239 research outputs found

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    MAC/PHY Co-Design of CSMA Wireless Networks Using Software Radios.

    Full text link
    In the past decade, CSMA-based protocols have spawned numerous network standards (e.g., the WiFi family), and played a key role in improving the ubiquity of wireless networks. However, the rapid evolution of CSMA brings unprecedented challenges, especially the coexistence of different network architectures and communications devices. Meanwhile, many intrinsic limitations of CSMA have been the main obstacle to the performance of its derivatives, such as ZigBee, WiFi, and mesh networks. Most of these problems are observed to root in the abstract interface of the CSMA MAC and PHY layers --- the MAC simply abstracts the advancement of PHY technologies as a change of data rate. Hence, the benefits of new PHY technologies are either not fully exploited, or they even may harm the performance of existing network protocols due to poor interoperability. In this dissertation, we show that a joint design of the MAC/PHY layers can achieve a substantially higher level of capacity, interoperability and energy efficiency than the weakly coupled MAC/PHY design in the current CSMA wireless networks. In the proposed MAC/PHY co-design, the PHY layer exposes more states and capabilities to the MAC, and the MAC performs intelligent adaptation to and control over the PHY layer. We leverage the reconfigurability of software radios to design smart signal processing algorithms that meet the challenge of making PHY capabilities usable by the MAC layer. With the approach of MAC/PHY co-design, we have revisited the primitive operations of CSMA (collision avoidance, carrier signaling, carrier sensing, spectrum access and transmitter cooperation), and overcome its limitations in relay and broadcast applications, coexistence of heterogeneous networks, energy efficiency, coexistence of different spectrum widths, and scalability for MIMO networks. We have validated the feasibility and performance of our design using extensive analysis, simulation and testbed implementation.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/95944/1/xyzhang_1.pd

    Mitigating interference coexistence issues in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) comprise a collection of portable, wireless, interconnected sensors deployed over an area to monitor and report a variable of interest; example applications include wildlife monitoring and home automation systems. In order to cater for long network lifetimes without the need for regular maintenance, energy efficiency is paramount, alongside link reliability. To minimise energy consumption, WSN MAC protocols employ Clear Channel Assessment (CCA), to transmit and receive packets. For transmitting, CCA is used beforehand to determine if the channel is clear. For receiving, CCA is used to decide if the radio should wake up to receive an incoming transmission, or be left in a power efficient sleep state. Current CCA implementations cannot determine the device type occupying the media, leaving nodes unable to differentiate between WSN traffic and arbitrary interference from other devices, such as WiFi. This affects link performance as packet loss increases, and energy efficiency as the radio is idly kept in receive mode. To permit WSN deployments in these environments, it is necessary to be able to gauge the effect of interference. While tools exist to model and predict packet loss in these conditions, it is currently not possible to do the same for energy consumption. This would be beneficial, as parameters of the network could be tuned to meet lifetime and energy requirements. In this thesis, methods to predict energy consumption of WSN MAC protocols are presented. These are shown to accurately estimate the idle listening from environmental interference measurements. Further, in order to mitigate the effects of interference, it would be beneficial for a CCA check to determine the device type occupying the media. For example, transmitters may select back-off strategies depending on the observed channel occupier. Receivers could be made more efficient by ignoring all non-WSN traffic, staying awake only after detecting an incoming WSN transmission. P-DCCA is a novel method presented in this thesis to achieve this. Transmitters vary the output power of the radio while the packet is being sent. Receivers are able to identify signals with this characteristic power variation, enabling a P-DCCA check to reveal if the medium is currently occupied by WSN traffic or other interference. P-DCCA is implemented in a common WSN MAC protocol, and is shown to achieve high detection accuracy, and to improve energy efficiency and packet delivery in interference environments

    Interference charecterisation, location and bandwidth estimation in emerging WiFi networks

