Towards the limits: Sensing Capability Measurement for ISAC Through Channel Encoder
Abstract
Integrated Sensing and Communication (ISAC) is gradually becoming a reality due to the significant increase in frequency and bandwidth of next-generation wireless communication technologies. Therefore it becomes crucial to evaluate the communication and sensing performance using appropriate channel models to address resource competition from each other. Existing work only models the sensing capability based on the mutual information between the channel response and the received signal, and its theoretical resolution is difficult to support the high-precision requirements of ISAC for sensing tasks, and may even affect its communication optimal.
In this paper, we propose a sensing channel encoder model to measure the sensing capacity with higher resolution by discrete task mutual information. For the first time, derive upper and lower bounds on the sensing accuracy for a given channel. This model not only provides the possibility of optimizing the ISAC systems at a finer granularity and balancing communication and sensing resources, but also provides theoretical explanations for classical intuitive feelings (like more modalities more accuracy) in wireless sensing. Furthermore, we validate the effectiveness of the proposed channel model through real-case studies, including person identification, displacement detection, direction estimation, and device recognition. The evaluation results indicate a Pearson correlation coefficient exceeding 0.9 between our task mutual information and conventional experimental metrics (e.g., accuracy).111This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.
Keywords ISAC sensing channel wireless sensing mutual information
1 Introduction
The recent development of next-generation (5G-Advanced and 6G) communication technology motivates the integrated sensing and communication (ISAC) studies from various perspectives, such as the localization models Sayed et al. (2005); Shen et al. (2010); Wang et al. (2018a), the power and sub-channel allocation algorithms Phunchongharn et al. (2013); Zhang et al. (2017), the dual-functional waveforms design Zhang et al. (2024) and so on. ISAC has been conceptualized, designed, and optimized for making communication and sensing functions complementary to each other.
However, the goal of wireless communication is to minimize the impact of channel noise within the Shannon’s limit, while the goal of wireless sensing is to utilize the channel noise and then to identify the entities or the corresponding nature of the channel. The different goals bring the inherent trade-off between communication and sensing performance when integrating them together. To better address such resource competition from each other, it is essential to quantify the ability to communicate and sense under a given channel. The communication aspects can be bounded by Shannon’s theorem, but the sensing part lacks unified and efficient theory support. Existing work on sensing theory suffers from deficiencies in different aspects, such as limited applicable tasks Shen et al. (2010) and incomplete evaluation metrics Zhang et al. (2024); Phunchongharn et al. (2013).
In the present paper, we will theoretically analyze the sensing capability and measure it based channel encoder model. The core problem of wireless sensing is that of reproducing via the interfered signals at the receiver either exactly or approximately the interfering source, considered as the sensed object. As illustrated in Fig 1, the ISAC system can be formulated by , where is the received signal, is the transmitted signal, is the channel status, and is the noise that might be introduced by sensed objects.
Intuitively, the system sensing capability can be evaluated by analyzing how the received signals reflect the channel status, such as sensing mutual information Liu et al. (2021a); Zhang et al. (2021). But it doesn’t work well for the following two reasons. First, it is difficult to obtain complete information about the signal itself, we can only identify the sensory objects by analyzing several received signal features, such as the time-of-arrival (TOA), angle-of-arrival (AOA) and received signal strength (RSS). The relationship between the sensing capability of such features and the signal itself is ambiguous. For example, when containing the same level of noise, the AoA estimation error is related to the orientation of the antenna array Tai et al. (2019), as shown in Fig 2. Second, frequently the sensed objects have various types, including moving entities placed in the channel, temperature or humidity fields affecting the channel, etc. The sensing capability analysis must be designed to operate for all possible types, not just the one that will actually be chosen since this is unknown at the time of design.
Fortunately, if the number of signal features and object types in the sets is finite, then the monotone function of the map** between them can be regarded as a measure of the sensing capability when the pair is chosen from the sets. The most natural choice of such a monotone function is still mutual information for various reasons:
-
1.
It is suitable to the communication theorem and thus easier to integrate. The ultimate goal of sensing capability assessment is to provide an optimization basis for the trade-off between communication and sensing in ISAC systems so that entropy-based methods can achieve calculations more efficiently.
-
2.
It evaluates the amount of information contained in one random variable about another random variable, which is nearer to our intuitive feeling as to the proper measure for sensing: how much information is obtained in the observed signal features about the sensed object.
In this paper, we propose a general sensing channel encoder model to help determine the sensing capability – the upper bound and lower bound of error in restoring the sensed object from given wireless signal features. Main contributions are as following:
-
•
We propose a sensing channel encoder model to describe the sensing system, and derive the fundamental limits of specific sensing objects under given signal features, in terms of a performance measure called discrete task mutual information (DTMI). This approach unifies such information from different features in a canonical form as a weighted sum associated with the weights characterizing the information intensity.
-
•
Based on DTMI, we first provide upper and lower bounds of sensing errors for ubiquitous sensing systems and give a sufficient condition for lossless sensing. It enhances the interpretability of current sensing systems and can be further used to guide the problem of resource allocation for communication and sensing in ISAC systems.
-
•
We validate the effectiveness of the proposed sensing system model in several real-world cases, including binary classification tasks such as Wi-Fi-based human identification and RFID-based displacement detection, and multi-classification tasks such as direction sensing based on electromagnetic signals and device identification based on traffic features. The experiment results show that the consistency between our proposed sensing capability evaluation method and the actual task results is up to 0.9 (Pearson correlation coefficient).
The rest of the paper is organized as follows. Section 2 reviews the related work. We introduce the sensing channel encoder model in Section 3. In Section 4, we give a theoretical explanation for some classical phenomena in sensing systems. Finally, we evaluate its performance in real examples in Section 5.
2 Related work
2.1 Sensing systems based on communication devices.
ISAC is widely acknowledged as a pivotal enabler for a myriad of emerging applications, encompassing smart manufacturing, smart homes, and smart cities Bliss (2014). The deployment of professional sensing equipment on a large scale is often impeded by their substantial size and high costs.In the context of the burgeoning Internet of Things (IoT), a multitude of endpoints, originally intended for communication purposes such as WiFi, speakers and microphones, RFID, among others, have gained prominence due to their abundance and cost-effectiveness in comparison to specialized equipment. Consequently, a growing number of researchers and practitioners are exploring the use of these devices for sensing tasks. These applications range from localization and trajectory tracking to material identification and health monitoring.
