3,269 research outputs found

    Transfer Learning for Device Fingerprinting with Application to Cognitive Radio Networks

    Full text link
    Primary user emulation (PUE) attacks are an emerging threat to cognitive radio (CR) networks in which malicious users imitate the primary users (PUs) signals to limit the access of secondary users (SUs). Ascertaining the identity of the devices is a key technical challenge that must be overcome to thwart the threat of PUE attacks. Typically, detection of PUE attacks is done by inspecting the signals coming from all the devices in the system, and then using these signals to form unique fingerprints for each device. Current detection and fingerprinting approaches require certain conditions to hold in order to effectively detect attackers. Such conditions include the need for a sufficient amount of fingerprint data for users or the existence of both the attacker and the victim PU within the same time frame. These conditions are necessary because current methods lack the ability to learn the behavior of both SUs and PUs with time. In this paper, a novel transfer learning (TL) approach is proposed, in which abstract knowledge about PUs and SUs is transferred from past time frames to improve the detection process at future time frames. The proposed approach extracts a high level representation for the environment at every time frame. This high level information is accumulated to form an abstract knowledge database. The CR system then utilizes this database to accurately detect PUE attacks even if an insufficient amount of fingerprint data is available at the current time frame. The dynamic structure of the proposed approach uses the final detection decisions to update the abstract knowledge database for future runs. Simulation results show that the proposed method can improve the performance with an average of 3.5% for only 10% relevant information between the past knowledge and the current environment signals.Comment: 6 pages, 3 figures, in Proceedings of IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Hong Kong, P.R. China, Aug. 201

    Automatic Wi-Fi Fingerprint System based on Unsupervised Learning

    Get PDF
    Recently, smartphones and Wi-Fi appliances have been generalized in daily life, and location-based service(LBS) has gradually been extended to indoor environments. Unlike outdoor positioning, which is typically handled by the global positioning system(GPS), indoor positioning technologies for providing LBSs have been studied with algorithms using various short-range wireless communications such as Wi-Fi, Ultra-wideband, Bluetooth, etc. Fingerprint-based positioning technology, a representative indoor LBS, estimates user locations using the received signal strength indicator(RSSI), indicating the relative transmission power of the access point(AP). Therefore, a fingerprint-based algorithm has the advantage of being robust to distorted wireless environments, such as radio wave reflections and refractions, compared to the time-of-arrival(TOA) method for non-line-of-sight(NLOS), where