-
Survey of Graph Neural Network for Internet of Things and NextG Networks
Authors:
Sabarish Krishna Moorthy,
Jithin Jagannath
Abstract:
The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and mee…
▽ More
The exponential increase in Internet of Things (IoT) devices coupled with 6G pushing towards higher data rates and connected devices has sparked a surge in data. Consequently, harnessing the full potential of data-driven machine learning has become one of the important thrusts. In addition to the advancement in wireless technology, it is important to efficiently use the resources available and meet the users' requirements. Graph Neural Networks (GNNs) have emerged as a promising paradigm for effectively modeling and extracting insights which inherently exhibit complex network structures due to its high performance and accuracy, scalability, adaptability, and resource efficiency. There is a lack of a comprehensive survey that focuses on the applications and advances GNN has made in the context of IoT and Next Generation (NextG) networks. To bridge that gap, this survey starts by providing a detailed description of GNN's terminologies, architecture, and the different types of GNNs. Then we provide a comprehensive survey of the advancements in applying GNNs for IoT from the perspective of data fusion and intrusion detection. Thereafter, we survey the impact GNN has made in improving spectrum awareness. Next, we provide a detailed account of how GNN has been leveraged for networking and tactical systems. Through this survey, we aim to provide a comprehensive resource for researchers to learn more about GNN in the context of wireless networks, and understand its state-of-the-art use cases while contrasting to other machine learning approaches. Finally, we also discussed the challenges and wide range of future research directions to further motivate the use of GNN for IoT and NextG Networks.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Bluetooth and WiFi Dataset for Real World RF Fingerprinting of Commercial Devices
Authors:
Anu Jagannath,
Zackary Kane,
Jithin Jagannath
Abstract:
RF fingerprinting is emerging as a physical layer security scheme to identify illegitimate and/or unauthorized emitters sharing the RF spectrum. However, due to the lack of publicly accessible real-world datasets, most research focuses on generating synthetic waveforms with software-defined radios (SDRs) which are not suited for practical deployment settings. On other hand, the limited datasets th…
▽ More
RF fingerprinting is emerging as a physical layer security scheme to identify illegitimate and/or unauthorized emitters sharing the RF spectrum. However, due to the lack of publicly accessible real-world datasets, most research focuses on generating synthetic waveforms with software-defined radios (SDRs) which are not suited for practical deployment settings. On other hand, the limited datasets that are available focus only on chipsets that generate only one kind of waveform. Commercial off-the-shelf (COTS) combo chipsets that support two wireless standards (for example WiFi and Bluetooth) over a shared dual-band antenna such as those found in laptops, adapters, wireless chargers, Raspberry Pis, among others are becoming ubiquitous in the IoT realm. Hence, to keep up with the modern IoT environment, there is a pressing need for real-world open datasets capturing emissions from these combo chipsets transmitting heterogeneous communication protocols. To this end, we capture the first known emissions from the COTS IoT chipsets transmitting WiFi and Bluetooth under two different time frames. The different time frames are essential to rigorously evaluate the generalization capability of the models. To ensure widespread use, each capture within the comprehensive 72 GB dataset is long enough (40 MSamples) to support diverse input tensor lengths and formats. Finally, the dataset also comprises emissions at varying signal powers to account for the feeble to high signal strength emissions as encountered in a real-world setting.
△ Less
Submitted 17 August, 2023; v1 submitted 15 March, 2023;
originally announced March 2023.
-
Generalization of Deep Reinforcement Learning for Jammer-Resilient Frequency and Power Allocation
Authors:
Swatantra Kafle,
Jithin Jagannath,
Zackary Kane,
Noor Biswas,
Prem Sagar Vasanth Kumar,
Anu Jagannath
Abstract:
We tackle the problem of joint frequency and power allocation while emphasizing the generalization capability of a deep reinforcement learning model. Most of the existing methods solve reinforcement learning-based wireless problems for a specific pre-determined wireless network scenario. The performance of a trained agent tends to be very specific to the network and deteriorates when used in a dif…
▽ More
We tackle the problem of joint frequency and power allocation while emphasizing the generalization capability of a deep reinforcement learning model. Most of the existing methods solve reinforcement learning-based wireless problems for a specific pre-determined wireless network scenario. The performance of a trained agent tends to be very specific to the network and deteriorates when used in a different network operating scenario (e.g., different in size, neighborhood, and mobility, among others). We demonstrate our approach to enhance training to enable a higher generalization capability during inference of the deployed model in a distributed multi-agent setting in a hostile jamming environment. With all these, we show the improved training and inference performance of the proposed methods when tested on previously unseen simulated wireless networks of different sizes and architectures. More importantly, to prove practical impact, the end-to-end solution was implemented on the embedded software-defined radio and validated using over-the-air evaluation.
△ Less
Submitted 6 May, 2023; v1 submitted 4 February, 2023;
originally announced February 2023.
-
Embedding-Assisted Attentional Deep Learning for Real-World RF Fingerprinting of Bluetooth
Authors:
Anu Jagannath,
Jithin Jagannath
Abstract:
A scalable and computationally efficient framework is designed to fingerprint real-world Bluetooth devices. We propose an embedding-assisted attentional framework (Mbed-ATN) suitable for fingerprinting actual Bluetooth devices. Its generalization capability is analyzed in different settings and the effect of sample length and anti-aliasing decimation is demonstrated. The embedding module serves as…
▽ More
A scalable and computationally efficient framework is designed to fingerprint real-world Bluetooth devices. We propose an embedding-assisted attentional framework (Mbed-ATN) suitable for fingerprinting actual Bluetooth devices. Its generalization capability is analyzed in different settings and the effect of sample length and anti-aliasing decimation is demonstrated. The embedding module serves as a dimensionality reduction unit that maps the high dimensional 3D input tensor to a 1D feature vector for further processing by the ATN module. Furthermore, unlike the prior research in this field, we closely evaluate the complexity of the model and test its fingerprinting capability with real-world Bluetooth dataset collected under a different time frame and experimental setting while being trained on another. Our study reveals a 9.17x and 65.2x lesser memory usage at a sample length of 100 kS when compared to the benchmark - GRU and Oracle models respectively. Further, the proposed Mbed-ATN showcases 16.9x fewer FLOPs and 7.5x lesser trainable parameters when compared to Oracle. Finally, we show that when subject to anti-aliasing decimation and at greater input sample lengths of 1 MS, the proposed Mbed-ATN framework results in a 5.32x higher TPR, 37.9% fewer false alarms, and 6.74x higher accuracy under the challenging real-world setting.
