65 research outputs found

    Improved trilateration for indoor localization: Neural network and centroid-based approach

    Full text link
    [EN] Location awareness is the key to success to many location-based services applications such as indoor navigation, elderly tracking, emergency management, and so on. Trilateration-based localization using received signal strength measurements is widely used in wireless sensor network-based localization and tracking systems due to its simplicity and low computational cost. However, localization accuracy obtained with the trilateration technique is generally very poor because of fluctuating nature of received signal strength measurements. The reason behind such notorious behavior of received signal strength is dynamicity in target motion and surrounding environment. In addition, the significant localization error is induced during each iteration step during trilateration, which gets propagated in the next iterations. To address this problem, this article presents an improved trilateration-based architecture named Trilateration Centroid Generalized Regression Neural Network. The proposed Trilateration Centroid Generalized Regression Neural Network-based localization algorithm inherits the simplicity and efficiency of three concepts namely trilateration, centroid, and Generalized Regression Neural Network. The extensive simulation results indicate that the proposed Trilateration Centroid Generalized Regression Neural Network algorithm demonstrates superior localization performance as compared to trilateration, and Generalized Regression Neural Network algorithm.Jondhale, SR.; Jondhale, AS.; Deshpande, PS.; Lloret, J. (2021). Improved trilateration for indoor localization: Neural network and centroid-based approach. International Journal of Distributed Sensor Networks (Online). 17(11):1-14. https://doi.org/10.1177/15501477211053997114171

    Distributed Target Engagement in Large-scale Mobile Sensor Networks

    Get PDF
    Sensor networks comprise an emerging field of study that is expected to touch many aspects of our life. Research in this area was originally motivated by military applications. Afterward sensor networks have demonstrated tremendous promise in many other applications such as infrastructure security, environment and habitat monitoring, industrial sensing, traffic control, and surveillance applications. One key challenge in large-scale sensor networks is the efficient use of the network's resources to collect information about objects in a given Volume of Interest (VOI). Multi-sensor Multi-target tracking in surveillance applications is an example where the success of the network to track targets in a given volume of interest, efficiently and effectively, hinges significantly on the network's ability to allocate the right set of sensors to the right set of targets so as to achieve optimal performance. This task can be even more complicated if the surveillance application is such that the sensors and targets are expected to be mobile. To ensure timely tracking of targets in a given volume of interest, the surveillance sensor network needs to maintain engagement with all targets in this volume. Thus the network must be able to perform the following real-time tasks: 1) sensor-to-target allocation; 2) target tracking; 3) sensor mobility control and coordination. In this research I propose a combination of the Semi-Flocking algorithm, as a multi-target motion control and coordination approach, and a hierarchical Distributed Constraint Optimization Problem (DCOP) modelling algorithm, as an allocation approach, to tackle target engagement problem in large-scale mobile multi-target multi-sensor surveillance systems. Sensor-to-target allocation is an NP-hard problem. Thus, for sensor networks to succeed in such application, an efficient approach that can tackle this NP-hard problem in real-time is disparately needed. This research work proposes a novel approach to tackle this issue by modelling the problem as a Hierarchical DCOP. Although DCOPs has been proven to be both general and efficient they tend to be computationally expensive, and often intractable for large-scale problems. To address this challenge, this research proposes to divide the sensor-to-target allocation problem into smaller sub-DCOPs with shared constraints, eliminating significant computational and communication costs. Furthermore, a non-binary variable modelling is presented to reduce the number of inter-agent constraints. Target tracking and sensor mobility control and coordination are the other main challenges in these networks. Biologically inspired approaches have recently gained significant attention as a tool to address this issue. These approaches are exemplified by the two well-known algorithms, namely, the Flocking algorithm and the Anti-Flocking algorithm. Generally speaking, although these two biologically inspired algorithms have demonstrated promising performance, they expose deficiencies when it comes to their ability to maintain simultaneous reliable dynamic area coverage and target coverage. To address this challenge, Semi-Flocking, a biologically inspired algorithm that benefits from key characteristics of both the Flocking and Anti-Flocking algorithms, is proposed. The Semi-Flocking algorithm approaches the problem by assigning a small flock of sensors to each target, while at the same time leaving some sensors free to explore the environment. Also, this thesis presents an extension of the Semi-Flocking in which it is combined with a constrained clustering approach to provide better coverage over maneuverable targets. To have a reliable target tracking, another extension of Semi-Flocking algorithm is presented which is a coupled distributed estimation and motion control algorithm. In this extension the Semi-Flocking algorithm is employed for the purpose of a multi-target motion control, and Kalman-Consensus Filter (KCF) for the purpose of motion estimation. Finally, this research will show that the proposed Hierarchical DCOP algorithm can be elegantly combined with the Semi-Flocking algorithm and its extensions to create a coupled control and allocation approach. Several experimental analysis conducted in this research illustrate how the operation of the proposed algorithms outperforms other approaches in terms of incurred computational and communication costs, area coverage, target coverage for both linear and maneuverable targets, target detection time, number of undetected targets and target coverage in noise conditions sensor network. Also it is illustrated that this algorithmic combination can successfully engage multiple sensors to multiple mobile targets such that the number of uncovered targets is minimized and the sensors' mean utilization factor sensor surveillance systems.is maximized

