-
Binary Spatial Random Field Reconstruction from Non-Gaussian Inhomogeneous Time-series Observations
Authors:
Shunan Sheng,
Qikun Xiang,
Ido Nevat,
Ariel Neufeld
Abstract:
We develop a new model for spatial random field reconstruction of a binary-valued spatial phenomenon. In our model, sensors are deployed in a wireless sensor network across a large geographical region. Each sensor measures a non-Gaussian inhomogeneous temporal process which depends on the spatial phenomenon. Two types of sensors are employed: one collects point observations at specific time points…
▽ More
We develop a new model for spatial random field reconstruction of a binary-valued spatial phenomenon. In our model, sensors are deployed in a wireless sensor network across a large geographical region. Each sensor measures a non-Gaussian inhomogeneous temporal process which depends on the spatial phenomenon. Two types of sensors are employed: one collects point observations at specific time points, while the other collects integral observations over time intervals. Subsequently, the sensors transmit these time-series observations to a Fusion Center (FC), and the FC infers the spatial phenomenon from these observations. We show that the resulting posterior predictive distribution is intractable and develop a tractable two-step procedure to perform inference. Firstly, we develop algorithms to perform approximate Likelihood Ratio Tests on the time-series observations, compressing them to a single bit for both point sensors and integral sensors. Secondly, once the compressed observations are transmitted to the FC, we utilize a Spatial Best Linear Unbiased Estimator (S-BLUE) to reconstruct the binary spatial random field at any desired spatial location. The performance of the proposed approach is studied using simulation. We further illustrate the effectiveness of our method using a weather dataset from the National Environment Agency (NEA) of Singapore with fields including temperature and relative humidity.
△ Less
Submitted 11 December, 2023; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Cost-aware Feature Selection for IoT Device Classification
Authors:
Biswadeep Chakraborty,
Dinil Mon Divakaran,
Ido Nevat,
Gareth W. Peters,
Mohan Gurusamy
Abstract:
Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices, with promising results. However, existing works have assumed that the features used for building the machine learning models are readily available or…
▽ More
Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices, with promising results. However, existing works have assumed that the features used for building the machine learning models are readily available or can be easily extracted from the network traffic; in other words, they do not consider the costs associated with feature extraction. In this work, we take a more realistic approach, and argue that feature extraction has a cost, and the costs are different for different features. We also take a step forward from the current practice of considering the misclassification loss as a binary value, and make a case for different losses based on the misclassification performance. Thereby, and more importantly, we introduce the notion of risk for IoT device classification. We define and formulate the problem of cost-aware IoT device classification. This being a combinatorial optimization problem, we develop a novel algorithm to solve it in a fast and effective way using the Cross-Entropy (CE) based stochastic optimization technique. Using traffic of real devices, we demonstrate the capability of the CE based algorithm in selecting features with minimal risk of misclassification while kee** the cost for feature extraction within a specified limit.
△ Less
Submitted 21 April, 2021; v1 submitted 2 September, 2020;
originally announced September 2020.
-
Geo-spatial Location Spoofing Detection for Internet of Things
Authors:
**g Yang Koh,
Ido Nevat,
Derek Leong,
Wai-Choong Wong
Abstract:
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called Enhanced Location Spoofing Detection using Audibility (ELSA) which can be implemented at the backend server without modifying existing legacy IoT systems. ELSA is based on a statistical decision theory framework and uses two-way time-of-arrival (TW-TOA)…
▽ More
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called Enhanced Location Spoofing Detection using Audibility (ELSA) which can be implemented at the backend server without modifying existing legacy IoT systems. ELSA is based on a statistical decision theory framework and uses two-way time-of-arrival (TW-TOA) information between the user's device and the anchors. In addition to the TW-TOA information, ELSA exploits the implicit available audibility information to improve detection rates of location spoofing attacks. Given TW-TOA and audibility information, we derive the decision rule for the verification of the device's location, based on the generalized likelihood ratio test. We develop a practical threat model for delay measurements spoofing scenarios, and investigate in detail the performance of ELSA in terms of detection and false alarm rates. Our extensive simulation results on both synthetic and real-world datasets demonstrate the superior performance of ELSA compared to conventional non-audibility-aware approaches.