△ Less
Submitted 19 April, 2023; v1 submitted 22 September, 2022;
originally announced October 2022.
-
RF Fingerprinting Needs Attention: Multi-task Approach for Real-World WiFi and Bluetooth
Authors:
Anu Jagannath,
Zackary Kane,
Jithin Jagannath
Abstract:
A novel cross-domain attentional multi-task architecture - xDom - for robust real-world wireless radio frequency (RF) fingerprinting is presented in this work. To the best of our knowledge, this is the first time such comprehensive attention mechanism is applied to solve RF fingerprinting problem. In this paper, we resort to real-world IoT WiFi and Bluetooth (BT) emissions (instead of synthetic wa…
▽ More
A novel cross-domain attentional multi-task architecture - xDom - for robust real-world wireless radio frequency (RF) fingerprinting is presented in this work. To the best of our knowledge, this is the first time such comprehensive attention mechanism is applied to solve RF fingerprinting problem. In this paper, we resort to real-world IoT WiFi and Bluetooth (BT) emissions (instead of synthetic waveform generation) in a rich multipath and unavoidable interference environment in an indoor experimental testbed. We show the impact of the time-frame of capture by including waveforms collected over a span of months and demonstrate the same time-frame and multiple time-frame fingerprinting evaluations. The effectiveness of resorting to a multi-task architecture is also experimentally proven by conducting single-task and multi-task model analyses. Finally, we demonstrate the significant gain in performance achieved with the proposed xDom architecture by benchmarking against a well-known state-of-the-art model for fingerprinting. Specifically, we report performance improvements by up to 59.3% and 4.91x under single-task WiFi and BT fingerprinting respectively, and up to 50.5% increase in fingerprinting accuracy under the multi-task setting.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective
Authors:
Keyvan Ramezanpour,
Jithin Jagannath,
Anu Jagannath
Abstract:
Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with low-latency and seamless connectivity. Hence, spectrum sharing systems have been considered as a major enabler for next-generation wireless networks in meeting QoE demands. While most current coexi…
▽ More
Spectrum scarcity has been a major concern for achieving the desired quality of experience (QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of mobile and IoT devices with low-latency and seamless connectivity. Hence, spectrum sharing systems have been considered as a major enabler for next-generation wireless networks in meeting QoE demands. While most current coexistence solutions and standards focus on performance improvement and QoE optimization, the emerging security challenges of such network environments have been ignored in the literature. The security framework of standalone networks (either 5G or WiFi) assumes the ownership of entire network resources from spectrum to core functions. Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise. However, coexistence network environments can lead to unprecedented security vulnerabilities and breaches as the standalone networks shall tolerate unknown and out-of-network accesses, specifically in the medium access. In this paper, for the first time in literature, we review some of the critical and emerging security vulnerabilities in the 5G/WiFi coexistence network environment which have not been observed previously in standalone networks. Specifically, independent medium access control (MAC) protocols and the resulting hidden node issues can result in exploitation such as service blocking, deployment of rogue base-stations, and eavesdrop** attacks. We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. This study opens a new direction of research in the analysis and design of a security framework that can address the unique challenges of coexistence networks.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Distributed Transmission Control for Wireless Networks using Multi-Agent Reinforcement Learning
Authors:
Collin Farquhar,
Prem Sagar Pattanshetty Vasanth Kumar,
Anu Jagannath,
Jithin Jagannath
Abstract:
We examine the problem of transmission control, i.e., when to transmit, in distributed wireless communications networks through the lens of multi-agent reinforcement learning. Most other works using reinforcement learning to control or schedule transmissions use some centralized control mechanism, whereas our approach is fully distributed. Each transmitter node is an independent reinforcement lear…
▽ More
We examine the problem of transmission control, i.e., when to transmit, in distributed wireless communications networks through the lens of multi-agent reinforcement learning. Most other works using reinforcement learning to control or schedule transmissions use some centralized control mechanism, whereas our approach is fully distributed. Each transmitter node is an independent reinforcement learning agent and does not have direct knowledge of the actions taken by other agents. We consider the case where only a subset of agents can successfully transmit at a time, so each agent must learn to act cooperatively with other agents. An agent may decide to transmit a certain number of steps into the future, but this decision is not communicated to the other agents, so it the task of the individual agents to attempt to transmit at appropriate times. We achieve this collaborative behavior through studying the effects of different actions spaces. We are agnostic to the physical layer, which makes our approach applicable to many types of networks. We submit that approaches similar to ours may be useful in other domains that use multi-agent reinforcement learning with independent agents.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined Radio
Authors:
Jithin Jagannath,
Kian Hamedani,
Collin Farquhar,
Keyvan Ramezanpour,
Anu Jagannath
Abstract:
Dynamic resource allocation plays a critical role in the next generation of intelligent wireless communication systems. Machine learning has been leveraged as a powerful tool to make strides in this domain. In most cases, the progress has been limited to simulations due to the challenging nature of hardware deployment of these solutions. In this paper, for the first time, we design and deploy deep…
▽ More
Dynamic resource allocation plays a critical role in the next generation of intelligent wireless communication systems. Machine learning has been leveraged as a powerful tool to make strides in this domain. In most cases, the progress has been limited to simulations due to the challenging nature of hardware deployment of these solutions. In this paper, for the first time, we design and deploy deep reinforcement learning (DRL)-based power control agents on the GPU embedded software defined radios (SDRs). To this end, we propose an end-to-end framework (MR-iNet Gym) where the simulation suite and the embedded SDR development work cohesively to overcome real-world implementation hurdles. To prove feasibility, we consider the problem of distributed power control for code-division multiple access (DS-CDMA)-based LPI/D transceivers. We first build a DS-CDMA ns3 module that interacts with the OpenAI Gym environment. Next, we train the power control DRL agents in this ns3-gym simulation environment in a scenario that replicates our hardware testbed. Next, for edge (embedded on-device) deployment, the trained models are optimized for real-time operation without loss of performance. Hardware-based evaluation verifies the efficiency of DRL agents over traditional distributed constrained power control (DCPC) algorithm. More significantly, as the primary goal, this is the first work that has established the feasibility of deploying DRL to provide optimized distributed resource allocation for next-generation of GPU-embedded radios.
