-
Signature Isolation Forest
Authors:
Guillaume Staerman,
Marta Campi,
Gareth W. Peters
Abstract:
Functional Isolation Forest (FIF) is a recent state-of-the-art Anomaly Detection (AD) algorithm designed for functional data. It relies on a tree partition procedure where an abnormality score is computed by projecting each curve observation on a drawn dictionary through a linear inner product. Such linear inner product and the dictionary are a priori choices that highly influence the algorithm's…
▽ More
Functional Isolation Forest (FIF) is a recent state-of-the-art Anomaly Detection (AD) algorithm designed for functional data. It relies on a tree partition procedure where an abnormality score is computed by projecting each curve observation on a drawn dictionary through a linear inner product. Such linear inner product and the dictionary are a priori choices that highly influence the algorithm's performances and might lead to unreliable results, particularly with complex datasets. This work addresses these challenges by introducing \textit{Signature Isolation Forest}, a novel AD algorithm class leveraging the rough path theory's signature transform. Our objective is to remove the constraints imposed by FIF through the proposition of two algorithms which specifically target the linearity of the FIF inner product and the choice of the dictionary. We provide several numerical experiments, including a real-world applications benchmark showing the relevance of our methods.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Cost-aware Feature Selection for IoT Device Classification
Authors:
Biswadeep Chakraborty,
Dinil Mon Divakaran,
Ido Nevat,
Gareth W. Peters,
Mohan Gurusamy
Abstract:
Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices, with promising results. However, existing works have assumed that the features used for building the machine learning models are readily available or…
▽ More
Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices, with promising results. However, existing works have assumed that the features used for building the machine learning models are readily available or can be easily extracted from the network traffic; in other words, they do not consider the costs associated with feature extraction. In this work, we take a more realistic approach, and argue that feature extraction has a cost, and the costs are different for different features. We also take a step forward from the current practice of considering the misclassification loss as a binary value, and make a case for different losses based on the misclassification performance. Thereby, and more importantly, we introduce the notion of risk for IoT device classification. We define and formulate the problem of cost-aware IoT device classification. This being a combinatorial optimization problem, we develop a novel algorithm to solve it in a fast and effective way using the Cross-Entropy (CE) based stochastic optimization technique. Using traffic of real devices, we demonstrate the capability of the CE based algorithm in selecting features with minimal risk of misclassification while kee** the cost for feature extraction within a specified limit.
△ Less
Submitted 21 April, 2021; v1 submitted 2 September, 2020;
originally announced September 2020.
-
Understanding Modern Banking Ledgers through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money
Authors:
Gareth William Peters,
Efstathios Panayi
Abstract:
In this chapter we provide an overview of the concept of blockchain technology and its potential to disrupt the world of banking through facilitating global money remittance, smart contracts, automated banking ledgers and digital assets. In this regard, we first provide a brief overview of the core aspects of this technology, as well as the second-generation contract-based developments. From there…
▽ More
In this chapter we provide an overview of the concept of blockchain technology and its potential to disrupt the world of banking through facilitating global money remittance, smart contracts, automated banking ledgers and digital assets. In this regard, we first provide a brief overview of the core aspects of this technology, as well as the second-generation contract-based developments. From there we discuss key issues that must be considered in develo** such ledger based technologies in a banking context.
△ Less
Submitted 18 November, 2015;
originally announced November 2015.
-
Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective
Authors:
Gareth W. Peters,
Efstathios Panayi,
Ariane Chapelle
Abstract:
The internet era has generated a requirement for low cost, anonymous and rapidly verifiable transactions to be used for online barter, and fast settling money have emerged as a consequence. For the most part, e-money has fulfilled this role, but the last few years have seen two new types of money emerge. Centralised virtual currencies, usually for the purpose of transacting in social and gaming ec…
▽ More
The internet era has generated a requirement for low cost, anonymous and rapidly verifiable transactions to be used for online barter, and fast settling money have emerged as a consequence. For the most part, e-money has fulfilled this role, but the last few years have seen two new types of money emerge. Centralised virtual currencies, usually for the purpose of transacting in social and gaming economies, and crypto-currencies, which aim to eliminate the need for financial intermediaries by offering direct peer-to-peer online payments.