    Get PDF
    Wireless LAN technology based on the IEEE 802.11 standard, commonly referred to as WiFi, has been hugely successful not only for the last hop access to the Internet in home, office and hotspot scenarios but also for realising wireless backhaul in mesh networks and for point -to -point long- distance wireless communication. This success can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices, has led to significant amount of research effort looking at the performance issues arising from various factors, including interference, CSMA/CA based MAC protocol used by 802.11 devices, the impact of link and physical layer overheads on application performance, and spatio-temporal channel variations. These factors affect the performance of applications and services that run over WiFi networks. In this thesis, we experimentally investigate the effects of some of the above mentioned factors in the context of emerging WiFi network scenarios such as multi- interface indoor mesh networks, 802.11n -based WiFi networks and WiFi networks with virtual access points (VAPs). More specifically, this thesis comprises of four experimental characterisation studies: (i) measure prevalence and severity of co- channel interference in urban WiFi deployments; (ii) characterise interference in multi- interface indoor mesh networks; (iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation on WiFi fingerprinting based location estimation; and (iv) study the effects of newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth estimation.With growing density of WiFi deployments especially in urban areas, co- channel interference becomes a major factor that adversely affects network performance. To characterise the nature of this phenomena at a city scale, we propose using a new measurement methodology called mobile crowdsensing. The idea is to leverage commodity smartphones and the natural mobility of people to characterise urban WiFi co- channel interference. Specifically, we report measurement results obtained for Edinburgh, a representative European city, on detecting the presence of deployed WiFi APs via the mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily used and there is hardly any activity in the 5GHz band even though relatively it has a greater number of available channels. Spatial analysis of spectrum usage reveals that co- channel interference among nearby APs operating in the same channel can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar to those of WiFi deployments in public spaces of different indoor environments. We validate our approach in comparison with wardriving, and also show that our findings generally match with previous studies based on other measurement approaches. As an application of the mobile crowdsensing based urban WiFi monitoring, we outline a cloud based WiFi router configuration service for better interference management with global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical way to achieve high end -to -end network performance and better utilisation of available spectrum. However this gives rise to another type of interference (referred to as coexistence interference) due to co- location of multiple radio interfaces. We show that such interference can be so severe that it prevents concurrent successful operation of collocated interfaces even when they use channels from widely different frequency bands. We propose the use of antenna polarisation to mitigate such interference and experimentally study its benefits in both multi -band and single -band configurations. In particular, we show that using differently polarised antennas on a multi -radio platform can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent channel interference phenomena that underlie multi -radio coexistence interference. We also validate observations about adjacent channel interference from previous studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications. The rapidly growing adoption of smartphones has resulted in a plethora of mobile applications that rely on position information (e.g., shopping apps that use user position information to recommend products to users and help them to find what they want in the store). WiFi fingerprinting is a popular and well studied approach for indoor location estimation that leverages the existing WiFi infrastructure and works based on the difference in strengths of the received AP signals at different locations. However, understanding the impact of WiFi network deployment aspects such as multi -band APs and VAPs has not received much attention in the literature. We first examine the impact of various aspects underlying a WiFi fingerprinting system. Specifically, we investigate different definitions for fingerprinting and location estimation algorithms across different indoor environments ranging from a multi- storey office building to shopping centres of different sizes. Our results show that the fingerprint definition is as important as the choice of location estimation algorithm and there is no single combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the 5GHz band yields more accurate location estimation. We show that the inclusion of VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems; we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from adaptive application content delivery, transport-level transmission rate adaptation and admission control to traffic engineering and peer node selection in peer -to- peer /overlay networks [ 1, 2]. Given its importance, it has been received much research attention in both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards), resulting in different ABE techniques and tools proposed to optimise different criteria and suit different scenarios. However, effects of new MAC/PHY layer enhancements in new and next generation WiFi networks (based on 802.11n and 802.11ac standards) have not been studied yet. We experimentally find that among different new features like frame aggregation, channel bonding and MIMO modes (spacial division multiplexing), frame aggregation has the most harmful effect as it has direct effect on ABE by distorting the measurement probing traffic pattern commonly used to estimate available bandwidth. Frame aggregation is also specified in both 802.11n and 802.1 lac standards as a mandatory feature to be supported. We study the effect of enabling frame aggregation, for the first time, on the performance of the ABE using an indoor 802.11n wireless testbed. The analysis of results obtained using three tools - representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based approaches for ABE - led us to come up with the two key principles of jumbo probes and having longer measurement probe train sizes to counter the effects of aggregating frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that is aware of the underlying frame aggregation by incorporating these principles. The experimental evaluation of WBest+ shows more accurate ABE in the presence of frame aggregation.Overall, the contributions of this thesis fall in three categories - experimental characterisation, measurement techniques and mitigation/solution approaches for performance problems in emerging WiFi network scenarios. The influence of various factors mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are carried out in real environments. New measurement approaches are also introduced to aid better experimental evaluation or proposed as new measurement tools. These include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of co- existence interference; and WBest+ tool for available bandwidth estimation. Finally, new mitigation approaches are proposed to address challenges and problems identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting antenna polarisation diversity to remedy the effects of co- existence interference in multi -interface platforms; taking advantage of VAPs and multi -band operation for better location estimation; and introducing the jumbo frame concept and longer probe train sizes to improve performance of ABE tools in next generation WiFi networks