△ Less
Submitted 9 April, 2022;
originally announced April 2022.
-
Deep neural network goes lighter: A case study of deep compression techniques on automatic RF modulation recognition for Beyond 5G networks
Authors:
Anu Jagannath,
Jithin Jagannath,
Yanzhi Wang,
Tommaso Melodia
Abstract:
Automatic RF modulation recognition is a primary signal intelligence (SIGINT) technique that serves as a physical layer authentication enabler and automated signal processing scheme for the beyond 5G and military networks. Most existing works rely on adopting deep neural network architectures to enable RF modulation recognition. The application of deep compression for the wireless domain, especial…
▽ More
Automatic RF modulation recognition is a primary signal intelligence (SIGINT) technique that serves as a physical layer authentication enabler and automated signal processing scheme for the beyond 5G and military networks. Most existing works rely on adopting deep neural network architectures to enable RF modulation recognition. The application of deep compression for the wireless domain, especially automatic RF modulation classification, is still in its infancy. Lightweight neural networks are key to sustain edge computation capability on resource-constrained platforms. In this letter, we provide an in-depth view of the state-of-the-art deep compression and acceleration techniques with an emphasis on edge deployment for beyond 5G networks. Finally, we present an extensive analysis of the representative acceleration approaches as a case study on automatic radar modulation classification and evaluate them in terms of the computational metrics.
△ Less
Submitted 9 April, 2022;
originally announced April 2022.
-
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control
Authors:
Jithin Jagannath,
Keyvan Ramezanpour,
Anu Jagannath
Abstract:
Digital twin (DT) technologies have emerged as a solution for real-time data-driven modeling of cyber physical systems (CPS) using the vast amount of data available by Internet of Things (IoT) networks. In this position paper, we elucidate unique characteristics and capabilities of a DT framework that enables realization of such promises as online learning of a physical environment, real-time moni…
▽ More
Digital twin (DT) technologies have emerged as a solution for real-time data-driven modeling of cyber physical systems (CPS) using the vast amount of data available by Internet of Things (IoT) networks. In this position paper, we elucidate unique characteristics and capabilities of a DT framework that enables realization of such promises as online learning of a physical environment, real-time monitoring of assets, Monte Carlo heuristic search for predictive prevention, on-policy, and off-policy reinforcement learning in real-time. We establish a conceptual layered architecture for a DT framework with decentralized implementation on cloud computing and enabled by artificial intelligence (AI) services for modeling, event detection, and decision-making processes. The DT framework separates the control functions, deployed as a system of logically centralized process, from the physical devices under control, much like software-defined networking (SDN) in fifth generation (5G) wireless networks. We discuss the moment of the DT framework in facilitating implementation of network-based control processes and its implications for critical infrastructure. To clarify the significance of DT in lowering the risk of development and deployment of innovative technologies on existing system, we discuss the application of implementing zero trust architecture (ZTA) as a necessary security framework in future data-driven communication networks.
△ Less
Submitted 10 April, 2022; v1 submitted 4 April, 2022;
originally announced April 2022.
-
Multi-task Learning Approach for Modulation and Wireless Signal Classification for 5G and Beyond: Edge Deployment via Model Compression
Authors:
Anu Jagannath,
Jithin Jagannath
Abstract:
Future communication networks must address the scarce spectrum to accommodate extensive growth of heterogeneous wireless devices. Wireless signal recognition is becoming increasingly more significant for spectrum monitoring, spectrum management, secure communications, among others. Consequently, comprehensive spectrum awareness on the edge has the potential to serve as a key enabler for the emergi…
▽ More
Future communication networks must address the scarce spectrum to accommodate extensive growth of heterogeneous wireless devices. Wireless signal recognition is becoming increasingly more significant for spectrum monitoring, spectrum management, secure communications, among others. Consequently, comprehensive spectrum awareness on the edge has the potential to serve as a key enabler for the emerging beyond 5G networks. State-of-the-art studies in this domain have (i) only focused on a single task - modulation or signal (protocol) classification - which in many cases is insufficient information for a system to act on, (ii) consider either radar or communication waveforms (homogeneous waveform category), and (iii) does not address edge deployment during neural network design phase. In this work, for the first time in the wireless communication domain, we exploit the potential of deep neural networks based multi-task learning (MTL) framework to simultaneously learn modulation and signal classification tasks while considering heterogeneous wireless signals such as radar and communication waveforms in the electromagnetic spectrum. The proposed MTL architecture benefits from the mutual relation between the two tasks in improving the classification accuracy as well as the learning efficiency with a lightweight neural network model. We additionally include experimental evaluations of the model with over-the-air collected samples and demonstrate first-hand insight on model compression along with deep learning pipeline for deployment on resource-constrained edge devices. We demonstrate significant computational, memory, and accuracy improvement of the proposed model over two reference architectures. In addition to modeling a lightweight MTL model suitable for resource-constrained embedded radio platforms, we provide a comprehensive heterogeneous wireless signals dataset for public use.
