503 research outputs found

    ProSpire: Proactive Spatial Prediction of Radio Environment Using Deep Learning

    Full text link
    Spatial prediction of the radio propagation environment of a transmitter can assist and improve various aspects of wireless networks. The majority of research in this domain can be categorized as 'reactive' spatial prediction, where the predictions are made based on a small set of measurements from an active transmitter whose radio environment is to be predicted. Emerging spectrum-sharing paradigms would benefit from 'proactive' spatial prediction of the radio environment, where the spatial predictions must be done for a transmitter for which no measurement has been collected. This paper proposes a novel, supervised deep learning-based framework, ProSpire, that enables spectrum sharing by leveraging the idea of proactive spatial prediction. We carefully address several challenges in ProSpire, such as designing a framework that conveniently collects training data for learning, performing the predictions in a fast manner, enabling operations without an area map, and ensuring that the predictions do not lead to undesired interference. ProSpire relies on the crowdsourcing of transmitters and receivers during their normal operations to address some of the aforementioned challenges. The core component of ProSpire is a deep learning-based image-to-image translation method, which we call RSSu-net. We generate several diverse datasets using ray tracing software and numerically evaluate ProSpire. Our evaluations show that RSSu-net performs reasonably well in terms of signal strength prediction, 5 dB mean absolute error, which is comparable to the average error of other relevant methods. Importantly, due to the merits of RSSu-net, ProSpire creates proactive boundaries around transmitters such that they can be activated with 97% probability of not causing interference. In this regard, the performance of RSSu-net is 19% better than that of other comparable methods.Comment: 9 page

    Indoor localisation by using wireless sensor nodes

    Get PDF
    This study is devoted to investigating and developing WSN based localisation approaches with high position accuracies indoors. The study initially summarises the design and implementation of localisation systems and WSN architecture together with the characteristics of LQI and RSSI values. A fingerprint localisation approach is utilised for indoor positioning applications. A k-nearest neighbourhood algorithm (k-NN) is deployed, using Euclidean distances between the fingerprint database and the object fingerprints, to estimate unknown object positions. Weighted LQI and RSSI values are calculated and the k-NN algorithm with different weights is utilised to improve the position detection accuracy. Different weight functions are investigated with the fingerprint localisation technique. A novel weight function which produced the maximum position accuracy is determined and employed in calculations. The study covered designing and developing the centroid localisation (CL) and weighted centroid localisation (WCL) approaches by using LQI values. A reference node localisation approach is proposed. A star topology of reference nodes are to be utilized and a 3-NN algorithm is employed to determine the nearest reference nodes to the object location. The closest reference nodes are employed to each nearest reference nodes and the object locations are calculated by using the differences between the closest and nearest reference nodes. A neighbourhood weighted localisation approach is proposed between the nearest reference nodes in star topology. Weights between nearest reference nodes are calculated by using Euclidean and physical distances. The physical distances between the object and the nearest reference nodes are calculated and the trigonometric techniques are employed to derive the object coordinates. An environmentally adaptive centroid localisation approach is proposed.Weighted standard deviation (STD) techniques are employed adaptively to estimate the unknown object positions. WSNs with minimum RSSI mean values are considered as reference nodes across the sensing area. The object localisation is carried out in two phases with respect to these reference nodes. Calculated object coordinates are later translated into the universal coordinate system to determine the actual object coordinates. Virtual fingerprint localisation technique is introduced to determine the object locations by using virtual fingerprint database. A physical fingerprint database is organised in the form of virtual database by using LQI distribution functions. Virtual database elements are generated among the physical database elements with linear and exponential distribution functions between the fingerprint points. Localisation procedures are repeated with virtual database and localisation accuracies are improved compared to the basic fingerprint approach. In order to reduce the computation time and effort, segmentation of the sensing area is introduced. Static and dynamic segmentation techniques are deployed. Segments are defined by RSS ranges and the unknown object is localised in one of these segments. Fingerprint techniques are applied only in the relevant segment to find the object location. Finally, graphical user interfaces (GUI) are utilised with application program interfaces (API), in all calculations to visualise unknown object locations indoors

    A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G

    Full text link
    Sixth-generation (6G) mobile communication networks are expected to have dense infrastructures, large-dimensional channels, cost-effective hardware, diversified positioning methods, and enhanced intelligence. Such trends bring both new challenges and opportunities for the practical design of 6G. On one hand, acquiring channel state information (CSI) in real time for all wireless links becomes quite challenging in 6G. On the other hand, there would be numerous data sources in 6G containing high-quality location-tagged channel data, making it possible to better learn the local wireless environment. By exploiting such new opportunities and for tackling the CSI acquisition challenge, there is a promising paradigm shift from the conventional environment-unaware communications to the new environment-aware communications based on the novel approach of channel knowledge map (CKM). This article aims to provide a comprehensive tutorial overview on environment-aware communications enabled by CKM to fully harness its benefits for 6G. First, the basic concept of CKM is presented, and a comparison of CKM with various existing channel inference techniques is discussed. Next, the main techniques for CKM construction are discussed, including both the model-free and model-assisted approaches. Furthermore, a general framework is presented for the utilization of CKM to achieve environment-aware communications, followed by some typical CKM-aided communication scenarios. Finally, important open problems in CKM research are highlighted and potential solutions are discussed to inspire future work