△ Less
Submitted 28 March, 2017; v1 submitted 17 February, 2016;
originally announced February 2016.
-
New Perspectives on Multiple Source Localization in Wireless Sensor Networks
Authors:
Thi Le Thu Nguyen,
Francois Septier,
Harizo Rajaona,
Gareth W. Peters,
Ido Nevat,
Yves Delignon
Abstract:
In this paper we address the challenging problem of multiple source localization in Wireless Sensor Networks (WSN). We develop an efficient statistical algorithm, based on the novel application of Sequential Monte Carlo (SMC) sampler methodology, that is able to deal with an unknown number of sources given quantized data obtained at the fusion center from different sensors with imperfect wireless…
▽ More
In this paper we address the challenging problem of multiple source localization in Wireless Sensor Networks (WSN). We develop an efficient statistical algorithm, based on the novel application of Sequential Monte Carlo (SMC) sampler methodology, that is able to deal with an unknown number of sources given quantized data obtained at the fusion center from different sensors with imperfect wireless channels. We also derive the Posterior Cramér-Rao Bound (PCRB) of the source location estimate. The PCRB is used to analyze the accuracy of the proposed SMC sampler algorithm and the impact that quantization has on the accuracy of location estimates of the sources. Extensive experiments show that the benefits of the proposed scheme in terms of the accuracy of the estimation method that are required for model selection (i.e., the number of sources) and the estimation of the source characteristics compared to the classical importance sampling method.
△ Less
Submitted 22 April, 2015;
originally announced April 2015.
-
Location Verification Systems for VANETs in Rician Fading Channels
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
In this work we propose and examine Location Verification Systems (LVSs) for Vehicular Ad Hoc Networks (VANETs) in the realistic setting of Rician fading channels. In our LVSs, a single authorized Base Station (BS) equipped with multiple antennas aims to detect a malicious vehicle that is spoofing its claimed location. We first determine the optimal attack strategy of the malicious vehicle, which…
▽ More
In this work we propose and examine Location Verification Systems (LVSs) for Vehicular Ad Hoc Networks (VANETs) in the realistic setting of Rician fading channels. In our LVSs, a single authorized Base Station (BS) equipped with multiple antennas aims to detect a malicious vehicle that is spoofing its claimed location. We first determine the optimal attack strategy of the malicious vehicle, which in turn allows us to analyze the optimal LVS performance as a function of the Rician $K$-factor of the channel between the BS and a legitimate vehicle. Our analysis also allows us to formally prove that the LVS performance limit is independent of the properties of the channel between the BS and the malicious vehicle, provided the malicious vehicle's antenna number is above a specified value. We also investigate how tracking information on a vehicle quantitatively improves the detection performance of an LVS, showing how optimal performance is obtained under the assumption of the tracking length being randomly selected. The work presented here can be readily extended to multiple BS scenarios, and therefore forms the foundation for all optimal location authentication schemes within the context of Rician fading channels. Our study closes important gaps in the current understanding of LVS performance within the context of VANETs, and will be of practical value to certificate revocation schemes within IEEE 1609.2.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Location Verification Systems Under Spatially Correlated Shadowing
Authors:
Shihao Yan,
Ido Nevat,
Gareth W. Peters,
Robert Malaney
Abstract:
The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramat…
▽ More
The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramatic performance improvement of a Received Signal Strength (RSS)-based LVS. We also analyze the performance of an LVS that utilizes Differential Received Signal Strength (DRSS), formally proving the rather counter-intuitive result that a DRSS-based LVS has identical performance to that of an RSS-based LVS, for all levels of correlated shadowing. Even more surprisingly, the identical performance of RSS and DRSS-based LVSs is found to hold even when the adversary does not optimize his true location. Only in the case where the adversary does not optimize all variables under her control, do we find the performance of an RSS-based LVS to be better than a DRSS-based LVS. The results reported here are important for a wide range of emerging wireless communication applications whose proper functioning depends on the authenticity of the location information reported by a transceiver.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.