(1) Localization and trajectory tracking. The proliferation of wireless devices, coupled with the development of wireless network infrastructure, has led to a significant increase in their deployment within both workplaces and homes. Recently, there has been a notable trend towards employing these communication devices for mobile trajectory tracking. Wi-Fi based systems Wang et al. (2018b); Kotaru et al. (2017) use Channel State Information/Received Signal Strength Indicator (CSI/RSSI) for localization Kotaru et al. (2017); Qian et al. (2017); Ali et al. (2015), gesture tracking Wang et al. (2018b); Yu et al. (2018), gesture recognition Ali et al. (2015); Tan and Yang (2016); Abdelnasser et al. (2015), etc. Within this context, Widar Qian et al. (2017) quantifies the relationship between CSI dynamic changes and user location and speed to achieve an average position error of \qty25cm. RFID-based systems can achieve centimeter-level tracking accuracy using phase-based methods Yang et al. ; Adib and Katabi (2013); Wang et al. (2018c, 2014, 2016); Chang et al. (2018). For instance, RF-IDraw Wang et al. (2014) utilizes interference techniques to measure the relative phase between multiple RFID readers, while Tadar Adib and Katabi (2013) achieves through-wall tracking by exploiting multipath signal variations caused by human movement. Tagoram Yang et al. uses the concept of "virtual antennas" and phase holography to map measured phases to possible tag locations and calculates moving trajectories through phase changes. However, the positioning accuracy of these works is influenced by many factors, such as the number of antennas and noise levels. There is still a lack of theoretical means to quantify the impact of these factors on the results.
(2) Material identification. In contrast to professional equipment, which can cost tens of thousands of dollars, radio frequency signal transceivers are comparatively less expensive and compact. This makes them more feasible for deployment in lightweight sensing scenarios such as homes, or large-scale scenarios like warehouses. For instance, we can utilize commercial WiFi signals to detect whether the purchased fruits are ripe Tan and Yang (2021); Liu et al. (2021b). In addition, compared with visible light, the frequency of wireless signals is lower, which makes them have better propagation performance in low light or non-line-of-sight environments. For example, for liquids placed in opaque containers, many radio frequency signal-based systems can identify the solution concentration with a granularity of 1% Liang et al. (2021); Shang et al. (2022, 2023).
(3) Health monitoring. Both heartbeat and respiratory behavior produce corresponding body-conducted sounds. Consequently, sound has emerged as a significant modality for the sensing of vital signs. Xiong et al. Li et al. (2022, 2020); Liu et al. (2021c) have extended the effective distance of acoustic sensing by utilizing ubiquitous sound waves, achieving accurate personnel tracking, gesture tracking, eye movement tracking, etc. in multiple scenarios. For a long time, auscultation has been an important part of sleep and respiratory related research, so many works use microphones on mobile devices to capture the air-conducted sounds of respiration for snoring detection Azarbarzin and Moussavi (2010), sleep apnea detection Yadollahi et al. (2010). Han et al. Han et al. (2023) employ in-ear microphones to facilitate sense and user identity authentication via respiratory behavior analysis. Owing to its non-contact characteristic, radio frequency signals have the potential to alleviate pressure on users during monitoring or sensing processes. This has led to a surge in academic interest in this field in recent years. Wang et al. Wang et al. first propose the Fresnel zone theory of WiFi signal sensing in free space, theoretically exploring the impact of human breathing depth on the reception of radio frequency signals. In addition, Liu et al. Liu et al. (2019) explore the feasibility of using RFID tags to achieve non-contact chest displacement.
However, unlike the performance of communication systems that can be reasonably assessed using theoretical metrics like channel capacity, the current evaluation of sensing system performance largely relies on experimental approaches.
2.2 Performance measurement of the ISAC system.
Traditional research often treats “communication" and “sensing" as two distinct systems. However, a growing body of recent studies has demonstrated that these two concepts are intrinsically interconnected in the context of information theory, forming an intriguing “odd couple" Bliss (2014). In recent years, a significant number of researchers have dedicated their efforts to examining the theoretical performance of systems through the lens of synesthesia. A typical system modeling method is the linear Gaussian model, which is Xiong et al. (2023)
(1) |
where is the received signal, is the transmitted signal, is the channel matrix, and is the noise matrix. From the perspective of communication, the fundamental problem is how to accurately estimate the transmitted signal from the received signal . In accordance with Shannon’s second law, the ultimate performance of a channel is dictated by its capacity. This capacity is intrinsically linked to the mutual information between and , denoted as . From the perspective of sensing, the basic problem is to estimate . Similarly, researchers utilize the mutual information between and to characterize system performance Liu et al. (2021a); Zhang et al. (2021).
However, as introduced in Sec. 2.1, we are increasingly unsatisfied with merely sensing the channel response and ubiquitously sensing with communication devices. In this case, mutual information cannot fully characterize the sensing performance of the system. For instance, MapFi Tong et al. (2021) shows that under the same estimation level for , the accuracy of localization using angle of arrival varies with different orientations of the antenna array. Moreover, traditional channel theory is often based on Shannon’s second law, which assumes that the random variables used for encoding are independent and identically distributed, a condition difficult to meet when conducting ubiquitous sensing. Therefore, we need to construct a new channel model to adapt to the increasingly developed integrated communication and sensing systems.
3 Sensing channel encoder model
Sensing of discrete status finds broad applications in both industrial production and daily life scenarios, encompassing areas such as material identification, image recognition, and human presence detection. In this section, we establish a discrete sensing channel encoder model to analyze the system’s sensing capability. Our analysis reveals that, with the status to be sensed being fixed, the DTMI directly dictates the lower and upper bounds of the expected sensing error. Proceeding forward, we first introduce the definitions related to the discrete sensing channel encoder model, followed by an exploitation of DTMI to analyze the lower and upper bounds of the expected sensing error.