    Blind Transmitter Localization Using Deep Learning: A Scalability Study

    Full text link
    This work presents an investigation on the scalability of a deep leaning (DL)-based blind transmitter positioning system for addressing the multi transmitter localization (MLT) problem. The proposed approach is able to estimate relative coordinates of non-cooperative active transmitters based solely on received signal strength measurements collected by a wireless sensor network. A performance comparison with two other solutions of the MLT problem are presented for demonstrating the benefits with respect to scalability of the DL approach. Our investigation aims at highlighting the potential of DL to be a key technique that is able to provide a low complexity, accurate and reliable transmitter positioning service for improving future wireless communications systems.Comment: Published in: 2023 IEEE Wireless Communications and Networking Conference (WCNC

    Positioning algorithms for RFID-based multi-sensor indoor/outdoor positioning techniques

    Get PDF
    Position information has been very important. People need this information almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques. However, these techniques are difficult to be used indoor since GPS signals are too weak to be received. The alternative techniques, such as inertial sensors and radio-based pseudolites, can be used for indoor positioning but have limitations. For example, the inertial sensors suffer from drifting problems caused by the accumulating errors of measured acceleration and velocity and the radio-based techniques are prone to the obstructions and multipath effects of the transmitted signals. It is therefore necessary to develop improved methods for minimising the limitations of the current indoor positioning techniques and providing an adequately precise solution of the indoor positioning and seamless indoor/outdoor positioning. The main objectives of this research are to investigate and develop algorithms for the low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) based multi-sensor techniques, such as integrating with Micro-Electro-Mechanical Systems (MEMS) Inertial Navigation System (INS) and/or GPS. A RFID probabilistic Cell of Origin (CoO) algorithm is developed, which is superior to the conventional CoO positioning algorithm in its positioning accuracy and continuity. Integration algorithms are also developed for RFID-based multi-sensor positioning techniques, which can provide metre-level positioning accuracy for dynamic personal positioning indoors. In addition, indoor/outdoor seamless positioning algorithms are investigated based on the iterated Reduced Sigma Point Kalman Filter (RSPKF) for RFID/MEMS INS/low-cost GPS integrated technique, which can provide metre-level positioning accuracy for personal positioning. 3-D GIS assisted personal positioning algorithms are also developed, including the map matching algorithm based on the probabilistic maps for personal positioning and the Site Specific (SISP) propagation model for efficiently generating the RFID signal strength distributions in location fingerprinting algorithms. Both static and dynamic indoor positioning experiments have been conducted using the RFID and RFID/MEMS INS integrated techniques. Metre-level positioning accuracy is achieved (e.g. 3.5m in rooms and 1.5m in stairways for static position, 4m for dynamic positioning and 1.7m using the GIS assisted positioning algorithms). Various indoor/outdoor experiments have been conducted using the RFID/MEMS INS/low-cost GPS integrated technique. It indicates that the techniques selected in this study, integrated with the low-cost GPS, can be used to provide continuous indoor/outdoor positions in approximately 4m accuracy with the iterated RSPKF. The results from the above experiments have demonstrated the improvements of integrating multiple sensors with RFID and utilizing the 3-D GIS data for personal positioning. The algorithms developed can be used in a portable RFID based multi-sensor positioning system to achieve metre-level accuracy in the indoor/outdoor environments. The proposed system has potential applications, such as tracking miners underground, monitoring athletes, locating first responders, guiding the disabled and providing other general location based services (LBS)

    Sensors and Systems for Indoor Positioning

    Get PDF
    This reprint is a reprint of the articles that appeared in Sensors' (MDPI) Special Issue on “Sensors and Systems for Indoor Positioning". The published original contributions focused on systems and technologies to enable indoor applications

    Advanced Wireless Localisation Methods Dealing with Incomplete Measurements

    Get PDF
    Positioning techniques have become an essential part of modern engineering, and the improvement in computing devices brings great potential for more advanced and complicated algorithms. This thesis first studies the existing radio signal based positioning techniques and then presents three developed methods in the sense of dealing with incomplete data. Firstly, on the basis of received signal strength (RSS) location fingerprinting techniques, the Kriging interpolation methods are applied to generate complete fingerprint databases of denser reference locations from sparse or incomplete data sets, as a solution of reducing the workload and cost of offline data collection. Secondly, with incomplete knowledge of shadowing correlation, a new approach of Bayesian inference on RSS based multiple target localisation is proposed taking advantage of the inverse Wishart conjugate prior. The MCMC method (Metropolis-within-Gibbs) and the maximum a posterior (MAP) / maximum likelihood (ML) method are then considered to produce target location estimates. Thirdly, a new information fusion approach is developed for the time difference of arrival (TDOF) and frequency difference of arrival (FDOA) based dual-satellite geolocation system, as a solution to the unknown time and frequency offsets. All proposed methods are studied and validated through simulations. Result analyses and future work directions are discussed

    Secure key design approaches using entropy harvesting in wireless sensor network: A survey

    Get PDF
    Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
    • …
    corecore