We describe the historical context which led to the development of these currencies and some modern and recent trends in their uptake, in terms of both usage in the real economy and as investment products. As these currencies are purely digital constructs, with no government or local authority backing, we then discuss them in the context of monetary theory, in order to determine how they may be have value under each. Finally, we provide an overview of the state of regulatory readiness in terms of dealing with transactions in these currencies in various regions of the world.
△ Less
Submitted 18 August, 2015;
originally announced August 2015.
-
New Perspectives on Multiple Source Localization in Wireless Sensor Networks
Authors:
Thi Le Thu Nguyen,
Francois Septier,
Harizo Rajaona,
Gareth W. Peters,
Ido Nevat,
Yves Delignon
Abstract:
In this paper we address the challenging problem of multiple source localization in Wireless Sensor Networks (WSN). We develop an efficient statistical algorithm, based on the novel application of Sequential Monte Carlo (SMC) sampler methodology, that is able to deal with an unknown number of sources given quantized data obtained at the fusion center from different sensors with imperfect wireless…
▽ More
In this paper we address the challenging problem of multiple source localization in Wireless Sensor Networks (WSN). We develop an efficient statistical algorithm, based on the novel application of Sequential Monte Carlo (SMC) sampler methodology, that is able to deal with an unknown number of sources given quantized data obtained at the fusion center from different sensors with imperfect wireless channels. We also derive the Posterior Cramér-Rao Bound (PCRB) of the source location estimate. The PCRB is used to analyze the accuracy of the proposed SMC sampler algorithm and the impact that quantization has on the accuracy of location estimates of the sources. Extensive experiments show that the benefits of the proposed scheme in terms of the accuracy of the estimation method that are required for model selection (i.e., the number of sources) and the estimation of the source characteristics compared to the classical importance sampling method.
△ Less
Submitted 22 April, 2015;
originally announced April 2015.
-
Location Verification Systems for VANETs in Rician Fading Channels
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
In this work we propose and examine Location Verification Systems (LVSs) for Vehicular Ad Hoc Networks (VANETs) in the realistic setting of Rician fading channels. In our LVSs, a single authorized Base Station (BS) equipped with multiple antennas aims to detect a malicious vehicle that is spoofing its claimed location. We first determine the optimal attack strategy of the malicious vehicle, which…
▽ More
In this work we propose and examine Location Verification Systems (LVSs) for Vehicular Ad Hoc Networks (VANETs) in the realistic setting of Rician fading channels. In our LVSs, a single authorized Base Station (BS) equipped with multiple antennas aims to detect a malicious vehicle that is spoofing its claimed location. We first determine the optimal attack strategy of the malicious vehicle, which in turn allows us to analyze the optimal LVS performance as a function of the Rician $K$-factor of the channel between the BS and a legitimate vehicle. Our analysis also allows us to formally prove that the LVS performance limit is independent of the properties of the channel between the BS and the malicious vehicle, provided the malicious vehicle's antenna number is above a specified value. We also investigate how tracking information on a vehicle quantitatively improves the detection performance of an LVS, showing how optimal performance is obtained under the assumption of the tracking length being randomly selected. The work presented here can be readily extended to multiple BS scenarios, and therefore forms the foundation for all optimal location authentication schemes within the context of Rician fading channels. Our study closes important gaps in the current understanding of LVS performance within the context of VANETs, and will be of practical value to certificate revocation schemes within IEEE 1609.2.
△ Less
Submitted 8 December, 2014;
originally announced December 2014.
-
Location Verification Systems Under Spatially Correlated Shadowing
Authors:
Shihao Yan,
Ido Nevat,
Gareth W. Peters,
Robert Malaney
Abstract:
The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramat…
▽ More
The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work we formally analyze, for the first time, the performance of a wireless Location Verification System (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramatic performance improvement of a Received Signal Strength (RSS)-based LVS. We also analyze the performance of an LVS that utilizes Differential Received Signal Strength (DRSS), formally proving the rather counter-intuitive result that a DRSS-based LVS has identical performance to that of an RSS-based LVS, for all levels of correlated shadowing. Even more surprisingly, the identical performance of RSS and DRSS-based LVSs is found to hold even when the adversary does not optimize his true location. Only in the case where the adversary does not optimize all variables under her control, do we find the performance of an RSS-based LVS to be better than a DRSS-based LVS. The results reported here are important for a wide range of emerging wireless communication applications whose proper functioning depends on the authenticity of the location information reported by a transceiver.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.
