503 research outputs found
ProSpire: Proactive Spatial Prediction of Radio Environment Using Deep Learning
Spatial prediction of the radio propagation environment of a transmitter can
assist and improve various aspects of wireless networks. The majority of
research in this domain can be categorized as 'reactive' spatial prediction,
where the predictions are made based on a small set of measurements from an
active transmitter whose radio environment is to be predicted. Emerging
spectrum-sharing paradigms would benefit from 'proactive' spatial prediction of
the radio environment, where the spatial predictions must be done for a
transmitter for which no measurement has been collected.
This paper proposes a novel, supervised deep learning-based framework,
ProSpire, that enables spectrum sharing by leveraging the idea of proactive
spatial prediction. We carefully address several challenges in ProSpire, such
as designing a framework that conveniently collects training data for learning,
performing the predictions in a fast manner, enabling operations without an
area map, and ensuring that the predictions do not lead to undesired
interference. ProSpire relies on the crowdsourcing of transmitters and
receivers during their normal operations to address some of the aforementioned
challenges. The core component of ProSpire is a deep learning-based
image-to-image translation method, which we call RSSu-net. We generate several
diverse datasets using ray tracing software and numerically evaluate ProSpire.
Our evaluations show that RSSu-net performs reasonably well in terms of signal
strength prediction, 5 dB mean absolute error, which is comparable to the
average error of other relevant methods. Importantly, due to the merits of
RSSu-net, ProSpire creates proactive boundaries around transmitters such that
they can be activated with 97% probability of not causing interference. In this
regard, the performance of RSSu-net is 19% better than that of other comparable
methods.Comment: 9 page
Indoor localisation by using wireless sensor nodes
This study is devoted to investigating and developing WSN based localisation approaches with high position accuracies indoors. The study initially summarises the design and implementation of localisation systems and WSN architecture together with the characteristics of LQI and RSSI values.
A fingerprint localisation approach is utilised for indoor positioning applications. A k-nearest neighbourhood algorithm (k-NN) is deployed, using Euclidean distances between the fingerprint database and the object fingerprints, to estimate unknown object positions. Weighted LQI and RSSI values are calculated and the k-NN algorithm with different weights is utilised to improve the position detection accuracy. Different weight functions are investigated with the fingerprint localisation technique. A novel weight function which produced the maximum position accuracy is determined and employed in calculations.
The study covered designing and developing the centroid localisation (CL) and weighted centroid localisation (WCL) approaches by using LQI values. A reference node localisation approach is proposed. A star topology of reference nodes are to be utilized and a 3-NN algorithm is employed to determine the nearest reference nodes to the object location. The closest reference nodes are employed to each nearest reference nodes and the object locations are calculated by using the differences between the closest and nearest reference nodes.
A neighbourhood weighted localisation approach is proposed between the nearest reference nodes in star topology. Weights between nearest reference nodes are calculated by using Euclidean and physical distances. The physical distances between the object and the nearest reference nodes are calculated and the trigonometric techniques are employed to derive the object coordinates.
An environmentally adaptive centroid localisation approach is proposed.Weighted standard deviation (STD) techniques are employed adaptively to estimate the unknown object positions. WSNs with minimum RSSI mean values are considered as reference nodes across the sensing area. The object localisation is carried out in two phases with respect to these reference nodes. Calculated object coordinates are later translated into the universal coordinate system to determine the actual object coordinates.
Virtual fingerprint localisation technique is introduced to determine the object locations by using virtual fingerprint database. A physical fingerprint database is organised in the form of virtual database by using LQI distribution functions. Virtual database elements are generated among the physical database elements with linear and exponential distribution functions between the fingerprint points. Localisation procedures are repeated with virtual database and localisation accuracies are improved compared to the basic fingerprint approach.
In order to reduce the computation time and effort, segmentation of the sensing area is introduced. Static and dynamic segmentation techniques are deployed. Segments are defined by RSS ranges and the unknown object is localised in one of these segments. Fingerprint techniques are applied only in the relevant segment to find the object location.