many obstacles exist. Fingerprint is divided into a training phase in which a radio map is generated by measuring the RSSIs of all indoor APs and positioning phase in which the positions of users are estimated by comparing the RSSIs of the generated radio map in real-time. In the training phase, the user collects the RSSIs of all APs measured at reference points set at regular intervals of 2 to 3m, creating a radio map. In the positioning phase, the reference point, which is most similar to the RSSI, compares the generated radio map from the training phase to the RSSI measured from user movements. This estimates the real-time indoor position. Fingerprint algorithms based on supervised and semi-supervised learning such as support vector machines and principal component analysis are essential for measuring the RSSIs in all indoor areas to produce a radio map. As the building size and the complexity of structures increases, the amount of work and time required also increase. The radio map generation algorithm that uses channel modeling does not require direct measurement, but it requires considerable effort because of building material, three-dimensional reflection coefficient, and numerical modeling of all obstacles. To overcome these problems, this thesis proposes an automatic Wi-Fi fingerprint system that combines an unsupervised dual radio mapping(UDRM) algorithm that reduces the time taken to acquire Wi-Fi signals and leverages an indoor environment with a minimum description length principle(MDLP)-based radio map feedback(RMF) algorithm to simultaneously optimize and update the radio map. The proposed UDRM algorithm in the training phase generates a radio map of the entire building based on the measured radio map of one reference floor by selectively applying the autoencoder and the generative adversarial network(GAN) according to the spatial structures. The proposed learning-based UDRM algorithm does not require labeled data, which is essential for supervised and semi-supervised learning algorithms. It has a relatively low dependency on RSSI datasets. Additionally, it has a high accuracy of radio map prediction than existing models because it learns the indoor environment simultaneously via a indoor two-dimensional map(2-D map). The produced radio map is used to estimate the real-time positioning of users in the positioning phase. Simultaneously, the proposed MDLP-based RMF algorithm analyzes the distribution characteristics of the RSSIs of newly measured APs and feeds the analyzed results back to the radio map. The MDLP, which is applied to the proposed algorithm, improves the performance of the positioning and optimizes the size of the radio map by preventing the indefinite update of the RSSI and by updating the newly added APs to the radio map. The proposed algorithm is compared with a real measurement-based radio map, confirming the high stability and accuracy of the proposed fingerprint system. Additionally, by generating a radio map of indoor areas with different structures, the proposed system is shown to be robust against the change in indoor environment, thus reducing the time cost. Finally, via a euclidean distance-based experiment, it is confirmed that the accuracy of the proposed fingerprint system is almost the same as that of the RSSI-based fingerprint system.