-
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels. In the LSDS, an authorized Base Station (BS) equipped with multiple antennas utilizes channel observations to identify a malicious vehicle, also equipped with multiple antennas, that is spoofing its location. After deriving the optimal tr…
▽ More
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels. In the LSDS, an authorized Base Station (BS) equipped with multiple antennas utilizes channel observations to identify a malicious vehicle, also equipped with multiple antennas, that is spoofing its location. After deriving the optimal transmit power and the optimal directional beamformer of a potentially malicious vehicle, robust theoretical analysis and detailed simulations are conducted in order to determine the impact of key system parameters on the LSDS performance. Our analysis shows how LSDS performance increases as the Rician K-factor of the channel between the BS and legitimate vehicles increases, or as the number of antennas at the BS or legitimate vehicle increases. We also obtain the counter-intuitive result that the malicious vehicle's optimal number of antennas conditioned on its optimal directional beamformer is equal to the legitimate vehicle's number of antennas. The results we provide here are important for the verification of location information reported in IEEE 1609.2 safety messages.
△ Less
Submitted 21 October, 2014; v1 submitted 11 October, 2014;
originally announced October 2014.
-
A Ruin Theoretic Design Approach for Wireless Cellular Network Sharing with Facilities
Authors:
Malcolm Egan,
Gareth W. Peters,
Ido Nevat,
Iain B. Collings
Abstract:
With the rise of cheap small-cells in wireless cellular networks, there are new opportunities for third party providers to service local regions via sharing arrangements with traditional operators. In fact, such arrangements are highly desirable for large facilities---such as stadiums, universities, and mines---as they already need to cover property costs, and often have fibre backhaul and efficie…
▽ More
With the rise of cheap small-cells in wireless cellular networks, there are new opportunities for third party providers to service local regions via sharing arrangements with traditional operators. In fact, such arrangements are highly desirable for large facilities---such as stadiums, universities, and mines---as they already need to cover property costs, and often have fibre backhaul and efficient power infrastructure. In this paper, we propose a new network sharing arrangement between large facilities and traditional operators. Our facility network sharing arrangement consists of two aspects: leasing of core network access and spectrum from traditional operators; and service agreements with users. Importantly, our incorporation of a user service agreement into the arrangement means that resource allocation must account for financial as well as physical resource constraints. This introduces a new non-trivial dimension into wireless network resource allocation, which requires a new evaluation framework---the data rate is no longer the only main performance metric. Moreover, despite clear economic incentives to adopt network sharing for facilities, a business case is lacking. As such, we develop a general socio-technical evaluation framework based on ruin-theory, where the key metric for the sharing arrangement is the probability that the facility has less than zero revenue surplus. We then use our framework to evaluate our facility network sharing arrangement, which offers guidance for leasing and service agreement negotiations, as well as design of the wireless network architecture, taking into account network revenue streams.
△ Less
Submitted 25 May, 2015; v1 submitted 14 September, 2014;
originally announced September 2014.
-
Optimal Information-Theoretic Wireless Location Verification
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification o…
▽ More
We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification of the user's location. Our algorithm is optimal in the sense of maximizing the mutual information between its input and output data. Our approach is based on the practical scenario in which a non-colluding malicious user some distance from a highway optimally boosts his transmit power in an attempt to fool the LVS that he is on the highway. We develop a practical threat model for this attack scenario, and investigate in detail the performance of the LVS in terms of its input/output mutual information. We show how our LVS decision rule can be implemented straightforwardly with a performance that delivers near-optimality under realistic threat conditions, with information-theoretic optimality approached as the malicious user moves further from the highway. The practical advantages our new information-theoretic scheme delivers relative to more traditional Bayesian verification frameworks are discussed.
△ Less
Submitted 24 June, 2013; v1 submitted 4 November, 2012;
originally announced November 2012.
-
An Information Theoretic Location Verification System for Wireless Networks
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual infor…
▽ More
As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, where verification of location information is of paramount importance.
△ Less
Submitted 20 April, 2012;
originally announced April 2012.
