239 research outputs found
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
MAC/PHY Co-Design of CSMA Wireless Networks Using Software Radios.
In the past decade, CSMA-based protocols have spawned numerous network standards (e.g., the WiFi family), and played a key role in improving the ubiquity of wireless networks. However, the rapid evolution of CSMA brings unprecedented challenges, especially the coexistence of different network architectures and communications devices. Meanwhile, many intrinsic limitations of CSMA have been the main obstacle to the performance of its derivatives, such as ZigBee, WiFi, and mesh networks. Most of these problems are observed to root in the abstract interface of the CSMA MAC and PHY layers --- the MAC simply abstracts the advancement of PHY technologies as a change of data rate. Hence, the benefits of new PHY technologies are either not fully exploited, or they even may harm the performance of existing network protocols due to poor interoperability.
In this dissertation, we show that a joint design of the MAC/PHY layers can achieve a substantially higher level of capacity, interoperability and energy efficiency than the weakly coupled MAC/PHY design in the current CSMA wireless networks. In the proposed MAC/PHY co-design, the PHY layer exposes more states and capabilities to the MAC, and the MAC performs intelligent adaptation to and control over the PHY layer. We leverage the reconfigurability of software radios to design smart signal processing algorithms that meet the challenge of making PHY capabilities usable by the MAC layer. With the approach of MAC/PHY co-design, we have revisited the primitive operations of CSMA (collision avoidance, carrier signaling, carrier sensing, spectrum access and transmitter cooperation), and overcome its limitations in relay and broadcast applications, coexistence of heterogeneous networks, energy efficiency, coexistence of different spectrum widths, and scalability for MIMO networks. We have validated the feasibility and performance of our design using extensive analysis, simulation and testbed implementation.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/95944/1/xyzhang_1.pd
Mitigating interference coexistence issues in wireless sensor networks
Wireless Sensor Networks (WSNs) comprise a collection of portable, wireless, interconnected sensors deployed over an area to monitor and report a variable of interest; example applications include wildlife monitoring and home automation systems. In order to cater for long network lifetimes without the need for regular maintenance, energy efficiency is paramount, alongside link reliability. To minimise energy consumption, WSN MAC protocols employ Clear Channel Assessment (CCA), to transmit and receive packets. For transmitting, CCA is used beforehand to determine if the channel is clear. For receiving, CCA is used to decide if the radio should wake up to receive an incoming transmission, or be left in a power efficient sleep state. Current CCA implementations cannot determine the device type occupying the media, leaving nodes unable to differentiate between WSN traffic and arbitrary interference from other devices, such as WiFi. This affects link performance as packet loss increases, and energy efficiency as the radio is idly kept in receive mode. To permit WSN deployments in these environments, it is necessary to be able to gauge the effect of interference. While tools exist to model and predict packet loss in these conditions, it is currently not possible to do the same for energy consumption. This would be beneficial, as parameters of the network could be tuned to meet lifetime and energy requirements. In this thesis, methods to predict energy consumption of WSN MAC protocols are presented. These are shown to accurately estimate the idle listening from environmental interference measurements. Further, in order to mitigate the effects of interference, it would be beneficial for a CCA check to determine the device type occupying the media. For example, transmitters may select back-off strategies depending on the observed channel occupier. Receivers could be made more efficient by ignoring all non-WSN traffic, staying awake only after detecting an incoming WSN transmission. P-DCCA is a novel method presented in this thesis to achieve this. Transmitters vary the output power of the radio while the packet is being sent. Receivers are able to identify signals with this characteristic power variation, enabling a P-DCCA check to reveal if the medium is currently occupied by WSN traffic or other interference. P-DCCA is implemented in a common WSN MAC protocol, and is shown to achieve high detection accuracy, and to improve energy efficiency and packet delivery in interference environments
Interference charecterisation, location and bandwidth estimation in emerging WiFi networks
Wireless LAN technology based on the IEEE 802.11 standard, commonly referred
to as WiFi, has been hugely successful not only for the last hop access to the Internet
in home, office and hotspot scenarios but also for realising wireless backhaul in mesh
networks and for point -to -point long- distance wireless communication. This success
can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching
economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices,
has led to significant amount of research effort looking at the performance issues
arising from various factors, including interference, CSMA/CA based MAC protocol
used by 802.11 devices, the impact of link and physical layer overheads on application
performance, and spatio-temporal channel variations. These factors affect the performance
of applications and services that run over WiFi networks. In this thesis, we
experimentally investigate the effects of some of the above mentioned factors in the