|์ตœ๊ทผ ์Šค๋งˆํŠธํฐ๊ณผ Wi-Fi๊ฐ€ ์‹ค์ƒํ™œ์— ๋ณดํŽธํ™”๋˜๋ฉด์„œ ์œ„์น˜๊ธฐ๋ฐ˜ ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ฐœ๋ฐœ ๋ถ„์•ผ๊ฐ€ ์‹ค๋‚ด ํ™˜๊ฒฝ์œผ๋กœ ์ ์ฐจ ํ™•๋Œ€๋˜๊ณ  ์žˆ๋‹ค. GPS๋กœ ๋Œ€ํ‘œ๋˜๋Š” ์‹ค์™ธ ์œ„์น˜ ์ธ์‹๊ณผ ๋‹ฌ๋ฆฌ ์œ„์น˜๊ธฐ๋ฐ˜ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•œ ์‹ค๋‚ด ์œ„์น˜ ์ธ์‹ ๊ธฐ์ˆ ์€ Wi-Fi, UWB, ๋ธ”๋ฃจํˆฌ์Šค ๋“ฑ๊ณผ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๊ทผ๊ฑฐ๋ฆฌ ๋ฌด์„  ํ†ต์‹  ๊ธฐ๋ฐ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์ด ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๋Œ€ํ‘œ์ ์ธ ์‹ค๋‚ด ์œ„์น˜์ธ์‹ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ค‘ ํ•˜๋‚˜์ธ Fingerprint๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ์ˆ˜์‹ ํ•œ AP ์‹ ํ˜ธ์˜ ์ƒ๋Œ€์ ์ธ ํฌ๊ธฐ๋ฅผ ๋‚˜ํƒ€๋‚ด๋Š” RSSI๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์œ„์น˜๋ฅผ ์ถ”์ •ํ•œ๋‹ค. ๋”ฐ๋ผ์„œ Fingerprint๊ธฐ๋ฐ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์žฅ์• ๋ฌผ์ด ๋งŽ์ด ์กด์žฌํ•˜๋Š” ๋น„๊ฐ€์‹œ ๊ฑฐ๋ฆฌ์—์„œ TOA ๋ฐฉ์‹์— ๋น„ํ•ด ์ „ํŒŒ์˜ ๋ฐ˜์‚ฌ ๋ฐ ๊ตด์ ˆ๊ณผ ๊ฐ™์ด ์™œ๊ณก๋œ ๋ฌด์„  ํ™˜๊ฒฝ์— ๊ฐ•์ธํ•˜๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค. Fingerprint๋Š” ์‹ค๋‚ด์˜ ๋ชจ๋“  AP์˜ RSSI๋“ค์„ ์ธก์ •ํ•˜์—ฌ Radio map์„ ์ œ์ž‘ํ•˜๋Š” ๊ณผ์ •์ธ ํ•™์Šต ๋‹จ๊ณ„์™€ ์ƒ์„ฑ๋œ Radio map์˜ RSSI๋“ค์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ธก์ •๋œ RSSI์™€ ๋น„๊ตํ•˜์—ฌ ์‚ฌ์šฉ์ž์˜ ์œ„์น˜๋ฅผ ์ถ”์ •ํ•˜๋Š” ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„๋กœ ๋‚˜๋ˆ„์–ด์ง„๋‹ค. ํ•™์Šต ๋‹จ๊ณ„์—์„œ๋Š” ์œ„์น˜๋ฅผ ๊ตฌ๋ถ„ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ€ 2~3m์˜ ์ผ์ •ํ•œ ๊ฐ„๊ฒฉ์œผ๋กœ ์„ค์ •๋œ ์ฐธ์กฐ ์œ„์น˜๋“ค๋งˆ๋‹ค ์ธก์ •๋˜๋Š” ๋ชจ๋“  AP๋“ค์˜ RSSI๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  Radio map์œผ๋กœ ์ œ์ž‘ํ•œ๋‹ค. ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ๋Š” ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์ œ์ž‘๋œ Radio map๊ณผ ์‚ฌ์šฉ์ž์˜ ์ด๋™์— ์˜ํ•ด ์ธก์ •๋˜๋Š” RSSI์˜ ๋น„๊ต๋ฅผ ํ†ตํ•ด ๊ฐ€์žฅ ์œ ์‚ฌํ•œ RSSI ํŒจํ„ด์„ ๊ฐ€์ง€๋Š” ์ฐธ์กฐ ์œ„์น˜๊ฐ€ ์‹ค์‹œ๊ฐ„ ์‹ค๋‚ด ์œ„์น˜๋กœ ์ถ”์ •๋œ๋‹ค. ์„œํฌํŠธ ๋ฒกํ„ฐ ๋จธ์‹ (SVM), ์ฃผ์„ฑ๋ถ„ ๋ถ„์„(PCA) ๋“ฑ๊ณผ ๊ฐ™์ด ์ง€๋„ ๋ฐ ์ค€์ง€๋„ ํ•™์Šต๊ธฐ๋ฐ˜์˜ Fingerprint ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ Radio map์„ ์ œ์ž‘ํ•˜๊ธฐ ์œ„ํ•ด ๋ชจ๋“  ์‹ค๋‚ด ๊ณต๊ฐ„์—์„œ RSSI์˜ ์ธก์ •์ด ํ•„์ˆ˜์ ์ด๋‹ค. ์ด๋Ÿฌํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์€ ๊ฑด๋ฌผ์ด ๋Œ€ํ˜•ํ™”๋˜๊ณ  ๊ตฌ์กฐ๊ฐ€ ๋ณต์žกํ•ด์งˆ์ˆ˜๋ก ์ธก์ • ๊ณต๊ฐ„์ด ๋Š˜์–ด๋‚˜๋ฉด์„œ ์ž‘์—…๊ณผ ์‹œ๊ฐ„ ์†Œ๋ชจ๊ฐ€ ๋˜ํ•œ ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•œ๋‹ค. ์ฑ„๋„๋ชจ๋ธ๋ง์„ ํ†ตํ•œ Radio map ์ƒ์„ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ง์ ‘์ ์ธ ์ธก์ • ๊ณผ์ •์ด ๋ถˆํ•„์š”ํ•œ ๋ฐ˜๋ฉด์— ๊ฑด๋ฌผ์˜ ์žฌ์งˆ, 3์ฐจ์›์ ์ธ ๊ตฌ์กฐ์— ๋”ฐ๋ฅธ ๋ฐ˜์‚ฌ ๊ณ„์ˆ˜ ๋ฐ ๋ชจ๋“  ์žฅ์• ๋ฌผ์— ๋Œ€ํ•œ ์ˆ˜์น˜์ ์ธ ๋ชจ๋ธ๋ง์ด ํ•„์ˆ˜์ ์ด๊ธฐ ๋•Œ๋ฌธ์— ์ƒ๋‹นํžˆ ๋งŽ์€ ์ž‘์—…๋Ÿ‰์ด ์š”๊ตฌ๋œ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ๋ฌธ์ œ์ ๋“ค์„ ํ•ด๊ฒฐํ•˜๊ณ ์ž ํ•™์Šต ๋‹จ๊ณ„์—์„œ Wi-Fi ์‹ ํ˜ธ์˜ ์ˆ˜์ง‘์‹œ๊ฐ„์„ ์ตœ์†Œํ™”ํ•˜๋ฉด์„œ ์‹ค๋‚ด ํ™˜๊ฒฝ์ด ๊ณ ๋ ค๋œ Unsupervised Dual Radio Mapping(UDRM) ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ Radio map์˜ ์ตœ์ ํ™”๊ฐ€ ๋™์‹œ์— ๊ฐ€๋Šฅํ•œ Minimum description length principle(MDLP)๊ธฐ๋ฐ˜์˜ Radio map Feedback(RMF) ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ๊ฒฐํ•ฉ๋œ ๋น„์ง€๋„ํ•™์Šต๊ธฐ๋ฐ˜์˜ ์ž๋™ Wi-Fi Fingerprint๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์ œ์•ˆํ•˜๋Š” UDRM ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ๋‰ด๋Ÿด ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜์˜ ๋น„์ง€๋„ ํ•™์Šต ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ Autoencoder์™€ Generative Adversarial Network (GAN)๋ฅผ ๊ณต๊ฐ„๊ตฌ์กฐ์— ๋”ฐ๋ผ ์„ ํƒ์ ์œผ๋กœ ์ ์šฉํ•˜์—ฌ ํ•˜๋‚˜์˜ ์ฐธ์กฐ ์ธต์—์„œ ์ธก์ •๋œ Radio map์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ฑด๋ฌผ์ „์ฒด์˜ Radio map์„ ์ƒ์„ฑํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋น„์ง€๋„ ํ•™์Šต ๊ธฐ๋ฐ˜ UDRM ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ง€๋„ ๋ฐ ์ค€์ง€๋„ ํ•™์Šต์—์„œ ํ•„์ˆ˜์ ์ธ Labeled data๊ฐ€ ํ•„์š”ํ•˜์ง€ ์•Š์œผ๋ฉฐ RSSI ๋ฐ์ดํ„ฐ ์„ธํŠธ์˜ ์˜์กด์„ฑ์ด ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๋‹ค. ๋˜ํ•œ 2์ฐจ์› ์‹ค๋‚ด ์ง€๋„๋ฅผ ํ†ตํ•ด ์‹ค๋‚ด ํ™˜๊ฒฝ์„ ๋™์‹œ์— ํ•™์Šตํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์กด์˜ ์˜ˆ์ธก ๋ชจ๋ธ์— ๋น„ํ•ด Radio map์˜ ์˜ˆ์ธก ์ •ํ™•๋„๊ฐ€ ๋†’๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ์˜ํ•ด ์ œ์ž‘๋œ Radio map์€ ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ ์‚ฌ์šฉ์ž์˜ ์‹ค์‹œ๊ฐ„ ์œ„์น˜์ธ์‹์— ์ ์šฉ๋œ๋‹ค. ๋™์‹œ์— ์ œ์•ˆํ•˜๋Š” MDLP ๊ธฐ๋ฐ˜์˜ ์ž๋™ Wi-Fi ์—…๋ฐ์ดํŠธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ƒˆ๋กญ๊ฒŒ ์ธก์ •๋˜๋Š” AP๋“ค์˜ RSSI์˜ ๋ถ„ํฌํŠน์„ฑ์„ ๋ถ„์„ํ•˜๊ณ  ๊ทธ ๊ฒฐ๊ณผ๋ฅผ Radio map์— ํ”ผ๋“œ๋ฐฑํ•œ๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ์ ์šฉ๋œ MDLP๋Š” ๋ฌด๋ถ„๋ณ„ํ•œ RSSI์˜ ์—…๋ฐ์ดํŒ…์„ ๋ฐฉ์ง€ํ•˜๊ณ  ์ถ”๊ฐ€๋˜๋Š” AP๋ฅผ Radio map์— ์—…๋ฐ์ดํŠธํ•จ์œผ๋กœ์„œ ์œ„์น˜์ธ์‹์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ณ  Radio map์˜ ํฌ๊ธฐ์˜ ์ตœ์ ํ™”๊ฐ€ ๊ฐ€๋Šฅํ•˜๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์‹ค์ œ ์ธก์ •๊ธฐ๋ฐ˜์˜ Radio map๊ณผ ์„œ๋กœ ๋น„๊ต๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•œ Fingerprint ์‹œ์Šคํ…œ์˜ ๋†’์€ ์•ˆ์ •์„ฑ๊ณผ ์ •ํ™•๋„๋ฅผ ํ™•์ธํ•˜์˜€๋‹ค. ๋˜ํ•œ ๊ตฌ์กฐ๊ฐ€ ๋‹ค๋ฅธ ์‹ค๋‚ด๊ณต๊ฐ„์˜ Radio map ์ƒ์„ฑ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์‹ค๋‚ด ํ™˜๊ฒฝ ๋ณ€ํ™”์— ๊ฐ•์ธํ•จ๊ณผ ํ•™์Šต ์‹œ๊ฐ„ ์ธก์ •์„ ํ†ตํ•œ ์‹œ๊ฐ„ ๋น„์šฉ์ด ๊ฐ์†Œํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ Euclidean distance ๊ธฐ๋ฐ˜ ์‹คํ—˜์„ ํ†ตํ•˜์—ฌ ์‹ค์ œ ์ธก์ •ํ•œ RSSI๊ธฐ๋ฐ˜์˜ Fingerprint ์‹œ์Šคํ…œ๊ณผ ์ œ์•ˆํ•œ ์‹œ์Šคํ…œ์˜ ์œ„์น˜์ธ์‹ ์ •ํ™•๋„๊ฐ€ ๊ฑฐ์˜ ์ผ์น˜ํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค.Contents Contents โ…ฐ Lists of Figures and Tables โ…ฒ Abstract โ…ต Chapter 1 Introduction 01 1.1 Background and Necessity for Research 01 1.2 Objectives and Contents for Research 04 Chapter 2 Wi-Fi Positioning and Unsupervised Learning 07 2.1 Wi-Fi Positioning 07 2.1.1 Wi-Fi Signal and Fingerprint 