△ Less
Submitted 17 June, 2022; v1 submitted 26 February, 2022;
originally announced March 2022.
-
Design of Fieldable Cross-Layer Optimized Network using Embedded Software Defined Radios: Survey and Novel Architecture with Field Trials
Authors:
Jithin Jagannath,
Anu Jagannath,
Justin Henney,
Tyler Gwin,
Zackary Kane,
Noor Biswas,
Andrew Drozd
Abstract:
The proliferation of wireless devices and their ever increasing influence on our day-to-day life is very evident and seems irreplaceable. This exponential growth in demand, both in terms of the number of devices and Quality of Service (QoS) had spawned the concept of cross-layer optimization several years ago. The primary goal of the cross-layer approach was to liberate the strict boundary between…
▽ More
The proliferation of wireless devices and their ever increasing influence on our day-to-day life is very evident and seems irreplaceable. This exponential growth in demand, both in terms of the number of devices and Quality of Service (QoS) had spawned the concept of cross-layer optimization several years ago. The primary goal of the cross-layer approach was to liberate the strict boundary between the layers of the traditional Open Systems Interconnection (OSI) protocol stack. The initial decade focused on establishing the theoretical feasibility of this revolutionary concept and gauging the effectiveness and limits of this idea. During the next phase, the advent of software defined radios (SDR) accelerated the growth of this domain due to its added flexibility. Yet, there has been a ga** abyss between solutions designed in theory and ones deployed in practice. To establish this, we first present an elaborate survey of the cross-layer protocol stack literature. Next, we briefly discuss how a commercial off-the-shelf (COTS), low SWaP (Size, Weight, and Power) embedded SDR (e-SDR) was transformed into a standalone, fieldable transceiver. Thereafter, we provide the software design ethos that focuses on efficiency and flexibility such that the optimization objectives and cross-layer interactions can be reconfigured rapidly. To demonstrate our claims, we provide results from extensive outdoor over-the-air experiments in various settings with up to 10-node network topologies. The results from the field trials demonstrate high reliability, throughput, and dynamic routing capability. To the best of our knowledge, this is the first time in literature, a COTS e-SDR has been leveraged to successfully design a cross-layer optimized transceiver that is capable of forming an ad hoc network that provides high throughput and high reliability in a ruggedized, weatherized, and fieldable form factor.
△ Less
Submitted 23 January, 2022;
originally announced January 2022.
-
A Comprehensive Survey on Radio Frequency (RF) Fingerprinting: Traditional Approaches, Deep Learning, and Open Challenges
Authors:
Anu Jagannath,
Jithin Jagannath,
Prem Sagar Pattanshetty Vasanth Kumar
Abstract:
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to support disruptive applications such as extended reality (XR), augmented/virtual reality (AR/VR), industrial automation, autonomous driving, and smart everything which brings together massive and diverse IoT devices occupying the radio frequency (RF) spectrum. Along with the spectrum crunch and throughput…
▽ More
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to support disruptive applications such as extended reality (XR), augmented/virtual reality (AR/VR), industrial automation, autonomous driving, and smart everything which brings together massive and diverse IoT devices occupying the radio frequency (RF) spectrum. Along with the spectrum crunch and throughput challenges, such a massive scale of wireless devices exposes unprecedented threat surfaces. RF fingerprinting is heralded as a candidate technology that can be combined with cryptographic and zero-trust security measures to ensure data privacy, confidentiality, and integrity in wireless networks. Motivated by the relevance of this subject in the future communication networks, in this work, we present a comprehensive survey of RF fingerprinting approaches ranging from a traditional view to the most recent deep learning (DL)-based algorithms. Existing surveys have mostly focused on a constrained presentation of the wireless fingerprinting approaches, however, many aspects remain untold. In this work, however, we mitigate this by addressing every aspect - background on signal intelligence (SIGINT), applications, relevant DL algorithms, systematic literature review of RF fingerprinting techniques spanning the past two decades, discussion on datasets, and potential research avenues - necessary to elucidate this topic to the reader in an encyclopedic manner.
△ Less
Submitted 6 September, 2022; v1 submitted 3 January, 2022;
originally announced January 2022.
-
Machine Learning Subsystem for Autonomous Collision Avoidance on a small UAS with Embedded GPU
Authors:
Nicholas Polosky,
Tyler Gwin,
Sean Furman,
Parth Barhanpurkar,
Jithin Jagannath
Abstract:
Interest in unmanned aerial system (UAS) powered solutions for 6G communication networks has grown immensely with the widespread availability of machine learning based autonomy modules and embedded graphical processing units (GPUs). While these technologies have revolutionized the possibilities of UAS solutions, designing an operable, robust autonomy framework for UAS remains a multi-faceted and d…
▽ More
Interest in unmanned aerial system (UAS) powered solutions for 6G communication networks has grown immensely with the widespread availability of machine learning based autonomy modules and embedded graphical processing units (GPUs). While these technologies have revolutionized the possibilities of UAS solutions, designing an operable, robust autonomy framework for UAS remains a multi-faceted and difficult problem. In this work, we present our novel, modular framework for UAS autonomy, entitled MR-iFLY, and discuss how it may be extended to enable 6G swarm solutions. We begin by detailing the challenges associated with machine learning based UAS autonomy on resource constrained devices. Next, we describe in depth, how MR-iFLY's novel depth estimation and collision avoidance technology meets these challenges. Lastly, we describe the various evaluation criteria we have used to measure performance, show how our optimized machine vision components provide up to 15X speedup over baseline models and present a flight demonstration video of MR-iFLY's vision-based collision avoidance technology. We argue that these empirical results substantiate MR-iFLY as a candidate for use in reducing communication overhead between nodes in 6G communication swarms by providing standalone collision avoidance and navigation capabilities.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Fieldable Cross-Layer Optimized Embedded Software Defined Radio is Finally Here!