3.1 Model definitions.
A typical sensing process often comprises several components: the target status to be sensed (), the feature () designed to sense the status, the sensing channel embedding () obtained through the sensing system, and the outcome () derived after processing the signal. We analyze the sensing system as shown in the Fig. 3. The status has possible values, which together form the set . The probability that the target is in the -th status is . To facilitate the sensing of statuses, we construct -dimensional independent features to represent the status . Given the status as , the feature is given by . Upon transmission and subsequent data processing, the receiver is likely to receive this feature with a probability denoted as , which we represent as . Subsequently, the receiver assesses the condition of the sensed target utilizing the acquired features and decoding rules . The result is given by . For instance, in a task of material identification using radio frequency (RF) signals, the targets possess varying materials (). We exploit the characteristic that different materials affect RF signals differently to design feature , which are related to the amplitude of RF signals. Then, using a receiver that captures electromagnetic waves in the space and processes them according to a sensing algorithm, we acquire the sensing channel embedding denoted as . Finally, based on certain decision rules, we correlate with the corresponding to ascertain the result .
To quantify the performance of the sensing system, we initially define the “conditional error probability" and the “expected value of the error". The former represents the probability that the sensed result does not match the actual status given that the target status is , while the latter signifies the expectation of the conditional error probabilities. Furthermore, we introduce several definitions (Definition 4, 5, and 6) to facilitate our analysis of the upper and lower bounds of the expected error value.
Definition 1.
The discrete task mutual information (DTMI) is defined as the mutual information between the feature and the channel embedding , i.e., .
Definition 2.
The conditional error probability when the target status is is defined as:
(2) |
Definition 3.
The expected value of the error, denoted as , is articulated as follows:
(3) |
Definition 4.
If a sequence of length , where each dimension is statistically independent of one another, we refer to sequence as an -dimensional independent sequence. Their joint probability density function is given by:
(4) |
Definition 5.
For two -dimensional independent sequences and , if the joint distribution of is given by
(5) |
we refer to as a -dimensional jointly independent sequence.
Definition 6.
The jointly matching set of jointly independent sequence is defined as:
(6) | ||||
where is the -dimensional jointly independent sequence. , , and are the entropy of , , and , respectively.
3.2 Lower bound on expected error.
The current evaluation of sensing systems’ performance predominantly relies on experimental assessments. While experimental evaluations are highly effective in gauging system performance, conducting rigorous controlled experiments in real-world scenarios is exceedingly challenging. Consequently, in many instances, it is difficult to ascertain whether the failure to achieve the desired accuracy is due to inadequately designed sensing features or simply unforeseen interference during the data acquisition process. In this section, we give a lower bound on the expected error value based on DTMI, which helps us analyze the ultimate performance of the sensing system.
Theorem 1.
For a sensing task with statuses, we use independent features to describe the status of the target. The expected value of the error satisfies the following lower bound:
(7) |
where .
Proof.
We first prove that the sensing model we defined forms a Markov chain. Then we combine Fano’s inequality Verdú et al. (1994) and some properties of Markov chains to give a lower bound for .
Lemma 1.
For the sensing model described in Section 3, the target status , the feature , the received channel embedding , and the sensing result form two Markov chains, i.e., and .
Proof.
For a Markov chain, some simple consequences are as follows Cover (1999):
-
•
If is a Markov chain, form a Markov chain, i.e., .
-
•
For three random variables , , and , if , then form a Markov chain, i.e., .
According to the deification of sensing model, the feature is a function of the target status, i.e., ; the sensing feature is a function of the status feature , i.e., ; and the sensing result is a function of the sensing feature , i.e., . Therefore, the target status , the feature , the channel embedding , and the sensing result form a Markov chain, i.e., . Besides, we have . ∎
According to the Fano’s inequality Cover (1999), if three random variables form a Markov chain, i.e., , we have:
(8) |
where is the conditional entropy of given . For the Markov chain , according to the total probability formula and Ferno’s inequality, we have:
(9) |
According to the Data-processing inequality Cover (1999), if three random variables , , and form a Markov chain, , then we have , where is the mutual information between and . For the Markov chain , we have . And for the Markov chain , we have . As a result, we have:
(10) |
3.3 Upper bound on expected error.
In communication, Shannon’s second theorem Shannon (1948) posits that for a given signal, error-free transmission can always be achieved as long as we employ code words that are sufficiently long to encode the message. This issue is equally pertinent in sensing: when the dimensionality of the feature is sufficiently large, what is the upper bound on the expected error? In this section, we derive an upper bound based on DTMI (Theorem 2) and provide a sufficient condition under which error-free sensing can be attained (Theorem 3).
Theorem 2.
For a sensing task with statuss, we use independent features to describe the status of the target. For sufficiently large , the expected value of the error satisfies the following upper bound:
(12) |
Proof.
The expected error is influenced by the decision rule , with the maximum likelihood criterion being a commonly employed rule in practical scenarios. However, for the sake of facilitating analysis, we introduce a novel decision rule defined in conjunction with the matching set (Definition 6), where in the result is determined as whenever the channel embedding and the feature corresponding to the message form a jointly matching set. Under this rule, we first estimate the probability of constituting a jointly matching set (Lemma 2 to 4) and subsequently present a suboptimal upper bound on the expected error (it is noted that employing alternative decision criteria might yield tighter upper bounds).
The decoding rule . To obtain sensing outcomes from , we employ the following rule :
-
•
We declare that the target statue is if and there is no other status such that .
-
•
If there are multiple statuss such that or there is no status such that , an error is declared.
To estimate the probability of an event occurring, we first prove the following lemma about matching sets.
Lemma 2.
For a -dimensional jointly independent sequence and a matching set , when , the probability that is in the matching set is close to 1, which is
(13) |
Proof.
According to the Chebyshev’s Law of Large Numbers, when the number of observations is sufficiently large, the sample mean of independent and identically distributed random variables converges in probability to their common expected value. Observing that the entropy is essentially the expectation of the logarithm of the reciprocal of probabilities, we leverage these two premises to underpin our proof.
