusion with Unknown Sensor Detection Probability
In this correspondence we study the problem of channel-aware decision fusion
when the sensor detection probability is not known at the decision fusion
center. Several alternatives proposed in the literature are compared and new
fusion rules (namely 'ideal sensors' and 'locally-optimum detection') are
proposed, showing attractive performance and linear complexity. Simulations are
provided to compare the performance of the aforementioned rules.Comment: To appear in IEEE Signal Processing Letter
- …