    Information fusion architectures for security and resource management in cyber physical systems

    Get PDF
    Data acquisition through sensors is very crucial in determining the operability of the observed physical entity. Cyber Physical Systems (CPSs) are an example of distributed systems where sensors embedded into the physical system are used in sensing and data acquisition. CPSs are a collaboration between the physical and the computational cyber components. The control decisions sent back to the actuators on the physical components from the computational cyber components closes the feedback loop of the CPS. Since, this feedback is solely based on the data collected through the embedded sensors, information acquisition from the data plays an extremely vital role in determining the operational stability of the CPS. Data collection process may be hindered by disturbances such as system faults, noise and security attacks. Hence, simple data acquisition techniques will not suffice as accurate system representation cannot be obtained. Therefore, more powerful methods of inferring information from collected data such as Information Fusion have to be used. Information fusion is analogous to the cognitive process used by humans to integrate data continuously from their senses to make inferences about their environment. Data from the sensors is combined using techniques drawn from several disciplines such as Adaptive Filtering, Machine Learning and Pattern Recognition. Decisions made from such combination of data form the crux of information fusion and differentiates it from a flat structured data aggregation. In this dissertation, multi-layered information fusion models are used to develop automated decision making architectures to service security and resource management requirements in Cyber Physical Systems --Abstract, page iv

    Multiple Model Bayesian Estimation for BLE-based Localization and RL-based Decision Support of Autonomous Agents

    Get PDF
    With the rapid emergence of Internet of Things (IoT), we are more and more surrounded by smart connected devices (agents) with integrated sensing, processing, and communication capabilities. In particular, IoT-based positioning has become of primary importance for providing advanced Location-based Services (LBSs) in indoor environments. Several LBSs have been developed recently such as navigation assistance in hospitals, localization/tracking in smart buildings, and providing assistive services via autonomous agents collectively act as an Internet of Robotic Things (IoRT). The focus of the thesis is on the following two research topics when it comes to autonomous agents providing LBSs in indoor environments: (i) Self-Localization, which is the autonomous agent’s ability to obtain knowledge of its own location, and; (ii) Localized Decision Support System, which refers to an autonomous agent’s ability to perform optimal actions towards achieving pre-defined objectives. With regards to Item (i), the thesis develops innovative localization solutions based on Bluetooth Low Energy (BLE), referred to Bluetooth Smart. Given unavailability of Global Positioning System (GPS) in indoor environments, BLE has attracted considerable attention due to its low cost, low energy consumption, and widespread availability in smart hand-held devices. Because of multipath fading and fluctuations in the indoor environment, however, BLE-based localization approaches fail to achieve high accuracies. To address these challenges, different linear and non-linear Bayesian-based estimation frameworks are proposed in this thesis. Among which, the thesis proposes a novel Multiple-Model and BLE-based tracking framework, referred to as the STUPEFY. The proposed STUPEFY framework uses set-valued information and is designed by coupling a non-linear Bayesian-based estimation model (Box Particle Filter) with fingerprinting-based methodologies to improve the overall localization accuracy. With regards to the Item (ii), there has been an increasing surge of interest on development of advanced Reinforcement Learning (RL) systems. The objective is development of intelligent approaches to learn optimal control policies directly from smart agents’ interactions with the environment. In this regard, Deep Neural Networks (DNNs) provide an attractive modeling mechanism to approximate the value function using sample transitions. DNN-based solutions, however, suffer from high sensitivity to parameter selection, are prone to overfitting, and are not very sample efficient. As a remedy to the aforementioned problems, the thesis proposes an innovative Multiple-Model Kalman Temporal Difference (MM-KTD) framework, which adapts the parameters of the filter using the observed states and rewards. Moreover, an active learning method is proposed to enhance the sampling efficiency of the overall system. The proposed MM-KTD framework can learn the optimal policy with significantly reduced number of samples as compared to its DNN-based counterparts