07 2.1.2 Fingerprint Techniques 15 2.2 Unsupervised Learning 23 2.2.1 Neural Network 23 2.2.2 Autoencoder 28 2.2.3 Generative Adversarial Network 31 Chapter 3 Proposed Fingerprint System 36 3.1 Unsupervised Dual Radio Mapping Algorithm 36 3.2 MDLP-based Radio Map Feedback Algorithm 47 Chapter 4 Experiment and Result 51 4.1 Experimental Environment and Configuration 51 4.2 Results of Unsupervised Dual Radio Mapping Algorithm 56 4.2 Results of MDLP-based Radio Map Feedback Algorithm 69 Chapter 5 Conclusion 79 Reference 81Docto

    Real-Time Machine Learning for Quickest Detection

    Get PDF
    Safety-critical Cyber-Physical Systems (CPS) require real-time machine learning for control and decision making. One promising solution is to use deep learning to discover useful patterns for event detection from heterogeneous data. However, deep learning algorithms encounter challenges in CPS with assurability requirements: 1) Decision explainability, 2) Real-time and quickest event detection, and 3) Time-eficient incremental learning. To address these obstacles, I developed a real-time Machine Learning Framework for Quickest Detection (MLQD). To be specific, I first propose the zero-bias neural network, which removes decision bias and preferabilities from regular neural networks and provides an interpretable decision process. Second, I discover the latent space characteristic of the zero-bias neural network and the method to mathematically convert a Deep Neural Network (DNN) classifier into a performance-assured binary abnormality detector. In this way, I can seamlessly integrate the deep neural networks\u27 data processing capability with Quickest Detection (QD) and provide real-time sequential event detection paradigm. Thirdly, after discovering that a critical factor that impedes the incremental learning of neural networks is the concept interference (confusion) in latent space, and I prove that to minimize interference, the concept representation vectors (class fingerprints) within the latent space need to be organized orthogonally and I invent a new incremental learning strategy using the findings, I facilitate deep neural networks in the CPS to evolve eficiently without retraining. All my algorithms are evaluated on real-world applications, ADS-B (Automatic Dependent Surveillance Broadcasting) signal identification, and spoofing detection in the aviation communication system. Finally, I discuss the current trends in MLQD and conclude this dissertation by presenting the future research directions and applications. As a summary, the innovations of this dissertation are as follows: i) I propose the zerobias neural network, which provides transparent latent space characteristics, I apply it to solve the wireless device identification problem. ii) I discover and prove the orthogonal memory organization mechanism in artificial neural networks and apply this mechanism in time-efficient incremental learning. iii) I discover and mathematically prove the converging point theorem, with which we can predict the latent space topological characteristics and estimate the topological maturity of neural networks. iv) I bridge the gap between machine learning and quickest detection with assurable performance