Authors:
Jithin Jagannath,
Anu Jagannath,
Justin Henney,
Noor Biswas,
Tyler Gwin,
Zackary Kane,
Andrew Drozd
Abstract:
The concept of cross-layer optimization has been around for several years now. The primary goal of the cross-layer approach was to liberate the strict boundary between the layers of the traditional OSI protocol stack. This is to enable information flow between layers which then can be leveraged to optimize the network's performance across the layers. This concept has been of keen interest for tact…
▽ More
The concept of cross-layer optimization has been around for several years now. The primary goal of the cross-layer approach was to liberate the strict boundary between the layers of the traditional OSI protocol stack. This is to enable information flow between layers which then can be leveraged to optimize the network's performance across the layers. This concept has been of keen interest for tactical application as there is an overwhelming requirement to operate in a challenging and dynamic environment. The advent of software defined radios (SDR) accelerated the growth of this domain due to the added flexibility provided by SDRs. Even with the immense interest and progress in this area of research, there has been a ga** abyss between solutions designed in theory and ones deployed in practice. To the best of our knowledge, this is the first time in literature, an embedded SDR has been leveraged to successfully design a cross-layer optimized transceiver that provides high throughput and high reliability in a ruggedized, weatherized, and fieldable form-factor. The design ethos focuses on efficiency and flexibility such that optimization objectives, cross-layer interactions can be reconfigured rapidly. To demonstrate our claims, we provide results from extensive outdoor over-the-air evaluation in various settings with up to 10-node network typologies. The results demonstrate high reliability, throughput, and dynamic routing capability achieving high technology readiness level (TRL) for tactical applications.
△ Less
Submitted 3 October, 2021;
originally announced October 2021.
-
Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Authors:
Kian Hamedani,
Lingjia Liu,
Jithin Jagannath,
Yang,
Yi
Abstract:
Smart grids are vulnerable to cyber-attacks. This paper proposes a game-theoretic approach to evaluate the variations caused by an attacker on the power measurements. Adversaries can gain financial benefits through the manipulation of the meters of smart grids. On the other hand, there is a defender that tries to maintain the accuracy of the meters. A zero-sum game is used to model the interaction…
▽ More
Smart grids are vulnerable to cyber-attacks. This paper proposes a game-theoretic approach to evaluate the variations caused by an attacker on the power measurements. Adversaries can gain financial benefits through the manipulation of the meters of smart grids. On the other hand, there is a defender that tries to maintain the accuracy of the meters. A zero-sum game is used to model the interactions between the attacker and defender. In this paper, two different defenders are used and the effectiveness of each defender in different scenarios is evaluated. Multi-layer perceptrons (MLPs) and traditional state estimators are the two defenders that are studied in this paper. The utility of the defender is also investigated in adversary-aware and adversary-unaware situations. Our simulations suggest that the utility which is gained by the adversary drops significantly when the MLP is used as the defender. It will be shown that the utility of the defender is variant in different scenarios, based on the defender that is being used. In the end, we will show that this zero-sum game does not yield a pure strategy, and the mixed strategy of the game is calculated.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Intelligent Zero Trust Architecture for 5G/6G Networks: Principles, Challenges, and the Role of Machine Learning in the context of O-RAN
Authors:
Keyvan Ramezanpour,
Jithin Jagannath
Abstract:
In this position paper, we discuss the critical need for integrating zero trust (ZT) principles into next-generation communication networks (5G/6G). We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components. While network virtualization, software-defined networking (SDN), and service-b…
▽ More
In this position paper, we discuss the critical need for integrating zero trust (ZT) principles into next-generation communication networks (5G/6G). We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components. While network virtualization, software-defined networking (SDN), and service-based architectures (SBA) are key enablers of 5G networks, operating in an untrusted environment has also become a key feature of the networks. Further, seamless connectivity to a high volume of devices has broadened the attack surface on information infrastructure. Network assurance in a dynamic untrusted environment calls for revolutionary architectures beyond existing static security frameworks. To the best of our knowledge, this is the first position paper that presents the architectural concept design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks. We introduce key ZT principles as real-time Monitoring of the security state of network assets, Evaluating the risk of individual access requests, and Deciding on access authorization using a dynamic trust algorithm, called MED components. To ensure ease of integration, the envisioned architecture adopts an SBA-based design, similar to the 3GPP specification of 5G networks, by leveraging the open radio access network (O-RAN) architecture with appropriate real-time engines and network interfaces for collecting necessary machine learning data. Therefore, this work provides novel research directions to design machine learning based components that contribute towards i-ZTA for the future 5G/6G networks.
△ Less
Submitted 27 July, 2022; v1 submitted 4 May, 2021;
originally announced May 2021.