    Intelligent Sensor Networks

    Get PDF
    In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts

    A Unified Recommendation Framework for Data-driven, People-centric Smart Home Applications

    Full text link
    With the rapid growth in the number of things that can be connected to the internet, Recommendation Systems for the IoT (RSIoT) have become more significant in helping a variety of applications to meet user preferences, and such applications can be smart home, smart tourism, smart parking, m-health and so on. In this thesis, we propose a unified recommendation framework for data-driven, people-centric smart home applications. The framework involves three main stages: complex activity detection, constructing recommendations in timely manner, and insuring the data integrity. First, we review the latest state-of-the-art recommendations methods and development of applications for recommender system in the IoT so, as to form an overview of the current research progress. Challenges of using IoT for recommendation systems are introduced and explained. A reference framework to compare the existing studies and guide future research and practices is provided. In order to meet the requirements of complex activity detection that helps our system to understand what activity or activities our user is undertaking in relatively high level. We provide adequate resources to be fit for the recommender system. Furthermore, we consider two inherent challenges of RSIoT, that is, capturing dynamicity patterns of human activities and system update without a focus on user feedback. Based on these, we design a Reminder Care System (RCS) which harnesses the advantages of deep reinforcement learning (DQN) to further address these challenges. Then we utilize a contextual bandit approach for improving the quality of recommendations by considering the context as an input. We aim to address not only the two previous challenges of RSIoT but also to learn the best action in different scenarios and treat each state independently. Last but not least, we utilize a blockchain technology to ensure the safety of data storage in addition to decentralized feature. In the last part, we discuss a few open issues and provide some insights for future directions

    Dynamic and reliable Information Accessing and Management in Heterogeneous Wireless Networks

    Get PDF

    A Risk And Trust Security Framework For The Pervasive Mobile Environment

    Get PDF
    A pervasive mobile computing environment is typically composed of multiple fixed and mobile entities that interact autonomously with each other with very little central control. Many of these interactions may occur between entities that have not interacted with each other previously. Conventional security models are inadequate for regulating access to data and services, especially when the identities of a dynamic and growing community of entities are not known in advance. In order to cope with this drawback, entities may rely on context data to make security and trust decisions. However, risk is introduced in this process due to the variability and uncertainty of context information. Moreover, by the time the decisions are made, the context data may have already changed and, in which case, the security decisions could become invalid.With this in mind, our goal is to develop mechanisms or models, to aid trust decision-making by an entity or agent (the truster), when the consequences of its decisions depend on context information from other agents (the trustees). To achieve this, in this dissertation, we have developed ContextTrust a framework to not only compute the risk associated with a context variable, but also to derive a trust measure for context data producing agents. To compute the context data risk, ContextTrust uses Monte Carlo based method to model the behavior of a context variable. Moreover, ContextTrust makes use of time series classifiers and other simple statistical measures to derive an entity trust value.We conducted empirical analyses to evaluate the performance of ContextTrust using two real life data sets. The evaluation results show that ContextTrust can be effective in helping entities render security decisions