    Machine Learning Algorithm for Wireless Indoor Localization

    Get PDF
    Smartphones equipped with Wi-Fi technology are widely used nowadays. Due to the need for inexpensive indoor positioning systems (IPSs), many researchers have focused on Wi-Fi-based IPSs, which use wireless local area network received signal strength (RSS) data that are collected at distinct locations in indoor environments called reference points. In this study, a new framework based on symmetric Bregman divergence, which incorporates k-nearest neighbor (kNN) classification in signal space, was proposed. The coordinates of the target were determined as a weighted combination of the nearest fingerprints using Jensen-Bregman divergences, which unify the squared Euclidean and Mahalanobis distances with information-theoretic Jensen-Shannon divergence measures. To validate our work, the performance of the proposed algorithm was compared with the probabilistic neural network and multivariate Kullback-Leibler divergence. The distance error for the developed algorithm was less than 1ย m

    Class-Incremental Learning for Wireless Device Identification in IoT

    Get PDF
    Deep Learning (DL) has been utilized pervasively in the Internet of Things (IoT). One typical application of DL in IoT is device identification from wireless signals, namely Noncryptographic Device Identification (NDI). However, learning components in NDI systems have to evolve to adapt to operational variations, such a paradigm is termed as Incremental Learning (IL). Various IL algorithms have been proposed and many of them require dedicated space to store the increasing amount of historical data, and therefore, they are not suitable for IoT or mobile applications. However, conventional IL schemes can not provide satisfying performance when historical data are not available. In this paper, we address the IL problem in NDI from a new perspective, firstly, we provide a new metric to measure the degree of topological maturity of DNN models from the degree of conflict of class-specific fingerprints. We discover that an important cause for performance degradation in IL enabled NDI is owing to the conflict of devicesโ€™ fingerprints. Second, we also show that the conventional IL schemes can lead to low topological maturity of DNN models in NDI systems. Thirdly, we propose a new Channel Separation Enabled Incremental Learning (CSIL) scheme without using historical data, in which our strategy can automatically separate devicesโ€™ fingerprints in different learning stages and avoid potential conflict. Finally, We evaluated the effectiveness of the proposed framework using real data from ADS-B (Automatic Dependent Surveillance-Broadcast), an application of IoT in aviation. The proposed framework has the potential to be applied to accurate identification of IoT devices in a variety of IoT applications and services
    • โ€ฆ
    corecore