According to Chebyshev’s Law of Large Numbers, given , there exists , so that for all , the following holds:
(14) | ||||
Similarly, there exists and , so that for all , the following holds:
(15) |
and for all , the following holds:
(16) |
Let , then for all , the following holds:
(17) |
∎
Going further, we consider the scenario where forms a jointly independent sequence (Definition 5), and we examine the probability of them constituting a joint matching set. Initially, drawing upon Definition 6, we estimate the counts of elements in both the matching set and the jointly matching set, which are related to the entropy. Specifically, the number of elements in the matching set for and are approximately and , respectively, while the count of their joint matching sequences is roughly . Building on this foundation, Lemma 4 furnishes an estimate for the probability that forms a joint matching set.
Lemma 3.
The upper bound of the number of elements in the matching set of jointly independent sequence is given by:
(18) |
where is the entropy of , and denotes the number of elements in the set.
Proof.
Lemma 4.
For a -dimensional jointly independent sequence and a matching set , if , i.e., and are independent with the same marginals as , then
(22) |
where is the mutual information between and .
Proof.
According to the definition of the jointly matching set, we have:
(23) | |||
The probability of a joint independent sequence in is given by:
(24) | ||||
∎
We first estimate the probability that the sensing result is wrong when the target status is . We can assume without loss of generality that the target status is . We consider the following events:
(25) |
where is the received channel embedding when the target status is . Based on the decision rule and Definition 2, the conditional error probability at this point is given by:
(26) |
where is the complement of .
Finally, Theorem 3 provides a sufficient condition for error-free sensing, indicating that for achieving error-free sensing, a sufficient number of features with high DTMI must be identified 222This requirement diverges from the conclusion in communications, where merely having a sufficient number of codewords is typically sufficient..
Theorem 3.
For a sensing task with statuss, we use independent features to describe the status of the target. For a sufficiently large , if satisfies the following equation,
(31) |
where and is the mean and , we have .
Proof.
In Theorem 2, we derive an upper bound estimate for the expected error . Capitalizing on the convexity property of mutual information, we leverage Jensen’s inequality to provide a sufficient condition for a tight error estimation. This approach ensures that our estimate effectively captures the inherent relationship between the variables, harnessing the convexity to yield a more robust and accurate analysis of the error’s expected magnitude without loss of generality.
According to the Jensen’s inequality, if is a convex function and is a random variable, we have:
(32) |
Since the mutual information is a convex function Cover (1999), we have:
(33) |
where and is the mean of and . As a result, for a , the Equ. (26) can be rewritten as:
(34) |
Since functions and are both convex functions, and function is monotonically increasing, is also a convex function. According to the Jensen’s inequality, we have:
(35) |
As a result, for and sufficiently large , if satisfies the Equ. (31), we have:
(36) |
∎
4 Corollary
Previous excellent sensing systems have summarized many valuable experiences, such as multi-modal systems tend to achieve better sensing performance. However, these experiences currently lack theoretical explainability. In this section, we employ sensing channel encoder model and DTMI as tools to attempt to explain some classic phenomena.
4.1 Why do multimodal systems tend to exhibit superior performance?
In a communication system, Shannon’s second theorem stipulates that the error rate can be reduced to an arbitrary low level, provided that the codewords are sufficiently lengthy. Similarly, many previous research works have shown that using multi-modality for sensing helps achieve better performance, which can be explained by the theorem we proved previously. In this subsection, we will theoretically explain why multi-modal sensing systems are more capable of achieving superior sensing performance based on the DTMI.
Fig. 5 shows a schematic diagram of a multi-modal system. For the target state , we use modalities to sense it. The channels of different modalities are directly independent of each other. For example, in order to identify the material of the target, we use three modalities: vision, sound wave, and radio frequency signal for sensing. The transmission of visual signal, sound wave signal, and radio frequency signal is independent of each other. According to the Theorem 1, when the number of states remains unchanged, the lower bound of the expected value of the error is related to . Note that both mutual information and conditional mutual information are non-negative. When we add a new mode, we have
(37) | ||||
where and . Therefore, the more modalities we use, the larger the mutual information , the lower the theoretical lower bound of the expected value of the error.
4.2 How do we compare which of two sensing features is better?
In the process of designing a sensing system, it is crucial to carefully craft the sensing features. To show that feature is better than feature , we usually need to run many micro-benchmarks. While experimental validation is a compelling method of verification, it frequently involves intricate setup procedures and can be time-consuming. Moreover, due to the challenge of deploying tests across a wide range of scenarios, it is often difficult to ascertain whether feature is truly superior to feature or if this conclusion holds only in specific contexts.
In this paper, we propose DTMI which can reflect the performance of sensing features to a certain extent. Specifically, we consider two features and . After passing through the sensing channel, their corresponding channel embeddings are and , respectively. According to Theorem 1 and Theorem 2, both the upper and lower bounds of the expected error are related to the DTMI. If the DTMI , the upper and lower bounds of the expected value of the error will be reduced, which means that it is easier to achieve good performance using as sensing features. This necessitates alternative approaches, beyond experimental validation, to assess the performance of designed sensing features.
4.3 Is data pre-processing a “cure-all" solution?
Since data contains a lot of noise and interference, sensing systems usually include a data preprocessing module when they are designed, which is used to improve data quality for subsequent processing. Previous studies have shown that preprocessing can often improve sensing performance. Now our questions are: can we accomplish any sensing task with arbitrary accuracy through sufficiently sophisticatedly designed data preprocessing algorithms?
We refine the sensing channel encoder model depicted in Fig. 3, and the result is illustrated in Fig. 6. Specifically, for the -dimensional independent features , after transmission through an actual physical channel, we obtain an -dimensional data at the receiver. For instance, to localize a target using radio frequency (RF) signals, we employ angle of arrival (AoA) as a feature. At the receiver, what we receive is the amplitude and phase of the RF signals, which are . Subsequently, we subject the received data to data preprocessing, yielding a processed data . Then we utilize the sensing algorithm to process the data to obtain the channel embedding , and finally use the judgment algorithm to obtain the result . In particular, when no data preprocessing is used, it is equivalent to .
Corollary 1.
If the following equation holds,
(38) |
lossless sensing cannot be achieved simply by improving the effect of data preprocessing.
Proof.