Finally, graphical user interfaces (GUI) are utilised with application program interfaces (API), in all calculations to visualise unknown object locations indoors
D6.2 - Prototype description and field trial results
Deliverable D6.2 del projecte FARAMIRPostprint (published version
A Tutorial on Environment-Aware Communications via Channel Knowledge Map for 6G
Sixth-generation (6G) mobile communication networks are expected to have
dense infrastructures, large-dimensional channels, cost-effective hardware,
diversified positioning methods, and enhanced intelligence. Such trends bring
both new challenges and opportunities for the practical design of 6G. On one
hand, acquiring channel state information (CSI) in real time for all wireless
links becomes quite challenging in 6G. On the other hand, there would be
numerous data sources in 6G containing high-quality location-tagged channel
data, making it possible to better learn the local wireless environment. By
exploiting such new opportunities and for tackling the CSI acquisition
challenge, there is a promising paradigm shift from the conventional
environment-unaware communications to the new environment-aware communications
based on the novel approach of channel knowledge map (CKM). This article aims
to provide a comprehensive tutorial overview on environment-aware
communications enabled by CKM to fully harness its benefits for 6G. First, the
basic concept of CKM is presented, and a comparison of CKM with various
existing channel inference techniques is discussed. Next, the main techniques
for CKM construction are discussed, including both the model-free and
model-assisted approaches. Furthermore, a general framework is presented for
the utilization of CKM to achieve environment-aware communications, followed by
some typical CKM-aided communication scenarios. Finally, important open
problems in CKM research are highlighted and potential solutions are discussed
to inspire future work
Blind Transmitter Localization Using Deep Learning: A Scalability Study
This work presents an investigation on the scalability of a deep leaning
(DL)-based blind transmitter positioning system for addressing the multi
transmitter localization (MLT) problem. The proposed approach is able to
estimate relative coordinates of non-cooperative active transmitters based
solely on received signal strength measurements collected by a wireless sensor
network. A performance comparison with two other solutions of the MLT problem
are presented for demonstrating the benefits with respect to scalability of the
DL approach. Our investigation aims at highlighting the potential of DL to be a
key technique that is able to provide a low complexity, accurate and reliable
transmitter positioning service for improving future wireless communications
systems.Comment: Published in: 2023 IEEE Wireless Communications and Networking
Conference (WCNC
Positioning algorithms for RFID-based multi-sensor indoor/outdoor positioning techniques
Position information has been very important. People need this information almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques. However, these techniques are difficult to be used indoor since GPS signals are too weak to be received. The alternative techniques, such as inertial sensors and radio-based pseudolites, can be used for indoor positioning but have limitations. For example, the inertial sensors suffer from drifting problems caused by the accumulating errors of measured acceleration and velocity and the radio-based techniques are prone to the obstructions and multipath effects of the transmitted signals. It is therefore necessary to develop improved methods for minimising the limitations of the current indoor positioning techniques and providing an adequately precise solution of the indoor positioning and seamless indoor/outdoor positioning. The main objectives of this research are to investigate and develop algorithms for the low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) based multi-sensor techniques, such as integrating with Micro-Electro-Mechanical Systems (MEMS) Inertial Navigation System (INS) and/or GPS. A RFID probabilistic Cell of Origin (CoO) algorithm is developed, which is superior to the conventional CoO positioning algorithm in its positioning accuracy and continuity. Integration algorithms are also developed for RFID-based multi-sensor positioning techniques, which can provide metre-level positioning accuracy for dynamic personal positioning indoors. In addition, indoor/outdoor seamless positioning algorithms are investigated based on the iterated Reduced Sigma Point Kalman Filter (RSPKF) for RFID/MEMS INS/low-cost GPS integrated technique, which can provide metre-level positioning accuracy for personal positioning. 3-D GIS assisted personal positioning algorithms are also developed, including the map matching algorithm based on the probabilistic maps for personal positioning and the Site Specific (SISP) propagation model for efficiently generating the RFID signal strength distributions in location fingerprinting algorithms. Both static and dynamic indoor positioning experiments have been conducted using the RFID and RFID/MEMS INS integrated techniques. Metre-level positioning accuracy is achieved (e.g. 3.5m in rooms and 1.5m in stairways for static position, 4m for dynamic positioning and 1.7m using the GIS assisted positioning algorithms). Various indoor/outdoor experiments have been conducted using the RFID/MEMS INS/low-cost GPS integrated technique. It indicates that the techniques selected in this study, integrated with the low-cost GPS, can be used to provide continuous indoor/outdoor positions in approximately 4m accuracy with the iterated RSPKF. The results from the above experiments have demonstrated the improvements of integrating multiple sensors with RFID and utilizing the 3-D GIS data for personal positioning. The algorithms developed can be used in a portable RFID based multi-sensor positioning system to achieve metre-level accuracy in the indoor/outdoor environments. The proposed system has potential applications, such as tracking miners underground, monitoring athletes, locating first responders, guiding the disabled and providing other general location based services (LBS)
Sensors and Systems for Indoor Positioning
This reprint is a reprint of the articles that appeared in Sensors' (MDPI) Special Issue on “Sensors and Systems for Indoor Positioning". The published original contributions focused on systems and technologies to enable indoor applications
Advanced Wireless Localisation Methods Dealing with Incomplete Measurements
Positioning techniques have become an essential part of modern engineering, and the improvement in computing devices brings great potential for more advanced and complicated algorithms. This thesis first studies the existing radio signal based positioning techniques and then presents three developed methods in the sense of dealing with incomplete data. Firstly, on the basis of received signal strength (RSS) location fingerprinting techniques, the Kriging interpolation methods are applied to generate complete fingerprint databases of denser reference locations from sparse or incomplete data sets, as a solution of reducing the workload and cost of offline data collection. Secondly, with incomplete knowledge of shadowing correlation, a new approach of Bayesian inference on RSS based multiple target localisation is proposed taking advantage of the inverse Wishart conjugate prior. The MCMC method (Metropolis-within-Gibbs) and the maximum a posterior (MAP) / maximum likelihood (ML) method are then considered to produce target location estimates. Thirdly, a new information fusion approach is developed for the time difference of arrival (TDOF) and frequency difference of arrival (FDOA) based dual-satellite geolocation system, as a solution to the unknown time and frequency offsets. All proposed methods are studied and validated through simulations. Result analyses and future work directions are discussed
Secure key design approaches using entropy harvesting in wireless sensor network: A survey
Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
- …