context of emerging WiFi network scenarios such as multi- interface indoor mesh networks,
802.11n -based WiFi networks and WiFi networks with virtual access points
(VAPs). More specifically, this thesis comprises of four experimental characterisation
studies: (i) measure prevalence and severity of co- channel interference in urban WiFi
deployments; (ii) characterise interference in multi- interface indoor mesh networks;
(iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation
on WiFi fingerprinting based location estimation; and (iv) study the effects of
newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth
estimation.With growing density of WiFi deployments especially in urban areas, co- channel
interference becomes a major factor that adversely affects network performance. To
characterise the nature of this phenomena at a city scale, we propose using a new measurement
methodology called mobile crowdsensing. The idea is to leverage commodity
smartphones and the natural mobility of people to characterise urban WiFi co- channel
interference. Specifically, we report measurement results obtained for Edinburgh, a
representative European city, on detecting the presence of deployed WiFi APs via the
mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily
used and there is hardly any activity in the 5GHz band even though relatively it
has a greater number of available channels. Spatial analysis of spectrum usage reveals
that co- channel interference among nearby APs operating in the same channel
can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar
to those of WiFi deployments in public spaces of different indoor environments. We
validate our approach in comparison with wardriving, and also show that our findings
generally match with previous studies based on other measurement approaches. As
an application of the mobile crowdsensing based urban WiFi monitoring, we outline a
cloud based WiFi router configuration service for better interference management with
global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical
way to achieve high end -to -end network performance and better utilisation of
available spectrum. However this gives rise to another type of interference (referred to
as coexistence interference) due to co- location of multiple radio interfaces. We show
that such interference can be so severe that it prevents concurrent successful operation
of collocated interfaces even when they use channels from widely different frequency
bands. We propose the use of antenna polarisation to mitigate such interference and
experimentally study its benefits in both multi -band and single -band configurations. In
particular, we show that using differently polarised antennas on a multi -radio platform
can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent
channel interference phenomena that underlie multi -radio coexistence interference.
We also validate observations about adjacent channel interference from previous
studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications.
The rapidly growing adoption of smartphones has resulted in a plethora of mobile
applications that rely on position information (e.g., shopping apps that use user position
information to recommend products to users and help them to find what they want
in the store). WiFi fingerprinting is a popular and well studied approach for indoor
location estimation that leverages the existing WiFi infrastructure and works based on
the difference in strengths of the received AP signals at different locations. However,
understanding the impact of WiFi network deployment aspects such as multi -band
APs and VAPs has not received much attention in the literature. We first examine the
impact of various aspects underlying a WiFi fingerprinting system. Specifically, we
investigate different definitions for fingerprinting and location estimation algorithms
across different indoor environments ranging from a multi- storey office building to
shopping centres of different sizes. Our results show that the fingerprint definition
is as important as the choice of location estimation algorithm and there is no single
combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz
and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with
WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the
5GHz band yields more accurate location estimation. We show that the inclusion of
VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems;
we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from
adaptive application content delivery, transport-level transmission rate adaptation and
admission control to traffic engineering and peer node selection in peer -to- peer /overlay
networks [ 1, 2]. Given its importance, it has been received much research attention in
both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards),
resulting in different ABE techniques and tools proposed to optimise different criteria
and suit different scenarios. However, effects of new MAC/PHY layer enhancements
in new and next generation WiFi networks (based on 802.11n and 802.11ac
standards) have not been studied yet. We experimentally find that among different
new features like frame aggregation, channel bonding and MIMO modes (spacial division
multiplexing), frame aggregation has the most harmful effect as it has direct
effect on ABE by distorting the measurement probing traffic pattern commonly used
to estimate available bandwidth. Frame aggregation is also specified in both 802.11n
and 802.1 lac standards as a mandatory feature to be supported. We study the effect of
enabling frame aggregation, for the first time, on the performance of the ABE using an
indoor 802.11n wireless testbed. The analysis of results obtained using three tools -
representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based
approaches for ABE - led us to come up with the two key principles of jumbo probes