-
Multi-task Learning Approach for Automatic Modulation and Wireless Signal Classification
Authors:
Anu Jagannath,
Jithin Jagannath
Abstract:
Wireless signal recognition is becoming increasingly more significant for spectrum monitoring, spectrum management, and secure communications. Consequently, it will become a key enabler with the emerging fifth-generation (5G) and beyond 5G communications, Internet of Things networks, among others. State-of-the-art studies in wireless signal recognition have only focused on a single task which in m…
▽ More
Wireless signal recognition is becoming increasingly more significant for spectrum monitoring, spectrum management, and secure communications. Consequently, it will become a key enabler with the emerging fifth-generation (5G) and beyond 5G communications, Internet of Things networks, among others. State-of-the-art studies in wireless signal recognition have only focused on a single task which in many cases is insufficient information for a system to act on. In this work, for the first time in the wireless communication domain, we exploit the potential of deep neural networks in conjunction with multi-task learning (MTL) framework to simultaneously learn modulation and signal classification tasks. The proposed MTL architecture benefits from the mutual relation between the two tasks in improving the classification accuracy as well as the learning efficiency with a lightweight neural network model. Additionally, we consider the problem of heterogeneous wireless signals such as radar and communication signals in the electromagnetic spectrum. Accordingly, we have shown how the proposed MTL model outperforms several state-of-the-art single-task learning classifiers while maintaining a lighter architecture and performing two signal characterization tasks simultaneously. Finally, we also release the only known open heterogeneous wireless signals dataset that comprises of radar and communication signals with multiple labels.
△ Less
Submitted 20 February, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
Deep Learning and Reinforcement Learning for Autonomous Unmanned Aerial Systems: Roadmap for Theory to Deployment
Authors:
Jithin Jagannath,
Anu Jagannath,
Sean Furman,
Tyler Gwin
Abstract:
Unmanned Aerial Systems (UAS) are being increasingly deployed for commercial, civilian, and military applications. The current UAS state-of-the-art still depends on a remote human controller with robust wireless links to perform several of these applications. The lack of autonomy restricts the domains of application and tasks for which a UAS can be deployed. Enabling autonomy and intelligence to t…
▽ More
Unmanned Aerial Systems (UAS) are being increasingly deployed for commercial, civilian, and military applications. The current UAS state-of-the-art still depends on a remote human controller with robust wireless links to perform several of these applications. The lack of autonomy restricts the domains of application and tasks for which a UAS can be deployed. Enabling autonomy and intelligence to the UAS will help overcome this hurdle and expand its use improving safety and efficiency. The exponential increase in computing resources and the availability of large amount of data in this digital era has led to the resurgence of machine learning from its last winter. Therefore, in this chapter, we discuss how some of the advances in machine learning, specifically deep learning and reinforcement learning can be leveraged to develop next-generation autonomous UAS. We first begin motivating this chapter by discussing the application, challenges, and opportunities of the current UAS in the introductory section. We then provide an overview of some of the key deep learning and reinforcement learning techniques discussed throughout this chapter. A key area of focus that will be essential to enable autonomy to UAS is computer vision. Accordingly, we discuss how deep learning approaches have been used to accomplish some of the basic tasks that contribute to providing UAS autonomy. Then we discuss how reinforcement learning is explored for using this information to provide autonomous control and navigation for UAS. Next, we provide the reader with directions to choose appropriate simulation suites and hardware platforms that will help to rapidly prototype novel machine learning based solutions for UAS. We additionally discuss the open problems and challenges pertaining to each aspect of develo** autonomous UAS solutions to shine light on potential research areas.
△ Less
Submitted 8 September, 2020; v1 submitted 7 September, 2020;
originally announced September 2020.
-
Breaking the Bound: Rate-2, Full Diversity, Orthogonal MIMO-STBC Transceiver Design
Authors:
Anu Jagannath,
Jithin Jagannath,
Andrew Drozd
Abstract:
Space Time Block Codes (STBCs) from orthogonal designs have attracted significant interest in recent years. However, with the growing demand for higher capacity schemes, the multiantenna transmission techniques must support and achieve higher symbol transmission rates. In this article, we focus on three and four transmit antenna schemes. For over two decades, STBC schemes for three and four transm…
▽ More
Space Time Block Codes (STBCs) from orthogonal designs have attracted significant interest in recent years. However, with the growing demand for higher capacity schemes, the multiantenna transmission techniques must support and achieve higher symbol transmission rates. In this article, we focus on three and four transmit antenna schemes. For over two decades, STBC schemes for three and four transmit antennas that achieve a very high symbol transmission rate while being orthogonal, fully diverse, delay-efficient, and with very low decoding complexity have not been achieved. The schemes proposed so far trades off orthogonality, delay, diversity, or decoding complexity while achieving rate or vice-versa. This work is first of its kind to solve this problem while fulfilling all the desired properties.
In this work, we carefully study the various aspects that must be considered in designing higher symbol transmission rate STBCs. The proposed designs, hereby referred to as, Jagannath schemes - for 4 x 3 and 4 x 4 configurations are orthogonal, achieve full diversity, and support a symbol transmission rate of 2 symbols/s/Hz. The design methodology follows a coding gain maximization approach. The low decoding complexity procedure to decode the proposed transmission schemes are proposed as well as extensively evaluated in simulations under diverse settings. The performance of proposed schemes are empirically compared to two state-of-the-art schemes; ACIOD and Jafarkhani. Jagannath 4 x 3 was shown to outperform ACIOD by ~12 dB while Jagannath 4 x 4 exhibited a ~7 dB superior performance in contrast to Jafarkhani at 4 bpcu. This motivates the adoption of Jagannath schemes in tactical and commercial communication systems to effectively double the throughput or to extend the
△ Less
Submitted 3 September, 2020; v1 submitted 1 May, 2020;
originally announced May 2020.