-
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels. In the LSDS, an authorized Base Station (BS) equipped with multiple antennas utilizes channel observations to identify a malicious vehicle, also equipped with multiple antennas, that is spoofing its location. After deriving the optimal tr…
▽ More
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels. In the LSDS, an authorized Base Station (BS) equipped with multiple antennas utilizes channel observations to identify a malicious vehicle, also equipped with multiple antennas, that is spoofing its location. After deriving the optimal transmit power and the optimal directional beamformer of a potentially malicious vehicle, robust theoretical analysis and detailed simulations are conducted in order to determine the impact of key system parameters on the LSDS performance. Our analysis shows how LSDS performance increases as the Rician K-factor of the channel between the BS and legitimate vehicles increases, or as the number of antennas at the BS or legitimate vehicle increases. We also obtain the counter-intuitive result that the malicious vehicle's optimal number of antennas conditioned on its optimal directional beamformer is equal to the legitimate vehicle's number of antennas. The results we provide here are important for the verification of location information reported in IEEE 1609.2 safety messages.
△ Less
Submitted 21 October, 2014; v1 submitted 11 October, 2014;
originally announced October 2014.
-
A Ruin Theoretic Design Approach for Wireless Cellular Network Sharing with Facilities
Authors:
Malcolm Egan,
Gareth W. Peters,
Ido Nevat,
Iain B. Collings
Abstract:
With the rise of cheap small-cells in wireless cellular networks, there are new opportunities for third party providers to service local regions via sharing arrangements with traditional operators. In fact, such arrangements are highly desirable for large facilities---such as stadiums, universities, and mines---as they already need to cover property costs, and often have fibre backhaul and efficie…
▽ More
With the rise of cheap small-cells in wireless cellular networks, there are new opportunities for third party providers to service local regions via sharing arrangements with traditional operators. In fact, such arrangements are highly desirable for large facilities---such as stadiums, universities, and mines---as they already need to cover property costs, and often have fibre backhaul and efficient power infrastructure. In this paper, we propose a new network sharing arrangement between large facilities and traditional operators. Our facility network sharing arrangement consists of two aspects: leasing of core network access and spectrum from traditional operators; and service agreements with users. Importantly, our incorporation of a user service agreement into the arrangement means that resource allocation must account for financial as well as physical resource constraints. This introduces a new non-trivial dimension into wireless network resource allocation, which requires a new evaluation framework---the data rate is no longer the only main performance metric. Moreover, despite clear economic incentives to adopt network sharing for facilities, a business case is lacking. As such, we develop a general socio-technical evaluation framework based on ruin-theory, where the key metric for the sharing arrangement is the probability that the facility has less than zero revenue surplus. We then use our framework to evaluate our facility network sharing arrangement, which offers guidance for leasing and service agreement negotiations, as well as design of the wireless network architecture, taking into account network revenue streams.
△ Less
Submitted 25 May, 2015; v1 submitted 14 September, 2014;
originally announced September 2014.
-
Opening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: An operational risk perspective
Authors:
Gareth W. Peters,
Ariane Chapelle,
Efstathios Panayi
Abstract:
We develop the first basic Operational Risk perspective on key risk management issues associated with the development of new forms of electronic currency in the real economy. In particular, we focus on understanding the development of new risks types and the evolution of current risk types as new components of financial institutions arise to cater for an increasing demand for electronic money, mic…
▽ More
We develop the first basic Operational Risk perspective on key risk management issues associated with the development of new forms of electronic currency in the real economy. In particular, we focus on understanding the development of new risks types and the evolution of current risk types as new components of financial institutions arise to cater for an increasing demand for electronic money, micro-payment systems, Virtual money and cryptographic (Crypto) currencies. In particular, this paper proposes a framework of risk identification and assessment applied to Virtual and Crypto currencies from a banking regulation perspective. In doing so, it addresses the topical issues of understanding important key Operational Risk vulnerabilities and exposure risk drivers under the framework of the Basel II/III banking regulation, specifically associated with Virtual and Crypto currencies. This is critical to consider should such alternative currencies continue to grow in utilisation to the point that they enter into the banking sector, through commercial banks and financial institutions who are beginning to contemplate their recognition in terms of deposits, transactions and exchangeability for fiat currencies.