    Protect sensitive information against channel state information based attacks

    Get PDF
    Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by the finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. Our approach carefully exploits the WiFi channel interference to introduce noise into the attacker's CSI measurement to reduce the success rate of the attack. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI attacks from 92% to 42% for text-based passwords and from 82% to 22% for pattern lock

    Protect sensitive information against channel state information based attacks

    Get PDF
    Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by the finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. Our approach carefully exploits the WiFi channel interference to introduce noise into the attacker's CSI measurement to reduce the success rate of the attack. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI attacks from 92% to 42% for text-based passwords and from 82% to 22% for pattern lock

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches

    Secure Data Collection and Analysis in Smart Health Monitoring

    Get PDF
    Smart health monitoring uses real-time monitored data to support diagnosis, treatment, and health decision-making in modern smart healthcare systems and benefit our daily life. The accurate health monitoring and prompt transmission of health data are facilitated by the ever-evolving on-body sensors, wireless communication technologies, and wireless sensing techniques. Although the users have witnessed the convenience of smart health monitoring, severe privacy and security concerns on the valuable and sensitive collected data come along with the merit. The data collection, transmission, and analysis are vulnerable to various attacks, e.g., eavesdropping, due to the open nature of wireless media, the resource constraints of sensing devices, and the lack of security protocols. These deficiencies not only make conventional cryptographic methods not applicable in smart health monitoring but also put many obstacles in the path of designing privacy protection mechanisms. In this dissertation, we design dedicated schemes to achieve secure data collection and analysis in smart health monitoring. The first two works propose two robust and secure authentication schemes based on Electrocardiogram (ECG), which outperform traditional user identity authentication schemes in health monitoring, to restrict the access to collected data to legitimate users. To improve the practicality of ECG-based authentication, we address the nonuniformity and sensitivity of ECG signals, as well as the noise contamination issue. The next work investigates an extended authentication goal, denoted as wearable-user pair authentication. It simultaneously authenticates the user identity and device identity to provide further protection. We exploit the uniqueness of the interference between different wireless protocols, which is common in health monitoring due to devices\u27 varying sensing and transmission demands, and design a wearable-user pair authentication scheme based on the interference. However, the harm of this interference is also outstanding. Thus, in the fourth work, we use wireless human activity recognition in health monitoring as an example and analyze how this interference may jeopardize it. We identify a new attack that can produce false recognition result and discuss potential countermeasures against this attack. In the end, we move to a broader scenario and protect the statistics of distributed data reported in mobile crowd sensing, a common practice used in public health monitoring for data collection. We deploy differential privacy to enable the indistinguishability of workers\u27 locations and sensing data without the help of a trusted entity while meeting the accuracy demands of crowd sensing tasks
    • …
    corecore