According to the definition Markov chain, the channel shown in Fig. 6 constitutes a Markov chain . Note that “whether the sensing result is correct" is a binary event, so we have . According to the Theorem 1 and the Data-Processing Inequality, we have
(39) |
if Equ. (38) holds. Therefore, lossless sensing cannot be achieved simply by improving the effect of data preprocessing. ∎
5 Case Study
We illustrate the role of system performance evaluation based on sensing channel encoder model and DTMI through several case studies. We begin by examining the application of DTMI in binary classification tasks, using examples of human detection in home settings via WiFi and appliance cabinet door displacement detection in industrial scenarios via RFID. For multi-class classification, we consider two instances: the classic sensing problem in ISAC systems – direction estimation, and device identification based on an open-source traffic dataset. The results demonstrate that across different cases, the Pearson correlation between the trend of DTMI changes and that of accuracy fluctuations exceeds 0.9. Furthermore, DTMI can provide estimates of upper and lower bounds for sensing system errors, which is beneficial for optimizing and balancing ISAC systems.
5.1 Binary classification task.
(1) Human detection based on WiFi devices.
Indoor human detection plays a pivotal role in services such as elderly monitoring. In particular, device-free passive human detection has garnered significant attention in recent years. While methods based on infrared, pressure sensors, and the like have been applied to human detection, they either rely on specialized hardware or come at a higher cost. Moreover, vision-based and infrared-based methods are only effective within line-of-sight (LOS) coverage. Wi-Fi devices, being one of the most widely deployed radio frequency devices, have led to the implementation of numerous radio frequency sensing systems around them. In recent years, with the advancement of wireless sensing technology, Wi-Fi-based approaches have proven to be a promising method for indoor human detection. We deployed an experiment based on Wi-Fi devices in a residential setting and estimated mutual information using numerical methods. The experimental results indicate that DTMI exhibits a similar trend to accuracy. In this case study, their Pearson correlation coefficient exceeds .
The experimental setup is depicted in Fig. 7a, where we conducted experiments in a office using an ESP32 device as both transmitter and receiver, each equipped with a single antenna. Additionally, a camera was placed within the environment to capture video footage for recording ground truth. The sampling rate of the ESP32 is set to \qty100Hz. Ten volunteers are invited to participate in the tests. Each data acquisition session lasted 10 minutes: the first 5 minutes ensured the room is empty, followed by 5 minutes with human activity (walking) inside the room.
State has two possible values: “personnel present" and “personnel absent". After obtaining CSI data, we initially sliced the data, then performed data preprocessing to eliminate outliers and apply filtering. Finally, channel embedding is extracted from this processed data and compared against empirical thresholds to ascertain the presence or absence of individuals, which is the result . The entire data processing procedure is illustrated in Fig. 7b. The corfficient of variation of -th subcarrier is , where is the width of the time window, and are the mean and standard deviation of the -th subcarrier, respectively. And the channel embedding is given by
(40) |
where is the number of subcarriers. If falls within the experiential threshold range, we consider the environment to be “person absent"; otherwise, it is determined to be person present. The entire data processing workflow is illustrated in Fig. 7b. Here, the threshold range is . Figure 8a shows a example of the channel embedding extraction process.
In Fig. 8b, the blue solid line illustrates the error rate of human detection as the width of the time window varies . The dashed lines of other colors represent the mutual information under different numerical estimation algorithms, namely KraskovStogbauerGrassberger1 Kraskov et al. , KraskovStogbauerGrassberger2 Kraskov et al. , GaoKannanOhViswanath Gao et al. (a), and GaoOhViswanath Gao et al. (b). The results demonstrate that the trend of accuracy change is highly consistent with the trend of mutual information change, indicating that in such tasks, DTMI can serve as an additional performance metric, complementing accuracy, to evaluate system performance.
(2) RFID-based electrical cabinet door direction monitoring. Ensuring electrical safety is crucial during the manufacturing process. Take the electrical cabinet as an example; if its door is inadvertently opened without timely detection, there are potential safety hazards, including the risk of electrical fires and electric shock. In the field of terminal sensing in power systems, electromagnetic transformer-type sensors have traditionally dominated. In recent years, non-electric quantity sensing technologies such as vibration, stroke, arc light, and spectral sensing have gained widespread application in digital electrical equipment and power systems. However, these sensing technologies frequently depend on specialized sensors that boast high sensitivity and accuracy. These sensors are typically burdened with several drawbacks, including complexities in power supply, large size and weight, high energy consumption, vulnerability to electromagnetic interference, difficult installation processes, and exorbitant costs. Consequently, they fall short of meeting the requirements for the development of modern smart power equipment. Given the cost-effectiveness and ease of deployment of RFID tags, we have developed an algorithm for monitoring cabinet door status using multiple tags. Furthermore, we employ the mutual information of tasks, as proposed in this paper, to assess the system’s performance.
We conduct relevant tests in a factory setting. For an industrial metal electrical cabinet (measuring approximately ) used in production, our objective is to monitor the status of the cabinet door. The RFID reader is ImpinJ Speedway R420 reader. The RFID system operates in the . Two states are defined: when the door opening angle is less than , it is considered “closed"; otherwise, it is deemed “open". We affix several (1 to 3) anti-metal RFID tags onto the cabinet door and positioned the antenna within the cabinet body. The deployment configuration of the equipment is illustrated in Fig. 9a. After collecting the RSSI (Received Signal Strength Indicator) from each tag, we perform differential processing against an initial value, followed by calculating the average of these differential values across multiple tags. If the average differential exceeds an empirically determined threshold (set here as ), we conclude that the sensing result is “open"; otherwise, it is concluded as “closed". The detailed steps of data processing are depicted in Fig. 9b.
The results of the state monitoring are shown in Fig. 9c. Due to the cabinet being made of metal, the electromagnetic waves suffer from severe multipath interference. Consequently, when only one tag is used, the stability of the data is poor, and the empirical threshold becomes almost unusable after the tag position shifts by just a few centimeters. This issue leads to an identification accuracy of less than 60%. This is well reflected by the mutual information (), which has a small value in this case. Since the spacing of the tags exceeds half a wavelength, their mutual influence is minimal, and thus we can approximately consider the reflection signals from different tags as independent of each other. Consequently, following corollary introduced in Sec. 4.1, as the number of tags increases, so does the mutual information. We employ GaoOhViswanath Gao et al. (b) method to estimate the mutual information, and the red line in Fig. 9c illustrates its trend, which increases with the number of tags. As the mutual information increases, so does the accuracy of state identification.