-
System Identification in Wireless Relay Networks via Gaussian Process
Authors:
Gareth W. Peters,
Ido Nevat,
**hong Yuan,
Ian B. Collings
Abstract:
We present a flexible stochastic model for a class of cooperative wireless relay networks, in which the relay processing functionality is not known at the destination. In addressing this problem we develop efficient algorithms to perform relay identification in a wireless relay network. We first construct a statistical model based on a representation of the system using Gaussian Processes in a non…
▽ More
We present a flexible stochastic model for a class of cooperative wireless relay networks, in which the relay processing functionality is not known at the destination. In addressing this problem we develop efficient algorithms to perform relay identification in a wireless relay network. We first construct a statistical model based on a representation of the system using Gaussian Processes in a non-standard manner due to the way we treat the imperfect channel state information. We then formulate the estimation problem to perform system identification, taking into account complexity and computational efficiency. Next we develop a set of three algorithms to solve the identification problem each of decreasing complexity, trading-off the estimation bias for computational efficiency. The joint optimisation problem is tackled via a Bayesian framework using the Iterated Conditioning on the Modes methodology. We develop a lower bound and several sub-optimal computationally efficient solutions to the identification problem, for comparison. We illustrate the estimation performance of our methodology for a range of widely used relay functionalities. The relative total error attained by our algorithm when compared to the lower bound is found to be at worst 9% for low SNR values under all functions considered. The effect of the relay functional estimation error is also studied via BER simulations and is shown to be less than 2dB worse than the lower bound.
△ Less
Submitted 17 January, 2012; v1 submitted 17 June, 2011;
originally announced June 2011.
-
Cooperative Spectrum Sensing for Amplify-and-Forward Cognitive Networks
Authors:
Ido Nevat,
Gareth W. Peters,
**hong Yuan,
Iain Collings
Abstract:
We develop a framework for spectrum sensing in cooperative amplify-and-forward cognitive radio networks. We consider a stochastic model where relays are assigned in cognitive radio networks to transmit the primary user's signal to a cognitive Secondary Base Station (SBS). We develop the Bayesian optimal decision rule under various scenarios of Channel State Information (CSI) varying from perfect t…
▽ More
We develop a framework for spectrum sensing in cooperative amplify-and-forward cognitive radio networks. We consider a stochastic model where relays are assigned in cognitive radio networks to transmit the primary user's signal to a cognitive Secondary Base Station (SBS). We develop the Bayesian optimal decision rule under various scenarios of Channel State Information (CSI) varying from perfect to imperfect CSI. In order to obtain the optimal decision rule based on a Likelihood Ratio Test (LRT), the marginal likelihood under each hypothesis relating to presence or absence of transmission needs to be evaluated pointwise. However, in some cases the evaluation of the LRT can not be performed analytically due to the intractability of the multi-dimensional integrals involved. In other cases, the distribution of the test statistic can not be obtained exactly. To circumvent these difficulties we design two algorithms to approximate the marginal likelihood, and obtain the decision rule. The first is based on Gaussian Approximation where we quantify the accuracy of the approximation via a multivariate version of the Berry-Esseen bound. The second algorithm is based on Laplace approximation for the marginal likelihood, which results in a non-convex optimisation problem which is solved efficiently via Bayesian Expectation-Maximisation method. We also utilise a Laguerre series expansion to approximate the distribution of the test statistic in cases where its distribution can not be derived exactly. Performance is evaluated via analytic bounds and compared to numerical simulations.
△ Less
Submitted 31 October, 2011; v1 submitted 12 April, 2011;
originally announced April 2011.
-
Gaussian Process Techniques for Wireless Communications
Authors:
Mr. Chong Han,
Dr. Ido Nevat,
Dr. Gareth Peters,
Prof. **hong Yuan
Abstract:
Bayesian filtering is a general framework for recursively estimating the state of a dynamical system. Classical solutions such that Kalman filter and Particle filter are introduced in this report. Gaussian processes have been introduced as a non-parametric technique for system estimation from supervision learning. For the thesis project, we intend to propose a new, general methodology for inferenc…
▽ More
Bayesian filtering is a general framework for recursively estimating the state of a dynamical system. Classical solutions such that Kalman filter and Particle filter are introduced in this report. Gaussian processes have been introduced as a non-parametric technique for system estimation from supervision learning. For the thesis project, we intend to propose a new, general methodology for inference and learning in non-linear state-space models probabilistically incorporating with the Gaussian process model estimation.