We highlight how some of the features of Virtual and Crypto currencies are important drivers of Operational Risk, posing both management and regulatory challenges that must start to be considered and addressed both by regulators, central banks and security exchanges. In this paper we focus purely on the Operational Risk perspective of banks operating in an environment where such electronic Virtual currencies are available. Some aspects of this discussion are directly relevant now, whilst others can be understood as discussions to raise awareness of issues in Operational Risk that will arise as Virtual currency start to interact more widely in the real economy.
△ Less
Submitted 4 September, 2014;
originally announced September 2014.
-
Optimal Information-Theoretic Wireless Location Verification
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification o…
▽ More
We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we develop is based on an information-theoretic framework which uses the received signal strength (RSS) from a network of base-stations and the claimed position. Based on this information we derive the optimal decision regarding the verification of the user's location. Our algorithm is optimal in the sense of maximizing the mutual information between its input and output data. Our approach is based on the practical scenario in which a non-colluding malicious user some distance from a highway optimally boosts his transmit power in an attempt to fool the LVS that he is on the highway. We develop a practical threat model for this attack scenario, and investigate in detail the performance of the LVS in terms of its input/output mutual information. We show how our LVS decision rule can be implemented straightforwardly with a performance that delivers near-optimality under realistic threat conditions, with information-theoretic optimality approached as the malicious user moves further from the highway. The practical advantages our new information-theoretic scheme delivers relative to more traditional Bayesian verification frameworks are discussed.
△ Less
Submitted 24 June, 2013; v1 submitted 4 November, 2012;
originally announced November 2012.
-
An Information Theoretic Location Verification System for Wireless Networks
Authors:
Shihao Yan,
Robert Malaney,
Ido Nevat,
Gareth W. Peters
Abstract:
As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual infor…
▽ More
As location-based applications become ubiquitous in emerging wireless networks, Location Verification Systems (LVS) are of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No "malicious decision" to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, where verification of location information is of paramount importance.
△ Less
Submitted 20 April, 2012;
originally announced April 2012.
-
System Identification in Wireless Relay Networks via Gaussian Process
Authors:
Gareth W. Peters,
Ido Nevat,
**hong Yuan,
Ian B. Collings
Abstract:
We present a flexible stochastic model for a class of cooperative wireless relay networks, in which the relay processing functionality is not known at the destination. In addressing this problem we develop efficient algorithms to perform relay identification in a wireless relay network. We first construct a statistical model based on a representation of the system using Gaussian Processes in a non…
▽ More
We present a flexible stochastic model for a class of cooperative wireless relay networks, in which the relay processing functionality is not known at the destination. In addressing this problem we develop efficient algorithms to perform relay identification in a wireless relay network. We first construct a statistical model based on a representation of the system using Gaussian Processes in a non-standard manner due to the way we treat the imperfect channel state information. We then formulate the estimation problem to perform system identification, taking into account complexity and computational efficiency. Next we develop a set of three algorithms to solve the identification problem each of decreasing complexity, trading-off the estimation bias for computational efficiency. The joint optimisation problem is tackled via a Bayesian framework using the Iterated Conditioning on the Modes methodology. We develop a lower bound and several sub-optimal computationally efficient solutions to the identification problem, for comparison. We illustrate the estimation performance of our methodology for a range of widely used relay functionalities. The relative total error attained by our algorithm when compared to the lower bound is found to be at worst 9% for low SNR values under all functions considered. The effect of the relay functional estimation error is also studied via BER simulations and is shown to be less than 2dB worse than the lower bound.
△ Less
Submitted 17 January, 2012; v1 submitted 17 June, 2011;
originally announced June 2011.