-
High Rate-Reliability Beamformer Design for 2x2 MIMO-OFDM System Under Hostile Jamming
Authors:
Anu Jagannath,
Jithin Jagannath,
Andrew Drozd
Abstract:
Multiple-input multiple-output (MIMO) systems find immense potential and applicability in the long term evolution (LTE), 5G, Internet of Things (IoT), vehicular ad hoc networks (VANETs), and tactical communication systems. Jamming poses significant communication hindrance as well as security risks to the wireless communication systems. The achievable rate and reliability are the two most compromis…
▽ More
Multiple-input multiple-output (MIMO) systems find immense potential and applicability in the long term evolution (LTE), 5G, Internet of Things (IoT), vehicular ad hoc networks (VANETs), and tactical communication systems. Jamming poses significant communication hindrance as well as security risks to the wireless communication systems. The achievable rate and reliability are the two most compromised aspects of a wireless link under such severe jamming. Owing to the high capacity and reliability of MIMO systems, they are increasingly used in tactical and critical applications. Therefore, it becomes essential to assess and enhance their sustenance under hostile jamming scenarios. To this end, we address the rate and reliability requirements of a MIMO OFDM system and propose a novel rate-reliability beamformer transceiver design for highly reliable and spectrally efficient operation under the most detrimental jamming attacks. We consider the disguised all band and multiband jamming where the jammer continuously attempts to mimic the legit transmissions. Additionally, we evaluate the rate and reliability performance under barrage jamming.
The significant contributions of the proposed rate-reliability beamformer scheme are: (i) achieves a minimum of 2 orders of magnitude better reliability in contrast to the state-of-the-art, (ii) outperforms the state-of-the-art scheme by 1.4x with regards to achievable spectral efficiency, (iii) a very low complexity (O(|Q|)) decoder is presented, and (iv) first work to evaluate the performance of state-of-the-art transmit diversity scheme under hostile jamming attacks.
△ Less
Submitted 4 May, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Redefining Wireless Communication for 6G: Signal Processing Meets Deep Learning with Deep Unfolding
Authors:
Anu Jagannath,
Jithin Jagannath,
Tommaso Melodia
Abstract:
The year 2019 witnessed the rollout of the 5G standard, which promises to offer significant data rate improvement over 4G. While 5G is still in its infancy, there has been an increased shift in the research community for communication technologies beyond 5G. The recent emergence of machine learning approaches for enhancing wireless communications and empowering them with much-desired intelligence…
▽ More
The year 2019 witnessed the rollout of the 5G standard, which promises to offer significant data rate improvement over 4G. While 5G is still in its infancy, there has been an increased shift in the research community for communication technologies beyond 5G. The recent emergence of machine learning approaches for enhancing wireless communications and empowering them with much-desired intelligence holds immense potential for redefining wireless communication for 6G. The evolving communication systems will be bottlenecked in terms of latency, throughput, and reliability by the underlying signal processing at the physical layer. In this position paper, we motivate the need to redesign iterative signal processing algorithms by leveraging deep unfolding techniques to fulfill the physical layer requirements for 6G networks. To this end, we begin by presenting the service requirements and the key challenges posed by the envisioned 6G communication architecture. We outline the deficiencies of the traditional algorithmic principles and data-hungry deep learning (DL) approaches in the context of 6G networks. Specifically, deep unfolded signal processing is presented by sketching the interplay between domain knowledge and DL. The deep unfolded approaches reviewed in this article are positioned explicitly in the context of the requirements imposed by the next generation of cellular networks. Finally, this article motivates open research challenges to truly realize hardware-efficient edge intelligence for future 6G networks.
△ Less
Submitted 23 August, 2021; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Towards Higher Spectral Efficiency: Rate-2 Full-Diversity Complex Space-Time Block Codes
Authors:
Anu Jagannath,
Jithin Jagannath,
Andrew Drozd
Abstract:
The upcoming 5G networks demand high-speed and high spectral-efficiency communications to keep up with the proliferating traffic demands. To this end, Massive multiple-input multiple-output (MIMO) techniques have gained significant traction owing to its ability to achieve these without increasing bandwidth or density of base stations. The preexisting space-time block code (STBC) designs cannot ach…
▽ More
The upcoming 5G networks demand high-speed and high spectral-efficiency communications to keep up with the proliferating traffic demands. To this end, Massive multiple-input multiple-output (MIMO) techniques have gained significant traction owing to its ability to achieve these without increasing bandwidth or density of base stations. The preexisting space-time block code (STBC) designs cannot achieve a rate of more than 1 for more than two transmit antennas while preserving the orthogonality and full diversity conditions.
In this paper, we present Jagannath codes - a novel complex modulation STBC, that achieves a very high rate of 2 for three and four transmit antennas. The presented designs achieve full diversity and overcome the previously achieved rates with the three and four antenna MIMO systems. We present a detailed account of the code construction of the proposed designs, orthogonality and full diversity analysis, transceiver model and conditional maximum likelihood (ML) decoding. In an effort to showcase the improvement achieved with the presented designs, we compare the rates and delays of some of the known STBCs with the proposed designs. The effective spectral efficiency and coding gain of the presented designs are compared to the Asymmetric Coordinate Interleaved design (ACIOD) and Jafarkhani code. We presented an effective spectral efficiency improvement by a factor of 2 with the proposed Jagannath codes. Owing to the full diversity of the presented designs, we demonstrate significant coding gains (6 dB and 12 dB) with the proposed designs.
△ Less
Submitted 3 August, 2019; v1 submitted 22 July, 2019;
originally announced July 2019.