5.2 Multiple classification tasks.
(1) Direction estimation based on Music algorithm and electromagnetic signal.
Location sensing represents one of the most prevalent and fundamental tasks in the field. A plethora of superior systems have been developed utilizing location sensing. Nevertheless, for an extended period, there has been a dearth of methods other than experimental evaluations to assess the influence of numerous factors, including the distance between the target and both the transmitter and receiver, on localization accuracy. In this case study, we use direction estimation based on the Music algorithm (one of the most popular localization algorithms) Kotaru et al. and electromagnetic signal to show the application of the proposed framework.
We consider a two-dimensional direction estimation problem. The basic model setup is shown in the Fig. 11. There are transmitting antennas and the position of the -th transmitting antenna is denoted as . The receiver has receiving antennas and the position of the -th receiving antenna is denoted as . The distance between two adjacent antennas is and for the receiver and transmitter, respectively. The distribution of complex permittivity in space is , and the permittivity at position is . For ease of calculation, we set the shape of the target to be a circle with a radius of . We set states, each state corresponds to a direction interval. The direction is defined as the angle (the in Fig. 11) between the line connecting the center of the target circle and the center of the receiving antenna array and the vertical line of the antenna array. The direction interval is , which is evenly divided into sub-intervals. The scattered signals are calculated using Maxwell’s equations and the method of moments Shang et al. . After adding Gaussian random noise to , we estimate signal using the MUSIC algorithm. Finally, we use the maximum likelihood algorithm to determine the direction corresponding to channel embedding , and then output the category to which belongs as the result .
We first simulated the effect of the distance between the target and the receiver on the direction estimation accuracy. During the simulation, we set the parameters as follows. We set the number of states . The frequency of the electromagnetic signal is \qty5.0GHz. The distance between the transmitter and the receiver is \qty8.0m. There are transmitting antennas and receiving antennas. The distance between two adjacent receiving antennas is \qty0.03m, i.e., . The diameter of the target is . The distance between the target and the receiver changes from \qty0.3m to \qty5m. The material of the target is water, and the permittivity is given by empirical formula Kaatze . In order to solve the scattered waves using the moment method, we discretized the space so that each subunit is a square with a side length of \qty0.01m.
We estimate the mutual information using a numerical algorithm Haaga et al. . The results are shown in Fig. 11. The results show that when the target is too close to the receiver, the accuracy of the direction estimation is very poor. We believe this is because the existence of phenomena such as diffraction makes it difficult to use the ray tracing model (the basic assumption of the MUSIC algorithm) to equivalent signal transmission Shang et al. (2022). When the distance is too large, the accuracy will also decrease. We believe this is because the scattered wave signal becomes weaker, resulting in a decrease in angular resolution. In addition, the changing trend of accuracy is basically consistent with the changing trend of the error lower bound given by our DTMI, and their Pearson correlation coefficient exceeds 0.95.
(2) Device type identification based on traffic characteristics.
Device name | Device type |
---|---|
XIAOMI Bedside Lamp | A |
HUAWEI TC5206 | B |
XIAOMI Induction Cooker | C1, C2 |
HUAWEI Matebook | D |
XIAOMI Microwave Oven | E1, E2 |
Oneplus6T | F |
XIAOMI Rice Cooker | G1, G2 |
XIAOMI EPS | H1, H2, H3 |
XIAOMI Table Lamp | I1, I2 |
Security and privacy issues have always been a hot topic among researchers Han et al. (2022). In recent years, with the development of the Internet of Things (IoT) and WiFi technology, attackers have devised more diverse means to steal private information. For instance, many attackers place concealed cameras and other IoT devices designed to pilfer private information in public environments such as hotels. After acquiring this private information, these devices continuously transmit the data through gateways. To detect illegal devices, Yan et al. Yan et al. (2022) leveraged the characteristic that different devices generate distinct traffic patterns, using the traffic at the gateway for device type identification. Their research findings indicated a minimum accuracy rate of 99.17% for identifying common devices like various models of Xiaomi phones, routers, etc. In this paper, based on their open-source code and data, our analysis shows that lossless detection can be achieved when the bit rate satisfies the sufficient condition given in Theorem 3.
At this moment, the schematic diagram illustrating the sensing channel encoder model is depicted in Fig. 12. Post-processing of the traffic data, we employ the methodology put forth by Yan. Yan et al. (2022) and colleagues to derive a 30-dimensional signal intended for appliance classification. Our dataset encompasses traffic information from eleven distinct device categories, whose precise nomenclature and coding are presented in Table 13. Notably, instances where identical device names are associated with multiple codes signify the existence of several units of the same device category. As an illustration, Type “C" comprises two devices, labeled “C1" and “C2", which denote two separate models of Xiaomi induction stoves. The evaluation procedure incorporates a five-fold cross-validation strategy, alongside adopting the KNN classifier as the analytical tool for discrimination. Throughout every iteration of cross-validation, the signals hailing from the subset earmarked for training are denoted as , whereas those belonging to the testing subset are marked as , precedented by applying algorithm “GaoOhViswanath" Gao et al. (b) to gauge mutual information. Fig. 13 illustrates the results of our calculations. Here, the possible state number , and 30-dimensional features are used for device type recognition. In this case, the corresponding sensing bitrate is . We find that the data at this time satisfies the sufficient conditions given by Theorem 3, and the goal of non-destructive sensing can be achieved at this time. The results of our KNN classification also show that the accuracy of device type recognition is 100%.
6 Conclusion
In this paper, we establish a channel model suitable for ubiquitous sensing, where we associate the sensing task with the received channel embedding through discrete task mutual information. Compared to the sensing mutual information in the integrated sensing and communication system, discrete task mutual information can more accurately evaluate the performance of the sensing system. Unlike traditional communication channel models, in sensing channels, it is difficult to maintain the independent and identically distributed characteristics among different random variables. For discrete task sensing channels, we provide upper and lower bounds for the expected error of sensing based on discrete task mutual information, and give a sufficient condition for achieving lossless sensing. We conduct case studies on four common sensing applications based on experimental data and simulation data. The results show that discrete task mutual information has a strong similarity with sensing accuracy. This provides a theoretical evaluation method for the performance of integrated sensing and communication systems beyond experimental evaluation.
