5,565 research outputs found
Intrusion Detection in Aerial Imagery for Protecting Pipeline Infrastructure
We present an automated mechanism that can detect and issue warnings of machinery threat such as the presence of construction vehicles on pipeline right-of-way. The proposed scheme models the human visual perception concepts to extract fine details of objects by utilizing the corners and gradient histogram information in pyramid levels. Two real-world aerial image datasets are used for testing and evaluation
Channel Impulse Response-based Distributed Physical Layer Authentication
In this preliminary work, we study the problem of {\it distributed}
authentication in wireless networks. Specifically, we consider a system where
multiple Bob (sensor) nodes listen to a channel and report their {\it
correlated} measurements to a Fusion Center (FC) which makes the ultimate
authentication decision. For the feature-based authentication at the FC,
channel impulse response has been utilized as the device fingerprint.
Additionally, the {\it correlated} measurements by the Bob nodes allow us to
invoke Compressed sensing to significantly reduce the reporting overhead to the
FC. Numerical results show that: i) the detection performance of the FC is
superior to that of a single Bob-node, ii) compressed sensing leads to at least
overhead reduction on the reporting channel at the expense of a small
( dB) SNR margin to achieve the same detection performance.Comment: 6 pages, 5 figures, accepted for presentation at IEEE VTC 2017 Sprin
A Tractable Fault Detection and Isolation Approach for Nonlinear Systems with Probabilistic Performance
This article presents a novel perspective along with a scalable methodology
to design a fault detection and isolation (FDI) filter for high dimensional
nonlinear systems. Previous approaches on FDI problems are either confined to
linear systems or they are only applicable to low dimensional dynamics with
specific structures. In contrast, shifting attention from the system dynamics
to the disturbance inputs, we propose a relaxed design perspective to train a
linear residual generator given some statistical information about the
disturbance patterns. That is, we propose an optimization-based approach to
robustify the filter with respect to finitely many signatures of the
nonlinearity. We then invoke recent results in randomized optimization to
provide theoretical guarantees for the performance of the proposed filer.
Finally, motivated by a cyber-physical attack emanating from the
vulnerabilities introduced by the interaction between IT infrastructure and
power system, we deploy the developed theoretical results to detect such an
intrusion before the functionality of the power system is disrupted
Deep Predictive Coding Neural Network for RF Anomaly Detection in Wireless Networks
Intrusion detection has become one of the most critical tasks in a wireless
network to prevent service outages that can take long to fix. The sheer variety
of anomalous events necessitates adopting cognitive anomaly detection methods
instead of the traditional signature-based detection techniques. This paper
proposes an anomaly detection methodology for wireless systems that is based on
monitoring and analyzing radio frequency (RF) spectrum activities. Our
detection technique leverages an existing solution for the video prediction
problem, and uses it on image sequences generated from monitoring the wireless
spectrum. The deep predictive coding network is trained with images
corresponding to the normal behavior of the system, and whenever there is an
anomaly, its detection is triggered by the deviation between the actual and
predicted behavior. For our analysis, we use the images generated from the
time-frequency spectrograms and spectral correlation functions of the received
RF signal. We test our technique on a dataset which contains anomalies such as
jamming, chirping of transmitters, spectrum hijacking, and node failure, and
evaluate its performance using standard classifier metrics: detection ratio,
and false alarm rate. Simulation results demonstrate that the proposed
methodology effectively detects many unforeseen anomalous events in real time.
We discuss the applications, which encompass industrial IoT, autonomous vehicle
control and mission-critical communications services.Comment: 7 pages, 7 figures, Communications Workshop ICC'1
- …