-
VL-ROUTE: A Cross-Layer Routing Protocol for Visible Light Ad Hoc Network
Authors:
Jithin Jagannath,
Tommaso Melodia
Abstract:
Visible Light Ad Hoc Networks (LANETs) is being perceived as an emerging technology to complement Radio Frequency (RF) based ad hoc networks to reduce congestion in the overloaded RF spectrum. LANET is intended to support scenarios requiring dense deployment and high data rates. In Visible Light Communication (VLC), most of the attention has been centered around physical layer with emphasis on poi…
▽ More
Visible Light Ad Hoc Networks (LANETs) is being perceived as an emerging technology to complement Radio Frequency (RF) based ad hoc networks to reduce congestion in the overloaded RF spectrum. LANET is intended to support scenarios requiring dense deployment and high data rates. In Visible Light Communication (VLC), most of the attention has been centered around physical layer with emphasis on point-to-point communication. In this work, we focus on designing a routing protocol specifically to overcome the unique challenges like blockage and deafness that render routes in LANETs highly unstable. Therefore, we propose a cross-layer optimized routing protocol (VL-ROUTE) that interacts closely with the Medium Access Control (MAC) layer to maximize the throughput of the network by taking into account the reliability of routes.
To accomplish this in a distributed manner, we carefully formulate a Route Reliability Score (RRS) that can be computed by each node in the network using just the information gathered from its immediate neighbors. Each node computes an RRS for every known sink in the network. RRS of a given node can be considered as an estimate of the probability of reaching a given sink via that node. The RSS value is then integrated to the utility based three-way handshake process used by the MAC protocol (VL-MAC) to mitigate the effects of deafness, blockage, hidden node, and maximize the probability of establishing full-duplex links. All these factors contribute towards maximizing the network throughput. Extensive simulation of VL-ROUTE shows 124% improvement in network throughput over a network that uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) along with shortest path routing. Additionally, VL-ROUTE also showed up to 21% improvement in throughput over the network that uses VL-MAC along with a geographic routing.
△ Less
Submitted 10 April, 2019;
originally announced April 2019.
-
HELPER: Heterogeneous Efficient Low Power Radio for Enabling Ad Hoc Emergency Public Safety Networks
Authors:
Jithin Jagannath,
Sean Furman,
Anu Jagannath,
Luther Ling,
Andrew Burger,
Andrew Drozd
Abstract:
Natural and man-made disasters have been causing destruction and distress to humanity all over the world. In these scenarios, communication infrastructures are the most affected entities making emergency response operations extremely challenging. This invokes a need to equip the affected people and the emergency responders with the ability to rapidly set up and use independent means of communicati…
▽ More
Natural and man-made disasters have been causing destruction and distress to humanity all over the world. In these scenarios, communication infrastructures are the most affected entities making emergency response operations extremely challenging. This invokes a need to equip the affected people and the emergency responders with the ability to rapidly set up and use independent means of communication. Therefore, in this work, we present a complete end-to-end solution that can connect survivors of a disaster with each other and the authorities using a completely self-sufficient ad hoc network that can be setup rapidly. Accordingly, we develop a Heterogeneous Efficient Low Power Radio (HELPER) that acts as an access point for end-users to connect using custom website application. These HELPERs then coordinate with each other to form a LoRa based ad hoc network. To this end, we propose a novel cross-layer optimized distributed energy-efficient routing (SEEK) algorithm that aims to maximize the network lifetime. The HELPER is prototyped using WiFi enabled Raspberry Pi and LoRa module that is configured to run using Li-ion batteries. We implement the required cross-layer protocol stack along with the SEEK routing algorithm. We have conducted demonstrations to establish the feasibility of exchanging of text messages over the HELPER network, live map updates, ability to send distress messages to authorities. Emergency responders can leverage this technology to remotely monitor the connectivity of the affected area and alert users of imminent dangers. SEEK algorithm was shown to outperform a greedy geographical routing algorithm implemented on HELPER testbed by up to 53 % in terms of network lifetime and up to 28 % in terms of throughput. Overall, we hope this technology will become instrumental in improving the efficiency and effectiveness of public safety activities.
△ Less
Submitted 21 March, 2019;
originally announced March 2019.
-
Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey
Authors:
Jithin Jagannath,
Nicholas Polosky,
Anu Jagannath,
Francesco Restuccia,
Tommaso Melodia
Abstract:
The Internet of Things (IoT) is expected to require more effective and efficient wireless communications than ever before. For this reason, techniques such as spectrum sharing, dynamic spectrum access, extraction of signal intelligence and optimized routing will soon become essential components of the IoT wireless communication paradigm. Given that the majority of the IoT will be composed of tiny,…
▽ More
The Internet of Things (IoT) is expected to require more effective and efficient wireless communications than ever before. For this reason, techniques such as spectrum sharing, dynamic spectrum access, extraction of signal intelligence and optimized routing will soon become essential components of the IoT wireless communication paradigm. Given that the majority of the IoT will be composed of tiny, mobile, and energy-constrained devices, traditional techniques based on a priori network optimization may not be suitable, since (i) an accurate model of the environment may not be readily available in practical scenarios; (ii) the computational requirements of traditional optimization techniques may prove unbearable for IoT devices. To address the above challenges, much research has been devoted to exploring the use of machine learning to address problems in the IoT wireless communications domain.
This work provides a comprehensive survey of the state of the art in the application of machine learning techniques to address key problems in IoT wireless communications with an emphasis on its ad hoc networking aspect. First, we present extensive background notions of machine learning techniques. Then, by adopting a bottom-up approach, we examine existing work on machine learning for the IoT at the physical, data-link and network layer of the protocol stack. Thereafter, we discuss directions taken by the community towards hardware implementation to ensure the feasibility of these techniques. Additionally, before concluding, we also provide a brief discussion of the application of machine learning in IoT beyond wireless communication. Finally, each of these discussions is accompanied by a detailed analysis of the related open problems and challenges.
△ Less
Submitted 18 July, 2019; v1 submitted 23 January, 2019;
originally announced January 2019.