-
Cooperative Spectrum Sensing for Amplify-and-Forward Cognitive Networks
Authors:
Ido Nevat,
Gareth W. Peters,
**hong Yuan,
Iain Collings
Abstract:
We develop a framework for spectrum sensing in cooperative amplify-and-forward cognitive radio networks. We consider a stochastic model where relays are assigned in cognitive radio networks to transmit the primary user's signal to a cognitive Secondary Base Station (SBS). We develop the Bayesian optimal decision rule under various scenarios of Channel State Information (CSI) varying from perfect t…
▽ More
We develop a framework for spectrum sensing in cooperative amplify-and-forward cognitive radio networks. We consider a stochastic model where relays are assigned in cognitive radio networks to transmit the primary user's signal to a cognitive Secondary Base Station (SBS). We develop the Bayesian optimal decision rule under various scenarios of Channel State Information (CSI) varying from perfect to imperfect CSI. In order to obtain the optimal decision rule based on a Likelihood Ratio Test (LRT), the marginal likelihood under each hypothesis relating to presence or absence of transmission needs to be evaluated pointwise. However, in some cases the evaluation of the LRT can not be performed analytically due to the intractability of the multi-dimensional integrals involved. In other cases, the distribution of the test statistic can not be obtained exactly. To circumvent these difficulties we design two algorithms to approximate the marginal likelihood, and obtain the decision rule. The first is based on Gaussian Approximation where we quantify the accuracy of the approximation via a multivariate version of the Berry-Esseen bound. The second algorithm is based on Laplace approximation for the marginal likelihood, which results in a non-convex optimisation problem which is solved efficiently via Bayesian Expectation-Maximisation method. We also utilise a Laguerre series expansion to approximate the distribution of the test statistic in cases where its distribution can not be derived exactly. Performance is evaluated via analytic bounds and compared to numerical simulations.
△ Less
Submitted 31 October, 2011; v1 submitted 12 April, 2011;
originally announced April 2011.
-
Blind Spectrum Sensing in Cognitive Radio over Fading Channels and Frequency Offsets
Authors:
Ido Nevat,
Gareth W. Peters,
**hong Yuan
Abstract:
This paper deals with the challenging problem of spectrum sensing in cognitive radio. We consider a stochastic system model where the the Primary User (PU) transmits a periodic signal over fading channels. The effect of frequency offsets due to oscillator mismatch, and Doppler offset is studied. We show that for this case the Likelihood Ratio Test (LRT) cannot be evaluated poitnwise. We present a…
▽ More
This paper deals with the challenging problem of spectrum sensing in cognitive radio. We consider a stochastic system model where the the Primary User (PU) transmits a periodic signal over fading channels. The effect of frequency offsets due to oscillator mismatch, and Doppler offset is studied. We show that for this case the Likelihood Ratio Test (LRT) cannot be evaluated poitnwise. We present a novel approach to approximate the marginilisation of the frequency offset using a single point estimate. This is obtained via a low complexity Constrained Adaptive Notch Filter (CANF) to estimate the frequency offset. Performance is evaluated via numerical simulations and it is shown that the proposed spectrum sensing scheme can achieve the same performance as the near-optimal scheme, that is based on a bank of matched filters, using only a fraction of the complexity required.
△ Less
Submitted 15 February, 2011; v1 submitted 16 June, 2010;
originally announced June 2010.
-
Channel Tracking for Relay Networks via Adaptive Particle MCMC
Authors:
Ido Nevat,
Gareth W. Peters,
Arnaud Doucet,
**hong Yuan
Abstract:
This paper presents a new approach for channel tracking and parameter estimation in cooperative wireless relay networks. We consider a system with multiple relay nodes operating under an amplify and forward relay function. We develop a novel algorithm to efficiently solve the challenging problem of joint channel tracking and parameters estimation of the Jakes' system model within a mobile wireless…
▽ More
This paper presents a new approach for channel tracking and parameter estimation in cooperative wireless relay networks. We consider a system with multiple relay nodes operating under an amplify and forward relay function. We develop a novel algorithm to efficiently solve the challenging problem of joint channel tracking and parameters estimation of the Jakes' system model within a mobile wireless relay network. This is based on \textit{particle Markov chain Monte Carlo} (PMCMC) method. In particular, it first involves develo** a Bayesian state space model, then estimating the associated high dimensional posterior using an adaptive Markov chain Monte Carlo (MCMC) sampler relying on a proposal built using a Rao-Blackwellised Sequential Monte Carlo (SMC) filter.
△ Less
Submitted 23 November, 2010; v1 submitted 16 June, 2010;
originally announced June 2010.