    Design of an adaptive RF fingerprint indoor positioning system

    Get PDF
    RF fingerprinting can solve the indoor positioning problem with satisfactory accuracy, but the methodology depends on the so-called radio map calibrated in the offline phase via manual site-survey, which is costly, time-consuming and somewhat error-prone. It also assumes the RF fingerprint’s signal-spatial correlations to remain static throughout the online positioning phase, which generally does not hold in practice. This is because indoor environments constantly experience dynamic changes, causing the radio signal strengths to fluctuate over time, which weakens the signal-spatial correlations of the RF fingerprints. State-of-the-arts have proposed adaptive RF fingerprint methodology capable of calibrating the radio map in real-time and on-demand to address these drawbacks. However, existing implementations are highly server-centric, which is less robust, does not scale well, and not privacy-friendly. This thesis aims to address these drawbacks by exploring the feasibility of implementing an adaptive RF fingerprint indoor positioning system in a distributed and client-centric architecture using only commodity Wi-Fi hardware, so it can seamlessly integrate with existing Wi-Fi network and allow it to offer both networking and positioning services. Such approach has not been explored in previous works, which forms the basis of this thesis’ main contribution. The proposed methodology utilizes a network of distributed location beacons as its reference infrastructure; hence the system is more robust since it does not have any single point-of-failure. Each location beacon periodically broadcasts its coordinate to announce its presence in the area, plus coefficients that model its real-time RSS distribution around the transmitting antenna. These coefficients are constantly self-calibrated by the location beacon using empirical RSS measurements obtained from neighbouring location beacons in a collaborative fashion, and fitting the values using path loss with log-normal shadowing model as a function of inter-beacon distances while minimizing the error in a least-squared sense. By self-modelling its RSS distribution in real-time, the location beacon becomes aware of its dynamically fluctuating signal levels caused by physical, environmental and temporal characteristics of the indoor environment. The implementation of this self-modelling feature on commodity Wi-Fi hardware is another original contribution of this thesis. Location discovery is managed locally by the clients, which means the proposed system can support unlimited number of client devices simultaneously while also protect user’s privacy because no information is shared with external parties. It starts by listening for beacon frames broadcasted by nearby location beacons and measuring their RSS values to establish the RF fingerprint of the unknown point. Next, it simulates the reference RF fingerprints of predetermined points inside the target area, effectively calibrating the site’s radio map, by computing the RSS values of all detected location beacons using their respective coordinates and path loss coefficients embedded inside the received beacon frames. Note that the coefficients model the real-time RSS distribution of each location beacon around its transmitting antenna; hence, the radio map is able to adapt itself to the dynamic fluctuations of the radio signal to maintain its signal-spatial correlations. The final step is to search the radio map to find the reference RF fingerprint that most closely resembles the unknown sample, where its coordinate is returned as the location result. One positioning approach would be to first construct a full radio map by computing the RSS of all detected location beacons at all predetermined calibration points, then followed by an exhaustive search over all reference RF fingerprints to find the best match. Generally, RF fingerprint algorithm performs better with higher number of calibration points per unit area since more locations can be classified, while extra RSS components can help to better distinguish between nearby calibration points. However, to calibrate and search many RF fingerprints will incur substantial computing costs, which is unsuitable for power and resource limited client devices. To address this challenge, this thesis introduces a novel algorithm suitable for client-centric positioning as another contribution. Given an unknown RF fingerprint to solve for location, the proposed algorithm first sorts the RSS in descending order. It then iterates over this list, first selecting the location beacon with the strongest RSS because this implies the unknown location is closest to the said location beacon. Next, it computes the beacon’s RSS using its path loss coefficients and coordinate information one calibration point at a time while simultaneously compares the result with the measured value. If they are similar, the algorithm keeps this location for subsequent processing; else it is removed because distant points relative to the unknown location would exhibit vastly different RSS values due to the different site-specific obstructions encountered by the radio signal propagation. The algorithm repeats the process by selecting the next strongest location beacon, but this time it only computes its RSS for those points identified in the previous iteration. After the last iteration completes, the average coordinate of remaining calibration points is returned as the location result. Matlab simulation shows the proposed algorithm only takes about half of the time to produce a location estimate with similar positioning accuracy compared to conventional algorithm that does a full radio map calibration and exhaustive RF fingerprint search. As part of the thesis’ contribution, a prototype of the proposed indoor positioning system is developed using only commodity Wi-Fi hardware and open-source software to evaluate its usability in real-world settings and to demonstrate possible implementation on existing Wi-Fi installations. Experimental results verify the proposed system yields consistent positioning accuracy, even in highly dynamic indoor environments and changing location beacon topologies
    • …
    corecore