and having longer measurement probe train sizes to counter the effects of aggregating
frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that
is aware of the underlying frame aggregation by incorporating these principles. The
experimental evaluation of WBest+ shows more accurate ABE in the presence of frame
aggregation.Overall, the contributions of this thesis fall in three categories - experimental
characterisation, measurement techniques and mitigation/solution approaches for performance
problems in emerging WiFi network scenarios. The influence of various factors
mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation
of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are
carried out in real environments. New measurement approaches are also introduced
to aid better experimental evaluation or proposed as new measurement tools. These
include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of
co- existence interference; and WBest+ tool for available bandwidth estimation. Finally,
new mitigation approaches are proposed to address challenges and problems
identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting
antenna polarisation diversity to remedy the effects of co- existence interference
in multi -interface platforms; taking advantage of VAPs and multi -band operation for
better location estimation; and introducing the jumbo frame concept and longer probe
train sizes to improve performance of ABE tools in next generation WiFi networks
Protect sensitive information against channel state information based attacks
Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by the finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. Our approach carefully exploits the WiFi channel interference to introduce noise into the attacker's CSI measurement to reduce the success rate of the attack. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI attacks from 92% to 42% for text-based passwords and from 82% to 22% for pattern lock
Protect sensitive information against channel state information based attacks
Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. By analyzing how CSI is affected by the finger motions, CSI-based attacks can effectively reconstruct text-based passwords and locking patterns. This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. Our approach carefully exploits the WiFi channel interference to introduce noise into the attacker's CSI measurement to reduce the success rate of the attack. Our approach automatically detects when a CSI-based attack happens. We evaluate our approach by applying it to protect text-based passwords and pattern locks on mobile devices. Experimental results show that our approach is able to reduce the success rate of CSI attacks from 92% to 42% for text-based passwords and from 82% to 22% for pattern lock
Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency.
To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario.
In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices.
To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches
Secure Data Collection and Analysis in Smart Health Monitoring
Smart health monitoring uses real-time monitored data to support diagnosis, treatment, and health decision-making in modern smart healthcare systems and benefit our daily life. The accurate health monitoring and prompt transmission of health data are facilitated by the ever-evolving on-body sensors, wireless communication technologies, and wireless sensing techniques. Although the users have witnessed the convenience of smart health monitoring, severe privacy and security concerns on the valuable and sensitive collected data come along with the merit. The data collection, transmission, and analysis are vulnerable to various attacks, e.g., eavesdropping, due to the open nature of wireless media, the resource constraints of sensing devices, and the lack of security protocols. These deficiencies not only make conventional cryptographic methods not applicable in smart health monitoring but also put many obstacles in the path of designing privacy protection mechanisms.
In this dissertation, we design dedicated schemes to achieve secure data collection and analysis in smart health monitoring. The first two works propose two robust and secure authentication schemes based on Electrocardiogram (ECG), which outperform traditional user identity authentication schemes in health monitoring, to restrict the access to collected data to legitimate users. To improve the practicality of ECG-based authentication, we address the nonuniformity and sensitivity of ECG signals, as well as the noise contamination issue. The next work investigates an extended authentication goal, denoted as wearable-user pair authentication. It simultaneously authenticates the user identity and device identity to provide further protection. We exploit the uniqueness of the interference between different wireless protocols, which is common in health monitoring due to devices\u27 varying sensing and transmission demands, and design a wearable-user pair authentication scheme based on the interference. However, the harm of this interference is also outstanding. Thus, in the fourth work, we use wireless human activity recognition in health monitoring as an example and analyze how this interference may jeopardize it. We identify a new attack that can produce false recognition result and discuss potential countermeasures against this attack. In the end, we move to a broader scenario and protect the statistics of distributed data reported in mobile crowd sensing, a common practice used in public health monitoring for data collection. We deploy differential privacy to enable the indistinguishability of workers\u27 locations and sensing data without the help of a trusted entity while meeting the accuracy demands of crowd sensing tasks
- …