△ Less
Submitted 2 November, 2010;
originally announced November 2010.
-
Blind Spectrum Sensing in Cognitive Radio over Fading Channels and Frequency Offsets
Authors:
Ido Nevat,
Gareth W. Peters,
**hong Yuan
Abstract:
This paper deals with the challenging problem of spectrum sensing in cognitive radio. We consider a stochastic system model where the the Primary User (PU) transmits a periodic signal over fading channels. The effect of frequency offsets due to oscillator mismatch, and Doppler offset is studied. We show that for this case the Likelihood Ratio Test (LRT) cannot be evaluated poitnwise. We present a…
▽ More
This paper deals with the challenging problem of spectrum sensing in cognitive radio. We consider a stochastic system model where the the Primary User (PU) transmits a periodic signal over fading channels. The effect of frequency offsets due to oscillator mismatch, and Doppler offset is studied. We show that for this case the Likelihood Ratio Test (LRT) cannot be evaluated poitnwise. We present a novel approach to approximate the marginilisation of the frequency offset using a single point estimate. This is obtained via a low complexity Constrained Adaptive Notch Filter (CANF) to estimate the frequency offset. Performance is evaluated via numerical simulations and it is shown that the proposed spectrum sensing scheme can achieve the same performance as the near-optimal scheme, that is based on a bank of matched filters, using only a fraction of the complexity required.
△ Less
Submitted 15 February, 2011; v1 submitted 16 June, 2010;
originally announced June 2010.
-
Spectrum Sensing in Cooperative Cognitive Radio Networks with Partial CSI
Authors:
Chong Han,
Ido Nevat,
**hong Yuan
Abstract:
We develop an efficient algorithm for cooperative spectrum sensing in a relay based cognitive radio network. We consider a stochastic model where data is sent from the Base Station (BS) of the Primary User (PU). The data is relayed by the Secondary Users (SU) to the SU BS. The SU BS has only partial CSI knowledge of the wireless channels. In order to obtain the optimal decision rule based on Likel…
▽ More
We develop an efficient algorithm for cooperative spectrum sensing in a relay based cognitive radio network. We consider a stochastic model where data is sent from the Base Station (BS) of the Primary User (PU). The data is relayed by the Secondary Users (SU) to the SU BS. The SU BS has only partial CSI knowledge of the wireless channels. In order to obtain the optimal decision rule based on Likelihood Ratio Test (LRT), the marginal likelihood under each hypothesis needs to be evaluated pointwise. These, however, cannot be obtained analytically due to the intractability of the integrals. Instead, we approximate these quantities by utilising the Laplace method. Performance is evaluated via numerical simulations and it is shown that the proposed spectrum sensing scheme can achieve superior results to the energy detection scheme.
△ Less
Submitted 28 October, 2011; v1 submitted 16 June, 2010;
originally announced June 2010.
-
Channel Tracking for Relay Networks via Adaptive Particle MCMC
Authors:
Ido Nevat,
Gareth W. Peters,
Arnaud Doucet,
**hong Yuan
Abstract:
This paper presents a new approach for channel tracking and parameter estimation in cooperative wireless relay networks. We consider a system with multiple relay nodes operating under an amplify and forward relay function. We develop a novel algorithm to efficiently solve the challenging problem of joint channel tracking and parameters estimation of the Jakes' system model within a mobile wireless…
▽ More
This paper presents a new approach for channel tracking and parameter estimation in cooperative wireless relay networks. We consider a system with multiple relay nodes operating under an amplify and forward relay function. We develop a novel algorithm to efficiently solve the challenging problem of joint channel tracking and parameters estimation of the Jakes' system model within a mobile wireless relay network. This is based on \textit{particle Markov chain Monte Carlo} (PMCMC) method. In particular, it first involves develo** a Bayesian state space model, then estimating the associated high dimensional posterior using an adaptive Markov chain Monte Carlo (MCMC) sampler relying on a proposal built using a Rao-Blackwellised Sequential Monte Carlo (SMC) filter.
△ Less
Submitted 23 November, 2010; v1 submitted 16 June, 2010;
originally announced June 2010.