References
- Sayed et al. [2005] Ali H Sayed, Alireza Tarighat, and Nima Khajehnouri. Network-based wireless location: challenges faced in develo** techniques for accurate wireless location information. IEEE signal processing magazine, 22(4):24–40, 2005.
- Shen et al. [2010] Yuan Shen, Henk Wymeersch, and Moe Z Win. Fundamental limits of wideband localization—part ii: Cooperative networks. IEEE Transactions on Information Theory, 56(10):4981–5000, 2010.
- Wang et al. [2018a] Jie Wang, Qinhua Gao, Miao Pan, and Yuguang Fang. Device-free wireless sensing: Challenges, opportunities, and applications. IEEE network, 32(2):132–137, 2018a.
- Phunchongharn et al. [2013] Phond Phunchongharn, Ekram Hossain, and Dong In Kim. Resource allocation for device-to-device communications underlaying lte-advanced networks. IEEE wireless communications, 20(4):91–100, 2013.
- Zhang et al. [2017] Haijun Zhang, Na Liu, ** Long, Abdol-Hamid Aghvami, and Victor CM Leung. Network slicing based 5g and future mobile networks: Mobility, resource management, and challenges. IEEE communications magazine, 55(8):138–145, 2017.
- Zhang et al. [2024] Kecheng Zhang, Weijie Yuan, **zhi Fan, and Xianbin Wang. Dual-functional waveform design with local sidelobe suppression via otfs signaling. IEEE Transactions on Vehicular Technology, 2024.
- Liu et al. [2021a] Fan Liu, Ya-Feng Liu, Ang Li, Christos Masouros, and Yonina C Eldar. Cramér-rao bound optimization for joint radar-communication beamforming. IEEE Transactions on Signal Processing, 70:240–253, 2021a.
- Zhang et al. [2021] J Andrew Zhang, Fan Liu, Christos Masouros, Robert W Heath, Zhiyong Feng, Le Zheng, and Athina Petropulu. An overview of signal processing techniques for joint communication and radar sensing. IEEE Journal of Selected Topics in Signal Processing, 15(6):1295–1315, 2021.
- Tai et al. [2019] Tzu-Chun Tai, Kate Ching-Ju Lin, and Yu-Chee Tseng. Toward reliable localization by unequal aoa tracking. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, pages 444–456, 2019.
- Bliss [2014] Daniel W Bliss. Cooperative radar and communications signaling: The estimation and information theory odd couple. In 2014 IEEE Radar Conference, pages 0050–0055. IEEE, 2014.
- Wang et al. [2018b] Lei Wang, Ke Sun, Haipeng Dai, Alex X Liu, and Xiaoyu Wang. Witrace: Centimeter-level passive gesture tracking using wifi signals. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 1–9. IEEE, 2018b.
- Kotaru et al. [2017] Manikanta Kotaru, Pengyu Zhang, and Sachin Katti. Localizing low-power backscatter tags using commodity wifi. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, pages 251–262, 2017.
- Qian et al. [2017] Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, and Kyle Jamieson. Widar: Decimeter-level passive tracking via velocity monitoring with commodity wi-fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 1–10, 2017.
- Ali et al. [2015] Kamran Ali, Alex X Liu, Wei Wang, and Muhammad Shahzad. Keystroke recognition using wifi signals. In Proceedings of the 21st annual international conference on mobile computing and networking, pages 90–102, 2015.
- Yu et al. [2018] Nan Yu, Wei Wang, Alex X Liu, and Lingtao Kong. Qgesture: Quantifying gesture distance and direction with wifi signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(1):1–23, 2018.
- Tan and Yang [2016] Sheng Tan and Jie Yang. Wifinger: Leveraging commodity wifi for fine-grained finger gesture recognition. In Proceedings of the 17th ACM international symposium on mobile ad hoc networking and computing, pages 201–210, 2016.
- Abdelnasser et al. [2015] Heba Abdelnasser, Moustafa Youssef, and Khaled A Harras. Wigest: A ubiquitous wifi-based gesture recognition system. In 2015 IEEE conference on computer communications (INFOCOM), pages 1472–1480. IEEE, 2015.
- [18] Lei Yang, Yekui Chen, Xiang-Yang Li, Chaowei Xiao, Mo Li, and Yunhao Liu. Tagoram: Real-time tracking of mobile RFID tags to high precision using COTS devices. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, pages 237–248.
- Adib and Katabi [2013] Fadel Adib and Dina Katabi. See through walls with wifi! In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pages 75–86, 2013.
- Wang et al. [2018c] Chuyu Wang, Jian Liu, Yingying Chen, Hongbo Liu, Lei Xie, Wei Wang, Bingbing He, and Sanglu Lu. Multi-touch in the air: Device-free finger tracking and gesture recognition via cots rfid. In IEEE INFOCOM 2018-IEEE conference on computer communications, pages 1691–1699. IEEE, 2018c.
- Wang et al. [2014] Jue Wang, Deepak Vasisht, and Dina Katabi. Rf-idraw: Virtual touch screen in the air using rf signals. ACM SIGCOMM Computer Communication Review, 44(4):235–246, 2014.
- Wang et al. [2016] Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, and Dingyi Fang. D-watch: Embracing" bad" multipaths for device-free localization with cots rfid devices. In Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, pages 253–266, 2016.
- Chang et al. [2018] Liqiong Chang, Jie Xiong, Ju Wang, Xiaojiang Chen, Yu Wang, Zhanyong Tang, and Dingyi Fang. Rf-copybook: A millimeter level calligraphy copybook based on commodity rfid. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(4):1–19, 2018.
- Tan and Yang [2021] Sheng Tan and Jie Yang. Object sensing for fruit ripeness detection using wifi signals. arXiv preprint arXiv:2106.00860, 2021.
- Liu et al. [2021b] Yutong Liu, Landu Jiang, Linghe Kong, Qiao Xiang, Xue Liu, and Guihai Chen. Wi-fruit: See through fruits with smart devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(4):1–29, 2021b.
- Liang et al. [2021] Yumeng Liang, Anfu Zhou, Huanhuan Zhang, Xinzhe Wen, and Huadong Ma. Fg-liquid: A contact-less fine-grained liquid identifier by pushing the limits of millimeter-wave sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(3):1–27, 2021.
- Shang et al. [2022] Fei Shang, Panlong Yang, Yubo Yan, and Xiang-Yang Li. Liqray: non-invasive and fine-grained liquid recognition system. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, pages 296–309, 2022.
- Shang et al. [2023] Fei Shang, Panlong Yang, Yubo Yan, and Xiang-Yang Li. Contactless and fine-grained liquid identification utilizing sub-6ghz signals. IEEE Transactions on Mobile Computing, pages 1–16, 2023. doi:10.1109/TMC.2023.3300356.
- Li et al. [2022] Dong Li, Jialin Liu, Sunghoon Ivan Lee, and Jie Xiong. Lasense: Pushing the limits of fine-grained activity sensing using acoustic signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6(1):1–27, 2022.
- Li et al. [2020] Dong Li, Jialin Liu, Sunghoon Ivan Lee, and Jie Xiong. Fm-track: pushing the limits of contactless multi-target tracking using acoustic signals. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems, pages 150–163, 2020.
- Liu et al. [2021c] Jialin Liu, Dong Li, Lei Wang, and Jie Xiong. Blinklistener: " listen" to your eye blink using your smartphone. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(2):1–27, 2021c.
- Azarbarzin and Moussavi [2010] Ali Azarbarzin and Zahra MK Moussavi. Automatic and unsupervised snore sound extraction from respiratory sound signals. IEEE Transactions on Biomedical Engineering, 58(5):1156–1162, 2010.
- Yadollahi et al. [2010] Azadeh Yadollahi, Eleni Giannouli, and Zahra Moussavi. Sleep apnea monitoring and diagnosis based on pulse oximetery and tracheal sound signals. Medical & biological engineering & computing, 48:1087–1097, 2010.
- Han et al. [2023] Feiyu Han, Panlong Yang, Shaojie Yan, Haohua Du, and Yuanhao Feng. Breathsign: Transparent and continuous in-ear authentication using bone-conducted breathing biometrics. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications, pages 1–10. IEEE, 2023.
- [35] Hao Wang, Daqing Zhang, Junyi Ma, Yasha Wang, Yuxiang Wang, Dan Wu, Tao Gu, and Bing Xie. Human respiration detection with commodity WiFi devices: Do user location and body orientation matter? In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 25–36.
- Liu et al. [2019] Chen Liu, Jie Xiong, Lin Cai, Lin Feng, Xiaojiang Chen, and Dingyi Fang. Beyond respiration: Contactless sleep sound-activity recognition using rf signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3):1–22, 2019.
- Xiong et al. [2023] Yifeng Xiong, Fan Liu, Yuanhao Cui, Weijie Yuan, Tony Xiao Han, and Giuseppe Caire. On the fundamental tradeoff of integrated sensing and communications under gaussian channels. IEEE Transactions on Information Theory, 2023.
- Tong et al. [2021] Xinyu Tong, Han Wang, Xiulong Liu, and Wenyu Qu. Mapfi: Autonomous map** of wi-fi infrastructure for indoor localization. IEEE transactions on mobile computing, 22(3):1566–1580, 2021.
- Verdú et al. [1994] Sergio Verdú et al. Generalizing the fano inequality. IEEE Transactions on Information Theory, 40(4):1247–1251, 1994.
- Cover [1999] Thomas M Cover. Elements of information theory. John Wiley & Sons, 1999.
- Shannon [1948] Claude Elwood Shannon. A mathematical theory of communication. The Bell system technical journal, 27(3):379–423, 1948.
- [42] Alexander Kraskov, Harald Stögbauer, and Peter Grassberger. Estimating mutual information. 69(6):66138. ISSN 1539-3755, 1550-2376. doi:10.1103/PhysRevE.69.066138. URL https://link.aps.org/doi/10.1103/PhysRevE.69.066138.
- Gao et al. [a] Weihao Gao, Sreeram Kannan, Sewoong Oh, and Pramod Viswanath. Estimating Mutual Information for Discrete-Continuous Mixtures. a.
- Gao et al. [b] Weihao Gao, Sewoong Oh, and Pramod Viswanath. Demystifying Fixed $k$ -Nearest Neighbor Information Estimators. 64(8):5629–5661, b. ISSN 0018-9448, 1557-9654. doi:10.1109/TIT.2018.2807481. URL https://ieeexplore.ieee.org/document/8294268/.
- [45] Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. Spotfi: decimeter level localization using wifi. 45(4):269–282. ISSN 0146-4833. doi:10.1145/2829988.2787487. URL https://dl.acm.org/doi/10.1145/2829988.2787487.
- [46] Fei Shang, Panlong Yang, Dawei Yan, Sijia Zhang, and Xiang-Yang Li. LiquImager: Fine-grained liquid identification and container imaging system with COTS WiFi devices. 8(1):15:1–15:29. doi:10.1145/3643509. URL https://doi.org/10.1145/3643509.
- [47] Udo Kaatze. Complex permittivity of water as a function of frequency and temperature. 34(4):371–374. ISSN 0021-9568, 1520-5134. doi:10.1021/je00058a001. URL https://pubs.acs.org/doi/abs/10.1021/je00058a001.
- [48] Kristian Agasøster Haaga, RomeoV, George Datseris, Julia TagBot, and tormolle. JuliaDynamics/CausalityTools.jl: V2.10.1. URL https://doi.org/10.5281/zenodo.8409495.
- Han et al. [2022] Feiyu Han, Panlong Yang, Haohua Du, and Xiang-Yang Li. Accuth: Anti-spoofing voice authentication via accelerometer. In Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pages 637–650, 2022.
- Yan et al. [2022] Dawei Yan, Yubo Yan, Panlong Yang, Wen-Zhan Song, Xiang-Yang Li, and Pengfei Liu. Real-time identification of rogue wifi connections in the wild. IEEE Internet of Things Journal, 10(7):6042–6058, 2022.